### Description
see #3563
Sorry about this lot but they all look different in a maybe related sort of way but after
6 bug reports and more coredumps than that, I shall stop now in the hope that there's
some useful info somewhere in it all!
I started this experiment using 5.6.4 and that crashed 50 times in the space of 10 minutes
so 5.7.1 is positively stable with just 6 coredumps in 3 hours!
#### Debugging Data
```
PID: 7880 (kamailio)
UID: 990 (kamailio)
GID: 988 (kamailio)
Signal: 11 (SEGV)
Timestamp: Thu 2023-09-14 01:29:32 UTC (10min ago)
Command Line: /usr/sbin/kamailio -DD -P /run/kamailio/kamailio.pid -f
/etc/kamailio/kamailio.cfg -m 256 -M 8 --atexit=no
Executable: /usr/sbin/kamailio
Control Group: /system.slice/kamailio.service
Unit: kamailio.service
Slice: system.slice
Boot ID: 3fc4251c606f4c6183610573f44c46ba
Machine ID: 16e913e686424f13b970f9b1044cc6b3
Hostname:
kamrtc01.voiceflex.com
Storage:
/var/lib/systemd/coredump/core.kamailio.990.3fc4251c606f4c6183610573f44c46ba.7880.1694654972000000.zst
(present)
Size on Disk: 2.5M
Message: Process 7880 (kamailio) of user 990 dumped core.
Stack trace of thread 7880:
#0 0x00007ffa7e793cd5 EVP_KDF_CTX_free (libcrypto.so.3 + 0x193cd5)
#1 0x00007ffa7eba5734 tls13_hkdf_expand (libssl.so.3 + 0x4b734)
#2 0x00007ffa7eba5c39 derive_secret_key_and_iv (libssl.so.3 + 0x4bc39)
#3 0x00007ffa7eba82b5 tls13_change_cipher_state (libssl.so.3 + 0x4e2b5)
#4 0x00007ffa7ebca63b ossl_statem_server_post_work (libssl.so.3 +
0x7063b)
#5 0x00007ffa7ebbbb4b state_machine.part.0 (libssl.so.3 + 0x61b4b)
#6 0x00007ffa7de4b584 tls_accept (tls.so + 0x59584)
#7 0x00007ffa7de568be tls_h_read_f (tls.so + 0x648be)
#8 0x00000000006c79bc tcp_read_headers (kamailio + 0x2c79bc)
#9 0x00000000006cfb94 tcp_read_req (kamailio + 0x2cfb94)
#10 0x00000000006d4cc3 handle_io (kamailio + 0x2d4cc3)
#11 0x00000000006c271d io_wait_loop_epoll (kamailio + 0x2c271d)
#12 0x00000000006d7a47 tcp_receive_loop (kamailio + 0x2d7a47)
#13 0x00000000006b7689 tcp_init_children (kamailio + 0x2b7689)
#14 0x000000000042fae9 main_loop (kamailio + 0x2fae9)
#15 0x0000000000439969 main (kamailio + 0x39969)
#16 0x00007ffa7fc3feb0 __libc_start_call_main (libc.so.6 + 0x3feb0)
#17 0x00007ffa7fc3ff60 __libc_start_main@@GLIBC_2.34 (libc.so.6 +
0x3ff60)
#18 0x000000000041dc65 _start (kamailio + 0x1dc65)
ELF object binary architecture: AMD x86-64
Program terminated with signal SIGSEGV, Segmentation fault.
#0 0x00007ffa7e793cd5 in EVP_KDF_CTX_free (ctx=0x7ffa6e52c300) at
crypto/evp/kdf_lib.c:49
49 ctx->meth->freectx(ctx->algctx);
Missing separate debuginfos, use: dnf debuginfo-install glibc-2.34-60.0.2.el9.x86_64
libgcc-11.3.1-4.3.0.1.el9.x86_64 libstdc++-11.3.1-4.3.0.1.el9.x86_64
sssd-client-2.8.2-3.0.2.el9_2.x86_64
(gdb) bt full
#0 0x00007ffa7e793cd5 in EVP_KDF_CTX_free (ctx=0x7ffa6e52c300) at
crypto/evp/kdf_lib.c:49
No locals.
#1 0x00007ffa7eba5734 in tls13_hkdf_expand (s=s@entry=0x7ffa6e8c0c80,
md=md@entry=0x7ffa6e15e470, secret=secret@entry=0x7ffdf7e38160
"\374\265\277θh\022\v<\357\356\"\202z\277\302\207\017\362X\246ߔY\311\376ױ\263\253\231\001\063\003\257\251\377\203\250\363r\304x*%",
label=label@entry=0x7ffa7ebe019a <keylabel> "key",
labellen=labellen@entry=3, data=data@entry=0x0, datalen=0,
out=0x7ffdf7e381a0
"j?c\202\355,\223\f[\276,\355\201r\235\060\344\303xu\372\240\371䝫WB0W\002G",
outlen=32, fatal=1) at ssl/tls13_enc.c:94
kdf = <optimized out>
kctx = 0x7ffa6e52c300
params = {{key = 0x7ffa7ebd94c1 "mode", data_type = 1, data =
0x7ffdf7e37e6c, data_size = 4, return_size = 18446744073709551615}, {key = 0x7ffa7ebd9610
"digest", data_type = 4, data = 0x7ffa6e15e668, data_size = 8, return_size =
18446744073709551615}, {key = 0x7ffa7ebd93da "key", data_type = 5, data =
0x7ffdf7e38160, data_size = 48, return_size = 18446744073709551615}, {key = 0x7ffa7ebd9c2c
"prefix",
data_type = 5, data = 0x7ffa7ebe0216 <label_prefix>, data_size = 6,
return_size = 18446744073709551615}, {key = 0x7ffa7ebda137 "label", data_type =
5, data = 0x7ffa7ebe019a <keylabel>, data_size = 3, return_size =
18446744073709551615}, {key = 0x0, data_type = 0, data = 0x0, data_size = 0, return_size =
0}, {key = 0x0, data_type = 0, data = 0x0, data_size = 0, return_size = 0}}
p = <optimized out>
mode = 2
mdname = <optimized out>
ret = 0
hashlen = 48
__func__ = "tls13_hkdf_expand"
#2 0x00007ffa7eba5c39 in tls13_derive_key (keylen=32, key=0x7ffdf7e381a0
"j?c\202\355,\223\f[\276,\355\201r\235\060\344\303xu\372\240\371䝫WB0W\002G",
secret=0x7ffdf7e38160
"\374\265\277θh\022\v<\357\356\"\202z\277\302\207\017\362X\246ߔY\311\376ױ\263\253\231\001\063\003\257\251\377\203\250\363r\304x*%",
md=0x7ffa6e15e470, s=0x7ffa6e8c0c80) at ssl/tls13_enc.c:119
keylabel = {<optimized out>, <optimized out>, <optimized out>,
<optimized out>}
#3 derive_secret_key_and_iv (s=s@entry=0x7ffa6e8c0c80, sending=sending@entry=0,
md=md@entry=0x7ffa6e15e470, ciph=0x7ffa6df01df8, insecret=insecret@entry=0x7ffa6e8c1204
"\276\202\315\064̫VVZ\037\f82\366\243\216,\f@\177\237\321\006\037\252
\033\303s\354\354\037\353U\255\276\302\237\360\341\003\222Ɍ#\277AP",
hash=hash@entry=0x7ffa6e8c1384
"O\362\320+\017\232\354m;\251v\177\023\200m\345}\236\301\254C\027\231\005ͪ\363\253_\273\376\242\341\006\206\211\227\302\003E",
label=0x7ffa7ebe0158 <client_handshake_traffic> "c hs traffic",
labellen=12, secret=0x7ffdf7e38160
"\374\265\277θh\022\v<\357\356\"\202z\277\302\207\017\362X\246ߔY\311\376ױ\263\253\231\001\063\003\257\251\377\203\250\363r\304x*%",
key=0x7ffdf7e381a0
"j?c\202\355,\223\f[\276,\355\201r\235\060\344\303xu\372\240\371䝫WB0W\002G",
iv=0x7ffa6e8c14d0 "", ciph_ctx=0x7ffa6e84f4a0) at ssl/tls13_enc.c:385
ivlen = 12
keylen = 32
taglen = 0
hashleni = <optimized out>
hashlen = <optimized out>
__func__ = "derive_secret_key_and_iv"
#4 0x00007ffa7eba82b5 in tls13_change_cipher_state (s=0x7ffa6e8c0c80, which=161) at
ssl/tls13_enc.c:650
iv = 0x7ffa6e8c14d0 ""
key =
"j?c\202\355,\223\f[\276,\355\201r\235\060\344\303xu\372\240\371䝫WB0W\002G",
'\000' <repeats 31 times>
secret =
"\374\265\277θh\022\v<\357\356\"\202z\277\302\207\017\362X\246ߔY\311\376ױ\263\253\231\001\063\003\257\251\377\203\250\363r\304x*%\000\366\\",
'\000' <repeats 15 times>
hashval =
"O\362\320+\017\232\354m;\251v\177\023\200m\345}\236\301\254C\027\231\005ͪ\363\253_\273\376\242\341\006\206\211\227\302\003E\000\246\201\334\067\204C^R\237\346}\372\177\000\000\000\000\000\000\000\000\000"
hash = 0x7ffa6e8c1384
"O\362\320+\017\232\354m;\251v\177\023\200m\345}\236\301\254C\027\231\005ͪ\363\253_\273\376\242\341\006\206\211\227\302\003E"
insecret = <optimized out>
finsecret = <optimized out>
log_label = <optimized out>
ciph_ctx = 0x7ffa6e84f4a0
finsecretlen = <optimized out>
label = <optimized out>
labellen = <optimized out>
hashlen = 48
ret = 0
md = 0x7ffa6e15e470
cipher = 0x7ffa6df01df8
crypto_info = {{gcm128 = {info = {version = 1, cipher_type = 0}, iv =
"\000\000\000\000\000@\000", key =
"\000\000\000\000\240\202\343\367\375\177\000\000\345\265q", salt =
"\000\000\000", rec_seq = "\250\354\204n\372\177\000"}, gcm256 = {info
= {version = 1, cipher_type = 0}, iv = "\000\000\000\000\000@\000",
key =
"\000\000\000\000\240\202\343\367\375\177\000\000\345\265q\000\000\000\000\000\250\354\204n\372\177\000\000\001\000\000",
salt = "\000\000\000", rec_seq = "R\237\346}\372\177\000"}, ccm128 =
{info = {version = 1, cipher_type = 0}, iv = "\000\000\000\000\000@\000", key =
"\000\000\000\000\240\202\343\367\375\177\000\000\345\265q", salt =
"\000\000\000", rec_seq = "\250\354\204n\372\177\000"},
chacha20poly1305 = {info = {version = 1, cipher_type = 0}, iv =
"\000\000\000\000\000@\000\000\000\000\000", key =
"\240\202\343\367\375\177\000\000\345\265q\000\000\000\000\000\250\354\204n\372\177\000\000\001\000\000\000\000\000\000",
salt = 0x7ffdf7e38110 "R\237\346}\372\177", rec_seq =
"R\237\346}\372\177\000"}}, tls_crypto_info_len = 140713844858453}
bio = <optimized out>
skip_ktls = <optimized out>
__func__ = "tls13_change_cipher_state"
early_exporter_master_secret = "e exp master"
client_handshake_traffic = "c hs traffic"
server_handshake_traffic = "s hs traffic"
server_application_traffic = "s ap traffic"
client_early_traffic = "c e traffic"
client_application_traffic = "c ap traffic"
resumption_master_secret = "res master"
exporter_master_secret = "exp master"
#5 0x00007ffa7ebca63b in ossl_statem_server_post_work (s=0x7ffa6e8c0c80,
wst=<optimized out>) at ssl/statem/statem_srvr.c:903
st = 0x7ffa6e8c0cc8
__func__ = "ossl_statem_server_post_work"
#6 0x00007ffa7ebbbb4b in write_state_machine (s=0x7ffa6e8c0c80) at
ssl/statem/statem.c:893
post_work = 0x7ffa7ebca200 <ossl_statem_server_post_work>
mt = 257
pkt = {buf = 0x7ffa6e84ea00, staticbuf = 0x0, curr = 1, written = 1, maxsize =
18446744073709551615, subs = 0x0, endfirst = 0}
ret = <optimized out>
pre_work = 0x7ffa7ebc9260 <ossl_statem_server_pre_work>
get_construct_message_f = 0x7ffa7ebc2920
<ossl_statem_server_construct_message>
confunc = 0x7ffa7ebc2c30 <tls_construct_change_cipher_spec>
st = 0x7ffa6e8c0cc8
transition = 0x7ffa7ebc9cf0 <ossl_statem_server_write_transition>
cb = 0x7ffa7de10e72 <sr_ssl_ctx_info_callback>
st = <optimized out>
ret = <optimized out>
transition = <optimized out>
pre_work = <optimized out>
post_work = <optimized out>
get_construct_message_f = <optimized out>
cb = <optimized out>
confunc = <optimized out>
mt = <optimized out>
pkt = {buf = <optimized out>, staticbuf = <optimized out>, curr =
<optimized out>, written = <optimized out>, maxsize = <optimized out>,
subs = <optimized out>, endfirst = <optimized out>}
__func__ = {<optimized out> <repeats 20 times>}
tmpret = <optimized out>
#7 state_machine (s=0x7ffa6e8c0c80, server=<optimized out>) at
ssl/statem/statem.c:451
buf = 0x0
cb = <optimized out>
st = <optimized out>
ret = <optimized out>
ssret = <optimized out>
__func__ = {<optimized out> <repeats 14 times>}
#8 0x00007ffa7de4b584 in tls_accept (c=0x7ffa6e7510a8, error=0x7ffdf7e58584) at
tls_server.c:470
ret = 0
ssl = 0x7ffa6e8c0c80
cert = 0x1
tls_c = 0x7ffa6e84e020
tls_log = 0
__func__ = "tls_accept"
#9 0x00007ffa7de568be in tls_h_read_f (c=0x7ffa6e7510a8, flags=0x7ffdf7e589c0) at
tls_server.c:1175
r = 0x7ffa6e7511d0
bytes_free = 16383
bytes_read = 617
read_size = 16383
ssl_error = 0
ssl_read = 0
ssl = 0x7ffa6e8c0c80
rd_buf =
"\026\003\001\002d\001\000\002`\003\003]\250\071\325\351\002*'.4\361|\255K\032\016\071\244^\331^î\220ޝ)<\t\323\300\330
$Z\200?/\377\331\066\313\066\250\251\300\334k\022i\330\341\223!\213p\254\v\240\006\300c\032\355\355\000
\352\352\023\001\023\002\023\003\300+\300/\300,\300\060̨̩\300\023\300\024\000\234\000\235\000/\000\065\001\000\001\367\232\232\000\000\000\020\000\v\000\t\bhttp/1.1\000\v\000\002\001\000\000-\000\002\001\001\377\001\000\001\000\000#\000\000\000\033\000\003\002\000\002\000\000\000\030\000\026\000\000\023webrtc.nebulaip.com\000\063\000+\000)ZZ\000\001\000\000\035\000
"...
wr_buf =
"\240\205\344\367\375\177\000\000\026\003\000\000\026\003\000\000\000\000\001\000\026N\360\035\235~\214il=\337&\304J\302\236R\214\270:\261\203\277\034)\377\263H\276\355\300\345\065\b\300\264\342\225$\334X\036)W|nCS){D\300_\aH\020\213\340BY\241\304m\350\b\236([%\354/\340\023\n@RD/\273\245\271\356u&\376\255\340Zđ\331./XB\224F\205[\021i\r\250\024к\311\030*\262U\375\020\002L\362\312\005\225\063\\\032\211\061\317%A\024\062\360\310CP\227\355\270(O\263\201\202\tj>\022A\351\374.XB\024\274=\220\310'\343\344\251R\311\314$,\035\267|\031\250\024\223E\254\227U;\351\351\303\372\270>"...
rd = {buf = 0x7ffdf7e48580 "\026\003\001\002d\001", pos = 617, used =
617, size = 65536}
wr = {buf = 0x7ffdf7e38580 "\240\205\344\367\375\177", pos = 0, used =
0, size = 65536}
tls_c = 0x7ffa6e84e020
--Type <RET> for more, q to quit, c to continue without paging--
enc_rd_buf = 0x0
n = 0
flush_flags = 0
err_src = 0x7ffa7de735a0 "TLS read:"
ip_buf = '\000' <repeats 63 times>
x = 2144005193
tls_dbg = 4095
__func__ = "tls_h_read_f"
#10 0x00000000006c79bc in tcp_read_headers (c=0x7ffa6e7510a8, read_flags=0x7ffdf7e589c0)
at core/tcp_read.c:441
bytes = 65535
remaining = 0
p = 0x2f86e9a95d6 <error: Cannot access memory at address 0x2f86e9a95d6>
r = 0x7ffa6e7511d0
mc = 32762
body_len = 28314
mfline = 0x7ffa6e9a93a0
"\201\376\002\370\324X\234\004\206\035\333M\207\f\331V\364+\365t\356/\371f\246,\377*\272=\376q\270\071\365t\372;\363i\364\v\325T\373j\262\064\331R\312m\265b\274W\235\b\263\066\372h\263S\207\v\274u\342;\357f\247=\367v\344\062\365*\275\066\352e\270\061\370?\266*\375j\267\060\241~\355\060\333\060\266\023\244\060\354m\257\062\345U\226I\265
\261B\273*\353e\246<\357>\364o\254\t\336\f\363>\364d\357m\244b\353a\266*\350g\224/\371f\246,\377*\272=\376q\270\071\365t\372;\363i\352U\226B\246\067\361>\364d\357m\244b\353a\266*\350g\224/\371f\246,\377*\272=\376q\270\071\365t"...
mtransid = {s = 0x7ffa6e9a8ff8 "<", len = 1855623184}
__func__ = "tcp_read_headers"
#11 0x00000000006cfb94 in tcp_read_req (con=0x7ffa6e7510a8, bytes_read=0x7ffdf7e589c4,
read_flags=0x7ffdf7e589c0) at core/tcp_read.c:1469
bytes = -1
total_bytes = 0
resp = 1
size = 0
req = 0x7ffa6e7511d0
dst = {send_sock = 0x7ffa6e9a8ff8, to = {s = {sa_family = 0, sa_data =
"\000\020\002\000\000\000\001\000\345\367\021\000\000"}, sin = {sin_family = 0,
sin_port = 4096, sin_addr = {s_addr = 2}, sin_zero =
"\001\000\345\367\021\000\000"}, sin6 = {sin6_family = 0, sin6_port = 4096,
sin6_flowinfo = 2, sin6_addr = {__in6_u = {__u6_addr8 =
"\001\000\345\367\021\000\000\000ಙ\000\000\000\000", __u6_addr16 = {1,
63461, 17, 0, 45792, 153, 0, 0}, __u6_addr32 = {4158980097, 17,
10072800, 0}}}, sin6_scope_id = 2565659576}, sas = {ss_family = 0,
__ss_padding =
"\000\020\002\000\000\000\001\000\345\367\021\000\000\000ಙ\000\000\000\000\000\270\333옒\225\237\207\220\221\232n\372\177\000\000\000\000\000\000owh\001\240\264\231\000\000\000\000\000\024\000\000\000\000\000\000\000\001\000\000\000\001\000\000\000\022\000\000\000\375\177\000\000-uQ\000\000\000\000\000\270\211\345\367\375\177\000\000\b",
'\000' <repeats 22 times>,
__ss_align = 140728762468432}}, id = 1, send_flags = {f = 0, blst_imask =
0}, proto = 48 '0', proto_pad0 = -120 '\210', proto_pad1 = -2075}
c = 0 '\000'
ret = 0
__func__ = "tcp_read_req"
#12 0x00000000006d4cc3 in handle_io (fm=0x7ffa7f599ce8, events=1, idx=-1) at
core/tcp_read.c:1780
ret = 8
n = 8
read_flags = RD_CONN_SHORT_READ
con = 0x7ffa6e7510a8
s = 18
resp = 1
t = 23623535
ee = 0x0
__func__ = "handle_io"
#13 0x00000000006c271d in io_wait_loop_epoll (h=0x99b2e0 <io_w>, t=2, repeat=0) at
core/io_wait.h:1070
n = 1
r = 0
fm = 0x7ffa7f599ce8
revents = 1
__func__ = "io_wait_loop_epoll"
#14 0x00000000006d7a47 in tcp_receive_loop (unix_sock=47) at core/tcp_read.c:1976
__func__ = "tcp_receive_loop"
#15 0x00000000006b7689 in tcp_init_children (woneinit=0x7ffdf7e58d7c) at
core/tcp_main.c:5239
r = 3
i = 3
reader_fd_1 = 47
pid = 0
si_desc = "tcp receiver
(generic)\000\000\000\000\000\000\000\000\000\000\023e\204\000\000\000\000\000\033\000\000\000\000\000\000\000\240{\324\177\372\177\000\000\000\000\000\020\000\000\000\000\020\215\345\367\375\177\000\000\034\003e\000\000\000\000\000\020\215\345\367\375\177\000\000\345\030n\000\000\000\000\000\300\214\345\367\375\177\000\000\252\264~\000\000\000\000\000\023e\204\000\000\000\000\000ȹ\342m
\000\000"
si = 0x0
__func__ = "tcp_init_children"
#16 0x000000000042fae9 in main_loop () at main.c:1851
i = 4
pid = 7869
si = 0x0
si_desc = "udp receiver child=3
sock=172.16.128.55:5090\000Y\354W\340\215\345\367\375\177\000\000\000\000\000\000\000\000\000\000@\223\345\367\375\177\000\000\023e\204\000\000\000\000\000\033\000\000\000\000\000\000\000X_J\177\372\177\000\000\000\000\000\020\000\000\000\000:|\324\177\372\177\000\000\060\000\000\000\060\000\000\000\370\216\345\367\375\177\000"
nrprocs = 4
woneinit = 1
__func__ = "main_loop"
#17 0x0000000000439969 in main (argc=11, argv=0x7ffdf7e59458) at main.c:3086
cfg_stream = 0x185d380
c = -1
r = 0
tmp = 0x7ffdf7e59ea3 ""
tmp_len = 0
port = 0
proto = 0
ahost = 0x0
aport = 0
options = 0x8322d8
":f:cm:M:dVIhEeb:l:L:n:vKrRDTN:W:w:t:u:g:P:G:SQ:O:a:A:x:X:Y:"
ret = -1
seed = 3855592029
rfd = 4
debug_save = 0
debug_flag = 0
dont_fork_cnt = 2
n_lst = 0x200000064
p = 0x0
st = {st_dev = 24, st_ino = 891, st_nlink = 2, st_mode = 16832, st_uid = 990,
st_gid = 988, __pad0 = 0, st_rdev = 0, st_size = 40, st_blksize = 4096, st_blocks = 0,
st_atim = {tv_sec = 1694643229, tv_nsec = 729000000}, st_mtim = {tv_sec = 1694654829,
tv_nsec = 40961094}, st_ctim = {tv_sec = 1694654829, tv_nsec = 40961094}, __glibc_reserved
= {0, 0, 0}}
tbuf =
"\331l\372\177\372\177\000\000\070+\367\177\372\177\000\000А\345\367\375\177\000\000\a\000\000\000\000\000\000\000\330\030\367\177\372\177\000\000\a\000\000\000#\000\000\000\060z\372\177\372\177\000\000\245F\370\177\372\177\000\000\000\000\000\000\000\000\000\000\220Y\370\177\372\177\000\000\070\000\301\177\372\177\000\000\000\212\366\177\372\177\000\000\000\000\000\000\000\000\000\000\240\220\345\367\375\177\000\000\360n\372\177\372\177\000\000\330*\367\177\372\177\000\000\330*\367\177\372\177\000\000\000\000\000\000\000\000\000\000ؘ\366\177\372\177\000\000\240\220\345\367\375\177\000\000\220\205\372\177\372\177\000\000\000\020\367\177\372\177\000\000\022\034\367\177\372\177\000\000\066\021\370\177\372\177\000\000\344#\300\177\372\177\000\000\272\250"...
option_index = 12
long_options = {{name = 0x834976 "help", has_arg = 0, flag = 0x0, val =
104}, {name = 0x82f4f4 "version", has_arg = 0, flag = 0x0, val = 118}, {name =
0x83497b "alias", has_arg = 1, flag = 0x0, val = 1024}, {name = 0x834981
"subst", has_arg = 1, flag = 0x0, val = 1025}, {name = 0x834987
"substdef", has_arg = 1, flag = 0x0, val = 1026}, {name = 0x834990
"substdefs", has_arg = 1, flag = 0x0, val = 1027}, {
name = 0x83499a "server-id", has_arg = 1, flag = 0x0, val = 1028},
{name = 0x8349a4 "loadmodule", has_arg = 1, flag = 0x0, val = 1029}, {name =
0x8349af "modparam", has_arg = 1, flag = 0x0, val = 1030}, {name = 0x8349b8
"log-engine", has_arg = 1, flag = 0x0, val = 1031}, {name = 0x8349c3
"debug", has_arg = 1, flag = 0x0, val = 1032}, {name = 0x8349c9
"cfg-print", has_arg = 0, flag = 0x0, val = 1033}, {
name = 0x8349d3 "atexit", has_arg = 1, flag = 0x0, val = 1034},
{name = 0x8349da "all-errors", has_arg = 0, flag = 0x0, val = 1035}, {name =
0x0, has_arg = 0, flag = 0x0, val = 0}}
__func__ = "main"
```
#### Log Messages
<!--
Check the syslog file and if there are relevant log messages printed by Kamailio, add them
next, or attach to issue, or provide a link to download them (e.g., to a pastebin site).
-->
```
Sep 14 01:29:32 kamrtc01 /usr/sbin/kamailio[7880]: CRITICAL: <core>
[core/mem/q_malloc.c:519]: qm_free(): BUG: freeing already freed pointer (0x7ffa6eb1ad18),
called from tls: tls_init.c: ser_free(405), first free tls: tls_init.c: ser_free(405) -
ignoring
Sep 14 01:29:32 kamrtc01 kernel: kamailio[7880]: segfault at 203331736cb4 ip
00007ffa7e793cd5 sp 00007ffdf7e37e00 error 4 in libcrypto.so.3.0.7[7ffa7e6ad000+25b000]
Sep 14 01:29:32 kamrtc01 kernel: Code: 00 00 00 00 00 c3 66 66 2e 0f 1f 84 00 00 00 00 00
0f 1f 40 00 f3 0f 1e fa 48 85 ff 74 37 55 48 89 fd 48 8b 7f 08 48 8b 45 00 <ff> 50
40 48 c7 45 08 00 00 00 00 48 8b 7d 00 e8 47 ff ff ff 48 89
Sep 14 01:29:33 kamrtc01 systemd-coredump[7952]: Process 7880 (kamailio) of user 990
dumped core.#012#012Stack trace of thread 7880:#012#0 0x00007ffa7e793cd5 EVP_KDF_CTX_free
(libcrypto.so.3 + 0x193cd5)#012#1 0x00007ffa7eba5734 tls13_hkdf_expand (libssl.so.3 +
0x4b734)#012#2 0x00007ffa7eba5c39 derive_secret_key_and_iv (libssl.so.3 + 0x4bc39)#012#3
0x00007ffa7eba82b5 tls13_change_cipher_state (libssl.so.3 + 0x4e2b5)#012#4
0x00007ffa7ebca63b ossl_statem_server_post_work (libssl.so.3 + 0x7063b)#012#5
0x00007ffa7ebbbb4b state_machine.part.0 (libssl.so.3 + 0x61b4b)#012#6 0x00007ffa7de4b584
tls_accept (tls.so + 0x59584)#012#7 0x00007ffa7de568be tls_h_read_f (tls.so +
0x648be)#012#8 0x00000000006c79bc tcp_read_headers (kamailio + 0x2c79bc)#012#9
0x00000000006cfb94 tcp_read_req (kamailio + 0x2cfb94)#012#10 0x00000000006d4cc3 handle_io
(kamailio + 0x2d4cc3)#012#11 0x00000000006c271d io_wait_loop_epoll (kamailio +
0x2c271d)#012#12 0x00000000006d7a47 tcp_receive_loop (kamailio + 0x2d7a47)#012#13
0x00000000006b7689 tcp_init_children (kamailio + 0x2b7689)#012#14 0x000000000042fae9
main_loop (kamailio + 0x2fae9)#012#15 0x0000000000439969 main (kamailio + 0x39969)#012#16
0x00007ffa7fc3feb0 __libc_start_call_main (libc.so.6 + 0x3feb0)#012#17 0x00007ffa7fc3ff60
__libc_start_main@@GLIBC_2.34 (libc.so.6 + 0x3ff60)#012#18 0x000000000041dc65 _start
(kamailio + 0x1dc65)#012ELF object binary architecture: AMD x86-64
```
--
Reply to this email directly or view it on GitHub:
https://github.com/kamailio/kamailio/issues/3568
You are receiving this because you are subscribed to this thread.
Message ID: <kamailio/kamailio/issues/3568(a)github.com>