Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[linux] Error loading Chromium SUID Sandbox #60

Closed
arkokoley opened this issue Jul 10, 2014 · 37 comments
Closed

[linux] Error loading Chromium SUID Sandbox #60

arkokoley opened this issue Jul 10, 2014 · 37 comments
Labels

Comments

@arkokoley
Copy link

Whenever I try running breach, i get this error:

./breach                                              07/11/2014 00:42:12 IST
[4413:4413:0711/004358:3080095122:FATAL:browser_main_loop.cc(172)] Running 
without the SUID sandbox! See https://code.google.com/p/chromium
/wiki/LinuxSUIDSandboxDevelopment for more information on developing with the 
sandbox on.
./breach: line 6:  4413 Aborted                 $SRC_DIR/__AUTO_UPDATE_BUNDLE__/exo_browser/exo_browser --raw $SRC_DIR/__AUTO_UPDATE_BUNDLE__/breach_core

I managed to run exobrowser without SUID sandbox using the flag:
--disable-setuid-sandbox. However, I couldn't manage to do the same with breach when using exo. Any ideas regarding how to do this?

I am using Linux Mint 17 64bit.

@flecno
Copy link

flecno commented Jul 10, 2014

same for me on archlinux64

@sergiolepore
Copy link

Same on Ubuntu 14.04

@spolu
Copy link
Owner

spolu commented Jul 10, 2014

Damn. This has to be fixed.
In the meantime you can probably run the exobrowser directly and passing it breach_core:

 ./__AUTO_UPDATE_BUNDLE__/exo_browser/exo_browser --disable-setuid-sandbox --raw __AUTO_UPDATE_BUNDLE__/breach_core/

@flecno
Copy link

flecno commented Jul 10, 2014

Mhm... But:

./__AUTO_UPDATE_BUNDLE__/exo_browser/exo_browser: bad option: --disable-setuid-sandbox

@spolu
Copy link
Owner

spolu commented Jul 10, 2014

Ouch.
Would this work?

 ./__AUTO_UPDATE_BUNDLE__/exo_browser/exo_browser --raw __AUTO_UPDATE_BUNDLE__/breach_core/ -- --disable-setuid-sandbox 

@spolu
Copy link
Owner

spolu commented Jul 10, 2014

Otherwise you can also install the sandbox locally following the instruction there...

@flecno
Copy link

flecno commented Jul 10, 2014

no.... this will results in the same error like normal start

@spolu
Copy link
Owner

spolu commented Jul 10, 2014

So last thing you can do is replace the content of exo_browser/shell/* by breach_core/* and then run the exo_browser with just the arg you specified

@spolu
Copy link
Owner

spolu commented Jul 10, 2014

The ExoBrowser go fetch the content of shell/ by default

@spolu spolu changed the title Error in running [linux] Error loading Chromium SUID Sandbox Jul 10, 2014
@spolu spolu added the Bug label Jul 10, 2014
@arkokoley
Copy link
Author

Copying contents of breach_core to exo_browser/shell/ works with the exo_browser running with --disable-setuid-sandbox flag. Thanks. Breach works now.

@arkokoley
Copy link
Author

Writing this comment from Breach right now! :D

Woohoo!

@flecno
Copy link

flecno commented Jul 10, 2014

@arkokoley not for me. What i'm doing wrong?

/breach-v0.3.20-alpha.5-linux-x64 % cd __AUTO_UPDATE_BUNDLE__/exo_browser/shell/                                                       :(
..AUTO_UPDATE_BUNDLE__/exo_browser/shell % rm -rf *
..AUTO_UPDATE_BUNDLE__/exo_browser/shell % cp -a ../../breach_core/* ./   
..AUTO_UPDATE_BUNDLE__/exo_browser/shell % cd ../../../
..loads/breach-v0.3.20-alpha.5-linux-x64 %  ./__AUTO_UPDATE_BUNDLE__/exo_browser/exo_browser --disable-setuid-sandbox --raw __AUTO_UPDATE_BUNDLE__/breach_core/
./__AUTO_UPDATE_BUNDLE__/exo_browser/exo_browser: bad option: --disable-setuid-sandbox

@ahamilton9
Copy link

@arkokoley Worked for me as well, Linux Mint.

@ahamilton9
Copy link

@flecno I didn't remove any files from exo_browser/shell, just overwrote/merged everything. Otherwise, your commands look fine.

@arkokoley
Copy link
Author

@flecno Everything is fine. run it as:

.loads/breach-v0.3.20-alpha.5-linux-x64 %  ./__AUTO_UPDATE_BUNDLE__/exo_browser/exo_browser --disable-setuid-sandbox 

@flecno
Copy link

flecno commented Jul 10, 2014

Ahh. thank you! That command works!

@spolu
Copy link
Owner

spolu commented Jul 10, 2014

Yay! 👍

@timmarinin
Copy link

Same problem, last command works. (Debian amd-64)

@arkokoley
Copy link
Author

To sum up, for other linux users who might face this error,

To run Breach, run:

$ cd breach-v0.3.20-alpha.5-linux-x64
$  rm -rf __AUTO_UPDATE_BUNDLE__/exo_browser/shell/*
$ cp -a __AUTO_UPDATE_BUNDLE__/breach_core/* __AUTO_UPDATE_BUNDLE__/exo_browser/shell
$ ./__AUTO_UPDATE_BUNDLE__/exo_browser/exo_browser --disable-setuid-sandbox

@spolu
Copy link
Owner

spolu commented Jul 10, 2014

We'll keep this one open until it gets fixed

@spolu spolu reopened this Jul 10, 2014
@arkokoley
Copy link
Author

👍

@say2joe
Copy link

say2joe commented Jul 11, 2014

The above fix did NOT work on Ubuntu 14.04. Please see the following error info:

[2014-07-11T12:25:46.099Z] [index] Breach v0.3.20-alpha.5 Starting...
[2014-07-11T12:25:48.125Z] *********************************************
[2014-07-11T12:25:48.126Z] ERROR: ENOENT, stat '/home/jjohnson/npm'
[2014-07-11T12:25:48.126Z] *********************************************
[2014-07-11T12:25:48.127Z] Error: ENOENT, stat '/home/jjohnson/npm'
[2014-07-11T12:25:48.127Z] at Error (native)
[2014-07-11T12:25:48.127Z] ---------------------------------------------

I'm not terribly sure this product is ready for any kind of release if it doesn't even run / install.

@say2joe
Copy link

say2joe commented Jul 11, 2014

I figured out the problem. It was looking for npm installed locally -- mine is installed globally. Using sudo solved my problem. (I also created a symlink from $HOME/npm to /usr/bin/npm which removes my need for sudo)

@user12312
Copy link

Am running linux mint. I followed these instructions posted in here:
$ cd breach-v0.3.20-alpha.5-linux-x64
$ rm -rf AUTO_UPDATE_BUNDLE/exo_browser/shell/*
$ cp -a AUTO_UPDATE_BUNDLE/breach_core/* AUTO_UPDATE_BUNDLE/exo_browser/shell
$ ./AUTO_UPDATE_BUNDLE/exo_browser/exo_browser --disable-setuid-sandbox

I get the following error, "./AUTO_UPDATE_BUNDLE/exo_browser/exo_browser: symbol lookup error: ./AUTO_UPDATE_BUNDLE/exo_browser/exo_browser: undefined symbol: g_type_class_adjust_private_offset "

does anyone one have basic fool proof instructions to getting this running? I am on Linux Mint 15 Olivia. Thanks.

@puredevotion
Copy link

same problem, @arkokoley and @say2joe comments helped.

running ubuntu 14.04 amd64, chromium installed, node/npm installed through apt-get.
Wouldn't mind a apt-source for this :)

ps. typing from within breach!

@fazo96
Copy link

fazo96 commented Jul 13, 2014

The fix in @arkokoley's comment helped for me. I'm on arch linux x64

@user12312
Copy link

error message I am getting is: /home/user/Desktop/breach-v0.3.20-alpha.5-linux-x64/AUTO_UPDATE_BUNDLE/exo_browser/exo_browser: symbol lookup error: /home/user/Desktop/breach-v0.3.20-alpha.5-linux-x64/AUTO_UPDATE_BUNDLE/exo_browser/exo_browser: undefined symbol: g_type_class_adjust_private_offset

@ColemanGariety
Copy link

Is there a way to get this to work out of the box? Maybe a simple re-packaging of the Beach linux dist?

@shime
Copy link

shime commented Jul 13, 2014

Just confirming that this command works on arch x64:

./__AUTO_UPDATE_BUNDLE__/exo_browser/exo_browser --disable-setuid-sandbox 

@miketheprogrammer
Copy link

@JacksonGariety This is an unstable alpha. There is no "out of the box". At a minimum, that comes at beta level, but only typically guaranteed at full release version.

As this project gains momentum and gets more contributors I am sure things will work much more fluidly.

@spolu
Copy link
Owner

spolu commented Jul 14, 2014

Hi guys, this will require packaging breach as .deb/.npm to install the sandbox SUID. That will come along the way indeed. Especially if someone wants to work on it :)

@rkyleg
Copy link

rkyleg commented Jul 20, 2014

confirming arkokoley's fix works on x64 Linux Mint 17

@spolu
Copy link
Owner

spolu commented Jul 21, 2014

Covered by addition of README in tarball and https://github.com/breach/breach_core/wiki/Running-Breach-on-Linux

@spolu spolu closed this as completed Jul 21, 2014
@Diel1024
Copy link

"--disable-setuid-sandbox" helped
As I see, the browser can update itself. Looks great! Now, we need AdBlock and Ghostery for it:D Let's deveplop

@shaikh-shahid
Copy link

@Benderwan
Copy link

Working fine on Elementary OS using ExoBrowser 32 bits

@heyjordn
Copy link

Copying the contents of breach_core/* to exo_browser/shell worked really well for me, posting this from Breach :D

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Projects
None yet
Development

No branches or pull requests