The error is not related to radius. I went through your logs and did not
find any errors. Given the fact that radius authentication works, I
suppose there is no problem on radius side, so make sure that the
corresponding flag is set, that you restarted your server when you
changed the config file, try to see if there are any radius accounting
requests from ser on the radius server side.
Jan.
On 08-06 12:17, Rafael J. Risco G.V. wrote:
Hi
About my problem with radius accounting I?ve seen some errors in debug mode when starting
ser:
.
.
16(0) DEBUG: callid: '7edfe76a-0(a)200.110.2.132'
16(0) DEBUG: init_mod_child (8): usrloc
16(0) DEBUG: init_mod_child (8): acc
16(6427) DBG: open_uac_fifo: opening fifo...
16(6427) DEBUG: open_fifo_server: FIFO stat failed: Bad file descriptor
16(6427) DEBUG: FIFO created @ /tmp/ser_fifo
16(6427) DEBUG: fifo /tmp/ser_fifo opened, mode=432
17(0) INFO: fifo process starting: 6428
.
.
in fact I do not know if there are more, please see my attached files (startSer.txt and
callDebug.txt),
thank you
Rafael
Jan Janak <jan(a)iptel.org> escribi?:
> Are there any error messages in ser logs ?
>
> Jan.
>
> On 07-06 13:14, Rafael J. Risco G.V. wrote:
> > hello
> >
> > I?m still having problems with radius accounting module, ...I can see
> that authentication process works well but I did not see any "Accounting
> Report" in /var/log/radius/radacct/ or neither in radiusd -X debug ,
> please can someone share an example of its ser.cfg file for this
> function?
> >
> > thanks
> > Rafael
> >
> > PS: my current ser.cfg configuration is shown below, freeradius it?s
> installed
> > in the same host (SuSe Linux 9.0) and I have included setflag(1) for
> all transactions as Klaus D. recommend me some days ago...
> >
> >
> > ser:/var/log/radius/radacct# more /etc/ser/ser.cfg
> >
> > # simple quick-start config script
> > #
> >
> > # ----------- global configuration parameters
> ------------------------
> >
> > #debug=3 # debug level (cmd line: -dddddddddd)
> > #fork=yes
> > #log_stderror=no # (cmd line: -E)
> >
> > #/* Uncomment these lines to enter debugging mode
> > debug=9
> > fork=yes
> > log_stderror=yes
> > #*/
> >
> > check_via=no # (cmd. line: -v)
> > dns=no # (cmd. line: -r)
> > rev_dns=no # (cmd. line: -R)
> > #port=5060
> > #children=4
> > fifo="/tmp/ser_fifo"
> >
> > # ------------------ module loading
> ----------------------------------
> >
> > # Uncomment this if you want to use SQL database
> > #loadmodule "//lib/ser/modules/mysql.so"
> >
> > loadmodule "//lib/ser/modules/sl.so"
> > loadmodule "//lib/ser/modules/tm.so"
> > loadmodule "//lib/ser/modules/rr.so"
> > loadmodule "//lib/ser/modules/maxfwd.so"
> > loadmodule "//lib/ser/modules/usrloc.so"
> > loadmodule "//lib/ser/modules/registrar.so"
> > loadmodule "//lib/ser/modules/group_radius.so"
> > #loadmodule "//lib/ser/modules/group.so"
> > # Uncomment this if you want digest authentication
> > # mysql.so must be loaded !
> > loadmodule "//lib/ser/modules/auth.so"
> > #loadmodule "//lib/ser/modules/auth_db.so"
> > loadmodule "//lib/ser/modules/auth_radius.so"
> > loadmodule "//lib/ser/modules/acc.so"
> > #loadmodule "//lib/ser/modules/uri.so"
> > # ----------------- setting module-specific parameters
> ---------------
> >
> > # -- usrloc params --
> > #modparam("usrloc", "db_mode", 0)
> > # Uncomment this if you want to use SQL database
> > # for persistent storage and comment the previous line
> > #modparam("usrloc", "db_mode", 2)
> > # -- auth params --
> > # Uncomment if you are using auth module
> > #
> > #modparam("auth_db", "calculate_ha1", yes)
> > #
> > # If you set "calculate_ha1" parameter to yes (which true in this
> config),
> > # uncomment also the following parameter)
> > #
> > #modparam("auth_db", "password_column",
"password")
> > # -- rr params --
> > # add value to ;lr param to make some broken UAs happy
> >
> > modparam("rr", "enable_full_lr", 1)
> >
>
modparam("auth_radius","radius_config","/etc/radiusclient/radiusclient.conf")
> > modparam("auth_radius","service_type",15)
> > modparam("acc", "log_level", 1)
> > modparam("acc",
> "radius_config","/etc/radiusclient/radiusclient.conf")
> > modparam("acc", "service_type", 15)
> > modparam("acc", "radius_flag", 1)
> > modparam("acc", "radius_missed_flag", 3)
> >
> >
> >
> > # ------------------------- request routing logic
> -------------------
> >
> > # main routing logic
> >
> >
> > route{
> >
> > setflag(1);
> > if (method=="REGISTER")
> > log(1, "REGISTER message received\n");
> >
> > if (method=="INVITE")
> > log(1, "INVITE message received\n");
> >
> > if (method=="ACK")
> > log(1, "ACK message received\n");
> >
> > if (method=="BYE")
> > log(1, "BYE message received\n");
> >
> > if (method=="CANCEL")
> > log(1, "CANCEL message received\n");
> >
> > if (method=="SUBSCRIBE")
> > log(1, "SUBSCRIBE message received\n");
> >
> > if (method=="NOTIFY")
> > log(1, "NOTIFY message received\n");
> >
> > if (method=="OPTIONS")
> > log(1, "OPTIONS message received\n");
> >
> > if (method=="INFO")
> > log(1, "INFO message received\n");
> >
> > if (method=="MESSAGE")
> > log(1, "MESSAGE message received\n");
> >
> > if (method=="REFER")
> > log(1, "REFER message received\n");
> >
> >
> >
> > # initial sanity checks -- messages with
> > # max_forwards==0, or excessively long requests
> > if (!mf_process_maxfwd_header("10")) {
> > sl_send_reply("483","Too Many Hops");
> > break;
> > };
> > if ( msg:len > max_len ) {
> > sl_send_reply("513", "Message too big");
> > break;
> > };
> >
> > # we record-route all messages -- to make sure that
> > # subsequent messages will go through our proxy; that's
> > # particularly good if upstream and downstream entities
> > # use different transport protocol
> > record_route();
> > # loose-route processing
> > if (loose_route()) {
> > t_relay();
> > break;
> > };
> >
> >
> > # if the request is for other domain use UsrLoc
> > # (in case, it does not work, use the following command
> > # with proper names and addresses in it)
> > if (uri==myself) {
> >
> > if (method=="REGISTER") {
> >
> > # Uncomment this if you want to use digest authentication
> > if (!radius_www_authorize("")) {
> > www_challenge("", "1");
> > break;
> > };
> >
> > save("location");
> > break;
> > };
> >
> >
> > #Labeled transactions for accounting
> > #if (method =="INVITE" | method == "BYE")
> > # {
> > # log(1,"INVITE or BYE\n");
> > # setflag(1);
> > # };
> > #if (method=="MESSAGE") {
> > # log(1,"MESSAGE\n");
> > # setflag(1);
> > # };
> > #if (method=="BYE"){
> > # log (1, "BYEd or CANCEL\n");
> > # setflag(1);
> > # };
> > #if (method=="CANCEL"){
> > # log (1, "BYEe or CANCEL\n");
> > # setflag(1);
> > # };
> >
> >
> >
> > # native SIP destinations are handled using our USRLOC
> DB
> > if (!lookup("location")) {
> > sl_send_reply("404", "Not Found");
> > break;
> > };
> > };
> > # forward to current uri now; use stateful forwarding; that
> > # works reliably even if we forward from TCP to UDP
> > if (!t_relay()) {
> > sl_reply_error();
> > };
> >
> > }
> >
> > ser:/var/log/radius/radacct #
> >
> >
> >
> >
> >
> >
> >
> > [Serusers] Still trying to get radius Accounting!!!!!!!!!!
> >
> >
> >
> >
> >
> >
> >
> >
> >
> > Klaus Darilion <klaus.mailinglists(a)pernau.at> escribi?:
> >
> > > try setflag(1); for the transactions you want to account!
> > >
> > > klaus
> > >
> > > Rafael J. Risco G.V. wrote:
> > >
> > > > hello serusers!
> > > > I have followed these instructions carefully
> > >
again(http://iptel.org/ser/doc/ser_radius/ser_radius.html) and now I
> can
> > > see that authentication process works well but I did not see any
> > > "Accounting Report" in /var/log/radius/radacct/ or neither in
> radiusd -X
> > > debug, please can someone send me an example of ser.cfg
> configuration
> > > for this purpose?
