On Wed, Nov 06, 2019 at 04:29:16PM +0100, Otto Moerbeek wrote: > On Wed, Nov 06, 2019 at 04:16:10PM +0100, Felix Maschek wrote: > > > Hi, > > > > unwind is running and does talk to 9.9.9.9 (checked with DNS Leak Test - > > bash.ws <https://bash.ws/dnsleak>): > > > > vatrox$ ps -A | grep unwind > > 42668 ?? Ip 0:00.01 /sbin/unwind > > 42070 ?? IpU 0:03.27 unwind: resolver (unwind) > > 43163 ?? Ip 0:00.09 unwind: frontend (unwind) > > 59857 ?? Ip 0:00.01 unwind: captive portal (unwind) > > 72389 p1 R+/2 0:00.00 grep unwind > > > > The socket is missing: > > > > vatrox$ ls /var/run > > ConsoleKit cron.sock dev.db ld.so.hints rc.d > > syslog.pid utmp > > apmdev dbus dmesg.boot ntpd.sock smtpd.sock user > > Strange. Tge code is structured in such a way that failure to cerate the > socket is fatal. > > Once thing to try: > > run > ktrace -i rcctl start unwind > > and then > rcctl stop unwind > kdump > /tmp/d > > amd inspect /tmp/d to find out what happended to the socket.
Hmm that does not work. stop unwind and do: ktrace -i /sbin/unwind ktrace -C kdump > /tmp/d Search for unwind.sock in /tmp/d -Otto