|
Bugzilla – Full Text Bug Listing |
| Summary: | Widevine broken in Tumbleweed 20210921 (affects chrome,chromenium,firefox,opera, teams and more) | ||
|---|---|---|---|
| Product: | [openSUSE] openSUSE Tumbleweed | Reporter: | Vidar Haugsvær <vidar.haugsvar> |
| Component: | Basesystem | Assignee: | Wolfgang Rosenauer <wolfgang> |
| Status: | RESOLVED FIXED | QA Contact: | E-mail List <qa-bugs> |
| Severity: | Major | ||
| Priority: | P5 - None | CC: | davejplater, javispedro, martin.jedamzik, Michael.Zapf, miso, munix9, PVince81, robby.engelmann, suse.portal.2021, tux93, vliaskovitis |
| Version: | Current | ||
| Target Milestone: | --- | ||
| Hardware: | x86-64 | ||
| OS: | openSUSE Tumbleweed | ||
| Whiteboard: | |||
| Found By: | --- | Services Priority: | |
| Business Priority: | Blocker: | --- | |
| Marketing QA Status: | --- | IT Deployment: | --- |
|
Description
Vidar Haugsvær
2021-09-24 05:56:29 UTC
Workaround is to launch Firefox with MOZ_DISABLE_GMP_SANDBOX=1 Confirmed here as well, and workaround works. The strange thing is that I tired to use snapper to rollback to the version I had before the zypper dup, but the widevine issue was still there. So not sure if that part is really part of the OS / main system or if it's in user-space and got upgraded in some way to a broken version. Can confirm this issue too. *** Bug 1190863 has been marked as a duplicate of this bug. *** Crashes here, too. The Widevine plugin works in the original Firefox 92 from mozilla.org. Sandbox: attempt to open unexpected file /usr/lib64/firefox/libdl.so.2 Sandbox: attempt to open unexpected file /lib64/libdl.so.2 Sandbox: attempt to open unexpected file /lib64/glibc-hwcaps/x86-64-v3/libdl.so.2 Sandbox: seccomp sandbox violation: pid 7594, tid 7594, syscall 262, args 4294967196 140726849351856 140726849352032 0 4294967295 140726849351856. Sandbox: attempt to open unexpected file /lib64/glibc-hwcaps/x86-64-v2/libdl.so.2 Sandbox: seccomp sandbox violation: pid 7594, tid 7594, syscall 262, args 4294967196 140726849351856 140726849352032 0 4294967295 140726849351856. Sandbox: attempt to open unexpected file /lib64/tls/haswell/x86_64/libdl.so.2 Sandbox: seccomp sandbox violation: pid 7594, tid 7594, syscall 262, args 4294967196 140726849351856 140726849352032 0 4294967295 140726849351856. Sandbox: attempt to open unexpected file /lib64/tls/haswell/libdl.so.2 Sandbox: seccomp sandbox violation: pid 7594, tid 7594, syscall 262, args 4294967196 140726849351856 140726849352032 0 4294967295 140726849351856. Sandbox: attempt to open unexpected file /lib64/tls/x86_64/libdl.so.2 Sandbox: seccomp sandbox violation: pid 7594, tid 7594, syscall 262, args 4294967196 140726849351856 140726849352032 0 4294967295 140726849351856. Sandbox: attempt to open unexpected file /lib64/tls/libdl.so.2 Sandbox: seccomp sandbox violation: pid 7594, tid 7594, syscall 262, args 4294967196 140726849351856 140726849352032 0 4294967295 140726849351856. Sandbox: attempt to open unexpected file /lib64/haswell/x86_64/libdl.so.2 Sandbox: seccomp sandbox violation: pid 7594, tid 7594, syscall 262, args 4294967196 140726849351856 140726849352032 0 4294967295 140726849351856. Sandbox: attempt to open unexpected file /lib64/haswell/libdl.so.2 Sandbox: seccomp sandbox violation: pid 7594, tid 7594, syscall 262, args 4294967196 140726849351856 140726849352032 0 4294967295 140726849351856. Sandbox: attempt to open unexpected file /lib64/x86_64/libdl.so.2 Sandbox: seccomp sandbox violation: pid 7594, tid 7594, syscall 262, args 4294967196 140726849351856 140726849352032 0 4294967295 140726849351856. Sandbox: attempt to open unexpected file /lib64/libdl.so.2 Sandbox: seccomp sandbox violation: pid 7594, tid 7594, syscall 262, args 4294967196 140726849351856 140726849352032 0 4294967295 140726849351856. Sandbox: attempt to open unexpected file /usr/lib64/glibc-hwcaps/x86-64-v3/libdl.so.2 Sandbox: seccomp sandbox violation: pid 7594, tid 7594, syscall 262, args 4294967196 140726849351856 140726849352032 0 4294967295 140726849351856. Sandbox: attempt to open unexpected file /usr/lib64/glibc-hwcaps/x86-64-v2/libdl.so.2 Sandbox: seccomp sandbox violation: pid 7594, tid 7594, syscall 262, args 4294967196 140726849351856 140726849352032 0 4294967295 140726849351856. Sandbox: attempt to open unexpected file /usr/lib64/tls/haswell/x86_64/libdl.so.2 Sandbox: seccomp sandbox violation: pid 7594, tid 7594, syscall 262, args 4294967196 140726849351856 140726849352032 0 4294967295 140726849351856. Sandbox: attempt to open unexpected file /usr/lib64/tls/haswell/libdl.so.2 Sandbox: seccomp sandbox violation: pid 7594, tid 7594, syscall 262, args 4294967196 140726849351856 140726849352032 0 4294967295 140726849351856. Sandbox: attempt to open unexpected file /usr/lib64/tls/x86_64/libdl.so.2 Sandbox: seccomp sandbox violation: pid 7594, tid 7594, syscall 262, args 4294967196 140726849351856 140726849352032 0 4294967295 140726849351856. Sandbox: attempt to open unexpected file /usr/lib64/tls/libdl.so.2 Sandbox: seccomp sandbox violation: pid 7594, tid 7594, syscall 262, args 4294967196 140726849351856 140726849352032 0 4294967295 140726849351856. Sandbox: attempt to open unexpected file /usr/lib64/haswell/x86_64/libdl.so.2 Sandbox: seccomp sandbox violation: pid 7594, tid 7594, syscall 262, args 4294967196 140726849351856 140726849352032 0 4294967295 140726849351856. Sandbox: attempt to open unexpected file /usr/lib64/haswell/libdl.so.2 Sandbox: seccomp sandbox violation: pid 7594, tid 7594, syscall 262, args 4294967196 140726849351856 140726849352032 0 4294967295 140726849351856. Sandbox: attempt to open unexpected file /usr/lib64/x86_64/libdl.so.2 Sandbox: seccomp sandbox violation: pid 7594, tid 7594, syscall 262, args 4294967196 140726849351856 140726849352032 0 4294967295 140726849351856. Sandbox: attempt to open unexpected file /usr/lib64/libdl.so.2 Sandbox: seccomp sandbox violation: pid 7594, tid 7594, syscall 262, args 4294967196 140726849351856 140726849352032 0 4294967295 140726849351856. ###!!! [Parent][MessageChannel::Call] Error: Channel error: cannot send/recv Hi Wolfgang, would you please take a look at this issue? I'm really not sure whether it is correct to assign it to you, please feel free to reassign whenever necessary, thanks. We obviously cannot fix widevine as it's a closed component. I'm a bit surprised that within upstream firefox it is reported to work on the same glibc. The only workaround we would have is to add MOZ_DISABLE_GMP_SANDBOX for TW which at the same time is something I'm not happy about. Or just allow newfstatat (syscall 262) in the seccomp filter, which Firefox upstream is likely to do sooner or later anyway. This is why I don't like syscall whitelists. Literally my number #1 source of issues on rolling distros. Actually found an upstream hint and going to provide an updated build to test. Firefox 92.0.1 builds updated in the mozilla project. You can test packages from here: http://download.opensuse.org/repositories/mozilla/ Thanks a lot! Works for me, MozillaFirefox-92.0.1-5.1.x86_64.rpm . Mozilla upstream bug URL: https://bugzilla.mozilla.org/show_bug.cgi?id=1725828 Thanks for the feedback. Since Firefox 93 will be released next week I will not push the fixed version to Tumbleweed right now. A FF release to TW takes a few days and would arrive only after the upstream FF93 release. I am not entirely sure this will end up in 93, I'll ping if it's still broken :) As for the other packages mentioned in this report (teams, discord, etc.), I don't think think there's anything that can be done. However, I use Teams and I don't see widevine being used? Maybe it's just for the live events? It's not fixed in 93 but I'll obviously carry over the patch. Thanks for the update on firefox. google-chrome can be started with --no-sandbox to avoid the problem. That also applies to discord and microsoft teams google-chrome-stable version 94.0.4606.61 doesn't have the problem. *** Bug 1191243 has been marked as a duplicate of this bug. *** MOZ_DISABLE_GMP_SANDBOX=1 inserted into /usr/bin/firefox didn't work for me but the patched firefox from mozilla/firefox92 does work. export MOZ_DISABLE_GMP_SANDBOX=1 in .bashrc works for me. released |