diff options
author | Vicente Olivert Riera <Vincent.Riera@imgtec.com> | 2017-06-20 16:42:28 +0100 |
---|---|---|
committer | Darren Tucker <dtucker@dtucker.net> | 2018-03-08 13:03:06 +1100 |
commit | 45011511a09e03493568506ce32f4891a174a3bd (patch) | |
tree | b7b1475746027155ee5b4876eafc8493653c53df /openbsd-compat/port-linux.h | |
parent | 580086704c31de91dc7ba040a28e416bf1fefbca (diff) |
configure.ac: properly set seccomp_audit_arch for MIPS64
Currently seccomp_audit_arch is set to AUDIT_ARCH_MIPS64 or
AUDIT_ARCH_MIPSEL64 (depending on the endinness) when openssh is built
for MIPS64. However, that's only valid for n64 ABI. The right macros for
n32 ABI defined in seccomp.h are AUDIT_ARCH_MIPS64N32 and
AUDIT_ARCH_MIPSEL64N32, for big and little endian respectively.
Because of that an sshd built for MIPS64 n32 rejects connection attempts
and the output of strace reveals that the problem is related to seccomp
audit:
[pid 194] prctl(PR_SET_SECCOMP, SECCOMP_MODE_FILTER, {len=57,
filter=0x555d5da0}) = 0
[pid 194] write(7, "\0\0\0]\0\0\0\5\0\0\0Ulist_hostkey_types: "..., 97) = ?
[pid 193] <... poll resumed> ) = 2 ([{fd=5, revents=POLLIN|POLLHUP},
{fd=6, revents=POLLHUP}])
[pid 194] +++ killed by SIGSYS +++
This patch fixes that problem by setting the right value to
seccomp_audit_arch taking into account the MIPS64 ABI.
Signed-off-by: Vicente Olivert Riera <Vincent.Riera@imgtec.com>
Diffstat (limited to 'openbsd-compat/port-linux.h')
0 files changed, 0 insertions, 0 deletions