Skip to content

Instantly share code, notes, and snippets.

Created February 26, 2018 20:49
Show Gist options
  • Star 0 You must be signed in to star a gist
  • Fork 0 You must be signed in to fork a gist
  • Save anonymous/8aabf95f7dc4bf582eecfc67d14bd2d2 to your computer and use it in GitHub Desktop.
Save anonymous/8aabf95f7dc4bf582eecfc67d14bd2d2 to your computer and use it in GitHub Desktop.
getpid() = 10245
close(255) = 0
rt_sigprocmask(SIG_SETMASK, [], NULL, 8) = 0
rt_sigaction(SIGTSTP, {sa_handler=SIG_DFL, sa_mask=[], sa_flags=SA_RESTORER, sa_restorer=0x7a48b0ca82d0}, {sa_handler=SIG_DFL, sa_mask=[], sa_flags=SA_RESTORER, sa_restorer=0x7a48b0ca82d0}, 8) = 0
rt_sigaction(SIGTTIN, {sa_handler=SIG_DFL, sa_mask=[], sa_flags=SA_RESTORER, sa_restorer=0x7a48b0ca82d0}, {sa_handler=SIG_DFL, sa_mask=[], sa_flags=SA_RESTORER, sa_restorer=0x7a48b0ca82d0}, 8) = 0
rt_sigaction(SIGTTOU, {sa_handler=SIG_DFL, sa_mask=[], sa_flags=SA_RESTORER, sa_restorer=0x7a48b0ca82d0}, {sa_handler=SIG_DFL, sa_mask=[], sa_flags=SA_RESTORER, sa_restorer=0x7a48b0ca82d0}, 8) = 0
rt_sigaction(SIGHUP, {sa_handler=SIG_DFL, sa_mask=[], sa_flags=SA_RESTORER, sa_restorer=0x7a48b0ca82d0}, NULL, 8) = 0
rt_sigaction(SIGILL, {sa_handler=SIG_DFL, sa_mask=[], sa_flags=SA_RESTORER, sa_restorer=0x7a48b0ca82d0}, NULL, 8) = 0
rt_sigaction(SIGTRAP, {sa_handler=SIG_DFL, sa_mask=[], sa_flags=SA_RESTORER, sa_restorer=0x7a48b0ca82d0}, NULL, 8) = 0
rt_sigaction(SIGABRT, {sa_handler=SIG_DFL, sa_mask=[], sa_flags=SA_RESTORER, sa_restorer=0x7a48b0ca82d0}, NULL, 8) = 0
rt_sigaction(SIGFPE, {sa_handler=SIG_DFL, sa_mask=[], sa_flags=SA_RESTORER, sa_restorer=0x7a48b0ca82d0}, NULL, 8) = 0
rt_sigaction(SIGBUS, {sa_handler=SIG_DFL, sa_mask=[], sa_flags=SA_RESTORER, sa_restorer=0x7a48b0ca82d0}, NULL, 8) = 0
rt_sigaction(SIGSEGV, {sa_handler=SIG_DFL, sa_mask=[], sa_flags=SA_RESTORER, sa_restorer=0x7a48b0ca82d0}, NULL, 8) = 0
rt_sigaction(SIGSYS, {sa_handler=SIG_DFL, sa_mask=[], sa_flags=SA_RESTORER, sa_restorer=0x7a48b0ca82d0}, NULL, 8) = 0
rt_sigaction(SIGPIPE, {sa_handler=SIG_DFL, sa_mask=[], sa_flags=SA_RESTORER, sa_restorer=0x7a48b0ca82d0}, NULL, 8) = 0
rt_sigaction(SIGALRM, {sa_handler=SIG_DFL, sa_mask=[], sa_flags=SA_RESTORER, sa_restorer=0x7a48b0ca82d0}, NULL, 8) = 0
rt_sigaction(SIGTERM, {sa_handler=SIG_DFL, sa_mask=[], sa_flags=SA_RESTORER, sa_restorer=0x7a48b0ca82d0}, NULL, 8) = 0
rt_sigaction(SIGXCPU, {sa_handler=SIG_DFL, sa_mask=[], sa_flags=SA_RESTORER, sa_restorer=0x7a48b0ca82d0}, NULL, 8) = 0
rt_sigaction(SIGXFSZ, {sa_handler=SIG_DFL, sa_mask=[], sa_flags=SA_RESTORER, sa_restorer=0x7a48b0ca82d0}, NULL, 8) = 0
rt_sigaction(SIGVTALRM, {sa_handler=SIG_DFL, sa_mask=[], sa_flags=SA_RESTORER, sa_restorer=0x7a48b0ca82d0}, NULL, 8) = 0
rt_sigaction(SIGUSR1, {sa_handler=SIG_DFL, sa_mask=[], sa_flags=SA_RESTORER, sa_restorer=0x7a48b0ca82d0}, NULL, 8) = 0
rt_sigaction(SIGUSR2, {sa_handler=SIG_DFL, sa_mask=[], sa_flags=SA_RESTORER, sa_restorer=0x7a48b0ca82d0}, NULL, 8) = 0
rt_sigaction(SIGINT, {sa_handler=SIG_DFL, sa_mask=[], sa_flags=SA_RESTORER, sa_restorer=0x7a48b0ca82d0}, {sa_handler=0x45b320, sa_mask=[], sa_flags=SA_RESTORER, sa_restorer=0x7a48b0ca82d0}, 8) = 0
rt_sigaction(SIGQUIT, {sa_handler=SIG_DFL, sa_mask=[], sa_flags=SA_RESTORER, sa_restorer=0x7a48b0ca82d0}, {sa_handler=SIG_IGN, sa_mask=[], sa_flags=SA_RESTORER, sa_restorer=0x7a48b0ca82d0}, 8) = 0
rt_sigaction(SIGCHLD, {sa_handler=SIG_DFL, sa_mask=[], sa_flags=SA_RESTORER|SA_RESTART, sa_restorer=0x7a48b0ca82d0}, {sa_handler=0x441ad0, sa_mask=[], sa_flags=SA_RESTORER|SA_RESTART, sa_restorer=0x7a48b0ca82d0}, 8) = 0
openat(AT_FDCWD, "/dev/null", O_WRONLY|O_CREAT|O_TRUNC, 0666) = 3
dup2(3, 1) = 1
close(3) = 0
execve("/nix/store/r8zhwq9xylxw8a823kpvqy0kfqq4g52f-nix-2.0pre5968_a6c0b773/bin/nix-store", ["nix-store", "-r", "/tmp/nixos-rebuild.n0BS6e/nix.drv!out", "--add-root", "/tmp/nixos-rebuild.n0BS6e/nix", "--indirect"], 0x71e008 /* 51 vars */) = 0
brk(NULL) = 0x622000
mmap(NULL, 8192, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) = 0x7204b3090000
access("/etc/ld-nix.so.preload", R_OK) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/r8zhwq9xylxw8a823kpvqy0kfqq4g52f-nix-2.0pre5968_a6c0b773/lib/tls/x86_64/x86_64/libbz2.so.1", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
stat("/nix/store/r8zhwq9xylxw8a823kpvqy0kfqq4g52f-nix-2.0pre5968_a6c0b773/lib/tls/x86_64/x86_64", 0x7fff8de75610) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/r8zhwq9xylxw8a823kpvqy0kfqq4g52f-nix-2.0pre5968_a6c0b773/lib/tls/x86_64/libbz2.so.1", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
stat("/nix/store/r8zhwq9xylxw8a823kpvqy0kfqq4g52f-nix-2.0pre5968_a6c0b773/lib/tls/x86_64", 0x7fff8de75610) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/r8zhwq9xylxw8a823kpvqy0kfqq4g52f-nix-2.0pre5968_a6c0b773/lib/tls/x86_64/libbz2.so.1", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
stat("/nix/store/r8zhwq9xylxw8a823kpvqy0kfqq4g52f-nix-2.0pre5968_a6c0b773/lib/tls/x86_64", 0x7fff8de75610) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/r8zhwq9xylxw8a823kpvqy0kfqq4g52f-nix-2.0pre5968_a6c0b773/lib/tls/libbz2.so.1", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
stat("/nix/store/r8zhwq9xylxw8a823kpvqy0kfqq4g52f-nix-2.0pre5968_a6c0b773/lib/tls", 0x7fff8de75610) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/r8zhwq9xylxw8a823kpvqy0kfqq4g52f-nix-2.0pre5968_a6c0b773/lib/x86_64/x86_64/libbz2.so.1", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
stat("/nix/store/r8zhwq9xylxw8a823kpvqy0kfqq4g52f-nix-2.0pre5968_a6c0b773/lib/x86_64/x86_64", 0x7fff8de75610) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/r8zhwq9xylxw8a823kpvqy0kfqq4g52f-nix-2.0pre5968_a6c0b773/lib/x86_64/libbz2.so.1", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
stat("/nix/store/r8zhwq9xylxw8a823kpvqy0kfqq4g52f-nix-2.0pre5968_a6c0b773/lib/x86_64", 0x7fff8de75610) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/r8zhwq9xylxw8a823kpvqy0kfqq4g52f-nix-2.0pre5968_a6c0b773/lib/x86_64/libbz2.so.1", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
stat("/nix/store/r8zhwq9xylxw8a823kpvqy0kfqq4g52f-nix-2.0pre5968_a6c0b773/lib/x86_64", 0x7fff8de75610) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/r8zhwq9xylxw8a823kpvqy0kfqq4g52f-nix-2.0pre5968_a6c0b773/lib/libbz2.so.1", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
stat("/nix/store/r8zhwq9xylxw8a823kpvqy0kfqq4g52f-nix-2.0pre5968_a6c0b773/lib", {st_mode=S_IFDIR|0555, st_size=8, ...}) = 0
openat(AT_FDCWD, "/nix/store/kgq1fxb7c84r212kmq4p8zcxyi7fv51r-libsodium-1.0.16/lib/tls/x86_64/x86_64/libbz2.so.1", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
stat("/nix/store/kgq1fxb7c84r212kmq4p8zcxyi7fv51r-libsodium-1.0.16/lib/tls/x86_64/x86_64", 0x7fff8de75610) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/kgq1fxb7c84r212kmq4p8zcxyi7fv51r-libsodium-1.0.16/lib/tls/x86_64/libbz2.so.1", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
stat("/nix/store/kgq1fxb7c84r212kmq4p8zcxyi7fv51r-libsodium-1.0.16/lib/tls/x86_64", 0x7fff8de75610) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/kgq1fxb7c84r212kmq4p8zcxyi7fv51r-libsodium-1.0.16/lib/tls/x86_64/libbz2.so.1", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
stat("/nix/store/kgq1fxb7c84r212kmq4p8zcxyi7fv51r-libsodium-1.0.16/lib/tls/x86_64", 0x7fff8de75610) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/kgq1fxb7c84r212kmq4p8zcxyi7fv51r-libsodium-1.0.16/lib/tls/libbz2.so.1", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
stat("/nix/store/kgq1fxb7c84r212kmq4p8zcxyi7fv51r-libsodium-1.0.16/lib/tls", 0x7fff8de75610) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/kgq1fxb7c84r212kmq4p8zcxyi7fv51r-libsodium-1.0.16/lib/x86_64/x86_64/libbz2.so.1", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
stat("/nix/store/kgq1fxb7c84r212kmq4p8zcxyi7fv51r-libsodium-1.0.16/lib/x86_64/x86_64", 0x7fff8de75610) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/kgq1fxb7c84r212kmq4p8zcxyi7fv51r-libsodium-1.0.16/lib/x86_64/libbz2.so.1", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
stat("/nix/store/kgq1fxb7c84r212kmq4p8zcxyi7fv51r-libsodium-1.0.16/lib/x86_64", 0x7fff8de75610) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/kgq1fxb7c84r212kmq4p8zcxyi7fv51r-libsodium-1.0.16/lib/x86_64/libbz2.so.1", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
stat("/nix/store/kgq1fxb7c84r212kmq4p8zcxyi7fv51r-libsodium-1.0.16/lib/x86_64", 0x7fff8de75610) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/kgq1fxb7c84r212kmq4p8zcxyi7fv51r-libsodium-1.0.16/lib/libbz2.so.1", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
stat("/nix/store/kgq1fxb7c84r212kmq4p8zcxyi7fv51r-libsodium-1.0.16/lib", {st_mode=S_IFDIR|0555, st_size=6, ...}) = 0
openat(AT_FDCWD, "/nix/store/mrphq5k83715mqjlk0vjcr3h0j7zs8ix-bzip2-1.0.6.0.1/lib/tls/x86_64/x86_64/libbz2.so.1", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
stat("/nix/store/mrphq5k83715mqjlk0vjcr3h0j7zs8ix-bzip2-1.0.6.0.1/lib/tls/x86_64/x86_64", 0x7fff8de75610) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/mrphq5k83715mqjlk0vjcr3h0j7zs8ix-bzip2-1.0.6.0.1/lib/tls/x86_64/libbz2.so.1", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
stat("/nix/store/mrphq5k83715mqjlk0vjcr3h0j7zs8ix-bzip2-1.0.6.0.1/lib/tls/x86_64", 0x7fff8de75610) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/mrphq5k83715mqjlk0vjcr3h0j7zs8ix-bzip2-1.0.6.0.1/lib/tls/x86_64/libbz2.so.1", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
stat("/nix/store/mrphq5k83715mqjlk0vjcr3h0j7zs8ix-bzip2-1.0.6.0.1/lib/tls/x86_64", 0x7fff8de75610) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/mrphq5k83715mqjlk0vjcr3h0j7zs8ix-bzip2-1.0.6.0.1/lib/tls/libbz2.so.1", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
stat("/nix/store/mrphq5k83715mqjlk0vjcr3h0j7zs8ix-bzip2-1.0.6.0.1/lib/tls", 0x7fff8de75610) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/mrphq5k83715mqjlk0vjcr3h0j7zs8ix-bzip2-1.0.6.0.1/lib/x86_64/x86_64/libbz2.so.1", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
stat("/nix/store/mrphq5k83715mqjlk0vjcr3h0j7zs8ix-bzip2-1.0.6.0.1/lib/x86_64/x86_64", 0x7fff8de75610) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/mrphq5k83715mqjlk0vjcr3h0j7zs8ix-bzip2-1.0.6.0.1/lib/x86_64/libbz2.so.1", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
stat("/nix/store/mrphq5k83715mqjlk0vjcr3h0j7zs8ix-bzip2-1.0.6.0.1/lib/x86_64", 0x7fff8de75610) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/mrphq5k83715mqjlk0vjcr3h0j7zs8ix-bzip2-1.0.6.0.1/lib/x86_64/libbz2.so.1", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
stat("/nix/store/mrphq5k83715mqjlk0vjcr3h0j7zs8ix-bzip2-1.0.6.0.1/lib/x86_64", 0x7fff8de75610) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/mrphq5k83715mqjlk0vjcr3h0j7zs8ix-bzip2-1.0.6.0.1/lib/libbz2.so.1", O_RDONLY|O_CLOEXEC) = 3
read(3, "\177ELF\2\1\1\0\0\0\0\0\0\0\0\0\3\0>\0\1\0\0\0\200\26\0\0\0\0\0\0@\0\0\0\0\0\0\0008\r\1\0\0\0\0\0\0\0\0\0@\0008\0\7\0@\0\32\0\27\0\1\0\0\0\5\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\264\350\0\0\0\0\0\0\264\350\0\0\0\0\0\0\0\0 \0\0\0\0\0\1\0\0\0\6\0\0\0\360\353\0\0\0\0\0\0\360\353 \0\0\0\0\0\360\353 \0\0\0\0\0000\20\0\0\0\0\0\0008\20\0\0\0\0\0\0\0\0 \0\0\0\0\0\2\0\0\0\6\0\0\0\200\354\0\0\0\0\0\0\200\354 \0\0\0\0\0\200\354 \0\0\0\0\0\320\1\0\0\0\0\0\0\320\1\0\0\0\0\0\0\10\0\0\0\0\0\0\0P\345td\4\0\0\0\210\335\0\0\0\0\0\0\210\335\0\0\0\0\0\0\210\335\0\0\0\0\0\0l\1\0\0\0\0\0\0l\1\0\0\0\0\0\0\4\0\0\0\0\0\0\0Q\345td\6\0\0\0\0\0\0\0"..., 832) = 832
fstat(3, {st_mode=S_IFREG|0555, st_size=70584, ...}) = 0
mmap(NULL, 2161704, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) = 0x7204b2c5e000
mprotect(0x7204b2c6d000, 2093056, PROT_NONE) = 0
mmap(0x7204b2e6c000, 8192, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0xe000) = 0x7204b2e6c000
close(3) = 0
openat(AT_FDCWD, "/nix/store/r8zhwq9xylxw8a823kpvqy0kfqq4g52f-nix-2.0pre5968_a6c0b773/lib/libsodium.so.23", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/kgq1fxb7c84r212kmq4p8zcxyi7fv51r-libsodium-1.0.16/lib/libsodium.so.23", O_RDONLY|O_CLOEXEC) = 3
read(3, "\177ELF\2\1\1\0\0\0\0\0\0\0\0\0\3\0>\0\1\0\0\0`\272\0\0\0\0\0\0@\0\0\0\0\0\0\0008\362\5\0\0\0\0\0\0\0\0\0@\0008\0\t\0@\0\33\0\32\0\1\0\0\0\5\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0L\35\5\0\0\0\0\0L\35\5\0\0\0\0\0\0\0 \0\0\0\0\0\1\0\0\0\6\0\0\0 (\5\0\0\0\0\0 (%\0\0\0\0\0 (%\0\0\0\0\0\20\v\0\0\0\0\0\0\350\v\0\0\0\0\0\0\0\0 \0\0\0\0\0\2\0\0\0\6\0\0\0000(\5\0\0\0\0\0000(%\0\0\0\0\0000(%\0\0\0\0\0\360\1\0\0\0\0\0\0\360\1\0\0\0\0\0\0\10\0\0\0\0\0\0\0\4\0\0\0\4\0\0\0008\2\0\0\0\0\0\0008\2\0\0\0\0\0\0008\2\0\0\0\0\0\0$\0\0\0\0\0\0\0$\0\0\0\0\0\0\0\4\0\0\0\0\0\0\0\7\0\0\0\4\0\0\0 (\5\0"..., 832) = 832
fstat(3, {st_mode=S_IFREG|0555, st_size=391416, ...}) = 0
mmap(NULL, 2438152, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) = 0x7204b2a0a000
mprotect(0x7204b2a5c000, 2097152, PROT_NONE) = 0
mmap(0x7204b2c5c000, 8192, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0x52000) = 0x7204b2c5c000
close(3) = 0
openat(AT_FDCWD, "/nix/store/r8zhwq9xylxw8a823kpvqy0kfqq4g52f-nix-2.0pre5968_a6c0b773/lib/libnixmain.so", O_RDONLY|O_CLOEXEC) = 3
read(3, "\177ELF\2\1\1\0\0\0\0\0\0\0\0\0\3\0>\0\1\0\0\0\200\220\0\0\0\0\0\0@\0\0\0\0\0\0\0\200\204\2\0\0\0\0\0\0\0\0\0@\0008\0\10\0@\0\34\0\33\0\1\0\0\0\5\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\362\350\1\0\0\0\0\0\362\350\1\0\0\0\0\0\0\0 \0\0\0\0\0\1\0\0\0\6\0\0\0x\362\1\0\0\0\0\0x\362!\0\0\0\0\0x\362!\0\0\0\0\0\310\r\0\0\0\0\0\0X\22\0\0\0\0\0\0\0\0 \0\0\0\0\0\2\0\0\0\6\0\0\0\240\366\1\0\0\0\0\0\240\366!\0\0\0\0\0\240\366!\0\0\0\0\0@\2\0\0\0\0\0\0@\2\0\0\0\0\0\0\10\0\0\0\0\0\0\0\4\0\0\0\4\0\0\0\0\2\0\0\0\0\0\0\0\2\0\0\0\0\0\0\0\2\0\0\0\0\0\0$\0\0\0\0\0\0\0$\0\0\0\0\0\0\0\4\0\0\0\0\0\0\0P\345td\4\0\0\0\200\300\1\0"..., 832) = 832
fstat(3, {st_mode=S_IFREG|0555, st_size=166784, ...}) = 0
mmap(NULL, 2229456, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) = 0x7204b27e9000
mprotect(0x7204b2808000, 2097152, PROT_NONE) = 0
mmap(0x7204b2a08000, 8192, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0x1f000) = 0x7204b2a08000
close(3) = 0
openat(AT_FDCWD, "/nix/store/r8zhwq9xylxw8a823kpvqy0kfqq4g52f-nix-2.0pre5968_a6c0b773/lib/libnixstore.so", O_RDONLY|O_CLOEXEC) = 3
read(3, "\177ELF\2\1\1\3\0\0\0\0\0\0\0\0\3\0>\0\1\0\0\0000\355\6\0\0\0\0\0@\0\0\0\0\0\0\0\30R$\0\0\0\0\0\0\0\0\0@\0008\0\10\0@\0\34\0\33\0\1\0\0\0\5\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0DX\35\0\0\0\0\0DX\35\0\0\0\0\0\0\0 \0\0\0\0\0\1\0\0\0\6\0\0\0000[\35\0\0\0\0\0000[=\0\0\0\0\0000[=\0\0\0\0\0`\231\0\0\0\0\0\0\320\315\0\0\0\0\0\0\0\0 \0\0\0\0\0\2\0\0\0\6\0\0\0000\266\35\0\0\0\0\0000\266=\0\0\0\0\0000\266=\0\0\0\0\0\300\2\0\0\0\0\0\0\300\2\0\0\0\0\0\0\10\0\0\0\0\0\0\0\4\0\0\0\4\0\0\0\0\2\0\0\0\0\0\0\0\2\0\0\0\0\0\0\0\2\0\0\0\0\0\0$\0\0\0\0\0\0\0$\0\0\0\0\0\0\0\4\0\0\0\0\0\0\0P\345td\4\0\0\0\24K\32\0"..., 832) = 832
fstat(3, {st_mode=S_IFREG|0555, st_size=2382104, ...}) = 0
mmap(NULL, 4073728, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) = 0x7204b2406000
mprotect(0x7204b25dc000, 2093056, PROT_NONE) = 0
mmap(0x7204b27db000, 45056, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0x1d5000) = 0x7204b27db000
mmap(0x7204b27e6000, 10496, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x7204b27e6000
close(3) = 0
openat(AT_FDCWD, "/nix/store/r8zhwq9xylxw8a823kpvqy0kfqq4g52f-nix-2.0pre5968_a6c0b773/lib/libnixutil.so", O_RDONLY|O_CLOEXEC) = 3
read(3, "\177ELF\2\1\1\3\0\0\0\0\0\0\0\0\3\0>\0\1\0\0\0\220\211\2\0\0\0\0\0@\0\0\0\0\0\0\0@n\n\0\0\0\0\0\0\0\0\0@\0008\0\t\0@\0\35\0\34\0\1\0\0\0\5\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\266\4\10\0\0\0\0\0\266\4\10\0\0\0\0\0\0\0 \0\0\0\0\0\1\0\0\0\6\0\0\0P\21\10\0\0\0\0\0P\21(\0\0\0\0\0P\21(\0\0\0\0\0\350.\0\0\0\0\0\0X4\0\0\0\0\0\0\0\0 \0\0\0\0\0\2\0\0\0\6\0\0\0\250'\10\0\0\0\0\0\250'(\0\0\0\0\0\250'(\0\0\0\0\0\200\2\0\0\0\0\0\0\200\2\0\0\0\0\0\0\10\0\0\0\0\0\0\0\4\0\0\0\4\0\0\0008\2\0\0\0\0\0\0008\2\0\0\0\0\0\0008\2\0\0\0\0\0\0$\0\0\0\0\0\0\0$\0\0\0\0\0\0\0\4\0\0\0\0\0\0\0\7\0\0\0\4\0\0\0P\21\10\0"..., 832) = 832
fstat(3, {st_mode=S_IFREG|0555, st_size=685440, ...}) = 0
mmap(NULL, 2639272, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) = 0x7204b2181000
mprotect(0x7204b2202000, 2097152, PROT_NONE) = 0
mmap(0x7204b2402000, 16384, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0x81000) = 0x7204b2402000
close(3) = 0
openat(AT_FDCWD, "/nix/store/r8zhwq9xylxw8a823kpvqy0kfqq4g52f-nix-2.0pre5968_a6c0b773/lib/libnixformat.so", O_RDONLY|O_CLOEXEC) = 3
read(3, "\177ELF\2\1\1\0\0\0\0\0\0\0\0\0\3\0>\0\1\0\0\0\200%\0\0\0\0\0\0@\0\0\0\0\0\0\0x\263\0\0\0\0\0\0\0\0\0\0@\0008\0\10\0@\0\33\0\32\0\1\0\0\0\5\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\v\177\0\0\0\0\0\0\v\177\0\0\0\0\0\0\0\0 \0\0\0\0\0\1\0\0\0\6\0\0\0\370\213\0\0\0\0\0\0\370\213 \0\0\0\0\0\370\213 \0\0\0\0\0\30\4\0\0\0\0\0\0 \4\0\0\0\0\0\0\0\0 \0\0\0\0\0\2\0\0\0\6\0\0\0\10\214\0\0\0\0\0\0\10\214 \0\0\0\0\0\10\214 \0\0\0\0\0\0\2\0\0\0\0\0\0\0\2\0\0\0\0\0\0\10\0\0\0\0\0\0\0\4\0\0\0\4\0\0\0\0\2\0\0\0\0\0\0\0\2\0\0\0\0\0\0\0\2\0\0\0\0\0\0$\0\0\0\0\0\0\0$\0\0\0\0\0\0\0\4\0\0\0\0\0\0\0P\345td\4\0\0\0Ht\0\0"..., 832) = 832
fstat(3, {st_mode=S_IFREG|0555, st_size=47672, ...}) = 0
mmap(NULL, 8192, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) = 0x7204b308e000
mmap(NULL, 2134040, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) = 0x7204b1f77000
mprotect(0x7204b1f7f000, 2097152, PROT_NONE) = 0
mmap(0x7204b217f000, 8192, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0x8000) = 0x7204b217f000
close(3) = 0
openat(AT_FDCWD, "/nix/store/r8zhwq9xylxw8a823kpvqy0kfqq4g52f-nix-2.0pre5968_a6c0b773/lib/libstdc++.so.6", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/kgq1fxb7c84r212kmq4p8zcxyi7fv51r-libsodium-1.0.16/lib/libstdc++.so.6", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/mrphq5k83715mqjlk0vjcr3h0j7zs8ix-bzip2-1.0.6.0.1/lib/libstdc++.so.6", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/2kcrj1ksd2a14bm5sky182fv2xwfhfap-glibc-2.26-131/lib/tls/x86_64/x86_64/libstdc++.so.6", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
stat("/nix/store/2kcrj1ksd2a14bm5sky182fv2xwfhfap-glibc-2.26-131/lib/tls/x86_64/x86_64", 0x7fff8de754f0) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/2kcrj1ksd2a14bm5sky182fv2xwfhfap-glibc-2.26-131/lib/tls/x86_64/libstdc++.so.6", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
stat("/nix/store/2kcrj1ksd2a14bm5sky182fv2xwfhfap-glibc-2.26-131/lib/tls/x86_64", 0x7fff8de754f0) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/2kcrj1ksd2a14bm5sky182fv2xwfhfap-glibc-2.26-131/lib/tls/x86_64/libstdc++.so.6", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
stat("/nix/store/2kcrj1ksd2a14bm5sky182fv2xwfhfap-glibc-2.26-131/lib/tls/x86_64", 0x7fff8de754f0) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/2kcrj1ksd2a14bm5sky182fv2xwfhfap-glibc-2.26-131/lib/tls/libstdc++.so.6", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
stat("/nix/store/2kcrj1ksd2a14bm5sky182fv2xwfhfap-glibc-2.26-131/lib/tls", 0x7fff8de754f0) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/2kcrj1ksd2a14bm5sky182fv2xwfhfap-glibc-2.26-131/lib/x86_64/x86_64/libstdc++.so.6", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
stat("/nix/store/2kcrj1ksd2a14bm5sky182fv2xwfhfap-glibc-2.26-131/lib/x86_64/x86_64", 0x7fff8de754f0) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/2kcrj1ksd2a14bm5sky182fv2xwfhfap-glibc-2.26-131/lib/x86_64/libstdc++.so.6", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
stat("/nix/store/2kcrj1ksd2a14bm5sky182fv2xwfhfap-glibc-2.26-131/lib/x86_64", 0x7fff8de754f0) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/2kcrj1ksd2a14bm5sky182fv2xwfhfap-glibc-2.26-131/lib/x86_64/libstdc++.so.6", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
stat("/nix/store/2kcrj1ksd2a14bm5sky182fv2xwfhfap-glibc-2.26-131/lib/x86_64", 0x7fff8de754f0) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/2kcrj1ksd2a14bm5sky182fv2xwfhfap-glibc-2.26-131/lib/libstdc++.so.6", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
stat("/nix/store/2kcrj1ksd2a14bm5sky182fv2xwfhfap-glibc-2.26-131/lib", {st_mode=S_IFDIR|0555, st_size=83, ...}) = 0
openat(AT_FDCWD, "/nix/store/4zd34747fz0ggzzasy4icgn3lmy89pra-gcc-7.3.0-lib/lib/tls/x86_64/x86_64/libstdc++.so.6", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
stat("/nix/store/4zd34747fz0ggzzasy4icgn3lmy89pra-gcc-7.3.0-lib/lib/tls/x86_64/x86_64", 0x7fff8de754f0) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/4zd34747fz0ggzzasy4icgn3lmy89pra-gcc-7.3.0-lib/lib/tls/x86_64/libstdc++.so.6", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
stat("/nix/store/4zd34747fz0ggzzasy4icgn3lmy89pra-gcc-7.3.0-lib/lib/tls/x86_64", 0x7fff8de754f0) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/4zd34747fz0ggzzasy4icgn3lmy89pra-gcc-7.3.0-lib/lib/tls/x86_64/libstdc++.so.6", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
stat("/nix/store/4zd34747fz0ggzzasy4icgn3lmy89pra-gcc-7.3.0-lib/lib/tls/x86_64", 0x7fff8de754f0) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/4zd34747fz0ggzzasy4icgn3lmy89pra-gcc-7.3.0-lib/lib/tls/libstdc++.so.6", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
stat("/nix/store/4zd34747fz0ggzzasy4icgn3lmy89pra-gcc-7.3.0-lib/lib/tls", 0x7fff8de754f0) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/4zd34747fz0ggzzasy4icgn3lmy89pra-gcc-7.3.0-lib/lib/x86_64/x86_64/libstdc++.so.6", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
stat("/nix/store/4zd34747fz0ggzzasy4icgn3lmy89pra-gcc-7.3.0-lib/lib/x86_64/x86_64", 0x7fff8de754f0) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/4zd34747fz0ggzzasy4icgn3lmy89pra-gcc-7.3.0-lib/lib/x86_64/libstdc++.so.6", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
stat("/nix/store/4zd34747fz0ggzzasy4icgn3lmy89pra-gcc-7.3.0-lib/lib/x86_64", 0x7fff8de754f0) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/4zd34747fz0ggzzasy4icgn3lmy89pra-gcc-7.3.0-lib/lib/x86_64/libstdc++.so.6", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
stat("/nix/store/4zd34747fz0ggzzasy4icgn3lmy89pra-gcc-7.3.0-lib/lib/x86_64", 0x7fff8de754f0) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/4zd34747fz0ggzzasy4icgn3lmy89pra-gcc-7.3.0-lib/lib/libstdc++.so.6", O_RDONLY|O_CLOEXEC) = 3
read(3, "\177ELF\2\1\1\3\0\0\0\0\0\0\0\0\3\0>\0\1\0\0\0@\231\10\0\0\0\0\0@\0\0\0\0\0\0\0\220\302\27\0\0\0\0\0\0\0\0\0@\0008\0\10\0@\0\33\0\32\0\1\0\0\0\5\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\377\26\0\0\0\0\0\0\377\26\0\0\0\0\0\0\0 \0\0\0\0\0\1\0\0\0\6\0\0\0`\t\27\0\0\0\0\0`\t7\0\0\0\0\0`\t7\0\0\0\0\0\30\270\0\0\0\0\0\0\300\354\0\0\0\0\0\0\0\0 \0\0\0\0\0\2\0\0\0\6\0\0\0h\223\27\0\0\0\0\0h\2237\0\0\0\0\0h\2237\0\0\0\0\0 \2\0\0\0\0\0\0 \2\0\0\0\0\0\0\10\0\0\0\0\0\0\0\7\0\0\0\4\0\0\0`\t\27\0\0\0\0\0`\t7\0\0\0\0\0`\t7\0\0\0\0\0\0\0\0\0\0\0\0\0 \0\0\0\0\0\0\0\10\0\0\0\0\0\0\0P\345td\4\0\0\0\370\247\23\0"..., 832) = 832
fstat(3, {st_mode=S_IFREG|0555, st_size=1558864, ...}) = 0
mmap(NULL, 3667488, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) = 0x7204b1bf7000
mprotect(0x7204b1d67000, 2097152, PROT_NONE) = 0
mmap(0x7204b1f67000, 53248, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0x170000) = 0x7204b1f67000
mmap(0x7204b1f74000, 9760, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x7204b1f74000
close(3) = 0
openat(AT_FDCWD, "/nix/store/r8zhwq9xylxw8a823kpvqy0kfqq4g52f-nix-2.0pre5968_a6c0b773/lib/libm.so.6", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/kgq1fxb7c84r212kmq4p8zcxyi7fv51r-libsodium-1.0.16/lib/libm.so.6", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/mrphq5k83715mqjlk0vjcr3h0j7zs8ix-bzip2-1.0.6.0.1/lib/libm.so.6", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/2kcrj1ksd2a14bm5sky182fv2xwfhfap-glibc-2.26-131/lib/libm.so.6", O_RDONLY|O_CLOEXEC) = 3
read(3, "\177ELF\2\1\1\3\0\0\0\0\0\0\0\0\3\0>\0\1\0\0\0\300w\0\0\0\0\0\0@\0\0\0\0\0\0\0008\362\25\0\0\0\0\0\0\0\0\0@\0008\0\10\0@\0\37\0\34\0\1\0\0\0\5\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\200\242\24\0\0\0\0\0\200\242\24\0\0\0\0\0\0\0 \0\0\0\0\0\1\0\0\0\6\0\0\0\210\254\24\0\0\0\0\0\210\2544\0\0\0\0\0\210\2544\0\0\0\0\0\230\5\0\0\0\0\0\0\240\5\0\0\0\0\0\0\0\0 \0\0\0\0\0\2\0\0\0\6\0\0\0\240\254\24\0\0\0\0\0\240\2544\0\0\0\0\0\240\2544\0\0\0\0\0000\2\0\0\0\0\0\0000\2\0\0\0\0\0\0\10\0\0\0\0\0\0\0\4\0\0\0\4\0\0\0\0\2\0\0\0\0\0\0\0\2\0\0\0\0\0\0\0\2\0\0\0\0\0\0D\0\0\0\0\0\0\0D\0\0\0\0\0\0\0\4\0\0\0\0\0\0\0P\345td\4\0\0\0\244\334\23\0"..., 832) = 832
fstat(3, {st_mode=S_IFREG|0555, st_size=1440248, ...}) = 0
mmap(NULL, 3453480, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) = 0x7204b18ab000
mprotect(0x7204b19f6000, 2093056, PROT_NONE) = 0
mmap(0x7204b1bf5000, 8192, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0x14a000) = 0x7204b1bf5000
close(3) = 0
openat(AT_FDCWD, "/nix/store/r8zhwq9xylxw8a823kpvqy0kfqq4g52f-nix-2.0pre5968_a6c0b773/lib/libgcc_s.so.1", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/kgq1fxb7c84r212kmq4p8zcxyi7fv51r-libsodium-1.0.16/lib/libgcc_s.so.1", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/mrphq5k83715mqjlk0vjcr3h0j7zs8ix-bzip2-1.0.6.0.1/lib/libgcc_s.so.1", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/2kcrj1ksd2a14bm5sky182fv2xwfhfap-glibc-2.26-131/lib/libgcc_s.so.1", O_RDONLY|O_CLOEXEC) = 3
read(3, "\177ELF\2\1\1\0\0\0\0\0\0\0\0\0\3\0>\0\1\0\0\0\20+\0\0\0\0\0\0@\0\0\0\0\0\0\0\300\201\1\0\0\0\0\0\0\0\0\0@\0008\0\6\0@\0\35\0\32\0\1\0\0\0\5\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\fS\1\0\0\0\0\0\fS\1\0\0\0\0\0\0\0 \0\0\0\0\0\1\0\0\0\6\0\0\0\20S\1\0\0\0\0\0\20S!\0\0\0\0\0\20S!\0\0\0\0\0\320\3\0\0\0\0\0\0p\6\0\0\0\0\0\0\0\0 \0\0\0\0\0\2\0\0\0\6\0\0\0000S\1\0\0\0\0\0000S!\0\0\0\0\0000S!\0\0\0\0\0\0\2\0\0\0\0\0\0\0\2\0\0\0\0\0\0\10\0\0\0\0\0\0\0P\345td\4\0\0\00043\1\0\0\0\0\00043\1\0\0\0\0\00043\1\0\0\0\0\0D\5\0\0\0\0\0\0D\5\0\0\0\0\0\0\4\0\0\0\0\0\0\0Q\345td\6\0\0\0\0\0\0\0"..., 832) = 832
fstat(3, {st_mode=S_IFREG|0444, st_size=100608, ...}) = 0
mmap(NULL, 2185600, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) = 0x7204b1695000
mprotect(0x7204b16ab000, 2093056, PROT_NONE) = 0
mmap(0x7204b18aa000, 4096, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0x15000) = 0x7204b18aa000
close(3) = 0
openat(AT_FDCWD, "/nix/store/r8zhwq9xylxw8a823kpvqy0kfqq4g52f-nix-2.0pre5968_a6c0b773/lib/libpthread.so.0", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/kgq1fxb7c84r212kmq4p8zcxyi7fv51r-libsodium-1.0.16/lib/libpthread.so.0", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/mrphq5k83715mqjlk0vjcr3h0j7zs8ix-bzip2-1.0.6.0.1/lib/libpthread.so.0", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/2kcrj1ksd2a14bm5sky182fv2xwfhfap-glibc-2.26-131/lib/libpthread.so.0", O_RDONLY|O_CLOEXEC) = 3
read(3, "\177ELF\2\1\1\0\0\0\0\0\0\0\0\0\3\0>\0\1\0\0\0p_\0\0\0\0\0\0@\0\0\0\0\0\0\0\240\16\2\0\0\0\0\0\0\0\0\0@\0008\0\n\0@\0%\0\"\0\6\0\0\0\5\0\0\0@\0\0\0\0\0\0\0@\0\0\0\0\0\0\0@\0\0\0\0\0\0\0000\2\0\0\0\0\0\0000\2\0\0\0\0\0\0\10\0\0\0\0\0\0\0\3\0\0\0\4\0\0\0\340@\1\0\0\0\0\0\340@\1\0\0\0\0\0\340@\1\0\0\0\0\0T\0\0\0\0\0\0\0T\0\0\0\0\0\0\0 \0\0\0\0\0\0\0\1\0\0\0\5\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0P\210\1\0\0\0\0\0P\210\1\0\0\0\0\0\0\0 \0\0\0\0\0\1\0\0\0\6\0\0\0008\211\1\0\0\0\0\0008\211!\0\0\0\0\0008\211!\0\0\0\0\0\30\7\0\0\0\0\0\0\260H\0\0\0\0\0\0\0\0 \0\0\0\0\0\2\0\0\0\6\0\0\0\20\213\1\0"..., 832) = 832
fstat(3, {st_mode=S_IFREG|0555, st_size=137184, ...}) = 0
mmap(NULL, 2216424, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) = 0x7204b1477000
mprotect(0x7204b1490000, 2093056, PROT_NONE) = 0
mmap(0x7204b168f000, 8192, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0x18000) = 0x7204b168f000
mmap(0x7204b1691000, 12776, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x7204b1691000
close(3) = 0
openat(AT_FDCWD, "/nix/store/r8zhwq9xylxw8a823kpvqy0kfqq4g52f-nix-2.0pre5968_a6c0b773/lib/libc.so.6", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/kgq1fxb7c84r212kmq4p8zcxyi7fv51r-libsodium-1.0.16/lib/libc.so.6", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/mrphq5k83715mqjlk0vjcr3h0j7zs8ix-bzip2-1.0.6.0.1/lib/libc.so.6", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/2kcrj1ksd2a14bm5sky182fv2xwfhfap-glibc-2.26-131/lib/libc.so.6", O_RDONLY|O_CLOEXEC) = 3
read(3, "\177ELF\2\1\1\3\0\0\0\0\0\0\0\0\3\0>\0\1\0\0\0@\21\2\0\0\0\0\0@\0\0\0\0\0\0\0Xn\36\0\0\0\0\0\0\0\0\0@\0008\0\v\0@\0H\0E\0\6\0\0\0\5\0\0\0@\0\0\0\0\0\0\0@\0\0\0\0\0\0\0@\0\0\0\0\0\0\0h\2\0\0\0\0\0\0h\2\0\0\0\0\0\0\10\0\0\0\0\0\0\0\3\0\0\0\4\0\0\0@\270\27\0\0\0\0\0@\270\27\0\0\0\0\0@\270\27\0\0\0\0\0T\0\0\0\0\0\0\0T\0\0\0\0\0\0\0 \0\0\0\0\0\0\0\1\0\0\0\5\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\204\204\32\0\0\0\0\0\204\204\32\0\0\0\0\0\0\0 \0\0\0\0\0\1\0\0\0\6\0\0\0\30\206\32\0\0\0\0\0\30\206:\0\0\0\0\0\30\206:\0\0\0\0\0\250P\0\0\0\0\0\0\350\222\0\0\0\0\0\0\0\0 \0\0\0\0\0\2\0\0\0\6\0\0\0\0\272\32\0"..., 832) = 832
fstat(3, {st_mode=S_IFREG|0555, st_size=1998936, ...}) = 0
mmap(NULL, 3873024, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) = 0x7204b10c5000
mprotect(0x7204b126e000, 2093056, PROT_NONE) = 0
mmap(0x7204b146d000, 24576, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0x1a8000) = 0x7204b146d000
mmap(0x7204b1473000, 14592, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x7204b1473000
close(3) = 0
mmap(NULL, 8192, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) = 0x7204b308c000
openat(AT_FDCWD, "/nix/store/r8zhwq9xylxw8a823kpvqy0kfqq4g52f-nix-2.0pre5968_a6c0b773/lib/libcrypto.so.1.0.0", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/dl1hzcnxnbbcpf6zdhan58fghvdg3in8-openssl-1.0.2n/lib/tls/x86_64/x86_64/libcrypto.so.1.0.0", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
stat("/nix/store/dl1hzcnxnbbcpf6zdhan58fghvdg3in8-openssl-1.0.2n/lib/tls/x86_64/x86_64", 0x7fff8de75090) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/dl1hzcnxnbbcpf6zdhan58fghvdg3in8-openssl-1.0.2n/lib/tls/x86_64/libcrypto.so.1.0.0", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
stat("/nix/store/dl1hzcnxnbbcpf6zdhan58fghvdg3in8-openssl-1.0.2n/lib/tls/x86_64", 0x7fff8de75090) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/dl1hzcnxnbbcpf6zdhan58fghvdg3in8-openssl-1.0.2n/lib/tls/x86_64/libcrypto.so.1.0.0", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
stat("/nix/store/dl1hzcnxnbbcpf6zdhan58fghvdg3in8-openssl-1.0.2n/lib/tls/x86_64", 0x7fff8de75090) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/dl1hzcnxnbbcpf6zdhan58fghvdg3in8-openssl-1.0.2n/lib/tls/libcrypto.so.1.0.0", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
stat("/nix/store/dl1hzcnxnbbcpf6zdhan58fghvdg3in8-openssl-1.0.2n/lib/tls", 0x7fff8de75090) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/dl1hzcnxnbbcpf6zdhan58fghvdg3in8-openssl-1.0.2n/lib/x86_64/x86_64/libcrypto.so.1.0.0", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
stat("/nix/store/dl1hzcnxnbbcpf6zdhan58fghvdg3in8-openssl-1.0.2n/lib/x86_64/x86_64", 0x7fff8de75090) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/dl1hzcnxnbbcpf6zdhan58fghvdg3in8-openssl-1.0.2n/lib/x86_64/libcrypto.so.1.0.0", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
stat("/nix/store/dl1hzcnxnbbcpf6zdhan58fghvdg3in8-openssl-1.0.2n/lib/x86_64", 0x7fff8de75090) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/dl1hzcnxnbbcpf6zdhan58fghvdg3in8-openssl-1.0.2n/lib/x86_64/libcrypto.so.1.0.0", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
stat("/nix/store/dl1hzcnxnbbcpf6zdhan58fghvdg3in8-openssl-1.0.2n/lib/x86_64", 0x7fff8de75090) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/dl1hzcnxnbbcpf6zdhan58fghvdg3in8-openssl-1.0.2n/lib/libcrypto.so.1.0.0", O_RDONLY|O_CLOEXEC) = 3
read(3, "\177ELF\2\1\1\0\0\0\0\0\0\0\0\0\3\0>\0\1\0\0\0\0|\6\0\0\0\0\0@\0\0\0\0\0\0\0p\177'\0\0\0\0\0\0\0\0\0@\0008\0\10\0@\0\33\0\32\0\1\0\0\0\5\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\314\20!\0\0\0\0\0\314\20!\0\0\0\0\0\0\0 \0\0\0\0\0\1\0\0\0\6\0\0\0\20\35!\0\0\0\0\0\20\35A\0\0\0\0\0\20\35A\0\0\0\0\0qa\2\0\0\0\0\0\20\231\2\0\0\0\0\0\0\0 \0\0\0\0\0\2\0\0\0\6\0\0\0P\312\"\0\0\0\0\0P\312B\0\0\0\0\0P\312B\0\0\0\0\0\360\1\0\0\0\0\0\0\360\1\0\0\0\0\0\0\10\0\0\0\0\0\0\0\4\0\0\0\4\0\0\0\0\2\0\0\0\0\0\0\0\2\0\0\0\0\0\0\0\2\0\0\0\0\0\0$\0\0\0\0\0\0\0$\0\0\0\0\0\0\0\4\0\0\0\0\0\0\0P\345td\4\0\0\0\270[\35\0"..., 832) = 832
fstat(3, {st_mode=S_IFREG|0555, st_size=2590256, ...}) = 0
mmap(NULL, 4437536, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) = 0x7204b0c89000
mprotect(0x7204b0e9b000, 2093056, PROT_NONE) = 0
mmap(0x7204b109a000, 159744, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0x211000) = 0x7204b109a000
mmap(0x7204b10c1000, 13856, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x7204b10c1000
close(3) = 0
openat(AT_FDCWD, "/nix/store/r8zhwq9xylxw8a823kpvqy0kfqq4g52f-nix-2.0pre5968_a6c0b773/lib/libsqlite3.so.0", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/3v6sf9l1fwbb1phq9ccm71096d44k489-sqlite-3.21.0/lib/tls/x86_64/x86_64/libsqlite3.so.0", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
stat("/nix/store/3v6sf9l1fwbb1phq9ccm71096d44k489-sqlite-3.21.0/lib/tls/x86_64/x86_64", 0x7fff8de74ef0) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/3v6sf9l1fwbb1phq9ccm71096d44k489-sqlite-3.21.0/lib/tls/x86_64/libsqlite3.so.0", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
stat("/nix/store/3v6sf9l1fwbb1phq9ccm71096d44k489-sqlite-3.21.0/lib/tls/x86_64", 0x7fff8de74ef0) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/3v6sf9l1fwbb1phq9ccm71096d44k489-sqlite-3.21.0/lib/tls/x86_64/libsqlite3.so.0", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
stat("/nix/store/3v6sf9l1fwbb1phq9ccm71096d44k489-sqlite-3.21.0/lib/tls/x86_64", 0x7fff8de74ef0) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/3v6sf9l1fwbb1phq9ccm71096d44k489-sqlite-3.21.0/lib/tls/libsqlite3.so.0", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
stat("/nix/store/3v6sf9l1fwbb1phq9ccm71096d44k489-sqlite-3.21.0/lib/tls", 0x7fff8de74ef0) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/3v6sf9l1fwbb1phq9ccm71096d44k489-sqlite-3.21.0/lib/x86_64/x86_64/libsqlite3.so.0", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
stat("/nix/store/3v6sf9l1fwbb1phq9ccm71096d44k489-sqlite-3.21.0/lib/x86_64/x86_64", 0x7fff8de74ef0) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/3v6sf9l1fwbb1phq9ccm71096d44k489-sqlite-3.21.0/lib/x86_64/libsqlite3.so.0", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
stat("/nix/store/3v6sf9l1fwbb1phq9ccm71096d44k489-sqlite-3.21.0/lib/x86_64", 0x7fff8de74ef0) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/3v6sf9l1fwbb1phq9ccm71096d44k489-sqlite-3.21.0/lib/x86_64/libsqlite3.so.0", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
stat("/nix/store/3v6sf9l1fwbb1phq9ccm71096d44k489-sqlite-3.21.0/lib/x86_64", 0x7fff8de74ef0) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/3v6sf9l1fwbb1phq9ccm71096d44k489-sqlite-3.21.0/lib/libsqlite3.so.0", O_RDONLY|O_CLOEXEC) = 3
read(3, "\177ELF\2\1\1\0\0\0\0\0\0\0\0\0\3\0>\0\1\0\0\0p\321\0\0\0\0\0\0@\0\0\0\0\0\0\0008K\21\0\0\0\0\0\0\0\0\0@\0008\0\10\0@\0\33\0\32\0\1\0\0\0\5\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\334\216\17\0\0\0\0\0\334\216\17\0\0\0\0\0\0\0 \0\0\0\0\0\1\0\0\0\6\0\0\0P\224\17\0\0\0\0\0P\224/\0\0\0\0\0P\224/\0\0\0\0\0hH\0\0\0\0\0\0\310O\0\0\0\0\0\0\0\0 \0\0\0\0\0\2\0\0\0\6\0\0\0\360\267\17\0\0\0\0\0\360\267/\0\0\0\0\0\360\267/\0\0\0\0\0\0\2\0\0\0\0\0\0\0\2\0\0\0\0\0\0\10\0\0\0\0\0\0\0\4\0\0\0\4\0\0\0\0\2\0\0\0\0\0\0\0\2\0\0\0\0\0\0\0\2\0\0\0\0\0\0$\0\0\0\0\0\0\0$\0\0\0\0\0\0\0\4\0\0\0\0\0\0\0P\345td\4\0\0\0P\276\r\0"..., 832) = 832
fstat(3, {st_mode=S_IFREG|0555, st_size=1135096, ...}) = 0
mmap(NULL, 3138584, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) = 0x7204b098a000
mprotect(0x7204b0a83000, 2097152, PROT_NONE) = 0
mmap(0x7204b0c83000, 20480, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0xf9000) = 0x7204b0c83000
mmap(0x7204b0c88000, 1048, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x7204b0c88000
close(3) = 0
openat(AT_FDCWD, "/nix/store/r8zhwq9xylxw8a823kpvqy0kfqq4g52f-nix-2.0pre5968_a6c0b773/lib/libcurl.so.4", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/3v6sf9l1fwbb1phq9ccm71096d44k489-sqlite-3.21.0/lib/libcurl.so.4", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/lha30sclfhw3r77hsknjfcawqafb94xi-curl-7.58.0/lib/tls/x86_64/x86_64/libcurl.so.4", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
stat("/nix/store/lha30sclfhw3r77hsknjfcawqafb94xi-curl-7.58.0/lib/tls/x86_64/x86_64", 0x7fff8de74ec0) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/lha30sclfhw3r77hsknjfcawqafb94xi-curl-7.58.0/lib/tls/x86_64/libcurl.so.4", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
stat("/nix/store/lha30sclfhw3r77hsknjfcawqafb94xi-curl-7.58.0/lib/tls/x86_64", 0x7fff8de74ec0) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/lha30sclfhw3r77hsknjfcawqafb94xi-curl-7.58.0/lib/tls/x86_64/libcurl.so.4", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
stat("/nix/store/lha30sclfhw3r77hsknjfcawqafb94xi-curl-7.58.0/lib/tls/x86_64", 0x7fff8de74ec0) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/lha30sclfhw3r77hsknjfcawqafb94xi-curl-7.58.0/lib/tls/libcurl.so.4", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
stat("/nix/store/lha30sclfhw3r77hsknjfcawqafb94xi-curl-7.58.0/lib/tls", 0x7fff8de74ec0) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/lha30sclfhw3r77hsknjfcawqafb94xi-curl-7.58.0/lib/x86_64/x86_64/libcurl.so.4", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
stat("/nix/store/lha30sclfhw3r77hsknjfcawqafb94xi-curl-7.58.0/lib/x86_64/x86_64", 0x7fff8de74ec0) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/lha30sclfhw3r77hsknjfcawqafb94xi-curl-7.58.0/lib/x86_64/libcurl.so.4", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
stat("/nix/store/lha30sclfhw3r77hsknjfcawqafb94xi-curl-7.58.0/lib/x86_64", 0x7fff8de74ec0) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/lha30sclfhw3r77hsknjfcawqafb94xi-curl-7.58.0/lib/x86_64/libcurl.so.4", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
stat("/nix/store/lha30sclfhw3r77hsknjfcawqafb94xi-curl-7.58.0/lib/x86_64", 0x7fff8de74ec0) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/lha30sclfhw3r77hsknjfcawqafb94xi-curl-7.58.0/lib/libcurl.so.4", O_RDONLY|O_CLOEXEC) = 3
read(3, "\177ELF\2\1\1\0\0\0\0\0\0\0\0\0\3\0>\0\1\0\0\0 \307\0\0\0\0\0\0@\0\0\0\0\0\0\0(;\t\0\0\0\0\0\0\0\0\0@\0008\0\10\0@\0\33\0\32\0\1\0\0\0\5\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\344\r\10\0\0\0\0\0\344\r\10\0\0\0\0\0\0\0 \0\0\0\0\0\1\0\0\0\6\0\0\0P\25\10\0\0\0\0\0P\25(\0\0\0\0\0P\25(\0\0\0\0\0H,\0\0\0\0\0\0X0\0\0\0\0\0\0\0\0 \0\0\0\0\0\2\0\0\0\6\0\0\0\200/\10\0\0\0\0\0\200/(\0\0\0\0\0\200/(\0\0\0\0\0p\2\0\0\0\0\0\0p\2\0\0\0\0\0\0\10\0\0\0\0\0\0\0\4\0\0\0\4\0\0\0\0\2\0\0\0\0\0\0\0\2\0\0\0\0\0\0\0\2\0\0\0\0\0\0$\0\0\0\0\0\0\0$\0\0\0\0\0\0\0\4\0\0\0\0\0\0\0P\345td\4\0\0\0t/\7\0"..., 832) = 832
fstat(3, {st_mode=S_IFREG|0555, st_size=606696, ...}) = 0
mmap(NULL, 2639272, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) = 0x7204b0705000
mprotect(0x7204b0786000, 2097152, PROT_NONE) = 0
mmap(0x7204b0986000, 16384, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0x81000) = 0x7204b0986000
close(3) = 0
openat(AT_FDCWD, "/nix/store/r8zhwq9xylxw8a823kpvqy0kfqq4g52f-nix-2.0pre5968_a6c0b773/lib/libdl.so.2", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/3v6sf9l1fwbb1phq9ccm71096d44k489-sqlite-3.21.0/lib/libdl.so.2", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/lha30sclfhw3r77hsknjfcawqafb94xi-curl-7.58.0/lib/libdl.so.2", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/kgq1fxb7c84r212kmq4p8zcxyi7fv51r-libsodium-1.0.16/lib/libdl.so.2", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/mrphq5k83715mqjlk0vjcr3h0j7zs8ix-bzip2-1.0.6.0.1/lib/libdl.so.2", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/2gxzfkyl05040p97f7lzilv7yx3jj3v7-libseccomp-2.3.3/lib/tls/x86_64/x86_64/libdl.so.2", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
stat("/nix/store/2gxzfkyl05040p97f7lzilv7yx3jj3v7-libseccomp-2.3.3/lib/tls/x86_64/x86_64", 0x7fff8de74e90) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/2gxzfkyl05040p97f7lzilv7yx3jj3v7-libseccomp-2.3.3/lib/tls/x86_64/libdl.so.2", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
stat("/nix/store/2gxzfkyl05040p97f7lzilv7yx3jj3v7-libseccomp-2.3.3/lib/tls/x86_64", 0x7fff8de74e90) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/2gxzfkyl05040p97f7lzilv7yx3jj3v7-libseccomp-2.3.3/lib/tls/x86_64/libdl.so.2", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
stat("/nix/store/2gxzfkyl05040p97f7lzilv7yx3jj3v7-libseccomp-2.3.3/lib/tls/x86_64", 0x7fff8de74e90) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/2gxzfkyl05040p97f7lzilv7yx3jj3v7-libseccomp-2.3.3/lib/tls/libdl.so.2", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
stat("/nix/store/2gxzfkyl05040p97f7lzilv7yx3jj3v7-libseccomp-2.3.3/lib/tls", 0x7fff8de74e90) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/2gxzfkyl05040p97f7lzilv7yx3jj3v7-libseccomp-2.3.3/lib/x86_64/x86_64/libdl.so.2", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
stat("/nix/store/2gxzfkyl05040p97f7lzilv7yx3jj3v7-libseccomp-2.3.3/lib/x86_64/x86_64", 0x7fff8de74e90) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/2gxzfkyl05040p97f7lzilv7yx3jj3v7-libseccomp-2.3.3/lib/x86_64/libdl.so.2", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
stat("/nix/store/2gxzfkyl05040p97f7lzilv7yx3jj3v7-libseccomp-2.3.3/lib/x86_64", 0x7fff8de74e90) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/2gxzfkyl05040p97f7lzilv7yx3jj3v7-libseccomp-2.3.3/lib/x86_64/libdl.so.2", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
stat("/nix/store/2gxzfkyl05040p97f7lzilv7yx3jj3v7-libseccomp-2.3.3/lib/x86_64", 0x7fff8de74e90) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/2gxzfkyl05040p97f7lzilv7yx3jj3v7-libseccomp-2.3.3/lib/libdl.so.2", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
stat("/nix/store/2gxzfkyl05040p97f7lzilv7yx3jj3v7-libseccomp-2.3.3/lib", {st_mode=S_IFDIR|0555, st_size=7, ...}) = 0
openat(AT_FDCWD, "/nix/store/jhpzzb3xmxkapqvg9pnsx51psfnfawi0-aws-sdk-cpp-1.3.22/lib/tls/x86_64/x86_64/libdl.so.2", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
stat("/nix/store/jhpzzb3xmxkapqvg9pnsx51psfnfawi0-aws-sdk-cpp-1.3.22/lib/tls/x86_64/x86_64", 0x7fff8de74e90) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/jhpzzb3xmxkapqvg9pnsx51psfnfawi0-aws-sdk-cpp-1.3.22/lib/tls/x86_64/libdl.so.2", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
stat("/nix/store/jhpzzb3xmxkapqvg9pnsx51psfnfawi0-aws-sdk-cpp-1.3.22/lib/tls/x86_64", 0x7fff8de74e90) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/jhpzzb3xmxkapqvg9pnsx51psfnfawi0-aws-sdk-cpp-1.3.22/lib/tls/x86_64/libdl.so.2", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
stat("/nix/store/jhpzzb3xmxkapqvg9pnsx51psfnfawi0-aws-sdk-cpp-1.3.22/lib/tls/x86_64", 0x7fff8de74e90) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/jhpzzb3xmxkapqvg9pnsx51psfnfawi0-aws-sdk-cpp-1.3.22/lib/tls/libdl.so.2", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
stat("/nix/store/jhpzzb3xmxkapqvg9pnsx51psfnfawi0-aws-sdk-cpp-1.3.22/lib/tls", 0x7fff8de74e90) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/jhpzzb3xmxkapqvg9pnsx51psfnfawi0-aws-sdk-cpp-1.3.22/lib/x86_64/x86_64/libdl.so.2", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
stat("/nix/store/jhpzzb3xmxkapqvg9pnsx51psfnfawi0-aws-sdk-cpp-1.3.22/lib/x86_64/x86_64", 0x7fff8de74e90) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/jhpzzb3xmxkapqvg9pnsx51psfnfawi0-aws-sdk-cpp-1.3.22/lib/x86_64/libdl.so.2", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
stat("/nix/store/jhpzzb3xmxkapqvg9pnsx51psfnfawi0-aws-sdk-cpp-1.3.22/lib/x86_64", 0x7fff8de74e90) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/jhpzzb3xmxkapqvg9pnsx51psfnfawi0-aws-sdk-cpp-1.3.22/lib/x86_64/libdl.so.2", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
stat("/nix/store/jhpzzb3xmxkapqvg9pnsx51psfnfawi0-aws-sdk-cpp-1.3.22/lib/x86_64", 0x7fff8de74e90) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/jhpzzb3xmxkapqvg9pnsx51psfnfawi0-aws-sdk-cpp-1.3.22/lib/libdl.so.2", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
stat("/nix/store/jhpzzb3xmxkapqvg9pnsx51psfnfawi0-aws-sdk-cpp-1.3.22/lib", {st_mode=S_IFDIR|0555, st_size=4, ...}) = 0
openat(AT_FDCWD, "/nix/store/2kcrj1ksd2a14bm5sky182fv2xwfhfap-glibc-2.26-131/lib/libdl.so.2", O_RDONLY|O_CLOEXEC) = 3
read(3, "\177ELF\2\1\1\0\0\0\0\0\0\0\0\0\3\0>\0\1\0\0\0\0\16\0\0\0\0\0\0@\0\0\0\0\0\0\0\340@\0\0\0\0\0\0\0\0\0\0@\0008\0\10\0@\0\36\0\33\0\1\0\0\0\5\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0t \0\0\0\0\0\0t \0\0\0\0\0\0\0\0 \0\0\0\0\0\1\0\0\0\6\0\0\0\370,\0\0\0\0\0\0\370, \0\0\0\0\0\370, \0\0\0\0\0\20\3\0\0\0\0\0\0\230\3\0\0\0\0\0\0\0\0 \0\0\0\0\0\2\0\0\0\6\0\0\0 -\0\0\0\0\0\0 - \0\0\0\0\0 - \0\0\0\0\0\0\2\0\0\0\0\0\0\0\2\0\0\0\0\0\0\10\0\0\0\0\0\0\0\4\0\0\0\4\0\0\0\0\2\0\0\0\0\0\0\0\2\0\0\0\0\0\0\0\2\0\0\0\0\0\0D\0\0\0\0\0\0\0D\0\0\0\0\0\0\0\4\0\0\0\0\0\0\0P\345td\4\0\0\0`\32\0\0"..., 832) = 832
fstat(3, {st_mode=S_IFREG|0555, st_size=18528, ...}) = 0
mmap(NULL, 2109584, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) = 0x7204b0501000
mprotect(0x7204b0504000, 2093056, PROT_NONE) = 0
mmap(0x7204b0703000, 8192, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0x2000) = 0x7204b0703000
close(3) = 0
openat(AT_FDCWD, "/nix/store/r8zhwq9xylxw8a823kpvqy0kfqq4g52f-nix-2.0pre5968_a6c0b773/lib/libaws-cpp-sdk-s3.so", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/3v6sf9l1fwbb1phq9ccm71096d44k489-sqlite-3.21.0/lib/libaws-cpp-sdk-s3.so", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/lha30sclfhw3r77hsknjfcawqafb94xi-curl-7.58.0/lib/libaws-cpp-sdk-s3.so", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/kgq1fxb7c84r212kmq4p8zcxyi7fv51r-libsodium-1.0.16/lib/libaws-cpp-sdk-s3.so", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/mrphq5k83715mqjlk0vjcr3h0j7zs8ix-bzip2-1.0.6.0.1/lib/libaws-cpp-sdk-s3.so", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/2gxzfkyl05040p97f7lzilv7yx3jj3v7-libseccomp-2.3.3/lib/libaws-cpp-sdk-s3.so", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/jhpzzb3xmxkapqvg9pnsx51psfnfawi0-aws-sdk-cpp-1.3.22/lib/libaws-cpp-sdk-s3.so", O_RDONLY|O_CLOEXEC) = 3
read(3, "\177ELF\2\1\1\0\0\0\0\0\0\0\0\0\3\0>\0\1\0\0\0\300R\n\0\0\0\0\0@\0\0\0\0\0\0\0(\0029\0\0\0\0\0\0\0\0\0@\0008\0\10\0@\0\33\0\32\0\1\0\0\0\5\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0004\237!\0\0\0\0\0004\237!\0\0\0\0\0\0\0 \0\0\0\0\0\1\0\0\0\6\0\0\0p\250!\0\0\0\0\0p\250A\0\0\0\0\0p\250A\0\0\0\0\0\240\27\1\0\0\0\0\0\370\32\1\0\0\0\0\0\0\0 \0\0\0\0\0\2\0\0\0\6\0\0\0\310\224\"\0\0\0\0\0\310\224B\0\0\0\0\0\310\224B\0\0\0\0\0p\2\0\0\0\0\0\0p\2\0\0\0\0\0\0\10\0\0\0\0\0\0\0\4\0\0\0\4\0\0\0\0\2\0\0\0\0\0\0\0\2\0\0\0\0\0\0\0\2\0\0\0\0\0\0$\0\0\0\0\0\0\0$\0\0\0\0\0\0\0\4\0\0\0\0\0\0\0P\345td\4\0\0\0`\237\36\0"..., 832) = 832
fstat(3, {st_mode=S_IFREG|0555, st_size=3737832, ...}) = 0
mmap(NULL, 8192, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) = 0x7204b308a000
mmap(NULL, 4375400, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) = 0x7204b00d4000
mprotect(0x7204b02ee000, 2097152, PROT_NONE) = 0
mmap(0x7204b04ee000, 77824, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0x21a000) = 0x7204b04ee000
close(3) = 0
openat(AT_FDCWD, "/nix/store/r8zhwq9xylxw8a823kpvqy0kfqq4g52f-nix-2.0pre5968_a6c0b773/lib/libaws-cpp-sdk-core.so", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/3v6sf9l1fwbb1phq9ccm71096d44k489-sqlite-3.21.0/lib/libaws-cpp-sdk-core.so", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/lha30sclfhw3r77hsknjfcawqafb94xi-curl-7.58.0/lib/libaws-cpp-sdk-core.so", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/kgq1fxb7c84r212kmq4p8zcxyi7fv51r-libsodium-1.0.16/lib/libaws-cpp-sdk-core.so", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/mrphq5k83715mqjlk0vjcr3h0j7zs8ix-bzip2-1.0.6.0.1/lib/libaws-cpp-sdk-core.so", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/2gxzfkyl05040p97f7lzilv7yx3jj3v7-libseccomp-2.3.3/lib/libaws-cpp-sdk-core.so", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/jhpzzb3xmxkapqvg9pnsx51psfnfawi0-aws-sdk-cpp-1.3.22/lib/libaws-cpp-sdk-core.so", O_RDONLY|O_CLOEXEC) = 3
read(3, "\177ELF\2\1\1\0\0\0\0\0\0\0\0\0\3\0>\0\1\0\0\0p\5\5\0\0\0\0\0@\0\0\0\0\0\0\0\370\321\22\0\0\0\0\0\0\0\0\0@\0008\0\10\0@\0\33\0\32\0\1\0\0\0\5\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\244m\16\0\0\0\0\0\244m\16\0\0\0\0\0\0\0 \0\0\0\0\0\1\0\0\0\6\0\0\0x|\16\0\0\0\0\0x|.\0\0\0\0\0x|.\0\0\0\0\0He\0\0\0\0\0\0\300h\0\0\0\0\0\0\0\0 \0\0\0\0\0\2\0\0\0\6\0\0\0\210\272\16\0\0\0\0\0\210\272.\0\0\0\0\0\210\272.\0\0\0\0\0P\2\0\0\0\0\0\0P\2\0\0\0\0\0\0\10\0\0\0\0\0\0\0\4\0\0\0\4\0\0\0\0\2\0\0\0\0\0\0\0\2\0\0\0\0\0\0\0\2\0\0\0\0\0\0$\0\0\0\0\0\0\0$\0\0\0\0\0\0\0\4\0\0\0\0\0\0\0P\345td\4\0\0\0\320\r\r\0"..., 832) = 832
fstat(3, {st_mode=S_IFREG|0555, st_size=1235128, ...}) = 0
mmap(NULL, 3073336, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) = 0x7204afde5000
mprotect(0x7204afecc000, 2097152, PROT_NONE) = 0
mmap(0x7204b00cc000, 32768, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0xe7000) = 0x7204b00cc000
close(3) = 0
openat(AT_FDCWD, "/nix/store/r8zhwq9xylxw8a823kpvqy0kfqq4g52f-nix-2.0pre5968_a6c0b773/lib/libseccomp.so.2", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/3v6sf9l1fwbb1phq9ccm71096d44k489-sqlite-3.21.0/lib/libseccomp.so.2", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/lha30sclfhw3r77hsknjfcawqafb94xi-curl-7.58.0/lib/libseccomp.so.2", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/kgq1fxb7c84r212kmq4p8zcxyi7fv51r-libsodium-1.0.16/lib/libseccomp.so.2", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/mrphq5k83715mqjlk0vjcr3h0j7zs8ix-bzip2-1.0.6.0.1/lib/libseccomp.so.2", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/2gxzfkyl05040p97f7lzilv7yx3jj3v7-libseccomp-2.3.3/lib/libseccomp.so.2", O_RDONLY|O_CLOEXEC) = 3
read(3, "\177ELF\2\1\1\0\0\0\0\0\0\0\0\0\3\0>\0\1\0\0\0\360\372\1\0\0\0\0\0@\0\0\0\0\0\0\00088\4\0\0\0\0\0\0\0\0\0@\0008\0\7\0@\0\32\0\31\0\1\0\0\0\5\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0t\274\2\0\0\0\0\0t\274\2\0\0\0\0\0\0\0 \0\0\0\0\0\1\0\0\0\6\0\0\0\260\303\2\0\0\0\0\0\260\303\"\0\0\0\0\0\260\303\"\0\0\0\0\0hL\1\0\0\0\0\0pL\1\0\0\0\0\0\0\0 \0\0\0\0\0\2\0\0\0\6\0\0\0000\r\4\0\0\0\0\0000\r$\0\0\0\0\0000\r$\0\0\0\0\0\320\1\0\0\0\0\0\0\320\1\0\0\0\0\0\0\10\0\0\0\0\0\0\0P\345td\4\0\0\0P\236\2\0\0\0\0\0P\236\2\0\0\0\0\0P\236\2\0\0\0\0\0|\4\0\0\0\0\0\0|\4\0\0\0\0\0\0\4\0\0\0\0\0\0\0Q\345td\6\0\0\0\0\0\0\0"..., 832) = 832
fstat(3, {st_mode=S_IFREG|0555, st_size=278200, ...}) = 0
mmap(NULL, 2363424, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) = 0x7204afba3000
mprotect(0x7204afbcf000, 2097152, PROT_NONE) = 0
mmap(0x7204afdcf000, 90112, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0x2c000) = 0x7204afdcf000
close(3) = 0
openat(AT_FDCWD, "/nix/store/r8zhwq9xylxw8a823kpvqy0kfqq4g52f-nix-2.0pre5968_a6c0b773/lib/liblzma.so.5", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/chf54cl12ifswf6swh7kxpif477drihi-xz-5.2.3/lib/tls/x86_64/x86_64/liblzma.so.5", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
stat("/nix/store/chf54cl12ifswf6swh7kxpif477drihi-xz-5.2.3/lib/tls/x86_64/x86_64", 0x7fff8de74dd0) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/chf54cl12ifswf6swh7kxpif477drihi-xz-5.2.3/lib/tls/x86_64/liblzma.so.5", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
stat("/nix/store/chf54cl12ifswf6swh7kxpif477drihi-xz-5.2.3/lib/tls/x86_64", 0x7fff8de74dd0) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/chf54cl12ifswf6swh7kxpif477drihi-xz-5.2.3/lib/tls/x86_64/liblzma.so.5", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
stat("/nix/store/chf54cl12ifswf6swh7kxpif477drihi-xz-5.2.3/lib/tls/x86_64", 0x7fff8de74dd0) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/chf54cl12ifswf6swh7kxpif477drihi-xz-5.2.3/lib/tls/liblzma.so.5", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
stat("/nix/store/chf54cl12ifswf6swh7kxpif477drihi-xz-5.2.3/lib/tls", 0x7fff8de74dd0) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/chf54cl12ifswf6swh7kxpif477drihi-xz-5.2.3/lib/x86_64/x86_64/liblzma.so.5", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
stat("/nix/store/chf54cl12ifswf6swh7kxpif477drihi-xz-5.2.3/lib/x86_64/x86_64", 0x7fff8de74dd0) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/chf54cl12ifswf6swh7kxpif477drihi-xz-5.2.3/lib/x86_64/liblzma.so.5", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
stat("/nix/store/chf54cl12ifswf6swh7kxpif477drihi-xz-5.2.3/lib/x86_64", 0x7fff8de74dd0) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/chf54cl12ifswf6swh7kxpif477drihi-xz-5.2.3/lib/x86_64/liblzma.so.5", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
stat("/nix/store/chf54cl12ifswf6swh7kxpif477drihi-xz-5.2.3/lib/x86_64", 0x7fff8de74dd0) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/chf54cl12ifswf6swh7kxpif477drihi-xz-5.2.3/lib/liblzma.so.5", O_RDONLY|O_CLOEXEC) = 3
read(3, "\177ELF\2\1\1\0\0\0\0\0\0\0\0\0\3\0>\0\1\0\0\0@/\0\0\0\0\0\0@\0\0\0\0\0\0\0\340\221\2\0\0\0\0\0\0\0\0\0@\0008\0\7\0@\0\33\0\30\0\1\0\0\0\5\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0tD\2\0\0\0\0\0tD\2\0\0\0\0\0\0\0 \0\0\0\0\0\1\0\0\0\6\0\0\0000H\2\0\0\0\0\0000H\"\0\0\0\0\0000H\"\0\0\0\0\0\330\7\0\0\0\0\0\0\340\7\0\0\0\0\0\0\0\0 \0\0\0\0\0\2\0\0\0\6\0\0\0`K\2\0\0\0\0\0`K\"\0\0\0\0\0`K\"\0\0\0\0\0\0\2\0\0\0\0\0\0\0\2\0\0\0\0\0\0\10\0\0\0\0\0\0\0P\345td\4\0\0\0\300\0\2\0\0\0\0\0\300\0\2\0\0\0\0\0\300\0\2\0\0\0\0\0D\t\0\0\0\0\0\0D\t\0\0\0\0\0\0\4\0\0\0\0\0\0\0Q\345td\6\0\0\0\0\0\0\0"..., 832) = 832
fstat(3, {st_mode=S_IFREG|0555, st_size=170144, ...}) = 0
mmap(NULL, 2248720, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) = 0x7204af97d000
mprotect(0x7204af9a2000, 2093056, PROT_NONE) = 0
mmap(0x7204afba1000, 8192, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0x24000) = 0x7204afba1000
close(3) = 0
openat(AT_FDCWD, "/nix/store/r8zhwq9xylxw8a823kpvqy0kfqq4g52f-nix-2.0pre5968_a6c0b773/lib/libbrotlienc.so.1", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/chf54cl12ifswf6swh7kxpif477drihi-xz-5.2.3/lib/libbrotlienc.so.1", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/dl1hzcnxnbbcpf6zdhan58fghvdg3in8-openssl-1.0.2n/lib/libbrotlienc.so.1", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/mwgp39wfjlfd95dn09v0vywhm1x1v694-brotli-1.0.2-lib/lib/tls/x86_64/x86_64/libbrotlienc.so.1", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
stat("/nix/store/mwgp39wfjlfd95dn09v0vywhm1x1v694-brotli-1.0.2-lib/lib/tls/x86_64/x86_64", 0x7fff8de74da0) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/mwgp39wfjlfd95dn09v0vywhm1x1v694-brotli-1.0.2-lib/lib/tls/x86_64/libbrotlienc.so.1", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
stat("/nix/store/mwgp39wfjlfd95dn09v0vywhm1x1v694-brotli-1.0.2-lib/lib/tls/x86_64", 0x7fff8de74da0) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/mwgp39wfjlfd95dn09v0vywhm1x1v694-brotli-1.0.2-lib/lib/tls/x86_64/libbrotlienc.so.1", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
stat("/nix/store/mwgp39wfjlfd95dn09v0vywhm1x1v694-brotli-1.0.2-lib/lib/tls/x86_64", 0x7fff8de74da0) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/mwgp39wfjlfd95dn09v0vywhm1x1v694-brotli-1.0.2-lib/lib/tls/libbrotlienc.so.1", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
stat("/nix/store/mwgp39wfjlfd95dn09v0vywhm1x1v694-brotli-1.0.2-lib/lib/tls", 0x7fff8de74da0) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/mwgp39wfjlfd95dn09v0vywhm1x1v694-brotli-1.0.2-lib/lib/x86_64/x86_64/libbrotlienc.so.1", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
stat("/nix/store/mwgp39wfjlfd95dn09v0vywhm1x1v694-brotli-1.0.2-lib/lib/x86_64/x86_64", 0x7fff8de74da0) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/mwgp39wfjlfd95dn09v0vywhm1x1v694-brotli-1.0.2-lib/lib/x86_64/libbrotlienc.so.1", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
stat("/nix/store/mwgp39wfjlfd95dn09v0vywhm1x1v694-brotli-1.0.2-lib/lib/x86_64", 0x7fff8de74da0) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/mwgp39wfjlfd95dn09v0vywhm1x1v694-brotli-1.0.2-lib/lib/x86_64/libbrotlienc.so.1", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
stat("/nix/store/mwgp39wfjlfd95dn09v0vywhm1x1v694-brotli-1.0.2-lib/lib/x86_64", 0x7fff8de74da0) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/mwgp39wfjlfd95dn09v0vywhm1x1v694-brotli-1.0.2-lib/lib/libbrotlienc.so.1", O_RDONLY|O_CLOEXEC) = 3
read(3, "\177ELF\2\1\1\0\0\0\0\0\0\0\0\0\3\0>\0\1\0\0\0\220\f\0\0\0\0\0\0@\0\0\0\0\0\0\0P\177\10\0\0\0\0\0\0\0\0\0@\0008\0\7\0@\0\31\0\30\0\1\0\0\0\5\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\274>\10\0\0\0\0\0\274>\10\0\0\0\0\0\0\0 \0\0\0\0\0\1\0\0\0\6\0\0\0@M\10\0\0\0\0\0@M(\0\0\0\0\0@M(\0\0\0\0\0\310\2\0\0\0\0\0\0\320\2\0\0\0\0\0\0\0\0 \0\0\0\0\0\2\0\0\0\6\0\0\0PM\10\0\0\0\0\0PM(\0\0\0\0\0PM(\0\0\0\0\0\360\1\0\0\0\0\0\0\360\1\0\0\0\0\0\0\10\0\0\0\0\0\0\0P\345td\4\0\0\0@\n\10\0\0\0\0\0@\n\10\0\0\0\0\0@\n\10\0\0\0\0\0\304\4\0\0\0\0\0\0\304\4\0\0\0\0\0\0\4\0\0\0\0\0\0\0Q\345td\6\0\0\0\0\0\0\0"..., 832) = 832
fstat(3, {st_mode=S_IFREG|0555, st_size=558480, ...}) = 0
mmap(NULL, 2641936, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) = 0x7204af6f7000
mprotect(0x7204af77b000, 2097152, PROT_NONE) = 0
mmap(0x7204af97b000, 8192, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0x84000) = 0x7204af97b000
close(3) = 0
openat(AT_FDCWD, "/nix/store/r8zhwq9xylxw8a823kpvqy0kfqq4g52f-nix-2.0pre5968_a6c0b773/lib/libbrotlidec.so.1", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/chf54cl12ifswf6swh7kxpif477drihi-xz-5.2.3/lib/libbrotlidec.so.1", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/dl1hzcnxnbbcpf6zdhan58fghvdg3in8-openssl-1.0.2n/lib/libbrotlidec.so.1", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/mwgp39wfjlfd95dn09v0vywhm1x1v694-brotli-1.0.2-lib/lib/libbrotlidec.so.1", O_RDONLY|O_CLOEXEC) = 3
read(3, "\177ELF\2\1\1\0\0\0\0\0\0\0\0\0\3\0>\0\1\0\0\0\20\v\0\0\0\0\0\0@\0\0\0\0\0\0\0\20\322\0\0\0\0\0\0\0\0\0\0@\0008\0\7\0@\0\31\0\30\0\1\0\0\0\5\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0l\256\0\0\0\0\0\0l\256\0\0\0\0\0\0\0\0 \0\0\0\0\0\1\0\0\0\6\0\0\0\210\275\0\0\0\0\0\0\210\275 \0\0\0\0\0\210\275 \0\0\0\0\0\200\2\0\0\0\0\0\0\210\2\0\0\0\0\0\0\0\0 \0\0\0\0\0\2\0\0\0\6\0\0\0\230\275\0\0\0\0\0\0\230\275 \0\0\0\0\0\230\275 \0\0\0\0\0\360\1\0\0\0\0\0\0\360\1\0\0\0\0\0\0\10\0\0\0\0\0\0\0P\345td\4\0\0\0P\243\0\0\0\0\0\0P\243\0\0\0\0\0\0P\243\0\0\0\0\0\0\214\1\0\0\0\0\0\0\214\1\0\0\0\0\0\0\4\0\0\0\0\0\0\0Q\345td\6\0\0\0\0\0\0\0"..., 832) = 832
mmap(NULL, 8192, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) = 0x7204b3088000
fstat(3, {st_mode=S_IFREG|0555, st_size=55376, ...}) = 0
mmap(NULL, 2146320, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) = 0x7204af4ea000
mprotect(0x7204af4f5000, 2097152, PROT_NONE) = 0
mmap(0x7204af6f5000, 8192, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0xb000) = 0x7204af6f5000
close(3) = 0
openat(AT_FDCWD, "/nix/store/y1wvrg5ckyy3472fpknf468cxfk8wkw0-nghttp2-1.24.0-lib/lib/tls/x86_64/x86_64/libnghttp2.so.14", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
stat("/nix/store/y1wvrg5ckyy3472fpknf468cxfk8wkw0-nghttp2-1.24.0-lib/lib/tls/x86_64/x86_64", 0x7fff8de74d40) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/y1wvrg5ckyy3472fpknf468cxfk8wkw0-nghttp2-1.24.0-lib/lib/tls/x86_64/libnghttp2.so.14", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
stat("/nix/store/y1wvrg5ckyy3472fpknf468cxfk8wkw0-nghttp2-1.24.0-lib/lib/tls/x86_64", 0x7fff8de74d40) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/y1wvrg5ckyy3472fpknf468cxfk8wkw0-nghttp2-1.24.0-lib/lib/tls/x86_64/libnghttp2.so.14", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
stat("/nix/store/y1wvrg5ckyy3472fpknf468cxfk8wkw0-nghttp2-1.24.0-lib/lib/tls/x86_64", 0x7fff8de74d40) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/y1wvrg5ckyy3472fpknf468cxfk8wkw0-nghttp2-1.24.0-lib/lib/tls/libnghttp2.so.14", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
stat("/nix/store/y1wvrg5ckyy3472fpknf468cxfk8wkw0-nghttp2-1.24.0-lib/lib/tls", 0x7fff8de74d40) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/y1wvrg5ckyy3472fpknf468cxfk8wkw0-nghttp2-1.24.0-lib/lib/x86_64/x86_64/libnghttp2.so.14", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
stat("/nix/store/y1wvrg5ckyy3472fpknf468cxfk8wkw0-nghttp2-1.24.0-lib/lib/x86_64/x86_64", 0x7fff8de74d40) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/y1wvrg5ckyy3472fpknf468cxfk8wkw0-nghttp2-1.24.0-lib/lib/x86_64/libnghttp2.so.14", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
stat("/nix/store/y1wvrg5ckyy3472fpknf468cxfk8wkw0-nghttp2-1.24.0-lib/lib/x86_64", 0x7fff8de74d40) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/y1wvrg5ckyy3472fpknf468cxfk8wkw0-nghttp2-1.24.0-lib/lib/x86_64/libnghttp2.so.14", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
stat("/nix/store/y1wvrg5ckyy3472fpknf468cxfk8wkw0-nghttp2-1.24.0-lib/lib/x86_64", 0x7fff8de74d40) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/y1wvrg5ckyy3472fpknf468cxfk8wkw0-nghttp2-1.24.0-lib/lib/libnghttp2.so.14", O_RDONLY|O_CLOEXEC) = 3
read(3, "\177ELF\2\1\1\0\0\0\0\0\0\0\0\0\3\0>\0\1\0\0\0`K\0\0\0\0\0\0@\0\0\0\0\0\0\0\330\276\2\0\0\0\0\0\0\0\0\0@\0008\0\7\0@\0\31\0\30\0\1\0\0\0\5\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\204)\2\0\0\0\0\0\204)\2\0\0\0\0\0\0\0 \0\0\0\0\0\1\0\0\0\6\0\0\0\260,\2\0\0\0\0\0\260,\"\0\0\0\0\0\260,\"\0\0\0\0\0008\"\0\0\0\0\0\0@\"\0\0\0\0\0\0\0\0 \0\0\0\0\0\2\0\0\0\6\0\0\0\300,\2\0\0\0\0\0\300,\"\0\0\0\0\0\300,\"\0\0\0\0\0\320\1\0\0\0\0\0\0\320\1\0\0\0\0\0\0\10\0\0\0\0\0\0\0P\345td\4\0\0\0\30\326\1\0\0\0\0\0\30\326\1\0\0\0\0\0\30\326\1\0\0\0\0\0\264\r\0\0\0\0\0\0\264\r\0\0\0\0\0\0\4\0\0\0\0\0\0\0Q\345td\6\0\0\0\0\0\0\0"..., 832) = 832
fstat(3, {st_mode=S_IFREG|0555, st_size=181528, ...}) = 0
mmap(NULL, 2248432, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) = 0x7204af2c5000
mprotect(0x7204af2e8000, 2093056, PROT_NONE) = 0
mmap(0x7204af4e7000, 12288, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0x22000) = 0x7204af4e7000
close(3) = 0
openat(AT_FDCWD, "/nix/store/y1wvrg5ckyy3472fpknf468cxfk8wkw0-nghttp2-1.24.0-lib/lib/libssh2.so.1", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/zqi323lr2dyp0csnrrqns37svgmr0f5k-libkrb5-1.15.2/lib/tls/x86_64/x86_64/libssh2.so.1", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
stat("/nix/store/zqi323lr2dyp0csnrrqns37svgmr0f5k-libkrb5-1.15.2/lib/tls/x86_64/x86_64", 0x7fff8de74d10) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/zqi323lr2dyp0csnrrqns37svgmr0f5k-libkrb5-1.15.2/lib/tls/x86_64/libssh2.so.1", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
stat("/nix/store/zqi323lr2dyp0csnrrqns37svgmr0f5k-libkrb5-1.15.2/lib/tls/x86_64", 0x7fff8de74d10) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/zqi323lr2dyp0csnrrqns37svgmr0f5k-libkrb5-1.15.2/lib/tls/x86_64/libssh2.so.1", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
stat("/nix/store/zqi323lr2dyp0csnrrqns37svgmr0f5k-libkrb5-1.15.2/lib/tls/x86_64", 0x7fff8de74d10) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/zqi323lr2dyp0csnrrqns37svgmr0f5k-libkrb5-1.15.2/lib/tls/libssh2.so.1", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
stat("/nix/store/zqi323lr2dyp0csnrrqns37svgmr0f5k-libkrb5-1.15.2/lib/tls", 0x7fff8de74d10) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/zqi323lr2dyp0csnrrqns37svgmr0f5k-libkrb5-1.15.2/lib/x86_64/x86_64/libssh2.so.1", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
stat("/nix/store/zqi323lr2dyp0csnrrqns37svgmr0f5k-libkrb5-1.15.2/lib/x86_64/x86_64", 0x7fff8de74d10) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/zqi323lr2dyp0csnrrqns37svgmr0f5k-libkrb5-1.15.2/lib/x86_64/libssh2.so.1", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
stat("/nix/store/zqi323lr2dyp0csnrrqns37svgmr0f5k-libkrb5-1.15.2/lib/x86_64", 0x7fff8de74d10) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/zqi323lr2dyp0csnrrqns37svgmr0f5k-libkrb5-1.15.2/lib/x86_64/libssh2.so.1", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
stat("/nix/store/zqi323lr2dyp0csnrrqns37svgmr0f5k-libkrb5-1.15.2/lib/x86_64", 0x7fff8de74d10) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/zqi323lr2dyp0csnrrqns37svgmr0f5k-libkrb5-1.15.2/lib/libssh2.so.1", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
stat("/nix/store/zqi323lr2dyp0csnrrqns37svgmr0f5k-libkrb5-1.15.2/lib", {st_mode=S_IFDIR|0555, st_size=37, ...}) = 0
openat(AT_FDCWD, "/nix/store/r43dk927l97n78rff7hnvsq49f3szkg6-zlib-1.2.11/lib/tls/x86_64/x86_64/libssh2.so.1", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
stat("/nix/store/r43dk927l97n78rff7hnvsq49f3szkg6-zlib-1.2.11/lib/tls/x86_64/x86_64", 0x7fff8de74d10) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/r43dk927l97n78rff7hnvsq49f3szkg6-zlib-1.2.11/lib/tls/x86_64/libssh2.so.1", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
stat("/nix/store/r43dk927l97n78rff7hnvsq49f3szkg6-zlib-1.2.11/lib/tls/x86_64", 0x7fff8de74d10) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/r43dk927l97n78rff7hnvsq49f3szkg6-zlib-1.2.11/lib/tls/x86_64/libssh2.so.1", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
stat("/nix/store/r43dk927l97n78rff7hnvsq49f3szkg6-zlib-1.2.11/lib/tls/x86_64", 0x7fff8de74d10) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/r43dk927l97n78rff7hnvsq49f3szkg6-zlib-1.2.11/lib/tls/libssh2.so.1", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
stat("/nix/store/r43dk927l97n78rff7hnvsq49f3szkg6-zlib-1.2.11/lib/tls", 0x7fff8de74d10) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/r43dk927l97n78rff7hnvsq49f3szkg6-zlib-1.2.11/lib/x86_64/x86_64/libssh2.so.1", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
stat("/nix/store/r43dk927l97n78rff7hnvsq49f3szkg6-zlib-1.2.11/lib/x86_64/x86_64", 0x7fff8de74d10) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/r43dk927l97n78rff7hnvsq49f3szkg6-zlib-1.2.11/lib/x86_64/libssh2.so.1", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
stat("/nix/store/r43dk927l97n78rff7hnvsq49f3szkg6-zlib-1.2.11/lib/x86_64", 0x7fff8de74d10) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/r43dk927l97n78rff7hnvsq49f3szkg6-zlib-1.2.11/lib/x86_64/libssh2.so.1", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
stat("/nix/store/r43dk927l97n78rff7hnvsq49f3szkg6-zlib-1.2.11/lib/x86_64", 0x7fff8de74d10) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/r43dk927l97n78rff7hnvsq49f3szkg6-zlib-1.2.11/lib/libssh2.so.1", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
stat("/nix/store/r43dk927l97n78rff7hnvsq49f3szkg6-zlib-1.2.11/lib", {st_mode=S_IFDIR|0555, st_size=5, ...}) = 0
openat(AT_FDCWD, "/nix/store/dl1hzcnxnbbcpf6zdhan58fghvdg3in8-openssl-1.0.2n/lib/libssh2.so.1", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/c311jc1k0i9d6a7gvk7dmbsgsmcp0kzn-libssh2-1.8.0/lib/tls/x86_64/x86_64/libssh2.so.1", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
stat("/nix/store/c311jc1k0i9d6a7gvk7dmbsgsmcp0kzn-libssh2-1.8.0/lib/tls/x86_64/x86_64", 0x7fff8de74d10) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/c311jc1k0i9d6a7gvk7dmbsgsmcp0kzn-libssh2-1.8.0/lib/tls/x86_64/libssh2.so.1", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
stat("/nix/store/c311jc1k0i9d6a7gvk7dmbsgsmcp0kzn-libssh2-1.8.0/lib/tls/x86_64", 0x7fff8de74d10) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/c311jc1k0i9d6a7gvk7dmbsgsmcp0kzn-libssh2-1.8.0/lib/tls/x86_64/libssh2.so.1", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
stat("/nix/store/c311jc1k0i9d6a7gvk7dmbsgsmcp0kzn-libssh2-1.8.0/lib/tls/x86_64", 0x7fff8de74d10) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/c311jc1k0i9d6a7gvk7dmbsgsmcp0kzn-libssh2-1.8.0/lib/tls/libssh2.so.1", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
stat("/nix/store/c311jc1k0i9d6a7gvk7dmbsgsmcp0kzn-libssh2-1.8.0/lib/tls", 0x7fff8de74d10) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/c311jc1k0i9d6a7gvk7dmbsgsmcp0kzn-libssh2-1.8.0/lib/x86_64/x86_64/libssh2.so.1", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
stat("/nix/store/c311jc1k0i9d6a7gvk7dmbsgsmcp0kzn-libssh2-1.8.0/lib/x86_64/x86_64", 0x7fff8de74d10) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/c311jc1k0i9d6a7gvk7dmbsgsmcp0kzn-libssh2-1.8.0/lib/x86_64/libssh2.so.1", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
stat("/nix/store/c311jc1k0i9d6a7gvk7dmbsgsmcp0kzn-libssh2-1.8.0/lib/x86_64", 0x7fff8de74d10) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/c311jc1k0i9d6a7gvk7dmbsgsmcp0kzn-libssh2-1.8.0/lib/x86_64/libssh2.so.1", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
stat("/nix/store/c311jc1k0i9d6a7gvk7dmbsgsmcp0kzn-libssh2-1.8.0/lib/x86_64", 0x7fff8de74d10) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/c311jc1k0i9d6a7gvk7dmbsgsmcp0kzn-libssh2-1.8.0/lib/libssh2.so.1", O_RDONLY|O_CLOEXEC) = 3
read(3, "\177ELF\2\1\1\0\0\0\0\0\0\0\0\0\3\0>\0\1\0\0\0\360U\0\0\0\0\0\0@\0\0\0\0\0\0\0\30\33\3\0\0\0\0\0\0\0\0\0@\0008\0\7\0@\0\32\0\31\0\1\0\0\0\5\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\324\255\2\0\0\0\0\0\324\255\2\0\0\0\0\0\0\0 \0\0\0\0\0\1\0\0\0\6\0\0\0p\261\2\0\0\0\0\0p\261\"\0\0\0\0\0p\261\"\0\0\0\0\0008\20\0\0\0\0\0\0H\20\0\0\0\0\0\0\0\0 \0\0\0\0\0\2\0\0\0\6\0\0\0\340\271\2\0\0\0\0\0\340\271\"\0\0\0\0\0\340\271\"\0\0\0\0\0\0\2\0\0\0\0\0\0\0\2\0\0\0\0\0\0\10\0\0\0\0\0\0\0P\345td\4\0\0\0\244\\\2\0\0\0\0\0\244\\\2\0\0\0\0\0\244\\\2\0\0\0\0\0\374\10\0\0\0\0\0\0\374\10\0\0\0\0\0\0\4\0\0\0\0\0\0\0Q\345td\6\0\0\0\0\0\0\0"..., 832) = 832
fstat(3, {st_mode=S_IFREG|0555, st_size=205208, ...}) = 0
mmap(NULL, 2277816, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) = 0x7204af098000
mprotect(0x7204af0c3000, 2097152, PROT_NONE) = 0
mmap(0x7204af2c3000, 8192, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0x2b000) = 0x7204af2c3000
close(3) = 0
openat(AT_FDCWD, "/nix/store/y1wvrg5ckyy3472fpknf468cxfk8wkw0-nghttp2-1.24.0-lib/lib/libssl.so.1.0.0", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/zqi323lr2dyp0csnrrqns37svgmr0f5k-libkrb5-1.15.2/lib/libssl.so.1.0.0", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/r43dk927l97n78rff7hnvsq49f3szkg6-zlib-1.2.11/lib/libssl.so.1.0.0", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/dl1hzcnxnbbcpf6zdhan58fghvdg3in8-openssl-1.0.2n/lib/libssl.so.1.0.0", O_RDONLY|O_CLOEXEC) = 3
read(3, "\177ELF\2\1\1\0\0\0\0\0\0\0\0\0\3\0>\0\1\0\0\0\0\222\1\0\0\0\0\0@\0\0\0\0\0\0\0008\236\7\0\0\0\0\0\0\0\0\0@\0008\0\10\0@\0\33\0\32\0\1\0\0\0\5\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0242\6\0\0\0\0\0\0242\6\0\0\0\0\0\0\0 \0\0\0\0\0\1\0\0\0\6\0\0\0\0208\6\0\0\0\0\0\0208&\0\0\0\0\0\0208&\0\0\0\0\0000\235\0\0\0\0\0\0 \236\0\0\0\0\0\0\0\0 \0\0\0\0\0\2\0\0\0\6\0\0\0hq\6\0\0\0\0\0hq&\0\0\0\0\0hq&\0\0\0\0\0\0\2\0\0\0\0\0\0\0\2\0\0\0\0\0\0\10\0\0\0\0\0\0\0\4\0\0\0\4\0\0\0\0\2\0\0\0\0\0\0\0\2\0\0\0\0\0\0\0\2\0\0\0\0\0\0$\0\0\0\0\0\0\0$\0\0\0\0\0\0\0\4\0\0\0\0\0\0\0P\345td\4\0\0\0\314\241\5\0"..., 832) = 832
fstat(3, {st_mode=S_IFREG|0555, st_size=500984, ...}) = 0
mmap(NULL, 2545200, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) = 0x7204aee2a000
mprotect(0x7204aee8e000, 2093056, PROT_NONE) = 0
mmap(0x7204af08d000, 45056, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0x63000) = 0x7204af08d000
close(3) = 0
openat(AT_FDCWD, "/nix/store/y1wvrg5ckyy3472fpknf468cxfk8wkw0-nghttp2-1.24.0-lib/lib/libgssapi_krb5.so.2", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/zqi323lr2dyp0csnrrqns37svgmr0f5k-libkrb5-1.15.2/lib/libgssapi_krb5.so.2", O_RDONLY|O_CLOEXEC) = 3
read(3, "\177ELF\2\1\1\0\0\0\0\0\0\0\0\0\3\0>\0\1\0\0\0\20\275\0\0\0\0\0\0@\0\0\0\0\0\0\0\320M\5\0\0\0\0\0\0\0\0\0@\0008\0\7\0@\0\33\0\32\0\1\0\0\0\5\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\fo\4\0\0\0\0\0\fo\4\0\0\0\0\0\0\0 \0\0\0\0\0\1\0\0\0\6\0\0\0Hu\4\0\0\0\0\0Hu$\0\0\0\0\0Hu$\0\0\0\0\0P#\0\0\0\0\0\0h%\0\0\0\0\0\0\0\0 \0\0\0\0\0\2\0\0\0\6\0\0\0\210\201\4\0\0\0\0\0\210\201$\0\0\0\0\0\210\201$\0\0\0\0\0P\2\0\0\0\0\0\0P\2\0\0\0\0\0\0\10\0\0\0\0\0\0\0P\345td\4\0\0\0@\356\3\0\0\0\0\0@\356\3\0\0\0\0\0@\356\3\0\0\0\0\0\374\16\0\0\0\0\0\0\374\16\0\0\0\0\0\0\4\0\0\0\0\0\0\0Q\345td\6\0\0\0\0\0\0\0"..., 832) = 832
fstat(3, {st_mode=S_IFREG|0444, st_size=349328, ...}) = 0
mmap(NULL, 8192, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) = 0x7204b3086000
mmap(NULL, 2398896, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) = 0x7204aebe0000
mprotect(0x7204aec27000, 2097152, PROT_NONE) = 0
mmap(0x7204aee27000, 12288, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0x47000) = 0x7204aee27000
close(3) = 0
openat(AT_FDCWD, "/nix/store/y1wvrg5ckyy3472fpknf468cxfk8wkw0-nghttp2-1.24.0-lib/lib/libkrb5.so.3", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/zqi323lr2dyp0csnrrqns37svgmr0f5k-libkrb5-1.15.2/lib/libkrb5.so.3", O_RDONLY|O_CLOEXEC) = 3
read(3, "\177ELF\2\1\1\0\0\0\0\0\0\0\0\0\3\0>\0\1\0\0\0\3409\2\0\0\0\0\0@\0\0\0\0\0\0\0\10\17\20\0\0\0\0\0\0\0\0\0@\0008\0\7\0@\0\33\0\32\0\1\0\0\0\5\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0d>\f\0\0\0\0\0d>\f\0\0\0\0\0\0\0 \0\0\0\0\0\1\0\0\0\6\0\0\0\340M\f\0\0\0\0\0\340M,\0\0\0\0\0\340M,\0\0\0\0\0\250\363\0\0\0\0\0\0\20\366\0\0\0\0\0\0\0\0 \0\0\0\0\0\2\0\0\0\6\0\0\0\340\30\r\0\0\0\0\0\340\30-\0\0\0\0\0\340\30-\0\0\0\0\0000\2\0\0\0\0\0\0000\2\0\0\0\0\0\0\10\0\0\0\0\0\0\0P\345td\4\0\0\0\240\336\n\0\0\0\0\0\240\336\n\0\0\0\0\0\240\336\n\0\0\0\0\0\0342\0\0\0\0\0\0\0342\0\0\0\0\0\0\4\0\0\0\0\0\0\0Q\345td\6\0\0\0\0\0\0\0"..., 832) = 832
fstat(3, {st_mode=S_IFREG|0444, st_size=1054152, ...}) = 0
mmap(NULL, 2966512, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) = 0x7204ae90b000
mprotect(0x7204ae9cf000, 2097152, PROT_NONE) = 0
mmap(0x7204aebcf000, 69632, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0xc4000) = 0x7204aebcf000
close(3) = 0
openat(AT_FDCWD, "/nix/store/y1wvrg5ckyy3472fpknf468cxfk8wkw0-nghttp2-1.24.0-lib/lib/libk5crypto.so.3", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/zqi323lr2dyp0csnrrqns37svgmr0f5k-libkrb5-1.15.2/lib/libk5crypto.so.3", O_RDONLY|O_CLOEXEC) = 3
read(3, "\177ELF\2\1\1\0\0\0\0\0\0\0\0\0\3\0>\0\1\0\0\0\340H\0\0\0\0\0\0@\0\0\0\0\0\0\0\200F\3\0\0\0\0\0\0\0\0\0@\0008\0\7\0@\0\33\0\32\0\1\0\0\0\5\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\314\342\2\0\0\0\0\0\314\342\2\0\0\0\0\0\0\0 \0\0\0\0\0\1\0\0\0\6\0\0\0\310\352\2\0\0\0\0\0\310\352\"\0\0\0\0\0\310\352\"\0\0\0\0\0p\25\0\0\0\0\0\0P$\0\0\0\0\0\0\0\0 \0\0\0\0\0\2\0\0\0\6\0\0\0\350\372\2\0\0\0\0\0\350\372\"\0\0\0\0\0\350\372\"\0\0\0\0\0\20\2\0\0\0\0\0\0\20\2\0\0\0\0\0\0\10\0\0\0\0\0\0\0P\345td\4\0\0\0T\242\2\0\0\0\0\0T\242\2\0\0\0\0\0T\242\2\0\0\0\0\0\34\10\0\0\0\0\0\0\34\10\0\0\0\0\0\0\4\0\0\0\0\0\0\0Q\345td\6\0\0\0\0\0\0\0"..., 832) = 832
fstat(3, {st_mode=S_IFREG|0444, st_size=216384, ...}) = 0
mmap(NULL, 2297624, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) = 0x7204ae6da000
mprotect(0x7204ae709000, 2093056, PROT_NONE) = 0
mmap(0x7204ae908000, 12288, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0x2e000) = 0x7204ae908000
close(3) = 0
openat(AT_FDCWD, "/nix/store/y1wvrg5ckyy3472fpknf468cxfk8wkw0-nghttp2-1.24.0-lib/lib/libcom_err.so.3", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/zqi323lr2dyp0csnrrqns37svgmr0f5k-libkrb5-1.15.2/lib/libcom_err.so.3", O_RDONLY|O_CLOEXEC) = 3
read(3, "\177ELF\2\1\1\0\0\0\0\0\0\0\0\0\3\0>\0\1\0\0\0\0\20\0\0\0\0\0\0@\0\0\0\0\0\0\0\340A\0\0\0\0\0\0\0\0\0\0@\0008\0\7\0@\0\32\0\31\0\1\0\0\0\5\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0t \0\0\0\0\0\0t \0\0\0\0\0\0\0\0 \0\0\0\0\0\1\0\0\0\6\0\0\0\300,\0\0\0\0\0\0\300, \0\0\0\0\0\300, \0\0\0\0\0h\3\0\0\0\0\0\0\20\4\0\0\0\0\0\0\0\0 \0\0\0\0\0\2\0\0\0\6\0\0\0\330,\0\0\0\0\0\0\330, \0\0\0\0\0\330, \0\0\0\0\0\20\2\0\0\0\0\0\0\20\2\0\0\0\0\0\0\10\0\0\0\0\0\0\0P\345td\4\0\0\0L\34\0\0\0\0\0\0L\34\0\0\0\0\0\0L\34\0\0\0\0\0\0\264\0\0\0\0\0\0\0\264\0\0\0\0\0\0\0\4\0\0\0\0\0\0\0Q\345td\6\0\0\0\0\0\0\0"..., 832) = 832
fstat(3, {st_mode=S_IFREG|0444, st_size=18528, ...}) = 0
mmap(NULL, 2109648, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) = 0x7204ae4d6000
mprotect(0x7204ae4d9000, 2093056, PROT_NONE) = 0
mmap(0x7204ae6d8000, 8192, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0x2000) = 0x7204ae6d8000
close(3) = 0
openat(AT_FDCWD, "/nix/store/y1wvrg5ckyy3472fpknf468cxfk8wkw0-nghttp2-1.24.0-lib/lib/libz.so.1", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/zqi323lr2dyp0csnrrqns37svgmr0f5k-libkrb5-1.15.2/lib/libz.so.1", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/r43dk927l97n78rff7hnvsq49f3szkg6-zlib-1.2.11/lib/libz.so.1", O_RDONLY|O_CLOEXEC) = 3
read(3, "\177ELF\2\1\1\0\0\0\0\0\0\0\0\0\3\0>\0\1\0\0\0`#\0\0\0\0\0\0@\0\0\0\0\0\0\0 \202\1\0\0\0\0\0\0\0\0\0@\0008\0\7\0@\0\34\0\31\0\1\0\0\0\5\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\fS\1\0\0\0\0\0\fS\1\0\0\0\0\0\0\0 \0\0\0\0\0\1\0\0\0\6\0\0\0\350Z\1\0\0\0\0\0\350Z!\0\0\0\0\0\350Z!\0\0\0\0\0 \5\0\0\0\0\0\0(\5\0\0\0\0\0\0\0\0 \0\0\0\0\0\2\0\0\0\6\0\0\0P\\\1\0\0\0\0\0P\\!\0\0\0\0\0P\\!\0\0\0\0\0\360\1\0\0\0\0\0\0\360\1\0\0\0\0\0\0\10\0\0\0\0\0\0\0P\345td\4\0\0\0P5\1\0\0\0\0\0P5\1\0\0\0\0\0P5\1\0\0\0\0\0\24\4\0\0\0\0\0\0\24\4\0\0\0\0\0\0\4\0\0\0\0\0\0\0Q\345td\6\0\0\0\0\0\0\0"..., 832) = 832
fstat(3, {st_mode=S_IFREG|0555, st_size=100640, ...}) = 0
mmap(NULL, 2187280, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) = 0x7204ae2bf000
mprotect(0x7204ae2d5000, 2093056, PROT_NONE) = 0
mmap(0x7204ae4d4000, 8192, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0x15000) = 0x7204ae4d4000
close(3) = 0
openat(AT_FDCWD, "/nix/store/mwgp39wfjlfd95dn09v0vywhm1x1v694-brotli-1.0.2-lib/lib/libbrotlicommon.so.1", O_RDONLY|O_CLOEXEC) = 3
read(3, "\177ELF\2\1\1\0\0\0\0\0\0\0\0\0\3\0>\0\1\0\0\0\200\6\0\0\0\0\0\0@\0\0\0\0\0\0\0\370\367\1\0\0\0\0\0\0\0\0\0@\0008\0\7\0@\0\31\0\30\0\1\0\0\0\5\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\374\347\1\0\0\0\0\0\374\347\1\0\0\0\0\0\0\0 \0\0\0\0\0\1\0\0\0\6\0\0\0\330\355\1\0\0\0\0\0\330\355!\0\0\0\0\0\330\355!\0\0\0\0\0\370\2\0\0\0\0\0\0\0\3\0\0\0\0\0\0\0\0 \0\0\0\0\0\2\0\0\0\6\0\0\0\350\355\1\0\0\0\0\0\350\355!\0\0\0\0\0\350\355!\0\0\0\0\0\340\1\0\0\0\0\0\0\340\1\0\0\0\0\0\0\10\0\0\0\0\0\0\0P\345td\4\0\0\0@\347\1\0\0\0\0\0@\347\1\0\0\0\0\0@\347\1\0\0\0\0\0,\0\0\0\0\0\0\0,\0\0\0\0\0\0\0\4\0\0\0\0\0\0\0Q\345td\6\0\0\0\0\0\0\0"..., 832) = 832
fstat(3, {st_mode=S_IFREG|0555, st_size=130616, ...}) = 0
mmap(NULL, 8192, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) = 0x7204b3084000
mmap(NULL, 2224344, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) = 0x7204ae09f000
mprotect(0x7204ae0be000, 2093056, PROT_NONE) = 0
mmap(0x7204ae2bd000, 8192, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0x1e000) = 0x7204ae2bd000
close(3) = 0
openat(AT_FDCWD, "/nix/store/zqi323lr2dyp0csnrrqns37svgmr0f5k-libkrb5-1.15.2/lib/libkrb5support.so.0", O_RDONLY|O_CLOEXEC) = 3
read(3, "\177ELF\2\1\1\0\0\0\0\0\0\0\0\0\3\0>\0\1\0\0\0000.\0\0\0\0\0\0@\0\0\0\0\0\0\0h\337\0\0\0\0\0\0\0\0\0\0@\0008\0\7\0@\0\33\0\32\0\1\0\0\0\5\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\354\242\0\0\0\0\0\0\354\242\0\0\0\0\0\0\0\0 \0\0\0\0\0\1\0\0\0\6\0\0\0x\252\0\0\0\0\0\0x\252 \0\0\0\0\0x\252 \0\0\0\0\0p\6\0\0\0\0\0\0\20\10\0\0\0\0\0\0\0\0 \0\0\0\0\0\2\0\0\0\6\0\0\0\250\252\0\0\0\0\0\0\250\252 \0\0\0\0\0\250\252 \0\0\0\0\0\20\2\0\0\0\0\0\0\20\2\0\0\0\0\0\0\10\0\0\0\0\0\0\0P\345td\4\0\0\0d\206\0\0\0\0\0\0d\206\0\0\0\0\0\0d\206\0\0\0\0\0\0l\4\0\0\0\0\0\0l\4\0\0\0\0\0\0\4\0\0\0\0\0\0\0Q\345td\6\0\0\0\0\0\0\0"..., 832) = 832
fstat(3, {st_mode=S_IFREG|0444, st_size=58920, ...}) = 0
mmap(NULL, 2142856, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) = 0x7204ade93000
mprotect(0x7204ade9e000, 2093056, PROT_NONE) = 0
mmap(0x7204ae09d000, 8192, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0xa000) = 0x7204ae09d000
close(3) = 0
openat(AT_FDCWD, "/nix/store/zqi323lr2dyp0csnrrqns37svgmr0f5k-libkrb5-1.15.2/lib/libresolv.so.2", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/2kcrj1ksd2a14bm5sky182fv2xwfhfap-glibc-2.26-131/lib/libresolv.so.2", O_RDONLY|O_CLOEXEC) = 3
read(3, "\177ELF\2\1\1\0\0\0\0\0\0\0\0\0\3\0>\0\1\0\0\0\2206\0\0\0\0\0\0@\0\0\0\0\0\0\0(b\1\0\0\0\0\0\0\0\0\0@\0008\0\10\0@\0\37\0\34\0\1\0\0\0\5\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\354\"\1\0\0\0\0\0\354\"\1\0\0\0\0\0\0\0 \0\0\0\0\0\1\0\0\0\6\0\0\0H$\1\0\0\0\0\0H$!\0\0\0\0\0H$!\0\0\0\0\0X\f\0\0\0\0\0\0X4\0\0\0\0\0\0\0\0 \0\0\0\0\0\2\0\0\0\6\0\0\0\350+\1\0\0\0\0\0\350+!\0\0\0\0\0\350+!\0\0\0\0\0\360\1\0\0\0\0\0\0\360\1\0\0\0\0\0\0\10\0\0\0\0\0\0\0\4\0\0\0\4\0\0\0\0\2\0\0\0\0\0\0\0\2\0\0\0\0\0\0\0\2\0\0\0\0\0\0D\0\0\0\0\0\0\0D\0\0\0\0\0\0\0\4\0\0\0\0\0\0\0P\345td\4\0\0\0\244\373\0\0"..., 832) = 832
fstat(3, {st_mode=S_IFREG|0555, st_size=92648, ...}) = 0
mmap(NULL, 2185376, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) = 0x7204adc7d000
mprotect(0x7204adc90000, 2093056, PROT_NONE) = 0
mmap(0x7204ade8f000, 8192, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0x12000) = 0x7204ade8f000
mmap(0x7204ade91000, 6304, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x7204ade91000
close(3) = 0
mmap(NULL, 8192, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) = 0x7204b3082000
mmap(NULL, 8192, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) = 0x7204b3080000
mmap(NULL, 8192, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) = 0x7204b307e000
arch_prctl(ARCH_SET_FS, 0x7204b30815c0) = 0
mprotect(0x7204b146d000, 16384, PROT_READ) = 0
mprotect(0x7204ade8f000, 4096, PROT_READ) = 0
mprotect(0x7204b0703000, 4096, PROT_READ) = 0
mprotect(0x7204ae09d000, 4096, PROT_READ) = 0
mprotect(0x7204b1bf5000, 4096, PROT_READ) = 0
mprotect(0x7204ae2bd000, 4096, PROT_READ) = 0
mprotect(0x7204ae4d4000, 4096, PROT_READ) = 0
mprotect(0x7204ae6d8000, 4096, PROT_READ) = 0
mprotect(0x7204ae908000, 8192, PROT_READ) = 0
mprotect(0x7204aebcf000, 61440, PROT_READ) = 0
mprotect(0x7204aee27000, 8192, PROT_READ) = 0
mprotect(0x7204b109a000, 114688, PROT_READ) = 0
mprotect(0x7204af08d000, 20480, PROT_READ) = 0
mprotect(0x7204af2c3000, 4096, PROT_READ) = 0
mprotect(0x7204af4e7000, 4096, PROT_READ) = 0
mprotect(0x7204af6f5000, 4096, PROT_READ) = 0
mprotect(0x7204af97b000, 4096, PROT_READ) = 0
mprotect(0x7204b168f000, 4096, PROT_READ) = 0
mprotect(0x7204afba1000, 4096, PROT_READ) = 0
mprotect(0x7204afdcf000, 86016, PROT_READ) = 0
mprotect(0x7204b1f67000, 49152, PROT_READ) = 0
mprotect(0x7204b0986000, 12288, PROT_READ) = 0
mprotect(0x7204b00cc000, 28672, PROT_READ) = 0
mprotect(0x7204b04ee000, 73728, PROT_READ) = 0
mprotect(0x7204b0c83000, 12288, PROT_READ) = 0
mprotect(0x7204b217f000, 4096, PROT_READ) = 0
mprotect(0x7204b2e6c000, 4096, PROT_READ) = 0
mprotect(0x7204b2402000, 12288, PROT_READ) = 0
mprotect(0x7204b2c5c000, 4096, PROT_READ) = 0
mmap(NULL, 12288, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) = 0x7204b307b000
mprotect(0x7204b27db000, 40960, PROT_READ) = 0
mprotect(0x7204b2a08000, 4096, PROT_READ) = 0
mprotect(0x620000, 4096, PROT_READ) = 0
mprotect(0x7204b3092000, 4096, PROT_READ) = 0
set_tid_address(0x7204b3081890) = 10245
set_robust_list(0x7204b30818a0, 24) = 0
rt_sigaction(SIGRTMIN, {sa_handler=0x7204b147c9f0, sa_mask=[], sa_flags=SA_RESTORER|SA_SIGINFO, sa_restorer=0x7204b1488dd0}, NULL, 8) = 0
rt_sigaction(SIGRT_1, {sa_handler=0x7204b147ca80, sa_mask=[], sa_flags=SA_RESTORER|SA_RESTART|SA_SIGINFO, sa_restorer=0x7204b1488dd0}, NULL, 8) = 0
rt_sigprocmask(SIG_UNBLOCK, [RTMIN RT_1], NULL, 8) = 0
prlimit64(0, RLIMIT_STACK, NULL, {rlim_cur=8192*1024, rlim_max=RLIM64_INFINITY}) = 0
brk(NULL) = 0x622000
brk(0x643000) = 0x643000
futex(0x7204b1f7467c, FUTEX_WAKE_PRIVATE, 2147483647) = 0
futex(0x7204b1f74688, FUTEX_WAKE_PRIVATE, 2147483647) = 0
ioctl(2, TCGETS, {B38400 opost isig icanon echo ...}) = 0
getpid() = 10245
open("/sys/devices/system/cpu/online", O_RDONLY|O_CLOEXEC) = 3
read(3, "0-7\n", 8192) = 4
close(3) = 0
getuid() = 0
lstat("/etc/ssl/certs/ca-certificates.crt", {st_mode=S_IFLNK|0777, st_size=41, ...}) = 0
openat(AT_FDCWD, "/etc/nix/nix.conf", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=486, ...}) = 0
read(3, "# WARNING: this file is generated from the nix.* options in\n# your NixOS configuration, typically\n# /etc/nixos/configuration.nix. Do not edit it!\nbuild-users-group = nixbld\nmax-jobs = 8\ncores = 1\nsandbox = true\nextra-sandbox-paths = \nsubstituters = https://cache.nixos.org/\ntrusted-substituters = \n"..., 486) = 486
close(3) = 0
futex(0x7204b2405540, FUTEX_WAKE_PRIVATE, 2147483647) = 0
openat(AT_FDCWD, "/root/.config/nix/nix.conf", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
futex(0x7204b18aa6f0, FUTEX_WAKE_PRIVATE, 2147483647) = 0
ioctl(1, TIOCGWINSZ, 0x7fff8de758c0) = -1 ENOTTY (Inappropriate ioctl for device)
rt_sigprocmask(SIG_BLOCK, NULL, [], 8) = 0
rt_sigprocmask(SIG_BLOCK, [HUP INT PIPE TERM WINCH], NULL, 8) = 0
mmap(NULL, 8392704, PROT_NONE, MAP_PRIVATE|MAP_ANONYMOUS|MAP_STACK, -1, 0) = 0x7204ad47c000
mprotect(0x7204ad47d000, 8388608, PROT_READ|PROT_WRITE) = 0
clone(child_stack=0x7204adc7bb30, flags=CLONE_VM|CLONE_FS|CLONE_FILES|CLONE_SIGHAND|CLONE_THREAD|CLONE_SYSVSEM|CLONE_SETTLS|CLONE_PARENT_SETTID|CLONE_CHILD_CLEARTID, parent_tidptr=0x7204adc7c9d0, tls=0x7204adc7c700, child_tidptr=0x7204adc7c9d0) = 10246
rt_sigaction(SIGCHLD, {sa_handler=SIG_DFL, sa_mask=[], sa_flags=SA_RESTORER, sa_restorer=0x7204b1488dd0}, NULL, 8) = 0
rt_sigaction(SIGUSR1, {sa_handler=0x7204b27f51d0, sa_mask=[], sa_flags=SA_RESTORER, sa_restorer=0x7204b1488dd0}, NULL, 8) = 0
sigaltstack({ss_sp=0x63e0a0, ss_flags=0, ss_size=18432}, NULL) = 0
rt_sigaction(SIGSEGV, {sa_handler=0x7204b2803ca0, sa_mask=~[RTMIN RT_1], sa_flags=SA_RESTORER|SA_ONSTACK|SA_SIGINFO, sa_restorer=0x7204b1488dd0}, NULL, 8) = 0
umask(022) = 022
brk(0x664000) = 0x664000
lstat("/tmp/nixos-rebuild.n0BS6e/nix.drv", {st_mode=S_IFLNK|0777, st_size=71, ...}) = 0
readlink("/tmp/nixos-rebuild.n0BS6e/nix.drv", "/nix/store/9pdynd4vy0hjkfgs6yrfwyn9pnm0rmhl-nix-2.0pre5968_a6c0b773.drv", 1024) = 71
socket(AF_UNIX, SOCK_STREAM|SOCK_CLOEXEC, 0) = 3
fcntl(3, F_GETFD) = 0x1 (flags FD_CLOEXEC)
fcntl(3, F_SETFD, FD_CLOEXEC) = 0
connect(3, {sa_family=AF_UNIX, sun_path="/nix/var/nix/daemon-socket/socket"}, 110) = 0
write(3, "cxin\0\0\0\0", 8) = 8
read(3, "oixd\0\0\0\0\24\1\0\0\0\0\0\0", 32768) = 16
sched_getaffinity(0, 128, [0, 1, 2, 3, 4, 5, 6, 7]) = 48
sched_setaffinity(0, 128, [1]) = 0
write(3, "\24\1\0\0\0\0\0\0\1\0\0\0\0\0\0\0\1\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0", 32) = 32
read(3, "stla\0\0\0\0", 32768) = 8
write(3, "\23\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\1\0\0\0\0\0\0\0\10\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\1\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\1\0\0\0\0\0\0\0\1\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0", 112) = 112
read(3, "stla\0\0\0\0", 32768) = 8
write(3, "(\0\0\0\0\0\0\0\1\0\0\0\0\0\0\0K\0\0\0\0\0\0\0/nix/store/9pdynd4vy0hjkfgs6yrfwyn9pnm0rmhl-nix-2.0pre5968_a6c0b773.drv!out\0\0\0\0\0", 104) = 104
read(3, "TRTS\0\0\0\0\0\0\0\0\333'\0\0\4\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0!\0\0\0\0\0\0\0querying info about missing paths\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0", 32768) = 96
read(3, "POTS\0\0\0\0\0\0\0\0\333'\0\0stla\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0", 32768) = 64
write(3, "\t\0\0\0\0\0\0\0\1\0\0\0\0\0\0\0K\0\0\0\0\0\0\0/nix/store/9pdynd4vy0hjkfgs6yrfwyn9pnm0rmhl-nix-2.0pre5968_a6c0b773.drv!out\0\0\0\0\0\0\0\0\0\0\0\0\0", 112) = 112
read(3, "TRTS\0\0\0\0\1\0\0\0\333'\0\0\0\0\0\0\0\0\0\0f\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0", 32768) = 56
read(3, "TRTS\0\0\0\0\2\0\0\0\333'\0\0\0\0\0\0\0\0\0\0h\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0TRTS\0\0\0\0\3\0\0\0\333'\0\0\0\0\0\0\0\0\0\0g\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0TRTS\0\0\0\0\4\0\0\0\333'\0\0\4\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0!\0\0\0\0\0\0\0querying info about missing paths\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0", 32768) = 208
read(3, "POTS\0\0\0\0\4\0\0\0\333'\0\0", 32768) = 16
read(3, "TLSR\0\0\0\0\2\0\0\0\333'\0\0i\0\0\0\0\0\0\0\4\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\1\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0TLSR\0\0\0\0\3\0\0\0\333'\0\0i\0\0\0\0\0\0\0\4\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0TLSR\0\0\0\0\1\0\0\0\333'\0\0j\0\0\0\0\0\0\0\2\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0e\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0TLSR\0\0\0\0\1\0\0\0\333'\0\0j\0\0\0\0\0\0\0\2\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0d\0\0\0"..., 32768) = 320
read(3, "TLSR\0\0\0\0\2\0\0\0\333'\0\0i\0\0\0\0\0\0\0\4\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0", 32768) = 96
read(3, "TLSR\0\0\0\0\3\0\0\0\333'\0\0i\0\0\0\0\0\0\0\4\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0TLSR\0\0\0\0\1\0\0\0\333'\0\0j\0\0\0\0\0\0\0\2\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0e\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0TLSR\0\0\0\0\1\0\0\0\333'\0\0j\0\0\0\0\0\0\0\2\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0d\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0POTS\0\0\0\0\3\0\0\0\333'\0\0POTS\0\0\0\0\2\0\0\0\333'\0\0POTS\0\0\0\0\1\0\0\0\333'\0\0stla\0\0\0\0\1\0\0\0\0\0\0\0", 32768) = 288
write(3, "\n\0\0\0\0\0\0\0G\0\0\0\0\0\0\0/nix/store/9pdynd4vy0hjkfgs6yrfwyn9pnm0rmhl-nix-2.0pre5968_a6c0b773.drv\0", 88) = 88
read(3, "stla\0\0\0\0\1\0\0\0\0\0\0\0", 32768) = 16
write(3, "\1\0\0\0\0\0\0\0G\0\0\0\0\0\0\0/nix/store/9pdynd4vy0hjkfgs6yrfwyn9pnm0rmhl-nix-2.0pre5968_a6c0b773.drv\0", 88) = 88
read(3, "stla\0\0\0\0\1\0\0\0\0\0\0\0", 32768) = 16
openat(AT_FDCWD, "/nix/store/9pdynd4vy0hjkfgs6yrfwyn9pnm0rmhl-nix-2.0pre5968_a6c0b773.drv", O_RDONLY|O_CLOEXEC) = 4
fstat(4, {st_mode=S_IFREG|0444, st_size=5214, ...}) = 0
read(4, "Derive([(\"debug\",\"/nix/store/a61fri65dk5b8pldwczl7sxsda6hvml0-nix-2.0pre5968_a6c0b773-debug\",\"\",\"\"),(\"dev\",\"/nix/store/y94p0vsl9z6q571nqrr3wjisjyn7i8bm-nix-2.0pre5968_a6c0b773-dev\",\"\",\"\"),(\"doc\",\"/nix/store/wb2gc3p2b0dybr2ph6d0bdyzx06m0dl5-nix-2.0pre5968_a6c0b773-doc\",\"\",\"\"),(\"man\",\"/nix/store/ahii4"..., 5214) = 5214
close(4) = 0
lstat("/tmp/nixos-rebuild.n0BS6e/nix", 0x7fff8de744a0) = -1 ENOENT (No such file or directory)
lstat("/tmp/nixos-rebuild.n0BS6e", {st_mode=S_IFDIR|0700, st_size=3, ...}) = 0
getpid() = 10245
symlink("/nix/store/r8zhwq9xylxw8a823kpvqy0kfqq4g52f-nix-2.0pre5968_a6c0b773", "/tmp/nixos-rebuild.n0BS6e/nix.tmp-10245-213095760") = 0
rename("/tmp/nixos-rebuild.n0BS6e/nix.tmp-10245-213095760", "/tmp/nixos-rebuild.n0BS6e/nix") = 0
write(3, "\f\0\0\0\0\0\0\0\35\0\0\0\0\0\0\0/tmp/nixos-rebuild.n0BS6e/nix\0\0\0", 48) = 48
read(3, "stla\0\0\0\0\1\0\0\0\0\0\0\0", 32768) = 16
write(3, "\r\0\0\0\0\0\0\0", 8) = 8
read(3, "stla\0\0\0\0\1\0\0\0\0\0\0\0", 32768) = 16
fstat(1, {st_mode=S_IFCHR|0666, st_rdev=makedev(1, 3), ...}) = 0
ioctl(1, TCGETS, 0x7fff8de75260) = -1 ENOTTY (Inappropriate ioctl for device)
close(3) = 0
write(1, "/tmp/nixos-rebuild.n0BS6e/nix\n", 30) = 30
exit_group(0) = ?
+++ exited with 0 +++
set_robust_list(0x7204adc7c9e0, 24) = 0
rt_sigtimedwait([HUP INT PIPE TERM WINCH], NULL, NULL, 8 <unfinished ...>) = ?
+++ exited with 0 +++
getpid() = 10249
close(255) = 0
rt_sigprocmask(SIG_SETMASK, [], NULL, 8) = 0
rt_sigaction(SIGTSTP, {sa_handler=SIG_DFL, sa_mask=[], sa_flags=SA_RESTORER, sa_restorer=0x7a48b0ca82d0}, {sa_handler=SIG_DFL, sa_mask=[], sa_flags=SA_RESTORER, sa_restorer=0x7a48b0ca82d0}, 8) = 0
rt_sigaction(SIGTTIN, {sa_handler=SIG_DFL, sa_mask=[], sa_flags=SA_RESTORER, sa_restorer=0x7a48b0ca82d0}, {sa_handler=SIG_DFL, sa_mask=[], sa_flags=SA_RESTORER, sa_restorer=0x7a48b0ca82d0}, 8) = 0
rt_sigaction(SIGTTOU, {sa_handler=SIG_DFL, sa_mask=[], sa_flags=SA_RESTORER, sa_restorer=0x7a48b0ca82d0}, {sa_handler=SIG_DFL, sa_mask=[], sa_flags=SA_RESTORER, sa_restorer=0x7a48b0ca82d0}, 8) = 0
rt_sigaction(SIGINT, {sa_handler=SIG_DFL, sa_mask=[], sa_flags=SA_RESTORER, sa_restorer=0x7a48b0ca82d0}, {sa_handler=0x45b320, sa_mask=[], sa_flags=SA_RESTORER, sa_restorer=0x7a48b0ca82d0}, 8) = 0
rt_sigaction(SIGQUIT, {sa_handler=SIG_DFL, sa_mask=[], sa_flags=SA_RESTORER, sa_restorer=0x7a48b0ca82d0}, {sa_handler=SIG_IGN, sa_mask=[], sa_flags=SA_RESTORER, sa_restorer=0x7a48b0ca82d0}, 8) = 0
rt_sigaction(SIGCHLD, {sa_handler=SIG_DFL, sa_mask=[], sa_flags=SA_RESTORER|SA_RESTART, sa_restorer=0x7a48b0ca82d0}, {sa_handler=0x441ad0, sa_mask=[], sa_flags=SA_RESTORER|SA_RESTART, sa_restorer=0x7a48b0ca82d0}, 8) = 0
rt_sigaction(SIGCHLD, {sa_handler=0x441ad0, sa_mask=[], sa_flags=SA_RESTORER|SA_RESTART, sa_restorer=0x7a48b0ca82d0}, {sa_handler=SIG_DFL, sa_mask=[], sa_flags=SA_RESTORER|SA_RESTART, sa_restorer=0x7a48b0ca82d0}, 8) = 0
rt_sigaction(SIGINT, {sa_handler=0x45b320, sa_mask=[], sa_flags=SA_RESTORER, sa_restorer=0x7a48b0ca82d0}, {sa_handler=SIG_DFL, sa_mask=[], sa_flags=SA_RESTORER, sa_restorer=0x7a48b0ca82d0}, 8) = 0
dup2(4, 1) = 1
close(4) = 0
close(3) = 0
rt_sigprocmask(SIG_BLOCK, NULL, [], 8) = 0
brk(0x73b000) = 0x73b000
stat(".", {st_mode=S_IFDIR|0700, st_size=29, ...}) = 0
stat("/tmp/nixos-rebuild.n0BS6e/nix/bin/nix-build", {st_mode=S_IFREG|0555, st_size=319096, ...}) = 0
stat("/tmp/nixos-rebuild.n0BS6e/nix/bin/nix-build", {st_mode=S_IFREG|0555, st_size=319096, ...}) = 0
geteuid() = 0
getegid() = 0
getuid() = 0
getgid() = 0
access("/tmp/nixos-rebuild.n0BS6e/nix/bin/nix-build", X_OK) = 0
stat("/tmp/nixos-rebuild.n0BS6e/nix/bin/nix-build", {st_mode=S_IFREG|0555, st_size=319096, ...}) = 0
geteuid() = 0
getegid() = 0
getuid() = 0
getgid() = 0
access("/tmp/nixos-rebuild.n0BS6e/nix/bin/nix-build", R_OK) = 0
stat("/tmp/nixos-rebuild.n0BS6e/nix/bin/nix-build", {st_mode=S_IFREG|0555, st_size=319096, ...}) = 0
stat("/tmp/nixos-rebuild.n0BS6e/nix/bin/nix-build", {st_mode=S_IFREG|0555, st_size=319096, ...}) = 0
geteuid() = 0
getegid() = 0
getuid() = 0
getgid() = 0
access("/tmp/nixos-rebuild.n0BS6e/nix/bin/nix-build", X_OK) = 0
stat("/tmp/nixos-rebuild.n0BS6e/nix/bin/nix-build", {st_mode=S_IFREG|0555, st_size=319096, ...}) = 0
geteuid() = 0
getegid() = 0
getuid() = 0
getgid() = 0
access("/tmp/nixos-rebuild.n0BS6e/nix/bin/nix-build", R_OK) = 0
rt_sigprocmask(SIG_BLOCK, [INT CHLD], [], 8) = 0
clone(child_stack=NULL, flags=CLONE_CHILD_CLEARTID|CLONE_CHILD_SETTID|SIGCHLD, child_tidptr=0x7a48b1449a10) = 10250
rt_sigprocmask(SIG_SETMASK, [], NULL, 8) = 0
rt_sigprocmask(SIG_BLOCK, [CHLD], [], 8) = 0
rt_sigprocmask(SIG_SETMASK, [], NULL, 8) = 0
rt_sigprocmask(SIG_BLOCK, [CHLD], [], 8) = 0
rt_sigaction(SIGINT, {sa_handler=0x43e300, sa_mask=[], sa_flags=SA_RESTORER, sa_restorer=0x7a48b0ca82d0}, {sa_handler=0x45b320, sa_mask=[], sa_flags=SA_RESTORER, sa_restorer=0x7a48b0ca82d0}, 8) = 0
wait4(-1, [{WIFEXITED(s) && WEXITSTATUS(s) == 1}], 0, NULL) = 10250
rt_sigaction(SIGINT, {sa_handler=0x45b320, sa_mask=[], sa_flags=SA_RESTORER, sa_restorer=0x7a48b0ca82d0}, {sa_handler=0x43e300, sa_mask=[], sa_flags=SA_RESTORER, sa_restorer=0x7a48b0ca82d0}, 8) = 0
rt_sigprocmask(SIG_SETMASK, [], NULL, 8) = 0
--- SIGCHLD {si_signo=SIGCHLD, si_code=CLD_EXITED, si_pid=10250, si_uid=0, si_status=1, si_utime=287, si_stime=35} ---
wait4(-1, 0x7fffe5592550, WNOHANG, NULL) = -1 ECHILD (No child processes)
rt_sigreturn({mask=[]}) = 0
exit_group(1) = ?
+++ exited with 1 +++
This file has been truncated, but you can view the full file.
getpid() = 10250
rt_sigprocmask(SIG_SETMASK, [], NULL, 8) = 0
rt_sigaction(SIGTSTP, {sa_handler=SIG_DFL, sa_mask=[], sa_flags=SA_RESTORER, sa_restorer=0x7a48b0ca82d0}, {sa_handler=SIG_DFL, sa_mask=[], sa_flags=SA_RESTORER, sa_restorer=0x7a48b0ca82d0}, 8) = 0
rt_sigaction(SIGTTIN, {sa_handler=SIG_DFL, sa_mask=[], sa_flags=SA_RESTORER, sa_restorer=0x7a48b0ca82d0}, {sa_handler=SIG_DFL, sa_mask=[], sa_flags=SA_RESTORER, sa_restorer=0x7a48b0ca82d0}, 8) = 0
rt_sigaction(SIGTTOU, {sa_handler=SIG_DFL, sa_mask=[], sa_flags=SA_RESTORER, sa_restorer=0x7a48b0ca82d0}, {sa_handler=SIG_DFL, sa_mask=[], sa_flags=SA_RESTORER, sa_restorer=0x7a48b0ca82d0}, 8) = 0
rt_sigaction(SIGHUP, {sa_handler=SIG_DFL, sa_mask=[], sa_flags=SA_RESTORER, sa_restorer=0x7a48b0ca82d0}, NULL, 8) = 0
rt_sigaction(SIGILL, {sa_handler=SIG_DFL, sa_mask=[], sa_flags=SA_RESTORER, sa_restorer=0x7a48b0ca82d0}, NULL, 8) = 0
rt_sigaction(SIGTRAP, {sa_handler=SIG_DFL, sa_mask=[], sa_flags=SA_RESTORER, sa_restorer=0x7a48b0ca82d0}, NULL, 8) = 0
rt_sigaction(SIGABRT, {sa_handler=SIG_DFL, sa_mask=[], sa_flags=SA_RESTORER, sa_restorer=0x7a48b0ca82d0}, NULL, 8) = 0
rt_sigaction(SIGFPE, {sa_handler=SIG_DFL, sa_mask=[], sa_flags=SA_RESTORER, sa_restorer=0x7a48b0ca82d0}, NULL, 8) = 0
rt_sigaction(SIGBUS, {sa_handler=SIG_DFL, sa_mask=[], sa_flags=SA_RESTORER, sa_restorer=0x7a48b0ca82d0}, NULL, 8) = 0
rt_sigaction(SIGSEGV, {sa_handler=SIG_DFL, sa_mask=[], sa_flags=SA_RESTORER, sa_restorer=0x7a48b0ca82d0}, NULL, 8) = 0
rt_sigaction(SIGSYS, {sa_handler=SIG_DFL, sa_mask=[], sa_flags=SA_RESTORER, sa_restorer=0x7a48b0ca82d0}, NULL, 8) = 0
rt_sigaction(SIGPIPE, {sa_handler=SIG_DFL, sa_mask=[], sa_flags=SA_RESTORER, sa_restorer=0x7a48b0ca82d0}, NULL, 8) = 0
rt_sigaction(SIGALRM, {sa_handler=SIG_DFL, sa_mask=[], sa_flags=SA_RESTORER, sa_restorer=0x7a48b0ca82d0}, NULL, 8) = 0
rt_sigaction(SIGTERM, {sa_handler=SIG_DFL, sa_mask=[], sa_flags=SA_RESTORER, sa_restorer=0x7a48b0ca82d0}, NULL, 8) = 0
rt_sigaction(SIGXCPU, {sa_handler=SIG_DFL, sa_mask=[], sa_flags=SA_RESTORER, sa_restorer=0x7a48b0ca82d0}, NULL, 8) = 0
rt_sigaction(SIGXFSZ, {sa_handler=SIG_DFL, sa_mask=[], sa_flags=SA_RESTORER, sa_restorer=0x7a48b0ca82d0}, NULL, 8) = 0
rt_sigaction(SIGVTALRM, {sa_handler=SIG_DFL, sa_mask=[], sa_flags=SA_RESTORER, sa_restorer=0x7a48b0ca82d0}, NULL, 8) = 0
rt_sigaction(SIGUSR1, {sa_handler=SIG_DFL, sa_mask=[], sa_flags=SA_RESTORER, sa_restorer=0x7a48b0ca82d0}, NULL, 8) = 0
rt_sigaction(SIGUSR2, {sa_handler=SIG_DFL, sa_mask=[], sa_flags=SA_RESTORER, sa_restorer=0x7a48b0ca82d0}, NULL, 8) = 0
rt_sigaction(SIGINT, {sa_handler=SIG_DFL, sa_mask=[], sa_flags=SA_RESTORER, sa_restorer=0x7a48b0ca82d0}, {sa_handler=0x45b320, sa_mask=[], sa_flags=SA_RESTORER, sa_restorer=0x7a48b0ca82d0}, 8) = 0
rt_sigaction(SIGQUIT, {sa_handler=SIG_DFL, sa_mask=[], sa_flags=SA_RESTORER, sa_restorer=0x7a48b0ca82d0}, {sa_handler=SIG_DFL, sa_mask=[], sa_flags=SA_RESTORER, sa_restorer=0x7a48b0ca82d0}, 8) = 0
rt_sigaction(SIGCHLD, {sa_handler=SIG_DFL, sa_mask=[], sa_flags=SA_RESTORER|SA_RESTART, sa_restorer=0x7a48b0ca82d0}, {sa_handler=0x441ad0, sa_mask=[], sa_flags=SA_RESTORER|SA_RESTART, sa_restorer=0x7a48b0ca82d0}, 8) = 0
execve("/tmp/nixos-rebuild.n0BS6e/nix/bin/nix-build", ["nix-build", "<nixpkgs/nixos>", "-A", "system", "-k"], 0x71e008 /* 51 vars */) = 0
brk(NULL) = 0x63e000
mmap(NULL, 8192, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) = 0x76ffc6caf000
access("/etc/ld-nix.so.preload", R_OK) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/r8zhwq9xylxw8a823kpvqy0kfqq4g52f-nix-2.0pre5968_a6c0b773/lib/tls/x86_64/x86_64/libnixmain.so", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
stat("/nix/store/r8zhwq9xylxw8a823kpvqy0kfqq4g52f-nix-2.0pre5968_a6c0b773/lib/tls/x86_64/x86_64", 0x7ffdbd8a4a00) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/r8zhwq9xylxw8a823kpvqy0kfqq4g52f-nix-2.0pre5968_a6c0b773/lib/tls/x86_64/libnixmain.so", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
stat("/nix/store/r8zhwq9xylxw8a823kpvqy0kfqq4g52f-nix-2.0pre5968_a6c0b773/lib/tls/x86_64", 0x7ffdbd8a4a00) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/r8zhwq9xylxw8a823kpvqy0kfqq4g52f-nix-2.0pre5968_a6c0b773/lib/tls/x86_64/libnixmain.so", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
stat("/nix/store/r8zhwq9xylxw8a823kpvqy0kfqq4g52f-nix-2.0pre5968_a6c0b773/lib/tls/x86_64", 0x7ffdbd8a4a00) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/r8zhwq9xylxw8a823kpvqy0kfqq4g52f-nix-2.0pre5968_a6c0b773/lib/tls/libnixmain.so", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
stat("/nix/store/r8zhwq9xylxw8a823kpvqy0kfqq4g52f-nix-2.0pre5968_a6c0b773/lib/tls", 0x7ffdbd8a4a00) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/r8zhwq9xylxw8a823kpvqy0kfqq4g52f-nix-2.0pre5968_a6c0b773/lib/x86_64/x86_64/libnixmain.so", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
stat("/nix/store/r8zhwq9xylxw8a823kpvqy0kfqq4g52f-nix-2.0pre5968_a6c0b773/lib/x86_64/x86_64", 0x7ffdbd8a4a00) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/r8zhwq9xylxw8a823kpvqy0kfqq4g52f-nix-2.0pre5968_a6c0b773/lib/x86_64/libnixmain.so", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
stat("/nix/store/r8zhwq9xylxw8a823kpvqy0kfqq4g52f-nix-2.0pre5968_a6c0b773/lib/x86_64", 0x7ffdbd8a4a00) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/r8zhwq9xylxw8a823kpvqy0kfqq4g52f-nix-2.0pre5968_a6c0b773/lib/x86_64/libnixmain.so", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
stat("/nix/store/r8zhwq9xylxw8a823kpvqy0kfqq4g52f-nix-2.0pre5968_a6c0b773/lib/x86_64", 0x7ffdbd8a4a00) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/r8zhwq9xylxw8a823kpvqy0kfqq4g52f-nix-2.0pre5968_a6c0b773/lib/libnixmain.so", O_RDONLY|O_CLOEXEC) = 3
read(3, "\177ELF\2\1\1\0\0\0\0\0\0\0\0\0\3\0>\0\1\0\0\0\200\220\0\0\0\0\0\0@\0\0\0\0\0\0\0\200\204\2\0\0\0\0\0\0\0\0\0@\0008\0\10\0@\0\34\0\33\0\1\0\0\0\5\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\362\350\1\0\0\0\0\0\362\350\1\0\0\0\0\0\0\0 \0\0\0\0\0\1\0\0\0\6\0\0\0x\362\1\0\0\0\0\0x\362!\0\0\0\0\0x\362!\0\0\0\0\0\310\r\0\0\0\0\0\0X\22\0\0\0\0\0\0\0\0 \0\0\0\0\0\2\0\0\0\6\0\0\0\240\366\1\0\0\0\0\0\240\366!\0\0\0\0\0\240\366!\0\0\0\0\0@\2\0\0\0\0\0\0@\2\0\0\0\0\0\0\10\0\0\0\0\0\0\0\4\0\0\0\4\0\0\0\0\2\0\0\0\0\0\0\0\2\0\0\0\0\0\0\0\2\0\0\0\0\0\0$\0\0\0\0\0\0\0$\0\0\0\0\0\0\0\4\0\0\0\0\0\0\0P\345td\4\0\0\0\200\300\1\0"..., 832) = 832
fstat(3, {st_mode=S_IFREG|0555, st_size=166784, ...}) = 0
mmap(NULL, 2229456, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) = 0x76ffc686c000
mprotect(0x76ffc688b000, 2097152, PROT_NONE) = 0
mmap(0x76ffc6a8b000, 8192, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0x1f000) = 0x76ffc6a8b000
close(3) = 0
openat(AT_FDCWD, "/nix/store/r8zhwq9xylxw8a823kpvqy0kfqq4g52f-nix-2.0pre5968_a6c0b773/lib/libnixexpr.so", O_RDONLY|O_CLOEXEC) = 3
read(3, "\177ELF\2\1\1\3\0\0\0\0\0\0\0\0\3\0>\0\1\0\0\0\320\334\2\0\0\0\0\0@\0\0\0\0\0\0\0\330\v\21\0\0\0\0\0\0\0\0\0@\0008\0\10\0@\0\34\0\33\0\1\0\0\0\5\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\33\26\16\0\0\0\0\0\33\26\16\0\0\0\0\0\0\0 \0\0\0\0\0\1\0\0\0\6\0\0\0h\31\16\0\0\0\0\0h\31.\0\0\0\0\0h\31.\0\0\0\0\0\0;\0\0\0\0\0\0\330?\0\0\0\0\0\0\0\0 \0\0\0\0\0\2\0\0\0\6\0\0\00001\16\0\0\0\0\00001.\0\0\0\0\00001.\0\0\0\0\0`\2\0\0\0\0\0\0`\2\0\0\0\0\0\0\10\0\0\0\0\0\0\0\4\0\0\0\4\0\0\0\0\2\0\0\0\0\0\0\0\2\0\0\0\0\0\0\0\2\0\0\0\0\0\0$\0\0\0\0\0\0\0$\0\0\0\0\0\0\0\4\0\0\0\0\0\0\0P\345td\4\0\0\0`s\f\0"..., 832) = 832
fstat(3, {st_mode=S_IFREG|0555, st_size=1118936, ...}) = 0
mmap(NULL, 3037504, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) = 0x76ffc6586000
mprotect(0x76ffc6668000, 2093056, PROT_NONE) = 0
mmap(0x76ffc6867000, 20480, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0xe1000) = 0x76ffc6867000
close(3) = 0
openat(AT_FDCWD, "/nix/store/r8zhwq9xylxw8a823kpvqy0kfqq4g52f-nix-2.0pre5968_a6c0b773/lib/libgc.so.1", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/dn852vplccs5w0qc3dnlfyma8b7b408d-boehm-gc-7.6.4/lib/tls/x86_64/x86_64/libgc.so.1", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
stat("/nix/store/dn852vplccs5w0qc3dnlfyma8b7b408d-boehm-gc-7.6.4/lib/tls/x86_64/x86_64", 0x7ffdbd8a49a0) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/dn852vplccs5w0qc3dnlfyma8b7b408d-boehm-gc-7.6.4/lib/tls/x86_64/libgc.so.1", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
stat("/nix/store/dn852vplccs5w0qc3dnlfyma8b7b408d-boehm-gc-7.6.4/lib/tls/x86_64", 0x7ffdbd8a49a0) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/dn852vplccs5w0qc3dnlfyma8b7b408d-boehm-gc-7.6.4/lib/tls/x86_64/libgc.so.1", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
stat("/nix/store/dn852vplccs5w0qc3dnlfyma8b7b408d-boehm-gc-7.6.4/lib/tls/x86_64", 0x7ffdbd8a49a0) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/dn852vplccs5w0qc3dnlfyma8b7b408d-boehm-gc-7.6.4/lib/tls/libgc.so.1", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
stat("/nix/store/dn852vplccs5w0qc3dnlfyma8b7b408d-boehm-gc-7.6.4/lib/tls", 0x7ffdbd8a49a0) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/dn852vplccs5w0qc3dnlfyma8b7b408d-boehm-gc-7.6.4/lib/x86_64/x86_64/libgc.so.1", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
stat("/nix/store/dn852vplccs5w0qc3dnlfyma8b7b408d-boehm-gc-7.6.4/lib/x86_64/x86_64", 0x7ffdbd8a49a0) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/dn852vplccs5w0qc3dnlfyma8b7b408d-boehm-gc-7.6.4/lib/x86_64/libgc.so.1", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
stat("/nix/store/dn852vplccs5w0qc3dnlfyma8b7b408d-boehm-gc-7.6.4/lib/x86_64", 0x7ffdbd8a49a0) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/dn852vplccs5w0qc3dnlfyma8b7b408d-boehm-gc-7.6.4/lib/x86_64/libgc.so.1", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
stat("/nix/store/dn852vplccs5w0qc3dnlfyma8b7b408d-boehm-gc-7.6.4/lib/x86_64", 0x7ffdbd8a49a0) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/dn852vplccs5w0qc3dnlfyma8b7b408d-boehm-gc-7.6.4/lib/libgc.so.1", O_RDONLY|O_CLOEXEC) = 3
