Dear All<br>I have setup Kamailio 3.1.5 with TLS enabled.<br>Whenever I receive the REGISTER request from endpoint, trying to forward to next proxy.<br>For that I have added below code in kamailio.cfg<br><br><i><b> if(is_method("REGISTER"))<br>
{<br> t_relay_to("tls:<a href="http://115.114.48.75:5061">115.114.48.75:5061</a>");<br> exit();<br> }<br><br></b></i>I see once REGISTER received at Kamailio proxy, it is sending TCP synch packet to next proxy, next proxy sends back a synch+reset packet.<br>
Then kamailio proxy is crashing with log as below.<br><br><i style="color:rgb(204,0,0)">root@B2BUA:/usr/local/src/scripts# 9(2347) ERROR: <core> [tcp_main.c:4139]: connect <a href="http://115.114.48.75:5061">115.114.48.75:5061</a> failed <br>
9(2347) : <core> [mem/q_malloc.c:431]: BUG: qm_free: bad pointer (nil) (out of memory block!) - aborting<br></i><br>The complete log is given as below. Please let me know how to get out of this issue. I used -m 64 option while starting proxy, but same result.<br>
Thanks, Kamal, NECS, Bangalore<br><i style="color:rgb(204,0,0)"><br> 0(2336) INFO: <core> [tcp_main.c:4730]: init_tcp: using epoll_et io watch method (config)<br> 0(2338) INFO: usrloc [hslot.c:53]: locks array size 512<br>
0(2338) INFO: tls [tls_init.c:511]: tls: _init_tls_h: compiled with openssl version "OpenSSL 1.0.1c 10 May 2012" (0x1000103f), kerberos support: off, compression: on<br> 0(2338) INFO: tls [tls_init.c:519]: tls: init_tls_h: installed openssl library version "OpenSSL 1.0.1c 10 May 2012" (0x1000103f), kerberos support: off, zlib compression: off<br>
compiler: gcc -DOPENSSL_THREADS -D_REENTRANT -DDSO_DLFCN -DHAVE_DLFCN_H -Wa,--noexecstack -DL_ENDIAN -DTERMIO -O3 -fomit-frame-pointer -Wall -DOPENSSL_BN_ASM_PART_WORDS -DOPENSSL_IA32_SSE2 -DOPENSSL_BN_ASM_MONT -DOPENSSL_BN_ASM_GF2m -DSHA1_ASM -DSHA256_ASM -DSHA512_ASM -DMD5_ASM -DRMD160_ASM -DAES_ASM -DVPAES_ASM -DWHIRLPOOL_ASM -DGHASH_ASM<br>
0(2338) INFO: tls [tls_init.c:373]: tls: init_tls: disabling compression...<br> 0(2338) WARNING: tls [tls_init.c:587]: tls: openssl bug #1491 (crash/mem leaks on low memory) workaround enabled (on low memory tls operations will fail preemptively) with free memory thresholds 5242880 and 2621440 bytes<br>
0(2338) INFO: <core> [cfg/cfg_ctx.c:411]: INFO: cfg_set_now(): tls.low_mem_threshold1 has been changed to 5242880<br> 0(2338) INFO: <core> [cfg/cfg_ctx.c:411]: INFO: cfg_set_now(): tls.low_mem_threshold2 has been changed to 2621440<br>
0(2338) INFO: <core> [udp_server.c:184]: INFO: udp_init: SO_RCVBUF is initially 112640<br> 0(2338) INFO: <core> [udp_server.c:235]: INFO: udp_init: SO_RCVBUF is finally 262142<br> 0(2338) INFO: <core> [udp_server.c:184]: INFO: udp_init: SO_RCVBUF is initially 112640<br>
0(2338) INFO: <core> [udp_server.c:235]: INFO: udp_init: SO_RCVBUF is finally 262142<br> 0(2338) INFO: rtpproxy [rtpproxy.c:1403]: rtp proxy <udp:<a href="http://127.0.0.1:7729">127.0.0.1:7729</a>> found, support for it enabled<br>
0(2338) INFO: tls [tls_domain.c:176]: TLSs<default>: tls_method=9<br> 0(2338) INFO: tls [tls_domain.c:188]: TLSs<default>: certificate='/etc/certs/<a href="http://pocserver.com/cert.pem">pocserver.com/cert.pem</a>'<br>
0(2338) INFO: tls [tls_domain.c:195]: TLSs<default>: ca_list='(null)'<br> 0(2338) INFO: tls [tls_domain.c:202]: TLSs<default>: crl='(null)'<br> 0(2338) INFO: tls [tls_domain.c:206]: TLSs<default>: require_certificate=0<br>
0(2338) INFO: tls [tls_domain.c:213]: TLSs<default>: cipher_list='(null)'<br> 0(2338) INFO: tls [tls_domain.c:220]: TLSs<default>: private_key='/etc/certs/<a href="http://pocserver.com/key.pem">pocserver.com/key.pem</a>'<br>
0(2338) INFO: tls [tls_domain.c:224]: TLSs<default>: verify_certificate=0<br> 0(2338) INFO: tls [tls_domain.c:227]: TLSs<default>: verify_depth=9<br> 0(2338) INFO: tls [tls_domain.c:544]: TLSs<default>: No client certificate required and no checks performed<br>
0(2338) INFO: tls [tls_domain.c:176]: TLSc<default>: tls_method=9<br> 0(2338) INFO: tls [tls_domain.c:188]: TLSc<default>: certificate='(null)'<br> 0(2338) INFO: tls [tls_domain.c:195]: TLSc<default>: ca_list='(null)'<br>
0(2338) INFO: tls [tls_domain.c:202]: TLSc<default>: crl='(null)'<br> 0(2338) INFO: tls [tls_domain.c:206]: TLSc<default>: require_certificate=1<br> 0(2338) INFO: tls [tls_domain.c:213]: TLSc<default>: cipher_list='(null)'<br>
0(2338) INFO: tls [tls_domain.c:220]: TLSc<default>: private_key='(null)'<br> 0(2338) INFO: tls [tls_domain.c:224]: TLSc<default>: verify_certificate=1<br> 0(2338) INFO: tls [tls_domain.c:227]: TLSc<default>: verify_depth=9<br>
0(2338) INFO: tls [tls_domain.c:529]: TLSc<default>: Server MUST present valid certificate<br> 2(2340) INFO: rtpproxy [rtpproxy.c:1403]: rtp proxy <udp:<a href="http://127.0.0.1:7729">127.0.0.1:7729</a>> found, support for it enabled<br>
1(2339) INFO: rtpproxy [rtpproxy.c:1403]: rtp proxy <udp:<a href="http://127.0.0.1:7729">127.0.0.1:7729</a>> found, support for it enabled<br> 4(2342) INFO: rtpproxy [rtpproxy.c:1403]: rtp proxy <udp:<a href="http://127.0.0.1:7729">127.0.0.1:7729</a>> found, support for it enabled<br>
0(2338) INFO: rtpproxy [rtpproxy.c:1403]: rtp proxy <udp:<a href="http://127.0.0.1:7729">127.0.0.1:7729</a>> found, support for it enabled<br> 6(2344) INFO: rtpproxy [rtpproxy.c:1403]: rtp proxy <udp:<a href="http://127.0.0.1:7729">127.0.0.1:7729</a>> found, support for it enabled<br>
3(2341) INFO: rtpproxy [rtpproxy.c:1403]: rtp proxy <udp:<a href="http://127.0.0.1:7729">127.0.0.1:7729</a>> found, support for it enabled<br> 7(2345) INFO: rtpproxy [rtpproxy.c:1403]: rtp proxy <udp:<a href="http://127.0.0.1:7729">127.0.0.1:7729</a>> found, support for it enabled<br>
6(2344) INFO: ctl [io_listener.c:224]: io_listen_loop: using epoll_et io watch method (config)<br>root@B2BUA:/usr/local/src/scripts# 9(2347) INFO: rtpproxy [rtpproxy.c:1403]: rtp proxy <udp:<a href="http://127.0.0.1:7729">127.0.0.1:7729</a>> found, support for it enabled<br>
8(2346) INFO: rtpproxy [rtpproxy.c:1403]: rtp proxy <udp:<a href="http://127.0.0.1:7729">127.0.0.1:7729</a>> found, support for it enabled<br><br>root@B2BUA:/usr/local/src/scripts# 9(2347) ERROR: <core> [tcp_main.c:4139]: connect <a href="http://115.114.48.75:5061">115.114.48.75:5061</a> failed <br>
9(2347) : <core> [mem/q_malloc.c:431]: BUG: qm_free: bad pointer (nil) (out of<br> memory block!) - aborting<br> 0(2338) ALERT: <core> [main.c:742]: child process 2347 exited by a signal 6<br></i><br>