]> git.ipfire.org Git - thirdparty/tor.git/commitdiff
Permit kill(pid, 0) in the seccomp2 sandbox.
authorNick Mathewson <nickm@torproject.org>
Thu, 16 Nov 2017 17:44:47 +0000 (12:44 -0500)
committerNick Mathewson <nickm@torproject.org>
Thu, 16 Nov 2017 17:44:47 +0000 (12:44 -0500)
We don't want to allow general signals to be sent, but there's no
problem sending a kill(0) to probe whether a process is there.

Fixes bug 24198; bugfix on 0.2.5.1-alpha when the seccomp2 sandbox
was introduced.

changes/bug24198 [new file with mode: 0644]
src/common/sandbox.c

diff --git a/changes/bug24198 b/changes/bug24198
new file mode 100644 (file)
index 0000000..6790706
--- /dev/null
@@ -0,0 +1,4 @@
+  o Minor bugfixes (controller, linux seccomp2 sandbox):
+    - Avoid a crash when attempting to use the seccomp2 sandbox
+      together with the OwningControllerProcess feature.
+      Fixes bug 24198; bugfix on 0.2.5.1-alpha.
index 7f4511db2a0fc8165f3fc30ea8dd760bd3a7f84c..0b862a549c94db0c42b7bb85067245d8190607c8 100644 (file)
@@ -1050,6 +1050,19 @@ sb_stat64(scmp_filter_ctx ctx, sandbox_cfg_t *filter)
 }
 #endif
 
+static int
+sb_kill(scmp_filter_ctx ctx, sandbox_cfg_t *filter)
+{
+  (void) filter;
+#ifdef __NR_kill
+  /* Allow killing anything with signal 0 -- it isn't really a kill. */
+  return seccomp_rule_add_1(ctx, SCMP_ACT_ALLOW, SCMP_SYS(kill),
+       SCMP_CMP(1, SCMP_CMP_EQ, 0));
+#else
+  return 0;
+#endif
+}
+
 /**
  * Array of function pointers responsible for filtering different syscalls at
  * a parameter level.
@@ -1088,7 +1101,8 @@ static sandbox_filter_func_t filter_func[] = {
     sb_socket,
     sb_setsockopt,
     sb_getsockopt,
-    sb_socketpair
+    sb_socketpair,
+    sb_kill
 };
 
 const char *