Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- root@208a32d93302:/# gdb /usr/sbin/kamailio /core
- GNU gdb (Debian 7.12-6) 7.12.0.20161007-git
- Copyright (C) 2016 Free Software Foundation, Inc.
- License GPLv3+: GNU GPL version 3 or later <http://gnu.org/licenses/gpl.html>
- This is free software: you are free to change and redistribute it.
- There is NO WARRANTY, to the extent permitted by law. Type "show copying"
- and "show warranty" for details.
- This GDB was configured as "x86_64-linux-gnu".
- Type "show configuration" for configuration details.
- For bug reporting instructions, please see:
- <http://www.gnu.org/software/gdb/bugs/>.
- Find the GDB manual and other documentation resources online at:
- <http://www.gnu.org/software/gdb/documentation/>.
- For help, type "help".
- Type "apropos word" to search for commands related to "word"...
- Reading symbols from /usr/sbin/kamailio...Reading symbols from /usr/lib/debug/.build-id/cd/7da02a0704d8f73e9b18661b298eb25ba46b0c.debug...done.
- done.
- [New LWP 18]
- [Thread debugging using libthread_db enabled]
- Using host libthread_db library "/lib/x86_64-linux-gnu/libthread_db.so.1".
- Core was generated by `kamailio -DD -P /var/run/kamailio/kamailio.pid -f /etc/kamailio/kamailio.cfg -m'.
- Program terminated with signal SIGABRT, Aborted.
- #0 __GI_raise (sig=sig@entry=6) at ../sysdeps/unix/sysv/linux/raise.c:51
- 51 ../sysdeps/unix/sysv/linux/raise.c: No such file or directory.
- (gdb) bt full
- #0 __GI_raise (sig=sig@entry=6) at ../sysdeps/unix/sysv/linux/raise.c:51
- set = {__val = {0, 3467824696768081952, 2314885530818453536, 2314885530818453536, 2314885530818453536, 7738135737532096544, 3689120336222554717, 3975887029563502641, 4120847755002472038,
- 8083166874389458992, 3472328296227680288, 2319406834570502192, 2314885530818453552, 2314885530818453536, 2314885530818453536, 8241999043771768864}}
- pid = <optimized out>
- tid = <optimized out>
- #1 0x00007f4e47c4d42a in __GI_abort () at abort.c:89
- save_stage = 2
- act = {__sigaction_handler = {sa_handler = 0x62696c2f756e672d, sa_sigaction = 0x62696c2f756e672d}, sa_mask = {__val = {3329341198525361252, 3775481476234768243, 3256155514150859576, 7220176425292424759,
- 3276212736508309555, 3473172721157808240, 3544396919740575792, 3689913955078451744, 2314885530818453536, 2314885530818453536, 7091318037929795616, 3257288213055174703, 7955377262162766188,
- 3273101403029778293, 751946305075555890, 140720896682208}}, sa_flags = 53, sa_restorer = 0x7ffc230f28e0}
- sigs = {__val = {32, 0 <repeats 15 times>}}
- #2 0x00007f4e47c89c00 in __libc_message (do_abort=do_abort@entry=2, fmt=fmt@entry=0x7f4e47d7d544 "*** %s ***: %s terminated\n") at ../sysdeps/posix/libc_fatal.c:175
- ap = {{gp_offset = 32, fp_offset = 2868946920, overflow_arg_area = 0x7ffc230f28f0, reg_save_area = 0x7ffc230f2880}}
- fd = 2
- on_2 = <optimized out>
- list = <optimized out>
- nlist = <optimized out>
- cp = <optimized out>
- written = <optimized out>
- #3 0x00007f4e47d12437 in __GI___fortify_fail (msg=msg@entry=0x7f4e47d7d52c "stack smashing detected") at fortify_fail.c:30
- No locals.
- #4 0x00007f4e47d12400 in __stack_chk_fail () at stack_chk_fail.c:28
- No locals.
