[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: [tor-bugs] #26311 [Core Tor/Tor]: Error in `/usr/bin/tor': free(): invalid next size (normal): 0x000055ed468598d0



#26311: Error in `/usr/bin/tor': free(): invalid next size (normal):
0x000055ed468598d0
--------------------------+---------------------------------
 Reporter:  cypherpunks   |          Owner:  (none)
     Type:  defect        |         Status:  new
 Priority:  Medium        |      Milestone:
Component:  Core Tor/Tor  |        Version:  Tor: 0.3.3.5-rc
 Severity:  Normal        |     Resolution:
 Keywords:                |  Actual Points:
Parent ID:                |         Points:
 Reviewer:                |        Sponsor:
--------------------------+---------------------------------

Comment (by starlight):

 Another difficult road to travel is building an ASAN+USAN (address
 sanitizer) image in the hope of nailing down corruption occurring
 "somewhere else" in the code.  Problem I've found is ASAN is exorbitant
 and will slow the daemon to near-useless.  I've had success building
 without ASAN, then removing the .o files for modules of interest not on
 the hot path and re-making with ASAN options turned on.  Might be cleaner
 to  enhance Makefile to mix-and-match ASAN/non-ASAN in one pass, but at
 the time I was in a demon-hacker frame of mind.  Preceding is a royal PitA
 but could yield results.  Not subscribed to this bug but you can email my
 address as seen in tor-relays list for my (out of date) notes on how I did
 it.  The "hardened build" support in more recent release Makefiles is
 likely a better starting point.

--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/26311#comment:17>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs