io.matthewnelson.kmp.tor.KmpTorLoaderJvmUnitTest[jvm] STANDARD_OUT
Lifecycle(class=RealTorManager@1744007757, event=onCreate)
State(torState=Tor: Starting, networkState=Network: Disabled)
Action.Start
==== RUST: acquiring config
==== JAVA: ReentrantLock acquired
==== RUST: setting lines to verify
==== RUST: verifying lines
Jan 15 14:45:49.478 [notice] Tor 0.4.6.9 running on Linux with Libevent 2.1.12-stable, OpenSSL 1.1.1m, Zlib 1.2.11, Liblzma N/A, Libzstd N/A and Glibc 2.34 as libc.
Jan 15 14:45:49.478 [notice] Tor can't help you if you use it wrong! Learn how to be safe at https://www.torproject.org/download/download#warning
Jan 15 14:45:49.478 [notice] Read configuration file "/tmp/junit5222000579364414621/torservice/torrc-defaults".
Jan 15 14:45:49.478 [notice] Read configuration file "/tmp/junit5222000579364414621/torservice/torrc".
Jan 15 14:45:49.479 [warn] Fixing permissions on directory /tmp/junit5222000579364414621/cache
==== RUST: setting lines to run
==== RUST: Starting Tor with args: [
"tor",
"--RunAsDaemon",
"0",
"-f",
"/tmp/junit5222000579364414621/torservice/torrc",
"--defaults-torrc",
"/tmp/junit5222000579364414621/torservice/torrc-defaults",
"--ignore-missing-torrc",
"--ControlPort",
"9155",
"--SocksPort",
"auto",
"--HTTPTunnelPort",
"auto",
"--DormantClientTimeout",
"10 minutes",
"--DormantCanceledByStartup",
"0",
"--DisableNetwork",
"1",
"--SyslogIdentityTag",
"TorManager",
"--CacheDirectory",
"/tmp/junit5222000579364414621/cache",
"--DataDirectory",
"/tmp/junit5222000579364414621/torservice/data",
"--ControlPortWriteToFile",
"/tmp/junit5222000579364414621/torservice/control.txt",
"--CookieAuthentication",
"1",
"--CookieAuthFile",
"/tmp/junit5222000579364414621/torservice/control_auth_cookie",
"--GeoIPFile",
"/tmp/junit5222000579364414621/torservice/geoip",
"--GeoIPv6File",
"/tmp/junit5222000579364414621/torservice/geoip6",
]
==== RUST: running lines
Jan 15 14:45:49.483 [notice] Tor 0.4.6.9 running on Linux with Libevent 2.1.12-stable, OpenSSL 1.1.1m, Zlib 1.2.11, Liblzma N/A, Libzstd N/A and Glibc 2.34 as libc.
Jan 15 14:45:49.483 [notice] Tor can't help you if you use it wrong! Learn how to be safe at https://www.torproject.org/download/download#warning
Jan 15 14:45:49.483 [notice] Read configuration file "/tmp/junit5222000579364414621/torservice/torrc-defaults".
Jan 15 14:45:49.483 [notice] Read configuration file "/tmp/junit5222000579364414621/torservice/torrc".
Jan 15 14:45:49.484 [notice] Opening Control listener on 127.0.0.1:9155
Jan 15 14:45:49.484 [notice] Opened Control listener connection (ready) on 127.0.0.1:9155
Jan 15 14:45:49.484 [notice] DisableNetwork is set. Tor will not make or accept non-control network connections. Shutting down all existing connections.
Jan 15 14:45:49.000 [notice] Parsing GEOIP IPv4 file /tmp/junit5222000579364414621/torservice/geoip.
Jan 15 14:45:49.000 [notice] Parsing GEOIP IPv6 file /tmp/junit5222000579364414621/torservice/geoip6.
Jan 15 14:45:49.000 [notice] Bootstrapped 0% (starting): Starting
Jan 15 14:45:49.000 [notice] Starting with guard context "default"
Jan 15 14:45:49.000 [notice] Delaying directory fetches: DisableNetwork is set.
Jan 15 14:45:49.000 [notice] New control connection opened from 127.0.0.1.
Lifecycle(class=RealTorController@1511809161, event=onCreate)
>> TAKEOWNERSHIP
<< 250 OK
>> SETEVENTS ERR NOTICE WARN
<< 250 OK
>> SETCONF DisableNetwork=0
Jan 15 14:45:49.000 [notice] Opening Socks listener on 127.0.0.1:0
Jan 15 14:45:49.000 [notice] Socks listener listening on port 35255.
Jan 15 14:45:49.000 [notice] Opened Socks listener connection (ready) on 127.0.0.1:35255
Jan 15 14:45:49.000 [notice] Opening HTTP tunnel listener on 127.0.0.1:0
Jan 15 14:45:49.000 [notice] HTTP tunnel listener listening on port 38231.
Jan 15 14:45:49.000 [notice] Opened HTTP tunnel listener connection (ready) on 127.0.0.1:38231
Jan 15 14:45:49.000 [notice] Bootstrapped 5% (conn): Connecting to a relay
<< 250 OK
<< 650 NOTICE Opening Socks listener on 127.0.0.1:0
event=Notice, output=Opening Socks listener on 127.0.0.1:0
<< 650 NOTICE Socks listener listening on port 35255.
event=Notice, output=Socks listener listening on port 35255.
<< 650 NOTICE Opened Socks listener connection (ready) on 127.0.0.1:35255
event=Notice, output=Opened Socks listener connection (ready) on 127.0.0.1:35255
<< 650 NOTICE Opening HTTP tunnel listener on 127.0.0.1:0
event=Notice, output=Opening HTTP tunnel listener on 127.0.0.1:0
<< 650 NOTICE HTTP tunnel listener listening on port 38231.
event=Notice, output=HTTP tunnel listener listening on port 38231.
<< 650 NOTICE Opened HTTP tunnel listener connection (ready) on 127.0.0.1:38231
event=Notice, output=Opened HTTP tunnel listener connection (ready) on 127.0.0.1:38231
<< 650 NOTICE Bootstrapped 5% (conn): Connecting to a relay
State(torState=Tor: On, networkState=Network: Disabled)
event=Notice, output=Bootstrapped 5% (conn): Connecting to a relay
State(torState=Tor: On, networkState=Network: Enabled)
io.matthewnelson.kmp.tor.KmpTorLoaderJvmUnitTest[jvm] > testExample[jvm] STARTED
Jan 15 14:45:50.000 [notice] Bootstrapped 10% (conn_done): Connected to a relay
io.matthewnelson.kmp.tor.KmpTorLoaderJvmUnitTest[jvm] > testExample[jvm] STANDARD_OUT
<< 650 NOTICE Bootstrapped 10% (conn_done): Connected to a relay
State(torState=Tor: On, networkState=Network: Enabled)
event=Notice, output=Bootstrapped 10% (conn_done): Connected to a relay
Jan 15 14:45:50.000 [notice] Bootstrapped 14% (handshake): Handshaking with a relay
<< 650 NOTICE Bootstrapped 14% (handshake): Handshaking with a relay
State(torState=Tor: On, networkState=Network: Enabled)
event=Notice, output=Bootstrapped 14% (handshake): Handshaking with a relay
Jan 15 14:45:50.000 [notice] Bootstrapped 15% (handshake_done): Handshake with a relay done
Jan 15 14:45:50.000 [notice] Bootstrapped 20% (onehop_create): Establishing an encrypted directory connection
<< 650 NOTICE Bootstrapped 15% (handshake_done): Handshake with a relay done
State(torState=Tor: On, networkState=Network: Enabled)
event=Notice, output=Bootstrapped 15% (handshake_done): Handshake with a relay done
<< 650 NOTICE Bootstrapped 20% (onehop_create): Establishing an encrypted directory connection
State(torState=Tor: On, networkState=Network: Enabled)
event=Notice, output=Bootstrapped 20% (onehop_create): Establishing an encrypted directory connection
Jan 15 14:45:50.000 [notice] Bootstrapped 25% (requesting_status): Asking for networkstatus consensus
<< 650 NOTICE Bootstrapped 25% (requesting_status): Asking for networkstatus consensus
State(torState=Tor: On, networkState=Network: Enabled)
event=Notice, output=Bootstrapped 25% (requesting_status): Asking for networkstatus consensus
Jan 15 14:45:51.000 [notice] Bootstrapped 30% (loading_status): Loading networkstatus consensus
<< 650 NOTICE Bootstrapped 30% (loading_status): Loading networkstatus consensus
State(torState=Tor: On, networkState=Network: Enabled)
event=Notice, output=Bootstrapped 30% (loading_status): Loading networkstatus consensus
Jan 15 14:45:52.000 [notice] I learned some more directory information, but not enough to build a circuit: We have no usable consensus.
<< 650 NOTICE I learned some more directory information, but not enough to build a circuit: We have no usable consensus.
event=Notice, output=I learned some more directory information, but not enough to build a circuit: We have no usable consensus.
Jan 15 14:45:52.000 [notice] Bootstrapped 40% (loading_keys): Loading authority key certs
<< 650 NOTICE Bootstrapped 40% (loading_keys): Loading authority key certs
State(torState=Tor: On, networkState=Network: Enabled)
event=Notice, output=Bootstrapped 40% (loading_keys): Loading authority key certs
Jan 15 14:45:52.000 [notice] The current consensus has no exit nodes. Tor can only build internal paths, such as paths to onion services.
Jan 15 14:45:52.000 [notice] Bootstrapped 45% (requesting_descriptors): Asking for relay descriptors
Jan 15 14:45:52.000 [notice] I learned some more directory information, but not enough to build a circuit: We need more microdescriptors: we have 0/6845, and can only build 0% of likely paths. (We have 0% of guards bw, 0% of midpoint bw, and 0% of end bw (no exits in consensus, using mid) = 0% of path bw.)
<< 650 NOTICE The current consensus has no exit nodes. Tor can only build internal paths, such as paths to onion services.
event=Notice, output=The current consensus has no exit nodes. Tor can only build internal paths, such as paths to onion services.
<< 650 NOTICE Bootstrapped 45% (requesting_descriptors): Asking for relay descriptors
State(torState=Tor: On, networkState=Network: Enabled)
event=Notice, output=Bootstrapped 45% (requesting_descriptors): Asking for relay descriptors
<< 650 NOTICE I learned some more directory information, but not enough to build a circuit: We need more microdescriptors: we have 0/6845, and can only build 0% of likely paths. (We have 0% of guards bw, 0% of midpoint bw, and 0% of end bw (no exits in consensus, using mid) = 0% of path bw.)
event=Notice, output=I learned some more directory information, but not enough to build a circuit: We need more microdescriptors: we have 0/6845, and can only build 0% of likely paths. (We have 0% of guards bw, 0% of midpoint bw, and 0% of end bw (no exits in consensus, using mid) = 0% of path bw.)
Jan 15 14:45:53.000 [notice] Bootstrapped 50% (loading_descriptors): Loading relay descriptors
<< 650 NOTICE Bootstrapped 50% (loading_descriptors): Loading relay descriptors
State(torState=Tor: On, networkState=Network: Enabled)
event=Notice, output=Bootstrapped 50% (loading_descriptors): Loading relay descriptors
Jan 15 14:45:54.000 [notice] The current consensus contains exit nodes. Tor can build exit and internal paths.
<< 650 NOTICE The current consensus contains exit nodes. Tor can build exit and internal paths.
event=Notice, output=The current consensus contains exit nodes. Tor can build exit and internal paths.
==== JAVA - TEST: RESTART 1
State(torState=Tor: Stopping, networkState=Network: Enabled)
AddressInfo(dns=null, http=null, socks=null, trans=null)
Action.Restart
>> SETCONF DisableNetwork=1
Jan 15 14:45:54.000 [notice] Closing no-longer-configured HTTP tunnel listener on 127.0.0.1:38231
Jan 15 14:45:54.000 [notice] Closing no-longer-configured Socks listener on 127.0.0.1:35255
Jan 15 14:45:54.000 [notice] DisableNetwork is set. Tor will not make or accept non-control network connections. Shutting down all existing connections.
<< 250 OK
<< 650 NOTICE Closing no-longer-configured HTTP tunnel listener on 127.0.0.1:38231
event=Notice, output=Closing no-longer-configured HTTP tunnel listener on 127.0.0.1:38231
<< 650 NOTICE Closing no-longer-configured Socks listener on 127.0.0.1:35255
event=Notice, output=Closing no-longer-configured Socks listener on 127.0.0.1:35255
<< 650 NOTICE DisableNetwork is set. Tor will not make or accept non-control network connections. Shutting down all existing connections.
State(torState=Tor: Stopping, networkState=Network: Disabled)
event=Notice, output=DisableNetwork is set. Tor will not make or accept non-control network connections. Shutting down all existing connections.
Jan 15 14:45:55.000 [notice] Interrupt: exiting cleanly.
>> SIGNAL SHUTDOWN
<< 250 OK
Replies off the control port were empty
Tor has stopped
Lifecycle(class=RealTorController@1511809161, event=onDestroy)
==== RUST: freeing config
==== JAVA: runLines completed
==== JAVA: ReentrantLock release
State(torState=Tor: Off, networkState=Network: Disabled)
State(torState=Tor: Starting, networkState=Network: Disabled)
==== JAVA: ReentrantLock acquired
==== RUST: acquiring config
==== RUST: setting lines to verify
==== RUST: verifying lines
Jan 15 14:45:56.000 [notice] Tor 0.4.6.9 running on Linux with Libevent 2.1.12-stable, OpenSSL 1.1.1m, Zlib 1.2.11, Liblzma N/A, Libzstd N/A and Glibc 2.34 as libc.
