Attachment 'output-of-strace-of-client-auditdistd-on-linux-as-of-db400c6b5886454992cd0ea1514fd4608067df7d.txt'
Download 1 root@linux:/home/vagrant# strace /vagrant/openbsm/bin/auditdistd/auditdistd -c /vagrant/auditdistd-sender.conf -F -dddddddddddd
2
3 execve("/vagrant/openbsm/bin/auditdistd/auditdistd", ["/vagrant/openbsm/bin/auditdistd/"..., "-c", "/vagrant/auditdistd-sender.conf", "-F", "-dddddddddddd"], [/* 17 vars */]) = 0
4 brk(NULL) = 0x5571a660c000
5 access("/etc/ld.so.nohwcap", F_OK) = -1 ENOENT (No such file or directory)
6 mmap(NULL, 12288, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) = 0x7f1d06ce4000
7 access("/etc/ld.so.preload", R_OK) = -1 ENOENT (No such file or directory)
8 open("/etc/ld.so.cache", O_RDONLY|O_CLOEXEC) = 3
9 fstat(3, {st_mode=S_IFREG|0644, st_size=21339, ...}) = 0
10 mmap(NULL, 21339, PROT_READ, MAP_PRIVATE, 3, 0) = 0x7f1d06cde000
11 close(3) = 0
12 access("/etc/ld.so.nohwcap", F_OK) = -1 ENOENT (No such file or directory)
13 open("/usr/lib/x86_64-linux-gnu/libcrypto.so.1.1", O_RDONLY|O_CLOEXEC) = 3
14 read(3, "\177ELF\2\1\1\0\0\0\0\0\0\0\0\0\3\0>\0\1\0\0\0\0\340\7\0\0\0\0\0"..., 832) = 832
15 fstat(3, {st_mode=S_IFREG|0644, st_size=2686672, ...}) = 0
16 mmap(NULL, 4795968, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) = 0x7f1d06631000
17 mprotect(0x7f1d06896000, 2093056, PROT_NONE) = 0
18 mmap(0x7f1d06a95000, 180224, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0x264000) = 0x7f1d06a95000
19 mmap(0x7f1d06ac1000, 11840, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x7f1d06ac1000
20 close(3) = 0
21 access("/etc/ld.so.nohwcap", F_OK) = -1 ENOENT (No such file or directory)
22 open("/usr/lib/x86_64-linux-gnu/libssl.so.1.1", O_RDONLY|O_CLOEXEC) = 3
23 read(3, "\177ELF\2\1\1\0\0\0\0\0\0\0\0\0\3\0>\0\1\0\0\0\360\211\1\0\0\0\0\0"..., 832) = 832
24 fstat(3, {st_mode=S_IFREG|0644, st_size=442920, ...}) = 0
25 mmap(NULL, 2538392, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) = 0x7f1d063c5000
26 mprotect(0x7f1d06427000, 2097152, PROT_NONE) = 0
27 mmap(0x7f1d06627000, 40960, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0x62000) = 0x7f1d06627000
28 close(3) = 0
29 access("/etc/ld.so.nohwcap", F_OK) = -1 ENOENT (No such file or directory)
30 open("/lib/x86_64-linux-gnu/libpthread.so.0", O_RDONLY|O_CLOEXEC) = 3
31 read(3, "\177ELF\2\1\1\0\0\0\0\0\0\0\0\0\3\0>\0\1\0\0\0Pa\0\0\0\0\0\0"..., 832) = 832
32 fstat(3, {st_mode=S_IFREG|0755, st_size=135440, ...}) = 0
33 mmap(NULL, 2212936, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) = 0x7f1d061a8000
34 mprotect(0x7f1d061c0000, 2093056, PROT_NONE) = 0
35 mmap(0x7f1d063bf000, 8192, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0x17000) = 0x7f1d063bf000
36 mmap(0x7f1d063c1000, 13384, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x7f1d063c1000
37 close(3) = 0
38 access("/etc/ld.so.nohwcap", F_OK) = -1 ENOENT (No such file or directory)
39 open("/lib/x86_64-linux-gnu/libdl.so.2", O_RDONLY|O_CLOEXEC) = 3
40 read(3, "\177ELF\2\1\1\0\0\0\0\0\0\0\0\0\3\0>\0\1\0\0\0\200\r\0\0\0\0\0\0"..., 832) = 832
41 fstat(3, {st_mode=S_IFREG|0644, st_size=14640, ...}) = 0
42 mmap(NULL, 2109680, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) = 0x7f1d05fa4000
43 mprotect(0x7f1d05fa7000, 2093056, PROT_NONE) = 0
44 mmap(0x7f1d061a6000, 8192, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0x2000) = 0x7f1d061a6000
45 close(3) = 0
46 access("/etc/ld.so.nohwcap", F_OK) = -1 ENOENT (No such file or directory)
47 open("/lib/x86_64-linux-gnu/libc.so.6", O_RDONLY|O_CLOEXEC) = 3
48 read(3, "\177ELF\2\1\1\3\0\0\0\0\0\0\0\0\3\0>\0\1\0\0\0\320\3\2\0\0\0\0\0"..., 832) = 832
49 fstat(3, {st_mode=S_IFREG|0755, st_size=1689360, ...}) = 0
50 mmap(NULL, 3795360, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) = 0x7f1d05c05000
51 mprotect(0x7f1d05d9a000, 2097152, PROT_NONE) = 0
52 mmap(0x7f1d05f9a000, 24576, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0x195000) = 0x7f1d05f9a000
53 mmap(0x7f1d05fa0000, 14752, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x7f1d05fa0000
54 close(3) = 0
55 mmap(NULL, 8192, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) = 0x7f1d06cdc000
56 arch_prctl(ARCH_SET_FS, 0x7f1d06cdd500) = 0
57 mprotect(0x7f1d05f9a000, 16384, PROT_READ) = 0
58 mprotect(0x7f1d061a6000, 4096, PROT_READ) = 0
59 mprotect(0x7f1d063bf000, 4096, PROT_READ) = 0
60 mprotect(0x7f1d06a95000, 122880, PROT_READ) = 0
