[Bug 3268] New: ssh_sandbox_violation: unexpected system call: getpid on Linux x32
bugzilla-daemon at mindrot.org
bugzilla-daemon at mindrot.org
Tue Mar 2 02:37:25 AEDT 2021
https://bugzilla.mindrot.org/show_bug.cgi?id=3268
Bug ID: 3268
Summary: ssh_sandbox_violation: unexpected system call: getpid
on Linux x32
Product: Portable OpenSSH
Version: 8.4p1
Hardware: x32
OS: Linux
Status: NEW
Severity: major
Priority: P5
Component: sshd
Assignee: unassigned-bugs at mindrot.org
Reporter: arekm at maven.pl
On Linux x32, glibc 2.33 and kernel 4.9.256 I'm getting sshd killed due
to sandbox violation. With debugging:
9563 getpid() = 1073741863
9563 --- SIGSYS {si_signo=SIGSYS, si_code=SYS_SECCOMP,
si_call_addr=0xf71b164b, si_syscall=__NR_getpid,
si_arch=AUDIT_ARCH_X86_64} ---
9563 write(8, "\0\0\0g\0\0\0\1\0\0\0_ssh_sandbox_violation: unexpected
system call (arch:0xc000003e,syscall:1073741863 @ 0xf71b164b)", 107) =
1073741825
1073741863 is getpid on x32
but there is
SC_ALLOW(__NR_getpid),
already there, so should allow it right?
I even tried:
SC_ALLOW(1073741863),
to see if that will work but it doesn't.
--
You are receiving this mail because:
You are watching the assignee of the bug.
More information about the openssh-bugs
mailing list