[OpenSIPS-Users] opensips+rtpproxy strange locks

nick at uni-petrol.com nick at uni-petrol.com
Fri May 13 06:35:38 CEST 2011


Dear All!

opensips + rtpproxy latest from trunk.

I catch strange opensips locks.

Opensips stop responding and output to syslog only these errors:

May 10 13:21:47 /usr/sbin/opensips[3662]: 
ERROR:rtpproxy:send_rtpp_command: proxy :22222> does not respond, 
disable it
May 10 13:21:48 /usr/sbin/opensips[3661]: 
ERROR:rtpproxy:send_rtpp_command: proxy :22222> does not respond, 
disable it
May 10 13:22:05 /usr/sbin/opensips[3660]: 
ERROR:rtpproxy:send_rtpp_command: proxy :22222> does not respond, 
disable it
...
May 10 13:29:22 /usr/sbin/opensips[5428]: 
ERROR:rtpproxy:send_rtpp_command: proxy :22222> does not respond, 
disable it

I tried increase debug level through fifo but verbosity don't increase.

In rtpproxy in debug mode I have these messages:

DBUG:handle_command: received command "3660_595 Uc8,0,18,4,3,110,97,101 
0e70ed1b54b0727d20297cdf7da7ae33@:5060 12290 as6c1cbf1f;1"
INFO:handle_command: new session 
0e70ed1b54b0727d20297cdf7da7ae33@:5060, tag as6c1cbf1f;1 requested, type 
strong
INFO:handle_command: new session on a port 13184 created, tag 
as6c1cbf1f;1
INFO:handle_command: pre-filling caller's address with :12290
DBUG:doreply: sending reply "3660_595 13184
"
DBUG:handle_command: received command "3660_596 Uc0,8,18,3,101 
0e70ed1b54b0727d20297cdf7da7ae33@:5060 16496 as1a95022b;1 as6c1cbf1f;1"
INFO:handle_command: adding strong flag to existing session, new=1/0/0
INFO:handle_command: lookup on ports 13184/18324, session timer 
restarted
INFO:handle_command: pre-filling callee's address with :16496
DBUG:doreply: sending reply "3660_596 18324
"
DBUG:handle_command: received command "3662_610 Uc0,8,18,3,101 
0e70ed1b54b0727d20297cdf7da7ae33@:5060 16496 as1a95022b;1 as6c1cbf1f;1"
INFO:handle_command: adding strong flag to existing session, new=1/0/0
INFO:handle_command: lookup on ports 13184/18324, session timer 
restarted
DBUG:doreply: sending reply "3662_610 18324
"
DBUG:handle_command: received command "3661_605 Uc0,8,18,3,101 
0e70ed1b54b0727d20297cdf7da7ae33@:5060 16496 as1a95022b;1 as6c1cbf1f;1"
INFO:handle_command: adding strong flag to existing session, new=1/0/0
INFO:handle_command: lookup on ports 13184/18324, session timer 
restarted
DBUG:doreply: sending reply "3661_605 18324

...

"
DBUG:handle_command: received command "3661_607 Uc0,8,18,3,101 
0e70ed1b54b0727d20297cdf7da7ae33@:5060 16496 as1a95022b;1 as6c1cbf1f;1"
INFO:handle_command: adding strong flag to existing session, new=1/0/0
INFO:handle_command: lookup on ports 13184/18324, session timer 
restarted
DBUG:doreply: sending reply "3661_607 18324
"
DBUG:handle_command: received command "3662_613 Uc0,8,18,3,101 
0e70ed1b54b0727d20297cdf7da7ae33@:5060 16496 as1a95022b;1 as6c1cbf1f;1"
INFO:handle_command: adding strong flag to existing session, new=1/0/0
INFO:handle_command: lookup on ports 13184/18324, session timer 
restarted
DBUG:doreply: sending reply "3662_613 18324
"
DBUG:handle_command: received command "3660_599 Uc0,8,18,3,101 
0e70ed1b54b0727d20297cdf7da7ae33@:5060 16496 as1a95022b;1 as6c1cbf1f;1"
INFO:handle_command: adding strong flag to existing session, new=1/0/0
INFO:handle_command: lookup on ports 13184/18324, session timer 
restarted
DBUG:doreply: sending reply "3660_599 18324




More information about the Users mailing list