[GH-ISSUE #4184] telegram-desktop 2.7.1 is not starting with telegram-desktop.profile #2570

Closed
opened 2026-05-05 09:14:36 -06:00 by gitea-mirror · 3 comments
Owner

Originally created by @ghost on GitHub (Apr 12, 2021).
Original GitHub issue: https://github.com/netblue30/firejail/issues/4184

Bug and expected behavior

  • telegram-desktop 2.7.1, located in /usr/local/bin/telegram-desktop, is not starting with telegram-desktop.profile.

No profile and disabling firejail

  • What changed calling firejail --noprofile /path/to/program in a terminal? Program started after using firejail --noprofile telegram-desktop
  • What changed calling the program by path (e.g. /usr/bin/vlc)? Nothing, program did not start

Reproduce
Steps to reproduce the behavior:

  1. Run in bash firejail telegram-desktop
  2. See error usr/bin/telegram-desktop: error while loading shared libraries: libwbclient.so.0: cannot open shared object file: No such file or directory

Environment

  • Fedora 33
  • Firejail version 0.9.64

Checklist

  • The profile (and redirect profile if exists) hasn't already been fixed upstream.
  • The program has a profile. (If not, request one in https://github.com/netblue30/firejail/issues/1139)
  • I have performed a short search for similar issues (to avoid opening a duplicate).
  • If it is a AppImage, --profile=PROFILENAME is used to set the right profile.
  • Used LC_ALL=en_US.UTF-8 LANG=en_US.UTF-8 PROGRAM to get english error-messages.
  • I'm aware of browser-allow-drm yes/browser-disable-u2f no in firejail.config to allow DRM/U2F in browsers.
  • This is not a question. Questions should be asked in https://github.com/netblue30/firejail/discussions.
debug output
Autoselecting /bin/bash as shell
Building quoted command line: 'telegram-desktop' 
Command name #telegram-desktop#
Found telegram-desktop.profile profile in /etc/firejail directory
Reading profile /etc/firejail/telegram-desktop.profile
Found telegram.profile profile in /etc/firejail directory
Reading profile /etc/firejail/telegram.profile
Found disable-common.inc profile in /etc/firejail directory
Reading profile /etc/firejail/disable-common.inc
Found disable-devel.inc profile in /etc/firejail directory
Reading profile /etc/firejail/disable-devel.inc
Found disable-exec.inc profile in /etc/firejail directory
Reading profile /etc/firejail/disable-exec.inc
Found disable-interpreters.inc profile in /etc/firejail directory
Reading profile /etc/firejail/disable-interpreters.inc
Found disable-programs.inc profile in /etc/firejail directory
Reading profile /etc/firejail/disable-programs.inc
DISPLAY=:0 parsed as 0
Using the local network stack
Parent pid 30387, child pid 30388
Initializing child process
Host network configured
PID namespace installed
Mounting tmpfs on /run/firejail/mnt directory
Creating empty /run/firejail/mnt/seccomp directory
Creating empty /run/firejail/mnt/seccomp/seccomp.protocol file
Creating empty /run/firejail/mnt/seccomp/seccomp.postexec file
Creating empty /run/firejail/mnt/seccomp/seccomp.postexec32 file
IBUS_ADDRESS=unix:abstract=/home/plankton/.cache/ibus/dbus-LvbifSX6,guid=a51ec470afef27e3b693807e6061bd47
IBUS_DAEMON_PID=3123
IBUS_ADDRESS=unix:abstract=/home/plankton/.cache/ibus/dbus-2HJPa41V,guid=be9655382374e611fa02d1d960717734
IBUS_DAEMON_PID=2833
Build protocol filter: unix,inet,inet6,netlink
sbox run: /run/firejail/lib/fseccomp protocol build unix,inet,inet6,netlink /run/firejail/mnt/seccomp/seccomp.protocol 
Dropping all capabilities
Drop privileges: pid 2, uid 1000, gid 1000, nogroups 1
No supplementary groups
Mounting /proc filesystem representing the PID namespace
Basic read-only filesystem:
Mounting read-only /etc
3453 2264 253:1 /etc /etc ro,relatime master:1 - ext4 /dev/mapper/fedora_localhost-root00 rw,seclabel
mountid=3453 fsname=/etc dir=/etc fstype=ext4
Mounting noexec /etc
3454 3453 253:1 /etc /etc ro,nosuid,nodev,noexec,relatime master:1 - ext4 /dev/mapper/fedora_localhost-root00 rw,seclabel
mountid=3454 fsname=/etc dir=/etc fstype=ext4
Mounting read-only /var
3456 3455 0:38 / /var/lib/nfs/rpc_pipefs rw,relatime master:155 - rpc_pipefs sunrpc rw
mountid=3456 fsname=/ dir=/var/lib/nfs/rpc_pipefs fstype=rpc_pipefs
Mounting read-only /var/lib/nfs/rpc_pipefs
3457 3456 0:38 / /var/lib/nfs/rpc_pipefs ro,relatime master:155 - rpc_pipefs sunrpc rw
mountid=3457 fsname=/ dir=/var/lib/nfs/rpc_pipefs fstype=rpc_pipefs
Mounting noexec /var
3460 3459 0:38 / /var/lib/nfs/rpc_pipefs ro,relatime master:155 - rpc_pipefs sunrpc rw
mountid=3460 fsname=/ dir=/var/lib/nfs/rpc_pipefs fstype=rpc_pipefs
Mounting noexec /var/lib/nfs/rpc_pipefs
3461 3460 0:38 / /var/lib/nfs/rpc_pipefs ro,nosuid,nodev,noexec,relatime master:155 - rpc_pipefs sunrpc rw
mountid=3461 fsname=/ dir=/var/lib/nfs/rpc_pipefs fstype=rpc_pipefs
Mounting read-only /usr
3462 2264 253:1 /usr /usr ro,relatime master:1 - ext4 /dev/mapper/fedora_localhost-root00 rw,seclabel
mountid=3462 fsname=/usr dir=/usr fstype=ext4
Mounting tmpfs on /var/lock
Mounting tmpfs on /var/tmp
Mounting tmpfs on /var/log
Create the new utmp file
Mount the new utmp file
Cleaning /home directory
Relabeling /home as /home (system_u:object_r:home_root_t:s0)
Cleaning /run/user directory
Relabeling /run/user as /run/user (system_u:object_r:user_tmp_t:s0)
Relabeling /run/user/1000 as /run/user/1000 (system_u:object_r:user_tmp_t:s0)
Sanitizing /etc/passwd, UID_MIN 1000
Sanitizing /etc/group, GID_MIN 1000
Disable /run/firejail/network
Disable /run/firejail/bandwidth
Disable /run/firejail/name
Disable /run/firejail/profile
Disable /run/firejail/x11
Mounting tmpfs on /home/plankton/.cache
3487 3470 0:256 / /home/plankton/.cache rw,nosuid,nodev,relatime - tmpfs tmpfs rw,seclabel,mode=755,uid=1000,gid=1000,inode64
mountid=3487 fsname=/ dir=/home/plankton/.cache fstype=tmpfs
Generate private-tmp whitelist commands
blacklist /run/firejail/dbus
Mounting read-only /proc/sys
Remounting /sys directory
Disable /sys/firmware
Disable /sys/hypervisor
Disable /sys/power
Disable /sys/kernel/debug
Disable /sys/kernel/vmcoreinfo
Disable /proc/sys/fs/binfmt_misc
Disable /proc/sys/kernel/core_pattern
Disable /proc/sys/kernel/modprobe
Disable /proc/sysrq-trigger
Disable /proc/sys/vm/panic_on_oom
Disable /proc/irq
Disable /proc/bus
Disable /proc/sched_debug
Disable /proc/timer_list
Disable /proc/kcore
Disable /proc/kallsyms
Disable /usr/lib/modules (requested /lib/modules)
Disable /usr/lib/debug
Disable /boot
Disable /dev/port
Disable /run/user/1000/gnupg
Disable /run/user/1000/systemd
Disable /dev/kmsg
Disable /proc/kmsg
Relabeling /run/firejail/mnt/etc as /etc (system_u:object_r:etc_t:s0)
Copying files in the new /etc directory:
Warning: file /etc/ca-certificates not found.
Warning: skipping ca-certificates for private /etc
copying /etc/crypto-policies to private /etc
Creating empty /run/firejail/mnt/etc/crypto-policies directory
sbox run: /run/firejail/lib/fcopy /etc/crypto-policies /run/firejail/mnt/etc/crypto-policies 
copying /etc/fonts to private /etc
Creating empty /run/firejail/mnt/etc/fonts directory
sbox run: /run/firejail/lib/fcopy /etc/fonts /run/firejail/mnt/etc/fonts 
copying /etc/ld.so.cache to private /etc
sbox run: /run/firejail/lib/fcopy /etc/ld.so.cache /run/firejail/mnt/etc 
copying /etc/localtime to private /etc
sbox run: /run/firejail/lib/fcopy /etc/localtime /run/firejail/mnt/etc 
copying /etc/machine-id to private /etc
sbox run: /run/firejail/lib/fcopy /etc/machine-id /run/firejail/mnt/etc 
copying /etc/pki to private /etc
Creating empty /run/firejail/mnt/etc/pki directory
sbox run: /run/firejail/lib/fcopy /etc/pki /run/firejail/mnt/etc/pki 
copying /etc/pulse to private /etc
Creating empty /run/firejail/mnt/etc/pulse directory
sbox run: /run/firejail/lib/fcopy /etc/pulse /run/firejail/mnt/etc/pulse 
copying /etc/resolv.conf to private /etc
sbox run: /run/firejail/lib/fcopy /etc/resolv.conf /run/firejail/mnt/etc 
copying /etc/ssl to private /etc
Creating empty /run/firejail/mnt/etc/ssl directory
sbox run: /run/firejail/lib/fcopy /etc/ssl /run/firejail/mnt/etc/ssl 
Mount-bind /run/firejail/mnt/etc on top of /etc
Private /etc installed in 37.52 ms
Cannot find /usr/etc
Debug 456: new_name #/tmp/.X11-unix#, whitelist
Mounting tmpfs on /tmp directory
Relabeling /tmp as /tmp (system_u:object_r:tmp_t:s0)
Whitelisting /tmp/.X11-unix
3509 3508 0:36 /.X11-unix /tmp/.X11-unix rw,nosuid,nodev master:43 - tmpfs tmpfs rw,seclabel,nr_inodes=409600,inode64
mountid=3509 fsname=/.X11-unix dir=/tmp/.X11-unix fstype=tmpfs
Disable /home/plankton/.local/share/Trash
Disable /home/plankton/.bash_history
Disable /home/plankton/.config/autostart
Disable /home/plankton/.local/share/gnome-shell
Mounting read-only /home/plankton/.config/dconf
3515 3470 253:5 /plankton/.config/dconf /home/plankton/.config/dconf ro,relatime master:53 - ext4 /dev/mapper/luks-2bcab42e-004b-47ca-b33c-be3b0a739c3b rw,seclabel
mountid=3515 fsname=/plankton/.config/dconf dir=/home/plankton/.config/dconf fstype=ext4
Disable /run/user/1000/gnome-session-leader-fifo
Disable /run/user/1000/gnome-shell
Disable /var/lib/systemd
Disable /usr/bin/systemd-run
Disable /run/user/1000/systemd
Disable /home/plankton/.config/VirtualBox
Disable /home/plankton/.config/gnome-boxes
Disable /home/plankton/.local/share/gnome-boxes
Disable /home/plankton/.config/libvirt
Disable /var/cache/libvirt
Disable /var/lib/libvirt
Disable /var/log/libvirt
Disable /var/lib/upower
Disable /var/spool/mail (requested /var/mail)
Disable /var/opt
Disable /run/docker.sock (requested /var/run/docker.sock)
Disable /var/spool/anacron
Disable /var/spool/cron
Disable /var/spool/mail
Mounting read-only /home/plankton/.bashrc
3536 3470 253:5 /plankton/.bashrc /home/plankton/.bashrc ro,relatime master:53 - ext4 /dev/mapper/luks-2bcab42e-004b-47ca-b33c-be3b0a739c3b rw,seclabel
mountid=3536 fsname=/plankton/.bashrc dir=/home/plankton/.bashrc fstype=ext4
Mounting read-only /home/plankton/.muttrc
3537 3470 253:5 /plankton/.muttrc /home/plankton/.muttrc ro,relatime master:53 - ext4 /dev/mapper/luks-2bcab42e-004b-47ca-b33c-be3b0a739c3b rw,seclabel
mountid=3537 fsname=/plankton/.muttrc dir=/home/plankton/.muttrc fstype=ext4
Mounting read-only /home/plankton/.bin
3539 3470 253:5 /plankton/.bin /home/plankton/.bin ro,relatime master:53 - ext4 /dev/mapper/luks-2bcab42e-004b-47ca-b33c-be3b0a739c3b rw,seclabel
mountid=3539 fsname=/plankton/.bin dir=/home/plankton/.bin fstype=ext4
Mounting read-only /home/plankton/.config/menus
3540 3470 253:5 /plankton/.config/menus /home/plankton/.config/menus ro,relatime master:53 - ext4 /dev/mapper/luks-2bcab42e-004b-47ca-b33c-be3b0a739c3b rw,seclabel
mountid=3540 fsname=/plankton/.config/menus dir=/home/plankton/.config/menus fstype=ext4
Mounting read-only /home/plankton/.local/share/applications
3541 3470 253:5 /plankton/.local/share/applications /home/plankton/.local/share/applications ro,relatime master:53 - ext4 /dev/mapper/luks-2bcab42e-004b-47ca-b33c-be3b0a739c3b rw,seclabel
mountid=3541 fsname=/plankton/.local/share/applications dir=/home/plankton/.local/share/applications fstype=ext4
Mounting read-only /home/plankton/.config/mimeapps.list
3542 3470 253:5 /plankton/.config/mimeapps.list /home/plankton/.config/mimeapps.list ro,relatime master:53 - ext4 /dev/mapper/luks-2bcab42e-004b-47ca-b33c-be3b0a739c3b rw,seclabel
mountid=3542 fsname=/plankton/.config/mimeapps.list dir=/home/plankton/.config/mimeapps.list fstype=ext4
Mounting read-only /home/plankton/.config/user-dirs.dirs
3543 3470 253:5 /plankton/.config/user-dirs.dirs /home/plankton/.config/user-dirs.dirs ro,relatime master:53 - ext4 /dev/mapper/luks-2bcab42e-004b-47ca-b33c-be3b0a739c3b rw,seclabel
mountid=3543 fsname=/plankton/.config/user-dirs.dirs dir=/home/plankton/.config/user-dirs.dirs fstype=ext4
Mounting read-only /home/plankton/.config/user-dirs.locale
3544 3470 253:5 /plankton/.config/user-dirs.locale /home/plankton/.config/user-dirs.locale ro,relatime master:53 - ext4 /dev/mapper/luks-2bcab42e-004b-47ca-b33c-be3b0a739c3b rw,seclabel
mountid=3544 fsname=/plankton/.config/user-dirs.locale dir=/home/plankton/.config/user-dirs.locale fstype=ext4
Mounting read-only /home/plankton/.local/share/mime
3545 3470 253:5 /plankton/.local/share/mime /home/plankton/.local/share/mime ro,relatime master:53 - ext4 /dev/mapper/luks-2bcab42e-004b-47ca-b33c-be3b0a739c3b rw,seclabel
mountid=3545 fsname=/plankton/.local/share/mime dir=/home/plankton/.local/share/mime fstype=ext4
Disable /home/plankton/.gnupg
Disable /home/plankton/.local/share/keyrings
Disable /home/plankton/.muttrc
Disable /home/plankton/.pki
Disable /home/plankton/.local/share/pki
Disable /home/plankton/.ssh
Disable /usr/sbin (requested /sbin)
Disable /usr/local/sbin
Disable /usr/sbin
Disable /usr/bin/at
Disable /usr/bin/chage
Disable /usr/bin/crontab
Disable /usr/bin/fusermount
Disable /usr/bin/gpasswd
Disable /usr/bin/mount
Disable /usr/bin/ncat (requested /usr/bin/nc)
Disable /usr/bin/ncat
Disable /usr/bin/newgidmap
Disable /usr/bin/newgrp
Disable /usr/bin/newuidmap
Disable /usr/bin/ntfs-3g
Disable /usr/bin/pkexec
Disable /usr/bin/newgrp (requested /usr/bin/sg)
Disable /usr/bin/strace
Disable /usr/bin/su
Disable /usr/bin/sudo
Disable /usr/bin/umount
Disable /usr/bin/xev
Disable /usr/bin/xinput
Disable /usr/bin/gnome-terminal
Disable /usr/bin/urxvtc
Disable /home/plankton/.local/share/flatpak/repo
Disable /home/plankton/.local/share/flatpak/.changed
Disable /home/plankton/.local/share/flatpak/db
Debug: no access to file /run/user/1000/doc, forcing mount
Disable /run/user/1000/doc
Disable /var/lib/flatpak/.changed
Disable /var/lib/flatpak/repo
Disable /var/lib/flatpak/oci
Disable /var/lib/flatpak/.fedora-initialized
Disable /var/lib/flatpak/appstream
Disable /usr/bin/bwrap
Disable /usr/bin/dig
Disable /usr/bin/nslookup
Disable /usr/bin/host
Disable /usr/bin/resolvectl
Disable /run/user/1000/wayland-0.lock
Disable /run/user/1000/pipewire-0.lock
Disable /usr/bin/as
Disable /usr/bin/gcc (requested /usr/bin/cc)
Disable /usr/bin/c++
Disable /usr/bin/c++filt
Disable /usr/bin/c89
Disable /usr/bin/c99
Disable /usr/bin/cpp
Disable /usr/bin/cpp2html
Disable /usr/bin/g++
Disable /usr/bin/gcc-ranlib
Disable /usr/bin/gcc-nm
Disable /usr/bin/gcc
Disable /usr/bin/gcc-ar
Disable /usr/libexec/gdb (requested /usr/bin/gdb)
Disable /usr/bin/x86_64-redhat-linux-gcc-10
Disable /usr/bin/x86_64-redhat-linux-gcc
Disable /usr/bin/x86_64-redhat-linux-g++
Disable /usr/bin/x86_64-redhat-linux-gcc-10
Disable /usr/bin/x86_64-redhat-linux-gcc
Disable /usr/bin/x86_64-redhat-linux-g++
Disable /usr/lib/java
Disable /usr/share/java
Disable /usr/bin/openssl
Disable /usr/src
Disable /usr/local/src
Disable /usr/include
Disable /usr/local/include
Mounting noexec /home/plankton
4268 4240 0:26 /firejail/firejail.ro.dir /home/plankton/.local/share/flatpak/db rw,nosuid,nodev master:13 - tmpfs tmpfs rw,seclabel,size=3070972k,nr_inodes=819200,mode=755,inode64
mountid=4268 fsname=/firejail/firejail.ro.dir dir=/home/plankton/.local/share/flatpak/db fstype=tmpfs
Mounting noexec /home/plankton/.cache
4269 4241 0:256 / /home/plankton/.cache rw,nosuid,nodev,noexec,relatime - tmpfs tmpfs rw,seclabel,mode=755,uid=1000,gid=1000,inode64
mountid=4269 fsname=/ dir=/home/plankton/.cache fstype=tmpfs
Mounting noexec /home/plankton/.config/dconf
4270 4246 253:5 /plankton/.config/dconf /home/plankton/.config/dconf ro,nosuid,nodev,noexec,relatime master:53 - ext4 /dev/mapper/luks-2bcab42e-004b-47ca-b33c-be3b0a739c3b rw,seclabel
mountid=4270 fsname=/plankton/.config/dconf dir=/home/plankton/.config/dconf fstype=ext4
Mounting noexec /home/plankton/.bashrc
4271 4251 253:5 /plankton/.bashrc /home/plankton/.bashrc ro,nosuid,nodev,noexec,relatime master:53 - ext4 /dev/mapper/luks-2bcab42e-004b-47ca-b33c-be3b0a739c3b rw,seclabel
mountid=4271 fsname=/plankton/.bashrc dir=/home/plankton/.bashrc fstype=ext4
Mounting noexec /home/plankton/.muttrc
4272 4253 0:26 /firejail/firejail.ro.file /home/plankton/.muttrc rw,nosuid,nodev,noexec master:13 - tmpfs tmpfs rw,seclabel,size=3070972k,nr_inodes=819200,mode=755,inode64
mountid=4272 fsname=/firejail/firejail.ro.file dir=/home/plankton/.muttrc fstype=tmpfs
Mounting noexec /home/plankton/.bin
4273 4254 253:5 /plankton/.bin /home/plankton/.bin ro,nosuid,nodev,noexec,relatime master:53 - ext4 /dev/mapper/luks-2bcab42e-004b-47ca-b33c-be3b0a739c3b rw,seclabel
mountid=4273 fsname=/plankton/.bin dir=/home/plankton/.bin fstype=ext4
Mounting noexec /home/plankton/.config/menus
4274 4255 253:5 /plankton/.config/menus /home/plankton/.config/menus ro,nosuid,nodev,noexec,relatime master:53 - ext4 /dev/mapper/luks-2bcab42e-004b-47ca-b33c-be3b0a739c3b rw,seclabel
mountid=4274 fsname=/plankton/.config/menus dir=/home/plankton/.config/menus fstype=ext4
Mounting noexec /home/plankton/.local/share/applications
4275 4256 253:5 /plankton/.local/share/applications /home/plankton/.local/share/applications ro,nosuid,nodev,noexec,relatime master:53 - ext4 /dev/mapper/luks-2bcab42e-004b-47ca-b33c-be3b0a739c3b rw,seclabel
mountid=4275 fsname=/plankton/.local/share/applications dir=/home/plankton/.local/share/applications fstype=ext4
Mounting noexec /home/plankton/.config/mimeapps.list
4276 4257 253:5 /plankton/.config/mimeapps.list /home/plankton/.config/mimeapps.list ro,nosuid,nodev,noexec,relatime master:53 - ext4 /dev/mapper/luks-2bcab42e-004b-47ca-b33c-be3b0a739c3b rw,seclabel
mountid=4276 fsname=/plankton/.config/mimeapps.list dir=/home/plankton/.config/mimeapps.list fstype=ext4
Mounting noexec /home/plankton/.config/user-dirs.dirs
4277 4258 253:5 /plankton/.config/user-dirs.dirs /home/plankton/.config/user-dirs.dirs ro,nosuid,nodev,noexec,relatime master:53 - ext4 /dev/mapper/luks-2bcab42e-004b-47ca-b33c-be3b0a739c3b rw,seclabel
mountid=4277 fsname=/plankton/.config/user-dirs.dirs dir=/home/plankton/.config/user-dirs.dirs fstype=ext4
Mounting noexec /home/plankton/.config/user-dirs.locale
4278 4259 253:5 /plankton/.config/user-dirs.locale /home/plankton/.config/user-dirs.locale ro,nosuid,nodev,noexec,relatime master:53 - ext4 /dev/mapper/luks-2bcab42e-004b-47ca-b33c-be3b0a739c3b rw,seclabel
mountid=4278 fsname=/plankton/.config/user-dirs.locale dir=/home/plankton/.config/user-dirs.locale fstype=ext4
Mounting noexec /home/plankton/.local/share/mime
4279 4260 253:5 /plankton/.local/share/mime /home/plankton/.local/share/mime ro,nosuid,nodev,noexec,relatime master:53 - ext4 /dev/mapper/luks-2bcab42e-004b-47ca-b33c-be3b0a739c3b rw,seclabel
mountid=4279 fsname=/plankton/.local/share/mime dir=/home/plankton/.local/share/mime fstype=ext4
Mounting noexec /run/user/1000
4290 4280 0:26 /firejail/firejail.ro.file /run/user/1000/pipewire-0.lock rw,nosuid,nodev master:13 - tmpfs tmpfs rw,seclabel,size=3070972k,nr_inodes=819200,mode=755,inode64
mountid=4290 fsname=/firejail/firejail.ro.file dir=/run/user/1000/pipewire-0.lock fstype=tmpfs
Warning: not remounting /run/user/1000/gvfs
Mounting noexec /run/user/1000/doc
