Workaround for what is probably a glibc bug (but we'll see this crop up again

and again, if we don't add the workaround).
Reported by: rolek
Patch by: tilghman
(Closes issue #11601, closes issue #11426)


git-svn-id: https://origsvn.digium.com/svn/asterisk/branches/1.4@94808 65c4cc65-6c06-0410-ace0-fbb531ad65f3
This commit is contained in:
Tilghman Lesher
2007-12-26 20:43:38 +00:00
parent e6a8750fe7
commit 3c3eb75062

View File

@@ -2283,6 +2283,14 @@ static void *session_do(void *data)
} }
ast_log(LOG_EVENT, "Failed attempt from %s\n", ast_inet_ntoa(s->sin.sin_addr)); ast_log(LOG_EVENT, "Failed attempt from %s\n", ast_inet_ntoa(s->sin.sin_addr));
} }
/* If the entire session occurs in a single context switch, then it's
* possible to get an unsafe memory condition by free()ing the memory
* before letting other threads run at least once. This actually seems
* like a workaround for a glibc bug.
*/
usleep(1);
destroy_session(s); destroy_session(s);
return NULL; return NULL;
} }