[guardian-dev] Orbot relaying segfault
Manuel
manuel at acanthephyra.net
Mon Jun 13 20:57:04 EDT 2011
Hi all,
I was trying to set up my phone as a Tor relay (which is actually useful
cause it'll be at home all day, connected to an otherwise idle WLAN).
Sadly, this looks, well, kaput:
--------------------
D/ORBOT ( 5231): orConnStatus (72.46.129.45:6956): NEW
D/dalvikvm( 4843): GC_CONCURRENT freed 406K, 47% free 3659K/6791K, external 0K/0K, paused 2ms+2ms
I/DEBUG ( 4586): *** *** *** *** *** *** *** *** *** *** *** *** *** *** *** ***
I/DEBUG ( 4586): Build fingerprint: 'htc_wwe/htc_ace/ace/ace:2.2.1/FRG83D/296490:user/release-keys'
I/DEBUG ( 4586): pid: 5526, tid: 5526 >>> /data/data/org.torproject.android/app_bin/tor <<<
I/DEBUG ( 4586): signal 11 (SIGSEGV), code 1 (SEGV_MAPERR), fault addr 2d454848
I/DEBUG ( 4586): r0 2d454844 r1 00000000 r2 af422fb7 r3 00000000
I/DEBUG ( 4586): r4 af42b094 r5 00000001 r6 00914608 r7 00120ad0
I/DEBUG ( 4586): r8 0093a9d0 r9 0000055c 10 00080000 fp 00120ad0
I/DEBUG ( 4586): ip 00120d54 sp beae79f8 lr 000d90a0 pc af41d7cc cpsr 80000030
I/DEBUG ( 4586): d0 643a64696f72646e d1 6472656767756265
I/DEBUG ( 4586): d2 4bd9d36eee64e9c0 d3 eb957fdd036bdc32
I/DEBUG ( 4586): d4 0000000000000000 d5 0000000000000000
I/DEBUG ( 4586): d6 0000000000000000 d7 0000000000000000
I/DEBUG ( 4586): d8 0000000000000000 d9 0000000000000000
I/DEBUG ( 4586): d10 0000000000000000 d11 0000000000000000
I/DEBUG ( 4586): d12 0000000000000000 d13 0000000000000000
I/DEBUG ( 4586): d14 0000000000000000 d15 0000000000000000
I/DEBUG ( 4586): d16 4040000000000000 d17 4040000000000000
I/DEBUG ( 4586): d18 3df105c431cf2925 d19 beba903006cf8249
I/DEBUG ( 4586): d20 4000000000000000 d21 3f11566a98229a48
I/DEBUG ( 4586): d22 bebbbd41a0f5c45c d23 3f5d2581e4ac5000
I/DEBUG ( 4586): d24 3e66376972bea4d0 d25 3fd1776889afecc4
I/DEBUG ( 4586): d26 3ff965fe00000000 d27 beba903006cf833c
I/DEBUG ( 4586): d28 bffff8b72d0bf8b0 d29 3f5d258228c360c7
I/DEBUG ( 4586): d30 3bee60190ec53e4f d31 3df105c431c00000
I/DEBUG ( 4586): scr 60000010
I/DEBUG ( 4586):
I/DEBUG ( 4586): #00 pc 0001d7cc /system/lib/libssl.so (SSL_CIPHER_get_name)
I/DEBUG ( 4586): #01 pc 000d909c /data/data/org.torproject.android/app_bin/tor
I/DEBUG ( 4586): #02 pc 000d93e4 /data/data/org.torproject.android/app_bin/tor
I/DEBUG ( 4586): #03 pc 0008ab74 /data/data/org.torproject.android/app_bin/tor
I/DEBUG ( 4586): #04 pc 0007fe68 /data/data/org.torproject.android/app_bin/tor
I/DEBUG ( 4586): #05 pc 00010934 /data/data/org.torproject.android/app_bin/tor
I/DEBUG ( 4586): #06 pc 000de330 /data/data/org.torproject.android/app_bin/tor
I/DEBUG ( 4586): #07 pc 0000e85c /data/data/org.torproject.android/app_bin/tor
