Run crypto_prefork() before start_daemon().

Without this, RunAsDaemon breaks NSS.

Fixes bug 27664; bug not in any released Tor.
This commit is contained in:
Nick Mathewson 2018-09-13 08:58:28 -04:00
parent bfc847255a
commit 75d6609eb1
3 changed files with 16 additions and 0 deletions

View File

@ -1417,6 +1417,8 @@ options_act_reversible(const or_options_t *old_options, char **msg)
* the subprocess. Libevent bases can't be reliably inherited across
* processes. */
if (running_tor && options->RunAsDaemon) {
if (! start_daemon_has_been_called())
crypto_prefork();
/* No need to roll back, since you can't change the value. */
if (start_daemon())
crypto_postfork();

View File

@ -38,6 +38,16 @@ static int finish_daemon_called = 0;
/** Socketpair used to communicate between parent and child process while
* daemonizing. */
static int daemon_filedes[2];
/**
* Return true iff we've called start_daemon() at least once.
*/
bool
start_daemon_has_been_called(void)
{
return start_daemon_called != 0;
}
/** Start putting the process into daemon mode: fork and drop all resources
* except standard fds. The parent process never returns, but stays around
* until finish_daemon is called. (Note: it's safe to call this more

View File

@ -11,7 +11,11 @@
#ifndef TOR_DAEMON_H
#define TOR_DAEMON_H
#include <stdbool.h>
int start_daemon(void);
int finish_daemon(const char *desired_cwd);
bool start_daemon_has_been_called(void);
#endif