[SR-Users] Kamailio 5.5 TLS critical log in Debian 11
miconda at gmail.com
Fri Mar 11 11:14:28 CET 2022
that function is used inside the libssl, looks like the version in OS
has some double free somewhere -- it could be also in other libs (needed
by kamailio modules) that uses libssl, like libcurl via http client modules.
Double frees are safe for kamailio, but behind can be another issue that
leads to it and that can have unexpected side effects. So it is not a
simple answer here. Maybe you can try with other libssl version or try
to unload kamailio modules that might use libssl independently of tls
On 10.03.22 02:24, mayamatakeshi wrote:
> I'm testing with this kamailio version:
> $ kamcmd version
> kamailio 5.5.4 (x86_64/linux) 54c9df
> $ cat /etc/issue
> Debian GNU/Linux 11 \n \l
> $ openssl version
> OpenSSL 1.1.1k 25 Mar 2021
> Whenever I start kamailio I get 3199 log lines like this:
> 2022-03-10T10:04:39.700676+09:00 lab002201-flip-server
> /usr/local/src/git/kamailio-5.5/src/kamailio: CRITICAL: <core>
> [core/mem/q_malloc.c:519]: qm_free(): BUG: freeing already freed
> pointer (0x7f8eb57f7848), called from tls: tls_init.c: ser_free(323),
> first free tls: tls_init.c: ser_free(323) - ignoring
> I searched the issues at github and found:
> So I tried to start kamailio with
> but those logs remain.
> With and without using --atexit=no there is no crash and all my tests
> are OK.
> But should I be worried to put this in production?
> Kamailio - Users Mailing List - Non Commercial Discussions
> * sr-users at lists.kamailio.org
> Important: keep the mailing list in the recipients, do not reply only to the sender!
> Edit mailing list options or unsubscribe:
> * https://lists.kamailio.org/cgi-bin/mailman/listinfo/sr-users
Daniel-Constantin Mierla -- www.asipto.com
www.twitter.com/miconda -- www.linkedin.com/in/miconda
Kamailio Advanced Training - Online
March 28-31, 2022 (Europe Timezone)
More information about the sr-users