Advertisement
Guest User

kamailio_stacksmash_backtrace

a guest
May 2nd, 2019
111
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 5.29 KB | None | 0 0
  1. root@f93e2af8d492:/# gdb /usr/sbin/kamailio core
  2. GNU gdb (Debian 7.12-6) 7.12.0.20161007-git
  3. Copyright (C) 2016 Free Software Foundation, Inc.
  4. License GPLv3+: GNU GPL version 3 or later <http://gnu.org/licenses/gpl.html>
  5. This is free software: you are free to change and redistribute it.
  6. There is NO WARRANTY, to the extent permitted by law. Type "show copying"
  7. and "show warranty" for details.
  8. This GDB was configured as "x86_64-linux-gnu".
  9. Type "show configuration" for configuration details.
  10. For bug reporting instructions, please see:
  11. <http://www.gnu.org/software/gdb/bugs/>.
  12. Find the GDB manual and other documentation resources online at:
  13. <http://www.gnu.org/software/gdb/documentation/>.
  14. For help, type "help".
  15. Type "apropos word" to search for commands related to "word"...
  16. Reading symbols from /usr/sbin/kamailio...Reading symbols from /usr/lib/debug/.build-id/82/3e52af5b144c042c36f46de245e486094dd455.debug...done.
  17. done.
  18. [New LWP 18]
  19. [Thread debugging using libthread_db enabled]
  20. Using host libthread_db library "/lib/x86_64-linux-gnu/libthread_db.so.1".
  21. Core was generated by `kamailio -DD -P /var/run/kamailio/kamailio.pid -f /etc/kamailio/kamailio.cfg -m'.
  22. Program terminated with signal SIGABRT, Aborted.
  23. #0 __GI_raise (sig=sig@entry=6) at ../sysdeps/unix/sysv/linux/raise.c:51
  24. 51 ../sysdeps/unix/sysv/linux/raise.c: No such file or directory.
  25. (gdb) backtrace
  26. #0 __GI_raise (sig=sig@entry=6) at ../sysdeps/unix/sysv/linux/raise.c:51
  27. #1 0x00007f66469e842a in __GI_abort () at abort.c:89
  28. #2 0x00007f6646a24c00 in __libc_message (do_abort=do_abort@entry=2, fmt=fmt@entry=0x7f6646b18305 "*** %s ***: %s terminated\n") at ../sysdeps/posix/libc_fatal.c:175
  29. #3 0x00007f6646aad1f7 in __GI___fortify_fail (msg=msg@entry=0x7f6646b182ed "stack smashing detected") at fortify_fail.c:30
  30. #4 0x00007f6646aad1c0 in __stack_chk_fail () at stack_chk_fail.c:28
  31. #5 0x00007f663bc55ca2 in ki_autheph_authenticate (_m=0x7ffc78c079a0, susername=0x7ffc78c07210, spassword=0x7ffc78c07220) at authorize.c:526
  32. #6 0x00007f66447752a0 in sr_apy_kemi_exec_func (self=0x7f6647229a48, args=0x7f662a7711c8, idx=321) at apy_kemi.c:489
  33. #7 0x00007f6644760e32 in sr_apy_kemi_exec_func_321 (self=0x7f6647229a48, args=0x7f662a7711c8) at apy_kemi_export.c:2611
  34. #8 0x00007f6644135259 in PyCFunction_Call () from /usr/lib/x86_64-linux-gnu/libpython3.5m.so.1.0
  35. #9 0x00007f6644266739 in PyEval_EvalFrameEx () from /usr/lib/x86_64-linux-gnu/libpython3.5m.so.1.0
  36. #10 0x00007f6644328074 in ?? () from /usr/lib/x86_64-linux-gnu/libpython3.5m.so.1.0
  37. #11 0x00007f6644328153 in PyEval_EvalCodeEx () from /usr/lib/x86_64-linux-gnu/libpython3.5m.so.1.0
