[Serdev] [BUG] Updated: (SER-99) crash when retreiving @tls.peer.verified

Jan Janak (JIRA) serdev at lists.iptel.org
Tue Apr 11 15:47:00 UTC 2006


     [ http://bugs.sip-router.org/browse/SER-99?page=history ]

Jan Janak updated SER-99:
-------------------------

    Attachment: coreAndBinaries.tgz

> crash when  retreiving @tls.peer.verified
> -----------------------------------------
>
>          Key: SER-99
>          URL: http://bugs.sip-router.org/browse/SER-99
>      Project: SIP Express Router
>         Type: Bug
>     Versions: HEAD
>  Environment: debian 3.1+openssl 0.9.8a-6 x86
>     Reporter: Klaus Darilion
>     Assignee: Jan Janak
>  Attachments: coreAndBinaries.tgz
>
> Hi!
> ser crashes when retrieving @tls.peer.verified:
> ser.cfg snippet:
> xlog("L_ERR","@tls.peer.subject              %@tls.peer.subject               same as @tls.peer\n");
> xlog("L_ERR","@tls.peer.issuer               %@tls.peer.issuer                Peer certificate issuer common name\n");
> xlog("L_ERR","@tls.peer.verified             %@tls.peer.verified              True if peer cert has been verified\n");
> Feb 27 21:35:00 server2 ser[10779]: Calling SELECT 0x813c368
> Feb 27 21:35:00 server2 ser[10779]: qm_malloc(0x4039c000, 22) called from tls_init.c: ser_malloc(82)
> Feb 27 21:35:00 server2 ser[10779]: qm_malloc(0x4039c000, 24) returns address 0x4069e308 frag. 0x4069e2f0 (size=32) on 1 -th hit
> Feb 27 21:35:00 server2 ser[10779]: qm_free(0x4039c000, 0x4069e308), called from tls_init.c: ser_free(94)
> Feb 27 21:35:00 server2 ser[10779]: qm_free: freeing frag. 0x4069e2f0 alloc'ed from tls_init.c: ser_malloc(82)
> Feb 27 21:35:00 server2 ser[10779]: XLOG: xl_print_log: final buffer length 85
> Feb 27 21:35:00 server2 ser[10779]: @tls.peer.subject              bp1.ienum.labs.nic.at               same as @tls.peer
> Feb 27 21:35:00 server2 ser[10779]: Calling SELECT 0x813c52c
> Feb 27 21:35:00 server2 ser[10779]: qm_malloc(0x4039c000, 14) called from tls_init.c: ser_malloc(82)
> Feb 27 21:35:00 server2 ser[10779]: qm_malloc(0x4039c000, 16) returns address 0x406a7470 frag. 0x406a7458 (size=16) on 1 -th hit
> Feb 27 21:35:00 server2 ser[10779]: qm_free(0x4039c000, 0x406a7470), called from tls_init.c: ser_free(94)
> Feb 27 21:35:00 server2 ser[10779]: qm_free: freeing frag. 0x406a7458 alloc'ed from tls_init.c: ser_malloc(82)
> Feb 27 21:35:00 server2 ser[10779]: XLOG: xl_print_log: final buffer length 96
> Feb 27 21:35:00 server2 ser[10779]: @tls.peer.issuer               Hirtlutsch CA                Peer certificate issuer common name
> Feb 27 21:35:00 server2 ser[10779]: Calling SELECT 0x813c6f0
> Feb 27 21:35:01 server2 ser[10787]: ERROR: receive_fd: EOF on 20                                               
> Feb 27 21:35:01 server2 ser[10787]: DBG: handle_ser_child: dead child 11, pid 10779 (shutting down?)           
> Feb 27 21:35:01 server2 ser[10787]: DBG: io_watch_del (0x80e25a0, 20, -1, 0x0) fd_no=28 called                 
> Feb 27 21:35:01 server2 ser[10787]: DBG: handle_tcp_child: dead tcp child 0 (pid 10779, no 11) (shutting down?)
> Feb 27 21:35:01 server2 ser[10787]: DBG: io_watch_del (0x80e25a0, 22, -1, 0x0) fd_no=27 called                 
> Feb 27 21:35:01 server2 ser[10768]: child process 10779 exited by a signal 11                                  
> Feb 27 21:35:01 server2 ser[10768]: core was generated                                                         
> Feb 27 21:35:01 server2 ser[10768]: INFO: terminating due to SIGCHLD                                           
> Feb 27 21:35:01 server2 ser[10778]: INFO: signal 15 received                                                   
> back trace:
> (gdb) bt
> #0  0x40345aae in ?? ()
> #1  0x0814d25c in mem_pool ()
> #2  0xbffff5d0 in ?? ()
> #3  0x0812f6d4 in mem_pool ()
> #4  0x00000000 in ?? ()
> #5  0x00000000 in ?? ()
> #6  0x0000001b in ?? ()
> #7  0x00000001 in ?? ()
> #8  0x0000006a in ?? ()
> #9  0x00000001 in ?? ()
> #10 0x00000039 in ?? ()
> #11 0xbffff5d0 in ?? ()
> #12 0x00000e10 in ?? ()
> #13 0x0813ac43 in mem_pool ()
> #14 0x0812f6cc in mem_pool ()
> #15 0x00000000 in ?? ()
> #16 0x0000001f in ?? ()
> #17 0x080d3274 in debug ()
> #18 0xbffff5e8 in ?? ()
> #19 0x4027405f in syslog () from /lib/tls/libc.so.6
> #20 0x403496dd in ?? ()
> #21 0x0814d25c in mem_pool ()
> #22 0x0812f6cc in mem_pool ()
> #23 0x0813ac24 in mem_pool ()
> #24 0xbffff608 in ?? ()
> #25 0x00015a70 in ?? ()
> #26 0x0805ecf0 in sig_alarm_abort () at main.c:458
> #27 0x08050588 in do_action (a=0x812f660, msg=0x814d25c) at action.c:646
> #28 0x0805225f in run_actions (a=0x812dd88, msg=0x814d25c) at action.c:883
> #29 0x0806b9d4 in receive_msg (
>     buf=0x4068a51c "INVITE sip:+43101 at bp22.ienum.labs.nic.at;transport=tls SIP/2.0\r\nRecord-Route: <sip:10.10.0.42:5063;transport=tls;r2=on;ftag=cd566171;lr=on>\r\nRecord-Route: <sip:10.10.0.42:5062;r2=on;ftag=cd566171;lr=o"..., len=1275, rcv_info=0x4068a4b8) at receive.c:165
> #30 0x08082198 in tcp_read_req (con=0x4068a4a8, bytes_read=0xbffff900) at tcp_read.c:510
> #31 0x080826e7 in handle_io (fm=0xbffff900, idx=0) at tcp_read.c:783
> #32 0x08083fcc in io_wait_loop_epoll (h=0x80e2880, t=0, repeat=0) at io_wait.h:727
> #33 0x08082d40 in tcp_receive_loop (unix_sock=0) at tcp_read.c:889
> #34 0x0807dc19 in tcp_init_children () at tcp_main.c:2041
> #35 0x0805d860 in main_loop () at main.c:1103
> #36 0x0805e7eb in main (argc=1077740556, argv=0x40595118) at main.c:1633
> regards
> klaus
>                                                                                                             

-- 
This message is automatically generated by JIRA.
-
If you think it was sent incorrectly contact one of the administrators:
   http://bugs.sip-router.org/secure/Administrators.jspa
-
If you want more information on JIRA, or have a bug to report see:
   http://www.atlassian.com/software/jira




More information about the Serdev mailing list