Advertisement
Guest User

kamailio_stacksmash_debug

a guest
May 13th, 2019
73
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
GDB 22.69 KB | None | 0 0
  1. root@208a32d93302:/# gdb /usr/sbin/kamailio /core
  2. GNU gdb (Debian 7.12-6) 7.12.0.20161007-git
  3. Copyright (C) 2016 Free Software Foundation, Inc.
  4. License GPLv3+: GNU GPL version 3 or later <http://gnu.org/licenses/gpl.html>
  5. This is free software: you are free to change and redistribute it.
  6. There is NO WARRANTY, to the extent permitted by law.  Type "show copying"
  7. and "show warranty" for details.
  8. This GDB was configured as "x86_64-linux-gnu".
  9. Type "show configuration" for configuration details.
  10. For bug reporting instructions, please see:
  11. <http://www.gnu.org/software/gdb/bugs/>.
  12. Find the GDB manual and other documentation resources online at:
  13. <http://www.gnu.org/software/gdb/documentation/>.
  14. For help, type "help".
  15. Type "apropos word" to search for commands related to "word"...
  16. Reading symbols from /usr/sbin/kamailio...Reading symbols from /usr/lib/debug/.build-id/cd/7da02a0704d8f73e9b18661b298eb25ba46b0c.debug...done.
  17. done.
  18. [New LWP 18]
  19. [Thread debugging using libthread_db enabled]
  20. Using host libthread_db library "/lib/x86_64-linux-gnu/libthread_db.so.1".
  21. Core was generated by `kamailio -DD -P /var/run/kamailio/kamailio.pid -f /etc/kamailio/kamailio.cfg -m'.
  22. Program terminated with signal SIGABRT, Aborted.
  23. #0  __GI_raise (sig=sig@entry=6) at ../sysdeps/unix/sysv/linux/raise.c:51
  24. 51  ../sysdeps/unix/sysv/linux/raise.c: No such file or directory.
  25. (gdb) bt full
  26. #0  __GI_raise (sig=sig@entry=6) at ../sysdeps/unix/sysv/linux/raise.c:51
  27.         set = {__val = {0, 3467824696768081952, 2314885530818453536, 2314885530818453536, 2314885530818453536, 7738135737532096544, 3689120336222554717, 3975887029563502641, 4120847755002472038,
  28.             8083166874389458992, 3472328296227680288, 2319406834570502192, 2314885530818453552, 2314885530818453536, 2314885530818453536, 8241999043771768864}}
  29.         pid = <optimized out>
  30.         tid = <optimized out>
  31. #1  0x00007f4e47c4d42a in __GI_abort () at abort.c:89
  32.         save_stage = 2
  33.         act = {__sigaction_handler = {sa_handler = 0x62696c2f756e672d, sa_sigaction = 0x62696c2f756e672d}, sa_mask = {__val = {3329341198525361252, 3775481476234768243, 3256155514150859576, 7220176425292424759,
  34.               3276212736508309555, 3473172721157808240, 3544396919740575792, 3689913955078451744, 2314885530818453536, 2314885530818453536, 7091318037929795616, 3257288213055174703, 7955377262162766188,
  35.               3273101403029778293, 751946305075555890, 140720896682208}}, sa_flags = 53, sa_restorer = 0x7ffc230f28e0}
  36.         sigs = {__val = {32, 0 <repeats 15 times>}}
  37. #2  0x00007f4e47c89c00 in __libc_message (do_abort=do_abort@entry=2, fmt=fmt@entry=0x7f4e47d7d544 "*** %s ***: %s terminated\n") at ../sysdeps/posix/libc_fatal.c:175
  38.         ap = {{gp_offset = 32, fp_offset = 2868946920, overflow_arg_area = 0x7ffc230f28f0, reg_save_area = 0x7ffc230f2880}}
  39.         fd = 2
  40.         on_2 = <optimized out>
  41.         list = <optimized out>
  42.         nlist = <optimized out>
  43.         cp = <optimized out>
  44.         written = <optimized out>
  45. #3  0x00007f4e47d12437 in __GI___fortify_fail (msg=msg@entry=0x7f4e47d7d52c "stack smashing detected") at fortify_fail.c:30