4291 4283 0:26 /firejail/firejail.ro.dir /run/user/1000/doc rw,nosuid,nodev,noexec master:13 - tmpfs tmpfs rw,seclabel,size=3070972k,nr_inodes=819200,mode=755,inode64
mountid=4291 fsname=/firejail/firejail.ro.dir dir=/run/user/1000/doc fstype=tmpfs
Mounting noexec /dev/shm
4292 2415 0:24 / /dev/shm rw,nosuid,nodev,noexec master:11 - tmpfs tmpfs rw,seclabel,inode64
mountid=4292 fsname=/ dir=/dev/shm fstype=tmpfs
Mounting noexec /tmp
4294 4293 0:36 /.X11-unix /tmp/.X11-unix rw,nosuid,nodev master:43 - tmpfs tmpfs rw,seclabel,nr_inodes=409600,inode64
mountid=4294 fsname=/.X11-unix dir=/tmp/.X11-unix fstype=tmpfs
Mounting noexec /tmp/.X11-unix
4295 4294 0:36 /.X11-unix /tmp/.X11-unix rw,nosuid,nodev,noexec master:43 - tmpfs tmpfs rw,seclabel,nr_inodes=409600,inode64
mountid=4295 fsname=/.X11-unix dir=/tmp/.X11-unix fstype=tmpfs
Disable /usr/bin/gjs-console (requested /usr/bin/gjs)
Disable /usr/bin/gjs-console
Disable /usr/lib64/gjs
Disable /usr/lib64/libgjs.so.0.0.0
Disable /usr/lib64/libgjs.so.0.0.0 (requested /usr/lib64/libgjs.so.0)
Disable /usr/bin/luac
Disable /usr/bin/luajit-2.1.0-beta3
Disable /usr/bin/luajit-2.1.0-beta3 (requested /usr/bin/luajit)
Disable /usr/bin/lua
Disable /usr/share/luajit-2.1.0-beta3
Disable /usr/share/lua
Disable /usr/lib64/libmozjs-68.so.0.0.0 (requested /usr/lib64/libmozjs-68.so.0)
Disable /usr/lib64/libmozjs-78.so.0.0.0 (requested /usr/lib64/libmozjs-78.so.0)
Disable /usr/lib64/libmozjs-68.so.0.0.0
Disable /usr/lib64/libmozjs-78.so.0.0.0
Disable /usr/bin/cpanel_json_xs
Disable /usr/bin/perl
Disable /usr/share/perl5
Disable /usr/bin/python2.7-config (requested /usr/bin/python2-config)
Disable /usr/bin/python2.7
Disable /usr/bin/python2.7 (requested /usr/bin/python2)
Disable /usr/bin/python2.7-config
Disable /usr/lib/python2.7
Disable /usr/bin/python3.9 (requested /usr/bin/python3)
Disable /usr/bin/python3.9
Disable /usr/lib/python3.9
Disable /usr/lib64/python3.9
Not blacklist /home/plankton/.TelegramDesktop
Disable /home/plankton/.audacity-data
Disable /home/plankton/.config/GIMP
Disable /home/plankton/.config/VirtualBox
Disable /home/plankton/.config/chromium
Disable /home/plankton/.config/enchant
Disable /home/plankton/.config/eog
Disable /home/plankton/.config/epiphany
Disable /home/plankton/.config/evolution
Disable /home/plankton/.config/gconf
Disable /home/plankton/.config/gedit
Disable /home/plankton/.config/gnome-control-center
Disable /home/plankton/.config/gnome-initial-setup-done
Disable /home/plankton/.config/gnome-session
Disable /home/plankton/.config/inkscape
Disable /home/plankton/.config/libreoffice
Disable /home/plankton/.config/mpv
Disable /home/plankton/.config/nautilus
Disable /home/plankton/.config/transmission
Disable /home/plankton/.config/zoomus.conf
Disable /home/plankton/.local/share/Steam
Disable /home/plankton/.local/share/SuperHexagon
Not blacklist /home/plankton/.local/share/TelegramDesktop
Disable /home/plankton/.local/share/epiphany
Disable /home/plankton/.local/share/evolution
Disable /home/plankton/.local/share/gnome-boxes
Disable /home/plankton/.local/share/maps-places.json
Disable /home/plankton/.local/share/nautilus
Disable /home/plankton/.local/share/vpltd
Disable /home/plankton/.local/share/vulkan
Disable /home/plankton/.minecraft
Disable /home/plankton/.mozilla
Disable /home/plankton/.newsboat
Disable /home/plankton/.steam
Disable /home/plankton/.vscode-oss
Disable /home/plankton/.xonotic
Mounting read-only /tmp/.X11-unix
4357 4295 0:36 /.X11-unix /tmp/.X11-unix ro,nosuid,nodev,noexec master:43 - tmpfs tmpfs rw,seclabel,nr_inodes=409600,inode64
mountid=4357 fsname=/.X11-unix dir=/tmp/.X11-unix fstype=tmpfs
Disable /sys/fs
Disable /sys/module
Disable /mnt
Disable /media
Disable /run/mount
Disable /run/media
Relabeling /run/firejail/mnt/pulse as /run/firejail/mnt/pulse (system_u:object_r:var_run_t:s0)
Mounting noexec /run/firejail/mnt/pulse
4364 3450 0:247 /pulse /run/firejail/mnt/pulse rw,nosuid,nodev,noexec - tmpfs tmpfs rw,seclabel,mode=755,inode64
mountid=4364 fsname=/pulse dir=/run/firejail/mnt/pulse fstype=tmpfs
Mounting /run/firejail/mnt/pulse on /home/plankton/.config/pulse
4365 4240 0:247 /pulse /home/plankton/.config/pulse rw,nosuid,nodev,noexec - tmpfs tmpfs rw,seclabel,mode=755,inode64
mountid=4365 fsname=/pulse dir=/home/plankton/.config/pulse fstype=tmpfs
blacklist /dev/sr0
Current directory: /home/plankton
DISPLAY=:0 parsed as 0
Install protocol filter: unix,inet,inet6,netlink
configuring 22 seccomp entries in /run/firejail/mnt/seccomp/seccomp.protocol
sbox run: /usr/lib64/firejail/fsec-print /run/firejail/mnt/seccomp/seccomp.protocol 
Dropping all capabilities
Drop privileges: pid 12, uid 1000, gid 1000, nogroups 1
No supplementary groups
 line  OP JT JF    K
=================================
 0000: 20 00 00 00000004   ld  data.architecture
 0001: 15 04 00 c000003e   jeq ARCH_64 0006 (false 0002)
 0002: 20 00 00 00000000   ld  data.syscall-number
 0003: 15 01 00 00000167   jeq unknown 0005 (false 0004)
 0004: 06 00 00 7fff0000   ret ALLOW
 0005: 05 00 00 00000006   jmp 000c
 0006: 20 00 00 00000004   ld  data.architecture
 0007: 15 01 00 c000003e   jeq ARCH_64 0009 (false 0008)
 0008: 06 00 00 7fff0000   ret ALLOW
 0009: 20 00 00 00000000   ld  data.syscall-number
 000a: 15 01 00 00000029   jeq socket 000c (false 000b)
 000b: 06 00 00 7fff0000   ret ALLOW
 000c: 20 00 00 00000010   ld  data.args[0]
 000d: 15 00 01 00000001   jeq 1 000e (false 000f)
 000e: 06 00 00 7fff0000   ret ALLOW
 000f: 15 00 01 00000002   jeq 2 0010 (false 0011)
 0010: 06 00 00 7fff0000   ret ALLOW
 0011: 15 00 01 0000000a   jeq a 0012 (false 0013)
 0012: 06 00 00 7fff0000   ret ALLOW
 0013: 15 00 01 00000010   jeq 10 0014 (false 0015)
 0014: 06 00 00 7fff0000   ret ALLOW
 0015: 06 00 00 0005005f   ret ERRNO(95)
configuring 101 seccomp entries in /run/firejail/mnt/seccomp/seccomp.32
sbox run: /usr/lib64/firejail/fsec-print /run/firejail/mnt/seccomp/seccomp.32 
Dropping all capabilities
Drop privileges: pid 13, uid 1000, gid 1000, nogroups 1
No supplementary groups
 line  OP JT JF    K
=================================
 0000: 20 00 00 00000004   ld  data.architecture
 0001: 15 01 00 40000003   jeq ARCH_32 0003 (false 0002)
 0002: 06 00 00 7fff0000   ret ALLOW
 0003: 20 00 00 00000000   ld  data.syscall-number
 0004: 15 00 01 00000015   jeq 15 0005 (false 0006)
 0005: 06 00 00 00000001   ret KILL
 0006: 15 00 01 00000034   jeq 34 0007 (false 0008)
 0007: 06 00 00 00000001   ret KILL
 0008: 15 00 01 0000001a   jeq 1a 0009 (false 000a)
 0009: 06 00 00 00000001   ret KILL
 000a: 15 00 01 0000011b   jeq 11b 000b (false 000c)
 000b: 06 00 00 00000001   ret KILL
 000c: 15 00 01 00000155   jeq 155 000d (false 000e)
 000d: 06 00 00 00000001   ret KILL
 000e: 15 00 01 00000156   jeq 156 000f (false 0010)
 000f: 06 00 00 00000001   ret KILL
 0010: 15 00 01 0000007f   jeq 7f 0011 (false 0012)
 0011: 06 00 00 00000001   ret KILL
 0012: 15 00 01 00000080   jeq 80 0013 (false 0014)
 0013: 06 00 00 00000001   ret KILL
 0014: 15 00 01 0000015e   jeq 15e 0015 (false 0016)
 0015: 06 00 00 00000001   ret KILL
 0016: 15 00 01 00000081   jeq 81 0017 (false 0018)
 0017: 06 00 00 00000001   ret KILL
 0018: 15 00 01 0000006e   jeq 6e 0019 (false 001a)
 0019: 06 00 00 00000001   ret KILL
 001a: 15 00 01 00000065   jeq 65 001b (false 001c)
 001b: 06 00 00 00000001   ret KILL
 001c: 15 00 01 00000121   jeq 121 001d (false 001e)
 001d: 06 00 00 00000001   ret KILL
 001e: 15 00 01 00000057   jeq 57 001f (false 0020)
 001f: 06 00 00 00000001   ret KILL
 0020: 15 00 01 00000073   jeq 73 0021 (false 0022)
 0021: 06 00 00 00000001   ret KILL
 0022: 15 00 01 00000067   jeq 67 0023 (false 0024)
 0023: 06 00 00 00000001   ret KILL
 0024: 15 00 01 0000015b   jeq 15b 0025 (false 0026)
 0025: 06 00 00 00000001   ret KILL
 0026: 15 00 01 0000015c   jeq 15c 0027 (false 0028)
 0027: 06 00 00 00000001   ret KILL
 0028: 15 00 01 00000087   jeq 87 0029 (false 002a)
 0029: 06 00 00 00000001   ret KILL
 002a: 15 00 01 00000095   jeq 95 002b (false 002c)
 002b: 06 00 00 00000001   ret KILL
 002c: 15 00 01 0000007c   jeq 7c 002d (false 002e)
 002d: 06 00 00 00000001   ret KILL
 002e: 15 00 01 00000157   jeq 157 002f (false 0030)
 002f: 06 00 00 00000001   ret KILL
 0030: 15 00 01 000000fd   jeq fd 0031 (false 0032)
 0031: 06 00 00 00000001   ret KILL
 0032: 15 00 01 00000150   jeq 150 0033 (false 0034)
 0033: 06 00 00 00000001   ret KILL
 0034: 15 00 01 00000152   jeq 152 0035 (false 0036)
 0035: 06 00 00 00000001   ret KILL
 0036: 15 00 01 0000015d   jeq 15d 0037 (false 0038)
 0037: 06 00 00 00000001   ret KILL
 0038: 15 00 01 0000011e   jeq 11e 0039 (false 003a)
 0039: 06 00 00 00000001   ret KILL
 003a: 15 00 01 0000011f   jeq 11f 003b (false 003c)
 003b: 06 00 00 00000001   ret KILL
 003c: 15 00 01 00000120   jeq 120 003d (false 003e)
 003d: 06 00 00 00000001   ret KILL
 003e: 15 00 01 00000056   jeq 56 003f (false 0040)
 003f: 06 00 00 00000001   ret KILL
 0040: 15 00 01 00000033   jeq 33 0041 (false 0042)
 0041: 06 00 00 00000001   ret KILL
 0042: 15 00 01 0000007b   jeq 7b 0043 (false 0044)
 0043: 06 00 00 00000001   ret KILL
 0044: 15 00 01 000000d9   jeq d9 0045 (false 0046)
 0045: 06 00 00 00000001   ret KILL
 0046: 15 00 01 000000f5   jeq f5 0047 (false 0048)
 0047: 06 00 00 00000001   ret KILL
 0048: 15 00 01 000000f6   jeq f6 0049 (false 004a)
 0049: 06 00 00 00000001   ret KILL
 004a: 15 00 01 000000f7   jeq f7 004b (false 004c)
 004b: 06 00 00 00000001   ret KILL
 004c: 15 00 01 000000f8   jeq f8 004d (false 004e)
 004d: 06 00 00 00000001   ret KILL
 004e: 15 00 01 000000f9   jeq f9 004f (false 0050)
 004f: 06 00 00 00000001   ret KILL
 0050: 15 00 01 00000101   jeq 101 0051 (false 0052)
 0051: 06 00 00 00000001   ret KILL
 0052: 15 00 01 00000112   jeq 112 0053 (false 0054)
 0053: 06 00 00 00000001   ret KILL
 0054: 15 00 01 00000114   jeq 114 0055 (false 0056)
 0055: 06 00 00 00000001   ret KILL
 0056: 15 00 01 00000126   jeq 126 0057 (false 0058)
 0057: 06 00 00 00000001   ret KILL
 0058: 15 00 01 0000013d   jeq 13d 0059 (false 005a)
 0059: 06 00 00 00000001   ret KILL
 005a: 15 00 01 0000013c   jeq 13c 005b (false 005c)
 005b: 06 00 00 00000001   ret KILL
 005c: 15 00 01 0000003d   jeq 3d 005d (false 005e)
 005d: 06 00 00 00000001   ret KILL
 005e: 15 00 01 00000058   jeq 58 005f (false 0060)
 005f: 06 00 00 00000001   ret KILL
 0060: 15 00 01 000000a9   jeq a9 0061 (false 0062)
 0061: 06 00 00 00000001   ret KILL
 0062: 15 00 01 00000082   jeq 82 0063 (false 0064)
 0063: 06 00 00 00000001   ret KILL
 0064: 06 00 00 7fff0000   ret ALLOW
Dual 32/64 bit seccomp filter configured
configuring 134 seccomp entries in /run/firejail/mnt/seccomp/seccomp
sbox run: /usr/lib64/firejail/fsec-print /run/firejail/mnt/seccomp/seccomp 
Dropping all capabilities
Drop privileges: pid 14, uid 1000, gid 1000, nogroups 1
No supplementary groups
 line  OP JT JF    K
=================================
 0000: 20 00 00 00000004   ld  data.architecture
 0001: 15 01 00 c000003e   jeq ARCH_64 0003 (false 0002)
 0002: 06 00 00 7fff0000   ret ALLOW
 0003: 20 00 00 00000000   ld  data.syscall-number
 0004: 35 01 00 40000000   jge X32_ABI 0006 (false 0005)
 0005: 35 01 00 00000000   jge read 0007 (false 0006)
 0006: 06 00 00 00050001   ret ERRNO(1)
 0007: 15 00 01 0000009f   jeq adjtimex 0008 (false 0009)
 0008: 06 00 00 00000001   ret KILL
 0009: 15 00 01 00000131   jeq clock_adjtime 000a (false 000b)
 000a: 06 00 00 00000001   ret KILL
 000b: 15 00 01 000000e3   jeq clock_settime 000c (false 000d)
 000c: 06 00 00 00000001   ret KILL
 000d: 15 00 01 000000a4   jeq settimeofday 000e (false 000f)
 000e: 06 00 00 00000001   ret KILL
 000f: 15 00 01 0000009a   jeq modify_ldt 0010 (false 0011)
 0010: 06 00 00 00000001   ret KILL
 0011: 15 00 01 000000d4   jeq lookup_dcookie 0012 (false 0013)
 0012: 06 00 00 00000001   ret KILL
 0013: 15 00 01 0000012a   jeq perf_event_open 0014 (false 0015)
 0014: 06 00 00 00000001   ret KILL
 0015: 15 00 01 00000137   jeq process_vm_writev 0016 (false 0017)
 0016: 06 00 00 00000001   ret KILL
 0017: 15 00 01 000000b0   jeq delete_module 0018 (false 0019)
 0018: 06 00 00 00000001   ret KILL
 0019: 15 00 01 00000139   jeq finit_module 001a (false 001b)
 001a: 06 00 00 00000001   ret KILL
 001b: 15 00 01 000000af   jeq init_module 001c (false 001d)
 001c: 06 00 00 00000001   ret KILL
 001d: 15 00 01 000000a1   jeq chroot 001e (false 001f)
 001e: 06 00 00 00000001   ret KILL
 001f: 15 00 01 000000a5   jeq mount 0020 (false 0021)
 0020: 06 00 00 00000001   ret KILL
 0021: 15 00 01 0000009b   jeq pivot_root 0022 (false 0023)
 0022: 06 00 00 00000001   ret KILL
 0023: 15 00 01 000000a6   jeq umount2 0024 (false 0025)
 0024: 06 00 00 00000001   ret KILL
 0025: 15 00 01 0000009c   jeq _sysctl 0026 (false 0027)
 0026: 06 00 00 00000001   ret KILL
 0027: 15 00 01 000000b7   jeq afs_syscall 0028 (false 0029)
 0028: 06 00 00 00000001   ret KILL
 0029: 15 00 01 000000ae   jeq create_module 002a (false 002b)
 002a: 06 00 00 00000001   ret KILL
 002b: 15 00 01 000000b1   jeq get_kernel_syms 002c (false 002d)
 002c: 06 00 00 00000001   ret KILL
 002d: 15 00 01 000000b5   jeq getpmsg 002e (false 002f)
 002e: 06 00 00 00000001   ret KILL
 002f: 15 00 01 000000b6   jeq putpmsg 0030 (false 0031)
 0030: 06 00 00 00000001   ret KILL
 0031: 15 00 01 000000b2   jeq query_module 0032 (false 0033)
 0032: 06 00 00 00000001   ret KILL
 0033: 15 00 01 000000b9   jeq security 0034 (false 0035)
 0034: 06 00 00 00000001   ret KILL
 0035: 15 00 01 0000008b   jeq sysfs 0036 (false 0037)
 0036: 06 00 00 00000001   ret KILL
 0037: 15 00 01 000000b8   jeq tuxcall 0038 (false 0039)
 0038: 06 00 00 00000001   ret KILL
 0039: 15 00 01 00000086   jeq uselib 003a (false 003b)
 003a: 06 00 00 00000001   ret KILL
 003b: 15 00 01 00000088   jeq ustat 003c (false 003d)
 003c: 06 00 00 00000001   ret KILL
 003d: 15 00 01 000000ec   jeq vserver 003e (false 003f)
 003e: 06 00 00 00000001   ret KILL
 003f: 15 00 01 000000ad   jeq ioperm 0040 (false 0041)
 0040: 06 00 00 00000001   ret KILL
 0041: 15 00 01 000000ac   jeq iopl 0042 (false 0043)
 0042: 06 00 00 00000001   ret KILL
 0043: 15 00 01 000000f6   jeq kexec_load 0044 (false 0045)
 0044: 06 00 00 00000001   ret KILL
 0045: 15 00 01 00000140   jeq kexec_file_load 0046 (false 0047)
 0046: 06 00 00 00000001   ret KILL
 0047: 15 00 01 000000a9   jeq reboot 0048 (false 0049)
 0048: 06 00 00 00000001   ret KILL
 0049: 15 00 01 000000a7   jeq swapon 004a (false 004b)
 004a: 06 00 00 00000001   ret KILL
 004b: 15 00 01 000000a8   jeq swapoff 004c (false 004d)
 004c: 06 00 00 00000001   ret KILL
 004d: 15 00 01 00000130   jeq open_by_handle_at 004e (false 004f)
 004e: 06 00 00 00000001   ret KILL
 004f: 15 00 01 0000012f   jeq name_to_handle_at 0050 (false 0051)
 0050: 06 00 00 00000001   ret KILL
 0051: 15 00 01 000000fb   jeq ioprio_set 0052 (false 0053)
 0052: 06 00 00 00000001   ret KILL
 0053: 15 00 01 00000067   jeq syslog 0054 (false 0055)
 0054: 06 00 00 00000001   ret KILL
 0055: 15 00 01 0000012c   jeq fanotify_init 0056 (false 0057)
 0056: 06 00 00 00000001   ret KILL
 0057: 15 00 01 00000138   jeq kcmp 0058 (false 0059)
 0058: 06 00 00 00000001   ret KILL
 0059: 15 00 01 000000f8   jeq add_key 005a (false 005b)
 005a: 06 00 00 00000001   ret KILL
 005b: 15 00 01 000000f9   jeq request_key 005c (false 005d)
 005c: 06 00 00 00000001   ret KILL
 005d: 15 00 01 000000ed   jeq mbind 005e (false 005f)
 005e: 06 00 00 00000001   ret KILL
 005f: 15 00 01 00000100   jeq migrate_pages 0060 (false 0061)
 0060: 06 00 00 00000001   ret KILL
 0061: 15 00 01 00000117   jeq move_pages 0062 (false 0063)
 0062: 06 00 00 00000001   ret KILL
 0063: 15 00 01 000000fa   jeq keyctl 0064 (false 0065)
 0064: 06 00 00 00000001   ret KILL
 0065: 15 00 01 000000ce   jeq io_setup 0066 (false 0067)
 0066: 06 00 00 00000001   ret KILL
 0067: 15 00 01 000000cf   jeq io_destroy 0068 (false 0069)
 0068: 06 00 00 00000001   ret KILL
 0069: 15 00 01 000000d0   jeq io_getevents 006a (false 006b)
 006a: 06 00 00 00000001   ret KILL
 006b: 15 00 01 000000d1   jeq io_submit 006c (false 006d)
 006c: 06 00 00 00000001   ret KILL
 006d: 15 00 01 000000d2   jeq io_cancel 006e (false 006f)
 006e: 06 00 00 00000001   ret KILL
 006f: 15 00 01 000000d8   jeq remap_file_pages 0070 (false 0071)
 0070: 06 00 00 00000001   ret KILL
 0071: 15 00 01 00000143   jeq userfaultfd 0072 (false 0073)
 0072: 06 00 00 00000001   ret KILL
 0073: 15 00 01 000000a3   jeq acct 0074 (false 0075)
 0074: 06 00 00 00000001   ret KILL
 0075: 15 00 01 00000141   jeq bpf 0076 (false 0077)
 0076: 06 00 00 00000001   ret KILL
 0077: 15 00 01 000000b4   jeq nfsservctl 0078 (false 0079)
 0078: 06 00 00 00000001   ret KILL
 0079: 15 00 01 000000ab   jeq setdomainname 007a (false 007b)
 007a: 06 00 00 00000001   ret KILL
 007b: 15 00 01 000000aa   jeq sethostname 007c (false 007d)
 007c: 06 00 00 00000001   ret KILL
 007d: 15 00 01 00000099   jeq vhangup 007e (false 007f)
 007e: 06 00 00 00000001   ret KILL
 007f: 15 00 01 00000065   jeq ptrace 0080 (false 0081)
 0080: 06 00 00 00000001   ret KILL
 0081: 15 00 01 00000087   jeq personality 0082 (false 0083)
 0082: 06 00 00 00000001   ret KILL
 0083: 15 00 01 00000136   jeq process_vm_readv 0084 (false 0085)
 0084: 06 00 00 00000001   ret KILL
 0085: 06 00 00 7fff0000   ret ALLOW
seccomp filter configured
Mounting read-only /run/firejail/mnt/seccomp
4368 3450 0:247 /seccomp /run/firejail/mnt/seccomp ro,nosuid - tmpfs tmpfs rw,seclabel,mode=755,inode64
mountid=4368 fsname=/seccomp dir=/run/firejail/mnt/seccomp fstype=tmpfs
Seccomp directory:
ls /run/firejail/mnt/seccomp
drwxr-xr-x root     root             160 .
drwxr-xr-x root     root             300 ..
-rw-r--r-- plankton plankton        1072 seccomp
-rw-r--r-- plankton plankton         808 seccomp.32
-rw-r--r-- plankton plankton         114 seccomp.list
-rw-r--r-- plankton plankton           0 seccomp.postexec
-rw-r--r-- plankton plankton           0 seccomp.postexec32
-rw-r--r-- plankton plankton         176 seccomp.protocol
Active seccomp files:
cat /run/firejail/mnt/seccomp/seccomp.list
/run/firejail/mnt/seccomp/seccomp.protocol
/run/firejail/mnt/seccomp/seccomp.32
/run/firejail/mnt/seccomp/seccomp
Dropping all capabilities
noroot user namespace installed
Dropping all capabilities
NO_NEW_PRIVS set
Drop privileges: pid 1, uid 1000, gid 1000, nogroups 0
Warning: cleaning all supplementary groups
starting application
LD_PRELOAD=(null)
Running 'telegram-desktop'  command through /bin/bash
execvp argument 0: /bin/bash
execvp argument 1: -c
execvp argument 2: 'telegram-desktop' 
Child process initialized in 134.66 ms
Installing /run/firejail/mnt/seccomp/seccomp seccomp filter
Installing /run/firejail/mnt/seccomp/seccomp.32 seccomp filter
Installing /run/firejail/mnt/seccomp/seccomp.protocol seccomp filter
Error getpwuid: main.c:237 init_cfg: No such file or directory
monitoring pid 15

Sandbox monitor: waitpid 15 retval 15 status 256

Parent is shutting down, bye...
Originally created by @ghost on GitHub (Apr 12, 2021). Original GitHub issue: https://github.com/netblue30/firejail/issues/4184 **Bug and expected behavior** - telegram-desktop 2.7.1, located in `/usr/local/bin/telegram-desktop`, is not starting with telegram-desktop.profile. **No profile and disabling firejail** - What changed calling `firejail --noprofile /path/to/program` in a terminal? __Program started__ after using `firejail --noprofile telegram-desktop` - What changed calling the program by path (e.g. `/usr/bin/vlc`)? __Nothing, program did not start__ **Reproduce** Steps to reproduce the behavior: 1. Run in bash `firejail telegram-desktop` 2. See error `usr/bin/telegram-desktop: error while loading shared libraries: libwbclient.so.0: cannot open shared object file: No such file or directory` **Environment** - Fedora 33 - Firejail version 0.9.64 **Checklist** - [x] The profile (and redirect profile if exists) hasn't already been fixed [upstream](https://github.com/netblue30/firejail/tree/master/etc). - [x] The program has a profile. (If not, request one in `https://github.com/netblue30/firejail/issues/1139`) - [x] I have performed a short search for similar issues (to avoid opening a duplicate). - [ ] If it is a AppImage, `--profile=PROFILENAME` is used to set the right profile. - [x] Used `LC_ALL=en_US.UTF-8 LANG=en_US.UTF-8 PROGRAM` to get english error-messages. - [ ] I'm aware of `browser-allow-drm yes`/`browser-disable-u2f no` in `firejail.config` to allow DRM/U2F in browsers. - [x] This is not a question. Questions should be asked in https://github.com/netblue30/firejail/discussions. <details><summary> debug output </summary> ``` Autoselecting /bin/bash as shell Building quoted command line: 'telegram-desktop' Command name #telegram-desktop# Found telegram-desktop.profile profile in /etc/firejail directory Reading profile /etc/firejail/telegram-desktop.profile Found telegram.profile profile in /etc/firejail directory Reading profile /etc/firejail/telegram.profile Found disable-common.inc profile in /etc/firejail directory Reading profile /etc/firejail/disable-common.inc Found disable-devel.inc profile in /etc/firejail directory Reading profile /etc/firejail/disable-devel.inc Found disable-exec.inc profile in /etc/firejail directory Reading profile /etc/firejail/disable-exec.inc Found disable-interpreters.inc profile in /etc/firejail directory Reading profile /etc/firejail/disable-interpreters.inc Found disable-programs.inc profile in /etc/firejail directory Reading profile /etc/firejail/disable-programs.inc DISPLAY=:0 parsed as 0 Using the local network stack Parent pid 30387, child pid 30388 Initializing child process Host network configured PID namespace installed Mounting tmpfs on /run/firejail/mnt directory Creating empty /run/firejail/mnt/seccomp directory Creating empty /run/firejail/mnt/seccomp/seccomp.protocol file Creating empty /run/firejail/mnt/seccomp/seccomp.postexec file Creating empty /run/firejail/mnt/seccomp/seccomp.postexec32 file IBUS_ADDRESS=unix:abstract=/home/plankton/.cache/ibus/dbus-LvbifSX6,guid=a51ec470afef27e3b693807e6061bd47 IBUS_DAEMON_PID=3123 IBUS_ADDRESS=unix:abstract=/home/plankton/.cache/ibus/dbus-2HJPa41V,guid=be9655382374e611fa02d1d960717734 IBUS_DAEMON_PID=2833 Build protocol filter: unix,inet,inet6,netlink sbox run: /run/firejail/lib/fseccomp protocol build unix,inet,inet6,netlink /run/firejail/mnt/seccomp/seccomp.protocol Dropping all capabilities Drop privileges: pid 2, uid 1000, gid 1000, nogroups 1 No supplementary groups Mounting /proc filesystem representing the PID namespace Basic read-only filesystem: Mounting read-only /etc 3453 2264 253:1 /etc /etc ro,relatime master:1 - ext4 /dev/mapper/fedora_localhost-root00 rw,seclabel mountid=3453 fsname=/etc dir=/etc fstype=ext4 Mounting noexec /etc 3454 3453 253:1 /etc /etc ro,nosuid,nodev,noexec,relatime master:1 - ext4 /dev/mapper/fedora_localhost-root00 rw,seclabel mountid=3454 fsname=/etc dir=/etc fstype=ext4 Mounting read-only /var 3456 3455 0:38 / /var/lib/nfs/rpc_pipefs rw,relatime master:155 - rpc_pipefs sunrpc rw mountid=3456 fsname=/ dir=/var/lib/nfs/rpc_pipefs fstype=rpc_pipefs Mounting read-only /var/lib/nfs/rpc_pipefs 3457 3456 0:38 / /var/lib/nfs/rpc_pipefs ro,relatime master:155 - rpc_pipefs sunrpc rw mountid=3457 fsname=/ dir=/var/lib/nfs/rpc_pipefs fstype=rpc_pipefs Mounting noexec /var 3460 3459 0:38 / /var/lib/nfs/rpc_pipefs ro,relatime master:155 - rpc_pipefs sunrpc rw mountid=3460 fsname=/ dir=/var/lib/nfs/rpc_pipefs fstype=rpc_pipefs Mounting noexec /var/lib/nfs/rpc_pipefs 3461 3460 0:38 / /var/lib/nfs/rpc_pipefs ro,nosuid,nodev,noexec,relatime master:155 - rpc_pipefs sunrpc rw mountid=3461 fsname=/ dir=/var/lib/nfs/rpc_pipefs fstype=rpc_pipefs Mounting read-only /usr 3462 2264 253:1 /usr /usr ro,relatime master:1 - ext4 /dev/mapper/fedora_localhost-root00 rw,seclabel mountid=3462 fsname=/usr dir=/usr fstype=ext4 Mounting tmpfs on /var/lock Mounting tmpfs on /var/tmp Mounting tmpfs on /var/log Create the new utmp file Mount the new utmp file Cleaning /home directory Relabeling /home as /home (system_u:object_r:home_root_t:s0) Cleaning /run/user directory Relabeling /run/user as /run/user (system_u:object_r:user_tmp_t:s0) Relabeling /run/user/1000 as /run/user/1000 (system_u:object_r:user_tmp_t:s0) Sanitizing /etc/passwd, UID_MIN 1000 Sanitizing /etc/group, GID_MIN 1000 Disable /run/firejail/network Disable /run/firejail/bandwidth Disable /run/firejail/name Disable /run/firejail/profile Disable /run/firejail/x11 Mounting tmpfs on /home/plankton/.cache 3487 3470 0:256 / /home/plankton/.cache rw,nosuid,nodev,relatime - tmpfs tmpfs rw,seclabel,mode=755,uid=1000,gid=1000,inode64 mountid=3487 fsname=/ dir=/home/plankton/.cache fstype=tmpfs Generate private-tmp whitelist commands blacklist /run/firejail/dbus Mounting read-only /proc/sys Remounting /sys directory Disable /sys/firmware Disable /sys/hypervisor Disable /sys/power Disable /sys/kernel/debug Disable /sys/kernel/vmcoreinfo Disable /proc/sys/fs/binfmt_misc Disable /proc/sys/kernel/core_pattern Disable /proc/sys/kernel/modprobe Disable /proc/sysrq-trigger Disable /proc/sys/vm/panic_on_oom Disable /proc/irq Disable /proc/bus Disable /proc/sched_debug Disable /proc/timer_list Disable /proc/kcore Disable /proc/kallsyms Disable /usr/lib/modules (requested /lib/modules) Disable /usr/lib/debug Disable /boot Disable /dev/port Disable /run/user/1000/gnupg Disable /run/user/1000/systemd Disable /dev/kmsg Disable /proc/kmsg Relabeling /run/firejail/mnt/etc as /etc (system_u:object_r:etc_t:s0) Copying files in the new /etc directory: Warning: file /etc/ca-certificates not found. Warning: skipping ca-certificates for private /etc copying /etc/crypto-policies to private /etc Creating empty /run/firejail/mnt/etc/crypto-policies directory sbox run: /run/firejail/lib/fcopy /etc/crypto-policies /run/firejail/mnt/etc/crypto-policies copying /etc/fonts to private /etc Creating empty /run/firejail/mnt/etc/fonts directory sbox run: /run/firejail/lib/fcopy /etc/fonts /run/firejail/mnt/etc/fonts copying /etc/ld.so.cache to private /etc sbox run: /run/firejail/lib/fcopy /etc/ld.so.cache /run/firejail/mnt/etc copying /etc/localtime to private /etc sbox run: /run/firejail/lib/fcopy /etc/localtime /run/firejail/mnt/etc copying /etc/machine-id to private /etc sbox run: /run/firejail/lib/fcopy /etc/machine-id /run/firejail/mnt/etc copying /etc/pki to private /etc Creating empty /run/firejail/mnt/etc/pki directory sbox run: /run/firejail/lib/fcopy /etc/pki /run/firejail/mnt/etc/pki copying /etc/pulse to private /etc Creating empty /run/firejail/mnt/etc/pulse directory sbox run: /run/firejail/lib/fcopy /etc/pulse /run/firejail/mnt/etc/pulse copying /etc/resolv.conf to private /etc sbox run: /run/firejail/lib/fcopy /etc/resolv.conf /run/firejail/mnt/etc copying /etc/ssl to private /etc Creating empty /run/firejail/mnt/etc/ssl directory sbox run: /run/firejail/lib/fcopy /etc/ssl /run/firejail/mnt/etc/ssl Mount-bind /run/firejail/mnt/etc on top of /etc Private /etc installed in 37.52 ms Cannot find /usr/etc Debug 456: new_name #/tmp/.X11-unix#, whitelist Mounting tmpfs on /tmp directory Relabeling /tmp as /tmp (system_u:object_r:tmp_t:s0) Whitelisting /tmp/.X11-unix 3509 3508 0:36 /.X11-unix /tmp/.X11-unix rw,nosuid,nodev master:43 - tmpfs tmpfs rw,seclabel,nr_inodes=409600,inode64 mountid=3509 fsname=/.X11-unix dir=/tmp/.X11-unix fstype=tmpfs Disable /home/plankton/.local/share/Trash Disable /home/plankton/.bash_history Disable /home/plankton/.config/autostart Disable /home/plankton/.local/share/gnome-shell Mounting read-only /home/plankton/.config/dconf 3515 3470 253:5 /plankton/.config/dconf /home/plankton/.config/dconf ro,relatime master:53 - ext4 /dev/mapper/luks-2bcab42e-004b-47ca-b33c-be3b0a739c3b rw,seclabel mountid=3515 fsname=/plankton/.config/dconf dir=/home/plankton/.config/dconf fstype=ext4 Disable /run/user/1000/gnome-session-leader-fifo Disable /run/user/1000/gnome-shell Disable /var/lib/systemd Disable /usr/bin/systemd-run Disable /run/user/1000/systemd Disable /home/plankton/.config/VirtualBox Disable /home/plankton/.config/gnome-boxes Disable /home/plankton/.local/share/gnome-boxes Disable /home/plankton/.config/libvirt Disable /var/cache/libvirt Disable /var/lib/libvirt Disable /var/log/libvirt Disable /var/lib/upower Disable /var/spool/mail (requested /var/mail) Disable /var/opt Disable /run/docker.sock (requested /var/run/docker.sock) Disable /var/spool/anacron Disable /var/spool/cron Disable /var/spool/mail Mounting read-only /home/plankton/.bashrc 3536 3470 253:5 /plankton/.bashrc /home/plankton/.bashrc ro,relatime master:53 - ext4 /dev/mapper/luks-2bcab42e-004b-47ca-b33c-be3b0a739c3b rw,seclabel mountid=3536 fsname=/plankton/.bashrc dir=/home/plankton/.bashrc fstype=ext4 Mounting read-only /home/plankton/.muttrc 3537 3470 253:5 /plankton/.muttrc /home/plankton/.muttrc ro,relatime master:53 - ext4 /dev/mapper/luks-2bcab42e-004b-47ca-b33c-be3b0a739c3b rw,seclabel mountid=3537 fsname=/plankton/.muttrc dir=/home/plankton/.muttrc fstype=ext4 Mounting read-only /home/plankton/.bin 3539 3470 253:5 /plankton/.bin /home/plankton/.bin ro,relatime master:53 - ext4 /dev/mapper/luks-2bcab42e-004b-47ca-b33c-be3b0a739c3b rw,seclabel mountid=3539 fsname=/plankton/.bin dir=/home/plankton/.bin fstype=ext4 Mounting read-only /home/plankton/.config/menus 3540 3470 253:5 /plankton/.config/menus /home/plankton/.config/menus ro,relatime master:53 - ext4 /dev/mapper/luks-2bcab42e-004b-47ca-b33c-be3b0a739c3b rw,seclabel mountid=3540 fsname=/plankton/.config/menus dir=/home/plankton/.config/menus fstype=ext4 Mounting read-only /home/plankton/.local/share/applications 3541 3470 253:5 /plankton/.local/share/applications /home/plankton/.local/share/applications ro,relatime master:53 - ext4 /dev/mapper/luks-2bcab42e-004b-47ca-b33c-be3b0a739c3b rw,seclabel mountid=3541 fsname=/plankton/.local/share/applications dir=/home/plankton/.local/share/applications fstype=ext4 Mounting read-only /home/plankton/.config/mimeapps.list 3542 3470 253:5 /plankton/.config/mimeapps.list /home/plankton/.config/mimeapps.list ro,relatime master:53 - ext4 /dev/mapper/luks-2bcab42e-004b-47ca-b33c-be3b0a739c3b rw,seclabel mountid=3542 fsname=/plankton/.config/mimeapps.list dir=/home/plankton/.config/mimeapps.list fstype=ext4 Mounting read-only /home/plankton/.config/user-dirs.dirs 3543 3470 253:5 /plankton/.config/user-dirs.dirs /home/plankton/.config/user-dirs.dirs ro,relatime master:53 - ext4 /dev/mapper/luks-2bcab42e-004b-47ca-b33c-be3b0a739c3b rw,seclabel mountid=3543 fsname=/plankton/.config/user-dirs.dirs dir=/home/plankton/.config/user-dirs.dirs fstype=ext4 Mounting read-only /home/plankton/.config/user-dirs.locale 3544 3470 253:5 /plankton/.config/user-dirs.locale /home/plankton/.config/user-dirs.locale ro,relatime master:53 - ext4 /dev/mapper/luks-2bcab42e-004b-47ca-b33c-be3b0a739c3b rw,seclabel mountid=3544 fsname=/plankton/.config/user-dirs.locale dir=/home/plankton/.config/user-dirs.locale fstype=ext4 Mounting read-only /home/plankton/.local/share/mime 3545 3470 253:5 /plankton/.local/share/mime /home/plankton/.local/share/mime ro,relatime master:53 - ext4 /dev/mapper/luks-2bcab42e-004b-47ca-b33c-be3b0a739c3b rw,seclabel mountid=3545 fsname=/plankton/.local/share/mime dir=/home/plankton/.local/share/mime fstype=ext4 Disable /home/plankton/.gnupg Disable /home/plankton/.local/share/keyrings Disable /home/plankton/.muttrc Disable /home/plankton/.pki Disable /home/plankton/.local/share/pki Disable /home/plankton/.ssh Disable /usr/sbin (requested /sbin) Disable /usr/local/sbin Disable /usr/sbin Disable /usr/bin/at Disable /usr/bin/chage Disable /usr/bin/crontab Disable /usr/bin/fusermount Disable /usr/bin/gpasswd Disable /usr/bin/mount Disable /usr/bin/ncat (requested /usr/bin/nc) Disable /usr/bin/ncat Disable /usr/bin/newgidmap Disable /usr/bin/newgrp Disable /usr/bin/newuidmap Disable /usr/bin/ntfs-3g Disable /usr/bin/pkexec Disable /usr/bin/newgrp (requested /usr/bin/sg) Disable /usr/bin/strace Disable /usr/bin/su Disable /usr/bin/sudo Disable /usr/bin/umount Disable /usr/bin/xev Disable /usr/bin/xinput Disable /usr/bin/gnome-terminal Disable /usr/bin/urxvtc Disable /home/plankton/.local/share/flatpak/repo Disable /home/plankton/.local/share/flatpak/.changed Disable /home/plankton/.local/share/flatpak/db Debug: no access to file /run/user/1000/doc, forcing mount Disable /run/user/1000/doc Disable /var/lib/flatpak/.changed Disable /var/lib/flatpak/repo Disable /var/lib/flatpak/oci Disable /var/lib/flatpak/.fedora-initialized Disable /var/lib/flatpak/appstream Disable /usr/bin/bwrap Disable /usr/bin/dig Disable /usr/bin/nslookup Disable /usr/bin/host Disable /usr/bin/resolvectl Disable /run/user/1000/wayland-0.lock Disable /run/user/1000/pipewire-0.lock Disable /usr/bin/as Disable /usr/bin/gcc (requested /usr/bin/cc) Disable /usr/bin/c++ Disable /usr/bin/c++filt Disable /usr/bin/c89 Disable /usr/bin/c99 Disable /usr/bin/cpp Disable /usr/bin/cpp2html Disable /usr/bin/g++ Disable /usr/bin/gcc-ranlib Disable /usr/bin/gcc-nm Disable /usr/bin/gcc Disable /usr/bin/gcc-ar Disable /usr/libexec/gdb (requested /usr/bin/gdb) Disable /usr/bin/x86_64-redhat-linux-gcc-10 Disable /usr/bin/x86_64-redhat-linux-gcc Disable /usr/bin/x86_64-redhat-linux-g++ Disable /usr/bin/x86_64-redhat-linux-gcc-10 Disable /usr/bin/x86_64-redhat-linux-gcc Disable /usr/bin/x86_64-redhat-linux-g++ Disable /usr/lib/java Disable /usr/share/java Disable /usr/bin/openssl Disable /usr/src Disable /usr/local/src Disable /usr/include Disable /usr/local/include Mounting noexec /home/plankton 4268 4240 0:26 /firejail/firejail.ro.dir /home/plankton/.local/share/flatpak/db rw,nosuid,nodev master:13 - tmpfs tmpfs rw,seclabel,size=3070972k,nr_inodes=819200,mode=755,inode64 mountid=4268 fsname=/firejail/firejail.ro.dir dir=/home/plankton/.local/share/flatpak/db fstype=tmpfs Mounting noexec /home/plankton/.cache 4269 4241 0:256 / /home/plankton/.cache rw,nosuid,nodev,noexec,relatime - tmpfs tmpfs rw,seclabel,mode=755,uid=1000,gid=1000,inode64 mountid=4269 fsname=/ dir=/home/plankton/.cache fstype=tmpfs Mounting noexec /home/plankton/.config/dconf 4270 4246 253:5 /plankton/.config/dconf /home/plankton/.config/dconf ro,nosuid,nodev,noexec,relatime master:53 - ext4 /dev/mapper/luks-2bcab42e-004b-47ca-b33c-be3b0a739c3b rw,seclabel mountid=4270 fsname=/plankton/.config/dconf dir=/home/plankton/.config/dconf fstype=ext4 Mounting noexec /home/plankton/.bashrc 4271 4251 253:5 /plankton/.bashrc /home/plankton/.bashrc ro,nosuid,nodev,noexec,relatime master:53 - ext4 /dev/mapper/luks-2bcab42e-004b-47ca-b33c-be3b0a739c3b rw,seclabel mountid=4271 fsname=/plankton/.bashrc dir=/home/plankton/.bashrc fstype=ext4 Mounting noexec /home/plankton/.muttrc 4272 4253 0:26 /firejail/firejail.ro.file /home/plankton/.muttrc rw,nosuid,nodev,noexec master:13 - tmpfs tmpfs rw,seclabel,size=3070972k,nr_inodes=819200,mode=755,inode64 mountid=4272 fsname=/firejail/firejail.ro.file dir=/home/plankton/.muttrc fstype=tmpfs Mounting noexec /home/plankton/.bin 4273 4254 253:5 /plankton/.bin /home/plankton/.bin ro,nosuid,nodev,noexec,relatime master:53 - ext4 /dev/mapper/luks-2bcab42e-004b-47ca-b33c-be3b0a739c3b rw,seclabel mountid=4273 fsname=/plankton/.bin dir=/home/plankton/.bin fstype=ext4 Mounting noexec /home/plankton/.config/menus 4274 4255 253:5 /plankton/.config/menus /home/plankton/.config/menus ro,nosuid,nodev,noexec,relatime master:53 - ext4 /dev/mapper/luks-2bcab42e-004b-47ca-b33c-be3b0a739c3b rw,seclabel mountid=4274 fsname=/plankton/.config/menus dir=/home/plankton/.config/menus fstype=ext4 Mounting noexec /home/plankton/.local/share/applications 4275 4256 253:5 /plankton/.local/share/applications /home/plankton/.local/share/applications ro,nosuid,nodev,noexec,relatime master:53 - ext4 /dev/mapper/luks-2bcab42e-004b-47ca-b33c-be3b0a739c3b rw,seclabel mountid=4275 fsname=/plankton/.local/share/applications dir=/home/plankton/.local/share/applications fstype=ext4 Mounting noexec /home/plankton/.config/mimeapps.list 4276 4257 253:5 /plankton/.config/mimeapps.list /home/plankton/.config/mimeapps.list ro,nosuid,nodev,noexec,relatime master:53 - ext4 /dev/mapper/luks-2bcab42e-004b-47ca-b33c-be3b0a739c3b rw,seclabel mountid=4276 fsname=/plankton/.config/mimeapps.list dir=/home/plankton/.config/mimeapps.list fstype=ext4 Mounting noexec /home/plankton/.config/user-dirs.dirs 4277 4258 253:5 /plankton/.config/user-dirs.dirs /home/plankton/.config/user-dirs.dirs ro,nosuid,nodev,noexec,relatime master:53 - ext4 /dev/mapper/luks-2bcab42e-004b-47ca-b33c-be3b0a739c3b rw,seclabel mountid=4277 fsname=/plankton/.config/user-dirs.dirs dir=/home/plankton/.config/user-dirs.dirs fstype=ext4 Mounting noexec /home/plankton/.config/user-dirs.locale 4278 4259 253:5 /plankton/.config/user-dirs.locale /home/plankton/.config/user-dirs.locale ro,nosuid,nodev,noexec,relatime master:53 - ext4 /dev/mapper/luks-2bcab42e-004b-47ca-b33c-be3b0a739c3b rw,seclabel mountid=4278 fsname=/plankton/.config/user-dirs.locale dir=/home/plankton/.config/user-dirs.locale fstype=ext4 Mounting noexec /home/plankton/.local/share/mime 4279 4260 253:5 /plankton/.local/share/mime /home/plankton/.local/share/mime ro,nosuid,nodev,noexec,relatime master:53 - ext4 /dev/mapper/luks-2bcab42e-004b-47ca-b33c-be3b0a739c3b rw,seclabel mountid=4279 fsname=/plankton/.local/share/mime dir=/home/plankton/.local/share/mime fstype=ext4 Mounting noexec /run/user/1000 4290 4280 0:26 /firejail/firejail.ro.file /run/user/1000/pipewire-0.lock rw,nosuid,nodev master:13 - tmpfs tmpfs rw,seclabel,size=3070972k,nr_inodes=819200,mode=755,inode64 mountid=4290 fsname=/firejail/firejail.ro.file dir=/run/user/1000/pipewire-0.lock fstype=tmpfs Warning: not remounting /run/user/1000/gvfs Mounting noexec /run/user/1000/doc 4291 4283 0:26 /firejail/firejail.ro.dir /run/user/1000/doc rw,nosuid,nodev,noexec master:13 - tmpfs tmpfs rw,seclabel,size=3070972k,nr_inodes=819200,mode=755,inode64 mountid=4291 fsname=/firejail/firejail.ro.dir dir=/run/user/1000/doc fstype=tmpfs Mounting noexec /dev/shm 4292 2415 0:24 / /dev/shm rw,nosuid,nodev,noexec master:11 - tmpfs tmpfs rw,seclabel,inode64 mountid=4292 fsname=/ dir=/dev/shm fstype=tmpfs Mounting noexec /tmp 4294 4293 0:36 /.X11-unix /tmp/.X11-unix rw,nosuid,nodev master:43 - tmpfs tmpfs rw,seclabel,nr_inodes=409600,inode64 mountid=4294 fsname=/.X11-unix dir=/tmp/.X11-unix fstype=tmpfs Mounting noexec /tmp/.X11-unix 4295 4294 0:36 /.X11-unix /tmp/.X11-unix rw,nosuid,nodev,noexec master:43 - tmpfs tmpfs rw,seclabel,nr_inodes=409600,inode64 mountid=4295 fsname=/.X11-unix dir=/tmp/.X11-unix fstype=tmpfs Disable /usr/bin/gjs-console (requested /usr/bin/gjs) Disable /usr/bin/gjs-console Disable /usr/lib64/gjs Disable /usr/lib64/libgjs.so.0.0.0 Disable /usr/lib64/libgjs.so.0.0.0 (requested /usr/lib64/libgjs.so.0) Disable /usr/bin/luac Disable /usr/bin/luajit-2.1.0-beta3 Disable /usr/bin/luajit-2.1.0-beta3 (requested /usr/bin/luajit) Disable /usr/bin/lua Disable /usr/share/luajit-2.1.0-beta3 Disable /usr/share/lua Disable /usr/lib64/libmozjs-68.so.0.0.0 (requested /usr/lib64/libmozjs-68.so.0) Disable /usr/lib64/libmozjs-78.so.0.0.0 (requested /usr/lib64/libmozjs-78.so.0) Disable /usr/lib64/libmozjs-68.so.0.0.0 Disable /usr/lib64/libmozjs-78.so.0.0.0 Disable /usr/bin/cpanel_json_xs Disable /usr/bin/perl Disable /usr/share/perl5 Disable /usr/bin/python2.7-config (requested /usr/bin/python2-config) Disable /usr/bin/python2.7 Disable /usr/bin/python2.7 (requested /usr/bin/python2) Disable /usr/bin/python2.7-config Disable /usr/lib/python2.7 Disable /usr/bin/python3.9 (requested /usr/bin/python3) Disable /usr/bin/python3.9 Disable /usr/lib/python3.9 Disable /usr/lib64/python3.9 Not blacklist /home/plankton/.TelegramDesktop Disable /home/plankton/.audacity-data Disable /home/plankton/.config/GIMP Disable /home/plankton/.config/VirtualBox Disable /home/plankton/.config/chromium Disable /home/plankton/.config/enchant Disable /home/plankton/.config/eog Disable /home/plankton/.config/epiphany Disable /home/plankton/.config/evolution Disable /home/plankton/.config/gconf Disable /home/plankton/.config/gedit Disable /home/plankton/.config/gnome-control-center Disable /home/plankton/.config/gnome-initial-setup-done Disable /home/plankton/.config/gnome-session Disable /home/plankton/.config/inkscape Disable /home/plankton/.config/libreoffice Disable /home/plankton/.config/mpv Disable /home/plankton/.config/nautilus Disable /home/plankton/.config/transmission Disable /home/plankton/.config/zoomus.conf Disable /home/plankton/.local/share/Steam Disable /home/plankton/.local/share/SuperHexagon Not blacklist /home/plankton/.local/share/TelegramDesktop Disable /home/plankton/.local/share/epiphany Disable /home/plankton/.local/share/evolution Disable /home/plankton/.local/share/gnome-boxes Disable /home/plankton/.local/share/maps-places.json Disable /home/plankton/.local/share/nautilus Disable /home/plankton/.local/share/vpltd Disable /home/plankton/.local/share/vulkan Disable /home/plankton/.minecraft Disable /home/plankton/.mozilla Disable /home/plankton/.newsboat Disable /home/plankton/.steam Disable /home/plankton/.vscode-oss Disable /home/plankton/.xonotic Mounting read-only /tmp/.X11-unix 4357 4295 0:36 /.X11-unix /tmp/.X11-unix ro,nosuid,nodev,noexec master:43 - tmpfs tmpfs rw,seclabel,nr_inodes=409600,inode64 mountid=4357 fsname=/.X11-unix dir=/tmp/.X11-unix fstype=tmpfs Disable /sys/fs Disable /sys/module Disable /mnt Disable /media Disable /run/mount Disable /run/media Relabeling /run/firejail/mnt/pulse as /run/firejail/mnt/pulse (system_u:object_r:var_run_t:s0) Mounting noexec /run/firejail/mnt/pulse 4364 3450 0:247 /pulse /run/firejail/mnt/pulse rw,nosuid,nodev,noexec - tmpfs tmpfs rw,seclabel,mode=755,inode64 mountid=4364 fsname=/pulse dir=/run/firejail/mnt/pulse fstype=tmpfs Mounting /run/firejail/mnt/pulse on /home/plankton/.config/pulse 4365 4240 0:247 /pulse /home/plankton/.config/pulse rw,nosuid,nodev,noexec - tmpfs tmpfs rw,seclabel,mode=755,inode64 mountid=4365 fsname=/pulse dir=/home/plankton/.config/pulse fstype=tmpfs blacklist /dev/sr0 Current directory: /home/plankton DISPLAY=:0 parsed as 0 Install protocol filter: unix,inet,inet6,netlink configuring 22 seccomp entries in /run/firejail/mnt/seccomp/seccomp.protocol sbox run: /usr/lib64/firejail/fsec-print /run/firejail/mnt/seccomp/seccomp.protocol Dropping all capabilities Drop privileges: pid 12, uid 1000, gid 1000, nogroups 1 No supplementary groups line OP JT JF K ================================= 0000: 20 00 00 00000004 ld data.architecture 0001: 15 04 00 c000003e jeq ARCH_64 0006 (false 0002) 0002: 20 00 00 00000000 ld data.syscall-number 0003: 15 01 00 00000167 jeq unknown 0005 (false 0004) 0004: 06 00 00 7fff0000 ret ALLOW 0005: 05 00 00 00000006 jmp 000c 0006: 20 00 00 00000004 ld data.architecture 0007: 15 01 00 c000003e jeq ARCH_64 0009 (false 0008) 0008: 06 00 00 7fff0000 ret ALLOW 0009: 20 00 00 00000000 ld data.syscall-number 000a: 15 01 00 00000029 jeq socket 000c (false 000b) 000b: 06 00 00 7fff0000 ret ALLOW 000c: 20 00 00 00000010 ld data.args[0] 000d: 15 00 01 00000001 jeq 1 000e (false 000f) 000e: 06 00 00 7fff0000 ret ALLOW 000f: 15 00 01 00000002 jeq 2 0010 (false 0011) 0010: 06 00 00 7fff0000 ret ALLOW 0011: 15 00 01 0000000a jeq a 0012 (false 0013) 0012: 06 00 00 7fff0000 ret ALLOW 0013: 15 00 01 00000010 jeq 10 0014 (false 0015) 0014: 06 00 00 7fff0000 ret ALLOW 0015: 06 00 00 0005005f ret ERRNO(95) configuring 101 seccomp entries in /run/firejail/mnt/seccomp/seccomp.32 sbox run: /usr/lib64/firejail/fsec-print /run/firejail/mnt/seccomp/seccomp.32 Dropping all capabilities Drop privileges: pid 13, uid 1000, gid 1000, nogroups 1 No supplementary groups line OP JT JF K ================================= 0000: 20 00 00 00000004 ld data.architecture 0001: 15 01 00 40000003 jeq ARCH_32 0003 (false 0002) 0002: 06 00 00 7fff0000 ret ALLOW 0003: 20 00 00 00000000 ld data.syscall-number 0004: 15 00 01 00000015 jeq 15 0005 (false 0006) 0005: 06 00 00 00000001 ret KILL 0006: 15 00 01 00000034 jeq 34 0007 (false 0008) 0007: 06 00 00 00000001 ret KILL 0008: 15 00 01 0000001a jeq 1a 0009 (false 000a) 0009: 06 00 00 00000001 ret KILL 000a: 15 00 01 0000011b jeq 11b 000b (false 000c) 000b: 06 00 00 00000001 ret KILL 000c: 15 00 01 00000155 jeq 155 000d (false 000e) 000d: 06 00 00 00000001 ret KILL 000e: 15 00 01 00000156 jeq 156 000f (false 0010) 000f: 06 00 00 00000001 ret KILL 0010: 15 00 01 0000007f jeq 7f 0011 (false 0012) 0011: 06 00 00 00000001 ret KILL 0012: 15 00 01 00000080 jeq 80 0013 (false 0014) 0013: 06 00 00 00000001 ret KILL 0014: 15 00 01 0000015e jeq 15e 0015 (false 0016) 0015: 06 00 00 00000001 ret KILL 0016: 15 00 01 00000081 jeq 81 0017 (false 0018) 0017: 06 00 00 00000001 ret KILL 0018: 15 00 01 0000006e jeq 6e 0019 (false 001a) 0019: 06 00 00 00000001 ret KILL 001a: 15 00 01 00000065 jeq 65 001b (false 001c) 001b: 06 00 00 00000001 ret KILL 001c: 15 00 01 00000121 jeq 121 001d (false 001e) 001d: 06 00 00 00000001 ret KILL 001e: 15 00 01 00000057 jeq 57 001f (false 0020) 001f: 06 00 00 00000001 ret KILL 0020: 15 00 01 00000073 jeq 73 0021 (false 0022) 0021: 06 00 00 00000001 ret KILL 0022: 15 00 01 00000067 jeq 67 0023 (false 0024) 0023: 06 00 00 00000001 ret KILL 0024: 15 00 01 0000015b jeq 15b 0025 (false 0026) 0025: 06 00 00 00000001 ret KILL 0026: 15 00 01 0000015c jeq 15c 0027 (false 0028) 0027: 06 00 00 00000001 ret KILL 0028: 15 00 01 00000087 jeq 87 0029 (false 002a) 0029: 06 00 00 00000001 ret KILL 002a: 15 00 01 00000095 jeq 95 002b (false 002c) 002b: 06 00 00 00000001 ret KILL 002c: 15 00 01 0000007c jeq 7c 002d (false 002e) 002d: 06 00 00 00000001 ret KILL 002e: 15 00 01 00000157 jeq 157 002f (false 0030) 002f: 06 00 00 00000001 ret KILL 0030: 15 00 01 000000fd jeq fd 0031 (false 0032) 0031: 06 00 00 00000001 ret KILL 0032: 15 00 01 00000150 jeq 150 0033 (false 0034) 0033: 06 00 00 00000001 ret KILL 0034: 15 00 01 00000152 jeq 152 0035 (false 0036) 0035: 06 00 00 00000001 ret KILL 0036: 15 00 01 0000015d jeq 15d 0037 (false 0038) 0037: 06 00 00 00000001 ret KILL 0038: 15 00 01 0000011e jeq 11e 0039 (false 003a) 0039: 06 00 00 00000001 ret KILL 003a: 15 00 01 0000011f jeq 11f 003b (false 003c) 003b: 06 00 00 00000001 ret KILL 003c: 15 00 01 00000120 jeq 120 003d (false 003e) 003d: 06 00 00 00000001 ret KILL 003e: 15 00 01 00000056 jeq 56 003f (false 0040) 003f: 06 00 00 00000001 ret KILL 0040: 15 00 01 00000033 jeq 33 0041 (false 0042) 0041: 06 00 00 00000001 ret KILL 0042: 15 00 01 0000007b jeq 7b 0043 (false 0044) 0043: 06 00 00 00000001 ret KILL 0044: 15 00 01 000000d9 jeq d9 0045 (false 0046) 0045: 06 00 00 00000001 ret KILL 0046: 15 00 01 000000f5 jeq f5 0047 (false 0048) 0047: 06 00 00 00000001 ret KILL 0048: 15 00 01 000000f6 jeq f6 0049 (false 004a) 0049: 06 00 00 00000001 ret KILL 004a: 15 00 01 000000f7 jeq f7 004b (false 004c) 004b: 06 00 00 00000001 ret KILL 004c: 15 00 01 000000f8 jeq f8 004d (false 004e) 004d: 06 00 00 00000001 ret KILL 004e: 15 00 01 000000f9 jeq f9 004f (false 0050) 004f: 06 00 00 00000001 ret KILL 0050: 15 00 01 00000101 jeq 101 0051 (false 0052) 0051: 06 00 00 00000001 ret KILL 0052: 15 00 01 00000112 jeq 112 0053 (false 0054) 0053: 06 00 00 00000001 ret KILL 0054: 15 00 01 00000114 jeq 114 0055 (false 0056) 0055: 06 00 00 00000001 ret KILL 0056: 15 00 01 00000126 jeq 126 0057 (false 0058) 0057: 06 00 00 00000001 ret KILL 0058: 15 00 01 0000013d jeq 13d 0059 (false 005a) 0059: 06 00 00 00000001 ret KILL 005a: 15 00 01 0000013c jeq 13c 005b (false 005c) 005b: 06 00 00 00000001 ret KILL 005c: 15 00 01 0000003d jeq 3d 005d (false 005e) 005d: 06 00 00 00000001 ret KILL 005e: 15 00 01 00000058 jeq 58 005f (false 0060) 005f: 06 00 00 00000001 ret KILL 0060: 15 00 01 000000a9 jeq a9 0061 (false 0062) 0061: 06 00 00 00000001 ret KILL 0062: 15 00 01 00000082 jeq 82 0063 (false 0064) 0063: 06 00 00 00000001 ret KILL 0064: 06 00 00 7fff0000 ret ALLOW Dual 32/64 bit seccomp filter configured configuring 134 seccomp entries in /run/firejail/mnt/seccomp/seccomp sbox run: /usr/lib64/firejail/fsec-print /run/firejail/mnt/seccomp/seccomp Dropping all capabilities Drop privileges: pid 14, uid 1000, gid 1000, nogroups 1 No supplementary groups line OP JT JF K ================================= 0000: 20 00 00 00000004 ld data.architecture 0001: 15 01 00 c000003e jeq ARCH_64 0003 (false 0002) 0002: 06 00 00 7fff0000 ret ALLOW 0003: 20 00 00 00000000 ld data.syscall-number 0004: 35 01 00 40000000 jge X32_ABI 0006 (false 0005) 0005: 35 01 00 00000000 jge read 0007 (false 0006) 0006: 06 00 00 00050001 ret ERRNO(1) 0007: 15 00 01 0000009f jeq adjtimex 0008 (false 0009) 0008: 06 00 00 00000001 ret KILL 0009: 15 00 01 00000131 jeq clock_adjtime 000a (false 000b) 000a: 06 00 00 00000001 ret KILL 000b: 15 00 01 000000e3 jeq clock_settime 000c (false 000d) 000c: 06 00 00 00000001 ret KILL 000d: 15 00 01 000000a4 jeq settimeofday 000e (false 000f) 000e: 06 00 00 00000001 ret KILL 000f: 15 00 01 0000009a jeq modify_ldt 0010 (false 0011) 0010: 06 00 00 00000001 ret KILL 0011: 15 00 01 000000d4 jeq lookup_dcookie 0012 (false 0013) 0012: 06 00 00 00000001 ret KILL 0013: 15 00 01 0000012a jeq perf_event_open 0014 (false 0015) 0014: 06 00 00 00000001 ret KILL 0015: 15 00 01 00000137 jeq process_vm_writev 0016 (false 0017) 0016: 06 00 00 00000001 ret KILL 0017: 15 00 01 000000b0 jeq delete_module 0018 (false 0019) 0018: 06 00 00 00000001 ret KILL 0019: 15 00 01 00000139 jeq finit_module 001a (false 001b) 001a: 06 00 00 00000001 ret KILL 001b: 15 00 01 000000af jeq init_module 001c (false 001d) 001c: 06 00 00 00000001 ret KILL 001d: 15 00 01 000000a1 jeq chroot 001e (false 001f) 001e: 06 00 00 00000001 ret KILL 001f: 15 00 01 000000a5 jeq mount 0020 (false 0021) 0020: 06 00 00 00000001 ret KILL 0021: 15 00 01 0000009b jeq pivot_root 0022 (false 0023) 0022: 06 00 00 00000001 ret KILL 0023: 15 00 01 000000a6 jeq umount2 0024 (false 0025) 0024: 06 00 00 00000001 ret KILL 0025: 15 00 01 0000009c jeq _sysctl 0026 (false 0027) 0026: 06 00 00 00000001 ret KILL 0027: 15 00 01 000000b7 jeq afs_syscall 0028 (false 0029) 0028: 06 00 00 00000001 ret KILL 0029: 15 00 01 000000ae jeq create_module 002a (false 002b) 002a: 06 00 00 00000001 ret KILL 002b: 15 00 01 000000b1 jeq get_kernel_syms 002c (false 002d) 002c: 06 00 00 00000001 ret KILL 002d: 15 00 01 000000b5 jeq getpmsg 002e (false 002f) 002e: 06 00 00 00000001 ret KILL 002f: 15 00 01 000000b6 jeq putpmsg 0030 (false 0031) 0030: 06 00 00 00000001 ret KILL 0031: 15 00 01 000000b2 jeq query_module 0032 (false 0033) 0032: 06 00 00 00000001 ret KILL 0033: 15 00 01 000000b9 jeq security 0034 (false 0035) 0034: 06 00 00 00000001 ret KILL 0035: 15 00 01 0000008b jeq sysfs 0036 (false 0037) 0036: 06 00 00 00000001 ret KILL 0037: 15 00 01 000000b8 jeq tuxcall 0038 (false 0039) 0038: 06 00 00 00000001 ret KILL 0039: 15 00 01 00000086 jeq uselib 003a (false 003b) 003a: 06 00 00 00000001 ret KILL 003b: 15 00 01 00000088 jeq ustat 003c (false 003d) 003c: 06 00 00 00000001 ret KILL 003d: 15 00 01 000000ec jeq vserver 003e (false 003f) 003e: 06 00 00 00000001 ret KILL 003f: 15 00 01 000000ad jeq ioperm 0040 (false 0041) 0040: 06 00 00 00000001 ret KILL 0041: 15 00 01 000000ac jeq iopl 0042 (false 0043) 0042: 06 00 00 00000001 ret KILL 0043: 15 00 01 000000f6 jeq kexec_load 0044 (false 0045) 0044: 06 00 00 00000001 ret KILL 0045: 15 00 01 00000140 jeq kexec_file_load 0046 (false 0047) 0046: 06 00 00 00000001 ret KILL 0047: 15 00 01 000000a9 jeq reboot 0048 (false 0049) 0048: 06 00 00 00000001 ret KILL 0049: 15 00 01 000000a7 jeq swapon 004a (false 004b) 004a: 06 00 00 00000001 ret KILL 004b: 15 00 01 000000a8 jeq swapoff 004c (false 004d) 004c: 06 00 00 00000001 ret KILL 004d: 15 00 01 00000130 jeq open_by_handle_at 004e (false 004f) 004e: 06 00 00 00000001 ret KILL 004f: 15 00 01 0000012f jeq name_to_handle_at 0050 (false 0051) 0050: 06 00 00 00000001 ret KILL 0051: 15 00 01 000000fb jeq ioprio_set 0052 (false 0053) 0052: 06 00 00 00000001 ret KILL 0053: 15 00 01 00000067 jeq syslog 0054 (false 0055) 0054: 06 00 00 00000001 ret KILL 0055: 15 00 01 0000012c jeq fanotify_init 0056 (false 0057) 0056: 06 00 00 00000001 ret KILL 0057: 15 00 01 00000138 jeq kcmp 0058 (false 0059) 0058: 06 00 00 00000001 ret KILL 0059: 15 00 01 000000f8 jeq add_key 005a (false 005b) 005a: 06 00 00 00000001 ret KILL 005b: 15 00 01 000000f9 jeq request_key 005c (false 005d) 005c: 06 00 00 00000001 ret KILL 005d: 15 00 01 000000ed jeq mbind 005e (false 005f) 005e: 06 00 00 00000001 ret KILL 005f: 15 00 01 00000100 jeq migrate_pages 0060 (false 0061) 0060: 06 00 00 00000001 ret KILL 0061: 15 00 01 00000117 jeq move_pages 0062 (false 0063) 0062: 06 00 00 00000001 ret KILL 0063: 15 00 01 000000fa jeq keyctl 0064 (false 0065) 0064: 06 00 00 00000001 ret KILL 0065: 15 00 01 000000ce jeq io_setup 0066 (false 0067) 0066: 06 00 00 00000001 ret KILL 0067: 15 00 01 000000cf jeq io_destroy 0068 (false 0069) 0068: 06 00 00 00000001 ret KILL 0069: 15 00 01 000000d0 jeq io_getevents 006a (false 006b) 006a: 06 00 00 00000001 ret KILL 006b: 15 00 01 000000d1 jeq io_submit 006c (false 006d) 006c: 06 00 00 00000001 ret KILL 006d: 15 00 01 000000d2 jeq io_cancel 006e (false 006f) 006e: 06 00 00 00000001 ret KILL 006f: 15 00 01 000000d8 jeq remap_file_pages 0070 (false 0071) 0070: 06 00 00 00000001 ret KILL 0071: 15 00 01 00000143 jeq userfaultfd 0072 (false 0073) 0072: 06 00 00 00000001 ret KILL 0073: 15 00 01 000000a3 jeq acct 0074 (false 0075) 0074: 06 00 00 00000001 ret KILL 0075: 15 00 01 00000141 jeq bpf 0076 (false 0077) 0076: 06 00 00 00000001 ret KILL 0077: 15 00 01 000000b4 jeq nfsservctl 0078 (false 0079) 0078: 06 00 00 00000001 ret KILL 0079: 15 00 01 000000ab jeq setdomainname 007a (false 007b) 007a: 06 00 00 00000001 ret KILL 007b: 15 00 01 000000aa jeq sethostname 007c (false 007d) 007c: 06 00 00 00000001 ret KILL 007d: 15 00 01 00000099 jeq vhangup 007e (false 007f) 007e: 06 00 00 00000001 ret KILL 007f: 15 00 01 00000065 jeq ptrace 0080 (false 0081) 0080: 06 00 00 00000001 ret KILL 0081: 15 00 01 00000087 jeq personality 0082 (false 0083) 0082: 06 00 00 00000001 ret KILL 0083: 15 00 01 00000136 jeq process_vm_readv 0084 (false 0085) 0084: 06 00 00 00000001 ret KILL 0085: 06 00 00 7fff0000 ret ALLOW seccomp filter configured Mounting read-only /run/firejail/mnt/seccomp 4368 3450 0:247 /seccomp /run/firejail/mnt/seccomp ro,nosuid - tmpfs tmpfs rw,seclabel,mode=755,inode64 mountid=4368 fsname=/seccomp dir=/run/firejail/mnt/seccomp fstype=tmpfs Seccomp directory: ls /run/firejail/mnt/seccomp drwxr-xr-x root root 160 . drwxr-xr-x root root 300 .. -rw-r--r-- plankton plankton 1072 seccomp -rw-r--r-- plankton plankton 808 seccomp.32 -rw-r--r-- plankton plankton 114 seccomp.list -rw-r--r-- plankton plankton 0 seccomp.postexec -rw-r--r-- plankton plankton 0 seccomp.postexec32 -rw-r--r-- plankton plankton 176 seccomp.protocol Active seccomp files: cat /run/firejail/mnt/seccomp/seccomp.list /run/firejail/mnt/seccomp/seccomp.protocol /run/firejail/mnt/seccomp/seccomp.32 /run/firejail/mnt/seccomp/seccomp Dropping all capabilities noroot user namespace installed Dropping all capabilities NO_NEW_PRIVS set Drop privileges: pid 1, uid 1000, gid 1000, nogroups 0 Warning: cleaning all supplementary groups starting application LD_PRELOAD=(null) Running 'telegram-desktop' command through /bin/bash execvp argument 0: /bin/bash execvp argument 1: -c execvp argument 2: 'telegram-desktop' Child process initialized in 134.66 ms Installing /run/firejail/mnt/seccomp/seccomp seccomp filter Installing /run/firejail/mnt/seccomp/seccomp.32 seccomp filter Installing /run/firejail/mnt/seccomp/seccomp.protocol seccomp filter Error getpwuid: main.c:237 init_cfg: No such file or directory monitoring pid 15 Sandbox monitor: waitpid 15 retval 15 status 256 Parent is shutting down, bye... ``` </details>
Author
Owner

@rusty-snake commented on GitHub (Apr 12, 2021):

telegram-desktop 2.7.1 is not starting with default profile

Tip: Use keepassxc.profile if you talk about the "default keepassxc profile" and default.profile if you talk about default.profile. We had already confusion on sentences like "… if I start gimp with the default profile it …".

https://github.com/netblue30/firejail/issues/3868#issuecomment-754757409

What changed calling the program by path (e.g. /usr/bin/vlc)? Nothing, program did not start

Then it's not a firejail issue.

What error do you get?

telegram-desktop 2.7.1, located in /usr/local/bin/telegram-desktop, is not starting with default profile.

How did you installed telegram-desktop? (The rpmfusion-free package uses /usr/bin/telegram-desktop).

usr/bin/telegram-desktop: error while loading shared libraries: libwbclient.so.0: cannot open shared object file: No such file or directory

What does locate libwbclient.so.0 show?
Is libwbclient installed?

<!-- gh-comment-id:817980262 --> @rusty-snake commented on GitHub (Apr 12, 2021): > telegram-desktop 2.7.1 is not starting with default profile > Tip: Use keepassxc.profile if you talk about the "default keepassxc profile" and default.profile if you talk about default.profile. We had already confusion on sentences like "… if I start gimp with the default profile it …". https://github.com/netblue30/firejail/issues/3868#issuecomment-754757409 > What changed calling the program by path (e.g. /usr/bin/vlc)? Nothing, program did not start Then it's not a firejail issue. What error do you get? > telegram-desktop 2.7.1, located in /usr/local/bin/telegram-desktop, is not starting with default profile. How did you installed telegram-desktop? (The rpmfusion-free package uses /usr/bin/telegram-desktop). > usr/bin/telegram-desktop: error while loading shared libraries: libwbclient.so.0: cannot open shared object file: No such file or directory What does `locate libwbclient.so.0` show? Is `libwbclient` installed?
Author
Owner

@ghost commented on GitHub (Apr 12, 2021):

I have corrected the title, sorry for that.

As for the rest of the questions:

  • Yes i have installed telegram-desktop through rpm fusion.
  • /usr/bin/telegram-desktop is the bin location however system uses symlink from /usr/local/bin/telegram-desktop
  • locate libwbclient.so.0 output:
locate libwbclient.so.0
/etc/alternatives/libwbclient.so.0.15-64
/usr/lib64/libwbclient.so.0
/usr/lib64/libwbclient.so.0.15
/usr/lib64/samba/wbclient/libwbclient.so.0
/usr/lib64/samba/wbclient/libwbclient.so.0.15
/var/lib/alternatives/libwbclient.so.0.15-64

Telegram desktop start only if i use the following command: firejail --noprofile telegram-desktop
It will execute as well if i try /usr/bin/telegram-desktop

It wont execute if i call symlink /usr/local/bin/telegram-desktop or use GNOME program shortcut from program list. It will not execute if i call firejail telegram-desktop and it will show the output bellow

Reading profile /etc/firejail/telegram-desktop.profile
Reading profile /etc/firejail/telegram.profile
Reading profile /etc/firejail/disable-common.inc
Reading profile /etc/firejail/disable-devel.inc
Reading profile /etc/firejail/disable-exec.inc
Reading profile /etc/firejail/disable-interpreters.inc
Reading profile /etc/firejail/disable-programs.inc
Parent pid 31883, child pid 31884
Warning: skipping ca-certificates for private /etc
Private /etc installed in 29.54 ms
Warning: not remounting /run/user/1000/gvfs
Warning: cleaning all supplementary groups
Child process initialized in 123.51 ms
Error getpwuid: main.c:237 init_cfg: No such file or directory

Parent is shutting down, bye...
<!-- gh-comment-id:817992044 --> @ghost commented on GitHub (Apr 12, 2021): I have corrected the title, sorry for that. As for the rest of the questions: - Yes i have installed `telegram-desktop` through rpm fusion. - `/usr/bin/telegram-desktop` is the bin location however system uses symlink from `/usr/local/bin/telegram-desktop` - `locate libwbclient.so.0` output: ``` locate libwbclient.so.0 /etc/alternatives/libwbclient.so.0.15-64 /usr/lib64/libwbclient.so.0 /usr/lib64/libwbclient.so.0.15 /usr/lib64/samba/wbclient/libwbclient.so.0 /usr/lib64/samba/wbclient/libwbclient.so.0.15 /var/lib/alternatives/libwbclient.so.0.15-64 ``` Telegram desktop start only if i use the following command: `firejail --noprofile telegram-desktop` It will execute as well if i try `/usr/bin/telegram-desktop` It wont execute if i call symlink `/usr/local/bin/telegram-desktop` or use GNOME program shortcut from program list. It will not execute if i call ` firejail telegram-desktop` and it will show the output bellow <DETAILS> ``` Reading profile /etc/firejail/telegram-desktop.profile Reading profile /etc/firejail/telegram.profile Reading profile /etc/firejail/disable-common.inc Reading profile /etc/firejail/disable-devel.inc Reading profile /etc/firejail/disable-exec.inc Reading profile /etc/firejail/disable-interpreters.inc Reading profile /etc/firejail/disable-programs.inc Parent pid 31883, child pid 31884 Warning: skipping ca-certificates for private /etc Private /etc installed in 29.54 ms Warning: not remounting /run/user/1000/gvfs Warning: cleaning all supplementary groups Child process initialized in 123.51 ms Error getpwuid: main.c:237 init_cfg: No such file or directory Parent is shutting down, bye... ``` </DETAILS>
Author
Owner

@rusty-snake commented on GitHub (Apr 24, 2021):

  • The profile (and redirect profile if exists) hasn't already been fixed upstream.

895625b

<!-- gh-comment-id:826074705 --> @rusty-snake commented on GitHub (Apr 24, 2021): > - [x] The profile (and redirect profile if exists) hasn't already been fixed upstream. 895625b
Sign in to join this conversation.
No milestone
No project
No assignees
1 participant
Notifications
Due date
The due date is invalid or out of range. Please use the format "yyyy-mm-dd".

No due date set.

Dependencies

No dependencies set.

Reference: github-starred/firejail#2570
No description provided.