Tonight my relay 855BC2DABE24C861CD887DB9B2E950424B49FC34 restarted with
the following in the log file:
Nov 20 19:08:07.000 [notice] Heartbeat: Tor's uptime is 20 days 12:00
hours, with 29939 circuits open. I've sent 46193.23 GB and received
45940.92 GB.
Nov 20 19:08:07.000 [notice] Circuit handshake stats since last time:
36379/36379 TAP, 591207/591207 NTor.
Nov 20 19:08:07.000 [notice] Since startup we initiated 0 and received
655 v1 connections; initiated 0 and received 191219 v2 connections;
initiated 1 and received 191367 v3 connections; initiated 75189 and
received 1351289 v4 connections; initiated 147903 and received 1783201
v5 connections.
Nov 20 19:08:07.000 [notice] DoS mitigation since startup: 11 circuits
killed with too many cells. 3810290 circuits rejected, 67 marked
addresses. 349630 connections closed. 7988 single hop clients refused.
Nov 21 00:18:01.000 [err] tor_assertion_failed_(): Bug:
../src/core/or/circuitmux_ewma.c:165: TO_EWMA_POL_CIRC_DATA: Assertion
pol->magic == 0x761e7747U failed; aborting. (on Tor 0.4.1.6 )
Nov 21 00:18:01.000 [err] Bug: Assertion pol->magic == 0x761e7747U
failed in TO_EWMA_POL_CIRC_DATA at ../src/core/or/circuitmux_ewma.c:165:
. Stack trace: (on Tor 0.4.1.6 )
Nov 21 00:18:01.000 [err] Bug: /usr/bin/tor(log_backtrace_impl+0x47)
[0x55d5e9f968e7] (on Tor 0.4.1.6 )
Nov 21 00:18:01.000 [err] Bug:
/usr/bin/tor(tor_assertion_failed_+0x147) [0x55d5e9f919c7] (on Tor
0.4.1.6 )
Nov 21 00:18:01.000 [err] Bug: /usr/bin/tor(+0x8fe84)
[0x55d5e9e14e84] (on Tor 0.4.1.6 )
Nov 21 00:18:01.000 [err] Bug: /usr/bin/tor(+0xb839f)
[0x55d5e9e3d39f] (on Tor 0.4.1.6 )
Nov 21 00:18:01.000 [err] Bug:
/usr/bin/tor(circuit_receive_relay_cell+0x29a) [0x55d5e9e419fa] (on Tor
0.4.1.6 )
Nov 21 00:18:01.000 [err] Bug:
/usr/bin/tor(command_process_cell+0x2fc) [0x55d5e9e23a1c] (on Tor
0.4.1.6 )
Nov 21 00:18:01.000 [err] Bug:
/usr/bin/tor(channel_tls_handle_cell+0x333) [0x55d5e9e030d3] (on Tor
0.4.1.6 )
Nov 21 00:18:01.000 [err] Bug: /usr/bin/tor(+0xa773f)
[0x55d5e9e2c73f] (on Tor 0.4.1.6 )
Nov 21 00:18:01.000 [err] Bug:
/usr/bin/tor(connection_handle_read+0x990) [0x55d5e9df0500] (on Tor
0.4.1.6 )
Nov 21 00:18:01.000 [err] Bug: /usr/bin/tor(+0x707ee)
[0x55d5e9df57ee] (on Tor 0.4.1.6 )
Nov 21 00:18:01.000 [err] Bug:
/usr/lib/x86_64-linux-gnu/libevent-2.0.so.5(event_base_loop+0x6a0)
[0x7fb82bb5f5a0] (on Tor 0.4.1.6 )
Nov 21 00:18:01.000 [err] Bug: /usr/bin/tor(do_main_loop+0x105)
[0x55d5e9df6b25] (on Tor 0.4.1.6 )
Nov 21 00:18:01.000 [err] Bug: /usr/bin/tor(tor_run_main+0x1225)
[0x55d5e9de4545] (on Tor 0.4.1.6 )
Nov 21 00:18:01.000 [err] Bug: /usr/bin/tor(tor_main+0x3a)
[0x55d5e9de193a] (on Tor 0.4.1.6 )
Nov 21 00:18:01.000 [err] Bug: /usr/bin/tor(main+0x19)
[0x55d5e9de14b9] (on Tor 0.4.1.6 )
Nov 21 00:18:01.000 [err] Bug:
/lib/x86_64-linux-gnu/libc.so.6(__libc_start_main+0xf1) [0x7fb82a3b32e1]
(on Tor 0.4.1.6 )
Nov 21 00:18:01.000 [err] Bug: /usr/bin/tor(_start+0x2a)
[0x55d5e9de150a] (on Tor 0.4.1.6 )
Nov 21 00:18:02.000 [notice] Tor 0.4.1.6 opening log file.
Nov 21 00:18:02.605 [notice] We compiled with OpenSSL 101000bf: OpenSSL
1.1.0k 28 May 2019 and we are running with OpenSSL 101000cf: OpenSSL
1.1.0l 10 Sep 2019. These two versions should be binary compatible.
Nov 21 00:18:02.606 [notice] Tor 0.4.1.6 running on Linux with Libevent
2.0.21-stable, OpenSSL 1.1.0l, Zlib 1.2.8, Liblzma 5.2.2, and Libzstd
1.1.2.
<...>
Nov 21 00:18:03.000 [notice] Bootstrapped 0% (starting): Starting
Nov 21 00:18:07.000 [warn] Incorrect ed25519 signature(s)
Nov 21 00:18:10.000 [notice] Starting with guard context "default"
<...>
Should I open a ticket?