[Serdev] [BUG] Updated: (SER-99) crash when retreiving
@tls.peer.verified
Jan Janak (JIRA)
serdev at lists.iptel.org
Tue Apr 11 15:47:00 UTC 2006
[ http://bugs.sip-router.org/browse/SER-99?page=history ]
Jan Janak updated SER-99:
-------------------------
Attachment: coreAndBinaries.tgz
> crash when retreiving @tls.peer.verified
> -----------------------------------------
>
> Key: SER-99
> URL: http://bugs.sip-router.org/browse/SER-99
> Project: SIP Express Router
> Type: Bug
> Versions: HEAD
> Environment: debian 3.1+openssl 0.9.8a-6 x86
> Reporter: Klaus Darilion
> Assignee: Jan Janak
> Attachments: coreAndBinaries.tgz
>
> Hi!
> ser crashes when retrieving @tls.peer.verified:
> ser.cfg snippet:
> xlog("L_ERR","@tls.peer.subject %@tls.peer.subject same as @tls.peer\n");
> xlog("L_ERR","@tls.peer.issuer %@tls.peer.issuer Peer certificate issuer common name\n");
> xlog("L_ERR","@tls.peer.verified %@tls.peer.verified True if peer cert has been verified\n");
> Feb 27 21:35:00 server2 ser[10779]: Calling SELECT 0x813c368
> Feb 27 21:35:00 server2 ser[10779]: qm_malloc(0x4039c000, 22) called from tls_init.c: ser_malloc(82)
> Feb 27 21:35:00 server2 ser[10779]: qm_malloc(0x4039c000, 24) returns address 0x4069e308 frag. 0x4069e2f0 (size=32) on 1 -th hit
> Feb 27 21:35:00 server2 ser[10779]: qm_free(0x4039c000, 0x4069e308), called from tls_init.c: ser_free(94)
> Feb 27 21:35:00 server2 ser[10779]: qm_free: freeing frag. 0x4069e2f0 alloc'ed from tls_init.c: ser_malloc(82)
> Feb 27 21:35:00 server2 ser[10779]: XLOG: xl_print_log: final buffer length 85
> Feb 27 21:35:00 server2 ser[10779]: @tls.peer.subject bp1.ienum.labs.nic.at same as @tls.peer
> Feb 27 21:35:00 server2 ser[10779]: Calling SELECT 0x813c52c
> Feb 27 21:35:00 server2 ser[10779]: qm_malloc(0x4039c000, 14) called from tls_init.c: ser_malloc(82)
> Feb 27 21:35:00 server2 ser[10779]: qm_malloc(0x4039c000, 16) returns address 0x406a7470 frag. 0x406a7458 (size=16) on 1 -th hit
> Feb 27 21:35:00 server2 ser[10779]: qm_free(0x4039c000, 0x406a7470), called from tls_init.c: ser_free(94)
> Feb 27 21:35:00 server2 ser[10779]: qm_free: freeing frag. 0x406a7458 alloc'ed from tls_init.c: ser_malloc(82)
> Feb 27 21:35:00 server2 ser[10779]: XLOG: xl_print_log: final buffer length 96
> Feb 27 21:35:00 server2 ser[10779]: @tls.peer.issuer Hirtlutsch CA Peer certificate issuer common name
> Feb 27 21:35:00 server2 ser[10779]: Calling SELECT 0x813c6f0
> Feb 27 21:35:01 server2 ser[10787]: ERROR: receive_fd: EOF on 20
> Feb 27 21:35:01 server2 ser[10787]: DBG: handle_ser_child: dead child 11, pid 10779 (shutting down?)
> Feb 27 21:35:01 server2 ser[10787]: DBG: io_watch_del (0x80e25a0, 20, -1, 0x0) fd_no=28 called
> Feb 27 21:35:01 server2 ser[10787]: DBG: handle_tcp_child: dead tcp child 0 (pid 10779, no 11) (shutting down?)
> Feb 27 21:35:01 server2 ser[10787]: DBG: io_watch_del (0x80e25a0, 22, -1, 0x0) fd_no=27 called
> Feb 27 21:35:01 server2 ser[10768]: child process 10779 exited by a signal 11
> Feb 27 21:35:01 server2 ser[10768]: core was generated
> Feb 27 21:35:01 server2 ser[10768]: INFO: terminating due to SIGCHLD
> Feb 27 21:35:01 server2 ser[10778]: INFO: signal 15 received
> back trace:
> (gdb) bt
> #0 0x40345aae in ?? ()
> #1 0x0814d25c in mem_pool ()
> #2 0xbffff5d0 in ?? ()
> #3 0x0812f6d4 in mem_pool ()
> #4 0x00000000 in ?? ()
> #5 0x00000000 in ?? ()
> #6 0x0000001b in ?? ()
> #7 0x00000001 in ?? ()
> #8 0x0000006a in ?? ()
> #9 0x00000001 in ?? ()
> #10 0x00000039 in ?? ()
> #11 0xbffff5d0 in ?? ()
> #12 0x00000e10 in ?? ()
> #13 0x0813ac43 in mem_pool ()
> #14 0x0812f6cc in mem_pool ()
> #15 0x00000000 in ?? ()
> #16 0x0000001f in ?? ()
> #17 0x080d3274 in debug ()
> #18 0xbffff5e8 in ?? ()
> #19 0x4027405f in syslog () from /lib/tls/libc.so.6
> #20 0x403496dd in ?? ()
> #21 0x0814d25c in mem_pool ()
> #22 0x0812f6cc in mem_pool ()
> #23 0x0813ac24 in mem_pool ()
> #24 0xbffff608 in ?? ()
> #25 0x00015a70 in ?? ()
> #26 0x0805ecf0 in sig_alarm_abort () at main.c:458
> #27 0x08050588 in do_action (a=0x812f660, msg=0x814d25c) at action.c:646
> #28 0x0805225f in run_actions (a=0x812dd88, msg=0x814d25c) at action.c:883
> #29 0x0806b9d4 in receive_msg (
> buf=0x4068a51c "INVITE sip:+43101 at bp22.ienum.labs.nic.at;transport=tls SIP/2.0\r\nRecord-Route: <sip:10.10.0.42:5063;transport=tls;r2=on;ftag=cd566171;lr=on>\r\nRecord-Route: <sip:10.10.0.42:5062;r2=on;ftag=cd566171;lr=o"..., len=1275, rcv_info=0x4068a4b8) at receive.c:165
> #30 0x08082198 in tcp_read_req (con=0x4068a4a8, bytes_read=0xbffff900) at tcp_read.c:510
> #31 0x080826e7 in handle_io (fm=0xbffff900, idx=0) at tcp_read.c:783
> #32 0x08083fcc in io_wait_loop_epoll (h=0x80e2880, t=0, repeat=0) at io_wait.h:727
> #33 0x08082d40 in tcp_receive_loop (unix_sock=0) at tcp_read.c:889
> #34 0x0807dc19 in tcp_init_children () at tcp_main.c:2041
> #35 0x0805d860 in main_loop () at main.c:1103
> #36 0x0805e7eb in main (argc=1077740556, argv=0x40595118) at main.c:1633
> regards
> klaus
>
--
This message is automatically generated by JIRA.
-
If you think it was sent incorrectly contact one of the administrators:
http://bugs.sip-router.org/secure/Administrators.jspa
-
If you want more information on JIRA, or have a bug to report see:
http://www.atlassian.com/software/jira
More information about the Serdev
mailing list