[GH-ISSUE #1535] Tor Browser won't open #1021

Closed
opened 2026-05-05 07:18:59 -06:00 by gitea-mirror · 3 comments
Owner

Originally created by @PC-Admin on GitHub (Sep 6, 2017).
Original GitHub issue: https://github.com/netblue30/firejail/issues/1535

Hi

https://github.com/netblue30/firejail/blob/master/etc/start-tor-browser.profile

Before it complained about likes 17, 21 and 22 of the start-tor-browser.profile file, so i edited them out.

I'm trying to open tor browser with firejail but i keep getting this error:

/usr/local/bin/tor-browser_en-US/Browser$ firejail --debug ./start-tor-browser
Autoselecting /bin/bash as shell
Command name #start-tor-browser#
Found start-tor-browser profile in /etc/firejail directory
Reading profile /etc/firejail/start-tor-browser.profile
Reading profile /etc/firejail/disable-common.inc
Reading profile /etc/firejail/disable-devel.inc
Reading profile /etc/firejail/disable-passwdmgr.inc
Reading profile /etc/firejail/disable-programs.inc
Checking /usr/local/bin/bash
Checking /usr/bin/bash
Checking /bin/bash
Checking /usr/local/bin/dash
Checking /usr/bin/dash
Checking /bin/dash
Checking /usr/local/bin/sh
Checking /usr/bin/sh
Checking /bin/sh
Checking /usr/local/bin/grep
Checking /usr/bin/grep
Checking /bin/grep
Checking /usr/local/bin/tail
Checking /usr/bin/tail
Checking /usr/local/bin/env
Checking /usr/bin/env
Checking /usr/local/bin/gpg
Checking /usr/bin/gpg
Checking /usr/local/bin/id
Checking /usr/bin/id
Checking /usr/local/bin/readlink
Checking /usr/bin/readlink
Checking /bin/readlink
Checking /usr/local/bin/dirname
Checking /usr/bin/dirname
Checking /usr/local/bin/test
Checking /usr/bin/test
Checking /usr/local/bin/mkdir
Checking /usr/bin/mkdir
Checking /bin/mkdir
Checking /usr/local/bin/ln
Checking /usr/bin/ln
Checking /bin/ln
Checking /usr/local/bin/sed
Checking /usr/bin/sed
Checking /bin/sed
Checking /usr/local/bin/cp
Checking /usr/bin/cp
Checking /bin/cp
Checking /usr/local/bin/rm
Checking /usr/bin/rm
Checking /bin/rm
Checking /usr/local/bin/getconf
Checking /usr/bin/getconf
Checking /etc/fonts
DISPLAY :0, 0
Using the local network stack
Parent pid 8788, child pid 8789
Initializing child process
Host network configured
PID namespace installed
Mounting tmpfs on /run/firejail/mnt directory
Mounting read-only /bin, /sbin, /lib, /lib32, /lib64, /usr, /etc, /var
Mounting tmpfs on /var/lock
Mounting tmpfs on /var/tmp
Mounting tmpfs on /var/log
Mounting tmpfs on /var/lib/dhcp
Mounting tmpfs on /var/lib/sudo
Create the new utmp file
Mount the new utmp file
Cleaning /home directory
Sanitizing /etc/passwd, UID_MIN 1000
Sanitizing /etc/group, GID_MIN 1000
Disable /run/firejail/network
Disable /run/firejail/bandwidth
Disable /run/firejail/name
Disable /run/firejail/x11
Mounting tmpfs on /dev
mounting /run/firejail/mnt/dev/snd directory
mounting /run/firejail/mnt/dev/dri directory
Create /dev/shm directory
Copying files in the new etc directory:
running: /run/firejail/mnt/cp -a --parents /etc/fonts /run/firejail/mnt
Mount-bind /run/firejail/mnt/etc on top of /etc
Creating an empty /etc/ld.so.preload file
Copying files in the new home:
Checking /usr/local/bin/bash
Checking /usr/bin/bash
Checking /bin/bash
running: /run/firejail/mnt/cp -a /bin/bash /run/firejail/mnt/bin/bashChecking /usr/local/bin/dash
Checking /usr/bin/dash
Checking /bin/dash
running: /run/firejail/mnt/cp -a /bin/dash /run/firejail/mnt/bin/dashChecking /usr/local/bin/sh
Checking /usr/bin/sh
Checking /bin/sh
running: /run/firejail/mnt/cp -a /bin/dash /run/firejail/mnt/bin/shChecking /usr/local/bin/grep
Checking /usr/bin/grep
Checking /bin/grep
running: /run/firejail/mnt/cp -a /bin/grep /run/firejail/mnt/bin/grepChecking /usr/local/bin/tail
Checking /usr/bin/tail
running: /run/firejail/mnt/cp -a /usr/bin/tail /run/firejail/mnt/bin/tailChecking /usr/local/bin/env
Checking /usr/bin/env
running: /run/firejail/mnt/cp -a /usr/bin/env /run/firejail/mnt/bin/envChecking /usr/local/bin/gpg
Checking /usr/bin/gpg
running: /run/firejail/mnt/cp -a /usr/bin/gpg /run/firejail/mnt/bin/gpgChecking /usr/local/bin/id
Checking /usr/bin/id
running: /run/firejail/mnt/cp -a /usr/bin/id /run/firejail/mnt/bin/idChecking /usr/local/bin/readlink
Checking /usr/bin/readlink
Checking /bin/readlink
running: /run/firejail/mnt/cp -a /bin/readlink /run/firejail/mnt/bin/readlinkChecking /usr/local/bin/dirname
Checking /usr/bin/dirname
running: /run/firejail/mnt/cp -a /usr/bin/dirname /run/firejail/mnt/bin/dirnameChecking /usr/local/bin/test
Checking /usr/bin/test
running: /run/firejail/mnt/cp -a /usr/bin/test /run/firejail/mnt/bin/testChecking /usr/local/bin/mkdir
Checking /usr/bin/mkdir
Checking /bin/mkdir
running: /run/firejail/mnt/cp -a /bin/mkdir /run/firejail/mnt/bin/mkdirChecking /usr/local/bin/ln
Checking /usr/bin/ln
Checking /bin/ln
running: /run/firejail/mnt/cp -a /bin/ln /run/firejail/mnt/bin/lnChecking /usr/local/bin/sed
Checking /usr/bin/sed
Checking /bin/sed
running: /run/firejail/mnt/cp -a /bin/sed /run/firejail/mnt/bin/sedChecking /usr/local/bin/cp
Checking /usr/bin/cp
Checking /bin/cp
running: /run/firejail/mnt/cp -a /bin/cp /run/firejail/mnt/bin/cpChecking /usr/local/bin/rm
Checking /usr/bin/rm
Checking /bin/rm
running: /run/firejail/mnt/cp -a /bin/rm /run/firejail/mnt/bin/rmChecking /usr/local/bin/getconf
Checking /usr/bin/getconf
Mount-bind /run/firejail/mnt/bin on top of /usr/local/bin
Mount-bind /run/firejail/mnt/bin on top of /usr/bin
Mount-bind /run/firejail/mnt/bin on top of /bin
Mount-bind /run/firejail/mnt/bin on top of /usr/games
Mount-bind /run/firejail/mnt/bin on top of /usr/local/games
Mount-bind /run/firejail/mnt/bin on top of /usr/local/sbin
Mount-bind /run/firejail/mnt/bin on top of /usr/sbin
Mount-bind /run/firejail/mnt/bin on top of /sbin
Remounting /proc and /proc/sys filesystems
Remounting /sys directory
Disable /sys/firmware
Disable /sys/hypervisor
Disable /sys/module
Disable /sys/power
Disable /sys/kernel/debug
Disable /sys/kernel/vmcoreinfo
Disable /proc/sys/fs/binfmt_misc
Disable /proc/sys/kernel/core_pattern
Disable /proc/sys/kernel/modprobe
Disable /proc/sysrq-trigger
Disable /proc/sys/vm/panic_on_oom
Disable /proc/irq
Disable /proc/bus
Disable /proc/sched_debug
Disable /proc/timer_list
Disable /proc/kcore
Disable /proc/kallsyms
Disable /lib/modules
Disable /boot
Disable /proc/kmsg
Debug 358: new_name #/usr/local/bin/tor-browser_en-US/Browser/TorBrowser/Data#
Removed whitelist path: whitelist /usr/local/bin/tor-browser_en-US/Browser/TorBrowser/Data
	expanded: /usr/local/bin/tor-browser_en-US/Browser/TorBrowser/Data
	real path: (null)
	realpath: No such file or directory
Debug 358: new_name #/tmp/.X11-unix#
Mounting tmpfs on /tmp directory
Whitelisting /tmp/.X11-unix
Disable /home/username/.bash_history
Mounting read-only /home/username/.local/share/applications
Disable /home/username/.config/autostart
Disable /usr/share/veracrypt
Disable /usr/share/applications/veracrypt.desktop
Disable /usr/share/pixmaps/veracrypt.xpm
Disable /var/spool/cron
Disable /var/spool/anacron
Disable /run/minissdpd.sock
Mounting read-only /home/username/.profile
Mounting read-only /home/username/.bashrc
Mounting read-only /home/username/.bash_logout
Mounting read-only /home/username/.profile
Disable /home/username/.ssh
Disable /home/username/.gnupg
Disable /sbin
Disable /usr/sbin
Disable /usr/local/sbin
Disable /usr/include
Disable /usr/lib/valgrind
Disable /usr/share/perl
Disable /usr/share/perl-openssl-defaults
Disable /usr/share/perl5
Disable /usr/lib/perl5
Disable /home/username/.pki/nssdb
Disable /home/username/.config/transmission
Disable /home/username/.thunderbird
Disable /home/username/.mozilla
Disable /home/username/.config/evolution
Disable /home/username/.local/share/evolution
Disable /home/username/.cache/evolution
Disable /home/username/.cache/mozilla
Disable /home/username/.cache/thunderbird
Mounting noexec /tmp
Disable /sys/fs
Create the new ld.so.preload file
Blacklist violations are logged to syslog
Mount the new ld.so.preload file
DISPLAY :0, 0
Dropping all capabilities
Set protocol filter: unix,inet,inet6
Dual i386/amd64 seccomp filter configured
SECCOMP Filter:
  VALIDATE_ARCHITECTURE
  EXAMINE_SYSCAL
  UNKNOWN ENTRY!!!
  UNKNOWN ENTRY!!!
  UNKNOWN ENTRY!!!
  BLACKLIST 165 mount
  BLACKLIST 166 umount2
  BLACKLIST 101 ptrace
  BLACKLIST 246 kexec_load
  BLACKLIST 320 kexec_file_load
  BLACKLIST 304 open_by_handle_at
  BLACKLIST 303 name_to_handle_at
  BLACKLIST 175 init_module
  BLACKLIST 313 finit_module
  BLACKLIST 174 create_module
  BLACKLIST 176 delete_module
  BLACKLIST 172 iopl
  BLACKLIST 173 ioperm
  BLACKLIST 251 ioprio_set
  BLACKLIST 167 swapon
  BLACKLIST 168 swapoff
  BLACKLIST 103 syslog
  BLACKLIST 310 process_vm_readv
  BLACKLIST 311 process_vm_writev
  BLACKLIST 139 sysfs
  BLACKLIST 156 _sysctl
  BLACKLIST 159 adjtimex
  BLACKLIST 305 clock_adjtime
  BLACKLIST 212 lookup_dcookie
  BLACKLIST 298 perf_event_open
  BLACKLIST 300 fanotify_init
  BLACKLIST 312 kcmp
  BLACKLIST 248 add_key
  BLACKLIST 249 request_key
  BLACKLIST 250 keyctl
  BLACKLIST 134 uselib
  BLACKLIST 163 acct
  BLACKLIST 154 modify_ldt
  BLACKLIST 155 pivot_root
  BLACKLIST 206 io_setup
  BLACKLIST 207 io_destroy
  BLACKLIST 208 io_getevents
  BLACKLIST 209 io_submit
  BLACKLIST 210 io_cancel
  BLACKLIST 216 remap_file_pages
  BLACKLIST 237 mbind
  BLACKLIST 239 get_mempolicy
  BLACKLIST 238 set_mempolicy
  BLACKLIST 256 migrate_pages
  BLACKLIST 279 move_pages
  BLACKLIST 278 vmsplice
  BLACKLIST 161 chroot
  BLACKLIST 184 tuxcall
  BLACKLIST 169 reboot
  BLACKLIST 180 nfsservctl
  BLACKLIST 177 get_kernel_syms
  RETURN_ALLOW
Save seccomp filter, size 880 bytes
noroot user namespace installed
Dropping all capabilities
NO_NEW_PRIVS set
starting application
LD_PRELOAD=(null)
execvp argument 0: ./start-tor-browser
Child process initialized
monitoring pid 22

Sandbox monitor: waitpid 22 retval 22 status 256

Parent is shutting down, bye...

System is updated Debian 9. Any help would be appreciated.

Originally created by @PC-Admin on GitHub (Sep 6, 2017). Original GitHub issue: https://github.com/netblue30/firejail/issues/1535 Hi https://github.com/netblue30/firejail/blob/master/etc/start-tor-browser.profile Before it complained about likes 17, 21 and 22 of the start-tor-browser.profile file, so i edited them out. I'm trying to open tor browser with firejail but i keep getting this error: ``` /usr/local/bin/tor-browser_en-US/Browser$ firejail --debug ./start-tor-browser Autoselecting /bin/bash as shell Command name #start-tor-browser# Found start-tor-browser profile in /etc/firejail directory Reading profile /etc/firejail/start-tor-browser.profile Reading profile /etc/firejail/disable-common.inc Reading profile /etc/firejail/disable-devel.inc Reading profile /etc/firejail/disable-passwdmgr.inc Reading profile /etc/firejail/disable-programs.inc Checking /usr/local/bin/bash Checking /usr/bin/bash Checking /bin/bash Checking /usr/local/bin/dash Checking /usr/bin/dash Checking /bin/dash Checking /usr/local/bin/sh Checking /usr/bin/sh Checking /bin/sh Checking /usr/local/bin/grep Checking /usr/bin/grep Checking /bin/grep Checking /usr/local/bin/tail Checking /usr/bin/tail Checking /usr/local/bin/env Checking /usr/bin/env Checking /usr/local/bin/gpg Checking /usr/bin/gpg Checking /usr/local/bin/id Checking /usr/bin/id Checking /usr/local/bin/readlink Checking /usr/bin/readlink Checking /bin/readlink Checking /usr/local/bin/dirname Checking /usr/bin/dirname Checking /usr/local/bin/test Checking /usr/bin/test Checking /usr/local/bin/mkdir Checking /usr/bin/mkdir Checking /bin/mkdir Checking /usr/local/bin/ln Checking /usr/bin/ln Checking /bin/ln Checking /usr/local/bin/sed Checking /usr/bin/sed Checking /bin/sed Checking /usr/local/bin/cp Checking /usr/bin/cp Checking /bin/cp Checking /usr/local/bin/rm Checking /usr/bin/rm Checking /bin/rm Checking /usr/local/bin/getconf Checking /usr/bin/getconf Checking /etc/fonts DISPLAY :0, 0 Using the local network stack Parent pid 8788, child pid 8789 Initializing child process Host network configured PID namespace installed Mounting tmpfs on /run/firejail/mnt directory Mounting read-only /bin, /sbin, /lib, /lib32, /lib64, /usr, /etc, /var Mounting tmpfs on /var/lock Mounting tmpfs on /var/tmp Mounting tmpfs on /var/log Mounting tmpfs on /var/lib/dhcp Mounting tmpfs on /var/lib/sudo Create the new utmp file Mount the new utmp file Cleaning /home directory Sanitizing /etc/passwd, UID_MIN 1000 Sanitizing /etc/group, GID_MIN 1000 Disable /run/firejail/network Disable /run/firejail/bandwidth Disable /run/firejail/name Disable /run/firejail/x11 Mounting tmpfs on /dev mounting /run/firejail/mnt/dev/snd directory mounting /run/firejail/mnt/dev/dri directory Create /dev/shm directory Copying files in the new etc directory: running: /run/firejail/mnt/cp -a --parents /etc/fonts /run/firejail/mnt Mount-bind /run/firejail/mnt/etc on top of /etc Creating an empty /etc/ld.so.preload file Copying files in the new home: Checking /usr/local/bin/bash Checking /usr/bin/bash Checking /bin/bash running: /run/firejail/mnt/cp -a /bin/bash /run/firejail/mnt/bin/bashChecking /usr/local/bin/dash Checking /usr/bin/dash Checking /bin/dash running: /run/firejail/mnt/cp -a /bin/dash /run/firejail/mnt/bin/dashChecking /usr/local/bin/sh Checking /usr/bin/sh Checking /bin/sh running: /run/firejail/mnt/cp -a /bin/dash /run/firejail/mnt/bin/shChecking /usr/local/bin/grep Checking /usr/bin/grep Checking /bin/grep running: /run/firejail/mnt/cp -a /bin/grep /run/firejail/mnt/bin/grepChecking /usr/local/bin/tail Checking /usr/bin/tail running: /run/firejail/mnt/cp -a /usr/bin/tail /run/firejail/mnt/bin/tailChecking /usr/local/bin/env Checking /usr/bin/env running: /run/firejail/mnt/cp -a /usr/bin/env /run/firejail/mnt/bin/envChecking /usr/local/bin/gpg Checking /usr/bin/gpg running: /run/firejail/mnt/cp -a /usr/bin/gpg /run/firejail/mnt/bin/gpgChecking /usr/local/bin/id Checking /usr/bin/id running: /run/firejail/mnt/cp -a /usr/bin/id /run/firejail/mnt/bin/idChecking /usr/local/bin/readlink Checking /usr/bin/readlink Checking /bin/readlink running: /run/firejail/mnt/cp -a /bin/readlink /run/firejail/mnt/bin/readlinkChecking /usr/local/bin/dirname Checking /usr/bin/dirname running: /run/firejail/mnt/cp -a /usr/bin/dirname /run/firejail/mnt/bin/dirnameChecking /usr/local/bin/test Checking /usr/bin/test running: /run/firejail/mnt/cp -a /usr/bin/test /run/firejail/mnt/bin/testChecking /usr/local/bin/mkdir Checking /usr/bin/mkdir Checking /bin/mkdir running: /run/firejail/mnt/cp -a /bin/mkdir /run/firejail/mnt/bin/mkdirChecking /usr/local/bin/ln Checking /usr/bin/ln Checking /bin/ln running: /run/firejail/mnt/cp -a /bin/ln /run/firejail/mnt/bin/lnChecking /usr/local/bin/sed Checking /usr/bin/sed Checking /bin/sed running: /run/firejail/mnt/cp -a /bin/sed /run/firejail/mnt/bin/sedChecking /usr/local/bin/cp Checking /usr/bin/cp Checking /bin/cp running: /run/firejail/mnt/cp -a /bin/cp /run/firejail/mnt/bin/cpChecking /usr/local/bin/rm Checking /usr/bin/rm Checking /bin/rm running: /run/firejail/mnt/cp -a /bin/rm /run/firejail/mnt/bin/rmChecking /usr/local/bin/getconf Checking /usr/bin/getconf Mount-bind /run/firejail/mnt/bin on top of /usr/local/bin Mount-bind /run/firejail/mnt/bin on top of /usr/bin Mount-bind /run/firejail/mnt/bin on top of /bin Mount-bind /run/firejail/mnt/bin on top of /usr/games Mount-bind /run/firejail/mnt/bin on top of /usr/local/games Mount-bind /run/firejail/mnt/bin on top of /usr/local/sbin Mount-bind /run/firejail/mnt/bin on top of /usr/sbin Mount-bind /run/firejail/mnt/bin on top of /sbin Remounting /proc and /proc/sys filesystems Remounting /sys directory Disable /sys/firmware Disable /sys/hypervisor Disable /sys/module Disable /sys/power Disable /sys/kernel/debug Disable /sys/kernel/vmcoreinfo Disable /proc/sys/fs/binfmt_misc Disable /proc/sys/kernel/core_pattern Disable /proc/sys/kernel/modprobe Disable /proc/sysrq-trigger Disable /proc/sys/vm/panic_on_oom Disable /proc/irq Disable /proc/bus Disable /proc/sched_debug Disable /proc/timer_list Disable /proc/kcore Disable /proc/kallsyms Disable /lib/modules Disable /boot Disable /proc/kmsg Debug 358: new_name #/usr/local/bin/tor-browser_en-US/Browser/TorBrowser/Data# Removed whitelist path: whitelist /usr/local/bin/tor-browser_en-US/Browser/TorBrowser/Data expanded: /usr/local/bin/tor-browser_en-US/Browser/TorBrowser/Data real path: (null) realpath: No such file or directory Debug 358: new_name #/tmp/.X11-unix# Mounting tmpfs on /tmp directory Whitelisting /tmp/.X11-unix Disable /home/username/.bash_history Mounting read-only /home/username/.local/share/applications Disable /home/username/.config/autostart Disable /usr/share/veracrypt Disable /usr/share/applications/veracrypt.desktop Disable /usr/share/pixmaps/veracrypt.xpm Disable /var/spool/cron Disable /var/spool/anacron Disable /run/minissdpd.sock Mounting read-only /home/username/.profile Mounting read-only /home/username/.bashrc Mounting read-only /home/username/.bash_logout Mounting read-only /home/username/.profile Disable /home/username/.ssh Disable /home/username/.gnupg Disable /sbin Disable /usr/sbin Disable /usr/local/sbin Disable /usr/include Disable /usr/lib/valgrind Disable /usr/share/perl Disable /usr/share/perl-openssl-defaults Disable /usr/share/perl5 Disable /usr/lib/perl5 Disable /home/username/.pki/nssdb Disable /home/username/.config/transmission Disable /home/username/.thunderbird Disable /home/username/.mozilla Disable /home/username/.config/evolution Disable /home/username/.local/share/evolution Disable /home/username/.cache/evolution Disable /home/username/.cache/mozilla Disable /home/username/.cache/thunderbird Mounting noexec /tmp Disable /sys/fs Create the new ld.so.preload file Blacklist violations are logged to syslog Mount the new ld.so.preload file DISPLAY :0, 0 Dropping all capabilities Set protocol filter: unix,inet,inet6 Dual i386/amd64 seccomp filter configured SECCOMP Filter: VALIDATE_ARCHITECTURE EXAMINE_SYSCAL UNKNOWN ENTRY!!! UNKNOWN ENTRY!!! UNKNOWN ENTRY!!! BLACKLIST 165 mount BLACKLIST 166 umount2 BLACKLIST 101 ptrace BLACKLIST 246 kexec_load BLACKLIST 320 kexec_file_load BLACKLIST 304 open_by_handle_at BLACKLIST 303 name_to_handle_at BLACKLIST 175 init_module BLACKLIST 313 finit_module BLACKLIST 174 create_module BLACKLIST 176 delete_module BLACKLIST 172 iopl BLACKLIST 173 ioperm BLACKLIST 251 ioprio_set BLACKLIST 167 swapon BLACKLIST 168 swapoff BLACKLIST 103 syslog BLACKLIST 310 process_vm_readv BLACKLIST 311 process_vm_writev BLACKLIST 139 sysfs BLACKLIST 156 _sysctl BLACKLIST 159 adjtimex BLACKLIST 305 clock_adjtime BLACKLIST 212 lookup_dcookie BLACKLIST 298 perf_event_open BLACKLIST 300 fanotify_init BLACKLIST 312 kcmp BLACKLIST 248 add_key BLACKLIST 249 request_key BLACKLIST 250 keyctl BLACKLIST 134 uselib BLACKLIST 163 acct BLACKLIST 154 modify_ldt BLACKLIST 155 pivot_root BLACKLIST 206 io_setup BLACKLIST 207 io_destroy BLACKLIST 208 io_getevents BLACKLIST 209 io_submit BLACKLIST 210 io_cancel BLACKLIST 216 remap_file_pages BLACKLIST 237 mbind BLACKLIST 239 get_mempolicy BLACKLIST 238 set_mempolicy BLACKLIST 256 migrate_pages BLACKLIST 279 move_pages BLACKLIST 278 vmsplice BLACKLIST 161 chroot BLACKLIST 184 tuxcall BLACKLIST 169 reboot BLACKLIST 180 nfsservctl BLACKLIST 177 get_kernel_syms RETURN_ALLOW Save seccomp filter, size 880 bytes noroot user namespace installed Dropping all capabilities NO_NEW_PRIVS set starting application LD_PRELOAD=(null) execvp argument 0: ./start-tor-browser Child process initialized monitoring pid 22 Sandbox monitor: waitpid 22 retval 22 status 256 Parent is shutting down, bye... ``` System is updated Debian 9. Any help would be appreciated.
Author
Owner

@SkewedZeppelin commented on GitHub (Sep 6, 2017):

Could you try commenting private-bin and private-etc? and reply which one allows it to start?

<!-- gh-comment-id:327392999 --> @SkewedZeppelin commented on GitHub (Sep 6, 2017): Could you try commenting private-bin and private-etc? and reply which one allows it to start?
Author
Owner

@PC-Admin commented on GitHub (Sep 6, 2017):

The lines i commented out before were:

#nodvd
#notv
#novideo

After commenting out private-bin it seemed to run but gets caught on another error:

Tor Browser Profile Problem

You cannot run Tor Browser from a read-only file system.  Please copy Tor Browser to another location before trying to use it.
<!-- gh-comment-id:327418668 --> @PC-Admin commented on GitHub (Sep 6, 2017): The lines i commented out before were: #nodvd #notv #novideo After commenting out private-bin it seemed to run but gets caught on another error: ``` Tor Browser Profile Problem You cannot run Tor Browser from a read-only file system. Please copy Tor Browser to another location before trying to use it. ```
Author
Owner

@PC-Admin commented on GitHub (Sep 7, 2017):

Turns out it needed to be run from within the users home directory. The only edits to the profile that are needed for it to run were:

#nodvd
#notv
#novideo

Thanks!

<!-- gh-comment-id:327672738 --> @PC-Admin commented on GitHub (Sep 7, 2017): Turns out it needed to be run from within the users home directory. The only edits to the profile that are needed for it to run were: #nodvd #notv #novideo Thanks!
Sign in to join this conversation.
No milestone
No project
No assignees
1 participant
Notifications
Due date
The due date is invalid or out of range. Please use the format "yyyy-mm-dd".

No due date set.

Dependencies

No dependencies set.

Reference: github-starred/firejail#1021
No description provided.