mirror of
https://github.com/netblue30/firejail.git
synced 2026-05-15 14:16:14 -06:00
[GH-ISSUE #1310] Seccomp execve - Operation not permitted launching an app #893
Labels
No labels
LTS merge
LTS merge
bug
bug
converted-to-discussion
doc-todo
documentation
duplicate
enhancement
file-transfer
firecfg
firejail-in-firejail
firetools
graphics
help wanted
information_old
installation
invalid
modif
moved
needinfo
networking
notabug
notourbug
old-version
overlayfs
packaging
profile-request
pull-request
question
question_old
removal
runtime-permissions
sandbox-ipc
security
stale
wiki
wiki
wontfix
wordpress
workaround
No milestone
No project
No assignees
1 participant
Notifications
Due date
No due date set.
Dependencies
No dependencies set.
Reference: github-starred/firejail#893
Loading…
Add table
Add a link
Reference in a new issue
No description provided.
Delete branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Originally created by @EdoardoVignati on GitHub (May 25, 2017).
Original GitHub issue: https://github.com/netblue30/firejail/issues/1310
hi, when I execute
firejail --seccomp.eperm=execve myappI notice that firejail blocks the app sayingexecvp: Operation not permitted.How to execute myapp and block execve syscall after?
@reinerh commented on GitHub (May 25, 2017):
Hm, while trying to reproduce it I noticed that it's not working anymore in 0.9.46, though it's still documented in the manpage.
@startx2017 commented on GitHub (May 26, 2017):
manpage problem - use the regular --seccomp command: "firejail --seccomp=execve:eperm myapp"
Fix:
c1d43f4123@EdoardoVignati commented on GitHub (May 26, 2017):
firejail --seccomp=execve:eperm myappcauses the same problem...seems that firejail recognizes the execution of myapp in the syscall blacklist specified in the command line, so not launching it...possibile?@reinerh commented on GitHub (May 26, 2017):
I can also confirm that the application is not executed if execve is blocked.
@netblue30 commented on GitHub (May 27, 2017):
Thanks @startx2017, I changed the code and forgot to modify the manual!
Don't use --seccomp=execve, because after installing the seccomp filter the sandbox will try to start the program using execve. We end up with seccomp killing the sandbox.
@EdoardoVignati commented on GitHub (May 27, 2017):
Any workaround? Is there another way to spawn myapp?
@netblue30 commented on GitHub (May 30, 2017):
I don't think there is any workaround.
@EdoardoVignati commented on GitHub (Jun 1, 2017):
Found a solution for seccomp here if it can be useful