-
-
Save anonymous/8aabf95f7dc4bf582eecfc67d14bd2d2 to your computer and use it in GitHub Desktop.
getpid() = 10245 | |
close(255) = 0 | |
rt_sigprocmask(SIG_SETMASK, [], NULL, 8) = 0 | |
rt_sigaction(SIGTSTP, {sa_handler=SIG_DFL, sa_mask=[], sa_flags=SA_RESTORER, sa_restorer=0x7a48b0ca82d0}, {sa_handler=SIG_DFL, sa_mask=[], sa_flags=SA_RESTORER, sa_restorer=0x7a48b0ca82d0}, 8) = 0 | |
rt_sigaction(SIGTTIN, {sa_handler=SIG_DFL, sa_mask=[], sa_flags=SA_RESTORER, sa_restorer=0x7a48b0ca82d0}, {sa_handler=SIG_DFL, sa_mask=[], sa_flags=SA_RESTORER, sa_restorer=0x7a48b0ca82d0}, 8) = 0 | |
rt_sigaction(SIGTTOU, {sa_handler=SIG_DFL, sa_mask=[], sa_flags=SA_RESTORER, sa_restorer=0x7a48b0ca82d0}, {sa_handler=SIG_DFL, sa_mask=[], sa_flags=SA_RESTORER, sa_restorer=0x7a48b0ca82d0}, 8) = 0 | |
rt_sigaction(SIGHUP, {sa_handler=SIG_DFL, sa_mask=[], sa_flags=SA_RESTORER, sa_restorer=0x7a48b0ca82d0}, NULL, 8) = 0 | |
rt_sigaction(SIGILL, {sa_handler=SIG_DFL, sa_mask=[], sa_flags=SA_RESTORER, sa_restorer=0x7a48b0ca82d0}, NULL, 8) = 0 | |
rt_sigaction(SIGTRAP, {sa_handler=SIG_DFL, sa_mask=[], sa_flags=SA_RESTORER, sa_restorer=0x7a48b0ca82d0}, NULL, 8) = 0 | |
rt_sigaction(SIGABRT, {sa_handler=SIG_DFL, sa_mask=[], sa_flags=SA_RESTORER, sa_restorer=0x7a48b0ca82d0}, NULL, 8) = 0 | |
rt_sigaction(SIGFPE, {sa_handler=SIG_DFL, sa_mask=[], sa_flags=SA_RESTORER, sa_restorer=0x7a48b0ca82d0}, NULL, 8) = 0 | |
rt_sigaction(SIGBUS, {sa_handler=SIG_DFL, sa_mask=[], sa_flags=SA_RESTORER, sa_restorer=0x7a48b0ca82d0}, NULL, 8) = 0 | |
rt_sigaction(SIGSEGV, {sa_handler=SIG_DFL, sa_mask=[], sa_flags=SA_RESTORER, sa_restorer=0x7a48b0ca82d0}, NULL, 8) = 0 | |
rt_sigaction(SIGSYS, {sa_handler=SIG_DFL, sa_mask=[], sa_flags=SA_RESTORER, sa_restorer=0x7a48b0ca82d0}, NULL, 8) = 0 | |
rt_sigaction(SIGPIPE, {sa_handler=SIG_DFL, sa_mask=[], sa_flags=SA_RESTORER, sa_restorer=0x7a48b0ca82d0}, NULL, 8) = 0 | |
rt_sigaction(SIGALRM, {sa_handler=SIG_DFL, sa_mask=[], sa_flags=SA_RESTORER, sa_restorer=0x7a48b0ca82d0}, NULL, 8) = 0 | |
rt_sigaction(SIGTERM, {sa_handler=SIG_DFL, sa_mask=[], sa_flags=SA_RESTORER, sa_restorer=0x7a48b0ca82d0}, NULL, 8) = 0 | |
rt_sigaction(SIGXCPU, {sa_handler=SIG_DFL, sa_mask=[], sa_flags=SA_RESTORER, sa_restorer=0x7a48b0ca82d0}, NULL, 8) = 0 | |
rt_sigaction(SIGXFSZ, {sa_handler=SIG_DFL, sa_mask=[], sa_flags=SA_RESTORER, sa_restorer=0x7a48b0ca82d0}, NULL, 8) = 0 | |
rt_sigaction(SIGVTALRM, {sa_handler=SIG_DFL, sa_mask=[], sa_flags=SA_RESTORER, sa_restorer=0x7a48b0ca82d0}, NULL, 8) = 0 | |
rt_sigaction(SIGUSR1, {sa_handler=SIG_DFL, sa_mask=[], sa_flags=SA_RESTORER, sa_restorer=0x7a48b0ca82d0}, NULL, 8) = 0 | |
rt_sigaction(SIGUSR2, {sa_handler=SIG_DFL, sa_mask=[], sa_flags=SA_RESTORER, sa_restorer=0x7a48b0ca82d0}, NULL, 8) = 0 | |
rt_sigaction(SIGINT, {sa_handler=SIG_DFL, sa_mask=[], sa_flags=SA_RESTORER, sa_restorer=0x7a48b0ca82d0}, {sa_handler=0x45b320, sa_mask=[], sa_flags=SA_RESTORER, sa_restorer=0x7a48b0ca82d0}, 8) = 0 | |
rt_sigaction(SIGQUIT, {sa_handler=SIG_DFL, sa_mask=[], sa_flags=SA_RESTORER, sa_restorer=0x7a48b0ca82d0}, {sa_handler=SIG_IGN, sa_mask=[], sa_flags=SA_RESTORER, sa_restorer=0x7a48b0ca82d0}, 8) = 0 | |
rt_sigaction(SIGCHLD, {sa_handler=SIG_DFL, sa_mask=[], sa_flags=SA_RESTORER|SA_RESTART, sa_restorer=0x7a48b0ca82d0}, {sa_handler=0x441ad0, sa_mask=[], sa_flags=SA_RESTORER|SA_RESTART, sa_restorer=0x7a48b0ca82d0}, 8) = 0 | |
openat(AT_FDCWD, "/dev/null", O_WRONLY|O_CREAT|O_TRUNC, 0666) = 3 | |
dup2(3, 1) = 1 | |
close(3) = 0 | |
execve("/nix/store/r8zhwq9xylxw8a823kpvqy0kfqq4g52f-nix-2.0pre5968_a6c0b773/bin/nix-store", ["nix-store", "-r", "/tmp/nixos-rebuild.n0BS6e/nix.drv!out", "--add-root", "/tmp/nixos-rebuild.n0BS6e/nix", "--indirect"], 0x71e008 /* 51 vars */) = 0 | |
brk(NULL) = 0x622000 | |
mmap(NULL, 8192, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) = 0x7204b3090000 | |
access("/etc/ld-nix.so.preload", R_OK) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/r8zhwq9xylxw8a823kpvqy0kfqq4g52f-nix-2.0pre5968_a6c0b773/lib/tls/x86_64/x86_64/libbz2.so.1", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
stat("/nix/store/r8zhwq9xylxw8a823kpvqy0kfqq4g52f-nix-2.0pre5968_a6c0b773/lib/tls/x86_64/x86_64", 0x7fff8de75610) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/r8zhwq9xylxw8a823kpvqy0kfqq4g52f-nix-2.0pre5968_a6c0b773/lib/tls/x86_64/libbz2.so.1", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
stat("/nix/store/r8zhwq9xylxw8a823kpvqy0kfqq4g52f-nix-2.0pre5968_a6c0b773/lib/tls/x86_64", 0x7fff8de75610) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/r8zhwq9xylxw8a823kpvqy0kfqq4g52f-nix-2.0pre5968_a6c0b773/lib/tls/x86_64/libbz2.so.1", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
stat("/nix/store/r8zhwq9xylxw8a823kpvqy0kfqq4g52f-nix-2.0pre5968_a6c0b773/lib/tls/x86_64", 0x7fff8de75610) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/r8zhwq9xylxw8a823kpvqy0kfqq4g52f-nix-2.0pre5968_a6c0b773/lib/tls/libbz2.so.1", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
stat("/nix/store/r8zhwq9xylxw8a823kpvqy0kfqq4g52f-nix-2.0pre5968_a6c0b773/lib/tls", 0x7fff8de75610) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/r8zhwq9xylxw8a823kpvqy0kfqq4g52f-nix-2.0pre5968_a6c0b773/lib/x86_64/x86_64/libbz2.so.1", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
stat("/nix/store/r8zhwq9xylxw8a823kpvqy0kfqq4g52f-nix-2.0pre5968_a6c0b773/lib/x86_64/x86_64", 0x7fff8de75610) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/r8zhwq9xylxw8a823kpvqy0kfqq4g52f-nix-2.0pre5968_a6c0b773/lib/x86_64/libbz2.so.1", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
stat("/nix/store/r8zhwq9xylxw8a823kpvqy0kfqq4g52f-nix-2.0pre5968_a6c0b773/lib/x86_64", 0x7fff8de75610) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/r8zhwq9xylxw8a823kpvqy0kfqq4g52f-nix-2.0pre5968_a6c0b773/lib/x86_64/libbz2.so.1", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
stat("/nix/store/r8zhwq9xylxw8a823kpvqy0kfqq4g52f-nix-2.0pre5968_a6c0b773/lib/x86_64", 0x7fff8de75610) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/r8zhwq9xylxw8a823kpvqy0kfqq4g52f-nix-2.0pre5968_a6c0b773/lib/libbz2.so.1", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
stat("/nix/store/r8zhwq9xylxw8a823kpvqy0kfqq4g52f-nix-2.0pre5968_a6c0b773/lib", {st_mode=S_IFDIR|0555, st_size=8, ...}) = 0 | |
openat(AT_FDCWD, "/nix/store/kgq1fxb7c84r212kmq4p8zcxyi7fv51r-libsodium-1.0.16/lib/tls/x86_64/x86_64/libbz2.so.1", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
stat("/nix/store/kgq1fxb7c84r212kmq4p8zcxyi7fv51r-libsodium-1.0.16/lib/tls/x86_64/x86_64", 0x7fff8de75610) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/kgq1fxb7c84r212kmq4p8zcxyi7fv51r-libsodium-1.0.16/lib/tls/x86_64/libbz2.so.1", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
stat("/nix/store/kgq1fxb7c84r212kmq4p8zcxyi7fv51r-libsodium-1.0.16/lib/tls/x86_64", 0x7fff8de75610) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/kgq1fxb7c84r212kmq4p8zcxyi7fv51r-libsodium-1.0.16/lib/tls/x86_64/libbz2.so.1", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
stat("/nix/store/kgq1fxb7c84r212kmq4p8zcxyi7fv51r-libsodium-1.0.16/lib/tls/x86_64", 0x7fff8de75610) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/kgq1fxb7c84r212kmq4p8zcxyi7fv51r-libsodium-1.0.16/lib/tls/libbz2.so.1", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
stat("/nix/store/kgq1fxb7c84r212kmq4p8zcxyi7fv51r-libsodium-1.0.16/lib/tls", 0x7fff8de75610) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/kgq1fxb7c84r212kmq4p8zcxyi7fv51r-libsodium-1.0.16/lib/x86_64/x86_64/libbz2.so.1", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
stat("/nix/store/kgq1fxb7c84r212kmq4p8zcxyi7fv51r-libsodium-1.0.16/lib/x86_64/x86_64", 0x7fff8de75610) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/kgq1fxb7c84r212kmq4p8zcxyi7fv51r-libsodium-1.0.16/lib/x86_64/libbz2.so.1", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
stat("/nix/store/kgq1fxb7c84r212kmq4p8zcxyi7fv51r-libsodium-1.0.16/lib/x86_64", 0x7fff8de75610) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/kgq1fxb7c84r212kmq4p8zcxyi7fv51r-libsodium-1.0.16/lib/x86_64/libbz2.so.1", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
stat("/nix/store/kgq1fxb7c84r212kmq4p8zcxyi7fv51r-libsodium-1.0.16/lib/x86_64", 0x7fff8de75610) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/kgq1fxb7c84r212kmq4p8zcxyi7fv51r-libsodium-1.0.16/lib/libbz2.so.1", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
stat("/nix/store/kgq1fxb7c84r212kmq4p8zcxyi7fv51r-libsodium-1.0.16/lib", {st_mode=S_IFDIR|0555, st_size=6, ...}) = 0 | |
openat(AT_FDCWD, "/nix/store/mrphq5k83715mqjlk0vjcr3h0j7zs8ix-bzip2-1.0.6.0.1/lib/tls/x86_64/x86_64/libbz2.so.1", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
stat("/nix/store/mrphq5k83715mqjlk0vjcr3h0j7zs8ix-bzip2-1.0.6.0.1/lib/tls/x86_64/x86_64", 0x7fff8de75610) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/mrphq5k83715mqjlk0vjcr3h0j7zs8ix-bzip2-1.0.6.0.1/lib/tls/x86_64/libbz2.so.1", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
stat("/nix/store/mrphq5k83715mqjlk0vjcr3h0j7zs8ix-bzip2-1.0.6.0.1/lib/tls/x86_64", 0x7fff8de75610) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/mrphq5k83715mqjlk0vjcr3h0j7zs8ix-bzip2-1.0.6.0.1/lib/tls/x86_64/libbz2.so.1", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
stat("/nix/store/mrphq5k83715mqjlk0vjcr3h0j7zs8ix-bzip2-1.0.6.0.1/lib/tls/x86_64", 0x7fff8de75610) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/mrphq5k83715mqjlk0vjcr3h0j7zs8ix-bzip2-1.0.6.0.1/lib/tls/libbz2.so.1", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
stat("/nix/store/mrphq5k83715mqjlk0vjcr3h0j7zs8ix-bzip2-1.0.6.0.1/lib/tls", 0x7fff8de75610) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/mrphq5k83715mqjlk0vjcr3h0j7zs8ix-bzip2-1.0.6.0.1/lib/x86_64/x86_64/libbz2.so.1", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
stat("/nix/store/mrphq5k83715mqjlk0vjcr3h0j7zs8ix-bzip2-1.0.6.0.1/lib/x86_64/x86_64", 0x7fff8de75610) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/mrphq5k83715mqjlk0vjcr3h0j7zs8ix-bzip2-1.0.6.0.1/lib/x86_64/libbz2.so.1", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
stat("/nix/store/mrphq5k83715mqjlk0vjcr3h0j7zs8ix-bzip2-1.0.6.0.1/lib/x86_64", 0x7fff8de75610) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/mrphq5k83715mqjlk0vjcr3h0j7zs8ix-bzip2-1.0.6.0.1/lib/x86_64/libbz2.so.1", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
stat("/nix/store/mrphq5k83715mqjlk0vjcr3h0j7zs8ix-bzip2-1.0.6.0.1/lib/x86_64", 0x7fff8de75610) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/mrphq5k83715mqjlk0vjcr3h0j7zs8ix-bzip2-1.0.6.0.1/lib/libbz2.so.1", O_RDONLY|O_CLOEXEC) = 3 | |
read(3, "\177ELF\2\1\1\0\0\0\0\0\0\0\0\0\3\0>\0\1\0\0\0\200\26\0\0\0\0\0\0@\0\0\0\0\0\0\0008\r\1\0\0\0\0\0\0\0\0\0@\0008\0\7\0@\0\32\0\27\0\1\0\0\0\5\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\264\350\0\0\0\0\0\0\264\350\0\0\0\0\0\0\0\0 \0\0\0\0\0\1\0\0\0\6\0\0\0\360\353\0\0\0\0\0\0\360\353 \0\0\0\0\0\360\353 \0\0\0\0\0000\20\0\0\0\0\0\0008\20\0\0\0\0\0\0\0\0 \0\0\0\0\0\2\0\0\0\6\0\0\0\200\354\0\0\0\0\0\0\200\354 \0\0\0\0\0\200\354 \0\0\0\0\0\320\1\0\0\0\0\0\0\320\1\0\0\0\0\0\0\10\0\0\0\0\0\0\0P\345td\4\0\0\0\210\335\0\0\0\0\0\0\210\335\0\0\0\0\0\0\210\335\0\0\0\0\0\0l\1\0\0\0\0\0\0l\1\0\0\0\0\0\0\4\0\0\0\0\0\0\0Q\345td\6\0\0\0\0\0\0\0"..., 832) = 832 | |
fstat(3, {st_mode=S_IFREG|0555, st_size=70584, ...}) = 0 | |
mmap(NULL, 2161704, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) = 0x7204b2c5e000 | |
mprotect(0x7204b2c6d000, 2093056, PROT_NONE) = 0 | |
mmap(0x7204b2e6c000, 8192, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0xe000) = 0x7204b2e6c000 | |
close(3) = 0 | |
openat(AT_FDCWD, "/nix/store/r8zhwq9xylxw8a823kpvqy0kfqq4g52f-nix-2.0pre5968_a6c0b773/lib/libsodium.so.23", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/kgq1fxb7c84r212kmq4p8zcxyi7fv51r-libsodium-1.0.16/lib/libsodium.so.23", O_RDONLY|O_CLOEXEC) = 3 | |
read(3, "\177ELF\2\1\1\0\0\0\0\0\0\0\0\0\3\0>\0\1\0\0\0`\272\0\0\0\0\0\0@\0\0\0\0\0\0\0008\362\5\0\0\0\0\0\0\0\0\0@\0008\0\t\0@\0\33\0\32\0\1\0\0\0\5\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0L\35\5\0\0\0\0\0L\35\5\0\0\0\0\0\0\0 \0\0\0\0\0\1\0\0\0\6\0\0\0 (\5\0\0\0\0\0 (%\0\0\0\0\0 (%\0\0\0\0\0\20\v\0\0\0\0\0\0\350\v\0\0\0\0\0\0\0\0 \0\0\0\0\0\2\0\0\0\6\0\0\0000(\5\0\0\0\0\0000(%\0\0\0\0\0000(%\0\0\0\0\0\360\1\0\0\0\0\0\0\360\1\0\0\0\0\0\0\10\0\0\0\0\0\0\0\4\0\0\0\4\0\0\0008\2\0\0\0\0\0\0008\2\0\0\0\0\0\0008\2\0\0\0\0\0\0$\0\0\0\0\0\0\0$\0\0\0\0\0\0\0\4\0\0\0\0\0\0\0\7\0\0\0\4\0\0\0 (\5\0"..., 832) = 832 | |
fstat(3, {st_mode=S_IFREG|0555, st_size=391416, ...}) = 0 | |
mmap(NULL, 2438152, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) = 0x7204b2a0a000 | |
mprotect(0x7204b2a5c000, 2097152, PROT_NONE) = 0 | |
mmap(0x7204b2c5c000, 8192, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0x52000) = 0x7204b2c5c000 | |
close(3) = 0 | |
openat(AT_FDCWD, "/nix/store/r8zhwq9xylxw8a823kpvqy0kfqq4g52f-nix-2.0pre5968_a6c0b773/lib/libnixmain.so", O_RDONLY|O_CLOEXEC) = 3 | |
read(3, "\177ELF\2\1\1\0\0\0\0\0\0\0\0\0\3\0>\0\1\0\0\0\200\220\0\0\0\0\0\0@\0\0\0\0\0\0\0\200\204\2\0\0\0\0\0\0\0\0\0@\0008\0\10\0@\0\34\0\33\0\1\0\0\0\5\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\362\350\1\0\0\0\0\0\362\350\1\0\0\0\0\0\0\0 \0\0\0\0\0\1\0\0\0\6\0\0\0x\362\1\0\0\0\0\0x\362!\0\0\0\0\0x\362!\0\0\0\0\0\310\r\0\0\0\0\0\0X\22\0\0\0\0\0\0\0\0 \0\0\0\0\0\2\0\0\0\6\0\0\0\240\366\1\0\0\0\0\0\240\366!\0\0\0\0\0\240\366!\0\0\0\0\0@\2\0\0\0\0\0\0@\2\0\0\0\0\0\0\10\0\0\0\0\0\0\0\4\0\0\0\4\0\0\0\0\2\0\0\0\0\0\0\0\2\0\0\0\0\0\0\0\2\0\0\0\0\0\0$\0\0\0\0\0\0\0$\0\0\0\0\0\0\0\4\0\0\0\0\0\0\0P\345td\4\0\0\0\200\300\1\0"..., 832) = 832 | |
fstat(3, {st_mode=S_IFREG|0555, st_size=166784, ...}) = 0 | |
mmap(NULL, 2229456, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) = 0x7204b27e9000 | |
mprotect(0x7204b2808000, 2097152, PROT_NONE) = 0 | |
mmap(0x7204b2a08000, 8192, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0x1f000) = 0x7204b2a08000 | |
close(3) = 0 | |
openat(AT_FDCWD, "/nix/store/r8zhwq9xylxw8a823kpvqy0kfqq4g52f-nix-2.0pre5968_a6c0b773/lib/libnixstore.so", O_RDONLY|O_CLOEXEC) = 3 | |
read(3, "\177ELF\2\1\1\3\0\0\0\0\0\0\0\0\3\0>\0\1\0\0\0000\355\6\0\0\0\0\0@\0\0\0\0\0\0\0\30R$\0\0\0\0\0\0\0\0\0@\0008\0\10\0@\0\34\0\33\0\1\0\0\0\5\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0DX\35\0\0\0\0\0DX\35\0\0\0\0\0\0\0 \0\0\0\0\0\1\0\0\0\6\0\0\0000[\35\0\0\0\0\0000[=\0\0\0\0\0000[=\0\0\0\0\0`\231\0\0\0\0\0\0\320\315\0\0\0\0\0\0\0\0 \0\0\0\0\0\2\0\0\0\6\0\0\0000\266\35\0\0\0\0\0000\266=\0\0\0\0\0000\266=\0\0\0\0\0\300\2\0\0\0\0\0\0\300\2\0\0\0\0\0\0\10\0\0\0\0\0\0\0\4\0\0\0\4\0\0\0\0\2\0\0\0\0\0\0\0\2\0\0\0\0\0\0\0\2\0\0\0\0\0\0$\0\0\0\0\0\0\0$\0\0\0\0\0\0\0\4\0\0\0\0\0\0\0P\345td\4\0\0\0\24K\32\0"..., 832) = 832 | |
fstat(3, {st_mode=S_IFREG|0555, st_size=2382104, ...}) = 0 | |
mmap(NULL, 4073728, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) = 0x7204b2406000 | |
mprotect(0x7204b25dc000, 2093056, PROT_NONE) = 0 | |
mmap(0x7204b27db000, 45056, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0x1d5000) = 0x7204b27db000 | |
mmap(0x7204b27e6000, 10496, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x7204b27e6000 | |
close(3) = 0 | |
openat(AT_FDCWD, "/nix/store/r8zhwq9xylxw8a823kpvqy0kfqq4g52f-nix-2.0pre5968_a6c0b773/lib/libnixutil.so", O_RDONLY|O_CLOEXEC) = 3 | |
read(3, "\177ELF\2\1\1\3\0\0\0\0\0\0\0\0\3\0>\0\1\0\0\0\220\211\2\0\0\0\0\0@\0\0\0\0\0\0\0@n\n\0\0\0\0\0\0\0\0\0@\0008\0\t\0@\0\35\0\34\0\1\0\0\0\5\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\266\4\10\0\0\0\0\0\266\4\10\0\0\0\0\0\0\0 \0\0\0\0\0\1\0\0\0\6\0\0\0P\21\10\0\0\0\0\0P\21(\0\0\0\0\0P\21(\0\0\0\0\0\350.\0\0\0\0\0\0X4\0\0\0\0\0\0\0\0 \0\0\0\0\0\2\0\0\0\6\0\0\0\250'\10\0\0\0\0\0\250'(\0\0\0\0\0\250'(\0\0\0\0\0\200\2\0\0\0\0\0\0\200\2\0\0\0\0\0\0\10\0\0\0\0\0\0\0\4\0\0\0\4\0\0\0008\2\0\0\0\0\0\0008\2\0\0\0\0\0\0008\2\0\0\0\0\0\0$\0\0\0\0\0\0\0$\0\0\0\0\0\0\0\4\0\0\0\0\0\0\0\7\0\0\0\4\0\0\0P\21\10\0"..., 832) = 832 | |
fstat(3, {st_mode=S_IFREG|0555, st_size=685440, ...}) = 0 | |
mmap(NULL, 2639272, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) = 0x7204b2181000 | |
mprotect(0x7204b2202000, 2097152, PROT_NONE) = 0 | |
mmap(0x7204b2402000, 16384, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0x81000) = 0x7204b2402000 | |
close(3) = 0 | |
openat(AT_FDCWD, "/nix/store/r8zhwq9xylxw8a823kpvqy0kfqq4g52f-nix-2.0pre5968_a6c0b773/lib/libnixformat.so", O_RDONLY|O_CLOEXEC) = 3 | |
read(3, "\177ELF\2\1\1\0\0\0\0\0\0\0\0\0\3\0>\0\1\0\0\0\200%\0\0\0\0\0\0@\0\0\0\0\0\0\0x\263\0\0\0\0\0\0\0\0\0\0@\0008\0\10\0@\0\33\0\32\0\1\0\0\0\5\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\v\177\0\0\0\0\0\0\v\177\0\0\0\0\0\0\0\0 \0\0\0\0\0\1\0\0\0\6\0\0\0\370\213\0\0\0\0\0\0\370\213 \0\0\0\0\0\370\213 \0\0\0\0\0\30\4\0\0\0\0\0\0 \4\0\0\0\0\0\0\0\0 \0\0\0\0\0\2\0\0\0\6\0\0\0\10\214\0\0\0\0\0\0\10\214 \0\0\0\0\0\10\214 \0\0\0\0\0\0\2\0\0\0\0\0\0\0\2\0\0\0\0\0\0\10\0\0\0\0\0\0\0\4\0\0\0\4\0\0\0\0\2\0\0\0\0\0\0\0\2\0\0\0\0\0\0\0\2\0\0\0\0\0\0$\0\0\0\0\0\0\0$\0\0\0\0\0\0\0\4\0\0\0\0\0\0\0P\345td\4\0\0\0Ht\0\0"..., 832) = 832 | |
fstat(3, {st_mode=S_IFREG|0555, st_size=47672, ...}) = 0 | |
mmap(NULL, 8192, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) = 0x7204b308e000 | |
mmap(NULL, 2134040, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) = 0x7204b1f77000 | |
mprotect(0x7204b1f7f000, 2097152, PROT_NONE) = 0 | |
mmap(0x7204b217f000, 8192, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0x8000) = 0x7204b217f000 | |
close(3) = 0 | |
openat(AT_FDCWD, "/nix/store/r8zhwq9xylxw8a823kpvqy0kfqq4g52f-nix-2.0pre5968_a6c0b773/lib/libstdc++.so.6", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/kgq1fxb7c84r212kmq4p8zcxyi7fv51r-libsodium-1.0.16/lib/libstdc++.so.6", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/mrphq5k83715mqjlk0vjcr3h0j7zs8ix-bzip2-1.0.6.0.1/lib/libstdc++.so.6", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/2kcrj1ksd2a14bm5sky182fv2xwfhfap-glibc-2.26-131/lib/tls/x86_64/x86_64/libstdc++.so.6", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
stat("/nix/store/2kcrj1ksd2a14bm5sky182fv2xwfhfap-glibc-2.26-131/lib/tls/x86_64/x86_64", 0x7fff8de754f0) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/2kcrj1ksd2a14bm5sky182fv2xwfhfap-glibc-2.26-131/lib/tls/x86_64/libstdc++.so.6", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
stat("/nix/store/2kcrj1ksd2a14bm5sky182fv2xwfhfap-glibc-2.26-131/lib/tls/x86_64", 0x7fff8de754f0) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/2kcrj1ksd2a14bm5sky182fv2xwfhfap-glibc-2.26-131/lib/tls/x86_64/libstdc++.so.6", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
stat("/nix/store/2kcrj1ksd2a14bm5sky182fv2xwfhfap-glibc-2.26-131/lib/tls/x86_64", 0x7fff8de754f0) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/2kcrj1ksd2a14bm5sky182fv2xwfhfap-glibc-2.26-131/lib/tls/libstdc++.so.6", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
stat("/nix/store/2kcrj1ksd2a14bm5sky182fv2xwfhfap-glibc-2.26-131/lib/tls", 0x7fff8de754f0) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/2kcrj1ksd2a14bm5sky182fv2xwfhfap-glibc-2.26-131/lib/x86_64/x86_64/libstdc++.so.6", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
stat("/nix/store/2kcrj1ksd2a14bm5sky182fv2xwfhfap-glibc-2.26-131/lib/x86_64/x86_64", 0x7fff8de754f0) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/2kcrj1ksd2a14bm5sky182fv2xwfhfap-glibc-2.26-131/lib/x86_64/libstdc++.so.6", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
stat("/nix/store/2kcrj1ksd2a14bm5sky182fv2xwfhfap-glibc-2.26-131/lib/x86_64", 0x7fff8de754f0) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/2kcrj1ksd2a14bm5sky182fv2xwfhfap-glibc-2.26-131/lib/x86_64/libstdc++.so.6", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
stat("/nix/store/2kcrj1ksd2a14bm5sky182fv2xwfhfap-glibc-2.26-131/lib/x86_64", 0x7fff8de754f0) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/2kcrj1ksd2a14bm5sky182fv2xwfhfap-glibc-2.26-131/lib/libstdc++.so.6", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
stat("/nix/store/2kcrj1ksd2a14bm5sky182fv2xwfhfap-glibc-2.26-131/lib", {st_mode=S_IFDIR|0555, st_size=83, ...}) = 0 | |
openat(AT_FDCWD, "/nix/store/4zd34747fz0ggzzasy4icgn3lmy89pra-gcc-7.3.0-lib/lib/tls/x86_64/x86_64/libstdc++.so.6", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
stat("/nix/store/4zd34747fz0ggzzasy4icgn3lmy89pra-gcc-7.3.0-lib/lib/tls/x86_64/x86_64", 0x7fff8de754f0) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/4zd34747fz0ggzzasy4icgn3lmy89pra-gcc-7.3.0-lib/lib/tls/x86_64/libstdc++.so.6", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
stat("/nix/store/4zd34747fz0ggzzasy4icgn3lmy89pra-gcc-7.3.0-lib/lib/tls/x86_64", 0x7fff8de754f0) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/4zd34747fz0ggzzasy4icgn3lmy89pra-gcc-7.3.0-lib/lib/tls/x86_64/libstdc++.so.6", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
stat("/nix/store/4zd34747fz0ggzzasy4icgn3lmy89pra-gcc-7.3.0-lib/lib/tls/x86_64", 0x7fff8de754f0) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/4zd34747fz0ggzzasy4icgn3lmy89pra-gcc-7.3.0-lib/lib/tls/libstdc++.so.6", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
stat("/nix/store/4zd34747fz0ggzzasy4icgn3lmy89pra-gcc-7.3.0-lib/lib/tls", 0x7fff8de754f0) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/4zd34747fz0ggzzasy4icgn3lmy89pra-gcc-7.3.0-lib/lib/x86_64/x86_64/libstdc++.so.6", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
stat("/nix/store/4zd34747fz0ggzzasy4icgn3lmy89pra-gcc-7.3.0-lib/lib/x86_64/x86_64", 0x7fff8de754f0) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/4zd34747fz0ggzzasy4icgn3lmy89pra-gcc-7.3.0-lib/lib/x86_64/libstdc++.so.6", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
stat("/nix/store/4zd34747fz0ggzzasy4icgn3lmy89pra-gcc-7.3.0-lib/lib/x86_64", 0x7fff8de754f0) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/4zd34747fz0ggzzasy4icgn3lmy89pra-gcc-7.3.0-lib/lib/x86_64/libstdc++.so.6", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
stat("/nix/store/4zd34747fz0ggzzasy4icgn3lmy89pra-gcc-7.3.0-lib/lib/x86_64", 0x7fff8de754f0) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/4zd34747fz0ggzzasy4icgn3lmy89pra-gcc-7.3.0-lib/lib/libstdc++.so.6", O_RDONLY|O_CLOEXEC) = 3 | |
read(3, "\177ELF\2\1\1\3\0\0\0\0\0\0\0\0\3\0>\0\1\0\0\0@\231\10\0\0\0\0\0@\0\0\0\0\0\0\0\220\302\27\0\0\0\0\0\0\0\0\0@\0008\0\10\0@\0\33\0\32\0\1\0\0\0\5\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\377\26\0\0\0\0\0\0\377\26\0\0\0\0\0\0\0 \0\0\0\0\0\1\0\0\0\6\0\0\0`\t\27\0\0\0\0\0`\t7\0\0\0\0\0`\t7\0\0\0\0\0\30\270\0\0\0\0\0\0\300\354\0\0\0\0\0\0\0\0 \0\0\0\0\0\2\0\0\0\6\0\0\0h\223\27\0\0\0\0\0h\2237\0\0\0\0\0h\2237\0\0\0\0\0 \2\0\0\0\0\0\0 \2\0\0\0\0\0\0\10\0\0\0\0\0\0\0\7\0\0\0\4\0\0\0`\t\27\0\0\0\0\0`\t7\0\0\0\0\0`\t7\0\0\0\0\0\0\0\0\0\0\0\0\0 \0\0\0\0\0\0\0\10\0\0\0\0\0\0\0P\345td\4\0\0\0\370\247\23\0"..., 832) = 832 | |
fstat(3, {st_mode=S_IFREG|0555, st_size=1558864, ...}) = 0 | |
mmap(NULL, 3667488, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) = 0x7204b1bf7000 | |
mprotect(0x7204b1d67000, 2097152, PROT_NONE) = 0 | |
mmap(0x7204b1f67000, 53248, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0x170000) = 0x7204b1f67000 | |
mmap(0x7204b1f74000, 9760, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x7204b1f74000 | |
close(3) = 0 | |
openat(AT_FDCWD, "/nix/store/r8zhwq9xylxw8a823kpvqy0kfqq4g52f-nix-2.0pre5968_a6c0b773/lib/libm.so.6", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/kgq1fxb7c84r212kmq4p8zcxyi7fv51r-libsodium-1.0.16/lib/libm.so.6", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/mrphq5k83715mqjlk0vjcr3h0j7zs8ix-bzip2-1.0.6.0.1/lib/libm.so.6", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/2kcrj1ksd2a14bm5sky182fv2xwfhfap-glibc-2.26-131/lib/libm.so.6", O_RDONLY|O_CLOEXEC) = 3 | |
read(3, "\177ELF\2\1\1\3\0\0\0\0\0\0\0\0\3\0>\0\1\0\0\0\300w\0\0\0\0\0\0@\0\0\0\0\0\0\0008\362\25\0\0\0\0\0\0\0\0\0@\0008\0\10\0@\0\37\0\34\0\1\0\0\0\5\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\200\242\24\0\0\0\0\0\200\242\24\0\0\0\0\0\0\0 \0\0\0\0\0\1\0\0\0\6\0\0\0\210\254\24\0\0\0\0\0\210\2544\0\0\0\0\0\210\2544\0\0\0\0\0\230\5\0\0\0\0\0\0\240\5\0\0\0\0\0\0\0\0 \0\0\0\0\0\2\0\0\0\6\0\0\0\240\254\24\0\0\0\0\0\240\2544\0\0\0\0\0\240\2544\0\0\0\0\0000\2\0\0\0\0\0\0000\2\0\0\0\0\0\0\10\0\0\0\0\0\0\0\4\0\0\0\4\0\0\0\0\2\0\0\0\0\0\0\0\2\0\0\0\0\0\0\0\2\0\0\0\0\0\0D\0\0\0\0\0\0\0D\0\0\0\0\0\0\0\4\0\0\0\0\0\0\0P\345td\4\0\0\0\244\334\23\0"..., 832) = 832 | |
fstat(3, {st_mode=S_IFREG|0555, st_size=1440248, ...}) = 0 | |
mmap(NULL, 3453480, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) = 0x7204b18ab000 | |
mprotect(0x7204b19f6000, 2093056, PROT_NONE) = 0 | |
mmap(0x7204b1bf5000, 8192, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0x14a000) = 0x7204b1bf5000 | |
close(3) = 0 | |
openat(AT_FDCWD, "/nix/store/r8zhwq9xylxw8a823kpvqy0kfqq4g52f-nix-2.0pre5968_a6c0b773/lib/libgcc_s.so.1", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/kgq1fxb7c84r212kmq4p8zcxyi7fv51r-libsodium-1.0.16/lib/libgcc_s.so.1", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/mrphq5k83715mqjlk0vjcr3h0j7zs8ix-bzip2-1.0.6.0.1/lib/libgcc_s.so.1", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/2kcrj1ksd2a14bm5sky182fv2xwfhfap-glibc-2.26-131/lib/libgcc_s.so.1", O_RDONLY|O_CLOEXEC) = 3 | |
read(3, "\177ELF\2\1\1\0\0\0\0\0\0\0\0\0\3\0>\0\1\0\0\0\20+\0\0\0\0\0\0@\0\0\0\0\0\0\0\300\201\1\0\0\0\0\0\0\0\0\0@\0008\0\6\0@\0\35\0\32\0\1\0\0\0\5\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\fS\1\0\0\0\0\0\fS\1\0\0\0\0\0\0\0 \0\0\0\0\0\1\0\0\0\6\0\0\0\20S\1\0\0\0\0\0\20S!\0\0\0\0\0\20S!\0\0\0\0\0\320\3\0\0\0\0\0\0p\6\0\0\0\0\0\0\0\0 \0\0\0\0\0\2\0\0\0\6\0\0\0000S\1\0\0\0\0\0000S!\0\0\0\0\0000S!\0\0\0\0\0\0\2\0\0\0\0\0\0\0\2\0\0\0\0\0\0\10\0\0\0\0\0\0\0P\345td\4\0\0\00043\1\0\0\0\0\00043\1\0\0\0\0\00043\1\0\0\0\0\0D\5\0\0\0\0\0\0D\5\0\0\0\0\0\0\4\0\0\0\0\0\0\0Q\345td\6\0\0\0\0\0\0\0"..., 832) = 832 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=100608, ...}) = 0 | |
mmap(NULL, 2185600, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) = 0x7204b1695000 | |
mprotect(0x7204b16ab000, 2093056, PROT_NONE) = 0 | |
mmap(0x7204b18aa000, 4096, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0x15000) = 0x7204b18aa000 | |
close(3) = 0 | |
openat(AT_FDCWD, "/nix/store/r8zhwq9xylxw8a823kpvqy0kfqq4g52f-nix-2.0pre5968_a6c0b773/lib/libpthread.so.0", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/kgq1fxb7c84r212kmq4p8zcxyi7fv51r-libsodium-1.0.16/lib/libpthread.so.0", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/mrphq5k83715mqjlk0vjcr3h0j7zs8ix-bzip2-1.0.6.0.1/lib/libpthread.so.0", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/2kcrj1ksd2a14bm5sky182fv2xwfhfap-glibc-2.26-131/lib/libpthread.so.0", O_RDONLY|O_CLOEXEC) = 3 | |
read(3, "\177ELF\2\1\1\0\0\0\0\0\0\0\0\0\3\0>\0\1\0\0\0p_\0\0\0\0\0\0@\0\0\0\0\0\0\0\240\16\2\0\0\0\0\0\0\0\0\0@\0008\0\n\0@\0%\0\"\0\6\0\0\0\5\0\0\0@\0\0\0\0\0\0\0@\0\0\0\0\0\0\0@\0\0\0\0\0\0\0000\2\0\0\0\0\0\0000\2\0\0\0\0\0\0\10\0\0\0\0\0\0\0\3\0\0\0\4\0\0\0\340@\1\0\0\0\0\0\340@\1\0\0\0\0\0\340@\1\0\0\0\0\0T\0\0\0\0\0\0\0T\0\0\0\0\0\0\0 \0\0\0\0\0\0\0\1\0\0\0\5\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0P\210\1\0\0\0\0\0P\210\1\0\0\0\0\0\0\0 \0\0\0\0\0\1\0\0\0\6\0\0\0008\211\1\0\0\0\0\0008\211!\0\0\0\0\0008\211!\0\0\0\0\0\30\7\0\0\0\0\0\0\260H\0\0\0\0\0\0\0\0 \0\0\0\0\0\2\0\0\0\6\0\0\0\20\213\1\0"..., 832) = 832 | |
fstat(3, {st_mode=S_IFREG|0555, st_size=137184, ...}) = 0 | |
mmap(NULL, 2216424, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) = 0x7204b1477000 | |
mprotect(0x7204b1490000, 2093056, PROT_NONE) = 0 | |
mmap(0x7204b168f000, 8192, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0x18000) = 0x7204b168f000 | |
mmap(0x7204b1691000, 12776, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x7204b1691000 | |
close(3) = 0 | |
openat(AT_FDCWD, "/nix/store/r8zhwq9xylxw8a823kpvqy0kfqq4g52f-nix-2.0pre5968_a6c0b773/lib/libc.so.6", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/kgq1fxb7c84r212kmq4p8zcxyi7fv51r-libsodium-1.0.16/lib/libc.so.6", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/mrphq5k83715mqjlk0vjcr3h0j7zs8ix-bzip2-1.0.6.0.1/lib/libc.so.6", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/2kcrj1ksd2a14bm5sky182fv2xwfhfap-glibc-2.26-131/lib/libc.so.6", O_RDONLY|O_CLOEXEC) = 3 | |
read(3, "\177ELF\2\1\1\3\0\0\0\0\0\0\0\0\3\0>\0\1\0\0\0@\21\2\0\0\0\0\0@\0\0\0\0\0\0\0Xn\36\0\0\0\0\0\0\0\0\0@\0008\0\v\0@\0H\0E\0\6\0\0\0\5\0\0\0@\0\0\0\0\0\0\0@\0\0\0\0\0\0\0@\0\0\0\0\0\0\0h\2\0\0\0\0\0\0h\2\0\0\0\0\0\0\10\0\0\0\0\0\0\0\3\0\0\0\4\0\0\0@\270\27\0\0\0\0\0@\270\27\0\0\0\0\0@\270\27\0\0\0\0\0T\0\0\0\0\0\0\0T\0\0\0\0\0\0\0 \0\0\0\0\0\0\0\1\0\0\0\5\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\204\204\32\0\0\0\0\0\204\204\32\0\0\0\0\0\0\0 \0\0\0\0\0\1\0\0\0\6\0\0\0\30\206\32\0\0\0\0\0\30\206:\0\0\0\0\0\30\206:\0\0\0\0\0\250P\0\0\0\0\0\0\350\222\0\0\0\0\0\0\0\0 \0\0\0\0\0\2\0\0\0\6\0\0\0\0\272\32\0"..., 832) = 832 | |
fstat(3, {st_mode=S_IFREG|0555, st_size=1998936, ...}) = 0 | |
mmap(NULL, 3873024, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) = 0x7204b10c5000 | |
mprotect(0x7204b126e000, 2093056, PROT_NONE) = 0 | |
mmap(0x7204b146d000, 24576, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0x1a8000) = 0x7204b146d000 | |
mmap(0x7204b1473000, 14592, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x7204b1473000 | |
close(3) = 0 | |
mmap(NULL, 8192, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) = 0x7204b308c000 | |
openat(AT_FDCWD, "/nix/store/r8zhwq9xylxw8a823kpvqy0kfqq4g52f-nix-2.0pre5968_a6c0b773/lib/libcrypto.so.1.0.0", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/dl1hzcnxnbbcpf6zdhan58fghvdg3in8-openssl-1.0.2n/lib/tls/x86_64/x86_64/libcrypto.so.1.0.0", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
stat("/nix/store/dl1hzcnxnbbcpf6zdhan58fghvdg3in8-openssl-1.0.2n/lib/tls/x86_64/x86_64", 0x7fff8de75090) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/dl1hzcnxnbbcpf6zdhan58fghvdg3in8-openssl-1.0.2n/lib/tls/x86_64/libcrypto.so.1.0.0", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
stat("/nix/store/dl1hzcnxnbbcpf6zdhan58fghvdg3in8-openssl-1.0.2n/lib/tls/x86_64", 0x7fff8de75090) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/dl1hzcnxnbbcpf6zdhan58fghvdg3in8-openssl-1.0.2n/lib/tls/x86_64/libcrypto.so.1.0.0", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
stat("/nix/store/dl1hzcnxnbbcpf6zdhan58fghvdg3in8-openssl-1.0.2n/lib/tls/x86_64", 0x7fff8de75090) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/dl1hzcnxnbbcpf6zdhan58fghvdg3in8-openssl-1.0.2n/lib/tls/libcrypto.so.1.0.0", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
stat("/nix/store/dl1hzcnxnbbcpf6zdhan58fghvdg3in8-openssl-1.0.2n/lib/tls", 0x7fff8de75090) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/dl1hzcnxnbbcpf6zdhan58fghvdg3in8-openssl-1.0.2n/lib/x86_64/x86_64/libcrypto.so.1.0.0", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
stat("/nix/store/dl1hzcnxnbbcpf6zdhan58fghvdg3in8-openssl-1.0.2n/lib/x86_64/x86_64", 0x7fff8de75090) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/dl1hzcnxnbbcpf6zdhan58fghvdg3in8-openssl-1.0.2n/lib/x86_64/libcrypto.so.1.0.0", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
stat("/nix/store/dl1hzcnxnbbcpf6zdhan58fghvdg3in8-openssl-1.0.2n/lib/x86_64", 0x7fff8de75090) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/dl1hzcnxnbbcpf6zdhan58fghvdg3in8-openssl-1.0.2n/lib/x86_64/libcrypto.so.1.0.0", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
stat("/nix/store/dl1hzcnxnbbcpf6zdhan58fghvdg3in8-openssl-1.0.2n/lib/x86_64", 0x7fff8de75090) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/dl1hzcnxnbbcpf6zdhan58fghvdg3in8-openssl-1.0.2n/lib/libcrypto.so.1.0.0", O_RDONLY|O_CLOEXEC) = 3 | |
read(3, "\177ELF\2\1\1\0\0\0\0\0\0\0\0\0\3\0>\0\1\0\0\0\0|\6\0\0\0\0\0@\0\0\0\0\0\0\0p\177'\0\0\0\0\0\0\0\0\0@\0008\0\10\0@\0\33\0\32\0\1\0\0\0\5\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\314\20!\0\0\0\0\0\314\20!\0\0\0\0\0\0\0 \0\0\0\0\0\1\0\0\0\6\0\0\0\20\35!\0\0\0\0\0\20\35A\0\0\0\0\0\20\35A\0\0\0\0\0qa\2\0\0\0\0\0\20\231\2\0\0\0\0\0\0\0 \0\0\0\0\0\2\0\0\0\6\0\0\0P\312\"\0\0\0\0\0P\312B\0\0\0\0\0P\312B\0\0\0\0\0\360\1\0\0\0\0\0\0\360\1\0\0\0\0\0\0\10\0\0\0\0\0\0\0\4\0\0\0\4\0\0\0\0\2\0\0\0\0\0\0\0\2\0\0\0\0\0\0\0\2\0\0\0\0\0\0$\0\0\0\0\0\0\0$\0\0\0\0\0\0\0\4\0\0\0\0\0\0\0P\345td\4\0\0\0\270[\35\0"..., 832) = 832 | |
fstat(3, {st_mode=S_IFREG|0555, st_size=2590256, ...}) = 0 | |
mmap(NULL, 4437536, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) = 0x7204b0c89000 | |
mprotect(0x7204b0e9b000, 2093056, PROT_NONE) = 0 | |
mmap(0x7204b109a000, 159744, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0x211000) = 0x7204b109a000 | |
mmap(0x7204b10c1000, 13856, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x7204b10c1000 | |
close(3) = 0 | |
openat(AT_FDCWD, "/nix/store/r8zhwq9xylxw8a823kpvqy0kfqq4g52f-nix-2.0pre5968_a6c0b773/lib/libsqlite3.so.0", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/3v6sf9l1fwbb1phq9ccm71096d44k489-sqlite-3.21.0/lib/tls/x86_64/x86_64/libsqlite3.so.0", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
stat("/nix/store/3v6sf9l1fwbb1phq9ccm71096d44k489-sqlite-3.21.0/lib/tls/x86_64/x86_64", 0x7fff8de74ef0) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/3v6sf9l1fwbb1phq9ccm71096d44k489-sqlite-3.21.0/lib/tls/x86_64/libsqlite3.so.0", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
stat("/nix/store/3v6sf9l1fwbb1phq9ccm71096d44k489-sqlite-3.21.0/lib/tls/x86_64", 0x7fff8de74ef0) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/3v6sf9l1fwbb1phq9ccm71096d44k489-sqlite-3.21.0/lib/tls/x86_64/libsqlite3.so.0", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
stat("/nix/store/3v6sf9l1fwbb1phq9ccm71096d44k489-sqlite-3.21.0/lib/tls/x86_64", 0x7fff8de74ef0) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/3v6sf9l1fwbb1phq9ccm71096d44k489-sqlite-3.21.0/lib/tls/libsqlite3.so.0", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
stat("/nix/store/3v6sf9l1fwbb1phq9ccm71096d44k489-sqlite-3.21.0/lib/tls", 0x7fff8de74ef0) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/3v6sf9l1fwbb1phq9ccm71096d44k489-sqlite-3.21.0/lib/x86_64/x86_64/libsqlite3.so.0", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
stat("/nix/store/3v6sf9l1fwbb1phq9ccm71096d44k489-sqlite-3.21.0/lib/x86_64/x86_64", 0x7fff8de74ef0) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/3v6sf9l1fwbb1phq9ccm71096d44k489-sqlite-3.21.0/lib/x86_64/libsqlite3.so.0", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
stat("/nix/store/3v6sf9l1fwbb1phq9ccm71096d44k489-sqlite-3.21.0/lib/x86_64", 0x7fff8de74ef0) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/3v6sf9l1fwbb1phq9ccm71096d44k489-sqlite-3.21.0/lib/x86_64/libsqlite3.so.0", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
stat("/nix/store/3v6sf9l1fwbb1phq9ccm71096d44k489-sqlite-3.21.0/lib/x86_64", 0x7fff8de74ef0) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/3v6sf9l1fwbb1phq9ccm71096d44k489-sqlite-3.21.0/lib/libsqlite3.so.0", O_RDONLY|O_CLOEXEC) = 3 | |
read(3, "\177ELF\2\1\1\0\0\0\0\0\0\0\0\0\3\0>\0\1\0\0\0p\321\0\0\0\0\0\0@\0\0\0\0\0\0\0008K\21\0\0\0\0\0\0\0\0\0@\0008\0\10\0@\0\33\0\32\0\1\0\0\0\5\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\334\216\17\0\0\0\0\0\334\216\17\0\0\0\0\0\0\0 \0\0\0\0\0\1\0\0\0\6\0\0\0P\224\17\0\0\0\0\0P\224/\0\0\0\0\0P\224/\0\0\0\0\0hH\0\0\0\0\0\0\310O\0\0\0\0\0\0\0\0 \0\0\0\0\0\2\0\0\0\6\0\0\0\360\267\17\0\0\0\0\0\360\267/\0\0\0\0\0\360\267/\0\0\0\0\0\0\2\0\0\0\0\0\0\0\2\0\0\0\0\0\0\10\0\0\0\0\0\0\0\4\0\0\0\4\0\0\0\0\2\0\0\0\0\0\0\0\2\0\0\0\0\0\0\0\2\0\0\0\0\0\0$\0\0\0\0\0\0\0$\0\0\0\0\0\0\0\4\0\0\0\0\0\0\0P\345td\4\0\0\0P\276\r\0"..., 832) = 832 | |
fstat(3, {st_mode=S_IFREG|0555, st_size=1135096, ...}) = 0 | |
mmap(NULL, 3138584, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) = 0x7204b098a000 | |
mprotect(0x7204b0a83000, 2097152, PROT_NONE) = 0 | |
mmap(0x7204b0c83000, 20480, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0xf9000) = 0x7204b0c83000 | |
mmap(0x7204b0c88000, 1048, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x7204b0c88000 | |
close(3) = 0 | |
openat(AT_FDCWD, "/nix/store/r8zhwq9xylxw8a823kpvqy0kfqq4g52f-nix-2.0pre5968_a6c0b773/lib/libcurl.so.4", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/3v6sf9l1fwbb1phq9ccm71096d44k489-sqlite-3.21.0/lib/libcurl.so.4", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/lha30sclfhw3r77hsknjfcawqafb94xi-curl-7.58.0/lib/tls/x86_64/x86_64/libcurl.so.4", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
stat("/nix/store/lha30sclfhw3r77hsknjfcawqafb94xi-curl-7.58.0/lib/tls/x86_64/x86_64", 0x7fff8de74ec0) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/lha30sclfhw3r77hsknjfcawqafb94xi-curl-7.58.0/lib/tls/x86_64/libcurl.so.4", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
stat("/nix/store/lha30sclfhw3r77hsknjfcawqafb94xi-curl-7.58.0/lib/tls/x86_64", 0x7fff8de74ec0) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/lha30sclfhw3r77hsknjfcawqafb94xi-curl-7.58.0/lib/tls/x86_64/libcurl.so.4", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
stat("/nix/store/lha30sclfhw3r77hsknjfcawqafb94xi-curl-7.58.0/lib/tls/x86_64", 0x7fff8de74ec0) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/lha30sclfhw3r77hsknjfcawqafb94xi-curl-7.58.0/lib/tls/libcurl.so.4", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
stat("/nix/store/lha30sclfhw3r77hsknjfcawqafb94xi-curl-7.58.0/lib/tls", 0x7fff8de74ec0) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/lha30sclfhw3r77hsknjfcawqafb94xi-curl-7.58.0/lib/x86_64/x86_64/libcurl.so.4", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
stat("/nix/store/lha30sclfhw3r77hsknjfcawqafb94xi-curl-7.58.0/lib/x86_64/x86_64", 0x7fff8de74ec0) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/lha30sclfhw3r77hsknjfcawqafb94xi-curl-7.58.0/lib/x86_64/libcurl.so.4", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
stat("/nix/store/lha30sclfhw3r77hsknjfcawqafb94xi-curl-7.58.0/lib/x86_64", 0x7fff8de74ec0) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/lha30sclfhw3r77hsknjfcawqafb94xi-curl-7.58.0/lib/x86_64/libcurl.so.4", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
stat("/nix/store/lha30sclfhw3r77hsknjfcawqafb94xi-curl-7.58.0/lib/x86_64", 0x7fff8de74ec0) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/lha30sclfhw3r77hsknjfcawqafb94xi-curl-7.58.0/lib/libcurl.so.4", O_RDONLY|O_CLOEXEC) = 3 | |
read(3, "\177ELF\2\1\1\0\0\0\0\0\0\0\0\0\3\0>\0\1\0\0\0 \307\0\0\0\0\0\0@\0\0\0\0\0\0\0(;\t\0\0\0\0\0\0\0\0\0@\0008\0\10\0@\0\33\0\32\0\1\0\0\0\5\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\344\r\10\0\0\0\0\0\344\r\10\0\0\0\0\0\0\0 \0\0\0\0\0\1\0\0\0\6\0\0\0P\25\10\0\0\0\0\0P\25(\0\0\0\0\0P\25(\0\0\0\0\0H,\0\0\0\0\0\0X0\0\0\0\0\0\0\0\0 \0\0\0\0\0\2\0\0\0\6\0\0\0\200/\10\0\0\0\0\0\200/(\0\0\0\0\0\200/(\0\0\0\0\0p\2\0\0\0\0\0\0p\2\0\0\0\0\0\0\10\0\0\0\0\0\0\0\4\0\0\0\4\0\0\0\0\2\0\0\0\0\0\0\0\2\0\0\0\0\0\0\0\2\0\0\0\0\0\0$\0\0\0\0\0\0\0$\0\0\0\0\0\0\0\4\0\0\0\0\0\0\0P\345td\4\0\0\0t/\7\0"..., 832) = 832 | |
fstat(3, {st_mode=S_IFREG|0555, st_size=606696, ...}) = 0 | |
mmap(NULL, 2639272, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) = 0x7204b0705000 | |
mprotect(0x7204b0786000, 2097152, PROT_NONE) = 0 | |
mmap(0x7204b0986000, 16384, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0x81000) = 0x7204b0986000 | |
close(3) = 0 | |
openat(AT_FDCWD, "/nix/store/r8zhwq9xylxw8a823kpvqy0kfqq4g52f-nix-2.0pre5968_a6c0b773/lib/libdl.so.2", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/3v6sf9l1fwbb1phq9ccm71096d44k489-sqlite-3.21.0/lib/libdl.so.2", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/lha30sclfhw3r77hsknjfcawqafb94xi-curl-7.58.0/lib/libdl.so.2", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/kgq1fxb7c84r212kmq4p8zcxyi7fv51r-libsodium-1.0.16/lib/libdl.so.2", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/mrphq5k83715mqjlk0vjcr3h0j7zs8ix-bzip2-1.0.6.0.1/lib/libdl.so.2", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/2gxzfkyl05040p97f7lzilv7yx3jj3v7-libseccomp-2.3.3/lib/tls/x86_64/x86_64/libdl.so.2", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
stat("/nix/store/2gxzfkyl05040p97f7lzilv7yx3jj3v7-libseccomp-2.3.3/lib/tls/x86_64/x86_64", 0x7fff8de74e90) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/2gxzfkyl05040p97f7lzilv7yx3jj3v7-libseccomp-2.3.3/lib/tls/x86_64/libdl.so.2", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
stat("/nix/store/2gxzfkyl05040p97f7lzilv7yx3jj3v7-libseccomp-2.3.3/lib/tls/x86_64", 0x7fff8de74e90) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/2gxzfkyl05040p97f7lzilv7yx3jj3v7-libseccomp-2.3.3/lib/tls/x86_64/libdl.so.2", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
stat("/nix/store/2gxzfkyl05040p97f7lzilv7yx3jj3v7-libseccomp-2.3.3/lib/tls/x86_64", 0x7fff8de74e90) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/2gxzfkyl05040p97f7lzilv7yx3jj3v7-libseccomp-2.3.3/lib/tls/libdl.so.2", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
stat("/nix/store/2gxzfkyl05040p97f7lzilv7yx3jj3v7-libseccomp-2.3.3/lib/tls", 0x7fff8de74e90) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/2gxzfkyl05040p97f7lzilv7yx3jj3v7-libseccomp-2.3.3/lib/x86_64/x86_64/libdl.so.2", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
stat("/nix/store/2gxzfkyl05040p97f7lzilv7yx3jj3v7-libseccomp-2.3.3/lib/x86_64/x86_64", 0x7fff8de74e90) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/2gxzfkyl05040p97f7lzilv7yx3jj3v7-libseccomp-2.3.3/lib/x86_64/libdl.so.2", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
stat("/nix/store/2gxzfkyl05040p97f7lzilv7yx3jj3v7-libseccomp-2.3.3/lib/x86_64", 0x7fff8de74e90) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/2gxzfkyl05040p97f7lzilv7yx3jj3v7-libseccomp-2.3.3/lib/x86_64/libdl.so.2", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
stat("/nix/store/2gxzfkyl05040p97f7lzilv7yx3jj3v7-libseccomp-2.3.3/lib/x86_64", 0x7fff8de74e90) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/2gxzfkyl05040p97f7lzilv7yx3jj3v7-libseccomp-2.3.3/lib/libdl.so.2", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
stat("/nix/store/2gxzfkyl05040p97f7lzilv7yx3jj3v7-libseccomp-2.3.3/lib", {st_mode=S_IFDIR|0555, st_size=7, ...}) = 0 | |
openat(AT_FDCWD, "/nix/store/jhpzzb3xmxkapqvg9pnsx51psfnfawi0-aws-sdk-cpp-1.3.22/lib/tls/x86_64/x86_64/libdl.so.2", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
stat("/nix/store/jhpzzb3xmxkapqvg9pnsx51psfnfawi0-aws-sdk-cpp-1.3.22/lib/tls/x86_64/x86_64", 0x7fff8de74e90) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/jhpzzb3xmxkapqvg9pnsx51psfnfawi0-aws-sdk-cpp-1.3.22/lib/tls/x86_64/libdl.so.2", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
stat("/nix/store/jhpzzb3xmxkapqvg9pnsx51psfnfawi0-aws-sdk-cpp-1.3.22/lib/tls/x86_64", 0x7fff8de74e90) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/jhpzzb3xmxkapqvg9pnsx51psfnfawi0-aws-sdk-cpp-1.3.22/lib/tls/x86_64/libdl.so.2", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
stat("/nix/store/jhpzzb3xmxkapqvg9pnsx51psfnfawi0-aws-sdk-cpp-1.3.22/lib/tls/x86_64", 0x7fff8de74e90) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/jhpzzb3xmxkapqvg9pnsx51psfnfawi0-aws-sdk-cpp-1.3.22/lib/tls/libdl.so.2", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
stat("/nix/store/jhpzzb3xmxkapqvg9pnsx51psfnfawi0-aws-sdk-cpp-1.3.22/lib/tls", 0x7fff8de74e90) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/jhpzzb3xmxkapqvg9pnsx51psfnfawi0-aws-sdk-cpp-1.3.22/lib/x86_64/x86_64/libdl.so.2", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
stat("/nix/store/jhpzzb3xmxkapqvg9pnsx51psfnfawi0-aws-sdk-cpp-1.3.22/lib/x86_64/x86_64", 0x7fff8de74e90) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/jhpzzb3xmxkapqvg9pnsx51psfnfawi0-aws-sdk-cpp-1.3.22/lib/x86_64/libdl.so.2", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
stat("/nix/store/jhpzzb3xmxkapqvg9pnsx51psfnfawi0-aws-sdk-cpp-1.3.22/lib/x86_64", 0x7fff8de74e90) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/jhpzzb3xmxkapqvg9pnsx51psfnfawi0-aws-sdk-cpp-1.3.22/lib/x86_64/libdl.so.2", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
stat("/nix/store/jhpzzb3xmxkapqvg9pnsx51psfnfawi0-aws-sdk-cpp-1.3.22/lib/x86_64", 0x7fff8de74e90) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/jhpzzb3xmxkapqvg9pnsx51psfnfawi0-aws-sdk-cpp-1.3.22/lib/libdl.so.2", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
stat("/nix/store/jhpzzb3xmxkapqvg9pnsx51psfnfawi0-aws-sdk-cpp-1.3.22/lib", {st_mode=S_IFDIR|0555, st_size=4, ...}) = 0 | |
openat(AT_FDCWD, "/nix/store/2kcrj1ksd2a14bm5sky182fv2xwfhfap-glibc-2.26-131/lib/libdl.so.2", O_RDONLY|O_CLOEXEC) = 3 | |
read(3, "\177ELF\2\1\1\0\0\0\0\0\0\0\0\0\3\0>\0\1\0\0\0\0\16\0\0\0\0\0\0@\0\0\0\0\0\0\0\340@\0\0\0\0\0\0\0\0\0\0@\0008\0\10\0@\0\36\0\33\0\1\0\0\0\5\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0t \0\0\0\0\0\0t \0\0\0\0\0\0\0\0 \0\0\0\0\0\1\0\0\0\6\0\0\0\370,\0\0\0\0\0\0\370, \0\0\0\0\0\370, \0\0\0\0\0\20\3\0\0\0\0\0\0\230\3\0\0\0\0\0\0\0\0 \0\0\0\0\0\2\0\0\0\6\0\0\0 -\0\0\0\0\0\0 - \0\0\0\0\0 - \0\0\0\0\0\0\2\0\0\0\0\0\0\0\2\0\0\0\0\0\0\10\0\0\0\0\0\0\0\4\0\0\0\4\0\0\0\0\2\0\0\0\0\0\0\0\2\0\0\0\0\0\0\0\2\0\0\0\0\0\0D\0\0\0\0\0\0\0D\0\0\0\0\0\0\0\4\0\0\0\0\0\0\0P\345td\4\0\0\0`\32\0\0"..., 832) = 832 | |
fstat(3, {st_mode=S_IFREG|0555, st_size=18528, ...}) = 0 | |
mmap(NULL, 2109584, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) = 0x7204b0501000 | |
mprotect(0x7204b0504000, 2093056, PROT_NONE) = 0 | |
mmap(0x7204b0703000, 8192, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0x2000) = 0x7204b0703000 | |
close(3) = 0 | |
openat(AT_FDCWD, "/nix/store/r8zhwq9xylxw8a823kpvqy0kfqq4g52f-nix-2.0pre5968_a6c0b773/lib/libaws-cpp-sdk-s3.so", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/3v6sf9l1fwbb1phq9ccm71096d44k489-sqlite-3.21.0/lib/libaws-cpp-sdk-s3.so", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/lha30sclfhw3r77hsknjfcawqafb94xi-curl-7.58.0/lib/libaws-cpp-sdk-s3.so", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/kgq1fxb7c84r212kmq4p8zcxyi7fv51r-libsodium-1.0.16/lib/libaws-cpp-sdk-s3.so", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/mrphq5k83715mqjlk0vjcr3h0j7zs8ix-bzip2-1.0.6.0.1/lib/libaws-cpp-sdk-s3.so", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/2gxzfkyl05040p97f7lzilv7yx3jj3v7-libseccomp-2.3.3/lib/libaws-cpp-sdk-s3.so", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/jhpzzb3xmxkapqvg9pnsx51psfnfawi0-aws-sdk-cpp-1.3.22/lib/libaws-cpp-sdk-s3.so", O_RDONLY|O_CLOEXEC) = 3 | |
read(3, "\177ELF\2\1\1\0\0\0\0\0\0\0\0\0\3\0>\0\1\0\0\0\300R\n\0\0\0\0\0@\0\0\0\0\0\0\0(\0029\0\0\0\0\0\0\0\0\0@\0008\0\10\0@\0\33\0\32\0\1\0\0\0\5\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0004\237!\0\0\0\0\0004\237!\0\0\0\0\0\0\0 \0\0\0\0\0\1\0\0\0\6\0\0\0p\250!\0\0\0\0\0p\250A\0\0\0\0\0p\250A\0\0\0\0\0\240\27\1\0\0\0\0\0\370\32\1\0\0\0\0\0\0\0 \0\0\0\0\0\2\0\0\0\6\0\0\0\310\224\"\0\0\0\0\0\310\224B\0\0\0\0\0\310\224B\0\0\0\0\0p\2\0\0\0\0\0\0p\2\0\0\0\0\0\0\10\0\0\0\0\0\0\0\4\0\0\0\4\0\0\0\0\2\0\0\0\0\0\0\0\2\0\0\0\0\0\0\0\2\0\0\0\0\0\0$\0\0\0\0\0\0\0$\0\0\0\0\0\0\0\4\0\0\0\0\0\0\0P\345td\4\0\0\0`\237\36\0"..., 832) = 832 | |
fstat(3, {st_mode=S_IFREG|0555, st_size=3737832, ...}) = 0 | |
mmap(NULL, 8192, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) = 0x7204b308a000 | |
mmap(NULL, 4375400, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) = 0x7204b00d4000 | |
mprotect(0x7204b02ee000, 2097152, PROT_NONE) = 0 | |
mmap(0x7204b04ee000, 77824, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0x21a000) = 0x7204b04ee000 | |
close(3) = 0 | |
openat(AT_FDCWD, "/nix/store/r8zhwq9xylxw8a823kpvqy0kfqq4g52f-nix-2.0pre5968_a6c0b773/lib/libaws-cpp-sdk-core.so", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/3v6sf9l1fwbb1phq9ccm71096d44k489-sqlite-3.21.0/lib/libaws-cpp-sdk-core.so", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/lha30sclfhw3r77hsknjfcawqafb94xi-curl-7.58.0/lib/libaws-cpp-sdk-core.so", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/kgq1fxb7c84r212kmq4p8zcxyi7fv51r-libsodium-1.0.16/lib/libaws-cpp-sdk-core.so", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/mrphq5k83715mqjlk0vjcr3h0j7zs8ix-bzip2-1.0.6.0.1/lib/libaws-cpp-sdk-core.so", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/2gxzfkyl05040p97f7lzilv7yx3jj3v7-libseccomp-2.3.3/lib/libaws-cpp-sdk-core.so", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/jhpzzb3xmxkapqvg9pnsx51psfnfawi0-aws-sdk-cpp-1.3.22/lib/libaws-cpp-sdk-core.so", O_RDONLY|O_CLOEXEC) = 3 | |
read(3, "\177ELF\2\1\1\0\0\0\0\0\0\0\0\0\3\0>\0\1\0\0\0p\5\5\0\0\0\0\0@\0\0\0\0\0\0\0\370\321\22\0\0\0\0\0\0\0\0\0@\0008\0\10\0@\0\33\0\32\0\1\0\0\0\5\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\244m\16\0\0\0\0\0\244m\16\0\0\0\0\0\0\0 \0\0\0\0\0\1\0\0\0\6\0\0\0x|\16\0\0\0\0\0x|.\0\0\0\0\0x|.\0\0\0\0\0He\0\0\0\0\0\0\300h\0\0\0\0\0\0\0\0 \0\0\0\0\0\2\0\0\0\6\0\0\0\210\272\16\0\0\0\0\0\210\272.\0\0\0\0\0\210\272.\0\0\0\0\0P\2\0\0\0\0\0\0P\2\0\0\0\0\0\0\10\0\0\0\0\0\0\0\4\0\0\0\4\0\0\0\0\2\0\0\0\0\0\0\0\2\0\0\0\0\0\0\0\2\0\0\0\0\0\0$\0\0\0\0\0\0\0$\0\0\0\0\0\0\0\4\0\0\0\0\0\0\0P\345td\4\0\0\0\320\r\r\0"..., 832) = 832 | |
fstat(3, {st_mode=S_IFREG|0555, st_size=1235128, ...}) = 0 | |
mmap(NULL, 3073336, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) = 0x7204afde5000 | |
mprotect(0x7204afecc000, 2097152, PROT_NONE) = 0 | |
mmap(0x7204b00cc000, 32768, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0xe7000) = 0x7204b00cc000 | |
close(3) = 0 | |
openat(AT_FDCWD, "/nix/store/r8zhwq9xylxw8a823kpvqy0kfqq4g52f-nix-2.0pre5968_a6c0b773/lib/libseccomp.so.2", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/3v6sf9l1fwbb1phq9ccm71096d44k489-sqlite-3.21.0/lib/libseccomp.so.2", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/lha30sclfhw3r77hsknjfcawqafb94xi-curl-7.58.0/lib/libseccomp.so.2", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/kgq1fxb7c84r212kmq4p8zcxyi7fv51r-libsodium-1.0.16/lib/libseccomp.so.2", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/mrphq5k83715mqjlk0vjcr3h0j7zs8ix-bzip2-1.0.6.0.1/lib/libseccomp.so.2", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/2gxzfkyl05040p97f7lzilv7yx3jj3v7-libseccomp-2.3.3/lib/libseccomp.so.2", O_RDONLY|O_CLOEXEC) = 3 | |
read(3, "\177ELF\2\1\1\0\0\0\0\0\0\0\0\0\3\0>\0\1\0\0\0\360\372\1\0\0\0\0\0@\0\0\0\0\0\0\00088\4\0\0\0\0\0\0\0\0\0@\0008\0\7\0@\0\32\0\31\0\1\0\0\0\5\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0t\274\2\0\0\0\0\0t\274\2\0\0\0\0\0\0\0 \0\0\0\0\0\1\0\0\0\6\0\0\0\260\303\2\0\0\0\0\0\260\303\"\0\0\0\0\0\260\303\"\0\0\0\0\0hL\1\0\0\0\0\0pL\1\0\0\0\0\0\0\0 \0\0\0\0\0\2\0\0\0\6\0\0\0000\r\4\0\0\0\0\0000\r$\0\0\0\0\0000\r$\0\0\0\0\0\320\1\0\0\0\0\0\0\320\1\0\0\0\0\0\0\10\0\0\0\0\0\0\0P\345td\4\0\0\0P\236\2\0\0\0\0\0P\236\2\0\0\0\0\0P\236\2\0\0\0\0\0|\4\0\0\0\0\0\0|\4\0\0\0\0\0\0\4\0\0\0\0\0\0\0Q\345td\6\0\0\0\0\0\0\0"..., 832) = 832 | |
fstat(3, {st_mode=S_IFREG|0555, st_size=278200, ...}) = 0 | |
mmap(NULL, 2363424, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) = 0x7204afba3000 | |
mprotect(0x7204afbcf000, 2097152, PROT_NONE) = 0 | |
mmap(0x7204afdcf000, 90112, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0x2c000) = 0x7204afdcf000 | |
close(3) = 0 | |
openat(AT_FDCWD, "/nix/store/r8zhwq9xylxw8a823kpvqy0kfqq4g52f-nix-2.0pre5968_a6c0b773/lib/liblzma.so.5", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/chf54cl12ifswf6swh7kxpif477drihi-xz-5.2.3/lib/tls/x86_64/x86_64/liblzma.so.5", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
stat("/nix/store/chf54cl12ifswf6swh7kxpif477drihi-xz-5.2.3/lib/tls/x86_64/x86_64", 0x7fff8de74dd0) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/chf54cl12ifswf6swh7kxpif477drihi-xz-5.2.3/lib/tls/x86_64/liblzma.so.5", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
stat("/nix/store/chf54cl12ifswf6swh7kxpif477drihi-xz-5.2.3/lib/tls/x86_64", 0x7fff8de74dd0) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/chf54cl12ifswf6swh7kxpif477drihi-xz-5.2.3/lib/tls/x86_64/liblzma.so.5", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
stat("/nix/store/chf54cl12ifswf6swh7kxpif477drihi-xz-5.2.3/lib/tls/x86_64", 0x7fff8de74dd0) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/chf54cl12ifswf6swh7kxpif477drihi-xz-5.2.3/lib/tls/liblzma.so.5", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
stat("/nix/store/chf54cl12ifswf6swh7kxpif477drihi-xz-5.2.3/lib/tls", 0x7fff8de74dd0) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/chf54cl12ifswf6swh7kxpif477drihi-xz-5.2.3/lib/x86_64/x86_64/liblzma.so.5", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
stat("/nix/store/chf54cl12ifswf6swh7kxpif477drihi-xz-5.2.3/lib/x86_64/x86_64", 0x7fff8de74dd0) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/chf54cl12ifswf6swh7kxpif477drihi-xz-5.2.3/lib/x86_64/liblzma.so.5", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
stat("/nix/store/chf54cl12ifswf6swh7kxpif477drihi-xz-5.2.3/lib/x86_64", 0x7fff8de74dd0) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/chf54cl12ifswf6swh7kxpif477drihi-xz-5.2.3/lib/x86_64/liblzma.so.5", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
stat("/nix/store/chf54cl12ifswf6swh7kxpif477drihi-xz-5.2.3/lib/x86_64", 0x7fff8de74dd0) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/chf54cl12ifswf6swh7kxpif477drihi-xz-5.2.3/lib/liblzma.so.5", O_RDONLY|O_CLOEXEC) = 3 | |
read(3, "\177ELF\2\1\1\0\0\0\0\0\0\0\0\0\3\0>\0\1\0\0\0@/\0\0\0\0\0\0@\0\0\0\0\0\0\0\340\221\2\0\0\0\0\0\0\0\0\0@\0008\0\7\0@\0\33\0\30\0\1\0\0\0\5\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0tD\2\0\0\0\0\0tD\2\0\0\0\0\0\0\0 \0\0\0\0\0\1\0\0\0\6\0\0\0000H\2\0\0\0\0\0000H\"\0\0\0\0\0000H\"\0\0\0\0\0\330\7\0\0\0\0\0\0\340\7\0\0\0\0\0\0\0\0 \0\0\0\0\0\2\0\0\0\6\0\0\0`K\2\0\0\0\0\0`K\"\0\0\0\0\0`K\"\0\0\0\0\0\0\2\0\0\0\0\0\0\0\2\0\0\0\0\0\0\10\0\0\0\0\0\0\0P\345td\4\0\0\0\300\0\2\0\0\0\0\0\300\0\2\0\0\0\0\0\300\0\2\0\0\0\0\0D\t\0\0\0\0\0\0D\t\0\0\0\0\0\0\4\0\0\0\0\0\0\0Q\345td\6\0\0\0\0\0\0\0"..., 832) = 832 | |
fstat(3, {st_mode=S_IFREG|0555, st_size=170144, ...}) = 0 | |
mmap(NULL, 2248720, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) = 0x7204af97d000 | |
mprotect(0x7204af9a2000, 2093056, PROT_NONE) = 0 | |
mmap(0x7204afba1000, 8192, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0x24000) = 0x7204afba1000 | |
close(3) = 0 | |
openat(AT_FDCWD, "/nix/store/r8zhwq9xylxw8a823kpvqy0kfqq4g52f-nix-2.0pre5968_a6c0b773/lib/libbrotlienc.so.1", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/chf54cl12ifswf6swh7kxpif477drihi-xz-5.2.3/lib/libbrotlienc.so.1", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/dl1hzcnxnbbcpf6zdhan58fghvdg3in8-openssl-1.0.2n/lib/libbrotlienc.so.1", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/mwgp39wfjlfd95dn09v0vywhm1x1v694-brotli-1.0.2-lib/lib/tls/x86_64/x86_64/libbrotlienc.so.1", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
stat("/nix/store/mwgp39wfjlfd95dn09v0vywhm1x1v694-brotli-1.0.2-lib/lib/tls/x86_64/x86_64", 0x7fff8de74da0) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/mwgp39wfjlfd95dn09v0vywhm1x1v694-brotli-1.0.2-lib/lib/tls/x86_64/libbrotlienc.so.1", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
stat("/nix/store/mwgp39wfjlfd95dn09v0vywhm1x1v694-brotli-1.0.2-lib/lib/tls/x86_64", 0x7fff8de74da0) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/mwgp39wfjlfd95dn09v0vywhm1x1v694-brotli-1.0.2-lib/lib/tls/x86_64/libbrotlienc.so.1", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
stat("/nix/store/mwgp39wfjlfd95dn09v0vywhm1x1v694-brotli-1.0.2-lib/lib/tls/x86_64", 0x7fff8de74da0) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/mwgp39wfjlfd95dn09v0vywhm1x1v694-brotli-1.0.2-lib/lib/tls/libbrotlienc.so.1", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
stat("/nix/store/mwgp39wfjlfd95dn09v0vywhm1x1v694-brotli-1.0.2-lib/lib/tls", 0x7fff8de74da0) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/mwgp39wfjlfd95dn09v0vywhm1x1v694-brotli-1.0.2-lib/lib/x86_64/x86_64/libbrotlienc.so.1", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
stat("/nix/store/mwgp39wfjlfd95dn09v0vywhm1x1v694-brotli-1.0.2-lib/lib/x86_64/x86_64", 0x7fff8de74da0) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/mwgp39wfjlfd95dn09v0vywhm1x1v694-brotli-1.0.2-lib/lib/x86_64/libbrotlienc.so.1", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
stat("/nix/store/mwgp39wfjlfd95dn09v0vywhm1x1v694-brotli-1.0.2-lib/lib/x86_64", 0x7fff8de74da0) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/mwgp39wfjlfd95dn09v0vywhm1x1v694-brotli-1.0.2-lib/lib/x86_64/libbrotlienc.so.1", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
stat("/nix/store/mwgp39wfjlfd95dn09v0vywhm1x1v694-brotli-1.0.2-lib/lib/x86_64", 0x7fff8de74da0) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/mwgp39wfjlfd95dn09v0vywhm1x1v694-brotli-1.0.2-lib/lib/libbrotlienc.so.1", O_RDONLY|O_CLOEXEC) = 3 | |
read(3, "\177ELF\2\1\1\0\0\0\0\0\0\0\0\0\3\0>\0\1\0\0\0\220\f\0\0\0\0\0\0@\0\0\0\0\0\0\0P\177\10\0\0\0\0\0\0\0\0\0@\0008\0\7\0@\0\31\0\30\0\1\0\0\0\5\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\274>\10\0\0\0\0\0\274>\10\0\0\0\0\0\0\0 \0\0\0\0\0\1\0\0\0\6\0\0\0@M\10\0\0\0\0\0@M(\0\0\0\0\0@M(\0\0\0\0\0\310\2\0\0\0\0\0\0\320\2\0\0\0\0\0\0\0\0 \0\0\0\0\0\2\0\0\0\6\0\0\0PM\10\0\0\0\0\0PM(\0\0\0\0\0PM(\0\0\0\0\0\360\1\0\0\0\0\0\0\360\1\0\0\0\0\0\0\10\0\0\0\0\0\0\0P\345td\4\0\0\0@\n\10\0\0\0\0\0@\n\10\0\0\0\0\0@\n\10\0\0\0\0\0\304\4\0\0\0\0\0\0\304\4\0\0\0\0\0\0\4\0\0\0\0\0\0\0Q\345td\6\0\0\0\0\0\0\0"..., 832) = 832 | |
fstat(3, {st_mode=S_IFREG|0555, st_size=558480, ...}) = 0 | |
mmap(NULL, 2641936, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) = 0x7204af6f7000 | |
mprotect(0x7204af77b000, 2097152, PROT_NONE) = 0 | |
mmap(0x7204af97b000, 8192, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0x84000) = 0x7204af97b000 | |
close(3) = 0 | |
openat(AT_FDCWD, "/nix/store/r8zhwq9xylxw8a823kpvqy0kfqq4g52f-nix-2.0pre5968_a6c0b773/lib/libbrotlidec.so.1", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/chf54cl12ifswf6swh7kxpif477drihi-xz-5.2.3/lib/libbrotlidec.so.1", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/dl1hzcnxnbbcpf6zdhan58fghvdg3in8-openssl-1.0.2n/lib/libbrotlidec.so.1", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/mwgp39wfjlfd95dn09v0vywhm1x1v694-brotli-1.0.2-lib/lib/libbrotlidec.so.1", O_RDONLY|O_CLOEXEC) = 3 | |
read(3, "\177ELF\2\1\1\0\0\0\0\0\0\0\0\0\3\0>\0\1\0\0\0\20\v\0\0\0\0\0\0@\0\0\0\0\0\0\0\20\322\0\0\0\0\0\0\0\0\0\0@\0008\0\7\0@\0\31\0\30\0\1\0\0\0\5\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0l\256\0\0\0\0\0\0l\256\0\0\0\0\0\0\0\0 \0\0\0\0\0\1\0\0\0\6\0\0\0\210\275\0\0\0\0\0\0\210\275 \0\0\0\0\0\210\275 \0\0\0\0\0\200\2\0\0\0\0\0\0\210\2\0\0\0\0\0\0\0\0 \0\0\0\0\0\2\0\0\0\6\0\0\0\230\275\0\0\0\0\0\0\230\275 \0\0\0\0\0\230\275 \0\0\0\0\0\360\1\0\0\0\0\0\0\360\1\0\0\0\0\0\0\10\0\0\0\0\0\0\0P\345td\4\0\0\0P\243\0\0\0\0\0\0P\243\0\0\0\0\0\0P\243\0\0\0\0\0\0\214\1\0\0\0\0\0\0\214\1\0\0\0\0\0\0\4\0\0\0\0\0\0\0Q\345td\6\0\0\0\0\0\0\0"..., 832) = 832 | |
mmap(NULL, 8192, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) = 0x7204b3088000 | |
fstat(3, {st_mode=S_IFREG|0555, st_size=55376, ...}) = 0 | |
mmap(NULL, 2146320, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) = 0x7204af4ea000 | |
mprotect(0x7204af4f5000, 2097152, PROT_NONE) = 0 | |
mmap(0x7204af6f5000, 8192, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0xb000) = 0x7204af6f5000 | |
close(3) = 0 | |
openat(AT_FDCWD, "/nix/store/y1wvrg5ckyy3472fpknf468cxfk8wkw0-nghttp2-1.24.0-lib/lib/tls/x86_64/x86_64/libnghttp2.so.14", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
stat("/nix/store/y1wvrg5ckyy3472fpknf468cxfk8wkw0-nghttp2-1.24.0-lib/lib/tls/x86_64/x86_64", 0x7fff8de74d40) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/y1wvrg5ckyy3472fpknf468cxfk8wkw0-nghttp2-1.24.0-lib/lib/tls/x86_64/libnghttp2.so.14", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
stat("/nix/store/y1wvrg5ckyy3472fpknf468cxfk8wkw0-nghttp2-1.24.0-lib/lib/tls/x86_64", 0x7fff8de74d40) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/y1wvrg5ckyy3472fpknf468cxfk8wkw0-nghttp2-1.24.0-lib/lib/tls/x86_64/libnghttp2.so.14", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
stat("/nix/store/y1wvrg5ckyy3472fpknf468cxfk8wkw0-nghttp2-1.24.0-lib/lib/tls/x86_64", 0x7fff8de74d40) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/y1wvrg5ckyy3472fpknf468cxfk8wkw0-nghttp2-1.24.0-lib/lib/tls/libnghttp2.so.14", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
stat("/nix/store/y1wvrg5ckyy3472fpknf468cxfk8wkw0-nghttp2-1.24.0-lib/lib/tls", 0x7fff8de74d40) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/y1wvrg5ckyy3472fpknf468cxfk8wkw0-nghttp2-1.24.0-lib/lib/x86_64/x86_64/libnghttp2.so.14", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
stat("/nix/store/y1wvrg5ckyy3472fpknf468cxfk8wkw0-nghttp2-1.24.0-lib/lib/x86_64/x86_64", 0x7fff8de74d40) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/y1wvrg5ckyy3472fpknf468cxfk8wkw0-nghttp2-1.24.0-lib/lib/x86_64/libnghttp2.so.14", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
stat("/nix/store/y1wvrg5ckyy3472fpknf468cxfk8wkw0-nghttp2-1.24.0-lib/lib/x86_64", 0x7fff8de74d40) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/y1wvrg5ckyy3472fpknf468cxfk8wkw0-nghttp2-1.24.0-lib/lib/x86_64/libnghttp2.so.14", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
stat("/nix/store/y1wvrg5ckyy3472fpknf468cxfk8wkw0-nghttp2-1.24.0-lib/lib/x86_64", 0x7fff8de74d40) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/y1wvrg5ckyy3472fpknf468cxfk8wkw0-nghttp2-1.24.0-lib/lib/libnghttp2.so.14", O_RDONLY|O_CLOEXEC) = 3 | |
read(3, "\177ELF\2\1\1\0\0\0\0\0\0\0\0\0\3\0>\0\1\0\0\0`K\0\0\0\0\0\0@\0\0\0\0\0\0\0\330\276\2\0\0\0\0\0\0\0\0\0@\0008\0\7\0@\0\31\0\30\0\1\0\0\0\5\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\204)\2\0\0\0\0\0\204)\2\0\0\0\0\0\0\0 \0\0\0\0\0\1\0\0\0\6\0\0\0\260,\2\0\0\0\0\0\260,\"\0\0\0\0\0\260,\"\0\0\0\0\0008\"\0\0\0\0\0\0@\"\0\0\0\0\0\0\0\0 \0\0\0\0\0\2\0\0\0\6\0\0\0\300,\2\0\0\0\0\0\300,\"\0\0\0\0\0\300,\"\0\0\0\0\0\320\1\0\0\0\0\0\0\320\1\0\0\0\0\0\0\10\0\0\0\0\0\0\0P\345td\4\0\0\0\30\326\1\0\0\0\0\0\30\326\1\0\0\0\0\0\30\326\1\0\0\0\0\0\264\r\0\0\0\0\0\0\264\r\0\0\0\0\0\0\4\0\0\0\0\0\0\0Q\345td\6\0\0\0\0\0\0\0"..., 832) = 832 | |
fstat(3, {st_mode=S_IFREG|0555, st_size=181528, ...}) = 0 | |
mmap(NULL, 2248432, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) = 0x7204af2c5000 | |
mprotect(0x7204af2e8000, 2093056, PROT_NONE) = 0 | |
mmap(0x7204af4e7000, 12288, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0x22000) = 0x7204af4e7000 | |
close(3) = 0 | |
openat(AT_FDCWD, "/nix/store/y1wvrg5ckyy3472fpknf468cxfk8wkw0-nghttp2-1.24.0-lib/lib/libssh2.so.1", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/zqi323lr2dyp0csnrrqns37svgmr0f5k-libkrb5-1.15.2/lib/tls/x86_64/x86_64/libssh2.so.1", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
stat("/nix/store/zqi323lr2dyp0csnrrqns37svgmr0f5k-libkrb5-1.15.2/lib/tls/x86_64/x86_64", 0x7fff8de74d10) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/zqi323lr2dyp0csnrrqns37svgmr0f5k-libkrb5-1.15.2/lib/tls/x86_64/libssh2.so.1", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
stat("/nix/store/zqi323lr2dyp0csnrrqns37svgmr0f5k-libkrb5-1.15.2/lib/tls/x86_64", 0x7fff8de74d10) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/zqi323lr2dyp0csnrrqns37svgmr0f5k-libkrb5-1.15.2/lib/tls/x86_64/libssh2.so.1", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
stat("/nix/store/zqi323lr2dyp0csnrrqns37svgmr0f5k-libkrb5-1.15.2/lib/tls/x86_64", 0x7fff8de74d10) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/zqi323lr2dyp0csnrrqns37svgmr0f5k-libkrb5-1.15.2/lib/tls/libssh2.so.1", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
stat("/nix/store/zqi323lr2dyp0csnrrqns37svgmr0f5k-libkrb5-1.15.2/lib/tls", 0x7fff8de74d10) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/zqi323lr2dyp0csnrrqns37svgmr0f5k-libkrb5-1.15.2/lib/x86_64/x86_64/libssh2.so.1", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
stat("/nix/store/zqi323lr2dyp0csnrrqns37svgmr0f5k-libkrb5-1.15.2/lib/x86_64/x86_64", 0x7fff8de74d10) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/zqi323lr2dyp0csnrrqns37svgmr0f5k-libkrb5-1.15.2/lib/x86_64/libssh2.so.1", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
stat("/nix/store/zqi323lr2dyp0csnrrqns37svgmr0f5k-libkrb5-1.15.2/lib/x86_64", 0x7fff8de74d10) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/zqi323lr2dyp0csnrrqns37svgmr0f5k-libkrb5-1.15.2/lib/x86_64/libssh2.so.1", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
stat("/nix/store/zqi323lr2dyp0csnrrqns37svgmr0f5k-libkrb5-1.15.2/lib/x86_64", 0x7fff8de74d10) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/zqi323lr2dyp0csnrrqns37svgmr0f5k-libkrb5-1.15.2/lib/libssh2.so.1", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
stat("/nix/store/zqi323lr2dyp0csnrrqns37svgmr0f5k-libkrb5-1.15.2/lib", {st_mode=S_IFDIR|0555, st_size=37, ...}) = 0 | |
openat(AT_FDCWD, "/nix/store/r43dk927l97n78rff7hnvsq49f3szkg6-zlib-1.2.11/lib/tls/x86_64/x86_64/libssh2.so.1", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
stat("/nix/store/r43dk927l97n78rff7hnvsq49f3szkg6-zlib-1.2.11/lib/tls/x86_64/x86_64", 0x7fff8de74d10) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/r43dk927l97n78rff7hnvsq49f3szkg6-zlib-1.2.11/lib/tls/x86_64/libssh2.so.1", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
stat("/nix/store/r43dk927l97n78rff7hnvsq49f3szkg6-zlib-1.2.11/lib/tls/x86_64", 0x7fff8de74d10) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/r43dk927l97n78rff7hnvsq49f3szkg6-zlib-1.2.11/lib/tls/x86_64/libssh2.so.1", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
stat("/nix/store/r43dk927l97n78rff7hnvsq49f3szkg6-zlib-1.2.11/lib/tls/x86_64", 0x7fff8de74d10) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/r43dk927l97n78rff7hnvsq49f3szkg6-zlib-1.2.11/lib/tls/libssh2.so.1", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
stat("/nix/store/r43dk927l97n78rff7hnvsq49f3szkg6-zlib-1.2.11/lib/tls", 0x7fff8de74d10) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/r43dk927l97n78rff7hnvsq49f3szkg6-zlib-1.2.11/lib/x86_64/x86_64/libssh2.so.1", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
stat("/nix/store/r43dk927l97n78rff7hnvsq49f3szkg6-zlib-1.2.11/lib/x86_64/x86_64", 0x7fff8de74d10) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/r43dk927l97n78rff7hnvsq49f3szkg6-zlib-1.2.11/lib/x86_64/libssh2.so.1", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
stat("/nix/store/r43dk927l97n78rff7hnvsq49f3szkg6-zlib-1.2.11/lib/x86_64", 0x7fff8de74d10) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/r43dk927l97n78rff7hnvsq49f3szkg6-zlib-1.2.11/lib/x86_64/libssh2.so.1", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
stat("/nix/store/r43dk927l97n78rff7hnvsq49f3szkg6-zlib-1.2.11/lib/x86_64", 0x7fff8de74d10) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/r43dk927l97n78rff7hnvsq49f3szkg6-zlib-1.2.11/lib/libssh2.so.1", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
stat("/nix/store/r43dk927l97n78rff7hnvsq49f3szkg6-zlib-1.2.11/lib", {st_mode=S_IFDIR|0555, st_size=5, ...}) = 0 | |
openat(AT_FDCWD, "/nix/store/dl1hzcnxnbbcpf6zdhan58fghvdg3in8-openssl-1.0.2n/lib/libssh2.so.1", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/c311jc1k0i9d6a7gvk7dmbsgsmcp0kzn-libssh2-1.8.0/lib/tls/x86_64/x86_64/libssh2.so.1", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
stat("/nix/store/c311jc1k0i9d6a7gvk7dmbsgsmcp0kzn-libssh2-1.8.0/lib/tls/x86_64/x86_64", 0x7fff8de74d10) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/c311jc1k0i9d6a7gvk7dmbsgsmcp0kzn-libssh2-1.8.0/lib/tls/x86_64/libssh2.so.1", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
stat("/nix/store/c311jc1k0i9d6a7gvk7dmbsgsmcp0kzn-libssh2-1.8.0/lib/tls/x86_64", 0x7fff8de74d10) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/c311jc1k0i9d6a7gvk7dmbsgsmcp0kzn-libssh2-1.8.0/lib/tls/x86_64/libssh2.so.1", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
stat("/nix/store/c311jc1k0i9d6a7gvk7dmbsgsmcp0kzn-libssh2-1.8.0/lib/tls/x86_64", 0x7fff8de74d10) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/c311jc1k0i9d6a7gvk7dmbsgsmcp0kzn-libssh2-1.8.0/lib/tls/libssh2.so.1", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
stat("/nix/store/c311jc1k0i9d6a7gvk7dmbsgsmcp0kzn-libssh2-1.8.0/lib/tls", 0x7fff8de74d10) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/c311jc1k0i9d6a7gvk7dmbsgsmcp0kzn-libssh2-1.8.0/lib/x86_64/x86_64/libssh2.so.1", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
stat("/nix/store/c311jc1k0i9d6a7gvk7dmbsgsmcp0kzn-libssh2-1.8.0/lib/x86_64/x86_64", 0x7fff8de74d10) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/c311jc1k0i9d6a7gvk7dmbsgsmcp0kzn-libssh2-1.8.0/lib/x86_64/libssh2.so.1", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
stat("/nix/store/c311jc1k0i9d6a7gvk7dmbsgsmcp0kzn-libssh2-1.8.0/lib/x86_64", 0x7fff8de74d10) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/c311jc1k0i9d6a7gvk7dmbsgsmcp0kzn-libssh2-1.8.0/lib/x86_64/libssh2.so.1", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
stat("/nix/store/c311jc1k0i9d6a7gvk7dmbsgsmcp0kzn-libssh2-1.8.0/lib/x86_64", 0x7fff8de74d10) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/c311jc1k0i9d6a7gvk7dmbsgsmcp0kzn-libssh2-1.8.0/lib/libssh2.so.1", O_RDONLY|O_CLOEXEC) = 3 | |
read(3, "\177ELF\2\1\1\0\0\0\0\0\0\0\0\0\3\0>\0\1\0\0\0\360U\0\0\0\0\0\0@\0\0\0\0\0\0\0\30\33\3\0\0\0\0\0\0\0\0\0@\0008\0\7\0@\0\32\0\31\0\1\0\0\0\5\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\324\255\2\0\0\0\0\0\324\255\2\0\0\0\0\0\0\0 \0\0\0\0\0\1\0\0\0\6\0\0\0p\261\2\0\0\0\0\0p\261\"\0\0\0\0\0p\261\"\0\0\0\0\0008\20\0\0\0\0\0\0H\20\0\0\0\0\0\0\0\0 \0\0\0\0\0\2\0\0\0\6\0\0\0\340\271\2\0\0\0\0\0\340\271\"\0\0\0\0\0\340\271\"\0\0\0\0\0\0\2\0\0\0\0\0\0\0\2\0\0\0\0\0\0\10\0\0\0\0\0\0\0P\345td\4\0\0\0\244\\\2\0\0\0\0\0\244\\\2\0\0\0\0\0\244\\\2\0\0\0\0\0\374\10\0\0\0\0\0\0\374\10\0\0\0\0\0\0\4\0\0\0\0\0\0\0Q\345td\6\0\0\0\0\0\0\0"..., 832) = 832 | |
fstat(3, {st_mode=S_IFREG|0555, st_size=205208, ...}) = 0 | |
mmap(NULL, 2277816, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) = 0x7204af098000 | |
mprotect(0x7204af0c3000, 2097152, PROT_NONE) = 0 | |
mmap(0x7204af2c3000, 8192, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0x2b000) = 0x7204af2c3000 | |
close(3) = 0 | |
openat(AT_FDCWD, "/nix/store/y1wvrg5ckyy3472fpknf468cxfk8wkw0-nghttp2-1.24.0-lib/lib/libssl.so.1.0.0", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/zqi323lr2dyp0csnrrqns37svgmr0f5k-libkrb5-1.15.2/lib/libssl.so.1.0.0", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/r43dk927l97n78rff7hnvsq49f3szkg6-zlib-1.2.11/lib/libssl.so.1.0.0", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/dl1hzcnxnbbcpf6zdhan58fghvdg3in8-openssl-1.0.2n/lib/libssl.so.1.0.0", O_RDONLY|O_CLOEXEC) = 3 | |
read(3, "\177ELF\2\1\1\0\0\0\0\0\0\0\0\0\3\0>\0\1\0\0\0\0\222\1\0\0\0\0\0@\0\0\0\0\0\0\0008\236\7\0\0\0\0\0\0\0\0\0@\0008\0\10\0@\0\33\0\32\0\1\0\0\0\5\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0242\6\0\0\0\0\0\0242\6\0\0\0\0\0\0\0 \0\0\0\0\0\1\0\0\0\6\0\0\0\0208\6\0\0\0\0\0\0208&\0\0\0\0\0\0208&\0\0\0\0\0000\235\0\0\0\0\0\0 \236\0\0\0\0\0\0\0\0 \0\0\0\0\0\2\0\0\0\6\0\0\0hq\6\0\0\0\0\0hq&\0\0\0\0\0hq&\0\0\0\0\0\0\2\0\0\0\0\0\0\0\2\0\0\0\0\0\0\10\0\0\0\0\0\0\0\4\0\0\0\4\0\0\0\0\2\0\0\0\0\0\0\0\2\0\0\0\0\0\0\0\2\0\0\0\0\0\0$\0\0\0\0\0\0\0$\0\0\0\0\0\0\0\4\0\0\0\0\0\0\0P\345td\4\0\0\0\314\241\5\0"..., 832) = 832 | |
fstat(3, {st_mode=S_IFREG|0555, st_size=500984, ...}) = 0 | |
mmap(NULL, 2545200, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) = 0x7204aee2a000 | |
mprotect(0x7204aee8e000, 2093056, PROT_NONE) = 0 | |
mmap(0x7204af08d000, 45056, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0x63000) = 0x7204af08d000 | |
close(3) = 0 | |
openat(AT_FDCWD, "/nix/store/y1wvrg5ckyy3472fpknf468cxfk8wkw0-nghttp2-1.24.0-lib/lib/libgssapi_krb5.so.2", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/zqi323lr2dyp0csnrrqns37svgmr0f5k-libkrb5-1.15.2/lib/libgssapi_krb5.so.2", O_RDONLY|O_CLOEXEC) = 3 | |
read(3, "\177ELF\2\1\1\0\0\0\0\0\0\0\0\0\3\0>\0\1\0\0\0\20\275\0\0\0\0\0\0@\0\0\0\0\0\0\0\320M\5\0\0\0\0\0\0\0\0\0@\0008\0\7\0@\0\33\0\32\0\1\0\0\0\5\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\fo\4\0\0\0\0\0\fo\4\0\0\0\0\0\0\0 \0\0\0\0\0\1\0\0\0\6\0\0\0Hu\4\0\0\0\0\0Hu$\0\0\0\0\0Hu$\0\0\0\0\0P#\0\0\0\0\0\0h%\0\0\0\0\0\0\0\0 \0\0\0\0\0\2\0\0\0\6\0\0\0\210\201\4\0\0\0\0\0\210\201$\0\0\0\0\0\210\201$\0\0\0\0\0P\2\0\0\0\0\0\0P\2\0\0\0\0\0\0\10\0\0\0\0\0\0\0P\345td\4\0\0\0@\356\3\0\0\0\0\0@\356\3\0\0\0\0\0@\356\3\0\0\0\0\0\374\16\0\0\0\0\0\0\374\16\0\0\0\0\0\0\4\0\0\0\0\0\0\0Q\345td\6\0\0\0\0\0\0\0"..., 832) = 832 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=349328, ...}) = 0 | |
mmap(NULL, 8192, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) = 0x7204b3086000 | |
mmap(NULL, 2398896, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) = 0x7204aebe0000 | |
mprotect(0x7204aec27000, 2097152, PROT_NONE) = 0 | |
mmap(0x7204aee27000, 12288, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0x47000) = 0x7204aee27000 | |
close(3) = 0 | |
openat(AT_FDCWD, "/nix/store/y1wvrg5ckyy3472fpknf468cxfk8wkw0-nghttp2-1.24.0-lib/lib/libkrb5.so.3", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/zqi323lr2dyp0csnrrqns37svgmr0f5k-libkrb5-1.15.2/lib/libkrb5.so.3", O_RDONLY|O_CLOEXEC) = 3 | |
read(3, "\177ELF\2\1\1\0\0\0\0\0\0\0\0\0\3\0>\0\1\0\0\0\3409\2\0\0\0\0\0@\0\0\0\0\0\0\0\10\17\20\0\0\0\0\0\0\0\0\0@\0008\0\7\0@\0\33\0\32\0\1\0\0\0\5\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0d>\f\0\0\0\0\0d>\f\0\0\0\0\0\0\0 \0\0\0\0\0\1\0\0\0\6\0\0\0\340M\f\0\0\0\0\0\340M,\0\0\0\0\0\340M,\0\0\0\0\0\250\363\0\0\0\0\0\0\20\366\0\0\0\0\0\0\0\0 \0\0\0\0\0\2\0\0\0\6\0\0\0\340\30\r\0\0\0\0\0\340\30-\0\0\0\0\0\340\30-\0\0\0\0\0000\2\0\0\0\0\0\0000\2\0\0\0\0\0\0\10\0\0\0\0\0\0\0P\345td\4\0\0\0\240\336\n\0\0\0\0\0\240\336\n\0\0\0\0\0\240\336\n\0\0\0\0\0\0342\0\0\0\0\0\0\0342\0\0\0\0\0\0\4\0\0\0\0\0\0\0Q\345td\6\0\0\0\0\0\0\0"..., 832) = 832 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=1054152, ...}) = 0 | |
mmap(NULL, 2966512, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) = 0x7204ae90b000 | |
mprotect(0x7204ae9cf000, 2097152, PROT_NONE) = 0 | |
mmap(0x7204aebcf000, 69632, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0xc4000) = 0x7204aebcf000 | |
close(3) = 0 | |
openat(AT_FDCWD, "/nix/store/y1wvrg5ckyy3472fpknf468cxfk8wkw0-nghttp2-1.24.0-lib/lib/libk5crypto.so.3", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/zqi323lr2dyp0csnrrqns37svgmr0f5k-libkrb5-1.15.2/lib/libk5crypto.so.3", O_RDONLY|O_CLOEXEC) = 3 | |
read(3, "\177ELF\2\1\1\0\0\0\0\0\0\0\0\0\3\0>\0\1\0\0\0\340H\0\0\0\0\0\0@\0\0\0\0\0\0\0\200F\3\0\0\0\0\0\0\0\0\0@\0008\0\7\0@\0\33\0\32\0\1\0\0\0\5\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\314\342\2\0\0\0\0\0\314\342\2\0\0\0\0\0\0\0 \0\0\0\0\0\1\0\0\0\6\0\0\0\310\352\2\0\0\0\0\0\310\352\"\0\0\0\0\0\310\352\"\0\0\0\0\0p\25\0\0\0\0\0\0P$\0\0\0\0\0\0\0\0 \0\0\0\0\0\2\0\0\0\6\0\0\0\350\372\2\0\0\0\0\0\350\372\"\0\0\0\0\0\350\372\"\0\0\0\0\0\20\2\0\0\0\0\0\0\20\2\0\0\0\0\0\0\10\0\0\0\0\0\0\0P\345td\4\0\0\0T\242\2\0\0\0\0\0T\242\2\0\0\0\0\0T\242\2\0\0\0\0\0\34\10\0\0\0\0\0\0\34\10\0\0\0\0\0\0\4\0\0\0\0\0\0\0Q\345td\6\0\0\0\0\0\0\0"..., 832) = 832 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=216384, ...}) = 0 | |
mmap(NULL, 2297624, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) = 0x7204ae6da000 | |
mprotect(0x7204ae709000, 2093056, PROT_NONE) = 0 | |
mmap(0x7204ae908000, 12288, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0x2e000) = 0x7204ae908000 | |
close(3) = 0 | |
openat(AT_FDCWD, "/nix/store/y1wvrg5ckyy3472fpknf468cxfk8wkw0-nghttp2-1.24.0-lib/lib/libcom_err.so.3", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/zqi323lr2dyp0csnrrqns37svgmr0f5k-libkrb5-1.15.2/lib/libcom_err.so.3", O_RDONLY|O_CLOEXEC) = 3 | |
read(3, "\177ELF\2\1\1\0\0\0\0\0\0\0\0\0\3\0>\0\1\0\0\0\0\20\0\0\0\0\0\0@\0\0\0\0\0\0\0\340A\0\0\0\0\0\0\0\0\0\0@\0008\0\7\0@\0\32\0\31\0\1\0\0\0\5\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0t \0\0\0\0\0\0t \0\0\0\0\0\0\0\0 \0\0\0\0\0\1\0\0\0\6\0\0\0\300,\0\0\0\0\0\0\300, \0\0\0\0\0\300, \0\0\0\0\0h\3\0\0\0\0\0\0\20\4\0\0\0\0\0\0\0\0 \0\0\0\0\0\2\0\0\0\6\0\0\0\330,\0\0\0\0\0\0\330, \0\0\0\0\0\330, \0\0\0\0\0\20\2\0\0\0\0\0\0\20\2\0\0\0\0\0\0\10\0\0\0\0\0\0\0P\345td\4\0\0\0L\34\0\0\0\0\0\0L\34\0\0\0\0\0\0L\34\0\0\0\0\0\0\264\0\0\0\0\0\0\0\264\0\0\0\0\0\0\0\4\0\0\0\0\0\0\0Q\345td\6\0\0\0\0\0\0\0"..., 832) = 832 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=18528, ...}) = 0 | |
mmap(NULL, 2109648, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) = 0x7204ae4d6000 | |
mprotect(0x7204ae4d9000, 2093056, PROT_NONE) = 0 | |
mmap(0x7204ae6d8000, 8192, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0x2000) = 0x7204ae6d8000 | |
close(3) = 0 | |
openat(AT_FDCWD, "/nix/store/y1wvrg5ckyy3472fpknf468cxfk8wkw0-nghttp2-1.24.0-lib/lib/libz.so.1", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/zqi323lr2dyp0csnrrqns37svgmr0f5k-libkrb5-1.15.2/lib/libz.so.1", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/r43dk927l97n78rff7hnvsq49f3szkg6-zlib-1.2.11/lib/libz.so.1", O_RDONLY|O_CLOEXEC) = 3 | |
read(3, "\177ELF\2\1\1\0\0\0\0\0\0\0\0\0\3\0>\0\1\0\0\0`#\0\0\0\0\0\0@\0\0\0\0\0\0\0 \202\1\0\0\0\0\0\0\0\0\0@\0008\0\7\0@\0\34\0\31\0\1\0\0\0\5\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\fS\1\0\0\0\0\0\fS\1\0\0\0\0\0\0\0 \0\0\0\0\0\1\0\0\0\6\0\0\0\350Z\1\0\0\0\0\0\350Z!\0\0\0\0\0\350Z!\0\0\0\0\0 \5\0\0\0\0\0\0(\5\0\0\0\0\0\0\0\0 \0\0\0\0\0\2\0\0\0\6\0\0\0P\\\1\0\0\0\0\0P\\!\0\0\0\0\0P\\!\0\0\0\0\0\360\1\0\0\0\0\0\0\360\1\0\0\0\0\0\0\10\0\0\0\0\0\0\0P\345td\4\0\0\0P5\1\0\0\0\0\0P5\1\0\0\0\0\0P5\1\0\0\0\0\0\24\4\0\0\0\0\0\0\24\4\0\0\0\0\0\0\4\0\0\0\0\0\0\0Q\345td\6\0\0\0\0\0\0\0"..., 832) = 832 | |
fstat(3, {st_mode=S_IFREG|0555, st_size=100640, ...}) = 0 | |
mmap(NULL, 2187280, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) = 0x7204ae2bf000 | |
mprotect(0x7204ae2d5000, 2093056, PROT_NONE) = 0 | |
mmap(0x7204ae4d4000, 8192, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0x15000) = 0x7204ae4d4000 | |
close(3) = 0 | |
openat(AT_FDCWD, "/nix/store/mwgp39wfjlfd95dn09v0vywhm1x1v694-brotli-1.0.2-lib/lib/libbrotlicommon.so.1", O_RDONLY|O_CLOEXEC) = 3 | |
read(3, "\177ELF\2\1\1\0\0\0\0\0\0\0\0\0\3\0>\0\1\0\0\0\200\6\0\0\0\0\0\0@\0\0\0\0\0\0\0\370\367\1\0\0\0\0\0\0\0\0\0@\0008\0\7\0@\0\31\0\30\0\1\0\0\0\5\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\374\347\1\0\0\0\0\0\374\347\1\0\0\0\0\0\0\0 \0\0\0\0\0\1\0\0\0\6\0\0\0\330\355\1\0\0\0\0\0\330\355!\0\0\0\0\0\330\355!\0\0\0\0\0\370\2\0\0\0\0\0\0\0\3\0\0\0\0\0\0\0\0 \0\0\0\0\0\2\0\0\0\6\0\0\0\350\355\1\0\0\0\0\0\350\355!\0\0\0\0\0\350\355!\0\0\0\0\0\340\1\0\0\0\0\0\0\340\1\0\0\0\0\0\0\10\0\0\0\0\0\0\0P\345td\4\0\0\0@\347\1\0\0\0\0\0@\347\1\0\0\0\0\0@\347\1\0\0\0\0\0,\0\0\0\0\0\0\0,\0\0\0\0\0\0\0\4\0\0\0\0\0\0\0Q\345td\6\0\0\0\0\0\0\0"..., 832) = 832 | |
fstat(3, {st_mode=S_IFREG|0555, st_size=130616, ...}) = 0 | |
mmap(NULL, 8192, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) = 0x7204b3084000 | |
mmap(NULL, 2224344, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) = 0x7204ae09f000 | |
mprotect(0x7204ae0be000, 2093056, PROT_NONE) = 0 | |
mmap(0x7204ae2bd000, 8192, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0x1e000) = 0x7204ae2bd000 | |
close(3) = 0 | |
openat(AT_FDCWD, "/nix/store/zqi323lr2dyp0csnrrqns37svgmr0f5k-libkrb5-1.15.2/lib/libkrb5support.so.0", O_RDONLY|O_CLOEXEC) = 3 | |
read(3, "\177ELF\2\1\1\0\0\0\0\0\0\0\0\0\3\0>\0\1\0\0\0000.\0\0\0\0\0\0@\0\0\0\0\0\0\0h\337\0\0\0\0\0\0\0\0\0\0@\0008\0\7\0@\0\33\0\32\0\1\0\0\0\5\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\354\242\0\0\0\0\0\0\354\242\0\0\0\0\0\0\0\0 \0\0\0\0\0\1\0\0\0\6\0\0\0x\252\0\0\0\0\0\0x\252 \0\0\0\0\0x\252 \0\0\0\0\0p\6\0\0\0\0\0\0\20\10\0\0\0\0\0\0\0\0 \0\0\0\0\0\2\0\0\0\6\0\0\0\250\252\0\0\0\0\0\0\250\252 \0\0\0\0\0\250\252 \0\0\0\0\0\20\2\0\0\0\0\0\0\20\2\0\0\0\0\0\0\10\0\0\0\0\0\0\0P\345td\4\0\0\0d\206\0\0\0\0\0\0d\206\0\0\0\0\0\0d\206\0\0\0\0\0\0l\4\0\0\0\0\0\0l\4\0\0\0\0\0\0\4\0\0\0\0\0\0\0Q\345td\6\0\0\0\0\0\0\0"..., 832) = 832 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=58920, ...}) = 0 | |
mmap(NULL, 2142856, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) = 0x7204ade93000 | |
mprotect(0x7204ade9e000, 2093056, PROT_NONE) = 0 | |
mmap(0x7204ae09d000, 8192, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0xa000) = 0x7204ae09d000 | |
close(3) = 0 | |
openat(AT_FDCWD, "/nix/store/zqi323lr2dyp0csnrrqns37svgmr0f5k-libkrb5-1.15.2/lib/libresolv.so.2", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/2kcrj1ksd2a14bm5sky182fv2xwfhfap-glibc-2.26-131/lib/libresolv.so.2", O_RDONLY|O_CLOEXEC) = 3 | |
read(3, "\177ELF\2\1\1\0\0\0\0\0\0\0\0\0\3\0>\0\1\0\0\0\2206\0\0\0\0\0\0@\0\0\0\0\0\0\0(b\1\0\0\0\0\0\0\0\0\0@\0008\0\10\0@\0\37\0\34\0\1\0\0\0\5\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\354\"\1\0\0\0\0\0\354\"\1\0\0\0\0\0\0\0 \0\0\0\0\0\1\0\0\0\6\0\0\0H$\1\0\0\0\0\0H$!\0\0\0\0\0H$!\0\0\0\0\0X\f\0\0\0\0\0\0X4\0\0\0\0\0\0\0\0 \0\0\0\0\0\2\0\0\0\6\0\0\0\350+\1\0\0\0\0\0\350+!\0\0\0\0\0\350+!\0\0\0\0\0\360\1\0\0\0\0\0\0\360\1\0\0\0\0\0\0\10\0\0\0\0\0\0\0\4\0\0\0\4\0\0\0\0\2\0\0\0\0\0\0\0\2\0\0\0\0\0\0\0\2\0\0\0\0\0\0D\0\0\0\0\0\0\0D\0\0\0\0\0\0\0\4\0\0\0\0\0\0\0P\345td\4\0\0\0\244\373\0\0"..., 832) = 832 | |
fstat(3, {st_mode=S_IFREG|0555, st_size=92648, ...}) = 0 | |
mmap(NULL, 2185376, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) = 0x7204adc7d000 | |
mprotect(0x7204adc90000, 2093056, PROT_NONE) = 0 | |
mmap(0x7204ade8f000, 8192, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0x12000) = 0x7204ade8f000 | |
mmap(0x7204ade91000, 6304, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x7204ade91000 | |
close(3) = 0 | |
mmap(NULL, 8192, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) = 0x7204b3082000 | |
mmap(NULL, 8192, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) = 0x7204b3080000 | |
mmap(NULL, 8192, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) = 0x7204b307e000 | |
arch_prctl(ARCH_SET_FS, 0x7204b30815c0) = 0 | |
mprotect(0x7204b146d000, 16384, PROT_READ) = 0 | |
mprotect(0x7204ade8f000, 4096, PROT_READ) = 0 | |
mprotect(0x7204b0703000, 4096, PROT_READ) = 0 | |
mprotect(0x7204ae09d000, 4096, PROT_READ) = 0 | |
mprotect(0x7204b1bf5000, 4096, PROT_READ) = 0 | |
mprotect(0x7204ae2bd000, 4096, PROT_READ) = 0 | |
mprotect(0x7204ae4d4000, 4096, PROT_READ) = 0 | |
mprotect(0x7204ae6d8000, 4096, PROT_READ) = 0 | |
mprotect(0x7204ae908000, 8192, PROT_READ) = 0 | |
mprotect(0x7204aebcf000, 61440, PROT_READ) = 0 | |
mprotect(0x7204aee27000, 8192, PROT_READ) = 0 | |
mprotect(0x7204b109a000, 114688, PROT_READ) = 0 | |
mprotect(0x7204af08d000, 20480, PROT_READ) = 0 | |
mprotect(0x7204af2c3000, 4096, PROT_READ) = 0 | |
mprotect(0x7204af4e7000, 4096, PROT_READ) = 0 | |
mprotect(0x7204af6f5000, 4096, PROT_READ) = 0 | |
mprotect(0x7204af97b000, 4096, PROT_READ) = 0 | |
mprotect(0x7204b168f000, 4096, PROT_READ) = 0 | |
mprotect(0x7204afba1000, 4096, PROT_READ) = 0 | |
mprotect(0x7204afdcf000, 86016, PROT_READ) = 0 | |
mprotect(0x7204b1f67000, 49152, PROT_READ) = 0 | |
mprotect(0x7204b0986000, 12288, PROT_READ) = 0 | |
mprotect(0x7204b00cc000, 28672, PROT_READ) = 0 | |
mprotect(0x7204b04ee000, 73728, PROT_READ) = 0 | |
mprotect(0x7204b0c83000, 12288, PROT_READ) = 0 | |
mprotect(0x7204b217f000, 4096, PROT_READ) = 0 | |
mprotect(0x7204b2e6c000, 4096, PROT_READ) = 0 | |
mprotect(0x7204b2402000, 12288, PROT_READ) = 0 | |
mprotect(0x7204b2c5c000, 4096, PROT_READ) = 0 | |
mmap(NULL, 12288, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) = 0x7204b307b000 | |
mprotect(0x7204b27db000, 40960, PROT_READ) = 0 | |
mprotect(0x7204b2a08000, 4096, PROT_READ) = 0 | |
mprotect(0x620000, 4096, PROT_READ) = 0 | |
mprotect(0x7204b3092000, 4096, PROT_READ) = 0 | |
set_tid_address(0x7204b3081890) = 10245 | |
set_robust_list(0x7204b30818a0, 24) = 0 | |
rt_sigaction(SIGRTMIN, {sa_handler=0x7204b147c9f0, sa_mask=[], sa_flags=SA_RESTORER|SA_SIGINFO, sa_restorer=0x7204b1488dd0}, NULL, 8) = 0 | |
rt_sigaction(SIGRT_1, {sa_handler=0x7204b147ca80, sa_mask=[], sa_flags=SA_RESTORER|SA_RESTART|SA_SIGINFO, sa_restorer=0x7204b1488dd0}, NULL, 8) = 0 | |
rt_sigprocmask(SIG_UNBLOCK, [RTMIN RT_1], NULL, 8) = 0 | |
prlimit64(0, RLIMIT_STACK, NULL, {rlim_cur=8192*1024, rlim_max=RLIM64_INFINITY}) = 0 | |
brk(NULL) = 0x622000 | |
brk(0x643000) = 0x643000 | |
futex(0x7204b1f7467c, FUTEX_WAKE_PRIVATE, 2147483647) = 0 | |
futex(0x7204b1f74688, FUTEX_WAKE_PRIVATE, 2147483647) = 0 | |
ioctl(2, TCGETS, {B38400 opost isig icanon echo ...}) = 0 | |
getpid() = 10245 | |
open("/sys/devices/system/cpu/online", O_RDONLY|O_CLOEXEC) = 3 | |
read(3, "0-7\n", 8192) = 4 | |
close(3) = 0 | |
getuid() = 0 | |
lstat("/etc/ssl/certs/ca-certificates.crt", {st_mode=S_IFLNK|0777, st_size=41, ...}) = 0 | |
openat(AT_FDCWD, "/etc/nix/nix.conf", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=486, ...}) = 0 | |
read(3, "# WARNING: this file is generated from the nix.* options in\n# your NixOS configuration, typically\n# /etc/nixos/configuration.nix. Do not edit it!\nbuild-users-group = nixbld\nmax-jobs = 8\ncores = 1\nsandbox = true\nextra-sandbox-paths = \nsubstituters = https://cache.nixos.org/\ntrusted-substituters = \n"..., 486) = 486 | |
close(3) = 0 | |
futex(0x7204b2405540, FUTEX_WAKE_PRIVATE, 2147483647) = 0 | |
openat(AT_FDCWD, "/root/.config/nix/nix.conf", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
futex(0x7204b18aa6f0, FUTEX_WAKE_PRIVATE, 2147483647) = 0 | |
ioctl(1, TIOCGWINSZ, 0x7fff8de758c0) = -1 ENOTTY (Inappropriate ioctl for device) | |
rt_sigprocmask(SIG_BLOCK, NULL, [], 8) = 0 | |
rt_sigprocmask(SIG_BLOCK, [HUP INT PIPE TERM WINCH], NULL, 8) = 0 | |
mmap(NULL, 8392704, PROT_NONE, MAP_PRIVATE|MAP_ANONYMOUS|MAP_STACK, -1, 0) = 0x7204ad47c000 | |
mprotect(0x7204ad47d000, 8388608, PROT_READ|PROT_WRITE) = 0 | |
clone(child_stack=0x7204adc7bb30, flags=CLONE_VM|CLONE_FS|CLONE_FILES|CLONE_SIGHAND|CLONE_THREAD|CLONE_SYSVSEM|CLONE_SETTLS|CLONE_PARENT_SETTID|CLONE_CHILD_CLEARTID, parent_tidptr=0x7204adc7c9d0, tls=0x7204adc7c700, child_tidptr=0x7204adc7c9d0) = 10246 | |
rt_sigaction(SIGCHLD, {sa_handler=SIG_DFL, sa_mask=[], sa_flags=SA_RESTORER, sa_restorer=0x7204b1488dd0}, NULL, 8) = 0 | |
rt_sigaction(SIGUSR1, {sa_handler=0x7204b27f51d0, sa_mask=[], sa_flags=SA_RESTORER, sa_restorer=0x7204b1488dd0}, NULL, 8) = 0 | |
sigaltstack({ss_sp=0x63e0a0, ss_flags=0, ss_size=18432}, NULL) = 0 | |
rt_sigaction(SIGSEGV, {sa_handler=0x7204b2803ca0, sa_mask=~[RTMIN RT_1], sa_flags=SA_RESTORER|SA_ONSTACK|SA_SIGINFO, sa_restorer=0x7204b1488dd0}, NULL, 8) = 0 | |
umask(022) = 022 | |
brk(0x664000) = 0x664000 | |
lstat("/tmp/nixos-rebuild.n0BS6e/nix.drv", {st_mode=S_IFLNK|0777, st_size=71, ...}) = 0 | |
readlink("/tmp/nixos-rebuild.n0BS6e/nix.drv", "/nix/store/9pdynd4vy0hjkfgs6yrfwyn9pnm0rmhl-nix-2.0pre5968_a6c0b773.drv", 1024) = 71 | |
socket(AF_UNIX, SOCK_STREAM|SOCK_CLOEXEC, 0) = 3 | |
fcntl(3, F_GETFD) = 0x1 (flags FD_CLOEXEC) | |
fcntl(3, F_SETFD, FD_CLOEXEC) = 0 | |
connect(3, {sa_family=AF_UNIX, sun_path="/nix/var/nix/daemon-socket/socket"}, 110) = 0 | |
write(3, "cxin\0\0\0\0", 8) = 8 | |
read(3, "oixd\0\0\0\0\24\1\0\0\0\0\0\0", 32768) = 16 | |
sched_getaffinity(0, 128, [0, 1, 2, 3, 4, 5, 6, 7]) = 48 | |
sched_setaffinity(0, 128, [1]) = 0 | |
write(3, "\24\1\0\0\0\0\0\0\1\0\0\0\0\0\0\0\1\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0", 32) = 32 | |
read(3, "stla\0\0\0\0", 32768) = 8 | |
write(3, "\23\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\1\0\0\0\0\0\0\0\10\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\1\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\1\0\0\0\0\0\0\0\1\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0", 112) = 112 | |
read(3, "stla\0\0\0\0", 32768) = 8 | |
write(3, "(\0\0\0\0\0\0\0\1\0\0\0\0\0\0\0K\0\0\0\0\0\0\0/nix/store/9pdynd4vy0hjkfgs6yrfwyn9pnm0rmhl-nix-2.0pre5968_a6c0b773.drv!out\0\0\0\0\0", 104) = 104 | |
read(3, "TRTS\0\0\0\0\0\0\0\0\333'\0\0\4\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0!\0\0\0\0\0\0\0querying info about missing paths\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0", 32768) = 96 | |
read(3, "POTS\0\0\0\0\0\0\0\0\333'\0\0stla\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0", 32768) = 64 | |
write(3, "\t\0\0\0\0\0\0\0\1\0\0\0\0\0\0\0K\0\0\0\0\0\0\0/nix/store/9pdynd4vy0hjkfgs6yrfwyn9pnm0rmhl-nix-2.0pre5968_a6c0b773.drv!out\0\0\0\0\0\0\0\0\0\0\0\0\0", 112) = 112 | |
read(3, "TRTS\0\0\0\0\1\0\0\0\333'\0\0\0\0\0\0\0\0\0\0f\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0", 32768) = 56 | |
read(3, "TRTS\0\0\0\0\2\0\0\0\333'\0\0\0\0\0\0\0\0\0\0h\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0TRTS\0\0\0\0\3\0\0\0\333'\0\0\0\0\0\0\0\0\0\0g\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0TRTS\0\0\0\0\4\0\0\0\333'\0\0\4\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0!\0\0\0\0\0\0\0querying info about missing paths\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0", 32768) = 208 | |
read(3, "POTS\0\0\0\0\4\0\0\0\333'\0\0", 32768) = 16 | |
read(3, "TLSR\0\0\0\0\2\0\0\0\333'\0\0i\0\0\0\0\0\0\0\4\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\1\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0TLSR\0\0\0\0\3\0\0\0\333'\0\0i\0\0\0\0\0\0\0\4\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0TLSR\0\0\0\0\1\0\0\0\333'\0\0j\0\0\0\0\0\0\0\2\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0e\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0TLSR\0\0\0\0\1\0\0\0\333'\0\0j\0\0\0\0\0\0\0\2\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0d\0\0\0"..., 32768) = 320 | |
read(3, "TLSR\0\0\0\0\2\0\0\0\333'\0\0i\0\0\0\0\0\0\0\4\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0", 32768) = 96 | |
read(3, "TLSR\0\0\0\0\3\0\0\0\333'\0\0i\0\0\0\0\0\0\0\4\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0TLSR\0\0\0\0\1\0\0\0\333'\0\0j\0\0\0\0\0\0\0\2\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0e\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0TLSR\0\0\0\0\1\0\0\0\333'\0\0j\0\0\0\0\0\0\0\2\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0d\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0POTS\0\0\0\0\3\0\0\0\333'\0\0POTS\0\0\0\0\2\0\0\0\333'\0\0POTS\0\0\0\0\1\0\0\0\333'\0\0stla\0\0\0\0\1\0\0\0\0\0\0\0", 32768) = 288 | |
write(3, "\n\0\0\0\0\0\0\0G\0\0\0\0\0\0\0/nix/store/9pdynd4vy0hjkfgs6yrfwyn9pnm0rmhl-nix-2.0pre5968_a6c0b773.drv\0", 88) = 88 | |
read(3, "stla\0\0\0\0\1\0\0\0\0\0\0\0", 32768) = 16 | |
write(3, "\1\0\0\0\0\0\0\0G\0\0\0\0\0\0\0/nix/store/9pdynd4vy0hjkfgs6yrfwyn9pnm0rmhl-nix-2.0pre5968_a6c0b773.drv\0", 88) = 88 | |
read(3, "stla\0\0\0\0\1\0\0\0\0\0\0\0", 32768) = 16 | |
openat(AT_FDCWD, "/nix/store/9pdynd4vy0hjkfgs6yrfwyn9pnm0rmhl-nix-2.0pre5968_a6c0b773.drv", O_RDONLY|O_CLOEXEC) = 4 | |
fstat(4, {st_mode=S_IFREG|0444, st_size=5214, ...}) = 0 | |
read(4, "Derive([(\"debug\",\"/nix/store/a61fri65dk5b8pldwczl7sxsda6hvml0-nix-2.0pre5968_a6c0b773-debug\",\"\",\"\"),(\"dev\",\"/nix/store/y94p0vsl9z6q571nqrr3wjisjyn7i8bm-nix-2.0pre5968_a6c0b773-dev\",\"\",\"\"),(\"doc\",\"/nix/store/wb2gc3p2b0dybr2ph6d0bdyzx06m0dl5-nix-2.0pre5968_a6c0b773-doc\",\"\",\"\"),(\"man\",\"/nix/store/ahii4"..., 5214) = 5214 | |
close(4) = 0 | |
lstat("/tmp/nixos-rebuild.n0BS6e/nix", 0x7fff8de744a0) = -1 ENOENT (No such file or directory) | |
lstat("/tmp/nixos-rebuild.n0BS6e", {st_mode=S_IFDIR|0700, st_size=3, ...}) = 0 | |
getpid() = 10245 | |
symlink("/nix/store/r8zhwq9xylxw8a823kpvqy0kfqq4g52f-nix-2.0pre5968_a6c0b773", "/tmp/nixos-rebuild.n0BS6e/nix.tmp-10245-213095760") = 0 | |
rename("/tmp/nixos-rebuild.n0BS6e/nix.tmp-10245-213095760", "/tmp/nixos-rebuild.n0BS6e/nix") = 0 | |
write(3, "\f\0\0\0\0\0\0\0\35\0\0\0\0\0\0\0/tmp/nixos-rebuild.n0BS6e/nix\0\0\0", 48) = 48 | |
read(3, "stla\0\0\0\0\1\0\0\0\0\0\0\0", 32768) = 16 | |
write(3, "\r\0\0\0\0\0\0\0", 8) = 8 | |
read(3, "stla\0\0\0\0\1\0\0\0\0\0\0\0", 32768) = 16 | |
fstat(1, {st_mode=S_IFCHR|0666, st_rdev=makedev(1, 3), ...}) = 0 | |
ioctl(1, TCGETS, 0x7fff8de75260) = -1 ENOTTY (Inappropriate ioctl for device) | |
close(3) = 0 | |
write(1, "/tmp/nixos-rebuild.n0BS6e/nix\n", 30) = 30 | |
exit_group(0) = ? | |
+++ exited with 0 +++ |
set_robust_list(0x7204adc7c9e0, 24) = 0 | |
rt_sigtimedwait([HUP INT PIPE TERM WINCH], NULL, NULL, 8 <unfinished ...>) = ? | |
+++ exited with 0 +++ |
getpid() = 10249 | |
close(255) = 0 | |
rt_sigprocmask(SIG_SETMASK, [], NULL, 8) = 0 | |
rt_sigaction(SIGTSTP, {sa_handler=SIG_DFL, sa_mask=[], sa_flags=SA_RESTORER, sa_restorer=0x7a48b0ca82d0}, {sa_handler=SIG_DFL, sa_mask=[], sa_flags=SA_RESTORER, sa_restorer=0x7a48b0ca82d0}, 8) = 0 | |
rt_sigaction(SIGTTIN, {sa_handler=SIG_DFL, sa_mask=[], sa_flags=SA_RESTORER, sa_restorer=0x7a48b0ca82d0}, {sa_handler=SIG_DFL, sa_mask=[], sa_flags=SA_RESTORER, sa_restorer=0x7a48b0ca82d0}, 8) = 0 | |
rt_sigaction(SIGTTOU, {sa_handler=SIG_DFL, sa_mask=[], sa_flags=SA_RESTORER, sa_restorer=0x7a48b0ca82d0}, {sa_handler=SIG_DFL, sa_mask=[], sa_flags=SA_RESTORER, sa_restorer=0x7a48b0ca82d0}, 8) = 0 | |
rt_sigaction(SIGINT, {sa_handler=SIG_DFL, sa_mask=[], sa_flags=SA_RESTORER, sa_restorer=0x7a48b0ca82d0}, {sa_handler=0x45b320, sa_mask=[], sa_flags=SA_RESTORER, sa_restorer=0x7a48b0ca82d0}, 8) = 0 | |
rt_sigaction(SIGQUIT, {sa_handler=SIG_DFL, sa_mask=[], sa_flags=SA_RESTORER, sa_restorer=0x7a48b0ca82d0}, {sa_handler=SIG_IGN, sa_mask=[], sa_flags=SA_RESTORER, sa_restorer=0x7a48b0ca82d0}, 8) = 0 | |
rt_sigaction(SIGCHLD, {sa_handler=SIG_DFL, sa_mask=[], sa_flags=SA_RESTORER|SA_RESTART, sa_restorer=0x7a48b0ca82d0}, {sa_handler=0x441ad0, sa_mask=[], sa_flags=SA_RESTORER|SA_RESTART, sa_restorer=0x7a48b0ca82d0}, 8) = 0 | |
rt_sigaction(SIGCHLD, {sa_handler=0x441ad0, sa_mask=[], sa_flags=SA_RESTORER|SA_RESTART, sa_restorer=0x7a48b0ca82d0}, {sa_handler=SIG_DFL, sa_mask=[], sa_flags=SA_RESTORER|SA_RESTART, sa_restorer=0x7a48b0ca82d0}, 8) = 0 | |
rt_sigaction(SIGINT, {sa_handler=0x45b320, sa_mask=[], sa_flags=SA_RESTORER, sa_restorer=0x7a48b0ca82d0}, {sa_handler=SIG_DFL, sa_mask=[], sa_flags=SA_RESTORER, sa_restorer=0x7a48b0ca82d0}, 8) = 0 | |
dup2(4, 1) = 1 | |
close(4) = 0 | |
close(3) = 0 | |
rt_sigprocmask(SIG_BLOCK, NULL, [], 8) = 0 | |
brk(0x73b000) = 0x73b000 | |
stat(".", {st_mode=S_IFDIR|0700, st_size=29, ...}) = 0 | |
stat("/tmp/nixos-rebuild.n0BS6e/nix/bin/nix-build", {st_mode=S_IFREG|0555, st_size=319096, ...}) = 0 | |
stat("/tmp/nixos-rebuild.n0BS6e/nix/bin/nix-build", {st_mode=S_IFREG|0555, st_size=319096, ...}) = 0 | |
geteuid() = 0 | |
getegid() = 0 | |
getuid() = 0 | |
getgid() = 0 | |
access("/tmp/nixos-rebuild.n0BS6e/nix/bin/nix-build", X_OK) = 0 | |
stat("/tmp/nixos-rebuild.n0BS6e/nix/bin/nix-build", {st_mode=S_IFREG|0555, st_size=319096, ...}) = 0 | |
geteuid() = 0 | |
getegid() = 0 | |
getuid() = 0 | |
getgid() = 0 | |
access("/tmp/nixos-rebuild.n0BS6e/nix/bin/nix-build", R_OK) = 0 | |
stat("/tmp/nixos-rebuild.n0BS6e/nix/bin/nix-build", {st_mode=S_IFREG|0555, st_size=319096, ...}) = 0 | |
stat("/tmp/nixos-rebuild.n0BS6e/nix/bin/nix-build", {st_mode=S_IFREG|0555, st_size=319096, ...}) = 0 | |
geteuid() = 0 | |
getegid() = 0 | |
getuid() = 0 | |
getgid() = 0 | |
access("/tmp/nixos-rebuild.n0BS6e/nix/bin/nix-build", X_OK) = 0 | |
stat("/tmp/nixos-rebuild.n0BS6e/nix/bin/nix-build", {st_mode=S_IFREG|0555, st_size=319096, ...}) = 0 | |
geteuid() = 0 | |
getegid() = 0 | |
getuid() = 0 | |
getgid() = 0 | |
access("/tmp/nixos-rebuild.n0BS6e/nix/bin/nix-build", R_OK) = 0 | |
rt_sigprocmask(SIG_BLOCK, [INT CHLD], [], 8) = 0 | |
clone(child_stack=NULL, flags=CLONE_CHILD_CLEARTID|CLONE_CHILD_SETTID|SIGCHLD, child_tidptr=0x7a48b1449a10) = 10250 | |
rt_sigprocmask(SIG_SETMASK, [], NULL, 8) = 0 | |
rt_sigprocmask(SIG_BLOCK, [CHLD], [], 8) = 0 | |
rt_sigprocmask(SIG_SETMASK, [], NULL, 8) = 0 | |
rt_sigprocmask(SIG_BLOCK, [CHLD], [], 8) = 0 | |
rt_sigaction(SIGINT, {sa_handler=0x43e300, sa_mask=[], sa_flags=SA_RESTORER, sa_restorer=0x7a48b0ca82d0}, {sa_handler=0x45b320, sa_mask=[], sa_flags=SA_RESTORER, sa_restorer=0x7a48b0ca82d0}, 8) = 0 | |
wait4(-1, [{WIFEXITED(s) && WEXITSTATUS(s) == 1}], 0, NULL) = 10250 | |
rt_sigaction(SIGINT, {sa_handler=0x45b320, sa_mask=[], sa_flags=SA_RESTORER, sa_restorer=0x7a48b0ca82d0}, {sa_handler=0x43e300, sa_mask=[], sa_flags=SA_RESTORER, sa_restorer=0x7a48b0ca82d0}, 8) = 0 | |
rt_sigprocmask(SIG_SETMASK, [], NULL, 8) = 0 | |
--- SIGCHLD {si_signo=SIGCHLD, si_code=CLD_EXITED, si_pid=10250, si_uid=0, si_status=1, si_utime=287, si_stime=35} --- | |
wait4(-1, 0x7fffe5592550, WNOHANG, NULL) = -1 ECHILD (No child processes) | |
rt_sigreturn({mask=[]}) = 0 | |
exit_group(1) = ? | |
+++ exited with 1 +++ |
getpid() = 10250 | |
rt_sigprocmask(SIG_SETMASK, [], NULL, 8) = 0 | |
rt_sigaction(SIGTSTP, {sa_handler=SIG_DFL, sa_mask=[], sa_flags=SA_RESTORER, sa_restorer=0x7a48b0ca82d0}, {sa_handler=SIG_DFL, sa_mask=[], sa_flags=SA_RESTORER, sa_restorer=0x7a48b0ca82d0}, 8) = 0 | |
rt_sigaction(SIGTTIN, {sa_handler=SIG_DFL, sa_mask=[], sa_flags=SA_RESTORER, sa_restorer=0x7a48b0ca82d0}, {sa_handler=SIG_DFL, sa_mask=[], sa_flags=SA_RESTORER, sa_restorer=0x7a48b0ca82d0}, 8) = 0 | |
rt_sigaction(SIGTTOU, {sa_handler=SIG_DFL, sa_mask=[], sa_flags=SA_RESTORER, sa_restorer=0x7a48b0ca82d0}, {sa_handler=SIG_DFL, sa_mask=[], sa_flags=SA_RESTORER, sa_restorer=0x7a48b0ca82d0}, 8) = 0 | |
rt_sigaction(SIGHUP, {sa_handler=SIG_DFL, sa_mask=[], sa_flags=SA_RESTORER, sa_restorer=0x7a48b0ca82d0}, NULL, 8) = 0 | |
rt_sigaction(SIGILL, {sa_handler=SIG_DFL, sa_mask=[], sa_flags=SA_RESTORER, sa_restorer=0x7a48b0ca82d0}, NULL, 8) = 0 | |
rt_sigaction(SIGTRAP, {sa_handler=SIG_DFL, sa_mask=[], sa_flags=SA_RESTORER, sa_restorer=0x7a48b0ca82d0}, NULL, 8) = 0 | |
rt_sigaction(SIGABRT, {sa_handler=SIG_DFL, sa_mask=[], sa_flags=SA_RESTORER, sa_restorer=0x7a48b0ca82d0}, NULL, 8) = 0 | |
rt_sigaction(SIGFPE, {sa_handler=SIG_DFL, sa_mask=[], sa_flags=SA_RESTORER, sa_restorer=0x7a48b0ca82d0}, NULL, 8) = 0 | |
rt_sigaction(SIGBUS, {sa_handler=SIG_DFL, sa_mask=[], sa_flags=SA_RESTORER, sa_restorer=0x7a48b0ca82d0}, NULL, 8) = 0 | |
rt_sigaction(SIGSEGV, {sa_handler=SIG_DFL, sa_mask=[], sa_flags=SA_RESTORER, sa_restorer=0x7a48b0ca82d0}, NULL, 8) = 0 | |
rt_sigaction(SIGSYS, {sa_handler=SIG_DFL, sa_mask=[], sa_flags=SA_RESTORER, sa_restorer=0x7a48b0ca82d0}, NULL, 8) = 0 | |
rt_sigaction(SIGPIPE, {sa_handler=SIG_DFL, sa_mask=[], sa_flags=SA_RESTORER, sa_restorer=0x7a48b0ca82d0}, NULL, 8) = 0 | |
rt_sigaction(SIGALRM, {sa_handler=SIG_DFL, sa_mask=[], sa_flags=SA_RESTORER, sa_restorer=0x7a48b0ca82d0}, NULL, 8) = 0 | |
rt_sigaction(SIGTERM, {sa_handler=SIG_DFL, sa_mask=[], sa_flags=SA_RESTORER, sa_restorer=0x7a48b0ca82d0}, NULL, 8) = 0 | |
rt_sigaction(SIGXCPU, {sa_handler=SIG_DFL, sa_mask=[], sa_flags=SA_RESTORER, sa_restorer=0x7a48b0ca82d0}, NULL, 8) = 0 | |
rt_sigaction(SIGXFSZ, {sa_handler=SIG_DFL, sa_mask=[], sa_flags=SA_RESTORER, sa_restorer=0x7a48b0ca82d0}, NULL, 8) = 0 | |
rt_sigaction(SIGVTALRM, {sa_handler=SIG_DFL, sa_mask=[], sa_flags=SA_RESTORER, sa_restorer=0x7a48b0ca82d0}, NULL, 8) = 0 | |
rt_sigaction(SIGUSR1, {sa_handler=SIG_DFL, sa_mask=[], sa_flags=SA_RESTORER, sa_restorer=0x7a48b0ca82d0}, NULL, 8) = 0 | |
rt_sigaction(SIGUSR2, {sa_handler=SIG_DFL, sa_mask=[], sa_flags=SA_RESTORER, sa_restorer=0x7a48b0ca82d0}, NULL, 8) = 0 | |
rt_sigaction(SIGINT, {sa_handler=SIG_DFL, sa_mask=[], sa_flags=SA_RESTORER, sa_restorer=0x7a48b0ca82d0}, {sa_handler=0x45b320, sa_mask=[], sa_flags=SA_RESTORER, sa_restorer=0x7a48b0ca82d0}, 8) = 0 | |
rt_sigaction(SIGQUIT, {sa_handler=SIG_DFL, sa_mask=[], sa_flags=SA_RESTORER, sa_restorer=0x7a48b0ca82d0}, {sa_handler=SIG_DFL, sa_mask=[], sa_flags=SA_RESTORER, sa_restorer=0x7a48b0ca82d0}, 8) = 0 | |
rt_sigaction(SIGCHLD, {sa_handler=SIG_DFL, sa_mask=[], sa_flags=SA_RESTORER|SA_RESTART, sa_restorer=0x7a48b0ca82d0}, {sa_handler=0x441ad0, sa_mask=[], sa_flags=SA_RESTORER|SA_RESTART, sa_restorer=0x7a48b0ca82d0}, 8) = 0 | |
execve("/tmp/nixos-rebuild.n0BS6e/nix/bin/nix-build", ["nix-build", "<nixpkgs/nixos>", "-A", "system", "-k"], 0x71e008 /* 51 vars */) = 0 | |
brk(NULL) = 0x63e000 | |
mmap(NULL, 8192, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) = 0x76ffc6caf000 | |
access("/etc/ld-nix.so.preload", R_OK) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/r8zhwq9xylxw8a823kpvqy0kfqq4g52f-nix-2.0pre5968_a6c0b773/lib/tls/x86_64/x86_64/libnixmain.so", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
stat("/nix/store/r8zhwq9xylxw8a823kpvqy0kfqq4g52f-nix-2.0pre5968_a6c0b773/lib/tls/x86_64/x86_64", 0x7ffdbd8a4a00) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/r8zhwq9xylxw8a823kpvqy0kfqq4g52f-nix-2.0pre5968_a6c0b773/lib/tls/x86_64/libnixmain.so", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
stat("/nix/store/r8zhwq9xylxw8a823kpvqy0kfqq4g52f-nix-2.0pre5968_a6c0b773/lib/tls/x86_64", 0x7ffdbd8a4a00) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/r8zhwq9xylxw8a823kpvqy0kfqq4g52f-nix-2.0pre5968_a6c0b773/lib/tls/x86_64/libnixmain.so", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
stat("/nix/store/r8zhwq9xylxw8a823kpvqy0kfqq4g52f-nix-2.0pre5968_a6c0b773/lib/tls/x86_64", 0x7ffdbd8a4a00) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/r8zhwq9xylxw8a823kpvqy0kfqq4g52f-nix-2.0pre5968_a6c0b773/lib/tls/libnixmain.so", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
stat("/nix/store/r8zhwq9xylxw8a823kpvqy0kfqq4g52f-nix-2.0pre5968_a6c0b773/lib/tls", 0x7ffdbd8a4a00) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/r8zhwq9xylxw8a823kpvqy0kfqq4g52f-nix-2.0pre5968_a6c0b773/lib/x86_64/x86_64/libnixmain.so", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
stat("/nix/store/r8zhwq9xylxw8a823kpvqy0kfqq4g52f-nix-2.0pre5968_a6c0b773/lib/x86_64/x86_64", 0x7ffdbd8a4a00) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/r8zhwq9xylxw8a823kpvqy0kfqq4g52f-nix-2.0pre5968_a6c0b773/lib/x86_64/libnixmain.so", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
stat("/nix/store/r8zhwq9xylxw8a823kpvqy0kfqq4g52f-nix-2.0pre5968_a6c0b773/lib/x86_64", 0x7ffdbd8a4a00) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/r8zhwq9xylxw8a823kpvqy0kfqq4g52f-nix-2.0pre5968_a6c0b773/lib/x86_64/libnixmain.so", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
stat("/nix/store/r8zhwq9xylxw8a823kpvqy0kfqq4g52f-nix-2.0pre5968_a6c0b773/lib/x86_64", 0x7ffdbd8a4a00) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/r8zhwq9xylxw8a823kpvqy0kfqq4g52f-nix-2.0pre5968_a6c0b773/lib/libnixmain.so", O_RDONLY|O_CLOEXEC) = 3 | |
read(3, "\177ELF\2\1\1\0\0\0\0\0\0\0\0\0\3\0>\0\1\0\0\0\200\220\0\0\0\0\0\0@\0\0\0\0\0\0\0\200\204\2\0\0\0\0\0\0\0\0\0@\0008\0\10\0@\0\34\0\33\0\1\0\0\0\5\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\362\350\1\0\0\0\0\0\362\350\1\0\0\0\0\0\0\0 \0\0\0\0\0\1\0\0\0\6\0\0\0x\362\1\0\0\0\0\0x\362!\0\0\0\0\0x\362!\0\0\0\0\0\310\r\0\0\0\0\0\0X\22\0\0\0\0\0\0\0\0 \0\0\0\0\0\2\0\0\0\6\0\0\0\240\366\1\0\0\0\0\0\240\366!\0\0\0\0\0\240\366!\0\0\0\0\0@\2\0\0\0\0\0\0@\2\0\0\0\0\0\0\10\0\0\0\0\0\0\0\4\0\0\0\4\0\0\0\0\2\0\0\0\0\0\0\0\2\0\0\0\0\0\0\0\2\0\0\0\0\0\0$\0\0\0\0\0\0\0$\0\0\0\0\0\0\0\4\0\0\0\0\0\0\0P\345td\4\0\0\0\200\300\1\0"..., 832) = 832 | |
fstat(3, {st_mode=S_IFREG|0555, st_size=166784, ...}) = 0 | |
mmap(NULL, 2229456, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) = 0x76ffc686c000 | |
mprotect(0x76ffc688b000, 2097152, PROT_NONE) = 0 | |
mmap(0x76ffc6a8b000, 8192, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0x1f000) = 0x76ffc6a8b000 | |
close(3) = 0 | |
openat(AT_FDCWD, "/nix/store/r8zhwq9xylxw8a823kpvqy0kfqq4g52f-nix-2.0pre5968_a6c0b773/lib/libnixexpr.so", O_RDONLY|O_CLOEXEC) = 3 | |
read(3, "\177ELF\2\1\1\3\0\0\0\0\0\0\0\0\3\0>\0\1\0\0\0\320\334\2\0\0\0\0\0@\0\0\0\0\0\0\0\330\v\21\0\0\0\0\0\0\0\0\0@\0008\0\10\0@\0\34\0\33\0\1\0\0\0\5\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\33\26\16\0\0\0\0\0\33\26\16\0\0\0\0\0\0\0 \0\0\0\0\0\1\0\0\0\6\0\0\0h\31\16\0\0\0\0\0h\31.\0\0\0\0\0h\31.\0\0\0\0\0\0;\0\0\0\0\0\0\330?\0\0\0\0\0\0\0\0 \0\0\0\0\0\2\0\0\0\6\0\0\00001\16\0\0\0\0\00001.\0\0\0\0\00001.\0\0\0\0\0`\2\0\0\0\0\0\0`\2\0\0\0\0\0\0\10\0\0\0\0\0\0\0\4\0\0\0\4\0\0\0\0\2\0\0\0\0\0\0\0\2\0\0\0\0\0\0\0\2\0\0\0\0\0\0$\0\0\0\0\0\0\0$\0\0\0\0\0\0\0\4\0\0\0\0\0\0\0P\345td\4\0\0\0`s\f\0"..., 832) = 832 | |
fstat(3, {st_mode=S_IFREG|0555, st_size=1118936, ...}) = 0 | |
mmap(NULL, 3037504, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) = 0x76ffc6586000 | |
mprotect(0x76ffc6668000, 2093056, PROT_NONE) = 0 | |
mmap(0x76ffc6867000, 20480, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0xe1000) = 0x76ffc6867000 | |
close(3) = 0 | |
openat(AT_FDCWD, "/nix/store/r8zhwq9xylxw8a823kpvqy0kfqq4g52f-nix-2.0pre5968_a6c0b773/lib/libgc.so.1", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/dn852vplccs5w0qc3dnlfyma8b7b408d-boehm-gc-7.6.4/lib/tls/x86_64/x86_64/libgc.so.1", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
stat("/nix/store/dn852vplccs5w0qc3dnlfyma8b7b408d-boehm-gc-7.6.4/lib/tls/x86_64/x86_64", 0x7ffdbd8a49a0) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/dn852vplccs5w0qc3dnlfyma8b7b408d-boehm-gc-7.6.4/lib/tls/x86_64/libgc.so.1", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
stat("/nix/store/dn852vplccs5w0qc3dnlfyma8b7b408d-boehm-gc-7.6.4/lib/tls/x86_64", 0x7ffdbd8a49a0) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/dn852vplccs5w0qc3dnlfyma8b7b408d-boehm-gc-7.6.4/lib/tls/x86_64/libgc.so.1", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
stat("/nix/store/dn852vplccs5w0qc3dnlfyma8b7b408d-boehm-gc-7.6.4/lib/tls/x86_64", 0x7ffdbd8a49a0) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/dn852vplccs5w0qc3dnlfyma8b7b408d-boehm-gc-7.6.4/lib/tls/libgc.so.1", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
stat("/nix/store/dn852vplccs5w0qc3dnlfyma8b7b408d-boehm-gc-7.6.4/lib/tls", 0x7ffdbd8a49a0) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/dn852vplccs5w0qc3dnlfyma8b7b408d-boehm-gc-7.6.4/lib/x86_64/x86_64/libgc.so.1", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
stat("/nix/store/dn852vplccs5w0qc3dnlfyma8b7b408d-boehm-gc-7.6.4/lib/x86_64/x86_64", 0x7ffdbd8a49a0) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/dn852vplccs5w0qc3dnlfyma8b7b408d-boehm-gc-7.6.4/lib/x86_64/libgc.so.1", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
stat("/nix/store/dn852vplccs5w0qc3dnlfyma8b7b408d-boehm-gc-7.6.4/lib/x86_64", 0x7ffdbd8a49a0) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/dn852vplccs5w0qc3dnlfyma8b7b408d-boehm-gc-7.6.4/lib/x86_64/libgc.so.1", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
stat("/nix/store/dn852vplccs5w0qc3dnlfyma8b7b408d-boehm-gc-7.6.4/lib/x86_64", 0x7ffdbd8a49a0) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/dn852vplccs5w0qc3dnlfyma8b7b408d-boehm-gc-7.6.4/lib/libgc.so.1", O_RDONLY|O_CLOEXEC) = 3 | |
read(3, "\177ELF\2\1\1\0\0\0\0\0\0\0\0\0\3\0>\0\1\0\0\0\300a\0\0\0\0\0\0@\0\0\0\0\0\0\0\250\10\3\0\0\0\0\0\0\0\0\0@\0008\0\t\0@\0\34\0\33\0\1\0\0\0\5\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\354c\2\0\0\0\0\0\354c\2\0\0\0\0\0\0\0 \0\0\0\0\0\1\0\0\0\6\0\0\0\320g\2\0\0\0\0\0\320g\"\0\0\0\0\0\320g\"\0\0\0\0\0D\f\0\0\0\0\0\0\320/\4\0\0\0\0\0\0\0 \0\0\0\0\0\2\0\0\0\6\0\0\0008h\2\0\0\0\0\0008h\"\0\0\0\0\0008h\"\0\0\0\0\0\0\2\0\0\0\0\0\0\0\2\0\0\0\0\0\0\10\0\0\0\0\0\0\0\4\0\0\0\4\0\0\0008\2\0\0\0\0\0\0008\2\0\0\0\0\0\0008\2\0\0\0\0\0\0$\0\0\0\0\0\0\0$\0\0\0\0\0\0\0\4\0\0\0\0\0\0\0\7\0\0\0\4\0\0\0\320g\2\0"..., 832) = 832 | |
fstat(3, {st_mode=S_IFREG|0555, st_size=200616, ...}) = 0 | |
mmap(NULL, 2529184, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) = 0x76ffc631c000 | |
mprotect(0x76ffc6343000, 2093056, PROT_NONE) = 0 | |
mmap(0x76ffc6542000, 8192, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0x26000) = 0x76ffc6542000 | |
mmap(0x76ffc6544000, 268192, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x76ffc6544000 | |
close(3) = 0 | |
openat(AT_FDCWD, "/nix/store/r8zhwq9xylxw8a823kpvqy0kfqq4g52f-nix-2.0pre5968_a6c0b773/lib/libnixstore.so", O_RDONLY|O_CLOEXEC) = 3 | |
read(3, "\177ELF\2\1\1\3\0\0\0\0\0\0\0\0\3\0>\0\1\0\0\0000\355\6\0\0\0\0\0@\0\0\0\0\0\0\0\30R$\0\0\0\0\0\0\0\0\0@\0008\0\10\0@\0\34\0\33\0\1\0\0\0\5\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0DX\35\0\0\0\0\0DX\35\0\0\0\0\0\0\0 \0\0\0\0\0\1\0\0\0\6\0\0\0000[\35\0\0\0\0\0000[=\0\0\0\0\0000[=\0\0\0\0\0`\231\0\0\0\0\0\0\320\315\0\0\0\0\0\0\0\0 \0\0\0\0\0\2\0\0\0\6\0\0\0000\266\35\0\0\0\0\0000\266=\0\0\0\0\0000\266=\0\0\0\0\0\300\2\0\0\0\0\0\0\300\2\0\0\0\0\0\0\10\0\0\0\0\0\0\0\4\0\0\0\4\0\0\0\0\2\0\0\0\0\0\0\0\2\0\0\0\0\0\0\0\2\0\0\0\0\0\0$\0\0\0\0\0\0\0$\0\0\0\0\0\0\0\4\0\0\0\0\0\0\0P\345td\4\0\0\0\24K\32\0"..., 832) = 832 | |
fstat(3, {st_mode=S_IFREG|0555, st_size=2382104, ...}) = 0 | |
mmap(NULL, 4073728, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) = 0x76ffc5f39000 | |
mprotect(0x76ffc610f000, 2093056, PROT_NONE) = 0 | |
mmap(0x76ffc630e000, 45056, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0x1d5000) = 0x76ffc630e000 | |
mmap(0x76ffc6319000, 10496, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x76ffc6319000 | |
close(3) = 0 | |
openat(AT_FDCWD, "/nix/store/r8zhwq9xylxw8a823kpvqy0kfqq4g52f-nix-2.0pre5968_a6c0b773/lib/libnixutil.so", O_RDONLY|O_CLOEXEC) = 3 | |
read(3, "\177ELF\2\1\1\3\0\0\0\0\0\0\0\0\3\0>\0\1\0\0\0\220\211\2\0\0\0\0\0@\0\0\0\0\0\0\0@n\n\0\0\0\0\0\0\0\0\0@\0008\0\t\0@\0\35\0\34\0\1\0\0\0\5\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\266\4\10\0\0\0\0\0\266\4\10\0\0\0\0\0\0\0 \0\0\0\0\0\1\0\0\0\6\0\0\0P\21\10\0\0\0\0\0P\21(\0\0\0\0\0P\21(\0\0\0\0\0\350.\0\0\0\0\0\0X4\0\0\0\0\0\0\0\0 \0\0\0\0\0\2\0\0\0\6\0\0\0\250'\10\0\0\0\0\0\250'(\0\0\0\0\0\250'(\0\0\0\0\0\200\2\0\0\0\0\0\0\200\2\0\0\0\0\0\0\10\0\0\0\0\0\0\0\4\0\0\0\4\0\0\0008\2\0\0\0\0\0\0008\2\0\0\0\0\0\0008\2\0\0\0\0\0\0$\0\0\0\0\0\0\0$\0\0\0\0\0\0\0\4\0\0\0\0\0\0\0\7\0\0\0\4\0\0\0P\21\10\0"..., 832) = 832 | |
fstat(3, {st_mode=S_IFREG|0555, st_size=685440, ...}) = 0 | |
mmap(NULL, 2639272, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) = 0x76ffc5cb4000 | |
mprotect(0x76ffc5d35000, 2097152, PROT_NONE) = 0 | |
mmap(0x76ffc5f35000, 16384, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0x81000) = 0x76ffc5f35000 | |
close(3) = 0 | |
openat(AT_FDCWD, "/nix/store/r8zhwq9xylxw8a823kpvqy0kfqq4g52f-nix-2.0pre5968_a6c0b773/lib/libnixformat.so", O_RDONLY|O_CLOEXEC) = 3 | |
read(3, "\177ELF\2\1\1\0\0\0\0\0\0\0\0\0\3\0>\0\1\0\0\0\200%\0\0\0\0\0\0@\0\0\0\0\0\0\0x\263\0\0\0\0\0\0\0\0\0\0@\0008\0\10\0@\0\33\0\32\0\1\0\0\0\5\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\v\177\0\0\0\0\0\0\v\177\0\0\0\0\0\0\0\0 \0\0\0\0\0\1\0\0\0\6\0\0\0\370\213\0\0\0\0\0\0\370\213 \0\0\0\0\0\370\213 \0\0\0\0\0\30\4\0\0\0\0\0\0 \4\0\0\0\0\0\0\0\0 \0\0\0\0\0\2\0\0\0\6\0\0\0\10\214\0\0\0\0\0\0\10\214 \0\0\0\0\0\10\214 \0\0\0\0\0\0\2\0\0\0\0\0\0\0\2\0\0\0\0\0\0\10\0\0\0\0\0\0\0\4\0\0\0\4\0\0\0\0\2\0\0\0\0\0\0\0\2\0\0\0\0\0\0\0\2\0\0\0\0\0\0$\0\0\0\0\0\0\0$\0\0\0\0\0\0\0\4\0\0\0\0\0\0\0P\345td\4\0\0\0Ht\0\0"..., 832) = 832 | |
fstat(3, {st_mode=S_IFREG|0555, st_size=47672, ...}) = 0 | |
mmap(NULL, 8192, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) = 0x76ffc6cad000 | |
mmap(NULL, 2134040, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) = 0x76ffc5aaa000 | |
mprotect(0x76ffc5ab2000, 2097152, PROT_NONE) = 0 | |
mmap(0x76ffc5cb2000, 8192, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0x8000) = 0x76ffc5cb2000 | |
close(3) = 0 | |
openat(AT_FDCWD, "/nix/store/r8zhwq9xylxw8a823kpvqy0kfqq4g52f-nix-2.0pre5968_a6c0b773/lib/libstdc++.so.6", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/dn852vplccs5w0qc3dnlfyma8b7b408d-boehm-gc-7.6.4/lib/libstdc++.so.6", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/2kcrj1ksd2a14bm5sky182fv2xwfhfap-glibc-2.26-131/lib/tls/x86_64/x86_64/libstdc++.so.6", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
stat("/nix/store/2kcrj1ksd2a14bm5sky182fv2xwfhfap-glibc-2.26-131/lib/tls/x86_64/x86_64", 0x7ffdbd8a48e0) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/2kcrj1ksd2a14bm5sky182fv2xwfhfap-glibc-2.26-131/lib/tls/x86_64/libstdc++.so.6", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
stat("/nix/store/2kcrj1ksd2a14bm5sky182fv2xwfhfap-glibc-2.26-131/lib/tls/x86_64", 0x7ffdbd8a48e0) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/2kcrj1ksd2a14bm5sky182fv2xwfhfap-glibc-2.26-131/lib/tls/x86_64/libstdc++.so.6", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
stat("/nix/store/2kcrj1ksd2a14bm5sky182fv2xwfhfap-glibc-2.26-131/lib/tls/x86_64", 0x7ffdbd8a48e0) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/2kcrj1ksd2a14bm5sky182fv2xwfhfap-glibc-2.26-131/lib/tls/libstdc++.so.6", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
stat("/nix/store/2kcrj1ksd2a14bm5sky182fv2xwfhfap-glibc-2.26-131/lib/tls", 0x7ffdbd8a48e0) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/2kcrj1ksd2a14bm5sky182fv2xwfhfap-glibc-2.26-131/lib/x86_64/x86_64/libstdc++.so.6", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
stat("/nix/store/2kcrj1ksd2a14bm5sky182fv2xwfhfap-glibc-2.26-131/lib/x86_64/x86_64", 0x7ffdbd8a48e0) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/2kcrj1ksd2a14bm5sky182fv2xwfhfap-glibc-2.26-131/lib/x86_64/libstdc++.so.6", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
stat("/nix/store/2kcrj1ksd2a14bm5sky182fv2xwfhfap-glibc-2.26-131/lib/x86_64", 0x7ffdbd8a48e0) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/2kcrj1ksd2a14bm5sky182fv2xwfhfap-glibc-2.26-131/lib/x86_64/libstdc++.so.6", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
stat("/nix/store/2kcrj1ksd2a14bm5sky182fv2xwfhfap-glibc-2.26-131/lib/x86_64", 0x7ffdbd8a48e0) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/2kcrj1ksd2a14bm5sky182fv2xwfhfap-glibc-2.26-131/lib/libstdc++.so.6", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
stat("/nix/store/2kcrj1ksd2a14bm5sky182fv2xwfhfap-glibc-2.26-131/lib", {st_mode=S_IFDIR|0555, st_size=83, ...}) = 0 | |
openat(AT_FDCWD, "/nix/store/4zd34747fz0ggzzasy4icgn3lmy89pra-gcc-7.3.0-lib/lib/tls/x86_64/x86_64/libstdc++.so.6", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
stat("/nix/store/4zd34747fz0ggzzasy4icgn3lmy89pra-gcc-7.3.0-lib/lib/tls/x86_64/x86_64", 0x7ffdbd8a48e0) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/4zd34747fz0ggzzasy4icgn3lmy89pra-gcc-7.3.0-lib/lib/tls/x86_64/libstdc++.so.6", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
stat("/nix/store/4zd34747fz0ggzzasy4icgn3lmy89pra-gcc-7.3.0-lib/lib/tls/x86_64", 0x7ffdbd8a48e0) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/4zd34747fz0ggzzasy4icgn3lmy89pra-gcc-7.3.0-lib/lib/tls/x86_64/libstdc++.so.6", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
stat("/nix/store/4zd34747fz0ggzzasy4icgn3lmy89pra-gcc-7.3.0-lib/lib/tls/x86_64", 0x7ffdbd8a48e0) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/4zd34747fz0ggzzasy4icgn3lmy89pra-gcc-7.3.0-lib/lib/tls/libstdc++.so.6", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
stat("/nix/store/4zd34747fz0ggzzasy4icgn3lmy89pra-gcc-7.3.0-lib/lib/tls", 0x7ffdbd8a48e0) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/4zd34747fz0ggzzasy4icgn3lmy89pra-gcc-7.3.0-lib/lib/x86_64/x86_64/libstdc++.so.6", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
stat("/nix/store/4zd34747fz0ggzzasy4icgn3lmy89pra-gcc-7.3.0-lib/lib/x86_64/x86_64", 0x7ffdbd8a48e0) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/4zd34747fz0ggzzasy4icgn3lmy89pra-gcc-7.3.0-lib/lib/x86_64/libstdc++.so.6", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
stat("/nix/store/4zd34747fz0ggzzasy4icgn3lmy89pra-gcc-7.3.0-lib/lib/x86_64", 0x7ffdbd8a48e0) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/4zd34747fz0ggzzasy4icgn3lmy89pra-gcc-7.3.0-lib/lib/x86_64/libstdc++.so.6", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
stat("/nix/store/4zd34747fz0ggzzasy4icgn3lmy89pra-gcc-7.3.0-lib/lib/x86_64", 0x7ffdbd8a48e0) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/4zd34747fz0ggzzasy4icgn3lmy89pra-gcc-7.3.0-lib/lib/libstdc++.so.6", O_RDONLY|O_CLOEXEC) = 3 | |
read(3, "\177ELF\2\1\1\3\0\0\0\0\0\0\0\0\3\0>\0\1\0\0\0@\231\10\0\0\0\0\0@\0\0\0\0\0\0\0\220\302\27\0\0\0\0\0\0\0\0\0@\0008\0\10\0@\0\33\0\32\0\1\0\0\0\5\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\377\26\0\0\0\0\0\0\377\26\0\0\0\0\0\0\0 \0\0\0\0\0\1\0\0\0\6\0\0\0`\t\27\0\0\0\0\0`\t7\0\0\0\0\0`\t7\0\0\0\0\0\30\270\0\0\0\0\0\0\300\354\0\0\0\0\0\0\0\0 \0\0\0\0\0\2\0\0\0\6\0\0\0h\223\27\0\0\0\0\0h\2237\0\0\0\0\0h\2237\0\0\0\0\0 \2\0\0\0\0\0\0 \2\0\0\0\0\0\0\10\0\0\0\0\0\0\0\7\0\0\0\4\0\0\0`\t\27\0\0\0\0\0`\t7\0\0\0\0\0`\t7\0\0\0\0\0\0\0\0\0\0\0\0\0 \0\0\0\0\0\0\0\10\0\0\0\0\0\0\0P\345td\4\0\0\0\370\247\23\0"..., 832) = 832 | |
fstat(3, {st_mode=S_IFREG|0555, st_size=1558864, ...}) = 0 | |
mmap(NULL, 3667488, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) = 0x76ffc572a000 | |
mprotect(0x76ffc589a000, 2097152, PROT_NONE) = 0 | |
mmap(0x76ffc5a9a000, 53248, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0x170000) = 0x76ffc5a9a000 | |
mmap(0x76ffc5aa7000, 9760, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x76ffc5aa7000 | |
close(3) = 0 | |
openat(AT_FDCWD, "/nix/store/r8zhwq9xylxw8a823kpvqy0kfqq4g52f-nix-2.0pre5968_a6c0b773/lib/libm.so.6", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/dn852vplccs5w0qc3dnlfyma8b7b408d-boehm-gc-7.6.4/lib/libm.so.6", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/2kcrj1ksd2a14bm5sky182fv2xwfhfap-glibc-2.26-131/lib/libm.so.6", O_RDONLY|O_CLOEXEC) = 3 | |
read(3, "\177ELF\2\1\1\3\0\0\0\0\0\0\0\0\3\0>\0\1\0\0\0\300w\0\0\0\0\0\0@\0\0\0\0\0\0\0008\362\25\0\0\0\0\0\0\0\0\0@\0008\0\10\0@\0\37\0\34\0\1\0\0\0\5\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\200\242\24\0\0\0\0\0\200\242\24\0\0\0\0\0\0\0 \0\0\0\0\0\1\0\0\0\6\0\0\0\210\254\24\0\0\0\0\0\210\2544\0\0\0\0\0\210\2544\0\0\0\0\0\230\5\0\0\0\0\0\0\240\5\0\0\0\0\0\0\0\0 \0\0\0\0\0\2\0\0\0\6\0\0\0\240\254\24\0\0\0\0\0\240\2544\0\0\0\0\0\240\2544\0\0\0\0\0000\2\0\0\0\0\0\0000\2\0\0\0\0\0\0\10\0\0\0\0\0\0\0\4\0\0\0\4\0\0\0\0\2\0\0\0\0\0\0\0\2\0\0\0\0\0\0\0\2\0\0\0\0\0\0D\0\0\0\0\0\0\0D\0\0\0\0\0\0\0\4\0\0\0\0\0\0\0P\345td\4\0\0\0\244\334\23\0"..., 832) = 832 | |
fstat(3, {st_mode=S_IFREG|0555, st_size=1440248, ...}) = 0 | |
mmap(NULL, 3453480, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) = 0x76ffc53de000 | |
mprotect(0x76ffc5529000, 2093056, PROT_NONE) = 0 | |
mmap(0x76ffc5728000, 8192, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0x14a000) = 0x76ffc5728000 | |
close(3) = 0 | |
openat(AT_FDCWD, "/nix/store/r8zhwq9xylxw8a823kpvqy0kfqq4g52f-nix-2.0pre5968_a6c0b773/lib/libgcc_s.so.1", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/dn852vplccs5w0qc3dnlfyma8b7b408d-boehm-gc-7.6.4/lib/libgcc_s.so.1", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/2kcrj1ksd2a14bm5sky182fv2xwfhfap-glibc-2.26-131/lib/libgcc_s.so.1", O_RDONLY|O_CLOEXEC) = 3 | |
read(3, "\177ELF\2\1\1\0\0\0\0\0\0\0\0\0\3\0>\0\1\0\0\0\20+\0\0\0\0\0\0@\0\0\0\0\0\0\0\300\201\1\0\0\0\0\0\0\0\0\0@\0008\0\6\0@\0\35\0\32\0\1\0\0\0\5\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\fS\1\0\0\0\0\0\fS\1\0\0\0\0\0\0\0 \0\0\0\0\0\1\0\0\0\6\0\0\0\20S\1\0\0\0\0\0\20S!\0\0\0\0\0\20S!\0\0\0\0\0\320\3\0\0\0\0\0\0p\6\0\0\0\0\0\0\0\0 \0\0\0\0\0\2\0\0\0\6\0\0\0000S\1\0\0\0\0\0000S!\0\0\0\0\0000S!\0\0\0\0\0\0\2\0\0\0\0\0\0\0\2\0\0\0\0\0\0\10\0\0\0\0\0\0\0P\345td\4\0\0\00043\1\0\0\0\0\00043\1\0\0\0\0\00043\1\0\0\0\0\0D\5\0\0\0\0\0\0D\5\0\0\0\0\0\0\4\0\0\0\0\0\0\0Q\345td\6\0\0\0\0\0\0\0"..., 832) = 832 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=100608, ...}) = 0 | |
mmap(NULL, 2185600, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) = 0x76ffc51c8000 | |
mprotect(0x76ffc51de000, 2093056, PROT_NONE) = 0 | |
mmap(0x76ffc53dd000, 4096, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0x15000) = 0x76ffc53dd000 | |
close(3) = 0 | |
openat(AT_FDCWD, "/nix/store/r8zhwq9xylxw8a823kpvqy0kfqq4g52f-nix-2.0pre5968_a6c0b773/lib/libc.so.6", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/dn852vplccs5w0qc3dnlfyma8b7b408d-boehm-gc-7.6.4/lib/libc.so.6", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/2kcrj1ksd2a14bm5sky182fv2xwfhfap-glibc-2.26-131/lib/libc.so.6", O_RDONLY|O_CLOEXEC) = 3 | |
read(3, "\177ELF\2\1\1\3\0\0\0\0\0\0\0\0\3\0>\0\1\0\0\0@\21\2\0\0\0\0\0@\0\0\0\0\0\0\0Xn\36\0\0\0\0\0\0\0\0\0@\0008\0\v\0@\0H\0E\0\6\0\0\0\5\0\0\0@\0\0\0\0\0\0\0@\0\0\0\0\0\0\0@\0\0\0\0\0\0\0h\2\0\0\0\0\0\0h\2\0\0\0\0\0\0\10\0\0\0\0\0\0\0\3\0\0\0\4\0\0\0@\270\27\0\0\0\0\0@\270\27\0\0\0\0\0@\270\27\0\0\0\0\0T\0\0\0\0\0\0\0T\0\0\0\0\0\0\0 \0\0\0\0\0\0\0\1\0\0\0\5\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\204\204\32\0\0\0\0\0\204\204\32\0\0\0\0\0\0\0 \0\0\0\0\0\1\0\0\0\6\0\0\0\30\206\32\0\0\0\0\0\30\206:\0\0\0\0\0\30\206:\0\0\0\0\0\250P\0\0\0\0\0\0\350\222\0\0\0\0\0\0\0\0 \0\0\0\0\0\2\0\0\0\6\0\0\0\0\272\32\0"..., 832) = 832 | |
fstat(3, {st_mode=S_IFREG|0555, st_size=1998936, ...}) = 0 | |
mmap(NULL, 3873024, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) = 0x76ffc4e16000 | |
mprotect(0x76ffc4fbf000, 2093056, PROT_NONE) = 0 | |
mmap(0x76ffc51be000, 24576, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0x1a8000) = 0x76ffc51be000 | |
mmap(0x76ffc51c4000, 14592, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x76ffc51c4000 | |
close(3) = 0 | |
openat(AT_FDCWD, "/nix/store/r8zhwq9xylxw8a823kpvqy0kfqq4g52f-nix-2.0pre5968_a6c0b773/lib/libcrypto.so.1.0.0", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/dl1hzcnxnbbcpf6zdhan58fghvdg3in8-openssl-1.0.2n/lib/tls/x86_64/x86_64/libcrypto.so.1.0.0", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
stat("/nix/store/dl1hzcnxnbbcpf6zdhan58fghvdg3in8-openssl-1.0.2n/lib/tls/x86_64/x86_64", 0x7ffdbd8a46f0) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/dl1hzcnxnbbcpf6zdhan58fghvdg3in8-openssl-1.0.2n/lib/tls/x86_64/libcrypto.so.1.0.0", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
stat("/nix/store/dl1hzcnxnbbcpf6zdhan58fghvdg3in8-openssl-1.0.2n/lib/tls/x86_64", 0x7ffdbd8a46f0) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/dl1hzcnxnbbcpf6zdhan58fghvdg3in8-openssl-1.0.2n/lib/tls/x86_64/libcrypto.so.1.0.0", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
stat("/nix/store/dl1hzcnxnbbcpf6zdhan58fghvdg3in8-openssl-1.0.2n/lib/tls/x86_64", 0x7ffdbd8a46f0) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/dl1hzcnxnbbcpf6zdhan58fghvdg3in8-openssl-1.0.2n/lib/tls/libcrypto.so.1.0.0", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
stat("/nix/store/dl1hzcnxnbbcpf6zdhan58fghvdg3in8-openssl-1.0.2n/lib/tls", 0x7ffdbd8a46f0) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/dl1hzcnxnbbcpf6zdhan58fghvdg3in8-openssl-1.0.2n/lib/x86_64/x86_64/libcrypto.so.1.0.0", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
stat("/nix/store/dl1hzcnxnbbcpf6zdhan58fghvdg3in8-openssl-1.0.2n/lib/x86_64/x86_64", 0x7ffdbd8a46f0) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/dl1hzcnxnbbcpf6zdhan58fghvdg3in8-openssl-1.0.2n/lib/x86_64/libcrypto.so.1.0.0", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
stat("/nix/store/dl1hzcnxnbbcpf6zdhan58fghvdg3in8-openssl-1.0.2n/lib/x86_64", 0x7ffdbd8a46f0) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/dl1hzcnxnbbcpf6zdhan58fghvdg3in8-openssl-1.0.2n/lib/x86_64/libcrypto.so.1.0.0", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
stat("/nix/store/dl1hzcnxnbbcpf6zdhan58fghvdg3in8-openssl-1.0.2n/lib/x86_64", 0x7ffdbd8a46f0) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/dl1hzcnxnbbcpf6zdhan58fghvdg3in8-openssl-1.0.2n/lib/libcrypto.so.1.0.0", O_RDONLY|O_CLOEXEC) = 3 | |
read(3, "\177ELF\2\1\1\0\0\0\0\0\0\0\0\0\3\0>\0\1\0\0\0\0|\6\0\0\0\0\0@\0\0\0\0\0\0\0p\177'\0\0\0\0\0\0\0\0\0@\0008\0\10\0@\0\33\0\32\0\1\0\0\0\5\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\314\20!\0\0\0\0\0\314\20!\0\0\0\0\0\0\0 \0\0\0\0\0\1\0\0\0\6\0\0\0\20\35!\0\0\0\0\0\20\35A\0\0\0\0\0\20\35A\0\0\0\0\0qa\2\0\0\0\0\0\20\231\2\0\0\0\0\0\0\0 \0\0\0\0\0\2\0\0\0\6\0\0\0P\312\"\0\0\0\0\0P\312B\0\0\0\0\0P\312B\0\0\0\0\0\360\1\0\0\0\0\0\0\360\1\0\0\0\0\0\0\10\0\0\0\0\0\0\0\4\0\0\0\4\0\0\0\0\2\0\0\0\0\0\0\0\2\0\0\0\0\0\0\0\2\0\0\0\0\0\0$\0\0\0\0\0\0\0$\0\0\0\0\0\0\0\4\0\0\0\0\0\0\0P\345td\4\0\0\0\270[\35\0"..., 832) = 832 | |
fstat(3, {st_mode=S_IFREG|0555, st_size=2590256, ...}) = 0 | |
mmap(NULL, 8192, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) = 0x76ffc6cab000 | |
mmap(NULL, 4437536, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) = 0x76ffc49da000 | |
mprotect(0x76ffc4bec000, 2093056, PROT_NONE) = 0 | |
mmap(0x76ffc4deb000, 159744, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0x211000) = 0x76ffc4deb000 | |
mmap(0x76ffc4e12000, 13856, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x76ffc4e12000 | |
close(3) = 0 | |
openat(AT_FDCWD, "/nix/store/r8zhwq9xylxw8a823kpvqy0kfqq4g52f-nix-2.0pre5968_a6c0b773/lib/libdl.so.2", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/dn852vplccs5w0qc3dnlfyma8b7b408d-boehm-gc-7.6.4/lib/libdl.so.2", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/2kcrj1ksd2a14bm5sky182fv2xwfhfap-glibc-2.26-131/lib/libdl.so.2", O_RDONLY|O_CLOEXEC) = 3 | |
read(3, "\177ELF\2\1\1\0\0\0\0\0\0\0\0\0\3\0>\0\1\0\0\0\0\16\0\0\0\0\0\0@\0\0\0\0\0\0\0\340@\0\0\0\0\0\0\0\0\0\0@\0008\0\10\0@\0\36\0\33\0\1\0\0\0\5\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0t \0\0\0\0\0\0t \0\0\0\0\0\0\0\0 \0\0\0\0\0\1\0\0\0\6\0\0\0\370,\0\0\0\0\0\0\370, \0\0\0\0\0\370, \0\0\0\0\0\20\3\0\0\0\0\0\0\230\3\0\0\0\0\0\0\0\0 \0\0\0\0\0\2\0\0\0\6\0\0\0 -\0\0\0\0\0\0 - \0\0\0\0\0 - \0\0\0\0\0\0\2\0\0\0\0\0\0\0\2\0\0\0\0\0\0\10\0\0\0\0\0\0\0\4\0\0\0\4\0\0\0\0\2\0\0\0\0\0\0\0\2\0\0\0\0\0\0\0\2\0\0\0\0\0\0D\0\0\0\0\0\0\0D\0\0\0\0\0\0\0\4\0\0\0\0\0\0\0P\345td\4\0\0\0`\32\0\0"..., 832) = 832 | |
fstat(3, {st_mode=S_IFREG|0555, st_size=18528, ...}) = 0 | |
mmap(NULL, 2109584, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) = 0x76ffc47d6000 | |
mprotect(0x76ffc47d9000, 2093056, PROT_NONE) = 0 | |
mmap(0x76ffc49d8000, 8192, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0x2000) = 0x76ffc49d8000 | |
close(3) = 0 | |
openat(AT_FDCWD, "/nix/store/2kcrj1ksd2a14bm5sky182fv2xwfhfap-glibc-2.26-131/lib/libpthread.so.0", O_RDONLY|O_CLOEXEC) = 3 | |
read(3, "\177ELF\2\1\1\0\0\0\0\0\0\0\0\0\3\0>\0\1\0\0\0p_\0\0\0\0\0\0@\0\0\0\0\0\0\0\240\16\2\0\0\0\0\0\0\0\0\0@\0008\0\n\0@\0%\0\"\0\6\0\0\0\5\0\0\0@\0\0\0\0\0\0\0@\0\0\0\0\0\0\0@\0\0\0\0\0\0\0000\2\0\0\0\0\0\0000\2\0\0\0\0\0\0\10\0\0\0\0\0\0\0\3\0\0\0\4\0\0\0\340@\1\0\0\0\0\0\340@\1\0\0\0\0\0\340@\1\0\0\0\0\0T\0\0\0\0\0\0\0T\0\0\0\0\0\0\0 \0\0\0\0\0\0\0\1\0\0\0\5\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0P\210\1\0\0\0\0\0P\210\1\0\0\0\0\0\0\0 \0\0\0\0\0\1\0\0\0\6\0\0\0008\211\1\0\0\0\0\0008\211!\0\0\0\0\0008\211!\0\0\0\0\0\30\7\0\0\0\0\0\0\260H\0\0\0\0\0\0\0\0 \0\0\0\0\0\2\0\0\0\6\0\0\0\20\213\1\0"..., 832) = 832 | |
fstat(3, {st_mode=S_IFREG|0555, st_size=137184, ...}) = 0 | |
mmap(NULL, 2216424, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) = 0x76ffc45b8000 | |
mprotect(0x76ffc45d1000, 2093056, PROT_NONE) = 0 | |
mmap(0x76ffc47d0000, 8192, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0x18000) = 0x76ffc47d0000 | |
mmap(0x76ffc47d2000, 12776, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x76ffc47d2000 | |
close(3) = 0 | |
openat(AT_FDCWD, "/nix/store/r8zhwq9xylxw8a823kpvqy0kfqq4g52f-nix-2.0pre5968_a6c0b773/lib/libsqlite3.so.0", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/3v6sf9l1fwbb1phq9ccm71096d44k489-sqlite-3.21.0/lib/tls/x86_64/x86_64/libsqlite3.so.0", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
stat("/nix/store/3v6sf9l1fwbb1phq9ccm71096d44k489-sqlite-3.21.0/lib/tls/x86_64/x86_64", 0x7ffdbd8a4380) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/3v6sf9l1fwbb1phq9ccm71096d44k489-sqlite-3.21.0/lib/tls/x86_64/libsqlite3.so.0", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
stat("/nix/store/3v6sf9l1fwbb1phq9ccm71096d44k489-sqlite-3.21.0/lib/tls/x86_64", 0x7ffdbd8a4380) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/3v6sf9l1fwbb1phq9ccm71096d44k489-sqlite-3.21.0/lib/tls/x86_64/libsqlite3.so.0", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
stat("/nix/store/3v6sf9l1fwbb1phq9ccm71096d44k489-sqlite-3.21.0/lib/tls/x86_64", 0x7ffdbd8a4380) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/3v6sf9l1fwbb1phq9ccm71096d44k489-sqlite-3.21.0/lib/tls/libsqlite3.so.0", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
stat("/nix/store/3v6sf9l1fwbb1phq9ccm71096d44k489-sqlite-3.21.0/lib/tls", 0x7ffdbd8a4380) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/3v6sf9l1fwbb1phq9ccm71096d44k489-sqlite-3.21.0/lib/x86_64/x86_64/libsqlite3.so.0", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
stat("/nix/store/3v6sf9l1fwbb1phq9ccm71096d44k489-sqlite-3.21.0/lib/x86_64/x86_64", 0x7ffdbd8a4380) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/3v6sf9l1fwbb1phq9ccm71096d44k489-sqlite-3.21.0/lib/x86_64/libsqlite3.so.0", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
stat("/nix/store/3v6sf9l1fwbb1phq9ccm71096d44k489-sqlite-3.21.0/lib/x86_64", 0x7ffdbd8a4380) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/3v6sf9l1fwbb1phq9ccm71096d44k489-sqlite-3.21.0/lib/x86_64/libsqlite3.so.0", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
stat("/nix/store/3v6sf9l1fwbb1phq9ccm71096d44k489-sqlite-3.21.0/lib/x86_64", 0x7ffdbd8a4380) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/3v6sf9l1fwbb1phq9ccm71096d44k489-sqlite-3.21.0/lib/libsqlite3.so.0", O_RDONLY|O_CLOEXEC) = 3 | |
read(3, "\177ELF\2\1\1\0\0\0\0\0\0\0\0\0\3\0>\0\1\0\0\0p\321\0\0\0\0\0\0@\0\0\0\0\0\0\0008K\21\0\0\0\0\0\0\0\0\0@\0008\0\10\0@\0\33\0\32\0\1\0\0\0\5\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\334\216\17\0\0\0\0\0\334\216\17\0\0\0\0\0\0\0 \0\0\0\0\0\1\0\0\0\6\0\0\0P\224\17\0\0\0\0\0P\224/\0\0\0\0\0P\224/\0\0\0\0\0hH\0\0\0\0\0\0\310O\0\0\0\0\0\0\0\0 \0\0\0\0\0\2\0\0\0\6\0\0\0\360\267\17\0\0\0\0\0\360\267/\0\0\0\0\0\360\267/\0\0\0\0\0\0\2\0\0\0\0\0\0\0\2\0\0\0\0\0\0\10\0\0\0\0\0\0\0\4\0\0\0\4\0\0\0\0\2\0\0\0\0\0\0\0\2\0\0\0\0\0\0\0\2\0\0\0\0\0\0$\0\0\0\0\0\0\0$\0\0\0\0\0\0\0\4\0\0\0\0\0\0\0P\345td\4\0\0\0P\276\r\0"..., 832) = 832 | |
fstat(3, {st_mode=S_IFREG|0555, st_size=1135096, ...}) = 0 | |
mmap(NULL, 8192, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) = 0x76ffc6ca9000 | |
mmap(NULL, 3138584, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) = 0x76ffc42b9000 | |
mprotect(0x76ffc43b2000, 2097152, PROT_NONE) = 0 | |
mmap(0x76ffc45b2000, 20480, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0xf9000) = 0x76ffc45b2000 | |
mmap(0x76ffc45b7000, 1048, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x76ffc45b7000 | |
close(3) = 0 | |
openat(AT_FDCWD, "/nix/store/r8zhwq9xylxw8a823kpvqy0kfqq4g52f-nix-2.0pre5968_a6c0b773/lib/libbz2.so.1", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/3v6sf9l1fwbb1phq9ccm71096d44k489-sqlite-3.21.0/lib/libbz2.so.1", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/lha30sclfhw3r77hsknjfcawqafb94xi-curl-7.58.0/lib/tls/x86_64/x86_64/libbz2.so.1", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
stat("/nix/store/lha30sclfhw3r77hsknjfcawqafb94xi-curl-7.58.0/lib/tls/x86_64/x86_64", 0x7ffdbd8a4350) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/lha30sclfhw3r77hsknjfcawqafb94xi-curl-7.58.0/lib/tls/x86_64/libbz2.so.1", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
stat("/nix/store/lha30sclfhw3r77hsknjfcawqafb94xi-curl-7.58.0/lib/tls/x86_64", 0x7ffdbd8a4350) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/lha30sclfhw3r77hsknjfcawqafb94xi-curl-7.58.0/lib/tls/x86_64/libbz2.so.1", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
stat("/nix/store/lha30sclfhw3r77hsknjfcawqafb94xi-curl-7.58.0/lib/tls/x86_64", 0x7ffdbd8a4350) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/lha30sclfhw3r77hsknjfcawqafb94xi-curl-7.58.0/lib/tls/libbz2.so.1", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
stat("/nix/store/lha30sclfhw3r77hsknjfcawqafb94xi-curl-7.58.0/lib/tls", 0x7ffdbd8a4350) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/lha30sclfhw3r77hsknjfcawqafb94xi-curl-7.58.0/lib/x86_64/x86_64/libbz2.so.1", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
stat("/nix/store/lha30sclfhw3r77hsknjfcawqafb94xi-curl-7.58.0/lib/x86_64/x86_64", 0x7ffdbd8a4350) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/lha30sclfhw3r77hsknjfcawqafb94xi-curl-7.58.0/lib/x86_64/libbz2.so.1", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
stat("/nix/store/lha30sclfhw3r77hsknjfcawqafb94xi-curl-7.58.0/lib/x86_64", 0x7ffdbd8a4350) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/lha30sclfhw3r77hsknjfcawqafb94xi-curl-7.58.0/lib/x86_64/libbz2.so.1", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
stat("/nix/store/lha30sclfhw3r77hsknjfcawqafb94xi-curl-7.58.0/lib/x86_64", 0x7ffdbd8a4350) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/lha30sclfhw3r77hsknjfcawqafb94xi-curl-7.58.0/lib/libbz2.so.1", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
stat("/nix/store/lha30sclfhw3r77hsknjfcawqafb94xi-curl-7.58.0/lib", {st_mode=S_IFDIR|0555, st_size=6, ...}) = 0 | |
openat(AT_FDCWD, "/nix/store/kgq1fxb7c84r212kmq4p8zcxyi7fv51r-libsodium-1.0.16/lib/tls/x86_64/x86_64/libbz2.so.1", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
stat("/nix/store/kgq1fxb7c84r212kmq4p8zcxyi7fv51r-libsodium-1.0.16/lib/tls/x86_64/x86_64", 0x7ffdbd8a4350) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/kgq1fxb7c84r212kmq4p8zcxyi7fv51r-libsodium-1.0.16/lib/tls/x86_64/libbz2.so.1", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
stat("/nix/store/kgq1fxb7c84r212kmq4p8zcxyi7fv51r-libsodium-1.0.16/lib/tls/x86_64", 0x7ffdbd8a4350) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/kgq1fxb7c84r212kmq4p8zcxyi7fv51r-libsodium-1.0.16/lib/tls/x86_64/libbz2.so.1", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
stat("/nix/store/kgq1fxb7c84r212kmq4p8zcxyi7fv51r-libsodium-1.0.16/lib/tls/x86_64", 0x7ffdbd8a4350) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/kgq1fxb7c84r212kmq4p8zcxyi7fv51r-libsodium-1.0.16/lib/tls/libbz2.so.1", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
stat("/nix/store/kgq1fxb7c84r212kmq4p8zcxyi7fv51r-libsodium-1.0.16/lib/tls", 0x7ffdbd8a4350) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/kgq1fxb7c84r212kmq4p8zcxyi7fv51r-libsodium-1.0.16/lib/x86_64/x86_64/libbz2.so.1", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
stat("/nix/store/kgq1fxb7c84r212kmq4p8zcxyi7fv51r-libsodium-1.0.16/lib/x86_64/x86_64", 0x7ffdbd8a4350) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/kgq1fxb7c84r212kmq4p8zcxyi7fv51r-libsodium-1.0.16/lib/x86_64/libbz2.so.1", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
stat("/nix/store/kgq1fxb7c84r212kmq4p8zcxyi7fv51r-libsodium-1.0.16/lib/x86_64", 0x7ffdbd8a4350) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/kgq1fxb7c84r212kmq4p8zcxyi7fv51r-libsodium-1.0.16/lib/x86_64/libbz2.so.1", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
stat("/nix/store/kgq1fxb7c84r212kmq4p8zcxyi7fv51r-libsodium-1.0.16/lib/x86_64", 0x7ffdbd8a4350) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/kgq1fxb7c84r212kmq4p8zcxyi7fv51r-libsodium-1.0.16/lib/libbz2.so.1", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
stat("/nix/store/kgq1fxb7c84r212kmq4p8zcxyi7fv51r-libsodium-1.0.16/lib", {st_mode=S_IFDIR|0555, st_size=6, ...}) = 0 | |
openat(AT_FDCWD, "/nix/store/mrphq5k83715mqjlk0vjcr3h0j7zs8ix-bzip2-1.0.6.0.1/lib/tls/x86_64/x86_64/libbz2.so.1", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
stat("/nix/store/mrphq5k83715mqjlk0vjcr3h0j7zs8ix-bzip2-1.0.6.0.1/lib/tls/x86_64/x86_64", 0x7ffdbd8a4350) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/mrphq5k83715mqjlk0vjcr3h0j7zs8ix-bzip2-1.0.6.0.1/lib/tls/x86_64/libbz2.so.1", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
stat("/nix/store/mrphq5k83715mqjlk0vjcr3h0j7zs8ix-bzip2-1.0.6.0.1/lib/tls/x86_64", 0x7ffdbd8a4350) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/mrphq5k83715mqjlk0vjcr3h0j7zs8ix-bzip2-1.0.6.0.1/lib/tls/x86_64/libbz2.so.1", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
stat("/nix/store/mrphq5k83715mqjlk0vjcr3h0j7zs8ix-bzip2-1.0.6.0.1/lib/tls/x86_64", 0x7ffdbd8a4350) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/mrphq5k83715mqjlk0vjcr3h0j7zs8ix-bzip2-1.0.6.0.1/lib/tls/libbz2.so.1", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
stat("/nix/store/mrphq5k83715mqjlk0vjcr3h0j7zs8ix-bzip2-1.0.6.0.1/lib/tls", 0x7ffdbd8a4350) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/mrphq5k83715mqjlk0vjcr3h0j7zs8ix-bzip2-1.0.6.0.1/lib/x86_64/x86_64/libbz2.so.1", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
stat("/nix/store/mrphq5k83715mqjlk0vjcr3h0j7zs8ix-bzip2-1.0.6.0.1/lib/x86_64/x86_64", 0x7ffdbd8a4350) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/mrphq5k83715mqjlk0vjcr3h0j7zs8ix-bzip2-1.0.6.0.1/lib/x86_64/libbz2.so.1", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
stat("/nix/store/mrphq5k83715mqjlk0vjcr3h0j7zs8ix-bzip2-1.0.6.0.1/lib/x86_64", 0x7ffdbd8a4350) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/mrphq5k83715mqjlk0vjcr3h0j7zs8ix-bzip2-1.0.6.0.1/lib/x86_64/libbz2.so.1", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
stat("/nix/store/mrphq5k83715mqjlk0vjcr3h0j7zs8ix-bzip2-1.0.6.0.1/lib/x86_64", 0x7ffdbd8a4350) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/mrphq5k83715mqjlk0vjcr3h0j7zs8ix-bzip2-1.0.6.0.1/lib/libbz2.so.1", O_RDONLY|O_CLOEXEC) = 3 | |
read(3, "\177ELF\2\1\1\0\0\0\0\0\0\0\0\0\3\0>\0\1\0\0\0\200\26\0\0\0\0\0\0@\0\0\0\0\0\0\0008\r\1\0\0\0\0\0\0\0\0\0@\0008\0\7\0@\0\32\0\27\0\1\0\0\0\5\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\264\350\0\0\0\0\0\0\264\350\0\0\0\0\0\0\0\0 \0\0\0\0\0\1\0\0\0\6\0\0\0\360\353\0\0\0\0\0\0\360\353 \0\0\0\0\0\360\353 \0\0\0\0\0000\20\0\0\0\0\0\0008\20\0\0\0\0\0\0\0\0 \0\0\0\0\0\2\0\0\0\6\0\0\0\200\354\0\0\0\0\0\0\200\354 \0\0\0\0\0\200\354 \0\0\0\0\0\320\1\0\0\0\0\0\0\320\1\0\0\0\0\0\0\10\0\0\0\0\0\0\0P\345td\4\0\0\0\210\335\0\0\0\0\0\0\210\335\0\0\0\0\0\0\210\335\0\0\0\0\0\0l\1\0\0\0\0\0\0l\1\0\0\0\0\0\0\4\0\0\0\0\0\0\0Q\345td\6\0\0\0\0\0\0\0"..., 832) = 832 | |
fstat(3, {st_mode=S_IFREG|0555, st_size=70584, ...}) = 0 | |
mmap(NULL, 2161704, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) = 0x76ffc40a9000 | |
mprotect(0x76ffc40b8000, 2093056, PROT_NONE) = 0 | |
mmap(0x76ffc42b7000, 8192, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0xe000) = 0x76ffc42b7000 | |
close(3) = 0 | |
openat(AT_FDCWD, "/nix/store/r8zhwq9xylxw8a823kpvqy0kfqq4g52f-nix-2.0pre5968_a6c0b773/lib/libcurl.so.4", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/3v6sf9l1fwbb1phq9ccm71096d44k489-sqlite-3.21.0/lib/libcurl.so.4", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/lha30sclfhw3r77hsknjfcawqafb94xi-curl-7.58.0/lib/libcurl.so.4", O_RDONLY|O_CLOEXEC) = 3 | |
read(3, "\177ELF\2\1\1\0\0\0\0\0\0\0\0\0\3\0>\0\1\0\0\0 \307\0\0\0\0\0\0@\0\0\0\0\0\0\0(;\t\0\0\0\0\0\0\0\0\0@\0008\0\10\0@\0\33\0\32\0\1\0\0\0\5\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\344\r\10\0\0\0\0\0\344\r\10\0\0\0\0\0\0\0 \0\0\0\0\0\1\0\0\0\6\0\0\0P\25\10\0\0\0\0\0P\25(\0\0\0\0\0P\25(\0\0\0\0\0H,\0\0\0\0\0\0X0\0\0\0\0\0\0\0\0 \0\0\0\0\0\2\0\0\0\6\0\0\0\200/\10\0\0\0\0\0\200/(\0\0\0\0\0\200/(\0\0\0\0\0p\2\0\0\0\0\0\0p\2\0\0\0\0\0\0\10\0\0\0\0\0\0\0\4\0\0\0\4\0\0\0\0\2\0\0\0\0\0\0\0\2\0\0\0\0\0\0\0\2\0\0\0\0\0\0$\0\0\0\0\0\0\0$\0\0\0\0\0\0\0\4\0\0\0\0\0\0\0P\345td\4\0\0\0t/\7\0"..., 832) = 832 | |
fstat(3, {st_mode=S_IFREG|0555, st_size=606696, ...}) = 0 | |
mmap(NULL, 2639272, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) = 0x76ffc3e24000 | |
mprotect(0x76ffc3ea5000, 2097152, PROT_NONE) = 0 | |
mmap(0x76ffc40a5000, 16384, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0x81000) = 0x76ffc40a5000 | |
close(3) = 0 | |
openat(AT_FDCWD, "/nix/store/r8zhwq9xylxw8a823kpvqy0kfqq4g52f-nix-2.0pre5968_a6c0b773/lib/libsodium.so.23", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/3v6sf9l1fwbb1phq9ccm71096d44k489-sqlite-3.21.0/lib/libsodium.so.23", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/lha30sclfhw3r77hsknjfcawqafb94xi-curl-7.58.0/lib/libsodium.so.23", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/kgq1fxb7c84r212kmq4p8zcxyi7fv51r-libsodium-1.0.16/lib/libsodium.so.23", O_RDONLY|O_CLOEXEC) = 3 | |
read(3, "\177ELF\2\1\1\0\0\0\0\0\0\0\0\0\3\0>\0\1\0\0\0`\272\0\0\0\0\0\0@\0\0\0\0\0\0\0008\362\5\0\0\0\0\0\0\0\0\0@\0008\0\t\0@\0\33\0\32\0\1\0\0\0\5\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0L\35\5\0\0\0\0\0L\35\5\0\0\0\0\0\0\0 \0\0\0\0\0\1\0\0\0\6\0\0\0 (\5\0\0\0\0\0 (%\0\0\0\0\0 (%\0\0\0\0\0\20\v\0\0\0\0\0\0\350\v\0\0\0\0\0\0\0\0 \0\0\0\0\0\2\0\0\0\6\0\0\0000(\5\0\0\0\0\0000(%\0\0\0\0\0000(%\0\0\0\0\0\360\1\0\0\0\0\0\0\360\1\0\0\0\0\0\0\10\0\0\0\0\0\0\0\4\0\0\0\4\0\0\0008\2\0\0\0\0\0\0008\2\0\0\0\0\0\0008\2\0\0\0\0\0\0$\0\0\0\0\0\0\0$\0\0\0\0\0\0\0\4\0\0\0\0\0\0\0\7\0\0\0\4\0\0\0 (\5\0"..., 832) = 832 | |
fstat(3, {st_mode=S_IFREG|0555, st_size=391416, ...}) = 0 | |
mmap(NULL, 2438152, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) = 0x76ffc3bd0000 | |
mprotect(0x76ffc3c22000, 2097152, PROT_NONE) = 0 | |
mmap(0x76ffc3e22000, 8192, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0x52000) = 0x76ffc3e22000 | |
close(3) = 0 | |
openat(AT_FDCWD, "/nix/store/r8zhwq9xylxw8a823kpvqy0kfqq4g52f-nix-2.0pre5968_a6c0b773/lib/libaws-cpp-sdk-s3.so", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/3v6sf9l1fwbb1phq9ccm71096d44k489-sqlite-3.21.0/lib/libaws-cpp-sdk-s3.so", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/lha30sclfhw3r77hsknjfcawqafb94xi-curl-7.58.0/lib/libaws-cpp-sdk-s3.so", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/kgq1fxb7c84r212kmq4p8zcxyi7fv51r-libsodium-1.0.16/lib/libaws-cpp-sdk-s3.so", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/mrphq5k83715mqjlk0vjcr3h0j7zs8ix-bzip2-1.0.6.0.1/lib/libaws-cpp-sdk-s3.so", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/2gxzfkyl05040p97f7lzilv7yx3jj3v7-libseccomp-2.3.3/lib/tls/x86_64/x86_64/libaws-cpp-sdk-s3.so", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
stat("/nix/store/2gxzfkyl05040p97f7lzilv7yx3jj3v7-libseccomp-2.3.3/lib/tls/x86_64/x86_64", 0x7ffdbd8a42c0) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/2gxzfkyl05040p97f7lzilv7yx3jj3v7-libseccomp-2.3.3/lib/tls/x86_64/libaws-cpp-sdk-s3.so", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
stat("/nix/store/2gxzfkyl05040p97f7lzilv7yx3jj3v7-libseccomp-2.3.3/lib/tls/x86_64", 0x7ffdbd8a42c0) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/2gxzfkyl05040p97f7lzilv7yx3jj3v7-libseccomp-2.3.3/lib/tls/x86_64/libaws-cpp-sdk-s3.so", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
stat("/nix/store/2gxzfkyl05040p97f7lzilv7yx3jj3v7-libseccomp-2.3.3/lib/tls/x86_64", 0x7ffdbd8a42c0) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/2gxzfkyl05040p97f7lzilv7yx3jj3v7-libseccomp-2.3.3/lib/tls/libaws-cpp-sdk-s3.so", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
stat("/nix/store/2gxzfkyl05040p97f7lzilv7yx3jj3v7-libseccomp-2.3.3/lib/tls", 0x7ffdbd8a42c0) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/2gxzfkyl05040p97f7lzilv7yx3jj3v7-libseccomp-2.3.3/lib/x86_64/x86_64/libaws-cpp-sdk-s3.so", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
stat("/nix/store/2gxzfkyl05040p97f7lzilv7yx3jj3v7-libseccomp-2.3.3/lib/x86_64/x86_64", 0x7ffdbd8a42c0) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/2gxzfkyl05040p97f7lzilv7yx3jj3v7-libseccomp-2.3.3/lib/x86_64/libaws-cpp-sdk-s3.so", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
stat("/nix/store/2gxzfkyl05040p97f7lzilv7yx3jj3v7-libseccomp-2.3.3/lib/x86_64", 0x7ffdbd8a42c0) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/2gxzfkyl05040p97f7lzilv7yx3jj3v7-libseccomp-2.3.3/lib/x86_64/libaws-cpp-sdk-s3.so", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
stat("/nix/store/2gxzfkyl05040p97f7lzilv7yx3jj3v7-libseccomp-2.3.3/lib/x86_64", 0x7ffdbd8a42c0) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/2gxzfkyl05040p97f7lzilv7yx3jj3v7-libseccomp-2.3.3/lib/libaws-cpp-sdk-s3.so", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
stat("/nix/store/2gxzfkyl05040p97f7lzilv7yx3jj3v7-libseccomp-2.3.3/lib", {st_mode=S_IFDIR|0555, st_size=7, ...}) = 0 | |
openat(AT_FDCWD, "/nix/store/jhpzzb3xmxkapqvg9pnsx51psfnfawi0-aws-sdk-cpp-1.3.22/lib/tls/x86_64/x86_64/libaws-cpp-sdk-s3.so", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
stat("/nix/store/jhpzzb3xmxkapqvg9pnsx51psfnfawi0-aws-sdk-cpp-1.3.22/lib/tls/x86_64/x86_64", 0x7ffdbd8a42c0) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/jhpzzb3xmxkapqvg9pnsx51psfnfawi0-aws-sdk-cpp-1.3.22/lib/tls/x86_64/libaws-cpp-sdk-s3.so", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
stat("/nix/store/jhpzzb3xmxkapqvg9pnsx51psfnfawi0-aws-sdk-cpp-1.3.22/lib/tls/x86_64", 0x7ffdbd8a42c0) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/jhpzzb3xmxkapqvg9pnsx51psfnfawi0-aws-sdk-cpp-1.3.22/lib/tls/x86_64/libaws-cpp-sdk-s3.so", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
stat("/nix/store/jhpzzb3xmxkapqvg9pnsx51psfnfawi0-aws-sdk-cpp-1.3.22/lib/tls/x86_64", 0x7ffdbd8a42c0) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/jhpzzb3xmxkapqvg9pnsx51psfnfawi0-aws-sdk-cpp-1.3.22/lib/tls/libaws-cpp-sdk-s3.so", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
stat("/nix/store/jhpzzb3xmxkapqvg9pnsx51psfnfawi0-aws-sdk-cpp-1.3.22/lib/tls", 0x7ffdbd8a42c0) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/jhpzzb3xmxkapqvg9pnsx51psfnfawi0-aws-sdk-cpp-1.3.22/lib/x86_64/x86_64/libaws-cpp-sdk-s3.so", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
stat("/nix/store/jhpzzb3xmxkapqvg9pnsx51psfnfawi0-aws-sdk-cpp-1.3.22/lib/x86_64/x86_64", 0x7ffdbd8a42c0) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/jhpzzb3xmxkapqvg9pnsx51psfnfawi0-aws-sdk-cpp-1.3.22/lib/x86_64/libaws-cpp-sdk-s3.so", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
stat("/nix/store/jhpzzb3xmxkapqvg9pnsx51psfnfawi0-aws-sdk-cpp-1.3.22/lib/x86_64", 0x7ffdbd8a42c0) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/jhpzzb3xmxkapqvg9pnsx51psfnfawi0-aws-sdk-cpp-1.3.22/lib/x86_64/libaws-cpp-sdk-s3.so", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
stat("/nix/store/jhpzzb3xmxkapqvg9pnsx51psfnfawi0-aws-sdk-cpp-1.3.22/lib/x86_64", 0x7ffdbd8a42c0) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/jhpzzb3xmxkapqvg9pnsx51psfnfawi0-aws-sdk-cpp-1.3.22/lib/libaws-cpp-sdk-s3.so", O_RDONLY|O_CLOEXEC) = 3 | |
read(3, "\177ELF\2\1\1\0\0\0\0\0\0\0\0\0\3\0>\0\1\0\0\0\300R\n\0\0\0\0\0@\0\0\0\0\0\0\0(\0029\0\0\0\0\0\0\0\0\0@\0008\0\10\0@\0\33\0\32\0\1\0\0\0\5\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0004\237!\0\0\0\0\0004\237!\0\0\0\0\0\0\0 \0\0\0\0\0\1\0\0\0\6\0\0\0p\250!\0\0\0\0\0p\250A\0\0\0\0\0p\250A\0\0\0\0\0\240\27\1\0\0\0\0\0\370\32\1\0\0\0\0\0\0\0 \0\0\0\0\0\2\0\0\0\6\0\0\0\310\224\"\0\0\0\0\0\310\224B\0\0\0\0\0\310\224B\0\0\0\0\0p\2\0\0\0\0\0\0p\2\0\0\0\0\0\0\10\0\0\0\0\0\0\0\4\0\0\0\4\0\0\0\0\2\0\0\0\0\0\0\0\2\0\0\0\0\0\0\0\2\0\0\0\0\0\0$\0\0\0\0\0\0\0$\0\0\0\0\0\0\0\4\0\0\0\0\0\0\0P\345td\4\0\0\0`\237\36\0"..., 832) = 832 | |
fstat(3, {st_mode=S_IFREG|0555, st_size=3737832, ...}) = 0 | |
mmap(NULL, 4375400, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) = 0x76ffc37a3000 | |
mprotect(0x76ffc39bd000, 2097152, PROT_NONE) = 0 | |
mmap(0x76ffc3bbd000, 77824, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0x21a000) = 0x76ffc3bbd000 | |
close(3) = 0 | |
openat(AT_FDCWD, "/nix/store/r8zhwq9xylxw8a823kpvqy0kfqq4g52f-nix-2.0pre5968_a6c0b773/lib/libaws-cpp-sdk-core.so", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/3v6sf9l1fwbb1phq9ccm71096d44k489-sqlite-3.21.0/lib/libaws-cpp-sdk-core.so", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/lha30sclfhw3r77hsknjfcawqafb94xi-curl-7.58.0/lib/libaws-cpp-sdk-core.so", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/kgq1fxb7c84r212kmq4p8zcxyi7fv51r-libsodium-1.0.16/lib/libaws-cpp-sdk-core.so", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/mrphq5k83715mqjlk0vjcr3h0j7zs8ix-bzip2-1.0.6.0.1/lib/libaws-cpp-sdk-core.so", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/2gxzfkyl05040p97f7lzilv7yx3jj3v7-libseccomp-2.3.3/lib/libaws-cpp-sdk-core.so", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/jhpzzb3xmxkapqvg9pnsx51psfnfawi0-aws-sdk-cpp-1.3.22/lib/libaws-cpp-sdk-core.so", O_RDONLY|O_CLOEXEC) = 3 | |
read(3, "\177ELF\2\1\1\0\0\0\0\0\0\0\0\0\3\0>\0\1\0\0\0p\5\5\0\0\0\0\0@\0\0\0\0\0\0\0\370\321\22\0\0\0\0\0\0\0\0\0@\0008\0\10\0@\0\33\0\32\0\1\0\0\0\5\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\244m\16\0\0\0\0\0\244m\16\0\0\0\0\0\0\0 \0\0\0\0\0\1\0\0\0\6\0\0\0x|\16\0\0\0\0\0x|.\0\0\0\0\0x|.\0\0\0\0\0He\0\0\0\0\0\0\300h\0\0\0\0\0\0\0\0 \0\0\0\0\0\2\0\0\0\6\0\0\0\210\272\16\0\0\0\0\0\210\272.\0\0\0\0\0\210\272.\0\0\0\0\0P\2\0\0\0\0\0\0P\2\0\0\0\0\0\0\10\0\0\0\0\0\0\0\4\0\0\0\4\0\0\0\0\2\0\0\0\0\0\0\0\2\0\0\0\0\0\0\0\2\0\0\0\0\0\0$\0\0\0\0\0\0\0$\0\0\0\0\0\0\0\4\0\0\0\0\0\0\0P\345td\4\0\0\0\320\r\r\0"..., 832) = 832 | |
fstat(3, {st_mode=S_IFREG|0555, st_size=1235128, ...}) = 0 | |
mmap(NULL, 3073336, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) = 0x76ffc34b4000 | |
mprotect(0x76ffc359b000, 2097152, PROT_NONE) = 0 | |
mmap(0x76ffc379b000, 32768, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0xe7000) = 0x76ffc379b000 | |
close(3) = 0 | |
openat(AT_FDCWD, "/nix/store/r8zhwq9xylxw8a823kpvqy0kfqq4g52f-nix-2.0pre5968_a6c0b773/lib/libseccomp.so.2", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/3v6sf9l1fwbb1phq9ccm71096d44k489-sqlite-3.21.0/lib/libseccomp.so.2", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/lha30sclfhw3r77hsknjfcawqafb94xi-curl-7.58.0/lib/libseccomp.so.2", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/kgq1fxb7c84r212kmq4p8zcxyi7fv51r-libsodium-1.0.16/lib/libseccomp.so.2", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/mrphq5k83715mqjlk0vjcr3h0j7zs8ix-bzip2-1.0.6.0.1/lib/libseccomp.so.2", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/2gxzfkyl05040p97f7lzilv7yx3jj3v7-libseccomp-2.3.3/lib/libseccomp.so.2", O_RDONLY|O_CLOEXEC) = 3 | |
read(3, "\177ELF\2\1\1\0\0\0\0\0\0\0\0\0\3\0>\0\1\0\0\0\360\372\1\0\0\0\0\0@\0\0\0\0\0\0\00088\4\0\0\0\0\0\0\0\0\0@\0008\0\7\0@\0\32\0\31\0\1\0\0\0\5\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0t\274\2\0\0\0\0\0t\274\2\0\0\0\0\0\0\0 \0\0\0\0\0\1\0\0\0\6\0\0\0\260\303\2\0\0\0\0\0\260\303\"\0\0\0\0\0\260\303\"\0\0\0\0\0hL\1\0\0\0\0\0pL\1\0\0\0\0\0\0\0 \0\0\0\0\0\2\0\0\0\6\0\0\0000\r\4\0\0\0\0\0000\r$\0\0\0\0\0000\r$\0\0\0\0\0\320\1\0\0\0\0\0\0\320\1\0\0\0\0\0\0\10\0\0\0\0\0\0\0P\345td\4\0\0\0P\236\2\0\0\0\0\0P\236\2\0\0\0\0\0P\236\2\0\0\0\0\0|\4\0\0\0\0\0\0|\4\0\0\0\0\0\0\4\0\0\0\0\0\0\0Q\345td\6\0\0\0\0\0\0\0"..., 832) = 832 | |
mmap(NULL, 8192, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) = 0x76ffc6ca7000 | |
fstat(3, {st_mode=S_IFREG|0555, st_size=278200, ...}) = 0 | |
mmap(NULL, 2363424, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) = 0x76ffc3272000 | |
mprotect(0x76ffc329e000, 2097152, PROT_NONE) = 0 | |
mmap(0x76ffc349e000, 90112, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0x2c000) = 0x76ffc349e000 | |
close(3) = 0 | |
openat(AT_FDCWD, "/nix/store/r8zhwq9xylxw8a823kpvqy0kfqq4g52f-nix-2.0pre5968_a6c0b773/lib/liblzma.so.5", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/chf54cl12ifswf6swh7kxpif477drihi-xz-5.2.3/lib/tls/x86_64/x86_64/liblzma.so.5", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
stat("/nix/store/chf54cl12ifswf6swh7kxpif477drihi-xz-5.2.3/lib/tls/x86_64/x86_64", 0x7ffdbd8a4230) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/chf54cl12ifswf6swh7kxpif477drihi-xz-5.2.3/lib/tls/x86_64/liblzma.so.5", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
stat("/nix/store/chf54cl12ifswf6swh7kxpif477drihi-xz-5.2.3/lib/tls/x86_64", 0x7ffdbd8a4230) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/chf54cl12ifswf6swh7kxpif477drihi-xz-5.2.3/lib/tls/x86_64/liblzma.so.5", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
stat("/nix/store/chf54cl12ifswf6swh7kxpif477drihi-xz-5.2.3/lib/tls/x86_64", 0x7ffdbd8a4230) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/chf54cl12ifswf6swh7kxpif477drihi-xz-5.2.3/lib/tls/liblzma.so.5", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
stat("/nix/store/chf54cl12ifswf6swh7kxpif477drihi-xz-5.2.3/lib/tls", 0x7ffdbd8a4230) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/chf54cl12ifswf6swh7kxpif477drihi-xz-5.2.3/lib/x86_64/x86_64/liblzma.so.5", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
stat("/nix/store/chf54cl12ifswf6swh7kxpif477drihi-xz-5.2.3/lib/x86_64/x86_64", 0x7ffdbd8a4230) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/chf54cl12ifswf6swh7kxpif477drihi-xz-5.2.3/lib/x86_64/liblzma.so.5", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
stat("/nix/store/chf54cl12ifswf6swh7kxpif477drihi-xz-5.2.3/lib/x86_64", 0x7ffdbd8a4230) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/chf54cl12ifswf6swh7kxpif477drihi-xz-5.2.3/lib/x86_64/liblzma.so.5", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
stat("/nix/store/chf54cl12ifswf6swh7kxpif477drihi-xz-5.2.3/lib/x86_64", 0x7ffdbd8a4230) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/chf54cl12ifswf6swh7kxpif477drihi-xz-5.2.3/lib/liblzma.so.5", O_RDONLY|O_CLOEXEC) = 3 | |
read(3, "\177ELF\2\1\1\0\0\0\0\0\0\0\0\0\3\0>\0\1\0\0\0@/\0\0\0\0\0\0@\0\0\0\0\0\0\0\340\221\2\0\0\0\0\0\0\0\0\0@\0008\0\7\0@\0\33\0\30\0\1\0\0\0\5\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0tD\2\0\0\0\0\0tD\2\0\0\0\0\0\0\0 \0\0\0\0\0\1\0\0\0\6\0\0\0000H\2\0\0\0\0\0000H\"\0\0\0\0\0000H\"\0\0\0\0\0\330\7\0\0\0\0\0\0\340\7\0\0\0\0\0\0\0\0 \0\0\0\0\0\2\0\0\0\6\0\0\0`K\2\0\0\0\0\0`K\"\0\0\0\0\0`K\"\0\0\0\0\0\0\2\0\0\0\0\0\0\0\2\0\0\0\0\0\0\10\0\0\0\0\0\0\0P\345td\4\0\0\0\300\0\2\0\0\0\0\0\300\0\2\0\0\0\0\0\300\0\2\0\0\0\0\0D\t\0\0\0\0\0\0D\t\0\0\0\0\0\0\4\0\0\0\0\0\0\0Q\345td\6\0\0\0\0\0\0\0"..., 832) = 832 | |
fstat(3, {st_mode=S_IFREG|0555, st_size=170144, ...}) = 0 | |
mmap(NULL, 2248720, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) = 0x76ffc304c000 | |
mprotect(0x76ffc3071000, 2093056, PROT_NONE) = 0 | |
mmap(0x76ffc3270000, 8192, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0x24000) = 0x76ffc3270000 | |
close(3) = 0 | |
openat(AT_FDCWD, "/nix/store/r8zhwq9xylxw8a823kpvqy0kfqq4g52f-nix-2.0pre5968_a6c0b773/lib/libbrotlienc.so.1", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/chf54cl12ifswf6swh7kxpif477drihi-xz-5.2.3/lib/libbrotlienc.so.1", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/dl1hzcnxnbbcpf6zdhan58fghvdg3in8-openssl-1.0.2n/lib/libbrotlienc.so.1", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/mwgp39wfjlfd95dn09v0vywhm1x1v694-brotli-1.0.2-lib/lib/tls/x86_64/x86_64/libbrotlienc.so.1", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
stat("/nix/store/mwgp39wfjlfd95dn09v0vywhm1x1v694-brotli-1.0.2-lib/lib/tls/x86_64/x86_64", 0x7ffdbd8a4200) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/mwgp39wfjlfd95dn09v0vywhm1x1v694-brotli-1.0.2-lib/lib/tls/x86_64/libbrotlienc.so.1", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
stat("/nix/store/mwgp39wfjlfd95dn09v0vywhm1x1v694-brotli-1.0.2-lib/lib/tls/x86_64", 0x7ffdbd8a4200) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/mwgp39wfjlfd95dn09v0vywhm1x1v694-brotli-1.0.2-lib/lib/tls/x86_64/libbrotlienc.so.1", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
stat("/nix/store/mwgp39wfjlfd95dn09v0vywhm1x1v694-brotli-1.0.2-lib/lib/tls/x86_64", 0x7ffdbd8a4200) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/mwgp39wfjlfd95dn09v0vywhm1x1v694-brotli-1.0.2-lib/lib/tls/libbrotlienc.so.1", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
stat("/nix/store/mwgp39wfjlfd95dn09v0vywhm1x1v694-brotli-1.0.2-lib/lib/tls", 0x7ffdbd8a4200) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/mwgp39wfjlfd95dn09v0vywhm1x1v694-brotli-1.0.2-lib/lib/x86_64/x86_64/libbrotlienc.so.1", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
stat("/nix/store/mwgp39wfjlfd95dn09v0vywhm1x1v694-brotli-1.0.2-lib/lib/x86_64/x86_64", 0x7ffdbd8a4200) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/mwgp39wfjlfd95dn09v0vywhm1x1v694-brotli-1.0.2-lib/lib/x86_64/libbrotlienc.so.1", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
stat("/nix/store/mwgp39wfjlfd95dn09v0vywhm1x1v694-brotli-1.0.2-lib/lib/x86_64", 0x7ffdbd8a4200) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/mwgp39wfjlfd95dn09v0vywhm1x1v694-brotli-1.0.2-lib/lib/x86_64/libbrotlienc.so.1", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
stat("/nix/store/mwgp39wfjlfd95dn09v0vywhm1x1v694-brotli-1.0.2-lib/lib/x86_64", 0x7ffdbd8a4200) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/mwgp39wfjlfd95dn09v0vywhm1x1v694-brotli-1.0.2-lib/lib/libbrotlienc.so.1", O_RDONLY|O_CLOEXEC) = 3 | |
read(3, "\177ELF\2\1\1\0\0\0\0\0\0\0\0\0\3\0>\0\1\0\0\0\220\f\0\0\0\0\0\0@\0\0\0\0\0\0\0P\177\10\0\0\0\0\0\0\0\0\0@\0008\0\7\0@\0\31\0\30\0\1\0\0\0\5\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\274>\10\0\0\0\0\0\274>\10\0\0\0\0\0\0\0 \0\0\0\0\0\1\0\0\0\6\0\0\0@M\10\0\0\0\0\0@M(\0\0\0\0\0@M(\0\0\0\0\0\310\2\0\0\0\0\0\0\320\2\0\0\0\0\0\0\0\0 \0\0\0\0\0\2\0\0\0\6\0\0\0PM\10\0\0\0\0\0PM(\0\0\0\0\0PM(\0\0\0\0\0\360\1\0\0\0\0\0\0\360\1\0\0\0\0\0\0\10\0\0\0\0\0\0\0P\345td\4\0\0\0@\n\10\0\0\0\0\0@\n\10\0\0\0\0\0@\n\10\0\0\0\0\0\304\4\0\0\0\0\0\0\304\4\0\0\0\0\0\0\4\0\0\0\0\0\0\0Q\345td\6\0\0\0\0\0\0\0"..., 832) = 832 | |
fstat(3, {st_mode=S_IFREG|0555, st_size=558480, ...}) = 0 | |
mmap(NULL, 2641936, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) = 0x76ffc2dc6000 | |
mprotect(0x76ffc2e4a000, 2097152, PROT_NONE) = 0 | |
mmap(0x76ffc304a000, 8192, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0x84000) = 0x76ffc304a000 | |
close(3) = 0 | |
openat(AT_FDCWD, "/nix/store/r8zhwq9xylxw8a823kpvqy0kfqq4g52f-nix-2.0pre5968_a6c0b773/lib/libbrotlidec.so.1", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/chf54cl12ifswf6swh7kxpif477drihi-xz-5.2.3/lib/libbrotlidec.so.1", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/dl1hzcnxnbbcpf6zdhan58fghvdg3in8-openssl-1.0.2n/lib/libbrotlidec.so.1", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/mwgp39wfjlfd95dn09v0vywhm1x1v694-brotli-1.0.2-lib/lib/libbrotlidec.so.1", O_RDONLY|O_CLOEXEC) = 3 | |
read(3, "\177ELF\2\1\1\0\0\0\0\0\0\0\0\0\3\0>\0\1\0\0\0\20\v\0\0\0\0\0\0@\0\0\0\0\0\0\0\20\322\0\0\0\0\0\0\0\0\0\0@\0008\0\7\0@\0\31\0\30\0\1\0\0\0\5\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0l\256\0\0\0\0\0\0l\256\0\0\0\0\0\0\0\0 \0\0\0\0\0\1\0\0\0\6\0\0\0\210\275\0\0\0\0\0\0\210\275 \0\0\0\0\0\210\275 \0\0\0\0\0\200\2\0\0\0\0\0\0\210\2\0\0\0\0\0\0\0\0 \0\0\0\0\0\2\0\0\0\6\0\0\0\230\275\0\0\0\0\0\0\230\275 \0\0\0\0\0\230\275 \0\0\0\0\0\360\1\0\0\0\0\0\0\360\1\0\0\0\0\0\0\10\0\0\0\0\0\0\0P\345td\4\0\0\0P\243\0\0\0\0\0\0P\243\0\0\0\0\0\0P\243\0\0\0\0\0\0\214\1\0\0\0\0\0\0\214\1\0\0\0\0\0\0\4\0\0\0\0\0\0\0Q\345td\6\0\0\0\0\0\0\0"..., 832) = 832 | |
fstat(3, {st_mode=S_IFREG|0555, st_size=55376, ...}) = 0 | |
mmap(NULL, 2146320, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) = 0x76ffc2bb9000 | |
mprotect(0x76ffc2bc4000, 2097152, PROT_NONE) = 0 | |
mmap(0x76ffc2dc4000, 8192, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0xb000) = 0x76ffc2dc4000 | |
close(3) = 0 | |
mmap(NULL, 8192, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) = 0x76ffc6ca5000 | |
openat(AT_FDCWD, "/nix/store/y1wvrg5ckyy3472fpknf468cxfk8wkw0-nghttp2-1.24.0-lib/lib/tls/x86_64/x86_64/libnghttp2.so.14", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
stat("/nix/store/y1wvrg5ckyy3472fpknf468cxfk8wkw0-nghttp2-1.24.0-lib/lib/tls/x86_64/x86_64", 0x7ffdbd8a41a0) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/y1wvrg5ckyy3472fpknf468cxfk8wkw0-nghttp2-1.24.0-lib/lib/tls/x86_64/libnghttp2.so.14", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
stat("/nix/store/y1wvrg5ckyy3472fpknf468cxfk8wkw0-nghttp2-1.24.0-lib/lib/tls/x86_64", 0x7ffdbd8a41a0) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/y1wvrg5ckyy3472fpknf468cxfk8wkw0-nghttp2-1.24.0-lib/lib/tls/x86_64/libnghttp2.so.14", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
stat("/nix/store/y1wvrg5ckyy3472fpknf468cxfk8wkw0-nghttp2-1.24.0-lib/lib/tls/x86_64", 0x7ffdbd8a41a0) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/y1wvrg5ckyy3472fpknf468cxfk8wkw0-nghttp2-1.24.0-lib/lib/tls/libnghttp2.so.14", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
stat("/nix/store/y1wvrg5ckyy3472fpknf468cxfk8wkw0-nghttp2-1.24.0-lib/lib/tls", 0x7ffdbd8a41a0) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/y1wvrg5ckyy3472fpknf468cxfk8wkw0-nghttp2-1.24.0-lib/lib/x86_64/x86_64/libnghttp2.so.14", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
stat("/nix/store/y1wvrg5ckyy3472fpknf468cxfk8wkw0-nghttp2-1.24.0-lib/lib/x86_64/x86_64", 0x7ffdbd8a41a0) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/y1wvrg5ckyy3472fpknf468cxfk8wkw0-nghttp2-1.24.0-lib/lib/x86_64/libnghttp2.so.14", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
stat("/nix/store/y1wvrg5ckyy3472fpknf468cxfk8wkw0-nghttp2-1.24.0-lib/lib/x86_64", 0x7ffdbd8a41a0) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/y1wvrg5ckyy3472fpknf468cxfk8wkw0-nghttp2-1.24.0-lib/lib/x86_64/libnghttp2.so.14", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
stat("/nix/store/y1wvrg5ckyy3472fpknf468cxfk8wkw0-nghttp2-1.24.0-lib/lib/x86_64", 0x7ffdbd8a41a0) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/y1wvrg5ckyy3472fpknf468cxfk8wkw0-nghttp2-1.24.0-lib/lib/libnghttp2.so.14", O_RDONLY|O_CLOEXEC) = 3 | |
read(3, "\177ELF\2\1\1\0\0\0\0\0\0\0\0\0\3\0>\0\1\0\0\0`K\0\0\0\0\0\0@\0\0\0\0\0\0\0\330\276\2\0\0\0\0\0\0\0\0\0@\0008\0\7\0@\0\31\0\30\0\1\0\0\0\5\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\204)\2\0\0\0\0\0\204)\2\0\0\0\0\0\0\0 \0\0\0\0\0\1\0\0\0\6\0\0\0\260,\2\0\0\0\0\0\260,\"\0\0\0\0\0\260,\"\0\0\0\0\0008\"\0\0\0\0\0\0@\"\0\0\0\0\0\0\0\0 \0\0\0\0\0\2\0\0\0\6\0\0\0\300,\2\0\0\0\0\0\300,\"\0\0\0\0\0\300,\"\0\0\0\0\0\320\1\0\0\0\0\0\0\320\1\0\0\0\0\0\0\10\0\0\0\0\0\0\0P\345td\4\0\0\0\30\326\1\0\0\0\0\0\30\326\1\0\0\0\0\0\30\326\1\0\0\0\0\0\264\r\0\0\0\0\0\0\264\r\0\0\0\0\0\0\4\0\0\0\0\0\0\0Q\345td\6\0\0\0\0\0\0\0"..., 832) = 832 | |
fstat(3, {st_mode=S_IFREG|0555, st_size=181528, ...}) = 0 | |
mmap(NULL, 2248432, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) = 0x76ffc2994000 | |
mprotect(0x76ffc29b7000, 2093056, PROT_NONE) = 0 | |
mmap(0x76ffc2bb6000, 12288, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0x22000) = 0x76ffc2bb6000 | |
close(3) = 0 | |
openat(AT_FDCWD, "/nix/store/y1wvrg5ckyy3472fpknf468cxfk8wkw0-nghttp2-1.24.0-lib/lib/libssh2.so.1", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/zqi323lr2dyp0csnrrqns37svgmr0f5k-libkrb5-1.15.2/lib/tls/x86_64/x86_64/libssh2.so.1", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
stat("/nix/store/zqi323lr2dyp0csnrrqns37svgmr0f5k-libkrb5-1.15.2/lib/tls/x86_64/x86_64", 0x7ffdbd8a4170) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/zqi323lr2dyp0csnrrqns37svgmr0f5k-libkrb5-1.15.2/lib/tls/x86_64/libssh2.so.1", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
stat("/nix/store/zqi323lr2dyp0csnrrqns37svgmr0f5k-libkrb5-1.15.2/lib/tls/x86_64", 0x7ffdbd8a4170) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/zqi323lr2dyp0csnrrqns37svgmr0f5k-libkrb5-1.15.2/lib/tls/x86_64/libssh2.so.1", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
stat("/nix/store/zqi323lr2dyp0csnrrqns37svgmr0f5k-libkrb5-1.15.2/lib/tls/x86_64", 0x7ffdbd8a4170) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/zqi323lr2dyp0csnrrqns37svgmr0f5k-libkrb5-1.15.2/lib/tls/libssh2.so.1", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
stat("/nix/store/zqi323lr2dyp0csnrrqns37svgmr0f5k-libkrb5-1.15.2/lib/tls", 0x7ffdbd8a4170) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/zqi323lr2dyp0csnrrqns37svgmr0f5k-libkrb5-1.15.2/lib/x86_64/x86_64/libssh2.so.1", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
stat("/nix/store/zqi323lr2dyp0csnrrqns37svgmr0f5k-libkrb5-1.15.2/lib/x86_64/x86_64", 0x7ffdbd8a4170) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/zqi323lr2dyp0csnrrqns37svgmr0f5k-libkrb5-1.15.2/lib/x86_64/libssh2.so.1", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
stat("/nix/store/zqi323lr2dyp0csnrrqns37svgmr0f5k-libkrb5-1.15.2/lib/x86_64", 0x7ffdbd8a4170) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/zqi323lr2dyp0csnrrqns37svgmr0f5k-libkrb5-1.15.2/lib/x86_64/libssh2.so.1", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
stat("/nix/store/zqi323lr2dyp0csnrrqns37svgmr0f5k-libkrb5-1.15.2/lib/x86_64", 0x7ffdbd8a4170) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/zqi323lr2dyp0csnrrqns37svgmr0f5k-libkrb5-1.15.2/lib/libssh2.so.1", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
stat("/nix/store/zqi323lr2dyp0csnrrqns37svgmr0f5k-libkrb5-1.15.2/lib", {st_mode=S_IFDIR|0555, st_size=37, ...}) = 0 | |
openat(AT_FDCWD, "/nix/store/r43dk927l97n78rff7hnvsq49f3szkg6-zlib-1.2.11/lib/tls/x86_64/x86_64/libssh2.so.1", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
stat("/nix/store/r43dk927l97n78rff7hnvsq49f3szkg6-zlib-1.2.11/lib/tls/x86_64/x86_64", 0x7ffdbd8a4170) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/r43dk927l97n78rff7hnvsq49f3szkg6-zlib-1.2.11/lib/tls/x86_64/libssh2.so.1", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
stat("/nix/store/r43dk927l97n78rff7hnvsq49f3szkg6-zlib-1.2.11/lib/tls/x86_64", 0x7ffdbd8a4170) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/r43dk927l97n78rff7hnvsq49f3szkg6-zlib-1.2.11/lib/tls/x86_64/libssh2.so.1", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
stat("/nix/store/r43dk927l97n78rff7hnvsq49f3szkg6-zlib-1.2.11/lib/tls/x86_64", 0x7ffdbd8a4170) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/r43dk927l97n78rff7hnvsq49f3szkg6-zlib-1.2.11/lib/tls/libssh2.so.1", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
stat("/nix/store/r43dk927l97n78rff7hnvsq49f3szkg6-zlib-1.2.11/lib/tls", 0x7ffdbd8a4170) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/r43dk927l97n78rff7hnvsq49f3szkg6-zlib-1.2.11/lib/x86_64/x86_64/libssh2.so.1", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
stat("/nix/store/r43dk927l97n78rff7hnvsq49f3szkg6-zlib-1.2.11/lib/x86_64/x86_64", 0x7ffdbd8a4170) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/r43dk927l97n78rff7hnvsq49f3szkg6-zlib-1.2.11/lib/x86_64/libssh2.so.1", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
stat("/nix/store/r43dk927l97n78rff7hnvsq49f3szkg6-zlib-1.2.11/lib/x86_64", 0x7ffdbd8a4170) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/r43dk927l97n78rff7hnvsq49f3szkg6-zlib-1.2.11/lib/x86_64/libssh2.so.1", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
stat("/nix/store/r43dk927l97n78rff7hnvsq49f3szkg6-zlib-1.2.11/lib/x86_64", 0x7ffdbd8a4170) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/r43dk927l97n78rff7hnvsq49f3szkg6-zlib-1.2.11/lib/libssh2.so.1", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
stat("/nix/store/r43dk927l97n78rff7hnvsq49f3szkg6-zlib-1.2.11/lib", {st_mode=S_IFDIR|0555, st_size=5, ...}) = 0 | |
openat(AT_FDCWD, "/nix/store/dl1hzcnxnbbcpf6zdhan58fghvdg3in8-openssl-1.0.2n/lib/libssh2.so.1", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/c311jc1k0i9d6a7gvk7dmbsgsmcp0kzn-libssh2-1.8.0/lib/tls/x86_64/x86_64/libssh2.so.1", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
stat("/nix/store/c311jc1k0i9d6a7gvk7dmbsgsmcp0kzn-libssh2-1.8.0/lib/tls/x86_64/x86_64", 0x7ffdbd8a4170) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/c311jc1k0i9d6a7gvk7dmbsgsmcp0kzn-libssh2-1.8.0/lib/tls/x86_64/libssh2.so.1", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
stat("/nix/store/c311jc1k0i9d6a7gvk7dmbsgsmcp0kzn-libssh2-1.8.0/lib/tls/x86_64", 0x7ffdbd8a4170) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/c311jc1k0i9d6a7gvk7dmbsgsmcp0kzn-libssh2-1.8.0/lib/tls/x86_64/libssh2.so.1", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
stat("/nix/store/c311jc1k0i9d6a7gvk7dmbsgsmcp0kzn-libssh2-1.8.0/lib/tls/x86_64", 0x7ffdbd8a4170) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/c311jc1k0i9d6a7gvk7dmbsgsmcp0kzn-libssh2-1.8.0/lib/tls/libssh2.so.1", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
stat("/nix/store/c311jc1k0i9d6a7gvk7dmbsgsmcp0kzn-libssh2-1.8.0/lib/tls", 0x7ffdbd8a4170) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/c311jc1k0i9d6a7gvk7dmbsgsmcp0kzn-libssh2-1.8.0/lib/x86_64/x86_64/libssh2.so.1", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
stat("/nix/store/c311jc1k0i9d6a7gvk7dmbsgsmcp0kzn-libssh2-1.8.0/lib/x86_64/x86_64", 0x7ffdbd8a4170) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/c311jc1k0i9d6a7gvk7dmbsgsmcp0kzn-libssh2-1.8.0/lib/x86_64/libssh2.so.1", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
stat("/nix/store/c311jc1k0i9d6a7gvk7dmbsgsmcp0kzn-libssh2-1.8.0/lib/x86_64", 0x7ffdbd8a4170) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/c311jc1k0i9d6a7gvk7dmbsgsmcp0kzn-libssh2-1.8.0/lib/x86_64/libssh2.so.1", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
stat("/nix/store/c311jc1k0i9d6a7gvk7dmbsgsmcp0kzn-libssh2-1.8.0/lib/x86_64", 0x7ffdbd8a4170) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/c311jc1k0i9d6a7gvk7dmbsgsmcp0kzn-libssh2-1.8.0/lib/libssh2.so.1", O_RDONLY|O_CLOEXEC) = 3 | |
read(3, "\177ELF\2\1\1\0\0\0\0\0\0\0\0\0\3\0>\0\1\0\0\0\360U\0\0\0\0\0\0@\0\0\0\0\0\0\0\30\33\3\0\0\0\0\0\0\0\0\0@\0008\0\7\0@\0\32\0\31\0\1\0\0\0\5\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\324\255\2\0\0\0\0\0\324\255\2\0\0\0\0\0\0\0 \0\0\0\0\0\1\0\0\0\6\0\0\0p\261\2\0\0\0\0\0p\261\"\0\0\0\0\0p\261\"\0\0\0\0\0008\20\0\0\0\0\0\0H\20\0\0\0\0\0\0\0\0 \0\0\0\0\0\2\0\0\0\6\0\0\0\340\271\2\0\0\0\0\0\340\271\"\0\0\0\0\0\340\271\"\0\0\0\0\0\0\2\0\0\0\0\0\0\0\2\0\0\0\0\0\0\10\0\0\0\0\0\0\0P\345td\4\0\0\0\244\\\2\0\0\0\0\0\244\\\2\0\0\0\0\0\244\\\2\0\0\0\0\0\374\10\0\0\0\0\0\0\374\10\0\0\0\0\0\0\4\0\0\0\0\0\0\0Q\345td\6\0\0\0\0\0\0\0"..., 832) = 832 | |
fstat(3, {st_mode=S_IFREG|0555, st_size=205208, ...}) = 0 | |
mmap(NULL, 2277816, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) = 0x76ffc2767000 | |
mprotect(0x76ffc2792000, 2097152, PROT_NONE) = 0 | |
mmap(0x76ffc2992000, 8192, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0x2b000) = 0x76ffc2992000 | |
close(3) = 0 | |
openat(AT_FDCWD, "/nix/store/y1wvrg5ckyy3472fpknf468cxfk8wkw0-nghttp2-1.24.0-lib/lib/libssl.so.1.0.0", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/zqi323lr2dyp0csnrrqns37svgmr0f5k-libkrb5-1.15.2/lib/libssl.so.1.0.0", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/r43dk927l97n78rff7hnvsq49f3szkg6-zlib-1.2.11/lib/libssl.so.1.0.0", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/dl1hzcnxnbbcpf6zdhan58fghvdg3in8-openssl-1.0.2n/lib/libssl.so.1.0.0", O_RDONLY|O_CLOEXEC) = 3 | |
read(3, "\177ELF\2\1\1\0\0\0\0\0\0\0\0\0\3\0>\0\1\0\0\0\0\222\1\0\0\0\0\0@\0\0\0\0\0\0\0008\236\7\0\0\0\0\0\0\0\0\0@\0008\0\10\0@\0\33\0\32\0\1\0\0\0\5\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0242\6\0\0\0\0\0\0242\6\0\0\0\0\0\0\0 \0\0\0\0\0\1\0\0\0\6\0\0\0\0208\6\0\0\0\0\0\0208&\0\0\0\0\0\0208&\0\0\0\0\0000\235\0\0\0\0\0\0 \236\0\0\0\0\0\0\0\0 \0\0\0\0\0\2\0\0\0\6\0\0\0hq\6\0\0\0\0\0hq&\0\0\0\0\0hq&\0\0\0\0\0\0\2\0\0\0\0\0\0\0\2\0\0\0\0\0\0\10\0\0\0\0\0\0\0\4\0\0\0\4\0\0\0\0\2\0\0\0\0\0\0\0\2\0\0\0\0\0\0\0\2\0\0\0\0\0\0$\0\0\0\0\0\0\0$\0\0\0\0\0\0\0\4\0\0\0\0\0\0\0P\345td\4\0\0\0\314\241\5\0"..., 832) = 832 | |
fstat(3, {st_mode=S_IFREG|0555, st_size=500984, ...}) = 0 | |
mmap(NULL, 2545200, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) = 0x76ffc24f9000 | |
mprotect(0x76ffc255d000, 2093056, PROT_NONE) = 0 | |
mmap(0x76ffc275c000, 45056, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0x63000) = 0x76ffc275c000 | |
close(3) = 0 | |
openat(AT_FDCWD, "/nix/store/y1wvrg5ckyy3472fpknf468cxfk8wkw0-nghttp2-1.24.0-lib/lib/libgssapi_krb5.so.2", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/zqi323lr2dyp0csnrrqns37svgmr0f5k-libkrb5-1.15.2/lib/libgssapi_krb5.so.2", O_RDONLY|O_CLOEXEC) = 3 | |
read(3, "\177ELF\2\1\1\0\0\0\0\0\0\0\0\0\3\0>\0\1\0\0\0\20\275\0\0\0\0\0\0@\0\0\0\0\0\0\0\320M\5\0\0\0\0\0\0\0\0\0@\0008\0\7\0@\0\33\0\32\0\1\0\0\0\5\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\fo\4\0\0\0\0\0\fo\4\0\0\0\0\0\0\0 \0\0\0\0\0\1\0\0\0\6\0\0\0Hu\4\0\0\0\0\0Hu$\0\0\0\0\0Hu$\0\0\0\0\0P#\0\0\0\0\0\0h%\0\0\0\0\0\0\0\0 \0\0\0\0\0\2\0\0\0\6\0\0\0\210\201\4\0\0\0\0\0\210\201$\0\0\0\0\0\210\201$\0\0\0\0\0P\2\0\0\0\0\0\0P\2\0\0\0\0\0\0\10\0\0\0\0\0\0\0P\345td\4\0\0\0@\356\3\0\0\0\0\0@\356\3\0\0\0\0\0@\356\3\0\0\0\0\0\374\16\0\0\0\0\0\0\374\16\0\0\0\0\0\0\4\0\0\0\0\0\0\0Q\345td\6\0\0\0\0\0\0\0"..., 832) = 832 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=349328, ...}) = 0 | |
mmap(NULL, 2398896, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) = 0x76ffc22af000 | |
mprotect(0x76ffc22f6000, 2097152, PROT_NONE) = 0 | |
mmap(0x76ffc24f6000, 12288, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0x47000) = 0x76ffc24f6000 | |
close(3) = 0 | |
openat(AT_FDCWD, "/nix/store/y1wvrg5ckyy3472fpknf468cxfk8wkw0-nghttp2-1.24.0-lib/lib/libkrb5.so.3", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/zqi323lr2dyp0csnrrqns37svgmr0f5k-libkrb5-1.15.2/lib/libkrb5.so.3", O_RDONLY|O_CLOEXEC) = 3 | |
read(3, "\177ELF\2\1\1\0\0\0\0\0\0\0\0\0\3\0>\0\1\0\0\0\3409\2\0\0\0\0\0@\0\0\0\0\0\0\0\10\17\20\0\0\0\0\0\0\0\0\0@\0008\0\7\0@\0\33\0\32\0\1\0\0\0\5\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0d>\f\0\0\0\0\0d>\f\0\0\0\0\0\0\0 \0\0\0\0\0\1\0\0\0\6\0\0\0\340M\f\0\0\0\0\0\340M,\0\0\0\0\0\340M,\0\0\0\0\0\250\363\0\0\0\0\0\0\20\366\0\0\0\0\0\0\0\0 \0\0\0\0\0\2\0\0\0\6\0\0\0\340\30\r\0\0\0\0\0\340\30-\0\0\0\0\0\340\30-\0\0\0\0\0000\2\0\0\0\0\0\0000\2\0\0\0\0\0\0\10\0\0\0\0\0\0\0P\345td\4\0\0\0\240\336\n\0\0\0\0\0\240\336\n\0\0\0\0\0\240\336\n\0\0\0\0\0\0342\0\0\0\0\0\0\0342\0\0\0\0\0\0\4\0\0\0\0\0\0\0Q\345td\6\0\0\0\0\0\0\0"..., 832) = 832 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=1054152, ...}) = 0 | |
mmap(NULL, 2966512, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) = 0x76ffc1fda000 | |
mprotect(0x76ffc209e000, 2097152, PROT_NONE) = 0 | |
mmap(0x76ffc229e000, 69632, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0xc4000) = 0x76ffc229e000 | |
close(3) = 0 | |
openat(AT_FDCWD, "/nix/store/y1wvrg5ckyy3472fpknf468cxfk8wkw0-nghttp2-1.24.0-lib/lib/libk5crypto.so.3", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/zqi323lr2dyp0csnrrqns37svgmr0f5k-libkrb5-1.15.2/lib/libk5crypto.so.3", O_RDONLY|O_CLOEXEC) = 3 | |
read(3, "\177ELF\2\1\1\0\0\0\0\0\0\0\0\0\3\0>\0\1\0\0\0\340H\0\0\0\0\0\0@\0\0\0\0\0\0\0\200F\3\0\0\0\0\0\0\0\0\0@\0008\0\7\0@\0\33\0\32\0\1\0\0\0\5\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\314\342\2\0\0\0\0\0\314\342\2\0\0\0\0\0\0\0 \0\0\0\0\0\1\0\0\0\6\0\0\0\310\352\2\0\0\0\0\0\310\352\"\0\0\0\0\0\310\352\"\0\0\0\0\0p\25\0\0\0\0\0\0P$\0\0\0\0\0\0\0\0 \0\0\0\0\0\2\0\0\0\6\0\0\0\350\372\2\0\0\0\0\0\350\372\"\0\0\0\0\0\350\372\"\0\0\0\0\0\20\2\0\0\0\0\0\0\20\2\0\0\0\0\0\0\10\0\0\0\0\0\0\0P\345td\4\0\0\0T\242\2\0\0\0\0\0T\242\2\0\0\0\0\0T\242\2\0\0\0\0\0\34\10\0\0\0\0\0\0\34\10\0\0\0\0\0\0\4\0\0\0\0\0\0\0Q\345td\6\0\0\0\0\0\0\0"..., 832) = 832 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=216384, ...}) = 0 | |
mmap(NULL, 8192, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) = 0x76ffc6ca3000 | |
mmap(NULL, 2297624, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) = 0x76ffc1da9000 | |
mprotect(0x76ffc1dd8000, 2093056, PROT_NONE) = 0 | |
mmap(0x76ffc1fd7000, 12288, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0x2e000) = 0x76ffc1fd7000 | |
close(3) = 0 | |
openat(AT_FDCWD, "/nix/store/y1wvrg5ckyy3472fpknf468cxfk8wkw0-nghttp2-1.24.0-lib/lib/libcom_err.so.3", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/zqi323lr2dyp0csnrrqns37svgmr0f5k-libkrb5-1.15.2/lib/libcom_err.so.3", O_RDONLY|O_CLOEXEC) = 3 | |
read(3, "\177ELF\2\1\1\0\0\0\0\0\0\0\0\0\3\0>\0\1\0\0\0\0\20\0\0\0\0\0\0@\0\0\0\0\0\0\0\340A\0\0\0\0\0\0\0\0\0\0@\0008\0\7\0@\0\32\0\31\0\1\0\0\0\5\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0t \0\0\0\0\0\0t \0\0\0\0\0\0\0\0 \0\0\0\0\0\1\0\0\0\6\0\0\0\300,\0\0\0\0\0\0\300, \0\0\0\0\0\300, \0\0\0\0\0h\3\0\0\0\0\0\0\20\4\0\0\0\0\0\0\0\0 \0\0\0\0\0\2\0\0\0\6\0\0\0\330,\0\0\0\0\0\0\330, \0\0\0\0\0\330, \0\0\0\0\0\20\2\0\0\0\0\0\0\20\2\0\0\0\0\0\0\10\0\0\0\0\0\0\0P\345td\4\0\0\0L\34\0\0\0\0\0\0L\34\0\0\0\0\0\0L\34\0\0\0\0\0\0\264\0\0\0\0\0\0\0\264\0\0\0\0\0\0\0\4\0\0\0\0\0\0\0Q\345td\6\0\0\0\0\0\0\0"..., 832) = 832 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=18528, ...}) = 0 | |
mmap(NULL, 2109648, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) = 0x76ffc1ba5000 | |
mprotect(0x76ffc1ba8000, 2093056, PROT_NONE) = 0 | |
mmap(0x76ffc1da7000, 8192, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0x2000) = 0x76ffc1da7000 | |
close(3) = 0 | |
openat(AT_FDCWD, "/nix/store/y1wvrg5ckyy3472fpknf468cxfk8wkw0-nghttp2-1.24.0-lib/lib/libz.so.1", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/zqi323lr2dyp0csnrrqns37svgmr0f5k-libkrb5-1.15.2/lib/libz.so.1", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/r43dk927l97n78rff7hnvsq49f3szkg6-zlib-1.2.11/lib/libz.so.1", O_RDONLY|O_CLOEXEC) = 3 | |
read(3, "\177ELF\2\1\1\0\0\0\0\0\0\0\0\0\3\0>\0\1\0\0\0`#\0\0\0\0\0\0@\0\0\0\0\0\0\0 \202\1\0\0\0\0\0\0\0\0\0@\0008\0\7\0@\0\34\0\31\0\1\0\0\0\5\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\fS\1\0\0\0\0\0\fS\1\0\0\0\0\0\0\0 \0\0\0\0\0\1\0\0\0\6\0\0\0\350Z\1\0\0\0\0\0\350Z!\0\0\0\0\0\350Z!\0\0\0\0\0 \5\0\0\0\0\0\0(\5\0\0\0\0\0\0\0\0 \0\0\0\0\0\2\0\0\0\6\0\0\0P\\\1\0\0\0\0\0P\\!\0\0\0\0\0P\\!\0\0\0\0\0\360\1\0\0\0\0\0\0\360\1\0\0\0\0\0\0\10\0\0\0\0\0\0\0P\345td\4\0\0\0P5\1\0\0\0\0\0P5\1\0\0\0\0\0P5\1\0\0\0\0\0\24\4\0\0\0\0\0\0\24\4\0\0\0\0\0\0\4\0\0\0\0\0\0\0Q\345td\6\0\0\0\0\0\0\0"..., 832) = 832 | |
fstat(3, {st_mode=S_IFREG|0555, st_size=100640, ...}) = 0 | |
mmap(NULL, 2187280, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) = 0x76ffc198e000 | |
mprotect(0x76ffc19a4000, 2093056, PROT_NONE) = 0 | |
mmap(0x76ffc1ba3000, 8192, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0x15000) = 0x76ffc1ba3000 | |
close(3) = 0 | |
openat(AT_FDCWD, "/nix/store/mwgp39wfjlfd95dn09v0vywhm1x1v694-brotli-1.0.2-lib/lib/libbrotlicommon.so.1", O_RDONLY|O_CLOEXEC) = 3 | |
read(3, "\177ELF\2\1\1\0\0\0\0\0\0\0\0\0\3\0>\0\1\0\0\0\200\6\0\0\0\0\0\0@\0\0\0\0\0\0\0\370\367\1\0\0\0\0\0\0\0\0\0@\0008\0\7\0@\0\31\0\30\0\1\0\0\0\5\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\374\347\1\0\0\0\0\0\374\347\1\0\0\0\0\0\0\0 \0\0\0\0\0\1\0\0\0\6\0\0\0\330\355\1\0\0\0\0\0\330\355!\0\0\0\0\0\330\355!\0\0\0\0\0\370\2\0\0\0\0\0\0\0\3\0\0\0\0\0\0\0\0 \0\0\0\0\0\2\0\0\0\6\0\0\0\350\355\1\0\0\0\0\0\350\355!\0\0\0\0\0\350\355!\0\0\0\0\0\340\1\0\0\0\0\0\0\340\1\0\0\0\0\0\0\10\0\0\0\0\0\0\0P\345td\4\0\0\0@\347\1\0\0\0\0\0@\347\1\0\0\0\0\0@\347\1\0\0\0\0\0,\0\0\0\0\0\0\0,\0\0\0\0\0\0\0\4\0\0\0\0\0\0\0Q\345td\6\0\0\0\0\0\0\0"..., 832) = 832 | |
fstat(3, {st_mode=S_IFREG|0555, st_size=130616, ...}) = 0 | |
mmap(NULL, 2224344, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) = 0x76ffc176e000 | |
mprotect(0x76ffc178d000, 2093056, PROT_NONE) = 0 | |
mmap(0x76ffc198c000, 8192, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0x1e000) = 0x76ffc198c000 | |
close(3) = 0 | |
openat(AT_FDCWD, "/nix/store/zqi323lr2dyp0csnrrqns37svgmr0f5k-libkrb5-1.15.2/lib/libkrb5support.so.0", O_RDONLY|O_CLOEXEC) = 3 | |
read(3, "\177ELF\2\1\1\0\0\0\0\0\0\0\0\0\3\0>\0\1\0\0\0000.\0\0\0\0\0\0@\0\0\0\0\0\0\0h\337\0\0\0\0\0\0\0\0\0\0@\0008\0\7\0@\0\33\0\32\0\1\0\0\0\5\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\354\242\0\0\0\0\0\0\354\242\0\0\0\0\0\0\0\0 \0\0\0\0\0\1\0\0\0\6\0\0\0x\252\0\0\0\0\0\0x\252 \0\0\0\0\0x\252 \0\0\0\0\0p\6\0\0\0\0\0\0\20\10\0\0\0\0\0\0\0\0 \0\0\0\0\0\2\0\0\0\6\0\0\0\250\252\0\0\0\0\0\0\250\252 \0\0\0\0\0\250\252 \0\0\0\0\0\20\2\0\0\0\0\0\0\20\2\0\0\0\0\0\0\10\0\0\0\0\0\0\0P\345td\4\0\0\0d\206\0\0\0\0\0\0d\206\0\0\0\0\0\0d\206\0\0\0\0\0\0l\4\0\0\0\0\0\0l\4\0\0\0\0\0\0\4\0\0\0\0\0\0\0Q\345td\6\0\0\0\0\0\0\0"..., 832) = 832 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=58920, ...}) = 0 | |
mmap(NULL, 8192, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) = 0x76ffc6ca1000 | |
mmap(NULL, 2142856, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) = 0x76ffc1562000 | |
mprotect(0x76ffc156d000, 2093056, PROT_NONE) = 0 | |
mmap(0x76ffc176c000, 8192, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0xa000) = 0x76ffc176c000 | |
close(3) = 0 | |
openat(AT_FDCWD, "/nix/store/zqi323lr2dyp0csnrrqns37svgmr0f5k-libkrb5-1.15.2/lib/libresolv.so.2", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
openat(AT_FDCWD, "/nix/store/2kcrj1ksd2a14bm5sky182fv2xwfhfap-glibc-2.26-131/lib/libresolv.so.2", O_RDONLY|O_CLOEXEC) = 3 | |
read(3, "\177ELF\2\1\1\0\0\0\0\0\0\0\0\0\3\0>\0\1\0\0\0\2206\0\0\0\0\0\0@\0\0\0\0\0\0\0(b\1\0\0\0\0\0\0\0\0\0@\0008\0\10\0@\0\37\0\34\0\1\0\0\0\5\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\354\"\1\0\0\0\0\0\354\"\1\0\0\0\0\0\0\0 \0\0\0\0\0\1\0\0\0\6\0\0\0H$\1\0\0\0\0\0H$!\0\0\0\0\0H$!\0\0\0\0\0X\f\0\0\0\0\0\0X4\0\0\0\0\0\0\0\0 \0\0\0\0\0\2\0\0\0\6\0\0\0\350+\1\0\0\0\0\0\350+!\0\0\0\0\0\350+!\0\0\0\0\0\360\1\0\0\0\0\0\0\360\1\0\0\0\0\0\0\10\0\0\0\0\0\0\0\4\0\0\0\4\0\0\0\0\2\0\0\0\0\0\0\0\2\0\0\0\0\0\0\0\2\0\0\0\0\0\0D\0\0\0\0\0\0\0D\0\0\0\0\0\0\0\4\0\0\0\0\0\0\0P\345td\4\0\0\0\244\373\0\0"..., 832) = 832 | |
fstat(3, {st_mode=S_IFREG|0555, st_size=92648, ...}) = 0 | |
mmap(NULL, 2185376, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) = 0x76ffc134c000 | |
mprotect(0x76ffc135f000, 2093056, PROT_NONE) = 0 | |
mmap(0x76ffc155e000, 8192, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0x12000) = 0x76ffc155e000 | |
mmap(0x76ffc1560000, 6304, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x76ffc1560000 | |
close(3) = 0 | |
mmap(NULL, 8192, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) = 0x76ffc6c9f000 | |
mmap(NULL, 12288, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) = 0x76ffc6c9c000 | |
arch_prctl(ARCH_SET_FS, 0x76ffc6c9cbc0) = 0 | |
mprotect(0x76ffc51be000, 16384, PROT_READ) = 0 | |
mprotect(0x76ffc155e000, 4096, PROT_READ) = 0 | |
mprotect(0x76ffc49d8000, 4096, PROT_READ) = 0 | |
mprotect(0x76ffc176c000, 4096, PROT_READ) = 0 | |
mprotect(0x76ffc5728000, 4096, PROT_READ) = 0 | |
mprotect(0x76ffc198c000, 4096, PROT_READ) = 0 | |
mprotect(0x76ffc1ba3000, 4096, PROT_READ) = 0 | |
mprotect(0x76ffc1da7000, 4096, PROT_READ) = 0 | |
mprotect(0x76ffc1fd7000, 8192, PROT_READ) = 0 | |
mprotect(0x76ffc229e000, 61440, PROT_READ) = 0 | |
mprotect(0x76ffc24f6000, 8192, PROT_READ) = 0 | |
mprotect(0x76ffc4deb000, 114688, PROT_READ) = 0 | |
mprotect(0x76ffc275c000, 20480, PROT_READ) = 0 | |
mprotect(0x76ffc2992000, 4096, PROT_READ) = 0 | |
mprotect(0x76ffc2bb6000, 4096, PROT_READ) = 0 | |
mprotect(0x76ffc2dc4000, 4096, PROT_READ) = 0 | |
mprotect(0x76ffc304a000, 4096, PROT_READ) = 0 | |
mprotect(0x76ffc47d0000, 4096, PROT_READ) = 0 | |
mprotect(0x76ffc3270000, 4096, PROT_READ) = 0 | |
mprotect(0x76ffc349e000, 86016, PROT_READ) = 0 | |
mmap(NULL, 8192, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) = 0x76ffc6c9a000 | |
mprotect(0x76ffc5a9a000, 49152, PROT_READ) = 0 | |
mprotect(0x76ffc40a5000, 12288, PROT_READ) = 0 | |
mprotect(0x76ffc379b000, 28672, PROT_READ) = 0 | |
mprotect(0x76ffc3bbd000, 73728, PROT_READ) = 0 | |
mprotect(0x76ffc3e22000, 4096, PROT_READ) = 0 | |
mprotect(0x76ffc42b7000, 4096, PROT_READ) = 0 | |
mprotect(0x76ffc45b2000, 12288, PROT_READ) = 0 | |
mprotect(0x76ffc5cb2000, 4096, PROT_READ) = 0 | |
mprotect(0x76ffc5f35000, 12288, PROT_READ) = 0 | |
mmap(NULL, 12288, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) = 0x76ffc6c97000 | |
mprotect(0x76ffc630e000, 40960, PROT_READ) = 0 | |
mprotect(0x76ffc6542000, 4096, PROT_READ) = 0 | |
mprotect(0x76ffc6867000, 16384, PROT_READ) = 0 | |
mprotect(0x76ffc6a8b000, 4096, PROT_READ) = 0 | |
mprotect(0x63c000, 4096, PROT_READ) = 0 | |
mprotect(0x76ffc6cb1000, 4096, PROT_READ) = 0 | |
set_tid_address(0x76ffc6c9ce90) = 10250 | |
set_robust_list(0x76ffc6c9cea0, 24) = 0 | |
rt_sigaction(SIGRTMIN, {sa_handler=0x76ffc45bd9f0, sa_mask=[], sa_flags=SA_RESTORER|SA_SIGINFO, sa_restorer=0x76ffc45c9dd0}, NULL, 8) = 0 | |
rt_sigaction(SIGRT_1, {sa_handler=0x76ffc45bda80, sa_mask=[], sa_flags=SA_RESTORER|SA_RESTART|SA_SIGINFO, sa_restorer=0x76ffc45c9dd0}, NULL, 8) = 0 | |
rt_sigprocmask(SIG_UNBLOCK, [RTMIN RT_1], NULL, 8) = 0 | |
prlimit64(0, RLIMIT_STACK, NULL, {rlim_cur=8192*1024, rlim_max=RLIM64_INFINITY}) = 0 | |
brk(NULL) = 0x63e000 | |
brk(0x65f000) = 0x65f000 | |
futex(0x76ffc5aa767c, FUTEX_WAKE_PRIVATE, 2147483647) = 0 | |
futex(0x76ffc5aa7688, FUTEX_WAKE_PRIVATE, 2147483647) = 0 | |
ioctl(2, TCGETS, {B38400 opost isig icanon echo ...}) = 0 | |
getpid() = 10250 | |
open("/sys/devices/system/cpu/online", O_RDONLY|O_CLOEXEC) = 3 | |
read(3, "0-7\n", 8192) = 4 | |
close(3) = 0 | |
getuid() = 0 | |
lstat("/etc/ssl/certs/ca-certificates.crt", {st_mode=S_IFLNK|0777, st_size=41, ...}) = 0 | |
brk(0x680000) = 0x680000 | |
openat(AT_FDCWD, "/etc/nix/nix.conf", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=486, ...}) = 0 | |
read(3, "# WARNING: this file is generated from the nix.* options in\n# your NixOS configuration, typically\n# /etc/nixos/configuration.nix. Do not edit it!\nbuild-users-group = nixbld\nmax-jobs = 8\ncores = 1\nsandbox = true\nextra-sandbox-paths = \nsubstituters = https://cache.nixos.org/\ntrusted-substituters = \n"..., 486) = 486 | |
close(3) = 0 | |
futex(0x76ffc5f38540, FUTEX_WAKE_PRIVATE, 2147483647) = 0 | |
openat(AT_FDCWD, "/root/.config/nix/nix.conf", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
futex(0x76ffc53dd6f0, FUTEX_WAKE_PRIVATE, 2147483647) = 0 | |
ioctl(1, TIOCGWINSZ, 0x7ffdbd8a3800) = -1 ENOTTY (Inappropriate ioctl for device) | |
rt_sigprocmask(SIG_BLOCK, NULL, [], 8) = 0 | |
rt_sigprocmask(SIG_BLOCK, [HUP INT PIPE TERM WINCH], NULL, 8) = 0 | |
mmap(NULL, 8392704, PROT_NONE, MAP_PRIVATE|MAP_ANONYMOUS|MAP_STACK, -1, 0) = 0x76ffc0b4b000 | |
mprotect(0x76ffc0b4c000, 8388608, PROT_READ|PROT_WRITE) = 0 | |
clone(child_stack=0x76ffc134ab30, flags=CLONE_VM|CLONE_FS|CLONE_FILES|CLONE_SIGHAND|CLONE_THREAD|CLONE_SYSVSEM|CLONE_SETTLS|CLONE_PARENT_SETTID|CLONE_CHILD_CLEARTID, parent_tidptr=0x76ffc134b9d0, tls=0x76ffc134b700, child_tidptr=0x76ffc134b9d0) = 10251 | |
rt_sigaction(SIGCHLD, {sa_handler=SIG_DFL, sa_mask=[], sa_flags=SA_RESTORER, sa_restorer=0x76ffc4e4a2d0}, NULL, 8) = 0 | |
rt_sigaction(SIGUSR1, {sa_handler=0x76ffc68781d0, sa_mask=[], sa_flags=SA_RESTORER, sa_restorer=0x76ffc4e4a2d0}, NULL, 8) = 0 | |
sigaltstack({ss_sp=0x660950, ss_flags=0, ss_size=18432}, NULL) = 0 | |
rt_sigaction(SIGSEGV, {sa_handler=0x76ffc6886ca0, sa_mask=~[RTMIN RT_1], sa_flags=SA_RESTORER|SA_ONSTACK|SA_SIGINFO, sa_restorer=0x76ffc4e4a2d0}, NULL, 8) = 0 | |
umask(022) = 022 | |
open("/proc/self/maps", O_RDONLY|O_CLOEXEC) = 3 | |
prlimit64(0, RLIMIT_STACK, NULL, {rlim_cur=8192*1024, rlim_max=RLIM64_INFINITY}) = 0 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=0, ...}) = 0 | |
read(3, "00400000-0043c000 r-xp 00000000 00:19 283599 /nix/store/r8zhwq9xylxw8a823kpvqy0kfqq4g52f-nix-2.0pre5968_a6c0b773/bin/nix-build\n0063c000-0063d000 r--p 0003c000 00:19 283599 /nix/store/r8zhwq9xylxw8a823kpvqy0kfqq4g52f-nix-2.0pre5968_a6c0b773/bin/"..., 1024) = 1024 | |
read(3, "/nix/store/2kcrj1ksd2a14bm5sky182fv2xwfhfap-glibc-2.26-131/lib/libresolv-2.26.so\n76ffc155f000-76ffc1560000 rw-p 00013000 00:19 132562 /nix/store/2kcrj1ksd2a14bm5sky182fv2xwfhfap-glibc-2.26-131/lib/libresolv-2.26.so\n76ffc1560000-76ffc1562000 rw-p 00000000 00:00 0 \n76ffc1562000-76f"..., 1024) = 1024 | |
read(3, "m1x1v694-brotli-1.0.2-lib/lib/libbrotlicommon.so.1.0.2\n76ffc178d000-76ffc198c000 ---p 0001f000 00:19 252908 /nix/store/mwgp39wfjlfd95dn09v0vywhm1x1v694-brotli-1.0.2-lib/lib/libbrotlicommon.so.1.0.2\n76ffc198c000-76ffc198d000 r--p 0001e000 00:19 252908 /nix/stor"..., 1024) = 1024 | |
read(3, "000 00:19 138483 /nix/store/r43dk927l97n78rff7hnvsq49f3szkg6-zlib-1.2.11/lib/libz.so.1.2.11\n76ffc1ba5000-76ffc1ba8000 r-xp 00000000 00:19 136276 /nix/store/zqi323lr2dyp0csnrrqns37svgmr0f5k-libkrb5-1.15.2/lib/libcom_err.so.3.0\n76ffc1ba8000-76ffc1da7000 ---p 000"..., 1024) = 1024 | |
read(3, "crypto.so.3.1\n76ffc1fd7000-76ffc1fd9000 r--p 0002e000 00:19 137469 /nix/store/zqi323lr2dyp0csnrrqns37svgmr0f5k-libkrb5-1.15.2/lib/libk5crypto.so.3.1\n76ffc1fd9000-76ffc1fda000 rw-p 00030000 00:19 137469 /nix/store/zqi323lr2dyp0csnrrqns37svgmr0f5k-libkrb5-1.15.2"..., 1024) = 1024 | |
read(3, "0csnrrqns37svgmr0f5k-libkrb5-1.15.2/lib/libgssapi_krb5.so.2.2\n76ffc22f6000-76ffc24f6000 ---p 00047000 00:19 136279 /nix/store/zqi323lr2dyp0csnrrqns37svgmr0f5k-libkrb5-1.15.2/lib/libgssapi_krb5.so.2.2\n76ffc24f6000-76ffc24f8000 r--p 00047000 00:19 136279 /nix/st"..., 1024) = 1024 | |
read(3, "0068000 00:19 138729 /nix/store/dl1hzcnxnbbcpf6zdhan58fghvdg3in8-openssl-1.0.2n/lib/libssl.so.1.0.0\n76ffc2767000-76ffc2792000 r-xp 00000000 00:19 142473 /nix/store/c311jc1k0i9d6a7gvk7dmbsgsmcp0kzn-libssh2-1.8.0/lib/libssh2.so.1.0.1\n76ffc2792000-76ffc2992000 --"..., 1024) = 1024 | |
read(3, "b/lib/libnghttp2.so.14.13.3\n76ffc2bb6000-76ffc2bb7000 r--p 00022000 00:19 138060 /nix/store/y1wvrg5ckyy3472fpknf468cxfk8wkw0-nghttp2-1.24.0-lib/lib/libnghttp2.so.14.13.3\n76ffc2bb7000-76ffc2bb9000 rw-p 00023000 00:19 138060 /nix/store/y1wvrg5ckyy3472fpknf468cxf"..., 1024) = 1024 | |
read(3, "0000000 00:19 259564 /nix/store/mwgp39wfjlfd95dn09v0vywhm1x1v694-brotli-1.0.2-lib/lib/libbrotlienc.so.1.0.2\n76ffc2e4a000-76ffc304a000 ---p 00084000 00:19 259564 /nix/store/mwgp39wfjlfd95dn09v0vywhm1x1v694-brotli-1.0.2-lib/lib/libbrotlienc.so.1.0.2\n76ffc304a000"..., 1024) = 1024 | |
read(3, "2.3/lib/liblzma.so.5.2.3\n76ffc3271000-76ffc3272000 rw-p 00025000 00:19 141985 /nix/store/chf54cl12ifswf6swh7kxpif477drihi-xz-5.2.3/lib/liblzma.so.5.2.3\n76ffc3272000-76ffc329e000 r-xp 00000000 00:19 137802 /nix/store/2gxzfkyl05040p97f7lzilv7yx3jj3v7-libseccomp-"..., 1024) = 1024 | |
read(3, " /nix/store/jhpzzb3xmxkapqvg9pnsx51psfnfawi0-aws-sdk-cpp-1.3.22/lib/libaws-cpp-sdk-core.so\n76ffc379b000-76ffc37a2000 r--p 000e7000 00:19 252895 /nix/store/jhpzzb3xmxkapqvg9pnsx51psfnfawi0-aws-sdk-cpp-1.3.22/lib/libaws-cpp-sdk-core.so\n76ffc37a2000-76ffc37a3000 rw-p "..., 1024) = 1024 | |
read(3, "fnfawi0-aws-sdk-cpp-1.3.22/lib/libaws-cpp-sdk-s3.so\n76ffc3bd0000-76ffc3c22000 r-xp 00000000 00:19 248305 /nix/store/kgq1fxb7c84r212kmq4p8zcxyi7fv51r-libsodium-1.0.16/lib/libsodium.so.23.1.0\n76ffc3c22000-76ffc3e22000 ---p 00052000 00:19 248305 /nix/store/kgq1fx"..., 1024) = 1024 | |
read(3, "00:19 141943 /nix/store/lha30sclfhw3r77hsknjfcawqafb94xi-curl-7.58.0/lib/libcurl.so.4.5.0\n76ffc40a8000-76ffc40a9000 rw-p 00084000 00:19 141943 /nix/store/lha30sclfhw3r77hsknjfcawqafb94xi-curl-7.58.0/lib/libcurl.so.4.5.0\n76ffc40a9000-76ffc40b8000 r-xp 00000000 "..., 1024) = 1024 | |
read(3, ".6\n76ffc43b2000-76ffc45b2000 ---p 000f9000 00:19 141517 /nix/store/3v6sf9l1fwbb1phq9ccm71096d44k489-sqlite-3.21.0/lib/libsqlite3.so.0.8.6\n76ffc45b2000-76ffc45b5000 r--p 000f9000 00:19 141517 /nix/store/3v6sf9l1fwbb1phq9ccm71096d44k489-sqlite-3.21.0/lib/libsqli"..., 1024) = 1024 | |
read(3, ":19 132558 /nix/store/2kcrj1ksd2a14bm5sky182fv2xwfhfap-glibc-2.26-131/lib/libpthread-2.26.so\n76ffc47d2000-76ffc47d6000 rw-p 00000000 00:00 0 \n76ffc47d6000-76ffc47d9000 r-xp 00000000 00:19 131093 /nix/store/2kcrj1ksd2a14bm5sky182fv2xwfhfap-glibc-2.26-131/lib/li"..., 1024) = 1024 | |
read(3, "ghvdg3in8-openssl-1.0.2n/lib/libcrypto.so.1.0.0\n76ffc4deb000-76ffc4e07000 r--p 00211000 00:19 138147 /nix/store/dl1hzcnxnbbcpf6zdhan58fghvdg3in8-openssl-1.0.2n/lib/libcrypto.so.1.0.0\n76ffc4e07000-76ffc4e12000 rw-p 0022d000 00:19 138147 /nix/store/dl1hzcnxnbbcp"..., 1024) = 1024 | |
read(3, "8000 rw-p 00000000 00:00 0 \n76ffc51c8000-76ffc51de000 r-xp 00000000 00:19 131384 /nix/store/2kcrj1ksd2a14bm5sky182fv2xwfhfap-glibc-2.26-131/lib/libgcc_s.so.1\n76ffc51de000-76ffc53dd000 ---p 00016000 00:19 131384 /nix/store/2kcrj1ksd2a14bm5sky182fv2xwfhfap-glibc"..., 1024) = 1024 | |
read(3, "5sky182fv2xwfhfap-glibc-2.26-131/lib/libm-2.26.so\n76ffc572a000-76ffc589a000 r-xp 00000000 00:19 135742 /nix/store/4zd34747fz0ggzzasy4icgn3lmy89pra-gcc-7.3.0-lib/lib/libstdc++.so.6.0.24\n76ffc589a000-76ffc5a9a000 ---p 00170000 00:19 135742 /nix/store/4zd34747fz0"..., 1024) = 1024 | |
read(3, "/libnixformat.so\n76ffc5cb2000-76ffc5cb3000 r--p 00008000 00:19 284430 /nix/store/r8zhwq9xylxw8a823kpvqy0kfqq4g52f-nix-2.0pre5968_a6c0b773/lib/libnixformat.so\n76ffc5cb3000-76ffc5cb4000 rw-p 00009000 00:19 284430 /nix/store/r8zhwq9xylxw8a823kpvqy0kfqq4g52f-nix-2"..., 1024) = 1024 | |
read(3, "007 /nix/store/r8zhwq9xylxw8a823kpvqy0kfqq4g52f-nix-2.0pre5968_a6c0b773/lib/libnixstore.so\n76ffc610f000-76ffc630e000 ---p 001d6000 00:19 283007 /nix/store/r8zhwq9xylxw8a823kpvqy0kfqq4g52f-nix-2.0pre5968_a6c0b773/lib/libnixstore.so\n76ffc630e000-76ffc6318000 r--"..., 1024) = 1024 | |
read(3, "e/dn852vplccs5w0qc3dnlfyma8b7b408d-boehm-gc-7.6.4/lib/libgc.so.1.3.2\n76ffc6543000-76ffc6544000 rw-p 00027000 00:19 254544 /nix/store/dn852vplccs5w0qc3dnlfyma8b7b408d-boehm-gc-7.6.4/lib/libgc.so.1.3.2\n76ffc6544000-76ffc6586000 rw-p 00000000 00:00 0 \n76ffc6586000-76ffc6668000 r-xp "..., 1024) = 1024 | |
read(3, "x-2.0pre5968_a6c0b773/lib/libnixmain.so\n76ffc688b000-76ffc6a8b000 ---p 0001f000 00:19 284431 /nix/store/r8zhwq9xylxw8a823kpvqy0kfqq4g52f-nix-2.0pre5968_a6c0b773/lib/libnixmain.so\n76ffc6a8b000-76ffc6a8c000 r--p 0001f000 00:19 284431 /nix/store/r8zhwq9xylxw8a823"..., 1024) = 1024 | |
read(3, "c6cb4000 rw-p 00000000 00:00 0 \n7ffdbd885000-7ffdbd8a7000 rw-p 00000000 00:00 0 [stack]\n7ffdbd97f000-7ffdbd982000 r--p 00000000 00:00 0 [vvar]\n7ffdbd982000-7ffdbd984000 r-xp 00000000 00:00 0 [vdso]\n", 1024) = 273 | |
close(3) = 0 | |
sched_getaffinity(10250, 32, [0, 1, 2, 3, 4, 5, 6, 7]) = 32 | |
brk(0x690000) = 0x690000 | |
brk(0x6a0000) = 0x6a0000 | |
brk(0x6b0000) = 0x6b0000 | |
brk(0x6c0000) = 0x6c0000 | |
brk(0x6d0000) = 0x6d0000 | |
rt_sigaction(SIGPWR, {sa_handler=0x76ffc6338160, sa_mask=~[INT QUIT ABRT BUS SEGV TERM RTMIN RT_1], sa_flags=SA_RESTORER|SA_RESTART|SA_SIGINFO, sa_restorer=0x76ffc4e4a2d0}, NULL, 8) = 0 | |
rt_sigaction(SIGXCPU, {sa_handler=0x76ffc6337f00, sa_mask=~[INT QUIT ABRT BUS SEGV TERM RTMIN RT_1], sa_flags=SA_RESTORER|SA_RESTART, sa_restorer=0x76ffc4e4a2d0}, NULL, 8) = 0 | |
openat(AT_FDCWD, "/proc/stat", O_RDONLY) = 3 | |
read(3, "cpu 858 0 1013 346853 2994 0 44 0 0 0\ncpu0 51 0 122 43511 282 0 4 0 0 0\ncpu1 343 0 90 43142 375 0 1 0 0 0\ncpu2 47 0 93 43367 457 0 1 0 0 0\ncpu3 49 0 136 43266 454 0 28 0 0 0\ncpu4 46 0 83 43556 275 0 0 0 0 0\ncpu5 119 0 147 43195 497 0 6 0 0 0\ncpu6 108 0 83 43512 296 0 1 0 0 0\ncpu7 92 0 257 43301 353"..., 4096) = 1476 | |
close(3) = 0 | |
rt_sigprocmask(SIG_BLOCK, ~[XCPU PWR RTMIN RT_1], [HUP INT PIPE TERM WINCH], 8) = 0 | |
mmap(NULL, 8392704, PROT_NONE, MAP_PRIVATE|MAP_ANONYMOUS|MAP_STACK, -1, 0) = 0x76ffc034a000 | |
mprotect(0x76ffc034b000, 8388608, PROT_READ|PROT_WRITE) = 0 | |
clone(child_stack=0x76ffc0b49b30, flags=CLONE_VM|CLONE_FS|CLONE_FILES|CLONE_SIGHAND|CLONE_THREAD|CLONE_SYSVSEM|CLONE_SETTLS|CLONE_PARENT_SETTID|CLONE_CHILD_CLEARTID, parent_tidptr=0x76ffc0b4a9d0, tls=0x76ffc0b4a700, child_tidptr=0x76ffc0b4a9d0) = 10252 | |
mmap(NULL, 8392704, PROT_NONE, MAP_PRIVATE|MAP_ANONYMOUS|MAP_STACK, -1, 0) = 0x76ffbfb49000 | |
mprotect(0x76ffbfb4a000, 8388608, PROT_READ|PROT_WRITE) = 0 | |
clone(child_stack=0x76ffc0348b30, flags=CLONE_VM|CLONE_FS|CLONE_FILES|CLONE_SIGHAND|CLONE_THREAD|CLONE_SYSVSEM|CLONE_SETTLS|CLONE_PARENT_SETTID|CLONE_CHILD_CLEARTID, parent_tidptr=0x76ffc03499d0, tls=0x76ffc0349700, child_tidptr=0x76ffc03499d0) = 10253 | |
mmap(NULL, 8392704, PROT_NONE, MAP_PRIVATE|MAP_ANONYMOUS|MAP_STACK, -1, 0) = 0x76ffbf348000 | |
mprotect(0x76ffbf349000, 8388608, PROT_READ|PROT_WRITE) = 0 | |
clone(child_stack=0x76ffbfb47b30, flags=CLONE_VM|CLONE_FS|CLONE_FILES|CLONE_SIGHAND|CLONE_THREAD|CLONE_SYSVSEM|CLONE_SETTLS|CLONE_PARENT_SETTID|CLONE_CHILD_CLEARTID, parent_tidptr=0x76ffbfb489d0, tls=0x76ffbfb48700, child_tidptr=0x76ffbfb489d0) = 10254 | |
mmap(NULL, 8392704, PROT_NONE, MAP_PRIVATE|MAP_ANONYMOUS|MAP_STACK, -1, 0) = 0x76ffbeb47000 | |
mprotect(0x76ffbeb48000, 8388608, PROT_READ|PROT_WRITE) = 0 | |
clone(child_stack=0x76ffbf346b30, flags=CLONE_VM|CLONE_FS|CLONE_FILES|CLONE_SIGHAND|CLONE_THREAD|CLONE_SYSVSEM|CLONE_SETTLS|CLONE_PARENT_SETTID|CLONE_CHILD_CLEARTID, parent_tidptr=0x76ffbf3479d0, tls=0x76ffbf347700, child_tidptr=0x76ffbf3479d0) = 10255 | |
mmap(NULL, 8392704, PROT_NONE, MAP_PRIVATE|MAP_ANONYMOUS|MAP_STACK, -1, 0) = 0x76ffbe346000 | |
mprotect(0x76ffbe347000, 8388608, PROT_READ|PROT_WRITE) = 0 | |
clone(child_stack=0x76ffbeb45b30, flags=CLONE_VM|CLONE_FS|CLONE_FILES|CLONE_SIGHAND|CLONE_THREAD|CLONE_SYSVSEM|CLONE_SETTLS|CLONE_PARENT_SETTID|CLONE_CHILD_CLEARTID, parent_tidptr=0x76ffbeb469d0, tls=0x76ffbeb46700, child_tidptr=0x76ffbeb469d0) = 10256 | |
mmap(NULL, 8392704, PROT_NONE, MAP_PRIVATE|MAP_ANONYMOUS|MAP_STACK, -1, 0) = 0x76ffbdb45000 | |
mprotect(0x76ffbdb46000, 8388608, PROT_READ|PROT_WRITE) = 0 | |
clone(child_stack=0x76ffbe344b30, flags=CLONE_VM|CLONE_FS|CLONE_FILES|CLONE_SIGHAND|CLONE_THREAD|CLONE_SYSVSEM|CLONE_SETTLS|CLONE_PARENT_SETTID|CLONE_CHILD_CLEARTID, parent_tidptr=0x76ffbe3459d0, tls=0x76ffbe345700, child_tidptr=0x76ffbe3459d0) = 10257 | |
mmap(NULL, 8392704, PROT_NONE, MAP_PRIVATE|MAP_ANONYMOUS|MAP_STACK, -1, 0) = 0x76ffbd344000 | |
mprotect(0x76ffbd345000, 8388608, PROT_READ|PROT_WRITE) = 0 | |
clone(child_stack=0x76ffbdb43b30, flags=CLONE_VM|CLONE_FS|CLONE_FILES|CLONE_SIGHAND|CLONE_THREAD|CLONE_SYSVSEM|CLONE_SETTLS|CLONE_PARENT_SETTID|CLONE_CHILD_CLEARTID, parent_tidptr=0x76ffbdb449d0, tls=0x76ffbdb44700, child_tidptr=0x76ffbdb449d0) = 10258 | |
rt_sigprocmask(SIG_SETMASK, [HUP INT PIPE TERM WINCH], NULL, 8) = 0 | |
futex(0x76ffc6554728, FUTEX_WAIT_PRIVATE, 0, NULL) = 0 | |
futex(0x76ffc6554740, FUTEX_WAKE_PRIVATE, 1) = 0 | |
rt_sigprocmask(SIG_BLOCK, NULL, [HUP INT PIPE TERM WINCH], 8) = 0 | |
futex(0x76ffc6554b68, FUTEX_WAKE_PRIVATE, 2147483647) = 7 | |
futex(0x76ffc6554740, FUTEX_WAKE_PRIVATE, 1) = 1 | |
futex(0x76ffc6554b6c, FUTEX_WAKE_PRIVATE, 2147483647) = 7 | |
futex(0x76ffc6554740, FUTEX_WAKE_PRIVATE, 1) = 1 | |
futex(0x76ffc6554740, FUTEX_WAKE_PRIVATE, 1) = 0 | |
futex(0x76ffc6554b6c, FUTEX_WAKE_PRIVATE, 2147483647) = 7 | |
sysinfo({uptime=441, loads=[1376, 10784, 8128], totalram=16818446336, freeram=15944024064, sharedram=5517312, bufferram=1847296, totalswap=8588881920, freeswap=8588881920, procs=221, totalhigh=0, freehigh=0, mem_unit=1}) = 0 | |
brk(0x186d0000) = 0x186d0000 | |
ioctl(0, TCGETS, {B38400 opost isig icanon echo ...}) = 0 | |
ioctl(2, TCGETS, {B38400 opost isig icanon echo ...}) = 0 | |
lstat("/tmp", {st_mode=S_IFDIR|S_ISVTX|0777, st_size=9, ...}) = 0 | |
getpid() = 10250 | |
mkdir("/tmp/nix-build-10250-0", 0755) = 0 | |
lstat("/nix/store/r8zhwq9xylxw8a823kpvqy0kfqq4g52f-nix-2.0pre5968_a6c0b773/share/nix/corepkgs/derivation.nix", {st_mode=S_IFREG|0444, st_size=720, ...}) = 0 | |
openat(AT_FDCWD, "/nix/store/r8zhwq9xylxw8a823kpvqy0kfqq4g52f-nix-2.0pre5968_a6c0b773/share/nix/corepkgs/derivation.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=720, ...}) = 0 | |
read(3, "/* This is the implementation of the \342\200\230derivation\342\200\231 builtin function.\n It's actually a wrapper around the \342\200\230derivationStrict\342\200\231 primop. */\n\ndrvAttrs @ { outputs ? [ \"out\" ], ... }:\n\nlet\n\n strict = derivationStrict drvAttrs;\n\n commonAttrs = drvAttrs // (builtins.listToAttrs outputsList) //\n "..., 720) = 720 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs", {st_mode=S_IFLNK|0777, st_size=1, ...}) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs//nixos", {st_mode=S_IFDIR|0555, st_size=13, ...}) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos", {st_mode=S_IFDIR|0555, st_size=13, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/default.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=886, ...}) = 0 | |
read(3, "{ configuration ? import ./lib/from-env.nix \"NIXOS_CONFIG\" <nixos-config>\n, system ? builtins.currentSystem\n}:\n\nlet\n\n eval = import ./lib/eval-config.nix {\n inherit system;\n modules = [ configuration ];\n };\n\n # This is for `nixos-rebuild build-vm'.\n vmConfig = (import ./lib/eval-config.nix"..., 886) = 886 | |
close(3) = 0 | |
brk(0x186f1000) = 0x186f1000 | |
brk(0x186f2000) = 0x186f2000 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/lib/eval-config.nix", {st_mode=S_IFREG|0444, st_size=2100, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/lib/eval-config.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=2100, ...}) = 0 | |
read(3, "# From an end-user configuration file (`configuration.nix'), build a NixOS\n# configuration object (`config') from which we can retrieve option\n# values.\n\n# !!! Please think twice before adding to this argument list!\n# Ideally eval-config.nix would be an extremely thin wrapper\n# around lib.evalModule"..., 2100) = 2100 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/lib", {st_mode=S_IFDIR|0555, st_size=26, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/lib/default.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=6000, ...}) = 0 | |
read(3, "/* Library of low-level helper functions for nix expressions.\n *\n * Please implement (mostly) exhaustive unit tests\n * for new functions in `./tests.nix'.\n */\nlet\n\n callLibs = file: import file { inherit lib; };\n\n lib = rec {\n\n # often used, or depending on very little\n trivial = callLibs ./"..., 6000) = 6000 | |
close(3) = 0 | |
brk(0x18713000) = 0x18713000 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/lib/modules.nix", {st_mode=S_IFREG|0444, st_size=27008, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/lib/modules.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=27008, ...}) = 0 | |
read(3, "{ lib }:\n\nwith lib.lists;\nwith lib.strings;\nwith lib.trivial;\nwith lib.attrsets;\nwith lib.options;\nwith lib.debug;\nwith lib.types;\n\nrec {\n\n /* Evaluate a set of modules. The result is a set of two\n attributes: \342\200\230options\342\200\231: the nested set of all option declarations,\n and \342\200\230config\342\200\231: the"..., 27008) = 27008 | |
close(3) = 0 | |
brk(0x18734000) = 0x18734000 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/lib/types.nix", {st_mode=S_IFREG|0444, st_size=16698, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/lib/types.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=16698, ...}) = 0 | |
read(3, "# Definitions related to run-time type checking. Used in particular\n# to type-check NixOS configurations.\n{ lib }:\nwith lib.lists;\nwith lib.attrsets;\nwith lib.options;\nwith lib.trivial;\nwith lib.strings;\nlet\n\n inherit (lib.modules) mergeDefinitions filterOverrides;\n outer_types =\nrec {\n isType ="..., 16698) = 16698 | |
close(3) = 0 | |
brk(0x18756000) = 0x18756000 | |
brk(0x18777000) = 0x18777000 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/lib/debug.nix", {st_mode=S_IFREG|0444, st_size=5293, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/lib/debug.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=5293, ...}) = 0 | |
read(3, "{ lib }:\n\nlet\n\ninherit (builtins) trace attrNamesToStr isAttrs isList isInt\n isString isBool head substring attrNames;\n\ninherit (lib) all id mapAttrsFlatten elem isFunction;\n\nin\n\nrec {\n\n inherit (builtins) addErrorContext;\n\n addErrorContextToAttrs = lib.mapAttrs (a: v: lib.addErrorContext \""..., 5293) = 5293 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/lib/options.nix", {st_mode=S_IFREG|0444, st_size=5519, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/lib/options.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=5519, ...}) = 0 | |
read(3, "# Nixpkgs/NixOS option handling.\n{ lib }:\n\nwith lib.trivial;\nwith lib.lists;\nwith lib.attrsets;\nwith lib.strings;\n\nrec {\n\n isOption = lib.isType \"option\";\n mkOption =\n { default ? null # Default value used when no definition is given in the configuration.\n , defaultText ? null # Textual repr"..., 5519) = 5519 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/lib/attrsets.nix", {st_mode=S_IFREG|0444, st_size=13660, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/lib/attrsets.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=13660, ...}) = 0 | |
read(3, "{ lib }:\n# Operations on attribute sets.\n\nlet\n inherit (builtins) head tail length;\n inherit (lib.trivial) and or;\n inherit (lib.strings) concatStringsSep;\n inherit (lib.lists) fold concatMap concatLists all deepSeqList;\nin\n\nrec {\n inherit (builtins) attrNames listToAttrs hasAttr isAttrs getAtt"..., 13660) = 13660 | |
brk(0x18798000) = 0x18798000 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/lib/trivial.nix", {st_mode=S_IFREG|0444, st_size=4516, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/lib/trivial.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=4516, ...}) = 0 | |
read(3, "{ lib }:\nrec {\n\n /* The identity function\n For when you need a function that does \342\200\234nothing\342\200\235.\n\n Type: id :: a -> a\n */\n id = x: x;\n\n /* The constant function\n Ignores the second argument.\n Or: Construct a function that always returns a static value.\n\n Type: const :: a -> b"..., 4516) = 4516 | |
close(3) = 0 | |
brk(0x187a8000) = 0x187a8000 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/lib/strings.nix", {st_mode=S_IFREG|0444, st_size=14864, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/lib/strings.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=14864, ...}) = 0 | |
read(3, "/* String manipulation functions. */\n{ lib }:\nlet\n\ninherit (builtins) length;\n\nin\n\nrec {\n\n inherit (builtins) stringLength substring head tail isString replaceStrings;\n\n /* Concatenate a list of strings.\n\n Example:\n concatStrings [\"foo\" \"bar\"]\n => \"foobar\"\n */\n concatStrings = bu"..., 14864) = 14864 | |
close(3) = 0 | |
brk(0x187c9000) = 0x187c9000 | |
brk(0x187ca000) = 0x187ca000 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/lib/lists.nix", {st_mode=S_IFREG|0444, st_size=14590, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/lib/lists.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=14590, ...}) = 0 | |
read(3, "# General list operations.\n{ lib }:\nwith lib.trivial;\n\nrec {\n\n inherit (builtins) head tail length isList elemAt concatLists filter elem genList;\n\n /* Create a list consisting of a single element. `singleton x' is\n sometimes more convenient with respect to indentation than `[x]'\n when "..., 14590) = 14590 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/module-list.nix", {st_mode=S_IFREG|0444, st_size=26829, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/module-list.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=26829, ...}) = 0 | |
brk(0x187ef000) = 0x187ef000 | |
read(3, "[\n ./config/debug-info.nix\n ./config/fonts/corefonts.nix\n ./config/fonts/fontconfig.nix\n ./config/fonts/fontconfig-penultimate.nix\n ./config/fonts/fontconfig-ultimate.nix\n ./config/fonts/fontdir.nix\n ./config/fonts/fonts.nix\n ./config/fonts/ghostscript.nix\n ./config/gnu.nix\n ./config/i18n."..., 26829) = 26829 | |
close(3) = 0 | |
brk(0x18811000) = 0x18811000 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/lib/from-env.nix", {st_mode=S_IFREG|0444, st_size=143, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/lib/from-env.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=143, ...}) = 0 | |
read(3, "# TODO: remove this file. There is lib.maybeEnv now\nname: default:\nlet value = builtins.getEnv name; in\nif value == \"\" then default else value\n", 143) = 143 | |
close(3) = 0 | |
lstat("/etc/nixos/configuration.nix", {st_mode=S_IFREG|0644, st_size=4764, ...}) = 0 | |
lstat("/etc/nixos/configuration.nix", {st_mode=S_IFREG|0644, st_size=4764, ...}) = 0 | |
lstat("/etc/nixos/configuration.nix", {st_mode=S_IFREG|0644, st_size=4764, ...}) = 0 | |
openat(AT_FDCWD, "/etc/nixos/configuration.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0644, st_size=4764, ...}) = 0 | |
read(3, "{ config, pkgs, ... }:\n{\n imports = [\n ./hardware-configuration.nix\n ./config-locale.nix\n# ./config-shell.nix\n ./config-pkgs.nix\n# ./config-tweaks.nix\n ./config-zfs.nix\n# ./config-samba.nix\n# ./config-debug.nix\n# ./config-backup.nix\n ];\n\n boot = {\n loader.grub.enable"..., 4764) = 4764 | |
close(3) = 0 | |
lstat("/etc/nixos/hardware-configuration.nix", {st_mode=S_IFREG|0644, st_size=1911, ...}) = 0 | |
openat(AT_FDCWD, "/etc/nixos/hardware-configuration.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0644, st_size=1911, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n{\n\n imports = [\n <nixpkgs/nixos/modules/installer/scan/not-detected.nix>\n <nixpkgs/nixos/modules/profiles/hardened.nix>\n ];\n\n boot.initrd.availableKernelModules = [ \"ehci_pci\" \"ata_piix\" \"mptsas\" \"usbhid\" \"usb_storage\" \"sd_mod\" \"sr_mod\" ];\n boot.kernelModules = "..., 1911) = 1911 | |
close(3) = 0 | |
lstat("/etc/nixos/config-locale.nix", {st_mode=S_IFREG|0644, st_size=505, ...}) = 0 | |
openat(AT_FDCWD, "/etc/nixos/config-locale.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0644, st_size=505, ...}) = 0 | |
read(3, "{ config, pkgs, ... }:\n{\n i18n = {\n consoleFont = \"ter-v14n\";\n consolePackages = [ pkgs.terminus_font ];\n consoleKeyMap = \"ru\";\n defaultLocale = \"ru_RU.UTF-8\";\n };\n\n services.ntp = {\n enable = false;\n };\n\n services.chrony = {\n enable = true;\n extraFlags = [ \"-4\" ];\n serv"..., 505) = 505 | |
close(3) = 0 | |
lstat("/etc/nixos/config-pkgs.nix", {st_mode=S_IFREG|0644, st_size=833, ...}) = 0 | |
openat(AT_FDCWD, "/etc/nixos/config-pkgs.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0644, st_size=833, ...}) = 0 | |
read(3, "{ config, pkgs, ... }:\n{\n# nixpkgs.config = {\n# allowBroken = true;\n# allowUnfree = true;\n# };\n\n nix.package = pkgs.nixUnstable;\n \n# environment.systemPackages = with pkgs; [\n# mc htop binutils sysstat lsof subversion git dar\n# inetutils wget bind libressl tcpdump tshark mtr iperf3 "..., 833) = 833 | |
close(3) = 0 | |
lstat("/etc/nixos/config-zfs.nix", {st_mode=S_IFREG|0644, st_size=547, ...}) = 0 | |
openat(AT_FDCWD, "/etc/nixos/config-zfs.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0644, st_size=547, ...}) = 0 | |
read(3, "{ config, pkgs, ... }:\n{\n boot = {\n loader.grub.zfsSupport = true;\n supportedFilesystems = [ \"zfs\" ];\n zfs.forceImportRoot = true;\n zfs.forceImportAll = true;\n zfs.enableUnstable = true;\n };\n\n networking = {\n hostId = \"074466f7\";\n };\n\n systemd = {\n targets.zfs = {\n wan"..., 547) = 547 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/config/debug-info.nix", {st_mode=S_IFREG|0444, st_size=1268, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/config/debug-info.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=1268, ...}) = 0 | |
read(3, "{ config, lib, ... }:\n\nwith lib;\n\n{\n\n options = {\n\n environment.enableDebugInfo = mkOption {\n type = types.bool;\n default = false;\n description = ''\n Some NixOS packages provide debug symbols. However, these are\n not included in the system closure by default to save "..., 1268) = 1268 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/config/fonts/corefonts.nix", {st_mode=S_IFREG|0444, st_size=672, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/config/fonts/corefonts.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=672, ...}) = 0 | |
read(3, "# This module is deprecated, since you can just say \342\200\230fonts.fonts = [\n# pkgs.corefonts ];\342\200\231 instead.\n\n{ config, lib, pkgs, ... }:\n\nwith lib;\n\n{\n\n options = {\n\n fonts = {\n\n enableCoreFonts = mkOption {\n visible = false;\n default = false;\n description = ''\n Whe"..., 672) = 672 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/config/fonts/fontconfig.nix", {st_mode=S_IFREG|0444, st_size=14756, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/config/fonts/fontconfig.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=14756, ...}) = 0 | |
read(3, "/*\n\nNixOS support 2 fontconfig versions, \"support\" and \"latest\".\n\n- \"latest\" refers to default fontconfig package (pkgs.fontconfig).\n configuration files are linked to /etc/fonts/VERSION/conf.d/\n- \"support\" refers to supportPkg (pkgs.\"fontconfig_${supportVersion}\").\n configuration files are linked"..., 14756) = 14756 | |
close(3) = 0 | |
brk(0x18832000) = 0x18832000 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/config/fonts/fontconfig-penultimate.nix", {st_mode=S_IFREG|0444, st_size=8078, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/config/fonts/fontconfig-penultimate.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=8078, ...}) = 0 | |
read(3, "{ config, pkgs, lib, ... }:\n\nwith lib;\n\nlet\n cfg = config.fonts.fontconfig;\n\n fcBool = x: \"<bool>\" + (boolToString x) + \"</bool>\";\n\n # back-supported fontconfig version and package\n # version is used for font cache generation\n supportVersion = \"210\";\n supportPkg = pkgs.\"fontconfig_${suppor"..., 8078) = 8078 | |
close(3) = 0 | |
brk(0x18853000) = 0x18853000 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/config/fonts/fontconfig-ultimate.nix", {st_mode=S_IFREG|0444, st_size=2660, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/config/fonts/fontconfig-ultimate.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=2660, ...}) = 0 | |
read(3, "{ config, pkgs, lib, ... }:\n\nwith lib;\n\nlet fcBool = x: if x then \"<bool>true</bool>\" else \"<bool>false</bool>\";\n\n cfg = config.fonts.fontconfig.ultimate;\n\n latestVersion = pkgs.fontconfig.configVersion;\n\n # The configuration to be included in /etc/font/\n confPkg = pkgs.runCommand \"font"..., 2660) = 2660 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/config/fonts/fontdir.nix", {st_mode=S_IFREG|0444, st_size=977, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/config/fonts/fontdir.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=977, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n x11Fonts = pkgs.runCommand \"X11-fonts\" { } ''\n mkdir -p \"$out/share/X11-fonts\"\n find ${toString config.fonts.fonts} \\\n \\( -name fonts.dir -o -name '*.ttf' -o -name '*.otf' \\) \\\n -exec ln -sf -t \"$out/share/X11-fonts\" '{}' \\;\n cd \"$out"..., 977) = 977 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/config/fonts/fonts.nix", {st_mode=S_IFREG|0444, st_size=1060, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/config/fonts/fonts.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=1060, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\n{\n\n options = {\n\n fonts = {\n\n # TODO: find another name for it.\n fonts = mkOption {\n type = types.listOf types.path;\n default = [];\n example = literalExample \"[ pkgs.dejavu_fonts ]\";\n description = \"List of primary fon"..., 1060) = 1060 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/config/fonts/ghostscript.nix", {st_mode=S_IFREG|0444, st_size=563, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/config/fonts/ghostscript.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=563, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\n{\n\n options = {\n\n fonts = {\n\n enableGhostscriptFonts = mkOption {\n default = false;\n description = ''\n Whether to add the fonts provided by Ghostscript (such as\n various URW fonts and the \342\200\234Base-14\342\200\235 Postscript fonts)"..., 563) = 563 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/config/gnu.nix", {st_mode=S_IFREG|0444, st_size=1170, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/config/gnu.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=1170, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\n{\n options = {\n gnu = mkOption {\n type = types.bool;\n default = false;\n description = ''\n When enabled, GNU software is chosen by default whenever a there is\n a choice between GNU and non-GNU software (e.g., GNU lsh\n vs."..., 1170) = 1170 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/config/i18n.nix", {st_mode=S_IFREG|0444, st_size=4429, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/config/i18n.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=4429, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\n{\n ###### interface\n\n options = {\n\n i18n = {\n glibcLocales = mkOption {\n type = types.path;\n default = pkgs.glibcLocales.override {\n allLocales = any (x: x == \"all\") config.i18n.supportedLocales;\n locales = config.i18n"..., 4429) = 4429 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/config/krb5/default.nix", {st_mode=S_IFREG|0444, st_size=11261, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/config/krb5/default.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=11261, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.krb5;\n\n # This is to provide support for old configuration options (as much as is\n # reasonable). This can be removed after 18.03 was released.\n defaultConfig = {\n libdefaults = optionalAttrs (cfg.defaultRealm != null)\n { default"..., 11261) = 11261 | |
brk(0x18875000) = 0x18875000 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/config/ldap.nix", {st_mode=S_IFREG|0444, st_size=7894, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/config/ldap.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=7894, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith pkgs;\nwith lib;\n\nlet\n\n cfg = config.users.ldap;\n\n # Careful: OpenLDAP seems to be very picky about the indentation of\n # this file. Directives HAVE to start in the first column!\n ldapConfig = {\n target = \"ldap.conf\";\n source = writeText \"ldap.conf\" ''\n "..., 7894) = 7894 | |
close(3) = 0 | |
brk(0x18896000) = 0x18896000 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/config/networking.nix", {st_mode=S_IFREG|0444, st_size=10584, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/config/networking.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=10584, ...}) = 0 | |
read(3, "# /etc files related to networking, such as /etc/services.\n\n{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.networking;\n dnsmasqResolve = config.services.dnsmasq.enable &&\n config.services.dnsmasq.resolveLocalQueries;\n hasLocalResolver = config.services.bind.enable ||"..., 10584) = 10584 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/config/no-x-libs.nix", {st_mode=S_IFREG|0444, st_size=1588, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/config/no-x-libs.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=1588, ...}) = 0 | |
read(3, "# This module gets rid of all dependencies on X11 client libraries\n# (including fontconfig).\n\n{ config, lib, pkgs, ... }:\n\nwith lib;\n\n{\n options = {\n environment.noXlibs = mkOption {\n type = types.bool;\n default = false;\n description = ''\n Switch off the options in the defa"..., 1588) = 1588 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/config/nsswitch.nix", {st_mode=S_IFREG|0444, st_size=3462, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/config/nsswitch.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=3462, ...}) = 0 | |
read(3, "# Configuration for the Name Service Switch (/etc/nsswitch.conf).\n\n{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n # only with nscd up and running we can load NSS modules that are not integrated in NSS\n canLoadExternalModules = config.services.nscd.enable;\n myhostname = canLoadExternalModules;\n my"..., 3462) = 3462 | |
close(3) = 0 | |
brk(0x188b7000) = 0x188b7000 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/config/power-management.nix", {st_mode=S_IFREG|0444, st_size=2554, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/config/power-management.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=2554, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.powerManagement;\n\nin\n\n{\n\n ###### interface\n\n options = {\n\n powerManagement = {\n\n enable = mkOption {\n type = types.bool;\n default = true;\n description =\n ''\n Whether to enable power managem"..., 2554) = 2554 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/config/pulseaudio.nix", {st_mode=S_IFREG|0444, st_size=9119, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/config/pulseaudio.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=9119, ...}) = 0 | |
read(3, "{ config, lib, pkgs, pkgs_i686, ... }:\n\nwith pkgs;\nwith lib;\n\nlet\n\n cfg = config.hardware.pulseaudio;\n alsaCfg = config.sound;\n\n systemWide = cfg.enable && cfg.systemWide;\n nonSystemWide = cfg.enable && !cfg.systemWide;\n hasZeroconf = let z = cfg.zeroconf; in z.publish.enable || z.discovery.ena"..., 9119) = 9119 | |
close(3) = 0 | |
brk(0x188d8000) = 0x188d8000 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/config/shells-environment.nix", {st_mode=S_IFREG|0444, st_size=5926, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/config/shells-environment.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=5926, ...}) = 0 | |
read(3, "# This module defines a global environment configuration and\n# a common configuration for all shells.\n\n{ config, lib, utils, pkgs, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.environment;\n\n exportedEnvVars =\n let\n absoluteVariables =\n mapAttrs (n: toList) cfg.variables;\n\n suffixedVar"..., 5926) = 5926 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/config/swap.nix", {st_mode=S_IFREG|0444, st_size=7530, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/config/swap.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=7530, ...}) = 0 | |
read(3, "{ config, lib, pkgs, utils, ... }:\n\nwith utils;\nwith lib;\n\nlet\n\n randomEncryptionCoerce = enable: { inherit enable; };\n\n randomEncryptionOpts = { ... }: {\n\n options = {\n\n enable = mkOption {\n default = false;\n type = types.bool;\n description = ''\n Encrypt swap"..., 7530) = 7530 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/config/sysctl.nix", {st_mode=S_IFREG|0444, st_size=2156, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/config/sysctl.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=2156, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n sysctlOption = mkOptionType {\n name = \"sysctl option value\";\n check = val:\n let\n checkType = x: isBool x || isString x || isInt x || isNull x;\n in\n checkType val || (val._type or \"\" == \"override\" && checkType val.content);\n"..., 2156) = 2156 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/config/system-environment.nix", {st_mode=S_IFREG|0444, st_size=1062, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/config/system-environment.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=1062, ...}) = 0 | |
read(3, "# This module defines a system-wide environment that will be\n# initialised by pam_env (that is, not only in shells).\n{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.environment;\n\nin\n\n{\n\n options = {\n\n environment.sessionVariables = mkOption {\n default = {};\n description = '"..., 1062) = 1062 | |
close(3) = 0 | |
brk(0x188f9000) = 0x188f9000 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/config/system-path.nix", {st_mode=S_IFREG|0444, st_size=4298, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/config/system-path.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=4298, ...}) = 0 | |
read(3, "# This module defines the packages that appear in\n# /run/current-system/sw.\n\n{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n requiredPackages =\n [ config.nix.package\n pkgs.acl\n pkgs.attr\n pkgs.bashInteractive # bash with ncurses support\n pkgs.bzip2\n pkgs.coreutils\n pk"..., 4298) = 4298 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/config/terminfo.nix", {st_mode=S_IFREG|0444, st_size=694, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/config/terminfo.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=694, ...}) = 0 | |
read(3, "# This module manages the terminfo database\n# and its integration in the system.\n{ config, ... }:\n{\n config = {\n\n environment.pathsToLink = [\n \"/share/terminfo\"\n ];\n\n environment.etc.\"terminfo\" = {\n source = \"${config.system.path}/share/terminfo\";\n };\n\n environment.profileR"..., 694) = 694 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/config/timezone.nix", {st_mode=S_IFREG|0444, st_size=1581, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/config/timezone.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=1581, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n tzdir = \"${pkgs.tzdata}/share/zoneinfo\";\n nospace = str: filter (c: c == \" \") (stringToCharacters str) == [];\n timezone = types.nullOr (types.addCheck types.str nospace)\n // { description = \"null or string without spaces\"; };\n\nin\n\n{\n options = {\n"..., 1581) = 1581 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/config/unix-odbc-drivers.nix", {st_mode=S_IFREG|0444, st_size=1051, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/config/unix-odbc-drivers.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=1051, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\n# unixODBC drivers (this solution is not perfect.. Because the user has to\n# ask the admin to add a driver.. but it's simple and works\n\nlet\n iniDescription = pkg: ''\n [${pkg.fancyName}]\n Description = ${pkg.meta.description}\n Driver = ${pkg}/${pkg.dr"..., 1051) = 1051 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/config/users-groups.nix", {st_mode=S_IFREG|0444, st_size=19287, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/config/users-groups.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=19287, ...}) = 0 | |
read(3, "{ config, lib, utils, pkgs, ... }:\n\nwith lib;\n\nlet\n ids = config.ids;\n cfg = config.users;\n\n passwordDescription = ''\n The options <option>hashedPassword</option>,\n <option>password</option> and <option>passwordFile</option>\n controls what password is set for the user.\n <option>hashed"..., 19287) = 19287 | |
close(3) = 0 | |
brk(0x1891a000) = 0x1891a000 | |
brk(0x1893b000) = 0x1893b000 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/config/vpnc.nix", {st_mode=S_IFREG|0444, st_size=788, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/config/vpnc.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=788, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.networking.vpnc;\n mkServiceDef = name: value:\n {\n name = \"vpnc/${name}.conf\";\n value = { text = value; };\n };\n\nin\n{\n options = {\n networking.vpnc = {\n services = mkOption {\n type = types.attrsOf types.str;\n "..., 788) = 788 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/config/zram.nix", {st_mode=S_IFREG|0444, st_size=3940, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/config/zram.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=3940, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.zramSwap;\n\n devices = map (nr: \"zram${toString nr}\") (range 0 (cfg.numDevices - 1));\n\n modprobe = \"${pkgs.kmod}/bin/modprobe\";\n\nin\n\n{\n\n ###### interface\n\n options = {\n\n zramSwap = {\n\n enable = mkOption {\n default = false;"..., 3940) = 3940 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/hardware/all-firmware.nix", {st_mode=S_IFREG|0444, st_size=1468, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/hardware/all-firmware.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=1468, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.hardware;\nin {\n\n ###### interface\n\n options = {\n\n hardware.enableAllFirmware = mkOption {\n default = false;\n type = types.bool;\n description = ''\n Turn on this option if you want to enable all the firmware.\n '"..., 1468) = 1468 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/hardware/ckb.nix", {st_mode=S_IFREG|0444, st_size=879, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/hardware/ckb.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=879, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.hardware.ckb;\n\nin\n {\n options.hardware.ckb = {\n enable = mkEnableOption \"the Corsair keyboard/mouse driver\";\n\n package = mkOption {\n type = types.package;\n default = pkgs.ckb;\n defaultText = \"pkgs.ckb\";\n "..., 879) = 879 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/hardware/cpu/amd-microcode.nix", {st_mode=S_IFREG|0444, st_size=517, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/hardware/cpu/amd-microcode.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=517, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\n{\n\n ###### interface\n\n options = {\n\n hardware.cpu.amd.updateMicrocode = mkOption {\n default = false;\n type = types.bool;\n description = ''\n Update the CPU microcode for AMD processors.\n '';\n };\n\n };\n\n\n ###### implementation"..., 517) = 517 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/hardware/cpu/intel-microcode.nix", {st_mode=S_IFREG|0444, st_size=527, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/hardware/cpu/intel-microcode.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=527, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\n{\n\n ###### interface\n\n options = {\n\n hardware.cpu.intel.updateMicrocode = mkOption {\n default = false;\n type = types.bool;\n description = ''\n Update the CPU microcode for Intel processors.\n '';\n };\n\n };\n\n\n ###### implementa"..., 527) = 527 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/hardware/sensor/iio.nix", {st_mode=S_IFREG|0444, st_size=668, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/hardware/sensor/iio.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=668, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\n{\n ###### interface\n\n options = {\n hardware.sensor.iio = {\n enable = mkOption {\n description = \"Enable this option to support IIO sensors.\";\n type = types.bool;\n default = false;\n };\n };\n };\n\n ###### implementation\n\n c"..., 668) = 668 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/hardware/ksm.nix", {st_mode=S_IFREG|0444, st_size=472, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/hardware/ksm.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=472, ...}) = 0 | |
read(3, "{ config, lib, ... }:\n\n{\n options.hardware.enableKSM = lib.mkEnableOption \"Kernel Same-Page Merging\";\n\n config = lib.mkIf config.hardware.enableKSM {\n systemd.services.enable-ksm = {\n description = \"Enable Kernel Same-Page Merging\";\n wantedBy = [ \"multi-user.target\" ];\n after = ["..., 472) = 472 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/hardware/mcelog.nix", {st_mode=S_IFREG|0444, st_size=645, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/hardware/mcelog.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=645, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\n{\n meta.maintainers = with maintainers; [ grahamc ];\n options = {\n\n hardware.mcelog = {\n enable = mkOption {\n type = types.bool;\n default = false;\n description = ''\n Enable the Machine Check Exception logger.\n '';"..., 645) = 645 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/hardware/network/b43.nix", {st_mode=S_IFREG|0444, st_size=713, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/hardware/network/b43.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=713, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet kernelVersion = config.boot.kernelPackages.kernel.version; in\n\n{\n\n ###### interface\n\n options = {\n\n networking.enableB43Firmware = mkOption {\n default = false;\n type = types.bool;\n description = ''\n Turn on this option if you wan"..., 713) = 713 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/hardware/nitrokey.nix", {st_mode=S_IFREG|0444, st_size=860, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/hardware/nitrokey.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=860, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.hardware.nitrokey;\n\nin\n\n{\n options.hardware.nitrokey = {\n enable = mkOption {\n type = types.bool;\n default = false;\n description = ''\n Enables udev rules for Nitrokey devices. By default grants access\n to us"..., 860) = 860 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/hardware/opengl.nix", {st_mode=S_IFREG|0444, st_size=4367, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/hardware/opengl.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=4367, ...}) = 0 | |
read(3, "{ config, lib, pkgs, pkgs_i686, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.hardware.opengl;\n\n kernelPackages = config.boot.kernelPackages;\n\n videoDrivers = config.services.xserver.videoDrivers;\n\n makePackage = p: pkgs.buildEnv {\n name = \"mesa-drivers+txc-${p.mesa_drivers.version}\";\n paths =\n "..., 4367) = 4367 | |
close(3) = 0 | |
brk(0x1895c000) = 0x1895c000 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/hardware/pcmcia.nix", {st_mode=S_IFREG|0444, st_size=1051, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/hardware/pcmcia.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=1051, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n pcmciaUtils = pkgs.pcmciaUtils.passthru.function {\n inherit (config.hardware.pcmcia) firmware config;\n };\n\nin\n\n\n{\n ###### interface\n\n options = {\n\n hardware.pcmcia = {\n enable = mkOption {\n type = types.bool;\n default = false"..., 1051) = 1051 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/hardware/raid/hpsa.nix", {st_mode=S_IFREG|0444, st_size=1745, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/hardware/raid/hpsa.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=1745, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n hpssacli = pkgs.stdenv.mkDerivation rec {\n name = \"hpssacli-${version}\";\n version = \"2.40-13.0\";\n\n src = pkgs.fetchurl {\n url = \"http://downloads.linux.hpe.com/SDR/downloads/MCP/Ubuntu/pool/non-free/${name}_amd64.deb\";\n sha256 = \"11w7f"..., 1745) = 1745 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/hardware/usb-wwan.nix", {st_mode=S_IFREG|0444, st_size=444, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/hardware/usb-wwan.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=444, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\n{\n ###### interface\n\n options = {\n\n hardware.usbWwan = {\n enable = mkOption {\n type = types.bool;\n default = false;\n description = ''\n Enable this option to support USB WWAN adapters.\n '';\n };\n };\n };\n\n "..., 444) = 444 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/hardware/video/amdgpu.nix", {st_mode=S_IFREG|0444, st_size=164, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/hardware/video/amdgpu.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=164, ...}) = 0 | |
read(3, "{ config, lib, ... }:\n\nwith lib;\n{\n config = mkIf (elem \"amdgpu\" config.services.xserver.videoDrivers) {\n boot.blacklistedKernelModules = [ \"radeon\" ];\n };\n}\n\n", 164) = 164 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/hardware/video/amdgpu-pro.nix", {st_mode=S_IFREG|0444, st_size=1271, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/hardware/video/amdgpu-pro.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=1271, ...}) = 0 | |
read(3, "# This module provides the proprietary AMDGPU-PRO drivers.\n\n{ config, lib, pkgs, pkgs_i686, ... }:\n\nwith lib;\n\nlet\n\n drivers = config.services.xserver.videoDrivers;\n\n enabled = elem \"amdgpu-pro\" drivers;\n\n package = config.boot.kernelPackages.amdgpu-pro;\n package32 = pkgs_i686.linuxPackages.amdg"..., 1271) = 1271 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/hardware/video/ati.nix", {st_mode=S_IFREG|0444, st_size=840, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/hardware/video/ati.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=840, ...}) = 0 | |
read(3, "# This module provides the proprietary ATI X11 / OpenGL drivers.\n\n{ config, lib, pkgs, pkgs_i686, ... }:\n\nwith lib;\n\nlet\n\n drivers = config.services.xserver.videoDrivers;\n\n enabled = elem \"ati_unfree\" drivers;\n\n ati_x11 = config.boot.kernelPackages.ati_drivers_x11;\n\nin\n\n{\n\n config = mkIf enabled"..., 840) = 840 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/hardware/video/capture/mwprocapture.nix", {st_mode=S_IFREG|0444, st_size=1818, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/hardware/video/capture/mwprocapture.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=1818, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.hardware.mwProCapture;\n\n kernelPackages = config.boot.kernelPackages;\n\nin\n\n{\n\n options.hardware.mwProCapture.enable = mkEnableOption \"Magewell Pro Capture family kernel module\";\n\n config = mkIf cfg.enable {\n\n assertions = singleton {\n"..., 1818) = 1818 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/hardware/video/bumblebee.nix", {st_mode=S_IFREG|0444, st_size=2502, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/hardware/video/bumblebee.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=2502, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\nlet\n cfg = config.hardware.bumblebee;\n\n kernel = config.boot.kernelPackages;\n\n useNvidia = cfg.driver == \"nvidia\";\n\n bumblebee = pkgs.bumblebee.override {\n inherit useNvidia;\n useDisplayDevice = cfg.connectDisplay;\n };\n\n useBbswitch = cfg.pmMethod ="..., 2502) = 2502 | |
close(3) = 0 | |
brk(0x1897d000) = 0x1897d000 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/hardware/video/displaylink.nix", {st_mode=S_IFREG|0444, st_size=1481, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/hardware/video/displaylink.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=1481, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n enabled = elem \"displaylink\" config.services.xserver.videoDrivers;\n\n evdi = config.boot.kernelPackages.evdi;\n\n displaylink = pkgs.displaylink.override {\n inherit evdi;\n };\n\nin\n\n{\n\n config = mkIf enabled {\n\n boot.extraModulePackages = [ evdi ];"..., 1481) = 1481 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/hardware/video/nvidia.nix", {st_mode=S_IFREG|0444, st_size=3133, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/hardware/video/nvidia.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=3133, ...}) = 0 | |
read(3, "# This module provides the proprietary NVIDIA X11 / OpenGL drivers.\n\n{ config, lib, pkgs, pkgs_i686, ... }:\n\nwith lib;\n\nlet\n\n drivers = config.services.xserver.videoDrivers;\n\n # FIXME: should introduce an option like\n # \342\200\230hardware.video.nvidia.package\342\200\231 for overriding the default NVIDIA\n # dri"..., 3133) = 3133 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/hardware/video/webcam/facetimehd.nix", {st_mode=S_IFREG|0444, st_size=1027, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/hardware/video/webcam/facetimehd.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=1027, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.hardware.facetimehd;\n\n kernelPackages = config.boot.kernelPackages;\n\nin\n\n{\n\n options.hardware.facetimehd.enable = mkEnableOption \"facetimehd kernel module\";\n\n config = mkIf cfg.enable {\n\n assertions = singleton {\n assertion = ver"..., 1027) = 1027 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/i18n/input-method/default.nix", {st_mode=S_IFREG|0444, st_size=2367, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/i18n/input-method/default.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=2367, ...}) = 0 | |
read(3, "{ config, pkgs, lib, ... }:\n\nwith lib;\nlet\n cfg = config.i18n.inputMethod;\n\n gtk2_cache = pkgs.runCommand \"gtk2-immodule.cache\"\n { preferLocalBuild = true;\n allowSubstitutes = false;\n buildInputs = [ pkgs.gtk2 cfg.package ];\n }\n ''\n mkdir -p $out/etc/gtk-2.0/\n GTK_PATH"..., 2367) = 2367 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/i18n/input-method/fcitx.nix", {st_mode=S_IFREG|0444, st_size=1217, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/i18n/input-method/fcitx.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=1217, ...}) = 0 | |
read(3, "{ config, pkgs, lib, ... }:\n\nwith lib;\n\nlet\n cfg = config.i18n.inputMethod.fcitx;\n fcitxPackage = pkgs.fcitx.override { plugins = cfg.engines; };\n fcitxEngine = types.package // {\n name = \"fcitx-engine\";\n check = x: (lib.types.package.check x) && (attrByPath [\"meta\" \"isFcitxEngine\"] false "..., 1217) = 1217 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/i18n/input-method/ibus.nix", {st_mode=S_IFREG|0444, st_size=1922, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/i18n/input-method/ibus.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=1922, ...}) = 0 | |
read(3, "{ config, pkgs, lib, ... }:\n\nwith lib;\n\nlet\n cfg = config.i18n.inputMethod.ibus;\n ibusPackage = pkgs.ibus-with-plugins.override { plugins = cfg.engines; };\n ibusEngine = types.package // {\n name = \"ibus-engine\";\n check = x: (lib.types.package.check x) && (attrByPath [\"meta\" \"isIbusEngine\"]"..., 1922) = 1922 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/i18n/input-method/nabi.nix", {st_mode=S_IFREG|0444, st_size=366, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/i18n/input-method/nabi.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=366, ...}) = 0 | |
read(3, "{ config, pkgs, lib, ... }:\n\nwith lib;\n{\n config = mkIf (config.i18n.inputMethod.enabled == \"nabi\") {\n i18n.inputMethod.package = pkgs.nabi;\n\n environment.variables = {\n GTK_IM_MODULE = \"nabi\";\n QT_IM_MODULE = \"nabi\";\n XMODIFIERS = \"@im=nabi\";\n };\n\n services.xserver.d"..., 366) = 366 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/i18n/input-method/uim.nix", {st_mode=S_IFREG|0444, st_size=776, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/i18n/input-method/uim.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=776, ...}) = 0 | |
read(3, "{ config, pkgs, lib, ... }:\n\nwith lib;\n\nlet \n cfg = config.i18n.inputMethod.uim;\nin\n{\n options = {\n\n i18n.inputMethod.uim = {\n toolbar = mkOption {\n type = types.enum [ \"gtk\" \"gtk3\" \"gtk-systray\" \"gtk3-systray\" \"qt4\" ];\n default = \"gtk\";\n example = \"gtk-systray\";\n "..., 776) = 776 | |
close(3) = 0 | |
brk(0x1899f000) = 0x1899f000 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/installer/tools/auto-upgrade.nix", {st_mode=S_IFREG|0444, st_size=2421, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/installer/tools/auto-upgrade.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=2421, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet cfg = config.system.autoUpgrade; in\n\n{\n\n options = {\n\n system.autoUpgrade = {\n\n enable = mkOption {\n type = types.bool;\n default = false;\n description = ''\n Whether to periodically upgrade NixOS to the latest\n "..., 2421) = 2421 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/installer/tools/tools.nix", {st_mode=S_IFREG|0444, st_size=2230, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/installer/tools/tools.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=2230, ...}) = 0 | |
read(3, "# This module generates nixos-install, nixos-rebuild,\n# nixos-generate-config, etc.\n\n{ config, pkgs, modulesPath, ... }:\n\nlet\n cfg = config.installer;\n\n makeProg = args: pkgs.substituteAll (args // {\n dir = \"bin\";\n isExecutable = true;\n });\n\n nixos-build-vms = makeProg {\n name = \"nixos-"..., 2230) = 2230 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/misc/assertions.nix", {st_mode=S_IFREG|0444, st_size=945, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/misc/assertions.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=945, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\n{\n\n options = {\n\n assertions = mkOption {\n type = types.listOf types.unspecified;\n internal = true;\n default = [];\n example = [ { assertion = false; message = \"you can't enable this for that reason\"; } ];\n description = ''\n "..., 945) = 945 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/misc/crashdump.nix", {st_mode=S_IFREG|0444, st_size=2115, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/misc/crashdump.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=2115, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n crashdump = config.boot.crashDump;\n\n kernelParams = concatStringsSep \" \" crashdump.kernelParams;\n\nin\n###### interface\n{\n options = {\n boot = {\n crashDump = {\n enable = mkOption {\n type = types.bool;\n default = false;\n "..., 2115) = 2115 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/misc/extra-arguments.nix", {st_mode=S_IFREG|0444, st_size=102, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/misc/extra-arguments.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=102, ...}) = 0 | |
read(3, "{ lib, pkgs, config, ... }:\n\n{\n _module.args = {\n utils = import ../../lib/utils.nix pkgs;\n };\n}\n", 102) = 102 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/misc/ids.nix", {st_mode=S_IFREG|0444, st_size=13552, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/misc/ids.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=13552, ...}) = 0 | |
read(3, "# This module defines the global list of uids and gids. We keep a\n# central list to prevent id collisions.\n\n{ config, pkgs, lib, ... }:\n\n{\n options = {\n\n ids.uids = lib.mkOption {\n internal = true;\n description = ''\n The user IDs used in NixOS.\n '';\n };\n\n ids.gids = "..., 13552) = 13552 | |
close(3) = 0 | |
brk(0x189c0000) = 0x189c0000 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/misc/lib.nix", {st_mode=S_IFREG|0444, st_size=260, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/misc/lib.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=260, ...}) = 0 | |
read(3, "{ config, lib, ... }:\n\n{\n options = {\n lib = lib.mkOption {\n default = {};\n\n type = lib.types.attrsOf lib.types.attrs;\n\n description = ''\n This option allows modules to define helper functions, constants, etc.\n '';\n };\n };\n}\n", 260) = 260 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/misc/label.nix", {st_mode=S_IFREG|0444, st_size=1999, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/misc/label.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=1999, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.system.nixos;\nin\n\n{\n\n options.system = {\n\n nixos.label = mkOption {\n type = types.str;\n description = ''\n NixOS version name to be used in the names of generated\n outputs and boot labels.\n\n If you ever want"..., 1999) = 1999 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/misc/locate.nix", {st_mode=S_IFREG|0444, st_size=5818, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/misc/locate.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=5818, ...}) = 0 | |
read(3, "{ config, options, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.locate;\n isMLocate = hasPrefix \"mlocate\" cfg.locate.name;\n isFindutils = hasPrefix \"findutils\" cfg.locate.name;\nin {\n options.services.locate = with types; {\n enable = mkOption {\n type = bool;\n default = fal"..., 5818) = 5818 | |
close(3) = 0 | |
brk(0x189e1000) = 0x189e1000 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/misc/meta.nix", {st_mode=S_IFREG|0444, st_size=1556, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/misc/meta.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=1556, ...}) = 0 | |
read(3, "{ config, lib, ... }:\n\nwith lib;\n\nlet\n maintainer = mkOptionType {\n name = \"maintainer\";\n check = email: elem email (attrValues lib.maintainers);\n merge = loc: defs: listToAttrs (singleton (nameValuePair (last defs).file (last defs).value));\n };\n\n listOfMaintainers = types.listOf maintai"..., 1556) = 1556 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/misc/nixpkgs.nix", {st_mode=S_IFREG|0444, st_size=4794, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/misc/nixpkgs.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=4794, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.nixpkgs;\n\n isConfig = x:\n builtins.isAttrs x || lib.isFunction x;\n\n optCall = f: x:\n if lib.isFunction f\n then f x\n else f;\n\n mergeConfig = lhs_: rhs_:\n let\n lhs = optCall lhs_ { inherit pkgs; };\n rhs = optCall rh"..., 4794) = 4794 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/misc/passthru.nix", {st_mode=S_IFREG|0444, st_size=383, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/misc/passthru.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=383, ...}) = 0 | |
read(3, "# This module allows you to export something from configuration\n# Use case: export kernel source expression for ease of configuring\n\n{ config, lib, ... }:\n\n{\n options = {\n passthru = lib.mkOption {\n visible = false;\n description = ''\n This attribute set will be exported as a sys"..., 383) = 383 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/misc/version.nix", {st_mode=S_IFREG|0444, st_size=3581, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/misc/version.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=3581, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.system.nixos;\n\n releaseFile = \"${toString pkgs.path}/.version\";\n suffixFile = \"${toString pkgs.path}/.version-suffix\";\n revisionFile = \"${toString pkgs.path}/.git-revision\";\n gitRepo = \"${toString pkgs.path}/.git\";\n gitCommitId "..., 3581) = 3581 | |
close(3) = 0 | |
brk(0x18a02000) = 0x18a02000 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/programs/adb.nix", {st_mode=S_IFREG|0444, st_size=798, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/programs/adb.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=798, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\n{\n meta.maintainers = [ maintainers.mic92 ];\n\n ###### interface\n options = {\n programs.adb = {\n enable = mkOption {\n default = false;\n type = types.bool;\n description = ''\n Whether to configure system to use Android Deb"..., 798) = 798 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/programs/atop.nix", {st_mode=S_IFREG|0444, st_size=624, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/programs/atop.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=624, ...}) = 0 | |
read(3, "# Global configuration for atop.\n\n{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet cfg = config.programs.atop;\n\nin\n{\n ###### interface\n\n options = {\n\n programs.atop = {\n\n settings = mkOption {\n type = types.attrs;\n default = {};\n example = {\n flags = \"a1f\";\n "..., 624) = 624 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/programs/bash/bash.nix", {st_mode=S_IFREG|0444, st_size=6170, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/programs/bash/bash.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=6170, ...}) = 0 | |
read(3, "# This module defines global configuration for the Bash shell, in\n# particular /etc/bashrc and /etc/profile.\n\n{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n cfge = config.environment;\n\n cfg = config.programs.bash;\n\n bashCompletion = optionalString cfg.enableCompletion ''\n # Check whether we're "..., 6170) = 6170 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/programs/bcc.nix", {st_mode=S_IFREG|0444, st_size=281, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/programs/bcc.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=281, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n{\n options.programs.bcc.enable = lib.mkEnableOption \"bcc\";\n\n config = lib.mkIf config.programs.bcc.enable {\n environment.systemPackages = [ config.boot.kernelPackages.bcc ];\n boot.extraModulePackages = [ config.boot.kernelPackages.bcc ];\n };\n}\n", 281) = 281 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/programs/blcr.nix", {st_mode=S_IFREG|0444, st_size=546, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/programs/blcr.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=546, ...}) = 0 | |
read(3, "{ config, lib, ... }:\n\nlet\n inherit (lib) mkOption mkIf;\n cfg = config.environment.blcr;\n blcrPkg = config.boot.kernelPackages.blcr;\nin\n\n{\n ###### interface\n\n options = {\n environment.blcr.enable = mkOption {\n default = false;\n description =\n \"Whether to enable support for t"..., 546) = 546 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/programs/browserpass.nix", {st_mode=S_IFREG|0444, st_size=885, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/programs/browserpass.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=885, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\n{\n\n ###### interface\n options = {\n programs.browserpass.enable = mkEnableOption \"the NativeMessaging configuration for Chromium, Chrome, and Vivaldi.\";\n };\n\n ###### implementation\n config = mkIf config.programs.browserpass.enable {\n environment.syst"..., 885) = 885 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/programs/ccache.nix", {st_mode=S_IFREG|0444, st_size=2658, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/programs/ccache.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=2658, ...}) = 0 | |
read(3, "{ config, pkgs, lib, ... }:\n\nwith lib;\nlet\n cfg = config.programs.ccache;\nin {\n options.programs.ccache = {\n # host configuration\n enable = mkEnableOption \"CCache\";\n cacheDir = mkOption {\n type = types.path;\n description = \"CCache directory\";\n default = \"/var/cache/ccache\";"..., 2658) = 2658 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/programs/cdemu.nix", {st_mode=S_IFREG|0444, st_size=1328, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/programs/cdemu.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=1328, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet cfg = config.programs.cdemu;\nin {\n\n options = {\n programs.cdemu = {\n enable = mkOption {\n default = false;\n description = ''\n <command>cdemu</command> for members of\n <option>programs.cdemu.group</option>.\n '"..., 1328) = 1328 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/programs/chromium.nix", {st_mode=S_IFREG|0444, st_size=2856, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/programs/chromium.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=2856, ...}) = 0 | |
read(3, "{ config, lib, ... }:\n\nwith lib;\n\nlet\n cfg = config.programs.chromium;\n\n defaultProfile = filterAttrs (k: v: v != null) {\n HomepageLocation = cfg.homepageLocation;\n DefaultSearchProviderSearchURL = cfg.defaultSearchProviderSearchURL;\n DefaultSearchProviderSuggestURL = cfg.defaultSearchPro"..., 2856) = 2856 | |
close(3) = 0 | |
brk(0x18a23000) = 0x18a23000 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/programs/command-not-found/command-not-found.nix", {st_mode=S_IFREG|0444, st_size=2645, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/programs/command-not-found/command-not-found.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=2645, ...}) = 0 | |
read(3, "# This module provides suggestions of packages to install if the user\n# tries to run a missing command in Bash. This is implemented using a\n# SQLite database that maps program names to Nix package names (e.g.,\n# \"pdflatex\" is mapped to \"tetex\").\n\n{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = "..., 2645) = 2645 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/programs/criu.nix", {st_mode=S_IFREG|0444, st_size=533, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/programs/criu.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=533, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet cfg = config.programs.criu;\nin {\n\n options = {\n programs.criu = {\n enable = mkOption {\n default = false;\n description = ''\n Install <command>criu</command> along with necessary kernel options.\n '';\n };\n };\n }"..., 533) = 533 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/programs/dconf.nix", {st_mode=S_IFREG|0444, st_size=992, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/programs/dconf.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=992, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.programs.dconf;\n\n mkDconfProfile = name: path:\n { source = path; target = \"dconf/profile/${name}\"; };\n\nin\n{\n ###### interface\n\n options = {\n programs.dconf = {\n enable = mkEnableOption \"dconf\";\n\n profiles = mkOption {\n "..., 992) = 992 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/programs/environment.nix", {st_mode=S_IFREG|0444, st_size=1774, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/programs/environment.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=1774, ...}) = 0 | |
read(3, "# This module defines a standard configuration for NixOS global environment.\n\n# Most of the stuff here should probably be moved elsewhere sometime.\n\n{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.environment;\n\nin\n\n{\n\n config = {\n\n environment.variables =\n { NIXPKGS_CONFIG = \"/e"..., 1774) = 1774 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/programs/fish.nix", {st_mode=S_IFREG|0444, st_size=5808, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/programs/fish.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=5808, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n cfge = config.environment;\n\n cfg = config.programs.fish;\n\n fishAliases = concatStringsSep \"\\n\" (\n mapAttrsFlatten (k: v: \"alias ${k} '${v}'\") cfg.shellAliases\n );\n\nin\n\n{\n\n options = {\n\n programs.fish = {\n\n enable = mkOption {\n defa"..., 5808) = 5808 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/programs/freetds.nix", {st_mode=S_IFREG|0444, st_size=1333, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/programs/freetds.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=1333, ...}) = 0 | |
read(3, "# Global configuration for freetds environment.\n\n{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.environment.freetds;\n\nin\n{\n ###### interface\n\n options = {\n\n environment.freetds = mkOption {\n type = types.attrsOf types.str;\n default = {};\n example = literalExample ''\n"..., 1333) = 1333 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/programs/gnupg.nix", {st_mode=S_IFREG|0444, st_size=2616, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/programs/gnupg.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=2616, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.programs.gnupg;\n\nin\n\n{\n\n options.programs.gnupg = {\n agent.enable = mkOption {\n type = types.bool;\n default = false;\n description = ''\n Enables GnuPG agent with socket-activation for every user session.\n '';\n "..., 2616) = 2616 | |
close(3) = 0 | |
brk(0x18a44000) = 0x18a44000 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/programs/gphoto2.nix", {st_mode=S_IFREG|0444, st_size=730, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/programs/gphoto2.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=730, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\n{\n meta.maintainers = [ maintainers.league ];\n\n ###### interface\n options = {\n programs.gphoto2 = {\n enable = mkOption {\n default = false;\n type = types.bool;\n description = ''\n Whether to configure system to use gphoto"..., 730) = 730 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/programs/info.nix", {st_mode=S_IFREG|0444, st_size=498, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/programs/info.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=498, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\n{\n\n options = {\n\n programs.info.enable = mkOption {\n type = types.bool;\n default = true;\n description = ''\n Whether to enable info pages and the <command>info</command> command.\n '';\n };\n\n };\n\n\n config = mkIf config.programs"..., 498) = 498 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/programs/java.nix", {st_mode=S_IFREG|0444, st_size=1339, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/programs/java.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=1339, ...}) = 0 | |
read(3, "# This module provides JAVA_HOME, with a different way to install java\n# system-wide.\n\n{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.programs.java;\nin\n\n{\n\n options = {\n\n programs.java = {\n\n enable = mkEnableOption \"java\" // {\n description = ''\n Install and setup"..., 1339) = 1339 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/programs/kbdlight.nix", {st_mode=S_IFREG|0444, st_size=314, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/programs/kbdlight.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=314, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.programs.kbdlight;\n\nin\n{\n options.programs.kbdlight.enable = mkEnableOption \"kbdlight\";\n\n config = mkIf cfg.enable {\n environment.systemPackages = [ pkgs.kbdlight ];\n security.wrappers.kbdlight.source = \"${pkgs.kbdlight.out}/bin/kbdl"..., 314) = 314 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/programs/less.nix", {st_mode=S_IFREG|0444, st_size=3176, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/programs/less.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=3176, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.programs.less;\n\n configFile = ''\n #command\n ${concatStringsSep \"\\n\"\n (mapAttrsToList (command: action: \"${command} ${action}\") cfg.commands)\n }\n ${if cfg.clearDefaultCommands then \"#stop\" else \"\"}\n\n #line-edit\n ${con"..., 3176) = 3176 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/programs/light.nix", {st_mode=S_IFREG|0444, st_size=482, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/programs/light.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=482, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.programs.light;\n\nin\n{\n options = {\n programs.light = {\n enable = mkOption {\n default = false;\n type = types.bool;\n description = ''\n Whether to install Light backlight control with setuid wrapper.\n "..., 482) = 482 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/programs/man.nix", {st_mode=S_IFREG|0444, st_size=558, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/programs/man.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=558, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\n{\n\n options = {\n\n programs.man.enable = mkOption {\n type = types.bool;\n default = true;\n description = ''\n Whether to enable manual pages and the <command>man</command> command.\n This also includes \"man\" outputs of all <literal"..., 558) = 558 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/programs/mosh.nix", {st_mode=S_IFREG|0444, st_size=481, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/programs/mosh.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=481, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.programs.mosh;\n\nin\n{\n options.programs.mosh = {\n enable = mkOption {\n description = ''\n Whether to enable mosh. Note, this will open ports in your firewall!\n '';\n default = false;\n type = lib.types.bool;\n "..., 481) = 481 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/programs/mtr.nix", {st_mode=S_IFREG|0444, st_size=570, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/programs/mtr.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=570, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.programs.mtr;\nin {\n options = {\n programs.mtr = {\n enable = mkOption {\n type = types.bool;\n default = false;\n description = ''\n Whether to add mtr to the global environment and configure a\n set"..., 570) = 570 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/programs/nano.nix", {st_mode=S_IFREG|0444, st_size=950, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/programs/nano.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=950, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nlet\n cfg = config.programs.nano;\nin\n\n{\n ###### interface\n\n options = {\n programs.nano = {\n\n nanorc = lib.mkOption {\n type = lib.types.lines;\n default = \"\";\n description = ''\n The system-wide nano configuration.\n See <cite"..., 950) = 950 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/programs/npm.nix", {st_mode=S_IFREG|0444, st_size=879, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/programs/npm.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=879, ...}) = 0 | |
read(3, "{ config, lib, ... }:\n\nwith lib;\n\nlet\n cfg = config.programs.npm;\nin\n\n{\n ###### interface\n\n options = {\n programs.npm = {\n enable = mkEnableOption \"<command>npm</command> global config\";\n\n npmrc = lib.mkOption {\n type = lib.types.lines;\n description = ''\n The s"..., 879) = 879 | |
close(3) = 0 | |
brk(0x18a66000) = 0x18a66000 | |
brk(0x18a63000) = 0x18a63000 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/programs/oblogout.nix", {st_mode=S_IFREG|0444, st_size=3788, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/programs/oblogout.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=3788, ...}) = 0 | |
read(3, "# Global configuration for oblogout.\n\n{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet cfg = config.programs.oblogout;\n\nin\n{\n ###### interface\n\n options = {\n\n programs.oblogout = {\n\n enable = mkOption {\n type = types.bool;\n default = false;\n description = ''\n Wheth"..., 3788) = 3788 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/programs/plotinus.nix", {st_mode=S_IFREG|0444, st_size=809, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/programs/plotinus.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=809, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.programs.plotinus;\nin\n{\n meta = {\n maintainers = pkgs.plotinus.meta.maintainers;\n doc = ./plotinus.xml;\n };\n\n ###### interface\n\n options = {\n programs.plotinus = {\n enable = mkOption {\n default = false;\n descr"..., 809) = 809 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/programs/qt5ct.nix", {st_mode=S_IFREG|0444, st_size=880, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/programs/qt5ct.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=880, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\n{\n meta.maintainers = [ maintainers.romildo ];\n\n ###### interface\n options = {\n programs.qt5ct = {\n enable = mkOption {\n default = false;\n type = types.bool;\n description = ''\n Whether to enable the Qt5 Configuration To"..., 880) = 880 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/programs/rootston.nix", {st_mode=S_IFREG|0444, st_size=3007, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/programs/rootston.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=3007, ...}) = 0 | |
read(3, "{ config, pkgs, lib, ... }:\n\nwith lib;\n\nlet\n cfg = config.programs.rootston;\n\n rootstonWrapped = pkgs.writeScriptBin \"rootston\" ''\n #! ${pkgs.stdenv.shell}\n if [[ \"$#\" -ge 1 ]]; then\n exec ${pkgs.rootston}/bin/rootston \"$@\"\n else\n ${cfg.extraSessionCommands}\n exec ${pkgs.ro"..., 3007) = 3007 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/programs/screen.nix", {st_mode=S_IFREG|0444, st_size=468, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/programs/screen.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=468, ...}) = 0 | |
read(3, "{ config, lib, ... }:\n\nlet\n inherit (lib) mkOption mkIf types;\n cfg = config.programs.screen;\nin\n\n{\n ###### interface\n\n options = {\n programs.screen = {\n\n screenrc = mkOption {\n default = \"\";\n description = ''\n The contents of /etc/screenrc file.\n '';\n "..., 468) = 468 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/programs/slock.nix", {st_mode=S_IFREG|0444, st_size=478, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/programs/slock.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=478, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.programs.slock;\n\nin\n{\n options = {\n programs.slock = {\n enable = mkOption {\n default = false;\n type = types.bool;\n description = ''\n Whether to install slock screen locker with setuid wrapper.\n '"..., 478) = 478 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/programs/shadow.nix", {st_mode=S_IFREG|0444, st_size=3193, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/programs/shadow.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=3193, ...}) = 0 | |
read(3, "# Configuration for the pwdutils suite of tools: passwd, useradd, etc.\n\n{ config, lib, utils, pkgs, ... }:\n\nwith lib;\n\nlet\n\n loginDefs =\n ''\n DEFAULT_HOME yes\n\n SYS_UID_MIN 400\n SYS_UID_MAX 499\n UID_MIN 1000\n UID_MAX 29999\n\n SYS_GID_MIN 400\n SYS_GI"..., 3193) = 3193 | |
close(3) = 0 | |
brk(0x18a84000) = 0x18a84000 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/programs/shell.nix", {st_mode=S_IFREG|0444, st_size=1974, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/programs/shell.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=1974, ...}) = 0 | |
read(3, "# This module defines a standard configuration for NixOS shells.\n\n{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.environment;\n\nin\n\n{\n\n config = {\n\n environment.shellAliases =\n { ls = \"ls --color=tty\";\n ll = \"ls -l\";\n l = \"ls -alh\";\n };\n\n environment.shell"..., 1974) = 1974 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/programs/spacefm.nix", {st_mode=S_IFREG|0444, st_size=1401, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/programs/spacefm.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=1401, ...}) = 0 | |
read(3, "# Global configuration for spacefm.\n\n{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet cfg = config.programs.spacefm;\n\nin\n{\n ###### interface\n\n options = {\n\n programs.spacefm = {\n\n enable = mkOption {\n type = types.bool;\n default = false;\n description = ''\n Whether "..., 1401) = 1401 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/programs/ssh.nix", {st_mode=S_IFREG|0444, st_size=8206, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/programs/ssh.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=8206, ...}) = 0 | |
read(3, "# Global configuration for the SSH client.\n\n{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.programs.ssh;\n cfgd = config.services.openssh;\n\n askPassword = cfg.askPassword;\n\n askPasswordWrapper = pkgs.writeScript \"ssh-askpass-wrapper\"\n ''\n #! ${pkgs.stdenv.shell} -e\n expo"..., 8206) = 8206 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/programs/ssmtp.nix", {st_mode=S_IFREG|0444, st_size=4876, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/programs/ssmtp.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=4876, ...}) = 0 | |
read(3, "# Configuration for `ssmtp', a trivial mail transfer agent that can\n# replace sendmail/postfix on simple systems. It delivers email\n# directly to an SMTP server defined in its configuration file, wihout\n# queueing mail locally.\n\n{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.networking"..., 4876) = 4876 | |
close(3) = 0 | |
brk(0x18aa5000) = 0x18aa5000 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/programs/sysdig.nix", {st_mode=S_IFREG|0444, st_size=298, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/programs/sysdig.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=298, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.programs.sysdig;\nin {\n options.programs.sysdig.enable = mkEnableOption \"sysdig\";\n\n config = mkIf cfg.enable {\n environment.systemPackages = [ pkgs.sysdig ];\n boot.extraModulePackages = [ config.boot.kernelPackages.sysdig ];\n };\n}\n", 298) = 298 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/programs/systemtap.nix", {st_mode=S_IFREG|0444, st_size=573, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/programs/systemtap.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=573, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet cfg = config.programs.systemtap;\nin {\n\n options = {\n programs.systemtap = {\n enable = mkOption {\n default = false;\n description = ''\n Install <command>systemtap</command> along with necessary kernel options.\n '';\n "..., 573) = 573 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/programs/sway.nix", {st_mode=S_IFREG|0444, st_size=2449, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/programs/sway.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=2449, ...}) = 0 | |
read(3, "{ config, pkgs, lib, ... }:\n\nwith lib;\n\nlet\n cfg = config.programs.sway;\n swayPackage = pkgs.sway;\n\n swayWrapped = pkgs.writeShellScriptBin \"sway\" ''\n if [[ \"$#\" -ge 1 ]]; then\n exec sway-setcap \"$@\"\n else\n ${cfg.extraSessionCommands}\n exec ${pkgs.dbus.dbus-launch} --exit-wit"..., 2449) = 2449 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/programs/thefuck.nix", {st_mode=S_IFREG|0444, st_size=887, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/programs/thefuck.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=887, ...}) = 0 | |
read(3, "{ config, pkgs, lib, ... }:\n\nwith lib;\n\nlet\n prg = config.programs;\n cfg = prg.thefuck;\n\n initScript = ''\n eval $(${pkgs.thefuck}/bin/thefuck --alias ${cfg.alias})\n '';\nin\n {\n options = {\n programs.thefuck = {\n enable = mkEnableOption \"thefuck\";\n\n alias = mkOption {\n "..., 887) = 887 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/programs/tmux.nix", {st_mode=S_IFREG|0444, st_size=4932, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/programs/tmux.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=4932, ...}) = 0 | |
read(3, "{ config, pkgs, lib, ... }:\n\nlet\n inherit (lib) mkOption mkEnableOption mkIf mkMerge types;\n\n cfg = config.programs.tmux;\n\n defaultKeyMode = \"emacs\";\n defaultResize = 5;\n defaultShortcut = \"b\";\n defaultTerminal = \"screen\";\n\n boolToStr = value: if value then \"on\" else \"off\";\n\n tmuxConf = '"..., 4932) = 4932 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/programs/venus.nix", {st_mode=S_IFREG|0444, st_size=4299, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/programs/venus.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=4299, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\nlet\n cfg = config.services.venus;\n\n configFile = pkgs.writeText \"venus.ini\"\n ''\n [Planet]\n name = ${cfg.name}\n link = ${cfg.link}\n owner_name = ${cfg.ownerName}\n owner_email = ${cfg.ownerEmail}\n output_theme = ${cfg.cacheDirec"..., 4299) = 4299 | |
close(3) = 0 | |
brk(0x18ac6000) = 0x18ac6000 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/programs/vim.nix", {st_mode=S_IFREG|0444, st_size=518, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/programs/vim.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=518, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.programs.vim;\nin {\n options.programs.vim = {\n defaultEditor = mkOption {\n type = types.bool;\n default = false;\n description = ''\n When enabled, installs vim and configures vim to be the default editor\n using "..., 518) = 518 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/programs/way-cooler.nix", {st_mode=S_IFREG|0444, st_size=1960, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/programs/way-cooler.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=1960, ...}) = 0 | |
read(3, "{ config, pkgs, lib, ... }:\n\nwith lib;\n\nlet\n cfg = config.programs.way-cooler;\n way-cooler = pkgs.way-cooler;\n\n wcWrapped = pkgs.writeShellScriptBin \"way-cooler\" ''\n ${cfg.extraSessionCommands}\n exec ${pkgs.dbus.dbus-launch} --exit-with-session ${way-cooler}/bin/way-cooler\n '';\n wcJoined "..., 1960) = 1960 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/programs/wireshark.nix", {st_mode=S_IFREG|0444, st_size=1024, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/programs/wireshark.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=1024, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.programs.wireshark;\n wireshark = cfg.package;\nin {\n options = {\n programs.wireshark = {\n enable = mkOption {\n type = types.bool;\n default = false;\n description = ''\n Whether to add Wireshark to the glo"..., 1024) = 1024 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/programs/xfs_quota.nix", {st_mode=S_IFREG|0444, st_size=2887, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/programs/xfs_quota.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=2887, ...}) = 0 | |
read(3, "# Configuration for the xfs_quota command\n\n{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.programs.xfs_quota;\n\n limitOptions = opts: concatStringsSep \" \" [\n (optionalString (opts.sizeSoftLimit != null) \"bsoft=${opts.sizeSoftLimit}\")\n (optionalString (opts.sizeHardLimit != null) \""..., 2887) = 2887 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/programs/xonsh.nix", {st_mode=S_IFREG|0444, st_size=1100, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/programs/xonsh.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=1100, ...}) = 0 | |
read(3, "# This module defines global configuration for the xonsh.\n\n{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n cfge = config.environment;\n\n cfg = config.programs.xonsh;\n\nin\n\n{\n\n options = {\n\n programs.xonsh = {\n\n enable = mkOption {\n default = false;\n description = ''\n Wh"..., 1100) = 1100 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/programs/yabar.nix", {st_mode=S_IFREG|0444, st_size=4054, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/programs/yabar.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=4054, ...}) = 0 | |
read(3, "{ lib, pkgs, config, ... }:\n\nwith lib;\n\nlet\n cfg = config.programs.yabar;\n\n mapExtra = v: lib.concatStringsSep \"\\n\" (mapAttrsToList (\n key: val: \"${key} = ${if (isString val) then \"\\\"${val}\\\"\" else \"${builtins.toString val}\"};\"\n ) v);\n\n listKeys = r: concatStringsSep \",\" (map (n: \"\\\"${n}\\\"\") "..., 4054) = 4054 | |
close(3) = 0 | |
brk(0x18ae7000) = 0x18ae7000 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/programs/zsh/oh-my-zsh.nix", {st_mode=S_IFREG|0444, st_size=2354, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/programs/zsh/oh-my-zsh.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=2354, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.programs.zsh.ohMyZsh;\nin\n {\n options = {\n programs.zsh.ohMyZsh = {\n enable = mkOption {\n default = false;\n description = ''\n Enable oh-my-zsh.\n '';\n };\n\n package = mkOption "..., 2354) = 2354 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/programs/zsh/zsh.nix", {st_mode=S_IFREG|0444, st_size=5405, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/programs/zsh/zsh.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=5405, ...}) = 0 | |
read(3, "# This module defines global configuration for the zshell.\n\n{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n cfge = config.environment;\n\n cfg = config.programs.zsh;\n\n zshAliases = concatStringsSep \"\\n\" (\n mapAttrsFlatten (k: v: \"alias ${k}='${v}'\") cfg.shellAliases\n );\n\nin\n\n{\n\n options = {\n\n "..., 5405) = 5405 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/programs/zsh/zsh-autoenv.nix", {st_mode=S_IFREG|0444, st_size=576, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/programs/zsh/zsh-autoenv.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=576, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.programs.zsh.zsh-autoenv;\nin {\n options = {\n programs.zsh.zsh-autoenv = {\n enable = mkEnableOption \"zsh-autoenv\";\n package = mkOption {\n default = pkgs.zsh-autoenv;\n defaultText = \"pkgs.zsh-autoenv\";\n descr"..., 576) = 576 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/programs/zsh/zsh-syntax-highlighting.nix", {st_mode=S_IFREG|0444, st_size=2257, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/programs/zsh/zsh-syntax-highlighting.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=2257, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.programs.zsh.syntaxHighlighting;\nin\n{\n options = {\n programs.zsh.syntaxHighlighting = {\n enable = mkEnableOption \"zsh-syntax-highlighting\";\n\n highlighters = mkOption {\n default = [ \"main\" ];\n\n # https://github.com"..., 2257) = 2257 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/rename.nix", {st_mode=S_IFREG|0444, st_size=15745, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/rename.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=15745, ...}) = 0 | |
brk(0x18b09000) = 0x18b09000 | |
read(3, "{ lib, pkgs, ... }:\n\nwith lib;\n\n{\n imports = [\n (mkRenamedOptionModule [ \"environment\" \"x11Packages\" ] [ \"environment\" \"systemPackages\" ])\n (mkRenamedOptionModule [ \"environment\" \"enableBashCompletion\" ] [ \"programs\" \"bash\" \"enableCompletion\" ])\n (mkRenamedOptionModule [ \"environment\" \"nix"..., 15745) = 15745 | |
close(3) = 0 | |
brk(0x18b19000) = 0x18b19000 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/security/acme.nix", {st_mode=S_IFREG|0444, st_size=13049, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/security/acme.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=13049, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.security.acme;\n\n certOpts = { name, ... }: {\n options = {\n webroot = mkOption {\n type = types.str;\n example = \"/var/lib/acme/acme-challenges\";\n description = ''\n Where the webroot of the HTTP vhost is "..., 13049) = 13049 | |
close(3) = 0 | |
brk(0x18b3a000) = 0x18b3a000 | |
