Your message dated Tue, 11 Sep 2018 12:31:59 +0000
with message-id <[email protected]>
and subject line Re: Bug#903772: tor: Fails to start with alternative config 
file ('Caught a bad syscall attempt (syscall openat)')
has caused the Debian Bug report #903772,
regarding tor: Fails to start with alternative config file ('Caught a bad 
syscall attempt (syscall openat)')
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [email protected]
immediately.)


-- 
903772: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=903772
Debian Bug Tracking System
Contact [email protected] with problems
--- Begin Message ---
Package: tor
Version: 0.3.3.7-1
Severity: normal
Tags: patch upstream

Dear Maintainer,

when trying to run an instance of Tor with a custom config file, e.g.
tor -f ~/myconf, it will fail due to a (buggy) seccomp filter:

============================================================ T= 1531579290
(Sandbox) Caught a bad syscall attempt (syscall openat)
tor(+0x1a689a)[0x56184d39189a]
/lib/x86_64-linux-gnu/libpthread.so.0(open64+0x4b)[0x7f548fb333ab]
/lib/x86_64-linux-gnu/libpthread.so.0(open64+0x4b)[0x7f548fb333ab]
tor(tor_open_cloexec+0x40)[0x56184d377920]
tor(start_writing_to_file+0x17a)[0x56184d38b39a]
tor(+0x1a047b)[0x56184d38b47b]
tor(+0x1a05c8)[0x56184d38b5c8]
tor(or_state_save+0x15b)[0x56184d2a97ab]
tor(+0x5497b)[0x56184d23f97b]
/usr/lib/x86_64-linux-gnu/libevent-2.1.so.6(+0x229ba)[0x7f5490d549ba]
/usr/lib/x86_64-linux-gnu/libevent-2.1.so.6(event_base_loop+0x5a7)[0x7f5490d55537]
tor(do_main_loop+0x2b4)[0x56184d2406f4]
tor(tor_run_main+0x1025)[0x56184d242bd5]
tor(tor_main+0x3a)[0x56184d23b18a]
tor(main+0x19)[0x56184d23af19]
/lib/x86_64-linux-gnu/libc.so.6(__libc_start_main+0xe7)[0x7f548f585a87]
tor(_start+0x2a)[0x56184d23af6a]

The fix [1] mentioned in the discussion of the bug on Tor's bugtracker [2] 
solves the problem.


Regards, Jan


PS: I'm unsure whether bugs like this are supposed to be reported here. My 
apologies if they shouldn't be. However, I figured it will 1) help others 
encountering the bug and 2) make sure the package maintainer is aware of it.

[1] 
https://github.com/Jigsaw52/tor/commit/9ec292e1c45a522a7d3b3c9a1c2630bf05047990
[2] https://trac.torproject.org/projects/tor/ticket/25440


-- System Information:
Debian Release: buster/sid
  APT prefers testing
  APT policy: (500, 'testing')
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 4.16.0-2-amd64 (SMP w/4 CPU cores)
Locale: LANG=en_GB.UTF-8, LC_CTYPE=en_GB.UTF-8 (charmap=UTF-8), LANGUAGE=en_GB 
(charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled

Versions of packages tor depends on:
ii  adduser         3.117
ii  libc6           2.27-3
ii  libcap2         1:2.25-1.2
ii  libevent-2.1-6  2.1.8-stable-4
ii  liblzma5        5.2.2-1.3
ii  libseccomp2     2.3.3-3
ii  libssl1.1       1.1.0h-4
ii  libsystemd0     239-5
ii  libzstd1        1.3.4+dfsg-3
ii  lsb-base        9.20170808
ii  zlib1g          1:1.2.11.dfsg-1

Versions of packages tor recommends:
ii  logrotate    3.11.0-0.1
ii  tor-geoipdb  0.3.3.7-1
pn  torsocks     <none>

Versions of packages tor suggests:
pn  apparmor-utils       <none>
pn  mixmaster            <none>
pn  obfs4proxy           <none>
ii  socat                1.7.3.2-2
pn  tor-arm              <none>
pn  torbrowser-launcher  <none>

-- Configuration Files:
/etc/tor/torrc changed [not included]

-- no debconf information

--- End Message ---
--- Begin Message ---
Version: 0.3.4.7-rc-1

On Sat, 14 Jul 2018, Peter Palfrader wrote:

> > when trying to run an instance of Tor with a custom config file, e.g.
> > tor -f ~/myconf, it will fail due to a (buggy) seccomp filter:
> 
> > PS: I'm unsure whether bugs like this are supposed to be reported
> > here. My apologies if they shouldn't be. However, I figured it will 1)
> > help others encountering the bug and 2) make sure the package
> > maintainer is aware of it.

this was fixed in 0.3.4.7-rc:

  o Minor bugfixes (linux seccomp2 sandbox):
    - Fix a bug in our sandboxing rules for the openat() syscall.
      Previously, no openat() call would be permitted, which would break
      filesystem operations on recent glibc versions. Fixes bug 25440;
      bugfix on 0.2.9.15. Diagnosis and patch from Daniel Pinto.


-- 
                            |  .''`.       ** Debian **
      Peter Palfrader       | : :' :      The  universal
 https://www.palfrader.org/ | `. `'      Operating System
                            |   `-    https://www.debian.org/

--- End Message ---

Reply via email to