netblue30 / firejail

Linux namespaces and seccomp-bpf sandbox
https://firejail.wordpress.com
GNU General Public License v2.0
5.72k stars 560 forks source link

Akondai issues #3384

Closed ghost closed 4 years ago

ghost commented 4 years ago

Describe the bug blacklist violation - sandbox 6043, exe akonadi_control, syscall open64, path /proc/sys/kernel/core_pattern.

May be a false positive from a upstream akonadi bug, I'm not sure. All I know is akonadi was working recently (last week) up until I added firejail and apparmor to my system.

Behavior change on disabling firejail It still fails now but doesn't note the error related to the blacklist.

Parent pid 6566, child pid 6567
Child process initialized in 2.18 ms
org.kde.pim.akonadictl: Starting Akonadi Server...
Warning: an existing sandbox was detected. /usr/bin/akonadi_control will run without any additional sandboxing features
org.kde.pim.akonadicontrol: Service org.freedesktop.Akonadi.Control.lock already registered, terminating now.
Error: akonadi_control was started but didn't register at D-Bus session bus.
Make sure your system is set up correctly!

Parent is shutting down, bye...

To Reproduce Steps to reproduce the behavior:

  1. In arch linux terminal
  2. akonadictl start
  3. Gives output shown below for debug
  4. Audit logs show: blacklist violation - sandbox 6043, exe akonadi_control, syscall open64, path /proc/sys/kernel/core_pattern

Expected behavior Akonadi should start, allowing the use of kdepim and other features of the Akonadi sever.

Desktop (please complete the following information):

Additional context Akonadi plugs into many kde applications such as pim, which the lack of akonadi outright breaks preventing the use of such applications.

Checklist

debug output ``` [sn@usona ~]$ firejail --debug akonadictl start Autoselecting /bin/bash as shell Building quoted command line: 'akonadictl' 'start' Command name #akonadictl# Attempting to find default.profile... Found default.profile profile in /etc/firejail directory Reading profile /etc/firejail/default.profile Found globals.local profile in /etc/firejail directory Found disable-common.inc profile in /etc/firejail directory Reading profile /etc/firejail/disable-common.inc Found disable-passwdmgr.inc profile in /etc/firejail directory Reading profile /etc/firejail/disable-passwdmgr.inc Found disable-programs.inc profile in /etc/firejail directory Reading profile /etc/firejail/disable-programs.inc ** Note: you can use --noprofile to disable default.profile ** DISPLAY=:0 parsed as 0 Using the local network stack Parent pid 6098, child pid 6099 Initializing child process Host network configured PID namespace installed Mounting tmpfs on /run/firejail/mnt directory Creating empty /run/firejail/mnt/seccomp directory Creating empty /run/firejail/mnt/seccomp/seccomp.protocol file Creating empty /run/firejail/mnt/seccomp/seccomp.postexec file Build protocol filter: unix,inet,inet6 sbox run: /run/firejail/lib/fseccomp protocol build unix,inet,inet6 /run/firejail/mnt/seccomp/seccomp.protocol (null) Dropping all capabilities Drop privileges: pid 2, uid 1000, gid 985, nogroups 1 No supplementary groups Mounting /proc filesystem representing the PID namespace Basic read-only filesystem: Mounting read-only /etc Mounting noexec /etc Mounting read-only /var Mounting noexec /var Mounting read-only /bin Mounting read-only /lib Mounting read-only /usr Mounting tmpfs on /var/lock Mounting tmpfs on /var/tmp Mounting tmpfs on /var/log Create the new utmp file Mount the new utmp file Cleaning /home directory Cleaning /run/user directory Sanitizing /etc/passwd, UID_MIN 1000 Sanitizing /etc/group, GID_MIN 1000 Disable /run/firejail/network Disable /run/firejail/bandwidth Disable /run/firejail/name Disable /run/firejail/profile Disable /run/firejail/x11 Mounting read-only /proc/sys Remounting /sys directory Disable /sys/firmware Disable /sys/hypervisor Disable /sys/power Disable /sys/kernel/debug Disable /sys/kernel/vmcoreinfo Disable /proc/sys/fs/binfmt_misc Disable /proc/sys/kernel/core_pattern Disable /proc/sys/kernel/modprobe Disable /proc/sysrq-trigger Disable /proc/sys/vm/panic_on_oom Disable /proc/irq Disable /proc/bus Disable /proc/sched_debug Disable /proc/timer_list Disable /proc/kcore Disable /proc/kallsyms Disable /usr/lib/modules (requested /lib/modules) Disable /boot Disable /dev/port Disable /run/user/1000/gnupg Disable /run/user/1000/systemd Disable /dev/kmsg Disable /proc/kmsg Disable /home/sn/.local/share/Trash Disable /home/sn/.bash_history Disable /home/sn/.local/share/klipper Disable /home/sn/.config/autostart Disable /home/sn/.config/autostart-scripts Disable /home/sn/.config/plasma-workspace Disable /home/sn/.xinitrc Disable /etc/xdg/autostart Mounting read-only /home/sn/.Xauthority 1419 1394 254:1 /sn/.Xauthority /home/sn/.Xauthority ro,relatime master:71 - ext4 /dev/mapper/lvm2-home rw mountid=1419 fsname=/sn/.Xauthority dir=/home/sn/.Xauthority fstype=ext4 Disable /home/sn/.config/khotkeysrc Disable /home/sn/.config/krunnerrc Disable /home/sn/.config/kscreenlockerrc Disable /home/sn/.config/kwinrc Disable /home/sn/.config/kwinrulesrc Disable /home/sn/.config/plasma-org.kde.plasma.desktop-appletsrc Disable /home/sn/.config/plasmashellrc Disable /home/sn/.local/share/plasma Mounting read-only /home/sn/.cache/ksycoca5_en_VPHqfLDvBCh8ANjys4aZFRZwQfI= 1428 1394 254:1 /sn/.cache/ksycoca5_en_VPHqfLDvBCh8ANjys4aZFRZwQfI= /home/sn/.cache/ksycoca5_en_VPHqfLDvBCh8ANjys4aZFRZwQfI= ro,relatime master:71 - ext4 /dev/mapper/lvm2-home rw mountid=1428 fsname=/sn/.cache/ksycoca5_en_VPHqfLDvBCh8ANjys4aZFRZwQfI= dir=/home/sn/.cache/ksycoca5_en_VPHqfLDvBCh8ANjys4aZFRZwQfI= fstype=ext4 Mounting read-only /home/sn/.cache/ksycoca5_en-CA_FofG+nQjtWQADcRDPfJkZrb7HUs= 1429 1394 254:1 /sn/.cache/ksycoca5_en-CA_FofG+nQjtWQADcRDPfJkZrb7HUs= /home/sn/.cache/ksycoca5_en-CA_FofG+nQjtWQADcRDPfJkZrb7HUs= ro,relatime master:71 - ext4 /dev/mapper/lvm2-home rw mountid=1429 fsname=/sn/.cache/ksycoca5_en-CA_FofG+nQjtWQADcRDPfJkZrb7HUs= dir=/home/sn/.cache/ksycoca5_en-CA_FofG+nQjtWQADcRDPfJkZrb7HUs= fstype=ext4 Mounting read-only /home/sn/.config/kdeglobals 1430 1394 254:1 /sn/.config/kdeglobals /home/sn/.config/kdeglobals ro,relatime master:71 - ext4 /dev/mapper/lvm2-home rw mountid=1430 fsname=/sn/.config/kdeglobals dir=/home/sn/.config/kdeglobals fstype=ext4 Mounting read-only /home/sn/.config/kiorc 1431 1394 254:1 /sn/.config/kiorc /home/sn/.config/kiorc ro,relatime master:71 - ext4 /dev/mapper/lvm2-home rw mountid=1431 fsname=/sn/.config/kiorc dir=/home/sn/.config/kiorc fstype=ext4 Mounting read-only /home/sn/.local/share/konsole 1432 1394 254:1 /sn/.local/share/konsole /home/sn/.local/share/konsole ro,relatime master:71 - ext4 /dev/mapper/lvm2-home rw mountid=1432 fsname=/sn/.local/share/konsole dir=/home/sn/.local/share/konsole fstype=ext4 Disable /run/user/1000/klauncherqyDUgL.1.slave-socket Disable /run/user/1000/klauncheruiatVC.1.slave-socket Disable /run/user/1000/kdeinit5__0 Disable /run/user/1000/kdesud_:0 Mounting read-only /home/x/.config/dconf 1437 1394 254:1 /x/.config/dconf /home/sn/.config/dconf ro,relatime master:71 - ext4 /dev/mapper/lvm2-home rw mountid=1437 fsname=/x/.config/dconf dir=/home/sn/.config/dconf fstype=ext4 Disable /var/lib/systemd Disable /var/cache/pacman Disable /var/lib/clamav Disable /var/lib/pacman Disable /var/lib/upower Disable /var/spool/mail (requested /var/mail) Disable /var/opt Disable /var/spool/anacron Disable /var/spool/cron Disable /var/spool/mail Disable /etc/anacrontab Disable /etc/cron.monthly Disable /etc/cron.hourly Disable /etc/cron.daily Disable /etc/cron.weekly Disable /etc/cron.d Disable /etc/cron.deny Disable /etc/profile.d Disable /etc/kernel Disable /etc/grub.d Disable /etc/apparmor Disable /etc/apparmor.d Disable /etc/modules-load.d Disable /etc/logrotate.d Mounting read-only /home/sn/.bash_logout 1462 1394 254:1 /sn/.bash_logout /home/sn/.bash_logout ro,relatime master:71 - ext4 /dev/mapper/lvm2-home rw mountid=1462 fsname=/sn/.bash_logout dir=/home/sn/.bash_logout fstype=ext4 Mounting read-only /home/sn/.bash_profile 1463 1394 254:1 /sn/.bash_profile /home/sn/.bash_profile ro,relatime master:71 - ext4 /dev/mapper/lvm2-home rw mountid=1463 fsname=/sn/.bash_profile dir=/home/sn/.bash_profile fstype=ext4 Mounting read-only /home/sn/.bashrc 1464 1394 254:1 /sn/.bashrc /home/sn/.bashrc ro,relatime master:71 - ext4 /dev/mapper/lvm2-home rw mountid=1464 fsname=/sn/.bashrc dir=/home/sn/.bashrc fstype=ext4 Mounting read-only /home/sn/.config/menus 