Jan 15 14:45:56.000 [notice] Tor can't help you if you use it wrong! Learn how to be safe at https://www.torproject.org/download/download#warning
Jan 15 14:45:56.000 [notice] Read configuration file "/tmp/junit5222000579364414621/torservice/torrc-defaults".
Jan 15 14:45:56.000 [notice] Read configuration file "/tmp/junit5222000579364414621/torservice/torrc".
==== RUST: setting lines to run
==== RUST: Starting Tor with args: [
"tor",
"--RunAsDaemon",
"0",
"-f",
"/tmp/junit5222000579364414621/torservice/torrc",
"--defaults-torrc",
"/tmp/junit5222000579364414621/torservice/torrc-defaults",
"--ignore-missing-torrc",
"--ControlPort",
"9155",
"--SocksPort",
"auto",
"--HTTPTunnelPort",
"auto",
"--DormantClientTimeout",
"10 minutes",
"--DormantCanceledByStartup",
"0",
"--DisableNetwork",
"1",
"--SyslogIdentityTag",
"TorManager",
"--CacheDirectory",
"/tmp/junit5222000579364414621/cache",
"--DataDirectory",
"/tmp/junit5222000579364414621/torservice/data",
"--ControlPortWriteToFile",
"/tmp/junit5222000579364414621/torservice/control.txt",
"--CookieAuthentication",
"1",
"--CookieAuthFile",
"/tmp/junit5222000579364414621/torservice/control_auth_cookie",
"--GeoIPFile",
"/tmp/junit5222000579364414621/torservice/geoip",
"--GeoIPv6File",
"/tmp/junit5222000579364414621/torservice/geoip6",
]
==== RUST: running lines
Jan 15 14:45:56.000 [notice] Tor 0.4.6.9 running on Linux with Libevent 2.1.12-stable, OpenSSL 1.1.1m, Zlib 1.2.11, Liblzma N/A, Libzstd N/A and Glibc 2.34 as libc.
Jan 15 14:45:56.000 [notice] Tor can't help you if you use it wrong! Learn how to be safe at https://www.torproject.org/download/download#warning
Jan 15 14:45:56.000 [notice] Read configuration file "/tmp/junit5222000579364414621/torservice/torrc-defaults".
Jan 15 14:45:56.000 [notice] Read configuration file "/tmp/junit5222000579364414621/torservice/torrc".
Jan 15 14:45:56.000 [notice] Opening Control listener on 127.0.0.1:9155
Jan 15 14:45:56.000 [notice] Opened Control listener connection (ready) on 127.0.0.1:9155
Jan 15 14:45:56.000 [notice] DisableNetwork is set. Tor will not make or accept non-control network connections. Shutting down all existing connections.
Jan 15 14:45:56.000 [notice] Parsing GEOIP IPv4 file /tmp/junit5222000579364414621/torservice/geoip.
Jan 15 14:45:56.000 [notice] Parsing GEOIP IPv6 file /tmp/junit5222000579364414621/torservice/geoip6.
Jan 15 14:45:56.000 [notice] Bootstrapped 0% (starting): Starting
Jan 15 14:45:56.000 [notice] Starting with guard context "default"
Jan 15 14:45:56.000 [notice] Delaying directory fetches: DisableNetwork is set.
Jan 15 14:45:56.000 [notice] New control connection opened from 127.0.0.1.
Lifecycle(class=RealTorController@446575866, event=onCreate)
>> TAKEOWNERSHIP
<< 250 OK
>> SETEVENTS ERR NOTICE WARN
<< 250 OK
>> SETCONF DisableNetwork=0
Jan 15 14:45:56.000 [notice] Opening Socks listener on 127.0.0.1:0
Jan 15 14:45:56.000 [notice] Socks listener listening on port 42085.
Jan 15 14:45:56.000 [notice] Opened Socks listener connection (ready) on 127.0.0.1:42085
Jan 15 14:45:56.000 [notice] Opening HTTP tunnel listener on 127.0.0.1:0
Jan 15 14:45:56.000 [notice] HTTP tunnel listener listening on port 39265.
Jan 15 14:45:56.000 [notice] Opened HTTP tunnel listener connection (ready) on 127.0.0.1:39265
Jan 15 14:45:56.000 [notice] Bootstrapped 5% (conn): Connecting to a relay
<< 250 OK
<< 650 NOTICE Opening Socks listener on 127.0.0.1:0
event=Notice, output=Opening Socks listener on 127.0.0.1:0
<< 650 NOTICE Socks listener listening on port 42085.
event=Notice, output=Socks listener listening on port 42085.
