[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
[tor-commits] [tor/release-0.3.2] Merge remote-tracking branches 'public/ticket24315_029' and 'public/bug24198_029' into maint-0.3.2
commit 846df5b3cdd94ca57777c3e1cbdd81a25e9b5154
Merge: e0f7a2dbd 80bf27040 7461cd306
Author: Nick Mathewson <nickm@xxxxxxxxxxxxxx>
Date: Mon Nov 20 13:20:25 2017 -0500
Merge remote-tracking branches 'public/ticket24315_029' and 'public/bug24198_029' into maint-0.3.2
changes/bug24198 | 4 +++
changes/ticket24315 | 3 ++
configure.ac | 2 ++
src/common/sandbox.c | 86 +++++++++++++++++++++++++++++++++++++++++++++++++---
4 files changed, 90 insertions(+), 5 deletions(-)
diff --cc src/common/sandbox.c
index 7a4e3ece3,d0ead2cae,0b862a549..0fd129d22
--- a/src/common/sandbox.c
+++ b/src/common/sandbox.c
@@@@ -394,8 -425,54 -419,8 +400,54 @@@@ sb_mmap2(scmp_filter_ctx ctx, sandbox_c
return 0;
}
- #endif
++#endif /* defined(__NR_mmap2) */
+
+ +#ifdef HAVE_GNU_LIBC_VERSION_H
+ +#ifdef HAVE_GNU_GET_LIBC_VERSION
+ +#define CHECK_LIBC_VERSION
+ +#endif
+ #endif
+
+ +/* Return true if we think we're running with a libc that always uses
+ + * openat on linux. */
+ +static int
+ +libc_uses_openat_for_everything(void)
+ +{
+ +#ifdef CHECK_LIBC_VERSION
+ + const char *version = gnu_get_libc_version();
+ + if (version == NULL)
+ + return 0;
+ +
+ + int major = -1;
+ + int minor = -1;
+ +
+ + tor_sscanf(version, "%d.%d", &major, &minor);
+ + if (major >= 3)
+ + return 1;
+ + else if (major == 2 && minor >= 26)
+ + return 1;
+ + else
+ + return 0;
+ +#else
+ + return 0;
+ +#endif
+ +}
+ +
+ +/** Allow a single file to be opened. If <b>use_openat</b> is true,
+ + * we're using a libc that remaps all the opens into openats. */
+ +static int
+ +allow_file_open(scmp_filter_ctx ctx, int use_openat, const char *file)
+ +{
+ + if (use_openat) {
+ + return seccomp_rule_add_2(ctx, SCMP_ACT_ALLOW, SCMP_SYS(openat),
+ + SCMP_CMP_STR(0, SCMP_CMP_EQ, AT_FDCWD),
+ + SCMP_CMP_STR(1, SCMP_CMP_EQ, file));
+ + } else {
+ + return seccomp_rule_add_1(ctx, SCMP_ACT_ALLOW, SCMP_SYS(open),
+ + SCMP_CMP_STR(0, SCMP_CMP_EQ, file));
+ + }
+ +}
+ +
/**
* Function responsible for setting up the open syscall for
* the seccomp filter sandbox.
@@@@ -1051,8 -1110,8 -1048,21 +1113,21 @@@@ sb_stat64(scmp_filter_ctx ctx, sandbox_
return 0;
}
-#endif
++#endif /* defined(__NR_stat64) */
+
++ static int
++ sb_kill(scmp_filter_ctx ctx, sandbox_cfg_t *filter)
++ {
++ (void) filter;
++ #ifdef __NR_kill
++ /* Allow killing anything with signal 0 -- it isn't really a kill. */
++ return seccomp_rule_add_1(ctx, SCMP_ACT_ALLOW, SCMP_SYS(kill),
++ SCMP_CMP(1, SCMP_CMP_EQ, 0));
++ #else
++ return 0;
+ #endif
++ }
+
/**
* Array of function pointers responsible for filtering different syscalls at
* a parameter level.
@@@@ -1088,11 -1150,7 -1101,8 +1163,11 @@@@ static sandbox_filter_func_t filter_fun
sb_socket,
sb_setsockopt,
sb_getsockopt,
- sb_socketpair
+ sb_socketpair,
-
++#ifdef HAVE_KIST_SUPPORT
++ sb_ioctl,
++#endif
++ sb_kill
};
const char *
_______________________________________________
tor-commits mailing list
tor-commits@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits