Hi,
I'm seeing similar issue in 3.1.0.. How did we fix it?
The back trace from my test is,
#2 0x0819c66c in qm_free (qm=0x7861c000, p=0x798fa2b0, file=0xb6f0b140 "tls: tls_init.c", func=0xb6f0bce0 "ser_free", line=296) at mem/q_malloc.c:462
*#3 0xb6eec404 in ser_free (ptr=0x798fa2b0) at tls_init.c:296*
*#4 0xb72339ba in CRYPTO_free () from /lib/libcrypto.so.1.0.0*
#5 0xb72a7f64 in ?? () from /lib/libcrypto.so.1.0.0
#6 0xb72a813e in ERR_get_error () from /lib/libcrypto.so.1.0.0
#7 0xb6f0483e in tls_read_f (c=0x797fedb4, flags=0xbfe236d4) at tls_server.c:1187
#8 0x08171e6e in tcp_read_headers (c=0x797fedb4, read_flags=0xbfe236d4) at tcp_read.c:406
I appreciate if we could point the reason the for the double free.
Thanks Jijo
On Wed, Dec 21, 2011 at 3:13 PM, Kristian Kielhofner kris@kriskinc.comwrote:
On Wed, Dec 21, 2011 at 2:56 PM, Daniel-Constantin Mierla miconda@gmail.com wrote:
it has to be at least the message printed by:
LOG(L_CRIT, "BUG: qm_free: freeing already freed pointer," " first free: %s: %s(%ld) - aborting\n", f->file, f->func, f->line);
Can you grep for it in logs?
The abort in frame #1 of bracktrace is triggered on purpose, at mem/q_malloc.c line 458
Cheers, Daniel
-- Daniel-Constantin Mierla -- http://www.asipto.com http://linkedin.com/in/miconda -- http://twitter.com/miconda
Hi Daniel,
I'm very sorry for missing this the first time around. There are over 3GB of logs on this machine already (it's only been up for one day).
I've attached the output of grep -i bug kamailio.log | gzip -c > kamailio-bug.log.gz
Thanks again!
-- Kristian Kielhofner
SIP Express Router (SER) and Kamailio (OpenSER) - sr-users mailing list sr-users@lists.sip-router.org http://lists.sip-router.org/cgi-bin/mailman/listinfo/sr-users