  38. #12 0x00007f66441bb558 in ?? () from /usr/lib/x86_64-linux-gnu/libpython3.5m.so.1.0
  39. #13 0x00007f6644297a37 in PyObject_Call () from /usr/lib/x86_64-linux-gnu/libpython3.5m.so.1.0
  40. #14 0x00007f66442e395c in ?? () from /usr/lib/x86_64-linux-gnu/libpython3.5m.so.1.0
  41. #15 0x00007f6644297a37 in PyObject_Call () from /usr/lib/x86_64-linux-gnu/libpython3.5m.so.1.0
  42. #16 0x00007f6644326b77 in PyEval_CallObjectWithKeywords () from /usr/lib/x86_64-linux-gnu/libpython3.5m.so.1.0
  43. #17 0x00007f6644791e23 in apy_exec (_msg=0x7ffc78c079a0, fname=0x7f6644aaf738 "http_event_route", fparam=0x7f6630631ad8 "xhttp:request", emode=0) at python_exec.c:139
  44. #18 0x00007f6644768818 in sr_kemi_config_engine_python (msg=0x7ffc78c079a0, rtype=513, rname=0x7f6630835540 <xhttp_event_callback>, rparam=0x7ffc78c078b0) at apy_kemi.c:93
  45. #19 0x00007f663062ac17 in xhttp_process_request (orig_msg=0x7f6644af1b50,
  46. new_buf=0x7f6644af22b0 "GET /ws/ HTTP/1.1\r\nVia: SIP/2.0/TCP 172.29.0.1:40586\r\nHost: localhost:5060\r\nConnection: Upgrade\r\nPragma: no-cache\r\nCache-Control: no-cache\r\nUpgrade: websocket\r\nOrigin: http://localhost:4200\r\nSec-WebSo"..., new_len=589) at xhttp_mod.c:305
  47. #20 0x00007f663062c0c0 in xhttp_handler (msg=0x7f6644af1b50) at xhttp_mod.c:383
  48. #21 0x000055c1fe774a8f in nonsip_msg_run_hooks (msg=0x7f6644af1b50) at core/nonsip_hooks.c:111
  49. #22 0x000055c1fe7c04f3 in receive_msg (
  50. buf=0x55c1ff1acf70 "GET /ws/ HTTP/1.1\r\nHost: localhost:5060\r\nConnection: Upgrade\r\nPragma: no-cache\r\nCache-Control: no-cache\r\nUpgrade: websocket\r\nOrigin: http://localhost:4200\r\nSec-WebSocket-Version: 13\r\nUser-Agent: Mozil"..., len=554, rcv_info=0x7f6632f3a558) at core/receive.c:263
  51. #23 0x000055c1fe86185b in receive_tcp_msg (
  52. tcpbuf=0x7f6632f3a838 "GET /ws/ HTTP/1.1\r\nHost: localhost:5060\r\nConnection: Upgrade\r\nPragma: no-cache\r\nCache-Control: no-cache\r\nUpgrade: websocket\r\nOrigin: http://localhost:4200\r\nSec-WebSocket-Version: 13\r\nUser-Agent: Mozil"..., len=554, rcv_info=0x7f6632f3a558, con=0x7f6632f3a540) at core/tcp_read.c:1448
  53. #24 0x000055c1fe863b38 in tcp_read_req (con=0x7f6632f3a540, bytes_read=0x7ffc78c08608, read_flags=0x7ffc78c0860c) at core/tcp_read.c:1631
  54. #25 0x000055c1fe866aed in handle_io (fm=0x7f6644ade870, events=1, idx=-1) at core/tcp_read.c:1804
  55. #26 0x000055c1fe854053 in io_wait_loop_epoll (h=0x55c1fed20ec0 <io_w>, t=2, repeat=0) at core/io_wait.h:1065
  56. ---Type <return> to continue, or q <return> to quit---
  57. #27 0x000055c1fe868b35 in tcp_receive_loop (unix_sock=29) at core/tcp_read.c:1974
  58. #28 0x000055c1fe73ae24 in tcp_init_children () at core/tcp_main.c:4853
  59. #29 0x000055c1fe63552a in main_loop () at main.c:1735
  60. #30 0x000055c1fe63c5f8 in main (argc=14, argv=0x7ffc78c08ca8) at main.c:2675
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement