I'm using latest CVS version of asterisk and I have one problem - I start ser this way: ser -dddddddddddddddddddddddddd So when user is calling another user there is INVITE - everything is ok. But when user hang up call is finished but I don't see BYE... So this way I can't use acc module to calculate call time. Somebody can help me? Thanks in advance.
P.S.
root@sip:/var/www/sw# 9(12166) SIP Request: 9(12166) method: <INVITE> 9(12166) uri: sip:piem@192.168.2.14 9(12166) version: <SIP/2.0> 9(12166) parse_headers: flags=1 9(12166) Found param type 235, <rport> = <n/a>; state=6 9(12166) Found param type 232, <branch> = <z9hG4bK05DA6E2E759C4BFEBA57195FC350EE17>; state=16 9(12166) end of header reached, state=5 9(12166) parse_headers: Via found, flags=1 9(12166) parse_headers: this is the first via 9(12166) After parse_msg... 9(12166) preparing to run routing scripts... 9(12166) parse_headers: flags=128 9(12166) end of header reached, state=9 9(12166) DEBUG: get_hdr_field: <To> [25]; uri=[sip:piem@192.168.2.14] 9(12166) DEBUG: to body [sip:piem@192.168.2.14 ] 9(12166) get_hdr_field: cseq <CSeq>: <45242> <INVITE> 9(12166) DEBUG:maxfwd:is_maxfwd_present: value = 70 9(12166) DBG:maxfwd:process_maxfwd_header: value 70 decreased to 16 9(12166) parse_headers: flags=256 9(12166) DEBUG: get_hdr_body : content_length=295 9(12166) found end of header 9(12166) find_first_route(): No Route headers found 9(12166) loose_route(): There is no Route HF 9(12166) check_self - checking if host==us: 12==12 && [192.168.2.14] == [192.168.2.14] 9(12166) check_self - checking if port 5060 matches port 5060 9(12166) rewrite(): Rewriting Request-URI with 'sip:piem@192.168.2.2:5060' 9(12166) DEBUG: t_newtran: msg id=5 , global msg id=3 , T on entrance=0xffffffff 9(12166) parse_headers: flags=-1 9(12166) parse_headers: flags=60 9(12166) t_lookup_request: start searching: hash=23406, isACK=0 9(12166) DEBUG: RFC3261 transaction matching failed 9(12166) DEBUG: t_lookup_request: no transaction found 9(12166) DEBUG: add_param: tag=4060601702 9(12166) end of header reached, state=29 9(12166) DBG: trans=0x4043e0f8, callback type 1, id 0 entered 9(12166) SER: new INVITE 9(12166) parse_headers: flags=-1 9(12166) check_via_address(192.168.2.111, 192.168.2.111, 3) 9(12166) WARNING:vqm_resize: resize(0) called 9(12166) DEBUG: reply sent out. buf=0x80ff2a0: SIP/2.0 1..., shmem=0x4043f9f0: SIP/2.0 1 9(12166) DEBUG: _reply_light: finished 9(12166) DEBUG: mk_proxy: doing DNS lookup... 9(12166) check_via_address(192.168.2.111, 192.168.2.111, 3) 9(12166) DEBUG: add_timer_unsafe[4]: 0x4043e210 9(12166) DEBUG: add_timer_unsafe[0]: 0x4043e220 9(12166) SER: new transaction fwd'ed 9(12166) parse_headers: flags=44 9(12166) DEBUG:destroy_avp_list: destroying list (nil) 9(12166) receive_msg: cleaning up 4(12158) SIP Reply (status): 4(12158) version: <SIP/2.0> 4(12158) status: <100> 4(12158) reason: <Trying> 4(12158) parse_headers: flags=1 4(12158) Found param type 232, <branch> = <z9hG4bKe6b5.2905a5f7.0>; state=16 4(12158) end of header reached, state=5 4(12158) parse_headers: Via found, flags=1 4(12158) parse_headers: this is the first via 4(12158) After parse_msg... 4(12158) forward_reply: found module tm, passing reply to it 4(12158) DEBUG: t_check: msg id=2 global id=0 T start=0xffffffff 4(12158) parse_headers: flags=17 4(12158) Found param type 235, <rport> = <5060>; state=6 4(12158) Found param type 232, <branch> = <z9hG4bK05DA6E2E759C4BFEBA57195FC350EE17>; state=16 4(12158) end of header reached, state=5 4(12158) parse_headers: Via found, flags=17 4(12158) parse_headers: this is the second via 4(12158) DEBUG: add_param: tag=2313100209 4(12158) end of header reached, state=29 4(12158) DEBUG: get_hdr_field: <To> [40]; uri=[sip:piem@192.168.2.14] 4(12158) DEBUG: to body [sip:piem@192.168.2.14] 4(12158) get_hdr_field: cseq <CSeq>: <45242> <INVITE> 4(12158) parse_headers: flags=4 4(12158) DEBUG: t_reply_matching: hash 23406 label 2136625298 branch 0 4(12158) DEBUG: t_reply_matching: reply matched (T=0x4043e0f8)! 4(12158) DEBUG: t_check: msg id=2 global id=2 T end=0x4043e0f8 4(12158) DEBUG: reply_received: org. status uas=100, uac[0]=0 local=0 is_invite=1) 4(12158) ->>>>>>>>> T_code=100, new_code=100 4(12158) DEBUG: relay_reply: branch=0, save=0, relay=-1 4(12158) DEBUG: add_timer_unsafe[1]: 0x4043e220 4(12158) DEBUG:destroy_avp_list: destroying list (nil) 4(12158) receive_msg: cleaning up 4(12158) SIP Reply (status): 4(12158) version: <SIP/2.0> 4(12158) status: <180> 4(12158) reason: <Ringing> 4(12158) parse_headers: flags=1 4(12158) Found param type 232, <branch> = <z9hG4bKe6b5.2905a5f7.0>; state=16 4(12158) end of header reached, state=5 4(12158) parse_headers: Via found, flags=1 4(12158) parse_headers: this is the first via 4(12158) After parse_msg... 4(12158) forward_reply: found module tm, passing reply to it 4(12158) DEBUG: t_check: msg id=3 global id=2 T start=0xffffffff 4(12158) parse_headers: flags=17 4(12158) Found param type 235, <rport> = <5060>; state=6 4(12158) Found param type 232, <branch> = <z9hG4bK05DA6E2E759C4BFEBA57195FC350EE17>; state=16 4(12158) end of header reached, state=5 4(12158) parse_headers: Via found, flags=17 4(12158) parse_headers: this is the second via 4(12158) DEBUG: add_param: tag=2313100209 4(12158) end of header reached, state=29 4(12158) DEBUG: get_hdr_field: <To> [40]; uri=[sip:piem@192.168.2.14] 4(12158) DEBUG: to body [sip:piem@192.168.2.14] 4(12158) get_hdr_field: cseq <CSeq>: <45242> <INVITE> 4(12158) parse_headers: flags=4 4(12158) DEBUG: t_reply_matching: hash 23406 label 2136625298 branch 0 4(12158) DEBUG: t_reply_matching: reply matched (T=0x4043e0f8)! 4(12158) DEBUG: t_check: msg id=3 global id=3 T end=0x4043e0f8 4(12158) DEBUG: reply_received: org. status uas=100, uac[0]=100 local=0 is_invite=1) 4(12158) ->>>>>>>>> T_code=100, new_code=180 4(12158) DEBUG: relay_reply: branch=0, save=0, relay=0 4(12158) old size: 438, new size: 377 4(12158) build_res_from_sip_res: copied size: orig:82, new: 21, rest: 356 msg= SIP/2.0 180 Ringing Via: SIP/2.0/UDP 192.168.2.111:5060;rport=5060;branch=z9hG4bK05DA6E2E759C4BFEBA57195FC350EE17 From: pi sip:pi@192.168.2.14;tag=4060601702 To: sip:piem@192.168.2.14;tag=2313100209 Contact: sip:piem@192.168.2.2:5060 Call-ID: B6387609-0B3E-4F5E-A9C2-BFFF87EF4F86@192.168.2.111 CSeq: 45242 INVITE Server: X-Lite release 1103m Content-Length: 0
4(12158) DEBUG: reply relayed. buf=0x80ff088: SIP/2.0 1..., shmem=0x4043f410: SIP/2.0 1 4(12158) DEBUG: add_timer_unsafe[1]: 0x4043e220 4(12158) DEBUG:destroy_avp_list: destroying list (nil) 4(12158) receive_msg: cleaning up 10(12171) DEBUG: timer routine:4,tl=0x4043e210 next=(nil) 8(12165) SIP Reply (status): 8(12165) version: <SIP/2.0> 8(12165) status: <200> 8(12165) reason: <Ok> 8(12165) parse_headers: flags=1 8(12165) Found param type 232, <branch> = <z9hG4bKe6b5.2905a5f7.0>; state=16 8(12165) end of header reached, state=5 8(12165) parse_headers: Via found, flags=1 8(12165) parse_headers: this is the first via 8(12165) After parse_msg... 8(12165) forward_reply: found module tm, passing reply to it 8(12165) DEBUG: t_check: msg id=4 global id=0 T start=0xffffffff 8(12165) parse_headers: flags=17 8(12165) Found param type 235, <rport> = <5060>; state=6 8(12165) Found param type 232, <branch> = <z9hG4bK05DA6E2E759C4BFEBA57195FC350EE17>; state=16 8(12165) end of header reached, state=5 8(12165) parse_headers: Via found, flags=17 8(12165) parse_headers: this is the second via 8(12165) DEBUG: add_param: tag=2313100209 8(12165) end of header reached, state=29 8(12165) DEBUG: get_hdr_field: <To> [40]; uri=[sip:piem@192.168.2.14] 8(12165) DEBUG: to body [sip:piem@192.168.2.14] 8(12165) get_hdr_field: cseq <CSeq>: <45242> <INVITE> 8(12165) parse_headers: flags=4 8(12165) DEBUG: t_reply_matching: hash 23406 label 2136625298 branch 0 8(12165) DEBUG: t_reply_matching: reply matched (T=0x4043e0f8)! 8(12165) parse_headers: flags=4 8(12165) DEBUG: t_check: msg id=4 global id=4 T end=0x4043e0f8 8(12165) DEBUG: reply_received: org. status uas=180, uac[0]=180 local=0 is_invite=1) 8(12165) ->>>>>>>>> T_code=180, new_code=200 8(12165) DEBUG: relay_reply: branch=0, save=0, relay=0 8(12165) old size: 735, new size: 674 8(12165) build_res_from_sip_res: copied size: orig:77, new: 16, rest: 658 msg= SIP/2.0 200 Ok Via: SIP/2.0/UDP 192.168.2.111:5060;rport=5060;branch=z9hG4bK05DA6E2E759C4BFEBA57195FC350EE17 From: pi sip:pi@192.168.2.14;tag=4060601702 To: sip:piem@192.168.2.14;tag=2313100209 Contact: sip:piem@192.168.2.2:5060 Call-ID: B6387609-0B3E-4F5E-A9C2-BFFF87EF4F86@192.168.2.111 CSeq: 45242 INVITE Content-Type: application/sdp Server: X-Lite release 1103m Content-Length: 269
v=0 o=piem 101970734 101978031 IN IP4 192.168.2.2 s=X-Lite c=IN IP4 192.168.2.2 t=0 0 m=audio 8000 RTP/AVP 8 3 98 97 101 a=rtpmap:8 pcma/8000 a=rtpmap:3 gsm/8000 a=rtpmap:98 iLBC/8000 a=rtpmap:97 speex/8000 a=rtpmap:101 telephone-event/8000 a=fmtp:101 0-15
8(12165) DEBUG: update_totag_set: new totag 8(12165) DEBUG: reply relayed. buf=0x80ff110: SIP/2.0 2..., shmem=0x4043f410: SIP/2.0 2 8(12165) DEBUG: cleanup_uac_timers: RETR/FR timers reset 8(12165) DEBUG: add_timer_unsafe[2]: 0x4043e140 8(12165) DEBUG:destroy_avp_list: destroying list (nil) 8(12165) receive_msg: cleaning up 10(12171) DEBUG: timer routine:1,tl=0x4043e220 next=(nil) 10(12171) DEBUG: timer routine:2,tl=0x4043e140 next=(nil) 10(12171) DEBUG: wait_handler : removing 0x4043e0f8 from table 10(12171) DEBUG: delete transaction 0x4043e0f8 10(12171) DEBUG: wait_handler : done
make sure you set the accounting flag for BYEs. For example, if you use record routing and in your config file you have:
if (loose_route()) { t_relay(); break; };
replace the block with:
if (loose_route()) { if (method=="BYE" /* | method=="..." */){ log (1, "Accounting flag on\n"); setflag(1); /* the flag value may be different in your config */ }; t_relay(); break; };
Daniel
On 09/28/04 15:30, Pavel Siderov wrote:
I'm using latest CVS version of asterisk and I have one problem - I start ser this way: ser -dddddddddddddddddddddddddd So when user is calling another user there is INVITE - everything is ok. But when user hang up call is finished but I don't see BYE... So this way I can't use acc module to calculate call time. Somebody can help me? Thanks in advance.
P.S.
root@sip:/var/www/sw mailto:root@sip:/var/www/sw# 9(12166) SIP Request: 9(12166) method: <INVITE> 9(12166) uri: sip:piem@192.168.2.14 9(12166) version: <SIP/2.0> 9(12166) parse_headers: flags=1 9(12166) Found param type 235, <rport> = <n/a>; state=6 9(12166) Found param type 232, <branch> = <z9hG4bK05DA6E2E759C4BFEBA57195FC350EE17>; state=16 9(12166) end of header reached, state=5 9(12166) parse_headers: Via found, flags=1 9(12166) parse_headers: this is the first via 9(12166) After parse_msg... 9(12166) preparing to run routing scripts... 9(12166) parse_headers: flags=128 9(12166) end of header reached, state=9 9(12166) DEBUG: get_hdr_field: <To> [25]; uri=[sip:piem@192.168.2.14] 9(12166) DEBUG: to body [sip:piem@192.168.2.14 ] 9(12166) get_hdr_field: cseq <CSeq>: <45242> <INVITE> 9(12166) DEBUG:maxfwd:is_maxfwd_present: value = 70 9(12166) DBG:maxfwd:process_maxfwd_header: value 70 decreased to 16 9(12166) parse_headers: flags=256 9(12166) DEBUG: get_hdr_body : content_length=295 9(12166) found end of header 9(12166) find_first_route(): No Route headers found 9(12166) loose_route(): There is no Route HF 9(12166) check_self - checking if host==us: 12==12 && [192.168.2.14] == [192.168.2.14] 9(12166) check_self - checking if port 5060 matches port 5060 9(12166) rewrite(): Rewriting Request-URI with 'sip:piem@192.168.2.2:5060' 9(12166) DEBUG: t_newtran: msg id=5 , global msg id=3 , T on entrance=0xffffffff 9(12166) parse_headers: flags=-1 9(12166) parse_headers: flags=60 9(12166) t_lookup_request: start searching: hash=23406, isACK=0 9(12166) DEBUG: RFC3261 transaction matching failed 9(12166) DEBUG: t_lookup_request: no transaction found 9(12166) DEBUG: add_param: tag=4060601702 9(12166) end of header reached, state=29 9(12166) DBG: trans=0x4043e0f8, callback type 1, id 0 entered 9(12166) SER: new INVITE 9(12166) parse_headers: flags=-1 9(12166) check_via_address(192.168.2.111, 192.168.2.111, 3) 9(12166) WARNING:vqm_resize: resize(0) called 9(12166) DEBUG: reply sent out. buf=0x80ff2a0: SIP/2.0 1..., shmem=0x4043f9f0: SIP/2.0 1 9(12166) DEBUG: _reply_light: finished 9(12166) DEBUG: mk_proxy: doing DNS lookup... 9(12166) check_via_address(192.168.2.111, 192.168.2.111, 3) 9(12166) DEBUG: add_timer_unsafe[4]: 0x4043e210 9(12166) DEBUG: add_timer_unsafe[0]: 0x4043e220 9(12166) SER: new transaction fwd'ed 9(12166) parse_headers: flags=44 9(12166) DEBUG:destroy_avp_list: destroying list (nil) 9(12166) receive_msg: cleaning up 4(12158) SIP Reply (status): 4(12158) version: <SIP/2.0> 4(12158) status: <100> 4(12158) reason: <Trying> 4(12158) parse_headers: flags=1 4(12158) Found param type 232, <branch> = <z9hG4bKe6b5.2905a5f7.0>; state=16 4(12158) end of header reached, state=5 4(12158) parse_headers: Via found, flags=1 4(12158) parse_headers: this is the first via 4(12158) After parse_msg... 4(12158) forward_reply: found module tm, passing reply to it 4(12158) DEBUG: t_check: msg id=2 global id=0 T start=0xffffffff 4(12158) parse_headers: flags=17 4(12158) Found param type 235, <rport> = <5060>; state=6 4(12158) Found param type 232, <branch> = <z9hG4bK05DA6E2E759C4BFEBA57195FC350EE17>; state=16 4(12158) end of header reached, state=5 4(12158) parse_headers: Via found, flags=17 4(12158) parse_headers: this is the second via 4(12158) DEBUG: add_param: tag=2313100209 4(12158) end of header reached, state=29 4(12158) DEBUG: get_hdr_field: <To> [40]; uri=[sip:piem@192.168.2.14] 4(12158) DEBUG: to body [sip:piem@192.168.2.14] 4(12158) get_hdr_field: cseq <CSeq>: <45242> <INVITE> 4(12158) parse_headers: flags=4 4(12158) DEBUG: t_reply_matching: hash 23406 label 2136625298 branch 0 4(12158) DEBUG: t_reply_matching: reply matched (T=0x4043e0f8)! 4(12158) DEBUG: t_check: msg id=2 global id=2 T end=0x4043e0f8 4(12158) DEBUG: reply_received: org. status uas=100, uac[0]=0 local=0 is_invite=1) 4(12158) ->>>>>>>>> T_code=100, new_code=100 4(12158) DEBUG: relay_reply: branch=0, save=0, relay=-1 4(12158) DEBUG: add_timer_unsafe[1]: 0x4043e220 4(12158) DEBUG:destroy_avp_list: destroying list (nil) 4(12158) receive_msg: cleaning up 4(12158) SIP Reply (status): 4(12158) version: <SIP/2.0> 4(12158) status: <180> 4(12158) reason: <Ringing> 4(12158) parse_headers: flags=1 4(12158) Found param type 232, <branch> = <z9hG4bKe6b5.2905a5f7.0>; state=16 4(12158) end of header reached, state=5 4(12158) parse_headers: Via found, flags=1 4(12158) parse_headers: this is the first via 4(12158) After parse_msg... 4(12158) forward_reply: found module tm, passing reply to it 4(12158) DEBUG: t_check: msg id=3 global id=2 T start=0xffffffff 4(12158) parse_headers: flags=17 4(12158) Found param type 235, <rport> = <5060>; state=6 4(12158) Found param type 232, <branch> = <z9hG4bK05DA6E2E759C4BFEBA57195FC350EE17>; state=16 4(12158) end of header reached, state=5 4(12158) parse_headers: Via found, flags=17 4(12158) parse_headers: this is the second via 4(12158) DEBUG: add_param: tag=2313100209 4(12158) end of header reached, state=29 4(12158) DEBUG: get_hdr_field: <To> [40]; uri=[sip:piem@192.168.2.14] 4(12158) DEBUG: to body [sip:piem@192.168.2.14] 4(12158) get_hdr_field: cseq <CSeq>: <45242> <INVITE> 4(12158) parse_headers: flags=4 4(12158) DEBUG: t_reply_matching: hash 23406 label 2136625298 branch 0 4(12158) DEBUG: t_reply_matching: reply matched (T=0x4043e0f8)! 4(12158) DEBUG: t_check: msg id=3 global id=3 T end=0x4043e0f8 4(12158) DEBUG: reply_received: org. status uas=100, uac[0]=100 local=0 is_invite=1) 4(12158) ->>>>>>>>> T_code=100, new_code=180 4(12158) DEBUG: relay_reply: branch=0, save=0, relay=0 4(12158) old size: 438, new size: 377 4(12158) build_res_from_sip_res: copied size: orig:82, new: 21, rest: 356 msg= SIP/2.0 180 Ringing Via: SIP/2.0/UDP 192.168.2.111:5060;rport=5060;branch=z9hG4bK05DA6E2E759C4BFEBA57195FC350EE17 From: pi sip:pi@192.168.2.14;tag=4060601702 To: sip:piem@192.168.2.14;tag=2313100209 Contact: sip:piem@192.168.2.2:5060 Call-ID: B6387609-0B3E-4F5E-A9C2-BFFF87EF4F86@192.168.2.111 mailto:B6387609-0B3E-4F5E-A9C2-BFFF87EF4F86@192.168.2.111 CSeq: 45242 INVITE Server: X-Lite release 1103m Content-Length: 0
4(12158) DEBUG: reply relayed. buf=0x80ff088: SIP/2.0 1..., shmem=0x4043f410: SIP/2.0 1 4(12158) DEBUG: add_timer_unsafe[1]: 0x4043e220 4(12158) DEBUG:destroy_avp_list: destroying list (nil) 4(12158) receive_msg: cleaning up 10(12171) DEBUG: timer routine:4,tl=0x4043e210 next=(nil) 8(12165) SIP Reply (status): 8(12165) version: <SIP/2.0> 8(12165) status: <200> 8(12165) reason: <Ok> 8(12165) parse_headers: flags=1 8(12165) Found param type 232, <branch> = <z9hG4bKe6b5.2905a5f7.0>; state=16 8(12165) end of header reached, state=5 8(12165) parse_headers: Via found, flags=1 8(12165) parse_headers: this is the first via 8(12165) After parse_msg... 8(12165) forward_reply: found module tm, passing reply to it 8(12165) DEBUG: t_check: msg id=4 global id=0 T start=0xffffffff 8(12165) parse_headers: flags=17 8(12165) Found param type 235, <rport> = <5060>; state=6 8(12165) Found param type 232, <branch> = <z9hG4bK05DA6E2E759C4BFEBA57195FC350EE17>; state=16 8(12165) end of header reached, state=5 8(12165) parse_headers: Via found, flags=17 8(12165) parse_headers: this is the second via 8(12165) DEBUG: add_param: tag=2313100209 8(12165) end of header reached, state=29 8(12165) DEBUG: get_hdr_field: <To> [40]; uri=[sip:piem@192.168.2.14] 8(12165) DEBUG: to body [sip:piem@192.168.2.14] 8(12165) get_hdr_field: cseq <CSeq>: <45242> <INVITE> 8(12165) parse_headers: flags=4 8(12165) DEBUG: t_reply_matching: hash 23406 label 2136625298 branch 0 8(12165) DEBUG: t_reply_matching: reply matched (T=0x4043e0f8)! 8(12165) parse_headers: flags=4 8(12165) DEBUG: t_check: msg id=4 global id=4 T end=0x4043e0f8 8(12165) DEBUG: reply_received: org. status uas=180, uac[0]=180 local=0 is_invite=1) 8(12165) ->>>>>>>>> T_code=180, new_code=200 8(12165) DEBUG: relay_reply: branch=0, save=0, relay=0 8(12165) old size: 735, new size: 674 8(12165) build_res_from_sip_res: copied size: orig:77, new: 16, rest: 658 msg= SIP/2.0 200 Ok Via: SIP/2.0/UDP 192.168.2.111:5060;rport=5060;branch=z9hG4bK05DA6E2E759C4BFEBA57195FC350EE17 From: pi sip:pi@192.168.2.14;tag=4060601702 To: sip:piem@192.168.2.14;tag=2313100209 Contact: sip:piem@192.168.2.2:5060 Call-ID: B6387609-0B3E-4F5E-A9C2-BFFF87EF4F86@192.168.2.111 mailto:B6387609-0B3E-4F5E-A9C2-BFFF87EF4F86@192.168.2.111 CSeq: 45242 INVITE Content-Type: application/sdp Server: X-Lite release 1103m Content-Length: 269
v=0 o=piem 101970734 101978031 IN IP4 192.168.2.2 s=X-Lite c=IN IP4 192.168.2.2 t=0 0 m=audio 8000 RTP/AVP 8 3 98 97 101 a=rtpmap:8 pcma/8000 a=rtpmap:3 gsm/8000 a=rtpmap:98 iLBC/8000 a=rtpmap:97 speex/8000 a=rtpmap:101 telephone-event/8000 a=fmtp:101 0-15
8(12165) DEBUG: update_totag_set: new totag 8(12165) DEBUG: reply relayed. buf=0x80ff110: SIP/2.0 2..., shmem=0x4043f410: SIP/2.0 2 8(12165) DEBUG: cleanup_uac_timers: RETR/FR timers reset 8(12165) DEBUG: add_timer_unsafe[2]: 0x4043e140 8(12165) DEBUG:destroy_avp_list: destroying list (nil) 8(12165) receive_msg: cleaning up 10(12171) DEBUG: timer routine:1,tl=0x4043e220 next=(nil) 10(12171) DEBUG: timer routine:2,tl=0x4043e140 next=(nil) 10(12171) DEBUG: wait_handler : removing 0x4043e0f8 from table 10(12171) DEBUG: delete transaction 0x4043e0f8 10(12171) DEBUG: wait_handler : done
Serusers mailing list serusers@lists.iptel.org http://lists.iptel.org/mailman/listinfo/serusers