#20844: Inform me about sandbox violations
----------------------------------------------+-------------------------
 Reporter:  arma                              |          Owner:  yawning
     Type:  defect                            |         Status:  new
 Priority:  Medium                            |      Milestone:
Component:  Applications/Tor Browser Sandbox  |        Version:
 Severity:  Normal                            |     Resolution:
 Keywords:                                    |  Actual Points:
Parent ID:                                    |         Points:
 Reviewer:                                    |        Sponsor:
----------------------------------------------+-------------------------

Comment (by cypherpunks):

 Replying to [comment:4 yawning]:
 > Edit: I went and added a rule to SIGKILL on unexpected architecture (I
 think it would have ENOSYSed), for the sake of my peace of mind.
 I think libseccomp is supposed to automatically throw an error during the
 initiation phase if they're running on the improper architecture. See
 `seccomp_arch_exist(3)`.

 In general, unless you're directly writing in raw BPF bytecode or writing
 for multiple architectures at once, in the same seccomp running seccomp
 filter, you don't have to worry about architecture issues.

--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/20844#comment:5>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs

Reply via email to