read(3, "\177ELF\2\1\1\0\0\0\0\0\0\0\0\0\3\0>\0\1\0\0\0\300a\0\0\0\0\0\0@\0\0\0\0\0\0\0\250\10\3\0\0\0\0\0\0\0\0\0@\0008\0\t\0@\0\34\0\33\0\1\0\0\0\5\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\354c\2\0\0\0\0\0\354c\2\0\0\0\0\0\0\0 \0\0\0\0\0\1\0\0\0\6\0\0\0\320g\2\0\0\0\0\0\320g\"\0\0\0\0\0\320g\"\0\0\0\0\0D\f\0\0\0\0\0\0\320/\4\0\0\0\0\0\0\0 \0\0\0\0\0\2\0\0\0\6\0\0\0008h\2\0\0\0\0\0008h\"\0\0\0\0\0008h\"\0\0\0\0\0\0\2\0\0\0\0\0\0\0\2\0\0\0\0\0\0\10\0\0\0\0\0\0\0\4\0\0\0\4\0\0\0008\2\0\0\0\0\0\0008\2\0\0\0\0\0\0008\2\0\0\0\0\0\0$\0\0\0\0\0\0\0$\0\0\0\0\0\0\0\4\0\0\0\0\0\0\0\7\0\0\0\4\0\0\0\320g\2\0"..., 832) = 832
fstat(3, {st_mode=S_IFREG|0555, st_size=200616, ...}) = 0
mmap(NULL, 2529184, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) = 0x76ffc631c000
mprotect(0x76ffc6343000, 2093056, PROT_NONE) = 0
mmap(0x76ffc6542000, 8192, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0x26000) = 0x76ffc6542000
mmap(0x76ffc6544000, 268192, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x76ffc6544000
close(3) = 0
openat(AT_FDCWD, "/nix/store/r8zhwq9xylxw8a823kpvqy0kfqq4g52f-nix-2.0pre5968_a6c0b773/lib/libnixstore.so", O_RDONLY|O_CLOEXEC) = 3
read(3, "\177ELF\2\1\1\3\0\0\0\0\0\0\0\0\3\0>\0\1\0\0\0000\355\6\0\0\0\0\0@\0\0\0\0\0\0\0\30R$\0\0\0\0\0\0\0\0\0@\0008\0\10\0@\0\34\0\33\0\1\0\0\0\5\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0DX\35\0\0\0\0\0DX\35\0\0\0\0\0\0\0 \0\0\0\0\0\1\0\0\0\6\0\0\0000[\35\0\0\0\0\0000[=\0\0\0\0\0000[=\0\0\0\0\0`\231\0\0\0\0\0\0\320\315\0\0\0\0\0\0\0\0 \0\0\0\0\0\2\0\0\0\6\0\0\0000\266\35\0\0\0\0\0000\266=\0\0\0\0\0000\266=\0\0\0\0\0\300\2\0\0\0\0\0\0\300\2\0\0\0\0\0\0\10\0\0\0\0\0\0\0\4\0\0\0\4\0\0\0\0\2\0\0\0\0\0\0\0\2\0\0\0\0\0\0\0\2\0\0\0\0\0\0$\0\0\0\0\0\0\0$\0\0\0\0\0\0\0\4\0\0\0\0\0\0\0P\345td\4\0\0\0\24K\32\0"..., 832) = 832
fstat(3, {st_mode=S_IFREG|0555, st_size=2382104, ...}) = 0
mmap(NULL, 4073728, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) = 0x76ffc5f39000
mprotect(0x76ffc610f000, 2093056, PROT_NONE) = 0
mmap(0x76ffc630e000, 45056, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0x1d5000) = 0x76ffc630e000
mmap(0x76ffc6319000, 10496, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x76ffc6319000
close(3) = 0
openat(AT_FDCWD, "/nix/store/r8zhwq9xylxw8a823kpvqy0kfqq4g52f-nix-2.0pre5968_a6c0b773/lib/libnixutil.so", O_RDONLY|O_CLOEXEC) = 3
read(3, "\177ELF\2\1\1\3\0\0\0\0\0\0\0\0\3\0>\0\1\0\0\0\220\211\2\0\0\0\0\0@\0\0\0\0\0\0\0@n\n\0\0\0\0\0\0\0\0\0@\0008\0\t\0@\0\35\0\34\0\1\0\0\0\5\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\266\4\10\0\0\0\0\0\266\4\10\0\0\0\0\0\0\0 \0\0\0\0\0\1\0\0\0\6\0\0\0P\21\10\0\0\0\0\0P\21(\0\0\0\0\0P\21(\0\0\0\0\0\350.\0\0\0\0\0\0X4\0\0\0\0\0\0\0\0 \0\0\0\0\0\2\0\0\0\6\0\0\0\250'\10\0\0\0\0\0\250'(\0\0\0\0\0\250'(\0\0\0\0\0\200\2\0\0\0\0\0\0\200\2\0\0\0\0\0\0\10\0\0\0\0\0\0\0\4\0\0\0\4\0\0\0008\2\0\0\0\0\0\0008\2\0\0\0\0\0\0008\2\0\0\0\0\0\0$\0\0\0\0\0\0\0$\0\0\0\0\0\0\0\4\0\0\0\0\0\0\0\7\0\0\0\4\0\0\0P\21\10\0"..., 832) = 832
fstat(3, {st_mode=S_IFREG|0555, st_size=685440, ...}) = 0
mmap(NULL, 2639272, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) = 0x76ffc5cb4000
mprotect(0x76ffc5d35000, 2097152, PROT_NONE) = 0
mmap(0x76ffc5f35000, 16384, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0x81000) = 0x76ffc5f35000
close(3) = 0
openat(AT_FDCWD, "/nix/store/r8zhwq9xylxw8a823kpvqy0kfqq4g52f-nix-2.0pre5968_a6c0b773/lib/libnixformat.so", O_RDONLY|O_CLOEXEC) = 3
read(3, "\177ELF\2\1\1\0\0\0\0\0\0\0\0\0\3\0>\0\1\0\0\0\200%\0\0\0\0\0\0@\0\0\0\0\0\0\0x\263\0\0\0\0\0\0\0\0\0\0@\0008\0\10\0@\0\33\0\32\0\1\0\0\0\5\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\v\177\0\0\0\0\0\0\v\177\0\0\0\0\0\0\0\0 \0\0\0\0\0\1\0\0\0\6\0\0\0\370\213\0\0\0\0\0\0\370\213 \0\0\0\0\0\370\213 \0\0\0\0\0\30\4\0\0\0\0\0\0 \4\0\0\0\0\0\0\0\0 \0\0\0\0\0\2\0\0\0\6\0\0\0\10\214\0\0\0\0\0\0\10\214 \0\0\0\0\0\10\214 \0\0\0\0\0\0\2\0\0\0\0\0\0\0\2\0\0\0\0\0\0\10\0\0\0\0\0\0\0\4\0\0\0\4\0\0\0\0\2\0\0\0\0\0\0\0\2\0\0\0\0\0\0\0\2\0\0\0\0\0\0$\0\0\0\0\0\0\0$\0\0\0\0\0\0\0\4\0\0\0\0\0\0\0P\345td\4\0\0\0Ht\0\0"..., 832) = 832
fstat(3, {st_mode=S_IFREG|0555, st_size=47672, ...}) = 0
mmap(NULL, 8192, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) = 0x76ffc6cad000
mmap(NULL, 2134040, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) = 0x76ffc5aaa000
mprotect(0x76ffc5ab2000, 2097152, PROT_NONE) = 0
mmap(0x76ffc5cb2000, 8192, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0x8000) = 0x76ffc5cb2000
close(3) = 0
openat(AT_FDCWD, "/nix/store/r8zhwq9xylxw8a823kpvqy0kfqq4g52f-nix-2.0pre5968_a6c0b773/lib/libstdc++.so.6", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/dn852vplccs5w0qc3dnlfyma8b7b408d-boehm-gc-7.6.4/lib/libstdc++.so.6", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/2kcrj1ksd2a14bm5sky182fv2xwfhfap-glibc-2.26-131/lib/tls/x86_64/x86_64/libstdc++.so.6", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
stat("/nix/store/2kcrj1ksd2a14bm5sky182fv2xwfhfap-glibc-2.26-131/lib/tls/x86_64/x86_64", 0x7ffdbd8a48e0) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/2kcrj1ksd2a14bm5sky182fv2xwfhfap-glibc-2.26-131/lib/tls/x86_64/libstdc++.so.6", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
stat("/nix/store/2kcrj1ksd2a14bm5sky182fv2xwfhfap-glibc-2.26-131/lib/tls/x86_64", 0x7ffdbd8a48e0) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/2kcrj1ksd2a14bm5sky182fv2xwfhfap-glibc-2.26-131/lib/tls/x86_64/libstdc++.so.6", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
stat("/nix/store/2kcrj1ksd2a14bm5sky182fv2xwfhfap-glibc-2.26-131/lib/tls/x86_64", 0x7ffdbd8a48e0) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/2kcrj1ksd2a14bm5sky182fv2xwfhfap-glibc-2.26-131/lib/tls/libstdc++.so.6", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
stat("/nix/store/2kcrj1ksd2a14bm5sky182fv2xwfhfap-glibc-2.26-131/lib/tls", 0x7ffdbd8a48e0) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/2kcrj1ksd2a14bm5sky182fv2xwfhfap-glibc-2.26-131/lib/x86_64/x86_64/libstdc++.so.6", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
stat("/nix/store/2kcrj1ksd2a14bm5sky182fv2xwfhfap-glibc-2.26-131/lib/x86_64/x86_64", 0x7ffdbd8a48e0) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/2kcrj1ksd2a14bm5sky182fv2xwfhfap-glibc-2.26-131/lib/x86_64/libstdc++.so.6", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
stat("/nix/store/2kcrj1ksd2a14bm5sky182fv2xwfhfap-glibc-2.26-131/lib/x86_64", 0x7ffdbd8a48e0) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/2kcrj1ksd2a14bm5sky182fv2xwfhfap-glibc-2.26-131/lib/x86_64/libstdc++.so.6", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
stat("/nix/store/2kcrj1ksd2a14bm5sky182fv2xwfhfap-glibc-2.26-131/lib/x86_64", 0x7ffdbd8a48e0) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/2kcrj1ksd2a14bm5sky182fv2xwfhfap-glibc-2.26-131/lib/libstdc++.so.6", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
stat("/nix/store/2kcrj1ksd2a14bm5sky182fv2xwfhfap-glibc-2.26-131/lib", {st_mode=S_IFDIR|0555, st_size=83, ...}) = 0
openat(AT_FDCWD, "/nix/store/4zd34747fz0ggzzasy4icgn3lmy89pra-gcc-7.3.0-lib/lib/tls/x86_64/x86_64/libstdc++.so.6", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
stat("/nix/store/4zd34747fz0ggzzasy4icgn3lmy89pra-gcc-7.3.0-lib/lib/tls/x86_64/x86_64", 0x7ffdbd8a48e0) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/4zd34747fz0ggzzasy4icgn3lmy89pra-gcc-7.3.0-lib/lib/tls/x86_64/libstdc++.so.6", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
stat("/nix/store/4zd34747fz0ggzzasy4icgn3lmy89pra-gcc-7.3.0-lib/lib/tls/x86_64", 0x7ffdbd8a48e0) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/4zd34747fz0ggzzasy4icgn3lmy89pra-gcc-7.3.0-lib/lib/tls/x86_64/libstdc++.so.6", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
stat("/nix/store/4zd34747fz0ggzzasy4icgn3lmy89pra-gcc-7.3.0-lib/lib/tls/x86_64", 0x7ffdbd8a48e0) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/4zd34747fz0ggzzasy4icgn3lmy89pra-gcc-7.3.0-lib/lib/tls/libstdc++.so.6", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
stat("/nix/store/4zd34747fz0ggzzasy4icgn3lmy89pra-gcc-7.3.0-lib/lib/tls", 0x7ffdbd8a48e0) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/4zd34747fz0ggzzasy4icgn3lmy89pra-gcc-7.3.0-lib/lib/x86_64/x86_64/libstdc++.so.6", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
stat("/nix/store/4zd34747fz0ggzzasy4icgn3lmy89pra-gcc-7.3.0-lib/lib/x86_64/x86_64", 0x7ffdbd8a48e0) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/4zd34747fz0ggzzasy4icgn3lmy89pra-gcc-7.3.0-lib/lib/x86_64/libstdc++.so.6", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
stat("/nix/store/4zd34747fz0ggzzasy4icgn3lmy89pra-gcc-7.3.0-lib/lib/x86_64", 0x7ffdbd8a48e0) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/4zd34747fz0ggzzasy4icgn3lmy89pra-gcc-7.3.0-lib/lib/x86_64/libstdc++.so.6", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
stat("/nix/store/4zd34747fz0ggzzasy4icgn3lmy89pra-gcc-7.3.0-lib/lib/x86_64", 0x7ffdbd8a48e0) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/4zd34747fz0ggzzasy4icgn3lmy89pra-gcc-7.3.0-lib/lib/libstdc++.so.6", O_RDONLY|O_CLOEXEC) = 3
read(3, "\177ELF\2\1\1\3\0\0\0\0\0\0\0\0\3\0>\0\1\0\0\0@\231\10\0\0\0\0\0@\0\0\0\0\0\0\0\220\302\27\0\0\0\0\0\0\0\0\0@\0008\0\10\0@\0\33\0\32\0\1\0\0\0\5\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\377\26\0\0\0\0\0\0\377\26\0\0\0\0\0\0\0 \0\0\0\0\0\1\0\0\0\6\0\0\0`\t\27\0\0\0\0\0`\t7\0\0\0\0\0`\t7\0\0\0\0\0\30\270\0\0\0\0\0\0\300\354\0\0\0\0\0\0\0\0 \0\0\0\0\0\2\0\0\0\6\0\0\0h\223\27\0\0\0\0\0h\2237\0\0\0\0\0h\2237\0\0\0\0\0 \2\0\0\0\0\0\0 \2\0\0\0\0\0\0\10\0\0\0\0\0\0\0\7\0\0\0\4\0\0\0`\t\27\0\0\0\0\0`\t7\0\0\0\0\0`\t7\0\0\0\0\0\0\0\0\0\0\0\0\0 \0\0\0\0\0\0\0\10\0\0\0\0\0\0\0P\345td\4\0\0\0\370\247\23\0"..., 832) = 832
fstat(3, {st_mode=S_IFREG|0555, st_size=1558864, ...}) = 0
mmap(NULL, 3667488, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) = 0x76ffc572a000
mprotect(0x76ffc589a000, 2097152, PROT_NONE) = 0
mmap(0x76ffc5a9a000, 53248, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0x170000) = 0x76ffc5a9a000
mmap(0x76ffc5aa7000, 9760, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x76ffc5aa7000
close(3) = 0
openat(AT_FDCWD, "/nix/store/r8zhwq9xylxw8a823kpvqy0kfqq4g52f-nix-2.0pre5968_a6c0b773/lib/libm.so.6", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/dn852vplccs5w0qc3dnlfyma8b7b408d-boehm-gc-7.6.4/lib/libm.so.6", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/2kcrj1ksd2a14bm5sky182fv2xwfhfap-glibc-2.26-131/lib/libm.so.6", O_RDONLY|O_CLOEXEC) = 3
read(3, "\177ELF\2\1\1\3\0\0\0\0\0\0\0\0\3\0>\0\1\0\0\0\300w\0\0\0\0\0\0@\0\0\0\0\0\0\0008\362\25\0\0\0\0\0\0\0\0\0@\0008\0\10\0@\0\37\0\34\0\1\0\0\0\5\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\200\242\24\0\0\0\0\0\200\242\24\0\0\0\0\0\0\0 \0\0\0\0\0\1\0\0\0\6\0\0\0\210\254\24\0\0\0\0\0\210\2544\0\0\0\0\0\210\2544\0\0\0\0\0\230\5\0\0\0\0\0\0\240\5\0\0\0\0\0\0\0\0 \0\0\0\0\0\2\0\0\0\6\0\0\0\240\254\24\0\0\0\0\0\240\2544\0\0\0\0\0\240\2544\0\0\0\0\0000\2\0\0\0\0\0\0000\2\0\0\0\0\0\0\10\0\0\0\0\0\0\0\4\0\0\0\4\0\0\0\0\2\0\0\0\0\0\0\0\2\0\0\0\0\0\0\0\2\0\0\0\0\0\0D\0\0\0\0\0\0\0D\0\0\0\0\0\0\0\4\0\0\0\0\0\0\0P\345td\4\0\0\0\244\334\23\0"..., 832) = 832
fstat(3, {st_mode=S_IFREG|0555, st_size=1440248, ...}) = 0
mmap(NULL, 3453480, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) = 0x76ffc53de000
mprotect(0x76ffc5529000, 2093056, PROT_NONE) = 0
mmap(0x76ffc5728000, 8192, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0x14a000) = 0x76ffc5728000
close(3) = 0
openat(AT_FDCWD, "/nix/store/r8zhwq9xylxw8a823kpvqy0kfqq4g52f-nix-2.0pre5968_a6c0b773/lib/libgcc_s.so.1", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/dn852vplccs5w0qc3dnlfyma8b7b408d-boehm-gc-7.6.4/lib/libgcc_s.so.1", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/2kcrj1ksd2a14bm5sky182fv2xwfhfap-glibc-2.26-131/lib/libgcc_s.so.1", O_RDONLY|O_CLOEXEC) = 3
read(3, "\177ELF\2\1\1\0\0\0\0\0\0\0\0\0\3\0>\0\1\0\0\0\20+\0\0\0\0\0\0@\0\0\0\0\0\0\0\300\201\1\0\0\0\0\0\0\0\0\0@\0008\0\6\0@\0\35\0\32\0\1\0\0\0\5\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\fS\1\0\0\0\0\0\fS\1\0\0\0\0\0\0\0 \0\0\0\0\0\1\0\0\0\6\0\0\0\20S\1\0\0\0\0\0\20S!\0\0\0\0\0\20S!\0\0\0\0\0\320\3\0\0\0\0\0\0p\6\0\0\0\0\0\0\0\0 \0\0\0\0\0\2\0\0\0\6\0\0\0000S\1\0\0\0\0\0000S!\0\0\0\0\0000S!\0\0\0\0\0\0\2\0\0\0\0\0\0\0\2\0\0\0\0\0\0\10\0\0\0\0\0\0\0P\345td\4\0\0\00043\1\0\0\0\0\00043\1\0\0\0\0\00043\1\0\0\0\0\0D\5\0\0\0\0\0\0D\5\0\0\0\0\0\0\4\0\0\0\0\0\0\0Q\345td\6\0\0\0\0\0\0\0"..., 832) = 832
fstat(3, {st_mode=S_IFREG|0444, st_size=100608, ...}) = 0
mmap(NULL, 2185600, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) = 0x76ffc51c8000
mprotect(0x76ffc51de000, 2093056, PROT_NONE) = 0
mmap(0x76ffc53dd000, 4096, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0x15000) = 0x76ffc53dd000
close(3) = 0
openat(AT_FDCWD, "/nix/store/r8zhwq9xylxw8a823kpvqy0kfqq4g52f-nix-2.0pre5968_a6c0b773/lib/libc.so.6", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/dn852vplccs5w0qc3dnlfyma8b7b408d-boehm-gc-7.6.4/lib/libc.so.6", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/2kcrj1ksd2a14bm5sky182fv2xwfhfap-glibc-2.26-131/lib/libc.so.6", O_RDONLY|O_CLOEXEC) = 3
read(3, "\177ELF\2\1\1\3\0\0\0\0\0\0\0\0\3\0>\0\1\0\0\0@\21\2\0\0\0\0\0@\0\0\0\0\0\0\0Xn\36\0\0\0\0\0\0\0\0\0@\0008\0\v\0@\0H\0E\0\6\0\0\0\5\0\0\0@\0\0\0\0\0\0\0@\0\0\0\0\0\0\0@\0\0\0\0\0\0\0h\2\0\0\0\0\0\0h\2\0\0\0\0\0\0\10\0\0\0\0\0\0\0\3\0\0\0\4\0\0\0@\270\27\0\0\0\0\0@\270\27\0\0\0\0\0@\270\27\0\0\0\0\0T\0\0\0\0\0\0\0T\0\0\0\0\0\0\0 \0\0\0\0\0\0\0\1\0\0\0\5\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\204\204\32\0\0\0\0\0\204\204\32\0\0\0\0\0\0\0 \0\0\0\0\0\1\0\0\0\6\0\0\0\30\206\32\0\0\0\0\0\30\206:\0\0\0\0\0\30\206:\0\0\0\0\0\250P\0\0\0\0\0\0\350\222\0\0\0\0\0\0\0\0 \0\0\0\0\0\2\0\0\0\6\0\0\0\0\272\32\0"..., 832) = 832
fstat(3, {st_mode=S_IFREG|0555, st_size=1998936, ...}) = 0
mmap(NULL, 3873024, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) = 0x76ffc4e16000
mprotect(0x76ffc4fbf000, 2093056, PROT_NONE) = 0
mmap(0x76ffc51be000, 24576, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0x1a8000) = 0x76ffc51be000
mmap(0x76ffc51c4000, 14592, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x76ffc51c4000
close(3) = 0
openat(AT_FDCWD, "/nix/store/r8zhwq9xylxw8a823kpvqy0kfqq4g52f-nix-2.0pre5968_a6c0b773/lib/libcrypto.so.1.0.0", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/dl1hzcnxnbbcpf6zdhan58fghvdg3in8-openssl-1.0.2n/lib/tls/x86_64/x86_64/libcrypto.so.1.0.0", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
stat("/nix/store/dl1hzcnxnbbcpf6zdhan58fghvdg3in8-openssl-1.0.2n/lib/tls/x86_64/x86_64", 0x7ffdbd8a46f0) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/dl1hzcnxnbbcpf6zdhan58fghvdg3in8-openssl-1.0.2n/lib/tls/x86_64/libcrypto.so.1.0.0", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
stat("/nix/store/dl1hzcnxnbbcpf6zdhan58fghvdg3in8-openssl-1.0.2n/lib/tls/x86_64", 0x7ffdbd8a46f0) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/dl1hzcnxnbbcpf6zdhan58fghvdg3in8-openssl-1.0.2n/lib/tls/x86_64/libcrypto.so.1.0.0", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
stat("/nix/store/dl1hzcnxnbbcpf6zdhan58fghvdg3in8-openssl-1.0.2n/lib/tls/x86_64", 0x7ffdbd8a46f0) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/dl1hzcnxnbbcpf6zdhan58fghvdg3in8-openssl-1.0.2n/lib/tls/libcrypto.so.1.0.0", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
stat("/nix/store/dl1hzcnxnbbcpf6zdhan58fghvdg3in8-openssl-1.0.2n/lib/tls", 0x7ffdbd8a46f0) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/dl1hzcnxnbbcpf6zdhan58fghvdg3in8-openssl-1.0.2n/lib/x86_64/x86_64/libcrypto.so.1.0.0", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
stat("/nix/store/dl1hzcnxnbbcpf6zdhan58fghvdg3in8-openssl-1.0.2n/lib/x86_64/x86_64", 0x7ffdbd8a46f0) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/dl1hzcnxnbbcpf6zdhan58fghvdg3in8-openssl-1.0.2n/lib/x86_64/libcrypto.so.1.0.0", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
stat("/nix/store/dl1hzcnxnbbcpf6zdhan58fghvdg3in8-openssl-1.0.2n/lib/x86_64", 0x7ffdbd8a46f0) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/dl1hzcnxnbbcpf6zdhan58fghvdg3in8-openssl-1.0.2n/lib/x86_64/libcrypto.so.1.0.0", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
stat("/nix/store/dl1hzcnxnbbcpf6zdhan58fghvdg3in8-openssl-1.0.2n/lib/x86_64", 0x7ffdbd8a46f0) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/dl1hzcnxnbbcpf6zdhan58fghvdg3in8-openssl-1.0.2n/lib/libcrypto.so.1.0.0", O_RDONLY|O_CLOEXEC) = 3
read(3, "\177ELF\2\1\1\0\0\0\0\0\0\0\0\0\3\0>\0\1\0\0\0\0|\6\0\0\0\0\0@\0\0\0\0\0\0\0p\177'\0\0\0\0\0\0\0\0\0@\0008\0\10\0@\0\33\0\32\0\1\0\0\0\5\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\314\20!\0\0\0\0\0\314\20!\0\0\0\0\0\0\0 \0\0\0\0\0\1\0\0\0\6\0\0\0\20\35!\0\0\0\0\0\20\35A\0\0\0\0\0\20\35A\0\0\0\0\0qa\2\0\0\0\0\0\20\231\2\0\0\0\0\0\0\0 \0\0\0\0\0\2\0\0\0\6\0\0\0P\312\"\0\0\0\0\0P\312B\0\0\0\0\0P\312B\0\0\0\0\0\360\1\0\0\0\0\0\0\360\1\0\0\0\0\0\0\10\0\0\0\0\0\0\0\4\0\0\0\4\0\0\0\0\2\0\0\0\0\0\0\0\2\0\0\0\0\0\0\0\2\0\0\0\0\0\0$\0\0\0\0\0\0\0$\0\0\0\0\0\0\0\4\0\0\0\0\0\0\0P\345td\4\0\0\0\270[\35\0"..., 832) = 832
fstat(3, {st_mode=S_IFREG|0555, st_size=2590256, ...}) = 0
mmap(NULL, 8192, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) = 0x76ffc6cab000
mmap(NULL, 4437536, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) = 0x76ffc49da000
mprotect(0x76ffc4bec000, 2093056, PROT_NONE) = 0
mmap(0x76ffc4deb000, 159744, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0x211000) = 0x76ffc4deb000
mmap(0x76ffc4e12000, 13856, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x76ffc4e12000
close(3) = 0
openat(AT_FDCWD, "/nix/store/r8zhwq9xylxw8a823kpvqy0kfqq4g52f-nix-2.0pre5968_a6c0b773/lib/libdl.so.2", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/dn852vplccs5w0qc3dnlfyma8b7b408d-boehm-gc-7.6.4/lib/libdl.so.2", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/2kcrj1ksd2a14bm5sky182fv2xwfhfap-glibc-2.26-131/lib/libdl.so.2", O_RDONLY|O_CLOEXEC) = 3
read(3, "\177ELF\2\1\1\0\0\0\0\0\0\0\0\0\3\0>\0\1\0\0\0\0\16\0\0\0\0\0\0@\0\0\0\0\0\0\0\340@\0\0\0\0\0\0\0\0\0\0@\0008\0\10\0@\0\36\0\33\0\1\0\0\0\5\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0t \0\0\0\0\0\0t \0\0\0\0\0\0\0\0 \0\0\0\0\0\1\0\0\0\6\0\0\0\370,\0\0\0\0\0\0\370, \0\0\0\0\0\370, \0\0\0\0\0\20\3\0\0\0\0\0\0\230\3\0\0\0\0\0\0\0\0 \0\0\0\0\0\2\0\0\0\6\0\0\0 -\0\0\0\0\0\0 - \0\0\0\0\0 - \0\0\0\0\0\0\2\0\0\0\0\0\0\0\2\0\0\0\0\0\0\10\0\0\0\0\0\0\0\4\0\0\0\4\0\0\0\0\2\0\0\0\0\0\0\0\2\0\0\0\0\0\0\0\2\0\0\0\0\0\0D\0\0\0\0\0\0\0D\0\0\0\0\0\0\0\4\0\0\0\0\0\0\0P\345td\4\0\0\0`\32\0\0"..., 832) = 832
fstat(3, {st_mode=S_IFREG|0555, st_size=18528, ...}) = 0
mmap(NULL, 2109584, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) = 0x76ffc47d6000
mprotect(0x76ffc47d9000, 2093056, PROT_NONE) = 0
mmap(0x76ffc49d8000, 8192, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0x2000) = 0x76ffc49d8000
close(3) = 0
openat(AT_FDCWD, "/nix/store/2kcrj1ksd2a14bm5sky182fv2xwfhfap-glibc-2.26-131/lib/libpthread.so.0", O_RDONLY|O_CLOEXEC) = 3
read(3, "\177ELF\2\1\1\0\0\0\0\0\0\0\0\0\3\0>\0\1\0\0\0p_\0\0\0\0\0\0@\0\0\0\0\0\0\0\240\16\2\0\0\0\0\0\0\0\0\0@\0008\0\n\0@\0%\0\"\0\6\0\0\0\5\0\0\0@\0\0\0\0\0\0\0@\0\0\0\0\0\0\0@\0\0\0\0\0\0\0000\2\0\0\0\0\0\0000\2\0\0\0\0\0\0\10\0\0\0\0\0\0\0\3\0\0\0\4\0\0\0\340@\1\0\0\0\0\0\340@\1\0\0\0\0\0\340@\1\0\0\0\0\0T\0\0\0\0\0\0\0T\0\0\0\0\0\0\0 \0\0\0\0\0\0\0\1\0\0\0\5\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0P\210\1\0\0\0\0\0P\210\1\0\0\0\0\0\0\0 \0\0\0\0\0\1\0\0\0\6\0\0\0008\211\1\0\0\0\0\0008\211!\0\0\0\0\0008\211!\0\0\0\0\0\30\7\0\0\0\0\0\0\260H\0\0\0\0\0\0\0\0 \0\0\0\0\0\2\0\0\0\6\0\0\0\20\213\1\0"..., 832) = 832
fstat(3, {st_mode=S_IFREG|0555, st_size=137184, ...}) = 0
mmap(NULL, 2216424, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) = 0x76ffc45b8000
mprotect(0x76ffc45d1000, 2093056, PROT_NONE) = 0
mmap(0x76ffc47d0000, 8192, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0x18000) = 0x76ffc47d0000
mmap(0x76ffc47d2000, 12776, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x76ffc47d2000
close(3) = 0
openat(AT_FDCWD, "/nix/store/r8zhwq9xylxw8a823kpvqy0kfqq4g52f-nix-2.0pre5968_a6c0b773/lib/libsqlite3.so.0", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/3v6sf9l1fwbb1phq9ccm71096d44k489-sqlite-3.21.0/lib/tls/x86_64/x86_64/libsqlite3.so.0", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
stat("/nix/store/3v6sf9l1fwbb1phq9ccm71096d44k489-sqlite-3.21.0/lib/tls/x86_64/x86_64", 0x7ffdbd8a4380) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/3v6sf9l1fwbb1phq9ccm71096d44k489-sqlite-3.21.0/lib/tls/x86_64/libsqlite3.so.0", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
stat("/nix/store/3v6sf9l1fwbb1phq9ccm71096d44k489-sqlite-3.21.0/lib/tls/x86_64", 0x7ffdbd8a4380) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/3v6sf9l1fwbb1phq9ccm71096d44k489-sqlite-3.21.0/lib/tls/x86_64/libsqlite3.so.0", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
stat("/nix/store/3v6sf9l1fwbb1phq9ccm71096d44k489-sqlite-3.21.0/lib/tls/x86_64", 0x7ffdbd8a4380) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/3v6sf9l1fwbb1phq9ccm71096d44k489-sqlite-3.21.0/lib/tls/libsqlite3.so.0", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
stat("/nix/store/3v6sf9l1fwbb1phq9ccm71096d44k489-sqlite-3.21.0/lib/tls", 0x7ffdbd8a4380) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/3v6sf9l1fwbb1phq9ccm71096d44k489-sqlite-3.21.0/lib/x86_64/x86_64/libsqlite3.so.0", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
stat("/nix/store/3v6sf9l1fwbb1phq9ccm71096d44k489-sqlite-3.21.0/lib/x86_64/x86_64", 0x7ffdbd8a4380) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/3v6sf9l1fwbb1phq9ccm71096d44k489-sqlite-3.21.0/lib/x86_64/libsqlite3.so.0", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
stat("/nix/store/3v6sf9l1fwbb1phq9ccm71096d44k489-sqlite-3.21.0/lib/x86_64", 0x7ffdbd8a4380) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/3v6sf9l1fwbb1phq9ccm71096d44k489-sqlite-3.21.0/lib/x86_64/libsqlite3.so.0", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
stat("/nix/store/3v6sf9l1fwbb1phq9ccm71096d44k489-sqlite-3.21.0/lib/x86_64", 0x7ffdbd8a4380) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/3v6sf9l1fwbb1phq9ccm71096d44k489-sqlite-3.21.0/lib/libsqlite3.so.0", O_RDONLY|O_CLOEXEC) = 3
read(3, "\177ELF\2\1\1\0\0\0\0\0\0\0\0\0\3\0>\0\1\0\0\0p\321\0\0\0\0\0\0@\0\0\0\0\0\0\0008K\21\0\0\0\0\0\0\0\0\0@\0008\0\10\0@\0\33\0\32\0\1\0\0\0\5\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\334\216\17\0\0\0\0\0\334\216\17\0\0\0\0\0\0\0 \0\0\0\0\0\1\0\0\0\6\0\0\0P\224\17\0\0\0\0\0P\224/\0\0\0\0\0P\224/\0\0\0\0\0hH\0\0\0\0\0\0\310O\0\0\0\0\0\0\0\0 \0\0\0\0\0\2\0\0\0\6\0\0\0\360\267\17\0\0\0\0\0\360\267/\0\0\0\0\0\360\267/\0\0\0\0\0\0\2\0\0\0\0\0\0\0\2\0\0\0\0\0\0\10\0\0\0\0\0\0\0\4\0\0\0\4\0\0\0\0\2\0\0\0\0\0\0\0\2\0\0\0\0\0\0\0\2\0\0\0\0\0\0$\0\0\0\0\0\0\0$\0\0\0\0\0\0\0\4\0\0\0\0\0\0\0P\345td\4\0\0\0P\276\r\0"..., 832) = 832
fstat(3, {st_mode=S_IFREG|0555, st_size=1135096, ...}) = 0
mmap(NULL, 8192, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) = 0x76ffc6ca9000
mmap(NULL, 3138584, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) = 0x76ffc42b9000
mprotect(0x76ffc43b2000, 2097152, PROT_NONE) = 0
mmap(0x76ffc45b2000, 20480, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0xf9000) = 0x76ffc45b2000
mmap(0x76ffc45b7000, 1048, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x76ffc45b7000
close(3) = 0
openat(AT_FDCWD, "/nix/store/r8zhwq9xylxw8a823kpvqy0kfqq4g52f-nix-2.0pre5968_a6c0b773/lib/libbz2.so.1", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/3v6sf9l1fwbb1phq9ccm71096d44k489-sqlite-3.21.0/lib/libbz2.so.1", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/lha30sclfhw3r77hsknjfcawqafb94xi-curl-7.58.0/lib/tls/x86_64/x86_64/libbz2.so.1", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
stat("/nix/store/lha30sclfhw3r77hsknjfcawqafb94xi-curl-7.58.0/lib/tls/x86_64/x86_64", 0x7ffdbd8a4350) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/lha30sclfhw3r77hsknjfcawqafb94xi-curl-7.58.0/lib/tls/x86_64/libbz2.so.1", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
stat("/nix/store/lha30sclfhw3r77hsknjfcawqafb94xi-curl-7.58.0/lib/tls/x86_64", 0x7ffdbd8a4350) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/lha30sclfhw3r77hsknjfcawqafb94xi-curl-7.58.0/lib/tls/x86_64/libbz2.so.1", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
stat("/nix/store/lha30sclfhw3r77hsknjfcawqafb94xi-curl-7.58.0/lib/tls/x86_64", 0x7ffdbd8a4350) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/lha30sclfhw3r77hsknjfcawqafb94xi-curl-7.58.0/lib/tls/libbz2.so.1", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
stat("/nix/store/lha30sclfhw3r77hsknjfcawqafb94xi-curl-7.58.0/lib/tls", 0x7ffdbd8a4350) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/lha30sclfhw3r77hsknjfcawqafb94xi-curl-7.58.0/lib/x86_64/x86_64/libbz2.so.1", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
stat("/nix/store/lha30sclfhw3r77hsknjfcawqafb94xi-curl-7.58.0/lib/x86_64/x86_64", 0x7ffdbd8a4350) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/lha30sclfhw3r77hsknjfcawqafb94xi-curl-7.58.0/lib/x86_64/libbz2.so.1", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
stat("/nix/store/lha30sclfhw3r77hsknjfcawqafb94xi-curl-7.58.0/lib/x86_64", 0x7ffdbd8a4350) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/lha30sclfhw3r77hsknjfcawqafb94xi-curl-7.58.0/lib/x86_64/libbz2.so.1", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
stat("/nix/store/lha30sclfhw3r77hsknjfcawqafb94xi-curl-7.58.0/lib/x86_64", 0x7ffdbd8a4350) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/lha30sclfhw3r77hsknjfcawqafb94xi-curl-7.58.0/lib/libbz2.so.1", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
stat("/nix/store/lha30sclfhw3r77hsknjfcawqafb94xi-curl-7.58.0/lib", {st_mode=S_IFDIR|0555, st_size=6, ...}) = 0
openat(AT_FDCWD, "/nix/store/kgq1fxb7c84r212kmq4p8zcxyi7fv51r-libsodium-1.0.16/lib/tls/x86_64/x86_64/libbz2.so.1", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
stat("/nix/store/kgq1fxb7c84r212kmq4p8zcxyi7fv51r-libsodium-1.0.16/lib/tls/x86_64/x86_64", 0x7ffdbd8a4350) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/kgq1fxb7c84r212kmq4p8zcxyi7fv51r-libsodium-1.0.16/lib/tls/x86_64/libbz2.so.1", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
stat("/nix/store/kgq1fxb7c84r212kmq4p8zcxyi7fv51r-libsodium-1.0.16/lib/tls/x86_64", 0x7ffdbd8a4350) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/kgq1fxb7c84r212kmq4p8zcxyi7fv51r-libsodium-1.0.16/lib/tls/x86_64/libbz2.so.1", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
stat("/nix/store/kgq1fxb7c84r212kmq4p8zcxyi7fv51r-libsodium-1.0.16/lib/tls/x86_64", 0x7ffdbd8a4350) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/kgq1fxb7c84r212kmq4p8zcxyi7fv51r-libsodium-1.0.16/lib/tls/libbz2.so.1", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
stat("/nix/store/kgq1fxb7c84r212kmq4p8zcxyi7fv51r-libsodium-1.0.16/lib/tls", 0x7ffdbd8a4350) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/kgq1fxb7c84r212kmq4p8zcxyi7fv51r-libsodium-1.0.16/lib/x86_64/x86_64/libbz2.so.1", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
stat("/nix/store/kgq1fxb7c84r212kmq4p8zcxyi7fv51r-libsodium-1.0.16/lib/x86_64/x86_64", 0x7ffdbd8a4350) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/kgq1fxb7c84r212kmq4p8zcxyi7fv51r-libsodium-1.0.16/lib/x86_64/libbz2.so.1", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
stat("/nix/store/kgq1fxb7c84r212kmq4p8zcxyi7fv51r-libsodium-1.0.16/lib/x86_64", 0x7ffdbd8a4350) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/kgq1fxb7c84r212kmq4p8zcxyi7fv51r-libsodium-1.0.16/lib/x86_64/libbz2.so.1", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
stat("/nix/store/kgq1fxb7c84r212kmq4p8zcxyi7fv51r-libsodium-1.0.16/lib/x86_64", 0x7ffdbd8a4350) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/kgq1fxb7c84r212kmq4p8zcxyi7fv51r-libsodium-1.0.16/lib/libbz2.so.1", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
stat("/nix/store/kgq1fxb7c84r212kmq4p8zcxyi7fv51r-libsodium-1.0.16/lib", {st_mode=S_IFDIR|0555, st_size=6, ...}) = 0
openat(AT_FDCWD, "/nix/store/mrphq5k83715mqjlk0vjcr3h0j7zs8ix-bzip2-1.0.6.0.1/lib/tls/x86_64/x86_64/libbz2.so.1", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
stat("/nix/store/mrphq5k83715mqjlk0vjcr3h0j7zs8ix-bzip2-1.0.6.0.1/lib/tls/x86_64/x86_64", 0x7ffdbd8a4350) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/mrphq5k83715mqjlk0vjcr3h0j7zs8ix-bzip2-1.0.6.0.1/lib/tls/x86_64/libbz2.so.1", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
stat("/nix/store/mrphq5k83715mqjlk0vjcr3h0j7zs8ix-bzip2-1.0.6.0.1/lib/tls/x86_64", 0x7ffdbd8a4350) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/mrphq5k83715mqjlk0vjcr3h0j7zs8ix-bzip2-1.0.6.0.1/lib/tls/x86_64/libbz2.so.1", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
stat("/nix/store/mrphq5k83715mqjlk0vjcr3h0j7zs8ix-bzip2-1.0.6.0.1/lib/tls/x86_64", 0x7ffdbd8a4350) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/mrphq5k83715mqjlk0vjcr3h0j7zs8ix-bzip2-1.0.6.0.1/lib/tls/libbz2.so.1", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
stat("/nix/store/mrphq5k83715mqjlk0vjcr3h0j7zs8ix-bzip2-1.0.6.0.1/lib/tls", 0x7ffdbd8a4350) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/mrphq5k83715mqjlk0vjcr3h0j7zs8ix-bzip2-1.0.6.0.1/lib/x86_64/x86_64/libbz2.so.1", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
stat("/nix/store/mrphq5k83715mqjlk0vjcr3h0j7zs8ix-bzip2-1.0.6.0.1/lib/x86_64/x86_64", 0x7ffdbd8a4350) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/mrphq5k83715mqjlk0vjcr3h0j7zs8ix-bzip2-1.0.6.0.1/lib/x86_64/libbz2.so.1", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
stat("/nix/store/mrphq5k83715mqjlk0vjcr3h0j7zs8ix-bzip2-1.0.6.0.1/lib/x86_64", 0x7ffdbd8a4350) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/mrphq5k83715mqjlk0vjcr3h0j7zs8ix-bzip2-1.0.6.0.1/lib/x86_64/libbz2.so.1", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
stat("/nix/store/mrphq5k83715mqjlk0vjcr3h0j7zs8ix-bzip2-1.0.6.0.1/lib/x86_64", 0x7ffdbd8a4350) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/mrphq5k83715mqjlk0vjcr3h0j7zs8ix-bzip2-1.0.6.0.1/lib/libbz2.so.1", O_RDONLY|O_CLOEXEC) = 3
read(3, "\177ELF\2\1\1\0\0\0\0\0\0\0\0\0\3\0>\0\1\0\0\0\200\26\0\0\0\0\0\0@\0\0\0\0\0\0\0008\r\1\0\0\0\0\0\0\0\0\0@\0008\0\7\0@\0\32\0\27\0\1\0\0\0\5\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\264\350\0\0\0\0\0\0\264\350\0\0\0\0\0\0\0\0 \0\0\0\0\0\1\0\0\0\6\0\0\0\360\353\0\0\0\0\0\0\360\353 \0\0\0\0\0\360\353 \0\0\0\0\0000\20\0\0\0\0\0\0008\20\0\0\0\0\0\0\0\0 \0\0\0\0\0\2\0\0\0\6\0\0\0\200\354\0\0\0\0\0\0\200\354 \0\0\0\0\0\200\354 \0\0\0\0\0\320\1\0\0\0\0\0\0\320\1\0\0\0\0\0\0\10\0\0\0\0\0\0\0P\345td\4\0\0\0\210\335\0\0\0\0\0\0\210\335\0\0\0\0\0\0\210\335\0\0\0\0\0\0l\1\0\0\0\0\0\0l\1\0\0\0\0\0\0\4\0\0\0\0\0\0\0Q\345td\6\0\0\0\0\0\0\0"..., 832) = 832
fstat(3, {st_mode=S_IFREG|0555, st_size=70584, ...}) = 0
mmap(NULL, 2161704, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) = 0x76ffc40a9000
mprotect(0x76ffc40b8000, 2093056, PROT_NONE) = 0
mmap(0x76ffc42b7000, 8192, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0xe000) = 0x76ffc42b7000
close(3) = 0
openat(AT_FDCWD, "/nix/store/r8zhwq9xylxw8a823kpvqy0kfqq4g52f-nix-2.0pre5968_a6c0b773/lib/libcurl.so.4", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/3v6sf9l1fwbb1phq9ccm71096d44k489-sqlite-3.21.0/lib/libcurl.so.4", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/lha30sclfhw3r77hsknjfcawqafb94xi-curl-7.58.0/lib/libcurl.so.4", O_RDONLY|O_CLOEXEC) = 3
read(3, "\177ELF\2\1\1\0\0\0\0\0\0\0\0\0\3\0>\0\1\0\0\0 \307\0\0\0\0\0\0@\0\0\0\0\0\0\0(;\t\0\0\0\0\0\0\0\0\0@\0008\0\10\0@\0\33\0\32\0\1\0\0\0\5\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\344\r\10\0\0\0\0\0\344\r\10\0\0\0\0\0\0\0 \0\0\0\0\0\1\0\0\0\6\0\0\0P\25\10\0\0\0\0\0P\25(\0\0\0\0\0P\25(\0\0\0\0\0H,\0\0\0\0\0\0X0\0\0\0\0\0\0\0\0 \0\0\0\0\0\2\0\0\0\6\0\0\0\200/\10\0\0\0\0\0\200/(\0\0\0\0\0\200/(\0\0\0\0\0p\2\0\0\0\0\0\0p\2\0\0\0\0\0\0\10\0\0\0\0\0\0\0\4\0\0\0\4\0\0\0\0\2\0\0\0\0\0\0\0\2\0\0\0\0\0\0\0\2\0\0\0\0\0\0$\0\0\0\0\0\0\0$\0\0\0\0\0\0\0\4\0\0\0\0\0\0\0P\345td\4\0\0\0t/\7\0"..., 832) = 832
fstat(3, {st_mode=S_IFREG|0555, st_size=606696, ...}) = 0
mmap(NULL, 2639272, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) = 0x76ffc3e24000
mprotect(0x76ffc3ea5000, 2097152, PROT_NONE) = 0
mmap(0x76ffc40a5000, 16384, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0x81000) = 0x76ffc40a5000
close(3) = 0
openat(AT_FDCWD, "/nix/store/r8zhwq9xylxw8a823kpvqy0kfqq4g52f-nix-2.0pre5968_a6c0b773/lib/libsodium.so.23", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/3v6sf9l1fwbb1phq9ccm71096d44k489-sqlite-3.21.0/lib/libsodium.so.23", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/lha30sclfhw3r77hsknjfcawqafb94xi-curl-7.58.0/lib/libsodium.so.23", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/kgq1fxb7c84r212kmq4p8zcxyi7fv51r-libsodium-1.0.16/lib/libsodium.so.23", O_RDONLY|O_CLOEXEC) = 3
read(3, "\177ELF\2\1\1\0\0\0\0\0\0\0\0\0\3\0>\0\1\0\0\0`\272\0\0\0\0\0\0@\0\0\0\0\0\0\0008\362\5\0\0\0\0\0\0\0\0\0@\0008\0\t\0@\0\33\0\32\0\1\0\0\0\5\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0L\35\5\0\0\0\0\0L\35\5\0\0\0\0\0\0\0 \0\0\0\0\0\1\0\0\0\6\0\0\0 (\5\0\0\0\0\0 (%\0\0\0\0\0 (%\0\0\0\0\0\20\v\0\0\0\0\0\0\350\v\0\0\0\0\0\0\0\0 \0\0\0\0\0\2\0\0\0\6\0\0\0000(\5\0\0\0\0\0000(%\0\0\0\0\0000(%\0\0\0\0\0\360\1\0\0\0\0\0\0\360\1\0\0\0\0\0\0\10\0\0\0\0\0\0\0\4\0\0\0\4\0\0\0008\2\0\0\0\0\0\0008\2\0\0\0\0\0\0008\2\0\0\0\0\0\0$\0\0\0\0\0\0\0$\0\0\0\0\0\0\0\4\0\0\0\0\0\0\0\7\0\0\0\4\0\0\0 (\5\0"..., 832) = 832
fstat(3, {st_mode=S_IFREG|0555, st_size=391416, ...}) = 0
mmap(NULL, 2438152, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) = 0x76ffc3bd0000
mprotect(0x76ffc3c22000, 2097152, PROT_NONE) = 0
mmap(0x76ffc3e22000, 8192, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0x52000) = 0x76ffc3e22000
close(3) = 0
openat(AT_FDCWD, "/nix/store/r8zhwq9xylxw8a823kpvqy0kfqq4g52f-nix-2.0pre5968_a6c0b773/lib/libaws-cpp-sdk-s3.so", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/3v6sf9l1fwbb1phq9ccm71096d44k489-sqlite-3.21.0/lib/libaws-cpp-sdk-s3.so", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/lha30sclfhw3r77hsknjfcawqafb94xi-curl-7.58.0/lib/libaws-cpp-sdk-s3.so", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/kgq1fxb7c84r212kmq4p8zcxyi7fv51r-libsodium-1.0.16/lib/libaws-cpp-sdk-s3.so", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/mrphq5k83715mqjlk0vjcr3h0j7zs8ix-bzip2-1.0.6.0.1/lib/libaws-cpp-sdk-s3.so", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/2gxzfkyl05040p97f7lzilv7yx3jj3v7-libseccomp-2.3.3/lib/tls/x86_64/x86_64/libaws-cpp-sdk-s3.so", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
stat("/nix/store/2gxzfkyl05040p97f7lzilv7yx3jj3v7-libseccomp-2.3.3/lib/tls/x86_64/x86_64", 0x7ffdbd8a42c0) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/2gxzfkyl05040p97f7lzilv7yx3jj3v7-libseccomp-2.3.3/lib/tls/x86_64/libaws-cpp-sdk-s3.so", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
stat("/nix/store/2gxzfkyl05040p97f7lzilv7yx3jj3v7-libseccomp-2.3.3/lib/tls/x86_64", 0x7ffdbd8a42c0) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/2gxzfkyl05040p97f7lzilv7yx3jj3v7-libseccomp-2.3.3/lib/tls/x86_64/libaws-cpp-sdk-s3.so", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
stat("/nix/store/2gxzfkyl05040p97f7lzilv7yx3jj3v7-libseccomp-2.3.3/lib/tls/x86_64", 0x7ffdbd8a42c0) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/2gxzfkyl05040p97f7lzilv7yx3jj3v7-libseccomp-2.3.3/lib/tls/libaws-cpp-sdk-s3.so", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
stat("/nix/store/2gxzfkyl05040p97f7lzilv7yx3jj3v7-libseccomp-2.3.3/lib/tls", 0x7ffdbd8a42c0) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/2gxzfkyl05040p97f7lzilv7yx3jj3v7-libseccomp-2.3.3/lib/x86_64/x86_64/libaws-cpp-sdk-s3.so", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
stat("/nix/store/2gxzfkyl05040p97f7lzilv7yx3jj3v7-libseccomp-2.3.3/lib/x86_64/x86_64", 0x7ffdbd8a42c0) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/2gxzfkyl05040p97f7lzilv7yx3jj3v7-libseccomp-2.3.3/lib/x86_64/libaws-cpp-sdk-s3.so", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
stat("/nix/store/2gxzfkyl05040p97f7lzilv7yx3jj3v7-libseccomp-2.3.3/lib/x86_64", 0x7ffdbd8a42c0) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/2gxzfkyl05040p97f7lzilv7yx3jj3v7-libseccomp-2.3.3/lib/x86_64/libaws-cpp-sdk-s3.so", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
stat("/nix/store/2gxzfkyl05040p97f7lzilv7yx3jj3v7-libseccomp-2.3.3/lib/x86_64", 0x7ffdbd8a42c0) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/2gxzfkyl05040p97f7lzilv7yx3jj3v7-libseccomp-2.3.3/lib/libaws-cpp-sdk-s3.so", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
stat("/nix/store/2gxzfkyl05040p97f7lzilv7yx3jj3v7-libseccomp-2.3.3/lib", {st_mode=S_IFDIR|0555, st_size=7, ...}) = 0
openat(AT_FDCWD, "/nix/store/jhpzzb3xmxkapqvg9pnsx51psfnfawi0-aws-sdk-cpp-1.3.22/lib/tls/x86_64/x86_64/libaws-cpp-sdk-s3.so", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
stat("/nix/store/jhpzzb3xmxkapqvg9pnsx51psfnfawi0-aws-sdk-cpp-1.3.22/lib/tls/x86_64/x86_64", 0x7ffdbd8a42c0) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/jhpzzb3xmxkapqvg9pnsx51psfnfawi0-aws-sdk-cpp-1.3.22/lib/tls/x86_64/libaws-cpp-sdk-s3.so", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
stat("/nix/store/jhpzzb3xmxkapqvg9pnsx51psfnfawi0-aws-sdk-cpp-1.3.22/lib/tls/x86_64", 0x7ffdbd8a42c0) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/jhpzzb3xmxkapqvg9pnsx51psfnfawi0-aws-sdk-cpp-1.3.22/lib/tls/x86_64/libaws-cpp-sdk-s3.so", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
stat("/nix/store/jhpzzb3xmxkapqvg9pnsx51psfnfawi0-aws-sdk-cpp-1.3.22/lib/tls/x86_64", 0x7ffdbd8a42c0) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/jhpzzb3xmxkapqvg9pnsx51psfnfawi0-aws-sdk-cpp-1.3.22/lib/tls/libaws-cpp-sdk-s3.so", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
stat("/nix/store/jhpzzb3xmxkapqvg9pnsx51psfnfawi0-aws-sdk-cpp-1.3.22/lib/tls", 0x7ffdbd8a42c0) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/jhpzzb3xmxkapqvg9pnsx51psfnfawi0-aws-sdk-cpp-1.3.22/lib/x86_64/x86_64/libaws-cpp-sdk-s3.so", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
stat("/nix/store/jhpzzb3xmxkapqvg9pnsx51psfnfawi0-aws-sdk-cpp-1.3.22/lib/x86_64/x86_64", 0x7ffdbd8a42c0) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/jhpzzb3xmxkapqvg9pnsx51psfnfawi0-aws-sdk-cpp-1.3.22/lib/x86_64/libaws-cpp-sdk-s3.so", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
stat("/nix/store/jhpzzb3xmxkapqvg9pnsx51psfnfawi0-aws-sdk-cpp-1.3.22/lib/x86_64", 0x7ffdbd8a42c0) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/jhpzzb3xmxkapqvg9pnsx51psfnfawi0-aws-sdk-cpp-1.3.22/lib/x86_64/libaws-cpp-sdk-s3.so", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
stat("/nix/store/jhpzzb3xmxkapqvg9pnsx51psfnfawi0-aws-sdk-cpp-1.3.22/lib/x86_64", 0x7ffdbd8a42c0) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/jhpzzb3xmxkapqvg9pnsx51psfnfawi0-aws-sdk-cpp-1.3.22/lib/libaws-cpp-sdk-s3.so", O_RDONLY|O_CLOEXEC) = 3
read(3, "\177ELF\2\1\1\0\0\0\0\0\0\0\0\0\3\0>\0\1\0\0\0\300R\n\0\0\0\0\0@\0\0\0\0\0\0\0(\0029\0\0\0\0\0\0\0\0\0@\0008\0\10\0@\0\33\0\32\0\1\0\0\0\5\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0004\237!\0\0\0\0\0004\237!\0\0\0\0\0\0\0 \0\0\0\0\0\1\0\0\0\6\0\0\0p\250!\0\0\0\0\0p\250A\0\0\0\0\0p\250A\0\0\0\0\0\240\27\1\0\0\0\0\0\370\32\1\0\0\0\0\0\0\0 \0\0\0\0\0\2\0\0\0\6\0\0\0\310\224\"\0\0\0\0\0\310\224B\0\0\0\0\0\310\224B\0\0\0\0\0p\2\0\0\0\0\0\0p\2\0\0\0\0\0\0\10\0\0\0\0\0\0\0\4\0\0\0\4\0\0\0\0\2\0\0\0\0\0\0\0\2\0\0\0\0\0\0\0\2\0\0\0\0\0\0$\0\0\0\0\0\0\0$\0\0\0\0\0\0\0\4\0\0\0\0\0\0\0P\345td\4\0\0\0`\237\36\0"..., 832) = 832
fstat(3, {st_mode=S_IFREG|0555, st_size=3737832, ...}) = 0
mmap(NULL, 4375400, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) = 0x76ffc37a3000
mprotect(0x76ffc39bd000, 2097152, PROT_NONE) = 0
mmap(0x76ffc3bbd000, 77824, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0x21a000) = 0x76ffc3bbd000
close(3) = 0
openat(AT_FDCWD, "/nix/store/r8zhwq9xylxw8a823kpvqy0kfqq4g52f-nix-2.0pre5968_a6c0b773/lib/libaws-cpp-sdk-core.so", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/3v6sf9l1fwbb1phq9ccm71096d44k489-sqlite-3.21.0/lib/libaws-cpp-sdk-core.so", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/lha30sclfhw3r77hsknjfcawqafb94xi-curl-7.58.0/lib/libaws-cpp-sdk-core.so", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/kgq1fxb7c84r212kmq4p8zcxyi7fv51r-libsodium-1.0.16/lib/libaws-cpp-sdk-core.so", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/mrphq5k83715mqjlk0vjcr3h0j7zs8ix-bzip2-1.0.6.0.1/lib/libaws-cpp-sdk-core.so", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/2gxzfkyl05040p97f7lzilv7yx3jj3v7-libseccomp-2.3.3/lib/libaws-cpp-sdk-core.so", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/jhpzzb3xmxkapqvg9pnsx51psfnfawi0-aws-sdk-cpp-1.3.22/lib/libaws-cpp-sdk-core.so", O_RDONLY|O_CLOEXEC) = 3
read(3, "\177ELF\2\1\1\0\0\0\0\0\0\0\0\0\3\0>\0\1\0\0\0p\5\5\0\0\0\0\0@\0\0\0\0\0\0\0\370\321\22\0\0\0\0\0\0\0\0\0@\0008\0\10\0@\0\33\0\32\0\1\0\0\0\5\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\244m\16\0\0\0\0\0\244m\16\0\0\0\0\0\0\0 \0\0\0\0\0\1\0\0\0\6\0\0\0x|\16\0\0\0\0\0x|.\0\0\0\0\0x|.\0\0\0\0\0He\0\0\0\0\0\0\300h\0\0\0\0\0\0\0\0 \0\0\0\0\0\2\0\0\0\6\0\0\0\210\272\16\0\0\0\0\0\210\272.\0\0\0\0\0\210\272.\0\0\0\0\0P\2\0\0\0\0\0\0P\2\0\0\0\0\0\0\10\0\0\0\0\0\0\0\4\0\0\0\4\0\0\0\0\2\0\0\0\0\0\0\0\2\0\0\0\0\0\0\0\2\0\0\0\0\0\0$\0\0\0\0\0\0\0$\0\0\0\0\0\0\0\4\0\0\0\0\0\0\0P\345td\4\0\0\0\320\r\r\0"..., 832) = 832
fstat(3, {st_mode=S_IFREG|0555, st_size=1235128, ...}) = 0
mmap(NULL, 3073336, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) = 0x76ffc34b4000
mprotect(0x76ffc359b000, 2097152, PROT_NONE) = 0
mmap(0x76ffc379b000, 32768, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0xe7000) = 0x76ffc379b000
close(3) = 0
openat(AT_FDCWD, "/nix/store/r8zhwq9xylxw8a823kpvqy0kfqq4g52f-nix-2.0pre5968_a6c0b773/lib/libseccomp.so.2", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/3v6sf9l1fwbb1phq9ccm71096d44k489-sqlite-3.21.0/lib/libseccomp.so.2", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/lha30sclfhw3r77hsknjfcawqafb94xi-curl-7.58.0/lib/libseccomp.so.2", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/kgq1fxb7c84r212kmq4p8zcxyi7fv51r-libsodium-1.0.16/lib/libseccomp.so.2", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/mrphq5k83715mqjlk0vjcr3h0j7zs8ix-bzip2-1.0.6.0.1/lib/libseccomp.so.2", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/2gxzfkyl05040p97f7lzilv7yx3jj3v7-libseccomp-2.3.3/lib/libseccomp.so.2", O_RDONLY|O_CLOEXEC) = 3
read(3, "\177ELF\2\1\1\0\0\0\0\0\0\0\0\0\3\0>\0\1\0\0\0\360\372\1\0\0\0\0\0@\0\0\0\0\0\0\00088\4\0\0\0\0\0\0\0\0\0@\0008\0\7\0@\0\32\0\31\0\1\0\0\0\5\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0t\274\2\0\0\0\0\0t\274\2\0\0\0\0\0\0\0 \0\0\0\0\0\1\0\0\0\6\0\0\0\260\303\2\0\0\0\0\0\260\303\"\0\0\0\0\0\260\303\"\0\0\0\0\0hL\1\0\0\0\0\0pL\1\0\0\0\0\0\0\0 \0\0\0\0\0\2\0\0\0\6\0\0\0000\r\4\0\0\0\0\0000\r$\0\0\0\0\0000\r$\0\0\0\0\0\320\1\0\0\0\0\0\0\320\1\0\0\0\0\0\0\10\0\0\0\0\0\0\0P\345td\4\0\0\0P\236\2\0\0\0\0\0P\236\2\0\0\0\0\0P\236\2\0\0\0\0\0|\4\0\0\0\0\0\0|\4\0\0\0\0\0\0\4\0\0\0\0\0\0\0Q\345td\6\0\0\0\0\0\0\0"..., 832) = 832
mmap(NULL, 8192, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) = 0x76ffc6ca7000
fstat(3, {st_mode=S_IFREG|0555, st_size=278200, ...}) = 0
mmap(NULL, 2363424, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) = 0x76ffc3272000
mprotect(0x76ffc329e000, 2097152, PROT_NONE) = 0
mmap(0x76ffc349e000, 90112, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0x2c000) = 0x76ffc349e000
close(3) = 0
openat(AT_FDCWD, "/nix/store/r8zhwq9xylxw8a823kpvqy0kfqq4g52f-nix-2.0pre5968_a6c0b773/lib/liblzma.so.5", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/chf54cl12ifswf6swh7kxpif477drihi-xz-5.2.3/lib/tls/x86_64/x86_64/liblzma.so.5", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
stat("/nix/store/chf54cl12ifswf6swh7kxpif477drihi-xz-5.2.3/lib/tls/x86_64/x86_64", 0x7ffdbd8a4230) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/chf54cl12ifswf6swh7kxpif477drihi-xz-5.2.3/lib/tls/x86_64/liblzma.so.5", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
stat("/nix/store/chf54cl12ifswf6swh7kxpif477drihi-xz-5.2.3/lib/tls/x86_64", 0x7ffdbd8a4230) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/chf54cl12ifswf6swh7kxpif477drihi-xz-5.2.3/lib/tls/x86_64/liblzma.so.5", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
stat("/nix/store/chf54cl12ifswf6swh7kxpif477drihi-xz-5.2.3/lib/tls/x86_64", 0x7ffdbd8a4230) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/chf54cl12ifswf6swh7kxpif477drihi-xz-5.2.3/lib/tls/liblzma.so.5", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
stat("/nix/store/chf54cl12ifswf6swh7kxpif477drihi-xz-5.2.3/lib/tls", 0x7ffdbd8a4230) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/chf54cl12ifswf6swh7kxpif477drihi-xz-5.2.3/lib/x86_64/x86_64/liblzma.so.5", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
stat("/nix/store/chf54cl12ifswf6swh7kxpif477drihi-xz-5.2.3/lib/x86_64/x86_64", 0x7ffdbd8a4230) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/chf54cl12ifswf6swh7kxpif477drihi-xz-5.2.3/lib/x86_64/liblzma.so.5", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
stat("/nix/store/chf54cl12ifswf6swh7kxpif477drihi-xz-5.2.3/lib/x86_64", 0x7ffdbd8a4230) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/chf54cl12ifswf6swh7kxpif477drihi-xz-5.2.3/lib/x86_64/liblzma.so.5", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
stat("/nix/store/chf54cl12ifswf6swh7kxpif477drihi-xz-5.2.3/lib/x86_64", 0x7ffdbd8a4230) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/chf54cl12ifswf6swh7kxpif477drihi-xz-5.2.3/lib/liblzma.so.5", O_RDONLY|O_CLOEXEC) = 3
read(3, "\177ELF\2\1\1\0\0\0\0\0\0\0\0\0\3\0>\0\1\0\0\0@/\0\0\0\0\0\0@\0\0\0\0\0\0\0\340\221\2\0\0\0\0\0\0\0\0\0@\0008\0\7\0@\0\33\0\30\0\1\0\0\0\5\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0tD\2\0\0\0\0\0tD\2\0\0\0\0\0\0\0 \0\0\0\0\0\1\0\0\0\6\0\0\0000H\2\0\0\0\0\0000H\"\0\0\0\0\0000H\"\0\0\0\0\0\330\7\0\0\0\0\0\0\340\7\0\0\0\0\0\0\0\0 \0\0\0\0\0\2\0\0\0\6\0\0\0`K\2\0\0\0\0\0`K\"\0\0\0\0\0`K\"\0\0\0\0\0\0\2\0\0\0\0\0\0\0\2\0\0\0\0\0\0\10\0\0\0\0\0\0\0P\345td\4\0\0\0\300\0\2\0\0\0\0\0\300\0\2\0\0\0\0\0\300\0\2\0\0\0\0\0D\t\0\0\0\0\0\0D\t\0\0\0\0\0\0\4\0\0\0\0\0\0\0Q\345td\6\0\0\0\0\0\0\0"..., 832) = 832
fstat(3, {st_mode=S_IFREG|0555, st_size=170144, ...}) = 0
mmap(NULL, 2248720, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) = 0x76ffc304c000
mprotect(0x76ffc3071000, 2093056, PROT_NONE) = 0
mmap(0x76ffc3270000, 8192, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0x24000) = 0x76ffc3270000
close(3) = 0
openat(AT_FDCWD, "/nix/store/r8zhwq9xylxw8a823kpvqy0kfqq4g52f-nix-2.0pre5968_a6c0b773/lib/libbrotlienc.so.1", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/chf54cl12ifswf6swh7kxpif477drihi-xz-5.2.3/lib/libbrotlienc.so.1", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/dl1hzcnxnbbcpf6zdhan58fghvdg3in8-openssl-1.0.2n/lib/libbrotlienc.so.1", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/mwgp39wfjlfd95dn09v0vywhm1x1v694-brotli-1.0.2-lib/lib/tls/x86_64/x86_64/libbrotlienc.so.1", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
stat("/nix/store/mwgp39wfjlfd95dn09v0vywhm1x1v694-brotli-1.0.2-lib/lib/tls/x86_64/x86_64", 0x7ffdbd8a4200) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/mwgp39wfjlfd95dn09v0vywhm1x1v694-brotli-1.0.2-lib/lib/tls/x86_64/libbrotlienc.so.1", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
stat("/nix/store/mwgp39wfjlfd95dn09v0vywhm1x1v694-brotli-1.0.2-lib/lib/tls/x86_64", 0x7ffdbd8a4200) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/mwgp39wfjlfd95dn09v0vywhm1x1v694-brotli-1.0.2-lib/lib/tls/x86_64/libbrotlienc.so.1", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
stat("/nix/store/mwgp39wfjlfd95dn09v0vywhm1x1v694-brotli-1.0.2-lib/lib/tls/x86_64", 0x7ffdbd8a4200) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/mwgp39wfjlfd95dn09v0vywhm1x1v694-brotli-1.0.2-lib/lib/tls/libbrotlienc.so.1", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
stat("/nix/store/mwgp39wfjlfd95dn09v0vywhm1x1v694-brotli-1.0.2-lib/lib/tls", 0x7ffdbd8a4200) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/mwgp39wfjlfd95dn09v0vywhm1x1v694-brotli-1.0.2-lib/lib/x86_64/x86_64/libbrotlienc.so.1", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
stat("/nix/store/mwgp39wfjlfd95dn09v0vywhm1x1v694-brotli-1.0.2-lib/lib/x86_64/x86_64", 0x7ffdbd8a4200) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/mwgp39wfjlfd95dn09v0vywhm1x1v694-brotli-1.0.2-lib/lib/x86_64/libbrotlienc.so.1", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
stat("/nix/store/mwgp39wfjlfd95dn09v0vywhm1x1v694-brotli-1.0.2-lib/lib/x86_64", 0x7ffdbd8a4200) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/mwgp39wfjlfd95dn09v0vywhm1x1v694-brotli-1.0.2-lib/lib/x86_64/libbrotlienc.so.1", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
stat("/nix/store/mwgp39wfjlfd95dn09v0vywhm1x1v694-brotli-1.0.2-lib/lib/x86_64", 0x7ffdbd8a4200) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/mwgp39wfjlfd95dn09v0vywhm1x1v694-brotli-1.0.2-lib/lib/libbrotlienc.so.1", O_RDONLY|O_CLOEXEC) = 3
read(3, "\177ELF\2\1\1\0\0\0\0\0\0\0\0\0\3\0>\0\1\0\0\0\220\f\0\0\0\0\0\0@\0\0\0\0\0\0\0P\177\10\0\0\0\0\0\0\0\0\0@\0008\0\7\0@\0\31\0\30\0\1\0\0\0\5\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\274>\10\0\0\0\0\0\274>\10\0\0\0\0\0\0\0 \0\0\0\0\0\1\0\0\0\6\0\0\0@M\10\0\0\0\0\0@M(\0\0\0\0\0@M(\0\0\0\0\0\310\2\0\0\0\0\0\0\320\2\0\0\0\0\0\0\0\0 \0\0\0\0\0\2\0\0\0\6\0\0\0PM\10\0\0\0\0\0PM(\0\0\0\0\0PM(\0\0\0\0\0\360\1\0\0\0\0\0\0\360\1\0\0\0\0\0\0\10\0\0\0\0\0\0\0P\345td\4\0\0\0@\n\10\0\0\0\0\0@\n\10\0\0\0\0\0@\n\10\0\0\0\0\0\304\4\0\0\0\0\0\0\304\4\0\0\0\0\0\0\4\0\0\0\0\0\0\0Q\345td\6\0\0\0\0\0\0\0"..., 832) = 832
fstat(3, {st_mode=S_IFREG|0555, st_size=558480, ...}) = 0
mmap(NULL, 2641936, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) = 0x76ffc2dc6000
mprotect(0x76ffc2e4a000, 2097152, PROT_NONE) = 0
mmap(0x76ffc304a000, 8192, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0x84000) = 0x76ffc304a000
close(3) = 0
openat(AT_FDCWD, "/nix/store/r8zhwq9xylxw8a823kpvqy0kfqq4g52f-nix-2.0pre5968_a6c0b773/lib/libbrotlidec.so.1", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/chf54cl12ifswf6swh7kxpif477drihi-xz-5.2.3/lib/libbrotlidec.so.1", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/dl1hzcnxnbbcpf6zdhan58fghvdg3in8-openssl-1.0.2n/lib/libbrotlidec.so.1", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/mwgp39wfjlfd95dn09v0vywhm1x1v694-brotli-1.0.2-lib/lib/libbrotlidec.so.1", O_RDONLY|O_CLOEXEC) = 3
read(3, "\177ELF\2\1\1\0\0\0\0\0\0\0\0\0\3\0>\0\1\0\0\0\20\v\0\0\0\0\0\0@\0\0\0\0\0\0\0\20\322\0\0\0\0\0\0\0\0\0\0@\0008\0\7\0@\0\31\0\30\0\1\0\0\0\5\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0l\256\0\0\0\0\0\0l\256\0\0\0\0\0\0\0\0 \0\0\0\0\0\1\0\0\0\6\0\0\0\210\275\0\0\0\0\0\0\210\275 \0\0\0\0\0\210\275 \0\0\0\0\0\200\2\0\0\0\0\0\0\210\2\0\0\0\0\0\0\0\0 \0\0\0\0\0\2\0\0\0\6\0\0\0\230\275\0\0\0\0\0\0\230\275 \0\0\0\0\0\230\275 \0\0\0\0\0\360\1\0\0\0\0\0\0\360\1\0\0\0\0\0\0\10\0\0\0\0\0\0\0P\345td\4\0\0\0P\243\0\0\0\0\0\0P\243\0\0\0\0\0\0P\243\0\0\0\0\0\0\214\1\0\0\0\0\0\0\214\1\0\0\0\0\0\0\4\0\0\0\0\0\0\0Q\345td\6\0\0\0\0\0\0\0"..., 832) = 832
fstat(3, {st_mode=S_IFREG|0555, st_size=55376, ...}) = 0
mmap(NULL, 2146320, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) = 0x76ffc2bb9000
mprotect(0x76ffc2bc4000, 2097152, PROT_NONE) = 0
mmap(0x76ffc2dc4000, 8192, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0xb000) = 0x76ffc2dc4000
close(3) = 0
mmap(NULL, 8192, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) = 0x76ffc6ca5000
openat(AT_FDCWD, "/nix/store/y1wvrg5ckyy3472fpknf468cxfk8wkw0-nghttp2-1.24.0-lib/lib/tls/x86_64/x86_64/libnghttp2.so.14", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
stat("/nix/store/y1wvrg5ckyy3472fpknf468cxfk8wkw0-nghttp2-1.24.0-lib/lib/tls/x86_64/x86_64", 0x7ffdbd8a41a0) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/y1wvrg5ckyy3472fpknf468cxfk8wkw0-nghttp2-1.24.0-lib/lib/tls/x86_64/libnghttp2.so.14", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
stat("/nix/store/y1wvrg5ckyy3472fpknf468cxfk8wkw0-nghttp2-1.24.0-lib/lib/tls/x86_64", 0x7ffdbd8a41a0) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/y1wvrg5ckyy3472fpknf468cxfk8wkw0-nghttp2-1.24.0-lib/lib/tls/x86_64/libnghttp2.so.14", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
stat("/nix/store/y1wvrg5ckyy3472fpknf468cxfk8wkw0-nghttp2-1.24.0-lib/lib/tls/x86_64", 0x7ffdbd8a41a0) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/y1wvrg5ckyy3472fpknf468cxfk8wkw0-nghttp2-1.24.0-lib/lib/tls/libnghttp2.so.14", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
stat("/nix/store/y1wvrg5ckyy3472fpknf468cxfk8wkw0-nghttp2-1.24.0-lib/lib/tls", 0x7ffdbd8a41a0) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/y1wvrg5ckyy3472fpknf468cxfk8wkw0-nghttp2-1.24.0-lib/lib/x86_64/x86_64/libnghttp2.so.14", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
stat("/nix/store/y1wvrg5ckyy3472fpknf468cxfk8wkw0-nghttp2-1.24.0-lib/lib/x86_64/x86_64", 0x7ffdbd8a41a0) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/y1wvrg5ckyy3472fpknf468cxfk8wkw0-nghttp2-1.24.0-lib/lib/x86_64/libnghttp2.so.14", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
stat("/nix/store/y1wvrg5ckyy3472fpknf468cxfk8wkw0-nghttp2-1.24.0-lib/lib/x86_64", 0x7ffdbd8a41a0) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/y1wvrg5ckyy3472fpknf468cxfk8wkw0-nghttp2-1.24.0-lib/lib/x86_64/libnghttp2.so.14", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
stat("/nix/store/y1wvrg5ckyy3472fpknf468cxfk8wkw0-nghttp2-1.24.0-lib/lib/x86_64", 0x7ffdbd8a41a0) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/y1wvrg5ckyy3472fpknf468cxfk8wkw0-nghttp2-1.24.0-lib/lib/libnghttp2.so.14", O_RDONLY|O_CLOEXEC) = 3
read(3, "\177ELF\2\1\1\0\0\0\0\0\0\0\0\0\3\0>\0\1\0\0\0`K\0\0\0\0\0\0@\0\0\0\0\0\0\0\330\276\2\0\0\0\0\0\0\0\0\0@\0008\0\7\0@\0\31\0\30\0\1\0\0\0\5\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\204)\2\0\0\0\0\0\204)\2\0\0\0\0\0\0\0 \0\0\0\0\0\1\0\0\0\6\0\0\0\260,\2\0\0\0\0\0\260,\"\0\0\0\0\0\260,\"\0\0\0\0\0008\"\0\0\0\0\0\0@\"\0\0\0\0\0\0\0\0 \0\0\0\0\0\2\0\0\0\6\0\0\0\300,\2\0\0\0\0\0\300,\"\0\0\0\0\0\300,\"\0\0\0\0\0\320\1\0\0\0\0\0\0\320\1\0\0\0\0\0\0\10\0\0\0\0\0\0\0P\345td\4\0\0\0\30\326\1\0\0\0\0\0\30\326\1\0\0\0\0\0\30\326\1\0\0\0\0\0\264\r\0\0\0\0\0\0\264\r\0\0\0\0\0\0\4\0\0\0\0\0\0\0Q\345td\6\0\0\0\0\0\0\0"..., 832) = 832
fstat(3, {st_mode=S_IFREG|0555, st_size=181528, ...}) = 0
mmap(NULL, 2248432, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) = 0x76ffc2994000
mprotect(0x76ffc29b7000, 2093056, PROT_NONE) = 0
mmap(0x76ffc2bb6000, 12288, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0x22000) = 0x76ffc2bb6000
close(3) = 0
openat(AT_FDCWD, "/nix/store/y1wvrg5ckyy3472fpknf468cxfk8wkw0-nghttp2-1.24.0-lib/lib/libssh2.so.1", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/zqi323lr2dyp0csnrrqns37svgmr0f5k-libkrb5-1.15.2/lib/tls/x86_64/x86_64/libssh2.so.1", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
stat("/nix/store/zqi323lr2dyp0csnrrqns37svgmr0f5k-libkrb5-1.15.2/lib/tls/x86_64/x86_64", 0x7ffdbd8a4170) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/zqi323lr2dyp0csnrrqns37svgmr0f5k-libkrb5-1.15.2/lib/tls/x86_64/libssh2.so.1", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
stat("/nix/store/zqi323lr2dyp0csnrrqns37svgmr0f5k-libkrb5-1.15.2/lib/tls/x86_64", 0x7ffdbd8a4170) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/zqi323lr2dyp0csnrrqns37svgmr0f5k-libkrb5-1.15.2/lib/tls/x86_64/libssh2.so.1", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
stat("/nix/store/zqi323lr2dyp0csnrrqns37svgmr0f5k-libkrb5-1.15.2/lib/tls/x86_64", 0x7ffdbd8a4170) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/zqi323lr2dyp0csnrrqns37svgmr0f5k-libkrb5-1.15.2/lib/tls/libssh2.so.1", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
stat("/nix/store/zqi323lr2dyp0csnrrqns37svgmr0f5k-libkrb5-1.15.2/lib/tls", 0x7ffdbd8a4170) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/zqi323lr2dyp0csnrrqns37svgmr0f5k-libkrb5-1.15.2/lib/x86_64/x86_64/libssh2.so.1", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
stat("/nix/store/zqi323lr2dyp0csnrrqns37svgmr0f5k-libkrb5-1.15.2/lib/x86_64/x86_64", 0x7ffdbd8a4170) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/zqi323lr2dyp0csnrrqns37svgmr0f5k-libkrb5-1.15.2/lib/x86_64/libssh2.so.1", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
stat("/nix/store/zqi323lr2dyp0csnrrqns37svgmr0f5k-libkrb5-1.15.2/lib/x86_64", 0x7ffdbd8a4170) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/zqi323lr2dyp0csnrrqns37svgmr0f5k-libkrb5-1.15.2/lib/x86_64/libssh2.so.1", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
stat("/nix/store/zqi323lr2dyp0csnrrqns37svgmr0f5k-libkrb5-1.15.2/lib/x86_64", 0x7ffdbd8a4170) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/zqi323lr2dyp0csnrrqns37svgmr0f5k-libkrb5-1.15.2/lib/libssh2.so.1", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
stat("/nix/store/zqi323lr2dyp0csnrrqns37svgmr0f5k-libkrb5-1.15.2/lib", {st_mode=S_IFDIR|0555, st_size=37, ...}) = 0
openat(AT_FDCWD, "/nix/store/r43dk927l97n78rff7hnvsq49f3szkg6-zlib-1.2.11/lib/tls/x86_64/x86_64/libssh2.so.1", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
stat("/nix/store/r43dk927l97n78rff7hnvsq49f3szkg6-zlib-1.2.11/lib/tls/x86_64/x86_64", 0x7ffdbd8a4170) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/r43dk927l97n78rff7hnvsq49f3szkg6-zlib-1.2.11/lib/tls/x86_64/libssh2.so.1", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
stat("/nix/store/r43dk927l97n78rff7hnvsq49f3szkg6-zlib-1.2.11/lib/tls/x86_64", 0x7ffdbd8a4170) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/r43dk927l97n78rff7hnvsq49f3szkg6-zlib-1.2.11/lib/tls/x86_64/libssh2.so.1", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
stat("/nix/store/r43dk927l97n78rff7hnvsq49f3szkg6-zlib-1.2.11/lib/tls/x86_64", 0x7ffdbd8a4170) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/r43dk927l97n78rff7hnvsq49f3szkg6-zlib-1.2.11/lib/tls/libssh2.so.1", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
stat("/nix/store/r43dk927l97n78rff7hnvsq49f3szkg6-zlib-1.2.11/lib/tls", 0x7ffdbd8a4170) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/r43dk927l97n78rff7hnvsq49f3szkg6-zlib-1.2.11/lib/x86_64/x86_64/libssh2.so.1", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
stat("/nix/store/r43dk927l97n78rff7hnvsq49f3szkg6-zlib-1.2.11/lib/x86_64/x86_64", 0x7ffdbd8a4170) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/r43dk927l97n78rff7hnvsq49f3szkg6-zlib-1.2.11/lib/x86_64/libssh2.so.1", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
stat("/nix/store/r43dk927l97n78rff7hnvsq49f3szkg6-zlib-1.2.11/lib/x86_64", 0x7ffdbd8a4170) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/r43dk927l97n78rff7hnvsq49f3szkg6-zlib-1.2.11/lib/x86_64/libssh2.so.1", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
stat("/nix/store/r43dk927l97n78rff7hnvsq49f3szkg6-zlib-1.2.11/lib/x86_64", 0x7ffdbd8a4170) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/r43dk927l97n78rff7hnvsq49f3szkg6-zlib-1.2.11/lib/libssh2.so.1", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
stat("/nix/store/r43dk927l97n78rff7hnvsq49f3szkg6-zlib-1.2.11/lib", {st_mode=S_IFDIR|0555, st_size=5, ...}) = 0
openat(AT_FDCWD, "/nix/store/dl1hzcnxnbbcpf6zdhan58fghvdg3in8-openssl-1.0.2n/lib/libssh2.so.1", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/c311jc1k0i9d6a7gvk7dmbsgsmcp0kzn-libssh2-1.8.0/lib/tls/x86_64/x86_64/libssh2.so.1", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
stat("/nix/store/c311jc1k0i9d6a7gvk7dmbsgsmcp0kzn-libssh2-1.8.0/lib/tls/x86_64/x86_64", 0x7ffdbd8a4170) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/c311jc1k0i9d6a7gvk7dmbsgsmcp0kzn-libssh2-1.8.0/lib/tls/x86_64/libssh2.so.1", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
stat("/nix/store/c311jc1k0i9d6a7gvk7dmbsgsmcp0kzn-libssh2-1.8.0/lib/tls/x86_64", 0x7ffdbd8a4170) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/c311jc1k0i9d6a7gvk7dmbsgsmcp0kzn-libssh2-1.8.0/lib/tls/x86_64/libssh2.so.1", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
stat("/nix/store/c311jc1k0i9d6a7gvk7dmbsgsmcp0kzn-libssh2-1.8.0/lib/tls/x86_64", 0x7ffdbd8a4170) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/c311jc1k0i9d6a7gvk7dmbsgsmcp0kzn-libssh2-1.8.0/lib/tls/libssh2.so.1", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
stat("/nix/store/c311jc1k0i9d6a7gvk7dmbsgsmcp0kzn-libssh2-1.8.0/lib/tls", 0x7ffdbd8a4170) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/c311jc1k0i9d6a7gvk7dmbsgsmcp0kzn-libssh2-1.8.0/lib/x86_64/x86_64/libssh2.so.1", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
stat("/nix/store/c311jc1k0i9d6a7gvk7dmbsgsmcp0kzn-libssh2-1.8.0/lib/x86_64/x86_64", 0x7ffdbd8a4170) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/c311jc1k0i9d6a7gvk7dmbsgsmcp0kzn-libssh2-1.8.0/lib/x86_64/libssh2.so.1", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
stat("/nix/store/c311jc1k0i9d6a7gvk7dmbsgsmcp0kzn-libssh2-1.8.0/lib/x86_64", 0x7ffdbd8a4170) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/c311jc1k0i9d6a7gvk7dmbsgsmcp0kzn-libssh2-1.8.0/lib/x86_64/libssh2.so.1", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
stat("/nix/store/c311jc1k0i9d6a7gvk7dmbsgsmcp0kzn-libssh2-1.8.0/lib/x86_64", 0x7ffdbd8a4170) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/c311jc1k0i9d6a7gvk7dmbsgsmcp0kzn-libssh2-1.8.0/lib/libssh2.so.1", O_RDONLY|O_CLOEXEC) = 3
read(3, "\177ELF\2\1\1\0\0\0\0\0\0\0\0\0\3\0>\0\1\0\0\0\360U\0\0\0\0\0\0@\0\0\0\0\0\0\0\30\33\3\0\0\0\0\0\0\0\0\0@\0008\0\7\0@\0\32\0\31\0\1\0\0\0\5\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\324\255\2\0\0\0\0\0\324\255\2\0\0\0\0\0\0\0 \0\0\0\0\0\1\0\0\0\6\0\0\0p\261\2\0\0\0\0\0p\261\"\0\0\0\0\0p\261\"\0\0\0\0\0008\20\0\0\0\0\0\0H\20\0\0\0\0\0\0\0\0 \0\0\0\0\0\2\0\0\0\6\0\0\0\340\271\2\0\0\0\0\0\340\271\"\0\0\0\0\0\340\271\"\0\0\0\0\0\0\2\0\0\0\0\0\0\0\2\0\0\0\0\0\0\10\0\0\0\0\0\0\0P\345td\4\0\0\0\244\\\2\0\0\0\0\0\244\\\2\0\0\0\0\0\244\\\2\0\0\0\0\0\374\10\0\0\0\0\0\0\374\10\0\0\0\0\0\0\4\0\0\0\0\0\0\0Q\345td\6\0\0\0\0\0\0\0"..., 832) = 832
fstat(3, {st_mode=S_IFREG|0555, st_size=205208, ...}) = 0
mmap(NULL, 2277816, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) = 0x76ffc2767000
mprotect(0x76ffc2792000, 2097152, PROT_NONE) = 0
mmap(0x76ffc2992000, 8192, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0x2b000) = 0x76ffc2992000
close(3) = 0
openat(AT_FDCWD, "/nix/store/y1wvrg5ckyy3472fpknf468cxfk8wkw0-nghttp2-1.24.0-lib/lib/libssl.so.1.0.0", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/zqi323lr2dyp0csnrrqns37svgmr0f5k-libkrb5-1.15.2/lib/libssl.so.1.0.0", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/r43dk927l97n78rff7hnvsq49f3szkg6-zlib-1.2.11/lib/libssl.so.1.0.0", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/dl1hzcnxnbbcpf6zdhan58fghvdg3in8-openssl-1.0.2n/lib/libssl.so.1.0.0", O_RDONLY|O_CLOEXEC) = 3
read(3, "\177ELF\2\1\1\0\0\0\0\0\0\0\0\0\3\0>\0\1\0\0\0\0\222\1\0\0\0\0\0@\0\0\0\0\0\0\0008\236\7\0\0\0\0\0\0\0\0\0@\0008\0\10\0@\0\33\0\32\0\1\0\0\0\5\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0242\6\0\0\0\0\0\0242\6\0\0\0\0\0\0\0 \0\0\0\0\0\1\0\0\0\6\0\0\0\0208\6\0\0\0\0\0\0208&\0\0\0\0\0\0208&\0\0\0\0\0000\235\0\0\0\0\0\0 \236\0\0\0\0\0\0\0\0 \0\0\0\0\0\2\0\0\0\6\0\0\0hq\6\0\0\0\0\0hq&\0\0\0\0\0hq&\0\0\0\0\0\0\2\0\0\0\0\0\0\0\2\0\0\0\0\0\0\10\0\0\0\0\0\0\0\4\0\0\0\4\0\0\0\0\2\0\0\0\0\0\0\0\2\0\0\0\0\0\0\0\2\0\0\0\0\0\0$\0\0\0\0\0\0\0$\0\0\0\0\0\0\0\4\0\0\0\0\0\0\0P\345td\4\0\0\0\314\241\5\0"..., 832) = 832
fstat(3, {st_mode=S_IFREG|0555, st_size=500984, ...}) = 0
mmap(NULL, 2545200, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) = 0x76ffc24f9000
mprotect(0x76ffc255d000, 2093056, PROT_NONE) = 0
mmap(0x76ffc275c000, 45056, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0x63000) = 0x76ffc275c000
close(3) = 0
openat(AT_FDCWD, "/nix/store/y1wvrg5ckyy3472fpknf468cxfk8wkw0-nghttp2-1.24.0-lib/lib/libgssapi_krb5.so.2", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/zqi323lr2dyp0csnrrqns37svgmr0f5k-libkrb5-1.15.2/lib/libgssapi_krb5.so.2", O_RDONLY|O_CLOEXEC) = 3
read(3, "\177ELF\2\1\1\0\0\0\0\0\0\0\0\0\3\0>\0\1\0\0\0\20\275\0\0\0\0\0\0@\0\0\0\0\0\0\0\320M\5\0\0\0\0\0\0\0\0\0@\0008\0\7\0@\0\33\0\32\0\1\0\0\0\5\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\fo\4\0\0\0\0\0\fo\4\0\0\0\0\0\0\0 \0\0\0\0\0\1\0\0\0\6\0\0\0Hu\4\0\0\0\0\0Hu$\0\0\0\0\0Hu$\0\0\0\0\0P#\0\0\0\0\0\0h%\0\0\0\0\0\0\0\0 \0\0\0\0\0\2\0\0\0\6\0\0\0\210\201\4\0\0\0\0\0\210\201$\0\0\0\0\0\210\201$\0\0\0\0\0P\2\0\0\0\0\0\0P\2\0\0\0\0\0\0\10\0\0\0\0\0\0\0P\345td\4\0\0\0@\356\3\0\0\0\0\0@\356\3\0\0\0\0\0@\356\3\0\0\0\0\0\374\16\0\0\0\0\0\0\374\16\0\0\0\0\0\0\4\0\0\0\0\0\0\0Q\345td\6\0\0\0\0\0\0\0"..., 832) = 832
fstat(3, {st_mode=S_IFREG|0444, st_size=349328, ...}) = 0
mmap(NULL, 2398896, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) = 0x76ffc22af000
mprotect(0x76ffc22f6000, 2097152, PROT_NONE) = 0
mmap(0x76ffc24f6000, 12288, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0x47000) = 0x76ffc24f6000
close(3) = 0
openat(AT_FDCWD, "/nix/store/y1wvrg5ckyy3472fpknf468cxfk8wkw0-nghttp2-1.24.0-lib/lib/libkrb5.so.3", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/zqi323lr2dyp0csnrrqns37svgmr0f5k-libkrb5-1.15.2/lib/libkrb5.so.3", O_RDONLY|O_CLOEXEC) = 3
read(3, "\177ELF\2\1\1\0\0\0\0\0\0\0\0\0\3\0>\0\1\0\0\0\3409\2\0\0\0\0\0@\0\0\0\0\0\0\0\10\17\20\0\0\0\0\0\0\0\0\0@\0008\0\7\0@\0\33\0\32\0\1\0\0\0\5\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0d>\f\0\0\0\0\0d>\f\0\0\0\0\0\0\0 \0\0\0\0\0\1\0\0\0\6\0\0\0\340M\f\0\0\0\0\0\340M,\0\0\0\0\0\340M,\0\0\0\0\0\250\363\0\0\0\0\0\0\20\366\0\0\0\0\0\0\0\0 \0\0\0\0\0\2\0\0\0\6\0\0\0\340\30\r\0\0\0\0\0\340\30-\0\0\0\0\0\340\30-\0\0\0\0\0000\2\0\0\0\0\0\0000\2\0\0\0\0\0\0\10\0\0\0\0\0\0\0P\345td\4\0\0\0\240\336\n\0\0\0\0\0\240\336\n\0\0\0\0\0\240\336\n\0\0\0\0\0\0342\0\0\0\0\0\0\0342\0\0\0\0\0\0\4\0\0\0\0\0\0\0Q\345td\6\0\0\0\0\0\0\0"..., 832) = 832
fstat(3, {st_mode=S_IFREG|0444, st_size=1054152, ...}) = 0
mmap(NULL, 2966512, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) = 0x76ffc1fda000
mprotect(0x76ffc209e000, 2097152, PROT_NONE) = 0
mmap(0x76ffc229e000, 69632, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0xc4000) = 0x76ffc229e000
close(3) = 0
openat(AT_FDCWD, "/nix/store/y1wvrg5ckyy3472fpknf468cxfk8wkw0-nghttp2-1.24.0-lib/lib/libk5crypto.so.3", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/zqi323lr2dyp0csnrrqns37svgmr0f5k-libkrb5-1.15.2/lib/libk5crypto.so.3", O_RDONLY|O_CLOEXEC) = 3
read(3, "\177ELF\2\1\1\0\0\0\0\0\0\0\0\0\3\0>\0\1\0\0\0\340H\0\0\0\0\0\0@\0\0\0\0\0\0\0\200F\3\0\0\0\0\0\0\0\0\0@\0008\0\7\0@\0\33\0\32\0\1\0\0\0\5\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\314\342\2\0\0\0\0\0\314\342\2\0\0\0\0\0\0\0 \0\0\0\0\0\1\0\0\0\6\0\0\0\310\352\2\0\0\0\0\0\310\352\"\0\0\0\0\0\310\352\"\0\0\0\0\0p\25\0\0\0\0\0\0P$\0\0\0\0\0\0\0\0 \0\0\0\0\0\2\0\0\0\6\0\0\0\350\372\2\0\0\0\0\0\350\372\"\0\0\0\0\0\350\372\"\0\0\0\0\0\20\2\0\0\0\0\0\0\20\2\0\0\0\0\0\0\10\0\0\0\0\0\0\0P\345td\4\0\0\0T\242\2\0\0\0\0\0T\242\2\0\0\0\0\0T\242\2\0\0\0\0\0\34\10\0\0\0\0\0\0\34\10\0\0\0\0\0\0\4\0\0\0\0\0\0\0Q\345td\6\0\0\0\0\0\0\0"..., 832) = 832
fstat(3, {st_mode=S_IFREG|0444, st_size=216384, ...}) = 0
mmap(NULL, 8192, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) = 0x76ffc6ca3000
mmap(NULL, 2297624, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) = 0x76ffc1da9000
mprotect(0x76ffc1dd8000, 2093056, PROT_NONE) = 0
mmap(0x76ffc1fd7000, 12288, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0x2e000) = 0x76ffc1fd7000
close(3) = 0
openat(AT_FDCWD, "/nix/store/y1wvrg5ckyy3472fpknf468cxfk8wkw0-nghttp2-1.24.0-lib/lib/libcom_err.so.3", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/zqi323lr2dyp0csnrrqns37svgmr0f5k-libkrb5-1.15.2/lib/libcom_err.so.3", O_RDONLY|O_CLOEXEC) = 3
read(3, "\177ELF\2\1\1\0\0\0\0\0\0\0\0\0\3\0>\0\1\0\0\0\0\20\0\0\0\0\0\0@\0\0\0\0\0\0\0\340A\0\0\0\0\0\0\0\0\0\0@\0008\0\7\0@\0\32\0\31\0\1\0\0\0\5\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0t \0\0\0\0\0\0t \0\0\0\0\0\0\0\0 \0\0\0\0\0\1\0\0\0\6\0\0\0\300,\0\0\0\0\0\0\300, \0\0\0\0\0\300, \0\0\0\0\0h\3\0\0\0\0\0\0\20\4\0\0\0\0\0\0\0\0 \0\0\0\0\0\2\0\0\0\6\0\0\0\330,\0\0\0\0\0\0\330, \0\0\0\0\0\330, \0\0\0\0\0\20\2\0\0\0\0\0\0\20\2\0\0\0\0\0\0\10\0\0\0\0\0\0\0P\345td\4\0\0\0L\34\0\0\0\0\0\0L\34\0\0\0\0\0\0L\34\0\0\0\0\0\0\264\0\0\0\0\0\0\0\264\0\0\0\0\0\0\0\4\0\0\0\0\0\0\0Q\345td\6\0\0\0\0\0\0\0"..., 832) = 832
fstat(3, {st_mode=S_IFREG|0444, st_size=18528, ...}) = 0
mmap(NULL, 2109648, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) = 0x76ffc1ba5000
mprotect(0x76ffc1ba8000, 2093056, PROT_NONE) = 0
mmap(0x76ffc1da7000, 8192, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0x2000) = 0x76ffc1da7000
close(3) = 0
openat(AT_FDCWD, "/nix/store/y1wvrg5ckyy3472fpknf468cxfk8wkw0-nghttp2-1.24.0-lib/lib/libz.so.1", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/zqi323lr2dyp0csnrrqns37svgmr0f5k-libkrb5-1.15.2/lib/libz.so.1", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/r43dk927l97n78rff7hnvsq49f3szkg6-zlib-1.2.11/lib/libz.so.1", O_RDONLY|O_CLOEXEC) = 3
read(3, "\177ELF\2\1\1\0\0\0\0\0\0\0\0\0\3\0>\0\1\0\0\0`#\0\0\0\0\0\0@\0\0\0\0\0\0\0 \202\1\0\0\0\0\0\0\0\0\0@\0008\0\7\0@\0\34\0\31\0\1\0\0\0\5\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\fS\1\0\0\0\0\0\fS\1\0\0\0\0\0\0\0 \0\0\0\0\0\1\0\0\0\6\0\0\0\350Z\1\0\0\0\0\0\350Z!\0\0\0\0\0\350Z!\0\0\0\0\0 \5\0\0\0\0\0\0(\5\0\0\0\0\0\0\0\0 \0\0\0\0\0\2\0\0\0\6\0\0\0P\\\1\0\0\0\0\0P\\!\0\0\0\0\0P\\!\0\0\0\0\0\360\1\0\0\0\0\0\0\360\1\0\0\0\0\0\0\10\0\0\0\0\0\0\0P\345td\4\0\0\0P5\1\0\0\0\0\0P5\1\0\0\0\0\0P5\1\0\0\0\0\0\24\4\0\0\0\0\0\0\24\4\0\0\0\0\0\0\4\0\0\0\0\0\0\0Q\345td\6\0\0\0\0\0\0\0"..., 832) = 832
fstat(3, {st_mode=S_IFREG|0555, st_size=100640, ...}) = 0
mmap(NULL, 2187280, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) = 0x76ffc198e000
mprotect(0x76ffc19a4000, 2093056, PROT_NONE) = 0
mmap(0x76ffc1ba3000, 8192, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0x15000) = 0x76ffc1ba3000
close(3) = 0
openat(AT_FDCWD, "/nix/store/mwgp39wfjlfd95dn09v0vywhm1x1v694-brotli-1.0.2-lib/lib/libbrotlicommon.so.1", O_RDONLY|O_CLOEXEC) = 3
read(3, "\177ELF\2\1\1\0\0\0\0\0\0\0\0\0\3\0>\0\1\0\0\0\200\6\0\0\0\0\0\0@\0\0\0\0\0\0\0\370\367\1\0\0\0\0\0\0\0\0\0@\0008\0\7\0@\0\31\0\30\0\1\0\0\0\5\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\374\347\1\0\0\0\0\0\374\347\1\0\0\0\0\0\0\0 \0\0\0\0\0\1\0\0\0\6\0\0\0\330\355\1\0\0\0\0\0\330\355!\0\0\0\0\0\330\355!\0\0\0\0\0\370\2\0\0\0\0\0\0\0\3\0\0\0\0\0\0\0\0 \0\0\0\0\0\2\0\0\0\6\0\0\0\350\355\1\0\0\0\0\0\350\355!\0\0\0\0\0\350\355!\0\0\0\0\0\340\1\0\0\0\0\0\0\340\1\0\0\0\0\0\0\10\0\0\0\0\0\0\0P\345td\4\0\0\0@\347\1\0\0\0\0\0@\347\1\0\0\0\0\0@\347\1\0\0\0\0\0,\0\0\0\0\0\0\0,\0\0\0\0\0\0\0\4\0\0\0\0\0\0\0Q\345td\6\0\0\0\0\0\0\0"..., 832) = 832
fstat(3, {st_mode=S_IFREG|0555, st_size=130616, ...}) = 0
mmap(NULL, 2224344, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) = 0x76ffc176e000
mprotect(0x76ffc178d000, 2093056, PROT_NONE) = 0
mmap(0x76ffc198c000, 8192, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0x1e000) = 0x76ffc198c000
close(3) = 0
openat(AT_FDCWD, "/nix/store/zqi323lr2dyp0csnrrqns37svgmr0f5k-libkrb5-1.15.2/lib/libkrb5support.so.0", O_RDONLY|O_CLOEXEC) = 3
read(3, "\177ELF\2\1\1\0\0\0\0\0\0\0\0\0\3\0>\0\1\0\0\0000.\0\0\0\0\0\0@\0\0\0\0\0\0\0h\337\0\0\0\0\0\0\0\0\0\0@\0008\0\7\0@\0\33\0\32\0\1\0\0\0\5\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\354\242\0\0\0\0\0\0\354\242\0\0\0\0\0\0\0\0 \0\0\0\0\0\1\0\0\0\6\0\0\0x\252\0\0\0\0\0\0x\252 \0\0\0\0\0x\252 \0\0\0\0\0p\6\0\0\0\0\0\0\20\10\0\0\0\0\0\0\0\0 \0\0\0\0\0\2\0\0\0\6\0\0\0\250\252\0\0\0\0\0\0\250\252 \0\0\0\0\0\250\252 \0\0\0\0\0\20\2\0\0\0\0\0\0\20\2\0\0\0\0\0\0\10\0\0\0\0\0\0\0P\345td\4\0\0\0d\206\0\0\0\0\0\0d\206\0\0\0\0\0\0d\206\0\0\0\0\0\0l\4\0\0\0\0\0\0l\4\0\0\0\0\0\0\4\0\0\0\0\0\0\0Q\345td\6\0\0\0\0\0\0\0"..., 832) = 832
fstat(3, {st_mode=S_IFREG|0444, st_size=58920, ...}) = 0
mmap(NULL, 8192, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) = 0x76ffc6ca1000
mmap(NULL, 2142856, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) = 0x76ffc1562000
mprotect(0x76ffc156d000, 2093056, PROT_NONE) = 0
mmap(0x76ffc176c000, 8192, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0xa000) = 0x76ffc176c000
close(3) = 0
openat(AT_FDCWD, "/nix/store/zqi323lr2dyp0csnrrqns37svgmr0f5k-libkrb5-1.15.2/lib/libresolv.so.2", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/nix/store/2kcrj1ksd2a14bm5sky182fv2xwfhfap-glibc-2.26-131/lib/libresolv.so.2", O_RDONLY|O_CLOEXEC) = 3
read(3, "\177ELF\2\1\1\0\0\0\0\0\0\0\0\0\3\0>\0\1\0\0\0\2206\0\0\0\0\0\0@\0\0\0\0\0\0\0(b\1\0\0\0\0\0\0\0\0\0@\0008\0\10\0@\0\37\0\34\0\1\0\0\0\5\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\354\"\1\0\0\0\0\0\354\"\1\0\0\0\0\0\0\0 \0\0\0\0\0\1\0\0\0\6\0\0\0H$\1\0\0\0\0\0H$!\0\0\0\0\0H$!\0\0\0\0\0X\f\0\0\0\0\0\0X4\0\0\0\0\0\0\0\0 \0\0\0\0\0\2\0\0\0\6\0\0\0\350+\1\0\0\0\0\0\350+!\0\0\0\0\0\350+!\0\0\0\0\0\360\1\0\0\0\0\0\0\360\1\0\0\0\0\0\0\10\0\0\0\0\0\0\0\4\0\0\0\4\0\0\0\0\2\0\0\0\0\0\0\0\2\0\0\0\0\0\0\0\2\0\0\0\0\0\0D\0\0\0\0\0\0\0D\0\0\0\0\0\0\0\4\0\0\0\0\0\0\0P\345td\4\0\0\0\244\373\0\0"..., 832) = 832
fstat(3, {st_mode=S_IFREG|0555, st_size=92648, ...}) = 0
mmap(NULL, 2185376, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) = 0x76ffc134c000
mprotect(0x76ffc135f000, 2093056, PROT_NONE) = 0
mmap(0x76ffc155e000, 8192, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0x12000) = 0x76ffc155e000
mmap(0x76ffc1560000, 6304, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x76ffc1560000
close(3) = 0
mmap(NULL, 8192, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) = 0x76ffc6c9f000
mmap(NULL, 12288, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) = 0x76ffc6c9c000
arch_prctl(ARCH_SET_FS, 0x76ffc6c9cbc0) = 0
mprotect(0x76ffc51be000, 16384, PROT_READ) = 0
mprotect(0x76ffc155e000, 4096, PROT_READ) = 0
mprotect(0x76ffc49d8000, 4096, PROT_READ) = 0
mprotect(0x76ffc176c000, 4096, PROT_READ) = 0
mprotect(0x76ffc5728000, 4096, PROT_READ) = 0
mprotect(0x76ffc198c000, 4096, PROT_READ) = 0
mprotect(0x76ffc1ba3000, 4096, PROT_READ) = 0
mprotect(0x76ffc1da7000, 4096, PROT_READ) = 0
mprotect(0x76ffc1fd7000, 8192, PROT_READ) = 0
mprotect(0x76ffc229e000, 61440, PROT_READ) = 0
mprotect(0x76ffc24f6000, 8192, PROT_READ) = 0
mprotect(0x76ffc4deb000, 114688, PROT_READ) = 0
mprotect(0x76ffc275c000, 20480, PROT_READ) = 0
mprotect(0x76ffc2992000, 4096, PROT_READ) = 0
mprotect(0x76ffc2bb6000, 4096, PROT_READ) = 0
mprotect(0x76ffc2dc4000, 4096, PROT_READ) = 0
mprotect(0x76ffc304a000, 4096, PROT_READ) = 0
mprotect(0x76ffc47d0000, 4096, PROT_READ) = 0
mprotect(0x76ffc3270000, 4096, PROT_READ) = 0
mprotect(0x76ffc349e000, 86016, PROT_READ) = 0
mmap(NULL, 8192, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) = 0x76ffc6c9a000
mprotect(0x76ffc5a9a000, 49152, PROT_READ) = 0
mprotect(0x76ffc40a5000, 12288, PROT_READ) = 0
mprotect(0x76ffc379b000, 28672, PROT_READ) = 0
mprotect(0x76ffc3bbd000, 73728, PROT_READ) = 0
mprotect(0x76ffc3e22000, 4096, PROT_READ) = 0
mprotect(0x76ffc42b7000, 4096, PROT_READ) = 0
mprotect(0x76ffc45b2000, 12288, PROT_READ) = 0
mprotect(0x76ffc5cb2000, 4096, PROT_READ) = 0
mprotect(0x76ffc5f35000, 12288, PROT_READ) = 0
mmap(NULL, 12288, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) = 0x76ffc6c97000
mprotect(0x76ffc630e000, 40960, PROT_READ) = 0
mprotect(0x76ffc6542000, 4096, PROT_READ) = 0
mprotect(0x76ffc6867000, 16384, PROT_READ) = 0
mprotect(0x76ffc6a8b000, 4096, PROT_READ) = 0
mprotect(0x63c000, 4096, PROT_READ) = 0
mprotect(0x76ffc6cb1000, 4096, PROT_READ) = 0
set_tid_address(0x76ffc6c9ce90) = 10250
set_robust_list(0x76ffc6c9cea0, 24) = 0
rt_sigaction(SIGRTMIN, {sa_handler=0x76ffc45bd9f0, sa_mask=[], sa_flags=SA_RESTORER|SA_SIGINFO, sa_restorer=0x76ffc45c9dd0}, NULL, 8) = 0
rt_sigaction(SIGRT_1, {sa_handler=0x76ffc45bda80, sa_mask=[], sa_flags=SA_RESTORER|SA_RESTART|SA_SIGINFO, sa_restorer=0x76ffc45c9dd0}, NULL, 8) = 0
rt_sigprocmask(SIG_UNBLOCK, [RTMIN RT_1], NULL, 8) = 0
prlimit64(0, RLIMIT_STACK, NULL, {rlim_cur=8192*1024, rlim_max=RLIM64_INFINITY}) = 0
brk(NULL) = 0x63e000
brk(0x65f000) = 0x65f000
futex(0x76ffc5aa767c, FUTEX_WAKE_PRIVATE, 2147483647) = 0
futex(0x76ffc5aa7688, FUTEX_WAKE_PRIVATE, 2147483647) = 0
ioctl(2, TCGETS, {B38400 opost isig icanon echo ...}) = 0
getpid() = 10250
open("/sys/devices/system/cpu/online", O_RDONLY|O_CLOEXEC) = 3
read(3, "0-7\n", 8192) = 4
close(3) = 0
getuid() = 0
lstat("/etc/ssl/certs/ca-certificates.crt", {st_mode=S_IFLNK|0777, st_size=41, ...}) = 0
brk(0x680000) = 0x680000
openat(AT_FDCWD, "/etc/nix/nix.conf", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=486, ...}) = 0
read(3, "# WARNING: this file is generated from the nix.* options in\n# your NixOS configuration, typically\n# /etc/nixos/configuration.nix. Do not edit it!\nbuild-users-group = nixbld\nmax-jobs = 8\ncores = 1\nsandbox = true\nextra-sandbox-paths = \nsubstituters = https://cache.nixos.org/\ntrusted-substituters = \n"..., 486) = 486
close(3) = 0
futex(0x76ffc5f38540, FUTEX_WAKE_PRIVATE, 2147483647) = 0
openat(AT_FDCWD, "/root/.config/nix/nix.conf", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
futex(0x76ffc53dd6f0, FUTEX_WAKE_PRIVATE, 2147483647) = 0
ioctl(1, TIOCGWINSZ, 0x7ffdbd8a3800) = -1 ENOTTY (Inappropriate ioctl for device)
rt_sigprocmask(SIG_BLOCK, NULL, [], 8) = 0
rt_sigprocmask(SIG_BLOCK, [HUP INT PIPE TERM WINCH], NULL, 8) = 0
mmap(NULL, 8392704, PROT_NONE, MAP_PRIVATE|MAP_ANONYMOUS|MAP_STACK, -1, 0) = 0x76ffc0b4b000
mprotect(0x76ffc0b4c000, 8388608, PROT_READ|PROT_WRITE) = 0
clone(child_stack=0x76ffc134ab30, flags=CLONE_VM|CLONE_FS|CLONE_FILES|CLONE_SIGHAND|CLONE_THREAD|CLONE_SYSVSEM|CLONE_SETTLS|CLONE_PARENT_SETTID|CLONE_CHILD_CLEARTID, parent_tidptr=0x76ffc134b9d0, tls=0x76ffc134b700, child_tidptr=0x76ffc134b9d0) = 10251
rt_sigaction(SIGCHLD, {sa_handler=SIG_DFL, sa_mask=[], sa_flags=SA_RESTORER, sa_restorer=0x76ffc4e4a2d0}, NULL, 8) = 0
rt_sigaction(SIGUSR1, {sa_handler=0x76ffc68781d0, sa_mask=[], sa_flags=SA_RESTORER, sa_restorer=0x76ffc4e4a2d0}, NULL, 8) = 0
sigaltstack({ss_sp=0x660950, ss_flags=0, ss_size=18432}, NULL) = 0
rt_sigaction(SIGSEGV, {sa_handler=0x76ffc6886ca0, sa_mask=~[RTMIN RT_1], sa_flags=SA_RESTORER|SA_ONSTACK|SA_SIGINFO, sa_restorer=0x76ffc4e4a2d0}, NULL, 8) = 0
umask(022) = 022
open("/proc/self/maps", O_RDONLY|O_CLOEXEC) = 3
prlimit64(0, RLIMIT_STACK, NULL, {rlim_cur=8192*1024, rlim_max=RLIM64_INFINITY}) = 0
fstat(3, {st_mode=S_IFREG|0444, st_size=0, ...}) = 0
read(3, "00400000-0043c000 r-xp 00000000 00:19 283599 /nix/store/r8zhwq9xylxw8a823kpvqy0kfqq4g52f-nix-2.0pre5968_a6c0b773/bin/nix-build\n0063c000-0063d000 r--p 0003c000 00:19 283599 /nix/store/r8zhwq9xylxw8a823kpvqy0kfqq4g52f-nix-2.0pre5968_a6c0b773/bin/"..., 1024) = 1024
read(3, "/nix/store/2kcrj1ksd2a14bm5sky182fv2xwfhfap-glibc-2.26-131/lib/libresolv-2.26.so\n76ffc155f000-76ffc1560000 rw-p 00013000 00:19 132562 /nix/store/2kcrj1ksd2a14bm5sky182fv2xwfhfap-glibc-2.26-131/lib/libresolv-2.26.so\n76ffc1560000-76ffc1562000 rw-p 00000000 00:00 0 \n76ffc1562000-76f"..., 1024) = 1024
read(3, "m1x1v694-brotli-1.0.2-lib/lib/libbrotlicommon.so.1.0.2\n76ffc178d000-76ffc198c000 ---p 0001f000 00:19 252908 /nix/store/mwgp39wfjlfd95dn09v0vywhm1x1v694-brotli-1.0.2-lib/lib/libbrotlicommon.so.1.0.2\n76ffc198c000-76ffc198d000 r--p 0001e000 00:19 252908 /nix/stor"..., 1024) = 1024
read(3, "000 00:19 138483 /nix/store/r43dk927l97n78rff7hnvsq49f3szkg6-zlib-1.2.11/lib/libz.so.1.2.11\n76ffc1ba5000-76ffc1ba8000 r-xp 00000000 00:19 136276 /nix/store/zqi323lr2dyp0csnrrqns37svgmr0f5k-libkrb5-1.15.2/lib/libcom_err.so.3.0\n76ffc1ba8000-76ffc1da7000 ---p 000"..., 1024) = 1024
read(3, "crypto.so.3.1\n76ffc1fd7000-76ffc1fd9000 r--p 0002e000 00:19 137469 /nix/store/zqi323lr2dyp0csnrrqns37svgmr0f5k-libkrb5-1.15.2/lib/libk5crypto.so.3.1\n76ffc1fd9000-76ffc1fda000 rw-p 00030000 00:19 137469 /nix/store/zqi323lr2dyp0csnrrqns37svgmr0f5k-libkrb5-1.15.2"..., 1024) = 1024
read(3, "0csnrrqns37svgmr0f5k-libkrb5-1.15.2/lib/libgssapi_krb5.so.2.2\n76ffc22f6000-76ffc24f6000 ---p 00047000 00:19 136279 /nix/store/zqi323lr2dyp0csnrrqns37svgmr0f5k-libkrb5-1.15.2/lib/libgssapi_krb5.so.2.2\n76ffc24f6000-76ffc24f8000 r--p 00047000 00:19 136279 /nix/st"..., 1024) = 1024
read(3, "0068000 00:19 138729 /nix/store/dl1hzcnxnbbcpf6zdhan58fghvdg3in8-openssl-1.0.2n/lib/libssl.so.1.0.0\n76ffc2767000-76ffc2792000 r-xp 00000000 00:19 142473 /nix/store/c311jc1k0i9d6a7gvk7dmbsgsmcp0kzn-libssh2-1.8.0/lib/libssh2.so.1.0.1\n76ffc2792000-76ffc2992000 --"..., 1024) = 1024
read(3, "b/lib/libnghttp2.so.14.13.3\n76ffc2bb6000-76ffc2bb7000 r--p 00022000 00:19 138060 /nix/store/y1wvrg5ckyy3472fpknf468cxfk8wkw0-nghttp2-1.24.0-lib/lib/libnghttp2.so.14.13.3\n76ffc2bb7000-76ffc2bb9000 rw-p 00023000 00:19 138060 /nix/store/y1wvrg5ckyy3472fpknf468cxf"..., 1024) = 1024
read(3, "0000000 00:19 259564 /nix/store/mwgp39wfjlfd95dn09v0vywhm1x1v694-brotli-1.0.2-lib/lib/libbrotlienc.so.1.0.2\n76ffc2e4a000-76ffc304a000 ---p 00084000 00:19 259564 /nix/store/mwgp39wfjlfd95dn09v0vywhm1x1v694-brotli-1.0.2-lib/lib/libbrotlienc.so.1.0.2\n76ffc304a000"..., 1024) = 1024
read(3, "2.3/lib/liblzma.so.5.2.3\n76ffc3271000-76ffc3272000 rw-p 00025000 00:19 141985 /nix/store/chf54cl12ifswf6swh7kxpif477drihi-xz-5.2.3/lib/liblzma.so.5.2.3\n76ffc3272000-76ffc329e000 r-xp 00000000 00:19 137802 /nix/store/2gxzfkyl05040p97f7lzilv7yx3jj3v7-libseccomp-"..., 1024) = 1024
read(3, " /nix/store/jhpzzb3xmxkapqvg9pnsx51psfnfawi0-aws-sdk-cpp-1.3.22/lib/libaws-cpp-sdk-core.so\n76ffc379b000-76ffc37a2000 r--p 000e7000 00:19 252895 /nix/store/jhpzzb3xmxkapqvg9pnsx51psfnfawi0-aws-sdk-cpp-1.3.22/lib/libaws-cpp-sdk-core.so\n76ffc37a2000-76ffc37a3000 rw-p "..., 1024) = 1024
read(3, "fnfawi0-aws-sdk-cpp-1.3.22/lib/libaws-cpp-sdk-s3.so\n76ffc3bd0000-76ffc3c22000 r-xp 00000000 00:19 248305 /nix/store/kgq1fxb7c84r212kmq4p8zcxyi7fv51r-libsodium-1.0.16/lib/libsodium.so.23.1.0\n76ffc3c22000-76ffc3e22000 ---p 00052000 00:19 248305 /nix/store/kgq1fx"..., 1024) = 1024
read(3, "00:19 141943 /nix/store/lha30sclfhw3r77hsknjfcawqafb94xi-curl-7.58.0/lib/libcurl.so.4.5.0\n76ffc40a8000-76ffc40a9000 rw-p 00084000 00:19 141943 /nix/store/lha30sclfhw3r77hsknjfcawqafb94xi-curl-7.58.0/lib/libcurl.so.4.5.0\n76ffc40a9000-76ffc40b8000 r-xp 00000000 "..., 1024) = 1024
read(3, ".6\n76ffc43b2000-76ffc45b2000 ---p 000f9000 00:19 141517 /nix/store/3v6sf9l1fwbb1phq9ccm71096d44k489-sqlite-3.21.0/lib/libsqlite3.so.0.8.6\n76ffc45b2000-76ffc45b5000 r--p 000f9000 00:19 141517 /nix/store/3v6sf9l1fwbb1phq9ccm71096d44k489-sqlite-3.21.0/lib/libsqli"..., 1024) = 1024
read(3, ":19 132558 /nix/store/2kcrj1ksd2a14bm5sky182fv2xwfhfap-glibc-2.26-131/lib/libpthread-2.26.so\n76ffc47d2000-76ffc47d6000 rw-p 00000000 00:00 0 \n76ffc47d6000-76ffc47d9000 r-xp 00000000 00:19 131093 /nix/store/2kcrj1ksd2a14bm5sky182fv2xwfhfap-glibc-2.26-131/lib/li"..., 1024) = 1024
read(3, "ghvdg3in8-openssl-1.0.2n/lib/libcrypto.so.1.0.0\n76ffc4deb000-76ffc4e07000 r--p 00211000 00:19 138147 /nix/store/dl1hzcnxnbbcpf6zdhan58fghvdg3in8-openssl-1.0.2n/lib/libcrypto.so.1.0.0\n76ffc4e07000-76ffc4e12000 rw-p 0022d000 00:19 138147 /nix/store/dl1hzcnxnbbcp"..., 1024) = 1024
read(3, "8000 rw-p 00000000 00:00 0 \n76ffc51c8000-76ffc51de000 r-xp 00000000 00:19 131384 /nix/store/2kcrj1ksd2a14bm5sky182fv2xwfhfap-glibc-2.26-131/lib/libgcc_s.so.1\n76ffc51de000-76ffc53dd000 ---p 00016000 00:19 131384 /nix/store/2kcrj1ksd2a14bm5sky182fv2xwfhfap-glibc"..., 1024) = 1024
read(3, "5sky182fv2xwfhfap-glibc-2.26-131/lib/libm-2.26.so\n76ffc572a000-76ffc589a000 r-xp 00000000 00:19 135742 /nix/store/4zd34747fz0ggzzasy4icgn3lmy89pra-gcc-7.3.0-lib/lib/libstdc++.so.6.0.24\n76ffc589a000-76ffc5a9a000 ---p 00170000 00:19 135742 /nix/store/4zd34747fz0"..., 1024) = 1024
read(3, "/libnixformat.so\n76ffc5cb2000-76ffc5cb3000 r--p 00008000 00:19 284430 /nix/store/r8zhwq9xylxw8a823kpvqy0kfqq4g52f-nix-2.0pre5968_a6c0b773/lib/libnixformat.so\n76ffc5cb3000-76ffc5cb4000 rw-p 00009000 00:19 284430 /nix/store/r8zhwq9xylxw8a823kpvqy0kfqq4g52f-nix-2"..., 1024) = 1024
read(3, "007 /nix/store/r8zhwq9xylxw8a823kpvqy0kfqq4g52f-nix-2.0pre5968_a6c0b773/lib/libnixstore.so\n76ffc610f000-76ffc630e000 ---p 001d6000 00:19 283007 /nix/store/r8zhwq9xylxw8a823kpvqy0kfqq4g52f-nix-2.0pre5968_a6c0b773/lib/libnixstore.so\n76ffc630e000-76ffc6318000 r--"..., 1024) = 1024
read(3, "e/dn852vplccs5w0qc3dnlfyma8b7b408d-boehm-gc-7.6.4/lib/libgc.so.1.3.2\n76ffc6543000-76ffc6544000 rw-p 00027000 00:19 254544 /nix/store/dn852vplccs5w0qc3dnlfyma8b7b408d-boehm-gc-7.6.4/lib/libgc.so.1.3.2\n76ffc6544000-76ffc6586000 rw-p 00000000 00:00 0 \n76ffc6586000-76ffc6668000 r-xp "..., 1024) = 1024
read(3, "x-2.0pre5968_a6c0b773/lib/libnixmain.so\n76ffc688b000-76ffc6a8b000 ---p 0001f000 00:19 284431 /nix/store/r8zhwq9xylxw8a823kpvqy0kfqq4g52f-nix-2.0pre5968_a6c0b773/lib/libnixmain.so\n76ffc6a8b000-76ffc6a8c000 r--p 0001f000 00:19 284431 /nix/store/r8zhwq9xylxw8a823"..., 1024) = 1024
read(3, "c6cb4000 rw-p 00000000 00:00 0 \n7ffdbd885000-7ffdbd8a7000 rw-p 00000000 00:00 0 [stack]\n7ffdbd97f000-7ffdbd982000 r--p 00000000 00:00 0 [vvar]\n7ffdbd982000-7ffdbd984000 r-xp 00000000 00:00 0 [vdso]\n", 1024) = 273
close(3) = 0
sched_getaffinity(10250, 32, [0, 1, 2, 3, 4, 5, 6, 7]) = 32
brk(0x690000) = 0x690000
brk(0x6a0000) = 0x6a0000
brk(0x6b0000) = 0x6b0000
brk(0x6c0000) = 0x6c0000
brk(0x6d0000) = 0x6d0000
rt_sigaction(SIGPWR, {sa_handler=0x76ffc6338160, sa_mask=~[INT QUIT ABRT BUS SEGV TERM RTMIN RT_1], sa_flags=SA_RESTORER|SA_RESTART|SA_SIGINFO, sa_restorer=0x76ffc4e4a2d0}, NULL, 8) = 0
rt_sigaction(SIGXCPU, {sa_handler=0x76ffc6337f00, sa_mask=~[INT QUIT ABRT BUS SEGV TERM RTMIN RT_1], sa_flags=SA_RESTORER|SA_RESTART, sa_restorer=0x76ffc4e4a2d0}, NULL, 8) = 0
openat(AT_FDCWD, "/proc/stat", O_RDONLY) = 3
read(3, "cpu 858 0 1013 346853 2994 0 44 0 0 0\ncpu0 51 0 122 43511 282 0 4 0 0 0\ncpu1 343 0 90 43142 375 0 1 0 0 0\ncpu2 47 0 93 43367 457 0 1 0 0 0\ncpu3 49 0 136 43266 454 0 28 0 0 0\ncpu4 46 0 83 43556 275 0 0 0 0 0\ncpu5 119 0 147 43195 497 0 6 0 0 0\ncpu6 108 0 83 43512 296 0 1 0 0 0\ncpu7 92 0 257 43301 353"..., 4096) = 1476
close(3) = 0
rt_sigprocmask(SIG_BLOCK, ~[XCPU PWR RTMIN RT_1], [HUP INT PIPE TERM WINCH], 8) = 0
mmap(NULL, 8392704, PROT_NONE, MAP_PRIVATE|MAP_ANONYMOUS|MAP_STACK, -1, 0) = 0x76ffc034a000
mprotect(0x76ffc034b000, 8388608, PROT_READ|PROT_WRITE) = 0
clone(child_stack=0x76ffc0b49b30, flags=CLONE_VM|CLONE_FS|CLONE_FILES|CLONE_SIGHAND|CLONE_THREAD|CLONE_SYSVSEM|CLONE_SETTLS|CLONE_PARENT_SETTID|CLONE_CHILD_CLEARTID, parent_tidptr=0x76ffc0b4a9d0, tls=0x76ffc0b4a700, child_tidptr=0x76ffc0b4a9d0) = 10252
mmap(NULL, 8392704, PROT_NONE, MAP_PRIVATE|MAP_ANONYMOUS|MAP_STACK, -1, 0) = 0x76ffbfb49000
mprotect(0x76ffbfb4a000, 8388608, PROT_READ|PROT_WRITE) = 0
clone(child_stack=0x76ffc0348b30, flags=CLONE_VM|CLONE_FS|CLONE_FILES|CLONE_SIGHAND|CLONE_THREAD|CLONE_SYSVSEM|CLONE_SETTLS|CLONE_PARENT_SETTID|CLONE_CHILD_CLEARTID, parent_tidptr=0x76ffc03499d0, tls=0x76ffc0349700, child_tidptr=0x76ffc03499d0) = 10253
mmap(NULL, 8392704, PROT_NONE, MAP_PRIVATE|MAP_ANONYMOUS|MAP_STACK, -1, 0) = 0x76ffbf348000
mprotect(0x76ffbf349000, 8388608, PROT_READ|PROT_WRITE) = 0
clone(child_stack=0x76ffbfb47b30, flags=CLONE_VM|CLONE_FS|CLONE_FILES|CLONE_SIGHAND|CLONE_THREAD|CLONE_SYSVSEM|CLONE_SETTLS|CLONE_PARENT_SETTID|CLONE_CHILD_CLEARTID, parent_tidptr=0x76ffbfb489d0, tls=0x76ffbfb48700, child_tidptr=0x76ffbfb489d0) = 10254
mmap(NULL, 8392704, PROT_NONE, MAP_PRIVATE|MAP_ANONYMOUS|MAP_STACK, -1, 0) = 0x76ffbeb47000
mprotect(0x76ffbeb48000, 8388608, PROT_READ|PROT_WRITE) = 0
clone(child_stack=0x76ffbf346b30, flags=CLONE_VM|CLONE_FS|CLONE_FILES|CLONE_SIGHAND|CLONE_THREAD|CLONE_SYSVSEM|CLONE_SETTLS|CLONE_PARENT_SETTID|CLONE_CHILD_CLEARTID, parent_tidptr=0x76ffbf3479d0, tls=0x76ffbf347700, child_tidptr=0x76ffbf3479d0) = 10255
mmap(NULL, 8392704, PROT_NONE, MAP_PRIVATE|MAP_ANONYMOUS|MAP_STACK, -1, 0) = 0x76ffbe346000
mprotect(0x76ffbe347000, 8388608, PROT_READ|PROT_WRITE) = 0
clone(child_stack=0x76ffbeb45b30, flags=CLONE_VM|CLONE_FS|CLONE_FILES|CLONE_SIGHAND|CLONE_THREAD|CLONE_SYSVSEM|CLONE_SETTLS|CLONE_PARENT_SETTID|CLONE_CHILD_CLEARTID, parent_tidptr=0x76ffbeb469d0, tls=0x76ffbeb46700, child_tidptr=0x76ffbeb469d0) = 10256
mmap(NULL, 8392704, PROT_NONE, MAP_PRIVATE|MAP_ANONYMOUS|MAP_STACK, -1, 0) = 0x76ffbdb45000
mprotect(0x76ffbdb46000, 8388608, PROT_READ|PROT_WRITE) = 0
clone(child_stack=0x76ffbe344b30, flags=CLONE_VM|CLONE_FS|CLONE_FILES|CLONE_SIGHAND|CLONE_THREAD|CLONE_SYSVSEM|CLONE_SETTLS|CLONE_PARENT_SETTID|CLONE_CHILD_CLEARTID, parent_tidptr=0x76ffbe3459d0, tls=0x76ffbe345700, child_tidptr=0x76ffbe3459d0) = 10257
mmap(NULL, 8392704, PROT_NONE, MAP_PRIVATE|MAP_ANONYMOUS|MAP_STACK, -1, 0) = 0x76ffbd344000
mprotect(0x76ffbd345000, 8388608, PROT_READ|PROT_WRITE) = 0
clone(child_stack=0x76ffbdb43b30, flags=CLONE_VM|CLONE_FS|CLONE_FILES|CLONE_SIGHAND|CLONE_THREAD|CLONE_SYSVSEM|CLONE_SETTLS|CLONE_PARENT_SETTID|CLONE_CHILD_CLEARTID, parent_tidptr=0x76ffbdb449d0, tls=0x76ffbdb44700, child_tidptr=0x76ffbdb449d0) = 10258
rt_sigprocmask(SIG_SETMASK, [HUP INT PIPE TERM WINCH], NULL, 8) = 0
futex(0x76ffc6554728, FUTEX_WAIT_PRIVATE, 0, NULL) = 0
futex(0x76ffc6554740, FUTEX_WAKE_PRIVATE, 1) = 0
rt_sigprocmask(SIG_BLOCK, NULL, [HUP INT PIPE TERM WINCH], 8) = 0
futex(0x76ffc6554b68, FUTEX_WAKE_PRIVATE, 2147483647) = 7
futex(0x76ffc6554740, FUTEX_WAKE_PRIVATE, 1) = 1
futex(0x76ffc6554b6c, FUTEX_WAKE_PRIVATE, 2147483647) = 7
futex(0x76ffc6554740, FUTEX_WAKE_PRIVATE, 1) = 1
futex(0x76ffc6554740, FUTEX_WAKE_PRIVATE, 1) = 0
futex(0x76ffc6554b6c, FUTEX_WAKE_PRIVATE, 2147483647) = 7
sysinfo({uptime=441, loads=[1376, 10784, 8128], totalram=16818446336, freeram=15944024064, sharedram=5517312, bufferram=1847296, totalswap=8588881920, freeswap=8588881920, procs=221, totalhigh=0, freehigh=0, mem_unit=1}) = 0
brk(0x186d0000) = 0x186d0000
ioctl(0, TCGETS, {B38400 opost isig icanon echo ...}) = 0
ioctl(2, TCGETS, {B38400 opost isig icanon echo ...}) = 0
lstat("/tmp", {st_mode=S_IFDIR|S_ISVTX|0777, st_size=9, ...}) = 0
getpid() = 10250
mkdir("/tmp/nix-build-10250-0", 0755) = 0
lstat("/nix/store/r8zhwq9xylxw8a823kpvqy0kfqq4g52f-nix-2.0pre5968_a6c0b773/share/nix/corepkgs/derivation.nix", {st_mode=S_IFREG|0444, st_size=720, ...}) = 0
openat(AT_FDCWD, "/nix/store/r8zhwq9xylxw8a823kpvqy0kfqq4g52f-nix-2.0pre5968_a6c0b773/share/nix/corepkgs/derivation.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=720, ...}) = 0
read(3, "/* This is the implementation of the \342\200\230derivation\342\200\231 builtin function.\n It's actually a wrapper around the \342\200\230derivationStrict\342\200\231 primop. */\n\ndrvAttrs @ { outputs ? [ \"out\" ], ... }:\n\nlet\n\n strict = derivationStrict drvAttrs;\n\n commonAttrs = drvAttrs // (builtins.listToAttrs outputsList) //\n "..., 720) = 720
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs", {st_mode=S_IFLNK|0777, st_size=1, ...}) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs//nixos", {st_mode=S_IFDIR|0555, st_size=13, ...}) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos", {st_mode=S_IFDIR|0555, st_size=13, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/default.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=886, ...}) = 0
read(3, "{ configuration ? import ./lib/from-env.nix \"NIXOS_CONFIG\" <nixos-config>\n, system ? builtins.currentSystem\n}:\n\nlet\n\n eval = import ./lib/eval-config.nix {\n inherit system;\n modules = [ configuration ];\n };\n\n # This is for `nixos-rebuild build-vm'.\n vmConfig = (import ./lib/eval-config.nix"..., 886) = 886
close(3) = 0
brk(0x186f1000) = 0x186f1000
brk(0x186f2000) = 0x186f2000
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/lib/eval-config.nix", {st_mode=S_IFREG|0444, st_size=2100, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/lib/eval-config.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=2100, ...}) = 0
read(3, "# From an end-user configuration file (`configuration.nix'), build a NixOS\n# configuration object (`config') from which we can retrieve option\n# values.\n\n# !!! Please think twice before adding to this argument list!\n# Ideally eval-config.nix would be an extremely thin wrapper\n# around lib.evalModule"..., 2100) = 2100
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/lib", {st_mode=S_IFDIR|0555, st_size=26, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/lib/default.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=6000, ...}) = 0
read(3, "/* Library of low-level helper functions for nix expressions.\n *\n * Please implement (mostly) exhaustive unit tests\n * for new functions in `./tests.nix'.\n */\nlet\n\n callLibs = file: import file { inherit lib; };\n\n lib = rec {\n\n # often used, or depending on very little\n trivial = callLibs ./"..., 6000) = 6000
close(3) = 0
brk(0x18713000) = 0x18713000
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/lib/modules.nix", {st_mode=S_IFREG|0444, st_size=27008, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/lib/modules.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=27008, ...}) = 0
read(3, "{ lib }:\n\nwith lib.lists;\nwith lib.strings;\nwith lib.trivial;\nwith lib.attrsets;\nwith lib.options;\nwith lib.debug;\nwith lib.types;\n\nrec {\n\n /* Evaluate a set of modules. The result is a set of two\n attributes: \342\200\230options\342\200\231: the nested set of all option declarations,\n and \342\200\230config\342\200\231: the"..., 27008) = 27008
close(3) = 0
brk(0x18734000) = 0x18734000
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/lib/types.nix", {st_mode=S_IFREG|0444, st_size=16698, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/lib/types.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=16698, ...}) = 0
read(3, "# Definitions related to run-time type checking. Used in particular\n# to type-check NixOS configurations.\n{ lib }:\nwith lib.lists;\nwith lib.attrsets;\nwith lib.options;\nwith lib.trivial;\nwith lib.strings;\nlet\n\n inherit (lib.modules) mergeDefinitions filterOverrides;\n outer_types =\nrec {\n isType ="..., 16698) = 16698
close(3) = 0
brk(0x18756000) = 0x18756000
brk(0x18777000) = 0x18777000
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/lib/debug.nix", {st_mode=S_IFREG|0444, st_size=5293, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/lib/debug.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=5293, ...}) = 0
read(3, "{ lib }:\n\nlet\n\ninherit (builtins) trace attrNamesToStr isAttrs isList isInt\n isString isBool head substring attrNames;\n\ninherit (lib) all id mapAttrsFlatten elem isFunction;\n\nin\n\nrec {\n\n inherit (builtins) addErrorContext;\n\n addErrorContextToAttrs = lib.mapAttrs (a: v: lib.addErrorContext \""..., 5293) = 5293
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/lib/options.nix", {st_mode=S_IFREG|0444, st_size=5519, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/lib/options.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=5519, ...}) = 0
read(3, "# Nixpkgs/NixOS option handling.\n{ lib }:\n\nwith lib.trivial;\nwith lib.lists;\nwith lib.attrsets;\nwith lib.strings;\n\nrec {\n\n isOption = lib.isType \"option\";\n mkOption =\n { default ? null # Default value used when no definition is given in the configuration.\n , defaultText ? null # Textual repr"..., 5519) = 5519
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/lib/attrsets.nix", {st_mode=S_IFREG|0444, st_size=13660, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/lib/attrsets.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=13660, ...}) = 0
read(3, "{ lib }:\n# Operations on attribute sets.\n\nlet\n inherit (builtins) head tail length;\n inherit (lib.trivial) and or;\n inherit (lib.strings) concatStringsSep;\n inherit (lib.lists) fold concatMap concatLists all deepSeqList;\nin\n\nrec {\n inherit (builtins) attrNames listToAttrs hasAttr isAttrs getAtt"..., 13660) = 13660
brk(0x18798000) = 0x18798000
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/lib/trivial.nix", {st_mode=S_IFREG|0444, st_size=4516, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/lib/trivial.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=4516, ...}) = 0
read(3, "{ lib }:\nrec {\n\n /* The identity function\n For when you need a function that does \342\200\234nothing\342\200\235.\n\n Type: id :: a -> a\n */\n id = x: x;\n\n /* The constant function\n Ignores the second argument.\n Or: Construct a function that always returns a static value.\n\n Type: const :: a -> b"..., 4516) = 4516
close(3) = 0
brk(0x187a8000) = 0x187a8000
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/lib/strings.nix", {st_mode=S_IFREG|0444, st_size=14864, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/lib/strings.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=14864, ...}) = 0
read(3, "/* String manipulation functions. */\n{ lib }:\nlet\n\ninherit (builtins) length;\n\nin\n\nrec {\n\n inherit (builtins) stringLength substring head tail isString replaceStrings;\n\n /* Concatenate a list of strings.\n\n Example:\n concatStrings [\"foo\" \"bar\"]\n => \"foobar\"\n */\n concatStrings = bu"..., 14864) = 14864
close(3) = 0
brk(0x187c9000) = 0x187c9000
brk(0x187ca000) = 0x187ca000
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/lib/lists.nix", {st_mode=S_IFREG|0444, st_size=14590, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/lib/lists.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=14590, ...}) = 0
read(3, "# General list operations.\n{ lib }:\nwith lib.trivial;\n\nrec {\n\n inherit (builtins) head tail length isList elemAt concatLists filter elem genList;\n\n /* Create a list consisting of a single element. `singleton x' is\n sometimes more convenient with respect to indentation than `[x]'\n when "..., 14590) = 14590
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/module-list.nix", {st_mode=S_IFREG|0444, st_size=26829, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/module-list.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=26829, ...}) = 0
brk(0x187ef000) = 0x187ef000
read(3, "[\n ./config/debug-info.nix\n ./config/fonts/corefonts.nix\n ./config/fonts/fontconfig.nix\n ./config/fonts/fontconfig-penultimate.nix\n ./config/fonts/fontconfig-ultimate.nix\n ./config/fonts/fontdir.nix\n ./config/fonts/fonts.nix\n ./config/fonts/ghostscript.nix\n ./config/gnu.nix\n ./config/i18n."..., 26829) = 26829
close(3) = 0
brk(0x18811000) = 0x18811000
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/lib/from-env.nix", {st_mode=S_IFREG|0444, st_size=143, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/lib/from-env.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=143, ...}) = 0
read(3, "# TODO: remove this file. There is lib.maybeEnv now\nname: default:\nlet value = builtins.getEnv name; in\nif value == \"\" then default else value\n", 143) = 143
close(3) = 0
lstat("/etc/nixos/configuration.nix", {st_mode=S_IFREG|0644, st_size=4764, ...}) = 0
lstat("/etc/nixos/configuration.nix", {st_mode=S_IFREG|0644, st_size=4764, ...}) = 0
lstat("/etc/nixos/configuration.nix", {st_mode=S_IFREG|0644, st_size=4764, ...}) = 0
openat(AT_FDCWD, "/etc/nixos/configuration.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0644, st_size=4764, ...}) = 0
read(3, "{ config, pkgs, ... }:\n{\n imports = [\n ./hardware-configuration.nix\n ./config-locale.nix\n# ./config-shell.nix\n ./config-pkgs.nix\n# ./config-tweaks.nix\n ./config-zfs.nix\n# ./config-samba.nix\n# ./config-debug.nix\n# ./config-backup.nix\n ];\n\n boot = {\n loader.grub.enable"..., 4764) = 4764
close(3) = 0
lstat("/etc/nixos/hardware-configuration.nix", {st_mode=S_IFREG|0644, st_size=1911, ...}) = 0
openat(AT_FDCWD, "/etc/nixos/hardware-configuration.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0644, st_size=1911, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n{\n\n imports = [\n <nixpkgs/nixos/modules/installer/scan/not-detected.nix>\n <nixpkgs/nixos/modules/profiles/hardened.nix>\n ];\n\n boot.initrd.availableKernelModules = [ \"ehci_pci\" \"ata_piix\" \"mptsas\" \"usbhid\" \"usb_storage\" \"sd_mod\" \"sr_mod\" ];\n boot.kernelModules = "..., 1911) = 1911
close(3) = 0
lstat("/etc/nixos/config-locale.nix", {st_mode=S_IFREG|0644, st_size=505, ...}) = 0
openat(AT_FDCWD, "/etc/nixos/config-locale.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0644, st_size=505, ...}) = 0
read(3, "{ config, pkgs, ... }:\n{\n i18n = {\n consoleFont = \"ter-v14n\";\n consolePackages = [ pkgs.terminus_font ];\n consoleKeyMap = \"ru\";\n defaultLocale = \"ru_RU.UTF-8\";\n };\n\n services.ntp = {\n enable = false;\n };\n\n services.chrony = {\n enable = true;\n extraFlags = [ \"-4\" ];\n serv"..., 505) = 505
close(3) = 0
lstat("/etc/nixos/config-pkgs.nix", {st_mode=S_IFREG|0644, st_size=833, ...}) = 0
openat(AT_FDCWD, "/etc/nixos/config-pkgs.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0644, st_size=833, ...}) = 0
read(3, "{ config, pkgs, ... }:\n{\n# nixpkgs.config = {\n# allowBroken = true;\n# allowUnfree = true;\n# };\n\n nix.package = pkgs.nixUnstable;\n \n# environment.systemPackages = with pkgs; [\n# mc htop binutils sysstat lsof subversion git dar\n# inetutils wget bind libressl tcpdump tshark mtr iperf3 "..., 833) = 833
close(3) = 0
lstat("/etc/nixos/config-zfs.nix", {st_mode=S_IFREG|0644, st_size=547, ...}) = 0
openat(AT_FDCWD, "/etc/nixos/config-zfs.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0644, st_size=547, ...}) = 0
read(3, "{ config, pkgs, ... }:\n{\n boot = {\n loader.grub.zfsSupport = true;\n supportedFilesystems = [ \"zfs\" ];\n zfs.forceImportRoot = true;\n zfs.forceImportAll = true;\n zfs.enableUnstable = true;\n };\n\n networking = {\n hostId = \"074466f7\";\n };\n\n systemd = {\n targets.zfs = {\n wan"..., 547) = 547
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/config/debug-info.nix", {st_mode=S_IFREG|0444, st_size=1268, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/config/debug-info.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=1268, ...}) = 0
read(3, "{ config, lib, ... }:\n\nwith lib;\n\n{\n\n options = {\n\n environment.enableDebugInfo = mkOption {\n type = types.bool;\n default = false;\n description = ''\n Some NixOS packages provide debug symbols. However, these are\n not included in the system closure by default to save "..., 1268) = 1268
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/config/fonts/corefonts.nix", {st_mode=S_IFREG|0444, st_size=672, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/config/fonts/corefonts.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=672, ...}) = 0
read(3, "# This module is deprecated, since you can just say \342\200\230fonts.fonts = [\n# pkgs.corefonts ];\342\200\231 instead.\n\n{ config, lib, pkgs, ... }:\n\nwith lib;\n\n{\n\n options = {\n\n fonts = {\n\n enableCoreFonts = mkOption {\n visible = false;\n default = false;\n description = ''\n Whe"..., 672) = 672
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/config/fonts/fontconfig.nix", {st_mode=S_IFREG|0444, st_size=14756, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/config/fonts/fontconfig.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=14756, ...}) = 0
read(3, "/*\n\nNixOS support 2 fontconfig versions, \"support\" and \"latest\".\n\n- \"latest\" refers to default fontconfig package (pkgs.fontconfig).\n configuration files are linked to /etc/fonts/VERSION/conf.d/\n- \"support\" refers to supportPkg (pkgs.\"fontconfig_${supportVersion}\").\n configuration files are linked"..., 14756) = 14756
close(3) = 0
brk(0x18832000) = 0x18832000
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/config/fonts/fontconfig-penultimate.nix", {st_mode=S_IFREG|0444, st_size=8078, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/config/fonts/fontconfig-penultimate.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=8078, ...}) = 0
read(3, "{ config, pkgs, lib, ... }:\n\nwith lib;\n\nlet\n cfg = config.fonts.fontconfig;\n\n fcBool = x: \"<bool>\" + (boolToString x) + \"</bool>\";\n\n # back-supported fontconfig version and package\n # version is used for font cache generation\n supportVersion = \"210\";\n supportPkg = pkgs.\"fontconfig_${suppor"..., 8078) = 8078
close(3) = 0
brk(0x18853000) = 0x18853000
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/config/fonts/fontconfig-ultimate.nix", {st_mode=S_IFREG|0444, st_size=2660, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/config/fonts/fontconfig-ultimate.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=2660, ...}) = 0
read(3, "{ config, pkgs, lib, ... }:\n\nwith lib;\n\nlet fcBool = x: if x then \"<bool>true</bool>\" else \"<bool>false</bool>\";\n\n cfg = config.fonts.fontconfig.ultimate;\n\n latestVersion = pkgs.fontconfig.configVersion;\n\n # The configuration to be included in /etc/font/\n confPkg = pkgs.runCommand \"font"..., 2660) = 2660
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/config/fonts/fontdir.nix", {st_mode=S_IFREG|0444, st_size=977, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/config/fonts/fontdir.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=977, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n x11Fonts = pkgs.runCommand \"X11-fonts\" { } ''\n mkdir -p \"$out/share/X11-fonts\"\n find ${toString config.fonts.fonts} \\\n \\( -name fonts.dir -o -name '*.ttf' -o -name '*.otf' \\) \\\n -exec ln -sf -t \"$out/share/X11-fonts\" '{}' \\;\n cd \"$out"..., 977) = 977
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/config/fonts/fonts.nix", {st_mode=S_IFREG|0444, st_size=1060, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/config/fonts/fonts.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=1060, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\n{\n\n options = {\n\n fonts = {\n\n # TODO: find another name for it.\n fonts = mkOption {\n type = types.listOf types.path;\n default = [];\n example = literalExample \"[ pkgs.dejavu_fonts ]\";\n description = \"List of primary fon"..., 1060) = 1060
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/config/fonts/ghostscript.nix", {st_mode=S_IFREG|0444, st_size=563, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/config/fonts/ghostscript.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=563, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\n{\n\n options = {\n\n fonts = {\n\n enableGhostscriptFonts = mkOption {\n default = false;\n description = ''\n Whether to add the fonts provided by Ghostscript (such as\n various URW fonts and the \342\200\234Base-14\342\200\235 Postscript fonts)"..., 563) = 563
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/config/gnu.nix", {st_mode=S_IFREG|0444, st_size=1170, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/config/gnu.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=1170, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\n{\n options = {\n gnu = mkOption {\n type = types.bool;\n default = false;\n description = ''\n When enabled, GNU software is chosen by default whenever a there is\n a choice between GNU and non-GNU software (e.g., GNU lsh\n vs."..., 1170) = 1170
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/config/i18n.nix", {st_mode=S_IFREG|0444, st_size=4429, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/config/i18n.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=4429, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\n{\n ###### interface\n\n options = {\n\n i18n = {\n glibcLocales = mkOption {\n type = types.path;\n default = pkgs.glibcLocales.override {\n allLocales = any (x: x == \"all\") config.i18n.supportedLocales;\n locales = config.i18n"..., 4429) = 4429
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/config/krb5/default.nix", {st_mode=S_IFREG|0444, st_size=11261, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/config/krb5/default.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=11261, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.krb5;\n\n # This is to provide support for old configuration options (as much as is\n # reasonable). This can be removed after 18.03 was released.\n defaultConfig = {\n libdefaults = optionalAttrs (cfg.defaultRealm != null)\n { default"..., 11261) = 11261
brk(0x18875000) = 0x18875000
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/config/ldap.nix", {st_mode=S_IFREG|0444, st_size=7894, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/config/ldap.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=7894, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith pkgs;\nwith lib;\n\nlet\n\n cfg = config.users.ldap;\n\n # Careful: OpenLDAP seems to be very picky about the indentation of\n # this file. Directives HAVE to start in the first column!\n ldapConfig = {\n target = \"ldap.conf\";\n source = writeText \"ldap.conf\" ''\n "..., 7894) = 7894
close(3) = 0
brk(0x18896000) = 0x18896000
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/config/networking.nix", {st_mode=S_IFREG|0444, st_size=10584, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/config/networking.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=10584, ...}) = 0
read(3, "# /etc files related to networking, such as /etc/services.\n\n{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.networking;\n dnsmasqResolve = config.services.dnsmasq.enable &&\n config.services.dnsmasq.resolveLocalQueries;\n hasLocalResolver = config.services.bind.enable ||"..., 10584) = 10584
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/config/no-x-libs.nix", {st_mode=S_IFREG|0444, st_size=1588, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/config/no-x-libs.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=1588, ...}) = 0
read(3, "# This module gets rid of all dependencies on X11 client libraries\n# (including fontconfig).\n\n{ config, lib, pkgs, ... }:\n\nwith lib;\n\n{\n options = {\n environment.noXlibs = mkOption {\n type = types.bool;\n default = false;\n description = ''\n Switch off the options in the defa"..., 1588) = 1588
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/config/nsswitch.nix", {st_mode=S_IFREG|0444, st_size=3462, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/config/nsswitch.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=3462, ...}) = 0
read(3, "# Configuration for the Name Service Switch (/etc/nsswitch.conf).\n\n{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n # only with nscd up and running we can load NSS modules that are not integrated in NSS\n canLoadExternalModules = config.services.nscd.enable;\n myhostname = canLoadExternalModules;\n my"..., 3462) = 3462
close(3) = 0
brk(0x188b7000) = 0x188b7000
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/config/power-management.nix", {st_mode=S_IFREG|0444, st_size=2554, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/config/power-management.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=2554, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.powerManagement;\n\nin\n\n{\n\n ###### interface\n\n options = {\n\n powerManagement = {\n\n enable = mkOption {\n type = types.bool;\n default = true;\n description =\n ''\n Whether to enable power managem"..., 2554) = 2554
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/config/pulseaudio.nix", {st_mode=S_IFREG|0444, st_size=9119, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/config/pulseaudio.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=9119, ...}) = 0
read(3, "{ config, lib, pkgs, pkgs_i686, ... }:\n\nwith pkgs;\nwith lib;\n\nlet\n\n cfg = config.hardware.pulseaudio;\n alsaCfg = config.sound;\n\n systemWide = cfg.enable && cfg.systemWide;\n nonSystemWide = cfg.enable && !cfg.systemWide;\n hasZeroconf = let z = cfg.zeroconf; in z.publish.enable || z.discovery.ena"..., 9119) = 9119
close(3) = 0
brk(0x188d8000) = 0x188d8000
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/config/shells-environment.nix", {st_mode=S_IFREG|0444, st_size=5926, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/config/shells-environment.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=5926, ...}) = 0
read(3, "# This module defines a global environment configuration and\n# a common configuration for all shells.\n\n{ config, lib, utils, pkgs, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.environment;\n\n exportedEnvVars =\n let\n absoluteVariables =\n mapAttrs (n: toList) cfg.variables;\n\n suffixedVar"..., 5926) = 5926
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/config/swap.nix", {st_mode=S_IFREG|0444, st_size=7530, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/config/swap.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=7530, ...}) = 0
read(3, "{ config, lib, pkgs, utils, ... }:\n\nwith utils;\nwith lib;\n\nlet\n\n randomEncryptionCoerce = enable: { inherit enable; };\n\n randomEncryptionOpts = { ... }: {\n\n options = {\n\n enable = mkOption {\n default = false;\n type = types.bool;\n description = ''\n Encrypt swap"..., 7530) = 7530
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/config/sysctl.nix", {st_mode=S_IFREG|0444, st_size=2156, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/config/sysctl.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=2156, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n sysctlOption = mkOptionType {\n name = \"sysctl option value\";\n check = val:\n let\n checkType = x: isBool x || isString x || isInt x || isNull x;\n in\n checkType val || (val._type or \"\" == \"override\" && checkType val.content);\n"..., 2156) = 2156
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/config/system-environment.nix", {st_mode=S_IFREG|0444, st_size=1062, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/config/system-environment.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=1062, ...}) = 0
read(3, "# This module defines a system-wide environment that will be\n# initialised by pam_env (that is, not only in shells).\n{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.environment;\n\nin\n\n{\n\n options = {\n\n environment.sessionVariables = mkOption {\n default = {};\n description = '"..., 1062) = 1062
close(3) = 0
brk(0x188f9000) = 0x188f9000
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/config/system-path.nix", {st_mode=S_IFREG|0444, st_size=4298, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/config/system-path.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=4298, ...}) = 0
read(3, "# This module defines the packages that appear in\n# /run/current-system/sw.\n\n{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n requiredPackages =\n [ config.nix.package\n pkgs.acl\n pkgs.attr\n pkgs.bashInteractive # bash with ncurses support\n pkgs.bzip2\n pkgs.coreutils\n pk"..., 4298) = 4298
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/config/terminfo.nix", {st_mode=S_IFREG|0444, st_size=694, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/config/terminfo.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=694, ...}) = 0
read(3, "# This module manages the terminfo database\n# and its integration in the system.\n{ config, ... }:\n{\n config = {\n\n environment.pathsToLink = [\n \"/share/terminfo\"\n ];\n\n environment.etc.\"terminfo\" = {\n source = \"${config.system.path}/share/terminfo\";\n };\n\n environment.profileR"..., 694) = 694
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/config/timezone.nix", {st_mode=S_IFREG|0444, st_size=1581, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/config/timezone.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=1581, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n tzdir = \"${pkgs.tzdata}/share/zoneinfo\";\n nospace = str: filter (c: c == \" \") (stringToCharacters str) == [];\n timezone = types.nullOr (types.addCheck types.str nospace)\n // { description = \"null or string without spaces\"; };\n\nin\n\n{\n options = {\n"..., 1581) = 1581
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/config/unix-odbc-drivers.nix", {st_mode=S_IFREG|0444, st_size=1051, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/config/unix-odbc-drivers.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=1051, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\n# unixODBC drivers (this solution is not perfect.. Because the user has to\n# ask the admin to add a driver.. but it's simple and works\n\nlet\n iniDescription = pkg: ''\n [${pkg.fancyName}]\n Description = ${pkg.meta.description}\n Driver = ${pkg}/${pkg.dr"..., 1051) = 1051
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/config/users-groups.nix", {st_mode=S_IFREG|0444, st_size=19287, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/config/users-groups.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=19287, ...}) = 0
read(3, "{ config, lib, utils, pkgs, ... }:\n\nwith lib;\n\nlet\n ids = config.ids;\n cfg = config.users;\n\n passwordDescription = ''\n The options <option>hashedPassword</option>,\n <option>password</option> and <option>passwordFile</option>\n controls what password is set for the user.\n <option>hashed"..., 19287) = 19287
close(3) = 0
brk(0x1891a000) = 0x1891a000
brk(0x1893b000) = 0x1893b000
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/config/vpnc.nix", {st_mode=S_IFREG|0444, st_size=788, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/config/vpnc.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=788, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.networking.vpnc;\n mkServiceDef = name: value:\n {\n name = \"vpnc/${name}.conf\";\n value = { text = value; };\n };\n\nin\n{\n options = {\n networking.vpnc = {\n services = mkOption {\n type = types.attrsOf types.str;\n "..., 788) = 788
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/config/zram.nix", {st_mode=S_IFREG|0444, st_size=3940, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/config/zram.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=3940, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.zramSwap;\n\n devices = map (nr: \"zram${toString nr}\") (range 0 (cfg.numDevices - 1));\n\n modprobe = \"${pkgs.kmod}/bin/modprobe\";\n\nin\n\n{\n\n ###### interface\n\n options = {\n\n zramSwap = {\n\n enable = mkOption {\n default = false;"..., 3940) = 3940
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/hardware/all-firmware.nix", {st_mode=S_IFREG|0444, st_size=1468, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/hardware/all-firmware.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=1468, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.hardware;\nin {\n\n ###### interface\n\n options = {\n\n hardware.enableAllFirmware = mkOption {\n default = false;\n type = types.bool;\n description = ''\n Turn on this option if you want to enable all the firmware.\n '"..., 1468) = 1468
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/hardware/ckb.nix", {st_mode=S_IFREG|0444, st_size=879, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/hardware/ckb.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=879, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.hardware.ckb;\n\nin\n {\n options.hardware.ckb = {\n enable = mkEnableOption \"the Corsair keyboard/mouse driver\";\n\n package = mkOption {\n type = types.package;\n default = pkgs.ckb;\n defaultText = \"pkgs.ckb\";\n "..., 879) = 879
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/hardware/cpu/amd-microcode.nix", {st_mode=S_IFREG|0444, st_size=517, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/hardware/cpu/amd-microcode.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=517, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\n{\n\n ###### interface\n\n options = {\n\n hardware.cpu.amd.updateMicrocode = mkOption {\n default = false;\n type = types.bool;\n description = ''\n Update the CPU microcode for AMD processors.\n '';\n };\n\n };\n\n\n ###### implementation"..., 517) = 517
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/hardware/cpu/intel-microcode.nix", {st_mode=S_IFREG|0444, st_size=527, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/hardware/cpu/intel-microcode.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=527, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\n{\n\n ###### interface\n\n options = {\n\n hardware.cpu.intel.updateMicrocode = mkOption {\n default = false;\n type = types.bool;\n description = ''\n Update the CPU microcode for Intel processors.\n '';\n };\n\n };\n\n\n ###### implementa"..., 527) = 527
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/hardware/sensor/iio.nix", {st_mode=S_IFREG|0444, st_size=668, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/hardware/sensor/iio.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=668, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\n{\n ###### interface\n\n options = {\n hardware.sensor.iio = {\n enable = mkOption {\n description = \"Enable this option to support IIO sensors.\";\n type = types.bool;\n default = false;\n };\n };\n };\n\n ###### implementation\n\n c"..., 668) = 668
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/hardware/ksm.nix", {st_mode=S_IFREG|0444, st_size=472, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/hardware/ksm.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=472, ...}) = 0
read(3, "{ config, lib, ... }:\n\n{\n options.hardware.enableKSM = lib.mkEnableOption \"Kernel Same-Page Merging\";\n\n config = lib.mkIf config.hardware.enableKSM {\n systemd.services.enable-ksm = {\n description = \"Enable Kernel Same-Page Merging\";\n wantedBy = [ \"multi-user.target\" ];\n after = ["..., 472) = 472
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/hardware/mcelog.nix", {st_mode=S_IFREG|0444, st_size=645, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/hardware/mcelog.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=645, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\n{\n meta.maintainers = with maintainers; [ grahamc ];\n options = {\n\n hardware.mcelog = {\n enable = mkOption {\n type = types.bool;\n default = false;\n description = ''\n Enable the Machine Check Exception logger.\n '';"..., 645) = 645
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/hardware/network/b43.nix", {st_mode=S_IFREG|0444, st_size=713, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/hardware/network/b43.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=713, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet kernelVersion = config.boot.kernelPackages.kernel.version; in\n\n{\n\n ###### interface\n\n options = {\n\n networking.enableB43Firmware = mkOption {\n default = false;\n type = types.bool;\n description = ''\n Turn on this option if you wan"..., 713) = 713
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/hardware/nitrokey.nix", {st_mode=S_IFREG|0444, st_size=860, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/hardware/nitrokey.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=860, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.hardware.nitrokey;\n\nin\n\n{\n options.hardware.nitrokey = {\n enable = mkOption {\n type = types.bool;\n default = false;\n description = ''\n Enables udev rules for Nitrokey devices. By default grants access\n to us"..., 860) = 860
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/hardware/opengl.nix", {st_mode=S_IFREG|0444, st_size=4367, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/hardware/opengl.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=4367, ...}) = 0
read(3, "{ config, lib, pkgs, pkgs_i686, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.hardware.opengl;\n\n kernelPackages = config.boot.kernelPackages;\n\n videoDrivers = config.services.xserver.videoDrivers;\n\n makePackage = p: pkgs.buildEnv {\n name = \"mesa-drivers+txc-${p.mesa_drivers.version}\";\n paths =\n "..., 4367) = 4367
close(3) = 0
brk(0x1895c000) = 0x1895c000
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/hardware/pcmcia.nix", {st_mode=S_IFREG|0444, st_size=1051, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/hardware/pcmcia.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=1051, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n pcmciaUtils = pkgs.pcmciaUtils.passthru.function {\n inherit (config.hardware.pcmcia) firmware config;\n };\n\nin\n\n\n{\n ###### interface\n\n options = {\n\n hardware.pcmcia = {\n enable = mkOption {\n type = types.bool;\n default = false"..., 1051) = 1051
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/hardware/raid/hpsa.nix", {st_mode=S_IFREG|0444, st_size=1745, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/hardware/raid/hpsa.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=1745, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n hpssacli = pkgs.stdenv.mkDerivation rec {\n name = \"hpssacli-${version}\";\n version = \"2.40-13.0\";\n\n src = pkgs.fetchurl {\n url = \"http://downloads.linux.hpe.com/SDR/downloads/MCP/Ubuntu/pool/non-free/${name}_amd64.deb\";\n sha256 = \"11w7f"..., 1745) = 1745
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/hardware/usb-wwan.nix", {st_mode=S_IFREG|0444, st_size=444, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/hardware/usb-wwan.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=444, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\n{\n ###### interface\n\n options = {\n\n hardware.usbWwan = {\n enable = mkOption {\n type = types.bool;\n default = false;\n description = ''\n Enable this option to support USB WWAN adapters.\n '';\n };\n };\n };\n\n "..., 444) = 444
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/hardware/video/amdgpu.nix", {st_mode=S_IFREG|0444, st_size=164, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/hardware/video/amdgpu.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=164, ...}) = 0
read(3, "{ config, lib, ... }:\n\nwith lib;\n{\n config = mkIf (elem \"amdgpu\" config.services.xserver.videoDrivers) {\n boot.blacklistedKernelModules = [ \"radeon\" ];\n };\n}\n\n", 164) = 164
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/hardware/video/amdgpu-pro.nix", {st_mode=S_IFREG|0444, st_size=1271, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/hardware/video/amdgpu-pro.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=1271, ...}) = 0
read(3, "# This module provides the proprietary AMDGPU-PRO drivers.\n\n{ config, lib, pkgs, pkgs_i686, ... }:\n\nwith lib;\n\nlet\n\n drivers = config.services.xserver.videoDrivers;\n\n enabled = elem \"amdgpu-pro\" drivers;\n\n package = config.boot.kernelPackages.amdgpu-pro;\n package32 = pkgs_i686.linuxPackages.amdg"..., 1271) = 1271
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/hardware/video/ati.nix", {st_mode=S_IFREG|0444, st_size=840, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/hardware/video/ati.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=840, ...}) = 0
read(3, "# This module provides the proprietary ATI X11 / OpenGL drivers.\n\n{ config, lib, pkgs, pkgs_i686, ... }:\n\nwith lib;\n\nlet\n\n drivers = config.services.xserver.videoDrivers;\n\n enabled = elem \"ati_unfree\" drivers;\n\n ati_x11 = config.boot.kernelPackages.ati_drivers_x11;\n\nin\n\n{\n\n config = mkIf enabled"..., 840) = 840
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/hardware/video/capture/mwprocapture.nix", {st_mode=S_IFREG|0444, st_size=1818, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/hardware/video/capture/mwprocapture.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=1818, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.hardware.mwProCapture;\n\n kernelPackages = config.boot.kernelPackages;\n\nin\n\n{\n\n options.hardware.mwProCapture.enable = mkEnableOption \"Magewell Pro Capture family kernel module\";\n\n config = mkIf cfg.enable {\n\n assertions = singleton {\n"..., 1818) = 1818
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/hardware/video/bumblebee.nix", {st_mode=S_IFREG|0444, st_size=2502, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/hardware/video/bumblebee.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=2502, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\nlet\n cfg = config.hardware.bumblebee;\n\n kernel = config.boot.kernelPackages;\n\n useNvidia = cfg.driver == \"nvidia\";\n\n bumblebee = pkgs.bumblebee.override {\n inherit useNvidia;\n useDisplayDevice = cfg.connectDisplay;\n };\n\n useBbswitch = cfg.pmMethod ="..., 2502) = 2502
close(3) = 0
brk(0x1897d000) = 0x1897d000
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/hardware/video/displaylink.nix", {st_mode=S_IFREG|0444, st_size=1481, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/hardware/video/displaylink.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=1481, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n enabled = elem \"displaylink\" config.services.xserver.videoDrivers;\n\n evdi = config.boot.kernelPackages.evdi;\n\n displaylink = pkgs.displaylink.override {\n inherit evdi;\n };\n\nin\n\n{\n\n config = mkIf enabled {\n\n boot.extraModulePackages = [ evdi ];"..., 1481) = 1481
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/hardware/video/nvidia.nix", {st_mode=S_IFREG|0444, st_size=3133, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/hardware/video/nvidia.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=3133, ...}) = 0
read(3, "# This module provides the proprietary NVIDIA X11 / OpenGL drivers.\n\n{ config, lib, pkgs, pkgs_i686, ... }:\n\nwith lib;\n\nlet\n\n drivers = config.services.xserver.videoDrivers;\n\n # FIXME: should introduce an option like\n # \342\200\230hardware.video.nvidia.package\342\200\231 for overriding the default NVIDIA\n # dri"..., 3133) = 3133
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/hardware/video/webcam/facetimehd.nix", {st_mode=S_IFREG|0444, st_size=1027, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/hardware/video/webcam/facetimehd.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=1027, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.hardware.facetimehd;\n\n kernelPackages = config.boot.kernelPackages;\n\nin\n\n{\n\n options.hardware.facetimehd.enable = mkEnableOption \"facetimehd kernel module\";\n\n config = mkIf cfg.enable {\n\n assertions = singleton {\n assertion = ver"..., 1027) = 1027
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/i18n/input-method/default.nix", {st_mode=S_IFREG|0444, st_size=2367, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/i18n/input-method/default.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=2367, ...}) = 0
read(3, "{ config, pkgs, lib, ... }:\n\nwith lib;\nlet\n cfg = config.i18n.inputMethod;\n\n gtk2_cache = pkgs.runCommand \"gtk2-immodule.cache\"\n { preferLocalBuild = true;\n allowSubstitutes = false;\n buildInputs = [ pkgs.gtk2 cfg.package ];\n }\n ''\n mkdir -p $out/etc/gtk-2.0/\n GTK_PATH"..., 2367) = 2367
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/i18n/input-method/fcitx.nix", {st_mode=S_IFREG|0444, st_size=1217, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/i18n/input-method/fcitx.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=1217, ...}) = 0
read(3, "{ config, pkgs, lib, ... }:\n\nwith lib;\n\nlet\n cfg = config.i18n.inputMethod.fcitx;\n fcitxPackage = pkgs.fcitx.override { plugins = cfg.engines; };\n fcitxEngine = types.package // {\n name = \"fcitx-engine\";\n check = x: (lib.types.package.check x) && (attrByPath [\"meta\" \"isFcitxEngine\"] false "..., 1217) = 1217
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/i18n/input-method/ibus.nix", {st_mode=S_IFREG|0444, st_size=1922, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/i18n/input-method/ibus.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=1922, ...}) = 0
read(3, "{ config, pkgs, lib, ... }:\n\nwith lib;\n\nlet\n cfg = config.i18n.inputMethod.ibus;\n ibusPackage = pkgs.ibus-with-plugins.override { plugins = cfg.engines; };\n ibusEngine = types.package // {\n name = \"ibus-engine\";\n check = x: (lib.types.package.check x) && (attrByPath [\"meta\" \"isIbusEngine\"]"..., 1922) = 1922
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/i18n/input-method/nabi.nix", {st_mode=S_IFREG|0444, st_size=366, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/i18n/input-method/nabi.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=366, ...}) = 0
read(3, "{ config, pkgs, lib, ... }:\n\nwith lib;\n{\n config = mkIf (config.i18n.inputMethod.enabled == \"nabi\") {\n i18n.inputMethod.package = pkgs.nabi;\n\n environment.variables = {\n GTK_IM_MODULE = \"nabi\";\n QT_IM_MODULE = \"nabi\";\n XMODIFIERS = \"@im=nabi\";\n };\n\n services.xserver.d"..., 366) = 366
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/i18n/input-method/uim.nix", {st_mode=S_IFREG|0444, st_size=776, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/i18n/input-method/uim.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=776, ...}) = 0
read(3, "{ config, pkgs, lib, ... }:\n\nwith lib;\n\nlet \n cfg = config.i18n.inputMethod.uim;\nin\n{\n options = {\n\n i18n.inputMethod.uim = {\n toolbar = mkOption {\n type = types.enum [ \"gtk\" \"gtk3\" \"gtk-systray\" \"gtk3-systray\" \"qt4\" ];\n default = \"gtk\";\n example = \"gtk-systray\";\n "..., 776) = 776
close(3) = 0
brk(0x1899f000) = 0x1899f000
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/installer/tools/auto-upgrade.nix", {st_mode=S_IFREG|0444, st_size=2421, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/installer/tools/auto-upgrade.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=2421, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet cfg = config.system.autoUpgrade; in\n\n{\n\n options = {\n\n system.autoUpgrade = {\n\n enable = mkOption {\n type = types.bool;\n default = false;\n description = ''\n Whether to periodically upgrade NixOS to the latest\n "..., 2421) = 2421
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/installer/tools/tools.nix", {st_mode=S_IFREG|0444, st_size=2230, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/installer/tools/tools.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=2230, ...}) = 0
read(3, "# This module generates nixos-install, nixos-rebuild,\n# nixos-generate-config, etc.\n\n{ config, pkgs, modulesPath, ... }:\n\nlet\n cfg = config.installer;\n\n makeProg = args: pkgs.substituteAll (args // {\n dir = \"bin\";\n isExecutable = true;\n });\n\n nixos-build-vms = makeProg {\n name = \"nixos-"..., 2230) = 2230
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/misc/assertions.nix", {st_mode=S_IFREG|0444, st_size=945, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/misc/assertions.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=945, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\n{\n\n options = {\n\n assertions = mkOption {\n type = types.listOf types.unspecified;\n internal = true;\n default = [];\n example = [ { assertion = false; message = \"you can't enable this for that reason\"; } ];\n description = ''\n "..., 945) = 945
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/misc/crashdump.nix", {st_mode=S_IFREG|0444, st_size=2115, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/misc/crashdump.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=2115, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n crashdump = config.boot.crashDump;\n\n kernelParams = concatStringsSep \" \" crashdump.kernelParams;\n\nin\n###### interface\n{\n options = {\n boot = {\n crashDump = {\n enable = mkOption {\n type = types.bool;\n default = false;\n "..., 2115) = 2115
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/misc/extra-arguments.nix", {st_mode=S_IFREG|0444, st_size=102, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/misc/extra-arguments.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=102, ...}) = 0
read(3, "{ lib, pkgs, config, ... }:\n\n{\n _module.args = {\n utils = import ../../lib/utils.nix pkgs;\n };\n}\n", 102) = 102
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/misc/ids.nix", {st_mode=S_IFREG|0444, st_size=13552, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/misc/ids.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=13552, ...}) = 0
read(3, "# This module defines the global list of uids and gids. We keep a\n# central list to prevent id collisions.\n\n{ config, pkgs, lib, ... }:\n\n{\n options = {\n\n ids.uids = lib.mkOption {\n internal = true;\n description = ''\n The user IDs used in NixOS.\n '';\n };\n\n ids.gids = "..., 13552) = 13552
close(3) = 0
brk(0x189c0000) = 0x189c0000
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/misc/lib.nix", {st_mode=S_IFREG|0444, st_size=260, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/misc/lib.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=260, ...}) = 0
read(3, "{ config, lib, ... }:\n\n{\n options = {\n lib = lib.mkOption {\n default = {};\n\n type = lib.types.attrsOf lib.types.attrs;\n\n description = ''\n This option allows modules to define helper functions, constants, etc.\n '';\n };\n };\n}\n", 260) = 260
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/misc/label.nix", {st_mode=S_IFREG|0444, st_size=1999, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/misc/label.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=1999, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.system.nixos;\nin\n\n{\n\n options.system = {\n\n nixos.label = mkOption {\n type = types.str;\n description = ''\n NixOS version name to be used in the names of generated\n outputs and boot labels.\n\n If you ever want"..., 1999) = 1999
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/misc/locate.nix", {st_mode=S_IFREG|0444, st_size=5818, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/misc/locate.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=5818, ...}) = 0
read(3, "{ config, options, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.locate;\n isMLocate = hasPrefix \"mlocate\" cfg.locate.name;\n isFindutils = hasPrefix \"findutils\" cfg.locate.name;\nin {\n options.services.locate = with types; {\n enable = mkOption {\n type = bool;\n default = fal"..., 5818) = 5818
close(3) = 0
brk(0x189e1000) = 0x189e1000
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/misc/meta.nix", {st_mode=S_IFREG|0444, st_size=1556, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/misc/meta.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=1556, ...}) = 0
read(3, "{ config, lib, ... }:\n\nwith lib;\n\nlet\n maintainer = mkOptionType {\n name = \"maintainer\";\n check = email: elem email (attrValues lib.maintainers);\n merge = loc: defs: listToAttrs (singleton (nameValuePair (last defs).file (last defs).value));\n };\n\n listOfMaintainers = types.listOf maintai"..., 1556) = 1556
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/misc/nixpkgs.nix", {st_mode=S_IFREG|0444, st_size=4794, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/misc/nixpkgs.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=4794, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.nixpkgs;\n\n isConfig = x:\n builtins.isAttrs x || lib.isFunction x;\n\n optCall = f: x:\n if lib.isFunction f\n then f x\n else f;\n\n mergeConfig = lhs_: rhs_:\n let\n lhs = optCall lhs_ { inherit pkgs; };\n rhs = optCall rh"..., 4794) = 4794
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/misc/passthru.nix", {st_mode=S_IFREG|0444, st_size=383, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/misc/passthru.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=383, ...}) = 0
read(3, "# This module allows you to export something from configuration\n# Use case: export kernel source expression for ease of configuring\n\n{ config, lib, ... }:\n\n{\n options = {\n passthru = lib.mkOption {\n visible = false;\n description = ''\n This attribute set will be exported as a sys"..., 383) = 383
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/misc/version.nix", {st_mode=S_IFREG|0444, st_size=3581, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/misc/version.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=3581, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.system.nixos;\n\n releaseFile = \"${toString pkgs.path}/.version\";\n suffixFile = \"${toString pkgs.path}/.version-suffix\";\n revisionFile = \"${toString pkgs.path}/.git-revision\";\n gitRepo = \"${toString pkgs.path}/.git\";\n gitCommitId "..., 3581) = 3581
close(3) = 0
brk(0x18a02000) = 0x18a02000
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/programs/adb.nix", {st_mode=S_IFREG|0444, st_size=798, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/programs/adb.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=798, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\n{\n meta.maintainers = [ maintainers.mic92 ];\n\n ###### interface\n options = {\n programs.adb = {\n enable = mkOption {\n default = false;\n type = types.bool;\n description = ''\n Whether to configure system to use Android Deb"..., 798) = 798
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/programs/atop.nix", {st_mode=S_IFREG|0444, st_size=624, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/programs/atop.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=624, ...}) = 0
read(3, "# Global configuration for atop.\n\n{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet cfg = config.programs.atop;\n\nin\n{\n ###### interface\n\n options = {\n\n programs.atop = {\n\n settings = mkOption {\n type = types.attrs;\n default = {};\n example = {\n flags = \"a1f\";\n "..., 624) = 624
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/programs/bash/bash.nix", {st_mode=S_IFREG|0444, st_size=6170, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/programs/bash/bash.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=6170, ...}) = 0
read(3, "# This module defines global configuration for the Bash shell, in\n# particular /etc/bashrc and /etc/profile.\n\n{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n cfge = config.environment;\n\n cfg = config.programs.bash;\n\n bashCompletion = optionalString cfg.enableCompletion ''\n # Check whether we're "..., 6170) = 6170
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/programs/bcc.nix", {st_mode=S_IFREG|0444, st_size=281, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/programs/bcc.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=281, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n{\n options.programs.bcc.enable = lib.mkEnableOption \"bcc\";\n\n config = lib.mkIf config.programs.bcc.enable {\n environment.systemPackages = [ config.boot.kernelPackages.bcc ];\n boot.extraModulePackages = [ config.boot.kernelPackages.bcc ];\n };\n}\n", 281) = 281
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/programs/blcr.nix", {st_mode=S_IFREG|0444, st_size=546, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/programs/blcr.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=546, ...}) = 0
read(3, "{ config, lib, ... }:\n\nlet\n inherit (lib) mkOption mkIf;\n cfg = config.environment.blcr;\n blcrPkg = config.boot.kernelPackages.blcr;\nin\n\n{\n ###### interface\n\n options = {\n environment.blcr.enable = mkOption {\n default = false;\n description =\n \"Whether to enable support for t"..., 546) = 546
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/programs/browserpass.nix", {st_mode=S_IFREG|0444, st_size=885, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/programs/browserpass.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=885, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\n{\n\n ###### interface\n options = {\n programs.browserpass.enable = mkEnableOption \"the NativeMessaging configuration for Chromium, Chrome, and Vivaldi.\";\n };\n\n ###### implementation\n config = mkIf config.programs.browserpass.enable {\n environment.syst"..., 885) = 885
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/programs/ccache.nix", {st_mode=S_IFREG|0444, st_size=2658, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/programs/ccache.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=2658, ...}) = 0
read(3, "{ config, pkgs, lib, ... }:\n\nwith lib;\nlet\n cfg = config.programs.ccache;\nin {\n options.programs.ccache = {\n # host configuration\n enable = mkEnableOption \"CCache\";\n cacheDir = mkOption {\n type = types.path;\n description = \"CCache directory\";\n default = \"/var/cache/ccache\";"..., 2658) = 2658
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/programs/cdemu.nix", {st_mode=S_IFREG|0444, st_size=1328, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/programs/cdemu.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=1328, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet cfg = config.programs.cdemu;\nin {\n\n options = {\n programs.cdemu = {\n enable = mkOption {\n default = false;\n description = ''\n <command>cdemu</command> for members of\n <option>programs.cdemu.group</option>.\n '"..., 1328) = 1328
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/programs/chromium.nix", {st_mode=S_IFREG|0444, st_size=2856, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/programs/chromium.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=2856, ...}) = 0
read(3, "{ config, lib, ... }:\n\nwith lib;\n\nlet\n cfg = config.programs.chromium;\n\n defaultProfile = filterAttrs (k: v: v != null) {\n HomepageLocation = cfg.homepageLocation;\n DefaultSearchProviderSearchURL = cfg.defaultSearchProviderSearchURL;\n DefaultSearchProviderSuggestURL = cfg.defaultSearchPro"..., 2856) = 2856
close(3) = 0
brk(0x18a23000) = 0x18a23000
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/programs/command-not-found/command-not-found.nix", {st_mode=S_IFREG|0444, st_size=2645, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/programs/command-not-found/command-not-found.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=2645, ...}) = 0
read(3, "# This module provides suggestions of packages to install if the user\n# tries to run a missing command in Bash. This is implemented using a\n# SQLite database that maps program names to Nix package names (e.g.,\n# \"pdflatex\" is mapped to \"tetex\").\n\n{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = "..., 2645) = 2645
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/programs/criu.nix", {st_mode=S_IFREG|0444, st_size=533, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/programs/criu.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=533, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet cfg = config.programs.criu;\nin {\n\n options = {\n programs.criu = {\n enable = mkOption {\n default = false;\n description = ''\n Install <command>criu</command> along with necessary kernel options.\n '';\n };\n };\n }"..., 533) = 533
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/programs/dconf.nix", {st_mode=S_IFREG|0444, st_size=992, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/programs/dconf.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=992, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.programs.dconf;\n\n mkDconfProfile = name: path:\n { source = path; target = \"dconf/profile/${name}\"; };\n\nin\n{\n ###### interface\n\n options = {\n programs.dconf = {\n enable = mkEnableOption \"dconf\";\n\n profiles = mkOption {\n "..., 992) = 992
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/programs/environment.nix", {st_mode=S_IFREG|0444, st_size=1774, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/programs/environment.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=1774, ...}) = 0
read(3, "# This module defines a standard configuration for NixOS global environment.\n\n# Most of the stuff here should probably be moved elsewhere sometime.\n\n{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.environment;\n\nin\n\n{\n\n config = {\n\n environment.variables =\n { NIXPKGS_CONFIG = \"/e"..., 1774) = 1774
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/programs/fish.nix", {st_mode=S_IFREG|0444, st_size=5808, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/programs/fish.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=5808, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n cfge = config.environment;\n\n cfg = config.programs.fish;\n\n fishAliases = concatStringsSep \"\\n\" (\n mapAttrsFlatten (k: v: \"alias ${k} '${v}'\") cfg.shellAliases\n );\n\nin\n\n{\n\n options = {\n\n programs.fish = {\n\n enable = mkOption {\n defa"..., 5808) = 5808
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/programs/freetds.nix", {st_mode=S_IFREG|0444, st_size=1333, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/programs/freetds.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=1333, ...}) = 0
read(3, "# Global configuration for freetds environment.\n\n{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.environment.freetds;\n\nin\n{\n ###### interface\n\n options = {\n\n environment.freetds = mkOption {\n type = types.attrsOf types.str;\n default = {};\n example = literalExample ''\n"..., 1333) = 1333
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/programs/gnupg.nix", {st_mode=S_IFREG|0444, st_size=2616, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/programs/gnupg.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=2616, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.programs.gnupg;\n\nin\n\n{\n\n options.programs.gnupg = {\n agent.enable = mkOption {\n type = types.bool;\n default = false;\n description = ''\n Enables GnuPG agent with socket-activation for every user session.\n '';\n "..., 2616) = 2616
close(3) = 0
brk(0x18a44000) = 0x18a44000
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/programs/gphoto2.nix", {st_mode=S_IFREG|0444, st_size=730, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/programs/gphoto2.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=730, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\n{\n meta.maintainers = [ maintainers.league ];\n\n ###### interface\n options = {\n programs.gphoto2 = {\n enable = mkOption {\n default = false;\n type = types.bool;\n description = ''\n Whether to configure system to use gphoto"..., 730) = 730
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/programs/info.nix", {st_mode=S_IFREG|0444, st_size=498, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/programs/info.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=498, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\n{\n\n options = {\n\n programs.info.enable = mkOption {\n type = types.bool;\n default = true;\n description = ''\n Whether to enable info pages and the <command>info</command> command.\n '';\n };\n\n };\n\n\n config = mkIf config.programs"..., 498) = 498
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/programs/java.nix", {st_mode=S_IFREG|0444, st_size=1339, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/programs/java.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=1339, ...}) = 0
read(3, "# This module provides JAVA_HOME, with a different way to install java\n# system-wide.\n\n{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.programs.java;\nin\n\n{\n\n options = {\n\n programs.java = {\n\n enable = mkEnableOption \"java\" // {\n description = ''\n Install and setup"..., 1339) = 1339
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/programs/kbdlight.nix", {st_mode=S_IFREG|0444, st_size=314, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/programs/kbdlight.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=314, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.programs.kbdlight;\n\nin\n{\n options.programs.kbdlight.enable = mkEnableOption \"kbdlight\";\n\n config = mkIf cfg.enable {\n environment.systemPackages = [ pkgs.kbdlight ];\n security.wrappers.kbdlight.source = \"${pkgs.kbdlight.out}/bin/kbdl"..., 314) = 314
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/programs/less.nix", {st_mode=S_IFREG|0444, st_size=3176, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/programs/less.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=3176, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.programs.less;\n\n configFile = ''\n #command\n ${concatStringsSep \"\\n\"\n (mapAttrsToList (command: action: \"${command} ${action}\") cfg.commands)\n }\n ${if cfg.clearDefaultCommands then \"#stop\" else \"\"}\n\n #line-edit\n ${con"..., 3176) = 3176
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/programs/light.nix", {st_mode=S_IFREG|0444, st_size=482, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/programs/light.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=482, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.programs.light;\n\nin\n{\n options = {\n programs.light = {\n enable = mkOption {\n default = false;\n type = types.bool;\n description = ''\n Whether to install Light backlight control with setuid wrapper.\n "..., 482) = 482
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/programs/man.nix", {st_mode=S_IFREG|0444, st_size=558, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/programs/man.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=558, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\n{\n\n options = {\n\n programs.man.enable = mkOption {\n type = types.bool;\n default = true;\n description = ''\n Whether to enable manual pages and the <command>man</command> command.\n This also includes \"man\" outputs of all <literal"..., 558) = 558
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/programs/mosh.nix", {st_mode=S_IFREG|0444, st_size=481, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/programs/mosh.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=481, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.programs.mosh;\n\nin\n{\n options.programs.mosh = {\n enable = mkOption {\n description = ''\n Whether to enable mosh. Note, this will open ports in your firewall!\n '';\n default = false;\n type = lib.types.bool;\n "..., 481) = 481
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/programs/mtr.nix", {st_mode=S_IFREG|0444, st_size=570, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/programs/mtr.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=570, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.programs.mtr;\nin {\n options = {\n programs.mtr = {\n enable = mkOption {\n type = types.bool;\n default = false;\n description = ''\n Whether to add mtr to the global environment and configure a\n set"..., 570) = 570
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/programs/nano.nix", {st_mode=S_IFREG|0444, st_size=950, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/programs/nano.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=950, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nlet\n cfg = config.programs.nano;\nin\n\n{\n ###### interface\n\n options = {\n programs.nano = {\n\n nanorc = lib.mkOption {\n type = lib.types.lines;\n default = \"\";\n description = ''\n The system-wide nano configuration.\n See <cite"..., 950) = 950
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/programs/npm.nix", {st_mode=S_IFREG|0444, st_size=879, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/programs/npm.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=879, ...}) = 0
read(3, "{ config, lib, ... }:\n\nwith lib;\n\nlet\n cfg = config.programs.npm;\nin\n\n{\n ###### interface\n\n options = {\n programs.npm = {\n enable = mkEnableOption \"<command>npm</command> global config\";\n\n npmrc = lib.mkOption {\n type = lib.types.lines;\n description = ''\n The s"..., 879) = 879
close(3) = 0
brk(0x18a66000) = 0x18a66000
brk(0x18a63000) = 0x18a63000
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/programs/oblogout.nix", {st_mode=S_IFREG|0444, st_size=3788, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/programs/oblogout.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=3788, ...}) = 0
read(3, "# Global configuration for oblogout.\n\n{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet cfg = config.programs.oblogout;\n\nin\n{\n ###### interface\n\n options = {\n\n programs.oblogout = {\n\n enable = mkOption {\n type = types.bool;\n default = false;\n description = ''\n Wheth"..., 3788) = 3788
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/programs/plotinus.nix", {st_mode=S_IFREG|0444, st_size=809, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/programs/plotinus.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=809, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.programs.plotinus;\nin\n{\n meta = {\n maintainers = pkgs.plotinus.meta.maintainers;\n doc = ./plotinus.xml;\n };\n\n ###### interface\n\n options = {\n programs.plotinus = {\n enable = mkOption {\n default = false;\n descr"..., 809) = 809
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/programs/qt5ct.nix", {st_mode=S_IFREG|0444, st_size=880, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/programs/qt5ct.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=880, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\n{\n meta.maintainers = [ maintainers.romildo ];\n\n ###### interface\n options = {\n programs.qt5ct = {\n enable = mkOption {\n default = false;\n type = types.bool;\n description = ''\n Whether to enable the Qt5 Configuration To"..., 880) = 880
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/programs/rootston.nix", {st_mode=S_IFREG|0444, st_size=3007, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/programs/rootston.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=3007, ...}) = 0
read(3, "{ config, pkgs, lib, ... }:\n\nwith lib;\n\nlet\n cfg = config.programs.rootston;\n\n rootstonWrapped = pkgs.writeScriptBin \"rootston\" ''\n #! ${pkgs.stdenv.shell}\n if [[ \"$#\" -ge 1 ]]; then\n exec ${pkgs.rootston}/bin/rootston \"$@\"\n else\n ${cfg.extraSessionCommands}\n exec ${pkgs.ro"..., 3007) = 3007
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/programs/screen.nix", {st_mode=S_IFREG|0444, st_size=468, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/programs/screen.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=468, ...}) = 0
read(3, "{ config, lib, ... }:\n\nlet\n inherit (lib) mkOption mkIf types;\n cfg = config.programs.screen;\nin\n\n{\n ###### interface\n\n options = {\n programs.screen = {\n\n screenrc = mkOption {\n default = \"\";\n description = ''\n The contents of /etc/screenrc file.\n '';\n "..., 468) = 468
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/programs/slock.nix", {st_mode=S_IFREG|0444, st_size=478, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/programs/slock.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=478, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.programs.slock;\n\nin\n{\n options = {\n programs.slock = {\n enable = mkOption {\n default = false;\n type = types.bool;\n description = ''\n Whether to install slock screen locker with setuid wrapper.\n '"..., 478) = 478
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/programs/shadow.nix", {st_mode=S_IFREG|0444, st_size=3193, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/programs/shadow.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=3193, ...}) = 0
read(3, "# Configuration for the pwdutils suite of tools: passwd, useradd, etc.\n\n{ config, lib, utils, pkgs, ... }:\n\nwith lib;\n\nlet\n\n loginDefs =\n ''\n DEFAULT_HOME yes\n\n SYS_UID_MIN 400\n SYS_UID_MAX 499\n UID_MIN 1000\n UID_MAX 29999\n\n SYS_GID_MIN 400\n SYS_GI"..., 3193) = 3193
close(3) = 0
brk(0x18a84000) = 0x18a84000
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/programs/shell.nix", {st_mode=S_IFREG|0444, st_size=1974, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/programs/shell.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=1974, ...}) = 0
read(3, "# This module defines a standard configuration for NixOS shells.\n\n{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.environment;\n\nin\n\n{\n\n config = {\n\n environment.shellAliases =\n { ls = \"ls --color=tty\";\n ll = \"ls -l\";\n l = \"ls -alh\";\n };\n\n environment.shell"..., 1974) = 1974
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/programs/spacefm.nix", {st_mode=S_IFREG|0444, st_size=1401, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/programs/spacefm.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=1401, ...}) = 0
read(3, "# Global configuration for spacefm.\n\n{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet cfg = config.programs.spacefm;\n\nin\n{\n ###### interface\n\n options = {\n\n programs.spacefm = {\n\n enable = mkOption {\n type = types.bool;\n default = false;\n description = ''\n Whether "..., 1401) = 1401
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/programs/ssh.nix", {st_mode=S_IFREG|0444, st_size=8206, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/programs/ssh.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=8206, ...}) = 0
read(3, "# Global configuration for the SSH client.\n\n{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.programs.ssh;\n cfgd = config.services.openssh;\n\n askPassword = cfg.askPassword;\n\n askPasswordWrapper = pkgs.writeScript \"ssh-askpass-wrapper\"\n ''\n #! ${pkgs.stdenv.shell} -e\n expo"..., 8206) = 8206
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/programs/ssmtp.nix", {st_mode=S_IFREG|0444, st_size=4876, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/programs/ssmtp.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=4876, ...}) = 0
read(3, "# Configuration for `ssmtp', a trivial mail transfer agent that can\n# replace sendmail/postfix on simple systems. It delivers email\n# directly to an SMTP server defined in its configuration file, wihout\n# queueing mail locally.\n\n{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.networking"..., 4876) = 4876
close(3) = 0
brk(0x18aa5000) = 0x18aa5000
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/programs/sysdig.nix", {st_mode=S_IFREG|0444, st_size=298, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/programs/sysdig.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=298, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.programs.sysdig;\nin {\n options.programs.sysdig.enable = mkEnableOption \"sysdig\";\n\n config = mkIf cfg.enable {\n environment.systemPackages = [ pkgs.sysdig ];\n boot.extraModulePackages = [ config.boot.kernelPackages.sysdig ];\n };\n}\n", 298) = 298
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/programs/systemtap.nix", {st_mode=S_IFREG|0444, st_size=573, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/programs/systemtap.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=573, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet cfg = config.programs.systemtap;\nin {\n\n options = {\n programs.systemtap = {\n enable = mkOption {\n default = false;\n description = ''\n Install <command>systemtap</command> along with necessary kernel options.\n '';\n "..., 573) = 573
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/programs/sway.nix", {st_mode=S_IFREG|0444, st_size=2449, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/programs/sway.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=2449, ...}) = 0
read(3, "{ config, pkgs, lib, ... }:\n\nwith lib;\n\nlet\n cfg = config.programs.sway;\n swayPackage = pkgs.sway;\n\n swayWrapped = pkgs.writeShellScriptBin \"sway\" ''\n if [[ \"$#\" -ge 1 ]]; then\n exec sway-setcap \"$@\"\n else\n ${cfg.extraSessionCommands}\n exec ${pkgs.dbus.dbus-launch} --exit-wit"..., 2449) = 2449
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/programs/thefuck.nix", {st_mode=S_IFREG|0444, st_size=887, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/programs/thefuck.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=887, ...}) = 0
read(3, "{ config, pkgs, lib, ... }:\n\nwith lib;\n\nlet\n prg = config.programs;\n cfg = prg.thefuck;\n\n initScript = ''\n eval $(${pkgs.thefuck}/bin/thefuck --alias ${cfg.alias})\n '';\nin\n {\n options = {\n programs.thefuck = {\n enable = mkEnableOption \"thefuck\";\n\n alias = mkOption {\n "..., 887) = 887
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/programs/tmux.nix", {st_mode=S_IFREG|0444, st_size=4932, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/programs/tmux.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=4932, ...}) = 0
read(3, "{ config, pkgs, lib, ... }:\n\nlet\n inherit (lib) mkOption mkEnableOption mkIf mkMerge types;\n\n cfg = config.programs.tmux;\n\n defaultKeyMode = \"emacs\";\n defaultResize = 5;\n defaultShortcut = \"b\";\n defaultTerminal = \"screen\";\n\n boolToStr = value: if value then \"on\" else \"off\";\n\n tmuxConf = '"..., 4932) = 4932
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/programs/venus.nix", {st_mode=S_IFREG|0444, st_size=4299, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/programs/venus.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=4299, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\nlet\n cfg = config.services.venus;\n\n configFile = pkgs.writeText \"venus.ini\"\n ''\n [Planet]\n name = ${cfg.name}\n link = ${cfg.link}\n owner_name = ${cfg.ownerName}\n owner_email = ${cfg.ownerEmail}\n output_theme = ${cfg.cacheDirec"..., 4299) = 4299
close(3) = 0
brk(0x18ac6000) = 0x18ac6000
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/programs/vim.nix", {st_mode=S_IFREG|0444, st_size=518, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/programs/vim.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=518, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.programs.vim;\nin {\n options.programs.vim = {\n defaultEditor = mkOption {\n type = types.bool;\n default = false;\n description = ''\n When enabled, installs vim and configures vim to be the default editor\n using "..., 518) = 518
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/programs/way-cooler.nix", {st_mode=S_IFREG|0444, st_size=1960, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/programs/way-cooler.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=1960, ...}) = 0
read(3, "{ config, pkgs, lib, ... }:\n\nwith lib;\n\nlet\n cfg = config.programs.way-cooler;\n way-cooler = pkgs.way-cooler;\n\n wcWrapped = pkgs.writeShellScriptBin \"way-cooler\" ''\n ${cfg.extraSessionCommands}\n exec ${pkgs.dbus.dbus-launch} --exit-with-session ${way-cooler}/bin/way-cooler\n '';\n wcJoined "..., 1960) = 1960
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/programs/wireshark.nix", {st_mode=S_IFREG|0444, st_size=1024, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/programs/wireshark.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=1024, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.programs.wireshark;\n wireshark = cfg.package;\nin {\n options = {\n programs.wireshark = {\n enable = mkOption {\n type = types.bool;\n default = false;\n description = ''\n Whether to add Wireshark to the glo"..., 1024) = 1024
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/programs/xfs_quota.nix", {st_mode=S_IFREG|0444, st_size=2887, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/programs/xfs_quota.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=2887, ...}) = 0
read(3, "# Configuration for the xfs_quota command\n\n{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.programs.xfs_quota;\n\n limitOptions = opts: concatStringsSep \" \" [\n (optionalString (opts.sizeSoftLimit != null) \"bsoft=${opts.sizeSoftLimit}\")\n (optionalString (opts.sizeHardLimit != null) \""..., 2887) = 2887
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/programs/xonsh.nix", {st_mode=S_IFREG|0444, st_size=1100, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/programs/xonsh.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=1100, ...}) = 0
read(3, "# This module defines global configuration for the xonsh.\n\n{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n cfge = config.environment;\n\n cfg = config.programs.xonsh;\n\nin\n\n{\n\n options = {\n\n programs.xonsh = {\n\n enable = mkOption {\n default = false;\n description = ''\n Wh"..., 1100) = 1100
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/programs/yabar.nix", {st_mode=S_IFREG|0444, st_size=4054, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/programs/yabar.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=4054, ...}) = 0
read(3, "{ lib, pkgs, config, ... }:\n\nwith lib;\n\nlet\n cfg = config.programs.yabar;\n\n mapExtra = v: lib.concatStringsSep \"\\n\" (mapAttrsToList (\n key: val: \"${key} = ${if (isString val) then \"\\\"${val}\\\"\" else \"${builtins.toString val}\"};\"\n ) v);\n\n listKeys = r: concatStringsSep \",\" (map (n: \"\\\"${n}\\\"\") "..., 4054) = 4054
close(3) = 0
brk(0x18ae7000) = 0x18ae7000
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/programs/zsh/oh-my-zsh.nix", {st_mode=S_IFREG|0444, st_size=2354, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/programs/zsh/oh-my-zsh.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=2354, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.programs.zsh.ohMyZsh;\nin\n {\n options = {\n programs.zsh.ohMyZsh = {\n enable = mkOption {\n default = false;\n description = ''\n Enable oh-my-zsh.\n '';\n };\n\n package = mkOption "..., 2354) = 2354
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/programs/zsh/zsh.nix", {st_mode=S_IFREG|0444, st_size=5405, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/programs/zsh/zsh.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=5405, ...}) = 0
read(3, "# This module defines global configuration for the zshell.\n\n{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n cfge = config.environment;\n\n cfg = config.programs.zsh;\n\n zshAliases = concatStringsSep \"\\n\" (\n mapAttrsFlatten (k: v: \"alias ${k}='${v}'\") cfg.shellAliases\n );\n\nin\n\n{\n\n options = {\n\n "..., 5405) = 5405
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/programs/zsh/zsh-autoenv.nix", {st_mode=S_IFREG|0444, st_size=576, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/programs/zsh/zsh-autoenv.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=576, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.programs.zsh.zsh-autoenv;\nin {\n options = {\n programs.zsh.zsh-autoenv = {\n enable = mkEnableOption \"zsh-autoenv\";\n package = mkOption {\n default = pkgs.zsh-autoenv;\n defaultText = \"pkgs.zsh-autoenv\";\n descr"..., 576) = 576
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/programs/zsh/zsh-syntax-highlighting.nix", {st_mode=S_IFREG|0444, st_size=2257, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/programs/zsh/zsh-syntax-highlighting.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=2257, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.programs.zsh.syntaxHighlighting;\nin\n{\n options = {\n programs.zsh.syntaxHighlighting = {\n enable = mkEnableOption \"zsh-syntax-highlighting\";\n\n highlighters = mkOption {\n default = [ \"main\" ];\n\n # https://github.com"..., 2257) = 2257
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/rename.nix", {st_mode=S_IFREG|0444, st_size=15745, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/rename.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=15745, ...}) = 0
brk(0x18b09000) = 0x18b09000
read(3, "{ lib, pkgs, ... }:\n\nwith lib;\n\n{\n imports = [\n (mkRenamedOptionModule [ \"environment\" \"x11Packages\" ] [ \"environment\" \"systemPackages\" ])\n (mkRenamedOptionModule [ \"environment\" \"enableBashCompletion\" ] [ \"programs\" \"bash\" \"enableCompletion\" ])\n (mkRenamedOptionModule [ \"environment\" \"nix"..., 15745) = 15745
close(3) = 0
brk(0x18b19000) = 0x18b19000
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/security/acme.nix", {st_mode=S_IFREG|0444, st_size=13049, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/security/acme.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=13049, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.security.acme;\n\n certOpts = { name, ... }: {\n options = {\n webroot = mkOption {\n type = types.str;\n example = \"/var/lib/acme/acme-challenges\";\n description = ''\n Where the webroot of the HTTP vhost is "..., 13049) = 13049
close(3) = 0
brk(0x18b3a000) = 0x18b3a000
brk(0x18b3b000) = 0x18b3b000
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/security/apparmor.nix", {st_mode=S_IFREG|0444, st_size=1380, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/security/apparmor.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=1380, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nlet\n inherit (lib) mkIf mkOption types concatMapStrings;\n cfg = config.security.apparmor;\nin\n\n{\n options = {\n security.apparmor = {\n enable = mkOption {\n type = types.bool;\n default = false;\n description = \"Enable the AppArmor Mandat"..., 1380) = 1380
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/security/apparmor-suid.nix", {st_mode=S_IFREG|0444, st_size=1130, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/security/apparmor-suid.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=1130, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\nlet\n cfg = config.security.apparmor;\nin\nwith lib;\n{\n\n options.security.apparmor.confineSUIDApplications = mkOption {\n default = true;\n description = ''\n Install AppArmor profiles for commonly-used SUID application\n to mitigate potential privilege escalat"..., 1130) = 1130
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/security/audit.nix", {st_mode=S_IFREG|0444, st_size=3729, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/security/audit.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=3729, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.security.audit;\n enabled = cfg.enable == \"lock\" || cfg.enable;\n\n failureModes = {\n silent = 0;\n printk = 1;\n panic = 2;\n };\n\n disableScript = pkgs.writeScript \"audit-disable\" ''\n #!${pkgs.stdenv.shell} -eu\n # Explicitly d"..., 3729) = 3729
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/security/auditd.nix", {st_mode=S_IFREG|0444, st_size=649, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/security/auditd.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=649, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\n{\n options.security.auditd.enable = mkEnableOption \"the Linux Audit daemon\";\n\n config = mkIf config.security.auditd.enable {\n systemd.services.auditd = {\n description = \"Linux Audit daemon\";\n wantedBy = [ \"basic.target\" ];\n\n unitConfig = {\n"..., 649) = 649
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/security/ca.nix", {st_mode=S_IFREG|0444, st_size=2521, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/security/ca.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=2521, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.security.pki;\n\n cacertPackage = pkgs.cacert.override {\n blacklist = cfg.caCertificateBlacklist;\n };\n\n caCertificates = pkgs.runCommand \"ca-certificates.crt\"\n { files =\n cfg.certificateFiles ++\n [ (builtins.toFile \"ext"..., 2521) = 2521
close(3) = 0
brk(0x18b5d000) = 0x18b5d000
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/security/chromium-suid-sandbox.nix", {st_mode=S_IFREG|0444, st_size=902, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/security/chromium-suid-sandbox.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=902, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.security.chromiumSuidSandbox;\n sandbox = pkgs.chromium.sandbox;\nin\n{\n options.security.chromiumSuidSandbox.enable = mkOption {\n type = types.bool;\n default = false;\n description = ''\n Whether to install the Chromium SUID "..., 902) = 902
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/security/dhparams.nix", {st_mode=S_IFREG|0444, st_size=3463, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/security/dhparams.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=3463, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\nlet\n cfg = config.security.dhparams;\nin\n{\n options = {\n security.dhparams = {\n params = mkOption {\n description =\n ''\n Diffie-Hellman parameters to generate.\n\n The value is the size (in bits) of the DH params to g"..., 3463) = 3463
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/security/duosec.nix", {st_mode=S_IFREG|0444, st_size=6462, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/security/duosec.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=6462, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.security.duosec;\n\n boolToStr = b: if b then \"yes\" else \"no\";\n\n configFile = ''\n [duo]\n ikey=${cfg.ikey}\n skey=${cfg.skey}\n host=${cfg.host}\n ${optionalString (cfg.group != \"\") (\"group=\"+cfg.group)}\n failmode=${cfg.failmod"..., 6462) = 6462
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/security/hidepid.nix", {st_mode=S_IFREG|0444, st_size=692, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/security/hidepid.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=692, ...}) = 0
read(3, "{ config, pkgs, lib, ... }:\nwith lib;\n\n{\n meta = {\n maintainers = [ maintainers.joachifm ];\n doc = ./hidepid.xml;\n };\n\n options = {\n security.hideProcessInformation = mkOption {\n type = types.bool;\n default = false;\n description = ''\n Restrict process information to"..., 692) = 692
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/security/lock-kernel-modules.nix", {st_mode=S_IFREG|0444, st_size=1295, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/security/lock-kernel-modules.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=1295, ...}) = 0
read(3, "{ config, lib, ... }:\n\nwith lib;\n\n{\n options = {\n security.lockKernelModules = mkOption {\n type = types.bool;\n default = false;\n description = ''\n Disable kernel module loading once the system is fully initialised.\n Module loading is disabled until the next reboot. "..., 1295) = 1295
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/security/oath.nix", {st_mode=S_IFREG|0444, st_size=1171, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/security/oath.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=1171, ...}) = 0
read(3, "# This module provides configuration for the OATH PAM modules.\n\n{ config, lib, pkgs, ... }:\n\nwith lib;\n\n{\n options = {\n\n security.pam.oath = {\n enable = mkOption {\n type = types.bool;\n default = false;\n description = ''\n Enable the OATH (one-time password) PAM "..., 1171) = 1171
close(3) = 0
brk(0x18b80000) = 0x18b80000
brk(0x18b7d000) = 0x18b7d000
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/security/pam.nix", {st_mode=S_IFREG|0444, st_size=21279, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/security/pam.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=21279, ...}) = 0
read(3, "# This module provides configuration for the PAM (Pluggable\n# Authentication Modules) system.\n\n{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n parentConfig = config;\n\n pamOpts = { config, name, ... }: let cfg = config; in let config = parentConfig; in {\n\n options = {\n\n name = mkOption {\n "..., 21279) = 21279
close(3) = 0
brk(0x18b9e000) = 0x18b9e000
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/security/pam_usb.nix", {st_mode=S_IFREG|0444, st_size=915, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/security/pam_usb.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=915, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n inherit (pkgs) pam_usb;\n\n cfg = config.security.pam.usb;\n\n anyUsbAuth = any (attrByPath [\"usbAuth\"] false) (attrValues config.security.pam.services);\n\nin\n\n{\n options = {\n\n security.pam.usb = {\n enable = mkOption {\n type = types.bool;\n "..., 915) = 915
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/security/pam_mount.nix", {st_mode=S_IFREG|0444, st_size=2316, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/security/pam_mount.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=2316, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.security.pam.mount;\n\n anyPamMount = any (attrByPath [\"pamMount\"] false) (attrValues config.security.pam.services);\nin\n\n{\n options = {\n\n security.pam.mount = {\n enable = mkOption {\n type = types.bool;\n default = false;"..., 2316) = 2316
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/security/polkit.nix", {st_mode=S_IFREG|0444, st_size=2873, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/security/polkit.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=2873, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.security.polkit;\n\nin\n\n{\n\n options = {\n\n security.polkit.enable = mkOption {\n type = types.bool;\n default = true;\n description = \"Whether to enable PolKit.\";\n };\n\n security.polkit.extraConfig = mkOption {\n type "..., 2873) = 2873
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/security/prey.nix", {st_mode=S_IFREG|0444, st_size=1275, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/security/prey.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=1275, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.prey;\n myPrey = pkgs.\"prey-bash-client\".override {\n apiKey = cfg.apiKey;\n deviceKey = cfg.deviceKey;\n };\nin {\n options = {\n\n services.prey = {\n enable = mkOption {\n default = false;\n type = types.bool;"..., 1275) = 1275
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/security/rngd.nix", {st_mode=S_IFREG|0444, st_size=1121, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/security/rngd.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=1121, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\n{\n options = {\n security.rngd.enable = mkOption {\n type = types.bool;\n default = true;\n description = ''\n Whether to enable the rng daemon, which adds entropy from\n hardware sources of randomness to the kernel entropy pool when"..., 1121) = 1121
close(3) = 0
brk(0x18bc1000) = 0x18bc1000
brk(0x18bbe000) = 0x18bbe000
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/security/rtkit.nix", {st_mode=S_IFREG|0444, st_size=970, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/security/rtkit.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=970, ...}) = 0
read(3, "# A module for \342\200\230rtkit\342\200\231, a DBus system service that hands out realtime\n# scheduling priority to processes that ask for it.\n\n{ config, lib, pkgs, ... }:\n\nwith lib;\n\n{\n\n options = {\n\n security.rtkit.enable = mkOption {\n type = types.bool;\n default = false;\n description = ''\n "..., 970) = 970
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/security/wrappers/default.nix", {st_mode=S_IFREG|0444, st_size=7688, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/security/wrappers/default.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=7688, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\nlet\n\n inherit (config.security) wrapperDir wrappers;\n\n parentWrapperDir = dirOf wrapperDir;\n\n programs =\n (lib.mapAttrsToList\n (n: v: (if v ? \"program\" then v else v // {program=n;}))\n wrappers);\n\n securityWrapper = pkgs.stdenv.mkDerivation {\n name "..., 7688) = 7688
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/security/sudo.nix", {st_mode=S_IFREG|0444, st_size=6965, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/security/sudo.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=6965, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.security.sudo;\n\n inherit (pkgs) sudo;\n\n toUserString = user: if (isInt user) then \"#${toString user}\" else \"${user}\";\n toGroupString = group: if (isInt group) then \"%#${toString group}\" else \"%${group}\";\n\n toCommandOptionsString = optio"..., 6965) = 6965
close(3) = 0
brk(0x18bdf000) = 0x18bdf000
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/admin/salt/master.nix", {st_mode=S_IFREG|0444, st_size=1590, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/admin/salt/master.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=1590, ...}) = 0
read(3, "{ config, pkgs, lib, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.services.salt.master;\n\n fullConfig = lib.recursiveUpdate {\n # Provide defaults for some directories to allow an immutable config dir\n\n # Default is equivalent to /etc/salt/master.d/*.conf\n default_include = \"/var/lib/salt/master."..., 1590) = 1590
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/admin/salt/minion.nix", {st_mode=S_IFREG|0444, st_size=1590, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/admin/salt/minion.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=1590, ...}) = 0
read(3, "{ config, pkgs, lib, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.services.salt.minion;\n\n fullConfig = lib.recursiveUpdate {\n # Provide defaults for some directories to allow an immutable config dir\n # NOTE: the config dir being immutable prevents `minion_id` caching\n\n # Default is equivalent t"..., 1590) = 1590
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/amqp/activemq/default.nix", {st_mode=S_IFREG|0444, st_size=4149, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/amqp/activemq/default.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=4149, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith pkgs;\nwith lib;\n\nlet\n\n cfg = config.services.activemq;\n\n activemqBroker = stdenv.mkDerivation {\n name = \"activemq-broker\";\n phases = [ \"installPhase\" ];\n buildInputs = [ jdk ];\n installPhase = ''\n mkdir -p $out/lib\n source ${activemq}/lib/cla"..., 4149) = 4149
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/amqp/rabbitmq.nix", {st_mode=S_IFREG|0444, st_size=3810, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/amqp/rabbitmq.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=3810, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.rabbitmq;\n config_file = pkgs.writeText \"rabbitmq.config\" cfg.config;\n config_file_wo_suffix = builtins.substring 0 ((builtins.stringLength config_file) - 7) config_file;\n\nin {\n ###### interface\n options = {\n services.rabbitm"..., 3810) = 3810
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/audio/alsa.nix", {st_mode=S_IFREG|0444, st_size=3281, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/audio/alsa.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=3281, ...}) = 0
read(3, "# ALSA sound support.\n{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n inherit (pkgs) alsaUtils;\n\n pulseaudioEnabled = config.hardware.pulseaudio.enable;\n\nin\n\n{\n\n ###### interface\n\n options = {\n\n sound = {\n\n enable = mkOption {\n type = types.bool;\n default = true;\n desc"..., 3281) = 3281
close(3) = 0
brk(0x18c00000) = 0x18c00000
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/audio/icecast.nix", {st_mode=S_IFREG|0444, st_size=3199, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/audio/icecast.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=3199, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.icecast;\n configFile = pkgs.writeText \"icecast.xml\" ''\n <icecast>\n <hostname>${cfg.hostname}</hostname>\n\n <authentication>\n <admin-user>${cfg.admin.user}</admin-user>\n <admin-password>${cfg.admin.password"..., 3199) = 3199
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/audio/liquidsoap.nix", {st_mode=S_IFREG|0444, st_size=1797, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/audio/liquidsoap.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=1797, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n streams = builtins.attrNames config.services.liquidsoap.streams;\n\n streamService =\n name:\n let stream = builtins.getAttr name config.services.liquidsoap.streams; in\n { inherit name;\n value = {\n after = [ \"network-online.target\" \"sou"..., 1797) = 1797
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/audio/mpd.nix", {st_mode=S_IFREG|0444, st_size=5409, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/audio/mpd.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=5409, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n name = \"mpd\";\n\n uid = config.ids.uids.mpd;\n gid = config.ids.gids.mpd;\n cfg = config.services.mpd;\n\n mpdConf = pkgs.writeText \"mpd.conf\" ''\n music_directory \"${cfg.musicDirectory}\"\n playlist_directory \"${cfg.playlistDirectory}\"\n db_fil"..., 5409) = 5409
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/audio/mopidy.nix", {st_mode=S_IFREG|0444, st_size=2834, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/audio/mopidy.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=2834, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith pkgs;\nwith lib;\n\nlet\n uid = config.ids.uids.mopidy;\n gid = config.ids.gids.mopidy;\n cfg = config.services.mopidy;\n\n mopidyConf = writeText \"mopidy.conf\" cfg.configuration;\n\n mopidyEnv = buildEnv {\n name = \"mopidy-with-extensions-${mopidy.version}\";\n paths"..., 2834) = 2834
close(3) = 0
brk(0x18c21000) = 0x18c21000
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/audio/slimserver.nix", {st_mode=S_IFREG|0444, st_size=1525, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/audio/slimserver.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=1525, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.services.slimserver;\n\nin {\n options = {\n\n services.slimserver = {\n\n enable = mkOption {\n type = types.bool;\n default = false;\n description = ''\n Whether to enable slimserver.\n '';\n };\n\n "..., 1525) = 1525
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/audio/squeezelite.nix", {st_mode=S_IFREG|0444, st_size=1424, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/audio/squeezelite.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=1424, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n uid = config.ids.uids.squeezelite;\n cfg = config.services.squeezelite;\n\nin {\n\n ###### interface\n\n options = {\n\n services.squeezelite= {\n\n enable = mkEnableOption \"Squeezelite, a software Squeezebox emulator\";\n\n dataDir = mkOption {\n "..., 1424) = 1424
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/audio/ympd.nix", {st_mode=S_IFREG|0444, st_size=1219, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/audio/ympd.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=1219, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.ympd;\nin {\n\n ###### interface\n\n options = {\n\n services.ympd = {\n\n enable = mkEnableOption \"ympd, the MPD Web GUI\";\n\n webPort = mkOption {\n type = types.string;\n default = \"8080\";\n description = \"T"..., 1219) = 1219
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/backup/almir.nix", {st_mode=S_IFREG|0444, st_size=4134, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/backup/almir.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=4134, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.almir;\n\n bconsoleconf = pkgs.writeText \"bconsole.conf\"\n ''\n Director {\n Name = ${cfg.director_name}\n DIRport = ${toString cfg.director_port}\n address = ${cfg.director_address}\n Password = \"${cfg."..., 4134) = 4134
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/backup/bacula.nix", {st_mode=S_IFREG|0444, st_size=12144, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/backup/bacula.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=12144, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\n# TODO: test configuration when building nixexpr (use -t parameter)\n# TODO: support sqlite3 (it's deprecate?) and mysql\n\nwith lib;\n\nlet\n libDir = \"/var/lib/bacula\";\n\n fd_cfg = config.services.bacula-fd;\n fd_conf = pkgs.writeText \"bacula-fd.conf\"\n ''\n Client {\n"..., 12144) = 12144
brk(0x18c42000) = 0x18c42000
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/backup/crashplan.nix", {st_mode=S_IFREG|0444, st_size=2001, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/backup/crashplan.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=2001, ...}) = 0
read(3, "{ config, pkgs, lib, ... }:\n\nlet\n cfg = config.services.crashplan;\n crashplan = pkgs.crashplan;\n varDir = \"/var/lib/crashplan\";\nin\n\nwith lib;\n\n{\n options = {\n services.crashplan = {\n enable = mkOption {\n default = false;\n type = types.bool;\n description = ''\n "..., 2001) = 2001
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/backup/crashplan-small-business.nix", {st_mode=S_IFREG|0444, st_size=2321, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/backup/crashplan-small-business.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=2321, ...}) = 0
read(3, "{ config, pkgs, lib, ... }:\n\nlet\n cfg = config.services.crashplansb;\n crashplansb = pkgs.crashplansb.override { maxRam = cfg.maxRam; };\n varDir = \"/var/lib/crashplan\";\nin\n\nwith lib;\n\n{\n options = {\n services.crashplansb = {\n enable = mkOption {\n default = false;\n type = typ"..., 2321) = 2321
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/backup/mysql-backup.nix", {st_mode=S_IFREG|0444, st_size=3048, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/backup/mysql-backup.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=3048, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n inherit (pkgs) mysql gzip;\n\n cfg = config.services.mysqlBackup;\n defaultUser = \"mysqlbackup\";\n\n backupScript = ''\n set -o pipefail\n failed=\"\"\n ${concatMapStringsSep \"\\n\" backupDatabaseScript cfg.databases}\n if [ -n \"$failed\" ]; then\n "..., 3048) = 3048
close(3) = 0
brk(0x18c63000) = 0x18c63000
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/backup/postgresql-backup.nix", {st_mode=S_IFREG|0444, st_size=1545, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/backup/postgresql-backup.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=1545, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n inherit (pkgs) gzip;\n\n location = config.services.postgresqlBackup.location;\n\n postgresqlBackupCron = db:\n ''\n ${config.services.postgresqlBackup.period} root ${config.services.postgresql.package}/bin/pg_dump ${db} | ${gzip}/bin/gzip -c > ${loc"..., 1545) = 1545
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/backup/rsnapshot.nix", {st_mode=S_IFREG|0444, st_size=2217, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/backup/rsnapshot.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=2217, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet \n cfg = config.services.rsnapshot;\n cfgfile = pkgs.writeText \"rsnapshot.conf\" ''\n config_version\t1.2\n cmd_cp\t${pkgs.coreutils}/bin/cp\n cmd_rm\t${pkgs.coreutils}/bin/rm\n cmd_rsync\t${pkgs.rsync}/bin/rsync\n cmd_ssh\t${pkgs.openssh}/bin/ssh\n "..., 2217) = 2217
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/backup/tarsnap.nix", {st_mode=S_IFREG|0444, st_size=13079, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/backup/tarsnap.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=13079, ...}) = 0
read(3, "{ config, lib, pkgs, utils, ... }:\n\nwith lib;\n\nlet\n gcfg = config.services.tarsnap;\n\n configFile = name: cfg: ''\n keyfile ${cfg.keyfile}\n ${optionalString (cfg.cachedir != null) \"cachedir ${cfg.cachedir}\"}\n ${optionalString cfg.nodump \"nodump\"}\n ${optionalString cfg.printStats \"print-s"..., 13079) = 13079
close(3) = 0
brk(0x18c84000) = 0x18c84000
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/backup/znapzend.nix", {st_mode=S_IFREG|0444, st_size=12680, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/backup/znapzend.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=12680, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\nwith types;\n\nlet\n\n # Converts a plan like\n # { \"1d\" = \"1h\"; \"1w\" = \"1d\"; }\n # into\n # \"1d=>1h,1w=>1d\"\n attrToPlan = attrs: concatStringsSep \",\" (builtins.attrValues (\n mapAttrs (n: v: \"${n}=>${v}\") attrs));\n\n planDescription = ''\n The znapzend"..., 12680) = 12680
close(3) = 0
brk(0x18ca5000) = 0x18ca5000
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/cluster/fleet.nix", {st_mode=S_IFREG|0444, st_size=4112, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/cluster/fleet.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=4112, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.fleet;\n\nin {\n\n ##### Interface\n options.services.fleet = {\n enable = mkOption {\n type = types.bool;\n default = false;\n description = ''\n Whether to enable fleet service.\n '';\n };\n\n listen = mkOp"..., 4112) = 4112
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/cluster/kubernetes/default.nix", {st_mode=S_IFREG|0444, st_size=38813, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/cluster/kubernetes/default.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=38813, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.kubernetes;\n\n skipAttrs = attrs: map (filterAttrs (k: v: k != \"enable\"))\n (filter (v: !(hasAttr \"enable\" v) || v.enable) attrs);\n\n infraContainer = pkgs.dockerTools.buildImage {\n name = \"pause\";\n tag = \"latest\";\n conte"..., 38813) = 38813
close(3) = 0
brk(0x18cc6000) = 0x18cc6000
brk(0x18ce7000) = 0x18ce7000
brk(0x18d08000) = 0x18d08000
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/cluster/kubernetes/dns.nix", {st_mode=S_IFREG|0444, st_size=9753, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/cluster/kubernetes/dns.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=9753, ...}) = 0
read(3, "{ config, pkgs, lib, ... }:\n\nwith lib;\n\nlet\n version = \"1.14.4\";\n\n k8s-dns-kube-dns = pkgs.dockerTools.pullImage {\n imageName = \"gcr.io/google_containers/k8s-dns-kube-dns-amd64\";\n imageTag = version;\n sha256 = \"0q97xfqrigrfjl2a9cxl5in619py0zv44gch09jm8gqjkxl80imp\";\n };\n\n k8s-dns-dnsmasq"..., 9753) = 9753
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/cluster/kubernetes/dashboard.nix", {st_mode=S_IFREG|0444, st_size=4993, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/cluster/kubernetes/dashboard.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=4993, ...}) = 0
read(3, "{ config, pkgs, lib, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.kubernetes.addons.dashboard;\n\n name = \"gcr.io/google_containers/kubernetes-dashboard-amd64\";\n\tversion = \"v1.8.2\";\n\n image = pkgs.dockerTools.pullImage {\n imageName = name;\n imageTag = version;\n sha256 = \"11h0fz3wxp0f10fsy"..., 4993) = 4993
close(3) = 0
brk(0x18d29000) = 0x18d29000
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/cluster/panamax.nix", {st_mode=S_IFREG|0444, st_size=4090, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/cluster/panamax.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=4090, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.panamax;\n\n panamax_api = pkgs.panamax_api.override { dataDir = cfg.dataDir + \"/api\"; };\n panamax_ui = pkgs.panamax_ui.override { dataDir = cfg.dataDir + \"/ui\"; };\n\nin {\n\n ##### Interface\n options.services.panamax = {\n enable "..., 4090) = 4090
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/computing/boinc/client.nix", {st_mode=S_IFREG|0444, st_size=2429, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/computing/boinc/client.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=2429, ...}) = 0
read(3, "{config, lib, pkgs, ...}:\n\nwith lib;\n\nlet\n cfg = config.services.boinc;\n allowRemoteGuiRpcFlag = optionalString cfg.allowRemoteGuiRpc \"--allow_remote_gui_rpc\";\n\nin\n {\n options.services.boinc = {\n enable = mkOption {\n type = types.bool;\n default = false;\n description ="..., 2429) = 2429
close(3) = 0
brk(0x18d52000) = 0x18d52000
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/computing/torque/server.nix", {st_mode=S_IFREG|0444, st_size=2289, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/computing/torque/server.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=2289, ...}) = 0
read(3, "{ config, pkgs, lib, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.torque.server;\n torque = pkgs.torque;\nin\n{\n options = {\n\n services.torque.server = {\n\n enable = mkEnableOption \"torque server\";\n\n };\n\n };\n\n config = mkIf cfg.enable {\n environment.systemPackages = [ pkgs.torque ];\n"..., 2289) = 2289
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/computing/torque/mom.nix", {st_mode=S_IFREG|0444, st_size=1334, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/computing/torque/mom.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=1334, ...}) = 0
read(3, "{ config, pkgs, lib, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.services.torque.mom;\n torque = pkgs.torque;\n\n momConfig = pkgs.writeText \"torque-mom-config\" ''\n $pbsserver ${cfg.serverNode}\n $logevent 225\n '';\n\nin\n{\n options = {\n\n services.torque.mom = {\n enable = mkEnableOption \"torqu"..., 1334) = 1334
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/computing/slurm/slurm.nix", {st_mode=S_IFREG|0444, st_size=5406, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/computing/slurm/slurm.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=5406, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.services.slurm;\n # configuration file can be generated by http://slurm.schedmd.com/configurator.html\n configFile = pkgs.writeText \"slurm.conf\"\n ''\n ${optionalString (cfg.controlMachine != null) ''controlMachine=${cfg.controlMachin"..., 5406) = 5406
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/continuous-integration/buildbot/master.nix", {st_mode=S_IFREG|0444, st_size=7197, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/continuous-integration/buildbot/master.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=7197, ...}) = 0
read(3, "# NixOS module for Buildbot continous integration server.\n\n{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.buildbot-master;\n escapeStr = s: escape [\"'\"] s;\n masterCfg = if cfg.masterCfg == null then pkgs.writeText \"master.cfg\" ''\n from buildbot.plugins import *\n factory ="..., 7197) = 7197
close(3) = 0
brk(0x18d73000) = 0x18d73000
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/continuous-integration/buildbot/worker.nix", {st_mode=S_IFREG|0444, st_size=3721, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/continuous-integration/buildbot/worker.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=3721, ...}) = 0
read(3, "# NixOS module for Buildbot Worker.\n\n{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.buildbot-worker;\n\nin {\n options = {\n services.buildbot-worker = {\n\n enable = mkOption {\n type = types.bool;\n default = false;\n description = \"Whether to enable the B"..., 3721) = 3721
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/continuous-integration/buildkite-agent.nix", {st_mode=S_IFREG|0444, st_size=8120, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/continuous-integration/buildkite-agent.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=8120, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.buildkite-agent;\n\n mkHookOption = { name, description, example ? null }: {\n inherit name;\n value = mkOption {\n default = null;\n inherit description;\n type = types.nullOr types.lines;\n } // (if example == nul"..., 8120) = 8120
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/continuous-integration/hail.nix", {st_mode=S_IFREG|0444, st_size=1659, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/continuous-integration/hail.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=1659, ...}) = 0
read(3, "{ config, lib, pkgs, ...}:\n\nwith lib;\n\nlet\n cfg = config.services.hail;\nin {\n\n\n ###### interface\n\n options.services.hail = {\n enable = mkOption {\n type = types.bool;\n default = false;\n description = ''\n Enables the Hail Auto Update Service. Hail can automatically deploy a"..., 1659) = 1659
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/continuous-integration/hydra/default.nix", {st_mode=S_IFREG|0444, st_size=13424, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/continuous-integration/hydra/default.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=13424, ...}) = 0
brk(0x18d96000) = 0x18d96000
read(3, "{ config, pkgs, lib, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.services.hydra;\n\n baseDir = \"/var/lib/hydra\";\n\n hydraConf = pkgs.writeScript \"hydra.conf\" cfg.extraConfig;\n\n hydraEnv =\n { HYDRA_DBI = cfg.dbi;\n HYDRA_CONFIG = \"${baseDir}/hydra.conf\";\n HYDRA_DATA = \"${baseDir}\";\n };\n\n e"..., 13424) = 13424
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/continuous-integration/gitlab-runner.nix", {st_mode=S_IFREG|0444, st_size=4362, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/continuous-integration/gitlab-runner.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=4362, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.gitlab-runner;\n configFile =\n if (cfg.configFile == null) then\n (pkgs.runCommand \"config.toml\" {\n buildInputs = [ pkgs.remarshal ];\n } ''\n remarshal -if json -of toml \\\n < ${pkgs.writeText \"confi"..., 4362) = 4362
close(3) = 0
brk(0x18db7000) = 0x18db7000
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/continuous-integration/gocd-agent/default.nix", {st_mode=S_IFREG|0444, st_size=6100, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/continuous-integration/gocd-agent/default.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=6100, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.gocd-agent;\nin {\n options = {\n services.gocd-agent = {\n enable = mkEnableOption \"gocd-agent\";\n\n user = mkOption {\n default = \"gocd-agent\";\n type = types.str;\n description = ''\n User the Go"..., 6100) = 6100
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/continuous-integration/gocd-server/default.nix", {st_mode=S_IFREG|0444, st_size=5702, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/continuous-integration/gocd-server/default.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=5702, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.gocd-server;\nin {\n options = {\n services.gocd-server = {\n enable = mkEnableOption \"gocd-server\";\n\n user = mkOption {\n default = \"gocd-server\";\n type = types.str;\n description = ''\n User th"..., 5702) = 5702
close(3) = 0
brk(0x18dd8000) = 0x18dd8000
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/continuous-integration/jenkins/default.nix", {st_mode=S_IFREG|0444, st_size=6865, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/continuous-integration/jenkins/default.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=6865, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\nwith lib;\nlet\n cfg = config.services.jenkins;\nin {\n options = {\n services.jenkins = {\n enable = mkOption {\n type = types.bool;\n default = false;\n description = ''\n Whether to enable the jenkins continuous integration server.\n "..., 6865) = 6865
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/continuous-integration/jenkins/job-builder.nix", {st_mode=S_IFREG|0444, st_size=6038, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/continuous-integration/jenkins/job-builder.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=6038, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n jenkinsCfg = config.services.jenkins;\n cfg = config.services.jenkins.jobBuilder;\n\nin {\n options = {\n services.jenkins.jobBuilder = {\n enable = mkOption {\n type = types.bool;\n default = false;\n description = ''\n Whe"..., 6038) = 6038
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/continuous-integration/jenkins/slave.nix", {st_mode=S_IFREG|0444, st_size=1998, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/continuous-integration/jenkins/slave.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=1998, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\nwith lib;\nlet\n cfg = config.services.jenkinsSlave;\n masterCfg = config.services.jenkins;\nin {\n options = {\n services.jenkinsSlave = {\n # todo:\n # * assure the profile of the jenkins user has a JRE and any specified packages. This would\n # enable ssh s"..., 1998) = 1998
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/databases/4store-endpoint.nix", {st_mode=S_IFREG|0444, st_size=1721, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/databases/4store-endpoint.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=1721, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\nlet\n cfg = config.services.fourStoreEndpoint;\n endpointUser = \"fourstorehttp\";\n run = \"${pkgs.su}/bin/su -s ${pkgs.stdenv.shell} ${endpointUser} -c\";\nin\nwith lib;\n{\n\n ###### interface\n\n options = {\n\n services.fourStoreEndpoint = {\n\n enable = mkOption {\n "..., 1721) = 1721
close(3) = 0
brk(0x18df9000) = 0x18df9000
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/databases/4store.nix", {st_mode=S_IFREG|0444, st_size=1642, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/databases/4store.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=1642, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\nlet\n cfg = config.services.fourStore;\n stateDir = \"/var/lib/4store\";\n fourStoreUser = \"fourstore\";\n run = \"${pkgs.su}/bin/su -s ${pkgs.stdenv.shell} ${fourStoreUser}\";\nin\nwith lib;\n{\n\n ###### interface\n\n options = {\n\n services.fourStore = {\n\n enable = mkOpti"..., 1642) = 1642
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/databases/clickhouse.nix", {st_mode=S_IFREG|0444, st_size=1481, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/databases/clickhouse.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=1481, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\nlet\n cfg = config.services.clickhouse;\n confDir = \"/etc/clickhouse-server\";\n stateDir = \"/var/lib/clickhouse\";\nin\nwith lib;\n{\n\n ###### interface\n\n options = {\n\n services.clickhouse = {\n\n enable = mkOption {\n default = false;\n description = \"Whet"..., 1481) = 1481
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/databases/couchdb.nix", {st_mode=S_IFREG|0444, st_size=5850, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/databases/couchdb.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=5850, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.couchdb;\n useVersion2 = strings.versionAtLeast (strings.getVersion cfg.package) \"2.0\";\n configFile = pkgs.writeText \"couchdb.ini\" (\n ''\n [couchdb]\n database_dir = ${cfg.databaseDir}\n uri_file = ${cfg.uriFile}\n "..., 5850) = 5850
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/databases/firebird.nix", {st_mode=S_IFREG|0444, st_size=4598, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/databases/firebird.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=4598, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\n# TODO: This may file may need additional review, eg which configuartions to\n# expose to the user.\n#\n# I only used it to access some simple databases.\n\n# test:\n# isql, then type the following commands:\n# CREATE DATABASE '/var/db/firebird/data/test.fdb' USER 'SYSDBA' PASS"..., 4598) = 4598
close(3) = 0
brk(0x18e1a000) = 0x18e1a000
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/databases/hbase.nix", {st_mode=S_IFREG|0444, st_size=2927, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/databases/hbase.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=2927, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.hbase;\n\n configFile = pkgs.writeText \"hbase-site.xml\" ''\n <configuration>\n <property>\n <name>hbase.rootdir</name>\n <value>file://${cfg.dataDir}/hbase</value>\n </property>\n <property>\n <name>hb"..., 2927) = 2927
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/databases/influxdb.nix", {st_mode=S_IFREG|0444, st_size=4602, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/databases/influxdb.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=4602, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.influxdb;\n\n configOptions = recursiveUpdate {\n meta = {\n bind-address = \":8088\";\n commit-timeout = \"50ms\";\n dir = \"${cfg.dataDir}/meta\";\n election-timeout = \"1s\";\n heartbeat-timeout = \"1s\";\n hostnam"..., 4602) = 4602
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/databases/memcached.nix", {st_mode=S_IFREG|0444, st_size=2541, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/databases/memcached.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=2541, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.services.memcached;\n\n memcached = pkgs.memcached;\n\nin\n\n{\n\n ###### interface\n\n options = {\n\n services.memcached = {\n\n enable = mkOption {\n default = false;\n description = \"\n Whether to enable Memcached.\n "..., 2541) = 2541
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/databases/mongodb.nix", {st_mode=S_IFREG|0444, st_size=3051, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/databases/mongodb.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=3051, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.services.mongodb;\n\n mongodb = cfg.package;\n\n mongoCnf = pkgs.writeText \"mongodb.conf\"\n ''\n net.bindIp: ${cfg.bind_ip}\n ${optionalString cfg.quiet \"systemLog.quiet: true\"}\n systemLog.destination: syslog\n storage.dbPath: ${cfg."..., 3051) = 3051
close(3) = 0
brk(0x18e3b000) = 0x18e3b000
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/databases/mysql.nix", {st_mode=S_IFREG|0444, st_size=12018, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/databases/mysql.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=12018, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.services.mysql;\n\n mysql = cfg.package;\n\n isMariaDB =\n let\n pName = _p: (builtins.parseDrvName (_p.name)).name;\n in pName mysql == pName pkgs.mariadb;\n\n pidFile = \"${cfg.pidDir}/mysqld.pid\";\n\n mysqldOptions =\n \"--user=${cfg"..., 12018) = 12018
close(3) = 0
brk(0x18e5c000) = 0x18e5c000
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/databases/neo4j.nix", {st_mode=S_IFREG|0444, st_size=4075, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/databases/neo4j.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=4075, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.neo4j;\n\n serverConfig = pkgs.writeText \"neo4j.conf\" ''\n dbms.directories.data=${cfg.dataDir}/data\n dbms.directories.certificates=${cfg.certDir}\n dbms.directories.logs=${cfg.dataDir}/logs\n dbms.directories.plugins=${cfg."..., 4075) = 4075
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/databases/openldap.nix", {st_mode=S_IFREG|0444, st_size=3006, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/databases/openldap.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=3006, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.services.openldap;\n openldap = pkgs.openldap;\n\n configFile = pkgs.writeText \"slapd.conf\" cfg.extraConfig;\n\nin\n\n{\n\n ###### interface\n\n options = {\n\n services.openldap = {\n\n enable = mkOption {\n type = types.bool;\n d"..., 3006) = 3006
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/databases/opentsdb.nix", {st_mode=S_IFREG|0444, st_size=2449, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/databases/opentsdb.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=2449, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.opentsdb;\n\n configFile = pkgs.writeText \"opentsdb.conf\" cfg.config;\n\nin {\n\n ###### interface\n\n options = {\n\n services.opentsdb = {\n\n enable = mkOption {\n type = types.bool;\n default = false;\n descript"..., 2449) = 2449
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/databases/pgmanage.nix", {st_mode=S_IFREG|0444, st_size=6663, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/databases/pgmanage.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=6663, ...}) = 0
read(3, "{ lib, pkgs, config, ... } :\n\nwith lib;\n\nlet\n cfg = config.services.pgmanage;\n\n confFile = pkgs.writeTextFile {\n name = \"pgmanage.conf\";\n text = ''\n connection_file = ${pgmanageConnectionsFile}\n\n allow_custom_connections = ${builtins.toJSON cfg.allowCustomConnections}\n\n pgman"..., 6663) = 6663
close(3) = 0
brk(0x18e7d000) = 0x18e7d000
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/databases/postgresql.nix", {st_mode=S_IFREG|0444, st_size=8584, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/databases/postgresql.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=8584, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.services.postgresql;\n\n # see description of extraPlugins\n postgresqlAndPlugins = pg:\n if cfg.extraPlugins == [] then pg\n else pkgs.buildEnv {\n name = \"postgresql-and-plugins-${(builtins.parseDrvName pg.name).version}\";\n pa"..., 8584) = 8584
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/databases/redis.nix", {st_mode=S_IFREG|0444, st_size=7532, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/databases/redis.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=7532, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.redis;\n redisBool = b: if b then \"yes\" else \"no\";\n condOption = name: value: if value != null then \"${name} ${toString value}\" else \"\";\n\n redisConfig = pkgs.writeText \"redis.conf\" ''\n pidfile ${cfg.pidFile}\n port ${toString"..., 7532) = 7532
close(3) = 0
brk(0x18e9e000) = 0x18e9e000
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/databases/riak.nix", {st_mode=S_IFREG|0444, st_size=3599, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/databases/riak.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=3599, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.services.riak;\n\nin\n\n{\n\n ###### interface\n\n options = {\n\n services.riak = {\n\n enable = mkEnableOption \"riak\";\n\n package = mkOption {\n type = types.package;\n default = pkgs.riak;\n defaultText = \"pkgs.riak\";"..., 3599) = 3599
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/databases/riak-cs.nix", {st_mode=S_IFREG|0444, st_size=4638, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/databases/riak-cs.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=4638, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.services.riak-cs;\n\nin\n\n{\n\n ###### interface\n\n options = {\n\n services.riak-cs = {\n\n enable = mkEnableOption \"riak-cs\";\n\n package = mkOption {\n type = types.package;\n default = pkgs.riak-cs;\n defaultText = "..., 4638) = 4638
close(3) = 0
brk(0x18ebf000) = 0x18ebf000
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/databases/stanchion.nix", {st_mode=S_IFREG|0444, st_size=4829, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/databases/stanchion.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=4829, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.services.stanchion;\n\nin\n\n{\n\n ###### interface\n\n options = {\n\n services.stanchion = {\n\n enable = mkEnableOption \"stanchion\";\n\n package = mkOption {\n type = types.package;\n default = pkgs.stanchion;\n defaul"..., 4829) = 4829
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/databases/virtuoso.nix", {st_mode=S_IFREG|0444, st_size=2367, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/databases/virtuoso.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=2367, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\nlet\n cfg = config.services.virtuoso;\n virtuosoUser = \"virtuoso\";\n stateDir = \"/var/lib/virtuoso\";\nin\nwith lib;\n{\n\n ###### interface\n\n options = {\n\n services.virtuoso = {\n\n enable = mkOption {\n default = false;\n description = \"Whether to enable V"..., 2367) = 2367
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/desktops/accountsservice.nix", {st_mode=S_IFREG|0444, st_size=872, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/desktops/accountsservice.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=872, ...}) = 0
read(3, "# AccountsService daemon.\n\n{ config, lib, pkgs, ... }:\n\nwith lib;\n\n{\n\n ###### interface\n\n options = {\n\n services.accounts-daemon = {\n\n enable = mkOption {\n type = types.bool;\n default = false;\n description = ''\n Whether to enable AccountsService, a DBus servic"..., 872) = 872
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/desktops/dleyna-renderer.nix", {st_mode=S_IFREG|0444, st_size=583, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/desktops/dleyna-renderer.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=583, ...}) = 0
read(3, "# dleyna-renderer service.\n{ config, lib, pkgs, ... }:\n\nwith lib;\n\n{\n ###### interface\n options = {\n services.dleyna-renderer = {\n enable = mkOption {\n type = types.bool;\n default = false;\n description = ''\n Whether to enable dleyna-renderer service, a DBus se"..., 583) = 583
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/desktops/dleyna-server.nix", {st_mode=S_IFREG|0444, st_size=569, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/desktops/dleyna-server.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=569, ...}) = 0
read(3, "# dleyna-server service.\n{ config, lib, pkgs, ... }:\n\nwith lib;\n\n{\n ###### interface\n options = {\n services.dleyna-server = {\n enable = mkOption {\n type = types.bool;\n default = false;\n description = ''\n Whether to enable dleyna-server service, a DBus service\n"..., 569) = 569
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/desktops/geoclue2.nix", {st_mode=S_IFREG|0444, st_size=616, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/desktops/geoclue2.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=616, ...}) = 0
read(3, "# GeoClue 2 daemon.\n\n{ config, lib, pkgs, ... }:\n\nwith lib;\n\n{\n\n ###### interface\n\n options = {\n\n services.geoclue2 = {\n\n enable = mkOption {\n type = types.bool;\n default = false;\n description = ''\n Whether to enable GeoClue 2 daemon, a DBus service\n "..., 616) = 616
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/desktops/pipewire.nix", {st_mode=S_IFREG|0444, st_size=418, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/desktops/pipewire.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=418, ...}) = 0
read(3, "# pipewire service.\n{ config, lib, pkgs, ... }:\n\nwith lib;\n\n{\n ###### interface\n options = {\n services.pipewire = {\n enable = mkEnableOption \"pipewire service\";\n };\n };\n\n\n ###### implementation\n config = mkIf config.services.pipewire.enable {\n environment.systemPackages = [ pkgs.p"..., 418) = 418
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/desktops/gnome3/at-spi2-core.nix", {st_mode=S_IFREG|0444, st_size=795, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/desktops/gnome3/at-spi2-core.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=795, ...}) = 0
read(3, "# at-spi2-core daemon.\n\n{ config, lib, pkgs, ... }:\n\nwith lib;\n\n{\n\n ###### interface\n\n options = {\n\n services.gnome3.at-spi2-core = {\n\n enable = mkOption {\n type = types.bool;\n default = false;\n description = ''\n Whether to enable at-spi2-core, a service for t"..., 795) = 795
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/desktops/gnome3/chrome-gnome-shell.nix", {st_mode=S_IFREG|0444, st_size=953, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/desktops/gnome3/chrome-gnome-shell.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=953, ...}) = 0
read(3, "# Chrome GNOME Shell native host connector.\n{ config, lib, pkgs, ... }:\n\nwith lib;\n\n{\n ###### interface\n options = {\n services.gnome3.chrome-gnome-shell.enable = mkEnableOption ''\n Chrome GNOME Shell native host connector, a DBus service\n allowing to install GNOME Shell extensions fro"..., 953) = 953
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/desktops/gnome3/evolution-data-server.nix", {st_mode=S_IFREG|0444, st_size=734, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/desktops/gnome3/evolution-data-server.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=734, ...}) = 0
read(3, "# Evolution Data Server daemon.\n\n{ config, lib, pkgs, ... }:\n\nwith lib;\n\n{\n\n ###### interface\n\n options = {\n\n services.gnome3.evolution-data-server = {\n\n enable = mkOption {\n type = types.bool;\n default = false;\n description = ''\n Whether to enable Evolution D"..., 734) = 734
close(3) = 0
brk(0x18ee1000) = 0x18ee1000
brk(0x18edf000) = 0x18edf000
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/desktops/gnome3/gnome-disks.nix", {st_mode=S_IFREG|0444, st_size=622, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/desktops/gnome3/gnome-disks.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=622, ...}) = 0
read(3, "# GNOME Disks daemon.\n\n{ config, pkgs, lib, ... }:\n\nwith lib;\n\n{\n\n ###### interface\n\n options = {\n\n services.gnome3.gnome-disks = {\n\n enable = mkOption {\n type = types.bool;\n default = false;\n description = ''\n Whether to enable GNOME Disks daemon, a service d"..., 622) = 622
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/desktops/gnome3/gnome-documents.nix", {st_mode=S_IFREG|0444, st_size=734, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/desktops/gnome3/gnome-documents.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=734, ...}) = 0
read(3, "# GNOME Documents daemon.\n\n{ config, pkgs, lib, ... }:\n\nwith lib;\n\n{\n\n ###### interface\n\n options = {\n\n services.gnome3.gnome-documents = {\n\n enable = mkOption {\n type = types.bool;\n default = false;\n description = ''\n Whether to enable GNOME Documents service"..., 734) = 734
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/desktops/gnome3/gnome-keyring.nix", {st_mode=S_IFREG|0444, st_size=692, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/desktops/gnome3/gnome-keyring.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=692, ...}) = 0
read(3, "# GNOME Keyring daemon.\n\n{ config, pkgs, lib, ... }:\n\nwith lib;\n\n{\n\n ###### interface\n\n options = {\n\n services.gnome3.gnome-keyring = {\n\n enable = mkOption {\n type = types.bool;\n default = false;\n description = ''\n Whether to enable GNOME Keyring daemon, a ser"..., 692) = 692
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/desktops/gnome3/gnome-online-accounts.nix", {st_mode=S_IFREG|0444, st_size=686, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/desktops/gnome3/gnome-online-accounts.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=686, ...}) = 0
read(3, "# GNOME Online Accounts daemon.\n\n{ config, pkgs, lib, ... }:\n\nwith lib;\n\n{\n\n ###### interface\n\n options = {\n\n services.gnome3.gnome-online-accounts = {\n\n enable = mkOption {\n type = types.bool;\n default = false;\n description = ''\n Whether to enable GNOME Onlin"..., 686) = 686
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/desktops/gnome3/gnome-online-miners.nix", {st_mode=S_IFREG|0444, st_size=644, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/desktops/gnome3/gnome-online-miners.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=644, ...}) = 0
read(3, "# GNOME Online Miners daemon.\n\n{ config, pkgs, lib, ... }:\n\nwith lib;\n\n{\n\n ###### interface\n\n options = {\n\n services.gnome3.gnome-online-miners = {\n\n enable = mkOption {\n type = types.bool;\n default = false;\n description = ''\n Whether to enable GNOME Online Mi"..., 644) = 644
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/desktops/gnome3/gnome-terminal-server.nix", {st_mode=S_IFREG|0444, st_size=676, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/desktops/gnome3/gnome-terminal-server.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=676, ...}) = 0
read(3, "# GNOME Documents daemon.\n\n{ config, pkgs, lib, ... }:\n\nwith lib;\n\n{\n\n ###### interface\n\n options = {\n\n services.gnome3.gnome-terminal-server = {\n\n enable = mkOption {\n type = types.bool;\n default = false;\n description = ''\n Whether to enable GNOME Terminal se"..., 676) = 676
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/desktops/gnome3/gnome-user-share.nix", {st_mode=S_IFREG|0444, st_size=896, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/desktops/gnome3/gnome-user-share.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=896, ...}) = 0
read(3, "# GNOME User Share daemon.\n\n{ config, pkgs, lib, ... }:\n\nwith lib;\n\n{\n\n ###### interface\n\n options = {\n\n services.gnome3.gnome-user-share = {\n\n enable = mkOption {\n type = types.bool;\n default = false;\n description = ''\n Whether to enable GNOME User Share, a s"..., 896) = 896
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/desktops/gnome3/gpaste.nix", {st_mode=S_IFREG|0444, st_size=641, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/desktops/gnome3/gpaste.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=641, ...}) = 0
read(3, "# GPaste daemon.\n{ config, lib, pkgs, ... }:\n\nwith lib;\n\n{\n ###### interface\n options = {\n services.gnome3.gpaste = {\n enable = mkOption {\n type = types.bool;\n default = false;\n description = ''\n Whether to enable GPaste, a clipboard manager.\n '';\n "..., 641) = 641
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/desktops/gnome3/gvfs.nix", {st_mode=S_IFREG|0444, st_size=675, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/desktops/gnome3/gvfs.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=675, ...}) = 0
read(3, "# gvfs backends\n\n{ config, lib, pkgs, ... }:\n\nwith lib;\n\n{\n\n ###### interface\n\n options = {\n\n services.gnome3.gvfs = {\n\n enable = mkOption {\n type = types.bool;\n default = false;\n description = ''\n Whether to enable gvfs backends, userspace virtual filesystem "..., 675) = 675
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/desktops/gnome3/seahorse.nix", {st_mode=S_IFREG|0444, st_size=569, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/desktops/gnome3/seahorse.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=569, ...}) = 0
read(3, "# Seahorse daemon.\n\n{ config, pkgs, lib, ... }:\n\nwith lib;\n\n{\n\n ###### interface\n\n options = {\n\n services.gnome3.seahorse = {\n\n enable = mkOption {\n type = types.bool;\n default = false;\n description = ''\n Whether to enable Seahorse search provider for the GNOM"..., 569) = 569
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/desktops/gnome3/sushi.nix", {st_mode=S_IFREG|0444, st_size=537, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/desktops/gnome3/sushi.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=537, ...}) = 0
read(3, "# GNOME Sushi daemon.\n\n{ config, lib, pkgs, ... }:\n\nwith lib;\n\n{\n\n ###### interface\n\n options = {\n\n services.gnome3.sushi = {\n\n enable = mkOption {\n type = types.bool;\n default = false;\n description = ''\n Whether to enable Sushi, a quick previewer for nautilus"..., 537) = 537
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/desktops/gnome3/tracker.nix", {st_mode=S_IFREG|0444, st_size=637, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/desktops/gnome3/tracker.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=637, ...}) = 0
read(3, "# Tracker daemon.\n\n{ config, pkgs, lib, ... }:\n\nwith lib;\n\n{\n\n ###### interface\n\n options = {\n\n services.gnome3.tracker = {\n\n enable = mkOption {\n type = types.bool;\n default = false;\n description = ''\n Whether to enable Tracker services, a search engine,\n "..., 637) = 637
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/desktops/gnome3/tracker-miners.nix", {st_mode=S_IFREG|0444, st_size=693, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/desktops/gnome3/tracker-miners.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=693, ...}) = 0
read(3, "# Tracker Miners daemons.\n\n{ config, pkgs, lib, ... }:\n\nwith lib;\n\n{\n\n ###### interface\n\n options = {\n\n services.gnome3.tracker-miners = {\n\n enable = mkOption {\n type = types.bool;\n default = false;\n description = ''\n Whether to enable Tracker miners, indexing"..., 693) = 693
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/desktops/profile-sync-daemon.nix", {st_mode=S_IFREG|0444, st_size=3768, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/desktops/profile-sync-daemon.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=3768, ...}) = 0
read(3, "{ config, pkgs, lib, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.psd;\n\n configFile = ''\n ${optionalString (cfg.users != [ ]) ''\n USERS=\"${concatStringsSep \" \" cfg.users}\"\n ''}\n\n ${optionalString (cfg.browsers != [ ]) ''\n BROWSERS=\"${concatStringsSep \" \" cfg.browsers}\"\n ''}\n"..., 3768) = 3768
close(3) = 0
brk(0x18f00000) = 0x18f00000
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/desktops/telepathy.nix", {st_mode=S_IFREG|0444, st_size=642, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/desktops/telepathy.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=642, ...}) = 0
read(3, "# Telepathy daemon.\n\n{ config, lib, pkgs, ... }:\n\nwith lib;\n\n{\n\n ###### interface\n\n options = {\n\n services.telepathy = {\n\n enable = mkOption {\n type = types.bool;\n default = false;\n description = ''\n Whether to enable Telepathy service, a communications framew"..., 642) = 642
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/development/hoogle.nix", {st_mode=S_IFREG|0444, st_size=1573, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/development/hoogle.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=1573, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.services.hoogle;\n\n hoogleEnv = pkgs.buildEnv {\n name = \"hoogle\";\n paths = [ (cfg.haskellPackages.ghcWithHoogle cfg.packages) ];\n };\n\nin {\n\n options.services.hoogle = {\n enable = mkEnableOption \"Haskell documentation server\";\n\n "..., 1573) = 1573
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/editors/emacs.nix", {st_mode=S_IFREG|0444, st_size=2619, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/editors/emacs.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=2619, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.services.emacs;\n\n editorScript = pkgs.writeScriptBin \"emacseditor\" ''\n #!${pkgs.stdenv.shell}\n if [ -z \"$1\" ]; then\n exec ${cfg.package}/bin/emacsclient --create-frame --alternate-editor ${cfg.package}/bin/emacs\n else\n e"..., 2619) = 2619
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/editors/infinoted.nix", {st_mode=S_IFREG|0444, st_size=4262, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/editors/infinoted.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=4262, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.infinoted;\nin {\n options.services.infinoted = {\n enable = mkEnableOption \"infinoted\";\n\n package = mkOption {\n type = types.package;\n default = pkgs.libinfinity.override { daemon = true; };\n defaultText = \"pkgs."..., 4262) = 4262
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/games/factorio.nix", {st_mode=S_IFREG|0444, st_size=7013, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/games/factorio.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=7013, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.factorio;\n factorio = pkgs.factorio-headless;\n name = \"Factorio\";\n stateDir = cfg.stateDir;\n mkSavePath = name: \"${stateDir}/saves/${name}.zip\";\n configFile = pkgs.writeText \"factorio.conf\" ''\n use-system-read-write-data-dir"..., 7013) = 7013
brk(0x18f21000) = 0x18f21000
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/games/minecraft-server.nix", {st_mode=S_IFREG|0444, st_size=1886, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/games/minecraft-server.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=1886, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.minecraft-server;\nin\n{\n options = {\n services.minecraft-server = {\n\n enable = mkOption {\n type = types.bool;\n default = false;\n description = ''\n If enabled, start a Minecraft Server. The liste"..., 1886) = 1886
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/games/minetest-server.nix", {st_mode=S_IFREG|0444, st_size=2700, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/games/minetest-server.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=2700, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.minetest-server;\n flag = val: name: if val != null then \"--${name} ${val} \" else \"\";\n flags = [ \n (flag cfg.gameId \"gameid\") \n (flag cfg.world \"world\") \n (flag cfg.configPath \"config\") \n (flag cfg.logPath \"logfile\")"..., 2700) = 2700
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/games/terraria.nix", {st_mode=S_IFREG|0444, st_size=4354, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/games/terraria.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=4354, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.terraria;\n worldSizeMap = { \"small\" = 1; \"medium\" = 2; \"large\" = 3; };\n valFlag = name: val: optionalString (val != null) \"-${name} \\\"${escape [\"\\\\\" \"\\\"\"] (toString val)}\\\"\";\n boolFlag = name: val: optionalString val \"-${name}\""..., 4354) = 4354
close(3) = 0
brk(0x18f42000) = 0x18f42000
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/hardware/acpid.nix", {st_mode=S_IFREG|0444, st_size=3577, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/hardware/acpid.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=3577, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n canonicalHandlers = {\n powerEvent = {\n event = \"button/power.*\";\n action = config.services.acpid.powerEventCommands;\n };\n\n lidEvent = {\n event = \"button/lid.*\";\n action = config.services.acpid.lidEventCommands;\n };\n\n a"..., 3577) = 3577
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/hardware/actkbd.nix", {st_mode=S_IFREG|0444, st_size=3299, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/hardware/actkbd.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=3299, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.services.actkbd;\n\n configFile = pkgs.writeText \"actkbd.conf\" ''\n ${concatMapStringsSep \"\\n\"\n ({ keys, events, attributes, command, ... }:\n ''${concatMapStringsSep \"+\" toString keys}:${concatStringsSep \",\" events}:${concatStr"..., 3299) = 3299
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/hardware/bluetooth.nix", {st_mode=S_IFREG|0444, st_size=1627, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/hardware/bluetooth.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=1627, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n bluez-bluetooth = pkgs.bluez;\n cfg = config.hardware.bluetooth;\n\nin {\n\n ###### interface\n\n options = {\n\n hardware.bluetooth = {\n enable = mkEnableOption \"support for Bluetooth.\";\n\n powerOnBoot = mkOption {\n type = types.bool;\n "..., 1627) = 1627
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/hardware/brltty.nix", {st_mode=S_IFREG|0444, st_size=1147, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/hardware/brltty.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=1147, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.brltty;\n\nin {\n\n options = {\n\n services.brltty.enable = mkOption {\n type = types.bool;\n default = false;\n description = \"Whether to enable the BRLTTY daemon.\";\n };\n\n };\n\n config = mkIf cfg.enable {\n\n system"..., 1147) = 1147
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/hardware/freefall.nix", {st_mode=S_IFREG|0444, st_size=1332, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/hardware/freefall.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=1332, ...}) = 0
read(3, "{ config, lib, pkgs, utils, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.services.freefall;\n\nin {\n\n options.services.freefall = {\n\n enable = mkOption {\n type = types.bool;\n default = false;\n description = ''\n Whether to protect HP/Dell laptop hard drives (not SSDs) in free fall.\n"..., 1332) = 1332
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/hardware/fwupd.nix", {st_mode=S_IFREG|0444, st_size=2838, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/hardware/fwupd.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=2838, ...}) = 0
read(3, "# fwupd daemon.\n\n{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.fwupd;\n originalEtc =\n let\n isRegular = v: v == \"regular\";\n listFiles = d: builtins.attrNames (filterAttrs (const isRegular) (builtins.readDir d));\n copiedDirs = [ \"fwupd/remotes.d\" \"pki/fwupd\" \"p"..., 2838) = 2838
close(3) = 0
brk(0x18f65000) = 0x18f65000
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/hardware/illum.nix", {st_mode=S_IFREG|0444, st_size=583, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/hardware/illum.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=583, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.illum;\nin {\n\n options = {\n\n services.illum = {\n\n enable = mkOption {\n default = false;\n type = types.bool;\n description = ''\n Enable illum, a daemon for controlling screen brightness with brigh"..., 583) = 583
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/hardware/interception-tools.nix", {st_mode=S_IFREG|0444, st_size=1700, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/hardware/interception-tools.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=1700, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.interception-tools;\nin {\n options.services.interception-tools = {\n enable = mkOption {\n type = types.bool;\n default = false;\n description = \"Whether to enable the interception tools service.\";\n };\n\n plugins "..., 1700) = 1700
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/hardware/irqbalance.nix", {st_mode=S_IFREG|0444, st_size=545, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/hardware/irqbalance.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=545, ...}) = 0
read(3, "#\n{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.services.irqbalance;\n\nin\n{\n options.services.irqbalance.enable = mkEnableOption \"irqbalance daemon\";\n\n config = mkIf cfg.enable {\n\n systemd.services = {\n irqbalance = {\n description = \"irqbalance daemon\";\n path = ["..., 545) = 545
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/hardware/nvidia-optimus.nix", {st_mode=S_IFREG|0444, st_size=1029, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/hardware/nvidia-optimus.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=1029, ...}) = 0
read(3, "{ config, pkgs, lib, ... }:\n\nlet kernel = config.boot.kernelPackages; in\n\n{\n\n ###### interface\n\n options = {\n\n hardware.nvidiaOptimus.disable = lib.mkOption {\n default = false;\n type = lib.types.bool;\n description = ''\n Completely disable the NVIDIA graphics card and use t"..., 1029) = 1029
close(3) = 0
brk(0x18f75000) = 0x18f75000
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/hardware/pcscd.nix", {st_mode=S_IFREG|0444, st_size=1785, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/hardware/pcscd.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=1785, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfgFile = pkgs.writeText \"reader.conf\" config.services.pcscd.readerConfig;\n\n pluginEnv = pkgs.buildEnv {\n name = \"pcscd-plugins\";\n paths = map (p: \"${p}/pcsc/drivers\") config.services.pcscd.plugins;\n };\n\nin {\n\n ###### interface\n\n options = {\n\n "..., 1785) = 1785
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/hardware/pommed.nix", {st_mode=S_IFREG|0444, st_size=1318, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/hardware/pommed.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=1318, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet cfg = config.services.hardware.pommed;\n defaultConf = \"${pkgs.pommed_light}/etc/pommed.conf.mactel\";\nin {\n\n options = {\n\n services.hardware.pommed = {\n\n enable = mkOption {\n type = types.bool;\n default = false;\n description"..., 1318) = 1318
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/hardware/sane.nix", {st_mode=S_IFREG|0444, st_size=4111, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/hardware/sane.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=4111, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n pkg = if config.hardware.sane.snapshot\n then pkgs.sane-backends-git\n else pkgs.sane-backends;\n\n sanedConf = pkgs.writeTextFile {\n name = \"saned.conf\";\n destination = \"/etc/sane.d/saned.conf\";\n text = ''\n localhost\n ${config.ser"..., 4111) = 4111
close(3) = 0
brk(0x18f96000) = 0x18f96000
brk(0x18f97000) = 0x18f97000
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/hardware/sane_extra_backends/brscan4.nix", {st_mode=S_IFREG|0444, st_size=2762, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/hardware/sane_extra_backends/brscan4.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=2762, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.hardware.sane.brscan4;\n\n netDeviceList = attrValues cfg.netDevices;\n\n etcFiles = pkgs.callPackage ./brscan4_etc_files.nix { netDevices = netDeviceList; };\n\n netDeviceOpts = { name, config, ... }: {\n\n options = {\n\n name = mkOption "..., 2762) = 2762
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/hardware/tcsd.nix", {st_mode=S_IFREG|0444, st_size=4467, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/hardware/tcsd.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=4467, ...}) = 0
read(3, "# tcsd daemon.\n\n{ config, pkgs, lib, ... }:\n\nwith lib;\nlet\n\n cfg = config.services.tcsd;\n\n tcsdConf = pkgs.writeText \"tcsd.conf\" ''\n port = 30003\n num_threads = 10\n system_ps_file = ${cfg.stateDir}/system.data\n # This is the log of each individual measurement done by the system.\n # "..., 4467) = 4467
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/hardware/tlp.nix", {st_mode=S_IFREG|0444, st_size=2509, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/hardware/tlp.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=2509, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\ncfg = config.services.tlp;\n\nenableRDW = config.networking.networkmanager.enable;\n\ntlp = pkgs.tlp.override {\n inherit enableRDW;\n};\n\n# XXX: We can't use writeTextFile + readFile here because it triggers\n# TLP build to get the .drv (even on --dry-run).\ncon"..., 2509) = 2509
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/hardware/thinkfan.nix", {st_mode=S_IFREG|0444, st_size=3008, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/hardware/thinkfan.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=3008, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.services.thinkfan;\n configFile = pkgs.writeText \"thinkfan.conf\" ''\n # ATTENTION: There is only very basic sanity checking on the configuration.\n # That means you can set your temperature limits as insane as you like. You\n # can do"..., 3008) = 3008
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/hardware/trezord.nix", {st_mode=S_IFREG|0444, st_size=1330, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/hardware/trezord.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=1330, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\nlet\n cfg = config.services.trezord;\nin {\n \n ### interface\n\n options = {\n services.trezord = {\n enable = mkOption {\n type = types.bool;\n default = false;\n description = ''\n Enable Trezor bridge daemon, for use with Trezo"..., 1330) = 1330
close(3) = 0
brk(0x18fb8000) = 0x18fb8000
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/hardware/u2f.nix", {st_mode=S_IFREG|0444, st_size=376, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/hardware/u2f.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=376, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\nlet\n cfg = config.hardware.u2f;\nin {\n options = {\n hardware.u2f = {\n enable = mkOption {\n type = types.bool;\n default = false;\n description = ''\n Enable U2F hardware support.\n '';\n };\n };\n };\n\n config = m"..., 376) = 376
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/hardware/udev.nix", {st_mode=S_IFREG|0444, st_size=10256, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/hardware/udev.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=10256, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n inherit (pkgs) stdenv writeText procps;\n\n udev = config.systemd.package;\n\n cfg = config.services.udev;\n\n extraUdevRules = pkgs.writeTextFile {\n name = \"extra-udev-rules\";\n text = cfg.extraRules;\n destination = \"/etc/udev/rules.d/99-local.rul"..., 10256) = 10256
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/hardware/udisks2.nix", {st_mode=S_IFREG|0444, st_size=978, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/hardware/udisks2.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=978, ...}) = 0
read(3, "# Udisks daemon.\n\n{ config, lib, pkgs, ... }:\n\nwith lib;\n\n{\n\n ###### interface\n\n options = {\n\n services.udisks2 = {\n\n enable = mkOption {\n type = types.bool;\n default = true;\n description = ''\n Whether to enable Udisks, a DBus service that allows\n app"..., 978) = 978
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/hardware/upower.nix", {st_mode=S_IFREG|0444, st_size=1651, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/hardware/upower.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=1651, ...}) = 0
read(3, "# Upower daemon.\n\n{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.upower;\nin\n{\n\n ###### interface\n\n options = {\n\n services.upower = {\n\n enable = mkOption {\n type = types.bool;\n default = false;\n description = ''\n Whether to enable Upower, a"..., 1651) = 1651
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/hardware/usbmuxd.nix", {st_mode=S_IFREG|0444, st_size=1900, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/hardware/usbmuxd.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=1900, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n defaultUserGroup = \"usbmux\";\n apple = \"05ac\";\n\n cfg = config.services.usbmuxd;\n\nin\n\n{\n options.services.usbmuxd = {\n enable = mkOption {\n type = types.bool;\n default = false;\n description = ''\n Enable the usbmuxd (\"USB multip"..., 1900) = 1900
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/hardware/thermald.nix", {st_mode=S_IFREG|0444, st_size=652, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/hardware/thermald.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=652, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.thermald;\nin {\n ###### interface\n options = { \n services.thermald = { \n enable = mkOption {\n default = false;\n description = ''\n Whether to enable thermald, the temperature management daemon.\n "..., 652) = 652
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/logging/SystemdJournal2Gelf.nix", {st_mode=S_IFREG|0444, st_size=1449, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/logging/SystemdJournal2Gelf.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=1449, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet cfg = config.services.SystemdJournal2Gelf;\nin\n\n{ options = {\n services.SystemdJournal2Gelf = {\n enable = mkOption {\n type = types.bool;\n default = false;\n description = ''\n Whether to enable SystemdJournal2Gelf.\n "..., 1449) = 1449
close(3) = 0
brk(0x18fd9000) = 0x18fd9000
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/logging/awstats.nix", {st_mode=S_IFREG|0444, st_size=4071, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/logging/awstats.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=4071, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.awstats;\n package = pkgs.awstats;\nin\n\n{\n options.services.awstats = {\n enable = mkOption {\n type = types.bool;\n default = cfg.service.enable;\n description = ''\n Enable the awstats program (but not service)"..., 4071) = 4071
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/logging/fluentd.nix", {st_mode=S_IFREG|0444, st_size=1357, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/logging/fluentd.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=1357, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.fluentd;\n\n pluginArgs = concatStringsSep \" \" (map (x: \"-p ${x}\") cfg.plugins);\nin {\n ###### interface\n\n options = {\n\n services.fluentd = {\n enable = mkOption {\n type = types.bool;\n default = false;\n d"..., 1357) = 1357
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/logging/graylog.nix", {st_mode=S_IFREG|0444, st_size=5335, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/logging/graylog.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=5335, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.graylog;\n\n confFile = pkgs.writeText \"graylog.conf\" ''\n is_master = ${boolToString cfg.isMaster}\n node_id_file = ${cfg.nodeIdFile}\n password_secret = ${cfg.passwordSecret}\n root_username = ${cfg.rootUsername}\n root_p"..., 5335) = 5335
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/logging/heartbeat.nix", {st_mode=S_IFREG|0444, st_size=1735, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/logging/heartbeat.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=1735, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.heartbeat;\n\n heartbeatYml = pkgs.writeText \"heartbeat.yml\" ''\n name: ${cfg.name}\n tags: ${builtins.toJSON cfg.tags}\n\n ${cfg.extraConfig}\n '';\n\nin\n{\n options = {\n\n services.heartbeat = {\n\n enable = mkEnableOption "..., 1735) = 1735
close(3) = 0
brk(0x18ffa000) = 0x18ffa000
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/logging/journalbeat.nix", {st_mode=S_IFREG|0444, st_size=1866, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/logging/journalbeat.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=1866, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.journalbeat;\n\n journalbeatYml = pkgs.writeText \"journalbeat.yml\" ''\n name: ${cfg.name}\n tags: ${builtins.toJSON cfg.tags}\n\n journalbeat.cursor_state_file: ${cfg.stateDir}/cursor-state\n\n ${cfg.extraConfig}\n '';\n\nin\n{\n "..., 1866) = 1866
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/logging/journalwatch.nix", {st_mode=S_IFREG|0444, st_size=8174, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/logging/journalwatch.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=8174, ...}) = 0
read(3, "{ config, lib, pkgs, services, ... }:\nwith lib;\n\nlet\n cfg = config.services.journalwatch;\n user = \"journalwatch\";\n dataDir = \"/var/lib/${user}\";\n\n journalwatchConfig = pkgs.writeText \"config\" (''\n # (File Generated by NixOS journalwatch module.)\n [DEFAULT]\n mail_binary = ${cfg.mailBinar"..., 8174) = 8174
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/logging/klogd.nix", {st_mode=S_IFREG|0444, st_size=916, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/logging/klogd.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=916, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\n{\n ###### interface\n\n options = {\n\n services.klogd.enable = mkOption {\n type = types.bool;\n default = versionOlder (getVersion config.boot.kernelPackages.kernel) \"3.5\";\n description = ''\n Whether to enable klogd, the kernel log messa"..., 916) = 916
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/logging/logcheck.nix", {st_mode=S_IFREG|0444, st_size=6419, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/logging/logcheck.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=6419, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.logcheck;\n\n defaultRules = pkgs.runCommand \"logcheck-default-rules\" {} ''\n cp -prd ${pkgs.logcheck}/etc/logcheck $out\n chmod u+w $out\n rm -r $out/logcheck.*\n '';"..., 6419) = 6419
close(3) = 0
brk(0x1901b000) = 0x1901b000
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/logging/logrotate.nix", {st_mode=S_IFREG|0444, st_size=916, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/logging/logrotate.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=916, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.logrotate;\n\n configFile = pkgs.writeText \"logrotate.conf\"\n cfg.config;\n\nin\n{\n options = {\n services.logrotate = {\n enable = mkOption {\n type = lib.types.bool;\n default = false;\n description = ''\n "..., 916) = 916
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/logging/logstash.nix", {st_mode=S_IFREG|0444, st_size=5643, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/logging/logstash.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=5643, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.logstash;\n atLeast54 = versionAtLeast (builtins.parseDrvName cfg.package.name).version \"5.4\";\n pluginPath = lib.concatStringsSep \":\" cfg.plugins;\n havePluginPath = lib.length cfg.plugins > 0;\n ops = lib.optionalString;\n verbosi"..., 5643) = 5643
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/logging/rsyslogd.nix", {st_mode=S_IFREG|0444, st_size=2450, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/logging/rsyslogd.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=2450, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.services.rsyslogd;\n\n syslogConf = pkgs.writeText \"syslog.conf\" ''\n $ModLoad imuxsock\n $SystemLogSocketName /run/systemd/journal/syslog\n $WorkDirectory /var/spool/rsyslog\n\n ${cfg.defaultConfig}\n ${cfg.extraConfig}\n '';\n\n de"..., 2450) = 2450
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/logging/syslog-ng.nix", {st_mode=S_IFREG|0444, st_size=2528, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/logging/syslog-ng.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=2528, ...}) = 0
read(3, "{ config, pkgs, lib, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.services.syslog-ng;\n\n syslogngConfig = pkgs.writeText \"syslog-ng.conf\" ''\n ${cfg.configHeader}\n ${cfg.extraConfig}\n '';\n\n ctrlSocket = \"/run/syslog-ng/syslog-ng.ctl\";\n pidFile = \"/run/syslog-ng/syslog-ng.pid\";\n persistFile = \"/va"..., 2528) = 2528
close(3) = 0
brk(0x1903c000) = 0x1903c000
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/logging/syslogd.nix", {st_mode=S_IFREG|0444, st_size=3166, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/logging/syslogd.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=3166, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.services.syslogd;\n\n syslogConf = pkgs.writeText \"syslog.conf\" ''\n ${if (cfg.tty != \"\") then \"kern.warning;*.err;authpriv.none /dev/${cfg.tty}\" else \"\"}\n ${cfg.defaultConfig}\n ${cfg.extraConfig}\n '';\n\n defaultConf = ''\n # Send"..., 3166) = 3166
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/mail/clamsmtp.nix", {st_mode=S_IFREG|0444, st_size=5592, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/mail/clamsmtp.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=5592, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\nlet\n cfg = config.services.clamsmtp;\n clamdSocket = \"/run/clamav/clamd.ctl\"; # See services/security/clamav.nix\nin\n{\n ##### interface\n options = {\n services.clamsmtp = {\n enable = mkOption {\n type = types.bool;\n default = false;\n "..., 5592) = 5592
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/mail/dkimproxy-out.nix", {st_mode=S_IFREG|0444, st_size=3332, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/mail/dkimproxy-out.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=3332, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\nlet\n cfg = config.services.dkimproxy-out;\n keydir = \"/var/lib/dkimproxy-out\";\n privkey = \"${keydir}/private.key\";\n pubkey = \"${keydir}/public.key\";\nin\n{\n ##### interface\n options = {\n services.dkimproxy-out = {\n enable = mkOption {\n type = "..., 3332) = 3332
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/mail/dovecot.nix", {st_mode=S_IFREG|0444, st_size=12006, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/mail/dovecot.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=12006, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.dovecot2;\n dovecotPkg = pkgs.dovecot;\n\n baseDir = \"/run/dovecot2\";\n stateDir = \"/var/lib/dovecot\";\n\n canCreateMailUserGroup = cfg.mailUser != null && cfg.mailGroup != null;\n\n dovecotConf = concatStrings [\n ''\n base_dir "..., 12006) = 12006
brk(0x1905d000) = 0x1905d000
close(3) = 0
brk(0x1907e000) = 0x1907e000
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/mail/dspam.nix", {st_mode=S_IFREG|0444, st_size=3948, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/mail/dspam.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=3948, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.services.dspam;\n\n dspam = pkgs.dspam;\n\n defaultSock = \"/run/dspam/dspam.sock\";\n\n cfgfile = pkgs.writeText \"dspam.conf\" ''\n Home /var/lib/dspam\n StorageDriver ${dspam}/lib/dspam/lib${cfg.storageDriver}_drv.so\n\n Trust root\n Tru"..., 3948) = 3948
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/mail/exim.nix", {st_mode=S_IFREG|0444, st_size=2623, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/mail/exim.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=2623, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nlet\n inherit (lib) mkIf mkOption singleton types;\n inherit (pkgs) coreutils exim;\n cfg = config.services.exim;\nin\n\n{\n\n ###### interface\n\n options = {\n\n services.exim = {\n\n enable = mkOption {\n type = types.bool;\n default = false;\n descri"..., 2623) = 2623
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/mail/freepops.nix", {st_mode=S_IFREG|0444, st_size=2020, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/mail/freepops.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=2020, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.mail.freepopsd;\nin\n\n{\n options = {\n services.mail.freepopsd = {\n enable = mkOption {\n default = false;\n type = with types; bool;\n description = ''\n Enables Freepops, a POP3 webmail wrapper.\n "..., 2020) = 2020
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/mail/mail.nix", {st_mode=S_IFREG|0444, st_size=491, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/mail/mail.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=491, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\n{\n\n ###### interface\n\n options = {\n\n services.mail = {\n\n sendmailSetuidWrapper = mkOption {\n default = null;\n internal = true;\n description = ''\n Configuration for the sendmail setuid wapper.\n '';\n };\n\n };"..., 491) = 491
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/mail/mailhog.nix", {st_mode=S_IFREG|0444, st_size=810, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/mail/mailhog.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=810, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.mailhog;\nin {\n ###### interface\n\n options = {\n\n services.mailhog = {\n enable = mkEnableOption \"MailHog\";\n user = mkOption {\n type = types.str;\n default = \"mailhog\";\n description = \"User account un"..., 810) = 810
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/mail/mlmmj.nix", {st_mode=S_IFREG|0444, st_size=4739, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/mail/mlmmj.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=4739, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n concatMapLines = f: l: lib.concatStringsSep \"\\n\" (map f l);\n\n cfg = config.services.mlmmj;\n stateDir = \"/var/lib/mlmmj\";\n spoolDir = \"/var/spool/mlmmj\";\n listDir = domain: list: \"${spoolDir}/${domain}/${list}\";\n listCtl = domain: list: \"${listDir d"..., 4739) = 4739
close(3) = 0
brk(0x1909f000) = 0x1909f000
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/mail/offlineimap.nix", {st_mode=S_IFREG|0444, st_size=2469, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/mail/offlineimap.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=2469, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.offlineimap;\nin {\n\n options.services.offlineimap = {\n enable = mkEnableOption \"Offlineimap, a software to dispose your mailbox(es) as a local Maildir(s).\";\n\n install = mkOption {\n type = types.bool;\n default = false"..., 2469) = 2469
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/mail/opendkim.nix", {st_mode=S_IFREG|0444, st_size=3532, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/mail/opendkim.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=3532, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.services.opendkim;\n\n defaultSock = \"local:/run/opendkim/opendkim.sock\";\n\n keyFile = \"${cfg.keyPath}/${cfg.selector}.private\";\n\n args = [ \"-f\" \"-l\"\n \"-p\" cfg.socket\n \"-d\" cfg.domains\n \"-k\" keyFile\n "..., 3532) = 3532
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/mail/opensmtpd.nix", {st_mode=S_IFREG|0444, st_size=3142, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/mail/opensmtpd.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=3142, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.services.opensmtpd;\n conf = pkgs.writeText \"smtpd.conf\" cfg.serverConfiguration;\n args = concatStringsSep \" \" cfg.extraServerArgs;\n\n sendmail = pkgs.runCommand \"opensmtpd-sendmail\" {} ''\n mkdir -p $out/bin\n ln -s ${pkgs.opensmtpd}/"..., 3142) = 3142
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/mail/pfix-srsd.nix", {st_mode=S_IFREG|0444, st_size=1584, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/mail/pfix-srsd.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=1584, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\n{\n\n ###### interface\n\n options = {\n\n services.pfix-srsd = {\n enable = mkOption {\n default = false;\n type = types.bool;\n description = \"Whether to run the postfix sender rewriting scheme daemon.\";\n };\n\n domain = mkOption"..., 1584) = 1584
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/mail/postfix.nix", {st_mode=S_IFREG|0444, st_size=27056, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/mail/postfix.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=27056, ...}) = 0
brk(0x190c5000) = 0x190c5000
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.services.postfix;\n user = cfg.user;\n group = cfg.group;\n setgidGroup = cfg.setgidGroup;\n\n haveAliases = cfg.postmasterAlias != \"\" || cfg.rootAlias != \"\"\n || cfg.extraAliases != \"\";\n haveTransport = cfg.transport !="..., 27056) = 27056
close(3) = 0
brk(0x190e6000) = 0x190e6000
brk(0x19107000) = 0x19107000
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/mail/postsrsd.nix", {st_mode=S_IFREG|0444, st_size=3525, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/mail/postsrsd.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=3525, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.services.postsrsd;\n\nin {\n\n ###### interface\n\n options = {\n\n services.postsrsd = {\n\n enable = mkOption {\n type = types.bool;\n default = false;\n description = \"Whether to enable the postsrsd SRS server for Postf"..., 3525) = 3525
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/mail/postgrey.nix", {st_mode=S_IFREG|0444, st_size=6114, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/mail/postgrey.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=6114, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib; let\n\n cfg = config.services.postgrey;\n\n natural = with types; addCheck int (x: x >= 0);\n natural' = with types; addCheck int (x: x > 0);\n\n socket = with types; addCheck (either (submodule unixSocket) (submodule inetSocket)) (x: x ? \"path\" || x ? \"port\");\n\n "..., 6114) = 6114
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/mail/spamassassin.nix", {st_mode=S_IFREG|0444, st_size=7018, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/mail/spamassassin.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=7018, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.spamassassin;\n spamassassin-local-cf = pkgs.writeText \"local.cf\" cfg.config;\n spamassassin-init-pre = pkgs.writeText \"init.pre\" cfg.initPreConf;\n\n spamdEnv = pkgs.buildEnv {\n name = \"spamd-env\";\n paths = [];\n postBuild ="..., 7018) = 7018
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/mail/rspamd.nix", {st_mode=S_IFREG|0444, st_size=10948, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/mail/rspamd.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=10948, ...}) = 0
read(3, "{ config, options, pkgs, lib, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.services.rspamd;\n opts = options.services.rspamd;\n\n bindSocketOpts = {options, config, ... }: {\n options = {\n socket = mkOption {\n type = types.str;\n example = \"localhost:11333\";\n description = ''\n "..., 10948) = 10948
brk(0x19128000) = 0x19128000
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/mail/rmilter.nix", {st_mode=S_IFREG|0444, st_size=6686, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/mail/rmilter.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=6686, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n rspamdCfg = config.services.rspamd;\n postfixCfg = config.services.postfix;\n cfg = config.services.rmilter;\n\n inetSocket = addr: port: \"inet:[${toString port}@${addr}]\";\n unixSocket = sock: \"unix:${sock}\";\n\n systemdSocket = if cfg.bindSocket.type =="..., 6686) = 6686
close(3) = 0
brk(0x19149000) = 0x19149000
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/mail/nullmailer.nix", {st_mode=S_IFREG|0444, st_size=7927, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/mail/nullmailer.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=7927, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\n{\n\n options = {\n\n services.nullmailer = {\n enable = mkOption {\n type = types.bool;\n default = false;\n description = \"Whether to enable nullmailer daemon.\";\n };\n\n user = mkOption {\n type = types.string;\n def"..., 7927) = 7927
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/misc/airsonic.nix", {st_mode=S_IFREG|0444, st_size=3314, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/misc/airsonic.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=3314, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.airsonic;\nin {\n options = {\n\n services.airsonic = {\n enable = mkEnableOption \"Airsonic, the Free and Open Source media streaming server (fork of Subsonic and Libresonic)\";\n\n user = mkOption {\n type = types.str;\n"..., 3314) = 3314
close(3) = 0
brk(0x1916a000) = 0x1916a000
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/misc/apache-kafka.nix", {st_mode=S_IFREG|0444, st_size=4256, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/misc/apache-kafka.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=4256, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.apache-kafka;\n\n serverProperties =\n if cfg.serverProperties != null then\n cfg.serverProperties\n else\n ''\n # Generated by nixos\n broker.id=${toString cfg.brokerId}\n port=${toString cfg.port}\n "..., 4256) = 4256
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/misc/autofs.nix", {st_mode=S_IFREG|0444, st_size=2629, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/misc/autofs.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=2629, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.services.autofs;\n\n autoMaster = pkgs.writeText \"auto.master\" cfg.autoMaster;\n\nin\n\n{\n\n ###### interface\n\n options = {\n\n services.autofs = {\n\n enable = mkOption {\n default = false;\n description = ''\n Mount fi"..., 2629) = 2629
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/misc/autorandr.nix", {st_mode=S_IFREG|0444, st_size=545, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/misc/autorandr.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=545, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.services.autorandr;\n\nin {\n\n options = {\n\n services.autorandr = {\n enable = mkEnableOption \"handling of hotplug and sleep events by autorandr\";\n };\n\n };\n\n config = mkIf cfg.enable {\n\n services.udev.packages = [ pkgs.autorand"..., 545) = 545
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/misc/bepasty.nix", {st_mode=S_IFREG|0444, st_size=5667, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/misc/bepasty.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=5667, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\nlet\n gunicorn = pkgs.pythonPackages.gunicorn;\n bepasty = pkgs.bepasty;\n gevent = pkgs.pythonPackages.gevent;\n python = pkgs.pythonPackages.python;\n cfg = config.services.bepasty;\n user = \"bepasty\";\n group = \"bepasty\";\n default_home = \"/var/lib/bepasty\";"..., 5667) = 5667
close(3) = 0
brk(0x1918b000) = 0x1918b000
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/misc/canto-daemon.nix", {st_mode=S_IFREG|0444, st_size=614, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/misc/canto-daemon.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=614, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\ncfg = config.services.canto-daemon;\n\nin {\n\n##### interface\n\n options = {\n\n services.canto-daemon = {\n enable = mkOption {\n type = types.bool;\n default = false;\n description = \"Whether to enable the canto RSS daemon.\";\n }"..., 614) = 614
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/misc/calibre-server.nix", {st_mode=S_IFREG|0444, st_size=1097, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/misc/calibre-server.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=1097, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.services.calibre-server;\n\nin\n\n{\n\n ###### interface\n\n options = {\n\n services.calibre-server = {\n\n enable = mkEnableOption \"calibre-server\";\n\n libraryDir = mkOption {\n description = ''\n The directory where the C"..., 1097) = 1097
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/misc/cfdyndns.nix", {st_mode=S_IFREG|0444, st_size=1594, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/misc/cfdyndns.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=1594, ...}) = 0
read(3, "{ config, pkgs, lib, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.cfdyndns;\nin\n{\n options = {\n services.cfdyndns = {\n enable = mkEnableOption \"Cloudflare Dynamic DNS Client\";\n\n email = mkOption {\n type = types.str;\n description = ''\n The email address to use to"..., 1594) = 1594
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/misc/cpuminer-cryptonight.nix", {st_mode=S_IFREG|0444, st_size=1471, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/misc/cpuminer-cryptonight.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=1471, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.cpuminer-cryptonight;\n\n json = builtins.toJSON (\n cfg // {\n enable = null;\n threads =\n if cfg.threads == 0 then null else toString cfg.threads;\n }\n );\n\n confFile = builtins.toFile \"cpuminer.json\" json;\ni"..., 1471) = 1471
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/misc/cgminer.nix", {st_mode=S_IFREG|0444, st_size=3691, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/misc/cgminer.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=3691, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.cgminer;\n\n convType = with builtins;\n v: if isBool v then boolToString v else toString v;\n mergedHwConfig =\n mapAttrsToList (n: v: ''\"${n}\": \"${(concatStringsSep \",\" (map convType v))}\"'')\n (foldAttrs (n: a: [n] ++ a) ["..., 3691) = 3691
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/misc/confd.nix", {st_mode=S_IFREG|0555, st_size=2143, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/misc/confd.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0555, st_size=2143, ...}) = 0
read(3, "{ config, pkgs, lib, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.confd;\n\n confdConfig = ''\n backend = \"${cfg.backend}\"\n confdir = \"${cfg.confDir}\"\n interval = ${toString cfg.interval}\n nodes = [ ${concatMapStringsSep \",\" (s: ''\"${s}\"'') cfg.nodes}, ]\n prefix = \"${cfg.prefix}\"\n "..., 2143) = 2143
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/misc/couchpotato.nix", {st_mode=S_IFREG|0444, st_size=1129, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/misc/couchpotato.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=1129, ...}) = 0
read(3, "{ config, pkgs, lib, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.couchpotato;\n\nin\n{\n options = {\n services.couchpotato = {\n enable = mkEnableOption \"CouchPotato Server\";\n };\n };\n\n config = mkIf cfg.enable {\n systemd.services.couchpotato = {\n description = \"CouchPotato Server"..., 1129) = 1129
close(3) = 0
brk(0x191ac000) = 0x191ac000
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/misc/devmon.nix", {st_mode=S_IFREG|0444, st_size=649, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/misc/devmon.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=649, ...}) = 0
read(3, "{ pkgs, config, lib, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.devmon;\n\nin {\n options = {\n services.devmon = {\n enable = mkOption {\n default = false;\n description = ''\n Whether to enable devmon, an automatic device mounting daemon.\n '';\n };\n };\n }"..., 649) = 649
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/misc/dictd.nix", {st_mode=S_IFREG|0444, st_size=1687, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/misc/dictd.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=1687, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.dictd;\nin\n\n{\n\n ###### interface\n\n options = {\n\n services.dictd = {\n\n enable = mkOption {\n type = types.bool;\n default = false;\n description = ''\n Whether to enable the DICT.org dictionary serv"..., 1687) = 1687
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/misc/dysnomia.nix", {st_mode=S_IFREG|0444, st_size=7279, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/misc/dysnomia.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=7279, ...}) = 0
read(3, "{pkgs, lib, config, ...}:\n\nwith lib;\n\nlet\n cfg = config.dysnomia;\n \n printProperties = properties:\n concatMapStrings (propertyName:\n let\n property = properties.\"${propertyName}\";\n in\n if isList property then \"${propertyName}=(${lib.concatMapStrings (elem: \"\\\"${toString el"..., 7279) = 7279
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/misc/disnix.nix", {st_mode=S_IFREG|0444, st_size=3352, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/misc/disnix.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=3352, ...}) = 0
read(3, "# Disnix server\n{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.services.disnix;\n\n dysnomia = pkgs.dysnomia.override (origArgs: {\n enableApacheWebApplication = config.services.httpd.enable;\n enableAxis2WebService = config.services.tomcat.axis2.enable;\n enableEjabberdDump = conf"..., 3352) = 3352
close(3) = 0
brk(0x191cd000) = 0x191cd000
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/misc/docker-registry.nix", {st_mode=S_IFREG|0444, st_size=1650, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/misc/docker-registry.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=1650, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.dockerRegistry;\n\nin {\n options.services.dockerRegistry = {\n enable = mkEnableOption \"Docker Registry\";\n\n listenAddress = mkOption {\n description = \"Docker registry host or ip to bind to.\";\n default = \"127.0.0.1\";\n "..., 1650) = 1650
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/misc/emby.nix", {st_mode=S_IFREG|0444, st_size=1622, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/misc/emby.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=1622, ...}) = 0
read(3, "{ config, pkgs, lib, mono, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.emby;\n emby = pkgs.emby;\nin\n{\n options = {\n services.emby = {\n enable = mkEnableOption \"Emby Media Server\";\n\n user = mkOption {\n type = types.str;\n default = \"emby\";\n description = \"User acc"..., 1622) = 1622
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/misc/errbot.nix", {st_mode=S_IFREG|0444, st_size=2828, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/misc/errbot.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=2828, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.errbot;\n pluginEnv = plugins: pkgs.buildEnv {\n name = \"errbot-plugins\";\n paths = plugins;\n };\n mkConfigDir = instanceCfg: dataDir: pkgs.writeTextDir \"config.py\" ''\n import logging\n BACKEND = '${instanceCfg.backend}'\n "..., 2828) = 2828
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/misc/etcd.nix", {st_mode=S_IFREG|0444, st_size=5980, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/misc/etcd.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=5980, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.etcd;\n\nin {\n\n options.services.etcd = {\n enable = mkOption {\n description = \"Whether to enable etcd.\";\n default = false;\n type = types.bool;\n };\n\n name = mkOption {\n description = \"Etcd unique node name"..., 5980) = 5980
close(3) = 0
brk(0x191ee000) = 0x191ee000
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/misc/exhibitor.nix", {st_mode=S_IFREG|0444, st_size=14256, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/misc/exhibitor.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=14256, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.exhibitor;\n exhibitor = cfg.package;\n exhibitorConfig = ''\n zookeeper-install-directory=${cfg.baseDir}/zookeeper\n zookeeper-data-directory=${cfg.zkDataDir}\n zookeeper-log-directory=${cfg.zkLogDir}\n zoo-cfg-extra=${cfg."..., 14256) = 14256
close(3) = 0
brk(0x1920f000) = 0x1920f000
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/misc/felix.nix", {st_mode=S_IFREG|0444, st_size=2424, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/misc/felix.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=2424, ...}) = 0
read(3, "# Felix server\n{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.services.felix;\n\nin\n\n{\n\n ###### interface\n\n options = {\n\n services.felix = {\n\n enable = mkOption {\n default = false;\n description = \"Whether to enable the Apache Felix OSGi service\";\n };\n\n bu"..., 2424) = 2424
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/misc/folding-at-home.nix", {st_mode=S_IFREG|0444, st_size=1516, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/misc/folding-at-home.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=1516, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\nwith lib;\nlet\n stateDir = \"/var/lib/foldingathome\";\n cfg = config.services.foldingAtHome;\n fahUser = \"foldingathome\";\nin {\n\n ###### interface\n\n options = {\n\n services.foldingAtHome = {\n\n enable = mkOption {\n default = false;\n description = ''\n "..., 1516) = 1516
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/misc/fstrim.nix", {st_mode=S_IFREG|0444, st_size=919, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/misc/fstrim.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=919, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.services.fstrim;\n\nin {\n\n options = {\n\n services.fstrim = {\n enable = mkEnableOption \"periodic SSD TRIM of mounted partitions in background\";\n\n interval = mkOption {\n type = types.string;\n default = \"weekly\";\n "..., 919) = 919
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/misc/gammu-smsd.nix", {st_mode=S_IFREG|0444, st_size=7774, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/misc/gammu-smsd.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=7774, ...}) = 0
read(3, "{ pkgs, lib, config, ... }:\n\nwith lib;\nlet\n cfg = config.services.gammu-smsd;\n\n configFile = pkgs.writeText \"gammu-smsd.conf\" ''\n [gammu]\n Device = ${cfg.device.path}\n Connection = ${cfg.device.connection}\n SynchronizeTime = ${if cfg.device.synchronizeTime then \"yes\" else \"no\"}\n Log"..., 7774) = 7774
close(3) = 0
brk(0x19230000) = 0x19230000
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/misc/geoip-updater.nix", {st_mode=S_IFREG|0444, st_size=9016, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/misc/geoip-updater.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=9016, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.geoip-updater;\n\n dbBaseUrl = \"https://geolite.maxmind.com/download/geoip/database\";\n\n randomizedTimerDelaySec = \"3600\";\n\n # Use writeScriptBin instead of writeScript, so that argv[0] (logged to the\n # journal) doesn't include th"..., 9016) = 9016
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/misc/gitea.nix", {st_mode=S_IFREG|0444, st_size=7586, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/misc/gitea.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=7586, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.gitea;\n configFile = pkgs.writeText \"app.ini\" ''\n APP_NAME = ${cfg.appName}\n RUN_USER = ${cfg.user}\n RUN_MODE = prod\n\n [database]\n DB_TYPE = ${cfg.database.type}\n HOST = ${cfg.database.host}:${toString cfg.databas"..., 7586) = 7586
close(3) = 0
brk(0x19251000) = 0x19251000
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/misc/gitlab.nix", {st_mode=S_IFREG|0444, st_size=22698, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/misc/gitlab.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=22698, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\n# TODO: support non-postgresql\n\nwith lib;\n\nlet\n cfg = config.services.gitlab;\n\n ruby = cfg.packages.gitlab.ruby;\n bundler = pkgs.bundler;\n\n gemHome = \"${cfg.packages.gitlab.rubyEnv}/${ruby.gemPath}\";\n\n gitlabSocket = \"${cfg.statePath}/tmp/sockets/gitlab.socket\";\n g"..., 22698) = 22698
close(3) = 0
brk(0x19272000) = 0x19272000
brk(0x19293000) = 0x19293000
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/misc/gitolite.nix", {st_mode=S_IFREG|0444, st_size=7676, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/misc/gitolite.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=7676, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.gitolite;\n # Use writeTextDir to not leak Nix store hash into file name\n pubkeyFile = (pkgs.writeTextDir \"gitolite-admin.pub\" cfg.adminPubkey) + \"/gitolite-admin.pub\";\n hooks = lib.concatMapStrings (hook: \"${hook} \") cfg.commonHo"..., 7676) = 7676
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/misc/gogs.nix", {st_mode=S_IFREG|0444, st_size=7708, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/misc/gogs.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=7708, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.gogs;\n configFile = pkgs.writeText \"app.ini\" ''\n APP_NAME = ${cfg.appName}\n RUN_USER = ${cfg.user}\n RUN_MODE = prod\n\n [database]\n DB_TYPE = ${cfg.database.type}\n HOST = ${cfg.database.host}:${toString cfg.database"..., 7708) = 7708
close(3) = 0
brk(0x192b4000) = 0x192b4000
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/misc/gollum.nix", {st_mode=S_IFREG|0444, st_size=2946, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/misc/gollum.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=2946, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.gollum;\nin\n\n{\n options.services.gollum = {\n enable = mkOption {\n type = types.bool;\n default = false;\n description = \"Enable the Gollum service.\";\n };\n\n address = mkOption {\n type = types.str;\n def"..., 2946) = 2946
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/misc/gpsd.nix", {st_mode=S_IFREG|0444, st_size=2659, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/misc/gpsd.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=2659, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n uid = config.ids.uids.gpsd;\n gid = config.ids.gids.gpsd;\n cfg = config.services.gpsd;\n\nin\n\n{\n\n ###### interface\n\n options = {\n\n services.gpsd = {\n\n enable = mkOption {\n type = types.bool;\n default = false;\n description ="..., 2659) = 2659
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/misc/home-assistant.nix", {st_mode=S_IFREG|0444, st_size=4183, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/misc/home-assistant.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=4183, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.home-assistant;\n\n configFile = pkgs.writeText \"configuration.yaml\" (builtins.toJSON cfg.config);\n\n availableComponents = pkgs.home-assistant.availableComponents;\n\n # Given component \"parentConfig.platform\", returns whether config"..., 4183) = 4183
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/misc/ihaskell.nix", {st_mode=S_IFREG|0444, st_size=1561, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/misc/ihaskell.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=1561, ...}) = 0
read(3, "{ pkgs, lib, config, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.services.ihaskell;\n ihaskell = pkgs.ihaskell.override {\n packages = self: cfg.extraPackages self;\n };\n\nin\n\n{\n options = {\n services.ihaskell = {\n enable = mkOption {\n default = false;\n description = \"Autostart an"..., 1561) = 1561
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/misc/irkerd.nix", {st_mode=S_IFREG|0444, st_size=1744, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/misc/irkerd.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=1744, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.irkerd;\n ports = [ 6659 ];\nin\n{\n options.services.irkerd = {\n enable = mkOption {\n description = \"Whether to enable irker, an IRC notification daemon.\";\n default = false;\n type = types.bool;\n };\n\n openPorts"..., 1744) = 1744
close(3) = 0
brk(0x192d5000) = 0x192d5000
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/misc/jackett.nix", {st_mode=S_IFREG|0444, st_size=1072, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/misc/jackett.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=1072, ...}) = 0
read(3, "{ config, pkgs, lib, mono, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.jackett;\nin\n{\n options = {\n services.jackett = {\n enable = mkEnableOption \"Jackett\";\n };\n };\n\n config = mkIf cfg.enable {\n systemd.services.jackett = {\n description = \"Jackett\";\n after = [ \"network.t"..., 1072) = 1072
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/misc/logkeys.nix", {st_mode=S_IFREG|0444, st_size=498, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/misc/logkeys.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=498, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.logkeys;\nin {\n options.services.logkeys = {\n enable = mkEnableOption \"logkeys service\";\n };\n\n config = mkIf cfg.enable {\n systemd.services.logkeys = {\n description = \"LogKeys Keylogger Daemon\";\n wantedBy = [ \"mult"..., 498) = 498
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/misc/leaps.nix", {st_mode=S_IFREG|0444, st_size=1571, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/misc/leaps.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=1571, ...}) = 0
read(3, "{ config, pkgs, lib, ... } @ args:\n\nwith lib;\n\nlet\n cfg = config.services.leaps;\n stateDir = \"/var/lib/leaps/\";\nin\n{\n options = {\n services.leaps = {\n enable = mkEnableOption \"leaps\";\n port = mkOption {\n type = types.int;\n default = 8080;\n description = \"A port w"..., 1571) = 1571
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/misc/mantisbt.nix", {st_mode=S_IFREG|0444, st_size=1862, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/misc/mantisbt.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=1862, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\nlet\n cfg = config.services.mantisbt;\n\n freshInstall = cfg.extraConfig == \"\";\n\n # combined code+config directory\n mantisbt = let\n config_inc = pkgs.writeText \"config_inc.php\" (\"<?php\\n\" + cfg.extraConfig);\n src = pkgs.fetchurl {\n url = \"mirror://s"..., 1862) = 1862
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/misc/mathics.nix", {st_mode=S_IFREG|0444, st_size=1317, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/misc/mathics.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=1317, ...}) = 0
read(3, "{ pkgs, lib, config, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.mathics;\n\nin {\n options = {\n services.mathics = {\n enable = mkEnableOption \"Mathics notebook service\";\n\n external = mkOption {\n type = types.bool;\n default = false;\n description = \"Listen on all in"..., 1317) = 1317
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/misc/matrix-synapse.nix", {st_mode=S_IFREG|0444, st_size=23859, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/misc/matrix-synapse.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=23859, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.matrix-synapse;\n pg = config.services.postgresql;\n usePostgresql = cfg.database_type == \"psycopg2\";\n logConfigFile = pkgs.writeText \"log_config.yaml\" cfg.logConfig;\n mkResource = r: ''{names: ${builtins.toJSON r.names}, compress"..., 23859) = 23859
close(3) = 0
brk(0x192f6000) = 0x192f6000
brk(0x19317000) = 0x19317000
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/misc/mbpfan.nix", {st_mode=S_IFREG|0444, st_size=2514, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/misc/mbpfan.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=2514, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.mbpfan;\n verbose = if cfg.verbose then \"v\" else \"\";\n\nin {\n options.services.mbpfan = {\n enable = mkEnableOption \"mbpfan, fan controller daemon for Apple Macs and MacBooks\";\n\n package = mkOption {\n type = types.package;\n"..., 2514) = 2514
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/misc/mediatomb.nix", {st_mode=S_IFREG|0444, st_size=9878, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/misc/mediatomb.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=9878, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n uid = config.ids.uids.mediatomb;\n gid = config.ids.gids.mediatomb;\n cfg = config.services.mediatomb;\n\n mtConf = pkgs.writeText \"config.xml\" ''\n <?xml version=\"1.0\" encoding=\"UTF-8\"?>\n <config version=\"2\" xmlns=\"http://mediatomb.cc/config/2\" xmlns:x"..., 9878) = 9878
close(3) = 0
brk(0x19338000) = 0x19338000
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/misc/mesos-master.nix", {st_mode=S_IFREG|0444, st_size=3334, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/misc/mesos-master.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=3334, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.mesos.master;\n\nin {\n\n options.services.mesos = {\n\n master = {\n enable = mkOption {\n description = \"Whether to enable the Mesos Master.\";\n default = false;\n type = types.bool;\n };\n\n ip = mkOpti"..., 3334) = 3334
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/misc/mesos-slave.nix", {st_mode=S_IFREG|0444, st_size=6773, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/misc/mesos-slave.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=6773, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.mesos.slave;\n\n mkAttributes =\n attrs: concatStringsSep \";\" (mapAttrsToList\n (k: v: \"${k}:${v}\")\n (filterAttrs (k: v: v != null) attrs));\n attribsArg = optional"..., 6773) = 6773
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/misc/mwlib.nix", {st_mode=S_IFREG|0444, st_size=7639, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/misc/mwlib.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=7639, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.mwlib;\n pypkgs = pkgs.python27Packages;\n\n inherit (pypkgs) python mwlib;\n\n user = mkOption {\n default = \"nobody\";\n type = types.str;\n description = \"User to run as.\";\n };\n\nin\n{\n\n options.services.mwlib = {\n\n nserve "..., 7639) = 7639
close(3) = 0
brk(0x19359000) = 0x19359000
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/misc/nix-daemon.nix", {st_mode=S_IFREG|0444, st_size=16705, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/misc/nix-daemon.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=16705, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.nix;\n\n nix = cfg.package.out;\n\n isNix20 = versionAtLeast (getVersion nix) \"2.0pre\";\n\n makeNixBuildUser = nr:\n { name = \"nixbld${toString nr}\";\n description = \"Nix build user ${toString nr}\";\n\n /* For consistency with the set"..., 16705) = 16705
close(3) = 0
brk(0x1937a000) = 0x1937a000
brk(0x19379000) = 0x19379000
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/misc/nix-gc.nix", {st_mode=S_IFREG|0444, st_size=1251, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/misc/nix-gc.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=1251, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.nix.gc;\nin\n\n{\n\n ###### interface\n\n options = {\n\n nix.gc = {\n\n automatic = mkOption {\n default = false;\n type = types.bool;\n description = \"Automatically run the garbage collector at a specific time.\";\n };\n"..., 1251) = 1251
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/misc/nix-optimise.nix", {st_mode=S_IFREG|0444, st_size=969, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/misc/nix-optimise.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=969, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.nix.optimise;\nin\n\n{\n\n ###### interface\n\n options = {\n\n nix.optimise = {\n\n automatic = mkOption {\n default = false;\n type = types.bool;\n description = \"Automatically run the nix store optimiser at a specific tim"..., 969) = 969
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/misc/nixos-manual.nix", {st_mode=S_IFREG|0444, st_size=4195, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/misc/nixos-manual.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=4195, ...}) = 0
read(3, "# This module includes the NixOS man-pages in the system environment,\n# and optionally starts a browser that shows the NixOS manual on one\n# of the virtual consoles. The latter is useful for the installation\n# CD.\n\n{ config, lib, pkgs, baseModules, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.services.ni"..., 4195) = 4195
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/misc/nix-ssh-serve.nix", {st_mode=S_IFREG|0444, st_size=1151, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/misc/nix-ssh-serve.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=1151, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\n{\n options = {\n\n nix.sshServe = {\n\n enable = mkOption {\n type = types.bool;\n default = false;\n description = \"Whether to enable serving the Nix store as a binary cache via SSH.\";\n };\n\n keys = mkOption {\n type = ty"..., 1151) = 1151
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/misc/novacomd.nix", {st_mode=S_IFREG|0444, st_size=588, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/misc/novacomd.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=588, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.services.novacomd;\n\nin {\n\n options = {\n services.novacomd = {\n enable = mkEnableOption \"Novacom service for connecting to WebOS devices\";\n };\n };\n\n config = mkIf cfg.enable {\n environment.systemPackages = [ pkgs.webos.novac"..., 588) = 588
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/misc/nzbget.nix", {st_mode=S_IFREG|0444, st_size=3399, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/misc/nzbget.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=3399, ...}) = 0
read(3, "{ config, pkgs, lib, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.nzbget;\n nzbget = pkgs.nzbget; in {\n options = {\n services.nzbget = {\n enable = mkEnableOption \"NZBGet\";\n\n package = mkOption {\n type = types.package;\n default = pkgs.nzbget;\n defaultText = \"pkgs."..., 3399) = 3399
close(3) = 0
brk(0x1939a000) = 0x1939a000
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/misc/octoprint.nix", {st_mode=S_IFREG|0444, st_size=3273, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/misc/octoprint.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=3273, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.services.octoprint;\n\n baseConfig = {\n plugins.cura.cura_engine = \"${pkgs.curaengine_stable}/bin/CuraEngine\";\n server.host = cfg.host;\n server.port = cfg.port;\n webcam.ffmpeg = \"${pkgs.ffmpeg.bin}/bin/ffmpeg\";\n };\n\n fullConfig"..., 3273) = 3273
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/misc/osrm.nix", {st_mode=S_IFREG|0444, st_size=2002, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/misc/osrm.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=2002, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.osrm;\nin\n\n{\n options.services.osrm = {\n enable = mkOption {\n type = types.bool;\n default = false;\n description = \"Enable the OSRM service.\";\n };\n\n address = mkOption {\n type = types.str;\n default ="..., 2002) = 2002
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/misc/packagekit.nix", {st_mode=S_IFREG|0444, st_size=1321, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/misc/packagekit.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=1321, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.services.packagekit;\n\n backend = \"nix\";\n\n packagekitConf = ''\n[Daemon]\nDefaultBackend=${backend}\nKeepCache=false\n '';\n\n vendorConf = ''\n[PackagesNotFound]\nDefaultUrl=https://github.com/NixOS/nixpkgs\nCodecUrl=https://github.com/NixOS/n"..., 1321) = 1321
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/misc/parsoid.nix", {st_mode=S_IFREG|0444, st_size=2148, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/misc/parsoid.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=2148, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.services.parsoid;\n\n confTree = {\n worker_heartbeat_timeout = 300000;\n logging = { level = \"info\"; };\n services = [{\n module = \"lib/index.js\";\n entrypoint = \"apiServiceWorker\";\n conf = {\n mwApis = map (x: if i"..., 2148) = 2148
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/misc/phd.nix", {st_mode=S_IFREG|0444, st_size=839, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/misc/phd.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=839, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.services.phd;\n\nin\n\n{\n\n ###### interface\n\n options = {\n\n services.phd = {\n\n enable = mkOption {\n default = false;\n description = \"\n Enable daemons for phabricator.\n \";\n };\n\n };\n\n };\n\n ###### "..., 839) = 839
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/misc/plex.nix", {st_mode=S_IFREG|0444, st_size=5763, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/misc/plex.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=5763, ...}) = 0
read(3, "{ config, pkgs, lib, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.plex;\n plex = pkgs.plex;\nin\n{\n options = {\n services.plex = {\n enable = mkEnableOption \"Plex Media Server\";\n\n # FIXME: In order for this config option to work, symlinks in the Plex\n # package in the Nix store hav"..., 5763) = 5763
close(3) = 0
brk(0x193bb000) = 0x193bb000
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/misc/plexpy.nix", {st_mode=S_IFREG|0444, st_size=2148, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/misc/plexpy.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=2148, ...}) = 0
read(3, "{ config, pkgs, lib, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.plexpy;\nin\n{\n options = {\n services.plexpy = {\n enable = mkEnableOption \"PlexPy Plex Monitor\";\n\n dataDir = mkOption {\n type = types.str;\n default = \"/var/lib/plexpy\";\n description = \"The directory "..., 2148) = 2148
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/misc/pykms.nix", {st_mode=S_IFREG|0444, st_size=2123, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/misc/pykms.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=2123, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.pykms;\n\n home = \"/var/lib/pykms\";\n\n services = {\n serviceConfig = {\n Restart = \"on-failure\";\n RestartSec = \"10s\";\n StartLimitInterval = \"1min\";\n PrivateTmp = true;\n ProtectSystem = \"full\";\n Protect"..., 2123) = 2123
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/misc/radarr.nix", {st_mode=S_IFREG|0444, st_size=1049, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/misc/radarr.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=1049, ...}) = 0
read(3, "{ config, pkgs, lib, mono, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.radarr;\nin\n{\n options = {\n services.radarr = {\n enable = mkEnableOption \"Radarr\";\n };\n };\n\n config = mkIf cfg.enable {\n systemd.services.radarr = {\n description = \"Radarr\";\n after = [ \"network.target"..., 1049) = 1049
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/misc/redmine.nix", {st_mode=S_IFREG|0444, st_size=6609, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/misc/redmine.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=6609, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\n# TODO: support non-postgresql\n\nwith lib;\n\nlet\n cfg = config.services.redmine;\n\n ruby = pkgs.ruby;\n\n databaseYml = ''\n production:\n adapter: postgresql\n database: ${cfg.databaseName}\n host: ${cfg.databaseHost}\n password: ${cfg.databasePassword}\n"..., 6609) = 6609
close(3) = 0
brk(0x193dc000) = 0x193dc000
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/misc/rippled.nix", {st_mode=S_IFREG|0444, st_size=10552, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/misc/rippled.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=10552, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.rippled;\n\n b2i = val: if val then \"1\" else \"0\";\n\n dbCfg = db: ''\n type=${db.type}\n path=${db.path}\n ${optionalString (db.compression != null) (\"compression=${b2i db.compression}\") }\n ${optionalString (db.onlineDelete !"..., 10552) = 10552
close(3) = 0
brk(0x193fd000) = 0x193fd000
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/misc/ripple-data-api.nix", {st_mode=S_IFREG|0444, st_size=5339, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/misc/ripple-data-api.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=5339, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.rippleDataApi;\n\n deployment_env_config = builtins.toJSON {\n production = {\n port = toString cfg.port;\n maxSockets = 150;\n batchSize = 100;\n startIndex = 32570;\n rippleds = cfg.rippleds;\n redis = {\n "..., 5339) = 5339
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/misc/rogue.nix", {st_mode=S_IFREG|0444, st_size=1160, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/misc/rogue.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=1160, ...}) = 0
read(3, "# Execute the game `rogue' on tty 9. Mostly used by the NixOS\n# installation CD.\n\n{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.services.rogue;\n\nin\n\n{\n ###### interface\n\n options = {\n\n services.rogue.enable = mkOption {\n type = types.bool;\n default = false;\n descri"..., 1160) = 1160
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/misc/siproxd.nix", {st_mode=S_IFREG|0444, st_size=4560, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/misc/siproxd.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=4560, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.services.siproxd;\n\n conf = ''\n daemonize = 0\n rtp_proxy_enable = 1\n user = siproxd\n if_inbound = ${cfg.ifInbound}\n if_outbound = ${cfg.ifOutbound}\n sip_listen_port = ${toString cfg.sipListenPort}\n rtp_port_low = ${"..., 4560) = 4560
close(3) = 0
brk(0x1941e000) = 0x1941e000
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/misc/snapper.nix", {st_mode=S_IFREG|0444, st_size=3968, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/misc/snapper.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=3968, ...}) = 0
read(3, "{ config, pkgs, lib, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.snapper;\nin\n\n{\n options.services.snapper = {\n\n snapshotInterval = mkOption {\n type = types.str;\n default = \"hourly\";\n description = ''\n Snapshot interval.\n\n The format is described in\n <citere"..., 3968) = 3968
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/misc/sonarr.nix", {st_mode=S_IFREG|0444, st_size=1064, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/misc/sonarr.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=1064, ...}) = 0
read(3, "{ config, pkgs, lib, mono, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.sonarr;\nin\n{\n options = {\n services.sonarr = {\n enable = mkEnableOption \"Sonarr\";\n };\n };\n\n config = mkIf cfg.enable {\n systemd.services.sonarr = {\n description = \"Sonarr\";\n after = [ \"network.target"..., 1064) = 1064
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/misc/spice-vdagentd.nix", {st_mode=S_IFREG|0444, st_size=631, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/misc/spice-vdagentd.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=631, ...}) = 0
read(3, "{ config, pkgs, lib, ... }:\n\nwith lib;\nlet\n cfg = config.services.spice-vdagentd;\nin\n{\n options = {\n services.spice-vdagentd = {\n enable = mkEnableOption \"Spice guest vdagent daemon\";\n };\n };\n\n config = mkIf cfg.enable {\n\n environment.systemPackages = [ pkgs.spice-vdagent ];\n\n s"..., 631) = 631
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/misc/ssm-agent.nix", {st_mode=S_IFREG|0444, st_size=1233, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/misc/ssm-agent.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=1233, ...}) = 0
read(3, "{ config, pkgs, lib, ... }:\n\nwith lib;\nlet\n cfg = config.services.ssm-agent;\n\n # The SSM agent doesn't pay attention to our /etc/os-release yet, and the lsb-release tool\n # in nixpkgs doesn't seem to work properly on NixOS, so let's just fake the two fields SSM\n # looks for. See https://github.c"..., 1233) = 1233
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/misc/sssd.nix", {st_mode=S_IFREG|0444, st_size=3024, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/misc/sssd.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=3024, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\nwith lib;\nlet\n cfg = config.services.sssd;\n nscd = config.services.nscd;\nin {\n options = {\n services.sssd = {\n enable = mkEnableOption \"the System Security Services Daemon.\";\n\n config = mkOption {\n type = types.lines;\n description = \"Contents"..., 3024) = 3024
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/misc/subsonic.nix", {st_mode=S_IFREG|0444, st_size=5292, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/misc/subsonic.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=5292, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet cfg = config.services.subsonic; in {\n options = {\n services.subsonic = {\n enable = mkEnableOption \"Subsonic daemon\";\n\n home = mkOption {\n type = types.path;\n default = \"/var/lib/subsonic\";\n description = ''\n The "..., 5292) = 5292
close(3) = 0
brk(0x1943f000) = 0x1943f000
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/misc/sundtek.nix", {st_mode=S_IFREG|0444, st_size=709, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/misc/sundtek.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=709, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.sundtek;\n\nin\n{\n options.services.sundtek = {\n enable = mkEnableOption \"Sundtek driver\";\n };\n\n config = mkIf cfg.enable {\n\n environment.systemPackages = [ pkgs.sundtek ];\n\n systemd.services.sundtek = {\n description ="..., 709) = 709
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/misc/svnserve.nix", {st_mode=S_IFREG|0444, st_size=849, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/misc/svnserve.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=849, ...}) = 0
read(3, "# SVN server\n{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.services.svnserve;\n\nin\n\n{\n\n ###### interface\n\n options = {\n\n services.svnserve = {\n\n enable = mkOption {\n default = false;\n description = \"Whether to enable svnserve to serve Subversion repositories thro"..., 849) = 849
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/misc/synergy.nix", {st_mode=S_IFREG|0444, st_size=3465, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/misc/synergy.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=3465, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n cfgC = config.services.synergy.client;\n cfgS = config.services.synergy.server;\n\nin\n\n{\n ###### interface\n\n options = {\n\n services.synergy = {\n\n # !!! All these option descriptions needs to be cleaned up.\n\n client = {\n enable = mkOp"..., 3465) = 3465
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/misc/taskserver", {st_mode=S_IFDIR|0555, st_size=5, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/misc/taskserver/default.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=18295, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.taskserver;\n\n taskd = \"${pkgs.taskserver}/bin/taskd\";\n\n mkVal = val:\n if val == true then \"true\"\n else if val == false then \"false\"\n else if isList val then concatStringsSep \", \" val\n else toString val;\n\n mkConfLine ="..., 18295) = 18295
close(3) = 0
brk(0x19460000) = 0x19460000
mmap(NULL, 212992, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) = 0x76ffc6c63000
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/misc/tzupdate.nix", {st_mode=S_IFREG|0444, st_size=1478, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/misc/tzupdate.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=1478, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.tzupdate;\nin {\n options.services.tzupdate = {\n enable = mkOption {\n type = types.bool;\n default = false;\n description = ''\n Enable the tzupdate timezone updating service. This provides\n a one-shot se"..., 1478) = 1478
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/misc/uhub.nix", {st_mode=S_IFREG|0444, st_size=5473, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/misc/uhub.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=5473, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.services.uhub;\n\n uhubPkg = pkgs.uhub.override { tlsSupport = cfg.enableTLS; };\n\n pluginConfig = \"\"\n + optionalString cfg.plugins.authSqlite.enable ''\n plugin ${uhubPkg.mod_auth_sqlite}/mod_auth_sqlite.so \"file=${cfg.plugins.authSqlite"..., 5473) = 5473
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/misc/xmr-stak.nix", {st_mode=S_IFREG|0444, st_size=2100, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/misc/xmr-stak.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=2100, ...}) = 0
read(3, "{ lib, config, pkgs, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.services.xmr-stak;\n\n pkg = pkgs.xmr-stak.override {\n inherit (cfg) openclSupport cudaSupport;\n };\n\n xmrConfArg = optionalString (cfg.configText != \"\") (\"-c \" +\n pkgs.writeText \"xmr-stak-config.txt\" cfg.configText);\n\nin\n\n{\n options"..., 2100) = 2100
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/misc/zookeeper.nix", {st_mode=S_IFREG|0444, st_size=4218, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/misc/zookeeper.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=4218, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.zookeeper;\n\n zookeeperConfig = ''\n dataDir=${cfg.dataDir}\n clientPort=${toString cfg.port}\n autopurge.purgeInterval=${toString cfg.purgeInterval}\n ${cfg.extraConf}\n ${cfg.servers}\n '';\n\n configDir = pkgs.buildEnv {"..., 4218) = 4218
close(3) = 0
brk(0x19481000) = 0x19481000
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/monitoring/apcupsd.nix", {st_mode=S_IFREG|0444, st_size=6287, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/monitoring/apcupsd.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=6287, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.apcupsd;\n\n configFile = pkgs.writeText \"apcupsd.conf\" ''\n ## apcupsd.conf v1.1 ##\n # apcupsd complains if the first line is not like above.\n ${cfg.configText}\n SCRIPTDIR ${toString scriptDir}\n '';\n\n # List of events f"..., 6287) = 6287
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/monitoring/arbtt.nix", {st_mode=S_IFREG|0444, st_size=1551, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/monitoring/arbtt.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=1551, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.arbtt;\nin {\n options = {\n services.arbtt = {\n enable = mkOption {\n type = types.bool;\n default = false;\n description = ''\n Enable the arbtt statistics capture service.\n '';\n };\n\n "..., 1551) = 1551
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/monitoring/bosun.nix", {st_mode=S_IFREG|0444, st_size=3982, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/monitoring/bosun.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=3982, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.bosun;\n\n configFile = pkgs.writeText \"bosun.conf\" ''\n ${optionalString (cfg.opentsdbHost !=null) \"tsdbHost = ${cfg.opentsdbHost}\"}\n ${optionalString (cfg.influxHost !=null) \"influxHost = ${cfg.influxHost}\"}\n httpListen = $"..., 3982) = 3982
close(3) = 0
brk(0x194a2000) = 0x194a2000
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/monitoring/cadvisor.nix", {st_mode=S_IFREG|0444, st_size=4148, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/monitoring/cadvisor.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=4148, ...}) = 0
read(3, "{ config, pkgs, lib, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.cadvisor;\n\nin {\n options = {\n services.cadvisor = {\n enable = mkOption {\n default = false;\n type = types.bool;\n description = \"Whether to enable cadvisor service.\";\n };\n\n listenAddress = mkOpt"..., 4148) = 4148
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/monitoring/collectd.nix", {st_mode=S_IFREG|0444, st_size=2141, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/monitoring/collectd.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=2141, ...}) = 0
read(3, "{ config, pkgs, lib, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.collectd;\n\n conf = pkgs.writeText \"collectd.conf\" ''\n BaseDir \"${cfg.dataDir}\"\n AutoLoadPlugin ${boolToString cfg.autoLoadPlugin}\n Hostname \"${config.networking.hostName}\"\n\n LoadPlugin syslog\n <Plugin \"syslog\">\n "..., 2141) = 2141
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/monitoring/das_watchdog.nix", {st_mode=S_IFREG|0444, st_size=877, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/monitoring/das_watchdog.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=877, ...}) = 0
read(3, "# A general watchdog for the linux operating system that should run in the\n# background at all times to ensure a realtime process won't hang the machine\n{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n inherit (pkgs) das_watchdog;\n\nin {\n ###### interface\n\n options = {\n services.das_watchdog.enabl"..., 877) = 877
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/monitoring/dd-agent/dd-agent.nix", {st_mode=S_IFREG|0444, st_size=7069, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/monitoring/dd-agent/dd-agent.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=7069, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.dd-agent;\n\n ddConf = pkgs.writeText \"datadog.conf\" ''\n [Main]\n dd_url: https://app.datadoghq.com\n skip_ssl_validation: no\n api_key: ${cfg.api_key}\n ${optionalString (cfg.hostname != null) \"hostname: ${cfg.hostname}\"}"..., 7069) = 7069
close(3) = 0
brk(0x194c3000) = 0x194c3000
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/monitoring/fusion-inventory.nix", {st_mode=S_IFREG|0444, st_size=1268, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/monitoring/fusion-inventory.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=1268, ...}) = 0
read(3, "# Fusion Inventory daemon.\n{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.fusionInventory;\n\n configFile = pkgs.writeText \"fusion_inventory.conf\" ''\n server = ${concatStringsSep \", \" cfg.servers}\n\n logger = stderr\n\n ${cfg.extraConfig}\n '';\n\nin {\n\n ###### interface\n\n "..., 1268) = 1268
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/monitoring/grafana.nix", {st_mode=S_IFREG|0444, st_size=7214, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/monitoring/grafana.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=7214, ...}) = 0
read(3, "{ options, config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.grafana;\n\n envOptions = {\n PATHS_DATA = cfg.dataDir;\n PATHS_PLUGINS = \"${cfg.dataDir}/plugins\";\n PATHS_LOGS = \"${cfg.dataDir}/log\";\n\n SERVER_PROTOCOL = cfg.protocol;\n SERVER_HTTP_ADDR = cfg.addr;\n SERVER_"..., 7214) = 7214
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/monitoring/graphite.nix", {st_mode=S_IFREG|0444, st_size=20602, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/monitoring/graphite.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=20602, ...}) = 0
brk(0x194e5000) = 0x194e5000
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.graphite;\n writeTextOrNull = f: t: mapNullable (pkgs.writeTextDir f) t;\n\n dataDir = cfg.dataDir;\n staticDir = cfg.dataDir + \"/static\";\n\n graphiteLocalSettingsDir = pkgs.runCommand \"graphite_local_settings\"\n {inherit graphiteL"..., 20602) = 20602
close(3) = 0
brk(0x19506000) = 0x19506000
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/monitoring/hdaps.nix", {st_mode=S_IFREG|0444, st_size=423, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/monitoring/hdaps.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=423, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.hdapsd;\n hdapsd = [ pkgs.hdapsd ];\nin\n{\n options = {\n services.hdapsd.enable = mkEnableOption\n ''\n Hard Drive Active Protection System Daemon,\n devices are detected and managed automatically by udev and syste"..., 423) = 423
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/monitoring/heapster.nix", {st_mode=S_IFREG|0444, st_size=1372, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/monitoring/heapster.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=1372, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.heapster;\nin {\n options.services.heapster = {\n enable = mkOption {\n description = \"Whether to enable heapster monitoring\";\n default = false;\n type = types.bool;\n };\n\n source = mkOption {\n description = "..., 1372) = 1372
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/monitoring/longview.nix", {st_mode=S_IFREG|0444, st_size=5092, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/monitoring/longview.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=5092, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.longview;\n\n runDir = \"/run/longview\";\n configsDir = \"${runDir}/longview.d\";\n\nin {\n options = {\n\n services.longview = {\n\n enable = mkOption {\n type = types.bool;\n default = false;\n description = ''\n "..., 5092) = 5092
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/monitoring/monit.nix", {st_mode=S_IFREG|0444, st_size=1218, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/monitoring/monit.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=1218, ...}) = 0
read(3, "# Monit system watcher\n# http://mmonit.org/monit/\n\n{config, pkgs, lib, ...}:\n\nlet inherit (lib) mkOption mkIf;\nin\n\n{\n options = {\n services.monit = {\n enable = mkOption {\n default = false;\n description = ''\n Whether to run Monit system watcher.\n '';\n };\n "..., 1218) = 1218
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/monitoring/munin.nix", {st_mode=S_IFREG|0444, st_size=6179, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/monitoring/munin.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=6179, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\n# TODO: support munin-async\n# TODO: LWP/Pg perl libs aren't recognized\n\n# TODO: support fastcgi\n# http://munin-monitoring.org/wiki/CgiHowto2\n# spawn-fcgi -s /var/run/munin/fastcgi-graph.sock -U www-data -u munin -g munin /usr/lib/munin/cgi/munin-cgi-graph\n# spawn-fcgi "..., 6179) = 6179
brk(0x19527000) = 0x19527000
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/monitoring/nagios.nix", {st_mode=S_IFREG|0444, st_size=5346, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/monitoring/nagios.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=5346, ...}) = 0
read(3, "# Nagios system/network monitoring daemon.\n{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.nagios;\n\n nagiosState = \"/var/lib/nagios\";\n nagiosLogDir = \"/var/log/nagios\";\n\n nagiosObjectDefs = cfg.objectDefs;\n\n nagiosObjectDefsDir = pkgs.runCommand \"nagios-objects\" {inherit nagi"..., 5346) = 5346
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/monitoring/netdata.nix", {st_mode=S_IFREG|0444, st_size=3130, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/monitoring/netdata.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=3130, ...}) = 0
read(3, "{ config, pkgs, lib, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.netdata;\n\n wrappedPlugins = pkgs.runCommand \"wrapped-plugins\" {} ''\n mkdir -p $out/libexec/netdata/plugins.d\n ln -s /run/wrappers/bin/apps.plugin $out/libexec/netdata/plugins.d/apps.plugin\n '';\n\n localConfig = {\n global "..., 3130) = 3130
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/monitoring/osquery.nix", {st_mode=S_IFREG|0444, st_size=2310, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/monitoring/osquery.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=2310, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith builtins;\nwith lib;\n\nlet\n cfg = config.services.osquery;\n\nin\n\n{\n\n options = {\n\n services.osquery = {\n\n enable = mkEnableOption \"osquery\";\n\n loggerPath = mkOption {\n type = types.path;\n description = \"Base directory used for logging.\";\n "..., 2310) = 2310
close(3) = 0
brk(0x19548000) = 0x19548000
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/monitoring/prometheus/default.nix", {st_mode=S_IFREG|0444, st_size=14056, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/monitoring/prometheus/default.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=14056, ...}) = 0
read(3, "{ config, pkgs, lib, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.prometheus;\n promUser = \"prometheus\";\n promGroup = \"prometheus\";\n\n # Get a submodule without any embedded metadata:\n _filter = x: filterAttrs (k: v: k != \"_module\") x;\n\n # Pretty-print JSON to a file\n writePrettyJSON = name: x"..., 14056) = 14056
close(3) = 0
brk(0x19569000) = 0x19569000
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/monitoring/prometheus/alertmanager.nix", {st_mode=S_IFREG|0444, st_size=3833, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/monitoring/prometheus/alertmanager.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=3833, ...}) = 0
read(3, "{ config, pkgs, lib, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.prometheus.alertmanager;\n mkConfigFile = pkgs.writeText \"alertmanager.yml\" (builtins.toJSON cfg.configuration);\n alertmanagerYml =\n if cfg.configText != null then\n pkgs.writeText \"alertmanager.yml\" cfg.configText\n else "..., 3833) = 3833
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/monitoring/prometheus/blackbox-exporter.nix", {st_mode=S_IFREG|0444, st_size=1838, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/monitoring/prometheus/blackbox-exporter.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=1838, ...}) = 0
read(3, "{ config, pkgs, lib, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.prometheus.blackboxExporter;\nin {\n options = {\n services.prometheus.blackboxExporter = {\n enable = mkEnableOption \"prometheus blackbox exporter\";\n\n configFile = mkOption {\n type = types.path;\n description"..., 1838) = 1838
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/monitoring/prometheus/collectd-exporter.nix", {st_mode=S_IFREG|0444, st_size=3924, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/monitoring/prometheus/collectd-exporter.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=3924, ...}) = 0
read(3, "{ config, pkgs, lib, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.prometheus.collectdExporter;\n\n collectSettingsArgs = if (cfg.collectdBinary.enable) then ''\n -collectd.listen-address ${optionalString (cfg.collectdBinary.listenAddress != null) cfg.collectdBinary.listenAddress}:${toString cfg.c"..., 3924) = 3924
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/monitoring/prometheus/fritzbox-exporter.nix", {st_mode=S_IFREG|0444, st_size=1986, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/monitoring/prometheus/fritzbox-exporter.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=1986, ...}) = 0
read(3, "{ config, pkgs, lib, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.prometheus.fritzboxExporter;\nin {\n options = {\n services.prometheus.fritzboxExporter = {\n enable = mkEnableOption \"prometheus fritzbox exporter\";\n\n port = mkOption {\n type = types.int;\n default = 9133;\n "..., 1986) = 1986
close(3) = 0
brk(0x1958a000) = 0x1958a000
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/monitoring/prometheus/json-exporter.nix", {st_mode=S_IFREG|0444, st_size=1872, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/monitoring/prometheus/json-exporter.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=1872, ...}) = 0
read(3, "{ config, pkgs, lib, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.prometheus.jsonExporter;\nin {\n options = {\n services.prometheus.jsonExporter = {\n enable = mkEnableOption \"prometheus JSON exporter\";\n\n url = mkOption {\n type = types.str;\n description = ''\n URL "..., 1872) = 1872
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/monitoring/prometheus/minio-exporter.nix", {st_mode=S_IFREG|0444, st_size=3867, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/monitoring/prometheus/minio-exporter.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=3867, ...}) = 0
read(3, "{ config, pkgs, lib, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.prometheus.minioExporter;\nin {\n options = {\n services.prometheus.minioExporter = {\n enable = mkEnableOption \"prometheus minio exporter\";\n\n port = mkOption {\n type = types.int;\n default = 9290;\n des"..., 3867) = 3867
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/monitoring/prometheus/nginx-exporter.nix", {st_mode=S_IFREG|0444, st_size=2124, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/monitoring/prometheus/nginx-exporter.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=2124, ...}) = 0
read(3, "{ config, pkgs, lib, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.prometheus.nginxExporter;\nin {\n options = {\n services.prometheus.nginxExporter = {\n enable = mkEnableOption \"prometheus nginx exporter\";\n\n port = mkOption {\n type = types.int;\n default = 9113;\n des"..., 2124) = 2124
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/monitoring/prometheus/node-exporter.nix", {st_mode=S_IFREG|0444, st_size=2439, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/monitoring/prometheus/node-exporter.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=2439, ...}) = 0
read(3, "{ config, pkgs, lib, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.prometheus.nodeExporter;\nin {\n options = {\n services.prometheus.nodeExporter = {\n enable = mkEnableOption \"prometheus node exporter\";\n\n port = mkOption {\n type = types.int;\n default = 9100;\n descri"..., 2439) = 2439
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/monitoring/prometheus/snmp-exporter.nix", {st_mode=S_IFREG|0444, st_size=3436, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/monitoring/prometheus/snmp-exporter.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=3436, ...}) = 0
read(3, "{ config, pkgs, lib, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.prometheus.snmpExporter;\n mkConfigFile = pkgs.writeText \"snmp.yml\" (if cfg.configurationPath == null then builtins.toJSON cfg.configuration else builtins.readFile cfg.configurationPath);\nin {\n options = {\n services.prometheus.s"..., 3436) = 3436
close(3) = 0
brk(0x195ab000) = 0x195ab000
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/monitoring/prometheus/unifi-exporter.nix", {st_mode=S_IFREG|0444, st_size=2898, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/monitoring/prometheus/unifi-exporter.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=2898, ...}) = 0
read(3, "{ config, pkgs, lib, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.prometheus.unifiExporter;\nin {\n options = {\n services.prometheus.unifiExporter = {\n enable = mkEnableOption \"prometheus unifi exporter\";\n\n port = mkOption {\n type = types.int;\n default = 9130;\n des"..., 2898) = 2898
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/monitoring/prometheus/varnish-exporter.nix", {st_mode=S_IFREG|0444, st_size=1671, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/monitoring/prometheus/varnish-exporter.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=1671, ...}) = 0
read(3, "{ config, pkgs, lib, ... }:\n\n# Shamelessly cribbed from nginx-exporter.nix. ~ C.\nwith lib;\n\nlet\n cfg = config.services.prometheus.varnishExporter;\nin {\n options = {\n services.prometheus.varnishExporter = {\n enable = mkEnableOption \"prometheus Varnish exporter\";\n\n port = mkOption {\n "..., 1671) = 1671
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/monitoring/riemann.nix", {st_mode=S_IFREG|0444, st_size=2185, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/monitoring/riemann.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=2185, ...}) = 0
read(3, "{ config, pkgs, lib, ... }:\n\nwith pkgs;\nwith lib;\n\nlet\n\n cfg = config.services.riemann;\n\n classpath = concatStringsSep \":\" (\n cfg.extraClasspathEntries ++ [ \"${riemann}/share/java/riemann.jar\" ]\n );\n\n riemannConfig = concatStringsSep \"\\n\" (\n [cfg.config] ++ (map (f: ''(load-file \"${f}\")'')"..., 2185) = 2185
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/monitoring/riemann-dash.nix", {st_mode=S_IFREG|0444, st_size=1873, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/monitoring/riemann-dash.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=1873, ...}) = 0
read(3, "{ config, pkgs, lib, ... }:\n\nwith pkgs;\nwith lib;\n\nlet\n\n cfg = config.services.riemann-dash;\n\n conf = writeText \"config.rb\" ''\n riemann_base = \"${cfg.dataDir}\"\n config.store[:ws_config] = \"#{riemann_base}/config/config.json\"\n ${cfg.config}\n '';\n\n launcher = writeScriptBin \"riemann-dash\""..., 1873) = 1873
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/monitoring/riemann-tools.nix", {st_mode=S_IFREG|0444, st_size=1283, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/monitoring/riemann-tools.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=1283, ...}) = 0
read(3, "{ config, pkgs, lib, ... }:\n\nwith pkgs;\nwith lib;\n\nlet\n\n cfg = config.services.riemann-tools;\n\n riemannHost = \"${cfg.riemannHost}\";\n\n healthLauncher = writeScriptBin \"riemann-health\" ''\n #!/bin/sh\n exec ${pkgs.riemann-tools}/bin/riemann-health --host ${riemannHost}\n '';\n\n\nin {\n\n options ="..., 1283) = 1283
close(3) = 0
brk(0x195cc000) = 0x195cc000
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/monitoring/scollector.nix", {st_mode=S_IFREG|0444, st_size=3294, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/monitoring/scollector.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=3294, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.scollector;\n\n collectors = pkgs.runCommand \"collectors\" {}\n ''\n mkdir -p $out\n ${lib.concatStringsSep\n \"\\n\"\n (lib.mapAttrsToList\n (frequency: binaries:\n \"mkdir -p $out/${frequency}\\n\" +\n "..., 3294) = 3294
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/monitoring/smartd.nix", {st_mode=S_IFREG|0444, st_size=6725, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/monitoring/smartd.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=6725, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n host = config.networking.hostName or \"unknown\"\n + optionalString (config.networking.domain != null) \".${config.networking.domain}\";\n\n cfg = config.services.smartd;\n\n nm = cfg.notifications.mail;\n nw = cfg.notifications.wall;\n nx = cfg.notifica"..., 6725) = 6725
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/monitoring/statsd.nix", {st_mode=S_IFREG|0444, st_size=3713, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/monitoring/statsd.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=3713, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.services.statsd;\n\n isBuiltinBackend = name:\n builtins.elem name [ \"graphite\" \"console\" \"repeater\" ];\n\n backendsToPackages = let\n mkMap = list: name:\n if isBuiltinBackend name then list\n else list ++ [ pkgs.nodePackages.${n"..., 3713) = 3713
close(3) = 0
brk(0x195ed000) = 0x195ed000
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/monitoring/sysstat.nix", {st_mode=S_IFREG|0444, st_size=2077, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/monitoring/sysstat.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=2077, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\nwith lib;\nlet\n cfg = config.services.sysstat;\nin {\n options = {\n services.sysstat = {\n enable = mkOption {\n type = types.bool;\n default = false;\n description = ''\n Whether to enable sar system activity collection.\n '';\n "..., 2077) = 2077
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/monitoring/systemhealth.nix", {st_mode=S_IFREG|0444, st_size=3326, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/monitoring/systemhealth.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=3326, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.systemhealth;\n\n systemhealth = with pkgs; stdenv.mkDerivation {\n name = \"systemhealth-1.0\";\n src = fetchurl {\n url = \"http://www.brianlane.com/static/downloads/systemhealth/systemhealth-1.0.tar.bz2\";\n sha256 = \"1q69"..., 3326) = 3326
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/monitoring/teamviewer.nix", {st_mode=S_IFREG|0444, st_size=937, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/monitoring/teamviewer.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=937, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.services.teamviewer;\n\nin\n\n{\n\n ###### interface\n\n options = {\n\n services.teamviewer.enable = mkEnableOption \"TeamViewer daemon\";\n \n };\n\n ###### implementation\n\n config = mkIf (cfg.enable) {\n\n environment.systemPackages = [ pk"..., 937) = 937
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/monitoring/telegraf.nix", {st_mode=S_IFREG|0444, st_size=1739, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/monitoring/telegraf.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=1739, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.telegraf;\n\n configFile = pkgs.runCommand \"config.toml\" {\n buildInputs = [ pkgs.remarshal ];\n } ''\n remarshal -if json -of toml \\\n < ${pkgs.writeText \"config.json\" (builtins.toJSON cfg.extraConfig)} \\\n > $out\n '';\n"..., 1739) = 1739
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/monitoring/ups.nix", {st_mode=S_IFREG|0444, st_size=7988, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/monitoring/ups.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=7988, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\n# TODO: This is not secure, have a look at the file docs/security.txt inside\n# the project sources.\nwith lib;\n\nlet\n cfg = config.power.ups;\nin\n\nlet\n upsOptions = {name, config, ...}:\n {\n options = {\n # This can be infered from the UPS model by looking at\n "..., 7988) = 7988
close(3) = 0
brk(0x1960e000) = 0x1960e000
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/monitoring/uptime.nix", {st_mode=S_IFREG|0444, st_size=3268, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/monitoring/uptime.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=3268, ...}) = 0
read(3, "{ config, pkgs, lib, ... }:\nlet\n inherit (lib) mkOption mkEnableOption mkIf mkMerge types optionalAttrs optional;\n\n cfg = config.services.uptime;\n\n configDir = pkgs.runCommand \"config\" {} (if cfg.configFile != null then ''\n mkdir $out\n ext=`echo ${cfg.configFile} | grep -o \\\\..*`\n ln -sv"..., 3268) = 3268
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/monitoring/vnstat.nix", {st_mode=S_IFREG|0444, st_size=1100, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/monitoring/vnstat.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=1100, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.vnstat;\nin {\n options.services.vnstat = {\n enable = mkOption {\n type = types.bool;\n default = false;\n description = ''\n Whether to enable update of network usage statistics via vnstatd.\n '';\n };\n }"..., 1100) = 1100
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/monitoring/zabbix-agent.nix", {st_mode=S_IFREG|0444, st_size=2061, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/monitoring/zabbix-agent.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=2061, ...}) = 0
read(3, "# Zabbix agent daemon.\n{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.services.zabbixAgent;\n\n stateDir = \"/var/run/zabbix\";\n\n logDir = \"/var/log/zabbix\";\n\n pidFile = \"${stateDir}/zabbix_agentd.pid\";\n\n configFile = pkgs.writeText \"zabbix_agentd.conf\"\n ''\n Server = ${cfg.serve"..., 2061) = 2061
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/monitoring/zabbix-server.nix", {st_mode=S_IFREG|0444, st_size=3353, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/monitoring/zabbix-server.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=3353, ...}) = 0
read(3, "# Zabbix server daemon.\n{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.services.zabbixServer;\n\n stateDir = \"/var/run/zabbix\";\n\n logDir = \"/var/log/zabbix\";\n\n libDir = \"/var/lib/zabbix\";\n\n pidFile = \"${stateDir}/zabbix_server.pid\";\n\n configFile = pkgs.writeText \"zabbix_server.conf\"\n"..., 3353) = 3353
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/network-filesystems/beegfs.nix", {st_mode=S_IFREG|0444, st_size=10983, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/network-filesystems/beegfs.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=10983, ...}) = 0
read(3, "{ config, lib, pkgs, ...} :\n\nwith lib;\n\nlet\n cfg = config.services.beegfs;\n\n # functions for the generations of config files\n\n configMgmtd = name: cfg: pkgs.writeText \"mgmt-${name}.conf\" ''\n storeMgmtdDirectory = ${cfg.mgmtd.storeDir}\n storeAllowFirstRunInit = false\n connAuthFile = ${cfg"..., 10983) = 10983
brk(0x19630000) = 0x19630000
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/network-filesystems/cachefilesd.nix", {st_mode=S_IFREG|0444, st_size=1259, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/network-filesystems/cachefilesd.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=1259, ...}) = 0
read(3, "{ config, pkgs, lib, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.services.cachefilesd;\n\n cfgFile = pkgs.writeText \"cachefilesd.conf\" ''\n dir ${cfg.cacheDir}\n ${cfg.extraConfig}\n '';\n\nin\n\n{\n options = {\n services.cachefilesd = {\n\n enable = mkOption {\n type = types.bool;\n def"..., 1259) = 1259
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/network-filesystems/davfs2.nix", {st_mode=S_IFREG|0444, st_size=1772, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/network-filesystems/davfs2.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=1772, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.davfs2;\n cfgFile = pkgs.writeText \"davfs2.conf\" ''\n dav_user ${cfg.davUser}\n dav_group ${cfg.davGroup}\n ${cfg.extraConfig}\n '';\nin\n{\n options.services.davfs2 = {\n enable = mkOption {\n type = types.bool;\n def"..., 1772) = 1772
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/network-filesystems/drbd.nix", {st_mode=S_IFREG|0444, st_size=1399, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/network-filesystems/drbd.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=1399, ...}) = 0
read(3, "# Support for DRBD, the Distributed Replicated Block Device.\n\n{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet cfg = config.services.drbd; in\n\n{\n\n ###### interface\n\n options = {\n\n services.drbd.enable = mkOption {\n default = false;\n type = types.bool;\n description = ''\n Whether"..., 1399) = 1399
close(3) = 0
brk(0x19651000) = 0x19651000
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/network-filesystems/glusterfs.nix", {st_mode=S_IFREG|0444, st_size=6536, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/network-filesystems/glusterfs.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=6536, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n inherit (pkgs) glusterfs rsync;\n\n tlsCmd = if (cfg.tlsSettings != null) then\n ''\n mkdir -p /var/lib/glusterd\n touch /var/lib/glusterd/secure-access\n ''\n else\n ''\n rm -f /var/lib/glusterd/secure-access\n '';\n\n restartTriggers = if (cfg.tlsS"..., 6536) = 6536
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/network-filesystems/kbfs.nix", {st_mode=S_IFREG|0444, st_size=1512, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/network-filesystems/kbfs.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=1512, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\nwith lib;\nlet\n cfg = config.services.kbfs;\n\nin {\n\n ###### interface\n\n options = {\n\n services.kbfs = {\n\n enable = mkOption {\n type = types.bool;\n default = false;\n description = \"Whether to mount the Keybase filesystem.\";\n };\n\n mou"..., 1512) = 1512
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/network-filesystems/ipfs.nix", {st_mode=S_IFREG|0444, st_size=8885, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/network-filesystems/ipfs.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=8885, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\nwith lib;\nlet\n inherit (pkgs) ipfs runCommand makeWrapper;\n\n cfg = config.services.ipfs;\n\n ipfsFlags = toString ([\n (optionalString cfg.autoMount \"--mount\")\n #(optionalString cfg.autoMigrate \"--migrate\")\n (optionalString cf"..., 8885) = 8885
close(3) = 0
brk(0x19672000) = 0x19672000
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/network-filesystems/netatalk.nix", {st_mode=S_IFREG|0444, st_size=3967, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/network-filesystems/netatalk.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=3967, ...}) = 0
read(3, "{ config, pkgs, lib, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.services.netatalk;\n\n extmapFile = pkgs.writeText \"extmap.conf\" cfg.extmap;\n\n afpToString = x: if builtins.typeOf x == \"bool\"\n then boolToString x\n else toString x;\n\n volumeConfig = name:\n let vol = "..., 3967) = 3967
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/network-filesystems/nfsd.nix", {st_mode=S_IFREG|0444, st_size=4275, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/network-filesystems/nfsd.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=4275, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.services.nfs.server;\n\n exports = pkgs.writeText \"exports\" cfg.exports;\n\nin\n\n{\n\n ###### interface\n\n options = {\n\n services.nfs = {\n\n server = {\n enable = mkOption {\n type = types.bool;\n default = false;\n "..., 4275) = 4275
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/network-filesystems/openafs/client.nix", {st_mode=S_IFREG|0444, st_size=7644, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/network-filesystems/openafs/client.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=7644, ...}) = 0
read(3, "{ config, pkgs, lib, ... }:\n\nwith import ./lib.nix { inherit lib; };\n\nlet\n inherit (lib) getBin mkOption mkIf optionalString singleton types;\n\n cfg = config.services.openafsClient;\n\n cellServDB = pkgs.fetchurl {\n url = http://dl.central.org/dl/cellservdb/CellServDB.2017-03-14;\n sha256 = \"11"..., 7644) = 7644
close(3) = 0
brk(0x19693000) = 0x19693000
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/network-filesystems/openafs/server.nix", {st_mode=S_IFREG|0444, st_size=9112, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/network-filesystems/openafs/server.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=9112, ...}) = 0
read(3, "{ config, pkgs, lib, ... }:\n\nwith import ./lib.nix { inherit lib; };\n\nlet\n inherit (lib) concatStringsSep intersperse mapAttrsToList mkForce mkIf mkMerge mkOption optionalString types;\n\n bosConfig = pkgs.writeText \"BosConfig\" (''\n restrictmode 1\n restarttime 16 0 0 0 0\n checkbintime 3 0 5"..., 9112) = 9112
close(3) = 0
brk(0x196b4000) = 0x196b4000
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/network-filesystems/rsyncd.nix", {st_mode=S_IFREG|0444, st_size=3002, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/network-filesystems/rsyncd.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=3002, ...}) = 0
read(3, "{ config, pkgs, lib, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.services.rsyncd;\n\n motdFile = builtins.toFile \"rsyncd-motd\" cfg.motd;\n\n foreach = attrs: f:\n concatStringsSep \"\\n\" (mapAttrsToList f attrs);\n\n cfgFile = ''\n ${optionalString (cfg.motd != \"\") \"motd file = ${motdFile}\"}\n ${optiona"..., 3002) = 3002
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/network-filesystems/samba.nix", {st_mode=S_IFREG|0444, st_size=7393, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/network-filesystems/samba.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=7393, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n smbToString = x: if builtins.typeOf x == \"bool\"\n then boolToString x\n else toString x;\n\n cfg = config.services.samba;\n\n samba = cfg.package;\n\n setupScript =\n ''\n mkdir -p /var/lock/samba /var/log/samba /var"..., 7393) = 7393
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/network-filesystems/tahoe.nix", {st_mode=S_IFREG|0444, st_size=14372, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/network-filesystems/tahoe.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=14372, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\nlet\n cfg = config.services.tahoe;\nin\n {\n options.services.tahoe = {\n introducers = mkOption {\n default = {};\n type = with types; attrsOf (submodule {\n options = {\n nickname = mkOption {\n type = types.str;"..., 14372) = 14372
close(3) = 0
brk(0x196d5000) = 0x196d5000
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/network-filesystems/diod.nix", {st_mode=S_IFREG|0444, st_size=5018, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/network-filesystems/diod.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=5018, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\nwith lib;\nlet\n cfg = config.services.diod;\n\n diodBool = b: if b then \"1\" else \"0\";\n\n diodConfig = pkgs.writeText \"diod.conf\" ''\n allsquash = ${diodBool cfg.allsquash}\n auth_required = ${diodBool cfg.authRequired}\n exportall = ${diodBool cfg.exportall}\n expo"..., 5018) = 5018
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/network-filesystems/u9fs.nix", {st_mode=S_IFREG|0444, st_size=1680, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/network-filesystems/u9fs.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=1680, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.u9fs;\nin\n{\n\n options = {\n\n services.u9fs = {\n\n enable = mkOption {\n type = types.bool;\n default = false;\n description = \"Whether to run the u9fs 9P server for Unix.\";\n };\n\n listenStreams = mkO"..., 1680) = 1680
close(3) = 0
brk(0x196f6000) = 0x196f6000
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/network-filesystems/yandex-disk.nix", {st_mode=S_IFREG|0444, st_size=2448, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/network-filesystems/yandex-disk.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=2448, ...}) = 0
read(3, "{ config, pkgs, lib, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.services.yandex-disk;\n\n dir = \"/var/lib/yandex-disk\";\n\n u = if cfg.user != null then cfg.user else \"yandexdisk\";\n\nin\n\n{\n\n ###### interface\n\n options = {\n\n services.yandex-disk = {\n\n enable = mkOption {\n default = false;\n "..., 2448) = 2448
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/network-filesystems/xtreemfs.nix", {st_mode=S_IFREG|0444, st_size=18407, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/network-filesystems/xtreemfs.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=18407, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.services.xtreemfs;\n\n xtreemfs = pkgs.xtreemfs;\n\n home = cfg.homeDir;\n\n startupScript = class: configPath: pkgs.writeScript \"xtreemfs-osd.sh\" ''\n #! ${pkgs.stdenv.shell}\n JAVA_HOME=\"${pkgs.jdk}\"\n JAVADIR=\"${xtreemfs}/share/java\"\n"..., 18407) = 18407
close(3) = 0
brk(0x19717000) = 0x19717000
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/amuled.nix", {st_mode=S_IFREG|0444, st_size=1562, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/amuled.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=1562, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.amule;\n user = if cfg.user != null then cfg.user else \"amule\";\nin\n\n{\n\n ###### interface\n\n options = {\n\n services.amule = {\n\n enable = mkOption {\n default = false;\n description = ''\n Whether to run t"..., 1562) = 1562
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/aria2.nix", {st_mode=S_IFREG|0444, st_size=4083, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/aria2.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=4083, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.aria2;\n\n homeDir = \"/var/lib/aria2\";\n\n settingsDir = \"${homeDir}\";\n sessionFile = \"${homeDir}/aria2.session\";\n downloadDir = \"${homeDir}/Downloads\";\n\n rangesToStringList = map (x: builtins.toString x.from +\"-\"+ builtins.toStrin"..., 4083) = 4083
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/asterisk.nix", {st_mode=S_IFREG|0444, st_size=8747, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/asterisk.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=8747, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.asterisk;\n\n asteriskUser = \"asterisk\";\n asteriskGroup = \"asterisk\";\n\n varlibdir = \"/var/lib/asterisk\";\n spooldir = \"/var/spool/asterisk\";\n logdir = \"/var/log/asterisk\";\n\n # Add filecontents from files of useTheseDefaultConfFil"..., 8747) = 8747
close(3) = 0
brk(0x19738000) = 0x19738000
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/atftpd.nix", {st_mode=S_IFREG|0444, st_size=1268, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/atftpd.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=1268, ...}) = 0
read(3, "# NixOS module for atftpd TFTP server\n\n{ config, pkgs, lib, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.services.atftpd;\n\nin\n\n{\n\n options = {\n\n services.atftpd = {\n\n enable = mkOption {\n default = false;\n type = types.bool;\n description = ''\n Whether to enable the a"..., 1268) = 1268
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/avahi-daemon.nix", {st_mode=S_IFREG|0444, st_size=7199, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/avahi-daemon.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=7199, ...}) = 0
read(3, "# Avahi daemon.\n{ config, lib, utils, pkgs, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.services.avahi;\n\n yesNo = yes : if yes then \"yes\" else \"no\";\n\n avahiDaemonConf = with cfg; pkgs.writeText \"avahi-daemon.conf\" ''\n [server]\n ${# Users can set `networking.hostName' to the empty string, when get"..., 7199) = 7199
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/babeld.nix", {st_mode=S_IFREG|0444, st_size=2542, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/babeld.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=2542, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.services.babeld;\n\n conditionalBoolToString = value: if (isBool value) then (boolToString value) else (toString value);\n\n paramsString = params:\n concatMapStringsSep \" \" (name: \"${name} ${conditionalBoolToString (getAttr name params)}\")"..., 2542) = 2542
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/bind.nix", {st_mode=S_IFREG|0444, st_size=4952, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/bind.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=4952, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.services.bind;\n\n bindUser = \"named\";\n\n confFile = pkgs.writeText \"named.conf\"\n ''\n include \"/etc/bind/rndc.key\";\n controls {\n inet 127.0.0.1 allow {localhost;} keys {\"rndc-key\";};\n };\n\n acl cachenetworks { ${"..., 4952) = 4952
close(3) = 0
brk(0x19759000) = 0x19759000
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/autossh.nix", {st_mode=S_IFREG|0444, st_size=3210, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/autossh.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=3210, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.services.autossh;\n\nin\n\n{\n\n ###### interface\n\n options = {\n\n services.autossh = {\n\n sessions = mkOption {\n type = types.listOf (types.submodule {\n options = {\n name = mkOption {\n type = types"..., 3210) = 3210
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/bird.nix", {st_mode=S_IFREG|0444, st_size=2519, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/bird.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=2519, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nlet\n inherit (lib) mkEnableOption mkIf mkOption types;\n\n generic = variant:\n let\n cfg = config.services.${variant};\n pkg = pkgs.${variant};\n birdBin = if variant == \"bird6\" then \"bird6\" else \"bird\";\n birdc = if variant == \"bird6\" then \"birdc6\" el"..., 2519) = 2519
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/bitlbee.nix", {st_mode=S_IFREG|0444, st_size=4902, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/bitlbee.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=4902, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.services.bitlbee;\n bitlbeeUid = config.ids.uids.bitlbee;\n\n bitlbeePkg = if cfg.libpurple_plugins == []\n then pkgs.bitlbee\n else pkgs.bitlbee.override { enableLibPurple = true; };\n\n bitlbeeConfig = pkgs.writeText \"bitlbee.conf\"\n ''\n "..., 4902) = 4902
close(3) = 0
brk(0x19769000) = 0x19769000
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/btsync.nix", {st_mode=S_IFREG|0444, st_size=9664, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/btsync.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=9664, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.btsync;\n\n bittorrentSync = cfg.package;\n\n listenAddr = cfg.httpListenAddr + \":\" + (toString cfg.httpListenPort);\n\n optionalEmptyStr = b: v: optionalString (b != \"\") v;\n\n webUIConfig = optionalString cfg.enableWebUI\n ''\n "..., 9664) = 9664
close(3) = 0
brk(0x1978a000) = 0x1978a000
brk(0x1978b000) = 0x1978b000
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/charybdis.nix", {st_mode=S_IFREG|0444, st_size=2542, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/charybdis.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=2542, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nlet\n inherit (lib) mkEnableOption mkIf mkOption singleton types;\n inherit (pkgs) coreutils charybdis;\n cfg = config.services.charybdis;\n\n configFile = pkgs.writeText \"charybdis.conf\" ''\n ${cfg.config}\n '';\nin\n\n{\n\n ###### interface\n\n options = {\n\n services.ch"..., 2542) = 2542
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/chrony.nix", {st_mode=S_IFREG|0444, st_size=3254, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/chrony.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=3254, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n inherit (pkgs) chrony;\n\n stateDir = \"/var/lib/chrony\";\n\n keyFile = \"/etc/chrony.keys\";\n\n cfg = config.services.chrony;\n\n configFile = pkgs.writeText \"chrony.conf\" ''\n ${concatMapStringsSep \"\\n\" (server: \"server \" + server) cfg.servers}\n\n ${opt"..., 3254) = 3254
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/cjdns.nix", {st_mode=S_IFREG|0444, st_size=8552, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/cjdns.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=8552, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n pkg = pkgs.cjdns;\n\n cfg = config.services.cjdns;\n\n connectToSubmodule =\n { options, ... }:\n { options =\n { password = mkOption {\n type = types.str;\n description = \"Authorized password to the opposite end of the tunnel.\";\n };\n "..., 8552) = 8552
close(3) = 0
brk(0x197ad000) = 0x197ad000
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/cntlm.nix", {st_mode=S_IFREG|0444, st_size=3414, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/cntlm.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=3414, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.services.cntlm;\n\n configFile = if cfg.configText != \"\" then\n pkgs.writeText \"cntlm.conf\" ''\n ${cfg.configText}\n ''\n else\n pkgs.writeText \"lighttpd.conf\" ''\n # Cntlm Authentication Proxy Configuration\n Username ${"..., 3414) = 3414
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/connman.nix", {st_mode=S_IFREG|0444, st_size=3340, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/connman.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=3340, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith pkgs;\nwith lib;\n\nlet\n cfg = config.networking.connman;\n configFile = pkgs.writeText \"connman.conf\" ''\n [General]\n NetworkInterfaceBlacklist=${concatStringsSep \",\" cfg.networkInterfaceBlacklist}\n\n ${cfg.extraConfig}\n '';\nin {\n\n ###### interface\n\n option"..., 3340) = 3340
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/consul.nix", {st_mode=S_IFREG|0444, st_size=7319, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/consul.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=7319, ...}) = 0
read(3, "{ config, lib, pkgs, utils, ... }:\n\nwith lib;\nlet\n\n dataDir = \"/var/lib/consul\";\n cfg = config.services.consul;\n\n configOptions = { data_dir = dataDir; } //\n (if cfg.webUi then { ui_dir = \"${cfg.package.ui}\"; } else { }) //\n cfg.extraConfig;\n\n configFiles = [ \"/etc/consul.json\" \"/etc/consu"..., 7319) = 7319
close(3) = 0
brk(0x197cf000) = 0x197cf000
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/coturn.nix", {st_mode=S_IFREG|0444, st_size=12121, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/coturn.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=12121, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\nwith lib;\nlet\n cfg = config.services.coturn;\n pidfile = \"/run/turnserver/turnserver.pid\";\n configFile = pkgs.writeText \"turnserver.conf\" ''\nlistening-port=${toString cfg.listening-port}\ntls-listening-port=${toString cfg.tls-listening-port}\nalt-listening-port=${toString"..., 12121) = 12121
close(3) = 0
brk(0x197f0000) = 0x197f0000
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/dante.nix", {st_mode=S_IFREG|0444, st_size=1444, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/dante.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=1444, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\nwith lib;\n\nlet\n cfg = config.services.dante;\n confFile = pkgs.writeText \"dante-sockd.conf\" ''\n user.privileged: root\n user.unprivileged: dante\n\n ${cfg.config}\n '';\nin\n\n{\n meta = {\n maintainers = with maintainers; [ arobyn ];\n };\n\n options = {\n service"..., 1444) = 1444
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/ddclient.nix", {st_mode=S_IFREG|0444, st_size=5031, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/ddclient.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=5031, ...}) = 0
read(3, "{ config, pkgs, lib, ... }:\n\nlet\n cfg = config.services.ddclient;\n boolToStr = bool: if bool then \"yes\" else \"no\";\n\n configText = ''\n # This file can be used as a template for configFile or is automatically generated by Nix options.\n daemon=${toString cfg.interval}\n cache=${cfg.homeDir}/"..., 5031) = 5031
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/dhcpcd.nix", {st_mode=S_IFREG|0444, st_size=7088, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/dhcpcd.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=7088, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n dhcpcd = if !config.boot.isContainer then pkgs.dhcpcd else pkgs.dhcpcd.override { udev = null; };\n\n cfg = config.networking.dhcpcd;\n\n interfaces = attrValues config.networking.interfaces;\n\n enableDHCP = config.networking.dhcpcd.enable &&\n (con"..., 7088) = 7088
close(3) = 0
brk(0x19811000) = 0x19811000
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/dhcpd.nix", {st_mode=S_IFREG|0444, st_size=5106, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/dhcpd.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=5106, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n cfg4 = config.services.dhcpd4;\n cfg6 = config.services.dhcpd6;\n\n writeConfig = cfg: pkgs.writeText \"dhcpd.conf\"\n ''\n default-lease-time 600;\n max-lease-time 7200;\n authoritative;\n ddns-update-style interim;\n log-facility lo"..., 5106) = 5106
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/dnscache.nix", {st_mode=S_IFREG|0444, st_size=2533, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/dnscache.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=2533, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.dnscache;\n\n dnscache-root = pkgs.runCommand \"dnscache-root\" {} ''\n mkdir -p $out/{servers,ip}\n\n ${concatMapStrings (ip: ''\n echo > \"$out/ip/\"${lib.escapeShellArg ip}\n '') cfg.clientIps}\n\n ${concatStrings (mapAttrsT"..., 2533) = 2533
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/dnschain.nix", {st_mode=S_IFREG|0444, st_size=4437, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/dnschain.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=4437, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfgs = config.services;\n cfg = cfgs.dnschain;\n\n dataDir = \"/var/lib/dnschain\";\n username = \"dnschain\";\n\n configFile = pkgs.writeText \"dnschain.conf\" ''\n [log]\n level = info\n\n [dns]\n host = ${cfg.dns.address}\n port = ${toString cfg.dn"..., 4437) = 4437
close(3) = 0
brk(0x19832000) = 0x19832000
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/dnscrypt-proxy.nix", {st_mode=S_IFREG|0444, st_size=9995, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/dnscrypt-proxy.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=9995, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\nwith lib;\n\nlet\n cfg = config.services.dnscrypt-proxy;\n\n stateDirectory = \"/var/lib/dnscrypt-proxy\";\n\n # The minisign public key used to sign the upstream resolver list.\n # This is somewhat more flexible than preloading the key as an\n # embedded string.\n upstreamReso"..., 9995) = 9995
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/dnscrypt-wrapper.nix", {st_mode=S_IFREG|0444, st_size=5607, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/dnscrypt-wrapper.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=5607, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\nwith lib;\n\nlet\n cfg = config.services.dnscrypt-wrapper;\n dataDir = \"/var/lib/dnscrypt-wrapper\";\n\n daemonArgs = with cfg; [\n \"--listen-address=${address}:${toString port}\"\n \"--resolver-address=${upstream.address}:${toString upstream.port}\"\n \"--provider-name"..., 5607) = 5607
close(3) = 0
brk(0x19853000) = 0x19853000
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/dnsmasq.nix", {st_mode=S_IFREG|0444, st_size=3024, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/dnsmasq.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=3024, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.dnsmasq;\n dnsmasq = pkgs.dnsmasq;\n stateDir = \"/var/lib/dnsmasq\";\n\n dnsmasqConf = pkgs.writeText \"dnsmasq.conf\" ''\n dhcp-leasefile=${stateDir}/dnsmasq.leases\n ${optionalString cfg.resolveLocalQueries ''\n conf-file=/etc"..., 3024) = 3024
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/ejabberd.nix", {st_mode=S_IFREG|0444, st_size=4448, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/ejabberd.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=4448, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.services.ejabberd;\n\n ctlcfg = pkgs.writeText \"ejabberdctl.cfg\" ''\n ERL_EPMD_ADDRESS=127.0.0.1\n ${cfg.ctlConfig}\n '';\n\n ectl = ''${cfg.package}/bin/ejabberdctl ${if cfg.configFile == null then \"\" else \"--config ${cfg.configFile}\"} -"..., 4448) = 4448
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/fakeroute.nix", {st_mode=S_IFREG|0444, st_size=1159, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/fakeroute.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=1159, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.fakeroute;\n routeConf = pkgs.writeText \"route.conf\" (concatStringsSep \"\\n\" cfg.route);\n\nin\n\n{\n\n ###### interface\n\n options = {\n\n services.fakeroute = {\n\n enable = mkOption {\n type = types.bool;\n default = fa"..., 1159) = 1159
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/ferm.nix", {st_mode=S_IFREG|0444, st_size=1701, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/ferm.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=1701, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.ferm;\n\n configFile = pkgs.stdenv.mkDerivation {\n name = \"ferm.conf\";\n text = cfg.config;\n preferLocalBuild = true;\n buildCommand = ''\n echo -n \"$text\" > $out\n ${cfg.package}/bin/ferm --noexec $out\n '';\n };"..., 1701) = 1701
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/firefox/sync-server.nix", {st_mode=S_IFREG|0444, st_size=5732, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/firefox/sync-server.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=5732, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.firefox.syncserver;\n\n defaultDbLocation = \"/var/db/firefox-sync-server/firefox-sync-server.db\";\n defaultSqlUri = \"sqlite:///${defaultDbLocation}\";\n\n syncServerIni = pkgs.writeText \"syncserver.ini\" ''\n [DEFAULT]\n overrides ="..., 5732) = 5732
close(3) = 0
brk(0x19874000) = 0x19874000
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/fireqos.nix", {st_mode=S_IFREG|0444, st_size=1285, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/fireqos.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=1285, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.fireqos;\n fireqosConfig = pkgs.writeText \"fireqos.conf\" \"${cfg.config}\";\nin {\n options.services.fireqos = {\n enable = mkOption {\n type = types.bool;\n default = false;\n description = ''\n If enabled, FireQOS"..., 1285) = 1285
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/firewall.nix", {st_mode=S_IFREG|0444, st_size=18376, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/firewall.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=18376, ...}) = 0
read(3, "/* This module enables a simple firewall.\n\n The firewall can be customised in arbitrary ways by setting\n \342\200\230networking.firewall.extraCommands\342\200\231. For modularity, the firewall\n uses several chains:\n\n - \342\200\230nixos-fw\342\200\231 is the main chain for input packet processing.\n\n - \342\200\230nixos-fw-accept\342\200\231 "..., 18376) = 18376
close(3) = 0
brk(0x19895000) = 0x19895000
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/flannel.nix", {st_mode=S_IFREG|0444, st_size=4296, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/flannel.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=4296, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.flannel;\n\n networkConfig = filterAttrs (n: v: v != null) {\n Network = cfg.network;\n SubnetLen = cfg.subnetLen;\n SubnetMin = cfg.subnetMin;\n SubnetMax = cfg.subnetMax;\n Backend = cfg.backend;\n };\nin {\n options.servi"..., 4296) = 4296
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/flashpolicyd.nix", {st_mode=S_IFREG|0444, st_size=2064, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/flashpolicyd.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=2064, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.services.flashpolicyd;\n\n flashpolicyd = pkgs.stdenv.mkDerivation {\n name = \"flashpolicyd-0.6\";\n\n src = pkgs.fetchurl {\n name = \"flashpolicyd_v0.6.zip\";\n url = \"http://www.adobe.com/content/dotcom/en/devnet/flashplayer/artic"..., 2064) = 2064
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/freenet.nix", {st_mode=S_IFREG|0444, st_size=1207, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/freenet.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=1207, ...}) = 0
read(3, "# NixOS module for Freenet daemon\n\n{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.services.freenet;\n varDir = \"/var/lib/freenet\";\n\nin\n\n{\n\n ### configuration\n\n options = {\n\n services.freenet = {\n\n enable = mkOption {\n type = types.bool;\n default = false;\n "..., 1207) = 1207
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/gale.nix", {st_mode=S_IFREG|0444, st_size=5683, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/gale.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=5683, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.gale;\n # we convert the path to a string to avoid it being copied to the nix store,\n # otherwise users could read the private key as all files in the store are\n # world-readable\n keyPath = toString cfg.keyPath;\n # ...but we ref"..., 5683) = 5683
close(3) = 0
brk(0x198b6000) = 0x198b6000
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/gateone.nix", {st_mode=S_IFREG|0444, st_size=1822, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/gateone.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=1822, ...}) = 0
read(3, "{ config, lib, pkgs, ...}:\nwith lib;\nlet\n cfg = config.services.gateone;\nin\n{\noptions = {\n services.gateone = {\n enable = mkEnableOption \"GateOne server\";\n pidDir = mkOption {\n default = \"/run/gateone\";\n type = types.path;\n description = ''Path of pid files for Gat"..., 1822) = 1822
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/gdomap.nix", {st_mode=S_IFREG|0444, st_size=636, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/gdomap.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=636, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.gdomap;\nin\n{\n #\n # interface\n #\n options = {\n services.gdomap = {\n enable = mkEnableOption \"GNUstep Distributed Objects name server\";\n };\n };\n\n #\n # implementation\n #\n config = mkIf config.services.gdomap.enable {"..., 636) = 636
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/git-daemon.nix", {st_mode=S_IFREG|0444, st_size=3922, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/git-daemon.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=3922, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\nwith lib;\nlet\n\n cfg = config.services.gitDaemon;\n\nin\n{\n\n ###### interface\n\n options = {\n services.gitDaemon = {\n\n enable = mkOption {\n type = types.bool;\n default = false;\n description = ''\n Enable Git daemon, which allows public h"..., 3922) = 3922
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/gnunet.nix", {st_mode=S_IFREG|0444, st_size=3426, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/gnunet.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=3426, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.services.gnunet;\n\n homeDir = \"/var/lib/gnunet\";\n\n configFile = with cfg; pkgs.writeText \"gnunetd.conf\"\n ''\n [PATHS]\n SERVICEHOME = ${homeDir}\n\n [ats]\n WAN_QUOTA_IN = ${toString load.maxNetDownBandwidth} b\n WAN_"..., 3426) = 3426
close(3) = 0
brk(0x198d7000) = 0x198d7000
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/gogoclient.nix", {st_mode=S_IFREG|0444, st_size=2121, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/gogoclient.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=2121, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet cfg = config.services.gogoclient;\nin\n\n{\n\n ###### interface\n\n options = {\n services.gogoclient = {\n enable = mkOption {\n default = false;\n type = types.bool;\n description = ''\n Enable the gogoCLIENT IPv6 tunnel.\n "..., 2121) = 2121
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/gvpe.nix", {st_mode=S_IFREG|0444, st_size=3105, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/gvpe.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=3105, ...}) = 0
read(3, "# GNU Virtual Private Ethernet\n\n{config, pkgs, lib, ...}:\n\nlet\n inherit (lib) mkOption mkIf;\n\n cfg = config.services.gvpe;\n\n finalConfig = if cfg.configFile != null then\n cfg.configFile\n else if cfg.configText != null then\n pkgs.writeTextFile {\n name = \"gvpe.conf\";\n text = cfg.co"..., 3105) = 3105
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/haproxy.nix", {st_mode=S_IFREG|0444, st_size=1594, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/haproxy.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=1594, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\nlet\n cfg = config.services.haproxy;\n haproxyCfg = pkgs.writeText \"haproxy.conf\" cfg.config;\nin\nwith lib;\n{\n options = {\n services.haproxy = {\n\n enable = mkOption {\n type = types.bool;\n default = false;\n description = ''\n Whether to"..., 1594) = 1594
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/heyefi.nix", {st_mode=S_IFREG|0444, st_size=1620, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/heyefi.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=1620, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.services.heyefi;\nin\n\n{\n\n ###### interface\n\n options = {\n\n services.heyefi = {\n\n enable = mkEnableOption \"heyefi\";\n\n cardMacaddress = mkOption {\n default = \"\";\n description = ''\n An Eye-Fi card MAC addre"..., 1620) = 1620
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/hostapd.nix", {st_mode=S_IFREG|0444, st_size=4592, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/hostapd.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=4592, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\n# TODO:\n#\n# asserts\n# ensure that the nl80211 module is loaded/compiled in the kernel\n# wpa_supplicant and hostapd on the same wireless interface doesn't make any sense\n\nwith lib;\n\nlet\n\n cfg = config.services.hostapd;\n\n configFile = pkgs.writeText \"hostapd.conf\" ''"..., 4592) = 4592
close(3) = 0
brk(0x198f8000) = 0x198f8000
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/htpdate.nix", {st_mode=S_IFREG|0444, st_size=1518, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/htpdate.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=1518, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n inherit (pkgs) htpdate;\n\n cfg = config.services.htpdate;\nin\n\n{\n\n ###### interface\n\n options = {\n\n services.htpdate = {\n\n enable = mkOption {\n type = types.bool;\n default = false;\n description = ''\n Enable htpdate "..., 1518) = 1518
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/i2pd.nix", {st_mode=S_IFREG|0444, st_size=13469, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/i2pd.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=13469, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.services.i2pd;\n\n homeDir = \"/var/lib/i2pd\";\n\n mkEndpointOpt = name: addr: port: {\n enable = mkEnableOption name;\n name = mkOption {\n type = types.str;\n default = name;\n description = \"The endpoint name.\";\n };\n a"..., 13469) = 13469
close(3) = 0
brk(0x19919000) = 0x19919000
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/i2p.nix", {st_mode=S_IFREG|0444, st_size=843, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/i2p.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=843, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.i2p;\n homeDir = \"/var/lib/i2p\";\nin {\n ###### interface\n options.services.i2p.enable = mkEnableOption \"I2P router\";\n\n ###### implementation\n config = mkIf cfg.enable {\n users.extraUsers.i2p = {\n group = \"i2p\";\n desc"..., 843) = 843
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/iodine.nix", {st_mode=S_IFREG|0444, st_size=3847, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/iodine.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=3847, ...}) = 0
read(3, "# NixOS module for iodine, ip over dns daemon\n\n{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.iodine;\n\n iodinedUser = \"iodined\";\n\nin\n{\n\n ### configuration\n\n options = {\n\n services.iodine = {\n clients = mkOption {\n default = {};\n description = ''\n "..., 3847) = 3847
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/ircd-hybrid/default.nix", {st_mode=S_IFREG|0444, st_size=2908, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/ircd-hybrid/default.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=2908, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.services.ircdHybrid;\n\n ircdService = pkgs.stdenv.mkDerivation rec {\n name = \"ircd-hybrid-service\";\n scripts = [ \"=>/bin\" ./control.in ];\n substFiles = [ \"=>/conf\" ./ircd.conf ];\n inherit (pkgs) ircdHybrid coreutils su iproute g"..., 2908) = 2908
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/iwd.nix", {st_mode=S_IFREG|0444, st_size=856, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/iwd.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=856, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.networking.wireless.iwd;\nin {\n options.networking.wireless.iwd.enable = mkEnableOption \"iwd\";\n\n config = mkIf cfg.enable {\n assertions = [{\n assertion = !config.networking.wireless.enable;\n message = ''\n Only one wirele"..., 856) = 856
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/keepalived/default.nix", {st_mode=S_IFREG|0444, st_size=7165, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/keepalived/default.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=7165, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.services.keepalived;\n\n keepalivedConf = pkgs.writeText \"keepalived.conf\" ''\n global_defs {\n ${snmpGlobalDefs}\n ${cfg.extraGlobalDefs}\n }\n\n ${vrrpInstancesStr}\n ${cfg.extraConfig}\n '';\n\n snmpGlobalDefs = with cfg.snm"..., 7165) = 7165
close(3) = 0
brk(0x1993a000) = 0x1993a000
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/keybase.nix", {st_mode=S_IFREG|0444, st_size=731, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/keybase.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=731, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\nwith lib;\nlet\n cfg = config.services.keybase;\n\nin {\n\n ###### interface\n\n options = {\n\n services.keybase = {\n\n enable = mkOption {\n type = types.bool;\n default = false;\n description = \"Whether to start the Keybase service.\";\n };\n\n };"..., 731) = 731
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/kippo.nix", {st_mode=S_IFREG|0444, st_size=4352, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/kippo.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=4352, ...}) = 0
read(3, "# NixOS module for kippo honeypot ssh server\n# See all the options for configuration details.\n#\n# Default port is 2222. Recommend using something like this for port redirection to default SSH port:\n# networking.firewall.extraCommands = ''\n# iptables -t nat -A PREROUTING -i IN_IFACE -p tcp --dpo"..., 4352) = 4352
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/kresd.nix", {st_mode=S_IFREG|0444, st_size=3814, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/kresd.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=3814, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.services.kresd;\n package = pkgs.knot-resolver;\n\n configFile = pkgs.writeText \"kresd.conf\" cfg.extraConfig;\nin\n\n{\n meta.maintainers = [ maintainers.vcunat /* upstream developer */ ];\n\n ###### interface\n options.services.kresd = {\n en"..., 3814) = 3814
close(3) = 0
brk(0x1995d000) = 0x1995d000
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/lambdabot.nix", {st_mode=S_IFREG|0444, st_size=1626, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/lambdabot.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=1626, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.services.lambdabot;\n\n rc = builtins.toFile \"script.rc\" cfg.script;\n\nin\n\n{\n\n ### configuration\n\n options = {\n\n services.lambdabot = {\n\n enable = mkOption {\n type = types.bool;\n default = false;\n description = "..., 1626) = 1626
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/libreswan.nix", {st_mode=S_IFREG|0444, st_size=3414, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/libreswan.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=3414, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.services.libreswan;\n\n libexec = \"${pkgs.libreswan}/libexec/ipsec\";\n ipsec = \"${pkgs.libreswan}/sbin/ipsec\";\n\n trim = chars: str: let\n nonchars = filter (x : !(elem x.value chars))\n (imap0 (i: v: {ind = i; value = v;"..., 3414) = 3414
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/lldpd.nix", {st_mode=S_IFREG|0444, st_size=849, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/lldpd.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=849, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.lldpd;\n\nin\n\n{\n options.services.lldpd = {\n enable = mkEnableOption \"Link Layer Discovery Protocol Daemon\";\n\n extraArgs = mkOption {\n type = types.listOf types.str;\n default = [];\n example = [ \"-c\" \"-k\" \"-I eth0"..., 849) = 849
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/logmein-hamachi.nix", {st_mode=S_IFREG|0444, st_size=829, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/logmein-hamachi.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=829, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.services.logmein-hamachi;\n\nin\n\n{\n\n ###### interface\n\n options = {\n\n services.logmein-hamachi.enable = mkOption {\n type = types.bool;\n default = false;\n description =\n ''\n Whether to enable LogMeIn Hamachi"..., 829) = 829
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/mailpile.nix", {st_mode=S_IFREG|0444, st_size=1684, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/mailpile.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=1684, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.services.mailpile;\n\n hostname = cfg.hostname;\n port = cfg.port;\n\nin\n\n{\n\n ###### interface\n\n options = {\n\n services.mailpile = {\n enable = mkOption {\n default = false;\n description = \"\n Whether to enable Ma"..., 1684) = 1684
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/matterbridge.nix", {st_mode=S_IFREG|0444, st_size=2421, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/matterbridge.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=2421, ...}) = 0
read(3, "{ config, pkgs, lib, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.services.matterbridge;\n\n matterbridgeConfToml = pkgs.writeText \"matterbridge.toml\" (cfg.configFile);\n\nin\n\n{\n options = {\n services.matterbridge = {\n enable = mkEnableOption \"Matterbridge chat platform bridge\";\n\n configFile = "..., 2421) = 2421
close(3) = 0
brk(0x1997e000) = 0x1997e000
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/mjpg-streamer.nix", {st_mode=S_IFREG|0444, st_size=1796, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/mjpg-streamer.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=1796, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.services.mjpg-streamer;\n\nin {\n\n options = {\n\n services.mjpg-streamer = {\n\n enable = mkEnableOption \"mjpg-streamer webcam streamer\";\n\n inputPlugin = mkOption {\n type = types.str;\n default = \"input_uvc.so\";\n "..., 1796) = 1796
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/minidlna.nix", {st_mode=S_IFREG|0444, st_size=2503, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/minidlna.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=2503, ...}) = 0
read(3, "# Module for MiniDLNA, a simple DLNA server.\n\n{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.services.minidlna;\n\n port = 8200;\n\nin\n\n{\n\n ###### interface\n\n options = {\n\n services.minidlna.enable = mkOption {\n type = types.bool;\n default = false;\n description =\n "..., 2503) = 2503
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/miniupnpd.nix", {st_mode=S_IFREG|0444, st_size=3020, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/miniupnpd.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=3020, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.miniupnpd;\n configFile = pkgs.writeText \"miniupnpd.conf\" ''\n ext_ifname=${cfg.externalInterface}\n enable_natpmp=${if cfg.natpmp then \"yes\" else \"no\"}\n enable_upnp=${if cfg.upnp then \"yes\" else \"no\"}\n\n ${concatMapStrings"..., 3020) = 3020
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/mosquitto.nix", {st_mode=S_IFREG|0444, st_size=6116, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/mosquitto.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=6116, ...}) = 0
read(3, "{ config, lib, pkgs, ...}:\n\nwith lib;\n\nlet\n cfg = config.services.mosquitto;\n\n listenerConf = optionalString cfg.ssl.enable ''\n listener ${toString cfg.ssl.port} ${cfg.ssl.host}\n cafile ${cfg.ssl.cafile}\n certfile ${cfg.ssl.certfile}\n keyfile ${cfg.ssl.keyfile}\n '';\n\n passwordConf = "..., 6116) = 6116
close(3) = 0
brk(0x1999f000) = 0x1999f000
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/monero.nix", {st_mode=S_IFREG|0444, st_size=5690, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/monero.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=5690, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.monero;\n dataDir = \"/var/lib/monero\";\n\n listToConf = option: list:\n concatMapStrings (value: \"${option}=${value}\\n\") list;\n\n login = (cfg.rpc.user != null && cfg.rpc.password != null);\n\n configFile = with cfg; pkgs.writeT"..., 5690) = 5690
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/miredo.nix", {st_mode=S_IFREG|0444, st_size=2425, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/miredo.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=2425, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.miredo;\n pidFile = \"/run/miredo.pid\";\n miredoConf = pkgs.writeText \"miredo.conf\" ''\n InterfaceName ${cfg.interfaceName}\n ServerAddress ${cfg.serverAddress}\n ${optionalString (cfg.bindAddress != null) \"BindAddress ${cfg.bi"..., 2425) = 2425
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/mstpd.nix", {st_mode=S_IFREG|0444, st_size=731, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/mstpd.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=731, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\nlet\n cfg = config.services.mstpd;\nin\nwith lib;\n{\n options.services.mstpd = {\n \n enable = mkOption {\n default = false;\n type = types.bool;\n description = ''\n Whether to enable the multiple spanning tree protocol daemon.\n '';\n };\n\n };\n"..., 731) = 731
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/murmur.nix", {st_mode=S_IFREG|0444, st_size=7519, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/murmur.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=7519, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.murmur;\n configFile = pkgs.writeText \"murmurd.ini\" ''\n database=/var/lib/murmur/murmur.sqlite\n dbDriver=QSQLITE\n\n autobanAttempts=${toString cfg.autobanAttempts}\n autobanTimeframe=${toString cfg.autobanTimeframe}\n au"..., 7519) = 7519
close(3) = 0
brk(0x199c0000) = 0x199c0000
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/namecoind.nix", {st_mode=S_IFREG|0444, st_size=5250, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/namecoind.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=5250, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.namecoind;\n dataDir = \"/var/lib/namecoind\";\n useSSL = (cfg.rpc.certificate != null) && (cfg.rpc.key != null);\n useRPC = (cfg.rpc.user != null) && (cfg.rpc.password != null);\n\n listToConf = option: list:\n concatMapString"..., 5250) = 5250
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/nat.nix", {st_mode=S_IFREG|0444, st_size=8558, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/nat.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=8558, ...}) = 0
read(3, "# This module enables Network Address Translation (NAT).\n# XXX: todo: support multiple upstream links\n# see http://yesican.chsoft.biz/lartc/MultihomedLinuxNetworking.html\n\n{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.networking.nat;\n\n dest = if cfg.externalIP == null then \"-j MASQUER"..., 8558) = 8558
close(3) = 0
brk(0x199e2000) = 0x199e2000
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/networkmanager.nix", {st_mode=S_IFREG|0444, st_size=11503, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/networkmanager.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=11503, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith pkgs;\nwith lib;\n\nlet\n cfg = config.networking.networkmanager;\n\n # /var/lib/misc is for dnsmasq.leases.\n stateDirs = \"/var/lib/NetworkManager /var/lib/dhclient /var/lib/misc\";\n\n dns =\n if cfg.useDnsmasq then \"dnsmasq\"\n else if config.services.resolved.enabl"..., 11503) = 11503
close(3) = 0
brk(0x19a03000) = 0x19a03000
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/nftables.nix", {st_mode=S_IFREG|0444, st_size=4511, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/nftables.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=4511, ...}) = 0
read(3, "{ config, pkgs, lib, ... }:\nwith lib;\nlet\n cfg = config.networking.nftables;\nin\n{\n ###### interface\n\n options = {\n networking.nftables.enable = mkOption {\n type = types.bool;\n default = false;\n description =\n ''\n Whether to enable nftables. nftables is a Linux-b"..., 4511) = 4511
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/ngircd.nix", {st_mode=S_IFREG|0444, st_size=1245, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/ngircd.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=1245, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.ngircd;\n\n configFile = pkgs.stdenv.mkDerivation {\n name = \"ngircd.conf\";\n\n text = cfg.config;\n\n preferLocalBuild = true;\n\n buildCommand = ''\n echo -n \"$text\" > $out\n ${cfg.package}/sbin/ngircd --config $out --"..., 1245) = 1245
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/nghttpx/default.nix", {st_mode=S_IFREG|0444, st_size=3503, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/nghttpx/default.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=3503, ...}) = 0
read(3, "{config, pkgs, lib, ...}:\nlet\n cfg = config.services.nghttpx;\n\n # renderHost :: Either ServerOptions Path -> String\n renderHost = server:\n if builtins.isString server\n then \"unix://${server}\"\n else \"${server.host},${builtins.toString server.port}\";\n\n # Filter out submodule parameters wh"..., 3503) = 3503
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/nghttpx/nghttpx-options.nix", {st_mode=S_IFREG|0444, st_size=4281, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/nghttpx/nghttpx-options.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=4281, ...}) = 0
read(3, "{ config, lib, ... }:\n{ options.services.nghttpx = {\n enable = lib.mkEnableOption \"nghttpx\";\n\n frontends = lib.mkOption {\n type = lib.types.listOf (lib.types.submodule (import ./frontend-submodule.nix));\n description = ''\n A list of frontend listener specifications.\n "..., 4281) = 4281
close(3) = 0
brk(0x19a24000) = 0x19a24000
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/nix-serve.nix", {st_mode=S_IFREG|0444, st_size=1706, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/nix-serve.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=1706, ...}) = 0
read(3, "{ config, pkgs, lib, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.nix-serve;\nin\n{\n options = {\n services.nix-serve = {\n enable = mkEnableOption \"nix-serve, the standalone Nix binary cache server\";\n\n port = mkOption {\n type = types.int;\n default = 5000;\n descripti"..., 1706) = 1706
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/nixops-dns.nix", {st_mode=S_IFREG|0444, st_size=1899, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/nixops-dns.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=1899, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\nlet\n pkg = pkgs.nixops-dns;\n cfg = config.services.nixops-dns;\nin\n\n{\n options = {\n services.nixops-dns = {\n enable = mkOption {\n type = types.bool;\n default = false;\n description = ''\n Whether to enable the nixops-dns re"..., 1899) = 1899
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/nntp-proxy.nix", {st_mode=S_IFREG|0444, st_size=6113, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/nntp-proxy.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=6113, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n inherit (pkgs) nntp-proxy;\n\n proxyUser = \"nntp-proxy\";\n\n cfg = config.services.nntp-proxy;\n\n configBool = b: if b then \"TRUE\" else \"FALSE\";\n\n confFile = pkgs.writeText \"nntp-proxy.conf\" ''\n nntp_server:\n {\n # NNTP Server host and port add"..., 6113) = 6113
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/nsd.nix", {st_mode=S_IFREG|0444, st_size=25419, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/nsd.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=25419, ...}) = 0
read(3, "{ config, pkgs, lib, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.nsd;\n\n username = \"nsd\";\n stateDir = \"/var/lib/nsd\";\n pidFile = stateDir + \"/var/nsd.pid\";\n\n # build nsd with the options needed for the given config\n nsdPkg = pkgs.nsd.override {\n configFile = \"${configFile}/nsd.conf\";\n\n "..., 25419) = 25419
brk(0x19a49000) = 0x19a49000
close(3) = 0
brk(0x19a6a000) = 0x19a6a000
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/ntopng.nix", {st_mode=S_IFREG|0444, st_size=3100, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/ntopng.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=3100, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.services.ntopng;\n redisCfg = config.services.redis;\n\n configFile = if cfg.configText != \"\" then\n pkgs.writeText \"ntopng.conf\" ''\n ${cfg.configText}\n ''\n else\n pkgs.writeText \"ntopng.conf\" ''\n ${concatStringsSep \" \" ("..., 3100) = 3100
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/ntpd.nix", {st_mode=S_IFREG|0444, st_size=1912, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/ntpd.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=1912, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n inherit (pkgs) ntp;\n\n cfg = config.services.ntp;\n\n stateDir = \"/var/lib/ntp\";\n\n ntpUser = \"ntp\";\n\n configFile = pkgs.writeText \"ntp.conf\" ''\n driftfile ${stateDir}/ntp.drift\n\n restrict 127.0.0.1\n restrict -6 ::1\n\n ${toString (map (server"..., 1912) = 1912
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/nylon.nix", {st_mode=S_IFREG|0444, st_size=4192, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/nylon.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=4192, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.services.nylon;\n\n homeDir = \"/var/lib/nylon\";\n\n configFile = cfg: pkgs.writeText \"nylon-${cfg.name}.conf\" ''\n [General]\n No-Simultaneous-Conn=${toString cfg.nrConnections}\n Log=${if cfg.logging then \"1\" else \"0\"}\n Verbose=${if"..., 4192) = 4192
close(3) = 0
brk(0x19a8b000) = 0x19a8b000
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/oidentd.nix", {st_mode=S_IFREG|0444, st_size=1005, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/oidentd.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=1005, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\n{\n\n ###### interface\n\n options = {\n\n services.oidentd.enable = mkOption {\n default = false;\n type = types.bool;\n description = ''\n Whether to enable \342\200\230oidentd\342\200\231, an implementation of the Ident\n protocol (RFC 1413). It allow"..., 1005) = 1005
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/openfire.nix", {st_mode=S_IFREG|0444, st_size=1422, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/openfire.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=1422, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\n{\n ###### interface\n\n options = {\n\n services.openfire = {\n\n enable = mkOption {\n default = false;\n description = \"\n Whether to enable OpenFire XMPP server.\n \";\n };\n\n usePostgreSQL = mkOption {\n default ="..., 1422) = 1422
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/openntpd.nix", {st_mode=S_IFREG|0444, st_size=1928, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/openntpd.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=1928, ...}) = 0
read(3, "{ pkgs, lib, config, options, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.openntpd;\n\n package = pkgs.openntpd_nixos;\n\n cfgFile = pkgs.writeText \"openntpd.conf\" ''\n ${concatStringsSep \"\\n\" (map (s: \"server ${s}\") cfg.servers)}\n ${cfg.extraConfig}\n '';\n\n pidFile = \"/run/openntpd.pid\";\n\nin"..., 1928) = 1928
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/openvpn.nix", {st_mode=S_IFREG|0444, st_size=6283, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/openvpn.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=6283, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.services.openvpn;\n\n inherit (pkgs) openvpn;\n\n makeOpenVPNJob = cfg: name:\n let\n\n path = (getAttr \"openvpn-${name}\" config.systemd.services).path;\n\n upScript = ''\n #! /bin/sh\n export PATH=${path}\n\n # For c"..., 6283) = 6283
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/ostinato.nix", {st_mode=S_IFREG|0444, st_size=2587, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/ostinato.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=2587, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n pkg = pkgs.ostinato;\n cfg = config.services.ostinato;\n configFile = pkgs.writeText \"drone.ini\" ''\n [General]\n RateAccuracy=${cfg.rateAccuracy}\n\n [RpcServer]\n Address=${cfg.rpcServer.address}\n\n [PortList]\n Include=${concatStringsSep \","..., 2587) = 2587
close(3) = 0
brk(0x19aac000) = 0x19aac000
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/pdnsd.nix", {st_mode=S_IFREG|0444, st_size=2268, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/pdnsd.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=2268, ...}) = 0
read(3, "{ config, pkgs, lib, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.pdnsd;\n pdnsd = pkgs.pdnsd;\n pdnsdUser = \"pdnsd\";\n pdnsdGroup = \"pdnsd\";\n pdnsdConf = pkgs.writeText \"pdnsd.conf\"\n ''\n global {\n run_as=${pdnsdUser};\n cache_dir=\"${cfg.cacheDir}\";\n ${cfg.globalConfig"..., 2268) = 2268
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/polipo.nix", {st_mode=S_IFREG|0444, st_size=2848, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/polipo.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=2848, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.services.polipo;\n\n polipoConfig = pkgs.writeText \"polipo.conf\" ''\n proxyAddress = ${cfg.proxyAddress}\n proxyPort = ${toString cfg.proxyPort}\n allowedClients = ${concatStringsSep \", \" cfg.allowedClients}\n ${optionalString (cfg.p"..., 2848) = 2848
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/powerdns.nix", {st_mode=S_IFREG|0444, st_size=1697, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/powerdns.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=1697, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.powerdns;\n configDir = pkgs.writeTextDir \"pdns.conf\" \"${cfg.extraConfig}\";\nin {\n options = {\n services.powerdns = {\n enable = mkEnableOption \"Powerdns domain name server\";\n\n extraConfig = mkOption {\n type = typ"..., 1697) = 1697
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/pdns-recursor.nix", {st_mode=S_IFREG|0444, st_size=4589, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/pdns-recursor.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=4589, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n dataDir = \"/var/lib/pdns-recursor\";\n username = \"pdns-recursor\";\n\n cfg = config.services.pdns-recursor;\n zones = mapAttrsToList (zone: uri: \"${zone}.=${uri}\") cfg.forwardZones;\n\n configFile = pkgs.writeText \"recursor.conf\" ''\n local-address=${c"..., 4589) = 4589
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/pptpd.nix", {st_mode=S_IFREG|0444, st_size=3404, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/pptpd.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=3404, ...}) = 0
read(3, "{ config, stdenv, pkgs, lib, ... }:\n\nwith lib;\n\n{\n options = {\n services.pptpd = {\n enable = mkEnableOption \"Whether pptpd should be run on startup.\";\n\n serverIp = mkOption {\n type = types.string;\n description = \"The server-side IP address.\";\n default = "..., 3404) = 3404
close(3) = 0
brk(0x19acd000) = 0x19acd000
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/prayer.nix", {st_mode=S_IFREG|0444, st_size=2031, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/prayer.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=2031, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n inherit (pkgs) prayer;\n\n cfg = config.services.prayer;\n\n stateDir = \"/var/lib/prayer\";\n\n prayerUser = \"prayer\";\n prayerGroup = \"prayer\";\n\n prayerExtraCfg = pkgs.writeText \"extraprayer.cf\" ''\n prefix = \"${prayer}\"\n var_prefix = \"${stateDir}\"\n "..., 2031) = 2031
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/privoxy.nix", {st_mode=S_IFREG|0444, st_size=2851, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/privoxy.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=2851, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n inherit (pkgs) privoxy;\n\n cfg = config.services.privoxy;\n\n confFile = pkgs.writeText \"privoxy.conf\" ''\n user-manual ${privoxy}/share/doc/privoxy/user-manual\n confdir ${privoxy}/etc/\n listen-address ${cfg.listenAddress}\n enable-edit-action"..., 2851) = 2851
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/prosody.nix", {st_mode=S_IFREG|0444, st_size=7481, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/prosody.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=7481, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.services.prosody;\n\n sslOpts = { ... }: {\n\n options = {\n\n key = mkOption {\n type = types.path;\n description = \"Path to the key file.\";\n };\n\n cert = mkOption {\n type = types.path;\n description = "..., 7481) = 7481
close(3) = 0
brk(0x19aee000) = 0x19aee000
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/quassel.nix", {st_mode=S_IFREG|0444, st_size=2736, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/quassel.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=2736, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.quassel;\n quassel = cfg.package;\n user = if cfg.user != null then cfg.user else \"quassel\";\nin\n\n{\n\n ###### interface\n\n options = {\n\n services.quassel = {\n\n enable = mkOption {\n default = false;\n description "..., 2736) = 2736
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/racoon.nix", {st_mode=S_IFREG|0444, st_size=1136, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/racoon.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=1136, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.racoon;\nin {\n options.services.racoon = {\n enable = mkEnableOption \"racoon\";\n\n config = mkOption {\n description = \"Contents of racoon configuration file.\";\n default = \"\";\n type = types.str;\n };\n\n configPa"..., 1136) = 1136
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/radicale.nix", {st_mode=S_IFREG|0444, st_size=2321, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/radicale.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=2321, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.services.radicale;\n\n confFile = pkgs.writeText \"radicale.conf\" cfg.config;\n\n # This enables us to default to version 2 while still not breaking configurations of people with version 1\n defaultPackage = if versionAtLeast config.system.sta"..., 2321) = 2321
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/radvd.nix", {st_mode=S_IFREG|0444, st_size=1522, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/radvd.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=1522, ...}) = 0
read(3, "# Module for the IPv6 Router Advertisement Daemon.\n\n{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.services.radvd;\n\n confFile = pkgs.writeText \"radvd.conf\" cfg.config;\n\nin\n\n{\n\n ###### interface\n\n options = {\n\n services.radvd.enable = mkOption {\n default = false;\n descrip"..., 1522) = 1522
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/rdnssd.nix", {st_mode=S_IFREG|0444, st_size=1782, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/rdnssd.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=1782, ...}) = 0
read(3, "# Module for rdnssd, a daemon that configures DNS servers in\n# /etc/resolv/conf from IPv6 RDNSS advertisements.\n\n{ config, lib, pkgs, ... }:\n\nwith lib;\nlet\n mergeHook = pkgs.writeScript \"rdnssd-merge-hook\" ''\n #! ${pkgs.stdenv.shell} -e\n ${pkgs.openresolv}/bin/resolvconf -u\n '';\nin\n{\n\n ####"..., 1782) = 1782
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/redsocks.nix", {st_mode=S_IFREG|0444, st_size=8601, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/redsocks.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=8601, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\nlet\n cfg = config.services.redsocks;\nin\n{\n ##### interface\n options = {\n services.redsocks = {\n enable = mkOption {\n type = types.bool;\n default = false;\n description = \"Whether to enable redsocks.\";\n };\n\n log_debug = m"..., 8601) = 8601
close(3) = 0
brk(0x19b0f000) = 0x19b0f000
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/resilio.nix", {st_mode=S_IFREG|0444, st_size=8116, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/resilio.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=8116, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.resilio;\n\n resilioSync = pkgs.resilio-sync;\n\n sharedFoldersRecord = map (entry: {\n secret = entry.secret;\n dir = entry.directory;\n\n use_relay_server = entry.useRelayServer;\n use_tracker = entry.useTracker;\n use_dht "..., 8116) = 8116
close(3) = 0
brk(0x19b30000) = 0x19b30000
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/rpcbind.nix", {st_mode=S_IFREG|0444, st_size=821, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/rpcbind.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=821, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\n{\n\n ###### interface\n\n options = {\n\n services.rpcbind = {\n\n enable = mkOption {\n type = types.bool;\n default = false;\n description = ''\n Whether to enable `rpcbind', an ONC RPC directory service\n notably used by"..., 821) = 821
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/rxe.nix", {st_mode=S_IFREG|0444, st_size=1618, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/rxe.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=1618, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.networking.rxe;\n\n runRxeCmd = cmd: ifcs:\n concatStrings ( map (x: \"${pkgs.rdma-core}/bin/rxe_cfg -n ${cmd} ${x};\") ifcs);\n\n startScript = pkgs.writeShellScriptBin \"rxe-start\" ''\n ${pkgs.rdma-core}/bin/rxe_cfg -n start\n ${runRxeCmd"..., 1618) = 1618
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/sabnzbd.nix", {st_mode=S_IFREG|0444, st_size=1433, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/sabnzbd.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=1433, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.services.sabnzbd;\n inherit (pkgs) sabnzbd;\n\nin\n\n{\n\n ###### interface\n\n options = {\n services.sabnzbd = {\n enable = mkOption {\n default = false;\n description = \"Whether to enable the sabnzbd server.\";\n };\n "..., 1433) = 1433
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/searx.nix", {st_mode=S_IFREG|0444, st_size=1574, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/searx.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=1574, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.services.searx;\n\n configFile = cfg.configFile;\n\nin\n\n{\n\n ###### interface\n\n options = {\n\n services.searx = {\n\n enable = mkEnableOption\n \"the searx server. See https://github.com/asciimoo/searx\";\n\n configFile = mkOption"..., 1574) = 1574
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/seeks.nix", {st_mode=S_IFREG|0444, st_size=1316, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/seeks.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=1316, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.services.seeks;\n\n confDir = cfg.confDir;\n\n seeks = pkgs.seeks.override { seeks_confDir = confDir; };\n\nin\n\n{\n\n ###### interface\n\n options = {\n\n services.seeks = {\n\n enable = mkOption {\n default = false;\n type = type"..., 1316) = 1316
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/skydns.nix", {st_mode=S_IFREG|0444, st_size=2576, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/skydns.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=2576, ...}) = 0
read(3, "{ config, pkgs, lib, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.skydns;\n\nin {\n options.services.skydns = {\n enable = mkEnableOption \"skydns service\";\n\n etcd = {\n machines = mkOption {\n default = [ \"http://127.0.0.1:2379\" ];\n type = types.listOf types.str;\n descri"..., 2576) = 2576
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/shairport-sync.nix", {st_mode=S_IFREG|0444, st_size=1739, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/shairport-sync.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=1739, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.services.shairport-sync;\n\nin\n\n{\n\n ###### interface\n\n options = {\n\n services.shairport-sync = {\n\n enable = mkOption {\n default = false;\n description = ''\n Enable the shairport-sync daemon.\n\n Running "..., 1739) = 1739
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/shout.nix", {st_mode=S_IFREG|0444, st_size=3113, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/shout.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=3113, ...}) = 0
read(3, "{ pkgs, lib, config, options, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.shout;\n shoutHome = \"/var/lib/shout\";\n\n defaultConfig = pkgs.runCommand \"config.js\" {} ''\n EDITOR=true ${pkgs.shout}/bin/shout config --home $PWD\n mv config.js $out\n '';\n\n finalConfigFile = if (cfg.configFile != n"..., 3113) = 3113
close(3) = 0
brk(0x19b51000) = 0x19b51000
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/sniproxy.nix", {st_mode=S_IFREG|0444, st_size=2265, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/sniproxy.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=2265, ...}) = 0
read(3, "{ config, pkgs, lib, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.services.sniproxy;\n\n configFile = pkgs.writeText \"sniproxy.conf\" ''\n user ${cfg.user}\n pidfile /run/sniproxy.pid\n ${cfg.config}\n '';\n\nin\n{\n options = {\n services.sniproxy = {\n enable = mkEnableOption \"sniproxy server\";\n\n"..., 2265) = 2265
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/smokeping.nix", {st_mode=S_IFREG|0444, st_size=10068, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/smokeping.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=10068, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\nlet\n\n cfg = config.services.smokeping;\n smokepingHome = \"/var/lib/smokeping\";\n smokepingPidDir = \"/run\";\n configFile =\n if cfg.config == null\n then\n ''\n *** General ***\n cgiurl = ${cfg.cgiUrl}\n contact = ${cfg.own"..., 10068) = 10068
close(3) = 0
brk(0x19b72000) = 0x19b72000
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/softether.nix", {st_mode=S_IFREG|0444, st_size=4669, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/softether.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=4669, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.softether;\n\nin\n{\n\n ###### interface\n\n options = {\n\n services.softether = {\n\n enable = mkEnableOption \"SoftEther VPN services\";\n\n package = mkOption {\n type = types.package;\n default = pkgs.softether;\n "..., 4669) = 4669
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/spiped.nix", {st_mode=S_IFREG|0444, st_size=7757, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/spiped.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=7757, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.spiped;\nin\n{\n options = {\n services.spiped = {\n enable = mkOption {\n type = types.bool;\n default = false;\n description = \"Enable the spiped service module.\";\n };\n\n config = mkOption"..., 7757) = 7757
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/squid.nix", {st_mode=S_IFREG|0444, st_size=4810, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/squid.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=4810, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.services.squid;\n\n\n squidConfig = pkgs.writeText \"squid.conf\"\n (if cfg.configText != null then cfg.configText else\n ''\n #\n # Recommended minimum configuration (3.5):\n #\n\n # Example rule allowing access from your local netw"..., 4810) = 4810
close(3) = 0
brk(0x19b93000) = 0x19b93000
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/sslh.nix", {st_mode=S_IFREG|0444, st_size=2356, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/sslh.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=2356, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.sslh;\n configFile = pkgs.writeText \"sslh.conf\" ''\n verbose: ${boolToString cfg.verbose};\n foreground: true;\n inetd: false;\n numeric: false;\n transparent: false;\n timeout: \"${toString cfg.timeout}\";\n user: \"nobo"..., 2356) = 2356
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/ssh/lshd.nix", {st_mode=S_IFREG|0444, st_size=4949, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/ssh/lshd.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=4949, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n inherit (pkgs) lsh;\n\n cfg = config.services.lshd;\n\nin\n\n{\n\n ###### interface\n\n options = {\n\n services.lshd = {\n\n enable = mkOption {\n default = false;\n description = ''\n Whether to enable the GNU lshd SSH2 daemon, which "..., 4949) = 4949
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/ssh/sshd.nix", {st_mode=S_IFREG|0444, st_size=12310, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/ssh/sshd.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=12310, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.services.openssh;\n cfgc = config.programs.ssh;\n\n nssModulesPath = config.system.nssModules.path;\n\n userOptions = {\n\n openssh.authorizedKeys = {\n keys = mkOption {\n type = types.listOf types.str;\n default = [];\n "..., 12310) = 12310
close(3) = 0
brk(0x19bb4000) = 0x19bb4000
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/strongswan.nix", {st_mode=S_IFREG|0444, st_size=4537, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/strongswan.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=4537, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nlet\n\n inherit (builtins) toFile;\n inherit (lib) concatMapStringsSep concatStringsSep mapAttrsToList\n mkIf mkEnableOption mkOption types;\n\n cfg = config.services.strongswan;\n\n ipsecSecrets = secrets: toFile \"ipsec.secrets\" (\n concatMapStringsSep \"\\n\""..., 4537) = 4537
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/stunnel.nix", {st_mode=S_IFREG|0444, st_size=6009, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/stunnel.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=6009, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.services.stunnel;\n yesNo = val: if val then \"yes\" else \"no\";\n\n verifyChainPathAssert = n: c: {\n assertion = c.verifyHostname == null || (c.verifyChain || c.verifyPeer);\n message = \"stunnel: \\\"${n}\\\" client configuration - hostname "..., 6009) = 6009
close(3) = 0
brk(0x19bd5000) = 0x19bd5000
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/supplicant.nix", {st_mode=S_IFREG|0444, st_size=9804, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/supplicant.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=9804, ...}) = 0
read(3, "{ config, lib, utils, pkgs, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.networking.supplicant;\n\n # We must escape interfaces due to the systemd interpretation\n subsystemDevice = interface:\n \"sys-subsystem-net-devices-${utils.escapeSystemdPath interface}.device\";\n\n serviceName = iface: \"supplicant-$"..., 9804) = 9804
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/supybot.nix", {st_mode=S_IFREG|0444, st_size=2053, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/supybot.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=2053, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.services.supybot;\n\nin\n\n{\n\n options = {\n\n services.supybot = {\n\n enable = mkOption {\n default = false;\n description = \"Enable Supybot, an IRC bot\";\n };\n\n stateDir = mkOption {\n # Setting this to /var/"..., 2053) = 2053
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/syncthing.nix", {st_mode=S_IFREG|0444, st_size=4771, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/syncthing.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=4771, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.syncthing;\n defaultUser = \"syncthing\";\nin {\n ###### interface\n options = {\n services.syncthing = {\n\n enable = mkEnableOption ''\n Syncthing - the self-hosted open-source alternative\n to Dropbox and Bittorrent"..., 4771) = 4771
close(3) = 0
brk(0x19bf6000) = 0x19bf6000
