commit 16d83c0806b74a91a2df3eb6f3cdaceee309625a
Author: Jacek Konieczny <[email protected]>
Date:   Fri Jun 9 14:07:27 2017 +0200

    new patches from Asterisk 13.16.0, Release: 2

 ...-svn-backport-dialog-transaction-deadlock.patch |  32 ++++++
 ...vn-backport-ua-pjsua-transaction-deadlock.patch | 119 +++++++++++++++++++++
 0037-r5576-svn-backport-session-timer-crash.patch  |  72 +++++++++++++
 0048-r5576-svn-backport-tls-crash.patch            |  32 ++++++
 pjproject.spec                                     |  14 ++-
 5 files changed, 266 insertions(+), 3 deletions(-)
---
diff --git a/pjproject.spec b/pjproject.spec
index f104e00..fa04b32 100644
--- a/pjproject.spec
+++ b/pjproject.spec
@@ -20,7 +20,7 @@
 Summary:       PJSIP - free and open source multimedia communication library
 Name:          pjproject
 Version:       2.6
-Release:       1
+Release:       2
 License:       GPL v2+
 Group:         Libraries
 Source0:       
http://www.pjsip.org/release/%{version}/%{name}-%{version}.tar.bz2
@@ -35,8 +35,12 @@ Patch101:    
0011-r5554-svn-backport-Increase-SENDER_WIDTH-column-size.patch
 Patch102:      0013-r5559-svn-backport-Fix-to-resolve-DNS-SRV-crashes.patch
 Patch103:      0014-Add-pjsip-transport-register-type-ipv6.patch
 Patch104:      0025-fix-print-xml-crash.patch
-Patch105:      0058-Parse-zero-length-multipart-body-parts-correctly.patch
-Patch106:      0059-Ensure-2543-transaction-key-buffer-is-large-enough.patch
+Patch105:      0035-r5572-svn-backport-dialog-transaction-deadlock.patch
+Patch106:      0036-r5573-svn-backport-ua-pjsua-transaction-deadlock.patch
+Patch107:      0037-r5576-svn-backport-session-timer-crash.patch
+Patch108:      0048-r5576-svn-backport-tls-crash.patch
+Patch109:      0058-Parse-zero-length-multipart-body-parts-correctly.patch
+Patch110:      0059-Ensure-2543-transaction-key-buffer-is-large-enough.patch
 URL:           http://www.pjsip.org/
 %{?with_video:BuildRequires:   SDL2-devel}
 BuildRequires: SILK_SDK-devel
@@ -116,6 +120,10 @@ Statyczna biblioteka %{name}.
 %patch104 -p1
 %patch105 -p1
 %patch106 -p1
+%patch107 -p1
+%patch108 -p1
+%patch109 -p1
+%patch110 -p1
 
 cp -p %{SOURCE1} pjlib/include/pj/config_site.h
 
diff --git a/0035-r5572-svn-backport-dialog-transaction-deadlock.patch 
b/0035-r5572-svn-backport-dialog-transaction-deadlock.patch
new file mode 100644
index 0000000..0c5e986
--- /dev/null
+++ b/0035-r5572-svn-backport-dialog-transaction-deadlock.patch
@@ -0,0 +1,32 @@
+Index: trunk/pjsip/src/pjsip/sip_transaction.c
+===================================================================
+--- a/pjsip/src/pjsip/sip_transaction.c        (revision 5244)
++++ b/pjsip/src/pjsip/sip_transaction.c        (revision 5572)
+@@ -1231,5 +1231,27 @@
+       PJSIP_EVENT_INIT_TSX_STATE(e, tsx, event_src_type, event_src,
+                                  prev_state);
++
++      /* For timer event, release lock to avoid deadlock.
++       * This should be safe because:
++       * 1. The tsx state just switches to TERMINATED or DESTROYED.
++       * 2. There should be no other processing taking place. All other
++       *    events, such as the ones handled by tsx_on_state_terminated()
++       *    should be ignored.
++         * 3. tsx_shutdown() hasn't been called.
++       * Refer to ticket #2001 (https://trac.pjsip.org/repos/ticket/2001).
++       */
++      if (event_src_type == PJSIP_EVENT_TIMER &&
++          (pj_timer_entry *)event_src == &tsx->timeout_timer)
++      {
++          pj_grp_lock_release(tsx->grp_lock);
++      }
++
+       (*tsx->tsx_user->on_tsx_state)(tsx, &e);
++
++      if (event_src_type == PJSIP_EVENT_TIMER &&
++          (pj_timer_entry *)event_src == &tsx->timeout_timer)
++      {
++          pj_grp_lock_acquire(tsx->grp_lock);
++      }
+     }
+     
diff --git a/0036-r5573-svn-backport-ua-pjsua-transaction-deadlock.patch 
b/0036-r5573-svn-backport-ua-pjsua-transaction-deadlock.patch
new file mode 100644
index 0000000..5887380
--- /dev/null
+++ b/0036-r5573-svn-backport-ua-pjsua-transaction-deadlock.patch
@@ -0,0 +1,119 @@
+Index: trunk/pjsip/include/pjsip/sip_transaction.h
+===================================================================
+--- a/pjsip/include/pjsip/sip_transaction.h    (revision 5572)
++++ b/pjsip/include/pjsip/sip_transaction.h    (revision 5573)
+@@ -180,4 +180,8 @@
+  * is created by calling #pjsip_tsx_create_key() from an incoming message.
+  *
++ * IMPORTANT: To prevent deadlock, application should use
++ * #pjsip_tsx_layer_find_tsx2() instead which only adds a reference to
++ * the transaction instead of locking it.
++ *
+  * @param key     The key string to find the transaction.
+  * @param lock            If non-zero, transaction will be locked before the
+@@ -190,4 +194,19 @@
+ PJ_DECL(pjsip_transaction*) pjsip_tsx_layer_find_tsx( const pj_str_t *key,
+                                                     pj_bool_t lock );
++
++/**
++ * Find a transaction with the specified key. The transaction key normally
++ * is created by calling #pjsip_tsx_create_key() from an incoming message.
++ *
++ * @param key     The key string to find the transaction.
++ * @param add_ref   If non-zero, transaction's reference will be added
++ *                by one before the function returns, to make sure that
++ *                it's not deleted by other threads.
++ *
++ * @return        The matching transaction instance, or NULL if transaction
++ *                can not be found.
++ */
++PJ_DECL(pjsip_transaction*) pjsip_tsx_layer_find_tsx2( const pj_str_t *key,
++                                                     pj_bool_t add_ref );
+ 
+ /**
+Index: trunk/pjsip/src/pjsip/sip_transaction.c
+===================================================================
+--- a/pjsip/src/pjsip/sip_transaction.c        (revision 5572)
++++ b/pjsip/src/pjsip/sip_transaction.c        (revision 5573)
+@@ -642,6 +642,6 @@
+  * Find a transaction.
+  */
+-PJ_DEF(pjsip_transaction*) pjsip_tsx_layer_find_tsx( const pj_str_t *key,
+-                                                   pj_bool_t lock )
++static pjsip_transaction* find_tsx( const pj_str_t *key, pj_bool_t lock,
++                                  pj_bool_t add_ref )
+ {
+     pjsip_transaction *tsx;
+@@ -655,5 +655,5 @@
+     /* Prevent the transaction to get deleted before we have chance to lock 
it.
+      */
+-    if (tsx && lock)
++    if (tsx)
+         pj_grp_lock_add_ref(tsx->grp_lock);
+     
+@@ -667,10 +667,27 @@
+     PJ_RACE_ME(5);
+ 
+-    if (tsx && lock) {
+-      pj_grp_lock_acquire(tsx->grp_lock);
+-        pj_grp_lock_dec_ref(tsx->grp_lock);
++    if (tsx) {
++      if (lock)
++          pj_grp_lock_acquire(tsx->grp_lock);
++
++        if (!add_ref)
++            pj_grp_lock_dec_ref(tsx->grp_lock);
+     }
+ 
+     return tsx;
++}
++
++
++PJ_DEF(pjsip_transaction*) pjsip_tsx_layer_find_tsx( const pj_str_t *key,
++                                                   pj_bool_t lock )
++{
++    return find_tsx(key, lock, PJ_FALSE);
++}
++
++
++PJ_DEF(pjsip_transaction*) pjsip_tsx_layer_find_tsx2( const pj_str_t *key,
++                                                    pj_bool_t add_ref )
++{
++    return find_tsx(key, PJ_FALSE, add_ref);
+ }
+ 
+Index: trunk/pjsip/src/pjsip/sip_ua_layer.c
+===================================================================
+--- a/pjsip/src/pjsip/sip_ua_layer.c   (revision 5572)
++++ b/pjsip/src/pjsip/sip_ua_layer.c   (revision 5573)
+@@ -552,10 +552,10 @@
+ 
+       /* Lookup the INVITE transaction */
+-      tsx = pjsip_tsx_layer_find_tsx(&key, PJ_TRUE);
++      tsx = pjsip_tsx_layer_find_tsx2(&key, PJ_TRUE);
+ 
+       /* We should find the dialog attached to the INVITE transaction */
+       if (tsx) {
+           dlg = (pjsip_dialog*) tsx->mod_data[mod_ua.mod.id];
+-          pj_grp_lock_release(tsx->grp_lock);
++          pj_grp_lock_dec_ref(tsx->grp_lock);
+ 
+           /* Dlg may be NULL on some extreme condition
+Index: trunk/pjsip/src/pjsip-ua/sip_inv.c
+===================================================================
+--- a/pjsip/src/pjsip-ua/sip_inv.c     (revision 5572)
++++ b/pjsip/src/pjsip-ua/sip_inv.c     (revision 5573)
+@@ -3276,5 +3276,5 @@
+     pjsip_tsx_create_key(rdata->tp_info.pool, &key, PJSIP_ROLE_UAS,
+                        pjsip_get_invite_method(), rdata);
+-    invite_tsx = pjsip_tsx_layer_find_tsx(&key, PJ_TRUE);
++    invite_tsx = pjsip_tsx_layer_find_tsx2(&key, PJ_TRUE);
+ 
+     if (invite_tsx == NULL) {
+@@ -3325,5 +3325,5 @@
+ 
+     if (invite_tsx)
+-      pj_grp_lock_release(invite_tsx->grp_lock);
++      pj_grp_lock_dec_ref(invite_tsx->grp_lock);
+ }
+ 
diff --git a/0037-r5576-svn-backport-session-timer-crash.patch 
b/0037-r5576-svn-backport-session-timer-crash.patch
new file mode 100644
index 0000000..098adcd
--- /dev/null
+++ b/0037-r5576-svn-backport-session-timer-crash.patch
@@ -0,0 +1,72 @@
+Index: pjproject/trunk/pjsip/src/pjsip-ua/sip_timer.c
+===================================================================
+--- a/pjsip/src/pjsip-ua/sip_timer.c   (revision 5557)
++++ b/pjsip/src/pjsip-ua/sip_timer.c   (revision 5576)
+@@ -333,6 +333,8 @@
+     pjsip_tx_data *tdata = NULL;
+     pj_status_t status;
+     pj_bool_t as_refresher;
++    int entry_id;
++    char obj_name[PJ_MAX_OBJ_NAME];
+ 
+     pj_assert(inv);
+ 
+@@ -344,7 +346,10 @@
+     /* Check our role */
+     as_refresher =
+       (inv->timer->refresher == TR_UAC && inv->timer->role == PJSIP_ROLE_UAC) 
||
+-      (inv->timer->refresher == TR_UAS && inv->timer->role == 
PJSIP_ROLE_UAS);    
++      (inv->timer->refresher == TR_UAS && inv->timer->role == PJSIP_ROLE_UAS);
++
++    entry_id = entry->id;
++    pj_ansi_strncpy(obj_name, inv->pool->obj_name, PJ_MAX_OBJ_NAME);
+ 
+     /* Do action based on role(refresher or refreshee). 
+      * As refresher:
+@@ -353,7 +358,7 @@
+      * As refreshee:
+      * - end session if there is no refresh request received.
+      */
+-    if (as_refresher && (entry->id != REFRESHER_EXPIRE_TIMER_ID)) {
++    if (as_refresher && (entry_id != REFRESHER_EXPIRE_TIMER_ID)) {
+       pj_time_val now;
+ 
+       /* As refresher, reshedule the refresh request on the following:
+@@ -414,7 +419,7 @@
+       }
+ 
+       pj_gettimeofday(&now);
+-      PJ_LOG(4, (inv->pool->obj_name,
++      PJ_LOG(4, (obj_name,
+                  "Refreshing session after %ds (expiration period=%ds)",
+                  (now.sec-inv->timer->last_refresh.sec),
+                  inv->timer->setting.sess_expires));
+@@ -432,7 +437,7 @@
+                                      NULL, &tdata);
+ 
+       pj_gettimeofday(&now);
+-      PJ_LOG(3, (inv->pool->obj_name, 
++      PJ_LOG(3, (obj_name,
+                  "No session %s received after %ds "
+                  "(expiration period=%ds), stopping session now!",
+                  (as_refresher?"refresh response":"refresh"),
+@@ -451,11 +456,16 @@
+       status = pjsip_inv_send_msg(inv, tdata);        
+     }
+ 
++    /*
++     * At this point, dialog might have already been destroyed,
++     * including its pool used by the invite session.
++     */
++
+     /* Print error message, if any */
+     if (status != PJ_SUCCESS) {
+-      PJ_PERROR(2, (inv->pool->obj_name, status,
++      PJ_PERROR(2, (obj_name, status,
+                    "Error in %s session timer",
+-                   ((as_refresher && entry->id != REFRESHER_EXPIRE_TIMER_ID)? 
++                   ((as_refresher && entry_id != REFRESHER_EXPIRE_TIMER_ID)?
+                      "refreshing" : "terminating")));
+     }
+ }
+  
diff --git a/0048-r5576-svn-backport-tls-crash.patch 
b/0048-r5576-svn-backport-tls-crash.patch
new file mode 100644
index 0000000..b5edc71
--- /dev/null
+++ b/0048-r5576-svn-backport-tls-crash.patch
@@ -0,0 +1,32 @@
+Index: /pjproject/trunk/pjlib/src/pj/ssl_sock_ossl.c
+===================================================================
+--- a/pjlib/src/pj/ssl_sock_ossl.c     (revision 5564)
++++ b/pjlib/src/pj/ssl_sock_ossl.c     (revision 5565)
+@@ -145,5 +145,6 @@
+     SSL_STATE_NULL,
+     SSL_STATE_HANDSHAKING,
+-    SSL_STATE_ESTABLISHED
++    SSL_STATE_ESTABLISHED,
++    SSL_STATE_ERROR
+ };
+ 
+@@ -1907,4 +1908,8 @@
+                       buf->len += size_;
+               
++                    if (status != PJ_SUCCESS) {
++                        ssock->ssl_state = SSL_STATE_ERROR;
++                    }
++
+                   ret = (*ssock->param.cb.on_data_read)(ssock, buf->data,
+                                                         buf->len, status,
+@@ -2658,5 +2663,9 @@
+       /* Current cipher */
+       cipher = SSL_get_current_cipher(ssock->ossl_ssl);
+-      info->cipher = (SSL_CIPHER_get_id(cipher) & 0x00FFFFFF);
++      if (cipher) {
++          info->cipher = (SSL_CIPHER_get_id(cipher) & 0x00FFFFFF);
++      } else {
++          info->cipher = PJ_TLS_UNKNOWN_CIPHER;
++      }
+ 
+       /* Remote address */
================================================================

---- gitweb:

http://git.pld-linux.org/gitweb.cgi/packages/pjproject.git/commitdiff/16d83c0806b74a91a2df3eb6f3cdaceee309625a

_______________________________________________
pld-cvs-commit mailing list
[email protected]
http://lists.pld-linux.org/mailman/listinfo/pld-cvs-commit

Reply via email to