Use the proper syscall in sandbox error messages

Fixes #22750.
This commit is contained in:
cypherpunks 2017-06-28 12:35:01 +00:00 committed by Nick Mathewson
parent 3402b14089
commit c79e286386
2 changed files with 6 additions and 3 deletions

3
changes/ticket22750 Normal file
View File

@ -0,0 +1,3 @@
o Minor bugfixes (logging, sandbox):
- Use the correct system call in sandbox error messages. Fixes bug
22750; bugfix on 0.2.5.1-alpha.

View File

@ -480,7 +480,7 @@ sb_chmod(scmp_filter_ctx ctx, sandbox_cfg_t *filter)
rc = seccomp_rule_add_1(ctx, SCMP_ACT_ALLOW, SCMP_SYS(chmod), rc = seccomp_rule_add_1(ctx, SCMP_ACT_ALLOW, SCMP_SYS(chmod),
SCMP_CMP_STR(0, SCMP_CMP_EQ, param->value)); SCMP_CMP_STR(0, SCMP_CMP_EQ, param->value));
if (rc != 0) { if (rc != 0) {
log_err(LD_BUG,"(Sandbox) failed to add open syscall, received " log_err(LD_BUG,"(Sandbox) failed to add chmod syscall, received "
"libseccomp error %d", rc); "libseccomp error %d", rc);
return rc; return rc;
} }
@ -505,7 +505,7 @@ sb_chown(scmp_filter_ctx ctx, sandbox_cfg_t *filter)
rc = seccomp_rule_add_1(ctx, SCMP_ACT_ALLOW, SCMP_SYS(chown), rc = seccomp_rule_add_1(ctx, SCMP_ACT_ALLOW, SCMP_SYS(chown),
SCMP_CMP_STR(0, SCMP_CMP_EQ, param->value)); SCMP_CMP_STR(0, SCMP_CMP_EQ, param->value));
if (rc != 0) { if (rc != 0) {
log_err(LD_BUG,"(Sandbox) failed to add open syscall, received " log_err(LD_BUG,"(Sandbox) failed to add chown syscall, received "
"libseccomp error %d", rc); "libseccomp error %d", rc);
return rc; return rc;
} }
@ -1037,7 +1037,7 @@ sb_stat64(scmp_filter_ctx ctx, sandbox_cfg_t *filter)
rc = seccomp_rule_add_1(ctx, SCMP_ACT_ALLOW, SCMP_SYS(stat64), rc = seccomp_rule_add_1(ctx, SCMP_ACT_ALLOW, SCMP_SYS(stat64),
SCMP_CMP_STR(0, SCMP_CMP_EQ, param->value)); SCMP_CMP_STR(0, SCMP_CMP_EQ, param->value));
if (rc != 0) { if (rc != 0) {
log_err(LD_BUG,"(Sandbox) failed to add open syscall, received " log_err(LD_BUG,"(Sandbox) failed to add stat64 syscall, received "
"libseccomp error %d", rc); "libseccomp error %d", rc);
return rc; return rc;
} }