[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: Tor segfault with libcryto.so.0.9.8

On Fri, Nov 12, 2010 at 5:49 PM, Paul Menzel
<paulepanter@xxxxxxxxxxxxxxxxxxxxx> wrote:
> Dear Tor folks,
> I noticed that Tor had crashed on my system. I am using Debian Lenny
> with Tor The only thing I could find out about this
> crash is the following line running `dmesg`.
>        $ dmesg
>        […]
>        [Several of these Treason uncloaked messages as you can see some seconds before the crash. I obfuscated the IP addresses.]
>        [3301769.746795] TCP: Treason uncloaked! Peer xxx.xxx.xxx.xxx:60659/42859 shrinks window 1343914705:1343916145. Repaired.
>        [3413085.371871] TCP: Treason uncloaked! Peer yyy.yyy.yyy.yyy:19595/45969 shrinks window 2416591117:2416591857. Repaired.
>        [3604257.970658] tor[22506]: segfault at 21d4fc5 ip 7f1e78ba4ea6 sp 41188920 error 4 in libcrypto.so.0.9.8[7f1e78b21000+172000]
>        [3604257.970707] type=1701 audit(1289305397.030:2): auid=4294967295 uid=102 gid=104 ses=4294967295 pid=22506 comm="tor" sig=11
> So it could also be libcrypto is the culprit. `libssl0.9.8` is running
> with `0.9.8g-15+lenny8` as version.
> Is that a known problem? What other information can I provide to solve
> that? Unfortunately I have not found out how to reproduce it yet.

Without more information, there's not much info to go on there to
diagnose the problem.  Generally, to debug a segfault, we need a stack
trace.  To get one of those, make sure you're running Tor with
coredumps enabled, and use gdb to get a trace if Tor crashes again.
There are some decent online docs on how to do this; a little
searching should turn them up.

(You can ignore the "Treason Uncloaked!" junk.  That's the Linux
kernel being overly dramatic about peers that don't do TCP windows
right or something.)

To unsubscribe, send an e-mail to majordomo@xxxxxxxxxxxxxx with
unsubscribe or-talk    in the body. http://archives.seul.org/or/talk/