//usr/lib64/lib64//lib64/lib64/httpd/ELF > 0 @ 5 @ 8 @ $ $ + + + , , , $ $ Ptd ! ! ! d d Qtd Rtd + + + 8 8 GNU 0Ibc@u%nG " !T " % ' CBE|qXHD) v u o 2 ] V ; a 8 d R " & b ? h0 R p0 F h0 8 0 h 4 __gmon_start__ _init _fini _ITM_deregisterTMCloneTable _ITM_registerTMCloneTable __cxa_finalize _Jv_RegisterClasses ap_hook_pre_config ap_hook_test_config ap_hook_drop_privileges ap_unixd_config ap_exists_config_define geteuid apr_file_open_stdout apr_file_printf __stack_chk_fail ap_uname2id ap_gname2id apr_stat ap_sys_privileges_handlers access setgid initgroups strtol getpwuid __errno_location unixd_module ap_log_error_ ap_check_cmd_context apr_pstrcat ap_is_directory chdir chroot ap_coredumpdir_configured prctl setuid ap_unixd_setup_child libpthread.so.0 libc.so.6 _edata __bss_start _end mod_unixd.so GLIBC_2.4 GLIBC_2.2.5 5 0 ii
d ui n % ui n + + + a + , X! , f , (, ! 0, l 8, P, ! X, v `, p x, ! , , 0 X0 + `0 / / ' / / / / / / . . . . . . . / /
/ /
/ (/ 0/ 8/ @/ H/ P/ X/ `/ h/ p/ x/ / / / / / ! HH}! Ht H 5R %T @ %R h %J h %B h %: h %2 h %* h %" h % h p% h `%
h P% h
@% h 0% h % h
% h % h % h % h % h % h % h % h % h % h p% h `% h P% h @%z h 0H8 H=* UH)HHw]HT Ht]@ H H= UH)HHHH?HHu]HG Ht]H@ = u'H=/ UHtH= =h] @ f. H= t&H HtUH= H]W Kf. H=I H111H=3 111H=
11HD f. AVIH= AUATUSHH+ dH%( HD$1H$ DkDc>u*HD$dH3%( H[]A\A]A^f H- HK HLHElHH<$H5E DI1HSH<$H5C 1DIHS HnH<$H59 H1Tyf UHSH H5 dH%( HD$x1H HHCH HHCUH5 HHps CHC C uD$tHH HC( H HC( 1HL$xdH3%( u:HĈ [] H=d GuHJ C HC(zf. ATUSH H-9 Le A<$#t6}tWuLL 1H []A\@ I|$1
oHH L MH H= E1ɾx RHL$H
+ H$D 1 |FMHl H=i E1ɾ RLd$HL$H
H$D 12H% H= E1ɾf RHL$H
* H$D 1of. AT UHS?HHtH[]A\L% HIl$AD$@ AT UHSHHtH[]A\ L%y HI,$eAD$Ho HDH[]A\Ðf. U SHHHtH[] H Pu*t6HP(H{@H[]H5 11 th1D H
HH( U HSHHHt
H[]fD H{@HHC tH Hh 1USHutH[]ÐHQ H{ t?uaH{ P H{ 7 H= + Nf H H1[]@ H H= E1ɹ PH AH$1H[]D [(H H= E1ɹ PHC AHD$H H$1H[]@ 1 BH H= E1ɹ PHk AH$1mfD (H H= E1ɹ PHC AHD$H H$1>fD {J(Hq H=n E1ɹ PCAHD$H H$1fD H" H= E1ɹ PH AH$1vD f. USH%uuiH H{ tC H{ 7 H{ nv H= tiH u1H[]Ð1 tH/ H
x H=% E1ɾw RH$ D 1륐{usH H= E1ɹ RHt$H5 H4$D n 11R@ sH H
] H= E1ɾR RH$ D 1fD +H[ HP H
H=F E1ɾW RH$ H\$D 1D H[ H H5 H= E1ɹ RH4$\ H\$D 1JkD H H
H= E1ɾa RH$ D 1$ HH not_used DUMP_RUN_CFG User: name="%s" id=%lu%s
Group: name="%s" id=%lu%s
ChrootDir: "%s"%s
#-1 /usr/sbin/suexec mod_unixd.c suEXEC isn't supported: Suexec directive is Off AH02159: Can't chdir to %s AH02160: Can't chroot to %s / AH02165: Can't chdir to %s AH02166: Can't chroot to %s User Group ChrootDir Suexec Invalid owner or file mode for /usr/sbin/suexec Missing suexec binary /usr/sbin/suexec AH02155: getpwuid: couldn't determine user name from uid %ld, you probably need to modify the User directive AH02156: setgid: unable to set group id to Group %ld AH02157: initgroups: unable to set groups for User %s and Group %ld Error: Apache has not been designed to serve pages while
running as root. There are known race conditions that
will allow any local user to read any file on the system.
If you still desire to serve pages as root then
add -DBIG_SECURITY_HOLE to the CFLAGS env variable
and then rebuild the server.
It is strongly suggested that you instead modify the User
directive in your httpd.conf file to list a non-root
user.
ChrootDir must be a valid directory AH02158: Cannot chroot when not started as root AH02161: Can't chdir to new root AH02162: setuid: unable to change to uid: %ld AH02163: set dumpable failed - this child will not coredump after software errors AH02164: Cannot chroot when not started as root AH02167: Can't chdir to new root AH02168: setuid: unable to change to uid: %ld AH02169: set dumpable failed - this child will not coredump after software errors Effective user id for this server Effective group id for this server The directory to chroot(2) into Enable or disable suEXEC support ;d p 0 8 p P@ zR x $ FJw ?;*3$" D A Kq D \ BLB A(A0D@H
0A(A BBBJ , p ADG
AAH 4 @V BAA D@}
CABE , h<