https://bugzilla.mindrot.org/show_bug.cgi?id=3702

Darren Tucker <dtuc...@dtucker.net> changed:

           What    |Removed                     |Added
----------------------------------------------------------------------------
                 CC|                            |dtuc...@dtucker.net

--- Comment #1 from Darren Tucker <dtuc...@dtucker.net> ---
Can you test this with -DSANDBOX_SECCOMP_FILTER_DEBUG (eg ./configure
--with-cflags=-DSANDBOX_SECCOMP_FILTER_DEBUG" or uncomment it in
sandbox-seccomp-filter.c)?  That'll log the syscall it was trying to do
when it failed.   (Note that this is not safe for use in production).

The kernel log you supplied says "syscall=384", but
/usr/include/asm-generic/unistd.h on an armbian system here lists that
range as "/* 295 through 402 are unassigned to sync up with generic
numbers, don't use */".

The only hit I get for 384 is on x86-64:

$ grep 384 -r /usr/include/ | grep _NR_
/usr/include/asm/unistd_32.h:#define __NR_arch_prctl 384

but armbian has prctl as 167:
/usr/include/asm-generic/unistd.h:#define __NR_prctl 167

so I'm not sure what to make of your kernel log.

-- 
You are receiving this mail because:
You are watching someone on the CC list of the bug.
You are watching the assignee of the bug.
_______________________________________________
openssh-bugs mailing list
openssh-bugs@mindrot.org
https://lists.mindrot.org/mailman/listinfo/openssh-bugs

Reply via email to