Hi Dago and Folks,

On 08/10/2016 07:57 AM, Dagobert Michelsen wrote:
Hi Jake,

(ccing maintainers, hope thats ok)

Am 09.08.2016 um 23:02 schrieb jgoerzen <[email protected]>:
    I need some help debugging a segmentation fault in the latest release of 
tor.  The core file for this program is on the buildfarm here:

/home/jgoerzen/opencsw/tor/trunk/core

    If you have time would you have a look at it?  I tried using mdb to debug 
it but I don't know enough c or assembler to figure out what is going wrong.  
Here is what I found running the program with mdb:

jgoerzen@unstable10x [global]:/home/jgoerzen/opencsw/tor/trunk > mdb 
work/solaris10-i386/build-isa-pentium_pro/tor-0.2.8.6/src/or/tor

::run
Aug 09 22:00:08.507 [notice] Tor v0.2.8.6 (git-b54676641111fea6) running on 
SunOS with Libevent 2.0.21-stable, OpenSSL 1.0.1t and Zlib 1.2.8.
Aug 09 22:00:08.508 [notice] Tor can't help you if you use it wrong! Learn how 
to be safe at https://www.torproject.org/download/download#warning
Aug 09 22:00:08.509 [notice] Configuration file "/etc/opt/csw/tor/torrc" not 
present, using reasonable defaults.
Aug 09 22:00:08.512 [notice] Opening Socks listener on 127.0.0.1:9050
mdb: stop on SIGSEGV
mdb: target stopped at:
libc.so.1`strlen+0xc:   movl   (%eax),%edx
mdb: You've got symbols!
Loading modules: [ ld.so.1 libc.so.1 ]
::stack
libc.so.1`strlen+0xc(822dc20, 8047588, 8047450, 0)
libc.so.1`vsnprintf+0x73(804749c, 80, 822dc0a, 8047588, 0, fee95b38)
tor_vasprintf+0x63(82d5138, 822dc0a, 8047588, fee41afc, 8282f08, 82d43c0)
tor_asprintf+0x40(82d5138, 822dc0a, 0, 2346, 0, 0)
dir_server_new+0x288(0, 2346, 2329, 0, 80476e8, 0)
fallback_dir_server_new+0x66(80476bc, 2346, 2329, 0, 80476e8, 0)
parse_dir_fallback_line+0x4c3(82d25f8, 1, 0, 8229a88, 82d25f8, 8282f08)
set_options+0x2475(82d25f8, 8047894, 0, 0, 0, 8047894)
options_init_from_string+0x392(82bbc68, 82bbc78, 0, 0, 8047894, 0)
options_init_from_torrc+0x20f(1, 8047bc8, 820cca8, 8237cc0, 82bc030, 8227dc2)
tor_init+0x380(1, 8047bc8, 8060c30, 8047b80, 0, 0)
tor_main+0x6b(1, 8047bc8, fefc2ab4, feefdeb5, fee73721, 29)
main+0x36(1, 8047bc8, 8047bd0)
_start+0x80(1, 8047cc8, 0, 8047ccc, 8047cd6, 8047ce9)
It looks like it crashes in strlen. So lets see what string it operates on:

0x822dc20/S
0x822dc20:      :%d
0x822dc20/4B
0x822dc20:      3a      25      64      0

This looks good. Now what does strlen do?

strlen::dis
libc.so.1`strlen:               movl   0x4(%esp),%eax                           
# Copy arg to register
libc.so.1`strlen+4:             testl  $0x3,%eax                                
# adress % 4 == 0 ?
libc.so.1`strlen+9:             jne    +0x28    <libc.so.1`strlen+0x31>         
  # No, jump
libc.so.1`strlen+0xb:           nop
libc.so.1`strlen+0xc:           movl   (%eax),%edx
libc.so.1`strlen+0xe:           movl   $0x7f7f7f7f,%ecx
libc.so.1`strlen+0x13:          andl   %edx,%ecx
libc.so.1`strlen+0x15:          addl   $0x4,%eax
libc.so.1`strlen+0x18:          addl   $0x7f7f7f7f,%ecx
libc.so.1`strlen+0x1e:          orl    %edx,%ecx
libc.so.1`strlen+0x20:          andl   $0x80808080,%ecx
libc.so.1`strlen+0x26:          cmpl   $0x80808080,%ecx
libc.so.1`strlen+0x2c:          je     -0x20    <libc.so.1`strlen+0xc>
libc.so.1`strlen+0x2e:          subl   $0x4,%eax
libc.so.1`strlen+0x31:          cmpb   $0x0,(%eax)                              
# is the byte zero?
libc.so.1`strlen+0x34:          je     +0xc     <libc.so.1`strlen+0x40>
libc.so.1`strlen+0x36:          incl   %eax
libc.so.1`strlen+0x37:          testl  $0x3,%eax
libc.so.1`strlen+0x3c:          jne    -0xb     <libc.so.1`strlen+0x31>
libc.so.1`strlen+0x3e:          jmp    -0x32    <libc.so.1`strlen+0xc>
libc.so.1`strlen+0x40:          subl   0x4(%esp),%eax
libc.so.1`strlen+0x44:          ret

This looks like a modern implementation than the usual
   size_t strlen(const char *s) {
        const char *s0 = s + 1;
        while (*s++ != '\0‘)
           ;
        return (s - s0);
   }
and pretty similar to
   
http://cr.illumos.org/~webrev/tsoome/loader_import/usr/src/boot/lib/libc/string/strlen.c.html

So we have SIGSEGV at strlen+0xc, that is an indirect load from %eax, and eax is
::regs
%cs = 0x003b            %eax = 0x00000000
…

Trying to read from address 0. This now is strange as 0x822dc20 was passed in 
to strlen.

When using lib0@0 there is a related error in tor_asprintf shown, maybe this 
leads you
closed to the bug:

dam@unstable10x [global]:/home/dam > LD_PRELOAD_32=/usr/lib/[email protected] 
/home/jgoerzen/opencsw/tor/trunk/work/solaris10-i386/build-isa-pentium_pro/tor-0.2.8.6/src/or/tor
Aug 10 16:56:43.295 [notice] Tor v0.2.8.6 (git-b54676641111fea6) running on 
SunOS with Libevent 2.0.21-stable, OpenSSL 1.0.1t and Zlib 1.2.8.
Aug 10 16:56:43.295 [notice] Tor can't help you if you use it wrong! Learn how 
to be safe at https://www.torproject.org/download/download#warning
Aug 10 16:56:43.339 [notice] Configuration file "/etc/opt/csw/tor/torrc" not 
present, using reasonable defaults.
Aug 10 16:56:43.347 [notice] Opening Socks listener on 127.0.0.1:9050
Aug 10 16:56:43.000 [err] tor_asprintf(): Bug: Internal error in asprintf (on 
Tor 0.2.8.6 b54676641111fea6)
Aug 10 16:56:43.000 [err] tor_assertion_failed_(): Bug: 
src/common/compat.c:529: tor_asprintf: Assertion 0 failed; aborting. (on Tor 
0.2.8.6 b54676641111fea6)
Aug 10 16:56:43.000 [err] Bug: Assertion 0 failed in tor_asprintf at 
src/common/compat.c:529. (Stack trace not available) (on Tor 0.2.8.6 
b54676641111fea6)

At the moment I don’t have a smart idea and would need some more debugging, but 
for today
I am out of time, sorry.


Best regards

   — Dago


--
"You don't become great by trying to be great, you become great by wanting to 
do something,
and then doing it so hard that you become great in the process." - xkcd #896



I notice that the tor_assert(0) is being called because r is being returned negative. I think it could be in the call to vasprintf() returning an overflowing buffer looping and becoming a negative number? Here is a section of the relevant code in src/common/compat.c


/**
 * Portable asprintf implementation.  Does a printf() into a newly malloc'd
 * string.  Sets *<b>strp</b> to this string, and returns its length (not
 * including the terminating NUL character).
 *
 * You can treat this function as if its implementation were something like
   <pre>
     char buf[_INFINITY_];
     tor_snprintf(buf, sizeof(buf), fmt, args);
     *strp = tor_strdup(buf);
     return strlen(*strp):
   </pre>
 * Where _INFINITY_ is an imaginary constant so big that any string can fit
 * into it.
 */
int
tor_asprintf(char **strp, const char *fmt, ...)
{
  int r;
  va_list args;
  va_start(args, fmt);
  r = tor_vasprintf(strp, fmt, args);
  va_end(args);
  if (!*strp || r < 0) {
    log_err(LD_BUG, "Internal error in asprintf");
    tor_assert(0);
  }
  return r;
}

/**
* Portable vasprintf implementation. Does a printf() into a newly malloc'd
 * string.  Differs from regular vasprintf in the same ways that
 * tor_asprintf() differs from regular asprintf.
 */
int
tor_vasprintf(char **strp, const char *fmt, va_list args)
{
  /* use a temporary variable in case *strp is in args. */
  char *strp_tmp=NULL;
#ifdef HAVE_VASPRINTF
  /* If the platform gives us one, use it. */
  int r = vasprintf(&strp_tmp, fmt, args);
  if (r < 0)
    *strp = NULL;
  else
    *strp = strp_tmp;
  return r;
#elif defined(HAVE__VSCPRINTF)
  /* On Windows, _vsnprintf won't tell us the length of the string if it
* overflows, so we need to use _vcsprintf to tell how much to allocate */
  int len, r;
  len = _vscprintf(fmt, args);
  if (len < 0) {
    *strp = NULL;
    return -1;
  }
  strp_tmp = tor_malloc(len + 1);
  r = _vsnprintf(strp_tmp, len+1, fmt, args);
  if (r != len) {
    tor_free(strp_tmp);
    *strp = NULL;
    return -1;
  }
  *strp = strp_tmp;
  return len;
#else
  /* Everywhere else, we have a decent vsnprintf that tells us how many
   * characters we need.  We give it a try on a short buffer first, since
   * it might be nice to avoid the second vsnprintf call.
   */
  char buf[128];
  int len, r;
  va_list tmp_args;
  va_copy(tmp_args, args);
  /* vsnprintf() was properly checked but tor_vsnprintf() available so
   * why not use it? */
  len = tor_vsnprintf(buf, sizeof(buf), fmt, tmp_args);
  va_end(tmp_args);
  if (len < (int)sizeof(buf)) {
    *strp = tor_strdup(buf);
    return len;
  }
  strp_tmp = tor_malloc(len+1);
  /* use of tor_vsnprintf() will ensure string is null terminated */
  r = tor_vsnprintf(strp_tmp, len+1, fmt, args);
  if (r != len) {
    tor_free(strp_tmp);
    *strp = NULL;
    return -1;
  }
  *strp = strp_tmp;
  return len;
#endif
}


Thanks for your help,
Jake

Reply via email to