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/tcpcrypt.nix", {st_mode=S_IFREG|0444, st_size=2200, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/tcpcrypt.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=2200, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.networking.tcpcrypt;\n\nin\n\n{\n\n ###### interface\n\n options = {\n\n networking.tcpcrypt.enable = mkOption {\n default = false;\n description = ''\n Whether to enable opportunistic TCP encryption. If the other end\n speak"..., 2200) = 2200
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/teamspeak3.nix", {st_mode=S_IFREG|0444, st_size=3522, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/teamspeak3.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=3522, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n ts3 = pkgs.teamspeak_server;\n cfg = config.services.teamspeak3;\n user = \"teamspeak\";\n group = \"teamspeak\";\nin\n\n{\n\n ###### interface\n\n options = {\n\n services.teamspeak3 = {\n enable = mkOption {\n type = types.bool;\n default = fal"..., 3522) = 3522
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/tinc.nix", {st_mode=S_IFREG|0444, st_size=7733, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/tinc.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=7733, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.services.tinc;\n\nin\n\n{\n\n ###### interface\n\n options = {\n\n services.tinc = {\n\n networks = mkOption {\n default = { };\n type = with types; attrsOf (submodule {\n options = {\n\n extraConfig = mkOption {\n"..., 7733) = 7733
close(3) = 0
brk(0x19c17000) = 0x19c17000
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/tinydns.nix", {st_mode=S_IFREG|0444, st_size=1298, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/tinydns.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=1298, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\n{\n ###### interface\n\n options = {\n services.tinydns = {\n enable = mkOption {\n default = false;\n type = types.bool;\n description = \"Whether to run the tinydns dns server\";\n };\n\n data = mkOption {\n type = types.lin"..., 1298) = 1298
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/tftpd.nix", {st_mode=S_IFREG|0444, st_size=844, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/tftpd.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=844, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\n{\n\n ###### interface\n\n options = {\n\n services.tftpd.enable = mkOption {\n type = types.bool;\n default = false;\n description = ''\n Whether to enable tftpd, a Trivial File Transfer Protocol server.\n The server will be run as an x"..., 844) = 844
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/tox-bootstrapd.nix", {st_mode=S_IFREG|0444, st_size=2037, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/tox-bootstrapd.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=2037, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n home = \"/var/lib/tox-bootstrapd\";\n PIDFile = \"${home}/pid\";\n\n pkg = pkgs.libtoxcore;\n cfg = config.services.toxBootstrapd;\n cfgFile = builtins.toFile \"tox-bootstrapd.conf\"\n ''\n port = ${toString cfg.port}\n keys_file_path = \"${home}/keys\""..., 2037) = 2037
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/toxvpn.nix", {st_mode=S_IFREG|0444, st_size=1786, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/toxvpn.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=1786, ...}) = 0
read(3, "{ config, stdenv, pkgs, lib, ... }:\n\nwith lib;\n\n{\n options = {\n services.toxvpn = {\n enable = mkEnableOption \"enable toxvpn running on startup\";\n\n localip = mkOption {\n type = types.string;\n default = \"10.123.123.1\";\n description = \"your ip on the vpn\";\n"..., 1786) = 1786
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/tvheadend.nix", {st_mode=S_IFREG|0444, st_size=1669, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/tvheadend.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=1669, ...}) = 0
read(3, "{ config, coreutils, lib, pkgs, ... }:\n\nwith lib;\n\nlet cfg = config.services.tvheadend;\n pidFile = \"${config.users.extraUsers.tvheadend.home}/tvheadend.pid\";\nin\n\n{\n options = {\n services.tvheadend = {\n enable = mkEnableOption \"Tvheadend\";\n httpPort = mkOption {\n type "..., 1669) = 1669
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/unbound.nix", {st_mode=S_IFREG|0444, st_size=3447, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/unbound.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=3447, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.services.unbound;\n\n stateDir = \"/var/lib/unbound\";\n\n access = concatMapStringsSep \"\\n \" (x: \"access-control: ${x} allow\") cfg.allowedAccess;\n\n interfaces = concatMapStringsSep \"\\n \" (x: \"interface: ${x}\") cfg.interfaces;\n\n isLocalAddr"..., 3447) = 3447
close(3) = 0
brk(0x19c38000) = 0x19c38000
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/unifi.nix", {st_mode=S_IFREG|0444, st_size=4726, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/unifi.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=4726, ...}) = 0
read(3, "{ config, lib, pkgs, utils, ... }:\nwith lib;\nlet\n cfg = config.services.unifi;\n stateDir = \"/var/lib/unifi\";\n cmd = ''\n @${pkgs.jre}/bin/java java \\\n ${optionalString (cfg.initialJavaHeapSize != null) \"-Xms${(toString cfg.initialJavaHeapSize)}m\"} \\\n ${optionalString (cfg.maximumJ"..., 4726) = 4726
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/vsftpd.nix", {st_mode=S_IFREG|0444, st_size=7183, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/vsftpd.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=7183, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n /* minimal secure setup:\n\n enable = true;\n forceLocalLoginsSSL = true;\n forceLocalDataSSL = true;\n userlistDeny = false;\n localUsers = true;\n userlist = [\"non-root-user\" \"other-non-root-user\"];\n rsaCertFile = \"/var/vsftpd/vsftpd.pem\";\n\n *"..., 7183) = 7183
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/wakeonlan.nix", {st_mode=S_IFREG|0444, st_size=1349, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/wakeonlan.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=1349, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n interfaces = config.services.wakeonlan.interfaces;\n\n ethtool = \"${pkgs.ethtool}/sbin/ethtool\";\n\n passwordParameter = password : if (password == \"\") then \"\" else\n \"sopass ${password}\";\n\n methodParameter = {method, password} :\n if method == \"magic"..., 1349) = 1349
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/websockify.nix", {st_mode=S_IFREG|0444, st_size=1608, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/websockify.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=1608, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet cfg = config.services.networking.websockify; in {\n options = {\n services.networking.websockify = {\n enable = mkOption { \n description = \"Whether to enable websockify to forward websocket connections to TCP connections.\";\n\n default ="..., 1608) = 1608
close(3) = 0
brk(0x19c5a000) = 0x19c5a000
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/wicd.nix", {st_mode=S_IFREG|0444, st_size=772, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/wicd.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=772, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\n{\n\n ###### interface\n\n options = {\n\n networking.wicd.enable = mkOption {\n default = false;\n description = ''\n Whether to start <command>wicd</command>. Wired and\n wireless network configurations can then be managed by\n wicd-"..., 772) = 772
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/wireguard.nix", {st_mode=S_IFREG|0444, st_size=9216, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/wireguard.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=9216, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.networking.wireguard;\n\n kernel = config.boot.kernelPackages;\n\n # interface options\n\n interfaceOpts = { name, ... }: {\n\n options = {\n\n ips = mkOption {\n example = [ \"192.168.2.1/24\" ];\n default = [];\n type = w"..., 9216) = 9216
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/wpa_supplicant.nix", {st_mode=S_IFREG|0444, st_size=7647, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/wpa_supplicant.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=7647, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.networking.wireless;\n configFile = if cfg.networks != {} then pkgs.writeText \"wpa_supplicant.conf\" ''\n ${optionalString cfg.userControlled.enable ''\n ctrl_interface=DIR=/var/run/wpa_supplicant GROUP=${cfg.userControlled.group}\n "..., 7647) = 7647
close(3) = 0
brk(0x19c7b000) = 0x19c7b000
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/xinetd.nix", {st_mode=S_IFREG|0444, st_size=3780, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/xinetd.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=3780, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.services.xinetd;\n\n configFile = pkgs.writeText \"xinetd.conf\"\n ''\n defaults\n {\n log_type = SYSLOG daemon info\n log_on_failure = HOST\n log_on_success = PID HOST DURATION EXIT\n ${cfg.extraDefault"..., 3780) = 3780
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/xl2tpd.nix", {st_mode=S_IFREG|0444, st_size=3967, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/xl2tpd.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=3967, ...}) = 0
read(3, "{ config, stdenv, pkgs, lib, ... }:\n\nwith lib;\n\n{\n options = {\n services.xl2tpd = {\n enable = mkEnableOption \"Whether xl2tpd should be run on startup.\";\n\n serverIp = mkOption {\n type = types.string;\n description = \"The server-side IP address.\";\n default "..., 3967) = 3967
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/xrdp.nix", {st_mode=S_IFREG|0444, st_size=4936, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/xrdp.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=4936, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.xrdp;\n confDir = pkgs.runCommand \"xrdp.conf\" { } ''\n mkdir $out\n\n cp ${cfg.package}/etc/xrdp/{km-*,xrdp,sesman,xrdp_keyboard}.ini $out\n\n cat > $out/startwm.sh <<EOF\n #!/bin/sh\n . /etc/profile\n ${cfg.defaultWindowM"..., 4936) = 4936
close(3) = 0
brk(0x19c9c000) = 0x19c9c000
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/zerobin.nix", {st_mode=S_IFREG|0444, st_size=2559, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/zerobin.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=2559, ...}) = 0
read(3, "{ config, pkgs, lib, nodes, ... }:\nwith lib;\nlet\n cfg = config.services.zerobin;\n\n zerobin_config = pkgs.writeText \"zerobin-config.py\" ''\n PASTE_FILES_ROOT = \"${cfg.dataDir}\"\n ${cfg.extraConfig}\n '';\n\nin\n {\n options = {\n services.zerobin = {\n enable = mkEnableOption \"0bin\";\n\n "..., 2559) = 2559
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/zerotierone.nix", {st_mode=S_IFREG|0444, st_size=1084, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/zerotierone.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=1084, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.zerotierone;\nin\n{\n options.services.zerotierone.enable = mkEnableOption \"ZeroTierOne\";\n options.services.zerotierone.package = mkOption {\n default = pkgs.zerotierone;\n defaultText = \"pkgs.zerotierone\";\n type = types.packa"..., 1084) = 1084
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/znc.nix", {st_mode=S_IFREG|0444, st_size=11969, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/znc.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=11969, ...}) = 0
read(3, "{ config, lib, pkgs, ...}:\n\nwith lib;\n\nlet\n cfg = config.services.znc;\n\n defaultUser = \"znc\"; # Default user to own process.\n\n # Default user and pass:\n # un=znc\n # pw=nixospass\n\n defaultUserName = \"znc\";\n defaultPassBlock = \"\n <Pass password>\n Method = sha256\n "..., 11969) = 11969
close(3) = 0
brk(0x19cbd000) = 0x19cbd000
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/printing/cupsd.nix", {st_mode=S_IFREG|0444, st_size=11308, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/printing/cupsd.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=11308, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n inherit (pkgs) cups cups-pk-helper cups-filters;\n\n cfg = config.services.printing;\n\n avahiEnabled = config.services.avahi.enable;\n polkitEnabled = config.security.polkit.enable;\n\n additionalBackends = pkgs.runCommand \"additional-cups-backends\" { }\n "..., 11308) = 11308
close(3) = 0
brk(0x19cde000) = 0x19cde000
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/scheduling/atd.nix", {st_mode=S_IFREG|0444, st_size=2797, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/scheduling/atd.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=2797, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.services.atd;\n\n inherit (pkgs) at;\n\nin\n\n{\n\n ###### interface\n\n options = {\n\n services.atd.enable = mkOption {\n type = types.bool;\n default = false;\n description = ''\n Whether to enable the <command>at</command> d"..., 2797) = 2797
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/scheduling/chronos.nix", {st_mode=S_IFREG|0444, st_size=1281, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/scheduling/chronos.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=1281, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.chronos;\n\nin {\n\n ###### interface\n\n options.services.chronos = {\n enable = mkOption {\n description = \"Whether to enable graphite web frontend.\";\n default = false;\n type = types.bool;\n };\n\n httpPort = mkOpti"..., 1281) = 1281
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/scheduling/cron.nix", {st_mode=S_IFREG|0444, st_size=3882, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/scheduling/cron.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=3882, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n # Put all the system cronjobs together.\n systemCronJobsFile = pkgs.writeText \"system-crontab\"\n ''\n SHELL=${pkgs.bash}/bin/bash\n PATH=${config.system.path}/bin:${config.system.path}/sbin\n ${optionalString (config.services.cron.mailto !"..., 3882) = 3882
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/scheduling/fcron.nix", {st_mode=S_IFREG|0444, st_size=4384, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/scheduling/fcron.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=4384, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.services.fcron;\n\n queuelen = if cfg.queuelen == null then \"\" else \"-q ${toString cfg.queuelen}\";\n\n # Duplicate code, also found in cron.nix. Needs deduplication.\n systemCronJobs =\n ''\n SHELL=${pkgs.bash}/bin/bash\n PATH=${con"..., 4384) = 4384
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/scheduling/marathon.nix", {st_mode=S_IFREG|0444, st_size=2818, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/scheduling/marathon.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=2818, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.services.marathon;\n\nin {\n\n ###### interface\n\n options.services.marathon = {\n enable = mkOption {\n type = types.bool;\n default = false;\n description = ''\n\tWhether to enable the marathon mesos framework.\n '';\n };\n\n"..., 2818) = 2818
close(3) = 0
brk(0x19cff000) = 0x19cff000
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/search/elasticsearch.nix", {st_mode=S_IFREG|0444, st_size=6135, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/search/elasticsearch.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=6135, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.elasticsearch;\n\n es5 = builtins.compareVersions (builtins.parseDrvName cfg.package.name).version \"5\" >= 0;\n es6 = builtins.compareVersions (builtins.parseDrvName cfg.package.name).version \"6\" >= 0;\n\n esConfig = ''\n network.hos"..., 6135) = 6135
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/search/hound.nix", {st_mode=S_IFREG|0444, st_size=3243, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/search/hound.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=3243, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\nwith lib;\nlet\n cfg = config.services.hound;\nin {\n options = {\n services.hound = {\n enable = mkOption {\n type = types.bool;\n default = false;\n description = ''\n Whether to enable the hound code search daemon.\n '';\n };\n\n "..., 3243) = 3243
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/search/kibana.nix", {st_mode=S_IFREG|0444, st_size=5741, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/search/kibana.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=5741, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.kibana;\n\n atLeast54 = versionAtLeast (builtins.parseDrvName cfg.package.name).version \"5.4\";\n\n cfgFile = if atLeast54 then cfgFile5 else cfgFile4;\n\n cfgFile4 = pkgs.writeText \"kibana.json\" (builtins.toJSON (\n (filterAttrsRecur"..., 5741) = 5741
close(3) = 0
brk(0x19d20000) = 0x19d20000
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/search/solr.nix", {st_mode=S_IFREG|0444, st_size=4069, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/search/solr.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=4069, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.services.solr;\n\n # Assemble all jars needed for solr\n solrJars = pkgs.stdenv.mkDerivation {\n name = \"solr-jars\";\n\n src = pkgs.fetchurl {\n url = http://archive.apache.org/dist/tomcat/tomcat-5/v5.5.36/bin/apache-tomcat-5.5.36.tar"..., 4069) = 4069
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/security/clamav.nix", {st_mode=S_IFREG|0444, st_size=3923, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/security/clamav.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=3923, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\nwith lib;\nlet\n clamavUser = \"clamav\";\n stateDir = \"/var/lib/clamav\";\n runDir = \"/run/clamav\";\n clamavGroup = clamavUser;\n cfg = config.services.clamav;\n pkg = pkgs.clamav;\n\n clamdConfigFile = pkgs.writeText \"clamd.conf\" ''\n DatabaseDirectory ${stateDir}\n Loca"..., 3923) = 3923
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/security/fail2ban.nix", {st_mode=S_IFREG|0444, st_size=4515, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/security/fail2ban.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=4515, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.services.fail2ban;\n\n fail2banConf = pkgs.writeText \"fail2ban.conf\" cfg.daemonConfig;\n\n jailConf = pkgs.writeText \"jail.conf\"\n (concatStringsSep \"\\n\" (attrValues (flip mapAttrs cfg.jails (name: def:\n optionalString (def != \"\")\n "..., 4515) = 4515
close(3) = 0
brk(0x19d41000) = 0x19d41000
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/security/fprintd.nix", {st_mode=S_IFREG|0444, st_size=809, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/security/fprintd.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=809, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.services.fprintd;\n\nin\n\n\n{\n\n ###### interface\n\n options = {\n\n services.fprintd = {\n\n enable = mkOption {\n type = types.bool;\n default = false;\n description = ''\n Whether to enable fprintd daemon and PA"..., 809) = 809
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/security/fprot.nix", {st_mode=S_IFREG|0444, st_size=2379, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/security/fprot.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=2379, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\nwith lib;\nlet\n fprotUser = \"fprot\";\n stateDir = \"/var/lib/fprot\";\n fprotGroup = fprotUser;\n cfg = config.services.fprot;\nin {\n options = {\n\n services.fprot = {\n updater = {\n enable = mkOption {\n default = false;\n description = ''\n "..., 2379) = 2379
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/security/haka.nix", {st_mode=S_IFREG|0444, st_size=3849, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/security/haka.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=3849, ...}) = 0
read(3, "# This module defines global configuration for Haka.\n\n{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.services.haka;\n\n haka = cfg.package;\n\n hakaConf = pkgs.writeText \"haka.conf\"\n ''\n [general]\n configuration = ${if lib.strings.hasPrefix \"/\" cfg.configFile\n then \"${cfg.conf"..., 3849) = 3849
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/security/haveged.nix", {st_mode=S_IFREG|0444, st_size=1278, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/security/haveged.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=1278, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.services.haveged;\n\nin\n\n\n{\n\n ###### interface\n\n options = {\n\n services.haveged = {\n\n enable = mkOption {\n type = types.bool;\n default = false;\n description = ''\n Whether to enable to haveged entropy da"..., 1278) = 1278
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/security/hologram-server.nix", {st_mode=S_IFREG|0444, st_size=2655, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/security/hologram-server.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=2655, ...}) = 0
read(3, "{pkgs, config, lib, ...}:\n\nwith lib;\n\nlet\n cfg = config.services.hologram-server;\n\n cfgFile = pkgs.writeText \"hologram-server.json\" (builtins.toJSON {\n ldap = {\n host = cfg.ldapHost;\n bind = {\n dn = cfg.ldapBindDN;\n password = cfg.ldapBindPassword;\n };\n i"..., 2655) = 2655
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/security/hologram-agent.nix", {st_mode=S_IFREG|0444, st_size=1552, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/security/hologram-agent.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=1552, ...}) = 0
read(3, "{pkgs, config, lib, ...}:\n\nwith lib;\n\nlet\n cfg = config.services.hologram-agent;\n\n cfgFile = pkgs.writeText \"hologram-agent.json\" (builtins.toJSON {\n host = cfg.dialAddress;\n });\nin {\n options = {\n services.hologram-agent = {\n enable = mkOption {\n type = types.bool;\n def"..., 1552) = 1552
close(3) = 0
brk(0x19d64000) = 0x19d64000
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/security/munge.nix", {st_mode=S_IFREG|0444, st_size=1081, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/security/munge.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=1081, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.services.munge;\n\nin\n\n{\n\n ###### interface\n\n options = {\n\n services.munge = {\n enable = mkEnableOption \"munge service\";\n\n password = mkOption {\n default = \"/etc/munge/munge.key\";\n type = types.string;\n des"..., 1081) = 1081
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/security/oauth2_proxy.nix", {st_mode=S_IFREG|0444, st_size=15016, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/security/oauth2_proxy.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=15016, ...}) = 0
read(3, "# NixOS module for oauth2_proxy.\n\n{ config, lib, pkgs, ... }:\n\nwith lib;\nlet\n cfg = config.services.oauth2_proxy;\n\n # Use like:\n # repeatedArgs (arg: \"--arg=${arg}\") args\n repeatedArgs = concatMapStringsSep \" \";\n\n # oauth2_proxy provides many options that are only relevant if you are using\n "..., 15016) = 15016
close(3) = 0
brk(0x19d85000) = 0x19d85000
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/security/physlock.nix", {st_mode=S_IFREG|0444, st_size=3411, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/security/physlock.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=3411, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.physlock;\nin\n\n{\n\n ###### interface\n\n options = {\n\n services.physlock = {\n\n enable = mkOption {\n type = types.bool;\n default = false;\n description = ''\n Whether to enable the <command>physlock<"..., 3411) = 3411
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/security/shibboleth-sp.nix", {st_mode=S_IFREG|0444, st_size=2586, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/security/shibboleth-sp.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=2586, ...}) = 0
read(3, "{pkgs, config, lib, ...}:\n\nwith lib;\nlet\n cfg = config.services.shibboleth-sp;\nin {\n options = {\n services.shibboleth-sp = {\n enable = mkOption {\n type = types.bool;\n default = false;\n description = \"Whether to enable the shibboleth service\";\n };\n\n configFile"..., 2586) = 2586
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/security/sks.nix", {st_mode=S_IFREG|0444, st_size=1856, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/security/sks.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=1856, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.services.sks;\n\n sksPkg = cfg.package;\n\nin\n\n{\n\n options = {\n\n services.sks = {\n\n enable = mkEnableOption \"sks\";\n\n package = mkOption {\n default = pkgs.sks;\n defaultText = \"pkgs.sks\";\n type = types.package;"..., 1856) = 1856
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/security/sshguard.nix", {st_mode=S_IFREG|0444, st_size=4593, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/security/sshguard.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=4593, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.sshguard;\nin {\n\n ###### interface\n\n options = {\n\n services.sshguard = {\n enable = mkOption {\n default = false;\n type = types.bool;\n description = \"Whether to enable the sshguard service.\";\n };\n\n "..., 4593) = 4593
close(3) = 0
brk(0x19da6000) = 0x19da6000
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/security/tor.nix", {st_mode=S_IFREG|0444, st_size=26172, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/security/tor.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=26172, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.tor;\n torDirectory = \"/var/lib/tor\";\n\n opt = name: value: optionalString (value != null) \"${name} ${value}\";\n optint = name: value: optionalString (value != null && value != 0) \"${name} ${toString value}\";\n\n isolationOptio"..., 26172) = 26172
close(3) = 0
brk(0x19dc7000) = 0x19dc7000
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/security/torify.nix", {st_mode=S_IFREG|0444, st_size=1799, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/security/torify.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=1799, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\nwith lib;\nlet\n\n cfg = config.services.tor;\n\n torify = pkgs.writeTextFile {\n name = \"tsocks\";\n text = ''\n #!${pkgs.stdenv.shell}\n TSOCKS_CONF_FILE=${pkgs.writeText \"tsocks.conf\" cfg.tsocks.config} LD_PRELOAD=\"${pkgs.tsocks}/lib/libtsocks.so $LD_PRELOA"..., 1799) = 1799
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/security/torsocks.nix", {st_mode=S_IFREG|0444, st_size=3646, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/security/torsocks.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=3646, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.tor.torsocks;\n optionalNullStr = b: v: optionalString (b != null) v;\n\n configFile = server: ''\n TorAddress ${toString (head (splitString \":\" server))}\n TorPort ${toString (tail (splitString \":\" server))}\n\n OnionAddrRan"..., 3646) = 3646
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/security/usbguard.nix", {st_mode=S_IFREG|0444, st_size=6684, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/security/usbguard.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=6684, ...}) = 0
read(3, "{config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.services.usbguard;\n\n # valid policy options\n policy = (types.enum [ \"allow\" \"block\" \"reject\" \"keep\" \"apply-policy\" ]);\n\n # decide what file to use for rules\n ruleFile = if cfg.rules != null then pkgs.writeText \"usbguard-rules\" cfg.rules "..., 6684) = 6684
close(3) = 0
brk(0x19de9000) = 0x19de9000
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/security/vault.nix", {st_mode=S_IFREG|0444, st_size=4473, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/security/vault.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=4473, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\nlet\n cfg = config.services.vault;\n\n configFile = pkgs.writeText \"vault.hcl\" ''\n listener \"tcp\" {\n address = \"${cfg.address}\"\n ${if (cfg.tlsCertFile == null || cfg.tlsKeyFile == null) then ''\n tls_disable = \"true\"\n '' else ''\n "..., 4473) = 4473
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/system/cgmanager.nix", {st_mode=S_IFREG|0444, st_size=642, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/system/cgmanager.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=642, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.cgmanager;\nin {\n meta.maintainers = [ maintainers.mic92 ];\n\n ###### interface\n options.services.cgmanager.enable = mkEnableOption \"cgmanager\";\n\n ###### implementation\n config = mkIf cfg.enable {\n systemd.services.cgmanager ="..., 642) = 642
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/system/cloud-init.nix", {st_mode=S_IFREG|0444, st_size=4867, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/system/cloud-init.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=4867, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet cfg = config.services.cloud-init;\n path = with pkgs; [ cloud-init nettools utillinux e2fsprogs shadow openssh iproute ];\nin\n{\n options = {\n\n services.cloud-init = {\n\n enable = mkOption {\n type = types.bool;\n default = false;\n "..., 4867) = 4867
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/system/dbus.nix", {st_mode=S_IFREG|0444, st_size=3024, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/system/dbus.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=3024, ...}) = 0
read(3, "# D-Bus configuration and system bus daemon.\n\n{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.services.dbus;\n\n homeDir = \"/run/dbus\";\n\n configDir = pkgs.makeDBusConf {\n suidHelper = \"${config.security.wrapperDir}/dbus-daemon-launch-helper\";\n serviceDirectories = cfg.packages;\n }"..., 3024) = 3024
close(3) = 0
brk(0x19e0a000) = 0x19e0a000
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/system/earlyoom.nix", {st_mode=S_IFREG|0444, st_size=2720, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/system/earlyoom.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=2720, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n ecfg = config.services.earlyoom;\nin\n{\n options = {\n services.earlyoom = {\n\n enable = mkOption {\n type = types.bool;\n default = false;\n description = ''\n Enable early out of memory killing.\n '';\n };\n\n "..., 2720) = 2720
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/system/localtime.nix", {st_mode=S_IFREG|0444, st_size=1659, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/system/localtime.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=1659, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.localtime;\nin {\n options = {\n services.localtime = {\n enable = mkOption {\n default = false;\n description = ''\n Enable <literal>localtime</literal>, simple daemon for keeping the system\n timez"..., 1659) = 1659
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/system/kerberos.nix", {st_mode=S_IFREG|0444, st_size=1263, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/system/kerberos.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=1263, ...}) = 0
read(3, "{pkgs, config, lib, ...}:\n\nlet\n\n inherit (lib) mkOption mkIf singleton;\n\n inherit (pkgs) heimdalFull;\n\n stateDir = \"/var/heimdal\";\nin\n\n{\n\n ###### interface\n\n options = {\n\n services.kerberos_server = {\n\n enable = mkOption {\n default = false;\n description = ''\n Enab"..., 1263) = 1263
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/system/nscd.nix", {st_mode=S_IFREG|0444, st_size=2116, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/system/nscd.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=2116, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n nssModulesPath = config.system.nssModules.path;\n cfg = config.services.nscd;\n\n inherit (lib) singleton;\n\nin\n\n{\n\n ###### interface\n\n options = {\n\n services.nscd = {\n\n enable = mkOption {\n type = types.bool;\n default = true;\n "..., 2116) = 2116
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/system/saslauthd.nix", {st_mode=S_IFREG|0444, st_size=1290, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/system/saslauthd.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=1290, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n nssModulesPath = config.system.nssModules.path;\n cfg = config.services.saslauthd;\n\nin\n\n{\n\n ###### interface\n\n options = {\n\n services.saslauthd = {\n\n enable = mkEnableOption \"Whether to enable the Cyrus SASL authentication daemon.\";\n\n pac"..., 1290) = 1290
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/system/uptimed.nix", {st_mode=S_IFREG|0444, st_size=1414, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/system/uptimed.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=1414, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.uptimed;\n stateDir = \"/var/spool/uptimed\";\nin\n{\n options = {\n services.uptimed = {\n enable = mkOption {\n default = false;\n description = ''\n Enable <literal>uptimed</literal>, allowing you to track\n "..., 1414) = 1414
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/torrent/deluge.nix", {st_mode=S_IFREG|0444, st_size=1922, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/torrent/deluge.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=1922, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.deluge;\n cfg_web = config.services.deluge.web;\n openFilesLimit = 4096;\n\nin {\n options = {\n services = {\n deluge = {\n enable = mkOption {\n default = false;\n description = \"Start the Deluge daemon\";"..., 1922) = 1922
close(3) = 0
brk(0x19e2b000) = 0x19e2b000
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/torrent/flexget.nix", {st_mode=S_IFREG|0444, st_size=2918, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/torrent/flexget.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=2918, ...}) = 0
read(3, "{ config, lib, pkgs, timezone, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.flexget;\n pkg = pkgs.flexget;\n ymlFile = pkgs.writeText \"flexget.yml\" ''\n ${cfg.config}\n\n ${optionalString cfg.systemScheduler \"schedules: no\"}\n'';\n configFile = \"${toString cfg.homeDir}/flexget.yml\";\nin {\n optio"..., 2918) = 2918
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/torrent/opentracker.nix", {st_mode=S_IFREG|0444, st_size=1138, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/torrent/opentracker.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=1138, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\nlet\n cfg = config.services.opentracker;\nin {\n options.services.opentracker = {\n enable = mkEnableOption \"opentracker\";\n\n package = mkOption {\n type = types.package;\n description = ''\n opentracker package to use\n '';\n default ="..., 1138) = 1138
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/torrent/peerflix.nix", {st_mode=S_IFREG|0444, st_size=1489, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/torrent/peerflix.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=1489, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.peerflix;\n\n configFile = pkgs.writeText \"peerflix-config.json\" ''\n {\n \"connections\": 50,\n \"tmp\": \"${cfg.downloadDir}\"\n }\n '';\n\nin {\n\n ###### interface\n\n options.services.peerflix = {\n enable = mkOption {\n "..., 1489) = 1489
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/torrent/transmission.nix", {st_mode=S_IFREG|0444, st_size=5876, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/torrent/transmission.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=5876, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.transmission;\n apparmor = config.security.apparmor.enable;\n\n homeDir = cfg.home;\n downloadDir = \"${homeDir}/Downloads\";\n incompleteDir = \"${homeDir}/.incomplete\";\n\n settingsDir = \"${homeDir}/.config/transmission-daemon\";\n sett"..., 5876) = 5876
close(3) = 0
brk(0x19e4c000) = 0x19e4c000
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/ttys/agetty.nix", {st_mode=S_IFREG|0444, st_size=3400, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/ttys/agetty.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=3400, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n autologinArg = optionalString (config.services.mingetty.autologinUser != null) \"--autologin ${config.services.mingetty.autologinUser}\";\n gettyCmd = extraArgs: \"@${pkgs.utillinux}/sbin/agetty agetty --login-program ${pkgs.shadow}/bin/login ${autologinAr"..., 3400) = 3400
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/ttys/gpm.nix", {st_mode=S_IFREG|0444, st_size=1017, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/ttys/gpm.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=1017, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.services.gpm;\n\nin\n\n{\n\n ###### interface\n\n options = {\n\n services.gpm = {\n\n enable = mkOption {\n type = types.bool;\n default = false;\n description = ''\n Whether to enable GPM, the General Purpose Mouse"..., 1017) = 1017
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/ttys/kmscon.nix", {st_mode=S_IFREG|0444, st_size=2680, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/ttys/kmscon.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=2680, ...}) = 0
read(3, "{ config, pkgs, lib, ... }:\nlet\n inherit (lib) mkOption types mkIf optionalString;\n\n cfg = config.services.kmscon;\n\n configDir = pkgs.writeTextFile { name = \"kmscon-config\"; destination = \"/kmscon.conf\"; text = cfg.extraConfig; };\nin {\n options = {\n services.kmscon = {\n enable = mkOption"..., 2680) = 2680
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/web-apps/atlassian/confluence.nix", {st_mode=S_IFREG|0444, st_size=5563, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/web-apps/atlassian/confluence.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=5563, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.services.confluence;\n\n pkg = pkgs.atlassian-confluence.override (optionalAttrs cfg.sso.enable {\n enableSSO = cfg.sso.enable;\n crowdProperties = ''\n application.name ${cfg.sso.applicationName}\n applica"..., 5563) = 5563
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/web-apps/atlassian/crowd.nix", {st_mode=S_IFREG|0444, st_size=4033, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/web-apps/atlassian/crowd.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=4033, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.services.crowd;\n\n pkg = pkgs.atlassian-crowd.override {\n home = cfg.home;\n port = cfg.listenPort;\n openidPassword = cfg.openidPassword;\n } // (optionalAttrs cfg.proxy.enable {\n proxyUrl = \"${cfg.proxy.scheme}://${cfg.proxy.nam"..., 4033) = 4033
close(3) = 0
brk(0x19e6e000) = 0x19e6e000
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/web-apps/atlassian/jira.nix", {st_mode=S_IFREG|0444, st_size=5619, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/web-apps/atlassian/jira.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=5619, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.services.jira;\n\n pkg = pkgs.atlassian-jira.override (optionalAttrs cfg.sso.enable {\n enableSSO = cfg.sso.enable;\n crowdProperties = ''\n application.name ${cfg.sso.applicationName}\n application.passwor"..., 5619) = 5619
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/web-apps/frab.nix", {st_mode=S_IFREG|0444, st_size=5968, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/web-apps/frab.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=5968, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.frab;\n\n package = pkgs.frab;\n ruby = package.ruby;\n\n databaseConfig = builtins.toJSON { production = cfg.database; };\n\n frabEnv = {\n RAILS_ENV = \"production\";\n RACK_ENV = \"production\";\n SECRET_KEY_BASE = cfg.secretKeyBa"..., 5968) = 5968
close(3) = 0
brk(0x19e8f000) = 0x19e8f000
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/web-apps/mattermost.nix", {st_mode=S_IFREG|0444, st_size=7398, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/web-apps/mattermost.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=7398, ...}) = 0
read(3, "{ config, pkgs, lib, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.services.mattermost;\n\n defaultConfig = builtins.fromJSON (readFile \"${pkgs.mattermost}/config/config.json\");\n\n mattermostConf = foldl recursiveUpdate defaultConfig\n [ { ServiceSettings.SiteURL = cfg.siteUrl;\n ServiceSettings.Lis"..., 7398) = 7398
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/web-apps/nixbot.nix", {st_mode=S_IFREG|0444, st_size=3583, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/web-apps/nixbot.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=3583, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.nixbot;\n pyramidIni = ''\n ###\n # app configuration\n # http://docs.pylonsproject.org/projects/pyramid/en/1.7-branch/narr/environment.html\n ###\n\n [app:main]\n use = egg:nixbot\n\n nixbot.github_token = ${cfg.githubT"..., 3583) = 3583
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/web-apps/nexus.nix", {st_mode=S_IFREG|0444, st_size=2705, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/web-apps/nexus.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=2705, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.services.nexus;\n\nin\n\n{\n options = {\n services.nexus = {\n enable = mkEnableOption \"Sonatype Nexus3 OSS service\";\n\n user = mkOption {\n type = types.str;\n default = \"nexus\";\n description = \"User which runs Ne"..., 2705) = 2705
close(3) = 0
brk(0x19eb0000) = 0x19eb0000
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/web-apps/pgpkeyserver-lite.nix", {st_mode=S_IFREG|0444, st_size=1601, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/web-apps/pgpkeyserver-lite.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=1601, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.services.pgpkeyserver-lite;\n sksCfg = config.services.sks;\n\n webPkg = cfg.package;\n\nin\n\n{\n\n options = {\n\n services.pgpkeyserver-lite = {\n\n enable = mkEnableOption \"pgpkeyserver-lite on a nginx vHost proxying to a gpg keyserver\";\n"..., 1601) = 1601
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/web-apps/piwik.nix", {st_mode=S_IFREG|0444, st_size=8704, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/web-apps/piwik.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=8704, ...}) = 0
read(3, "{ config, lib, pkgs, services, ... }:\nwith lib;\nlet\n cfg = config.services.piwik;\n\n user = \"piwik\";\n dataDir = \"/var/lib/${user}\";\n\n pool = user;\n # it's not possible to use /run/phpfpm/${pool}.sock because /run/phpfpm/ is root:root 0770,\n # and therefore is not accessible by the web server.\n "..., 8704) = 8704
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/web-apps/pump.io.nix", {st_mode=S_IFREG|0444, st_size=12703, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/web-apps/pump.io.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=12703, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.pumpio;\n dataDir = \"/var/lib/pump.io\";\n runDir = \"/run/pump.io\";\n user = \"pumpio\";\n\n optionalSet = condition: value: if condition then value else {};\n\n configScript = ./pump.io-configure.js;\n configOptions = {\n outputFile ="..., 12703) = 12703
close(3) = 0
brk(0x19ed1000) = 0x19ed1000
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/web-apps/restya-board.nix", {st_mode=S_IFREG|0444, st_size=12358, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/web-apps/restya-board.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=12358, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\n# TODO: are these php-packages needed?\n#imagick\n#php-geoip -> php.ini: extension = geoip.so\n#expat\n\nlet\n cfg = config.services.restya-board;\n\n runDir = \"/run/restya-board\";\n\n poolName = \"restya-board\";\n phpfpmSocketName = \"/var/run/phpfpm/${poolName}.sock\""..., 12358) = 12358
close(3) = 0
brk(0x19ef2000) = 0x19ef2000
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/web-apps/tt-rss.nix", {st_mode=S_IFREG|0444, st_size=19194, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/web-apps/tt-rss.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=19194, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\nlet\n cfg = config.services.tt-rss;\n\n configVersion = 26;\n\n cacheDir = \"cache\";\n lockDir = \"lock\";\n feedIconsDir = \"feed-icons\";\n\n dbPort = if cfg.database.port == null\n then (if cfg.database.type == \"pgsql\" then 5432 else 3306)\n else cfg.database.po"..., 19194) = 19194
close(3) = 0
brk(0x19f13000) = 0x19f13000
brk(0x19f34000) = 0x19f34000
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/web-apps/selfoss.nix", {st_mode=S_IFREG|0444, st_size=4488, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/web-apps/selfoss.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=4488, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\nwith lib;\nlet\n cfg = config.services.selfoss;\n\n poolName = \"selfoss_pool\";\n phpfpmSocketName = \"/var/run/phpfpm/${poolName}.sock\";\n\n dataDir = \"/var/lib/selfoss\";\n\n selfoss-config =\n let\n db_type = cfg.database.type;\n default_port = if (db_type == \"mysql\") the"..., 4488) = 4488
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/web-apps/quassel-webserver.nix", {st_mode=S_IFREG|0444, st_size=3582, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/web-apps/quassel-webserver.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=3582, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.quassel-webserver;\n quassel-webserver = cfg.pkg;\n settings = ''\n module.exports = {\n default: {\n host: '${cfg.quasselCoreHost}', // quasselcore host\n port: ${toString cfg.quasselCorePort}, // quasselcore po"..., 3582) = 3582
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/web-servers/apache-httpd/default.nix", {st_mode=S_IFREG|0444, st_size=23191, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/web-servers/apache-httpd/default.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=23191, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n mainCfg = config.services.httpd;\n\n httpd = mainCfg.package.out;\n\n version24 = !versionOlder httpd.version \"2.4\";\n\n httpdConf = mainCfg.configFile;\n\n php = mainCfg.phpPackage.override { apacheHttpd = httpd.dev; /* otherwise it only gets .out */ };\n\n "..., 23191) = 23191
close(3) = 0
brk(0x19f55000) = 0x19f55000
brk(0x19f76000) = 0x19f76000
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/web-servers/caddy.nix", {st_mode=S_IFREG|0444, st_size=2947, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/web-servers/caddy.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=2947, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.caddy;\n configFile = pkgs.writeText \"Caddyfile\" cfg.config;\nin {\n options.services.caddy = {\n enable = mkEnableOption \"Caddy web server\";\n\n config = mkOption {\n default = \"\";\n example = ''\n example.com {\n "..., 2947) = 2947
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/web-servers/fcgiwrap.nix", {st_mode=S_IFREG|0444, st_size=1978, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/web-servers/fcgiwrap.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=1978, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.fcgiwrap;\nin {\n\n options = {\n services.fcgiwrap = {\n enable = mkOption {\n type = types.bool;\n default = false;\n description = \"Whether to enable fcgiwrap, a server for running CGI applications over Fast"..., 1978) = 1978
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/web-servers/jboss/default.nix", {st_mode=S_IFREG|0444, st_size=1829, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/web-servers/jboss/default.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=1829, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.services.jboss;\n\n jbossService = pkgs.stdenv.mkDerivation {\n name = \"jboss-server\";\n builder = ./builder.sh;\n inherit (pkgs) jboss su;\n inherit (cfg) tempDir logDir libUrl deployDir serverDir user useJK;\n };\n\nin\n\n{\n\n ###### i"..., 1829) = 1829
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/web-servers/lighttpd/cgit.nix", {st_mode=S_IFREG|0444, st_size=1755, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/web-servers/lighttpd/cgit.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=1755, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.lighttpd.cgit;\n configFile = pkgs.writeText \"cgitrc\"\n ''\n ${cfg.configText}\n '';\nin\n{\n\n options.services.lighttpd.cgit = {\n\n enable = mkOption {\n default = false;\n type = types.bool;\n description = ''\n"..., 1755) = 1755
close(3) = 0
brk(0x19f86000) = 0x19f86000
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/web-servers/lighttpd/collectd.nix", {st_mode=S_IFREG|0444, st_size=1620, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/web-servers/lighttpd/collectd.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=1620, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.lighttpd.collectd;\n\n collectionConf = pkgs.writeText \"collection.conf\" ''\n datadir: \"${config.services.collectd.dataDir}\"\n libdir: \"${config.services.collectd.package}/lib/collectd\"\n '';\n\n defaultCollectionCgi = config.serv"..., 1620) = 1620
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/web-servers/lighttpd/default.nix", {st_mode=S_IFREG|0444, st_size=7336, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/web-servers/lighttpd/default.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=7336, ...}) = 0
read(3, "# NixOS module for lighttpd web server\n\n{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.services.lighttpd;\n\n # List of known lighttpd modules, ordered by how the lighttpd documentation\n # recommends them being imported:\n # http://redmine.lighttpd.net/projects/1/wiki/Server_modulesDeta"..., 7336) = 7336
close(3) = 0
brk(0x19fa7000) = 0x19fa7000
brk(0x19fa8000) = 0x19fa8000
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/web-servers/lighttpd/gitweb.nix", {st_mode=S_IFREG|0444, st_size=1686, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/web-servers/lighttpd/gitweb.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=1686, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.lighttpd.gitweb;\n gitwebConfigFile = pkgs.writeText \"gitweb.conf\" ''\n # path to git projects (<project>.git)\n $projectroot = \"${cfg.projectroot}\";\n ${cfg.extraConfig}\n '';\n\nin\n{\n\n options.services.lighttpd.gitweb = {\n\n "..., 1686) = 1686
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/web-servers/lighttpd/inginious.nix", {st_mode=S_IFREG|0444, st_size=9611, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/web-servers/lighttpd/inginious.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=9611, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\nwith lib;\n\nlet\n cfg = config.services.lighttpd.inginious;\n inginious = pkgs.inginious;\n execName = \"inginious-${if cfg.useLTI then \"lti\" else \"webapp\"}\";\n\n inginiousConfigFile = if cfg.configFile != null then cfg.configFile else pkgs.writeText \"inginious.yaml\" ''\n "..., 9611) = 9611
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/web-servers/mighttpd2.nix", {st_mode=S_IFREG|0444, st_size=4058, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/web-servers/mighttpd2.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=4058, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.mighttpd2;\n configFile = pkgs.writeText \"mighty-config\" cfg.config;\n routingFile = pkgs.writeText \"mighty-routing\" cfg.routing;\nin {\n options.services.mighttpd2 = {\n enable = mkEnableOption \"Mighttpd2 web server\";\n\n config "..., 4058) = 4058
close(3) = 0
brk(0x19fc9000) = 0x19fc9000
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/web-servers/minio.nix", {st_mode=S_IFREG|0444, st_size=3219, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/web-servers/minio.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=3219, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.minio;\nin\n{\n meta.maintainers = [ maintainers.bachp ];\n\n options.services.minio = {\n enable = mkEnableOption \"Minio Object Storage\";\n\n listenAddress = mkOption {\n default = \":9000\";\n type = types.str;\n descrip"..., 3219) = 3219
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/web-servers/nginx/default.nix", {st_mode=S_IFREG|0444, st_size=20055, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/web-servers/nginx/default.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=20055, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.nginx;\n virtualHosts = mapAttrs (vhostName: vhostConfig:\n let\n serverName = if vhostConfig.serverName != null\n then vhostConfig.serverName\n else vhostName;\n in\n vhostConfig // {\n inherit serverName;"..., 20055) = 20055
close(3) = 0
brk(0x19fea000) = 0x19fea000
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/web-servers/phpfpm/default.nix", {st_mode=S_IFREG|0444, st_size=4531, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/web-servers/phpfpm/default.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=4531, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.phpfpm;\n enabled = cfg.poolConfigs != {} || cfg.pools != {};\n\n stateDir = \"/run/phpfpm\";\n\n poolConfigs = cfg.poolConfigs // mapAttrs mkPool cfg.pools;\n\n mkPool = n: p: ''\n listen = ${p.listen}\n ${p.extraConfig}\n '';\n\n fp"..., 4531) = 4531
close(3) = 0
brk(0x1a00b000) = 0x1a00b000
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/web-servers/shellinabox.nix", {st_mode=S_IFREG|0444, st_size=3804, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/web-servers/shellinabox.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=3804, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.services.shellinabox;\n\n # If a certificate file is specified, shellinaboxd requires\n # a file descriptor to retrieve it\n fd = \"3\";\n createFd = optionalString (cfg.certFile != null) \"${fd}<${cfg.certFile}\";\n\n # Command line arguments fo"..., 3804) = 3804
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/web-servers/tomcat.nix", {st_mode=S_IFREG|0444, st_size=13453, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/web-servers/tomcat.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=13453, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.services.tomcat;\n tomcat = cfg.package;\nin\n\n{\n\n meta = {\n maintainers = with maintainers; [ danbst ];\n };\n\n ###### interface\n\n options = {\n\n services.tomcat = {\n\n enable = mkOption {\n default = false;\n descript"..., 13453) = 13453
close(3) = 0
brk(0x1a02c000) = 0x1a02c000
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/web-servers/traefik.nix", {st_mode=S_IFREG|0444, st_size=3372, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/web-servers/traefik.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=3372, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.traefik;\n configFile =\n if cfg.configFile == null then\n pkgs.runCommand \"config.toml\" {\n buildInputs = [ pkgs.remarshal ];\n } ''\n remarshal -if json -of toml \\\n < ${pkgs.writeText \"config.json\" ("..., 3372) = 3372
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/web-servers/uwsgi.nix", {st_mode=S_IFREG|0444, st_size=5387, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/web-servers/uwsgi.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=5387, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.uwsgi;\n\n uwsgi = pkgs.uwsgi.override {\n plugins = cfg.plugins;\n };\n\n buildCfg = name: c:\n let\n plugins =\n if any (n: !any (m: m == n) cfg.plugins) (c.plugins or [])\n then throw \"`plugins` attribute in UWS"..., 5387) = 5387
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/web-servers/varnish/default.nix", {st_mode=S_IFREG|0444, st_size=2763, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/web-servers/varnish/default.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=2763, ...}) = 0
read(3, "{ config, lib, pkgs, ...}:\n\nwith lib;\n\nlet\n cfg = config.services.varnish;\n\n commandLine = \"-f ${pkgs.writeText \"default.vcl\" cfg.config}\" +\n optionalString (cfg.extraModules != []) \" -p vmod_path='${makeSearchPathOutput \"lib\" \"lib/varnish/vmods\" ([pkgs.varnish] ++ cfg.extraModules)}' -r vmod"..., 2763) = 2763
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/web-servers/winstone.nix", {st_mode=S_IFREG|0444, st_size=3042, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/web-servers/winstone.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=3042, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.services.winstone;\n\n winstoneOpts = { name, ... }: {\n options = {\n name = mkOption {\n default = name;\n internal = true;\n };\n\n serviceName = mkOption {\n type = types.str;\n description = ''\n "..., 3042) = 3042
close(3) = 0
brk(0x1a04d000) = 0x1a04d000
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/web-servers/zope2.nix", {st_mode=S_IFREG|0444, st_size=7943, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/web-servers/zope2.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=7943, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.services.zope2;\n\n zope2Opts = { name, config, ... }: {\n options = {\n\n name = mkOption {\n default = \"${name}\";\n type = types.string;\n description = \"The name of the zope2 instance. If undefined, the name of the "..., 7943) = 7943
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/x11/colord.nix", {st_mode=S_IFREG|0444, st_size=682, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/x11/colord.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=682, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.services.colord;\n\nin {\n\n options = {\n\n services.colord = {\n enable = mkEnableOption \"colord, the color management daemon\";\n };\n\n };\n\n config = mkIf cfg.enable {\n\n services.dbus.packages = [ pkgs.colord ];\n\n services.udev"..., 682) = 682
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/x11/compton.nix", {st_mode=S_IFREG|0444, st_size=6415, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/x11/compton.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=6415, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\nwith builtins;\n\nlet\n\n cfg = config.services.compton;\n\n floatBetween = a: b: with lib; with types;\n addCheck str (x: versionAtLeast x a && versionOlder x b);\n\n pairOf = x: with types; addCheck (listOf x) (y: lib.length y == 2);\n\n opacityRules = optionalSt"..., 6415) = 6415
close(3) = 0
brk(0x1a06e000) = 0x1a06e000
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/x11/unclutter.nix", {st_mode=S_IFREG|0444, st_size=2005, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/x11/unclutter.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=2005, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet cfg = config.services.unclutter;\n\nin {\n options.services.unclutter = {\n\n enable = mkOption {\n description = \"Enable unclutter to hide your mouse cursor when inactive\";\n type = types.bool;\n default = false;\n };\n\n package = mkOption "..., 2005) = 2005
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/x11/unclutter-xfixes.nix", {st_mode=S_IFREG|0444, st_size=1600, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/x11/unclutter-xfixes.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=1600, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet cfg = config.services.unclutter-xfixes;\n\nin {\n options.services.unclutter-xfixes = {\n\n enable = mkOption {\n description = \"Enable unclutter-xfixes to hide your mouse cursor when inactive.\";\n type = types.bool;\n default = false;\n };\n\n "..., 1600) = 1600
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/x11/desktop-managers/default.nix", {st_mode=S_IFREG|0444, st_size=4226, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/x11/desktop-managers/default.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=4226, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n xcfg = config.services.xserver;\n cfg = xcfg.desktopManager;\n\n # If desktop manager `d' isn't capable of setting a background and\n # the xserver is enabled, `feh' or `xsetroot' are used as a fallback.\n needBGCond = d: ! (d ? bgSupport && d.bgSupport)"..., 4226) = 4226
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/x11/desktop-managers/none.nix", {st_mode=S_IFREG|0444, st_size=106, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/x11/desktop-managers/none.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=106, ...}) = 0
read(3, "{\n services.xserver.desktopManager.session =\n [ { name = \"none\";\n start = \"\";\n }\n ];\n}\n", 106) = 106
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/x11/desktop-managers/xterm.nix", {st_mode=S_IFREG|0444, st_size=594, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/x11/desktop-managers/xterm.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=594, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.services.xserver.desktopManager.xterm;\n\nin\n\n{\n options = {\n\n services.xserver.desktopManager.xterm.enable = mkOption {\n default = true;\n description = \"Enable a xterm terminal as a desktop manager.\";\n };\n\n };\n\n config = m"..., 594) = 594
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/x11/desktop-managers/xfce.nix", {st_mode=S_IFREG|0444, st_size=3785, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/x11/desktop-managers/xfce.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=3785, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.xserver.desktopManager.xfce;\nin\n\n{\n options = {\n services.xserver.desktopManager.xfce = {\n enable = mkOption {\n type = types.bool;\n default = false;\n description = \"Enable the Xfce desktop environment.\""..., 3785) = 3785
close(3) = 0
brk(0x1a08f000) = 0x1a08f000
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/x11/desktop-managers/plasma5.nix", {st_mode=S_IFREG|0444, st_size=6342, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/x11/desktop-managers/plasma5.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=6342, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n xcfg = config.services.xserver;\n cfg = xcfg.desktopManager.plasma5;\n\n inherit (pkgs) kdeApplications plasma5 libsForQt5 qt5 xorg;\n\nin\n\n{\n options = {\n\n services.xserver.desktopManager.plasma5 = {\n enable = mkOption {\n type = types.bool"..., 6342) = 6342
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/x11/desktop-managers/lumina.nix", {st_mode=S_IFREG|0444, st_size=929, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/x11/desktop-managers/lumina.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=929, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n xcfg = config.services.xserver;\n cfg = xcfg.desktopManager.lumina;\n\nin\n\n{\n options = {\n\n services.xserver.desktopManager.lumina.enable = mkOption {\n type = types.bool;\n default = false;\n description = \"Enable the Lumina desktop manag"..., 929) = 929
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/x11/desktop-managers/lxqt.nix", {st_mode=S_IFREG|0444, st_size=1565, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/x11/desktop-managers/lxqt.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=1565, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n # Remove packages of ys from xs, based on their names\n removePackagesByName = xs: ys:\n let\n pkgName = drv: (builtins.parseDrvName drv.name).name;\n ysNames = map pkgName ys;\n in\n filter (x: !(builtins.elem (pkgName x) ysNames)) xs;\n"..., 1565) = 1565
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/x11/desktop-managers/enlightenment.nix", {st_mode=S_IFREG|0444, st_size=2832, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/x11/desktop-managers/enlightenment.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=2832, ...}) = 0
read(3, "{ config, pkgs, lib, ... }:\n\nwith lib;\n\nlet\n\n e = pkgs.enlightenment;\n xcfg = config.services.xserver;\n cfg = xcfg.desktopManager.enlightenment;\n GST_PLUGIN_PATH = lib.makeSearchPathOutput \"lib\" \"lib/gstreamer-1.0\" [\n pkgs.gst_all_1.gst-plugins-base\n pkgs.gst_all_1.gst-plugins-good\n pkg"..., 2832) = 2832
close(3) = 0
brk(0x1a0b0000) = 0x1a0b0000
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/x11/desktop-managers/gnome3.nix", {st_mode=S_IFREG|0444, st_size=7994, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/x11/desktop-managers/gnome3.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=7994, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.xserver.desktopManager.gnome3;\n\n # Remove packages of ys from xs, based on their names\n removePackagesByName = xs: ys:\n let\n pkgName = drv: (builtins.parseDrvName drv.name).name;\n ysNames = map pkgName ys;\n res ="..., 7994) = 7994
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/x11/desktop-managers/kodi.nix", {st_mode=S_IFREG|0444, st_size=579, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/x11/desktop-managers/kodi.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=579, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.xserver.desktopManager.kodi;\nin\n\n{\n options = {\n services.xserver.desktopManager.kodi = {\n enable = mkOption {\n default = false;\n description = \"Enable the kodi multimedia center.\";\n };\n };\n };\n\n con"..., 579) = 579
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/x11/desktop-managers/maxx.nix", {st_mode=S_IFREG|0444, st_size=540, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/x11/desktop-managers/maxx.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=540, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n xcfg = config.services.xserver;\n cfg = xcfg.desktopManager.maxx;\nin {\n options.services.xserver.desktopManager.maxx = {\n enable = mkEnableOption \"MaXX desktop environment\";\n };\n\n config = mkIf (xcfg.enable && cfg.enable) {\n environment.systemPa"..., 540) = 540
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/x11/desktop-managers/mate.nix", {st_mode=S_IFREG|0444, st_size=3634, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/x11/desktop-managers/mate.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=3634, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n # Remove packages of ys from xs, based on their names\n removePackagesByName = xs: ys:\n let\n pkgName = drv: (builtins.parseDrvName drv.name).name;\n ysNames = map pkgName ys;\n in\n filter (x: !(builtins.elem (pkgName x) ysNames)) xs;\n"..., 3634) = 3634
close(3) = 0
brk(0x1a0d1000) = 0x1a0d1000
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/x11/display-managers/auto.nix", {st_mode=S_IFREG|0444, st_size=853, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/x11/display-managers/auto.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=853, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n dmcfg = config.services.xserver.displayManager;\n cfg = dmcfg.auto;\n\nin\n\n{\n\n ###### interface\n\n options = {\n\n services.xserver.displayManager.auto = {\n\n enable = mkOption {\n default = false;\n description = ''\n Whether to"..., 853) = 853
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/x11/display-managers/default.nix", {st_mode=S_IFREG|0444, st_size=11710, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/x11/display-managers/default.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=11710, ...}) = 0
read(3, "# This module declares the options to define a *display manager*, the\n# program responsible for handling X logins (such as xdm, gdb, or\n# SLiM). The display manager allows the user to select a *session\n# type*. When the user logs in, the display manager starts the\n# *session script* (\"xsession\" be"..., 11710) = 11710
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/x11/display-managers/gdm.nix", {st_mode=S_IFREG|0444, st_size=8798, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/x11/display-managers/gdm.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=8798, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.services.xserver.displayManager;\n gdm = pkgs.gnome3.gdm;\n\nin\n\n{\n\n ###### interface\n\n options = {\n\n services.xserver.displayManager.gdm = {\n\n enable = mkEnableOption ''\n GDM as the display manager.\n <emphasis>GDM in "..., 8798) = 8798
close(3) = 0
brk(0x1a0f2000) = 0x1a0f2000
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/x11/display-managers/lightdm.nix", {st_mode=S_IFREG|0444, st_size=7669, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/x11/display-managers/lightdm.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=7669, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n xcfg = config.services.xserver;\n dmcfg = xcfg.displayManager;\n xEnv = config.systemd.services.\"display-manager\".environment;\n cfg = dmcfg.lightdm;\n\n inherit (pkgs) stdenv lightdm writeScript writeText;\n\n # lightdm runs with clearenv(), but we need "..., 7669) = 7669
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/x11/display-managers/lightdm-greeters/gtk.nix", {st_mode=S_IFREG|0444, st_size=4643, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/x11/display-managers/lightdm-greeters/gtk.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=4643, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n dmcfg = config.services.xserver.displayManager;\n ldmcfg = dmcfg.lightdm;\n cfg = ldmcfg.greeters.gtk;\n\n inherit (pkgs) stdenv lightdm writeScript writeText;\n\n theme = cfg.theme.package;\n icons = cfg.iconTheme.package;\n\n # The default greeter provid"..., 4643) = 4643
close(3) = 0
brk(0x1a113000) = 0x1a113000
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/x11/display-managers/sddm.nix", {st_mode=S_IFREG|0444, st_size=7648, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/x11/display-managers/sddm.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=7648, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n xcfg = config.services.xserver;\n dmcfg = xcfg.displayManager;\n cfg = dmcfg.sddm;\n xEnv = config.systemd.services.\"display-manager\".environment;\n\n inherit (pkgs) sddm;\n\n xserverWrapper = pkgs.writeScript \"xserver-wrapper\" ''\n #!/bin/sh\n ${conc"..., 7648) = 7648
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/x11/display-managers/slim.nix", {st_mode=S_IFREG|0444, st_size=4555, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/x11/display-managers/slim.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=4555, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n dmcfg = config.services.xserver.displayManager;\n\n cfg = dmcfg.slim;\n\n slimConfig = pkgs.writeText \"slim.cfg\"\n ''\n xauth_path ${dmcfg.xauthBin}\n default_xserver ${dmcfg.xserverBin}\n xserver_arguments ${toString dmcfg.xserverArgs}\n "..., 4555) = 4555
close(3) = 0
brk(0x1a134000) = 0x1a134000
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/x11/display-managers/xpra.nix", {st_mode=S_IFREG|0444, st_size=12072, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/x11/display-managers/xpra.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=12072, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.xserver.displayManager.xpra;\n dmcfg = config.services.xserver.displayManager;\n\nin\n\n{\n ###### interface\n\n options = {\n services.xserver.displayManager.xpra = {\n enable = mkOption {\n type = types.bool;\n defaul"..., 12072) = 12072
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/x11/fractalart.nix", {st_mode=S_IFREG|0444, st_size=1004, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/x11/fractalart.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=1004, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\nwith lib;\nlet\n cfg = config.services.fractalart;\nin {\n options.services.fractalart = {\n enable = mkOption {\n type = types.bool;\n default = false;\n example = true;\n description = \"Enable FractalArt for generating colorful wallpapers on login\";\n "..., 1004) = 1004
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/x11/hardware/libinput.nix", {st_mode=S_IFREG|0444, st_size=8614, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/x11/hardware/libinput.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=8614, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet cfg = config.services.xserver.libinput;\n xorgBool = v: if v then \"on\" else \"off\";\nin {\n\n options = {\n\n services.xserver.libinput = {\n\n enable = mkEnableOption \"libinput\";\n\n dev = mkOption {\n type = types.nullOr types.str;\n de"..., 8614) = 8614
close(3) = 0
brk(0x1a155000) = 0x1a155000
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/x11/hardware/multitouch.nix", {st_mode=S_IFREG|0444, st_size=2433, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/x11/hardware/multitouch.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=2433, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet cfg = config.services.xserver.multitouch;\n disabledTapConfig = ''\n Option \"MaxTapTime\" \"0\"\n Option \"MaxTapMove\" \"0\"\n Option \"TapButton1\" \"0\"\n Option \"TapButton2\" \"0\"\n Option \"TapButton3\" \"0\"\n '';\nin {\n\n options = {\n\n serv"..., 2433) = 2433
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/x11/hardware/synaptics.nix", {st_mode=S_IFREG|0444, st_size=7019, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/x11/hardware/synaptics.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=7019, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet cfg = config.services.xserver.synaptics;\n tapConfig = if cfg.tapButtons then enabledTapConfig else disabledTapConfig;\n enabledTapConfig = ''\n Option \"MaxTapTime\" \"180\"\n Option \"MaxTapMove\" \"220\"\n Option \"TapButton1\" \"${builtins.elemAt "..., 7019) = 7019
close(3) = 0
brk(0x1a176000) = 0x1a176000
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/x11/hardware/wacom.nix", {st_mode=S_IFREG|0444, st_size=1025, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/x11/hardware/wacom.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=1025, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.services.xserver.wacom;\n\nin\n\n{\n\n options = {\n\n services.xserver.wacom = {\n\n enable = mkOption {\n default = false;\n description = ''\n Whether to enable the Wacom touchscreen/digitizer/tablet.\n If you "..., 1025) = 1025
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/x11/redshift.nix", {st_mode=S_IFREG|0444, st_size=3897, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/x11/redshift.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=3897, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.services.redshift;\n\nin {\n\n options.services.redshift = {\n enable = mkOption {\n type = types.bool;\n default = false;\n description = ''\n Enable Redshift to change your screen's colour temperature depending on\n "..., 3897) = 3897
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/x11/urxvtd.nix", {st_mode=S_IFREG|0444, st_size=1157, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/x11/urxvtd.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=1157, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\n# maintainer: siddharthist\n\nwith lib;\n\nlet\n cfg = config.services.urxvtd;\nin {\n\n options.services.urxvtd.enable = mkOption {\n type = types.bool;\n default = false;\n description = ''\n Enable urxvtd, the urxvt terminal daemon. To use urxvtd, run\n \"urxvt"..., 1157) = 1157
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/x11/window-managers/awesome.nix", {st_mode=S_IFREG|0444, st_size=1350, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/x11/window-managers/awesome.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=1350, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.services.xserver.windowManager.awesome;\n awesome = cfg.package;\n getLuaPath = lib : dir : \"${lib}/${dir}/lua/${pkgs.luaPackages.lua.luaversion}\";\n makeSearchPath = lib.concatMapStrings (path:\n \" --search \" + (getLuaPath path \"share\") "..., 1350) = 1350
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/x11/window-managers/default.nix", {st_mode=S_IFREG|0444, st_size=1621, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/x11/window-managers/default.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=1621, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.xserver.windowManager;\nin\n\n{\n imports = [\n ./2bwm.nix\n ./afterstep.nix\n ./bspwm.nix\n ./dwm.nix\n ./exwm.nix\n ./fluxbox.nix\n ./fvwm.nix\n ./herbstluftwm.nix\n ./i3.nix\n ./jwm.nix\n ./metacity.nix\n ./m"..., 1621) = 1621
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/x11/window-managers/2bwm.nix", {st_mode=S_IFREG|0444, st_size=526, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/x11/window-managers/2bwm.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=526, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.services.xserver.windowManager.\"2bwm\";\n\nin\n\n{\n\n ###### interface\n\n options = {\n services.xserver.windowManager.\"2bwm\".enable = mkEnableOption \"2bwm\";\n };\n\n\n ###### implementation\n\n config = mkIf cfg.enable {\n\n services.xserver.wi"..., 526) = 526
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/x11/window-managers/afterstep.nix", {st_mode=S_IFREG|0444, st_size=518, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/x11/window-managers/afterstep.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=518, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.xserver.windowManager.afterstep;\nin\n{\n ###### interface\n options = {\n services.xserver.windowManager.afterstep.enable = mkEnableOption \"afterstep\";\n };\n\n ###### implementation\n config = mkIf cfg.enable {\n services.xserver"..., 518) = 518
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/x11/window-managers/bspwm.nix", {st_mode=S_IFREG|0444, st_size=2560, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/x11/window-managers/bspwm.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=2560, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.xserver.windowManager.bspwm;\nin\n\n{\n options = {\n services.xserver.windowManager.bspwm = {\n enable = mkEnableOption \"bspwm\";\n\n package = mkOption {\n type = types.package;\n default = pkgs.bspwm;\n"..., 2560) = 2560
close(3) = 0
brk(0x1a197000) = 0x1a197000
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/x11/window-managers/dwm.nix", {st_mode=S_IFREG|0444, st_size=513, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/x11/window-managers/dwm.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=513, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.services.xserver.windowManager.dwm;\n\nin\n\n{\n\n ###### interface\n\n options = {\n services.xserver.windowManager.dwm.enable = mkEnableOption \"dwm\";\n };\n\n\n ###### implementation\n\n config = mkIf cfg.enable {\n\n services.xserver.windowMan"..., 513) = 513
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/x11/window-managers/exwm.nix", {st_mode=S_IFREG|0444, st_size=1380, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/x11/window-managers/exwm.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=1380, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.xserver.windowManager.exwm;\n loadScript = pkgs.writeText \"emacs-exwm-load\" ''\n (require 'exwm)\n ${optionalString cfg.enableDefaultConfig ''\n (require 'exwm-config)\n (exwm-config-default)\n ''}\n '';\n packages = e"..., 1380) = 1380
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/x11/window-managers/fluxbox.nix", {st_mode=S_IFREG|0444, st_size=509, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/x11/window-managers/fluxbox.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=509, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.xserver.windowManager.fluxbox;\nin\n{\n ###### interface\n options = {\n services.xserver.windowManager.fluxbox.enable = mkEnableOption \"fluxbox\";\n };\n\n ###### implementation\n config = mkIf cfg.enable {\n services.xserver.windo"..., 509) = 509
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/x11/window-managers/fvwm.nix", {st_mode=S_IFREG|0444, st_size=765, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/x11/window-managers/fvwm.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=765, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.xserver.windowManager.fvwm;\n fvwm = pkgs.fvwm.override { gestures = cfg.gestures; };\nin\n\n{\n\n ###### interface\n\n options = {\n services.xserver.windowManager.fvwm = {\n enable = mkEnableOption \"Fvwm window manager\";\n\n g"..., 765) = 765
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/x11/window-managers/herbstluftwm.nix", {st_mode=S_IFREG|0444, st_size=954, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/x11/window-managers/herbstluftwm.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=954, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.xserver.windowManager.herbstluftwm;\nin\n\n{\n options = {\n services.xserver.windowManager.herbstluftwm = {\n enable = mkEnableOption \"herbstluftwm\";\n\n configFile = mkOption {\n default = null;\n type "..., 954) = 954
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/x11/window-managers/i3.nix", {st_mode=S_IFREG|0444, st_size=1850, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/x11/window-managers/i3.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=1850, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.xserver.windowManager.i3;\nin\n\n{\n options.services.xserver.windowManager.i3 = {\n enable = mkEnableOption \"i3 window manager\";\n\n configFile = mkOption {\n default = null;\n type = with types; nullOr path;\n "..., 1850) = 1850
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/x11/window-managers/jwm.nix", {st_mode=S_IFREG|0444, st_size=476, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/x11/window-managers/jwm.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=476, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.xserver.windowManager.jwm;\nin\n{\n ###### interface\n options = {\n services.xserver.windowManager.jwm.enable = mkEnableOption \"jwm\";\n };\n\n ###### implementation\n config = mkIf cfg.enable {\n services.xserver.windowManager.ses"..., 476) = 476
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/x11/window-managers/metacity.nix", {st_mode=S_IFREG|0444, st_size=864, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/x11/window-managers/metacity.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=864, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.services.xserver.windowManager.metacity;\n xorg = config.services.xserver.package;\n gnome = pkgs.gnome;\n\nin\n\n{\n options = {\n services.xserver.windowManager.metacity.enable = mkEnableOption \"metacity\";\n };\n\n config = mkIf cfg.enable {"..., 864) = 864
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/x11/window-managers/mwm.nix", {st_mode=S_IFREG|0444, st_size=480, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/x11/window-managers/mwm.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=480, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.xserver.windowManager.mwm;\nin\n{\n ###### interface\n options = {\n services.xserver.windowManager.mwm.enable = mkEnableOption \"mwm\";\n };\n\n ###### implementation\n config = mkIf cfg.enable {\n services.xserver.windowManager.ses"..., 480) = 480
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/x11/window-managers/openbox.nix", {st_mode=S_IFREG|0444, st_size=494, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/x11/window-managers/openbox.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=494, ...}) = 0
read(3, "{lib, pkgs, config, ...}:\n\nwith lib;\nlet\n inherit (lib) mkOption mkIf;\n cfg = config.services.xserver.windowManager.openbox;\nin\n\n{\n options = {\n services.xserver.windowManager.openbox.enable = mkEnableOption \"openbox\";\n };\n\n config = mkIf cfg.enable {\n services.xserver.windowManager = {\n "..., 494) = 494
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/x11/window-managers/pekwm.nix", {st_mode=S_IFREG|0444, st_size=490, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/x11/window-managers/pekwm.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=490, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.xserver.windowManager.pekwm;\nin\n{\n ###### interface\n options = {\n services.xserver.windowManager.pekwm.enable = mkEnableOption \"pekwm\";\n };\n\n ###### implementation\n config = mkIf cfg.enable {\n services.xserver.windowManag"..., 490) = 490
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/x11/window-managers/notion.nix", {st_mode=S_IFREG|0444, st_size=476, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/x11/window-managers/notion.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=476, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.xserver.windowManager.notion;\nin\n\n{\n options = {\n services.xserver.windowManager.notion.enable = mkEnableOption \"notion\";\n };\n\n config = mkIf cfg.enable {\n services.xserver.windowManager = {\n session = [{\n name "..., 476) = 476
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/x11/window-managers/ratpoison.nix", {st_mode=S_IFREG|0444, st_size=518, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/x11/window-managers/ratpoison.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=518, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.xserver.windowManager.ratpoison;\nin\n{\n ###### interface\n options = {\n services.xserver.windowManager.ratpoison.enable = mkEnableOption \"ratpoison\";\n };\n\n ###### implementation\n config = mkIf cfg.enable {\n services.xserver"..., 518) = 518
close(3) = 0
brk(0x1a1b9000) = 0x1a1b9000
brk(0x1a1b6000) = 0x1a1b6000
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/x11/window-managers/sawfish.nix", {st_mode=S_IFREG|0444, st_size=504, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/x11/window-managers/sawfish.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=504, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.xserver.windowManager.sawfish;\nin\n{\n ###### interface\n options = {\n services.xserver.windowManager.sawfish.enable = mkEnableOption \"sawfish\";\n };\n\n ###### implementation\n config = mkIf cfg.enable {\n services.xserver.windo"..., 504) = 504
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/x11/window-managers/stumpwm.nix", {st_mode=S_IFREG|0444, st_size=462, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/x11/window-managers/stumpwm.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=462, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.xserver.windowManager.stumpwm;\nin\n\n{\n options = {\n services.xserver.windowManager.stumpwm.enable = mkEnableOption \"stumpwm\";\n };\n\n config = mkIf cfg.enable {\n services.xserver.windowManager.session = singleton {\n name "..., 462) = 462
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/x11/window-managers/spectrwm.nix", {st_mode=S_IFREG|0444, st_size=491, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/x11/window-managers/spectrwm.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=491, ...}) = 0
read(3, "\n{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.xserver.windowManager.spectrwm;\nin\n\n{\n options = {\n services.xserver.windowManager.spectrwm.enable = mkEnableOption \"spectrwm\";\n };\n\n config = mkIf cfg.enable {\n services.xserver.windowManager = {\n session = [{\n "..., 491) = 491
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/x11/window-managers/twm.nix", {st_mode=S_IFREG|0444, st_size=523, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/x11/window-managers/twm.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=523, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.services.xserver.windowManager.twm;\n\nin\n\n{\n\n ###### interface\n\n options = {\n services.xserver.windowManager.twm.enable = mkEnableOption \"twm\";\n };\n\n\n ###### implementation\n\n config = mkIf cfg.enable {\n\n services.xserver.windowMan"..., 523) = 523
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/x11/window-managers/windowmaker.nix", {st_mode=S_IFREG|0444, st_size=527, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/x11/window-managers/windowmaker.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=527, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.xserver.windowManager.windowmaker;\nin\n{\n ###### interface\n options = {\n services.xserver.windowManager.windowmaker.enable = mkEnableOption \"windowmaker\";\n };\n\n ###### implementation\n config = mkIf cfg.enable {\n services.x"..., 527) = 527
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/x11/window-managers/wmii.nix", {st_mode=S_IFREG|0444, st_size=1222, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/x11/window-managers/wmii.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=1222, ...}) = 0
read(3, "{ config, lib, pkgs, options, modulesPath, ... }:\n\nwith lib;\nlet\n inherit (lib) mkOption mkIf singleton;\n cfg = config.services.xserver.windowManager.wmii;\n wmii = pkgs.wmii_hg;\nin\n{\n options = {\n services.xserver.windowManager.wmii.enable = mkEnableOption \"wmii\";\n };\n\n config = mkIf cfg.en"..., 1222) = 1222
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/x11/window-managers/xmonad.nix", {st_mode=S_IFREG|0444, st_size=1971, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/x11/window-managers/xmonad.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=1971, ...}) = 0
read(3, "{pkgs, lib, config, ...}:\n\nwith lib;\nlet\n inherit (lib) mkOption mkIf optionals literalExample;\n cfg = config.services.xserver.windowManager.xmonad;\n xmonad = pkgs.xmonad-with-packages.override {\n ghcWithPackages = cfg.haskellPackages.ghcWithPackages;\n packages = self: cfg.extraPackages sel"..., 1971) = 1971
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/x11/window-managers/qtile.nix", {st_mode=S_IFREG|0444, st_size=445, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/x11/window-managers/qtile.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=445, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.xserver.windowManager.qtile;\nin\n\n{\n options = {\n services.xserver.windowManager.qtile.enable = mkEnableOption \"qtile\";\n };\n\n config = mkIf cfg.enable {\n services.xserver.windowManager.session = [{\n name = \"qtile\";\n "..., 445) = 445
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/x11/window-managers/none.nix", {st_mode=S_IFREG|0444, st_size=160, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/x11/window-managers/none.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=160, ...}) = 0
read(3, "{\n services = {\n xserver = {\n windowManager = {\n session = [{\n name = \"none\";\n start = \"\";\n }];\n };\n };\n };\n}\n", 160) = 160
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/x11/window-managers/icewm.nix", {st_mode=S_IFREG|0444, st_size=517, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/x11/window-managers/icewm.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=517, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.xserver.windowManager.icewm;\nin\n{\n ###### interface\n options = {\n services.xserver.windowManager.icewm.enable = mkEnableOption \"icewm\";\n };\n\n ###### implementation\n config = mkIf cfg.enable {\n services.xserver.windowManag"..., 517) = 517
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/x11/window-managers/windowlab.nix", {st_mode=S_IFREG|0444, st_size=459, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/x11/window-managers/windowlab.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=459, ...}) = 0
read(3, "{lib, pkgs, config, ...}:\n\nlet\n cfg = config.services.xserver.windowManager.windowlab;\nin\n\n{\n options = {\n services.xserver.windowManager.windowlab.enable =\n lib.mkEnableOption \"windowlab\";\n };\n\n config = lib.mkIf cfg.enable {\n services.xserver.windowManager = {\n session =\n "..., 459) = 459
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/x11/xautolock.nix", {st_mode=S_IFREG|0444, st_size=4192, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/x11/xautolock.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=4192, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.xserver.xautolock;\nin\n {\n options = {\n services.xserver.xautolock = {\n enable = mkEnableOption \"xautolock\";\n enableNotifier = mkEnableOption \"xautolock.notify\" // {\n description = ''\n Wheth"..., 4192) = 4192
close(3) = 0
brk(0x1a1d7000) = 0x1a1d7000
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/x11/xbanish.nix", {st_mode=S_IFREG|0444, st_size=698, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/x11/xbanish.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=698, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet cfg = config.services.xbanish;\n\nin {\n options.services.xbanish = {\n\n enable = mkEnableOption \"xbanish\";\n\n arguments = mkOption {\n description = \"Arguments to pass to xbanish command\";\n default = \"\";\n example = \"-d -i shift\";\n typ"..., 698) = 698
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/x11/xfs.nix", {st_mode=S_IFREG|0444, st_size=772, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/x11/xfs.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=772, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n configFile = ./xfs.conf;\n\nin\n\n{\n\n ###### interface\n\n options = {\n\n services.xfs = {\n\n enable = mkOption {\n type = types.bool;\n default = false;\n description = \"Whether to enable the X Font Server.\";\n };\n\n };\n\n };\n"..., 772) = 772
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/x11/xserver.nix", {st_mode=S_IFREG|0444, st_size=24895, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/x11/xserver.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=24895, ...}) = 0
read(3, "{ config, lib, pkgs, pkgs_i686, ... }:\n\nwith lib;\n\nlet\n\n kernelPackages = config.boot.kernelPackages;\n\n # Abbreviations.\n cfg = config.services.xserver;\n xorg = pkgs.xorg;\n\n\n # Map video driver names to driver packages. FIXME: move into card-specific modules.\n knownVideoDrivers = {\n virtual"..., 24895) = 24895
close(3) = 0
brk(0x1a1f8000) = 0x1a1f8000
brk(0x1a219000) = 0x1a219000
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/system/activation/activation-script.nix", {st_mode=S_IFREG|0444, st_size=4912, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/system/activation/activation-script.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=4912, ...}) = 0
read(3, "# generate the script used to activate the configuration.\n{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n addAttributeName = mapAttrs (a: v: v // {\n text = ''\n #### Activation script snippet ${a}:\n ${v.text}\n '';\n });\n\n path = with pkgs; map getBin\n [ coreutils\n gnugrep\n "..., 4912) = 4912
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/system/activation/top-level.nix", {st_mode=S_IFREG|0444, st_size=8504, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/system/activation/top-level.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=8504, ...}) = 0
read(3, "{ config, lib, pkgs, modules, baseModules, ... }:\n\nwith lib;\n\nlet\n\n\n # This attribute is responsible for creating boot entries for\n # child configuration. They are only (directly) accessible\n # when the parent configuration is boot default. For example,\n # you can provide an easy way to boot the"..., 8504) = 8504
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/system/boot/binfmt.nix", {st_mode=S_IFREG|0444, st_size=4741, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/system/boot/binfmt.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=4741, ...}) = 0
read(3, "{ config, lib, ... }:\nlet\n inherit (lib) mkOption types optionalString;\n\n cfg = config.boot.binfmtMiscRegistrations;\n\n makeBinfmtLine = name: { recognitionType, offset, magicOrExtension\n , mask, preserveArgvZero, openBinary\n , matchCredentials, fixB"..., 4741) = 4741
close(3) = 0
brk(0x1a23a000) = 0x1a23a000
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/system/boot/coredump.nix", {st_mode=S_IFREG|0444, st_size=1689, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/system/boot/coredump.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=1689, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\n{\n\n options = {\n\n systemd.coredump = {\n\n enable = mkOption {\n default = false;\n type = types.bool;\n description = ''\n Enables storing core dumps in systemd.\n Note that this alone is not enough to enable core dump"..., 1689) = 1689
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/system/boot/emergency-mode.nix", {st_mode=S_IFREG|0444, st_size=762, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/system/boot/emergency-mode.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=762, ...}) = 0
read(3, "{ config, lib, ... }:\n\nwith lib;\n\n{\n\n ###### interface\n\n options = {\n\n systemd.enableEmergencyMode = mkOption {\n default = true;\n type = types.bool;\n description = ''\n Whether to enable emergency mode, which is an\n <command>sulogin</command> shell started on the con"..., 762) = 762
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/system/boot/grow-partition.nix", {st_mode=S_IFREG|0444, st_size=1206, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/system/boot/grow-partition.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=1206, ...}) = 0
read(3, "# This module automatically grows the root partition.\n# This allows an instance to be created with a bigger root filesystem\n# than provided by the machine image.\n\n{ config, lib, pkgs, ... }:\n\nwith lib;\n\n{\n\n options = {\n boot.growPartition = mkEnableOption \"grow the root partition on boot\";\n };\n"..., 1206) = 1206
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/system/boot/initrd-network.nix", {st_mode=S_IFREG|0444, st_size=2667, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/system/boot/initrd-network.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=2667, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.boot.initrd.network;\n\n udhcpcScript = pkgs.writeScript \"udhcp-script\"\n ''\n #! /bin/sh\n if [ \"$1\" = bound ]; then\n ip address add \"$ip/$mask\" dev \"$interface\"\n if [ -n \"$router\" ]; then\n ip route add defa"..., 2667) = 2667
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/system/boot/initrd-ssh.nix", {st_mode=S_IFREG|0444, st_size=3968, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/system/boot/initrd-ssh.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=3968, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.boot.initrd.network.ssh;\n\nin\n\n{\n\n options = {\n\n boot.initrd.network.ssh.enable = mkOption {\n type = types.bool;\n default = false;\n description = ''\n Start SSH service during initrd boot. It can be used to debug fai"..., 3968) = 3968
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/system/boot/kernel.nix", {st_mode=S_IFREG|0444, st_size=10201, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/system/boot/kernel.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=10201, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n inherit (config.boot) kernelPatches;\n inherit (config.boot.kernel) features;\n inherit (config.boot.kernelPackages) kernel;\n\n kernelModulesConf = pkgs.writeText \"nixos.conf\"\n ''\n ${concatStringsSep \"\\n\" config.boot.kernelModules}\n '';\n\nin\n\n"..., 10201) = 10201
close(3) = 0
brk(0x1a25b000) = 0x1a25b000
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/system/boot/kexec.nix", {st_mode=S_IFREG|0444, st_size=610, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/system/boot/kexec.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=610, ...}) = 0
read(3, "{ config, pkgs, ... }:\n\n{\n environment.systemPackages = [ pkgs.kexectools ];\n\n systemd.services.\"prepare-kexec\" =\n { description = \"Preparation for kexec\";\n wantedBy = [ \"kexec.target\" ];\n before = [ \"systemd-kexec.service\" ];\n unitConfig.DefaultDependencies = false;\n servic"..., 610) = 610
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/system/boot/loader/efi.nix", {st_mode=S_IFREG|0444, st_size=413, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/system/boot/loader/efi.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=413, ...}) = 0
read(3, "{ lib, ... }:\n\nwith lib;\n\n{\n options.boot.loader.efi = {\n\n canTouchEfiVariables = mkOption {\n default = false;\n type = types.bool;\n description = \"Whether the installation process is allowed to modify EFI boot variables.\";\n };\n\n efiSysMountPoint = mkOption {\n default = "..., 413) = 413
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/system/boot/loader/generations-dir/generations-dir.nix", {st_mode=S_IFREG|0444, st_size=1771, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/system/boot/loader/generations-dir/generations-dir.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=1771, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n generationsDirBuilder = pkgs.substituteAll {\n src = ./generations-dir-builder.sh;\n isExecutable = true;\n inherit (pkgs) bash;\n path = [pkgs.coreutils pkgs.gnused pkgs.gnugrep];\n inherit (config.boot.loader.generationsDir) copyKernels;\n }"..., 1771) = 1771
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/system/boot/loader/generic-extlinux-compatible", {st_mode=S_IFDIR|0555, st_size=5, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/system/boot/loader/generic-extlinux-compatible/default.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=1278, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n blCfg = config.boot.loader;\n cfg = blCfg.generic-extlinux-compatible;\n\n timeoutStr = if blCfg.timeout == null then \"-1\" else toString blCfg.timeout;\n\n builder = import ./extlinux-conf-builder.nix { inherit pkgs; };\nin\n{\n options = {\n boot.loader.g"..., 1278) = 1278
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/system/boot/loader/grub/grub.nix", {st_mode=S_IFREG|0444, st_size=22056, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/system/boot/loader/grub/grub.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=22056, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.boot.loader.grub;\n\n efi = config.boot.loader.efi;\n\n realGrub = if cfg.version == 1 then pkgs.grub\n else if cfg.zfsSupport then pkgs.grub2.override { zfsSupport = true; }\n else if cfg.trustedBoot.enable\n then if cfg.trustedBo"..., 22056) = 22056
close(3) = 0
brk(0x1a27c000) = 0x1a27c000
brk(0x1a29d000) = 0x1a29d000
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/system/boot/loader/grub/ipxe.nix", {st_mode=S_IFREG|0444, st_size=1494, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/system/boot/loader/grub/ipxe.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=1494, ...}) = 0
read(3, "# This module adds a scripted iPXE entry to the GRUB boot menu.\n\n{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n scripts = builtins.attrNames config.boot.loader.grub.ipxe;\n\n grubEntry = name:\n ''\n menuentry \"iPXE - ${name}\" {\n linux16 @bootRoot@/ipxe.lkrn\n initrd16 @bootRoot@/${"..., 1494) = 1494
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/system/boot/loader/grub/memtest.nix", {st_mode=S_IFREG|0444, st_size=2415, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/system/boot/loader/grub/memtest.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=2415, ...}) = 0
read(3, "# This module adds Memtest86+ to the GRUB boot menu.\n\n{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n memtest86 = pkgs.memtest86plus;\n cfg = config.boot.loader.grub.memtest86;\nin\n\n{\n options = {\n\n boot.loader.grub.memtest86 = {\n\n enable = mkOption {\n default = false;\n type = ty"..., 2415) = 2415
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/system/boot/loader/init-script/init-script.nix", {st_mode=S_IFREG|0444, st_size=1045, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/system/boot/loader/init-script/init-script.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=1045, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n initScriptBuilder = pkgs.substituteAll {\n src = ./init-script-builder.sh;\n isExecutable = true;\n inherit (pkgs) bash;\n path = [pkgs.coreutils pkgs.gnused pkgs.gnugrep];\n };\n\nin\n\n{\n\n ###### interface\n\n options = {\n\n boot.loader.initScri"..., 1045) = 1045
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/system/boot/loader/loader.nix", {st_mode=S_IFREG|0444, st_size=371, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/system/boot/loader/loader.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=371, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\n{\n options = {\n boot.loader.timeout = mkOption {\n default = 5;\n type = types.nullOr types.int;\n description = ''\n Timeout (in seconds) until loader boots the default menu item. Use null if the loader men"..., 371) = 371
