$ sudo dtruss ./net.test -test.short -test.v | |
Password: | |
dtrace: system integrity protection is on, some features will not be available | |
SYSCALL(args) = return | |
=== RUN TestSortByRFC6724 | |
--- PASS: TestSortByRFC6724 (0.00s) | |
=== RUN TestRFC6724PolicyTableClassify | |
--- PASS: TestRFC6724PolicyTableClassify (0.00s) | |
=== RUN TestRFC6724ClassifyScope | |
--- PASS: TestRFC6724ClassifyScope (0.00s) | |
=== RUN TestRFC6724CommonPrefixLength | |
--- PASS: TestRFC6724CommonPrefixLength (0.00s) | |
=== RUN TestCgoLookupIP | |
--- PASS: TestCgoLookupIP (0.00s) | |
=== RUN TestCgoLookupIPWithCancel | |
--- PASS: TestCgoLookupIPWithCancel (0.00s) | |
=== RUN TestCgoLookupPort | |
--- PASS: TestCgoLookupPort (0.00s) | |
=== RUN TestCgoLookupPortWithCancel | |
--- PASS: TestCgoLookupPortWithCancel (0.00s) | |
=== RUN TestCgoLookupPTR | |
--- PASS: TestCgoLookupPTR (0.00s) | |
=== RUN TestCgoLookupPTRWithCancel | |
--- PASS: TestCgoLookupPTRWithCancel (0.00s) | |
=== RUN TestConfHostLookupOrder | |
--- PASS: TestConfHostLookupOrder (0.00s) | |
=== RUN TestSystemConf | |
--- PASS: TestSystemConf (0.00s) | |
=== RUN TestConnAndListener | |
open("/dev/dtracehelper\0", 0x2, 0x7FFF5FBFE930) = 3 0 | |
ioctl(0x3, 0x80086804, 0x7FFF5FBFE8B8) = 0 0 | |
close(0x3) = 0 0 | |
thread_selfid(0x3, 0x80086804, 0x7FFF5FBFE8B8) = 7078299 0 | |
bsdthread_register(0x7FFFD33DA1F0, 0x7FFFD33DA1E0, 0x2000) = 1073741919 0 | |
ulock_wake(0x1, 0x7FFF5FBFDFDC, 0x0) = -1 Err#2 | |
issetugid(0x1, 0x7FFF5FBFDFDC, 0x0) = 0 0 | |
mprotect(0x142F000, 0x88, 0x1) = 0 0 | |
mprotect(0x1431000, 0x1000, 0x0) = 0 0 | |
mprotect(0x1447000, 0x1000, 0x0) = 0 0 | |
mprotect(0x1448000, 0x1000, 0x0) = 0 0 | |
mprotect(0x145E000, 0x1000, 0x0) = 0 0 | |
mprotect(0x145F000, 0x1000, 0x1) = 0 0 | |
mprotect(0x142F000, 0x88, 0x3) = 0 0 | |
mprotect(0x142F000, 0x88, 0x1) = 0 0 | |
getpid(0x142F000, 0x88, 0x1) = 97317 0 | |
stat64("/AppleInternal/XBS/.isChrooted\0", 0x7FFF5FBFDE98, 0x1) = -1 Err#2 | |
stat64("/AppleInternal\0", 0x7FFF5FBFDF30, 0x1) = -1 Err#2 | |
csops(0x17C25, 0x7, 0x7FFF5FBFD9C0) = -1 Err#22 | |
dtrace: error on enabled probe ID 2158 (ID 552: syscall::sysctl:return): invalid kernel access in action #10 at DIF offset 40 | |
csops(0x17C25, 0x7, 0x7FFF5FBFD2A0) = -1 Err#22 | |
dtrace: error on enabled probe ID 2158 (ID 552: syscall::sysctl:return): invalid kernel access in action #10 at DIF offset 40 | |
dtrace: error on enabled probe ID 2158 (ID 552: syscall::sysctl:return): invalid kernel access in action #10 at DIF offset 40 | |
mmap(0xC000000000, 0x8420002000, 0x0, 0x1002, 0xFFFFFFFF, 0x0) = 0xC000000000 0 | |
mmap(0x0, 0x40000, 0x3, 0x1002, 0xFFFFFFFF, 0x0) = 0x1460000 0 | |
mmap(0xC420000000, 0x100000, 0x3, 0x1012, 0xFFFFFFFF, 0x0) = 0xC420000000 0 | |
mmap(0xC41FFF8000, 0x8000, 0x3, 0x1012, 0xFFFFFFFF, 0x0) = 0xC41FFF8000 0 | |
mmap(0xC000000000, 0x1000, 0x3, 0x1012, 0xFFFFFFFF, 0x0) = 0xC000000000 0 | |
mmap(0x0, 0x10000, 0x3, 0x1002, 0xFFFFFFFF, 0x0) = 0x14A0000 0 | |
mmap(0x0, 0x10000, 0x3, 0x1002, 0xFFFFFFFF, 0x0) = 0x14B0000 0 | |
open("/dev/urandom\0", 0x0, 0x0) = 3 0 | |
dtrace: error on enabled probe ID 2134 (ID 154: syscall::read:return): invalid kernel access in action #12 at DIF offset 92 | |
close(0x3) = 0 0 | |
__pthread_sigmask(0x3, 0x0, 0x13B6A58) = 0 0 | |
sigaltstack(0x0, 0x7FFF5FBFFB18, 0x13B6A58) = 0 0 | |
sigaltstack(0x7FFF5FBFFAD8, 0x0, 0x13B6A58) = 0 0 | |
__pthread_sigmask(0x3, 0x7FFF5FBFFB2C, 0x0) = 0 0 | |
sigaction(0x1, 0x0, 0x7FFF5FBFFAE8) = 0 0 | |
sigaction(0x1, 0x7FFF5FBFFAE0, 0x0) = 0 0 | |
sigaction(0x2, 0x0, 0x7FFF5FBFFAE8) = 0 0 | |
sigaction(0x2, 0x7FFF5FBFFAE0, 0x0) = 0 0 | |
sigaction(0x3, 0x0, 0x7FFF5FBFFAE8) = 0 0 | |
sigaction(0x3, 0x7FFF5FBFFAE0, 0x0) = 0 0 | |
sigaction(0x4, 0x0, 0x7FFF5FBFFAE8) = 0 0 | |
sigaction(0x4, 0x7FFF5FBFFAE0, 0x0) = 0 0 | |
sigaction(0x5, 0x0, 0x7FFF5FBFFAE8) = 0 0 | |
sigaction(0x5, 0x7FFF5FBFFAE0, 0x0) = 0 0 | |
sigaction(0x6, 0x0, 0x7FFF5FBFFAE8) = 0 0 | |
sigaction(0x6, 0x7FFF5FBFFAE0, 0x0) = 0 0 | |
sigaction(0x7, 0x0, 0x7FFF5FBFFAE8) = 0 0 | |
sigaction(0x7, 0x7FFF5FBFFAE0, 0x0) = 0 0 | |
sigaction(0x8, 0x0, 0x7FFF5FBFFAE8) = 0 0 | |
sigaction(0x8, 0x7FFF5FBFFAE0, 0x0) = 0 0 | |
sigaction(0xA, 0x0, 0x7FFF5FBFFAE8) = 0 0 | |
sigaction(0xA, 0x7FFF5FBFFAE0, 0x0) = 0 0 | |
sigaction(0xB, 0x0, 0x7FFF5FBFFAE8) = 0 0 | |
sigaction(0xB, 0x7FFF5FBFFAE0, 0x0) = 0 0 | |
sigaction(0xC, 0x0, 0x7FFF5FBFFAE8) = 0 0 | |
sigaction(0xC, 0x7FFF5FBFFAE0, 0x0) = 0 0 | |
sigaction(0xD, 0x0, 0x7FFF5FBFFAE8) = 0 0 | |
sigaction(0xD, 0x7FFF5FBFFAE0, 0x0) = 0 0 | |
sigaction(0xE, 0x0, 0x7FFF5FBFFAE8) = 0 0 | |
sigaction(0xE, 0x7FFF5FBFFAE0, 0x0) = 0 0 | |
sigaction(0xF, 0x0, 0x7FFF5FBFFAE8) = 0 0 | |
sigaction(0xF, 0x7FFF5FBFFAE0, 0x0) = 0 0 | |
sigaction(0x10, 0x0, 0x7FFF5FBFFAE8) = 0 0 | |
sigaction(0x10, 0x7FFF5FBFFAE0, 0x0) = 0 0 | |
sigaction(0x14, 0x0, 0x7FFF5FBFFAE8) = 0 0 | |
sigaction(0x14, 0x7FFF5FBFFAE0, 0x0) = 0 0 | |
sigaction(0x17, 0x0, 0x7FFF5FBFFAE8) = 0 0 | |
sigaction(0x17, 0x7FFF5FBFFAE0, 0x0) = 0 0 | |
sigaction(0x18, 0x0, 0x7FFF5FBFFAE8) = 0 0 | |
sigaction(0x18, 0x7FFF5FBFFAE0, 0x0) = 0 0 | |
sigaction(0x19, 0x0, 0x7FFF5FBFFAE8) = 0 0 | |
sigaction(0x19, 0x7FFF5FBFFAE0, 0x0) = 0 0 | |
sigaction(0x1A, 0x0, 0x7FFF5FBFFAE8) = 0 0 | |
sigaction(0x1A, 0x7FFF5FBFFAE0, 0x0) = 0 0 | |
sigaction(0x1B, 0x0, 0x7FFF5FBFFAE8) = 0 0 | |
sigaction(0x1B, 0x7FFF5FBFFAE0, 0x0) = 0 0 | |
sigaction(0x1C, 0x0, 0x7FFF5FBFFAE8) = 0 0 | |
sigaction(0x1C, 0x7FFF5FBFFAE0, 0x0) = 0 0 | |
sigaction(0x1D, 0x0, 0x7FFF5FBFFAE8) = 0 0 | |
sigaction(0x1D, 0x7FFF5FBFFAE0, 0x0) = 0 0 | |
sigaction(0x1E, 0x0, 0x7FFF5FBFFAE8) = 0 0 | |
sigaction(0x1E, 0x7FFF5FBFFAE0, 0x0) = 0 0 | |
sigaction(0x1F, 0x0, 0x7FFF5FBFFAE8) = 0 0 | |
sigaction(0x1F, 0x7FFF5FBFFAE0, 0x0) = 0 0 | |
__pthread_sigmask(0x3, 0x7FFF5FBFFA14, 0x7FFF5FBFFA10) = 0 0 | |
bsdthread_create(0x1001500, 0x1600000, 0x80000) = 235835392 0 | |
__pthread_sigmask(0x3, 0x7FFF5FBFFA10, 0x0) = 0 0 | |
thread_selfid(0x0, 0x0, 0x0) = 7078308 0 | |
sigaltstack(0x0, 0x70000E0E8E30, 0x0) = 0 0 | |
sigaltstack(0x70000E0E8DF0, 0x0, 0x0) = 0 0 | |
__pthread_sigmask(0x3, 0x70000E0E8E44, 0x0) = 0 0 | |
__pthread_sigmask(0x3, 0x7FFF5FBFF924, 0x7FFF5FBFF920) = 0 0 | |
bsdthread_create(0x1001500, 0x1600000, 0x80000) = 236371968 0 | |
