http://bugzilla.suse.com/show_bug.cgi?id=977812 Bug ID: 977812 Summary: sshd killed by SIGSYS on client connection Classification: openSUSE Product: openSUSE Tumbleweed Version: Current Hardware: x86-64 OS: Other Status: NEW Severity: Major Priority: P5 - None Component: Basesystem Assignee: bnc-team-screening@forge.provo.novell.com Reporter: mkubecek@suse.com QA Contact: qa-bugs@suse.de Found By: --- Blocker: --- Created attachment 675044 --> http://bugzilla.suse.com/attachment.cgi?id=675044&action=edit strace output for "/usr/sbin/sshd -ddd" After today's big update, I'm unable to connect to the machine using SSH. With debugging enabled, last things I see on the client are debug2: kex_parse_kexinit: none,zlib@openssh.com debug2: kex_parse_kexinit: none,zlib@openssh.com debug2: kex_parse_kexinit: debug2: kex_parse_kexinit: debug2: kex_parse_kexinit: first_kex_follows 0 debug2: kex_parse_kexinit: reserved 0 debug2: mac_setup: found hmac-sha2-512-etm@openssh.com debug1: kex: server->client aes128-ctr hmac-sha2-512-etm@openssh.com none debug2: mac_setup: found hmac-sha2-512-etm@openssh.com debug1: kex: client->server aes128-ctr hmac-sha2-512-etm@openssh.com none debug1: sending SSH2_MSG_KEX_ECDH_INIT debug1: expecting SSH2_MSG_KEX_ECDH_REPLY Connection closed by 172.17.1.2 and on the server debug1: kex: client->server aes128-ctr hmac-sha2-512-etm@openssh.com none [preauth] debug3: mm_request_send entering: type 118 [preauth] debug3: mm_request_receive_expect entering: type 119 [preauth] debug3: mm_request_receive entering [preauth] debug3: mm_request_receive entering debug3: monitor_read: checking request 118 debug3: mm_request_send entering: type 119 debug2: mac_setup: setup hmac-sha2-512-etm@openssh.com [preauth] debug1: kex: server->client aes128-ctr hmac-sha2-512-etm@openssh.com none [preauth] debug3: mm_request_send entering: type 118 [preauth] debug3: mm_request_receive_expect entering: type 119 [preauth] debug3: mm_request_receive entering [preauth] debug3: mm_request_receive entering debug3: monitor_read: checking request 118 debug3: mm_request_send entering: type 119 debug1: monitor_read_log: child log fd closed debug3: mm_request_receive entering debug1: do_cleanup debug3: PAM: sshpam_thread_cleanup entering debug1: Killing privsep child 3537 strace says the child was killed by SIGSYS and so does gdb. However, so far I wasn't able to get a core dump or even find where does this happen. Output of strace output is attached, not much interesting in gdb output except Program terminated with signal SIGSYS, Bad system call. The program no longer exists. A little research indicates SIGSYS may have something to do with seccomp and indeed, commenting out the line UsePrivilegeSeparation sandbox # Default for new installations. in sshd_config makes sshd work again. Current openssh version is 6.6p1-11.2 and previous (working) version was 6.6p1-11.1, i.e. this is only a rebuild so that the issue might have been triggered by glibc update. -- You are receiving this mail because: You are on the CC list for the bug.