- #5 0x00007f4e3ceb1ca2 in ki_autheph_authenticate (_m=0x7ffc230f3380, susername=0x7ffc230f2ba0, spassword=0x7ffc230f2bb0) at authorize.c:526
- generated_password = "Q44iDBsVazdJh02fEWIcvtFpybA6"
- sgenerated_password = {s = 0x7ffc230f2990 "Q44iDBsVazdJh02fEWIcvtFpybA6AZAx0saSyz2YNfdj2KpNY9Rvgq/PKNBLdnIca+Th9ybGCtMesArbs69gXg== \221f4\370U", len = 88}
- secret_struct = 0x0
- __func__ = "ki_autheph_authenticate"
- #6 0x00007f4e459da2f0 in sr_apy_kemi_exec_func (self=0x7f4e4848fa48, args=0x7f4e2b775cc8, idx=332) at apy_kemi.c:489
- fname = {s = 0x7f4e3ceba853 "autheph_authenticate", len = 20}
- i = 2
- ret = 1
- ket = 0x7f4e3d0bd640 <sr_kemi_auth_ephemeral_exports+288>
- vps = {{n = 729205304, s = {s = 0x7f4e2b76ca38 "1576734089:grant", len = 16}}, {n = 729184432, s = {s = 0x7f4e2b7678b0 "1234", len = 4}}, {n = 0, s = {s = 0x0, len = 0}}, {n = 0, s = {s = 0x0,
- len = 0}}, {n = 0, s = {s = 0x0, len = 0}}, {n = 0, s = {s = 0x0, len = 0}}}
- env_P = 0x7f4e45c173e0 <_sr_apy_env>
- lmsg = 0x7ffc230f3380
- __func__ = "sr_apy_kemi_exec_func"
- #7 0x00007f4e459c6050 in sr_apy_kemi_exec_func_332 (self=0x7f4e4848fa48, args=0x7f4e2b775cc8) at apy_kemi_export.c:2699
- No locals.
- #8 0x00007f4e4539a259 in PyCFunction_Call () from /usr/lib/x86_64-linux-gnu/libpython3.5m.so.1.0
- No symbol table info available.
- #9 0x00007f4e454cb739 in PyEval_EvalFrameEx () from /usr/lib/x86_64-linux-gnu/libpython3.5m.so.1.0
- No symbol table info available.
- #10 0x00007f4e4558d074 in ?? () from /usr/lib/x86_64-linux-gnu/libpython3.5m.so.1.0
- No symbol table info available.
- #11 0x00007f4e4558d153 in PyEval_EvalCodeEx () from /usr/lib/x86_64-linux-gnu/libpython3.5m.so.1.0
- No symbol table info available.
- #12 0x00007f4e45420558 in ?? () from /usr/lib/x86_64-linux-gnu/libpython3.5m.so.1.0
- No symbol table info available.
- #13 0x00007f4e454fca37 in PyObject_Call () from /usr/lib/x86_64-linux-gnu/libpython3.5m.so.1.0
- No symbol table info available.
- #14 0x00007f4e4554895c in ?? () from /usr/lib/x86_64-linux-gnu/libpython3.5m.so.1.0
- No symbol table info available.
- #15 0x00007f4e454fca37 in PyObject_Call () from /usr/lib/x86_64-linux-gnu/libpython3.5m.so.1.0
- No symbol table info available.
- #16 0x00007f4e4558bb77 in PyEval_CallObjectWithKeywords () from /usr/lib/x86_64-linux-gnu/libpython3.5m.so.1.0
- No symbol table info available.
- #17 0x00007f4e459f6e73 in apy_exec (_msg=0x7ffc230f3380, fname=0x7f4e45d13d48 "http_event_route", fparam=0x7f4e3188bb28 "xhttp:request", emode=0) at python_exec.c:139
- pFunc = 0x7f4e48599788
- pArgs = 0x7f4e484a4588
- ---Type <return> to continue, or q <return> to quit---
- pValue = 0x7f4e2b77d9f0
- pResult = 0x7ffc230f3180
- pmsg = 0x7f4e485752b8
- rval = -1
- bmsg = 0x0
- gstate = PyGILState_LOCKED
- locked = 1
- __func__ = "apy_exec"
- #18 0x00007f4e459cd868 in sr_kemi_config_engine_python (msg=0x7ffc230f3380, rtype=513, rname=0x7f4e31a8f540 <xhttp_event_callback>, rparam=0x7ffc230f3290) at apy_kemi.c:93
- ret = -1
- __func__ = "sr_kemi_config_engine_python"
- #19 0x000055f83302564c in sr_kemi_route (keng=0x55f833606f60 <_sr_kemi_eng_list>, msg=0x7ffc230f3380, rtype=513, ename=0x7f4e31a8f540 <xhttp_event_callback>, edata=0x7ffc230f3290) at core/kemi.c:2421
- sfbk = 0
- ret = 0
- #20 0x00007f4e31884c66 in xhttp_process_request (orig_msg=0x7f4e45d5fd58,
- new_buf=0x7f4e45d4c680 "GET /ws/ HTTP/1.1\r\nVia: SIP/2.0/TCP 172.20.0.1:48694\r\nHost: localhost:5060\r\nConnection: Upgrade\r\nPragma: no-cache\r\nCache-Control: no-cache\r\nUpgrade: websocket\r\nOrigin: http://localhost:4200\r\nSec-WebSo"..., new_len=589) at xhttp_mod.c:305
- ret = 0
- backup_rt = 1
- tmp_msg = {id = 1, pid = 0, tval = {tv_sec = 0, tv_usec = 0}, fwd_send_flags = {f = 0, blst_imask = 0}, rpl_send_flags = {f = 3, blst_imask = 0}, first_line = {type = 1, flags = 2, len = 19, u = {
- request = {method = {
- s = 0x7f4e45d4c680 "GET /ws/ HTTP/1.1\r\nVia: SIP/2.0/TCP 172.20.0.1:48694\r\nHost: localhost:5060\r\nConnection: Upgrade\r\nPragma: no-cache\r\nCache-Control: no-cache\r\nUpgrade: websocket\r\nOrigin: http://localhost:4200\r\nSec-WebSo"..., len = 3}, uri = {
- s = 0x7f4e45d4c684 "/ws/ HTTP/1.1\r\nVia: SIP/2.0/TCP 172.20.0.1:48694\r\nHost: localhost:5060\r\nConnection: Upgrade\r\nPragma: no-cache\r\nCache-Control: no-cache\r\nUpgrade: websocket\r\nOrigin: http://localhost:4200\r\nSec-WebSocket"..., len = 4}, version = {
- s = 0x7f4e45d4c689 "HTTP/1.1\r\nVia: SIP/2.0/TCP 172.20.0.1:48694\r\nHost: localhost:5060\r\nConnection: Upgrade\r\nPragma: no-cache\r\nCache-Control: no-cache\r\nUpgrade: websocket\r\nOrigin: http://localhost:4200\r\nSec-WebSocket-Vers"..., len = 8}, method_value = 32768}, reply = {version = {
- s = 0x7f4e45d4c680 "GET /ws/ HTTP/1.1\r\nVia: SIP/2.0/TCP 172.20.0.1:48694\r\nHost: localhost:5060\r\nConnection: Upgrade\r\nPragma: no-cache\r\nCache-Control: no-cache\r\nUpgrade: websocket\r\nOrigin: http://localhost:4200\r\nSec-WebSo"..., len = 3}, status = {
- s = 0x7f4e45d4c684 "/ws/ HTTP/1.1\r\nVia: SIP/2.0/TCP 172.20.0.1:48694\r\nHost: localhost:5060\r\nConnection: Upgrade\r\nPragma: no-cache\r\nCache-Control: no-cache\r\nUpgrade: websocket\r\nOrigin: http://localhost:4200\r\nSec-WebSocket"..., len = 4}, reason = {
- s = 0x7f4e45d4c689 "HTTP/1.1\r\nVia: SIP/2.0/TCP 172.20.0.1:48694\r\nHost: localhost:5060\r\nConnection: Upgrade\r\nPragma: no-cache\r\nCache-Control: no-cache\r\nUpgrade: websocket\r\nOrigin: http://localhost:4200\r\nSec-WebSocket-Vers"..., len = 8}, statuscode = 32768}}}, via1 = 0x7f4e45d4c938, via2 = 0x0, headers = 0x7f4e45d3c428, last_header = 0x7f4e45d60c98, parsed_flag = 18446744073709551615,
- h_via1 = 0x7f4e45d3c428, h_via2 = 0x0, callid = 0x0, to = 0x0, cseq = 0x0, from = 0x0, contact = 0x0, maxforwards = 0x0, route = 0x0, record_route = 0x0, content_type = 0x0, content_length = 0x0,
- authorization = 0x0, expires = 0x0, proxy_auth = 0x0, supported = 0x0, require = 0x0, proxy_require = 0x0, unsupported = 0x0, allow = 0x0, event = 0x0, accept = 0x0, accept_language = 0x7f4e45d60aa0,
- organization = 0x0, priority = 0x0, subject = 0x0, user_agent = 0x7f4e45d60950, server = 0x0, content_disposition = 0x0, diversion = 0x0, rpid = 0x0, refer_to = 0x0, session_expires = 0x0,
- min_se = 0x0, sipifmatch = 0x0, subscription_state = 0x0, date = 0x0, identity = 0x0, identity_info = 0x0, pai = 0x0, ppi = 0x0, path = 0x0, privacy = 0x0, min_expires = 0x0, body = 0x0,
- eoh = 0x7f4e45d4c8cb "\r\n", unparsed = 0x7f4e45d4c8cb "\r\n", rcv = {src_ip = {af = 2, len = 4, u = {addrl = {16782508, 0}, addr32 = {16782508, 0, 0, 0}, addr16 = {5292, 256, 0, 0, 0, 0, 0, 0},
- addr = "\254\024\000\001", '\000' <repeats 11 times>}}, dst_ip = {af = 2, len = 4, u = {addrl = {67114156, 0}, addr32 = {67114156, 0, 0, 0}, addr16 = {5292, 1024, 0, 0, 0, 0, 0, 0},
- addr = "\254\024\000\004", '\000' <repeats 11 times>}}, src_port = 48694, dst_port = 5060, proto_reserved1 = 1, proto_reserved2 = 0, src_su = {s = {sa_family = 2,
- sa_data = "\276\066\254\024\000\001\000\000\000\000\000\000\000"}, sin = {sin_family = 2, sin_port = 14014, sin_addr = {s_addr = 16782508}, sin_zero = "\000\000\000\000\000\000\000"}, sin6 = {
- sin6_family = 2, sin6_port = 14014, sin6_flowinfo = 16782508, sin6_addr = {__in6_u = {__u6_addr8 = "\000\000\000\000\000\000\000\000\200@\017#\374\177\000", __u6_addr16 = {0, 0, 0, 0, 16512,
- 8975, 32764, 0}, __u6_addr32 = {0, 0, 588202112, 32764}}}, sin6_scope_id = 855847588}}, bind_address = 0x7f4e45d2ed78, proto = 2 '\002'},
- buf = 0x7f4e45d4c680 "GET /ws/ HTTP/1.1\r\nVia: SIP/2.0/TCP 172.20.0.1:48694\r\nHost: localhost:5060\r\nConnection: Upgrade\r\nPragma: no-cache\r\nCache-Control: no-cache\r\nUpgrade: websocket\r\nOrigin: http://localhost:4200\r\nSec-WebSo"..., len = 589, new_uri = {s = 0x0, len = 0}, dst_uri = {s = 0x0, len = 0}, parsed_uri_ok = 0, parsed_uri = {user = {s = 0x0, len = 0}, passwd = {s = 0x0, len = 0}, host = {
- s = 0x0, len = 0}, port = {s = 0x0, len = 0}, params = {s = 0x0, len = 0}, sip_params = {s = 0x0, len = 0}, headers = {s = 0x0, len = 0}, port_no = 0, proto = 0, type = ERROR_URI_T,
- flags = (unknown: 0), transport = {s = 0x0, len = 0}, ttl = {s = 0x0, len = 0}, user_param = {s = 0x0, len = 0}, maddr = {s = 0x0, len = 0}, method = {s = 0x0, len = 0}, lr = {s = 0x0, len = 0},
- r2 = {s = 0x0, len = 0}, gr = {s = 0x0, len = 0}, transport_val = {s = 0x0, len = 0}, ttl_val = {s = 0x0, len = 0}, user_param_val = {s = 0x0, len = 0}, maddr_val = {s = 0x0, len = 0}, method_val = {
- s = 0x0, len = 0}, lr_val = {s = 0x0, len = 0}, r2_val = {s = 0x0, len = 0}, gr_val = {s = 0x0, len = 0}}, parsed_orig_ruri_ok = 0, parsed_orig_ruri = {user = {s = 0x0, len = 0}, passwd = {
- s = 0x0, len = 0}, host = {s = 0x0, len = 0}, port = {s = 0x0, len = 0}, params = {s = 0x0, len = 0}, sip_params = {s = 0x0, len = 0}, headers = {s = 0x0, len = 0}, port_no = 0, proto = 0,
- type = ERROR_URI_T, flags = (unknown: 0), transport = {s = 0x0, len = 0}, ttl = {s = 0x0, len = 0}, user_param = {s = 0x0, len = 0}, maddr = {s = 0x0, len = 0}, method = {s = 0x0, len = 0}, lr = {
- s = 0x0, len = 0}, r2 = {s = 0x0, len = 0}, gr = {s = 0x0, len = 0}, transport_val = {s = 0x0, len = 0}, ttl_val = {s = 0x0, len = 0}, user_param_val = {s = 0x0, len = 0}, maddr_val = {s = 0x0,
- len = 0}, method_val = {s = 0x0, len = 0}, lr_val = {s = 0x0, len = 0}, r2_val = {s = 0x0, len = 0}, gr_val = {s = 0x0, len = 0}}, add_rm = 0x0, body_lumps = 0x0, reply_lump = 0x0,
- add_to_branch_s = '\000' <repeats 57 times>, add_to_branch_len = 0, hash_index = 0, msg_flags = 0, flags = 0, xflags = {0, 0}, set_global_address = {s = 0x0, len = 0}, set_global_port = {s = 0x0,
- len = 0}, force_send_socket = 0x0, path_vec = {s = 0x0, len = 0}, instance = {s = 0x0, len = 0}, reg_id = 0, ruid = {s = 0x0, len = 0}, location_ua = {s = 0x0, len = 0}, ldv = {flow = {decoded = 0,
- rcv = {src_ip = {af = 0, len = 0, u = {addrl = {0, 0}, addr32 = {0, 0, 0, 0}, addr16 = {0, 0, 0, 0, 0, 0, 0, 0}, addr = '\000' <repeats 15 times>}}, dst_ip = {af = 0, len = 0, u = {addrl = {0, 0},
- addr32 = {0, 0, 0, 0}, addr16 = {0, 0, 0, 0, 0, 0, 0, 0}, addr = '\000' <repeats 15 times>}}, src_port = 0, dst_port = 0, proto_reserved1 = 0, proto_reserved2 = 0, src_su = {s = {
- sa_family = 0, sa_data = '\000' <repeats 13 times>}, sin = {sin_family = 0, sin_port = 0, sin_addr = {s_addr = 0}, sin_zero = "\000\000\000\000\000\000\000"}, sin6 = {sin6_family = 0,
- sin6_port = 0, sin6_flowinfo = 0, sin6_addr = {__in6_u = {__u6_addr8 = '\000' <repeats 15 times>, __u6_addr16 = {0, 0, 0, 0, 0, 0, 0, 0}, __u6_addr32 = {0, 0, 0, 0}}}, sin6_scope_id = 0}},
- bind_address = 0x0, proto = 0 '\000'}}}}
- msg = 0x7ffc230f3380
- ---Type <return> to continue, or q <return> to quit---
- ra_ctx = {rec_lev = 0, run_flags = 0, last_retcode = 0, jmp_env = {{__jmpbuf = {94524499578256, 932864011312, 94524499579120, 94524499578261, 139974155748656, 139974154485776, 140720896686640,
- 140720896685088}, __mask_was_saved = 0, __saved_mask = {__val = {0, 94524521100643, 139974155748600, 64, 139974154485776, 1265608, 139973865872216, 33554432, 139973865872216, 33554432,
- 94524499311987, 16, 0, 140720896684944, 94524498148467, 140720896685120}}}}}
- keng = 0x55f833606f60 <_sr_kemi_eng_list>
- evrtname = {s = 0x7f4e3188bb28 "xhttp:request", len = 13}
- __func__ = "xhttp_process_request"
- #21 0x00007f4e3188610f in xhttp_handler (msg=0x7f4e45d5fd58) at xhttp_mod.c:383
- ret = 0
- fake_msg = 0x7f4e45d4c680 "GET /ws/ HTTP/1.1\r\nVia: SIP/2.0/TCP 172.20.0.1:48694\r\nHost: localhost:5060\r\nConnection: Upgrade\r\nPragma: no-cache\r\nCache-Control: no-cache\r\nUpgrade: websocket\r\nOrigin: http://localhost:4200\r\nSec-WebSo"...
- fake_msg_len = 589
- pmatch = {rm_so = 0, rm_eo = 4}
- c = 32 ' '
- __func__ = "xhttp_handler"
- #22 0x000055f8330b401e in nonsip_msg_run_hooks (msg=0x7f4e45d5fd58) at core/nonsip_hooks.c:111
- r = 0
- ret = 0
- #23 0x000055f8330ffa90 in receive_msg (
- buf=0x55f83480b550 "GET /ws/ HTTP/1.1\r\nHost: localhost:5060\r\nConnection: Upgrade\r\nPragma: no-cache\r\nCache-Control: no-cache\r\nUpgrade: websocket\r\nOrigin: http://localhost:4200\r\nSec-WebSocket-Version: 13\r\nUser-Agent: Mozil"..., len=554, rcv_info=0x7f4e348d9b70) at core/receive.c:263
- msg = 0x7f4e45d5fd58
- ctx = {rec_lev = 1207642960, run_flags = 32590, last_retcode = 881696345, jmp_env = {{__jmpbuf = {139974191819600, 32768, 524, 139974191819520, 2, 65552, 94524499311987, 16},
- __mask_was_saved = 1207642880, __saved_mask = {__val = {139974188539386, 0, 139972984176761, 65536, 65584, 1024, 4604204945409, 128, 16, 541165879515, 2, 0, 532575944825, 140720896688108,
- 139974191819520, 65536}}}}}
- bctx = 0x7ffc230f3d60
- ret = 0
- stats_on = 0
- tvb = {tv_sec = 140720896688108, tv_usec = 139973865872976}
- tve = {tv_sec = 139973865872216, tv_usec = 139973865872216}
- tz = {tz_minuteswest = 857300191, tz_dsttime = 22008}
- diff = 0
- inb = {
- s = 0x55f83480b550 "GET /ws/ HTTP/1.1\r\nHost: localhost:5060\r\nConnection: Upgrade\r\nPragma: no-cache\r\nCache-Control: no-cache\r\nUpgrade: websocket\r\nOrigin: http://localhost:4200\r\nSec-WebSocket-Version: 13\r\nUser-Agent: Mozil"..., len = 554}
- netinfo = {data = {s = 0x1300020001 <error: Cannot access memory at address 0x1300020001>, len = 881696336}, rcv = 0x3, dst = 0x7f4e348d9e54}
- keng = 0x0
- evp = {data = 0x7ffc230f3c80, rcv = 0x7f4e348d9b70, dst = 0x0}
- cidlockidx = 0
- cidlockset = 0
- errsipmsg = 0
- __func__ = "receive_msg"
- #24 0x000055f8331a0eb5 in receive_tcp_msg (
- tcpbuf=0x7f4e348d9e50 "GET /ws/ HTTP/1.1\r\nHost: localhost:5060\r\nConnection: Upgrade\r\nPragma: no-cache\r\nCache-Control: no-cache\r\nUpgrade: websocket\r\nOrigin: http://localhost:4200\r\nSec-WebSocket-Version: 13\r\nUser-Agent: Mozil"..., len=554, rcv_info=0x7f4e348d9b70, con=0x7f4e348d9b58) at core/tcp_read.c:1448
- buf = 0x55f83480b550 "GET /ws/ HTTP/1.1\r\nHost: localhost:5060\r\nConnection: Upgrade\r\nPragma: no-cache\r\nCache-Control: no-cache\r\nUpgrade: websocket\r\nOrigin: http://localhost:4200\r\nSec-WebSocket-Version: 13\r\nUser-Agent: Mozil"...
- bsize = 65535
- blen = 65535
- __func__ = "receive_tcp_msg"
- #25 0x000055f8331a3192 in tcp_read_req (con=0x7f4e348d9b58, bytes_read=0x7ffc230f3fe8, read_flags=0x7ffc230f3fec) at core/tcp_read.c:1631
- bytes = 554
- total_bytes = 554
- resp = 1
- size = 24
- req = 0x7f4e348d9bd8
- dst = {send_sock = 0x0, to = {s = {sa_family = 41796, sa_data = "\030\063\370U\000\000(@\017#\374\177\000"}, sin = {sin_family = 41796, sin_port = 13080, sin_addr = {s_addr = 22008},
- sin_zero = "(@\017#\374\177\000"}, sin6 = {sin6_family = 41796, sin6_port = 13080, sin6_flowinfo = 22008, sin6_addr = {__in6_u = {__u6_addr8 = "(@\017#\374\177\000\000\b\000\000\000\000\000\000",
- __u6_addr16 = {16424, 8975, 32764, 0, 8, 0, 0, 0}, __u6_addr32 = {588202024, 32764, 8, 0}}}, sin6_scope_id = 20}}, id = 0, proto = 1 '\001', send_flags = {f = 0, blst_imask = 1}}
- c = 0 '\000'
- ret = 588201776
- __func__ = "tcp_read_req"
- ---Type <return> to continue, or q <return> to quit---
- #26 0x000055f8331a6147 in handle_io (fm=0x7f4e45d4d300, events=1, idx=-1) at core/tcp_read.c:1804
- ret = 8
- n = 8
- read_flags = 1
- con = 0x7f4e348d9b58
- s = 14
- resp = 0
- t = 0
- __func__ = "handle_io"
- #27 0x000055f8331936ad in io_wait_loop_epoll (h=0x55f8336611a0 <io_w>, t=2, repeat=0) at core/io_wait.h:1065
- n = 1
- r = 0
- fm = 0x7f4e45d4d300
- revents = 1
- __func__ = "io_wait_loop_epoll"
- #28 0x000055f8331a818f in tcp_receive_loop (unix_sock=29) at core/tcp_read.c:1974
- __func__ = "tcp_receive_loop"
- #29 0x000055f83307a3b3 in tcp_init_children () at core/tcp_main.c:4853
- r = 0
- i = 1
- reader_fd_1 = 29
- pid = 0
- si_desc = "tcp receiver (generic)\000\000\337\312\v3\370U\000\000\020\000\000\000\000\000\000\000\001\000\000\000\001", '\000' <repeats 11 times>, "\006\253\024\063\000\000\000\000q(53\000\000\000\000X\263\315EN\177\000\000P\324\060\063\000\000\000\000\000\000\000\000\f\000\000\000\000\000\000\002\000\000\000\000\000\000\000\b\000\000\000\000\000\000\000\002\000\000\000\000s=43\370U\000"
- si = 0x0
- __func__ = "tcp_init_children"
- #30 0x000055f832f7486d in main_loop () at main.c:1745
- i = 2
- pid = 11
- si = 0x0
- si_desc = "udp receiver child=1 sock=172.20.0.4:5060\000\000\000q\000\000\000@\276\061\063\370U\000\000Y\254\061\063\370U\000\000\240\274\202\064N\177\000\000\257\000\020\020\000\000\000\000 \355_<N\177\000\000\003\000\000\000N\177\000\000x\005`<N\177\000\000\022\000\000\000\370U\000\000\377\377\377\377\377\377\377\377\000P!\363\350\247\000\253"
- nrprocs = 2
- woneinit = 1
- __func__ = "main_loop"
- #31 0x000055f832f7b99d in main (argc=14, argv=0x7ffc230f4688) at main.c:2696
- cfg_stream = 0x55f834440010
- c = -1
- r = 0
- tmp = 0x7ffc230f5f53 ""
- tmp_len = 588203360
- port = 32764
- proto = 588203456
- options = 0x55f8332f5d68 ":f:cm:M:dVIhEeb:l:L:n:vKrRDTN:W:w:t:u:g:P:G:SQ:O:a:A:x:X:Y:"
- ret = -1
- seed = 2226445030
- rfd = 4
- debug_save = 0
- debug_flag = 0
- dont_fork_cnt = 2
- n_lst = 0x0
- p = 0xffffffff <error: Cannot access memory at address 0xffffffff>
- st = {st_dev = 119, st_ino = 150981, st_nlink = 1, st_mode = 16877, st_uid = 103, st_gid = 103, __pad0 = 0, st_rdev = 0, st_size = 4096, st_blksize = 4096, st_blocks = 8, st_atim = {tv_sec = 1557178001,
- tv_nsec = 753551000}, st_mtim = {tv_sec = 1557776643, tv_nsec = 893493000}, st_ctim = {tv_sec = 1557776643, tv_nsec = 893493000}, __glibc_reserved = {0, 0, 0}}
- __func__ = "main"
- (gdb)
- (gdb)
- (gdb)
- (gdb) frame 5
- #5 0x00007f4e3ceb1ca2 in ki_autheph_authenticate (_m=0x7ffc230f3380, susername=0x7ffc230f2ba0, spassword=0x7ffc230f2bb0) at authorize.c:526
- 526 authorize.c: No such file or directory.
- (gdb)
- #5 0x00007f4e3ceb1ca2 in ki_autheph_authenticate (_m=0x7ffc230f3380, susername=0x7ffc230f2ba0, spassword=0x7ffc230f2bb0) at authorize.c:526
- 526 in authorize.c
- (gdb)
- #5 0x00007f4e3ceb1ca2 in ki_autheph_authenticate (_m=0x7ffc230f3380, susername=0x7ffc230f2ba0, spassword=0x7ffc230f2bb0) at authorize.c:526
- 526 in authorize.c
- (gdb)
- #5 0x00007f4e3ceb1ca2 in ki_autheph_authenticate (_m=0x7ffc230f3380, susername=0x7ffc230f2ba0, spassword=0x7ffc230f2bb0) at authorize.c:526
- 526 in authorize.c
- (gdb) list
- 521 in authorize.c
- (gdb) info locals
- generated_password = "Q44iDBsVazdJh02fEWIcvtFpybA6"
- sgenerated_password = {s = 0x7ffc230f2990 "Q44iDBsVazdJh02fEWIcvtFpybA6AZAx0saSyz2YNfdj2KpNY9Rvgq/PKNBLdnIca+Th9ybGCtMesArbs69gXg== \221f4\370U", len = 88}
- secret_struct = 0x0
- __func__ = "ki_autheph_authenticate"
- (gdb) p *spassword
- $1 = {s = 0x7f4e2b7678b0 "1234", len = 4}
- (gdb)
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement