the gdb of the process of httpinspect to detect in snort2.9

(gdb) r
The program being debugged has been started already.
Start it from the beginning? (y or n) y
Starting program: /usr/bin/snort -c /etc/snort/snort.conf  -r /home/zengxiaosen/Desktop/tracesGongji_10.pcap
[Thread debugging using libthread_db enabled]
Using host libthread_db library "/lib/x86_64-linux-gnu/libthread_db.so.1".
Running in IDS mode

        --== Initializing Snort ==--
Initializing Output Plugins!
Initializing Preprocessors!
Initializing Plug-ins!
Parsing Rules file "/etc/snort/snort.conf"
PortVar 'HTTP_PORTS' defined :  [ 80:81 311 383 591 593 901 1220 1414 1741 1830 2301 2381 2809 3037 3128 3702 4343 4848 5250 6988 7000:7001 7144:7145 7510 7777 7779 8000 8008 8014 8028 8080 8085 8088 8090 8118 8123 8180:8181 8243 8280 8300 8800 8888 8899 9000 9060 9080 9090:9091 9443 9999 11371 34443:34444 41080 50002 55555 ]
PortVar 'SHELLCODE_PORTS' defined :  [ 0:79 81:65535 ]
PortVar 'ORACLE_PORTS' defined :  [ 1024:65535 ]
PortVar 'SSH_PORTS' defined :  [ 22 ]
PortVar 'FTP_PORTS' defined :  [ 21 2100 3535 ]
PortVar 'SIP_PORTS' defined :  [ 5060:5061 5600 ]
PortVar 'FILE_DATA_PORTS' defined :  [ 80:81 110 143 311 383 591 593 901 1220 1414 1741 1830 2301 2381 2809 3037 3128 3702 4343 4848 5250 6988 7000:7001 7144:7145 7510 7777 7779 8000 8008 8014 8028 8080 8085 8088 8090 8118 8123 8180:8181 8243 8280 8300 8800 8888 8899 9000 9060 9080 9090:9091 9443 9999 11371 34443:34444 41080 50002 55555 ]
PortVar 'GTP_PORTS' defined :  [ 2123 2152 3386 ]
Detection:
   Search-Method = AC-Full-Q
    Split Any/Any group = enabled
    Search-Method-Optimizations = enabled
    Maximum pattern length = 20
Tagged Packet Limit: 256
Loading dynamic engine /usr/local/lib/snort_dynamicengine/libsf_engine.so... done
Loading all dynamic detection libs from /usr/local/lib/snort_dynamicrules...
WARNING: No dynamic libraries found in directory /usr/local/lib/snort_dynamicrules.
  Finished Loading all dynamic detection libs from /usr/local/lib/snort_dynamicrules
Loading all dynamic preprocessor libs from /usr/local/lib/snort_dynamicpreprocessor/...
  Loading dynamic preprocessor library /usr/local/lib/snort_dynamicpreprocessor//libsf_ssl_preproc.so... done
  Loading dynamic preprocessor library /usr/local/lib/snort_dynamicpreprocessor//libsf_pop_preproc.so... done
  Loading dynamic preprocessor library /usr/local/lib/snort_dynamicpreprocessor//libsf_ftptelnet_preproc.so... done
  Loading dynamic preprocessor library /usr/local/lib/snort_dynamicpreprocessor//libsf_ssh_preproc.so... done
  Loading dynamic preprocessor library /usr/local/lib/snort_dynamicpreprocessor//libsf_reputation_preproc.so... done
  Loading dynamic preprocessor library /usr/local/lib/snort_dynamicpreprocessor//libsf_dnp3_preproc.so... done
  Loading dynamic preprocessor library /usr/local/lib/snort_dynamicpreprocessor//libsf_gtp_preproc.so... done
  Loading dynamic preprocessor library /usr/local/lib/snort_dynamicpreprocessor//libsf_sdf_preproc.so... done
  Loading dynamic preprocessor library /usr/local/lib/snort_dynamicpreprocessor//libsf_dce2_preproc.so... done
  Loading dynamic preprocessor library /usr/local/lib/snort_dynamicpreprocessor//libsf_dns_preproc.so... done
  Loading dynamic preprocessor library /usr/local/lib/snort_dynamicpreprocessor//libsf_smtp_preproc.so... done
  Loading dynamic preprocessor library /usr/local/lib/snort_dynamicpreprocessor//libsf_sip_preproc.so... done
  Loading dynamic preprocessor library /usr/local/lib/snort_dynamicpreprocessor//libsf_imap_preproc.so... done
  Loading dynamic preprocessor library /usr/local/lib/snort_dynamicpreprocessor//libsf_modbus_preproc.so... done
  Finished Loading all dynamic preprocessor libs from /usr/local/lib/snort_dynamicpreprocessor/
Log directory = /var/log/snort
WARNING: ip4 normalizations disabled because not inline.
WARNING: tcp normalizations disabled because not inline.
WARNING: icmp4 normalizations disabled because not inline.
WARNING: ip6 normalizations disabled because not inline.
WARNING: icmp6 normalizations disabled because not inline.
Frag3 global config:
    Max frags: 65536
    Fragment memory cap: 4194304 bytes
Frag3 engine config:
    Bound Address: default
    Target-based policy: WINDOWS
    Fragment timeout: 180 seconds
    Fragment min_ttl:   1
    Fragment Anomalies: Alert
    Overlap Limit:     10
    Min fragment Length:     100
      Max Expected Streams: 768
Stream global config:
    Track TCP sessions: ACTIVE
    Max TCP sessions: 262144
    TCP cache pruning timeout: 30 seconds
    TCP cache nominal timeout: 3600 seconds
    Memcap (for reassembly packet storage): 8388608
    Track UDP sessions: ACTIVE
    Max UDP sessions: 131072
    UDP cache pruning timeout: 30 seconds
    UDP cache nominal timeout: 180 seconds
    Track ICMP sessions: INACTIVE
    Track IP sessions: INACTIVE
    Log info if session memory consumption exceeds 1048576
    Send up to 2 active responses
    Wait at least 5 seconds between responses
    Protocol Aware Flushing: ACTIVE
        Maximum Flush Point: 16000
Stream TCP Policy config:
    Bound Address: default
    Reassembly Policy: WINDOWS
    Timeout: 180 seconds
    Limit on TCP Overlaps: 10
    Maximum number of bytes to queue per session: 1048576
    Maximum number of segs to queue per session: 2621
    Options:
        Require 3-Way Handshake: YES
        3-Way Handshake Timeout: 180
        Detect Anomalies: YES
    Reassembly Ports:
      21 client (Footprint)
      22 client (Footprint)
      23 client (Footprint)
      25 client (Footprint)
      42 client (Footprint)
      53 client (Footprint)
      79 client (Footprint)
      80 client (Footprint) server (Footprint)
      81 client (Footprint) server (Footprint)
      109 client (Footprint)
      110 client (Footprint)
      111 client (Footprint)
      113 client (Footprint)
      119 client (Footprint)
      135 client (Footprint)
      136 client (Footprint)
      137 client (Footprint)
      139 client (Footprint)
      143 client (Footprint)
      161 client (Footprint)
      additional ports configured but not printed.
Stream UDP Policy config:
    Timeout: 180 seconds
HttpInspect Config:
    GLOBAL CONFIG
      Detect Proxy Usage:       NO
      IIS Unicode Map Filename: /etc/snort/unicode.map
      IIS Unicode Map Codepage: 1252
      Memcap used for logging URI and Hostname: 150994944
      Max Gzip Memory: 838860
      Max Gzip Sessions: 1613
      Gzip Compress Depth: 65535
      Gzip Decompress Depth: 65535
    DEFAULT SERVER CONFIG:
      Server profile: All
      Ports (PAF): 80 81 311 383 591 593 901 1220 1414 1741 1830 2301 2381 2809 3037 3128 3702 4343 4848 5250 6988 7000 7001 7144 7145 7510 7777 7779 8000 8008 8014 8028 8080 8085 8088 8090 8118 8123 8180 8181 8243 8280 8300 8800 8888 8899 9000 9060 9080 9090 9091 9443 9999 11371 34443 34444 41080 50002 55555
      Server Flow Depth: 0
      Client Flow Depth: 0
      Max Chunk Length: 500000
      Small Chunk Length Evasion: chunk size <= 10, threshold >= 5 times
      Max Header Field Length: 750
      Max Number Header Fields: 100
      Max Number of WhiteSpaces allowed with header folding: 200
      Inspect Pipeline Requests: YES
      URI Discovery Strict Mode: NO
      Allow Proxy Usage: NO
      Disable Alerting: NO
      Oversize Dir Length: 500
      Only inspect URI: NO
      Normalize HTTP Headers: NO
      Inspect HTTP Cookies: YES
      Inspect HTTP Responses: YES
      Extract Gzip from responses: YES
      Decompress response files:   
      Unlimited decompression of gzip data from responses: YES
      Normalize Javascripts in HTTP Responses: YES
      Max Number of WhiteSpaces allowed with Javascript Obfuscation in HTTP responses: 200
      Normalize HTTP Cookies: NO
      Enable XFF and True Client IP: NO
      Log HTTP URI data: NO
      Log HTTP Hostname data: NO
      Extended ASCII code support in URI: NO
      Ascii: YES alert: NO
      Double Decoding: YES alert: NO
      %U Encoding: YES alert: YES
      Bare Byte: YES alert: NO
      UTF 8: YES alert: NO
      IIS Unicode: YES alert: NO
      Multiple Slash: YES alert: NO
      IIS Backslash: YES alert: NO
      Directory Traversal: YES alert: NO
      Web Root Traversal: YES alert: NO
      Apache WhiteSpace: YES alert: NO
      IIS Delimiter: YES alert: NO
      IIS Unicode Map: GLOBAL IIS UNICODE MAP CONFIG
      Non-RFC Compliant Characters: 0x00 0x01 0x02 0x03 0x04 0x05 0x06 0x07
      Whitespace Characters: 0x09 0x0b 0x0c 0x0d
rpc_decode arguments:
    Ports to decode RPC on: 111 32770 32771 32772 32773 32774 32775 32776 32777 32778 32779
    alert_fragments: INACTIVE
    alert_large_fragments: INACTIVE
    alert_incomplete: INACTIVE
    alert_multiple_requests: INACTIVE
FTPTelnet Config:
    GLOBAL CONFIG
      Inspection Type: stateful
      Check for Encrypted Traffic: YES alert: NO
      Continue to check encrypted data: YES
    TELNET CONFIG:
      Ports: 23
      Are You There Threshold: 20
      Normalize: YES
      Detect Anomalies: YES
    FTP CONFIG:
      FTP Server: default
        Ports (PAF): 21 2100 3535
        Check for Telnet Cmds: YES alert: YES
        Ignore Telnet Cmd Operations: YES alert: YES
        Ignore open data channels: NO
      FTP Client: default
        Check for Bounce Attacks: YES alert: YES
        Check for Telnet Cmds: YES alert: YES
        Ignore Telnet Cmd Operations: YES alert: YES
        Max Response Length: 256
SMTP Config:
    Ports: 25 465 587 691
    Inspection Type: Stateful
    Normalize: ATRN AUTH BDAT DATA DEBUG EHLO EMAL ESAM ESND ESOM ETRN EVFY EXPN HELO HELP IDENT MAIL NOOP ONEX QUEU QUIT RCPT RSET SAML SEND STARTTLS SOML TICK TIME TURN TURNME VERB VRFY X-EXPS XADR XAUTH XCIR XEXCH50 XGEN XLICENSE X-LINK2STATE XQUE XSTA XTRN XUSR CHUNKING X-ADAT X-DRCP X-ERCP X-EXCH50
    Ignore Data: No
    Ignore TLS Data: No
    Ignore SMTP Alerts: No
    Max Command Line Length: 512
    Max auth Command Line Length: 1000
    Max Specific Command Line Length:
       ATRN:255 AUTH:246 BDAT:255 DATA:246 DEBUG:255
       EHLO:500 EMAL:255 ESAM:255 ESND:255 ESOM:255
       ETRN:246 EVFY:255 EXPN:255 HELO:500 HELP:500
       IDENT:255 MAIL:260 NOOP:255 ONEX:246 QUEU:246
       QUIT:246 RCPT:300 RSET:246 SAML:246 SEND:246
       SIZE:255 STARTTLS:246 SOML:246 TICK:246 TIME:246
       TURN:246 TURNME:246 VERB:246 VRFY:255 X-EXPS:246
       XADR:246 XAUTH:246 XCIR:246 XEXCH50:246 XGEN:246
       XLICENSE:246 X-LINK2STATE:246 XQUE:246 XSTA:246 XTRN:246
       XUSR:246
    Max Header Line Length: 1000
    Max Response Line Length: 512
    X-Link2State Alert: Yes
    Drop on X-Link2State Alert: No
    Alert on commands: None
    Alert on unknown commands: No
    SMTP Memcap: 838860
    MIME Max Mem: 838860
    Base64 Decoding: Enabled
    Base64 Decoding Depth: Unlimited
    Quoted-Printable Decoding: Enabled
    Quoted-Printable Decoding Depth: Unlimited
    Unix-to-Unix Decoding: Enabled
    Unix-to-Unix Decoding Depth: Unlimited
    Non-Encoded MIME attachment Extraction: Enabled
    Non-Encoded MIME attachment Extraction Depth: Unlimited
    Log Attachment filename: Enabled
    Log MAIL FROM Address: Enabled
    Log RCPT TO Addresses: Enabled
    Log Email Headers: Enabled
    Email Hdrs Log Depth: 1464
SSH config:
    Autodetection: ENABLED
    Challenge-Response Overflow Alert: ENABLED
    SSH1 CRC32 Alert: ENABLED
    Server Version String Overflow Alert: ENABLED
    Protocol Mismatch Alert: ENABLED
    Bad Message Direction Alert: DISABLED
    Bad Payload Size Alert: DISABLED
    Unrecognized Version Alert: DISABLED
    Max Encrypted Packets: 20  
    Max Server Version String Length: 100  
    MaxClientBytes: 19600 (Default)
    Ports:
    22
DCE/RPC 2 Preprocessor Configuration
  Global Configuration
    DCE/RPC Defragmentation: Enabled
    Memcap: 102400 KB
    Events: co
    SMB Fingerprint policy: Disabled
  Server Default Configuration
    Policy: WinXP
    Detect ports (PAF)
      SMB: 139 445
      TCP: 135
      UDP: 135
      RPC over HTTP server: 593
      RPC over HTTP proxy: None
    Autodetect ports (PAF)
      SMB: None
      TCP: 1025-65535
      UDP: 1025-65535
      RPC over HTTP server: 1025-65535
      RPC over HTTP proxy: None
    Invalid SMB shares: C$ D$ ADMIN$
    Maximum SMB command chaining: 3 commands
    SMB file inspection: Disabled
DNS config:
    DNS Client rdata txt Overflow Alert: ACTIVE
    Obsolete DNS RR Types Alert: INACTIVE
    Experimental DNS RR Types Alert: INACTIVE
    Ports: 53
SSLPP config:
    Encrypted packets: not inspected
    Ports:
      443      465      563      636      989
      992      993      994      995     7801
     7802     7900     7901     7902     7903
     7904     7905     7906     7907     7908
     7909     7910     7911     7912     7913
     7914     7915     7916     7917     7918
     7919     7920
    Server side data is trusted
    Maximum SSL Heartbeat length: 0
Sensitive Data preprocessor config:
    Global Alert Threshold: 25
    Masked Output: DISABLED
SIP config:
    Max number of sessions: 40000  
    Max number of dialogs in a session: 4 (Default)
    Status: ENABLED
    Ignore media channel: DISABLED
    Max URI length: 512  
    Max Call ID length: 80  
    Max Request name length: 20 (Default)
    Max From length: 256 (Default)
    Max To length: 256 (Default)
    Max Via length: 1024 (Default)
    Max Contact length: 512  
    Max Content length: 2048  
    Ports:
    5060    5061    5600
    Methods:
      invite cancel ack bye register options refer subscribe update join info message notify benotify do qauth sprack publish service unsubscribe prack
IMAP Config:
    Ports: 143
    IMAP Memcap: 838860
    MIME Max Mem: 838860
    Base64 Decoding: Enabled
    Base64 Decoding Depth: Unlimited
    Quoted-Printable Decoding: Enabled
    Quoted-Printable Decoding Depth: Unlimited
    Unix-to-Unix Decoding: Enabled
    Unix-to-Unix Decoding Depth: Unlimited
    Non-Encoded MIME attachment Extraction: Enabled
    Non-Encoded MIME attachment Extraction Depth: Unlimited
POP Config:
    Ports: 110
    POP Memcap: 838860
    MIME Max Mem: 838860
    Base64 Decoding: Enabled
    Base64 Decoding Depth: Unlimited
    Quoted-Printable Decoding: Enabled
    Quoted-Printable Decoding Depth: Unlimited
    Unix-to-Unix Decoding: Enabled
    Unix-to-Unix Decoding Depth: Unlimited
    Non-Encoded MIME attachment Extraction: Enabled
    Non-Encoded MIME attachment Extraction Depth: Unlimited
Modbus config:
    Ports:
    502
DNP3 config:
    Memcap: 262144
    Check Link-Layer CRCs: ENABLED
    Ports:
    20000
Reputation config:
WARNING: Can't find any whitelist/blacklist entries. Reputation Preprocessor disabled.

+++++++++++++++++++++++++++++++++++++++++++++++++++
Initializing rule chains...
3 Snort rules read
    3 detection rules
    0 decoder rules
    0 preprocessor rules
3 Option Chains linked into 3 Chain Headers
0 Dynamic rules
+++++++++++++++++++++++++++++++++++++++++++++++++++

+-------------------[Rule Port Counts]---------------------------------------
|             tcp     udp    icmp      ip
|     src       1       0       0       0
|     dst       1       0       0       0
|     any       0       0       1       0
|      nc       0       0       1       0
|     s+d       0       0       0       0
+----------------------------------------------------------------------------

+-----------------------[detection-filter-config]------------------------------
| memory-cap : 1048576 bytes
+-----------------------[detection-filter-rules]-------------------------------
| none
-------------------------------------------------------------------------------

+-----------------------[rate-filter-config]-----------------------------------
| memory-cap : 1048576 bytes
+-----------------------[rate-filter-rules]------------------------------------
| none
-------------------------------------------------------------------------------

+-----------------------[event-filter-config]----------------------------------
| memory-cap : 1048576 bytes
+-----------------------[event-filter-global]----------------------------------
+-----------------------[event-filter-local]-----------------------------------
| none
+-----------------------[suppression]------------------------------------------
| none
-------------------------------------------------------------------------------
Rule application order: activation->dynamic->pass->drop->sdrop->reject->alert->log
Verifying Preprocessor Configurations!
WARNING: flowbits key 'file.htc' is checked but not ever set.
1 out of 1024 flowbits in use.

[ Port Based Pattern Matching Memory ]
+- [ Aho-Corasick Summary ] -------------------------------------
| Storage Format    : Full-Q
| Finite Automaton  : DFA
| Alphabet Size     : 256 Chars
| Sizeof State      : Variable (1,2,4 bytes)
| Instances         : 2
|     1 byte states : 2
|     2 byte states : 0
|     4 byte states : 0
| Characters        : 32
| States            : 34
| Transitions       : 64
| State Density     : 0.7%
| Patterns          : 2
| Match States      : 2
| Memory (KB)       : 20.49
|   Pattern         : 0.22
|   Match Lists     : 0.42
|   DFA
|     1 byte states : 8.83
|     2 byte states : 0.00
|     4 byte states : 0.00
+----------------------------------------------------------------
[ Number of patterns truncated to 20 bytes: 0 ]
pcap DAQ configured to read-file.
Acquiring network traffic from "/home/zengxiaosen/Desktop/tracesGongji_10.pcap".
Reload thread starting...
[New Thread 0x7fffdf2f4700 (LWP 23480)]
Reload thread started, thread 0x7fffdf2f4700 (23480)
WARNING: active responses disabled since DAQ can't inject packets.

        --== Initialization Complete ==--

   ,,_     -*> Snort! <*-
  o"  )~   Version 2.9.8.3 GRE (Build 383)
   ''''    By Martin Roesch & The Snort Team: http://www.snort.org/contact#team
           Copyright (C) 2014-2015 Cisco and/or its affiliates. All rights reserved.
           Copyright (C) 1998-2013 Sourcefire, Inc., et al.
           Using libpcap version 1.7.4
           Using PCRE version: 8.38 2015-11-23
           Using ZLIB version: 1.2.8

           Rules Engine: SF_SNORT_DETECTION_ENGINE  Version 2.6  <Build 1>
           Preprocessor Object: SF_MODBUS  Version 1.1  <Build 1>
           Preprocessor Object: SF_IMAP  Version 1.0  <Build 1>
           Preprocessor Object: SF_SIP  Version 1.1  <Build 1>
           Preprocessor Object: SF_SMTP  Version 1.1  <Build 9>
           Preprocessor Object: SF_DNS  Version 1.1  <Build 4>
           Preprocessor Object: SF_DCERPC2  Version 1.0  <Build 3>
           Preprocessor Object: SF_SDF  Version 1.1  <Build 1>
           Preprocessor Object: SF_GTP  Version 1.1  <Build 1>
           Preprocessor Object: SF_DNP3  Version 1.1  <Build 1>
           Preprocessor Object: SF_REPUTATION  Version 1.1  <Build 1>
           Preprocessor Object: SF_SSH  Version 1.1  <Build 3>
           Preprocessor Object: SF_FTPTELNET  Version 1.2  <Build 13>
           Preprocessor Object: SF_POP  Version 1.0  <Build 1>
           Preprocessor Object: SF_SSLPP  Version 1.1  <Build 4>
Commencing packet processing (pid=23479)

