Displaying 2 results from an estimated 2 matches for "__systemcall6".
2016 Sep 15
2
[Bug 2615] New: LoginGraceTime bypass (DoS)
...t was still trying to access the old server, where nfs/server
service has already been disabled.)
The monitor processes are blocked in open(), called from
auth_openfile(), called from user_key_allowed():
core 'core.sshd.699975' of 699975: /usr/lib/ssh/sshd -R
00007ff5c3658fbe __systemcall6 () + 1e
00007ff5c3622d4a __open () + 1a
00007ff5c363dbee open () + 12e
000000000045a20d auth_openfile () + 3d
0000000000465ccc user_key_allowed () + 3fc
000000000046999b mm_answer_keyallowed () + 45b
000000000046bf08 monitor_read () + 118
000000000046c2f8 m...
2008 Aug 25
11
pid-provider sees ld.so.1 only
I''m trying to do some userspace tracing on a server-process with the pid provider.
My problem is, that the only probes the pid-provider lists for the server-process (to which I attach dtrace with "-p nnnn") are coming from "ld.so.1".
There''s not a single one from my modules.
If I''m specifying "a.out" (or any of our shared-objects) as the