[GH-ISSUE #5207] Flood of seccomp audit log entries #2917

Closed
opened 2026-05-05 09:34:56 -06:00 by gitea-mirror · 12 comments
Owner

Originally created by @EdiDD on GitHub (Jun 17, 2022).
Original GitHub issue: https://github.com/netblue30/firejail/issues/5207

There are many log entries like: audit: SECCOMP ... and kernel: audit: ... in journal probably because of (firejail 0.9.70):

Is there a way to disable this or make these messages silently ignored ?

Originally created by @EdiDD on GitHub (Jun 17, 2022). Original GitHub issue: https://github.com/netblue30/firejail/issues/5207 There are many log entries like: audit: SECCOMP ... and kernel: audit: ... in journal probably because of (firejail 0.9.70): * #5110 Is there a way to disable this or make these messages silently ignored ?
gitea-mirror 2026-05-05 09:34:56 -06:00
  • closed this issue
  • added the
    bug
    label
Author
Owner

@netblue30 commented on GitHub (Jun 17, 2022):

Bug! I have it on my computer so far for whois, transmission, and Tor browser. Log example:

Jun 17 07:50:36 debian kernel: [ 4566.037606] audit: type=1326 audit(1655466636.900:143): auid=1000 uid=1000 gid=1000 ses=2 subj==firejail-default (enforce) pid=7841 comm=517420626561726572207468726561 exe="/usr/bin/transmission-qt" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7f83e851f477 code=0x50000

Syscall 41 is "socket" (you can get the name by running "firejail --debug-syscalls"). In the profile I had to add "netlink" and "unix":

protocol unix,inet,inet6,netlink

Let's look in the logs for some more programs generating this kind of messages. Thanks for the bug!

<!-- gh-comment-id:1158821064 --> @netblue30 commented on GitHub (Jun 17, 2022): Bug! I have it on my computer so far for whois, transmission, and Tor browser. Log example: ````` Jun 17 07:50:36 debian kernel: [ 4566.037606] audit: type=1326 audit(1655466636.900:143): auid=1000 uid=1000 gid=1000 ses=2 subj==firejail-default (enforce) pid=7841 comm=517420626561726572207468726561 exe="/usr/bin/transmission-qt" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7f83e851f477 code=0x50000 ````` Syscall 41 is "socket" (you can get the name by running "firejail --debug-syscalls"). In the profile I had to add "netlink" and "unix": ````` protocol unix,inet,inet6,netlink ````` Let's look in the logs for some more programs generating this kind of messages. Thanks for the bug!
Author
Owner

@rusty-snake commented on GitHub (Jun 17, 2022):

Previous discussion with suggested fix (and deleted comment 👎): https://github.com/netblue30/firejail/discussions/5181#discussioncomment-2947406
Please link to previous discussion if you move them.


-protocol inet,inet6
+protocol unix,inet,inet6,netlink

Do we really need to open all this?

<!-- gh-comment-id:1158970455 --> @rusty-snake commented on GitHub (Jun 17, 2022): Previous discussion with suggested fix (and deleted comment :-1:): https://github.com/netblue30/firejail/discussions/5181#discussioncomment-2947406 Please link to previous discussion if you move them. --- > ```diff > -protocol inet,inet6 > +protocol unix,inet,inet6,netlink > ``` Do we really need to open all this?
Author
Owner

@ghost commented on GitHub (Jun 17, 2022):

Personally I tend to agree with @rusty-snake's comment above. It seems overkill to allow a potentially insecure netlink protocol 'just' to keep cleaner logs IMO. Perhaps a comment would be more appropriate instead?

Besides, users can always provide their own audit filtering via /etc/audit/rules.d for log sanity (audit tends to be very verbose by default). See this for some examples.

<!-- gh-comment-id:1159011591 --> @ghost commented on GitHub (Jun 17, 2022): Personally I tend to agree with @rusty-snake's comment above. It seems overkill to allow a potentially insecure `netlink` protocol 'just' to keep cleaner logs IMO. Perhaps a comment would be more appropriate instead? Besides, users can always provide their own audit filtering via `/etc/audit/rules.d` for log sanity (audit tends to be very verbose by default). See [this](https://wiki.archlinux.org/title/Audit_framework#Filter_unwanted_messages) for some examples.
Author
Owner

@netblue30 commented on GitHub (Jun 17, 2022):

Good point! I'll add instead a configuration flag in /etc/firejail/firejail.config to shut down the automatic logging, enabled by default. Will this work?

<!-- gh-comment-id:1159040170 --> @netblue30 commented on GitHub (Jun 17, 2022): Good point! I'll add instead a configuration flag in /etc/firejail/firejail.config to shut down the automatic logging, enabled by default. Will this work?
Author
Owner

@ghost commented on GitHub (Jun 17, 2022):

Good point! I'll add instead a configuration flag in /etc/firejail/firejail.config to shut down the automatic logging, enabled by default. Will this work?

It should work yes. I happen to have some extra time to test if you 'd like. Been doing some specific audit filtering lately in another context, that's why it occurred to me it might be a more appropriate way to deal with this. Once things settle down code-wise I can add a wiki item with some example rules for log sanitation. Thanks for looking into things!

<!-- gh-comment-id:1159047986 --> @ghost commented on GitHub (Jun 17, 2022): > Good point! I'll add instead a configuration flag in /etc/firejail/firejail.config to shut down the automatic logging, enabled by default. Will this work? It should work yes. I happen to have some extra time to test if you 'd like. Been doing some specific audit filtering lately in another context, that's why it occurred to me it might be a more appropriate way to deal with this. Once things settle down code-wise I can add a wiki item with some example rules for log sanitation. Thanks for looking into things!
Author
Owner

@EdiDD commented on GitHub (Jun 18, 2022):

Let's look in the logs for some more programs generating this kind of messages. Thanks for the bug!

It also occurs in curl

<!-- gh-comment-id:1159382138 --> @EdiDD commented on GitHub (Jun 18, 2022): > Let's look in the logs for some more programs generating this kind of messages. Thanks for the bug! It also occurs in `curl`
Author
Owner

@netblue30 commented on GitHub (Jun 18, 2022):

I added "seccomp-log no" in /etc/firejail/firejail.config

c7e4c8ed59

<!-- gh-comment-id:1159447453 --> @netblue30 commented on GitHub (Jun 18, 2022): I added "seccomp-log no" in /etc/firejail/firejail.config https://github.com/netblue30/firejail/commit/c7e4c8ed592fee7f1644152a23c3e1343b01b922
Author
Owner

@EdiDD commented on GitHub (Jun 18, 2022):

Great! , waiting for a patched release. Thank you.

<!-- gh-comment-id:1159460610 --> @EdiDD commented on GitHub (Jun 18, 2022): Great! , waiting for a patched release. Thank you.
Author
Owner

@ghost commented on GitHub (Jun 19, 2022):

@netblue30 c7e4c8ed59 works fine, thanks! Just one question: now this is 'fixed', can/should we revert 17774ad546?

<!-- gh-comment-id:1159834903 --> @ghost commented on GitHub (Jun 19, 2022): @netblue30 https://github.com/netblue30/firejail/commit/c7e4c8ed592fee7f1644152a23c3e1343b01b922 works fine, thanks! Just one question: now this is 'fixed', can/should we revert https://github.com/netblue30/firejail/commit/17774ad5464feb83edbb8971fd51e029ae608a6d?
Author
Owner

@netblue30 commented on GitHub (Jun 20, 2022):

Forgot about it. I've just revert it.

<!-- gh-comment-id:1160471945 --> @netblue30 commented on GitHub (Jun 20, 2022): Forgot about it. I've just revert it.
Author
Owner

@kmk3 commented on GitHub (Jun 20, 2022):

@rusty-snake commented on May 20:

FTR: c0d314f

@SkewedZeppelin Can this be reverted as well?

<!-- gh-comment-id:1160834164 --> @kmk3 commented on GitHub (Jun 20, 2022): @rusty-snake commented [on May 20](https://github.com/netblue30/firejail/issues/5110#issuecomment-1132866965): > FTR: [c0d314f](https://github.com/netblue30/firejail/commit/c0d314f945b405f1e90a1a43719059cd22f55de7) @SkewedZeppelin Can this be reverted as well?
Author
Owner

@SkewedZeppelin commented on GitHub (Jun 21, 2022):

@kmk3

did

<!-- gh-comment-id:1160993148 --> @SkewedZeppelin commented on GitHub (Jun 21, 2022): @kmk3 did
Sign in to join this conversation.
No milestone
No project
No assignees
1 participant
Notifications
Due date
The due date is invalid or out of range. Please use the format "yyyy-mm-dd".

No due date set.

Dependencies

No dependencies set.

Reference: github-starred/firejail#2917
No description provided.