mirror of
https://github.com/netblue30/firejail.git
synced 2026-05-15 14:16:14 -06:00
[GH-ISSUE #3344] Warning: cannot open source file /usr/local/lib/firejail/seccomp, file not copied #2099
Labels
No labels
LTS merge
LTS merge
bug
bug
converted-to-discussion
doc-todo
documentation
duplicate
enhancement
file-transfer
firecfg
firejail-in-firejail
firetools
graphics
help wanted
information_old
installation
invalid
modif
moved
needinfo
networking
notabug
notourbug
old-version
overlayfs
packaging
profile-request
pull-request
question
question_old
removal
runtime-permissions
sandbox-ipc
security
stale
wiki
wiki
wontfix
wordpress
workaround
No milestone
No project
No assignees
1 participant
Notifications
Due date
No due date set.
Dependencies
No dependencies set.
Reference: github-starred/firejail#2099
Loading…
Add table
Add a link
Reference in a new issue
No description provided.
Delete branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Originally created by @downystreet on GitHub (Apr 11, 2020).
Original GitHub issue: https://github.com/netblue30/firejail/issues/3344
Describe the bug
When running the firejail firefox command in centos 8, I'm getting several errors that pertain to missing files and files that were not copied. After getting the error readout the command is not completed and terminates with no firefox window opening. I looked in the directories pertaining to the errors and indeed the files were missing. Here is the terminal readout:
$ firejail firefox
Reading profile /usr/local/etc/firejail/firefox.profile
Reading profile /usr/local/etc/firejail/whitelist-usr-share-common.inc
Reading profile /usr/local/etc/firejail/firefox-common.profile
Reading profile /usr/local/etc/firejail/disable-common.inc
Reading profile /usr/local/etc/firejail/disable-devel.inc
Reading profile /usr/local/etc/firejail/disable-exec.inc
Reading profile /usr/local/etc/firejail/disable-interpreters.inc
Reading profile /usr/local/etc/firejail/disable-programs.inc
Reading profile /usr/local/etc/firejail/whitelist-common.inc
Reading profile /usr/local/etc/firejail/whitelist-var-common.inc
Seccomp list in: !chroot, check list: @default-keep, prelist: unknown,
Parent pid 17772, child pid 17773
Warning: cannot open source file /usr/local/lib/firejail/seccomp.32, file not copied
Warning: cannot open source file /usr/local/lib/firejail/seccomp, file not copied
Error: /run/firejail/lib/fseccomp does not exist
Error: failed to run /run/firejail/lib/fseccomp
Error: proc 17772 cannot sync with peer: unexpected EOF
Peer 17773 unexpectedly exited with status 1
Behavior change on disabling firejail
When run with the --noprofile option firefox opens and runs as expected.
To Reproduce
Steps to reproduce the behavior:
$ git clone https://github.com/netblue30/firejail.git
$ cd firejail
$ ./configure && make && sudo make install-strip
Expected behavior
Expected firefox to open and be sandboxed by firejail.
Desktop (please complete the following information):
LSB Version: :core-4.1-amd64:core-4.1-noarch
Distributor ID: CentOS
Description: CentOS Linux release 8.1.1911 (Core)
Release: 8.1.1911
Codename: Core
Compile time support:
- AppArmor support is disabled
- AppImage support is enabled
- chroot support is enabled
- file and directory whitelisting support is enabled
- file transfer support is enabled
- firetunnel support is enabled
- networking support is enabled
- overlayfs support is enabled
- private-home support is enabled
- seccomp-bpf support is enabled
- user namespace support is enabled
- X11 sandboxing support is enabled
Additional context
I have used this github repository with centos 7 several weeks ago and had no problems using 'firejail firefox.' The date of the firejail download for use in centos 8 was 04/11/20.
@downystreet commented on GitHub (Apr 11, 2020):
Here is a debug readout:
$ firejail --debug firefox
Autoselecting /bin/bash as shell
Building quoted command line: 'firefox'
Command name #firefox#
Found firefox.profile profile in /usr/local/etc/firejail directory
Reading profile /usr/local/etc/firejail/firefox.profile
Found whitelist-usr-share-common.inc profile in /usr/local/etc/firejail directory
Reading profile /usr/local/etc/firejail/whitelist-usr-share-common.inc
Found firefox-common.profile profile in /usr/local/etc/firejail directory
Reading profile /usr/local/etc/firejail/firefox-common.profile
conditional BROWSER_ALLOW_DRM, ignore noexec ${HOME}
Found disable-common.inc profile in /usr/local/etc/firejail directory
Reading profile /usr/local/etc/firejail/disable-common.inc
Found disable-devel.inc profile in /usr/local/etc/firejail directory
Reading profile /usr/local/etc/firejail/disable-devel.inc
Found disable-exec.inc profile in /usr/local/etc/firejail directory
Reading profile /usr/local/etc/firejail/disable-exec.inc
Found disable-interpreters.inc profile in /usr/local/etc/firejail directory
Reading profile /usr/local/etc/firejail/disable-interpreters.inc
Found disable-programs.inc profile in /usr/local/etc/firejail directory
Reading profile /usr/local/etc/firejail/disable-programs.inc
Found whitelist-common.inc profile in /usr/local/etc/firejail directory
Reading profile /usr/local/etc/firejail/whitelist-common.inc
Found whitelist-var-common.inc profile in /usr/local/etc/firejail directory
Reading profile /usr/local/etc/firejail/whitelist-var-common.inc
conditional BROWSER_DISABLE_U2F, nou2f
conditional BROWSER_DISABLE_U2F, private-dev
Seccomp list in: !chroot, check list: @default-keep, prelist: unknown,
DISPLAY=:0 parsed as 0
Using the local network stack
Parent pid 20673, child pid 20674
Host network configured
Initializing child process
PID namespace installed
Mounting tmpfs on /run/firejail/mnt directory
Creating empty /run/firejail/mnt/seccomp directory
Warning: cannot open source file /usr/local/lib/firejail/seccomp.32, file not copied
Warning: cannot open source file /usr/local/lib/firejail/seccomp, file not copied
Creating empty /run/firejail/mnt/seccomp/seccomp.protocol file
Creating empty /run/firejail/mnt/seccomp/seccomp.postexec file
Creating empty /run/firejail/mnt/seccomp/seccomp.postexec32 file
IBUS_ADDRESS=unix:abstract=/tmp/dbus-SxoG3UqF,guid=1054b6222180f195bd76c9ac5e9142ab
IBUS_DAEMON_PID=6980
Build protocol filter: unix,inet,inet6,netlink
sbox run: /run/firejail/lib/fseccomp protocol build unix,inet,inet6,netlink /run/firejail/mnt/seccomp/seccomp.protocol
Dropping all capabilities
Drop privileges: pid 2, uid 1000, gid 1000, nogroups 1
No supplementary groups
Error: /run/firejail/lib/fseccomp does not exist
Error: failed to run /run/firejail/lib/fseccomp
Error: proc 20673 cannot sync with peer: unexpected EOF
Peer 20674 unexpectedly exited with status 1
@ghost commented on GitHub (Apr 11, 2020):
Sounds like a duplicate of #3341. If you want to keep as close to git master as possible, you can use the below commands just before the './configure && make && sudo make install-strip' step. Or alternatively do a git checkout with the hash of the commit you prefer before breakage occurred.
@topimiettinen commented on GitHub (Apr 12, 2020):
This should have been closed by
d8fa95f, so closing manually.