> > > >
> > > > thanks
> > > > Rafael
> > > >
> > > > PS: my current ser.cfg configuration is shown below, freeradius it
> is
> > > installed in the same host (SuSe Linux 9.0):
> > > >
> > > > ser:/var/log/radius/radacct # more /etc/ser/ser.cfg
> > > > #
> > > > # $Id: ser.cfg,v 1.21.4.1 2003/11/10 15:35:15 andrei Exp $
> > > > #
> > > > # simple quick-start config script
> > > > #
> > > >
> > > > # ----------- global configuration parameters
> > > ------------------------
> > > >
> > > > #debug=3 # debug level (cmd line: -dddddddddd)
> > > > #fork=yes
> > > > #log_stderror=no # (cmd line: -E)
> > > >
> > > > #/* Uncomment these lines to enter debugging mode
> > > > debug=9
> > > > fork=yes
> > > > log_stderror=yes
> > > > #*/
> > > >
> > > > check_via=no # (cmd. line: -v)
> > > > dns=no # (cmd. line: -r)
> > > > rev_dns=no # (cmd. line: -R)
> > > > #port=5060
> > > > #children=4
> > > > fifo="/tmp/ser_fifo"
> > > >
> > > > # ------------------ module loading
> > > ----------------------------------
> > > >
> > > > # Uncomment this if you want to use SQL database
> > > > #loadmodule "//lib/ser/modules/mysql.so"
> > > >
> > > > loadmodule "//lib/ser/modules/sl.so"
> > > > loadmodule "//lib/ser/modules/tm.so"
> > > > loadmodule "//lib/ser/modules/rr.so"
> > > > loadmodule "//lib/ser/modules/maxfwd.so"
> > > > loadmodule "//lib/ser/modules/usrloc.so"
> > > > loadmodule "//lib/ser/modules/registrar.so"
> > > > loadmodule "//lib/ser/modules/group_radius.so"
> > > >
> > > > #loadmodule "//lib/ser/modules/group.so"
> > > > # Uncomment this if you want digest authentication
> > > > # mysql.so must be loaded !
> > > >
> > > > loadmodule "//lib/ser/modules/auth.so"
> > > >
> > > > #loadmodule "//lib/ser/modules/auth_db.so"
> > > >
> > > > loadmodule "//lib/ser/modules/auth_radius.so"
> > > > loadmodule "//lib/ser/modules/acc.so"
> > > >
> > > > #loadmodule "//lib/ser/modules/uri.so"
> > > >
> > > > # ----------------- setting module-specific parameters
> > > ---------------
> > > > # -- usrloc params --
> > > > #modparam("usrloc", "db_mode", 0)
> > > > # Uncomment this if you want to use SQL database
> > > > # for persistent storage and comment the previous line
> > > > #modparam("usrloc", "db_mode", 2)
> > > > # -- auth params --
> > > > # Uncomment if you are using auth module
> > > > #
> > > > #modparam("auth_db", "calculate_ha1", yes)
> > > > #
> > > > # If you set "calculate_ha1" parameter to yes (which true
in this
> > > config),
> > > > # uncomment also the following parameter)
> > > > #
> > > > #modparam("auth_db", "password_column",
"password")
> > > >
> > > > # -- rr params --
> > > > # add value to ;lr param to make some broken UAs happy
> > > >
> > > > modparam("rr", "enable_full_lr", 1)
> > > >
> > >
>
modparam("auth_radius","radius_config","/etc/radiusclient/radiusclient.conf")
> > > > modparam("auth_radius","service_type",15)
> > > > modparam("acc",
> > >
"radius_config","/etc/radiusclient/radiusclient.conf")
> > > > modparam("acc", "service_type", 15)
> > > > modparam("acc", "radius_flag", 1)
> > > > modparam("acc", "radius_missed_flag", 3)
> > > >
> > > >
> > > >
> > > > # ------------------------- request routing logic
> > > -------------------
> > > >
> > > > # main routing logic
> > > >
> > > > route{
> > > >
> > > > # initial sanity checks -- messages with
> > > > # max_forwards==0, or excessively long requests
> > > > if (!mf_process_maxfwd_header("10")) {
> > > > sl_send_reply("483","Too Many
Hops");
> > > > break;
> > > > };
> > > > if ( msg:len > max_len ) {
> > > > sl_send_reply("513", "Message too
big");
> > > > break;
> > > > };
> > > >
> > > > # we record-route all messages -- to make sure that
> > > > # subsequent messages will go through our proxy; that's
> > > > # particularly good if upstream and downstream entities
> > > > # use different transport protocol
> > > > record_route();
> > > > # loose-route processing
> > > > if (loose_route()) {
> > > > t_relay();
> > > > break;
> > > > };
> > > >
> > > > # if the request is for other domain use UsrLoc
> > > > # (in case, it does not work, use the following command
> > > > # with proper names and addresses in it)
> > > > if (uri==myself) {
> > > >
> > > > if (method=="REGISTER") {
> > > >
> > > > # Uncomment this if you want to use digest authentication
> > > > if (!radius_www_authorize("")) {
> > > > www_challenge("",
"0");
> > > > break;
> > > > };
> > > >
> > > > save("location");
> > > > break;
> > > > };
> > > >
> > > > # native SIP destinations are handled using our
> USRLOC
> > > DB
> > > > if (!lookup("location")) {
> > > > sl_send_reply("404", "Not
Found");
> > > > break;
> > > > };
> > > > };
> > > > # forward to current uri now; use stateful forwarding;
> that
> > > > # works reliably even if we forward from TCP to UDP
> > > > if (!t_relay()) {
> > > > sl_reply_error();
> > > > };
> > > >
> > > > }
> > > > ser:/var/log/radius/radacct #
> > > >
> > > >
> > > > _______________________________________________
> > > > Serusers mailing list
> > > > serusers(a)lists.iptel.org
> > > >
http://lists.iptel.org/mailman/listinfo/serusers
> > > >
> > > >
> > >
> >
> > _______________________________________________
> > Serusers mailing list
> > serusers(a)lists.iptel.org
> >
http://lists.iptel.org/mailman/listinfo/serusers
>
ser:/ #
ser:/ #
ser:/ #
ser:/ #
ser:/ # /etc/init.d/ser start
Starting SIP Express Router 0(6409) loading module //lib/ser/modules/sl.so
0(6409) loading module //lib/ser/modules/tm.so
0(6409) loading module //lib/ser/modules/rr.so
0(6409) loading module //lib/ser/modules/maxfwd.so
0(6409) loading module //lib/ser/modules/usrloc.so
0(6409) loading module //lib/ser/modules/registrar.so
0(6409) loading module //lib/ser/modules/group_radius.so
0(6409) loading module //lib/ser/modules/auth.so
0(6409) loading module //lib/ser/modules/auth_radius.so
0(6409) loading module //lib/ser/modules/acc.so
0(6409) set_mod_param_regex: rr matches module rr
0(6409) set_mod_param_regex: found <enable_full_lr> in module rr
[//lib/ser/modules/rr.so]
0(6409) set_mod_param_regex: auth_radius matches module auth_radius
0(6409) set_mod_param_regex: found <radius_config> in module auth_radius
[//lib/ser/modules/auth_radius.so]
0(6409) set_mod_param_regex: auth_radius matches module auth_radius
0(6409) set_mod_param_regex: found <service_type> in module auth_radius
[//lib/ser/modules/auth_radius.so]
0(6409) set_mod_param_regex: acc matches module acc
0(6409) set_mod_param_regex: found <log_level> in module acc
[//lib/ser/modules/acc.so]
0(6409) set_mod_param_regex: acc matches module acc
0(6409) set_mod_param_regex: found <radius_config> in module acc
[//lib/ser/modules/acc.so]
0(6409) set_mod_param_regex: acc matches module acc
0(6409) set_mod_param_regex: found <radius_flag> in module acc
[//lib/ser/modules/acc.so]
0(6409) set_mod_param_regex: acc matches module acc
0(6409) set_mod_param_regex: found <radius_missed_flag> in module acc
[//lib/ser/modules/acc.so]
0(6409) find_export: found <mf_process_maxfwd_header> in module maxfwd_module
[//lib/ser/modules/maxfwd.so]
0(6409) find_export: found <sl_send_reply> in module sl_module
[//lib/ser/modules/sl.so]
0(6409) find_export: found <sl_send_reply> in module sl_module
[//lib/ser/modules/sl.so]
0(6409) find_export: found <record_route> in module rr [//lib/ser/modules/rr.so]
0(6409) find_export: found <loose_route> in module rr [//lib/ser/modules/rr.so]
