path: root/ssh-keyscan.1
diff options
authorVicente Olivert Riera <>2017-06-20 16:42:28 +0100
committerDarren Tucker <>2018-03-08 13:03:06 +1100
commit45011511a09e03493568506ce32f4891a174a3bd (patch)
treeb7b1475746027155ee5b4876eafc8493653c53df /ssh-keyscan.1
parent580086704c31de91dc7ba040a28e416bf1fefbca (diff) properly set seccomp_audit_arch for MIPS64
Currently seccomp_audit_arch is set to AUDIT_ARCH_MIPS64 or AUDIT_ARCH_MIPSEL64 (depending on the endinness) when openssh is built for MIPS64. However, that's only valid for n64 ABI. The right macros for n32 ABI defined in seccomp.h are AUDIT_ARCH_MIPS64N32 and AUDIT_ARCH_MIPSEL64N32, for big and little endian respectively. Because of that an sshd built for MIPS64 n32 rejects connection attempts and the output of strace reveals that the problem is related to seccomp audit: [pid 194] prctl(PR_SET_SECCOMP, SECCOMP_MODE_FILTER, {len=57, filter=0x555d5da0}) = 0 [pid 194] write(7, "\0\0\0]\0\0\0\5\0\0\0Ulist_hostkey_types: "..., 97) = ? [pid 193] <... poll resumed> ) = 2 ([{fd=5, revents=POLLIN|POLLHUP}, {fd=6, revents=POLLHUP}]) [pid 194] +++ killed by SIGSYS +++ This patch fixes that problem by setting the right value to seccomp_audit_arch taking into account the MIPS64 ABI. Signed-off-by: Vicente Olivert Riera <>
Diffstat (limited to 'ssh-keyscan.1')
0 files changed, 0 insertions, 0 deletions