Hello,
thanks for the report.
You are using an old version (5.2.2) of Kamailio, in newer versions there are many bugs
already fixed.
Please try to upgrade to 5.2.7, released just some weeks ago.
If the bug happens here again, please open a bug report on our tracker on github.
Cheers,
Henning
--
Henning Westerholt –
https://skalatan.de/blog/
Kamailio services –
https://gilawa.com<https://gilawa.com/>
From: sr-users <sr-users-bounces(a)lists.kamailio.org> On Behalf Of Denys Pozniak
Sent: Wednesday, May 27, 2020 6:20 PM
To: Kamailio (SER) - Users Mailing List <sr-users(a)lists.kamailio.org>
Subject: [SR-Users] CRITICAL: <core> [core/data_lump.c:292]: del_lump(): offset
exceeds message size (1436 > 1432) aborting...
Hello!
Could you please check the reason of crash below?
syslog:
kamailio[31738]: CRITICAL: |RGFLAFL63U|<core> [core/data_lump.c:292]: del_lump():
offset exceeds message size (1436 > 1432) aborting...
gdb ( uri and IP were modified ):
Core was generated by `/usr/sbin/kamailio -f /etc/kamailio/kamailio.cfg -P
/var/run/kamailio/kamailio.'.
Program terminated with signal 6, Aborted.
#0 0x00007f5d8556d4f5 in raise () from /lib64/libc.so.6
Missing separate debuginfos, use: debuginfo-install
cyrus-sasl-lib-2.1.23-15.el6_6.2.x86_64 glibc-2.12-1.212.el6.x86_64
keyutils-libs-1.4-5.el6.x86_64 krb5-libs-1.10.3-65.el6.x86_64
libcom_err-1.41.12-24.el6.x86_64 libcurl-7.19.7-53.el6_9.x86_64 libidn-1.18-2.el6.x86_64
libselinux-2.0.94-7.el6.x86_64 libssh2-1.4.2-2.el6_7.1.x86_64
mysql-libs-5.1.73-8.el6_8.x86_64 nspr-4.19.0-1.el6.x86_64 nss-3.36.0-9.el6_10.x86_64
nss-softokn-freebl-3.14.3-23.3.el6_8.x86_64 nss-util-3.36.0-1.el6.x86_64
openldap-2.4.40-16.el6.x86_64 openssl-1.0.1e-58.el6_10.x86_64 zlib-1.2.3-29.el6.x86_64
(gdb) bt
#0 0x00007f5d8556d4f5 in raise () from /lib64/libc.so.6
#1 0x00007f5d8556ecd5 in abort () from /lib64/libc.so.6
#2 0x000000000046a4a6 in del_lump (msg=0x7f5d846cd798, offset=1436, len=29,
type=HDR_OTHER_T) at core/data_lump.c:293
#3 0x00007f5d7e6fd7f5 in alter_rtcp (msg=0x7f5d846cd798, body=0x7fffc60c8600,
oldport=0x7f5d84715500, newport=0x7fffc60c8550) at rtpproxy.c:1229
#4 0x00007f5d7e70ec5d in force_rtp_proxy (msg=0x7f5d846cd798, str1=0x7f5d846af190
"co", str2=0x7fffc60c87f0 "162.221.21.250", offer=1, forcedIP=0) at
rtpproxy.c:2669
#5 0x00007f5d7e705f64 in rtpproxy_manage (msg=0x7f5d846cd798, flags=0x7f5d846af190
"co", ip=0x0) at rtpproxy.c:1862
#6 0x00007f5d7e7064c6 in rtpproxy_manage1 (msg=0x7f5d846cd798, flags=0x7f5d846907f0
"\220\361j\204]\177", ip=0x0) at rtpproxy.c:1904
#7 0x0000000000434f19 in do_action (h=0x7fffc60cae70, a=0x7f5d846b16d8,
msg=0x7f5d846cd798) at core/action.c:1073
#8 0x0000000000441a94 in run_actions (h=0x7fffc60cae70, a=0x7f5d846b16d8,
msg=0x7f5d846cd798) at core/action.c:1564
#9 0x0000000000431663 in do_action (h=0x7fffc60cae70, a=0x7f5d8468ae40,
