mirror of
https://github.com/netblue30/firejail.git
synced 2026-05-15 14:16:14 -06:00
[GH-ISSUE #618] "Seccomp.keep chroot" exits with error #431
Labels
No labels
LTS merge
LTS merge
bug
bug
converted-to-discussion
doc-todo
documentation
duplicate
enhancement
file-transfer
firecfg
firejail-in-firejail
firetools
graphics
help wanted
information_old
installation
invalid
modif
moved
needinfo
networking
notabug
notourbug
old-version
overlayfs
packaging
profile-request
pull-request
question
question_old
removal
runtime-permissions
sandbox-ipc
security
stale
wiki
wiki
wontfix
wordpress
workaround
No milestone
No project
No assignees
1 participant
Notifications
Due date
No due date set.
Dependencies
No dependencies set.
Reference: github-starred/firejail#431
Loading…
Add table
Add a link
Reference in a new issue
No description provided.
Delete branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Originally created by @Fred-Barclay on GitHub (Jul 6, 2016).
Original GitHub issue: https://github.com/netblue30/firejail/issues/618
I'm probably doing this wrong but whenever I try to use the seccomp filter but keep chroot, firejail exits with a warning. This is for profiles as well as starting a shell from the terminal:
<user>@<redacted> ~ $ firejail --seccomp.keep=chrootReading profile /etc/firejail/default.profileReading profile /etc/firejail/disable-common.incReading profile /etc/firejail/disable-programs.incReading profile /etc/firejail/disable-passwdmgr.inc*\* Note: you can use --noprofile to disable default.profile **Parent pid 2531, child pid 2532#Error: cannot establish communication with the parent, exiting...Starting
firejail --seccompworks fine (though of course no chroot), it's only withseccomp.keepthat I have issues.This is for the development version of firejail, built from source a few hours ago, running on LMDE Betsy (Debian Jessie base).
Thanks!
@manevich commented on GitHub (Jul 6, 2016):
I have no expertise here, but if you run this command with
--debugflag you see that you get only few syscalls whitelisted:Too few to run something usefull, I think.
@netblue30 commented on GitHub (Jul 6, 2016):
@manevich is right, you need quite a long list there.
@Fred-Barclay commented on GitHub (Jul 6, 2016):
So in other words, chroot needs more syscalls that are blacklisted by seccomp, so firejail exits. Is that correct?
@netblue30 commented on GitHub (Jul 7, 2016):
You would need to run strace on the application you want to sandbox. strace will give you the list of syscalls:
https://firejail.wordpress.com/documentation-2/seccomp-guide/
@Fred-Barclay commented on GitHub (Jul 7, 2016):
Thank you @manevich and @netblue30.
stracelooks like it will do the trick, and I'm left scratching my head and wondering why I didn't think of it earlier. :)Take care.