(Sandbox) Unexpected syscalls on relay
weasel reported the following sandxbox warnings on his relay:
(Sandbox) Caught a bad syscall attempt (syscall eventfd2)
/usr/bin/tor(+0x1328b6)[0x7f71180d18b6]
/lib/x86_64-linux-gnu/libc.so.6(eventfd+0xd)[0x7f711649e2fd]
/lib/x86_64-linux-gnu/libc.so.6(eventfd+0xd)[0x7f711649e2fd]
/usr/bin/tor(alert_sockets_create+0xec)[0x7f71180bef9c]
(Sandbox) Caught a bad syscall attempt (syscall open)
/usr/bin/tor(+0x1328b6)[0x7f653db158b6]
/lib/x86_64-linux-gnu/libpthread.so.0(open64+0x10)[0x7f653c3b81d0]
/lib/x86_64-linux-gnu/libpthread.so.0(open64+0x10)[0x7f653c3b81d0]
/usr/bin/tor(tor_open_cloexec+0x40)[0x7f653daff5e0]
/usr/bin/tor(start_writing_to_file+0xf2)[0x7f653db10732]
/usr/bin/tor(+0x12d89b)[0x7f653db1089b]
/usr/bin/tor(+0x12d9e8)[0x7f653db109e8]
/usr/bin/tor(crypto_pk_write_private_key_to_filename+0xcb)[0x7f653db1f57b]
We should probably test the sandbox more thoroughly on relay-mode. Here is the torrc used (to reproduce this):
Sandbox 1
PublishServerDescriptor 0
OrPort 9031