[SR-Users] out of shm without any visible reason

Juha Heinanen jh at tutpro.com
Wed Mar 4 22:18:12 CET 2020


Daniel-Constantin Mierla writes:

> If you can reproduce it, watch what the timer processes do during that
> time frame. Get the list of processes with 'kamctl ps', then when the
> issue is exposed, grab the backtraces of all processes with:
> 
> kamctl trap
> 
> A file is created with the backtraces taken with gdb. Sent it over here
> to analyze, if you cannot spot an issue there.

Will do that.  Now it happened that K crashed when tm.clean was given at
the time when the number transactions was growing. Below is backtrace of
that crash.

-- Juha

-------------------------------
(gdb) bt full
#0  0x00007f5151fa3cf8 in tm_clean_lifetime () at h_table.c:617
        r = 53487
        tcell = 0x0
        texp = 1117017528
#1  0x00007f5151fe1afd in tm_rpc_clean (rpc=0x7f51513b0a00 <func_param>, c=0x7f51513b0920 <_jsonrpc_ctx_global>) at t_stats.c:299
No locals.
#2  0x00007f515138fc9f in jsonrpc_dispatch (msg=0x7fff3d1dc210, s1=0x0, s2=0x0) at jsonrpcs_mod.c:1294
        rpce = 0x7f5152dcf360
        ctx = 0x7f51513b0920 <_jsonrpc_ctx_global>
        ret = 0
        nj = 0x0
        val = {s = 0x557bb08fe9d0 "tm.clean", len = 8}
        __func__ = "jsonrpc_dispatch"
#3  0x0000557bae5c28b5 in do_action (h=0x7fff3d1dc130, a=0x7f51537ebd30, msg=0x7fff3d1dc210) at core/action.c:1073
        ret = -5
        v = 1390957541
        dst = {send_sock = 0xc00000, to = {s = {sa_family = 6, sa_data = "\000\000\000\000\000\000\220\270\035=\377\177\000"}, sin = {sin_family = 6, sin_port = 0, sin_addr = {s_addr = 0}, sin_zero = "\220\270\035=\377\177\000"}, sin6 = {sin6_family = 6, sin6_port = 0, 
              sin6_flowinfo = 0, sin6_addr = {__in6_u = {__u6_addr8 = "\220\270\035=\377\177\000\000\000\b\302\tv\223\062\213", __u6_addr16 = {47248, 15645, 32767, 0, 2048, 2498, 37750, 35634}, __u6_addr32 = {1025357968, 32767, 163710976, 2335347574}}}, 
              sin6_scope_id = 1025358088}}, id = 32767, send_flags = {f = 50272, blst_imask = 21212}, proto = 81 'Q', proto_pad0 = 127 '\177', proto_pad1 = 0}
        tmp = 0x7f5152ab3c1e "H\205\300\177\345ƃ\224"
        new_uri = 0x7f51537e9da8 ""
        end = 0x7fff3d1dc210 "\255\004"
        crt = 0x557bb08fc931 "ip_proxy_cache"
        cmd = 0x7f5152dd27c0
        len = 4
        user = 0
        uri = {user = {s = 0x7fff3d1db580 "\340\265\035=\377\177", len = 1390199904}, passwd = {s = 0x557bae7f69e3 "INFO", len = -1368709420}, host = {s = 0x7fff3d1db5a0 "", len = 1389801488}, port = {s = 0x7fff3d1db640 "\320\006", len = 1389801488}, params = {
            s = 0x7fff3d1db5e0 "\020\266\035=\377\177", len = 1356175867}, sip_params = {s = 0x7fff3d1db7f0 "", len = 0}, headers = {s = 0xc00000 <error: Cannot access memory at address 0xc00000>, len = 1260448}, port_no = 56128, proto = 159, type = ERROR_URI_T, 
          flags = (unknown: 11322464), transport = {s = 0xb7fab0 <error: Cannot access memory at address 0xb7fab0>, len = 16}, ttl = {s = 0x11e <error: Cannot access memory at address 0x11e>, len = 163710976}, user_param = {s = 0x7fff3d1db610 "\220\266\035=\377\177", 
            len = -1370752186}, maddr = {s = 0x0, len = 0}, method = {s = 0x7f5153158560 "\320\006", len = 0}, lr = {s = 0x7fff3d1db690 "\360\266\035=\377\177", len = -1368723422}, r2 = {s = 0x7f51531531f0 "\002", len = 1389801488}, gr = {s = 0x7f51537ea518 "\002", 
            len = 1393897952}, transport_val = {s = 0x6d0 <error: Cannot access memory at address 0x6d0>, len = 1389801488}, ttl_val = {s = 0x7f51531530d0 <incomplete sequence \360>, len = 1393899728}, user_param_val = {s = 0x7f51531531f8 ">5\025SQ\177", len = 1390199904}, 
