[tor-bugs] #23751 [Core Tor/Tor]: [warn] tor_bug_occurred_: Bug: src/common/buffers.c, etc.

Tor Bug Tracker & Wiki blackhole at torproject.org
Tue Oct 3 15:47:04 UTC 2017


#23751: [warn] tor_bug_occurred_: Bug: src/common/buffers.c, etc.
------------------------------------------------+--------------------------
 Reporter:  Felixix                             |          Owner:  (none)
     Type:  defect                              |         Status:  new
 Priority:  High                                |      Milestone:  Tor:
                                                |  0.3.2.x-final
Component:  Core Tor/Tor                        |        Version:
 Severity:  Normal                              |     Resolution:
 Keywords:  tor-channel, tor-sched, tor-buffer  |  Actual Points:
Parent ID:                                      |         Points:
 Reviewer:                                      |        Sponsor:
------------------------------------------------+--------------------------

Comment (by dgoulet):

 From the stacktrace it seems a channel outbuf was filled up which
 triggered the assert when the limit was reached. It then released the
 channel but the scheduler couldn't find it in the pending list so it tried
 to free the channel and the two last BUG() are basically that. Bottom
 line, that channel was never in the scheduler loop.

 This is very weird. The fact that the outbuf was completely full is
 worrying that is:

 1. Was it filled up by then the scheduler?
 2. Or we have a bug where in `KISTLite` mode we didn't allow somehow to
 let the channel write to kernel?

 For (1), currently the only possible way I could find for a channel outbuf
 to be used without the scheduler knowing is during the connection
 handshake but that shouldn't fill up of `INT_MAX` data...

--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/23751#comment:2>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online


More information about the tor-bugs mailing list