Hi team
I upgraded our lab to 5.6.4 from the official repository for ubuntu Jammy.
Now I get crashes related to TLS:
May 5 14:58:40 dev-cpereg01 kamailio[36147]: CRITICAL: <core> [core/mem/q_malloc.c:519]: qm_free(): BUG: freeing already freed pointer (0x7f4fedbed4e8), called from tls: tls_init.c: ser_free(323), first free tls: tls_init.c: ser_f ree(323) - ignoring May 5 14:58:40 dev-cpereg01 kamailio[36147]: CRITICAL: <core> [core/mem/q_malloc.c:519]: qm_free(): BUG: freeing already freed pointer (0x7f4fedd72b88), called from tls: tls_init.c: ser_free(323), first free tls: tls_init.c: ser_f ree(323) - ignoring May 5 14:58:40 dev-cpereg01 kamailio[36177]: CRITICAL: <core> [core/mem/q_malloc.c:519]: qm_free(): BUG: freeing already freed pointer (0x7f4fedd9e4a0), called from tls: tls_init.c: ser_free(323), first free tls: tls_init.c: ser_f ree(323) - ignoring May 5 14:58:40 dev-cpereg01 kamailio[36157]: CRITICAL: <core> [core/mem/q_malloc.c:519]: qm_free(): BUG: freeing already freed pointer (0x7f4fedd9e428), called from tls: tls_init.c: ser_free(323), first free tls: tls_init.c: ser_f ree(323) - ignoring
And a bit later on:
May 5 14:58:46 dev-cpereg01 kamailio[36179]: CRITICAL: <core> [core/pass_fd.c:277]: receive_fd(): EOF on 34 May 5 14:58:46 dev-cpereg01 kamailio[36143]: ALERT: <core> [main.c:774]: handle_sigs(): child process 36161 exited by a signal 11 May 5 14:58:46 dev-cpereg01 kamailio[36143]: ALERT: <core> [main.c:777]: handle_sigs(): core was generated May 5 14:58:46 dev-cpereg01 kamailio[36143]: INFO: <core> [main.c:799]: handle_sigs(): terminating due to SIGCHLD
Has there been a fundamental change in TLS? Or did I miss something important to do on a 5.5 => 5.6 upgrade?
Hello,
in case Kamailio is linked with OpenSSL 3.0 it will fail. Linking with Openssl 1.1.1 works.
Дилян
На 2023-05-05 17:01, Benoît Panizzon написа:
Hi team
I upgraded our lab to 5.6.4 from the official repository for ubuntu Jammy.
Now I get crashes related to TLS:
May 5 14:58:40 dev-cpereg01 kamailio[36147]: CRITICAL: <core> [core/mem/q_malloc.c:519]: qm_free(): BUG: freeing already freed pointer (0x7f4fedbed4e8), called from tls: tls_init.c: ser_free(323), first free tls: tls_init.c: ser_f ree(323) - ignoring May 5 14:58:40 dev-cpereg01 kamailio[36147]: CRITICAL: <core> [core/mem/q_malloc.c:519]: qm_free(): BUG: freeing already freed pointer (0x7f4fedd72b88), called from tls: tls_init.c: ser_free(323), first free tls: tls_init.c: ser_f ree(323) - ignoring May 5 14:58:40 dev-cpereg01 kamailio[36177]: CRITICAL: <core> [core/mem/q_malloc.c:519]: qm_free(): BUG: freeing already freed pointer (0x7f4fedd9e4a0), called from tls: tls_init.c: ser_free(323), first free tls: tls_init.c: ser_f ree(323) - ignoring May 5 14:58:40 dev-cpereg01 kamailio[36157]: CRITICAL: <core> [core/mem/q_malloc.c:519]: qm_free(): BUG: freeing already freed pointer (0x7f4fedd9e428), called from tls: tls_init.c: ser_free(323), first free tls: tls_init.c: ser_f ree(323) - ignoring
And a bit later on:
May 5 14:58:46 dev-cpereg01 kamailio[36179]: CRITICAL: <core> [core/pass_fd.c:277]: receive_fd(): EOF on 34 May 5 14:58:46 dev-cpereg01 kamailio[36143]: ALERT: <core> [main.c:774]: handle_sigs(): child process 36161 exited by a signal 11 May 5 14:58:46 dev-cpereg01 kamailio[36143]: ALERT: <core> [main.c:777]: handle_sigs(): core was generated May 5 14:58:46 dev-cpereg01 kamailio[36143]: INFO: <core> [main.c:799]: handle_sigs(): terminating due to SIGCHLD
Has there been a fundamental change in TLS? Or did I miss something important to do on a 5.5 => 5.6 upgrade?
-- Mit freundlichen Grüssen
-Benoît Panizzon- @ HomeOffice und normal erreichbar
Hi Дилян
in case Kamailio is linked with OpenSSL 3.0 it will fail. Linking with Openssl 1.1.1 works.
Version: 5.6.4+ubuntu22.04 Architecture: amd64 Maintainer: Kamailio Admin Group kadmin.hq@lists.kamailio.org Installed-Size: 1072 Depends: kamailio (= 5.6.4+ubuntu22.04), libc6 (>= 2.34), libcurl4 (>= 7.16.2), libssl3 (>= 3.0.0~~alpha1)
# ldd /usr/lib/x86_64-linux-gnu/kamailio/modules/tls.so linux-vdso.so.1 (0x00007ffdf0517000) libssl.so.3 => /lib/x86_64-linux-gnu/libssl.so.3 (0x00007fbc5f86f000) libcrypto.so.3 => /lib/x86_64-linux-gnu/libcrypto.so.3 (0x00007fbc5f42c000)
So am I guessing right, that the Ubuntu Jammy package from kamailio.org is linked against OpenSSL 3.0.0 causing those crashes?
Mit freundlichen Grüssen
-Benoît Panizzon-
Hello,
On 08.05.23 09:27, Benoit Panizzon wrote:
Hi Дилян
in case Kamailio is linked with OpenSSL 3.0 it will fail. Linking with Openssl 1.1.1 works.
Version: 5.6.4+ubuntu22.04 Architecture: amd64 Maintainer: Kamailio Admin Group kadmin.hq@lists.kamailio.org Installed-Size: 1072 Depends: kamailio (= 5.6.4+ubuntu22.04), libc6 (>= 2.34), libcurl4 (>= 7.16.2), libssl3 (>= 3.0.0~~alpha1)
# ldd /usr/lib/x86_64-linux-gnu/kamailio/modules/tls.so linux-vdso.so.1 (0x00007ffdf0517000) libssl.so.3 => /lib/x86_64-linux-gnu/libssl.so.3 (0x00007fbc5f86f000) libcrypto.so.3 => /lib/x86_64-linux-gnu/libcrypto.so.3 (0x00007fbc5f42c000)
So am I guessing right, that the Ubuntu Jammy package from kamailio.org is linked against OpenSSL 3.0.0 causing those crashes?
indeed, support for openssl 3.0 is not fully tested and while it compiles with some warnings, there were reports of issues with it.
But I wanted to check if you started with --atexit=no cli param, because your error messages seemed linked to start up time.
Cheers, Daniel
Hi Daniel
But I wanted to check if you started with --atexit=no cli param, because your error messages seemed linked to start up time.
Yes, --atexit=no parameter is set in the systemd file. Shall I try without?
Mit freundlichen Grüssen
-Benoît Panizzon-
Hello!
It was mentioned in this issue: https://github.com/kamailio/kamailio/issues/3222#issuecomment-1222104843
Seems no significant changes till than. (I'm also using tlsa with 1.1.1 version)
Le lun. 8 mai 2023 à 10:09, Benoit Panizzon benoit.panizzon@imp.ch a écrit :
Hi Дилян
in case Kamailio is linked with OpenSSL 3.0 it will fail. Linking with Openssl 1.1.1 works.
Version: 5.6.4+ubuntu22.04 Architecture: amd64 Maintainer: Kamailio Admin Group kadmin.hq@lists.kamailio.org Installed-Size: 1072 Depends: kamailio (= 5.6.4+ubuntu22.04), libc6 (>= 2.34), libcurl4 (>= 7.16.2), libssl3 (>= 3.0.0~~alpha1)
# ldd /usr/lib/x86_64-linux-gnu/kamailio/modules/tls.so linux-vdso.so.1 (0x00007ffdf0517000) libssl.so.3 => /lib/x86_64-linux-gnu/libssl.so.3 (0x00007fbc5f86f000) libcrypto.so.3 => /lib/x86_64-linux-gnu/libcrypto.so.3 (0x00007fbc5f42c000)
So am I guessing right, that the Ubuntu Jammy package from kamailio.org is linked against OpenSSL 3.0.0 causing those crashes?
Mit freundlichen Grüssen
-Benoît Panizzon-
I m p r o W a r e A G - Leiter Commerce Kunden ______________________________________________________
Zurlindenstrasse 29 Tel +41 61 826 93 00 CH-4133 Pratteln Fax +41 61 826 93 01 Schweiz Web http://www.imp.ch ______________________________________________________ __________________________________________________________ Kamailio - Users Mailing List - Non Commercial Discussions To unsubscribe send an email to sr-users-leave@lists.kamailio.org Important: keep the mailing list in the recipients, do not reply only to the sender! Edit mailing list options or unsubscribe: