mirror of
https://github.com/netblue30/firejail.git
synced 2026-05-15 14:16:14 -06:00
[GH-ISSUE #5390] discord: Failed to move to new namespace (userns) #2982
Labels
No labels
LTS merge
LTS merge
bug
bug
converted-to-discussion
doc-todo
documentation
duplicate
enhancement
file-transfer
firecfg
firejail-in-firejail
firetools
graphics
help wanted
information_old
installation
invalid
modif
moved
needinfo
networking
notabug
notourbug
old-version
overlayfs
packaging
profile-request
pull-request
question
question_old
removal
runtime-permissions
sandbox-ipc
security
stale
wiki
wiki
wontfix
wordpress
workaround
No milestone
No project
No assignees
1 participant
Notifications
Due date
No due date set.
Dependencies
No dependencies set.
Reference: github-starred/firejail#2982
Loading…
Add table
Add a link
Reference in a new issue
No description provided.
Delete branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Originally created by @ghost on GitHub (Oct 1, 2022).
Original GitHub issue: https://github.com/netblue30/firejail/issues/5390
Description
Discord is not starting, neither via *.desktop file nor called via terminal.
Steps to Reproduce
Expected behavior
Discord should start running.
Actual behavior
Behavior without a profile
Environment
Checklist
/usr/bin/vlc) "fixes" it).https://github.com/netblue30/firejail/issues/1139)browser-allow-drm yes/browser-disable-u2f noinfirejail.configto allow DRM/U2F in browsers.--profile=PROFILENAMEto set the right profile. (Only relevant for AppImages)Output of
LC_ALL=C firejail --debug /path/to/program@rusty-snake commented on GitHub (Oct 1, 2022):
You can not run chromium* in firejail and set NNP if you use Linux hardened.
Duplicate of [long list here]
@rusty-snake commented on GitHub (Oct 1, 2022):
You can not.
@ghost commented on GitHub (Oct 2, 2022):
@rusty-snake OK, to verify that I did understand this correctly, linux-hardened has deactivated support for unprivileged user namespace usage, and since those are used for sandboxing by firejail certain applications can't be sandboxed. Did I understand this right?
@rusty-snake commented on GitHub (Oct 2, 2022):
correct
The usernamespace created by firejail's
norootoption is created by a privileged user (root).The problem are chromium* programs because they have an own sandbox (and webkit4gtk too but different). This chrome-sandbox always wants to create a new usernamespace and if it can not, it refuses to run. This user-ns is created unprivileged if possible (blocked by linux-hardened) or by a privileged helper (blocked by NNP). => disabled (unprivileged) user-ns + NNP + chromium is the problem.