mirror of
https://github.com/netblue30/firejail.git
synced 2026-05-15 14:16:14 -06:00
[GH-ISSUE #669] Is it possible to avoid remounting /proc on an individual basis? #459
Labels
No labels
LTS merge
LTS merge
bug
bug
converted-to-discussion
doc-todo
documentation
duplicate
enhancement
file-transfer
firecfg
firejail-in-firejail
firetools
graphics
help wanted
information_old
installation
invalid
modif
moved
needinfo
networking
notabug
notourbug
old-version
overlayfs
packaging
profile-request
pull-request
question
question_old
removal
runtime-permissions
sandbox-ipc
security
stale
wiki
wiki
wontfix
wordpress
workaround
No milestone
No project
No assignees
1 participant
Notifications
Due date
No due date set.
Dependencies
No dependencies set.
Reference: github-starred/firejail#459
Loading…
Add table
Add a link
Reference in a new issue
No description provided.
Delete branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Originally created by @Fred-Barclay on GitHub (Jul 30, 2016).
Original GitHub issue: https://github.com/netblue30/firejail/issues/669
...and if so, what security problems could this cause?
I've started back on #435 and I believe the problem all boils down to the symlink ~/.googleearth/instance-running-lock and its target, /proc/12.
Even when using
firejail --noprofile --debug google-earth, the /proc directory is remounted:Remounting /proc and /proc/sys filesystemsRemounting /sys directory...Disable /proc/sys/fs/binfmt_miscDisable /proc/sys/kernel/core_patternDisable /proc/sys/kernel/modprobe...If it were possible to avoid remounting /proc/12, or at the very least /proc, then it's possible that #435 could be fixed.
So...
is there a command line option in firejail to keep /proc or /proc/12 from being remounted?
Thanks!
Fred
@manevich commented on GitHub (Jul 30, 2016):
I think remounting is not related to this case.
/proc/12and other /proc/number are directories created for each process, and number is PID of process running on system.From jail you can see only processes running inside (that's one of things we use jail for - to isolate processes).
Same process will have different PID if you look from outside. This is effect of process namespaces, not remounting.
I don't have googleearth installed nor intent to install it, so I can't help you further.
@netblue30 commented on GitHub (Jul 31, 2016):
The kernel does it automatically, no way around it. Try a simple blacklist /proc in the profile, maybe googleearth doesn't crash and doesn't create the lock file.
@Fred-Barclay commented on GitHub (Aug 2, 2016):
Thanks. Since my question is answered I'll close this and use #677 for the issues I'm having with blacklisting /proc. :)