[GH-ISSUE #1073] Ability to disable process namespaces #731

Closed
opened 2026-05-05 06:32:26 -06:00 by gitea-mirror · 3 comments
Owner

Originally created by @talwrii on GitHub (Jan 24, 2017).
Original GitHub issue: https://github.com/netblue30/firejail/issues/1073

I'm misusing firejail to jail zsh. It would quite nice if i could get a zsh that lives in the the global process namespace so that ps works etc.

Originally created by @talwrii on GitHub (Jan 24, 2017). Original GitHub issue: https://github.com/netblue30/firejail/issues/1073 I'm misusing firejail to jail zsh. It would quite nice if i could get a zsh that lives in the the global process namespace so that ps works etc.
gitea-mirror 2026-05-05 06:32:26 -06:00
Author
Owner

@netblue30 commented on GitHub (Jan 25, 2017):

Not possible, all the code expects a process namespace.

<!-- gh-comment-id:275114610 --> @netblue30 commented on GitHub (Jan 25, 2017): Not possible, all the code expects a process namespace.
Author
Owner

@talwrii commented on GitHub (Jan 25, 2017):

Cool cool.

If you think something like this feature is worth having (which is far from clear), one approach might be to steal the process namespace from /proc/1/ns/pid in the outer scope, which I presume is the default namespace for the machine.

<!-- gh-comment-id:275211378 --> @talwrii commented on GitHub (Jan 25, 2017): Cool cool. If you think something like this feature is worth having (which is far from clear), one approach might be to steal the process namespace from /proc/1/ns/pid in the outer scope, which I presume is the default namespace for the machine.
Author
Owner

@valoq commented on GitHub (Jan 27, 2017):

You can probably get the process list by using dbus and systemd to start a process outside the sandbox.
If the dbus socket in /run/user/UID/bus is available, it presents a way to escape the sandbox.

<!-- gh-comment-id:275581480 --> @valoq commented on GitHub (Jan 27, 2017): You can probably get the process list by using dbus and systemd to start a process outside the sandbox. If the dbus socket in /run/user/UID/bus is available, it presents a way to escape the sandbox.
Sign in to join this conversation.
No milestone
No project
No assignees
1 participant
Notifications
Due date
The due date is invalid or out of range. Please use the format "yyyy-mm-dd".

No due date set.

Dependencies

No dependencies set.

Reference: github-starred/firejail#731
No description provided.