On Wed, Nov 06, 2019 at 04:29:16PM +0100, Otto Moerbeek wrote:

> On Wed, Nov 06, 2019 at 04:16:10PM +0100, Felix Maschek wrote:
> 
> > Hi,
> > 
> > unwind is running and does talk to 9.9.9.9 (checked with DNS Leak Test -
> > bash.ws <https://bash.ws/dnsleak>):
> > 
> >     vatrox$ ps -A | grep unwind
> >         42668 ??  Ip       0:00.01 /sbin/unwind
> >         42070 ??  IpU      0:03.27 unwind: resolver (unwind)
> >         43163 ??  Ip       0:00.09 unwind: frontend (unwind)
> >         59857 ??  Ip       0:00.01 unwind: captive portal (unwind)
> >         72389 p1  R+/2     0:00.00 grep unwind
> > 
> > The socket is missing:
> > 
> >     vatrox$ ls /var/run
> >         ConsoleKit  cron.sock   dev.db      ld.so.hints rc.d       
> > syslog.pid  utmp
> >         apmdev      dbus        dmesg.boot  ntpd.sock smtpd.sock  user
> 
> Strange. Tge code is structured in such a way that failure to cerate the
> socket is fatal.
> 
> Once thing to try:
> 
> run 
>       ktrace -i rcctl start unwind 
> 
> and then
>         rcctl stop unwind
>       kdump > /tmp/d
> 
> amd inspect /tmp/d to find out what happended to the socket.

Hmm that does not work.

stop unwind and do:

ktrace -i /sbin/unwind
ktrace -C
kdump > /tmp/d

Search for unwind.sock in /tmp/d

        -Otto

Reply via email to