[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re: Tor 0.2.1.26-1~~lenny+1: segfault with libcryto.so.0.9.8
- To: or-talk@xxxxxxxxxxxxx
- Subject: Re: Tor 0.2.1.26-1~~lenny+1: segfault with libcryto.so.0.9.8
- From: Nick Mathewson <nickm@xxxxxxxxxxxxx>
- Date: Wed, 17 Nov 2010 11:45:32 -0500
- Delivered-to: archiver@xxxxxxxx
- Delivered-to: or-talk-outgoing@xxxxxxxx
- Delivered-to: or-talk@xxxxxxxx
- Delivery-date: Wed, 17 Nov 2010 11:45:40 -0500
- Dkim-signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=gamma; h=domainkey-signature:mime-version:received:sender:received :in-reply-to:references:date:x-google-sender-auth:message-id:subject :from:to:content-type:content-transfer-encoding; bh=z9xPOnoObKoisotneO9Lut71oU5ydQgr7TD2JiyEOkM=; b=droN1q7A4QkG8+peALv1oglcfz2lfF4c2DMgg9I9KO9iQxpGGL3EYjh2JqJlCuGmoX jK/qk81lLaDjMkXGqs0S2fia79bRaS70Ud5+rMLJ/UGxoGMTb6Fh3ReNNCweLsgnzUfy EwT9Te+h4lamiIKcfQbcSA7BvF1bETMxN7m4U=
- Domainkey-signature: a=rsa-sha1; c=nofws; d=gmail.com; s=gamma; h=mime-version:sender:in-reply-to:references:date :x-google-sender-auth:message-id:subject:from:to:content-type :content-transfer-encoding; b=YPub84c1pp+CbKHKx5UAoVj5cUw5g1XHLye9ALh59aFC/y1OxQUv53VcVp+Z1uRrSA rWVH9jKXRxs/iN4jrH4d7z0QK+Qgd+q25h+alrM/7HyDwJpLv5mfHFlihc7o2rn4QVZc OuMmFqqQJFCnz5wc7j88RBAE7Yb4Dxyd/vs6k=
- In-reply-to: <1289602197.5429.12.camel@mattotaupa>
- References: <1289602197.5429.12.camel@mattotaupa>
- Reply-to: or-talk@xxxxxxxxxxxxx
- Sender: owner-or-talk@xxxxxxxxxxxxx
On Fri, Nov 12, 2010 at 5:49 PM, Paul Menzel
<paulepanter@xxxxxxxxxxxxxxxxxxxxx> wrote:
> Dear Tor folks,
>
>
> I noticed that Tor had crashed on my system. I am using Debian Lenny
> with Tor 0.2.1.26-1~~lenny+1. The only thing I could find out about this
> crash is the following line running `dmesg`.
>
> $ dmesg
> […]
> [Several of these Treason uncloaked messages as you can see some seconds before the crash. I obfuscated the IP addresses.]
> [3301769.746795] TCP: Treason uncloaked! Peer xxx.xxx.xxx.xxx:60659/42859 shrinks window 1343914705:1343916145. Repaired.
> [3413085.371871] TCP: Treason uncloaked! Peer yyy.yyy.yyy.yyy:19595/45969 shrinks window 2416591117:2416591857. Repaired.
> [3604257.970658] tor[22506]: segfault at 21d4fc5 ip 7f1e78ba4ea6 sp 41188920 error 4 in libcrypto.so.0.9.8[7f1e78b21000+172000]
> [3604257.970707] type=1701 audit(1289305397.030:2): auid=4294967295 uid=102 gid=104 ses=4294967295 pid=22506 comm="tor" sig=11
>
> So it could also be libcrypto is the culprit. `libssl0.9.8` is running
> with `0.9.8g-15+lenny8` as version.
>
> Is that a known problem? What other information can I provide to solve
> that? Unfortunately I have not found out how to reproduce it yet.
Without more information, there's not much info to go on there to
diagnose the problem. Generally, to debug a segfault, we need a stack
trace. To get one of those, make sure you're running Tor with
coredumps enabled, and use gdb to get a trace if Tor crashes again.
There are some decent online docs on how to do this; a little
searching should turn them up.
(You can ignore the "Treason Uncloaked!" junk. That's the Linux
kernel being overly dramatic about peers that don't do TCP windows
right or something.)
hth,
--
Nick
***********************************************************************
To unsubscribe, send an e-mail to majordomo@xxxxxxxxxxxxxx with
unsubscribe or-talk in the body. http://archives.seul.org/or/talk/