mirror of
https://github.com/netblue30/firejail.git
synced 2026-05-15 14:16:14 -06:00
[GH-ISSUE #2809] firejail hanging when using strace, but ptrace is not allowed #1759
Labels
No labels
LTS merge
LTS merge
bug
bug
converted-to-discussion
doc-todo
documentation
duplicate
enhancement
file-transfer
firecfg
firejail-in-firejail
firetools
graphics
help wanted
information_old
installation
invalid
modif
moved
needinfo
networking
notabug
notourbug
old-version
overlayfs
packaging
profile-request
pull-request
question
question_old
removal
runtime-permissions
sandbox-ipc
security
stale
wiki
wiki
wontfix
wordpress
workaround
No milestone
No project
No assignees
1 participant
Notifications
Due date
No due date set.
Dependencies
No dependencies set.
Reference: github-starred/firejail#1759
Loading…
Add table
Add a link
Reference in a new issue
No description provided.
Delete branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Originally created by @reinerh on GitHub (Jun 29, 2019).
Original GitHub issue: https://github.com/netblue30/firejail/issues/2809
A Debian user reported the issue, that firejail is just hanging, when he was using
strace lswith a profile that had the ptrace syscall dropped, even though--allow-debuggershas been specified.So there seem to be two issues:
--allow-debuggersspecified on the command line not override the dropped syscalls from the profile? According to the manpage this should be the case.@smitsohu commented on GitHub (Jul 2, 2019):
firejail --allow-debuggers --seccomp-> worksfirejail --allow-debuggers --seccomp.drop=ptrace-> is brokenIt seems that strace pauses soon after starting up, before any
ptracesyscalls are issued:(obtained with something like
sudo strace -ff -o trace firejail --noprofile --allow-debuggers --seccomp.drop=ptrace strace ls)@rusty-snake commented on GitHub (Aug 22, 2019):
whats wrong?
seccompdoesn't use thes default listallow-debuggersdoesn't whitelist syscallswhats realy happening?
seccompblacklist the syscalls in@default-nodebuggersunlessallow-debuggersis given, the it use@default=>
allow-debuggersswitch the list used byseccomp8dfe3eb565/src/fseccomp/seccomp.c (L29-L32)(TODO: update manpage) [EDIT] #2940 [/EDIT]
whats the issue with
seccomp.drop?seccomp.dropuse always the given list of syscalls/groups and no group by default, soallow-debuggerscan't swtich this. Hereallow-debuggerswould have to work likenoblacklistin profiles, but this is not implemented.8dfe3eb565/src/fseccomp/seccomp.c (L72)