Hi,
as I saw in the log, the FROM restoring in BYE works properly, so RR/Route processing is fine. Are you sure you enabled the accounting for BYE?
just in case, I added some more debug messages about this on cvs - please update and see the output. You should get: DBUG:acc:acc_onreq: UPSTREAM req detected -> flaging it and DBUG:acc:fmt2strar: UPSTREAM flag set -> swap F/T
regards, bogdan
tele wrote:
I've also tried with call UA --> UA that pass only from proxy and there is the same problem on accounting. To/From not swapped ,if the callee hangup phone, before send accounting and yes there is RR present in the BYE message.
you can find attached here the full dump.
UA1 - 82.215.128.140 UA2 - 82.215.128.141 PROXY - 82.215.130.161
3(38040) udp_rcv_loop: probing packet received from 82.215.128.140 50195 3(38040) SIP Request: 3(38040) method: <BYE> 3(38040) uri: sip:396006660009@82.215.128.140 3(38040) version: <SIP/2.0> 3(38040) parse_headers: flags=2 3(38040) Found param type 232, <branch> = <z9hG4bK2b3078b2d0c5e3bd>; state=16 3(38040) end of header reached, state=5 3(38040) parse_headers: Via found, flags=2 3(38040) parse_headers: this is the first via 3(38040) After parse_msg... 3(38040) preparing to run routing scripts... 3(38040) parse_headers: flags=100 3(38040) DEBUG: add_param: tag=bdb21d1b47a3e954 3(38040) DEBUG:parse_to:end of header reached, state=29 3(38040) DBUG:parse_to: display={"0104491009"}, ruri={sip:0104491009@dispatcher.plexia.com} 3(38040) DEBUG: get_hdr_field: <To> [74]; uri=[sip:0104491009@dispatcher.plexia.com] 3(38040) DEBUG: to body ["0104491009" sip:0104491009@dispatcher.plexia.com] 3(38040) get_hdr_field: cseq <CSeq>: <201> <BYE> 3(38040) DEBUG:maxfwd:is_maxfwd_present: value = 70 3(38040) DEBUG: add_param: tag=5539c21944091059 3(38040) DEBUG:parse_to:end of header reached, state=29 3(38040) DBUG:parse_to: display={}, ruri={sip:0104491002@dispatcher.plexia.com} 3(38040) DEBUG:avpops:dbstore_avps: 1 avps were stored 3(38040) DEBUG:avpops:dbstore_avps: 1 avps were stored 3(38040) RETURN CODE: <null> <null> 3(38040) avpops:ops_dbquery_avps: query [select value from usr_preferences where uuid='895e6709217a9c5c@82.215.128.140' and attribute='setup_time'] 3(38040) avpops:ops_dbquery_avps: query [select value from usr_preferences where uuid='895e6709217a9c5c@82.215.128.140' and attribute='connect_time'] 3(38040) avpops:ops_dbquery_avps: query [select value from usr_preferences where uuid='895e6709217a9c5c@82.215.128.140' and attribute='disconnect_time'] 3(38040) db_flags=3, flags=4 3(38040) DEBUG:avpops:load_avps: loaded avps = 1 3(38040) parse_headers: flags=200 3(38040) is_preloaded: No 3(38040) grep_sock_info - checking if host==us: 14==14 && [82.215.128.140] == [82.215.130.161] 3(38040) grep_sock_info - checking if port 5060 matches port 5060 3(38040) grep_sock_info - checking if host==us: 14==9 && [82.215.128.140] == [127.0.0.1] 3(38040) grep_sock_info - checking if port 5060 matches port 5060 3(38040) grep_sock_info - checking if host==us: 14==14 && [82.215.128.140] == [82.215.130.161] 3(38040) grep_sock_info - checking if port 5060 matches port 5060 3(38040) grep_sock_info - checking if host==us: 14==9 && [82.215.128.140] == [127.0.0.1] 3(38040) grep_sock_info - checking if port 5060 matches port 5060 3(38040) check_self: host != me 3(38040) grep_sock_info - checking if host==us: 14==14 && [82.215.130.161] == [82.215.130.161] 3(38040) grep_sock_info - checking if port 5060 matches port 5060 3(38040) after_loose: Topmost route URI: 'sip:82.215.130.161;lr=on;ftag=bdb21d1b47a3e954;vsf=AAAAAAMIBgQEDwcGAAlwXSkXGRIEAhwGGksCQhUUDBlHAkEOb20-' is me 3(38040) parse_headers: flags=200 3(38040) DEBUG: get_hdr_body : content_length=0 3(38040) found end of header 3(38040) find_next_route: No next Route HF found 3(38040) after_loose: No next URI found 3(38040) DBG:rr:run_rr_callbacks: callback id 0 entered 3(38040) DEBUG:uac:restore_from: getting 'vsf' Route param 3(38040) DEBUG:uac:restore_from: Route param is 'AAAAAAMIBgQEDwcGAAlwXSkXGRIEAhwGGksCQhUUDBlHAkEOb20-' (len=52) 3(38040) DEBUG:uac:restore_from: decoded uris are: new=[sip:396006660009@dispatcher.plexia.com] old=[sip:0104491009@dispatcher.plexia.com] 3(38040) DEBUG: t_check: msg id=2 global id=1 T start=0xffffffff 3(38040) parse_headers: flags=ffffffffffffffff 3(38040) parse_headers: flags=78 3(38040) t_lookup_request: start searching: hash=16278, isACK=0 3(38040) DEBUG: RFC3261 transaction matching failed 3(38040) DEBUG: t_lookup_request: no transaction found 3(38040) DEBUG: t_check: msg id=2 global id=2 T end=0x0 3(38040) parse_headers: flags=ffffffffffffffff 3(38040) DEBUG: t_newtran: msg id=2 , global msg id=2 , T on entrance=0x0 3(38040) parse_headers: flags=ffffffffffffffff 3(38040) parse_headers: flags=78 3(38040) t_lookup_request: start searching: hash=16278, isACK=0 3(38040) DEBUG: RFC3261 transaction matching failed 3(38040) DEBUG: t_lookup_request: no transaction found 3(38040) DBG: trans=0x28523c48, callback type 1, id 0 entered 3(38040) parse_headers: flags=58 3(38040) DEBUG: mk_proxy: doing DNS lookup... 3(38040) check_via_address(82.215.128.141, 82.215.128.141, 0) 3(38040) DEBUG: add_to_tail_of_timer[4]: 0x28523d64 3(38040) DEBUG: add_to_tail_of_timer[0]: 0x28523d74 3(38040) SER: new transaction fwd'ed 3(38040) DEBUG:tm:UNREF_UNSAFE: after is 0 3(38040) DEBUG:destroy_avp_list: destroying list 0x0 3(38040) receive_msg: cleaning up 4(38041) SIP Reply (status): 4(38041) version: <SIP/2.0> 4(38041) status: <200> 4(38041) reason: <OK>