1465 1394 254:1 /sn/.config/menus /home/sn/.config/menus ro,relatime master:71 - ext4 /dev/mapper/lvm2-home rw mountid=1465 fsname=/sn/.config/menus dir=/home/sn/.config/menus fstype=ext4 Mounting read-only /home/sn/.local/share/applications 1466 1394 254:1 /sn/.local/share/applications /home/sn/.local/share/applications ro,relatime master:71 - ext4 /dev/mapper/lvm2-home rw mountid=1466 fsname=/sn/.local/share/applications dir=/home/sn/.local/share/applications fstype=ext4 Disable /home/sn/.gnupg Disable /home/sn/.local/share/kwalletd Disable /home/sn/.pki Disable /home/sn/.local/share/pki Disable /etc/group- Disable /etc/gshadow Disable /etc/gshadow- Disable /etc/passwd- Disable /etc/shadow Disable /etc/shadow- Disable /etc/ssh Warning: /sbin directory link was not blacklisted Disable /usr/local/sbin Warning: /usr/sbin directory link was not blacklisted Disable /usr/bin/chage Disable /usr/bin/chfn Disable /usr/bin/chsh Disable /usr/bin/crontab Disable /usr/bin/expiry Disable /usr/bin/fusermount Disable /usr/bin/gpasswd Disable /usr/bin/ksu Disable /usr/bin/mount Disable /usr/bin/newgidmap Disable /usr/bin/newgrp Disable /usr/bin/newuidmap Disable /usr/bin/pkexec Disable /usr/bin/sg Disable /usr/bin/su Disable /usr/bin/sudo Disable /usr/bin/umount Disable /usr/bin/unix_chkpwd Disable /home/sn/.local/share/flatpak Disable /usr/share/flatpak Disable /var/lib/flatpak Disable /usr/bin/bwrap Disable /proc/config.gz Disable /home/sn/.config/keepassxc Disable /home/sn/.config/akonadi_contactrc Disable /home/sn/.config/akonadi Disable /home/sn/.config/akregatorrc Disable /home/sn/.config/arkrc Disable /home/sn/.config/baloofilerc Disable /home/sn/.config/dolphinrc Disable /home/sn/.config/emaildefaults Disable /home/sn/.config/emailidentities Disable /home/sn/.config/gwenviewrc Disable /home/sn/.config/katemetainfos Disable /home/sn/.config/katerc Disable /home/sn/.config/kateschemarc Disable /home/sn/.config/katevirc Disable /home/sn/.config/kmail2rc Disable /home/sn/.config/okularrc Disable /home/sn/.killingfloor Disable /home/sn/.local/share/3909/PapersPlease Disable /home/sn/.local/share/Steam Disable /home/sn/.local/share/SuperHexagon Disable /home/sn/.local/share/Terraria Disable /home/sn/.local/share/akonadi Disable /home/sn/.local/share/akregator Disable /home/sn/.local/share/aspyr-media Disable /home/sn/.local/share/baloo Disable /home/sn/.local/share/cdprojektred Disable /home/sn/.local/share/dolphin Disable /home/sn/.local/share/feral-interactive Disable /home/sn/.local/share/kate Disable /home/sn/.local/share/kmail2 Disable /home/sn/.local/share/okular Disable /home/sn/.local/share/telepathy Disable /home/sn/.local/share/vpltd Disable /home/sn/.local/share/vulkan Disable /home/sn/.mozilla Disable /home/sn/.steam Disable /home/sn/.wget-hsts Disable /home/sn/.wine Disable /home/sn/.cache/discover Disable /home/sn/.cache/kcmshell5 Disable /home/sn/.cache/kmail2 Disable /home/sn/.cache/krunner Disable /home/sn/.cache/ksmserver-logout-greeter Disable /home/sn/.cache/ksplashqml Disable /home/sn/.cache/kwin Disable /home/sn/.cache/mozilla Disable /home/sn/.cache/plasmashell Disable /home/sn/.cache/systemsettings Disable /home/sn/.cache/telepathy Disable /sys/fs Disable /sys/module Mounting noexec /run/firejail/mnt/pulse Mounting /run/firejail/mnt/pulse on /home/sn/.config/pulse 1554 1394 0:103 /pulse /home/sn/.config/pulse rw,nosuid,nodev,noexec - tmpfs tmpfs rw,mode=755 mountid=1554 fsname=/pulse dir=/home/sn/.config/pulse fstype=tmpfs Current directory: /home/sn DISPLAY=:0 parsed as 0 Install protocol filter: unix,inet,inet6 configuring 14 seccomp entries in /run/firejail/mnt/seccomp/seccomp.protocol sbox run: /usr/lib/firejail/fsec-print /run/firejail/mnt/seccomp/seccomp.protocol (null) Dropping all capabilities Drop privileges: pid 3, uid 1000, gid 985, nogroups 1 No supplementary groups line OP JT JF K ================================= 0000: 20 00 00 00000004 ld data.architecture 0001: 15 01 00 c000003e jeq ARCH_64 0003 (false 0002) 0002: 06 00 00 7fff0000 ret ALLOW 0003: 20 00 00 00000000 ld data.syscall-number 0004: 15 01 00 00000029 jeq socket 0006 (false 0005) 0005: 06 00 00 7fff0000 ret ALLOW 0006: 20 00 00 00000010 ld data.args[0] 0007: 15 00 01 00000001 jeq 1 0008 (false 0009) 0008: 06 00 00 7fff0000 ret ALLOW 0009: 15 00 01 00000002 jeq 2 000a (false 000b) 000a: 06 00 00 7fff0000 ret ALLOW 000b: 15 00 01 0000000a jeq a 000c (false 000d) 000c: 06 00 00 7fff0000 ret ALLOW 000d: 06 00 00 0005005f ret ERRNO(95) configuring 54 seccomp entries in /run/firejail/mnt/seccomp/seccomp.32 sbox run: /usr/lib/firejail/fsec-print /run/firejail/mnt/seccomp/seccomp.32 (null) Dropping all capabilities Drop privileges: pid 4, uid 1000, gid 985, nogroups 1 No supplementary groups line OP JT JF K ================================= 0000: 20 00 00 00000004 ld data.architecture 0001: 15 01 00 40000003 jeq ARCH_32 0003 (false 0002) 0002: 06 00 00 7fff0000 ret ALLOW 0003: 20 00 00 00000000 ld data.syscall-number 0004: 15 30 00 00000015 jeq 15 0035 (false 0005) 0005: 15 2f 00 00000034 jeq 34 0035 (false 0006) 0006: 15 2e 00 0000001a jeq 1a 0035 (false 0007) 0007: 15 2d 00 0000011b jeq 11b 0035 (false 0008) 0008: 15 2c 00 00000155 jeq 155 0035 (false 0009) 0009: 15 2b 00 00000156 jeq 156 0035 (false 000a) 000a: 15 2a 00 0000007f jeq 7f 0035 (false 000b) 000b: 15 29 00 00000080 jeq 80 0035 (false 000c) 000c: 15 28 00 0000015e jeq 15e 0035 (false 000d) 000d: 15 27 00 00000081 jeq 81 0035 (false 000e) 000e: 15 26 00 0000006e jeq 6e 0035 (false 000f) 000f: 15 25 00 00000065 jeq 65 0035 (false 0010) 0010: 15 24 00 00000121 jeq 121 0035 (false 0011) 0011: 15 23 00 00000057 jeq 57 0035 (false 0012) 0012: 15 22 00 00000073 jeq 73 0035 (false 0013) 0013: 15 21 00 00000067 jeq 67 0035 (false 0014) 0014: 15 20 00 0000015b jeq 15b 0035 (false 0015) 0015: 15 1f 00 0000015c jeq 15c 0035 (false 0016) 0016: 15 1e 00 00000087 jeq 87 0035 (false 0017) 0017: 15 1d 00 00000095 jeq 95 0035 (false 0018) 0018: 15 1c 00 0000007c jeq 7c 0035 (false 0019) 0019: 15 1b 00 00000157 jeq 157 0035 (false 001a) 001a: 15 1a 00 000000fd jeq fd 0035 (false 001b) 001b: 15 19 00 00000150 jeq 150 0035 (false 001c) 001c: 15 18 00 00000152 jeq 152 0035 (false 001d) 001d: 15 17 00 0000015d jeq 15d 0035 (false 001e) 001e: 15 16 00 0000011e jeq 11e 0035 (false 001f) 001f: 15 15 00 0000011f jeq 11f 0035 (false 0020) 0020: 15 14 00 00000120 jeq 120 0035 (false 0021) 0021: 15 13 00 00000056 jeq 56 0035 (false 0022) 0022: 15 12 00 00000033 jeq 33 0035 (false 0023) 0023: 15 11 00 0000007b jeq 7b 0035 (false 0024) 0024: 15 10 00 000000d9 jeq d9 0035 (false 0025) 0025: 15 0f 00 000000f5 jeq f5 0035 (false 0026) 0026: 15 0e 00 000000f6 jeq f6 0035 (false 0027) 0027: 15 0d 00 000000f7 jeq f7 0035 (false 0028) 0028: 15 0c 00 000000f8 jeq f8 0035 (false 0029) 0029: 15 0b 00 000000f9 jeq f9 0035 (false 002a) 002a: 15 0a 00 00000101 jeq 101 0035 (false 002b) 002b: 15 09 00 00000112 jeq 112 0035 (false 002c) 002c: 15 08 00 00000114 jeq 114 0035 (false 002d) 002d: 15 07 00 00000126 jeq 126 0035 (false 002e) 002e: 15 06 00 0000013d jeq 13d 0035 (false 002f) 002f: 15 05 00 0000013c jeq 13c 0035 (false 0030) 0030: 15 04 00 0000003d jeq 3d 0035 (false 0031) 0031: 15 03 00 00000058 jeq 58 0035 (false 0032) 0032: 15 02 00 000000a9 jeq a9 0035 (false 0033) 0033: 15 01 00 00000082 jeq 82 0035 (false 0034) 0034: 06 00 00 7fff0000 ret ALLOW 0035: 06 00 00 00000000 ret KILL Dual 32/64 bit seccomp filter configured configuring 72 seccomp entries in /run/firejail/mnt/seccomp/seccomp sbox run: /usr/lib/firejail/fsec-print /run/firejail/mnt/seccomp/seccomp (null) Dropping all capabilities Drop privileges: pid 5, uid 1000, gid 985, nogroups 1 No supplementary groups line OP JT JF K ================================= 0000: 20 00 00 00000004 ld data.architecture 0001: 15 01 00 c000003e jeq ARCH_64 0003 (false 0002) 0002: 06 00 00 7fff0000 ret ALLOW 0003: 20 00 00 00000000 ld data.syscall-number 0004: 35 01 00 40000000 jge X32_ABI 0006 (false 0005) 0005: 35 01 00 00000000 jge read 0007 (false 0006) 0006: 06 00 00 00050001 ret ERRNO(1) 0007: 15 3f 00 0000009f jeq adjtimex 0047 (false 0008) 0008: 15 3e 00 00000131 jeq clock_adjtime 0047 (false 0009) 0009: 15 3d 00 000000e3 jeq clock_settime 0047 (false 000a) 000a: 15 3c 00 000000a4 jeq settimeofday 0047 (false 000b) 000b: 15 3b 00 0000009a jeq modify_ldt 0047 (false 000c) 000c: 15 3a 00 000000d4 jeq lookup_dcookie 0047 (false 000d) 000d: 15 39 00 0000012a jeq perf_event_open 0047 (false 000e) 000e: 15 38 00 00000137 jeq process_vm_writev 0047 (false 000f) 000f: 15 37 00 000000b0 jeq delete_module 0047 (false 0010) 0010: 15 36 00 00000139 jeq finit_module 0047 (false 0011) 0011: 15 35 00 000000af jeq init_module 0047 (false 0012) 0012: 15 34 00 0000009c jeq _sysctl 0047 (false 0013) 0013: 15 33 00 000000b7 jeq afs_syscall 0047 (false 0014) 0014: 15 32 00 000000ae jeq create_module 0047 (false 0015) 0015: 15 31 00 000000b1 jeq get_kernel_syms 0047 (false 0016) 0016: 15 30 00 000000b5 jeq getpmsg 0047 (false 0017) 0017: 15 2f 00 000000b6 jeq putpmsg 0047 (false 0018) 0018: 15 2e 00 000000b2 jeq query_module 0047 (false 0019) 0019: 15 2d 00 000000b9 jeq security 0047 (false 001a) 001a: 15 2c 00 0000008b jeq sysfs 0047 (false 001b) 001b: 15 2b 00 000000b8 jeq tuxcall 0047 (false 001c) 001c: 15 2a 00 00000086 jeq uselib 0047 (false 001d) 001d: 15 29 00 00000088 jeq ustat 0047 (false 001e) 001e: 15 28 00 000000ec jeq vserver 0047 (false 001f) 001f: 15 27 00 000000ad jeq ioperm 0047 (false 0020) 0020: 15 26 00 000000ac jeq iopl 0047 (false 0021) 0021: 15 25 00 000000f6 jeq kexec_load 0047 (false 0022) 0022: 15 24 00 00000140 jeq kexec_file_load 0047 (false 0023) 0023: 15 23 00 000000a9 jeq reboot 0047 (false 0024) 0024: 15 22 00 000000a7 jeq swapon 0047 (false 0025) 0025: 15 21 00 000000a8 jeq swapoff 0047 (false 0026) 0026: 15 20 00 00000130 jeq open_by_handle_at 0047 (false 0027) 0027: 15 1f 00 0000012f jeq name_to_handle_at 0047 (false 0028) 0028: 15 1e 00 000000fb jeq ioprio_set 0047 (false 0029) 0029: 15 1d 00 00000067 jeq syslog 0047 (false 002a) 002a: 15 1c 00 0000012c jeq fanotify_init 0047 (false 002b) 002b: 15 1b 00 00000138 jeq kcmp 0047 (false 002c) 002c: 15 1a 00 000000f8 jeq add_key 0047 (false 002d) 002d: 15 19 00 000000f9 jeq request_key 0047 (false 002e) 002e: 15 18 00 000000ed jeq mbind 0047 (false 002f) 002f: 15 17 00 00000100 jeq migrate_pages 0047 (false 0030) 0030: 15 16 00 00000117 jeq move_pages 0047 (false 0031) 0031: 15 15 00 000000fa jeq keyctl 0047 (false 0032) 0032: 15 14 00 000000ce jeq io_setup 0047 (false 0033) 0033: 15 13 00 000000cf jeq io_destroy 0047 (false 0034) 0034: 15 12 00 000000d0 jeq io_getevents 0047 (false 0035) 0035: 15 11 00 000000d1 jeq io_submit 0047 (false 0036) 0036: 15 10 00 000000d2 jeq io_cancel 0047 (false 0037) 0037: 15 0f 00 000000d8 jeq remap_file_pages 0047 (false 0038) 0038: 15 0e 00 00000143 jeq userfaultfd 0047 (false 0039) 0039: 15 0d 00 000000a3 jeq acct 0047 (false 003a) 003a: 15 0c 00 00000141 jeq bpf 0047 (false 003b) 003b: 15 0b 00 000000a1 jeq chroot 0047 (false 003c) 003c: 15 0a 00 000000a5 jeq mount 0047 (false 003d) 003d: 15 09 00 000000b4 jeq nfsservctl 0047 (false 003e) 003e: 15 08 00 0000009b jeq pivot_root 0047 (false 003f) 003f: 15 07 00 000000ab jeq setdomainname 0047 (false 0040) 0040: 15 06 00 000000aa jeq sethostname 0047 (false 0041) 0041: 15 05 00 000000a6 jeq umount2 0047 (false 0042) 0042: 15 04 00 00000099 jeq vhangup 0047 (false 0043) 0043: 15 03 00 00000065 jeq ptrace 0047 (false 0044) 0044: 15 02 00 00000087 jeq personality 0047 (false 0045) 0045: 15 01 00 00000136 jeq process_vm_readv 0047 (false 0046) 0046: 06 00 00 7fff0000 ret ALLOW 0047: 06 00 01 00000000 ret KILL seccomp filter configured Mounting read-only /run/firejail/mnt/seccomp Dropping all capabilities noroot user namespace installed Dropping all capabilities NO_NEW_PRIVS set Drop privileges: pid 1, uid 1000, gid 985, nogroups 0 Warning: cleaning all supplementary groups starting application LD_PRELOAD=(null) Running 'akonadictl' 'start' command through /bin/bash execvp argument 0: /bin/bash execvp argument 1: -c execvp argument 2: 'akonadictl' 'start' Child process initialized in 29.03 ms Installing /run/firejail/mnt/seccomp/seccomp seccomp filter Installing /run/firejail/mnt/seccomp/seccomp.32 seccomp filter Installing /run/firejail/mnt/seccomp/seccomp.protocol seccomp filter QIODevice::write (QFile, "/home/sn/.local/share/akonadi/Akonadi.error"): device not open org.kde.pim.akonadictl: Starting Akonadi Server... Warning: an existing sandbox was detected. /usr/bin/akonadi_control will run without any additional sandboxing features monitoring pid 6 org.kde.pim.akonadicontrol: Service org.freedesktop.Akonadi.Control.lock already registered, terminating now. Error: akonadi_control was started but didn't register at D-Bus session bus. Make sure your system is set up correctly! Sandbox monitor: waitpid 6 retval 6 status 768 Parent is shutting down, bye... ```
smitsohu commented 4 years ago

[sn@usona ~]$ firejail --debug akonadictl start

The problem is that no akonadictl profile exists, and it cannot run with the default profile.

Two possible solutions:

  1. Create a new file ~/.config/firejail/akonadictl.profile and paste include akonadi_control.profile
  2. Run sudo ln -s /usr/bin/firejail /usr/local/bin/akonadi_control, and then akonadictl start without prepending firejail.

You can check with firejail --tree if this works.

rusty-snake commented 4 years ago

I'm closing here due to inactivity, please fell free to reopen if you still have this issue.