Please run the OpenVPN instance which core dumps via gdb. When it
 segfaults, type the command 'bt' (backtrace) and provide us with the
 complete backtrace. Then we can have an idea where in the code it crashed.

 Another alternative is to enable core dump files (a global system
 configuration, not an OpenVPN setting), those files can then be run via
 gdb and the backtrace can be captured afterwards.

 Without a backtrace it is nearly impossible to understand why it
 crashes. Most likely it is related to a NULL pointer, but which pointer
 will be plain guesswork which mostly would be a lot of wasted time.



 
 
 Thank you for taking the time to look at this.  Here is the 'bt' info you 
requested:
 
#0 0x0000000000000000 in ?? ()
#1 0x00000000004ab235 in tls1_P_hash (md_kt=md_kt@entry=0x6cc640 <md5_md>, 
sec=sec@entry=0x9b0590 
"\237\252\006\326&\375s\263ss\232zl[\230\316:\355\235k\337<\367\206\317", 
<incomplete sequence \325>,
 sec_len=sec_len@entry=24,
 seed=seed@entry=0x9db2d0 "OpenVPN master 
secret\334&Uuml;\364\307)K\030\264\214\276\300&szlig;s;\321o\206\337Pe+\231Q\367\346?\364&Ugrave;\250\376\263\236\275\214\f;\302*\364+\370E\n_<\333%Kw\031&Ocirc;&frac34;\225\213\037W\024\272\t\213\006",
 seed_len=seed_len@entry=85, out=out@entry=0x7fffffffc500 "", olen=48) at 
ssl.c:1378
#2 0x00000000004050e9 in tls1_PRF (slen=48, olen=48, out1=0x7fffffffc500 "", 
sec=0x9b0590 
"\237\252\006\326&\375s\263ss\232zl[\230\316:\355\235k\337<\367\206\317", 
<incomplete sequence \325>, label_len=85,
 label=0x9db2d0 "OpenVPN master 
secret\334&Uuml;\364\307)K\030\264\214\276\300&szlig;s;\321o\206\337Pe+\231Q\367\346?\364&Ugrave;\250\376\263\236\275\214\f;\302*\364+\370E\n_<\333%Kw\031&Ocirc;&frac34;\225\213\037W\024\272\t\213\006")
 at ssl.c:1453
#3 openvpn_PRF (secret=secret@entry=0x9b0590 
"\237\252\006\326&\375s\263ss\232zl[\230\316:\355\235k\337<\367\206\317", 
<incomplete sequence \325>, label=<optimized out>, label@entry=0x67800b 
"OpenVPN master secret",
 client_seed=client_seed@entry=0x9b05c0 
"\334&Uuml;\364\307)K\030\264\214\276\300&szlig;s;\321o\206\337Pe+\231Q\367\346?\364&Ugrave;\250\376*v`\\\037\344\312\332#x\213\177&times;&uml;F\261i\236\066\226\371\306#3c\207rD\033\347'",
 server_seed=server_seed@entry=0x9b0630 
"\376\263\236\275\214\f;\302*\364+\370E\n_<\333%Kw\031&Ocirc;&frac34;\225\213\037W\024\272\t\213\006\333'&\035\241\223gJ_\377\004c\365h\325u\262b!MR\224\005\265\354;\330\363\211\240\025\245",
 client_sid=client_sid@entry=0x0, server_sid=server_sid@entry=0x0, 
output=0x7fffffffc500 "", output_len=48, server_seed_len=32, 
client_seed_len=32, secret_len=48) at ssl.c:1496
#4 0x0000000000405263 in generate_key_expansion (key=key@entry=0x9af2f8, 
key_type=0x9aeef8, key_src=0x9b0590, client_sid=client_sid@entry=0x9af26c, 
server_sid=server_sid@entry=0x9af1cc, server=server@entry=true)
 at ssl.c:1528
#5 0x00000000004ae183 in key_method_2_write (session=<optimized out>, 
buf=<optimized out>) at ssl.c:1941
#6 tls_process (wakeup=0x7fffffffc704, to_link_socket_info=<optimized out>, 
to_link_addr=0x7fffffffc628, to_link=<optimized out>, session=<optimized out>, 
multi=0x9aeef0) at ssl.c:2446
#7 tls_multi_process (multi=0x9aeef0, to_link=to_link@entry=0x9ad528, 
to_link_addr=to_link_addr@entry=0x9ad258, to_link_socket_info=<optimized out>, 
wakeup=wakeup@entry=0x7fffffffc724) at ssl.c:2640
#8 0x000000000045e828 in check_tls_dowork (c=c@entry=0x9aca48) at forward.c:98
#9 0x00000000004613fe in check_tls (c=0x9aca48) at forward-inline.h:41
#10 pre_select (c=c@entry=0x9aca48) at forward.c:1332
#11 0x000000000047db40 in multi_process_post (m=m@entry=0x7fffffffc910, 
mi=0x9ac990, flags=flags@entry=9) at multi.c:2065
#12 0x000000000047e028 in multi_process_incoming_link 
(m=m@entry=0x7fffffffc910, instance=instance@entry=0x9ac990, 
mpp_flags=mpp_flags@entry=9) at multi.c:2308
#13 0x0000000000477d8d in multi_tcp_dispatch (action=1, mi=0x9ac990, 
m=0x7fffffffc910) at mtcp.c:418
#14 multi_tcp_action (m=m@entry=0x7fffffffc910, mi=0x9ac990, 
action=action@entry=1, poll=<optimized out>, poll@entry=false) at mtcp.c:537
#15 0x0000000000478449 in multi_tcp_process_io (m=0x7fffffffc910) at mtcp.c:603
#16 tunnel_server_tcp (top=top@entry=0x7fffffffd6c0) at mtcp.c:704
#17 0x000000000047ec0f in tunnel_server (top=top@entry=0x7fffffffd6c0) at 
multi.c:2892
#18 0x00000000004806b4 in openvpn_main (argc=3, argv=0x7fffffffe468) at 
openvpn.c:275
#19 0x00007ffff7608830 in __libc_start_main (main=0x4055c0 <main>, argc=3, 
argv=0x7fffffffe468, init=<optimized out>, fini=<optimized out>, 
rtld_fini=<optimized out>, stack_end=0x7fffffffe458) at ../csu/libc-start.c:291
#20 0x0000000000405639 in _start ()
  
 Thanks,
 Peter
------------------------------------------------------------------------------
Attend Shape: An AT&T Tech Expo July 15-16. Meet us at AT&T Park in San
Francisco, CA to explore cutting-edge tech and listen to tech luminaries
present their vision of the future. This family event has something for
everyone, including kids. Get more information and register today.
http://sdm.link/attshape
_______________________________________________
Openvpn-users mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/openvpn-users

Reply via email to