61 mprotect(0x7f1d06627000, 16384, PROT_READ) = 0
62 mprotect(0x5571a5876000, 4096, PROT_READ) = 0
63 mprotect(0x7f1d06ce7000, 4096, PROT_READ) = 0
64 munmap(0x7f1d06cde000, 21339) = 0
65 set_tid_address(0x7f1d06cdd7d0) = 6587
66 set_robust_list(0x7f1d06cdd7e0, 24) = 0
67 rt_sigaction(SIGRTMIN, {sa_handler=0x7f1d061adbd0, sa_mask=[], sa_flags=SA_RESTORER|SA_SIGINFO, sa_restorer=0x7f1d061b90c0}, NULL, 8) = 0
68 rt_sigaction(SIGRT_1, {sa_handler=0x7f1d061adc60, sa_mask=[], sa_flags=SA_RESTORER|SA_RESTART|SA_SIGINFO, sa_restorer=0x7f1d061b90c0}, NULL, 8) = 0
69 rt_sigprocmask(SIG_UNBLOCK, [RTMIN RT_1], NULL, 8) = 0
70 getrlimit(RLIMIT_STACK, {rlim_cur=8192*1024, rlim_max=RLIM64_INFINITY}) = 0
71 brk(NULL) = 0x5571a660c000
72 brk(0x5571a662d000) = 0x5571a662d000
73 open("/vagrant/auditdistd-sender.conf", O_RDONLY) = 3
74 ioctl(3, TCGETS, 0x7ffd3687d1b0) = -1 ENOTTY (Inappropriate ioctl for device)
75 ioctl(3, TCGETS, 0x7ffd3687d1d0) = -1 ENOTTY (Inappropriate ioctl for device)
76 fstat(3, {st_mode=S_IFREG|0644, st_size=268, ...}) = 0
77 read(3, "sender {\n\thost \"freebsd\" {\n\t\trem"..., 8192) = 268
78 read(3, "", 4096) = 0
79 read(3, "", 8192) = 0
80 ioctl(3, TCGETS, 0x7ffd3687c8f0) = -1 ENOTTY (Inappropriate ioctl for device)
81 close(3) = 0
82 uname({sysname="Linux", nodename="linux", ...}) = 0
83 getpid() = 6587
84 fstat(1, {st_mode=S_IFCHR|0620, st_rdev=makedev(136, 0), ...}) = 0
85 write(1, "(6587) [DEBUG][2] Configuration:"..., 33(6587) [DEBUG][2] Configuration:
86 ) = 33
87 getpid() = 6587
88 write(1, "(6587) [DEBUG][2] Global:\n", 28(6587) [DEBUG][2] Global:
89 ) = 28
90 getpid() = 6587
91 write(1, "(6587) [DEBUG][2] pidfile: /"..., 55(6587) [DEBUG][2] pidfile: /var/run/auditdistd.pid
92 ) = 55
93 getpid() = 6587
94 write(1, "(6587) [DEBUG][2] timeout: 2"..., 34(6587) [DEBUG][2] timeout: 20
95 ) = 34
96 getpid() = 6587
97 write(1, "(6587) [DEBUG][2] Sender only,"..., 48(6587) [DEBUG][2] Sender only, not listening.
98 ) = 48
99 getpid() = 6587
100 write(1, "(6587) [DEBUG][2] Hosts:\n", 27(6587) [DEBUG][2] Hosts:
101 ) = 27
102 getpid() = 6587
103 write(1, "(6587) [DEBUG][2] name: free"..., 36(6587) [DEBUG][2] name: freebsd
104 ) = 36
105 getpid() = 6587
106 write(1, "(6587) [DEBUG][2] role: se"..., 37(6587) [DEBUG][2] role: sender
107 ) = 37
108 getpid() = 6587
109 write(1, "(6587) [DEBUG][2] version:"..., 35(6587) [DEBUG][2] version: 0
110 ) = 35
111 getpid() = 6587
112 write(1, "(6587) [DEBUG][2] localadd"..., 36(6587) [DEBUG][2] localaddr:
113 ) = 36
114 getpid() = 6587
115 write(1, "(6587) [DEBUG][2] remotead"..., 56(6587) [DEBUG][2] remoteaddr: tls://192.168.10.11
116 ) = 56
117 getpid() = 6587
118 write(1, "(6587) [DEBUG][2] remote: "..., 38(6587) [DEBUG][2] remote: (nil)
119 ) = 38
120 getpid() = 6587
121 write(1, "(6587) [DEBUG][2] director"..., 61(6587) [DEBUG][2] directory: /var/log/audit/auditdistd
122 ) = 61
123 getpid() = 6587
124 write(1, "(6587) [DEBUG][2] compress"..., 39(6587) [DEBUG][2] compression: 0
125 ) = 39
126 getpid() = 6587
127 write(1, "(6587) [DEBUG][2] checksum"..., 36(6587) [DEBUG][2] checksum: 0
128 ) = 36
129 getpid() = 6587
130 write(1, "(6587) [DEBUG][2] pid: 0\n", 31(6587) [DEBUG][2] pid: 0
131 ) = 31
132 getpid() = 6587
133 write(1, "(6587) [DEBUG][2] conn: (n"..., 36(6587) [DEBUG][2] conn: (nil)
134 ) = 36
135 rt_sigaction(SIGHUP, {sa_handler=SIG_DFL, sa_mask=[HUP], sa_flags=SA_RESTORER|SA_RESTART, sa_restorer=0x7f1d05c38030}, {sa_handler=SIG_DFL, sa_mask=[], sa_flags=0}, 8) = 0
136 rt_sigaction(SIGINT, {sa_handler=SIG_DFL, sa_mask=[INT], sa_flags=SA_RESTORER|SA_RESTART, sa_restorer=0x7f1d05c38030}, {sa_handler=SIG_DFL, sa_mask=[], sa_flags=0}, 8) = 0
137 rt_sigaction(SIGTERM, {sa_handler=SIG_DFL, sa_mask=[TERM], sa_flags=SA_RESTORER|SA_RESTART, sa_restorer=0x7f1d05c38030}, {sa_handler=SIG_DFL, sa_mask=[], sa_flags=0}, 8) = 0
138 rt_sigaction(SIGCHLD, {sa_handler=0x5571a565a160, sa_mask=[CHLD], sa_flags=SA_RESTORER|SA_RESTART, sa_restorer=0x7f1d05c38030}, {sa_handler=SIG_DFL, sa_mask=[], sa_flags=0}, 8) = 0
139 rt_sigprocmask(SIG_SETMASK, [HUP INT TERM CHLD], NULL, 8) = 0
140 socketpair(AF_UNIX, SOCK_STREAM, 0, [3, 4]) = 0
141 clone(child_stack=NULL, flags=CLONE_CHILD_CLEARTID|CLONE_CHILD_SETTID|SIGCHLD, child_tidptr=0x7f1d06cdd7d0) = 6588
142 close(3) = 0
143 getpid() = 6587
144 write(1, "(6587) [INFO] Started successful"..., 36(6587) [INFO] Started successfully.
