strongswan icon indicating copy to clipboard operation
strongswan copied to clipboard

charon crashes due to SIGBUS error//strongswan version 5.9.13

Open BadganchiP1234 opened this issue 7 months ago • 6 comments

Could you please check why charon crashes due to SIGBUS error.

Backtrace:

(gdb) bt full
#0  strnlen () at ../sysdeps/aarch64/strnlen.S:56
No locals.
#1  0x0000007fa3a1258c in printf_positional (s=s@entry=0x7fc323ac50, format=format@entry=0x7fa2cd26ba "  loaded private key from %.*s", readonly_format=<optimized out>, 
    ap=<error reading variable: Cannot access memory at address 0x1>, ap_savep=ap_savep@entry=0x7fc323a7b8, done=done@entry=26, nspecs_done=nspecs_done@entry=0, 
    lead_str_end=lead_str_end@entry=0x7fa2cd26d4 "%.*s", work_buffer=<optimized out>, save_errno=<optimized out>, grouping=<optimized out>, thousands_sep=<optimized out>, mode_flags=<optimized out>)
    at vfprintf-internal.c:1927
        len = <optimized out>
        function_done = <optimized out>
        ptrptr = <optimized out>
        signed_number = <optimized out>
        is_negative = <optimized out>
        alt = <optimized out>
        space = <optimized out>
        is_long_double = <optimized out>
        showsign = <optimized out>
        workend = <optimized out>
        step4_jumps = {0 <repeats 14 times>, 2304, 2256, 2380, 2368, 2196, 1040, 1448, 1976, 1908, 1852, 1568, 1268, 1044, 0, 0, 0, 2032}
        string = <optimized out>
        width = 0
        use_outdigits = <optimized out>
        pad = <optimized out>
        group = <optimized out>
        is_short = <optimized out>
        is_char = <optimized out>
        is_long = <optimized out>
        number = <optimized out>
        base = <optimized out>
        left = 0
        prec = <optimized out>
        spec = 115 's'
        specsbuf = {data = 0x7fc3239e10, length = 1024, __space = {__align = {__max_align_ll = 39, __max_align_ld = 0}, 
            __c = "'\000\000\000\000\000\000\000s\000\000\000\000\000\000\000 \000\000\000\177\000\000\000\330&͢\177\000\000\000\330&͢\177\000\000\000\000\000\000\000\377\377\377\377\001\000\000\000\003\000\000\000\001\000\000\000\000\000\000\000\377\377\377\377\177\000\000\000\214;\240\243\177\000\000\000\000 \265\243\177\000\000\000\240\204*xU\000\000\000\000\240\264\243\177\000\000\000#\271\277\243\177\000\000\000\002\000\000\000\000\000\000\000 \000\000\000\000\000\000\000`\260Σ\177\000\000\000\036\000\000\000\000\000\000\000\001\000\000\000\000\000\000\000 \246#\303\177\000\000\000XZ\277\243\320\377\377\377\000\000\000\000\200\377\377\377\230\240#\303\177\000\000\000\002\000\000\000\377\377\377\377\000\000\000\000\000\000\000\000`\032\260"...}}
        specs = <optimized out>
        specs_limit = <optimized out>
        argsbuf = {data = 0x7fc323a220, length = 1024, __space = {__align = {__max_align_ll = 545460846631, __max_align_ld = 0}, 
            __c = "'\000\000\000\177\000\000\000P\231)xU\000\000\000\024pΣ\177\000\000\000P\251#\303\177\000\000\000\000\000\000\000\377\377\377\377\000\000\000\000\003", '\000' <repeats 11 times>, "\320\v\000\000\000\000\000\000\324&͢\177\000\000\000趴\243\177\000\000\000\260\263#\303\177\000\000\000\002\000\000\000\177\000\000\000\066Պ\243\177\000\000\000\000\000\000\000\200\377\377\377`\260Σ\177\000\000\000\377\377\377\377\377\377\377\377P\257#\303\177\000\000\000 \257#\303\177\000\000\000 \000\000\000\000\000\000\000\002\000\000\000\000\000\000\000\300\243#\303\177\000\000\000d\006\246\243\177\000\000\000\353\177\061xU", '\000' <repeats 11 times>, "\f", '\000' <repeats 15 times>...}}
        nspecs = <optimized out>
        nargs = <optimized out>
        max_ref_arg = 0
        cnt = <optimized out>
        args_value = 0x7fc323a220
        args_size = <optimized out>
        args_type = <optimized out>
        __PRETTY_FUNCTION__ = "printf_positional"
        do_longlong_number = <optimized out>
#2  0x0000007fa3a14c64 in __vfprintf_internal (s=s@entry=0x7fc323ac50, format=format@entry=0x7fa2cd26ba "  loaded private key from %.*s", ap=..., mode_flags=mode_flags@entry=2)
    at vfprintf-internal.c:1602
        _cleanup_start_doit = <optimized out>
--Type <RET> for more, q to quit, c to continue without paging--
        _buffer = {__routine = 0x528de74a9677c200, __arg = 0x7fc323ac50, __canceltype = -1547381544, __prev = 0x7fc323a940}
        _cleanup_routine = <optimized out>
        thousands_sep = 0x0
        grouping = 0xffffffffffffffff <error: Cannot access memory at address 0xffffffffffffffff>
        done = 26
        f = 0x7fa2cd26d4 "%.*s"
        lead_str_end = <optimized out>
        end_of_spec = <optimized out>
        work_buffer = "@\251#\303\177\000\000\000\020\251#\303\177\000\000\000\320\377\377\377\200\377\377\377\327\255#\303\177\000\000\000@\251#\303\177\000\000\000@\251#\303\177\000\000\000\020\251#\303\177\000\000\000\320\377\377\377\200\377\377\377\000\302w\226J\347\215R\340\255#\303\177\000\000\000\200\025\271\243\177\000\000\000\060\211\271\243\177\000\000\000P\221)xU\000\000\000@\256#\303\177\000\000\000\001\000\000\000\000\000\000\000d\221)xU\000\000\000\032Պ\243\177\000\000\000\005", '\000' <repeats 15 times>, "<name>", '\000' <repeats 16 times>, "\377\377\377\377\377\377\377\377\377\377\000\000\000\377\377\377\377\377", '\000' <repeats 14 times>...
        workend = <optimized out>
        ap_save = {__stack = 0x7fc323b3b0, __gr_top = 0x7fc323b3b0, __vr_top = 0x7fc323b390, __gr_offs = -16, __vr_offs = -128}
        nspecs_done = 0
        save_errno = <optimized out>
        readonly_format = <optimized out>
        do_longlong_number = <optimized out>
        __result = <optimized out>
#3  0x0000007fa3a250a4 in __vsnprintf_internal (string=string@entry=0x7fc323ae48 "  loaded private key from 1xU", maxlen=<optimized out>, maxlen@entry=1024, 
    format=format@entry=0x7fa2cd26ba "  loaded private key from %.*s", args=..., mode_flags=mode_flags@entry=2) at vsnprintf.c:114
        sf = {f = {_sbf = {_f = {_flags = -72515583, _IO_read_ptr = 0x7fc323ae48 "  loaded private key from 1xU", _IO_read_end = 0x7fc323ae48 "  loaded private key from 1xU", 
                _IO_read_base = 0x7fc323ae48 "  loaded private key from 1xU", _IO_write_base = 0x7fc323ae48 "  loaded private key from 1xU", _IO_write_ptr = 0x7fc323ae62 "1xU", 
                _IO_write_end = 0x7fc323b247 "", _IO_buf_base = 0x7fc323ae48 "  loaded private key from 1xU", _IO_buf_end = 0x7fc323b247 "", _IO_save_base = 0x0, _IO_backup_base = 0x0, 
                _IO_save_end = 0x0, _markers = 0x0, _chain = 0x0, _fileno = 2016069088, _flags2 = 0, _old_offset = 3273895800, _cur_column = 0, _vtable_offset = 35 '#', 
                _shortbuf = <incomplete sequence \303>, _lock = 0x0, _offset = 548734741760, _codecvt = 0x7fa3882f08, _wide_data = 0xffffffffffffffff, _freeres_list = 0x0, _freeres_buf = 0x7fc323ad10, 
                __pad5 = 5948664990364320256, _mode = -1, _unused2 = "\177\000\000\000؉\271\243\177\000\000\000(6ˣ\177\000\000"}, vtable = 0x7fa3b4bec8 <_IO_strn_jumps>}, _s = {
              _allocate_buffer_unused = 0x0, _free_buffer_unused = 0x6}}, 
          overflow_buf = "\000\000\000\000\000\000\000\000h\257#\303\177\000\000\000\220\255#\303\177\000\000\000x\034ȣ\177\000\000\000\000P\316\242\177\000\000\000P\221)xU\000\000\000\200\256#\303\177\000\000\000\200\256#\303\177\000\000"}
        ret = <optimized out>
#4  0x0000007fa3aa6118 in ___vsnprintf_chk (s=s@entry=0x7fc323ae48 "  loaded private key from 1xU", maxlen=maxlen@entry=1024, flag=flag@entry=1, slen=slen@entry=18446744073709551615, 
    format=format@entry=0x7fa2cd26ba "  loaded private key from %.*s", ap=<error reading variable: Cannot access memory at address 0x0>) at vsnprintf_chk.c:34
        mode = 2
#5  0x0000007fa3b9150c in vsnprintf (__ap=..., __fmt=0x7fa2cd26ba "  loaded private key from %.*s", __n=1024, __s=0x7fc323ae48 "  loaded private key from 1xU") at /usr/include/bits/stdio2.h:68
No locals.
#6  vlog (this=0x5578299150, group=DBG_CFG, level=LEVEL_CTRL, format=0x7fa2cd26ba "  loaded private key from %.*s", args=...) at ../../../strongswan-5.9.13/src/libcharon/bus/bus.c:399
        buf = "  loaded private key from 1xU\000\000\000\060\252\264\243\177\000\000\000\t\000\000\000\177\000\000\000\002\000\000\000\000\000\000\000\t\000\000\000\062", '\000' <repeats 27 times>, "|\000\000\000w\000\000\000n\000\000\000[\000\000\000\360\260#\303\177\000\000\000\240\260#\303\177\000\000\000\000\257#\303\177\000\000\000\244\203\212\243\177\000\000\000\003\000\000\000\000\000\000\000\240u\022", '\000' <repeats 13 times>, "p\310*xU\000\000\000\200\001\000\000\000\000\000\000\002\000\000\000\000\000\000\000\340\257#\303\177\000\000\000\200\235\212\243\177\000\000\000"...
        len = <optimized out>
        loggers = 0x5578299950
        data = {ike_sa = 0x0, thread = 0, group = DBG_CFG, level = LEVEL_CTRL, message = 0x7fc323ae48 "  loaded private key from 1xU", args = {__stack = 0x7fc323b3b0, __gr_top = 0x7fc323b3b0, 
            __vr_top = 0x7fc323b390, __gr_offs = -32, __vr_offs = -128}}
#7  0x0000007fa3b916b4 in log_ (this=<optimized out>, group=<optimized out>, level=<optimized out>, format=<optimized out>) at ../../../strongswan-5.9.13/src/libcharon/bus/bus.c:440
        args = {__stack = 0x7fc323b3b0, __gr_top = 0x7fc323b3b0, __vr_top = 0x7fc323b390, __gr_offs = -32, __vr_offs = -128}
#8  0x0000007fa2ccb0c4 in ?? () from /opt/idcevo/sysroots/cortexa76-poky-linux/usr/lib/ipsec/plugins/libstrongswan-stroke.so
No symbol table info available.
#9  0x0000007fa2cca944 in ?? () from /opt/idcevo/sysroots/cortexa76-poky-linux/usr/lib/ipsec/plugins/libstrongswan-stroke.so
No symbol table info available.
#10 0x0000007fa2ccba58 in stroke_cred_create () from /opt/idcevo/sysroots/cortexa76-poky-linux/usr/lib/ipsec/plugins/libstrongswan-stroke.so
No symbol table info available.
#11 0x0000007fa2cc4a04 in stroke_socket_create () from /opt/idcevo/sysroots/cortexa76-poky-linux/usr/lib/ipsec/plugins/libstrongswan-stroke.so
No symbol table info available.
--Type <RET> for more, q to quit, c to continue without paging--
#12 0x0000007fa2cc32f8 in ?? () from /opt/idcevo/sysroots/cortexa76-poky-linux/usr/lib/ipsec/plugins/libstrongswan-stroke.so
No symbol table info available.
#13 0x0000007fa3c6c760 in load_feature (level=1, provided=0x55782f6850, this=0x5578292c30) at ../../../strongswan-5.9.13/src/libstrongswan/plugins/plugin_loader.c:804
        name = <optimized out>
        provide = <optimized out>
#14 load_provided (level=0, provided=0x55782f6850, this=0x5578292c30) at ../../../strongswan-5.9.13/src/libstrongswan/plugins/plugin_loader.c:878
        name = <optimized out>
        provide = <optimized out>
        indent = 0
        name = <optimized out>
        provide = <optimized out>
        indent = <optimized out>
#15 load_provided (this=0x5578292c30, provided=0x55782f6850, level=0) at ../../../strongswan-5.9.13/src/libstrongswan/plugins/plugin_loader.c:845
        name = <optimized out>
        provide = <optimized out>
        indent = <optimized out>
#16 0x0000007fa3c6d268 in load_features (this=0x5578292c30) at ../../../strongswan-5.9.13/src/libstrongswan/plugins/plugin_loader.c:899
        enumerator = 0x55782f91e0
        inner = 0x55782f9210
        plugin = 0x55782f6650
        provided = 0x55782f6850
        enumerator = <optimized out>
        inner = <optimized out>
        plugin = <optimized out>
        provided = <optimized out>
#17 load_plugins (this=0x5578292c30, list=0x556bd62000 "a") at ../../../strongswan-5.9.13/src/libstrongswan/plugins/plugin_loader.c:1298
        enumerator = <optimized out>
        default_path = 0x7fa3c889f5 "/usr/lib/ipsec/plugins"
        plugins = 0x55782ad050 " pkcs11 aes des rc2 sha2 sha3 mgf1 random nonce x509 revocation pubkey pkcs1 pkcs7 pkcs12 pgp dnskey sshkey pem openssl pkcs8 fips-prf gmp curve25519 xcbc cmac hmac kdf ctr ccm gcm drbg curl attr kern"...
        token = 0x55782ad027 ""
        critical_failed = <optimized out>
#18 0x0000007fa3b988cc in initialize (this=this@entry=0x55782a0f60, 
    plugins=0x556bd526bc "pkcs11 aes des rc2 sha2 sha3 sha1 md5 mgf1 random nonce x509 revocation constraints pubkey pkcs1 pkcs7 pkcs12 pgp dnskey sshkey pem openssl pkcs8 fips-prf gmp curve25519 xcbc cmac hmac kdf ctr ccm gcm"...) at ../../../strongswan-5.9.13/src/libcharon/daemon.c:910
        features = {{kind = FEATURE_PROVIDE, type = FEATURE_CUSTOM, arg = {crypter = {alg = 2747212251, key_size = 0}, aead = {alg = 2747212251, key_size = 0}, signer = 2747212251, prf = 2747212251, 
              xof = 2747212251, kdf = (KDF_PRF | KDF_PRF_PLUS | unknown: 0xa3bf21d8), drbg = 2747212251, hasher = 2747212251, ke = 2747212251, 
              rng_quality = (RNG_STRONG | RNG_TRUE | unknown: 0xa3bf21d8), privkey = 2747212251, privkey_gen = 2747212251, privkey_sign = 2747212251, privkey_decrypt = 2747212251, pubkey = 2747212251, 
              pubkey_verify = 2747212251, pubkey_encrypt = 2747212251, cert = 2747212251, container = 2747212251, eap = {type = 2747212251, vendor = 127}, 
              database = (DB_SQLITE | DB_MYSQL | unknown: 0xa3bf21d8), fetcher = 0x7fa3bf21db "libcharon", custom = 0x7fa3bf21db "libcharon", xauth = 0x7fa3bf21db "libcharon", reg = {final = 219, 
                f = 0x0}, cb = {f = 0x7fa3bf21db, data = 0x0}}}, {kind = FEATURE_DEPENDS, type = FEATURE_NONCE_GEN, arg = {crypter = {alg = 0, key_size = 0}, aead = {alg = 0, key_size = 0}, signer = 0, 
              prf = 0, xof = XOF_UNDEFINED, kdf = KDF_UNDEFINED, drbg = DRBG_UNDEFINED, hasher = 0, ke = KE_NONE, rng_quality = RNG_WEAK, privkey = KEY_ANY, privkey_gen = KEY_ANY, 
              privkey_sign = SIGN_UNKNOWN, privkey_decrypt = ENCRYPT_UNKNOWN, pubkey = KEY_ANY, pubkey_verify = SIGN_UNKNOWN, pubkey_encrypt = ENCRYPT_UNKNOWN, cert = CERT_ANY, 
              container = CONTAINER_PKCS7, eap = {type = 0, vendor = PEN_IETF}, database = DB_ANY, fetcher = 0x0, custom = 0x0, xauth = 0x0, reg = {final = false, f = 0x0}, cb = {f = 0x0, data = 0x0}}}, 
          {kind = FEATURE_DEPENDS, type = FEATURE_CUSTOM, arg = {crypter = {alg = 2747212261, key_size = 0}, aead = {alg = 2747212261, key_size = 0}, signer = 2747212261, prf = 2747212261, 
              xof = 2747212261, kdf = (KDF_PRF | unknown: 0xa3bf21e4), drbg = 2747212261, hasher = 2747212261, ke = 2747212261, rng_quality = (RNG_STRONG | unknown: 0xa3bf21e4), privkey = 2747212261, 
              privkey_gen = 2747212261, privkey_sign = 2747212261, privkey_decrypt = 2747212261, pubkey = 2747212261, pubkey_verify = 2747212261, pubkey_encrypt = 2747212261, cert = 2747212261, 
              container = 2747212261, eap = {type = 2747212261, vendor = 127}, database = (DB_SQLITE | unknown: 0xa3bf21e4), fetcher = 0x7fa3bf21e5 "libcharon-sa-managers", 
              custom = 0x7fa3bf21e5 "libcharon-sa-managers", xauth = 0x7fa3bf21e5 "libcharon-sa-managers", reg = {final = 229, f = 0x0}, cb = {f = 0x7fa3bf21e5, data = 0x0}}}, {kind = FEATURE_DEPENDS, 
            type = FEATURE_CUSTOM, arg = {crypter = {alg = 2747212283, key_size = 0}, aead = {alg = 2747212283, key_size = 0}, signer = 2747212283, prf = 2747212283, xof = 2747212283, 
              kdf = (KDF_PRF | KDF_PRF_PLUS | unknown: 0xa3bf21f8), drbg = 2747212283, hasher = 2747212283, ke = 2747212283, rng_quality = (RNG_STRONG | RNG_TRUE | unknown: 0xa3bf21f8), 
              privkey = 2747212283, privkey_gen = 2747212283, privkey_sign = 2747212283, privkey_decrypt = 2747212283, pubkey = 2747212283, pubkey_verify = 2747212283, pubkey_encrypt = 2747212283, 
              cert = 2747212283, container = 2747212283, eap = {type = 2747212283, vendor = 127}, database = (DB_SQLITE | DB_MYSQL | unknown: 0xa3bf21f8), fetcher = 0x7fa3bf21fb "libcharon-receiver", 
              custom = 0x7fa3bf21fb "libcharon-receiver", xauth = 0x7fa3bf21fb "libcharon-receiver", reg = {final = 251, f = 0x0}, cb = {f = 0x7fa3bf21fb, data = 0x0}}}, {kind = FEATURE_DEPENDS, 
--Type <RET> for more, q to quit, c to continue without paging--
            type = FEATURE_CUSTOM, arg = {crypter = {alg = 2747212302, key_size = 0}, aead = {alg = 2747212302, key_size = 0}, signer = 2747212302, prf = 2747212302, xof = 2747212302, 
              kdf = (KDF_PRF_PLUS | unknown: 0xa3bf220c), drbg = 2747212302, hasher = 2747212302, ke = 2747212302, rng_quality = (RNG_TRUE | unknown: 0xa3bf220c), privkey = 2747212302, 
              privkey_gen = 2747212302, privkey_sign = 2747212302, privkey_decrypt = 2747212302, pubkey = 2747212302, pubkey_verify = 2747212302, pubkey_encrypt = 2747212302, cert = 2747212302, 
              container = 2747212302, eap = {type = 2747212302, vendor = 127}, database = (DB_MYSQL | unknown: 0xa3bf220c), fetcher = 0x7fa3bf220e "kernel-ipsec", custom = 0x7fa3bf220e "kernel-ipsec", 
              xauth = 0x7fa3bf220e "kernel-ipsec", reg = {final = 14, f = 0x0}, cb = {f = 0x7fa3bf220e, data = 0x0}}}, {kind = FEATURE_DEPENDS, type = FEATURE_CUSTOM, arg = {crypter = {alg = 2747212315, 
                key_size = 0}, aead = {alg = 2747212315, key_size = 0}, signer = 2747212315, prf = 2747212315, xof = 2747212315, kdf = (KDF_PRF | KDF_PRF_PLUS | unknown: 0xa3bf2218), drbg = 2747212315, 
              hasher = 2747212315, ke = 2747212315, rng_quality = (RNG_STRONG | RNG_TRUE | unknown: 0xa3bf2218), privkey = 2747212315, privkey_gen = 2747212315, privkey_sign = 2747212315, 
              privkey_decrypt = 2747212315, pubkey = 2747212315, pubkey_verify = 2747212315, pubkey_encrypt = 2747212315, cert = 2747212315, container = 2747212315, eap = {type = 2747212315, 
                vendor = 127}, database = (DB_SQLITE | DB_MYSQL | unknown: 0xa3bf2218), fetcher = 0x7fa3bf221b "kernel-net", custom = 0x7fa3bf221b "kernel-net", xauth = 0x7fa3bf221b "kernel-net", reg = {
                final = 27, f = 0x0}, cb = {f = 0x7fa3bf221b, data = 0x0}}}, {kind = FEATURE_CALLBACK, type = FEATURE_NONE, arg = {crypter = {alg = 2746845820, key_size = 367088242528}, aead = {
                alg = 2746845820, key_size = 367088242528}, signer = 2746845820, prf = 2746845820, xof = 2746845820, kdf = (unknown: 0xa3b98a7c), drbg = 2746845820, hasher = 2746845820, ke = 2746845820, 
              rng_quality = (unknown: 0xa3b98a7c), privkey = 2746845820, privkey_gen = 2746845820, privkey_sign = 2746845820, privkey_decrypt = 2746845820, pubkey = 2746845820, 
              pubkey_verify = 2746845820, pubkey_encrypt = 2746845820, cert = 2746845820, container = 2746845820, eap = {type = 2746845820, vendor = 127}, database = (unknown: 0xa3b98a7c), 
              fetcher = 0x7fa3b98a7c <sender_receiver_cb> "?#\003\325\375{\276\251\375\003", custom = 0x7fa3b98a7c <sender_receiver_cb> "?#\003\325\375{\276\251\375\003", 
              xauth = 0x7fa3b98a7c <sender_receiver_cb> "?#\003\325\375{\276\251\375\003", reg = {final = 124, f = 0x55782a0f60}, cb = {f = 0x7fa3b98a7c <sender_receiver_cb>, data = 0x55782a0f60}}}, {
            kind = FEATURE_PROVIDE, type = FEATURE_CUSTOM, arg = {crypter = {alg = 2747212283, key_size = 0}, aead = {alg = 2747212283, key_size = 0}, signer = 2747212283, prf = 2747212283, 
              xof = 2747212283, kdf = (KDF_PRF | KDF_PRF_PLUS | unknown: 0xa3bf21f8), drbg = 2747212283, hasher = 2747212283, ke = 2747212283, 
              rng_quality = (RNG_STRONG | RNG_TRUE | unknown: 0xa3bf21f8), privkey = 2747212283, privkey_gen = 2747212283, privkey_sign = 2747212283, privkey_decrypt = 2747212283, pubkey = 2747212283, 
              pubkey_verify = 2747212283, pubkey_encrypt = 2747212283, cert = 2747212283, container = 2747212283, eap = {type = 2747212283, vendor = 127}, 
              database = (DB_SQLITE | DB_MYSQL | unknown: 0xa3bf21f8), fetcher = 0x7fa3bf21fb "libcharon-receiver", custom = 0x7fa3bf21fb "libcharon-receiver", xauth = 0x7fa3bf21fb "libcharon-receiver", 
              reg = {final = 251, f = 0x0}, cb = {f = 0x7fa3bf21fb, data = 0x0}}}, {kind = FEATURE_DEPENDS, type = FEATURE_HASHER, arg = {crypter = {alg = ENCR_DES_IV64, key_size = 0}, aead = {
                alg = ENCR_DES_IV64, key_size = 0}, signer = AUTH_HMAC_MD5_96, prf = PRF_HMAC_MD5, xof = XOF_MGF1_SHA1, kdf = KDF_PRF, drbg = DRBG_HMAC_SHA1, hasher = HASH_SHA1, ke = MODP_768_BIT, 
              rng_quality = RNG_STRONG, privkey = KEY_RSA, privkey_gen = KEY_RSA, privkey_sign = SIGN_RSA_EMSA_PKCS1_NULL, privkey_decrypt = ENCRYPT_RSA_PKCS1, pubkey = KEY_RSA, 
              pubkey_verify = SIGN_RSA_EMSA_PKCS1_NULL, pubkey_encrypt = ENCRYPT_RSA_PKCS1, cert = CERT_X509, container = CONTAINER_PKCS7_DATA, eap = {type = EAP_IDENTITY, vendor = PEN_IETF}, 
              database = DB_SQLITE, fetcher = 0x1 <error: Cannot access memory at address 0x1>, custom = 0x1 <error: Cannot access memory at address 0x1>, 
              xauth = 0x1 <error: Cannot access memory at address 0x1>, reg = {final = true, f = 0x0}, cb = {f = 0x1, data = 0x0}}}, {kind = FEATURE_DEPENDS, type = FEATURE_RNG, arg = {crypter = {
                alg = ENCR_DES_IV64, key_size = 0}, aead = {alg = ENCR_DES_IV64, key_size = 0}, signer = AUTH_HMAC_MD5_96, prf = PRF_HMAC_MD5, xof = XOF_MGF1_SHA1, kdf = KDF_PRF, drbg = DRBG_HMAC_SHA1, 
              hasher = HASH_SHA1, ke = MODP_768_BIT, rng_quality = RNG_STRONG, privkey = KEY_RSA, privkey_gen = KEY_RSA, privkey_sign = SIGN_RSA_EMSA_PKCS1_NULL, privkey_decrypt = ENCRYPT_RSA_PKCS1, 
              pubkey = KEY_RSA, pubkey_verify = SIGN_RSA_EMSA_PKCS1_NULL, pubkey_encrypt = ENCRYPT_RSA_PKCS1, cert = CERT_X509, container = CONTAINER_PKCS7_DATA, eap = {type = EAP_IDENTITY, 
                vendor = PEN_IETF}, database = DB_SQLITE, fetcher = 0x1 <error: Cannot access memory at address 0x1>, custom = 0x1 <error: Cannot access memory at address 0x1>, 
              xauth = 0x1 <error: Cannot access memory at address 0x1>, reg = {final = true, f = 0x0}, cb = {f = 0x1, data = 0x0}}}, {kind = FEATURE_DEPENDS, type = FEATURE_CUSTOM, arg = {crypter = {
                alg = 2747212326, key_size = 0}, aead = {alg = 2747212326, key_size = 0}, signer = 2747212326, prf = 2747212326, xof = 2747212326, kdf = (KDF_PRF_PLUS | unknown: 0xa3bf2224), 
              drbg = 2747212326, hasher = 2747212326, ke = 2747212326, rng_quality = (RNG_TRUE | unknown: 0xa3bf2224), privkey = 2747212326, privkey_gen = 2747212326, privkey_sign = 2747212326, 
              privkey_decrypt = 2747212326, pubkey = 2747212326, pubkey_verify = 2747212326, pubkey_encrypt = 2747212326, cert = 2747212326, container = 2747212326, eap = {type = 2747212326, 
                vendor = 127}, database = (DB_MYSQL | unknown: 0xa3bf2224), fetcher = 0x7fa3bf2226 "socket", custom = 0x7fa3bf2226 "socket", xauth = 0x7fa3bf2226 "socket", reg = {final = 38, f = 0x0}, 
              cb = {f = 0x7fa3bf2226, data = 0x0}}}, {kind = FEATURE_CALLBACK, type = FEATURE_NONE, arg = {crypter = {alg = 2746845704, key_size = 367088242528}, aead = {alg = 2746845704, 
                key_size = 367088242528}, signer = 2746845704, prf = 2746845704, xof = 2746845704, kdf = (unknown: 0xa3b98a08), drbg = 2746845704, hasher = 2746845704, ke = 2746845704, 
              rng_quality = (unknown: 0xa3b98a08), privkey = 2746845704, privkey_gen = 2746845704, privkey_sign = 2746845704, privkey_decrypt = 2746845704, pubkey = 2746845704, 
              pubkey_verify = 2746845704, pubkey_encrypt = 2746845704, cert = 2746845704, container = 2746845704, eap = {type = 2746845704, vendor = 127}, database = (unknown: 0xa3b98a08), 
              fetcher = 0x7fa3b98a08 <sa_managers_cb> "?#\003\325\375{\276\251\375\003", custom = 0x7fa3b98a08 <sa_managers_cb> "?#\003\325\375{\276\251\375\003", 
              xauth = 0x7fa3b98a08 <sa_managers_cb> "?#\003\325\375{\276\251\375\003", reg = {final = 8, f = 0x55782a0f60}, cb = {f = 0x7fa3b98a08 <sa_managers_cb>, data = 0x55782a0f60}}}, {
            kind = FEATURE_PROVIDE, type = FEATURE_CUSTOM, arg = {crypter = {alg = 2747212261, key_size = 0}, aead = {alg = 2747212261, key_size = 0}, signer = 2747212261, prf = 2747212261, 
              xof = 2747212261, kdf = (KDF_PRF | unknown: 0xa3bf21e4), drbg = 2747212261, hasher = 2747212261, ke = 2747212261, rng_quality = (RNG_STRONG | unknown: 0xa3bf21e4), privkey = 2747212261, 
              privkey_gen = 2747212261, privkey_sign = 2747212261, privkey_decrypt = 2747212261, pubkey = 2747212261, pubkey_verify = 2747212261, pubkey_encrypt = 2747212261, cert = 2747212261, 
              container = 2747212261, eap = {type = 2747212261, vendor = 127}, database = (DB_SQLITE | unknown: 0xa3bf21e4), fetcher = 0x7fa3bf21e5 "libcharon-sa-managers", 
              custom = 0x7fa3bf21e5 "libcharon-sa-managers", xauth = 0x7fa3bf21e5 "libcharon-sa-managers", reg = {final = 229, f = 0x0}, cb = {f = 0x7fa3bf21e5, data = 0x0}}}, {kind = FEATURE_DEPENDS, 
            type = FEATURE_HASHER, arg = {crypter = {alg = ENCR_DES_IV64, key_size = 0}, aead = {alg = ENCR_DES_IV64, key_size = 0}, signer = AUTH_HMAC_MD5_96, prf = PRF_HMAC_MD5, xof = XOF_MGF1_SHA1, 
              kdf = KDF_PRF, drbg = DRBG_HMAC_SHA1, hasher = HASH_SHA1, ke = MODP_768_BIT, rng_quality = RNG_STRONG, privkey = KEY_RSA, privkey_gen = KEY_RSA, privkey_sign = SIGN_RSA_EMSA_PKCS1_NULL, 
              privkey_decrypt = ENCRYPT_RSA_PKCS1, pubkey = KEY_RSA, pubkey_verify = SIGN_RSA_EMSA_PKCS1_NULL, pubkey_encrypt = ENCRYPT_RSA_PKCS1, cert = CERT_X509, container = CONTAINER_PKCS7_DATA, 
              eap = {type = EAP_IDENTITY, vendor = PEN_IETF}, database = DB_SQLITE, fetcher = 0x1 <error: Cannot access memory at address 0x1>, custom = 0x1 <error: Cannot access memory at address 0x1>, 
              xauth = 0x1 <error: Cannot access memory at address 0x1>, reg = {final = true, f = 0x0}, cb = {f = 0x1, data = 0x0}}}, {kind = FEATURE_DEPENDS, type = FEATURE_RNG, arg = {crypter = {
                alg = 0, key_size = 0}, aead = {alg = 0, key_size = 0}, signer = 0, prf = 0, xof = XOF_UNDEFINED, kdf = KDF_UNDEFINED, drbg = DRBG_UNDEFINED, hasher = 0, ke = KE_NONE, 
              rng_quality = RNG_WEAK, privkey = KEY_ANY, privkey_gen = KEY_ANY, privkey_sign = SIGN_UNKNOWN, privkey_decrypt = ENCRYPT_UNKNOWN, pubkey = KEY_ANY, pubkey_verify = SIGN_UNKNOWN, 
              pubkey_encrypt = ENCRYPT_UNKNOWN, cert = CERT_ANY, container = CONTAINER_PKCS7, eap = {type = 0, vendor = PEN_IETF}, database = DB_ANY, fetcher = 0x0, custom = 0x0, xauth = 0x0, reg = {
--Type <RET> for more, q to quit, c to continue without paging--
                final = false, f = 0x0}, cb = {f = 0x0, data = 0x0}}}}
#19 load_plugins (this=0x5578292c30, list=0x556bd62000 "a") at ../../../strongswan-5.9.13/src/libstrongswan/plugins/plugin_loader.c:1298
        enumerator = <optimized out>
        default_path = 0x7fa3c889f5 "/usr/lib/ipsec/plugins"
        plugins = 0x55782ad050 " pkcs11 aes des rc2 sha2 sha3 mgf1 random nonce x509 revocation pubkey pkcs1 pkcs7 pkcs12 pgp dnskey sshkey pem openssl pkcs8 fips-prf gmp curve25519 xcbc cmac hmac kdf ctr ccm gcm drbg curl attr kern"...
        token = 0x55782ad027 ""
        critical_failed = <optimized out>
#20 0x0000007fa3b988cc in initialize (this=this@entry=0x55782a0f60, 
    plugins=0x556bd526bc "pkcs11 aes des rc2 sha2 sha3 sha1 md5 mgf1 random nonce x509 revocation constraints pubkey pkcs1 pkcs7 pkcs12 pgp dnskey sshkey pem openssl pkcs8 fips-prf gmp curve25519 xcbc cmac hmac kdf ctr ccm gcm"...) at ../../../strongswan-5.9.13/src/libcharon/daemon.c:910
        features = {{kind = FEATURE_PROVIDE, type = FEATURE_CUSTOM, arg = {crypter = {alg = 2747212251, key_size = 0}, aead = {alg = 2747212251, key_size = 0}, signer = 2747212251, prf = 2747212251, 
              xof = 2747212251, kdf = (KDF_PRF | KDF_PRF_PLUS | unknown: 0xa3bf21d8), drbg = 2747212251, hasher = 2747212251, ke = 2747212251, 
--Type <RET> for more, q to quit, c to continue without paging--RET
              rng_quality = (RNG_STRONG | RNG_TRUE | unknown: 0xa3bf21d8), privkey = 2747212251, privkey_gen = 2747212251, privkey_sign = 2747212251, privkey_decrypt = 2747212251, pubkey = 2747212251, 
              pubkey_verify = 2747212251, pubkey_encrypt = 2747212251, cert = 2747212251, container = 2747212251, eap = {type = 2747212251, vendor = 127}, 
              database = (DB_SQLITE | DB_MYSQL | unknown: 0xa3bf21d8), fetcher = 0x7fa3bf21db "libcharon", custom = 0x7fa3bf21db "libcharon", xauth = 0x7fa3bf21db "libcharon", reg = {final = 219, 
                f = 0x0}, cb = {f = 0x7fa3bf21db, data = 0x0}}}, {kind = FEATURE_DEPENDS, type = FEATURE_NONCE_GEN, arg = {crypter = {alg = 0, key_size = 0}, aead = {alg = 0, key_size = 0}, signer = 0, 
              prf = 0, xof = XOF_UNDEFINED, kdf = KDF_UNDEFINED, drbg = DRBG_UNDEFINED, hasher = 0, ke = KE_NONE, rng_quality = RNG_WEAK, privkey = KEY_ANY, privkey_gen = KEY_ANY, 
              privkey_sign = SIGN_UNKNOWN, privkey_decrypt = ENCRYPT_UNKNOWN, pubkey = KEY_ANY, pubkey_verify = SIGN_UNKNOWN, pubkey_encrypt = ENCRYPT_UNKNOWN, cert = CERT_ANY, 
              container = CONTAINER_PKCS7, eap = {type = 0, vendor = PEN_IETF}, database = DB_ANY, fetcher = 0x0, custom = 0x0, xauth = 0x0, reg = {final = false, f = 0x0}, cb = {f = 0x0, data = 0x0}}}, 
          {kind = FEATURE_DEPENDS, type = FEATURE_CUSTOM, arg = {crypter = {alg = 2747212261, key_size = 0}, aead = {alg = 2747212261, key_size = 0}, signer = 2747212261, prf = 2747212261, 
              xof = 2747212261, kdf = (KDF_PRF | unknown: 0xa3bf21e4), drbg = 2747212261, hasher = 2747212261, ke = 2747212261, rng_quality = (RNG_STRONG | unknown: 0xa3bf21e4), privkey = 2747212261, 
              privkey_gen = 2747212261, privkey_sign = 2747212261, privkey_decrypt = 2747212261, pubkey = 2747212261, pubkey_verify = 2747212261, pubkey_encrypt = 2747212261, cert = 2747212261, 
              container = 2747212261, eap = {type = 2747212261, vendor = 127}, database = (DB_SQLITE | unknown: 0xa3bf21e4), fetcher = 0x7fa3bf21e5 "libcharon-sa-managers", 
              custom = 0x7fa3bf21e5 "libcharon-sa-managers", xauth = 0x7fa3bf21e5 "libcharon-sa-managers", reg = {final = 229, f = 0x0}, cb = {f = 0x7fa3bf21e5, data = 0x0}}}, {kind = FEATURE_DEPENDS, 
            type = FEATURE_CUSTOM, arg = {crypter = {alg = 2747212283, key_size = 0}, aead = {alg = 2747212283, key_size = 0}, signer = 2747212283, prf = 2747212283, xof = 2747212283, 
              kdf = (KDF_PRF | KDF_PRF_PLUS | unknown: 0xa3bf21f8), drbg = 2747212283, hasher = 2747212283, ke = 2747212283, rng_quality = (RNG_STRONG | RNG_TRUE | unknown: 0xa3bf21f8), 
              privkey = 2747212283, privkey_gen = 2747212283, privkey_sign = 2747212283, privkey_decrypt = 2747212283, pubkey = 2747212283, pubkey_verify = 2747212283, pubkey_encrypt = 2747212283, 
              cert = 2747212283, container = 2747212283, eap = {type = 2747212283, vendor = 127}, database = (DB_SQLITE | DB_MYSQL | unknown: 0xa3bf21f8), fetcher = 0x7fa3bf21fb "libcharon-receiver", 
              custom = 0x7fa3bf21fb "libcharon-receiver", xauth = 0x7fa3bf21fb "libcharon-receiver", reg = {final = 251, f = 0x0}, cb = {f = 0x7fa3bf21fb, data = 0x0}}}, {kind = FEATURE_DEPENDS, 
            type = FEATURE_CUSTOM, arg = {crypter = {alg = 2747212302, key_size = 0}, aead = {alg = 2747212302, key_size = 0}, signer = 2747212302, prf = 2747212302, xof = 2747212302, 
              kdf = (KDF_PRF_PLUS | unknown: 0xa3bf220c), drbg = 2747212302, hasher = 2747212302, ke = 2747212302, rng_quality = (RNG_TRUE | unknown: 0xa3bf220c), privkey = 2747212302, 
              privkey_gen = 2747212302, privkey_sign = 2747212302, privkey_decrypt = 2747212302, pubkey = 2747212302, pubkey_verify = 2747212302, pubkey_encrypt = 2747212302, cert = 2747212302, 
              container = 2747212302, eap = {type = 2747212302, vendor = 127}, database = (DB_MYSQL | unknown: 0xa3bf220c), fetcher = 0x7fa3bf220e "kernel-ipsec", custom = 0x7fa3bf220e "kernel-ipsec", 
              xauth = 0x7fa3bf220e "kernel-ipsec", reg = {final = 14, f = 0x0}, cb = {f = 0x7fa3bf220e, data = 0x0}}}, {kind = FEATURE_DEPENDS, type = FEATURE_CUSTOM, arg = {crypter = {alg = 2747212315, 
                key_size = 0}, aead = {alg = 2747212315, key_size = 0}, signer = 2747212315, prf = 2747212315, xof = 2747212315, kdf = (KDF_PRF | KDF_PRF_PLUS | unknown: 0xa3bf2218), drbg = 2747212315, 
              hasher = 2747212315, ke = 2747212315, rng_quality = (RNG_STRONG | RNG_TRUE | unknown: 0xa3bf2218), privkey = 2747212315, privkey_gen = 2747212315, privkey_sign = 2747212315, 
              privkey_decrypt = 2747212315, pubkey = 2747212315, pubkey_verify = 2747212315, pubkey_encrypt = 2747212315, cert = 2747212315, container = 2747212315, eap = {type = 2747212315, 
                vendor = 127}, database = (DB_SQLITE | DB_MYSQL | unknown: 0xa3bf2218), fetcher = 0x7fa3bf221b "kernel-net", custom = 0x7fa3bf221b "kernel-net", xauth = 0x7fa3bf221b "kernel-net", reg = {
                final = 27, f = 0x0}, cb = {f = 0x7fa3bf221b, data = 0x0}}}, {kind = FEATURE_CALLBACK, type = FEATURE_NONE, arg = {crypter = {alg = 2746845820, key_size = 367088242528}, aead = {
                alg = 2746845820, key_size = 367088242528}, signer = 2746845820, prf = 2746845820, xof = 2746845820, kdf = (unknown: 0xa3b98a7c), drbg = 2746845820, hasher = 2746845820, ke = 2746845820, 
              rng_quality = (unknown: 0xa3b98a7c), privkey = 2746845820, privkey_gen = 2746845820, privkey_sign = 2746845820, privkey_decrypt = 2746845820, pubkey = 2746845820, 
              pubkey_verify = 2746845820, pubkey_encrypt = 2746845820, cert = 2746845820, container = 2746845820, eap = {type = 2746845820, vendor = 127}, database = (unknown: 0xa3b98a7c), 
              fetcher = 0x7fa3b98a7c <sender_receiver_cb> "?#\003\325\375{\276\251\375\003", custom = 0x7fa3b98a7c <sender_receiver_cb> "?#\003\325\375{\276\251\375\003", 
              xauth = 0x7fa3b98a7c <sender_receiver_cb> "?#\003\325\375{\276\251\375\003", reg = {final = 124, f = 0x55782a0f60}, cb = {f = 0x7fa3b98a7c <sender_receiver_cb>, data = 0x55782a0f60}}}, {
            kind = FEATURE_PROVIDE, type = FEATURE_CUSTOM, arg = {crypter = {alg = 2747212283, key_size = 0}, aead = {alg = 2747212283, key_size = 0}, signer = 2747212283, prf = 2747212283, 
              xof = 2747212283, kdf = (KDF_PRF | KDF_PRF_PLUS | unknown: 0xa3bf21f8), drbg = 2747212283, hasher = 2747212283, ke = 2747212283, 
              rng_quality = (RNG_STRONG | RNG_TRUE | unknown: 0xa3bf21f8), privkey = 2747212283, privkey_gen = 2747212283, privkey_sign = 2747212283, privkey_decrypt = 2747212283, pubkey = 2747212283, 
              pubkey_verify = 2747212283, pubkey_encrypt = 2747212283, cert = 2747212283, container = 2747212283, eap = {type = 2747212283, vendor = 127}, 
              database = (DB_SQLITE | DB_MYSQL | unknown: 0xa3bf21f8), fetcher = 0x7fa3bf21fb "libcharon-receiver", custom = 0x7fa3bf21fb "libcharon-receiver", xauth = 0x7fa3bf21fb "libcharon-receiver", 
              reg = {final = 251, f = 0x0}, cb = {f = 0x7fa3bf21fb, data = 0x0}}}, {kind = FEATURE_DEPENDS, type = FEATURE_HASHER, arg = {crypter = {alg = ENCR_DES_IV64, key_size = 0}, aead = {
                alg = ENCR_DES_IV64, key_size = 0}, signer = AUTH_HMAC_MD5_96, prf = PRF_HMAC_MD5, xof = XOF_MGF1_SHA1, kdf = KDF_PRF, drbg = DRBG_HMAC_SHA1, hasher = HASH_SHA1, ke = MODP_768_BIT, 
              rng_quality = RNG_STRONG, privkey = KEY_RSA, privkey_gen = KEY_RSA, privkey_sign = SIGN_RSA_EMSA_PKCS1_NULL, privkey_decrypt = ENCRYPT_RSA_PKCS1, pubkey = KEY_RSA, 
              pubkey_verify = SIGN_RSA_EMSA_PKCS1_NULL, pubkey_encrypt = ENCRYPT_RSA_PKCS1, cert = CERT_X509, container = CONTAINER_PKCS7_DATA, eap = {type = EAP_IDENTITY, vendor = PEN_IETF}, 
              database = DB_SQLITE, fetcher = 0x1 <error: Cannot access memory at address 0x1>, custom = 0x1 <error: Cannot access memory at address 0x1>, 
              xauth = 0x1 <error: Cannot access memory at address 0x1>, reg = {final = true, f = 0x0}, cb = {f = 0x1, data = 0x0}}}, {kind = FEATURE_DEPENDS, type = FEATURE_RNG, arg = {crypter = {
                alg = ENCR_DES_IV64, key_size = 0}, aead = {alg = ENCR_DES_IV64, key_size = 0}, signer = AUTH_HMAC_MD5_96, prf = PRF_HMAC_MD5, xof = XOF_MGF1_SHA1, kdf = KDF_PRF, drbg = DRBG_HMAC_SHA1, 
              hasher = HASH_SHA1, ke = MODP_768_BIT, rng_quality = RNG_STRONG, privkey = KEY_RSA, privkey_gen = KEY_RSA, privkey_sign = SIGN_RSA_EMSA_PKCS1_NULL, privkey_decrypt = ENCRYPT_RSA_PKCS1, 
              pubkey = KEY_RSA, pubkey_verify = SIGN_RSA_EMSA_PKCS1_NULL, pubkey_encrypt = ENCRYPT_RSA_PKCS1, cert = CERT_X509, container = CONTAINER_PKCS7_DATA, eap = {type = EAP_IDENTITY, 
                vendor = PEN_IETF}, database = DB_SQLITE, fetcher = 0x1 <error: Cannot access memory at address 0x1>, custom = 0x1 <error: Cannot access memory at address 0x1>, 
              xauth = 0x1 <error: Cannot access memory at address 0x1>, reg = {final = true, f = 0x0}, cb = {f = 0x1, data = 0x0}}}, {kind = FEATURE_DEPENDS, type = FEATURE_CUSTOM, arg = {crypter = {
                alg = 2747212326, key_size = 0}, aead = {alg = 2747212326, key_size = 0}, signer = 2747212326, prf = 2747212326, xof = 2747212326, kdf = (KDF_PRF_PLUS | unknown: 0xa3bf2224), 
              drbg = 2747212326, hasher = 2747212326, ke = 2747212326, rng_quality = (RNG_TRUE | unknown: 0xa3bf2224), privkey = 2747212326, privkey_gen = 2747212326, privkey_sign = 2747212326, 
              privkey_decrypt = 2747212326, pubkey = 2747212326, pubkey_verify = 2747212326, pubkey_encrypt = 2747212326, cert = 2747212326, container = 2747212326, eap = {type = 2747212326, 
                vendor = 127}, database = (DB_MYSQL | unknown: 0xa3bf2224), fetcher = 0x7fa3bf2226 "socket", custom = 0x7fa3bf2226 "socket", xauth = 0x7fa3bf2226 "socket", reg = {final = 38, f = 0x0}, 
--Type <RET> for more, q to quit, c to continue without paging--RET
              cb = {f = 0x7fa3bf2226, data = 0x0}}}, {kind = FEATURE_CALLBACK, type = FEATURE_NONE, arg = {crypter = {alg = 2746845704, key_size = 367088242528}, aead = {alg = 2746845704, 
                key_size = 367088242528}, signer = 2746845704, prf = 2746845704, xof = 2746845704, kdf = (unknown: 0xa3b98a08), drbg = 2746845704, hasher = 2746845704, ke = 2746845704, 
              rng_quality = (unknown: 0xa3b98a08), privkey = 2746845704, privkey_gen = 2746845704, privkey_sign = 2746845704, privkey_decrypt = 2746845704, pubkey = 2746845704, 
              pubkey_verify = 2746845704, pubkey_encrypt = 2746845704, cert = 2746845704, container = 2746845704, eap = {type = 2746845704, vendor = 127}, database = (unknown: 0xa3b98a08), 
              fetcher = 0x7fa3b98a08 <sa_managers_cb> "?#\003\325\375{\276\251\375\003", custom = 0x7fa3b98a08 <sa_managers_cb> "?#\003\325\375{\276\251\375\003", 
              xauth = 0x7fa3b98a08 <sa_managers_cb> "?#\003\325\375{\276\251\375\003", reg = {final = 8, f = 0x55782a0f60}, cb = {f = 0x7fa3b98a08 <sa_managers_cb>, data = 0x55782a0f60}}}, {
            kind = FEATURE_PROVIDE, type = FEATURE_CUSTOM, arg = {crypter = {alg = 2747212261, key_size = 0}, aead = {alg = 2747212261, key_size = 0}, signer = 2747212261, prf = 2747212261, 
              xof = 2747212261, kdf = (KDF_PRF | unknown: 0xa3bf21e4), drbg = 2747212261, hasher = 2747212261, ke = 2747212261, rng_quality = (RNG_STRONG | unknown: 0xa3bf21e4), privkey = 2747212261, 
              privkey_gen = 2747212261, privkey_sign = 2747212261, privkey_decrypt = 2747212261, pubkey = 2747212261, pubkey_verify = 2747212261, pubkey_encrypt = 2747212261, cert = 2747212261, 
              container = 2747212261, eap = {type = 2747212261, vendor = 127}, database = (DB_SQLITE | unknown: 0xa3bf21e4), fetcher = 0x7fa3bf21e5 "libcharon-sa-managers", 
              custom = 0x7fa3bf21e5 "libcharon-sa-managers", xauth = 0x7fa3bf21e5 "libcharon-sa-managers", reg = {final = 229, f = 0x0}, cb = {f = 0x7fa3bf21e5, data = 0x0}}}, {kind = FEATURE_DEPENDS, 
            type = FEATURE_HASHER, arg = {crypter = {alg = ENCR_DES_IV64, key_size = 0}, aead = {alg = ENCR_DES_IV64, key_size = 0}, signer = AUTH_HMAC_MD5_96, prf = PRF_HMAC_MD5, xof = XOF_MGF1_SHA1, 
              kdf = KDF_PRF, drbg = DRBG_HMAC_SHA1, hasher = HASH_SHA1, ke = MODP_768_BIT, rng_quality = RNG_STRONG, privkey = KEY_RSA, privkey_gen = KEY_RSA, privkey_sign = SIGN_RSA_EMSA_PKCS1_NULL, 
              privkey_decrypt = ENCRYPT_RSA_PKCS1, pubkey = KEY_RSA, pubkey_verify = SIGN_RSA_EMSA_PKCS1_NULL, pubkey_encrypt = ENCRYPT_RSA_PKCS1, cert = CERT_X509, container = CONTAINER_PKCS7_DATA, 
              eap = {type = EAP_IDENTITY, vendor = PEN_IETF}, database = DB_SQLITE, fetcher = 0x1 <error: Cannot access memory at address 0x1>, custom = 0x1 <error: Cannot access memory at address 0x1>, 
              xauth = 0x1 <error: Cannot access memory at address 0x1>, reg = {final = true, f = 0x0}, cb = {f = 0x1, data = 0x0}}}, {kind = FEATURE_DEPENDS, type = FEATURE_RNG, arg = {crypter = {
                alg = 0, key_size = 0}, aead = {alg = 0, key_size = 0}, signer = 0, prf = 0, xof = XOF_UNDEFINED, kdf = KDF_UNDEFINED, drbg = DRBG_UNDEFINED, hasher = 0, ke = KE_NONE, 
              rng_quality = RNG_WEAK, privkey = KEY_ANY, privkey_gen = KEY_ANY, privkey_sign = SIGN_UNKNOWN, privkey_decrypt = ENCRYPT_UNKNOWN, pubkey = KEY_ANY, pubkey_verify = SIGN_UNKNOWN, 
              pubkey_encrypt = ENCRYPT_UNKNOWN, cert = CERT_ANY, container = CONTAINER_PKCS7, eap = {type = 0, vendor = PEN_IETF}, database = DB_ANY, fetcher = 0x0, custom = 0x0, xauth = 0x0, reg = {
                final = false, f = 0x0}, cb = {f = 0x0, data = 0x0}}}}
#21 0x000000556bd51a14 in main (argc=<optimized out>, argv=<optimized out>) at ../../../strongswan-5.9.13/src/charon/charon.c:421
        action = {__sigaction_handler = {sa_handler = 0x7fc323ee00, sa_sigaction = 0x7fc323ee00}, sa_mask = {__val = {548208951436, 548734758416, 548208914332, 548205715720, 110527149, 110527148, 
              548205713624, 548209085376, 548734758528, 548734758496, 548208876996, 548734758480, 548206930060, 1, 548209115832, 1}}, sa_flags = 41943040, sa_restorer = 0x7fc323ee80}
        group = 18
        status = 66
        utsname = {sysname = "Linux", '\000' <repeats 59 times>, nodename = "idcevo", '\000' <repeats 58 times>, release = "5.15.74", '\000' <repeats 57 times>, 
          version = "#1 SMP PREEMPT Mon May 20 06:09:14 UTC 2024", '\000' <repeats 21 times>, machine = "aarch64", '\000' <repeats 57 times>, __domainname = "(none)", '\000' <repeats 58 times>}
        levels = {LEVEL_CTRL <repeats 18 times>}
        use_syslog = false
(gdb) 

BadganchiP1234 avatar Jul 18 '24 15:07 BadganchiP1234