          maddr_val = {s = 0x557bae7f69e3 "INFO", len = 536870912}, method_val = {s = 0xc00000 <error: Cannot access memory at address 0xc00000>, len = 6}, lr_val = {s = 0x7fff3d1db6f0 "P\267\035=\377\177", len = -1371351967}, r2_val = {s = 0x7fff3d1dc210 "\255\004", 
            len = 1400808728}, gr_val = {s = 0x7fff3d1db730 "\220\267\035=\377\177", len = 163710976}}
        next_hop = {user = {s = 0x0, len = 1390199904}, passwd = {s = 0x557bae7f69e3 "INFO", len = 536870912}, host = {s = 0xc00000 <error: Cannot access memory at address 0xc00000>, len = 6}, port = {s = 0x7fff3d1db750 "", len = -1371324103}, params = {
            s = 0x7fff3d1db7f0 "", len = 1400806792}, sip_params = {s = 0x19000017ac <error: Cannot access memory at address 0x19000017ac>, len = 1400808728}, headers = {s = 0x7fff3d1dc210 "\255\004", len = -1369366375}, port_no = 46992, proto = 15645, type = 32767, 
          flags = (unknown: 1390199904), transport = {s = 0x557bae7f69e3 "INFO", len = 536870912}, ttl = {s = 0xc00000 <error: Cannot access memory at address 0xc00000>, len = 6}, user_param = {s = 0x7fff3d1db8a0 "\340\271\035=\377\177", len = -1371320250}, maddr = {
            s = 0x557bae7f69e3 "INFO", len = 536870912}, method = {s = 0xc00000 <error: Cannot access memory at address 0xc00000>, len = 6}, lr = {s = 0x7fff3d1db7f0 "", len = 1387308127}, r2 = {s = 0x7f51537eac00 "\031", len = 1025358088}, gr = {
            s = 0x7fff3d1dc210 "\255\004", len = 1025360176}, transport_val = {s = 0x17ac3d1db7f0 <error: Cannot access memory at address 0x17ac3d1db7f0>, len = 6060}, ttl_val = {s = 0x557bae7f69e3 "INFO", len = 536870912}, user_param_val = {s = 0x7f51537e9d88 "\a", 
            len = 1400808728}, maddr_val = {s = 0x0, len = 0}, method_val = {s = 0x0, len = 0}, lr_val = {s = 0x557bae95a842 <ut_buf_int2str+18> "976", len = 1398451376}, r2_val = {s = 0x7fff3d1db900 "\360\275\331R\001", len = 1390350000}, gr_val = {s = 0x0, 
            len = 1390199904}}
        u = 0x7f5152abbc8d
        port = 21269
        dst_host = 0x7fff3d1db7f8
        i = 0
        flags = 32593
        avp = 0x7fff3d1db4f8
        st = {flags = 1400806800, id = 32593, name = {n = 1025360400, s = {s = 0x7fff3d1dc210 "\255\004", len = 1025357344}, re = 0x7fff3d1dc210}, avp = 0x557b00000000}
        sct = 0x7f51511a819b <pv_get_huri+69>
        sjt = 0x7f5153164bb0
        rve = 0x7fff3d1dc248
        mct = 0x7fff3d1db7f8
        rv = 0x7fff3d1db4d0
        rv1 = 0x7f5152dcc4a0
        c1 = {cache_type = 2927585763, val_type = 21883, c = {avp_val = {n = 536870912, s = {s = 0x20000000 <error: Cannot access memory at address 0x20000000>, len = 12582912}, re = 0x20000000}, pval = {rs = {
                s = 0x20000000 <error: Cannot access memory at address 0x20000000>, len = 12582912}, ri = 6, flags = 0}}, i2s = "\340\271\035=\377\177\000\000\242KC\256{U\000\000\000\000\300\000\000"}
        s = {s = 0x7f51537e9da8 "", len = 1025360400}
        srevp = {0x557bae7f69e3, 0x20000000}
        evp = {data = 0x0, rcv = 0x0, dst = 0x0}
        mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {
            type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {
              number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, 
              str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}}
        __func__ = "do_action"
#4  0x0000557bae5d0626 in run_actions (h=0x7fff3d1dc130, a=0x7f51537eba80, msg=0x7fff3d1dc210) at core/action.c:1578
        t = 0x7f51537ebd30
        ret = 1
        tvb = {tv_sec = 0, tv_usec = 0}
        tve = {tv_sec = 0, tv_usec = 0}
        tz = {tz_minuteswest = 21, tz_dsttime = 0}
        tdiff = 2962221528
        __func__ = "run_actions"
#5  0x0000557bae5c2821 in do_action (h=0x7fff3d1dc130, a=0x7f51537ebf50, msg=0x7fff3d1dc210) at core/action.c:1064
--Type <RET> for more, q to quit, c to continue without paging--
        ret = 1
        v = 1
