[Sofia-sip-devel] Memory leak when caller sends BYE
Hi, I'm running 1.12.9 and I'm finding that my process leaks memory when it is the caller (sends the INVITE) and it terminates the call (sends the BYE). However, if the callee terminates the call, there's no leak. This is a blocker bug for us, and I don't have a workaround. I would really appreciate any assistance that anyone has to offer. Here's the SOFIA_DEBUG 9 trace from a call where the caller sends the BYE (NOTE: the log was collected on the caller side): nua: nh_create_handle: entering nua: nua_handle_bind: entering nua: nua_invite: entering nua: nua_stack_set_params: entering soa_clone(static::0x1001a120, 0x100177f8, 0x10024280) called soa_set_params(static::0x10025268, ...) called soa_set_user_sdp(static::0x10025268, (nil), 0x10018eff, -1) called soa_set_capability_sdp(static::0x10025268, (nil), 0x10018eff, -1) called su_localinfo: if lo with index 1 su_localinfo: if bridget with index 4 soa_set_params(static::0x10025268, ...) called nta_leg_tcreate(0x100256d8) nua(0x10024280): adding session usage soa_init_offer_answer(static::0x10025268) called soa_generate_offer(static::0x10025268, 0) called soa_static_offer_answer_action(0x10025268, soa_generate_offer): called soa_static(0x10025268, soa_generate_offer): generating local description su_localinfo: if lo with index 1 su_localinfo: if bridget with index 4 soa_static(0x10025268, soa_generate_offer): upgrade with local description soa_sdp_mode_set(0x7f5fd868, (nil), ""): called soa_static(0x10025268, soa_generate_offer): storing local description soa_get_local_sdp(static::0x10025268, [(nil)], [0x7f5ff990], [0x7f5ff994]) called nta: selecting scheme sip tport_tsend(0x10022318) tpn = */192.168.0.152:5060 tport_resolve addrinfo = 192.168.0.152:5060 tport_by_addrinfo(0x10022318): not found by name */192.168.0.152:5060 tport_vsend returned 685 nta: sent INVITE (10828982) to */192.168.0.152:5060 tport_pend(0x10022318): pending 0x100264f0 for udp/192.168.0.151:5060 (already 0) nta: timer set to 32000 ms nta: timer shortened to 500 ms nua(0x10024280): call state changed: init -> calling, sent offer soa_get_local_sdp(static::0x10025268, [0x7f5ff9a8], [0x7f5ff9ac], [(nil)]) called nua: nua_application_event: entering nua(0x10024280): sent signal r_invite tport_wakeup_pri(0x10022318): events IN tport_recv_event(0x10022318) tport_recv_iovec(0x10022318) msg 0x10027d00 from (udp/192.168.0.151:5060) has 281 bytes, veclen = 1 tport_deliver(0x10022318): msg 0x10027d00 (281 bytes) from udp/192.168.0.152:5060/sip next=(nil) nta: received 100 Trying for INVITE (10828982) nta: 100 Trying is going to a transaction nta_outgoing: RTT is 20 ms tport_release(0x10022318): 0x100264f0 by 0x10027328 with 0x10027d00 (preliminary) tport_wakeup_pri(0x10022318): events IN tport_recv_event(0x10022318) tport_recv_iovec(0x10022318) msg 0x10027d00 from (udp/192.168.0.151:5060) has 486 bytes, veclen = 1 tport_deliver(0x10022318): msg 0x10027d00 (486 bytes) from udp/192.168.0.152:5060/sip next=(nil) nta: received 180 Ringing for INVITE (10828982) nta: 180 Ringing is going to a transaction tport_release(0x10022318): 0x100264f0 by 0x10027328 with 0x10027d00 (preliminary) nua: nua_application_event: entering nua(0x10024280): call state changed: calling -> proceeding nua: nua_application_event: entering nta: timer not set tport_wakeup_pri(0x10022318): events IN tport_recv_event(0x10022318) tport_recv_iovec(0x10022318) msg 0x10028510 from (udp/192.168.0.151:5060) has 664 bytes, veclen = 1 tport_deliver(0x10022318): msg 0x10028510 (664 bytes) from udp/192.168.0.152:5060/sip next=(nil) nta: received 200 OK for INVITE (10828982) nta: 200 OK is going to a transaction tport_release(0x10022318): 0x100264f0 by 0x10027328 with 0x10028510 nta: timer set to 32000 ms soa_set_remote_sdp(static::0x10025268, (nil), 0x10028a3c, 132) called soa_process_answer(static::0x10025268) called soa_static_offer_answer_action(0x10025268, soa_process_answer): called soa_sdp_mode_set(0x10026cf8, 0x10028148, ""): called soa_static(0x10025268, soa_process_answer): upgrade codecs with remote description soa_activate(static::0x10025268, (nil)) called nua(0x10024280): INVITE: processed SDP answer in 200 OK nua: nua_application_event: entering soa_activate(static::0x10025268, (nil)) called nta: selecting scheme sip tport_tsend(0x10022318) tpn = */192.168.0.152:5060 tport_resolve addrinfo = 192.168.0.152:5060 tport_by_addrinfo(0x10022318): not found by name */192.168.0.152:5060 tport_vsend returned 306 nta: sent ACK (10828982) to */192.168.0.152:5060 nua(0x10024280): call state changed: proceeding -> ready, received answer soa_get_remote_sdp(static::0x10025268, [0x7f5ff6b0], [0x7f5ff6b4], [(nil)]) called soa_get_params(static::0x10025268, ...) called nua: nua_application_event: entering nua: nua_application_event: entering nua: nua_handle_bind: entering nua: nua_bye: entering nua(0x10024280): sent signal r_bye nua: nua_stack_set_params: entering soa_set_params(static::0x10025268, ...) called soa_terminate(stat
Re: [Sofia-sip-devel] Memory leak when caller sends BYE
This issue should already be fixed in current darcs. In FreeSWITCH our copy of sofia is currently sync'd with darcs and it is more stable than 1.12.9 for sure and likely 1.12.8 as well. Mike Mike On Nov 25, 2008, at 11:58 AM, Jen Chitty wrote: > Hi, > > I'm running 1.12.9 and I'm finding that my process leaks memory > when it is the caller (sends the INVITE) and it terminates the > call (sends the BYE). However, if the callee terminates the > call, there's no leak. > > This is a blocker bug for us, and I don't have a workaround. > I would really appreciate any assistance that anyone has to offer. > > Here's the SOFIA_DEBUG 9 trace from a call where the caller sends > the BYE (NOTE: the log was collected on the caller side): > > nua: nh_create_handle: entering > nua: nua_handle_bind: entering > nua: nua_invite: entering > nua: nua_stack_set_params: entering > soa_clone(static::0x1001a120, 0x100177f8, 0x10024280) called > soa_set_params(static::0x10025268, ...) called > soa_set_user_sdp(static::0x10025268, (nil), 0x10018eff, -1) called > soa_set_capability_sdp(static::0x10025268, (nil), 0x10018eff, -1) > called > su_localinfo: if lo with index 1 > su_localinfo: if bridget with index 4 > soa_set_params(static::0x10025268, ...) called > nta_leg_tcreate(0x100256d8) > nua(0x10024280): adding session usage > soa_init_offer_answer(static::0x10025268) called > soa_generate_offer(static::0x10025268, 0) called > soa_static_offer_answer_action(0x10025268, soa_generate_offer): called > soa_static(0x10025268, soa_generate_offer): generating local > description > su_localinfo: if lo with index 1 > su_localinfo: if bridget with index 4 > soa_static(0x10025268, soa_generate_offer): upgrade with local > description > soa_sdp_mode_set(0x7f5fd868, (nil), ""): called > soa_static(0x10025268, soa_generate_offer): storing local description > soa_get_local_sdp(static::0x10025268, [(nil)], [0x7f5ff990], > [0x7f5ff994]) > called > nta: selecting scheme sip > tport_tsend(0x10022318) tpn = */192.168.0.152:5060 > tport_resolve addrinfo = 192.168.0.152:5060 > tport_by_addrinfo(0x10022318): not found by name */192.168.0.152:5060 > tport_vsend returned 685 > nta: sent INVITE (10828982) to */192.168.0.152:5060 > tport_pend(0x10022318): pending 0x100264f0 for udp/192.168.0.151:5060 > (already 0) > nta: timer set to 32000 ms > nta: timer shortened to 500 ms > nua(0x10024280): call state changed: init -> calling, sent offer > soa_get_local_sdp(static::0x10025268, [0x7f5ff9a8], [0x7f5ff9ac], > [(nil)]) > called > nua: nua_application_event: entering > nua(0x10024280): sent signal r_invite > tport_wakeup_pri(0x10022318): events IN > tport_recv_event(0x10022318) > tport_recv_iovec(0x10022318) msg 0x10027d00 from (udp/ > 192.168.0.151:5060) > has 281 bytes, veclen = 1 > tport_deliver(0x10022318): msg 0x10027d00 (281 bytes) from > udp/192.168.0.152:5060/sip next=(nil) > nta: received 100 Trying for INVITE (10828982) > nta: 100 Trying is going to a transaction > nta_outgoing: RTT is 20 ms > tport_release(0x10022318): 0x100264f0 by 0x10027328 with 0x10027d00 > (preliminary) > tport_wakeup_pri(0x10022318): events IN > tport_recv_event(0x10022318) > tport_recv_iovec(0x10022318) msg 0x10027d00 from (udp/ > 192.168.0.151:5060) > has 486 bytes, veclen = 1 > tport_deliver(0x10022318): msg 0x10027d00 (486 bytes) from > udp/192.168.0.152:5060/sip next=(nil) > nta: received 180 Ringing for INVITE (10828982) > nta: 180 Ringing is going to a transaction > tport_release(0x10022318): 0x100264f0 by 0x10027328 with 0x10027d00 > (preliminary) > nua: nua_application_event: entering > nua(0x10024280): call state changed: calling -> proceeding > nua: nua_application_event: entering > nta: timer not set > tport_wakeup_pri(0x10022318): events IN > tport_recv_event(0x10022318) > tport_recv_iovec(0x10022318) msg 0x10028510 from (udp/ > 192.168.0.151:5060) > has 664 bytes, veclen = 1 > tport_deliver(0x10022318): msg 0x10028510 (664 bytes) from > udp/192.168.0.152:5060/sip next=(nil) > nta: received 200 OK for INVITE (10828982) > nta: 200 OK is going to a transaction > tport_release(0x10022318): 0x100264f0 by 0x10027328 with 0x10028510 > nta: timer set to 32000 ms > soa_set_remote_sdp(static::0x10025268, (nil), 0x10028a3c, 132) called > soa_process_answer(static::0x10025268) called > soa_static_offer_answer_action(0x10025268, soa_process_answer): called > soa_sdp_mode_set(0x10026cf8, 0x10028148, ""): called > soa_static(0x10025268, soa_process_answer): upgrade codecs with remote > description > soa_activate(static::0x10025268, (nil)) called > nua(0x10024280): INVITE: processed SDP answer in 200 OK > nua: nua_application_event: entering > soa_activate(static::0x10025268, (nil)) called > nta: selecting scheme sip > tport_tsend(0x10022318) tpn = */192.168.0.152:5060 > tport_resolve addrinfo = 192.168.0.152:5060 > tport_by_addrinfo(0x10022318): not found by name */192.168.0.152:5060 > tport_vsend returned 306 > nta: sent ACK (10828982) to */192.168.0.15
Re: [Sofia-sip-devel] Memory leak when caller sends BYE
Jen wrote: > I could try grabbing the latest from Darcs, but I'm nervous > about using that, as it's not a "stable release", and I really > do need stability. I second the motion for a fresh stable release. Jim - Original Message From: Michael Jerris <[EMAIL PROTECTED]> To: Jen Chitty <[EMAIL PROTECTED]> Cc: sofia-sip-devel@lists.sourceforge.net Sent: Tuesday, November 25, 2008 11:19:54 AM Subject: Re: [Sofia-sip-devel] Memory leak when caller sends BYE This issue should already be fixed in current darcs. In FreeSWITCH our copy of sofia is currently sync'd with darcs and it is more stable than 1.12.9 for sure and likely 1.12.8 as well. Mike Mike On Nov 25, 2008, at 11:58 AM, Jen Chitty wrote: > Hi, > > I'm running 1.12.9 and I'm finding that my process leaks memory > when it is the caller (sends the INVITE) and it terminates the > call (sends the BYE). However, if the callee terminates the > call, there's no leak. > > This is a blocker bug for us, and I don't have a workaround. > I would really appreciate any assistance that anyone has to offer. > > Here's the SOFIA_DEBUG 9 trace from a call where the caller sends > the BYE (NOTE: the log was collected on the caller side): > > nua: nh_create_handle: entering > nua: nua_handle_bind: entering > nua: nua_invite: entering > nua: nua_stack_set_params: entering > soa_clone(static::0x1001a120, 0x100177f8, 0x10024280) called > soa_set_params(static::0x10025268, ) called > soa_set_user_sdp(static::0x10025268, (nil), 0x10018eff, -1) called > soa_set_capability_sdp(static::0x10025268, (nil), 0x10018eff, -1) > called > su_localinfo: if lo with index 1 > su_localinfo: if bridget with index 4 > soa_set_params(static::0x10025268, ...) called > nta_leg_tcreate(0x100256d8) > nua(0x10024280): adding session usage > soa_init_offer_answer(static::0x10025268) called > soa_generate_offer(static::0x10025268, 0) called > soa_static_offer_answer_action(0x10025268, soa_generate_offer): called > soa_static(0x10025268, soa_generate_offer): generating local > description > su_localinfo: if lo with index 1 > su_localinfo: if bridget with index 4 > soa_static(0x10025268, soa_generate_offer): upgrade with local > description > soa_sdp_mode_set(0x7f5fd868, (nil), ""): called > soa_static(0x10025268, soa_generate_offer): storing local description > soa_get_local_sdp(static::0x10025268, [(nil)], [0x7f5ff990], > [0x7f5ff994]) > called > nta: selecting scheme sip > tport_tsend(0x10022318) tpn = */192.168.0.152:5060 > tport_resolve addrinfo = 192.168.0.152:5060 > tport_by_addrinfo(0x10022318): not found by name */192.168.0.152:5060 > tport_vsend returned 685 > nta: sent INVITE (10828982) to */192.168.0.152:5060 > tport_pend(0x10022318): pending 0x100264f0 for udp/192.168.0.151:5060 > (already 0) > nta: timer set to 32000 ms > nta: timer shortened to 500 ms > nua(0x10024280): call state changed: init -> calling, sent offer > soa_get_local_sdp(static::0x10025268, [0x7f5ff9a8], [0x7f5ff9ac], > [(nil)]) > called > nua: nua_application_event: entering > nua(0x10024280): sent signal r_invite > tport_wakeup_pri(0x10022318): events IN > tport_recv_event(0x10022318) > tport_recv_iovec(0x10022318) msg 0x10027d00 from (udp/ > 192.168.0.151:5060) > has 281 bytes, veclen = 1 > tport_deliver(0x10022318): msg 0x10027d00 (281 bytes) from > udp/192.168.0.152:5060/sip next=(nil) > nta: received 100 Trying for INVITE (10828982) > nta: 100 Trying is going to a transaction > nta_outgoing: RTT is 20 ms > tport_release(0x10022318): 0x100264f0 by 0x10027328 with 0x10027d00 > (preliminary) > tport_wakeup_pri(0x10022318): events IN > tport_recv_event(0x10022318) > tport_recv_iovec(0x10022318) msg 0x10027d00 from (udp/ > 192.168.0.151:5060) > has 486 bytes, veclen = 1 > tport_deliver(0x10022318): msg 0x10027d00 (486 bytes) from > udp/192.168.0.152:5060/sip next=(nil) > nta: received 180 Ringing for INVITE (10828982) > nta: 180 Ringing is going to a transaction > tport_release(0x10022318): 0x100264f0 by 0x10027328 with 0x10027d00 > (preliminary) > nua: nua_application_event: entering > nua(0x10024280): call state changed: calling -> proceeding > nua: nua_application_event: entering > nta: timer not set > tport_wakeup_pri(0x10022318): events IN > tport_recv_event(0x10022318) > tport_recv_iovec(0x10022318) msg 0x10028510 from (udp/ > 192.168.0.151:5060) > has 664 bytes, veclen = 1 > tport_deliver(0x10022318): msg 0x10028510 (664 bytes) from > udp/192.168.0.152:5060/sip next=(nil) > nta: received 200 OK for INVITE (10828982) > nta: 200 OK is going to a transaction > tport_release(0x10022318): 0x100264f0 by
Re: [Sofia-sip-devel] Memory leak when caller sends BYE
I'm still seeing this problem with 1.12.10. :( --Jen Michael Jerris 11/25/2008 09:19 AM To: Jen Chitty cc: sofia-sip-devel@lists.sourceforge.net Subject:Re: [Sofia-sip-devel] Memory leak when caller sends BYE This issue should already be fixed in current darcs. In FreeSWITCH our copy of sofia is currently sync'd with darcs and it is more stable than 1.12.9 for sure and likely 1.12.8 as well. Mike Mike On Nov 25, 2008, at 11:58 AM, Jen Chitty wrote: > Hi, > > I'm running 1.12.9 and I'm finding that my process leaks memory > when it is the caller (sends the INVITE) and it terminates the > call (sends the BYE). However, if the callee terminates the > call, there's no leak. > > This is a blocker bug for us, and I don't have a workaround. > I would really appreciate any assistance that anyone has to offer. > > Here's the SOFIA_DEBUG 9 trace from a call where the caller sends > the BYE (NOTE: the log was collected on the caller side): > > nua: nh_create_handle: entering > nua: nua_handle_bind: entering > nua: nua_invite: entering > nua: nua_stack_set_params: entering > soa_clone(static::0x1001a120, 0x100177f8, 0x10024280) called > soa_set_params(static::0x10025268, ...) called > soa_set_user_sdp(static::0x10025268, (nil), 0x10018eff, -1) called > soa_set_capability_sdp(static::0x10025268, (nil), 0x10018eff, -1) > called > su_localinfo: if lo with index 1 > su_localinfo: if bridget with index 4 > soa_set_params(static::0x10025268, ...) called > nta_leg_tcreate(0x100256d8) > nua(0x10024280): adding session usage > soa_init_offer_answer(static::0x10025268) called > soa_generate_offer(static::0x10025268, 0) called > soa_static_offer_answer_action(0x10025268, soa_generate_offer): called > soa_static(0x10025268, soa_generate_offer): generating local > description > su_localinfo: if lo with index 1 > su_localinfo: if bridget with index 4 > soa_static(0x10025268, soa_generate_offer): upgrade with local > description > soa_sdp_mode_set(0x7f5fd868, (nil), ""): called > soa_static(0x10025268, soa_generate_offer): storing local description > soa_get_local_sdp(static::0x10025268, [(nil)], [0x7f5ff990], > [0x7f5ff994]) > called > nta: selecting scheme sip > tport_tsend(0x10022318) tpn = */192.168.0.152:5060 > tport_resolve addrinfo = 192.168.0.152:5060 > tport_by_addrinfo(0x10022318): not found by name */192.168.0.152:5060 > tport_vsend returned 685 > nta: sent INVITE (10828982) to */192.168.0.152:5060 > tport_pend(0x10022318): pending 0x100264f0 for udp/192.168.0.151:5060 > (already 0) > nta: timer set to 32000 ms > nta: timer shortened to 500 ms > nua(0x10024280): call state changed: init -> calling, sent offer > soa_get_local_sdp(static::0x10025268, [0x7f5ff9a8], [0x7f5ff9ac], > [(nil)]) > called > nua: nua_application_event: entering > nua(0x10024280): sent signal r_invite > tport_wakeup_pri(0x10022318): events IN > tport_recv_event(0x10022318) > tport_recv_iovec(0x10022318) msg 0x10027d00 from (udp/ > 192.168.0.151:5060) > has 281 bytes, veclen = 1 > tport_deliver(0x10022318): msg 0x10027d00 (281 bytes) from > udp/192.168.0.152:5060/sip next=(nil) > nta: received 100 Trying for INVITE (10828982) > nta: 100 Trying is going to a transaction > nta_outgoing: RTT is 20 ms > tport_release(0x10022318): 0x100264f0 by 0x10027328 with 0x10027d00 > (preliminary) > tport_wakeup_pri(0x10022318): events IN > tport_recv_event(0x10022318) > tport_recv_iovec(0x10022318) msg 0x10027d00 from (udp/ > 192.168.0.151:5060) > has 486 bytes, veclen = 1 > tport_deliver(0x10022318): msg 0x10027d00 (486 bytes) from > udp/192.168.0.152:5060/sip next=(nil) > nta: received 180 Ringing for INVITE (10828982) > nta: 180 Ringing is going to a transaction > tport_release(0x10022318): 0x100264f0 by 0x10027328 with 0x10027d00 > (preliminary) > nua: nua_application_event: entering > nua(0x10024280): call state changed: calling -> proceeding > nua: nua_application_event: entering > nta: timer not set > tport_wakeup_pri(0x10022318): events IN > tport_recv_event(0x10022318) > tport_recv_iovec(0x10022318) msg 0x10028510 from (udp/ > 192.168.0.151:5060) > has 664 bytes, veclen = 1 > tport_deliver(0x10022318): msg 0x10028510 (664 bytes) from > udp/192.168.0.152:5060/sip next=(nil) > nta: received 200 OK for INVITE (10828982) > nta: 200 OK is going to a transaction > tport_release(0x10022318): 0x100264f0 by 0x10027328 with 0x10028510 > nta: timer set to 32000 ms > soa_set_remote_sdp(static::0x10025268, (nil), 0x10028a3c, 132) called > soa_process_answer(static::0x10025268) called > soa_static_offer_answer_action(0x10025268, soa_process_answer): call
Re: [Sofia-sip-devel] Memory leak when caller sends BYE
Ooops. Sorry. What I meant to say was, "Hey, it works great now in 1.12.10! :)" I made a stupid mistake in my build scripts. Sorry. --Jen Jen Chitty 01/28/2009 06:54 PM To: Michael Jerris cc: sofia-sip-devel@lists.sourceforge.net Subject: Re: [Sofia-sip-devel] Memory leak when caller sends BYE I'm still seeing this problem with 1.12.10. :( --Jen Michael Jerris 11/25/2008 09:19 AM To: Jen Chitty cc: sofia-sip-devel@lists.sourceforge.net Subject: Re: [Sofia-sip-devel] Memory leak when caller sends BYE This issue should already be fixed in current darcs. In FreeSWITCH our copy of sofia is currently sync'd with darcs and it is more stable than 1.12.9 for sure and likely 1.12.8 as well. Mike Mike On Nov 25, 2008, at 11:58 AM, Jen Chitty wrote: > Hi, > > I'm running 1.12.9 and I'm finding that my process leaks memory > when it is the caller (sends the INVITE) and it terminates the > call (sends the BYE). However, if the callee terminates the > call, there's no leak. > > This is a blocker bug for us, and I don't have a workaround. > I would really appreciate any assistance that anyone has to offer. > > Here's the SOFIA_DEBUG 9 trace from a call where the caller sends > the BYE (NOTE: the log was collected on the caller side): > > nua: nh_create_handle: entering > nua: nua_handle_bind: entering > nua: nua_invite: entering > nua: nua_stack_set_params: entering > soa_clone(static::0x1001a120, 0x100177f8, 0x10024280) called > soa_set_params(static::0x10025268, ...) called > soa_set_user_sdp(static::0x10025268, (nil), 0x10018eff, -1) called > soa_set_capability_sdp(static::0x10025268, (nil), 0x10018eff, -1) > called > su_localinfo: if lo with index 1 > su_localinfo: if bridget with index 4 > soa_set_params(static::0x10025268, ...) called > nta_leg_tcreate(0x100256d8) > nua(0x10024280): adding session usage > soa_init_offer_answer(static::0x10025268) called > soa_generate_offer(static::0x10025268, 0) called > soa_static_offer_answer_action(0x10025268, soa_generate_offer): called > soa_static(0x10025268, soa_generate_offer): generating local > description > su_localinfo: if lo with index 1 > su_localinfo: if bridget with index 4 > soa_static(0x10025268, soa_generate_offer): upgrade with local > description > soa_sdp_mode_set(0x7f5fd868, (nil), ""): called > soa_static(0x10025268, soa_generate_offer): storing local description > soa_get_local_sdp(static::0x10025268, [(nil)], [0x7f5ff990], > [0x7f5ff994]) > called > nta: selecting scheme sip > tport_tsend(0x10022318) tpn = */192.168.0.152:5060 > tport_resolve addrinfo = 192.168.0.152:5060 > tport_by_addrinfo(0x10022318): not found by name */192.168.0.152:5060 > tport_vsend returned 685 > nta: sent INVITE (10828982) to */192.168.0.152:5060 > tport_pend(0x10022318): pending 0x100264f0 for udp/192.168.0.151:5060 > (already 0) > nta: timer set to 32000 ms > nta: timer shortened to 500 ms > nua(0x10024280): call state changed: init -> calling, sent offer > soa_get_local_sdp(static::0x10025268, [0x7f5ff9a8], [0x7f5ff9ac], > [(nil)]) > called > nua: nua_application_event: entering > nua(0x10024280): sent signal r_invite > tport_wakeup_pri(0x10022318): events IN > tport_recv_event(0x10022318) > tport_recv_iovec(0x10022318) msg 0x10027d00 from (udp/ > 192.168.0.151:5060) > has 281 bytes, veclen = 1 > tport_deliver(0x10022318): msg 0x10027d00 (281 bytes) from > udp/192.168.0.152:5060/sip next=(nil) > nta: received 100 Trying for INVITE (10828982) > nta: 100 Trying is going to a transaction > nta_outgoing: RTT is 20 ms > tport_release(0x10022318): 0x100264f0 by 0x10027328 with 0x10027d00 > (preliminary) > tport_wakeup_pri(0x10022318): events IN > tport_recv_event(0x10022318) > tport_recv_iovec(0x10022318) msg 0x10027d00 from (udp/ > 192.168.0.151:5060) > has 486 bytes, veclen = 1 > tport_deliver(0x10022318): msg 0x10027d00 (486 bytes) from > udp/192.168.0.152:5060/sip next=(nil) > nta: received 180 Ringing for INVITE (10828982) > nta: 180 Ringing is going to a transaction > tport_release(0x10022318): 0x100264f0 by 0x10027328 with 0x10027d00 > (preliminary) > nua: nua_application_event: entering > nua(0x10024280): call state changed: calling -> proceeding > nua: nua_application_event: entering > nta: timer not set > tport_wakeup_pri(0x10022318): events IN > tport_recv_event(0x10022318) > tport_recv_iovec(0x10022318) msg 0x10028510 from (udp/ > 192.168.0.151:5060) > has 664 bytes, veclen = 1 > tport_deliver(0x10022318): msg 0x10028510 (664 bytes) from > udp/192.168.0.152:5060/sip next=(nil) > nta: received 200 OK for INVITE (1082