Hi,
as I saw in the log, the FROM restoring in BYE works properly, so
RR/Route processing is fine. Are you sure you enabled the accounting for
BYE?
just in case, I added some more debug messages about this on cvs -
please update and see the output. You should get:
DBUG:acc:acc_onreq: UPSTREAM req detected -> flaging it
and
DBUG:acc:fmt2strar: UPSTREAM flag set -> swap F/T
regards,
bogdan
tele wrote:
I've also tried with call UA --> UA that pass only from proxy and
there is the same problem on accounting.
To/From not swapped ,if the callee hangup phone, before send
accounting and yes there is RR present in the BYE message.
you can find attached here the full dump.
UA1 - 82.215.128.140
UA2 - 82.215.128.141
PROXY - 82.215.130.161
3(38040) udp_rcv_loop: probing packet received from 82.215.128.140 50195
3(38040) SIP Request:
3(38040) method: <BYE>
3(38040) uri: <sip:396006660009@82.215.128.140>
3(38040) version: <SIP/2.0>
3(38040) parse_headers: flags=2
3(38040) Found param type 232, <branch> = <z9hG4bK2b3078b2d0c5e3bd>;
state=16
3(38040) end of header reached, state=5
3(38040) parse_headers: Via found, flags=2
3(38040) parse_headers: this is the first via
3(38040) After parse_msg...
3(38040) preparing to run routing scripts...
3(38040) parse_headers: flags=100
3(38040) DEBUG: add_param: tag=bdb21d1b47a3e954
3(38040) DEBUG:parse_to:end of header reached, state=29
3(38040) DBUG:parse_to: display={"0104491009"},
ruri={sip:0104491009@dispatcher.plexia.com}
3(38040) DEBUG: get_hdr_field: <To> [74];
uri=[sip:0104491009@dispatcher.plexia.com]
3(38040) DEBUG: to body ["0104491009"
<sip:0104491009@dispatcher.plexia.com>]
3(38040) get_hdr_field: cseq <CSeq>: <201> <BYE>
3(38040) DEBUG:maxfwd:is_maxfwd_present: value = 70
3(38040) DEBUG: add_param: tag=5539c21944091059
3(38040) DEBUG:parse_to:end of header reached, state=29
3(38040) DBUG:parse_to: display={},
ruri={sip:0104491002@dispatcher.plexia.com}
3(38040) DEBUG:avpops:dbstore_avps: 1 avps were stored
3(38040) DEBUG:avpops:dbstore_avps: 1 avps were stored
3(38040) RETURN CODE: <null> <null>
3(38040) avpops:ops_dbquery_avps: query [select value from
usr_preferences where uuid='895e6709217a9c5c(a)82.215.128.140' and
attribute='setup_time']
3(38040) avpops:ops_dbquery_avps: query [select value from
usr_preferences where uuid='895e6709217a9c5c(a)82.215.128.140' and
attribute='connect_time']
3(38040) avpops:ops_dbquery_avps: query [select value from
usr_preferences where uuid='895e6709217a9c5c(a)82.215.128.140' and
attribute='disconnect_time']
3(38040) db_flags=3, flags=4
3(38040) DEBUG:avpops:load_avps: loaded avps = 1
3(38040) parse_headers: flags=200
3(38040) is_preloaded: No
3(38040) grep_sock_info - checking if host==us: 14==14 &&
[82.215.128.140] == [82.215.130.161]
3(38040) grep_sock_info - checking if port 5060 matches port 5060
3(38040) grep_sock_info - checking if host==us: 14==9 &&
[82.215.128.140] == [127.0.0.1]
3(38040) grep_sock_info - checking if port 5060 matches port 5060
3(38040) grep_sock_info - checking if host==us: 14==14 &&
[82.215.128.140] == [82.215.130.161]
3(38040) grep_sock_info - checking if port 5060 matches port 5060
3(38040) grep_sock_info - checking if host==us: 14==9 &&
[82.215.128.140] == [127.0.0.1]
3(38040) grep_sock_info - checking if port 5060 matches port 5060
3(38040) check_self: host != me
3(38040) grep_sock_info - checking if host==us: 14==14 &&
[82.215.130.161] == [82.215.130.161]
3(38040) grep_sock_info - checking if port 5060 matches port 5060
3(38040) after_loose: Topmost route URI:
'sip:82.215.130.161;lr=on;ftag=bdb21d1b47a3e954;vsf=AAAAAAMIBgQEDwcGAAlwXSkXGRIEAhwGGksCQhUUDBlHAkEOb20-'
is me
3(38040) parse_headers: flags=200
3(38040) DEBUG: get_hdr_body : content_length=0
3(38040) found end of header
3(38040) find_next_route: No next Route HF found
3(38040) after_loose: No next URI found
3(38040) DBG:rr:run_rr_callbacks: callback id 0 entered
3(38040) DEBUG:uac:restore_from: getting 'vsf' Route param
3(38040) DEBUG:uac:restore_from: Route param is
'AAAAAAMIBgQEDwcGAAlwXSkXGRIEAhwGGksCQhUUDBlHAkEOb20-' (len=52)
3(38040) DEBUG:uac:restore_from: decoded uris are:
new=[sip:396006660009@dispatcher.plexia.com]
old=[sip:0104491009@dispatcher.plexia.com]
3(38040) DEBUG: t_check: msg id=2 global id=1 T start=0xffffffff
3(38040) parse_headers: flags=ffffffffffffffff
3(38040) parse_headers: flags=78
3(38040) t_lookup_request: start searching: hash=16278, isACK=0
3(38040) DEBUG: RFC3261 transaction matching failed
3(38040) DEBUG: t_lookup_request: no transaction found
3(38040) DEBUG: t_check: msg id=2 global id=2 T end=0x0
3(38040) parse_headers: flags=ffffffffffffffff
3(38040) DEBUG: t_newtran: msg id=2 , global msg id=2 , T on entrance=0x0
3(38040) parse_headers: flags=ffffffffffffffff
3(38040) parse_headers: flags=78
3(38040) t_lookup_request: start searching: hash=16278, isACK=0
3(38040) DEBUG: RFC3261 transaction matching failed
3(38040) DEBUG: t_lookup_request: no transaction found
3(38040) DBG: trans=0x28523c48, callback type 1, id 0 entered
3(38040) parse_headers: flags=58
3(38040) DEBUG: mk_proxy: doing DNS lookup...
3(38040) check_via_address(82.215.128.141, 82.215.128.141, 0)
3(38040) DEBUG: add_to_tail_of_timer[4]: 0x28523d64
3(38040) DEBUG: add_to_tail_of_timer[0]: 0x28523d74
3(38040) SER: new transaction fwd'ed
3(38040) DEBUG:tm:UNREF_UNSAFE: after is 0
3(38040) DEBUG:destroy_avp_list: destroying list 0x0
3(38040) receive_msg: cleaning up
4(38041) SIP Reply (status):
4(38041) version: <SIP/2.0>
4(38041) status: <200>
4(38041) reason: <OK>