hello Daniel
we have seen today another case, unfortunately i dont have the sip trace
but i have the core
hope it's useful, it seems the same type of call with the request retransmisions and crashing after a 481 to the last retransmitted request is received
(gdb) bt #0 0x00000036e8a32925 in raise () from /lib64/libc.so.6 #1 0x00000036e8a34105 in abort () from /lib64/libc.so.6 #2 0x0000000000654c24 in qm_free (qmp=0x7fab0240a000, p=0x7fabc3405258, file=0x7fabc258cd86 "tm: h_table.c", func=0x7fabc258d070 "free_cell_helper", line=187, mname=0x7fabc258c780 "tm") at core/mem/q_malloc.c:471 #3 0x00007fabc24bbf70 in free_cell_helper (dead_cell=0x7fab09d46d58, silent=0, fname=0x7fabc259da80 "timer.c", fline=651) at h_table.c:187 #4 0x00007fabc2508148 in wait_handler (ti=1191213061, wait_tl=0x7fab09d46dd8, data=0x7fab09d46d58) at timer.c:651 #5 0x0000000000629578 in timer_list_expire (t=1191213061, h=0x7fab02488dc0, slow_l=0x7fab0248a278, slow_mark=22824) at core/timer.c:874 #6 0x00000000006299d4 in timer_handler () at core/timer.c:939 #7 0x0000000000629e73 in timer_main () at core/timer.c:978 #8 0x0000000000422d4e in main_loop () at main.c:1690 #9 0x0000000000429732 in main (argc=13, argv=0x7fff08856238) at main.c:2639 (gdb) frame 4 #4 0x00007fabc2508148 in wait_handler (ti=1191213061, wait_tl=0x7fab09d46dd8, data=0x7fab09d46d58) at timer.c:651 651 UNREF_FREE(p_cell); (gdb) info locals p_cell = 0x7fab09d46d58 ret = 1 (gdb) p *p_cell $1 = {next_c = 0x0, prev_c = 0x0, hash_index = 46289, label = 120110834, flags = 4132, nr_of_outgoings = 2, ref_count = {val = 0}, from = { s = 0x7fab0aeef8f9 "From: sip:+2917120052@89.221.46.77;user=phone;tag=SDee0r999-2aabeeae-001e-018f-0000-0000\r\nCall-ID: 4d69d51a-4b78-412f-bd72-114e841a6773\r\nCSeq: 121082247 BYE\r\nMax-Forwards: 68\r\nReason: Q.850; cause=1"..., len = 92}, callid = { s = 0x7fab0aeef955 "Call-ID: 4d69d51a-4b78-412f-bd72-114e841a6773\r\nCSeq: 121082247 BYE\r\nMax-Forwards: 68\r\nReason: Q.850; cause=16\r\nContent-Length: 0\r\nRoute: sip:200.200.200.176;lr=on;ftag=te9m1e81p4SQp;did=7cc.f229\r\n\r\n", len = 47}, cseq_n = {s = 0x7fab0aeef984 "CSeq: 121082247 BYE\r\nMax-Forwards: 68\r\nReason: Q.850; cause=16\r\nContent-Length: 0\r\nRoute: sip:200.200.200.176;lr=on;ftag=te9m1e81p4SQp;did=7cc.f229\r\n\r\n", len = 15}, to = { s = 0x7fab0aeef893 "To: "+525768760155" sip:+525768760155@200.200.200.176;user=phone;noa=international;tag=te9m1e81p4SQp\r\nFrom: sip:+2917120052@89.221.46.77;user=phone;tag=SDee0r999-2aabeeae-001e-018f-0000-0000\r\nCall-I"..., len = 102}, method = { s = 0x7fab0aeef810 "BYE sip:525768760155@100.100.100.166:5080 SIP/2.0\r\nVia: SIP/2.0/UDP 89.221.46.77:5060;branch=z9hG4bKdjs2la00d06jtanp6sp0sd7od2p32.1\r\nTo: "+525768760155" <sip:+525768760155@200.200.200.176;user=phone;noa=i"..., len = 3}, tmcb_hl = {first = 0x7fab028ecf60, reg_types = 131714}, wait_timer = {next = 0x0, prev = 0x0, expire = 1191213061, initial_timeout = 80, data = 0x7fab09d46d58, f = 0x7fabc2508097 <wait_handler>, flags = 513, slow_idx = 0}, uas = {request = 0x7fab0aeef120, end_request = 0x7fab0aef01c8 "\300\300\300\300", response = {activ_type = 481, flags = 128, t_active = 0 '\000', branch = 0, buffer_len = 551, buffer = 0x7fab095c41d0 "SIP/2.0 481 Call Does Not Exist\r\nVia: SIP/2.0/UDP 89.221.46.77:5060;branch=z9hG4bKdjs2la00d06jtanp6sp0sd7od2p32.1\r\nFrom: sip:+2917120052@89.221.46.77;user=phone;tag=SDee0r999-2aabeeae-001e-018f-0000"..., my_T = 0x7fab09d46d58, timer = {next = 0x0, prev = 0x0, expire = 0, initial_timeout = 0, data = 0x0, f = 0x7fabc2507b4b <retr_buf_handler>, flags = 0, slow_idx = 0}, dst = {send_sock = 0x7fabc30abb78, to = {s = { sa_family = 2, sa_data = "\023\304Y\335.M\000\000\000\000\000\000\000"}, sin = {sin_family = 2, sin_port = 50195, sin_addr = {s_addr = 1294916953}, sin_zero = "\000\000\000\000\000\000\000"}, sin6 = {sin6_family = 2, sin6_port = 50195, sin6_flowinfo = 1294916953, sin6_addr = {__in6_u = {__u6_addr8 = '\000' <repeats 15 times>, __u6_addr16 = {0, 0, 0, 0, 0, 0, 0, 0}, __u6_addr32 = {0, 0, 0, 0}}}, sin6_scope_id = 0}}, id = 0, proto = 1 '\001', send_flags = {f = 0 '\000', blst_imask = 0 '\000'}}, retr_expire = 0, fr_expire = 0}, local_totag = {s = 0x0, len = 0}, cancel_reas = 0x0, status = 481}, uac = 0x7fab09d46f60, async_backup = { backup_route = 1, backup_branch = 4294967295, blind_uac = 0, ruri_new = 1}, fwded_totags = 0x0, uri_avps_from = 0x0, uri_avps_to = 0x0, user_avps_from = 0x0, user_avps_to = 0x0, domain_avps_from = 0x0, domain_avps_to = 0x0, xavps_list = 0x0, reply_mutex = {val = 0}, reply_locker_pid = {val = 0}, reply_rec_lock_level = 0, fr_timeout = 480, fr_inv_timeout = 1920, rt_t1_timeout_ms = 650, rt_t2_timeout_ms = 4000, end_of_life = 1191213094, relayed_reply_branch = 1, on_failure = 0, on_branch_failure = 0, on_reply = 0, on_branch = 0, on_branch_delayed = 0, md5 = 0x7fab09d46d58 ""} (gdb) frame 3 #3 0x00007fabc24bbf70 in free_cell_helper (dead_cell=0x7fab09d46d58, silent=0, fname=0x7fabc259da80 "timer.c", fline=651) at h_table.c:187 187 sip_msg_free_unsafe(rpl); (gdb) info locals b = 0x0 i = 1 rpl = 0x7fabc3404fc0 tt = 0x0 foo = 0x7fab02609330 cbs = 0x0 cbs_tmp = 0x7fab02f8f160 __FUNCTION__ = "free_cell_helper" (gdb) p *rpl $2 = {id = 3275772056, pid = 32683, tval = {tv_sec = 320, tv_usec = 140375688591576}, fwd_send_flags = {f = 2 '\002', blst_imask = 0 '\000'}, rpl_send_flags = {f = 0 '\000', blst_imask = 0 '\000'}, first_line = {type = 2116, flags = -16723, len = 32683, u = {request = {method = {s = 0x7 <Address 0x7 out of bounds>, len = 0}, uri = {s = 0x0, len = 1}, version = {s = 0x8381 <Address 0x8381 out of bounds>, len = -1022510864}, method_value = 0}, reply = {version = {s = 0x7 <Address 0x7 out of bounds>, len = 0}, status = {s = 0x0, len = 1}, reason = {s = 0x8381 <Address 0x8381 out of bounds>, len = -1022510864}, statuscode = 0}}}, via1 = 0x0, via2 = 0x7fabc3405038, headers = 0x7fff08852000, last_header = 0x1, parsed_flag = 140375615146059, h_via1 = 0x2, h_via2 = 0x7fabbead084d, callid = 0x8, to = 0xa00000002, cseq = 0x0, from = 0x7fabc30db8f0, contact = 0x0, maxforwards = 0x0, route = 0x7fabc3405258, record_route = 0x7fff08852000, content_type = 0x0, content_length = 0x0, authorization = 0x0, expires = 0x0, proxy_auth = 0x0, supported = 0x0, require = 0x0, proxy_require = 0x0, unsupported = 0x0, allow = 0x0, event = 0x0, accept = 0x0, accept_language = 0x0, organization = 0x0, priority = 0x0, subject = 0x0, user_agent = 0x0, server = 0x0, content_disposition = 0x0, diversion = 0x0, rpid = 0x0, refer_to = 0x0, session_expires = 0x0, min_se = 0x0, sipifmatch = 0x0, subscription_state = 0x0, date = 0x0, identity = 0x0, identity_info = 0x0, pai = 0x0, ppi = 0x0, path = 0x0, privacy = 0x0, min_expires = 0x0, body = 0x0, eoh = 0x0, unparsed = 0x0, rcv = {src_ip = {af = 0, len = 0, u = {addrl = {0, 0}, addr32 = {0, 0, 0, 0}, addr16 = {0, 0, 0, 0, 0, 0, 0, 0}, addr = '\000' <repeats 15 times>}}, dst_ip = {af = 3233857728, len = 0, u = {addrl = {2882400237, 0}, addr32 = {2882400237, 0, 0, 0}, addr16 = {61421, 43981, 0, 0, 0, 0, 0, 0}, addr = "\355\357ͫ", '\000' <repeats 11 times>}}, src_port = 0, dst_port = 0, proto_reserved1 = 0, proto_reserved2 = 536, src_su = {s = { sa_family = 0, sa_data = "\000\000 \266\rë\177\000\000\030\002\000"}, sin = {sin_family = 0, sin_port = 0, sin_addr = {s_addr = 3272455712}, sin_zero = "\253\177\000\000\030\002\000"}, sin6 = {sin6_family = 0, sin6_port = 0, sin6_flowinfo = 3272455712, sin6_addr = {__in6_u = {__u6_addr8 = "\253\177\000\000\030\002\000\000\000\000\000\000\210T@", <incomplete sequence \303>, __u6_addr16 = {32683, 0, 536, 0, 0, 0, 21640, 49984}, __u6_addr32 = {32683, 536, 0, 3275773064}}}, sin6_scope_id = 32683}}, bind_address = 0x7fabbe8bebb0, proto = 32 ' '}, buf = 0x7fabbe8beba6 "rtpengine", len = 139, new_uri = { s = 0xf0f0f0f0 <Address 0xf0f0f0f0 out of bounds>, len = -1019194352}, dst_uri = {s = 0x48 <Address 0x48 out of bounds>, len = -1019195456}, parsed_uri_ok = 4, parsed_uri = {user = {s = 0x7fabbe8beba2 "d", len = 1}, passwd = {s = 0x7fabbe8beba0 "e", len = 1}, host = {s = 0x360000000d <Address 0x360000000d out of bounds>, len = 1}, port = {s = 0x7fabc30db8f0 "\004", len = -1019194448}, params = {s = 0x7fabc3405658 "\002", len = -1019193512}, sip_params = {s = 0x7fff08852000 "\260\305@ë\177", len = 0}, headers = {s = 0x0, len = 0}, port_no = 0, proto = 0, type = ERROR_URI_T, flags = 0, transport = {s = 0x0, len = 0}, ttl = { s = 0x7fabc3405538 "\001", len = 0}, user_param = {s = 0x0, len = 0}, maddr = {s = 0x0, len = 0}, method = {s = 0x0, len = 0}, lr = {s = 0x7fabc34055f8 "\001", len = 0}, r2 = {s = 0x7fabc34053b0 "\001", len = 0}, gr = { s = 0x0, len = 0}, transport_val = {s = 0x0, len = 0}, ttl_val = {s = 0x0, len = 0}, user_param_val = {s = 0x0, len = 0}, maddr_val = {s = 0x0, len = 0}, method_val = {s = 0x0, len = 0}, lr_val = { s = 0x1 <Address 0x1 out of bounds>, len = -1095956394}, r2_val = {s = 0x2 <Address 0x2 out of bounds>, len = -1095956392}, gr_val = {s = 0x6 <Address 0x6 out of bounds>, len = 2}}, parsed_orig_ruri_ok = 0, parsed_orig_ruri = {user = {s = 0x7fabc3405258 "\004", len = 0}, passwd = {s = 0x0, len = -1019194152}, host = {s = 0x7fff08852000 "\260\305@ë\177", len = 0}, port = {s = 0x0, len = 0}, params = {s = 0x0, len = 0}, sip_params = {s = 0x0, len = 0}, headers = {s = 0x0, len = 0}, port_no = 49344, proto = 49344, type = ERROR_URI_T, flags = 2882400237, transport = {s = 0x0, len = 0}, ttl = {s = 0x218 <Address 0x218 out of bounds>, len = -1019195512}, user_param = {s = 0x218 <Address 0x218 out of bounds>, len = -1019193592}, maddr = {s = 0x7fabbe8bebb0 "rtpengine: bencode.c", len = -1098125280}, method = {s = 0x7fabbe8beba6 "rtpengine", len = 139}, lr = {s = 0xf0f0f0f0 <Address 0xf0f0f0f0 out of bounds>, len = -1019193672}, r2 = {s = 0x20 <Address 0x20 out of bounds>, len = -1019194816}, gr = {s = 0x1 <Address 0x1 out of bounds>, len = -1095956386}, transport_val = { s = 0x2 <Address 0x2 out of bounds>, len = -1095956384}, ttl_val = {s = 0x4 <Address 0x4 out of bounds>, len = 2}, user_param_val = {s = 0x0, len = -1019194792}, maddr_val = {s = 0x0, len = 0}, method_val = { s = 0x7fabc3405538 "\001", len = 142942208}, lr_val = {s = 0x1 <Address 0x1 out of bounds>, len = -1095956380}, r2_val = {s = 0x2 <Address 0x2 out of bounds>, len = -1095956378}, gr_val = { s = 0x7 <Address 0x7 out of bounds>, len = 2}}, add_rm = 0x0, body_lumps = 0x7fabc3405258, reply_lump = 0x0, add_to_branch_s = "\000\000\000\000\000\000\000\000\230U@ë\177\000\000\000 \205\b\377\177\000\000\001\000\000\000\000\000\000\000m\b\255\276\253\177\000\000\003\000\000\000\000\000\000\000p\b\255\276\253\177\000\000\r",
add_to_branch_len = 0, hash_index = 2, msg_flags = 16, flags = 0, set_global_address = {s = 0x7fabc3405258 "\004", len = 0}, set_global_port = {s = 0x0, len = -1019193864}, force_send_socket = 0x7fff08852000, path_vec = { s = 0x1 <Address 0x1 out of bounds>, len = -1095956355}, instance = {s = 0x2 <Address 0x2 out of bounds>, len = -1095956353}, reg_id = 4, ruid = {s = 0x600000002 <Address 0x600000002 out of bounds>, len = 0}, location_ua = { s = 0x7fabc3405258 "\004", len = 0}, ldv = {flow = {decoded = 0, rcv = {src_ip = {af = 3275773528, len = 32683, u = {addrl = {140733336330240, 2}, addr32 = {142942208, 32767, 2, 0}, addr16 = {8192, 2181, 32767, 0, 2, 0, 0, 0}, addr = "\000 \205\b\377\177\000\000\002\000\000\000\000\000\000"}}, dst_ip = {af = 3199010947, len = 32683, u = {addrl = {7, 0}, addr32 = {7, 0, 0, 0}, addr16 = {7, 0, 0, 0, 0, 0, 0, 0}, addr = "\a", '\000' <repeats 14 times>}}, src_port = 0, dst_port = 0, proto_reserved1 = 0, proto_reserved2 = 1, src_su = {s = {sa_family = 7, sa_data = "\000\000\273\203\000\000\000\000\000\000XR@", <incomplete sequence \303>}, sin = {sin_family = 7, sin_port = 0, sin_addr = {s_addr = 33723}, sin_zero = "\000\000\000\000XR@", <incomplete sequence \303>}, sin6 = {sin6_family = 7, sin6_port = 0, sin6_flowinfo = 33723, sin6_addr = {__in6_u = {__u6_addr8 = "\000\000\000\000XR@ë\177\000\000\000\000\000", __u6_addr16 = {0, 0, 21080, 49984, 32683, 0, 0, 0}, __u6_addr32 = {0, 3275772504, 32683, 0}}}, sin6_scope_id = 0}}, bind_address = 0x0, proto = 0 '\000'}}}}
best regards
david
On 02/04/18 09:33, David Escartin wrote:
Hello,
it is in my to-do list for these days to analyze this report, I got the traces, so for the moment I have all I need.
Cheers, Daniel
On 04.04.18 16:47, David Escartin wrote: