Man error

Briefly describe your issue below:
When I use man to show the manual of a commands, i get an error.
If I use sudo man apt, It works fine.
Any idea why I get this problem ? I think this might come from missconfiguration of some file rights.

What version of Parrot are you running? (include version, edition, and architecture)
Version 4.5 64-bit
Linux 4.19.0-parrot1-13t-amd64 x86_64
Memory : 3,7 Gio
Processor : Intel® Core™ i5-2467M CPU @ 1.60GHz × 4

What method did you use to install Parrot? (Debian Standard / Debian GTK / parrot-experimental)
Debian Standard

Configured to multiboot with other systems? (yes / no)
no

If there are any similar issues or solutions, link to them below:
no

If there are any error messages or relevant logs, post them below:
$ man apt

Error clone: main.c:2514 main: Operation not permitted
man: commande terminée avec 1 comme code de retour : sed -e ‘/^[[:space:]]$/{ N; /^[[:space:]]\n[[:space:]]*$/D; }’ | LESS=-ix8RmPm Manual page apt(8) ?ltline %lt?L/%L.:byte %bB?s/%s…?e (END):?pB %pB%… (press h for help or q to quit)$PM Manual page apt(8) ?ltline %lt?L/%L.:byte %bB?s/%s…?e (END):?pB %pB%… (press h for help or q to quit)$-R MAN_PN=apt(8) less

Hello s1udge,

I installed Parrot OS on my computer that was on Ubuntu before (with main partition encrypted). I did the same for Parrot OS. I used Debian standard installation method. I encountered a little problem during the installation : even though I choosed the right network driver, it didn’t detect my network hardware during the installation (it worked perfectly after the installation, I skiped this step).

After installation, I didn’t test man for like one week. I made a lot of changes to get back some of my usual customization that I had on ubuntu :
Changing the terminal to Zshrc with oh-my-zsh + powerlevel9k. I replaced the zshrc generated by my old zshrc. (maybe my env variables are wrong which could explain man fail ??)
I created my own background in /usr/share/background.
I installed IPSEC/L2TP, strongswan and gnome interface for ipsec/l2tp
Installed mongodb, npm, nodejs, androidStudio and other developping stuff.

But I didn’t change any file rights in /etc/* or /user/share/* . Didn’t changed any firejail settings.
I didn’t touched to my user permissions, never logged directly as root. I always used sudo command.

Also, when I start from menu wireshark, pluma and other applications, they never open. I’m forced to use command line to open wireshark, and even with command-line, pluma doesn’t work.

Man isn’t working on bash, sh and zsh (I tried the three of them, starting with zsh, then switched to others with bash and sh command.

I hope I gave you enough information to give you a hint :smile:

On my side, I’m lost :confused:

So I tested the same command that I used before (man apt) and got an interesting log from syslog :

Mar 14 18:51:21 localhost kernel: [ 1698.918135] audit: type=1400 audit(1552585881.628:117): apparmor="DENIED" operation="ptrace" profile="/usr/bin/man" pid=3188 comm="firejail" requested_mask="read" denied_mask="read" peer="unconfined"
Mar 14 18:51:21 localhost kernel: [ 1698.929159] audit: type=1400 audit(1552585881.640:118): apparmor="DENIED" operation="capable" profile="/usr/bin/man" pid=3188 comm="firejail" capability=21  capname="sys_admin" 

I think the problem is coming from firejail.

journalctl didn’t show much.

Here is my env even if I think it isn’t where the problem comes from :

XDG_SEAT_PATH=/org/freedesktop/DisplayManager/Seat0
LANG=fr_FR.UTF-8
DISPLAY=:0.0
XDG_VTNR=7
LOGNAME=maltemo
PWD=/home/maltemo
XAUTHORITY=/home/maltemo/.Xauthority
XDG_SESSION_CLASS=user
XDG_GREETER_DATA_DIR=/var/lib/lightdm/data/maltemo
COLORTERM=truecolor
XDG_SESSION_ID=2
DESKTOP_SESSION=lightdm-xsession
XDG_SESSION_DESKTOP=lightdm-xsession
GDMSESSION=lightdm-xsession
MATE_DESKTOP_SESSION_ID=this-is-deprecated
DBUS_SESSION_BUS_ADDRESS=unix:path=/run/user/1000/bus
QT_SCALE_FACTOR=1
VTE_VERSION=5402
XDG_DATA_DIRS=/usr/share/mate:/usr/local/share/:/usr/share/
GTK_OVERLAY_SCROLLING=0
QT_ACCESSIBILITY=1
GDM_LANG=fr_FR.utf8
SHELL=/usr/bin/zsh
XDG_SESSION_TYPE=x11
WINDOWID=60819249
SSH_AGENT_PID=1196
SESSION_MANAGER=local/parrot:@/tmp/.ICE-unix/1157,unix/parrot:/tmp/.ICE-unix/1157
XDG_CURRENT_DESKTOP=MATE
SSH_AUTH_SOCK=/run/user/1000/keyring/ssh
PATH=/home/maltemo/perl5/bin:/usr/local/bin:/usr/bin:/bin:/usr/local/games:/usr/games
QT_AUTO_SCREEN_SCALE_FACTOR=0
HOME=/home/maltemo
XDG_SEAT=seat0
XDG_RUNTIME_DIR=/run/user/1000
XDG_SESSION_PATH=/org/freedesktop/DisplayManager/Session0
GPG_AGENT_INFO=/run/user/1000/gnupg/S.gpg-agent:0:1
USER=maltemo
TERM=xterm-256color
SHLVL=1
OLDPWD=/home/maltemo
ZSH=/home/maltemo/.oh-my-zsh
PAGER=less
LESS=-R
LSCOLORS=Gxfxcxdxbxegedabagacad
LS_COLORS=rs=0:di=01;34:ln=01;36:mh=00:pi=40;33:so=01;35:do=01;35:bd=40;33;01:cd=40;33;01:or=40;31;01:mi=00:su=37;41:sg=30;43:ca=30;41:tw=30;42:ow=34;42:st=37;44:ex=01;32:*.tar=01;31:*.tgz=01;31:*.arc=01;31:*.arj=01;31:*.taz=01;31:*.lha=01;31:*.lz4=01;31:*.lzh=01;31:*.lzma=01;31:*.tlz=01;31:*.txz=01;31:*.tzo=01;31:*.t7z=01;31:*.zip=01;31:*.z=01;31:*.dz=01;31:*.gz=01;31:*.lrz=01;31:*.lz=01;31:*.lzo=01;31:*.xz=01;31:*.zst=01;31:*.tzst=01;31:*.bz2=01;31:*.bz=01;31:*.tbz=01;31:*.tbz2=01;31:*.tz=01;31:*.deb=01;31:*.rpm=01;31:*.jar=01;31:*.war=01;31:*.ear=01;31:*.sar=01;31:*.rar=01;31:*.alz=01;31:*.ace=01;31:*.zoo=01;31:*.cpio=01;31:*.7z=01;31:*.rz=01;31:*.cab=01;31:*.wim=01;31:*.swm=01;31:*.dwm=01;31:*.esd=01;31:*.jpg=01;35:*.jpeg=01;35:*.mjpg=01;35:*.mjpeg=01;35:*.gif=01;35:*.bmp=01;35:*.pbm=01;35:*.pgm=01;35:*.ppm=01;35:*.tga=01;35:*.xbm=01;35:*.xpm=01;35:*.tif=01;35:*.tiff=01;35:*.png=01;35:*.svg=01;35:*.svgz=01;35:*.mng=01;35:*.pcx=01;35:*.mov=01;35:*.mpg=01;35:*.mpeg=01;35:*.m2v=01;35:*.mkv=01;35:*.webm=01;35:*.ogm=01;35:*.mp4=01;35:*.m4v=01;35:*.mp4v=01;35:*.vob=01;35:*.qt=01;35:*.nuv=01;35:*.wmv=01;35:*.asf=01;35:*.rm=01;35:*.rmvb=01;35:*.flc=01;35:*.avi=01;35:*.fli=01;35:*.flv=01;35:*.gl=01;35:*.dl=01;35:*.xcf=01;35:*.xwd=01;35:*.yuv=01;35:*.cgm=01;35:*.emf=01;35:*.ogv=01;35:*.ogx=01;35:*.aac=00;36:*.au=00;36:*.flac=00;36:*.m4a=00;36:*.mid=00;36:*.midi=00;36:*.mka=00;36:*.mp3=00;36:*.mpc=00;36:*.ogg=00;36:*.ra=00;36:*.wav=00;36:*.oga=00;36:*.opus=00;36:*.spx=00;36:*.xspf=00;36:
LC_CTYPE=fr_FR.UTF-8
PERL5LIB=/home/maltemo/perl5/lib/perl5
PERL_LOCAL_LIB_ROOT=/home/maltemo/perl5
PERL_MB_OPT=--install_base "/home/maltemo/perl5"
PERL_MM_OPT=INSTALL_BASE=/home/maltemo/perl5
NVM_DIR=/home/maltemo/.nvm
NVM_CD_FLAGS=-q
NVM_RC_VERSION=
_=/usr/bin/env
1 Like

I confirm that my $PATH variable isn’t right. I fixed it in the .zshrc, restarted a console, but man problem still persist

The /etc/firejail/firejail.users contains only maltemo, so that’s good.

I installed IPSE/L2TP via apt install strongswan

Finaly, I tried firejail --debug and I got this output :

Autoselecting /usr/bin/zsh as shell
Command name #/usr/bin/zsh#
Attempting to find default.profile...
Found default.profile profile in /etc/firejail directory
Reading profile /etc/firejail/default.profile
Found disable-common.inc profile in /etc/firejail directory
Reading profile /etc/firejail/disable-common.inc
Found disable-passwdmgr.inc profile in /etc/firejail directory
Reading profile /etc/firejail/disable-passwdmgr.inc
Found disable-programs.inc profile in /etc/firejail directory
Reading profile /etc/firejail/disable-programs.inc

** Note: you can use --noprofile to disable default.profile **

DISPLAY=:0.0 parsed as 0
Using the local network stack
Parent pid 4341, child pid 4342
Initializing child process
Host network configured
PID namespace installed
Mounting tmpfs on /run/firejail/mnt directory
Creating empty /run/firejail/mnt/seccomp.protocol file
Creating empty /run/firejail/mnt/seccomp.postexec file
Build protocol filter: unix,inet,inet6
sbox run: /run/firejail/lib/fseccomp protocol build unix,inet,inet6 /run/firejail/mnt/seccomp.protocol (null) 
Dropping all capabilities
Drop privileges: pid 2, uid 1000, gid 1000, nogroups 1
No supplementary groups
Basic read-only filesystem:
Mounting read-only /etc
Mounting noexec /etc
Mounting read-only /var
Mounting noexec /var
Mounting read-only /bin
Mounting read-only /sbin
Mounting read-only /lib
Mounting read-only /lib64
Mounting read-only /lib32
Mounting read-only /usr
Mounting tmpfs on /var/lock
Mounting tmpfs on /var/tmp
Mounting tmpfs on /var/log
Mounting tmpfs on /var/lib/dhcp
Mounting tmpfs on /var/lib/nginx
Mounting tmpfs on /var/lib/snmp
Mounting tmpfs on /var/lib/sudo
Mounting tmpfs on /var/cache/lighttpd
Create the new utmp file
Mount the new utmp file
Cleaning /home directory
Cleaning /run/user directory
Sanitizing /etc/passwd, UID_MIN 1000
Sanitizing /etc/group, GID_MIN 1000
Disable /run/firejail/network
Disable /run/firejail/bandwidth
Disable /run/firejail/name
Disable /run/firejail/x11
Remounting /proc and /proc/sys filesystems
Remounting /sys directory
Disable /sys/firmware
Disable /sys/hypervisor
Disable /sys/power
Disable /sys/kernel/debug
Disable /sys/kernel/vmcoreinfo
Disable /proc/sys/fs/binfmt_misc
Disable /proc/sys/kernel/core_pattern
Disable /proc/sys/kernel/modprobe
Disable /proc/sysrq-trigger
Disable /proc/sys/vm/panic_on_oom
Disable /proc/irq
Disable /proc/bus
Disable /proc/sched_debug
Disable /proc/timer_list
Disable /proc/kcore
Disable /proc/kallsyms
Disable /lib/modules
Disable /usr/lib/debug
Disable /boot
Disable /dev/port
Disable /run/user/1000/gnupg
Disable /run/user/1000/systemd
Disable /dev/kmsg
Disable /proc/kmsg
Disable /home/maltemo/.local/share/Trash
Disable /home/maltemo/.bash_history
Disable /home/maltemo/.node_repl_history
Disable /home/maltemo/.zsh_history
Disable /home/maltemo/.config/autostart
Disable /home/maltemo/.config/openbox
Disable /home/maltemo/.config/startupconfig
Disable /etc/X11/Xsession.d
Disable /etc/xdg/autostart
Mounting read-only /home/maltemo/.Xauthority
Disable /home/maltemo/.config/khotkeysrc
Disable /home/maltemo/.config/kscreenlockerrc
Disable /home/maltemo/.config/kwinrc
Disable /home/maltemo/.config/plasma-org.kde.plasma.desktop-appletsrc
Mounting read-only /home/maltemo/.config/kdeglobals
Mounting read-only /home/maltemo/.kde/share/config/kdeglobals
Disable /var/lib/systemd
Disable /usr/bin/zuluCrypt-cli
Disable /usr/bin/zuluMount-cli
Disable /var/cache/apt
Disable /var/lib/apt
Disable /var/lib/upower
Disable /var/mail
Disable /var/opt
Disable /var/spool/cron
Disable /var/mail (requested /var/spool/mail)
Disable /etc/cron.d
Disable /etc/cron.daily
Disable /etc/cron.hourly
Disable /etc/cron.monthly
Disable /etc/cron.weekly
Disable /etc/crontab
Disable /etc/profile.d
Disable /etc/rc0.d
Disable /etc/rc1.d
Disable /etc/rc2.d
Disable /etc/rc3.d
Disable /etc/rc4.d
Disable /etc/rc5.d
Disable /etc/rc6.d
Disable /etc/rcS.d
Disable /etc/kernel
Disable /etc/grub.d
Disable /etc/dkms
Disable /etc/apparmor
Disable /etc/apparmor.d
Disable /etc/selinux
Disable /etc/modules
Disable /etc/modules-load.d
Disable /etc/logrotate.conf
Disable /etc/logrotate.d
Disable /etc/adduser.conf
Mounting read-only /home/maltemo/.bashrc
Mounting read-only /home/maltemo/.oh-my-zsh
Mounting read-only /home/maltemo/.profile
Mounting read-only /home/maltemo/.zshrc
Mounting read-only /home/maltemo/.emacs
Mounting read-only /home/maltemo/.vim
Mounting read-only /home/maltemo/.viminfo
Mounting read-only /home/maltemo/.vimrc
Mounting read-only /home/maltemo/.local/bin
Mounting read-only /home/maltemo/.config/menus
Mounting read-only /home/maltemo/.local/share/applications
Disable /home/maltemo/.gnupg
Disable /home/maltemo/.local/share/keyrings
Disable /home/maltemo/.pki
Disable /home/maltemo/.local/share/pki
Disable /home/maltemo/.ssh
Disable /etc/group-
Disable /etc/gshadow
Disable /etc/gshadow-
Disable /etc/passwd-
Disable /etc/shadow
Disable /etc/shadow-
Disable /etc/ssh
Disable /sbin
Disable /usr/local/sbin
Disable /usr/sbin
Disable /usr/bin/chage
Disable /usr/bin/chfn
Disable /usr/bin/chsh
Disable /usr/bin/crontab
Disable /usr/bin/expiry
Disable /bin/fusermount
Disable /usr/bin/gpasswd
Disable /bin/mount
Disable /bin/nc.traditional (requested /bin/nc)
Disable /usr/bin/newgrp
Disable /bin/ntfs-3g
Disable /usr/bin/pkexec
Disable /usr/bin/newgrp (requested /usr/bin/sg)
Disable /bin/su
Disable /usr/bin/sudo
Disable /bin/umount
Disable /usr/bin/xev
Disable /usr/bin/mate-terminal (requested /usr/local/bin/gnome-terminal)
Disable /usr/bin/mate-terminal
Disable /usr/bin/mate-terminal.wrapper
Disable /usr/bin/bwrap
Disable /home/maltemo/.config/KeePass
Disable /home/maltemo/.AndroidStudio3.3
Disable /home/maltemo/.android
Disable /home/maltemo/.config/akregatorrc
Disable /home/maltemo/.config/caja
Disable /home/maltemo/.config/clipit
Disable /home/maltemo/.config/discord
Disable /home/maltemo/.config/emaildefaults
Disable /home/maltemo/.config/geany
Disable /home/maltemo/.config/katepartrc
Disable /home/maltemo/.config/kateschemarc
Disable /home/maltemo/.config/katesyntaxhighlightingrc
Disable /home/maltemo/.config/katevirc
Disable /home/maltemo/.config/libreoffice
Disable /home/maltemo/.config/mate/eom
Disable /home/maltemo/.config/pcmanfm
Disable /home/maltemo/.config/pluma
Disable /home/maltemo/.config/torbrowser
Disable /home/maltemo/.config/vlc
Disable /home/maltemo/.config/wireshark
Disable /home/maltemo/.emacs
Disable /home/maltemo/.emacs
Disable /home/maltemo/.gitconfig
Disable /home/maltemo/.gradle
Disable /home/maltemo/.java
Disable /home/maltemo/.local/share/torbrowser
Disable /home/maltemo/.local/share/vlc
Disable /home/maltemo/.mozilla
Disable /tmp/ssh-catZiSaoXbDb
Disable /home/maltemo/.cache/atril
Disable /home/maltemo/.cache/mozilla
Disable /sys/fs
Disable /sys/module
Mounting noexec /run/firejail/mnt/pulse
1269 1115 0:71 /pulse /home/maltemo/.config/pulse rw,nosuid,nodev,noexec - tmpfs tmpfs rw,mode=755
mountid=1269 fsname=/pulse dir=/home/maltemo/.config/pulse fstype=tmpfs
Current directory: /home/maltemo
DISPLAY=:0.0 parsed as 0
Dropping all capabilities
Install protocol filter: unix,inet,inet6
configuring 14 seccomp entries in /run/firejail/mnt/seccomp.protocol
sbox run: /usr/lib/x86_64-linux-gnu/firejail/fsec-print /run/firejail/mnt/seccomp.protocol (null) 
Dropping all capabilities
Drop privileges: pid 3, uid 1000, gid 1000, nogroups 1
No supplementary groups
 line  OP JT JF    K
=================================
 0000: 20 00 00 00000004   ld  data.architecture
 0001: 15 01 00 c000003e   jeq ARCH_64 0003 (false 0002)
 0002: 06 00 00 7fff0000   ret ALLOW
 0003: 20 00 00 00000000   ld  data.syscall-number
 0004: 15 01 00 00000029   jeq socket 0006 (false 0005)
 0005: 06 00 00 7fff0000   ret ALLOW
 0006: 20 00 00 00000010   ld  data.args[0]
 0007: 15 00 01 00000001   jeq 1 0008 (false 0009)
 0008: 06 00 00 7fff0000   ret ALLOW
 0009: 15 00 01 00000002   jeq 2 000a (false 000b)
 000a: 06 00 00 7fff0000   ret ALLOW
 000b: 15 00 01 0000000a   jeq a 000c (false 000d)
 000c: 06 00 00 7fff0000   ret ALLOW
 000d: 06 00 00 0005005f   ret ERRNO(95)
configuring 54 seccomp entries in /run/firejail/mnt/seccomp.32
sbox run: /usr/lib/x86_64-linux-gnu/firejail/fsec-print /run/firejail/mnt/seccomp.32 (null) 
Dropping all capabilities
Drop privileges: pid 4, uid 1000, gid 1000, nogroups 1
No supplementary groups
 line  OP JT JF    K
=================================
 0000: 20 00 00 00000004   ld  data.architecture
 0001: 15 01 00 40000003   jeq ARCH_32 0003 (false 0002)
 0002: 06 00 00 7fff0000   ret ALLOW
 0003: 20 00 00 00000000   ld  data.syscall-number
 0004: 15 30 00 00000015   jeq 15 0035 (false 0005)
 0005: 15 2f 00 00000034   jeq 34 0035 (false 0006)
 0006: 15 2e 00 0000001a   jeq 1a 0035 (false 0007)
 0007: 15 2d 00 0000011b   jeq 11b 0035 (false 0008)
 0008: 15 2c 00 00000155   jeq 155 0035 (false 0009)
 0009: 15 2b 00 00000156   jeq 156 0035 (false 000a)
 000a: 15 2a 00 0000007f   jeq 7f 0035 (false 000b)
 000b: 15 29 00 00000080   jeq 80 0035 (false 000c)
 000c: 15 28 00 0000015e   jeq 15e 0035 (false 000d)
 000d: 15 27 00 00000081   jeq 81 0035 (false 000e)
 000e: 15 26 00 0000006e   jeq 6e 0035 (false 000f)
 000f: 15 25 00 00000065   jeq 65 0035 (false 0010)
 0010: 15 24 00 00000121   jeq 121 0035 (false 0011)
 0011: 15 23 00 00000057   jeq 57 0035 (false 0012)
 0012: 15 22 00 00000073   jeq 73 0035 (false 0013)
 0013: 15 21 00 00000067   jeq 67 0035 (false 0014)
 0014: 15 20 00 0000015b   jeq 15b 0035 (false 0015)
 0015: 15 1f 00 0000015c   jeq 15c 0035 (false 0016)
 0016: 15 1e 00 00000087   jeq 87 0035 (false 0017)
 0017: 15 1d 00 00000095   jeq 95 0035 (false 0018)
 0018: 15 1c 00 0000007c   jeq 7c 0035 (false 0019)
 0019: 15 1b 00 00000157   jeq 157 0035 (false 001a)
 001a: 15 1a 00 000000fd   jeq fd 0035 (false 001b)
 001b: 15 19 00 00000150   jeq 150 0035 (false 001c)
 001c: 15 18 00 00000152   jeq 152 0035 (false 001d)
 001d: 15 17 00 0000015d   jeq 15d 0035 (false 001e)
 001e: 15 16 00 0000011e   jeq 11e 0035 (false 001f)
 001f: 15 15 00 0000011f   jeq 11f 0035 (false 0020)
 0020: 15 14 00 00000120   jeq 120 0035 (false 0021)
 0021: 15 13 00 00000056   jeq 56 0035 (false 0022)
 0022: 15 12 00 00000033   jeq 33 0035 (false 0023)
 0023: 15 11 00 0000007b   jeq 7b 0035 (false 0024)
 0024: 15 10 00 000000d9   jeq d9 0035 (false 0025)
 0025: 15 0f 00 000000f5   jeq f5 0035 (false 0026)
 0026: 15 0e 00 000000f6   jeq f6 0035 (false 0027)
 0027: 15 0d 00 000000f7   jeq f7 0035 (false 0028)
 0028: 15 0c 00 000000f8   jeq f8 0035 (false 0029)
 0029: 15 0b 00 000000f9   jeq f9 0035 (false 002a)
 002a: 15 0a 00 00000101   jeq 101 0035 (false 002b)
 002b: 15 09 00 00000112   jeq 112 0035 (false 002c)
 002c: 15 08 00 00000114   jeq 114 0035 (false 002d)
 002d: 15 07 00 00000126   jeq 126 0035 (false 002e)
 002e: 15 06 00 0000013d   jeq 13d 0035 (false 002f)
 002f: 15 05 00 0000013c   jeq 13c 0035 (false 0030)
 0030: 15 04 00 0000003d   jeq 3d 0035 (false 0031)
 0031: 15 03 00 00000058   jeq 58 0035 (false 0032)
 0032: 15 02 00 000000a9   jeq a9 0035 (false 0033)
 0033: 15 01 00 00000082   jeq 82 0035 (false 0034)
 0034: 06 00 00 7fff0000   ret ALLOW
 0035: 06 00 00 00000000   ret KILL
Dual 32/64 bit seccomp filter configured
configuring 74 seccomp entries in /run/firejail/mnt/seccomp
sbox run: /usr/lib/x86_64-linux-gnu/firejail/fsec-print /run/firejail/mnt/seccomp (null) 
Dropping all capabilities
Drop privileges: pid 5, uid 1000, gid 1000, nogroups 1
No supplementary groups
 line  OP JT JF    K
=================================
 0000: 20 00 00 00000004   ld  data.architecture
 0001: 15 01 00 c000003e   jeq ARCH_64 0003 (false 0002)
 0002: 06 00 00 7fff0000   ret ALLOW
 0003: 20 00 00 00000000   ld  data.syscall-number
 0004: 35 01 00 40000000   jge X32_ABI 0006 (false 0005)
 0005: 35 01 00 00000000   jge read 0007 (false 0006)
 0006: 06 00 00 00050001   ret ERRNO(1)
 0007: 15 41 00 0000009a   jeq modify_ldt 0049 (false 0008)
 0008: 15 40 00 000000d4   jeq lookup_dcookie 0049 (false 0009)
 0009: 15 3f 00 0000012a   jeq perf_event_open 0049 (false 000a)
 000a: 15 3e 00 00000137   jeq process_vm_writev 0049 (false 000b)
 000b: 15 3d 00 0000009c   jeq _sysctl 0049 (false 000c)
 000c: 15 3c 00 000000b7   jeq afs_syscall 0049 (false 000d)
 000d: 15 3b 00 000000ae   jeq create_module 0049 (false 000e)
 000e: 15 3a 00 000000b1   jeq get_kernel_syms 0049 (false 000f)
 000f: 15 39 00 000000b5   jeq getpmsg 0049 (false 0010)
 0010: 15 38 00 000000b6   jeq putpmsg 0049 (false 0011)
 0011: 15 37 00 000000b2   jeq query_module 0049 (false 0012)
 0012: 15 36 00 000000b9   jeq security 0049 (false 0013)
 0013: 15 35 00 0000008b   jeq sysfs 0049 (false 0014)
 0014: 15 34 00 000000b8   jeq tuxcall 0049 (false 0015)
 0015: 15 33 00 00000086   jeq uselib 0049 (false 0016)
 0016: 15 32 00 00000088   jeq ustat 0049 (false 0017)
 0017: 15 31 00 000000ec   jeq vserver 0049 (false 0018)
 0018: 15 30 00 0000009f   jeq adjtimex 0049 (false 0019)
 0019: 15 2f 00 00000131   jeq clock_adjtime 0049 (false 001a)
 001a: 15 2e 00 000000e3   jeq clock_settime 0049 (false 001b)
 001b: 15 2d 00 000000a4   jeq settimeofday 0049 (false 001c)
 001c: 15 2c 00 000000b0   jeq delete_module 0049 (false 001d)
 001d: 15 2b 00 00000139   jeq finit_module 0049 (false 001e)
 001e: 15 2a 00 000000af   jeq init_module 0049 (false 001f)
 001f: 15 29 00 000000ad   jeq ioperm 0049 (false 0020)
 0020: 15 28 00 000000ac   jeq iopl 0049 (false 0021)
 0021: 15 27 00 000000f6   jeq kexec_load 0049 (false 0022)
 0022: 15 26 00 00000140   jeq kexec_file_load 0049 (false 0023)
 0023: 15 25 00 000000a9   jeq reboot 0049 (false 0024)
 0024: 15 24 00 000000a7   jeq swapon 0049 (false 0025)
 0025: 15 23 00 000000a8   jeq swapoff 0049 (false 0026)
 0026: 15 22 00 000000a3   jeq acct 0049 (false 0027)
 0027: 15 21 00 00000141   jeq bpf 0049 (false 0028)
 0028: 15 20 00 000000a1   jeq chroot 0049 (false 0029)
 0029: 15 1f 00 000000a5   jeq mount 0049 (false 002a)
 002a: 15 1e 00 000000b4   jeq nfsservctl 0049 (false 002b)
 002b: 15 1d 00 0000009b   jeq pivot_root 0049 (false 002c)
 002c: 15 1c 00 000000ab   jeq setdomainname 0049 (false 002d)
 002d: 15 1b 00 000000aa   jeq sethostname 0049 (false 002e)
 002e: 15 1a 00 000000a6   jeq umount2 0049 (false 002f)
 002f: 15 19 00 00000099   jeq vhangup 0049 (false 0030)
 0030: 15 18 00 000000ee   jeq set_mempolicy 0049 (false 0031)
 0031: 15 17 00 00000100   jeq migrate_pages 0049 (false 0032)
 0032: 15 16 00 00000117   jeq move_pages 0049 (false 0033)
 0033: 15 15 00 000000ed   jeq mbind 0049 (false 0034)
 0034: 15 14 00 00000130   jeq open_by_handle_at 0049 (false 0035)
 0035: 15 13 00 0000012f   jeq name_to_handle_at 0049 (false 0036)
 0036: 15 12 00 000000fb   jeq ioprio_set 0049 (false 0037)
 0037: 15 11 00 00000067   jeq syslog 0049 (false 0038)
 0038: 15 10 00 0000012c   jeq fanotify_init 0049 (false 0039)
 0039: 15 0f 00 00000138   jeq kcmp 0049 (false 003a)
 003a: 15 0e 00 000000f8   jeq add_key 0049 (false 003b)
 003b: 15 0d 00 000000f9   jeq request_key 0049 (false 003c)
 003c: 15 0c 00 000000fa   jeq keyctl 0049 (false 003d)
 003d: 15 0b 00 000000ce   jeq io_setup 0049 (false 003e)
 003e: 15 0a 00 000000cf   jeq io_destroy 0049 (false 003f)
 003f: 15 09 00 000000d0   jeq io_getevents 0049 (false 0040)
 0040: 15 08 00 000000d1   jeq io_submit 0049 (false 0041)
 0041: 15 07 00 000000d2   jeq io_cancel 0049 (false 0042)
 0042: 15 06 00 000000d8   jeq remap_file_pages 0049 (false 0043)
 0043: 15 05 00 00000116   jeq vmsplice 0049 (false 0044)
 0044: 15 04 00 00000143   jeq userfaultfd 0049 (false 0045)
 0045: 15 03 00 00000065   jeq ptrace 0049 (false 0046)
 0046: 15 02 00 00000087   jeq personality 0049 (false 0047)
 0047: 15 01 00 00000136   jeq process_vm_readv 0049 (false 0048)
 0048: 06 00 00 7fff0000   ret ALLOW
 0049: 06 00 01 00000000   ret KILL
seccomp filter configured
noroot user namespace installed
Dropping all capabilities
NO_NEW_PRIVS set
Drop privileges: pid 1, uid 1000, gid 1000, nogroups 0
Supplementary groups: 29 44 
starting application
LD_PRELOAD=(null)
Running /usr/bin/zsh command through /usr/bin/zsh
execvp argument 0: /usr/bin/zsh
execvp argument 1: -c
execvp argument 2: /usr/bin/zsh
Child process initialized in 89.12 ms
Installing /run/firejail/mnt/seccomp seccomp filter
Installing /run/firejail/mnt/seccomp.32 seccomp filter
Installing /run/firejail/mnt/seccomp.protocol seccomp filter
monitoring pid 6

[oh-my-zsh] Insecure completion-dependent directories detected:
drwxrwsr-x 1 nobody nogroup 28 févr. 23 11:41 /usr/local/share/zsh
drwxrwsr-x 1 nobody nogroup  0 févr. 23 11:41 /usr/local/share/zsh/site-functions

[oh-my-zsh] For safety, we will not load completions from these directories until
[oh-my-zsh] you fix their permissions and ownership and restart zsh.
[oh-my-zsh] See the above list for directories with group or other writability.

[oh-my-zsh] To fix your permissions you can do so by disabling
[oh-my-zsh] the write permission of "group" and "others" and making sure that the
[oh-my-zsh] owner of these directories is either root or your current user.
[oh-my-zsh] The following command may help:
[oh-my-zsh]     compaudit | xargs chmod g-w,o-w

[oh-my-zsh] If the above didn't help or you want to skip the verification of
[oh-my-zsh] insecure directories you can set the variable ZSH_DISABLE_COMPFIX to
[oh-my-zsh] "true" before oh-my-zsh is sourced in your zshrc file.

zsh compinit: insecure directories, run compaudit for list.
Ignore insecure directories and continue [y] or abort compinit [n]? 

So I responded yes, and then tried man atp.
It worked !

But this is a temporary solution because when I stop the console, I exit the debug mode and I got the same error that I got before.

So I think this is a configuration that I have to make on firejail, am I right ?

Thank you for the assistance so far @s1udge , you’ve been patient and nice.

I did reinstall parrotOS and it did the trick.
Lesson learned, never ever copy/paste bashrc/zshrc file.

Thank you for your help and sorry for wasting your time.

This topic was automatically closed 60 minutes after the last reply. New replies are no longer allowed.