[GH-ISSUE #4081] Having blacklist violation for Dolphin #2529

Closed
opened 2026-05-05 09:12:21 -06:00 by gitea-mirror · 1 comment
Owner

Originally created by @CodeArtisan00 on GitHub (Mar 11, 2021).
Original GitHub issue: https://github.com/netblue30/firejail/issues/4081

name dolphin, exe kioslave5, syscall open64, path /proc/sys/kernel/core_pattern
name dolphin, exe baloo_filemetad, syscall stat, path /run/firejail/network
name dolphin, exe baloo_filemetad, syscall stat, path /run/firejail/bandwidth
name dolphin, exe baloo_filemetad, syscall stat, path /run/firejail/name
name dolphin, exe baloo_filemetad, syscall stat, path /run/firejail/profile
name dolphin, exe baloo_filemetad, syscall stat, path /run/firejail/x11
name dolphin, exe baloo_filemetad, syscall stat, path /run/firejail/dbus
name dolphin, exe baloo_filemetad, syscall stat, path /run/firejail/appimage
name dolphin, exe firejail, syscall stat, path /run/firejail/network
name dolphin, exe firejail, syscall stat, path /run/firejail/bandwidth
name dolphin, exe firejail, syscall stat, path /run/firejail/name
name dolphin, exe firejail, syscall stat, path /run/firejail/profile
name dolphin, exe firejail, syscall stat, path /run/firejail/x11
name dolphin, exe firejail, syscall stat, path /run/firejail/dbus
name dolphin, exe firejail, syscall stat, path /run/firejail/appimage
name dolphin, exe kate, syscall stat, path /run/firejail/network
name dolphin, exe kate, syscall stat, path /run/firejail/bandwidth
name dolphin, exe kate, syscall stat, path /run/firejail/name
name dolphin, exe kate, syscall stat, path /run/firejail/profile
name dolphin, exe kate, syscall stat, path /run/firejail/x11
name dolphin, exe kate, syscall stat, path /run/firejail/dbus
name dolphin, exe kate, syscall stat, path /run/firejail/appimage

Is this normal? or something is wrong with my system? btw, acess to dbus is allowed.

Originally created by @CodeArtisan00 on GitHub (Mar 11, 2021). Original GitHub issue: https://github.com/netblue30/firejail/issues/4081 ``` name dolphin, exe kioslave5, syscall open64, path /proc/sys/kernel/core_pattern name dolphin, exe baloo_filemetad, syscall stat, path /run/firejail/network name dolphin, exe baloo_filemetad, syscall stat, path /run/firejail/bandwidth name dolphin, exe baloo_filemetad, syscall stat, path /run/firejail/name name dolphin, exe baloo_filemetad, syscall stat, path /run/firejail/profile name dolphin, exe baloo_filemetad, syscall stat, path /run/firejail/x11 name dolphin, exe baloo_filemetad, syscall stat, path /run/firejail/dbus name dolphin, exe baloo_filemetad, syscall stat, path /run/firejail/appimage name dolphin, exe firejail, syscall stat, path /run/firejail/network name dolphin, exe firejail, syscall stat, path /run/firejail/bandwidth name dolphin, exe firejail, syscall stat, path /run/firejail/name name dolphin, exe firejail, syscall stat, path /run/firejail/profile name dolphin, exe firejail, syscall stat, path /run/firejail/x11 name dolphin, exe firejail, syscall stat, path /run/firejail/dbus name dolphin, exe firejail, syscall stat, path /run/firejail/appimage name dolphin, exe kate, syscall stat, path /run/firejail/network name dolphin, exe kate, syscall stat, path /run/firejail/bandwidth name dolphin, exe kate, syscall stat, path /run/firejail/name name dolphin, exe kate, syscall stat, path /run/firejail/profile name dolphin, exe kate, syscall stat, path /run/firejail/x11 name dolphin, exe kate, syscall stat, path /run/firejail/dbus name dolphin, exe kate, syscall stat, path /run/firejail/appimage ``` Is this normal? or something is wrong with my system? btw, acess to `dbus` is allowed.
Author
Owner

@rusty-snake commented on GitHub (Mar 11, 2021):

This blacklist is hardcoded:

$ firejail --noprofile ls -l /run/firejail
dr--------. root root … appimage
dr--------. root root … bandwidth
dr--------. root root … dbus
dr--------. root root … firejail.ro.dir
-r--------. root root … firejail.ro.file
-rw-------. root root … firejail-run.lock
drwxr-xr-x. root root … lib
drwxr-xr-x. root root … mnt
dr--------. root root … name
dr--------. root root … network
dr--------. root root … profile
dr--------. root root … x11

so if you run Dolphin in firejail with tracelog (both default firecfg/dolphin.profile) it's normal that those violations are logged when Dolphin tries to access these paths.

<!-- gh-comment-id:796998673 --> @rusty-snake commented on GitHub (Mar 11, 2021): This `blacklist` is hardcoded: ``` $ firejail --noprofile ls -l /run/firejail dr--------. root root … appimage dr--------. root root … bandwidth dr--------. root root … dbus dr--------. root root … firejail.ro.dir -r--------. root root … firejail.ro.file -rw-------. root root … firejail-run.lock drwxr-xr-x. root root … lib drwxr-xr-x. root root … mnt dr--------. root root … name dr--------. root root … network dr--------. root root … profile dr--------. root root … x11 ``` so if you run Dolphin in firejail with `tracelog` (both default firecfg/dolphin.profile) it's normal that those violations are logged when Dolphin tries to access these paths.
Sign in to join this conversation.
No milestone
No project
No assignees
1 participant
Notifications
Due date
The due date is invalid or out of range. Please use the format "yyyy-mm-dd".

No due date set.

Dependencies

No dependencies set.

Reference: github-starred/firejail#2529
No description provided.