[SR-Users] CRITICAL: <core> [core/data_lump.c:292]: del_lump(): offset exceeds message size (1436 > 1432) aborting...

Denys Pozniak denys.pozniak at gmail.com
Wed May 27 18:19:44 CEST 2020


Hello!

Could you please check the reason of crash below?

syslog:

kamailio[31738]: CRITICAL: |RGFLAFL63U|<core> [core/data_lump.c:292]:
del_lump(): offset exceeds message size (1436 > 1432) aborting...


gdb ( uri and IP were modified ):

Core was generated by `/usr/sbin/kamailio -f /etc/kamailio/kamailio.cfg -P
/var/run/kamailio/kamailio.'.
Program terminated with signal 6, Aborted.
#0  0x00007f5d8556d4f5 in raise () from /lib64/libc.so.6
Missing separate debuginfos, use: debuginfo-install
cyrus-sasl-lib-2.1.23-15.el6_6.2.x86_64 glibc-2.12-1.212.el6.x86_64
keyutils-libs-1.4-5.el6.x86_64 krb5-libs-1.10.3-65.el6.x86_64
libcom_err-1.41.12-24.el6.x86_64 libcurl-7.19.7-53.el6_9.x86_64
libidn-1.18-2.el6.x86_64 libselinux-2.0.94-7.el6.x86_64
libssh2-1.4.2-2.el6_7.1.x86_64 mysql-libs-5.1.73-8.el6_8.x86_64
nspr-4.19.0-1.el6.x86_64 nss-3.36.0-9.el6_10.x86_64
nss-softokn-freebl-3.14.3-23.3.el6_8.x86_64 nss-util-3.36.0-1.el6.x86_64
openldap-2.4.40-16.el6.x86_64 openssl-1.0.1e-58.el6_10.x86_64
zlib-1.2.3-29.el6.x86_64
(gdb) bt
#0  0x00007f5d8556d4f5 in raise () from /lib64/libc.so.6
#1  0x00007f5d8556ecd5 in abort () from /lib64/libc.so.6
#2  0x000000000046a4a6 in del_lump (msg=0x7f5d846cd798, offset=1436,
len=29, type=HDR_OTHER_T) at core/data_lump.c:293
#3  0x00007f5d7e6fd7f5 in alter_rtcp (msg=0x7f5d846cd798,
body=0x7fffc60c8600, oldport=0x7f5d84715500, newport=0x7fffc60c8550) at
rtpproxy.c:1229
#4  0x00007f5d7e70ec5d in force_rtp_proxy (msg=0x7f5d846cd798,
str1=0x7f5d846af190 "co", str2=0x7fffc60c87f0 "162.221.21.250", offer=1,
forcedIP=0) at rtpproxy.c:2669
#5  0x00007f5d7e705f64 in rtpproxy_manage (msg=0x7f5d846cd798,
flags=0x7f5d846af190 "co", ip=0x0) at rtpproxy.c:1862
#6  0x00007f5d7e7064c6 in rtpproxy_manage1 (msg=0x7f5d846cd798,
flags=0x7f5d846907f0 "\220\361j\204]\177", ip=0x0) at rtpproxy.c:1904
#7  0x0000000000434f19 in do_action (h=0x7fffc60cae70, a=0x7f5d846b16d8,
msg=0x7f5d846cd798) at core/action.c:1073
#8  0x0000000000441a94 in run_actions (h=0x7fffc60cae70, a=0x7f5d846b16d8,
msg=0x7f5d846cd798) at core/action.c:1564
#9  0x0000000000431663 in do_action (h=0x7fffc60cae70, a=0x7f5d8468ae40,
msg=0x7f5d846cd798) at core/action.c:691
#10 0x0000000000441a94 in run_actions (h=0x7fffc60cae70, a=0x7f5d846848a0,
msg=0x7f5d846cd798) at core/action.c:1564
#11 0x0000000000431663 in do_action (h=0x7fffc60cae70, a=0x7f5d846abca0,
msg=0x7f5d846cd798) at core/action.c:691
#12 0x0000000000441a94 in run_actions (h=0x7fffc60cae70, a=0x7f5d846abca0,
msg=0x7f5d846cd798) at core/action.c:1564
#13 0x0000000000434df4 in do_action (h=0x7fffc60cae70, a=0x7f5d846abdf0,
msg=0x7f5d846cd798) at core/action.c:1058
#14 0x0000000000441a94 in run_actions (h=0x7fffc60cae70, a=0x7f5d846a45f8,
msg=0x7f5d846cd798) at core/action.c:1564
#15 0x0000000000442190 in run_top_route (a=0x7f5d846a45f8,
msg=0x7f5d846cd798, c=0x0) at core/action.c:1646
#16 0x0000000000546d87 in receive_msg (
    buf=0x29463b0 "INVITE sip:999 at 18.12.188.108 SIP/2.0\r\nVia: SIP/2.0/TCP
10.0.0.33:49631;branch=z9hG4bK.9XHFYH0zF;rport\r\nFrom: <
sip:RGFLAFL63U at proxy.company.com>;tag=DcTh-~6~M\r\nTo: \"Liz - Home
Office\" <s"..., len=1432, rcv_info=0x7f5d5e3ae778) at core/receive.c:340
#17 0x000000000064807d in receive_tcp_msg (
    tcpbuf=0x7f5d5e3aea58 "INVITE sip:999 at 18.12.188.108 SIP/2.0\r\nVia:
SIP/2.0/TCP 10.0.0.33:49631;branch=z9hG4bK.9XHFYH0zF;rport\r\nFrom: <
sip:RGFLAFL63U at proxy.company.com>;tag=DcTh-~6~M\r\nTo: \"Liz - Home
Office\" <s"..., len=1432, rcv_info=0x7f5d5e3ae778, con=0x7f5d5e3ae760) at
core/tcp_read.c:1448
#18 0x000000000064a0fd in tcp_read_req (con=0x7f5d5e3ae760,
bytes_read=0x7fffc60cb8ac, read_flags=0x7fffc60cb8a4) at
core/tcp_read.c:1631
#19 0x000000000064dcd3 in handle_io (fm=0x7f5d846ecda0, events=1, idx=-1)
at core/tcp_read.c:1862
#20 0x000000000063b7c4 in io_wait_loop_epoll (h=0xacd340, t=2, repeat=0) at
core/io_wait.h:1065
#21 0x000000000064f133 in tcp_receive_loop (unix_sock=51) at
core/tcp_read.c:1974
#22 0x00000000006318c8 in tcp_init_children () at core/tcp_main.c:4853
#23 0x0000000000425db5 in main_loop () at main.c:1745
#24 0x000000000042c45e in main (argc=13, argv=0x7fffc60cc0e8) at main.c:2696
(gdb)



CentOS release 6.10 (Final)

version: kamailio 5.2.2 (x86_64/linux) 67f967
flags: STATS: Off, USE_TCP, USE_TLS, USE_SCTP, TLS_HOOKS, USE_RAW_SOCKS,
DISABLE_NAGLE, USE_MCAST, DNS_IP_HACK, SHM_MEM, SHM_MMAP, PKG_MALLOC,
Q_MALLOC, F_MALLOC, TLSF_MALLOC, DBG_SR_MEMORY, USE_FUTEX,
FAST_LOCK-ADAPTIVE_WAIT, USE_DNS_CACHE, USE_DNS_FAILOVER, USE_NAPTR,
USE_DST_BLACKLIST, HAVE_RESOLV_RES
ADAPTIVE_WAIT_LOOPS=1024, MAX_RECV_BUFFER_SIZE 262144 MAX_URI_SIZE 1024,
BUF_SIZE 65535, DEFAULT PKG_SIZE 8MB
poll method support: poll, epoll_lt, epoll_et, sigio_rt, select.
id: 67f967
compiled on 11:39:47 Mar 11 2019 with gcc 4.4.7


-- 

BR,
Denys Pozniak
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.kamailio.org/pipermail/sr-users/attachments/20200527/ff035d4e/attachment.html>


More information about the sr-users mailing list