<html>
<head>
<meta content="text/html; charset=ISO-8859-1"
http-equiv="Content-Type">
</head>
<body bgcolor="#FFFFFF" text="#000000">
Hello,<br>
<br>
it seems you are having a version of ssl lib that does a free(null)
operation. It is fixed in master and 3.3 branch. Can you upgrade to
3.3.x?<br>
<br>
Alternative is to compile 3.1.x with f_malloc -- edit Makefile.defs
and set MEMDBG=0<br>
<br>
Or, backport patches from mem/ done last month -- you can look at
them with 'git log -p mem/'<br>
<br>
3.1.x is no longer officially maintained, but if I get some spare
time soon, I will backport, or maybe other devs will do it
meanwhile.<br>
<br>
<br>
Cheers,<br>
Daniel<br>
<br>
<div class="moz-cite-prefix">On 10/22/12 10:41 AM, Kamal Palei
wrote:<br>
</div>
<blockquote
cite="mid:CALO8XuVSBszo0QAZK4M9MNRnJ-H_ucQeTZ2V317kpZRh9OdgKA@mail.gmail.com"
type="cite">Dear All<br>
<div class="gmail_quote">I have setup Kamailio 3.1.5 with TLS
enabled.<br>
Whenever I receive the REGISTER request from endpoint, trying to
forward to next proxy.<br>
For that I have added below code in kamailio.cfg<br>
<br>
<i><b> if(is_method("REGISTER"))<br>
{<br>
t_relay_to("tls:<a moz-do-not-send="true"
href="http://115.114.48.75:5061" target="_blank">115.114.48.75:5061</a>");<br>
exit();<br>
}<br>
<br>
</b></i>I see once REGISTER received at Kamailio proxy, it is
sending TCP synch packet to next proxy, next proxy sends back a
synch+reset packet.<br>
Then kamailio proxy is crashing with log as below.<br>
<br>
<i style="color:rgb(204,0,0)">root@B2BUA:/usr/local/src/scripts#
9(2347) ERROR: <core> [tcp_main.c:4139]: connect <a
moz-do-not-send="true" href="http://115.114.48.75:5061"
target="_blank">115.114.48.75:5061</a> failed <br>
9(2347) : <core> [mem/q_malloc.c:431]: BUG: qm_free:
bad pointer (nil) (out of memory block!) - aborting<br>
</i><br>
The complete log is given as below. Please let me know how to
get out of this issue. I used -m 64 option while starting proxy,
but same result.<br>
Thanks, Kamal, NECS, Bangalore<br>
<i style="color:rgb(204,0,0)"><br>
0(2336) INFO: <core> [tcp_main.c:4730]: init_tcp: using
epoll_et io watch method (config)<br>
0(2338) INFO: usrloc [hslot.c:53]: locks array size 512<br>
0(2338) INFO: tls [tls_init.c:511]: tls: _init_tls_h:
compiled with openssl version "OpenSSL 1.0.1c 10 May 2012"
(0x1000103f), kerberos support: off, compression: on<br>
0(2338) INFO: tls [tls_init.c:519]: tls: init_tls_h:
installed openssl library version "OpenSSL 1.0.1c 10 May 2012"
(0x1000103f), kerberos support: off, zlib compression: off<br>
compiler: gcc -DOPENSSL_THREADS -D_REENTRANT -DDSO_DLFCN
-DHAVE_DLFCN_H -Wa,--noexecstack -DL_ENDIAN -DTERMIO -O3
-fomit-frame-pointer -Wall -DOPENSSL_BN_ASM_PART_WORDS
-DOPENSSL_IA32_SSE2 -DOPENSSL_BN_ASM_MONT
-DOPENSSL_BN_ASM_GF2m -DSHA1_ASM -DSHA256_ASM -DSHA512_ASM
-DMD5_ASM -DRMD160_ASM -DAES_ASM -DVPAES_ASM -DWHIRLPOOL_ASM
-DGHASH_ASM<br>
0(2338) INFO: tls [tls_init.c:373]: tls: init_tls: disabling
compression...<br>
0(2338) WARNING: tls [tls_init.c:587]: tls: openssl bug #1491
(crash/mem leaks on low memory) workaround enabled (on low
memory tls operations will fail preemptively) with free memory
thresholds 5242880 and 2621440 bytes<br>
0(2338) INFO: <core> [cfg/cfg_ctx.c:411]: INFO:
cfg_set_now(): tls.low_mem_threshold1 has been changed to
5242880<br>
0(2338) INFO: <core> [cfg/cfg_ctx.c:411]: INFO:
cfg_set_now(): tls.low_mem_threshold2 has been changed to
2621440<br>
0(2338) INFO: <core> [udp_server.c:184]: INFO:
udp_init: SO_RCVBUF is initially 112640<br>
0(2338) INFO: <core> [udp_server.c:235]: INFO:
udp_init: SO_RCVBUF is finally 262142<br>
0(2338) INFO: <core> [udp_server.c:184]: INFO:
udp_init: SO_RCVBUF is initially 112640<br>
0(2338) INFO: <core> [udp_server.c:235]: INFO:
udp_init: SO_RCVBUF is finally 262142<br>
0(2338) INFO: rtpproxy [rtpproxy.c:1403]: rtp proxy <udp:<a
moz-do-not-send="true" href="http://127.0.0.1:7729"
target="_blank">127.0.0.1:7729</a>> found, support for it
enabled<br>
0(2338) INFO: tls [tls_domain.c:176]: TLSs<default>:
tls_method=9<br>
0(2338) INFO: tls [tls_domain.c:188]: TLSs<default>:
certificate='/etc/certs/<a moz-do-not-send="true"
href="http://pocserver.com/cert.pem" target="_blank">pocserver.com/cert.pem</a>'<br>
0(2338) INFO: tls [tls_domain.c:195]: TLSs<default>:
ca_list='(null)'<br>
0(2338) INFO: tls [tls_domain.c:202]: TLSs<default>:
crl='(null)'<br>
0(2338) INFO: tls [tls_domain.c:206]: TLSs<default>:
require_certificate=0<br>
0(2338) INFO: tls [tls_domain.c:213]: TLSs<default>:
cipher_list='(null)'<br>
0(2338) INFO: tls [tls_domain.c:220]: TLSs<default>:
private_key='/etc/certs/<a moz-do-not-send="true"
href="http://pocserver.com/key.pem" target="_blank">pocserver.com/key.pem</a>'<br>
0(2338) INFO: tls [tls_domain.c:224]: TLSs<default>:
verify_certificate=0<br>
0(2338) INFO: tls [tls_domain.c:227]: TLSs<default>:
verify_depth=9<br>
0(2338) INFO: tls [tls_domain.c:544]: TLSs<default>: No
client certificate required and no checks performed<br>
0(2338) INFO: tls [tls_domain.c:176]: TLSc<default>:
tls_method=9<br>
0(2338) INFO: tls [tls_domain.c:188]: TLSc<default>:
certificate='(null)'<br>
0(2338) INFO: tls [tls_domain.c:195]: TLSc<default>:
ca_list='(null)'<br>
0(2338) INFO: tls [tls_domain.c:202]: TLSc<default>:
crl='(null)'<br>
0(2338) INFO: tls [tls_domain.c:206]: TLSc<default>:
require_certificate=1<br>
0(2338) INFO: tls [tls_domain.c:213]: TLSc<default>:
cipher_list='(null)'<br>
0(2338) INFO: tls [tls_domain.c:220]: TLSc<default>:
private_key='(null)'<br>
0(2338) INFO: tls [tls_domain.c:224]: TLSc<default>:
verify_certificate=1<br>
0(2338) INFO: tls [tls_domain.c:227]: TLSc<default>:
verify_depth=9<br>
0(2338) INFO: tls [tls_domain.c:529]: TLSc<default>:
Server MUST present valid certificate<br>
2(2340) INFO: rtpproxy [rtpproxy.c:1403]: rtp proxy <udp:<a
moz-do-not-send="true" href="http://127.0.0.1:7729"
target="_blank">127.0.0.1:7729</a>> found, support for it
enabled<br>
1(2339) INFO: rtpproxy [rtpproxy.c:1403]: rtp proxy <udp:<a
moz-do-not-send="true" href="http://127.0.0.1:7729"
target="_blank">127.0.0.1:7729</a>> found, support for it
enabled<br>
4(2342) INFO: rtpproxy [rtpproxy.c:1403]: rtp proxy <udp:<a
moz-do-not-send="true" href="http://127.0.0.1:7729"
target="_blank">127.0.0.1:7729</a>> found, support for it
enabled<br>
0(2338) INFO: rtpproxy [rtpproxy.c:1403]: rtp proxy <udp:<a
moz-do-not-send="true" href="http://127.0.0.1:7729"
target="_blank">127.0.0.1:7729</a>> found, support for it
enabled<br>
6(2344) INFO: rtpproxy [rtpproxy.c:1403]: rtp proxy <udp:<a
moz-do-not-send="true" href="http://127.0.0.1:7729"
target="_blank">127.0.0.1:7729</a>> found, support for it
enabled<br>
3(2341) INFO: rtpproxy [rtpproxy.c:1403]: rtp proxy <udp:<a
moz-do-not-send="true" href="http://127.0.0.1:7729"
target="_blank">127.0.0.1:7729</a>> found, support for it
enabled<br>
7(2345) INFO: rtpproxy [rtpproxy.c:1403]: rtp proxy <udp:<a
moz-do-not-send="true" href="http://127.0.0.1:7729"
target="_blank">127.0.0.1:7729</a>> found, support for it
enabled<br>
6(2344) INFO: ctl [io_listener.c:224]: io_listen_loop: using
epoll_et io watch method (config)<br>
root@B2BUA:/usr/local/src/scripts# 9(2347) INFO: rtpproxy
[rtpproxy.c:1403]: rtp proxy <udp:<a moz-do-not-send="true"
href="http://127.0.0.1:7729" target="_blank">127.0.0.1:7729</a>>
found, support for it enabled<br>
8(2346) INFO: rtpproxy [rtpproxy.c:1403]: rtp proxy <udp:<a
moz-do-not-send="true" href="http://127.0.0.1:7729"
target="_blank">127.0.0.1:7729</a>> found, support for it
enabled<br>
<br>
root@B2BUA:/usr/local/src/scripts# 9(2347) ERROR:
<core> [tcp_main.c:4139]: connect <a
moz-do-not-send="true" href="http://115.114.48.75:5061"
target="_blank">115.114.48.75:5061</a> failed <br>
9(2347) : <core> [mem/q_malloc.c:431]: BUG: qm_free:
bad pointer (nil) (out of<br>
memory block!) - aborting<br>
0(2338) ALERT: <core> [main.c:742]: child process 2347
exited by a signal 6<br>
</i><br>
</div>
<br>
<br>
<fieldset class="mimeAttachmentHeader"></fieldset>
<br>
<pre wrap="">_______________________________________________
SIP Express Router (SER) and Kamailio (OpenSER) - sr-users mailing list
<a class="moz-txt-link-abbreviated" href="mailto:sr-users@lists.sip-router.org">sr-users@lists.sip-router.org</a>
<a class="moz-txt-link-freetext" href="http://lists.sip-router.org/cgi-bin/mailman/listinfo/sr-users">http://lists.sip-router.org/cgi-bin/mailman/listinfo/sr-users</a>
</pre>
</blockquote>
<br>
<pre class="moz-signature" cols="72">--
Daniel-Constantin Mierla - <a class="moz-txt-link-freetext" href="http://www.asipto.com">http://www.asipto.com</a>
<a class="moz-txt-link-freetext" href="http://twitter.com/#!/miconda">http://twitter.com/#!/miconda</a> - <a class="moz-txt-link-freetext" href="http://www.linkedin.com/in/miconda">http://www.linkedin.com/in/miconda</a>
Kamailio Advanced Training, Berlin, Nov 5-8, 2012 - <a class="moz-txt-link-freetext" href="http://asipto.com/u/kat">http://asipto.com/u/kat</a>
Kamailio Advanced Training, Miami, USA, Nov 12-14, 2012 - <a class="moz-txt-link-freetext" href="http://asipto.com/u/katu">http://asipto.com/u/katu</a></pre>
</body>
</html>