145 ) = 36
146 rt_sigtimedwait([HUP INT TERM CHLD], NULL, {tv_sec=0, tv_nsec=0}, 8) = -1 EAGAIN (Resource temporarily unavailable)
147 select(5, [4], NULL, NULL, {tv_sec=5, tv_usec=0}(6588) [DEBUG][1] [freebsd] (sender) Privileges successfully dropped using chroot+setgid+setuid.
148 (6588) [INFO] [freebsd] (sender) Privileges successfully dropped.
149 ) = 1 (in [4], left {tv_sec=4, tv_usec=994374})
150 rt_sigtimedwait([HUP INT TERM CHLD], NULL, {tv_sec=0, tv_nsec=0}, 8) = -1 EAGAIN (Resource temporarily unavailable)
151 recvfrom(4, "\1\0", 2, MSG_WAITALL, NULL, NULL) = 2
152 socketpair(AF_UNIX, SOCK_STREAM, 0, [3, 5]) = 0
153 clone(child_stack=NULL, flags=CLONE_CHILD_CLEARTID|CLONE_CHILD_SETTID|SIGCHLD, child_tidptr=0x7f1d06cdd7d0) = 6589
154 close(5) = 0
155 sendto(4, "\0\0", 2, MSG_NOSIGNAL, NULL, 0) = 2
156 sendto(4, "tls\0", 4, MSG_NOSIGNAL, NULL, 0) = 4
157 sendmsg(4, {msg_name=NULL, msg_namelen=0, msg_iov=NULL, msg_iovlen=0, msg_control=[{cmsg_len=20, cmsg_level=SOL_SOCKET, cmsg_type=SCM_RIGHTS, cmsg_data=[3]}], msg_controllen=24, msg_flags=0}, 0) = 0
158 close(3) = 0
159 rt_sigtimedwait([HUP INT TERM CHLD], NULL, {tv_sec=0, tv_nsec=0}, 8) = -1 EAGAIN (Resource temporarily unavailable)
160 select(5, [4], NULL, NULL, {tv_sec=4, tv_usec=994374}(6589) [DEBUG][1] [TLS sandbox] (client) Privileges successfully dropped using chroot+setgid+setuid.
161 (6589) [DEBUG][1] [TLS sandbox] (client) Privileges successfully dropped.
162 ^Cstrace: Process 6587 detached
163 <detached ...>
164 root@linux:/home/vagrant#
165 root@linux:/home/vagrant# strace /vagrant/openbsm/bin/auditdistd/auditdistd -c /vagrant/auditdistd-sender.conf -F -dddddddddddd
166 execve("/vagrant/openbsm/bin/auditdistd/auditdistd", ["/vagrant/openbsm/bin/auditdistd/"..., "-c", "/vagrant/auditdistd-sender.conf", "-F", "-dddddddddddd"], [/* 17 vars */]) = 0
167 brk(NULL) = 0x5580695a4000
168 access("/etc/ld.so.nohwcap", F_OK) = -1 ENOENT (No such file or directory)
169 mmap(NULL, 12288, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) = 0x7fc6d7597000
170 access("/etc/ld.so.preload", R_OK) = -1 ENOENT (No such file or directory)
171 open("/etc/ld.so.cache", O_RDONLY|O_CLOEXEC) = 3
172 fstat(3, {st_mode=S_IFREG|0644, st_size=21339, ...}) = 0
173 mmap(NULL, 21339, PROT_READ, MAP_PRIVATE, 3, 0) = 0x7fc6d7591000
174 close(3) = 0
175 access("/etc/ld.so.nohwcap", F_OK) = -1 ENOENT (No such file or directory)
176 open("/usr/lib/x86_64-linux-gnu/libcrypto.so.1.1", O_RDONLY|O_CLOEXEC) = 3
177 read(3, "\177ELF\2\1\1\0\0\0\0\0\0\0\0\0\3\0>\0\1\0\0\0\0\340\7\0\0\0\0\0"..., 832) = 832
178 fstat(3, {st_mode=S_IFREG|0644, st_size=2686672, ...}) = 0
179 mmap(NULL, 4795968, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) = 0x7fc6d6ee4000
180 mprotect(0x7fc6d7149000, 2093056, PROT_NONE) = 0
181 mmap(0x7fc6d7348000, 180224, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0x264000) = 0x7fc6d7348000
182 mmap(0x7fc6d7374000, 11840, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x7fc6d7374000
183 close(3) = 0
184 access("/etc/ld.so.nohwcap", F_OK) = -1 ENOENT (No such file or directory)
185 open("/usr/lib/x86_64-linux-gnu/libssl.so.1.1", O_RDONLY|O_CLOEXEC) = 3
186 read(3, "\177ELF\2\1\1\0\0\0\0\0\0\0\0\0\3\0>\0\1\0\0\0\360\211\1\0\0\0\0\0"..., 832) = 832
187 fstat(3, {st_mode=S_IFREG|0644, st_size=442920, ...}) = 0
188 mmap(NULL, 2538392, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) = 0x7fc6d6c78000
189 mprotect(0x7fc6d6cda000, 2097152, PROT_NONE) = 0
190 mmap(0x7fc6d6eda000, 40960, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0x62000) = 0x7fc6d6eda000
191 close(3) = 0
192 access("/etc/ld.so.nohwcap", F_OK) = -1 ENOENT (No such file or directory)
193 open("/lib/x86_64-linux-gnu/libpthread.so.0", O_RDONLY|O_CLOEXEC) = 3
194 read(3, "\177ELF\2\1\1\0\0\0\0\0\0\0\0\0\3\0>\0\1\0\0\0Pa\0\0\0\0\0\0"..., 832) = 832
195 fstat(3, {st_mode=S_IFREG|0755, st_size=135440, ...}) = 0
196 mmap(NULL, 2212936, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) = 0x7fc6d6a5b000
197 mprotect(0x7fc6d6a73000, 2093056, PROT_NONE) = 0
198 mmap(0x7fc6d6c72000, 8192, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0x17000) = 0x7fc6d6c72000
199 mmap(0x7fc6d6c74000, 13384, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x7fc6d6c74000
200 close(3) = 0
201 access("/etc/ld.so.nohwcap", F_OK) = -1 ENOENT (No such file or directory)
202 open("/lib/x86_64-linux-gnu/libdl.so.2", O_RDONLY|O_CLOEXEC) = 3
203 read(3, "\177ELF\2\1\1\0\0\0\0\0\0\0\0\0\3\0>\0\1\0\0\0\200\r\0\0\0\0\0\0"..., 832) = 832
204 fstat(3, {st_mode=S_IFREG|0644, st_size=14640, ...}) = 0
205 mmap(NULL, 2109680, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) = 0x7fc6d6857000
206 mprotect(0x7fc6d685a000, 2093056, PROT_NONE) = 0
207 mmap(0x7fc6d6a59000, 8192, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0x2000) = 0x7fc6d6a59000
208 close(3) = 0
209 access("/etc/ld.so.nohwcap", F_OK) = -1 ENOENT (No such file or directory)
210 open("/lib/x86_64-linux-gnu/libc.so.6", O_RDONLY|O_CLOEXEC) = 3
211 read(3, "\177ELF\2\1\1\3\0\0\0\0\0\0\0\0\3\0>\0\1\0\0\0\320\3\2\0\0\0\0\0"..., 832) = 832
212 fstat(3, {st_mode=S_IFREG|0755, st_size=1689360, ...}) = 0
213 mmap(NULL, 3795360, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) = 0x7fc6d64b8000
214 mprotect(0x7fc6d664d000, 2097152, PROT_NONE) = 0
215 mmap(0x7fc6d684d000, 24576, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0x195000) = 0x7fc6d684d000
216 mmap(0x7fc6d6853000, 14752, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x7fc6d6853000
217 close(3) = 0
218 mmap(NULL, 8192, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) = 0x7fc6d758f000
219 arch_prctl(ARCH_SET_FS, 0x7fc6d7590500) = 0
220 mprotect(0x7fc6d684d000, 16384, PROT_READ) = 0
221 mprotect(0x7fc6d6a59000, 4096, PROT_READ) = 0
222 mprotect(0x7fc6d6c72000, 4096, PROT_READ) = 0
223 mprotect(0x7fc6d7348000, 122880, PROT_READ) = 0
224 mprotect(0x7fc6d6eda000, 16384, PROT_READ) = 0
225 mprotect(0x5580686ea000, 4096, PROT_READ) = 0
226 mprotect(0x7fc6d759a000, 4096, PROT_READ) = 0
227 munmap(0x7fc6d7591000, 21339) = 0
228 set_tid_address(0x7fc6d75907d0) = 6593
229 set_robust_list(0x7fc6d75907e0, 24) = 0
230 rt_sigaction(SIGRTMIN, {sa_handler=0x7fc6d6a60bd0, sa_mask=[], sa_flags=SA_RESTORER|SA_SIGINFO, sa_restorer=0x7fc6d6a6c0c0}, NULL, 8) = 0
231 rt_sigaction(SIGRT_1, {sa_handler=0x7fc6d6a60c60, sa_mask=[], sa_flags=SA_RESTORER|SA_RESTART|SA_SIGINFO, sa_restorer=0x7fc6d6a6c0c0}, NULL, 8) = 0
232 rt_sigprocmask(SIG_UNBLOCK, [RTMIN RT_1], NULL, 8) = 0
233 getrlimit(RLIMIT_STACK, {rlim_cur=8192*1024, rlim_max=RLIM64_INFINITY}) = 0
234 brk(NULL) = 0x5580695a4000
235 brk(0x5580695c5000) = 0x5580695c5000
236 open("/vagrant/auditdistd-sender.conf", O_RDONLY) = 3
237 ioctl(3, TCGETS, 0x7ffe5bd55b90) = -1 ENOTTY (Inappropriate ioctl for device)
238 ioctl(3, TCGETS, 0x7ffe5bd55bb0) = -1 ENOTTY (Inappropriate ioctl for device)
239 fstat(3, {st_mode=S_IFREG|0644, st_size=268, ...}) = 0
240 read(3, "sender {\n\thost \"freebsd\" {\n\t\trem"..., 8192) = 268
241 read(3, "", 4096) = 0
242 read(3, "", 8192) = 0
243 ioctl(3, TCGETS, 0x7ffe5bd552d0) = -1 ENOTTY (Inappropriate ioctl for device)
244 close(3) = 0
245 uname({sysname="Linux", nodename="linux", ...}) = 0
246 getpid() = 6593
247 fstat(1, {st_mode=S_IFCHR|0620, st_rdev=makedev(136, 0), ...}) = 0
248 write(1, "(6593) [DEBUG][2] Configuration:"..., 33(6593) [DEBUG][2] Configuration:
249 ) = 33
250 getpid() = 6593
251 write(1, "(6593) [DEBUG][2] Global:\n", 28(6593) [DEBUG][2] Global:
252 ) = 28
253 getpid() = 6593
254 write(1, "(6593) [DEBUG][2] pidfile: /"..., 55(6593) [DEBUG][2] pidfile: /var/run/auditdistd.pid
255 ) = 55
256 getpid() = 6593
257 write(1, "(6593) [DEBUG][2] timeout: 2"..., 34(6593) [DEBUG][2] timeout: 20
258 ) = 34
259 getpid() = 6593
260 write(1, "(6593) [DEBUG][2] Sender only,"..., 48(6593) [DEBUG][2] Sender only, not listening.
261 ) = 48
262 getpid() = 6593
263 write(1, "(6593) [DEBUG][2] Hosts:\n", 27(6593) [DEBUG][2] Hosts:
264 ) = 27
265 getpid() = 6593
266 write(1, "(6593) [DEBUG][2] name: free"..., 36(6593) [DEBUG][2] name: freebsd
267 ) = 36
268 getpid() = 6593
269 write(1, "(6593) [DEBUG][2] role: se"..., 37(6593) [DEBUG][2] role: sender
270 ) = 37
271 getpid() = 6593
272 write(1, "(6593) [DEBUG][2] version:"..., 35(6593) [DEBUG][2] version: 0
273 ) = 35
274 getpid() = 6593
275 write(1, "(6593) [DEBUG][2] localadd"..., 36(6593) [DEBUG][2] localaddr:
276 ) = 36
277 getpid() = 6593
278 write(1, "(6593) [DEBUG][2] remotead"..., 56(6593) [DEBUG][2] remoteaddr: tls://192.168.10.11
279 ) = 56
280 getpid() = 6593
281 write(1, "(6593) [DEBUG][2] remote: "..., 38(6593) [DEBUG][2] remote: (nil)
282 ) = 38
283 getpid() = 6593
284 write(1, "(6593) [DEBUG][2] director"..., 61(6593) [DEBUG][2] directory: /var/log/audit/auditdistd
285 ) = 61
286 getpid() = 6593
287 write(1, "(6593) [DEBUG][2] compress"..., 39(6593) [DEBUG][2] compression: 0
288 ) = 39
289 getpid() = 6593
290 write(1, "(6593) [DEBUG][2] checksum"..., 36(6593) [DEBUG][2] checksum: 0
291 ) = 36
292 getpid() = 6593
293 write(1, "(6593) [DEBUG][2] pid: 0\n", 31(6593) [DEBUG][2] pid: 0
294 ) = 31
295 getpid() = 6593
296 write(1, "(6593) [DEBUG][2] conn: (n"..., 36(6593) [DEBUG][2] conn: (nil)
297 ) = 36
298 rt_sigaction(SIGHUP, {sa_handler=SIG_DFL, sa_mask=[HUP], sa_flags=SA_RESTORER|SA_RESTART, sa_restorer=0x7fc6d64eb030}, {sa_handler=SIG_DFL, sa_mask=[], sa_flags=0}, 8) = 0
299 rt_sigaction(SIGINT, {sa_handler=SIG_DFL, sa_mask=[INT], sa_flags=SA_RESTORER|SA_RESTART, sa_restorer=0x7fc6d64eb030}, {sa_handler=SIG_DFL, sa_mask=[], sa_flags=0}, 8) = 0
300 rt_sigaction(SIGTERM, {sa_handler=SIG_DFL, sa_mask=[TERM], sa_flags=SA_RESTORER|SA_RESTART, sa_restorer=0x7fc6d64eb030}, {sa_handler=SIG_DFL, sa_mask=[], sa_flags=0}, 8) = 0
301 rt_sigaction(SIGCHLD, {sa_handler=0x5580684ce160, sa_mask=[CHLD], sa_flags=SA_RESTORER|SA_RESTART, sa_restorer=0x7fc6d64eb030}, {sa_handler=SIG_DFL, sa_mask=[], sa_flags=0}, 8) = 0
302 rt_sigprocmask(SIG_SETMASK, [HUP INT TERM CHLD], NULL, 8) = 0
303 socketpair(AF_UNIX, SOCK_STREAM, 0, [3, 4]) = 0
304 clone(child_stack=NULL, flags=CLONE_CHILD_CLEARTID|CLONE_CHILD_SETTID|SIGCHLD, child_tidptr=0x7fc6d75907d0) = 6594
305 close(3) = 0
306 getpid() = 6593
307 write(1, "(6593) [INFO] Started successful"..., 36(6593) [INFO] Started successfully.
308 ) = 36
309 rt_sigtimedwait([HUP INT TERM CHLD], NULL, {tv_sec=0, tv_nsec=0}, 8) = -1 EAGAIN (Resource temporarily unavailable)
310 select(5, [4], NULL, NULL, {tv_sec=5, tv_usec=0}(6594) [DEBUG][1] [freebsd] (sender) Privileges successfully dropped using chroot+setgid+setuid.
311 (6594) [INFO] [freebsd] (sender) Privileges successfully dropped.
312 ) = 1 (in [4], left {tv_sec=4, tv_usec=995267})
313 rt_sigtimedwait([HUP INT TERM CHLD], NULL, {tv_sec=0, tv_nsec=0}, 8) = -1 EAGAIN (Resource temporarily unavailable)
314 recvfrom(4, "\1\0", 2, MSG_WAITALL, NULL, NULL) = 2
315 socketpair(AF_UNIX, SOCK_STREAM, 0, [3, 5]) = 0
316 clone(child_stack=NULL, flags=CLONE_CHILD_CLEARTID|CLONE_CHILD_SETTID|SIGCHLD, child_tidptr=0x7fc6d75907d0) = 6595
317 close(5) = 0
318 sendto(4, "\0\0", 2, MSG_NOSIGNAL, NULL, 0) = 2
319 sendto(4, "tls\0", 4, MSG_NOSIGNAL, NULL, 0) = 4
320 sendmsg(4, {msg_name=NULL, msg_namelen=0, msg_iov=NULL, msg_iovlen=0, msg_control=[{cmsg_len=20, cmsg_level=SOL_SOCKET, cmsg_type=SCM_RIGHTS, cmsg_data=[3]}], msg_controllen=24, msg_flags=0}, 0) = 0
321 close(3) = 0
322 rt_sigtimedwait([HUP INT TERM CHLD], NULL, {tv_sec=0, tv_nsec=0}, 8) = -1 EAGAIN (Resource temporarily unavailable)
323 select(5, [4], NULL, NULL, {tv_sec=4, tv_usec=995267}(6595) [DEBUG][1] [TLS sandbox] (client) Privileges successfully dropped using chroot+setgid+setuid.
324 (6595) [DEBUG][1] [TLS sandbox] (client) Privileges successfully dropped.
325 (6587) [INFO] Termination signal received, exiting.
326 (6587) [INFO] Terminating worker process (adhost=freebsd, role=sender, pid=6588).
327 ^Cstrace: Process 6593 detached
328 <detached ...>
329 root@linux:/home/vagrant# strace /vagrant/openbsm/bin/auditdistd/auditdistd -c /vagrant/auditdistd-sender.conf -F -dddddddddddd
330 execve("/vagrant/openbsm/bin/auditdistd/auditdistd", ["/vagrant/openbsm/bin/auditdistd/"..., "-c", "/vagrant/auditdistd-sender.conf", "-F", "-dddddddddddd"], [/* 17 vars */]) = 0
331 brk(NULL) = 0x55e167708000
332 access("/etc/ld.so.nohwcap", F_OK) = -1 ENOENT (No such file or directory)
333 mmap(NULL, 12288, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) = 0x7f84caf05000
334 access("/etc/ld.so.preload", R_OK) = -1 ENOENT (No such file or directory)
335 open("/etc/ld.so.cache", O_RDONLY|O_CLOEXEC) = 3
336 fstat(3, {st_mode=S_IFREG|0644, st_size=21339, ...}) = 0
337 mmap(NULL, 21339, PROT_READ, MAP_PRIVATE, 3, 0) = 0x7f84caeff000
338 close(3) = 0
339 access("/etc/ld.so.nohwcap", F_OK) = -1 ENOENT (No such file or directory)
340 open("/usr/lib/x86_64-linux-gnu/libcrypto.so.1.1", O_RDONLY|O_CLOEXEC) = 3
341 read(3, "\177ELF\2\1\1\0\0\0\0\0\0\0\0\0\3\0>\0\1\0\0\0\0\340\7\0\0\0\0\0"..., 832) = 832
342 fstat(3, {st_mode=S_IFREG|0644, st_size=2686672, ...}) = 0
343 mmap(NULL, 4795968, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) = 0x7f84ca852000
344 mprotect(0x7f84caab7000, 2093056, PROT_NONE) = 0
345 mmap(0x7f84cacb6000, 180224, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0x264000) = 0x7f84cacb6000
346 mmap(0x7f84cace2000, 11840, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x7f84cace2000
347 close(3) = 0
348 access("/etc/ld.so.nohwcap", F_OK) = -1 ENOENT (No such file or directory)
349 open("/usr/lib/x86_64-linux-gnu/libssl.so.1.1", O_RDONLY|O_CLOEXEC) = 3
350 read(3, "\177ELF\2\1\1\0\0\0\0\0\0\0\0\0\3\0>\0\1\0\0\0\360\211\1\0\0\0\0\0"..., 832) = 832
351 fstat(3, {st_mode=S_IFREG|0644, st_size=442920, ...}) = 0
352 mmap(NULL, 2538392, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) = 0x7f84ca5e6000
353 mprotect(0x7f84ca648000, 2097152, PROT_NONE) = 0
354 mmap(0x7f84ca848000, 40960, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0x62000) = 0x7f84ca848000
355 close(3) = 0
356 access("/etc/ld.so.nohwcap", F_OK) = -1 ENOENT (No such file or directory)
357 open("/lib/x86_64-linux-gnu/libpthread.so.0", O_RDONLY|O_CLOEXEC) = 3
358 read(3, "\177ELF\2\1\1\0\0\0\0\0\0\0\0\0\3\0>\0\1\0\0\0Pa\0\0\0\0\0\0"..., 832) = 832
359 fstat(3, {st_mode=S_IFREG|0755, st_size=135440, ...}) = 0
360 mmap(NULL, 2212936, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) = 0x7f84ca3c9000
361 mprotect(0x7f84ca3e1000, 2093056, PROT_NONE) = 0
362 mmap(0x7f84ca5e0000, 8192, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0x17000) = 0x7f84ca5e0000
363 mmap(0x7f84ca5e2000, 13384, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x7f84ca5e2000
364 close(3) = 0
365 access("/etc/ld.so.nohwcap", F_OK) = -1 ENOENT (No such file or directory)
366 open("/lib/x86_64-linux-gnu/libdl.so.2", O_RDONLY|O_CLOEXEC) = 3
367 read(3, "\177ELF\2\1\1\0\0\0\0\0\0\0\0\0\3\0>\0\1\0\0\0\200\r\0\0\0\0\0\0"..., 832) = 832
368 fstat(3, {st_mode=S_IFREG|0644, st_size=14640, ...}) = 0
369 mmap(NULL, 2109680, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) = 0x7f84ca1c5000
370 mprotect(0x7f84ca1c8000, 2093056, PROT_NONE) = 0
371 mmap(0x7f84ca3c7000, 8192, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0x2000) = 0x7f84ca3c7000
372 close(3) = 0
373 access("/etc/ld.so.nohwcap", F_OK) = -1 ENOENT (No such file or directory)
374 open("/lib/x86_64-linux-gnu/libc.so.6", O_RDONLY|O_CLOEXEC) = 3
375 read(3, "\177ELF\2\1\1\3\0\0\0\0\0\0\0\0\3\0>\0\1\0\0\0\320\3\2\0\0\0\0\0"..., 832) = 832
376 fstat(3, {st_mode=S_IFREG|0755, st_size=1689360, ...}) = 0
377 mmap(NULL, 3795360, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) = 0x7f84c9e26000
378 mprotect(0x7f84c9fbb000, 2097152, PROT_NONE) = 0
379 mmap(0x7f84ca1bb000, 24576, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0x195000) = 0x7f84ca1bb000
380 mmap(0x7f84ca1c1000, 14752, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x7f84ca1c1000
381 close(3) = 0
382 mmap(NULL, 8192, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) = 0x7f84caefd000
383 arch_prctl(ARCH_SET_FS, 0x7f84caefe500) = 0
384 mprotect(0x7f84ca1bb000, 16384, PROT_READ) = 0
385 mprotect(0x7f84ca3c7000, 4096, PROT_READ) = 0
386 mprotect(0x7f84ca5e0000, 4096, PROT_READ) = 0
387 mprotect(0x7f84cacb6000, 122880, PROT_READ) = 0
388 mprotect(0x7f84ca848000, 16384, PROT_READ) = 0
389 mprotect(0x55e166874000, 4096, PROT_READ) = 0
390 mprotect(0x7f84caf08000, 4096, PROT_READ) = 0
391 munmap(0x7f84caeff000, 21339) = 0
392 set_tid_address(0x7f84caefe7d0) = 6598
393 set_robust_list(0x7f84caefe7e0, 24) = 0
394 rt_sigaction(SIGRTMIN, {sa_handler=0x7f84ca3cebd0, sa_mask=[], sa_flags=SA_RESTORER|SA_SIGINFO, sa_restorer=0x7f84ca3da0c0}, NULL, 8) = 0
395 rt_sigaction(SIGRT_1, {sa_handler=0x7f84ca3cec60, sa_mask=[], sa_flags=SA_RESTORER|SA_RESTART|SA_SIGINFO, sa_restorer=0x7f84ca3da0c0}, NULL, 8) = 0
396 rt_sigprocmask(SIG_UNBLOCK, [RTMIN RT_1], NULL, 8) = 0
397 getrlimit(RLIMIT_STACK, {rlim_cur=8192*1024, rlim_max=RLIM64_INFINITY}) = 0
398 brk(NULL) = 0x55e167708000
399 brk(0x55e167729000) = 0x55e167729000
400 open("/vagrant/auditdistd-sender.conf", O_RDONLY) = 3
401 ioctl(3, TCGETS, 0x7ffdb5500ae0) = -1 ENOTTY (Inappropriate ioctl for device)
402 ioctl(3, TCGETS, 0x7ffdb5500b00) = -1 ENOTTY (Inappropriate ioctl for device)
403 fstat(3, {st_mode=S_IFREG|0644, st_size=268, ...}) = 0
404 read(3, "sender {\n\thost \"freebsd\" {\n\t\trem"..., 8192) = 268
405 read(3, "", 4096) = 0
406 read(3, "", 8192) = 0
407 ioctl(3, TCGETS, 0x7ffdb5500220) = -1 ENOTTY (Inappropriate ioctl for device)
408 close(3) = 0
409 uname({sysname="Linux", nodename="linux", ...}) = 0
410 getpid() = 6598
411 fstat(1, {st_mode=S_IFCHR|0620, st_rdev=makedev(136, 0), ...}) = 0
412 write(1, "(6598) [DEBUG][2] Configuration:"..., 33(6598) [DEBUG][2] Configuration:
413 ) = 33
414 getpid() = 6598
415 write(1, "(6598) [DEBUG][2] Global:\n", 28(6598) [DEBUG][2] Global:
416 ) = 28
417 getpid() = 6598
418 write(1, "(6598) [DEBUG][2] pidfile: /"..., 55(6598) [DEBUG][2] pidfile: /var/run/auditdistd.pid
419 ) = 55
420 getpid() = 6598
421 write(1, "(6598) [DEBUG][2] timeout: 2"..., 34(6598) [DEBUG][2] timeout: 20
422 ) = 34
423 getpid() = 6598
424 write(1, "(6598) [DEBUG][2] Sender only,"..., 48(6598) [DEBUG][2] Sender only, not listening.
425 ) = 48
426 getpid() = 6598
427 write(1, "(6598) [DEBUG][2] Hosts:\n", 27(6598) [DEBUG][2] Hosts:
428 ) = 27
429 getpid() = 6598
430 write(1, "(6598) [DEBUG][2] name: free"..., 36(6598) [DEBUG][2] name: freebsd
431 ) = 36
432 getpid() = 6598
433 write(1, "(6598) [DEBUG][2] role: se"..., 37(6598) [DEBUG][2] role: sender
434 ) = 37
435 getpid() = 6598
436 write(1, "(6598) [DEBUG][2] version:"..., 35(6598) [DEBUG][2] version: 0
437 ) = 35
438 getpid() = 6598
439 write(1, "(6598) [DEBUG][2] localadd"..., 36(6598) [DEBUG][2] localaddr:
440 ) = 36
441 getpid() = 6598
442 write(1, "(6598) [DEBUG][2] remotead"..., 56(6598) [DEBUG][2] remoteaddr: tls://192.168.10.11
443 ) = 56
444 getpid() = 6598
445 write(1, "(6598) [DEBUG][2] remote: "..., 38(6598) [DEBUG][2] remote: (nil)
446 ) = 38
447 getpid() = 6598
448 write(1, "(6598) [DEBUG][2] director"..., 61(6598) [DEBUG][2] directory: /var/log/audit/auditdistd
449 ) = 61
450 getpid() = 6598
451 write(1, "(6598) [DEBUG][2] compress"..., 39(6598) [DEBUG][2] compression: 0
452 ) = 39
453 getpid() = 6598
454 write(1, "(6598) [DEBUG][2] checksum"..., 36(6598) [DEBUG][2] checksum: 0
455 ) = 36
456 getpid() = 6598
457 write(1, "(6598) [DEBUG][2] pid: 0\n", 31(6598) [DEBUG][2] pid: 0
458 ) = 31
459 getpid() = 6598
460 write(1, "(6598) [DEBUG][2] conn: (n"..., 36(6598) [DEBUG][2] conn: (nil)
461 ) = 36
462 rt_sigaction(SIGHUP, {sa_handler=SIG_DFL, sa_mask=[HUP], sa_flags=SA_RESTORER|SA_RESTART, sa_restorer=0x7f84c9e59030}, {sa_handler=SIG_DFL, sa_mask=[], sa_flags=0}, 8) = 0
463 rt_sigaction(SIGINT, {sa_handler=SIG_DFL, sa_mask=[INT], sa_flags=SA_RESTORER|SA_RESTART, sa_restorer=0x7f84c9e59030}, {sa_handler=SIG_DFL, sa_mask=[], sa_flags=0}, 8) = 0
464 rt_sigaction(SIGTERM, {sa_handler=SIG_DFL, sa_mask=[TERM], sa_flags=SA_RESTORER|SA_RESTART, sa_restorer=0x7f84c9e59030}, {sa_handler=SIG_DFL, sa_mask=[], sa_flags=0}, 8) = 0
465 rt_sigaction(SIGCHLD, {sa_handler=0x55e166658160, sa_mask=[CHLD], sa_flags=SA_RESTORER|SA_RESTART, sa_restorer=0x7f84c9e59030}, {sa_handler=SIG_DFL, sa_mask=[], sa_flags=0}, 8) = 0
466 rt_sigprocmask(SIG_SETMASK, [HUP INT TERM CHLD], NULL, 8) = 0
467 socketpair(AF_UNIX, SOCK_STREAM, 0, [3, 4]) = 0
468 clone(child_stack=NULL, flags=CLONE_CHILD_CLEARTID|CLONE_CHILD_SETTID|SIGCHLD, child_tidptr=0x7f84caefe7d0) = 6599
469 close(3) = 0
470 getpid() = 6598
471 write(1, "(6598) [INFO] Started successful"..., 36(6598) [INFO] Started successfully.
472 ) = 36
473 rt_sigtimedwait([HUP INT TERM CHLD], NULL, {tv_sec=0, tv_nsec=0}, 8) = -1 EAGAIN (Resource temporarily unavailable)
474 select(5, [4], NULL, NULL, {tv_sec=5, tv_usec=0}(6599) [DEBUG][1] [freebsd] (sender) Privileges successfully dropped using chroot+setgid+setuid.
475 (6599) [INFO] [freebsd] (sender) Privileges successfully dropped.
476 ) = 1 (in [4], left {tv_sec=4, tv_usec=995979})
477 rt_sigtimedwait([HUP INT TERM CHLD], NULL, {tv_sec=0, tv_nsec=0}, 8) = -1 EAGAIN (Resource temporarily unavailable)
478 recvfrom(4, "\1\0", 2, MSG_WAITALL, NULL, NULL) = 2
479 socketpair(AF_UNIX, SOCK_STREAM, 0, [3, 5]) = 0
480 clone(child_stack=NULL, flags=CLONE_CHILD_CLEARTID|CLONE_CHILD_SETTID|SIGCHLD, child_tidptr=0x7f84caefe7d0) = 6600
481 close(5) = 0
482 sendto(4, "\0\0", 2, MSG_NOSIGNAL, NULL, 0) = 2
483 sendto(4, "tls\0", 4, MSG_NOSIGNAL, NULL, 0) = 4
484 sendmsg(4, {msg_name=NULL, msg_namelen=0, msg_iov=NULL, msg_iovlen=0, msg_control=[{cmsg_len=20, cmsg_level=SOL_SOCKET, cmsg_type=SCM_RIGHTS, cmsg_data=[3]}], msg_controllen=24, msg_flags=0}, 0) = 0
485 close(3) = 0
486 rt_sigtimedwait([HUP INT TERM CHLD], NULL, {tv_sec=0, tv_nsec=0}, 8) = -1 EAGAIN (Resource temporarily unavailable)
487 select(5, [4], NULL, NULL, {tv_sec=4, tv_usec=995979}(6600) [DEBUG][1] [TLS sandbox] (client) Privileges successfully dropped using chroot+setgid+setuid.
488 (6600) [DEBUG][1] [TLS sandbox] (client) Privileges successfully dropped.
489 (6593) [INFO] Termination signal received, exiting.
490 (6593) [INFO] Terminating worker process (adhost=freebsd, role=sender, pid=6594).
491 ) = 0 (Timeout)
492 rt_sigtimedwait([HUP INT TERM CHLD], NULL, {tv_sec=0, tv_nsec=0}, 8) = 17 (SIGCHLD)
493 wait4(-1, [{WIFSIGNALED(s) && WTERMSIG(s) == SIGPIPE}], WNOHANG, NULL) = 6600
494 getpid() = 6598
495 write(2, "(6598) ", 7(6598) ) = 7
496 write(2, "[ERROR]", 7[ERROR]) = 7
497 write(2, " ", 1 ) = 1
498 write(2, "Sandbox process killed (pid=6600"..., 45Sandbox process killed (pid=6600, signal=13).) = 45
499 write(2, "\n", 1
500 ) = 1
501 wait4(-1, 0x7ffdb5500b6c, WNOHANG, NULL) = 0
502 select(5, [4], NULL, NULL, {tv_sec=0, tv_usec=0}) = 0 (Timeout)
503 rt_sigtimedwait([HUP INT TERM CHLD], NULL, {tv_sec=0, tv_nsec=0}, 8) = -1 EAGAIN (Resource temporarily unavailable)
504 ^C(6598) [INFO] Termination signal received, exiting.
505 (6598) [INFO] Terminating worker process (adhost=freebsd, role=sender, pid=6599).
506 strace: Process 6598 detached
Attached Files
To refer to attachments on a page, use attachment:filename, as shown below in the list of files. Do NOT use the URL of the [get] link, since this is subject to change and can break easily.You are not allowed to attach a file to this page.