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/system/boot/loader/raspberrypi/raspberrypi.nix", {st_mode=S_IFREG|0444, st_size=1041, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/system/boot/loader/raspberrypi/raspberrypi.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=1041, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.boot.loader.raspberryPi;\n\n builder = pkgs.substituteAll {\n src = ./builder.sh;\n isExecutable = true;\n inherit (pkgs) bash;\n path = [pkgs.coreutils pkgs.gnused pkgs.gnugrep];\n firmware = pkgs.raspberrypifw;\n version = cfg.v"..., 1041) = 1041
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/system/boot/loader/systemd-boot/systemd-boot.nix", {st_mode=S_IFREG|0444, st_size=1860, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/system/boot/loader/systemd-boot/systemd-boot.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=1860, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.boot.loader.systemd-boot;\n\n efi = config.boot.loader.efi;\n\n gummibootBuilder = pkgs.substituteAll {\n src = ./systemd-boot-builder.py;\n\n isExecutable = true;\n\n inherit (pkgs) python3;\n\n systemd = config.systemd.package;\n\n nix"..., 1860) = 1860
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/system/boot/luksroot.nix", {st_mode=S_IFREG|0444, st_size=17476, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/system/boot/luksroot.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=17476, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n luks = config.boot.initrd.luks;\n\n openCommand = name': { name, device, header, keyFile, keyFileSize, allowDiscards, yubikey, ... }: assert name' == name; ''\n\n # Wait for a target (e.g. device, keyFile, header, ...) to appear.\n wait_target() {\n "..., 17476) = 17476
close(3) = 0
brk(0x1a2be000) = 0x1a2be000
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/system/boot/modprobe.nix", {st_mode=S_IFREG|0444, st_size=1815, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/system/boot/modprobe.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=1815, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\n{\n\n ###### interface\n\n options = {\n\n boot.blacklistedKernelModules = mkOption {\n type = types.listOf types.str;\n default = [];\n example = [ \"cirrusfb\" \"i2c_piix4\" ];\n description = ''\n List of names of kernel modules that should"..., 1815) = 1815
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/system/boot/networkd.nix", {st_mode=S_IFREG|0444, st_size=23703, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/system/boot/networkd.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=23703, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\nwith import ./systemd-unit-options.nix { inherit config lib; };\nwith import ./systemd-lib.nix { inherit config lib pkgs; };\n\nlet\n\n cfg = config.systemd.network;\n\n checkLink = checkUnitConfig \"Link\" [\n (assertOnlyFields [\n \"Description\" \"Alias\" \"MACAdd"..., 23703) = 23703
close(3) = 0
brk(0x1a2e2000) = 0x1a2e2000
brk(0x1a303000) = 0x1a303000
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/system/boot/plymouth.nix", {st_mode=S_IFREG|0444, st_size=5097, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/system/boot/plymouth.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=5097, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n inherit (pkgs) plymouth;\n\n cfg = config.boot.plymouth;\n\n breezePlymouth = pkgs.breeze-plymouth.override {\n nixosBranding = true;\n nixosVersion = config.system.nixos.release;\n };\n\n themesEnv = pkgs.buildEnv {\n name = \"plymouth-themes\";\n p"..., 5097) = 5097
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/system/boot/resolved.nix", {st_mode=S_IFREG|0444, st_size=4835, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/system/boot/resolved.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=4835, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\nlet\n cfg = config.services.resolved;\nin\n{\n\n options = {\n\n services.resolved.enable = mkOption {\n default = false;\n type = types.bool;\n description = ''\n Whether to enable the systemd DNS resolver daemon.\n '';\n };\n\n services"..., 4835) = 4835
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/system/boot/shutdown.nix", {st_mode=S_IFREG|0444, st_size=658, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/system/boot/shutdown.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=658, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\n{\n\n # This unit saves the value of the system clock to the hardware\n # clock on shutdown.\n systemd.services.save-hwclock =\n { description = \"Save Hardware Clock\";\n\n wantedBy = [ \"shutdown.target\" ];\n\n unitConfig = {\n DefaultDependencies "..., 658) = 658
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/system/boot/stage-1.nix", {st_mode=S_IFREG|0444, st_size=16637, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/system/boot/stage-1.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=16637, ...}) = 0
read(3, "# This module builds the initial ramdisk, which contains an init\n# script that performs the first stage of booting the system: it loads\n# the modules necessary to mount the root file system, then calls the\n# init in the root file system to start the second boot stage.\n\n{ config, lib, utils, pkgs, .."..., 16637) = 16637
close(3) = 0
brk(0x1a324000) = 0x1a324000
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/system/boot/stage-2.nix", {st_mode=S_IFREG|0444, st_size=1871, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/system/boot/stage-2.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=1871, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n kernel = config.boot.kernelPackages.kernel;\n activateConfiguration = config.system.activationScripts.script;\n\n bootStage2 = pkgs.substituteAll {\n src = ./stage-2-init.sh;\n shellDebug = \"${pkgs.bashInteractive}/bin/bash\";\n isExecutable = true;"..., 1871) = 1871
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/system/boot/systemd.nix", {st_mode=S_IFREG|0444, st_size=29624, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/system/boot/systemd.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=29624, ...}) = 0
brk(0x1a346000) = 0x1a346000
read(3, "{ config, lib, pkgs, utils, ... }:\n\nwith utils;\nwith lib;\nwith import ./systemd-unit-options.nix { inherit config lib; };\nwith import ./systemd-lib.nix { inherit config lib pkgs; };\n\nlet\n\n cfg = config.systemd;\n\n systemd = cfg.package;\n\n upstreamSystemUnits =\n [ # Targets.\n \"basic.target\""..., 29624) = 29624
close(3) = 0
mmap(NULL, 425984, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) = 0x76ffc6bfb000
munmap(0x76ffc6c63000, 212992) = 0
brk(0x1a367000) = 0x1a367000
brk(0x1a388000) = 0x1a388000
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/system/boot/systemd-lib.nix", {st_mode=S_IFREG|0444, st_size=6277, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/system/boot/systemd-lib.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=6277, ...}) = 0
read(3, "{ config, lib, pkgs }:\n\nwith lib;\n\nlet cfg = config.systemd; in\n\nrec {\n\n shellEscape = s: (replaceChars [ \"\\\\\" ] [ \"\\\\\\\\\" ] s);\n\n makeUnit = name: unit:\n let\n pathSafeName = lib.replaceChars [\"@\" \":\" \"\\\\\" \"[\" \"]\"] [\"-\" \"-\" \"-\" \"\" \"\"] name;\n in\n if unit.enable then\n pkgs.runComma"..., 6277) = 6277
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/system/boot/systemd-unit-options.nix", {st_mode=S_IFREG|0444, st_size=14527, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/system/boot/systemd-unit-options.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=14527, ...}) = 0
read(3, "{ config, lib }:\n\nwith lib;\nwith import ./systemd-lib.nix { inherit config lib pkgs; };\n\nlet\n checkService = checkUnitConfig \"Service\" [\n (assertValueOneOf \"Type\" [\n \"simple\" \"forking\" \"oneshot\" \"dbus\" \"notify\" \"idle\"\n ])\n (assertValueOneOf \"Restart\" [\n \"no\" \"on-success\" \"on-fail"..., 14527) = 14527
close(3) = 0
brk(0x1a3a9000) = 0x1a3a9000
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/system/boot/systemd-nspawn.nix", {st_mode=S_IFREG|0444, st_size=3640, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/system/boot/systemd-nspawn.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=3640, ...}) = 0
read(3, "{ config, lib , pkgs, ...}:\n\nwith lib;\nwith import ./systemd-unit-options.nix { inherit config lib; };\nwith import ./systemd-lib.nix { inherit config lib pkgs; };\n\nlet\n cfg = config.systemd.nspawn;\n assertions = [\n # boot = true -> processtwo != true\n ];\n\n checkExec = checkUnitConfig \"Exec\" ["..., 3640) = 3640
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/system/boot/timesyncd.nix", {st_mode=S_IFREG|0444, st_size=1081, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/system/boot/timesyncd.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=1081, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\n{\n\n options = {\n\n services.timesyncd = {\n enable = mkOption {\n default = !config.boot.isContainer;\n type = types.bool;\n description = ''\n Enables the systemd NTP client daemon.\n '';\n };\n servers = mkOptio"..., 1081) = 1081
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/system/boot/tmp.nix", {st_mode=S_IFREG|0444, st_size=702, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/system/boot/tmp.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=702, ...}) = 0
read(3, "{ config, lib, ... }:\n\nwith lib;\n\n{\n\n ###### interface\n\n options = {\n\n boot.cleanTmpDir = mkOption {\n type = types.bool;\n default = false;\n description = ''\n Whether to delete all files in <filename>/tmp</filename> during boot.\n '';\n };\n\n boot.tmpOnTmpfs = mkOpt"..., 702) = 702
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/system/etc/etc.nix", {st_mode=S_IFREG|0444, st_size=4327, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/system/etc/etc.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=4327, ...}) = 0
read(3, "# Management of static files in /etc.\n\n{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n etc' = filter (f: f.enable) (attrValues config.environment.etc);\n\n etc = pkgs.stdenvNoCC.mkDerivation {\n name = \"etc\";\n\n builder = ./make-etc.sh;\n\n preferLocalBuild = true;\n allowSubstitutes = false;\n\n"..., 4327) = 4327
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/tasks/bcache.nix", {st_mode=S_IFREG|0444, st_size=247, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/tasks/bcache.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=247, ...}) = 0
read(3, "{ config, pkgs, ... }:\n\n{\n\n environment.systemPackages = [ pkgs.bcache-tools ];\n\n services.udev.packages = [ pkgs.bcache-tools ];\n\n boot.initrd.extraUdevRulesCommands = ''\n cp -v ${pkgs.bcache-tools}/lib/udev/rules.d/*.rules $out/\n ''; \n\n}\n", 247) = 247
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/tasks/cpu-freq.nix", {st_mode=S_IFREG|0444, st_size=1241, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/tasks/cpu-freq.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=1241, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cpupower = config.boot.kernelPackages.cpupower;\n cfg = config.powerManagement;\nin\n\n{\n ###### interface\n\n options = {\n\n powerManagement.cpuFreqGovernor = mkOption {\n type = types.nullOr types.str;\n default = null;\n example = \"ondemand"..., 1241) = 1241
close(3) = 0
brk(0x1a3ca000) = 0x1a3ca000
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/tasks/encrypted-devices.nix", {st_mode=S_IFREG|0444, st_size=2355, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/tasks/encrypted-devices.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=2355, ...}) = 0
read(3, "{ config, lib, ... }:\n\nwith lib;\n\nlet\n fileSystems = config.system.build.fileSystems ++ config.swapDevices;\n encDevs = filter (dev: dev.encrypted.enable) fileSystems;\n keyedEncDevs = filter (dev: dev.encrypted.keyFile != null) encDevs;\n keylessEncDevs = filter (dev: dev.encrypted.keyFile == null"..., 2355) = 2355
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/tasks/filesystems.nix", {st_mode=S_IFREG|0444, st_size=11170, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/tasks/filesystems.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=11170, ...}) = 0
read(3, "{ config, lib, pkgs, utils, ... }:\n\nwith lib;\nwith utils;\n\nlet\n\n addCheckDesc = desc: elemType: check: types.addCheck elemType check\n // { description = \"${elemType.description} (with check: ${desc})\"; };\n nonEmptyStr = addCheckDesc \"non-empty\" types.str\n (x: x != \"\" && ! (all (c: c == \" \" |"..., 11170) = 11170
close(3) = 0
brk(0x1a3eb000) = 0x1a3eb000
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/tasks/filesystems/bcachefs.nix", {st_mode=S_IFREG|0444, st_size=614, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/tasks/filesystems/bcachefs.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=614, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n inInitrd = any (fs: fs == \"bcachefs\") config.boot.initrd.supportedFilesystems;\n\nin\n\n{\n config = mkIf (any (fs: fs == \"bcachefs\") config.boot.supportedFilesystems) {\n\n system.fsPackages = [ pkgs.bcachefs-tools ];\n\n # use kernel package with bcache"..., 614) = 614
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/tasks/filesystems/btrfs.nix", {st_mode=S_IFREG|0444, st_size=4457, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/tasks/filesystems/btrfs.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=4457, ...}) = 0
read(3, "{ config, lib, pkgs, utils, ... }:\n\nwith lib;\n\nlet\n\n inInitrd = any (fs: fs == \"btrfs\") config.boot.initrd.supportedFilesystems;\n inSystem = any (fs: fs == \"btrfs\") config.boot.supportedFilesystems;\n\n cfgScrub = config.services.btrfs.autoScrub;\n\n enableAutoScrub = cfgScrub.enable;\n enableBtrfs "..., 4457) = 4457
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/tasks/filesystems/cifs.nix", {st_mode=S_IFREG|0444, st_size=518, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/tasks/filesystems/cifs.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=518, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n inInitrd = any (fs: fs == \"cifs\") config.boot.initrd.supportedFilesystems;\n\nin\n\n{\n config = {\n\n system.fsPackages = mkIf (any (fs: fs == \"cifs\") config.boot.supportedFilesystems) [ pkgs.cifs-utils ];\n\n boot.initrd.availableKernelModules = mkIf in"..., 518) = 518
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/tasks/filesystems/ecryptfs.nix", {st_mode=S_IFREG|0444, st_size=430, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/tasks/filesystems/ecryptfs.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=430, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n# TODO: make ecryptfs work in initramfs?\n\nwith lib;\n\n{\n config = mkIf (any (fs: fs == \"ecryptfs\") config.boot.supportedFilesystems) {\n system.fsPackages = [ pkgs.ecryptfs ];\n security.wrappers = {\n \"mount.ecryptfs_private\".source = \"${pkgs.ecryptfs.out}/bin/mo"..., 430) = 430
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/tasks/filesystems/exfat.nix", {st_mode=S_IFREG|0444, st_size=190, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/tasks/filesystems/exfat.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=190, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\n{\n config = mkIf (any (fs: fs == \"exfat\") config.boot.supportedFilesystems) {\n\n system.fsPackages = [ pkgs.exfat-utils pkgs.fuse_exfat ];\n\n };\n}\n", 190) = 190
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/tasks/filesystems/ext.nix", {st_mode=S_IFREG|0444, st_size=572, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/tasks/filesystems/ext.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=572, ...}) = 0
read(3, "{ config, pkgs, ... }:\n\n{\n config = {\n\n system.fsPackages = [ pkgs.e2fsprogs ];\n\n # As of kernel 4.3, there is no separate ext3 driver (they're also handled by ext4.ko)\n boot.initrd.availableKernelModules = [ \"ext2\" \"ext4\" ];\n\n boot.initrd.extraUtilsCommands =\n ''\n # Copy e2"..., 572) = 572
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/tasks/filesystems/f2fs.nix", {st_mode=S_IFREG|0444, st_size=452, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/tasks/filesystems/f2fs.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=452, ...}) = 0
read(3, "{ config, pkgs, lib, ... }:\n\nwith lib;\n\nlet\n inInitrd = any (fs: fs == \"f2fs\") config.boot.initrd.supportedFilesystems;\nin\n{\n config = mkIf (any (fs: fs == \"f2fs\") config.boot.supportedFilesystems) {\n\n system.fsPackages = [ pkgs.f2fs-tools ];\n\n boot.initrd.availableKernelModules = mkIf inIni"..., 452) = 452
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/tasks/filesystems/jfs.nix", {st_mode=S_IFREG|0444, st_size=427, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/tasks/filesystems/jfs.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=427, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n inInitrd = any (fs: fs == \"jfs\") config.boot.initrd.supportedFilesystems;\nin\n{\n config = mkIf (any (fs: fs == \"jfs\") config.boot.supportedFilesystems) {\n\n system.fsPackages = [ pkgs.jfsutils ];\n\n boot.initrd.kernelModules = mkIf inInitrd [ \"jfs\" ]"..., 427) = 427
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/tasks/filesystems/nfs.nix", {st_mode=S_IFREG|0444, st_size=2319, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/tasks/filesystems/nfs.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=2319, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n inInitrd = any (fs: fs == \"nfs\") config.boot.initrd.supportedFilesystems;\n\n nfsStateDir = \"/var/lib/nfs\";\n\n rpcMountpoint = \"${nfsStateDir}/rpc_pipefs\";\n\n idmapdConfFile = pkgs.writeText \"idmapd.conf\" ''\n [General]\n Pipefs-Directory = ${rpcMoun"..., 2319) = 2319
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/tasks/filesystems/ntfs.nix", {st_mode=S_IFREG|0444, st_size=187, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/tasks/filesystems/ntfs.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=187, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\n{\n config = mkIf (any (fs: fs == \"ntfs\" || fs == \"ntfs-3g\") config.boot.supportedFilesystems) {\n\n system.fsPackages = [ pkgs.ntfs3g ];\n\n };\n}\n", 187) = 187
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/tasks/filesystems/reiserfs.nix", {st_mode=S_IFREG|0444, st_size=516, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/tasks/filesystems/reiserfs.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=516, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n inInitrd = any (fs: fs == \"reiserfs\") config.boot.initrd.supportedFilesystems;\n\nin\n\n{\n config = mkIf (any (fs: fs == \"reiserfs\") config.boot.supportedFilesystems) {\n\n system.fsPackages = [ pkgs.reiserfsprogs ];\n\n boot.initrd.kernelModules = mkIf "..., 516) = 516
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/tasks/filesystems/unionfs-fuse.nix", {st_mode=S_IFREG|0444, st_size=1230, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/tasks/filesystems/unionfs-fuse.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=1230, ...}) = 0
read(3, "{ config, pkgs, lib, ... }:\n\n{\n config = lib.mkMerge [\n\n (lib.mkIf (lib.any (fs: fs == \"unionfs-fuse\") config.boot.initrd.supportedFilesystems) {\n boot.initrd.kernelModules = [ \"fuse\" ];\n\n boot.initrd.extraUtilsCommands = ''\n copy_bin_and_libs ${pkgs.fuse}/sbin/mount.fuse\n "..., 1230) = 1230
close(3) = 0
brk(0x1a40c000) = 0x1a40c000
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/tasks/filesystems/vboxsf.nix", {st_mode=S_IFREG|0444, st_size=473, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/tasks/filesystems/vboxsf.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=473, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n inInitrd = any (fs: fs == \"vboxsf\") config.boot.initrd.supportedFilesystems;\n\n package = pkgs.runCommand \"mount.vboxsf\" {} ''\n mkdir -p $out/bin\n cp ${pkgs.linuxPackages.virtualboxGuestAdditions}/bin/mount.vboxsf $out/bin\n '';\nin\n\n{\n config = m"..., 473) = 473
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/tasks/filesystems/vfat.nix", {st_mode=S_IFREG|0444, st_size=517, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/tasks/filesystems/vfat.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=517, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n inInitrd = any (fs: fs == \"vfat\") config.boot.initrd.supportedFilesystems;\n\nin\n\n{\n config = mkIf (any (fs: fs == \"vfat\") config.boot.supportedFilesystems) {\n\n system.fsPackages = [ pkgs.dosfstools ];\n\n boot.initrd.kernelModules = mkIf inInitrd [ "..., 517) = 517
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/tasks/filesystems/xfs.nix", {st_mode=S_IFREG|0444, st_size=662, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/tasks/filesystems/xfs.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=662, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n inInitrd = any (fs: fs == \"xfs\") config.boot.initrd.supportedFilesystems;\n\nin\n\n{\n config = mkIf (any (fs: fs == \"xfs\") config.boot.supportedFilesystems) {\n\n system.fsPackages = [ pkgs.xfsprogs.bin ];\n\n boot.initrd.availableKernelModules = mkIf in"..., 662) = 662
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/tasks/filesystems/zfs.nix", {st_mode=S_IFREG|0444, st_size=17361, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/tasks/filesystems/zfs.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=17361, ...}) = 0
read(3, "{ config, lib, pkgs, utils, ... }:\n#\n# todo:\n# - crontab for scrubs, etc\n# - zfs tunables\n\nwith utils;\nwith lib;\n\nlet\n\n cfgSpl = config.boot.spl;\n cfgZfs = config.boot.zfs;\n cfgSnapshots = config.services.zfs.autoSnapshot;\n cfgSnapFlags = cfgSnapshots.flags;\n cfgScrub = config.services.zfs."..., 17361) = 17361
close(3) = 0
brk(0x1a42d000) = 0x1a42d000
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/tasks/kbd.nix", {st_mode=S_IFREG|0444, st_size=3894, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/tasks/kbd.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=3894, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n makeColor = n: value: \"COLOR_${toString n}=${value}\";\n makeColorCS =\n let positions = [ \"0\" \"1\" \"2\" \"3\" \"4\" \"5\" \"6\" \"7\" \"8\" \"9\" \"A\" \"B\" \"C\" \"D\" \"E\" \"F\" ];\n in n: value: \"\\\\033]P${elemAt positions (n - 1)}${value}\";\n colors = concatImapStringsSep"..., 3894) = 3894
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/tasks/lvm.nix", {st_mode=S_IFREG|0444, st_size=216, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/tasks/lvm.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=216, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\n{\n\n ###### implementation\n\n config = mkIf (!config.boot.isContainer) {\n\n environment.systemPackages = [ pkgs.lvm2 ];\n\n services.udev.packages = [ pkgs.lvm2 ];\n\n };\n\n}\n", 216) = 216
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/tasks/network-interfaces.nix", {st_mode=S_IFREG|0444, st_size=42358, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/tasks/network-interfaces.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=42358, ...}) = 0
read(3, "{ config, options, lib, pkgs, utils, stdenv, ... }:\n\nwith lib;\nwith utils;\n\nlet\n\n cfg = config.networking;\n interfaces = attrValues cfg.interfaces;\n hasVirtuals = any (i: i.virtual) interfaces;\n hasSits = cfg.sits != { };\n hasBonds = cfg.bonds != { };\n\n slaves = concatMap (i: i.interfaces) (at"..., 42358) = 42358
brk(0x1a454000) = 0x1a454000
close(3) = 0
brk(0x1a475000) = 0x1a475000
brk(0x1a496000) = 0x1a496000
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/tasks/network-interfaces-systemd.nix", {st_mode=S_IFREG|0444, st_size=9287, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/tasks/network-interfaces-systemd.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=9287, ...}) = 0
read(3, "{ config, lib, pkgs, utils, ... }:\n\nwith utils;\nwith lib;\n\nlet\n\n cfg = config.networking;\n interfaces = attrValues cfg.interfaces;\n\n interfaceIps = i:\n i.ipv4.addresses\n ++ optionals cfg.enableIPv6 i.ipv6.addresses;\n\n dhcpStr = useDHCP: if useDHCP == true || useDHCP == null then \"both\" els"..., 9287) = 9287
close(3) = 0
brk(0x1a4b7000) = 0x1a4b7000
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/tasks/network-interfaces-scripted.nix", {st_mode=S_IFREG|0444, st_size=21035, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/tasks/network-interfaces-scripted.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=21035, ...}) = 0
read(3, "{ config, lib, pkgs, utils, ... }:\n\nwith utils;\nwith lib;\n\nlet\n\n cfg = config.networking;\n interfaces = attrValues cfg.interfaces;\n hasVirtuals = any (i: i.virtual) interfaces;\n\n slaves = concatMap (i: i.interfaces) (attrValues cfg.bonds)\n ++ concatMap (i: i.interfaces) (attrValues cfg.bridge"..., 21035) = 21035
close(3) = 0
brk(0x1a4d8000) = 0x1a4d8000
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/tasks/scsi-link-power-management.nix", {st_mode=S_IFREG|0444, st_size=642, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/tasks/scsi-link-power-management.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=642, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet cfg = config.powerManagement.scsiLinkPolicy; in\n\n{\n ###### interface\n\n options = {\n\n powerManagement.scsiLinkPolicy = mkOption {\n default = null;\n type = types.nullOr (types.enum [ \"min_power\" \"max_performance\" \"medium_power\" ]);\n descr"..., 642) = 642
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/tasks/swraid.nix", {st_mode=S_IFREG|0444, st_size=1293, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/tasks/swraid.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=1293, ...}) = 0
read(3, "{ config, pkgs, ... }:\n\n{\n\n environment.systemPackages = [ pkgs.mdadm ];\n\n services.udev.packages = [ pkgs.mdadm ];\n\n boot.initrd.availableKernelModules = [ \"md_mod\" \"raid0\" \"raid1\" \"raid456\" ];\n\n boot.initrd.extraUdevRulesCommands = ''\n cp -v ${pkgs.mdadm}/lib/udev/rules.d/*.rules $out/\n ''"..., 1293) = 1293
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/tasks/trackpoint.nix", {st_mode=S_IFREG|0444, st_size=2741, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/tasks/trackpoint.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=2741, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\n{\n ###### interface\n\n options = {\n\n hardware.trackpoint = {\n\n enable = mkOption {\n default = false;\n type = types.bool;\n description = ''\n Enable sensitivity and speed configuration for trackpoints.\n '';\n };\n"..., 2741) = 2741
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/tasks/powertop.nix", {st_mode=S_IFREG|0444, st_size=611, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/tasks/powertop.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=611, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.powerManagement.powertop;\nin {\n ###### interface\n\n options.powerManagement.powertop.enable = mkEnableOption \"powertop auto tuning on startup\";\n\n ###### implementation\n\n config = mkIf (cfg.enable) {\n systemd.services = {\n powertop"..., 611) = 611
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/testing/service-runner.nix", {st_mode=S_IFREG|0444, st_size=3313, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/testing/service-runner.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=3313, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n makeScript = name: service: pkgs.writeScript \"${name}-runner\"\n ''\n #! ${pkgs.perl}/bin/perl -w -I${pkgs.perlPackages.FileSlurp}/lib/perl5/site_perl\n\n use File::Slurp;\n\n sub run {\n my ($cmd) = @_;\n my @args = split \" \""..., 3313) = 3313
close(3) = 0
brk(0x1a4f9000) = 0x1a4f9000
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/virtualisation/container-config.nix", {st_mode=S_IFREG|0444, st_size=671, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/virtualisation/container-config.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=671, ...}) = 0
read(3, "{ config, pkgs, lib, ... }:\n\nwith lib;\n\n{\n\n config = mkIf config.boot.isContainer {\n\n # Disable some features that are not useful in a container.\n sound.enable = mkDefault false;\n services.udisks2.enable = mkDefault false;\n powerManagement.enable = mkDefault false;\n\n networking.useHo"..., 671) = 671
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/virtualisation/containers.nix", {st_mode=S_IFREG|0444, st_size=24541, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/virtualisation/containers.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=24541, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n # The container's init script, a small wrapper around the regular\n # NixOS stage-2 init script.\n containerInit = (cfg:\n let\n renderExtraVeth = (name: cfg:\n ''\n echo \"Bringing ${name} up\"\n ip link set dev ${name} up\n "..., 24541) = 24541
close(3) = 0
brk(0x1a51a000) = 0x1a51a000
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/virtualisation/docker.nix", {st_mode=S_IFREG|0444, st_size=5687, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/virtualisation/docker.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=5687, ...}) = 0
read(3, "# Systemd services for docker.\n\n{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.virtualisation.docker;\n proxy_env = config.networking.proxy.envVars;\n\nin\n\n{\n ###### interface\n\n options.virtualisation.docker = {\n enable =\n mkOption {\n type = types.bool;\n default = "..., 5687) = 5687
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/virtualisation/ecs-agent.nix", {st_mode=S_IFREG|0444, st_size=1251, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/virtualisation/ecs-agent.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=1251, ...}) = 0
read(3, "{ config, pkgs, lib, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.ecs-agent;\nin {\n options.services.ecs-agent = {\n enable = mkEnableOption \"Amazon ECS agent\";\n\n package = mkOption {\n type = types.path;\n description = \"The ECS agent package to use\";\n default = pkgs.ecs-agent;\n"..., 1251) = 1251
close(3) = 0
brk(0x1a53b000) = 0x1a53b000
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/virtualisation/libvirtd.nix", {st_mode=S_IFREG|0444, st_size=6377, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/virtualisation/libvirtd.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=6377, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.virtualisation.libvirtd;\n vswitch = config.virtualisation.vswitch;\n configFile = pkgs.writeText \"libvirtd.conf\" ''\n unix_sock_group = \"libvirtd\"\n unix_sock_rw_perms = \"0770\"\n auth_unix_ro = \"none\"\n auth_unix_rw = \"none\"\n ${"..., 6377) = 6377
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/virtualisation/lxc.nix", {st_mode=S_IFREG|0444, st_size=2052, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/virtualisation/lxc.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=2052, ...}) = 0
read(3, "# LXC Configuration\n\n{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.virtualisation.lxc;\n\nin\n\n{\n ###### interface\n\n options.virtualisation.lxc = {\n enable =\n mkOption {\n type = types.bool;\n default = false;\n description =\n ''\n This enabl"..., 2052) = 2052
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/virtualisation/lxcfs.nix", {st_mode=S_IFREG|0444, st_size=1215, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/virtualisation/lxcfs.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=1215, ...}) = 0
read(3, "# LXC Configuration\n\n{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.virtualisation.lxc.lxcfs;\nin {\n meta.maintainers = [ maintainers.mic92 ];\n\n ###### interface\n options.virtualisation.lxc.lxcfs = {\n enable =\n mkOption {\n type = types.bool;\n default = false;\n "..., 1215) = 1215
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/virtualisation/lxd.nix", {st_mode=S_IFREG|0444, st_size=1801, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/virtualisation/lxd.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=1801, ...}) = 0
read(3, "# Systemd services for lxd.\n\n{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.virtualisation.lxd;\n\nin\n\n{\n ###### interface\n\n options = {\n\n virtualisation.lxd.enable =\n mkOption {\n type = types.bool;\n default = false;\n description =\n ''\n T"..., 1801) = 1801
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/virtualisation/amazon-options.nix", {st_mode=S_IFREG|0444, st_size=295, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/virtualisation/amazon-options.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=295, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n{\n options = {\n ec2 = {\n hvm = lib.mkOption {\n default = lib.versionAtLeast config.system.stateVersion \"17.03\";\n internal = true;\n description = ''\n Whether the EC2 instance is a HVM instance.\n '';\n };\n };\n };\n}\n", 295) = 295
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/virtualisation/hyperv-guest.nix", {st_mode=S_IFREG|0444, st_size=857, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/virtualisation/hyperv-guest.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=857, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.virtualisation.hypervGuest;\n\nin {\n options = {\n virtualisation.hypervGuest = {\n enable = mkEnableOption \"Hyper-V Guest Support\";\n };\n };\n\n config = mkIf cfg.enable {\n environment.systemPackages = [ config.boot.kernelPackages"..., 857) = 857
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/virtualisation/openvswitch.nix", {st_mode=S_IFREG|0444, st_size=5466, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/virtualisation/openvswitch.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=5466, ...}) = 0
read(3, "# Systemd services for openvswitch\n\n{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.virtualisation.vswitch;\n\nin {\n\n options.virtualisation.vswitch = {\n enable = mkOption {\n type = types.bool;\n default = false;\n description = ''\n Whether to enable Open vSwitch. A "..., 5466) = 5466
close(3) = 0
brk(0x1a55c000) = 0x1a55c000
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/virtualisation/parallels-guest.nix", {st_mode=S_IFREG|0444, st_size=3605, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/virtualisation/parallels-guest.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=3605, ...}) = 0
read(3, "{ config, lib, pkgs, pkgs_i686, ... }:\n\nwith lib;\n\nlet\n\n prl-tools = config.boot.kernelPackages.prl-tools;\n\nin\n\n{\n\n options = {\n hardware.parallels = {\n\n enable = mkOption {\n type = types.bool;\n default = false;\n description = ''\n This enables Parallels Tools "..., 3605) = 3605
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/virtualisation/rkt.nix", {st_mode=S_IFREG|0444, st_size=1620, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/virtualisation/rkt.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=1620, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.virtualisation.rkt;\nin\n{\n options.virtualisation.rkt = {\n enable = mkEnableOption \"rkt metadata service\";\n\n gc = {\n automatic = mkOption {\n default = true;\n type = types.bool;\n description = \"Automatically ru"..., 1620) = 1620
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/virtualisation/virtualbox-guest.nix", {st_mode=S_IFREG|0444, st_size=2433, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/virtualisation/virtualbox-guest.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=2433, ...}) = 0
read(3, "# Module for VirtualBox guests.\n\n{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.virtualisation.virtualbox.guest;\n kernel = config.boot.kernelPackages;\n\nin\n\n{\n\n ###### interface\n\n options.virtualisation.virtualbox.guest = {\n enable = mkOption {\n default = false;\n type = t"..., 2433) = 2433
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/virtualisation/virtualbox-host.nix", {st_mode=S_IFREG|0444, st_size=4507, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/virtualisation/virtualbox-host.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=4507, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.virtualisation.virtualbox.host;\n\n virtualbox = pkgs.virtualbox.override {\n inherit (cfg) enableHardening headless;\n };\n\n kernelModules = config.boot.kernelPackages.virtualbox.override {\n inherit virtualbox;\n };\n\nin\n\n{\n options.vir"..., 4507) = 4507
close(3) = 0
brk(0x1a57d000) = 0x1a57d000
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/virtualisation/vmware-guest.nix", {st_mode=S_IFREG|0444, st_size=1537, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/virtualisation/vmware-guest.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=1537, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.vmwareGuest;\n open-vm-tools = if cfg.headless then pkgs.open-vm-tools-headless else pkgs.open-vm-tools;\n xf86inputvmmouse = pkgs.xorg.xf86inputvmmouse;\nin\n{\n options = {\n services.vmwareGuest = {\n enable = mkEnableOption "..., 1537) = 1537
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/virtualisation/xen-dom0.nix", {st_mode=S_IFREG|0444, st_size=16074, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/virtualisation/xen-dom0.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=16074, ...}) = 0
read(3, "# Xen hypervisor (Dom0) support.\n\n{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.virtualisation.xen;\nin\n\n{\n ###### interface\n\n options = {\n\n virtualisation.xen.enable =\n mkOption {\n default = false;\n type = types.bool;\n description =\n ''\n "..., 16074) = 16074
close(3) = 0
brk(0x1a59e000) = 0x1a59e000
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/virtualisation/xe-guest-utilities.nix", {st_mode=S_IFREG|0444, st_size=1638, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/virtualisation/xe-guest-utilities.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=1638, ...}) = 0
read(3, "{ config, lib, pkgs, ... }:\nwith lib;\nlet\n cfg = config.services.xe-guest-utilities;\nin {\n options = {\n services.xe-guest-utilities = {\n enable = mkEnableOption \"Whether to enable the Xen guest utilities daemon.\";\n };\n };\n config = mkIf cfg.enable {\n services.udev.packages = [ pkgs"..., 1638) = 1638
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs//nixos/modules/installer/scan/not-detected.nix", {st_mode=S_IFREG|0444, st_size=204, ...}) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/installer/scan/not-detected.nix", {st_mode=S_IFREG|0444, st_size=204, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/installer/scan/not-detected.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=204, ...}) = 0
read(3, "# List all devices which are _not_ detected by nixos-generate-config.\n# Common devices are enabled by default.\n{ config, lib, pkgs, ... }:\n\nwith lib;\n\n{\n hardware.enableRedistributableFirmware = true;\n}\n", 204) = 204
close(3) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs//nixos/modules/profiles/hardened.nix", {st_mode=S_IFREG|0444, st_size=3080, ...}) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/profiles/hardened.nix", {st_mode=S_IFREG|0444, st_size=3080, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/profiles/hardened.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=3080, ...}) = 0
read(3, "# A profile with most (vanilla) hardening options enabled by default,\n# potentially at the cost of features and performance.\n\n{ config, lib, pkgs, ... }:\n\nwith lib;\n\n{\n boot.kernelPackages = mkDefault pkgs.linuxPackages_hardened;\n\n security.hideProcessInformation = mkDefault true;\n\n security.lock"..., 3080) = 3080
close(3) = 0
brk(0x1a5ae000) = 0x1a5ae000
brk(0x1a5be000) = 0x1a5be000
brk(0x1a5ce000) = 0x1a5ce000
brk(0x1a5de000) = 0x1a5de000
brk(0x1a5ee000) = 0x1a5ee000
brk(0x1a5fe000) = 0x1a5fe000
brk(0x1a60e000) = 0x1a60e000
brk(0x1a61e000) = 0x1a61e000
brk(0x1a62e000) = 0x1a62e000
brk(0x1a63e000) = 0x1a63e000
brk(0x1a64e000) = 0x1a64e000
brk(0x1a65e000) = 0x1a65e000
brk(0x1a66e000) = 0x1a66e000
brk(0x1a67e000) = 0x1a67e000
brk(0x1a68e000) = 0x1a68e000
brk(0x1a69e000) = 0x1a69e000
brk(0x1a6ae000) = 0x1a6ae000
brk(0x1a6be000) = 0x1a6be000
brk(0x1a6ce000) = 0x1a6ce000
brk(0x1a6de000) = 0x1a6de000
brk(0x1a6ee000) = 0x1a6ee000
brk(0x1a6fe000) = 0x1a6fe000
brk(0x1a70e000) = 0x1a70e000
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs", {st_mode=S_IFLNK|0777, st_size=1, ...}) = 0
readlink("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs", ".", 1024) = 1
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos", {st_mode=S_IFLNK|0777, st_size=82, ...}) = 0
readlink("/nix/var/nix/profiles/per-user/root/channels/nixos", "/nix/store/2vh6qx8scxxcrh2c9xb6iwsjqk482fv8-nixos-18.03pre129076.831ef4756e3/nixos", 1024) = 82
lstat("/nix/store/2vh6qx8scxxcrh2c9xb6iwsjqk482fv8-nixos-18.03pre129076.831ef4756e3/nixos", {st_mode=S_IFDIR|0555, st_size=19, ...}) = 0
openat(AT_FDCWD, "/nix/store/2vh6qx8scxxcrh2c9xb6iwsjqk482fv8-nixos-18.03pre129076.831ef4756e3/nixos/default.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=557, ...}) = 0
read(3, "let requiredVersion = import ./lib/minver.nix; in\n\nif ! builtins ? nixVersion || builtins.compareVersions requiredVersion builtins.nixVersion == 1 then\n\n abort ''\n\n This version of Nixpkgs requires Nix >= ${requiredVersion}, please upgrade:\n\n - If you are running NixOS, use `nixos-rebuild' to"..., 557) = 557
close(3) = 0
lstat("/nix/store/2vh6qx8scxxcrh2c9xb6iwsjqk482fv8-nixos-18.03pre129076.831ef4756e3/nixos/lib/minver.nix", {st_mode=S_IFREG|0444, st_size=68, ...}) = 0
openat(AT_FDCWD, "/nix/store/2vh6qx8scxxcrh2c9xb6iwsjqk482fv8-nixos-18.03pre129076.831ef4756e3/nixos/lib/minver.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=68, ...}) = 0
read(3, "# Expose the minimum required version for evaluating Nixpkgs\n\"1.11\"\n", 68) = 68
close(3) = 0
lstat("/nix/store/2vh6qx8scxxcrh2c9xb6iwsjqk482fv8-nixos-18.03pre129076.831ef4756e3/nixos/pkgs/top-level/impure.nix", {st_mode=S_IFREG|0444, st_size=3602, ...}) = 0
openat(AT_FDCWD, "/nix/store/2vh6qx8scxxcrh2c9xb6iwsjqk482fv8-nixos-18.03pre129076.831ef4756e3/nixos/pkgs/top-level/impure.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=3602, ...}) = 0
read(3, "/* Impure default args for `pkgs/top-level/default.nix`. See that file\n for the meaning of each argument. */\n\nwith builtins;\n\nlet\n\n homeDir = builtins.getEnv \"HOME\";\n\n # Return \342\200\230x\342\200\231 if it evaluates, or \342\200\230def\342\200\231 if it throws an exception.\n try = x: def: let res = tryEval x; in if res.success"..., 3602) = 3602
close(3) = 0
lstat("/nix/store/2vh6qx8scxxcrh2c9xb6iwsjqk482fv8-nixos-18.03pre129076.831ef4756e3/nixos/pkgs/top-level", {st_mode=S_IFDIR|0555, st_size=30, ...}) = 0
openat(AT_FDCWD, "/nix/store/2vh6qx8scxxcrh2c9xb6iwsjqk482fv8-nixos-18.03pre129076.831ef4756e3/nixos/pkgs/top-level/default.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=3715, ...}) = 0
read(3, "/* This function composes the Nix Packages collection. It:\n\n 1. Applies the final stage to the given `config` if it is a function\n\n 2. Infers an appropriate `platform` based on the `system` if none is\n provided\n\n 3. Defaults to no non-standard config and no cross-compilation targe"..., 3715) = 3715
close(3) = 0
lstat("/nix/store/2vh6qx8scxxcrh2c9xb6iwsjqk482fv8-nixos-18.03pre129076.831ef4756e3/nixos/pkgs/stdenv/booter.nix", {st_mode=S_IFREG|0444, st_size=4806, ...}) = 0
openat(AT_FDCWD, "/nix/store/2vh6qx8scxxcrh2c9xb6iwsjqk482fv8-nixos-18.03pre129076.831ef4756e3/nixos/pkgs/stdenv/booter.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=4806, ...}) = 0
read(3, "# This file defines a single function for booting a package set from a list of\n# stages. The exact mechanics of that function are defined below; here I\n# (@Ericson2314) wish to describe the purpose of the abstraction.\n#\n# The first goal is consistency across stdenvs. Regardless of what this function"..., 4806) = 4806
close(3) = 0
lstat("/nix/store/2vh6qx8scxxcrh2c9xb6iwsjqk482fv8-nixos-18.03pre129076.831ef4756e3/nixos/lib", {st_mode=S_IFDIR|0555, st_size=26, ...}) = 0
openat(AT_FDCWD, "/nix/store/2vh6qx8scxxcrh2c9xb6iwsjqk482fv8-nixos-18.03pre129076.831ef4756e3/nixos/lib/default.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=6000, ...}) = 0
read(3, "/* Library of low-level helper functions for nix expressions.\n *\n * Please implement (mostly) exhaustive unit tests\n * for new functions in `./tests.nix'.\n */\nlet\n\n callLibs = file: import file { inherit lib; };\n\n lib = rec {\n\n # often used, or depending on very little\n trivial = callLibs ./"..., 6000) = 6000
close(3) = 0
brk(0x1a72f000) = 0x1a72f000
brk(0x1a730000) = 0x1a730000
lstat("/nix/store/2vh6qx8scxxcrh2c9xb6iwsjqk482fv8-nixos-18.03pre129076.831ef4756e3/nixos/lib/lists.nix", {st_mode=S_IFREG|0444, st_size=14590, ...}) = 0
openat(AT_FDCWD, "/nix/store/2vh6qx8scxxcrh2c9xb6iwsjqk482fv8-nixos-18.03pre129076.831ef4756e3/nixos/lib/lists.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=14590, ...}) = 0
read(3, "# General list operations.\n{ lib }:\nwith lib.trivial;\n\nrec {\n\n inherit (builtins) head tail length isList elemAt concatLists filter elem genList;\n\n /* Create a list consisting of a single element. `singleton x' is\n sometimes more convenient with respect to indentation than `[x]'\n when "..., 14590) = 14590
close(3) = 0
brk(0x1a751000) = 0x1a751000
lstat("/nix/store/2vh6qx8scxxcrh2c9xb6iwsjqk482fv8-nixos-18.03pre129076.831ef4756e3/nixos/pkgs/stdenv", {st_mode=S_IFDIR|0555, st_size=15, ...}) = 0
openat(AT_FDCWD, "/nix/store/2vh6qx8scxxcrh2c9xb6iwsjqk482fv8-nixos-18.03pre129076.831ef4756e3/nixos/pkgs/stdenv/default.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=1943, ...}) = 0
read(3, "# This file chooses a sane default stdenv given the system, platform, etc.\n#\n# Rather than returning a stdenv, this returns a list of functions---one per\n# each bootstrapping stage. See `./booter.nix` for exactly what this list should\n# contain.\n\n{ # Args just for stdenvs' usage\n lib\n # Args to pa"..., 1943) = 1943
close(3) = 0
lstat("/nix/store/2vh6qx8scxxcrh2c9xb6iwsjqk482fv8-nixos-18.03pre129076.831ef4756e3/nixos/lib/trivial.nix", {st_mode=S_IFREG|0444, st_size=4516, ...}) = 0
openat(AT_FDCWD, "/nix/store/2vh6qx8scxxcrh2c9xb6iwsjqk482fv8-nixos-18.03pre129076.831ef4756e3/nixos/lib/trivial.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=4516, ...}) = 0
read(3, "{ lib }:\nrec {\n\n /* The identity function\n For when you need a function that does \342\200\234nothing\342\200\235.\n\n Type: id :: a -> a\n */\n id = x: x;\n\n /* The constant function\n Ignores the second argument.\n Or: Construct a function that always returns a static value.\n\n Type: const :: a -> b"..., 4516) = 4516
close(3) = 0
brk(0x1a761000) = 0x1a761000
lstat("/nix/store/2vh6qx8scxxcrh2c9xb6iwsjqk482fv8-nixos-18.03pre129076.831ef4756e3/nixos/lib/systems", {st_mode=S_IFDIR|0555, st_size=8, ...}) = 0
openat(AT_FDCWD, "/nix/store/2vh6qx8scxxcrh2c9xb6iwsjqk482fv8-nixos-18.03pre129076.831ef4756e3/nixos/lib/systems/default.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=1845, ...}) = 0
read(3, "{ lib }:\n let inherit (lib.attrsets) mapAttrs; in\n\nrec {\n doubles = import ./doubles.nix { inherit lib; };\n parse = import ./parse.nix { inherit lib; };\n inspect = import ./inspect.nix { inherit lib; };\n platforms = import ./platforms.nix { inherit lib; };\n examples = import ./examples.nix { i"..., 1845) = 1845
close(3) = 0
lstat("/nix/store/2vh6qx8scxxcrh2c9xb6iwsjqk482fv8-nixos-18.03pre129076.831ef4756e3/nixos/lib/attrsets.nix", {st_mode=S_IFREG|0444, st_size=13660, ...}) = 0
openat(AT_FDCWD, "/nix/store/2vh6qx8scxxcrh2c9xb6iwsjqk482fv8-nixos-18.03pre129076.831ef4756e3/nixos/lib/attrsets.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=13660, ...}) = 0
read(3, "{ lib }:\n# Operations on attribute sets.\n\nlet\n inherit (builtins) head tail length;\n inherit (lib.trivial) and or;\n inherit (lib.strings) concatStringsSep;\n inherit (lib.lists) fold concatMap concatLists all deepSeqList;\nin\n\nrec {\n inherit (builtins) attrNames listToAttrs hasAttr isAttrs getAtt"..., 13660) = 13660
close(3) = 0
brk(0x1a782000) = 0x1a782000
brk(0x1a783000) = 0x1a783000
lstat("/nix/store/2vh6qx8scxxcrh2c9xb6iwsjqk482fv8-nixos-18.03pre129076.831ef4756e3/nixos/lib/systems/inspect.nix", {st_mode=S_IFREG|0444, st_size=1848, ...}) = 0
openat(AT_FDCWD, "/nix/store/2vh6qx8scxxcrh2c9xb6iwsjqk482fv8-nixos-18.03pre129076.831ef4756e3/nixos/lib/systems/inspect.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=1848, ...}) = 0
read(3, "{ lib }:\nwith import ./parse.nix { inherit lib; };\nwith lib.attrsets;\nwith lib.lists;\n\nrec {\n patterns = rec {\n i686 = { cpu = cpuTypes.i686; };\n x86_64 = { cpu = cpuTypes.x86_64; };\n PowerPC = { cpu = cpuTypes.powerpc; };\n x86 = { cpu = { family = \"x86\"; }; "..., 1848) = 1848
close(3) = 0
lstat("/nix/store/2vh6qx8scxxcrh2c9xb6iwsjqk482fv8-nixos-18.03pre129076.831ef4756e3/nixos/pkgs/stdenv/linux", {st_mode=S_IFDIR|0555, st_size=8, ...}) = 0
openat(AT_FDCWD, "/nix/store/2vh6qx8scxxcrh2c9xb6iwsjqk482fv8-nixos-18.03pre129076.831ef4756e3/nixos/pkgs/stdenv/linux/default.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=13825, ...}) = 0
read(3, "# This file constructs the standard build environment for the\n# Linux/i686 platform. It's completely pure; that is, it relies on no\n# external (non-Nix) tools, such as /usr/bin/gcc, and it contains a C\n# compiler and linker that do not search in default locations,\n# ensuring purity of components pr"..., 13825) = 13825
close(3) = 0
brk(0x1a7a4000) = 0x1a7a4000
lstat("/nix/store/2vh6qx8scxxcrh2c9xb6iwsjqk482fv8-nixos-18.03pre129076.831ef4756e3/nixos/pkgs/top-level/stage.nix", {st_mode=S_IFREG|0444, st_size=4974, ...}) = 0
openat(AT_FDCWD, "/nix/store/2vh6qx8scxxcrh2c9xb6iwsjqk482fv8-nixos-18.03pre129076.831ef4756e3/nixos/pkgs/top-level/stage.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=4974, ...}) = 0
read(3, "/* This file composes a single bootstrapping stage of the Nix Packages\n collection. That is, it imports the functions that build the various\n packages, and calls them with appropriate arguments. The result is a set of\n all the packages in the Nix Packages collection for some particular platfor"..., 4974) = 4974
close(3) = 0
lstat("/nix/store/2vh6qx8scxxcrh2c9xb6iwsjqk482fv8-nixos-18.03pre129076.831ef4756e3/nixos/lib/fixed-points.nix", {st_mode=S_IFREG|0444, st_size=3224, ...}) = 0
openat(AT_FDCWD, "/nix/store/2vh6qx8scxxcrh2c9xb6iwsjqk482fv8-nixos-18.03pre129076.831ef4756e3/nixos/lib/fixed-points.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=3224, ...}) = 0
read(3, "{ ... }:\nrec {\n # Compute the fixed point of the given function `f`, which is usually an\n # attribute set that expects its final, non-recursive representation as an\n # argument:\n #\n # f = self: { foo = \"foo\"; bar = \"bar\"; foobar = self.foo + self.bar; }\n #\n # Nix evaluates this recursion "..., 3224) = 3224
close(3) = 0
lstat("/nix/store/2vh6qx8scxxcrh2c9xb6iwsjqk482fv8-nixos-18.03pre129076.831ef4756e3/nixos/pkgs/stdenv/adapters.nix", {st_mode=S_IFREG|0444, st_size=7572, ...}) = 0
openat(AT_FDCWD, "/nix/store/2vh6qx8scxxcrh2c9xb6iwsjqk482fv8-nixos-18.03pre129076.831ef4756e3/nixos/pkgs/stdenv/adapters.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=7572, ...}) = 0
read(3, "/* This file contains various functions that take a stdenv and return\n a new stdenv with different behaviour, e.g. using a different C\n compiler. */\n\npkgs:\n\nrec {\n\n\n # Override the compiler in stdenv for specific packages.\n overrideCC = stdenv: cc: stdenv.override { allowedRequisites = null; c"..., 7572) = 7572
close(3) = 0
lstat("/nix/store/2vh6qx8scxxcrh2c9xb6iwsjqk482fv8-nixos-18.03pre129076.831ef4756e3/nixos/pkgs/build-support/trivial-builders.nix", {st_mode=S_IFREG|0444, st_size=5597, ...}) = 0
openat(AT_FDCWD, "/nix/store/2vh6qx8scxxcrh2c9xb6iwsjqk482fv8-nixos-18.03pre129076.831ef4756e3/nixos/pkgs/build-support/trivial-builders.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=5597, ...}) = 0
read(3, "{ lib, stdenv, stdenvNoCC, lndir }:\n\nlet\n\n runCommand' = stdenv: name: env: buildCommand:\n stdenv.mkDerivation ({\n inherit name buildCommand;\n passAsFile = [ \"buildCommand\" ];\n } // env);\n\nin\n\nrec {\n\n # Run the shell command `buildCommand' to produce a store path named\n # `name'. "..., 5597) = 5597
close(3) = 0
brk(0x1a7c5000) = 0x1a7c5000
lstat("/nix/store/2vh6qx8scxxcrh2c9xb6iwsjqk482fv8-nixos-18.03pre129076.831ef4756e3/nixos/pkgs/top-level/splice.nix", {st_mode=S_IFREG|0444, st_size=6137, ...}) = 0
openat(AT_FDCWD, "/nix/store/2vh6qx8scxxcrh2c9xb6iwsjqk482fv8-nixos-18.03pre129076.831ef4756e3/nixos/pkgs/top-level/splice.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=6137, ...}) = 0
read(3, "# The `splicedPackages' package set, and its use by `callPackage`\n#\n# The `buildPackages` pkg set is a new concept, and the vast majority package\n# expression (the other *.nix files) are not designed with it in mind. This\n# presents us with a problem with how to get the right version (build-time vs\n"..., 6137) = 6137
close(3) = 0
lstat("/nix/store/2vh6qx8scxxcrh2c9xb6iwsjqk482fv8-nixos-18.03pre129076.831ef4756e3/nixos/pkgs/top-level/all-packages.nix", {st_mode=S_IFREG|0444, st_size=664046, ...}) = 0
openat(AT_FDCWD, "/nix/store/2vh6qx8scxxcrh2c9xb6iwsjqk482fv8-nixos-18.03pre129076.831ef4756e3/nixos/pkgs/top-level/all-packages.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=664046, ...}) = 0
mmap(NULL, 667648, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) = 0x76ffc6b58000
read(3, "/* The top-level package collection of nixpkgs.\n * It is sorted by categories corresponding to the folder names\n * in the /pkgs folder. Inside the categories packages are roughly\n * sorted by alphabet, but strict sorting has been long lost due\n * to merges. Please use the full-text search of your ed"..., 664046) = 664046
mmap(NULL, 667648, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) = 0x76ffc6ab5000
munmap(0x76ffc6b58000, 667648) = 0
close(3) = 0
brk(0x1a879000) = 0x1a879000
brk(0x1a89a000) = 0x1a89a000
brk(0x1a8bb000) = 0x1a8bb000
brk(0x1a8dc000) = 0x1a8dc000
brk(0x1a8fd000) = 0x1a8fd000
brk(0x1a91e000) = 0x1a91e000
brk(0x1a93f000) = 0x1a93f000
brk(0x1a960000) = 0x1a960000
brk(0x1a981000) = 0x1a981000
brk(0x1a9a2000) = 0x1a9a2000
brk(0x1a9c3000) = 0x1a9c3000
brk(0x1a9e4000) = 0x1a9e4000
brk(0x1aa05000) = 0x1aa05000
brk(0x1aa26000) = 0x1aa26000
brk(0x1aa47000) = 0x1aa47000
brk(0x1aa68000) = 0x1aa68000
brk(0x1aa89000) = 0x1aa89000
brk(0x1aaaa000) = 0x1aaaa000
brk(0x1aacb000) = 0x1aacb000
brk(0x1aaec000) = 0x1aaec000
brk(0x1ab0d000) = 0x1ab0d000
brk(0x1ab2e000) = 0x1ab2e000
brk(0x1ab4f000) = 0x1ab4f000
brk(0x1ab70000) = 0x1ab70000
brk(0x1ab91000) = 0x1ab91000
brk(0x1abb2000) = 0x1abb2000
brk(0x1abd3000) = 0x1abd3000
brk(0x1abf4000) = 0x1abf4000
brk(0x1ac15000) = 0x1ac15000
brk(0x1ac36000) = 0x1ac36000
brk(0x1ac57000) = 0x1ac57000
brk(0x1ac78000) = 0x1ac78000
brk(0x1ac99000) = 0x1ac99000
brk(0x1acba000) = 0x1acba000
brk(0x1acdb000) = 0x1acdb000
brk(0x1acfc000) = 0x1acfc000
brk(0x1ad1d000) = 0x1ad1d000
brk(0x1ad3e000) = 0x1ad3e000
brk(0x1ad5f000) = 0x1ad5f000
brk(0x1ad80000) = 0x1ad80000
brk(0x1ada1000) = 0x1ada1000
brk(0x1adc2000) = 0x1adc2000
brk(0x1ade3000) = 0x1ade3000
brk(0x1ae04000) = 0x1ae04000
brk(0x1ae25000) = 0x1ae25000
brk(0x1ae46000) = 0x1ae46000
brk(0x1ae67000) = 0x1ae67000
brk(0x1ae88000) = 0x1ae88000
brk(0x1aea9000) = 0x1aea9000
brk(0x1aeca000) = 0x1aeca000
brk(0x1aeeb000) = 0x1aeeb000
brk(0x1af0c000) = 0x1af0c000
brk(0x1af2d000) = 0x1af2d000
brk(0x1af4e000) = 0x1af4e000
brk(0x1af6f000) = 0x1af6f000
brk(0x1af90000) = 0x1af90000
brk(0x1afb1000) = 0x1afb1000
brk(0x1afd2000) = 0x1afd2000
brk(0x1aff3000) = 0x1aff3000
brk(0x1b014000) = 0x1b014000
brk(0x1b035000) = 0x1b035000
munmap(0x76ffc6ab5000, 667648) = 0
lstat("/nix/store/2vh6qx8scxxcrh2c9xb6iwsjqk482fv8-nixos-18.03pre129076.831ef4756e3/nixos/pkgs/top-level/aliases.nix", {st_mode=S_IFREG|0444, st_size=9655, ...}) = 0
openat(AT_FDCWD, "/nix/store/2vh6qx8scxxcrh2c9xb6iwsjqk482fv8-nixos-18.03pre129076.831ef4756e3/nixos/pkgs/top-level/aliases.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=9655, ...}) = 0
read(3, "self:\n\nwith self;\n\nlet\n # Removing recurseForDerivation prevents derivations of aliased attribute\n # set to appear while listing all the packages available.\n removeRecurseForDerivations = alias: with lib;\n if alias.recurseForDerivations or false then\n removeAttrs alias [\"recurseForDerivat"..., 9655) = 9655
close(3) = 0
lstat("/nix/store/2vh6qx8scxxcrh2c9xb6iwsjqk482fv8-nixos-18.03pre129076.831ef4756e3/nixos/pkgs/stdenv/generic", {st_mode=S_IFDIR|0555, st_size=8, ...}) = 0
openat(AT_FDCWD, "/nix/store/2vh6qx8scxxcrh2c9xb6iwsjqk482fv8-nixos-18.03pre129076.831ef4756e3/nixos/pkgs/stdenv/generic/default.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=4948, ...}) = 0
read(3, "let lib = import ../../../lib; in lib.makeOverridable (\n\n{ name ? \"stdenv\", preHook ? \"\", initialPath, cc, shell\n, allowedRequisites ? null, extraAttrs ? {}, overrides ? (self: super: {}), config\n\n, # The `fetchurl' to use for downloading curl and its dependencies\n # (see all-packages.nix).\n fetch"..., 4948) = 4948
close(3) = 0
lstat("/nix/store/2vh6qx8scxxcrh2c9xb6iwsjqk482fv8-nixos-18.03pre129076.831ef4756e3/nixos/lib/customisation.nix", {st_mode=S_IFREG|0444, st_size=7774, ...}) = 0
openat(AT_FDCWD, "/nix/store/2vh6qx8scxxcrh2c9xb6iwsjqk482fv8-nixos-18.03pre129076.831ef4756e3/nixos/lib/customisation.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=7774, ...}) = 0
read(3, "{ lib }:\nlet\n\n inherit (builtins) attrNames;\n\nin\n\nrec {\n\n\n /* `overrideDerivation drv f' takes a derivation (i.e., the result\n of a call to the builtin function `derivation') and returns a new\n derivation in which the attributes of the original are overridden\n according to the function"..., 7774) = 7774
close(3) = 0
brk(0x1b045000) = 0x1b045000
lstat("/nix/store/2vh6qx8scxxcrh2c9xb6iwsjqk482fv8-nixos-18.03pre129076.831ef4756e3/nixos/lib/systems/parse.nix", {st_mode=S_IFREG|0444, st_size=9832, ...}) = 0
openat(AT_FDCWD, "/nix/store/2vh6qx8scxxcrh2c9xb6iwsjqk482fv8-nixos-18.03pre129076.831ef4756e3/nixos/lib/systems/parse.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=9832, ...}) = 0
read(3, "# Define the list of system with their properties.\n#\n# See https://clang.llvm.org/docs/CrossCompilation.html and\n# http://llvm.org/docs/doxygen/html/Triple_8cpp_source.html especially\n# Triple::normalize. Parsing should essentially act as a more conservative\n# version of that last function.\n#\n# Most"..., 9832) = 9832
close(3) = 0
lstat("/nix/store/2vh6qx8scxxcrh2c9xb6iwsjqk482fv8-nixos-18.03pre129076.831ef4756e3/nixos/lib/types.nix", {st_mode=S_IFREG|0444, st_size=16698, ...}) = 0
openat(AT_FDCWD, "/nix/store/2vh6qx8scxxcrh2c9xb6iwsjqk482fv8-nixos-18.03pre129076.831ef4756e3/nixos/lib/types.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=16698, ...}) = 0
read(3, "# Definitions related to run-time type checking. Used in particular\n# to type-check NixOS configurations.\n{ lib }:\nwith lib.lists;\nwith lib.attrsets;\nwith lib.options;\nwith lib.trivial;\nwith lib.strings;\nlet\n\n inherit (lib.modules) mergeDefinitions filterOverrides;\n outer_types =\nrec {\n isType ="..., 16698) = 16698
close(3) = 0
lstat("/nix/store/2vh6qx8scxxcrh2c9xb6iwsjqk482fv8-nixos-18.03pre129076.831ef4756e3/nixos/lib/strings.nix", {st_mode=S_IFREG|0444, st_size=14864, ...}) = 0
openat(AT_FDCWD, "/nix/store/2vh6qx8scxxcrh2c9xb6iwsjqk482fv8-nixos-18.03pre129076.831ef4756e3/nixos/lib/strings.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=14864, ...}) = 0
read(3, "/* String manipulation functions. */\n{ lib }:\nlet\n\ninherit (builtins) length;\n\nin\n\nrec {\n\n inherit (builtins) stringLength substring head tail isString replaceStrings;\n\n /* Concatenate a list of strings.\n\n Example:\n concatStrings [\"foo\" \"bar\"]\n => \"foobar\"\n */\n concatStrings = bu"..., 14864) = 14864
close(3) = 0
lstat("/nix/store/2vh6qx8scxxcrh2c9xb6iwsjqk482fv8-nixos-18.03pre129076.831ef4756e3/nixos/lib/options.nix", {st_mode=S_IFREG|0444, st_size=5519, ...}) = 0
openat(AT_FDCWD, "/nix/store/2vh6qx8scxxcrh2c9xb6iwsjqk482fv8-nixos-18.03pre129076.831ef4756e3/nixos/lib/options.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=5519, ...}) = 0
read(3, "# Nixpkgs/NixOS option handling.\n{ lib }:\n\nwith lib.trivial;\nwith lib.lists;\nwith lib.attrsets;\nwith lib.strings;\n\nrec {\n\n isOption = lib.isType \"option\";\n mkOption =\n { default ? null # Default value used when no definition is given in the configuration.\n , defaultText ? null # Textual repr"..., 5519) = 5519
close(3) = 0
lstat("/nix/store/2vh6qx8scxxcrh2c9xb6iwsjqk482fv8-nixos-18.03pre129076.831ef4756e3/nixos/pkgs/tools/text/gawk", {st_mode=S_IFDIR|0555, st_size=3, ...}) = 0
openat(AT_FDCWD, "/nix/store/2vh6qx8scxxcrh2c9xb6iwsjqk482fv8-nixos-18.03pre129076.831ef4756e3/nixos/pkgs/tools/text/gawk/default.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=2573, ...}) = 0
read(3, "{ stdenv, fetchurl\n# TODO: links -lsigsegv but loses the reference for some reason\n, withSigsegv ? (false && stdenv.system != \"x86_64-cygwin\"), libsigsegv\n, interactive ? false, readline\n\n/* Test suite broke on:\n stdenv.isCygwin # XXX: `test-dup2' segfaults on Cygwin 6.1\n || stdenv.isDarwin"..., 2573) = 2573
close(3) = 0
lstat("/nix/store/2vh6qx8scxxcrh2c9xb6iwsjqk482fv8-nixos-18.03pre129076.831ef4756e3/nixos/pkgs/servers/x11/xorg/default.nix", {st_mode=S_IFREG|0444, st_size=112988, ...}) = 0
openat(AT_FDCWD, "/nix/store/2vh6qx8scxxcrh2c9xb6iwsjqk482fv8-nixos-18.03pre129076.831ef4756e3/nixos/pkgs/servers/x11/xorg/default.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=112988, ...}) = 0
brk(0x1b06a000) = 0x1b06a000
brk(0x1b082000) = 0x1b082000
read(3, "# THIS IS A GENERATED FILE. DO NOT EDIT!\nargs @ { clangStdenv, fetchurl, fetchgit, fetchpatch, stdenv, pkgconfig, intltool, freetype, fontconfig\n, libxslt, expat, libpng, zlib, perl, mesa_drivers, spice_protocol\n, dbus, libuuid, openssl, gperf, m4, libevdev, tradcpp, libinput, mcpp, makeWrapper, au"..., 112988) = 112988
close(3) = 0
brk(0x1b0a3000) = 0x1b0a3000
brk(0x1b0c4000) = 0x1b0c4000
brk(0x1b0e5000) = 0x1b0e5000
brk(0x1b106000) = 0x1b106000
brk(0x1b127000) = 0x1b127000
brk(0x1b148000) = 0x1b148000
brk(0x1b169000) = 0x1b169000
brk(0x1b18a000) = 0x1b18a000
lstat("/nix/store/2vh6qx8scxxcrh2c9xb6iwsjqk482fv8-nixos-18.03pre129076.831ef4756e3/nixos/pkgs/stdenv/generic/make-derivation.nix", {st_mode=S_IFREG|0444, st_size=12024, ...}) = 0
openat(AT_FDCWD, "/nix/store/2vh6qx8scxxcrh2c9xb6iwsjqk482fv8-nixos-18.03pre129076.831ef4756e3/nixos/pkgs/stdenv/generic/make-derivation.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=12024, ...}) = 0
read(3, "{ lib, config, stdenv }:\n\nrec {\n # `mkDerivation` wraps the builtin `derivation` function to\n # produce derivations that use this stdenv and its shell.\n #\n # See also:\n #\n # * https://nixos.org/nixpkgs/manual/#sec-using-stdenv\n # Details on how to use this mkDerivation function\n #\n # * ht"..., 12024) = 12024
close(3) = 0
lstat("/nix/store/2vh6qx8scxxcrh2c9xb6iwsjqk482fv8-nixos-18.03pre129076.831ef4756e3/nixos/lib/systems/platforms.nix", {st_mode=S_IFREG|0444, st_size=12310, ...}) = 0
openat(AT_FDCWD, "/nix/store/2vh6qx8scxxcrh2c9xb6iwsjqk482fv8-nixos-18.03pre129076.831ef4756e3/nixos/lib/systems/platforms.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=12310, ...}) = 0
read(3, "{ lib }:\nrec {\n pcBase = {\n name = \"pc\";\n kernelBaseConfig = \"defconfig\";\n # Build whatever possible as a module, if not stated in the extra config.\n kernelAutoModules = true;\n kernelTarget = \"bzImage\";\n };\n\n pc64 = pcBase // { kernelArch = \"x86_64\"; };\n\n pc32 = pcBase // { kernel"..., 12310) = 12310
close(3) = 0
brk(0x1b19a000) = 0x1b19a000
brk(0x1b1aa000) = 0x1b1aa000
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/lib/utils.nix", {st_mode=S_IFREG|0444, st_size=1062, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/lib/utils.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=1062, ...}) = 0
read(3, "pkgs: with pkgs.lib;\n\nrec {\n\n # Check whenever fileSystem is needed for boot\n fsNeededForBoot = fs: fs.neededForBoot\n || elem fs.mountPoint [ \"/\" \"/nix\" \"/nix/store\" \"/var\" \"/var/log\" \"/var/lib\" \"/etc\" ];\n\n # Check whenever `b` depends on `a` as a fileSystem\n # FIXME: it's in"..., 1062) = 1062
close(3) = 0
brk(0x1b1ba000) = 0x1b1ba000
brk(0x1b1ca000) = 0x1b1ca000
brk(0x1b1da000) = 0x1b1da000
brk(0x1b1ea000) = 0x1b1ea000
brk(0x1b1fa000) = 0x1b1fa000
brk(0x1b20a000) = 0x1b20a000
brk(0x1b21a000) = 0x1b21a000
brk(0x1b22a000) = 0x1b22a000
brk(0x1b23a000) = 0x1b23a000
brk(0x1b24a000) = 0x1b24a000
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/web-servers/phpfpm/pool-options.nix", {st_mode=S_IFREG|0444, st_size=727, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/web-servers/phpfpm/pool-options.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=727, ...}) = 0
read(3, "{ lib }:\n\nwith lib; {\n\n options = {\n\n listen = mkOption {\n type = types.str;\n example = \"/path/to/unix/socket\";\n description = ''\n The address on which to accept FastCGI requests.\n '';\n };\n\n extraConfig = mkOption {\n type = types.lines;\n example = ''\n "..., 727) = 727
close(3) = 0
brk(0x1b25a000) = 0x1b25a000
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/web-servers/apache-httpd/per-server-options.nix", {st_mode=S_IFREG|0444, st_size=4847, ...}) = 0
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/web-servers/apache-httpd/per-server-options.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=4847, ...}) = 0
read(3, "# This file defines the options that can be used both for the Apache\n# main server configuration, and for the virtual hosts. (The latter\n# has additional options that affect the web server as a whole, like\n# the user/group to run under.)\n\n{ forMainServer, lib }:\n\nwith lib;\n\n{\n\n hostName = mkOption"..., 4847) = 4847
close(3) = 0
brk(0x1b26a000) = 0x1b26a000
brk(0x1b27a000) = 0x1b27a000
brk(0x1b28a000) = 0x1b28a000
brk(0x1b29a000) = 0x1b29a000
brk(0x1b2aa000) = 0x1b2aa000
brk(0x1b2ba000) = 0x1b2ba000
brk(0x1b2ca000) = 0x1b2ca000
brk(0x1b2da000) = 0x1b2da000
brk(0x1b2ea000) = 0x1b2ea000
brk(0x1b2fa000) = 0x1b2fa000
brk(0x1b30a000) = 0x1b30a000
brk(0x1b31a000) = 0x1b31a000
brk(0x1b32a000) = 0x1b32a000
brk(0x1b33a000) = 0x1b33a000
brk(0x1b34a000) = 0x1b34a000
brk(0x1b35a000) = 0x1b35a000
brk(0x1b36a000) = 0x1b36a000
brk(0x1b37a000) = 0x1b37a000
brk(0x1b38a000) = 0x1b38a000
brk(0x1b39a000) = 0x1b39a000
brk(0x1b3aa000) = 0x1b3aa000
brk(0x1b3ba000) = 0x1b3ba000
brk(0x1b3ca000) = 0x1b3ca000
brk(0x1b3da000) = 0x1b3da000
brk(0x1b3ea000) = 0x1b3ea000
brk(0x1b3fa000) = 0x1b3fa000
brk(0x1b40a000) = 0x1b40a000
brk(0x1b41a000) = 0x1b41a000
brk(0x1b42a000) = 0x1b42a000
brk(0x1b43a000) = 0x1b43a000
brk(0x1b44a000) = 0x1b44a000
brk(0x1b45a000) = 0x1b45a000
brk(0x1b46a000) = 0x1b46a000
brk(0x1b47a000) = 0x1b47a000
brk(0x1b48a000) = 0x1b48a000
lstat("/nix/store/2vh6qx8scxxcrh2c9xb6iwsjqk482fv8-nixos-18.03pre129076.831ef4756e3/nixos/pkgs/os-specific/linux/kernel/linux-4.14.nix", {st_mode=S_IFREG|0444, st_size=470, ...}) = 0
openat(AT_FDCWD, "/nix/store/2vh6qx8scxxcrh2c9xb6iwsjqk482fv8-nixos-18.03pre129076.831ef4756e3/nixos/pkgs/os-specific/linux/kernel/linux-4.14.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=470, ...}) = 0
read(3, "{ stdenv, buildPackages, hostPlatform, fetchurl, perl, buildLinux, ... } @ args:\n\nwith stdenv.lib;\n\nbuildLinux (args // rec {\n version = \"4.14.20\";\n\n # branchVersion needs to be x.y\n extraMeta.branch = concatStrings (intersperse \".\" (take 2 (splitString \".\" version)));\n\n src = fetchurl {\n url"..., 470) = 470
close(3) = 0
lstat("/nix/store/2vh6qx8scxxcrh2c9xb6iwsjqk482fv8-nixos-18.03pre129076.831ef4756e3/nixos/pkgs/os-specific/linux/kernel/generic.nix", {st_mode=S_IFREG|0444, st_size=4163, ...}) = 0
openat(AT_FDCWD, "/nix/store/2vh6qx8scxxcrh2c9xb6iwsjqk482fv8-nixos-18.03pre129076.831ef4756e3/nixos/pkgs/os-specific/linux/kernel/generic.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=4163, ...}) = 0
read(3, "{ buildPackages, runCommand, nettools, bc, bison, flex, perl, gmp, libmpc, mpfr, openssl\n, ncurses\n, libelf\n, utillinux\n, writeTextFile, ubootTools\n, callPackage\n}:\n\n{ stdenv, buildPackages, perl, buildLinux\n\n, # The kernel source tarball.\n src\n\n, # The kernel version.\n version\n\n, # Overrides to t"..., 4163) = 4163
brk(0x1b4ab000) = 0x1b4ab000
brk(0x1b4ac000) = 0x1b4ac000
close(3) = 0
lstat("/nix/store/2vh6qx8scxxcrh2c9xb6iwsjqk482fv8-nixos-18.03pre129076.831ef4756e3/nixos/pkgs/os-specific/linux/kernel/manual-config.nix", {st_mode=S_IFREG|0444, st_size=10231, ...}) = 0
openat(AT_FDCWD, "/nix/store/2vh6qx8scxxcrh2c9xb6iwsjqk482fv8-nixos-18.03pre129076.831ef4756e3/nixos/pkgs/os-specific/linux/kernel/manual-config.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=10231, ...}) = 0
read(3, "{ buildPackages, runCommand, nettools, bc, bison, flex, perl, gmp, libmpc, mpfr, openssl\n, ncurses ? null\n, libelf\n, utillinux\n, writeTextFile, ubootTools\n}:\n\nlet\n readConfig = configfile: import (runCommand \"config.nix\" {} ''\n echo \"{\" > \"$out\"\n while IFS='=' read key val; do\n [ \"x''${k"..., 10231) = 10231
close(3) = 0
lstat("/nix/store/2vh6qx8scxxcrh2c9xb6iwsjqk482fv8-nixos-18.03pre129076.831ef4756e3/nixos/pkgs/development/libraries/libelf", {st_mode=S_IFDIR|0555, st_size=4, ...}) = 0
openat(AT_FDCWD, "/nix/store/2vh6qx8scxxcrh2c9xb6iwsjqk482fv8-nixos-18.03pre129076.831ef4756e3/nixos/pkgs/development/libraries/libelf/default.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=1440, ...}) = 0
read(3, "{ stdenv\n, fetchurl, autoreconfHook, gettext\n, buildPlatform, hostPlatform\n}:\n\nstdenv.mkDerivation rec {\n name = \"libelf-0.8.13\";\n\n src = fetchurl {\n url = \"http://www.mr511.de/software/${name}.tar.gz\";\n sha256 = \"0vf7s9dwk2xkmhb79aigqm0x0yfbw1j0b9ksm51207qwr179n6jr\";\n };\n\n patches = [\n "..., 1440) = 1440
close(3) = 0
brk(0x1b4bc000) = 0x1b4bc000
brk(0x1b4cc000) = 0x1b4cc000
brk(0x1b4dc000) = 0x1b4dc000
brk(0x1b4ec000) = 0x1b4ec000
brk(0x1b4fc000) = 0x1b4fc000
brk(0x1b50c000) = 0x1b50c000
brk(0x1b51c000) = 0x1b51c000
brk(0x1b52c000) = 0x1b52c000
brk(0x1b53c000) = 0x1b53c000
brk(0x1b54c000) = 0x1b54c000
brk(0x1b55c000) = 0x1b55c000
brk(0x1b56c000) = 0x1b56c000
lstat("/nix/store/2vh6qx8scxxcrh2c9xb6iwsjqk482fv8-nixos-18.03pre129076.831ef4756e3/nixos/pkgs/stdenv/generic/check-meta.nix", {st_mode=S_IFREG|0444, st_size=7771, ...}) = 0
openat(AT_FDCWD, "/nix/store/2vh6qx8scxxcrh2c9xb6iwsjqk482fv8-nixos-18.03pre129076.831ef4756e3/nixos/pkgs/stdenv/generic/check-meta.nix", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=7771, ...}) = 0
read(3, "# Checks derivation meta and attrs for problems (like brokenness,\n# licenses, etc).\n\n{ lib, config, system, meta, derivationArg, mkDerivationArg }:\n\nlet\n attrs = mkDerivationArg; # TODO: probably get rid of passing this one\n\n # See discussion at https://github.com/NixOS/nixpkgs/pull/25304#issuecom"..., 7771) = 7771
close(3) = 0
brk(0x1b58f000) = 0x1b58f000
brk(0x1b590000) = 0x1b590000
socket(AF_UNIX, SOCK_STREAM|SOCK_CLOEXEC, 0) = 3
fcntl(3, F_GETFD) = 0x1 (flags FD_CLOEXEC)
fcntl(3, F_SETFD, FD_CLOEXEC) = 0
connect(3, {sa_family=AF_UNIX, sun_path="/nix/var/nix/daemon-socket/socket"}, 110) = 0
write(3, "cxin\0\0\0\0", 8) = 8
read(3, "oixd\0\0\0\0\24\1\0\0\0\0\0\0", 32768) = 16
sched_getaffinity(0, 128, [0, 1, 2, 3, 4, 5, 6, 7]) = 48
sched_setaffinity(0, 128, [1]) = 0
write(3, "\24\1\0\0\0\0\0\0\1\0\0\0\0\0\0\0\1\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0", 32) = 32
read(3, "stla\0\0\0\0", 32768) = 8
write(3, "\23\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\1\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\1\0\0\0\0\0\0\0\10\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\1\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\1\0\0\0\0\0\0\0\1\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0", 112) = 112
read(3, "stla\0\0\0\0", 32768) = 8
lstat("/nix/store/2vh6qx8scxxcrh2c9xb6iwsjqk482fv8-nixos-18.03pre129076.831ef4756e3/nixos/pkgs/stdenv/generic/default-builder.sh", {st_mode=S_IFREG|0444, st_size=34, ...}) = 0
openat(AT_FDCWD, "/nix/store/2vh6qx8scxxcrh2c9xb6iwsjqk482fv8-nixos-18.03pre129076.831ef4756e3/nixos/pkgs/stdenv/generic/default-builder.sh", O_RDONLY|O_CLOEXEC) = 4
read(4, "source $stdenv/setup\ngenericBuild\n", 34) = 34
close(4) = 0
write(3, "\7\0\0\0\0\0\0\0\22\0\0\0\0\0\0\0default-builder.sh\0\0\0\0\0\0\0\0\0\0\0\0\0\0\1\0\0\0\0\0\0\0\6\0\0\0\0\0\0\0sha256\0\0\r\0\0\0\0\0\0\0nix-archive-1\0\0\0\1\0\0\0\0\0\0\0(\0\0\0\0\0\0\0\4\0\0\0\0\0\0\0type\0\0\0\0\7\0\0\0\0\0\0\0regular\0\10\0\0\0\0\0\0\0contents\"\0\0\0\0\0\0\0source $stdenv/setup\ngenericBuild\n\0\0\0\0\0\0\1\0\0\0\0\0\0\0)\0\0\0\0\0\0\0", 224) = 224
read(3, "stla\0\0\0\0>\0\0\0\0\0\0\0/nix/store/9krlzvny65gdc8s7kpb6lkx8cd02c25b-default-builder.sh\0\0", 32768) = 80
lstat("/nix/store/2vh6qx8scxxcrh2c9xb6iwsjqk482fv8-nixos-18.03pre129076.831ef4756e3/nixos/pkgs/build-support/cc-wrapper", {st_mode=S_IFDIR|0555, st_size=10, ...}) = 0
openat(AT_FDCWD, "/nix/store/2vh6qx8scxxcrh2c9xb6iwsjqk482fv8-nixos-18.03pre129076.831ef4756e3/nixos/pkgs/build-support/cc-wrapper/default.nix", O_RDONLY|O_CLOEXEC) = 4
fstat(4, {st_mode=S_IFREG|0444, st_size=11798, ...}) = 0
brk(0x1b5b2000) = 0x1b5b2000
read(4, "# The Nixpkgs CC is not directly usable, since it doesn't know where\n# the C library and standard header files are. Therefore the compiler\n# produced by that package cannot be installed directly in a user\n# environment and used from the command line. So we use a wrapper\n# script that sets up the rig"..., 11798) = 11798
close(4) = 0
brk(0x1b5c2000) = 0x1b5c2000
lstat("/nix/store/2vh6qx8scxxcrh2c9xb6iwsjqk482fv8-nixos-18.03pre129076.831ef4756e3/nixos/lib/meta.nix", {st_mode=S_IFREG|0444, st_size=1842, ...}) = 0
openat(AT_FDCWD, "/nix/store/2vh6qx8scxxcrh2c9xb6iwsjqk482fv8-nixos-18.03pre129076.831ef4756e3/nixos/lib/meta.nix", O_RDONLY|O_CLOEXEC) = 4
fstat(4, {st_mode=S_IFREG|0444, st_size=1842, ...}) = 0
read(4, "/* Some functions for manipulating meta attributes, as well as the\n name attribute. */\n\n{ lib }:\n\nrec {\n\n\n /* Add to or override the meta attributes of the given\n derivation.\n\n Example:\n addMetaAttrs {description = \"Bla blah\";} somePkg\n */\n addMetaAttrs = newAttrs: drv:\n drv //"..., 1842) = 1842
close(4) = 0
brk(0x1b5d2000) = 0x1b5d2000
lstat("/nix/store/2vh6qx8scxxcrh2c9xb6iwsjqk482fv8-nixos-18.03pre129076.831ef4756e3/nixos/pkgs/stdenv/linux/bootstrap-tools", {st_mode=S_IFDIR|0555, st_size=4, ...}) = 0
openat(AT_FDCWD, "/nix/store/2vh6qx8scxxcrh2c9xb6iwsjqk482fv8-nixos-18.03pre129076.831ef4756e3/nixos/pkgs/stdenv/linux/bootstrap-tools/default.nix", O_RDONLY|O_CLOEXEC) = 4
fstat(4, {st_mode=S_IFREG|0444, st_size=315, ...}) = 0
read(4, "{ system, bootstrapFiles }:\n\nderivation {\n name = \"bootstrap-tools\";\n\n builder = bootstrapFiles.busybox;\n\n args = [ \"ash\" \"-e\" ./scripts/unpack-bootstrap-tools.sh ];\n\n tarball = bootstrapFiles.bootstrapTools;\n\n inherit system;\n\n # Needed by the GCC wrapper.\n langC = true;\n langCC = true;\n i"..., 315) = 315
close(4) = 0
lstat("/nix/store/2vh6qx8scxxcrh2c9xb6iwsjqk482fv8-nixos-18.03pre129076.831ef4756e3/nixos/pkgs/development/libraries/glibc", {st_mode=S_IFDIR|0555, st_size=23, ...}) = 0
openat(AT_FDCWD, "/nix/store/2vh6qx8scxxcrh2c9xb6iwsjqk482fv8-nixos-18.03pre129076.831ef4756e3/nixos/pkgs/development/libraries/glibc/default.nix", O_RDONLY|O_CLOEXEC) = 4
fstat(4, {st_mode=S_IFREG|0444, st_size=3580, ...}) = 0
read(4, "{ stdenv, callPackage\n, withLinuxHeaders ? true\n, installLocales ? true\n, profilingLibraries ? false\n, withGd ? false\n}:\n\nassert stdenv.cc.isGNU;\n\ncallPackage ./common.nix { inherit stdenv; } {\n name = \"glibc\" + stdenv.lib.optionalString withGd \"-gd\";\n\n inherit withLinuxHeaders profilingLibrar"..., 3580) = 3580
close(4) = 0
brk(0x1b5e2000) = 0x1b5e2000
lstat("/nix/store/2vh6qx8scxxcrh2c9xb6iwsjqk482fv8-nixos-18.03pre129076.831ef4756e3/nixos/pkgs/build-support/bintools-wrapper", {st_mode=S_IFDIR|0555, st_size=9, ...}) = 0
openat(AT_FDCWD, "/nix/store/2vh6qx8scxxcrh2c9xb6iwsjqk482fv8-nixos-18.03pre129076.831ef4756e3/nixos/pkgs/build-support/bintools-wrapper/default.nix", O_RDONLY|O_CLOEXEC) = 4
fstat(4, {st_mode=S_IFREG|0444, st_size=10564, ...}) = 0
read(4, "# The Nixpkgs CC is not directly usable, since it doesn't know where\n# the C library and standard header files are. Therefore the compiler\n# produced by that package cannot be installed directly in a user\n# environment and used from the command line. So we use a wrapper\n# script that sets up the rig"..., 10564) = 10564
close(4) = 0
brk(0x1b603000) = 0x1b603000
brk(0x1b606000) = 0x1b606000
lstat("/nix/store/2vh6qx8scxxcrh2c9xb6iwsjqk482fv8-nixos-18.03pre129076.831ef4756e3/nixos/pkgs/stdenv/linux/bootstrap-tools/scripts/unpack-bootstrap-tools.sh", {st_mode=S_IFREG|0444, st_size=1970, ...}) = 0
openat(AT_FDCWD, "/nix/store/2vh6qx8scxxcrh2c9xb6iwsjqk482fv8-nixos-18.03pre129076.831ef4756e3/nixos/pkgs/stdenv/linux/bootstrap-tools/scripts/unpack-bootstrap-tools.sh", O_RDONLY|O_CLOEXEC) = 4
read(4, "# Unpack the bootstrap tools tarball.\necho Unpacking the bootstrap tools...\n$builder mkdir $out\n< $tarball $builder unxz | $builder tar x -C $out\n\n# Set the ELF interpreter / RPATH in the bootstrap binaries.\necho Patching the bootstrap tools...\n\nif test -f $out/lib/ld.so.?; then\n # MIPS case\n LD"..., 1970) = 1970
close(4) = 0
write(3, "\7\0\0\0\0\0\0\0\31\0\0\0\0\0\0\0unpack-bootstrap-tools.sh\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\1\0\0\0\0\0\0\0\6\0\0\0\0\0\0\0sha256\0\0\r\0\0\0\0\0\0\0nix-archive-1\0\0\0\1\0\0\0\0\0\0\0(\0\0\0\0\0\0\0\4\0\0\0\0\0\0\0type\0\0\0\0\7\0\0\0\0\0\0\0regular\0\10\0\0\0\0\0\0\0contents\262\7\0\0\0\0\0\0# Unpack the bootstrap tools tarball.\necho Unpacking the bootstrap tools...\n$builder mkdir $out\n< $tarball $builder unxz | $"..., 2168) = 2168
read(3, "stla\0\0\0\0E\0\0\0\0\0\0\0/nix/store/pvn8nrg8aziwsc7yy8wkgxf4s9amnl3d-unpack-bootstrap-tools.sh\0\0\0", 32768) = 88
lstat("/nix/store/2vh6qx8scxxcrh2c9xb6iwsjqk482fv8-nixos-18.03pre129076.831ef4756e3/nixos/pkgs/stdenv/linux/bootstrap-files/x86_64.nix", {st_mode=S_IFREG|0444, st_size=351, ...}) = 0
openat(AT_FDCWD, "/nix/store/2vh6qx8scxxcrh2c9xb6iwsjqk482fv8-nixos-18.03pre129076.831ef4756e3/nixos/pkgs/stdenv/linux/bootstrap-files/x86_64.nix", O_RDONLY|O_CLOEXEC) = 4
fstat(4, {st_mode=S_IFREG|0444, st_size=351, ...}) = 0
read(4, "# Use busybox for i686-linux since it works on x86_64-linux as well.\n(import ./i686.nix) //\n\n{\n bootstrapTools = import <nix/fetchurl.nix> {\n url = http://tarballs.nixos.org/stdenv-linux/x86_64/4907fc9e8d0d82b28b3c56e3a478a2882f1d700f/bootstrap-tools.tar.xz;\n sha256 = \"abe3f0727dd771a60b79228"..., 351) = 351
close(4) = 0
lstat("/nix/store/2vh6qx8scxxcrh2c9xb6iwsjqk482fv8-nixos-18.03pre129076.831ef4756e3/nixos/pkgs/stdenv/linux/bootstrap-files/i686.nix", {st_mode=S_IFREG|0444, st_size=510, ...}) = 0
openat(AT_FDCWD, "/nix/store/2vh6qx8scxxcrh2c9xb6iwsjqk482fv8-nixos-18.03pre129076.831ef4756e3/nixos/pkgs/stdenv/linux/bootstrap-files/i686.nix", O_RDONLY|O_CLOEXEC) = 4
fstat(4, {st_mode=S_IFREG|0444, st_size=510, ...}) = 0
read(4, "{\n busybox = import <nix/fetchurl.nix> {\n url = http://tarballs.nixos.org/stdenv-linux/i686/4907fc9e8d0d82b28b3c56e3a478a2882f1d700f/busybox;\n sha256 = \"ef4c1be6c7ae57e4f654efd90ae2d2e204d6769364c46469fa9ff3761195cba1\";\n executable = true;\n };\n\n bootstrapTools = import <nix/fetchurl.nix>"..., 510) = 510
close(4) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels", {st_mode=S_IFLNK|0777, st_size=15, ...}) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nix/fetchurl.nix", 0x7ffdbd88e830) = -1 ENOENT (No such file or directory)
lstat("/nix/store/r8zhwq9xylxw8a823kpvqy0kfqq4g52f-nix-2.0pre5968_a6c0b773/share/nix/corepkgs", {st_mode=S_IFDIR|0555, st_size=8, ...}) = 0
lstat("/nix/store/r8zhwq9xylxw8a823kpvqy0kfqq4g52f-nix-2.0pre5968_a6c0b773/share/nix/corepkgs//fetchurl.nix", {st_mode=S_IFREG|0444, st_size=1123, ...}) = 0
lstat("/nix/store/r8zhwq9xylxw8a823kpvqy0kfqq4g52f-nix-2.0pre5968_a6c0b773/share/nix/corepkgs/fetchurl.nix", {st_mode=S_IFREG|0444, st_size=1123, ...}) = 0
openat(AT_FDCWD, "/nix/store/r8zhwq9xylxw8a823kpvqy0kfqq4g52f-nix-2.0pre5968_a6c0b773/share/nix/corepkgs/fetchurl.nix", O_RDONLY|O_CLOEXEC) = 4
fstat(4, {st_mode=S_IFREG|0444, st_size=1123, ...}) = 0
read(4, "{ system ? \"\" # obsolete\n, url\n, md5 ? \"\", sha1 ? \"\", sha256 ? \"\", sha512 ? \"\"\n, outputHash ?\n if sha512 != \"\" then sha512 else if sha1 != \"\" then sha1 else if md5 != \"\" then md5 else sha256\n, outputHashAlgo ?\n if sha512 != \"\" then \"sha512\" else if sha1 != \"\" then \"sha1\" else if md5 != \"\" then"..., 1123) = 1123
close(4) = 0
write(3, "\10\0\0\0\0\0\0\0\v\0\0\0\0\0\0\0busybox.drv\0\0\0\0\0 \3\0\0\0\0\0\0Derive([(\"out\",\"/nix/store/lan2w3ab1mvpxj3ppiw2sizh8i7rpz7s-busybox\",\"r:sha256\",\"ef4c1be6c7ae57e4f654efd90ae2d2e204d6769364c46469fa9ff3761195cba1\")],[],[],\"builtin\",\"builtin:fetchurl\",[],[(\"builder\",\"builtin:fetchurl\"),(\"executable\",\"1\"),(\"impureEnvVars\",\"http"..., 848) = 848
read(3, "stla\0\0\0\0007\0\0\0\0\0\0\0/nix/store/b7irlwi2wjlx5aj1dghx4c8k3ax6m56q-busybox.drv\0", 32768) = 72
lstat("/nix/var/nix/profiles/per-user/root/channels/nix/fetchurl.nix", 0x7ffdbd88e830) = -1 ENOENT (No such file or directory)
lstat("/nix/store/r8zhwq9xylxw8a823kpvqy0kfqq4g52f-nix-2.0pre5968_a6c0b773/share/nix/corepkgs//fetchurl.nix", {st_mode=S_IFREG|0444, st_size=1123, ...}) = 0
write(3, "\10\0\0\0\0\0\0\0\32\0\0\0\0\0\0\0bootstrap-tools.tar.xz.drv\0\0\0\0\0\0g\3\0\0\0\0\0\0Derive([(\"out\",\"/nix/store/9ybz7r3i3i2cy6f3h6sm0psa2kzqdhz3-bootstrap-tools.tar.xz\",\"sha256\",\"abe3f0727dd771a60b7922892d308da1bc7b082afc13440880862f0c8823c09f\")],[],[],\"builtin\",\"builtin:fetchurl\",[],[(\"builder\",\"builtin:fetchurl\"),(\"executable"..., 936) = 936
read(3, "stla\0\0\0\0F\0\0\0\0\0\0\0/nix/store/drsdq2ca1q1dj1hd0r1w2hl4s0fak1vh-bootstrap-tools.tar.xz.drv\0\0", 32768) = 88
write(3, "\10\0\0\0\0\0\0\0\23\0\0\0\0\0\0\0bootstrap-tools.drv\0\0\0\0\0\r\3\0\0\0\0\0\0Derive([(\"out\",\"/nix/store/d1prcspbh2qsviipvnaxizcj8l3g7fpw-bootstrap-tools\",\"\",\"\")],[(\"/nix/store/b7irlwi2wjlx5aj1dghx4c8k3ax6m56q-busybox.drv\",[\"out\"]),(\"/nix/store/drsdq2ca1q1dj1hd0r1w2hl4s0fak1vh-bootstrap-tools.tar.xz.drv\",[\"out\"])],[\"/nix/store/p"..., 1064) = 1064
read(3, "stla\0\0\0\0?\0\0\0\0\0\0\0/nix/store/w3xksy5k5rywl4z27v7gi8yafb7ci2sw-bootstrap-tools.drv\0", 32768) = 80
lstat("/nix/store/2vh6qx8scxxcrh2c9xb6iwsjqk482fv8-nixos-18.03pre129076.831ef4756e3/nixos/pkgs/stdenv/generic/builder.sh", {st_mode=S_IFREG|0444, st_size=644, ...}) = 0
openat(AT_FDCWD, "/nix/store/2vh6qx8scxxcrh2c9xb6iwsjqk482fv8-nixos-18.03pre129076.831ef4756e3/nixos/pkgs/stdenv/generic/builder.sh", O_RDONLY|O_CLOEXEC) = 4
read(4, "export PATH=\nfor i in $initialPath; do\n if [ \"$i\" = / ]; then i=; fi\n PATH=$PATH${PATH:+:}$i/bin\ndone\n\nmkdir $out\n\necho \"export SHELL=$shell\" > $out/setup\necho \"initialPath=\\\"$initialPath\\\"\" >> $out/setup\necho \"defaultNativeBuildInputs=\\\"$defaultNativeBuildInputs\\\"\" >> $out/setup\necho \"default"..., 644) = 644
close(4) = 0
write(3, "\7\0\0\0\0\0\0\0\n\0\0\0\0\0\0\0builder.sh\0\0\0\0\0\0\0\0\0\0\0\0\0\0\1\0\0\0\0\0\0\0\6\0\0\0\0\0\0\0sha256\0\0\r\0\0\0\0\0\0\0nix-archive-1\0\0\0\1\0\0\0\0\0\0\0(\0\0\0\0\0\0\0\4\0\0\0\0\0\0\0type\0\0\0\0\7\0\0\0\0\0\0\0regular\0\10\0\0\0\0\0\0\0contents\204\2\0\0\0\0\0\0export PATH=\nfor i in $initialPath; do\n if [ \"$i\" = / ]; then i=; fi\n PATH=$PATH${PATH:+:}$i/bin\ndone\n\nmkdir $out\n\necho \"export SHELL="..., 824) = 824
read(3, "stla\0\0\0\0006\0\0\0\0\0\0\0/nix/store/dsyj1sp3h8q2wwi8m6z548rvn3bmm3vc-builder.sh\0\0", 32768) = 72
lstat("/nix/store/2vh6qx8scxxcrh2c9xb6iwsjqk482fv8-nixos-18.03pre129076.831ef4756e3/nixos/pkgs/build-support/setup-hooks/move-docs.sh", {st_mode=S_IFREG|0444, st_size=643, ...}) = 0
openat(AT_FDCWD, "/nix/store/2vh6qx8scxxcrh2c9xb6iwsjqk482fv8-nixos-18.03pre129076.831ef4756e3/nixos/pkgs/build-support/setup-hooks/move-docs.sh", O_RDONLY|O_CLOEXEC) = 4
read(4, "# This setup hook moves $out/{man,doc,info} to $out/share; moves\n# $out/share/man to $man/share/man; and moves $out/share/doc to\n# $man/share/doc.\n\npreFixupHooks+=(_moveToShare)\n\n_moveToShare() {\n forceShare=${forceShare:=man doc info}\n if [ -z \"$forceShare\" -o -z \"$out\" ]; then return; fi\n\n "..., 643) = 643
close(4) = 0
write(3, "\7\0\0\0\0\0\0\0\f\0\0\0\0\0\0\0move-docs.sh\0\0\0\0\0\0\0\0\0\0\0\0\1\0\0\0\0\0\0\0\6\0\0\0\0\0\0\0sha256\0\0\r\0\0\0\0\0\0\0nix-archive-1\0\0\0\1\0\0\0\0\0\0\0(\0\0\0\0\0\0\0\4\0\0\0\0\0\0\0type\0\0\0\0\7\0\0\0\0\0\0\0regular\0\10\0\0\0\0\0\0\0contents\203\2\0\0\0\0\0\0# This setup hook moves $out/{man,doc,info} to $out/share; moves\n# $out/share/man to $man/share/man; and moves $out/share/doc to\n# $man/shar"..., 824) = 824
read(3, "stla\0\0\0\0008\0\0\0\0\0\0\0/nix/store/mjjy30kxz775bhhi6j9phw81qh6dsbrf-move-docs.sh", 32768) = 72
lstat("/nix/store/2vh6qx8scxxcrh2c9xb6iwsjqk482fv8-nixos-18.03pre129076.831ef4756e3/nixos/pkgs/build-support/setup-hooks/compress-man-pages.sh", {st_mode=S_IFREG|0444, st_size=943, ...}) = 0
openat(AT_FDCWD, "/nix/store/2vh6qx8scxxcrh2c9xb6iwsjqk482fv8-nixos-18.03pre129076.831ef4756e3/nixos/pkgs/build-support/setup-hooks/compress-man-pages.sh", O_RDONLY|O_CLOEXEC) = 4
read(4, "fixupOutputHooks+=('if [ -z \"$dontGzipMan\" ]; then compressManPages \"$prefix\"; fi')\n\ncompressManPages() {\n local dir=\"$1\"\n\n if [ -L \"$dir\"/share ] || [ -L \"$dir\"/share/man ] || [ ! -d \"$dir/share/man\" ]\n then return\n fi\n echo \"gzipping man pages under $dir/share/man/\"\n\n # Compr"..., 943) = 943
close(4) = 0
write(3, "\7\0\0\0\0\0\0\0\25\0\0\0\0\0\0\0compress-man-pages.sh\0\0\0\0\0\0\0\0\0\0\0\1\0\0\0\0\0\0\0\6\0\0\0\0\0\0\0sha256\0\0\r\0\0\0\0\0\0\0nix-archive-1\0\0\0\1\0\0\0\0\0\0\0(\0\0\0\0\0\0\0\4\0\0\0\0\0\0\0type\0\0\0\0\7\0\0\0\0\0\0\0regular\0\10\0\0\0\0\0\0\0contents\257\3\0\0\0\0\0\0fixupOutputHooks+=('if [ -z \"$dontGzipMan\" ]; then compressManPages \"$prefix\"; fi')\n\ncompressManPages() {\n local dir=\"$1\"\n\n if"..., 1128) = 1128
read(3, "stla\0\0\0\0A\0\0\0\0\0\0\0/nix/store/81ikflgpwzgjk8b5vmvg9gaw9mbkc86k-compress-man-pages.sh\0\0\0\0\0\0\0", 32768) = 88
lstat("/nix/store/2vh6qx8scxxcrh2c9xb6iwsjqk482fv8-nixos-18.03pre129076.831ef4756e3/nixos/pkgs/build-support/setup-hooks/strip.sh", {st_mode=S_IFREG|0444, st_size=1668, ...}) = 0
openat(AT_FDCWD, "/nix/store/2vh6qx8scxxcrh2c9xb6iwsjqk482fv8-nixos-18.03pre129076.831ef4756e3/nixos/pkgs/build-support/setup-hooks/strip.sh", O_RDONLY|O_CLOEXEC) = 4
read(4, "# This setup hook strips libraries and executables in the fixup phase.\n\nfixupOutputHooks+=(_doStrip)\n\n_doStrip() {\n # We don't bother to strip build platform code because it shouldn't make it\n # to $out anyways---if it does, that's a bigger problem that a lack of\n # stripping will help catc"..., 1668) = 1668
close(4) = 0
write(3, "\7\0\0\0\0\0\0\0\10\0\0\0\0\0\0\0strip.sh\0\0\0\0\0\0\0\0\1\0\0\0\0\0\0\0\6\0\0\0\0\0\0\0sha256\0\0\r\0\0\0\0\0\0\0nix-archive-1\0\0\0\1\0\0\0\0\0\0\0(\0\0\0\0\0\0\0\4\0\0\0\0\0\0\0type\0\0\0\0\7\0\0\0\0\0\0\0regular\0\10\0\0\0\0\0\0\0contents\204\6\0\0\0\0\0\0# This setup hook strips libraries and executables in the fixup phase.\n\nfixupOutputHooks+=(_doStrip)\n\n_doStrip() {\n # We don't bother to strip bu"..., 1840) = 1840
read(3, "stla\0\0\0\0004\0\0\0\0\0\0\0/nix/store/jw961avfhaq38h828wnawqsqniasqfwz-strip.sh\0\0\0\0", 32768) = 72
lstat("/nix/store/2vh6qx8scxxcrh2c9xb6iwsjqk482fv8-nixos-18.03pre129076.831ef4756e3/nixos/pkgs/build-support/setup-hooks/patch-shebangs.sh", {st_mode=S_IFREG|0444, st_size=2815, ...}) = 0
openat(AT_FDCWD, "/nix/store/2vh6qx8scxxcrh2c9xb6iwsjqk482fv8-nixos-18.03pre129076.831ef4756e3/nixos/pkgs/build-support/setup-hooks/patch-shebangs.sh", O_RDONLY|O_CLOEXEC) = 4
read(4, "# This setup hook causes the fixup phase to rewrite all script\n# interpreter file names (`#! /path') to paths found in $PATH. E.g.,\n# /bin/sh will be rewritten to /nix/store/<hash>-some-bash/bin/sh.\n# /usr/bin/env gets special treatment so that \".../bin/env python\" is\n# rewritten to /nix/store/<ha"..., 2815) = 2815
close(4) = 0
write(3, "\7\0\0\0\0\0\0\0\21\0\0\0\0\0\0\0patch-shebangs.sh\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\1\0\0\0\0\0\0\0\6\0\0\0\0\0\0\0sha256\0\0\r\0\0\0\0\0\0\0nix-archive-1\0\0\0\1\0\0\0\0\0\0\0(\0\0\0\0\0\0\0\4\0\0\0\0\0\0\0type\0\0\0\0\7\0\0\0\0\0\0\0regular\0\10\0\0\0\0\0\0\0contents\377\n\0\0\0\0\0\0# This setup hook causes the fixup phase to rewrite all script\n# interpreter file names (`#! /path') to paths found in $PATH. E.g."..., 3000) = 3000
read(3, "stla\0\0\0\0=\0\0\0\0\0\0\0/nix/store/gpy3r9ss5ngfkib8ylx7jzgahq7m0x5b-patch-shebangs.sh\0\0\0", 32768) = 80
lstat("/nix/store/2vh6qx8scxxcrh2c9xb6iwsjqk482fv8-nixos-18.03pre129076.831ef4756e3/nixos/pkgs/build-support/setup-hooks/audit-tmpdir.sh", {st_mode=S_IFREG|0444, st_size=1391, ...}) = 0
openat(AT_FDCWD, "/nix/store/2vh6qx8scxxcrh2c9xb6iwsjqk482fv8-nixos-18.03pre129076.831ef4756e3/nixos/pkgs/build-support/setup-hooks/audit-tmpdir.sh", O_RDONLY|O_CLOEXEC) = 4
read(4, "# Check whether RPATHs or wrapper scripts contain references to\n# $TMPDIR. This is a serious security bug because it allows any user\n# to inject files into search paths of other users' processes.\n#\n# It might be better to have Nix scan build output for any occurrence\n# of $TMPDIR (which would also b"..., 1391) = 1391
close(4) = 0
write(3, "\7\0\0\0\0\0\0\0\17\0\0\0\0\0\0\0audit-tmpdir.sh\0\0\0\0\0\0\0\0\0\1\0\0\0\0\0\0\0\6\0\0\0\0\0\0\0sha256\0\0\r\0\0\0\0\0\0\0nix-archive-1\0\0\0\1\0\0\0\0\0\0\0(\0\0\0\0\0\0\0\4\0\0\0\0\0\0\0type\0\0\0\0\7\0\0\0\0\0\0\0regular\0\10\0\0\0\0\0\0\0contentso\5\0\0\0\0\0\0# Check whether RPATHs or wrapper scripts contain references to\n# $TMPDIR. This is a serious security bug because it allows any user\n# to in"..., 1568) = 1568
read(3, "stla\0\0\0\0;\0\0\0\0\0\0\0/nix/store/j1q2bm9qjrhr6q2z819dgzi7bmy3hhjq-audit-tmpdir.sh\0\0\0\0\0", 32768) = 80
lstat("/nix/store/2vh6qx8scxxcrh2c9xb6iwsjqk482fv8-nixos-18.03pre129076.831ef4756e3/nixos/pkgs/build-support/setup-hooks/multiple-outputs.sh", {st_mode=S_IFREG|0444, st_size=7400, ...}) = 0
openat(AT_FDCWD, "/nix/store/2vh6qx8scxxcrh2c9xb6iwsjqk482fv8-nixos-18.03pre129076.831ef4756e3/nixos/pkgs/build-support/setup-hooks/multiple-outputs.sh", O_RDONLY|O_CLOEXEC) = 4
read(4, "# The base package for automatic multiple-output splitting. Used in stdenv as well.\npreConfigureHooks+=(_multioutConfig)\npreFixupHooks+=(_multioutDocs)\npreFixupHooks+=(_multioutDevs)\npostFixupHooks+=(_multioutPropagateDev)\n\n# Assign the first string containing nonempty variable to the variable named"..., 7400) = 7400
close(4) = 0
write(3, "\7\0\0\0\0\0\0\0\23\0\0\0\0\0\0\0multiple-outputs.sh\0\0\0\0\0\0\0\0\0\0\0\0\0\1\0\0\0\0\0\0\0\6\0\0\0\0\0\0\0sha256\0\0\r\0\0\0\0\0\0\0nix-archive-1\0\0\0\1\0\0\0\0\0\0\0(\0\0\0\0\0\0\0\4\0\0\0\0\0\0\0type\0\0\0\0\7\0\0\0\0\0\0\0regular\0\10\0\0\0\0\0\0\0contents\350\34\0\0\0\0\0\0# The base package for automatic multiple-output splitting. Used in stdenv as well.\npreConfigureHooks+=(_multioutConfig)\npreFixupHoo"..., 7584) = 7584
read(3, "stla\0\0\0\0?\0\0\0\0\0\0\0/nix/store/9ny6szla9dg61jv8q22qbnqsz37465n0-multiple-outputs.sh\0", 32768) = 80
lstat("/nix/store/2vh6qx8scxxcrh2c9xb6iwsjqk482fv8-nixos-18.03pre129076.831ef4756e3/nixos/pkgs/build-support/setup-hooks/move-sbin.sh", {st_mode=S_IFREG|0444, st_size=545, ...}) = 0
openat(AT_FDCWD, "/nix/store/2vh6qx8scxxcrh2c9xb6iwsjqk482fv8-nixos-18.03pre129076.831ef4756e3/nixos/pkgs/build-support/setup-hooks/move-sbin.sh", O_RDONLY|O_CLOEXEC) = 4
read(4, "# This setup hook, for each output, moves everything in $output/sbin\n# to $output/bin, and replaces $output/sbin with a symlink to\n# $output/bin.\n\nfixupOutputHooks+=(_moveSbin)\n\n_moveSbin() {\n if [ \"$dontMoveSbin\" = 1 ]; then return; fi\n if [ ! -e \"$prefix/sbin\" -o -L \"$prefix/sbin\" ]; then re"..., 545) = 545
close(4) = 0
write(3, "\7\0\0\0\0\0\0\0\f\0\0\0\0\0\0\0move-sbin.sh\0\0\0\0\0\0\0\0\0\0\0\0\1\0\0\0\0\0\0\0\6\0\0\0\0\0\0\0sha256\0\0\r\0\0\0\0\0\0\0nix-archive-1\0\0\0\1\0\0\0\0\0\0\0(\0\0\0\0\0\0\0\4\0\0\0\0\0\0\0type\0\0\0\0\7\0\0\0\0\0\0\0regular\0\10\0\0\0\0\0\0\0contents!\2\0\0\0\0\0\0# This setup hook, for each output, moves everything in $output/sbin\n# to $output/bin, and replaces $output/sbin with a symlink to\n# $output"..., 728) = 728
read(3, "stla\0\0\0\0008\0\0\0\0\0\0\0/nix/store/z82dl6ialp166drqihzkz67nkl6w3l16-move-sbin.sh", 32768) = 72
lstat("/nix/store/2vh6qx8scxxcrh2c9xb6iwsjqk482fv8-nixos-18.03pre129076.831ef4756e3/nixos/pkgs/build-support/setup-hooks/move-lib64.sh", {st_mode=S_IFREG|0444, st_size=784, ...}) = 0
openat(AT_FDCWD, "/nix/store/2vh6qx8scxxcrh2c9xb6iwsjqk482fv8-nixos-18.03pre129076.831ef4756e3/nixos/pkgs/build-support/setup-hooks/move-lib64.sh", O_RDONLY|O_CLOEXEC) = 4
read(4, "# This setup hook, for each output, moves everything in $output/lib64\n# to $output/lib, and replaces $output/lib64 with a symlink to\n# $output/lib. The rationale is that lib64 directories are unnecessary\n# in Nix (since 32-bit and 64-bit builds of a package are in different\n# store paths anyway).\n# "..., 784) = 784
close(4) = 0
write(3, "\7\0\0\0\0\0\0\0\r\0\0\0\0\0\0\0move-lib64.sh\0\0\0\0\0\0\0\0\0\0\0\1\0\0\0\0\0\0\0\6\0\0\0\0\0\0\0sha256\0\0\r\0\0\0\0\0\0\0nix-archive-1\0\0\0\1\0\0\0\0\0\0\0(\0\0\0\0\0\0\0\4\0\0\0\0\0\0\0type\0\0\0\0\7\0\0\0\0\0\0\0regular\0\10\0\0\0\0\0\0\0contents\20\3\0\0\0\0\0\0# This setup hook, for each output, moves everything in $output/lib64\n# to $output/lib, and replaces $output/lib64 with a symlink to\n# $outp"..., 960) = 960
read(3, "stla\0\0\0\0009\0\0\0\0\0\0\0/nix/store/a92kz10cwkpa91k5239inl3fd61zp5dh-move-lib64.sh\0\0\0\0\0\0\0", 32768) = 80
lstat("/nix/store/2vh6qx8scxxcrh2c9xb6iwsjqk482fv8-nixos-18.03pre129076.831ef4756e3/nixos/pkgs/build-support/setup-hooks/set-source-date-epoch-to-latest.sh", {st_mode=S_IFREG|0444, st_size=1375, ...}) = 0
openat(AT_FDCWD, "/nix/store/2vh6qx8scxxcrh2c9xb6iwsjqk482fv8-nixos-18.03pre129076.831ef4756e3/nixos/pkgs/build-support/setup-hooks/set-source-date-epoch-to-latest.sh", O_RDONLY|O_CLOEXEC) = 4
read(4, "updateSourceDateEpoch() {\n local path=\"$1\"\n\n # Get the last modification time of all regular files, sort them,\n # and get the most recent. Maybe we should use\n # https://github.com/0-wiz-0/findnewest here.\n local -a res=($(find \"$path\" -type f -not -newer \"$NIX_BUILD_TOP/..\" -printf '"..., 1375) = 1375
close(4) = 0
write(3, "\7\0\0\0\0\0\0\0\"\0\0\0\0\0\0\0set-source-date-epoch-to-latest.sh\0\0\0\0\0\0\0\0\0\0\0\0\0\0\1\0\0\0\0\0\0\0\6\0\0\0\0\0\0\0sha256\0\0\r\0\0\0\0\0\0\0nix-archive-1\0\0\0\1\0\0\0\0\0\0\0(\0\0\0\0\0\0\0\4\0\0\0\0\0\0\0type\0\0\0\0\7\0\0\0\0\0\0\0regular\0\10\0\0\0\0\0\0\0contents_\5\0\0\0\0\0\0updateSourceDateEpoch() {\n local path=\"$1\"\n\n # Get the last modification time of all regular files, sort them,"..., 1576) = 1576
read(3, "stla\0\0\0\0N\0\0\0\0\0\0\0/nix/store/15kgcm8hnd99p7plqzx7p4lcr2jni4df-set-source-date-epoch-to-latest.sh\0\0", 32768) = 96
lstat("/nix/store/2vh6qx8scxxcrh2c9xb6iwsjqk482fv8-nixos-18.03pre129076.831ef4756e3/nixos/pkgs/stdenv/generic/setup.sh", {st_mode=S_IFREG|0444, st_size=35315, ...}) = 0
openat(AT_FDCWD, "/nix/store/2vh6qx8scxxcrh2c9xb6iwsjqk482fv8-nixos-18.03pre129076.831ef4756e3/nixos/pkgs/stdenv/generic/setup.sh", O_RDONLY|O_CLOEXEC) = 4
read(4, "set -eu\nset -o pipefail\n\nif (( \"${NIX_DEBUG:-0}\" >= 6 )); then\n set -x\nfi\n\n: ${outputs:=out}\n\n\n######################################################################\n# Hook handling.\n\n\n# Run all hooks with the specified name in the order in which they\n# were added, stopping if any fails (returns "..., 35315) = 35315
write(3, "\7\0\0\0\0\0\0\0\10\0\0\0\0\0\0\0setup.sh\0\0\0\0\0\0\0\0\1\0\0\0\0\0\0\0\6\0\0\0\0\0\0\0sha256\0\0\r\0\0\0\0\0\0\0nix-archive-1\0\0\0\1\0\0\0\0\0\0\0(\0\0\0\0\0\0\0\4\0\0\0\0\0\0\0type\0\0\0\0\7\0\0\0\0\0\0\0regular\0\10\0\0\0\0\0\0\0contents\363\211\0\0\0\0\0\0", 152) = 152
write(3, "set -eu\nset -o pipefail\n\nif (( \"${NIX_DEBUG:-0}\" >= 6 )); then\n set -x\nfi\n\n: ${outputs:=out}\n\n\n######################################################################\n# Hook handling.\n\n\n# Run all hooks with the specified name in the order in which they\n# were added, stopping if any fails (returns "..., 35315) = 35315
close(4) = 0
write(3, "\0\0\0\0\0\1\0\0\0\0\0\0\0)\0\0\0\0\0\0\0", 21) = 21
read(3, "stla\0\0\0\0004\0\0\0\0\0\0\0/nix/store/mlqs4a4zf2whpkivj40gpfsiyq913grv-setup.sh\0\0\0\0", 32768) = 72
brk(0x1b627000) = 0x1b627000
write(3, "\10\0\0\0\0\0\0\0\25\0\0\0\0\0\0\0stdenv-linux-boot.drv\0\0\0002\t\0\0\0\0\0\0Derive([(\"out\",\"/nix/store/kffr6nsczi36hga4kj3798il9wdi4dwz-stdenv-linux-boot\",\"\",\"\")],[(\"/nix/store/w3xksy5k5rywl4z27v7gi8yafb7ci2sw-bootstrap-tools.drv\",[\"out\"])],[\"/nix/store/15kgcm8hnd99p7plqzx7p4lcr2jni4df-set-source-date-epoch-to-latest.sh\",\"/nix"..., 3264) = 3264
read(3, "stla\0\0\0\0A\0\0\0\0\0\0\0/nix/store/8j8cdi3scinyx49qdl5h8pvsnn6fq7yb-stdenv-linux-boot.drv\0\0\0\0\0\0\0", 32768) = 88
write(3, "\10\0\0\0\0\0\0\0\23\0\0\0\0\0\0\0bootstrap-glibc.drv\0\0\0\0\0\34\5\0\0\0\0\0\0Derive([(\"out\",\"/nix/store/bnss0yjacjfxqbmalsddhsw2zabfzmqc-bootstrap-glibc\",\"\",\"\")],[(\"/nix/store/8j8cdi3scinyx49qdl5h8pvsnn6fq7yb-stdenv-linux-boot.drv\",[\"out\"]),(\"/nix/store/w3xksy5k5rywl4z27v7gi8yafb7ci2sw-bootstrap-tools.drv\",[\"out\"])],[\"/nix/stor"..., 1592) = 1592
read(3, "stla\0\0\0\0?\0\0\0\0\0\0\0/nix/store/q0bl8npf7if2a0lsj79a5v9cnrcsb201-bootstrap-glibc.drv\0", 32768) = 80
lstat("/nix/store/2vh6qx8scxxcrh2c9xb6iwsjqk482fv8-nixos-18.03pre129076.831ef4756e3/nixos/pkgs/development/tools/misc/binutils", {st_mode=S_IFDIR|0555, st_size=12, ...}) = 0
openat(AT_FDCWD, "/nix/store/2vh6qx8scxxcrh2c9xb6iwsjqk482fv8-nixos-18.03pre129076.831ef4756e3/nixos/pkgs/development/tools/misc/binutils/default.nix", O_RDONLY|O_CLOEXEC) = 4
fstat(4, {st_mode=S_IFREG|0444, st_size=4948, ...}) = 0
read(4, "{ stdenv, buildPackages\n, fetchurl, zlib\n, buildPlatform, hostPlatform, targetPlatform\n, noSysDirs, gold ? true, bison ? null\n}:\n\nlet\n # Note to whoever is upgrading this: 2.29 is broken.\n # ('nix-build pkgs/stdenv/linux/make-bootstrap-tools.nix -A test' segfaults on aarch64)\n # Also glibc might "..., 4948) = 4948
close(4) = 0
lstat("/nix/store/2vh6qx8scxxcrh2c9xb6iwsjqk482fv8-nixos-18.03pre129076.831ef4756e3/nixos/pkgs/development/libraries/glibc/common.nix", {st_mode=S_IFREG|0444, st_size=7407, ...}) = 0
openat(AT_FDCWD, "/nix/store/2vh6qx8scxxcrh2c9xb6iwsjqk482fv8-nixos-18.03pre129076.831ef4756e3/nixos/pkgs/development/libraries/glibc/common.nix", O_RDONLY|O_CLOEXEC) = 4
fstat(4, {st_mode=S_IFREG|0444, st_size=7407, ...}) = 0
read(4, "/* Build configuration used to build glibc, Info files, and locale\n information. */\n\n{ stdenv, lib\n, buildPlatform, hostPlatform\n, buildPackages\n, fetchurl\n, linuxHeaders ? null\n, gd ? null, libpng ? null\n}:\n\n{ name\n, withLinuxHeaders ? false\n, profilingLibraries ? false\n, installLocales ? false\n"..., 7407) = 7407
close(4) = 0
lstat("/nix/store/2vh6qx8scxxcrh2c9xb6iwsjqk482fv8-nixos-18.03pre129076.831ef4756e3/nixos/pkgs/os-specific/linux/kernel-headers", {st_mode=S_IFDIR|0555, st_size=3, ...}) = 0
openat(AT_FDCWD, "/nix/store/2vh6qx8scxxcrh2c9xb6iwsjqk482fv8-nixos-18.03pre129076.831ef4756e3/nixos/pkgs/os-specific/linux/kernel-headers/default.nix", O_RDONLY|O_CLOEXEC) = 4
fstat(4, {st_mode=S_IFREG|0444, st_size=1639, ...}) = 0
read(4, "{ stdenvNoCC, lib, buildPackages\n, buildPlatform, hostPlatform\n, fetchurl, perl\n}:\n\nassert hostPlatform.isLinux;\n\nlet\n common = { version, sha256, patches ? null }: stdenvNoCC.mkDerivation {\n name = \"linux-headers-${version}\";\n\n src = fetchurl {\n url = \"mirror://kernel/linux/kernel/v4.x/"..., 1639) = 1639
close(4) = 0
lstat("/nix/store/2vh6qx8scxxcrh2c9xb6iwsjqk482fv8-nixos-18.03pre129076.831ef4756e3/nixos/lib/licenses.nix", {st_mode=S_IFREG|0444, st_size=13782, ...}) = 0
openat(AT_FDCWD, "/nix/store/2vh6qx8scxxcrh2c9xb6iwsjqk482fv8-nixos-18.03pre129076.831ef4756e3/nixos/lib/licenses.nix", O_RDONLY|O_CLOEXEC) = 4
fstat(4, {st_mode=S_IFREG|0444, st_size=13782, ...}) = 0
read(4, "{ lib }:\nlet\n\n spdx = lic: lic // {\n url = \"http://spdx.org/licenses/${lic.spdxId}.html\";\n };\n\nin\n\nlib.mapAttrs (n: v: v // { shortName = n; }) rec {\n /* License identifiers from spdx.org where possible.\n * If you cannot find your license here, then look for a similar license or\n * add it "..., 13782) = 13782
close(4) = 0
brk(0x1b648000) = 0x1b648000
lstat("/nix/store/2vh6qx8scxxcrh2c9xb6iwsjqk482fv8-nixos-18.03pre129076.831ef4756e3/nixos/lib/systems/doubles.nix", {st_mode=S_IFREG|0444, st_size=1548, ...}) = 0
openat(AT_FDCWD, "/nix/store/2vh6qx8scxxcrh2c9xb6iwsjqk482fv8-nixos-18.03pre129076.831ef4756e3/nixos/lib/systems/doubles.nix", O_RDONLY|O_CLOEXEC) = 4
fstat(4, {st_mode=S_IFREG|0444, st_size=1548, ...}) = 0
read(4, "{ lib }:\nlet\n inherit (lib) lists;\n inherit (lib.systems) parse;\n inherit (lib.systems.inspect) predicates;\n inherit (lib.attrsets) matchAttrs;\n\n all = [\n \"aarch64-linux\"\n \"armv5tel-linux\" \"armv6l-linux\" \"armv7l-linux\"\n\n \"mips64el-linux\"\n\n \"i686-cygwin\" \"i686-freebsd\" \"i686-linux\" \""..., 1548) = 1548
close(4) = 0
brk(0x1b658000) = 0x1b658000
lstat("/nix/store/2vh6qx8scxxcrh2c9xb6iwsjqk482fv8-nixos-18.03pre129076.831ef4756e3/nixos/pkgs/development/libraries/zlib", {st_mode=S_IFDIR|0555, st_size=4, ...}) = 0
openat(AT_FDCWD, "/nix/store/2vh6qx8scxxcrh2c9xb6iwsjqk482fv8-nixos-18.03pre129076.831ef4756e3/nixos/pkgs/development/libraries/zlib/default.nix", O_RDONLY|O_CLOEXEC) = 4
fstat(4, {st_mode=S_IFREG|0444, st_size=2457, ...}) = 0
read(4, "{ stdenv\n, fetchurl\n, buildPlatform, hostPlatform\n, static ? false\n}:\n\nstdenv.mkDerivation rec {\n name = \"zlib-${version}\";\n version = \"1.2.11\";\n\n src = fetchurl {\n urls =\n [ \"http://www.zlib.net/fossils/${name}.tar.gz\" # stable archive path\n \"mirror://sourceforge/libpng/zlib/${ve"..., 2457) = 2457
close(4) = 0
lstat("/nix/store/2vh6qx8scxxcrh2c9xb6iwsjqk482fv8-nixos-18.03pre129076.831ef4756e3/nixos/pkgs/build-support/fetchurl/boot.nix", {st_mode=S_IFREG|0444, st_size=498, ...}) = 0
openat(AT_FDCWD, "/nix/store/2vh6qx8scxxcrh2c9xb6iwsjqk482fv8-nixos-18.03pre129076.831ef4756e3/nixos/pkgs/build-support/fetchurl/boot.nix", O_RDONLY|O_CLOEXEC) = 4
fstat(4, {st_mode=S_IFREG|0444, st_size=498, ...}) = 0
read(4, "let mirrors = import ./mirrors.nix; in\n\n{ system }:\n\n{ url ? builtins.head urls\n, urls ? []\n, sha256\n, name ? baseNameOf (toString url)\n}:\n\nimport <nix/fetchurl.nix> {\n inherit system sha256 name;\n\n url =\n # Handle mirror:// URIs. Since <nix/fetchurl.nix> currently\n # supports only one URI, "..., 498) = 498
close(4) = 0
lstat("/nix/var/nix/profiles/per-user/root/channels/nix/fetchurl.nix", 0x7ffdbd88bf70) = -1 ENOENT (No such file or directory)
lstat("/nix/store/r8zhwq9xylxw8a823kpvqy0kfqq4g52f-nix-2.0pre5968_a6c0b773/share/nix/corepkgs//fetchurl.nix", {st_mode=S_IFREG|0444, st_size=1123, ...}) = 0
brk(0x1b67a000) = 0x1b67a000
brk(0x1b689000) = 0x1b689000
write(3, "\10\0\0\0\0\0\0\0\26\0\0\0\0\0\0\0zlib-1.2.11.tar.gz.drv\0\0\335\2\0\0\0\0\0\0Derive([(\"out\",\"/nix/store/rrzja19jbqxbfryp2zchb2ma5h041rxh-zlib-1.2.11.tar.gz\",\"sha256\",\"c3e5e9fdd5004dcb542feda5ee4f0ff0744628baf8ed2dd5d66f8ca1197cb1a1\")],[],[],\"builtin\",\"builtin:fetchurl\",[],[(\"builder\",\"builtin:fetchurl\"),(\"executable\",\"\"),(\"impu"..., 792) = 792
read(3, "stla\0\0\0\0B\0\0\0\0\0\0\0/nix/store/42dca5y49wm6g6l5wwrxfc5zqq5kfa11-zlib-1.2.11.tar.gz.drv\0\0\0\0\0\0", 32768) = 88
lstat("/nix/store/2vh6qx8scxxcrh2c9xb6iwsjqk482fv8-nixos-18.03pre129076.831ef4756e3/nixos/pkgs/build-support/bintools-wrapper/ld-wrapper.sh", {st_mode=S_IFREG|0444, st_size=6765, ...}) = 0
openat(AT_FDCWD, "/nix/store/2vh6qx8scxxcrh2c9xb6iwsjqk482fv8-nixos-18.03pre129076.831ef4756e3/nixos/pkgs/build-support/bintools-wrapper/ld-wrapper.sh", O_RDONLY|O_CLOEXEC) = 4
read(4, "#! @shell@\nset -eu -o pipefail +o posix\nshopt -s nullglob\n\nif (( \"${NIX_DEBUG:-0}\" >= 7 )); then\n set -x\nfi\n\npath_backup=\"$PATH\"\n\n# phase separation makes this look useless\n# shellcheck disable=SC2157\nif [ -n \"@coreutils_bin@\" ]; then\n PATH=\"@coreutils_bin@/bin\"\nfi\n\nsource @out@/nix-support/ut"..., 6765) = 6765
close(4) = 0
write(3, "\7\0\0\0\0\0\0\0\r\0\0\0\0\0\0\0ld-wrapper.sh\0\0\0\0\0\0\0\0\0\0\0\1\0\0\0\0\0\0\0\6\0\0\0\0\0\0\0sha256\0\0\r\0\0\0\0\0\0\0nix-archive-1\0\0\0\1\0\0\0\0\0\0\0(\0\0\0\0\0\0\0\4\0\0\0\0\0\0\0type\0\0\0\0\7\0\0\0\0\0\0\0regular\0\10\0\0\0\0\0\0\0conte
View raw

(Sorry about that, but we can’t show files that are this big right now.)

View raw

(Sorry about that, but we can’t show files that are this big right now.)

View raw

(Sorry about that, but we can’t show files that are this big right now.)

View raw

(Sorry about that, but we can’t show files that are this big right now.)

View raw

(Sorry about that, but we can’t show files that are this big right now.)

View raw

(Sorry about that, but we can’t show files that are this big right now.)

View raw

(Sorry about that, but we can’t show files that are this big right now.)

View raw

(Sorry about that, but we can’t show files that are this big right now.)

View raw

(Sorry about that, but we can’t show files that are this big right now.)

View raw

(Sorry about that, but we can’t show files that are this big right now.)

View raw

(Sorry about that, but we can’t show files that are this big right now.)

View raw

(Sorry about that, but we can’t show files that are this big right now.)

View raw

(Sorry about that, but we can’t show files that are this big right now.)

View raw

(Sorry about that, but we can’t show files that are this big right now.)

View raw

(Sorry about that, but we can’t show files that are this big right now.)

View raw

(Sorry about that, but we can’t show files that are this big right now.)

View raw

(Sorry about that, but we can’t show files that are this big right now.)

View raw

(Sorry about that, but we can’t show files that are this big right now.)

View raw

(Sorry about that, but we can’t show files that are this big right now.)

View raw

(Sorry about that, but we can’t show files that are this big right now.)

View raw

(Sorry about that, but we can’t show files that are this big right now.)

View raw

(Sorry about that, but we can’t show files that are this big right now.)

View raw

(Sorry about that, but we can’t show files that are this big right now.)

View raw

(Sorry about that, but we can’t show files that are this big right now.)

View raw

(Sorry about that, but we can’t show files that are this big right now.)

View raw

(Sorry about that, but we can’t show files that are this big right now.)

View raw

(Sorry about that, but we can’t show files that are this big right now.)

View raw

(Sorry about that, but we can’t show files that are this big right now.)

View raw

(Sorry about that, but we can’t show files that are this big right now.)

View raw

(Sorry about that, but we can’t show files that are this big right now.)

View raw

(Sorry about that, but we can’t show files that are this big right now.)

View raw

(Sorry about that, but we can’t show files that are this big right now.)

View raw

(Sorry about that, but we can’t show files that are this big right now.)

View raw

(Sorry about that, but we can’t show files that are this big right now.)

View raw

(Sorry about that, but we can’t show files that are this big right now.)

View raw

(Sorry about that, but we can’t show files that are this big right now.)

View raw

(Sorry about that, but we can’t show files that are this big right now.)

View raw

(Sorry about that, but we can’t show files that are this big right now.)

View raw

(Sorry about that, but we can’t show files that are this big right now.)

View raw

(Sorry about that, but we can’t show files that are this big right now.)

View raw

(Sorry about that, but we can’t show files that are this big right now.)

View raw

(Sorry about that, but we can’t show files that are this big right now.)

View raw

(Sorry about that, but we can’t show files that are this big right now.)

View raw

(Sorry about that, but we can’t show files that are this big right now.)

View raw

(Sorry about that, but we can’t show files that are this big right now.)

View raw

(Sorry about that, but we can’t show files that are this big right now.)

View raw

(Sorry about that, but we can’t show files that are this big right now.)

View raw

(Sorry about that, but we can’t show files that are this big right now.)

View raw

(Sorry about that, but we can’t show files that are this big right now.)

View raw

(Sorry about that, but we can’t show files that are this big right now.)

View raw

(Sorry about that, but we can’t show files that are this big right now.)

View raw

(Sorry about that, but we can’t show files that are this big right now.)

View raw

(Sorry about that, but we can’t show files that are this big right now.)

View raw

(Sorry about that, but we can’t show files that are this big right now.)

View raw

(Sorry about that, but we can’t show files that are this big right now.)

View raw

(Sorry about that, but we can’t show files that are this big right now.)

View raw

(Sorry about that, but we can’t show files that are this big right now.)

View raw

(Sorry about that, but we can’t show files that are this big right now.)

View raw

(Sorry about that, but we can’t show files that are this big right now.)

View raw

(Sorry about that, but we can’t show files that are this big right now.)

View raw

(Sorry about that, but we can’t show files that are this big right now.)

View raw

(Sorry about that, but we can’t show files that are this big right now.)

View raw

(Sorry about that, but we can’t show files that are this big right now.)

View raw

(Sorry about that, but we can’t show files that are this big right now.)

View raw

(Sorry about that, but we can’t show files that are this big right now.)

View raw

(Sorry about that, but we can’t show files that are this big right now.)

View raw

(Sorry about that, but we can’t show files that are this big right now.)

View raw

(Sorry about that, but we can’t show files that are this big right now.)

View raw

(Sorry about that, but we can’t show files that are this big right now.)

View raw

(Sorry about that, but we can’t show files that are this big right now.)

View raw

(Sorry about that, but we can’t show files that are this big right now.)

View raw

(Sorry about that, but we can’t show files that are this big right now.)

View raw

(Sorry about that, but we can’t show files that are this big right now.)

View raw

(Sorry about that, but we can’t show files that are this big right now.)

View raw

(Sorry about that, but we can’t show files that are this big right now.)

View raw

(Sorry about that, but we can’t show files that are this big right now.)

View raw

(Sorry about that, but we can’t show files that are this big right now.)

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment