https://bugzilla.mindrot.org/show_bug.cgi?id=3702
--- Comment #4 from Darren Tucker <[email protected]> --- If you've built with -DSANDBOX_SECCOMP_FILTER_DEBUG you should get a debug line like this: ssh_sandbox_violation: unexpected system call (arch:0xc000003e,syscall:271 @ 0x7f84be11dc3b) [preauth] If you're building the current devel version you'll need to either install sshd-session where sshd expects it or specify the one in your build directory: $ make && sudo `pwd`/sshd -De -ologlevel=debug3 -p 2022 -osshdsessionpath=`pwd`/sshd-session One other thing: you can ask the compiler to dump the syscall numbers for you: $ cc -dD -E -I. sandbox-seccomp-filter.c | grep '#define __NR' (As an aside, tt'd be nice if the debugging code could do this for us.) On my Armbian system this says 20 is epoll: #define __NR_epoll_create1 20 #define __NR_epoll_ctl 21 #define __NR_epoll_pwait 22 -- You are receiving this mail because: You are watching someone on the CC list of the bug. You are watching the assignee of the bug. _______________________________________________ openssh-bugs mailing list [email protected] https://lists.mindrot.org/mailman/listinfo/openssh-bugs
