Hi,

I'm seeing similar issue in 3.1.0.. How did we fix it?

The back trace from my test is,

#2  0x0819c66c in qm_free (qm=0x7861c000, p=0x798fa2b0, file=0xb6f0b140 "tls: tls_init.c", func=0xb6f0bce0 "ser_free", line=296) at mem/q_malloc.c:462

#3  0xb6eec404 in ser_free (ptr=0x798fa2b0) at tls_init.c:296

#4  0xb72339ba in CRYPTO_free () from /lib/libcrypto.so.1.0.0

#5  0xb72a7f64 in ?? () from /lib/libcrypto.so.1.0.0

#6  0xb72a813e in ERR_get_error () from /lib/libcrypto.so.1.0.0

#7  0xb6f0483e in tls_read_f (c=0x797fedb4, flags=0xbfe236d4) at tls_server.c:1187

#8  0x08171e6e in tcp_read_headers (c=0x797fedb4, read_flags=0xbfe236d4) at tcp_read.c:406


I appreciate if we could point the reason the for the double free.

Thanks
Jijo

On Wed, Dec 21, 2011 at 3:13 PM, Kristian Kielhofner <kris@kriskinc.com> wrote:
On Wed, Dec 21, 2011 at 2:56 PM, Daniel-Constantin Mierla
<miconda@gmail.com> wrote:
>
> it has to be at least the message printed by:
>
>        LOG(L_CRIT, "BUG: qm_free: freeing already freed pointer,"
>                " first free: %s: %s(%ld) - aborting\n",
>                f->file, f->func, f->line);
>
> Can you grep for it in logs?
>
> The abort in frame #1 of bracktrace is triggered on purpose, at
> mem/q_malloc.c line 458
>
> Cheers,
> Daniel
>
> --
> Daniel-Constantin Mierla -- http://www.asipto.com
> http://linkedin.com/in/miconda -- http://twitter.com/miconda
>

Hi Daniel,

 I'm very sorry for missing this the first time around.  There are
over 3GB of logs on this machine already (it's only been up for one
day).

 I've attached the output of grep -i bug kamailio.log | gzip -c >
kamailio-bug.log.gz

Thanks again!

--
Kristian Kielhofner

_______________________________________________
SIP Express Router (SER) and Kamailio (OpenSER) - sr-users mailing list
sr-users@lists.sip-router.org
http://lists.sip-router.org/cgi-bin/mailman/listinfo/sr-users