Bugzilla – Attachment 3646 Details for
Bug 3512
net-misc/openssh-9.1_p1: stopped accepting connections after upgrade to sys-libs/glibc-2.36 (fatal: ssh_sandbox_violation: unexpected system call)
Home
|
New
|
Browse
|
Search
|
[?]
|
Reports
|
Requests
|
Help
|
New Account
|
Log In
[x]
|
Forgot Password
Login:
[x]
strace logs
sshd_strace.log (text/plain), 58.90 KB, created by
jussi
on 2022-12-21 17:21:55 AEDT
(
hide
)
Description:
strace logs
Filename:
MIME Type:
Creator:
jussi
Created:
2022-12-21 17:21:55 AEDT
Size:
58.90 KB
patch
obsolete
>execve("/usr/sbin/sshd", ["/usr/sbin/sshd", "-De", "-p", "2022"], 0x7fff441c0f70 /* 15 vars */) = 0 >brk(NULL) = 0x7fc85c9b7000 >mmap(NULL, 8192, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) = 0x7fc85afde000 >access("/etc/ld.so.preload", R_OK) = -1 ENOENT (No such file or directory) >openat(AT_FDCWD, "/etc/ld.so.cache", O_RDONLY|O_CLOEXEC) = 3 >newfstatat(3, "", {st_mode=S_IFREG|0644, st_size=26392, ...}, AT_EMPTY_PATH) = 0 >mmap(NULL, 26392, PROT_READ, MAP_PRIVATE, 3, 0) = 0x7fc85afd7000 >close(3) = 0 >openat(AT_FDCWD, "/lib64/libcrypt.so.2", O_RDONLY|O_CLOEXEC) = 3 >read(3, "\177ELF\2\1\1\0\0\0\0\0\0\0\0\0\3\0>\0\1\0\0\0@ \0\0\0\0\0\0"..., 832) = 832 >newfstatat(3, "", {st_mode=S_IFREG|0755, st_size=202544, ...}, AT_EMPTY_PATH) = 0 >mmap(NULL, 238112, PROT_READ, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) = 0x7fc85af9c000 >mmap(0x7fc85af9e000, 86016, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0x2000) = 0x7fc85af9e000 >mmap(0x7fc85afb3000, 106496, PROT_READ, MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0x17000) = 0x7fc85afb3000 >mmap(0x7fc85afcd000, 8192, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0x30000) = 0x7fc85afcd000 >mmap(0x7fc85afcf000, 29216, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x7fc85afcf000 >close(3) = 0 >openat(AT_FDCWD, "/lib64/libpam.so.0", O_RDONLY|O_CLOEXEC) = 3 >read(3, "\177ELF\2\1\1\0\0\0\0\0\0\0\0\0\3\0>\0\1\0\0\0\3604\0\0\0\0\0\0"..., 832) = 832 >newfstatat(3, "", {st_mode=S_IFREG|0755, st_size=64048, ...}, AT_EMPTY_PATH) = 0 >mmap(NULL, 66176, PROT_READ, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) = 0x7fc85af8b000 >mmap(0x7fc85af8e000, 32768, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0x3000) = 0x7fc85af8e000 >mmap(0x7fc85af96000, 16384, PROT_READ, MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0xb000) = 0x7fc85af96000 >mmap(0x7fc85af9a000, 8192, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0xe000) = 0x7fc85af9a000 >close(3) = 0 >openat(AT_FDCWD, "/usr/lib64/libcrypto.so.1.1", O_RDONLY|O_CLOEXEC) = 3 >read(3, "\177ELF\2\1\1\0\0\0\0\0\0\0\0\0\3\0>\0\1\0\0\0\0P\7\0\0\0\0\0"..., 832) = 832 >newfstatat(3, "", {st_mode=S_IFREG|0755, st_size=2852744, ...}, AT_EMPTY_PATH) = 0 >mmap(NULL, 2872336, PROT_READ, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) = 0x7fc85accd000 >mmap(0x7fc85ad41000, 1617920, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0x74000) = 0x7fc85ad41000 >mmap(0x7fc85aecc000, 577536, PROT_READ, MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0x1ff000) = 0x7fc85aecc000 >mmap(0x7fc85af59000, 184320, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0x28b000) = 0x7fc85af59000 >mmap(0x7fc85af86000, 17424, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x7fc85af86000 >close(3) = 0 >openat(AT_FDCWD, "/lib64/libz.so.1", O_RDONLY|O_CLOEXEC) = 3 >read(3, "\177ELF\2\1\1\0\0\0\0\0\0\0\0\0\3\0>\0\1\0\0\0@3\0\0\0\0\0\0"..., 832) = 832 >newfstatat(3, "", {st_mode=S_IFREG|0755, st_size=100696, ...}, AT_EMPTY_PATH) = 0 >mmap(NULL, 102824, PROT_READ, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) = 0x7fc85acb3000 >mmap(0x7fc85acb6000, 57344, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0x3000) = 0x7fc85acb6000 >mmap(0x7fc85acc4000, 28672, PROT_READ, MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0x11000) = 0x7fc85acc4000 >mmap(0x7fc85accb000, 8192, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0x17000) = 0x7fc85accb000 >close(3) = 0 >openat(AT_FDCWD, "/lib64/libc.so.6", O_RDONLY|O_CLOEXEC) = 3 >read(3, "\177ELF\2\1\1\3\0\0\0\0\0\0\0\0\3\0>\0\1\0\0\0\300\243\2\0\0\0\0\0"..., 832) = 832 >pread64(3, "\6\0\0\0\4\0\0\0@\0\0\0\0\0\0\0@\0\0\0\0\0\0\0@\0\0\0\0\0\0\0"..., 784, 64) = 784 >newfstatat(3, "", {st_mode=S_IFREG|0755, st_size=1889008, ...}, AT_EMPTY_PATH) = 0 >pread64(3, "\6\0\0\0\4\0\0\0@\0\0\0\0\0\0\0@\0\0\0\0\0\0\0@\0\0\0\0\0\0\0"..., 784, 64) = 784 >mmap(NULL, 1920304, PROT_READ, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) = 0x7fc85aade000 >mmap(0x7fc85ab07000, 1355776, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0x29000) = 0x7fc85ab07000 >mmap(0x7fc85ac52000, 339968, PROT_READ, MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0x174000) = 0x7fc85ac52000 >mmap(0x7fc85aca5000, 24576, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0x1c6000) = 0x7fc85aca5000 >mmap(0x7fc85acab000, 32048, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x7fc85acab000 >close(3) = 0 >mmap(NULL, 8192, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) = 0x7fc85aadc000 >mmap(NULL, 12288, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) = 0x7fc85aad9000 >arch_prctl(ARCH_SET_FS, 0x7fc85aad9740) = 0 >set_tid_address(0x7fc85aad9a10) = 22428 >set_robust_list(0x7fc85aad9a20, 24) = 0 >rseq(0x7fc85aada060, 0x20, 0, 0x53053053) = -1 ENOSYS (Function not implemented) >mprotect(0x7fc85aca5000, 16384, PROT_READ) = 0 >mprotect(0x7fc85accb000, 4096, PROT_READ) = 0 >mprotect(0x7fc85af59000, 176128, PROT_READ) = 0 >mprotect(0x7fc85af9a000, 4096, PROT_READ) = 0 >mprotect(0x7fc85afcd000, 4096, PROT_READ) = 0 >mprotect(0x7fc85b12d000, 12288, PROT_READ) = 0 >mprotect(0x7fc85b011000, 8192, PROT_READ) = 0 >prlimit64(0, RLIMIT_STACK, NULL, {rlim_cur=8192*1024, rlim_max=RLIM64_INFINITY}) = 0 >munmap(0x7fc85afd7000, 26392) = 0 >getrandom(0x7fc85acb0478, 8, GRND_NONBLOCK) = -1 ENOSYS (Function not implemented) >brk(NULL) = 0x7fc85c9b7000 >brk(0x7fc85c9d8000) = 0x7fc85c9d8000 >geteuid() = 0 >setgroups(0, NULL) = 0 >openat(AT_FDCWD, "/dev/null", O_RDWR) = 3 >close(3) = 0 >futex(0x7fc85af88c94, FUTEX_WAKE_PRIVATE, 2147483647) = 0 >futex(0x7fc85af88c88, FUTEX_WAKE_PRIVATE, 2147483647) = 0 >futex(0x7fc85af88c80, FUTEX_WAKE_PRIVATE, 2147483647) = 0 >futex(0x7fc85af88d58, FUTEX_WAKE_PRIVATE, 2147483647) = 0 >futex(0x7fc85af88c70, FUTEX_WAKE_PRIVATE, 2147483647) = 0 >futex(0x7fc85af88c68, FUTEX_WAKE_PRIVATE, 2147483647) = 0 >futex(0x7fc85af88c38, FUTEX_WAKE_PRIVATE, 2147483647) = 0 >futex(0x7fc85af860bc, FUTEX_WAKE_PRIVATE, 2147483647) = 0 >futex(0x7fc85af88b44, FUTEX_WAKE_PRIVATE, 2147483647) = 0 >futex(0x7fc85af88adc, FUTEX_WAKE_PRIVATE, 2147483647) = 0 >futex(0x7fc85af88ad0, FUTEX_WAKE_PRIVATE, 2147483647) = 0 >futex(0x7fc85af88c78, FUTEX_WAKE_PRIVATE, 2147483647) = 0 >futex(0x7fc85af88c30, FUTEX_WAKE_PRIVATE, 2147483647) = 0 >openat(AT_FDCWD, "/etc/ssl/openssl.cnf", O_RDONLY) = 3 >newfstatat(3, "", {st_mode=S_IFREG|0644, st_size=10909, ...}, AT_EMPTY_PATH) = 0 >read(3, "#\n# OpenSSL example configuratio"..., 4096) = 4096 >read(3, "# WARNING: ancient versions of N"..., 4096) = 4096 >brk(0x7fc85c9f9000) = 0x7fc85c9f9000 >read(3, "es of the usage of nsCertType. I"..., 4096) = 2717 >read(3, "", 4096) = 0 >close(3) = 0 >futex(0x7fc85af88c60, FUTEX_WAKE_PRIVATE, 2147483647) = 0 >futex(0x7fc85af88dc8, FUTEX_WAKE_PRIVATE, 2147483647) = 0 >getpid() = 22428 >getrandom(0x7fc85c9d6100, 32, 0) = -1 ENOSYS (Function not implemented) >getrandom(0x7fc85c9d6100, 32, 0) = -1 ENOSYS (Function not implemented) >shmget(0x72, 1, 000) = 0 >shmat(0, NULL, SHM_RDONLY) = 0x7fc85b010000 >openat(AT_FDCWD, "/dev/urandom", O_RDONLY) = 3 >newfstatat(3, "", {st_mode=S_IFCHR|0666, st_rdev=makedev(0x1, 0x9), ...}, AT_EMPTY_PATH) = 0 >read(3, "/|\32\303 !B\352\273\2732\266\371\354\323\217j\334P\17H\271\242;\365?\3275\6]\232\235", 32) = 32 >getpid() = 22428 >futex(0x7fc85af88d98, FUTEX_WAKE_PRIVATE, 2147483647) = 0 >getrandom(0x7fffb17b6210, 48, 0) = -1 ENOSYS (Function not implemented) >openat(AT_FDCWD, "/dev/random", O_RDONLY|O_NOCTTY|O_CLOEXEC) = 4 >ppoll([{fd=4, events=POLLIN}], 1, NULL, NULL, 0) = 1 ([{fd=4, revents=POLLIN}]) >close(4) = 0 >openat(AT_FDCWD, "/dev/urandom", O_RDONLY|O_NOCTTY|O_CLOEXEC) = 4 >read(4, "\1)(\rK$\201\1\200\271\203\237\277\35OT\\\250\31\351\234\321\rVa!iJ2\303Z\307"..., 48) = 48 >close(4) = 0 >close_range(3, 2147483647, 0) = -1 ENOSYS (Function not implemented) >getpid() = 22428 >openat(AT_FDCWD, "/proc/22428/fd", O_RDONLY|O_NONBLOCK|O_CLOEXEC|O_DIRECTORY) = 4 >newfstatat(4, "", {st_mode=S_IFDIR|0500, st_size=0, ...}, AT_EMPTY_PATH) = 0 >getdents64(4, 0x7fc85c9d9b60 /* 7 entries */, 32768) = 168 >close(3) = 0 >getdents64(4, 0x7fc85c9d9b60 /* 0 entries */, 32768) = 0 >close(4) = 0 >getpid() = 22428 >openat(AT_FDCWD, "/etc/ssh/sshd_config", O_RDONLY) = 3 >newfstatat(3, "", {st_mode=S_IFREG|0600, st_size=3503, ...}, AT_EMPTY_PATH) = 0 >newfstatat(3, "", {st_mode=S_IFREG|0600, st_size=3503, ...}, AT_EMPTY_PATH) = 0 >read(3, "#\t$OpenBSD: sshd_config,v 1.104 "..., 4096) = 3503 >read(3, "", 4096) = 0 >close(3) = 0 >getpid() = 22428 >getpid() = 22428 >getpid() = 22428 >getpid() = 22428 >getpid() = 22428 >getpid() = 22428 >getpid() = 22428 >getpid() = 22428 >getpid() = 22428 >getpid() = 22428 >getpid() = 22428 >getpid() = 22428 >getuid() = 0 >getuid() = 0 >getuid() = 0 >openat(AT_FDCWD, "/etc/gai.conf", O_RDONLY|O_CLOEXEC) = 3 >newfstatat(3, "", {st_mode=S_IFREG|0644, st_size=2584, ...}, AT_EMPTY_PATH) = 0 >newfstatat(3, "", {st_mode=S_IFREG|0644, st_size=2584, ...}, AT_EMPTY_PATH) = 0 >read(3, "# Configuration for getaddrinfo("..., 4096) = 2584 >read(3, "", 4096) = 0 >close(3) = 0 >futex(0x7fc85acb12e4, FUTEX_WAKE_PRIVATE, 2147483647) = 0 >socket(AF_NETLINK, SOCK_RAW|SOCK_CLOEXEC, NETLINK_ROUTE) = 3 >bind(3, {sa_family=AF_NETLINK, nl_pid=0, nl_groups=00000000}, 12) = 0 >getsockname(3, {sa_family=AF_NETLINK, nl_pid=22428, nl_groups=00000000}, [12]) = 0 >sendto(3, [{nlmsg_len=20, nlmsg_type=0x16 /* NLMSG_??? */, nlmsg_flags=NLM_F_REQUEST|0x300, nlmsg_seq=1671602172, nlmsg_pid=0}, "\x00\x00\x00\x00"], 20, 0, {sa_family=AF_NETLINK, nl_pid=0, nl_groups=00000000}, 12) = 20 >recvmsg(3, {msg_name={sa_family=AF_NETLINK, nl_pid=0, nl_groups=00000000}, msg_namelen=12, msg_iov=[{iov_base=[[{nlmsg_len=76, nlmsg_type=0x14 /* NLMSG_??? */, nlmsg_flags=NLM_F_MULTI, nlmsg_seq=1671602172, nlmsg_pid=22428}, "\x02\x08\x80\xfe\x01\x00\x00\x00\x08\x00\x01\x00\x7f\x00\x00\x01\x08\x00\x02\x00\x7f\x00\x00\x01\x08\x00\x04\x00\x7f\xff\xff\xff"...], [{nlmsg_len=80, nlmsg_type=0x14 /* NLMSG_??? */, nlmsg_flags=NLM_F_MULTI, nlmsg_seq=1671602172, nlmsg_pid=22428}, "\x02\x18\x00\x00\x02\x00\x00\x00\x08\x00\x01\x00\xb9\x18\xdf\x8a\x08\x00\x02\x00\xb9\x18\xdf\x8a\x08\x00\x04\x00\xb9\x18\xdf\xff"...]], iov_len=4096}], msg_iovlen=1, msg_controllen=0, msg_flags=0}, 0) = 156 >recvmsg(3, {msg_name={sa_family=AF_NETLINK, nl_pid=0, nl_groups=00000000}, msg_namelen=12, msg_iov=[{iov_base=[[{nlmsg_len=64, nlmsg_type=0x14 /* NLMSG_??? */, nlmsg_flags=NLM_F_MULTI, nlmsg_seq=1671602172, nlmsg_pid=22428}, "\x0a\x80\x80\xfe\x01\x00\x00\x00\x14\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x14\x00\x06\x00"...], [{nlmsg_len=64, nlmsg_type=0x14 /* NLMSG_??? */, nlmsg_flags=NLM_F_MULTI, nlmsg_seq=1671602172, nlmsg_pid=22428}, "\x0a\x40\x00\x00\x02\x00\x00\x00\x14\x00\x01\x00\x2a\x02\x27\x70\x00\x11\x00\x00\x5d\x54\x93\x3a\x43\x34\xef\xe9\x14\x00\x06\x00"...], [{nlmsg_len=64, nlmsg_type=0x14 /* NLMSG_??? */, nlmsg_flags=NLM_F_MULTI, nlmsg_seq=1671602172, nlmsg_pid=22428}, "\x0a\x40\x80\xfd\x02\x00\x00\x00\x14\x00\x01\x00\xfe\x80\x00\x00\x00\x00\x00\x00\x64\x18\x8d\x5d\xc6\xa5\x5a\x3b\x14\x00\x06\x00"...], [{nlmsg_len=64, nlmsg_type=0x14 /* NLMSG_??? */, nlmsg_flags=NLM_F_MULTI, nlmsg_seq=1671602172, nlmsg_pid=22428}, "\x0a\x40\x80\xfd\x02\x00\x00\x00\x14\x00\x01\x00\xfe\x80\x00\x00\x00\x00\x00\x00\x02\x1a\x4a\xff\xfe\xee\x11\x6e\x14\x00\x06\x00"...]], iov_len=4096}], msg_iovlen=1, msg_controllen=0, msg_flags=0}, 0) = 256 >recvmsg(3, {msg_name={sa_family=AF_NETLINK, nl_pid=0, nl_groups=00000000}, msg_namelen=12, msg_iov=[{iov_base=[{nlmsg_len=20, nlmsg_type=NLMSG_DONE, nlmsg_flags=NLM_F_MULTI, nlmsg_seq=1671602172, nlmsg_pid=22428}, 0], iov_len=4096}], msg_iovlen=1, msg_controllen=0, msg_flags=0}, 0) = 20 >close(3) = 0 >socket(AF_INET6, SOCK_DGRAM|SOCK_CLOEXEC, IPPROTO_IP) = 3 >connect(3, {sa_family=AF_INET6, sin6_port=htons(2022), sin6_flowinfo=htonl(0), inet_pton(AF_INET6, "::", &sin6_addr), sin6_scope_id=0}, 28) = 0 >getsockname(3, {sa_family=AF_INET6, sin6_port=htons(39177), sin6_flowinfo=htonl(0), inet_pton(AF_INET6, "::1", &sin6_addr), sin6_scope_id=0}, [28]) = 0 >connect(3, {sa_family=AF_UNSPEC, sa_data="\0\0\0\0\0\0\0\0\0\0\0\0\0\0"}, 16) = 0 >connect(3, {sa_family=AF_INET, sin_port=htons(2022), sin_addr=inet_addr("0.0.0.0")}, 16) = 0 >getsockname(3, {sa_family=AF_INET6, sin6_port=htons(54346), sin6_flowinfo=htonl(0), inet_pton(AF_INET6, "::ffff:127.0.0.1", &sin6_addr), sin6_scope_id=0}, [28]) = 0 >close(3) = 0 >getpid() = 22428 >getuid() = 0 >newfstatat(AT_FDCWD, "/etc/nsswitch.conf", {st_mode=S_IFREG|0644, st_size=2091, ...}, 0) = 0 >newfstatat(AT_FDCWD, "/", {st_mode=S_IFDIR|0755, st_size=4096, ...}, 0) = 0 >openat(AT_FDCWD, "/etc/nsswitch.conf", O_RDONLY|O_CLOEXEC) = 3 >newfstatat(3, "", {st_mode=S_IFREG|0644, st_size=2091, ...}, AT_EMPTY_PATH) = 0 >read(3, "#\n# /etc/nsswitch.conf\n#\n# An ex"..., 4096) = 2091 >read(3, "", 4096) = 0 >newfstatat(3, "", {st_mode=S_IFREG|0644, st_size=2091, ...}, AT_EMPTY_PATH) = 0 >close(3) = 0 >openat(AT_FDCWD, "/etc/passwd", O_RDONLY|O_CLOEXEC) = 3 >newfstatat(3, "", {st_mode=S_IFREG|0644, st_size=1476, ...}, AT_EMPTY_PATH) = 0 >lseek(3, 0, SEEK_SET) = 0 >read(3, "root:x:0:0:root:/root:/bin/bash\n"..., 4096) = 1476 >close(3) = 0 >openat(AT_FDCWD, "/etc/ssh/ssh_host_rsa_key", O_RDONLY) = 3 >newfstatat(3, "", {st_mode=S_IFREG|0600, st_size=1679, ...}, AT_EMPTY_PATH) = 0 >getuid() = 0 >newfstatat(3, "", {st_mode=S_IFREG|0600, st_size=1679, ...}, AT_EMPTY_PATH) = 0 >read(3, "-----BEGIN RSA PRIVATE KEY-----\n"..., 4096) = 1679 >read(3, "", 2417) = 0 >read(3, "", 4096) = 0 >getpid() = 22428 >getpid() = 22428 >getpid() = 22428 >getpid() = 22428 >close(3) = 0 >getrandom(0x7fc85c9de5d0, 16384, 0) = -1 ENOSYS (Function not implemented) >openat(AT_FDCWD, "/dev/urandom", O_RDONLY|O_NOCTTY|O_CLOEXEC) = 3 >read(3, " \20?\215P\374\5\245\211M3$\310l\344F4O 4\212\20\246\254\321\215\222\220`f}["..., 16384) = 16384 >close(3) = 0 >openat(AT_FDCWD, "/etc/ssh/ssh_host_rsa_key", O_RDONLY) = 3 >newfstatat(3, "", {st_mode=S_IFREG|0600, st_size=1679, ...}, AT_EMPTY_PATH) = 0 >read(3, "-----BEGIN RSA PRIVATE KEY-----\n"..., 4096) = 1679 >close(3) = 0 >openat(AT_FDCWD, "/etc/ssh/ssh_host_rsa_key.pub", O_RDONLY) = 3 >newfstatat(3, "", {st_mode=S_IFREG|0644, st_size=416, ...}, AT_EMPTY_PATH) = 0 >read(3, "ssh-rsa AAAAB3NzaC1yc2EAAAADAQAB"..., 4096) = 416 >close(3) = 0 >getpid() = 22428 >getpid() = 22428 >getpid() = 22428 >getpid() = 22428 >getrandom(0x7fc85c9de5d0, 16384, 0) = -1 ENOSYS (Function not implemented) >openat(AT_FDCWD, "/dev/urandom", O_RDONLY|O_NOCTTY|O_CLOEXEC) = 3 >read(3, "o\217\267A=\f\270\361H\301\")\25\267\255\375\260h\206\31V\201\220\376M~\373\364L\254\10a"..., 16384) = 16384 >close(3) = 0 >getpid() = 22428 >openat(AT_FDCWD, "/etc/ssh/ssh_host_ecdsa_key", O_RDONLY) = 3 >newfstatat(3, "", {st_mode=S_IFREG|0600, st_size=227, ...}, AT_EMPTY_PATH) = 0 >getuid() = 0 >newfstatat(3, "", {st_mode=S_IFREG|0600, st_size=227, ...}, AT_EMPTY_PATH) = 0 >read(3, "-----BEGIN EC PRIVATE KEY-----\nM"..., 4096) = 227 >read(3, "", 3869) = 0 >read(3, "", 4096) = 0 >close(3) = 0 >getrandom(0x7fc85c9e3eb0, 16384, 0) = -1 ENOSYS (Function not implemented) >openat(AT_FDCWD, "/dev/urandom", O_RDONLY|O_NOCTTY|O_CLOEXEC) = 3 >read(3, "8\302\2663\372\314Q\264\365G\350\253CE\242N\337%\0213\7&\26\35\341\301G\374\361\31WG"..., 16384) = 16384 >close(3) = 0 >openat(AT_FDCWD, "/etc/ssh/ssh_host_ecdsa_key", O_RDONLY) = 3 >newfstatat(3, "", {st_mode=S_IFREG|0600, st_size=227, ...}, AT_EMPTY_PATH) = 0 >read(3, "-----BEGIN EC PRIVATE KEY-----\nM"..., 4096) = 227 >close(3) = 0 >openat(AT_FDCWD, "/etc/ssh/ssh_host_ecdsa_key.pub", O_RDONLY) = 3 >newfstatat(3, "", {st_mode=S_IFREG|0644, st_size=196, ...}, AT_EMPTY_PATH) = 0 >read(3, "ecdsa-sha2-nistp256 AAAAE2VjZHNh"..., 4096) = 196 >close(3) = 0 >getrandom(0x7fc85c9e3eb0, 16384, 0) = -1 ENOSYS (Function not implemented) >openat(AT_FDCWD, "/dev/urandom", O_RDONLY|O_NOCTTY|O_CLOEXEC) = 3 >read(3, "\266\25>\253Fsn\5\211\245v\264\235-\313kK\303\10J\3179o\236$;\217\36\202^\214\274"..., 16384) = 16384 >close(3) = 0 >getpid() = 22428 >openat(AT_FDCWD, "/etc/ssh/ssh_host_ed25519_key", O_RDONLY) = 3 >newfstatat(3, "", {st_mode=S_IFREG|0600, st_size=399, ...}, AT_EMPTY_PATH) = 0 >getuid() = 0 >newfstatat(3, "", {st_mode=S_IFREG|0600, st_size=399, ...}, AT_EMPTY_PATH) = 0 >read(3, "-----BEGIN OPENSSH PRIVATE KEY--"..., 4096) = 399 >read(3, "", 3697) = 0 >read(3, "", 4096) = 0 >close(3) = 0 >getrandom(0x7fc85c9e94d0, 16384, 0) = -1 ENOSYS (Function not implemented) >openat(AT_FDCWD, "/dev/urandom", O_RDONLY|O_NOCTTY|O_CLOEXEC) = 3 >read(3, "\357\315^\360\"\306\354%`J\267d79dQ\256i\322\331\225-v\343\323\311m\360\20z\374\33"..., 16384) = 16384 >close(3) = 0 >openat(AT_FDCWD, "/etc/ssh/ssh_host_ed25519_key", O_RDONLY) = 3 >newfstatat(3, "", {st_mode=S_IFREG|0600, st_size=399, ...}, AT_EMPTY_PATH) = 0 >read(3, "-----BEGIN OPENSSH PRIVATE KEY--"..., 4096) = 399 >close(3) = 0 >openat(AT_FDCWD, "/etc/ssh/ssh_host_ed25519_key.pub", O_RDONLY) = 3 >newfstatat(3, "", {st_mode=S_IFREG|0644, st_size=93, ...}, AT_EMPTY_PATH) = 0 >read(3, "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5"..., 4096) = 93 >close(3) = 0 >getrandom(0x7fc85c9e94d0, 16384, 0) = -1 ENOSYS (Function not implemented) >openat(AT_FDCWD, "/dev/urandom", O_RDONLY|O_NOCTTY|O_CLOEXEC) = 3 >read(3, "\221\3557\347\373\202\223\271\365\237\365\20Mu\373\213\203+\300\224\303\10r\310\352\211\224\245Di\27\35"..., 16384) = 16384 >close(3) = 0 >getpid() = 22428 >newfstatat(AT_FDCWD, "/var/empty", {st_mode=S_IFDIR|0755, st_size=4096, ...}, 0) = 0 >setgroups(0, NULL) = 0 >getpid() = 22428 >getpid() = 22428 >getpid() = 22428 >getpid() = 22428 >umask(077) = 022 >umask(022) = 077 >openat(AT_FDCWD, "/dev/tty", O_RDONLY|O_NOCTTY) = 3 >close(3) = 0 >chdir("/") = 0 >rt_sigaction(SIGPIPE, {sa_handler=SIG_IGN, sa_mask=~[RTMIN RT_1], sa_flags=SA_RESTORER|SA_RESTART, sa_restorer=0x7fc85ab1c660}, {sa_handler=SIG_DFL, sa_mask=[], sa_flags=0}, 8) = 0 >getpid() = 22428 >openat(AT_FDCWD, "/proc/self/oom_score_adj", O_RDWR) = 3 >newfstatat(3, "", {st_mode=S_IFREG|0644, st_size=0, ...}, AT_EMPTY_PATH) = 0 >read(3, "0\n", 1024) = 2 >lseek(3, 0, SEEK_SET) = 0 >getpid() = 22428 >write(3, "-1000\n", 6) = 6 >close(3) = 0 >socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) = 3 >fcntl(3, F_GETFL) = 0x2 (flags O_RDWR) >getpid() = 22428 >fcntl(3, F_SETFL, O_RDWR|O_NONBLOCK) = 0 >fcntl(3, F_SETFD, FD_CLOEXEC) = 0 >setsockopt(3, SOL_SOCKET, SO_REUSEADDR, [1], 4) = 0 >getpid() = 22428 >bind(3, {sa_family=AF_INET, sin_port=htons(2022), sin_addr=inet_addr("0.0.0.0")}, 16) = 0 >listen(3, 128) = 0 >getpid() = 22428 >write(2, "Server listening on 0.0.0.0 port"..., 40Server listening on 0.0.0.0 port 2022. >) = 40 >socket(AF_INET6, SOCK_STREAM, IPPROTO_TCP) = 4 >fcntl(4, F_GETFL) = 0x2 (flags O_RDWR) >getpid() = 22428 >fcntl(4, F_SETFL, O_RDWR|O_NONBLOCK) = 0 >fcntl(4, F_SETFD, FD_CLOEXEC) = 0 >setsockopt(4, SOL_SOCKET, SO_REUSEADDR, [1], 4) = 0 >getpid() = 22428 >setsockopt(4, SOL_IPV6, IPV6_V6ONLY, [1], 4) = 0 >getpid() = 22428 >bind(4, {sa_family=AF_INET6, sin6_port=htons(2022), sin6_flowinfo=htonl(0), inet_pton(AF_INET6, "::", &sin6_addr), sin6_scope_id=0}, 28) = 0 >listen(4, 128) = 0 >getpid() = 22428 >write(2, "Server listening on :: port 2022"..., 35Server listening on :: port 2022. >) = 35 >rt_sigaction(SIGHUP, {sa_handler=0x7fc85b024a60, sa_mask=~[RTMIN RT_1], sa_flags=SA_RESTORER|SA_RESTART, sa_restorer=0x7fc85ab1c660}, {sa_handler=SIG_DFL, sa_mask=[], sa_flags=0}, 8) = 0 >rt_sigaction(SIGCHLD, {sa_handler=0x7fc85b024fd0, sa_mask=~[RTMIN RT_1], sa_flags=SA_RESTORER|SA_RESTART, sa_restorer=0x7fc85ab1c660}, {sa_handler=SIG_DFL, sa_mask=[], sa_flags=0}, 8) = 0 >rt_sigaction(SIGTERM, {sa_handler=0x7fc85b024af0, sa_mask=~[RTMIN RT_1], sa_flags=SA_RESTORER|SA_RESTART, sa_restorer=0x7fc85ab1c660}, {sa_handler=SIG_DFL, sa_mask=[], sa_flags=0}, 8) = 0 >rt_sigaction(SIGQUIT, {sa_handler=0x7fc85b024af0, sa_mask=~[RTMIN RT_1], sa_flags=SA_RESTORER|SA_RESTART, sa_restorer=0x7fc85ab1c660}, {sa_handler=SIG_DFL, sa_mask=[], sa_flags=0}, 8) = 0 >openat(AT_FDCWD, "/run/sshd.pid", O_WRONLY|O_CREAT|O_TRUNC, 0666) = 5 >getpid() = 22428 >newfstatat(5, "", {st_mode=S_IFREG|0644, st_size=0, ...}, AT_EMPTY_PATH) = 0 >write(5, "22428\n", 6) = 6 >close(5) = 0 >rt_sigprocmask(SIG_BLOCK, [HUP QUIT TERM CHLD], [], 8) = 0 >ppoll([{fd=3, events=POLLIN}, {fd=4, events=POLLIN}], 2, NULL, [], 8) = 1 ([{fd=4, revents=POLLIN}]) >rt_sigprocmask(SIG_SETMASK, [], NULL, 8) = 0 >accept(4, {sa_family=AF_INET6, sin6_port=htons(50797), sin6_flowinfo=htonl(0), inet_pton(AF_INET6, "::1", &sin6_addr), sin6_scope_id=0}, [128 => 28]) = 5 >fcntl(5, F_GETFL) = 0x2 (flags O_RDWR) >getpid() = 22428 >pipe2([6, 7], 0) = 0 >clock_gettime(CLOCK_BOOTTIME, {tv_sec=12084624, tv_nsec=691015404}) = 0 >socketpair(AF_UNIX, SOCK_STREAM, 0, [8, 9]) = 0 >clone(child_stack=NULL, flags=CLONE_CHILD_CLEARTID|CLONE_CHILD_SETTID|SIGCHLD, child_tidptr=0x7fc85aad9a10) = 22438 >getpid() = 22428 >close(7) = 0 >close(9) = 0 >getpid() = 22428 >getpid() = 22428 >write(8, "\0\0\r\271\0", 5) = 5 >write(8, "\0\0\r\260#\t$OpenBSD: sshd_config,v 1."..., 3512) = 3512 >getpid() = 22428 >close(8) = 0 >close(5) = 0 >getrandom(0x7fffb17b6560, 256, 0) = -1 ENOSYS (Function not implemented) >openat(AT_FDCWD, "/dev/urandom", O_RDONLY|O_NOCTTY|O_CLOEXEC) = 5 >read(5, "\212\265f<6\274O\21\227\260\206\262\275L_Z\315X\204\343B\361\362\0021\374\0\372\224\311-x"..., 256) = 256 >close(5) = 0 >getpid() = 22428 >getpid() = 22428 >getpid() = 22428 >getpid() = 22428 >rt_sigprocmask(SIG_BLOCK, [HUP QUIT TERM CHLD], [], 8) = 0 >ppoll([{fd=3, events=POLLIN}, {fd=4, events=POLLIN}, {fd=6, events=POLLIN}], 3, NULL, [], 8strace: Process 22438 attached > <unfinished ...> >[pid 22438] set_robust_list(0x7fc85aad9a20, 24) = 0 >[pid 22438] getpid() = 22438 >[pid 22438] openat(AT_FDCWD, "/proc/self/oom_score_adj", O_WRONLY|O_CREAT|O_TRUNC, 0666) = 10 >[pid 22438] newfstatat(10, "", {st_mode=S_IFREG|0644, st_size=0, ...}, AT_EMPTY_PATH) = 0 >[pid 22438] getpid() = 22438 >[pid 22438] write(10, "0\n", 2) = 2 >[pid 22438] close(10) = 0 >[pid 22438] close(6) = 0 >[pid 22438] close(3) = 0 >[pid 22438] close(4) = 0 >[pid 22438] close(8) = 0 >[pid 22438] setsid() = 22438 >[pid 22438] getpid() = 22438 >[pid 22438] dup2(5, 0) = 0 >[pid 22438] dup2(0, 1) = 1 >[pid 22438] dup2(7, 4) = 4 >[pid 22438] close(7) = 0 >[pid 22438] dup2(9, 5) = 5 >[pid 22438] close(9) = 0 >[pid 22438] rt_sigaction(SIGHUP, {sa_handler=SIG_IGN, sa_mask=~[RTMIN RT_1], sa_flags=SA_RESTORER|SA_RESTART, sa_restorer=0x7fc85ab1c660}, {sa_handler=0x7fc85b024a60, sa_mask=~[KILL STOP RTMIN RT_1], sa_flags=SA_RESTORER|SA_RESTART, sa_restorer=0x7fc85ab1c660}, 8) = 0 >[pid 22438] execve("/usr/sbin/sshd", ["/usr/sbin/sshd", "-De", "-p", "2022", "-R"], 0x7fc85c9b7370 /* 15 vars */) = 0 >[pid 22438] brk(NULL) = 0x7fa603b40000 >[pid 22438] mmap(NULL, 8192, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) = 0x7fa602c7a000 >[pid 22438] access("/etc/ld.so.preload", R_OK) = -1 ENOENT (No such file or directory) >[pid 22438] openat(AT_FDCWD, "/etc/ld.so.cache", O_RDONLY|O_CLOEXEC) = 3 >[pid 22438] newfstatat(3, "", {st_mode=S_IFREG|0644, st_size=26392, ...}, AT_EMPTY_PATH) = 0 >[pid 22438] mmap(NULL, 26392, PROT_READ, MAP_PRIVATE, 3, 0) = 0x7fa602c73000 >[pid 22438] close(3) = 0 >[pid 22438] openat(AT_FDCWD, "/lib64/libcrypt.so.2", O_RDONLY|O_CLOEXEC) = 3 >[pid 22438] read(3, "\177ELF\2\1\1\0\0\0\0\0\0\0\0\0\3\0>\0\1\0\0\0@ \0\0\0\0\0\0"..., 832) = 832 >[pid 22438] newfstatat(3, "", {st_mode=S_IFREG|0755, st_size=202544, ...}, AT_EMPTY_PATH) = 0 >[pid 22438] mmap(NULL, 238112, PROT_READ, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) = 0x7fa602c38000 >[pid 22438] mmap(0x7fa602c3a000, 86016, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0x2000) = 0x7fa602c3a000 >[pid 22438] mmap(0x7fa602c4f000, 106496, PROT_READ, MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0x17000) = 0x7fa602c4f000 >[pid 22438] mmap(0x7fa602c69000, 8192, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0x30000) = 0x7fa602c69000 >[pid 22438] mmap(0x7fa602c6b000, 29216, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x7fa602c6b000 >[pid 22438] close(3) = 0 >[pid 22438] openat(AT_FDCWD, "/lib64/libpam.so.0", O_RDONLY|O_CLOEXEC) = 3 >[pid 22438] read(3, "\177ELF\2\1\1\0\0\0\0\0\0\0\0\0\3\0>\0\1\0\0\0\3604\0\0\0\0\0\0"..., 832) = 832 >[pid 22438] newfstatat(3, "", {st_mode=S_IFREG|0755, st_size=64048, ...}, AT_EMPTY_PATH) = 0 >[pid 22438] mmap(NULL, 66176, PROT_READ, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) = 0x7fa602c27000 >[pid 22438] mmap(0x7fa602c2a000, 32768, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0x3000) = 0x7fa602c2a000 >[pid 22438] mmap(0x7fa602c32000, 16384, PROT_READ, MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0xb000) = 0x7fa602c32000 >[pid 22438] mmap(0x7fa602c36000, 8192, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0xe000) = 0x7fa602c36000 >[pid 22438] close(3) = 0 >[pid 22438] openat(AT_FDCWD, "/usr/lib64/libcrypto.so.1.1", O_RDONLY|O_CLOEXEC) = 3 >[pid 22438] read(3, "\177ELF\2\1\1\0\0\0\0\0\0\0\0\0\3\0>\0\1\0\0\0\0P\7\0\0\0\0\0"..., 832) = 832 >[pid 22438] newfstatat(3, "", {st_mode=S_IFREG|0755, st_size=2852744, ...}, AT_EMPTY_PATH) = 0 >[pid 22438] mmap(NULL, 2872336, PROT_READ, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) = 0x7fa602969000 >[pid 22438] mmap(0x7fa6029dd000, 1617920, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0x74000) = 0x7fa6029dd000 >[pid 22438] mmap(0x7fa602b68000, 577536, PROT_READ, MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0x1ff000) = 0x7fa602b68000 >[pid 22438] mmap(0x7fa602bf5000, 184320, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0x28b000) = 0x7fa602bf5000 >[pid 22438] mmap(0x7fa602c22000, 17424, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x7fa602c22000 >[pid 22438] close(3) = 0 >[pid 22438] openat(AT_FDCWD, "/lib64/libz.so.1", O_RDONLY|O_CLOEXEC) = 3 >[pid 22438] read(3, "\177ELF\2\1\1\0\0\0\0\0\0\0\0\0\3\0>\0\1\0\0\0@3\0\0\0\0\0\0"..., 832) = 832 >[pid 22438] newfstatat(3, "", {st_mode=S_IFREG|0755, st_size=100696, ...}, AT_EMPTY_PATH) = 0 >[pid 22438] mmap(NULL, 102824, PROT_READ, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) = 0x7fa60294f000 >[pid 22438] mmap(0x7fa602952000, 57344, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0x3000) = 0x7fa602952000 >[pid 22438] mmap(0x7fa602960000, 28672, PROT_READ, MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0x11000) = 0x7fa602960000 >[pid 22438] mmap(0x7fa602967000, 8192, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0x17000) = 0x7fa602967000 >[pid 22438] close(3) = 0 >[pid 22438] openat(AT_FDCWD, "/lib64/libc.so.6", O_RDONLY|O_CLOEXEC) = 3 >[pid 22438] read(3, "\177ELF\2\1\1\3\0\0\0\0\0\0\0\0\3\0>\0\1\0\0\0\300\243\2\0\0\0\0\0"..., 832) = 832 >[pid 22438] pread64(3, "\6\0\0\0\4\0\0\0@\0\0\0\0\0\0\0@\0\0\0\0\0\0\0@\0\0\0\0\0\0\0"..., 784, 64) = 784 >[pid 22438] newfstatat(3, "", {st_mode=S_IFREG|0755, st_size=1889008, ...}, AT_EMPTY_PATH) = 0 >[pid 22438] pread64(3, "\6\0\0\0\4\0\0\0@\0\0\0\0\0\0\0@\0\0\0\0\0\0\0@\0\0\0\0\0\0\0"..., 784, 64) = 784 >[pid 22438] mmap(NULL, 1920304, PROT_READ, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) = 0x7fa60277a000 >[pid 22438] mmap(0x7fa6027a3000, 1355776, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0x29000) = 0x7fa6027a3000 >[pid 22438] mmap(0x7fa6028ee000, 339968, PROT_READ, MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0x174000) = 0x7fa6028ee000 >[pid 22438] mmap(0x7fa602941000, 24576, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0x1c6000) = 0x7fa602941000 >[pid 22438] mmap(0x7fa602947000, 32048, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x7fa602947000 >[pid 22438] close(3) = 0 >[pid 22438] mmap(NULL, 8192, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) = 0x7fa602778000 >[pid 22438] mmap(NULL, 12288, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) = 0x7fa602775000 >[pid 22438] arch_prctl(ARCH_SET_FS, 0x7fa602775740) = 0 >[pid 22438] set_tid_address(0x7fa602775a10) = 22438 >[pid 22438] set_robust_list(0x7fa602775a20, 24) = 0 >[pid 22438] rseq(0x7fa602776060, 0x20, 0, 0x53053053) = -1 ENOSYS (Function not implemented) >[pid 22438] mprotect(0x7fa602941000, 16384, PROT_READ) = 0 >[pid 22438] mprotect(0x7fa602967000, 4096, PROT_READ) = 0 >[pid 22438] mprotect(0x7fa602bf5000, 176128, PROT_READ) = 0 >[pid 22438] mprotect(0x7fa602c36000, 4096, PROT_READ) = 0 >[pid 22438] mprotect(0x7fa602c69000, 4096, PROT_READ) = 0 >[pid 22438] mprotect(0x7fa602dc9000, 12288, PROT_READ) = 0 >[pid 22438] mprotect(0x7fa602cad000, 8192, PROT_READ) = 0 >[pid 22438] prlimit64(0, RLIMIT_STACK, NULL, {rlim_cur=8192*1024, rlim_max=RLIM64_INFINITY}) = 0 >[pid 22438] munmap(0x7fa602c73000, 26392) = 0 >[pid 22438] getrandom(0x7fa60294c478, 8, GRND_NONBLOCK) = -1 ENOSYS (Function not implemented) >[pid 22438] brk(NULL) = 0x7fa603b40000 >[pid 22438] brk(0x7fa603b61000) = 0x7fa603b61000 >[pid 22438] geteuid() = 0 >[pid 22438] setgroups(0, NULL) = 0 >[pid 22438] openat(AT_FDCWD, "/dev/null", O_RDWR) = 3 >[pid 22438] close(3) = 0 >[pid 22438] futex(0x7fa602c24c94, FUTEX_WAKE_PRIVATE, 2147483647) = 0 >[pid 22438] futex(0x7fa602c24c88, FUTEX_WAKE_PRIVATE, 2147483647) = 0 >[pid 22438] futex(0x7fa602c24c80, FUTEX_WAKE_PRIVATE, 2147483647) = 0 >[pid 22438] futex(0x7fa602c24d58, FUTEX_WAKE_PRIVATE, 2147483647) = 0 >[pid 22438] futex(0x7fa602c24c70, FUTEX_WAKE_PRIVATE, 2147483647) = 0 >[pid 22438] futex(0x7fa602c24c68, FUTEX_WAKE_PRIVATE, 2147483647) = 0 >[pid 22438] futex(0x7fa602c24c38, FUTEX_WAKE_PRIVATE, 2147483647) = 0 >[pid 22438] futex(0x7fa602c220bc, FUTEX_WAKE_PRIVATE, 2147483647) = 0 >[pid 22438] futex(0x7fa602c24b44, FUTEX_WAKE_PRIVATE, 2147483647) = 0 >[pid 22438] futex(0x7fa602c24adc, FUTEX_WAKE_PRIVATE, 2147483647) = 0 >[pid 22438] futex(0x7fa602c24ad0, FUTEX_WAKE_PRIVATE, 2147483647) = 0 >[pid 22438] futex(0x7fa602c24c78, FUTEX_WAKE_PRIVATE, 2147483647) = 0 >[pid 22438] futex(0x7fa602c24c30, FUTEX_WAKE_PRIVATE, 2147483647) = 0 >[pid 22438] openat(AT_FDCWD, "/etc/ssl/openssl.cnf", O_RDONLY) = 3 >[pid 22438] newfstatat(3, "", {st_mode=S_IFREG|0644, st_size=10909, ...}, AT_EMPTY_PATH) = 0 >[pid 22438] read(3, "#\n# OpenSSL example configuratio"..., 4096) = 4096 >[pid 22438] read(3, "# WARNING: ancient versions of N"..., 4096) = 4096 >[pid 22438] brk(0x7fa603b82000) = 0x7fa603b82000 >[pid 22438] read(3, "es of the usage of nsCertType. I"..., 4096) = 2717 >[pid 22438] read(3, "", 4096) = 0 >[pid 22438] close(3) = 0 >[pid 22438] futex(0x7fa602c24c60, FUTEX_WAKE_PRIVATE, 2147483647) = 0 >[pid 22438] futex(0x7fa602c24dc8, FUTEX_WAKE_PRIVATE, 2147483647) = 0 >[pid 22438] getpid() = 22438 >[pid 22438] getrandom(0x7fa603b5f130, 32, 0) = -1 ENOSYS (Function not implemented) >[pid 22438] getrandom(0x7fa603b5f130, 32, 0) = -1 ENOSYS (Function not implemented) >[pid 22438] shmget(0x72, 1, 000) = 0 >[pid 22438] shmat(0, NULL, SHM_RDONLY) = 0x7fa602cac000 >[pid 22438] openat(AT_FDCWD, "/dev/urandom", O_RDONLY) = 3 >[pid 22438] newfstatat(3, "", {st_mode=S_IFCHR|0666, st_rdev=makedev(0x1, 0x9), ...}, AT_EMPTY_PATH) = 0 >[pid 22438] read(3, "\36*i\30z|h\274`\321\206KK\321\5?Z\267d\373\313\350Ex\366Pn@\357j\210\"", 32) = 32 >[pid 22438] getpid() = 22438 >[pid 22438] futex(0x7fa602c24d98, FUTEX_WAKE_PRIVATE, 2147483647) = 0 >[pid 22438] getrandom(0x7fffc6ae96c0, 48, 0) = -1 ENOSYS (Function not implemented) >[pid 22438] openat(AT_FDCWD, "/dev/random", O_RDONLY|O_NOCTTY|O_CLOEXEC) = 6 >[pid 22438] ppoll([{fd=6, events=POLLIN}], 1, NULL, NULL, 0) = 1 ([{fd=6, revents=POLLIN}]) >[pid 22438] close(6) = 0 >[pid 22438] openat(AT_FDCWD, "/dev/urandom", O_RDONLY|O_NOCTTY|O_CLOEXEC) = 6 >[pid 22438] read(6, "\266031\362\10\224e?\226;@5\265\321\0.%\214\16\22]\325\305\342\231R\356\222J\343\315"..., 48) = 48 >[pid 22438] close(6) = 0 >[pid 22438] close_range(6, 2147483647, 0) = -1 ENOSYS (Function not implemented) >[pid 22438] getpid() = 22438 >[pid 22438] openat(AT_FDCWD, "/proc/22438/fd", O_RDONLY|O_NONBLOCK|O_CLOEXEC|O_DIRECTORY) = 6 >[pid 22438] newfstatat(6, "", {st_mode=S_IFDIR|0500, st_size=0, ...}, AT_EMPTY_PATH) = 0 >[pid 22438] getdents64(6, 0x7fa603b62b90 /* 9 entries */, 32768) = 216 >[pid 22438] getdents64(6, 0x7fa603b62b90 /* 0 entries */, 32768) = 0 >[pid 22438] close(6) = 0 >[pid 22438] getpid() = 22438 >[pid 22438] getpid() = 22438 >[pid 22438] read(5, "\0\0\r\271", 4) = 4 >[pid 22438] read(5, "\0\0\0\r\260#\t$OpenBSD: sshd_config,v 1"..., 3513) = 3513 >[pid 22438] getpid() = 22438 >[pid 22438] dup(4) = 6 >[pid 22438] close(4) = 0 >[pid 22438] write(6, "\0", 1) = 1 >[pid 22428] <... ppoll resumed>) = 1 ([{fd=6, revents=POLLIN}]) >[pid 22438] getpid( <unfinished ...> >[pid 22428] rt_sigprocmask(SIG_SETMASK, [], <unfinished ...> >[pid 22438] <... getpid resumed>) = 22438 >[pid 22428] <... rt_sigprocmask resumed>NULL, 8) = 0 >[pid 22438] getpid( <unfinished ...> >[pid 22428] read(6, <unfinished ...> >[pid 22438] <... getpid resumed>) = 22438 >[pid 22428] <... read resumed>"\0", 1) = 1 >[pid 22438] getpid( <unfinished ...> >[pid 22428] rt_sigprocmask(SIG_BLOCK, [HUP QUIT TERM CHLD], <unfinished ...> >[pid 22438] <... getpid resumed>) = 22438 >[pid 22428] <... rt_sigprocmask resumed>[], 8) = 0 >[pid 22438] getpid( <unfinished ...> >[pid 22428] ppoll([{fd=3, events=POLLIN}, {fd=4, events=POLLIN}, {fd=6, events=POLLIN}], 3, NULL, [], 8 <unfinished ...> >[pid 22438] <... getpid resumed>) = 22438 >[pid 22438] getpid() = 22438 >[pid 22438] getpid() = 22438 >[pid 22438] getpid() = 22438 >[pid 22438] getpid() = 22438 >[pid 22438] getpid() = 22438 >[pid 22438] getpid() = 22438 >[pid 22438] getpid() = 22438 >[pid 22438] getuid() = 0 >[pid 22438] getuid() = 0 >[pid 22438] getuid() = 0 >[pid 22438] openat(AT_FDCWD, "/etc/gai.conf", O_RDONLY|O_CLOEXEC) = 4 >[pid 22438] newfstatat(4, "", {st_mode=S_IFREG|0644, st_size=2584, ...}, AT_EMPTY_PATH) = 0 >[pid 22438] newfstatat(4, "", {st_mode=S_IFREG|0644, st_size=2584, ...}, AT_EMPTY_PATH) = 0 >[pid 22438] read(4, "# Configuration for getaddrinfo("..., 4096) = 2584 >[pid 22438] read(4, "", 4096) = 0 >[pid 22438] close(4) = 0 >[pid 22438] futex(0x7fa60294d2e4, FUTEX_WAKE_PRIVATE, 2147483647) = 0 >[pid 22438] socket(AF_NETLINK, SOCK_RAW|SOCK_CLOEXEC, NETLINK_ROUTE) = 4 >[pid 22438] bind(4, {sa_family=AF_NETLINK, nl_pid=0, nl_groups=00000000}, 12) = 0 >[pid 22438] getsockname(4, {sa_family=AF_NETLINK, nl_pid=22438, nl_groups=00000000}, [12]) = 0 >[pid 22438] sendto(4, [{nlmsg_len=20, nlmsg_type=0x16 /* NLMSG_??? */, nlmsg_flags=NLM_F_REQUEST|0x300, nlmsg_seq=1671602175, nlmsg_pid=0}, "\x00\x00\x00\x00"], 20, 0, {sa_family=AF_NETLINK, nl_pid=0, nl_groups=00000000}, 12) = 20 >[pid 22438] recvmsg(4, {msg_name={sa_family=AF_NETLINK, nl_pid=0, nl_groups=00000000}, msg_namelen=12, msg_iov=[{iov_base=[[{nlmsg_len=76, nlmsg_type=0x14 /* NLMSG_??? */, nlmsg_flags=NLM_F_MULTI, nlmsg_seq=1671602175, nlmsg_pid=22438}, "\x02\x08\x80\xfe\x01\x00\x00\x00\x08\x00\x01\x00\x7f\x00\x00\x01\x08\x00\x02\x00\x7f\x00\x00\x01\x08\x00\x04\x00\x7f\xff\xff\xff"...], [{nlmsg_len=80, nlmsg_type=0x14 /* NLMSG_??? */, nlmsg_flags=NLM_F_MULTI, nlmsg_seq=1671602175, nlmsg_pid=22438}, "\x02\x18\x00\x00\x02\x00\x00\x00\x08\x00\x01\x00\xb9\x18\xdf\x8a\x08\x00\x02\x00\xb9\x18\xdf\x8a\x08\x00\x04\x00\xb9\x18\xdf\xff"...]], iov_len=4096}], msg_iovlen=1, msg_controllen=0, msg_flags=0}, 0) = 156 >[pid 22438] recvmsg(4, {msg_name={sa_family=AF_NETLINK, nl_pid=0, nl_groups=00000000}, msg_namelen=12, msg_iov=[{iov_base=[[{nlmsg_len=64, nlmsg_type=0x14 /* NLMSG_??? */, nlmsg_flags=NLM_F_MULTI, nlmsg_seq=1671602175, nlmsg_pid=22438}, "\x0a\x80\x80\xfe\x01\x00\x00\x00\x14\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x14\x00\x06\x00"...], [{nlmsg_len=64, nlmsg_type=0x14 /* NLMSG_??? */, nlmsg_flags=NLM_F_MULTI, nlmsg_seq=1671602175, nlmsg_pid=22438}, "\x0a\x40\x00\x00\x02\x00\x00\x00\x14\x00\x01\x00\x2a\x02\x27\x70\x00\x11\x00\x00\x5d\x54\x93\x3a\x43\x34\xef\xe9\x14\x00\x06\x00"...], [{nlmsg_len=64, nlmsg_type=0x14 /* NLMSG_??? */, nlmsg_flags=NLM_F_MULTI, nlmsg_seq=1671602175, nlmsg_pid=22438}, "\x0a\x40\x80\xfd\x02\x00\x00\x00\x14\x00\x01\x00\xfe\x80\x00\x00\x00\x00\x00\x00\x64\x18\x8d\x5d\xc6\xa5\x5a\x3b\x14\x00\x06\x00"...], [{nlmsg_len=64, nlmsg_type=0x14 /* NLMSG_??? */, nlmsg_flags=NLM_F_MULTI, nlmsg_seq=1671602175, nlmsg_pid=22438}, "\x0a\x40\x80\xfd\x02\x00\x00\x00\x14\x00\x01\x00\xfe\x80\x00\x00\x00\x00\x00\x00\x02\x1a\x4a\xff\xfe\xee\x11\x6e\x14\x00\x06\x00"...]], iov_len=4096}], msg_iovlen=1, msg_controllen=0, msg_flags=0}, 0) = 256 >[pid 22438] recvmsg(4, {msg_name={sa_family=AF_NETLINK, nl_pid=0, nl_groups=00000000}, msg_namelen=12, msg_iov=[{iov_base=[{nlmsg_len=20, nlmsg_type=NLMSG_DONE, nlmsg_flags=NLM_F_MULTI, nlmsg_seq=1671602175, nlmsg_pid=22438}, 0], iov_len=4096}], msg_iovlen=1, msg_controllen=0, msg_flags=0}, 0) = 20 >[pid 22438] close(4) = 0 >[pid 22438] socket(AF_INET6, SOCK_DGRAM|SOCK_CLOEXEC, IPPROTO_IP) = 4 >[pid 22438] connect(4, {sa_family=AF_INET6, sin6_port=htons(2022), sin6_flowinfo=htonl(0), inet_pton(AF_INET6, "::", &sin6_addr), sin6_scope_id=0}, 28) = 0 >[pid 22438] getsockname(4, {sa_family=AF_INET6, sin6_port=htons(34929), sin6_flowinfo=htonl(0), inet_pton(AF_INET6, "::1", &sin6_addr), sin6_scope_id=0}, [28]) = 0 >[pid 22438] connect(4, {sa_family=AF_UNSPEC, sa_data="\0\0\0\0\0\0\0\0\0\0\0\0\0\0"}, 16) = 0 >[pid 22438] connect(4, {sa_family=AF_INET, sin_port=htons(2022), sin_addr=inet_addr("0.0.0.0")}, 16) = 0 >[pid 22438] getsockname(4, {sa_family=AF_INET6, sin6_port=htons(33594), sin6_flowinfo=htonl(0), inet_pton(AF_INET6, "::ffff:127.0.0.1", &sin6_addr), sin6_scope_id=0}, [28]) = 0 >[pid 22438] close(4) = 0 >[pid 22438] getpid() = 22438 >[pid 22438] getuid() = 0 >[pid 22438] newfstatat(AT_FDCWD, "/etc/nsswitch.conf", {st_mode=S_IFREG|0644, st_size=2091, ...}, 0) = 0 >[pid 22438] newfstatat(AT_FDCWD, "/", {st_mode=S_IFDIR|0755, st_size=4096, ...}, 0) = 0 >[pid 22438] openat(AT_FDCWD, "/etc/nsswitch.conf", O_RDONLY|O_CLOEXEC) = 4 >[pid 22438] newfstatat(4, "", {st_mode=S_IFREG|0644, st_size=2091, ...}, AT_EMPTY_PATH) = 0 >[pid 22438] read(4, "#\n# /etc/nsswitch.conf\n#\n# An ex"..., 4096) = 2091 >[pid 22438] read(4, "", 4096) = 0 >[pid 22438] newfstatat(4, "", {st_mode=S_IFREG|0644, st_size=2091, ...}, AT_EMPTY_PATH) = 0 >[pid 22438] close(4) = 0 >[pid 22438] openat(AT_FDCWD, "/etc/passwd", O_RDONLY|O_CLOEXEC) = 4 >[pid 22438] newfstatat(4, "", {st_mode=S_IFREG|0644, st_size=1476, ...}, AT_EMPTY_PATH) = 0 >[pid 22438] lseek(4, 0, SEEK_SET) = 0 >[pid 22438] read(4, "root:x:0:0:root:/root:/bin/bash\n"..., 4096) = 1476 >[pid 22438] close(4) = 0 >[pid 22438] openat(AT_FDCWD, "/etc/ssh/ssh_host_rsa_key", O_RDONLY) = 4 >[pid 22438] newfstatat(4, "", {st_mode=S_IFREG|0600, st_size=1679, ...}, AT_EMPTY_PATH) = 0 >[pid 22438] getuid() = 0 >[pid 22438] newfstatat(4, "", {st_mode=S_IFREG|0600, st_size=1679, ...}, AT_EMPTY_PATH) = 0 >[pid 22438] read(4, "-----BEGIN RSA PRIVATE KEY-----\n"..., 4096) = 1679 >[pid 22438] read(4, "", 2417) = 0 >[pid 22438] read(4, "", 4096) = 0 >[pid 22438] getpid() = 22438 >[pid 22438] getpid() = 22438 >[pid 22438] getpid() = 22438 >[pid 22438] getpid() = 22438 >[pid 22438] close(4) = 0 >[pid 22438] getrandom(0x7fa603b67210, 16384, 0) = -1 ENOSYS (Function not implemented) >[pid 22438] openat(AT_FDCWD, "/dev/urandom", O_RDONLY|O_NOCTTY|O_CLOEXEC) = 4 >[pid 22438] read(4, "\5\360X|=_2n=\331\16w\304\25\317rS\362&\236\240m+%\317\261\5HG\377%\276"..., 16384) = 16384 >[pid 22438] close(4) = 0 >[pid 22438] openat(AT_FDCWD, "/etc/ssh/ssh_host_rsa_key", O_RDONLY) = 4 >[pid 22438] newfstatat(4, "", {st_mode=S_IFREG|0600, st_size=1679, ...}, AT_EMPTY_PATH) = 0 >[pid 22438] read(4, "-----BEGIN RSA PRIVATE KEY-----\n"..., 4096) = 1679 >[pid 22438] close(4) = 0 >[pid 22438] openat(AT_FDCWD, "/etc/ssh/ssh_host_rsa_key.pub", O_RDONLY) = 4 >[pid 22438] newfstatat(4, "", {st_mode=S_IFREG|0644, st_size=416, ...}, AT_EMPTY_PATH) = 0 >[pid 22438] read(4, "ssh-rsa AAAAB3NzaC1yc2EAAAADAQAB"..., 4096) = 416 >[pid 22438] close(4) = 0 >[pid 22438] getpid() = 22438 >[pid 22438] getpid() = 22438 >[pid 22438] getrandom(0x7fa603b67210, 16384, 0) = -1 ENOSYS (Function not implemented) >[pid 22438] openat(AT_FDCWD, "/dev/urandom", O_RDONLY|O_NOCTTY|O_CLOEXEC) = 4 >[pid 22438] read(4, "\350\363\267I;w\247\261?\301gzA\n|D\207\373D\16\232C8;M\244u\346\331\246Mz"..., 16384) = 16384 >[pid 22438] close(4) = 0 >[pid 22438] getpid() = 22438 >[pid 22438] openat(AT_FDCWD, "/etc/ssh/ssh_host_ecdsa_key", O_RDONLY) = 4 >[pid 22438] newfstatat(4, "", {st_mode=S_IFREG|0600, st_size=227, ...}, AT_EMPTY_PATH) = 0 >[pid 22438] getuid() = 0 >[pid 22438] newfstatat(4, "", {st_mode=S_IFREG|0600, st_size=227, ...}, AT_EMPTY_PATH) = 0 >[pid 22438] read(4, "-----BEGIN EC PRIVATE KEY-----\nM"..., 4096) = 227 >[pid 22438] read(4, "", 3869) = 0 >[pid 22438] read(4, "", 4096) = 0 >[pid 22438] close(4) = 0 >[pid 22438] getrandom(0x7fa603b6ccc0, 16384, 0) = -1 ENOSYS (Function not implemented) >[pid 22438] openat(AT_FDCWD, "/dev/urandom", O_RDONLY|O_NOCTTY|O_CLOEXEC) = 4 >[pid 22438] read(4, "W\232z%\273\346\210\210b\310Z\2641\17]~\306\\\311\352\265|\261fR42\337\341>R\357"..., 16384) = 16384 >[pid 22438] close(4) = 0 >[pid 22438] openat(AT_FDCWD, "/etc/ssh/ssh_host_ecdsa_key", O_RDONLY) = 4 >[pid 22438] newfstatat(4, "", {st_mode=S_IFREG|0600, st_size=227, ...}, AT_EMPTY_PATH) = 0 >[pid 22438] read(4, "-----BEGIN EC PRIVATE KEY-----\nM"..., 4096) = 227 >[pid 22438] close(4) = 0 >[pid 22438] openat(AT_FDCWD, "/etc/ssh/ssh_host_ecdsa_key.pub", O_RDONLY) = 4 >[pid 22438] newfstatat(4, "", {st_mode=S_IFREG|0644, st_size=196, ...}, AT_EMPTY_PATH) = 0 >[pid 22438] read(4, "ecdsa-sha2-nistp256 AAAAE2VjZHNh"..., 4096) = 196 >[pid 22438] close(4) = 0 >[pid 22438] getrandom(0x7fa603b6ccc0, 16384, 0) = -1 ENOSYS (Function not implemented) >[pid 22438] openat(AT_FDCWD, "/dev/urandom", O_RDONLY|O_NOCTTY|O_CLOEXEC) = 4 >[pid 22438] read(4, "E\30YV\371\2572\30\277\25#;\n\354\32\357t\371\246(\354\337\305\214*\3408\30\264\272-o"..., 16384) = 16384 >[pid 22438] close(4) = 0 >[pid 22438] getpid() = 22438 >[pid 22438] openat(AT_FDCWD, "/etc/ssh/ssh_host_ed25519_key", O_RDONLY) = 4 >[pid 22438] newfstatat(4, "", {st_mode=S_IFREG|0600, st_size=399, ...}, AT_EMPTY_PATH) = 0 >[pid 22438] getuid() = 0 >[pid 22438] newfstatat(4, "", {st_mode=S_IFREG|0600, st_size=399, ...}, AT_EMPTY_PATH) = 0 >[pid 22438] read(4, "-----BEGIN OPENSSH PRIVATE KEY--"..., 4096) = 399 >[pid 22438] read(4, "", 3697) = 0 >[pid 22438] read(4, "", 4096) = 0 >[pid 22438] close(4) = 0 >[pid 22438] getrandom(0x7fa603b72600, 16384, 0) = -1 ENOSYS (Function not implemented) >[pid 22438] openat(AT_FDCWD, "/dev/urandom", O_RDONLY|O_NOCTTY|O_CLOEXEC) = 4 >[pid 22438] read(4, "\256\27\353\n\260\0315Zm\0Bu\324\377s\371\241e\210lG\310\2009If\360\323\271<R\342"..., 16384) = 16384 >[pid 22438] close(4) = 0 >[pid 22438] openat(AT_FDCWD, "/etc/ssh/ssh_host_ed25519_key", O_RDONLY) = 4 >[pid 22438] newfstatat(4, "", {st_mode=S_IFREG|0600, st_size=399, ...}, AT_EMPTY_PATH) = 0 >[pid 22438] read(4, "-----BEGIN OPENSSH PRIVATE KEY--"..., 4096) = 399 >[pid 22438] close(4) = 0 >[pid 22438] openat(AT_FDCWD, "/etc/ssh/ssh_host_ed25519_key.pub", O_RDONLY) = 4 >[pid 22438] newfstatat(4, "", {st_mode=S_IFREG|0644, st_size=93, ...}, AT_EMPTY_PATH) = 0 >[pid 22438] read(4, "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5"..., 4096) = 93 >[pid 22438] close(4) = 0 >[pid 22438] getrandom(0x7fa603b72600, 16384, 0) = -1 ENOSYS (Function not implemented) >[pid 22438] openat(AT_FDCWD, "/dev/urandom", O_RDONLY|O_NOCTTY|O_CLOEXEC) = 4 >[pid 22438] read(4, "Tj\343d\306\372\33Z\3d\32r\37\2^\347\332\344\243\307\300\236\205\34_xr\205/\37J`"..., 16384) = 16384 >[pid 22438] close(4) = 0 >[pid 22438] getpid() = 22438 >[pid 22438] newfstatat(AT_FDCWD, "/var/empty", {st_mode=S_IFDIR|0755, st_size=4096, ...}, 0) = 0 >[pid 22438] setgroups(0, NULL) = 0 >[pid 22438] umask(077) = 022 >[pid 22438] umask(022) = 077 >[pid 22438] openat(AT_FDCWD, "/dev/tty", O_RDONLY|O_NOCTTY) = -1 ENXIO (No such device or address) >[pid 22438] getppid() = 22428 >[pid 22438] chdir("/") = 0 >[pid 22438] rt_sigaction(SIGPIPE, {sa_handler=SIG_IGN, sa_mask=~[RTMIN RT_1], sa_flags=SA_RESTORER|SA_RESTART, sa_restorer=0x7fa6027b8660}, {sa_handler=SIG_IGN, sa_mask=[], sa_flags=0}, 8) = 0 >[pid 22438] close(5) = 0 >[pid 22438] dup(0) = 4 >[pid 22438] openat(AT_FDCWD, "/dev/null", O_RDWR) = 5 >[pid 22438] dup2(5, 0) = 0 >[pid 22438] dup2(5, 1) = 1 >[pid 22438] close(5) = 0 >[pid 22438] getpid() = 22438 >[pid 22438] fcntl(4, F_SETFD, FD_CLOEXEC) = 0 >[pid 22438] fcntl(4, F_SETFD, FD_CLOEXEC) = 0 >[pid 22438] rt_sigaction(SIGALRM, {sa_handler=SIG_DFL, sa_mask=~[RTMIN RT_1], sa_flags=SA_RESTORER, sa_restorer=0x7fa6027b8660}, {sa_handler=SIG_DFL, sa_mask=[], sa_flags=0}, 8) = 0 >[pid 22438] rt_sigaction(SIGHUP, {sa_handler=SIG_DFL, sa_mask=~[RTMIN RT_1], sa_flags=SA_RESTORER|SA_RESTART, sa_restorer=0x7fa6027b8660}, {sa_handler=SIG_IGN, sa_mask=[], sa_flags=0}, 8) = 0 >[pid 22438] rt_sigaction(SIGTERM, {sa_handler=SIG_DFL, sa_mask=~[RTMIN RT_1], sa_flags=SA_RESTORER|SA_RESTART, sa_restorer=0x7fa6027b8660}, {sa_handler=SIG_DFL, sa_mask=[], sa_flags=0}, 8) = 0 >[pid 22438] rt_sigaction(SIGQUIT, {sa_handler=SIG_DFL, sa_mask=~[RTMIN RT_1], sa_flags=SA_RESTORER|SA_RESTART, sa_restorer=0x7fa6027b8660}, {sa_handler=SIG_DFL, sa_mask=[], sa_flags=0}, 8) = 0 >[pid 22438] rt_sigaction(SIGCHLD, {sa_handler=SIG_DFL, sa_mask=~[RTMIN RT_1], sa_flags=SA_RESTORER|SA_RESTART, sa_restorer=0x7fa6027b8660}, {sa_handler=SIG_DFL, sa_mask=[], sa_flags=0}, 8) = 0 >[pid 22438] rt_sigaction(SIGINT, {sa_handler=SIG_DFL, sa_mask=~[RTMIN RT_1], sa_flags=SA_RESTORER|SA_RESTART, sa_restorer=0x7fa6027b8660}, {sa_handler=SIG_DFL, sa_mask=[], sa_flags=0}, 8) = 0 >[pid 22438] getpeername(4, {sa_family=AF_INET6, sin6_port=htons(50797), sin6_flowinfo=htonl(0), inet_pton(AF_INET6, "::1", &sin6_addr), sin6_scope_id=0}, [128 => 28]) = 0 >[pid 22438] getpeername(4, {sa_family=AF_INET6, sin6_port=htons(50797), sin6_flowinfo=htonl(0), inet_pton(AF_INET6, "::1", &sin6_addr), sin6_scope_id=0}, [128 => 28]) = 0 >[pid 22438] getsockname(4, {sa_family=AF_INET6, sin6_port=htons(2022), sin6_flowinfo=htonl(0), inet_pton(AF_INET6, "::1", &sin6_addr), sin6_scope_id=0}, [128 => 28]) = 0 >[pid 22438] getsockname(4, {sa_family=AF_INET6, sin6_port=htons(2022), sin6_flowinfo=htonl(0), inet_pton(AF_INET6, "::1", &sin6_addr), sin6_scope_id=0}, [128 => 28]) = 0 >[pid 22438] getpeername(4, {sa_family=AF_INET6, sin6_port=htons(50797), sin6_flowinfo=htonl(0), inet_pton(AF_INET6, "::1", &sin6_addr), sin6_scope_id=0}, [128 => 28]) = 0 >[pid 22438] setsockopt(4, SOL_SOCKET, SO_KEEPALIVE, [1], 4) = 0 >[pid 22438] getsockopt(4, SOL_SOCKET, SO_BINDTODEVICE, 0x7fffc6ae96b0, [16 => 0]) = 0 >[pid 22438] getsockname(4, {sa_family=AF_INET6, sin6_port=htons(2022), sin6_flowinfo=htonl(0), inet_pton(AF_INET6, "::1", &sin6_addr), sin6_scope_id=0}, [128 => 28]) = 0 >[pid 22438] getpid() = 22438 >[pid 22438] rt_sigaction(SIGALRM, {sa_handler=0x7fa602cc0f50, sa_mask=~[RTMIN RT_1], sa_flags=SA_RESTORER, sa_restorer=0x7fa6027b8660}, {sa_handler=SIG_DFL, sa_mask=~[KILL STOP RTMIN RT_1], sa_flags=SA_RESTORER, sa_restorer=0x7fa6027b8660}, 8) = 0 >[pid 22438] alarm(120) = 0 >[pid 22438] write(4, "SSH-2.0-OpenSSH_9.1\r\n", 21) = 21 >[pid 22438] getpid() = 22438 >[pid 22438] read(4, "S", 1) = 1 >[pid 22438] read(4, "S", 1) = 1 >[pid 22438] read(4, "H", 1) = 1 >[pid 22438] read(4, "-", 1) = 1 >[pid 22438] read(4, "2", 1) = 1 >[pid 22438] read(4, ".", 1) = 1 >[pid 22438] read(4, "0", 1) = 1 >[pid 22438] read(4, "-", 1) = 1 >[pid 22438] read(4, "O", 1) = 1 >[pid 22438] read(4, "p", 1) = 1 >[pid 22438] read(4, "e", 1) = 1 >[pid 22438] read(4, "n", 1) = 1 >[pid 22438] read(4, "S", 1) = 1 >[pid 22438] read(4, "S", 1) = 1 >[pid 22438] read(4, "H", 1) = 1 >[pid 22438] read(4, "_", 1) = 1 >[pid 22438] read(4, "9", 1) = 1 >[pid 22438] read(4, ".", 1) = 1 >[pid 22438] read(4, "1", 1) = 1 >[pid 22438] read(4, "\r", 1) = 1 >[pid 22438] read(4, "\n", 1) = 1 >[pid 22438] getpid() = 22438 >[pid 22438] getpid() = 22438 >[pid 22438] fcntl(4, F_GETFL) = 0x2 (flags O_RDWR) >[pid 22438] getpid() = 22438 >[pid 22438] fcntl(4, F_SETFL, O_RDWR|O_NONBLOCK) = 0 >[pid 22438] socketpair(AF_UNIX, SOCK_STREAM, 0, [5, 7]) = 0 >[pid 22438] fcntl(5, F_SETFD, FD_CLOEXEC) = 0 >[pid 22438] fcntl(7, F_SETFD, FD_CLOEXEC) = 0 >[pid 22438] pipe2([8, 9], 0) = 0 >[pid 22438] fcntl(8, F_SETFD, FD_CLOEXEC) = 0 >[pid 22438] fcntl(9, F_SETFD, FD_CLOEXEC) = 0 >[pid 22438] getpid() = 22438 >[pid 22438] clone(child_stack=NULL, flags=CLONE_CHILD_CLEARTID|CLONE_CHILD_SETTID|SIGCHLD, child_tidptr=0x7fa602775a10) = 22447 >[pid 22438] getpid() = 22438 >[pid 22438] getpid() = 22438 >[pid 22438] close(5) = 0 >[pid 22438] close(9) = 0 >[pid 22438] poll([{fd=7, events=POLLIN}, {fd=8, events=POLLIN}], 2, -1strace: Process 22447 attached > <unfinished ...> >[pid 22447] set_robust_list(0x7fa602775a20, 24) = 0 >[pid 22447] close(7) = 0 >[pid 22447] close(8) = 0 >[pid 22447] getrandom(0x7fa603b65f30, 32, 0) = -1 ENOSYS (Function not implemented) >[pid 22447] getrandom(0x7fa603b65f30, 32, 0) = -1 ENOSYS (Function not implemented) >[pid 22447] newfstatat(3, "", {st_mode=S_IFCHR|0666, st_rdev=makedev(0x1, 0x9), ...}, AT_EMPTY_PATH) = 0 >[pid 22447] read(3, "\6\324\2G\0\351P,\300\322jz\271\273\324\330d`j\235\317\305\376\35\220\341\373\272\275\263\307\365", 32) = 32 >[pid 22447] getrandom(0x7fffc6ae92f0, 1024, 0) = -1 ENOSYS (Function not implemented) >[pid 22447] openat(AT_FDCWD, "/dev/urandom", O_RDONLY|O_NOCTTY|O_CLOEXEC) = 7 >[pid 22447] read(7, "\n\216uh\215\312\341\233\354\347\3268\340\266\275`\375\374lOs\26~\323\336\242'\320\345\235\37\263"..., 1024) = 1024 >[pid 22447] close(7) = 0 >[pid 22447] getpid() = 22447 >[pid 22447] getpid() = 22447 >[pid 22447] getrandom(0x7fa603b66950, 32, 0) = -1 ENOSYS (Function not implemented) >[pid 22447] getrandom(0x7fa603b66950, 32, 0) = -1 ENOSYS (Function not implemented) >[pid 22447] newfstatat(3, "", {st_mode=S_IFCHR|0666, st_rdev=makedev(0x1, 0x9), ...}, AT_EMPTY_PATH) = 0 >[pid 22447] read(3, "v\373\16{x\215'\2127\335\231q\365\245\316U\233\214\22\320\234\26\334\273\216\f\3426\270\27\276\357", 32) = 32 >[pid 22447] getpid() = 22447 >[pid 22447] getpid() = 22447 >[pid 22447] chroot("/var/empty") = 0 >[pid 22447] chdir("/") = 0 >[pid 22447] getpid() = 22447 >[pid 22447] setgroups(1, [22]) = 0 >[pid 22447] getuid() = 0 >[pid 22447] getgid() = 0 >[pid 22447] getpid() = 22447 >[pid 22447] setresgid(22, 22, 22) = 0 >[pid 22447] setresuid(22, 22, 22) = 0 >[pid 22447] setgid(0) = -1 EPERM (Operation not permitted) >[pid 22447] setresgid(-1, 0, -1) = -1 EPERM (Operation not permitted) >[pid 22447] getgid() = 22 >[pid 22447] getegid() = 22 >[pid 22447] setuid(0) = -1 EPERM (Operation not permitted) >[pid 22447] setresuid(-1, 0, -1) = -1 EPERM (Operation not permitted) >[pid 22447] getuid() = 22 >[pid 22447] geteuid() = 22 >[pid 22447] prlimit64(0, RLIMIT_FSIZE, {rlim_cur=0, rlim_max=0}, NULL) = 0 >[pid 22447] prlimit64(0, RLIMIT_NOFILE, {rlim_cur=1, rlim_max=1}, NULL) = 0 >[pid 22447] prlimit64(0, RLIMIT_NPROC, {rlim_cur=0, rlim_max=0}, NULL) = 0 >[pid 22447] getpid() = 22447 >[pid 22447] rt_sigaction(SIGSYS, {sa_handler=0x7fa602cff040, sa_mask=[], sa_flags=SA_RESTORER|SA_SIGINFO, sa_restorer=0x7fa6027b8660}, NULL, 8) = 0 >[pid 22447] rt_sigprocmask(SIG_UNBLOCK, [SYS], NULL, 8) = 0 >[pid 22447] getpid() = 22447 >[pid 22447] prctl(PR_SET_NO_NEW_PRIVS, 1, 0, 0, 0) = 0 >[pid 22447] getpid() = 22447 >[pid 22447] prctl(PR_SET_SECCOMP, SECCOMP_MODE_FILTER, {len=103, filter=0x7fa602d84580}) = 0 >[pid 22447] getpid() = 22447 >[pid 22447] getpid() = 22447 >[pid 22447] getrandom(0x7fa603b67a40, 16, 0) = -1 ENOSYS (Function not implemented) >[pid 22447] openat(AT_FDCWD, "/dev/urandom", O_RDONLY|O_NOCTTY|O_CLOEXEC) = 20 >[pid 22447] --- SIGSYS {si_signo=SIGSYS, si_code=SYS_SECCOMP, si_call_addr=0x7fa6027f8638, si_syscall=__NR_writev, si_arch=AUDIT_ARCH_X86_64} --- >[pid 22447] write(9, "\0\0\0g\0\0\0\1\0\0\0\0\0\0\0[ssh_sandbox_viol"..., 107 <unfinished ...> >[pid 22438] <... poll resumed>) = 1 ([{fd=8, revents=POLLIN}]) >[pid 22438] read(8, "\0\0\0g", 4) = 4 >[pid 22438] read(8, "\0\0\0\1\0\0\0\0\0\0\0[ssh_sandbox_violatio"..., 103) = 103 >[pid 22438] write(2, "ssh_sandbox_violation: unexpecte"..., 103ssh_sandbox_violation: unexpected system call (arch:0xc000003e,syscall:20 @ 0x7fa6027f8638) [preauth] >) = 103 >[pid 22438] poll([{fd=7, events=POLLIN}, {fd=8, events=POLLIN}], 2, -1 <unfinished ...> >[pid 22447] <... write resumed>) = 107 >[pid 22447] exit_group(1) = ? >[pid 22438] <... poll resumed>) = 1 ([{fd=7, revents=POLLIN|POLLHUP}]) >[pid 22438] getpid() = 22438 >[pid 22438] read(7, "", 4) = 0 >[pid 22438] getpid() = 22438 >[pid 22438] getpid() = 22438 >[pid 22438] getpid() = 22438 >[pid 22438] kill(22447, SIGKILL) = 0 >[pid 22438] exit_group(255) = ? >[pid 22428] <... ppoll resumed>) = 1 ([{fd=6, revents=POLLHUP}]) >[pid 22428] rt_sigprocmask(SIG_SETMASK, [], NULL, 8) = 0 >[pid 22428] read(6, "", 1) = 0 >[pid 22428] close(6) = 0 >[pid 22428] rt_sigprocmask(SIG_BLOCK, [HUP QUIT TERM CHLD], [], 8) = 0 >[pid 22428] ppoll([{fd=3, events=POLLIN}, {fd=4, events=POLLIN}], 2, NULL, [], 8 <unfinished ...> >[pid 22438] +++ exited with 255 +++ >[pid 22428] <... ppoll resumed>) = ? ERESTARTNOHAND (To be restarted if no handler) >[pid 22428] --- SIGCHLD {si_signo=SIGCHLD, si_code=CLD_EXITED, si_pid=22438, si_uid=0, si_status=255, si_utime=0, si_stime=0} --- >[pid 22428] wait4(-1, [{WIFEXITED(s) && WEXITSTATUS(s) == 255}], WNOHANG, NULL) = 22438 >[pid 22428] wait4(-1, 0x7fffb17b5c54, WNOHANG, NULL) = -1 ECHILD (No child processes) >[pid 22428] rt_sigreturn({mask=[HUP QUIT TERM CHLD]}) = -1 EINTR (Interrupted system call) >[pid 22428] rt_sigprocmask(SIG_SETMASK, [], NULL, 8) = 0 >[pid 22428] rt_sigprocmask(SIG_BLOCK, [HUP QUIT TERM CHLD], [], 8) = 0 >[pid 22428] ppoll([{fd=3, events=POLLIN}, {fd=4, events=POLLIN}], 2, NULL, [], 8 <unfinished ...> >[pid 22447] +++ exited with 1 +++ ><... ppoll resumed>) = ? ERESTARTNOHAND (To be restarted if no handler) >strace: Process 22428 detached
You cannot view the attachment while viewing its details because your browser does not support IFRAMEs.
View the attachment on a separate page
.
View Attachment As Raw
Actions:
View
Attachments on
bug 3512
:
3645
| 3646