trace mailnull process ?

hello,
can anyone tell me what and wich user does run this mailnull process adn what is it doing? (Note: 00.00.00.00 is the server IP)

thanks a lot
-------------
select(1, [0], NULL, NULL, NULL) = 1 (in [0])
accept(0, {sa_family=AF_INET, sin_port=htons(2857), sin_addr=inet_addr("61.75.6.131")}, [16]) = 1
fcntl64(1, F_GETFL) = 0x2 (flags O_RDWR)
fstat64(1, {st_mode=S_IFSOCK|0777, st_size=0, ...}) = 0
mmap2(NULL, 4096, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) = 0x40016000
_llseek(1, 0, 0xbfffe050, SEEK_CUR) = -1 ESPIPE (Illegal seek)
dup(1) = 2
fcntl64(2, F_GETFL) = 0x2 (flags O_RDWR)
fstat64(2, {st_mode=S_IFSOCK|0777, st_size=0, ...}) = 0
mmap2(NULL, 4096, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) = 0x40017000
_llseek(2, 0, 0xbfffe050, SEEK_CUR) = -1 ESPIPE (Illegal seek)
getsockname(1, {sa_family=AF_INET, sin_port=htons(25), sin_addr=inet_addr("00.00.00.00")}, [16]) = 0
clone(child_stack=0, flags=CLONE_CHILD_CLEARTID|CLONE_CHILD_SETTID|0x11, <IGNORED>, <IGNORED>, 0x403149a8) = 5029
close(1) = 0
munmap(0x40016000, 4096) = 0
close(2) = 0
munmap(0x40017000, 4096) = 0
wait4(-1, 0xbfffe324, WNOHANG, NULL) = 0
select(1, [0], NULL, NULL, NULL) = ? ERESTARTNOHAND (To be restarted)
--- SIGCHLD (Child exited) @ 0 (0) ---
rt_sigaction(SIGCHLD, {SIG_DFL}, {0x806c6d2, [CHLD], SA_RESTORER|SA_RESTART, 0x420277b8}, 8) = 0
sigreturn() = ? (mask now [])
wait4(-1, [WIFEXITED(s) &amp;&amp; WEXITSTATUS(s) == 0], WNOHANG, NULL) = 5016
wait4(-1, 0xbfffe324, WNOHANG, NULL) = 0
rt_sigaction(SIGCHLD, {0x806c6d2, [CHLD], SA_RESTORER|SA_RESTART, 0x420277b8}, {SIG_DFL}, 8) = 0
select(1, [0], NULL, NULL, NULL) = ? ERESTARTNOHAND (To be restarted)
--- SIGCHLD (Child exited) @ 0 (0) ---
rt_sigaction(SIGCHLD, {SIG_DFL}, {0x806c6d2, [CHLD], SA_RESTORER|SA_RESTART, 0x420277b8}, 8) = 0
sigreturn() = ? (mask now [])
wait4(-1, [WIFEXITED(s) &amp;&amp; WEXITSTATUS(s) == 0], WNOHANG, NULL) = 5015
wait4(-1, 0xbfffe324, WNOHANG, NULL) = 0
rt_sigaction(SIGCHLD, {0x806c6d2, [CHLD], SA_RESTORER|SA_RESTART, 0x420277b8}, {SIG_DFL}, 8) = 0
select(1, [0], NULL, NULL, NULL) = 1 (in [0])
accept(0, {sa_family=AF_INET, sin_port=htons(1156), sin_addr=inet_addr("62.94.41.225")}, [16]) = 1
fcntl64(1, F_GETFL) = 0x2 (flags O_RDWR)
fstat64(1, {st_mode=S_IFSOCK|0777, st_size=0, ...}) = 0
mmap2(NULL, 4096, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) = 0x40016000
_llseek(1, 0, 0xbfffe050, SEEK_CUR) = -1 ESPIPE (Illegal seek)
dup(1) = 2
fcntl64(2, F_GETFL) = 0x2 (flags O_RDWR)
fstat64(2, {st_mode=S_IFSOCK|0777, st_size=0, ...}) = 0
mmap2(NULL, 4096, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) = 0x40017000
_llseek(2, 0, 0xbfffe050, SEEK_CUR) = -1 ESPIPE (Illegal seek)
getsockname(1, {sa_family=AF_INET, sin_port=htons(25), sin_addr=inet_addr("00.00.00.00")}, [16]) = 0
clone(child_stack=0, flags=CLONE_CHILD_CLEARTID|CLONE_CHILD_SETTID|0x11, <IGNORED>, <IGNORED>, 0x403149a8) = 5036
close(1) = 0
munmap(0x40016000, 4096) = 0
close(2) = 0
munmap(0x40017000, 4096) = 0
wait4(-1, 0xbfffe324, WNOHANG, NULL) = 0
select(1, [0], NULL, NULL, NULL) = ? ERESTARTNOHAND (To be restarted)
--- SIGCHLD (Child exited) @ 0 (0) ---
rt_sigaction(SIGCHLD, {SIG_DFL}, {0x806c6d2, [CHLD], SA_RESTORER|SA_RESTART, 0x420277b8}, 8) = 0
sigreturn() = ? (mask now [])
wait4(-1, [WIFEXITED(s) &amp;&amp; WEXITSTATUS(s) == 0], WNOHANG, NULL) = 4993
wait4(-1, 0xbfffe324, WNOHANG, NULL) = 0
rt_sigaction(SIGCHLD, {0x806c6d2, [CHLD], SA_RESTORER|SA_RESTART, 0x420277b8}, {SIG_DFL}, 8) = 0
select(1, [0], NULL, NULL, NULL) = 1 (in [0])
accept(0, {sa_family=AF_INET, sin_port=htons(1685), sin_addr=inet_addr("200.91.69.203")}, [16]) = 1
fcntl64(1, F_GETFL) = 0x2 (flags O_RDWR)
fstat64(1, {st_mode=S_IFSOCK|0777, st_size=0, ...}) = 0
mmap2(NULL, 4096, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) = 0x40016000
_llseek(1, 0, 0xbfffe050, SEEK_CUR) = -1 ESPIPE (Illegal seek)
dup(1) = 2
fcntl64(2, F_GETFL) = 0x2 (flags O_RDWR)
fstat64(2, {st_mode=S_IFSOCK|0777, st_size=0, ...}) = 0
mmap2(NULL, 4096, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) = 0x40017000
_llseek(2, 0, 0xbfffe050, SEEK_CUR) = -1 ESPIPE (Illegal seek)
getsockname(1, {sa_family=AF_INET, sin_port=htons(25), sin_addr=inet_addr("00.00.00.00")}, [16]) = 0
clone(child_stack=0, flags=CLONE_CHILD_CLEARTID|CLONE_CHILD_SETTID|0x11, <IGNORED>, <IGNORED>, 0x403149a8) = 5051
close(1) = 0
munmap(0x40016000, 4096) = 0
close(2) = 0
munmap(0x40017000, 4096) = 0
wait4(-1, 0xbfffe324, WNOHANG, NULL) = 0
select(1, [0], NULL, NULL, NULL) = 1 (in [0])
accept(0, {sa_family=AF_INET, sin_port=htons(2927), sin_addr=inet_addr("221.237.184.118")}, [16]) = 1
fcntl64(1, F_GETFL) = 0x2 (flags O_RDWR)
fstat64(1, {st_mode=S_IFSOCK|0777, st_size=0, ...}) = 0
mmap2(NULL, 4096, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) = 0x40016000
_llseek(1, 0, 0xbfffe050, SEEK_CUR) = -1 ESPIPE (Illegal seek)
dup(1) = 2
fcntl64(2, F_GETFL) = 0x2 (flags O_RDWR)
fstat64(2, {st_mode=S_IFSOCK|0777, st_size=0, ...}) = 0
mmap2(NULL, 4096, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) = 0x40017000
_llseek(2, 0, 0xbfffe050, SEEK_CUR) = -1 ESPIPE (Illegal seek)
getsockname(1, {sa_family=AF_INET, sin_port=htons(25), sin_addr=inet_addr("00.00.00.00")}, [16]) = 0
clone(child_stack=0, flags=CLONE_CHILD_CLEARTID|CLONE_CHILD_SETTID|0x11, <IGNORED>, <IGNORED>, 0x403149a8) = 5052
close(1) = 0
munmap(0x40016000, 4096) = 0
close(2) = 0
munmap(0x40017000, 4096) = 0
wait4(-1, 0xbfffe324, WNOHANG, NULL) = 0
select(1, [0], NULL, NULL, NULL) = ? ERESTARTNOHAND (To be restarted)
--- SIGCHLD (Child exited) @ 0 (0) ---
rt_sigaction(SIGCHLD, {SIG_DFL}, {0x806c6d2, [CHLD], SA_RESTORER|SA_RESTART, 0x420277b8}, 8) = 0
sigreturn() = ? (mask now [])
wait4(-1, [WIFEXITED(s) &amp;&amp; WEXITSTATUS(s) == 1], WNOHANG, NULL) = 5019
wait4(-1, 0xbfffe324, WNOHANG, NULL) = 0
rt_sigaction(SIGCHLD, {0x806c6d2, [CHLD], SA_RESTORER|SA_RESTART, 0x420277b8}, {SIG_DFL}, 8) = 0
select(1, [0], NULL, NULL, NULL) = ? ERESTARTNOHAND (To be restarted)
--- SIGCHLD (Child exited) @ 0 (0) ---
rt_sigaction(SIGCHLD, {SIG_DFL}, {0x806c6d2, [CHLD], SA_RESTORER|SA_RESTART, 0x420277b8}, 8) = 0
sigreturn() = ? (mask now [])
wait4(-1, [WIFEXITED(s) &amp;&amp; WEXITSTATUS(s) == 0], WNOHANG, NULL) = 5051
wait4(-1, 0xbfffe324, WNOHANG, NULL) = 0
rt_sigaction(SIGCHLD, {0x806c6d2, [CHLD], SA_RESTORER|SA_RESTART, 0x420277b8}, {SIG_DFL}, 8) = 0
select(1, [0], NULL, NULL, NULL) = ? ERESTARTNOHAND (To be restarted)
--- SIGCHLD (Child exited) @ 0 (0) ---
rt_sigaction(SIGCHLD, {SIG_DFL}, {0x806c6d2, [CHLD], SA_RESTORER|SA_RESTART, 0x420277b8}, 8) = 0
sigreturn() = ? (mask now [])
wait4(-1, [WIFEXITED(s) &amp;&amp; WEXITSTATUS(s) == 0], WNOHANG, NULL) = 4780
wait4(-1, 0xbfffe324, WNOHANG, NULL) = 0
rt_sigaction(SIGCHLD, {0x806c6d2, [CHLD], SA_RESTORER|SA_RESTART, 0x420277b8}, {SIG_DFL}, 8) = 0
select(1, [0], NULL, NULL, NULL) = ? ERESTARTNOHAND (To be restarted)
--- SIGCHLD (Child exited) @ 0 (0) ---
rt_sigaction(SIGCHLD, {SIG_DFL}, {0x806c6d2, [CHLD], SA_RESTORER|SA_RESTART, 0x420277b8}, 8) = 0
sigreturn() = ? (mask now [])
wait4(-1, [WIFEXITED(s) &amp;&amp; WEXITSTATUS(s) == 0], WNOHANG, NULL) = 5029
wait4(-1, 0xbfffe324, WNOHANG, NULL) = 0
rt_sigaction(SIGCHLD, {0x806c6d2, [CHLD], SA_RESTORER|SA_RESTART, 0x420277b8}, {SIG_DFL}, 8) = 0
select(1, [0], NULL, NULL, NULL) = ? ERESTARTNOHAND (To be restarted)
--- SIGCHLD (Child exited) @ 0 (0) ---
rt_sigaction(SIGCHLD, {SIG_DFL}, {0x806c6d2, [CHLD], SA_RESTORER|SA_RESTART, 0x420277b8}, 8) = 0
sigreturn() = ? (mask now [])
wait4(-1, [WIFEXITED(s) &amp;&amp; WEXITSTATUS(s) == 0], WNOHANG, NULL) = 5021
wait4(-1, 0xbfffe324, WNOHANG, NULL) = 0
rt_sigaction(SIGCHLD, {0x806c6d2, [CHLD], SA_RESTORER|SA_RESTART, 0x420277b8}, {SIG_DFL}, 8) = 0
select(1, [0], NULL, NULL, NULL) = 1 (in [0])
accept(0, {sa_family=AF_INET, sin_port=htons(2737), sin_addr=inet_addr("220.84.134.71")}, [16]) = 1
fcntl64(1, F_GETFL) = 0x2 (flags O_RDWR)
fstat64(1, {st_mode=S_IFSOCK|0777, st_size=0, ...}) = 0
mmap2(NULL, 4096, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) = 0x40016000
_llseek(1, 0, 0xbfffe050, SEEK_CUR) = -1 ESPIPE (Illegal seek)
dup(1) = 2
fcntl64(2, F_GETFL) = 0x2 (flags O_RDWR)
fstat64(2, {st_mode=S_IFSOCK|0777, st_size=0, ...}) = 0
mmap2(NULL, 4096, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) = 0x40017000
_llseek(2, 0, 0xbfffe050, SEEK_CUR) = -1 ESPIPE (Illegal seek)
getsockname(1, {sa_family=AF_INET, sin_port=htons(25), sin_addr=inet_addr("00.00.00.00")}, [16]) = 0
clone(child_stack=0, flags=CLONE_CHILD_CLEARTID|CLONE_CHILD_SETTID|0x11, <IGNORED>, <IGNORED>, 0x403149a8) = 5073
close(1) = 0
munmap(0x40016000, 4096) = 0
close(2) = 0
munmap(0x40017000, 4096) = 0
wait4(-1, 0xbfffe324, WNOHANG, NULL) = 0
select(1, [0], NULL, NULL, NULL) = 1 (in [0])
accept(0, {sa_family=AF_INET, sin_port=htons(2316), sin_addr=inet_addr("24.3.191.232")}, [16]) = 1
fcntl64(1, F_GETFL) = 0x2 (flags O_RDWR)
fstat64(1, {st_mode=S_IFSOCK|0777, st_size=0, ...}) = 0
mmap2(NULL, 4096, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) = 0x40016000
_llseek(1, 0, 0xbfffe050, SEEK_CUR) = -1 ESPIPE (Illegal seek)
dup(1) = 2
fcntl64(2, F_GETFL) = 0x2 (flags O_RDWR)
fstat64(2, {st_mode=S_IFSOCK|0777, st_size=0, ...}) = 0
mmap2(NULL, 4096, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) = 0x40017000
_llseek(2, 0, 0xbfffe050, SEEK_CUR) = -1 ESPIPE (Illegal seek)
getsockname(1, {sa_family=AF_INET, sin_port=htons(25), sin_addr=inet_addr("00.00.00.00")}, [16]) = 0
clone(child_stack=0, flags=CLONE_CHILD_CLEARTID|CLONE_CHILD_SETTID|0x11, <IGNORED>, <IGNORED>, 0x403149a8) = 5075
close(1) = 0
munmap(0x40016000, 4096) = 0
close(2) = 0
munmap(0x40017000, 4096) = 0
wait4(-1, 0xbfffe324, WNOHANG, NULL) = 0
select(1, [0], NULL, NULL, NULL) = 1 (in [0])
accept(0, {sa_family=AF_INET, sin_port=htons(1160), sin_addr=inet_addr("62.94.41.225")}, [16]) = 1
fcntl64(1, F_GETFL) = 0x2 (flags O_RDWR)
fstat64(1, {st_mode=S_IFSOCK|0777, st_size=0, ...}) = 0
mmap2(NULL, 4096, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) = 0x40016000
_llseek(1, 0, 0xbfffe050, SEEK_CUR) = -1 ESPIPE (Illegal seek)
dup(1) = 2
fcntl64(2, F_GETFL) = 0x2 (flags O_RDWR)
fstat64(2, {st_mode=S_IFSOCK|0777, st_size=0, ...}) = 0
mmap2(NULL, 4096, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) = 0x40017000
_llseek(2, 0, 0xbfffe050, SEEK_CUR) = -1 ESPIPE (Illegal seek)
getsockname(1, {sa_family=AF_INET, sin_port=htons(25), sin_addr=inet_addr("00.00.00.00")}, [16]) = 0
clone(child_stack=0, flags=CLONE_CHILD_CLEARTID|CLONE_CHILD_SETTID|0x11, <IGNORED>, <IGNORED>, 0x403149a8) = 5076
close(1) = 0
munmap(0x40016000, 4096) = 0
close(2) = 0
munmap(0x40017000, 4096) = 0
wait4(-1, 0xbfffe324, WNOHANG, NULL) = 0
select(1, [0], NULL, NULL, NULL) = 1 (in [0])
accept(0, {sa_family=AF_INET, sin_port=htons(4663), sin_addr=inet_addr("61.18.121.190")}, [16]) = 1
fcntl64(1, F_GETFL) = 0x2 (flags O_RDWR)
fstat64(1, {st_mode=S_IFSOCK|0777, st_size=0, ...}) = 0
mmap2(NULL, 4096, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) = 0x40016000
_llseek(1, 0, 0xbfffe050, SEEK_CUR) = -1 ESPIPE (Illegal seek)
dup(1) = 2
fcntl64(2, F_GETFL) = 0x2 (flags O_RDWR)
fstat64(2, {st_mode=S_IFSOCK|0777, st_size=0, ...}) = 0
mmap2(NULL, 4096, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) = 0x40017000
_llseek(2, 0, 0xbfffe050, SEEK_CUR) = -1 ESPIPE (Illegal seek)
getsockname(1, {sa_family=AF_INET, sin_port=htons(25), sin_addr=inet_addr("00.00.00.00")}, [16]) = 0
clone(child_stack=0, flags=CLONE_CHILD_CLEARTID|CLONE_CHILD_SETTID|0x11, <IGNORED>, <IGNORED>, 0x403149a8) = 5079
close(1) = 0
munmap(0x40016000, 4096) = 0
close(2) = 0
munmap(0x40017000, 4096) = 0
wait4(-1, 0xbfffe324, WNOHANG, NULL) = 0
select(1, [0], NULL, NULL, NULL) = 1 (in [0])
accept(0, {sa_family=AF_INET, sin_port=htons(1718), sin_addr=inet_addr("151.26.58.147")}, [16]) = 1
fcntl64(1, F_GETFL) = 0x2 (flags O_RDWR)
fstat64(1, {st_mode=S_IFSOCK|0777, st_size=0, ...}) = 0
mmap2(NULL, 4096, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) = 0x40016000
_llseek(1, 0, 0xbfffe050, SEEK_CUR) = -1 ESPIPE (Illegal seek)
dup(1) = 2
fcntl64(2, F_GETFL) = 0x2 (flags O_RDWR)
fstat64(2, {st_mode=S_IFSOCK|0777, st_size=0, ...}) = 0
mmap2(NULL, 4096, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) = 0x40017000
_llseek(2, 0, 0xbfffe050, SEEK_CUR) = -1 ESPIPE (Illegal seek)
getsockname(1, {sa_family=AF_INET, sin_port=htons(25), sin_addr=inet_addr("00.00.00.00")}, [16]) = 0
clone(child_stack=0, flags=CLONE_CHILD_CLEARTID|CLONE_CHILD_SETTID|0x11, <IGNORED>, <IGNORED>, 0x403149a8) = 5081
close(1) = 0
munmap(0x40016000, 4096) = 0
close(2) = 0
munmap(0x40017000, 4096) = 0
wait4(-1, 0xbfffe324, WNOHANG, NULL) = 0
select(1, [0], NULL, NULL, NULL) = ? ERESTARTNOHAND (To be restarted)
--- SIGCHLD (Child exited) @ 0 (0) ---
rt_sigaction(SIGCHLD, {SIG_DFL}, {0x806c6d2, [CHLD], SA_RESTORER|SA_RESTART, 0x420277b8}, 8) = 0
sigreturn() = ? (mask now [])
wait4(-1, [WIFEXITED(s) &amp;&amp; WEXITSTATUS(s) == 0], WNOHANG, NULL) = 4847
wait4(-1, 0xbfffe324, WNOHANG, NULL) = 0
rt_sigaction(SIGCHLD, {0x806c6d2, [CHLD], SA_RESTORER|SA_RESTART, 0x420277b8}, {SIG_DFL}, 8) = 0
select(1, [0], NULL, NULL, NULL) = 1 (in [0])
accept(0, {sa_family=AF_INET, sin_port=htons(4148), sin_addr=inet_addr("218.172.210.124")}, [16]) = 1
fcntl64(1, F_GETFL) = 0x2 (flags O_RDWR)
fstat64(1, {st_mode=S_IFSOCK|0777, st_size=0, ...}) = 0
mmap2(NULL, 4096, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) = 0x40016000
_llseek(1, 0, 0xbfffe050, SEEK_CUR) = -1 ESPIPE (Illegal seek)
dup(1) = 2
fcntl64(2, F_GETFL) = 0x2 (flags O_RDWR)
fstat64(2, {st_mode=S_IFSOCK|0777, st_size=0, ...}) = 0
mmap2(NULL, 4096, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) = 0x40017000
_llseek(2, 0, 0xbfffe050, SEEK_CUR) = -1 ESPIPE (Illegal seek)
getsockname(1, {sa_family=AF_INET, sin_port=htons(25), sin_addr=inet_addr("00.00.00.00")}, [16]) = 0
clone(child_stack=0, flags=CLONE_CHILD_CLEARTID|CLONE_CHILD_SETTID|0x11, <IGNORED>, <IGNORED>, 0x403149a8) = 5094
close(1) = 0
munmap(0x40016000, 4096) = 0
close(2) = 0
munmap(0x40017000, 4096) = 0
wait4(-1, 0xbfffe324, WNOHANG, NULL) = 0
select(1, [0], NULL, NULL, NULL) = ? ERESTARTNOHAND (To be restarted)
--- SIGCHLD (Child exited) @ 0 (0) ---
rt_sigaction(SIGCHLD, {SIG_DFL}, {0x806c6d2, [CHLD], SA_RESTORER|SA_RESTART, 0x420277b8}, 8) = 0
sigreturn() = ? (mask now [])
wait4(-1, [WIFEXITED(s) &amp;&amp; WEXITSTATUS(s) == 0], WNOHANG, NULL) = 4944
wait4(-1, 0xbfffe324, WNOHANG, NULL) = 0
rt_sigaction(SIGCHLD, {0x806c6d2, [CHLD], SA_RESTORER|SA_RESTART, 0x420277b8}, {SIG_DFL}, 8) = 0
select(1, [0], NULL, NULL, NULL) = ? ERESTARTNOHAND (To be restarted)
--- SIGCHLD (Child exited) @ 0 (0) ---
rt_sigaction(SIGCHLD, {SIG_DFL}, {0x806c6d2, [CHLD], SA_RESTORER|SA_RESTART, 0x420277b8}, 8) = 0
sigreturn() = ? (mask now [])
wait4(-1, [WIFEXITED(s) &amp;&amp; WEXITSTATUS(s) == 0], WNOHANG, NULL) = 5079
wait4(-1, 0xbfffe324, WNOHANG, NULL) = 0
rt_sigaction(SIGCHLD, {0x806c6d2, [CHLD], SA_RESTORER|SA_RESTART, 0x420277b8}, {SIG_DFL}, 8) = 0
select(1, [0], NULL, NULL, NULL) = 1 (in [0])
----------------

 

 

 

 

Top