mirror of
https://github.com/netblue30/firejail.git
synced 2026-05-15 14:16:14 -06:00
[GH-ISSUE #4362] Firefox can't access sndio sound server #2632
Labels
No labels
LTS merge
LTS merge
bug
bug
converted-to-discussion
doc-todo
documentation
duplicate
enhancement
file-transfer
firecfg
firejail-in-firejail
firetools
graphics
help wanted
information_old
installation
invalid
modif
moved
needinfo
networking
notabug
notourbug
old-version
overlayfs
packaging
profile-request
pull-request
question
question_old
removal
runtime-permissions
sandbox-ipc
security
stale
wiki
wiki
wontfix
wordpress
workaround
No milestone
No project
No assignees
1 participant
Notifications
Due date
No due date set.
Dependencies
No dependencies set.
Reference: github-starred/firejail#2632
Loading…
Add table
Add a link
Reference in a new issue
No description provided.
Delete branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Originally created by @nullenvk on GitHub (Jun 19, 2021).
Original GitHub issue: https://github.com/netblue30/firejail/issues/4362
Bug and expected behavior
When using firejail, firefox can't play audio through sndio (an alternative to pulseaudio), most likely because it requires access to $HOME/.sndio/cookie. Firefox should be able to connect to sndio with use of the cookie file.
No profile and disabling firejail
Without firejail or without profiles, firefox works fine with sndio and is able to play audio.
Reproduce
Steps to reproduce the behavior:
Environment
Checklist
https://github.com/netblue30/firejail/issues/1139)--profile=PROFILENAMEis used to set the right profile.LC_ALL=en_US.UTF-8 LANG=en_US.UTF-8 PROGRAMto get english error-messages.browser-allow-drm yes/browser-disable-u2f noinfirejail.configto allow DRM/U2F in browsers.@nullenvk commented on GitHub (Jun 19, 2021):
Also, when you disable cubeb's sandbox (media.cubeb.sandbox in about:config) with sndio backend enabled, seccomp violations occur when trying to play audio:
@rusty-snake commented on GitHub (Jun 19, 2021):
If
whitelist ${HOME}/.sndio/cookieworks, we should add it to whitelist-common.incsyscall 220 is
semtimedopon x86_64 andgetdents64on i386. Both aren't blocked by firejail. Can you reproduce this with--noprofiletoo?@nullenvk commented on GitHub (Jun 19, 2021):
The problem doesn't occur when I use --noprofile. However, I think adding that whitelist option to whitelist-common.local stopped these seccomp messages from appearing, although the problem still occurs and firefox prints out that "failed to init cubeb" message.
@nullenvk commented on GitHub (Jun 19, 2021):
Oh, I've found out how to fix it. The program needs to access /tmp/sndio directory too, then the problem stops.