brk(0x18b3b000) = 0x18b3b000 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/security/apparmor.nix", {st_mode=S_IFREG|0444, st_size=1380, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/security/apparmor.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=1380, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nlet\n inherit (lib) mkIf mkOption types concatMapStrings;\n cfg = config.security.apparmor;\nin\n\n{\n options = {\n security.apparmor = {\n enable = mkOption {\n type = types.bool;\n default = false;\n description = \"Enable the AppArmor Mandat"..., 1380) = 1380 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/security/apparmor-suid.nix", {st_mode=S_IFREG|0444, st_size=1130, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/security/apparmor-suid.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=1130, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\nlet\n cfg = config.security.apparmor;\nin\nwith lib;\n{\n\n options.security.apparmor.confineSUIDApplications = mkOption {\n default = true;\n description = ''\n Install AppArmor profiles for commonly-used SUID application\n to mitigate potential privilege escalat"..., 1130) = 1130 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/security/audit.nix", {st_mode=S_IFREG|0444, st_size=3729, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/security/audit.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=3729, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.security.audit;\n enabled = cfg.enable == \"lock\" || cfg.enable;\n\n failureModes = {\n silent = 0;\n printk = 1;\n panic = 2;\n };\n\n disableScript = pkgs.writeScript \"audit-disable\" ''\n #!${pkgs.stdenv.shell} -eu\n # Explicitly d"..., 3729) = 3729 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/security/auditd.nix", {st_mode=S_IFREG|0444, st_size=649, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/security/auditd.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=649, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\n{\n options.security.auditd.enable = mkEnableOption \"the Linux Audit daemon\";\n\n config = mkIf config.security.auditd.enable {\n systemd.services.auditd = {\n description = \"Linux Audit daemon\";\n wantedBy = [ \"basic.target\" ];\n\n unitConfig = {\n"..., 649) = 649 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/security/ca.nix", {st_mode=S_IFREG|0444, st_size=2521, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/security/ca.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=2521, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.security.pki;\n\n cacertPackage = pkgs.cacert.override {\n blacklist = cfg.caCertificateBlacklist;\n };\n\n caCertificates = pkgs.runCommand \"ca-certificates.crt\"\n { files =\n cfg.certificateFiles ++\n [ (builtins.toFile \"ext"..., 2521) = 2521 | |
close(3) = 0 | |
brk(0x18b5d000) = 0x18b5d000 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/security/chromium-suid-sandbox.nix", {st_mode=S_IFREG|0444, st_size=902, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/security/chromium-suid-sandbox.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=902, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.security.chromiumSuidSandbox;\n sandbox = pkgs.chromium.sandbox;\nin\n{\n options.security.chromiumSuidSandbox.enable = mkOption {\n type = types.bool;\n default = false;\n description = ''\n Whether to install the Chromium SUID "..., 902) = 902 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/security/dhparams.nix", {st_mode=S_IFREG|0444, st_size=3463, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/security/dhparams.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=3463, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\nlet\n cfg = config.security.dhparams;\nin\n{\n options = {\n security.dhparams = {\n params = mkOption {\n description =\n ''\n Diffie-Hellman parameters to generate.\n\n The value is the size (in bits) of the DH params to g"..., 3463) = 3463 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/security/duosec.nix", {st_mode=S_IFREG|0444, st_size=6462, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/security/duosec.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=6462, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.security.duosec;\n\n boolToStr = b: if b then \"yes\" else \"no\";\n\n configFile = ''\n [duo]\n ikey=${cfg.ikey}\n skey=${cfg.skey}\n host=${cfg.host}\n ${optionalString (cfg.group != \"\") (\"group=\"+cfg.group)}\n failmode=${cfg.failmod"..., 6462) = 6462 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/security/hidepid.nix", {st_mode=S_IFREG|0444, st_size=692, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/security/hidepid.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=692, ...}) = 0 | |
read(3, "{ config, pkgs, lib, ... }:\nwith lib;\n\n{\n meta = {\n maintainers = [ maintainers.joachifm ];\n doc = ./hidepid.xml;\n };\n\n options = {\n security.hideProcessInformation = mkOption {\n type = types.bool;\n default = false;\n description = ''\n Restrict process information to"..., 692) = 692 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/security/lock-kernel-modules.nix", {st_mode=S_IFREG|0444, st_size=1295, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/security/lock-kernel-modules.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=1295, ...}) = 0 | |
read(3, "{ config, lib, ... }:\n\nwith lib;\n\n{\n options = {\n security.lockKernelModules = mkOption {\n type = types.bool;\n default = false;\n description = ''\n Disable kernel module loading once the system is fully initialised.\n Module loading is disabled until the next reboot. "..., 1295) = 1295 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/security/oath.nix", {st_mode=S_IFREG|0444, st_size=1171, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/security/oath.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=1171, ...}) = 0 | |
read(3, "# This module provides configuration for the OATH PAM modules.\n\n{ config, lib, pkgs, ... }:\n\nwith lib;\n\n{\n options = {\n\n security.pam.oath = {\n enable = mkOption {\n type = types.bool;\n default = false;\n description = ''\n Enable the OATH (one-time password) PAM "..., 1171) = 1171 | |
close(3) = 0 | |
brk(0x18b80000) = 0x18b80000 | |
brk(0x18b7d000) = 0x18b7d000 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/security/pam.nix", {st_mode=S_IFREG|0444, st_size=21279, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/security/pam.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=21279, ...}) = 0 | |
read(3, "# This module provides configuration for the PAM (Pluggable\n# Authentication Modules) system.\n\n{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n parentConfig = config;\n\n pamOpts = { config, name, ... }: let cfg = config; in let config = parentConfig; in {\n\n options = {\n\n name = mkOption {\n "..., 21279) = 21279 | |
close(3) = 0 | |
brk(0x18b9e000) = 0x18b9e000 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/security/pam_usb.nix", {st_mode=S_IFREG|0444, st_size=915, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/security/pam_usb.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=915, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n inherit (pkgs) pam_usb;\n\n cfg = config.security.pam.usb;\n\n anyUsbAuth = any (attrByPath [\"usbAuth\"] false) (attrValues config.security.pam.services);\n\nin\n\n{\n options = {\n\n security.pam.usb = {\n enable = mkOption {\n type = types.bool;\n "..., 915) = 915 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/security/pam_mount.nix", {st_mode=S_IFREG|0444, st_size=2316, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/security/pam_mount.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=2316, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.security.pam.mount;\n\n anyPamMount = any (attrByPath [\"pamMount\"] false) (attrValues config.security.pam.services);\nin\n\n{\n options = {\n\n security.pam.mount = {\n enable = mkOption {\n type = types.bool;\n default = false;"..., 2316) = 2316 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/security/polkit.nix", {st_mode=S_IFREG|0444, st_size=2873, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/security/polkit.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=2873, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.security.polkit;\n\nin\n\n{\n\n options = {\n\n security.polkit.enable = mkOption {\n type = types.bool;\n default = true;\n description = \"Whether to enable PolKit.\";\n };\n\n security.polkit.extraConfig = mkOption {\n type "..., 2873) = 2873 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/security/prey.nix", {st_mode=S_IFREG|0444, st_size=1275, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/security/prey.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=1275, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.prey;\n myPrey = pkgs.\"prey-bash-client\".override {\n apiKey = cfg.apiKey;\n deviceKey = cfg.deviceKey;\n };\nin {\n options = {\n\n services.prey = {\n enable = mkOption {\n default = false;\n type = types.bool;"..., 1275) = 1275 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/security/rngd.nix", {st_mode=S_IFREG|0444, st_size=1121, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/security/rngd.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=1121, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\n{\n options = {\n security.rngd.enable = mkOption {\n type = types.bool;\n default = true;\n description = ''\n Whether to enable the rng daemon, which adds entropy from\n hardware sources of randomness to the kernel entropy pool when"..., 1121) = 1121 | |
close(3) = 0 | |
brk(0x18bc1000) = 0x18bc1000 | |
brk(0x18bbe000) = 0x18bbe000 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/security/rtkit.nix", {st_mode=S_IFREG|0444, st_size=970, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/security/rtkit.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=970, ...}) = 0 | |
read(3, "# A module for \342\200\230rtkit\342\200\231, a DBus system service that hands out realtime\n# scheduling priority to processes that ask for it.\n\n{ config, lib, pkgs, ... }:\n\nwith lib;\n\n{\n\n options = {\n\n security.rtkit.enable = mkOption {\n type = types.bool;\n default = false;\n description = ''\n "..., 970) = 970 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/security/wrappers/default.nix", {st_mode=S_IFREG|0444, st_size=7688, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/security/wrappers/default.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=7688, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\nlet\n\n inherit (config.security) wrapperDir wrappers;\n\n parentWrapperDir = dirOf wrapperDir;\n\n programs =\n (lib.mapAttrsToList\n (n: v: (if v ? \"program\" then v else v // {program=n;}))\n wrappers);\n\n securityWrapper = pkgs.stdenv.mkDerivation {\n name "..., 7688) = 7688 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/security/sudo.nix", {st_mode=S_IFREG|0444, st_size=6965, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/security/sudo.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=6965, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.security.sudo;\n\n inherit (pkgs) sudo;\n\n toUserString = user: if (isInt user) then \"#${toString user}\" else \"${user}\";\n toGroupString = group: if (isInt group) then \"%#${toString group}\" else \"%${group}\";\n\n toCommandOptionsString = optio"..., 6965) = 6965 | |
close(3) = 0 | |
brk(0x18bdf000) = 0x18bdf000 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/admin/salt/master.nix", {st_mode=S_IFREG|0444, st_size=1590, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/admin/salt/master.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=1590, ...}) = 0 | |
read(3, "{ config, pkgs, lib, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.services.salt.master;\n\n fullConfig = lib.recursiveUpdate {\n # Provide defaults for some directories to allow an immutable config dir\n\n # Default is equivalent to /etc/salt/master.d/*.conf\n default_include = \"/var/lib/salt/master."..., 1590) = 1590 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/admin/salt/minion.nix", {st_mode=S_IFREG|0444, st_size=1590, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/admin/salt/minion.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=1590, ...}) = 0 | |
read(3, "{ config, pkgs, lib, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.services.salt.minion;\n\n fullConfig = lib.recursiveUpdate {\n # Provide defaults for some directories to allow an immutable config dir\n # NOTE: the config dir being immutable prevents `minion_id` caching\n\n # Default is equivalent t"..., 1590) = 1590 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/amqp/activemq/default.nix", {st_mode=S_IFREG|0444, st_size=4149, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/amqp/activemq/default.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=4149, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith pkgs;\nwith lib;\n\nlet\n\n cfg = config.services.activemq;\n\n activemqBroker = stdenv.mkDerivation {\n name = \"activemq-broker\";\n phases = [ \"installPhase\" ];\n buildInputs = [ jdk ];\n installPhase = ''\n mkdir -p $out/lib\n source ${activemq}/lib/cla"..., 4149) = 4149 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/amqp/rabbitmq.nix", {st_mode=S_IFREG|0444, st_size=3810, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/amqp/rabbitmq.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=3810, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.rabbitmq;\n config_file = pkgs.writeText \"rabbitmq.config\" cfg.config;\n config_file_wo_suffix = builtins.substring 0 ((builtins.stringLength config_file) - 7) config_file;\n\nin {\n ###### interface\n options = {\n services.rabbitm"..., 3810) = 3810 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/audio/alsa.nix", {st_mode=S_IFREG|0444, st_size=3281, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/audio/alsa.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=3281, ...}) = 0 | |
read(3, "# ALSA sound support.\n{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n inherit (pkgs) alsaUtils;\n\n pulseaudioEnabled = config.hardware.pulseaudio.enable;\n\nin\n\n{\n\n ###### interface\n\n options = {\n\n sound = {\n\n enable = mkOption {\n type = types.bool;\n default = true;\n desc"..., 3281) = 3281 | |
close(3) = 0 | |
brk(0x18c00000) = 0x18c00000 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/audio/icecast.nix", {st_mode=S_IFREG|0444, st_size=3199, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/audio/icecast.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=3199, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.icecast;\n configFile = pkgs.writeText \"icecast.xml\" ''\n <icecast>\n <hostname>${cfg.hostname}</hostname>\n\n <authentication>\n <admin-user>${cfg.admin.user}</admin-user>\n <admin-password>${cfg.admin.password"..., 3199) = 3199 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/audio/liquidsoap.nix", {st_mode=S_IFREG|0444, st_size=1797, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/audio/liquidsoap.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=1797, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n streams = builtins.attrNames config.services.liquidsoap.streams;\n\n streamService =\n name:\n let stream = builtins.getAttr name config.services.liquidsoap.streams; in\n { inherit name;\n value = {\n after = [ \"network-online.target\" \"sou"..., 1797) = 1797 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/audio/mpd.nix", {st_mode=S_IFREG|0444, st_size=5409, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/audio/mpd.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=5409, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n name = \"mpd\";\n\n uid = config.ids.uids.mpd;\n gid = config.ids.gids.mpd;\n cfg = config.services.mpd;\n\n mpdConf = pkgs.writeText \"mpd.conf\" ''\n music_directory \"${cfg.musicDirectory}\"\n playlist_directory \"${cfg.playlistDirectory}\"\n db_fil"..., 5409) = 5409 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/audio/mopidy.nix", {st_mode=S_IFREG|0444, st_size=2834, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/audio/mopidy.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=2834, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith pkgs;\nwith lib;\n\nlet\n uid = config.ids.uids.mopidy;\n gid = config.ids.gids.mopidy;\n cfg = config.services.mopidy;\n\n mopidyConf = writeText \"mopidy.conf\" cfg.configuration;\n\n mopidyEnv = buildEnv {\n name = \"mopidy-with-extensions-${mopidy.version}\";\n paths"..., 2834) = 2834 | |
close(3) = 0 | |
brk(0x18c21000) = 0x18c21000 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/audio/slimserver.nix", {st_mode=S_IFREG|0444, st_size=1525, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/audio/slimserver.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=1525, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.services.slimserver;\n\nin {\n options = {\n\n services.slimserver = {\n\n enable = mkOption {\n type = types.bool;\n default = false;\n description = ''\n Whether to enable slimserver.\n '';\n };\n\n "..., 1525) = 1525 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/audio/squeezelite.nix", {st_mode=S_IFREG|0444, st_size=1424, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/audio/squeezelite.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=1424, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n uid = config.ids.uids.squeezelite;\n cfg = config.services.squeezelite;\n\nin {\n\n ###### interface\n\n options = {\n\n services.squeezelite= {\n\n enable = mkEnableOption \"Squeezelite, a software Squeezebox emulator\";\n\n dataDir = mkOption {\n "..., 1424) = 1424 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/audio/ympd.nix", {st_mode=S_IFREG|0444, st_size=1219, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/audio/ympd.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=1219, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.ympd;\nin {\n\n ###### interface\n\n options = {\n\n services.ympd = {\n\n enable = mkEnableOption \"ympd, the MPD Web GUI\";\n\n webPort = mkOption {\n type = types.string;\n default = \"8080\";\n description = \"T"..., 1219) = 1219 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/backup/almir.nix", {st_mode=S_IFREG|0444, st_size=4134, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/backup/almir.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=4134, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.almir;\n\n bconsoleconf = pkgs.writeText \"bconsole.conf\"\n ''\n Director {\n Name = ${cfg.director_name}\n DIRport = ${toString cfg.director_port}\n address = ${cfg.director_address}\n Password = \"${cfg."..., 4134) = 4134 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/backup/bacula.nix", {st_mode=S_IFREG|0444, st_size=12144, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/backup/bacula.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=12144, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\n# TODO: test configuration when building nixexpr (use -t parameter)\n# TODO: support sqlite3 (it's deprecate?) and mysql\n\nwith lib;\n\nlet\n libDir = \"/var/lib/bacula\";\n\n fd_cfg = config.services.bacula-fd;\n fd_conf = pkgs.writeText \"bacula-fd.conf\"\n ''\n Client {\n"..., 12144) = 12144 | |
brk(0x18c42000) = 0x18c42000 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/backup/crashplan.nix", {st_mode=S_IFREG|0444, st_size=2001, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/backup/crashplan.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=2001, ...}) = 0 | |
read(3, "{ config, pkgs, lib, ... }:\n\nlet\n cfg = config.services.crashplan;\n crashplan = pkgs.crashplan;\n varDir = \"/var/lib/crashplan\";\nin\n\nwith lib;\n\n{\n options = {\n services.crashplan = {\n enable = mkOption {\n default = false;\n type = types.bool;\n description = ''\n "..., 2001) = 2001 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/backup/crashplan-small-business.nix", {st_mode=S_IFREG|0444, st_size=2321, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/backup/crashplan-small-business.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=2321, ...}) = 0 | |
read(3, "{ config, pkgs, lib, ... }:\n\nlet\n cfg = config.services.crashplansb;\n crashplansb = pkgs.crashplansb.override { maxRam = cfg.maxRam; };\n varDir = \"/var/lib/crashplan\";\nin\n\nwith lib;\n\n{\n options = {\n services.crashplansb = {\n enable = mkOption {\n default = false;\n type = typ"..., 2321) = 2321 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/backup/mysql-backup.nix", {st_mode=S_IFREG|0444, st_size=3048, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/backup/mysql-backup.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=3048, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n inherit (pkgs) mysql gzip;\n\n cfg = config.services.mysqlBackup;\n defaultUser = \"mysqlbackup\";\n\n backupScript = ''\n set -o pipefail\n failed=\"\"\n ${concatMapStringsSep \"\\n\" backupDatabaseScript cfg.databases}\n if [ -n \"$failed\" ]; then\n "..., 3048) = 3048 | |
close(3) = 0 | |
brk(0x18c63000) = 0x18c63000 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/backup/postgresql-backup.nix", {st_mode=S_IFREG|0444, st_size=1545, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/backup/postgresql-backup.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=1545, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n inherit (pkgs) gzip;\n\n location = config.services.postgresqlBackup.location;\n\n postgresqlBackupCron = db:\n ''\n ${config.services.postgresqlBackup.period} root ${config.services.postgresql.package}/bin/pg_dump ${db} | ${gzip}/bin/gzip -c > ${loc"..., 1545) = 1545 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/backup/rsnapshot.nix", {st_mode=S_IFREG|0444, st_size=2217, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/backup/rsnapshot.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=2217, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet \n cfg = config.services.rsnapshot;\n cfgfile = pkgs.writeText \"rsnapshot.conf\" ''\n config_version\t1.2\n cmd_cp\t${pkgs.coreutils}/bin/cp\n cmd_rm\t${pkgs.coreutils}/bin/rm\n cmd_rsync\t${pkgs.rsync}/bin/rsync\n cmd_ssh\t${pkgs.openssh}/bin/ssh\n "..., 2217) = 2217 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/backup/tarsnap.nix", {st_mode=S_IFREG|0444, st_size=13079, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/backup/tarsnap.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=13079, ...}) = 0 | |
read(3, "{ config, lib, pkgs, utils, ... }:\n\nwith lib;\n\nlet\n gcfg = config.services.tarsnap;\n\n configFile = name: cfg: ''\n keyfile ${cfg.keyfile}\n ${optionalString (cfg.cachedir != null) \"cachedir ${cfg.cachedir}\"}\n ${optionalString cfg.nodump \"nodump\"}\n ${optionalString cfg.printStats \"print-s"..., 13079) = 13079 | |
close(3) = 0 | |
brk(0x18c84000) = 0x18c84000 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/backup/znapzend.nix", {st_mode=S_IFREG|0444, st_size=12680, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/backup/znapzend.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=12680, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\nwith types;\n\nlet\n\n # Converts a plan like\n # { \"1d\" = \"1h\"; \"1w\" = \"1d\"; }\n # into\n # \"1d=>1h,1w=>1d\"\n attrToPlan = attrs: concatStringsSep \",\" (builtins.attrValues (\n mapAttrs (n: v: \"${n}=>${v}\") attrs));\n\n planDescription = ''\n The znapzend"..., 12680) = 12680 | |
close(3) = 0 | |
brk(0x18ca5000) = 0x18ca5000 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/cluster/fleet.nix", {st_mode=S_IFREG|0444, st_size=4112, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/cluster/fleet.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=4112, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.fleet;\n\nin {\n\n ##### Interface\n options.services.fleet = {\n enable = mkOption {\n type = types.bool;\n default = false;\n description = ''\n Whether to enable fleet service.\n '';\n };\n\n listen = mkOp"..., 4112) = 4112 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/cluster/kubernetes/default.nix", {st_mode=S_IFREG|0444, st_size=38813, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/cluster/kubernetes/default.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=38813, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.kubernetes;\n\n skipAttrs = attrs: map (filterAttrs (k: v: k != \"enable\"))\n (filter (v: !(hasAttr \"enable\" v) || v.enable) attrs);\n\n infraContainer = pkgs.dockerTools.buildImage {\n name = \"pause\";\n tag = \"latest\";\n conte"..., 38813) = 38813 | |
close(3) = 0 | |
brk(0x18cc6000) = 0x18cc6000 | |
brk(0x18ce7000) = 0x18ce7000 | |
brk(0x18d08000) = 0x18d08000 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/cluster/kubernetes/dns.nix", {st_mode=S_IFREG|0444, st_size=9753, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/cluster/kubernetes/dns.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=9753, ...}) = 0 | |
read(3, "{ config, pkgs, lib, ... }:\n\nwith lib;\n\nlet\n version = \"1.14.4\";\n\n k8s-dns-kube-dns = pkgs.dockerTools.pullImage {\n imageName = \"gcr.io/google_containers/k8s-dns-kube-dns-amd64\";\n imageTag = version;\n sha256 = \"0q97xfqrigrfjl2a9cxl5in619py0zv44gch09jm8gqjkxl80imp\";\n };\n\n k8s-dns-dnsmasq"..., 9753) = 9753 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/cluster/kubernetes/dashboard.nix", {st_mode=S_IFREG|0444, st_size=4993, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/cluster/kubernetes/dashboard.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=4993, ...}) = 0 | |
read(3, "{ config, pkgs, lib, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.kubernetes.addons.dashboard;\n\n name = \"gcr.io/google_containers/kubernetes-dashboard-amd64\";\n\tversion = \"v1.8.2\";\n\n image = pkgs.dockerTools.pullImage {\n imageName = name;\n imageTag = version;\n sha256 = \"11h0fz3wxp0f10fsy"..., 4993) = 4993 | |
close(3) = 0 | |
brk(0x18d29000) = 0x18d29000 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/cluster/panamax.nix", {st_mode=S_IFREG|0444, st_size=4090, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/cluster/panamax.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=4090, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.panamax;\n\n panamax_api = pkgs.panamax_api.override { dataDir = cfg.dataDir + \"/api\"; };\n panamax_ui = pkgs.panamax_ui.override { dataDir = cfg.dataDir + \"/ui\"; };\n\nin {\n\n ##### Interface\n options.services.panamax = {\n enable "..., 4090) = 4090 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/computing/boinc/client.nix", {st_mode=S_IFREG|0444, st_size=2429, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/computing/boinc/client.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=2429, ...}) = 0 | |
read(3, "{config, lib, pkgs, ...}:\n\nwith lib;\n\nlet\n cfg = config.services.boinc;\n allowRemoteGuiRpcFlag = optionalString cfg.allowRemoteGuiRpc \"--allow_remote_gui_rpc\";\n\nin\n {\n options.services.boinc = {\n enable = mkOption {\n type = types.bool;\n default = false;\n description ="..., 2429) = 2429 | |
close(3) = 0 | |
brk(0x18d52000) = 0x18d52000 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/computing/torque/server.nix", {st_mode=S_IFREG|0444, st_size=2289, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/computing/torque/server.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=2289, ...}) = 0 | |
read(3, "{ config, pkgs, lib, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.torque.server;\n torque = pkgs.torque;\nin\n{\n options = {\n\n services.torque.server = {\n\n enable = mkEnableOption \"torque server\";\n\n };\n\n };\n\n config = mkIf cfg.enable {\n environment.systemPackages = [ pkgs.torque ];\n"..., 2289) = 2289 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/computing/torque/mom.nix", {st_mode=S_IFREG|0444, st_size=1334, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/computing/torque/mom.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=1334, ...}) = 0 | |
read(3, "{ config, pkgs, lib, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.services.torque.mom;\n torque = pkgs.torque;\n\n momConfig = pkgs.writeText \"torque-mom-config\" ''\n $pbsserver ${cfg.serverNode}\n $logevent 225\n '';\n\nin\n{\n options = {\n\n services.torque.mom = {\n enable = mkEnableOption \"torqu"..., 1334) = 1334 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/computing/slurm/slurm.nix", {st_mode=S_IFREG|0444, st_size=5406, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/computing/slurm/slurm.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=5406, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.services.slurm;\n # configuration file can be generated by http://slurm.schedmd.com/configurator.html\n configFile = pkgs.writeText \"slurm.conf\"\n ''\n ${optionalString (cfg.controlMachine != null) ''controlMachine=${cfg.controlMachin"..., 5406) = 5406 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/continuous-integration/buildbot/master.nix", {st_mode=S_IFREG|0444, st_size=7197, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/continuous-integration/buildbot/master.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=7197, ...}) = 0 | |
read(3, "# NixOS module for Buildbot continous integration server.\n\n{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.buildbot-master;\n escapeStr = s: escape [\"'\"] s;\n masterCfg = if cfg.masterCfg == null then pkgs.writeText \"master.cfg\" ''\n from buildbot.plugins import *\n factory ="..., 7197) = 7197 | |
close(3) = 0 | |
brk(0x18d73000) = 0x18d73000 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/continuous-integration/buildbot/worker.nix", {st_mode=S_IFREG|0444, st_size=3721, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/continuous-integration/buildbot/worker.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=3721, ...}) = 0 | |
read(3, "# NixOS module for Buildbot Worker.\n\n{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.buildbot-worker;\n\nin {\n options = {\n services.buildbot-worker = {\n\n enable = mkOption {\n type = types.bool;\n default = false;\n description = \"Whether to enable the B"..., 3721) = 3721 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/continuous-integration/buildkite-agent.nix", {st_mode=S_IFREG|0444, st_size=8120, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/continuous-integration/buildkite-agent.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=8120, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.buildkite-agent;\n\n mkHookOption = { name, description, example ? null }: {\n inherit name;\n value = mkOption {\n default = null;\n inherit description;\n type = types.nullOr types.lines;\n } // (if example == nul"..., 8120) = 8120 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/continuous-integration/hail.nix", {st_mode=S_IFREG|0444, st_size=1659, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/continuous-integration/hail.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=1659, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ...}:\n\nwith lib;\n\nlet\n cfg = config.services.hail;\nin {\n\n\n ###### interface\n\n options.services.hail = {\n enable = mkOption {\n type = types.bool;\n default = false;\n description = ''\n Enables the Hail Auto Update Service. Hail can automatically deploy a"..., 1659) = 1659 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/continuous-integration/hydra/default.nix", {st_mode=S_IFREG|0444, st_size=13424, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/continuous-integration/hydra/default.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=13424, ...}) = 0 | |
brk(0x18d96000) = 0x18d96000 | |
read(3, "{ config, pkgs, lib, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.services.hydra;\n\n baseDir = \"/var/lib/hydra\";\n\n hydraConf = pkgs.writeScript \"hydra.conf\" cfg.extraConfig;\n\n hydraEnv =\n { HYDRA_DBI = cfg.dbi;\n HYDRA_CONFIG = \"${baseDir}/hydra.conf\";\n HYDRA_DATA = \"${baseDir}\";\n };\n\n e"..., 13424) = 13424 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/continuous-integration/gitlab-runner.nix", {st_mode=S_IFREG|0444, st_size=4362, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/continuous-integration/gitlab-runner.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=4362, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.gitlab-runner;\n configFile =\n if (cfg.configFile == null) then\n (pkgs.runCommand \"config.toml\" {\n buildInputs = [ pkgs.remarshal ];\n } ''\n remarshal -if json -of toml \\\n < ${pkgs.writeText \"confi"..., 4362) = 4362 | |
close(3) = 0 | |
brk(0x18db7000) = 0x18db7000 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/continuous-integration/gocd-agent/default.nix", {st_mode=S_IFREG|0444, st_size=6100, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/continuous-integration/gocd-agent/default.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=6100, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.gocd-agent;\nin {\n options = {\n services.gocd-agent = {\n enable = mkEnableOption \"gocd-agent\";\n\n user = mkOption {\n default = \"gocd-agent\";\n type = types.str;\n description = ''\n User the Go"..., 6100) = 6100 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/continuous-integration/gocd-server/default.nix", {st_mode=S_IFREG|0444, st_size=5702, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/continuous-integration/gocd-server/default.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=5702, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.gocd-server;\nin {\n options = {\n services.gocd-server = {\n enable = mkEnableOption \"gocd-server\";\n\n user = mkOption {\n default = \"gocd-server\";\n type = types.str;\n description = ''\n User th"..., 5702) = 5702 | |
close(3) = 0 | |
brk(0x18dd8000) = 0x18dd8000 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/continuous-integration/jenkins/default.nix", {st_mode=S_IFREG|0444, st_size=6865, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/continuous-integration/jenkins/default.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=6865, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\nwith lib;\nlet\n cfg = config.services.jenkins;\nin {\n options = {\n services.jenkins = {\n enable = mkOption {\n type = types.bool;\n default = false;\n description = ''\n Whether to enable the jenkins continuous integration server.\n "..., 6865) = 6865 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/continuous-integration/jenkins/job-builder.nix", {st_mode=S_IFREG|0444, st_size=6038, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/continuous-integration/jenkins/job-builder.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=6038, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n jenkinsCfg = config.services.jenkins;\n cfg = config.services.jenkins.jobBuilder;\n\nin {\n options = {\n services.jenkins.jobBuilder = {\n enable = mkOption {\n type = types.bool;\n default = false;\n description = ''\n Whe"..., 6038) = 6038 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/continuous-integration/jenkins/slave.nix", {st_mode=S_IFREG|0444, st_size=1998, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/continuous-integration/jenkins/slave.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=1998, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\nwith lib;\nlet\n cfg = config.services.jenkinsSlave;\n masterCfg = config.services.jenkins;\nin {\n options = {\n services.jenkinsSlave = {\n # todo:\n # * assure the profile of the jenkins user has a JRE and any specified packages. This would\n # enable ssh s"..., 1998) = 1998 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/databases/4store-endpoint.nix", {st_mode=S_IFREG|0444, st_size=1721, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/databases/4store-endpoint.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=1721, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\nlet\n cfg = config.services.fourStoreEndpoint;\n endpointUser = \"fourstorehttp\";\n run = \"${pkgs.su}/bin/su -s ${pkgs.stdenv.shell} ${endpointUser} -c\";\nin\nwith lib;\n{\n\n ###### interface\n\n options = {\n\n services.fourStoreEndpoint = {\n\n enable = mkOption {\n "..., 1721) = 1721 | |
close(3) = 0 | |
brk(0x18df9000) = 0x18df9000 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/databases/4store.nix", {st_mode=S_IFREG|0444, st_size=1642, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/databases/4store.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=1642, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\nlet\n cfg = config.services.fourStore;\n stateDir = \"/var/lib/4store\";\n fourStoreUser = \"fourstore\";\n run = \"${pkgs.su}/bin/su -s ${pkgs.stdenv.shell} ${fourStoreUser}\";\nin\nwith lib;\n{\n\n ###### interface\n\n options = {\n\n services.fourStore = {\n\n enable = mkOpti"..., 1642) = 1642 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/databases/clickhouse.nix", {st_mode=S_IFREG|0444, st_size=1481, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/databases/clickhouse.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=1481, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\nlet\n cfg = config.services.clickhouse;\n confDir = \"/etc/clickhouse-server\";\n stateDir = \"/var/lib/clickhouse\";\nin\nwith lib;\n{\n\n ###### interface\n\n options = {\n\n services.clickhouse = {\n\n enable = mkOption {\n default = false;\n description = \"Whet"..., 1481) = 1481 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/databases/couchdb.nix", {st_mode=S_IFREG|0444, st_size=5850, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/databases/couchdb.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=5850, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.couchdb;\n useVersion2 = strings.versionAtLeast (strings.getVersion cfg.package) \"2.0\";\n configFile = pkgs.writeText \"couchdb.ini\" (\n ''\n [couchdb]\n database_dir = ${cfg.databaseDir}\n uri_file = ${cfg.uriFile}\n "..., 5850) = 5850 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/databases/firebird.nix", {st_mode=S_IFREG|0444, st_size=4598, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/databases/firebird.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=4598, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\n# TODO: This may file may need additional review, eg which configuartions to\n# expose to the user.\n#\n# I only used it to access some simple databases.\n\n# test:\n# isql, then type the following commands:\n# CREATE DATABASE '/var/db/firebird/data/test.fdb' USER 'SYSDBA' PASS"..., 4598) = 4598 | |
close(3) = 0 | |
brk(0x18e1a000) = 0x18e1a000 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/databases/hbase.nix", {st_mode=S_IFREG|0444, st_size=2927, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/databases/hbase.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=2927, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.hbase;\n\n configFile = pkgs.writeText \"hbase-site.xml\" ''\n <configuration>\n <property>\n <name>hbase.rootdir</name>\n <value>file://${cfg.dataDir}/hbase</value>\n </property>\n <property>\n <name>hb"..., 2927) = 2927 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/databases/influxdb.nix", {st_mode=S_IFREG|0444, st_size=4602, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/databases/influxdb.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=4602, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.influxdb;\n\n configOptions = recursiveUpdate {\n meta = {\n bind-address = \":8088\";\n commit-timeout = \"50ms\";\n dir = \"${cfg.dataDir}/meta\";\n election-timeout = \"1s\";\n heartbeat-timeout = \"1s\";\n hostnam"..., 4602) = 4602 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/databases/memcached.nix", {st_mode=S_IFREG|0444, st_size=2541, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/databases/memcached.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=2541, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.services.memcached;\n\n memcached = pkgs.memcached;\n\nin\n\n{\n\n ###### interface\n\n options = {\n\n services.memcached = {\n\n enable = mkOption {\n default = false;\n description = \"\n Whether to enable Memcached.\n "..., 2541) = 2541 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/databases/mongodb.nix", {st_mode=S_IFREG|0444, st_size=3051, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/databases/mongodb.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=3051, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.services.mongodb;\n\n mongodb = cfg.package;\n\n mongoCnf = pkgs.writeText \"mongodb.conf\"\n ''\n net.bindIp: ${cfg.bind_ip}\n ${optionalString cfg.quiet \"systemLog.quiet: true\"}\n systemLog.destination: syslog\n storage.dbPath: ${cfg."..., 3051) = 3051 | |
close(3) = 0 | |
brk(0x18e3b000) = 0x18e3b000 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/databases/mysql.nix", {st_mode=S_IFREG|0444, st_size=12018, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/databases/mysql.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=12018, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.services.mysql;\n\n mysql = cfg.package;\n\n isMariaDB =\n let\n pName = _p: (builtins.parseDrvName (_p.name)).name;\n in pName mysql == pName pkgs.mariadb;\n\n pidFile = \"${cfg.pidDir}/mysqld.pid\";\n\n mysqldOptions =\n \"--user=${cfg"..., 12018) = 12018 | |
close(3) = 0 | |
brk(0x18e5c000) = 0x18e5c000 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/databases/neo4j.nix", {st_mode=S_IFREG|0444, st_size=4075, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/databases/neo4j.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=4075, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.neo4j;\n\n serverConfig = pkgs.writeText \"neo4j.conf\" ''\n dbms.directories.data=${cfg.dataDir}/data\n dbms.directories.certificates=${cfg.certDir}\n dbms.directories.logs=${cfg.dataDir}/logs\n dbms.directories.plugins=${cfg."..., 4075) = 4075 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/databases/openldap.nix", {st_mode=S_IFREG|0444, st_size=3006, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/databases/openldap.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=3006, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.services.openldap;\n openldap = pkgs.openldap;\n\n configFile = pkgs.writeText \"slapd.conf\" cfg.extraConfig;\n\nin\n\n{\n\n ###### interface\n\n options = {\n\n services.openldap = {\n\n enable = mkOption {\n type = types.bool;\n d"..., 3006) = 3006 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/databases/opentsdb.nix", {st_mode=S_IFREG|0444, st_size=2449, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/databases/opentsdb.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=2449, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.opentsdb;\n\n configFile = pkgs.writeText \"opentsdb.conf\" cfg.config;\n\nin {\n\n ###### interface\n\n options = {\n\n services.opentsdb = {\n\n enable = mkOption {\n type = types.bool;\n default = false;\n descript"..., 2449) = 2449 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/databases/pgmanage.nix", {st_mode=S_IFREG|0444, st_size=6663, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/databases/pgmanage.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=6663, ...}) = 0 | |
read(3, "{ lib, pkgs, config, ... } :\n\nwith lib;\n\nlet\n cfg = config.services.pgmanage;\n\n confFile = pkgs.writeTextFile {\n name = \"pgmanage.conf\";\n text = ''\n connection_file = ${pgmanageConnectionsFile}\n\n allow_custom_connections = ${builtins.toJSON cfg.allowCustomConnections}\n\n pgman"..., 6663) = 6663 | |
close(3) = 0 | |
brk(0x18e7d000) = 0x18e7d000 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/databases/postgresql.nix", {st_mode=S_IFREG|0444, st_size=8584, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/databases/postgresql.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=8584, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.services.postgresql;\n\n # see description of extraPlugins\n postgresqlAndPlugins = pg:\n if cfg.extraPlugins == [] then pg\n else pkgs.buildEnv {\n name = \"postgresql-and-plugins-${(builtins.parseDrvName pg.name).version}\";\n pa"..., 8584) = 8584 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/databases/redis.nix", {st_mode=S_IFREG|0444, st_size=7532, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/databases/redis.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=7532, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.redis;\n redisBool = b: if b then \"yes\" else \"no\";\n condOption = name: value: if value != null then \"${name} ${toString value}\" else \"\";\n\n redisConfig = pkgs.writeText \"redis.conf\" ''\n pidfile ${cfg.pidFile}\n port ${toString"..., 7532) = 7532 | |
close(3) = 0 | |
brk(0x18e9e000) = 0x18e9e000 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/databases/riak.nix", {st_mode=S_IFREG|0444, st_size=3599, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/databases/riak.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=3599, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.services.riak;\n\nin\n\n{\n\n ###### interface\n\n options = {\n\n services.riak = {\n\n enable = mkEnableOption \"riak\";\n\n package = mkOption {\n type = types.package;\n default = pkgs.riak;\n defaultText = \"pkgs.riak\";"..., 3599) = 3599 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/databases/riak-cs.nix", {st_mode=S_IFREG|0444, st_size=4638, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/databases/riak-cs.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=4638, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.services.riak-cs;\n\nin\n\n{\n\n ###### interface\n\n options = {\n\n services.riak-cs = {\n\n enable = mkEnableOption \"riak-cs\";\n\n package = mkOption {\n type = types.package;\n default = pkgs.riak-cs;\n defaultText = "..., 4638) = 4638 | |
close(3) = 0 | |
brk(0x18ebf000) = 0x18ebf000 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/databases/stanchion.nix", {st_mode=S_IFREG|0444, st_size=4829, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/databases/stanchion.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=4829, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.services.stanchion;\n\nin\n\n{\n\n ###### interface\n\n options = {\n\n services.stanchion = {\n\n enable = mkEnableOption \"stanchion\";\n\n package = mkOption {\n type = types.package;\n default = pkgs.stanchion;\n defaul"..., 4829) = 4829 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/databases/virtuoso.nix", {st_mode=S_IFREG|0444, st_size=2367, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/databases/virtuoso.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=2367, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\nlet\n cfg = config.services.virtuoso;\n virtuosoUser = \"virtuoso\";\n stateDir = \"/var/lib/virtuoso\";\nin\nwith lib;\n{\n\n ###### interface\n\n options = {\n\n services.virtuoso = {\n\n enable = mkOption {\n default = false;\n description = \"Whether to enable V"..., 2367) = 2367 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/desktops/accountsservice.nix", {st_mode=S_IFREG|0444, st_size=872, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/desktops/accountsservice.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=872, ...}) = 0 | |
read(3, "# AccountsService daemon.\n\n{ config, lib, pkgs, ... }:\n\nwith lib;\n\n{\n\n ###### interface\n\n options = {\n\n services.accounts-daemon = {\n\n enable = mkOption {\n type = types.bool;\n default = false;\n description = ''\n Whether to enable AccountsService, a DBus servic"..., 872) = 872 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/desktops/dleyna-renderer.nix", {st_mode=S_IFREG|0444, st_size=583, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/desktops/dleyna-renderer.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=583, ...}) = 0 | |
read(3, "# dleyna-renderer service.\n{ config, lib, pkgs, ... }:\n\nwith lib;\n\n{\n ###### interface\n options = {\n services.dleyna-renderer = {\n enable = mkOption {\n type = types.bool;\n default = false;\n description = ''\n Whether to enable dleyna-renderer service, a DBus se"..., 583) = 583 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/desktops/dleyna-server.nix", {st_mode=S_IFREG|0444, st_size=569, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/desktops/dleyna-server.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=569, ...}) = 0 | |
read(3, "# dleyna-server service.\n{ config, lib, pkgs, ... }:\n\nwith lib;\n\n{\n ###### interface\n options = {\n services.dleyna-server = {\n enable = mkOption {\n type = types.bool;\n default = false;\n description = ''\n Whether to enable dleyna-server service, a DBus service\n"..., 569) = 569 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/desktops/geoclue2.nix", {st_mode=S_IFREG|0444, st_size=616, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/desktops/geoclue2.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=616, ...}) = 0 | |
read(3, "# GeoClue 2 daemon.\n\n{ config, lib, pkgs, ... }:\n\nwith lib;\n\n{\n\n ###### interface\n\n options = {\n\n services.geoclue2 = {\n\n enable = mkOption {\n type = types.bool;\n default = false;\n description = ''\n Whether to enable GeoClue 2 daemon, a DBus service\n "..., 616) = 616 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/desktops/pipewire.nix", {st_mode=S_IFREG|0444, st_size=418, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/desktops/pipewire.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=418, ...}) = 0 | |
read(3, "# pipewire service.\n{ config, lib, pkgs, ... }:\n\nwith lib;\n\n{\n ###### interface\n options = {\n services.pipewire = {\n enable = mkEnableOption \"pipewire service\";\n };\n };\n\n\n ###### implementation\n config = mkIf config.services.pipewire.enable {\n environment.systemPackages = [ pkgs.p"..., 418) = 418 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/desktops/gnome3/at-spi2-core.nix", {st_mode=S_IFREG|0444, st_size=795, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/desktops/gnome3/at-spi2-core.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=795, ...}) = 0 | |
read(3, "# at-spi2-core daemon.\n\n{ config, lib, pkgs, ... }:\n\nwith lib;\n\n{\n\n ###### interface\n\n options = {\n\n services.gnome3.at-spi2-core = {\n\n enable = mkOption {\n type = types.bool;\n default = false;\n description = ''\n Whether to enable at-spi2-core, a service for t"..., 795) = 795 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/desktops/gnome3/chrome-gnome-shell.nix", {st_mode=S_IFREG|0444, st_size=953, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/desktops/gnome3/chrome-gnome-shell.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=953, ...}) = 0 | |
read(3, "# Chrome GNOME Shell native host connector.\n{ config, lib, pkgs, ... }:\n\nwith lib;\n\n{\n ###### interface\n options = {\n services.gnome3.chrome-gnome-shell.enable = mkEnableOption ''\n Chrome GNOME Shell native host connector, a DBus service\n allowing to install GNOME Shell extensions fro"..., 953) = 953 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/desktops/gnome3/evolution-data-server.nix", {st_mode=S_IFREG|0444, st_size=734, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/desktops/gnome3/evolution-data-server.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=734, ...}) = 0 | |
read(3, "# Evolution Data Server daemon.\n\n{ config, lib, pkgs, ... }:\n\nwith lib;\n\n{\n\n ###### interface\n\n options = {\n\n services.gnome3.evolution-data-server = {\n\n enable = mkOption {\n type = types.bool;\n default = false;\n description = ''\n Whether to enable Evolution D"..., 734) = 734 | |
close(3) = 0 | |
brk(0x18ee1000) = 0x18ee1000 | |
brk(0x18edf000) = 0x18edf000 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/desktops/gnome3/gnome-disks.nix", {st_mode=S_IFREG|0444, st_size=622, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/desktops/gnome3/gnome-disks.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=622, ...}) = 0 | |
read(3, "# GNOME Disks daemon.\n\n{ config, pkgs, lib, ... }:\n\nwith lib;\n\n{\n\n ###### interface\n\n options = {\n\n services.gnome3.gnome-disks = {\n\n enable = mkOption {\n type = types.bool;\n default = false;\n description = ''\n Whether to enable GNOME Disks daemon, a service d"..., 622) = 622 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/desktops/gnome3/gnome-documents.nix", {st_mode=S_IFREG|0444, st_size=734, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/desktops/gnome3/gnome-documents.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=734, ...}) = 0 | |
read(3, "# GNOME Documents daemon.\n\n{ config, pkgs, lib, ... }:\n\nwith lib;\n\n{\n\n ###### interface\n\n options = {\n\n services.gnome3.gnome-documents = {\n\n enable = mkOption {\n type = types.bool;\n default = false;\n description = ''\n Whether to enable GNOME Documents service"..., 734) = 734 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/desktops/gnome3/gnome-keyring.nix", {st_mode=S_IFREG|0444, st_size=692, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/desktops/gnome3/gnome-keyring.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=692, ...}) = 0 | |
read(3, "# GNOME Keyring daemon.\n\n{ config, pkgs, lib, ... }:\n\nwith lib;\n\n{\n\n ###### interface\n\n options = {\n\n services.gnome3.gnome-keyring = {\n\n enable = mkOption {\n type = types.bool;\n default = false;\n description = ''\n Whether to enable GNOME Keyring daemon, a ser"..., 692) = 692 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/desktops/gnome3/gnome-online-accounts.nix", {st_mode=S_IFREG|0444, st_size=686, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/desktops/gnome3/gnome-online-accounts.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=686, ...}) = 0 | |
read(3, "# GNOME Online Accounts daemon.\n\n{ config, pkgs, lib, ... }:\n\nwith lib;\n\n{\n\n ###### interface\n\n options = {\n\n services.gnome3.gnome-online-accounts = {\n\n enable = mkOption {\n type = types.bool;\n default = false;\n description = ''\n Whether to enable GNOME Onlin"..., 686) = 686 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/desktops/gnome3/gnome-online-miners.nix", {st_mode=S_IFREG|0444, st_size=644, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/desktops/gnome3/gnome-online-miners.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=644, ...}) = 0 | |
read(3, "# GNOME Online Miners daemon.\n\n{ config, pkgs, lib, ... }:\n\nwith lib;\n\n{\n\n ###### interface\n\n options = {\n\n services.gnome3.gnome-online-miners = {\n\n enable = mkOption {\n type = types.bool;\n default = false;\n description = ''\n Whether to enable GNOME Online Mi"..., 644) = 644 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/desktops/gnome3/gnome-terminal-server.nix", {st_mode=S_IFREG|0444, st_size=676, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/desktops/gnome3/gnome-terminal-server.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=676, ...}) = 0 | |
read(3, "# GNOME Documents daemon.\n\n{ config, pkgs, lib, ... }:\n\nwith lib;\n\n{\n\n ###### interface\n\n options = {\n\n services.gnome3.gnome-terminal-server = {\n\n enable = mkOption {\n type = types.bool;\n default = false;\n description = ''\n Whether to enable GNOME Terminal se"..., 676) = 676 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/desktops/gnome3/gnome-user-share.nix", {st_mode=S_IFREG|0444, st_size=896, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/desktops/gnome3/gnome-user-share.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=896, ...}) = 0 | |
read(3, "# GNOME User Share daemon.\n\n{ config, pkgs, lib, ... }:\n\nwith lib;\n\n{\n\n ###### interface\n\n options = {\n\n services.gnome3.gnome-user-share = {\n\n enable = mkOption {\n type = types.bool;\n default = false;\n description = ''\n Whether to enable GNOME User Share, a s"..., 896) = 896 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/desktops/gnome3/gpaste.nix", {st_mode=S_IFREG|0444, st_size=641, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/desktops/gnome3/gpaste.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=641, ...}) = 0 | |
read(3, "# GPaste daemon.\n{ config, lib, pkgs, ... }:\n\nwith lib;\n\n{\n ###### interface\n options = {\n services.gnome3.gpaste = {\n enable = mkOption {\n type = types.bool;\n default = false;\n description = ''\n Whether to enable GPaste, a clipboard manager.\n '';\n "..., 641) = 641 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/desktops/gnome3/gvfs.nix", {st_mode=S_IFREG|0444, st_size=675, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/desktops/gnome3/gvfs.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=675, ...}) = 0 | |
read(3, "# gvfs backends\n\n{ config, lib, pkgs, ... }:\n\nwith lib;\n\n{\n\n ###### interface\n\n options = {\n\n services.gnome3.gvfs = {\n\n enable = mkOption {\n type = types.bool;\n default = false;\n description = ''\n Whether to enable gvfs backends, userspace virtual filesystem "..., 675) = 675 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/desktops/gnome3/seahorse.nix", {st_mode=S_IFREG|0444, st_size=569, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/desktops/gnome3/seahorse.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=569, ...}) = 0 | |
read(3, "# Seahorse daemon.\n\n{ config, pkgs, lib, ... }:\n\nwith lib;\n\n{\n\n ###### interface\n\n options = {\n\n services.gnome3.seahorse = {\n\n enable = mkOption {\n type = types.bool;\n default = false;\n description = ''\n Whether to enable Seahorse search provider for the GNOM"..., 569) = 569 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/desktops/gnome3/sushi.nix", {st_mode=S_IFREG|0444, st_size=537, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/desktops/gnome3/sushi.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=537, ...}) = 0 | |
read(3, "# GNOME Sushi daemon.\n\n{ config, lib, pkgs, ... }:\n\nwith lib;\n\n{\n\n ###### interface\n\n options = {\n\n services.gnome3.sushi = {\n\n enable = mkOption {\n type = types.bool;\n default = false;\n description = ''\n Whether to enable Sushi, a quick previewer for nautilus"..., 537) = 537 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/desktops/gnome3/tracker.nix", {st_mode=S_IFREG|0444, st_size=637, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/desktops/gnome3/tracker.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=637, ...}) = 0 | |
read(3, "# Tracker daemon.\n\n{ config, pkgs, lib, ... }:\n\nwith lib;\n\n{\n\n ###### interface\n\n options = {\n\n services.gnome3.tracker = {\n\n enable = mkOption {\n type = types.bool;\n default = false;\n description = ''\n Whether to enable Tracker services, a search engine,\n "..., 637) = 637 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/desktops/gnome3/tracker-miners.nix", {st_mode=S_IFREG|0444, st_size=693, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/desktops/gnome3/tracker-miners.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=693, ...}) = 0 | |
read(3, "# Tracker Miners daemons.\n\n{ config, pkgs, lib, ... }:\n\nwith lib;\n\n{\n\n ###### interface\n\n options = {\n\n services.gnome3.tracker-miners = {\n\n enable = mkOption {\n type = types.bool;\n default = false;\n description = ''\n Whether to enable Tracker miners, indexing"..., 693) = 693 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/desktops/profile-sync-daemon.nix", {st_mode=S_IFREG|0444, st_size=3768, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/desktops/profile-sync-daemon.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=3768, ...}) = 0 | |
read(3, "{ config, pkgs, lib, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.psd;\n\n configFile = ''\n ${optionalString (cfg.users != [ ]) ''\n USERS=\"${concatStringsSep \" \" cfg.users}\"\n ''}\n\n ${optionalString (cfg.browsers != [ ]) ''\n BROWSERS=\"${concatStringsSep \" \" cfg.browsers}\"\n ''}\n"..., 3768) = 3768 | |
close(3) = 0 | |
brk(0x18f00000) = 0x18f00000 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/desktops/telepathy.nix", {st_mode=S_IFREG|0444, st_size=642, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/desktops/telepathy.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=642, ...}) = 0 | |
read(3, "# Telepathy daemon.\n\n{ config, lib, pkgs, ... }:\n\nwith lib;\n\n{\n\n ###### interface\n\n options = {\n\n services.telepathy = {\n\n enable = mkOption {\n type = types.bool;\n default = false;\n description = ''\n Whether to enable Telepathy service, a communications framew"..., 642) = 642 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/development/hoogle.nix", {st_mode=S_IFREG|0444, st_size=1573, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/development/hoogle.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=1573, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.services.hoogle;\n\n hoogleEnv = pkgs.buildEnv {\n name = \"hoogle\";\n paths = [ (cfg.haskellPackages.ghcWithHoogle cfg.packages) ];\n };\n\nin {\n\n options.services.hoogle = {\n enable = mkEnableOption \"Haskell documentation server\";\n\n "..., 1573) = 1573 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/editors/emacs.nix", {st_mode=S_IFREG|0444, st_size=2619, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/editors/emacs.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=2619, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.services.emacs;\n\n editorScript = pkgs.writeScriptBin \"emacseditor\" ''\n #!${pkgs.stdenv.shell}\n if [ -z \"$1\" ]; then\n exec ${cfg.package}/bin/emacsclient --create-frame --alternate-editor ${cfg.package}/bin/emacs\n else\n e"..., 2619) = 2619 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/editors/infinoted.nix", {st_mode=S_IFREG|0444, st_size=4262, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/editors/infinoted.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=4262, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.infinoted;\nin {\n options.services.infinoted = {\n enable = mkEnableOption \"infinoted\";\n\n package = mkOption {\n type = types.package;\n default = pkgs.libinfinity.override { daemon = true; };\n defaultText = \"pkgs."..., 4262) = 4262 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/games/factorio.nix", {st_mode=S_IFREG|0444, st_size=7013, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/games/factorio.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=7013, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.factorio;\n factorio = pkgs.factorio-headless;\n name = \"Factorio\";\n stateDir = cfg.stateDir;\n mkSavePath = name: \"${stateDir}/saves/${name}.zip\";\n configFile = pkgs.writeText \"factorio.conf\" ''\n use-system-read-write-data-dir"..., 7013) = 7013 | |
brk(0x18f21000) = 0x18f21000 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/games/minecraft-server.nix", {st_mode=S_IFREG|0444, st_size=1886, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/games/minecraft-server.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=1886, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.minecraft-server;\nin\n{\n options = {\n services.minecraft-server = {\n\n enable = mkOption {\n type = types.bool;\n default = false;\n description = ''\n If enabled, start a Minecraft Server. The liste"..., 1886) = 1886 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/games/minetest-server.nix", {st_mode=S_IFREG|0444, st_size=2700, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/games/minetest-server.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=2700, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.minetest-server;\n flag = val: name: if val != null then \"--${name} ${val} \" else \"\";\n flags = [ \n (flag cfg.gameId \"gameid\") \n (flag cfg.world \"world\") \n (flag cfg.configPath \"config\") \n (flag cfg.logPath \"logfile\")"..., 2700) = 2700 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/games/terraria.nix", {st_mode=S_IFREG|0444, st_size=4354, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/games/terraria.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=4354, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.terraria;\n worldSizeMap = { \"small\" = 1; \"medium\" = 2; \"large\" = 3; };\n valFlag = name: val: optionalString (val != null) \"-${name} \\\"${escape [\"\\\\\" \"\\\"\"] (toString val)}\\\"\";\n boolFlag = name: val: optionalString val \"-${name}\""..., 4354) = 4354 | |
close(3) = 0 | |
brk(0x18f42000) = 0x18f42000 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/hardware/acpid.nix", {st_mode=S_IFREG|0444, st_size=3577, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/hardware/acpid.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=3577, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n canonicalHandlers = {\n powerEvent = {\n event = \"button/power.*\";\n action = config.services.acpid.powerEventCommands;\n };\n\n lidEvent = {\n event = \"button/lid.*\";\n action = config.services.acpid.lidEventCommands;\n };\n\n a"..., 3577) = 3577 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/hardware/actkbd.nix", {st_mode=S_IFREG|0444, st_size=3299, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/hardware/actkbd.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=3299, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.services.actkbd;\n\n configFile = pkgs.writeText \"actkbd.conf\" ''\n ${concatMapStringsSep \"\\n\"\n ({ keys, events, attributes, command, ... }:\n ''${concatMapStringsSep \"+\" toString keys}:${concatStringsSep \",\" events}:${concatStr"..., 3299) = 3299 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/hardware/bluetooth.nix", {st_mode=S_IFREG|0444, st_size=1627, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/hardware/bluetooth.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=1627, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n bluez-bluetooth = pkgs.bluez;\n cfg = config.hardware.bluetooth;\n\nin {\n\n ###### interface\n\n options = {\n\n hardware.bluetooth = {\n enable = mkEnableOption \"support for Bluetooth.\";\n\n powerOnBoot = mkOption {\n type = types.bool;\n "..., 1627) = 1627 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/hardware/brltty.nix", {st_mode=S_IFREG|0444, st_size=1147, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/hardware/brltty.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=1147, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.brltty;\n\nin {\n\n options = {\n\n services.brltty.enable = mkOption {\n type = types.bool;\n default = false;\n description = \"Whether to enable the BRLTTY daemon.\";\n };\n\n };\n\n config = mkIf cfg.enable {\n\n system"..., 1147) = 1147 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/hardware/freefall.nix", {st_mode=S_IFREG|0444, st_size=1332, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/hardware/freefall.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=1332, ...}) = 0 | |
read(3, "{ config, lib, pkgs, utils, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.services.freefall;\n\nin {\n\n options.services.freefall = {\n\n enable = mkOption {\n type = types.bool;\n default = false;\n description = ''\n Whether to protect HP/Dell laptop hard drives (not SSDs) in free fall.\n"..., 1332) = 1332 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/hardware/fwupd.nix", {st_mode=S_IFREG|0444, st_size=2838, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/hardware/fwupd.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=2838, ...}) = 0 | |
read(3, "# fwupd daemon.\n\n{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.fwupd;\n originalEtc =\n let\n isRegular = v: v == \"regular\";\n listFiles = d: builtins.attrNames (filterAttrs (const isRegular) (builtins.readDir d));\n copiedDirs = [ \"fwupd/remotes.d\" \"pki/fwupd\" \"p"..., 2838) = 2838 | |
close(3) = 0 | |
brk(0x18f65000) = 0x18f65000 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/hardware/illum.nix", {st_mode=S_IFREG|0444, st_size=583, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/hardware/illum.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=583, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.illum;\nin {\n\n options = {\n\n services.illum = {\n\n enable = mkOption {\n default = false;\n type = types.bool;\n description = ''\n Enable illum, a daemon for controlling screen brightness with brigh"..., 583) = 583 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/hardware/interception-tools.nix", {st_mode=S_IFREG|0444, st_size=1700, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/hardware/interception-tools.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=1700, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.interception-tools;\nin {\n options.services.interception-tools = {\n enable = mkOption {\n type = types.bool;\n default = false;\n description = \"Whether to enable the interception tools service.\";\n };\n\n plugins "..., 1700) = 1700 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/hardware/irqbalance.nix", {st_mode=S_IFREG|0444, st_size=545, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/hardware/irqbalance.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=545, ...}) = 0 | |
read(3, "#\n{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.services.irqbalance;\n\nin\n{\n options.services.irqbalance.enable = mkEnableOption \"irqbalance daemon\";\n\n config = mkIf cfg.enable {\n\n systemd.services = {\n irqbalance = {\n description = \"irqbalance daemon\";\n path = ["..., 545) = 545 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/hardware/nvidia-optimus.nix", {st_mode=S_IFREG|0444, st_size=1029, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/hardware/nvidia-optimus.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=1029, ...}) = 0 | |
read(3, "{ config, pkgs, lib, ... }:\n\nlet kernel = config.boot.kernelPackages; in\n\n{\n\n ###### interface\n\n options = {\n\n hardware.nvidiaOptimus.disable = lib.mkOption {\n default = false;\n type = lib.types.bool;\n description = ''\n Completely disable the NVIDIA graphics card and use t"..., 1029) = 1029 | |
close(3) = 0 | |
brk(0x18f75000) = 0x18f75000 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/hardware/pcscd.nix", {st_mode=S_IFREG|0444, st_size=1785, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/hardware/pcscd.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=1785, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfgFile = pkgs.writeText \"reader.conf\" config.services.pcscd.readerConfig;\n\n pluginEnv = pkgs.buildEnv {\n name = \"pcscd-plugins\";\n paths = map (p: \"${p}/pcsc/drivers\") config.services.pcscd.plugins;\n };\n\nin {\n\n ###### interface\n\n options = {\n\n "..., 1785) = 1785 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/hardware/pommed.nix", {st_mode=S_IFREG|0444, st_size=1318, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/hardware/pommed.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=1318, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet cfg = config.services.hardware.pommed;\n defaultConf = \"${pkgs.pommed_light}/etc/pommed.conf.mactel\";\nin {\n\n options = {\n\n services.hardware.pommed = {\n\n enable = mkOption {\n type = types.bool;\n default = false;\n description"..., 1318) = 1318 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/hardware/sane.nix", {st_mode=S_IFREG|0444, st_size=4111, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/hardware/sane.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=4111, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n pkg = if config.hardware.sane.snapshot\n then pkgs.sane-backends-git\n else pkgs.sane-backends;\n\n sanedConf = pkgs.writeTextFile {\n name = \"saned.conf\";\n destination = \"/etc/sane.d/saned.conf\";\n text = ''\n localhost\n ${config.ser"..., 4111) = 4111 | |
close(3) = 0 | |
brk(0x18f96000) = 0x18f96000 | |
brk(0x18f97000) = 0x18f97000 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/hardware/sane_extra_backends/brscan4.nix", {st_mode=S_IFREG|0444, st_size=2762, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/hardware/sane_extra_backends/brscan4.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=2762, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.hardware.sane.brscan4;\n\n netDeviceList = attrValues cfg.netDevices;\n\n etcFiles = pkgs.callPackage ./brscan4_etc_files.nix { netDevices = netDeviceList; };\n\n netDeviceOpts = { name, config, ... }: {\n\n options = {\n\n name = mkOption "..., 2762) = 2762 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/hardware/tcsd.nix", {st_mode=S_IFREG|0444, st_size=4467, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/hardware/tcsd.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=4467, ...}) = 0 | |
read(3, "# tcsd daemon.\n\n{ config, pkgs, lib, ... }:\n\nwith lib;\nlet\n\n cfg = config.services.tcsd;\n\n tcsdConf = pkgs.writeText \"tcsd.conf\" ''\n port = 30003\n num_threads = 10\n system_ps_file = ${cfg.stateDir}/system.data\n # This is the log of each individual measurement done by the system.\n # "..., 4467) = 4467 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/hardware/tlp.nix", {st_mode=S_IFREG|0444, st_size=2509, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/hardware/tlp.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=2509, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\ncfg = config.services.tlp;\n\nenableRDW = config.networking.networkmanager.enable;\n\ntlp = pkgs.tlp.override {\n inherit enableRDW;\n};\n\n# XXX: We can't use writeTextFile + readFile here because it triggers\n# TLP build to get the .drv (even on --dry-run).\ncon"..., 2509) = 2509 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/hardware/thinkfan.nix", {st_mode=S_IFREG|0444, st_size=3008, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/hardware/thinkfan.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=3008, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.services.thinkfan;\n configFile = pkgs.writeText \"thinkfan.conf\" ''\n # ATTENTION: There is only very basic sanity checking on the configuration.\n # That means you can set your temperature limits as insane as you like. You\n # can do"..., 3008) = 3008 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/hardware/trezord.nix", {st_mode=S_IFREG|0444, st_size=1330, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/hardware/trezord.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=1330, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\nlet\n cfg = config.services.trezord;\nin {\n \n ### interface\n\n options = {\n services.trezord = {\n enable = mkOption {\n type = types.bool;\n default = false;\n description = ''\n Enable Trezor bridge daemon, for use with Trezo"..., 1330) = 1330 | |
close(3) = 0 | |
brk(0x18fb8000) = 0x18fb8000 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/hardware/u2f.nix", {st_mode=S_IFREG|0444, st_size=376, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/hardware/u2f.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=376, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\nlet\n cfg = config.hardware.u2f;\nin {\n options = {\n hardware.u2f = {\n enable = mkOption {\n type = types.bool;\n default = false;\n description = ''\n Enable U2F hardware support.\n '';\n };\n };\n };\n\n config = m"..., 376) = 376 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/hardware/udev.nix", {st_mode=S_IFREG|0444, st_size=10256, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/hardware/udev.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=10256, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n inherit (pkgs) stdenv writeText procps;\n\n udev = config.systemd.package;\n\n cfg = config.services.udev;\n\n extraUdevRules = pkgs.writeTextFile {\n name = \"extra-udev-rules\";\n text = cfg.extraRules;\n destination = \"/etc/udev/rules.d/99-local.rul"..., 10256) = 10256 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/hardware/udisks2.nix", {st_mode=S_IFREG|0444, st_size=978, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/hardware/udisks2.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=978, ...}) = 0 | |
read(3, "# Udisks daemon.\n\n{ config, lib, pkgs, ... }:\n\nwith lib;\n\n{\n\n ###### interface\n\n options = {\n\n services.udisks2 = {\n\n enable = mkOption {\n type = types.bool;\n default = true;\n description = ''\n Whether to enable Udisks, a DBus service that allows\n app"..., 978) = 978 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/hardware/upower.nix", {st_mode=S_IFREG|0444, st_size=1651, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/hardware/upower.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=1651, ...}) = 0 | |
read(3, "# Upower daemon.\n\n{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.upower;\nin\n{\n\n ###### interface\n\n options = {\n\n services.upower = {\n\n enable = mkOption {\n type = types.bool;\n default = false;\n description = ''\n Whether to enable Upower, a"..., 1651) = 1651 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/hardware/usbmuxd.nix", {st_mode=S_IFREG|0444, st_size=1900, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/hardware/usbmuxd.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=1900, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n defaultUserGroup = \"usbmux\";\n apple = \"05ac\";\n\n cfg = config.services.usbmuxd;\n\nin\n\n{\n options.services.usbmuxd = {\n enable = mkOption {\n type = types.bool;\n default = false;\n description = ''\n Enable the usbmuxd (\"USB multip"..., 1900) = 1900 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/hardware/thermald.nix", {st_mode=S_IFREG|0444, st_size=652, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/hardware/thermald.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=652, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.thermald;\nin {\n ###### interface\n options = { \n services.thermald = { \n enable = mkOption {\n default = false;\n description = ''\n Whether to enable thermald, the temperature management daemon.\n "..., 652) = 652 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/logging/SystemdJournal2Gelf.nix", {st_mode=S_IFREG|0444, st_size=1449, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/logging/SystemdJournal2Gelf.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=1449, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet cfg = config.services.SystemdJournal2Gelf;\nin\n\n{ options = {\n services.SystemdJournal2Gelf = {\n enable = mkOption {\n type = types.bool;\n default = false;\n description = ''\n Whether to enable SystemdJournal2Gelf.\n "..., 1449) = 1449 | |
close(3) = 0 | |
brk(0x18fd9000) = 0x18fd9000 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/logging/awstats.nix", {st_mode=S_IFREG|0444, st_size=4071, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/logging/awstats.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=4071, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.awstats;\n package = pkgs.awstats;\nin\n\n{\n options.services.awstats = {\n enable = mkOption {\n type = types.bool;\n default = cfg.service.enable;\n description = ''\n Enable the awstats program (but not service)"..., 4071) = 4071 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/logging/fluentd.nix", {st_mode=S_IFREG|0444, st_size=1357, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/logging/fluentd.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=1357, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.fluentd;\n\n pluginArgs = concatStringsSep \" \" (map (x: \"-p ${x}\") cfg.plugins);\nin {\n ###### interface\n\n options = {\n\n services.fluentd = {\n enable = mkOption {\n type = types.bool;\n default = false;\n d"..., 1357) = 1357 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/logging/graylog.nix", {st_mode=S_IFREG|0444, st_size=5335, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/logging/graylog.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=5335, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.graylog;\n\n confFile = pkgs.writeText \"graylog.conf\" ''\n is_master = ${boolToString cfg.isMaster}\n node_id_file = ${cfg.nodeIdFile}\n password_secret = ${cfg.passwordSecret}\n root_username = ${cfg.rootUsername}\n root_p"..., 5335) = 5335 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/logging/heartbeat.nix", {st_mode=S_IFREG|0444, st_size=1735, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/logging/heartbeat.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=1735, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.heartbeat;\n\n heartbeatYml = pkgs.writeText \"heartbeat.yml\" ''\n name: ${cfg.name}\n tags: ${builtins.toJSON cfg.tags}\n\n ${cfg.extraConfig}\n '';\n\nin\n{\n options = {\n\n services.heartbeat = {\n\n enable = mkEnableOption "..., 1735) = 1735 | |
close(3) = 0 | |
brk(0x18ffa000) = 0x18ffa000 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/logging/journalbeat.nix", {st_mode=S_IFREG|0444, st_size=1866, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/logging/journalbeat.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=1866, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.journalbeat;\n\n journalbeatYml = pkgs.writeText \"journalbeat.yml\" ''\n name: ${cfg.name}\n tags: ${builtins.toJSON cfg.tags}\n\n journalbeat.cursor_state_file: ${cfg.stateDir}/cursor-state\n\n ${cfg.extraConfig}\n '';\n\nin\n{\n "..., 1866) = 1866 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/logging/journalwatch.nix", {st_mode=S_IFREG|0444, st_size=8174, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/logging/journalwatch.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=8174, ...}) = 0 | |
read(3, "{ config, lib, pkgs, services, ... }:\nwith lib;\n\nlet\n cfg = config.services.journalwatch;\n user = \"journalwatch\";\n dataDir = \"/var/lib/${user}\";\n\n journalwatchConfig = pkgs.writeText \"config\" (''\n # (File Generated by NixOS journalwatch module.)\n [DEFAULT]\n mail_binary = ${cfg.mailBinar"..., 8174) = 8174 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/logging/klogd.nix", {st_mode=S_IFREG|0444, st_size=916, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/logging/klogd.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=916, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\n{\n ###### interface\n\n options = {\n\n services.klogd.enable = mkOption {\n type = types.bool;\n default = versionOlder (getVersion config.boot.kernelPackages.kernel) \"3.5\";\n description = ''\n Whether to enable klogd, the kernel log messa"..., 916) = 916 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/logging/logcheck.nix", {st_mode=S_IFREG|0444, st_size=6419, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/logging/logcheck.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=6419, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.logcheck;\n\n defaultRules = pkgs.runCommand \"logcheck-default-rules\" {} ''\n cp -prd ${pkgs.logcheck}/etc/logcheck $out\n chmod u+w $out\n rm -r $out/logcheck.*\n '';"..., 6419) = 6419 | |
close(3) = 0 | |
brk(0x1901b000) = 0x1901b000 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/logging/logrotate.nix", {st_mode=S_IFREG|0444, st_size=916, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/logging/logrotate.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=916, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.logrotate;\n\n configFile = pkgs.writeText \"logrotate.conf\"\n cfg.config;\n\nin\n{\n options = {\n services.logrotate = {\n enable = mkOption {\n type = lib.types.bool;\n default = false;\n description = ''\n "..., 916) = 916 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/logging/logstash.nix", {st_mode=S_IFREG|0444, st_size=5643, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/logging/logstash.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=5643, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.logstash;\n atLeast54 = versionAtLeast (builtins.parseDrvName cfg.package.name).version \"5.4\";\n pluginPath = lib.concatStringsSep \":\" cfg.plugins;\n havePluginPath = lib.length cfg.plugins > 0;\n ops = lib.optionalString;\n verbosi"..., 5643) = 5643 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/logging/rsyslogd.nix", {st_mode=S_IFREG|0444, st_size=2450, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/logging/rsyslogd.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=2450, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.services.rsyslogd;\n\n syslogConf = pkgs.writeText \"syslog.conf\" ''\n $ModLoad imuxsock\n $SystemLogSocketName /run/systemd/journal/syslog\n $WorkDirectory /var/spool/rsyslog\n\n ${cfg.defaultConfig}\n ${cfg.extraConfig}\n '';\n\n de"..., 2450) = 2450 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/logging/syslog-ng.nix", {st_mode=S_IFREG|0444, st_size=2528, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/logging/syslog-ng.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=2528, ...}) = 0 | |
read(3, "{ config, pkgs, lib, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.services.syslog-ng;\n\n syslogngConfig = pkgs.writeText \"syslog-ng.conf\" ''\n ${cfg.configHeader}\n ${cfg.extraConfig}\n '';\n\n ctrlSocket = \"/run/syslog-ng/syslog-ng.ctl\";\n pidFile = \"/run/syslog-ng/syslog-ng.pid\";\n persistFile = \"/va"..., 2528) = 2528 | |
close(3) = 0 | |
brk(0x1903c000) = 0x1903c000 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/logging/syslogd.nix", {st_mode=S_IFREG|0444, st_size=3166, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/logging/syslogd.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=3166, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.services.syslogd;\n\n syslogConf = pkgs.writeText \"syslog.conf\" ''\n ${if (cfg.tty != \"\") then \"kern.warning;*.err;authpriv.none /dev/${cfg.tty}\" else \"\"}\n ${cfg.defaultConfig}\n ${cfg.extraConfig}\n '';\n\n defaultConf = ''\n # Send"..., 3166) = 3166 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/mail/clamsmtp.nix", {st_mode=S_IFREG|0444, st_size=5592, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/mail/clamsmtp.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=5592, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\nlet\n cfg = config.services.clamsmtp;\n clamdSocket = \"/run/clamav/clamd.ctl\"; # See services/security/clamav.nix\nin\n{\n ##### interface\n options = {\n services.clamsmtp = {\n enable = mkOption {\n type = types.bool;\n default = false;\n "..., 5592) = 5592 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/mail/dkimproxy-out.nix", {st_mode=S_IFREG|0444, st_size=3332, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/mail/dkimproxy-out.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=3332, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\nlet\n cfg = config.services.dkimproxy-out;\n keydir = \"/var/lib/dkimproxy-out\";\n privkey = \"${keydir}/private.key\";\n pubkey = \"${keydir}/public.key\";\nin\n{\n ##### interface\n options = {\n services.dkimproxy-out = {\n enable = mkOption {\n type = "..., 3332) = 3332 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/mail/dovecot.nix", {st_mode=S_IFREG|0444, st_size=12006, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/mail/dovecot.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=12006, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.dovecot2;\n dovecotPkg = pkgs.dovecot;\n\n baseDir = \"/run/dovecot2\";\n stateDir = \"/var/lib/dovecot\";\n\n canCreateMailUserGroup = cfg.mailUser != null && cfg.mailGroup != null;\n\n dovecotConf = concatStrings [\n ''\n base_dir "..., 12006) = 12006 | |
brk(0x1905d000) = 0x1905d000 | |
close(3) = 0 | |
brk(0x1907e000) = 0x1907e000 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/mail/dspam.nix", {st_mode=S_IFREG|0444, st_size=3948, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/mail/dspam.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=3948, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.services.dspam;\n\n dspam = pkgs.dspam;\n\n defaultSock = \"/run/dspam/dspam.sock\";\n\n cfgfile = pkgs.writeText \"dspam.conf\" ''\n Home /var/lib/dspam\n StorageDriver ${dspam}/lib/dspam/lib${cfg.storageDriver}_drv.so\n\n Trust root\n Tru"..., 3948) = 3948 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/mail/exim.nix", {st_mode=S_IFREG|0444, st_size=2623, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/mail/exim.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=2623, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nlet\n inherit (lib) mkIf mkOption singleton types;\n inherit (pkgs) coreutils exim;\n cfg = config.services.exim;\nin\n\n{\n\n ###### interface\n\n options = {\n\n services.exim = {\n\n enable = mkOption {\n type = types.bool;\n default = false;\n descri"..., 2623) = 2623 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/mail/freepops.nix", {st_mode=S_IFREG|0444, st_size=2020, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/mail/freepops.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=2020, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.mail.freepopsd;\nin\n\n{\n options = {\n services.mail.freepopsd = {\n enable = mkOption {\n default = false;\n type = with types; bool;\n description = ''\n Enables Freepops, a POP3 webmail wrapper.\n "..., 2020) = 2020 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/mail/mail.nix", {st_mode=S_IFREG|0444, st_size=491, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/mail/mail.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=491, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\n{\n\n ###### interface\n\n options = {\n\n services.mail = {\n\n sendmailSetuidWrapper = mkOption {\n default = null;\n internal = true;\n description = ''\n Configuration for the sendmail setuid wapper.\n '';\n };\n\n };"..., 491) = 491 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/mail/mailhog.nix", {st_mode=S_IFREG|0444, st_size=810, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/mail/mailhog.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=810, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.mailhog;\nin {\n ###### interface\n\n options = {\n\n services.mailhog = {\n enable = mkEnableOption \"MailHog\";\n user = mkOption {\n type = types.str;\n default = \"mailhog\";\n description = \"User account un"..., 810) = 810 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/mail/mlmmj.nix", {st_mode=S_IFREG|0444, st_size=4739, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/mail/mlmmj.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=4739, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n concatMapLines = f: l: lib.concatStringsSep \"\\n\" (map f l);\n\n cfg = config.services.mlmmj;\n stateDir = \"/var/lib/mlmmj\";\n spoolDir = \"/var/spool/mlmmj\";\n listDir = domain: list: \"${spoolDir}/${domain}/${list}\";\n listCtl = domain: list: \"${listDir d"..., 4739) = 4739 | |
close(3) = 0 | |
brk(0x1909f000) = 0x1909f000 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/mail/offlineimap.nix", {st_mode=S_IFREG|0444, st_size=2469, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/mail/offlineimap.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=2469, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.offlineimap;\nin {\n\n options.services.offlineimap = {\n enable = mkEnableOption \"Offlineimap, a software to dispose your mailbox(es) as a local Maildir(s).\";\n\n install = mkOption {\n type = types.bool;\n default = false"..., 2469) = 2469 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/mail/opendkim.nix", {st_mode=S_IFREG|0444, st_size=3532, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/mail/opendkim.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=3532, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.services.opendkim;\n\n defaultSock = \"local:/run/opendkim/opendkim.sock\";\n\n keyFile = \"${cfg.keyPath}/${cfg.selector}.private\";\n\n args = [ \"-f\" \"-l\"\n \"-p\" cfg.socket\n \"-d\" cfg.domains\n \"-k\" keyFile\n "..., 3532) = 3532 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/mail/opensmtpd.nix", {st_mode=S_IFREG|0444, st_size=3142, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/mail/opensmtpd.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=3142, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.services.opensmtpd;\n conf = pkgs.writeText \"smtpd.conf\" cfg.serverConfiguration;\n args = concatStringsSep \" \" cfg.extraServerArgs;\n\n sendmail = pkgs.runCommand \"opensmtpd-sendmail\" {} ''\n mkdir -p $out/bin\n ln -s ${pkgs.opensmtpd}/"..., 3142) = 3142 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/mail/pfix-srsd.nix", {st_mode=S_IFREG|0444, st_size=1584, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/mail/pfix-srsd.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=1584, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\n{\n\n ###### interface\n\n options = {\n\n services.pfix-srsd = {\n enable = mkOption {\n default = false;\n type = types.bool;\n description = \"Whether to run the postfix sender rewriting scheme daemon.\";\n };\n\n domain = mkOption"..., 1584) = 1584 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/mail/postfix.nix", {st_mode=S_IFREG|0444, st_size=27056, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/mail/postfix.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=27056, ...}) = 0 | |
brk(0x190c5000) = 0x190c5000 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.services.postfix;\n user = cfg.user;\n group = cfg.group;\n setgidGroup = cfg.setgidGroup;\n\n haveAliases = cfg.postmasterAlias != \"\" || cfg.rootAlias != \"\"\n || cfg.extraAliases != \"\";\n haveTransport = cfg.transport !="..., 27056) = 27056 | |
close(3) = 0 | |
brk(0x190e6000) = 0x190e6000 | |
brk(0x19107000) = 0x19107000 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/mail/postsrsd.nix", {st_mode=S_IFREG|0444, st_size=3525, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/mail/postsrsd.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=3525, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.services.postsrsd;\n\nin {\n\n ###### interface\n\n options = {\n\n services.postsrsd = {\n\n enable = mkOption {\n type = types.bool;\n default = false;\n description = \"Whether to enable the postsrsd SRS server for Postf"..., 3525) = 3525 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/mail/postgrey.nix", {st_mode=S_IFREG|0444, st_size=6114, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/mail/postgrey.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=6114, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib; let\n\n cfg = config.services.postgrey;\n\n natural = with types; addCheck int (x: x >= 0);\n natural' = with types; addCheck int (x: x > 0);\n\n socket = with types; addCheck (either (submodule unixSocket) (submodule inetSocket)) (x: x ? \"path\" || x ? \"port\");\n\n "..., 6114) = 6114 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/mail/spamassassin.nix", {st_mode=S_IFREG|0444, st_size=7018, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/mail/spamassassin.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=7018, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.spamassassin;\n spamassassin-local-cf = pkgs.writeText \"local.cf\" cfg.config;\n spamassassin-init-pre = pkgs.writeText \"init.pre\" cfg.initPreConf;\n\n spamdEnv = pkgs.buildEnv {\n name = \"spamd-env\";\n paths = [];\n postBuild ="..., 7018) = 7018 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/mail/rspamd.nix", {st_mode=S_IFREG|0444, st_size=10948, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/mail/rspamd.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=10948, ...}) = 0 | |
read(3, "{ config, options, pkgs, lib, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.services.rspamd;\n opts = options.services.rspamd;\n\n bindSocketOpts = {options, config, ... }: {\n options = {\n socket = mkOption {\n type = types.str;\n example = \"localhost:11333\";\n description = ''\n "..., 10948) = 10948 | |
brk(0x19128000) = 0x19128000 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/mail/rmilter.nix", {st_mode=S_IFREG|0444, st_size=6686, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/mail/rmilter.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=6686, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n rspamdCfg = config.services.rspamd;\n postfixCfg = config.services.postfix;\n cfg = config.services.rmilter;\n\n inetSocket = addr: port: \"inet:[${toString port}@${addr}]\";\n unixSocket = sock: \"unix:${sock}\";\n\n systemdSocket = if cfg.bindSocket.type =="..., 6686) = 6686 | |
close(3) = 0 | |
brk(0x19149000) = 0x19149000 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/mail/nullmailer.nix", {st_mode=S_IFREG|0444, st_size=7927, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/mail/nullmailer.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=7927, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\n{\n\n options = {\n\n services.nullmailer = {\n enable = mkOption {\n type = types.bool;\n default = false;\n description = \"Whether to enable nullmailer daemon.\";\n };\n\n user = mkOption {\n type = types.string;\n def"..., 7927) = 7927 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/misc/airsonic.nix", {st_mode=S_IFREG|0444, st_size=3314, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/misc/airsonic.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=3314, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.airsonic;\nin {\n options = {\n\n services.airsonic = {\n enable = mkEnableOption \"Airsonic, the Free and Open Source media streaming server (fork of Subsonic and Libresonic)\";\n\n user = mkOption {\n type = types.str;\n"..., 3314) = 3314 | |
close(3) = 0 | |
brk(0x1916a000) = 0x1916a000 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/misc/apache-kafka.nix", {st_mode=S_IFREG|0444, st_size=4256, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/misc/apache-kafka.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=4256, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.apache-kafka;\n\n serverProperties =\n if cfg.serverProperties != null then\n cfg.serverProperties\n else\n ''\n # Generated by nixos\n broker.id=${toString cfg.brokerId}\n port=${toString cfg.port}\n "..., 4256) = 4256 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/misc/autofs.nix", {st_mode=S_IFREG|0444, st_size=2629, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/misc/autofs.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=2629, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.services.autofs;\n\n autoMaster = pkgs.writeText \"auto.master\" cfg.autoMaster;\n\nin\n\n{\n\n ###### interface\n\n options = {\n\n services.autofs = {\n\n enable = mkOption {\n default = false;\n description = ''\n Mount fi"..., 2629) = 2629 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/misc/autorandr.nix", {st_mode=S_IFREG|0444, st_size=545, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/misc/autorandr.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=545, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.services.autorandr;\n\nin {\n\n options = {\n\n services.autorandr = {\n enable = mkEnableOption \"handling of hotplug and sleep events by autorandr\";\n };\n\n };\n\n config = mkIf cfg.enable {\n\n services.udev.packages = [ pkgs.autorand"..., 545) = 545 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/misc/bepasty.nix", {st_mode=S_IFREG|0444, st_size=5667, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/misc/bepasty.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=5667, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\nlet\n gunicorn = pkgs.pythonPackages.gunicorn;\n bepasty = pkgs.bepasty;\n gevent = pkgs.pythonPackages.gevent;\n python = pkgs.pythonPackages.python;\n cfg = config.services.bepasty;\n user = \"bepasty\";\n group = \"bepasty\";\n default_home = \"/var/lib/bepasty\";"..., 5667) = 5667 | |
close(3) = 0 | |
brk(0x1918b000) = 0x1918b000 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/misc/canto-daemon.nix", {st_mode=S_IFREG|0444, st_size=614, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/misc/canto-daemon.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=614, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\ncfg = config.services.canto-daemon;\n\nin {\n\n##### interface\n\n options = {\n\n services.canto-daemon = {\n enable = mkOption {\n type = types.bool;\n default = false;\n description = \"Whether to enable the canto RSS daemon.\";\n }"..., 614) = 614 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/misc/calibre-server.nix", {st_mode=S_IFREG|0444, st_size=1097, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/misc/calibre-server.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=1097, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.services.calibre-server;\n\nin\n\n{\n\n ###### interface\n\n options = {\n\n services.calibre-server = {\n\n enable = mkEnableOption \"calibre-server\";\n\n libraryDir = mkOption {\n description = ''\n The directory where the C"..., 1097) = 1097 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/misc/cfdyndns.nix", {st_mode=S_IFREG|0444, st_size=1594, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/misc/cfdyndns.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=1594, ...}) = 0 | |
read(3, "{ config, pkgs, lib, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.cfdyndns;\nin\n{\n options = {\n services.cfdyndns = {\n enable = mkEnableOption \"Cloudflare Dynamic DNS Client\";\n\n email = mkOption {\n type = types.str;\n description = ''\n The email address to use to"..., 1594) = 1594 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/misc/cpuminer-cryptonight.nix", {st_mode=S_IFREG|0444, st_size=1471, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/misc/cpuminer-cryptonight.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=1471, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.cpuminer-cryptonight;\n\n json = builtins.toJSON (\n cfg // {\n enable = null;\n threads =\n if cfg.threads == 0 then null else toString cfg.threads;\n }\n );\n\n confFile = builtins.toFile \"cpuminer.json\" json;\ni"..., 1471) = 1471 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/misc/cgminer.nix", {st_mode=S_IFREG|0444, st_size=3691, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/misc/cgminer.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=3691, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.cgminer;\n\n convType = with builtins;\n v: if isBool v then boolToString v else toString v;\n mergedHwConfig =\n mapAttrsToList (n: v: ''\"${n}\": \"${(concatStringsSep \",\" (map convType v))}\"'')\n (foldAttrs (n: a: [n] ++ a) ["..., 3691) = 3691 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/misc/confd.nix", {st_mode=S_IFREG|0555, st_size=2143, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/misc/confd.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0555, st_size=2143, ...}) = 0 | |
read(3, "{ config, pkgs, lib, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.confd;\n\n confdConfig = ''\n backend = \"${cfg.backend}\"\n confdir = \"${cfg.confDir}\"\n interval = ${toString cfg.interval}\n nodes = [ ${concatMapStringsSep \",\" (s: ''\"${s}\"'') cfg.nodes}, ]\n prefix = \"${cfg.prefix}\"\n "..., 2143) = 2143 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/misc/couchpotato.nix", {st_mode=S_IFREG|0444, st_size=1129, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/misc/couchpotato.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=1129, ...}) = 0 | |
read(3, "{ config, pkgs, lib, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.couchpotato;\n\nin\n{\n options = {\n services.couchpotato = {\n enable = mkEnableOption \"CouchPotato Server\";\n };\n };\n\n config = mkIf cfg.enable {\n systemd.services.couchpotato = {\n description = \"CouchPotato Server"..., 1129) = 1129 | |
close(3) = 0 | |
brk(0x191ac000) = 0x191ac000 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/misc/devmon.nix", {st_mode=S_IFREG|0444, st_size=649, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/misc/devmon.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=649, ...}) = 0 | |
read(3, "{ pkgs, config, lib, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.devmon;\n\nin {\n options = {\n services.devmon = {\n enable = mkOption {\n default = false;\n description = ''\n Whether to enable devmon, an automatic device mounting daemon.\n '';\n };\n };\n }"..., 649) = 649 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/misc/dictd.nix", {st_mode=S_IFREG|0444, st_size=1687, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/misc/dictd.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=1687, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.dictd;\nin\n\n{\n\n ###### interface\n\n options = {\n\n services.dictd = {\n\n enable = mkOption {\n type = types.bool;\n default = false;\n description = ''\n Whether to enable the DICT.org dictionary serv"..., 1687) = 1687 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/misc/dysnomia.nix", {st_mode=S_IFREG|0444, st_size=7279, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/misc/dysnomia.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=7279, ...}) = 0 | |
read(3, "{pkgs, lib, config, ...}:\n\nwith lib;\n\nlet\n cfg = config.dysnomia;\n \n printProperties = properties:\n concatMapStrings (propertyName:\n let\n property = properties.\"${propertyName}\";\n in\n if isList property then \"${propertyName}=(${lib.concatMapStrings (elem: \"\\\"${toString el"..., 7279) = 7279 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/misc/disnix.nix", {st_mode=S_IFREG|0444, st_size=3352, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/misc/disnix.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=3352, ...}) = 0 | |
read(3, "# Disnix server\n{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.services.disnix;\n\n dysnomia = pkgs.dysnomia.override (origArgs: {\n enableApacheWebApplication = config.services.httpd.enable;\n enableAxis2WebService = config.services.tomcat.axis2.enable;\n enableEjabberdDump = conf"..., 3352) = 3352 | |
close(3) = 0 | |
brk(0x191cd000) = 0x191cd000 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/misc/docker-registry.nix", {st_mode=S_IFREG|0444, st_size=1650, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/misc/docker-registry.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=1650, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.dockerRegistry;\n\nin {\n options.services.dockerRegistry = {\n enable = mkEnableOption \"Docker Registry\";\n\n listenAddress = mkOption {\n description = \"Docker registry host or ip to bind to.\";\n default = \"127.0.0.1\";\n "..., 1650) = 1650 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/misc/emby.nix", {st_mode=S_IFREG|0444, st_size=1622, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/misc/emby.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=1622, ...}) = 0 | |
read(3, "{ config, pkgs, lib, mono, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.emby;\n emby = pkgs.emby;\nin\n{\n options = {\n services.emby = {\n enable = mkEnableOption \"Emby Media Server\";\n\n user = mkOption {\n type = types.str;\n default = \"emby\";\n description = \"User acc"..., 1622) = 1622 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/misc/errbot.nix", {st_mode=S_IFREG|0444, st_size=2828, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/misc/errbot.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=2828, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.errbot;\n pluginEnv = plugins: pkgs.buildEnv {\n name = \"errbot-plugins\";\n paths = plugins;\n };\n mkConfigDir = instanceCfg: dataDir: pkgs.writeTextDir \"config.py\" ''\n import logging\n BACKEND = '${instanceCfg.backend}'\n "..., 2828) = 2828 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/misc/etcd.nix", {st_mode=S_IFREG|0444, st_size=5980, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/misc/etcd.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=5980, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.etcd;\n\nin {\n\n options.services.etcd = {\n enable = mkOption {\n description = \"Whether to enable etcd.\";\n default = false;\n type = types.bool;\n };\n\n name = mkOption {\n description = \"Etcd unique node name"..., 5980) = 5980 | |
close(3) = 0 | |
brk(0x191ee000) = 0x191ee000 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/misc/exhibitor.nix", {st_mode=S_IFREG|0444, st_size=14256, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/misc/exhibitor.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=14256, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.exhibitor;\n exhibitor = cfg.package;\n exhibitorConfig = ''\n zookeeper-install-directory=${cfg.baseDir}/zookeeper\n zookeeper-data-directory=${cfg.zkDataDir}\n zookeeper-log-directory=${cfg.zkLogDir}\n zoo-cfg-extra=${cfg."..., 14256) = 14256 | |
close(3) = 0 | |
brk(0x1920f000) = 0x1920f000 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/misc/felix.nix", {st_mode=S_IFREG|0444, st_size=2424, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/misc/felix.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=2424, ...}) = 0 | |
read(3, "# Felix server\n{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.services.felix;\n\nin\n\n{\n\n ###### interface\n\n options = {\n\n services.felix = {\n\n enable = mkOption {\n default = false;\n description = \"Whether to enable the Apache Felix OSGi service\";\n };\n\n bu"..., 2424) = 2424 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/misc/folding-at-home.nix", {st_mode=S_IFREG|0444, st_size=1516, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/misc/folding-at-home.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=1516, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\nwith lib;\nlet\n stateDir = \"/var/lib/foldingathome\";\n cfg = config.services.foldingAtHome;\n fahUser = \"foldingathome\";\nin {\n\n ###### interface\n\n options = {\n\n services.foldingAtHome = {\n\n enable = mkOption {\n default = false;\n description = ''\n "..., 1516) = 1516 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/misc/fstrim.nix", {st_mode=S_IFREG|0444, st_size=919, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/misc/fstrim.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=919, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.services.fstrim;\n\nin {\n\n options = {\n\n services.fstrim = {\n enable = mkEnableOption \"periodic SSD TRIM of mounted partitions in background\";\n\n interval = mkOption {\n type = types.string;\n default = \"weekly\";\n "..., 919) = 919 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/misc/gammu-smsd.nix", {st_mode=S_IFREG|0444, st_size=7774, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/misc/gammu-smsd.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=7774, ...}) = 0 | |
read(3, "{ pkgs, lib, config, ... }:\n\nwith lib;\nlet\n cfg = config.services.gammu-smsd;\n\n configFile = pkgs.writeText \"gammu-smsd.conf\" ''\n [gammu]\n Device = ${cfg.device.path}\n Connection = ${cfg.device.connection}\n SynchronizeTime = ${if cfg.device.synchronizeTime then \"yes\" else \"no\"}\n Log"..., 7774) = 7774 | |
close(3) = 0 | |
brk(0x19230000) = 0x19230000 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/misc/geoip-updater.nix", {st_mode=S_IFREG|0444, st_size=9016, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/misc/geoip-updater.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=9016, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.geoip-updater;\n\n dbBaseUrl = \"https://geolite.maxmind.com/download/geoip/database\";\n\n randomizedTimerDelaySec = \"3600\";\n\n # Use writeScriptBin instead of writeScript, so that argv[0] (logged to the\n # journal) doesn't include th"..., 9016) = 9016 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/misc/gitea.nix", {st_mode=S_IFREG|0444, st_size=7586, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/misc/gitea.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=7586, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.gitea;\n configFile = pkgs.writeText \"app.ini\" ''\n APP_NAME = ${cfg.appName}\n RUN_USER = ${cfg.user}\n RUN_MODE = prod\n\n [database]\n DB_TYPE = ${cfg.database.type}\n HOST = ${cfg.database.host}:${toString cfg.databas"..., 7586) = 7586 | |
close(3) = 0 | |
brk(0x19251000) = 0x19251000 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/misc/gitlab.nix", {st_mode=S_IFREG|0444, st_size=22698, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/misc/gitlab.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=22698, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\n# TODO: support non-postgresql\n\nwith lib;\n\nlet\n cfg = config.services.gitlab;\n\n ruby = cfg.packages.gitlab.ruby;\n bundler = pkgs.bundler;\n\n gemHome = \"${cfg.packages.gitlab.rubyEnv}/${ruby.gemPath}\";\n\n gitlabSocket = \"${cfg.statePath}/tmp/sockets/gitlab.socket\";\n g"..., 22698) = 22698 | |
close(3) = 0 | |
brk(0x19272000) = 0x19272000 | |
brk(0x19293000) = 0x19293000 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/misc/gitolite.nix", {st_mode=S_IFREG|0444, st_size=7676, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/misc/gitolite.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=7676, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.gitolite;\n # Use writeTextDir to not leak Nix store hash into file name\n pubkeyFile = (pkgs.writeTextDir \"gitolite-admin.pub\" cfg.adminPubkey) + \"/gitolite-admin.pub\";\n hooks = lib.concatMapStrings (hook: \"${hook} \") cfg.commonHo"..., 7676) = 7676 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/misc/gogs.nix", {st_mode=S_IFREG|0444, st_size=7708, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/misc/gogs.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=7708, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.gogs;\n configFile = pkgs.writeText \"app.ini\" ''\n APP_NAME = ${cfg.appName}\n RUN_USER = ${cfg.user}\n RUN_MODE = prod\n\n [database]\n DB_TYPE = ${cfg.database.type}\n HOST = ${cfg.database.host}:${toString cfg.database"..., 7708) = 7708 | |
close(3) = 0 | |
brk(0x192b4000) = 0x192b4000 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/misc/gollum.nix", {st_mode=S_IFREG|0444, st_size=2946, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/misc/gollum.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=2946, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.gollum;\nin\n\n{\n options.services.gollum = {\n enable = mkOption {\n type = types.bool;\n default = false;\n description = \"Enable the Gollum service.\";\n };\n\n address = mkOption {\n type = types.str;\n def"..., 2946) = 2946 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/misc/gpsd.nix", {st_mode=S_IFREG|0444, st_size=2659, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/misc/gpsd.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=2659, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n uid = config.ids.uids.gpsd;\n gid = config.ids.gids.gpsd;\n cfg = config.services.gpsd;\n\nin\n\n{\n\n ###### interface\n\n options = {\n\n services.gpsd = {\n\n enable = mkOption {\n type = types.bool;\n default = false;\n description ="..., 2659) = 2659 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/misc/home-assistant.nix", {st_mode=S_IFREG|0444, st_size=4183, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/misc/home-assistant.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=4183, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.home-assistant;\n\n configFile = pkgs.writeText \"configuration.yaml\" (builtins.toJSON cfg.config);\n\n availableComponents = pkgs.home-assistant.availableComponents;\n\n # Given component \"parentConfig.platform\", returns whether config"..., 4183) = 4183 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/misc/ihaskell.nix", {st_mode=S_IFREG|0444, st_size=1561, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/misc/ihaskell.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=1561, ...}) = 0 | |
read(3, "{ pkgs, lib, config, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.services.ihaskell;\n ihaskell = pkgs.ihaskell.override {\n packages = self: cfg.extraPackages self;\n };\n\nin\n\n{\n options = {\n services.ihaskell = {\n enable = mkOption {\n default = false;\n description = \"Autostart an"..., 1561) = 1561 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/misc/irkerd.nix", {st_mode=S_IFREG|0444, st_size=1744, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/misc/irkerd.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=1744, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.irkerd;\n ports = [ 6659 ];\nin\n{\n options.services.irkerd = {\n enable = mkOption {\n description = \"Whether to enable irker, an IRC notification daemon.\";\n default = false;\n type = types.bool;\n };\n\n openPorts"..., 1744) = 1744 | |
close(3) = 0 | |
brk(0x192d5000) = 0x192d5000 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/misc/jackett.nix", {st_mode=S_IFREG|0444, st_size=1072, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/misc/jackett.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=1072, ...}) = 0 | |
read(3, "{ config, pkgs, lib, mono, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.jackett;\nin\n{\n options = {\n services.jackett = {\n enable = mkEnableOption \"Jackett\";\n };\n };\n\n config = mkIf cfg.enable {\n systemd.services.jackett = {\n description = \"Jackett\";\n after = [ \"network.t"..., 1072) = 1072 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/misc/logkeys.nix", {st_mode=S_IFREG|0444, st_size=498, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/misc/logkeys.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=498, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.logkeys;\nin {\n options.services.logkeys = {\n enable = mkEnableOption \"logkeys service\";\n };\n\n config = mkIf cfg.enable {\n systemd.services.logkeys = {\n description = \"LogKeys Keylogger Daemon\";\n wantedBy = [ \"mult"..., 498) = 498 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/misc/leaps.nix", {st_mode=S_IFREG|0444, st_size=1571, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/misc/leaps.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=1571, ...}) = 0 | |
read(3, "{ config, pkgs, lib, ... } @ args:\n\nwith lib;\n\nlet\n cfg = config.services.leaps;\n stateDir = \"/var/lib/leaps/\";\nin\n{\n options = {\n services.leaps = {\n enable = mkEnableOption \"leaps\";\n port = mkOption {\n type = types.int;\n default = 8080;\n description = \"A port w"..., 1571) = 1571 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/misc/mantisbt.nix", {st_mode=S_IFREG|0444, st_size=1862, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/misc/mantisbt.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=1862, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\nlet\n cfg = config.services.mantisbt;\n\n freshInstall = cfg.extraConfig == \"\";\n\n # combined code+config directory\n mantisbt = let\n config_inc = pkgs.writeText \"config_inc.php\" (\"<?php\\n\" + cfg.extraConfig);\n src = pkgs.fetchurl {\n url = \"mirror://s"..., 1862) = 1862 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/misc/mathics.nix", {st_mode=S_IFREG|0444, st_size=1317, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/misc/mathics.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=1317, ...}) = 0 | |
read(3, "{ pkgs, lib, config, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.mathics;\n\nin {\n options = {\n services.mathics = {\n enable = mkEnableOption \"Mathics notebook service\";\n\n external = mkOption {\n type = types.bool;\n default = false;\n description = \"Listen on all in"..., 1317) = 1317 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/misc/matrix-synapse.nix", {st_mode=S_IFREG|0444, st_size=23859, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/misc/matrix-synapse.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=23859, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.matrix-synapse;\n pg = config.services.postgresql;\n usePostgresql = cfg.database_type == \"psycopg2\";\n logConfigFile = pkgs.writeText \"log_config.yaml\" cfg.logConfig;\n mkResource = r: ''{names: ${builtins.toJSON r.names}, compress"..., 23859) = 23859 | |
close(3) = 0 | |
brk(0x192f6000) = 0x192f6000 | |
brk(0x19317000) = 0x19317000 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/misc/mbpfan.nix", {st_mode=S_IFREG|0444, st_size=2514, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/misc/mbpfan.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=2514, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.mbpfan;\n verbose = if cfg.verbose then \"v\" else \"\";\n\nin {\n options.services.mbpfan = {\n enable = mkEnableOption \"mbpfan, fan controller daemon for Apple Macs and MacBooks\";\n\n package = mkOption {\n type = types.package;\n"..., 2514) = 2514 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/misc/mediatomb.nix", {st_mode=S_IFREG|0444, st_size=9878, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/misc/mediatomb.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=9878, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n uid = config.ids.uids.mediatomb;\n gid = config.ids.gids.mediatomb;\n cfg = config.services.mediatomb;\n\n mtConf = pkgs.writeText \"config.xml\" ''\n <?xml version=\"1.0\" encoding=\"UTF-8\"?>\n <config version=\"2\" xmlns=\"http://mediatomb.cc/config/2\" xmlns:x"..., 9878) = 9878 | |
close(3) = 0 | |
brk(0x19338000) = 0x19338000 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/misc/mesos-master.nix", {st_mode=S_IFREG|0444, st_size=3334, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/misc/mesos-master.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=3334, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.mesos.master;\n\nin {\n\n options.services.mesos = {\n\n master = {\n enable = mkOption {\n description = \"Whether to enable the Mesos Master.\";\n default = false;\n type = types.bool;\n };\n\n ip = mkOpti"..., 3334) = 3334 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/misc/mesos-slave.nix", {st_mode=S_IFREG|0444, st_size=6773, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/misc/mesos-slave.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=6773, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.mesos.slave;\n\n mkAttributes =\n attrs: concatStringsSep \";\" (mapAttrsToList\n (k: v: \"${k}:${v}\")\n (filterAttrs (k: v: v != null) attrs));\n attribsArg = optional"..., 6773) = 6773 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/misc/mwlib.nix", {st_mode=S_IFREG|0444, st_size=7639, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/misc/mwlib.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=7639, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.mwlib;\n pypkgs = pkgs.python27Packages;\n\n inherit (pypkgs) python mwlib;\n\n user = mkOption {\n default = \"nobody\";\n type = types.str;\n description = \"User to run as.\";\n };\n\nin\n{\n\n options.services.mwlib = {\n\n nserve "..., 7639) = 7639 | |
close(3) = 0 | |
brk(0x19359000) = 0x19359000 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/misc/nix-daemon.nix", {st_mode=S_IFREG|0444, st_size=16705, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/misc/nix-daemon.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=16705, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.nix;\n\n nix = cfg.package.out;\n\n isNix20 = versionAtLeast (getVersion nix) \"2.0pre\";\n\n makeNixBuildUser = nr:\n { name = \"nixbld${toString nr}\";\n description = \"Nix build user ${toString nr}\";\n\n /* For consistency with the set"..., 16705) = 16705 | |
close(3) = 0 | |
brk(0x1937a000) = 0x1937a000 | |
brk(0x19379000) = 0x19379000 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/misc/nix-gc.nix", {st_mode=S_IFREG|0444, st_size=1251, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/misc/nix-gc.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=1251, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.nix.gc;\nin\n\n{\n\n ###### interface\n\n options = {\n\n nix.gc = {\n\n automatic = mkOption {\n default = false;\n type = types.bool;\n description = \"Automatically run the garbage collector at a specific time.\";\n };\n"..., 1251) = 1251 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/misc/nix-optimise.nix", {st_mode=S_IFREG|0444, st_size=969, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/misc/nix-optimise.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=969, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.nix.optimise;\nin\n\n{\n\n ###### interface\n\n options = {\n\n nix.optimise = {\n\n automatic = mkOption {\n default = false;\n type = types.bool;\n description = \"Automatically run the nix store optimiser at a specific tim"..., 969) = 969 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/misc/nixos-manual.nix", {st_mode=S_IFREG|0444, st_size=4195, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/misc/nixos-manual.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=4195, ...}) = 0 | |
read(3, "# This module includes the NixOS man-pages in the system environment,\n# and optionally starts a browser that shows the NixOS manual on one\n# of the virtual consoles. The latter is useful for the installation\n# CD.\n\n{ config, lib, pkgs, baseModules, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.services.ni"..., 4195) = 4195 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/misc/nix-ssh-serve.nix", {st_mode=S_IFREG|0444, st_size=1151, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/misc/nix-ssh-serve.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=1151, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\n{\n options = {\n\n nix.sshServe = {\n\n enable = mkOption {\n type = types.bool;\n default = false;\n description = \"Whether to enable serving the Nix store as a binary cache via SSH.\";\n };\n\n keys = mkOption {\n type = ty"..., 1151) = 1151 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/misc/novacomd.nix", {st_mode=S_IFREG|0444, st_size=588, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/misc/novacomd.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=588, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.services.novacomd;\n\nin {\n\n options = {\n services.novacomd = {\n enable = mkEnableOption \"Novacom service for connecting to WebOS devices\";\n };\n };\n\n config = mkIf cfg.enable {\n environment.systemPackages = [ pkgs.webos.novac"..., 588) = 588 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/misc/nzbget.nix", {st_mode=S_IFREG|0444, st_size=3399, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/misc/nzbget.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=3399, ...}) = 0 | |
read(3, "{ config, pkgs, lib, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.nzbget;\n nzbget = pkgs.nzbget; in {\n options = {\n services.nzbget = {\n enable = mkEnableOption \"NZBGet\";\n\n package = mkOption {\n type = types.package;\n default = pkgs.nzbget;\n defaultText = \"pkgs."..., 3399) = 3399 | |
close(3) = 0 | |
brk(0x1939a000) = 0x1939a000 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/misc/octoprint.nix", {st_mode=S_IFREG|0444, st_size=3273, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/misc/octoprint.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=3273, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.services.octoprint;\n\n baseConfig = {\n plugins.cura.cura_engine = \"${pkgs.curaengine_stable}/bin/CuraEngine\";\n server.host = cfg.host;\n server.port = cfg.port;\n webcam.ffmpeg = \"${pkgs.ffmpeg.bin}/bin/ffmpeg\";\n };\n\n fullConfig"..., 3273) = 3273 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/misc/osrm.nix", {st_mode=S_IFREG|0444, st_size=2002, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/misc/osrm.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=2002, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.osrm;\nin\n\n{\n options.services.osrm = {\n enable = mkOption {\n type = types.bool;\n default = false;\n description = \"Enable the OSRM service.\";\n };\n\n address = mkOption {\n type = types.str;\n default ="..., 2002) = 2002 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/misc/packagekit.nix", {st_mode=S_IFREG|0444, st_size=1321, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/misc/packagekit.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=1321, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.services.packagekit;\n\n backend = \"nix\";\n\n packagekitConf = ''\n[Daemon]\nDefaultBackend=${backend}\nKeepCache=false\n '';\n\n vendorConf = ''\n[PackagesNotFound]\nDefaultUrl=https://github.com/NixOS/nixpkgs\nCodecUrl=https://github.com/NixOS/n"..., 1321) = 1321 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/misc/parsoid.nix", {st_mode=S_IFREG|0444, st_size=2148, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/misc/parsoid.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=2148, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.services.parsoid;\n\n confTree = {\n worker_heartbeat_timeout = 300000;\n logging = { level = \"info\"; };\n services = [{\n module = \"lib/index.js\";\n entrypoint = \"apiServiceWorker\";\n conf = {\n mwApis = map (x: if i"..., 2148) = 2148 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/misc/phd.nix", {st_mode=S_IFREG|0444, st_size=839, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/misc/phd.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=839, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.services.phd;\n\nin\n\n{\n\n ###### interface\n\n options = {\n\n services.phd = {\n\n enable = mkOption {\n default = false;\n description = \"\n Enable daemons for phabricator.\n \";\n };\n\n };\n\n };\n\n ###### "..., 839) = 839 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/misc/plex.nix", {st_mode=S_IFREG|0444, st_size=5763, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/misc/plex.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=5763, ...}) = 0 | |
read(3, "{ config, pkgs, lib, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.plex;\n plex = pkgs.plex;\nin\n{\n options = {\n services.plex = {\n enable = mkEnableOption \"Plex Media Server\";\n\n # FIXME: In order for this config option to work, symlinks in the Plex\n # package in the Nix store hav"..., 5763) = 5763 | |
close(3) = 0 | |
brk(0x193bb000) = 0x193bb000 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/misc/plexpy.nix", {st_mode=S_IFREG|0444, st_size=2148, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/misc/plexpy.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=2148, ...}) = 0 | |
read(3, "{ config, pkgs, lib, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.plexpy;\nin\n{\n options = {\n services.plexpy = {\n enable = mkEnableOption \"PlexPy Plex Monitor\";\n\n dataDir = mkOption {\n type = types.str;\n default = \"/var/lib/plexpy\";\n description = \"The directory "..., 2148) = 2148 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/misc/pykms.nix", {st_mode=S_IFREG|0444, st_size=2123, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/misc/pykms.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=2123, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.pykms;\n\n home = \"/var/lib/pykms\";\n\n services = {\n serviceConfig = {\n Restart = \"on-failure\";\n RestartSec = \"10s\";\n StartLimitInterval = \"1min\";\n PrivateTmp = true;\n ProtectSystem = \"full\";\n Protect"..., 2123) = 2123 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/misc/radarr.nix", {st_mode=S_IFREG|0444, st_size=1049, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/misc/radarr.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=1049, ...}) = 0 | |
read(3, "{ config, pkgs, lib, mono, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.radarr;\nin\n{\n options = {\n services.radarr = {\n enable = mkEnableOption \"Radarr\";\n };\n };\n\n config = mkIf cfg.enable {\n systemd.services.radarr = {\n description = \"Radarr\";\n after = [ \"network.target"..., 1049) = 1049 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/misc/redmine.nix", {st_mode=S_IFREG|0444, st_size=6609, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/misc/redmine.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=6609, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\n# TODO: support non-postgresql\n\nwith lib;\n\nlet\n cfg = config.services.redmine;\n\n ruby = pkgs.ruby;\n\n databaseYml = ''\n production:\n adapter: postgresql\n database: ${cfg.databaseName}\n host: ${cfg.databaseHost}\n password: ${cfg.databasePassword}\n"..., 6609) = 6609 | |
close(3) = 0 | |
brk(0x193dc000) = 0x193dc000 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/misc/rippled.nix", {st_mode=S_IFREG|0444, st_size=10552, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/misc/rippled.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=10552, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.rippled;\n\n b2i = val: if val then \"1\" else \"0\";\n\n dbCfg = db: ''\n type=${db.type}\n path=${db.path}\n ${optionalString (db.compression != null) (\"compression=${b2i db.compression}\") }\n ${optionalString (db.onlineDelete !"..., 10552) = 10552 | |
close(3) = 0 | |
brk(0x193fd000) = 0x193fd000 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/misc/ripple-data-api.nix", {st_mode=S_IFREG|0444, st_size=5339, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/misc/ripple-data-api.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=5339, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.rippleDataApi;\n\n deployment_env_config = builtins.toJSON {\n production = {\n port = toString cfg.port;\n maxSockets = 150;\n batchSize = 100;\n startIndex = 32570;\n rippleds = cfg.rippleds;\n redis = {\n "..., 5339) = 5339 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/misc/rogue.nix", {st_mode=S_IFREG|0444, st_size=1160, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/misc/rogue.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=1160, ...}) = 0 | |
read(3, "# Execute the game `rogue' on tty 9. Mostly used by the NixOS\n# installation CD.\n\n{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.services.rogue;\n\nin\n\n{\n ###### interface\n\n options = {\n\n services.rogue.enable = mkOption {\n type = types.bool;\n default = false;\n descri"..., 1160) = 1160 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/misc/siproxd.nix", {st_mode=S_IFREG|0444, st_size=4560, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/misc/siproxd.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=4560, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.services.siproxd;\n\n conf = ''\n daemonize = 0\n rtp_proxy_enable = 1\n user = siproxd\n if_inbound = ${cfg.ifInbound}\n if_outbound = ${cfg.ifOutbound}\n sip_listen_port = ${toString cfg.sipListenPort}\n rtp_port_low = ${"..., 4560) = 4560 | |
close(3) = 0 | |
brk(0x1941e000) = 0x1941e000 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/misc/snapper.nix", {st_mode=S_IFREG|0444, st_size=3968, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/misc/snapper.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=3968, ...}) = 0 | |
read(3, "{ config, pkgs, lib, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.snapper;\nin\n\n{\n options.services.snapper = {\n\n snapshotInterval = mkOption {\n type = types.str;\n default = \"hourly\";\n description = ''\n Snapshot interval.\n\n The format is described in\n <citere"..., 3968) = 3968 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/misc/sonarr.nix", {st_mode=S_IFREG|0444, st_size=1064, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/misc/sonarr.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=1064, ...}) = 0 | |
read(3, "{ config, pkgs, lib, mono, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.sonarr;\nin\n{\n options = {\n services.sonarr = {\n enable = mkEnableOption \"Sonarr\";\n };\n };\n\n config = mkIf cfg.enable {\n systemd.services.sonarr = {\n description = \"Sonarr\";\n after = [ \"network.target"..., 1064) = 1064 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/misc/spice-vdagentd.nix", {st_mode=S_IFREG|0444, st_size=631, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/misc/spice-vdagentd.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=631, ...}) = 0 | |
read(3, "{ config, pkgs, lib, ... }:\n\nwith lib;\nlet\n cfg = config.services.spice-vdagentd;\nin\n{\n options = {\n services.spice-vdagentd = {\n enable = mkEnableOption \"Spice guest vdagent daemon\";\n };\n };\n\n config = mkIf cfg.enable {\n\n environment.systemPackages = [ pkgs.spice-vdagent ];\n\n s"..., 631) = 631 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/misc/ssm-agent.nix", {st_mode=S_IFREG|0444, st_size=1233, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/misc/ssm-agent.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=1233, ...}) = 0 | |
read(3, "{ config, pkgs, lib, ... }:\n\nwith lib;\nlet\n cfg = config.services.ssm-agent;\n\n # The SSM agent doesn't pay attention to our /etc/os-release yet, and the lsb-release tool\n # in nixpkgs doesn't seem to work properly on NixOS, so let's just fake the two fields SSM\n # looks for. See https://github.c"..., 1233) = 1233 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/misc/sssd.nix", {st_mode=S_IFREG|0444, st_size=3024, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/misc/sssd.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=3024, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\nwith lib;\nlet\n cfg = config.services.sssd;\n nscd = config.services.nscd;\nin {\n options = {\n services.sssd = {\n enable = mkEnableOption \"the System Security Services Daemon.\";\n\n config = mkOption {\n type = types.lines;\n description = \"Contents"..., 3024) = 3024 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/misc/subsonic.nix", {st_mode=S_IFREG|0444, st_size=5292, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/misc/subsonic.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=5292, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet cfg = config.services.subsonic; in {\n options = {\n services.subsonic = {\n enable = mkEnableOption \"Subsonic daemon\";\n\n home = mkOption {\n type = types.path;\n default = \"/var/lib/subsonic\";\n description = ''\n The "..., 5292) = 5292 | |
close(3) = 0 | |
brk(0x1943f000) = 0x1943f000 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/misc/sundtek.nix", {st_mode=S_IFREG|0444, st_size=709, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/misc/sundtek.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=709, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.sundtek;\n\nin\n{\n options.services.sundtek = {\n enable = mkEnableOption \"Sundtek driver\";\n };\n\n config = mkIf cfg.enable {\n\n environment.systemPackages = [ pkgs.sundtek ];\n\n systemd.services.sundtek = {\n description ="..., 709) = 709 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/misc/svnserve.nix", {st_mode=S_IFREG|0444, st_size=849, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/misc/svnserve.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=849, ...}) = 0 | |
read(3, "# SVN server\n{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.services.svnserve;\n\nin\n\n{\n\n ###### interface\n\n options = {\n\n services.svnserve = {\n\n enable = mkOption {\n default = false;\n description = \"Whether to enable svnserve to serve Subversion repositories thro"..., 849) = 849 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/misc/synergy.nix", {st_mode=S_IFREG|0444, st_size=3465, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/misc/synergy.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=3465, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n cfgC = config.services.synergy.client;\n cfgS = config.services.synergy.server;\n\nin\n\n{\n ###### interface\n\n options = {\n\n services.synergy = {\n\n # !!! All these option descriptions needs to be cleaned up.\n\n client = {\n enable = mkOp"..., 3465) = 3465 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/misc/taskserver", {st_mode=S_IFDIR|0555, st_size=5, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/misc/taskserver/default.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=18295, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.taskserver;\n\n taskd = \"${pkgs.taskserver}/bin/taskd\";\n\n mkVal = val:\n if val == true then \"true\"\n else if val == false then \"false\"\n else if isList val then concatStringsSep \", \" val\n else toString val;\n\n mkConfLine ="..., 18295) = 18295 | |
close(3) = 0 | |
brk(0x19460000) = 0x19460000 | |
mmap(NULL, 212992, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) = 0x76ffc6c63000 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/misc/tzupdate.nix", {st_mode=S_IFREG|0444, st_size=1478, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/misc/tzupdate.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=1478, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.tzupdate;\nin {\n options.services.tzupdate = {\n enable = mkOption {\n type = types.bool;\n default = false;\n description = ''\n Enable the tzupdate timezone updating service. This provides\n a one-shot se"..., 1478) = 1478 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/misc/uhub.nix", {st_mode=S_IFREG|0444, st_size=5473, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/misc/uhub.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=5473, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.services.uhub;\n\n uhubPkg = pkgs.uhub.override { tlsSupport = cfg.enableTLS; };\n\n pluginConfig = \"\"\n + optionalString cfg.plugins.authSqlite.enable ''\n plugin ${uhubPkg.mod_auth_sqlite}/mod_auth_sqlite.so \"file=${cfg.plugins.authSqlite"..., 5473) = 5473 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/misc/xmr-stak.nix", {st_mode=S_IFREG|0444, st_size=2100, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/misc/xmr-stak.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=2100, ...}) = 0 | |
read(3, "{ lib, config, pkgs, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.services.xmr-stak;\n\n pkg = pkgs.xmr-stak.override {\n inherit (cfg) openclSupport cudaSupport;\n };\n\n xmrConfArg = optionalString (cfg.configText != \"\") (\"-c \" +\n pkgs.writeText \"xmr-stak-config.txt\" cfg.configText);\n\nin\n\n{\n options"..., 2100) = 2100 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/misc/zookeeper.nix", {st_mode=S_IFREG|0444, st_size=4218, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/misc/zookeeper.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=4218, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.zookeeper;\n\n zookeeperConfig = ''\n dataDir=${cfg.dataDir}\n clientPort=${toString cfg.port}\n autopurge.purgeInterval=${toString cfg.purgeInterval}\n ${cfg.extraConf}\n ${cfg.servers}\n '';\n\n configDir = pkgs.buildEnv {"..., 4218) = 4218 | |
close(3) = 0 | |
brk(0x19481000) = 0x19481000 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/monitoring/apcupsd.nix", {st_mode=S_IFREG|0444, st_size=6287, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/monitoring/apcupsd.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=6287, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.apcupsd;\n\n configFile = pkgs.writeText \"apcupsd.conf\" ''\n ## apcupsd.conf v1.1 ##\n # apcupsd complains if the first line is not like above.\n ${cfg.configText}\n SCRIPTDIR ${toString scriptDir}\n '';\n\n # List of events f"..., 6287) = 6287 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/monitoring/arbtt.nix", {st_mode=S_IFREG|0444, st_size=1551, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/monitoring/arbtt.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=1551, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.arbtt;\nin {\n options = {\n services.arbtt = {\n enable = mkOption {\n type = types.bool;\n default = false;\n description = ''\n Enable the arbtt statistics capture service.\n '';\n };\n\n "..., 1551) = 1551 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/monitoring/bosun.nix", {st_mode=S_IFREG|0444, st_size=3982, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/monitoring/bosun.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=3982, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.bosun;\n\n configFile = pkgs.writeText \"bosun.conf\" ''\n ${optionalString (cfg.opentsdbHost !=null) \"tsdbHost = ${cfg.opentsdbHost}\"}\n ${optionalString (cfg.influxHost !=null) \"influxHost = ${cfg.influxHost}\"}\n httpListen = $"..., 3982) = 3982 | |
close(3) = 0 | |
brk(0x194a2000) = 0x194a2000 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/monitoring/cadvisor.nix", {st_mode=S_IFREG|0444, st_size=4148, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/monitoring/cadvisor.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=4148, ...}) = 0 | |
read(3, "{ config, pkgs, lib, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.cadvisor;\n\nin {\n options = {\n services.cadvisor = {\n enable = mkOption {\n default = false;\n type = types.bool;\n description = \"Whether to enable cadvisor service.\";\n };\n\n listenAddress = mkOpt"..., 4148) = 4148 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/monitoring/collectd.nix", {st_mode=S_IFREG|0444, st_size=2141, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/monitoring/collectd.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=2141, ...}) = 0 | |
read(3, "{ config, pkgs, lib, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.collectd;\n\n conf = pkgs.writeText \"collectd.conf\" ''\n BaseDir \"${cfg.dataDir}\"\n AutoLoadPlugin ${boolToString cfg.autoLoadPlugin}\n Hostname \"${config.networking.hostName}\"\n\n LoadPlugin syslog\n <Plugin \"syslog\">\n "..., 2141) = 2141 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/monitoring/das_watchdog.nix", {st_mode=S_IFREG|0444, st_size=877, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/monitoring/das_watchdog.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=877, ...}) = 0 | |
read(3, "# A general watchdog for the linux operating system that should run in the\n# background at all times to ensure a realtime process won't hang the machine\n{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n inherit (pkgs) das_watchdog;\n\nin {\n ###### interface\n\n options = {\n services.das_watchdog.enabl"..., 877) = 877 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/monitoring/dd-agent/dd-agent.nix", {st_mode=S_IFREG|0444, st_size=7069, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/monitoring/dd-agent/dd-agent.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=7069, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.dd-agent;\n\n ddConf = pkgs.writeText \"datadog.conf\" ''\n [Main]\n dd_url: https://app.datadoghq.com\n skip_ssl_validation: no\n api_key: ${cfg.api_key}\n ${optionalString (cfg.hostname != null) \"hostname: ${cfg.hostname}\"}"..., 7069) = 7069 | |
close(3) = 0 | |
brk(0x194c3000) = 0x194c3000 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/monitoring/fusion-inventory.nix", {st_mode=S_IFREG|0444, st_size=1268, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/monitoring/fusion-inventory.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=1268, ...}) = 0 | |
read(3, "# Fusion Inventory daemon.\n{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.fusionInventory;\n\n configFile = pkgs.writeText \"fusion_inventory.conf\" ''\n server = ${concatStringsSep \", \" cfg.servers}\n\n logger = stderr\n\n ${cfg.extraConfig}\n '';\n\nin {\n\n ###### interface\n\n "..., 1268) = 1268 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/monitoring/grafana.nix", {st_mode=S_IFREG|0444, st_size=7214, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/monitoring/grafana.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=7214, ...}) = 0 | |
read(3, "{ options, config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.grafana;\n\n envOptions = {\n PATHS_DATA = cfg.dataDir;\n PATHS_PLUGINS = \"${cfg.dataDir}/plugins\";\n PATHS_LOGS = \"${cfg.dataDir}/log\";\n\n SERVER_PROTOCOL = cfg.protocol;\n SERVER_HTTP_ADDR = cfg.addr;\n SERVER_"..., 7214) = 7214 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/monitoring/graphite.nix", {st_mode=S_IFREG|0444, st_size=20602, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/monitoring/graphite.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=20602, ...}) = 0 | |
brk(0x194e5000) = 0x194e5000 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.graphite;\n writeTextOrNull = f: t: mapNullable (pkgs.writeTextDir f) t;\n\n dataDir = cfg.dataDir;\n staticDir = cfg.dataDir + \"/static\";\n\n graphiteLocalSettingsDir = pkgs.runCommand \"graphite_local_settings\"\n {inherit graphiteL"..., 20602) = 20602 | |
close(3) = 0 | |
brk(0x19506000) = 0x19506000 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/monitoring/hdaps.nix", {st_mode=S_IFREG|0444, st_size=423, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/monitoring/hdaps.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=423, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.hdapsd;\n hdapsd = [ pkgs.hdapsd ];\nin\n{\n options = {\n services.hdapsd.enable = mkEnableOption\n ''\n Hard Drive Active Protection System Daemon,\n devices are detected and managed automatically by udev and syste"..., 423) = 423 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/monitoring/heapster.nix", {st_mode=S_IFREG|0444, st_size=1372, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/monitoring/heapster.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=1372, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.heapster;\nin {\n options.services.heapster = {\n enable = mkOption {\n description = \"Whether to enable heapster monitoring\";\n default = false;\n type = types.bool;\n };\n\n source = mkOption {\n description = "..., 1372) = 1372 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/monitoring/longview.nix", {st_mode=S_IFREG|0444, st_size=5092, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/monitoring/longview.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=5092, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.longview;\n\n runDir = \"/run/longview\";\n configsDir = \"${runDir}/longview.d\";\n\nin {\n options = {\n\n services.longview = {\n\n enable = mkOption {\n type = types.bool;\n default = false;\n description = ''\n "..., 5092) = 5092 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/monitoring/monit.nix", {st_mode=S_IFREG|0444, st_size=1218, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/monitoring/monit.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=1218, ...}) = 0 | |
read(3, "# Monit system watcher\n# http://mmonit.org/monit/\n\n{config, pkgs, lib, ...}:\n\nlet inherit (lib) mkOption mkIf;\nin\n\n{\n options = {\n services.monit = {\n enable = mkOption {\n default = false;\n description = ''\n Whether to run Monit system watcher.\n '';\n };\n "..., 1218) = 1218 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/monitoring/munin.nix", {st_mode=S_IFREG|0444, st_size=6179, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/monitoring/munin.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=6179, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\n# TODO: support munin-async\n# TODO: LWP/Pg perl libs aren't recognized\n\n# TODO: support fastcgi\n# http://munin-monitoring.org/wiki/CgiHowto2\n# spawn-fcgi -s /var/run/munin/fastcgi-graph.sock -U www-data -u munin -g munin /usr/lib/munin/cgi/munin-cgi-graph\n# spawn-fcgi "..., 6179) = 6179 | |
brk(0x19527000) = 0x19527000 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/monitoring/nagios.nix", {st_mode=S_IFREG|0444, st_size=5346, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/monitoring/nagios.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=5346, ...}) = 0 | |
read(3, "# Nagios system/network monitoring daemon.\n{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.nagios;\n\n nagiosState = \"/var/lib/nagios\";\n nagiosLogDir = \"/var/log/nagios\";\n\n nagiosObjectDefs = cfg.objectDefs;\n\n nagiosObjectDefsDir = pkgs.runCommand \"nagios-objects\" {inherit nagi"..., 5346) = 5346 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/monitoring/netdata.nix", {st_mode=S_IFREG|0444, st_size=3130, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/monitoring/netdata.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=3130, ...}) = 0 | |
read(3, "{ config, pkgs, lib, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.netdata;\n\n wrappedPlugins = pkgs.runCommand \"wrapped-plugins\" {} ''\n mkdir -p $out/libexec/netdata/plugins.d\n ln -s /run/wrappers/bin/apps.plugin $out/libexec/netdata/plugins.d/apps.plugin\n '';\n\n localConfig = {\n global "..., 3130) = 3130 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/monitoring/osquery.nix", {st_mode=S_IFREG|0444, st_size=2310, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/monitoring/osquery.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=2310, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith builtins;\nwith lib;\n\nlet\n cfg = config.services.osquery;\n\nin\n\n{\n\n options = {\n\n services.osquery = {\n\n enable = mkEnableOption \"osquery\";\n\n loggerPath = mkOption {\n type = types.path;\n description = \"Base directory used for logging.\";\n "..., 2310) = 2310 | |
close(3) = 0 | |
brk(0x19548000) = 0x19548000 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/monitoring/prometheus/default.nix", {st_mode=S_IFREG|0444, st_size=14056, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/monitoring/prometheus/default.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=14056, ...}) = 0 | |
read(3, "{ config, pkgs, lib, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.prometheus;\n promUser = \"prometheus\";\n promGroup = \"prometheus\";\n\n # Get a submodule without any embedded metadata:\n _filter = x: filterAttrs (k: v: k != \"_module\") x;\n\n # Pretty-print JSON to a file\n writePrettyJSON = name: x"..., 14056) = 14056 | |
close(3) = 0 | |
brk(0x19569000) = 0x19569000 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/monitoring/prometheus/alertmanager.nix", {st_mode=S_IFREG|0444, st_size=3833, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/monitoring/prometheus/alertmanager.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=3833, ...}) = 0 | |
read(3, "{ config, pkgs, lib, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.prometheus.alertmanager;\n mkConfigFile = pkgs.writeText \"alertmanager.yml\" (builtins.toJSON cfg.configuration);\n alertmanagerYml =\n if cfg.configText != null then\n pkgs.writeText \"alertmanager.yml\" cfg.configText\n else "..., 3833) = 3833 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/monitoring/prometheus/blackbox-exporter.nix", {st_mode=S_IFREG|0444, st_size=1838, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/monitoring/prometheus/blackbox-exporter.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=1838, ...}) = 0 | |
read(3, "{ config, pkgs, lib, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.prometheus.blackboxExporter;\nin {\n options = {\n services.prometheus.blackboxExporter = {\n enable = mkEnableOption \"prometheus blackbox exporter\";\n\n configFile = mkOption {\n type = types.path;\n description"..., 1838) = 1838 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/monitoring/prometheus/collectd-exporter.nix", {st_mode=S_IFREG|0444, st_size=3924, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/monitoring/prometheus/collectd-exporter.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=3924, ...}) = 0 | |
read(3, "{ config, pkgs, lib, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.prometheus.collectdExporter;\n\n collectSettingsArgs = if (cfg.collectdBinary.enable) then ''\n -collectd.listen-address ${optionalString (cfg.collectdBinary.listenAddress != null) cfg.collectdBinary.listenAddress}:${toString cfg.c"..., 3924) = 3924 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/monitoring/prometheus/fritzbox-exporter.nix", {st_mode=S_IFREG|0444, st_size=1986, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/monitoring/prometheus/fritzbox-exporter.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=1986, ...}) = 0 | |
read(3, "{ config, pkgs, lib, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.prometheus.fritzboxExporter;\nin {\n options = {\n services.prometheus.fritzboxExporter = {\n enable = mkEnableOption \"prometheus fritzbox exporter\";\n\n port = mkOption {\n type = types.int;\n default = 9133;\n "..., 1986) = 1986 | |
close(3) = 0 | |
brk(0x1958a000) = 0x1958a000 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/monitoring/prometheus/json-exporter.nix", {st_mode=S_IFREG|0444, st_size=1872, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/monitoring/prometheus/json-exporter.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=1872, ...}) = 0 | |
read(3, "{ config, pkgs, lib, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.prometheus.jsonExporter;\nin {\n options = {\n services.prometheus.jsonExporter = {\n enable = mkEnableOption \"prometheus JSON exporter\";\n\n url = mkOption {\n type = types.str;\n description = ''\n URL "..., 1872) = 1872 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/monitoring/prometheus/minio-exporter.nix", {st_mode=S_IFREG|0444, st_size=3867, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/monitoring/prometheus/minio-exporter.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=3867, ...}) = 0 | |
read(3, "{ config, pkgs, lib, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.prometheus.minioExporter;\nin {\n options = {\n services.prometheus.minioExporter = {\n enable = mkEnableOption \"prometheus minio exporter\";\n\n port = mkOption {\n type = types.int;\n default = 9290;\n des"..., 3867) = 3867 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/monitoring/prometheus/nginx-exporter.nix", {st_mode=S_IFREG|0444, st_size=2124, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/monitoring/prometheus/nginx-exporter.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=2124, ...}) = 0 | |
read(3, "{ config, pkgs, lib, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.prometheus.nginxExporter;\nin {\n options = {\n services.prometheus.nginxExporter = {\n enable = mkEnableOption \"prometheus nginx exporter\";\n\n port = mkOption {\n type = types.int;\n default = 9113;\n des"..., 2124) = 2124 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/monitoring/prometheus/node-exporter.nix", {st_mode=S_IFREG|0444, st_size=2439, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/monitoring/prometheus/node-exporter.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=2439, ...}) = 0 | |
read(3, "{ config, pkgs, lib, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.prometheus.nodeExporter;\nin {\n options = {\n services.prometheus.nodeExporter = {\n enable = mkEnableOption \"prometheus node exporter\";\n\n port = mkOption {\n type = types.int;\n default = 9100;\n descri"..., 2439) = 2439 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/monitoring/prometheus/snmp-exporter.nix", {st_mode=S_IFREG|0444, st_size=3436, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/monitoring/prometheus/snmp-exporter.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=3436, ...}) = 0 | |
read(3, "{ config, pkgs, lib, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.prometheus.snmpExporter;\n mkConfigFile = pkgs.writeText \"snmp.yml\" (if cfg.configurationPath == null then builtins.toJSON cfg.configuration else builtins.readFile cfg.configurationPath);\nin {\n options = {\n services.prometheus.s"..., 3436) = 3436 | |
close(3) = 0 | |
brk(0x195ab000) = 0x195ab000 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/monitoring/prometheus/unifi-exporter.nix", {st_mode=S_IFREG|0444, st_size=2898, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/monitoring/prometheus/unifi-exporter.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=2898, ...}) = 0 | |
read(3, "{ config, pkgs, lib, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.prometheus.unifiExporter;\nin {\n options = {\n services.prometheus.unifiExporter = {\n enable = mkEnableOption \"prometheus unifi exporter\";\n\n port = mkOption {\n type = types.int;\n default = 9130;\n des"..., 2898) = 2898 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/monitoring/prometheus/varnish-exporter.nix", {st_mode=S_IFREG|0444, st_size=1671, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/monitoring/prometheus/varnish-exporter.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=1671, ...}) = 0 | |
read(3, "{ config, pkgs, lib, ... }:\n\n# Shamelessly cribbed from nginx-exporter.nix. ~ C.\nwith lib;\n\nlet\n cfg = config.services.prometheus.varnishExporter;\nin {\n options = {\n services.prometheus.varnishExporter = {\n enable = mkEnableOption \"prometheus Varnish exporter\";\n\n port = mkOption {\n "..., 1671) = 1671 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/monitoring/riemann.nix", {st_mode=S_IFREG|0444, st_size=2185, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/monitoring/riemann.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=2185, ...}) = 0 | |
read(3, "{ config, pkgs, lib, ... }:\n\nwith pkgs;\nwith lib;\n\nlet\n\n cfg = config.services.riemann;\n\n classpath = concatStringsSep \":\" (\n cfg.extraClasspathEntries ++ [ \"${riemann}/share/java/riemann.jar\" ]\n );\n\n riemannConfig = concatStringsSep \"\\n\" (\n [cfg.config] ++ (map (f: ''(load-file \"${f}\")'')"..., 2185) = 2185 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/monitoring/riemann-dash.nix", {st_mode=S_IFREG|0444, st_size=1873, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/monitoring/riemann-dash.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=1873, ...}) = 0 | |
read(3, "{ config, pkgs, lib, ... }:\n\nwith pkgs;\nwith lib;\n\nlet\n\n cfg = config.services.riemann-dash;\n\n conf = writeText \"config.rb\" ''\n riemann_base = \"${cfg.dataDir}\"\n config.store[:ws_config] = \"#{riemann_base}/config/config.json\"\n ${cfg.config}\n '';\n\n launcher = writeScriptBin \"riemann-dash\""..., 1873) = 1873 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/monitoring/riemann-tools.nix", {st_mode=S_IFREG|0444, st_size=1283, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/monitoring/riemann-tools.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=1283, ...}) = 0 | |
read(3, "{ config, pkgs, lib, ... }:\n\nwith pkgs;\nwith lib;\n\nlet\n\n cfg = config.services.riemann-tools;\n\n riemannHost = \"${cfg.riemannHost}\";\n\n healthLauncher = writeScriptBin \"riemann-health\" ''\n #!/bin/sh\n exec ${pkgs.riemann-tools}/bin/riemann-health --host ${riemannHost}\n '';\n\n\nin {\n\n options ="..., 1283) = 1283 | |
close(3) = 0 | |
brk(0x195cc000) = 0x195cc000 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/monitoring/scollector.nix", {st_mode=S_IFREG|0444, st_size=3294, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/monitoring/scollector.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=3294, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.scollector;\n\n collectors = pkgs.runCommand \"collectors\" {}\n ''\n mkdir -p $out\n ${lib.concatStringsSep\n \"\\n\"\n (lib.mapAttrsToList\n (frequency: binaries:\n \"mkdir -p $out/${frequency}\\n\" +\n "..., 3294) = 3294 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/monitoring/smartd.nix", {st_mode=S_IFREG|0444, st_size=6725, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/monitoring/smartd.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=6725, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n host = config.networking.hostName or \"unknown\"\n + optionalString (config.networking.domain != null) \".${config.networking.domain}\";\n\n cfg = config.services.smartd;\n\n nm = cfg.notifications.mail;\n nw = cfg.notifications.wall;\n nx = cfg.notifica"..., 6725) = 6725 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/monitoring/statsd.nix", {st_mode=S_IFREG|0444, st_size=3713, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/monitoring/statsd.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=3713, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.services.statsd;\n\n isBuiltinBackend = name:\n builtins.elem name [ \"graphite\" \"console\" \"repeater\" ];\n\n backendsToPackages = let\n mkMap = list: name:\n if isBuiltinBackend name then list\n else list ++ [ pkgs.nodePackages.${n"..., 3713) = 3713 | |
close(3) = 0 | |
brk(0x195ed000) = 0x195ed000 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/monitoring/sysstat.nix", {st_mode=S_IFREG|0444, st_size=2077, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/monitoring/sysstat.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=2077, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\nwith lib;\nlet\n cfg = config.services.sysstat;\nin {\n options = {\n services.sysstat = {\n enable = mkOption {\n type = types.bool;\n default = false;\n description = ''\n Whether to enable sar system activity collection.\n '';\n "..., 2077) = 2077 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/monitoring/systemhealth.nix", {st_mode=S_IFREG|0444, st_size=3326, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/monitoring/systemhealth.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=3326, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.systemhealth;\n\n systemhealth = with pkgs; stdenv.mkDerivation {\n name = \"systemhealth-1.0\";\n src = fetchurl {\n url = \"http://www.brianlane.com/static/downloads/systemhealth/systemhealth-1.0.tar.bz2\";\n sha256 = \"1q69"..., 3326) = 3326 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/monitoring/teamviewer.nix", {st_mode=S_IFREG|0444, st_size=937, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/monitoring/teamviewer.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=937, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.services.teamviewer;\n\nin\n\n{\n\n ###### interface\n\n options = {\n\n services.teamviewer.enable = mkEnableOption \"TeamViewer daemon\";\n \n };\n\n ###### implementation\n\n config = mkIf (cfg.enable) {\n\n environment.systemPackages = [ pk"..., 937) = 937 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/monitoring/telegraf.nix", {st_mode=S_IFREG|0444, st_size=1739, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/monitoring/telegraf.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=1739, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.telegraf;\n\n configFile = pkgs.runCommand \"config.toml\" {\n buildInputs = [ pkgs.remarshal ];\n } ''\n remarshal -if json -of toml \\\n < ${pkgs.writeText \"config.json\" (builtins.toJSON cfg.extraConfig)} \\\n > $out\n '';\n"..., 1739) = 1739 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/monitoring/ups.nix", {st_mode=S_IFREG|0444, st_size=7988, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/monitoring/ups.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=7988, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\n# TODO: This is not secure, have a look at the file docs/security.txt inside\n# the project sources.\nwith lib;\n\nlet\n cfg = config.power.ups;\nin\n\nlet\n upsOptions = {name, config, ...}:\n {\n options = {\n # This can be infered from the UPS model by looking at\n "..., 7988) = 7988 | |
close(3) = 0 | |
brk(0x1960e000) = 0x1960e000 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/monitoring/uptime.nix", {st_mode=S_IFREG|0444, st_size=3268, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/monitoring/uptime.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=3268, ...}) = 0 | |
read(3, "{ config, pkgs, lib, ... }:\nlet\n inherit (lib) mkOption mkEnableOption mkIf mkMerge types optionalAttrs optional;\n\n cfg = config.services.uptime;\n\n configDir = pkgs.runCommand \"config\" {} (if cfg.configFile != null then ''\n mkdir $out\n ext=`echo ${cfg.configFile} | grep -o \\\\..*`\n ln -sv"..., 3268) = 3268 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/monitoring/vnstat.nix", {st_mode=S_IFREG|0444, st_size=1100, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/monitoring/vnstat.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=1100, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.vnstat;\nin {\n options.services.vnstat = {\n enable = mkOption {\n type = types.bool;\n default = false;\n description = ''\n Whether to enable update of network usage statistics via vnstatd.\n '';\n };\n }"..., 1100) = 1100 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/monitoring/zabbix-agent.nix", {st_mode=S_IFREG|0444, st_size=2061, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/monitoring/zabbix-agent.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=2061, ...}) = 0 | |
read(3, "# Zabbix agent daemon.\n{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.services.zabbixAgent;\n\n stateDir = \"/var/run/zabbix\";\n\n logDir = \"/var/log/zabbix\";\n\n pidFile = \"${stateDir}/zabbix_agentd.pid\";\n\n configFile = pkgs.writeText \"zabbix_agentd.conf\"\n ''\n Server = ${cfg.serve"..., 2061) = 2061 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/monitoring/zabbix-server.nix", {st_mode=S_IFREG|0444, st_size=3353, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/monitoring/zabbix-server.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=3353, ...}) = 0 | |
read(3, "# Zabbix server daemon.\n{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.services.zabbixServer;\n\n stateDir = \"/var/run/zabbix\";\n\n logDir = \"/var/log/zabbix\";\n\n libDir = \"/var/lib/zabbix\";\n\n pidFile = \"${stateDir}/zabbix_server.pid\";\n\n configFile = pkgs.writeText \"zabbix_server.conf\"\n"..., 3353) = 3353 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/network-filesystems/beegfs.nix", {st_mode=S_IFREG|0444, st_size=10983, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/network-filesystems/beegfs.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=10983, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ...} :\n\nwith lib;\n\nlet\n cfg = config.services.beegfs;\n\n # functions for the generations of config files\n\n configMgmtd = name: cfg: pkgs.writeText \"mgmt-${name}.conf\" ''\n storeMgmtdDirectory = ${cfg.mgmtd.storeDir}\n storeAllowFirstRunInit = false\n connAuthFile = ${cfg"..., 10983) = 10983 | |
brk(0x19630000) = 0x19630000 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/network-filesystems/cachefilesd.nix", {st_mode=S_IFREG|0444, st_size=1259, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/network-filesystems/cachefilesd.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=1259, ...}) = 0 | |
read(3, "{ config, pkgs, lib, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.services.cachefilesd;\n\n cfgFile = pkgs.writeText \"cachefilesd.conf\" ''\n dir ${cfg.cacheDir}\n ${cfg.extraConfig}\n '';\n\nin\n\n{\n options = {\n services.cachefilesd = {\n\n enable = mkOption {\n type = types.bool;\n def"..., 1259) = 1259 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/network-filesystems/davfs2.nix", {st_mode=S_IFREG|0444, st_size=1772, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/network-filesystems/davfs2.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=1772, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.davfs2;\n cfgFile = pkgs.writeText \"davfs2.conf\" ''\n dav_user ${cfg.davUser}\n dav_group ${cfg.davGroup}\n ${cfg.extraConfig}\n '';\nin\n{\n options.services.davfs2 = {\n enable = mkOption {\n type = types.bool;\n def"..., 1772) = 1772 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/network-filesystems/drbd.nix", {st_mode=S_IFREG|0444, st_size=1399, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/network-filesystems/drbd.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=1399, ...}) = 0 | |
read(3, "# Support for DRBD, the Distributed Replicated Block Device.\n\n{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet cfg = config.services.drbd; in\n\n{\n\n ###### interface\n\n options = {\n\n services.drbd.enable = mkOption {\n default = false;\n type = types.bool;\n description = ''\n Whether"..., 1399) = 1399 | |
close(3) = 0 | |
brk(0x19651000) = 0x19651000 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/network-filesystems/glusterfs.nix", {st_mode=S_IFREG|0444, st_size=6536, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/network-filesystems/glusterfs.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=6536, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n inherit (pkgs) glusterfs rsync;\n\n tlsCmd = if (cfg.tlsSettings != null) then\n ''\n mkdir -p /var/lib/glusterd\n touch /var/lib/glusterd/secure-access\n ''\n else\n ''\n rm -f /var/lib/glusterd/secure-access\n '';\n\n restartTriggers = if (cfg.tlsS"..., 6536) = 6536 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/network-filesystems/kbfs.nix", {st_mode=S_IFREG|0444, st_size=1512, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/network-filesystems/kbfs.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=1512, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\nwith lib;\nlet\n cfg = config.services.kbfs;\n\nin {\n\n ###### interface\n\n options = {\n\n services.kbfs = {\n\n enable = mkOption {\n type = types.bool;\n default = false;\n description = \"Whether to mount the Keybase filesystem.\";\n };\n\n mou"..., 1512) = 1512 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/network-filesystems/ipfs.nix", {st_mode=S_IFREG|0444, st_size=8885, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/network-filesystems/ipfs.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=8885, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\nwith lib;\nlet\n inherit (pkgs) ipfs runCommand makeWrapper;\n\n cfg = config.services.ipfs;\n\n ipfsFlags = toString ([\n (optionalString cfg.autoMount \"--mount\")\n #(optionalString cfg.autoMigrate \"--migrate\")\n (optionalString cf"..., 8885) = 8885 | |
close(3) = 0 | |
brk(0x19672000) = 0x19672000 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/network-filesystems/netatalk.nix", {st_mode=S_IFREG|0444, st_size=3967, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/network-filesystems/netatalk.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=3967, ...}) = 0 | |
read(3, "{ config, pkgs, lib, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.services.netatalk;\n\n extmapFile = pkgs.writeText \"extmap.conf\" cfg.extmap;\n\n afpToString = x: if builtins.typeOf x == \"bool\"\n then boolToString x\n else toString x;\n\n volumeConfig = name:\n let vol = "..., 3967) = 3967 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/network-filesystems/nfsd.nix", {st_mode=S_IFREG|0444, st_size=4275, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/network-filesystems/nfsd.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=4275, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.services.nfs.server;\n\n exports = pkgs.writeText \"exports\" cfg.exports;\n\nin\n\n{\n\n ###### interface\n\n options = {\n\n services.nfs = {\n\n server = {\n enable = mkOption {\n type = types.bool;\n default = false;\n "..., 4275) = 4275 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/network-filesystems/openafs/client.nix", {st_mode=S_IFREG|0444, st_size=7644, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/network-filesystems/openafs/client.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=7644, ...}) = 0 | |
read(3, "{ config, pkgs, lib, ... }:\n\nwith import ./lib.nix { inherit lib; };\n\nlet\n inherit (lib) getBin mkOption mkIf optionalString singleton types;\n\n cfg = config.services.openafsClient;\n\n cellServDB = pkgs.fetchurl {\n url = http://dl.central.org/dl/cellservdb/CellServDB.2017-03-14;\n sha256 = \"11"..., 7644) = 7644 | |
close(3) = 0 | |
brk(0x19693000) = 0x19693000 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/network-filesystems/openafs/server.nix", {st_mode=S_IFREG|0444, st_size=9112, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/network-filesystems/openafs/server.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=9112, ...}) = 0 | |
read(3, "{ config, pkgs, lib, ... }:\n\nwith import ./lib.nix { inherit lib; };\n\nlet\n inherit (lib) concatStringsSep intersperse mapAttrsToList mkForce mkIf mkMerge mkOption optionalString types;\n\n bosConfig = pkgs.writeText \"BosConfig\" (''\n restrictmode 1\n restarttime 16 0 0 0 0\n checkbintime 3 0 5"..., 9112) = 9112 | |
close(3) = 0 | |
brk(0x196b4000) = 0x196b4000 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/network-filesystems/rsyncd.nix", {st_mode=S_IFREG|0444, st_size=3002, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/network-filesystems/rsyncd.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=3002, ...}) = 0 | |
read(3, "{ config, pkgs, lib, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.services.rsyncd;\n\n motdFile = builtins.toFile \"rsyncd-motd\" cfg.motd;\n\n foreach = attrs: f:\n concatStringsSep \"\\n\" (mapAttrsToList f attrs);\n\n cfgFile = ''\n ${optionalString (cfg.motd != \"\") \"motd file = ${motdFile}\"}\n ${optiona"..., 3002) = 3002 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/network-filesystems/samba.nix", {st_mode=S_IFREG|0444, st_size=7393, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/network-filesystems/samba.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=7393, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n smbToString = x: if builtins.typeOf x == \"bool\"\n then boolToString x\n else toString x;\n\n cfg = config.services.samba;\n\n samba = cfg.package;\n\n setupScript =\n ''\n mkdir -p /var/lock/samba /var/log/samba /var"..., 7393) = 7393 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/network-filesystems/tahoe.nix", {st_mode=S_IFREG|0444, st_size=14372, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/network-filesystems/tahoe.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=14372, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\nlet\n cfg = config.services.tahoe;\nin\n {\n options.services.tahoe = {\n introducers = mkOption {\n default = {};\n type = with types; attrsOf (submodule {\n options = {\n nickname = mkOption {\n type = types.str;"..., 14372) = 14372 | |
close(3) = 0 | |
brk(0x196d5000) = 0x196d5000 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/network-filesystems/diod.nix", {st_mode=S_IFREG|0444, st_size=5018, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/network-filesystems/diod.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=5018, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\nwith lib;\nlet\n cfg = config.services.diod;\n\n diodBool = b: if b then \"1\" else \"0\";\n\n diodConfig = pkgs.writeText \"diod.conf\" ''\n allsquash = ${diodBool cfg.allsquash}\n auth_required = ${diodBool cfg.authRequired}\n exportall = ${diodBool cfg.exportall}\n expo"..., 5018) = 5018 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/network-filesystems/u9fs.nix", {st_mode=S_IFREG|0444, st_size=1680, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/network-filesystems/u9fs.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=1680, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.u9fs;\nin\n{\n\n options = {\n\n services.u9fs = {\n\n enable = mkOption {\n type = types.bool;\n default = false;\n description = \"Whether to run the u9fs 9P server for Unix.\";\n };\n\n listenStreams = mkO"..., 1680) = 1680 | |
close(3) = 0 | |
brk(0x196f6000) = 0x196f6000 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/network-filesystems/yandex-disk.nix", {st_mode=S_IFREG|0444, st_size=2448, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/network-filesystems/yandex-disk.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=2448, ...}) = 0 | |
read(3, "{ config, pkgs, lib, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.services.yandex-disk;\n\n dir = \"/var/lib/yandex-disk\";\n\n u = if cfg.user != null then cfg.user else \"yandexdisk\";\n\nin\n\n{\n\n ###### interface\n\n options = {\n\n services.yandex-disk = {\n\n enable = mkOption {\n default = false;\n "..., 2448) = 2448 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/network-filesystems/xtreemfs.nix", {st_mode=S_IFREG|0444, st_size=18407, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/network-filesystems/xtreemfs.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=18407, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.services.xtreemfs;\n\n xtreemfs = pkgs.xtreemfs;\n\n home = cfg.homeDir;\n\n startupScript = class: configPath: pkgs.writeScript \"xtreemfs-osd.sh\" ''\n #! ${pkgs.stdenv.shell}\n JAVA_HOME=\"${pkgs.jdk}\"\n JAVADIR=\"${xtreemfs}/share/java\"\n"..., 18407) = 18407 | |
close(3) = 0 | |
brk(0x19717000) = 0x19717000 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/amuled.nix", {st_mode=S_IFREG|0444, st_size=1562, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/amuled.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=1562, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.amule;\n user = if cfg.user != null then cfg.user else \"amule\";\nin\n\n{\n\n ###### interface\n\n options = {\n\n services.amule = {\n\n enable = mkOption {\n default = false;\n description = ''\n Whether to run t"..., 1562) = 1562 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/aria2.nix", {st_mode=S_IFREG|0444, st_size=4083, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/aria2.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=4083, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.aria2;\n\n homeDir = \"/var/lib/aria2\";\n\n settingsDir = \"${homeDir}\";\n sessionFile = \"${homeDir}/aria2.session\";\n downloadDir = \"${homeDir}/Downloads\";\n\n rangesToStringList = map (x: builtins.toString x.from +\"-\"+ builtins.toStrin"..., 4083) = 4083 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/asterisk.nix", {st_mode=S_IFREG|0444, st_size=8747, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/asterisk.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=8747, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.asterisk;\n\n asteriskUser = \"asterisk\";\n asteriskGroup = \"asterisk\";\n\n varlibdir = \"/var/lib/asterisk\";\n spooldir = \"/var/spool/asterisk\";\n logdir = \"/var/log/asterisk\";\n\n # Add filecontents from files of useTheseDefaultConfFil"..., 8747) = 8747 | |
close(3) = 0 | |
brk(0x19738000) = 0x19738000 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/atftpd.nix", {st_mode=S_IFREG|0444, st_size=1268, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/atftpd.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=1268, ...}) = 0 | |
read(3, "# NixOS module for atftpd TFTP server\n\n{ config, pkgs, lib, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.services.atftpd;\n\nin\n\n{\n\n options = {\n\n services.atftpd = {\n\n enable = mkOption {\n default = false;\n type = types.bool;\n description = ''\n Whether to enable the a"..., 1268) = 1268 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/avahi-daemon.nix", {st_mode=S_IFREG|0444, st_size=7199, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/avahi-daemon.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=7199, ...}) = 0 | |
read(3, "# Avahi daemon.\n{ config, lib, utils, pkgs, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.services.avahi;\n\n yesNo = yes : if yes then \"yes\" else \"no\";\n\n avahiDaemonConf = with cfg; pkgs.writeText \"avahi-daemon.conf\" ''\n [server]\n ${# Users can set `networking.hostName' to the empty string, when get"..., 7199) = 7199 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/babeld.nix", {st_mode=S_IFREG|0444, st_size=2542, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/babeld.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=2542, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.services.babeld;\n\n conditionalBoolToString = value: if (isBool value) then (boolToString value) else (toString value);\n\n paramsString = params:\n concatMapStringsSep \" \" (name: \"${name} ${conditionalBoolToString (getAttr name params)}\")"..., 2542) = 2542 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/bind.nix", {st_mode=S_IFREG|0444, st_size=4952, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/bind.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=4952, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.services.bind;\n\n bindUser = \"named\";\n\n confFile = pkgs.writeText \"named.conf\"\n ''\n include \"/etc/bind/rndc.key\";\n controls {\n inet 127.0.0.1 allow {localhost;} keys {\"rndc-key\";};\n };\n\n acl cachenetworks { ${"..., 4952) = 4952 | |
close(3) = 0 | |
brk(0x19759000) = 0x19759000 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/autossh.nix", {st_mode=S_IFREG|0444, st_size=3210, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/autossh.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=3210, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.services.autossh;\n\nin\n\n{\n\n ###### interface\n\n options = {\n\n services.autossh = {\n\n sessions = mkOption {\n type = types.listOf (types.submodule {\n options = {\n name = mkOption {\n type = types"..., 3210) = 3210 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/bird.nix", {st_mode=S_IFREG|0444, st_size=2519, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/bird.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=2519, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nlet\n inherit (lib) mkEnableOption mkIf mkOption types;\n\n generic = variant:\n let\n cfg = config.services.${variant};\n pkg = pkgs.${variant};\n birdBin = if variant == \"bird6\" then \"bird6\" else \"bird\";\n birdc = if variant == \"bird6\" then \"birdc6\" el"..., 2519) = 2519 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/bitlbee.nix", {st_mode=S_IFREG|0444, st_size=4902, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/bitlbee.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=4902, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.services.bitlbee;\n bitlbeeUid = config.ids.uids.bitlbee;\n\n bitlbeePkg = if cfg.libpurple_plugins == []\n then pkgs.bitlbee\n else pkgs.bitlbee.override { enableLibPurple = true; };\n\n bitlbeeConfig = pkgs.writeText \"bitlbee.conf\"\n ''\n "..., 4902) = 4902 | |
close(3) = 0 | |
brk(0x19769000) = 0x19769000 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/btsync.nix", {st_mode=S_IFREG|0444, st_size=9664, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/btsync.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=9664, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.btsync;\n\n bittorrentSync = cfg.package;\n\n listenAddr = cfg.httpListenAddr + \":\" + (toString cfg.httpListenPort);\n\n optionalEmptyStr = b: v: optionalString (b != \"\") v;\n\n webUIConfig = optionalString cfg.enableWebUI\n ''\n "..., 9664) = 9664 | |
close(3) = 0 | |
brk(0x1978a000) = 0x1978a000 | |
brk(0x1978b000) = 0x1978b000 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/charybdis.nix", {st_mode=S_IFREG|0444, st_size=2542, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/charybdis.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=2542, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nlet\n inherit (lib) mkEnableOption mkIf mkOption singleton types;\n inherit (pkgs) coreutils charybdis;\n cfg = config.services.charybdis;\n\n configFile = pkgs.writeText \"charybdis.conf\" ''\n ${cfg.config}\n '';\nin\n\n{\n\n ###### interface\n\n options = {\n\n services.ch"..., 2542) = 2542 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/chrony.nix", {st_mode=S_IFREG|0444, st_size=3254, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/chrony.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=3254, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n inherit (pkgs) chrony;\n\n stateDir = \"/var/lib/chrony\";\n\n keyFile = \"/etc/chrony.keys\";\n\n cfg = config.services.chrony;\n\n configFile = pkgs.writeText \"chrony.conf\" ''\n ${concatMapStringsSep \"\\n\" (server: \"server \" + server) cfg.servers}\n\n ${opt"..., 3254) = 3254 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/cjdns.nix", {st_mode=S_IFREG|0444, st_size=8552, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/cjdns.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=8552, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n pkg = pkgs.cjdns;\n\n cfg = config.services.cjdns;\n\n connectToSubmodule =\n { options, ... }:\n { options =\n { password = mkOption {\n type = types.str;\n description = \"Authorized password to the opposite end of the tunnel.\";\n };\n "..., 8552) = 8552 | |
close(3) = 0 | |
brk(0x197ad000) = 0x197ad000 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/cntlm.nix", {st_mode=S_IFREG|0444, st_size=3414, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/cntlm.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=3414, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.services.cntlm;\n\n configFile = if cfg.configText != \"\" then\n pkgs.writeText \"cntlm.conf\" ''\n ${cfg.configText}\n ''\n else\n pkgs.writeText \"lighttpd.conf\" ''\n # Cntlm Authentication Proxy Configuration\n Username ${"..., 3414) = 3414 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/connman.nix", {st_mode=S_IFREG|0444, st_size=3340, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/connman.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=3340, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith pkgs;\nwith lib;\n\nlet\n cfg = config.networking.connman;\n configFile = pkgs.writeText \"connman.conf\" ''\n [General]\n NetworkInterfaceBlacklist=${concatStringsSep \",\" cfg.networkInterfaceBlacklist}\n\n ${cfg.extraConfig}\n '';\nin {\n\n ###### interface\n\n option"..., 3340) = 3340 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/consul.nix", {st_mode=S_IFREG|0444, st_size=7319, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/consul.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=7319, ...}) = 0 | |
read(3, "{ config, lib, pkgs, utils, ... }:\n\nwith lib;\nlet\n\n dataDir = \"/var/lib/consul\";\n cfg = config.services.consul;\n\n configOptions = { data_dir = dataDir; } //\n (if cfg.webUi then { ui_dir = \"${cfg.package.ui}\"; } else { }) //\n cfg.extraConfig;\n\n configFiles = [ \"/etc/consul.json\" \"/etc/consu"..., 7319) = 7319 | |
close(3) = 0 | |
brk(0x197cf000) = 0x197cf000 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/coturn.nix", {st_mode=S_IFREG|0444, st_size=12121, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/coturn.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=12121, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\nwith lib;\nlet\n cfg = config.services.coturn;\n pidfile = \"/run/turnserver/turnserver.pid\";\n configFile = pkgs.writeText \"turnserver.conf\" ''\nlistening-port=${toString cfg.listening-port}\ntls-listening-port=${toString cfg.tls-listening-port}\nalt-listening-port=${toString"..., 12121) = 12121 | |
close(3) = 0 | |
brk(0x197f0000) = 0x197f0000 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/dante.nix", {st_mode=S_IFREG|0444, st_size=1444, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/dante.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=1444, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\nwith lib;\n\nlet\n cfg = config.services.dante;\n confFile = pkgs.writeText \"dante-sockd.conf\" ''\n user.privileged: root\n user.unprivileged: dante\n\n ${cfg.config}\n '';\nin\n\n{\n meta = {\n maintainers = with maintainers; [ arobyn ];\n };\n\n options = {\n service"..., 1444) = 1444 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/ddclient.nix", {st_mode=S_IFREG|0444, st_size=5031, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/ddclient.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=5031, ...}) = 0 | |
read(3, "{ config, pkgs, lib, ... }:\n\nlet\n cfg = config.services.ddclient;\n boolToStr = bool: if bool then \"yes\" else \"no\";\n\n configText = ''\n # This file can be used as a template for configFile or is automatically generated by Nix options.\n daemon=${toString cfg.interval}\n cache=${cfg.homeDir}/"..., 5031) = 5031 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/dhcpcd.nix", {st_mode=S_IFREG|0444, st_size=7088, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/dhcpcd.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=7088, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n dhcpcd = if !config.boot.isContainer then pkgs.dhcpcd else pkgs.dhcpcd.override { udev = null; };\n\n cfg = config.networking.dhcpcd;\n\n interfaces = attrValues config.networking.interfaces;\n\n enableDHCP = config.networking.dhcpcd.enable &&\n (con"..., 7088) = 7088 | |
close(3) = 0 | |
brk(0x19811000) = 0x19811000 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/dhcpd.nix", {st_mode=S_IFREG|0444, st_size=5106, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/dhcpd.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=5106, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n cfg4 = config.services.dhcpd4;\n cfg6 = config.services.dhcpd6;\n\n writeConfig = cfg: pkgs.writeText \"dhcpd.conf\"\n ''\n default-lease-time 600;\n max-lease-time 7200;\n authoritative;\n ddns-update-style interim;\n log-facility lo"..., 5106) = 5106 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/dnscache.nix", {st_mode=S_IFREG|0444, st_size=2533, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/dnscache.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=2533, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.dnscache;\n\n dnscache-root = pkgs.runCommand \"dnscache-root\" {} ''\n mkdir -p $out/{servers,ip}\n\n ${concatMapStrings (ip: ''\n echo > \"$out/ip/\"${lib.escapeShellArg ip}\n '') cfg.clientIps}\n\n ${concatStrings (mapAttrsT"..., 2533) = 2533 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/dnschain.nix", {st_mode=S_IFREG|0444, st_size=4437, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/dnschain.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=4437, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfgs = config.services;\n cfg = cfgs.dnschain;\n\n dataDir = \"/var/lib/dnschain\";\n username = \"dnschain\";\n\n configFile = pkgs.writeText \"dnschain.conf\" ''\n [log]\n level = info\n\n [dns]\n host = ${cfg.dns.address}\n port = ${toString cfg.dn"..., 4437) = 4437 | |
close(3) = 0 | |
brk(0x19832000) = 0x19832000 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/dnscrypt-proxy.nix", {st_mode=S_IFREG|0444, st_size=9995, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/dnscrypt-proxy.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=9995, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\nwith lib;\n\nlet\n cfg = config.services.dnscrypt-proxy;\n\n stateDirectory = \"/var/lib/dnscrypt-proxy\";\n\n # The minisign public key used to sign the upstream resolver list.\n # This is somewhat more flexible than preloading the key as an\n # embedded string.\n upstreamReso"..., 9995) = 9995 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/dnscrypt-wrapper.nix", {st_mode=S_IFREG|0444, st_size=5607, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/dnscrypt-wrapper.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=5607, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\nwith lib;\n\nlet\n cfg = config.services.dnscrypt-wrapper;\n dataDir = \"/var/lib/dnscrypt-wrapper\";\n\n daemonArgs = with cfg; [\n \"--listen-address=${address}:${toString port}\"\n \"--resolver-address=${upstream.address}:${toString upstream.port}\"\n \"--provider-name"..., 5607) = 5607 | |
close(3) = 0 | |
brk(0x19853000) = 0x19853000 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/dnsmasq.nix", {st_mode=S_IFREG|0444, st_size=3024, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/dnsmasq.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=3024, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.dnsmasq;\n dnsmasq = pkgs.dnsmasq;\n stateDir = \"/var/lib/dnsmasq\";\n\n dnsmasqConf = pkgs.writeText \"dnsmasq.conf\" ''\n dhcp-leasefile=${stateDir}/dnsmasq.leases\n ${optionalString cfg.resolveLocalQueries ''\n conf-file=/etc"..., 3024) = 3024 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/ejabberd.nix", {st_mode=S_IFREG|0444, st_size=4448, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/ejabberd.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=4448, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.services.ejabberd;\n\n ctlcfg = pkgs.writeText \"ejabberdctl.cfg\" ''\n ERL_EPMD_ADDRESS=127.0.0.1\n ${cfg.ctlConfig}\n '';\n\n ectl = ''${cfg.package}/bin/ejabberdctl ${if cfg.configFile == null then \"\" else \"--config ${cfg.configFile}\"} -"..., 4448) = 4448 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/fakeroute.nix", {st_mode=S_IFREG|0444, st_size=1159, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/fakeroute.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=1159, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.fakeroute;\n routeConf = pkgs.writeText \"route.conf\" (concatStringsSep \"\\n\" cfg.route);\n\nin\n\n{\n\n ###### interface\n\n options = {\n\n services.fakeroute = {\n\n enable = mkOption {\n type = types.bool;\n default = fa"..., 1159) = 1159 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/ferm.nix", {st_mode=S_IFREG|0444, st_size=1701, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/ferm.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=1701, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.ferm;\n\n configFile = pkgs.stdenv.mkDerivation {\n name = \"ferm.conf\";\n text = cfg.config;\n preferLocalBuild = true;\n buildCommand = ''\n echo -n \"$text\" > $out\n ${cfg.package}/bin/ferm --noexec $out\n '';\n };"..., 1701) = 1701 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/firefox/sync-server.nix", {st_mode=S_IFREG|0444, st_size=5732, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/firefox/sync-server.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=5732, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.firefox.syncserver;\n\n defaultDbLocation = \"/var/db/firefox-sync-server/firefox-sync-server.db\";\n defaultSqlUri = \"sqlite:///${defaultDbLocation}\";\n\n syncServerIni = pkgs.writeText \"syncserver.ini\" ''\n [DEFAULT]\n overrides ="..., 5732) = 5732 | |
close(3) = 0 | |
brk(0x19874000) = 0x19874000 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/fireqos.nix", {st_mode=S_IFREG|0444, st_size=1285, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/fireqos.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=1285, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.fireqos;\n fireqosConfig = pkgs.writeText \"fireqos.conf\" \"${cfg.config}\";\nin {\n options.services.fireqos = {\n enable = mkOption {\n type = types.bool;\n default = false;\n description = ''\n If enabled, FireQOS"..., 1285) = 1285 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/firewall.nix", {st_mode=S_IFREG|0444, st_size=18376, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/firewall.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=18376, ...}) = 0 | |
read(3, "/* This module enables a simple firewall.\n\n The firewall can be customised in arbitrary ways by setting\n \342\200\230networking.firewall.extraCommands\342\200\231. For modularity, the firewall\n uses several chains:\n\n - \342\200\230nixos-fw\342\200\231 is the main chain for input packet processing.\n\n - \342\200\230nixos-fw-accept\342\200\231 "..., 18376) = 18376 | |
close(3) = 0 | |
brk(0x19895000) = 0x19895000 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/flannel.nix", {st_mode=S_IFREG|0444, st_size=4296, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/flannel.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=4296, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.flannel;\n\n networkConfig = filterAttrs (n: v: v != null) {\n Network = cfg.network;\n SubnetLen = cfg.subnetLen;\n SubnetMin = cfg.subnetMin;\n SubnetMax = cfg.subnetMax;\n Backend = cfg.backend;\n };\nin {\n options.servi"..., 4296) = 4296 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/flashpolicyd.nix", {st_mode=S_IFREG|0444, st_size=2064, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/flashpolicyd.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=2064, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.services.flashpolicyd;\n\n flashpolicyd = pkgs.stdenv.mkDerivation {\n name = \"flashpolicyd-0.6\";\n\n src = pkgs.fetchurl {\n name = \"flashpolicyd_v0.6.zip\";\n url = \"http://www.adobe.com/content/dotcom/en/devnet/flashplayer/artic"..., 2064) = 2064 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/freenet.nix", {st_mode=S_IFREG|0444, st_size=1207, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/freenet.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=1207, ...}) = 0 | |
read(3, "# NixOS module for Freenet daemon\n\n{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.services.freenet;\n varDir = \"/var/lib/freenet\";\n\nin\n\n{\n\n ### configuration\n\n options = {\n\n services.freenet = {\n\n enable = mkOption {\n type = types.bool;\n default = false;\n "..., 1207) = 1207 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/gale.nix", {st_mode=S_IFREG|0444, st_size=5683, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/gale.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=5683, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.gale;\n # we convert the path to a string to avoid it being copied to the nix store,\n # otherwise users could read the private key as all files in the store are\n # world-readable\n keyPath = toString cfg.keyPath;\n # ...but we ref"..., 5683) = 5683 | |
close(3) = 0 | |
brk(0x198b6000) = 0x198b6000 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/gateone.nix", {st_mode=S_IFREG|0444, st_size=1822, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/gateone.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=1822, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ...}:\nwith lib;\nlet\n cfg = config.services.gateone;\nin\n{\noptions = {\n services.gateone = {\n enable = mkEnableOption \"GateOne server\";\n pidDir = mkOption {\n default = \"/run/gateone\";\n type = types.path;\n description = ''Path of pid files for Gat"..., 1822) = 1822 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/gdomap.nix", {st_mode=S_IFREG|0444, st_size=636, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/gdomap.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=636, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.gdomap;\nin\n{\n #\n # interface\n #\n options = {\n services.gdomap = {\n enable = mkEnableOption \"GNUstep Distributed Objects name server\";\n };\n };\n\n #\n # implementation\n #\n config = mkIf config.services.gdomap.enable {"..., 636) = 636 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/git-daemon.nix", {st_mode=S_IFREG|0444, st_size=3922, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/git-daemon.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=3922, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\nwith lib;\nlet\n\n cfg = config.services.gitDaemon;\n\nin\n{\n\n ###### interface\n\n options = {\n services.gitDaemon = {\n\n enable = mkOption {\n type = types.bool;\n default = false;\n description = ''\n Enable Git daemon, which allows public h"..., 3922) = 3922 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/gnunet.nix", {st_mode=S_IFREG|0444, st_size=3426, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/gnunet.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=3426, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.services.gnunet;\n\n homeDir = \"/var/lib/gnunet\";\n\n configFile = with cfg; pkgs.writeText \"gnunetd.conf\"\n ''\n [PATHS]\n SERVICEHOME = ${homeDir}\n\n [ats]\n WAN_QUOTA_IN = ${toString load.maxNetDownBandwidth} b\n WAN_"..., 3426) = 3426 | |
close(3) = 0 | |
brk(0x198d7000) = 0x198d7000 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/gogoclient.nix", {st_mode=S_IFREG|0444, st_size=2121, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/gogoclient.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=2121, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet cfg = config.services.gogoclient;\nin\n\n{\n\n ###### interface\n\n options = {\n services.gogoclient = {\n enable = mkOption {\n default = false;\n type = types.bool;\n description = ''\n Enable the gogoCLIENT IPv6 tunnel.\n "..., 2121) = 2121 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/gvpe.nix", {st_mode=S_IFREG|0444, st_size=3105, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/gvpe.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=3105, ...}) = 0 | |
read(3, "# GNU Virtual Private Ethernet\n\n{config, pkgs, lib, ...}:\n\nlet\n inherit (lib) mkOption mkIf;\n\n cfg = config.services.gvpe;\n\n finalConfig = if cfg.configFile != null then\n cfg.configFile\n else if cfg.configText != null then\n pkgs.writeTextFile {\n name = \"gvpe.conf\";\n text = cfg.co"..., 3105) = 3105 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/haproxy.nix", {st_mode=S_IFREG|0444, st_size=1594, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/haproxy.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=1594, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\nlet\n cfg = config.services.haproxy;\n haproxyCfg = pkgs.writeText \"haproxy.conf\" cfg.config;\nin\nwith lib;\n{\n options = {\n services.haproxy = {\n\n enable = mkOption {\n type = types.bool;\n default = false;\n description = ''\n Whether to"..., 1594) = 1594 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/heyefi.nix", {st_mode=S_IFREG|0444, st_size=1620, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/heyefi.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=1620, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.services.heyefi;\nin\n\n{\n\n ###### interface\n\n options = {\n\n services.heyefi = {\n\n enable = mkEnableOption \"heyefi\";\n\n cardMacaddress = mkOption {\n default = \"\";\n description = ''\n An Eye-Fi card MAC addre"..., 1620) = 1620 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/hostapd.nix", {st_mode=S_IFREG|0444, st_size=4592, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/hostapd.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=4592, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\n# TODO:\n#\n# asserts\n# ensure that the nl80211 module is loaded/compiled in the kernel\n# wpa_supplicant and hostapd on the same wireless interface doesn't make any sense\n\nwith lib;\n\nlet\n\n cfg = config.services.hostapd;\n\n configFile = pkgs.writeText \"hostapd.conf\" ''"..., 4592) = 4592 | |
close(3) = 0 | |
brk(0x198f8000) = 0x198f8000 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/htpdate.nix", {st_mode=S_IFREG|0444, st_size=1518, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/htpdate.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=1518, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n inherit (pkgs) htpdate;\n\n cfg = config.services.htpdate;\nin\n\n{\n\n ###### interface\n\n options = {\n\n services.htpdate = {\n\n enable = mkOption {\n type = types.bool;\n default = false;\n description = ''\n Enable htpdate "..., 1518) = 1518 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/i2pd.nix", {st_mode=S_IFREG|0444, st_size=13469, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/i2pd.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=13469, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.services.i2pd;\n\n homeDir = \"/var/lib/i2pd\";\n\n mkEndpointOpt = name: addr: port: {\n enable = mkEnableOption name;\n name = mkOption {\n type = types.str;\n default = name;\n description = \"The endpoint name.\";\n };\n a"..., 13469) = 13469 | |
close(3) = 0 | |
brk(0x19919000) = 0x19919000 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/i2p.nix", {st_mode=S_IFREG|0444, st_size=843, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/i2p.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=843, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.i2p;\n homeDir = \"/var/lib/i2p\";\nin {\n ###### interface\n options.services.i2p.enable = mkEnableOption \"I2P router\";\n\n ###### implementation\n config = mkIf cfg.enable {\n users.extraUsers.i2p = {\n group = \"i2p\";\n desc"..., 843) = 843 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/iodine.nix", {st_mode=S_IFREG|0444, st_size=3847, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/iodine.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=3847, ...}) = 0 | |
read(3, "# NixOS module for iodine, ip over dns daemon\n\n{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.iodine;\n\n iodinedUser = \"iodined\";\n\nin\n{\n\n ### configuration\n\n options = {\n\n services.iodine = {\n clients = mkOption {\n default = {};\n description = ''\n "..., 3847) = 3847 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/ircd-hybrid/default.nix", {st_mode=S_IFREG|0444, st_size=2908, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/ircd-hybrid/default.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=2908, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.services.ircdHybrid;\n\n ircdService = pkgs.stdenv.mkDerivation rec {\n name = \"ircd-hybrid-service\";\n scripts = [ \"=>/bin\" ./control.in ];\n substFiles = [ \"=>/conf\" ./ircd.conf ];\n inherit (pkgs) ircdHybrid coreutils su iproute g"..., 2908) = 2908 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/iwd.nix", {st_mode=S_IFREG|0444, st_size=856, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/iwd.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=856, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.networking.wireless.iwd;\nin {\n options.networking.wireless.iwd.enable = mkEnableOption \"iwd\";\n\n config = mkIf cfg.enable {\n assertions = [{\n assertion = !config.networking.wireless.enable;\n message = ''\n Only one wirele"..., 856) = 856 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/keepalived/default.nix", {st_mode=S_IFREG|0444, st_size=7165, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/keepalived/default.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=7165, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.services.keepalived;\n\n keepalivedConf = pkgs.writeText \"keepalived.conf\" ''\n global_defs {\n ${snmpGlobalDefs}\n ${cfg.extraGlobalDefs}\n }\n\n ${vrrpInstancesStr}\n ${cfg.extraConfig}\n '';\n\n snmpGlobalDefs = with cfg.snm"..., 7165) = 7165 | |
close(3) = 0 | |
brk(0x1993a000) = 0x1993a000 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/keybase.nix", {st_mode=S_IFREG|0444, st_size=731, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/keybase.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=731, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\nwith lib;\nlet\n cfg = config.services.keybase;\n\nin {\n\n ###### interface\n\n options = {\n\n services.keybase = {\n\n enable = mkOption {\n type = types.bool;\n default = false;\n description = \"Whether to start the Keybase service.\";\n };\n\n };"..., 731) = 731 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/kippo.nix", {st_mode=S_IFREG|0444, st_size=4352, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/kippo.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=4352, ...}) = 0 | |
read(3, "# NixOS module for kippo honeypot ssh server\n# See all the options for configuration details.\n#\n# Default port is 2222. Recommend using something like this for port redirection to default SSH port:\n# networking.firewall.extraCommands = ''\n# iptables -t nat -A PREROUTING -i IN_IFACE -p tcp --dpo"..., 4352) = 4352 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/kresd.nix", {st_mode=S_IFREG|0444, st_size=3814, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/kresd.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=3814, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.services.kresd;\n package = pkgs.knot-resolver;\n\n configFile = pkgs.writeText \"kresd.conf\" cfg.extraConfig;\nin\n\n{\n meta.maintainers = [ maintainers.vcunat /* upstream developer */ ];\n\n ###### interface\n options.services.kresd = {\n en"..., 3814) = 3814 | |
close(3) = 0 | |
brk(0x1995d000) = 0x1995d000 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/lambdabot.nix", {st_mode=S_IFREG|0444, st_size=1626, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/lambdabot.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=1626, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.services.lambdabot;\n\n rc = builtins.toFile \"script.rc\" cfg.script;\n\nin\n\n{\n\n ### configuration\n\n options = {\n\n services.lambdabot = {\n\n enable = mkOption {\n type = types.bool;\n default = false;\n description = "..., 1626) = 1626 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/libreswan.nix", {st_mode=S_IFREG|0444, st_size=3414, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/libreswan.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=3414, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.services.libreswan;\n\n libexec = \"${pkgs.libreswan}/libexec/ipsec\";\n ipsec = \"${pkgs.libreswan}/sbin/ipsec\";\n\n trim = chars: str: let\n nonchars = filter (x : !(elem x.value chars))\n (imap0 (i: v: {ind = i; value = v;"..., 3414) = 3414 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/lldpd.nix", {st_mode=S_IFREG|0444, st_size=849, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/lldpd.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=849, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.lldpd;\n\nin\n\n{\n options.services.lldpd = {\n enable = mkEnableOption \"Link Layer Discovery Protocol Daemon\";\n\n extraArgs = mkOption {\n type = types.listOf types.str;\n default = [];\n example = [ \"-c\" \"-k\" \"-I eth0"..., 849) = 849 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/logmein-hamachi.nix", {st_mode=S_IFREG|0444, st_size=829, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/logmein-hamachi.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=829, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.services.logmein-hamachi;\n\nin\n\n{\n\n ###### interface\n\n options = {\n\n services.logmein-hamachi.enable = mkOption {\n type = types.bool;\n default = false;\n description =\n ''\n Whether to enable LogMeIn Hamachi"..., 829) = 829 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/mailpile.nix", {st_mode=S_IFREG|0444, st_size=1684, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/mailpile.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=1684, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.services.mailpile;\n\n hostname = cfg.hostname;\n port = cfg.port;\n\nin\n\n{\n\n ###### interface\n\n options = {\n\n services.mailpile = {\n enable = mkOption {\n default = false;\n description = \"\n Whether to enable Ma"..., 1684) = 1684 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/matterbridge.nix", {st_mode=S_IFREG|0444, st_size=2421, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/matterbridge.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=2421, ...}) = 0 | |
read(3, "{ config, pkgs, lib, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.services.matterbridge;\n\n matterbridgeConfToml = pkgs.writeText \"matterbridge.toml\" (cfg.configFile);\n\nin\n\n{\n options = {\n services.matterbridge = {\n enable = mkEnableOption \"Matterbridge chat platform bridge\";\n\n configFile = "..., 2421) = 2421 | |
close(3) = 0 | |
brk(0x1997e000) = 0x1997e000 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/mjpg-streamer.nix", {st_mode=S_IFREG|0444, st_size=1796, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/mjpg-streamer.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=1796, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.services.mjpg-streamer;\n\nin {\n\n options = {\n\n services.mjpg-streamer = {\n\n enable = mkEnableOption \"mjpg-streamer webcam streamer\";\n\n inputPlugin = mkOption {\n type = types.str;\n default = \"input_uvc.so\";\n "..., 1796) = 1796 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/minidlna.nix", {st_mode=S_IFREG|0444, st_size=2503, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/minidlna.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=2503, ...}) = 0 | |
read(3, "# Module for MiniDLNA, a simple DLNA server.\n\n{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.services.minidlna;\n\n port = 8200;\n\nin\n\n{\n\n ###### interface\n\n options = {\n\n services.minidlna.enable = mkOption {\n type = types.bool;\n default = false;\n description =\n "..., 2503) = 2503 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/miniupnpd.nix", {st_mode=S_IFREG|0444, st_size=3020, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/miniupnpd.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=3020, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.miniupnpd;\n configFile = pkgs.writeText \"miniupnpd.conf\" ''\n ext_ifname=${cfg.externalInterface}\n enable_natpmp=${if cfg.natpmp then \"yes\" else \"no\"}\n enable_upnp=${if cfg.upnp then \"yes\" else \"no\"}\n\n ${concatMapStrings"..., 3020) = 3020 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/mosquitto.nix", {st_mode=S_IFREG|0444, st_size=6116, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/mosquitto.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=6116, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ...}:\n\nwith lib;\n\nlet\n cfg = config.services.mosquitto;\n\n listenerConf = optionalString cfg.ssl.enable ''\n listener ${toString cfg.ssl.port} ${cfg.ssl.host}\n cafile ${cfg.ssl.cafile}\n certfile ${cfg.ssl.certfile}\n keyfile ${cfg.ssl.keyfile}\n '';\n\n passwordConf = "..., 6116) = 6116 | |
close(3) = 0 | |
brk(0x1999f000) = 0x1999f000 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/monero.nix", {st_mode=S_IFREG|0444, st_size=5690, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/monero.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=5690, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.monero;\n dataDir = \"/var/lib/monero\";\n\n listToConf = option: list:\n concatMapStrings (value: \"${option}=${value}\\n\") list;\n\n login = (cfg.rpc.user != null && cfg.rpc.password != null);\n\n configFile = with cfg; pkgs.writeT"..., 5690) = 5690 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/miredo.nix", {st_mode=S_IFREG|0444, st_size=2425, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/miredo.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=2425, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.miredo;\n pidFile = \"/run/miredo.pid\";\n miredoConf = pkgs.writeText \"miredo.conf\" ''\n InterfaceName ${cfg.interfaceName}\n ServerAddress ${cfg.serverAddress}\n ${optionalString (cfg.bindAddress != null) \"BindAddress ${cfg.bi"..., 2425) = 2425 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/mstpd.nix", {st_mode=S_IFREG|0444, st_size=731, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/mstpd.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=731, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\nlet\n cfg = config.services.mstpd;\nin\nwith lib;\n{\n options.services.mstpd = {\n \n enable = mkOption {\n default = false;\n type = types.bool;\n description = ''\n Whether to enable the multiple spanning tree protocol daemon.\n '';\n };\n\n };\n"..., 731) = 731 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/murmur.nix", {st_mode=S_IFREG|0444, st_size=7519, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/murmur.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=7519, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.murmur;\n configFile = pkgs.writeText \"murmurd.ini\" ''\n database=/var/lib/murmur/murmur.sqlite\n dbDriver=QSQLITE\n\n autobanAttempts=${toString cfg.autobanAttempts}\n autobanTimeframe=${toString cfg.autobanTimeframe}\n au"..., 7519) = 7519 | |
close(3) = 0 | |
brk(0x199c0000) = 0x199c0000 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/namecoind.nix", {st_mode=S_IFREG|0444, st_size=5250, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/namecoind.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=5250, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.namecoind;\n dataDir = \"/var/lib/namecoind\";\n useSSL = (cfg.rpc.certificate != null) && (cfg.rpc.key != null);\n useRPC = (cfg.rpc.user != null) && (cfg.rpc.password != null);\n\n listToConf = option: list:\n concatMapString"..., 5250) = 5250 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/nat.nix", {st_mode=S_IFREG|0444, st_size=8558, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/nat.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=8558, ...}) = 0 | |
read(3, "# This module enables Network Address Translation (NAT).\n# XXX: todo: support multiple upstream links\n# see http://yesican.chsoft.biz/lartc/MultihomedLinuxNetworking.html\n\n{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.networking.nat;\n\n dest = if cfg.externalIP == null then \"-j MASQUER"..., 8558) = 8558 | |
close(3) = 0 | |
brk(0x199e2000) = 0x199e2000 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/networkmanager.nix", {st_mode=S_IFREG|0444, st_size=11503, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/networkmanager.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=11503, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith pkgs;\nwith lib;\n\nlet\n cfg = config.networking.networkmanager;\n\n # /var/lib/misc is for dnsmasq.leases.\n stateDirs = \"/var/lib/NetworkManager /var/lib/dhclient /var/lib/misc\";\n\n dns =\n if cfg.useDnsmasq then \"dnsmasq\"\n else if config.services.resolved.enabl"..., 11503) = 11503 | |
close(3) = 0 | |
brk(0x19a03000) = 0x19a03000 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/nftables.nix", {st_mode=S_IFREG|0444, st_size=4511, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/nftables.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=4511, ...}) = 0 | |
read(3, "{ config, pkgs, lib, ... }:\nwith lib;\nlet\n cfg = config.networking.nftables;\nin\n{\n ###### interface\n\n options = {\n networking.nftables.enable = mkOption {\n type = types.bool;\n default = false;\n description =\n ''\n Whether to enable nftables. nftables is a Linux-b"..., 4511) = 4511 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/ngircd.nix", {st_mode=S_IFREG|0444, st_size=1245, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/ngircd.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=1245, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.ngircd;\n\n configFile = pkgs.stdenv.mkDerivation {\n name = \"ngircd.conf\";\n\n text = cfg.config;\n\n preferLocalBuild = true;\n\n buildCommand = ''\n echo -n \"$text\" > $out\n ${cfg.package}/sbin/ngircd --config $out --"..., 1245) = 1245 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/nghttpx/default.nix", {st_mode=S_IFREG|0444, st_size=3503, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/nghttpx/default.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=3503, ...}) = 0 | |
read(3, "{config, pkgs, lib, ...}:\nlet\n cfg = config.services.nghttpx;\n\n # renderHost :: Either ServerOptions Path -> String\n renderHost = server:\n if builtins.isString server\n then \"unix://${server}\"\n else \"${server.host},${builtins.toString server.port}\";\n\n # Filter out submodule parameters wh"..., 3503) = 3503 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/nghttpx/nghttpx-options.nix", {st_mode=S_IFREG|0444, st_size=4281, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/nghttpx/nghttpx-options.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=4281, ...}) = 0 | |
read(3, "{ config, lib, ... }:\n{ options.services.nghttpx = {\n enable = lib.mkEnableOption \"nghttpx\";\n\n frontends = lib.mkOption {\n type = lib.types.listOf (lib.types.submodule (import ./frontend-submodule.nix));\n description = ''\n A list of frontend listener specifications.\n "..., 4281) = 4281 | |
close(3) = 0 | |
brk(0x19a24000) = 0x19a24000 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/nix-serve.nix", {st_mode=S_IFREG|0444, st_size=1706, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/nix-serve.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=1706, ...}) = 0 | |
read(3, "{ config, pkgs, lib, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.nix-serve;\nin\n{\n options = {\n services.nix-serve = {\n enable = mkEnableOption \"nix-serve, the standalone Nix binary cache server\";\n\n port = mkOption {\n type = types.int;\n default = 5000;\n descripti"..., 1706) = 1706 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/nixops-dns.nix", {st_mode=S_IFREG|0444, st_size=1899, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/nixops-dns.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=1899, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\nlet\n pkg = pkgs.nixops-dns;\n cfg = config.services.nixops-dns;\nin\n\n{\n options = {\n services.nixops-dns = {\n enable = mkOption {\n type = types.bool;\n default = false;\n description = ''\n Whether to enable the nixops-dns re"..., 1899) = 1899 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/nntp-proxy.nix", {st_mode=S_IFREG|0444, st_size=6113, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/nntp-proxy.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=6113, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n inherit (pkgs) nntp-proxy;\n\n proxyUser = \"nntp-proxy\";\n\n cfg = config.services.nntp-proxy;\n\n configBool = b: if b then \"TRUE\" else \"FALSE\";\n\n confFile = pkgs.writeText \"nntp-proxy.conf\" ''\n nntp_server:\n {\n # NNTP Server host and port add"..., 6113) = 6113 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/nsd.nix", {st_mode=S_IFREG|0444, st_size=25419, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/nsd.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=25419, ...}) = 0 | |
read(3, "{ config, pkgs, lib, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.nsd;\n\n username = \"nsd\";\n stateDir = \"/var/lib/nsd\";\n pidFile = stateDir + \"/var/nsd.pid\";\n\n # build nsd with the options needed for the given config\n nsdPkg = pkgs.nsd.override {\n configFile = \"${configFile}/nsd.conf\";\n\n "..., 25419) = 25419 | |
brk(0x19a49000) = 0x19a49000 | |
close(3) = 0 | |
brk(0x19a6a000) = 0x19a6a000 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/ntopng.nix", {st_mode=S_IFREG|0444, st_size=3100, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/ntopng.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=3100, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.services.ntopng;\n redisCfg = config.services.redis;\n\n configFile = if cfg.configText != \"\" then\n pkgs.writeText \"ntopng.conf\" ''\n ${cfg.configText}\n ''\n else\n pkgs.writeText \"ntopng.conf\" ''\n ${concatStringsSep \" \" ("..., 3100) = 3100 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/ntpd.nix", {st_mode=S_IFREG|0444, st_size=1912, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/ntpd.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=1912, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n inherit (pkgs) ntp;\n\n cfg = config.services.ntp;\n\n stateDir = \"/var/lib/ntp\";\n\n ntpUser = \"ntp\";\n\n configFile = pkgs.writeText \"ntp.conf\" ''\n driftfile ${stateDir}/ntp.drift\n\n restrict 127.0.0.1\n restrict -6 ::1\n\n ${toString (map (server"..., 1912) = 1912 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/nylon.nix", {st_mode=S_IFREG|0444, st_size=4192, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/nylon.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=4192, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.services.nylon;\n\n homeDir = \"/var/lib/nylon\";\n\n configFile = cfg: pkgs.writeText \"nylon-${cfg.name}.conf\" ''\n [General]\n No-Simultaneous-Conn=${toString cfg.nrConnections}\n Log=${if cfg.logging then \"1\" else \"0\"}\n Verbose=${if"..., 4192) = 4192 | |
close(3) = 0 | |
brk(0x19a8b000) = 0x19a8b000 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/oidentd.nix", {st_mode=S_IFREG|0444, st_size=1005, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/oidentd.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=1005, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\n{\n\n ###### interface\n\n options = {\n\n services.oidentd.enable = mkOption {\n default = false;\n type = types.bool;\n description = ''\n Whether to enable \342\200\230oidentd\342\200\231, an implementation of the Ident\n protocol (RFC 1413). It allow"..., 1005) = 1005 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/openfire.nix", {st_mode=S_IFREG|0444, st_size=1422, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/openfire.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=1422, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\n{\n ###### interface\n\n options = {\n\n services.openfire = {\n\n enable = mkOption {\n default = false;\n description = \"\n Whether to enable OpenFire XMPP server.\n \";\n };\n\n usePostgreSQL = mkOption {\n default ="..., 1422) = 1422 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/openntpd.nix", {st_mode=S_IFREG|0444, st_size=1928, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/openntpd.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=1928, ...}) = 0 | |
read(3, "{ pkgs, lib, config, options, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.openntpd;\n\n package = pkgs.openntpd_nixos;\n\n cfgFile = pkgs.writeText \"openntpd.conf\" ''\n ${concatStringsSep \"\\n\" (map (s: \"server ${s}\") cfg.servers)}\n ${cfg.extraConfig}\n '';\n\n pidFile = \"/run/openntpd.pid\";\n\nin"..., 1928) = 1928 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/openvpn.nix", {st_mode=S_IFREG|0444, st_size=6283, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/openvpn.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=6283, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.services.openvpn;\n\n inherit (pkgs) openvpn;\n\n makeOpenVPNJob = cfg: name:\n let\n\n path = (getAttr \"openvpn-${name}\" config.systemd.services).path;\n\n upScript = ''\n #! /bin/sh\n export PATH=${path}\n\n # For c"..., 6283) = 6283 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/ostinato.nix", {st_mode=S_IFREG|0444, st_size=2587, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/ostinato.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=2587, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n pkg = pkgs.ostinato;\n cfg = config.services.ostinato;\n configFile = pkgs.writeText \"drone.ini\" ''\n [General]\n RateAccuracy=${cfg.rateAccuracy}\n\n [RpcServer]\n Address=${cfg.rpcServer.address}\n\n [PortList]\n Include=${concatStringsSep \","..., 2587) = 2587 | |
close(3) = 0 | |
brk(0x19aac000) = 0x19aac000 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/pdnsd.nix", {st_mode=S_IFREG|0444, st_size=2268, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/pdnsd.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=2268, ...}) = 0 | |
read(3, "{ config, pkgs, lib, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.pdnsd;\n pdnsd = pkgs.pdnsd;\n pdnsdUser = \"pdnsd\";\n pdnsdGroup = \"pdnsd\";\n pdnsdConf = pkgs.writeText \"pdnsd.conf\"\n ''\n global {\n run_as=${pdnsdUser};\n cache_dir=\"${cfg.cacheDir}\";\n ${cfg.globalConfig"..., 2268) = 2268 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/polipo.nix", {st_mode=S_IFREG|0444, st_size=2848, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/polipo.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=2848, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.services.polipo;\n\n polipoConfig = pkgs.writeText \"polipo.conf\" ''\n proxyAddress = ${cfg.proxyAddress}\n proxyPort = ${toString cfg.proxyPort}\n allowedClients = ${concatStringsSep \", \" cfg.allowedClients}\n ${optionalString (cfg.p"..., 2848) = 2848 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/powerdns.nix", {st_mode=S_IFREG|0444, st_size=1697, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/powerdns.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=1697, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.powerdns;\n configDir = pkgs.writeTextDir \"pdns.conf\" \"${cfg.extraConfig}\";\nin {\n options = {\n services.powerdns = {\n enable = mkEnableOption \"Powerdns domain name server\";\n\n extraConfig = mkOption {\n type = typ"..., 1697) = 1697 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/pdns-recursor.nix", {st_mode=S_IFREG|0444, st_size=4589, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/pdns-recursor.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=4589, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n dataDir = \"/var/lib/pdns-recursor\";\n username = \"pdns-recursor\";\n\n cfg = config.services.pdns-recursor;\n zones = mapAttrsToList (zone: uri: \"${zone}.=${uri}\") cfg.forwardZones;\n\n configFile = pkgs.writeText \"recursor.conf\" ''\n local-address=${c"..., 4589) = 4589 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/pptpd.nix", {st_mode=S_IFREG|0444, st_size=3404, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/pptpd.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=3404, ...}) = 0 | |
read(3, "{ config, stdenv, pkgs, lib, ... }:\n\nwith lib;\n\n{\n options = {\n services.pptpd = {\n enable = mkEnableOption \"Whether pptpd should be run on startup.\";\n\n serverIp = mkOption {\n type = types.string;\n description = \"The server-side IP address.\";\n default = "..., 3404) = 3404 | |
close(3) = 0 | |
brk(0x19acd000) = 0x19acd000 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/prayer.nix", {st_mode=S_IFREG|0444, st_size=2031, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/prayer.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=2031, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n inherit (pkgs) prayer;\n\n cfg = config.services.prayer;\n\n stateDir = \"/var/lib/prayer\";\n\n prayerUser = \"prayer\";\n prayerGroup = \"prayer\";\n\n prayerExtraCfg = pkgs.writeText \"extraprayer.cf\" ''\n prefix = \"${prayer}\"\n var_prefix = \"${stateDir}\"\n "..., 2031) = 2031 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/privoxy.nix", {st_mode=S_IFREG|0444, st_size=2851, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/privoxy.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=2851, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n inherit (pkgs) privoxy;\n\n cfg = config.services.privoxy;\n\n confFile = pkgs.writeText \"privoxy.conf\" ''\n user-manual ${privoxy}/share/doc/privoxy/user-manual\n confdir ${privoxy}/etc/\n listen-address ${cfg.listenAddress}\n enable-edit-action"..., 2851) = 2851 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/prosody.nix", {st_mode=S_IFREG|0444, st_size=7481, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/prosody.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=7481, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.services.prosody;\n\n sslOpts = { ... }: {\n\n options = {\n\n key = mkOption {\n type = types.path;\n description = \"Path to the key file.\";\n };\n\n cert = mkOption {\n type = types.path;\n description = "..., 7481) = 7481 | |
close(3) = 0 | |
brk(0x19aee000) = 0x19aee000 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/quassel.nix", {st_mode=S_IFREG|0444, st_size=2736, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/quassel.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=2736, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.quassel;\n quassel = cfg.package;\n user = if cfg.user != null then cfg.user else \"quassel\";\nin\n\n{\n\n ###### interface\n\n options = {\n\n services.quassel = {\n\n enable = mkOption {\n default = false;\n description "..., 2736) = 2736 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/racoon.nix", {st_mode=S_IFREG|0444, st_size=1136, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/racoon.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=1136, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.racoon;\nin {\n options.services.racoon = {\n enable = mkEnableOption \"racoon\";\n\n config = mkOption {\n description = \"Contents of racoon configuration file.\";\n default = \"\";\n type = types.str;\n };\n\n configPa"..., 1136) = 1136 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/radicale.nix", {st_mode=S_IFREG|0444, st_size=2321, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/radicale.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=2321, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.services.radicale;\n\n confFile = pkgs.writeText \"radicale.conf\" cfg.config;\n\n # This enables us to default to version 2 while still not breaking configurations of people with version 1\n defaultPackage = if versionAtLeast config.system.sta"..., 2321) = 2321 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/radvd.nix", {st_mode=S_IFREG|0444, st_size=1522, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/radvd.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=1522, ...}) = 0 | |
read(3, "# Module for the IPv6 Router Advertisement Daemon.\n\n{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.services.radvd;\n\n confFile = pkgs.writeText \"radvd.conf\" cfg.config;\n\nin\n\n{\n\n ###### interface\n\n options = {\n\n services.radvd.enable = mkOption {\n default = false;\n descrip"..., 1522) = 1522 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/rdnssd.nix", {st_mode=S_IFREG|0444, st_size=1782, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/rdnssd.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=1782, ...}) = 0 | |
read(3, "# Module for rdnssd, a daemon that configures DNS servers in\n# /etc/resolv/conf from IPv6 RDNSS advertisements.\n\n{ config, lib, pkgs, ... }:\n\nwith lib;\nlet\n mergeHook = pkgs.writeScript \"rdnssd-merge-hook\" ''\n #! ${pkgs.stdenv.shell} -e\n ${pkgs.openresolv}/bin/resolvconf -u\n '';\nin\n{\n\n ####"..., 1782) = 1782 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/redsocks.nix", {st_mode=S_IFREG|0444, st_size=8601, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/redsocks.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=8601, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\nlet\n cfg = config.services.redsocks;\nin\n{\n ##### interface\n options = {\n services.redsocks = {\n enable = mkOption {\n type = types.bool;\n default = false;\n description = \"Whether to enable redsocks.\";\n };\n\n log_debug = m"..., 8601) = 8601 | |
close(3) = 0 | |
brk(0x19b0f000) = 0x19b0f000 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/resilio.nix", {st_mode=S_IFREG|0444, st_size=8116, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/resilio.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=8116, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.resilio;\n\n resilioSync = pkgs.resilio-sync;\n\n sharedFoldersRecord = map (entry: {\n secret = entry.secret;\n dir = entry.directory;\n\n use_relay_server = entry.useRelayServer;\n use_tracker = entry.useTracker;\n use_dht "..., 8116) = 8116 | |
close(3) = 0 | |
brk(0x19b30000) = 0x19b30000 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/rpcbind.nix", {st_mode=S_IFREG|0444, st_size=821, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/rpcbind.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=821, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\n{\n\n ###### interface\n\n options = {\n\n services.rpcbind = {\n\n enable = mkOption {\n type = types.bool;\n default = false;\n description = ''\n Whether to enable `rpcbind', an ONC RPC directory service\n notably used by"..., 821) = 821 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/rxe.nix", {st_mode=S_IFREG|0444, st_size=1618, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/rxe.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=1618, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.networking.rxe;\n\n runRxeCmd = cmd: ifcs:\n concatStrings ( map (x: \"${pkgs.rdma-core}/bin/rxe_cfg -n ${cmd} ${x};\") ifcs);\n\n startScript = pkgs.writeShellScriptBin \"rxe-start\" ''\n ${pkgs.rdma-core}/bin/rxe_cfg -n start\n ${runRxeCmd"..., 1618) = 1618 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/sabnzbd.nix", {st_mode=S_IFREG|0444, st_size=1433, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/sabnzbd.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=1433, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.services.sabnzbd;\n inherit (pkgs) sabnzbd;\n\nin\n\n{\n\n ###### interface\n\n options = {\n services.sabnzbd = {\n enable = mkOption {\n default = false;\n description = \"Whether to enable the sabnzbd server.\";\n };\n "..., 1433) = 1433 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/searx.nix", {st_mode=S_IFREG|0444, st_size=1574, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/searx.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=1574, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.services.searx;\n\n configFile = cfg.configFile;\n\nin\n\n{\n\n ###### interface\n\n options = {\n\n services.searx = {\n\n enable = mkEnableOption\n \"the searx server. See https://github.com/asciimoo/searx\";\n\n configFile = mkOption"..., 1574) = 1574 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/seeks.nix", {st_mode=S_IFREG|0444, st_size=1316, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/seeks.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=1316, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.services.seeks;\n\n confDir = cfg.confDir;\n\n seeks = pkgs.seeks.override { seeks_confDir = confDir; };\n\nin\n\n{\n\n ###### interface\n\n options = {\n\n services.seeks = {\n\n enable = mkOption {\n default = false;\n type = type"..., 1316) = 1316 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/skydns.nix", {st_mode=S_IFREG|0444, st_size=2576, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/skydns.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=2576, ...}) = 0 | |
read(3, "{ config, pkgs, lib, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.skydns;\n\nin {\n options.services.skydns = {\n enable = mkEnableOption \"skydns service\";\n\n etcd = {\n machines = mkOption {\n default = [ \"http://127.0.0.1:2379\" ];\n type = types.listOf types.str;\n descri"..., 2576) = 2576 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/shairport-sync.nix", {st_mode=S_IFREG|0444, st_size=1739, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/shairport-sync.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=1739, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.services.shairport-sync;\n\nin\n\n{\n\n ###### interface\n\n options = {\n\n services.shairport-sync = {\n\n enable = mkOption {\n default = false;\n description = ''\n Enable the shairport-sync daemon.\n\n Running "..., 1739) = 1739 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/shout.nix", {st_mode=S_IFREG|0444, st_size=3113, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/shout.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=3113, ...}) = 0 | |
read(3, "{ pkgs, lib, config, options, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.shout;\n shoutHome = \"/var/lib/shout\";\n\n defaultConfig = pkgs.runCommand \"config.js\" {} ''\n EDITOR=true ${pkgs.shout}/bin/shout config --home $PWD\n mv config.js $out\n '';\n\n finalConfigFile = if (cfg.configFile != n"..., 3113) = 3113 | |
close(3) = 0 | |
brk(0x19b51000) = 0x19b51000 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/sniproxy.nix", {st_mode=S_IFREG|0444, st_size=2265, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/sniproxy.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=2265, ...}) = 0 | |
read(3, "{ config, pkgs, lib, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.services.sniproxy;\n\n configFile = pkgs.writeText \"sniproxy.conf\" ''\n user ${cfg.user}\n pidfile /run/sniproxy.pid\n ${cfg.config}\n '';\n\nin\n{\n options = {\n services.sniproxy = {\n enable = mkEnableOption \"sniproxy server\";\n\n"..., 2265) = 2265 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/smokeping.nix", {st_mode=S_IFREG|0444, st_size=10068, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/smokeping.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=10068, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\nlet\n\n cfg = config.services.smokeping;\n smokepingHome = \"/var/lib/smokeping\";\n smokepingPidDir = \"/run\";\n configFile =\n if cfg.config == null\n then\n ''\n *** General ***\n cgiurl = ${cfg.cgiUrl}\n contact = ${cfg.own"..., 10068) = 10068 | |
close(3) = 0 | |
brk(0x19b72000) = 0x19b72000 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/softether.nix", {st_mode=S_IFREG|0444, st_size=4669, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/softether.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=4669, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.softether;\n\nin\n{\n\n ###### interface\n\n options = {\n\n services.softether = {\n\n enable = mkEnableOption \"SoftEther VPN services\";\n\n package = mkOption {\n type = types.package;\n default = pkgs.softether;\n "..., 4669) = 4669 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/spiped.nix", {st_mode=S_IFREG|0444, st_size=7757, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/spiped.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=7757, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.spiped;\nin\n{\n options = {\n services.spiped = {\n enable = mkOption {\n type = types.bool;\n default = false;\n description = \"Enable the spiped service module.\";\n };\n\n config = mkOption"..., 7757) = 7757 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/squid.nix", {st_mode=S_IFREG|0444, st_size=4810, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/squid.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=4810, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.services.squid;\n\n\n squidConfig = pkgs.writeText \"squid.conf\"\n (if cfg.configText != null then cfg.configText else\n ''\n #\n # Recommended minimum configuration (3.5):\n #\n\n # Example rule allowing access from your local netw"..., 4810) = 4810 | |
close(3) = 0 | |
brk(0x19b93000) = 0x19b93000 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/sslh.nix", {st_mode=S_IFREG|0444, st_size=2356, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/sslh.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=2356, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.sslh;\n configFile = pkgs.writeText \"sslh.conf\" ''\n verbose: ${boolToString cfg.verbose};\n foreground: true;\n inetd: false;\n numeric: false;\n transparent: false;\n timeout: \"${toString cfg.timeout}\";\n user: \"nobo"..., 2356) = 2356 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/ssh/lshd.nix", {st_mode=S_IFREG|0444, st_size=4949, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/ssh/lshd.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=4949, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n inherit (pkgs) lsh;\n\n cfg = config.services.lshd;\n\nin\n\n{\n\n ###### interface\n\n options = {\n\n services.lshd = {\n\n enable = mkOption {\n default = false;\n description = ''\n Whether to enable the GNU lshd SSH2 daemon, which "..., 4949) = 4949 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/ssh/sshd.nix", {st_mode=S_IFREG|0444, st_size=12310, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/ssh/sshd.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=12310, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.services.openssh;\n cfgc = config.programs.ssh;\n\n nssModulesPath = config.system.nssModules.path;\n\n userOptions = {\n\n openssh.authorizedKeys = {\n keys = mkOption {\n type = types.listOf types.str;\n default = [];\n "..., 12310) = 12310 | |
close(3) = 0 | |
brk(0x19bb4000) = 0x19bb4000 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/strongswan.nix", {st_mode=S_IFREG|0444, st_size=4537, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/strongswan.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=4537, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nlet\n\n inherit (builtins) toFile;\n inherit (lib) concatMapStringsSep concatStringsSep mapAttrsToList\n mkIf mkEnableOption mkOption types;\n\n cfg = config.services.strongswan;\n\n ipsecSecrets = secrets: toFile \"ipsec.secrets\" (\n concatMapStringsSep \"\\n\""..., 4537) = 4537 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/stunnel.nix", {st_mode=S_IFREG|0444, st_size=6009, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/stunnel.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=6009, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.services.stunnel;\n yesNo = val: if val then \"yes\" else \"no\";\n\n verifyChainPathAssert = n: c: {\n assertion = c.verifyHostname == null || (c.verifyChain || c.verifyPeer);\n message = \"stunnel: \\\"${n}\\\" client configuration - hostname "..., 6009) = 6009 | |
close(3) = 0 | |
brk(0x19bd5000) = 0x19bd5000 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/supplicant.nix", {st_mode=S_IFREG|0444, st_size=9804, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/supplicant.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=9804, ...}) = 0 | |
read(3, "{ config, lib, utils, pkgs, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.networking.supplicant;\n\n # We must escape interfaces due to the systemd interpretation\n subsystemDevice = interface:\n \"sys-subsystem-net-devices-${utils.escapeSystemdPath interface}.device\";\n\n serviceName = iface: \"supplicant-$"..., 9804) = 9804 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/supybot.nix", {st_mode=S_IFREG|0444, st_size=2053, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/supybot.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=2053, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.services.supybot;\n\nin\n\n{\n\n options = {\n\n services.supybot = {\n\n enable = mkOption {\n default = false;\n description = \"Enable Supybot, an IRC bot\";\n };\n\n stateDir = mkOption {\n # Setting this to /var/"..., 2053) = 2053 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/syncthing.nix", {st_mode=S_IFREG|0444, st_size=4771, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/syncthing.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=4771, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.syncthing;\n defaultUser = \"syncthing\";\nin {\n ###### interface\n options = {\n services.syncthing = {\n\n enable = mkEnableOption ''\n Syncthing - the self-hosted open-source alternative\n to Dropbox and Bittorrent"..., 4771) = 4771 | |
close(3) = 0 | |
brk(0x19bf6000) = 0x19bf6000 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/tcpcrypt.nix", {st_mode=S_IFREG|0444, st_size=2200, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/tcpcrypt.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=2200, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.networking.tcpcrypt;\n\nin\n\n{\n\n ###### interface\n\n options = {\n\n networking.tcpcrypt.enable = mkOption {\n default = false;\n description = ''\n Whether to enable opportunistic TCP encryption. If the other end\n speak"..., 2200) = 2200 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/teamspeak3.nix", {st_mode=S_IFREG|0444, st_size=3522, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/teamspeak3.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=3522, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n ts3 = pkgs.teamspeak_server;\n cfg = config.services.teamspeak3;\n user = \"teamspeak\";\n group = \"teamspeak\";\nin\n\n{\n\n ###### interface\n\n options = {\n\n services.teamspeak3 = {\n enable = mkOption {\n type = types.bool;\n default = fal"..., 3522) = 3522 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/tinc.nix", {st_mode=S_IFREG|0444, st_size=7733, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/tinc.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=7733, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.services.tinc;\n\nin\n\n{\n\n ###### interface\n\n options = {\n\n services.tinc = {\n\n networks = mkOption {\n default = { };\n type = with types; attrsOf (submodule {\n options = {\n\n extraConfig = mkOption {\n"..., 7733) = 7733 | |
close(3) = 0 | |
brk(0x19c17000) = 0x19c17000 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/tinydns.nix", {st_mode=S_IFREG|0444, st_size=1298, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/tinydns.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=1298, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\n{\n ###### interface\n\n options = {\n services.tinydns = {\n enable = mkOption {\n default = false;\n type = types.bool;\n description = \"Whether to run the tinydns dns server\";\n };\n\n data = mkOption {\n type = types.lin"..., 1298) = 1298 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/tftpd.nix", {st_mode=S_IFREG|0444, st_size=844, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/tftpd.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=844, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\n{\n\n ###### interface\n\n options = {\n\n services.tftpd.enable = mkOption {\n type = types.bool;\n default = false;\n description = ''\n Whether to enable tftpd, a Trivial File Transfer Protocol server.\n The server will be run as an x"..., 844) = 844 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/tox-bootstrapd.nix", {st_mode=S_IFREG|0444, st_size=2037, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/tox-bootstrapd.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=2037, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n home = \"/var/lib/tox-bootstrapd\";\n PIDFile = \"${home}/pid\";\n\n pkg = pkgs.libtoxcore;\n cfg = config.services.toxBootstrapd;\n cfgFile = builtins.toFile \"tox-bootstrapd.conf\"\n ''\n port = ${toString cfg.port}\n keys_file_path = \"${home}/keys\""..., 2037) = 2037 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/toxvpn.nix", {st_mode=S_IFREG|0444, st_size=1786, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/toxvpn.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=1786, ...}) = 0 | |
read(3, "{ config, stdenv, pkgs, lib, ... }:\n\nwith lib;\n\n{\n options = {\n services.toxvpn = {\n enable = mkEnableOption \"enable toxvpn running on startup\";\n\n localip = mkOption {\n type = types.string;\n default = \"10.123.123.1\";\n description = \"your ip on the vpn\";\n"..., 1786) = 1786 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/tvheadend.nix", {st_mode=S_IFREG|0444, st_size=1669, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/tvheadend.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=1669, ...}) = 0 | |
read(3, "{ config, coreutils, lib, pkgs, ... }:\n\nwith lib;\n\nlet cfg = config.services.tvheadend;\n pidFile = \"${config.users.extraUsers.tvheadend.home}/tvheadend.pid\";\nin\n\n{\n options = {\n services.tvheadend = {\n enable = mkEnableOption \"Tvheadend\";\n httpPort = mkOption {\n type "..., 1669) = 1669 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/unbound.nix", {st_mode=S_IFREG|0444, st_size=3447, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/unbound.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=3447, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.services.unbound;\n\n stateDir = \"/var/lib/unbound\";\n\n access = concatMapStringsSep \"\\n \" (x: \"access-control: ${x} allow\") cfg.allowedAccess;\n\n interfaces = concatMapStringsSep \"\\n \" (x: \"interface: ${x}\") cfg.interfaces;\n\n isLocalAddr"..., 3447) = 3447 | |
close(3) = 0 | |
brk(0x19c38000) = 0x19c38000 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/unifi.nix", {st_mode=S_IFREG|0444, st_size=4726, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/unifi.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=4726, ...}) = 0 | |
read(3, "{ config, lib, pkgs, utils, ... }:\nwith lib;\nlet\n cfg = config.services.unifi;\n stateDir = \"/var/lib/unifi\";\n cmd = ''\n @${pkgs.jre}/bin/java java \\\n ${optionalString (cfg.initialJavaHeapSize != null) \"-Xms${(toString cfg.initialJavaHeapSize)}m\"} \\\n ${optionalString (cfg.maximumJ"..., 4726) = 4726 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/vsftpd.nix", {st_mode=S_IFREG|0444, st_size=7183, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/vsftpd.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=7183, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n /* minimal secure setup:\n\n enable = true;\n forceLocalLoginsSSL = true;\n forceLocalDataSSL = true;\n userlistDeny = false;\n localUsers = true;\n userlist = [\"non-root-user\" \"other-non-root-user\"];\n rsaCertFile = \"/var/vsftpd/vsftpd.pem\";\n\n *"..., 7183) = 7183 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/wakeonlan.nix", {st_mode=S_IFREG|0444, st_size=1349, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/wakeonlan.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=1349, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n interfaces = config.services.wakeonlan.interfaces;\n\n ethtool = \"${pkgs.ethtool}/sbin/ethtool\";\n\n passwordParameter = password : if (password == \"\") then \"\" else\n \"sopass ${password}\";\n\n methodParameter = {method, password} :\n if method == \"magic"..., 1349) = 1349 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/websockify.nix", {st_mode=S_IFREG|0444, st_size=1608, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/websockify.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=1608, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet cfg = config.services.networking.websockify; in {\n options = {\n services.networking.websockify = {\n enable = mkOption { \n description = \"Whether to enable websockify to forward websocket connections to TCP connections.\";\n\n default ="..., 1608) = 1608 | |
close(3) = 0 | |
brk(0x19c5a000) = 0x19c5a000 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/wicd.nix", {st_mode=S_IFREG|0444, st_size=772, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/wicd.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=772, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\n{\n\n ###### interface\n\n options = {\n\n networking.wicd.enable = mkOption {\n default = false;\n description = ''\n Whether to start <command>wicd</command>. Wired and\n wireless network configurations can then be managed by\n wicd-"..., 772) = 772 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/wireguard.nix", {st_mode=S_IFREG|0444, st_size=9216, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/wireguard.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=9216, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.networking.wireguard;\n\n kernel = config.boot.kernelPackages;\n\n # interface options\n\n interfaceOpts = { name, ... }: {\n\n options = {\n\n ips = mkOption {\n example = [ \"192.168.2.1/24\" ];\n default = [];\n type = w"..., 9216) = 9216 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/wpa_supplicant.nix", {st_mode=S_IFREG|0444, st_size=7647, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/wpa_supplicant.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=7647, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.networking.wireless;\n configFile = if cfg.networks != {} then pkgs.writeText \"wpa_supplicant.conf\" ''\n ${optionalString cfg.userControlled.enable ''\n ctrl_interface=DIR=/var/run/wpa_supplicant GROUP=${cfg.userControlled.group}\n "..., 7647) = 7647 | |
close(3) = 0 | |
brk(0x19c7b000) = 0x19c7b000 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/xinetd.nix", {st_mode=S_IFREG|0444, st_size=3780, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/xinetd.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=3780, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.services.xinetd;\n\n configFile = pkgs.writeText \"xinetd.conf\"\n ''\n defaults\n {\n log_type = SYSLOG daemon info\n log_on_failure = HOST\n log_on_success = PID HOST DURATION EXIT\n ${cfg.extraDefault"..., 3780) = 3780 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/xl2tpd.nix", {st_mode=S_IFREG|0444, st_size=3967, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/xl2tpd.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=3967, ...}) = 0 | |
read(3, "{ config, stdenv, pkgs, lib, ... }:\n\nwith lib;\n\n{\n options = {\n services.xl2tpd = {\n enable = mkEnableOption \"Whether xl2tpd should be run on startup.\";\n\n serverIp = mkOption {\n type = types.string;\n description = \"The server-side IP address.\";\n default "..., 3967) = 3967 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/xrdp.nix", {st_mode=S_IFREG|0444, st_size=4936, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/xrdp.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=4936, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.xrdp;\n confDir = pkgs.runCommand \"xrdp.conf\" { } ''\n mkdir $out\n\n cp ${cfg.package}/etc/xrdp/{km-*,xrdp,sesman,xrdp_keyboard}.ini $out\n\n cat > $out/startwm.sh <<EOF\n #!/bin/sh\n . /etc/profile\n ${cfg.defaultWindowM"..., 4936) = 4936 | |
close(3) = 0 | |
brk(0x19c9c000) = 0x19c9c000 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/zerobin.nix", {st_mode=S_IFREG|0444, st_size=2559, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/zerobin.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=2559, ...}) = 0 | |
read(3, "{ config, pkgs, lib, nodes, ... }:\nwith lib;\nlet\n cfg = config.services.zerobin;\n\n zerobin_config = pkgs.writeText \"zerobin-config.py\" ''\n PASTE_FILES_ROOT = \"${cfg.dataDir}\"\n ${cfg.extraConfig}\n '';\n\nin\n {\n options = {\n services.zerobin = {\n enable = mkEnableOption \"0bin\";\n\n "..., 2559) = 2559 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/zerotierone.nix", {st_mode=S_IFREG|0444, st_size=1084, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/zerotierone.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=1084, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.zerotierone;\nin\n{\n options.services.zerotierone.enable = mkEnableOption \"ZeroTierOne\";\n options.services.zerotierone.package = mkOption {\n default = pkgs.zerotierone;\n defaultText = \"pkgs.zerotierone\";\n type = types.packa"..., 1084) = 1084 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/znc.nix", {st_mode=S_IFREG|0444, st_size=11969, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/networking/znc.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=11969, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ...}:\n\nwith lib;\n\nlet\n cfg = config.services.znc;\n\n defaultUser = \"znc\"; # Default user to own process.\n\n # Default user and pass:\n # un=znc\n # pw=nixospass\n\n defaultUserName = \"znc\";\n defaultPassBlock = \"\n <Pass password>\n Method = sha256\n "..., 11969) = 11969 | |
close(3) = 0 | |
brk(0x19cbd000) = 0x19cbd000 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/printing/cupsd.nix", {st_mode=S_IFREG|0444, st_size=11308, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/printing/cupsd.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=11308, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n inherit (pkgs) cups cups-pk-helper cups-filters;\n\n cfg = config.services.printing;\n\n avahiEnabled = config.services.avahi.enable;\n polkitEnabled = config.security.polkit.enable;\n\n additionalBackends = pkgs.runCommand \"additional-cups-backends\" { }\n "..., 11308) = 11308 | |
close(3) = 0 | |
brk(0x19cde000) = 0x19cde000 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/scheduling/atd.nix", {st_mode=S_IFREG|0444, st_size=2797, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/scheduling/atd.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=2797, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.services.atd;\n\n inherit (pkgs) at;\n\nin\n\n{\n\n ###### interface\n\n options = {\n\n services.atd.enable = mkOption {\n type = types.bool;\n default = false;\n description = ''\n Whether to enable the <command>at</command> d"..., 2797) = 2797 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/scheduling/chronos.nix", {st_mode=S_IFREG|0444, st_size=1281, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/scheduling/chronos.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=1281, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.chronos;\n\nin {\n\n ###### interface\n\n options.services.chronos = {\n enable = mkOption {\n description = \"Whether to enable graphite web frontend.\";\n default = false;\n type = types.bool;\n };\n\n httpPort = mkOpti"..., 1281) = 1281 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/scheduling/cron.nix", {st_mode=S_IFREG|0444, st_size=3882, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/scheduling/cron.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=3882, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n # Put all the system cronjobs together.\n systemCronJobsFile = pkgs.writeText \"system-crontab\"\n ''\n SHELL=${pkgs.bash}/bin/bash\n PATH=${config.system.path}/bin:${config.system.path}/sbin\n ${optionalString (config.services.cron.mailto !"..., 3882) = 3882 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/scheduling/fcron.nix", {st_mode=S_IFREG|0444, st_size=4384, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/scheduling/fcron.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=4384, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.services.fcron;\n\n queuelen = if cfg.queuelen == null then \"\" else \"-q ${toString cfg.queuelen}\";\n\n # Duplicate code, also found in cron.nix. Needs deduplication.\n systemCronJobs =\n ''\n SHELL=${pkgs.bash}/bin/bash\n PATH=${con"..., 4384) = 4384 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/scheduling/marathon.nix", {st_mode=S_IFREG|0444, st_size=2818, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/scheduling/marathon.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=2818, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.services.marathon;\n\nin {\n\n ###### interface\n\n options.services.marathon = {\n enable = mkOption {\n type = types.bool;\n default = false;\n description = ''\n\tWhether to enable the marathon mesos framework.\n '';\n };\n\n"..., 2818) = 2818 | |
close(3) = 0 | |
brk(0x19cff000) = 0x19cff000 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/search/elasticsearch.nix", {st_mode=S_IFREG|0444, st_size=6135, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/search/elasticsearch.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=6135, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.elasticsearch;\n\n es5 = builtins.compareVersions (builtins.parseDrvName cfg.package.name).version \"5\" >= 0;\n es6 = builtins.compareVersions (builtins.parseDrvName cfg.package.name).version \"6\" >= 0;\n\n esConfig = ''\n network.hos"..., 6135) = 6135 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/search/hound.nix", {st_mode=S_IFREG|0444, st_size=3243, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/search/hound.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=3243, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\nwith lib;\nlet\n cfg = config.services.hound;\nin {\n options = {\n services.hound = {\n enable = mkOption {\n type = types.bool;\n default = false;\n description = ''\n Whether to enable the hound code search daemon.\n '';\n };\n\n "..., 3243) = 3243 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/search/kibana.nix", {st_mode=S_IFREG|0444, st_size=5741, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/search/kibana.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=5741, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.kibana;\n\n atLeast54 = versionAtLeast (builtins.parseDrvName cfg.package.name).version \"5.4\";\n\n cfgFile = if atLeast54 then cfgFile5 else cfgFile4;\n\n cfgFile4 = pkgs.writeText \"kibana.json\" (builtins.toJSON (\n (filterAttrsRecur"..., 5741) = 5741 | |
close(3) = 0 | |
brk(0x19d20000) = 0x19d20000 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/search/solr.nix", {st_mode=S_IFREG|0444, st_size=4069, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/search/solr.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=4069, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.services.solr;\n\n # Assemble all jars needed for solr\n solrJars = pkgs.stdenv.mkDerivation {\n name = \"solr-jars\";\n\n src = pkgs.fetchurl {\n url = http://archive.apache.org/dist/tomcat/tomcat-5/v5.5.36/bin/apache-tomcat-5.5.36.tar"..., 4069) = 4069 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/security/clamav.nix", {st_mode=S_IFREG|0444, st_size=3923, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/security/clamav.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=3923, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\nwith lib;\nlet\n clamavUser = \"clamav\";\n stateDir = \"/var/lib/clamav\";\n runDir = \"/run/clamav\";\n clamavGroup = clamavUser;\n cfg = config.services.clamav;\n pkg = pkgs.clamav;\n\n clamdConfigFile = pkgs.writeText \"clamd.conf\" ''\n DatabaseDirectory ${stateDir}\n Loca"..., 3923) = 3923 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/security/fail2ban.nix", {st_mode=S_IFREG|0444, st_size=4515, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/security/fail2ban.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=4515, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.services.fail2ban;\n\n fail2banConf = pkgs.writeText \"fail2ban.conf\" cfg.daemonConfig;\n\n jailConf = pkgs.writeText \"jail.conf\"\n (concatStringsSep \"\\n\" (attrValues (flip mapAttrs cfg.jails (name: def:\n optionalString (def != \"\")\n "..., 4515) = 4515 | |
close(3) = 0 | |
brk(0x19d41000) = 0x19d41000 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/security/fprintd.nix", {st_mode=S_IFREG|0444, st_size=809, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/security/fprintd.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=809, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.services.fprintd;\n\nin\n\n\n{\n\n ###### interface\n\n options = {\n\n services.fprintd = {\n\n enable = mkOption {\n type = types.bool;\n default = false;\n description = ''\n Whether to enable fprintd daemon and PA"..., 809) = 809 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/security/fprot.nix", {st_mode=S_IFREG|0444, st_size=2379, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/security/fprot.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=2379, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\nwith lib;\nlet\n fprotUser = \"fprot\";\n stateDir = \"/var/lib/fprot\";\n fprotGroup = fprotUser;\n cfg = config.services.fprot;\nin {\n options = {\n\n services.fprot = {\n updater = {\n enable = mkOption {\n default = false;\n description = ''\n "..., 2379) = 2379 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/security/haka.nix", {st_mode=S_IFREG|0444, st_size=3849, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/security/haka.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=3849, ...}) = 0 | |
read(3, "# This module defines global configuration for Haka.\n\n{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.services.haka;\n\n haka = cfg.package;\n\n hakaConf = pkgs.writeText \"haka.conf\"\n ''\n [general]\n configuration = ${if lib.strings.hasPrefix \"/\" cfg.configFile\n then \"${cfg.conf"..., 3849) = 3849 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/security/haveged.nix", {st_mode=S_IFREG|0444, st_size=1278, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/security/haveged.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=1278, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.services.haveged;\n\nin\n\n\n{\n\n ###### interface\n\n options = {\n\n services.haveged = {\n\n enable = mkOption {\n type = types.bool;\n default = false;\n description = ''\n Whether to enable to haveged entropy da"..., 1278) = 1278 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/security/hologram-server.nix", {st_mode=S_IFREG|0444, st_size=2655, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/security/hologram-server.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=2655, ...}) = 0 | |
read(3, "{pkgs, config, lib, ...}:\n\nwith lib;\n\nlet\n cfg = config.services.hologram-server;\n\n cfgFile = pkgs.writeText \"hologram-server.json\" (builtins.toJSON {\n ldap = {\n host = cfg.ldapHost;\n bind = {\n dn = cfg.ldapBindDN;\n password = cfg.ldapBindPassword;\n };\n i"..., 2655) = 2655 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/security/hologram-agent.nix", {st_mode=S_IFREG|0444, st_size=1552, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/security/hologram-agent.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=1552, ...}) = 0 | |
read(3, "{pkgs, config, lib, ...}:\n\nwith lib;\n\nlet\n cfg = config.services.hologram-agent;\n\n cfgFile = pkgs.writeText \"hologram-agent.json\" (builtins.toJSON {\n host = cfg.dialAddress;\n });\nin {\n options = {\n services.hologram-agent = {\n enable = mkOption {\n type = types.bool;\n def"..., 1552) = 1552 | |
close(3) = 0 | |
brk(0x19d64000) = 0x19d64000 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/security/munge.nix", {st_mode=S_IFREG|0444, st_size=1081, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/security/munge.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=1081, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.services.munge;\n\nin\n\n{\n\n ###### interface\n\n options = {\n\n services.munge = {\n enable = mkEnableOption \"munge service\";\n\n password = mkOption {\n default = \"/etc/munge/munge.key\";\n type = types.string;\n des"..., 1081) = 1081 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/security/oauth2_proxy.nix", {st_mode=S_IFREG|0444, st_size=15016, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/security/oauth2_proxy.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=15016, ...}) = 0 | |
read(3, "# NixOS module for oauth2_proxy.\n\n{ config, lib, pkgs, ... }:\n\nwith lib;\nlet\n cfg = config.services.oauth2_proxy;\n\n # Use like:\n # repeatedArgs (arg: \"--arg=${arg}\") args\n repeatedArgs = concatMapStringsSep \" \";\n\n # oauth2_proxy provides many options that are only relevant if you are using\n "..., 15016) = 15016 | |
close(3) = 0 | |
brk(0x19d85000) = 0x19d85000 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/security/physlock.nix", {st_mode=S_IFREG|0444, st_size=3411, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/security/physlock.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=3411, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.physlock;\nin\n\n{\n\n ###### interface\n\n options = {\n\n services.physlock = {\n\n enable = mkOption {\n type = types.bool;\n default = false;\n description = ''\n Whether to enable the <command>physlock<"..., 3411) = 3411 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/security/shibboleth-sp.nix", {st_mode=S_IFREG|0444, st_size=2586, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/security/shibboleth-sp.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=2586, ...}) = 0 | |
read(3, "{pkgs, config, lib, ...}:\n\nwith lib;\nlet\n cfg = config.services.shibboleth-sp;\nin {\n options = {\n services.shibboleth-sp = {\n enable = mkOption {\n type = types.bool;\n default = false;\n description = \"Whether to enable the shibboleth service\";\n };\n\n configFile"..., 2586) = 2586 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/security/sks.nix", {st_mode=S_IFREG|0444, st_size=1856, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/security/sks.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=1856, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.services.sks;\n\n sksPkg = cfg.package;\n\nin\n\n{\n\n options = {\n\n services.sks = {\n\n enable = mkEnableOption \"sks\";\n\n package = mkOption {\n default = pkgs.sks;\n defaultText = \"pkgs.sks\";\n type = types.package;"..., 1856) = 1856 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/security/sshguard.nix", {st_mode=S_IFREG|0444, st_size=4593, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/security/sshguard.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=4593, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.sshguard;\nin {\n\n ###### interface\n\n options = {\n\n services.sshguard = {\n enable = mkOption {\n default = false;\n type = types.bool;\n description = \"Whether to enable the sshguard service.\";\n };\n\n "..., 4593) = 4593 | |
close(3) = 0 | |
brk(0x19da6000) = 0x19da6000 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/security/tor.nix", {st_mode=S_IFREG|0444, st_size=26172, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/security/tor.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=26172, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.tor;\n torDirectory = \"/var/lib/tor\";\n\n opt = name: value: optionalString (value != null) \"${name} ${value}\";\n optint = name: value: optionalString (value != null && value != 0) \"${name} ${toString value}\";\n\n isolationOptio"..., 26172) = 26172 | |
close(3) = 0 | |
brk(0x19dc7000) = 0x19dc7000 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/security/torify.nix", {st_mode=S_IFREG|0444, st_size=1799, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/security/torify.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=1799, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\nwith lib;\nlet\n\n cfg = config.services.tor;\n\n torify = pkgs.writeTextFile {\n name = \"tsocks\";\n text = ''\n #!${pkgs.stdenv.shell}\n TSOCKS_CONF_FILE=${pkgs.writeText \"tsocks.conf\" cfg.tsocks.config} LD_PRELOAD=\"${pkgs.tsocks}/lib/libtsocks.so $LD_PRELOA"..., 1799) = 1799 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/security/torsocks.nix", {st_mode=S_IFREG|0444, st_size=3646, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/security/torsocks.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=3646, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.tor.torsocks;\n optionalNullStr = b: v: optionalString (b != null) v;\n\n configFile = server: ''\n TorAddress ${toString (head (splitString \":\" server))}\n TorPort ${toString (tail (splitString \":\" server))}\n\n OnionAddrRan"..., 3646) = 3646 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/security/usbguard.nix", {st_mode=S_IFREG|0444, st_size=6684, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/security/usbguard.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=6684, ...}) = 0 | |
read(3, "{config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.services.usbguard;\n\n # valid policy options\n policy = (types.enum [ \"allow\" \"block\" \"reject\" \"keep\" \"apply-policy\" ]);\n\n # decide what file to use for rules\n ruleFile = if cfg.rules != null then pkgs.writeText \"usbguard-rules\" cfg.rules "..., 6684) = 6684 | |
close(3) = 0 | |
brk(0x19de9000) = 0x19de9000 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/security/vault.nix", {st_mode=S_IFREG|0444, st_size=4473, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/security/vault.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=4473, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\nlet\n cfg = config.services.vault;\n\n configFile = pkgs.writeText \"vault.hcl\" ''\n listener \"tcp\" {\n address = \"${cfg.address}\"\n ${if (cfg.tlsCertFile == null || cfg.tlsKeyFile == null) then ''\n tls_disable = \"true\"\n '' else ''\n "..., 4473) = 4473 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/system/cgmanager.nix", {st_mode=S_IFREG|0444, st_size=642, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/system/cgmanager.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=642, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.cgmanager;\nin {\n meta.maintainers = [ maintainers.mic92 ];\n\n ###### interface\n options.services.cgmanager.enable = mkEnableOption \"cgmanager\";\n\n ###### implementation\n config = mkIf cfg.enable {\n systemd.services.cgmanager ="..., 642) = 642 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/system/cloud-init.nix", {st_mode=S_IFREG|0444, st_size=4867, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/system/cloud-init.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=4867, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet cfg = config.services.cloud-init;\n path = with pkgs; [ cloud-init nettools utillinux e2fsprogs shadow openssh iproute ];\nin\n{\n options = {\n\n services.cloud-init = {\n\n enable = mkOption {\n type = types.bool;\n default = false;\n "..., 4867) = 4867 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/system/dbus.nix", {st_mode=S_IFREG|0444, st_size=3024, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/system/dbus.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=3024, ...}) = 0 | |
read(3, "# D-Bus configuration and system bus daemon.\n\n{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.services.dbus;\n\n homeDir = \"/run/dbus\";\n\n configDir = pkgs.makeDBusConf {\n suidHelper = \"${config.security.wrapperDir}/dbus-daemon-launch-helper\";\n serviceDirectories = cfg.packages;\n }"..., 3024) = 3024 | |
close(3) = 0 | |
brk(0x19e0a000) = 0x19e0a000 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/system/earlyoom.nix", {st_mode=S_IFREG|0444, st_size=2720, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/system/earlyoom.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=2720, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n ecfg = config.services.earlyoom;\nin\n{\n options = {\n services.earlyoom = {\n\n enable = mkOption {\n type = types.bool;\n default = false;\n description = ''\n Enable early out of memory killing.\n '';\n };\n\n "..., 2720) = 2720 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/system/localtime.nix", {st_mode=S_IFREG|0444, st_size=1659, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/system/localtime.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=1659, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.localtime;\nin {\n options = {\n services.localtime = {\n enable = mkOption {\n default = false;\n description = ''\n Enable <literal>localtime</literal>, simple daemon for keeping the system\n timez"..., 1659) = 1659 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/system/kerberos.nix", {st_mode=S_IFREG|0444, st_size=1263, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/system/kerberos.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=1263, ...}) = 0 | |
read(3, "{pkgs, config, lib, ...}:\n\nlet\n\n inherit (lib) mkOption mkIf singleton;\n\n inherit (pkgs) heimdalFull;\n\n stateDir = \"/var/heimdal\";\nin\n\n{\n\n ###### interface\n\n options = {\n\n services.kerberos_server = {\n\n enable = mkOption {\n default = false;\n description = ''\n Enab"..., 1263) = 1263 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/system/nscd.nix", {st_mode=S_IFREG|0444, st_size=2116, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/system/nscd.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=2116, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n nssModulesPath = config.system.nssModules.path;\n cfg = config.services.nscd;\n\n inherit (lib) singleton;\n\nin\n\n{\n\n ###### interface\n\n options = {\n\n services.nscd = {\n\n enable = mkOption {\n type = types.bool;\n default = true;\n "..., 2116) = 2116 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/system/saslauthd.nix", {st_mode=S_IFREG|0444, st_size=1290, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/system/saslauthd.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=1290, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n nssModulesPath = config.system.nssModules.path;\n cfg = config.services.saslauthd;\n\nin\n\n{\n\n ###### interface\n\n options = {\n\n services.saslauthd = {\n\n enable = mkEnableOption \"Whether to enable the Cyrus SASL authentication daemon.\";\n\n pac"..., 1290) = 1290 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/system/uptimed.nix", {st_mode=S_IFREG|0444, st_size=1414, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/system/uptimed.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=1414, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.uptimed;\n stateDir = \"/var/spool/uptimed\";\nin\n{\n options = {\n services.uptimed = {\n enable = mkOption {\n default = false;\n description = ''\n Enable <literal>uptimed</literal>, allowing you to track\n "..., 1414) = 1414 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/torrent/deluge.nix", {st_mode=S_IFREG|0444, st_size=1922, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/torrent/deluge.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=1922, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.deluge;\n cfg_web = config.services.deluge.web;\n openFilesLimit = 4096;\n\nin {\n options = {\n services = {\n deluge = {\n enable = mkOption {\n default = false;\n description = \"Start the Deluge daemon\";"..., 1922) = 1922 | |
close(3) = 0 | |
brk(0x19e2b000) = 0x19e2b000 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/torrent/flexget.nix", {st_mode=S_IFREG|0444, st_size=2918, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/torrent/flexget.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=2918, ...}) = 0 | |
read(3, "{ config, lib, pkgs, timezone, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.flexget;\n pkg = pkgs.flexget;\n ymlFile = pkgs.writeText \"flexget.yml\" ''\n ${cfg.config}\n\n ${optionalString cfg.systemScheduler \"schedules: no\"}\n'';\n configFile = \"${toString cfg.homeDir}/flexget.yml\";\nin {\n optio"..., 2918) = 2918 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/torrent/opentracker.nix", {st_mode=S_IFREG|0444, st_size=1138, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/torrent/opentracker.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=1138, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\nlet\n cfg = config.services.opentracker;\nin {\n options.services.opentracker = {\n enable = mkEnableOption \"opentracker\";\n\n package = mkOption {\n type = types.package;\n description = ''\n opentracker package to use\n '';\n default ="..., 1138) = 1138 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/torrent/peerflix.nix", {st_mode=S_IFREG|0444, st_size=1489, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/torrent/peerflix.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=1489, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.peerflix;\n\n configFile = pkgs.writeText \"peerflix-config.json\" ''\n {\n \"connections\": 50,\n \"tmp\": \"${cfg.downloadDir}\"\n }\n '';\n\nin {\n\n ###### interface\n\n options.services.peerflix = {\n enable = mkOption {\n "..., 1489) = 1489 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/torrent/transmission.nix", {st_mode=S_IFREG|0444, st_size=5876, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/torrent/transmission.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=5876, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.transmission;\n apparmor = config.security.apparmor.enable;\n\n homeDir = cfg.home;\n downloadDir = \"${homeDir}/Downloads\";\n incompleteDir = \"${homeDir}/.incomplete\";\n\n settingsDir = \"${homeDir}/.config/transmission-daemon\";\n sett"..., 5876) = 5876 | |
close(3) = 0 | |
brk(0x19e4c000) = 0x19e4c000 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/ttys/agetty.nix", {st_mode=S_IFREG|0444, st_size=3400, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/ttys/agetty.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=3400, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n autologinArg = optionalString (config.services.mingetty.autologinUser != null) \"--autologin ${config.services.mingetty.autologinUser}\";\n gettyCmd = extraArgs: \"@${pkgs.utillinux}/sbin/agetty agetty --login-program ${pkgs.shadow}/bin/login ${autologinAr"..., 3400) = 3400 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/ttys/gpm.nix", {st_mode=S_IFREG|0444, st_size=1017, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/ttys/gpm.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=1017, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.services.gpm;\n\nin\n\n{\n\n ###### interface\n\n options = {\n\n services.gpm = {\n\n enable = mkOption {\n type = types.bool;\n default = false;\n description = ''\n Whether to enable GPM, the General Purpose Mouse"..., 1017) = 1017 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/ttys/kmscon.nix", {st_mode=S_IFREG|0444, st_size=2680, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/ttys/kmscon.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=2680, ...}) = 0 | |
read(3, "{ config, pkgs, lib, ... }:\nlet\n inherit (lib) mkOption types mkIf optionalString;\n\n cfg = config.services.kmscon;\n\n configDir = pkgs.writeTextFile { name = \"kmscon-config\"; destination = \"/kmscon.conf\"; text = cfg.extraConfig; };\nin {\n options = {\n services.kmscon = {\n enable = mkOption"..., 2680) = 2680 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/web-apps/atlassian/confluence.nix", {st_mode=S_IFREG|0444, st_size=5563, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/web-apps/atlassian/confluence.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=5563, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.services.confluence;\n\n pkg = pkgs.atlassian-confluence.override (optionalAttrs cfg.sso.enable {\n enableSSO = cfg.sso.enable;\n crowdProperties = ''\n application.name ${cfg.sso.applicationName}\n applica"..., 5563) = 5563 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/web-apps/atlassian/crowd.nix", {st_mode=S_IFREG|0444, st_size=4033, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/web-apps/atlassian/crowd.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=4033, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.services.crowd;\n\n pkg = pkgs.atlassian-crowd.override {\n home = cfg.home;\n port = cfg.listenPort;\n openidPassword = cfg.openidPassword;\n } // (optionalAttrs cfg.proxy.enable {\n proxyUrl = \"${cfg.proxy.scheme}://${cfg.proxy.nam"..., 4033) = 4033 | |
close(3) = 0 | |
brk(0x19e6e000) = 0x19e6e000 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/web-apps/atlassian/jira.nix", {st_mode=S_IFREG|0444, st_size=5619, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/web-apps/atlassian/jira.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=5619, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.services.jira;\n\n pkg = pkgs.atlassian-jira.override (optionalAttrs cfg.sso.enable {\n enableSSO = cfg.sso.enable;\n crowdProperties = ''\n application.name ${cfg.sso.applicationName}\n application.passwor"..., 5619) = 5619 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/web-apps/frab.nix", {st_mode=S_IFREG|0444, st_size=5968, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/web-apps/frab.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=5968, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.frab;\n\n package = pkgs.frab;\n ruby = package.ruby;\n\n databaseConfig = builtins.toJSON { production = cfg.database; };\n\n frabEnv = {\n RAILS_ENV = \"production\";\n RACK_ENV = \"production\";\n SECRET_KEY_BASE = cfg.secretKeyBa"..., 5968) = 5968 | |
close(3) = 0 | |
brk(0x19e8f000) = 0x19e8f000 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/web-apps/mattermost.nix", {st_mode=S_IFREG|0444, st_size=7398, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/web-apps/mattermost.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=7398, ...}) = 0 | |
read(3, "{ config, pkgs, lib, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.services.mattermost;\n\n defaultConfig = builtins.fromJSON (readFile \"${pkgs.mattermost}/config/config.json\");\n\n mattermostConf = foldl recursiveUpdate defaultConfig\n [ { ServiceSettings.SiteURL = cfg.siteUrl;\n ServiceSettings.Lis"..., 7398) = 7398 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/web-apps/nixbot.nix", {st_mode=S_IFREG|0444, st_size=3583, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/web-apps/nixbot.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=3583, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.nixbot;\n pyramidIni = ''\n ###\n # app configuration\n # http://docs.pylonsproject.org/projects/pyramid/en/1.7-branch/narr/environment.html\n ###\n\n [app:main]\n use = egg:nixbot\n\n nixbot.github_token = ${cfg.githubT"..., 3583) = 3583 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/web-apps/nexus.nix", {st_mode=S_IFREG|0444, st_size=2705, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/web-apps/nexus.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=2705, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.services.nexus;\n\nin\n\n{\n options = {\n services.nexus = {\n enable = mkEnableOption \"Sonatype Nexus3 OSS service\";\n\n user = mkOption {\n type = types.str;\n default = \"nexus\";\n description = \"User which runs Ne"..., 2705) = 2705 | |
close(3) = 0 | |
brk(0x19eb0000) = 0x19eb0000 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/web-apps/pgpkeyserver-lite.nix", {st_mode=S_IFREG|0444, st_size=1601, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/web-apps/pgpkeyserver-lite.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=1601, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.services.pgpkeyserver-lite;\n sksCfg = config.services.sks;\n\n webPkg = cfg.package;\n\nin\n\n{\n\n options = {\n\n services.pgpkeyserver-lite = {\n\n enable = mkEnableOption \"pgpkeyserver-lite on a nginx vHost proxying to a gpg keyserver\";\n"..., 1601) = 1601 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/web-apps/piwik.nix", {st_mode=S_IFREG|0444, st_size=8704, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/web-apps/piwik.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=8704, ...}) = 0 | |
read(3, "{ config, lib, pkgs, services, ... }:\nwith lib;\nlet\n cfg = config.services.piwik;\n\n user = \"piwik\";\n dataDir = \"/var/lib/${user}\";\n\n pool = user;\n # it's not possible to use /run/phpfpm/${pool}.sock because /run/phpfpm/ is root:root 0770,\n # and therefore is not accessible by the web server.\n "..., 8704) = 8704 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/web-apps/pump.io.nix", {st_mode=S_IFREG|0444, st_size=12703, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/web-apps/pump.io.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=12703, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.pumpio;\n dataDir = \"/var/lib/pump.io\";\n runDir = \"/run/pump.io\";\n user = \"pumpio\";\n\n optionalSet = condition: value: if condition then value else {};\n\n configScript = ./pump.io-configure.js;\n configOptions = {\n outputFile ="..., 12703) = 12703 | |
close(3) = 0 | |
brk(0x19ed1000) = 0x19ed1000 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/web-apps/restya-board.nix", {st_mode=S_IFREG|0444, st_size=12358, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/web-apps/restya-board.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=12358, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\n# TODO: are these php-packages needed?\n#imagick\n#php-geoip -> php.ini: extension = geoip.so\n#expat\n\nlet\n cfg = config.services.restya-board;\n\n runDir = \"/run/restya-board\";\n\n poolName = \"restya-board\";\n phpfpmSocketName = \"/var/run/phpfpm/${poolName}.sock\""..., 12358) = 12358 | |
close(3) = 0 | |
brk(0x19ef2000) = 0x19ef2000 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/web-apps/tt-rss.nix", {st_mode=S_IFREG|0444, st_size=19194, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/web-apps/tt-rss.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=19194, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\nlet\n cfg = config.services.tt-rss;\n\n configVersion = 26;\n\n cacheDir = \"cache\";\n lockDir = \"lock\";\n feedIconsDir = \"feed-icons\";\n\n dbPort = if cfg.database.port == null\n then (if cfg.database.type == \"pgsql\" then 5432 else 3306)\n else cfg.database.po"..., 19194) = 19194 | |
close(3) = 0 | |
brk(0x19f13000) = 0x19f13000 | |
brk(0x19f34000) = 0x19f34000 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/web-apps/selfoss.nix", {st_mode=S_IFREG|0444, st_size=4488, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/web-apps/selfoss.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=4488, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\nwith lib;\nlet\n cfg = config.services.selfoss;\n\n poolName = \"selfoss_pool\";\n phpfpmSocketName = \"/var/run/phpfpm/${poolName}.sock\";\n\n dataDir = \"/var/lib/selfoss\";\n\n selfoss-config =\n let\n db_type = cfg.database.type;\n default_port = if (db_type == \"mysql\") the"..., 4488) = 4488 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/web-apps/quassel-webserver.nix", {st_mode=S_IFREG|0444, st_size=3582, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/web-apps/quassel-webserver.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=3582, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.quassel-webserver;\n quassel-webserver = cfg.pkg;\n settings = ''\n module.exports = {\n default: {\n host: '${cfg.quasselCoreHost}', // quasselcore host\n port: ${toString cfg.quasselCorePort}, // quasselcore po"..., 3582) = 3582 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/web-servers/apache-httpd/default.nix", {st_mode=S_IFREG|0444, st_size=23191, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/web-servers/apache-httpd/default.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=23191, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n mainCfg = config.services.httpd;\n\n httpd = mainCfg.package.out;\n\n version24 = !versionOlder httpd.version \"2.4\";\n\n httpdConf = mainCfg.configFile;\n\n php = mainCfg.phpPackage.override { apacheHttpd = httpd.dev; /* otherwise it only gets .out */ };\n\n "..., 23191) = 23191 | |
close(3) = 0 | |
brk(0x19f55000) = 0x19f55000 | |
brk(0x19f76000) = 0x19f76000 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/web-servers/caddy.nix", {st_mode=S_IFREG|0444, st_size=2947, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/web-servers/caddy.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=2947, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.caddy;\n configFile = pkgs.writeText \"Caddyfile\" cfg.config;\nin {\n options.services.caddy = {\n enable = mkEnableOption \"Caddy web server\";\n\n config = mkOption {\n default = \"\";\n example = ''\n example.com {\n "..., 2947) = 2947 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/web-servers/fcgiwrap.nix", {st_mode=S_IFREG|0444, st_size=1978, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/web-servers/fcgiwrap.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=1978, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.fcgiwrap;\nin {\n\n options = {\n services.fcgiwrap = {\n enable = mkOption {\n type = types.bool;\n default = false;\n description = \"Whether to enable fcgiwrap, a server for running CGI applications over Fast"..., 1978) = 1978 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/web-servers/jboss/default.nix", {st_mode=S_IFREG|0444, st_size=1829, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/web-servers/jboss/default.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=1829, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.services.jboss;\n\n jbossService = pkgs.stdenv.mkDerivation {\n name = \"jboss-server\";\n builder = ./builder.sh;\n inherit (pkgs) jboss su;\n inherit (cfg) tempDir logDir libUrl deployDir serverDir user useJK;\n };\n\nin\n\n{\n\n ###### i"..., 1829) = 1829 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/web-servers/lighttpd/cgit.nix", {st_mode=S_IFREG|0444, st_size=1755, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/web-servers/lighttpd/cgit.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=1755, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.lighttpd.cgit;\n configFile = pkgs.writeText \"cgitrc\"\n ''\n ${cfg.configText}\n '';\nin\n{\n\n options.services.lighttpd.cgit = {\n\n enable = mkOption {\n default = false;\n type = types.bool;\n description = ''\n"..., 1755) = 1755 | |
close(3) = 0 | |
brk(0x19f86000) = 0x19f86000 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/web-servers/lighttpd/collectd.nix", {st_mode=S_IFREG|0444, st_size=1620, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/web-servers/lighttpd/collectd.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=1620, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.lighttpd.collectd;\n\n collectionConf = pkgs.writeText \"collection.conf\" ''\n datadir: \"${config.services.collectd.dataDir}\"\n libdir: \"${config.services.collectd.package}/lib/collectd\"\n '';\n\n defaultCollectionCgi = config.serv"..., 1620) = 1620 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/web-servers/lighttpd/default.nix", {st_mode=S_IFREG|0444, st_size=7336, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/web-servers/lighttpd/default.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=7336, ...}) = 0 | |
read(3, "# NixOS module for lighttpd web server\n\n{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.services.lighttpd;\n\n # List of known lighttpd modules, ordered by how the lighttpd documentation\n # recommends them being imported:\n # http://redmine.lighttpd.net/projects/1/wiki/Server_modulesDeta"..., 7336) = 7336 | |
close(3) = 0 | |
brk(0x19fa7000) = 0x19fa7000 | |
brk(0x19fa8000) = 0x19fa8000 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/web-servers/lighttpd/gitweb.nix", {st_mode=S_IFREG|0444, st_size=1686, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/web-servers/lighttpd/gitweb.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=1686, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.lighttpd.gitweb;\n gitwebConfigFile = pkgs.writeText \"gitweb.conf\" ''\n # path to git projects (<project>.git)\n $projectroot = \"${cfg.projectroot}\";\n ${cfg.extraConfig}\n '';\n\nin\n{\n\n options.services.lighttpd.gitweb = {\n\n "..., 1686) = 1686 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/web-servers/lighttpd/inginious.nix", {st_mode=S_IFREG|0444, st_size=9611, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/web-servers/lighttpd/inginious.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=9611, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\nwith lib;\n\nlet\n cfg = config.services.lighttpd.inginious;\n inginious = pkgs.inginious;\n execName = \"inginious-${if cfg.useLTI then \"lti\" else \"webapp\"}\";\n\n inginiousConfigFile = if cfg.configFile != null then cfg.configFile else pkgs.writeText \"inginious.yaml\" ''\n "..., 9611) = 9611 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/web-servers/mighttpd2.nix", {st_mode=S_IFREG|0444, st_size=4058, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/web-servers/mighttpd2.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=4058, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.mighttpd2;\n configFile = pkgs.writeText \"mighty-config\" cfg.config;\n routingFile = pkgs.writeText \"mighty-routing\" cfg.routing;\nin {\n options.services.mighttpd2 = {\n enable = mkEnableOption \"Mighttpd2 web server\";\n\n config "..., 4058) = 4058 | |
close(3) = 0 | |
brk(0x19fc9000) = 0x19fc9000 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/web-servers/minio.nix", {st_mode=S_IFREG|0444, st_size=3219, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/web-servers/minio.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=3219, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.minio;\nin\n{\n meta.maintainers = [ maintainers.bachp ];\n\n options.services.minio = {\n enable = mkEnableOption \"Minio Object Storage\";\n\n listenAddress = mkOption {\n default = \":9000\";\n type = types.str;\n descrip"..., 3219) = 3219 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/web-servers/nginx/default.nix", {st_mode=S_IFREG|0444, st_size=20055, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/web-servers/nginx/default.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=20055, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.nginx;\n virtualHosts = mapAttrs (vhostName: vhostConfig:\n let\n serverName = if vhostConfig.serverName != null\n then vhostConfig.serverName\n else vhostName;\n in\n vhostConfig // {\n inherit serverName;"..., 20055) = 20055 | |
close(3) = 0 | |
brk(0x19fea000) = 0x19fea000 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/web-servers/phpfpm/default.nix", {st_mode=S_IFREG|0444, st_size=4531, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/web-servers/phpfpm/default.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=4531, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.phpfpm;\n enabled = cfg.poolConfigs != {} || cfg.pools != {};\n\n stateDir = \"/run/phpfpm\";\n\n poolConfigs = cfg.poolConfigs // mapAttrs mkPool cfg.pools;\n\n mkPool = n: p: ''\n listen = ${p.listen}\n ${p.extraConfig}\n '';\n\n fp"..., 4531) = 4531 | |
close(3) = 0 | |
brk(0x1a00b000) = 0x1a00b000 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/web-servers/shellinabox.nix", {st_mode=S_IFREG|0444, st_size=3804, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/web-servers/shellinabox.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=3804, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.services.shellinabox;\n\n # If a certificate file is specified, shellinaboxd requires\n # a file descriptor to retrieve it\n fd = \"3\";\n createFd = optionalString (cfg.certFile != null) \"${fd}<${cfg.certFile}\";\n\n # Command line arguments fo"..., 3804) = 3804 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/web-servers/tomcat.nix", {st_mode=S_IFREG|0444, st_size=13453, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/web-servers/tomcat.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=13453, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.services.tomcat;\n tomcat = cfg.package;\nin\n\n{\n\n meta = {\n maintainers = with maintainers; [ danbst ];\n };\n\n ###### interface\n\n options = {\n\n services.tomcat = {\n\n enable = mkOption {\n default = false;\n descript"..., 13453) = 13453 | |
close(3) = 0 | |
brk(0x1a02c000) = 0x1a02c000 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/web-servers/traefik.nix", {st_mode=S_IFREG|0444, st_size=3372, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/web-servers/traefik.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=3372, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.traefik;\n configFile =\n if cfg.configFile == null then\n pkgs.runCommand \"config.toml\" {\n buildInputs = [ pkgs.remarshal ];\n } ''\n remarshal -if json -of toml \\\n < ${pkgs.writeText \"config.json\" ("..., 3372) = 3372 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/web-servers/uwsgi.nix", {st_mode=S_IFREG|0444, st_size=5387, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/web-servers/uwsgi.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=5387, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.uwsgi;\n\n uwsgi = pkgs.uwsgi.override {\n plugins = cfg.plugins;\n };\n\n buildCfg = name: c:\n let\n plugins =\n if any (n: !any (m: m == n) cfg.plugins) (c.plugins or [])\n then throw \"`plugins` attribute in UWS"..., 5387) = 5387 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/web-servers/varnish/default.nix", {st_mode=S_IFREG|0444, st_size=2763, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/web-servers/varnish/default.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=2763, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ...}:\n\nwith lib;\n\nlet\n cfg = config.services.varnish;\n\n commandLine = \"-f ${pkgs.writeText \"default.vcl\" cfg.config}\" +\n optionalString (cfg.extraModules != []) \" -p vmod_path='${makeSearchPathOutput \"lib\" \"lib/varnish/vmods\" ([pkgs.varnish] ++ cfg.extraModules)}' -r vmod"..., 2763) = 2763 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/web-servers/winstone.nix", {st_mode=S_IFREG|0444, st_size=3042, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/web-servers/winstone.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=3042, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.services.winstone;\n\n winstoneOpts = { name, ... }: {\n options = {\n name = mkOption {\n default = name;\n internal = true;\n };\n\n serviceName = mkOption {\n type = types.str;\n description = ''\n "..., 3042) = 3042 | |
close(3) = 0 | |
brk(0x1a04d000) = 0x1a04d000 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/web-servers/zope2.nix", {st_mode=S_IFREG|0444, st_size=7943, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/web-servers/zope2.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=7943, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.services.zope2;\n\n zope2Opts = { name, config, ... }: {\n options = {\n\n name = mkOption {\n default = \"${name}\";\n type = types.string;\n description = \"The name of the zope2 instance. If undefined, the name of the "..., 7943) = 7943 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/x11/colord.nix", {st_mode=S_IFREG|0444, st_size=682, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/x11/colord.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=682, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.services.colord;\n\nin {\n\n options = {\n\n services.colord = {\n enable = mkEnableOption \"colord, the color management daemon\";\n };\n\n };\n\n config = mkIf cfg.enable {\n\n services.dbus.packages = [ pkgs.colord ];\n\n services.udev"..., 682) = 682 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/x11/compton.nix", {st_mode=S_IFREG|0444, st_size=6415, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/x11/compton.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=6415, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\nwith builtins;\n\nlet\n\n cfg = config.services.compton;\n\n floatBetween = a: b: with lib; with types;\n addCheck str (x: versionAtLeast x a && versionOlder x b);\n\n pairOf = x: with types; addCheck (listOf x) (y: lib.length y == 2);\n\n opacityRules = optionalSt"..., 6415) = 6415 | |
close(3) = 0 | |
brk(0x1a06e000) = 0x1a06e000 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/x11/unclutter.nix", {st_mode=S_IFREG|0444, st_size=2005, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/x11/unclutter.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=2005, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet cfg = config.services.unclutter;\n\nin {\n options.services.unclutter = {\n\n enable = mkOption {\n description = \"Enable unclutter to hide your mouse cursor when inactive\";\n type = types.bool;\n default = false;\n };\n\n package = mkOption "..., 2005) = 2005 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/x11/unclutter-xfixes.nix", {st_mode=S_IFREG|0444, st_size=1600, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/x11/unclutter-xfixes.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=1600, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet cfg = config.services.unclutter-xfixes;\n\nin {\n options.services.unclutter-xfixes = {\n\n enable = mkOption {\n description = \"Enable unclutter-xfixes to hide your mouse cursor when inactive.\";\n type = types.bool;\n default = false;\n };\n\n "..., 1600) = 1600 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/x11/desktop-managers/default.nix", {st_mode=S_IFREG|0444, st_size=4226, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/x11/desktop-managers/default.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=4226, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n xcfg = config.services.xserver;\n cfg = xcfg.desktopManager;\n\n # If desktop manager `d' isn't capable of setting a background and\n # the xserver is enabled, `feh' or `xsetroot' are used as a fallback.\n needBGCond = d: ! (d ? bgSupport && d.bgSupport)"..., 4226) = 4226 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/x11/desktop-managers/none.nix", {st_mode=S_IFREG|0444, st_size=106, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/x11/desktop-managers/none.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=106, ...}) = 0 | |
read(3, "{\n services.xserver.desktopManager.session =\n [ { name = \"none\";\n start = \"\";\n }\n ];\n}\n", 106) = 106 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/x11/desktop-managers/xterm.nix", {st_mode=S_IFREG|0444, st_size=594, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/x11/desktop-managers/xterm.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=594, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.services.xserver.desktopManager.xterm;\n\nin\n\n{\n options = {\n\n services.xserver.desktopManager.xterm.enable = mkOption {\n default = true;\n description = \"Enable a xterm terminal as a desktop manager.\";\n };\n\n };\n\n config = m"..., 594) = 594 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/x11/desktop-managers/xfce.nix", {st_mode=S_IFREG|0444, st_size=3785, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/x11/desktop-managers/xfce.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=3785, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.xserver.desktopManager.xfce;\nin\n\n{\n options = {\n services.xserver.desktopManager.xfce = {\n enable = mkOption {\n type = types.bool;\n default = false;\n description = \"Enable the Xfce desktop environment.\""..., 3785) = 3785 | |
close(3) = 0 | |
brk(0x1a08f000) = 0x1a08f000 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/x11/desktop-managers/plasma5.nix", {st_mode=S_IFREG|0444, st_size=6342, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/x11/desktop-managers/plasma5.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=6342, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n xcfg = config.services.xserver;\n cfg = xcfg.desktopManager.plasma5;\n\n inherit (pkgs) kdeApplications plasma5 libsForQt5 qt5 xorg;\n\nin\n\n{\n options = {\n\n services.xserver.desktopManager.plasma5 = {\n enable = mkOption {\n type = types.bool"..., 6342) = 6342 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/x11/desktop-managers/lumina.nix", {st_mode=S_IFREG|0444, st_size=929, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/x11/desktop-managers/lumina.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=929, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n xcfg = config.services.xserver;\n cfg = xcfg.desktopManager.lumina;\n\nin\n\n{\n options = {\n\n services.xserver.desktopManager.lumina.enable = mkOption {\n type = types.bool;\n default = false;\n description = \"Enable the Lumina desktop manag"..., 929) = 929 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/x11/desktop-managers/lxqt.nix", {st_mode=S_IFREG|0444, st_size=1565, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/x11/desktop-managers/lxqt.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=1565, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n # Remove packages of ys from xs, based on their names\n removePackagesByName = xs: ys:\n let\n pkgName = drv: (builtins.parseDrvName drv.name).name;\n ysNames = map pkgName ys;\n in\n filter (x: !(builtins.elem (pkgName x) ysNames)) xs;\n"..., 1565) = 1565 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/x11/desktop-managers/enlightenment.nix", {st_mode=S_IFREG|0444, st_size=2832, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/x11/desktop-managers/enlightenment.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=2832, ...}) = 0 | |
read(3, "{ config, pkgs, lib, ... }:\n\nwith lib;\n\nlet\n\n e = pkgs.enlightenment;\n xcfg = config.services.xserver;\n cfg = xcfg.desktopManager.enlightenment;\n GST_PLUGIN_PATH = lib.makeSearchPathOutput \"lib\" \"lib/gstreamer-1.0\" [\n pkgs.gst_all_1.gst-plugins-base\n pkgs.gst_all_1.gst-plugins-good\n pkg"..., 2832) = 2832 | |
close(3) = 0 | |
brk(0x1a0b0000) = 0x1a0b0000 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/x11/desktop-managers/gnome3.nix", {st_mode=S_IFREG|0444, st_size=7994, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/x11/desktop-managers/gnome3.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=7994, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.xserver.desktopManager.gnome3;\n\n # Remove packages of ys from xs, based on their names\n removePackagesByName = xs: ys:\n let\n pkgName = drv: (builtins.parseDrvName drv.name).name;\n ysNames = map pkgName ys;\n res ="..., 7994) = 7994 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/x11/desktop-managers/kodi.nix", {st_mode=S_IFREG|0444, st_size=579, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/x11/desktop-managers/kodi.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=579, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.xserver.desktopManager.kodi;\nin\n\n{\n options = {\n services.xserver.desktopManager.kodi = {\n enable = mkOption {\n default = false;\n description = \"Enable the kodi multimedia center.\";\n };\n };\n };\n\n con"..., 579) = 579 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/x11/desktop-managers/maxx.nix", {st_mode=S_IFREG|0444, st_size=540, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/x11/desktop-managers/maxx.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=540, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n xcfg = config.services.xserver;\n cfg = xcfg.desktopManager.maxx;\nin {\n options.services.xserver.desktopManager.maxx = {\n enable = mkEnableOption \"MaXX desktop environment\";\n };\n\n config = mkIf (xcfg.enable && cfg.enable) {\n environment.systemPa"..., 540) = 540 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/x11/desktop-managers/mate.nix", {st_mode=S_IFREG|0444, st_size=3634, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/x11/desktop-managers/mate.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=3634, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n # Remove packages of ys from xs, based on their names\n removePackagesByName = xs: ys:\n let\n pkgName = drv: (builtins.parseDrvName drv.name).name;\n ysNames = map pkgName ys;\n in\n filter (x: !(builtins.elem (pkgName x) ysNames)) xs;\n"..., 3634) = 3634 | |
close(3) = 0 | |
brk(0x1a0d1000) = 0x1a0d1000 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/x11/display-managers/auto.nix", {st_mode=S_IFREG|0444, st_size=853, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/x11/display-managers/auto.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=853, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n dmcfg = config.services.xserver.displayManager;\n cfg = dmcfg.auto;\n\nin\n\n{\n\n ###### interface\n\n options = {\n\n services.xserver.displayManager.auto = {\n\n enable = mkOption {\n default = false;\n description = ''\n Whether to"..., 853) = 853 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/x11/display-managers/default.nix", {st_mode=S_IFREG|0444, st_size=11710, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/x11/display-managers/default.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=11710, ...}) = 0 | |
read(3, "# This module declares the options to define a *display manager*, the\n# program responsible for handling X logins (such as xdm, gdb, or\n# SLiM). The display manager allows the user to select a *session\n# type*. When the user logs in, the display manager starts the\n# *session script* (\"xsession\" be"..., 11710) = 11710 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/x11/display-managers/gdm.nix", {st_mode=S_IFREG|0444, st_size=8798, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/x11/display-managers/gdm.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=8798, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.services.xserver.displayManager;\n gdm = pkgs.gnome3.gdm;\n\nin\n\n{\n\n ###### interface\n\n options = {\n\n services.xserver.displayManager.gdm = {\n\n enable = mkEnableOption ''\n GDM as the display manager.\n <emphasis>GDM in "..., 8798) = 8798 | |
close(3) = 0 | |
brk(0x1a0f2000) = 0x1a0f2000 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/x11/display-managers/lightdm.nix", {st_mode=S_IFREG|0444, st_size=7669, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/x11/display-managers/lightdm.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=7669, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n xcfg = config.services.xserver;\n dmcfg = xcfg.displayManager;\n xEnv = config.systemd.services.\"display-manager\".environment;\n cfg = dmcfg.lightdm;\n\n inherit (pkgs) stdenv lightdm writeScript writeText;\n\n # lightdm runs with clearenv(), but we need "..., 7669) = 7669 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/x11/display-managers/lightdm-greeters/gtk.nix", {st_mode=S_IFREG|0444, st_size=4643, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/x11/display-managers/lightdm-greeters/gtk.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=4643, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n dmcfg = config.services.xserver.displayManager;\n ldmcfg = dmcfg.lightdm;\n cfg = ldmcfg.greeters.gtk;\n\n inherit (pkgs) stdenv lightdm writeScript writeText;\n\n theme = cfg.theme.package;\n icons = cfg.iconTheme.package;\n\n # The default greeter provid"..., 4643) = 4643 | |
close(3) = 0 | |
brk(0x1a113000) = 0x1a113000 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/x11/display-managers/sddm.nix", {st_mode=S_IFREG|0444, st_size=7648, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/x11/display-managers/sddm.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=7648, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n xcfg = config.services.xserver;\n dmcfg = xcfg.displayManager;\n cfg = dmcfg.sddm;\n xEnv = config.systemd.services.\"display-manager\".environment;\n\n inherit (pkgs) sddm;\n\n xserverWrapper = pkgs.writeScript \"xserver-wrapper\" ''\n #!/bin/sh\n ${conc"..., 7648) = 7648 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/x11/display-managers/slim.nix", {st_mode=S_IFREG|0444, st_size=4555, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/x11/display-managers/slim.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=4555, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n dmcfg = config.services.xserver.displayManager;\n\n cfg = dmcfg.slim;\n\n slimConfig = pkgs.writeText \"slim.cfg\"\n ''\n xauth_path ${dmcfg.xauthBin}\n default_xserver ${dmcfg.xserverBin}\n xserver_arguments ${toString dmcfg.xserverArgs}\n "..., 4555) = 4555 | |
close(3) = 0 | |
brk(0x1a134000) = 0x1a134000 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/x11/display-managers/xpra.nix", {st_mode=S_IFREG|0444, st_size=12072, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/x11/display-managers/xpra.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=12072, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.xserver.displayManager.xpra;\n dmcfg = config.services.xserver.displayManager;\n\nin\n\n{\n ###### interface\n\n options = {\n services.xserver.displayManager.xpra = {\n enable = mkOption {\n type = types.bool;\n defaul"..., 12072) = 12072 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/x11/fractalart.nix", {st_mode=S_IFREG|0444, st_size=1004, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/x11/fractalart.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=1004, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\nwith lib;\nlet\n cfg = config.services.fractalart;\nin {\n options.services.fractalart = {\n enable = mkOption {\n type = types.bool;\n default = false;\n example = true;\n description = \"Enable FractalArt for generating colorful wallpapers on login\";\n "..., 1004) = 1004 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/x11/hardware/libinput.nix", {st_mode=S_IFREG|0444, st_size=8614, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/x11/hardware/libinput.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=8614, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet cfg = config.services.xserver.libinput;\n xorgBool = v: if v then \"on\" else \"off\";\nin {\n\n options = {\n\n services.xserver.libinput = {\n\n enable = mkEnableOption \"libinput\";\n\n dev = mkOption {\n type = types.nullOr types.str;\n de"..., 8614) = 8614 | |
close(3) = 0 | |
brk(0x1a155000) = 0x1a155000 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/x11/hardware/multitouch.nix", {st_mode=S_IFREG|0444, st_size=2433, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/x11/hardware/multitouch.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=2433, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet cfg = config.services.xserver.multitouch;\n disabledTapConfig = ''\n Option \"MaxTapTime\" \"0\"\n Option \"MaxTapMove\" \"0\"\n Option \"TapButton1\" \"0\"\n Option \"TapButton2\" \"0\"\n Option \"TapButton3\" \"0\"\n '';\nin {\n\n options = {\n\n serv"..., 2433) = 2433 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/x11/hardware/synaptics.nix", {st_mode=S_IFREG|0444, st_size=7019, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/x11/hardware/synaptics.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=7019, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet cfg = config.services.xserver.synaptics;\n tapConfig = if cfg.tapButtons then enabledTapConfig else disabledTapConfig;\n enabledTapConfig = ''\n Option \"MaxTapTime\" \"180\"\n Option \"MaxTapMove\" \"220\"\n Option \"TapButton1\" \"${builtins.elemAt "..., 7019) = 7019 | |
close(3) = 0 | |
brk(0x1a176000) = 0x1a176000 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/x11/hardware/wacom.nix", {st_mode=S_IFREG|0444, st_size=1025, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/x11/hardware/wacom.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=1025, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.services.xserver.wacom;\n\nin\n\n{\n\n options = {\n\n services.xserver.wacom = {\n\n enable = mkOption {\n default = false;\n description = ''\n Whether to enable the Wacom touchscreen/digitizer/tablet.\n If you "..., 1025) = 1025 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/x11/redshift.nix", {st_mode=S_IFREG|0444, st_size=3897, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/x11/redshift.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=3897, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.services.redshift;\n\nin {\n\n options.services.redshift = {\n enable = mkOption {\n type = types.bool;\n default = false;\n description = ''\n Enable Redshift to change your screen's colour temperature depending on\n "..., 3897) = 3897 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/x11/urxvtd.nix", {st_mode=S_IFREG|0444, st_size=1157, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/x11/urxvtd.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=1157, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\n# maintainer: siddharthist\n\nwith lib;\n\nlet\n cfg = config.services.urxvtd;\nin {\n\n options.services.urxvtd.enable = mkOption {\n type = types.bool;\n default = false;\n description = ''\n Enable urxvtd, the urxvt terminal daemon. To use urxvtd, run\n \"urxvt"..., 1157) = 1157 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/x11/window-managers/awesome.nix", {st_mode=S_IFREG|0444, st_size=1350, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/x11/window-managers/awesome.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=1350, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.services.xserver.windowManager.awesome;\n awesome = cfg.package;\n getLuaPath = lib : dir : \"${lib}/${dir}/lua/${pkgs.luaPackages.lua.luaversion}\";\n makeSearchPath = lib.concatMapStrings (path:\n \" --search \" + (getLuaPath path \"share\") "..., 1350) = 1350 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/x11/window-managers/default.nix", {st_mode=S_IFREG|0444, st_size=1621, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/x11/window-managers/default.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=1621, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.xserver.windowManager;\nin\n\n{\n imports = [\n ./2bwm.nix\n ./afterstep.nix\n ./bspwm.nix\n ./dwm.nix\n ./exwm.nix\n ./fluxbox.nix\n ./fvwm.nix\n ./herbstluftwm.nix\n ./i3.nix\n ./jwm.nix\n ./metacity.nix\n ./m"..., 1621) = 1621 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/x11/window-managers/2bwm.nix", {st_mode=S_IFREG|0444, st_size=526, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/x11/window-managers/2bwm.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=526, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.services.xserver.windowManager.\"2bwm\";\n\nin\n\n{\n\n ###### interface\n\n options = {\n services.xserver.windowManager.\"2bwm\".enable = mkEnableOption \"2bwm\";\n };\n\n\n ###### implementation\n\n config = mkIf cfg.enable {\n\n services.xserver.wi"..., 526) = 526 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/x11/window-managers/afterstep.nix", {st_mode=S_IFREG|0444, st_size=518, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/x11/window-managers/afterstep.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=518, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.xserver.windowManager.afterstep;\nin\n{\n ###### interface\n options = {\n services.xserver.windowManager.afterstep.enable = mkEnableOption \"afterstep\";\n };\n\n ###### implementation\n config = mkIf cfg.enable {\n services.xserver"..., 518) = 518 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/x11/window-managers/bspwm.nix", {st_mode=S_IFREG|0444, st_size=2560, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/x11/window-managers/bspwm.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=2560, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.xserver.windowManager.bspwm;\nin\n\n{\n options = {\n services.xserver.windowManager.bspwm = {\n enable = mkEnableOption \"bspwm\";\n\n package = mkOption {\n type = types.package;\n default = pkgs.bspwm;\n"..., 2560) = 2560 | |
close(3) = 0 | |
brk(0x1a197000) = 0x1a197000 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/x11/window-managers/dwm.nix", {st_mode=S_IFREG|0444, st_size=513, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/x11/window-managers/dwm.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=513, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.services.xserver.windowManager.dwm;\n\nin\n\n{\n\n ###### interface\n\n options = {\n services.xserver.windowManager.dwm.enable = mkEnableOption \"dwm\";\n };\n\n\n ###### implementation\n\n config = mkIf cfg.enable {\n\n services.xserver.windowMan"..., 513) = 513 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/x11/window-managers/exwm.nix", {st_mode=S_IFREG|0444, st_size=1380, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/x11/window-managers/exwm.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=1380, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.xserver.windowManager.exwm;\n loadScript = pkgs.writeText \"emacs-exwm-load\" ''\n (require 'exwm)\n ${optionalString cfg.enableDefaultConfig ''\n (require 'exwm-config)\n (exwm-config-default)\n ''}\n '';\n packages = e"..., 1380) = 1380 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/x11/window-managers/fluxbox.nix", {st_mode=S_IFREG|0444, st_size=509, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/x11/window-managers/fluxbox.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=509, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.xserver.windowManager.fluxbox;\nin\n{\n ###### interface\n options = {\n services.xserver.windowManager.fluxbox.enable = mkEnableOption \"fluxbox\";\n };\n\n ###### implementation\n config = mkIf cfg.enable {\n services.xserver.windo"..., 509) = 509 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/x11/window-managers/fvwm.nix", {st_mode=S_IFREG|0444, st_size=765, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/x11/window-managers/fvwm.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=765, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.xserver.windowManager.fvwm;\n fvwm = pkgs.fvwm.override { gestures = cfg.gestures; };\nin\n\n{\n\n ###### interface\n\n options = {\n services.xserver.windowManager.fvwm = {\n enable = mkEnableOption \"Fvwm window manager\";\n\n g"..., 765) = 765 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/x11/window-managers/herbstluftwm.nix", {st_mode=S_IFREG|0444, st_size=954, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/x11/window-managers/herbstluftwm.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=954, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.xserver.windowManager.herbstluftwm;\nin\n\n{\n options = {\n services.xserver.windowManager.herbstluftwm = {\n enable = mkEnableOption \"herbstluftwm\";\n\n configFile = mkOption {\n default = null;\n type "..., 954) = 954 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/x11/window-managers/i3.nix", {st_mode=S_IFREG|0444, st_size=1850, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/x11/window-managers/i3.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=1850, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.xserver.windowManager.i3;\nin\n\n{\n options.services.xserver.windowManager.i3 = {\n enable = mkEnableOption \"i3 window manager\";\n\n configFile = mkOption {\n default = null;\n type = with types; nullOr path;\n "..., 1850) = 1850 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/x11/window-managers/jwm.nix", {st_mode=S_IFREG|0444, st_size=476, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/x11/window-managers/jwm.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=476, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.xserver.windowManager.jwm;\nin\n{\n ###### interface\n options = {\n services.xserver.windowManager.jwm.enable = mkEnableOption \"jwm\";\n };\n\n ###### implementation\n config = mkIf cfg.enable {\n services.xserver.windowManager.ses"..., 476) = 476 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/x11/window-managers/metacity.nix", {st_mode=S_IFREG|0444, st_size=864, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/x11/window-managers/metacity.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=864, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.services.xserver.windowManager.metacity;\n xorg = config.services.xserver.package;\n gnome = pkgs.gnome;\n\nin\n\n{\n options = {\n services.xserver.windowManager.metacity.enable = mkEnableOption \"metacity\";\n };\n\n config = mkIf cfg.enable {"..., 864) = 864 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/x11/window-managers/mwm.nix", {st_mode=S_IFREG|0444, st_size=480, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/x11/window-managers/mwm.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=480, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.xserver.windowManager.mwm;\nin\n{\n ###### interface\n options = {\n services.xserver.windowManager.mwm.enable = mkEnableOption \"mwm\";\n };\n\n ###### implementation\n config = mkIf cfg.enable {\n services.xserver.windowManager.ses"..., 480) = 480 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/x11/window-managers/openbox.nix", {st_mode=S_IFREG|0444, st_size=494, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/x11/window-managers/openbox.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=494, ...}) = 0 | |
read(3, "{lib, pkgs, config, ...}:\n\nwith lib;\nlet\n inherit (lib) mkOption mkIf;\n cfg = config.services.xserver.windowManager.openbox;\nin\n\n{\n options = {\n services.xserver.windowManager.openbox.enable = mkEnableOption \"openbox\";\n };\n\n config = mkIf cfg.enable {\n services.xserver.windowManager = {\n "..., 494) = 494 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/x11/window-managers/pekwm.nix", {st_mode=S_IFREG|0444, st_size=490, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/x11/window-managers/pekwm.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=490, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.xserver.windowManager.pekwm;\nin\n{\n ###### interface\n options = {\n services.xserver.windowManager.pekwm.enable = mkEnableOption \"pekwm\";\n };\n\n ###### implementation\n config = mkIf cfg.enable {\n services.xserver.windowManag"..., 490) = 490 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/x11/window-managers/notion.nix", {st_mode=S_IFREG|0444, st_size=476, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/x11/window-managers/notion.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=476, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.xserver.windowManager.notion;\nin\n\n{\n options = {\n services.xserver.windowManager.notion.enable = mkEnableOption \"notion\";\n };\n\n config = mkIf cfg.enable {\n services.xserver.windowManager = {\n session = [{\n name "..., 476) = 476 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/x11/window-managers/ratpoison.nix", {st_mode=S_IFREG|0444, st_size=518, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/x11/window-managers/ratpoison.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=518, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.xserver.windowManager.ratpoison;\nin\n{\n ###### interface\n options = {\n services.xserver.windowManager.ratpoison.enable = mkEnableOption \"ratpoison\";\n };\n\n ###### implementation\n config = mkIf cfg.enable {\n services.xserver"..., 518) = 518 | |
close(3) = 0 | |
brk(0x1a1b9000) = 0x1a1b9000 | |
brk(0x1a1b6000) = 0x1a1b6000 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/x11/window-managers/sawfish.nix", {st_mode=S_IFREG|0444, st_size=504, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/x11/window-managers/sawfish.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=504, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.xserver.windowManager.sawfish;\nin\n{\n ###### interface\n options = {\n services.xserver.windowManager.sawfish.enable = mkEnableOption \"sawfish\";\n };\n\n ###### implementation\n config = mkIf cfg.enable {\n services.xserver.windo"..., 504) = 504 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/x11/window-managers/stumpwm.nix", {st_mode=S_IFREG|0444, st_size=462, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/x11/window-managers/stumpwm.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=462, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.xserver.windowManager.stumpwm;\nin\n\n{\n options = {\n services.xserver.windowManager.stumpwm.enable = mkEnableOption \"stumpwm\";\n };\n\n config = mkIf cfg.enable {\n services.xserver.windowManager.session = singleton {\n name "..., 462) = 462 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/x11/window-managers/spectrwm.nix", {st_mode=S_IFREG|0444, st_size=491, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/x11/window-managers/spectrwm.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=491, ...}) = 0 | |
read(3, "\n{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.xserver.windowManager.spectrwm;\nin\n\n{\n options = {\n services.xserver.windowManager.spectrwm.enable = mkEnableOption \"spectrwm\";\n };\n\n config = mkIf cfg.enable {\n services.xserver.windowManager = {\n session = [{\n "..., 491) = 491 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/x11/window-managers/twm.nix", {st_mode=S_IFREG|0444, st_size=523, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/x11/window-managers/twm.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=523, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.services.xserver.windowManager.twm;\n\nin\n\n{\n\n ###### interface\n\n options = {\n services.xserver.windowManager.twm.enable = mkEnableOption \"twm\";\n };\n\n\n ###### implementation\n\n config = mkIf cfg.enable {\n\n services.xserver.windowMan"..., 523) = 523 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/x11/window-managers/windowmaker.nix", {st_mode=S_IFREG|0444, st_size=527, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/x11/window-managers/windowmaker.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=527, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.xserver.windowManager.windowmaker;\nin\n{\n ###### interface\n options = {\n services.xserver.windowManager.windowmaker.enable = mkEnableOption \"windowmaker\";\n };\n\n ###### implementation\n config = mkIf cfg.enable {\n services.x"..., 527) = 527 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/x11/window-managers/wmii.nix", {st_mode=S_IFREG|0444, st_size=1222, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/x11/window-managers/wmii.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=1222, ...}) = 0 | |
read(3, "{ config, lib, pkgs, options, modulesPath, ... }:\n\nwith lib;\nlet\n inherit (lib) mkOption mkIf singleton;\n cfg = config.services.xserver.windowManager.wmii;\n wmii = pkgs.wmii_hg;\nin\n{\n options = {\n services.xserver.windowManager.wmii.enable = mkEnableOption \"wmii\";\n };\n\n config = mkIf cfg.en"..., 1222) = 1222 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/x11/window-managers/xmonad.nix", {st_mode=S_IFREG|0444, st_size=1971, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/x11/window-managers/xmonad.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=1971, ...}) = 0 | |
read(3, "{pkgs, lib, config, ...}:\n\nwith lib;\nlet\n inherit (lib) mkOption mkIf optionals literalExample;\n cfg = config.services.xserver.windowManager.xmonad;\n xmonad = pkgs.xmonad-with-packages.override {\n ghcWithPackages = cfg.haskellPackages.ghcWithPackages;\n packages = self: cfg.extraPackages sel"..., 1971) = 1971 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/x11/window-managers/qtile.nix", {st_mode=S_IFREG|0444, st_size=445, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/x11/window-managers/qtile.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=445, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.xserver.windowManager.qtile;\nin\n\n{\n options = {\n services.xserver.windowManager.qtile.enable = mkEnableOption \"qtile\";\n };\n\n config = mkIf cfg.enable {\n services.xserver.windowManager.session = [{\n name = \"qtile\";\n "..., 445) = 445 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/x11/window-managers/none.nix", {st_mode=S_IFREG|0444, st_size=160, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/x11/window-managers/none.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=160, ...}) = 0 | |
read(3, "{\n services = {\n xserver = {\n windowManager = {\n session = [{\n name = \"none\";\n start = \"\";\n }];\n };\n };\n };\n}\n", 160) = 160 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/x11/window-managers/icewm.nix", {st_mode=S_IFREG|0444, st_size=517, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/x11/window-managers/icewm.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=517, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.xserver.windowManager.icewm;\nin\n{\n ###### interface\n options = {\n services.xserver.windowManager.icewm.enable = mkEnableOption \"icewm\";\n };\n\n ###### implementation\n config = mkIf cfg.enable {\n services.xserver.windowManag"..., 517) = 517 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/x11/window-managers/windowlab.nix", {st_mode=S_IFREG|0444, st_size=459, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/x11/window-managers/windowlab.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=459, ...}) = 0 | |
read(3, "{lib, pkgs, config, ...}:\n\nlet\n cfg = config.services.xserver.windowManager.windowlab;\nin\n\n{\n options = {\n services.xserver.windowManager.windowlab.enable =\n lib.mkEnableOption \"windowlab\";\n };\n\n config = lib.mkIf cfg.enable {\n services.xserver.windowManager = {\n session =\n "..., 459) = 459 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/x11/xautolock.nix", {st_mode=S_IFREG|0444, st_size=4192, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/x11/xautolock.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=4192, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.xserver.xautolock;\nin\n {\n options = {\n services.xserver.xautolock = {\n enable = mkEnableOption \"xautolock\";\n enableNotifier = mkEnableOption \"xautolock.notify\" // {\n description = ''\n Wheth"..., 4192) = 4192 | |
close(3) = 0 | |
brk(0x1a1d7000) = 0x1a1d7000 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/x11/xbanish.nix", {st_mode=S_IFREG|0444, st_size=698, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/x11/xbanish.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=698, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet cfg = config.services.xbanish;\n\nin {\n options.services.xbanish = {\n\n enable = mkEnableOption \"xbanish\";\n\n arguments = mkOption {\n description = \"Arguments to pass to xbanish command\";\n default = \"\";\n example = \"-d -i shift\";\n typ"..., 698) = 698 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/x11/xfs.nix", {st_mode=S_IFREG|0444, st_size=772, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/x11/xfs.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=772, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n configFile = ./xfs.conf;\n\nin\n\n{\n\n ###### interface\n\n options = {\n\n services.xfs = {\n\n enable = mkOption {\n type = types.bool;\n default = false;\n description = \"Whether to enable the X Font Server.\";\n };\n\n };\n\n };\n"..., 772) = 772 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/x11/xserver.nix", {st_mode=S_IFREG|0444, st_size=24895, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/x11/xserver.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=24895, ...}) = 0 | |
read(3, "{ config, lib, pkgs, pkgs_i686, ... }:\n\nwith lib;\n\nlet\n\n kernelPackages = config.boot.kernelPackages;\n\n # Abbreviations.\n cfg = config.services.xserver;\n xorg = pkgs.xorg;\n\n\n # Map video driver names to driver packages. FIXME: move into card-specific modules.\n knownVideoDrivers = {\n virtual"..., 24895) = 24895 | |
close(3) = 0 | |
brk(0x1a1f8000) = 0x1a1f8000 | |
brk(0x1a219000) = 0x1a219000 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/system/activation/activation-script.nix", {st_mode=S_IFREG|0444, st_size=4912, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/system/activation/activation-script.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=4912, ...}) = 0 | |
read(3, "# generate the script used to activate the configuration.\n{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n addAttributeName = mapAttrs (a: v: v // {\n text = ''\n #### Activation script snippet ${a}:\n ${v.text}\n '';\n });\n\n path = with pkgs; map getBin\n [ coreutils\n gnugrep\n "..., 4912) = 4912 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/system/activation/top-level.nix", {st_mode=S_IFREG|0444, st_size=8504, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/system/activation/top-level.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=8504, ...}) = 0 | |
read(3, "{ config, lib, pkgs, modules, baseModules, ... }:\n\nwith lib;\n\nlet\n\n\n # This attribute is responsible for creating boot entries for\n # child configuration. They are only (directly) accessible\n # when the parent configuration is boot default. For example,\n # you can provide an easy way to boot the"..., 8504) = 8504 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/system/boot/binfmt.nix", {st_mode=S_IFREG|0444, st_size=4741, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/system/boot/binfmt.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=4741, ...}) = 0 | |
read(3, "{ config, lib, ... }:\nlet\n inherit (lib) mkOption types optionalString;\n\n cfg = config.boot.binfmtMiscRegistrations;\n\n makeBinfmtLine = name: { recognitionType, offset, magicOrExtension\n , mask, preserveArgvZero, openBinary\n , matchCredentials, fixB"..., 4741) = 4741 | |
close(3) = 0 | |
brk(0x1a23a000) = 0x1a23a000 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/system/boot/coredump.nix", {st_mode=S_IFREG|0444, st_size=1689, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/system/boot/coredump.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=1689, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\n{\n\n options = {\n\n systemd.coredump = {\n\n enable = mkOption {\n default = false;\n type = types.bool;\n description = ''\n Enables storing core dumps in systemd.\n Note that this alone is not enough to enable core dump"..., 1689) = 1689 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/system/boot/emergency-mode.nix", {st_mode=S_IFREG|0444, st_size=762, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/system/boot/emergency-mode.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=762, ...}) = 0 | |
read(3, "{ config, lib, ... }:\n\nwith lib;\n\n{\n\n ###### interface\n\n options = {\n\n systemd.enableEmergencyMode = mkOption {\n default = true;\n type = types.bool;\n description = ''\n Whether to enable emergency mode, which is an\n <command>sulogin</command> shell started on the con"..., 762) = 762 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/system/boot/grow-partition.nix", {st_mode=S_IFREG|0444, st_size=1206, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/system/boot/grow-partition.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=1206, ...}) = 0 | |
read(3, "# This module automatically grows the root partition.\n# This allows an instance to be created with a bigger root filesystem\n# than provided by the machine image.\n\n{ config, lib, pkgs, ... }:\n\nwith lib;\n\n{\n\n options = {\n boot.growPartition = mkEnableOption \"grow the root partition on boot\";\n };\n"..., 1206) = 1206 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/system/boot/initrd-network.nix", {st_mode=S_IFREG|0444, st_size=2667, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/system/boot/initrd-network.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=2667, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.boot.initrd.network;\n\n udhcpcScript = pkgs.writeScript \"udhcp-script\"\n ''\n #! /bin/sh\n if [ \"$1\" = bound ]; then\n ip address add \"$ip/$mask\" dev \"$interface\"\n if [ -n \"$router\" ]; then\n ip route add defa"..., 2667) = 2667 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/system/boot/initrd-ssh.nix", {st_mode=S_IFREG|0444, st_size=3968, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/system/boot/initrd-ssh.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=3968, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.boot.initrd.network.ssh;\n\nin\n\n{\n\n options = {\n\n boot.initrd.network.ssh.enable = mkOption {\n type = types.bool;\n default = false;\n description = ''\n Start SSH service during initrd boot. It can be used to debug fai"..., 3968) = 3968 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/system/boot/kernel.nix", {st_mode=S_IFREG|0444, st_size=10201, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/system/boot/kernel.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=10201, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n inherit (config.boot) kernelPatches;\n inherit (config.boot.kernel) features;\n inherit (config.boot.kernelPackages) kernel;\n\n kernelModulesConf = pkgs.writeText \"nixos.conf\"\n ''\n ${concatStringsSep \"\\n\" config.boot.kernelModules}\n '';\n\nin\n\n"..., 10201) = 10201 | |
close(3) = 0 | |
brk(0x1a25b000) = 0x1a25b000 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/system/boot/kexec.nix", {st_mode=S_IFREG|0444, st_size=610, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/system/boot/kexec.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=610, ...}) = 0 | |
read(3, "{ config, pkgs, ... }:\n\n{\n environment.systemPackages = [ pkgs.kexectools ];\n\n systemd.services.\"prepare-kexec\" =\n { description = \"Preparation for kexec\";\n wantedBy = [ \"kexec.target\" ];\n before = [ \"systemd-kexec.service\" ];\n unitConfig.DefaultDependencies = false;\n servic"..., 610) = 610 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/system/boot/loader/efi.nix", {st_mode=S_IFREG|0444, st_size=413, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/system/boot/loader/efi.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=413, ...}) = 0 | |
read(3, "{ lib, ... }:\n\nwith lib;\n\n{\n options.boot.loader.efi = {\n\n canTouchEfiVariables = mkOption {\n default = false;\n type = types.bool;\n description = \"Whether the installation process is allowed to modify EFI boot variables.\";\n };\n\n efiSysMountPoint = mkOption {\n default = "..., 413) = 413 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/system/boot/loader/generations-dir/generations-dir.nix", {st_mode=S_IFREG|0444, st_size=1771, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/system/boot/loader/generations-dir/generations-dir.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=1771, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n generationsDirBuilder = pkgs.substituteAll {\n src = ./generations-dir-builder.sh;\n isExecutable = true;\n inherit (pkgs) bash;\n path = [pkgs.coreutils pkgs.gnused pkgs.gnugrep];\n inherit (config.boot.loader.generationsDir) copyKernels;\n }"..., 1771) = 1771 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/system/boot/loader/generic-extlinux-compatible", {st_mode=S_IFDIR|0555, st_size=5, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/system/boot/loader/generic-extlinux-compatible/default.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=1278, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n blCfg = config.boot.loader;\n cfg = blCfg.generic-extlinux-compatible;\n\n timeoutStr = if blCfg.timeout == null then \"-1\" else toString blCfg.timeout;\n\n builder = import ./extlinux-conf-builder.nix { inherit pkgs; };\nin\n{\n options = {\n boot.loader.g"..., 1278) = 1278 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/system/boot/loader/grub/grub.nix", {st_mode=S_IFREG|0444, st_size=22056, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/system/boot/loader/grub/grub.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=22056, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.boot.loader.grub;\n\n efi = config.boot.loader.efi;\n\n realGrub = if cfg.version == 1 then pkgs.grub\n else if cfg.zfsSupport then pkgs.grub2.override { zfsSupport = true; }\n else if cfg.trustedBoot.enable\n then if cfg.trustedBo"..., 22056) = 22056 | |
close(3) = 0 | |
brk(0x1a27c000) = 0x1a27c000 | |
brk(0x1a29d000) = 0x1a29d000 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/system/boot/loader/grub/ipxe.nix", {st_mode=S_IFREG|0444, st_size=1494, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/system/boot/loader/grub/ipxe.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=1494, ...}) = 0 | |
read(3, "# This module adds a scripted iPXE entry to the GRUB boot menu.\n\n{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n scripts = builtins.attrNames config.boot.loader.grub.ipxe;\n\n grubEntry = name:\n ''\n menuentry \"iPXE - ${name}\" {\n linux16 @bootRoot@/ipxe.lkrn\n initrd16 @bootRoot@/${"..., 1494) = 1494 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/system/boot/loader/grub/memtest.nix", {st_mode=S_IFREG|0444, st_size=2415, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/system/boot/loader/grub/memtest.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=2415, ...}) = 0 | |
read(3, "# This module adds Memtest86+ to the GRUB boot menu.\n\n{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n memtest86 = pkgs.memtest86plus;\n cfg = config.boot.loader.grub.memtest86;\nin\n\n{\n options = {\n\n boot.loader.grub.memtest86 = {\n\n enable = mkOption {\n default = false;\n type = ty"..., 2415) = 2415 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/system/boot/loader/init-script/init-script.nix", {st_mode=S_IFREG|0444, st_size=1045, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/system/boot/loader/init-script/init-script.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=1045, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n initScriptBuilder = pkgs.substituteAll {\n src = ./init-script-builder.sh;\n isExecutable = true;\n inherit (pkgs) bash;\n path = [pkgs.coreutils pkgs.gnused pkgs.gnugrep];\n };\n\nin\n\n{\n\n ###### interface\n\n options = {\n\n boot.loader.initScri"..., 1045) = 1045 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/system/boot/loader/loader.nix", {st_mode=S_IFREG|0444, st_size=371, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/system/boot/loader/loader.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=371, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\n{\n options = {\n boot.loader.timeout = mkOption {\n default = 5;\n type = types.nullOr types.int;\n description = ''\n Timeout (in seconds) until loader boots the default menu item. Use null if the loader men"..., 371) = 371 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/system/boot/loader/raspberrypi/raspberrypi.nix", {st_mode=S_IFREG|0444, st_size=1041, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/system/boot/loader/raspberrypi/raspberrypi.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=1041, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.boot.loader.raspberryPi;\n\n builder = pkgs.substituteAll {\n src = ./builder.sh;\n isExecutable = true;\n inherit (pkgs) bash;\n path = [pkgs.coreutils pkgs.gnused pkgs.gnugrep];\n firmware = pkgs.raspberrypifw;\n version = cfg.v"..., 1041) = 1041 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/system/boot/loader/systemd-boot/systemd-boot.nix", {st_mode=S_IFREG|0444, st_size=1860, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/system/boot/loader/systemd-boot/systemd-boot.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=1860, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.boot.loader.systemd-boot;\n\n efi = config.boot.loader.efi;\n\n gummibootBuilder = pkgs.substituteAll {\n src = ./systemd-boot-builder.py;\n\n isExecutable = true;\n\n inherit (pkgs) python3;\n\n systemd = config.systemd.package;\n\n nix"..., 1860) = 1860 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/system/boot/luksroot.nix", {st_mode=S_IFREG|0444, st_size=17476, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/system/boot/luksroot.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=17476, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n luks = config.boot.initrd.luks;\n\n openCommand = name': { name, device, header, keyFile, keyFileSize, allowDiscards, yubikey, ... }: assert name' == name; ''\n\n # Wait for a target (e.g. device, keyFile, header, ...) to appear.\n wait_target() {\n "..., 17476) = 17476 | |
close(3) = 0 | |
brk(0x1a2be000) = 0x1a2be000 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/system/boot/modprobe.nix", {st_mode=S_IFREG|0444, st_size=1815, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/system/boot/modprobe.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=1815, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\n{\n\n ###### interface\n\n options = {\n\n boot.blacklistedKernelModules = mkOption {\n type = types.listOf types.str;\n default = [];\n example = [ \"cirrusfb\" \"i2c_piix4\" ];\n description = ''\n List of names of kernel modules that should"..., 1815) = 1815 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/system/boot/networkd.nix", {st_mode=S_IFREG|0444, st_size=23703, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/system/boot/networkd.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=23703, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\nwith import ./systemd-unit-options.nix { inherit config lib; };\nwith import ./systemd-lib.nix { inherit config lib pkgs; };\n\nlet\n\n cfg = config.systemd.network;\n\n checkLink = checkUnitConfig \"Link\" [\n (assertOnlyFields [\n \"Description\" \"Alias\" \"MACAdd"..., 23703) = 23703 | |
close(3) = 0 | |
brk(0x1a2e2000) = 0x1a2e2000 | |
brk(0x1a303000) = 0x1a303000 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/system/boot/plymouth.nix", {st_mode=S_IFREG|0444, st_size=5097, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/system/boot/plymouth.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=5097, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n inherit (pkgs) plymouth;\n\n cfg = config.boot.plymouth;\n\n breezePlymouth = pkgs.breeze-plymouth.override {\n nixosBranding = true;\n nixosVersion = config.system.nixos.release;\n };\n\n themesEnv = pkgs.buildEnv {\n name = \"plymouth-themes\";\n p"..., 5097) = 5097 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/system/boot/resolved.nix", {st_mode=S_IFREG|0444, st_size=4835, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/system/boot/resolved.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=4835, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\nlet\n cfg = config.services.resolved;\nin\n{\n\n options = {\n\n services.resolved.enable = mkOption {\n default = false;\n type = types.bool;\n description = ''\n Whether to enable the systemd DNS resolver daemon.\n '';\n };\n\n services"..., 4835) = 4835 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/system/boot/shutdown.nix", {st_mode=S_IFREG|0444, st_size=658, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/system/boot/shutdown.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=658, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\n{\n\n # This unit saves the value of the system clock to the hardware\n # clock on shutdown.\n systemd.services.save-hwclock =\n { description = \"Save Hardware Clock\";\n\n wantedBy = [ \"shutdown.target\" ];\n\n unitConfig = {\n DefaultDependencies "..., 658) = 658 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/system/boot/stage-1.nix", {st_mode=S_IFREG|0444, st_size=16637, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/system/boot/stage-1.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=16637, ...}) = 0 | |
read(3, "# This module builds the initial ramdisk, which contains an init\n# script that performs the first stage of booting the system: it loads\n# the modules necessary to mount the root file system, then calls the\n# init in the root file system to start the second boot stage.\n\n{ config, lib, utils, pkgs, .."..., 16637) = 16637 | |
close(3) = 0 | |
brk(0x1a324000) = 0x1a324000 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/system/boot/stage-2.nix", {st_mode=S_IFREG|0444, st_size=1871, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/system/boot/stage-2.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=1871, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n kernel = config.boot.kernelPackages.kernel;\n activateConfiguration = config.system.activationScripts.script;\n\n bootStage2 = pkgs.substituteAll {\n src = ./stage-2-init.sh;\n shellDebug = \"${pkgs.bashInteractive}/bin/bash\";\n isExecutable = true;"..., 1871) = 1871 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/system/boot/systemd.nix", {st_mode=S_IFREG|0444, st_size=29624, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/system/boot/systemd.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=29624, ...}) = 0 | |
brk(0x1a346000) = 0x1a346000 | |
read(3, "{ config, lib, pkgs, utils, ... }:\n\nwith utils;\nwith lib;\nwith import ./systemd-unit-options.nix { inherit config lib; };\nwith import ./systemd-lib.nix { inherit config lib pkgs; };\n\nlet\n\n cfg = config.systemd;\n\n systemd = cfg.package;\n\n upstreamSystemUnits =\n [ # Targets.\n \"basic.target\""..., 29624) = 29624 | |
close(3) = 0 | |
mmap(NULL, 425984, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) = 0x76ffc6bfb000 | |
munmap(0x76ffc6c63000, 212992) = 0 | |
brk(0x1a367000) = 0x1a367000 | |
brk(0x1a388000) = 0x1a388000 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/system/boot/systemd-lib.nix", {st_mode=S_IFREG|0444, st_size=6277, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/system/boot/systemd-lib.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=6277, ...}) = 0 | |
read(3, "{ config, lib, pkgs }:\n\nwith lib;\n\nlet cfg = config.systemd; in\n\nrec {\n\n shellEscape = s: (replaceChars [ \"\\\\\" ] [ \"\\\\\\\\\" ] s);\n\n makeUnit = name: unit:\n let\n pathSafeName = lib.replaceChars [\"@\" \":\" \"\\\\\" \"[\" \"]\"] [\"-\" \"-\" \"-\" \"\" \"\"] name;\n in\n if unit.enable then\n pkgs.runComma"..., 6277) = 6277 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/system/boot/systemd-unit-options.nix", {st_mode=S_IFREG|0444, st_size=14527, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/system/boot/systemd-unit-options.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=14527, ...}) = 0 | |
read(3, "{ config, lib }:\n\nwith lib;\nwith import ./systemd-lib.nix { inherit config lib pkgs; };\n\nlet\n checkService = checkUnitConfig \"Service\" [\n (assertValueOneOf \"Type\" [\n \"simple\" \"forking\" \"oneshot\" \"dbus\" \"notify\" \"idle\"\n ])\n (assertValueOneOf \"Restart\" [\n \"no\" \"on-success\" \"on-fail"..., 14527) = 14527 | |
close(3) = 0 | |
brk(0x1a3a9000) = 0x1a3a9000 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/system/boot/systemd-nspawn.nix", {st_mode=S_IFREG|0444, st_size=3640, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/system/boot/systemd-nspawn.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=3640, ...}) = 0 | |
read(3, "{ config, lib , pkgs, ...}:\n\nwith lib;\nwith import ./systemd-unit-options.nix { inherit config lib; };\nwith import ./systemd-lib.nix { inherit config lib pkgs; };\n\nlet\n cfg = config.systemd.nspawn;\n assertions = [\n # boot = true -> processtwo != true\n ];\n\n checkExec = checkUnitConfig \"Exec\" ["..., 3640) = 3640 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/system/boot/timesyncd.nix", {st_mode=S_IFREG|0444, st_size=1081, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/system/boot/timesyncd.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=1081, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\n{\n\n options = {\n\n services.timesyncd = {\n enable = mkOption {\n default = !config.boot.isContainer;\n type = types.bool;\n description = ''\n Enables the systemd NTP client daemon.\n '';\n };\n servers = mkOptio"..., 1081) = 1081 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/system/boot/tmp.nix", {st_mode=S_IFREG|0444, st_size=702, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/system/boot/tmp.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=702, ...}) = 0 | |
read(3, "{ config, lib, ... }:\n\nwith lib;\n\n{\n\n ###### interface\n\n options = {\n\n boot.cleanTmpDir = mkOption {\n type = types.bool;\n default = false;\n description = ''\n Whether to delete all files in <filename>/tmp</filename> during boot.\n '';\n };\n\n boot.tmpOnTmpfs = mkOpt"..., 702) = 702 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/system/etc/etc.nix", {st_mode=S_IFREG|0444, st_size=4327, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/system/etc/etc.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=4327, ...}) = 0 | |
read(3, "# Management of static files in /etc.\n\n{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n etc' = filter (f: f.enable) (attrValues config.environment.etc);\n\n etc = pkgs.stdenvNoCC.mkDerivation {\n name = \"etc\";\n\n builder = ./make-etc.sh;\n\n preferLocalBuild = true;\n allowSubstitutes = false;\n\n"..., 4327) = 4327 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/tasks/bcache.nix", {st_mode=S_IFREG|0444, st_size=247, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/tasks/bcache.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=247, ...}) = 0 | |
read(3, "{ config, pkgs, ... }:\n\n{\n\n environment.systemPackages = [ pkgs.bcache-tools ];\n\n services.udev.packages = [ pkgs.bcache-tools ];\n\n boot.initrd.extraUdevRulesCommands = ''\n cp -v ${pkgs.bcache-tools}/lib/udev/rules.d/*.rules $out/\n ''; \n\n}\n", 247) = 247 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/tasks/cpu-freq.nix", {st_mode=S_IFREG|0444, st_size=1241, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/tasks/cpu-freq.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=1241, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cpupower = config.boot.kernelPackages.cpupower;\n cfg = config.powerManagement;\nin\n\n{\n ###### interface\n\n options = {\n\n powerManagement.cpuFreqGovernor = mkOption {\n type = types.nullOr types.str;\n default = null;\n example = \"ondemand"..., 1241) = 1241 | |
close(3) = 0 | |
brk(0x1a3ca000) = 0x1a3ca000 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/tasks/encrypted-devices.nix", {st_mode=S_IFREG|0444, st_size=2355, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/tasks/encrypted-devices.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=2355, ...}) = 0 | |
read(3, "{ config, lib, ... }:\n\nwith lib;\n\nlet\n fileSystems = config.system.build.fileSystems ++ config.swapDevices;\n encDevs = filter (dev: dev.encrypted.enable) fileSystems;\n keyedEncDevs = filter (dev: dev.encrypted.keyFile != null) encDevs;\n keylessEncDevs = filter (dev: dev.encrypted.keyFile == null"..., 2355) = 2355 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/tasks/filesystems.nix", {st_mode=S_IFREG|0444, st_size=11170, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/tasks/filesystems.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=11170, ...}) = 0 | |
read(3, "{ config, lib, pkgs, utils, ... }:\n\nwith lib;\nwith utils;\n\nlet\n\n addCheckDesc = desc: elemType: check: types.addCheck elemType check\n // { description = \"${elemType.description} (with check: ${desc})\"; };\n nonEmptyStr = addCheckDesc \"non-empty\" types.str\n (x: x != \"\" && ! (all (c: c == \" \" |"..., 11170) = 11170 | |
close(3) = 0 | |
brk(0x1a3eb000) = 0x1a3eb000 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/tasks/filesystems/bcachefs.nix", {st_mode=S_IFREG|0444, st_size=614, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/tasks/filesystems/bcachefs.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=614, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n inInitrd = any (fs: fs == \"bcachefs\") config.boot.initrd.supportedFilesystems;\n\nin\n\n{\n config = mkIf (any (fs: fs == \"bcachefs\") config.boot.supportedFilesystems) {\n\n system.fsPackages = [ pkgs.bcachefs-tools ];\n\n # use kernel package with bcache"..., 614) = 614 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/tasks/filesystems/btrfs.nix", {st_mode=S_IFREG|0444, st_size=4457, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/tasks/filesystems/btrfs.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=4457, ...}) = 0 | |
read(3, "{ config, lib, pkgs, utils, ... }:\n\nwith lib;\n\nlet\n\n inInitrd = any (fs: fs == \"btrfs\") config.boot.initrd.supportedFilesystems;\n inSystem = any (fs: fs == \"btrfs\") config.boot.supportedFilesystems;\n\n cfgScrub = config.services.btrfs.autoScrub;\n\n enableAutoScrub = cfgScrub.enable;\n enableBtrfs "..., 4457) = 4457 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/tasks/filesystems/cifs.nix", {st_mode=S_IFREG|0444, st_size=518, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/tasks/filesystems/cifs.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=518, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n inInitrd = any (fs: fs == \"cifs\") config.boot.initrd.supportedFilesystems;\n\nin\n\n{\n config = {\n\n system.fsPackages = mkIf (any (fs: fs == \"cifs\") config.boot.supportedFilesystems) [ pkgs.cifs-utils ];\n\n boot.initrd.availableKernelModules = mkIf in"..., 518) = 518 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/tasks/filesystems/ecryptfs.nix", {st_mode=S_IFREG|0444, st_size=430, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/tasks/filesystems/ecryptfs.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=430, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n# TODO: make ecryptfs work in initramfs?\n\nwith lib;\n\n{\n config = mkIf (any (fs: fs == \"ecryptfs\") config.boot.supportedFilesystems) {\n system.fsPackages = [ pkgs.ecryptfs ];\n security.wrappers = {\n \"mount.ecryptfs_private\".source = \"${pkgs.ecryptfs.out}/bin/mo"..., 430) = 430 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/tasks/filesystems/exfat.nix", {st_mode=S_IFREG|0444, st_size=190, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/tasks/filesystems/exfat.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=190, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\n{\n config = mkIf (any (fs: fs == \"exfat\") config.boot.supportedFilesystems) {\n\n system.fsPackages = [ pkgs.exfat-utils pkgs.fuse_exfat ];\n\n };\n}\n", 190) = 190 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/tasks/filesystems/ext.nix", {st_mode=S_IFREG|0444, st_size=572, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/tasks/filesystems/ext.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=572, ...}) = 0 | |
read(3, "{ config, pkgs, ... }:\n\n{\n config = {\n\n system.fsPackages = [ pkgs.e2fsprogs ];\n\n # As of kernel 4.3, there is no separate ext3 driver (they're also handled by ext4.ko)\n boot.initrd.availableKernelModules = [ \"ext2\" \"ext4\" ];\n\n boot.initrd.extraUtilsCommands =\n ''\n # Copy e2"..., 572) = 572 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/tasks/filesystems/f2fs.nix", {st_mode=S_IFREG|0444, st_size=452, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/tasks/filesystems/f2fs.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=452, ...}) = 0 | |
read(3, "{ config, pkgs, lib, ... }:\n\nwith lib;\n\nlet\n inInitrd = any (fs: fs == \"f2fs\") config.boot.initrd.supportedFilesystems;\nin\n{\n config = mkIf (any (fs: fs == \"f2fs\") config.boot.supportedFilesystems) {\n\n system.fsPackages = [ pkgs.f2fs-tools ];\n\n boot.initrd.availableKernelModules = mkIf inIni"..., 452) = 452 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/tasks/filesystems/jfs.nix", {st_mode=S_IFREG|0444, st_size=427, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/tasks/filesystems/jfs.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=427, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n inInitrd = any (fs: fs == \"jfs\") config.boot.initrd.supportedFilesystems;\nin\n{\n config = mkIf (any (fs: fs == \"jfs\") config.boot.supportedFilesystems) {\n\n system.fsPackages = [ pkgs.jfsutils ];\n\n boot.initrd.kernelModules = mkIf inInitrd [ \"jfs\" ]"..., 427) = 427 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/tasks/filesystems/nfs.nix", {st_mode=S_IFREG|0444, st_size=2319, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/tasks/filesystems/nfs.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=2319, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n inInitrd = any (fs: fs == \"nfs\") config.boot.initrd.supportedFilesystems;\n\n nfsStateDir = \"/var/lib/nfs\";\n\n rpcMountpoint = \"${nfsStateDir}/rpc_pipefs\";\n\n idmapdConfFile = pkgs.writeText \"idmapd.conf\" ''\n [General]\n Pipefs-Directory = ${rpcMoun"..., 2319) = 2319 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/tasks/filesystems/ntfs.nix", {st_mode=S_IFREG|0444, st_size=187, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/tasks/filesystems/ntfs.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=187, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\n{\n config = mkIf (any (fs: fs == \"ntfs\" || fs == \"ntfs-3g\") config.boot.supportedFilesystems) {\n\n system.fsPackages = [ pkgs.ntfs3g ];\n\n };\n}\n", 187) = 187 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/tasks/filesystems/reiserfs.nix", {st_mode=S_IFREG|0444, st_size=516, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/tasks/filesystems/reiserfs.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=516, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n inInitrd = any (fs: fs == \"reiserfs\") config.boot.initrd.supportedFilesystems;\n\nin\n\n{\n config = mkIf (any (fs: fs == \"reiserfs\") config.boot.supportedFilesystems) {\n\n system.fsPackages = [ pkgs.reiserfsprogs ];\n\n boot.initrd.kernelModules = mkIf "..., 516) = 516 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/tasks/filesystems/unionfs-fuse.nix", {st_mode=S_IFREG|0444, st_size=1230, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/tasks/filesystems/unionfs-fuse.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=1230, ...}) = 0 | |
read(3, "{ config, pkgs, lib, ... }:\n\n{\n config = lib.mkMerge [\n\n (lib.mkIf (lib.any (fs: fs == \"unionfs-fuse\") config.boot.initrd.supportedFilesystems) {\n boot.initrd.kernelModules = [ \"fuse\" ];\n\n boot.initrd.extraUtilsCommands = ''\n copy_bin_and_libs ${pkgs.fuse}/sbin/mount.fuse\n "..., 1230) = 1230 | |
close(3) = 0 | |
brk(0x1a40c000) = 0x1a40c000 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/tasks/filesystems/vboxsf.nix", {st_mode=S_IFREG|0444, st_size=473, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/tasks/filesystems/vboxsf.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=473, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n inInitrd = any (fs: fs == \"vboxsf\") config.boot.initrd.supportedFilesystems;\n\n package = pkgs.runCommand \"mount.vboxsf\" {} ''\n mkdir -p $out/bin\n cp ${pkgs.linuxPackages.virtualboxGuestAdditions}/bin/mount.vboxsf $out/bin\n '';\nin\n\n{\n config = m"..., 473) = 473 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/tasks/filesystems/vfat.nix", {st_mode=S_IFREG|0444, st_size=517, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/tasks/filesystems/vfat.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=517, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n inInitrd = any (fs: fs == \"vfat\") config.boot.initrd.supportedFilesystems;\n\nin\n\n{\n config = mkIf (any (fs: fs == \"vfat\") config.boot.supportedFilesystems) {\n\n system.fsPackages = [ pkgs.dosfstools ];\n\n boot.initrd.kernelModules = mkIf inInitrd [ "..., 517) = 517 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/tasks/filesystems/xfs.nix", {st_mode=S_IFREG|0444, st_size=662, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/tasks/filesystems/xfs.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=662, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n inInitrd = any (fs: fs == \"xfs\") config.boot.initrd.supportedFilesystems;\n\nin\n\n{\n config = mkIf (any (fs: fs == \"xfs\") config.boot.supportedFilesystems) {\n\n system.fsPackages = [ pkgs.xfsprogs.bin ];\n\n boot.initrd.availableKernelModules = mkIf in"..., 662) = 662 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/tasks/filesystems/zfs.nix", {st_mode=S_IFREG|0444, st_size=17361, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/tasks/filesystems/zfs.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=17361, ...}) = 0 | |
read(3, "{ config, lib, pkgs, utils, ... }:\n#\n# todo:\n# - crontab for scrubs, etc\n# - zfs tunables\n\nwith utils;\nwith lib;\n\nlet\n\n cfgSpl = config.boot.spl;\n cfgZfs = config.boot.zfs;\n cfgSnapshots = config.services.zfs.autoSnapshot;\n cfgSnapFlags = cfgSnapshots.flags;\n cfgScrub = config.services.zfs."..., 17361) = 17361 | |
close(3) = 0 | |
brk(0x1a42d000) = 0x1a42d000 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/tasks/kbd.nix", {st_mode=S_IFREG|0444, st_size=3894, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/tasks/kbd.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=3894, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n makeColor = n: value: \"COLOR_${toString n}=${value}\";\n makeColorCS =\n let positions = [ \"0\" \"1\" \"2\" \"3\" \"4\" \"5\" \"6\" \"7\" \"8\" \"9\" \"A\" \"B\" \"C\" \"D\" \"E\" \"F\" ];\n in n: value: \"\\\\033]P${elemAt positions (n - 1)}${value}\";\n colors = concatImapStringsSep"..., 3894) = 3894 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/tasks/lvm.nix", {st_mode=S_IFREG|0444, st_size=216, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/tasks/lvm.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=216, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\n{\n\n ###### implementation\n\n config = mkIf (!config.boot.isContainer) {\n\n environment.systemPackages = [ pkgs.lvm2 ];\n\n services.udev.packages = [ pkgs.lvm2 ];\n\n };\n\n}\n", 216) = 216 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/tasks/network-interfaces.nix", {st_mode=S_IFREG|0444, st_size=42358, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/tasks/network-interfaces.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=42358, ...}) = 0 | |
read(3, "{ config, options, lib, pkgs, utils, stdenv, ... }:\n\nwith lib;\nwith utils;\n\nlet\n\n cfg = config.networking;\n interfaces = attrValues cfg.interfaces;\n hasVirtuals = any (i: i.virtual) interfaces;\n hasSits = cfg.sits != { };\n hasBonds = cfg.bonds != { };\n\n slaves = concatMap (i: i.interfaces) (at"..., 42358) = 42358 | |
brk(0x1a454000) = 0x1a454000 | |
close(3) = 0 | |
brk(0x1a475000) = 0x1a475000 | |
brk(0x1a496000) = 0x1a496000 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/tasks/network-interfaces-systemd.nix", {st_mode=S_IFREG|0444, st_size=9287, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/tasks/network-interfaces-systemd.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=9287, ...}) = 0 | |
read(3, "{ config, lib, pkgs, utils, ... }:\n\nwith utils;\nwith lib;\n\nlet\n\n cfg = config.networking;\n interfaces = attrValues cfg.interfaces;\n\n interfaceIps = i:\n i.ipv4.addresses\n ++ optionals cfg.enableIPv6 i.ipv6.addresses;\n\n dhcpStr = useDHCP: if useDHCP == true || useDHCP == null then \"both\" els"..., 9287) = 9287 | |
close(3) = 0 | |
brk(0x1a4b7000) = 0x1a4b7000 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/tasks/network-interfaces-scripted.nix", {st_mode=S_IFREG|0444, st_size=21035, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/tasks/network-interfaces-scripted.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=21035, ...}) = 0 | |
read(3, "{ config, lib, pkgs, utils, ... }:\n\nwith utils;\nwith lib;\n\nlet\n\n cfg = config.networking;\n interfaces = attrValues cfg.interfaces;\n hasVirtuals = any (i: i.virtual) interfaces;\n\n slaves = concatMap (i: i.interfaces) (attrValues cfg.bonds)\n ++ concatMap (i: i.interfaces) (attrValues cfg.bridge"..., 21035) = 21035 | |
close(3) = 0 | |
brk(0x1a4d8000) = 0x1a4d8000 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/tasks/scsi-link-power-management.nix", {st_mode=S_IFREG|0444, st_size=642, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/tasks/scsi-link-power-management.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=642, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet cfg = config.powerManagement.scsiLinkPolicy; in\n\n{\n ###### interface\n\n options = {\n\n powerManagement.scsiLinkPolicy = mkOption {\n default = null;\n type = types.nullOr (types.enum [ \"min_power\" \"max_performance\" \"medium_power\" ]);\n descr"..., 642) = 642 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/tasks/swraid.nix", {st_mode=S_IFREG|0444, st_size=1293, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/tasks/swraid.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=1293, ...}) = 0 | |
read(3, "{ config, pkgs, ... }:\n\n{\n\n environment.systemPackages = [ pkgs.mdadm ];\n\n services.udev.packages = [ pkgs.mdadm ];\n\n boot.initrd.availableKernelModules = [ \"md_mod\" \"raid0\" \"raid1\" \"raid456\" ];\n\n boot.initrd.extraUdevRulesCommands = ''\n cp -v ${pkgs.mdadm}/lib/udev/rules.d/*.rules $out/\n ''"..., 1293) = 1293 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/tasks/trackpoint.nix", {st_mode=S_IFREG|0444, st_size=2741, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/tasks/trackpoint.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=2741, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\n{\n ###### interface\n\n options = {\n\n hardware.trackpoint = {\n\n enable = mkOption {\n default = false;\n type = types.bool;\n description = ''\n Enable sensitivity and speed configuration for trackpoints.\n '';\n };\n"..., 2741) = 2741 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/tasks/powertop.nix", {st_mode=S_IFREG|0444, st_size=611, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/tasks/powertop.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=611, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.powerManagement.powertop;\nin {\n ###### interface\n\n options.powerManagement.powertop.enable = mkEnableOption \"powertop auto tuning on startup\";\n\n ###### implementation\n\n config = mkIf (cfg.enable) {\n systemd.services = {\n powertop"..., 611) = 611 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/testing/service-runner.nix", {st_mode=S_IFREG|0444, st_size=3313, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/testing/service-runner.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=3313, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n makeScript = name: service: pkgs.writeScript \"${name}-runner\"\n ''\n #! ${pkgs.perl}/bin/perl -w -I${pkgs.perlPackages.FileSlurp}/lib/perl5/site_perl\n\n use File::Slurp;\n\n sub run {\n my ($cmd) = @_;\n my @args = split \" \""..., 3313) = 3313 | |
close(3) = 0 | |
brk(0x1a4f9000) = 0x1a4f9000 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/virtualisation/container-config.nix", {st_mode=S_IFREG|0444, st_size=671, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/virtualisation/container-config.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=671, ...}) = 0 | |
read(3, "{ config, pkgs, lib, ... }:\n\nwith lib;\n\n{\n\n config = mkIf config.boot.isContainer {\n\n # Disable some features that are not useful in a container.\n sound.enable = mkDefault false;\n services.udisks2.enable = mkDefault false;\n powerManagement.enable = mkDefault false;\n\n networking.useHo"..., 671) = 671 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/virtualisation/containers.nix", {st_mode=S_IFREG|0444, st_size=24541, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/virtualisation/containers.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=24541, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n # The container's init script, a small wrapper around the regular\n # NixOS stage-2 init script.\n containerInit = (cfg:\n let\n renderExtraVeth = (name: cfg:\n ''\n echo \"Bringing ${name} up\"\n ip link set dev ${name} up\n "..., 24541) = 24541 | |
close(3) = 0 | |
brk(0x1a51a000) = 0x1a51a000 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/virtualisation/docker.nix", {st_mode=S_IFREG|0444, st_size=5687, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/virtualisation/docker.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=5687, ...}) = 0 | |
read(3, "# Systemd services for docker.\n\n{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.virtualisation.docker;\n proxy_env = config.networking.proxy.envVars;\n\nin\n\n{\n ###### interface\n\n options.virtualisation.docker = {\n enable =\n mkOption {\n type = types.bool;\n default = "..., 5687) = 5687 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/virtualisation/ecs-agent.nix", {st_mode=S_IFREG|0444, st_size=1251, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/virtualisation/ecs-agent.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=1251, ...}) = 0 | |
read(3, "{ config, pkgs, lib, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.ecs-agent;\nin {\n options.services.ecs-agent = {\n enable = mkEnableOption \"Amazon ECS agent\";\n\n package = mkOption {\n type = types.path;\n description = \"The ECS agent package to use\";\n default = pkgs.ecs-agent;\n"..., 1251) = 1251 | |
close(3) = 0 | |
brk(0x1a53b000) = 0x1a53b000 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/virtualisation/libvirtd.nix", {st_mode=S_IFREG|0444, st_size=6377, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/virtualisation/libvirtd.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=6377, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.virtualisation.libvirtd;\n vswitch = config.virtualisation.vswitch;\n configFile = pkgs.writeText \"libvirtd.conf\" ''\n unix_sock_group = \"libvirtd\"\n unix_sock_rw_perms = \"0770\"\n auth_unix_ro = \"none\"\n auth_unix_rw = \"none\"\n ${"..., 6377) = 6377 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/virtualisation/lxc.nix", {st_mode=S_IFREG|0444, st_size=2052, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/virtualisation/lxc.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=2052, ...}) = 0 | |
read(3, "# LXC Configuration\n\n{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.virtualisation.lxc;\n\nin\n\n{\n ###### interface\n\n options.virtualisation.lxc = {\n enable =\n mkOption {\n type = types.bool;\n default = false;\n description =\n ''\n This enabl"..., 2052) = 2052 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/virtualisation/lxcfs.nix", {st_mode=S_IFREG|0444, st_size=1215, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/virtualisation/lxcfs.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=1215, ...}) = 0 | |
read(3, "# LXC Configuration\n\n{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.virtualisation.lxc.lxcfs;\nin {\n meta.maintainers = [ maintainers.mic92 ];\n\n ###### interface\n options.virtualisation.lxc.lxcfs = {\n enable =\n mkOption {\n type = types.bool;\n default = false;\n "..., 1215) = 1215 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/virtualisation/lxd.nix", {st_mode=S_IFREG|0444, st_size=1801, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/virtualisation/lxd.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=1801, ...}) = 0 | |
read(3, "# Systemd services for lxd.\n\n{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.virtualisation.lxd;\n\nin\n\n{\n ###### interface\n\n options = {\n\n virtualisation.lxd.enable =\n mkOption {\n type = types.bool;\n default = false;\n description =\n ''\n T"..., 1801) = 1801 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/virtualisation/amazon-options.nix", {st_mode=S_IFREG|0444, st_size=295, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/virtualisation/amazon-options.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=295, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n{\n options = {\n ec2 = {\n hvm = lib.mkOption {\n default = lib.versionAtLeast config.system.stateVersion \"17.03\";\n internal = true;\n description = ''\n Whether the EC2 instance is a HVM instance.\n '';\n };\n };\n };\n}\n", 295) = 295 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/virtualisation/hyperv-guest.nix", {st_mode=S_IFREG|0444, st_size=857, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/virtualisation/hyperv-guest.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=857, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.virtualisation.hypervGuest;\n\nin {\n options = {\n virtualisation.hypervGuest = {\n enable = mkEnableOption \"Hyper-V Guest Support\";\n };\n };\n\n config = mkIf cfg.enable {\n environment.systemPackages = [ config.boot.kernelPackages"..., 857) = 857 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/virtualisation/openvswitch.nix", {st_mode=S_IFREG|0444, st_size=5466, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/virtualisation/openvswitch.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=5466, ...}) = 0 | |
read(3, "# Systemd services for openvswitch\n\n{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.virtualisation.vswitch;\n\nin {\n\n options.virtualisation.vswitch = {\n enable = mkOption {\n type = types.bool;\n default = false;\n description = ''\n Whether to enable Open vSwitch. A "..., 5466) = 5466 | |
close(3) = 0 | |
brk(0x1a55c000) = 0x1a55c000 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/virtualisation/parallels-guest.nix", {st_mode=S_IFREG|0444, st_size=3605, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/virtualisation/parallels-guest.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=3605, ...}) = 0 | |
read(3, "{ config, lib, pkgs, pkgs_i686, ... }:\n\nwith lib;\n\nlet\n\n prl-tools = config.boot.kernelPackages.prl-tools;\n\nin\n\n{\n\n options = {\n hardware.parallels = {\n\n enable = mkOption {\n type = types.bool;\n default = false;\n description = ''\n This enables Parallels Tools "..., 3605) = 3605 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/virtualisation/rkt.nix", {st_mode=S_IFREG|0444, st_size=1620, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/virtualisation/rkt.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=1620, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.virtualisation.rkt;\nin\n{\n options.virtualisation.rkt = {\n enable = mkEnableOption \"rkt metadata service\";\n\n gc = {\n automatic = mkOption {\n default = true;\n type = types.bool;\n description = \"Automatically ru"..., 1620) = 1620 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/virtualisation/virtualbox-guest.nix", {st_mode=S_IFREG|0444, st_size=2433, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/virtualisation/virtualbox-guest.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=2433, ...}) = 0 | |
read(3, "# Module for VirtualBox guests.\n\n{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n\n cfg = config.virtualisation.virtualbox.guest;\n kernel = config.boot.kernelPackages;\n\nin\n\n{\n\n ###### interface\n\n options.virtualisation.virtualbox.guest = {\n enable = mkOption {\n default = false;\n type = t"..., 2433) = 2433 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/virtualisation/virtualbox-host.nix", {st_mode=S_IFREG|0444, st_size=4507, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/virtualisation/virtualbox-host.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=4507, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.virtualisation.virtualbox.host;\n\n virtualbox = pkgs.virtualbox.override {\n inherit (cfg) enableHardening headless;\n };\n\n kernelModules = config.boot.kernelPackages.virtualbox.override {\n inherit virtualbox;\n };\n\nin\n\n{\n options.vir"..., 4507) = 4507 | |
close(3) = 0 | |
brk(0x1a57d000) = 0x1a57d000 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/virtualisation/vmware-guest.nix", {st_mode=S_IFREG|0444, st_size=1537, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/virtualisation/vmware-guest.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=1537, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.services.vmwareGuest;\n open-vm-tools = if cfg.headless then pkgs.open-vm-tools-headless else pkgs.open-vm-tools;\n xf86inputvmmouse = pkgs.xorg.xf86inputvmmouse;\nin\n{\n options = {\n services.vmwareGuest = {\n enable = mkEnableOption "..., 1537) = 1537 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/virtualisation/xen-dom0.nix", {st_mode=S_IFREG|0444, st_size=16074, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/virtualisation/xen-dom0.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=16074, ...}) = 0 | |
read(3, "# Xen hypervisor (Dom0) support.\n\n{ config, lib, pkgs, ... }:\n\nwith lib;\n\nlet\n cfg = config.virtualisation.xen;\nin\n\n{\n ###### interface\n\n options = {\n\n virtualisation.xen.enable =\n mkOption {\n default = false;\n type = types.bool;\n description =\n ''\n "..., 16074) = 16074 | |
close(3) = 0 | |
brk(0x1a59e000) = 0x1a59e000 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/virtualisation/xe-guest-utilities.nix", {st_mode=S_IFREG|0444, st_size=1638, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/virtualisation/xe-guest-utilities.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=1638, ...}) = 0 | |
read(3, "{ config, lib, pkgs, ... }:\nwith lib;\nlet\n cfg = config.services.xe-guest-utilities;\nin {\n options = {\n services.xe-guest-utilities = {\n enable = mkEnableOption \"Whether to enable the Xen guest utilities daemon.\";\n };\n };\n config = mkIf cfg.enable {\n services.udev.packages = [ pkgs"..., 1638) = 1638 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs//nixos/modules/installer/scan/not-detected.nix", {st_mode=S_IFREG|0444, st_size=204, ...}) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/installer/scan/not-detected.nix", {st_mode=S_IFREG|0444, st_size=204, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/installer/scan/not-detected.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=204, ...}) = 0 | |
read(3, "# List all devices which are _not_ detected by nixos-generate-config.\n# Common devices are enabled by default.\n{ config, lib, pkgs, ... }:\n\nwith lib;\n\n{\n hardware.enableRedistributableFirmware = true;\n}\n", 204) = 204 | |
close(3) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs//nixos/modules/profiles/hardened.nix", {st_mode=S_IFREG|0444, st_size=3080, ...}) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/profiles/hardened.nix", {st_mode=S_IFREG|0444, st_size=3080, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/profiles/hardened.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=3080, ...}) = 0 | |
read(3, "# A profile with most (vanilla) hardening options enabled by default,\n# potentially at the cost of features and performance.\n\n{ config, lib, pkgs, ... }:\n\nwith lib;\n\n{\n boot.kernelPackages = mkDefault pkgs.linuxPackages_hardened;\n\n security.hideProcessInformation = mkDefault true;\n\n security.lock"..., 3080) = 3080 | |
close(3) = 0 | |
brk(0x1a5ae000) = 0x1a5ae000 | |
brk(0x1a5be000) = 0x1a5be000 | |
brk(0x1a5ce000) = 0x1a5ce000 | |
brk(0x1a5de000) = 0x1a5de000 | |
brk(0x1a5ee000) = 0x1a5ee000 | |
brk(0x1a5fe000) = 0x1a5fe000 | |
brk(0x1a60e000) = 0x1a60e000 | |
brk(0x1a61e000) = 0x1a61e000 | |
brk(0x1a62e000) = 0x1a62e000 | |
brk(0x1a63e000) = 0x1a63e000 | |
brk(0x1a64e000) = 0x1a64e000 | |
brk(0x1a65e000) = 0x1a65e000 | |
brk(0x1a66e000) = 0x1a66e000 | |
brk(0x1a67e000) = 0x1a67e000 | |
brk(0x1a68e000) = 0x1a68e000 | |
brk(0x1a69e000) = 0x1a69e000 | |
brk(0x1a6ae000) = 0x1a6ae000 | |
brk(0x1a6be000) = 0x1a6be000 | |
brk(0x1a6ce000) = 0x1a6ce000 | |
brk(0x1a6de000) = 0x1a6de000 | |
brk(0x1a6ee000) = 0x1a6ee000 | |
brk(0x1a6fe000) = 0x1a6fe000 | |
brk(0x1a70e000) = 0x1a70e000 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs", {st_mode=S_IFLNK|0777, st_size=1, ...}) = 0 | |
readlink("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs", ".", 1024) = 1 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos", {st_mode=S_IFLNK|0777, st_size=82, ...}) = 0 | |
readlink("/nix/var/nix/profiles/per-user/root/channels/nixos", "/nix/store/2vh6qx8scxxcrh2c9xb6iwsjqk482fv8-nixos-18.03pre129076.831ef4756e3/nixos", 1024) = 82 | |
lstat("/nix/store/2vh6qx8scxxcrh2c9xb6iwsjqk482fv8-nixos-18.03pre129076.831ef4756e3/nixos", {st_mode=S_IFDIR|0555, st_size=19, ...}) = 0 | |
openat(AT_FDCWD, "/nix/store/2vh6qx8scxxcrh2c9xb6iwsjqk482fv8-nixos-18.03pre129076.831ef4756e3/nixos/default.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=557, ...}) = 0 | |
read(3, "let requiredVersion = import ./lib/minver.nix; in\n\nif ! builtins ? nixVersion || builtins.compareVersions requiredVersion builtins.nixVersion == 1 then\n\n abort ''\n\n This version of Nixpkgs requires Nix >= ${requiredVersion}, please upgrade:\n\n - If you are running NixOS, use `nixos-rebuild' to"..., 557) = 557 | |
close(3) = 0 | |
lstat("/nix/store/2vh6qx8scxxcrh2c9xb6iwsjqk482fv8-nixos-18.03pre129076.831ef4756e3/nixos/lib/minver.nix", {st_mode=S_IFREG|0444, st_size=68, ...}) = 0 | |
openat(AT_FDCWD, "/nix/store/2vh6qx8scxxcrh2c9xb6iwsjqk482fv8-nixos-18.03pre129076.831ef4756e3/nixos/lib/minver.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=68, ...}) = 0 | |
read(3, "# Expose the minimum required version for evaluating Nixpkgs\n\"1.11\"\n", 68) = 68 | |
close(3) = 0 | |
lstat("/nix/store/2vh6qx8scxxcrh2c9xb6iwsjqk482fv8-nixos-18.03pre129076.831ef4756e3/nixos/pkgs/top-level/impure.nix", {st_mode=S_IFREG|0444, st_size=3602, ...}) = 0 | |
openat(AT_FDCWD, "/nix/store/2vh6qx8scxxcrh2c9xb6iwsjqk482fv8-nixos-18.03pre129076.831ef4756e3/nixos/pkgs/top-level/impure.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=3602, ...}) = 0 | |
read(3, "/* Impure default args for `pkgs/top-level/default.nix`. See that file\n for the meaning of each argument. */\n\nwith builtins;\n\nlet\n\n homeDir = builtins.getEnv \"HOME\";\n\n # Return \342\200\230x\342\200\231 if it evaluates, or \342\200\230def\342\200\231 if it throws an exception.\n try = x: def: let res = tryEval x; in if res.success"..., 3602) = 3602 | |
close(3) = 0 | |
lstat("/nix/store/2vh6qx8scxxcrh2c9xb6iwsjqk482fv8-nixos-18.03pre129076.831ef4756e3/nixos/pkgs/top-level", {st_mode=S_IFDIR|0555, st_size=30, ...}) = 0 | |
openat(AT_FDCWD, "/nix/store/2vh6qx8scxxcrh2c9xb6iwsjqk482fv8-nixos-18.03pre129076.831ef4756e3/nixos/pkgs/top-level/default.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=3715, ...}) = 0 | |
read(3, "/* This function composes the Nix Packages collection. It:\n\n 1. Applies the final stage to the given `config` if it is a function\n\n 2. Infers an appropriate `platform` based on the `system` if none is\n provided\n\n 3. Defaults to no non-standard config and no cross-compilation targe"..., 3715) = 3715 | |
close(3) = 0 | |
lstat("/nix/store/2vh6qx8scxxcrh2c9xb6iwsjqk482fv8-nixos-18.03pre129076.831ef4756e3/nixos/pkgs/stdenv/booter.nix", {st_mode=S_IFREG|0444, st_size=4806, ...}) = 0 | |
openat(AT_FDCWD, "/nix/store/2vh6qx8scxxcrh2c9xb6iwsjqk482fv8-nixos-18.03pre129076.831ef4756e3/nixos/pkgs/stdenv/booter.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=4806, ...}) = 0 | |
read(3, "# This file defines a single function for booting a package set from a list of\n# stages. The exact mechanics of that function are defined below; here I\n# (@Ericson2314) wish to describe the purpose of the abstraction.\n#\n# The first goal is consistency across stdenvs. Regardless of what this function"..., 4806) = 4806 | |
close(3) = 0 | |
lstat("/nix/store/2vh6qx8scxxcrh2c9xb6iwsjqk482fv8-nixos-18.03pre129076.831ef4756e3/nixos/lib", {st_mode=S_IFDIR|0555, st_size=26, ...}) = 0 | |
openat(AT_FDCWD, "/nix/store/2vh6qx8scxxcrh2c9xb6iwsjqk482fv8-nixos-18.03pre129076.831ef4756e3/nixos/lib/default.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=6000, ...}) = 0 | |
read(3, "/* Library of low-level helper functions for nix expressions.\n *\n * Please implement (mostly) exhaustive unit tests\n * for new functions in `./tests.nix'.\n */\nlet\n\n callLibs = file: import file { inherit lib; };\n\n lib = rec {\n\n # often used, or depending on very little\n trivial = callLibs ./"..., 6000) = 6000 | |
close(3) = 0 | |
brk(0x1a72f000) = 0x1a72f000 | |
brk(0x1a730000) = 0x1a730000 | |
lstat("/nix/store/2vh6qx8scxxcrh2c9xb6iwsjqk482fv8-nixos-18.03pre129076.831ef4756e3/nixos/lib/lists.nix", {st_mode=S_IFREG|0444, st_size=14590, ...}) = 0 | |
openat(AT_FDCWD, "/nix/store/2vh6qx8scxxcrh2c9xb6iwsjqk482fv8-nixos-18.03pre129076.831ef4756e3/nixos/lib/lists.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=14590, ...}) = 0 | |
read(3, "# General list operations.\n{ lib }:\nwith lib.trivial;\n\nrec {\n\n inherit (builtins) head tail length isList elemAt concatLists filter elem genList;\n\n /* Create a list consisting of a single element. `singleton x' is\n sometimes more convenient with respect to indentation than `[x]'\n when "..., 14590) = 14590 | |
close(3) = 0 | |
brk(0x1a751000) = 0x1a751000 | |
lstat("/nix/store/2vh6qx8scxxcrh2c9xb6iwsjqk482fv8-nixos-18.03pre129076.831ef4756e3/nixos/pkgs/stdenv", {st_mode=S_IFDIR|0555, st_size=15, ...}) = 0 | |
openat(AT_FDCWD, "/nix/store/2vh6qx8scxxcrh2c9xb6iwsjqk482fv8-nixos-18.03pre129076.831ef4756e3/nixos/pkgs/stdenv/default.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=1943, ...}) = 0 | |
read(3, "# This file chooses a sane default stdenv given the system, platform, etc.\n#\n# Rather than returning a stdenv, this returns a list of functions---one per\n# each bootstrapping stage. See `./booter.nix` for exactly what this list should\n# contain.\n\n{ # Args just for stdenvs' usage\n lib\n # Args to pa"..., 1943) = 1943 | |
close(3) = 0 | |
lstat("/nix/store/2vh6qx8scxxcrh2c9xb6iwsjqk482fv8-nixos-18.03pre129076.831ef4756e3/nixos/lib/trivial.nix", {st_mode=S_IFREG|0444, st_size=4516, ...}) = 0 | |
openat(AT_FDCWD, "/nix/store/2vh6qx8scxxcrh2c9xb6iwsjqk482fv8-nixos-18.03pre129076.831ef4756e3/nixos/lib/trivial.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=4516, ...}) = 0 | |
read(3, "{ lib }:\nrec {\n\n /* The identity function\n For when you need a function that does \342\200\234nothing\342\200\235.\n\n Type: id :: a -> a\n */\n id = x: x;\n\n /* The constant function\n Ignores the second argument.\n Or: Construct a function that always returns a static value.\n\n Type: const :: a -> b"..., 4516) = 4516 | |
close(3) = 0 | |
brk(0x1a761000) = 0x1a761000 | |
lstat("/nix/store/2vh6qx8scxxcrh2c9xb6iwsjqk482fv8-nixos-18.03pre129076.831ef4756e3/nixos/lib/systems", {st_mode=S_IFDIR|0555, st_size=8, ...}) = 0 | |
openat(AT_FDCWD, "/nix/store/2vh6qx8scxxcrh2c9xb6iwsjqk482fv8-nixos-18.03pre129076.831ef4756e3/nixos/lib/systems/default.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=1845, ...}) = 0 | |
read(3, "{ lib }:\n let inherit (lib.attrsets) mapAttrs; in\n\nrec {\n doubles = import ./doubles.nix { inherit lib; };\n parse = import ./parse.nix { inherit lib; };\n inspect = import ./inspect.nix { inherit lib; };\n platforms = import ./platforms.nix { inherit lib; };\n examples = import ./examples.nix { i"..., 1845) = 1845 | |
close(3) = 0 | |
lstat("/nix/store/2vh6qx8scxxcrh2c9xb6iwsjqk482fv8-nixos-18.03pre129076.831ef4756e3/nixos/lib/attrsets.nix", {st_mode=S_IFREG|0444, st_size=13660, ...}) = 0 | |
openat(AT_FDCWD, "/nix/store/2vh6qx8scxxcrh2c9xb6iwsjqk482fv8-nixos-18.03pre129076.831ef4756e3/nixos/lib/attrsets.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=13660, ...}) = 0 | |
read(3, "{ lib }:\n# Operations on attribute sets.\n\nlet\n inherit (builtins) head tail length;\n inherit (lib.trivial) and or;\n inherit (lib.strings) concatStringsSep;\n inherit (lib.lists) fold concatMap concatLists all deepSeqList;\nin\n\nrec {\n inherit (builtins) attrNames listToAttrs hasAttr isAttrs getAtt"..., 13660) = 13660 | |
close(3) = 0 | |
brk(0x1a782000) = 0x1a782000 | |
brk(0x1a783000) = 0x1a783000 | |
lstat("/nix/store/2vh6qx8scxxcrh2c9xb6iwsjqk482fv8-nixos-18.03pre129076.831ef4756e3/nixos/lib/systems/inspect.nix", {st_mode=S_IFREG|0444, st_size=1848, ...}) = 0 | |
openat(AT_FDCWD, "/nix/store/2vh6qx8scxxcrh2c9xb6iwsjqk482fv8-nixos-18.03pre129076.831ef4756e3/nixos/lib/systems/inspect.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=1848, ...}) = 0 | |
read(3, "{ lib }:\nwith import ./parse.nix { inherit lib; };\nwith lib.attrsets;\nwith lib.lists;\n\nrec {\n patterns = rec {\n i686 = { cpu = cpuTypes.i686; };\n x86_64 = { cpu = cpuTypes.x86_64; };\n PowerPC = { cpu = cpuTypes.powerpc; };\n x86 = { cpu = { family = \"x86\"; }; "..., 1848) = 1848 | |
close(3) = 0 | |
lstat("/nix/store/2vh6qx8scxxcrh2c9xb6iwsjqk482fv8-nixos-18.03pre129076.831ef4756e3/nixos/pkgs/stdenv/linux", {st_mode=S_IFDIR|0555, st_size=8, ...}) = 0 | |
openat(AT_FDCWD, "/nix/store/2vh6qx8scxxcrh2c9xb6iwsjqk482fv8-nixos-18.03pre129076.831ef4756e3/nixos/pkgs/stdenv/linux/default.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=13825, ...}) = 0 | |
read(3, "# This file constructs the standard build environment for the\n# Linux/i686 platform. It's completely pure; that is, it relies on no\n# external (non-Nix) tools, such as /usr/bin/gcc, and it contains a C\n# compiler and linker that do not search in default locations,\n# ensuring purity of components pr"..., 13825) = 13825 | |
close(3) = 0 | |
brk(0x1a7a4000) = 0x1a7a4000 | |
lstat("/nix/store/2vh6qx8scxxcrh2c9xb6iwsjqk482fv8-nixos-18.03pre129076.831ef4756e3/nixos/pkgs/top-level/stage.nix", {st_mode=S_IFREG|0444, st_size=4974, ...}) = 0 | |
openat(AT_FDCWD, "/nix/store/2vh6qx8scxxcrh2c9xb6iwsjqk482fv8-nixos-18.03pre129076.831ef4756e3/nixos/pkgs/top-level/stage.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=4974, ...}) = 0 | |
read(3, "/* This file composes a single bootstrapping stage of the Nix Packages\n collection. That is, it imports the functions that build the various\n packages, and calls them with appropriate arguments. The result is a set of\n all the packages in the Nix Packages collection for some particular platfor"..., 4974) = 4974 | |
close(3) = 0 | |
lstat("/nix/store/2vh6qx8scxxcrh2c9xb6iwsjqk482fv8-nixos-18.03pre129076.831ef4756e3/nixos/lib/fixed-points.nix", {st_mode=S_IFREG|0444, st_size=3224, ...}) = 0 | |
openat(AT_FDCWD, "/nix/store/2vh6qx8scxxcrh2c9xb6iwsjqk482fv8-nixos-18.03pre129076.831ef4756e3/nixos/lib/fixed-points.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=3224, ...}) = 0 | |
read(3, "{ ... }:\nrec {\n # Compute the fixed point of the given function `f`, which is usually an\n # attribute set that expects its final, non-recursive representation as an\n # argument:\n #\n # f = self: { foo = \"foo\"; bar = \"bar\"; foobar = self.foo + self.bar; }\n #\n # Nix evaluates this recursion "..., 3224) = 3224 | |
close(3) = 0 | |
lstat("/nix/store/2vh6qx8scxxcrh2c9xb6iwsjqk482fv8-nixos-18.03pre129076.831ef4756e3/nixos/pkgs/stdenv/adapters.nix", {st_mode=S_IFREG|0444, st_size=7572, ...}) = 0 | |
openat(AT_FDCWD, "/nix/store/2vh6qx8scxxcrh2c9xb6iwsjqk482fv8-nixos-18.03pre129076.831ef4756e3/nixos/pkgs/stdenv/adapters.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=7572, ...}) = 0 | |
read(3, "/* This file contains various functions that take a stdenv and return\n a new stdenv with different behaviour, e.g. using a different C\n compiler. */\n\npkgs:\n\nrec {\n\n\n # Override the compiler in stdenv for specific packages.\n overrideCC = stdenv: cc: stdenv.override { allowedRequisites = null; c"..., 7572) = 7572 | |
close(3) = 0 | |
lstat("/nix/store/2vh6qx8scxxcrh2c9xb6iwsjqk482fv8-nixos-18.03pre129076.831ef4756e3/nixos/pkgs/build-support/trivial-builders.nix", {st_mode=S_IFREG|0444, st_size=5597, ...}) = 0 | |
openat(AT_FDCWD, "/nix/store/2vh6qx8scxxcrh2c9xb6iwsjqk482fv8-nixos-18.03pre129076.831ef4756e3/nixos/pkgs/build-support/trivial-builders.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=5597, ...}) = 0 | |
read(3, "{ lib, stdenv, stdenvNoCC, lndir }:\n\nlet\n\n runCommand' = stdenv: name: env: buildCommand:\n stdenv.mkDerivation ({\n inherit name buildCommand;\n passAsFile = [ \"buildCommand\" ];\n } // env);\n\nin\n\nrec {\n\n # Run the shell command `buildCommand' to produce a store path named\n # `name'. "..., 5597) = 5597 | |
close(3) = 0 | |
brk(0x1a7c5000) = 0x1a7c5000 | |
lstat("/nix/store/2vh6qx8scxxcrh2c9xb6iwsjqk482fv8-nixos-18.03pre129076.831ef4756e3/nixos/pkgs/top-level/splice.nix", {st_mode=S_IFREG|0444, st_size=6137, ...}) = 0 | |
openat(AT_FDCWD, "/nix/store/2vh6qx8scxxcrh2c9xb6iwsjqk482fv8-nixos-18.03pre129076.831ef4756e3/nixos/pkgs/top-level/splice.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=6137, ...}) = 0 | |
read(3, "# The `splicedPackages' package set, and its use by `callPackage`\n#\n# The `buildPackages` pkg set is a new concept, and the vast majority package\n# expression (the other *.nix files) are not designed with it in mind. This\n# presents us with a problem with how to get the right version (build-time vs\n"..., 6137) = 6137 | |
close(3) = 0 | |
lstat("/nix/store/2vh6qx8scxxcrh2c9xb6iwsjqk482fv8-nixos-18.03pre129076.831ef4756e3/nixos/pkgs/top-level/all-packages.nix", {st_mode=S_IFREG|0444, st_size=664046, ...}) = 0 | |
openat(AT_FDCWD, "/nix/store/2vh6qx8scxxcrh2c9xb6iwsjqk482fv8-nixos-18.03pre129076.831ef4756e3/nixos/pkgs/top-level/all-packages.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=664046, ...}) = 0 | |
mmap(NULL, 667648, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) = 0x76ffc6b58000 | |
read(3, "/* The top-level package collection of nixpkgs.\n * It is sorted by categories corresponding to the folder names\n * in the /pkgs folder. Inside the categories packages are roughly\n * sorted by alphabet, but strict sorting has been long lost due\n * to merges. Please use the full-text search of your ed"..., 664046) = 664046 | |
mmap(NULL, 667648, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) = 0x76ffc6ab5000 | |
munmap(0x76ffc6b58000, 667648) = 0 | |
close(3) = 0 | |
brk(0x1a879000) = 0x1a879000 | |
brk(0x1a89a000) = 0x1a89a000 | |
brk(0x1a8bb000) = 0x1a8bb000 | |
brk(0x1a8dc000) = 0x1a8dc000 | |
brk(0x1a8fd000) = 0x1a8fd000 | |
brk(0x1a91e000) = 0x1a91e000 | |
brk(0x1a93f000) = 0x1a93f000 | |
brk(0x1a960000) = 0x1a960000 | |
brk(0x1a981000) = 0x1a981000 | |
brk(0x1a9a2000) = 0x1a9a2000 | |
brk(0x1a9c3000) = 0x1a9c3000 | |
brk(0x1a9e4000) = 0x1a9e4000 | |
brk(0x1aa05000) = 0x1aa05000 | |
brk(0x1aa26000) = 0x1aa26000 | |
brk(0x1aa47000) = 0x1aa47000 | |
brk(0x1aa68000) = 0x1aa68000 | |
brk(0x1aa89000) = 0x1aa89000 | |
brk(0x1aaaa000) = 0x1aaaa000 | |
brk(0x1aacb000) = 0x1aacb000 | |
brk(0x1aaec000) = 0x1aaec000 | |
brk(0x1ab0d000) = 0x1ab0d000 | |
brk(0x1ab2e000) = 0x1ab2e000 | |
brk(0x1ab4f000) = 0x1ab4f000 | |
brk(0x1ab70000) = 0x1ab70000 | |
brk(0x1ab91000) = 0x1ab91000 | |
brk(0x1abb2000) = 0x1abb2000 | |
brk(0x1abd3000) = 0x1abd3000 | |
brk(0x1abf4000) = 0x1abf4000 | |
brk(0x1ac15000) = 0x1ac15000 | |
brk(0x1ac36000) = 0x1ac36000 | |
brk(0x1ac57000) = 0x1ac57000 | |
brk(0x1ac78000) = 0x1ac78000 | |
brk(0x1ac99000) = 0x1ac99000 | |
brk(0x1acba000) = 0x1acba000 | |
brk(0x1acdb000) = 0x1acdb000 | |
brk(0x1acfc000) = 0x1acfc000 | |
brk(0x1ad1d000) = 0x1ad1d000 | |
brk(0x1ad3e000) = 0x1ad3e000 | |
brk(0x1ad5f000) = 0x1ad5f000 | |
brk(0x1ad80000) = 0x1ad80000 | |
brk(0x1ada1000) = 0x1ada1000 | |
brk(0x1adc2000) = 0x1adc2000 | |
brk(0x1ade3000) = 0x1ade3000 | |
brk(0x1ae04000) = 0x1ae04000 | |
brk(0x1ae25000) = 0x1ae25000 | |
brk(0x1ae46000) = 0x1ae46000 | |
brk(0x1ae67000) = 0x1ae67000 | |
brk(0x1ae88000) = 0x1ae88000 | |
brk(0x1aea9000) = 0x1aea9000 | |
brk(0x1aeca000) = 0x1aeca000 | |
brk(0x1aeeb000) = 0x1aeeb000 | |
brk(0x1af0c000) = 0x1af0c000 | |
brk(0x1af2d000) = 0x1af2d000 | |
brk(0x1af4e000) = 0x1af4e000 | |
brk(0x1af6f000) = 0x1af6f000 | |
brk(0x1af90000) = 0x1af90000 | |
brk(0x1afb1000) = 0x1afb1000 | |
brk(0x1afd2000) = 0x1afd2000 | |
brk(0x1aff3000) = 0x1aff3000 | |
brk(0x1b014000) = 0x1b014000 | |
brk(0x1b035000) = 0x1b035000 | |
munmap(0x76ffc6ab5000, 667648) = 0 | |
lstat("/nix/store/2vh6qx8scxxcrh2c9xb6iwsjqk482fv8-nixos-18.03pre129076.831ef4756e3/nixos/pkgs/top-level/aliases.nix", {st_mode=S_IFREG|0444, st_size=9655, ...}) = 0 | |
openat(AT_FDCWD, "/nix/store/2vh6qx8scxxcrh2c9xb6iwsjqk482fv8-nixos-18.03pre129076.831ef4756e3/nixos/pkgs/top-level/aliases.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=9655, ...}) = 0 | |
read(3, "self:\n\nwith self;\n\nlet\n # Removing recurseForDerivation prevents derivations of aliased attribute\n # set to appear while listing all the packages available.\n removeRecurseForDerivations = alias: with lib;\n if alias.recurseForDerivations or false then\n removeAttrs alias [\"recurseForDerivat"..., 9655) = 9655 | |
close(3) = 0 | |
lstat("/nix/store/2vh6qx8scxxcrh2c9xb6iwsjqk482fv8-nixos-18.03pre129076.831ef4756e3/nixos/pkgs/stdenv/generic", {st_mode=S_IFDIR|0555, st_size=8, ...}) = 0 | |
openat(AT_FDCWD, "/nix/store/2vh6qx8scxxcrh2c9xb6iwsjqk482fv8-nixos-18.03pre129076.831ef4756e3/nixos/pkgs/stdenv/generic/default.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=4948, ...}) = 0 | |
read(3, "let lib = import ../../../lib; in lib.makeOverridable (\n\n{ name ? \"stdenv\", preHook ? \"\", initialPath, cc, shell\n, allowedRequisites ? null, extraAttrs ? {}, overrides ? (self: super: {}), config\n\n, # The `fetchurl' to use for downloading curl and its dependencies\n # (see all-packages.nix).\n fetch"..., 4948) = 4948 | |
close(3) = 0 | |
lstat("/nix/store/2vh6qx8scxxcrh2c9xb6iwsjqk482fv8-nixos-18.03pre129076.831ef4756e3/nixos/lib/customisation.nix", {st_mode=S_IFREG|0444, st_size=7774, ...}) = 0 | |
openat(AT_FDCWD, "/nix/store/2vh6qx8scxxcrh2c9xb6iwsjqk482fv8-nixos-18.03pre129076.831ef4756e3/nixos/lib/customisation.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=7774, ...}) = 0 | |
read(3, "{ lib }:\nlet\n\n inherit (builtins) attrNames;\n\nin\n\nrec {\n\n\n /* `overrideDerivation drv f' takes a derivation (i.e., the result\n of a call to the builtin function `derivation') and returns a new\n derivation in which the attributes of the original are overridden\n according to the function"..., 7774) = 7774 | |
close(3) = 0 | |
brk(0x1b045000) = 0x1b045000 | |
lstat("/nix/store/2vh6qx8scxxcrh2c9xb6iwsjqk482fv8-nixos-18.03pre129076.831ef4756e3/nixos/lib/systems/parse.nix", {st_mode=S_IFREG|0444, st_size=9832, ...}) = 0 | |
openat(AT_FDCWD, "/nix/store/2vh6qx8scxxcrh2c9xb6iwsjqk482fv8-nixos-18.03pre129076.831ef4756e3/nixos/lib/systems/parse.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=9832, ...}) = 0 | |
read(3, "# Define the list of system with their properties.\n#\n# See https://clang.llvm.org/docs/CrossCompilation.html and\n# http://llvm.org/docs/doxygen/html/Triple_8cpp_source.html especially\n# Triple::normalize. Parsing should essentially act as a more conservative\n# version of that last function.\n#\n# Most"..., 9832) = 9832 | |
close(3) = 0 | |
lstat("/nix/store/2vh6qx8scxxcrh2c9xb6iwsjqk482fv8-nixos-18.03pre129076.831ef4756e3/nixos/lib/types.nix", {st_mode=S_IFREG|0444, st_size=16698, ...}) = 0 | |
openat(AT_FDCWD, "/nix/store/2vh6qx8scxxcrh2c9xb6iwsjqk482fv8-nixos-18.03pre129076.831ef4756e3/nixos/lib/types.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=16698, ...}) = 0 | |
read(3, "# Definitions related to run-time type checking. Used in particular\n# to type-check NixOS configurations.\n{ lib }:\nwith lib.lists;\nwith lib.attrsets;\nwith lib.options;\nwith lib.trivial;\nwith lib.strings;\nlet\n\n inherit (lib.modules) mergeDefinitions filterOverrides;\n outer_types =\nrec {\n isType ="..., 16698) = 16698 | |
close(3) = 0 | |
lstat("/nix/store/2vh6qx8scxxcrh2c9xb6iwsjqk482fv8-nixos-18.03pre129076.831ef4756e3/nixos/lib/strings.nix", {st_mode=S_IFREG|0444, st_size=14864, ...}) = 0 | |
openat(AT_FDCWD, "/nix/store/2vh6qx8scxxcrh2c9xb6iwsjqk482fv8-nixos-18.03pre129076.831ef4756e3/nixos/lib/strings.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=14864, ...}) = 0 | |
read(3, "/* String manipulation functions. */\n{ lib }:\nlet\n\ninherit (builtins) length;\n\nin\n\nrec {\n\n inherit (builtins) stringLength substring head tail isString replaceStrings;\n\n /* Concatenate a list of strings.\n\n Example:\n concatStrings [\"foo\" \"bar\"]\n => \"foobar\"\n */\n concatStrings = bu"..., 14864) = 14864 | |
close(3) = 0 | |
lstat("/nix/store/2vh6qx8scxxcrh2c9xb6iwsjqk482fv8-nixos-18.03pre129076.831ef4756e3/nixos/lib/options.nix", {st_mode=S_IFREG|0444, st_size=5519, ...}) = 0 | |
openat(AT_FDCWD, "/nix/store/2vh6qx8scxxcrh2c9xb6iwsjqk482fv8-nixos-18.03pre129076.831ef4756e3/nixos/lib/options.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=5519, ...}) = 0 | |
read(3, "# Nixpkgs/NixOS option handling.\n{ lib }:\n\nwith lib.trivial;\nwith lib.lists;\nwith lib.attrsets;\nwith lib.strings;\n\nrec {\n\n isOption = lib.isType \"option\";\n mkOption =\n { default ? null # Default value used when no definition is given in the configuration.\n , defaultText ? null # Textual repr"..., 5519) = 5519 | |
close(3) = 0 | |
lstat("/nix/store/2vh6qx8scxxcrh2c9xb6iwsjqk482fv8-nixos-18.03pre129076.831ef4756e3/nixos/pkgs/tools/text/gawk", {st_mode=S_IFDIR|0555, st_size=3, ...}) = 0 | |
openat(AT_FDCWD, "/nix/store/2vh6qx8scxxcrh2c9xb6iwsjqk482fv8-nixos-18.03pre129076.831ef4756e3/nixos/pkgs/tools/text/gawk/default.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=2573, ...}) = 0 | |
read(3, "{ stdenv, fetchurl\n# TODO: links -lsigsegv but loses the reference for some reason\n, withSigsegv ? (false && stdenv.system != \"x86_64-cygwin\"), libsigsegv\n, interactive ? false, readline\n\n/* Test suite broke on:\n stdenv.isCygwin # XXX: `test-dup2' segfaults on Cygwin 6.1\n || stdenv.isDarwin"..., 2573) = 2573 | |
close(3) = 0 | |
lstat("/nix/store/2vh6qx8scxxcrh2c9xb6iwsjqk482fv8-nixos-18.03pre129076.831ef4756e3/nixos/pkgs/servers/x11/xorg/default.nix", {st_mode=S_IFREG|0444, st_size=112988, ...}) = 0 | |
openat(AT_FDCWD, "/nix/store/2vh6qx8scxxcrh2c9xb6iwsjqk482fv8-nixos-18.03pre129076.831ef4756e3/nixos/pkgs/servers/x11/xorg/default.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=112988, ...}) = 0 | |
brk(0x1b06a000) = 0x1b06a000 | |
brk(0x1b082000) = 0x1b082000 | |
read(3, "# THIS IS A GENERATED FILE. DO NOT EDIT!\nargs @ { clangStdenv, fetchurl, fetchgit, fetchpatch, stdenv, pkgconfig, intltool, freetype, fontconfig\n, libxslt, expat, libpng, zlib, perl, mesa_drivers, spice_protocol\n, dbus, libuuid, openssl, gperf, m4, libevdev, tradcpp, libinput, mcpp, makeWrapper, au"..., 112988) = 112988 | |
close(3) = 0 | |
brk(0x1b0a3000) = 0x1b0a3000 | |
brk(0x1b0c4000) = 0x1b0c4000 | |
brk(0x1b0e5000) = 0x1b0e5000 | |
brk(0x1b106000) = 0x1b106000 | |
brk(0x1b127000) = 0x1b127000 | |
brk(0x1b148000) = 0x1b148000 | |
brk(0x1b169000) = 0x1b169000 | |
brk(0x1b18a000) = 0x1b18a000 | |
lstat("/nix/store/2vh6qx8scxxcrh2c9xb6iwsjqk482fv8-nixos-18.03pre129076.831ef4756e3/nixos/pkgs/stdenv/generic/make-derivation.nix", {st_mode=S_IFREG|0444, st_size=12024, ...}) = 0 | |
openat(AT_FDCWD, "/nix/store/2vh6qx8scxxcrh2c9xb6iwsjqk482fv8-nixos-18.03pre129076.831ef4756e3/nixos/pkgs/stdenv/generic/make-derivation.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=12024, ...}) = 0 | |
read(3, "{ lib, config, stdenv }:\n\nrec {\n # `mkDerivation` wraps the builtin `derivation` function to\n # produce derivations that use this stdenv and its shell.\n #\n # See also:\n #\n # * https://nixos.org/nixpkgs/manual/#sec-using-stdenv\n # Details on how to use this mkDerivation function\n #\n # * ht"..., 12024) = 12024 | |
close(3) = 0 | |
lstat("/nix/store/2vh6qx8scxxcrh2c9xb6iwsjqk482fv8-nixos-18.03pre129076.831ef4756e3/nixos/lib/systems/platforms.nix", {st_mode=S_IFREG|0444, st_size=12310, ...}) = 0 | |
openat(AT_FDCWD, "/nix/store/2vh6qx8scxxcrh2c9xb6iwsjqk482fv8-nixos-18.03pre129076.831ef4756e3/nixos/lib/systems/platforms.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=12310, ...}) = 0 | |
read(3, "{ lib }:\nrec {\n pcBase = {\n name = \"pc\";\n kernelBaseConfig = \"defconfig\";\n # Build whatever possible as a module, if not stated in the extra config.\n kernelAutoModules = true;\n kernelTarget = \"bzImage\";\n };\n\n pc64 = pcBase // { kernelArch = \"x86_64\"; };\n\n pc32 = pcBase // { kernel"..., 12310) = 12310 | |
close(3) = 0 | |
brk(0x1b19a000) = 0x1b19a000 | |
brk(0x1b1aa000) = 0x1b1aa000 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/lib/utils.nix", {st_mode=S_IFREG|0444, st_size=1062, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/lib/utils.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=1062, ...}) = 0 | |
read(3, "pkgs: with pkgs.lib;\n\nrec {\n\n # Check whenever fileSystem is needed for boot\n fsNeededForBoot = fs: fs.neededForBoot\n || elem fs.mountPoint [ \"/\" \"/nix\" \"/nix/store\" \"/var\" \"/var/log\" \"/var/lib\" \"/etc\" ];\n\n # Check whenever `b` depends on `a` as a fileSystem\n # FIXME: it's in"..., 1062) = 1062 | |
close(3) = 0 | |
brk(0x1b1ba000) = 0x1b1ba000 | |
brk(0x1b1ca000) = 0x1b1ca000 | |
brk(0x1b1da000) = 0x1b1da000 | |
brk(0x1b1ea000) = 0x1b1ea000 | |
brk(0x1b1fa000) = 0x1b1fa000 | |
brk(0x1b20a000) = 0x1b20a000 | |
brk(0x1b21a000) = 0x1b21a000 | |
brk(0x1b22a000) = 0x1b22a000 | |
brk(0x1b23a000) = 0x1b23a000 | |
brk(0x1b24a000) = 0x1b24a000 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/web-servers/phpfpm/pool-options.nix", {st_mode=S_IFREG|0444, st_size=727, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/web-servers/phpfpm/pool-options.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=727, ...}) = 0 | |
read(3, "{ lib }:\n\nwith lib; {\n\n options = {\n\n listen = mkOption {\n type = types.str;\n example = \"/path/to/unix/socket\";\n description = ''\n The address on which to accept FastCGI requests.\n '';\n };\n\n extraConfig = mkOption {\n type = types.lines;\n example = ''\n "..., 727) = 727 | |
close(3) = 0 | |
brk(0x1b25a000) = 0x1b25a000 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/web-servers/apache-httpd/per-server-options.nix", {st_mode=S_IFREG|0444, st_size=4847, ...}) = 0 | |
openat(AT_FDCWD, "/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs/nixos/modules/services/web-servers/apache-httpd/per-server-options.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=4847, ...}) = 0 | |
read(3, "# This file defines the options that can be used both for the Apache\n# main server configuration, and for the virtual hosts. (The latter\n# has additional options that affect the web server as a whole, like\n# the user/group to run under.)\n\n{ forMainServer, lib }:\n\nwith lib;\n\n{\n\n hostName = mkOption"..., 4847) = 4847 | |
close(3) = 0 | |
brk(0x1b26a000) = 0x1b26a000 | |
brk(0x1b27a000) = 0x1b27a000 | |
brk(0x1b28a000) = 0x1b28a000 | |
brk(0x1b29a000) = 0x1b29a000 | |
brk(0x1b2aa000) = 0x1b2aa000 | |
brk(0x1b2ba000) = 0x1b2ba000 | |
brk(0x1b2ca000) = 0x1b2ca000 | |
brk(0x1b2da000) = 0x1b2da000 | |
brk(0x1b2ea000) = 0x1b2ea000 | |
brk(0x1b2fa000) = 0x1b2fa000 | |
brk(0x1b30a000) = 0x1b30a000 | |
brk(0x1b31a000) = 0x1b31a000 | |
brk(0x1b32a000) = 0x1b32a000 | |
brk(0x1b33a000) = 0x1b33a000 | |
brk(0x1b34a000) = 0x1b34a000 | |
brk(0x1b35a000) = 0x1b35a000 | |
brk(0x1b36a000) = 0x1b36a000 | |
brk(0x1b37a000) = 0x1b37a000 | |
brk(0x1b38a000) = 0x1b38a000 | |
brk(0x1b39a000) = 0x1b39a000 | |
brk(0x1b3aa000) = 0x1b3aa000 | |
brk(0x1b3ba000) = 0x1b3ba000 | |
brk(0x1b3ca000) = 0x1b3ca000 | |
brk(0x1b3da000) = 0x1b3da000 | |
brk(0x1b3ea000) = 0x1b3ea000 | |
brk(0x1b3fa000) = 0x1b3fa000 | |
brk(0x1b40a000) = 0x1b40a000 | |
brk(0x1b41a000) = 0x1b41a000 | |
brk(0x1b42a000) = 0x1b42a000 | |
brk(0x1b43a000) = 0x1b43a000 | |
brk(0x1b44a000) = 0x1b44a000 | |
brk(0x1b45a000) = 0x1b45a000 | |
brk(0x1b46a000) = 0x1b46a000 | |
brk(0x1b47a000) = 0x1b47a000 | |
brk(0x1b48a000) = 0x1b48a000 | |
lstat("/nix/store/2vh6qx8scxxcrh2c9xb6iwsjqk482fv8-nixos-18.03pre129076.831ef4756e3/nixos/pkgs/os-specific/linux/kernel/linux-4.14.nix", {st_mode=S_IFREG|0444, st_size=470, ...}) = 0 | |
openat(AT_FDCWD, "/nix/store/2vh6qx8scxxcrh2c9xb6iwsjqk482fv8-nixos-18.03pre129076.831ef4756e3/nixos/pkgs/os-specific/linux/kernel/linux-4.14.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=470, ...}) = 0 | |
read(3, "{ stdenv, buildPackages, hostPlatform, fetchurl, perl, buildLinux, ... } @ args:\n\nwith stdenv.lib;\n\nbuildLinux (args // rec {\n version = \"4.14.20\";\n\n # branchVersion needs to be x.y\n extraMeta.branch = concatStrings (intersperse \".\" (take 2 (splitString \".\" version)));\n\n src = fetchurl {\n url"..., 470) = 470 | |
close(3) = 0 | |
lstat("/nix/store/2vh6qx8scxxcrh2c9xb6iwsjqk482fv8-nixos-18.03pre129076.831ef4756e3/nixos/pkgs/os-specific/linux/kernel/generic.nix", {st_mode=S_IFREG|0444, st_size=4163, ...}) = 0 | |
openat(AT_FDCWD, "/nix/store/2vh6qx8scxxcrh2c9xb6iwsjqk482fv8-nixos-18.03pre129076.831ef4756e3/nixos/pkgs/os-specific/linux/kernel/generic.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=4163, ...}) = 0 | |
read(3, "{ buildPackages, runCommand, nettools, bc, bison, flex, perl, gmp, libmpc, mpfr, openssl\n, ncurses\n, libelf\n, utillinux\n, writeTextFile, ubootTools\n, callPackage\n}:\n\n{ stdenv, buildPackages, perl, buildLinux\n\n, # The kernel source tarball.\n src\n\n, # The kernel version.\n version\n\n, # Overrides to t"..., 4163) = 4163 | |
brk(0x1b4ab000) = 0x1b4ab000 | |
brk(0x1b4ac000) = 0x1b4ac000 | |
close(3) = 0 | |
lstat("/nix/store/2vh6qx8scxxcrh2c9xb6iwsjqk482fv8-nixos-18.03pre129076.831ef4756e3/nixos/pkgs/os-specific/linux/kernel/manual-config.nix", {st_mode=S_IFREG|0444, st_size=10231, ...}) = 0 | |
openat(AT_FDCWD, "/nix/store/2vh6qx8scxxcrh2c9xb6iwsjqk482fv8-nixos-18.03pre129076.831ef4756e3/nixos/pkgs/os-specific/linux/kernel/manual-config.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=10231, ...}) = 0 | |
read(3, "{ buildPackages, runCommand, nettools, bc, bison, flex, perl, gmp, libmpc, mpfr, openssl\n, ncurses ? null\n, libelf\n, utillinux\n, writeTextFile, ubootTools\n}:\n\nlet\n readConfig = configfile: import (runCommand \"config.nix\" {} ''\n echo \"{\" > \"$out\"\n while IFS='=' read key val; do\n [ \"x''${k"..., 10231) = 10231 | |
close(3) = 0 | |
lstat("/nix/store/2vh6qx8scxxcrh2c9xb6iwsjqk482fv8-nixos-18.03pre129076.831ef4756e3/nixos/pkgs/development/libraries/libelf", {st_mode=S_IFDIR|0555, st_size=4, ...}) = 0 | |
openat(AT_FDCWD, "/nix/store/2vh6qx8scxxcrh2c9xb6iwsjqk482fv8-nixos-18.03pre129076.831ef4756e3/nixos/pkgs/development/libraries/libelf/default.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=1440, ...}) = 0 | |
read(3, "{ stdenv\n, fetchurl, autoreconfHook, gettext\n, buildPlatform, hostPlatform\n}:\n\nstdenv.mkDerivation rec {\n name = \"libelf-0.8.13\";\n\n src = fetchurl {\n url = \"http://www.mr511.de/software/${name}.tar.gz\";\n sha256 = \"0vf7s9dwk2xkmhb79aigqm0x0yfbw1j0b9ksm51207qwr179n6jr\";\n };\n\n patches = [\n "..., 1440) = 1440 | |
close(3) = 0 | |
brk(0x1b4bc000) = 0x1b4bc000 | |
brk(0x1b4cc000) = 0x1b4cc000 | |
brk(0x1b4dc000) = 0x1b4dc000 | |
brk(0x1b4ec000) = 0x1b4ec000 | |
brk(0x1b4fc000) = 0x1b4fc000 | |
brk(0x1b50c000) = 0x1b50c000 | |
brk(0x1b51c000) = 0x1b51c000 | |
brk(0x1b52c000) = 0x1b52c000 | |
brk(0x1b53c000) = 0x1b53c000 | |
brk(0x1b54c000) = 0x1b54c000 | |
brk(0x1b55c000) = 0x1b55c000 | |
brk(0x1b56c000) = 0x1b56c000 | |
lstat("/nix/store/2vh6qx8scxxcrh2c9xb6iwsjqk482fv8-nixos-18.03pre129076.831ef4756e3/nixos/pkgs/stdenv/generic/check-meta.nix", {st_mode=S_IFREG|0444, st_size=7771, ...}) = 0 | |
openat(AT_FDCWD, "/nix/store/2vh6qx8scxxcrh2c9xb6iwsjqk482fv8-nixos-18.03pre129076.831ef4756e3/nixos/pkgs/stdenv/generic/check-meta.nix", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0444, st_size=7771, ...}) = 0 | |
read(3, "# Checks derivation meta and attrs for problems (like brokenness,\n# licenses, etc).\n\n{ lib, config, system, meta, derivationArg, mkDerivationArg }:\n\nlet\n attrs = mkDerivationArg; # TODO: probably get rid of passing this one\n\n # See discussion at https://github.com/NixOS/nixpkgs/pull/25304#issuecom"..., 7771) = 7771 | |
close(3) = 0 | |
brk(0x1b58f000) = 0x1b58f000 | |
brk(0x1b590000) = 0x1b590000 | |
socket(AF_UNIX, SOCK_STREAM|SOCK_CLOEXEC, 0) = 3 | |
fcntl(3, F_GETFD) = 0x1 (flags FD_CLOEXEC) | |
fcntl(3, F_SETFD, FD_CLOEXEC) = 0 | |
connect(3, {sa_family=AF_UNIX, sun_path="/nix/var/nix/daemon-socket/socket"}, 110) = 0 | |
write(3, "cxin\0\0\0\0", 8) = 8 | |
read(3, "oixd\0\0\0\0\24\1\0\0\0\0\0\0", 32768) = 16 | |
sched_getaffinity(0, 128, [0, 1, 2, 3, 4, 5, 6, 7]) = 48 | |
sched_setaffinity(0, 128, [1]) = 0 | |
write(3, "\24\1\0\0\0\0\0\0\1\0\0\0\0\0\0\0\1\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0", 32) = 32 | |
read(3, "stla\0\0\0\0", 32768) = 8 | |
write(3, "\23\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\1\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\1\0\0\0\0\0\0\0\10\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\1\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\1\0\0\0\0\0\0\0\1\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0", 112) = 112 | |
read(3, "stla\0\0\0\0", 32768) = 8 | |
lstat("/nix/store/2vh6qx8scxxcrh2c9xb6iwsjqk482fv8-nixos-18.03pre129076.831ef4756e3/nixos/pkgs/stdenv/generic/default-builder.sh", {st_mode=S_IFREG|0444, st_size=34, ...}) = 0 | |
openat(AT_FDCWD, "/nix/store/2vh6qx8scxxcrh2c9xb6iwsjqk482fv8-nixos-18.03pre129076.831ef4756e3/nixos/pkgs/stdenv/generic/default-builder.sh", O_RDONLY|O_CLOEXEC) = 4 | |
read(4, "source $stdenv/setup\ngenericBuild\n", 34) = 34 | |
close(4) = 0 | |
write(3, "\7\0\0\0\0\0\0\0\22\0\0\0\0\0\0\0default-builder.sh\0\0\0\0\0\0\0\0\0\0\0\0\0\0\1\0\0\0\0\0\0\0\6\0\0\0\0\0\0\0sha256\0\0\r\0\0\0\0\0\0\0nix-archive-1\0\0\0\1\0\0\0\0\0\0\0(\0\0\0\0\0\0\0\4\0\0\0\0\0\0\0type\0\0\0\0\7\0\0\0\0\0\0\0regular\0\10\0\0\0\0\0\0\0contents\"\0\0\0\0\0\0\0source $stdenv/setup\ngenericBuild\n\0\0\0\0\0\0\1\0\0\0\0\0\0\0)\0\0\0\0\0\0\0", 224) = 224 | |
read(3, "stla\0\0\0\0>\0\0\0\0\0\0\0/nix/store/9krlzvny65gdc8s7kpb6lkx8cd02c25b-default-builder.sh\0\0", 32768) = 80 | |
lstat("/nix/store/2vh6qx8scxxcrh2c9xb6iwsjqk482fv8-nixos-18.03pre129076.831ef4756e3/nixos/pkgs/build-support/cc-wrapper", {st_mode=S_IFDIR|0555, st_size=10, ...}) = 0 | |
openat(AT_FDCWD, "/nix/store/2vh6qx8scxxcrh2c9xb6iwsjqk482fv8-nixos-18.03pre129076.831ef4756e3/nixos/pkgs/build-support/cc-wrapper/default.nix", O_RDONLY|O_CLOEXEC) = 4 | |
fstat(4, {st_mode=S_IFREG|0444, st_size=11798, ...}) = 0 | |
brk(0x1b5b2000) = 0x1b5b2000 | |
read(4, "# The Nixpkgs CC is not directly usable, since it doesn't know where\n# the C library and standard header files are. Therefore the compiler\n# produced by that package cannot be installed directly in a user\n# environment and used from the command line. So we use a wrapper\n# script that sets up the rig"..., 11798) = 11798 | |
close(4) = 0 | |
brk(0x1b5c2000) = 0x1b5c2000 | |
lstat("/nix/store/2vh6qx8scxxcrh2c9xb6iwsjqk482fv8-nixos-18.03pre129076.831ef4756e3/nixos/lib/meta.nix", {st_mode=S_IFREG|0444, st_size=1842, ...}) = 0 | |
openat(AT_FDCWD, "/nix/store/2vh6qx8scxxcrh2c9xb6iwsjqk482fv8-nixos-18.03pre129076.831ef4756e3/nixos/lib/meta.nix", O_RDONLY|O_CLOEXEC) = 4 | |
fstat(4, {st_mode=S_IFREG|0444, st_size=1842, ...}) = 0 | |
read(4, "/* Some functions for manipulating meta attributes, as well as the\n name attribute. */\n\n{ lib }:\n\nrec {\n\n\n /* Add to or override the meta attributes of the given\n derivation.\n\n Example:\n addMetaAttrs {description = \"Bla blah\";} somePkg\n */\n addMetaAttrs = newAttrs: drv:\n drv //"..., 1842) = 1842 | |
close(4) = 0 | |
brk(0x1b5d2000) = 0x1b5d2000 | |
lstat("/nix/store/2vh6qx8scxxcrh2c9xb6iwsjqk482fv8-nixos-18.03pre129076.831ef4756e3/nixos/pkgs/stdenv/linux/bootstrap-tools", {st_mode=S_IFDIR|0555, st_size=4, ...}) = 0 | |
openat(AT_FDCWD, "/nix/store/2vh6qx8scxxcrh2c9xb6iwsjqk482fv8-nixos-18.03pre129076.831ef4756e3/nixos/pkgs/stdenv/linux/bootstrap-tools/default.nix", O_RDONLY|O_CLOEXEC) = 4 | |
fstat(4, {st_mode=S_IFREG|0444, st_size=315, ...}) = 0 | |
read(4, "{ system, bootstrapFiles }:\n\nderivation {\n name = \"bootstrap-tools\";\n\n builder = bootstrapFiles.busybox;\n\n args = [ \"ash\" \"-e\" ./scripts/unpack-bootstrap-tools.sh ];\n\n tarball = bootstrapFiles.bootstrapTools;\n\n inherit system;\n\n # Needed by the GCC wrapper.\n langC = true;\n langCC = true;\n i"..., 315) = 315 | |
close(4) = 0 | |
lstat("/nix/store/2vh6qx8scxxcrh2c9xb6iwsjqk482fv8-nixos-18.03pre129076.831ef4756e3/nixos/pkgs/development/libraries/glibc", {st_mode=S_IFDIR|0555, st_size=23, ...}) = 0 | |
openat(AT_FDCWD, "/nix/store/2vh6qx8scxxcrh2c9xb6iwsjqk482fv8-nixos-18.03pre129076.831ef4756e3/nixos/pkgs/development/libraries/glibc/default.nix", O_RDONLY|O_CLOEXEC) = 4 | |
fstat(4, {st_mode=S_IFREG|0444, st_size=3580, ...}) = 0 | |
read(4, "{ stdenv, callPackage\n, withLinuxHeaders ? true\n, installLocales ? true\n, profilingLibraries ? false\n, withGd ? false\n}:\n\nassert stdenv.cc.isGNU;\n\ncallPackage ./common.nix { inherit stdenv; } {\n name = \"glibc\" + stdenv.lib.optionalString withGd \"-gd\";\n\n inherit withLinuxHeaders profilingLibrar"..., 3580) = 3580 | |
close(4) = 0 | |
brk(0x1b5e2000) = 0x1b5e2000 | |
lstat("/nix/store/2vh6qx8scxxcrh2c9xb6iwsjqk482fv8-nixos-18.03pre129076.831ef4756e3/nixos/pkgs/build-support/bintools-wrapper", {st_mode=S_IFDIR|0555, st_size=9, ...}) = 0 | |
openat(AT_FDCWD, "/nix/store/2vh6qx8scxxcrh2c9xb6iwsjqk482fv8-nixos-18.03pre129076.831ef4756e3/nixos/pkgs/build-support/bintools-wrapper/default.nix", O_RDONLY|O_CLOEXEC) = 4 | |
fstat(4, {st_mode=S_IFREG|0444, st_size=10564, ...}) = 0 | |
read(4, "# The Nixpkgs CC is not directly usable, since it doesn't know where\n# the C library and standard header files are. Therefore the compiler\n# produced by that package cannot be installed directly in a user\n# environment and used from the command line. So we use a wrapper\n# script that sets up the rig"..., 10564) = 10564 | |
close(4) = 0 | |
brk(0x1b603000) = 0x1b603000 | |
brk(0x1b606000) = 0x1b606000 | |
lstat("/nix/store/2vh6qx8scxxcrh2c9xb6iwsjqk482fv8-nixos-18.03pre129076.831ef4756e3/nixos/pkgs/stdenv/linux/bootstrap-tools/scripts/unpack-bootstrap-tools.sh", {st_mode=S_IFREG|0444, st_size=1970, ...}) = 0 | |
openat(AT_FDCWD, "/nix/store/2vh6qx8scxxcrh2c9xb6iwsjqk482fv8-nixos-18.03pre129076.831ef4756e3/nixos/pkgs/stdenv/linux/bootstrap-tools/scripts/unpack-bootstrap-tools.sh", O_RDONLY|O_CLOEXEC) = 4 | |
read(4, "# Unpack the bootstrap tools tarball.\necho Unpacking the bootstrap tools...\n$builder mkdir $out\n< $tarball $builder unxz | $builder tar x -C $out\n\n# Set the ELF interpreter / RPATH in the bootstrap binaries.\necho Patching the bootstrap tools...\n\nif test -f $out/lib/ld.so.?; then\n # MIPS case\n LD"..., 1970) = 1970 | |
close(4) = 0 | |
write(3, "\7\0\0\0\0\0\0\0\31\0\0\0\0\0\0\0unpack-bootstrap-tools.sh\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\1\0\0\0\0\0\0\0\6\0\0\0\0\0\0\0sha256\0\0\r\0\0\0\0\0\0\0nix-archive-1\0\0\0\1\0\0\0\0\0\0\0(\0\0\0\0\0\0\0\4\0\0\0\0\0\0\0type\0\0\0\0\7\0\0\0\0\0\0\0regular\0\10\0\0\0\0\0\0\0contents\262\7\0\0\0\0\0\0# Unpack the bootstrap tools tarball.\necho Unpacking the bootstrap tools...\n$builder mkdir $out\n< $tarball $builder unxz | $"..., 2168) = 2168 | |
read(3, "stla\0\0\0\0E\0\0\0\0\0\0\0/nix/store/pvn8nrg8aziwsc7yy8wkgxf4s9amnl3d-unpack-bootstrap-tools.sh\0\0\0", 32768) = 88 | |
lstat("/nix/store/2vh6qx8scxxcrh2c9xb6iwsjqk482fv8-nixos-18.03pre129076.831ef4756e3/nixos/pkgs/stdenv/linux/bootstrap-files/x86_64.nix", {st_mode=S_IFREG|0444, st_size=351, ...}) = 0 | |
openat(AT_FDCWD, "/nix/store/2vh6qx8scxxcrh2c9xb6iwsjqk482fv8-nixos-18.03pre129076.831ef4756e3/nixos/pkgs/stdenv/linux/bootstrap-files/x86_64.nix", O_RDONLY|O_CLOEXEC) = 4 | |
fstat(4, {st_mode=S_IFREG|0444, st_size=351, ...}) = 0 | |
read(4, "# Use busybox for i686-linux since it works on x86_64-linux as well.\n(import ./i686.nix) //\n\n{\n bootstrapTools = import <nix/fetchurl.nix> {\n url = http://tarballs.nixos.org/stdenv-linux/x86_64/4907fc9e8d0d82b28b3c56e3a478a2882f1d700f/bootstrap-tools.tar.xz;\n sha256 = \"abe3f0727dd771a60b79228"..., 351) = 351 | |
close(4) = 0 | |
lstat("/nix/store/2vh6qx8scxxcrh2c9xb6iwsjqk482fv8-nixos-18.03pre129076.831ef4756e3/nixos/pkgs/stdenv/linux/bootstrap-files/i686.nix", {st_mode=S_IFREG|0444, st_size=510, ...}) = 0 | |
openat(AT_FDCWD, "/nix/store/2vh6qx8scxxcrh2c9xb6iwsjqk482fv8-nixos-18.03pre129076.831ef4756e3/nixos/pkgs/stdenv/linux/bootstrap-files/i686.nix", O_RDONLY|O_CLOEXEC) = 4 | |
fstat(4, {st_mode=S_IFREG|0444, st_size=510, ...}) = 0 | |
read(4, "{\n busybox = import <nix/fetchurl.nix> {\n url = http://tarballs.nixos.org/stdenv-linux/i686/4907fc9e8d0d82b28b3c56e3a478a2882f1d700f/busybox;\n sha256 = \"ef4c1be6c7ae57e4f654efd90ae2d2e204d6769364c46469fa9ff3761195cba1\";\n executable = true;\n };\n\n bootstrapTools = import <nix/fetchurl.nix>"..., 510) = 510 | |
close(4) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels", {st_mode=S_IFLNK|0777, st_size=15, ...}) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nix/fetchurl.nix", 0x7ffdbd88e830) = -1 ENOENT (No such file or directory) | |
lstat("/nix/store/r8zhwq9xylxw8a823kpvqy0kfqq4g52f-nix-2.0pre5968_a6c0b773/share/nix/corepkgs", {st_mode=S_IFDIR|0555, st_size=8, ...}) = 0 | |
lstat("/nix/store/r8zhwq9xylxw8a823kpvqy0kfqq4g52f-nix-2.0pre5968_a6c0b773/share/nix/corepkgs//fetchurl.nix", {st_mode=S_IFREG|0444, st_size=1123, ...}) = 0 | |
lstat("/nix/store/r8zhwq9xylxw8a823kpvqy0kfqq4g52f-nix-2.0pre5968_a6c0b773/share/nix/corepkgs/fetchurl.nix", {st_mode=S_IFREG|0444, st_size=1123, ...}) = 0 | |
openat(AT_FDCWD, "/nix/store/r8zhwq9xylxw8a823kpvqy0kfqq4g52f-nix-2.0pre5968_a6c0b773/share/nix/corepkgs/fetchurl.nix", O_RDONLY|O_CLOEXEC) = 4 | |
fstat(4, {st_mode=S_IFREG|0444, st_size=1123, ...}) = 0 | |
read(4, "{ system ? \"\" # obsolete\n, url\n, md5 ? \"\", sha1 ? \"\", sha256 ? \"\", sha512 ? \"\"\n, outputHash ?\n if sha512 != \"\" then sha512 else if sha1 != \"\" then sha1 else if md5 != \"\" then md5 else sha256\n, outputHashAlgo ?\n if sha512 != \"\" then \"sha512\" else if sha1 != \"\" then \"sha1\" else if md5 != \"\" then"..., 1123) = 1123 | |
close(4) = 0 | |
write(3, "\10\0\0\0\0\0\0\0\v\0\0\0\0\0\0\0busybox.drv\0\0\0\0\0 \3\0\0\0\0\0\0Derive([(\"out\",\"/nix/store/lan2w3ab1mvpxj3ppiw2sizh8i7rpz7s-busybox\",\"r:sha256\",\"ef4c1be6c7ae57e4f654efd90ae2d2e204d6769364c46469fa9ff3761195cba1\")],[],[],\"builtin\",\"builtin:fetchurl\",[],[(\"builder\",\"builtin:fetchurl\"),(\"executable\",\"1\"),(\"impureEnvVars\",\"http"..., 848) = 848 | |
read(3, "stla\0\0\0\0007\0\0\0\0\0\0\0/nix/store/b7irlwi2wjlx5aj1dghx4c8k3ax6m56q-busybox.drv\0", 32768) = 72 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nix/fetchurl.nix", 0x7ffdbd88e830) = -1 ENOENT (No such file or directory) | |
lstat("/nix/store/r8zhwq9xylxw8a823kpvqy0kfqq4g52f-nix-2.0pre5968_a6c0b773/share/nix/corepkgs//fetchurl.nix", {st_mode=S_IFREG|0444, st_size=1123, ...}) = 0 | |
write(3, "\10\0\0\0\0\0\0\0\32\0\0\0\0\0\0\0bootstrap-tools.tar.xz.drv\0\0\0\0\0\0g\3\0\0\0\0\0\0Derive([(\"out\",\"/nix/store/9ybz7r3i3i2cy6f3h6sm0psa2kzqdhz3-bootstrap-tools.tar.xz\",\"sha256\",\"abe3f0727dd771a60b7922892d308da1bc7b082afc13440880862f0c8823c09f\")],[],[],\"builtin\",\"builtin:fetchurl\",[],[(\"builder\",\"builtin:fetchurl\"),(\"executable"..., 936) = 936 | |
read(3, "stla\0\0\0\0F\0\0\0\0\0\0\0/nix/store/drsdq2ca1q1dj1hd0r1w2hl4s0fak1vh-bootstrap-tools.tar.xz.drv\0\0", 32768) = 88 | |
write(3, "\10\0\0\0\0\0\0\0\23\0\0\0\0\0\0\0bootstrap-tools.drv\0\0\0\0\0\r\3\0\0\0\0\0\0Derive([(\"out\",\"/nix/store/d1prcspbh2qsviipvnaxizcj8l3g7fpw-bootstrap-tools\",\"\",\"\")],[(\"/nix/store/b7irlwi2wjlx5aj1dghx4c8k3ax6m56q-busybox.drv\",[\"out\"]),(\"/nix/store/drsdq2ca1q1dj1hd0r1w2hl4s0fak1vh-bootstrap-tools.tar.xz.drv\",[\"out\"])],[\"/nix/store/p"..., 1064) = 1064 | |
read(3, "stla\0\0\0\0?\0\0\0\0\0\0\0/nix/store/w3xksy5k5rywl4z27v7gi8yafb7ci2sw-bootstrap-tools.drv\0", 32768) = 80 | |
lstat("/nix/store/2vh6qx8scxxcrh2c9xb6iwsjqk482fv8-nixos-18.03pre129076.831ef4756e3/nixos/pkgs/stdenv/generic/builder.sh", {st_mode=S_IFREG|0444, st_size=644, ...}) = 0 | |
openat(AT_FDCWD, "/nix/store/2vh6qx8scxxcrh2c9xb6iwsjqk482fv8-nixos-18.03pre129076.831ef4756e3/nixos/pkgs/stdenv/generic/builder.sh", O_RDONLY|O_CLOEXEC) = 4 | |
read(4, "export PATH=\nfor i in $initialPath; do\n if [ \"$i\" = / ]; then i=; fi\n PATH=$PATH${PATH:+:}$i/bin\ndone\n\nmkdir $out\n\necho \"export SHELL=$shell\" > $out/setup\necho \"initialPath=\\\"$initialPath\\\"\" >> $out/setup\necho \"defaultNativeBuildInputs=\\\"$defaultNativeBuildInputs\\\"\" >> $out/setup\necho \"default"..., 644) = 644 | |
close(4) = 0 | |
write(3, "\7\0\0\0\0\0\0\0\n\0\0\0\0\0\0\0builder.sh\0\0\0\0\0\0\0\0\0\0\0\0\0\0\1\0\0\0\0\0\0\0\6\0\0\0\0\0\0\0sha256\0\0\r\0\0\0\0\0\0\0nix-archive-1\0\0\0\1\0\0\0\0\0\0\0(\0\0\0\0\0\0\0\4\0\0\0\0\0\0\0type\0\0\0\0\7\0\0\0\0\0\0\0regular\0\10\0\0\0\0\0\0\0contents\204\2\0\0\0\0\0\0export PATH=\nfor i in $initialPath; do\n if [ \"$i\" = / ]; then i=; fi\n PATH=$PATH${PATH:+:}$i/bin\ndone\n\nmkdir $out\n\necho \"export SHELL="..., 824) = 824 | |
read(3, "stla\0\0\0\0006\0\0\0\0\0\0\0/nix/store/dsyj1sp3h8q2wwi8m6z548rvn3bmm3vc-builder.sh\0\0", 32768) = 72 | |
lstat("/nix/store/2vh6qx8scxxcrh2c9xb6iwsjqk482fv8-nixos-18.03pre129076.831ef4756e3/nixos/pkgs/build-support/setup-hooks/move-docs.sh", {st_mode=S_IFREG|0444, st_size=643, ...}) = 0 | |
openat(AT_FDCWD, "/nix/store/2vh6qx8scxxcrh2c9xb6iwsjqk482fv8-nixos-18.03pre129076.831ef4756e3/nixos/pkgs/build-support/setup-hooks/move-docs.sh", O_RDONLY|O_CLOEXEC) = 4 | |
read(4, "# This setup hook moves $out/{man,doc,info} to $out/share; moves\n# $out/share/man to $man/share/man; and moves $out/share/doc to\n# $man/share/doc.\n\npreFixupHooks+=(_moveToShare)\n\n_moveToShare() {\n forceShare=${forceShare:=man doc info}\n if [ -z \"$forceShare\" -o -z \"$out\" ]; then return; fi\n\n "..., 643) = 643 | |
close(4) = 0 | |
write(3, "\7\0\0\0\0\0\0\0\f\0\0\0\0\0\0\0move-docs.sh\0\0\0\0\0\0\0\0\0\0\0\0\1\0\0\0\0\0\0\0\6\0\0\0\0\0\0\0sha256\0\0\r\0\0\0\0\0\0\0nix-archive-1\0\0\0\1\0\0\0\0\0\0\0(\0\0\0\0\0\0\0\4\0\0\0\0\0\0\0type\0\0\0\0\7\0\0\0\0\0\0\0regular\0\10\0\0\0\0\0\0\0contents\203\2\0\0\0\0\0\0# This setup hook moves $out/{man,doc,info} to $out/share; moves\n# $out/share/man to $man/share/man; and moves $out/share/doc to\n# $man/shar"..., 824) = 824 | |
read(3, "stla\0\0\0\0008\0\0\0\0\0\0\0/nix/store/mjjy30kxz775bhhi6j9phw81qh6dsbrf-move-docs.sh", 32768) = 72 | |
lstat("/nix/store/2vh6qx8scxxcrh2c9xb6iwsjqk482fv8-nixos-18.03pre129076.831ef4756e3/nixos/pkgs/build-support/setup-hooks/compress-man-pages.sh", {st_mode=S_IFREG|0444, st_size=943, ...}) = 0 | |
openat(AT_FDCWD, "/nix/store/2vh6qx8scxxcrh2c9xb6iwsjqk482fv8-nixos-18.03pre129076.831ef4756e3/nixos/pkgs/build-support/setup-hooks/compress-man-pages.sh", O_RDONLY|O_CLOEXEC) = 4 | |
read(4, "fixupOutputHooks+=('if [ -z \"$dontGzipMan\" ]; then compressManPages \"$prefix\"; fi')\n\ncompressManPages() {\n local dir=\"$1\"\n\n if [ -L \"$dir\"/share ] || [ -L \"$dir\"/share/man ] || [ ! -d \"$dir/share/man\" ]\n then return\n fi\n echo \"gzipping man pages under $dir/share/man/\"\n\n # Compr"..., 943) = 943 | |
close(4) = 0 | |
write(3, "\7\0\0\0\0\0\0\0\25\0\0\0\0\0\0\0compress-man-pages.sh\0\0\0\0\0\0\0\0\0\0\0\1\0\0\0\0\0\0\0\6\0\0\0\0\0\0\0sha256\0\0\r\0\0\0\0\0\0\0nix-archive-1\0\0\0\1\0\0\0\0\0\0\0(\0\0\0\0\0\0\0\4\0\0\0\0\0\0\0type\0\0\0\0\7\0\0\0\0\0\0\0regular\0\10\0\0\0\0\0\0\0contents\257\3\0\0\0\0\0\0fixupOutputHooks+=('if [ -z \"$dontGzipMan\" ]; then compressManPages \"$prefix\"; fi')\n\ncompressManPages() {\n local dir=\"$1\"\n\n if"..., 1128) = 1128 | |
read(3, "stla\0\0\0\0A\0\0\0\0\0\0\0/nix/store/81ikflgpwzgjk8b5vmvg9gaw9mbkc86k-compress-man-pages.sh\0\0\0\0\0\0\0", 32768) = 88 | |
lstat("/nix/store/2vh6qx8scxxcrh2c9xb6iwsjqk482fv8-nixos-18.03pre129076.831ef4756e3/nixos/pkgs/build-support/setup-hooks/strip.sh", {st_mode=S_IFREG|0444, st_size=1668, ...}) = 0 | |
openat(AT_FDCWD, "/nix/store/2vh6qx8scxxcrh2c9xb6iwsjqk482fv8-nixos-18.03pre129076.831ef4756e3/nixos/pkgs/build-support/setup-hooks/strip.sh", O_RDONLY|O_CLOEXEC) = 4 | |
read(4, "# This setup hook strips libraries and executables in the fixup phase.\n\nfixupOutputHooks+=(_doStrip)\n\n_doStrip() {\n # We don't bother to strip build platform code because it shouldn't make it\n # to $out anyways---if it does, that's a bigger problem that a lack of\n # stripping will help catc"..., 1668) = 1668 | |
close(4) = 0 | |
write(3, "\7\0\0\0\0\0\0\0\10\0\0\0\0\0\0\0strip.sh\0\0\0\0\0\0\0\0\1\0\0\0\0\0\0\0\6\0\0\0\0\0\0\0sha256\0\0\r\0\0\0\0\0\0\0nix-archive-1\0\0\0\1\0\0\0\0\0\0\0(\0\0\0\0\0\0\0\4\0\0\0\0\0\0\0type\0\0\0\0\7\0\0\0\0\0\0\0regular\0\10\0\0\0\0\0\0\0contents\204\6\0\0\0\0\0\0# This setup hook strips libraries and executables in the fixup phase.\n\nfixupOutputHooks+=(_doStrip)\n\n_doStrip() {\n # We don't bother to strip bu"..., 1840) = 1840 | |
read(3, "stla\0\0\0\0004\0\0\0\0\0\0\0/nix/store/jw961avfhaq38h828wnawqsqniasqfwz-strip.sh\0\0\0\0", 32768) = 72 | |
lstat("/nix/store/2vh6qx8scxxcrh2c9xb6iwsjqk482fv8-nixos-18.03pre129076.831ef4756e3/nixos/pkgs/build-support/setup-hooks/patch-shebangs.sh", {st_mode=S_IFREG|0444, st_size=2815, ...}) = 0 | |
openat(AT_FDCWD, "/nix/store/2vh6qx8scxxcrh2c9xb6iwsjqk482fv8-nixos-18.03pre129076.831ef4756e3/nixos/pkgs/build-support/setup-hooks/patch-shebangs.sh", O_RDONLY|O_CLOEXEC) = 4 | |
read(4, "# This setup hook causes the fixup phase to rewrite all script\n# interpreter file names (`#! /path') to paths found in $PATH. E.g.,\n# /bin/sh will be rewritten to /nix/store/<hash>-some-bash/bin/sh.\n# /usr/bin/env gets special treatment so that \".../bin/env python\" is\n# rewritten to /nix/store/<ha"..., 2815) = 2815 | |
close(4) = 0 | |
write(3, "\7\0\0\0\0\0\0\0\21\0\0\0\0\0\0\0patch-shebangs.sh\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\1\0\0\0\0\0\0\0\6\0\0\0\0\0\0\0sha256\0\0\r\0\0\0\0\0\0\0nix-archive-1\0\0\0\1\0\0\0\0\0\0\0(\0\0\0\0\0\0\0\4\0\0\0\0\0\0\0type\0\0\0\0\7\0\0\0\0\0\0\0regular\0\10\0\0\0\0\0\0\0contents\377\n\0\0\0\0\0\0# This setup hook causes the fixup phase to rewrite all script\n# interpreter file names (`#! /path') to paths found in $PATH. E.g."..., 3000) = 3000 | |
read(3, "stla\0\0\0\0=\0\0\0\0\0\0\0/nix/store/gpy3r9ss5ngfkib8ylx7jzgahq7m0x5b-patch-shebangs.sh\0\0\0", 32768) = 80 | |
lstat("/nix/store/2vh6qx8scxxcrh2c9xb6iwsjqk482fv8-nixos-18.03pre129076.831ef4756e3/nixos/pkgs/build-support/setup-hooks/audit-tmpdir.sh", {st_mode=S_IFREG|0444, st_size=1391, ...}) = 0 | |
openat(AT_FDCWD, "/nix/store/2vh6qx8scxxcrh2c9xb6iwsjqk482fv8-nixos-18.03pre129076.831ef4756e3/nixos/pkgs/build-support/setup-hooks/audit-tmpdir.sh", O_RDONLY|O_CLOEXEC) = 4 | |
read(4, "# Check whether RPATHs or wrapper scripts contain references to\n# $TMPDIR. This is a serious security bug because it allows any user\n# to inject files into search paths of other users' processes.\n#\n# It might be better to have Nix scan build output for any occurrence\n# of $TMPDIR (which would also b"..., 1391) = 1391 | |
close(4) = 0 | |
write(3, "\7\0\0\0\0\0\0\0\17\0\0\0\0\0\0\0audit-tmpdir.sh\0\0\0\0\0\0\0\0\0\1\0\0\0\0\0\0\0\6\0\0\0\0\0\0\0sha256\0\0\r\0\0\0\0\0\0\0nix-archive-1\0\0\0\1\0\0\0\0\0\0\0(\0\0\0\0\0\0\0\4\0\0\0\0\0\0\0type\0\0\0\0\7\0\0\0\0\0\0\0regular\0\10\0\0\0\0\0\0\0contentso\5\0\0\0\0\0\0# Check whether RPATHs or wrapper scripts contain references to\n# $TMPDIR. This is a serious security bug because it allows any user\n# to in"..., 1568) = 1568 | |
read(3, "stla\0\0\0\0;\0\0\0\0\0\0\0/nix/store/j1q2bm9qjrhr6q2z819dgzi7bmy3hhjq-audit-tmpdir.sh\0\0\0\0\0", 32768) = 80 | |
lstat("/nix/store/2vh6qx8scxxcrh2c9xb6iwsjqk482fv8-nixos-18.03pre129076.831ef4756e3/nixos/pkgs/build-support/setup-hooks/multiple-outputs.sh", {st_mode=S_IFREG|0444, st_size=7400, ...}) = 0 | |
openat(AT_FDCWD, "/nix/store/2vh6qx8scxxcrh2c9xb6iwsjqk482fv8-nixos-18.03pre129076.831ef4756e3/nixos/pkgs/build-support/setup-hooks/multiple-outputs.sh", O_RDONLY|O_CLOEXEC) = 4 | |
read(4, "# The base package for automatic multiple-output splitting. Used in stdenv as well.\npreConfigureHooks+=(_multioutConfig)\npreFixupHooks+=(_multioutDocs)\npreFixupHooks+=(_multioutDevs)\npostFixupHooks+=(_multioutPropagateDev)\n\n# Assign the first string containing nonempty variable to the variable named"..., 7400) = 7400 | |
close(4) = 0 | |
write(3, "\7\0\0\0\0\0\0\0\23\0\0\0\0\0\0\0multiple-outputs.sh\0\0\0\0\0\0\0\0\0\0\0\0\0\1\0\0\0\0\0\0\0\6\0\0\0\0\0\0\0sha256\0\0\r\0\0\0\0\0\0\0nix-archive-1\0\0\0\1\0\0\0\0\0\0\0(\0\0\0\0\0\0\0\4\0\0\0\0\0\0\0type\0\0\0\0\7\0\0\0\0\0\0\0regular\0\10\0\0\0\0\0\0\0contents\350\34\0\0\0\0\0\0# The base package for automatic multiple-output splitting. Used in stdenv as well.\npreConfigureHooks+=(_multioutConfig)\npreFixupHoo"..., 7584) = 7584 | |
read(3, "stla\0\0\0\0?\0\0\0\0\0\0\0/nix/store/9ny6szla9dg61jv8q22qbnqsz37465n0-multiple-outputs.sh\0", 32768) = 80 | |
lstat("/nix/store/2vh6qx8scxxcrh2c9xb6iwsjqk482fv8-nixos-18.03pre129076.831ef4756e3/nixos/pkgs/build-support/setup-hooks/move-sbin.sh", {st_mode=S_IFREG|0444, st_size=545, ...}) = 0 | |
openat(AT_FDCWD, "/nix/store/2vh6qx8scxxcrh2c9xb6iwsjqk482fv8-nixos-18.03pre129076.831ef4756e3/nixos/pkgs/build-support/setup-hooks/move-sbin.sh", O_RDONLY|O_CLOEXEC) = 4 | |
read(4, "# This setup hook, for each output, moves everything in $output/sbin\n# to $output/bin, and replaces $output/sbin with a symlink to\n# $output/bin.\n\nfixupOutputHooks+=(_moveSbin)\n\n_moveSbin() {\n if [ \"$dontMoveSbin\" = 1 ]; then return; fi\n if [ ! -e \"$prefix/sbin\" -o -L \"$prefix/sbin\" ]; then re"..., 545) = 545 | |
close(4) = 0 | |
write(3, "\7\0\0\0\0\0\0\0\f\0\0\0\0\0\0\0move-sbin.sh\0\0\0\0\0\0\0\0\0\0\0\0\1\0\0\0\0\0\0\0\6\0\0\0\0\0\0\0sha256\0\0\r\0\0\0\0\0\0\0nix-archive-1\0\0\0\1\0\0\0\0\0\0\0(\0\0\0\0\0\0\0\4\0\0\0\0\0\0\0type\0\0\0\0\7\0\0\0\0\0\0\0regular\0\10\0\0\0\0\0\0\0contents!\2\0\0\0\0\0\0# This setup hook, for each output, moves everything in $output/sbin\n# to $output/bin, and replaces $output/sbin with a symlink to\n# $output"..., 728) = 728 | |
read(3, "stla\0\0\0\0008\0\0\0\0\0\0\0/nix/store/z82dl6ialp166drqihzkz67nkl6w3l16-move-sbin.sh", 32768) = 72 | |
lstat("/nix/store/2vh6qx8scxxcrh2c9xb6iwsjqk482fv8-nixos-18.03pre129076.831ef4756e3/nixos/pkgs/build-support/setup-hooks/move-lib64.sh", {st_mode=S_IFREG|0444, st_size=784, ...}) = 0 | |
openat(AT_FDCWD, "/nix/store/2vh6qx8scxxcrh2c9xb6iwsjqk482fv8-nixos-18.03pre129076.831ef4756e3/nixos/pkgs/build-support/setup-hooks/move-lib64.sh", O_RDONLY|O_CLOEXEC) = 4 | |
read(4, "# This setup hook, for each output, moves everything in $output/lib64\n# to $output/lib, and replaces $output/lib64 with a symlink to\n# $output/lib. The rationale is that lib64 directories are unnecessary\n# in Nix (since 32-bit and 64-bit builds of a package are in different\n# store paths anyway).\n# "..., 784) = 784 | |
close(4) = 0 | |
write(3, "\7\0\0\0\0\0\0\0\r\0\0\0\0\0\0\0move-lib64.sh\0\0\0\0\0\0\0\0\0\0\0\1\0\0\0\0\0\0\0\6\0\0\0\0\0\0\0sha256\0\0\r\0\0\0\0\0\0\0nix-archive-1\0\0\0\1\0\0\0\0\0\0\0(\0\0\0\0\0\0\0\4\0\0\0\0\0\0\0type\0\0\0\0\7\0\0\0\0\0\0\0regular\0\10\0\0\0\0\0\0\0contents\20\3\0\0\0\0\0\0# This setup hook, for each output, moves everything in $output/lib64\n# to $output/lib, and replaces $output/lib64 with a symlink to\n# $outp"..., 960) = 960 | |
read(3, "stla\0\0\0\0009\0\0\0\0\0\0\0/nix/store/a92kz10cwkpa91k5239inl3fd61zp5dh-move-lib64.sh\0\0\0\0\0\0\0", 32768) = 80 | |
lstat("/nix/store/2vh6qx8scxxcrh2c9xb6iwsjqk482fv8-nixos-18.03pre129076.831ef4756e3/nixos/pkgs/build-support/setup-hooks/set-source-date-epoch-to-latest.sh", {st_mode=S_IFREG|0444, st_size=1375, ...}) = 0 | |
openat(AT_FDCWD, "/nix/store/2vh6qx8scxxcrh2c9xb6iwsjqk482fv8-nixos-18.03pre129076.831ef4756e3/nixos/pkgs/build-support/setup-hooks/set-source-date-epoch-to-latest.sh", O_RDONLY|O_CLOEXEC) = 4 | |
read(4, "updateSourceDateEpoch() {\n local path=\"$1\"\n\n # Get the last modification time of all regular files, sort them,\n # and get the most recent. Maybe we should use\n # https://github.com/0-wiz-0/findnewest here.\n local -a res=($(find \"$path\" -type f -not -newer \"$NIX_BUILD_TOP/..\" -printf '"..., 1375) = 1375 | |
close(4) = 0 | |
write(3, "\7\0\0\0\0\0\0\0\"\0\0\0\0\0\0\0set-source-date-epoch-to-latest.sh\0\0\0\0\0\0\0\0\0\0\0\0\0\0\1\0\0\0\0\0\0\0\6\0\0\0\0\0\0\0sha256\0\0\r\0\0\0\0\0\0\0nix-archive-1\0\0\0\1\0\0\0\0\0\0\0(\0\0\0\0\0\0\0\4\0\0\0\0\0\0\0type\0\0\0\0\7\0\0\0\0\0\0\0regular\0\10\0\0\0\0\0\0\0contents_\5\0\0\0\0\0\0updateSourceDateEpoch() {\n local path=\"$1\"\n\n # Get the last modification time of all regular files, sort them,"..., 1576) = 1576 | |
read(3, "stla\0\0\0\0N\0\0\0\0\0\0\0/nix/store/15kgcm8hnd99p7plqzx7p4lcr2jni4df-set-source-date-epoch-to-latest.sh\0\0", 32768) = 96 | |
lstat("/nix/store/2vh6qx8scxxcrh2c9xb6iwsjqk482fv8-nixos-18.03pre129076.831ef4756e3/nixos/pkgs/stdenv/generic/setup.sh", {st_mode=S_IFREG|0444, st_size=35315, ...}) = 0 | |
openat(AT_FDCWD, "/nix/store/2vh6qx8scxxcrh2c9xb6iwsjqk482fv8-nixos-18.03pre129076.831ef4756e3/nixos/pkgs/stdenv/generic/setup.sh", O_RDONLY|O_CLOEXEC) = 4 | |
read(4, "set -eu\nset -o pipefail\n\nif (( \"${NIX_DEBUG:-0}\" >= 6 )); then\n set -x\nfi\n\n: ${outputs:=out}\n\n\n######################################################################\n# Hook handling.\n\n\n# Run all hooks with the specified name in the order in which they\n# were added, stopping if any fails (returns "..., 35315) = 35315 | |
write(3, "\7\0\0\0\0\0\0\0\10\0\0\0\0\0\0\0setup.sh\0\0\0\0\0\0\0\0\1\0\0\0\0\0\0\0\6\0\0\0\0\0\0\0sha256\0\0\r\0\0\0\0\0\0\0nix-archive-1\0\0\0\1\0\0\0\0\0\0\0(\0\0\0\0\0\0\0\4\0\0\0\0\0\0\0type\0\0\0\0\7\0\0\0\0\0\0\0regular\0\10\0\0\0\0\0\0\0contents\363\211\0\0\0\0\0\0", 152) = 152 | |
write(3, "set -eu\nset -o pipefail\n\nif (( \"${NIX_DEBUG:-0}\" >= 6 )); then\n set -x\nfi\n\n: ${outputs:=out}\n\n\n######################################################################\n# Hook handling.\n\n\n# Run all hooks with the specified name in the order in which they\n# were added, stopping if any fails (returns "..., 35315) = 35315 | |
close(4) = 0 | |
write(3, "\0\0\0\0\0\1\0\0\0\0\0\0\0)\0\0\0\0\0\0\0", 21) = 21 | |
read(3, "stla\0\0\0\0004\0\0\0\0\0\0\0/nix/store/mlqs4a4zf2whpkivj40gpfsiyq913grv-setup.sh\0\0\0\0", 32768) = 72 | |
brk(0x1b627000) = 0x1b627000 | |
write(3, "\10\0\0\0\0\0\0\0\25\0\0\0\0\0\0\0stdenv-linux-boot.drv\0\0\0002\t\0\0\0\0\0\0Derive([(\"out\",\"/nix/store/kffr6nsczi36hga4kj3798il9wdi4dwz-stdenv-linux-boot\",\"\",\"\")],[(\"/nix/store/w3xksy5k5rywl4z27v7gi8yafb7ci2sw-bootstrap-tools.drv\",[\"out\"])],[\"/nix/store/15kgcm8hnd99p7plqzx7p4lcr2jni4df-set-source-date-epoch-to-latest.sh\",\"/nix"..., 3264) = 3264 | |
read(3, "stla\0\0\0\0A\0\0\0\0\0\0\0/nix/store/8j8cdi3scinyx49qdl5h8pvsnn6fq7yb-stdenv-linux-boot.drv\0\0\0\0\0\0\0", 32768) = 88 | |
write(3, "\10\0\0\0\0\0\0\0\23\0\0\0\0\0\0\0bootstrap-glibc.drv\0\0\0\0\0\34\5\0\0\0\0\0\0Derive([(\"out\",\"/nix/store/bnss0yjacjfxqbmalsddhsw2zabfzmqc-bootstrap-glibc\",\"\",\"\")],[(\"/nix/store/8j8cdi3scinyx49qdl5h8pvsnn6fq7yb-stdenv-linux-boot.drv\",[\"out\"]),(\"/nix/store/w3xksy5k5rywl4z27v7gi8yafb7ci2sw-bootstrap-tools.drv\",[\"out\"])],[\"/nix/stor"..., 1592) = 1592 | |
read(3, "stla\0\0\0\0?\0\0\0\0\0\0\0/nix/store/q0bl8npf7if2a0lsj79a5v9cnrcsb201-bootstrap-glibc.drv\0", 32768) = 80 | |
lstat("/nix/store/2vh6qx8scxxcrh2c9xb6iwsjqk482fv8-nixos-18.03pre129076.831ef4756e3/nixos/pkgs/development/tools/misc/binutils", {st_mode=S_IFDIR|0555, st_size=12, ...}) = 0 | |
openat(AT_FDCWD, "/nix/store/2vh6qx8scxxcrh2c9xb6iwsjqk482fv8-nixos-18.03pre129076.831ef4756e3/nixos/pkgs/development/tools/misc/binutils/default.nix", O_RDONLY|O_CLOEXEC) = 4 | |
fstat(4, {st_mode=S_IFREG|0444, st_size=4948, ...}) = 0 | |
read(4, "{ stdenv, buildPackages\n, fetchurl, zlib\n, buildPlatform, hostPlatform, targetPlatform\n, noSysDirs, gold ? true, bison ? null\n}:\n\nlet\n # Note to whoever is upgrading this: 2.29 is broken.\n # ('nix-build pkgs/stdenv/linux/make-bootstrap-tools.nix -A test' segfaults on aarch64)\n # Also glibc might "..., 4948) = 4948 | |
close(4) = 0 | |
lstat("/nix/store/2vh6qx8scxxcrh2c9xb6iwsjqk482fv8-nixos-18.03pre129076.831ef4756e3/nixos/pkgs/development/libraries/glibc/common.nix", {st_mode=S_IFREG|0444, st_size=7407, ...}) = 0 | |
openat(AT_FDCWD, "/nix/store/2vh6qx8scxxcrh2c9xb6iwsjqk482fv8-nixos-18.03pre129076.831ef4756e3/nixos/pkgs/development/libraries/glibc/common.nix", O_RDONLY|O_CLOEXEC) = 4 | |
fstat(4, {st_mode=S_IFREG|0444, st_size=7407, ...}) = 0 | |
read(4, "/* Build configuration used to build glibc, Info files, and locale\n information. */\n\n{ stdenv, lib\n, buildPlatform, hostPlatform\n, buildPackages\n, fetchurl\n, linuxHeaders ? null\n, gd ? null, libpng ? null\n}:\n\n{ name\n, withLinuxHeaders ? false\n, profilingLibraries ? false\n, installLocales ? false\n"..., 7407) = 7407 | |
close(4) = 0 | |
lstat("/nix/store/2vh6qx8scxxcrh2c9xb6iwsjqk482fv8-nixos-18.03pre129076.831ef4756e3/nixos/pkgs/os-specific/linux/kernel-headers", {st_mode=S_IFDIR|0555, st_size=3, ...}) = 0 | |
openat(AT_FDCWD, "/nix/store/2vh6qx8scxxcrh2c9xb6iwsjqk482fv8-nixos-18.03pre129076.831ef4756e3/nixos/pkgs/os-specific/linux/kernel-headers/default.nix", O_RDONLY|O_CLOEXEC) = 4 | |
fstat(4, {st_mode=S_IFREG|0444, st_size=1639, ...}) = 0 | |
read(4, "{ stdenvNoCC, lib, buildPackages\n, buildPlatform, hostPlatform\n, fetchurl, perl\n}:\n\nassert hostPlatform.isLinux;\n\nlet\n common = { version, sha256, patches ? null }: stdenvNoCC.mkDerivation {\n name = \"linux-headers-${version}\";\n\n src = fetchurl {\n url = \"mirror://kernel/linux/kernel/v4.x/"..., 1639) = 1639 | |
close(4) = 0 | |
lstat("/nix/store/2vh6qx8scxxcrh2c9xb6iwsjqk482fv8-nixos-18.03pre129076.831ef4756e3/nixos/lib/licenses.nix", {st_mode=S_IFREG|0444, st_size=13782, ...}) = 0 | |
openat(AT_FDCWD, "/nix/store/2vh6qx8scxxcrh2c9xb6iwsjqk482fv8-nixos-18.03pre129076.831ef4756e3/nixos/lib/licenses.nix", O_RDONLY|O_CLOEXEC) = 4 | |
fstat(4, {st_mode=S_IFREG|0444, st_size=13782, ...}) = 0 | |
read(4, "{ lib }:\nlet\n\n spdx = lic: lic // {\n url = \"http://spdx.org/licenses/${lic.spdxId}.html\";\n };\n\nin\n\nlib.mapAttrs (n: v: v // { shortName = n; }) rec {\n /* License identifiers from spdx.org where possible.\n * If you cannot find your license here, then look for a similar license or\n * add it "..., 13782) = 13782 | |
close(4) = 0 | |
brk(0x1b648000) = 0x1b648000 | |
lstat("/nix/store/2vh6qx8scxxcrh2c9xb6iwsjqk482fv8-nixos-18.03pre129076.831ef4756e3/nixos/lib/systems/doubles.nix", {st_mode=S_IFREG|0444, st_size=1548, ...}) = 0 | |
openat(AT_FDCWD, "/nix/store/2vh6qx8scxxcrh2c9xb6iwsjqk482fv8-nixos-18.03pre129076.831ef4756e3/nixos/lib/systems/doubles.nix", O_RDONLY|O_CLOEXEC) = 4 | |
fstat(4, {st_mode=S_IFREG|0444, st_size=1548, ...}) = 0 | |
read(4, "{ lib }:\nlet\n inherit (lib) lists;\n inherit (lib.systems) parse;\n inherit (lib.systems.inspect) predicates;\n inherit (lib.attrsets) matchAttrs;\n\n all = [\n \"aarch64-linux\"\n \"armv5tel-linux\" \"armv6l-linux\" \"armv7l-linux\"\n\n \"mips64el-linux\"\n\n \"i686-cygwin\" \"i686-freebsd\" \"i686-linux\" \""..., 1548) = 1548 | |
close(4) = 0 | |
brk(0x1b658000) = 0x1b658000 | |
lstat("/nix/store/2vh6qx8scxxcrh2c9xb6iwsjqk482fv8-nixos-18.03pre129076.831ef4756e3/nixos/pkgs/development/libraries/zlib", {st_mode=S_IFDIR|0555, st_size=4, ...}) = 0 | |
openat(AT_FDCWD, "/nix/store/2vh6qx8scxxcrh2c9xb6iwsjqk482fv8-nixos-18.03pre129076.831ef4756e3/nixos/pkgs/development/libraries/zlib/default.nix", O_RDONLY|O_CLOEXEC) = 4 | |
fstat(4, {st_mode=S_IFREG|0444, st_size=2457, ...}) = 0 | |
read(4, "{ stdenv\n, fetchurl\n, buildPlatform, hostPlatform\n, static ? false\n}:\n\nstdenv.mkDerivation rec {\n name = \"zlib-${version}\";\n version = \"1.2.11\";\n\n src = fetchurl {\n urls =\n [ \"http://www.zlib.net/fossils/${name}.tar.gz\" # stable archive path\n \"mirror://sourceforge/libpng/zlib/${ve"..., 2457) = 2457 | |
close(4) = 0 | |
lstat("/nix/store/2vh6qx8scxxcrh2c9xb6iwsjqk482fv8-nixos-18.03pre129076.831ef4756e3/nixos/pkgs/build-support/fetchurl/boot.nix", {st_mode=S_IFREG|0444, st_size=498, ...}) = 0 | |
openat(AT_FDCWD, "/nix/store/2vh6qx8scxxcrh2c9xb6iwsjqk482fv8-nixos-18.03pre129076.831ef4756e3/nixos/pkgs/build-support/fetchurl/boot.nix", O_RDONLY|O_CLOEXEC) = 4 | |
fstat(4, {st_mode=S_IFREG|0444, st_size=498, ...}) = 0 | |
read(4, "let mirrors = import ./mirrors.nix; in\n\n{ system }:\n\n{ url ? builtins.head urls\n, urls ? []\n, sha256\n, name ? baseNameOf (toString url)\n}:\n\nimport <nix/fetchurl.nix> {\n inherit system sha256 name;\n\n url =\n # Handle mirror:// URIs. Since <nix/fetchurl.nix> currently\n # supports only one URI, "..., 498) = 498 | |
close(4) = 0 | |
lstat("/nix/var/nix/profiles/per-user/root/channels/nix/fetchurl.nix", 0x7ffdbd88bf70) = -1 ENOENT (No such file or directory) | |
lstat("/nix/store/r8zhwq9xylxw8a823kpvqy0kfqq4g52f-nix-2.0pre5968_a6c0b773/share/nix/corepkgs//fetchurl.nix", {st_mode=S_IFREG|0444, st_size=1123, ...}) = 0 | |
brk(0x1b67a000) = 0x1b67a000 | |
brk(0x1b689000) = 0x1b689000 | |
write(3, "\10\0\0\0\0\0\0\0\26\0\0\0\0\0\0\0zlib-1.2.11.tar.gz.drv\0\0\335\2\0\0\0\0\0\0Derive([(\"out\",\"/nix/store/rrzja19jbqxbfryp2zchb2ma5h041rxh-zlib-1.2.11.tar.gz\",\"sha256\",\"c3e5e9fdd5004dcb542feda5ee4f0ff0744628baf8ed2dd5d66f8ca1197cb1a1\")],[],[],\"builtin\",\"builtin:fetchurl\",[],[(\"builder\",\"builtin:fetchurl\"),(\"executable\",\"\"),(\"impu"..., 792) = 792 | |
read(3, "stla\0\0\0\0B\0\0\0\0\0\0\0/nix/store/42dca5y49wm6g6l5wwrxfc5zqq5kfa11-zlib-1.2.11.tar.gz.drv\0\0\0\0\0\0", 32768) = 88 | |
lstat("/nix/store/2vh6qx8scxxcrh2c9xb6iwsjqk482fv8-nixos-18.03pre129076.831ef4756e3/nixos/pkgs/build-support/bintools-wrapper/ld-wrapper.sh", {st_mode=S_IFREG|0444, st_size=6765, ...}) = 0 | |
openat(AT_FDCWD, "/nix/store/2vh6qx8scxxcrh2c9xb6iwsjqk482fv8-nixos-18.03pre129076.831ef4756e3/nixos/pkgs/build-support/bintools-wrapper/ld-wrapper.sh", O_RDONLY|O_CLOEXEC) = 4 | |
read(4, "#! @shell@\nset -eu -o pipefail +o posix\nshopt -s nullglob\n\nif (( \"${NIX_DEBUG:-0}\" >= 7 )); then\n set -x\nfi\n\npath_backup=\"$PATH\"\n\n# phase separation makes this look useless\n# shellcheck disable=SC2157\nif [ -n \"@coreutils_bin@\" ]; then\n PATH=\"@coreutils_bin@/bin\"\nfi\n\nsource @out@/nix-support/ut"..., 6765) = 6765 | |
close(4) = 0 | |
write(3, "\7\0\0\0\0\0\0\0\r\0\0\0\0\0\0\0ld-wrapper.sh\0\0\0\0\0\0\0\0\0\0\0\1\0\0\0\0\0\0\0\6\0\0\0\0\0\0\0sha256\0\0\r\0\0\0\0\0\0\0nix-archive-1\0\0\0\1\0\0\0\0\0\0\0(\0\0\0\0\0\0\0\4\0\0\0\0\0\0\0type\0\0\0\0\7\0\0\0\0\0\0\0regular\0\10\0\0\0\0\0\0\0conte |
(Sorry about that, but we can’t show files that are this big right now.)
(Sorry about that, but we can’t show files that are this big right now.)
(Sorry about that, but we can’t show files that are this big right now.)
(Sorry about that, but we can’t show files that are this big right now.)
(Sorry about that, but we can’t show files that are this big right now.)
(Sorry about that, but we can’t show files that are this big right now.)
(Sorry about that, but we can’t show files that are this big right now.)
(Sorry about that, but we can’t show files that are this big right now.)
(Sorry about that, but we can’t show files that are this big right now.)
(Sorry about that, but we can’t show files that are this big right now.)
(Sorry about that, but we can’t show files that are this big right now.)
(Sorry about that, but we can’t show files that are this big right now.)
(Sorry about that, but we can’t show files that are this big right now.)
(Sorry about that, but we can’t show files that are this big right now.)
(Sorry about that, but we can’t show files that are this big right now.)
(Sorry about that, but we can’t show files that are this big right now.)
(Sorry about that, but we can’t show files that are this big right now.)
(Sorry about that, but we can’t show files that are this big right now.)
(Sorry about that, but we can’t show files that are this big right now.)
(Sorry about that, but we can’t show files that are this big right now.)
(Sorry about that, but we can’t show files that are this big right now.)
(Sorry about that, but we can’t show files that are this big right now.)
(Sorry about that, but we can’t show files that are this big right now.)
(Sorry about that, but we can’t show files that are this big right now.)
(Sorry about that, but we can’t show files that are this big right now.)
(Sorry about that, but we can’t show files that are this big right now.)
(Sorry about that, but we can’t show files that are this big right now.)
(Sorry about that, but we can’t show files that are this big right now.)
(Sorry about that, but we can’t show files that are this big right now.)
(Sorry about that, but we can’t show files that are this big right now.)
(Sorry about that, but we can’t show files that are this big right now.)
(Sorry about that, but we can’t show files that are this big right now.)
(Sorry about that, but we can’t show files that are this big right now.)
(Sorry about that, but we can’t show files that are this big right now.)
(Sorry about that, but we can’t show files that are this big right now.)
(Sorry about that, but we can’t show files that are this big right now.)
(Sorry about that, but we can’t show files that are this big right now.)
(Sorry about that, but we can’t show files that are this big right now.)
(Sorry about that, but we can’t show files that are this big right now.)
(Sorry about that, but we can’t show files that are this big right now.)
(Sorry about that, but we can’t show files that are this big right now.)
(Sorry about that, but we can’t show files that are this big right now.)
(Sorry about that, but we can’t show files that are this big right now.)
(Sorry about that, but we can’t show files that are this big right now.)
(Sorry about that, but we can’t show files that are this big right now.)
(Sorry about that, but we can’t show files that are this big right now.)
(Sorry about that, but we can’t show files that are this big right now.)
(Sorry about that, but we can’t show files that are this big right now.)
(Sorry about that, but we can’t show files that are this big right now.)
(Sorry about that, but we can’t show files that are this big right now.)
(Sorry about that, but we can’t show files that are this big right now.)
(Sorry about that, but we can’t show files that are this big right now.)
(Sorry about that, but we can’t show files that are this big right now.)
(Sorry about that, but we can’t show files that are this big right now.)
(Sorry about that, but we can’t show files that are this big right now.)
(Sorry about that, but we can’t show files that are this big right now.)
(Sorry about that, but we can’t show files that are this big right now.)
(Sorry about that, but we can’t show files that are this big right now.)
(Sorry about that, but we can’t show files that are this big right now.)
(Sorry about that, but we can’t show files that are this big right now.)
(Sorry about that, but we can’t show files that are this big right now.)
(Sorry about that, but we can’t show files that are this big right now.)
(Sorry about that, but we can’t show files that are this big right now.)
(Sorry about that, but we can’t show files that are this big right now.)
(Sorry about that, but we can’t show files that are this big right now.)
(Sorry about that, but we can’t show files that are this big right now.)
(Sorry about that, but we can’t show files that are this big right now.)
(Sorry about that, but we can’t show files that are this big right now.)
(Sorry about that, but we can’t show files that are this big right now.)
(Sorry about that, but we can’t show files that are this big right now.)
(Sorry about that, but we can’t show files that are this big right now.)
(Sorry about that, but we can’t show files that are this big right now.)
(Sorry about that, but we can’t show files that are this big right now.)
(Sorry about that, but we can’t show files that are this big right now.)
(Sorry about that, but we can’t show files that are this big right now.)
(Sorry about that, but we can’t show files that are this big right now.)
(Sorry about that, but we can’t show files that are this big right now.)