  46. No locals.
  47. #4  0x00007f4e47d12400 in __stack_chk_fail () at stack_chk_fail.c:28
  48. No locals.
  49. #5  0x00007f4e3ceb1ca2 in ki_autheph_authenticate (_m=0x7ffc230f3380, susername=0x7ffc230f2ba0, spassword=0x7ffc230f2bb0) at authorize.c:526
  50.         generated_password = "Q44iDBsVazdJh02fEWIcvtFpybA6"
  51.         sgenerated_password = {s = 0x7ffc230f2990 "Q44iDBsVazdJh02fEWIcvtFpybA6AZAx0saSyz2YNfdj2KpNY9Rvgq/PKNBLdnIca+Th9ybGCtMesArbs69gXg== \221f4\370U", len = 88}
  52.         secret_struct = 0x0
  53.         __func__ = "ki_autheph_authenticate"
  54. #6  0x00007f4e459da2f0 in sr_apy_kemi_exec_func (self=0x7f4e4848fa48, args=0x7f4e2b775cc8, idx=332) at apy_kemi.c:489
  55.         fname = {s = 0x7f4e3ceba853 "autheph_authenticate", len = 20}
  56.         i = 2
  57.         ret = 1
  58.         ket = 0x7f4e3d0bd640 <sr_kemi_auth_ephemeral_exports+288>
  59.         vps = {{n = 729205304, s = {s = 0x7f4e2b76ca38 "1576734089:grant", len = 16}}, {n = 729184432, s = {s = 0x7f4e2b7678b0 "1234", len = 4}}, {n = 0, s = {s = 0x0, len = 0}}, {n = 0, s = {s = 0x0,
  60.               len = 0}}, {n = 0, s = {s = 0x0, len = 0}}, {n = 0, s = {s = 0x0, len = 0}}}
  61.         env_P = 0x7f4e45c173e0 <_sr_apy_env>
  62.         lmsg = 0x7ffc230f3380
  63.         __func__ = "sr_apy_kemi_exec_func"
  64. #7  0x00007f4e459c6050 in sr_apy_kemi_exec_func_332 (self=0x7f4e4848fa48, args=0x7f4e2b775cc8) at apy_kemi_export.c:2699
  65. No locals.
  66. #8  0x00007f4e4539a259 in PyCFunction_Call () from /usr/lib/x86_64-linux-gnu/libpython3.5m.so.1.0
  67. No symbol table info available.
  68. #9  0x00007f4e454cb739 in PyEval_EvalFrameEx () from /usr/lib/x86_64-linux-gnu/libpython3.5m.so.1.0
  69. No symbol table info available.
  70. #10 0x00007f4e4558d074 in ?? () from /usr/lib/x86_64-linux-gnu/libpython3.5m.so.1.0
  71. No symbol table info available.
  72. #11 0x00007f4e4558d153 in PyEval_EvalCodeEx () from /usr/lib/x86_64-linux-gnu/libpython3.5m.so.1.0
  73. No symbol table info available.
  74. #12 0x00007f4e45420558 in ?? () from /usr/lib/x86_64-linux-gnu/libpython3.5m.so.1.0
  75. No symbol table info available.
  76. #13 0x00007f4e454fca37 in PyObject_Call () from /usr/lib/x86_64-linux-gnu/libpython3.5m.so.1.0
  77. No symbol table info available.
  78. #14 0x00007f4e4554895c in ?? () from /usr/lib/x86_64-linux-gnu/libpython3.5m.so.1.0
  79. No symbol table info available.
  80. #15 0x00007f4e454fca37 in PyObject_Call () from /usr/lib/x86_64-linux-gnu/libpython3.5m.so.1.0
  81. No symbol table info available.
  82. #16 0x00007f4e4558bb77 in PyEval_CallObjectWithKeywords () from /usr/lib/x86_64-linux-gnu/libpython3.5m.so.1.0
  83. No symbol table info available.
  84. #17 0x00007f4e459f6e73 in apy_exec (_msg=0x7ffc230f3380, fname=0x7f4e45d13d48 "http_event_route", fparam=0x7f4e3188bb28 "xhttp:request", emode=0) at python_exec.c:139
  85.         pFunc = 0x7f4e48599788
  86.         pArgs = 0x7f4e484a4588
  87. ---Type <return> to continue, or q <return> to quit---
  88.         pValue = 0x7f4e2b77d9f0
  89.         pResult = 0x7ffc230f3180
  90.         pmsg = 0x7f4e485752b8
  91.         rval = -1
  92.         bmsg = 0x0
  93.         gstate = PyGILState_LOCKED
  94.         locked = 1
  95.         __func__ = "apy_exec"
  96. #18 0x00007f4e459cd868 in sr_kemi_config_engine_python (msg=0x7ffc230f3380, rtype=513, rname=0x7f4e31a8f540 <xhttp_event_callback>, rparam=0x7ffc230f3290) at apy_kemi.c:93
  97.         ret = -1
  98.         __func__ = "sr_kemi_config_engine_python"
  99. #19 0x000055f83302564c in sr_kemi_route (keng=0x55f833606f60 <_sr_kemi_eng_list>, msg=0x7ffc230f3380, rtype=513, ename=0x7f4e31a8f540 <xhttp_event_callback>, edata=0x7ffc230f3290) at core/kemi.c:2421
  100.         sfbk = 0
  101.         ret = 0
  102. #20 0x00007f4e31884c66 in xhttp_process_request (orig_msg=0x7f4e45d5fd58,
  103.     new_buf=0x7f4e45d4c680 "GET /ws/ HTTP/1.1\r\nVia: SIP/2.0/TCP 172.20.0.1:48694\r\nHost: localhost:5060\r\nConnection: Upgrade\r\nPragma: no-cache\r\nCache-Control: no-cache\r\nUpgrade: websocket\r\nOrigin: http://localhost:4200\r\nSec-WebSo"..., new_len=589) at xhttp_mod.c:305
  104.         ret = 0
  105.         backup_rt = 1
  106.         tmp_msg = {id = 1, pid = 0, tval = {tv_sec = 0, tv_usec = 0}, fwd_send_flags = {f = 0, blst_imask = 0}, rpl_send_flags = {f = 3, blst_imask = 0}, first_line = {type = 1, flags = 2, len = 19, u = {
  107.               request = {method = {
  108.                   s = 0x7f4e45d4c680 "GET /ws/ HTTP/1.1\r\nVia: SIP/2.0/TCP 172.20.0.1:48694\r\nHost: localhost:5060\r\nConnection: Upgrade\r\nPragma: no-cache\r\nCache-Control: no-cache\r\nUpgrade: websocket\r\nOrigin: http://localhost:4200\r\nSec-WebSo"..., len = 3}, uri = {
  109.                   s = 0x7f4e45d4c684 "/ws/ HTTP/1.1\r\nVia: SIP/2.0/TCP 172.20.0.1:48694\r\nHost: localhost:5060\r\nConnection: Upgrade\r\nPragma: no-cache\r\nCache-Control: no-cache\r\nUpgrade: websocket\r\nOrigin: http://localhost:4200\r\nSec-WebSocket"..., len = 4}, version = {
  110.                   s = 0x7f4e45d4c689 "HTTP/1.1\r\nVia: SIP/2.0/TCP 172.20.0.1:48694\r\nHost: localhost:5060\r\nConnection: Upgrade\r\nPragma: no-cache\r\nCache-Control: no-cache\r\nUpgrade: websocket\r\nOrigin: http://localhost:4200\r\nSec-WebSocket-Vers"..., len = 8}, method_value = 32768}, reply = {version = {
  111.                   s = 0x7f4e45d4c680 "GET /ws/ HTTP/1.1\r\nVia: SIP/2.0/TCP 172.20.0.1:48694\r\nHost: localhost:5060\r\nConnection: Upgrade\r\nPragma: no-cache\r\nCache-Control: no-cache\r\nUpgrade: websocket\r\nOrigin: http://localhost:4200\r\nSec-WebSo"..., len = 3}, status = {
  112.                   s = 0x7f4e45d4c684 "/ws/ HTTP/1.1\r\nVia: SIP/2.0/TCP 172.20.0.1:48694\r\nHost: localhost:5060\r\nConnection: Upgrade\r\nPragma: no-cache\r\nCache-Control: no-cache\r\nUpgrade: websocket\r\nOrigin: http://localhost:4200\r\nSec-WebSocket"..., len = 4}, reason = {
  113.                   s = 0x7f4e45d4c689 "HTTP/1.1\r\nVia: SIP/2.0/TCP 172.20.0.1:48694\r\nHost: localhost:5060\r\nConnection: Upgrade\r\nPragma: no-cache\r\nCache-Control: no-cache\r\nUpgrade: websocket\r\nOrigin: http://localhost:4200\r\nSec-WebSocket-Vers"..., len = 8}, statuscode = 32768}}}, via1 = 0x7f4e45d4c938, via2 = 0x0, headers = 0x7f4e45d3c428, last_header = 0x7f4e45d60c98, parsed_flag = 18446744073709551615,
  114.           h_via1 = 0x7f4e45d3c428, h_via2 = 0x0, callid = 0x0, to = 0x0, cseq = 0x0, from = 0x0, contact = 0x0, maxforwards = 0x0, route = 0x0, record_route = 0x0, content_type = 0x0, content_length = 0x0,
  115.           authorization = 0x0, expires = 0x0, proxy_auth = 0x0, supported = 0x0, require = 0x0, proxy_require = 0x0, unsupported = 0x0, allow = 0x0, event = 0x0, accept = 0x0, accept_language = 0x7f4e45d60aa0,
  116.           organization = 0x0, priority = 0x0, subject = 0x0, user_agent = 0x7f4e45d60950, server = 0x0, content_disposition = 0x0, diversion = 0x0, rpid = 0x0, refer_to = 0x0, session_expires = 0x0,
  117.           min_se = 0x0, sipifmatch = 0x0, subscription_state = 0x0, date = 0x0, identity = 0x0, identity_info = 0x0, pai = 0x0, ppi = 0x0, path = 0x0, privacy = 0x0, min_expires = 0x0, body = 0x0,
  118.           eoh = 0x7f4e45d4c8cb "\r\n", unparsed = 0x7f4e45d4c8cb "\r\n", rcv = {src_ip = {af = 2, len = 4, u = {addrl = {16782508, 0}, addr32 = {16782508, 0, 0, 0}, addr16 = {5292, 256, 0, 0, 0, 0, 0, 0},
  119.                 addr = "\254\024\000\001", '\000' <repeats 11 times>}}, dst_ip = {af = 2, len = 4, u = {addrl = {67114156, 0}, addr32 = {67114156, 0, 0, 0}, addr16 = {5292, 1024, 0, 0, 0, 0, 0, 0},
  120.                 addr = "\254\024\000\004", '\000' <repeats 11 times>}}, src_port = 48694, dst_port = 5060, proto_reserved1 = 1, proto_reserved2 = 0, src_su = {s = {sa_family = 2,
  121.                 sa_data = "\276\066\254\024\000\001\000\000\000\000\000\000\000"}, sin = {sin_family = 2, sin_port = 14014, sin_addr = {s_addr = 16782508}, sin_zero = "\000\000\000\000\000\000\000"}, sin6 = {
  122.                 sin6_family = 2, sin6_port = 14014, sin6_flowinfo = 16782508, sin6_addr = {__in6_u = {__u6_addr8 = "\000\000\000\000\000\000\000\000\200@\017#\374\177\000", __u6_addr16 = {0, 0, 0, 0, 16512,
  123.                       8975, 32764, 0}, __u6_addr32 = {0, 0, 588202112, 32764}}}, sin6_scope_id = 855847588}}, bind_address = 0x7f4e45d2ed78, proto = 2 '\002'},
  124.           buf = 0x7f4e45d4c680 "GET /ws/ HTTP/1.1\r\nVia: SIP/2.0/TCP 172.20.0.1:48694\r\nHost: localhost:5060\r\nConnection: Upgrade\r\nPragma: no-cache\r\nCache-Control: no-cache\r\nUpgrade: websocket\r\nOrigin: http://localhost:4200\r\nSec-WebSo"..., len = 589, new_uri = {s = 0x0, len = 0}, dst_uri = {s = 0x0, len = 0}, parsed_uri_ok = 0, parsed_uri = {user = {s = 0x0, len = 0}, passwd = {s = 0x0, len = 0}, host = {
  125.               s = 0x0, len = 0}, port = {s = 0x0, len = 0}, params = {s = 0x0, len = 0}, sip_params = {s = 0x0, len = 0}, headers = {s = 0x0, len = 0}, port_no = 0, proto = 0, type = ERROR_URI_T,
  126.             flags = (unknown: 0), transport = {s = 0x0, len = 0}, ttl = {s = 0x0, len = 0}, user_param = {s = 0x0, len = 0}, maddr = {s = 0x0, len = 0}, method = {s = 0x0, len = 0}, lr = {s = 0x0, len = 0},
  127.             r2 = {s = 0x0, len = 0}, gr = {s = 0x0, len = 0}, transport_val = {s = 0x0, len = 0}, ttl_val = {s = 0x0, len = 0}, user_param_val = {s = 0x0, len = 0}, maddr_val = {s = 0x0, len = 0}, method_val = {
  128.               s = 0x0, len = 0}, lr_val = {s = 0x0, len = 0}, r2_val = {s = 0x0, len = 0}, gr_val = {s = 0x0, len = 0}}, parsed_orig_ruri_ok = 0, parsed_orig_ruri = {user = {s = 0x0, len = 0}, passwd = {
  129.               s = 0x0, len = 0}, host = {s = 0x0, len = 0}, port = {s = 0x0, len = 0}, params = {s = 0x0, len = 0}, sip_params = {s = 0x0, len = 0}, headers = {s = 0x0, len = 0}, port_no = 0, proto = 0,
  130.             type = ERROR_URI_T, flags = (unknown: 0), transport = {s = 0x0, len = 0}, ttl = {s = 0x0, len = 0}, user_param = {s = 0x0, len = 0}, maddr = {s = 0x0, len = 0}, method = {s = 0x0, len = 0}, lr = {
  131.               s = 0x0, len = 0}, r2 = {s = 0x0, len = 0}, gr = {s = 0x0, len = 0}, transport_val = {s = 0x0, len = 0}, ttl_val = {s = 0x0, len = 0}, user_param_val = {s = 0x0, len = 0}, maddr_val = {s = 0x0,
  132.               len = 0}, method_val = {s = 0x0, len = 0}, lr_val = {s = 0x0, len = 0}, r2_val = {s = 0x0, len = 0}, gr_val = {s = 0x0, len = 0}}, add_rm = 0x0, body_lumps = 0x0, reply_lump = 0x0,
  133.           add_to_branch_s = '\000' <repeats 57 times>, add_to_branch_len = 0, hash_index = 0, msg_flags = 0, flags = 0, xflags = {0, 0}, set_global_address = {s = 0x0, len = 0}, set_global_port = {s = 0x0,
  134.             len = 0}, force_send_socket = 0x0, path_vec = {s = 0x0, len = 0}, instance = {s = 0x0, len = 0}, reg_id = 0, ruid = {s = 0x0, len = 0}, location_ua = {s = 0x0, len = 0}, ldv = {flow = {decoded = 0,
  135.               rcv = {src_ip = {af = 0, len = 0, u = {addrl = {0, 0}, addr32 = {0, 0, 0, 0}, addr16 = {0, 0, 0, 0, 0, 0, 0, 0}, addr = '\000' <repeats 15 times>}}, dst_ip = {af = 0, len = 0, u = {addrl = {0, 0},
  136.                     addr32 = {0, 0, 0, 0}, addr16 = {0, 0, 0, 0, 0, 0, 0, 0}, addr = '\000' <repeats 15 times>}}, src_port = 0, dst_port = 0, proto_reserved1 = 0, proto_reserved2 = 0, src_su = {s = {
  137.                     sa_family = 0, sa_data = '\000' <repeats 13 times>}, sin = {sin_family = 0, sin_port = 0, sin_addr = {s_addr = 0}, sin_zero = "\000\000\000\000\000\000\000"}, sin6 = {sin6_family = 0,
  138.                     sin6_port = 0, sin6_flowinfo = 0, sin6_addr = {__in6_u = {__u6_addr8 = '\000' <repeats 15 times>, __u6_addr16 = {0, 0, 0, 0, 0, 0, 0, 0}, __u6_addr32 = {0, 0, 0, 0}}}, sin6_scope_id = 0}},
  139.                 bind_address = 0x0, proto = 0 '\000'}}}}
  140.         msg = 0x7ffc230f3380
  141. ---Type <return> to continue, or q <return> to quit---
  142.         ra_ctx = {rec_lev = 0, run_flags = 0, last_retcode = 0, jmp_env = {{__jmpbuf = {94524499578256, 932864011312, 94524499579120, 94524499578261, 139974155748656, 139974154485776, 140720896686640,
  143.                 140720896685088}, __mask_was_saved = 0, __saved_mask = {__val = {0, 94524521100643, 139974155748600, 64, 139974154485776, 1265608, 139973865872216, 33554432, 139973865872216, 33554432,
  144.                   94524499311987, 16, 0, 140720896684944, 94524498148467, 140720896685120}}}}}
  145.         keng = 0x55f833606f60 <_sr_kemi_eng_list>
  146.         evrtname = {s = 0x7f4e3188bb28 "xhttp:request", len = 13}
  147.         __func__ = "xhttp_process_request"
  148. #21 0x00007f4e3188610f in xhttp_handler (msg=0x7f4e45d5fd58) at xhttp_mod.c:383
  149.         ret = 0
  150.         fake_msg = 0x7f4e45d4c680 "GET /ws/ HTTP/1.1\r\nVia: SIP/2.0/TCP 172.20.0.1:48694\r\nHost: localhost:5060\r\nConnection: Upgrade\r\nPragma: no-cache\r\nCache-Control: no-cache\r\nUpgrade: websocket\r\nOrigin: http://localhost:4200\r\nSec-WebSo"...
  151.         fake_msg_len = 589
  152.         pmatch = {rm_so = 0, rm_eo = 4}
  153.         c = 32 ' '
  154.         __func__ = "xhttp_handler"
  155. #22 0x000055f8330b401e in nonsip_msg_run_hooks (msg=0x7f4e45d5fd58) at core/nonsip_hooks.c:111
  156.         r = 0
  157.         ret = 0
  158. #23 0x000055f8330ffa90 in receive_msg (
  159.     buf=0x55f83480b550 "GET /ws/ HTTP/1.1\r\nHost: localhost:5060\r\nConnection: Upgrade\r\nPragma: no-cache\r\nCache-Control: no-cache\r\nUpgrade: websocket\r\nOrigin: http://localhost:4200\r\nSec-WebSocket-Version: 13\r\nUser-Agent: Mozil"..., len=554, rcv_info=0x7f4e348d9b70) at core/receive.c:263
  160.         msg = 0x7f4e45d5fd58
  161.         ctx = {rec_lev = 1207642960, run_flags = 32590, last_retcode = 881696345, jmp_env = {{__jmpbuf = {139974191819600, 32768, 524, 139974191819520, 2, 65552, 94524499311987, 16},
  162.               __mask_was_saved = 1207642880, __saved_mask = {__val = {139974188539386, 0, 139972984176761, 65536, 65584, 1024, 4604204945409, 128, 16, 541165879515, 2, 0, 532575944825, 140720896688108,
  163.                   139974191819520, 65536}}}}}
  164.         bctx = 0x7ffc230f3d60
  165.         ret = 0
  166.         stats_on = 0
  167.         tvb = {tv_sec = 140720896688108, tv_usec = 139973865872976}
  168.         tve = {tv_sec = 139973865872216, tv_usec = 139973865872216}
  169.         tz = {tz_minuteswest = 857300191, tz_dsttime = 22008}
  170.         diff = 0
  171.         inb = {
  172.           s = 0x55f83480b550 "GET /ws/ HTTP/1.1\r\nHost: localhost:5060\r\nConnection: Upgrade\r\nPragma: no-cache\r\nCache-Control: no-cache\r\nUpgrade: websocket\r\nOrigin: http://localhost:4200\r\nSec-WebSocket-Version: 13\r\nUser-Agent: Mozil"..., len = 554}
  173.         netinfo = {data = {s = 0x1300020001 <error: Cannot access memory at address 0x1300020001>, len = 881696336}, rcv = 0x3, dst = 0x7f4e348d9e54}
  174.         keng = 0x0
  175.         evp = {data = 0x7ffc230f3c80, rcv = 0x7f4e348d9b70, dst = 0x0}
  176.         cidlockidx = 0
  177.         cidlockset = 0
  178.         errsipmsg = 0
  179.         __func__ = "receive_msg"
  180. #24 0x000055f8331a0eb5 in receive_tcp_msg (
  181.     tcpbuf=0x7f4e348d9e50 "GET /ws/ HTTP/1.1\r\nHost: localhost:5060\r\nConnection: Upgrade\r\nPragma: no-cache\r\nCache-Control: no-cache\r\nUpgrade: websocket\r\nOrigin: http://localhost:4200\r\nSec-WebSocket-Version: 13\r\nUser-Agent: Mozil"..., len=554, rcv_info=0x7f4e348d9b70, con=0x7f4e348d9b58) at core/tcp_read.c:1448
  182.         buf = 0x55f83480b550 "GET /ws/ HTTP/1.1\r\nHost: localhost:5060\r\nConnection: Upgrade\r\nPragma: no-cache\r\nCache-Control: no-cache\r\nUpgrade: websocket\r\nOrigin: http://localhost:4200\r\nSec-WebSocket-Version: 13\r\nUser-Agent: Mozil"...
  183.         bsize = 65535
  184.         blen = 65535
  185.         __func__ = "receive_tcp_msg"
  186. #25 0x000055f8331a3192 in tcp_read_req (con=0x7f4e348d9b58, bytes_read=0x7ffc230f3fe8, read_flags=0x7ffc230f3fec) at core/tcp_read.c:1631
  187.         bytes = 554
  188.         total_bytes = 554
  189.         resp = 1
  190.         size = 24
  191.         req = 0x7f4e348d9bd8
  192.         dst = {send_sock = 0x0, to = {s = {sa_family = 41796, sa_data = "\030\063\370U\000\000(@\017#\374\177\000"}, sin = {sin_family = 41796, sin_port = 13080, sin_addr = {s_addr = 22008},
  193.               sin_zero = "(@\017#\374\177\000"}, sin6 = {sin6_family = 41796, sin6_port = 13080, sin6_flowinfo = 22008, sin6_addr = {__in6_u = {__u6_addr8 = "(@\017#\374\177\000\000\b\000\000\000\000\000\000",
  194.                   __u6_addr16 = {16424, 8975, 32764, 0, 8, 0, 0, 0}, __u6_addr32 = {588202024, 32764, 8, 0}}}, sin6_scope_id = 20}}, id = 0, proto = 1 '\001', send_flags = {f = 0, blst_imask = 1}}
  195.         c = 0 '\000'
  196.         ret = 588201776
  197.         __func__ = "tcp_read_req"
  198. ---Type <return> to continue, or q <return> to quit---
  199. #26 0x000055f8331a6147 in handle_io (fm=0x7f4e45d4d300, events=1, idx=-1) at core/tcp_read.c:1804
  200.         ret = 8
  201.         n = 8
  202.         read_flags = 1
  203.         con = 0x7f4e348d9b58
  204.         s = 14
  205.         resp = 0
  206.         t = 0
  207.         __func__ = "handle_io"
  208. #27 0x000055f8331936ad in io_wait_loop_epoll (h=0x55f8336611a0 <io_w>, t=2, repeat=0) at core/io_wait.h:1065
  209.         n = 1
  210.         r = 0
  211.         fm = 0x7f4e45d4d300
  212.         revents = 1
  213.         __func__ = "io_wait_loop_epoll"
  214. #28 0x000055f8331a818f in tcp_receive_loop (unix_sock=29) at core/tcp_read.c:1974
  215.         __func__ = "tcp_receive_loop"
  216. #29 0x000055f83307a3b3 in tcp_init_children () at core/tcp_main.c:4853
  217.         r = 0
  218.         i = 1
  219.         reader_fd_1 = 29
  220.         pid = 0
  221.         si_desc = "tcp receiver (generic)\000\000\337\312\v3\370U\000\000\020\000\000\000\000\000\000\000\001\000\000\000\001", '\000' <repeats 11 times>, "\006\253\024\063\000\000\000\000q(53\000\000\000\000X\263\315EN\177\000\000P\324\060\063\000\000\000\000\000\000\000\000\f\000\000\000\000\000\000\002\000\000\000\000\000\000\000\b\000\000\000\000\000\000\000\002\000\000\000\000s=43\370U\000"
  222.         si = 0x0
  223.         __func__ = "tcp_init_children"
  224. #30 0x000055f832f7486d in main_loop () at main.c:1745
  225.         i = 2
  226.         pid = 11
  227.         si = 0x0
  228.         si_desc = "udp receiver child=1 sock=172.20.0.4:5060\000\000\000q\000\000\000@\276\061\063\370U\000\000Y\254\061\063\370U\000\000\240\274\202\064N\177\000\000\257\000\020\020\000\000\000\000 \355_<N\177\000\000\003\000\000\000N\177\000\000x\005`<N\177\000\000\022\000\000\000\370U\000\000\377\377\377\377\377\377\377\377\000P!\363\350\247\000\253"
  229.         nrprocs = 2
  230.         woneinit = 1
  231.         __func__ = "main_loop"
  232. #31 0x000055f832f7b99d in main (argc=14, argv=0x7ffc230f4688) at main.c:2696
  233.         cfg_stream = 0x55f834440010
  234.         c = -1
  235.         r = 0
  236.         tmp = 0x7ffc230f5f53 ""
  237.         tmp_len = 588203360
  238.         port = 32764
  239.         proto = 588203456
  240.         options = 0x55f8332f5d68 ":f:cm:M:dVIhEeb:l:L:n:vKrRDTN:W:w:t:u:g:P:G:SQ:O:a:A:x:X:Y:"
  241.         ret = -1
  242.         seed = 2226445030
  243.         rfd = 4
  244.         debug_save = 0
  245.         debug_flag = 0
  246.         dont_fork_cnt = 2
  247.         n_lst = 0x0
  248.         p = 0xffffffff <error: Cannot access memory at address 0xffffffff>
  249.         st = {st_dev = 119, st_ino = 150981, st_nlink = 1, st_mode = 16877, st_uid = 103, st_gid = 103, __pad0 = 0, st_rdev = 0, st_size = 4096, st_blksize = 4096, st_blocks = 8, st_atim = {tv_sec = 1557178001,
  250.             tv_nsec = 753551000}, st_mtim = {tv_sec = 1557776643, tv_nsec = 893493000}, st_ctim = {tv_sec = 1557776643, tv_nsec = 893493000}, __glibc_reserved = {0, 0, 0}}
  251.         __func__ = "main"
  252. (gdb)
  253. (gdb)
  254. (gdb)
  255. (gdb) frame 5
  256. #5  0x00007f4e3ceb1ca2 in ki_autheph_authenticate (_m=0x7ffc230f3380, susername=0x7ffc230f2ba0, spassword=0x7ffc230f2bb0) at authorize.c:526
  257. 526 authorize.c: No such file or directory.
  258. (gdb)
  259. #5  0x00007f4e3ceb1ca2 in ki_autheph_authenticate (_m=0x7ffc230f3380, susername=0x7ffc230f2ba0, spassword=0x7ffc230f2bb0) at authorize.c:526
  260. 526 in authorize.c
  261. (gdb)
  262. #5  0x00007f4e3ceb1ca2 in ki_autheph_authenticate (_m=0x7ffc230f3380, susername=0x7ffc230f2ba0, spassword=0x7ffc230f2bb0) at authorize.c:526
  263. 526 in authorize.c
  264. (gdb)
  265. #5  0x00007f4e3ceb1ca2 in ki_autheph_authenticate (_m=0x7ffc230f3380, susername=0x7ffc230f2ba0, spassword=0x7ffc230f2bb0) at authorize.c:526
  266. 526 in authorize.c
  267. (gdb) list
  268. 521 in authorize.c
  269. (gdb) info locals
  270. generated_password = "Q44iDBsVazdJh02fEWIcvtFpybA6"
  271. sgenerated_password = {s = 0x7ffc230f2990 "Q44iDBsVazdJh02fEWIcvtFpybA6AZAx0saSyz2YNfdj2KpNY9Rvgq/PKNBLdnIca+Th9ybGCtMesArbs69gXg== \221f4\370U", len = 88}
  272. secret_struct = 0x0
  273. __func__ = "ki_autheph_authenticate"
  274. (gdb) p *spassword
  275. $1 = {s = 0x7f4e2b7678b0 "1234", len = 4}
  276. (gdb)
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement