Hello there, I'm constantly getting the following message when i'm using module auth_xkeys.
CRITICAL: <core> [core/mem/q_malloc.c:514]: qm_free(): BUG: freeing already freed pointer (0x7f6310987400), called from core: core/data_lump.c: free_lump(466), first free core: core/data_lump.c: free_lump(466) - ignoring
Apparently kamailio only throw this message but i would like to know if its a normal protection from kamailio or it should be fixed?
Thank you for the support
Regards
Am Montag, 3. Dezember 2018, 19:03:36 CET schrieb José Seabra:
I'm constantly getting the following message when i'm using module auth_xkeys.
CRITICAL: <core> [core/mem/q_malloc.c:514]: qm_free(): BUG: freeing already freed pointer (0x7f6310987400), called from core: core/data_lump.c: free_lump(466), first free core: core/data_lump.c: free_lump(466) - ignoring
Apparently kamailio only throw this message but i would like to know if its a normal protection from kamailio or it should be fixed?
Hello Jose,
this is not a normal error, it shows a redundant (double) free which is detected from the internal Kamailio memory manager. This should be fixed.
Can you investigate at which function call from the auth_xkeys module in the kamailio cfg this error is printed?
Best regards,
Henning
Hello Henning,
The function that seems to be causing this is "auth_xkeys_add".
Let me know if do you need something else.
Thank you for the support José
Henning Westerholt hw@kamailio.org escreveu no dia segunda, 3/12/2018 à(s) 21:59:
Am Montag, 3. Dezember 2018, 19:03:36 CET schrieb José Seabra:
I'm constantly getting the following message when i'm using module auth_xkeys.
CRITICAL: <core> [core/mem/q_malloc.c:514]: qm_free(): BUG: freeing already freed pointer (0x7f6310987400), called from core:
core/data_lump.c:
free_lump(466), first free core: core/data_lump.c: free_lump(466) -
ignoring
Apparently kamailio only throw this message but i would like to know if
its
a normal protection from kamailio or it should be fixed?
Hello Jose,
this is not a normal error, it shows a redundant (double) free which is detected from the internal Kamailio memory manager. This should be fixed.
Can you investigate at which function call from the auth_xkeys module in the kamailio cfg this error is printed?
Best regards,
Henning
-- Henning Westerholt - https://skalatan.de/blog/ Kamailio services - https://skalatan.de/services Kamailio security assessment - https://skalatan.de/de/assessment
Hello,
can you try with master branch or with the patch from the next commit?
- https://github.com/kamailio/kamailio/commit/01f5ecbc45c236daea62d6638a02c168...
If all is ok, I will backport.
Cheers, Daniel
On 04.12.18 10:12, José Seabra wrote:
Hello Henning,
The function that seems to be causing this is "auth_xkeys_add".
Let me know if do you need something else.
Thank you for the support José
Henning Westerholt <hw@kamailio.org mailto:hw@kamailio.org> escreveu no dia segunda, 3/12/2018 à(s) 21:59:
Am Montag, 3. Dezember 2018, 19:03:36 CET schrieb José Seabra: > I'm constantly getting the following message when i'm using module > auth_xkeys. > > CRITICAL: <core> [core/mem/q_malloc.c:514]: qm_free(): BUG: freeing > already freed pointer (0x7f6310987400), called from core: core/data_lump.c: > free_lump(466), first free core: core/data_lump.c: free_lump(466) - ignoring > > > Apparently kamailio only throw this message but i would like to know if its > a normal protection from kamailio or it should be fixed? Hello Jose, this is not a normal error, it shows a redundant (double) free which is detected from the internal Kamailio memory manager. This should be fixed. Can you investigate at which function call from the auth_xkeys module in the kamailio cfg this error is printed? Best regards, Henning -- Henning Westerholt - https://skalatan.de/blog/ Kamailio services - https://skalatan.de/services Kamailio security assessment - https://skalatan.de/de/assessment
-- Cumprimentos José Seabra
Kamailio (SER) - Users Mailing List sr-users@lists.kamailio.org https://lists.kamailio.org/cgi-bin/mailman/listinfo/sr-users
Hello Daniel, Thank you for the support.
I confirm that your patch fixes the issue.
Best regards José
Daniel-Constantin Mierla miconda@gmail.com escreveu no dia terça, 4/12/2018 à(s) 10:19:
Hello,
can you try with master branch or with the patch from the next commit?
https://github.com/kamailio/kamailio/commit/01f5ecbc45c236daea62d6638a02c168...
If all is ok, I will backport.
Cheers, Daniel On 04.12.18 10:12, José Seabra wrote:
Hello Henning,
The function that seems to be causing this is "auth_xkeys_add".
Let me know if do you need something else.
Thank you for the support José
Henning Westerholt hw@kamailio.org escreveu no dia segunda, 3/12/2018 à(s) 21:59:
Am Montag, 3. Dezember 2018, 19:03:36 CET schrieb José Seabra:
I'm constantly getting the following message when i'm using module auth_xkeys.
CRITICAL: <core> [core/mem/q_malloc.c:514]: qm_free(): BUG: freeing already freed pointer (0x7f6310987400), called from core:
core/data_lump.c:
free_lump(466), first free core: core/data_lump.c: free_lump(466) -
ignoring
Apparently kamailio only throw this message but i would like to know if
its
a normal protection from kamailio or it should be fixed?
Hello Jose,
this is not a normal error, it shows a redundant (double) free which is detected from the internal Kamailio memory manager. This should be fixed.
Can you investigate at which function call from the auth_xkeys module in the kamailio cfg this error is printed?
Best regards,
Henning
-- Henning Westerholt - https://skalatan.de/blog/ Kamailio services - https://skalatan.de/services Kamailio security assessment - https://skalatan.de/de/assessment
-- Cumprimentos José Seabra
Kamailio (SER) - Users Mailing Listsr-users@lists.kamailio.orghttps://lists.kamailio.org/cgi-bin/mailman/listinfo/sr-users
-- Daniel-Constantin Mierla -- www.asipto.comwww.twitter.com/miconda -- www.linkedin.com/in/miconda Kamailio World Conference -- www.kamailioworld.com Kamailio Advanced Training, Nov 12-14, 2018, in Berlin -- www.asipto.com
Hello,
ok, thanks for testing and reporting back. I will backport these days...
Cheers, Daniel
On 06.12.18 15:26, José Seabra wrote:
Hello Daniel, Thank you for the support.
I confirm that your patch fixes the issue.
Best regards José
Daniel-Constantin Mierla <miconda@gmail.com mailto:miconda@gmail.com> escreveu no dia terça, 4/12/2018 à(s) 10:19:
Hello, can you try with master branch or with the patch from the next commit? - https://github.com/kamailio/kamailio/commit/01f5ecbc45c236daea62d6638a02c168720c8479 If all is ok, I will backport. Cheers, Daniel On 04.12.18 10:12, José Seabra wrote:
Hello Henning, The function that seems to be causing this is "auth_xkeys_add". Let me know if do you need something else. Thank you for the support José Henning Westerholt <hw@kamailio.org <mailto:hw@kamailio.org>> escreveu no dia segunda, 3/12/2018 à(s) 21:59: Am Montag, 3. Dezember 2018, 19:03:36 CET schrieb José Seabra: > I'm constantly getting the following message when i'm using module > auth_xkeys. > > CRITICAL: <core> [core/mem/q_malloc.c:514]: qm_free(): BUG: freeing > already freed pointer (0x7f6310987400), called from core: core/data_lump.c: > free_lump(466), first free core: core/data_lump.c: free_lump(466) - ignoring > > > Apparently kamailio only throw this message but i would like to know if its > a normal protection from kamailio or it should be fixed? Hello Jose, this is not a normal error, it shows a redundant (double) free which is detected from the internal Kamailio memory manager. This should be fixed. Can you investigate at which function call from the auth_xkeys module in the kamailio cfg this error is printed? Best regards, Henning -- Henning Westerholt - https://skalatan.de/blog/ Kamailio services - https://skalatan.de/services Kamailio security assessment - https://skalatan.de/de/assessment -- Cumprimentos José Seabra _______________________________________________ Kamailio (SER) - Users Mailing List sr-users@lists.kamailio.org <mailto:sr-users@lists.kamailio.org> https://lists.kamailio.org/cgi-bin/mailman/listinfo/sr-users
-- Daniel-Constantin Mierla -- www.asipto.com <http://www.asipto.com> www.twitter.com/miconda <http://www.twitter.com/miconda> -- www.linkedin.com/in/miconda <http://www.linkedin.com/in/miconda> Kamailio World Conference -- www.kamailioworld.com <http://www.kamailioworld.com> Kamailio Advanced Training, Nov 12-14, 2018, in Berlin -- www.asipto.com <http://www.asipto.com>
-- Cumprimentos José Seabra