0(6409) find_export: found <t_relay> in module tm [//lib/ser/modules/tm.so]
0(6409) find_export: found <radius_www_authorize> in module auth_radius
[//lib/ser/modules/auth_radius.so]
0(6409) find_export: found <www_challenge> in module auth
[//lib/ser/modules/auth.so]
0(6409) find_export: found <save> in module registrar
[//lib/ser/modules/registrar.so]
0(6409) find_export: found <lookup> in module registrar
[//lib/ser/modules/registrar.so]
0(6409) find_export: found <sl_send_reply> in module sl_module
[//lib/ser/modules/sl.so]
0(6409) find_export: found <t_relay> in module tm [//lib/ser/modules/tm.so]
0(6409) find_export: found <sl_reply_error> in module sl_module
[//lib/ser/modules/sl.so]
0(6409) routing table 0:
0(6409) if ( 0(6409) NOT( 0(6409) external_module_call( 0(6409)
f_ptr<0x421a9c30> 0(6409) , "10" 0(6409) ); 0(6409)
external_module_call( 0(6409) f_ptr<0x421a9c30> 0(6409) , "10" 0(6409) );
0(6409) ) 0(6409) ) { 0(6409) external_module_call( 0(6409) f_ptr<0x4001c760>
0(6409) , "483" 0(6409) , "Too Many Hops" 0(6409) ); 0(6409) drop(
0(6409) type<0> 0(6409) ); 0(6409) } else { 0(6409) }; 0(6409) if ( 0(6409)
UNKNOWN 0(6409) <UNKNOWN> 0(6409) 65535 0(6409) ) { 0(6409) external_module_call(
0(6409) f_ptr<0x4001c760> 0(6409) , "513" 0(6409) , "Message too
big" 0(6409) ); 0(6409) drop( 0(6409) type<0> 0(6409) ); 0(6409) } else {
0(6409) }; 0(6409) external_module_call( 0(6409) f_ptr<0x40022e10> 0(6409) );
0(6409) if ( 0(6409) external_module_call( 0(6409) f_ptr<0x40020e00> 0(6409) );
0(6409) external_module_call( 0(6409) f_ptr<0x40020e00> 0(6409) ); 0(6409) ) {
0(6409) external_module_call( 0(6409) f_ptr<0x42183810> 0(6409) ); 0(6409) drop(
0(6409) type<0> 0(6409) ); 0(6409) } else { 0(6409) }; 0(6409) if ( 0(6409) uri
0(6409) == 0(6409) _myself_ 0(6409) ) { 0(6409) if ( 0(6409) method 0(6409) == 0(6409)
"REGISTER" 0(6409) ) { 0(6409) if ( 0(6409) NOT( 0(6409) external_module_call(
0(6409) f_ptr<0x421cfdf0> 0(6409) , "" 0(6409) ); 0(6409)
external_module_call( 0(6409) f_ptr<0x421cfdf0> 0(6409) , "" 0(6409) );
0(6409) ) 0(6409) ) { 0(6409) external_module_call( 0(6409) f_ptr<0x421cb530>
0(6409) , "" 0(6409) , "0" 0(6409) ); 0(6409) drop( 0(6409)
type<0> 0(6409) ); 0(6409) } else { 0(6409) }; 0(6409) external_module_call(
0(6409) f_ptr<0x421bfa20> 0(6409) , "location" 0(6409) ); 0(6409) drop(
0(6409) type<0> 0(6409) ); 0(6409) } else { 0(6409) }; 0(6409) if ( 0(6409) OR(
0(6409) method 0(6409) == 0(6409) "INVITE" 0(6409) , 0(6409) method 0(6409) ==
0(6409) "BYE" 0(6409) ) 0(6409) ) { 0(6409) log( 0(6409) 1 0(6409) ,
"INVITE or BYE
" 0(6409) ); 0(6409) setflag( 0(6409) 1 0(6409) ); 0(6409) } else { 0(6409) };
0(6409) if ( 0(6409) method 0(6409) == 0(6409) "MESSAGE" 0(6409) ) { 0(6409)
log( 0(6409) 1 0(6409) , "MESSAGE
" 0(6409) ); 0(6409) setflag( 0(6409) 1 0(6409) ); 0(6409) } else { 0(6409) };
0(6409) if ( 0(6409) method 0(6409) == 0(6409) "BYE" 0(6409) ) { 0(6409) log(
0(6409) 1 0(6409) , "BYEd or CANCEL
" 0(6409) ); 0(6409) setflag( 0(6409) 1 0(6409) ); 0(6409) } else { 0(6409) };
0(6409) if ( 0(6409) method 0(6409) == 0(6409) "CANCEL" 0(6409) ) { 0(6409) log(
0(6409) 1 0(6409) , "BYEe or CANCEL
" 0(6409) ); 0(6409) setflag( 0(6409) 1 0(6409) ); 0(6409) } else { 0(6409) };
0(6409) if ( 0(6409) NOT( 0(6409) external_module_call( 0(6409) f_ptr<0x421beb20>
0(6409) , "location" 0(6409) ); 0(6409) external_module_call( 0(6409)
f_ptr<0x421beb20> 0(6409) , "location" 0(6409) ); 0(6409) ) 0(6409) ) {
0(6409) external_module_call( 0(6409) f_ptr<0x4001c760> 0(6409) , "404"
0(6409) , "Not Found" 0(6409) ); 0(6409) drop( 0(6409) type<0> 0(6409) );
0(6409) } else { 0(6409) }; 0(6409) } else { 0(6409) }; 0(6409) if ( 0(6409) NOT(
0(6409) external_module_call( 0(6409) f_ptr<0x42183810> 0(6409) ); 0(6409)
external_module_call( 0(6409) f_ptr<0x42183810> 0(6409) ); 0(6409) ) 0(6409) ) {
0(6409) external_module_call( 0(6409) f_ptr<0x4001c7a0> 0(6409) ); 0(6409) } else
{ 0(6409) }; 0(6409) if ( 0(6409) UNKNOWN 0(6409) <UNKNOWN> 0(6409) 65535 0(6409) )
{ 0(6409) external_module_call( 0(6409) f_ptr<0x4001c760> 0(6409) , "513"
0(6409) , "Message too big" 0(6409) ); 0(6409) drop( 0(6409) type<0>
0(6409) ); 0(6409) } else { 0(6409) }; 0(6409) external_module_call( 0(6409)
f_ptr<0x40022e10> 0(6409) ); 0(6409) if ( 0(6409) external_module_call( 0(6409)
f_ptr<0x40020e00> 0(6409) ); 0(6409) external_module_call( 0(6409)
f_ptr<0x40020e00> 0(6409) ); 0(6409) ) { 0(6409) external_module_call( 0(6409)
f_ptr<0x42183810> 0(6409) ); 0(6409) drop( 0(6409) type<0> 0(6409) );
0(6409) } else { 0(6409) }; 0(6409) if ( 0(6409) uri 0(6409) == 0(6409) _myself_ 0(6409)
) { 0(6409) if ( 0(6409) method 0(6409) == 0(6409) "REGISTER" 0(6409) ) {
0(6409) if ( 0(6409) NOT( 0(6409) external_module_call( 0(6409) f_ptr<0x421cfdf0>
0(6409) , "" 0(6409) ); 0(6409) external_module_call( 0(6409)
f_ptr<0x421cfdf0> 0(6409) , "" 0(6409) ); 0(6409) ) 0(6409) ) { 0(6409)
external_module_call( 0(6409) f_ptr<0x421cb530> 0(6409) , "" 0(6409) ,
"0" 0(6409) ); 0(6409) drop( 0(6409) type<0> 0(6409) ); 0(6409) } else {
0(6409) }; 0(6409) external_module_call( 0(6409) f_ptr<0x421bfa20> 0(6409) ,
"location" 0(6409) ); 0(6409) drop( 0(6409) type<0> 0(6409) ); 0(6409) }
else { 0(6409) }; 0(6409) if ( 0(6409) OR( 0(6409) method 0(6409) == 0(6409)
"INVITE" 0(6409) , 0(6409) method 0(6409) == 0(6409) "BYE" 0(6409) )
0(6409) ) { 0(6409) log( 0(6409) 1 0(6409) , "INVITE or BYE
" 0(6409) ); 0(6409) setflag( 0(6409) 1 0(6409) ); 0(6409) } else { 0(6409) };
0(6409) if ( 0(6409) method 0(6409) == 0(6409) "MESSAGE" 0(6409) ) { 0(6409)
log( 0(6409) 1 0(6409) , "MESSAGE
" 0(6409) ); 0(6409) setflag( 0(6409) 1 0(6409) ); 0(6409) } else { 0(6409) };
0(6409) if ( 0(6409) method 0(6409) == 0(6409) "BYE" 0(6409) ) { 0(6409) log(
0(6409) 1 0(6409) , "BYEd or CANCEL
" 0(6409) ); 0(6409) setflag( 0(6409) 1 0(6409) ); 0(6409) } else { 0(6409) };
0(6409) if ( 0(6409) method 0(6409) == 0(6409) "CANCEL" 0(6409) ) { 0(6409) log(
0(6409) 1 0(6409) , "BYEe or CANCEL
" 0(6409) ); 0(6409) setflag( 0(6409) 1 0(6409) ); 0(6409) } else { 0(6409) };
0(6409) if ( 0(6409) NOT( 0(6409) external_module_call( 0(6409) f_ptr<0x421beb20>
0(6409) , "location" 0(6409) ); 0(6409) external_module_call( 0(6409)
f_ptr<0x421beb20> 0(6409) , "location" 0(6409) ); 0(6409) ) 0(6409) ) {
0(6409) external_module_call( 0(6409) f_ptr<0x4001c760> 0(6409) , "404"
0(6409) , "Not Found" 0(6409) ); 0(6409) drop( 0(6409) type<0> 0(6409) );
0(6409) } else { 0(6409) }; 0(6409) } else { 0(6409) }; 0(6409) if ( 0(6409) NOT(
0(6409) external_module_call( 0(6409) f_ptr<0x42183810> 0(6409) ); 0(6409)
external_module_call( 0(6409) f_ptr<0x42183810> 0(6409) ); 0(6409) ) 0(6409) ) {
0(6409) external_module_call( 0(6409) f_ptr<0x4001c7a0> 0(6409) ); 0(6409) } else
{ 0(6409) }; 0(6409) external_module_call( 0(6409) f_ptr<0x40022e10> 0(6409) );
0(6409) if ( 0(6409) external_module_call( 0(6409) f_ptr<0x40020e00> 0(6409) );
0(6409) external_module_call( 0(6409) f_ptr<0x40020e00> 0(6409) ); 0(6409) ) {
0(6409) external_module_call( 0(6409) f_ptr<0x42183810> 0(6409) ); 0(6409) drop(
0(6409) type<0> 0(6409) ); 0(6409) } else { 0(6409) }; 0(6409) if ( 0(6409) uri
0(6409) == 0(6409) _myself_ 0(6409) ) { 0(6409) if ( 0(6409) method 0(6409) == 0(6409)
"REGISTER" 0(6409) ) { 0(6409) if ( 0(6409) NOT( 0(6409) external_module_call(
0(6409) f_ptr<0x421cfdf0> 0(6409) , "" 0(6409) ); 0(6409)
external_module_call( 0(6409) f_ptr<0x421cfdf0> 0(6409) , "" 0(6409) );
0(6409) ) 0(6409) ) { 0(6409) external_module_call( 0(6409) f_ptr<0x421cb530>
0(6409) , "" 0(6409) , "0" 0(6409) ); 0(6409) drop( 0(6409)
type<0> 0(6409) ); 0(6409) } else { 0(6409) }; 0(6409) external_module_call(
0(6409) f_ptr<0x421bfa20> 0(6409) , "location" 0(6409) ); 0(6409) drop(
0(6409) type<0> 0(6409) ); 0(6409) } else { 0(6409) }; 0(6409) if ( 0(6409) OR(
0(6409) method 0(6409) == 0(6409) "INVITE" 0(6409) , 0(6409) method 0(6409) ==
0(6409) "BYE" 0(6409) ) 0(6409) ) { 0(6409) log( 0(6409) 1 0(6409) ,
"INVITE or BYE
" 0(6409) ); 0(6409) setflag( 0(6409) 1 0(6409) ); 0(6409) } else { 0(6409) };
0(6409) if ( 0(6409) method 0(6409) == 0(6409) "MESSAGE" 0(6409) ) { 0(6409)
log( 0(6409) 1 0(6409) , "MESSAGE
" 0(6409) ); 0(6409) setflag( 0(6409) 1 0(6409) ); 0(6409) } else { 0(6409) };
0(6409) if ( 0(6409) method 0(6409) == 0(6409) "BYE" 0(6409) ) { 0(6409) log(
0(6409) 1 0(6409) , "BYEd or CANCEL
" 0(6409) ); 0(6409) setflag( 0(6409) 1 0(6409) ); 0(6409) } else { 0(6409) };
0(6409) if ( 0(6409) method 0(6409) == 0(6409) "CANCEL" 0(6409) ) { 0(6409) log(
0(6409) 1 0(6409) , "BYEe or CANCEL
" 0(6409) ); 0(6409) setflag( 0(6409) 1 0(6409) ); 0(6409) } else { 0(6409) };
0(6409) if ( 0(6409) NOT( 0(6409) external_module_call( 0(6409) f_ptr<0x421beb20>
0(6409) , "location" 0(6409) ); 0(6409) external_module_call( 0(6409)
f_ptr<0x421beb20> 0(6409) , "location" 0(6409) ); 0(6409) ) 0(6409) ) {
0(6409) external_module_call( 0(6409) f_ptr<0x4001c760> 0(6409) , "404"
0(6409) , "Not Found" 0(6409) ); 0(6409) drop( 0(6409) type<0> 0(6409) );
0(6409) } else { 0(6409) }; 0(6409) } else { 0(6409) }; 0(6409) if ( 0(6409) NOT(
0(6409) external_module_call( 0(6409) f_ptr<0x42183810> 0(6409) ); 0(6409)
external_module_call( 0(6409) f_ptr<0x42183810> 0(6409) ); 0(6409) ) 0(6409) ) {
0(6409) external_module_call( 0(6409) f_ptr<0x4001c7a0> 0(6409) ); 0(6409) } else
{ 0(6409) }; 0(6409) if ( 0(6409) external_module_call( 0(6409) f_ptr<0x40020e00>
0(6409) ); 0(6409) external_module_call( 0(6409) f_ptr<0x40020e00> 0(6409) );
0(6409) ) { 0(6409) external_module_call( 0(6409) f_ptr<0x42183810> 0(6409) );
0(6409) drop( 0(6409) type<0> 0(6409) ); 0(6409) } else { 0(6409) }; 0(6409) if (
0(6409) uri 0(6409) == 0(6409) _myself_ 0(6409) ) { 0(6409) if ( 0(6409) method 0(6409) ==
0(6409) "REGISTER" 0(6409) ) { 0(6409) if ( 0(6409) NOT( 0(6409)
external_module_call( 0(6409) f_ptr<0x421cfdf0> 0(6409) , "" 0(6409) );
0(6409) external_module_call( 0(6409) f_ptr<0x421cfdf0> 0(6409) , ""
0(6409) ); 0(6409) ) 0(6409) ) { 0(6409) external_module_call( 0(6409)
f_ptr<0x421cb530> 0(6409) , "" 0(6409) , "0" 0(6409) ); 0(6409)
drop( 0(6409) type<0> 0(6409) ); 0(6409) } else { 0(6409) }; 0(6409)
external_module_call( 0(6409) f_ptr<0x421bfa20> 0(6409) , "location"
0(6409) ); 0(6409) drop( 0(6409) type<0> 0(6409) ); 0(6409) } else { 0(6409) };
0(6409) if ( 0(6409) OR( 0(6409) method 0(6409) == 0(6409) "INVITE" 0(6409) ,
0(6409) method 0(6409) == 0(6409) "BYE" 0(6409) ) 0(6409) ) { 0(6409) log(
0(6409) 1 0(6409) , "INVITE or BYE
" 0(6409) ); 0(6409) setflag( 0(6409) 1 0(6409) ); 0(6409) } else { 0(6409) };
0(6409) if ( 0(6409) method 0(6409) == 0(6409) "MESSAGE" 0(6409) ) { 0(6409)
log( 0(6409) 1 0(6409) , "MESSAGE
" 0(6409) ); 0(6409) setflag( 0(6409) 1 0(6409) ); 0(6409) } else { 0(6409) };
0(6409) if ( 0(6409) method 0(6409) == 0(6409) "BYE" 0(6409) ) { 0(6409) log(
0(6409) 1 0(6409) , "BYEd or CANCEL
" 0(6409) ); 0(6409) setflag( 0(6409) 1 0(6409) ); 0(6409) } else { 0(6409) };
0(6409) if ( 0(6409) method 0(6409) == 0(6409) "CANCEL" 0(6409) ) { 0(6409) log(
0(6409) 1 0(6409) , "BYEe or CANCEL
" 0(6409) ); 0(6409) setflag( 0(6409) 1 0(6409) ); 0(6409) } else { 0(6409) };
0(6409) if ( 0(6409) NOT( 0(6409) external_module_call( 0(6409) f_ptr<0x421beb20>
0(6409) , "location" 0(6409) ); 0(6409) external_module_call( 0(6409)
f_ptr<0x421beb20> 0(6409) , "location" 0(6409) ); 0(6409) ) 0(6409) ) {
0(6409) external_module_call( 0(6409) f_ptr<0x4001c760> 0(6409) , "404"
0(6409) , "Not Found" 0(6409) ); 0(6409) drop( 0(6409) type<0> 0(6409) );
0(6409) } else { 0(6409) }; 0(6409) } else { 0(6409) }; 0(6409) if ( 0(6409) NOT(
0(6409) external_module_call( 0(6409) f_ptr<0x42183810> 0(6409) ); 0(6409)
external_module_call( 0(6409) f_ptr<0x42183810> 0(6409) ); 0(6409) ) 0(6409) ) {
0(6409) external_module_call( 0(6409) f_ptr<0x4001c7a0> 0(6409) ); 0(6409) } else
{ 0(6409) }; 0(6409) if ( 0(6409) uri 0(6409) == 0(6409) _myself_ 0(6409) ) { 0(6409) if
( 0(6409) method 0(6409) == 0(6409) "REGISTER" 0(6409) ) { 0(6409) if ( 0(6409)
NOT( 0(6409) external_module_call( 0(6409) f_ptr<0x421cfdf0> 0(6409) ,
"" 0(6409) ); 0(6409) external_module_call( 0(6409) f_ptr<0x421cfdf0>
0(6409) , "" 0(6409) ); 0(6409) ) 0(6409) ) { 0(6409) external_module_call(
0(6409) f_ptr<0x421cb530> 0(6409) , "" 0(6409) , "0" 0(6409) );
0(6409) drop( 0(6409) type<0> 0(6409) ); 0(6409) } else { 0(6409) }; 0(6409)
external_module_call( 0(6409) f_ptr<0x421bfa20> 0(6409) , "location"
0(6409) ); 0(6409) drop( 0(6409) type<0> 0(6409) ); 0(6409) } else { 0(6409) };
0(6409) if ( 0(6409) OR( 0(6409) method 0(6409) == 0(6409) "INVITE" 0(6409) ,
0(6409) method 0(6409) == 0(6409) "BYE" 0(6409) ) 0(6409) ) { 0(6409) log(
0(6409) 1 0(6409) , "INVITE or BYE
" 0(6409) ); 0(6409) setflag( 0(6409) 1 0(6409) ); 0(6409) } else { 0(6409) };
0(6409) if ( 0(6409) method 0(6409) == 0(6409) "MESSAGE" 0(6409) ) { 0(6409)
log( 0(6409) 1 0(6409) , "MESSAGE
" 0(6409) ); 0(6409) setflag( 0(6409) 1 0(6409) ); 0(6409) } else { 0(6409) };
0(6409) if ( 0(6409) method 0(6409) == 0(6409) "BYE" 0(6409) ) { 0(6409) log(
0(6409) 1 0(6409) , "BYEd or CANCEL
" 0(6409) ); 0(6409) setflag( 0(6409) 1 0(6409) ); 0(6409) } else { 0(6409) };
0(6409) if ( 0(6409) method 0(6409) == 0(6409) "CANCEL" 0(6409) ) { 0(6409) log(
0(6409) 1 0(6409) , "BYEe or CANCEL
" 0(6409) ); 0(6409) setflag( 0(6409) 1 0(6409) ); 0(6409) } else { 0(6409) };
0(6409) if ( 0(6409) NOT( 0(6409) external_module_call( 0(6409) f_ptr<0x421beb20>
0(6409) , "location" 0(6409) ); 0(6409) external_module_call( 0(6409)
f_ptr<0x421beb20> 0(6409) , "location" 0(6409) ); 0(6409) ) 0(6409) ) {
0(6409) external_module_call( 0(6409) f_ptr<0x4001c760> 0(6409) , "404"
0(6409) , "Not Found" 0(6409) ); 0(6409) drop( 0(6409) type<0> 0(6409) );
0(6409) } else { 0(6409) }; 0(6409) } else { 0(6409) }; 0(6409) if ( 0(6409) NOT(
0(6409) external_module_call( 0(6409) f_ptr<0x42183810> 0(6409) ); 0(6409)
external_module_call( 0(6409) f_ptr<0x42183810> 0(6409) ); 0(6409) ) 0(6409) ) {
0(6409) external_module_call( 0(6409) f_ptr<0x4001c7a0> 0(6409) ); 0(6409) } else
{ 0(6409) }; 0(6409) if ( 0(6409) NOT( 0(6409) external_module_call( 0(6409)
f_ptr<0x42183810> 0(6409) ); 0(6409) external_module_call( 0(6409)
f_ptr<0x42183810> 0(6409) ); 0(6409) ) 0(6409) ) { 0(6409) external_module_call(
0(6409) f_ptr<0x4001c7a0> 0(6409) ); 0(6409) } else { 0(6409) }; 0(6409)
Listening on
127.0.0.1 [127.0.0.1]:5060
200.110.2.132 [200.110.2.132]:5060
Aliases: ser:5060 ser.local:5060 localhost:5060
0(6411) DEBUG: init_mod: sl_module
stateless - initializing
0(6411) DEBUG: register_fifo_cmd: new command (sl_stats) registered
0(6411) DEBUG: MD5 calculated: b27e1a1d33761e85846fc98f5f3a7e58
0(6411) DEBUG: init_mod: tm
0(6411) TM - initializing...
0(6411) Call-ID initialization: '7edfe76a'
0(6411) DEBUG: register_fifo_cmd: new command (t_uac_dlg) registered
0(6411) DEBUG: register_fifo_cmd: new command (t_hash) registered
0(6411) DEBUG: lock_initialize: lock initialization started
done
ser:/ # 0(6411) DEBUG: register_fifo_cmd: new command (t_stats) registered
0(6411) DEBUG: MD5 calculated: 533cb9e91f4b999cf76861cbb9ed54ed
0(6411) DEBUG: MD5 calculated: a6a1c5f60faecf035a1ae5b6e96e979a
0(6411) DEBUG: init_mod: rr
0(6411) rr - initializing
0(6411) DEBUG: init_mod: maxfwd_module
Maxfwd module- initializing
0(6411) DEBUG: init_mod: usrloc
0(6411) usrloc - initializing
0(6411) DEBUG: register_fifo_cmd: new command (ul_stats) registered
0(6411) DEBUG: register_fifo_cmd: new command (ul_rm) registered
0(6411) DEBUG: register_fifo_cmd: new command (ul_rm_contact) registered
0(6411) DEBUG: register_fifo_cmd: new command (ul_dump) registered
0(6411) DEBUG: register_fifo_cmd: new command (ul_flush) registered
0(6411) DEBUG: register_fifo_cmd: new command (ul_add) registered
0(6411) DEBUG: register_fifo_cmd: new command (ul_show_contact) registered
0(6411) DEBUG: init_mod: registrar
0(6411) registrar - initializing
0(6411) find_export: found <sl_send_reply> in module sl_module
[//lib/ser/modules/sl.so]
0(6411) find_export: found <ul_bind_usrloc> in module usrloc
[//lib/ser/modules/usrloc.so]
0(6411) find_export: found <ul_register_udomain> in module usrloc
[//lib/ser/modules/usrloc.so]
0(6411) find_export: found <ul_get_all_ucontacts> in module usrloc
[//lib/ser/modules/usrloc.so]
0(6411) find_export: found <ul_insert_urecord> in module usrloc
[//lib/ser/modules/usrloc.so]
0(6411) find_export: found <ul_delete_urecord> in module usrloc
[//lib/ser/modules/usrloc.so]
0(6411) find_export: found <ul_get_urecord> in module usrloc
[//lib/ser/modules/usrloc.so]
0(6411) find_export: found <ul_lock_udomain> in module usrloc
[//lib/ser/modules/usrloc.so]
0(6411) find_export: found <ul_unlock_udomain> in module usrloc
[//lib/ser/modules/usrloc.so]
0(6411) find_export: found <ul_release_urecord> in module usrloc
[//lib/ser/modules/usrloc.so]
0(6411) find_export: found <ul_insert_ucontact> in module usrloc
[//lib/ser/modules/usrloc.so]
0(6411) find_export: found <ul_delete_ucontact> in module usrloc
[//lib/ser/modules/usrloc.so]
0(6411) find_export: found <ul_get_ucontact> in module usrloc
[//lib/ser/modules/usrloc.so]
0(6411) find_export: found <ul_update_ucontact> in module usrloc
[//lib/ser/modules/usrloc.so]
0(6411) DEBUG: init_mod: group_radius
0(6411) group_radius - initializing
0(6411) DEBUG: init_mod: auth
0(6411) auth module - initializing
0(6411) find_export: found <sl_send_reply> in module sl_module
[//lib/ser/modules/sl.so]
0(6411) DEBUG: init_mod: auth_radius
0(6411) auth_radius - Initializing
0(6411) find_export: found <pre_auth> in module auth [//lib/ser/modules/auth.so]
0(6411) find_export: found <post_auth> in module auth [//lib/ser/modules/auth.so]
0(6411) DEBUG: init_mod: acc
acc - initializing
0(6411) find_export: found <load_tm> in module tm [//lib/ser/modules/tm.so]
0(6411) find_export: found <register_tmcb> in module tm [//lib/ser/modules/tm.so]
0(6411) find_export: found <t_relay_to_tcp> in module tm
[//lib/ser/modules/tm.so]
0(6411) find_export: found <t_relay_to_udp> in module tm
[//lib/ser/modules/tm.so]
0(6411) find_export: found <t_relay> in module tm [//lib/ser/modules/tm.so]
0(6411) find_export: found <t_reply> in module tm [//lib/ser/modules/tm.so]
0(6411) find_export: found <t_reply_with_body> in module tm
[//lib/ser/modules/tm.so]
0(6411) find_export: found <t_is_local> in module tm [//lib/ser/modules/tm.so]
0(6411) find_export: found <t_get_trans_ident> in module tm
[//lib/ser/modules/tm.so]
0(6411) find_export: found <t_lookup_ident> in module tm
[//lib/ser/modules/tm.so]
0(6411) find_export: found <t_add_blind> in module tm [//lib/ser/modules/tm.so]
0(6411) find_export: found <t_forward_nonack> in module tm
[//lib/ser/modules/tm.so]
0(6411) find_export: found <t_request_within> in module tm
[//lib/ser/modules/tm.so]
0(6411) find_export: found <t_request_outside> in module tm
[//lib/ser/modules/tm.so]
0(6411) find_export: found <t_request> in module tm [//lib/ser/modules/tm.so]
0(6411) find_export: found <new_dlg_uac> in module tm [//lib/ser/modules/tm.so]
0(6411) find_export: found <dlg_response_uac> in module tm
[//lib/ser/modules/tm.so]
0(6411) find_export: found <new_dlg_uas> in module tm [//lib/ser/modules/tm.so]
0(6411) find_export: found <dlg_request_uas> in module tm
[//lib/ser/modules/tm.so]
0(6411) find_export: found <free_dlg> in module tm [//lib/ser/modules/tm.so]
0(6411) find_export: found <print_dlg> in module tm [//lib/ser/modules/tm.so]
0(0) fixing //lib/ser/modules/maxfwd.so mf_process_maxfwd_header
0(0) fixing //lib/ser/modules/sl.so sl_send_reply
0(0) fixing //lib/ser/modules/sl.so sl_send_reply
0(0) fixing //lib/ser/modules/rr.so record_route
0(0) fixing //lib/ser/modules/rr.so loose_route
0(0) fixing //lib/ser/modules/tm.so t_relay
0(0) fixing //lib/ser/modules/auth_radius.so radius_www_authorize
0(0) fixing //lib/ser/modules/auth.so www_challenge
0(0) fixing //lib/ser/modules/registrar.so save
0(0) fixing //lib/ser/modules/registrar.so lookup
0(0) fixing //lib/ser/modules/sl.so sl_send_reply
0(0) fixing //lib/ser/modules/tm.so t_relay
0(0) fixing //lib/ser/modules/sl.so sl_reply_error
0(0) INFO: udp_init: SO_RCVBUF is initially 65535
0(0) DEBUG: udp_init: trying SO_RCVBUF: 131070
0(0) DEBUG: setting SO_RCVBUF; set=131070,verify=131070
0(0) DEBUG: udp_init: trying SO_RCVBUF: 262140
0(0) DEBUG: setting SO_RCVBUF; set=262140,verify=131070
0(0) DEBUG: setting SO_RCVBUF has no effect
0(0) DEBUG: udp_init: trying SO_RCVBUF: 133118
0(0) DEBUG: setting SO_RCVBUF; set=133118,verify=131070
0(0) DEBUG: setting SO_RCVBUF has no effect
0(0) INFO: udp_init: SO_RCVBUF is finally 131070
0(0) INFO: udp_init: SO_RCVBUF is initially 65535
0(0) DEBUG: udp_init: trying SO_RCVBUF: 131070
0(0) DEBUG: setting SO_RCVBUF; set=131070,verify=131070
0(0) DEBUG: udp_init: trying SO_RCVBUF: 262140
0(0) DEBUG: setting SO_RCVBUF; set=262140,verify=131070
0(0) DEBUG: setting SO_RCVBUF has no effect
0(0) DEBUG: udp_init: trying SO_RCVBUF: 133118
0(0) DEBUG: setting SO_RCVBUF; set=133118,verify=131070
0(0) DEBUG: setting SO_RCVBUF has no effect
0(0) INFO: udp_init: SO_RCVBUF is finally 131070
1(0) DEBUG: init_mod_child (1): tm
1(0) DEBUG: callid: '7edfe76a-0(a)127.0.0.1'
1(0) DEBUG: init_mod_child (1): usrloc
1(0) DEBUG: init_mod_child (1): acc
2(0) DEBUG: init_mod_child (2): tm
2(0) DEBUG: callid: '7edfe76a-0(a)127.0.0.1'
2(0) DEBUG: init_mod_child (2): usrloc
2(0) DEBUG: init_mod_child (2): acc
3(0) DEBUG: init_mod_child (3): tm
3(0) DEBUG: callid: '7edfe76a-0(a)127.0.0.1'
3(0) DEBUG: init_mod_child (3): usrloc
3(0) DEBUG: init_mod_child (3): acc
4(0) DEBUG: init_mod_child (4): tm
4(0) DEBUG: callid: '7edfe76a-0(a)127.0.0.1'
4(0) DEBUG: init_mod_child (4): usrloc
4(0) DEBUG: init_mod_child (4): acc
5(0) DEBUG: init_mod_child (5): tm
5(0) DEBUG: callid: '7edfe76a-0(a)127.0.0.1'
5(0) DEBUG: init_mod_child (5): usrloc
5(0) DEBUG: init_mod_child (5): acc
6(0) DEBUG: init_mod_child (6): tm
6(0) DEBUG: callid: '7edfe76a-0(a)127.0.0.1'
6(0) DEBUG: init_mod_child (6): usrloc
6(0) DEBUG: init_mod_child (6): acc
7(0) DEBUG: init_mod_child (7): tm
7(0) DEBUG: callid: '7edfe76a-0(a)127.0.0.1'
7(0) DEBUG: init_mod_child (7): usrloc
7(0) DEBUG: init_mod_child (7): acc
8(0) DEBUG: init_mod_child (8): tm
8(0) DEBUG: callid: '7edfe76a-0(a)127.0.0.1'
8(0) DEBUG: init_mod_child (8): usrloc
8(0) DEBUG: init_mod_child (8): acc
9(0) DEBUG: init_mod_child (1): tm
9(0) DEBUG: callid: '7edfe76a-0(a)200.110.2.132'
9(0) DEBUG: init_mod_child (1): usrloc
9(0) DEBUG: init_mod_child (1): acc
10(0) DEBUG: init_mod_child (2): tm
10(0) DEBUG: callid: '7edfe76a-0(a)200.110.2.132'
10(0) DEBUG: init_mod_child (2): usrloc
10(0) DEBUG: init_mod_child (2): acc
11(0) DEBUG: init_mod_child (3): tm
11(0) DEBUG: callid: '7edfe76a-0(a)200.110.2.132'
11(0) DEBUG: init_mod_child (3): usrloc
11(0) DEBUG: init_mod_child (3): acc
12(0) DEBUG: init_mod_child (4): tm
12(0) DEBUG: callid: '7edfe76a-0(a)200.110.2.132'
12(0) DEBUG: init_mod_child (4): usrloc
12(0) DEBUG: init_mod_child (4): acc
13(0) DEBUG: init_mod_child (5): tm
13(0) DEBUG: callid: '7edfe76a-0(a)200.110.2.132'
13(0) DEBUG: init_mod_child (5): usrloc
13(0) DEBUG: init_mod_child (5): acc
14(0) DEBUG: init_mod_child (6): tm
14(0) DEBUG: callid: '7edfe76a-0(a)200.110.2.132'
14(0) DEBUG: init_mod_child (6): usrloc
14(0) DEBUG: init_mod_child (6): acc
15(0) DEBUG: init_mod_child (7): tm
15(0) DEBUG: callid: '7edfe76a-0(a)200.110.2.132'
15(0) DEBUG: init_mod_child (7): usrloc
15(0) DEBUG: init_mod_child (7): acc
16(0) DEBUG: init_mod_child (8): tm
16(0) DEBUG: callid: '7edfe76a-0(a)200.110.2.132'
16(0) DEBUG: init_mod_child (8): usrloc
16(0) DEBUG: init_mod_child (8): acc
16(6427) DBG: open_uac_fifo: opening fifo...
16(6427) DEBUG: open_fifo_server: FIFO stat failed: Bad file descriptor
16(6427) DEBUG: FIFO created @ /tmp/ser_fifo
16(6427) DEBUG: fifo /tmp/ser_fifo opened, mode=432
17(0) INFO: fifo process starting: 6428
17(0) DEBUG: init_mod_child (-2): tm
17(0) DEBUG: callid: '7edfe76a-0(a)127.0.0.1'
17(0) DEBUG: init_mod_child (-2): usrloc
17(0) DEBUG: init_mod_child (-2): acc
18(0) DEBUG: init_mod_child (-1): tm
18(0) DEBUG: callid: '7edfe76a-0(a)127.0.0.1'
18(0) DEBUG: init_mod_child (-1): usrloc
18(0) DEBUG: init_mod_child (-1): acc
17(6428) SER: open_uac_fifo: fifo server up at /tmp/ser_fifo...
19(0) DEBUG: init_mod_child (9): tm
19(0) DEBUG: callid: '7edfe76a-0(a)127.0.0.1'
19(0) DEBUG: init_mod_child (9): usrloc
19(0) DEBUG: init_mod_child (9): acc
20(0) DEBUG: init_mod_child (10): tm
20(0) DEBUG: callid: '7edfe76a-0(a)127.0.0.1'
20(0) DEBUG: init_mod_child (10): usrloc
20(0) DEBUG: init_mod_child (10): acc
21(0) DEBUG: init_mod_child (11): tm
21(0) DEBUG: callid: '7edfe76a-0(a)127.0.0.1'
21(0) DEBUG: init_mod_child (11): usrloc
21(0) DEBUG: init_mod_child (11): acc
22(0) DEBUG: init_mod_child (12): tm
22(0) DEBUG: callid: '7edfe76a-0(a)127.0.0.1'
22(0) DEBUG: init_mod_child (12): usrloc
22(0) DEBUG: init_mod_child (12): acc
23(0) DEBUG: init_mod_child (13): tm
23(0) DEBUG: callid: '7edfe76a-0(a)127.0.0.1'
23(0) DEBUG: init_mod_child (13): usrloc
23(0) DEBUG: init_mod_child (13): acc
24(0) DEBUG: init_mod_child (14): tm
24(0) DEBUG: callid: '7edfe76a-0(a)127.0.0.1'
24(0) DEBUG: init_mod_child (14): usrloc
24(0) DEBUG: init_mod_child (14): acc
25(0) DEBUG: init_mod_child (15): tm
25(0) DEBUG: callid: '7edfe76a-0(a)127.0.0.1'
25(0) DEBUG: init_mod_child (15): usrloc
25(0) DEBUG: init_mod_child (15): acc
26(0) DEBUG: init_mod_child (16): tm
26(0) DEBUG: callid: '7edfe76a-0(a)127.0.0.1'
26(0) DEBUG: init_mod_child (16): usrloc
26(0) DEBUG: init_mod_child (16): acc
27(0) DEBUG: init_mod_child (-4): tm
27(0) DEBUG: callid: '7edfe76a-0(a)127.0.0.1'
27(0) DEBUG: init_mod_child (-4): usrloc
27(0) DEBUG: init_mod_child (-4): acc
0(6411) DEBUG: init_mod_child (0): tm
0(6411) DEBUG: callid: '7edfe76a-6411(a)127.0.0.1'
0(6411) DEBUG: init_mod_child (0): usrloc
0(6411) DEBUG: init_mod_child (0): acc
ser:/ #
ser:/ # 13(6424) SIP Request:
13(6424) method: <INVITE>
13(6424) uri: <sip:6604000@200.110.2.132>
13(6424) version: <SIP/2.0>
13(6424) parse_headers: flags=1
13(6424) Found param type 232, <branch> = <z9hG4bK6e00fdeaa4180>; state=16
13(6424) end of header reached, state=5
13(6424) parse_headers: Via found, flags=1
13(6424) parse_headers: this is the first via
13(6424) After parse_msg...
13(6424) preparing to run routing scripts...
13(6424) DEBUG : is_maxfwd_present: searching for max_forwards header
13(6424) parse_headers: flags=128
13(6424) end of header reached, state=9
13(6424) DEBUG: get_hdr_field: <To> [29]; uri=[sip:6604000@200.110.2.132]
13(6424) DEBUG: to body [<sip:6604000@200.110.2.132>
]
13(6424) get_hdr_field: cseq <CSeq>: <180> <INVITE>
13(6424) DEBUG: get_hdr_body : content_length=137
13(6424) DEBUG: is_maxfwd_present: value = 70
13(6424) DEBUG: add_param: tag=6e00fdeaa4
13(6424) end of header reached, state=29
13(6424) parse_headers: flags=256
13(6424) found end of header
13(6424) find_first_route(): No Route headers found
13(6424) loose_route(): There is no Route HF
13(6424) check_self - checking if host==us: 13==9 && [200.110.2.132] ==
[127.0.0.1]
13(6424) check_self - checking if port 5060 matches port 5060
13(6424) check_self - checking if host==us: 13==13 && [200.110.2.132] ==
[200.110.2.132]
13(6424) check_self - checking if port 5060 matches port 5060
13(6424) INVITE or BYE
13(6424) rwrite(): Rewriting Request-URI with 'sip:6604000@200.110.6.58'
13(6424) DEBUG: t_addifnew: msg id=4 , global msg id=0 , T on entrance=0xffffffff
13(6424) parse_headers: flags=-1
13(6424) parse_headers: flags=60
13(6424) t_lookup_request: start searching: hash=28567, isACK=0
13(6424) DEBUG: RFC3261 transaction matching failed
13(6424) DEBUG: t_lookup_request: no transaction found
13(6424) DBG: callback type 2, id 3 entered
13(6424) parse_headers: flags=44
13(6424) DEBUG: noisy_timer set for accounting
13(6424) SER: new INVITE
13(6424) parse_headers: flags=-1
13(6424) check_via_address(10.0.0.236, 10.0.0.236, 0)
13(6424) WARNING:vqm_resize: resize(0) called
13(6424) DEBUG: reply sent out. buf=0x80cb880: SIP/2.0 1..., shmem=0x402f6b10: SIP/2.0 1
13(6424) DEBUG: t_reply: finished
13(6424) DEBUG: mk_proxy: doing DNS lookup...
13(6424) check_via_address(10.0.0.236, 10.0.0.236, 0)
13(6424) DEBUG: add_to_tail_of_timer[4]: 0x402f5574
13(6424) DEBUG: add_to_tail_of_timer[0]: 0x402f5588
13(6424) SER: new transaction fwd'ed
13(6424) receive_msg: cleaning up
15(6426) SIP Reply (status):
15(6426) version: <SIP/2.0>
15(6426) status: <100>
15(6426) reason: <Trying>
15(6426) parse_headers: flags=1
15(6426) Found param type 232, <branch> = <z9hG4bK79f6.7d19d563.0>; state=16
15(6426) end of header reached, state=5
15(6426) parse_headers: Via found, flags=1
15(6426) parse_headers: this is the first via
15(6426) After parse_msg...
15(6426) forward_reply: found module tm, passing reply to it
15(6426) DEBUG: t_check: msg id=5 global id=0 T start=0xffffffff
15(6426) parse_headers: flags=17
15(6426) Found param type 232, <branch> = <z9hG4bK6e00fdeaa4180>; state=16
15(6426) end of header reached, state=5
15(6426) parse_headers: Via found, flags=17
15(6426) parse_headers: this is the second via
15(6426) end of header reached, state=9
15(6426) DEBUG: get_hdr_field: <To> [29]; uri=[sip:6604000@200.110.2.132]
15(6426) DEBUG: to body [<sip:6604000@200.110.2.132>
]
15(6426) get_hdr_field: cseq <CSeq>: <180> <INVITE>
15(6426) parse_headers: flags=4
15(6426) DEBUG: t_reply_matching: hash 28567 label 912101847 branch 0
15(6426) DEBUG: t_reply_matching: reply matched (T=0x402f5450)!
15(6426) DBG: callback type 1, id 5 entered
15(6426) DEBUG: t_check: msg id=5 global id=5 T end=0x402f5450
15(6426) DEBUG: t_on_reply: org. status uas=100, uac[0]=0 local=0 is_invite=1)
15(6426) ->>>>>>>>> T_code=100, new_code=100
15(6426) DEBUG: relay_reply: branch=0, save=0, relay=-1
15(6426) DEBUG: add_to_tail_of_timer[1]: 0x402f5588
15(6426) receive_msg: cleaning up
10(6421) SIP Reply (status):
10(6421) version: <SIP/2.0>
10(6421) status: <180>
10(6421) reason: <Ringing>
10(6421) parse_headers: flags=1
10(6421) Found param type 232, <branch> = <z9hG4bK79f6.7d19d563.0>; state=16
10(6421) end of header reached, state=5
10(6421) parse_headers: Via found, flags=1
10(6421) parse_headers: this is the first via
10(6421) After parse_msg...
10(6421) forward_reply: found module tm, passing reply to it
10(6421) DEBUG: t_check: msg id=4 global id=0 T start=0xffffffff
10(6421) parse_headers: flags=17
10(6421) Found param type 232, <branch> = <z9hG4bK6e00fdeaa4180>; state=16
10(6421) end of header reached, state=5
10(6421) parse_headers: Via found, flags=17
10(6421) parse_headers: this is the second via
10(6421) DEBUG: add_param: tag=218f2c81a4
10(6421) end of header reached, state=29
10(6421) DEBUG: get_hdr_field: <To> [44]; uri=[sip:6604000@200.110.2.132]
10(6421) DEBUG: to body [<sip:6604000@200.110.2.132>]
10(6421) get_hdr_field: cseq <CSeq>: <180> <INVITE>
10(6421) parse_headers: flags=4
10(6421) DEBUG: t_reply_matching: hash 28567 label 912101847 branch 0
10(6421) DEBUG: t_reply_matching: reply matched (T=0x402f5450)!
10(6421) DBG: callback type 1, id 5 entered
10(6421) DEBUG: t_check: msg id=4 global id=4 T end=0x402f5450
10(6421) DEBUG: t_on_reply: org. status uas=100, uac[0]=100 local=0 is_invite=1)
10(6421) ->>>>>>>>> T_code=100, new_code=180
10(6421) DEBUG: relay_reply: branch=0, save=0, relay=0
10(6421) old size: 472, new size: 410
10(6421) build_res_from_sip_res: copied size: orig:83, new: 21, rest: 389 msg=
SIP/2.0 180 Ringing
Via: SIP/2.0/UDP 10.0.0.236:5060;branch=z9hG4bK6e00fdeaa4180
From: <sip:6603000@200.110.2.132>;tag=6e00fdeaa4
To: <sip:6604000@200.110.2.132>;tag=218f2c81a4
Call-ID: 6e124000-5d1c-fd5d-80ea-0002a40055b2(a)10.0.0.236
CSeq: 180 INVITE
User-Agent: AddPac SIP Gateway
Contact: sip:6604000@200.110.6.58
Content-Length: 0
Record-Route: <sip:6604000@200.110.2.132;ftag=6e00fdeaa4;lr=on>
10(6421) DEBUG: reply relayed. buf=0x80cb900: SIP/2.0 1..., shmem=0x402f6b10: SIP/2.0 1
10(6421) DBG: callback type 7, id 1 entered
10(6421) DEBUG: add_to_tail_of_timer[1]: 0x402f5588
10(6421) receive_msg: cleaning up
12(6423) SIP Request:
12(6423) method: <REGISTER>
12(6423) uri: <sip:200.110.2.132>
12(6423) version: <SIP/2.0>
12(6423) parse_headers: flags=1
12(6423) Found param type 232, <branch> = <z9hG4bK2f003c00a422890>; state=16
12(6423) end of header reached, state=5
12(6423) parse_headers: Via found, flags=1
12(6423) parse_headers: this is the first via
12(6423) After parse_msg...
12(6423) preparing to run routing scripts...
12(6423) DEBUG : is_maxfwd_present: searching for max_forwards header
12(6423) parse_headers: flags=128
12(6423) end of header reached, state=8
12(6423) DEBUG: get_hdr_field: <To> [27]; uri=[sip:6600020@200.110.2.132]
12(6423) DEBUG: to body [sip:6600020@200.110.2.132
]
12(6423) get_hdr_field: cseq <CSeq>: <22890> <REGISTER>
12(6423) DEBUG: get_hdr_body : content_length=0
12(6423) DEBUG: is_maxfwd_present: value = 70
12(6423) DEBUG: add_param: tag=2f003c00a4
12(6423) end of header reached, state=29
12(6423) parse_headers: flags=256
12(6423) found end of header
12(6423) find_first_route(): No Route headers found
12(6423) loose_route(): There is no Route HF
12(6423) check_self - checking if host==us: 13==9 && [200.110.2.132] ==
[127.0.0.1]
12(6423) check_self - checking if port 5060 matches port 5060
12(6423) check_self - checking if host==us: 13==13 && [200.110.2.132] ==
[200.110.2.132]
12(6423) check_self - checking if port 5060 matches port 5060
12(6423) check_nonce(): comparing [40c5e31099e63fbafaee2c72c460ad2f587a5354] and
[40c5e31099e63fbafaee2c72c460ad2f587a5354]
12(6423) radius_authorize_sterman(): Success
12(6423) save_rpid(): rpid value is ''
12(6423) parse_headers: flags=-1
12(6423) parse_headers: flags=-1
12(6423) check_via_address(10.0.0.236, 10.0.0.236, 0)
12(6423) receive_msg: cleaning up
13(6424) SIP Request:
13(6424) method: <REGISTER>
13(6424) uri: <sip:200.110.2.132>
13(6424) version: <SIP/2.0>
13(6424) parse_headers: flags=1
13(6424) Found param type 232, <branch> = <z9hG4bK2f003c00a422891>; state=16
13(6424) end of header reached, state=5
13(6424) parse_headers: Via found, flags=1
13(6424) parse_headers: this is the first via
13(6424) After parse_msg...
13(6424) preparing to run routing scripts...
13(6424) DEBUG : is_maxfwd_present: searching for max_forwards header
13(6424) parse_headers: flags=128
13(6424) end of header reached, state=8
13(6424) DEBUG: get_hdr_field: <To> [27]; uri=[sip:6603000@200.110.2.132]
13(6424) DEBUG: to body [sip:6603000@200.110.2.132
]
13(6424) get_hdr_field: cseq <CSeq>: <22891> <REGISTER>
13(6424) DEBUG: get_hdr_body : content_length=0
13(6424) DEBUG: is_maxfwd_present: value = 70
13(6424) DEBUG: add_param: tag=2f003c00a4
13(6424) end of header reached, state=29
13(6424) parse_headers: flags=256
13(6424) found end of header
13(6424) find_first_route(): No Route headers found
13(6424) loose_route(): There is no Route HF
13(6424) check_self - checking if host==us: 13==9 && [200.110.2.132] ==
[127.0.0.1]
13(6424) check_self - checking if port 5060 matches port 5060
13(6424) check_self - checking if host==us: 13==13 && [200.110.2.132] ==
[200.110.2.132]
13(6424) check_self - checking if port 5060 matches port 5060
13(6424) check_nonce(): comparing [40c5e31099e63fbafaee2c72c460ad2f587a5354] and
[40c5e31099e63fbafaee2c72c460ad2f587a5354]
13(6424) radius_authorize_sterman(): Success
13(6424) save_rpid(): rpid value is ''
13(6424) parse_headers: flags=-1
13(6424) parse_headers: flags=-1
13(6424) check_via_address(10.0.0.236, 10.0.0.236, 0)
13(6424) receive_msg: cleaning up
18(6429) DEBUG: timer routine:4,tl=0x402f5574 next=(nil)
16(6427) SIP Request:
16(6427) method: <REGISTER>
16(6427) uri: <sip:200.110.2.132>
16(6427) version: <SIP/2.0>
16(6427) parse_headers: flags=1
16(6427) Found param type 232, <branch> = <z9hG4bK2f003c00a422892>; state=16
16(6427) end of header reached, state=5
16(6427) parse_headers: Via found, flags=1
16(6427) parse_headers: this is the first via
16(6427) After parse_msg...
16(6427) preparing to run routing scripts...
16(6427) DEBUG : is_maxfwd_present: searching for max_forwards header
16(6427) parse_headers: flags=128
16(6427) end of header reached, state=8
16(6427) DEBUG: get_hdr_field: <To> [27]; uri=[sip:6600020@200.110.2.132]
16(6427) DEBUG: to body [sip:6600020@200.110.2.132
]
16(6427) get_hdr_field: cseq <CSeq>: <22892> <REGISTER>
16(6427) DEBUG: get_hdr_body : content_length=0
16(6427) DEBUG: is_maxfwd_present: value = 70
16(6427) DEBUG: add_param: tag=2f003c00a4
16(6427) end of header reached, state=29
16(6427) parse_headers: flags=256
16(6427) found end of header
16(6427) find_first_route(): No Route headers found
16(6427) loose_route(): There is no Route HF
16(6427) check_self - checking if host==us: 13==9 && [200.110.2.132] ==
[127.0.0.1]
16(6427) check_self - checking if port 5060 matches port 5060
16(6427) check_self - checking if host==us: 13==13 && [200.110.2.132] ==
[200.110.2.132]
16(6427) check_self - checking if port 5060 matches port 5060
16(6427) check_nonce(): comparing [40c5e31099e63fbafaee2c72c460ad2f587a5354] and
[40c5e31099e63fbafaee2c72c460ad2f587a5354]
16(6427) radius_authorize_sterman(): Success
16(6427) save_rpid(): rpid value is ''
16(6427) parse_headers: flags=-1
16(6427) parse_headers: flags=-1
16(6427) check_via_address(10.0.0.236, 10.0.0.236, 0)
16(6427) receive_msg: cleaning up
10(6421) SIP Request:
10(6421) method: <REGISTER>
10(6421) uri: <sip:200.110.2.132>
10(6421) version: <SIP/2.0>
10(6421) parse_headers: flags=1
10(6421) Found param type 232, <branch> = <z9hG4bK2f003c00a422893>; state=16
10(6421) end of header reached, state=5
10(6421) parse_headers: Via found, flags=1
10(6421) parse_headers: this is the first via
10(6421) After parse_msg...
10(6421) preparing to run routing scripts...
10(6421) DEBUG : is_maxfwd_present: searching for max_forwards header
10(6421) parse_headers: flags=128
10(6421) end of header reached, state=8
10(6421) DEBUG: get_hdr_field: <To> [27]; uri=[sip:6603000@200.110.2.132]
10(6421) DEBUG: to body [sip:6603000@200.110.2.132
]
10(6421) get_hdr_field: cseq <CSeq>: <22893> <REGISTER>
10(6421) DEBUG: get_hdr_body : content_length=0
10(6421) DEBUG: is_maxfwd_present: value = 70
10(6421) DEBUG: add_param: tag=2f003c00a4
10(6421) end of header reached, state=29
10(6421) parse_headers: flags=256
10(6421) found end of header
10(6421) find_first_route(): No Route headers found
10(6421) loose_route(): There is no Route HF
10(6421) check_self - checking if host==us: 13==9 && [200.110.2.132] ==
[127.0.0.1]
10(6421) check_self - checking if port 5060 matches port 5060
10(6421) check_self - checking if host==us: 13==13 && [200.110.2.132] ==
[200.110.2.132]
10(6421) check_self - checking if port 5060 matches port 5060
10(6421) check_nonce(): comparing [40c5e31099e63fbafaee2c72c460ad2f587a5354] and
[40c5e31099e63fbafaee2c72c460ad2f587a5354]
10(6421) radius_authorize_sterman(): Success
10(6421) save_rpid(): rpid value is ''
10(6421) parse_headers: flags=-1
10(6421) parse_headers: flags=-1
10(6421) check_via_address(10.0.0.236, 10.0.0.236, 0)
10(6421) receive_msg: cleaning up
11(6422) SIP Reply (status):
11(6422) version: <SIP/2.0>
11(6422) status: <200>
11(6422) reason: <OK>
11(6422) parse_headers: flags=1
11(6422) Found param type 232, <branch> = <z9hG4bK79f6.7d19d563.0>; state=16
11(6422) end of header reached, state=5
11(6422) parse_headers: Via found, flags=1
11(6422) parse_headers: this is the first via
11(6422) After parse_msg...
11(6422) forward_reply: found module tm, passing reply to it
11(6422) DEBUG: t_check: msg id=6 global id=0 T start=0xffffffff
11(6422) parse_headers: flags=17
11(6422) Found param type 232, <branch> = <z9hG4bK6e00fdeaa4180>; state=16
11(6422) end of header reached, state=5
11(6422) parse_headers: Via found, flags=17
11(6422) parse_headers: this is the second via
11(6422) DEBUG: add_param: tag=218f2c81a4
11(6422) end of header reached, state=29
11(6422) DEBUG: get_hdr_field: <To> [44]; uri=[sip:6604000@200.110.2.132]
11(6422) DEBUG: to body [<sip:6604000@200.110.2.132>]
11(6422) get_hdr_field: cseq <CSeq>: <180> <INVITE>
11(6422) parse_headers: flags=4
11(6422) DEBUG: t_reply_matching: hash 28567 label 912101847 branch 0
11(6422) DEBUG: t_reply_matching: reply matched (T=0x402f5450)!
11(6422) parse_headers: flags=4
11(6422) DBG: callback type 1, id 5 entered
11(6422) parse_headers: flags=4
11(6422) DEBUG: t_check: msg id=6 global id=6 T end=0x402f5450
11(6422) DEBUG: t_on_reply: org. status uas=180, uac[0]=180 local=0 is_invite=1)
11(6422) ->>>>>>>>> T_code=180, new_code=200
11(6422) DEBUG: relay_reply: branch=0, save=0, relay=0
11(6422) old size: 682, new size: 620
11(6422) build_res_from_sip_res: copied size: orig:78, new: 16, rest: 604 msg=
SIP/2.0 200 OK
Via: SIP/2.0/UDP 10.0.0.236:5060;branch=z9hG4bK6e00fdeaa4180
From: <sip:6603000@200.110.2.132>;tag=6e00fdeaa4
To: <sip:6604000@200.110.2.132>;tag=218f2c81a4
Call-ID: 6e124000-5d1c-fd5d-80ea-0002a40055b2(a)10.0.0.236
CSeq: 180 INVITE
Session-Expires: 1800;refresher=uac
User-Agent: AddPac SIP Gateway
Contact: sip:6604000@200.110.6.58
Require: timer
Content-Type: application/sdp
Content-Length: 129
Record-Route: <sip:6604000@200.110.2.132;ftag=6e00fdeaa4;lr=on>
v=0
o=AddpacTechSIP-GW-UserAgent 0 0 IN IP4 200.110.6.58
s=SIP Session
c=IN IP4 200.110.6.58
t=0 0
m=audio 23120 RTP/AVP 4
11(6422) DEBUG: update_totag_set: new totag
11(6422) DEBUG: reply relayed. buf=0x80cbda0: SIP/2.0 2..., shmem=0x402f70d8: SIP/2.0 2
11(6422) DBG: callback type 7, id 1 entered
18(6429) DEBUG: timer routine:1,tl=0x402f5588 next=(nil)