thread_selfid(0x0, 0x0, 0x0) = 7078309 0 | |
__pthread_sigmask(0x3, 0x7FFF5FBFF920, 0x0) = 0 0 | |
sigaltstack(0x0, 0x70000E16BE30, 0x0) = 0 0 | |
sigaltstack(0x70000E16BDF0, 0x0, 0x0) = 0 0 | |
__pthread_sigmask(0x3, 0x70000E16BE44, 0x0) = 0 0 | |
__pthread_sigmask(0x3, 0x7FFF5FBFF924, 0x7FFF5FBFF920) = 0 0 | |
bsdthread_create(0x1001500, 0x1600000, 0x80000) = 236908544 0 | |
select(0x0, 0x0, 0x0, 0x0, 0x70000E0E8DC8) = 0 0 | |
__pthread_sigmask(0x3, 0x70000E16BCA4, 0x70000E16BCA0) = 0 0 | |
thread_selfid(0x0, 0x0, 0x0) = 7078310 0 | |
__pthread_sigmask(0x3, 0x7FFF5FBFF920, 0x0) = 0 0 | |
sigaltstack(0x0, 0x70000E1EEE30, 0x0) = 0 0 | |
bsdthread_create(0x1001500, 0x1700000, 0x80000) = 237445120 0 | |
sigaltstack(0x70000E1EEDF0, 0x0, 0x0) = 0 0 | |
thread_selfid(0x0, 0x0, 0x0) = 7078311 0 | |
__pthread_sigmask(0x3, 0x70000E16BCA0, 0x0) = 0 0 | |
sigaltstack(0x0, 0x70000E271E30, 0x0) = 0 0 | |
__pthread_sigmask(0x3, 0x70000E1EEE44, 0x0) = 0 0 | |
select(0x0, 0x0, 0x0, 0x0, 0x70000E0E8DC8) = 0 0 | |
sigaltstack(0x70000E271DF0, 0x0, 0x0) = 0 0 | |
select(0x0, 0x0, 0x0, 0x0, 0x70000E16BCD8) = 0 0 | |
__pthread_sigmask(0x3, 0x70000E271E44, 0x0) = 0 0 | |
select(0x0, 0x0, 0x0, 0x0, 0x70000E0E8DC8) = 0 0 | |
stat64(".\0", 0xC420074038, 0x0) = 0 0 | |
select(0x0, 0x0, 0x0, 0x0, 0x70000E0E8DC8) = 0 0 | |
stat64("/Users/josh/go/tip/src\0", 0xC4200741D8, 0x0) = 0 0 | |
select(0x0, 0x0, 0x0, 0x0, 0x70000E0E8DC8) = 0 0 | |
mmap(0x0, 0x40000, 0x3, 0x1002, 0xFFFFFFFF, 0x0) = 0x14C0000 0 | |
select(0x0, 0x0, 0x0, 0x0, 0x70000E271D18) = 0 0 | |
select(0x0, 0x0, 0x0, 0x0, 0x70000E0E8DC8) = 0 0 | |
dtrace: error on enabled probe ID 2158 (ID 552: syscall::sysctl:return): invalid kernel access in action #10 at DIF offset 40 | |
dtrace: error on enabled probe ID 2158 (ID 552: syscall::sysctl:return): invalid kernel access in action #10 at DIF offset 40 | |
dtrace: error on enabled probe ID 2158 (ID 552: syscall::sysctl:return): invalid kernel access in action #10 at DIF offset 40 | |
select(0x0, 0x0, 0x0, 0x0, 0x70000E0E8DC8) = 0 0 | |
select(0x0, 0x0, 0x0, 0x0, 0x70000E0E8DC8) = 0 0 | |
select(0x0, 0x0, 0x0, 0x0, 0x70000E0E8DC8) = 0 0 | |
select(0x0, 0x0, 0x0, 0x0, 0x70000E0E8DC8) = 0 0 | |
select(0x0, 0x0, 0x0, 0x0, 0x70000E0E8DC8) = 0 0 | |
select(0x0, 0x0, 0x0, 0x0, 0x70000E0E8DC8) = 0 0 | |
select(0x0, 0x0, 0x0, 0x0, 0x70000E0E8DC8) = 0 0 | |
select(0x0, 0x0, 0x0, 0x0, 0x70000E0E8DC8) = 0 0 | |
select(0x0, 0x0, 0x0, 0x0, 0x70000E0E8DC8) = 0 0 | |
select(0x0, 0x0, 0x0, 0x0, 0x70000E0E8DC8) = 0 0 | |
select(0x0, 0x0, 0x0, 0x0, 0x70000E0E8DC8) = 0 0 | |
select(0x0, 0x0, 0x0, 0x0, 0x70000E0E8DC8) = 0 0 | |
select(0x0, 0x0, 0x0, 0x0, 0x70000E0E8DC8) = 0 0 | |
select(0x0, 0x0, 0x0, 0x0, 0x70000E0E8DC8) = 0 0 | |
select(0x0, 0x0, 0x0, 0x0, 0x70000E0E8DC8) = 0 0 | |
select(0x0, 0x0, 0x0, 0x0, 0x70000E0E8DC8) = 0 0 | |
select(0x0, 0x0, 0x0, 0x0, 0x70000E0E8DC8) = 0 0 | |
select(0x0, 0x0, 0x0, 0x0, 0x70000E0E8DC8) = 0 0 | |
dtrace: error on enabled probe ID 2158 (ID 552: syscall::sysctl:return): invalid kernel access in action #10 at DIF offset 40 | |
