[GH-ISSUE #3343] rambox: fails to start #2097

Closed
opened 2026-05-05 08:46:39 -06:00 by gitea-mirror · 4 comments
Owner

Originally created by @ghost on GitHub (Apr 10, 2020).
Original GitHub issue: https://github.com/netblue30/firejail/issues/3343

Describe the bug
rambox application doesn't start, core dumped.

$ rambox
Reading profile /etc/firejail/rambox.profile
Reading profile /etc/firejail/disable-common.inc
Reading profile /etc/firejail/disable-devel.inc
Reading profile /etc/firejail/disable-interpreters.inc
Reading profile /etc/firejail/disable-programs.inc
Reading profile /etc/firejail/whitelist-common.inc
Parent pid 23792, child pid 23793
Warning: cleaning all supplementary groups
Warning: /sbin directory link was not blacklisted
Warning: /usr/sbin directory link was not blacklisted
Warning: cleaning all supplementary groups
Child process initialized in 94.56 ms

Parent is shutting down, bye...
$ firejail --profile=rambox 
Reading profile /etc/firejail/rambox.profile
Reading profile /etc/firejail/disable-common.inc
Reading profile /etc/firejail/disable-devel.inc
Reading profile /etc/firejail/disable-interpreters.inc
Reading profile /etc/firejail/disable-programs.inc
Reading profile /etc/firejail/whitelist-common.inc
Parent pid 23832, child pid 23833
Warning: cleaning all supplementary groups
Warning: /sbin directory link was not blacklisted
Warning: /usr/sbin directory link was not blacklisted
Warning: cleaning all supplementary groups
Child process initialized in 95.41 ms
$ rambox
Warning: an existing sandbox was detected. /usr/bin/rambox will run without any additional sandboxing features
`trap' para punto de parada/seguimiento (`core' generado)
$ exit
exit

Parent is shutting down, bye...

Behavior change on disabling firejail
rambox runs right with --noprofile:

$ firejail --noprofile rambox
Parent pid 23884, child pid 23885
Child process initialized in 6.85 ms
Warning: an existing sandbox was detected. /usr/bin/rambox will run without any additional sandboxing features
(electron) 'getName function' is deprecated and will be removed. Please use 'name property' instead.
(electron) 'setBadgeCount function' is deprecated and will be removed. Please use 'badgeCount property' instead.
(electron) 'setZoomLevel function' is deprecated and will be removed. Please use 'zoomLevel property' instead.

Parent is shutting down, bye...

To Reproduce
Just execute rambox or firejail rambox.

Expected behavior
Rambox application should start and not generate a core dumped. I think the problem is related with seccomp because if I ignore it, application starts:

$ firejail --ignore=seccomp rambox
Reading profile /etc/firejail/rambox.profile
Reading profile /etc/firejail/disable-common.inc
Reading profile /etc/firejail/disable-devel.inc
Reading profile /etc/firejail/disable-interpreters.inc
Reading profile /etc/firejail/disable-programs.inc
Reading profile /etc/firejail/whitelist-common.inc
Parent pid 24207, child pid 24208
Warning: cleaning all supplementary groups
Warning: /sbin directory link was not blacklisted
Warning: /usr/sbin directory link was not blacklisted
Warning: cleaning all supplementary groups
Child process initialized in 97.11 ms
Warning: an existing sandbox was detected. /usr/bin/rambox will run without any additional sandboxing features
(electron) 'getName function' is deprecated and will be removed. Please use 'name property' instead.

(rambox:5): dconf-WARNING **: 13:37:45.444: Unable to open /var/lib/flatpak/exports/share/dconf/profile/user: Permiso denegado
(electron) 'setBadgeCount function' is deprecated and will be removed. Please use 'badgeCount property' instead.
(electron) 'setZoomLevel function' is deprecated and will be removed. Please use 'zoomLevel property' instead.
../../sandbox/linux/seccomp-bpf-helpers/sigsys_handlers.cc:**CRASHING**:seccomp-bpf failure in syscall 0230

Parent is shutting down, bye...

Desktop (please complete the following information):

$ lsb_release -a
LSB Version:	1.4
Distributor ID:	Arch
Description:	Arch Linux
Release:	rolling
Codename:	n/a
$ firejail --version
firejail version 0.9.62

Compile time support:
	- AppArmor support is enabled
	- AppImage support is enabled
	- chroot support is enabled
	- file and directory whitelisting support is enabled
	- file transfer support is enabled
	- firetunnel support is enabled
	- networking support is enabled
	- overlayfs support is enabled
	- private-home support is enabled
	- seccomp-bpf support is enabled
	- user namespace support is enabled
	- X11 sandboxing support is enabled

Originally created by @ghost on GitHub (Apr 10, 2020). Original GitHub issue: https://github.com/netblue30/firejail/issues/3343 **Describe the bug** rambox application doesn't start, core dumped. ```bash $ rambox Reading profile /etc/firejail/rambox.profile Reading profile /etc/firejail/disable-common.inc Reading profile /etc/firejail/disable-devel.inc Reading profile /etc/firejail/disable-interpreters.inc Reading profile /etc/firejail/disable-programs.inc Reading profile /etc/firejail/whitelist-common.inc Parent pid 23792, child pid 23793 Warning: cleaning all supplementary groups Warning: /sbin directory link was not blacklisted Warning: /usr/sbin directory link was not blacklisted Warning: cleaning all supplementary groups Child process initialized in 94.56 ms Parent is shutting down, bye... $ firejail --profile=rambox Reading profile /etc/firejail/rambox.profile Reading profile /etc/firejail/disable-common.inc Reading profile /etc/firejail/disable-devel.inc Reading profile /etc/firejail/disable-interpreters.inc Reading profile /etc/firejail/disable-programs.inc Reading profile /etc/firejail/whitelist-common.inc Parent pid 23832, child pid 23833 Warning: cleaning all supplementary groups Warning: /sbin directory link was not blacklisted Warning: /usr/sbin directory link was not blacklisted Warning: cleaning all supplementary groups Child process initialized in 95.41 ms $ rambox Warning: an existing sandbox was detected. /usr/bin/rambox will run without any additional sandboxing features `trap' para punto de parada/seguimiento (`core' generado) $ exit exit Parent is shutting down, bye... ``` **Behavior change on disabling firejail** rambox runs right with --noprofile: ```bash $ firejail --noprofile rambox Parent pid 23884, child pid 23885 Child process initialized in 6.85 ms Warning: an existing sandbox was detected. /usr/bin/rambox will run without any additional sandboxing features (electron) 'getName function' is deprecated and will be removed. Please use 'name property' instead. (electron) 'setBadgeCount function' is deprecated and will be removed. Please use 'badgeCount property' instead. (electron) 'setZoomLevel function' is deprecated and will be removed. Please use 'zoomLevel property' instead. Parent is shutting down, bye... ``` **To Reproduce** Just execute `rambox` or `firejail rambox`. **Expected behavior** Rambox application should start and not generate a core dumped. I think the problem is related with seccomp because if I ignore it, application starts: ```bash $ firejail --ignore=seccomp rambox Reading profile /etc/firejail/rambox.profile Reading profile /etc/firejail/disable-common.inc Reading profile /etc/firejail/disable-devel.inc Reading profile /etc/firejail/disable-interpreters.inc Reading profile /etc/firejail/disable-programs.inc Reading profile /etc/firejail/whitelist-common.inc Parent pid 24207, child pid 24208 Warning: cleaning all supplementary groups Warning: /sbin directory link was not blacklisted Warning: /usr/sbin directory link was not blacklisted Warning: cleaning all supplementary groups Child process initialized in 97.11 ms Warning: an existing sandbox was detected. /usr/bin/rambox will run without any additional sandboxing features (electron) 'getName function' is deprecated and will be removed. Please use 'name property' instead. (rambox:5): dconf-WARNING **: 13:37:45.444: Unable to open /var/lib/flatpak/exports/share/dconf/profile/user: Permiso denegado (electron) 'setBadgeCount function' is deprecated and will be removed. Please use 'badgeCount property' instead. (electron) 'setZoomLevel function' is deprecated and will be removed. Please use 'zoomLevel property' instead. ../../sandbox/linux/seccomp-bpf-helpers/sigsys_handlers.cc:**CRASHING**:seccomp-bpf failure in syscall 0230 Parent is shutting down, bye... ``` **Desktop (please complete the following information):** ```bash $ lsb_release -a LSB Version: 1.4 Distributor ID: Arch Description: Arch Linux Release: rolling Codename: n/a ``` ```bash $ firejail --version firejail version 0.9.62 Compile time support: - AppArmor support is enabled - AppImage support is enabled - chroot support is enabled - file and directory whitelisting support is enabled - file transfer support is enabled - firetunnel support is enabled - networking support is enabled - overlayfs support is enabled - private-home support is enabled - seccomp-bpf support is enabled - user namespace support is enabled - X11 sandboxing support is enabled ```
gitea-mirror 2026-05-05 08:46:39 -06:00
Author
Owner

@ghost commented on GitHub (Apr 10, 2020):

Warning: an existing sandbox was detected. /usr/bin/rambox will run without any additional sandboxing features

The output you posted seems to suggest you're using firecfg to provide desktop integration for firejail, correct? In that case you will have to use the full path to the rambox executable, like firejail --profile=rambox /usr/bin/rambox to get reliable output.

That being said, electron-based applications (still) suffer from a bug and need some fixing related to seccomp, which is indeed part of the issue here apparently. Can you try with seccomp !chroot instead of seccomp please? It would be rather a big loss in the strength of our rambox profile if it would require the whole seccomp filter to be dropped. So if you could confirm it works once you feed it 'seccomp !chroot' we can fix the rambox profile accordingly and in a more secure way.

<!-- gh-comment-id:612002071 --> @ghost commented on GitHub (Apr 10, 2020): > Warning: an existing sandbox was detected. /usr/bin/rambox will run without any additional sandboxing features The output you posted seems to suggest you're using `firecfg` to provide desktop integration for firejail, correct? In that case you will have to use the full path to the rambox executable, like `firejail --profile=rambox /usr/bin/rambox` to get reliable output. That being said, electron-based applications (still) suffer from a bug and need some fixing related to seccomp, which is indeed part of the issue here apparently. Can you try with `seccomp !chroot` instead of seccomp please? It would be rather a big loss in the strength of our rambox profile if it would require the whole seccomp filter to be dropped. So if you could confirm it works once you feed it 'seccomp !chroot' we can fix the rambox profile accordingly and in a more secure way.
Author
Owner

@ghost commented on GitHub (Apr 10, 2020):

I checked again the default profile provided for rambox in firejail 0.9.62 and the default rambox profile fails:

$ firejail --profile=rambox /usr/bin/rambox
Reading profile /etc/firejail/rambox.profile
Reading profile /etc/firejail/disable-common.inc
Reading profile /etc/firejail/disable-devel.inc
Reading profile /etc/firejail/disable-interpreters.inc
Reading profile /etc/firejail/disable-programs.inc
Reading profile /etc/firejail/whitelist-common.inc
Parent pid 30221, child pid 30222
Warning: cleaning all supplementary groups
Warning: /sbin directory link was not blacklisted
Warning: /usr/sbin directory link was not blacklisted
Warning: cleaning all supplementary groups
Child process initialized in 70.32 ms

Parent is shutting down, bye...

However, it works with seccomp !chroot configured in my ~/.config/firejail/rambox.profile:

$ firejail --profile=rambox /usr/bin/rambox 
Reading profile /home/zako/.config/firejail/rambox.profile
Reading profile /etc/firejail/rambox.profile
Reading profile /etc/firejail/disable-common.inc
Reading profile /etc/firejail/disable-devel.inc
Reading profile /etc/firejail/disable-interpreters.inc
Reading profile /etc/firejail/disable-programs.inc
Reading profile /etc/firejail/whitelist-common.inc
Parent pid 30738, child pid 30739
Warning: cleaning all supplementary groups
Warning: /sbin directory link was not blacklisted
Warning: /usr/sbin directory link was not blacklisted
Warning: cleaning all supplementary groups
Post-exec seccomp protector enabled
Seccomp list in: !chroot, check list: @default-keep, prelist: unknown,
Child process initialized in 80.29 ms
(electron) 'getName function' is deprecated and will be removed. Please use 'name property' instead.

(rambox:7): dconf-WARNING **: 15:52:06.156: Unable to open /var/lib/flatpak/exports/share/dconf/profile/user: Permiso denegado
(electron) 'setBadgeCount function' is deprecated and will be removed. Please use 'badgeCount property' instead.
(electron) 'setZoomLevel function' is deprecated and will be removed. Please use 'zoomLevel property' instead.

Parent is shutting down, bye...
<!-- gh-comment-id:612039233 --> @ghost commented on GitHub (Apr 10, 2020): I checked again the default profile provided for rambox in firejail 0.9.62 and the default rambox profile fails: ```bash $ firejail --profile=rambox /usr/bin/rambox Reading profile /etc/firejail/rambox.profile Reading profile /etc/firejail/disable-common.inc Reading profile /etc/firejail/disable-devel.inc Reading profile /etc/firejail/disable-interpreters.inc Reading profile /etc/firejail/disable-programs.inc Reading profile /etc/firejail/whitelist-common.inc Parent pid 30221, child pid 30222 Warning: cleaning all supplementary groups Warning: /sbin directory link was not blacklisted Warning: /usr/sbin directory link was not blacklisted Warning: cleaning all supplementary groups Child process initialized in 70.32 ms Parent is shutting down, bye... ``` However, it works with `seccomp !chroot` configured in my `~/.config/firejail/rambox.profile`: ```bash $ firejail --profile=rambox /usr/bin/rambox Reading profile /home/zako/.config/firejail/rambox.profile Reading profile /etc/firejail/rambox.profile Reading profile /etc/firejail/disable-common.inc Reading profile /etc/firejail/disable-devel.inc Reading profile /etc/firejail/disable-interpreters.inc Reading profile /etc/firejail/disable-programs.inc Reading profile /etc/firejail/whitelist-common.inc Parent pid 30738, child pid 30739 Warning: cleaning all supplementary groups Warning: /sbin directory link was not blacklisted Warning: /usr/sbin directory link was not blacklisted Warning: cleaning all supplementary groups Post-exec seccomp protector enabled Seccomp list in: !chroot, check list: @default-keep, prelist: unknown, Child process initialized in 80.29 ms (electron) 'getName function' is deprecated and will be removed. Please use 'name property' instead. (rambox:7): dconf-WARNING **: 15:52:06.156: Unable to open /var/lib/flatpak/exports/share/dconf/profile/user: Permiso denegado (electron) 'setBadgeCount function' is deprecated and will be removed. Please use 'badgeCount property' instead. (electron) 'setZoomLevel function' is deprecated and will be removed. Please use 'zoomLevel property' instead. Parent is shutting down, bye... ```
Author
Owner

@ghost commented on GitHub (Apr 10, 2020):

@chrpinedo Just installed rambox-bin from AUR and I can reproduce. It confirms my earlier posting and we have a fix in git master now. The rambox profile does indeed need 'seccomp !chroot' for it to work properly. Until the fix gets into a future release, you should be fine by adding that to your rambox.local. One other thing. If your rambox files are installed under /opt/rambox, you can further harden the profile by adding 'private-opt rambox', so it can't see anything else you might have installed under /opt. Feel free to re-open if you need anything else.

<!-- gh-comment-id:612046228 --> @ghost commented on GitHub (Apr 10, 2020): @chrpinedo Just installed rambox-bin from AUR and I can reproduce. It confirms my earlier posting and we have a fix in git master now. The rambox profile does indeed need 'seccomp !chroot' for it to work properly. Until the fix gets into a future release, you should be fine by adding that to your rambox.local. One other thing. If your rambox files are installed under /opt/rambox, you can further harden the profile by adding 'private-opt rambox', so it can't see anything else you might have installed under /opt. Feel free to re-open if you need anything else.
Author
Owner

@ghost commented on GitHub (Apr 10, 2020):

Thanks for the private-opt rambox, I am beginning with firejail and I appreciate it. Regards!

<!-- gh-comment-id:612052393 --> @ghost commented on GitHub (Apr 10, 2020): Thanks for the `private-opt rambox`, I am beginning with firejail and I appreciate it. Regards!
Sign in to join this conversation.
No milestone
No project
No assignees
1 participant
Notifications
Due date
The due date is invalid or out of range. Please use the format "yyyy-mm-dd".

No due date set.

Dependencies

No dependencies set.

Reference: github-starred/firejail#2097
No description provided.