#29819: Linux kernel 5.0.3 crashes sandbox configured Tor client ---------------------------------------------+----------------------------- Reporter: toralf | Owner: nickm Type: defect | Status: assigned Priority: Medium | Milestone: Tor: | 0.4.0.x-final Component: Core Tor/Tor | Version: Tor: | 0.4.0.2-alpha Severity: Normal | Resolution: Keywords: crash, linux, sandbox, 040-must | Actual Points: Parent ID: | Points: 0.2 Reviewer: | Sponsor: ---------------------------------------------+-----------------------------
Comment (by toralf): This is a hardend Gentoo stable Linux with LibreSSL. This issue seems not related to the minor upgdate of the kernel however. I do just wonder why it happened after booting into the new kernel but this issue is now reproducible with older kernel too. But I had a sys-firmware /intel-microcode and a sys-kernel/linux-firmware too which might play a role. Fortunately it is easyli repoducible both at my desktop and my server (same OS and versions): {{{ t44 ~ # mkdir -p /tmp/tor; chown tor:root /tmp/tor; chmod 755 /tmp/tor/; cat ./torrc; date; /usr/bin/tor -f ./torrc User tor PIDFile /tmp/tor/tor.pid DataDirectory /tmp/tor/data Log debug CookieAuthentication 1 ControlPort 59051 SocksPort 59050 SandBox 1 Sun Mar 24 12:27:21 CET 2019 Mar 24 12:27:21.716 [notice] Tor 0.4.0.2-alpha running on Linux with Libevent 2.1.8-stable, OpenSSL LibreSSL 2.8.3, Zlib 1.2.11, Liblzma 5.2.4, and Libzstd N/A. Mar 24 12:27:21.717 [notice] Tor can't help you if you use it wrong! Learn how to be safe at https://www.torproject.org/download/download#warning Mar 24 12:27:21.717 [notice] This version is not a stable Tor release. Expect more bugs than usual. Mar 24 12:27:21.717 [notice] Read configuration file "/root/./torrc". Mar 24 12:27:21.722 [notice] Opening Socks listener on 127.0.0.1:59050 Mar 24 12:27:21.722 [notice] Opened Socks listener on 127.0.0.1:59050 Mar 24 12:27:21.722 [notice] Opening Control listener on 127.0.0.1:59051 Mar 24 12:27:21.722 [notice] Opened Control listener on 127.0.0.1:59051 Mar 24 12:27:21.000 [warn] Your log may contain sensitive information - you're logging more than "notice". Don't log unless it serves an important reason. Overwrite the log afterwards. Mar 24 12:27:21.000 [info] options_act_reversible(): Recomputed OOS thresholds: ConnLimit 1000, ConnLimit_ 4064, ConnLimit_high_thresh 4000, ConnLimit_low_thresh 3048 Mar 24 12:27:21.000 [debug] tor_disable_debugger_attach(): Attemping to disable debugger attachment to Tor for unprivileged users. Mar 24 12:27:21.000 [info] tor_lockfile_lock(): Locking "/tmp/tor/data/lock" Mar 24 12:27:21.000 [debug] parse_dir_authority_line(): Trusted 100 dirserver at 128.31.0.39:9131 (9695) Mar 24 12:27:21.000 [debug] parse_dir_authority_line(): Trusted 100 dirserver at 86.59.21.38:80 (847B) Mar 24 12:27:21.000 [debug] parse_dir_authority_line(): Trusted 100 dirserver at 194.109.206.212:80 (7EA6) Mar 24 12:27:21.000 [debug] parse_dir_authority_line(): Trusted 16 dirserver at 66.111.2.131:9030 (BA44) Mar 24 12:27:21.000 [debug] parse_dir_authority_line(): Trusted 100 dirserver at 131.188.40.189:80 (F204) Mar 24 12:27:21.000 [debug] parse_dir_authority_line(): Trusted 100 dirserver at 193.23.244.244:80 (7BE6) Mar 24 12:27:21.000 [debug] parse_dir_authority_line(): Trusted 100 dirserver at 171.25.193.9:443 (BD6A) Mar 24 12:27:21.000 [debug] parse_dir_authority_line(): Trusted 100 dirserver at 154.35.175.225:80 (CF6D) Mar 24 12:27:21.000 [debug] parse_dir_authority_line(): Trusted 100 dirserver at 199.58.81.140:80 (74A9) Mar 24 12:27:21.000 [debug] parse_dir_authority_line(): Trusted 100 dirserver at 204.13.164.118:80 (24E2) Mar 24 12:27:21.000 [debug] file_status(): stat()ing /tmp/tor/data/state Mar 24 12:27:21.000 [info] or_state_load(): Initialized state Mar 24 12:27:21.000 [info] circuit_build_times_parse_state(): Adding 0 timeouts. Mar 24 12:27:21.000 [info] circuit_build_times_parse_state(): Loaded 0/0 values from 0 lines in circuit time histogram Mar 24 12:27:21.000 [debug] tor_rename(): Renaming /tmp/tor/data/state.tmp to /tmp/tor/data/state Mar 24 12:27:21.000 [info] or_state_save(): Saved state to "/tmp/tor/data/state" Mar 24 12:27:21.000 [info] read_file_to_str(): Could not open "/tmp/tor/data/router-stability": No such file or directory Mar 24 12:27:21.000 [debug] tor_rename(): Renaming /tmp/tor/data/control_auth_cookie.tmp to /tmp/tor/data/control_auth_cookie Mar 24 12:27:21.000 [info] init_cookie_authentication(): Generated auth cookie file in '"/tmp/tor/data/control_auth_cookie"'. Mar 24 12:27:21.000 [debug] kist_scheduler_run_interval(): KISTSchedRunInterval=0, turning to the consensus. Mar 24 12:27:21.000 [debug] scheduler_can_use_kist(): Determined KIST sched_run_interval should be 10. Can use KIST. Mar 24 12:27:21.000 [info] scheduler_kist_set_full_mode(): Setting KIST scheduler with kernel support (KIST mode) Mar 24 12:27:21.000 [debug] kist_scheduler_run_interval(): KISTSchedRunInterval=0, turning to the consensus. Mar 24 12:27:21.000 [info] cmux_ewma_set_options(): Enabled cell_ewma algorithm because of value in CircuitPriorityHalflifeMsec in consensus; scale factor is 0.793701 per 10 seconds Mar 24 12:27:21.000 [notice] Parsing GEOIP IPv4 file /usr/share/tor/geoip. Mar 24 12:27:21.000 [notice] Parsing GEOIP IPv6 file /usr/share/tor/geoip6. Mar 24 12:27:21.000 [info] add_predicted_port(): New port prediction added. Will continue predictive circ building for 3502 more seconds. Mar 24 12:27:21.000 [info] crypto_openssl_late_init(): NOT using OpenSSL engine support. Mar 24 12:27:21.000 [info] evaluate_evp_for_aes(): This version of OpenSSL has a known-good EVP counter-mode implementation. Using it. ============================================================ T= 1553426841 (Sandbox) Caught a bad syscall attempt (syscall rt_sigaction) /usr/bin/tor(+0x1ce5aa)[0x562c1224a5aa] /lib64/libpthread.so.0(+0x14125)[0x7ff0aec2f125] /lib64/libpthread.so.0(+0x14125)[0x7ff0aec2f125] /usr/lib64/libevent-2.1.so.6(evsig_set_handler_+0xeb)[0x7ff0afb05f8b] /usr/lib64/libevent-2.1.so.6(+0x2c0b6)[0x7ff0afb060b6] /usr/lib64/libevent-2.1.so.6(evmap_signal_add_+0xb5)[0x7ff0afafeb55] /usr/lib64/libevent-2.1.so.6(event_add_nolock_+0x74e)[0x7ff0afafa1ce] /usr/lib64/libevent-2.1.so.6(event_add+0x3a)[0x7ff0afafa3fa] /usr/bin/tor(handle_signals+0xa7)[0x562c120d30c7] /usr/bin/tor(run_tor_main_loop+0x1a)[0x562c120d3c8a] /usr/bin/tor(tor_run_main+0x1045)[0x562c120d4ea5] /usr/bin/tor(tor_main+0x43)[0x562c120d23e3] /usr/bin/tor(main+0x19)[0x562c120d1f99] /lib64/libc.so.6(__libc_start_main+0xe7)[0x7ff0ae874ae7] /usr/bin/tor(_start+0x2a)[0x562c120d1fea] }}} -- Ticket URL: <https://trac.torproject.org/projects/tor/ticket/29819#comment:4> Tor Bug Tracker & Wiki <https://trac.torproject.org/> The Tor Project: anonymity online
_______________________________________________ tor-bugs mailing list tor-bugs@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs