File:Strace daniel.aliases.peterjin.org.txt

Strace_daniel.aliases.peterjin.org.txt(file size: 2 KB, MIME type: text/plain)

Warning: This file type may contain malicious code. By executing it, your system may be compromised.

apps-vm5:~$ sudo strace -p 864367
strace: Process 864367 attached
epoll_wait(13, [{EPOLLIN, {u32=20, u64=20}}], 1024, 18369) = 1
accept4(20, NULL, NULL, SOCK_CLOEXEC|SOCK_NONBLOCK) = 21
getsockname(21, {sa_family=AF_INET6, sin6_port=htons(443), sin6_flowinfo=htonl(0), inet_pton(AF_INET6, "2602:806:a003:40e::3000:2451", &sin6_addr), sin6_scope_id=0}, [128->28]) = 0
accept4(20, NULL, NULL, SOCK_CLOEXEC|SOCK_NONBLOCK) = -1 EAGAIN (Resource temporarily unavailable)
epoll_ctl(13, EPOLL_CTL_ADD, 21, {EPOLLIN, {u32=21, u64=21}}) = 0
epoll_wait(13, [{EPOLLIN, {u32=21, u64=21}}], 1024, 0) = 1
read(21, "\26\3\1"... /* TLS handshake */, 65536) = 517
getpid()                                = 1
getpid()                                = 1
getpid()                                = 1
getpid()                                = 1
getpid()                                = 1
getpid()                                = 1
write(21, "\26\3\3"... /* TLS handshake */, 2801) = 2801
epoll_ctl(13, EPOLL_CTL_MOD, 21, {EPOLLIN, {u32=21, u64=21}}) = 0
epoll_wait(13, [], 1024, 0)             = 0
epoll_wait(13, [{EPOLLIN, {u32=21, u64=21}}], 1024, 16742) = 1
read(21, "\24\3\3"... /* TLS handshake */, 65536) = 64
getpid()                                = 1
getpid()                                = 1
getpid()                                = 1
getpid()                                = 1
write(21, "\27\3\3"... /* TLS handshake */, 542) = 542
epoll_ctl(13, EPOLL_CTL_MOD, 21, {EPOLLIN, {u32=21, u64=21}}) = 0
epoll_wait(13, [{EPOLLIN, {u32=21, u64=21}}], 1024, 0) = 1
read(21, "\27\3\3"... /* Encrypted HTTP request */, 65536) = 745
getpeername(21, {sa_family=AF_INET6, sin6_port=htons(43212), sin6_flowinfo=htonl(0), inet_pton(AF_INET6, "2602:806:a000:4001::10c", &sin6_addr), sin6_scope_id=0}, [128->28]) = 0
getsockname(21, {sa_family=AF_INET6, sin6_port=htons(443), sin6_flowinfo=htonl(0), inet_pton(AF_INET6, "2602:806:a003:40e::3000:2451", &sin6_addr), sin6_scope_id=0}, [128->28]) = 0
write(1, "2602:806:a000:4001::10c (TLS_CHA"..., 291) = 291
writev(21, [{iov_base="\27\3\3"... /* Encrypted HTTP response header */, iov_len=2801}, {iov_base=""... /* Encrypted HTTP response data */, iov_len=2961}], 2) = 5762
epoll_ctl(13, EPOLL_CTL_MOD, 21, {EPOLLIN, {u32=21, u64=21}}) = 0
epoll_wait(13, [], 1024, 0)             = 0
epoll_wait(13, [], 1024, 971)           = 0
epoll_wait(13, [], 1024, 0)             = 0
epoll_wait(13, ^Cstrace: Process 864367 detached
 <detached ...>

File history

Click on a date/time to view the file as it appeared at that time.

Date/TimeDimensionsUserComment
current00:49, 9 April 2021 (2 KB)Admin (talk | contribs)

There are no pages that use this file.