[Bug 3268] New: ssh_sandbox_violation: unexpected system call: getpid on Linux x32

bugzilla-daemon at mindrot.org bugzilla-daemon at mindrot.org
Tue Mar 2 02:37:25 AEDT 2021


https://bugzilla.mindrot.org/show_bug.cgi?id=3268

            Bug ID: 3268
           Summary: ssh_sandbox_violation: unexpected system call: getpid
                    on Linux x32
           Product: Portable OpenSSH
           Version: 8.4p1
          Hardware: x32
                OS: Linux
            Status: NEW
          Severity: major
          Priority: P5
         Component: sshd
          Assignee: unassigned-bugs at mindrot.org
          Reporter: arekm at maven.pl

On Linux x32, glibc 2.33 and kernel 4.9.256 I'm getting sshd killed due
to sandbox violation. With debugging:

9563  getpid()                          = 1073741863
9563  --- SIGSYS {si_signo=SIGSYS, si_code=SYS_SECCOMP,
si_call_addr=0xf71b164b, si_syscall=__NR_getpid,
si_arch=AUDIT_ARCH_X86_64} ---
9563  write(8, "\0\0\0g\0\0\0\1\0\0\0_ssh_sandbox_violation: unexpected
system call (arch:0xc000003e,syscall:1073741863 @ 0xf71b164b)", 107) =
1073741825

1073741863 is getpid on x32


but there is
        SC_ALLOW(__NR_getpid),
already there, so should allow it right?

I even tried:
    SC_ALLOW(1073741863),
to see if that will work but it doesn't.

-- 
You are receiving this mail because:
You are watching the assignee of the bug.


More information about the openssh-bugs mailing list