From: Tinet-mucw Date: Fri, 14 Jun 2024 02:16:36 +0000 (-0700) Subject: bridge_basic.c: Make sure that ast_bridge_channel is not destroyed while iterating... X-Git-Url: http://git.ipfire.org/cgi-bin/gitweb.cgi?a=commitdiff_plain;h=68a9c5683a51d68a8ff1fd6697bb90e91a47378f;p=thirdparty%2Fasterisk.git bridge_basic.c: Make sure that ast_bridge_channel is not destroyed while iterating over bridge->channels. From the gdb information, we can see that while iterating over bridge->channels, the ast_bridge_channel reference count is 0, indicating it has already been destroyed.Additionally, when ast_bridge_channel is removed from bridge->channels, the bridge is first locked. Therefore, locking the bridge before iterating over bridge->channels can resolve the race condition. Resolves: https://github.com/asterisk/asterisk/issues/768 --- diff --git a/main/bridge_basic.c b/main/bridge_basic.c index 952ac9f380..1451250dfa 100644 --- a/main/bridge_basic.c +++ b/main/bridge_basic.c @@ -1851,7 +1851,9 @@ static void bridge_ringing(struct ast_bridge *bridge) .subclass.integer = AST_CONTROL_RINGING, }; + ast_bridge_lock(bridge); ast_bridge_queue_everyone_else(bridge, NULL, &ringing); + ast_bridge_unlock(bridge); } /*! @@ -1864,7 +1866,9 @@ static void bridge_hold(struct ast_bridge *bridge) .subclass.integer = AST_CONTROL_HOLD, }; + ast_bridge_lock(bridge); ast_bridge_queue_everyone_else(bridge, NULL, &hold); + ast_bridge_unlock(bridge); } /*! @@ -1877,7 +1881,9 @@ static void bridge_unhold(struct ast_bridge *bridge) .subclass.integer = AST_CONTROL_UNHOLD, }; + ast_bridge_lock(bridge); ast_bridge_queue_everyone_else(bridge, NULL, &unhold); + ast_bridge_unlock(bridge); } /*!