I/DEBUG ( 4586): #08 pc 0000eb94 /data/data/org.torproject.android/app_bin/tor
I/DEBUG ( 4586): #09 pc 00014d9e /system/lib/libc.so (__libc_init)
I/DEBUG ( 4586):
I/DEBUG ( 4586): code around pc:
I/DEBUG ( 4586): af41d7ac 4804e001 47704478 00005e9f 00005e9a
I/DEBUG ( 4586): af41d7bc 00005d37 00005d39 4802b910 e0004478
I/DEBUG ( 4586): af41d7cc 47706840 00005e6b b109b118 600b6ac3
I/DEBUG ( 4586): af41d7dc 47706a80 6840b100 bf004770 4c2bb570
I/DEBUG ( 4586): af41d7ec f44f4d2b 447c73d2 447d2005 46222110
I/DEBUG ( 4586):
I/DEBUG ( 4586): code around lr:
I/DEBUG ( 4586): 000d9080 ebfccd41 e1a01005 e1550000 e2855001
I/DEBUG ( 4586): 000d9090 aa00000f e59600b4 ebfccea3 ebfcce81
I/DEBUG ( 4586): 000d90a0 e59f11b0 e0871001 e1a04000 ebfccf52
I/DEBUG ( 4586): 000d90b0 e3500000 1a000009 e59640b4 e1a00004
I/DEBUG ( 4586): 000d90c0 ebfccd31 e1a01005 e1550000 e2855001
I/DEBUG ( 4586):
I/DEBUG ( 4586): stack:
I/DEBUG ( 4586): beae79b8 00a997b8 [heap]
I/DEBUG ( 4586): beae79bc 00000002
I/DEBUG ( 4586): beae79c0 0093ab80 [heap]
I/DEBUG ( 4586): beae79c4 00a997b8 [heap]
I/DEBUG ( 4586): beae79c8 00a997b8 [heap]
I/DEBUG ( 4586): beae79cc 00000000
I/DEBUG ( 4586): beae79d0 00000000
I/DEBUG ( 4586): beae79d4 afd4d440
I/DEBUG ( 4586): beae79d8 0000000f
I/DEBUG ( 4586): beae79dc 00000000
I/DEBUG ( 4586): beae79e0 00000000
I/DEBUG ( 4586): beae79e4 00000000
I/DEBUG ( 4586): beae79e8 00000a00
I/DEBUG ( 4586): beae79ec af05c931 /system/lib/libcrypto.so
I/DEBUG ( 4586): beae79f0 df002777
I/DEBUG ( 4586): beae79f4 e3a070ad
I/DEBUG ( 4586): #01 beae79f8 00000000
I/DEBUG ( 4586): beae79fc 00000a00
I/DEBUG ( 4586): beae7a00 00120ad0 /data/data/org.torproject.android/app_bin/tor
I/DEBUG ( 4586): beae7a04 00939f70 [heap]
I/DEBUG ( 4586): beae7a08 00119424 /data/data/org.torproject.android/app_bin/tor
I/DEBUG ( 4586): beae7a0c 00000000
I/DEBUG ( 4586): beae7a10 00000a00
I/DEBUG ( 4586): beae7a14 00120ad0 /data/data/org.torproject.android/app_bin/tor
I/DEBUG ( 4586): beae7a18 00080000 /data/data/org.torproject.android/app_bin/tor
I/DEBUG ( 4586): beae7a1c 000d93e8 /data/data/org.torproject.android/app_bin/tor
--------------------
Judging from the log message at the top of my paste, it looks like someone is trying to establish a connection (which should happen, given that this is a relay now...).
ARM is horrible to debug by hand. Yep, I just tried to disas it manually
with some docs. Not pretty at all.
Any suggestions/ideas for how to debug this?
Regards,
Manuel
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 836 bytes
Desc: not available
URL: <http://lists.mayfirst.org/pipermail/guardian-dev/attachments/20110614/a0f68897/attachment.pgp>
More information about the Guardian-dev
mailing list