Thread 1 "snort" hit Breakpoint 1, SnortHttpInspect (GlobalConf=0x174f3a0, p=0xee4300 <s_packet>)
    at snort_httpinspect.c:3910
3910    {
(gdb) n
3913        int iInspectMode = 0;
(gdb) n
3915        int iCallDetect = 1;
(gdb) n
3916        HttpSessionData *hsd = NULL;
(gdb) n
3917        bool fileProcessed = false;
(gdb) n
3918        bool is_first = true;
(gdb) n
3922        hi_stats.total++;
(gdb) n
3929        SetSiInput(&SiInput, p);
(gdb) n
3962        iRet = hi_si_session_inspection(GlobalConf, &Session, &SiInput, &iInspectMode, p);
(gdb) n
3963        if (iRet)
(gdb) n
3968        if (iInspectMode == HI_SI_NO_MODE)
(gdb) n
3993        hsd = GetHttpSessionData(p);
(gdb) n
4001        if(!hsd && ( SiInput.pdir == HI_SI_SERVER_MODE ) && (p->packet_flags & PKT_STREAM_ORDER_OK))
(gdb) n
4014        if ( ScPafEnabled() &&
(gdb) n
4015            (p->packet_flags & PKT_STREAM_INSERT) &&
(gdb) n
4014        if ( ScPafEnabled() &&
(gdb) n
4016            (!(p->packet_flags & PKT_PDU_TAIL)) )
(gdb) n
4015            (p->packet_flags & PKT_STREAM_INSERT) &&
(gdb) n
4048        if (hsd == NULL)
(gdb) n
4050            hsd = SetNewHttpSessionData(p, (void *)Session);
(gdb) n
4051            if (hsd == NULL)
(gdb) n
4072        if (hsd->decomp_state)
(gdb) n
4082            SetHttpDecode(0);
(gdb) n
4083            ClearHttpBuffers();
(gdb) n
4085            iRet = hi_mi_mode_inspection(Session, iInspectMode, p, hsd);
(gdb) n
4086            if (iRet)
(gdb) n
4096            iRet = hi_normalization(Session, iInspectMode, hsd);
(gdb) n
4097            if (iRet)
(gdb) n
4103            HttpLogFuncs(GlobalConf, hsd, p, iCallDetect);
(gdb) n
4109            if ( iInspectMode == HI_SI_CLIENT_MODE )
(gdb) n
4112                ClearHttpBuffers();  // FIXTHIS needed here and right above??
(gdb) n
4114                if ( Session->client.request.uri_norm )
(gdb) n
4129                else if ( Session->client.request.uri )
(gdb) n
4135                        Session->client.request.uri_encode_type);
(gdb) n
4131                    SetHttpBufferEncoding(
(gdb) n
4134                        Session->client.request.uri_size,
(gdb) n
4131                    SetHttpBufferEncoding(
(gdb) n
4133                        Session->client.request.uri,
(gdb) n
4131                    SetHttpBufferEncoding(
(gdb) n
4140                        Session->client.request.uri_size);
(gdb) n
4137                    SetHttpBuffer(
(gdb) n
4139                        Session->client.request.uri,
(gdb) n
4137                    SetHttpBuffer(
(gdb) n
4142                    p->packet_flags |= PKT_HTTP_DECODE;
(gdb) n
4145                if ( Session->client.request.header_norm ||
(gdb) n
4148                    if ( Session->client.request.header_norm )
(gdb) n
4154                            Session->client.request.header_encode_type);
(gdb) n
4150                        SetHttpBufferEncoding(
(gdb) n
4153                            Session->client.request.header_norm_size,
(gdb) n
4150                        SetHttpBufferEncoding(
(gdb) n
4152                            Session->client.request.header_norm,
(gdb) n
4150                        SetHttpBufferEncoding(
(gdb) n
4159                            Session->client.request.header_raw_size);
(gdb) n
4156                        SetHttpBuffer(
(gdb) n
4158                            Session->client.request.header_raw,
(gdb) n
4156                        SetHttpBuffer(
(gdb) n
4161                        p->packet_flags |= PKT_HTTP_DECODE;
(gdb) n
4183                if(Session->client.request.method & (HI_POST_METHOD | HI_GET_METHOD))
(gdb) n
4185                    if(Session->client.request.post_raw)
(gdb) n
4213                if ( Session->client.request.method_raw )
(gdb) n
4218                        Session->client.request.method_size);
(gdb) n
4215                    SetHttpBuffer(
(gdb) n
4217                        Session->client.request.method_raw,
(gdb) n
4215                    SetHttpBuffer(
(gdb) n
4220                    p->packet_flags |= PKT_HTTP_DECODE;
(gdb) n
4223                if ( Session->client.request.cookie_norm ||
(gdb) n
4224                     Session->client.request.cookie.cookie )
(gdb) n
4223                if ( Session->client.request.cookie_norm ||
(gdb) n
4260                else if ( !Session->server_conf->enable_cookie &&
(gdb) n
4274                if ( IsLimitedDetect(p) )
(gdb) n
4276                    ApplyClientFlowDepth(p, Session->server_conf->client_flow_depth);
(gdb) n
4278                    if( !GetHttpBufferMask() && (p->alt_dsize == 0)  )
(gdb) n
4514            PREPROC_PROFILE_START(hiDetectPerfStats);
(gdb) n
4515            Detect(p);
(gdb) s
Detect (p=0xee4300 <s_packet>) at detect.c:497
497        int detected = 0;
(gdb) n
500        if ((p == NULL) || !IPH_IS_VALID(p))
(gdb) n
506        if (!snort_conf->ip_proto_array[GET_IPH_PROTO(p)])
(gdb) n
529        if (p->packet_flags & PKT_PASS_RULE)
(gdb) n
542        if( PPM_PKTS_ENABLED() )
(gdb) n
556        PREPROC_PROFILE_START(detectPerfStats);
(gdb) s
ScProfilePreprocs () at snort.h:1477
1477        return snort_conf->profile_preprocs.num;
(gdb) n
1478    }
(gdb) n
Detect (p=0xee4300 <s_packet>) at detect.c:557
557        detected = fpEvalPacket(p);
(gdb) s
fpEvalPacket (p=0xee4300 <s_packet>) at fpdetect.c:1626
1626        int ip_proto = GET_IPH_PROTO(p);
(gdb) bt
#0  fpEvalPacket (p=0xee4300 <s_packet>) at fpdetect.c:1626
#1  0x0000000000446241 in Detect (p=0xee4300 <s_packet>) at detect.c:557
#2  0x00000000004ab952 in SnortHttpInspect (GlobalConf=0x174f3a0, p=0xee4300 <s_packet>)
    at snort_httpinspect.c:4515
#3  0x00000000004a12c9 in HttpInspect (p=0xee4300 <s_packet>, context=0x0) at spp_httpinspect.c:216
#4  0x0000000000445680 in DispatchPreprocessors (p=0xee4300 <s_packet>, policy_id=0, policy=0x7ffff4d56010)
    at detect.c:141
#5  0x00000000004459be in Preprocess (p=0xee4300 <s_packet>) at detect.c:239
#6  0x000000000043816f in ProcessPacket (p=0xee4300 <s_packet>, pkthdr=0x7fffffffe260, pkt=0x1bb8630 "\002",
    ft=0x0) at snort.c:1899
#7  0x0000000000437d84 in PacketCallback (user=0x0, pkthdr=0x7fffffffe260, pkt=0x1bb8630 "\002") at snort.c:1745
#8  0x0000000000535d34 in pcap_process_loop (user=0x1ba31b0 "", pkth=<optimized out>, data=<optimized out>)
    at daq_pcap.c:362
#9  0x00007ffff6bbbac4 in ?? () from /usr/lib/x86_64-linux-gnu/libpcap.so.0.8
#10 0x0000000000535f1d in pcap_daq_acquire (handle=0x1ba31b0, cnt=0, callback=<optimized out>,
    metaback=<optimized out>, user=<optimized out>) at daq_pcap.c:380
#11 0x000000000045e080 in DAQ_Acquire (max=0, callback=0x437bf8 <PacketCallback>, user=0x0) at sfdaq.c:640
#12 0x000000000043a6bb in PacketLoop () at snort.c:3296
#13 0x0000000000436c69 in SnortMain (argc=5, argv=0x7fffffffe528) at snort.c:952
#14 0x0000000000436aba in main (argc=5, argv=0x7fffffffe528) at snort.c:836
(gdb) n
1627        OTNX_MATCH_DATA *omd = snort_conf->omd;
(gdb) n
1630        if ( p->udph && (p->proto_bits & (PROTO_BIT__TEREDO | PROTO_BIT__GTP)) )
(gdb) n
1661        switch(ip_proto)
(gdb) n
1667                if(p->tcph == NULL)
(gdb) n
1673                return fpEvalHeaderTcp(p, omd);
(gdb) s
fpEvalHeaderTcp (p=0xee4300 <s_packet>, omd=0x1705140) at fpdetect.c:1482
1482    {
(gdb) n
1483        PORT_GROUP *src = NULL, *dst = NULL, *gen = NULL;
(gdb) n
1486        PORT_GROUP *nssrc = NULL, *nsdst = NULL;
(gdb) n
1488        if (IsAdaptiveConfigured())
(gdb) n
1503        if ( src == NULL && dst == NULL )
(gdb) n
1505            if(!prmFindRuleGroupTcp(snort_conf->prmTcpRTNX, p->dp, p->sp, &src, &dst, &nssrc, &nsdst, &gen))

  • 0
    点赞
  • 0
    收藏
    觉得还不错? 一键收藏
  • 0
    评论

“相关推荐”对你有帮助么?

  • 非常没帮助
  • 没帮助
  • 一般
  • 有帮助
  • 非常有帮助
提交
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值