Skip to content
Snippets Groups Projects
Commit f70cf998 authored by Nick Mathewson's avatar Nick Mathewson :game_die:
Browse files

Sandbox: permit O_NONBLOCK and O_NOCTTY for files we refuse

OpenSSL needs this, or RAND_poll() will kill the process.

Also, refuse with EACCESS, not errno==-1 (!).
parent c80a6bd9
Branches
Tags
No related merge requests found
......@@ -363,8 +363,8 @@ sb_open(scmp_filter_ctx ctx, sandbox_cfg_t *filter)
}
}
rc = seccomp_rule_add_1(ctx, SCMP_ACT_ERRNO(-1), SCMP_SYS(open),
SCMP_CMP_MASKED(1, O_CLOEXEC, O_RDONLY));
rc = seccomp_rule_add_1(ctx, SCMP_ACT_ERRNO(EACCES), SCMP_SYS(open),
SCMP_CMP_MASKED(1, O_CLOEXEC|O_NONBLOCK|O_NOCTTY, O_RDONLY));
if (rc != 0) {
log_err(LD_BUG,"(Sandbox) failed to add open syscall, received libseccomp "
"error %d", rc);
......
0% Loading or .
You are about to add 0 people to the discussion. Proceed with caution.
Please register or to comment