[GH-ISSUE #3404] Teams doesn't start because of the apparmor profile #2139

Closed
opened 2026-05-05 08:49:00 -06:00 by gitea-mirror · 1 comment
Owner

Originally created by @mjhkqprt51 on GitHub (May 4, 2020).
Original GitHub issue: https://github.com/netblue30/firejail/issues/3404

Hi,

I tried to start Teams (installed from MS's apt mirror) but it didn't work using the firecfg/firejail link.

$ teams
Reading profile /usr/local/etc/firejail/teams.profile
Reading profile /usr/local/etc/firejail/disable-devel.inc
Reading profile /usr/local/etc/firejail/disable-exec.inc
Reading profile /usr/local/etc/firejail/disable-interpreters.inc
Reading profile /usr/local/etc/firejail/whitelist-common.inc
Reading profile /usr/local/etc/firejail/whitelist-var-common.inc
Reading profile /usr/local/etc/firejail/electron.profile
Reading profile /usr/local/etc/firejail/disable-common.inc
Reading profile /usr/local/etc/firejail/disable-passwdmgr.inc
Reading profile /usr/local/etc/firejail/disable-programs.inc
Parent pid 82964, child pid 82965
Warning: cleaning all supplementary groups
Warning: cleaning all supplementary groups
Warning: cleaning all supplementary groups
Warning: not remounting /run/user/1001/gvfs
Warning: not remounting /run/user/1001/doc
Warning: cleaning all supplementary groups
Blacklist violations are logged to syslog
Child process initialized in 145.25 ms

Apparmor denial message was:
[ 2531.840022] audit: type=1400 audit(1588598895.892:135): apparmor="DENIED" operation="exec" profile="firejail-default" name="/usr/share/teams/teams" pid=81129 comm="nohup" requested_mask="x" denied_mask="x" fsuid=1001 ouid=0

aa-logprof suggested that "/usr/share/teams/teams mrix," should be added to the profile. I allowed it and Teams works now correctly however I don't know if it is a good modification.

Tanks.

Originally created by @mjhkqprt51 on GitHub (May 4, 2020). Original GitHub issue: https://github.com/netblue30/firejail/issues/3404 Hi, I tried to start Teams (installed from MS's apt mirror) but it didn't work using the firecfg/firejail link. $ teams Reading profile /usr/local/etc/firejail/teams.profile Reading profile /usr/local/etc/firejail/disable-devel.inc Reading profile /usr/local/etc/firejail/disable-exec.inc Reading profile /usr/local/etc/firejail/disable-interpreters.inc Reading profile /usr/local/etc/firejail/whitelist-common.inc Reading profile /usr/local/etc/firejail/whitelist-var-common.inc Reading profile /usr/local/etc/firejail/electron.profile Reading profile /usr/local/etc/firejail/disable-common.inc Reading profile /usr/local/etc/firejail/disable-passwdmgr.inc Reading profile /usr/local/etc/firejail/disable-programs.inc Parent pid 82964, child pid 82965 Warning: cleaning all supplementary groups Warning: cleaning all supplementary groups Warning: cleaning all supplementary groups Warning: not remounting /run/user/1001/gvfs Warning: not remounting /run/user/1001/doc Warning: cleaning all supplementary groups Blacklist violations are logged to syslog Child process initialized in 145.25 ms Apparmor denial message was: [ 2531.840022] audit: type=1400 audit(1588598895.892:135): apparmor="DENIED" operation="exec" profile="firejail-default" name="/usr/share/teams/teams" pid=81129 comm="nohup" requested_mask="x" denied_mask="x" fsuid=1001 ouid=0 aa-logprof suggested that "/usr/share/teams/teams mrix," should be added to the profile. I allowed it and Teams works now correctly however I don't know if it is a good modification. Tanks.
Author
Owner

@mjhkqprt51 commented on GitHub (May 4, 2020):

firejail version 0.9.63

Compile time support:
- AppArmor support is enabled
- AppImage support is enabled
- chroot support is enabled
- file and directory whitelisting support is enabled
- file transfer support is enabled
- firetunnel support is enabled
- networking support is enabled
- overlayfs support is enabled
- private-home support is enabled
- seccomp-bpf support is enabled
- SELinux support is disabled
- user namespace support is enabled
- X11 sandboxing support is enabled

<!-- gh-comment-id:623494359 --> @mjhkqprt51 commented on GitHub (May 4, 2020): firejail version 0.9.63 Compile time support: - AppArmor support is enabled - AppImage support is enabled - chroot support is enabled - file and directory whitelisting support is enabled - file transfer support is enabled - firetunnel support is enabled - networking support is enabled - overlayfs support is enabled - private-home support is enabled - seccomp-bpf support is enabled - SELinux support is disabled - user namespace support is enabled - X11 sandboxing support is enabled
Sign in to join this conversation.
No milestone
No project
No assignees
1 participant
Notifications
Due date
The due date is invalid or out of range. Please use the format "yyyy-mm-dd".

No due date set.

Dependencies

No dependencies set.

Reference: github-starred/firejail#2139
No description provided.