msg=0x7f5d846cd798) at core/action.c:691
#10 0x0000000000441a94 in run_actions (h=0x7fffc60cae70, a=0x7f5d846848a0,
msg=0x7f5d846cd798) at core/action.c:1564
#11 0x0000000000431663 in do_action (h=0x7fffc60cae70, a=0x7f5d846abca0,
msg=0x7f5d846cd798) at core/action.c:691
#12 0x0000000000441a94 in run_actions (h=0x7fffc60cae70, a=0x7f5d846abca0,
msg=0x7f5d846cd798) at core/action.c:1564
#13 0x0000000000434df4 in do_action (h=0x7fffc60cae70, a=0x7f5d846abdf0,
msg=0x7f5d846cd798) at core/action.c:1058
#14 0x0000000000441a94 in run_actions (h=0x7fffc60cae70, a=0x7f5d846a45f8,
msg=0x7f5d846cd798) at core/action.c:1564
#15 0x0000000000442190 in run_top_route (a=0x7f5d846a45f8, msg=0x7f5d846cd798, c=0x0) at
core/action.c:1646
#16 0x0000000000546d87 in receive_msg (
buf=0x29463b0 "INVITE sip:999@18.12.188.108<mailto:sip%3A999@18.12.188.108>
SIP/2.0\r\nVia: SIP/2.0/TCP 10.0.0.33:49631;branch=z9hG4bK.9XHFYH0zF;rport\r\nFrom:
<sip:RGFLAFL63U@proxy.company.com<mailto:sip%3ARGFLAFL63U@proxy.company.com>>;tag=DcTh-~6~M\r\nTo:
\"Liz - Home Office\" <s"..., len=1432, rcv_info=0x7f5d5e3ae778) at
core/receive.c:340
#17 0x000000000064807d in receive_tcp_msg (
tcpbuf=0x7f5d5e3aea58 "INVITE
sip:999@18.12.188.108<mailto:sip%3A999@18.12.188.108> SIP/2.0\r\nVia: SIP/2.0/TCP
10.0.0.33:49631;branch=z9hG4bK.9XHFYH0zF;rport\r\nFrom:
<sip:RGFLAFL63U@proxy.company.com<mailto:sip%3ARGFLAFL63U@proxy.company.com>>;tag=DcTh-~6~M\r\nTo:
\"Liz - Home Office\" <s"..., len=1432, rcv_info=0x7f5d5e3ae778,
con=0x7f5d5e3ae760) at core/tcp_read.c:1448
#18 0x000000000064a0fd in tcp_read_req (con=0x7f5d5e3ae760, bytes_read=0x7fffc60cb8ac,
read_flags=0x7fffc60cb8a4) at core/tcp_read.c:1631
#19 0x000000000064dcd3 in handle_io (fm=0x7f5d846ecda0, events=1, idx=-1) at
core/tcp_read.c:1862
#20 0x000000000063b7c4 in io_wait_loop_epoll (h=0xacd340, t=2, repeat=0) at
core/io_wait.h:1065
#21 0x000000000064f133 in tcp_receive_loop (unix_sock=51) at core/tcp_read.c:1974
#22 0x00000000006318c8 in tcp_init_children () at core/tcp_main.c:4853
#23 0x0000000000425db5 in main_loop () at main.c:1745
#24 0x000000000042c45e in main (argc=13, argv=0x7fffc60cc0e8) at main.c:2696
(gdb)
CentOS release 6.10 (Final)
version: kamailio 5.2.2 (x86_64/linux) 67f967
flags: STATS: Off, USE_TCP, USE_TLS, USE_SCTP, TLS_HOOKS, USE_RAW_SOCKS, DISABLE_NAGLE,
USE_MCAST, DNS_IP_HACK, SHM_MEM, SHM_MMAP, PKG_MALLOC, Q_MALLOC, F_MALLOC, TLSF_MALLOC,
DBG_SR_MEMORY, USE_FUTEX, FAST_LOCK-ADAPTIVE_WAIT, USE_DNS_CACHE, USE_DNS_FAILOVER,
USE_NAPTR, USE_DST_BLACKLIST, HAVE_RESOLV_RES
ADAPTIVE_WAIT_LOOPS=1024, MAX_RECV_BUFFER_SIZE 262144 MAX_URI_SIZE 1024, BUF_SIZE 65535,
DEFAULT PKG_SIZE 8MB
poll method support: poll, epoll_lt, epoll_et, sigio_rt, select.
id: 67f967
compiled on 11:39:47 Mar 11 2019 with gcc 4.4.7
--
BR,
Denys Pozniak