        dst = {send_sock = 0x7f5153027c10, to = {s = {sa_family = 2048, sa_data = "\302\tv\223\062\213y\237\037QQ\177\000"}, sin = {sin_family = 2048, sin_port = 2498, sin_addr = {s_addr = 2335347574}, sin_zero = "y\237\037QQ\177\000"}, sin6 = {sin6_family = 2048, 
              sin6_port = 2498, sin6_flowinfo = 2335347574, sin6_addr = {__in6_u = {__u6_addr8 = "y\237\037QQ\177\000\000\017\000\000\000Q\177\000", __u6_addr16 = {40825, 20767, 32593, 0, 15, 0, 32593, 0}, __u6_addr32 = {1361026937, 32593, 15, 32593}}}, 
              sin6_scope_id = 2927585763}}, id = 4, send_flags = {f = 39616, blst_imask = 44675}, proto = 123 '{', proto_pad0 = 85 'U', proto_pad1 = 0}
        tmp = 0x500000000 <error: Cannot access memory at address 0x500000000>
        new_uri = 0x7fff3d1dc2b0 ""
        end = 0x7f5152d38eda ""
        crt = 0x0
        cmd = 0x7f5153b25fa0 <_IO_strn_jumps>
        len = 21
        user = 32593
        uri = {user = {s = 0x4009e6720 <error: Cannot access memory at address 0x4009e6720>, len = -1367595136}, passwd = {s = 0x7fff3d1dbcc8 "\"\027q\256{U", len = 163710976}, host = {s = 0x557bae95a830 <ut_buf_int2str> "", len = 0}, port = {
            s = 0xd68 <error: Cannot access memory at address 0xd68>, len = 17}, params = {s = 0x0, len = 1390199904}, sip_params = {s = 0x557bae7f69e3 "INFO", len = 536870912}, headers = {s = 0xc00000 <error: Cannot access memory at address 0xc00000>, len = 1025359116}, 
          port_no = 48352, proto = 15645, type = URN_URI_T, flags = (URI_USER_NORMALIZE | URI_SIP_USER_PHONE | unknown: 1390957584), transport = {s = 0x43d1dbd3c <error: Cannot access memory at address 0x43d1dbd3c>, len = -1412931264}, ttl = {
            s = 0x7f5152e85418 "\r\nHost: x.x.x.x:6060\r\nAccept: */*\r\nContent-type: application/json\r\nContent-length: 38\r\n\r\n{\"jsonrpc\":\"2.0\", \"method\":\"tm.clean\"}", len = 1390957592}, user_param = {s = 0x7fff3d1dbe50 "p\277\035=\377\177", 
            len = -1368320222}, maddr = {s = 0x557bae95a842 <ut_buf_int2str+18> "976", len = 163710976}, method = {s = 0x7fff3d1dbd00 "P\275\035=\377\177", len = 1393988016}, lr = {s = 0x7f5152e8549d "", len = 1390957561}, r2 = {s = 0x7fff3d1dbd50 "\260\275\035=\377\177", 
            len = 84243696}, gr = {s = 0x37500000000 <error: Cannot access memory at address 0x37500000000>, len = 1025359520}, transport_val = {s = 0x7f51537eccf8 "", len = -1368709420}, ttl_val = {s = 0x7fff3d1dbd70 "", len = 1389801488}, user_param_val = {
            s = 0x557bae95a842 <ut_buf_int2str+18> "976", len = 1389801488}, maddr_val = {s = 0x7fff3d1dbdb0 "\340\275\035=\377\177", len = 1356175867}, method_val = {s = 0x4ae7f69e3 <error: Cannot access memory at address 0x4ae7f69e3>, len = 0}, lr_val = {
            s = 0xc00000 <error: Cannot access memory at address 0xc00000>, len = 1260448}, r2_val = {s = 0x9fdb40 <error: Cannot access memory at address 0x9fdb40>, len = 11322464}, gr_val = {s = 0xb7fab0 <error: Cannot access memory at address 0xb7fab0>, len = 16}}
        next_hop = {user = {s = 0x11e <error: Cannot access memory at address 0x11e>, len = 163710976}, passwd = {s = 0x7fff3d1dbde0 "P\276\035=\377\177", len = -1370752186}, host = {s = 0x0, len = 384}, port = {s = 0x7f51531692a0 <incomplete sequence \360>, len = 0}, 
          params = {s = 0x7fff3d1dbe50 "p\277\035=\377\177", len = -1368726502}, sip_params = {s = 0xf0 <error: Cannot access memory at address 0xf0>, len = 1390957594}, headers = {s = 0x0, len = 1393988016}, port_no = 37280, proto = 21270, type = 32593, 
          flags = (unknown: 163710976), transport = {s = 0xb7fab0 <error: Cannot access memory at address 0xb7fab0>, len = 1390199904}, ttl = {s = 0x557bae7f69e3 "INFO", len = 536870912}, user_param = {s = 0xc00000 <error: Cannot access memory at address 0xc00000>, 
