Thank you for your help and sorry for my English.
I have a problem with mipv6 and a server SIP, SER (SIP Express Router).
The mipv6 path is "mipv6-2.0.2" from
http://www.mobile-ipv6.org/ ,in kernel
2.6.16.24-Ubuntu.
The problem occurs when a packet is too big (it must be
fragmented), and go to the node what makes function of P-CSCF (Proxy in
SIP) and Correspondent Node.
If the P-CSCF is not a CN, all is OK. But if the node is CN, then i have the problem. The
SER logs are:
##############################################################
................
Nov 20 18:28:25 pcscfD /usr/sbin/ser[8051]: SER: new INVITE Nov 20
18:28:25 pcscfD /usr/sbin/ser[8051]: parse_headers: flags=-1 Nov 20
18:28:25 pcscfD /usr/sbin/ser[8051]:
check_via_address(2001:720:1500:1B:FCFD:FF:FE0C:103,
[2001:720:1500:1B:FCFD:FF:FE0C:103], 3) Nov 20 18:28:25 pcscfD
/usr/sbin/ser[8051]: ERROR: warning_builder: buffer size exceeded Nov
20 18:28:25 pcscfD /usr/sbin/ser[8051]: WARNING: warning skipped -- too
big Nov 20 18:28:25 pcscfD /usr/sbin/ser[8051]: WARNING:vqm_resize:
resize(0) called Nov 20 18:28:25 pcscfD /usr/sbin/ser[8051]: DEBUG:
reply sent out.
buf=0x8106270: SIP/2.0 1..., shmem=0xb5e8b330: SIP/2.0 1 Nov 20
18:28:25 pcscfD /usr/sbin/ser[8051]: DEBUG: _reply_light: finished Nov
20 18:28:25 pcscfD /usr/sbin/ser[8051]: DEBUG: mk_proxy: doing DNS
lookup... Nov 20 18:28:25 pcscfD /usr/sbin/ser[8051]:
check_via_address(2001:720:1500:1B:FCFD:FF:FE0C:103,
[2001:720:1500:1B:FCFD:FF:FE0C:103], 3) Nov 20 18:28:25 pcscfD
/usr/sbin/ser[8068]: DBG: tcp_main_loop: dead child 2 (shutting down?)
Nov 20 18:28:25 pcscfD /usr/sbin/ser[8049]: child process 8051 exited
by a signal 11 Nov 20 18:28:25 pcscfD kernel: [4296472.851000]
<0>skb_under_panic: text:c02d2aad len:321 put:14 head:d62cfc00 data:d62cfbea
tail:d62cfd2b end:d62cfd80 dev:eth0
Nov 20 18:28:25 pcscfD /usr/sbin/ser[8049]: core was not generated
Nov 20 18:28:25 pcscfD kernel: [4297162.639000] ------------[ cut here ]------------
Nov 20 18:28:25 pcscfD /usr/sbin/ser[8049]: INFO: terminating due to SIGCHLD
Nov 20 18:28:25
pcscfD kernel: [4297162.639000] kernel BUG at net/core/skbuff.c:112!
Nov 20 18:28:25 pcscfD /usr/sbin/ser[8059]: INFO: signal 15 received
Nov 20 18:28:25 pcscfD /usr/sbin/ser[8052]: INFO: signal 15 received
Nov 20 18:28:25 pcscfD /usr/sbin/ser[8053]: INFO: signal 15 received
Nov 20 18:28:25 pcscfD /usr/sbin/ser[8054]: INFO: signal 15 received
Nov 20 18:28:25 pcscfD /usr/sbin/ser[8055]: INFO: signal 15 received
Nov 20 18:28:25 pcscfD /usr/sbin/ser[8056]: INFO: signal 15 received
Nov 20 18:28:25 pcscfD /usr/sbin/ser[8057]: INFO: signal 15 received
Nov 20 18:28:25 pcscfD /usr/sbin/ser[8058]: INFO: signal 15 received
Nov 20 18:28:25 pcscfD /usr/sbin/ser[8060]: INFO: signal 15 received
Nov 20 18:28:25 pcscfD /usr/sbin/ser[8061]: INFO: signal 15 received
Nov 20 18:28:25 pcscfD /usr/sbin/ser[8062]: INFO: signal 15 received
Nov 20 18:28:25 pcscfD /usr/sbin/ser[8063]: INFO: signal 15 received
Nov 20 18:28:25 pcscfD
/usr/sbin/ser[8064]: INFO: signal 15 received
Nov 20 18:28:25 pcscfD /usr/sbin/ser[8065]: INFO: signal 15 received
Nov 20 18:28:25 pcscfD /usr/sbin/ser[8066]: INFO: signal 15 received
Nov 20 18:28:25 pcscfD /usr/sbin/ser[8067]: INFO: signal 15 received
Nov 20 18:28:25 pcscfD /usr/sbin/ser[8068]: INFO: signal 15 received
Nov 20 18:28:25 pcscfD /usr/sbin/ser[8050]: INFO: signal 15 received
Nov 20 18:28:25 pcscfD kernel: [4297162.639000] invalid opcode: 0000 [#3]
Nov 20 18:28:25 pcscfD /usr/sbin/ser[8059]: Memory status (pkg):
Nov 20 18:28:25 pcscfD /usr/sbin/ser[8052]: Memory status (pkg):
Nov 20 18:28:25 pcscfD /usr/sbin/ser[8053]: Memory status (pkg):
Nov 20 18:28:25 pcscfD /usr/sbin/ser[8054]: Memory status (pkg):
Nov 20 18:28:25 pcscfD /usr/sbin/ser[8055]: Memory status (pkg):
Nov 20 18:28:25 pcscfD /usr/sbin/ser[8056]: Memory status (pkg):
.......................
Nov 20 18:28:25 pcscfD /usr/sbin/ser[8049]: hash =
2055 fragments no.: 1, unused: 0 ^I^I bucket size:
1048576 - 2097152 (first 1572864) Nov 20 18:28:25 pcscfD
/usr/sbin/ser[8049]: hash = 2059 fragments no.: 1, unused: 0
^I^I bucket size: 16777216 - 33554432 (first 31934160) Nov 20
18:28:25 pcscfD /usr/sbin/ser[8049]: TOTAL: 26 free fragments =
33537656 free bytes Nov 20 18:28:25 pcscfD /usr/sbin/ser[8049]:
----------------------------- Nov 20 18:28:25 pcscfD
/usr/sbin/ser[8049]: shm_mem_destroy Nov 20 18:28:25 pcscfD
/usr/sbin/ser[8049]: destroying the shared memory lock Nov 20 18:28:25
pcscfD /usr/sbin/ser[8049]: terminating due to SIGCHLD
##############################################################
The problem is in the MTU size, because if the packet is not fragmented, there is not a
problem. But the INVITE packet
needs to fragment, what it means, i always have the same problem.
My SER version is version: ser 0.9.6 (i386/linux) and it's a vanilla version. The
packets is sent over UDP.
My questions are:
- Have anybody the same o similar problem?
- The MTU size is a problem in SER?
- Have anybody sent fragmented packets with SER?
Thanks for your help.
__________________________________________________
Correo Yahoo!
Espacio para todos tus mensajes, antivirus y antispam ¡gratis!
Regístrate ya -
http://correo.yahoo.es