<< 650 NOTICE Opened Socks listener connection (ready) on 127.0.0.1:42085
event=Notice, output=Opened Socks listener connection (ready) on 127.0.0.1:42085
<< 650 NOTICE Opening HTTP tunnel listener on 127.0.0.1:0
event=Notice, output=Opening HTTP tunnel listener on 127.0.0.1:0
<< 650 NOTICE HTTP tunnel listener listening on port 39265.
event=Notice, output=HTTP tunnel listener listening on port 39265.
<< 650 NOTICE Opened HTTP tunnel listener connection (ready) on 127.0.0.1:39265
event=Notice, output=Opened HTTP tunnel listener connection (ready) on 127.0.0.1:39265
<< 650 NOTICE Bootstrapped 5% (conn): Connecting to a relay
State(torState=Tor: On, networkState=Network: Disabled)
event=Notice, output=Bootstrapped 5% (conn): Connecting to a relay
State(torState=Tor: On, networkState=Network: Enabled)
Jan 15 14:45:56.000 [notice] Bootstrapped 10% (conn_done): Connected to a relay
<< 650 NOTICE Bootstrapped 10% (conn_done): Connected to a relay
State(torState=Tor: On, networkState=Network: Enabled)
event=Notice, output=Bootstrapped 10% (conn_done): Connected to a relay
Jan 15 14:45:56.000 [notice] Bootstrapped 14% (handshake): Handshaking with a relay
<< 650 NOTICE Bootstrapped 14% (handshake): Handshaking with a relay
State(torState=Tor: On, networkState=Network: Enabled)
event=Notice, output=Bootstrapped 14% (handshake): Handshaking with a relay
Jan 15 14:45:57.000 [notice] Bootstrapped 15% (handshake_done): Handshake with a relay done
Jan 15 14:45:57.000 [notice] Bootstrapped 45% (requesting_descriptors): Asking for relay descriptors
<< 650 NOTICE Bootstrapped 15% (handshake_done): Handshake with a relay done
State(torState=Tor: On, networkState=Network: Enabled)
event=Notice, output=Bootstrapped 15% (handshake_done): Handshake with a relay done
<< 650 NOTICE Bootstrapped 45% (requesting_descriptors): Asking for relay descriptors
State(torState=Tor: On, networkState=Network: Enabled)
event=Notice, output=Bootstrapped 45% (requesting_descriptors): Asking for relay descriptors
Jan 15 14:45:57.000 [notice] Bootstrapped 52% (loading_descriptors): Loading relay descriptors
<< 650 NOTICE Bootstrapped 52% (loading_descriptors): Loading relay descriptors
State(torState=Tor: On, networkState=Network: Enabled)
event=Notice, output=Bootstrapped 52% (loading_descriptors): Loading relay descriptors
Jan 15 14:45:59.000 [notice] Bootstrapped 59% (loading_descriptors): Loading relay descriptors
<< 650 NOTICE Bootstrapped 59% (loading_descriptors): Loading relay descriptors
State(torState=Tor: On, networkState=Network: Enabled)
event=Notice, output=Bootstrapped 59% (loading_descriptors): Loading relay descriptors
Jan 15 14:46:00.000 [notice] Bootstrapped 68% (loading_descriptors): Loading relay descriptors
<< 650 NOTICE Bootstrapped 68% (loading_descriptors): Loading relay descriptors
State(torState=Tor: On, networkState=Network: Enabled)
event=Notice, output=Bootstrapped 68% (loading_descriptors): Loading relay descriptors
============================================================ T= 1642275961
Tor 0.4.6.9 died: Caught signal 11
/home/administrator/AndroidStudioProjects/personal/components/kmp-tor/library/binaries/kmp-tor-binary-build/target/debug/libkmptor.so(+0x11bad1)[0x7faad1b17ad1]
[0x7faae900c82c]
[0x7faae900c82c]
Compiling JNI bindings atop libtor-sys and I keep getting intermittent
Tor 0.4.6.9 died: Caught signal 11crashes. Not entirely sure if this is attributed to something with libtor-sys, or JVM side, but I feel like I'm losing my mind trying to debug this.JVM Test simply starts Tor, then cycles a restart a couple times at 5s intervals. It sometimes fails immediately, sometimes makes it through start and then 1 restart cycle.
Any suggestions would be greatly appreciated.
lib.rs (work in progress, lol)
Cargo.toml
Kotlin Multiplatform JVM Native Loader
Jvm test output 1 (linuxx64, failure on first restart called)
Jvm test output 2 (linuxx64, failure mid run after successful restart)