Hi,
rtpengine is crashing when it is activated in the branch route.
In normal cases I would do it before relaying the request, but in my scenario, I am trying to call to two UAs behind NAT, the first one registered through WS transport, and the other one via TCP.
The caller is a normal softphone, and I am determining what operations rtpengine needs to do depending on the transport reported by the location records.
Is there any other (better) way of achieving the same?
Thanks,
Carlos
-----------------------------------------------------------------------------------------------------
(gdb) bt full
#0 str_hash (ss=<optimized out>) at str.c:12
x = <optimized out>
s = <optimized out>
ret = <optimized out>
it = {s = <optimized out>, len = 36}
#1 0x00007f0bd6b5cd29 in ?? ()
No symbol table info available.
#2 0x00000000004130aa in call_get (m=0xfc2000, callid=0x7f0bceeef480) at call.c:2523
ret = <optimized out>
#3 call_get_opmode (callid=callid@entry=0x7f0bceeef480, m=m@entry=0xfc2000, opmode=opmode@entry=OP_ANSWER) at call.c:2541
No locals.
#4 0x0000000000421067 in call_offer_answer_ng (input=input@entry=0x7f0bc8001f38, m=0xfc2000, output=output@entry=0x7f0bc8001ed8,
opmode=opmode@entry=OP_ANSWER) at call_interfaces.c:591
sdp = {
s = 0x7f0bceeef772 "v=0\r\no=- 3621027548 3621027549 IN IP4 192.168.3.107\r\ns=pjmedia\r\nc=IN IP4 192.168.3.107\r\nt=0 0\r\nm=audio 4022 RTP/AVP 8 101\r\nc=IN IP4 192.168.3.107\r\na=rtcp:4023 IN IP4 192.168.3.107\r\na=sendrecv\r\na=rtpma"..., len = 267}
fromtag = {s = 0x7f0bceeef94e "35mvKg7Uy1UHQ6:to-tag32:vyDHxZfSgHUXcPVHtWMQcbbwmzenpHTL7:command6:answere", len = 13}
totag = {s = 0x7f0bceeef966 "vyDHxZfSgHUXcPVHtWMQcbbwmzenpHTL7:command6:answere", len = 32}
callid = {
s = 0x7f0bceeef8f5 "d27f350d-c2df-1232-e19b-04011404230113:received-froml3:IP414:189.217.95.230e8:from-tag13:35mvKg7Uy1UHQ6:to-tag32:vyDHxZfSgHUXcPVHtWMQcbbwmzenpHTL7:command6:answere", len = 36}
errstr = 0x429c48 "Incomplete SDP specification"
parsed = {head = 0x7f0bc8001a00, tail = 0x7f0bc8001a00, length = 1}
streams = {head = 0x7f0bc8001c20, tail = 0x7f0bc8001c20, length = 1}
call = <optimized out>
monologue = <optimized out>
ret = <optimized out>
flags = {opmode = OP_ANSWER, received_from_family = {
s = 0x7f0bceeef92c "IP414:189.217.95.230e8:from-tag13:35mvKg7Uy1UHQ6:to-tag32:vyDHxZfSgHUXcPVHtWMQcbbwmzenpHTL7:command6:answere", len = 3},
received_from_address = {
s = 0x7f0bceeef932 "189.217.95.230e8:from-tag13:35mvKg7Uy1UHQ6:to-tag32:vyDHxZfSgHUXcPVHtWMQcbbwmzenpHTL7:command6:answere", len = 14},
media_address = {s = 0x0, len = 0}, transport_protocol_str = {
s = 0x7f0bceeef8e2 "RTP/AVP7:call-id36:d27f350d-c2df-1232-e19b-04011404230113:received-froml3:IP414:189.217.95.230e8:from-tag13:35mvKg7Uy1UHQ6:to-tag32:vyDHxZfSgHUXcPVHtWMQcbbwmzenpHTL7:command6:answere", len = 7}, address_family_str = {s = 0x0, len = 0},
transport_protocol = 0x427880 <transport_protocols>, parsed_received_from = {__in6_u = {__u6_addr8 = '\000' <repeats 15 times>, __u6_addr16 = {
0, 0, 0, 0, 0, 0, 0, 0}, __u6_addr32 = {0, 0, 0, 0}}}, parsed_media_address = {__in6_u = {__u6_addr8 = '\000' <repeats 15 times>,
__u6_addr16 = {0, 0, 0, 0, 0, 0, 0, 0}, __u6_addr32 = {0, 0, 0, 0}}}, direction = {{s = 0x0, len = 0}, {s = 0x0, len = 0}},
address_family = 0, tos = 256, asymmetric = 0, trust_address = -1, replace_origin = -1, replace_sess_conn = -1, ice_remove = -1, ice_force = 0,
ice_force_relay = 0, rtcp_mux_offer = 0, rtcp_mux_demux = 0, rtcp_mux_accept = 0, rtcp_mux_reject = 0, strict_source = 0, media_handover = 0}
chopper = <optimized out>
--