            len = 6}, maddr = {s = 0x7fff3d1dbf70 "\020\300\035=\377\177", len = -1368302309}, method = {s = 0x7f51531d2600 "\006", len = 1389801488}, lr = {s = 0x7fff3d1dbed0 "", len = 1356175867}, r2 = {s = 0x10 <error: Cannot access memory at address 0x10>, len = 0}, 
          gr = {s = 0xc00000 <error: Cannot access memory at address 0xc00000>, len = 1392671776}, transport_val = {s = 0x7f5152e8549d "", len = 1390957556}, ttl_val = {s = 0xb7fab0 <error: Cannot access memory at address 0xb7fab0>, len = 16}, user_param_val = {
            s = 0x11e <error: Cannot access memory at address 0x11e>, len = 163710976}, maddr_val = {s = 0x7fff3d1dbf00 "p\277\035=\001", len = -1370752186}, method_val = {s = 0x0, len = 0}, lr_val = {s = 0x7f5152d6b0f0 "", len = 0}, r2_val = {
            s = 0x400000013d1dbf70 <error: Cannot access memory at address 0x400000013d1dbf70>, len = 1025360400}, gr_val = {
            s = 0x7f5152e8541a "Host: x.x.x.x:6060\r\nAccept: */*\r\nContent-type: application/json\r\nContent-length: 38\r\n\r\n{\"jsonrpc\":\"2.0\", \"method\":\"tm.clean\"}", len = 1393988016}}
        u = 0x7f512ecf128c
        port = 21250
        dst_host = 0xe
        i = 1
        flags = 0
        avp = 0x557bae7f69e3
        st = {flags = 0, id = 0, name = {n = 4, s = {s = 0x4 <error: Cannot access memory at address 0x4>, len = 0}, re = 0x4}, avp = 0x10}
        sct = 0x7f51539be112 <_IO_vfprintf_internal+1826>
        sjt = 0x557bae7f69e3
        rve = 0x7f51537eb2f0
        mct = 0x7f5152de7980
        rv = 0x0
        rv1 = 0x7fff3d1dc140
        c1 = {cache_type = 12582912, val_type = RV_NONE, c = {avp_val = {n = 163710976, s = {s = 0x8b32937609c20800 <error: Cannot access memory at address 0x8b32937609c20800>, len = 1025359888}, re = 0x8b32937609c20800}, pval = {rs = {
                s = 0x8b32937609c20800 <error: Cannot access memory at address 0x8b32937609c20800>, len = 1025359888}, ri = -1368282998, flags = 21883}}, i2s = "\022\000\000\000\000\000\000\000\020\000\000\000\000\000\000\000\002\000\000\000\000"}
        s = {s = 0x1352 <error: Cannot access memory at address 0x1352>, len = 0}
        srevp = {0xab00000004, 0x0}
        evp = {data = 0x0, rcv = 0x0, dst = 0x0}
        mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {
            type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {
              number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, 
              str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}}
        __func__ = "do_action"
#6  0x0000557bae5d0626 in run_actions (h=0x7fff3d1dc130, a=0x7f51537e7400, msg=0x7fff3d1dc210) at core/action.c:1578
        t = 0x7f51537ebf50
        ret = 1
        tvb = {tv_sec = 0, tv_usec = 0}
        tve = {tv_sec = 0, tv_usec = 0}
        tz = {tz_minuteswest = 1025360400, tz_dsttime = 32767}
        tdiff = 0
        __func__ = "run_actions"
#7  0x00007f51511a943e in xhttp_process_request (orig_msg=0x7f5153876780, 
    new_buf=0x7f5152e853e0 "POST /RPC HTTP/1.1\r\nVia: SIP/2.0/TCP X.X.X.X:43976\r\nHost: x.x.x.x:6060\r\nAccept: */*\r\nContent-type: application/json\r\nContent-length: 38\r\n\r\n{\"jsonrpc\":\"2.0\", \"method\":\"tm.clean\"}", new_len=189) at xhttp_mod.c:296
        ret = 0
        backup_rt = 1
        tmp_msg = {id = 1197, pid = 0, tval = {tv_sec = 0, tv_usec = 0}, fwd_send_flags = {f = 0, blst_imask = 0}, rpl_send_flags = {f = 3, blst_imask = 0}, first_line = {type = 1, flags = 2, len = 20, u = {request = {method = {
                  s = 0x7f5152e853e0 "POST /RPC HTTP/1.1\r\nVia: SIP/2.0/TCP X.X.X.X:43976\r\nHost: x.x.x.x:6060\r\nAccept: */*\r\nContent-type: application/json\r\nContent-length: 38\r\n\r\n{\"jsonrpc\":\"2.0\", \"method\":\"tm.clean\"}", len = 4}, uri = {
                  s = 0x7f5152e853e5 "/RPC HTTP/1.1\r\nVia: SIP/2.0/TCP X.X.X.X:43976\r\nHost: x.x.x.x:6060\r\nAccept: */*\r\nContent-type: application/json\r\nContent-length: 38\r\n\r\n{\"jsonrpc\":\"2.0\", \"method\":\"tm.clean\"}", len = 4}, version = {
                  s = 0x7f5152e853ea "HTTP/1.1\r\nVia: SIP/2.0/TCP X.X.X.X:43976\r\nHost: x.x.x.x:6060\r\nAccept: */*\r\nContent-type: application/json\r\nContent-length: 38\r\n\r\n{\"jsonrpc\":\"2.0\", \"method\":\"tm.clean\"}", len = 8}, 
                method_value = 65536}, reply = {version = {
                  s = 0x7f5152e853e0 "POST /RPC HTTP/1.1\r\nVia: SIP/2.0/TCP X.X.X.X:43976\r\nHost: x.x.x.x:6060\r\nAccept: */*\r\nContent-type: application/json\r\nContent-length: 38\r\n\r\n{\"jsonrpc\":\"2.0\", \"method\":\"tm.clean\"}", len = 4}, status = {
                  s = 0x7f5152e853e5 "/RPC HTTP/1.1\r\nVia: SIP/2.0/TCP X.X.X.X:43976\r\nHost: x.x.x.x:6060\r\nAccept: */*\r\nContent-type: application/json\r\nContent-length: 38\r\n\r\n{\"jsonrpc\":\"2.0\", \"method\":\"tm.clean\"}", len = 4}, reason = {
                  s = 0x7f5152e853ea "HTTP/1.1\r\nVia: SIP/2.0/TCP X.X.X.X:43976\r\nHost: x.x.x.x:6060\r\nAccept: */*\r\nContent-type: application/json\r\nContent-length: 38\r\n\r\n{\"jsonrpc\":\"2.0\", \"method\":\"tm.clean\"}", len = 8}, 
                statuscode = 65536}}}, via1 = 0x7f51531691b0, via2 = 0x0, headers = 0x7f5153027c20, last_header = 0x7f51531ae720, parsed_flag = 18446744073709551615, h_via1 = 0x7f5153027c20, h_via2 = 0x0, callid = 0x0, to = 0x0, cseq = 0x0, from = 0x0, contact = 0x0, 
--Type <RET> for more, q to quit, c to continue without paging--
          maxforwards = 0x0, route = 0x0, record_route = 0x0, content_type = 0x7f51531ae6c0, content_length = 0x7f51531ae720, authorization = 0x0, expires = 0x0, proxy_auth = 0x0, supported = 0x0, require = 0x0, proxy_require = 0x0, unsupported = 0x0, allow = 0x0, 
          event = 0x0, accept = 0x7f51531bb9f0, accept_language = 0x0, organization = 0x0, priority = 0x0, subject = 0x0, user_agent = 0x0, server = 0x0, content_disposition = 0x0, diversion = 0x0, rpid = 0x0, refer_to = 0x0, session_expires = 0x0, min_se = 0x0, 
          sipifmatch = 0x0, subscription_state = 0x0, date = 0x0, identity = 0x0, identity_info = 0x0, pai = 0x0, ppi = 0x0, path = 0x0, privacy = 0x0, min_expires = 0x0, body = 0x0, eoh = 0x7f5152e85475 "\r\n{\"jsonrpc\":\"2.0\", \"method\":\"tm.clean\"}", 
          unparsed = 0x7f5152e85475 "\r\n{\"jsonrpc\":\"2.0\", \"method\":\"tm.clean\"}", rcv = {src_ip = {af = 2, len = 4, u = {addrl = {362853934, 0}, addr32 = {362853934, 0, 0, 0}, addr16 = {46638, 5536, 0, 0, 0, 0, 0, 0}, 
                addr = ".\266\240\025", '\000' <repeats 11 times>}}, dst_ip = {af = 2, len = 4, u = {addrl = {346076718, 0}, addr32 = {346076718, 0, 0, 0}, addr16 = {46638, 5280, 0, 0, 0, 0, 0, 0}, addr = ".\266\240\024", '\000' <repeats 11 times>}}, src_port = 43976, 
            dst_port = 6060, proto_reserved1 = 1262, proto_reserved2 = 0, src_su = {s = {sa_family = 2, sa_data = "\253\310.\266\240\025\000\000\000\000\000\000\000"}, sin = {sin_family = 2, sin_port = 51371, sin_addr = {s_addr = 362853934}, 
                sin_zero = "\000\000\000\000\000\000\000"}, sin6 = {sin6_family = 2, sin6_port = 51371, sin6_flowinfo = 362853934, sin6_addr = {__in6_u = {__u6_addr8 = "\000\000\000\000\000\000\000\000\060\317\035=\377\177\000", __u6_addr16 = {0, 0, 0, 0, 53040, 15645, 
                      32767, 0}, __u6_addr32 = {0, 0, 1025363760, 32767}}}, sin6_scope_id = 0}}, bind_address = 0x7f5152dcc460, proto = 2 '\002', proto_pad0 = 0 '\000', proto_pad1 = 0}, 
          buf = 0x7f5152e853e0 "POST /RPC HTTP/1.1\r\nVia: SIP/2.0/TCP X.X.X.X:43976\r\nHost: x.x.x.x:6060\r\nAccept: */*\r\nContent-type: application/json\r\nContent-length: 38\r\n\r\n{\"jsonrpc\":\"2.0\", \"method\":\"tm.clean\"}", len = 189, new_uri = {
            s = 0x0, len = 0}, dst_uri = {s = 0x0, len = 0}, parsed_uri_ok = 0, parsed_uri = {user = {s = 0x0, len = 0}, passwd = {s = 0x0, len = 0}, host = {s = 0x0, len = 0}, port = {s = 0x0, len = 0}, params = {s = 0x0, len = 0}, sip_params = {s = 0x0, len = 0}, 
            headers = {s = 0x0, len = 0}, port_no = 0, proto = 0, type = ERROR_URI_T, flags = (unknown: 0), transport = {s = 0x0, len = 0}, ttl = {s = 0x0, len = 0}, user_param = {s = 0x0, len = 0}, maddr = {s = 0x0, len = 0}, method = {s = 0x0, len = 0}, lr = {s = 0x0, 
              len = 0}, r2 = {s = 0x0, len = 0}, gr = {s = 0x0, len = 0}, transport_val = {s = 0x0, len = 0}, ttl_val = {s = 0x0, len = 0}, user_param_val = {s = 0x0, len = 0}, maddr_val = {s = 0x0, len = 0}, method_val = {s = 0x0, len = 0}, lr_val = {s = 0x0, len = 0}, 
            r2_val = {s = 0x0, len = 0}, gr_val = {s = 0x0, len = 0}}, parsed_orig_ruri_ok = 0, parsed_orig_ruri = {user = {s = 0x0, len = 0}, passwd = {s = 0x0, len = 0}, host = {s = 0x0, len = 0}, port = {s = 0x0, len = 0}, params = {s = 0x0, len = 0}, sip_params = {
              s = 0x0, len = 0}, headers = {s = 0x0, len = 0}, port_no = 0, proto = 0, type = ERROR_URI_T, flags = (unknown: 0), transport = {s = 0x0, len = 0}, ttl = {s = 0x0, len = 0}, user_param = {s = 0x0, len = 0}, maddr = {s = 0x0, len = 0}, method = {s = 0x0, 
              len = 0}, lr = {s = 0x0, len = 0}, r2 = {s = 0x0, len = 0}, gr = {s = 0x0, len = 0}, transport_val = {s = 0x0, len = 0}, ttl_val = {s = 0x0, len = 0}, user_param_val = {s = 0x0, len = 0}, maddr_val = {s = 0x0, len = 0}, method_val = {s = 0x0, len = 0}, 
            lr_val = {s = 0x0, len = 0}, r2_val = {s = 0x0, len = 0}, gr_val = {s = 0x0, len = 0}}, add_rm = 0x0, body_lumps = 0x0, reply_lump = 0x0, add_to_branch_s = '\000' <repeats 57 times>, add_to_branch_len = 0, hash_index = 0, msg_flags = 0, flags = 0, xflags = {0, 
            0}, set_global_address = {s = 0x0, len = 0}, set_global_port = {s = 0x0, len = 0}, force_send_socket = 0x0, path_vec = {s = 0x0, len = 0}, instance = {s = 0x0, len = 0}, reg_id = 0, ruid = {s = 0x0, len = 0}, location_ua = {s = 0x0, len = 0}, otcpid = 0, ldv = {
            flow = {decoded = 0, rcv = {src_ip = {af = 0, len = 0, u = {addrl = {0, 0}, addr32 = {0, 0, 0, 0}, addr16 = {0, 0, 0, 0, 0, 0, 0, 0}, addr = '\000' <repeats 15 times>}}, dst_ip = {af = 0, len = 0, u = {addrl = {0, 0}, addr32 = {0, 0, 0, 0}, addr16 = {0, 0, 0, 
                      0, 0, 0, 0, 0}, addr = '\000' <repeats 15 times>}}, src_port = 0, dst_port = 0, proto_reserved1 = 0, proto_reserved2 = 0, src_su = {s = {sa_family = 0, sa_data = '\000' <repeats 13 times>}, sin = {sin_family = 0, sin_port = 0, sin_addr = {s_addr = 0}, 
                    sin_zero = "\000\000\000\000\000\000\000"}, sin6 = {sin6_family = 0, sin6_port = 0, sin6_flowinfo = 0, sin6_addr = {__in6_u = {__u6_addr8 = '\000' <repeats 15 times>, __u6_addr16 = {0, 0, 0, 0, 0, 0, 0, 0}, __u6_addr32 = {0, 0, 0, 0}}}, 
                    sin6_scope_id = 0}}, bind_address = 0x0, proto = 0 '\000', proto_pad0 = 0 '\000', proto_pad1 = 0}}}}
        msg = 0x7fff3d1dc210
        ra_ctx = {rec_lev = 2, run_flags = 0, last_retcode = 1, jmp_env = {{__jmpbuf = {139987259278432, -6960915947526443003, 93989696924131, 536870912, 12582912, 6, -6960915947698409467, -3860432251912212475}, __mask_was_saved = 0, __saved_mask = {__val = {
                  18446744073709551615, 0, 4, 93986769338368, 16, 12582944, 140734218749576, 3617854161208475648, 0, 0, 139987273275232, 139987269897424, 139987258674898, 11, 139987258674898, 139987227742213}}}}}
        keng = 0x0
        evrtname = {s = 0x7f51511b1598 "xhttp:request", len = 13}
        __func__ = "xhttp_process_request"
#8  0x00007f51511aac55 in xhttp_handler (msg=0x7f5153876780) at xhttp_mod.c:383
        ret = 0
        fake_msg = 0x7f5152e853e0 "POST /RPC HTTP/1.1\r\nVia: SIP/2.0/TCP X.X.X.X:43976\r\nHost: X.X.X.X:6060\r\nAccept: */*\r\nContent-type: application/json\r\nContent-length: 38\r\n\r\n{\"jsonrpc\":\"2.0\", \"method\":\"tm.clean\"}"
        fake_msg_len = 189
        pmatch = {rm_so = 1025362464, rm_eo = 32767}
        c = 83 'S'
        __func__ = "xhttp_handler"
#9  0x0000557bae559a24 in nonsip_msg_run_hooks (msg=0x7f5153876780) at core/nonsip_hooks.c:112
        r = 0
        ret = 0
#10 0x0000557bae5d6720 in receive_msg (buf=0x557bb08fee80 "POST /RPC HTTP/1.1\r\nHost: X.X.X.X:6060\r\nAccept: */*\r\nContent-type: application/json\r\nContent-length: 38\r\n\r\n{\"jsonrpc\":\"2.0\", \"method\":\"tm.clean\"}", len=151, rcv_info=0x7f512fe42828)
    at core/receive.c:348
        msg = 0x7f5153876780
        ctx = {rec_lev = 4, run_flags = 0, last_retcode = 803482386, jmp_env = {{__jmpbuf = {8, 65536, 27, 0, 140734218751644, 139986672560144, 7, 70364449210396}, __mask_was_saved = 121, __saved_mask = {__val = {10030241455286650880, 65535, 139986672560144, 
                  93989696924131, 536870912, 12582912, 6, 140734218751232, 93989695295308, 519691042940, 2, 0, 65535, 140734218751644, 139986672560144, 18446744073709551536}}}}}
        bctx = 0x7fff3d1dcc10
        ret = 0
        tvb = {tv_sec = 140734218751644, tv_usec = 139986672560904}
        tve = {tv_sec = 139986672560144, tv_usec = 139986672560144}
        tz = {tz_minuteswest = -1369026089, tz_dsttime = 21883}
        diff = 0
        inb = {s = 0x557bb08fee80 "POST /RPC HTTP/1.1\r\nHost: X.X.X.X:6060\r\nAccept: */*\r\nContent-type: application/json\r\nContent-length: 38\r\n\r\n{\"jsonrpc\":\"2.0\", \"method\":\"tm.clean\"}", len = 151}
        netinfo = {data = {s = 0x1400020001 <error: Cannot access memory at address 0x1400020001>, len = 803482376}, rcv = 0x4, dst = 0x7f512fe42b0d}
        keng = 0x0
        evp = {data = 0x7fff3d1dcb30, rcv = 0x7f512fe42828, dst = 0x0}
        cidlockidx = 0
        cidlockset = 0
        errsipmsg = 0
        exectime = 0
        __func__ = "receive_msg"
#11 0x0000557bae670357 in receive_tcp_msg (tcpbuf=0x7f512fe42b08 "POST /RPC HTTP/1.1\r\nHost: X.X.X.X:6060\r\nAccept: */*\r\nContent-type: application/json\r\nContent-length: 38\r\n\r\n{\"jsonrpc\":\"2.0\", \"method\":\"tm.clean\"}", len=151, rcv_info=0x7f512fe42828, 
    con=0x7f512fe42810) at core/tcp_read.c:1448
        buf = 0x557bb08fee80 "POST /RPC HTTP/1.1\r\nHost: X.X.X.X:6060\r\nAccept: */*\r\nContent-type: application/json\r\nContent-length: 38\r\n\r\n{\"jsonrpc\":\"2.0\", \"method\":\"tm.clean\"}"
        bsize = 65535
        blen = 65535
        __func__ = "receive_tcp_msg"
#12 0x0000557bae6725f3 in tcp_read_req (con=0x7f512fe42810, bytes_read=0x7fff3d1dce98, read_flags=0x7fff3d1dce9c) at core/tcp_read.c:1631
        bytes = 151
        total_bytes = 151
        resp = 1
        size = 24
        req = 0x7f512fe42890
        dst = {send_sock = 0x0, to = {s = {sa_family = 61136, sa_data = "\342/Q\177\000\000\330\316\035=\377\177\000"}, sin = {sin_family = 61136, sin_port = 12258, sin_addr = {s_addr = 32593}, sin_zero = "\330\316\035=\377\177\000"}, sin6 = {sin6_family = 61136, 
              sin6_port = 12258, sin6_flowinfo = 32593, sin6_addr = {__in6_u = {__u6_addr8 = "\330\316\035=\377\177\000\000\b\000\000\000\000\000\000", __u6_addr16 = {52952, 15645, 32767, 0, 8, 0, 0, 0}, __u6_addr32 = {1025363672, 32767, 8, 0}}}, sin6_scope_id = 20}}, 
          id = 0, send_flags = {f = 1, blst_imask = 0}, proto = 1 '\001', proto_pad0 = 0 '\000', proto_pad1 = 0}
--Type <RET> for more, q to quit, c to continue without paging--
        c = 49 '1'
        ret = 1025363424
        __func__ = "tcp_read_req"
#13 0x0000557bae6755a2 in handle_io (fm=0x7f5152db1498, events=1, idx=-1) at core/tcp_read.c:1804
        ret = 8
        n = 8
        read_flags = 1
        con = 0x7f512fe42810
        s = 28
        resp = -2
        t = 1117018954
        __func__ = "handle_io"
#14 0x0000557bae662ba9 in io_wait_loop_epoll (h=0x557bae90ad00 <io_w>, t=2, repeat=0) at core/io_wait.h:1062
        n = 1
        r = 0
        fm = 0x7f5152db1498
        revents = 1
        __func__ = "io_wait_loop_epoll"
#15 0x0000557bae6775f5 in tcp_receive_loop (unix_sock=59) at core/tcp_read.c:1974
        __func__ = "tcp_receive_loop"
#16 0x0000557bae51044a in tcp_init_children () at core/tcp_main.c:5174
        r = 8
        i = 7
        reader_fd_1 = 59
        pid = 0
        si_desc = "tcp receiver (tcp:X.X.X.X:6060)\000\000\000\062\023\000\000\001", '\000' <repeats 11 times>, "\260\034\246SQ\177\000\000\343i\177\256{U\000\000\000\000\000 \000\000\000\000\000\000\300\000\000\000\000\000\006\000\000\000\000\000\000\000 \321\035=\377\177\000\000\\8V\256{U\000\000 \321\035=\377\177\000\000\254\204a\256\000\000\000"
        si = 0x0
        __func__ = "tcp_init_children"
#17 0x0000557bae4228ce in main_loop () at main.c:1761
        i = 8
        pid = 4910
        si = 0x0
        si_desc = "udp receiver child=7 sock=127.0.0.1:5070\000\060\066\060\000\000\000\000\020\322\035=\377\177\000\000\000\b\302\tv\223\062\213\004\000\000\000\000\000\000\000\260\034\246SQ\177\000\000\343i\177\256{U\000\000\000\000\000 \000\000\000\000\000\000\300\000\000\000\000\000\006\000\000\000\000\000\000\000P\322\035=\377\177\000\000>0d\256{U\000"
        nrprocs = 8
        woneinit = 1
        __func__ = "main_loop"
#18 0x0000557bae42abb9 in main (argc=17, argv=0x7fff3d1dd738) at main.c:2802
        cfg_stream = 0x557bb0796260
        c = -1
        r = 0
        tmp = 0x7fff3d1def3f ""
        tmp_len = 17
        port = 0
        proto = 1025365816
        ahost = 0x0
        aport = 0
        options = 0x557bae7a0618 ":f:cm:M:dVIhEeb:l:L:n:vKrRDTN:W:w:t:u:g:P:G:SQ:O:a:A:x:X:Y:"
        ret = -1
        seed = 1972091384
        rfd = 4
        debug_save = 0
        debug_flag = 0
        dont_fork_cnt = 0
        n_lst = 0x0
        p = 0x0
        st = {st_dev = 21, st_ino = 1930, st_nlink = 2, st_mode = 16832, st_uid = 109, st_gid = 115, __pad0 = 0, st_rdev = 0, st_size = 40, st_blksize = 4096, st_blocks = 0, st_atim = {tv_sec = 1572122046, tv_nsec = 75984014}, st_mtim = {tv_sec = 1583307292, 
            tv_nsec = 782512911}, st_ctim = {tv_sec = 1583307633, tv_nsec = 722908545}, __glibc_reserved = {0, 0, 0}}
        tbuf = "\000\000\000\000\000\000\000\000\b\000\000\000\000\000\000\000\060G\272SQ\177\000\000\000\000\000\000\000\000\000\000\240q\037=\377\177\000\000\364J\270SQ\177\000\000\b\000\000\000\000\000\000\000\230r\037=\377\177\000\000\060G\272SQ\177\000\000\330\324\035=\377\177\000\000\324\324\035=\377\177", '\000' <repeats 18 times>, "\230r\037=\377\177\000\000\250q\037=\377\177\000\000'\356\256SQ\177\000\000&\260be\000\000\000\000@\326\035=\377\177\000\000\300\212\225\001\000\000\000\000\240\325\035=\377\177\000\000\220\325\035=\377\177\000\000\330\324\035=\377\177\000\000XG\272SQ\177\000\000\001", '\000' <repeats 31 times>...
        option_index = 0
        long_options = {{name = 0x557bae7a2fca "help", has_arg = 0, flag = 0x0, val = 104}, {name = 0x557bae79d438 "version", has_arg = 0, flag = 0x0, val = 118}, {name = 0x557bae7a2fcf "alias", has_arg = 1, flag = 0x0, val = 1024}, {name = 0x557bae7a2fd5 "subst", 
            has_arg = 1, flag = 0x0, val = 1025}, {name = 0x557bae7a2fdb "substdef", has_arg = 1, flag = 0x0, val = 1026}, {name = 0x557bae7a2fe4 "substdefs", has_arg = 1, flag = 0x0, val = 1027}, {name = 0x557bae7a2fee "server-id", has_arg = 1, flag = 0x0, val = 1028}, {
            name = 0x0, has_arg = 0, flag = 0x0, val = 0}}
        __func__ = "main"




More information about the sr-users mailing list