Re: [openssl-users] glibc detected *** xxx: double free or corruption (!prev): 0x097b8750

2016-05-10 Thread Vikas TM
Hi Matt,

It looks like handling crypto lock mechanism issue. I defined NO SRP. Now I
am getting segmentation fault in CRYPTO_add_lock() function referencing
NULL pointer. Please find GDB output below,

(gdb) run ftp://x.x.x.x:sample.txt

Starting program: /App/vikftp ftp://x.x.x.x:sample.txt

Missing separate debuginfo for /lib/ld-linux.so.2

Missing separate debuginfo for /lib/libdl.so.2

Missing separate debuginfo for /lib/libpam.so.0

Missing separate debuginfo for /lib/libm.so.6

Missing separate debuginfo for /lib/libc.so.6

Missing separate debuginfo for /lib/libaudit.so.0

process 22287 is executing new program: /App/vikftp

Missing separate debuginfo for /lib/ld-linux.so.2

Missing separate debuginfo for /lib/libdl.so.2

Missing separate debuginfo for /lib/libpam.so.0

Missing separate debuginfo for /lib/libm.so.6

Missing separate debuginfo for /lib/libc.so.6

Missing separate debuginfo for /lib/libaudit.so.0



Program received signal SIGSEGV, Segmentation fault.

0x08205766 in CRYPTO_add_lock (pointer=0x1011, amount=-1, type=3,
file=0x85d0030 "/102d/s/tasn_utl.c", line=118)

at /102d/s/cryptlib.c:624

624 ret = *pointer + amount;

(gdb) bt

#0  0x08205766 in CRYPTO_add_lock (pointer=0x1011, amount=-1, type=3,
file=0x85d0030 "/102d/s/tasn_utl.c", line=118)

at /102d/s/cryptlib.c:624

#1  0x08249d2a in asn1_do_lock (pval=0xff8eee90, op=-1, it=0x862cb1c) at
/102d/s/tasn_utl.c:118

#2  0x08246ed5 in asn1_item_combine_free (pval=0xff8eee90, it=0x862cb1c,
combine=0) at /102d/s/tasn_fre.c:146

#3  0x08246c40 in ASN1_item_free (val=0x1001, it=0x862cb1c) at
/102d/s/tasn_fre.c:72

#4  0x0825eeea in X509_free (a=0x1001) at /102d/s/x_x509.c:143

#5  0x082ee677 in ssl_cert_clear_certs (c=0x872e4e0) at
/102d/s/ssl_cert.c:431

#6  0x082ee7ed in ssl_cert_free (c=0x872e4e0) at /102d/s/ssl_cert.c:489

#7  0x0822f926 in SSL_free (s=0x872e340) at /102d/s/ssl_lib.c:627

#8  0x0816566c in closeConnection (pcx=0x86d8310, rsn=0x0, graceful=1
'\001') at /App/vikftp.c:10098

Please let me know if you have any solution.
Thanks & Regards,
Vikas
On 7 Apr 2016 7:18 pm, "Vikas TM"  wrote:

Hi Matt,

I was trying the patches available in the Internet. Due to that few blank
lines might have added or removed. But no major change in the code.

Thanks & Regards,
Vikas
On 7 Apr 2016 7:07 pm, "Matt Caswell"  wrote:

