[GH-ISSUE #5045] chromium: program does not start (snap) #2862

Closed
opened 2026-05-05 09:31:17 -06:00 by gitea-mirror · 1 comment
Owner

Originally created by @ghost on GitHub (Mar 14, 2022).
Original GitHub issue: https://github.com/netblue30/firejail/issues/5045

I have tried running google-chrome with firejail google-chrome or firejail --private google-chrome and it runs fine.

Trying to do the same for chromium-browser though fails with:

Reading profile /etc/firejail/chromium-browser.profile
Reading profile /etc/firejail/chromium.profile
Reading profile /etc/firejail/chromium-common.profile
Reading profile /etc/firejail/disable-common.inc
Reading profile /etc/firejail/disable-devel.inc
Reading profile /etc/firejail/disable-exec.inc
Reading profile /etc/firejail/disable-interpreters.inc
Reading profile /etc/firejail/disable-programs.inc
Reading profile /etc/firejail/whitelist-common.inc
Reading profile /etc/firejail/whitelist-var-common.inc
Warning: networking feature is disabled in Firejail configuration file
Parent pid 633232, child pid 633233
Child process initialized in 44.23 ms
2022/03/14 09:13:44.464683 system_key.go:154: cannot determine cgroup version: cannot determine filesystem type: cannot statfs path: permission denied

I am on Ubuntu 20.04.

Originally created by @ghost on GitHub (Mar 14, 2022). Original GitHub issue: https://github.com/netblue30/firejail/issues/5045 I have tried running google-chrome with firejail google-chrome or firejail --private google-chrome and it runs fine. Trying to do the same for chromium-browser though fails with: ``` Reading profile /etc/firejail/chromium-browser.profile Reading profile /etc/firejail/chromium.profile Reading profile /etc/firejail/chromium-common.profile Reading profile /etc/firejail/disable-common.inc Reading profile /etc/firejail/disable-devel.inc Reading profile /etc/firejail/disable-exec.inc Reading profile /etc/firejail/disable-interpreters.inc Reading profile /etc/firejail/disable-programs.inc Reading profile /etc/firejail/whitelist-common.inc Reading profile /etc/firejail/whitelist-var-common.inc Warning: networking feature is disabled in Firejail configuration file Parent pid 633232, child pid 633233 Child process initialized in 44.23 ms 2022/03/14 09:13:44.464683 system_key.go:154: cannot determine cgroup version: cannot determine filesystem type: cannot statfs path: permission denied ``` I am on Ubuntu 20.04.
gitea-mirror 2026-05-05 09:31:17 -06:00
Author
Owner

@kmk3 commented on GitHub (Mar 14, 2022):

@infosisio commented on Mar 14:

I have tried running google-chrome with firejail google-chrome or firejail
--private google-chrome and it runs fine.

Trying to do the same for chromium-browser though fails with:

[...]
2022/03/14 09:13:44.464683 system_key.go:154: cannot determine cgroup version: cannot determine filesystem type: cannot statfs path: permission denied

That seems to come from here:

https://github.com/snapcore/snapd/blob/8fc0bc71e41c91e7931d53a8820359abe923ec9e/interfaces/system_key.go#L154

		logger.Noticef("cannot determine cgroup version: %v", err)

In which case, note that firejail is incompatible with snaps and flatpaks.

I am on Ubuntu 20.04.

Note that when trying to install certain packages with apt, on recent
versions of Ubuntu (such as on 21.10) that will actually end up installing a
snap instead of an actual deb package. See:

So if you are affected by this, you need to install the "real" chromium package
to use it in firejail.

You might also need to remove the chromium snap first before trying that.

Note that there are Ubuntu derivatives (such as Linux Mint) that do not do
these shenanigans; their apt should only install proper deb packages.

Closing this as a duplicate of #4962.

<!-- gh-comment-id:1066615484 --> @kmk3 commented on GitHub (Mar 14, 2022): @infosisio commented [on Mar 14](https://github.com/netblue30/firejail/issues/5045#issue-1167982433): > I have tried running google-chrome with firejail google-chrome or firejail > --private google-chrome and it runs fine. > > Trying to do the same for chromium-browser though fails with: > > ``` > [...] > 2022/03/14 09:13:44.464683 system_key.go:154: cannot determine cgroup version: cannot determine filesystem type: cannot statfs path: permission denied > ``` That seems to come from here: <https://github.com/snapcore/snapd/blob/8fc0bc71e41c91e7931d53a8820359abe923ec9e/interfaces/system_key.go#L154> > ```golang > logger.Noticef("cannot determine cgroup version: %v", err) > ``` In which case, note that firejail is incompatible with snaps and flatpaks. > I am on Ubuntu 20.04. Note that when trying to install certain packages with `apt`, on recent versions of Ubuntu (such as on 21.10) that will actually end up installing a snap instead of an actual deb package. See: * #4554 * #4810 So if you are affected by this, you need to install the "real" chromium package to use it in firejail. You might also need to remove the chromium snap first before trying that. Note that there are Ubuntu derivatives (such as Linux Mint) that do not do these shenanigans; their `apt` should only install proper deb packages. Closing this as a duplicate of #4962.
Sign in to join this conversation.
No milestone
No project
No assignees
1 participant
Notifications
Due date
The due date is invalid or out of range. Please use the format "yyyy-mm-dd".

No due date set.

Dependencies

No dependencies set.

Reference: github-starred/firejail#2862
No description provided.