Created
March 22, 2018 16:35
-
-
Save xse/a7c7fb9dd04cfccaefd8e894632a2d25 to your computer and use it in GitHub Desktop.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
442 execve("/usr/bin/kfcgi", ["kfcgi", "-d", "-v", "-s", "/run/httpd.sock", "-p", "/", "--", "/srv/http/kcgi"], ["LANG=en_US.UTF-8", "TERM=screen", "PATH=/usr/local/sbin:/usr/local/bin:/usr/bin:/usr/bin/site_perl:/usr/bin/vendor_perl:/usr/bin/core_perl:/usr/bin/site_perl:/usr/bin/vendor_perl:/usr/bin/core_perl", "MAIL=/var/mail/root", "LOGNAME=root", "USER=root", "USERNAME=root", "HOME=/root", "SHELL=/bin/bash", "SUDO_COMMAND=/usr/bin/strace -s 2048 -f -v -o /srv/http/foo/kfcgi.strace kfcgi -d -v -s /run/httpd.sock -p / -- /srv/http/kcgi", "SUDO_USER=xse", "SUDO_UID=1001", "SUDO_GID=1001"]) = 0 | |
442 brk(NULL) = 0x1e9e000 | |
442 uname({sysname="Linux", nodename="rpi", release="4.14.27-1-ARCH", version="#1 SMP Sat Mar 17 00:42:16 UTC 2018", machine="armv6l", domainname="(none)"}) = 0 | |
442 access("/etc/ld.so.preload", R_OK) = -1 ENOENT (No such file or directory) | |
442 openat(AT_FDCWD, "/etc/ld.so.cache", O_RDONLY|O_CLOEXEC) = 3 | |
442 fstat64(3, {st_dev=makedev(179, 2), st_ino=57881, st_mode=S_IFREG|0644, st_nlink=1, st_uid=0, st_gid=0, st_blksize=4096, st_blocks=80, st_size=37127, st_atime=1521733116 /* 2018-03-22T16:38:36.127192000+0100 */, st_atime_nsec=127192000, st_mtime=1520908727 /* 2018-03-13T03:38:47.830000000+0100 */, st_mtime_nsec=830000000, st_ctime=1520908727 /* 2018-03-13T03:38:47.830000000+0100 */, st_ctime_nsec=830000000}) = 0 | |
442 mmap2(NULL, 37127, PROT_READ, MAP_PRIVATE, 3, 0) = 0x76fda000 | |
442 close(3) = 0 | |
442 openat(AT_FDCWD, "/usr/lib/libc.so.6", O_RDONLY|O_CLOEXEC) = 3 | |
442 read(3, "\177ELF\1\1\1\0\0\0\0\0\0\0\0\0\3\0(\0\1\0\0\0\fl\1\0004\0\0\0\0\2\30\0\0\4\0\0054\0 \0\n\0(\0K\0J\0\1\0\0p\354\277\22\0\354\277\22\0\354\277\22\0008\26\0\0008\26\0\0\4\0\0\0\4\0\0\0\6\0\0\0004\0\0\0004\0\0\0004\0\0\0@\1\0\0@\1\0\0\5\0\0\0\4\0\0\0\3\0\0\0\330\266\22\0\330\266\22\0\330\266\22\0\35\0\0\0\35\0\0\0\4\0\0\0\4\0\0\0\1\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\240\t\23\0\240\t\23\0\5\0\0\0\0\0\1\0\1\0\0\0008\25\23\0008\25\24\0008\25\24\0<'\0\0lN\0\0\6\0\0\0\0\0\1\0\2\0\0\0P-\23\0P-\24\0P-\24\0\350\0\0\0\350\0\0\0\6\0\0\0\4\0\0\0\4\0\0\0t\1\0\0t\1\0\0t\1\0\0D\0\0\0D\0\0\0\4\0\0\0\4\0\0\0\7\0\0\0008\25\23\0008\25\24\0008\25\24\0\10\0\0\0T\0\0\0\4\0\0\0\4\0\0\0Q\345td\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\6\0\0\0\20\0\0\0R\345td8\25\23\0008\25\24\0008\25\24\0\310\32\0\0\310\32\0\0\4\0\0\0\1\0\0\0\4\0\0\0\24\0\0\0\3\0\0\0GNU\0/\2435\2244\214\243\363h\327\17\32\212\335\316/\4\367\10q\4\0\0\0\20\0\0\0\1\0\0\0GNU\0\0\0\0\0\3\0\0\0\2\0\0\0\0\0\0\0\363\3\0\0\r\0\0\0\0\2\0\0\16\0\0\0\2440\20D\204!\n\1\214\3\346\220AE\210\0\204\0\10\0E\204\0`\300\200\1\f\212\f@\0010\0\10@2\10\252\0\210H6l\240\0268\0&\204\200\216\4\10@\4", 512) = 512 | |
442 fstat64(3, {st_dev=makedev(179, 2), st_ino=3926, st_mode=S_IFREG|0755, st_nlink=1, st_uid=0, st_gid=0, st_blksize=4096, st_blocks=3080, st_size=1576376, st_atime=1521658366 /* 2018-03-21T19:52:46.591133956+0100 */, st_atime_nsec=591133956, st_mtime=1516328080 /* 2018-01-19T03:14:40.341225537+0100 */, st_mtime_nsec=341225537, st_ctime=1520876934 /* 2018-03-12T18:48:54.399098137+0100 */, st_ctime_nsec=399098137}) = 0 | |
442 mmap2(NULL, 8192, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) = 0x76fd8000 | |
442 mmap2(NULL, 1336228, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) = 0x76e6d000 | |
442 mprotect(0x76f9e000, 65536, PROT_NONE) = 0 | |
442 mmap2(0x76fae000, 12288, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0x131000) = 0x76fae000 | |
442 mmap2(0x76fb1000, 9124, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x76fb1000 | |
442 close(3) = 0 | |
442 set_tls(0x76fd8bf0) = 0 | |
442 mprotect(0x76fae000, 8192, PROT_READ) = 0 | |
442 mprotect(0x4f8000, 4096, PROT_READ) = 0 | |
442 mprotect(0x76fe4000, 4096, PROT_READ) = 0 | |
442 munmap(0x76fda000, 37127) = 0 | |
442 geteuid32() = 0 | |
442 socket(AF_UNIX, SOCK_STREAM, 0) = 3 | |
442 unlink("/run/httpd.sock") = 0 | |
442 umask(0117) = 022 | |
442 bind(3, {sa_family=AF_UNIX, sun_path="/run/httpd.sock"}, 110) = 0 | |
442 umask(022) = 0117 | |
442 listen(3, 10) = 0 | |
442 chroot("/") = 0 | |
442 chdir("/") = 0 | |
442 brk(NULL) = 0x1e9e000 | |
442 brk(0x1ebf000) = 0x1ebf000 | |
442 rt_sigaction(SIGTERM, {sa_handler=0x4e215c, sa_mask=[TERM], sa_flags=SA_RESTORER|SA_RESTART, sa_restorer=0x76e998e0}, {sa_handler=SIG_DFL, sa_mask=[], sa_flags=0}, 8) = 0 | |
442 rt_sigaction(SIGCHLD, {sa_handler=0x4e2190, sa_mask=[CHLD], sa_flags=SA_RESTORER|SA_RESTART, sa_restorer=0x76e998e0}, {sa_handler=SIG_DFL, sa_mask=[], sa_flags=0}, 8) = 0 | |
442 rt_sigaction(SIGHUP, {sa_handler=0x4e2128, sa_mask=[HUP], sa_flags=SA_RESTORER|SA_RESTART, sa_restorer=0x76e998e0}, {sa_handler=SIG_DFL, sa_mask=[], sa_flags=0}, 8) = 0 | |
442 rt_sigprocmask(SIG_BLOCK, [HUP TERM CHLD], [], 8) = 0 | |
442 clone(child_stack=NULL, flags=CLONE_CHILD_CLEARTID|CLONE_CHILD_SETTID|SIGCHLD, child_tidptr=0x76fd8798) = 443 | |
442 clone(child_stack=NULL, flags=CLONE_CHILD_CLEARTID|CLONE_CHILD_SETTID|SIGCHLD, child_tidptr=0x76fd8798) = 444 | |
442 clone(child_stack=NULL, flags=CLONE_CHILD_CLEARTID|CLONE_CHILD_SETTID|SIGCHLD, child_tidptr=0x76fd8798) = 445 | |
442 clone(child_stack=NULL, flags=CLONE_CHILD_CLEARTID|CLONE_CHILD_SETTID|SIGCHLD, child_tidptr=0x76fd8798) = 446 | |
442 clone(child_stack=NULL, flags=CLONE_CHILD_CLEARTID|CLONE_CHILD_SETTID|SIGCHLD, child_tidptr=0x76fd8798) = 447 | |
442 rt_sigsuspend([], 8 <unfinished ...> | |
445 dup2(3, 0 <unfinished ...> | |
444 dup2(3, 0 <unfinished ...> | |
447 dup2(3, 0 <unfinished ...> | |
446 dup2(3, 0 <unfinished ...> | |
443 dup2(3, 0 <unfinished ...> | |
445 <... dup2 resumed> ) = 0 | |
444 <... dup2 resumed> ) = 0 | |
443 <... dup2 resumed> ) = 0 | |
447 <... dup2 resumed> ) = 0 | |
446 <... dup2 resumed> ) = 0 | |
445 close(3 <unfinished ...> | |
444 close(3 <unfinished ...> | |
447 close(3 <unfinished ...> | |
446 close(3 <unfinished ...> | |
447 <... close resumed> ) = 0 | |
447 execve("/srv/http/kcgi", ["/srv/http/kcgi"], ["LANG=en_US.UTF-8", "TERM=screen", "PATH=/usr/local/sbin:/usr/local/bin:/usr/bin:/usr/bin/site_perl:/usr/bin/vendor_perl:/usr/bin/core_perl:/usr/bin/site_perl:/usr/bin/vendor_perl:/usr/bin/core_perl", "MAIL=/var/mail/root", "LOGNAME=root", "USER=root", "USERNAME=root", "HOME=/root", "SHELL=/bin/bash", "SUDO_COMMAND=/usr/bin/strace -s 2048 -f -v -o /srv/http/foo/kfcgi.strace kfcgi -d -v -s /run/httpd.sock -p / -- /srv/http/kcgi", "SUDO_USER=xse", "SUDO_UID=1001", "SUDO_GID=1001"] <unfinished ...> | |
446 <... close resumed> ) = 0 | |
447 <... execve resumed> ) = 0 | |
446 execve("/srv/http/kcgi", ["/srv/http/kcgi"], ["LANG=en_US.UTF-8", "TERM=screen", "PATH=/usr/local/sbin:/usr/local/bin:/usr/bin:/usr/bin/site_perl:/usr/bin/vendor_perl:/usr/bin/core_perl:/usr/bin/site_perl:/usr/bin/vendor_perl:/usr/bin/core_perl", "MAIL=/var/mail/root", "LOGNAME=root", "USER=root", "USERNAME=root", "HOME=/root", "SHELL=/bin/bash", "SUDO_COMMAND=/usr/bin/strace -s 2048 -f -v -o /srv/http/foo/kfcgi.strace kfcgi -d -v -s /run/httpd.sock -p / -- /srv/http/kcgi", "SUDO_USER=xse", "SUDO_UID=1001", "SUDO_GID=1001"] <unfinished ...> | |
447 brk(NULL) = 0x444000 | |
447 brk(0x444d08) = 0x444d08 | |
447 set_tls(0x4444c0) = 0 | |
447 uname({sysname="Linux", nodename="rpi", release="4.14.27-1-ARCH", version="#1 SMP Sat Mar 17 00:42:16 UTC 2018", machine="armv6l", domainname="(none)"}) = 0 | |
447 readlink("/proc/self/exe", "/srv/http/kcgi", 4096) = 14 | |
447 brk(0x465d08) = 0x465d08 | |
447 brk(0x466000) = 0x466000 | |
447 rt_sigaction(SIGTERM, {sa_handler=0x1043c, sa_mask=[TERM], sa_flags=SA_RESTORER|SA_RESTART, sa_restorer=0x351a0}, {sa_handler=SIG_DFL, sa_mask=[], sa_flags=0}, 8) = 0 | |
447 rt_sigprocmask(SIG_BLOCK, [TERM], NULL, 8) = 0 | |
447 socketpair(AF_UNIX, SOCK_STREAM, 0, [3, 4]) = 0 | |
447 fcntl64(3, F_GETFL) = 0x2 (flags O_RDWR) | |
447 fcntl64(4, F_GETFL) = 0x2 (flags O_RDWR) | |
447 fcntl64(3, F_SETFL, O_RDWR|O_NONBLOCK) = 0 | |
447 fcntl64(4, F_SETFL, O_RDWR|O_NONBLOCK) = 0 | |
447 socketpair(AF_UNIX, SOCK_STREAM, 0, [5, 6]) = 0 | |
447 fcntl64(5, F_GETFL) = 0x2 (flags O_RDWR) | |
447 fcntl64(6, F_GETFL) = 0x2 (flags O_RDWR) | |
447 fcntl64(5, F_SETFL, O_RDWR|O_NONBLOCK) = 0 | |
447 fcntl64(6, F_SETFL, O_RDWR|O_NONBLOCK) = 0 | |
447 clone(child_stack=NULL, flags=CLONE_CHILD_CLEARTID|CLONE_CHILD_SETTID|SIGCHLD, child_tidptr=0x444068) = 448 | |
447 close(5) = 0 | |
447 close(3) = 0 | |
447 socketpair(AF_UNIX, SOCK_STREAM, 0, [3, 5]) = 0 | |
447 fcntl64(3, F_GETFL) = 0x2 (flags O_RDWR) | |
447 fcntl64(5, F_GETFL) = 0x2 (flags O_RDWR) | |
447 fcntl64(3, F_SETFL, O_RDWR|O_NONBLOCK) = 0 | |
447 fcntl64(5, F_SETFL, O_RDWR|O_NONBLOCK) = 0 | |
448 rt_sigaction(SIGTERM, {sa_handler=SIG_IGN, sa_mask=[TERM], sa_flags=SA_RESTORER|SA_RESTART, sa_restorer=0x351a0}, <unfinished ...> | |
447 clone(child_stack=NULL, flags=CLONE_CHILD_CLEARTID|CLONE_CHILD_SETTID|SIGCHLD, child_tidptr=0x444068) = 449 | |
448 <... rt_sigaction resumed> {sa_handler=0x1043c, sa_mask=[TERM], sa_flags=SA_RESTORER|SA_RESTART, sa_restorer=0x351a0}, 8) = 0 | |
447 close(3 <unfinished ...> | |
448 close(0 <unfinished ...> | |
447 <... close resumed> ) = 0 | |
448 <... close resumed> ) = 0 | |
447 close(4 <unfinished ...> | |
448 close(1) = 0 | |
448 close(6) = 0 | |
449 rt_sigaction(SIGTERM, {sa_handler=SIG_IGN, sa_mask=[TERM], sa_flags=SA_RESTORER|SA_RESTART, sa_restorer=0x351a0}, <unfinished ...> | |
448 close(4) = 0 | |
449 <... rt_sigaction resumed> {sa_handler=0x1043c, sa_mask=[TERM], sa_flags=SA_RESTORER|SA_RESTART, sa_restorer=0x351a0}, 8) = 0 | |
448 prlimit64(0, RLIMIT_FSIZE, {rlim_cur=0, rlim_max=0}, <unfinished ...> | |
449 close(1 <unfinished ...> | |
448 <... prlimit64 resumed> NULL) = 0 | |
449 <... close resumed> ) = 0 | |
448 prlimit64(0, RLIMIT_NPROC, {rlim_cur=0, rlim_max=0}, <unfinished ...> | |
449 close(6) = 0 | |
449 close(5) = 0 | |
449 prlimit64(0, RLIMIT_FSIZE, {rlim_cur=0, rlim_max=0}, NULL) = 0 | |
449 prlimit64(0, RLIMIT_NPROC, {rlim_cur=0, rlim_max=0}, NULL) = 0 | |
449 rt_sigaction(SIGSYS, {sa_handler=0x17d78, sa_mask=[], sa_flags=SA_RESTORER|SA_SIGINFO, sa_restorer=0x351b0}, NULL, 8) = 0 | |
449 rt_sigprocmask(SIG_UNBLOCK, [SYS], NULL, 8) = 0 | |
449 prctl(PR_SET_NO_NEW_PRIVS, 1, 0, 0, 0) = 0 | |
449 prctl(PR_SET_SECCOMP, SECCOMP_MODE_FILTER, {len=45, filter=[BPF_STMT(BPF_LD|BPF_W|BPF_ABS, 0x4), BPF_JUMP(BPF_JMP|BPF_K|BPF_JEQ, 0x40000028, 0x1, 0), BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_TRAP), BPF_STMT(BPF_LD|BPF_W|BPF_ABS, 0), BPF_JUMP(BPF_JMP|BPF_K|BPF_JEQ, 0x5, 0, 0x1), BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_ERRNO|0xd), BPF_JUMP(BPF_JMP|BPF_K|BPF_JEQ, 0x14, 0, 0x1), BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_ALLOW), BPF_JUMP(BPF_JMP|BPF_K|BPF_JEQ, 0x4e, 0, 0x1), BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_ALLOW), BPF_JUMP(BPF_JMP|BPF_K|BPF_JEQ, 0x107, 0, 0x1), BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_ALLOW), BPF_JUMP(BPF_JMP|BPF_K|BPF_JEQ, 0x11d, 0, 0x1), BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_ALLOW), BPF_JUMP(BPF_JMP|BPF_K|BPF_JEQ, 0x37, 0, 0x1), BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_ALLOW), BPF_JUMP(BPF_JMP|BPF_K|BPF_JEQ, 0x128, 0, 0x1), BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_ALLOW), BPF_JUMP(BPF_JMP|BPF_K|BPF_JEQ, 0x129, 0, 0x1), BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_ALLOW), BPF_JUMP(BPF_JMP|BPF_K|BPF_JEQ, 0x3, 0, 0x1), BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_ALLOW), BPF_JUMP(BPF_JMP|BPF_K|BPF_JEQ, 0x4, 0, 0x1), BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_ALLOW), BPF_JUMP(BPF_JMP|BPF_K|BPF_JEQ, 0x6, 0, 0x1), BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_ALLOW), BPF_JUMP(BPF_JMP|BPF_K|BPF_JEQ, 0x125, 0, 0x1), BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_ALLOW), BPF_JUMP(BPF_JMP|BPF_K|BPF_JEQ, 0x2d, 0, 0x1), BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_ALLOW), BPF_JUMP(BPF_JMP|BPF_K|BPF_JEQ, 0xa8, 0, 0x1), BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_ALLOW), BPF_JUMP(BPF_JMP|BPF_K|BPF_JEQ, 0x8e, 0, 0x1), BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_ALLOW), BPF_JUMP(BPF_JMP|BPF_K|BPF_JEQ, 0xdc, 0, 0x1), BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_ALLOW), BPF_JUMP(BPF_JMP|BPF_K|BPF_JEQ, 0xc0, 0, 0x1), BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_ALLOW), BPF_JUMP(BPF_JMP|BPF_K|BPF_JEQ, 0x5b, 0, 0x1), BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_ALLOW), BPF_JUMP(BPF_JMP|BPF_K|BPF_JEQ, 0xf8, 0, 0x1), BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_ALLOW), BPF_JUMP(BPF_JMP|BPF_K|BPF_JEQ, 0xaf, 0, 0x1), BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_ALLOW), BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_TRAP)]}) = 0 | |
449 fcntl64(0, F_GETFL <unfinished ...> | |
449 --- SIGSYS {si_signo=SIGSYS, si_code=SYS_SECCOMP, si_call_addr=0x51d2c, si_syscall=__NR_fcntl64, si_arch=AUDIT_ARCH_ARM} --- | |
449 <... fcntl64 resumed> ) = 0x2 (flags O_RDWR) | |
449 write(86, "ssh_sandbox_violation: unexpected system call (arch:0x40000028,syscall:221 @ 0x51d2c)\n", 86) = 1 | |
449 +++ exited with 1 +++ | |
448 <... prlimit64 resumed> NULL) = 0 | |
448 rt_sigaction(SIGSYS, {sa_handler=0x17d78, sa_mask=[], sa_flags=SA_RESTORER|SA_SIGINFO, sa_restorer=0x351b0}, NULL, 8) = 0 | |
448 rt_sigprocmask(SIG_UNBLOCK, [SYS], NULL, 8) = 0 | |
448 prctl(PR_SET_NO_NEW_PRIVS, 1, 0, 0, 0) = 0 | |
448 prctl(PR_SET_SECCOMP, SECCOMP_MODE_FILTER, {len=39, filter=[BPF_STMT(BPF_LD|BPF_W|BPF_ABS, 0x4), BPF_JUMP(BPF_JMP|BPF_K|BPF_JEQ, 0x40000028, 0x1, 0), BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_TRAP), BPF_STMT(BPF_LD|BPF_W|BPF_ABS, 0), BPF_JUMP(BPF_JMP|BPF_K|BPF_JEQ, 0x5, 0, 0x1), BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_ERRNO|0xd), BPF_JUMP(BPF_JMP|BPF_K|BPF_JEQ, 0x14, 0, 0x1), BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_ALLOW), BPF_JUMP(BPF_JMP|BPF_K|BPF_JEQ, 0x4e, 0, 0x1), BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_ALLOW), BPF_JUMP(BPF_JMP|BPF_K|BPF_JEQ, 0x107, 0, 0x1), BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_ALLOW), BPF_JUMP(BPF_JMP|BPF_K|BPF_JEQ, 0x3, 0, 0x1), BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_ALLOW), BPF_JUMP(BPF_JMP|BPF_K|BPF_JEQ, 0x4, 0, 0x1), BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_ALLOW), BPF_JUMP(BPF_JMP|BPF_K|BPF_JEQ, 0x6, 0, 0x1), BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_ALLOW), BPF_JUMP(BPF_JMP|BPF_K|BPF_JEQ, 0x125, 0, 0x1), BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_ALLOW), BPF_JUMP(BPF_JMP|BPF_K|BPF_JEQ, 0x2d, 0, 0x1), BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_ALLOW), BPF_JUMP(BPF_JMP|BPF_K|BPF_JEQ, 0xa8, 0, 0x1), BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_ALLOW), BPF_JUMP(BPF_JMP|BPF_K|BPF_JEQ, 0x8e, 0, 0x1), BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_ALLOW), BPF_JUMP(BPF_JMP|BPF_K|BPF_JEQ, 0xdc, 0, 0x1), BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_ALLOW), BPF_JUMP(BPF_JMP|BPF_K|BPF_JEQ, 0xc0, 0, 0x1), BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_ALLOW), BPF_JUMP(BPF_JMP|BPF_K|BPF_JEQ, 0xa3, 0, 0x1), BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_ALLOW), BPF_JUMP(BPF_JMP|BPF_K|BPF_JEQ, 0x5b, 0, 0x1), BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_ALLOW), BPF_JUMP(BPF_JMP|BPF_K|BPF_JEQ, 0xf8, 0, 0x1), BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_ALLOW), BPF_JUMP(BPF_JMP|BPF_K|BPF_JEQ, 0xaf, 0, 0x1), BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_ALLOW), BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_TRAP)]}) = 0 | |
448 poll([{fd=3, events=POLLIN}], 1, -1) = 1 ([{fd=3, revents=POLLIN|POLLHUP}]) | |
448 read(3, "", 4) = 0 | |
448 close(5) = 0 | |
448 close(3) = 0 | |
448 exit_group(0) = ? | |
448 +++ exited with 0 +++ | |
447 <... close resumed> ) = 0 | |
447 close(0) = 0 | |
447 rt_sigprocmask(SIG_UNBLOCK, [TERM], NULL, 8) = 0 | |
447 poll([{fd=5, events=POLLIN}], 1, 1000) = 1 ([{fd=5, revents=POLLIN|POLLHUP}]) | |
447 rt_sigprocmask(SIG_UNBLOCK, [TERM], NULL, 8) = 0 | |
447 poll([{fd=5, events=POLLIN}], 1, -1) = 1 ([{fd=5, revents=POLLIN|POLLHUP}]) | |
447 recvmsg(5, {msg_name=NULL, msg_namelen=0, msg_iov=[{iov_base="", iov_len=256}], msg_iovlen=1, msg_controllen=0, msg_flags=0}, 0) = 0 | |
447 write(2, "fcgi.c:685: application signalled\n", 34) = 34 | |
447 close(5) = 0 | |
447 close(6) = 0 | |
447 wait4(448, [{WIFEXITED(s) && WEXITSTATUS(s) == 0}], 0, NULL) = 448 | |
447 wait4(449, [{WIFEXITED(s) && WEXITSTATUS(s) == 1}], 0, NULL) = 449 | |
447 write(2, "wrappers.c:181: child status 1\n", 31) = 31 | |
447 exit_group(0) = ? | |
447 +++ exited with 0 +++ | |
442 <... rt_sigsuspend resumed> ) = ? ERESTARTNOHAND (To be restarted if no handler) | |
442 --- SIGCHLD {si_signo=SIGCHLD, si_code=CLD_EXITED, si_pid=447, si_uid=0, si_status=0, si_utime=0, si_stime=1} --- | |
442 sigreturn({mask=[HUP TERM CHLD]}) = -1 EINTR (Interrupted system call) | |
442 gettimeofday({tv_sec=1521734730, tv_usec=252230}, NULL) = 0 | |
442 open("/etc/localtime", O_RDONLY|O_CLOEXEC) = 4 | |
442 fstat64(4, {st_dev=makedev(179, 2), st_ino=31118, st_mode=S_IFREG|0644, st_nlink=1, st_uid=0, st_gid=0, st_blksize=4096, st_blocks=6, st_size=2971, st_atime=1521658654 /* 2018-03-21T19:57:34.281474375+0100 */, st_atime_nsec=281474375, st_mtime=1516857915 /* 2018-01-25T06:25:15.776826739+0100 */, st_mtime_nsec=776826739, st_ctime=1520877154 /* 2018-03-12T18:52:34.670100026+0100 */, st_ctime_nsec=670100026}) = 0 | |
442 fstat64(4, {st_dev=makedev(179, 2), st_ino=31118, st_mode=S_IFREG|0644, st_nlink=1, st_uid=0, st_gid=0, st_blksize=4096, st_blocks=6, st_size=2971, st_atime=1521658654 /* 2018-03-21T19:57:34.281474375+0100 */, st_atime_nsec=281474375, st_mtime=1516857915 /* 2018-01-25T06:25:15.776826739+0100 */, st_mtime_nsec=776826739, st_ctime=1520877154 /* 2018-03-12T18:52:34.670100026+0100 */, st_ctime_nsec=670100026}) = 0 | |
442 read(4, "TZif2\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\r\0\0\0\r\0\0\0\0\0\0\0\270\0\0\0\r\0\0\0\37\200\0\0\0\221`P\213\233Gx\360\233\327,p\234\274\221p\235\300H\360\236\211\376p\237\240*\360\240`\245\360\241\200\f\360\242.\22\360\243zL\360\2445\201\360\245^#p\246%5\360\247'\233\360\250X&p\251\7}\360\251\3564p\252\347_\360\253\327P\360\254\307A\360\255\311\247\360\256\247#\360\257\240Op\260\207\5\360\261\211k\360\262p\"p\263r\210p\264P\4p\265I/\360\266/\346p\2672Lp\270\17\310p\270\377\271p\271\357\252p\272\326`\360\273\330\306\360\274\310\267\360\275\270\250\360\276\237_p\277\230\212\360\300\232\360\360\301xl\360\302h]\360\303XN\360\304?\5p\30580\360\306:\226\360\307X\254p\307\332\t\240\310l'\340\314\347K\20\315\251\27\220\316\242C\20\317\2224\20\320O\341\340\320\211\361\360\321r\26\20\322N@\220\v\2739\0\f\253\33\360\r\244c\220\16\213\32\20\17\204E\220\20t6\220\21d'\220\22T\30\220\23MD\20\0243\372\220\25#\353\220\26\23\334\220\27\3\315\220\27\363\276\220\30\343\257\220\31\323\240\220\32\303\221\220\33\274\275\20\34\254\256\20\35\234\237\20\36\214\220\20\37|\201\20 lr\20!\\c\20\"LT\20#<E\20$,6\20%\34'\20&\f\30\20'\5C\220'\3654\220(\345%\220)\325\26\220*\305\7\220+\264\370\220,\244\351\220-\224\332\220.\204\313\220/t\274\2200d\255\2201]\331\0202r\264\0203=\273\0204R\226\0205\35\235\02062x\0206\375\177\0208\33\224\2208\335a\0209\373v\220:\275C\20;\333X\220<\246_\220=\273:\220>\206A\220?\233\34\220@f#\220A\2049\20BF\5\220Cd\33\20D%\347\220EC\375\20F\5\311\220G#\337\20G\356\346\20I\3\301\20I\316\310\20J\343\243\20K\256\252\20L\314\277\220M\216\214\20N\254\241\220Onn\20P\214\203\220QW\212\220Rle\220S7l\220TLG\220U\27N\220V,)\220V\3670\220X\25F\20X\327\22\220Y\365(\20Z\266\364\220[\325\n\20\\\240\21\20]\264\354\20^\177\363\20_\224\316\20`_\325\20a}\352\220b?\267\20c]\314\220d\37\231\20e=\256\220f\10\265\220g\35\220\220g\350\227\220h\375r\220i\310y\220j\335T\220k\250[\220l\306q\20m\210=\220n\246S\20oh\37\220p\2065\20qQ<\20rf\27\20s1\36\20tE\371\20u\21\0\20v/\25\220v\360\342\20x\16\367\220x\320\304\20y\356\331\220z\260\246\20{\316\273\220|\231\302\220}\256\235\220~y\244\220\177\216\177\220\1\5\2\3\2\3\2\3\2\3\2\3\2\3\2\3\2\3\2\3\2\3\2\3\2\3\2\3\2\3\2\3\2\3\2\3\2\3\2\3\2\3\2\3\2\3\2\3\2\3\4\10\6\7\6\7\t\4\t\n\10\n\v\f\v\f\v\f\v\f\v\f\v\f\v\f\v\f\v\f\v\f\v\f\v\f\v\f\v\f\v\f\v\f\v\f\v\f\v\f\v\f\v\f\v\f\v\f\v\f\v\f\v\f\v\f\v\f\v\f\v\f\v\f\v\f\v\f\v\f\v\f\v\f\v\f\v\f\v\f\v\f\v\f\v\f\v\f\v\f\v\f\v\f\v\f\v\f\v\f\v\f\v\f\v\f\v\f\v\f\v\f\v\f\v\f\v\f\v\f\v\f\v\f\0\0\0021\0\0\0\0\0021\0\4\0\0\16\20\1\10\0\0\0\0\0\r\0\0\16\20\1\10\0\0\0\0\0\r\0\0\16\20\0\21\0\0\34 \1\25\0\0\34 \1\25\0\0\34 \1\32\0\0\16\20\0\21\0\0\34 \1\25\0\0\16\20\0\21LMT\0PMT\0WEST\0WET\0CET\0CEST\0WEMT\0\0\0\1\1\0\0\1\1\0\0\0\1\1\0\0\0\0\0\0\0\0\0\0\0\1\1TZif2\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\r\0\0\0\r\0\0\0\0\0\0\0\271\0\0\0\r\0\0\0\37\370\0\0\0\0\0\0\0\377\377\377\377k\310J\213\377\377\377\377\221`P\213\377\377\377\377\233Gx\360\377\377\377\377\233\327,p\377\377\377\377\234\274\221p\377\377\377\377\235\300H\360\377\377\377\377\236\211\376p\377\377\377\377\237\240*\360\377\377\377\377\240`\245\360\377\377\377\377\241\200\f\360\377\377\377\377\242.\22\360\377\377\377\377\243zL\360\377\377\377\377\2445\201\360\377\377\377\377\245^#p\377\377\377\377\246%5\360\377\377\377\377\247'\233\360\377\377\377\377\250X&p\377\377\377\377\251\7}\360\377\377\377\377\251\3564p\377\377\377\377\252\347_\360\377\377\377\377\253\327P\360\377\377\377\377\254\307A\360\377\377\377\377\255\311\247\360\377\377\377\377\256\247#\360\377\377\377\377\257\240Op\377\377\377\377\260\207\5\360\377\377\377\377\261\211k\360\377\377\377\377\262p\"p\377\377\377\377\263r\210p\377\377\377\377\264P\4p\377\377\377\377\265I/\360\377\377\377\377\266/\346p\377\377\377\377\2672Lp\377\377\377\377\270\17\310p\377\377\377\377\270\377\271p\377\377\377\377\271\357\252p\377\377\377\377\272\326`\360\377\377\377\377\273\330\306\360\377\377\377\377\274\310\267\360\377\377\377\377\275\270\250\360\377\377\377\377\276\237_p\377\377\377\377\277\230\212\360\377\377\377\377\300\232\360\360\377\377\377\377\301xl\360\377\377\377\377\302h]\360\377\377\377\377\303XN\360\377\377\377\377\304?\5p\377\377\377\377\30580\360\377\377\377\377\306:\226\360\377\377\377\377\307X\254p\377\377\377\377\307\332\t\240\377\377\377\377\310l'\340\377\377\377\377\314\347K\20\377\377\377\377\315\251\27\220\377\377\377\377\316\242C\20\377\377\377\377\317\2224\20\377\377\377\377\320O\341\340\377\377\377\377\320\211\361\360\377\377\377\377\321r\26\20\377\377\377\377\322N@\220\0\0\0\0\v\2739\0\0\0\0\0\f\253\33\360\0\0\0\0\r\244c\220\0\0\0\0\16\213\32\20\0\0\0\0\17\204E\220\0\0\0\0\20t6\220\0\0\0\0\21d'\220\0\0\0\0\22T\30\220\0\0\0\0\23MD\20\0\0\0\0\0243\372\220\0\0\0\0\25#\353\220\0\0\0\0\26\23\334\220\0\0\0\0\27\3\315\220\0\0\0\0\27\363\276\220\0\0\0\0\30\343\257\220\0\0\0\0\31\323\240\220\0\0\0\0\32\303\221\220\0\0\0\0\33\274\275\20\0\0\0\0\34\254\256\20\0\0\0\0\35\234\237\20\0\0\0\0\36\214\220\20\0\0\0\0\37|\201\20\0\0\0\0 lr\20\0\0\0\0!\\c\20\0\0\0\0\"LT\20\0\0\0\0#<E\20\0\0\0\0$,6\20\0\0\0\0%\34'\20\0\0\0\0&\f\30\20\0\0\0\0'\5C\220\0\0\0\0'\3654\220\0\0\0\0(\345%\220\0\0\0\0)\325\26\220\0\0\0\0*\305\7\220\0\0\0\0+\264\370\220\0\0\0\0,\244\351\220\0\0\0\0-\224\332\220\0\0\0\0.\204\313\220\0\0\0\0/t\274\220\0\0\0\0000d\255\220\0\0\0\0001]\331\20\0\0\0\0002r\264\20\0\0\0\0003=\273\20\0\0\0\0004R\226\20\0\0\0\0005\35\235\20\0\0\0\00062x\20\0\0\0\0006\375\177\20\0\0\0\0008\33\224\220\0\0\0\0008\335a\20\0\0\0\0009\373v\220\0\0\0\0:\275C\20\0\0\0\0;\333X\220\0"..., 4096) = 2971 | |
442 _llseek(4, -28, [2943], SEEK_CUR) = 0 | |
442 read(4, "\nCET-1CEST,M3.5.0,M10.5.0/3\n", 4096) = 28 | |
442 close(4) = 0 | |
442 getpid() = 442 | |
442 writev(2, [{iov_base="kfcgi[442]: worker unexpectedly exited", iov_len=38}, {iov_base="\n", iov_len=1}], 2) = 39 | |
442 socket(AF_UNIX, SOCK_DGRAM|SOCK_CLOEXEC, 0) = 4 | |
442 connect(4, {sa_family=AF_UNIX, sun_path="/dev/log"}, 110) = 0 | |
442 send(4, "<27>Mar 22 17:05:30 kfcgi[442]: worker unexpectedly exited", 58, MSG_NOSIGNAL) = 58 | |
442 close(3) = 0 | |
442 rt_sigaction(SIGCHLD, {sa_handler=SIG_DFL, sa_mask=[CHLD], sa_flags=SA_RESTORER|SA_RESTART, sa_restorer=0x76e998e0}, {sa_handler=0x4e2190, sa_mask=[CHLD], sa_flags=SA_RESTORER|SA_RESTART, sa_restorer=0x76e998e0}, 8) = 0 | |
442 kill(443, SIGTERM) = 0 | |
442 kill(444, SIGTERM) = 0 | |
442 kill(445, SIGTERM) = 0 | |
442 kill(446, SIGTERM) = 0 | |
442 kill(447, SIGTERM) = 0 | |
442 wait4(443, <unfinished ...> | |
446 <... execve resumed> ) = 0 | |
446 brk(NULL) = 0x3ab000 | |
446 brk(0x3abd08) = 0x3abd08 | |
446 set_tls(0x3ab4c0) = 0 | |
446 uname({sysname="Linux", nodename="rpi", release="4.14.27-1-ARCH", version="#1 SMP Sat Mar 17 00:42:16 UTC 2018", machine="armv6l", domainname="(none)"}) = 0 | |
446 readlink("/proc/self/exe", "/srv/http/kcgi", 4096) = 14 | |
446 brk(0x3ccd08) = 0x3ccd08 | |
446 brk(0x3cd000) = 0x3cd000 | |
446 rt_sigaction(SIGTERM, {sa_handler=0x1043c, sa_mask=[TERM], sa_flags=SA_RESTORER|SA_RESTART, sa_restorer=0x351a0}, {sa_handler=SIG_DFL, sa_mask=[], sa_flags=0}, 8) = 0 | |
446 rt_sigprocmask(SIG_BLOCK, [TERM], NULL, 8) = 0 | |
446 socketpair(AF_UNIX, SOCK_STREAM, 0, [3, 4]) = 0 | |
446 fcntl64(3, F_GETFL) = 0x2 (flags O_RDWR) | |
446 fcntl64(4, F_GETFL) = 0x2 (flags O_RDWR) | |
446 fcntl64(3, F_SETFL, O_RDWR|O_NONBLOCK) = 0 | |
446 fcntl64(4, F_SETFL, O_RDWR|O_NONBLOCK) = 0 | |
446 socketpair(AF_UNIX, SOCK_STREAM, 0, [5, 6]) = 0 | |
446 fcntl64(5, F_GETFL) = 0x2 (flags O_RDWR) | |
446 fcntl64(6, F_GETFL) = 0x2 (flags O_RDWR) | |
446 fcntl64(5, F_SETFL, O_RDWR|O_NONBLOCK) = 0 | |
446 fcntl64(6, F_SETFL, O_RDWR|O_NONBLOCK) = 0 | |
446 clone(child_stack=NULL, flags=CLONE_CHILD_CLEARTID|CLONE_CHILD_SETTID|SIGCHLD, child_tidptr=0x3ab068) = 450 | |
446 close(5) = 0 | |
446 close(3) = 0 | |
446 socketpair(AF_UNIX, SOCK_STREAM, 0, [3, 5]) = 0 | |
446 fcntl64(3, F_GETFL) = 0x2 (flags O_RDWR) | |
446 fcntl64(5, F_GETFL) = 0x2 (flags O_RDWR) | |
446 fcntl64(3, F_SETFL, O_RDWR|O_NONBLOCK) = 0 | |
446 fcntl64(5, F_SETFL, O_RDWR|O_NONBLOCK) = 0 | |
450 rt_sigaction(SIGTERM, {sa_handler=SIG_IGN, sa_mask=[TERM], sa_flags=SA_RESTORER|SA_RESTART, sa_restorer=0x351a0}, {sa_handler=0x1043c, sa_mask=[TERM], sa_flags=SA_RESTORER|SA_RESTART, sa_restorer=0x351a0}, 8) = 0 | |
446 clone( <unfinished ...> | |
450 close(0) = 0 | |
446 <... clone resumed> child_stack=NULL, flags=CLONE_CHILD_CLEARTID|CLONE_CHILD_SETTID|SIGCHLD, child_tidptr=0x3ab068) = 451 | |
450 close(1 <unfinished ...> | |
446 close(3 <unfinished ...> | |
450 <... close resumed> ) = 0 | |
450 close(6) = 0 | |
450 close(4) = 0 | |
450 prlimit64(0, RLIMIT_FSIZE, {rlim_cur=0, rlim_max=0}, NULL) = 0 | |
451 rt_sigaction(SIGTERM, {sa_handler=SIG_IGN, sa_mask=[TERM], sa_flags=SA_RESTORER|SA_RESTART, sa_restorer=0x351a0}, <unfinished ...> | |
450 prlimit64(0, RLIMIT_NPROC, {rlim_cur=0, rlim_max=0}, <unfinished ...> | |
451 <... rt_sigaction resumed> {sa_handler=0x1043c, sa_mask=[TERM], sa_flags=SA_RESTORER|SA_RESTART, sa_restorer=0x351a0}, 8) = 0 | |
450 <... prlimit64 resumed> NULL) = 0 | |
451 close(1 <unfinished ...> | |
450 rt_sigaction(SIGSYS, {sa_handler=0x17d78, sa_mask=[], sa_flags=SA_RESTORER|SA_SIGINFO, sa_restorer=0x351b0}, <unfinished ...> | |
451 <... close resumed> ) = 0 | |
450 <... rt_sigaction resumed> NULL, 8) = 0 | |
451 close(6) = 0 | |
451 close(5) = 0 | |
451 prlimit64(0, RLIMIT_FSIZE, {rlim_cur=0, rlim_max=0}, NULL) = 0 | |
451 prlimit64(0, RLIMIT_NPROC, {rlim_cur=0, rlim_max=0}, NULL) = 0 | |
451 rt_sigaction(SIGSYS, {sa_handler=0x17d78, sa_mask=[], sa_flags=SA_RESTORER|SA_SIGINFO, sa_restorer=0x351b0}, NULL, 8) = 0 | |
451 rt_sigprocmask(SIG_UNBLOCK, [SYS], NULL, 8) = 0 | |
451 prctl(PR_SET_NO_NEW_PRIVS, 1, 0, 0, 0) = 0 | |
451 prctl(PR_SET_SECCOMP, SECCOMP_MODE_FILTER, {len=45, filter=[BPF_STMT(BPF_LD|BPF_W|BPF_ABS, 0x4), BPF_JUMP(BPF_JMP|BPF_K|BPF_JEQ, 0x40000028, 0x1, 0), BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_TRAP), BPF_STMT(BPF_LD|BPF_W|BPF_ABS, 0), BPF_JUMP(BPF_JMP|BPF_K|BPF_JEQ, 0x5, 0, 0x1), BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_ERRNO|0xd), BPF_JUMP(BPF_JMP|BPF_K|BPF_JEQ, 0x14, 0, 0x1), BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_ALLOW), BPF_JUMP(BPF_JMP|BPF_K|BPF_JEQ, 0x4e, 0, 0x1), BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_ALLOW), BPF_JUMP(BPF_JMP|BPF_K|BPF_JEQ, 0x107, 0, 0x1), BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_ALLOW), BPF_JUMP(BPF_JMP|BPF_K|BPF_JEQ, 0x11d, 0, 0x1), BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_ALLOW), BPF_JUMP(BPF_JMP|BPF_K|BPF_JEQ, 0x37, 0, 0x1), BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_ALLOW), BPF_JUMP(BPF_JMP|BPF_K|BPF_JEQ, 0x128, 0, 0x1), BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_ALLOW), BPF_JUMP(BPF_JMP|BPF_K|BPF_JEQ, 0x129, 0, 0x1), BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_ALLOW), BPF_JUMP(BPF_JMP|BPF_K|BPF_JEQ, 0x3, 0, 0x1), BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_ALLOW), BPF_JUMP(BPF_JMP|BPF_K|BPF_JEQ, 0x4, 0, 0x1), BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_ALLOW), BPF_JUMP(BPF_JMP|BPF_K|BPF_JEQ, 0x6, 0, 0x1), BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_ALLOW), BPF_JUMP(BPF_JMP|BPF_K|BPF_JEQ, 0x125, 0, 0x1), BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_ALLOW), BPF_JUMP(BPF_JMP|BPF_K|BPF_JEQ, 0x2d, 0, 0x1), BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_ALLOW), BPF_JUMP(BPF_JMP|BPF_K|BPF_JEQ, 0xa8, 0, 0x1), BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_ALLOW), BPF_JUMP(BPF_JMP|BPF_K|BPF_JEQ, 0x8e, 0, 0x1), BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_ALLOW), BPF_JUMP(BPF_JMP|BPF_K|BPF_JEQ, 0xdc, 0, 0x1), BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_ALLOW), BPF_JUMP(BPF_JMP|BPF_K|BPF_JEQ, 0xc0, 0, 0x1), BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_ALLOW), BPF_JUMP(BPF_JMP|BPF_K|BPF_JEQ, 0x5b, 0, 0x1), BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_ALLOW), BPF_JUMP(BPF_JMP|BPF_K|BPF_JEQ, 0xf8, 0, 0x1), BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_ALLOW), BPF_JUMP(BPF_JMP|BPF_K|BPF_JEQ, 0xaf, 0, 0x1), BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_ALLOW), BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_TRAP)]}) = 0 | |
451 fcntl64(0, F_GETFL <unfinished ...> | |
451 --- SIGSYS {si_signo=SIGSYS, si_code=SYS_SECCOMP, si_call_addr=0x51d2c, si_syscall=__NR_fcntl64, si_arch=AUDIT_ARCH_ARM} --- | |
451 <... fcntl64 resumed> ) = 0x2 (flags O_RDWR) | |
451 write(86, "ssh_sandbox_violation: unexpected system call (arch:0x40000028,syscall:221 @ 0x51d2c)\n", 86) = 1 | |
451 +++ exited with 1 +++ | |
450 rt_sigprocmask(SIG_UNBLOCK, [SYS], NULL, 8) = 0 | |
450 prctl(PR_SET_NO_NEW_PRIVS, 1, 0, 0, 0) = 0 | |
450 prctl(PR_SET_SECCOMP, SECCOMP_MODE_FILTER, {len=39, filter=[BPF_STMT(BPF_LD|BPF_W|BPF_ABS, 0x4), BPF_JUMP(BPF_JMP|BPF_K|BPF_JEQ, 0x40000028, 0x1, 0), BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_TRAP), BPF_STMT(BPF_LD|BPF_W|BPF_ABS, 0), BPF_JUMP(BPF_JMP|BPF_K|BPF_JEQ, 0x5, 0, 0x1), BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_ERRNO|0xd), BPF_JUMP(BPF_JMP|BPF_K|BPF_JEQ, 0x14, 0, 0x1), BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_ALLOW), BPF_JUMP(BPF_JMP|BPF_K|BPF_JEQ, 0x4e, 0, 0x1), BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_ALLOW), BPF_JUMP(BPF_JMP|BPF_K|BPF_JEQ, 0x107, 0, 0x1), BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_ALLOW), BPF_JUMP(BPF_JMP|BPF_K|BPF_JEQ, 0x3, 0, 0x1), BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_ALLOW), BPF_JUMP(BPF_JMP|BPF_K|BPF_JEQ, 0x4, 0, 0x1), BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_ALLOW), BPF_JUMP(BPF_JMP|BPF_K|BPF_JEQ, 0x6, 0, 0x1), BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_ALLOW), BPF_JUMP(BPF_JMP|BPF_K|BPF_JEQ, 0x125, 0, 0x1), BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_ALLOW), BPF_JUMP(BPF_JMP|BPF_K|BPF_JEQ, 0x2d, 0, 0x1), BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_ALLOW), BPF_JUMP(BPF_JMP|BPF_K|BPF_JEQ, 0xa8, 0, 0x1), BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_ALLOW), BPF_JUMP(BPF_JMP|BPF_K|BPF_JEQ, 0x8e, 0, 0x1), BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_ALLOW), BPF_JUMP(BPF_JMP|BPF_K|BPF_JEQ, 0xdc, 0, 0x1), BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_ALLOW), BPF_JUMP(BPF_JMP|BPF_K|BPF_JEQ, 0xc0, 0, 0x1), BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_ALLOW), BPF_JUMP(BPF_JMP|BPF_K|BPF_JEQ, 0xa3, 0, 0x1), BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_ALLOW), BPF_JUMP(BPF_JMP|BPF_K|BPF_JEQ, 0x5b, 0, 0x1), BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_ALLOW), BPF_JUMP(BPF_JMP|BPF_K|BPF_JEQ, 0xf8, 0, 0x1), BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_ALLOW), BPF_JUMP(BPF_JMP|BPF_K|BPF_JEQ, 0xaf, 0, 0x1), BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_ALLOW), BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_TRAP)]}) = 0 | |
450 poll([{fd=3, events=POLLIN}], 1, -1 <unfinished ...> | |
446 <... close resumed> ) = 0 | |
446 close(4 <unfinished ...> | |
450 <... poll resumed> ) = 1 ([{fd=3, revents=POLLIN|POLLHUP}]) | |
450 read(3, "", 4) = 0 | |
450 close(5) = 0 | |
450 close(3) = 0 | |
450 exit_group(0) = ? | |
450 +++ exited with 0 +++ | |
446 <... close resumed> ) = 0 | |
446 close(0) = 0 | |
446 rt_sigprocmask(SIG_UNBLOCK, [TERM], NULL, 8) = 0 | |
446 --- SIGTERM {si_signo=SIGTERM, si_code=SI_USER, si_pid=442, si_uid=0} --- | |
446 sigreturn({mask=[HUP CHLD]}) = 0 | |
446 poll([{fd=5, events=POLLIN}], 1, 1000) = 1 ([{fd=5, revents=POLLIN|POLLHUP}]) | |
446 rt_sigprocmask(SIG_UNBLOCK, [TERM], NULL, 8) = 0 | |
446 close(5) = 0 | |
446 close(6) = 0 | |
446 wait4(450, [{WIFEXITED(s) && WEXITSTATUS(s) == 0}], 0, NULL) = 450 | |
446 wait4(451, [{WIFEXITED(s) && WEXITSTATUS(s) == 1}], 0, NULL) = 451 | |
446 write(2, "wrappers.c:181: child status 1\n", 31) = 31 | |
446 exit_group(0) = ? | |
446 +++ exited with 0 +++ | |
445 <... close resumed> ) = 0 | |
445 execve("/srv/http/kcgi", ["/srv/http/kcgi"], ["LANG=en_US.UTF-8", "TERM=screen", "PATH=/usr/local/sbin:/usr/local/bin:/usr/bin:/usr/bin/site_perl:/usr/bin/vendor_perl:/usr/bin/core_perl:/usr/bin/site_perl:/usr/bin/vendor_perl:/usr/bin/core_perl", "MAIL=/var/mail/root", "LOGNAME=root", "USER=root", "USERNAME=root", "HOME=/root", "SHELL=/bin/bash", "SUDO_COMMAND=/usr/bin/strace -s 2048 -f -v -o /srv/http/foo/kfcgi.strace kfcgi -d -v -s /run/httpd.sock -p / -- /srv/http/kcgi", "SUDO_USER=xse", "SUDO_UID=1001", "SUDO_GID=1001"]) = 0 | |
445 brk(NULL) = 0xb11000 | |
445 brk(0xb11d08) = 0xb11d08 | |
445 set_tls(0xb114c0) = 0 | |
445 uname({sysname="Linux", nodename="rpi", release="4.14.27-1-ARCH", version="#1 SMP Sat Mar 17 00:42:16 UTC 2018", machine="armv6l", domainname="(none)"}) = 0 | |
445 readlink("/proc/self/exe", "/srv/http/kcgi", 4096) = 14 | |
445 brk(0xb32d08) = 0xb32d08 | |
445 brk(0xb33000) = 0xb33000 | |
445 rt_sigaction(SIGTERM, {sa_handler=0x1043c, sa_mask=[TERM], sa_flags=SA_RESTORER|SA_RESTART, sa_restorer=0x351a0}, {sa_handler=SIG_DFL, sa_mask=[], sa_flags=0}, 8) = 0 | |
445 rt_sigprocmask(SIG_BLOCK, [TERM], NULL, 8) = 0 | |
445 socketpair(AF_UNIX, SOCK_STREAM, 0, [3, 4]) = 0 | |
445 fcntl64(3, F_GETFL) = 0x2 (flags O_RDWR) | |
445 fcntl64(4, F_GETFL) = 0x2 (flags O_RDWR) | |
445 fcntl64(3, F_SETFL, O_RDWR|O_NONBLOCK) = 0 | |
445 fcntl64(4, F_SETFL, O_RDWR|O_NONBLOCK) = 0 | |
445 socketpair(AF_UNIX, SOCK_STREAM, 0, [5, 6]) = 0 | |
445 fcntl64(5, F_GETFL) = 0x2 (flags O_RDWR) | |
445 fcntl64(6, F_GETFL) = 0x2 (flags O_RDWR) | |
445 fcntl64(5, F_SETFL, O_RDWR|O_NONBLOCK) = 0 | |
445 fcntl64(6, F_SETFL, O_RDWR|O_NONBLOCK) = 0 | |
445 clone(child_stack=NULL, flags=CLONE_CHILD_CLEARTID|CLONE_CHILD_SETTID|SIGCHLD, child_tidptr=0xb11068) = 452 | |
445 close(5) = 0 | |
445 close(3) = 0 | |
445 socketpair(AF_UNIX, SOCK_STREAM, 0, [3, 5]) = 0 | |
445 fcntl64(3, F_GETFL) = 0x2 (flags O_RDWR) | |
445 fcntl64(5, F_GETFL) = 0x2 (flags O_RDWR) | |
445 fcntl64(3, F_SETFL, O_RDWR|O_NONBLOCK) = 0 | |
445 fcntl64(5, F_SETFL, O_RDWR|O_NONBLOCK) = 0 | |
452 rt_sigaction(SIGTERM, {sa_handler=SIG_IGN, sa_mask=[TERM], sa_flags=SA_RESTORER|SA_RESTART, sa_restorer=0x351a0}, <unfinished ...> | |
445 clone(child_stack=NULL, flags=CLONE_CHILD_CLEARTID|CLONE_CHILD_SETTID|SIGCHLD, child_tidptr=0xb11068) = 453 | |
452 <... rt_sigaction resumed> {sa_handler=0x1043c, sa_mask=[TERM], sa_flags=SA_RESTORER|SA_RESTART, sa_restorer=0x351a0}, 8) = 0 | |
445 close(3 <unfinished ...> | |
452 close(0 <unfinished ...> | |
445 <... close resumed> ) = 0 | |
452 <... close resumed> ) = 0 | |
452 close(1) = 0 | |
452 close(6) = 0 | |
453 rt_sigaction(SIGTERM, {sa_handler=SIG_IGN, sa_mask=[TERM], sa_flags=SA_RESTORER|SA_RESTART, sa_restorer=0x351a0}, <unfinished ...> | |
452 close(4 <unfinished ...> | |
453 <... rt_sigaction resumed> {sa_handler=0x1043c, sa_mask=[TERM], sa_flags=SA_RESTORER|SA_RESTART, sa_restorer=0x351a0}, 8) = 0 | |
452 <... close resumed> ) = 0 | |
453 close(1 <unfinished ...> | |
452 prlimit64(0, RLIMIT_FSIZE, {rlim_cur=0, rlim_max=0}, <unfinished ...> | |
453 <... close resumed> ) = 0 | |
452 <... prlimit64 resumed> NULL) = 0 | |
453 close(6) = 0 | |
453 close(5) = 0 | |
453 prlimit64(0, RLIMIT_FSIZE, {rlim_cur=0, rlim_max=0}, NULL) = 0 | |
453 prlimit64(0, RLIMIT_NPROC, {rlim_cur=0, rlim_max=0}, NULL) = 0 | |
453 rt_sigaction(SIGSYS, {sa_handler=0x17d78, sa_mask=[], sa_flags=SA_RESTORER|SA_SIGINFO, sa_restorer=0x351b0}, NULL, 8) = 0 | |
453 rt_sigprocmask(SIG_UNBLOCK, [SYS], NULL, 8) = 0 | |
453 prctl(PR_SET_NO_NEW_PRIVS, 1, 0, 0, 0) = 0 | |
453 prctl(PR_SET_SECCOMP, SECCOMP_MODE_FILTER, {len=45, filter=[BPF_STMT(BPF_LD|BPF_W|BPF_ABS, 0x4), BPF_JUMP(BPF_JMP|BPF_K|BPF_JEQ, 0x40000028, 0x1, 0), BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_TRAP), BPF_STMT(BPF_LD|BPF_W|BPF_ABS, 0), BPF_JUMP(BPF_JMP|BPF_K|BPF_JEQ, 0x5, 0, 0x1), BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_ERRNO|0xd), BPF_JUMP(BPF_JMP|BPF_K|BPF_JEQ, 0x14, 0, 0x1), BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_ALLOW), BPF_JUMP(BPF_JMP|BPF_K|BPF_JEQ, 0x4e, 0, 0x1), BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_ALLOW), BPF_JUMP(BPF_JMP|BPF_K|BPF_JEQ, 0x107, 0, 0x1), BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_ALLOW), BPF_JUMP(BPF_JMP|BPF_K|BPF_JEQ, 0x11d, 0, 0x1), BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_ALLOW), BPF_JUMP(BPF_JMP|BPF_K|BPF_JEQ, 0x37, 0, 0x1), BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_ALLOW), BPF_JUMP(BPF_JMP|BPF_K|BPF_JEQ, 0x128, 0, 0x1), BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_ALLOW), BPF_JUMP(BPF_JMP|BPF_K|BPF_JEQ, 0x129, 0, 0x1), BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_ALLOW), BPF_JUMP(BPF_JMP|BPF_K|BPF_JEQ, 0x3, 0, 0x1), BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_ALLOW), BPF_JUMP(BPF_JMP|BPF_K|BPF_JEQ, 0x4, 0, 0x1), BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_ALLOW), BPF_JUMP(BPF_JMP|BPF_K|BPF_JEQ, 0x6, 0, 0x1), BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_ALLOW), BPF_JUMP(BPF_JMP|BPF_K|BPF_JEQ, 0x125, 0, 0x1), BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_ALLOW), BPF_JUMP(BPF_JMP|BPF_K|BPF_JEQ, 0x2d, 0, 0x1), BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_ALLOW), BPF_JUMP(BPF_JMP|BPF_K|BPF_JEQ, 0xa8, 0, 0x1), BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_ALLOW), BPF_JUMP(BPF_JMP|BPF_K|BPF_JEQ, 0x8e, 0, 0x1), BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_ALLOW), BPF_JUMP(BPF_JMP|BPF_K|BPF_JEQ, 0xdc, 0, 0x1), BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_ALLOW), BPF_JUMP(BPF_JMP|BPF_K|BPF_JEQ, 0xc0, 0, 0x1), BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_ALLOW), BPF_JUMP(BPF_JMP|BPF_K|BPF_JEQ, 0x5b, 0, 0x1), BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_ALLOW), BPF_JUMP(BPF_JMP|BPF_K|BPF_JEQ, 0xf8, 0, 0x1), BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_ALLOW), BPF_JUMP(BPF_JMP|BPF_K|BPF_JEQ, 0xaf, 0, 0x1), BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_ALLOW), BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_TRAP)]}) = 0 | |
453 fcntl64(0, F_GETFL <unfinished ...> | |
453 --- SIGSYS {si_signo=SIGSYS, si_code=SYS_SECCOMP, si_call_addr=0x51d2c, si_syscall=__NR_fcntl64, si_arch=AUDIT_ARCH_ARM} --- | |
453 <... fcntl64 resumed> ) = 0x2 (flags O_RDWR) | |
453 write(86, "ssh_sandbox_violation: unexpected system call (arch:0x40000028,syscall:221 @ 0x51d2c)\n", 86) = 1 | |
453 +++ exited with 1 +++ | |
452 prlimit64(0, RLIMIT_NPROC, {rlim_cur=0, rlim_max=0}, NULL) = 0 | |
452 rt_sigaction(SIGSYS, {sa_handler=0x17d78, sa_mask=[], sa_flags=SA_RESTORER|SA_SIGINFO, sa_restorer=0x351b0}, NULL, 8) = 0 | |
452 rt_sigprocmask(SIG_UNBLOCK, [SYS], NULL, 8) = 0 | |
452 prctl(PR_SET_NO_NEW_PRIVS, 1, 0, 0, 0) = 0 | |
452 prctl(PR_SET_SECCOMP, SECCOMP_MODE_FILTER, {len=39, filter=[BPF_STMT(BPF_LD|BPF_W|BPF_ABS, 0x4), BPF_JUMP(BPF_JMP|BPF_K|BPF_JEQ, 0x40000028, 0x1, 0), BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_TRAP), BPF_STMT(BPF_LD|BPF_W|BPF_ABS, 0), BPF_JUMP(BPF_JMP|BPF_K|BPF_JEQ, 0x5, 0, 0x1), BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_ERRNO|0xd), BPF_JUMP(BPF_JMP|BPF_K|BPF_JEQ, 0x14, 0, 0x1), BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_ALLOW), BPF_JUMP(BPF_JMP|BPF_K|BPF_JEQ, 0x4e, 0, 0x1), BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_ALLOW), BPF_JUMP(BPF_JMP|BPF_K|BPF_JEQ, 0x107, 0, 0x1), BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_ALLOW), BPF_JUMP(BPF_JMP|BPF_K|BPF_JEQ, 0x3, 0, 0x1), BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_ALLOW), BPF_JUMP(BPF_JMP|BPF_K|BPF_JEQ, 0x4, 0, 0x1), BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_ALLOW), BPF_JUMP(BPF_JMP|BPF_K|BPF_JEQ, 0x6, 0, 0x1), BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_ALLOW), BPF_JUMP(BPF_JMP|BPF_K|BPF_JEQ, 0x125, 0, 0x1), BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_ALLOW), BPF_JUMP(BPF_JMP|BPF_K|BPF_JEQ, 0x2d, 0, 0x1), BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_ALLOW), BPF_JUMP(BPF_JMP|BPF_K|BPF_JEQ, 0xa8, 0, 0x1), BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_ALLOW), BPF_JUMP(BPF_JMP|BPF_K|BPF_JEQ, 0x8e, 0, 0x1), BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_ALLOW), BPF_JUMP(BPF_JMP|BPF_K|BPF_JEQ, 0xdc, 0, 0x1), BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_ALLOW), BPF_JUMP(BPF_JMP|BPF_K|BPF_JEQ, 0xc0, 0, 0x1), BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_ALLOW), BPF_JUMP(BPF_JMP|BPF_K|BPF_JEQ, 0xa3, 0, 0x1), BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_ALLOW), BPF_JUMP(BPF_JMP|BPF_K|BPF_JEQ, 0x5b, 0, 0x1), BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_ALLOW), BPF_JUMP(BPF_JMP|BPF_K|BPF_JEQ, 0xf8, 0, 0x1), BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_ALLOW), BPF_JUMP(BPF_JMP|BPF_K|BPF_JEQ, 0xaf, 0, 0x1), BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_ALLOW), BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_TRAP)]}) = 0 | |
452 poll([{fd=3, events=POLLIN}], 1, -1 <unfinished ...> | |
445 close(4 <unfinished ...> | |
452 <... poll resumed> ) = 1 ([{fd=3, revents=POLLIN|POLLHUP}]) | |
452 read(3, "", 4) = 0 | |
452 close(5) = 0 | |
452 close(3) = 0 | |
452 exit_group(0) = ? | |
452 +++ exited with 0 +++ | |
445 <... close resumed> ) = 0 | |
445 close(0) = 0 | |
445 rt_sigprocmask(SIG_UNBLOCK, [TERM], NULL, 8) = 0 | |
445 --- SIGTERM {si_signo=SIGTERM, si_code=SI_USER, si_pid=442, si_uid=0} --- | |
445 sigreturn({mask=[HUP CHLD]}) = 0 | |
445 poll([{fd=5, events=POLLIN}], 1, 1000) = 1 ([{fd=5, revents=POLLIN|POLLHUP}]) | |
445 rt_sigprocmask(SIG_UNBLOCK, [TERM], NULL, 8) = 0 | |
445 close(5) = 0 | |
445 close(6) = 0 | |
445 wait4(452, [{WIFEXITED(s) && WEXITSTATUS(s) == 0}], 0, NULL) = 452 | |
445 wait4(453, [{WIFEXITED(s) && WEXITSTATUS(s) == 1}], 0, NULL) = 453 | |
445 write(2, "wrappers.c:181: child status 1\n", 31) = 31 | |
445 exit_group(0) = ? | |
445 +++ exited with 0 +++ | |
444 <... close resumed> ) = 0 | |
444 execve("/srv/http/kcgi", ["/srv/http/kcgi"], ["LANG=en_US.UTF-8", "TERM=screen", "PATH=/usr/local/sbin:/usr/local/bin:/usr/bin:/usr/bin/site_perl:/usr/bin/vendor_perl:/usr/bin/core_perl:/usr/bin/site_perl:/usr/bin/vendor_perl:/usr/bin/core_perl", "MAIL=/var/mail/root", "LOGNAME=root", "USER=root", "USERNAME=root", "HOME=/root", "SHELL=/bin/bash", "SUDO_COMMAND=/usr/bin/strace -s 2048 -f -v -o /srv/http/foo/kfcgi.strace kfcgi -d -v -s /run/httpd.sock -p / -- /srv/http/kcgi", "SUDO_USER=xse", "SUDO_UID=1001", "SUDO_GID=1001"]) = 0 | |
444 brk(NULL) = 0x1e10000 | |
444 brk(0x1e10d08) = 0x1e10d08 | |
444 set_tls(0x1e104c0) = 0 | |
444 uname({sysname="Linux", nodename="rpi", release="4.14.27-1-ARCH", version="#1 SMP Sat Mar 17 00:42:16 UTC 2018", machine="armv6l", domainname="(none)"}) = 0 | |
444 readlink("/proc/self/exe", "/srv/http/kcgi", 4096) = 14 | |
444 brk(0x1e31d08) = 0x1e31d08 | |
444 brk(0x1e32000) = 0x1e32000 | |
444 rt_sigaction(SIGTERM, {sa_handler=0x1043c, sa_mask=[TERM], sa_flags=SA_RESTORER|SA_RESTART, sa_restorer=0x351a0}, {sa_handler=SIG_DFL, sa_mask=[], sa_flags=0}, 8) = 0 | |
444 rt_sigprocmask(SIG_BLOCK, [TERM], NULL, 8) = 0 | |
444 socketpair(AF_UNIX, SOCK_STREAM, 0, [3, 4]) = 0 | |
444 fcntl64(3, F_GETFL) = 0x2 (flags O_RDWR) | |
444 fcntl64(4, F_GETFL) = 0x2 (flags O_RDWR) | |
444 fcntl64(3, F_SETFL, O_RDWR|O_NONBLOCK) = 0 | |
444 fcntl64(4, F_SETFL, O_RDWR|O_NONBLOCK) = 0 | |
444 socketpair(AF_UNIX, SOCK_STREAM, 0, [5, 6]) = 0 | |
444 fcntl64(5, F_GETFL) = 0x2 (flags O_RDWR) | |
444 fcntl64(6, F_GETFL) = 0x2 (flags O_RDWR) | |
444 fcntl64(5, F_SETFL, O_RDWR|O_NONBLOCK) = 0 | |
444 fcntl64(6, F_SETFL, O_RDWR|O_NONBLOCK) = 0 | |
444 clone(child_stack=NULL, flags=CLONE_CHILD_CLEARTID|CLONE_CHILD_SETTID|SIGCHLD, child_tidptr=0x1e10068) = 454 | |
444 close(5) = 0 | |
444 close(3) = 0 | |
444 socketpair(AF_UNIX, SOCK_STREAM, 0, [3, 5]) = 0 | |
444 fcntl64(3, F_GETFL) = 0x2 (flags O_RDWR) | |
444 fcntl64(5, F_GETFL) = 0x2 (flags O_RDWR) | |
444 fcntl64(3, F_SETFL, O_RDWR|O_NONBLOCK) = 0 | |
444 fcntl64(5, F_SETFL, O_RDWR|O_NONBLOCK) = 0 | |
444 clone( <unfinished ...> | |
454 rt_sigaction(SIGTERM, {sa_handler=SIG_IGN, sa_mask=[TERM], sa_flags=SA_RESTORER|SA_RESTART, sa_restorer=0x351a0}, <unfinished ...> | |
444 <... clone resumed> child_stack=NULL, flags=CLONE_CHILD_CLEARTID|CLONE_CHILD_SETTID|SIGCHLD, child_tidptr=0x1e10068) = 455 | |
454 <... rt_sigaction resumed> {sa_handler=0x1043c, sa_mask=[TERM], sa_flags=SA_RESTORER|SA_RESTART, sa_restorer=0x351a0}, 8) = 0 | |
444 close(3 <unfinished ...> | |
454 close(0 <unfinished ...> | |
444 <... close resumed> ) = 0 | |
454 <... close resumed> ) = 0 | |
444 close(4 <unfinished ...> | |
454 close(1 <unfinished ...> | |
455 rt_sigaction(SIGTERM, {sa_handler=SIG_IGN, sa_mask=[TERM], sa_flags=SA_RESTORER|SA_RESTART, sa_restorer=0x351a0}, <unfinished ...> | |
454 <... close resumed> ) = 0 | |
455 <... rt_sigaction resumed> {sa_handler=0x1043c, sa_mask=[TERM], sa_flags=SA_RESTORER|SA_RESTART, sa_restorer=0x351a0}, 8) = 0 | |
454 close(6 <unfinished ...> | |
455 close(1 <unfinished ...> | |
454 <... close resumed> ) = 0 | |
455 <... close resumed> ) = 0 | |
454 close(4 <unfinished ...> | |
455 close(6 <unfinished ...> | |
454 <... close resumed> ) = 0 | |
455 <... close resumed> ) = 0 | |
455 close(5) = 0 | |
455 prlimit64(0, RLIMIT_FSIZE, {rlim_cur=0, rlim_max=0}, NULL) = 0 | |
455 prlimit64(0, RLIMIT_NPROC, {rlim_cur=0, rlim_max=0}, NULL) = 0 | |
455 rt_sigaction(SIGSYS, {sa_handler=0x17d78, sa_mask=[], sa_flags=SA_RESTORER|SA_SIGINFO, sa_restorer=0x351b0}, NULL, 8) = 0 | |
455 rt_sigprocmask(SIG_UNBLOCK, [SYS], NULL, 8) = 0 | |
455 prctl(PR_SET_NO_NEW_PRIVS, 1, 0, 0, 0) = 0 | |
455 prctl(PR_SET_SECCOMP, SECCOMP_MODE_FILTER, {len=45, filter=[BPF_STMT(BPF_LD|BPF_W|BPF_ABS, 0x4), BPF_JUMP(BPF_JMP|BPF_K|BPF_JEQ, 0x40000028, 0x1, 0), BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_TRAP), BPF_STMT(BPF_LD|BPF_W|BPF_ABS, 0), BPF_JUMP(BPF_JMP|BPF_K|BPF_JEQ, 0x5, 0, 0x1), BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_ERRNO|0xd), BPF_JUMP(BPF_JMP|BPF_K|BPF_JEQ, 0x14, 0, 0x1), BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_ALLOW), BPF_JUMP(BPF_JMP|BPF_K|BPF_JEQ, 0x4e, 0, 0x1), BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_ALLOW), BPF_JUMP(BPF_JMP|BPF_K|BPF_JEQ, 0x107, 0, 0x1), BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_ALLOW), BPF_JUMP(BPF_JMP|BPF_K|BPF_JEQ, 0x11d, 0, 0x1), BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_ALLOW), BPF_JUMP(BPF_JMP|BPF_K|BPF_JEQ, 0x37, 0, 0x1), BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_ALLOW), BPF_JUMP(BPF_JMP|BPF_K|BPF_JEQ, 0x128, 0, 0x1), BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_ALLOW), BPF_JUMP(BPF_JMP|BPF_K|BPF_JEQ, 0x129, 0, 0x1), BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_ALLOW), BPF_JUMP(BPF_JMP|BPF_K|BPF_JEQ, 0x3, 0, 0x1), BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_ALLOW), BPF_JUMP(BPF_JMP|BPF_K|BPF_JEQ, 0x4, 0, 0x1), BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_ALLOW), BPF_JUMP(BPF_JMP|BPF_K|BPF_JEQ, 0x6, 0, 0x1), BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_ALLOW), BPF_JUMP(BPF_JMP|BPF_K|BPF_JEQ, 0x125, 0, 0x1), BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_ALLOW), BPF_JUMP(BPF_JMP|BPF_K|BPF_JEQ, 0x2d, 0, 0x1), BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_ALLOW), BPF_JUMP(BPF_JMP|BPF_K|BPF_JEQ, 0xa8, 0, 0x1), BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_ALLOW), BPF_JUMP(BPF_JMP|BPF_K|BPF_JEQ, 0x8e, 0, 0x1), BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_ALLOW), BPF_JUMP(BPF_JMP|BPF_K|BPF_JEQ, 0xdc, 0, 0x1), BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_ALLOW), BPF_JUMP(BPF_JMP|BPF_K|BPF_JEQ, 0xc0, 0, 0x1), BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_ALLOW), BPF_JUMP(BPF_JMP|BPF_K|BPF_JEQ, 0x5b, 0, 0x1), BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_ALLOW), BPF_JUMP(BPF_JMP|BPF_K|BPF_JEQ, 0xf8, 0, 0x1), BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_ALLOW), BPF_JUMP(BPF_JMP|BPF_K|BPF_JEQ, 0xaf, 0, 0x1), BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_ALLOW), BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_TRAP)]}) = 0 | |
455 fcntl64(0, F_GETFL <unfinished ...> | |
455 --- SIGSYS {si_signo=SIGSYS, si_code=SYS_SECCOMP, si_call_addr=0x51d2c, si_syscall=__NR_fcntl64, si_arch=AUDIT_ARCH_ARM} --- | |
455 <... fcntl64 resumed> ) = 0x2 (flags O_RDWR) | |
455 write(86, "ssh_sandbox_violation: unexpected system call (arch:0x40000028,syscall:221 @ 0x51d2c)\n", 86) = 1 | |
455 +++ exited with 1 +++ | |
454 prlimit64(0, RLIMIT_FSIZE, {rlim_cur=0, rlim_max=0}, NULL) = 0 | |
454 prlimit64(0, RLIMIT_NPROC, {rlim_cur=0, rlim_max=0}, NULL) = 0 | |
454 rt_sigaction(SIGSYS, {sa_handler=0x17d78, sa_mask=[], sa_flags=SA_RESTORER|SA_SIGINFO, sa_restorer=0x351b0}, NULL, 8) = 0 | |
454 rt_sigprocmask(SIG_UNBLOCK, [SYS], NULL, 8) = 0 | |
454 prctl(PR_SET_NO_NEW_PRIVS, 1, 0, 0, 0) = 0 | |
454 prctl(PR_SET_SECCOMP, SECCOMP_MODE_FILTER, {len=39, filter=[BPF_STMT(BPF_LD|BPF_W|BPF_ABS, 0x4), BPF_JUMP(BPF_JMP|BPF_K|BPF_JEQ, 0x40000028, 0x1, 0), BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_TRAP), BPF_STMT(BPF_LD|BPF_W|BPF_ABS, 0), BPF_JUMP(BPF_JMP|BPF_K|BPF_JEQ, 0x5, 0, 0x1), BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_ERRNO|0xd), BPF_JUMP(BPF_JMP|BPF_K|BPF_JEQ, 0x14, 0, 0x1), BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_ALLOW), BPF_JUMP(BPF_JMP|BPF_K|BPF_JEQ, 0x4e, 0, 0x1), BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_ALLOW), BPF_JUMP(BPF_JMP|BPF_K|BPF_JEQ, 0x107, 0, 0x1), BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_ALLOW), BPF_JUMP(BPF_JMP|BPF_K|BPF_JEQ, 0x3, 0, 0x1), BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_ALLOW), BPF_JUMP(BPF_JMP|BPF_K|BPF_JEQ, 0x4, 0, 0x1), BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_ALLOW), BPF_JUMP(BPF_JMP|BPF_K|BPF_JEQ, 0x6, 0, 0x1), BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_ALLOW), BPF_JUMP(BPF_JMP|BPF_K|BPF_JEQ, 0x125, 0, 0x1), BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_ALLOW), BPF_JUMP(BPF_JMP|BPF_K|BPF_JEQ, 0x2d, 0, 0x1), BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_ALLOW), BPF_JUMP(BPF_JMP|BPF_K|BPF_JEQ, 0xa8, 0, 0x1), BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_ALLOW), BPF_JUMP(BPF_JMP|BPF_K|BPF_JEQ, 0x8e, 0, 0x1), BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_ALLOW), BPF_JUMP(BPF_JMP|BPF_K|BPF_JEQ, 0xdc, 0, 0x1), BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_ALLOW), BPF_JUMP(BPF_JMP|BPF_K|BPF_JEQ, 0xc0, 0, 0x1), BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_ALLOW), BPF_JUMP(BPF_JMP|BPF_K|BPF_JEQ, 0xa3, 0, 0x1), BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_ALLOW), BPF_JUMP(BPF_JMP|BPF_K|BPF_JEQ, 0x5b, 0, 0x1), BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_ALLOW), BPF_JUMP(BPF_JMP|BPF_K|BPF_JEQ, 0xf8, 0, 0x1), BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_ALLOW), BPF_JUMP(BPF_JMP|BPF_K|BPF_JEQ, 0xaf, 0, 0x1), BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_ALLOW), BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_TRAP)]}) = 0 | |
454 poll([{fd=3, events=POLLIN}], 1, -1) = 1 ([{fd=3, revents=POLLIN|POLLHUP}]) | |
454 read(3, "", 4) = 0 | |
454 close(5) = 0 | |
454 close(3) = 0 | |
454 exit_group(0) = ? | |
454 +++ exited with 0 +++ | |
444 <... close resumed> ) = 0 | |
444 close(0) = 0 | |
444 rt_sigprocmask(SIG_UNBLOCK, [TERM], NULL, 8) = 0 | |
444 --- SIGTERM {si_signo=SIGTERM, si_code=SI_USER, si_pid=442, si_uid=0} --- | |
444 sigreturn({mask=[HUP CHLD]}) = 0 | |
444 poll([{fd=5, events=POLLIN}], 1, 1000) = 1 ([{fd=5, revents=POLLIN|POLLHUP}]) | |
444 rt_sigprocmask(SIG_UNBLOCK, [TERM], NULL, 8) = 0 | |
444 close(5) = 0 | |
444 close(6) = 0 | |
444 wait4(454, [{WIFEXITED(s) && WEXITSTATUS(s) == 0}], 0, NULL) = 454 | |
444 wait4(455, [{WIFEXITED(s) && WEXITSTATUS(s) == 1}], 0, NULL) = 455 | |
444 write(2, "wrappers.c:181: child status 1\n", 31) = 31 | |
444 exit_group(0) = ? | |
444 +++ exited with 0 +++ | |
443 close(3) = 0 | |
443 execve("/srv/http/kcgi", ["/srv/http/kcgi"], ["LANG=en_US.UTF-8", "TERM=screen", "PATH=/usr/local/sbin:/usr/local/bin:/usr/bin:/usr/bin/site_perl:/usr/bin/vendor_perl:/usr/bin/core_perl:/usr/bin/site_perl:/usr/bin/vendor_perl:/usr/bin/core_perl", "MAIL=/var/mail/root", "LOGNAME=root", "USER=root", "USERNAME=root", "HOME=/root", "SHELL=/bin/bash", "SUDO_COMMAND=/usr/bin/strace -s 2048 -f -v -o /srv/http/foo/kfcgi.strace kfcgi -d -v -s /run/httpd.sock -p / -- /srv/http/kcgi", "SUDO_USER=xse", "SUDO_UID=1001", "SUDO_GID=1001"]) = 0 | |
443 brk(NULL) = 0x1f52000 | |
443 brk(0x1f52d08) = 0x1f52d08 | |
443 set_tls(0x1f524c0) = 0 | |
443 uname({sysname="Linux", nodename="rpi", release="4.14.27-1-ARCH", version="#1 SMP Sat Mar 17 00:42:16 UTC 2018", machine="armv6l", domainname="(none)"}) = 0 | |
443 readlink("/proc/self/exe", "/srv/http/kcgi", 4096) = 14 | |
443 brk(0x1f73d08) = 0x1f73d08 | |
443 brk(0x1f74000) = 0x1f74000 | |
443 rt_sigaction(SIGTERM, {sa_handler=0x1043c, sa_mask=[TERM], sa_flags=SA_RESTORER|SA_RESTART, sa_restorer=0x351a0}, {sa_handler=SIG_DFL, sa_mask=[], sa_flags=0}, 8) = 0 | |
443 rt_sigprocmask(SIG_BLOCK, [TERM], NULL, 8) = 0 | |
443 socketpair(AF_UNIX, SOCK_STREAM, 0, [3, 4]) = 0 | |
443 fcntl64(3, F_GETFL) = 0x2 (flags O_RDWR) | |
443 fcntl64(4, F_GETFL) = 0x2 (flags O_RDWR) | |
443 fcntl64(3, F_SETFL, O_RDWR|O_NONBLOCK) = 0 | |
443 fcntl64(4, F_SETFL, O_RDWR|O_NONBLOCK) = 0 | |
443 socketpair(AF_UNIX, SOCK_STREAM, 0, [5, 6]) = 0 | |
443 fcntl64(5, F_GETFL) = 0x2 (flags O_RDWR) | |
443 fcntl64(6, F_GETFL) = 0x2 (flags O_RDWR) | |
443 fcntl64(5, F_SETFL, O_RDWR|O_NONBLOCK) = 0 | |
443 fcntl64(6, F_SETFL, O_RDWR|O_NONBLOCK) = 0 | |
443 clone(child_stack=NULL, flags=CLONE_CHILD_CLEARTID|CLONE_CHILD_SETTID|SIGCHLD, child_tidptr=0x1f52068) = 456 | |
443 close(5) = 0 | |
443 close(3) = 0 | |
443 socketpair(AF_UNIX, SOCK_STREAM, 0, [3, 5]) = 0 | |
443 fcntl64(3, F_GETFL) = 0x2 (flags O_RDWR) | |
443 fcntl64(5, F_GETFL) = 0x2 (flags O_RDWR) | |
443 fcntl64(3, F_SETFL, O_RDWR|O_NONBLOCK) = 0 | |
443 fcntl64(5, F_SETFL, O_RDWR|O_NONBLOCK) = 0 | |
443 clone( <unfinished ...> | |
456 rt_sigaction(SIGTERM, {sa_handler=SIG_IGN, sa_mask=[TERM], sa_flags=SA_RESTORER|SA_RESTART, sa_restorer=0x351a0}, <unfinished ...> | |
443 <... clone resumed> child_stack=NULL, flags=CLONE_CHILD_CLEARTID|CLONE_CHILD_SETTID|SIGCHLD, child_tidptr=0x1f52068) = 457 | |
456 <... rt_sigaction resumed> {sa_handler=0x1043c, sa_mask=[TERM], sa_flags=SA_RESTORER|SA_RESTART, sa_restorer=0x351a0}, 8) = 0 | |
443 close(3 <unfinished ...> | |
456 close(0 <unfinished ...> | |
443 <... close resumed> ) = 0 | |
456 <... close resumed> ) = 0 | |
443 close(4 <unfinished ...> | |
456 close(1) = 0 | |
457 rt_sigaction(SIGTERM, {sa_handler=SIG_IGN, sa_mask=[TERM], sa_flags=SA_RESTORER|SA_RESTART, sa_restorer=0x351a0}, <unfinished ...> | |
456 close(6 <unfinished ...> | |
457 <... rt_sigaction resumed> {sa_handler=0x1043c, sa_mask=[TERM], sa_flags=SA_RESTORER|SA_RESTART, sa_restorer=0x351a0}, 8) = 0 | |
456 <... close resumed> ) = 0 | |
457 close(1 <unfinished ...> | |
456 close(4 <unfinished ...> | |
457 <... close resumed> ) = 0 | |
456 <... close resumed> ) = 0 | |
457 close(6 <unfinished ...> | |
456 prlimit64(0, RLIMIT_FSIZE, {rlim_cur=0, rlim_max=0}, <unfinished ...> | |
457 <... close resumed> ) = 0 | |
457 close(5) = 0 | |
457 prlimit64(0, RLIMIT_FSIZE, {rlim_cur=0, rlim_max=0}, NULL) = 0 | |
457 prlimit64(0, RLIMIT_NPROC, {rlim_cur=0, rlim_max=0}, NULL) = 0 | |
457 rt_sigaction(SIGSYS, {sa_handler=0x17d78, sa_mask=[], sa_flags=SA_RESTORER|SA_SIGINFO, sa_restorer=0x351b0}, NULL, 8) = 0 | |
457 rt_sigprocmask(SIG_UNBLOCK, [SYS], NULL, 8) = 0 | |
457 prctl(PR_SET_NO_NEW_PRIVS, 1, 0, 0, 0) = 0 | |
457 prctl(PR_SET_SECCOMP, SECCOMP_MODE_FILTER, {len=45, filter=[BPF_STMT(BPF_LD|BPF_W|BPF_ABS, 0x4), BPF_JUMP(BPF_JMP|BPF_K|BPF_JEQ, 0x40000028, 0x1, 0), BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_TRAP), BPF_STMT(BPF_LD|BPF_W|BPF_ABS, 0), BPF_JUMP(BPF_JMP|BPF_K|BPF_JEQ, 0x5, 0, 0x1), BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_ERRNO|0xd), BPF_JUMP(BPF_JMP|BPF_K|BPF_JEQ, 0x14, 0, 0x1), BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_ALLOW), BPF_JUMP(BPF_JMP|BPF_K|BPF_JEQ, 0x4e, 0, 0x1), BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_ALLOW), BPF_JUMP(BPF_JMP|BPF_K|BPF_JEQ, 0x107, 0, 0x1), BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_ALLOW), BPF_JUMP(BPF_JMP|BPF_K|BPF_JEQ, 0x11d, 0, 0x1), BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_ALLOW), BPF_JUMP(BPF_JMP|BPF_K|BPF_JEQ, 0x37, 0, 0x1), BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_ALLOW), BPF_JUMP(BPF_JMP|BPF_K|BPF_JEQ, 0x128, 0, 0x1), BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_ALLOW), BPF_JUMP(BPF_JMP|BPF_K|BPF_JEQ, 0x129, 0, 0x1), BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_ALLOW), BPF_JUMP(BPF_JMP|BPF_K|BPF_JEQ, 0x3, 0, 0x1), BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_ALLOW), BPF_JUMP(BPF_JMP|BPF_K|BPF_JEQ, 0x4, 0, 0x1), BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_ALLOW), BPF_JUMP(BPF_JMP|BPF_K|BPF_JEQ, 0x6, 0, 0x1), BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_ALLOW), BPF_JUMP(BPF_JMP|BPF_K|BPF_JEQ, 0x125, 0, 0x1), BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_ALLOW), BPF_JUMP(BPF_JMP|BPF_K|BPF_JEQ, 0x2d, 0, 0x1), BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_ALLOW), BPF_JUMP(BPF_JMP|BPF_K|BPF_JEQ, 0xa8, 0, 0x1), BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_ALLOW), BPF_JUMP(BPF_JMP|BPF_K|BPF_JEQ, 0x8e, 0, 0x1), BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_ALLOW), BPF_JUMP(BPF_JMP|BPF_K|BPF_JEQ, 0xdc, 0, 0x1), BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_ALLOW), BPF_JUMP(BPF_JMP|BPF_K|BPF_JEQ, 0xc0, 0, 0x1), BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_ALLOW), BPF_JUMP(BPF_JMP|BPF_K|BPF_JEQ, 0x5b, 0, 0x1), BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_ALLOW), BPF_JUMP(BPF_JMP|BPF_K|BPF_JEQ, 0xf8, 0, 0x1), BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_ALLOW), BPF_JUMP(BPF_JMP|BPF_K|BPF_JEQ, 0xaf, 0, 0x1), BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_ALLOW), BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_TRAP)]}) = 0 | |
457 fcntl64(0, F_GETFL <unfinished ...> | |
457 --- SIGSYS {si_signo=SIGSYS, si_code=SYS_SECCOMP, si_call_addr=0x51d2c, si_syscall=__NR_fcntl64, si_arch=AUDIT_ARCH_ARM} --- | |
457 <... fcntl64 resumed> ) = 0x2 (flags O_RDWR) | |
457 write(86, "ssh_sandbox_violation: unexpected system call (arch:0x40000028,syscall:221 @ 0x51d2c)\n", 86) = 1 | |
457 +++ exited with 1 +++ | |
456 <... prlimit64 resumed> NULL) = 0 | |
456 prlimit64(0, RLIMIT_NPROC, {rlim_cur=0, rlim_max=0}, NULL) = 0 | |
456 rt_sigaction(SIGSYS, {sa_handler=0x17d78, sa_mask=[], sa_flags=SA_RESTORER|SA_SIGINFO, sa_restorer=0x351b0}, NULL, 8) = 0 | |
456 rt_sigprocmask(SIG_UNBLOCK, [SYS], NULL, 8) = 0 | |
456 prctl(PR_SET_NO_NEW_PRIVS, 1, 0, 0, 0) = 0 | |
456 prctl(PR_SET_SECCOMP, SECCOMP_MODE_FILTER, {len=39, filter=[BPF_STMT(BPF_LD|BPF_W|BPF_ABS, 0x4), BPF_JUMP(BPF_JMP|BPF_K|BPF_JEQ, 0x40000028, 0x1, 0), BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_TRAP), BPF_STMT(BPF_LD|BPF_W|BPF_ABS, 0), BPF_JUMP(BPF_JMP|BPF_K|BPF_JEQ, 0x5, 0, 0x1), BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_ERRNO|0xd), BPF_JUMP(BPF_JMP|BPF_K|BPF_JEQ, 0x14, 0, 0x1), BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_ALLOW), BPF_JUMP(BPF_JMP|BPF_K|BPF_JEQ, 0x4e, 0, 0x1), BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_ALLOW), BPF_JUMP(BPF_JMP|BPF_K|BPF_JEQ, 0x107, 0, 0x1), BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_ALLOW), BPF_JUMP(BPF_JMP|BPF_K|BPF_JEQ, 0x3, 0, 0x1), BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_ALLOW), BPF_JUMP(BPF_JMP|BPF_K|BPF_JEQ, 0x4, 0, 0x1), BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_ALLOW), BPF_JUMP(BPF_JMP|BPF_K|BPF_JEQ, 0x6, 0, 0x1), BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_ALLOW), BPF_JUMP(BPF_JMP|BPF_K|BPF_JEQ, 0x125, 0, 0x1), BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_ALLOW), BPF_JUMP(BPF_JMP|BPF_K|BPF_JEQ, 0x2d, 0, 0x1), BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_ALLOW), BPF_JUMP(BPF_JMP|BPF_K|BPF_JEQ, 0xa8, 0, 0x1), BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_ALLOW), BPF_JUMP(BPF_JMP|BPF_K|BPF_JEQ, 0x8e, 0, 0x1), BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_ALLOW), BPF_JUMP(BPF_JMP|BPF_K|BPF_JEQ, 0xdc, 0, 0x1), BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_ALLOW), BPF_JUMP(BPF_JMP|BPF_K|BPF_JEQ, 0xc0, 0, 0x1), BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_ALLOW), BPF_JUMP(BPF_JMP|BPF_K|BPF_JEQ, 0xa3, 0, 0x1), BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_ALLOW), BPF_JUMP(BPF_JMP|BPF_K|BPF_JEQ, 0x5b, 0, 0x1), BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_ALLOW), BPF_JUMP(BPF_JMP|BPF_K|BPF_JEQ, 0xf8, 0, 0x1), BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_ALLOW), BPF_JUMP(BPF_JMP|BPF_K|BPF_JEQ, 0xaf, 0, 0x1), BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_ALLOW), BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_TRAP)]}) = 0 | |
456 poll([{fd=3, events=POLLIN}], 1, -1) = 1 ([{fd=3, revents=POLLIN|POLLHUP}]) | |
456 read(3, "", 4) = 0 | |
456 close(5) = 0 | |
456 close(3) = 0 | |
456 exit_group(0) = ? | |
456 +++ exited with 0 +++ | |
443 <... close resumed> ) = 0 | |
443 close(0) = 0 | |
443 rt_sigprocmask(SIG_UNBLOCK, [TERM], NULL, 8) = 0 | |
443 --- SIGTERM {si_signo=SIGTERM, si_code=SI_USER, si_pid=442, si_uid=0} --- | |
443 sigreturn({mask=[HUP CHLD]}) = 0 | |
443 poll([{fd=5, events=POLLIN}], 1, 1000) = 1 ([{fd=5, revents=POLLIN|POLLHUP}]) | |
443 rt_sigprocmask(SIG_UNBLOCK, [TERM], NULL, 8) = 0 | |
443 close(5) = 0 | |
443 close(6) = 0 | |
443 wait4(456, [{WIFEXITED(s) && WEXITSTATUS(s) == 0}], 0, NULL) = 456 | |
443 wait4(457, [{WIFEXITED(s) && WEXITSTATUS(s) == 1}], 0, NULL) = 457 | |
443 write(2, "wrappers.c:181: child status 1\n", 31) = 31 | |
443 exit_group(0) = ? | |
443 +++ exited with 0 +++ | |
442 <... wait4 resumed> NULL, 0, NULL) = 443 | |
442 wait4(444, NULL, 0, NULL) = 444 | |
442 wait4(445, NULL, 0, NULL) = 445 | |
442 wait4(446, NULL, 0, NULL) = 446 | |
442 wait4(447, NULL, 0, NULL) = 447 | |
442 rt_sigaction(SIGCHLD, {sa_handler=0x4e2190, sa_mask=[CHLD], sa_flags=SA_RESTORER|SA_RESTART, sa_restorer=0x76e998e0}, {sa_handler=SIG_DFL, sa_mask=[CHLD], sa_flags=SA_RESTORER|SA_RESTART, sa_restorer=0x76e998e0}, 8) = 0 | |
442 exit_group(0) = ? | |
442 +++ exited with 0 +++ |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment