-
Notifications
You must be signed in to change notification settings - Fork 567
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Can't create run directory without suid-root #2310
Comments
I think See also #1846 (comment) |
Seems like this was answered. @reinerh, I'll go ahead and close this, but please feel free to re-open if you have further questions. |
It was actually more a bug report or feature request than a question... If firejail does not support being run without suid-flag, then this should be checked and printed. |
Try to fix #2310 -- Can't create run directory without suid-root
See commit 15d7938 ("Try to fix netblue30#2310 -- Can't create run directory without suid-root", 2021-05-13) / PR netblue30#4273. It is the only "HAVE_" option whose value is set by if/else on a makefile. Also, it is set in different places to either "yes", "no", blank or "-DHAVE_SUID". Set the value only on configure.ac and only to either blank or to "-DHAVE_SUID". Misc: The `ifeq ($(HAVE_SUID),-DHAVE_SUID)` comparison that this adds is based on the existing `ifeq ($(HAVE_APPARMOR),-DHAVE_APPARMOR)` comparison on Makefile.in.
See commit 15d7938 ("Try to fix netblue30#2310 -- Can't create run directory without suid-root", 2021-05-13) / PR netblue30#4273. It is the only "HAVE_" option whose value is set by if/else on a makefile. Also, it is set in different places to either "yes", "no", blank or "-DHAVE_SUID". Set the value only on configure.ac and only to either blank or to "-DHAVE_SUID". Misc: The `ifeq ($(HAVE_SUID),-DHAVE_SUID)` comparison that this adds is based on the existing `ifeq ($(HAVE_APPARMOR),-DHAVE_APPARMOR)` comparison on Makefile.in.
I compiled firejail with
--disable-suid
and tried running it, but it fails to start:It tries to create its runtime hierarchy in
/run/firejail
, which is not possible as unprivileged user.If this is not supported, it should check the uid and print a more friendly error message if the user is not root.
If an unprivileged user should be able to run it (without suid-root), maybe it can create required directories in the user's home directory.
The text was updated successfully, but these errors were encountered: