https://bugzilla.mindrot.org/show_bug.cgi?id=3702
Darren Tucker <[email protected]> changed: What |Removed |Added ---------------------------------------------------------------------------- CC| |[email protected] --- Comment #1 from Darren Tucker <[email protected]> --- Can you test this with -DSANDBOX_SECCOMP_FILTER_DEBUG (eg ./configure --with-cflags=-DSANDBOX_SECCOMP_FILTER_DEBUG" or uncomment it in sandbox-seccomp-filter.c)? That'll log the syscall it was trying to do when it failed. (Note that this is not safe for use in production). The kernel log you supplied says "syscall=384", but /usr/include/asm-generic/unistd.h on an armbian system here lists that range as "/* 295 through 402 are unassigned to sync up with generic numbers, don't use */". The only hit I get for 384 is on x86-64: $ grep 384 -r /usr/include/ | grep _NR_ /usr/include/asm/unistd_32.h:#define __NR_arch_prctl 384 but armbian has prctl as 167: /usr/include/asm-generic/unistd.h:#define __NR_prctl 167 so I'm not sure what to make of your kernel log. -- You are receiving this mail because: You are watching someone on the CC list of the bug. You are watching the assignee of the bug. _______________________________________________ openssh-bugs mailing list [email protected] https://lists.mindrot.org/mailman/listinfo/openssh-bugs
