Opened 14 years ago

Last modified 7 years ago

#223 closed defect (Fixed)

another segfault when shutting down tor

Reported by: weasel Owned by:
Priority: Low Milestone:
Component: Core Tor/Tor Version: 0.1.1.10-alpha
Severity: Keywords:
Cc: weasel Actual Points:
Parent ID: Points:
Reviewer: Sponsor:

Description

This error didn't happen often.

Program terminated with signal 11, Segmentation fault.
(gdb) bt
#0 0x55746b6d in mempcpy () from /lib/tls/libc.so.6
#1 0x5573b635 in _IO_default_xsputn_internal () from /lib/tls/libc.so.6
#2 0x5573a062 in _IO_new_file_xsputn () from /lib/tls/libc.so.6
#3 0x5572e662 in fputs () from /lib/tls/libc.so.6
#4 0x080ac26a in logv (severity=6, domain=65536, funcname=0x80d2301 "dnsworker_main", format=0x80d22a0 "DNS worker exiting because Tor process closed connection (either pruned idle dnsworker or died).", ap=0x57025960 "") at log.c:222
#5 0x080ac332 in _log_fn (severity=6, domain=65536, fn=0x80d2301 "dnsworker_main", format=0x80d22a0 "DNS worker exiting because Tor process closed connection (either pruned idle dnsworker or died).") at log.c:251
#6 0x080878ad in dnsworker_main (data=0x0) at dns.c:815
#7 0x080b181e in tor_pthread_helper_fn (_data=0x0) at compat.c:819
#8 0x556b7b63 in start_thread () from /lib/tls/libpthread.so.0
#9 0x557a518a in clone () from /lib/tls/libc.so.6

[ Tor C, tor-create-and-go-away-44/core.13910 2005-12-19 15:53:27.603593615

[Automatically added by flyspray2trac: Operating System: All]

Child Tickets

Change History (4)

comment:1 Changed 14 years ago by weasel

Dec 19 15:52:20.604 [notice] Tor 0.1.1.10-alpha-cvs opening log file.
Dec 19 15:52:20.604 [info] or_state_load(): Initialized state
Dec 19 15:52:20.604 [info] or_state_save(): Saved state to "data/state"
Dec 19 15:52:20.604 [info] rend_service_load_keys(): Loading hidden-service keys from "hid1"
Dec 19 15:52:20.604 [info] check_private_dir(): Creating directory hid1
Dec 19 15:52:20.604 [info] init_key_from_file(): No key found in "hid1/private_key"; generating fresh key.
Dec 19 15:52:20.794 [info] init_key_from_file(): Generated key seems valid
Dec 19 15:52:20.794 [info] rend_service_load_keys(): Loading hidden-service keys from "hid2"
Dec 19 15:52:20.809 [info] crypto_global_init(): Initializing OpenSSL engine support.
Dec 19 15:52:20.811 [info] Using default implementation for RSA
Dec 19 15:52:20.811 [info] Using default implementation for DH
Dec 19 15:52:20.811 [info] Using default implementation for RAND
Dec 19 15:52:20.811 [info] Using default implementation for SHA1
Dec 19 15:52:20.811 [info] Using default implementation for 3DES
Dec 19 15:52:20.811 [info] Using default implementation for AES
Dec 19 15:52:20.811 [info] crypto_seed_rng(): Seeding RNG from "/dev/urandom"
Dec 19 15:52:20.812 [info] check_private_dir(): Creating directory data/keys
Dec 19 15:52:20.812 [info] init_keys(): Reading/making identity key "data/keys/secret_id_key"...
Dec 19 15:52:20.812 [info] init_key_from_file(): No key found in "data/keys/secret_id_key"; generating fresh key.
Dec 19 15:52:20.876 [info] init_key_from_file(): Generated key seems valid
Dec 19 15:52:20.876 [info] init_keys(): Reading/making onion key "data/keys/secret_onion_key"...
Dec 19 15:52:20.877 [info] init_key_from_file(): No key found in "data/keys/secret_onion_key"; generating fresh key.
Dec 19 15:52:20.970 [info] init_key_from_file(): Generated key seems valid
Dec 19 15:52:21.259 [info] config_expand_exit_policy_aliases(): Expanded 'reject private:*,reject *:25,reject *:119,reject *:135-139,reject *:445,reject *:465,reject *:587,reject *:1214,reject *:4661-4666,reject *:6346-6429,reject *:6699,reject *:6881-6999,accept *:*' to 'reject 0.0.0.0/8:*,reject 169.254.0.0/16:*,reject 127.0.0.0/8:*,reject 192.168.0.0/16:*,reject 10.0.0.0/8:*,reject 172.16.0.0/12:*,reject *:25,reject *:119,reject *:135-139,reject *:445,reject *:465,reject *:587,reject *:1214,reject *:4661-4666,reject *:6346-6429,reject *:6699,reject *:6881-6999,accept *:*'
Dec 19 15:52:21.263 [info] init_keys(): Dumping descriptor to "data/router.desc"...
Dec 19 15:52:21.263 [info] init_keys(): Dumping fingerprint to "data/fingerprint"...
Dec 19 15:52:21.263 [info] read_file_to_str(): Could not stat "data/cached-routers".
Dec 19 15:52:21.263 [info] read_file_to_str(): Could not stat "data/cached-routers.new".
Dec 19 15:52:21.263 [notice] I learned some more directory information, but not enough to build a circuit.
Dec 19 15:52:21.263 [notice] update_router_descriptor_downloads(): Launching request for all routers
Dec 19 15:52:32.301 [notice] update_router_descriptor_downloads(): Launching request for all routers
Dec 19 15:52:43.340 [notice] update_router_descriptor_downloads(): Launching request for all routers
Dec 19 15:52:54.387 [notice] update_router_descriptor_downloads(): Launching request for all routers
Dec 19 15:53:05.431 [notice] update_router_descriptor_downloads(): Launching request for all routers
Dec 19 15:53:16.474 [notice] update_router_descriptor_downloads(): Launching request for all routers
Dec 19 15:53:27.514 [notice] update_router_descriptor_downloads(): Launching request for all routers
Dec 19 15:53:27.602 [info] connection_control_process_inbuf_v0(): Detected v1 control protocol on connection (fd 31)
Dec 19 15:53:27.602 [info] handle_control_authenticate(): Authenticated control connection (31)
Dec 19 15:53:27.602 [err] signal_callback(): Catching signal TERM, exiting cleanly.
Dec 19 15:53:27.602 [info] dnsworker_main(): DNS worker exiting because Tor process closed connection (either pruned idle dnsworker or died).
Dec 19 15:53:27.602 [info] dnsworker_main(): DNS worker exiting because Tor process closed connection (either pruned idle dnsworker or died).

comment:2 Changed 14 years ago by weasel

I think this is the same thing:
This one looks similar, maybe it's the same:
[ Tor C, tor-create-and-go-away-46/core.29046 ]

(gdb) bt
#0 0x5572e5b8 in fputs () from /lib/tls/libc.so.6
#1 0x080ac26a in logv (severity=6, domain=65536, funcname=0x80d2301 "dnsworker_main", format=0x80d22a0 "DNS worker exiting because Tor process closed connection (either pruned idle dnsworker or died).", ap=0x56825960 "") at log.c:222
#2 0x080ac332 in _log_fn (severity=6, domain=65536, fn=0x80d2301 "dnsworker_main", format=0x80d22a0 "DNS worker exiting because Tor process closed connection (either pruned idle dnsworker or died).") at log.c:251
#3 0x080878ad in dnsworker_main (data=0x0) at dns.c:815
#4 0x080b181e in tor_pthread_helper_fn (_data=0x0) at compat.c:819
#5 0x556b7b63 in start_thread () from /lib/tls/libpthread.so.0
#6 0x557a518a in clone () from /lib/tls/libc.so.6

comment:3 Changed 13 years ago by nickm

flyspray2trac: bug closed.
This is another symptom of the problem causing bug 222: close_logs was closing logs, but not setting logfiles=NULL.

comment:4 Changed 7 years ago by nickm

Component: Tor RelayTor
Note: See TracTickets for help on using tickets.