Hello,
Do you any ideas about the reason of this issue? Is it caused by the last call? Do you have enough information with the PAI?
Regards,
Igor.
2014-05-28 13:47 GMT+02:00 Igor Potjevlesch igor.potjevlesch@gmail.com:
Hello,
p *msg->pai :
$4 = {type = HDR_PAI_T, name = { s = 0x7fad2cf8af74 "P-Asserted-Identity: "0123456789"sip:0123456789@a.b.c.d\r\nContent-Type: application/sdp\r\nContent-Length: 298\r\n\r\nv=0\r\no=root 1751857229 1751857230 IN IP4 a.b.c.d\r\ns=Asterisk PBX 1.6.2.9-2+squeeze3\r\nc=IN IP4 a.b.c.d\r\nt=0 0\r\nm=audio 11886 RTP/AVP 8 3 0 101\r\na=rtpmap:8 PCMA/8000\r\na=rtpmap:3 GSM/8000\r\na=rtpmap:0 PCMU/8000\r\na=rtpmap:101 telephone-event/8000\r\na=fmtp:101 0-16\r\na=ptime:20\r\na=sendrecv\r\n", len = 19}, body = { s = 0x7fad2cf8af89 ""0123456789"sip:0123456789@a.b.c.d\r\nContent-Type: application/sdp\r\nContent-Length: 298\r\n\r\nv=0\r\no=root 1751857229 1751857230 IN IP4 a.b.c.d\r\ns=Asterisk PBX 1.6.2.9-2+squeeze3\r\nc=IN IP4 a.b.c.d\r\nt=0 0\r\nm=audio 11886 RTP/AVP 8 3 0 101\r\na=rtpmap:8 PCMA/8000\r\na=rtpmap:3 GSM/8000\r\na=rtpmap:0 PCMU/8000\r\na=rtpmap:101 telephone-event/8000\r\na=fmtp:101 0-16\r\na=ptime:20\r\na=sendrecv\r\n", len = 43}, len = 66, parsed = 0x7fad389a7220, next = 0x7fad2cf8baf0}
p *((p_id_body_t*)msg->pai->parsed) :
$5 = {id = 0x0, num_ids = 0, next = 0x0}
Regards,
Igor.
2014-05-28 13:29 GMT+02:00 Daniel-Constantin Mierla miconda@gmail.com:
Hello,
I need now:
p *msg->pai p *((p_id_body_t*)msg->pai->parsed)
Cheers, Daniel
On 28/05/14 12:46, Igor Potjevlesch wrote:
Hello Daniel,
Here is the result of p *msg :
$3 = {id = 128120, pid = 2414, tval = {tv_sec = 1401265832, tv_usec = 5951}, fwd_send_flags = {f = 0 '\000', blst_imask = 0 '\000'}, rpl_send_flags = {f = 0 '\000', blst_imask = 0 '\000'}, first_line = {type = 1, len = 48, u = {request = {method = { s = 0x7fad2cf8ac30 "INVITE sip:0123456789@domainSIP/2.0\r\nVia: SIP/2.0/UDP a.b.c.d:5060;branch=z9hG4bK6b726b55;rport\r\nMax-Forwards: 69\r\nFrom: "FAX" sip:0123456789@domain;tag=as729b3498\r\nTo: sip:0123456789@domain\r\nContact: sip:0123456789@a.b.c.d\r\nCall-ID: 419b254b1c0531af3bf256b14f1881e2@domain\r\nCSeq: 103 INVITE\r\nUser-Agent: Asterisk PBX 1.6.2.9-2+squeeze3\r\nRemote-Party-ID: "FAX" sip:0123456789@domain;privacy=off;screen=no\r\nProxy-Authorization: Digest username="0123456789", realm="domain", algorithm=MD5, uri=\ "sip:0123456789@domain", nonce="U4Wf01OFnqcywgUETmE15dMbFu/Y1hpt", response="d055e0f3ba4646773d6ab6c5a05feec7"\r\nDate: Wed, 28 May 2014 08:30:32 GMT\r\nAllow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, SUBSCRIBE, NOTIFY, INFO\r\nSupported: replaces, timer\r\nP-Asserted-Identity: "0123456789"sip:0123456789@a.b.c.d\r\nContent-Type: application/sdp\r\nContent-Length: 298\r\n\r\nv=0\r\no=root 1751857229 1751857230 IN IP4 a.b.c.d\r\ns=Asterisk PBX 1.6.2.9-2+squeeze3\r\nc=IN IP4 a.b.c.d\r\nt=0 0\r\nm=audio 11886 RTP/AVP 8 3 0 101\r\na=rtpmap:8 PCMA/8000\r\na=rtpmap:3 GSM/8000\r\na=rtpmap:0 PCMU/8000\r\na=rtpmap:101 telephone-event/8000\r\na=fmtp:101 0-16\r\na=ptime:20\r\na=sendrecv\r\n", len = 6}, uri = { s = 0x7fad2cf8ac37 "sip:0123456789@domain SIP/2.0\r\nVia: SIP/2.0/UDP a.b.c.d:5060;branch=z9hG4bK6b726b55;rport\r\nMax-Forwards: 69\r\nFrom: "FAX" sip:0123456789@domain;tag=as729b3498\r\nTo: sip:0123456789@domain\r\nContact: sip:0123456789@a.b.c.d\r\nCall-ID: 419b254b1c0531af3bf256b14f1881e2@domain\r\nCSeq: 103 INVITE\r\nUser-Agent: Asterisk PBX 1.6.2.9-2+squeeze3\r\nRemote-Party-ID: "FAX" sip:0123456789@domain;privacy=off;screen=no\r\nProxy-Authorization: Digest username="0123456789", realm="domain", algorithm=MD5, uri=\ "sip:0123456789@domain", nonce="U4Wf01OFnqcywgUETmE15dMbFu/Y1hpt", response="d055e0f3ba4646773d6ab6c5a05feec7"\r\nDate: Wed, 28 May 2014 08:30:32 GMT\r\nAllow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, SUBSCRIBE, NOTIFY, INFO\r\nSupported: replaces, timer\r\nP-Asserted-Identity: "0123456789"sip:0123456789@a.b.c.d\r\nContent-Type: application/sdp\r\nContent-Length: 298\r\n\r\nv=0\r\no=root 1751857229 1751857230 IN IP4 a.b.c.d\r\ns=Asterisk PBX 1.6.2.9-2+squeeze3\r\nc=IN IP4 a.b.c.d\r\nt=0 0\r\nm=audio 11886 RTP/AVP 8 3 0 101\r\na=rtpmap:8 PCMA/8000\r\na=rtpmap:3 GSM/8000\r\na=rtpmap:0 PCMU/8000\r\na=rtpmap:101 telephone-event/8000\r\na=fmtp:101 0-16\r\na=ptime:20\r\na=sendrecv\r\n", len = 31}, version = { s = 0x7fad2cf8ac57 "SIP/2.0\r\nVia: SIP/2.0/UDP a.b.c.d:5060;branch=z9hG4bK6b726b55;rport\r\nMax-Forwards: 69\r\nFrom: "FAX" sip:0123456789@domain;tag=as729b3498\r\nTo: sip:0123456789@domain\r\nContact: sip:0123456789@a.b.c.d\r\nCall-ID: 419b254b1c0531af3bf256b14f1881e2@domain\r\nCSeq: 103 INVITE\r\nUser-Agent: Asterisk PBX 1.6.2.9-2+squeeze3\r\nRemote-Party-ID: "FAX" sip:0123456789@domain;privacy=off;screen=no\r\nProxy-Authorization: Digest username="0123456789", realm="domain", algorithm=MD5, uri=\ "sip:0123456789@domain", nonce="U4Wf01OFnqcywgUETmE15dMbFu/Y1hpt", response="d055e0f3ba4646773d6ab6c5a05feec7"\r\nDate: Wed, 28 May 2014 08:30:32 GMT\r\nAllow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, SUBSCRIBE, NOTIFY, INFO\r\nSupported: replaces, timer\r\nP-Asserted-Identity: "0123456789"sip:0123456789@a.b.c.d\r\nContent-Type: application/sdp\r\nContent-Length: 298\r\n\r\nv=0\r\no=root 1751857229 1751857230 IN IP4 a.b.c.d\r\ns=Asterisk PBX 1.6.2.9-2+squeeze3\r\nc=IN IP4 a.b.c.d\r\nt=0 0\r\nm=audio 11886 RTP/AVP 8 3 0 101\r\na=rtpmap:8 PCMA/8000\r\na=rtpmap:3 GSM/8000\r\na=rtpmap:0 PCMU/8000\r\na=rtpmap:101 telephone-event/8000\r\na=fmtp:101 0-16\r\na=ptime:20\r\na=sendrecv\r\n", len = 7}, method_value = 1}, reply = {version = { s = 0x7fad2cf8ac30 "INVITE sip:0123456789@domainSIP/2.0\r\nVia: SIP/2.0/UDP a.b.c.d:5060;branch=z9hG4bK6b726b55;rport\r\nMax-Forwards: 69\r\nFrom: "FAX" sip:0123456789@domain;tag=as729b3498\r\nTo: sip:0123456789@domain\r\nContact: sip:0123456789@a.b.c.d\r\nCall-ID: 419b254b1c0531af3bf256b14f1881e2@domain\r\nCSeq: 103 INVITE\r\nUser-Agent: Asterisk PBX 1.6.2.9-2+squeeze3\r\nRemote-Party-ID: "FAX" sip:0123456789@domain;privacy=off;screen=no\r\nProxy-Authorization: Digest username="0123456789", realm="domain", algorithm=MD5, uri=\ "sip:0123456789@domain", nonce="U4Wf01OFnqcywgUETmE15dMbFu/Y1hpt", response="d055e0f3ba4646773d6ab6c5a05feec7"\r\nDate: Wed, 28 May 2014 08:30:32 GMT\r\nAllow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, SUBSCRIBE, NOTIFY, INFO\r\nSupported: replaces, timer\r\nP-Asserted-Identity: "0123456789"sip:0123456789@a.b.c.d\r\nContent-Type: application/sdp\r\nContent-Length: 298\r\n\r\nv=0\r\no=root 1751857229 1751857230 IN IP4 a.b.c.d\r\ns=Asterisk PBX 1.6.2.9-2+squeeze3\r\nc=IN IP4 a.b.c.d\r\nt=0 0\r\nm=audio 11886 RTP/AVP 8 3 0 101\r\na=rtpmap:8 PCMA/8000\r\na=rtpmap:3 GSM/8000\r\na=rtpmap:0 PCMU/8000\r\na=rtpmap:101 telephone-event/8000\r\na=fmtp:101 0-16\r\na=ptime:20\r\na=sendrecv\r\n", len = 6}, status = { s = 0x7fad2cf8ac37 "sip:0123456789@domain SIP/2.0\r\nVia: SIP/2.0/UDP a.b.c.d:5060;branch=z9hG4bK6b726b55;rport\r\nMax-Forwards: 69\r\nFrom: "FAX" sip:0123456789@domain;tag=as729b3498\r\nTo: sip:0123456789@domain\r\nContact: sip:0123456789@a.b.c.d\r\nCall-ID: 419b254b1c0531af3bf256b14f1881e2@domain\r\nCSeq: 103 INVITE\r\nUser-Agent: Asterisk PBX 1.6.2.9-2+squeeze3\r\nRemote-Party-ID: "FAX" sip:0123456789@domain;privacy=off;screen=no\r\nProxy-Authorization: Digest username="0123456789", realm="domain", algorithm=MD5, uri=\ "sip:0123456789@domain", nonce="U4Wf01OFnqcywgUETmE15dMbFu/Y1hpt", response="d055e0f3ba4646773d6ab6c5a05feec7"\r\nDate: Wed, 28 May 2014 08:30:32 GMT\r\nAllow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, SUBSCRIBE, NOTIFY, INFO\r\nSupported: replaces, timer\r\nP-Asserted-Identity: "0123456789"sip:0123456789@a.b.c.d\r\nContent-Type: application/sdp\r\nContent-Length: 298\r\n\r\nv=0\r\no=root 1751857229 1751857230 IN IP4 a.b.c.d\r\ns=Asterisk PBX 1.6.2.9-2+squeeze3\r\nc=IN IP4 a.b.c.d\r\nt=0 0\r\nm=audio 11886 RTP/AVP 8 3 0 101\r\na=rtpmap:8 PCMA/8000\r\na=rtpmap:3 GSM/8000\r\na=rtpmap:0 PCMU/8000\r\na=rtpmap:101 telephone-event/8000\r\na=fmtp:101 0-16\r\na=ptime:20\r\na=sendrecv\r\n", len = 31}, reason = { s = 0x7fad2cf8ac57 "SIP/2.0\r\nVia: SIP/2.0/UDP a.b.c.d:5060;branch=z9hG4bK6b726b55;rport\r\nMax-Forwards: 69\r\nFrom: "FAX" sip:0123456789@domain;tag=as729b3498\r\nTo: sip:0123456789@domain\r\nContact: sip:0123456789@a.b.c.d\r\nCall-ID: 419b254b1c0531af3bf256b14f1881e2@domain\r\nCSeq: 103 INVITE\r\nUser-Agent: Asterisk PBX 1.6.2.9-2+squeeze3\r\nRemote-Party-ID: "FAX" sip:0123456789@domain;privacy=off;screen=no\r\nProxy-Authorization: Digest username="0123456789", realm="domain", algorithm=MD5, uri=\ "sip:0123456789@domain", nonce="U4Wf01OFnqcywgUETmE15dMbFu/Y1hpt", response="d055e0f3ba4646773d6ab6c5a05feec7"\r\nDate: Wed, 28 May 2014 08:30:32 GMT\r\nAllow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, SUBSCRIBE, NOTIFY, INFO\r\nSupported: replaces, timer\r\nP-Asserted-Identity: "0123456789"sip:0123456789@a.b.c.d\r\nContent-Type: application/sdp\r\nContent-Length: 298\r\n\r\nv=0\r\no=root 1751857229 1751857230 IN IP4 a.b.c.d\r\ns=Asterisk PBX 1.6.2.9-2+squeeze3\r\nc=IN IP4 a.b.c.d\r\nt=0 0\r\nm=audio 11886 RTP/AVP 8 3 0 101\r\na=rtpmap:8 PCMA/8000\r\na=rtpmap:3 GSM/8000\r\na=rtpmap:0 PCMU/8000\r\na=rtpmap:101 telephone-event/8000\r\na=fmtp:101 0-16\r\na=ptime:20\r\na=sendrecv\r\n", len = 7}, statuscode = 1}}}, via1 = 0x7fad2cf8b158, via2 = 0x0, headers = 0x7fad2cf8b118, last_header = 0x7fad2cf8bb30, parsed_flag = 18446744073709551615, h_via1 = 0x7fad2cf8b118, h_via2 = 0x0, callid = 0x7fad2cf8b7a0, to = 0x7fad2cf8b548, cseq = 0x7fad2cf8b7e0, from = 0x7fad2cf8b300, contact = 0x7fad2cf8b760, maxforwards = 0x7fad2cf8b2c0, route = 0x0, record_route = 0x0, content_type = 0x7fad2cf8baf0, content_length = 0x7fad2cf8bb30, authorization = 0x0, expires = 0x0, proxy_auth = 0x7fad2cf8b8d0, supported = 0x7fad2cf8ba70, require = 0x0, proxy_require = 0x0, unsupported = 0x0, allow = 0x7fad2cf8ba30, event = 0x0, accept = 0x0, accept_language = 0x0, organization = 0x0, priority = 0x0, subject = 0x0, user_agent = 0x7fad2cf8b850, server = 0x0, content_disposition = 0x0, diversion = 0x0, rpid = 0x7fad2cf8b890, refer_to = 0x0, session_expires = 0x0, min_se = 0x0, sipifmatch = 0x0, subscription_state = 0x0, date = 0x7fad384baa90, identity = 0x0, identity_info = 0x0, pai = 0x7fad2cf8bab0, ppi = 0x0, path = 0x0, privacy = 0x0, body = 0x0, eoh = 0x7fad2cf8afea "\r\nv=0\r\no=root 1751857229 1751857230 IN IP4 a.b.c.d\r\ns=Asterisk PBX 1.6.2.9-2+squeeze3\r\nc=IN IP4 a.b.c.d\r\nt=0 0\r\nm=audio 11886 RTP/AVP 8 3 0 101\r\na=rtpmap:8 PCMA/8000\r\na=rtpmap:3 GSM/8000\r\na=rtpmap:0 PCMU/8000\r\na=rtpmap:101 telephone-event/8000\r\na=fmtp:101 0-16\r\na=ptime:20\r\na=sendrecv\r\n", unparsed = 0x7fad2cf8afea "\r\nv=0\r\no=root 1751857229 1751857230 IN IP4 a.b.c.d\r\ns=Asterisk PBX 1.6.2.9-2+squeeze3\r\nc=IN IP4 a.b.c.d\r\nt=0 0\r\nm=audio 11886 RTP/AVP 8 3 0 101\r\na=rtpmap:8 PCMA/8000\r\na=rtpmap:3 GSM/8000\r\na=rtpmap:0 PCMU/8000\r\na=rtpmap:101 telephone-event/8000\r\na=fmtp:101 0-16\r\na=ptime:20\r\na=sendrecv\r\n", rcv = {src_ip = {af = 2, len = 4, u = {addrl = {1950469485, 140381949486832}, addr32 = {1950469485, 0, 943417072, 32685}, addr16 = {52589, 29761, 0, 0, 26352, 14395, 32685, 0}, addr = "m\315At\000\000\000\000\360f;8\255\177\000"}}, dst_ip = {af = 2, len = 4, u = {addrl = {67638457, 0}, addr32 = {67638457, 0, 0, 0}, addr16 = {5305, 1032, 0, 0, 0, 0, 0, 0}, addr = "\271\024\b\004", '\000' <repeats 11 times>}}, src_port = 5060, dst_port = 5060, proto_reserved1 = 0, proto_reserved2 = 0, src_su = {s = {sa_family = 2, sa_data = "\023\304m\315At\000\000\000\000\000\000\000"}, sin = {sin_family = 2, sin_port = 50195, sin_addr = {s_addr = 1950469485}, sin_zero = "\000\000\000\000\000\000\000"}, sin6 = {sin6_family = 2, sin6_port = 50195, sin6_flowinfo = 1950469485, sin6_addr = {__in6_u = {__u6_addr8 = '\000' <repeats 15 times>, __u6_addr16 = {0, 0, 0, 0, 0, 0, 0, 0}, __u6_addr32 = {0, 0, 0, 0}}}, sin6_scope_id = 0}}, bind_address = 0x7fad383b6588, proto = 1 '\001'}, buf = 0x7fad2cf8ac30 "INVITE sip:0123456789@domain SIP/2.0\r\nVia: SIP/2.0/UDP a.b.c.d:5060;branch=z9hG4bK6b726b55;rport\r\nMax-Forwards: 69\r\nFrom: "FAX" sip:0123456789@domain;tag=as729b3498\r\nTo: sip:0123456789@domain\r\nContact: sip:0123456789@a.b.c.d\r\nCall-ID: 419b254b1c0531af3bf256b14f1881e2@domain\r\nCSeq: 103 INVITE\r\nUser-Agent: Asterisk PBX 1.6.2.9-2+squeeze3\r\nRemote-Party-ID: "FAX" sip:0123456789@domain;privacy=off;screen=no\r\nProxy-Authorization: Digest username="0123456789", realm="domain", algorithm=MD5, uri=\ "sip:0123456789@domain", nonce="U4Wf01OFnqcywgUETmE15dMbFu/Y1hpt", response="d055e0f3ba4646773d6ab6c5a05feec7"\r\nDate: Wed, 28 May 2014 08:30:32 GMT\r\nAllow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, SUBSCRIBE, NOTIFY, INFO\r\nSupported: replaces, timer\r\nP-Asserted-Identity: "0123456789"sip:0123456789@a.b.c.d\r\nContent-Type: application/sdp\r\nContent-Length: 298\r\n\r\nv=0\r\no=root 1751857229 1751857230 IN IP4 a.b.c.d\r\ns=Asterisk PBX 1.6.2.9-2+squeeze3\r\nc=IN IP4 a.b.c.d\r\nt=0 0\r\nm=audio 11886 RTP/AVP 8 3 0 101\r\na=rtpmap:8 PCMA/8000\r\na=rtpmap:3 GSM/8000\r\na=rtpmap:0 PCMU/8000\r\na=rtpmap:101 telephone-event/8000\r\na=fmtp:101 0-16\r\na=ptime:20\r\na=sendrecv\r\n", len = 1254, new_uri = { s = 0x7fad2ceabdef "sip:0123456789@gw SIP/2.0\r\nRecord-Route: sip:a.b.c.d;lr=on\r\nVia: SIP/2.0/UDP a.b.c.d;branch=z9hG4bK6e86.62fc1f802e2e40a8a17cb1556d5ccfa8.0\r\nVia: SIP/2.0/UDP a.b.c.d:5060;branch=z9hG4bK6b726b55;rport=5060\r\nMax-Forwards: 69\r\nFrom: "FAX" sip:0123456789@domain;tag=as729b3498\r\nTo: sip:0123456789@domain\r\nContact: sip:0123456789@a.b.c.d\r\nCall-ID: 419b254b1c0531af3bf256b14f1881e2@domain\r\nCSeq: 103 INVITE\ sendrecv\r\n", len = 1254, new_uri = { s = 0x7fad2ceabdef "sip:0123456789@gw SIP/2.0\r\nRecord-Route: sip:a.b.c.d;lr=on\r\nVia: SIP/2.0/UDP a.b.c.d;branch=z9hG4bK6e86.62fc1f802e2e40a8a17cb1556d5ccfa8.0\r\nVia: SIP/2.0/UDP a.b.c.d:5060;branch=z9hG4bK6b726b55;rport=5060\r\nMax-Forwards: 69\r\nFrom: "FAX" sip:0123456789@domain;tag=as729b3498\r\nTo: sip:0123456789@domain\r\nContact: sip:0123456789@a.b.c.d\r\nCall-ID: 419b254b1c0531af3bf256b14f1881e2@domain\r\nCSeq: 103 INVITE---Type <return> to continue, or q <return> to quit--- r\nUser-Agent: Asterisk PBX 1.6.2.9-2+squeeze3\r\nRemote-Party-ID: "FAX" sip:0123456789@domain;privacy=off;screen=no\r\nDate: Wed, 28 May 2014 08:30:32 GMT\r\nAllow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, SUBSCRIBE, NOTIFY, INFO\r\nSupported: replaces, timer\r\nP-Asserted-Identity: "0123456789"sip:0123456789@a.b.c.d\r\nContent-Type: application/sdp\r\nContent-Length: 298\r\n\r\nv=0\r\no=root 1751857229 1751857230 IN IP4 a.b.c.d\r\ns=Asterisk PBX 1.6.2.9-2+squeeze3\r\nc=IN IP4 a.b.c.d\r\nt=0 0\r\nm=audio 11886 RTP/AVP 8 3 0 101\r\na=rtpmap:8 PCMA/8000\r\na=rtpmap:3 GSM/8000\r\na=rtpmap:0 PCMU/8000\r\na=rtpmap:101 telephone-event/8000\r\na=fmtp:101 0-16\r\na=ptime:20\r\na=sendrecv\r\n", len = 19}, dst_uri = {s = 0x0, len = 0}, parsed_uri_ok = 0, parsed_uri = {user = { s = 0x7fad2ceabdf3 "0123456789@gw SIP/2.0\r\nRecord-Route: sip:a.b.c.d;lr=on\r\nVia: SIP/2.0/UDP a.b.c.d;branch=z9hG4bK6e86.62fc1f802e2e40a8a17cb1556d5ccfa8.0\r\nVia: SIP/2.0/UDP a.b.c.d:5060;branch=z9hG4bK6b726b55;rport=5060\r\nMax-Forwards: 69\r\nFrom: "FAX" sip:0123456789@domain;tag=as729b3498\r\nTo: sip:0123456789@domain\r\nContact: sip:0123456789@a.b.c.d\r\nCall-ID: 419b254b1c0531af3bf256b14f1881e2@domain\r\nCSeq: 103 INVITE\r\nUser-Agent: Asterisk PBX 1.6.2.9-2+squeeze3\r\nRemote-Party-ID: "FAX" sip:0123456789@domain;privacy=off;screen=no\r\nDate: Wed, 28 May 2014 08:30:32 GMT\r\nAllow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, SUBSCRIBE, NOTIFY, INFO\r\nSupported: replaces, timer\r\nP-Asserted-Identity: "0123456789"sip:0123456789@a.b.c.d\r\nContent-Type: application/sdp\r\nContent-Length: 298\r\n\r\nv=0\r\no=root 1751857229 1751857230 IN IP4 a.b.c.d\r\ns=Asterisk PBX 1.6.2.9-2+squeeze3\r\nc=IN IP4 a.b.c.d\r\nt=0 0\r\nm=audio 11886 RTP/AVP 8 3 0 101\r\na=rtpmap:8 PCMA/8000\r\na=rtpmap:3 GSM/8000\r\na=rtpmap:0 PCMU/8000\r\na=rtpmap:101 telephone-event/8000\r\na=fmtp:101 0-16\r\na=ptime:20\r\na=sendrecv\r\n", len = 10}, passwd = {s = 0x0, len = 0}, host = { s = 0x7fad2ceabdfe "gw SIP/2.0\r\nRecord-Route: sip:a.b.c.d;lr=on\r\nVia: SIP/2.0/UDP a.b.c.d;branch=z9hG4bK6e86.62fc1f802e2e40a8a17cb1556d5ccfa8.0\r\nVia: SIP/2.0/UDP a.b.c.d:5060;branch=z9hG4bK6b726b55;rport=5060\r\nMax-Forwards: 69\r\nFrom: "FAX" sip:0123456789@domain;tag=as729b3498\r\nTo: sip:0123456789@domain\r\nContact: sip:0123456789@a.b.c.d\r\nCall-ID: 419b254b1c0531af3bf256b14f1881e2@domain\r\nCSeq: 103 INVITE\r\nUser-Agent: Asterisk PBX 1.6.2.9-2+squeeze3\r\nRemote-Party-ID: "FAX" sip:0123456789@domain;privacy=off;screen=no\r\nDate: Wed, 28 May 2014 08:30:32 GMT\r\nAllow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, SUBSCRIBE, NOTIFY, INFO\r\nSupported: replaces, timer\r\nP-Asserted-Identity: "0123456789"sip:0123456789@a.b.c.d\r\nContent-Type: application/sdp\r\nContent-Length: 298\r\n\r\nv=0\r\no=root 1751857229 1751857230 IN IP4 a.b.c.d\r\ns=Asterisk PBX 1.6.2.9-2+squeeze3\r\nc=IN IP4 a.b.c.d\r\nt=0 0\r\nm=audio 11886 RTP/AVP 8 3 0 101\r\na=rtpmap:8 PCMA/8000\r\na=rtpmap:3 GSM/8000\r\na=rtpmap:0 PCMU/8000\r\na=rtpmap:101 telephone-event/8000\r\na=fmtp:101 0-16\r\na=ptime:20\r\na=sendrecv\r\n", len = 4}, port = {s = 0x0, len = 0}, params = {s = 0x0, len = 0}, sip_params = {s = 0x0, len = 0}, headers = { s = 0x0, len = 0}, port_no = 0, proto = 0, type = SIP_URI_T, flags = 0, transport = {s = 0x0, len = 0}, ttl = {s = 0x0, len = 0}, user_param = {s = 0x0, len = 0}, maddr = {s = 0x0, len = 0}, method = {s = 0x0, len = 0}, lr = {s = 0x0, len = 0}, r2 = {s = 0x0, len = 0}, gr = {s = 0x0, len = 0}, transport_val = { s = 0x0, len = 0}, ttl_val = {s = 0x0, len = 0}, user_param_val = {s = 0x0, len = 0}, maddr_val = {s = 0x0, len = 0}, method_val = {s = 0x0, len = 0}, lr_val = { s = 0x0, len = 0}, r2_val = {s = 0x0, len = 0}, gr_val = {s = 0x0, len = 0}}, parsed_orig_ruri_ok = 0, parsed_orig_ruri = {user = {s = 0x0, len = 0}, passwd = { s = 0x0, len = 0}, host = {s = 0x0, len = 0}, port = {s = 0x0, len = 0}, params = {s = 0x0, len = 0}, sip_params = {s = 0x0, len = 0}, headers = {s = 0x0, len = 0}, port_no = 0, proto = 0, type = ERROR_URI_T, flags = 0, transport = {s = 0x0, len = 0}, ttl = {s = 0x0, len = 0}, user_param = {s = 0x0, len = 0}, maddr = {s = 0x0, len = 0}, method = {s = 0x0, len = 0}, lr = {s = 0x0, len = 0}, r2 = {s = 0x0, len = 0}, gr = {s = 0x0, len = 0}, transport_val = {s = 0x0, len = 0}, ttl_val = {s = 0x0, len = 0}, user_param_val = {s = 0x0, len = 0}, maddr_val = {s = 0x0, len = 0}, method_val = {s = 0x0, len = 0}, lr_val = {s = 0x0, len = 0}, r2_val = {s = 0x0, len = 0}, gr_val = {s = 0x0, len = 0}}, add_rm = 0x7fad2ce523c8, body_lumps = 0x0, reply_lump = 0x0, add_to_branch_s = '\000' <repeats 57 times>, add_to_branch_len = 0, hash_index = 26854, msg_flags = 145, flags = 2, set_global_address = {s = 0x0, len = 0}, set_global_port = {s = 0x0, len = 0}, force_send_socket = 0x0, path_vec = {s = 0x0, len = 0}, instance = {s = 0x0, len = 0}, reg_id = 0, ruid = {s = 0x0, len = 0}, location_ua = {s = 0x0, len = 0}, ldv = {flow = {decoded = 0, rcv = {src_ip = {af = 0, len = 0, u = {addrl = {0, 0}, addr32 = {0, 0, 0, 0}, addr16 = {0, 0, 0, 0, 0, 0, 0, 0}, addr = '\000' <repeats 15 times>}}, dst_ip = {af = 0, len = 0, u = {addrl = {0, 0}, addr32 = {0, 0, 0, 0}, addr16 = {0, 0, 0, 0, 0, 0, 0, 0}, addr = '\000' <repeats 15 times>}}, src_port = 0, dst_port = 0, proto_reserved1 = 0, proto_reserved2 = 0, src_su = {s = {sa_family = 0, sa_data = '\000' <repeats 13 times>}, sin = {sin_family = 0, sin_port = 0, sin_addr = {s_addr = 0}, sin_zero = "\000\000\000\000\000\000\000"}, sin6 = { sin6_family = 0, sin6_port = 0, sin6_flowinfo = 0, sin6_addr = {__in6_u = {__u6_addr8 = '\000' <repeats 15 times>, __u6_addr16 = {0, 0, 0, 0, 0, 0, 0, 0}, __u6_addr32 = {0, 0, 0, 0}}}, sin6_scope_id = 0}}, bind_address = 0x0, proto = 0 '\000'}}}}
Regards,
Igor.
2014-05-28 12:01 GMT+02:00 Daniel-Constantin Mierla miconda@gmail.com:
Hello,
can you give the output in gdb for:
set print elements 2000 p *msg
Cheers, Daniel
On 28/05/14 11:48, Igor Potjevlesch wrote:
hello,
Kamailio 4.1.3 crashed today, with an segmentation fault error : kernel: kamailio[2406]: segfault at 18 ip 0000000000495792 sp 00007fff3d9d2d80 error 4 in kamailio[400000+275000]
Here is the result of BT : #0 0x0000000000495792 in pv_get_strval (msg=0x7fad2cf8a530, param=0x7fad3858c288, res=0x7fff3d9d2eb0, sval=0x18) at pvapi.c:521 #1 0x00007fad365b0da8 in pv_get_pai (msg=0x7fad2cf8a530, param=0x7fad3858c288, res=0x7fff3d9d2eb0) at pv_core.c:1021 #2 0x0000000000499518 in pv_get_spec_value (msg=0x7fad2cf8a530, sp=0x7fad3858c270, value=0x7fff3d9d2eb0) at pvapi.c:1266 #3 0x00007fad34c6d7d9 in extra2strar (extra=0x7fad3858c260, rq=0x7fad2cf8a530, val_arr=0x7fad34e7ae30, int_arr=0x7fad34e7b37c,type_arr=0x7fad34e7b4e7 "\002\002\002\002") at acc_extra.c:261 #4 0x00007fad34c65393 in acc_db_request (rq=0x7fad2cf8a530) at acc.c:474 #5 0x00007fad34c6fb43 in acc_onreply (t=0x7fad2ce0b138, req=0x7fad2cf8a530, reply=0x7fad3859faa8, code=200) at acc_logic.c:471 #6 0x00007fad34c7008d in tmcb_func (t=0x7fad2ce0b138, type=512, ps=0x7fff3d9d3120) at acc_logic.c:559 #7 0x00007fad36e6a478 in run_trans_callbacks_internal (cb_lst=0x7fad2ce0b1a8, type=512, trans=0x7fad2ce0b138, params=0x7fff3d9d3120) at t_hooks.c:290 #8 0x00007fad36e6a68a in run_trans_callbacks_with_buf (type=512, rbuf=0x7fad2ce0b1f8, req=0x7fad2cf8a530, repl=0x7fad3859faa8, flags=183) at t_hooks.c:336 #9 0x00007fad36e9cc06 in relay_reply (t=0x7fad2ce0b138, p_msg=0x7fad3859faa8, branch=0, msg_status=183, cancel_data=0x7fff3d9d3480, do_put_on_wait=1) at t_reply.c:2001 #10 0x00007fad36e9f0b7 in reply_received (p_msg=0x7fad3859faa8) at t_reply.c:2499 #11 0x000000000045d837 in do_forward_reply (msg=0x7fad3859faa8, mode=0) at forward.c:777 #12 0x000000000045e0f8 in forward_reply (msg=0x7fad3859faa8) at forward.c:860 #13 0x00000000004a5887 in receive_msg ( buf=0x924600 "SIP/2.0 183 Session Progress\r\nVia: SIP/2.0/UDP a.b.c.d;branch=z9hG4bK6e86.62fc1f802e2e40a8a17cb1556d5ccfa8.0;received=a.b.c.d\r\nVia: SIP/2.0/UDP a.b.c.d:5060;branch=z9hG4bK6b726b55;rport=5"..., len=872, rcv_info=0x7fff3d9d3800) at receive.c:273 #14 0x000000000053c838 in udp_rcv_loop () at udp_server.c:536 #14 0x000000000053c838 in udp_rcv_loop () at udp_server.c:536 #15 0x000000000046d42b in main_loop () at main.c:1617 #16 0x00000000004704d3 in main (argc=7, argv=0x7fff3d9d3b38) at main.c:2533
-- Daniel-Constantin Mierla - http://www.asipto.comhttp://twitter.com/#!/miconda - http://www.linkedin.com/in/miconda
Hello,
I missed somehow the message with the pai parsed content. I will look over it later today.
Cheers, Daniel
On 28/05/14 18:45, Igor Potjevlesch wrote:
Hello,
Do you any ideas about the reason of this issue? Is it caused by the last call? Do you have enough information with the PAI?
Regards,
Igor.
2014-05-28 13:47 GMT+02:00 Igor Potjevlesch <igor.potjevlesch@gmail.com mailto:igor.potjevlesch@gmail.com>:
Hello, p *msg->pai : $4 = {type = HDR_PAI_T, name = { s = 0x7fad2cf8af74 "P-Asserted-Identity: \"0123456789\"<sip:0123456789@a.b.c.d>\r\nContent-Type: application/sdp\r\nContent-Length: 298\r\n\r\nv=0\r\no=root 1751857229 1751857230 IN IP4 a.b.c.d\r\ns=Asterisk PBX 1.6.2.9-2+squeeze3\r\nc=IN IP4 a.b.c.d\r\nt=0 0\r\nm=audio 11886 RTP/AVP 8 3 0 101\r\na=rtpmap:8 PCMA/8000\r\na=rtpmap:3 GSM/8000\r\na=rtpmap:0 PCMU/8000\r\na=rtpmap:101 telephone-event/8000\r\na=fmtp:101 0-16\r\na=ptime:20\r\na=sendrecv\r\n", len = 19}, body = { s = 0x7fad2cf8af89 "\"0123456789\"<sip:0123456789@a.b.c.d>\r\nContent-Type: application/sdp\r\nContent-Length: 298\r\n\r\nv=0\r\no=root 1751857229 1751857230 IN IP4 a.b.c.d\r\ns=Asterisk PBX 1.6.2.9-2+squeeze3\r\nc=IN IP4 a.b.c.d\r\nt=0 0\r\nm=audio 11886 RTP/AVP 8 3 0 101\r\na=rtpmap:8 PCMA/8000\r\na=rtpmap:3 GSM/8000\r\na=rtpmap:0 PCMU/8000\r\na=rtpmap:101 telephone-event/8000\r\na=fmtp:101 0-16\r\na=ptime:20\r\na=sendrecv\r\n", len = 43}, len = 66, parsed = 0x7fad389a7220, next = 0x7fad2cf8baf0} p *((p_id_body_t*)msg->pai->parsed) : $5 = {id = 0x0, num_ids = 0, next = 0x0} Regards, Igor. 2014-05-28 13:29 GMT+02:00 Daniel-Constantin Mierla <miconda@gmail.com <mailto:miconda@gmail.com>>: Hello, I need now: p *msg->pai p *((p_id_body_t*)msg->pai->parsed) Cheers, Daniel
Hello,
for the moment I added a safety check to prevent crash in such situation: - http://git.sip-router.org/cgi-bin/gitweb.cgi/sip-router/?a=commit;h=e633ca6b...
I need to investigate more to discover why the parsed field has null content.
Does the crash happen often or can it be reproduced?
Cheers, Daniel
On 29/05/14 10:18, Daniel-Constantin Mierla wrote:
Hello,
I missed somehow the message with the pai parsed content. I will look over it later today.
Cheers, Daniel
On 28/05/14 18:45, Igor Potjevlesch wrote:
Hello,
Do you any ideas about the reason of this issue? Is it caused by the last call? Do you have enough information with the PAI?
Regards,
Igor.
2014-05-28 13:47 GMT+02:00 Igor Potjevlesch <igor.potjevlesch@gmail.com mailto:igor.potjevlesch@gmail.com>:
Hello, p *msg->pai : $4 = {type = HDR_PAI_T, name = { s = 0x7fad2cf8af74 "P-Asserted-Identity: \"0123456789\"<sip:0123456789@a.b.c.d>\r\nContent-Type: application/sdp\r\nContent-Length: 298\r\n\r\nv=0\r\no=root 1751857229 1751857230 IN IP4 a.b.c.d\r\ns=Asterisk PBX 1.6.2.9-2+squeeze3\r\nc=IN IP4 a.b.c.d\r\nt=0 0\r\nm=audio 11886 RTP/AVP 8 3 0 101\r\na=rtpmap:8 PCMA/8000\r\na=rtpmap:3 GSM/8000\r\na=rtpmap:0 PCMU/8000\r\na=rtpmap:101 telephone-event/8000\r\na=fmtp:101 0-16\r\na=ptime:20\r\na=sendrecv\r\n", len = 19}, body = { s = 0x7fad2cf8af89 "\"0123456789\"<sip:0123456789@a.b.c.d>\r\nContent-Type: application/sdp\r\nContent-Length: 298\r\n\r\nv=0\r\no=root 1751857229 1751857230 IN IP4 a.b.c.d\r\ns=Asterisk PBX 1.6.2.9-2+squeeze3\r\nc=IN IP4 a.b.c.d\r\nt=0 0\r\nm=audio 11886 RTP/AVP 8 3 0 101\r\na=rtpmap:8 PCMA/8000\r\na=rtpmap:3 GSM/8000\r\na=rtpmap:0 PCMU/8000\r\na=rtpmap:101 telephone-event/8000\r\na=fmtp:101 0-16\r\na=ptime:20\r\na=sendrecv\r\n", len = 43}, len = 66, parsed = 0x7fad389a7220, next = 0x7fad2cf8baf0} p *((p_id_body_t*)msg->pai->parsed) : $5 = {id = 0x0, num_ids = 0, next = 0x0} Regards, Igor. 2014-05-28 13:29 GMT+02:00 Daniel-Constantin Mierla <miconda@gmail.com <mailto:miconda@gmail.com>>: Hello, I need now: p *msg->pai p *((p_id_body_t*)msg->pai->parsed) Cheers, Daniel
-- Daniel-Constantin Mierla -http://www.asipto.com http://twitter.com/#!/miconda -http://www.linkedin.com/in/miconda
Hello,
The crash happen once. it can't be reproduced. The pai seems good, why it cannot be parsed?
Regards,
Igor.
2014-05-29 17:11 GMT+02:00 Daniel-Constantin Mierla miconda@gmail.com:
Hello,
for the moment I added a safety check to prevent crash in such situation:
http://git.sip-router.org/cgi-bin/gitweb.cgi/sip-router/?a=commit;h=e633ca6b...
I need to investigate more to discover why the parsed field has null content.
Does the crash happen often or can it be reproduced?
Cheers, Daniel
On 29/05/14 10:18, Daniel-Constantin Mierla wrote:
Hello,
I missed somehow the message with the pai parsed content. I will look over it later today.
Cheers, Daniel
On 28/05/14 18:45, Igor Potjevlesch wrote:
Hello,
Do you any ideas about the reason of this issue? Is it caused by the last call? Do you have enough information with the PAI?
Regards,
Igor.
2014-05-28 13:47 GMT+02:00 Igor Potjevlesch igor.potjevlesch@gmail.com:
Hello,
p *msg->pai :
$4 = {type = HDR_PAI_T, name = { s = 0x7fad2cf8af74 "P-Asserted-Identity: "0123456789" sip:0123456789@a.b.c.d\r\nContent-Type: application/sdp\r\nContent-Length: 298\r\n\r\nv=0\r\no=root 1751857229 1751857230 IN IP4 a.b.c.d\r\ns=Asterisk PBX 1.6.2.9-2+squeeze3\r\nc=IN IP4 a.b.c.d\r\nt=0 0\r\nm=audio 11886 RTP/AVP 8 3 0 101\r\na=rtpmap:8 PCMA/8000\r\na=rtpmap:3 GSM/8000\r\na=rtpmap:0 PCMU/8000\r\na=rtpmap:101 telephone-event/8000\r\na=fmtp:101 0-16\r\na=ptime:20\r\na=sendrecv\r\n", len = 19}, body = { s = 0x7fad2cf8af89 ""0123456789"sip:0123456789@a.b.c.d\r\nContent-Type: application/sdp\r\nContent-Length: 298\r\n\r\nv=0\r\no=root 1751857229 1751857230 IN IP4 a.b.c.d\r\ns=Asterisk PBX 1.6.2.9-2+squeeze3\r\nc=IN IP4 a.b.c.d\r\nt=0 0\r\nm=audio 11886 RTP/AVP 8 3 0 101\r\na=rtpmap:8 PCMA/8000\r\na=rtpmap:3 GSM/8000\r\na=rtpmap:0 PCMU/8000\r\na=rtpmap:101 telephone-event/8000\r\na=fmtp:101 0-16\r\na=ptime:20\r\na=sendrecv\r\n", len = 43}, len = 66, parsed = 0x7fad389a7220, next = 0x7fad2cf8baf0}
p *((p_id_body_t*)msg->pai->parsed) :
$5 = {id = 0x0, num_ids = 0, next = 0x0}
Regards,
Igor.
2014-05-28 13:29 GMT+02:00 Daniel-Constantin Mierla miconda@gmail.com:
Hello,
I need now:
p *msg->pai p *((p_id_body_t*)msg->pai->parsed)
Cheers, Daniel
-- Daniel-Constantin Mierla - http://www.asipto.comhttp://twitter.com/#!/miconda - http://www.linkedin.com/in/miconda
-- Daniel-Constantin Mierla - http://www.asipto.comhttp://twitter.com/#!/miconda - http://www.linkedin.com/in/miconda
Hello,
On 30/05/14 17:41, Igor Potjevlesch wrote:
Hello,
The crash happen once. it can't be reproduced. The pai seems good, why it cannot be parsed?
apparently it was parsed, but then the content got reset. The sip_msg_t for request is accessed via a callback inside acc module when the sip_msg_t for response is handled.
So I have to see why it got reset, it shouldn't -- the patch so far was to prevent the crash.
Cheers, Daniel
Regards,
Igor.
2014-05-29 17:11 GMT+02:00 Daniel-Constantin Mierla <miconda@gmail.com mailto:miconda@gmail.com>:
Hello, for the moment I added a safety check to prevent crash in such situation: - http://git.sip-router.org/cgi-bin/gitweb.cgi/sip-router/?a=commit;h=e633ca6b7e748a77825d3208e86bf9bce18944a5 I need to investigate more to discover why the parsed field has null content. Does the crash happen often or can it be reproduced? Cheers, Daniel On 29/05/14 10:18, Daniel-Constantin Mierla wrote:
Hello, I missed somehow the message with the pai parsed content. I will look over it later today. Cheers, Daniel On 28/05/14 18:45, Igor Potjevlesch wrote:
Hello, Do you any ideas about the reason of this issue? Is it caused by the last call? Do you have enough information with the PAI? Regards, Igor. 2014-05-28 13:47 GMT+02:00 Igor Potjevlesch <igor.potjevlesch@gmail.com <mailto:igor.potjevlesch@gmail.com>>: Hello, p *msg->pai : $4 = {type = HDR_PAI_T, name = { s = 0x7fad2cf8af74 "P-Asserted-Identity: \"0123456789\"<sip:0123456789@a.b.c.d>\r\nContent-Type: application/sdp\r\nContent-Length: 298\r\n\r\nv=0\r\no=root 1751857229 1751857230 IN IP4 a.b.c.d\r\ns=Asterisk PBX 1.6.2.9-2+squeeze3\r\nc=IN IP4 a.b.c.d\r\nt=0 0\r\nm=audio 11886 RTP/AVP 8 3 0 101\r\na=rtpmap:8 PCMA/8000\r\na=rtpmap:3 GSM/8000\r\na=rtpmap:0 PCMU/8000\r\na=rtpmap:101 telephone-event/8000\r\na=fmtp:101 0-16\r\na=ptime:20\r\na=sendrecv\r\n", len = 19}, body = { s = 0x7fad2cf8af89 "\"0123456789\"<sip:0123456789@a.b.c.d>\r\nContent-Type: application/sdp\r\nContent-Length: 298\r\n\r\nv=0\r\no=root 1751857229 1751857230 IN IP4 a.b.c.d\r\ns=Asterisk PBX 1.6.2.9-2+squeeze3\r\nc=IN IP4 a.b.c.d\r\nt=0 0\r\nm=audio 11886 RTP/AVP 8 3 0 101\r\na=rtpmap:8 PCMA/8000\r\na=rtpmap:3 GSM/8000\r\na=rtpmap:0 PCMU/8000\r\na=rtpmap:101 telephone-event/8000\r\na=fmtp:101 0-16\r\na=ptime:20\r\na=sendrecv\r\n", len = 43}, len = 66, parsed = 0x7fad389a7220, next = 0x7fad2cf8baf0} p *((p_id_body_t*)msg->pai->parsed) : $5 = {id = 0x0, num_ids = 0, next = 0x0} Regards, Igor. 2014-05-28 13:29 GMT+02:00 Daniel-Constantin Mierla <miconda@gmail.com <mailto:miconda@gmail.com>>: Hello, I need now: p *msg->pai p *((p_id_body_t*)msg->pai->parsed) Cheers, Daniel
-- Daniel-Constantin Mierla -http://www.asipto.com http://twitter.com/#!/miconda <http://twitter.com/#%21/miconda> -http://www.linkedin.com/in/miconda
-- Daniel-Constantin Mierla -http://www.asipto.com http://twitter.com/#!/miconda <http://twitter.com/#%21/miconda> -http://www.linkedin.com/in/miconda
Hello Daniel,
New occurrence happened on Saturday.
I got the following information according to your previous email:
(gdb) p *msg->pai
$2 = {type = HDR_PAI_T, name = {
s = 0x7f6a60cd34b8 "P-Asserted-Identity: "0123456789"sip:0123456789@A.B.C.D\r\nContact: sip:0123456789@A.B.C.D:5060\r\nAllow: INVITE, BYE, REGISTER, ACK, OPTIONS, CANCEL, SUBSCRIBE, NOTIFY, INFO, REFER, UPDATE\r\nSupported: path, replaces, timer, tdialog\r\nSession-Expires: 1800\r\nExpires: 300\r\nOrganization: Dialogic\r\nContent-Type: application/sdp\r\nContent-Length: 303\r\n\r\nv=0\r\no=Dialogic_SDP 14338449 0 IN IP4 A.B.C.D\r\ns=Dialogic-SIP\r\nc=IN IP4 A.B.C.D\r\nt=0 0\r\nm=audio 8708 RTP/AVP 8 0 18 101\r\na=rtpmap:0 PCMU/8000\r\na=rtpmap:8 PCMA/8000\r\na=rtpmap:18 G729/8000\r\na=fmtp:18 annexb=yes\r\na=rtpmap:101 telephone-event/8000\r\na=fmtp:101 0-15\r\na=silenceSupp:off - - - -\r\n", len = 19}, body = {
s = 0x7f6a60cd34cd ""0123456789"sip:0123456789@A.B.C.D\r\nContact: sip:0123456789@A.B.C.D:5060\r\nAllow: INVITE, BYE, REGISTER, ACK, OPTIONS, CANCEL, SUBSCRIBE, NOTIFY, INFO, REFER, UPDATE\r\nSupported: path, replaces, timer, tdialog\r\nSession-Expires: 1800\r\nExpires: 300\r\nOrganization: Dialogic\r\nContent-Type: application/sdp\r\nContent-Length: 303\r\n\r\nv=0\r\no=Dialogic_SDP 14338449 0 IN IP4 A.B.C.D\r\ns=Dialogic-SIP\r\nc=IN IP4 A.B.C.D\r\nt=0 0\r\nm=audio 8708 RTP/AVP 8 0 18 101\r\na=rtpmap:0 PCMU/8000\r\na=rtpmap:8 PCMA/8000\r\na=rtpmap:18 G729/8000\r\na=fmtp:18 annexb=yes\r\na=rtpmap:101 telephone-event/8000\r\na=fmtp:101 0-15\r\na=silenceSupp:off - - - -\r\n", len = 43}, len = 66, parsed = 0x7f6a6d81da88, next = 0x7f6a60cd3f10}
(gdb) p *((p_id_body_t*)msg->pai->parsed)
$3 = {id = 0x0, num_ids = 0, next = 0x0}
(gdb)
I still not patched. Do you schedule to include the patch in 4.1.4?
Do you need more information?
Regards,
Igor.
De : Daniel-Constantin Mierla [mailto: mailto:miconda@gmail.com miconda@gmail.com] Envoyé : vendredi 30 mai 2014 18:02 À : Igor Potjevlesch; Kamailio (SER) - Users Mailing List Objet : Re: [SR-Users] Crash Kamailio 4.1.3
Hello,
On 30/05/14 17:41, Igor Potjevlesch wrote:
Hello,
The crash happen once. it can't be reproduced.
The pai seems good, why it cannot be parsed?
apparently it was parsed, but then the content got reset. The sip_msg_t for request is accessed via a callback inside acc module when the sip_msg_t for response is handled.
So I have to see why it got reset, it shouldn't -- the patch so far was to prevent the crash.
Cheers, Daniel
Regards,
Igor.
2014-05-29 17:11 GMT+02:00 Daniel-Constantin Mierla < mailto:miconda@gmail.com miconda@gmail.com>:
Hello,
for the moment I added a safety check to prevent crash in such situation: - http://git.sip-router.org/cgi-bin/gitweb.cgi/sip-router/?a=commit;h=e633ca6b7e748a77825d3208e86bf9bce18944a5 http://git.sip-router.org/cgi-bin/gitweb.cgi/sip-router/?a=commit;h=e633ca6b...
I need to investigate more to discover why the parsed field has null content.
Does the crash happen often or can it be reproduced?
Cheers, Daniel
On 29/05/14 10:18, Daniel-Constantin Mierla wrote:
Hello,
I missed somehow the message with the pai parsed content. I will look over it later today.
Cheers, Daniel
On 28/05/14 18:45, Igor Potjevlesch wrote:
Hello,
Do you any ideas about the reason of this issue?
Is it caused by the last call? Do you have enough information with the PAI?
Regards,
Igor.
2014-05-28 13:47 GMT+02:00 Igor Potjevlesch < mailto:igor.potjevlesch@gmail.com igor.potjevlesch@gmail.com>:
Hello,
p *msg->pai :
$4 = {type = HDR_PAI_T, name = { s = 0x7fad2cf8af74 "P-Asserted-Identity: "0123456789"sip:0123456789@a.b.c.d\r\nContent-Type: application/sdp\r\nContent-Length: 298\r\n\r\nv=0\r\no=root 1751857229 1751857230 IN IP4 a.b.c.d\r\ns=Asterisk PBX 1.6.2.9-2+squeeze3\r\nc=IN IP4 a.b.c.d\r\nt=0 0\r\nm=audio 11886 RTP/AVP 8 3 0 101\r\na=rtpmap:8 PCMA/8000\r\na=rtpmap:3 GSM/8000\r\na=rtpmap:0 PCMU/8000\r\na=rtpmap:101 telephone-event/8000\r\na=fmtp:101 0-16\r\na=ptime:20\r\na=sendrecv\r\n", len = 19}, body = { s = 0x7fad2cf8af89 ""0123456789"sip:0123456789@a.b.c.d\r\nContent-Type: application/sdp\r\nContent-Length: 298\r\n\r\nv=0\r\no=root 1751857229 1751857230 IN IP4 a.b.c.d\r\ns=Asterisk PBX 1.6.2.9-2+squeeze3\r\nc=IN IP4 a.b.c.d\r\nt=0 0\r\nm=audio 11886 RTP/AVP 8 3 0 101\r\na=rtpmap:8 PCMA/8000\r\na=rtpmap:3 GSM/8000\r\na=rtpmap:0 PCMU/8000\r\na=rtpmap:101 telephone-event/8000\r\na=fmtp:101 0-16\r\na=ptime:20\r\na=sendrecv\r\n", len = 43}, len = 66, parsed = 0x7fad389a7220, next = 0x7fad2cf8baf0}
p *((p_id_body_t*)msg->pai->parsed) :
$5 = {id = 0x0, num_ids = 0, next = 0x0}
Regards,
Igor.
2014-05-28 13:29 GMT+02:00 Daniel-Constantin Mierla <miconda@gmail.com mailto:miconda@gmail.com >:
Hello,
I need now:
p *msg->pai p *((p_id_body_t*)msg->pai->parsed)
Cheers, Daniel
Hello,
the patch will be on 4.1.4.
Can you give the 'bt full' for the new coredump file?
Also, locate where is variable 't' available in a frame and do in that frame:
set print elements 2000 p *t p *t->uas.request
Cheers, Daniel
On 09/06/14 10:14, Igor Potjevlesch wrote:
Hello Daniel,
New occurrence happened on Saturday.
I got the following information according to your previous email:
(gdb) p *msg->pai
$2 = {type = HDR_PAI_T, name = {
s = 0x7f6a60cd34b8 "P-Asserted-Identity: "0123456789"sip:0123456789@A.B.C.D\r\nContact: sip:0123456789@A.B.C.D:5060\r\nAllow: INVITE, BYE, REGISTER, ACK, OPTIONS, CANCEL, SUBSCRIBE, NOTIFY, INFO, REFER, UPDATE\r\nSupported: path, replaces, timer, tdialog\r\nSession-Expires: 1800\r\nExpires: 300\r\nOrganization: Dialogic\r\nContent-Type: application/sdp\r\nContent-Length: 303\r\n\r\nv=0\r\no=Dialogic_SDP 14338449 0 IN IP4 A.B.C.D\r\ns=Dialogic-SIP\r\nc=IN IP4 A.B.C.D\r\nt=0 0\r\nm=audio 8708 RTP/AVP 8 0 18 101\r\na=rtpmap:0 PCMU/8000\r\na=rtpmap:8 PCMA/8000\r\na=rtpmap:18 G729/8000\r\na=fmtp:18 annexb=yes\r\na=rtpmap:101 telephone-event/8000\r\na=fmtp:101 0-15\r\na=silenceSupp:off - - - -\r\n", len = 19}, body = {
s = 0x7f6a60cd34cd ""0123456789"sip:0123456789@A.B.C.D\r\nContact: sip:0123456789@A.B.C.D:5060\r\nAllow: INVITE, BYE, REGISTER, ACK, OPTIONS, CANCEL, SUBSCRIBE, NOTIFY, INFO, REFER, UPDATE\r\nSupported: path, replaces, timer, tdialog\r\nSession-Expires: 1800\r\nExpires: 300\r\nOrganization: Dialogic\r\nContent-Type: application/sdp\r\nContent-Length: 303\r\n\r\nv=0\r\no=Dialogic_SDP 14338449 0 IN IP4 A.B.C.D\r\ns=Dialogic-SIP\r\nc=IN IP4 A.B.C.D\r\nt=0 0\r\nm=audio 8708 RTP/AVP 8 0 18 101\r\na=rtpmap:0 PCMU/8000\r\na=rtpmap:8 PCMA/8000\r\na=rtpmap:18 G729/8000\r\na=fmtp:18 annexb=yes\r\na=rtpmap:101 telephone-event/8000\r\na=fmtp:101 0-15\r\na=silenceSupp:off - - - -\r\n", len = 43}, len = 66, parsed = 0x7f6a6d81da88, next = 0x7f6a60cd3f10}
(gdb) p *((p_id_body_t*)msg->pai->parsed)
$3 = {id = 0x0, num_ids = 0, next = 0x0}
(gdb)
I still not patched. Do you schedule to include the patch in 4.1.4?
Do you need more information?
Regards,
Igor.
*De :*Daniel-Constantin Mierla [mailto:miconda@gmail.com mailto:miconda@gmail.com] *Envoyé :* vendredi 30 mai 2014 18:02 *À :* Igor Potjevlesch; Kamailio (SER) - Users Mailing List *Objet :* Re: [SR-Users] Crash Kamailio 4.1.3
Hello,
On 30/05/14 17:41, Igor Potjevlesch wrote:
Hello, The crash happen once. it can't be reproduced. The pai seems good, why it cannot be parsed?
apparently it was parsed, but then the content got reset. The sip_msg_t for request is accessed via a callback inside acc module when the sip_msg_t for response is handled.
So I have to see why it got reset, it shouldn't -- the patch so far was to prevent the crash.
Cheers, Daniel
Regards, Igor. 2014-05-29 17:11 GMT+02:00 Daniel-Constantin Mierla <miconda@gmail.com <mailto:miconda@gmail.com>>: Hello, for the moment I added a safety check to prevent crash in such situation: - http://git.sip-router.org/cgi-bin/gitweb.cgi/sip-router/?a=commit;h=e633ca6b7e748a77825d3208e86bf9bce18944a5 I need to investigate more to discover why the parsed field has null content. Does the crash happen often or can it be reproduced? Cheers, Daniel On 29/05/14 10:18, Daniel-Constantin Mierla wrote: Hello, I missed somehow the message with the pai parsed content. I will look over it later today. Cheers, Daniel On 28/05/14 18:45, Igor Potjevlesch wrote: Hello, Do you any ideas about the reason of this issue? Is it caused by the last call? Do you have enough information with the PAI? Regards, Igor. 2014-05-28 13:47 GMT+02:00 Igor Potjevlesch <igor.potjevlesch@gmail.com <mailto:igor.potjevlesch@gmail.com>>: Hello, p *msg->pai : $4 = {type = HDR_PAI_T, name = { s = 0x7fad2cf8af74 "P-Asserted-Identity: \"0123456789\"<sip:0123456789@a.b.c.d>\r\nContent-Type: application/sdp\r\nContent-Length: 298\r\n\r\nv=0\r\no=root 1751857229 1751857230 IN IP4 a.b.c.d\r\ns=Asterisk PBX 1.6.2.9-2+squeeze3\r\nc=IN IP4 a.b.c.d\r\nt=0 0\r\nm=audio 11886 RTP/AVP 8 3 0 101\r\na=rtpmap:8 PCMA/8000\r\na=rtpmap:3 GSM/8000\r\na=rtpmap:0 PCMU/8000\r\na=rtpmap:101 telephone-event/8000\r\na=fmtp:101 0-16\r\na=ptime:20\r\na=sendrecv\r\n", len = 19}, body = { s = 0x7fad2cf8af89 "\"0123456789\"<sip:0123456789@a.b.c.d>\r\nContent-Type: application/sdp\r\nContent-Length: 298\r\n\r\nv=0\r\no=root 1751857229 1751857230 IN IP4 a.b.c.d\r\ns=Asterisk PBX 1.6.2.9-2+squeeze3\r\nc=IN IP4 a.b.c.d\r\nt=0 0\r\nm=audio 11886 RTP/AVP 8 3 0 101\r\na=rtpmap:8 PCMA/8000\r\na=rtpmap:3 GSM/8000\r\na=rtpmap:0 PCMU/8000\r\na=rtpmap:101 telephone-event/8000\r\na=fmtp:101 0-16\r\na=ptime:20\r\na=sendrecv\r\n", len = 43}, len = 66, parsed = 0x7fad389a7220, next = 0x7fad2cf8baf0} p *((p_id_body_t*)msg->pai->parsed) : $5 = {id = 0x0, num_ids = 0, next = 0x0} Regards, Igor. 2014-05-28 13:29 GMT+02:00 Daniel-Constantin Mierla <miconda@gmail.com <mailto:miconda@gmail.com>>: Hello, I need now: p *msg->pai p *((p_id_body_t*)msg->pai->parsed) Cheers, Daniel -- Daniel-Constantin Mierla -http://www.asipto.com http://twitter.com/#!/miconda <http://twitter.com/#%21/miconda> -http://www.linkedin.com/in/miconda -- Daniel-Constantin Mierla -http://www.asipto.com http://twitter.com/#!/miconda <http://twitter.com/#%21/miconda> -http://www.linkedin.com/in/miconda
-- Daniel-Constantin Mierla -http://www.asipto.com http://twitter.com/#!/miconda http://twitter.com/#%21/miconda -http://www.linkedin.com/in/miconda
Hello,
Thank you for your reply.
The “t” variable Is unavailable:
(gdb) p *t
No symbol "t" in current context.
(gdb) p *t->uas.request
No symbol "t" in current context.
Here is the result of the “bt full”:
#0 0x0000000000495792 in pv_get_strval (msg=0x7f6a60cd2c10, param=0x7f6a6c106288, res=0x7fff54abdf00, sval=0x18) at pvapi.c:521
No locals.
#1 0x00007f6a6a12ada8 in pv_get_pai (msg=0x7f6a60cd2c10, param=0x7f6a6c106288, res=0x7fff54abdf00) at pv_core.c:1021
idxf = 0
idx = 0
pai_body = 0x7f6a6d81da88
pai_uri = 0x0
i = 0
cur_id = 0
__FUNCTION__ = "pv_get_pai"
#2 0x0000000000499518 in pv_get_spec_value (msg=0x7f6a60cd2c10, sp=0x7f6a6c106270, value=0x7fff54abdf00) at pvapi.c:1266
ret = 0
__FUNCTION__ = "pv_get_spec_value"
#3 0x00007f6a687e77d9 in extra2strar (extra=0x7f6a6c106260, rq=0x7f6a60cd2c10, val_arr=0x7f6a689f4e30, int_arr=0x7f6a689f537c,
type_arr=0x7f6a689f54e7 "\002\002\002\002") at acc_extra.c:261
value = {rs = {s = 0x0, len = 0}, ri = 0, flags = 0}
n = 4
r = 0
__FUNCTION__ = "extra2strar"
#4 0x00007f6a687df393 in acc_db_request (rq=0x7f6a60cd2c10) at acc.c:474
m = 7
n = 1624058896
i = 6
t = 0x414cc0
__FUNCTION__ = "acc_db_request"
#5 0x00007f6a687e9b43 in acc_onreply (t=0x7f6a60d16ff8, req=0x7f6a60cd2c10, reply=0x7f6a6c119aa8, code=200) at acc_logic.c:471
new_uri_bk = {
s = 0x7f6a60a178ff "sip:s@W.X.Y.Z SIP/2.0\r\nRecord-Route: sip:E.F.G.H;lr=on\r\nVia: SIP/2.0/UDP E.F.G.H;branch=z9hG4bKe167.3f64673b859127c758ec8b685c8ceac2.0\r\nVia: SIP/2.0/UDP A.B.C.D:5060;rport=5060;branch=z9hG4bK-53e-1402165595-3328-96\r\nCall-ID: 3781-4b1-572014182635-OGNAJ-1-A.B.C.D\r\nCSeq: 1 INVITE\r\nMax-Forwards: 69\r\nTo: sip:0123456789@E.F.G.H:5060\r\nFrom: "0987654321"sip:0987654321@A.B.C.D;tag=95ffcd055e0f78f7d5d397020e89288de9c8e717\r\nUser-Agent: Dialogic-SIP/10.5.3.372 OGNAJ 1\r\nTimestamp: 06072014182635\r\nP-Asserted-Identity: "0987654321"sip:0987654321@A.B.C.D\r\nContact: sip:0987654321@A.B.C.D:5060\r\nAllow: INVITE, BYE, REGISTER, ACK, OPTIONS, CANCEL, SUBSCRIBE, NOTIFY, INFO, REFER, UPDATE\r\nSupported: path, replaces, timer, tdialog\r\nSession-Expires: 1800\r\nExpires: 300\r\nOrganization: Dialogic\r\nContent-Type: application/sdp\r\nContent-Length: 303\r\n\r\nv=0\r\no=Dialogic_SDP 14338449 0 IN IP4 A.B.C.D\r\ns=Dialogic-SIP\r\nc=IN IP4 I.J.K.L\r\nt=0 0\r\nm=audio 8708 RTP/AVP 8 0 18 101\r\na=rtpmap:0 PCMU/8000\r\na=rtpmap:8 PCMA/8000\r\na=rtpmap:18 G729/8000\r\na=fmtp:18 annexb=yes\r\na=rtpmap:101 telephone-event/8000\r\na=fmtp:101 0-15\r\na=silenceSupp:off - - - -\r\n", len = 20}
br = 0
__FUNCTION__ = "acc_onreply"
#6 0x00007f6a687ea08d in tmcb_func (t=0x7f6a60d16ff8, type=512, ps=0x7fff54abe170) at acc_logic.c:559
__FUNCTION__ = "tmcb_func"
#7 0x00007f6a6a9e4478 in run_trans_callbacks_internal (cb_lst=0x7f6a60d17068, type=512, trans=0x7f6a60d16ff8, params=0x7fff54abe170)
at t_hooks.c:290
cbp = 0x7f6a609f24e0
backup_from = 0x934630
backup_to = 0x934638
backup_dom_from = 0x934640
backup_dom_to = 0x934648
backup_uri_from = 0x934620
backup_uri_to = 0x934628
backup_xavps = 0x934760
__FUNCTION__ = "run_trans_callbacks_internal"
#8 0x00007f6a6a9e468a in run_trans_callbacks_with_buf (type=512, rbuf=0x7f6a60d170b8, req=0x7f6a60cd2c10, repl=0x7f6a6c119aa8,
flags=200) at t_hooks.c:336
params = {req = 0x7f6a60cd2c10, rpl = 0x7f6a6c119aa8, param = 0x7f6a609f24f0, code = 200, flags = 200, branch = 0,
t_rbuf = 0x7f6a60d170b8, dst = 0x7f6a60d17108, send_buf = {
s = 0x7f6a60a78938 "SIP/2.0 200 OK\r\nVia: SIP/2.0/UDP A.B.C.D:5060;rport=5060;branch=z9hG4bK-53e-1402165595-3328-96\r\nRecord-Route: sip:E.F.G.H;lr=on\r\nFrom: "0987654321"sip:0987654321@A.B.C.D;tag=95ffcd055e0f78f7d5d397020e89288de9c8e717---Type <return> to continue, or q <return> to quit---
r\nTo: sip:0123456789@E.F.G.H:5060;tag=as2fc4baac\r\nCall-ID: 3781-4b1-572014182635-OGNAJ-1-A.B.C.D\r\nCSeq: 1 INVITE\r\nServer: Asterisk PBX 1.6.2.9-2+squeeze3\r\nAllow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, SUBSCRIBE, NOTIFY, INFO\r\nSupported: replaces, timer\r\nContact: sip:s@W.X.Y.Z\r\nContent-Type: application/sdp\r\nContent-Length: 275\r\n\r\nv=0\r\no=root 1164105102 1164105102 IN IP4 W.X.Y.Z\r\ns=Asterisk PBX 1.6.2.9-2+squeeze3\r\nc=IN IP4 W.X.Y.Z\r\nt=0 0\r\nm=audio 11426 RTP/AVP 0 8 101\r\na=rtpmap:0 PCMU/8000\r\na=rtpmap:8 PCMA/8000\r\na=rtpmap:101 telephone-event/8000\r\na=fmtp:101 0-16\r\na=ptime:20\r\na=sendrecv\r\n\r\n\n\n",
len = 866}}
trans = 0x7f6a60d16ff8
#9 0x00007f6a6aa16c06 in relay_reply (t=0x7f6a60d16ff8, p_msg=0x7f6a6c119aa8, branch=0, msg_status=200, cancel_data=0x7fff54abe4d0,
do_put_on_wait=1) at t_reply.c:2001
relay = 0
save_clone = 0
buf = 0x7f6a6d8027d0 "SIP/2.0 200 OK\r\nVia: SIP/2.0/UDP A.B.C.D:5060;rport=5060;branch=z9hG4bK-53e-1402165595-3328-96\r\nRecord-Route: sip:E.F.G.H;lr=on\r\nFrom: "0987654321"sip:0987654321@A.B.C.D;tag=95ffcd055e0f78f7d5d397020e89288de9c8e717\r\nTo: sip:0123456789@E.F.G.H:5060;tag=as2fc4baac\r\nCall-ID: 3781-4b1-572014182635-OGNAJ-1-A.B.C.D\r\nCSeq: 1 INVITE\r\nServer: Asterisk PBX 1.6.2.9-2+squeeze3\r\nAllow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, SUBSCRIBE, NOTIFY, INFO\r\nSupported: replaces, timer\r\nContact: sip:s@W.X.Y.Z\r\nContent-Type: application/sdp\r\nContent-Length: 275\r\n\r\nv=0\r\no=root 1164105102 1164105102 IN IP4 W.X.Y.Z\r\ns=Asterisk PBX 1.6.2.9-2+squeeze3\r\nc=IN IP4 W.X.Y.Z\r\nt=0 0\r\nm=audio 11426 RTP/AVP 0 8 101\r\na=rtpmap:0 PCMU/8000\r\na=rtpmap:8 PCMA/8000\r\na=rtpmap:101 telephone-event/8000\r\na=fmtp:101 0-16\r\na=ptime:20\r\na=sendrecv\r\n"
res_len = 866
relayed_code = 200
relayed_msg = 0x7f6a6c119aa8
reply_bak = 0x7fff54abe320
bm = {to_tag_val = {s = 0x7f6a60d18590 "", len = 5448975}}
totag_retr = 0
reply_status = RPS_COMPLETED
uas_rb = 0x7f6a60d170b8
to_tag = 0x0
reason = {s = 0x154abe2d0 <Address 0x154abe2d0 out of bounds>, len = 1}
onsend_params = {req = 0x2009249c9, rpl = 0x7f6a6aa36f90, param = 0x414cc0, code = 1, flags = 0, branch = 0,
t_rbuf = 0x7f6a5669f828, dst = 0x7f6a6c119ca0, send_buf = {s = 0x54abe2f0 <Address 0x54abe2f0 out of bounds>, len = 1024}}
__FUNCTION__ = "relay_reply"
#10 0x00007f6a6aa190b7 in reply_received (p_msg=0x7f6a6c119aa8) at t_reply.c:2499
msg_status = 200
last_uac_status = 180
ack = 0x40 <Address 0x40 out of bounds>
ack_len = 0
branch = 0
reply_status = 1826607512
onreply_route = 1
cancel_data = {cancel_bitmap = 0, reason = {cause = 200, u = {text = {s = 0x0, len = 9586191}, e2e_cancel = 0x0, packed_hdrs = {
s = 0x0, len = 9586191}}}}
uac = 0x7f6a60d17160
t = 0x7f6a60d16ff8
lack_dst = {send_sock = 0x7f6a6c128b20, to = {s = {sa_family = 4112, sa_data = "\357kj\177\000\000h\227\220\001\000\000\000"},
sin = {sin_family = 4112, sin_port = 27631, sin_addr = {s_addr = 32618}, sin_zero = "h\227\220\001\000\000\000"}, sin6 = {
sin6_family = 4112, sin6_port = 27631, sin6_flowinfo = 32618, sin6_addr = {__in6_u = {
__u6_addr8 = "h\227\220\001\000\000\000\000\070\363\004lj\177\000", __u6_addr16 = {38760, 400, 0, 0, 62264, 27652,
32618, 0}, __u6_addr32 = {26253160, 0, 1812263736, 32618}}}, sin6_scope_id = 1810830208}}, id = 32618,
proto = 80 'P', send_flags = {f = 114 'r', blst_imask = 18 '\022'}}
backup_user_from = 0x934630
backup_user_to = 0x934638
backup_domain_from = 0x934640
backup_domain_to = 0x934648
backup_uri_from = 0x934620
backup_uri_to = 0x934628
backup_xavps = 0x934760
replies_locked = 1
branch_ret = 0
prev_branch = 1420551568
blst_503_timeout = 32767
hf = 0x7f6a6c119ac8
onsend_params = {req = 0x7fff54abe550, rpl = 0x550a24, param = 0x19095a8, code = 0, flags = 3, branch = 0,
t_rbuf = 0x7f6a6bef1380, dst = 0x7f6a6c127220, send_buf = {s = 0x7fff54abe550 "`G\223", len = 5537669}}
ctx = {rec_lev = 0, run_flags = 0, last_retcode = 0, jmp_env = {{__jmpbuf = {140095056354464, -2027732440029261969, 4279488,
140734613941120, 0, 0, -2027732440067010705, 2027365049374019439}, __mask_was_saved = 0, __saved_mask = {__val = {
140095055547592, 9586548, 9586228, 140734613939296, 140095069868440, 9587145, 9586197, 361695345073193192, 9586295,
9586274, 1826607464, 140095069868440, 140095056428208, 140095056354464, 4279488, 140734613941120}}}}}
__FUNCTION__ = "reply_received"
#11 0x000000000045d837 in do_forward_reply (msg=0x7f6a6c119aa8, mode=0) at forward.c:777
new_buf = 0x0
dst = {send_sock = 0x0, to = {s = {sa_family = 0, sa_data = '\000' <repeats 13 times>}, sin = {sin_family = 0, sin_port = 0,
sin_addr = {s_addr = 0}, sin_zero = "\000\000\000\000\000\000\000"}, sin6 = {sin6_family = 0, sin6_port = 0,
sin6_flowinfo = 0, sin6_addr = {__in6_u = {__u6_addr8 = '\000' <repeats 15 times>, __u6_addr16 = {0, 0, 0, 0, 0, 0, 0, 0},
__u6_addr32 = {0, 0, 0, 0}}}, sin6_scope_id = 0}}, id = 0, proto = 0 '\000', send_flags = {f = 0 '\000',
blst_imask = 0 '\000'}}
new_len = 32618
r = 1
s = 0x3c96c119ab0 <Address 0x3c96c119ab0 out of bounds>
len = 0
__FUNCTION__ = "do_forward_reply"
#12 0x000000000045e0f8 in forward_reply (msg=0x7f6a6c119aa8) at forward.c:860
No locals.
#13 0x00000000004a5887 in receive_msg (
buf=0x924600 "SIP/2.0 200 OK\r\nVia: SIP/2.0/UDP E.F.G.H;branch=z9hG4bKe167.3f64673b859127c758ec8b685c8ceac2.0;received=E.F.G.H\r\nVia: SIP/2.0/UDP A.B.C.D:5060;rport=5060;branch=z9hG4bK-53e-1402165595-3328-96\r\nRecord-Route: sip:E.F.G.H;lr=on\r\nFrom: "0987654321"sip:0987654321@A.B.C.D;tag=95ffcd055e0f78f7d5d397020e89288de9c8e717\r\nTo: sip:0123456789@E.F.G.H:5060;tag=as2fc4baac\r\nCall-ID: 3781-4b1-572014182635-OGNAJ-1-A.B.C.D\r\nCSeq: 1 INVITE\r\nServer: Asterisk PBX 1.6.2.9-2+squeeze3\r\nAllow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, SUBSCRIBE, NOTIFY, INFO\r\nSupported: replaces, timer\r\nContact: sip:s@W.X.Y.Z\r\nContent-Type: application/sdp\r\nContent-Length: 275\r\n\r\nv=0\r\no=root 1164105102 1164105102 IN IP4 W.X.Y.Z\r\ns=Asterisk PBX 1.6.2.9-2+squeeze3\r\nc=IN IP4 W.X.Y.Z\r\nt=0 0\r\nm=audio 11426 RTP/AVP 0 8 101\r\na=rtpmap:0 PCMU/8000\r\na=rtpmap:8 PCMA/8000\r\na=rtpmap:101 telephone-event/8000\r\na=fmtp:101 0-16\r\na=ptime:20\r\na=sendrecv\r\n", len=969, rcv_info=0x7fff54abe850) at receive.c:273
msg = 0x7f6a6c119aa8
ctx = {rec_lev = 8868984, run_flags = 0, last_retcode = 0, jmp_env = {{__jmpbuf = {0, 0, 0, 263853236176, 1, 0, 169314554752,
9586112}, __mask_was_saved = 1420552280, __saved_mask = {__val = {140095054350064, 12884901898, 140095054350064,
4279488, 140734613941120, 140734613940176, 5477586, 0, 140094693045632, 50195, 168953509248, 9586112, 140734613940304,
140734613940224, 5474421, 4279488}}}}}
ret = 32618
inb = {
s = 0x924600 "SIP/2.0 200 OK\r\nVia: SIP/2.0/UDP E.F.G.H;branch=z9hG4bKe167.3f64673b859127c758ec8b685c8ceac2.0;received=E.F.G.H\r\nVia: SIP/2.0/UDP A.B.C.D:5060;rport=5060;branch=z9hG4bK-53e-1402165595-3328-96\r\nRecord-Route: sip:E.F.G.H;lr=on\r\nFrom: "0987654321"sip:0987654321@A.B.C.D;tag=95ffcd055e0f78f7d5d397020e89288de9c8e717\r\nTo: sip:0123456789@E.F.G.H:5060;tag=as2fc4baac\r\nCall-ID: 3781-4b1-572014182635-OGNAJ-1-A.B.C.D\r\nCSeq: 1 INVITE\r\nServer: Asterisk PBX 1.6.2.9-2+squeeze3\r\nAllow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, SUBSCRIBE, NOTIFY, INFO\r\nSupported: replaces, timer\r\nContact: sip:s@W.X.Y.Z\r\nContent-Type: application/sdp\r\nContent-Length: 275\r\n\r\nv=0\r\no=root 1164105102 1164105102 IN IP4 W.X.Y.Z\r\ns=Asterisk PBX 1.6.2.9-2+squeeze3\r\nc=IN IP4 W.X.Y.Z\r\nt=0 0\r\nm=audio 11426 RTP/AVP 0 8 101\r\na=rtpmap:0 PCMU/8000\r\na=rtpmap:8 PCMA/8000\r\na=rtpmap:101 telephone-event/8000\r\na=fmtp:101 0-16\r\na=ptime:20\r\na=sendrecv\r\n", len = 969}
__FUNCTION__ = "receive_msg"
#14 0x000000000053c838 in udp_rcv_loop () at udp_server.c:536
len = 969
buf = "SIP/2.0 200 OK\r\nVia: SIP/2.0/UDP E.F.G.H;branch=z9hG4bKe167.3f64673b859127c758ec8b685c8ceac2.0;received=E.F.G.H\r\nVia: SIP/2.0/UDP A.B.C.D:5060;rport=5060;branch=z9hG4bK-53e-1402165595-3328-96\r\nRecord-Route: sip:E.F.G.H;lr=on\r\nFrom: "0987654321"sip:0987654321@A.B.C.D;tag=95ffcd055e0f78f7d5d397020e89288de9c8e717\r\nTo: sip:0123456789@E.F.G.H:5060;tag=as2fc4baac\r\nCall-ID: 3781-4b1-572014182635-OGNAJ-1-A.B.C.D\r\nCSeq: 1 INVITE\r\nServer: Asterisk PBX 1.6.2.9-2+squeeze3\r\nAllow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, SUBSCRIBE, NOTIFY, INFO\r\nSupported: replaces, timer\r\nContact: sip:s@W.X.Y.Z\r\nContent-Type: application/sdp\r\nContent-Length: 275\r\n\r\nv=0\r\no=root 1164105102 1164105102 IN IP4 W.X.Y.Z\r\ns=Asterisk PBX 1.6.2.9-2+squeeze3\r\nc=IN IP4 W.X.Y.Z\r\nt=0 0\r\nm=audio 11426 RTP/AVP 0 8 101\r\na=rtpmap:0 PCMU/8000\r\na=rtpmap:8 PCMA/8000\r\na=rtpmap:101 telephone-event/8000\r\na=fmtp:101 0-16\r\na=ptime:20\r\na=sendrecv\r\n\000a=rtpmap:18 G729/8000\r\na=fmtp:18 annexb=yes\r\na=rtpmap:101 telephone-event/8000\r\na=fmtp:101 0-15\r\na=silenceSupp:off - - - -\r\n\000rtpmap:101 telephone-event/8000\r\na=fmtp:101 0-15\r\na=silenceSupp:off - - - -\r\na=ptime:20\r\n\000/8000\r\na=silenceSupp:off - - - -\r\na=fmtp:18 annexb=no\r\na=fmtp:114 mode=20\r\na=fmtp:101 0-15,144,149,159\r\na=ptime:20\r\na=sendrecv\r\n\000\na=T38FaxTranscodingJBIG:0\r\na=T38FaxRateManagement:transferredTCF\r\na=T38FaxUdpEC:t38UDPRedundancy\r\n\000axBitRate:14400\r\na=T38FaxUdpEC:t38UDPRedundancy\r\na=T38FaxRateManagement:transferredTCF\r\n\000tpmap:8 PCMA/8000\r\na=rtpmap:99 G726-32/8000\r\na=rtpmap:18 G729/8000\r\na=fmtp:18 annexb=no\r\na=rtpmap:96 telephone-event/8000\r\na=fmtp:96 0-15\r\na=ptime:20\r\na=sendrecv\r\n\000/8000\r\na=fmtp:101 0-16\r\n\000tp:96 0-15\r\na=ptime:20\r\na=sendrecv\r\n\000orwards: 2\r\nUser-Agent: Sagem / HW_V0.0.1 / FW_V-13P036 / SW_V1.2.268\r\nContact: sip:0147258369@M.N.O.P:5060\r\nProxy-Authorization: Digest username="0147258369",realm="sip.domain.tld",nonce="53918e228ef8a40eb1d34d4d8bad809fee0a7e86",uri="sip:0258963147@sip.domain.tld","...
tmp = 0x9245c0 "10.143.1.2"
from = 0x7f6a6c04b428
fromlen = 16
ri = {src_ip = {af = 2, len = 4, u = {addrl = {1950469485, 140095054350064}, addr32 = {1950469485, 0, 1811089136, 32618},
addr16 = {52589, 29761, 0, 0, 1776, 27635, 32618, 0}, addr = "m\315At\000\000\000\000\360\006\363kj\177\000"}}, dst_ip = {
af = 2, len = 4, u = {addrl = {67638457, 0}, addr32 = {67638457, 0, 0, 0}, addr16 = {5305, 1032, 0, 0, 0, 0, 0, 0},
addr = "\271\024\b\004", '\000' <repeats 11 times>}}, src_port = 5060, dst_port = 5060, proto_reserved1 = 0,
proto_reserved2 = 0, src_su = {s = {sa_family = 2, sa_data = "\023\304m\315At\000\000\000\000\000\000\000"}, sin = {
sin_family = 2, sin_port = 50195, sin_addr = {s_addr = 1950469485}, sin_zero = "\000\000\000\000\000\000\000"}, sin6 = {
sin6_family = 2, sin6_port = 50195, sin6_flowinfo = 1950469485, sin6_addr = {__in6_u = {
__u6_addr8 = '\000' <repeats 15 times>, __u6_addr16 = {0, 0, 0, 0, 0, 0, 0, 0}, __u6_addr32 = {0, 0, 0, 0}}},
sin6_scope_id = 0}}, bind_address = 0x7f6a6bf30588, proto = 1 '\001'}
__FUNCTION__ = "udp_rcv_loop"
#15 0x000000000046d42b in main_loop () at main.c:1617
i = 10
pid = 0
si = 0x7f6a6bf30588
si_desc = "udp receiver child=10 sock=E.F.G.H:5060\000lj\177\000\000\320J\373kj\177\000\000^\204^\000\000\000\000\000@v^\000\000\000\000\000h\237Dw\000\000\000\000\300LA\000\000\000\000\000\200\353\253T\377\177", '\000' <repeats 18 times>"\300, \351\253T\377\177\000\000.\244K\000\000\000\000"
nrprocs = 15
__FUNCTION__ = "main_loop"
#16 0x00000000004704d3 in main (argc=7, argv=0x7fff54abeb88) at main.c:2533
cfg_stream = 0x1155010
c = -1
r = 0
tmp = 0x7fff54abff70 ""
tmp_len = 0
port = 0
proto = 0
options = 0x5e0998 ":f:cm:M:dVIhEeb:l:L:n:vKrRDTN:W:w:t:u:g:P:G:SQ:O:a:A:"
ret = -1
seed = 3032760445
rfd = 4
debug_save = 0
debug_flag = 0
dont_fork_cnt = 0
n_lst = 0x3d6f60fb88
p = 0x5caae0 "H\211l$\330L\211d$\340H\215-\017\245*"
__FUNCTION__ = "main"
Regards,
Igor.
De : Daniel-Constantin Mierla [mailto:miconda@gmail.com] Envoyé : lundi 9 juin 2014 12:52 À : Igor Potjevlesch; 'Kamailio (SER) - Users Mailing List' Objet : Re: [SR-Users] Crash Kamailio 4.1.3
Hello,
the patch will be on 4.1.4.
Can you give the 'bt full' for the new coredump file?
Also, locate where is variable 't' available in a frame and do in that frame:
set print elements 2000 p *t p *t->uas.request
Cheers, Daniel
On 09/06/14 10:14, Igor Potjevlesch wrote:
Hello Daniel,
New occurrence happened on Saturday.
I got the following information according to your previous email:
(gdb) p *msg->pai
$2 = {type = HDR_PAI_T, name = {
s = 0x7f6a60cd34b8 "P-Asserted-Identity: "0123456789" sip:0123456789@A.B.C.D sip:0123456789@A.B.C.D\r\nContact: sip:0123456789@A.B.C.D:5060 sip:0123456789@A.B.C.D:5060\r\nAllow: INVITE, BYE, REGISTER, ACK, OPTIONS, CANCEL, SUBSCRIBE, NOTIFY, INFO, REFER, UPDATE\r\nSupported: path, replaces, timer, tdialog\r\nSession-Expires: 1800\r\nExpires: 300\r\nOrganization: Dialogic\r\nContent-Type: application/sdp\r\nContent-Length: 303\r\n\r\nv=0\r\no=Dialogic_SDP 14338449 0 IN IP4 A.B.C.D\r\ns=Dialogic-SIP\r\nc=IN IP4 A.B.C.D\r\nt=0 0\r\nm=audio 8708 RTP/AVP 8 0 18 101\r\na=rtpmap:0 PCMU/8000\r\na=rtpmap:8 PCMA/8000\r\na=rtpmap:18 G729/8000\r\na=fmtp:18 annexb=yes\r\na=rtpmap:101 telephone-event/8000\r\na=fmtp:101 0-15\r\na=silenceSupp:off - - - -\r\n", len = 19}, body = {
s = 0x7f6a60cd34cd ""0123456789" sip:0123456789@A.B.C.D sip:0123456789@A.B.C.D\r\nContact: sip:0123456789@A.B.C.D:5060 sip:0123456789@A.B.C.D:5060\r\nAllow: INVITE, BYE, REGISTER, ACK, OPTIONS, CANCEL, SUBSCRIBE, NOTIFY, INFO, REFER, UPDATE\r\nSupported: path, replaces, timer, tdialog\r\nSession-Expires: 1800\r\nExpires: 300\r\nOrganization: Dialogic\r\nContent-Type: application/sdp\r\nContent-Length: 303\r\n\r\nv=0\r\no=Dialogic_SDP 14338449 0 IN IP4 A.B.C.D\r\ns=Dialogic-SIP\r\nc=IN IP4 A.B.C.D\r\nt=0 0\r\nm=audio 8708 RTP/AVP 8 0 18 101\r\na=rtpmap:0 PCMU/8000\r\na=rtpmap:8 PCMA/8000\r\na=rtpmap:18 G729/8000\r\na=fmtp:18 annexb=yes\r\na=rtpmap:101 telephone-event/8000\r\na=fmtp:101 0-15\r\na=silenceSupp:off - - - -\r\n", len = 43}, len = 66, parsed = 0x7f6a6d81da88, next = 0x7f6a60cd3f10}
(gdb) p *((p_id_body_t*)msg->pai->parsed)
$3 = {id = 0x0, num_ids = 0, next = 0x0}
(gdb)
I still not patched. Do you schedule to include the patch in 4.1.4?
Do you need more information?
Regards,
Igor.
De : Daniel-Constantin Mierla [mailto: mailto:miconda@gmail.com miconda@gmail.com] Envoyé : vendredi 30 mai 2014 18:02 À : Igor Potjevlesch; Kamailio (SER) - Users Mailing List Objet : Re: [SR-Users] Crash Kamailio 4.1.3
Hello,
On 30/05/14 17:41, Igor Potjevlesch wrote:
Hello,
The crash happen once. it can't be reproduced.
The pai seems good, why it cannot be parsed?
apparently it was parsed, but then the content got reset. The sip_msg_t for request is accessed via a callback inside acc module when the sip_msg_t for response is handled.
So I have to see why it got reset, it shouldn't -- the patch so far was to prevent the crash.
Cheers, Daniel
Regards,
Igor.
2014-05-29 17:11 GMT+02:00 Daniel-Constantin Mierla < mailto:miconda@gmail.com miconda@gmail.com>:
Hello,
for the moment I added a safety check to prevent crash in such situation: - http://git.sip-router.org/cgi-bin/gitweb.cgi/sip-router/?a=commit;h=e633ca6b7e748a77825d3208e86bf9bce18944a5 http://git.sip-router.org/cgi-bin/gitweb.cgi/sip-router/?a=commit;h=e633ca6b...
I need to investigate more to discover why the parsed field has null content.
Does the crash happen often or can it be reproduced?
Cheers, Daniel
On 29/05/14 10:18, Daniel-Constantin Mierla wrote:
Hello,
I missed somehow the message with the pai parsed content. I will look over it later today.
Cheers, Daniel
On 28/05/14 18:45, Igor Potjevlesch wrote:
Hello,
Do you any ideas about the reason of this issue?
Is it caused by the last call? Do you have enough information with the PAI?
Regards,
Igor.
2014-05-28 13:47 GMT+02:00 Igor Potjevlesch < mailto:igor.potjevlesch@gmail.com igor.potjevlesch@gmail.com>:
Hello,
p *msg->pai :
$4 = {type = HDR_PAI_T, name = { s = 0x7fad2cf8af74 "P-Asserted-Identity: "0123456789" sip:0123456789@a.b.c.d sip:0123456789@a.b.c.d\r\nContent-Type: application/sdp\r\nContent-Length: 298\r\n\r\nv=0\r\no=root 1751857229 1751857230 IN IP4 a.b.c.d\r\ns=Asterisk PBX 1.6.2.9-2+squeeze3\r\nc=IN IP4 a.b.c.d\r\nt=0 0\r\nm=audio 11886 RTP/AVP 8 3 0 101\r\na=rtpmap:8 PCMA/8000\r\na=rtpmap:3 GSM/8000\r\na=rtpmap:0 PCMU/8000\r\na=rtpmap:101 telephone-event/8000\r\na=fmtp:101 0-16\r\na=ptime:20\r\na=sendrecv\r\n", len = 19}, body = { s = 0x7fad2cf8af89 ""0123456789" sip:0123456789@a.b.c.d sip:0123456789@a.b.c.d\r\nContent-Type: application/sdp\r\nContent-Length: 298\r\n\r\nv=0\r\no=root 1751857229 1751857230 IN IP4 a.b.c.d\r\ns=Asterisk PBX 1.6.2.9-2+squeeze3\r\nc=IN IP4 a.b.c.d\r\nt=0 0\r\nm=audio 11886 RTP/AVP 8 3 0 101\r\na=rtpmap:8 PCMA/8000\r\na=rtpmap:3 GSM/8000\r\na=rtpmap:0 PCMU/8000\r\na=rtpmap:101 telephone-event/8000\r\na=fmtp:101 0-16\r\na=ptime:20\r\na=sendrecv\r\n", len = 43}, len = 66, parsed = 0x7fad389a7220, next = 0x7fad2cf8baf0}
p *((p_id_body_t*)msg->pai->parsed) :
$5 = {id = 0x0, num_ids = 0, next = 0x0}
Regards,
Igor.
2014-05-28 13:29 GMT+02:00 Daniel-Constantin Mierla <miconda@gmail.com mailto:miconda@gmail.com >:
Hello,
I need now:
p *msg->pai p *((p_id_body_t*)msg->pai->parsed)
Cheers, Daniel
Hello,
t is available in frame 5 - in gdb do:
frame 5 p *t p *t->uas.request
Cheers, Daniel
On 09/06/14 15:33, Igor Potjevlesch wrote:
Hello,
Thank you for your reply.
The “t” variable Is unavailable:
(gdb) p *t
No symbol "t" in current context.
(gdb) p *t->uas.request
No symbol "t" in current context.
Here is the result of the “bt full”:
#0 0x0000000000495792 in pv_get_strval (msg=0x7f6a60cd2c10, param=0x7f6a6c106288, res=0x7fff54abdf00, sval=0x18) at pvapi.c:521
No locals.
#1 0x00007f6a6a12ada8 in pv_get_pai (msg=0x7f6a60cd2c10, param=0x7f6a6c106288, res=0x7fff54abdf00) at pv_core.c:1021
idxf = 0 idx = 0 pai_body = 0x7f6a6d81da88 pai_uri = 0x0 i = 0 cur_id = 0 __FUNCTION__ = "pv_get_pai"
#2 0x0000000000499518 in pv_get_spec_value (msg=0x7f6a60cd2c10, sp=0x7f6a6c106270, value=0x7fff54abdf00) at pvapi.c:1266
ret = 0 __FUNCTION__ = "pv_get_spec_value"
#3 0x00007f6a687e77d9 in extra2strar (extra=0x7f6a6c106260, rq=0x7f6a60cd2c10, val_arr=0x7f6a689f4e30, int_arr=0x7f6a689f537c,
type_arr=0x7f6a689f54e7 "\002\002\002\002") at acc_extra.c:261 value = {rs = {s = 0x0, len = 0}, ri = 0, flags = 0} n = 4 r = 0 __FUNCTION__ = "extra2strar"
#4 0x00007f6a687df393 in acc_db_request (rq=0x7f6a60cd2c10) at acc.c:474
m = 7 n = 1624058896 i = 6 t = 0x414cc0 __FUNCTION__ = "acc_db_request"
#5 0x00007f6a687e9b43 in acc_onreply (t=0x7f6a60d16ff8, req=0x7f6a60cd2c10, reply=0x7f6a6c119aa8, code=200) at acc_logic.c:471
new_uri_bk = { s = 0x7f6a60a178ff "sip:s@W.X.Y.Z SIP/2.0\r\nRecord-Route:
sip:E.F.G.H;lr=on\r\nVia: SIP/2.0/UDP E.F.G.H;branch=z9hG4bKe167.3f64673b859127c758ec8b685c8ceac2.0\r\nVia: SIP/2.0/UDP A.B.C.D:5060;rport=5060;branch=z9hG4bK-53e-1402165595-3328-96\r\nCall-ID: 3781-4b1-572014182635-OGNAJ-1-A.B.C.D\r\nCSeq: 1 INVITE\r\nMax-Forwards: 69\r\nTo: sip:0123456789@E.F.G.H:5060\r\nFrom: "0987654321"sip:0987654321@A.B.C.D;tag=95ffcd055e0f78f7d5d397020e89288de9c8e717\r\nUser-Agent: Dialogic-SIP/10.5.3.372 OGNAJ 1\r\nTimestamp: 06072014182635\r\nP-Asserted-Identity: "0987654321"sip:0987654321@A.B.C.D\r\nContact: sip:0987654321@A.B.C.D:5060\r\nAllow: INVITE, BYE, REGISTER, ACK, OPTIONS, CANCEL, SUBSCRIBE, NOTIFY, INFO, REFER, UPDATE\r\nSupported: path, replaces, timer, tdialog\r\nSession-Expires: 1800\r\nExpires: 300\r\nOrganization: Dialogic\r\nContent-Type: application/sdp\r\nContent-Length: 303\r\n\r\nv=0\r\no=Dialogic_SDP 14338449 0 IN IP4 A.B.C.D\r\ns=Dialogic-SIP\r\nc=IN IP4 I.J.K.L\r\nt=0 0\r\nm=audio 8708 RTP/AVP 8 0 18 101\r\na=rtpmap:0 PCMU/8000\r\na=rtpmap:8 PCMA/8000\r\na=rtpmap:18 G729/8000\r\na=fmtp:18 annexb=yes\r\na=rtpmap:101 telephone-event/8000\r\na=fmtp:101 0-15\r\na=silenceSupp:off - - - -\r\n", len = 20}
br = 0 __FUNCTION__ = "acc_onreply"
#6 0x00007f6a687ea08d in tmcb_func (t=0x7f6a60d16ff8, type=512, ps=0x7fff54abe170) at acc_logic.c:559
__FUNCTION__ = "tmcb_func"
#7 0x00007f6a6a9e4478 in run_trans_callbacks_internal (cb_lst=0x7f6a60d17068, type=512, trans=0x7f6a60d16ff8, params=0x7fff54abe170)
at t_hooks.c:290 cbp = 0x7f6a609f24e0 backup_from = 0x934630 backup_to = 0x934638 backup_dom_from = 0x934640 backup_dom_to = 0x934648 backup_uri_from = 0x934620 backup_uri_to = 0x934628 backup_xavps = 0x934760 __FUNCTION__ = "run_trans_callbacks_internal"
#8 0x00007f6a6a9e468a in run_trans_callbacks_with_buf (type=512, rbuf=0x7f6a60d170b8, req=0x7f6a60cd2c10, repl=0x7f6a6c119aa8,
flags=200) at t_hooks.c:336 params = {req = 0x7f6a60cd2c10, rpl = 0x7f6a6c119aa8, param =
0x7f6a609f24f0, code = 200, flags = 200, branch = 0,
t_rbuf = 0x7f6a60d170b8, dst = 0x7f6a60d17108, send_buf = { s = 0x7f6a60a78938 "SIP/2.0 200 OK\r\nVia: SIP/2.0/UDP
A.B.C.D:5060;rport=5060;branch=z9hG4bK-53e-1402165595-3328-96\r\nRecord-Route: sip:E.F.G.H;lr=on\r\nFrom: "0987654321"sip:0987654321@A.B.C.D;tag=95ffcd055e0f78f7d5d397020e89288de9c8e717---Type <return> to continue, or q <return> to quit---
r\nTo: sip:0123456789@E.F.G.H:5060;tag=as2fc4baac\r\nCall-ID: 3781-4b1-572014182635-OGNAJ-1-A.B.C.D\r\nCSeq: 1 INVITE\r\nServer: Asterisk PBX 1.6.2.9-2+squeeze3\r\nAllow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, SUBSCRIBE, NOTIFY, INFO\r\nSupported: replaces, timer\r\nContact: sip:s@W.X.Y.Z\r\nContent-Type: application/sdp\r\nContent-Length: 275\r\n\r\nv=0\r\no=root 1164105102 1164105102 IN IP4 W.X.Y.Z\r\ns=Asterisk PBX 1.6.2.9-2+squeeze3\r\nc=IN IP4 W.X.Y.Z\r\nt=0 0\r\nm=audio 11426 RTP/AVP 0 8 101\r\na=rtpmap:0 PCMU/8000\r\na=rtpmap:8 PCMA/8000\r\na=rtpmap:101 telephone-event/8000\r\na=fmtp:101 0-16\r\na=ptime:20\r\na=sendrecv\r\n\r\n\n\n",
len = 866}} trans = 0x7f6a60d16ff8
#9 0x00007f6a6aa16c06 in relay_reply (t=0x7f6a60d16ff8, p_msg=0x7f6a6c119aa8, branch=0, msg_status=200, cancel_data=0x7fff54abe4d0,
do_put_on_wait=1) at t_reply.c:2001 relay = 0 save_clone = 0 buf = 0x7f6a6d8027d0 "SIP/2.0 200 OK\r\nVia: SIP/2.0/UDP
A.B.C.D:5060;rport=5060;branch=z9hG4bK-53e-1402165595-3328-96\r\nRecord-Route: sip:E.F.G.H;lr=on\r\nFrom: "0987654321"sip:0987654321@A.B.C.D;tag=95ffcd055e0f78f7d5d397020e89288de9c8e717\r\nTo: sip:0123456789@E.F.G.H:5060;tag=as2fc4baac\r\nCall-ID: 3781-4b1-572014182635-OGNAJ-1-A.B.C.D\r\nCSeq: 1 INVITE\r\nServer: Asterisk PBX 1.6.2.9-2+squeeze3\r\nAllow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, SUBSCRIBE, NOTIFY, INFO\r\nSupported: replaces, timer\r\nContact: sip:s@W.X.Y.Z\r\nContent-Type: application/sdp\r\nContent-Length: 275\r\n\r\nv=0\r\no=root 1164105102 1164105102 IN IP4 W.X.Y.Z\r\ns=Asterisk PBX 1.6.2.9-2+squeeze3\r\nc=IN IP4 W.X.Y.Z\r\nt=0 0\r\nm=audio 11426 RTP/AVP 0 8 101\r\na=rtpmap:0 PCMU/8000\r\na=rtpmap:8 PCMA/8000\r\na=rtpmap:101 telephone-event/8000\r\na=fmtp:101 0-16\r\na=ptime:20\r\na=sendrecv\r\n"
res_len = 866 relayed_code = 200 relayed_msg = 0x7f6a6c119aa8 reply_bak = 0x7fff54abe320 bm = {to_tag_val = {s = 0x7f6a60d18590 "", len = 5448975}} totag_retr = 0 reply_status = RPS_COMPLETED uas_rb = 0x7f6a60d170b8 to_tag = 0x0 reason = {s = 0x154abe2d0 <Address 0x154abe2d0 out of bounds>,
len = 1}
onsend_params = {req = 0x2009249c9, rpl = 0x7f6a6aa36f90,
param = 0x414cc0, code = 1, flags = 0, branch = 0,
t_rbuf = 0x7f6a5669f828, dst = 0x7f6a6c119ca0, send_buf = {s
= 0x54abe2f0 <Address 0x54abe2f0 out of bounds>, len = 1024}}
__FUNCTION__ = "relay_reply"
#10 0x00007f6a6aa190b7 in reply_received (p_msg=0x7f6a6c119aa8) at t_reply.c:2499
msg_status = 200 last_uac_status = 180 ack = 0x40 <Address 0x40 out of bounds> ack_len = 0 branch = 0 reply_status = 1826607512 onreply_route = 1 cancel_data = {cancel_bitmap = 0, reason = {cause = 200, u =
{text = {s = 0x0, len = 9586191}, e2e_cancel = 0x0, packed_hdrs = {
s = 0x0, len = 9586191}}}} uac = 0x7f6a60d17160 t = 0x7f6a60d16ff8 lack_dst = {send_sock = 0x7f6a6c128b20, to = {s = {sa_family =
4112, sa_data = "\357kj\177\000\000h\227\220\001\000\000\000"},
sin = {sin_family = 4112, sin_port = 27631, sin_addr =
{s_addr = 32618}, sin_zero = "h\227\220\001\000\000\000"}, sin6 = {
sin6_family = 4112, sin6_port = 27631, sin6_flowinfo =
32618, sin6_addr = {__in6_u = {
__u6_addr8 =
"h\227\220\001\000\000\000\000\070\363\004lj\177\000", __u6_addr16 = {38760, 400, 0, 0, 62264, 27652,
32618, 0}, __u6_addr32 = {26253160, 0, 1812263736,
32618}}}, sin6_scope_id = 1810830208}}, id = 32618,
proto = 80 'P', send_flags = {f = 114 'r', blst_imask = 18
'\022'}}
backup_user_from = 0x934630 backup_user_to = 0x934638 backup_domain_from = 0x934640 backup_domain_to = 0x934648 backup_uri_from = 0x934620 backup_uri_to = 0x934628 backup_xavps = 0x934760 replies_locked = 1 branch_ret = 0 prev_branch = 1420551568 blst_503_timeout = 32767 hf = 0x7f6a6c119ac8 onsend_params = {req = 0x7fff54abe550, rpl = 0x550a24, param =
0x19095a8, code = 0, flags = 3, branch = 0,
t_rbuf = 0x7f6a6bef1380, dst = 0x7f6a6c127220, send_buf = {s
= 0x7fff54abe550 "`G\223", len = 5537669}}
ctx = {rec_lev = 0, run_flags = 0, last_retcode = 0, jmp_env =
{{__jmpbuf = {140095056354464, -2027732440029261969, 4279488,
140734613941120, 0, 0, -2027732440067010705,
2027365049374019439}, __mask_was_saved = 0, __saved_mask = {__val = {
140095055547592, 9586548, 9586228, 140734613939296,
140095069868440, 9587145, 9586197, 361695345073193192, 9586295,
9586274, 1826607464, 140095069868440,
140095056428208, 140095056354464, 4279488, 140734613941120}}}}}
__FUNCTION__ = "reply_received"
#11 0x000000000045d837 in do_forward_reply (msg=0x7f6a6c119aa8, mode=0) at forward.c:777
new_buf = 0x0 dst = {send_sock = 0x0, to = {s = {sa_family = 0, sa_data =
'\000' <repeats 13 times>}, sin = {sin_family = 0, sin_port = 0,
sin_addr = {s_addr = 0}, sin_zero =
"\000\000\000\000\000\000\000"}, sin6 = {sin6_family = 0, sin6_port = 0,
sin6_flowinfo = 0, sin6_addr = {__in6_u = {__u6_addr8 =
'\000' <repeats 15 times>, __u6_addr16 = {0, 0, 0, 0, 0, 0, 0, 0},
__u6_addr32 = {0, 0, 0, 0}}}, sin6_scope_id = 0}},
id = 0, proto = 0 '\000', send_flags = {f = 0 '\000',
blst_imask = 0 '\000'}} new_len = 32618 r = 1 s = 0x3c96c119ab0 <Address 0x3c96c119ab0 out of bounds> len = 0 __FUNCTION__ = "do_forward_reply"
#12 0x000000000045e0f8 in forward_reply (msg=0x7f6a6c119aa8) at forward.c:860
No locals.
#13 0x00000000004a5887 in receive_msg (
buf=0x924600 "SIP/2.0 200 OK\r\nVia: SIP/2.0/UDP
E.F.G.H;branch=z9hG4bKe167.3f64673b859127c758ec8b685c8ceac2.0;received=E.F.G.H\r\nVia: SIP/2.0/UDP A.B.C.D:5060;rport=5060;branch=z9hG4bK-53e-1402165595-3328-96\r\nRecord-Route: sip:E.F.G.H;lr=on\r\nFrom: "0987654321"sip:0987654321@A.B.C.D;tag=95ffcd055e0f78f7d5d397020e89288de9c8e717\r\nTo: sip:0123456789@E.F.G.H:5060;tag=as2fc4baac\r\nCall-ID: 3781-4b1-572014182635-OGNAJ-1-A.B.C.D\r\nCSeq: 1 INVITE\r\nServer: Asterisk PBX 1.6.2.9-2+squeeze3\r\nAllow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, SUBSCRIBE, NOTIFY, INFO\r\nSupported: replaces, timer\r\nContact: sip:s@W.X.Y.Z\r\nContent-Type: application/sdp\r\nContent-Length: 275\r\n\r\nv=0\r\no=root 1164105102 1164105102 IN IP4 W.X.Y.Z\r\ns=Asterisk PBX 1.6.2.9-2+squeeze3\r\nc=IN IP4 W.X.Y.Z\r\nt=0 0\r\nm=audio 11426 RTP/AVP 0 8 101\r\na=rtpmap:0 PCMU/8000\r\na=rtpmap:8 PCMA/8000\r\na=rtpmap:101 telephone-event/8000\r\na=fmtp:101 0-16\r\na=ptime:20\r\na=sendrecv\r\n", len=969, rcv_info=0x7fff54abe850) at receive.c:273
msg = 0x7f6a6c119aa8 ctx = {rec_lev = 8868984, run_flags = 0, last_retcode = 0,
jmp_env = {{__jmpbuf = {0, 0, 0, 263853236176, 1, 0, 169314554752,
9586112}, __mask_was_saved = 1420552280, __saved_mask
= {__val = {140095054350064, 12884901898, 140095054350064,
4279488, 140734613941120, 140734613940176, 5477586,
0, 140094693045632, 50195, 168953509248, 9586112, 140734613940304,
140734613940224, 5474421, 4279488}}}}} ret = 32618 inb = { s = 0x924600 "SIP/2.0 200 OK\r\nVia: SIP/2.0/UDP
E.F.G.H;branch=z9hG4bKe167.3f64673b859127c758ec8b685c8ceac2.0;received=E.F.G.H\r\nVia: SIP/2.0/UDP A.B.C.D:5060;rport=5060;branch=z9hG4bK-53e-1402165595-3328-96\r\nRecord-Route: sip:E.F.G.H;lr=on\r\nFrom: "0987654321"sip:0987654321@A.B.C.D;tag=95ffcd055e0f78f7d5d397020e89288de9c8e717\r\nTo: sip:0123456789@E.F.G.H:5060;tag=as2fc4baac\r\nCall-ID: 3781-4b1-572014182635-OGNAJ-1-A.B.C.D\r\nCSeq: 1 INVITE\r\nServer: Asterisk PBX 1.6.2.9-2+squeeze3\r\nAllow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, SUBSCRIBE, NOTIFY, INFO\r\nSupported: replaces, timer\r\nContact: sip:s@W.X.Y.Z\r\nContent-Type: application/sdp\r\nContent-Length: 275\r\n\r\nv=0\r\no=root 1164105102 1164105102 IN IP4 W.X.Y.Z\r\ns=Asterisk PBX 1.6.2.9-2+squeeze3\r\nc=IN IP4 W.X.Y.Z\r\nt=0 0\r\nm=audio 11426 RTP/AVP 0 8 101\r\na=rtpmap:0 PCMU/8000\r\na=rtpmap:8 PCMA/8000\r\na=rtpmap:101 telephone-event/8000\r\na=fmtp:101 0-16\r\na=ptime:20\r\na=sendrecv\r\n", len = 969}
__FUNCTION__ = "receive_msg"
#14 0x000000000053c838 in udp_rcv_loop () at udp_server.c:536
len = 969 buf = "SIP/2.0 200 OK\r\nVia: SIP/2.0/UDP
E.F.G.H;branch=z9hG4bKe167.3f64673b859127c758ec8b685c8ceac2.0;received=E.F.G.H\r\nVia: SIP/2.0/UDP A.B.C.D:5060;rport=5060;branch=z9hG4bK-53e-1402165595-3328-96\r\nRecord-Route: sip:E.F.G.H;lr=on\r\nFrom: "0987654321"sip:0987654321@A.B.C.D;tag=95ffcd055e0f78f7d5d397020e89288de9c8e717\r\nTo: sip:0123456789@E.F.G.H:5060;tag=as2fc4baac\r\nCall-ID: 3781-4b1-572014182635-OGNAJ-1-A.B.C.D\r\nCSeq: 1 INVITE\r\nServer: Asterisk PBX 1.6.2.9-2+squeeze3\r\nAllow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, SUBSCRIBE, NOTIFY, INFO\r\nSupported: replaces, timer\r\nContact: sip:s@W.X.Y.Z\r\nContent-Type: application/sdp\r\nContent-Length: 275\r\n\r\nv=0\r\no=root 1164105102 1164105102 IN IP4 W.X.Y.Z\r\ns=Asterisk PBX 1.6.2.9-2+squeeze3\r\nc=IN IP4 W.X.Y.Z\r\nt=0 0\r\nm=audio 11426 RTP/AVP 0 8 101\r\na=rtpmap:0 PCMU/8000\r\na=rtpmap:8 PCMA/8000\r\na=rtpmap:101 telephone-event/8000\r\na=fmtp:101 0-16\r\na=ptime:20\r\na=sendrecv\r\n\000a=rtpmap:18 G729/8000\r\na=fmtp:18 annexb=yes\r\na=rtpmap:101 telephone-event/8000\r\na=fmtp:101 0-15\r\na=silenceSupp:off - - - -\r\n\000rtpmap:101 telephone-event/8000\r\na=fmtp:101 0-15\r\na=silenceSupp:off - - - -\r\na=ptime:20\r\n\000/8000\r\na=silenceSupp:off - - - -\r\na=fmtp:18 annexb=no\r\na=fmtp:114 mode=20\r\na=fmtp:101 0-15,144,149,159\r\na=ptime:20\r\na=sendrecv\r\n\000\na=T38FaxTranscodingJBIG:0\r\na=T38FaxRateManagement:transferredTCF\r\na=T38FaxUdpEC:t38UDPRedundancy\r\n\000axBitRate:14400\r\na=T38FaxUdpEC:t38UDPRedundancy\r\na=T38FaxRateManagement:transferredTCF\r\n\000tpmap:8 PCMA/8000\r\na=rtpmap:99 G726-32/8000\r\na=rtpmap:18 G729/8000\r\na=fmtp:18 annexb=no\r\na=rtpmap:96 telephone-event/8000\r\na=fmtp:96 0-15\r\na=ptime:20\r\na=sendrecv\r\n\000/8000\r\na=fmtp:101 0-16\r\n\000tp:96 0-15\r\na=ptime:20\r\na=sendrecv\r\n\000orwards: 2\r\nUser-Agent: Sagem / HW_V0.0.1 / FW_V-13P036 / SW_V1.2.268\r\nContact: sip:0147258369@M.N.O.P:5060\r\nProxy-Authorization: Digest username="0147258369",realm="sip.domain.tld",nonce="53918e228ef8a40eb1d34d4d8bad809fee0a7e86",uri="sip:0258963147@sip.domain.tld","...
tmp = 0x9245c0 "10.143.1.2" from = 0x7f6a6c04b428 fromlen = 16 ri = {src_ip = {af = 2, len = 4, u = {addrl = {1950469485,
140095054350064}, addr32 = {1950469485, 0, 1811089136, 32618},
addr16 = {52589, 29761, 0, 0, 1776, 27635, 32618, 0},
addr = "m\315At\000\000\000\000\360\006\363kj\177\000"}}, dst_ip = {
af = 2, len = 4, u = {addrl = {67638457, 0}, addr32 =
{67638457, 0, 0, 0}, addr16 = {5305, 1032, 0, 0, 0, 0, 0, 0},
addr = "\271\024\b\004", '\000' <repeats 11 times>}},
src_port = 5060, dst_port = 5060, proto_reserved1 = 0,
proto_reserved2 = 0, src_su = {s = {sa_family = 2, sa_data =
"\023\304m\315At\000\000\000\000\000\000\000"}, sin = {
sin_family = 2, sin_port = 50195, sin_addr = {s_addr =
1950469485}, sin_zero = "\000\000\000\000\000\000\000"}, sin6 = {
sin6_family = 2, sin6_port = 50195, sin6_flowinfo =
1950469485, sin6_addr = {__in6_u = {
__u6_addr8 = '\000' <repeats 15 times>, __u6_addr16
= {0, 0, 0, 0, 0, 0, 0, 0}, __u6_addr32 = {0, 0, 0, 0}}},
sin6_scope_id = 0}}, bind_address = 0x7f6a6bf30588,
proto = 1 '\001'}
__FUNCTION__ = "udp_rcv_loop"
#15 0x000000000046d42b in main_loop () at main.c:1617
i = 10 pid = 0 si = 0x7f6a6bf30588 si_desc = "udp receiver child=10
sock=E.F.G.H:5060\000lj\177\000\000\320J\373kj\177\000\000^\204^\000\000\000\000\000@v^\000\000\000\000\000h\237Dw\000\000\000\000\300LA\000\000\000\000\000\200\353\253T\377\177", '\000' <repeats 18 times>"\300, \351\253T\377\177\000\000.\244K\000\000\000\000"
nrprocs = 15 __FUNCTION__ = "main_loop"
#16 0x00000000004704d3 in main (argc=7, argv=0x7fff54abeb88) at main.c:2533
cfg_stream = 0x1155010 c = -1 r = 0
tmp = 0x7fff54abff70 ""
tmp_len = 0
port = 0
proto = 0
options = 0x5e0998 ":f:cm:M:dVIhEeb:l:L:n:vKrRDTN:W:w:t:u:g:P:G:SQ:O:a:A:"
ret = -1
seed = 3032760445 rfd = 4 debug_save = 0 debug_flag = 0 dont_fork_cnt = 0 n_lst = 0x3d6f60fb88 p = 0x5caae0 "H\211l$\330L\211d$\340H\215-\017\245*" __FUNCTION__ = "main"
Regards,
Igor.
Hello,
Here is the results :
(gdb) frame 5 #5 0x00007f6a687e9b43 in acc_onreply (t=0x7f6a60d16ff8, req=0x7f6a60cd2c10, reply=0x7f6a6c119aa8, code=200) at acc_logic.c:471 471 acc_db_request(req);
(gdb) p *t $1 = {next_c = 0x7f6a567d8238, prev_c = 0x7f6a567d8238, hash_index = 30238, label = 1545174897, flags = 65, nr_of_outgoings = 1, ref_count = {val = 2}, from = { s = 0x7f6a60cd3410 "From: "0123456789"sip:0123456789@A.B.C.D;tag=95ffcd055e0f78f7d5d397020e89288de9c8e717\r\nUser-Agent: Dialogic-SIP/10.5.3.372 GW 1\r\nTimestamp: 06072014182635\r\nP-Asserted-Identity: "0123456789"..., len = 96}, callid = { s = 0x7f6a60cd3391 "Call-ID: 3781-4b1-572014182635-GW-1-A.B.C.D\r\nCSeq: 1 INVITE\r\nMax-Forwards: 69\r\nTo: sip:0987654321@A.B.C.D:5060\r\nFrom: "0123456789"sip:0123456789@A.B.C.D;tag=95ffcd055e0f78f7d5d"..., len = 55}, cseq_n = { s = 0x7f6a60cd33c8 "CSeq: 1 INVITE\r\nMax-Forwards: 69\r\nTo: sip:0987654321@A.B.C.D:5060\r\nFrom: "0123456789"sip:0123456789@A.B.C.D;tag=95ffcd055e0f78f7d5d397020e89288de9c8e717\r\nUser-Agent: Dialogic-SIP/10.5.3."..., len = 7}, to = { s = 0x7f6a60cd33ea "To: sip:0987654321@A.B.C.D:5060\r\nFrom: "0123456789"sip:0123456789@A.B.C.D;tag=95ffcd055e0f78f7d5d397020e89288de9c8e717\r\nUser-Agent: Dialogic-SIP/10.5.3.372 GW 1\r\nTimestamp: 0607201418"..., len = 38}, method = { s = 0x7f6a60cd3310 "INVITE sip:0987654321@A.B.C.D:5060 SIP/2.0\r\nVia: SIP/2.0/UDP A.B.C.D:5060;rport;branch=z9hG4bK-53e-1402165595-3328-96\r\nCall-ID: 3781-4b1-572014182635-GW-1-A.B.C.D\r\nCSeq: 1 INVITE\r\n"..., len = 6}, tmcb_hl = {first = 0x7f6a609f24e0, reg_types = 518}, wait_timer = {next = 0x0, prev = 0x0, expire = 0, initial_timeout = 0, data = 0x7f6a60d16ff8, f = 0x7f6a6a9e7761 <wait_handler>, flags = 1, slow_idx = 0}, uas = {request = 0x7f6a60cd2c10, end_request = 0x7f6a60cd4110 "\300\300\300\300", response = {activ_type = 200, flags = 0, t_active = 0 '\000', branch = 0, buffer_len = 866, buffer = 0x7f6a60a78938 "SIP/2.0 200 OK\r\nVia: SIP/2.0/UDP A.B.C.D:5060;rport=5060;branch=z9hG4bK-53e-1402165595-3328-96\r\nRecord-Route: sip:A.B.C.D;lr=on\r\nFrom: "0123456789"sip:0123456789@A.B.C.D;tag=95ffc"..., my_T = 0x7f6a60d16ff8, timer = {next = 0x0, prev = 0x0, expire = 0, initial_timeout = 0, data = 0x0, f = 0x7f6a6a9e73d3 <retr_buf_handler>, flags = 0, slow_idx = 0}, dst = {send_sock = 0x7f6a6bf30588, to = {s = {sa_family = 2, sa_data = "\023\304[?z\000\000\000\000\000\000\000"}, sin = {sin_family = 2, sin_port = 50195, sin_addr = {s_addr = 2056377691}, sin_zero = "\000\000\000\000\000\000\000"}, sin6 = {sin6_family = 2, sin6_port = 50195, sin6_flowinfo = 2056377691, sin6_addr = {__in6_u = { __u6_addr8 = '\000' <repeats 15 times>, __u6_addr16 = {0, 0, 0, 0, 0, 0, 0, 0}, __u6_addr32 = {0, 0, 0, 0}}}, sin6_scope_id = 0}}, id = 0, proto = 1 '\001', send_flags = {f = 0 '\000', blst_imask = 0 '\000'}}, retr_expire = 0, fr_expire = 0}, local_totag = { s = 0x7f6a60abf766 ">\r\nFrom: "0987654321"sip:0987654321@A.B.C.D;tag=95ffcd055e0f78f7d5d397020e89288d35c9850f\r\nServer: Server (2.0)\r\nContent-Length: 0\r\n\r\nip:0031756210706@A.B.C.D:5060>\r\nRecord-Route: <sip"..., len = 0}, cancel_reas = 0x0, status = 200}, uac = {{reply = 0x0, end_reply = 0x0, request = {activ_type = 0, flags = 172, t_active = 0 '\000', branch = 0, buffer_len = 1206, buffer = 0x7f6a60a178f8 "INVITE sip:s@A.B.C.D SIP/2.0\r\nRecord-Route: sip:A.B.C.D;lr=on\r\nVia: SIP/2.0/UDP A.B.C.D;branch=z9hG4bKe167.3f64673b859127c758ec8b685c8ceac2.0\r\nVia: SIP/2.0/UDP A.B.C.D:5060;rport"..., my_T = 0x7f6a60d16ff8, timer = {next = 0x0, prev = 0x0, expire = 1892843262, initial_timeout = 8, data = 0x3e8, f = 0x7f6a6a9e73d3 <retr_buf_handler>, flags = 513, slow_idx = 0}, dst = {send_sock = 0x7f6a6bf30588, to = {s = { sa_family = 2, sa_data = "\023\304m\315At\000\000\000\000\000\000\000"}, sin = {sin_family = 2, sin_port = 50195, sin_addr = {s_addr = 1950469485}, sin_zero = "\000\000\000\000\000\000\000"}, sin6 = {sin6_family = 2, sin6_port = 50195, sin6_flowinfo = 1950469485, sin6_addr = {__in6_u = { __u6_addr8 = '\000' <repeats 15 times>, __u6_addr16 = {0, 0, 0, 0, 0, 0, 0, 0}, __u6_addr32 = {0, 0, 0, 0}}}, sin6_scope_id = 0}}, id = 0, proto = 1 '\001', send_flags = {f = 4 '\004', blst_imask = 0 '\000'}}, retr_expire = 1892843262, fr_expire = 1892846134}, local_cancel = {activ_type = 0, flags = 0, t_active = 0 '\000', branch = 0, buffer_len = 0, buffer = 0x0, my_T = 0x7f6a60d16ff8, timer = {next = 0x0, prev = 0x0, expire = 0, initial_timeout = 0, data = 0x0, f = 0x7f6a6a9e73d3 <retr_buf_handler>, flags = 0, slow_idx = 0}, dst = {send_sock = 0x0, to = {s = {sa_family = 0, sa_data = '\000' <repeats 13 times>}, sin = {sin_family = 0, sin_port = 0, sin_addr = {s_addr = 0}, sin_zero = "\000\000\000\000\000\000\000"}, sin6 = { sin6_family = 0, sin6_port = 0, sin6_flowinfo = 0, sin6_addr = {__in6_u = {__u6_addr8 = '\000' <repeats 15 times>, __u6_addr16 = {0, 0, 0, 0, 0, 0, 0, 0}, __u6_addr32 = {0, 0, 0, 0}}}, sin6_scope_id = 0}}, id = 0, proto = 0 '\000', send_flags = {f = 0 '\000', blst_imask = 0 '\000'}}, retr_expire = 0, fr_expire = 0}, dns_h = {srv = 0x0, a = 0x0, srv_tried_rrs = 0, port = 0, srv_no = 0 '\000', ip_no = 0 '\000', proto = 0 '\000'}, uri = { s = 0x7f6a60a178ff "sip:s@A.B.C.D SIP/2.0\r\nRecord-Route: sip:A.B.C.D;lr=on\r\nVia: SIP/2.0/UDP A.B.C.D;branch=z9hG4bKe167.3f64673b859127c758ec8b685c8ceac2.0\r\nVia: SIP/2.0/UDP A.B.C.D:5060;rport=5060;b"..., len = 20}, path = {s = 0x0, len = 0}, instance = {s = 0x0, len = 0}, ruid = { s = 0x7f6a60c184e0 "uloc-538408ec-962-87", len = 20}, location_ua = {s = 0x7f6a6097e778 "Asterisk PBX 1.6.2.9-2+squeeze3", len = 31}, last_received = 200, flags = 5, branch_flags = 0, icode = 0, local_ack = 0x0, on_failure = 1, on_branch_failure = 0, on_reply = 1, on_unused = 0}, {reply = 0x0, end_reply = 0x0, request = {activ_type = 0, flags = 0, t_active = 0 '\000', branch = 1, buffer_len = 0, buffer = 0x0, my_T = 0x7f6a60d16ff8, timer = {next = 0x0, prev = 0x0, expire = 0, initial_timeout = 0, data = 0x0, f = 0x7f6a6a9e73d3 <retr_buf_handler>, flags = 0, slow_idx = 0}, dst = {send_sock = 0x0, to = {s = { sa_family = 0, sa_data = '\000' <repeats 13 times>}, sin = {sin_family = 0, sin_port = 0, sin_addr = {s_addr = 0}, sin_zero = "\000\000\000\000\000\000\000"}, sin6 = {sin6_family = 0, sin6_port = 0, sin6_flowinfo = 0, sin6_addr = {__in6_u = { __u6_addr8 = '\000' <repeats 15 times>, __u6_addr16 = {0, 0, 0, 0, 0, 0, 0, 0}, __u6_addr32 = {0, 0, 0, 0}}}, sin6_scope_id = 0}}, id = 0, proto = 0 '\000', send_flags = {f = 0 '\000', blst_imask = 0 '\000'}}, retr_expire = 0, fr_expire = 0}, local_cancel = {activ_type = 0, flags = 0, t_active = 0 '\000', branch = 1, buffer_len = 0, buffer = 0x0, my_T = 0x7f6a60d16ff8, timer = {next = 0x0, prev = 0x0, expire = 0, initial_timeout = 0, data = 0x0, f = 0x7f6a6a9e73d3 <retr_buf_handler>, flags = 0, slow_idx = 0}, dst = {send_sock = 0x0, to = {s = {sa_family = 0, sa_data = '\000' <repeats 13 times>}, sin = {sin_family = 0, sin_port = 0, sin_addr = {s_addr = 0}, sin_zero = "\000\000\000\000\000\000\000"}, sin6 = { sin6_family = 0, sin6_port = 0, sin6_flowinfo = 0, sin6_addr = {__in6_u = {__u6_addr8 = '\000' <repeats 15 times>, __u6_addr16 = {0, 0, 0, 0, 0, 0, 0, 0}, __u6_addr32 = {0, 0, 0, 0}}}, sin6_scope_id = 0}}, id = 0, proto = 0 '\000', send_flags = {f = 0 '\000', blst_imask = 0 '\000'}}, retr_expire = 0, fr_expire = 0}, dns_h = {srv = 0x0, a = 0x0, srv_tried_rrs = 0, port = 0, srv_no = 0 '\000', ip_no = 0 '\000', proto = 0 '\000'}, uri = { s = 0x0, len = 0}, path = {s = 0x0, len = 0}, instance = {s = 0x0, len = 0}, ruid = {s = 0x0, len = 0}, location_ua = {s = 0x0, len = 0}, last_received = 0, flags = 0, branch_flags = 0, icode = 0, local_ack = 0x0, on_failure = 0, on_branch_failure = 0, on_reply = 0, on_unused = 0}, {reply = 0x0, end_reply = 0x0, request = {activ_type = 0, flags = 0, t_active = 0 '\000', branch = 2, buffer_len = 0, buffer = 0x0, my_T = 0x7f6a60d16ff8, timer = {next = 0x0, prev = 0x0, expire = 0, initial_timeout = 0, data = 0x0, f = 0x7f6a6a9e73d3 <retr_buf_handler>, flags = 0, slow_idx = 0}, dst = {send_sock = 0x0, to = {s = { sa_family = 0, sa_data = '\000' <repeats 13 times>}, sin = {sin_family = 0, sin_port = 0, sin_addr = {s_addr = 0}, sin_zero = "\000\000\000\000\000\000\000"}, sin6 = {sin6_family = 0, sin6_port = 0, sin6_flowinfo = 0, sin6_addr = {__in6_u = { __u6_addr8 = '\000' <repeats 15 times>, __u6_addr16 = {0, 0, 0, 0, 0, 0, 0, 0}, __u6_addr32 = {0, 0, 0, 0}}}, sin6_scope_id = 0}}, id = 0, proto = 0 '\000', send_flags = {f = 0 '\000', blst_imask = 0 '\000'}}, retr_expire = 0, fr_expire = 0}, local_cancel = {activ_type = 0, flags = 0, t_active = 0 '\000', branch = 2, buffer_len = 0, buffer = 0x0, my_T = 0x7f6a60d16ff8, timer = {next = 0x0, prev = 0x0, expire = 0, initial_timeout = 0, data = 0x0, f = 0x7f6a6a9e73d3 <retr_buf_handler>, flags = 0, slow_idx = 0}, dst = {send_sock = 0x0, to = {s = {sa_family = 0, sa_data = '\000' <repeats 13 times>}, sin = {sin_family = 0, sin_port = 0, sin_addr = {s_addr = 0}, sin_zero = "\000\000\000\000\000\000\000"}, sin6 = { sin6_family = 0, sin6_port = 0, sin6_flowinfo = 0, sin6_addr = {__in6_u = {__u6_addr8 = '\000' <repeats 15 times>, __u6_addr16 = {0, 0, 0, 0, 0, 0, 0, 0}, __u6_addr32 = {0, 0, 0, 0}}}, sin6_scope_id = 0}}, id = 0, proto = 0 '\000', send_flags = {f = 0 '\000', blst_imask = 0 '\000'}}, retr_expire = 0, fr_expire = 0}, dns_h = {srv = 0x0, a = 0x0, srv_tried_rrs = 0, port = 0, srv_no = 0 '\000', ip_no = 0 '\000', proto = 0 '\000'}, uri = { s = 0x0, len = 0}, path = {s = 0x0, len = 0}, instance = {s = 0x0, len = 0}, ruid = {s = 0x0, len = 0}, location_ua = {s = 0x0, len = 0}, last_received = 0, flags = 0, branch_flags = 0, icode = 0, local_ack = 0x0, on_failure = 0, on_branch_failure = 0, on_reply = 0, on_unused = 0}, {reply = 0x0, end_reply = 0x0, request = {activ_type = 0, flags = 0, t_active = 0 '\000', branch = 3, buffer_len = 0, buffer = 0x0, my_T = 0x7f6a60d16ff8, timer = {next = 0x0, prev = 0x0, expire = 0, initial_timeout = 0, data = 0x0, f = 0x7f6a6a9e73d3 <retr_buf_handler>, flags = 0, slow_idx = 0}, dst = {send_sock = 0x0, to = {s = { sa_family = 0, sa_data = '\000' <repeats 13 times>}, sin = {sin_family = 0, sin_port = 0, sin_addr = {s_addr = 0}, sin_zero = "\000\000\000\000\000\000\000"}, sin6 = {sin6_family = 0, sin6_port = 0, sin6_flowinfo = 0, sin6_addr = {__in6_u = { __u6_addr8 = '\000' <repeats 15 times>, __u6_addr16 = {0, 0, 0, 0, 0, 0, 0, 0}, __u6_addr32 = {0, 0, 0, 0}}}, sin6_scope_id = 0}}, id = 0, proto = 0 '\000', send_flags = {f = 0 '\000', blst_imask = 0 '\000'}}, retr_expire = 0, fr_expire = 0}, local_cancel = {activ_type = 0, flags = 0, t_active = 0 '\000', branch = 3, buffer_len = 0, buffer = 0x0, my_T = 0x7f6a60d16ff8, timer = {next = 0x0, prev = 0x0, expire = 0, initial_timeout = 0, data = 0x0, f = 0x7f6a6a9e73d3 <retr_buf_handler>, flags = 0, slow_idx = 0}, dst = {send_sock = 0x0, to = {s = {sa_family = 0, sa_data = '\000' <repeats 13 times>}, sin = {sin_family = 0, sin_port = 0, sin_addr = {s_addr = 0}, sin_zero = "\000\000\000\000\000\000\000"}, sin6 = { sin6_family = 0, sin6_port = 0, sin6_flowinfo = 0, sin6_addr = {__in6_u = {__u6_addr8 = '\000' <repeats 15 times>, __u6_addr16 = {0, 0, 0, 0, 0, 0, 0, 0}, __u6_addr32 = {0, 0, 0, 0}}}, sin6_scope_id = 0}}, id = 0, proto = 0 '\000', send_flags = {f = 0 '\000', blst_imask = 0 '\000'}}, retr_expire = 0, fr_expire = 0}, dns_h = {srv = 0x0, a = 0x0, srv_tried_rrs = 0, port = 0, srv_no = 0 '\000', ip_no = 0 '\000', proto = 0 '\000'}, uri = { s = 0x0, len = 0}, path = {s = 0x0, len = 0}, instance = {s = 0x0, len = 0}, ruid = {s = 0x0, len = 0}, location_ua = {s = 0x0, len = 0}, last_received = 0, flags = 0, branch_flags = 0, icode = 0, local_ack = 0x0, on_failure = 0, on_branch_failure = 0, on_reply = 0, on_unused = 0}, {reply = 0x0, end_reply = 0x0, request = {activ_type = 0, flags = 0, t_active = 0 '\000', branch = 4, buffer_len = 0, buffer = 0x0, my_T = 0x7f6a60d16ff8, timer = {next = 0x0, prev = 0x0, expire = 0, initial_timeout = 0, data = 0x0, f = 0x7f6a6a9e73d3 <retr_buf_handler>, flags = 0, slow_idx = 0}, dst = {send_sock = 0x0, to = {s = { sa_family = 0, sa_data = '\000' <repeats 13 times>}, sin = {sin_family = 0, sin_port = 0, sin_addr = {s_addr = 0}, sin_zero = "\000\000\000\000\000\000\000"}, sin6 = {sin6_family = 0, sin6_port = 0, sin6_flowinfo = 0, sin6_addr = {__in6_u = { __u6_addr8 = '\000' <repeats 15 times>, __u6_addr16 = {0, 0, 0, 0, 0, 0, 0, 0}, __u6_addr32 = {0, 0, 0, 0}}}, sin6_scope_id = 0}}, id = 0, proto = 0 '\000', send_flags = {f = 0 '\000', blst_imask = 0 '\000'}}, retr_expire = 0, fr_expire = 0}, local_cancel = {activ_type = 0, flags = 0, t_active = 0 '\000', branch = 4, buffer_len = 0, buffer = 0x0, my_T = 0x7f6a60d16ff8, timer = {next = 0x0, prev = 0x0, expire = 0, initial_timeout = 0, data = 0x0, f = 0x7f6a6a9e73d3 <retr_buf_handler>, flags = 0, slow_idx = 0}, dst = {send_sock = 0x0, to = {s = {sa_family = 0, sa_data = '\000' <repeats 13 times>}, sin = {sin_family = 0, sin_port = 0, sin_addr = {s_addr = 0}, sin_zero = "\000\000\000\000\000\000\000"}, sin6 = { sin6_family = 0, sin6_port = 0, sin6_flowinfo = 0, sin6_addr = {__in6_u = {__u6_addr8 = '\000' <repeats 15 times>, __u6_addr16 = {0, 0, 0, 0, 0, 0, 0, 0}, __u6_addr32 = {0, 0, 0, 0}}}, sin6_scope_id = 0}}, id = 0, proto = 0 '\000', send_flags = {f = 0 '\000', blst_imask = 0 '\000'}}, retr_expire = 0, fr_expire = 0}, dns_h = {srv = 0x0, a = 0x0, srv_tried_rrs = 0, port = 0, srv_no = 0 '\000', ip_no = 0 '\000', proto = 0 '\000'}, uri = { s = 0x0, len = 0}, path = {s = 0x0, len = 0}, instance = {s = 0x0, len = 0}, ruid = {s = 0x0, len = 0}, location_ua = {s = 0x0, len = 0}, last_received = 0, flags = 0, branch_flags = 0, icode = 0, local_ack = 0x0, on_failure = 0, on_branch_failure = 0, on_reply = 0, on_unused = 0}, {reply = 0x0, end_reply = 0x0, request = {activ_type = 0, flags = 0, t_active = 0 '\000', branch = 5, buffer_len = 0, buffer = 0x0, my_T = 0x7f6a60d16ff8, timer = {next = 0x0, prev = 0x0, expire = 0, initial_timeout = 0, data = 0x0, f = 0x7f6a6a9e73d3 <retr_buf_handler>, flags = 0, slow_idx = 0}, dst = {send_sock = 0x0, to = {s = { sa_family = 0, sa_data = '\000' <repeats 13 times>}, sin = {sin_family = 0, sin_port = 0, sin_addr = {s_addr = 0}, sin_zero = "\000\000\000\000\000\000\000"}, sin6 = {sin6_family = 0, sin6_port = 0, sin6_flowinfo = 0, sin6_addr = {__in6_u = { __u6_addr8 = '\000' <repeats 15 times>, __u6_addr16 = {0, 0, 0, 0, 0, 0, 0, 0}, __u6_addr32 = {0, 0, 0, 0}}}, sin6_scope_id = 0}}, id = 0, proto = 0 '\000', send_flags = {f = 0 '\000', blst_imask = 0 '\000'}}, retr_expire = 0, fr_expire = 0}, local_cancel = {activ_type = 0, flags = 0, t_active = 0 '\000', branch = 5, buffer_len = 0, buffer = 0x0, my_T = 0x7f6a60d16ff8, timer = {next = 0x0, prev = 0x0, expire = 0, initial_timeout = 0, data = 0x0, f = 0x7f6a6a9e73d3 <retr_buf_handler>, flags = 0, slow_idx = 0}, dst = {send_sock = 0x0, to = {s = {sa_family = 0, sa_data = '\000' <repeats 13 times>}, sin = {sin_family = 0, sin_port = 0, sin_addr = {s_addr = 0}, sin_zero = "\000\000\000\000\000\000\000"}, sin6 = { sin6_family = 0, sin6_port = 0, sin6_flowinfo = 0, sin6_addr = {__in6_u = {__u6_addr8 = '\000' <repeats 15 times>, __u6_addr16 = {0, 0, 0, 0, 0, 0, 0, 0}, __u6_addr32 = {0, 0, 0, 0}}}, sin6_scope_id = 0}}, id = 0, proto = 0 '\000', send_flags = {f = 0 '\000', blst_imask = 0 '\000'}}, retr_expire = 0, fr_expire = 0}, dns_h = {srv = 0x0, a = 0x0, srv_tried_rrs = 0, port = 0, srv_no = 0 '\000', ip_no = 0 '\000', proto = 0 '\000'}, uri = { s = 0x0, len = 0}, path = {s = 0x0, len = 0}, instance = {s = 0x0, len = 0}, ruid = {s = 0x0, len = 0}, location_ua = {s = 0x0, len = 0}, last_received = 0, flags = 0, branch_flags = 0, icode = 0, local_ack = 0x0, on_failure = 0, on_branch_failure = 0, on_reply = 0, on_unused = 0}, {reply = 0x0, end_reply = 0x0, request = {activ_type = 0, flags = 0, t_active = 0 '\000', branch = 6, buffer_len = 0, buffer = 0x0, my_T = 0x7f6a60d16ff8, timer = {next = 0x0, prev = 0x0, expire = 0, initial_timeout = 0, data = 0x0, f = 0x7f6a6a9e73d3 <retr_buf_handler>, flags = 0, slow_idx = 0}, dst = {send_sock = 0x0, to = {s = { sa_family = 0, sa_data = '\000' <repeats 13 times>}, sin = {sin_family = 0, sin_port = 0, sin_addr = {s_addr = 0}, sin_zero = "\000\000\000\000\000\000\000"}, sin6 = {sin6_family = 0, sin6_port = 0, sin6_flowinfo = 0, sin6_addr = {__in6_u = { __u6_addr8 = '\000' <repeats 15 times>, __u6_addr16 = {0, 0, 0, 0, 0, 0, 0, 0}, __u6_addr32 = {0, 0, 0, 0}}}, sin6_scope_id = 0}}, id = 0, proto = 0 '\000', send_flags = {f = 0 '\000', blst_imask = 0 '\000'}}, retr_expire = 0, fr_expire = 0}, local_cancel = {activ_type = 0, flags = 0, t_active = 0 '\000', branch = 6, buffer_len = 0, buffer = 0x0, my_T = 0x7f6a60d16ff8, timer = {next = 0x0, prev = 0x0, expire = 0, initial_timeout = 0, data = 0x0, f = 0x7f6a6a9e73d3 <retr_buf_handler>, flags = 0, slow_idx = 0}, dst = {send_sock = 0x0, to = {s = {sa_family = 0, sa_data = '\000' <repeats 13 times>}, sin = {sin_family = 0, sin_port = 0, sin_addr = {s_addr = 0}, sin_zero = "\000\000\000\000\000\000\000"}, sin6 = { sin6_family = 0, sin6_port = 0, sin6_flowinfo = 0, sin6_addr = {__in6_u = {__u6_addr8 = '\000' <repeats 15 times>, __u6_addr16 = {0, 0, 0, 0, 0, 0, 0, 0}, __u6_addr32 = {0, 0, 0, 0}}}, sin6_scope_id = 0}}, id = 0, proto = 0 '\000', send_flags = {f = 0 '\000', blst_imask = 0 '\000'}}, retr_expire = 0, fr_expire = 0}, dns_h = {srv = 0x0, a = 0x0, srv_tried_rrs = 0, port = 0, srv_no = 0 '\000', ip_no = 0 '\000', proto = 0 '\000'}, uri = { s = 0x0, len = 0}, path = {s = 0x0, len = 0}, instance = {s = 0x0, len = 0}, ruid = {s = 0x0, len = 0}, location_ua = {s = 0x0, len = 0}, last_received = 0, flags = 0, branch_flags = 0, icode = 0, local_ack = 0x0, on_failure = 0, on_branch_failure = 0, on_reply = 0, on_unused = 0}, {reply = 0x0, end_reply = 0x0, request = {activ_type = 0, flags = 0, t_active = 0 '\000', branch = 7, buffer_len = 0, buffer = 0x0, my_T = 0x7f6a60d16ff8, timer = {next = 0x0, prev = 0x0, expire = 0, initial_timeout = 0, data = 0x0, f = 0x7f6a6a9e73d3 <retr_buf_handler>, flags = 0, slow_idx = 0}, dst = {send_sock = 0x0, to = {s = { sa_family = 0, sa_data = '\000' <repeats 13 times>}, sin = {sin_family = 0, sin_port = 0, sin_addr = {s_addr = 0}, sin_zero = "\000\000\000\000\000\000\000"}, sin6 = {sin6_family = 0, sin6_port = 0, sin6_flowinfo = 0, sin6_addr = {__in6_u = { __u6_addr8 = '\000' <repeats 15 times>, __u6_addr16 = {0, 0, 0, 0, 0, 0, 0, 0}, __u6_addr32 = {0, 0, 0, 0}}}, sin6_scope_id = 0}}, id = 0, proto = 0 '\000', send_flags = {f = 0 '\000', blst_imask = 0 '\000'}}, retr_expire = 0, fr_expire = 0}, local_cancel = {activ_type = 0, flags = 0, t_active = 0 '\000', branch = 7, buffer_len = 0, buffer = 0x0, my_T = 0x7f6a60d16ff8, timer = {next = 0x0, prev = 0x0, expire = 0, initial_timeout = 0, data = 0x0, f = 0x7f6a6a9e73d3 <retr_buf_handler>, flags = 0, slow_idx = 0}, dst = {send_sock = 0x0, to = {s = {sa_family = 0, sa_data = '\000' <repeats 13 times>}, sin = {sin_family = 0, sin_port = 0, sin_addr = {s_addr = 0}, sin_zero = "\000\000\000\000\000\000\000"}, sin6 = { sin6_family = 0, sin6_port = 0, sin6_flowinfo = 0, sin6_addr = {__in6_u = {__u6_addr8 = '\000' <repeats 15 times>, __u6_addr16 = {0, 0, 0, 0, 0, 0, 0, 0}, __u6_addr32 = {0, 0, 0, 0}}}, sin6_scope_id = 0}}, id = 0, proto = 0 '\000', send_flags = {f = 0 '\000', blst_imask = 0 '\000'}}, retr_expire = 0, fr_expire = 0}, dns_h = {srv = 0x0, a = 0x0, srv_tried_rrs = 0, port = 0, srv_no = 0 '\000', ip_no = 0 '\000', proto = 0 '\000'}, uri = { s = 0x0, len = 0}, path = {s = 0x0, len = 0}, instance = {s = 0x0, len = 0}, ruid = {s = 0x0, len = 0}, location_ua = {s = 0x0, len = 0}, last_received = 0, flags = 0, branch_flags = 0, icode = 0, local_ack = 0x0, on_failure = 0, on_branch_failure = 0, on_reply = 0, on_unused = 0}, {reply = 0x0, end_reply = 0x0, request = {activ_type = 0, flags = 0, t_active = 0 '\000', branch = 8, buffer_len = 0, buffer = 0x0, my_T = 0x7f6a60d16ff8, timer = {next = 0x0, prev = 0x0, expire = 0, initial_timeout = 0, data = 0x0, f = 0x7f6a6a9e73d3 <retr_buf_handler>, flags = 0, slow_idx = 0}, dst = {send_sock = 0x0, to = {s = { sa_family = 0, sa_data = '\000' <repeats 13 times>}, sin = {sin_family = 0, sin_port = 0, sin_addr = {s_addr = 0}, sin_zero = "\000\000\000\000\000\000\000"}, sin6 = {sin6_family = 0, sin6_port = 0, sin6_flowinfo = 0, sin6_addr = {__in6_u = { __u6_addr8 = '\000' <repeats 15 times>, __u6_addr16 = {0, 0, 0, 0, 0, 0, 0, 0}, __u6_addr32 = {0, 0, 0, 0}}}, sin6_scope_id = 0}}, id = 0, proto = 0 '\000', send_flags = {f = 0 '\000', blst_imask = 0 '\000'}}, retr_expire = 0, fr_expire = 0}, local_cancel = {activ_type = 0, flags = 0, t_active = 0 '\000', branch = 8, buffer_len = 0, buffer = 0x0, my_T = 0x7f6a60d16ff8, timer = {next = 0x0, prev = 0x0, expire = 0, initial_timeout = 0, data = 0x0, f = 0x7f6a6a9e73d3 <retr_buf_handler>, flags = 0, slow_idx = 0}, dst = {send_sock = 0x0, to = {s = {sa_family = 0, sa_data = '\000' <repeats 13 times>}, sin = {sin_family = 0, sin_port = 0, sin_addr = {s_addr = 0}, sin_zero = "\000\000\000\000\000\000\000"}, sin6 = { sin6_family = 0, sin6_port = 0, sin6_flowinfo = 0, sin6_addr = {__in6_u = {__u6_addr8 = '\000' <repeats 15 times>, __u6_addr16 = {0, 0, 0, 0, 0, 0, 0, 0}, __u6_addr32 = {0, 0, 0, 0}}}, sin6_scope_id = 0}}, id = 0, proto = 0 '\000', send_flags = {f = 0 '\000', blst_imask = 0 '\000'}}, retr_expire = 0, fr_expire = 0}, dns_h = {srv = 0x0, a = 0x0, srv_tried_rrs = 0, port = 0, srv_no = 0 '\000', ip_no = 0 '\000', proto = 0 '\000'}, uri = { s = 0x0, len = 0}, path = {s = 0x0, len = 0}, instance = {s = 0x0, len = 0}, ruid = {s = 0x0, len = 0}, location_ua = {s = 0x0, len = 0}, last_received = 0, flags = 0, branch_flags = 0, icode = 0, local_ack = 0x0, on_failure = 0, on_branch_failure = 0, on_reply = 0, on_unused = 0}, {reply = 0x0, end_reply = 0x0, request = {activ_type = 0, flags = 0, t_active = 0 '\000', branch = 9, buffer_len = 0, buffer = 0x0, my_T = 0x7f6a60d16ff8, timer = {next = 0x0, prev = 0x0, expire = 0, initial_timeout = 0, data = 0x0, f = 0x7f6a6a9e73d3 <retr_buf_handler>, flags = 0, slow_idx = 0}, dst = {send_sock = 0x0, to = {s = { sa_family = 0, sa_data = '\000' <repeats 13 times>}, sin = {sin_family = 0, sin_port = 0, sin_addr = {s_addr = 0}, sin_zero = "\000\000\000\000\000\000\000"}, sin6 = {sin6_family = 0, sin6_port = 0, sin6_flowinfo = 0, sin6_addr = {__in6_u = { __u6_addr8 = '\000' <repeats 15 times>, __u6_addr16 = {0, 0, 0, 0, 0, 0, 0, 0}, __u6_addr32 = {0, 0, 0, 0}}}, sin6_scope_id = 0}}, id = 0, proto = 0 '\000', send_flags = {f = 0 '\000', blst_imask = 0 '\000'}}, retr_expire = 0, fr_expire = 0}, local_cancel = {activ_type = 0, flags = 0, t_active = 0 '\000', branch = 9, buffer_len = 0, buffer = 0x0, my_T = 0x7f6a60d16ff8, timer = {next = 0x0, prev = 0x0, expire = 0, initial_timeout = 0, data = 0x0, f = 0x7f6a6a9e73d3 <retr_buf_handler>, flags = 0, slow_idx = 0}, dst = {send_sock = 0x0, to = {s = {sa_family = 0, sa_data = '\000' <repeats 13 times>}, sin = {sin_family = 0, sin_port = 0, sin_addr = {s_addr = 0}, sin_zero = "\000\000\000\000\000\000\000"}, sin6 = { sin6_family = 0, sin6_port = 0, sin6_flowinfo = 0, sin6_addr = {__in6_u = {__u6_addr8 = '\000' <repeats 15 times>, __u6_addr16 = {0, 0, 0, 0, 0, 0, 0, 0}, __u6_addr32 = {0, 0, 0, 0}}}, sin6_scope_id = 0}}, id = 0, proto = 0 '\000', send_flags = {f = 0 '\000', blst_imask = 0 '\000'}}, retr_expire = 0, fr_expire = 0}, dns_h = {srv = 0x0, a = 0x0, srv_tried_rrs = 0, port = 0, srv_no = 0 '\000', ip_no = 0 '\000', proto = 0 '\000'}, uri = { s = 0x0, len = 0}, path = {s = 0x0, len = 0}, instance = {s = 0x0, len = 0}, ruid = {s = 0x0, len = 0}, location_ua = {s = 0x0, len = 0}, last_received = 0, flags = 0, branch_flags = 0, icode = 0, local_ack = 0x0, on_failure = 0, on_branch_failure = 0, on_reply = 0, on_unused = 0}, {reply = 0x0, end_reply = 0x0, request = {activ_type = 0, flags = 0, t_active = 0 '\000', branch = 10, buffer_len = 0, buffer = 0x0, my_T = 0x7f6a60d16ff8, timer = {next = 0x0, prev = 0x0, expire = 0, initial_timeout = 0, data = 0x0, f = 0x7f6a6a9e73d3 <retr_buf_handler>, flags = 0, slow_idx = 0}, dst = {send_sock = 0x0, to = {s = { sa_family = 0, sa_data = '\000' <repeats 13 times>}, sin = {sin_family = 0, sin_port = 0, sin_addr = {s_addr = 0}, sin_zero = "\000\000\000\000\000\000\000"}, sin6 = {sin6_family = 0, sin6_port = 0, sin6_flowinfo = 0, sin6_addr = {__in6_u = { __u6_addr8 = '\000' <repeats 15 times>, __u6_addr16 = {0, 0, 0, 0, 0, 0, 0, 0}, __u6_addr32 = {0, 0, 0, 0}}}, sin6_scope_id = 0}}, id = 0, proto = 0 '\000', send_flags = {f = 0 '\000', blst_imask = 0 '\000'}}, retr_expire = 0, fr_expire = 0}, local_cancel = {activ_type = 0, flags = 0, t_active = 0 '\000', branch = 10, buffer_len = 0, buffer = 0x0, my_T = 0x7f6a60d16ff8, timer = {next = 0x0, prev = 0x0, expire = 0, initial_timeout = 0, data = 0x0, f = 0x7f6a6a9e73d3 <retr_buf_handler>, flags = 0, slow_idx = 0}, dst = {send_sock = 0x0, to = {s = {sa_family = 0, sa_data = '\000' <repeats 13 times>}, sin = {sin_family = 0, sin_port = 0, sin_addr = {s_addr = 0}, sin_zero = "\000\000\000\000\000\000\000"}, sin6 = { sin6_family = 0, sin6_port = 0, sin6_flowinfo = 0, sin6_addr = {__in6_u = {__u6_addr8 = '\000' <repeats 15 times>, __u6_addr16 = {0, 0, 0, 0, 0, 0, 0, 0}, __u6_addr32 = {0, 0, 0, 0}}}, sin6_scope_id = 0}}, id = 0, proto = 0 '\000', send_flags = {f = 0 '\000', blst_imask = 0 '\000'}}, retr_expire = 0, fr_expire = 0}, dns_h = {srv = 0x0, a = 0x0, srv_tried_rrs = 0, port = 0, srv_no = 0 '\000', ip_no = 0 '\000', proto = 0 '\000'}, uri = { s = 0x0, len = 0}, path = {s = 0x0, len = 0}, instance = {s = 0x0, len = 0}, ruid = {s = 0x0, len = 0}, location_ua = {s = 0x0, len = 0}, last_received = 0, flags = 0, branch_flags = 0, icode = 0, local_ack = 0x0, on_failure = 0, on_branch_failure = 0, on_reply = 0, on_unused = 0}, {reply = 0x0, end_reply = 0x0, request = {activ_type = 0, flags = 0, t_active = 0 '\000', branch = 11, buffer_len = 0, buffer = 0x0, my_T = 0x7f6a60d16ff8, timer = {next = 0x0, prev = 0x0, expire = 0, initial_timeout = 0, data = 0x0, f = 0x7f6a6a9e73d3 <retr_buf_handler>, flags = 0, slow_idx = 0}, dst = {send_sock = 0x0, to = {s = { sa_family = 0, sa_data = '\000' <repeats 13 times>}, sin = {sin_family = 0, sin_port = 0, sin_addr = {s_addr = 0}, sin_zero = "\000\000\000\000\000\000\000"}, sin6 = {sin6_family = 0, sin6_port = 0, sin6_flowinfo = 0, sin6_addr = {__in6_u = { __u6_addr8 = '\000' <repeats 15 times>, __u6_addr16 = {0, 0, 0, 0, 0, 0, 0, 0}, __u6_addr32 = {0, 0, 0, 0}}}, sin6_scope_id = 0}}, id = 0, proto = 0 '\000', send_flags = {f = 0 '\000', blst_imask = 0 '\000'}}, retr_expire = 0, fr_expire = 0}, local_cancel = {activ_type = 0, flags = 0, t_active = 0 '\000', branch = 11, buffer_len = 0, buffer = 0x0, my_T = 0x7f6a60d16ff8, timer = {next = 0x0, prev = 0x0, expire = 0, initial_timeout = 0, data = 0x0, f = 0x7f6a6a9e73d3 <retr_buf_handler>, flags = 0, slow_idx = 0}, dst = {send_sock = 0x0, to = {s = {sa_family = 0, sa_data = '\000' <repeats 13 times>}, sin = {sin_family = 0, sin_port = 0, sin_addr = {s_addr = 0}, sin_zero = "\000\000\000\000\000\000\000"}, sin6 = { sin6_family = 0, sin6_port = 0, sin6_flowinfo = 0, sin6_addr = {__in6_u = {__u6_addr8 = '\000' <repeats 15 times>, __u6_addr16 = {0, 0, 0, 0, 0, 0, 0, 0}, __u6_addr32 = {0, 0, 0, 0}}}, sin6_scope_id = 0}}, id = 0, proto = 0 '\000', send_flags = {f = 0 '\000', blst_imask = 0 '\000'}}, retr_expire = 0, fr_expire = 0}, dns_h = {srv = 0x0, a = 0x0, srv_tried_rrs = 0, port = 0, srv_no = 0 '\000', ip_no = 0 '\000', proto = 0 '\000'}, uri = { s = 0x0, len = 0}, path = {s = 0x0, len = 0}, instance = {s = 0x0, len = 0}, ruid = {s = 0x0, len = 0}, location_ua = {s = 0x0, len = 0}, last_received = 0, flags = 0, branch_flags = 0, icode = 0, local_ack = 0x0, on_failure = 0, on_branch_failure = 0, on_reply = 0, on_unused = 0}}, async_backup = {backup_route = 0, backup_branch = 0, blind_uac = 0, ruri_new = 0}, fwded_totags = 0x7f6a6097e6f8, uri_avps_from = 0x7f6a576b02c8, uri_avps_to = 0x0, user_avps_from = 0x0, user_avps_to = 0x0, domain_avps_from = 0x0, domain_avps_to = 0x0, xavps_list = 0x0, reply_mutex = {val = 0}, async_mutex = {val = 0}, fr_timeout = 80, fr_inv_timeout = 4800, rt_t1_timeout_ms = 500, rt_t2_timeout_ms = 4000, end_of_life = 1892846134, relayed_reply_branch = 0, on_failure = 1, on_branch_failure = 0, on_reply = 1, on_branch = 0, md5 = 0x7f6a60d16ff8 "8\202}Vj\177"}
(gdb) p *t->uas.request $2 = {id = 918458, pid = 12419, tval = {tv_sec = 1402165595, tv_usec = 299422}, fwd_send_flags = {f = 4 '\004', blst_imask = 0 '\000'}, rpl_send_flags = { f = 0 '\000', blst_imask = 0 '\000'}, first_line = {type = 1, len = 47, u = {request = {method = { s = 0x7f6a60cd3310 "INVITE sip:0987654321@A.B.C.D:5060 SIP/2.0\r\nVia: SIP/2.0/UDP A.B.C.D:5060;rport;branch=z9hG4bK-53e-1402165595-3328-96\r\nCall-ID: 3781-4b1-572014182635-GW-1-A.B.C.D\r\nCSeq: 1 INVITE\r\n"..., len = 6}, uri = { s = 0x7f6a60cd3317 "sip:0987654321@A.B.C.D:5060 SIP/2.0\r\nVia: SIP/2.0/UDP A.B.C.D:5060;rport;branch=z9hG4bK-53e-1402165595-3328-96\r\nCall-ID: 3781-4b1-572014182635-GW-1-A.B.C.D\r\nCSeq: 1 INVITE\r\nMax-For"..., len = 30}, version = { s = 0x7f6a60cd3336 "SIP/2.0\r\nVia: SIP/2.0/UDP A.B.C.D:5060;rport;branch=z9hG4bK-53e-1402165595-3328-96\r\nCall-ID: 3781-4b1-572014182635-GW-1-A.B.C.D\r\nCSeq: 1 INVITE\r\nMax-Forwards: 69\r\nTo: <sip:0987654321@"..., len = 7}, method_value = 1}, reply = {version = { s = 0x7f6a60cd3310 "INVITE sip:0987654321@A.B.C.D:5060 SIP/2.0\r\nVia: SIP/2.0/UDP A.B.C.D:5060;rport;branch=z9hG4bK-53e-1402165595-3328-96\r\nCall-ID: 3781-4b1-572014182635-GW-1-A.B.C.D\r\nCSeq: 1 INVITE\r\n"..., len = 6}, status = { s = 0x7f6a60cd3317 "sip:0987654321@A.B.C.D:5060 SIP/2.0\r\nVia: SIP/2.0/UDP A.B.C.D:5060;rport;branch=z9hG4bK-53e-1402165595-3328-96\r\nCall-ID: 3781-4b1-572014182635-GW-1-A.B.C.D\r\nCSeq: 1 INVITE\r\nMax-For"..., len = 30}, reason = { s = 0x7f6a60cd3336 "SIP/2.0\r\nVia: SIP/2.0/UDP A.B.C.D:5060;rport;branch=z9hG4bK-53e-1402165595-3328-96\r\nCall-ID: 3781-4b1-572014182635-GW-1-A.B.C.D\r\nCSeq: 1 INVITE\r\nMax-Forwards: 69\r\nTo: <sip:0987654321@"..., len = 7}, statuscode = 1}}}, via1 = 0x7f6a60cd3798, via2 = 0x0, headers = 0x7f6a60cd3758, last_header = 0x7f6a60cd40d0, parsed_flag = 18446744073709551615, h_via1 = 0x7f6a60cd3758, h_via2 = 0x0, callid = 0x7f6a60cd3900, to = 0x7f6a60cd39f0, cseq = 0x7f6a60cd3940, from = 0x7f6a60cd3c08, contact = 0x7f6a60cd3f10, maxforwards = 0x7f6a60cd39b0, route = 0x0, record_route = 0x0, content_type = 0x7f6a60cd4090, content_length = 0x7f6a60cd40d0, authorization = 0x0, expires = 0x7f6a60cd4010, proxy_auth = 0x0, supported = 0x7f6a60cd3f90, require = 0x0, proxy_require = 0x0, unsupported = 0x0, allow = 0x7f6a60cd3f50, event = 0x0, accept = 0x0, accept_language = 0x0, organization = 0x7f6a60cd4050, priority = 0x0, subject = 0x0, user_agent = 0x7f6a60cd3e50, server = 0x0, content_disposition = 0x0, diversion = 0x0, rpid = 0x0, refer_to = 0x0, session_expires = 0x7f6a60cd3fd0, min_se = 0x0, sipifmatch = 0x0, subscription_state = 0x0, date = 0x0, identity = 0x0, identity_info = 0x0, pai = 0x7f6a60cd3ed0, ppi = 0x0, path = 0x0, privacy = 0x0, body = 0x0, eoh = 0x7f6a60cd3621 "\r\nv=0\r\no=Dialogic_SDP 14338449 0 IN IP4 A.B.C.D\r\ns=Dialogic-SIP\r\nc=IN IP4 A.B.C.D\r\nt=0 0\r\nm=audio 8708 RTP/AVP 8 0 18 101\r\na=rtpmap:0 PCMU/8000\r\na=rtpmap:8 PCMA/8000\r\na=rtpmap:18 G729/80"..., unparsed = 0x7f6a60cd3621 "\r\nv=0\r\no=Dialogic_SDP 14338449 0 IN IP4 A.B.C.D\r\ns=Dialogic-SIP\r\nc=IN IP4 A.B.C.D\r\nt=0 0\r\nm=audio 8708 RTP/AVP 8 0 18 101\r\na=rtpmap:0 PCMU/8000\r\na=rtpmap:8 PCMA/8000\r\na=rtpmap:18 G729/80"..., rcv = {src_ip = {af = 2, len = 4, u = {addrl = {2056377691, 140095054350064}, addr32 = {2056377691, 0, 1811089136, 32618}, addr16 = {54619, 31377, 0, 0, 1776, 27635, 32618, 0}, addr = "[?z\000\000\000\000\360\006\363kj\177\000"}}, dst_ip = {af = 2, len = 4, u = {addrl = {67638457, 0}, addr32 = {67638457, 0, 0, 0}, addr16 = {5305, 1032, 0, 0, 0, 0, 0, 0}, addr = "\271\024\b\004", '\000' <repeats 11 times>}}, src_port = 5060, dst_port = 5060, proto_reserved1 = 0, proto_reserved2 = 0, src_su = {s = { sa_family = 2, sa_data = "\023\304[?z\000\000\000\000\000\000\000"}, sin = {sin_family = 2, sin_port = 50195, sin_addr = {s_addr = 2056377691}, sin_zero = "\000\000\000\000\000\000\000"}, sin6 = {sin6_family = 2, sin6_port = 50195, sin6_flowinfo = 2056377691, sin6_addr = {__in6_u = { __u6_addr8 = '\000' <repeats 15 times>, __u6_addr16 = {0, 0, 0, 0, 0, 0, 0, 0}, __u6_addr32 = {0, 0, 0, 0}}}, sin6_scope_id = 0}}, bind_address = 0x7f6a6bf30588, proto = 1 '\001'}, buf = 0x7f6a60cd3310 "INVITE sip:0987654321@A.B.C.D:5060 SIP/2.0\r\nVia: SIP/2.0/UDP A.B.C.D:5060;rport;branch=z9hG4bK-53e-1402165595-3328-96\r\nCall-ID: 3781-4b1-572014182635-GW-1-A.B.C.D\r\nCSeq: 1 INVITE\r\n"..., len = 1090, new_uri = { s = 0x7f6a60cd32f8 "sip:s@A.B.C.Dgo0rINVITE sip:0987654321@A.B.C.D:5060 SIP/2.0\r\nVia: SIP/2.0/UDP A.B.C.D:5060;rport;branch=z9hG4bK-53e-1402165595-3328-96\r\nCall-ID: 3781-4b1-572014182635-GW-1-A.B.C"..., len = 20}, dst_uri = {s = 0x0, len = 0}, parsed_uri_ok = 0, parsed_uri = {user = { s = 0x7f6a60a17903 "s@A.B.C.D SIP/2.0\r\nRecord-Route: sip:A.B.C.D;lr=on\r\nVia: SIP/2.0/UDP A.B.C.D;branch=z9hG4bKe167.3f64673b859127c758ec8b685c8ceac2.0\r\nVia: SIP/2.0/UDP A.B.C.D:5060;rport=5060;branc"..., len = 1}, passwd = {s = 0x0, len = 0}, host = { s = 0x7f6a60a17905 "A.B.C.D SIP/2.0\r\nRecord-Route: sip:A.B.C.D;lr=on\r\nVia: SIP/2.0/UDP A.B.C.D;branch=z9hG4bKe167.3f64673b859127c758ec8b685c8ceac2.0\r\nVia: SIP/2.0/UDP A.B.C.D:5060;rport=5060;branch="..., len = 14}, port = {s = 0x0, len = 0}, params = {s = 0x0, len = 0}, sip_params = {s = 0x0, len = 0}, headers = {s = 0x0, len = 0}, port_no = 0, proto = 0, type = SIP_URI_T, flags = 0, transport = {s = 0x0, len = 0}, ttl = {s = 0x0, len = 0}, user_param = {s = 0x0, len = 0}, maddr = {s = 0x0, len = 0}, method = {s = 0x0, len = 0}, lr = {s = 0x0, len = 0}, r2 = {s = 0x0, len = 0}, gr = {s = 0x0, len = 0}, transport_val = {s = 0x0, len = 0}, ttl_val = {s = 0x0, len = 0}, user_param_val = {s = 0x0, len = 0}, maddr_val = {s = 0x0, len = 0}, method_val = { s = 0x0, len = 0}, lr_val = {s = 0x0, len = 0}, r2_val = {s = 0x0, len = 0}, gr_val = {s = 0x0, len = 0}}, parsed_orig_ruri_ok = 0, parsed_orig_ruri = {user = { s = 0x0, len = 0}, passwd = {s = 0x0, len = 0}, host = {s = 0x0, len = 0}, port = {s = 0x0, len = 0}, params = {s = 0x0, len = 0}, sip_params = {s = 0x0, len = 0}, headers = {s = 0x0, len = 0}, port_no = 0, proto = 0, type = ERROR_URI_T, flags = 0, transport = {s = 0x0, len = 0}, ttl = {s = 0x0, len = 0}, user_param = {s = 0x0, len = 0}, maddr = {s = 0x0, len = 0}, method = {s = 0x0, len = 0}, lr = {s = 0x0, len = 0}, r2 = {s = 0x0, len = 0}, gr = {s = 0x0, len = 0}, transport_val = {s = 0x0, len = 0}, ttl_val = {s = 0x0, len = 0}, user_param_val = {s = 0x0, len = 0}, maddr_val = {s = 0x0, len = 0}, method_val = { s = 0x0, len = 0}, lr_val = {s = 0x0, len = 0}, r2_val = {s = 0x0, len = 0}, gr_val = {s = 0x0, len = 0}}, add_rm = 0x7f6a609e4040, body_lumps = 0x0, reply_lump = 0x0, add_to_branch_s = '\000' <repeats 57 times>, add_to_branch_len = 0, hash_index = 30238, msg_flags = 145, flags = 6, set_global_address = {s = 0x0, len = 0}, set_global_port = {s = 0x0, len = 0}, force_send_socket = 0x7f6a6bf30588, path_vec = {s = 0x0, len = 0}, instance = {s = 0x0, len = 0}, reg_id = 0, ruid = {s = 0x0, len = 0}, location_ua = {s = 0x0, len = 0}, ldv = {flow = {decoded = 0, rcv = {src_ip = {af = 0, len = 0, u = {addrl = {0, 0}, addr32 = {0, 0, 0, 0}, addr16 = {0, 0, 0, 0, 0, 0, 0, 0}, addr = '\000' <repeats 15 times>}}, dst_ip = {af = 0, len = 0, u = {addrl = {0, 0}, addr32 = {0, 0, 0, 0}, addr16 = {0, 0, 0, 0, 0, 0, 0, 0}, addr = '\000' <repeats 15 times>}}, src_port = 0, dst_port = 0, proto_reserved1 = 0, proto_reserved2 = 0, src_su = { s = {sa_family = 0, sa_data = '\000' <repeats 13 times>}, sin = {sin_family = 0, sin_port = 0, sin_addr = {s_addr = 0}, sin_zero = "\000\000\000\000\000\000\000"}, sin6 = {sin6_family = 0, sin6_port = 0, sin6_flowinfo = 0, sin6_addr = {__in6_u = { __u6_addr8 = '\000' <repeats 15 times>, __u6_addr16 = {0, 0, 0, 0, 0, 0, 0, 0}, __u6_addr32 = {0, 0, 0, 0}}}, sin6_scope_id = 0}}, bind_address = 0x0, proto = 0 '\000'}}}}
Regards,
Igor
2014-06-10 10:25 GMT+02:00 Daniel-Constantin Mierla miconda@gmail.com:
Hello,
t is available in frame 5 - in gdb do:
frame 5
p *t p *t->uas.request
Cheers, Daniel
On 09/06/14 15:33, Igor Potjevlesch wrote:
Hello,
Thank you for your reply.
The “t” variable Is unavailable:
(gdb) p *t
No symbol "t" in current context.
(gdb) p *t->uas.request
No symbol "t" in current context.
Here is the result of the “bt full”:
#0 0x0000000000495792 in pv_get_strval (msg=0x7f6a60cd2c10, param=0x7f6a6c106288, res=0x7fff54abdf00, sval=0x18) at pvapi.c:521
No locals.
#1 0x00007f6a6a12ada8 in pv_get_pai (msg=0x7f6a60cd2c10, param=0x7f6a6c106288, res=0x7fff54abdf00) at pv_core.c:1021
idxf = 0 idx = 0 pai_body = 0x7f6a6d81da88 pai_uri = 0x0 i = 0 cur_id = 0 __FUNCTION__ = "pv_get_pai"
#2 0x0000000000499518 in pv_get_spec_value (msg=0x7f6a60cd2c10, sp=0x7f6a6c106270, value=0x7fff54abdf00) at pvapi.c:1266
ret = 0 __FUNCTION__ = "pv_get_spec_value"
#3 0x00007f6a687e77d9 in extra2strar (extra=0x7f6a6c106260, rq=0x7f6a60cd2c10, val_arr=0x7f6a689f4e30, int_arr=0x7f6a689f537c,
type_arr=0x7f6a689f54e7 "\002\002\002\002") at acc_extra.c:261 value = {rs = {s = 0x0, len = 0}, ri = 0, flags = 0} n = 4 r = 0 __FUNCTION__ = "extra2strar"
#4 0x00007f6a687df393 in acc_db_request (rq=0x7f6a60cd2c10) at acc.c:474
m = 7 n = 1624058896 i = 6 t = 0x414cc0 __FUNCTION__ = "acc_db_request"
#5 0x00007f6a687e9b43 in acc_onreply (t=0x7f6a60d16ff8, req=0x7f6a60cd2c10, reply=0x7f6a6c119aa8, code=200) at acc_logic.c:471
new_uri_bk = { s = 0x7f6a60a178ff "sip:s@W.X.Y.Z SIP/2.0\r\nRecord-Route:
sip:E.F.G.H;lr=on\r\nVia: SIP/2.0/UDP E.F.G.H;branch=z9hG4bKe167.3f64673b859127c758ec8b685c8ceac2.0\r\nVia: SIP/2.0/UDP A.B.C.D:5060;rport=5060;branch=z9hG4bK-53e-1402165595-3328-96\r\nCall-ID: 3781-4b1-572014182635-OGNAJ-1-A.B.C.D\r\nCSeq: 1 INVITE\r\nMax-Forwards: 69\r\nTo: sip:0123456789@E.F.G.H:5060\r\nFrom: "0987654321" sip:0987654321@A.B.C.D;tag=95ffcd055e0f78f7d5d397020e89288de9c8e717\r\nUser-Agent: Dialogic-SIP/10.5.3.372 OGNAJ 1\r\nTimestamp: 06072014182635\r\nP-Asserted-Identity: "0987654321" sip:0987654321@A.B.C.D\r\nContact: sip:0987654321@A.B.C.D:5060\r\nAllow: INVITE, BYE, REGISTER, ACK, OPTIONS, CANCEL, SUBSCRIBE, NOTIFY, INFO, REFER, UPDATE\r\nSupported: path, replaces, timer, tdialog\r\nSession-Expires: 1800\r\nExpires: 300\r\nOrganization: Dialogic\r\nContent-Type: application/sdp\r\nContent-Length: 303\r\n\r\nv=0\r\no=Dialogic_SDP 14338449 0 IN IP4 A.B.C.D\r\ns=Dialogic-SIP\r\nc=IN IP4 I.J.K.L\r\nt=0 0\r\nm=audio 8708 RTP/AVP 8 0 18 101\r\na=rtpmap:0 PCMU/8000\r\na=rtpmap:8 PCMA/8000\r\na=rtpmap:18 G729/8000\r\na=fmtp:18 annexb=yes\r\na=rtpmap:101 telephone-event/8000\r\na=fmtp:101 0-15\r\na=silenceSupp:off - - - -\r\n", len = 20}
br = 0 __FUNCTION__ = "acc_onreply"
#6 0x00007f6a687ea08d in tmcb_func (t=0x7f6a60d16ff8, type=512, ps=0x7fff54abe170) at acc_logic.c:559
__FUNCTION__ = "tmcb_func"
#7 0x00007f6a6a9e4478 in run_trans_callbacks_internal (cb_lst=0x7f6a60d17068, type=512, trans=0x7f6a60d16ff8, params=0x7fff54abe170)
at t_hooks.c:290 cbp = 0x7f6a609f24e0 backup_from = 0x934630 backup_to = 0x934638 backup_dom_from = 0x934640 backup_dom_to = 0x934648 backup_uri_from = 0x934620 backup_uri_to = 0x934628 backup_xavps = 0x934760 __FUNCTION__ = "run_trans_callbacks_internal"
#8 0x00007f6a6a9e468a in run_trans_callbacks_with_buf (type=512, rbuf=0x7f6a60d170b8, req=0x7f6a60cd2c10, repl=0x7f6a6c119aa8,
flags=200) at t_hooks.c:336 params = {req = 0x7f6a60cd2c10, rpl = 0x7f6a6c119aa8, param =
0x7f6a609f24f0, code = 200, flags = 200, branch = 0,
t_rbuf = 0x7f6a60d170b8, dst = 0x7f6a60d17108, send_buf = { s = 0x7f6a60a78938 "SIP/2.0 200 OK\r\nVia: SIP/2.0/UDP
A.B.C.D:5060;rport=5060;branch=z9hG4bK-53e-1402165595-3328-96\r\nRecord-Route: sip:E.F.G.H;lr=on\r\nFrom: "0987654321"sip:0987654321@A.B.C.D;tag=95ffcd055e0f78f7d5d397020e89288de9c8e717---Type <return> to continue, or q <return> to quit---
r\nTo: sip:0123456789@E.F.G.H:5060;tag=as2fc4baac\r\nCall-ID: 3781-4b1-572014182635-OGNAJ-1-A.B.C.D\r\nCSeq: 1 INVITE\r\nServer: Asterisk PBX 1.6.2.9-2+squeeze3\r\nAllow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, SUBSCRIBE, NOTIFY, INFO\r\nSupported: replaces, timer\r\nContact: sip:s@W.X.Y.Z\r\nContent-Type: application/sdp\r\nContent-Length: 275\r\n\r\nv=0\r\no=root 1164105102 1164105102 IN IP4 W.X.Y.Z\r\ns=Asterisk PBX 1.6.2.9-2+squeeze3\r\nc=IN IP4 W.X.Y.Z\r\nt=0 0\r\nm=audio 11426 RTP/AVP 0 8 101\r\na=rtpmap:0 PCMU/8000\r\na=rtpmap:8 PCMA/8000\r\na=rtpmap:101 telephone-event/8000\r\na=fmtp:101 0-16\r\na=ptime:20\r\na=sendrecv\r\n\r\n\n\n",
len = 866}} trans = 0x7f6a60d16ff8
#9 0x00007f6a6aa16c06 in relay_reply (t=0x7f6a60d16ff8, p_msg=0x7f6a6c119aa8, branch=0, msg_status=200, cancel_data=0x7fff54abe4d0,
do_put_on_wait=1) at t_reply.c:2001 relay = 0 save_clone = 0 buf = 0x7f6a6d8027d0 "SIP/2.0 200 OK\r\nVia: SIP/2.0/UDP
A.B.C.D:5060;rport=5060;branch=z9hG4bK-53e-1402165595-3328-96\r\nRecord-Route: sip:E.F.G.H;lr=on\r\nFrom: "0987654321"sip:0987654321@A.B.C.D;tag=95ffcd055e0f78f7d5d397020e89288de9c8e717\r\nTo: sip:0123456789@E.F.G.H:5060;tag=as2fc4baac\r\nCall-ID: 3781-4b1-572014182635-OGNAJ-1-A.B.C.D\r\nCSeq: 1 INVITE\r\nServer: Asterisk PBX 1.6.2.9-2+squeeze3\r\nAllow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, SUBSCRIBE, NOTIFY, INFO\r\nSupported: replaces, timer\r\nContact: sip:s@W.X.Y.Z\r\nContent-Type: application/sdp\r\nContent-Length: 275\r\n\r\nv=0\r\no=root 1164105102 1164105102 IN IP4 W.X.Y.Z\r\ns=Asterisk PBX 1.6.2.9-2+squeeze3\r\nc=IN IP4 W.X.Y.Z\r\nt=0 0\r\nm=audio 11426 RTP/AVP 0 8 101\r\na=rtpmap:0 PCMU/8000\r\na=rtpmap:8 PCMA/8000\r\na=rtpmap:101 telephone-event/8000\r\na=fmtp:101 0-16\r\na=ptime:20\r\na=sendrecv\r\n"
res_len = 866 relayed_code = 200 relayed_msg = 0x7f6a6c119aa8 reply_bak = 0x7fff54abe320 bm = {to_tag_val = {s = 0x7f6a60d18590 "", len = 5448975}} totag_retr = 0 reply_status = RPS_COMPLETED uas_rb = 0x7f6a60d170b8 to_tag = 0x0 reason = {s = 0x154abe2d0 <Address 0x154abe2d0 out of bounds>, len
= 1}
onsend_params = {req = 0x2009249c9, rpl = 0x7f6a6aa36f90, param =
0x414cc0, code = 1, flags = 0, branch = 0,
t_rbuf = 0x7f6a5669f828, dst = 0x7f6a6c119ca0, send_buf = {s =
0x54abe2f0 <Address 0x54abe2f0 out of bounds>, len = 1024}}
__FUNCTION__ = "relay_reply"
#10 0x00007f6a6aa190b7 in reply_received (p_msg=0x7f6a6c119aa8) at t_reply.c:2499
msg_status = 200 last_uac_status = 180 ack = 0x40 <Address 0x40 out of bounds> ack_len = 0 branch = 0 reply_status = 1826607512 onreply_route = 1 cancel_data = {cancel_bitmap = 0, reason = {cause = 200, u = {text
= {s = 0x0, len = 9586191}, e2e_cancel = 0x0, packed_hdrs = {
s = 0x0, len = 9586191}}}} uac = 0x7f6a60d17160 t = 0x7f6a60d16ff8 lack_dst = {send_sock = 0x7f6a6c128b20, to = {s = {sa_family =
4112, sa_data = "\357kj\177\000\000h\227\220\001\000\000\000"},
sin = {sin_family = 4112, sin_port = 27631, sin_addr = {s_addr
= 32618}, sin_zero = "h\227\220\001\000\000\000"}, sin6 = {
sin6_family = 4112, sin6_port = 27631, sin6_flowinfo =
32618, sin6_addr = {__in6_u = {
__u6_addr8 =
"h\227\220\001\000\000\000\000\070\363\004lj\177\000", __u6_addr16 = {38760, 400, 0, 0, 62264, 27652,
32618, 0}, __u6_addr32 = {26253160, 0, 1812263736,
32618}}}, sin6_scope_id = 1810830208}}, id = 32618,
proto = 80 'P', send_flags = {f = 114 'r', blst_imask = 18
'\022'}}
backup_user_from = 0x934630 backup_user_to = 0x934638 backup_domain_from = 0x934640 backup_domain_to = 0x934648 backup_uri_from = 0x934620 backup_uri_to = 0x934628 backup_xavps = 0x934760 replies_locked = 1 branch_ret = 0 prev_branch = 1420551568 blst_503_timeout = 32767 hf = 0x7f6a6c119ac8 onsend_params = {req = 0x7fff54abe550, rpl = 0x550a24, param =
0x19095a8, code = 0, flags = 3, branch = 0,
t_rbuf = 0x7f6a6bef1380, dst = 0x7f6a6c127220, send_buf = {s =
0x7fff54abe550 "`G\223", len = 5537669}}
ctx = {rec_lev = 0, run_flags = 0, last_retcode = 0, jmp_env =
{{__jmpbuf = {140095056354464, -2027732440029261969, 4279488,
140734613941120, 0, 0, -2027732440067010705,
2027365049374019439}, __mask_was_saved = 0, __saved_mask = {__val = {
140095055547592, 9586548, 9586228, 140734613939296,
140095069868440, 9587145, 9586197, 361695345073193192, 9586295,
9586274, 1826607464, 140095069868440, 140095056428208,
140095056354464, 4279488, 140734613941120}}}}}
__FUNCTION__ = "reply_received"
#11 0x000000000045d837 in do_forward_reply (msg=0x7f6a6c119aa8, mode=0) at forward.c:777
new_buf = 0x0 dst = {send_sock = 0x0, to = {s = {sa_family = 0, sa_data = '\000'
<repeats 13 times>}, sin = {sin_family = 0, sin_port = 0,
sin_addr = {s_addr = 0}, sin_zero =
"\000\000\000\000\000\000\000"}, sin6 = {sin6_family = 0, sin6_port = 0,
sin6_flowinfo = 0, sin6_addr = {__in6_u = {__u6_addr8 =
'\000' <repeats 15 times>, __u6_addr16 = {0, 0, 0, 0, 0, 0, 0, 0},
__u6_addr32 = {0, 0, 0, 0}}}, sin6_scope_id = 0}}, id =
0, proto = 0 '\000', send_flags = {f = 0 '\000',
blst_imask = 0 '\000'}} new_len = 32618 r = 1 s = 0x3c96c119ab0 <Address 0x3c96c119ab0 out of bounds> len = 0 __FUNCTION__ = "do_forward_reply"
#12 0x000000000045e0f8 in forward_reply (msg=0x7f6a6c119aa8) at forward.c:860
No locals.
#13 0x00000000004a5887 in receive_msg (
buf=0x924600 "SIP/2.0 200 OK\r\nVia: SIP/2.0/UDP
E.F.G.H;branch=z9hG4bKe167.3f64673b859127c758ec8b685c8ceac2.0;received=E.F.G.H\r\nVia: SIP/2.0/UDP A.B.C.D:5060;rport=5060;branch=z9hG4bK-53e-1402165595-3328-96\r\nRecord-Route: sip:E.F.G.H;lr=on\r\nFrom: "0987654321"sip:0987654321@A.B.C.D;tag=95ffcd055e0f78f7d5d397020e89288de9c8e717\r\nTo: sip:0123456789@E.F.G.H:5060;tag=as2fc4baac\r\nCall-ID: 3781-4b1-572014182635-OGNAJ-1-A.B.C.D\r\nCSeq: 1 INVITE\r\nServer: Asterisk PBX 1.6.2.9-2+squeeze3\r\nAllow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, SUBSCRIBE, NOTIFY, INFO\r\nSupported: replaces, timer\r\nContact: sip:s@W.X.Y.Z\r\nContent-Type: application/sdp\r\nContent-Length: 275\r\n\r\nv=0\r\no=root 1164105102 1164105102 IN IP4 W.X.Y.Z\r\ns=Asterisk PBX 1.6.2.9-2+squeeze3\r\nc=IN IP4 W.X.Y.Z\r\nt=0 0\r\nm=audio 11426 RTP/AVP 0 8 101\r\na=rtpmap:0 PCMU/8000\r\na=rtpmap:8 PCMA/8000\r\na=rtpmap:101 telephone-event/8000\r\na=fmtp:101 0-16\r\na=ptime:20\r\na=sendrecv\r\n", len=969, rcv_info=0x7fff54abe850) at receive.c:273
msg = 0x7f6a6c119aa8 ctx = {rec_lev = 8868984, run_flags = 0, last_retcode = 0, jmp_env
= {{__jmpbuf = {0, 0, 0, 263853236176, 1, 0, 169314554752,
9586112}, __mask_was_saved = 1420552280, __saved_mask =
{__val = {140095054350064, 12884901898, 140095054350064,
4279488, 140734613941120, 140734613940176, 5477586, 0,
140094693045632, 50195, 168953509248, 9586112, 140734613940304,
140734613940224, 5474421, 4279488}}}}} ret = 32618 inb = { s = 0x924600 "SIP/2.0 200 OK\r\nVia: SIP/2.0/UDP
E.F.G.H;branch=z9hG4bKe167.3f64673b859127c758ec8b685c8ceac2.0;received=E.F.G.H\r\nVia: SIP/2.0/UDP A.B.C.D:5060;rport=5060;branch=z9hG4bK-53e-1402165595-3328-96\r\nRecord-Route: sip:E.F.G.H;lr=on\r\nFrom: "0987654321"sip:0987654321@A.B.C.D;tag=95ffcd055e0f78f7d5d397020e89288de9c8e717\r\nTo: sip:0123456789@E.F.G.H:5060;tag=as2fc4baac\r\nCall-ID: 3781-4b1-572014182635-OGNAJ-1-A.B.C.D\r\nCSeq: 1 INVITE\r\nServer: Asterisk PBX 1.6.2.9-2+squeeze3\r\nAllow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, SUBSCRIBE, NOTIFY, INFO\r\nSupported: replaces, timer\r\nContact: sip:s@W.X.Y.Z\r\nContent-Type: application/sdp\r\nContent-Length: 275\r\n\r\nv=0\r\no=root 1164105102 1164105102 IN IP4 W.X.Y.Z\r\ns=Asterisk PBX 1.6.2.9-2+squeeze3\r\nc=IN IP4 W.X.Y.Z\r\nt=0 0\r\nm=audio 11426 RTP/AVP 0 8 101\r\na=rtpmap:0 PCMU/8000\r\na=rtpmap:8 PCMA/8000\r\na=rtpmap:101 telephone-event/8000\r\na=fmtp:101 0-16\r\na=ptime:20\r\na=sendrecv\r\n", len = 969}
__FUNCTION__ = "receive_msg"
#14 0x000000000053c838 in udp_rcv_loop () at udp_server.c:536
len = 969 buf = "SIP/2.0 200 OK\r\nVia: SIP/2.0/UDP
E.F.G.H;branch=z9hG4bKe167.3f64673b859127c758ec8b685c8ceac2.0;received=E.F.G.H\r\nVia: SIP/2.0/UDP A.B.C.D:5060;rport=5060;branch=z9hG4bK-53e-1402165595-3328-96\r\nRecord-Route: sip:E.F.G.H;lr=on\r\nFrom: "0987654321"sip:0987654321@A.B.C.D;tag=95ffcd055e0f78f7d5d397020e89288de9c8e717\r\nTo: sip:0123456789@E.F.G.H:5060;tag=as2fc4baac\r\nCall-ID: 3781-4b1-572014182635-OGNAJ-1-A.B.C.D\r\nCSeq: 1 INVITE\r\nServer: Asterisk PBX 1.6.2.9-2+squeeze3\r\nAllow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, SUBSCRIBE, NOTIFY, INFO\r\nSupported: replaces, timer\r\nContact: sip:s@W.X.Y.Z\r\nContent-Type: application/sdp\r\nContent-Length: 275\r\n\r\nv=0\r\no=root 1164105102 1164105102 IN IP4 W.X.Y.Z\r\ns=Asterisk PBX 1.6.2.9-2+squeeze3\r\nc=IN IP4 W.X.Y.Z\r\nt=0 0\r\nm=audio 11426 RTP/AVP 0 8 101\r\na=rtpmap:0 PCMU/8000\r\na=rtpmap:8 PCMA/8000\r\na=rtpmap:101 telephone-event/8000\r\na=fmtp:101 0-16\r\na=ptime:20\r\na=sendrecv\r\n\000a=rtpmap:18 G729/8000\r\na=fmtp:18 annexb=yes\r\na=rtpmap:101 telephone-event/8000\r\na=fmtp:101 0-15\r\na=silenceSupp:off - - - -\r\n\000rtpmap:101 telephone-event/8000\r\na=fmtp:101 0-15\r\na=silenceSupp:off - - - -\r\na=ptime:20\r\n\000/8000\r\na=silenceSupp:off - - - -\r\na=fmtp:18 annexb=no\r\na=fmtp:114 mode=20\r\na=fmtp:101 0-15,144,149,159\r\na=ptime:20\r\na=sendrecv\r\n\000\na=T38FaxTranscodingJBIG:0\r\na=T38FaxRateManagement:transferredTCF\r\na=T38FaxUdpEC:t38UDPRedundancy\r\n\000axBitRate:14400\r\na=T38FaxUdpEC:t38UDPRedundancy\r\na=T38FaxRateManagement:transferredTCF\r\n\000tpmap:8 PCMA/8000\r\na=rtpmap:99 G726-32/8000\r\na=rtpmap:18 G729/8000\r\na=fmtp:18 annexb=no\r\na=rtpmap:96 telephone-event/8000\r\na=fmtp:96 0-15\r\na=ptime:20\r\na=sendrecv\r\n\000/8000\r\na=fmtp:101 0-16\r\n\000tp:96 0-15\r\na=ptime:20\r\na=sendrecv\r\n\000orwards: 2\r\nUser-Agent: Sagem / HW_V0.0.1 / FW_V-13P036 / SW_V1.2.268\r\nContact: sip:0147258369@M.N.O.P:5060\r\nProxy-Authorization: Digest username="0147258369",realm="sip.domain.tld",nonce="53918e228ef8a40eb1d34d4d8bad809fee0a7e86",uri=\ "sip:0258963147@sip.domain.tld","...
tmp = 0x9245c0 "10.143.1.2" from = 0x7f6a6c04b428 fromlen = 16 ri = {src_ip = {af = 2, len = 4, u = {addrl = {1950469485,
140095054350064}, addr32 = {1950469485, 0, 1811089136, 32618},
addr16 = {52589, 29761, 0, 0, 1776, 27635, 32618, 0}, addr =
"m\315At\000\000\000\000\360\006\363kj\177\000"}}, dst_ip = {
af = 2, len = 4, u = {addrl = {67638457, 0}, addr32 =
{67638457, 0, 0, 0}, addr16 = {5305, 1032, 0, 0, 0, 0, 0, 0},
addr = "\271\024\b\004", '\000' <repeats 11 times>}},
src_port = 5060, dst_port = 5060, proto_reserved1 = 0,
proto_reserved2 = 0, src_su = {s = {sa_family = 2, sa_data =
"\023\304m\315At\000\000\000\000\000\000\000"}, sin = {
sin_family = 2, sin_port = 50195, sin_addr = {s_addr =
1950469485}, sin_zero = "\000\000\000\000\000\000\000"}, sin6 = {
sin6_family = 2, sin6_port = 50195, sin6_flowinfo =
1950469485, sin6_addr = {__in6_u = {
__u6_addr8 = '\000' <repeats 15 times>, __u6_addr16 =
{0, 0, 0, 0, 0, 0, 0, 0}, __u6_addr32 = {0, 0, 0, 0}}},
sin6_scope_id = 0}}, bind_address = 0x7f6a6bf30588, proto =
1 '\001'}
__FUNCTION__ = "udp_rcv_loop"
#15 0x000000000046d42b in main_loop () at main.c:1617
i = 10 pid = 0 si = 0x7f6a6bf30588 si_desc = "udp receiver child=10
sock=E.F.G.H:5060\000lj\177\000\000\320J\373kj\177\000\000^\204^\000\000\000\000\000@v^\000\000\000\000\000h\237Dw\000\000\000\000\300LA\000\000\000\000\000\200\353\253T\377\177", '\000' <repeats 18 times>"\300, \351\253T\377\177\000\000.\244K\000\000\000\000"
nrprocs = 15 __FUNCTION__ = "main_loop"
#16 0x00000000004704d3 in main (argc=7, argv=0x7fff54abeb88) at main.c:2533
cfg_stream = 0x1155010 c = -1 r = 0 tmp = 0x7fff54abff70 "" tmp_len = 0 port = 0 proto = 0 options = 0x5e0998
":f:cm:M:dVIhEeb:l:L:n:vKrRDTN:W:w:t:u:g:P:G:SQ:O:a:A:"
ret = -1 seed = 3032760445 rfd = 4 debug_save = 0 debug_flag = 0 dont_fork_cnt = 0 n_lst = 0x3d6f60fb88 p = 0x5caae0 "H\211l$\330L\211d$\340H\215-\017\245*" __FUNCTION__ = "main"
Regards,
Igor.
-- Daniel-Constantin Mierla - http://www.asipto.comhttp://twitter.com/#!/miconda - http://www.linkedin.com/in/miconda
Hello,
in the same frame 5, can yo get:
p *t->uas.request->pai p *((p_id_body_t*)(t->uas.request->pai->parsed))
Cheers, Daniel
On 10/06/14 18:35, Igor Potjevlesch wrote:
Hello,
Here is the results : _ _ (gdb) frame 5 #5 0x00007f6a687e9b43 in acc_onreply (t=0x7f6a60d16ff8, req=0x7f6a60cd2c10, reply=0x7f6a6c119aa8, code=200) at acc_logic.c:471 471 acc_db_request(req);
Hello,
This is the result, always for frame 5 :
(gdb) p *t->uas.request->pai $1 = {type = HDR_PAI_T, name = { s = 0x7f6a60cd34b8 "P-Asserted-Identity: "0987654321"sip:0987654321@A.B.C.D\r\nContact: sip:0987654321@A.B.C.D:5060\r\nAllow: INVITE, BYE, REGISTER, ACK, OPTIONS, CANCEL, SUBSCRIBE, NOTIFY, INFO, REFER, UPD"..., len = 19}, body = { s = 0x7f6a60cd34cd ""0987654321"sip:0987654321@A.B.C.D\r\nContact: sip:0987654321@A.B.C.D:5060\r\nAllow: INVITE, BYE, REGISTER, ACK, OPTIONS, CANCEL, SUBSCRIBE, NOTIFY, INFO, REFER, UPDATE\r\nSupported: path,"..., len = 43}, len = 66, parsed = 0x7f6a6d81da88, next = 0x7f6a60cd3f10}
(gdb) p *((p_id_body_t*)(t->uas.request->pai->parsed)) $2 = {id = 0x0, num_ids = 0, next = 0x0}
*Did *you find one thing in common between the 2 occurrences? Do you have any ideas about what is the cause of this pai reset?
Regards,
Igor
2014-06-11 16:09 GMT+02:00 Daniel-Constantin Mierla miconda@gmail.com:
Hello,
in the same frame 5, can yo get:
p *t->uas.request->pai p *((p_id_body_t*)(t->uas.request->pai->parsed))
Cheers, Daniel
On 10/06/14 18:35, Igor Potjevlesch wrote:
Hello,
Here is the results :
(gdb) frame 5 #5 0x00007f6a687e9b43 in acc_onreply (t=0x7f6a60d16ff8, req=0x7f6a60cd2c10, reply=0x7f6a6c119aa8, code=200) at acc_logic.c:471 471 acc_db_request(req);
-- Daniel-Constantin Mierla - http://www.asipto.comhttp://twitter.com/#!/miconda - http://www.linkedin.com/in/miconda
Hello,
at least I narrowed it down a bit. It is empty also in the clone stored in transaction, so it happens either during cloning or before. I will have to check these parts.
Cheers, Daniel
On 11/06/14 17:00, Igor Potjevlesch wrote:
Hello,
This is the result, always for frame 5 :
(gdb) p *t->uas.request->pai $1 = {type = HDR_PAI_T, name = { s = 0x7f6a60cd34b8 "P-Asserted-Identity: "0987654321"sip:0987654321@A.B.C.D\r\nContact: sip:0987654321@A.B.C.D:5060\r\nAllow: INVITE, BYE, REGISTER, ACK, OPTIONS, CANCEL, SUBSCRIBE, NOTIFY, INFO, REFER, UPD"..., len = 19}, body = { s = 0x7f6a60cd34cd ""0987654321"sip:0987654321@A.B.C.D\r\nContact: sip:0987654321@A.B.C.D:5060\r\nAllow: INVITE, BYE, REGISTER, ACK, OPTIONS, CANCEL, SUBSCRIBE, NOTIFY, INFO, REFER, UPDATE\r\nSupported: path,"..., len = 43}, len = 66, parsed = 0x7f6a6d81da88, next = 0x7f6a60cd3f10}
(gdb) p *((p_id_body_t*)(t->uas.request->pai->parsed)) $2 = {id = 0x0, num_ids = 0, next = 0x0}
*Did *you find one thing in**common between the 2 occurrences? Do you have any ideas about what is the cause of this pai reset?
Regards,
Igor
2014-06-11 16:09 GMT+02:00 Daniel-Constantin Mierla <miconda@gmail.com mailto:miconda@gmail.com>:
Hello, in the same frame 5, can yo get: p *t->uas.request->pai p *((p_id_body_t*)(t->uas.request->pai->parsed)) Cheers, Daniel On 10/06/14 18:35, Igor Potjevlesch wrote:
Hello, Here is the results : _ _ (gdb) frame 5 #5 0x00007f6a687e9b43 in acc_onreply (t=0x7f6a60d16ff8, req=0x7f6a60cd2c10, reply=0x7f6a6c119aa8, code=200) at acc_logic.c:471 471 acc_db_request(req);
-- Daniel-Constantin Mierla -http://www.asipto.com http://twitter.com/#!/miconda <http://twitter.com/#%21/miconda> -http://www.linkedin.com/in/miconda
Hello,
cloning to shm for tm seems ok. Can you tell where you access P-Asserted-Identity header, via variables? Does it happen in request_route, failure_route or branch_route?
Can you print from gdb, any frame:
p mem_block p shm_block
I want to see if parsed filed point to shm or pkg memory.
Cheers, Daniel
On 11/06/14 17:37, Daniel-Constantin Mierla wrote:
Hello,
at least I narrowed it down a bit. It is empty also in the clone stored in transaction, so it happens either during cloning or before. I will have to check these parts.
Cheers, Daniel
On 11/06/14 17:00, Igor Potjevlesch wrote:
Hello,
This is the result, always for frame 5 :
(gdb) p *t->uas.request->pai $1 = {type = HDR_PAI_T, name = { s = 0x7f6a60cd34b8 "P-Asserted-Identity: "0987654321"sip:0987654321@A.B.C.D\r\nContact: sip:0987654321@A.B.C.D:5060\r\nAllow: INVITE, BYE, REGISTER, ACK, OPTIONS, CANCEL, SUBSCRIBE, NOTIFY, INFO, REFER, UPD"..., len = 19}, body = { s = 0x7f6a60cd34cd ""0987654321"sip:0987654321@A.B.C.D\r\nContact: sip:0987654321@A.B.C.D:5060\r\nAllow: INVITE, BYE, REGISTER, ACK, OPTIONS, CANCEL, SUBSCRIBE, NOTIFY, INFO, REFER, UPDATE\r\nSupported: path,"..., len = 43}, len = 66, parsed = 0x7f6a6d81da88, next = 0x7f6a60cd3f10}
(gdb) p *((p_id_body_t*)(t->uas.request->pai->parsed)) $2 = {id = 0x0, num_ids = 0, next = 0x0}
*Did *you find one thing in**common between the 2 occurrences? Do you have any ideas about what is the cause of this pai reset?
Regards,
Igor
2014-06-11 16:09 GMT+02:00 Daniel-Constantin Mierla <miconda@gmail.com mailto:miconda@gmail.com>:
Hello, in the same frame 5, can yo get: p *t->uas.request->pai p *((p_id_body_t*)(t->uas.request->pai->parsed)) Cheers, Daniel On 10/06/14 18:35, Igor Potjevlesch wrote:
Hello, Here is the results : _ _ (gdb) frame 5 #5 0x00007f6a687e9b43 in acc_onreply (t=0x7f6a60d16ff8, req=0x7f6a60cd2c10, reply=0x7f6a6c119aa8, code=200) at acc_logic.c:471 471 acc_db_request(req);
-- Daniel-Constantin Mierla -http://www.asipto.com http://twitter.com/#!/miconda <http://twitter.com/#%21/miconda> -http://www.linkedin.com/in/miconda
-- Daniel-Constantin Mierla -http://www.asipto.com http://twitter.com/#!/miconda -http://www.linkedin.com/in/miconda
Hello,
We do not access to the P-asserted-identity in our configuration but we added the field PAI in the db base ACC ( for INVITE, ACK and BYE) . I dont know if it's in request_route, failure_route or branch_route .
This is the print :
(gdb) p mem_block $3 = (struct qm_block *) 0x7f6a6bef1010 (gdb) p shm_block $4 = (struct qm_block *) 0x7f6a5666a000
Regards,
Igor
2014-06-11 18:02 GMT+02:00 Daniel-Constantin Mierla miconda@gmail.com:
Hello,
cloning to shm for tm seems ok. Can you tell where you access P-Asserted-Identity header, via variables? Does it happen in request_route, failure_route or branch_route?
Can you print from gdb, any frame:
p mem_block p shm_block
I want to see if parsed filed point to shm or pkg memory.
Cheers, Daniel
On 11/06/14 17:37, Daniel-Constantin Mierla wrote:
Hello,
at least I narrowed it down a bit. It is empty also in the clone stored in transaction, so it happens either during cloning or before. I will have to check these parts.
Cheers, Daniel
On 11/06/14 17:00, Igor Potjevlesch wrote:
Hello,
This is the result, always for frame 5 :
(gdb) p *t->uas.request->pai $1 = {type = HDR_PAI_T, name = { s = 0x7f6a60cd34b8 "P-Asserted-Identity: "0987654321" sip:0987654321@A.B.C.D\r\nContact: sip:0987654321@A.B.C.D:5060\r\nAllow: INVITE, BYE, REGISTER, ACK, OPTIONS, CANCEL, SUBSCRIBE, NOTIFY, INFO, REFER, UPD"..., len = 19}, body = { s = 0x7f6a60cd34cd ""0987654321"sip:0987654321@A.B.C.D\r\nContact: sip:0987654321@A.B.C.D:5060\r\nAllow: INVITE, BYE, REGISTER, ACK, OPTIONS, CANCEL, SUBSCRIBE, NOTIFY, INFO, REFER, UPDATE\r\nSupported: path,"..., len = 43}, len = 66, parsed = 0x7f6a6d81da88, next = 0x7f6a60cd3f10}
(gdb) p *((p_id_body_t*)(t->uas.request->pai->parsed)) $2 = {id = 0x0, num_ids = 0, next = 0x0}
*Did *you find one thing in common between the 2 occurrences? Do you have any ideas about what is the cause of this pai reset?
Regards,
Igor
2014-06-11 16:09 GMT+02:00 Daniel-Constantin Mierla miconda@gmail.com:
Hello,
in the same frame 5, can yo get:
p *t->uas.request->pai p *((p_id_body_t*)(t->uas.request->pai->parsed))
Cheers, Daniel
On 10/06/14 18:35, Igor Potjevlesch wrote:
Hello,
Here is the results :
(gdb) frame 5 #5 0x00007f6a687e9b43 in acc_onreply (t=0x7f6a60d16ff8, req=0x7f6a60cd2c10, reply=0x7f6a6c119aa8, code=200) at acc_logic.c:471 471 acc_db_request(req);
-- Daniel-Constantin Mierla - http://www.asipto.comhttp://twitter.com/#!/miconda - http://www.linkedin.com/in/miconda
-- Daniel-Constantin Mierla - http://www.asipto.comhttp://twitter.com/#!/miconda - http://www.linkedin.com/in/miconda
-- Daniel-Constantin Mierla - http://www.asipto.comhttp://twitter.com/#!/miconda - http://www.linkedin.com/in/miconda
Hello,
so you don't print $ai in xlog() statements nor use it in any assignments or other functions besides acc parameter?
Cheers, Daniel
On 11/06/14 19:19, Igor Potjevlesch wrote:
Hello,
We do not access to the P-asserted-identity in our configuration but we added the field PAI in the db base ACC ( for INVITE, ACK and BYE) . I dont know if it's in request_route, failure_route or branch_route .
This is the print :
(gdb) p mem_block $3 = (struct qm_block *) 0x7f6a6bef1010 (gdb) p shm_block $4 = (struct qm_block *) 0x7f6a5666a000
Regards,
Igor
2014-06-11 18:02 GMT+02:00 Daniel-Constantin Mierla <miconda@gmail.com mailto:miconda@gmail.com>:
Hello, cloning to shm for tm seems ok. Can you tell where you access P-Asserted-Identity header, via variables? Does it happen in request_route, failure_route or branch_route? Can you print from gdb, any frame: p mem_block p shm_block I want to see if parsed filed point to shm or pkg memory. Cheers, Daniel On 11/06/14 17:37, Daniel-Constantin Mierla wrote:
Hello, at least I narrowed it down a bit. It is empty also in the clone stored in transaction, so it happens either during cloning or before. I will have to check these parts. Cheers, Daniel On 11/06/14 17:00, Igor Potjevlesch wrote:
Hello, This is the result, always for frame 5 : (gdb) p *t->uas.request->pai $1 = {type = HDR_PAI_T, name = { s = 0x7f6a60cd34b8 "P-Asserted-Identity: \"0987654321\"<sip:0987654321@A.B.C.D>\r\nContact: <sip:0987654321@A.B.C.D:5060>\r\nAllow: INVITE, BYE, REGISTER, ACK, OPTIONS, CANCEL, SUBSCRIBE, NOTIFY, INFO, REFER, UPD"..., len = 19}, body = { s = 0x7f6a60cd34cd "\"0987654321\"<sip:0987654321@A.B.C.D>\r\nContact: <sip:0987654321@A.B.C.D:5060>\r\nAllow: INVITE, BYE, REGISTER, ACK, OPTIONS, CANCEL, SUBSCRIBE, NOTIFY, INFO, REFER, UPDATE\r\nSupported: path,"..., len = 43}, len = 66, parsed = 0x7f6a6d81da88, next = 0x7f6a60cd3f10} (gdb) p *((p_id_body_t*)(t->uas.request->pai->parsed)) $2 = {id = 0x0, num_ids = 0, next = 0x0} *Did *you find one thing in**common between the 2 occurrences? Do you have any ideas about what is the cause of this pai reset? Regards, Igor 2014-06-11 16:09 GMT+02:00 Daniel-Constantin Mierla <miconda@gmail.com <mailto:miconda@gmail.com>>: Hello, in the same frame 5, can yo get: p *t->uas.request->pai p *((p_id_body_t*)(t->uas.request->pai->parsed)) Cheers, Daniel On 10/06/14 18:35, Igor Potjevlesch wrote:
Hello, Here is the results : _ _ (gdb) frame 5 #5 0x00007f6a687e9b43 in acc_onreply (t=0x7f6a60d16ff8, req=0x7f6a60cd2c10, reply=0x7f6a6c119aa8, code=200) at acc_logic.c:471 471 acc_db_request(req);
-- Daniel-Constantin Mierla -http://www.asipto.com http://twitter.com/#!/miconda <http://twitter.com/#%21/miconda> -http://www.linkedin.com/in/miconda
-- Daniel-Constantin Mierla -http://www.asipto.com http://twitter.com/#!/miconda <http://twitter.com/#%21/miconda> -http://www.linkedin.com/in/miconda
-- Daniel-Constantin Mierla -http://www.asipto.com http://twitter.com/#!/miconda <http://twitter.com/#%21/miconda> -http://www.linkedin.com/in/miconda
Few more things...
Are you recording 1xx events? Can you check to see if there is another record in acc table for the same call? You can search by call-id 3781-4b1-572014182635-OGNAJ-1-A.B.C.D
Eventually, send also the parameters you set for acc module.
Cheers, Daniel
On 11/06/14 19:25, Daniel-Constantin Mierla wrote:
Hello,
so you don't print $ai in xlog() statements nor use it in any assignments or other functions besides acc parameter?
Cheers, Daniel
On 11/06/14 19:19, Igor Potjevlesch wrote:
Hello,
We do not access to the P-asserted-identity in our configuration but we added the field PAI in the db base ACC ( for INVITE, ACK and BYE) . I dont know if it's in request_route, failure_route or branch_route .
This is the print :
(gdb) p mem_block $3 = (struct qm_block *) 0x7f6a6bef1010 (gdb) p shm_block $4 = (struct qm_block *) 0x7f6a5666a000
Regards,
Igor
2014-06-11 18:02 GMT+02:00 Daniel-Constantin Mierla <miconda@gmail.com mailto:miconda@gmail.com>:
Hello, cloning to shm for tm seems ok. Can you tell where you access P-Asserted-Identity header, via variables? Does it happen in request_route, failure_route or branch_route? Can you print from gdb, any frame: p mem_block p shm_block I want to see if parsed filed point to shm or pkg memory. Cheers, Daniel On 11/06/14 17:37, Daniel-Constantin Mierla wrote:
Hello, at least I narrowed it down a bit. It is empty also in the clone stored in transaction, so it happens either during cloning or before. I will have to check these parts. Cheers, Daniel On 11/06/14 17:00, Igor Potjevlesch wrote:
Hello, This is the result, always for frame 5 : (gdb) p *t->uas.request->pai $1 = {type = HDR_PAI_T, name = { s = 0x7f6a60cd34b8 "P-Asserted-Identity: \"0987654321\"<sip:0987654321@A.B.C.D>\r\nContact: <sip:0987654321@A.B.C.D:5060>\r\nAllow: INVITE, BYE, REGISTER, ACK, OPTIONS, CANCEL, SUBSCRIBE, NOTIFY, INFO, REFER, UPD"..., len = 19}, body = { s = 0x7f6a60cd34cd "\"0987654321\"<sip:0987654321@A.B.C.D>\r\nContact: <sip:0987654321@A.B.C.D:5060>\r\nAllow: INVITE, BYE, REGISTER, ACK, OPTIONS, CANCEL, SUBSCRIBE, NOTIFY, INFO, REFER, UPDATE\r\nSupported: path,"..., len = 43}, len = 66, parsed = 0x7f6a6d81da88, next = 0x7f6a60cd3f10} (gdb) p *((p_id_body_t*)(t->uas.request->pai->parsed)) $2 = {id = 0x0, num_ids = 0, next = 0x0} *Did *you find one thing in**common between the 2 occurrences? Do you have any ideas about what is the cause of this pai reset? Regards, Igor 2014-06-11 16:09 GMT+02:00 Daniel-Constantin Mierla <miconda@gmail.com <mailto:miconda@gmail.com>>: Hello, in the same frame 5, can yo get: p *t->uas.request->pai p *((p_id_body_t*)(t->uas.request->pai->parsed)) Cheers, Daniel On 10/06/14 18:35, Igor Potjevlesch wrote:
Hello, Here is the results : _ _ (gdb) frame 5 #5 0x00007f6a687e9b43 in acc_onreply (t=0x7f6a60d16ff8, req=0x7f6a60cd2c10, reply=0x7f6a6c119aa8, code=200) at acc_logic.c:471 471 acc_db_request(req);
-- Daniel-Constantin Mierla -http://www.asipto.com http://twitter.com/#!/miconda <http://twitter.com/#%21/miconda> -http://www.linkedin.com/in/miconda
-- Daniel-Constantin Mierla -http://www.asipto.com http://twitter.com/#!/miconda <http://twitter.com/#%21/miconda> -http://www.linkedin.com/in/miconda
-- Daniel-Constantin Mierla -http://www.asipto.com http://twitter.com/#!/miconda <http://twitter.com/#%21/miconda> -http://www.linkedin.com/in/miconda
-- Daniel-Constantin Mierla -http://www.asipto.com http://twitter.com/#!/miconda -http://www.linkedin.com/in/miconda
Hello,
We don't use $ai in xlog nor in other process. only in ACC.
parameters for ACC are : modparam("acc", "db_flag", FLT_ACC) modparam("acc", "db_missed_flag", 3) modparam("acc", "db_url", DBURLWO) modparam("acc", "db_extra", "src_user=$fU;username=$Au;src_domain=$fd;src_ip=$si;src_pai=$ai;" "dst_ouser=$tU;dst_user=$rU;dst_domain=$rd")
For the 3781-4b1-572014182635-OGNAJ-1-A.B.C.D there is a code 180 ringing in the INVITE in ACC table.
regards,
Igor
2014-06-11 23:01 GMT+02:00 Daniel-Constantin Mierla miconda@gmail.com:
Few more things...
Are you recording 1xx events? Can you check to see if there is another record in acc table for the same call? You can search by call-id 3781-4b1-572014182635-OGNAJ-1-A.B.C.D
Eventually, send also the parameters you set for acc module.
Cheers, Daniel
On 11/06/14 19:25, Daniel-Constantin Mierla wrote:
Hello,
so you don't print $ai in xlog() statements nor use it in any assignments or other functions besides acc parameter?
Cheers, Daniel
On 11/06/14 19:19, Igor Potjevlesch wrote:
Hello,
We do not access to the P-asserted-identity in our configuration but we added the field PAI in the db base ACC ( for INVITE, ACK and BYE) . I dont know if it's in request_route, failure_route or branch_route .
This is the print :
(gdb) p mem_block $3 = (struct qm_block *) 0x7f6a6bef1010 (gdb) p shm_block $4 = (struct qm_block *) 0x7f6a5666a000
Regards,
Igor
2014-06-11 18:02 GMT+02:00 Daniel-Constantin Mierla miconda@gmail.com:
Hello,
cloning to shm for tm seems ok. Can you tell where you access P-Asserted-Identity header, via variables? Does it happen in request_route, failure_route or branch_route?
Can you print from gdb, any frame:
p mem_block p shm_block
I want to see if parsed filed point to shm or pkg memory.
Cheers, Daniel
On 11/06/14 17:37, Daniel-Constantin Mierla wrote:
Hello,
at least I narrowed it down a bit. It is empty also in the clone stored in transaction, so it happens either during cloning or before. I will have to check these parts.
Cheers, Daniel
On 11/06/14 17:00, Igor Potjevlesch wrote:
Hello,
This is the result, always for frame 5 :
(gdb) p *t->uas.request->pai $1 = {type = HDR_PAI_T, name = { s = 0x7f6a60cd34b8 "P-Asserted-Identity: "0987654321" sip:0987654321@A.B.C.D\r\nContact: sip:0987654321@A.B.C.D:5060\r\nAllow: INVITE, BYE, REGISTER, ACK, OPTIONS, CANCEL, SUBSCRIBE, NOTIFY, INFO, REFER, UPD"..., len = 19}, body = { s = 0x7f6a60cd34cd ""0987654321"sip:0987654321@A.B.C.D\r\nContact: sip:0987654321@A.B.C.D:5060\r\nAllow: INVITE, BYE, REGISTER, ACK, OPTIONS, CANCEL, SUBSCRIBE, NOTIFY, INFO, REFER, UPDATE\r\nSupported: path,"..., len = 43}, len = 66, parsed = 0x7f6a6d81da88, next = 0x7f6a60cd3f10}
(gdb) p *((p_id_body_t*)(t->uas.request->pai->parsed)) $2 = {id = 0x0, num_ids = 0, next = 0x0}
*Did *you find one thing in common between the 2 occurrences? Do you have any ideas about what is the cause of this pai reset?
Regards,
Igor
2014-06-11 16:09 GMT+02:00 Daniel-Constantin Mierla miconda@gmail.com:
Hello,
in the same frame 5, can yo get:
p *t->uas.request->pai p *((p_id_body_t*)(t->uas.request->pai->parsed))
Cheers, Daniel
On 10/06/14 18:35, Igor Potjevlesch wrote:
Hello,
Here is the results :
(gdb) frame 5 #5 0x00007f6a687e9b43 in acc_onreply (t=0x7f6a60d16ff8, req=0x7f6a60cd2c10, reply=0x7f6a6c119aa8, code=200) at acc_logic.c:471 471 acc_db_request(req);
-- Daniel-Constantin Mierla - http://www.asipto.comhttp://twitter.com/#!/miconda - http://www.linkedin.com/in/miconda
-- Daniel-Constantin Mierla - http://www.asipto.comhttp://twitter.com/#!/miconda - http://www.linkedin.com/in/miconda
-- Daniel-Constantin Mierla - http://www.asipto.comhttp://twitter.com/#!/miconda - http://www.linkedin.com/in/miconda
-- Daniel-Constantin Mierla - http://www.asipto.comhttp://twitter.com/#!/miconda - http://www.linkedin.com/in/miconda
-- Daniel-Constantin Mierla - http://www.asipto.comhttp://twitter.com/#!/miconda - http://www.linkedin.com/in/miconda
Hello,
if you get a record for 180 response, then you have also the early_media parameter set for acc module, isn't it?
In the morning I pushed a patch that should fix this issue. Use latest release 4.1.4 and see if works fine. Report the results to know that it is gone or not.
Cheers, Daniel
On 12/06/14 16:55, Igor Potjevlesch wrote:
Hello,
We don't use $ai in xlog nor in other process. only in ACC.
parameters for ACC are : modparam("acc", "db_flag", FLT_ACC) modparam("acc", "db_missed_flag", 3) modparam("acc", "db_url", DBURLWO) modparam("acc", "db_extra", "src_user=$fU;username=$Au;src_domain=$fd;src_ip=$si;src_pai=$ai;" "dst_ouser=$tU;dst_user=$rU;dst_domain=$rd")
For the 3781-4b1-572014182635-OGNAJ-1-A.B.C.D there is a code 180 ringing in the INVITE in ACC table.
regards,
Igor
2014-06-11 23:01 GMT+02:00 Daniel-Constantin Mierla <miconda@gmail.com mailto:miconda@gmail.com>:
Few more things... Are you recording 1xx events? Can you check to see if there is another record in acc table for the same call? You can search by call-id 3781-4b1-572014182635-OGNAJ-1-A.B.C.D Eventually, send also the parameters you set for acc module. Cheers, Daniel On 11/06/14 19:25, Daniel-Constantin Mierla wrote:
Hello, so you don't print $ai in xlog() statements nor use it in any assignments or other functions besides acc parameter? Cheers, Daniel On 11/06/14 19:19, Igor Potjevlesch wrote:
Hello, We do not access to the P-asserted-identity in our configuration but we added the field PAI in the db base ACC ( for INVITE, ACK and BYE) . I dont know if it's in request_route, failure_route or branch_route . This is the print : (gdb) p mem_block $3 = (struct qm_block *) 0x7f6a6bef1010 (gdb) p shm_block $4 = (struct qm_block *) 0x7f6a5666a000 Regards, Igor 2014-06-11 18:02 GMT+02:00 Daniel-Constantin Mierla <miconda@gmail.com <mailto:miconda@gmail.com>>: Hello, cloning to shm for tm seems ok. Can you tell where you access P-Asserted-Identity header, via variables? Does it happen in request_route, failure_route or branch_route? Can you print from gdb, any frame: p mem_block p shm_block I want to see if parsed filed point to shm or pkg memory. Cheers, Daniel On 11/06/14 17:37, Daniel-Constantin Mierla wrote:
Hello, at least I narrowed it down a bit. It is empty also in the clone stored in transaction, so it happens either during cloning or before. I will have to check these parts. Cheers, Daniel On 11/06/14 17:00, Igor Potjevlesch wrote:
Hello, This is the result, always for frame 5 : (gdb) p *t->uas.request->pai $1 = {type = HDR_PAI_T, name = { s = 0x7f6a60cd34b8 "P-Asserted-Identity: \"0987654321\"<sip:0987654321@A.B.C.D>\r\nContact: <sip:0987654321@A.B.C.D:5060>\r\nAllow: INVITE, BYE, REGISTER, ACK, OPTIONS, CANCEL, SUBSCRIBE, NOTIFY, INFO, REFER, UPD"..., len = 19}, body = { s = 0x7f6a60cd34cd "\"0987654321\"<sip:0987654321@A.B.C.D>\r\nContact: <sip:0987654321@A.B.C.D:5060>\r\nAllow: INVITE, BYE, REGISTER, ACK, OPTIONS, CANCEL, SUBSCRIBE, NOTIFY, INFO, REFER, UPDATE\r\nSupported: path,"..., len = 43}, len = 66, parsed = 0x7f6a6d81da88, next = 0x7f6a60cd3f10} (gdb) p *((p_id_body_t*)(t->uas.request->pai->parsed)) $2 = {id = 0x0, num_ids = 0, next = 0x0} *Did *you find one thing in**common between the 2 occurrences? Do you have any ideas about what is the cause of this pai reset? Regards, Igor 2014-06-11 16:09 GMT+02:00 Daniel-Constantin Mierla <miconda@gmail.com <mailto:miconda@gmail.com>>: Hello, in the same frame 5, can yo get: p *t->uas.request->pai p *((p_id_body_t*)(t->uas.request->pai->parsed)) Cheers, Daniel On 10/06/14 18:35, Igor Potjevlesch wrote:
Hello, Here is the results : _ _ (gdb) frame 5 #5 0x00007f6a687e9b43 in acc_onreply (t=0x7f6a60d16ff8, req=0x7f6a60cd2c10, reply=0x7f6a6c119aa8, code=200) at acc_logic.c:471 471 acc_db_request(req);
-- Daniel-Constantin Mierla -http://www.asipto.com http://twitter.com/#!/miconda <http://twitter.com/#%21/miconda> -http://www.linkedin.com/in/miconda
-- Daniel-Constantin Mierla -http://www.asipto.com http://twitter.com/#!/miconda <http://twitter.com/#%21/miconda> -http://www.linkedin.com/in/miconda
-- Daniel-Constantin Mierla -http://www.asipto.com http://twitter.com/#!/miconda <http://twitter.com/#%21/miconda> -http://www.linkedin.com/in/miconda
-- Daniel-Constantin Mierla -http://www.asipto.com http://twitter.com/#!/miconda <http://twitter.com/#%21/miconda> -http://www.linkedin.com/in/miconda
-- Daniel-Constantin Mierla -http://www.asipto.com http://twitter.com/#!/miconda <http://twitter.com/#%21/miconda> -http://www.linkedin.com/in/miconda
Hello,
we didn't set the early media parameter . its '0' by default, isn't it?
regards,
Igor
2014-06-12 17:03 GMT+02:00 Daniel-Constantin Mierla miconda@gmail.com:
Hello,
if you get a record for 180 response, then you have also the early_media parameter set for acc module, isn't it?
In the morning I pushed a patch that should fix this issue. Use latest release 4.1.4 and see if works fine. Report the results to know that it is gone or not.
Cheers, Daniel
On 12/06/14 16:55, Igor Potjevlesch wrote:
Hello,
We don't use $ai in xlog nor in other process. only in ACC.
parameters for ACC are : modparam("acc", "db_flag", FLT_ACC) modparam("acc", "db_missed_flag", 3) modparam("acc", "db_url", DBURLWO) modparam("acc", "db_extra", "src_user=$fU;username=$Au;src_domain=$fd;src_ip=$si;src_pai=$ai;" "dst_ouser=$tU;dst_user=$rU;dst_domain=$rd")
For the 3781-4b1-572014182635-OGNAJ-1-A.B.C.D there is a code 180 ringing in the INVITE in ACC table.
regards,
Igor
2014-06-11 23:01 GMT+02:00 Daniel-Constantin Mierla miconda@gmail.com:
Few more things...
Are you recording 1xx events? Can you check to see if there is another record in acc table for the same call? You can search by call-id 3781-4b1-572014182635-OGNAJ-1-A.B.C.D
Eventually, send also the parameters you set for acc module.
Cheers, Daniel
On 11/06/14 19:25, Daniel-Constantin Mierla wrote:
Hello,
so you don't print $ai in xlog() statements nor use it in any assignments or other functions besides acc parameter?
Cheers, Daniel
On 11/06/14 19:19, Igor Potjevlesch wrote:
Hello,
We do not access to the P-asserted-identity in our configuration but we added the field PAI in the db base ACC ( for INVITE, ACK and BYE) . I dont know if it's in request_route, failure_route or branch_route .
This is the print :
(gdb) p mem_block $3 = (struct qm_block *) 0x7f6a6bef1010 (gdb) p shm_block $4 = (struct qm_block *) 0x7f6a5666a000
Regards,
Igor
2014-06-11 18:02 GMT+02:00 Daniel-Constantin Mierla miconda@gmail.com:
Hello,
cloning to shm for tm seems ok. Can you tell where you access P-Asserted-Identity header, via variables? Does it happen in request_route, failure_route or branch_route?
Can you print from gdb, any frame:
p mem_block p shm_block
I want to see if parsed filed point to shm or pkg memory.
Cheers, Daniel
On 11/06/14 17:37, Daniel-Constantin Mierla wrote:
Hello,
at least I narrowed it down a bit. It is empty also in the clone stored in transaction, so it happens either during cloning or before. I will have to check these parts.
Cheers, Daniel
On 11/06/14 17:00, Igor Potjevlesch wrote:
Hello,
This is the result, always for frame 5 :
(gdb) p *t->uas.request->pai $1 = {type = HDR_PAI_T, name = { s = 0x7f6a60cd34b8 "P-Asserted-Identity: "0987654321" sip:0987654321@A.B.C.D\r\nContact: sip:0987654321@A.B.C.D:5060\r\nAllow: INVITE, BYE, REGISTER, ACK, OPTIONS, CANCEL, SUBSCRIBE, NOTIFY, INFO, REFER, UPD"..., len = 19}, body = { s = 0x7f6a60cd34cd ""0987654321"sip:0987654321@A.B.C.D\r\nContact: sip:0987654321@A.B.C.D:5060\r\nAllow: INVITE, BYE, REGISTER, ACK, OPTIONS, CANCEL, SUBSCRIBE, NOTIFY, INFO, REFER, UPDATE\r\nSupported: path,"..., len = 43}, len = 66, parsed = 0x7f6a6d81da88, next = 0x7f6a60cd3f10}
(gdb) p *((p_id_body_t*)(t->uas.request->pai->parsed)) $2 = {id = 0x0, num_ids = 0, next = 0x0}
*Did *you find one thing in common between the 2 occurrences? Do you have any ideas about what is the cause of this pai reset?
Regards,
Igor
2014-06-11 16:09 GMT+02:00 Daniel-Constantin Mierla miconda@gmail.com:
Hello,
in the same frame 5, can yo get:
p *t->uas.request->pai p *((p_id_body_t*)(t->uas.request->pai->parsed))
Cheers, Daniel
On 10/06/14 18:35, Igor Potjevlesch wrote:
Hello,
Here is the results :
(gdb) frame 5 #5 0x00007f6a687e9b43 in acc_onreply (t=0x7f6a60d16ff8, req=0x7f6a60cd2c10, reply=0x7f6a6c119aa8, code=200) at acc_logic.c:471 471 acc_db_request(req);
-- Daniel-Constantin Mierla - http://www.asipto.comhttp://twitter.com/#!/miconda - http://www.linkedin.com/in/miconda
-- Daniel-Constantin Mierla - http://www.asipto.comhttp://twitter.com/#!/miconda - http://www.linkedin.com/in/miconda
-- Daniel-Constantin Mierla - http://www.asipto.comhttp://twitter.com/#!/miconda - http://www.linkedin.com/in/miconda
-- Daniel-Constantin Mierla - http://www.asipto.comhttp://twitter.com/#!/miconda - http://www.linkedin.com/in/miconda
-- Daniel-Constantin Mierla - http://www.asipto.comhttp://twitter.com/#!/miconda - http://www.linkedin.com/in/miconda
-- Daniel-Constantin Mierla - http://www.asipto.comhttp://twitter.com/#!/miconda - http://www.linkedin.com/in/miconda