https://bugzilla.mindrot.org/show_bug.cgi?id=3430
Rustam Abdullaev <[email protected]> changed: What |Removed |Added ---------------------------------------------------------------------------- CC| |[email protected] --- Comment #10 from Rustam Abdullaev <[email protected]> --- I've run into this issue on a 32-bit ARM platform with Ubuntu 22.04 and kernel 6.1.36 (via buildroot). Only the sshd seccomp fails with "SIGSYS, Bad system call". All other invocations of clock_gettime work fine. Core was generated by `sshd-session: [net]'. Program terminated with signal SIGSYS, Bad system call. #0 0xb6b349a6 in ?? () from /usr/lib/libc.so.6 #1 0xb6b95892 in __clock_gettime64 () from /usr/lib/libc.so.6 #2 0xb6b9593c in clock_gettime () from /usr/lib/libc.so.6 #3 0x00496b1c in ?? () Building with BR2_PACKAGE_OPENSSH_SANDBOX=n "fixes" the issue. So there's definitely something wrong with seccomp on a 32-bit ARM platform. -- You are receiving this mail because: You are watching the assignee of the bug. You are watching someone on the CC list of the bug. _______________________________________________ openssh-bugs mailing list [email protected] https://lists.mindrot.org/mailman/listinfo/openssh-bugs
