[PR #1424] [MERGED] Apparmor: update whitelist path for kde #3955

Closed
opened 2026-05-05 10:11:03 -06:00 by gitea-mirror · 0 comments
Owner

📋 Pull Request Information

Original PR: https://github.com/netblue30/firejail/pull/1424
Author: @ghost
Created: 8/2/2017
Status: Merged
Merged: 8/2/2017
Merged by: @startx2017

Base: masterHead: VladimirSchowalter20-apparmor-kde-fix


📝 Commits (1)

  • 36f64c2 Apparmor: update whitelist path for kde

📊 Changes

1 file changed (+2 additions, -0 deletions)

View changed files

📝 etc/firejail-default (+2 -0)

📄 Description

This adds some additional whitelist paths in /run/user dir used by KDE plasma environment in file dialogs and inter-connectivity between apps. Those were detected by audit system logs.

AVC apparmor="ALLOWED" operation="mknod" profile="firejail-default" name="/run/user/1000/kmozillahelperBCjd35.1.slave-socket" pid=21758 comm="kmozillahelper" requested_mask="c" denied_mask="c" fsuid=1000 ouid=1000
AVC apparmor="ALLOWED" operation="open" profile="firejail-default" name="/run/user/1000/kmozillahelperBCjd35.1.slave-socket" pid=21758 comm="kmozillahelper" requested_mask="wc" denied_mask="wc" fsuid=1000 ouid=1000
AVC apparmor="ALLOWED" operation="unlink" profile="firejail-default" name="/run/user/1000/kmozillahelperBCjd35.1.slave-socket" pid=21758 comm="kmozillahelper" requested_mask="d" denied_mask="d" fsuid=1000 ouid=1000
AVC apparmor="ALLOWED" operation="mknod" profile="firejail-default" name="/run/user/1000/kmozillahelperBCjd35.1.slave-socket" pid=21758 comm="kmozillahelper" requested_mask="c" denied_mask="c" fsuid=1000 ouid=1000
AVC apparmor="ALLOWED" operation="unlink" profile="firejail-default" name="/run/user/1000/kmozillahelperBCjd35.1.slave-socket" pid=21758 comm="kmozillahelper" requested_mask="d" denied_mask="d" fsuid=1000 ouid=1000
AVC apparmor="ALLOWED" operation="mknod" profile="firejail-default" name="/run/user/1000/kmozillahelperZKPE35.2.slave-socket" pid=21758 comm="kmozillahelper" requested_mask="c" denied_mask="c" fsuid=1000 ouid=1000
AVC apparmor="ALLOWED" operation="open" profile="firejail-default" name="/run/user/1000/kmozillahelperZKPE35.2.slave-socket" pid=21758 comm="kmozillahelper" requested_mask="wc" denied_mask="wc" fsuid=1000 ouid=1000
AVC apparmor="ALLOWED" operation="unlink" profile="firejail-default" name="/run/user/1000/kmozillahelperZKPE35.2.slave-socket" pid=21758 comm="kmozillahelper" requested_mask="d" denied_mask="d" fsuid=1000 ouid=1000
AVC apparmor="ALLOWED" operation="mknod" profile="firejail-default" name="/run/user/1000/kmozillahelperZKPE35.2.slave-socket" pid=21758 comm="kmozillahelper" requested_mask="c" denied_mask="c" fsuid=1000 ouid=1000
AVC apparmor="ALLOWED" operation="unlink" profile="firejail-default" name="/run/user/1000/kmozillahelperZKPE35.2.slave-socket" pid=21758 comm="kmozillahelper" requested_mask="d" denied_mask="d" fsuid=1000 ouid=1000
AVC apparmor="ALLOWED" operation="mknod" profile="firejail-default" name="/run/user/1000/gwenviewWyJHf8.1.slave-socket" pid=22058 comm="gwenview" requested_mask="c" denied_mask="c" fsuid=1000 ouid=1000
AVC apparmor="ALLOWED" operation="open" profile="firejail-default" name="/run/user/1000/gwenviewWyJHf8.1.slave-socket" pid=22058 comm="gwenview" requested_mask="wc" denied_mask="wc" fsuid=1000 ouid=1000
AVC apparmor="ALLOWED" operation="unlink" profile="firejail-default" name="/run/user/1000/gwenviewWyJHf8.1.slave-socket" pid=22058 comm="gwenview" requested_mask="d" denied_mask="d" fsuid=1000 ouid=1000
AVC apparmor="ALLOWED" operation="mknod" profile="firejail-default" name="/run/user/1000/gwenviewWyJHf8.1.slave-socket" pid=22058 comm="gwenview" requested_mask="c" denied_mask="c" fsuid=1000 ouid=1000
AVC apparmor="ALLOWED" operation="unlink" profile="firejail-default" name="/run/user/1000/gwenviewWyJHf8.1.slave-socket" pid=22058 comm="gwenview" requested_mask="d" denied_mask="d" fsuid=1000 ouid=1000
AVC apparmor="ALLOWED" operation="mknod" profile="firejail-default" name="/run/user/1000/orcexec.K1Crnp" pid=22522 comm="gst-plugin-scan" requested_mask="c" denied_mask="c" fsuid=1000 ouid=1000
AVC apparmor="ALLOWED" operation="open" profile="firejail-default" name="/run/user/1000/orcexec.K1Crnp" pid=22522 comm="gst-plugin-scan" requested_mask="wc" denied_mask="wc" fsuid=1000 ouid=1000
AVC apparmor="ALLOWED" operation="unlink" profile="firejail-default" name="/run/user/1000/orcexec.K1Crnp" pid=22522 comm="gst-plugin-scan" requested_mask="d" denied_mask="d" fsuid=1000 ouid=1000
AVC apparmor="ALLOWED" operation="truncate" profile="firejail-default" name="/run/user/1000/orcexec.K1Crnp" pid=22522 comm="gst-plugin-scan" requested_mask="w" denied_mask="w" fsuid=1000 ouid=1000
AVC apparmor="ALLOWED" operation="file_mmap" profile="firejail-default" name="/run/user/1000/orcexec.K1Crnp" pid=22522 comm="gst-plugin-scan" requested_mask="m" denied_mask="m" fsuid=1000 ouid=1000
AVC apparmor="ALLOWED" operation="mknod" profile="firejail-default" name="/run/user/1000/orcexec.4wErww" pid=22522 comm="gst-plugin-scan" requested_mask="c" denied_mask="c" fsuid=1000 ouid=1000
AVC apparmor="ALLOWED" operation="open" profile="firejail-default" name="/run/user/1000/orcexec.4wErww" pid=22522 comm="gst-plugin-scan" requested_mask="wc" denied_mask="wc" fsuid=1000 ouid=1000
AVC apparmor="ALLOWED" operation="unlink" profile="firejail-default" name="/run/user/1000/orcexec.4wErww" pid=22522 comm="gst-plugin-scan" requested_mask="d" denied_mask="d" fsuid=1000 ouid=1000
AVC apparmor="ALLOWED" operation="truncate" profile="firejail-default" name="/run/user/1000/orcexec.4wErww" pid=22522 comm="gst-plugin-scan" requested_mask="w" denied_mask="w" fsuid=1000 ouid=1000
AVC apparmor="ALLOWED" operation="file_mmap" profile="firejail-default" name="/run/user/1000/orcexec.4wErww" pid=22522 comm="gst-plugin-scan" requested_mask="m" denied_mask="m" fsuid=1000 ouid=1000
AVC apparmor="ALLOWED" operation="mknod" profile="firejail-default" name="/run/user/1000/orcexec.fDmjzY" pid=22424 comm="queue0:src" requested_mask="c" denied_mask="c" fsuid=1000 ouid=1000
AVC apparmor="ALLOWED" operation="open" profile="firejail-default" name="/run/user/1000/orcexec.fDmjzY" pid=22424 comm="queue0:src" requested_mask="wc" denied_mask="wc" fsuid=1000 ouid=1000
AVC apparmor="ALLOWED" operation="unlink" profile="firejail-default" name="/run/user/1000/orcexec.fDmjzY" pid=22424 comm="queue0:src" requested_mask="d" denied_mask="d" fsuid=1000 ouid=1000
AVC apparmor="ALLOWED" operation="truncate" profile="firejail-default" name="/run/user/1000/orcexec.fDmjzY" pid=22424 comm="queue0:src" requested_mask="w" denied_mask="w" fsuid=1000 ouid=1000
AVC apparmor="ALLOWED" operation="file_mmap" profile="firejail-default" name="/run/user/1000/orcexec.fDmjzY" pid=22424 comm="queue0:src" requested_mask="m" denied_mask="m" fsuid=1000 ouid=1000

🔄 This issue represents a GitHub Pull Request. It cannot be merged through Gitea due to API limitations.

## 📋 Pull Request Information **Original PR:** https://github.com/netblue30/firejail/pull/1424 **Author:** [@ghost](https://github.com/ghost) **Created:** 8/2/2017 **Status:** ✅ Merged **Merged:** 8/2/2017 **Merged by:** [@startx2017](https://github.com/startx2017) **Base:** `master` ← **Head:** `VladimirSchowalter20-apparmor-kde-fix` --- ### 📝 Commits (1) - [`36f64c2`](https://github.com/netblue30/firejail/commit/36f64c2aeada9f73f9f313244272255ae38eccc0) Apparmor: update whitelist path for kde ### 📊 Changes **1 file changed** (+2 additions, -0 deletions) <details> <summary>View changed files</summary> 📝 `etc/firejail-default` (+2 -0) </details> ### 📄 Description This adds some additional whitelist paths in `/run/user` dir used by KDE plasma environment in file dialogs and inter-connectivity between apps. Those were detected by audit system logs. ``` AVC apparmor="ALLOWED" operation="mknod" profile="firejail-default" name="/run/user/1000/kmozillahelperBCjd35.1.slave-socket" pid=21758 comm="kmozillahelper" requested_mask="c" denied_mask="c" fsuid=1000 ouid=1000 AVC apparmor="ALLOWED" operation="open" profile="firejail-default" name="/run/user/1000/kmozillahelperBCjd35.1.slave-socket" pid=21758 comm="kmozillahelper" requested_mask="wc" denied_mask="wc" fsuid=1000 ouid=1000 AVC apparmor="ALLOWED" operation="unlink" profile="firejail-default" name="/run/user/1000/kmozillahelperBCjd35.1.slave-socket" pid=21758 comm="kmozillahelper" requested_mask="d" denied_mask="d" fsuid=1000 ouid=1000 AVC apparmor="ALLOWED" operation="mknod" profile="firejail-default" name="/run/user/1000/kmozillahelperBCjd35.1.slave-socket" pid=21758 comm="kmozillahelper" requested_mask="c" denied_mask="c" fsuid=1000 ouid=1000 AVC apparmor="ALLOWED" operation="unlink" profile="firejail-default" name="/run/user/1000/kmozillahelperBCjd35.1.slave-socket" pid=21758 comm="kmozillahelper" requested_mask="d" denied_mask="d" fsuid=1000 ouid=1000 AVC apparmor="ALLOWED" operation="mknod" profile="firejail-default" name="/run/user/1000/kmozillahelperZKPE35.2.slave-socket" pid=21758 comm="kmozillahelper" requested_mask="c" denied_mask="c" fsuid=1000 ouid=1000 AVC apparmor="ALLOWED" operation="open" profile="firejail-default" name="/run/user/1000/kmozillahelperZKPE35.2.slave-socket" pid=21758 comm="kmozillahelper" requested_mask="wc" denied_mask="wc" fsuid=1000 ouid=1000 AVC apparmor="ALLOWED" operation="unlink" profile="firejail-default" name="/run/user/1000/kmozillahelperZKPE35.2.slave-socket" pid=21758 comm="kmozillahelper" requested_mask="d" denied_mask="d" fsuid=1000 ouid=1000 AVC apparmor="ALLOWED" operation="mknod" profile="firejail-default" name="/run/user/1000/kmozillahelperZKPE35.2.slave-socket" pid=21758 comm="kmozillahelper" requested_mask="c" denied_mask="c" fsuid=1000 ouid=1000 AVC apparmor="ALLOWED" operation="unlink" profile="firejail-default" name="/run/user/1000/kmozillahelperZKPE35.2.slave-socket" pid=21758 comm="kmozillahelper" requested_mask="d" denied_mask="d" fsuid=1000 ouid=1000 AVC apparmor="ALLOWED" operation="mknod" profile="firejail-default" name="/run/user/1000/gwenviewWyJHf8.1.slave-socket" pid=22058 comm="gwenview" requested_mask="c" denied_mask="c" fsuid=1000 ouid=1000 AVC apparmor="ALLOWED" operation="open" profile="firejail-default" name="/run/user/1000/gwenviewWyJHf8.1.slave-socket" pid=22058 comm="gwenview" requested_mask="wc" denied_mask="wc" fsuid=1000 ouid=1000 AVC apparmor="ALLOWED" operation="unlink" profile="firejail-default" name="/run/user/1000/gwenviewWyJHf8.1.slave-socket" pid=22058 comm="gwenview" requested_mask="d" denied_mask="d" fsuid=1000 ouid=1000 AVC apparmor="ALLOWED" operation="mknod" profile="firejail-default" name="/run/user/1000/gwenviewWyJHf8.1.slave-socket" pid=22058 comm="gwenview" requested_mask="c" denied_mask="c" fsuid=1000 ouid=1000 AVC apparmor="ALLOWED" operation="unlink" profile="firejail-default" name="/run/user/1000/gwenviewWyJHf8.1.slave-socket" pid=22058 comm="gwenview" requested_mask="d" denied_mask="d" fsuid=1000 ouid=1000 AVC apparmor="ALLOWED" operation="mknod" profile="firejail-default" name="/run/user/1000/orcexec.K1Crnp" pid=22522 comm="gst-plugin-scan" requested_mask="c" denied_mask="c" fsuid=1000 ouid=1000 AVC apparmor="ALLOWED" operation="open" profile="firejail-default" name="/run/user/1000/orcexec.K1Crnp" pid=22522 comm="gst-plugin-scan" requested_mask="wc" denied_mask="wc" fsuid=1000 ouid=1000 AVC apparmor="ALLOWED" operation="unlink" profile="firejail-default" name="/run/user/1000/orcexec.K1Crnp" pid=22522 comm="gst-plugin-scan" requested_mask="d" denied_mask="d" fsuid=1000 ouid=1000 AVC apparmor="ALLOWED" operation="truncate" profile="firejail-default" name="/run/user/1000/orcexec.K1Crnp" pid=22522 comm="gst-plugin-scan" requested_mask="w" denied_mask="w" fsuid=1000 ouid=1000 AVC apparmor="ALLOWED" operation="file_mmap" profile="firejail-default" name="/run/user/1000/orcexec.K1Crnp" pid=22522 comm="gst-plugin-scan" requested_mask="m" denied_mask="m" fsuid=1000 ouid=1000 AVC apparmor="ALLOWED" operation="mknod" profile="firejail-default" name="/run/user/1000/orcexec.4wErww" pid=22522 comm="gst-plugin-scan" requested_mask="c" denied_mask="c" fsuid=1000 ouid=1000 AVC apparmor="ALLOWED" operation="open" profile="firejail-default" name="/run/user/1000/orcexec.4wErww" pid=22522 comm="gst-plugin-scan" requested_mask="wc" denied_mask="wc" fsuid=1000 ouid=1000 AVC apparmor="ALLOWED" operation="unlink" profile="firejail-default" name="/run/user/1000/orcexec.4wErww" pid=22522 comm="gst-plugin-scan" requested_mask="d" denied_mask="d" fsuid=1000 ouid=1000 AVC apparmor="ALLOWED" operation="truncate" profile="firejail-default" name="/run/user/1000/orcexec.4wErww" pid=22522 comm="gst-plugin-scan" requested_mask="w" denied_mask="w" fsuid=1000 ouid=1000 AVC apparmor="ALLOWED" operation="file_mmap" profile="firejail-default" name="/run/user/1000/orcexec.4wErww" pid=22522 comm="gst-plugin-scan" requested_mask="m" denied_mask="m" fsuid=1000 ouid=1000 AVC apparmor="ALLOWED" operation="mknod" profile="firejail-default" name="/run/user/1000/orcexec.fDmjzY" pid=22424 comm="queue0:src" requested_mask="c" denied_mask="c" fsuid=1000 ouid=1000 AVC apparmor="ALLOWED" operation="open" profile="firejail-default" name="/run/user/1000/orcexec.fDmjzY" pid=22424 comm="queue0:src" requested_mask="wc" denied_mask="wc" fsuid=1000 ouid=1000 AVC apparmor="ALLOWED" operation="unlink" profile="firejail-default" name="/run/user/1000/orcexec.fDmjzY" pid=22424 comm="queue0:src" requested_mask="d" denied_mask="d" fsuid=1000 ouid=1000 AVC apparmor="ALLOWED" operation="truncate" profile="firejail-default" name="/run/user/1000/orcexec.fDmjzY" pid=22424 comm="queue0:src" requested_mask="w" denied_mask="w" fsuid=1000 ouid=1000 AVC apparmor="ALLOWED" operation="file_mmap" profile="firejail-default" name="/run/user/1000/orcexec.fDmjzY" pid=22424 comm="queue0:src" requested_mask="m" denied_mask="m" fsuid=1000 ouid=1000 ``` --- <sub>🔄 This issue represents a GitHub Pull Request. It cannot be merged through Gitea due to API limitations.</sub>
gitea-mirror 2026-05-05 10:11:03 -06:00
Sign in to join this conversation.
No milestone
No project
No assignees
1 participant
Notifications
Due date
The due date is invalid or out of range. Please use the format "yyyy-mm-dd".

No due date set.

Dependencies

No dependencies set.

Reference: github-starred/firejail#3955
No description provided.