>>> What OS/platform is this, and what version of OpenSSL?
>>
>> Also, run 'disass ssl3_get_message' at debugger prompt, advance to
>> vicinity of address provided in back-trace, 0x00007fe5a839334f in
>> provided example, and send that page. I mean it's lesser point to send
>> whole disass output, limit it to ~20 lines.
> 
>    0x00007fe5a839331d <+1069>:  callq  *%r10
>    0x00007fe5a8393320 <+1072>:  jmpq   0x7fe5a8392f4c <ssl3_get_message+92>
>    0x00007fe5a8393325 <+1077>:  movslq 0x60(%rbx),%r8
>    0x00007fe5a8393329 <+1081>:  mov    0xa0(%rbx),%rdx
>    0x00007fe5a8393330 <+1088>:  mov    %rbx,%r9
>    0x00007fe5a8393333 <+1091>:  mov    0x50(%rbx),%rbp
>    0x00007fe5a8393337 <+1095>:  mov    (%rbx),%esi
>    0x00007fe5a8393339 <+1097>:  xor    %edi,%edi
>    0x00007fe5a839333b <+1099>:  mov    0x8(%rbp),%rcx
>    0x00007fe5a839333f <+1103>:  add    $0x4,%r8
>    0x00007fe5a8393343 <+1107>:  mov    %rdx,(%rsp)
>    0x00007fe5a8393347 <+1111>:  mov    $0x16,%edx
>    0x00007fe5a839334c <+1116>:  callq  *%r10
>    0x00007fe5a839334f <+1119>:  jmpq   0x7fe5a83930e4
> <ssl3_get_message+500>

The challenge here is to map this to source code. I was hoping that call
would be direct, i.e. not *%r10, which would make the task easier. Could
you 'disass 0x7fe5a83930e4' and see if there are direct calls nearby
that location. You see a direct call below. Another option is to make
your libssl.so binary for download somewhere. It's probably better.
Could you? [Feel free to post link to me personally].

>    0x00007fe5a8393370 <+1152>:  callq  0x7fe5a8372938 <ERR_put_error@plt>
______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
Development Mailing List                       openssl-dev@openssl.org
Automated List Manager                           majord...@openssl.org

Reply via email to