[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re: [tor-bugs] #24198 [Core Tor/Tor]: (Sandbox) Caught a bad syscall attempt (syscall kill)
#24198: (Sandbox) Caught a bad syscall attempt (syscall kill)
--------------------------+------------------------------------
Reporter: asn | Owner: (none)
Type: defect | Status: new
Priority: Medium | Milestone: Tor: 0.3.2.x-final
Component: Core Tor/Tor | Version: Tor: 0.3.2.4-alpha
Severity: Normal | Resolution:
Keywords: | Actual Points:
Parent ID: | Points: 0.1
Reviewer: | Sponsor:
--------------------------+------------------------------------
Comment (by dgoulet):
strace output in my case:
{{{
19360 openat(AT_FDCWD, "/etc/hosts", O_RDONLY|O_CLOEXEC) = 257
19360 --- SIGSYS {si_signo=SIGSYS, si_code=SYS_SECCOMP,
si_call_addr=0x7f7d90ab667e, si_syscall=__NR_openat,
si_arch=AUDIT_ARCH_X86_64} ---
}}}
It is the first file being opened _after_ the seccomp sandbox has been
applied. Our sandbox code only considers "open()" to touch that file:
{{{
OPEN("/etc/hosts");
}}}
--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/24198#comment:2>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs