[Τετ 13. Μαϊ 20:41:28 2015] Tor Software Error - The Tor software encountered an internal bug. Please report the following error message to the Tor developers at bugs.torproject.org: "tor_assertion_failed_(): Bug: circuituse.c:1835: circuit_get_open_circ_or_launch: Assertion ENTRY_TO_CONN(conn)->state == AP_CONN_STATE_CIRCUIT_WAIT failed; aborting.
"
[Τετ 13. Μαϊ 20:41:28 2015] Tor Software Error - The Tor software encountered an internal bug. Please report the following error message to the Tor developers at bugs.torproject.org: "Bug: Assertion ENTRY_TO_CONN(conn)->state == AP_CONN_STATE_CIRCUIT_WAIT failed in circuit_get_open_circ_or_launch at circuituse.c:1835. (Stack trace not available)
"
[Τετ 13. Μαϊ 20:43:13 2015] The Tor Software is not Running - Click "Start Tor" in the Vidalia Control Panel to restart the Tor software. If Tor exited unexpectedly, select the "Advanced" tab above for details about any errors encountered.
To upload designs, you'll need to enable LFS and have an admin enable hashed storage. More information
Child items ...
Show closed items
Linked items 0
Link issues together to show that they're related.
Learn more.
What version of Tor are you running, on what operating system, and what were you doing at the time?
Trac: Version: N/Ato Tor: unspecified Status: new to needs_information Summary: bugs to Assertion ENTRY_TO_CONN(conn)->state == AP_CONN_STATE_CIRCUIT_WAIT failed in circuit_get_open_circ_or_launch at circuituse.c:1835 Component: - Select a component to Tor
I think people are still waiting for details here.
(Meaning, you seem to be spamming trac and generally making a nuisance of yourself, which makes people uninterested in being helpful. Please consider being helpful instead.)
Αν ναι, σταμάτα να ανοίγεις νέα bug reports για το ίδιο πράγμα κάθε μέρα! Ευχαριστώ!
Αν προσέξεις, στα άλλα comments σου έχουν κάνει κάποιες ερωτήσεις που θα μας φέρουν πίο κοντά στο να λύσουμε το πρόβλημα σου!
Αν έχεις την τελευταία έκδοση και το πρόβλημα συνεχίζεται, τοτε πες μας ποιά έκδοση έχεις, σε ποιο λειτουργικό σύστημα το τρέχεις (Windows, Mac, Linux, ?) και τι έκανες όταν εμφανίστηκε το πρόβλημα.
Μην αγνοήσεις αυτές τις ερωτήσεις! Θέλουμε να λύσουμε το πρόβλημα σου!
Note: Changing the reporter to cypherpunks so I can obliterate the original submitter since they have chosen to consistently spam trac with duplicate tickets for weeks instead of replying with useful information.
Also thanks for another case that triggers the assert, that should be a starting point.
I added a log message in commit aab7d666cd51fdccdb735f7fa2c59f93d0c450e9 that should log a little more info if this error recurs. To see it, reproduce the bug with git master (or with 0.2.7.2-alpha when it's out).
Looking at the code and the stack trace, I see that we seem to be calling circuit_get_open_circ_or_launch() from connection_ap_handshake_attach_circuit(). But connection_ap_handshake_attach_circuit() already did tor_assert(base_conn->state == AP_CONN_STATE_CIRCUIT_WAIT);. So all I can figure is that either we're passing a different connection (!?), or the state has changed between the start of connection_ap_handshake_attach_circuit() and the call to circuit_get_open_circ_or_launch().
Or conceivably, this is in one of the calls to circuit_get_open_circ_or_launch() from within circuit_get_open_circ_or_launch(). But if that's happening, there should be an info-level log message. Maybe also try reproducing the bug with info-level logging?
Just started relay with 0.2.6.9 two days ago.
No hidden services locally, bug occurred on client
browsing activity concurrent with moderate relay
activity. Client and Videlia running on
different systems.
Log messages and gdb stack traces attached in
obfuscated form. Have a complete intact core
file and supporting set sysroot bundle
and am willing to provide that privately.
Please contact me at starlight dot 2015q2
at binnacle dot cx.
First reported as #16365 (moved) and yawing
identified it as this issue.
It depends on accessing a particular site
with a somewhat uncommon client configuration.
Same config and site access gives 0.2.4.27
and 0.2.5.12 fits, though eventually it
works. Have fallen back to old version
because 0.2.6.9 fails consistently,
though in a different manner than the
bug-trap so far.
Possibly the site in question is currently
under DDOS and so the opportunity to reproduce
may be time-limited to the attack.
Contact me privately at starlight dot 2015q2
at binnacle dot cx for the details.
Actually, what would help most would be reproducing it using latest git master, or with 'aab7d666cd51fdccdb735f7fa2c59f93d0c450e9 ' backported to 0.2.6.9, and noting the info-level log messages.