bugzilla-daemon at mindrot.org
2021-Mar-01 15:37 UTC
[Bug 3268] New: ssh_sandbox_violation: unexpected system call: getpid on Linux x32
https://bugzilla.mindrot.org/show_bug.cgi?id=3268
Bug ID: 3268
Summary: ssh_sandbox_violation: unexpected system call: getpid
on Linux x32
Product: Portable OpenSSH
Version: 8.4p1
Hardware: x32
OS: Linux
Status: NEW
Severity: major
Priority: P5
Component: sshd
Assignee: unassigned-bugs at mindrot.org
Reporter: arekm at maven.pl
On Linux x32, glibc 2.33 and kernel 4.9.256 I'm getting sshd killed due
to sandbox violation. With debugging:
9563 getpid() = 1073741863
9563 --- SIGSYS {si_signo=SIGSYS, si_code=SYS_SECCOMP,
si_call_addr=0xf71b164b, si_syscall=__NR_getpid,
si_arch=AUDIT_ARCH_X86_64} ---
9563 write(8, "\0\0\0g\0\0\0\1\0\0\0_ssh_sandbox_violation: unexpected
system call (arch:0xc000003e,syscall:1073741863 @ 0xf71b164b)", 107)
1073741825
1073741863 is getpid on x32
but there is
SC_ALLOW(__NR_getpid),
already there, so should allow it right?
I even tried:
SC_ALLOW(1073741863),
to see if that will work but it doesn't.
--
You are receiving this mail because:
You are watching the assignee of the bug.
bugzilla-daemon at mindrot.org
2021-Mar-01 22:03 UTC
[Bug 3268] ssh_sandbox_violation: unexpected system call: getpid on Linux x32
https://bugzilla.mindrot.org/show_bug.cgi?id=3268
Damien Miller <djm at mindrot.org> changed:
What |Removed |Added
----------------------------------------------------------------------------
CC| |djm at mindrot.org
--- Comment #1 from Damien Miller <djm at mindrot.org> ---
Could you please try git HEAD from
https://github.com/openssh/openssh-portable ?
--
You are receiving this mail because:
You are watching the assignee of the bug.
You are watching someone on the CC list of the bug.
bugzilla-daemon at mindrot.org
2021-Mar-01 23:13 UTC
[Bug 3268] ssh_sandbox_violation: unexpected system call: getpid on Linux x32
https://bugzilla.mindrot.org/show_bug.cgi?id=3268
Arkadiusz Mi?kiewicz <arekm at maven.pl> changed:
What |Removed |Added
----------------------------------------------------------------------------
Status|NEW |RESOLVED
Resolution|--- |INVALID
--- Comment #2 from Arkadiusz Mi?kiewicz <arekm at maven.pl> ---
commit e3f27006f15abacb7e89fda3f5e9a0bd420b7e38
Author: Damien Miller <djm at mindrot.org>
Date: Fri Nov 13 14:20:43 2020 +1100
Revert "detect Linux/X32 systems"
This reverts commit 5b56bd0affea7b02b540bdbc4d1d271b0e4fc885.
The approach used was incorrect; discussion in bz#3085
fixed it, thanks.
--
You are receiving this mail because:
You are watching someone on the CC list of the bug.
You are watching the assignee of the bug.
bugzilla-daemon at mindrot.org
2021-Mar-03 22:51 UTC
[Bug 3268] ssh_sandbox_violation: unexpected system call: getpid on Linux x32
https://bugzilla.mindrot.org/show_bug.cgi?id=3268
Damien Miller <djm at mindrot.org> changed:
What |Removed |Added
----------------------------------------------------------------------------
Status|RESOLVED |CLOSED
--- Comment #3 from Damien Miller <djm at mindrot.org> ---
close bugs that were resolved in OpenSSH 8.5 release cycle
--
You are receiving this mail because:
You are watching someone on the CC list of the bug.
You are watching the assignee of the bug.