>
>
> On 07/04/16 14:23, Vikas TM wrote:
> > Hi Mike
> >
> >
> > I have integrated openSSL version 102d. While running secure FTP
> > connection, I have encountered double free or corruption issue.
>
> Are you running 1.0.2d as downloaded from the OpenSSL website with no
> other patches applied? The line numbers below do not match up with the
> git copy of 1.0.2d.
>
> Matt
>
> >
> > The TLS negotiation is successful and file is also getting transferred
> > to partner machine. At the end while freeing all the memory, file
> > transfer is ended with “double free or corruption issue”. I have tried
> > almost all the patch available in internet. Please let me know if you
> > any solution.
> >
> >
> >
> > Machine: Linux x86_64
> >
> > Please find the GDB output below,
> >
> >
> >
> > Breakpoint 1, ssl3_free (s=0x8736430) at /102d/s/s3_lib.c:2995
> >
> > 2995if (s == NULL || s->s3 == NULL)
> >
> > (gdb) n
> >
> > 3009ssl3_cleanup_key_block(s);
> >
> > (gdb)
> >
> > 3010if (s->s3->rbuf.buf != NULL)
> >
> > (gdb)
> >
> > 3011ssl3_release_read_buffer(s);
> >
> > (gdb)
> >
> > 3012if (s->s3->wbuf.buf != NULL)
> >
> > (gdb)
> >
> > 3013ssl3_release_write_buffer(s);
> >
> > (gdb)
> >
> > 3014if (s->s3->rrec.comp != NULL)
> >
> > (gdb)
> >
> > 3017if (s->s3->tmp.dh != NULL)
> >
> > (gdb)
> >
> > 3021if (s->s3->tmp.ecdh != NULL)
> >
> > (gdb)
> >
> > 3025if (s->s3->tmp.ca_names != NULL)
> >
> > (gdb)
> >
> > 3027if (s->s3->handshake_buffer) {
> >
> > (gdb)
> >
> > 3030if (s->s3->handshake_dgst)
> >
> > (gdb)
> >
> > 3031ssl3_free_digest_list(s);
> >
> > (gdb)
> >
> > 3033if (s->s3->alpn_selected)
> >
> > (gdb)
> >
> > 3038SSL_SRP_CTX_free(s);
> >
> > (gdb)
> >
> >
> >
> > 3042OPENSSL_cleanse(s->s3, sizeof *(s->s3));
> >
> > (gdb) n
> >
> > 3047OPENSSL_free(s->s3);
> >
> > (gdb) p *(s->s3)
> >
> > $1 = {flags = 1447178013, delay_buf_pop_ret = -1332182677, read_sequence
> > = "\311\343\376\032\067Ut\224", read_mac_secret_size = -557140059,
> >
> >   read_mac_secret = "\363\t
> >
> 8Qk\206\242\277\335\377\034-?Rf{\221\253\300\337\353\016*Ge\204\244\265\307\332\363\003\031\060Ha{\226\262\317\355\f,=Obv\213\241\270\320\356\003\036:Wu\224\264\305\327\356\374",
> > write_sequence = "\023)@Xq\213\246", ,
> > write_mac_secret_size = 1008532959,
> >
> >   write_mac_secret =
> >
> 

Re: [openssl-users] glibc detected *** xxx: double free or corruption (!prev): 0x097b8750

2016-04-07 Thread Vikas TM
Hi Matt,

I was trying the patches available in the Internet. Due to that few blank
lines might have added or removed. But no major change in the code.

Thanks & Regards,
Vikas
On 7 Apr 2016 7:07 pm, "Matt Caswell"  wrote:

>
>
> On 07/04/16 14:23, Vikas TM wrote:
> > Hi Mike
> >
> >
> > I have integrated openSSL version 102d. While running secure FTP
> > connection, I have encountered double free or corruption issue.
>
> Are you running 1.0.2d as downloaded from the OpenSSL website with no
> other patches applied? The line numbers below do not match up with the
> git copy of 1.0.2d.
>
> Matt
>
> >
> > The TLS negotiation is successful and file is also getting transferred
> > to partner machine. At the end while freeing all the memory, file
> > transfer is ended with “double free or corruption issue”. I have tried
> > almost all the patch available in internet. Please let me know if you
> > any solution.
> >
> >
> >
> > Machine: Linux x86_64
> >
> > Please find the GDB output below,
> >
> >
> >
> > Breakpoint 1, ssl3_free (s=0x8736430) at /102d/s/s3_lib.c:2995
> >
> > 2995if (s == NULL || s->s3 == NULL)
> >
> > (gdb) n
> >
> > 3009ssl3_cleanup_key_block(s);
> >
> > (gdb)
> >
> > 3010if (s->s3->rbuf.buf != NULL)
> >
> > (gdb)
> >
> > 3011ssl3_release_read_buffer(s);
> >
> > (gdb)
> >
> > 3012if (s->s3->wbuf.buf != NULL)
> >
> > (gdb)
> >
> > 3013ssl3_release_write_buffer(s);
> >
> > (gdb)
> >
> > 3014if (s->s3->rrec.comp != NULL)
> >
> > (gdb)
> >
> > 3017if (s->s3->tmp.dh != NULL)
> >
> > (gdb)
> >
> > 3021if (s->s3->tmp.ecdh != NULL)
> >
> > (gdb)
> >
> > 3025if (s->s3->tmp.ca_names != NULL)
> >
> > (gdb)
> >
> > 3027if (s->s3->handshake_buffer) {
> >
> > (gdb)
> >
> > 3030if (s->s3->handshake_dgst)
> >
> > (gdb)
> >
> > 3031ssl3_free_digest_list(s);
> >
> > (gdb)
> >
> > 3033if (s->s3->alpn_selected)
> >
> > (gdb)
> >
> > 3038SSL_SRP_CTX_free(s);
> >
> > (gdb)
> >
> >
> >
> > 3042OPENSSL_cleanse(s->s3, sizeof *(s->s3));
> >
> > (gdb) n
> >
> > 3047OPENSSL_free(s->s3);
> >
> > (gdb) p *(s->s3)
> >
> > $1 = {flags = 1447178013, delay_buf_pop_ret = -1332182677, read_sequence
> > = "\311\343\376\032\067Ut\224", read_mac_secret_size = -557140059,
> >
> >   read_mac_secret = "\363\t
> >
> 8Qk\206\242\277\335\377\034-?Rf{\221\253\300\337\353\016*Ge\204\244\265\307\332\363\003\031\060Ha{\226\262\317\355\f,=Obv\213\241\270\320\356\003\036:Wu\224\264\305\327\356\374",
> > write_sequence = "\023)@Xq\213\246", ,
> > write_mac_secret_size = 1008532959,
> >
> >   write_mac_secret =
> >
> "M_r\206\243\261\310\340\371\023.Jg\205\260\304\325\347\373\016#9Ph\201\233\264\322\357\r,L]o\202\226\253\301\330\363\t#>Zw\225\264\324\345\374\n\036\063I`x\221\253\306\342\377\035<\\",
> > server_random =
> >
> "m\177\222\246\273\321\350\000\031\063Nj\207\245\304\344\365\a\032.CYp\210\241\273\326\362\017-Ll",
> >
> >   client_random =
> >
> "}\217\242\266\313\341\370\020)C^z\227\265\324\364\005\027*>Si\200\230\261\313\346\002\037=\\|",
> > need_empty_fragments = -961372275,
> >
> >   empty_fragment_done = 537457115, init_extra = -1972481223, rbuf = {buf
> > = 0x4e4c5a7 , len = 1312433941, offset
> > = -1466926749,
> >
> > left = 318168001}, wbuf = {buf = 0x8c6c4d2f  > of bounds>, len = 3603083165, offset = 806879723, left = -1702993079},
> > rrec = {
> >
> > type = 351589815, length = 1581922085, off = 3097528691, data =
> > 0x2206ebd1 ,
> >
> > input = 0x9c7c5d3f , comp =
> > 0xe6d2bfad , epoch = 1076367867,
> >
> > seq_num = "Ys\216\252\307\345\004$"}, wrec = {type = 1851410229,
> > length = 3367016835, off = 840367073, data = 0xac8c6d4f  > 0xac8c6d4f out of bounds>,
> >
> > input = 0xf6e2cfbd , comp =
> > 0x5038210b , epoch = 3130950505,
> >
> > seq_num = "\327\365\024\064EWj~"}, alert_fragment = "\223\251",
> > alert_fragment_len = 1109789681, handshake_fragment = "_}\234\274",
> >
> >   handshake_fragment_len = 116580301, wnum = 1615343899, wpend_tot =
> > -894528647, wpend_type = 1143211495, wpend_ret = -1904580779,
> >
> >   wpend_buf = 0xe8d0b9a3 ,
> > handshake_buffer = 0x52361b01, handshake_dgst = 0xccac8d6f,
> > change_cipher_spec = 369291229,
> >
> >   warn_alert = 1884832043, fatal_alert = -625040503, alert_dispatch =
> > 1412699639, send_alert = "ew", renegotiate = -119486029,
> > total_renegotiations = 1648765713,
> >
> >   num_renegotiations = -591618689, in_read_app_data = 638779373,
> > client_opaque_prf_input = 0x8068513b, client_opaque_prf_input_len =
> > 3939414937,
> >
> >   server_opaque_prf_input = 0x64442507, server_opaque_prf_input_len =
> > 2929362805, tmp = {
> >
> > cert_verify_md =
> >
> 

Re: [openssl-users] glibc detected *** xxx: double free or corruption (!prev): 0x097b8750

2016-04-07 Thread Matt Caswell


On 07/04/16 14:23, Vikas TM wrote:
> Hi Mike
>  
> 
> I have integrated openSSL version 102d. While running secure FTP
> connection, I have encountered double free or corruption issue.

Are you running 1.0.2d as downloaded from the OpenSSL website with no
other patches applied? The line numbers below do not match up with the
git copy of 1.0.2d.

Matt

> 
> The TLS negotiation is successful and file is also getting transferred
> to partner machine. At the end while freeing all the memory, file
> transfer is ended with “double free or corruption issue”. I have tried
> almost all the patch available in internet. Please let me know if you
> any solution.
> 
>  
> 
> Machine: Linux x86_64
> 
> Please find the GDB output below,
> 
>  
> 
> Breakpoint 1, ssl3_free (s=0x8736430) at /102d/s/s3_lib.c:2995
> 
> 2995if (s == NULL || s->s3 == NULL)
> 
> (gdb) n
> 
> 3009ssl3_cleanup_key_block(s);
> 
> (gdb)
> 
> 3010if (s->s3->rbuf.buf != NULL)
> 
> (gdb)
> 
> 3011ssl3_release_read_buffer(s);
> 
> (gdb)
> 
> 3012if (s->s3->wbuf.buf != NULL)
> 
> (gdb)
> 
> 3013ssl3_release_write_buffer(s);
> 
> (gdb)
> 
> 3014if (s->s3->rrec.comp != NULL)
> 
> (gdb)
> 
> 3017if (s->s3->tmp.dh != NULL)
> 
> (gdb)
> 
> 3021if (s->s3->tmp.ecdh != NULL)
> 
> (gdb)
> 
> 3025if (s->s3->tmp.ca_names != NULL)
> 
> (gdb)
> 
> 3027if (s->s3->handshake_buffer) {
> 
> (gdb)
> 
> 3030if (s->s3->handshake_dgst)
> 
> (gdb)
> 
> 3031ssl3_free_digest_list(s);
> 
> (gdb)
> 
> 3033if (s->s3->alpn_selected)
> 
> (gdb)
> 
> 3038SSL_SRP_CTX_free(s);
> 
> (gdb)
> 
>  
> 
> 3042OPENSSL_cleanse(s->s3, sizeof *(s->s3));
> 
> (gdb) n
> 
> 3047OPENSSL_free(s->s3);
> 
> (gdb) p *(s->s3)
> 
> $1 = {flags = 1447178013, delay_buf_pop_ret = -1332182677, read_sequence
> = "\311\343\376\032\067Ut\224", read_mac_secret_size = -557140059,
> 
>   read_mac_secret = "\363\t
> 8Qk\206\242\277\335\377\034-?Rf{\221\253\300\337\353\016*Ge\204\244\265\307\332\363\003\031\060Ha{\226\262\317\355\f,=Obv\213\241\270\320\356\003\036:Wu\224\264\305\327\356\374",
> write_sequence = "\023)@Xq\213\246", ,
> write_mac_secret_size = 1008532959,
> 
>   write_mac_secret =
> "M_r\206\243\261\310\340\371\023.Jg\205\260\304\325\347\373\016#9Ph\201\233\264\322\357\r,L]o\202\226\253\301\330\363\t#>Zw\225\264\324\345\374\n\036\063I`x\221\253\306\342\377\035<\\",
> server_random =
> "m\177\222\246\273\321\350\000\031\063Nj\207\245\304\344\365\a\032.CYp\210\241\273\326\362\017-Ll",
> 
>   client_random =
> "}\217\242\266\313\341\370\020)C^z\227\265\324\364\005\027*>Si\200\230\261\313\346\002\037=\\|",
> need_empty_fragments = -961372275,
> 
>   empty_fragment_done = 537457115, init_extra = -1972481223, rbuf = {buf
> = 0x4e4c5a7 , len = 1312433941, offset
> = -1466926749,
> 
> left = 318168001}, wbuf = {buf = 0x8c6c4d2f  of bounds>, len = 3603083165, offset = 806879723, left = -1702993079},
> rrec = {
> 
> type = 351589815, length = 1581922085, off = 3097528691, data =
> 0x2206ebd1 ,
> 
> input = 0x9c7c5d3f , comp =
> 0xe6d2bfad , epoch = 1076367867,
> 
> seq_num = "Ys\216\252\307\345\004$"}, wrec = {type = 1851410229,
> length = 3367016835, off = 840367073, data = 0xac8c6d4f  0xac8c6d4f out of bounds>,
> 
> input = 0xf6e2cfbd , comp =
> 0x5038210b , epoch = 3130950505,
> 
> seq_num = "\327\365\024\064EWj~"}, alert_fragment = "\223\251",
> alert_fragment_len = 1109789681, handshake_fragment = "_}\234\274",
> 
>   handshake_fragment_len = 116580301, wnum = 1615343899, wpend_tot =
> -894528647, wpend_type = 1143211495, wpend_ret = -1904580779,
> 
>   wpend_buf = 0xe8d0b9a3 ,
> handshake_buffer = 0x52361b01, handshake_dgst = 0xccac8d6f,
> change_cipher_spec = 369291229,
> 
>   warn_alert = 1884832043, fatal_alert = -625040503, alert_dispatch =
> 1412699639, send_alert = "ew", renegotiate = -119486029,
> total_renegotiations = 1648765713,
> 
>   num_renegotiations = -591618689, in_read_app_data = 638779373,
> client_opaque_prf_input = 0x8068513b, client_opaque_prf_input_len =
> 3939414937,
> 
>   server_opaque_prf_input = 0x64442507, server_opaque_prf_input_len =
> 2929362805, tmp = {
> 
> cert_verify_md =
> "\303\331\363\b!;Vr\217\255\314\354\375\017\"6Kax\220\251\303\336\362\029\065Tt\205\227\252\279\323\351\000\030\061Kf\202\237\263\336\321\r\037\062F[q\210\240\271\323\346\n'Ed\204\225\247\281\316\323\371\020(A[v\222\257\314\354\f\035/BVk\201\230\270\212\343\373\032\067Ut\224\248\267\312\336\363\t
> 8Qk\206\242\277\335\377\034-?Rf{\221\253\300\337\353\016*Ge\204\244\265\307\332",
> ,
> 
> finish_md =
> 

Re: [openssl-users] glibc detected *** xxx: double free or corruption (!prev): 0x097b8750

2016-04-07 Thread Vikas TM
Hi Mike


I have integrated openSSL version 102d. While running secure FTP
connection, I have encountered double free or corruption issue.

The TLS negotiation is successful and file is also getting transferred to
partner machine. At the end while freeing all the memory, file transfer is
ended with “double free or corruption issue”. I have tried almost all the
patch available in internet. Please let me know if you any solution.



Machine: Linux x86_64

Please find the GDB output below,



Breakpoint 1, ssl3_free (s=0x8736430) at /102d/s/s3_lib.c:2995

2995if (s == NULL || s->s3 == NULL)

(gdb) n

3009ssl3_cleanup_key_block(s);

(gdb)

3010if (s->s3->rbuf.buf != NULL)

(gdb)

3011ssl3_release_read_buffer(s);

(gdb)

3012if (s->s3->wbuf.buf != NULL)

(gdb)

3013ssl3_release_write_buffer(s);

(gdb)

3014if (s->s3->rrec.comp != NULL)

(gdb)

3017if (s->s3->tmp.dh != NULL)

(gdb)

3021if (s->s3->tmp.ecdh != NULL)

(gdb)

3025if (s->s3->tmp.ca_names != NULL)

(gdb)

3027if (s->s3->handshake_buffer) {

(gdb)

3030if (s->s3->handshake_dgst)

(gdb)

3031ssl3_free_digest_list(s);

(gdb)

3033if (s->s3->alpn_selected)

(gdb)

3038SSL_SRP_CTX_free(s);

(gdb)



3042OPENSSL_cleanse(s->s3, sizeof *(s->s3));

(gdb) n

3047OPENSSL_free(s->s3);

(gdb) p *(s->s3)

$1 = {flags = 1447178013, delay_buf_pop_ret = -1332182677, read_sequence =
"\311\343\376\032\067Ut\224", read_mac_secret_size = -557140059,

  read_mac_secret = "\363\t
8Qk\206\242\277\335\377\034-?Rf{\221\253\300\337\353\016*Ge\204\244\265\307\332\363\003\031\060Ha{\226\262\317\355\f,=Obv\213\241\270\320\356\003\036:Wu\224\264\305\327\356\374",
write_sequence = "\023)@Xq\213\246", ,
write_mac_secret_size = 1008532959,

  write_mac_secret =
"M_r\206\243\261\310\340\371\023.Jg\205\260\304\325\347\373\016#9Ph\201\233\264\322\357\r,L]o\202\226\253\301\330\363\t#>Zw\225\264\324\345\374\n\036\063I`x\221\253\306\342\377\035<\\",
server_random =
"m\177\222\246\273\321\350\000\031\063Nj\207\245\304\344\365\a\032.CYp\210\241\273\326\362\017-Ll",

  client_random =
"}\217\242\266\313\341\370\020)C^z\227\265\324\364\005\027*>Si\200\230\261\313\346\002\037=\\|",
need_empty_fragments = -961372275,

  empty_fragment_done = 537457115, init_extra = -1972481223, rbuf = {buf =
0x4e4c5a7 , len = 1312433941, offset =
-1466926749,

left = 318168001}, wbuf = {buf = 0x8c6c4d2f , len = 3603083165, offset = 806879723, left = -1702993079}, rrec = {

type = 351589815, length = 1581922085, off = 3097528691, data =
0x2206ebd1 ,

input = 0x9c7c5d3f , comp =
0xe6d2bfad , epoch = 1076367867,

seq_num = "Ys\216\252\307\345\004$"}, wrec = {type = 1851410229, length
= 3367016835, off = 840367073, data = 0xac8c6d4f ,

input = 0xf6e2cfbd , comp =
0x5038210b , epoch = 3130950505,

seq_num = "\327\365\024\064EWj~"}, alert_fragment = "\223\251",
alert_fragment_len = 1109789681, handshake_fragment = "_}\234\274",

  handshake_fragment_len = 116580301, wnum = 1615343899, wpend_tot =
-894528647, wpend_type = 1143211495, wpend_ret = -1904580779,

  wpend_buf = 0xe8d0b9a3 ,
handshake_buffer = 0x52361b01, handshake_dgst = 0xccac8d6f,
change_cipher_spec = 369291229,

  warn_alert = 1884832043, fatal_alert = -625040503, alert_dispatch =
1412699639, send_alert = "ew", renegotiate = -119486029,
total_renegotiations = 1648765713,

  num_renegotiations = -591618689, in_read_app_data = 638779373,
client_opaque_prf_input = 0x8068513b, client_opaque_prf_input_len =
3939414937,

  server_opaque_prf_input = 0x64442507, server_opaque_prf_input_len =
2929362805, tmp = {

cert_verify_md =
"\303\331\363\b!;Vr\217\255\314\354\375\017\"6Kax\220\251\303\336\362\029\065Tt\205\227\252\279\323\351\000\030\061Kf\202\237\263\336\321\r\037\062F[q\210\240\271\323\346\n'Ed\204\225\247\281\316\323\371\020(A[v\222\257\314\354\f\035/BVk\201\230\270\212\343\373\032\067Ut\224\248\267\312\336\363\t
8Qk\206\242\277\335\377\034-?Rf{\221\253\300\337\353\016*Ge\204\244\265\307\332",
,

finish_md =
"\003\031\060Ha{\226\262\319\356\f,=Obv\213\241\270\478\351\003\036:Wu\224\268\365\327\352\376\023)@Xq\213\246\302\347\365\034Zw\225\264\327\345\364\n\036\063I`x\221\253\306\342\377\035<\\m\177\222\246\273\328\350\000\031\063Nj\207\245\304\344\365\a\032.",
finish_md_len = -2005903037,

peer_finish_md =
"\241\273\326\366\017-Ll}\217\242\266\314\341\370\020)C^z\227\265\324\366\005\027*>Si\200\230\261\363\346\002\037=\\|\215\237\262\363\333\362\b
9Sn\212\247\305\344\004\025':Ncy\220\250\301\333\366\022/Ml\214\235\257\302\326\353\001\030\060Ic~\232\267\325\364\024%7J^s\211\240\270\321\353\006\"?]|\234\255\277\325\346\373\021(@Ys\216\252\307\345\004$5GZn\203\242\260",
, peer_finish_md_len = 840367073, message_size =
2894884175, message_type = -152907843,


Re: [openssl-users] glibc detected *** xxx: double free or corruption (!prev): 0x097b8750

2016-02-25 Thread Mike Mohr
You'll need to rebuild your application and openssl with debugging symbols
and no optimization, then run it inside gdb to produce a more useful stack
trace. Since you don't include any context or source code snippets it isn't
really possible to help. Can you produce a reduced test case with source
code which reproduces the bug?

As long as politics is the shadow cast on society by big business, the
attenuation of the shadow will not change the substance.

John Dewey: The Later Works, 1925-1953; Volume 6, pp. 163
On Feb 24, 2016 11:33 PM, "Vikas TM"  wrote:

> Hi,
>
> While running my application with openSSL 102d and I encountered double
> free error or corruption.
>
> As per few threads suggestion, I have changed getpid() with pthread_self()
> in CRYPTO_thread_id(). Still the result is same.
>
> Please let me know if any fix available to this issue.
>
> *** glibc detected *** xxx: double free or corruption (!prev): 0x097b8750
> ***
>
> === Backtrace: =
>
> /lib/libc.so.6[0x1768b6]
>
> /lib/libc.so.6(cfree+0x90)[0x179e00]
>
> xxx(CRYPTO_free+0x3a)[0x81b89be]
>
> xxx(ssl_cert_free+0x13f)[0x826fa23]
>
> xxx(SSL_free+0x14d)[0x81d7e08]
>
> Thanks & Regards,
> Vikas
>
> --
> openssl-users mailing list
> To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users
>
>
-- 
openssl-users mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users


[openssl-users] glibc detected *** xxx: double free or corruption (!prev): 0x097b8750

2016-02-24 Thread Vikas TM
Hi,

While running my application with openSSL 102d and I encountered double
free error or corruption.

As per few threads suggestion, I have changed getpid() with pthread_self()
in CRYPTO_thread_id(). Still the result is same.

Please let me know if any fix available to this issue.

*** glibc detected *** xxx: double free or corruption (!prev): 0x097b8750
***

=== Backtrace: =

/lib/libc.so.6[0x1768b6]

/lib/libc.so.6(cfree+0x90)[0x179e00]

xxx(CRYPTO_free+0x3a)[0x81b89be]

xxx(ssl_cert_free+0x13f)[0x826fa23]

xxx(SSL_free+0x14d)[0x81d7e08]

Thanks & Regards,
Vikas
-- 
openssl-users mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users