https://bugzilla.mindrot.org/show_bug.cgi?id=3398
--- Comment #2 from Alexander Kanavin <alex.kana...@gmail.com> --- I ran sshd under strace, this is where things seem to go awry: set_robust_list(0xa7d98090, 12) = 0 close(6) = 0 close(7) = 0 getpid() = 715 getpid() = 715 getrandom("\xe7\x45\x7a\x54\xec\xef\xdf\x78\x4b\x73\x30\xac\xe3\x51\xfc\xfe\x84\x7c\xe0\x10\x3d\x1d\xc0\x6a\x54\x26\xd9\x27\x69\x09\x39\x70", 32, 0) = 32 getpid() = 715 getpid() = 715 getrandom("\x73\x65\x0a\x2a\x8d\xe8\xd7\x06\x5a\x07\xfe\xed\x38\x8c\x45\xd6\x46\x8f\xab\x52\xcd\x3c\x96\xf4\xde\x8d\x49\xbe\x70\x4f\x36\x24", 32, 0) = 32 getpid() = 715 getpid() = 715 brk(0xc88000) = 0xc88000 chroot("/var/run/sshd") = 0 chdir("/") = 0 getpid() = 715 setgroups(1, [995]) = 0 getuid() = 0 getgid() = 0 getpid() = 715 setresgid(995, 995, 995) = 0 setresuid(996, 996, 996) = 0 setgid(0) = -1 EPERM (Operation not permitted) setresgid(-1, 0, -1) = -1 EPERM (Operation not permitted) getgid() = 995 getegid() = 995 setuid(0) = -1 EPERM (Operation not permitted) setresuid(-1, 0, -1) = -1 EPERM (Operation not permitted) getuid() = 996 geteuid() = 996 prlimit64(0, RLIMIT_FSIZE, {rlim_cur=0, rlim_max=0}, NULL) = 0 prlimit64(0, RLIMIT_NOFILE, {rlim_cur=0, rlim_max=0}, NULL) = 0 prlimit64(0, RLIMIT_NPROC, {rlim_cur=0, rlim_max=0}, NULL) = 0 getpid() = 715 getpid() = 715 getpid() = 715 getpid() = 715 getpid() = 715 write(4, "\0\0\4\24\t\24?\345\251\262\371\245\3712;6\336\227\"\372yQ\0\0\1\tcurve2"..., 1048) = 1048 ppoll([{fd=4, events=POLLIN}], 1, NULL, NULL, 8) = -1 EINVAL (Invalid argument) getpid() = 715 write(8, "\0\0\0Y\0\0\0\3\0\0\0\0\0\0\0Mssh_dispatch_run"..., 93) = 93 getpid() = 715 exit_group(255) = ? +++ exited with 255 +++ Particulary, is calling prlimit64() with zeroes expected? -- You are receiving this mail because: You are watching the assignee of the bug. _______________________________________________ openssh-bugs mailing list openssh-bugs@mindrot.org https://lists.mindrot.org/mailman/listinfo/openssh-bugs