[SR-Users] Kamailio suddenly stops

Javier Valencia jv at voiper.es
Mon Dec 28 16:40:53 CET 2020


Hi there!

When I start my webrtc kamailio suddenly stops.

I can see this on syslog:

    Dec 28 16:08:53 webrtc /usr/sbin/kamailio[803]: CRITICAL: <core>
    [core/mem/q_malloc.c:519]: qm_free(): BUG: freeing already freed
    pointer (0x7f55756c2ab8), called from tls: tls_init.c:
    ser_free(323), first free tls: tls_init.c: ser_malloc(293) - ignoring
    Dec 28 16:08:53 webrtc /usr/sbin/kamailio[803]: CRITICAL: <core>
    [core/mem/q_malloc.c:519]: qm_free(): BUG: freeing already freed
    pointer (0x7f55756c3138), called from tls: tls_init.c:
    ser_free(323), first free tls: tls_init.c: ser_malloc(293) - ignoring

    ... omit vervose ...

    Dec 28 16:08:53 webrtc /usr/sbin/kamailio[803]: CRITICAL: <core>
    [core/mem/q_malloc.c:519]: qm_free(): BUG: freeing already freed
    pointer (0x7f55756c1f38), called from tls: tls_init.c:
    ser_free(323), first free tls: tls_init.c: ser_free(323) - ignoring

    ...omit verbose ...

    Dec 28 16:08:53 webrtc /usr/sbin/kamailio[803]: CRITICAL: <core>
    [core/mem/q_malloc.c:519]: qm_free(): BUG: freeing already freed
    pointer (0x7f557569f250), called from tls: tls_init.c:
    ser_free(323), first free tls: tls_init.c: ser_realloc(299) - ignoring
    Dec 28 16:08:53 webrtc /usr/sbin/kamailio[803]: CRITICAL: <core>
    [core/mem/q_malloc.c:519]: qm_free(): BUG: freeing already freed
    pointer (0x7f557565cf60), called from tls: tls_init.c:
    ser_free(323), first free tls: tls_init.c: ser_malloc(293) - ignoring
    Dec 28 16:08:53 webrtc /usr/sbin/kamailio[803]: INFO: <core>
    [core/sctp_core.c:53]: sctp_core_destroy(): SCTP API not initialized

OS info:

    root at webrtc:/etc/kamailio# lsb_release -a
    No LSB modules are available.
    Distributor ID:    Debian
    Description:    Debian GNU/Linux 10 (buster)
    Release:    10
    Codename:    buster

    root at webrtc:/etc/kamailio# free -m
                   total        used        free      shared
    buff/cache   available
    Mem:          16041         134       15551 108         356       15524
    Swap:           974           0         974

Kamailio version:

    version: kamailio 5.4.3 (x86_64/linux)
    flags: USE_TCP, USE_TLS, USE_SCTP, TLS_HOOKS, USE_RAW_SOCKS,
    DISABLE_NAGLE, USE_MCAST, DNS_IP_HACK, SHM_MMAP, PKG_MALLOC,
    Q_MALLOC, F_MALLOC, TLSF_MALLOC, DBG_SR_MEMORY, USE_FUTEX,
    FAST_LOCK-ADAPTIVE_WAIT, USE_DNS_CACHE, USE_DNS_FAILOVER, USE_NAPTR,
    USE_DST_BLACKLIST, HAVE_RESOLV_RES, TLS_PTHREAD_MUTEX_SHARED
    ADAPTIVE_WAIT_LOOPS 1024, MAX_RECV_BUFFER_SIZE 262144, MAX_URI_SIZE
    1024, BUF_SIZE 65535, DEFAULT PKG_SIZE 8MB
    poll method support: poll, epoll_lt, epoll_et, sigio_rt, select.
    id: unknown
    compiled with gcc 8.3.0

Kamailio params:

    SHM_MEMORY=512
    PKG_MEMORY=32

SSL info:

    root at webrtc:/etc/kamailio# apt show openssl
    Package: openssl
    Version: 1.1.1d-0+deb10u4
    Priority: optional
    Section: utils
    Maintainer: Debian OpenSSL Team
    <pkg-openssl-devel at lists.alioth.debian.org>
    Installed-Size: 1.495 kB
    Depends: libc6 (>= 2.15), libssl1.1 (>= 1.1.1)
    Suggests: ca-certificates
    Homepage: https://www.openssl.org/
    Download-Size: 843 kB
    APT-Manual-Installed: no
    APT-Sources: http://security.debian.org/debian-security
    buster/updates/main amd64 Packages
    Description: juego de herramientas Secure Sockets Layer - utilidad
    criptográfica
      Este paquete forma parte de la implementación del proyecto OpenSSL
    de los
      protocolos criptográficos SSL y TLS para la comunicación segura a
    través de
      Internet.
      .
      Contiene el binario de propósito general para la línea de órdenes
      /usr/bin/openssl,
      útil para operaciones criptográficas como:
       * creación de parámetros clave RSA, DH y DSA;
       * creación de certificados X.509, CSR y CRL;
       * calcular resúmenes de mensajes;
       * cifrado y descifrado con cifras;
       * probar clientes y servidores SSL/TLS;
       * gestión de correo firmado o cifrado S/MIME.

Should I use another version of openssl, or maybe use gnutls?

Regards,

Javier Valencia


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.kamailio.org/pipermail/sr-users/attachments/20201228/f83f24d8/attachment.htm>


More information about the sr-users mailing list