Hi,
I'm seeing similar issue in 3.1.0.. How did we fix it?
The back trace from my test is,
#2 0x0819c66c in qm_free (qm=0x7861c000, p=0x798fa2b0, file=0xb6f0b140
"tls: tls_init.c", func=0xb6f0bce0 "ser_free", line=296) at
mem/q_malloc.c:462
*#3 0xb6eec404 in ser_free (ptr=0x798fa2b0) at tls_init.c:296*
*#4 0xb72339ba in CRYPTO_free () from /lib/libcrypto.so.1.0.0*
#5 0xb72a7f64 in ?? () from /lib/libcrypto.so.1.0.0
#6 0xb72a813e in ERR_get_error () from /lib/libcrypto.so.1.0.0
#7 0xb6f0483e in tls_read_f (c=0x797fedb4, flags=0xbfe236d4) at
tls_server.c:1187
#8 0x08171e6e in tcp_read_headers (c=0x797fedb4, read_flags=0xbfe236d4) at
tcp_read.c:406
I appreciate if we could point the reason the for the double free.
Thanks
Jijo
On Wed, Dec 21, 2011 at 3:13 PM, Kristian Kielhofner <kris(a)kriskinc.com>wrote;wrote:
On Wed, Dec 21, 2011 at 2:56 PM, Daniel-Constantin
Mierla
<miconda(a)gmail.com> wrote:
it has to be at least the message printed by:
LOG(L_CRIT, "BUG: qm_free: freeing already freed pointer,"
" first free: %s: %s(%ld) - aborting\n",
f->file, f->func, f->line);
Can you grep for it in logs?
The abort in frame #1 of bracktrace is triggered on purpose, at
mem/q_malloc.c line 458
Cheers,
Daniel
--
Daniel-Constantin Mierla --
http://www.asipto.com
http://linkedin.com/in/miconda --
http://twitter.com/miconda
Hi Daniel,
I'm very sorry for missing this the first time around. There are
over 3GB of logs on this machine already (it's only been up for one
day).
I've attached the output of grep -i bug kamailio.log | gzip -c >
kamailio-bug.log.gz
Thanks again!
--
Kristian Kielhofner
_______________________________________________
SIP Express Router (SER) and Kamailio (OpenSER) - sr-users mailing list
sr-users(a)lists.sip-router.org
http://lists.sip-router.org/cgi-bin/mailman/listinfo/sr-users