dtrace: error on enabled probe ID 2158 (ID 552: syscall::sysctl:return): invalid kernel access in action #10 at DIF offset 40 | |
select(0x0, 0x0, 0x0, 0x0, 0x70000E0E8DC8) = 0 0 | |
select(0x0, 0x0, 0x0, 0x0, 0x70000E0E8DC8) = 0 0 | |
getpid(0xC42001B040, 0x3, 0xC42004FEB4) = 97317 0 | |
select(0x0, 0x0, 0x0, 0x0, 0x70000E0E8DC8) = 0 0 | |
select(0x0, 0x0, 0x0, 0x0, 0x70000E0E8DC8) = 0 0 | |
select(0x0, 0x0, 0x0, 0x0, 0x70000E0E8DC8) = 0 0 | |
select(0x0, 0x0, 0x0, 0x0, 0x70000E0E8DC8) = 0 0 | |
open("/tmp/go-nettest936223535\0", 0x1000A02, 0x180) = 3 0 | |
close(0x3) = 0 0 | |
select(0x0, 0x0, 0x0, 0x0, 0x70000E0E8DC8) = 0 0 | |
select(0x0, 0x0, 0x0, 0x0, 0x70000E0E8DC8) = 0 0 | |
unlink("/tmp/go-nettest936223535\0", 0x1000A02, 0x180) = 0 0 | |
select(0x0, 0x0, 0x0, 0x0, 0x70000E0E8DC8) = 0 0 | |
select(0x0, 0x0, 0x0, 0x0, 0x70000E0E8DC8) = 0 0 | |
open("/tmp/go-nettest034655938\0", 0x1000A02, 0x180) = 3 0 | |
close(0x3) = 0 0 | |
unlink("/tmp/go-nettest034655938\0", 0x1000A02, 0x180) = 0 0 | |
select(0x0, 0x0, 0x0, 0x0, 0x70000E0E8DC8) = 0 0 | |
open("/tmp/go-nettest026386233\0", 0x1000A02, 0x180) = 3 0 | |
close(0x3) = 0 0 | |
select(0x0, 0x0, 0x0, 0x0, 0x70000E0E8DC8) = 0 0 | |
unlink("/tmp/go-nettest026386233\0", 0x1000A02, 0x180) = 0 0 | |
select(0x0, 0x0, 0x0, 0x0, 0x70000E0E8DC8) = 0 0 | |
open("/tmp/go-nettest265854788\0", 0x1000A02, 0x180) = 3 0 | |
close(0x3) = 0 0 | |
select(0x0, 0x0, 0x0, 0x0, 0x70000E0E8DC8) = 0 0 | |
unlink("/tmp/go-nettest265854788\0", 0x1000A02, 0x180) = 0 0 | |
select(0x0, 0x0, 0x0, 0x0, 0x70000E0E8DC8) = 0 0 | |
open("/tmp/go-nettest632526291\0", 0x1000A02, 0x180) = 3 0 | |
close(0x3) = 0 0 | |
select(0x0, 0x0, 0x0, 0x0, 0x70000E0E8DC8) = 0 0 | |
unlink("/tmp/go-nettest632526291\0", 0x1000A02, 0x180) = 0 0 | |
select(0x0, 0x0, 0x0, 0x0, 0x70000E0E8DC8) = 0 0 | |
open("/tmp/go-nettest814425366\0", 0x1000A02, 0x180) = 3 0 | |
close(0x3) = 0 0 | |
select(0x0, 0x0, 0x0, 0x0, 0x70000E0E8DC8) = 0 0 | |
unlink("/tmp/go-nettest814425366\0", 0x1000A02, 0x180) = 0 0 | |
select(0x0, 0x0, 0x0, 0x0, 0x70000E0E8DC8) = 0 0 | |
open("/tmp/go-nettest278674301\0", 0x1000A02, 0x180) = 3 0 | |
close(0x3) = 0 0 | |
unlink("/tmp/go-nettest278674301\0", 0x1000A02, 0x180) = 0 0 | |
select(0x0, 0x0, 0x0, 0x0, 0x70000E0E8DC8) = 0 0 | |
open("/tmp/go-nettest800375480\0", 0x1000A02, 0x180) = 3 0 | |
close(0x3) = 0 0 | |
select(0x0, 0x0, 0x0, 0x0, 0x70000E0E8DC8) = 0 0 | |
unlink("/tmp/go-nettest800375480\0", 0x1000A02, 0x180) = 0 0 | |
select(0x0, 0x0, 0x0, 0x0, 0x70000E0E8DC8) = 0 0 | |
select(0x0, 0x0, 0x0, 0x0, 0x70000E0E8DC8) = 0 0 | |
socket(0x2, 0x1, 0x6) = 3 0 | |
select(0x0, 0x0, 0x0, 0x0, 0x70000E0E8DC8) = 0 0 | |
select(0x0, 0x0, 0x0, 0x0, 0x70000E0E8DC8) = 0 0 | |
close(0x3) = 0 0 | |
socket(0x1E, 0x1, 0x6) = 3 0 | |
setsockopt(0x3, 0x29, 0x1B) = 0 0 | |
select(0x0, 0x0, 0x0, 0x0, 0x70000E0E8DC8) = 0 0 | |
bind(0x3, 0xC42001B19C, 0x1C) = 0 0 | |
socket(0x1E, 0x1, 0x6) = 4 0 | |
setsockopt(0x4, 0x29, 0x1B) = 0 0 | |
select(0x0, 0x0, 0x0, 0x0, 0x70000E0E8DC8) = 0 0 | |
bind(0x4, 0xC42001B1DC, 0x1C) = 0 0 | |
close(0x4) = 0 0 | |
close(0x3) = 0 0 | |
select(0x0, 0x0, 0x0, 0x0, 0x70000E0E8DC8) = 0 0 | |
dtrace: error on enabled probe ID 2158 (ID 552: syscall::sysctl:return): invalid kernel access in action #10 at DIF offset 40 | |
dtrace: error on enabled probe ID 2158 (ID 552: syscall::sysctl:return): invalid kernel access in action #10 at DIF offset 40 | |
dtrace: error on enabled probe ID 2158 (ID 552: syscall::sysctl:return): invalid kernel access in action #10 at DIF offset 40 | |
select(0x0, 0x0, 0x0, 0x0, 0x70000E0E8DC8) = 0 0 | |
dtrace: error on enabled probe ID 2158 (ID 552: syscall::sysctl:return): invalid kernel access in action #10 at DIF offset 40 | |
dtrace: error on enabled probe ID 2132 (ID 156: syscall::write:return): invalid kernel access in action #12 at DIF offset 92 | |
dtrace: error on enabled probe ID 2132 (ID 156: syscall::write:return): invalid kernel access in action #12 at DIF offset 92 | |
select(0x0, 0x0, 0x0, 0x0, 0x70000E0E8DC8) = 0 0 | |
dtrace: error on enabled probe ID 2132 (ID 156: syscall::write:return): invalid kernel access in action #12 at DIF offset 92 | |
dtrace: error on enabled probe ID 2132 (ID 156: syscall::write:return): invalid kernel access in action #12 at DIF offset 92 | |
dtrace: error on enabled probe ID 2132 (ID 156: syscall::write:return): invalid kernel access in action #12 at DIF offset 92 | |
dtrace: error on enabled probe ID 2132 (ID 156: syscall::write:return): invalid kernel access in action #12 at DIF offset 92 | |
dtrace: error on enabled probe ID 2132 (ID 156: syscall::write:return): invalid kernel access in action #12 at DIF offset 92 | |
dtrace: error on enabled probe ID 2132 (ID 156: syscall::write:return): invalid kernel access in action #12 at DIF offset 92 | |
dtrace: error on enabled probe ID 2132 (ID 156: syscall::write:return): invalid kernel access in action #12 at DIF offset 92 | |
select(0x0, 0x0, 0x0, 0x0, 0x70000E0E8DC8) = 0 0 | |
shm_open(0x7FFFD33CDDE7, 0x0, 0x0) = 3 0 | |
mmap(0x0, 0x1000, 0x1, 0x1, 0x3, 0x0) = 0x2100000 0 | |
close_nocancel(0x3) = 0 0 | |
open_nocancel("/etc/.mdns_debug\0", 0x0, 0x0) = -1 Err#2 | |
dtrace: error on enabled probe ID 2158 (ID 552: syscall::sysctl:return): invalid kernel access in action #10 at DIF offset 40 | |
dtrace: error on enabled probe ID 2158 (ID 552: syscall::sysctl:return): invalid kernel access in action #10 at DIF offset 40 | |
kqueue(0x7FFF5FBFF560, 0x6, 0x3000000) = 3 0 | |
kevent(0x3, 0x7FFF5FBFF700, 0x1) = 0 0 | |
socket(0x1, 0x1, 0x0) = 4 0 | |
setsockopt(0x4, 0xFFFF, 0x1022) = 0 0 | |
setsockopt(0x4, 0xFFFF, 0x1100) = 0 0 | |
connect_nocancel(0x4, 0x7FFF5FBFF510, 0x6A) = 0 0 | |
sendto_nocancel(0x4, 0x16003B0, 0x1C) = 28 0 | |
select_nocancel(0x5, 0x7FFF5FBFF500, 0x0) = 1 0 | |
select(0x0, 0x0, 0x0, 0x0, 0x70000E0E8DC8) = 0 0 | |
recvfrom_nocancel(0x4, 0x7FFF5FBFF4D0, 0x4) = 4 0 | |
socketpair(0x1, 0x1, 0x0) = 0 0 | |
setsockopt(0x5, 0xFFFF, 0x1100) = 0 0 | |
sendto_nocancel(0x4, 0x1600440, 0x32) = 50 0 | |
sendmsg_nocancel(0x4, 0x7FFF5FBFF480, 0x0) = 1 0 | |
close_nocancel(0x6) = 0 0 | |
select_nocancel(0x6, 0x7FFF5FBFF480, 0x0) = 1 0 | |
recvfrom_nocancel(0x5, 0x7FFF5FBFF450, 0x4) = 4 0 | |
close_nocancel(0x5) = 0 0 | |
socketpair(0x1, 0x1, 0x0) = 0 0 | |
setsockopt(0x5, 0xFFFF, 0x1100) = 0 0 | |
sendto_nocancel(0x4, 0x1600440, 0x32) = 50 0 | |
sendmsg_nocancel(0x4, 0x7FFF5FBFF480, 0x0) = 1 0 | |
close_nocancel(0x6) = 0 0 | |
select_nocancel(0x6, 0x7FFF5FBFF480, 0x0) = 1 0 | |
recvfrom_nocancel(0x5, 0x7FFF5FBFF450, 0x4) = 4 0 | |
close_nocancel(0x5) = 0 0 | |
kevent(0x3, 0x7FFF5FBFF700, 0x1) = 0 0 | |
kevent(0x3, 0x0, 0x0) = 1 0 | |
kevent(0x3, 0x0, 0x0) = 1 0 | |
recvfrom_nocancel(0x4, 0x7FFF5FBFF500, 0x1C) = 28 0 | |
recvfrom_nocancel(0x4, 0x16004F0, 0x25) = 37 0 | |
select_nocancel(0x5, 0x7FFF5FBFF530, 0x0) = 1 0 | |
kevent(0x3, 0x7FFF5FBFF000, 0x1) = 0 0 | |
recvfrom_nocancel(0x4, 0x7FFF5FBFF500, 0x1C) = 28 0 | |
recvfrom_nocancel(0x4, 0x1600530, 0x31) = 49 0 | |
select_nocancel(0x5, 0x7FFF5FBFF530, 0x0) = 0 0 | |
kevent(0x3, 0x7FFF5FBFF000, 0x1) = 0 0 | |
sendto_nocancel(0x4, 0x1600500, 0x1C) = 28 0 | |
sendto_nocancel(0x4, 0x1600500, 0x1C) = 28 0 | |
close_nocancel(0x3) = 0 0 | |
sysctlbyname(net.statistics, 0xE, 0x7FFFDC00BD48, 0x7FFF5FBFF440, 0x0) = -1 Err#2 | |
proc_info(0x2, 0x17C25, 0x11) = 56 0 | |
proc_info(0x2, 0x17C25, 0x11) = 56 0 | |
dtrace: error on enabled probe ID 2158 (ID 552: syscall::sysctl:return): invalid kernel access in action #10 at DIF offset 40 | |
issetugid(0x7FFF5FBFF1B0, 0x4, 0x7FFF5FBFEF28) = 0 0 | |
open("/Users/josh/go/tip/src/./net.test\0", 0x8004, 0x7FFFD3426583) = 3 0 | |
fcntl(0x3, 0x32, 0x7FFF5FBFE7C0) = 0 0 | |
close(0x3) = 0 0 | |
open("/System/Library/Preferences/Logging/Subsystems/com.apple.network.plist\0", 0x0, 0x7FFF5FBFE6F8) = 3 0 | |
fstat64(0x3, 0x7FFF5FBFEC90, 0x7FFF5FBFE6F8) = 0 0 | |
mmap(0x0, 0x1B1, 0x1, 0x6001, 0x3, 0x0) = 0x2141000 0 | |
munmap(0x2141000, 0x1B1) = 0 0 | |
close(0x3) = 0 0 | |
open("/Library/Preferences/Logging/Subsystems/com.apple.network.plist\0", 0x0, 0x7FFF5FBFE6F8) = -1 Err#2 | |
select(0x0, 0x0, 0x0, 0x0, 0x70000E0E8DC8) = 0 0 | |
socket(0x20, 0x2, 0x2) = 3 0 | |
setsockopt(0x3, 0xFFFF, 0x1022) = 0 0 | |
ioctl(0x3, 0xC0644E03, 0x7FFF5FBFF350) = 0 0 | |
connect(0x3, 0x7FFF5FBFF328, 0x20) = 0 0 | |
setsockopt(0x3, 0xFFFF, 0x1002) = 0 0 | |
fcntl(0x3, 0x3, 0x0) = 2 0 | |
fcntl(0x3, 0x4, 0x6) = 0 0 | |
sendto(0x3, 0x7FFF5FBFF4C8, 0x24) = 36 0 | |
recvfrom(0x3, 0x7FFF5FBFF4A0, 0x28) = 40 0 | |
sendto(0x3, 0x7FFF5FBFF4C8, 0x24) = 36 0 | |
recvfrom(0x3, 0x7FFF5FBFF4A0, 0x28) = 40 0 | |
dtrace: error on enabled probe ID 2132 (ID 156: syscall::write:return): invalid kernel access in action #12 at DIF offset 92 | |
dtrace: error on enabled probe ID 2132 (ID 156: syscall::write:return): invalid kernel access in action #12 at DIF offset 92 | |
select(0x0, 0x0, 0x0, 0x0, 0x70000E16BCD8) = 0 0 | |
kqueue(0x0, 0x0, 0x0) = 5 0 | |
kevent(0x5, 0x70000E16BA10, 0x1) = 0 0 | |
socketpair(0x1, 0x1, 0x0) = 0 0 | |
setsockopt(0x6, 0xFFFF, 0x1100) = 0 0 | |
sendto_nocancel(0x4, 0x2200490, 0x32) = 50 0 | |
sendmsg_nocancel(0x4, 0x70000E16B790, 0x0) = 1 0 | |
close_nocancel(0x7) = 0 0 | |
select_nocancel(0x7, 0x70000E16B790, 0x0) = 1 0 | |
recvfrom_nocancel(0x6, 0x70000E16B760, 0x4) = 4 0 | |
close_nocancel(0x6) = 0 0 | |
socketpair(0x1, 0x1, 0x0) = 0 0 | |
setsockopt(0x6, 0xFFFF, 0x1100) = 0 0 | |
sendto_nocancel(0x4, 0x2200490, 0x32) = 50 0 | |
sendmsg_nocancel(0x4, 0x70000E16B790, 0x0) = 1 0 | |
close_nocancel(0x7) = 0 0 | |
select_nocancel(0x7, 0x70000E16B790, 0x0) = 1 0 | |
recvfrom_nocancel(0x6, 0x70000E16B760, 0x4) = 4 0 | |
close_nocancel(0x6) = 0 0 | |
kevent(0x5, 0x70000E16BA10, 0x1) = 0 0 | |
kevent(0x5, 0x0, 0x0) = 1 0 | |
kevent(0x5, 0x0, 0x0) = 1 0 | |
recvfrom_nocancel(0x4, 0x70000E16B810, 0x1C) = 28 0 | |
recvfrom_nocancel(0x4, 0x17002A0, 0x25) = 37 0 | |
select_nocancel(0x5, 0x70000E16B840, 0x0) = 0 0 | |
kevent(0x5, 0x70000E16B310, 0x1) = 0 0 | |
kevent(0x5, 0x0, 0x0) = 1 0 | |
kevent(0x5, 0x0, 0x0) = 0 0 | |
kevent(0x5, 0x0, 0x0) = 1 0 | |
kevent(0x5, 0x0, 0x0) = 1 0 | |
recvfrom_nocancel(0x4, 0x70000E16B810, 0x1C) = 28 0 | |
recvfrom_nocancel(0x4, 0x17002F0, 0x31) = 49 0 | |
select_nocancel(0x5, 0x70000E16B840, 0x0) = 0 0 | |
kevent(0x5, 0x70000E16B310, 0x1) = 0 0 | |
sendto_nocancel(0x4, 0x17002B0, 0x1C) = 28 0 | |
sendto_nocancel(0x4, 0x17002B0, 0x1C) = 28 0 | |
close_nocancel(0x5) = 0 0 | |
dtrace: error on enabled probe ID 2132 (ID 156: syscall::write:return): invalid kernel access in action #12 at DIF offset 92 | |
dtrace: error on enabled probe ID 2132 (ID 156: syscall::write:return): invalid kernel access in action #12 at DIF offset 92 | |
issetugid(0x1, 0xC4200D0090, 0x1C) = 0 0 | |
issetugid(0x1, 0xC4200D0090, 0x1C) = 0 0 | |
getrlimit(0x1008, 0x70000E16B9F8, 0x1C) = 0 0 | |
open_nocancel("/etc/services\0", 0x0, 0x1B6) = 5 0 | |
fstat64(0x5, 0x70000E16A9B8, 0x1B6) = 0 0 | |
dtrace: error on enabled probe ID 2135 (ID 940: syscall::read_nocancel:return): invalid kernel access in action #12 at DIF offset 92 | |
close_nocancel(0x5) = 0 0 | |
dtrace: error on enabled probe ID 2132 (ID 156: syscall::write:return): invalid kernel access in action #12 at DIF offset 92 | |
dtrace: error on enabled probe ID 2132 (ID 156: syscall::write:return): invalid kernel access in action #12 at DIF offset 92 | |
dtrace: error on enabled probe ID 2132 (ID 156: syscall::write:return): invalid kernel access in action #12 at DIF offset 92 | |
dtrace: error on enabled probe ID 2132 (ID 156: syscall::write:return): invalid kernel access in action #12 at DIF offset 92 | |
kqueue(0x1, 0xC4200D0090, 0x1B) = 5 0 | |
kevent(0x5, 0x70000E16BA00, 0x1) = 0 0 | |
socketpair(0x1, 0x1, 0x0) = 0 0 | |
setsockopt(0x6, 0xFFFF, 0x1100) = 0 0 | |
sendto_nocancel(0x4, 0x16006B0, 0x40) = 64 0 | |
sendmsg_nocancel(0x4, 0x70000E16B780, 0x0) = 1 0 | |
close_nocancel(0x7) = 0 0 | |
select_nocancel(0x7, 0x70000E16B780, 0x0) = 1 0 | |
recvfrom_nocancel(0x6, 0x70000E16B750, 0x4) = 4 0 | |
close_nocancel(0x6) = 0 0 | |
kevent(0x5, 0x70000E16BA00, 0x1) = 0 0 | |
kevent(0x5, 0x0, 0x0) = 1 0 | |
kevent(0x5, 0x0, 0x0) = 1 0 | |
recvfrom_nocancel(0x4, 0x70000E16B800, 0x1C) = 28 0 | |
recvfrom_nocancel(0x4, 0x16004C0, 0x39) = 57 0 | |
select_nocancel(0x5, 0x70000E16B830, 0x0) = 0 0 | |
kevent(0x5, 0x70000E16B300, 0x1) = 0 0 | |
sendto_nocancel(0x4, 0x16006B0, 0x1C) = 28 0 | |
close_nocancel(0x5) = 0 0 | |
dtrace: error on enabled probe ID 2132 (ID 156: syscall::write:return): invalid kernel access in action #12 at DIF offset 92 | |
dtrace: error on enabled probe ID 2132 (ID 156: syscall::write:return): invalid kernel access in action #12 at DIF offset 92 | |
kqueue(0x1, 0xC4200D0090, 0x25) = 5 0 | |
kevent(0x5, 0x70000E16BA00, 0x1) = 0 0 | |
socketpair(0x1, 0x1, 0x0) = 0 0 | |
setsockopt(0x6, 0xFFFF, 0x1100) = 0 0 | |
sendto_nocancel(0x4, 0x16004C0, 0x40) = 64 0 | |
sendmsg_nocancel(0x4, 0x70000E16B780, 0x0) = 1 0 | |
close_nocancel(0x7) = 0 0 | |
select_nocancel(0x7, 0x70000E16B780, 0x0) = 1 0 | |
recvfrom_nocancel(0x6, 0x70000E16B750, 0x4) = 4 0 | |
close_nocancel(0x6) = 0 0 | |
kevent(0x5, 0x70000E16BA00, 0x1) = 0 0 | |
kevent(0x5, 0x0, 0x0) = 1 0 | |
kevent(0x5, 0x0, 0x0) = 1 0 | |
recvfrom_nocancel(0x4, 0x70000E16B800, 0x1C) = 28 0 | |
recvfrom_nocancel(0x4, 0x1600640, 0x39) = 57 0 | |
select_nocancel(0x5, 0x70000E16B830, 0x0) = 0 0 | |
kevent(0x5, 0x70000E16B300, 0x1) = 0 0 | |
sendto_nocancel(0x4, 0x16004C0, 0x1C) = 28 0 | |
close_nocancel(0x5) = 0 0 | |
dtrace: error on enabled probe ID 2132 (ID 156: syscall::write:return): invalid kernel access in action #12 at DIF offset 92 | |
dtrace: error on enabled probe ID 2132 (ID 156: syscall::write:return): invalid kernel access in action #12 at DIF offset 92 | |
select(0x0, 0x0, 0x0, 0x0, 0x70000E0E8DC8) = 0 0 | |
dtrace: error on enabled probe ID 2132 (ID 156: syscall::write:return): invalid kernel access in action #12 at DIF offset 92 | |
dtrace: error on enabled probe ID 2132 (ID 156: syscall::write:return): invalid kernel access in action #12 at DIF offset 92 | |
dtrace: error on enabled probe ID 2132 (ID 156: syscall::write:return): invalid kernel access in action #12 at DIF offset 92 | |
dtrace: error on enabled probe ID 2132 (ID 156: syscall::write:return): invalid kernel access in action #12 at DIF offset 92 | |
socket(0x2, 0x1, 0x0) = 5 0 | |
fcntl(0x5, 0x2, 0x1) = 0 0 | |
fcntl(0x5, 0x3, 0x0) = 2 0 | |
fcntl(0x5, 0x4, 0x6) = 0 0 | |
setsockopt(0x5, 0xFFFF, 0x20) = 0 0 | |
setsockopt(0x5, 0xFFFF, 0x4) = 0 0 | |
bind(0x5, 0xC4200E054C, 0x10) = 0 0 | |
listen(0x5, 0x80, 0x10) = 0 0 | |
kqueue(0x5, 0x80, 0x10) = 6 0 | |
fcntl(0x6, 0x2, 0x1) = 0 0 | |
mmap(0x0, 0x40000, 0x3, 0x1002, 0xFFFFFFFF, 0x0) = 0x2141000 0 | |
kevent(0x6, 0xC42003F800, 0x2) = 0 0 | |
getsockname(0x5, 0xC42003F874, 0xC42003F870) = 0 0 | |
socket(0x2, 0x1, 0x0) = 7 0 | |
fcntl(0x7, 0x2, 0x1) = 0 0 | |
kevent(0x6, 0x0, 0x0) = 0 0 | |
fcntl(0x7, 0x3, 0x0) = 2 0 | |
fcntl(0x7, 0x4, 0x6) = 0 0 | |
select(0x0, 0x0, 0x0, 0x0, 0x7FFF5FBFF9C0) = 0 0 | |
setsockopt(0x7, 0xFFFF, 0x20) = 0 0 | |
kevent(0x6, 0x0, 0x0) = 0 0 | |
accept(0x5, 0xC420040AC4, 0xC420040AB4) = -1 Err#35 | |
select(0x0, 0x0, 0x0, 0x0, 0x70000E1EECD8) = 0 0 | |
connect(0x7, 0xC4200E05AC, 0x10) = -1 Err#36 | |
kevent(0x6, 0xC42004B478, 0x2) = 0 0 | |
select(0x0, 0x0, 0x0, 0x0, 0x70000E0E8DC8) = 0 0 | |
select(0x0, 0x0, 0x0, 0x0, 0x70000E0E8DC8) = 0 0 | |
^C | |
sigaction(0x2, 0xC420009898, 0x0) = 0 0 | |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment