[GH-ISSUE #4430] Discord doesn't start #2670

Closed
opened 2026-05-05 09:19:52 -06:00 by gitea-mirror · 17 comments
Owner

Originally created by @DatAres37 on GitHub (Jul 31, 2021).
Original GitHub issue: https://github.com/netblue30/firejail/issues/4430

I'm rather a newbie with firejail, so I hope it's not my own fault. I tried to read the docs first and looked for similar issues.

Bug and expected behavior
I tried to start Discord (Manjaro repository) and discord_arch_electron (AUR; preferably) with the default firejail profile, but non of them seem to work.

No profile and disabling firejail

  • What changed calling firejail --noprofile /path/to/program in a terminal?
  • Default Discord:
Parent pid 479722, child pid 479723
Child process initialized in 5.47 ms

Parent is shutting down, bye...
  • discord_arch_electron:
Child process initialized in 5.51 ms
[1:0731/174547.351658:FATAL:proc_util.cc(97)] Check failed: . : Permission denied (13)

Parent is shutting down, bye... 
  • What changed calling the program by path (e.g. /usr/bin/vlc)?

The applications run without a problem

Reproduce
Steps to reproduce the behavior:

  1. Run in bash firejail discord
  2. The application isn't starting
Default Discord
Reading profile /etc/firejail/discord.profile
Reading profile /etc/firejail/globals.local
Reading profile /etc/firejail/discord-common.profile
Reading profile /etc/firejail/electron.profile
Reading profile /etc/firejail/disable-common.inc
Reading profile /etc/firejail/disable-devel.inc
Reading profile /etc/firejail/disable-exec.inc
Reading profile /etc/firejail/disable-passwdmgr.inc
Reading profile /etc/firejail/disable-programs.inc
Reading profile /etc/firejail/whitelist-common.inc
Reading profile /etc/firejail/whitelist-var-common.inc
Parent pid 486527, child pid 486528
Private /opt installed in 327.82 ms
17 programs installed in 26.23 ms
Warning: skipping alternatives for private /etc
Warning: skipping crypto-policies for private /etc
Warning: skipping password for private /etc
Warning: skipping pki for private /etc
Private /etc installed in 33.17 ms
Warning: skipping alternatives for private /usr/etc
Warning: skipping ca-certificates for private /usr/etc
Warning: skipping crypto-policies for private /usr/etc
Warning: skipping fonts for private /usr/etc
Warning: skipping group for private /usr/etc
Warning: skipping ld.so.cache for private /usr/etc
Warning: skipping localtime for private /usr/etc
Warning: skipping login.defs for private /usr/etc
Warning: skipping machine-id for private /usr/etc
Warning: skipping password for private /usr/etc
Warning: skipping pki for private /usr/etc
Warning: skipping pulse for private /usr/etc
Warning: skipping resolv.conf for private /usr/etc
Warning: skipping ssl for private /usr/etc
Private /usr/etc installed in 0.16 ms
Warning: /sbin directory link was not blacklisted
Warning: /usr/sbin directory link was not blacklisted
Warning: not remounting /run/user/1000/gvfs
Warning: not remounting /run/user/1000/doc
Child process initialized in 468.64 ms

Parent is shutting down, bye...
discord_arch_electron
Reading profile /etc/firejail/discord.profile
Reading profile /etc/firejail/globals.local
Reading profile /etc/firejail/discord-common.profile
Reading profile /etc/firejail/electron.profile
Reading profile /etc/firejail/disable-common.inc
Reading profile /etc/firejail/disable-devel.inc
Reading profile /etc/firejail/disable-exec.inc
Reading profile /etc/firejail/disable-passwdmgr.inc
Reading profile /etc/firejail/disable-programs.inc
Reading profile /etc/firejail/whitelist-common.inc
Reading profile /etc/firejail/whitelist-var-common.inc
Parent pid 473030, child pid 473031
Warning: skipping discord for private /opt
Private /opt installed in 0.10 ms
17 programs installed in 27.57 ms
Warning: skipping alternatives for private /etc
Warning: skipping crypto-policies for private /etc
Warning: skipping password for private /etc
Warning: skipping pki for private /etc
Private /etc installed in 32.46 ms
Warning: skipping alternatives for private /usr/etc
Warning: skipping ca-certificates for private /usr/etc
Warning: skipping crypto-policies for private /usr/etc
Warning: skipping fonts for private /usr/etc
Warning: skipping group for private /usr/etc
Warning: skipping ld.so.cache for private /usr/etc
Warning: skipping localtime for private /usr/etc
Warning: skipping login.defs for private /usr/etc
Warning: skipping machine-id for private /usr/etc
Warning: skipping password for private /usr/etc
Warning: skipping pki for private /usr/etc
Warning: skipping pulse for private /usr/etc
Warning: skipping resolv.conf for private /usr/etc
Warning: skipping ssl for private /usr/etc
Private /usr/etc installed in 0.20 ms
Warning: /sbin directory link was not blacklisted
Warning: /usr/sbin directory link was not blacklisted
Warning: not remounting /run/user/1000/gvfs
Warning: not remounting /run/user/1000/doc
Child process initialized in 146.68 ms
/bin/discord: Line 2: exec: electron: Not found.

Parent is shutting down, bye...

When I whitelist /usr/bin/electron for discord_arch_electron it's Cannot start application: Permission denied

Environment

  • Manjaro 21.1.0
  • firejail version 0.9.66

Additional context
Apparently there is a symlink /usr/bin/discord -> /opt/discord/Discord for the default Discord installation.

Checklist

  • The profile (and redirect profile if exists) hasn't already been fixed upstream.
  • The program has a profile. (If not, request one in https://github.com/netblue30/firejail/issues/1139)
  • I have performed a short search for similar issues (to avoid opening a duplicate).
  • If it is a AppImage, --profile=PROFILENAME is used to set the right profile.
  • Used LC_ALL=en_US.UTF-8 LANG=en_US.UTF-8 PROGRAM to get english error-messages.
  • I'm aware of browser-allow-drm yes/browser-disable-u2f no in firejail.config to allow DRM/U2F in browsers.
  • This is not a question. Questions should be asked in https://github.com/netblue30/firejail/discussions.
debug output default discord
Autoselecting /bin/bash as shell
Building quoted command line: 'discord' 
Command name #discord#
Found discord.profile profile in /etc/firejail directory
Found globals.local profile in /etc/firejail directory
Found discord-common.profile profile in /etc/firejail directory
Found electron.profile profile in /etc/firejail directory
Found disable-common.inc profile in /etc/firejail directory
Found disable-devel.inc profile in /etc/firejail directory
Found disable-exec.inc profile in /etc/firejail directory
Found disable-passwdmgr.inc profile in /etc/firejail directory
Found disable-programs.inc profile in /etc/firejail directory
Found whitelist-common.inc profile in /etc/firejail directory
Found whitelist-var-common.inc profile in /etc/firejail directory
Using the local network stack
Using the local network stack
Initializing child process
PID namespace installed
Mounting tmpfs on /run/firejail/mnt directory
Creating empty /run/firejail/mnt/seccomp directory
Creating empty /run/firejail/mnt/seccomp/seccomp.protocol file
Creating empty /run/firejail/mnt/seccomp/seccomp.postexec file
Creating empty /run/firejail/mnt/seccomp/seccomp.postexec32 file
Mounting /proc filesystem representing the PID namespace
Basic read-only filesystem:
Mounting read-only /etc
2213 2180 254:0 /etc /etc ro,noatime master:1 - ext4 /dev/mapper/root rw
mountid=2213 fsname=/etc dir=/etc fstype=ext4
Mounting noexec /etc
2214 2213 254:0 /etc /etc ro,nosuid,nodev,noexec,noatime master:1 - ext4 /dev/mapper/root rw
mountid=2214 fsname=/etc dir=/etc fstype=ext4
Mounting read-only /var
2215 2180 254:0 /var /var ro,noatime master:1 - ext4 /dev/mapper/root rw
mountid=2215 fsname=/var dir=/var fstype=ext4
Mounting noexec /var
2216 2215 254:0 /var /var ro,nosuid,nodev,noexec,noatime master:1 - ext4 /dev/mapper/root rw
mountid=2216 fsname=/var dir=/var fstype=ext4
Mounting read-only /usr
2217 2180 254:0 /usr /usr ro,noatime master:1 - ext4 /dev/mapper/root rw
mountid=2217 fsname=/usr dir=/usr fstype=ext4
Mounting tmpfs on /var/lock
Mounting tmpfs on /var/tmp
Mounting tmpfs on /var/log
Create the new utmp file
Mount the new utmp file
Cleaning /home directory
Cleaning /run/user directory
Sanitizing /etc/passwd, UID_MIN 1000
Sanitizing /etc/group, GID_MIN 1000
Disable /run/firejail/network
Disable /run/firejail/bandwidth
Disable /run/firejail/name
Disable /run/firejail/profile
Disable /run/firejail/x11
Mounting tmpfs on /dev
mounting /run/firejail/mnt/dev/snd directory
mounting /run/firejail/mnt/dev/dri directory
Process /dev/shm directory
Copying files in the new /opt directory:
Copying /opt/discord to private /opt
Creating empty /run/firejail/mnt/opt/discord directory
sbox run: /run/firejail/lib/fcopy /opt/discord /run/firejail/mnt/opt/discord 
Mount-bind /run/firejail/mnt/opt on top of /opt
Copying files in the new bin directory
Checking /usr/local/bin/discord
Checking /usr/bin/discord
file /opt/discord/Discord not found
sbox run: /run/firejail/lib/fcopy /usr/bin/discord /run/firejail/mnt/bin 
Checking /usr/local/bin/bash
Checking /usr/bin/bash
sbox run: /run/firejail/lib/fcopy /usr/bin/bash /run/firejail/mnt/bin 
Checking /usr/local/bin/cut
Checking /usr/bin/cut
sbox run: /run/firejail/lib/fcopy /usr/bin/cut /run/firejail/mnt/bin 
Checking /usr/local/bin/echo
Checking /usr/bin/echo
sbox run: /run/firejail/lib/fcopy /usr/bin/echo /run/firejail/mnt/bin 
Checking /usr/local/bin/egrep
Checking /usr/bin/egrep
sbox run: /run/firejail/lib/fcopy /usr/bin/egrep /run/firejail/mnt/bin 
Checking /usr/local/bin/fish
Checking /usr/bin/fish
sbox run: /run/firejail/lib/fcopy /usr/bin/fish /run/firejail/mnt/bin 
Checking /usr/local/bin/grep
Checking /usr/bin/grep
sbox run: /run/firejail/lib/fcopy /usr/bin/grep /run/firejail/mnt/bin 
Checking /usr/local/bin/head
Checking /usr/bin/head
sbox run: /run/firejail/lib/fcopy /usr/bin/head /run/firejail/mnt/bin 
Checking /usr/local/bin/sed
Checking /usr/bin/sed
sbox run: /run/firejail/lib/fcopy /usr/bin/sed /run/firejail/mnt/bin 
Checking /usr/local/bin/sh
Checking /usr/bin/sh
sbox run: /run/firejail/lib/fcopy /usr/bin/bash /run/firejail/mnt/bin 
sbox run: /run/firejail/lib/fcopy /usr/bin/sh /run/firejail/mnt/bin 
Checking /usr/local/bin/tclsh
Checking /usr/bin/tclsh
sbox run: /run/firejail/lib/fcopy /usr/bin/tclsh8.6 /run/firejail/mnt/bin 
sbox run: /run/firejail/lib/fcopy /usr/bin/tclsh /run/firejail/mnt/bin 
Checking /usr/local/bin/tr
Checking /usr/bin/tr
sbox run: /run/firejail/lib/fcopy /usr/bin/tr /run/firejail/mnt/bin 
Checking /usr/local/bin/xdg-mime
Checking /usr/bin/xdg-mime
sbox run: /run/firejail/lib/fcopy /usr/bin/xdg-mime /run/firejail/mnt/bin 
Checking /usr/local/bin/xdg-open
Checking /usr/bin/xdg-open
sbox run: /run/firejail/lib/fcopy /usr/bin/xdg-open /run/firejail/mnt/bin 
Checking /usr/local/bin/zsh
Checking /usr/bin/zsh
sbox run: /run/firejail/lib/fcopy /usr/bin/zsh /run/firejail/mnt/bin 
Mount-bind /run/firejail/mnt/bin on top of /usr/local/bin
Mount-bind /run/firejail/mnt/bin on top of /usr/bin
Mount-bind /run/firejail/mnt/bin on top of /bin
Mount-bind /run/firejail/mnt/bin on top of /usr/local/games
Mount-bind /run/firejail/mnt/bin on top of /usr/local/sbin
Mount-bind /run/firejail/mnt/bin on top of /usr/sbin
Mount-bind /run/firejail/mnt/bin on top of /sbin
Generate private-tmp whitelist commands
blacklist /run/firejail/dbus
Mounting read-only /proc/sys
Remounting /sys directory
Disable /sys/firmware
Disable /sys/hypervisor
Disable /sys/power
Disable /sys/kernel/debug
Disable /sys/kernel/vmcoreinfo
Disable /proc/sys/fs/binfmt_misc
Disable /proc/sys/kernel/core_pattern
Disable /proc/sys/kernel/modprobe
Disable /proc/sysrq-trigger
Disable /proc/sys/vm/panic_on_oom
Disable /proc/irq
Disable /proc/bus
Disable /proc/timer_list
Disable /proc/kcore
Disable /proc/kallsyms
Disable /usr/lib/modules (requested /lib/modules)
Disable /boot
Disable /run/user/1000/gnupg
Disable /run/user/1000/systemd
Disable /proc/kmsg
Copying files in the new /etc directory:
Copying /etc/ca-certificates to private /etc
Creating empty /run/firejail/mnt/etc/ca-certificates directory
sbox run: /run/firejail/lib/fcopy /etc/ca-certificates /run/firejail/mnt/etc/ca-certificates 
Copying /etc/fonts to private /etc
Creating empty /run/firejail/mnt/etc/fonts directory
sbox run: /run/firejail/lib/fcopy /etc/fonts /run/firejail/mnt/etc/fonts 
Copying /etc/group to private /etc
sbox run: /run/firejail/lib/fcopy /etc/group /run/firejail/mnt/etc 
Copying /etc/ld.so.cache to private /etc
sbox run: /run/firejail/lib/fcopy /etc/ld.so.cache /run/firejail/mnt/etc 
Copying /etc/localtime to private /etc
sbox run: /run/firejail/lib/fcopy /etc/localtime /run/firejail/mnt/etc 
Copying /etc/login.defs to private /etc
sbox run: /run/firejail/lib/fcopy /etc/login.defs /run/firejail/mnt/etc 
Copying /etc/machine-id to private /etc
sbox run: /run/firejail/lib/fcopy /etc/machine-id /run/firejail/mnt/etc 
Copying /etc/pulse to private /etc
Creating empty /run/firejail/mnt/etc/pulse directory
sbox run: /run/firejail/lib/fcopy /etc/pulse /run/firejail/mnt/etc/pulse 
Copying /etc/resolv.conf to private /etc
sbox run: /run/firejail/lib/fcopy /etc/resolv.conf /run/firejail/mnt/etc 
Copying /etc/ssl to private /etc
Creating empty /run/firejail/mnt/etc/ssl directory
sbox run: /run/firejail/lib/fcopy /etc/ssl /run/firejail/mnt/etc/ssl 
Mount-bind /run/firejail/mnt/etc on top of /etc
Copying files in the new /usr/etc directory:
Mount-bind /run/firejail/mnt/usretc on top of /usr/etc
Debug 553: whitelist ${HOME}/.config/discord
Debug 574: expanded: /home/user/.config/discord
Debug 585: new_name: /home/user/.config/discord
Debug 599: dir: /home/user
Adding whitelist top level directory /home/user
Debug 553: whitelist ${HOME}/.config/BetterDiscord
Debug 574: expanded: /home/user/.config/BetterDiscord
Debug 585: new_name: /home/user/.config/BetterDiscord
Debug 599: dir: /home/user
Removed path: whitelist ${HOME}/.config/BetterDiscord
	expanded: /home/user/.config/BetterDiscord
	realpath: (null)
	No such file or directory
Debug 553: whitelist ${HOME}/.local/share/betterdiscordctl
Debug 574: expanded: /home/user/.local/share/betterdiscordctl
Debug 585: new_name: /home/user/.local/share/betterdiscordctl
Debug 599: dir: /home/user
Removed path: whitelist ${HOME}/.local/share/betterdiscordctl
	expanded: /home/user/.local/share/betterdiscordctl
	realpath: (null)
	No such file or directory
Debug 553: whitelist ${DOWNLOADS}
Directory ${DOWNLOADS} resolved as Downloads
Debug 574: expanded: /home/user/Downloads
Debug 585: new_name: /home/user/Downloads
Debug 599: dir: /home/user
Debug 553: whitelist ${HOME}/.XCompose
Debug 574: expanded: /home/user/.XCompose
Debug 585: new_name: /home/user/.XCompose
Debug 599: dir: /home/user
Removed path: whitelist ${HOME}/.XCompose
	expanded: /home/user/.XCompose
	realpath: (null)
	No such file or directory
Debug 553: whitelist ${HOME}/.alsaequal.bin
Debug 574: expanded: /home/user/.alsaequal.bin
Debug 585: new_name: /home/user/.alsaequal.bin
Debug 599: dir: /home/user
Removed path: whitelist ${HOME}/.alsaequal.bin
	expanded: /home/user/.alsaequal.bin
	realpath: (null)
	No such file or directory
Debug 553: whitelist ${HOME}/.asoundrc
Debug 574: expanded: /home/user/.asoundrc
Debug 585: new_name: /home/user/.asoundrc
Debug 599: dir: /home/user
Removed path: whitelist ${HOME}/.asoundrc
	expanded: /home/user/.asoundrc
	realpath: (null)
	No such file or directory
Debug 553: whitelist ${HOME}/.config/ibus
Debug 574: expanded: /home/user/.config/ibus
Debug 585: new_name: /home/user/.config/ibus
Debug 599: dir: /home/user
Removed path: whitelist ${HOME}/.config/ibus
	expanded: /home/user/.config/ibus
	realpath: (null)
	No such file or directory
Debug 553: whitelist ${HOME}/.config/mimeapps.list
Debug 574: expanded: /home/user/.config/mimeapps.list
Debug 585: new_name: /home/user/.config/mimeapps.list
Debug 599: dir: /home/user
Debug 553: whitelist ${HOME}/.config/pkcs11
Debug 574: expanded: /home/user/.config/pkcs11
Debug 585: new_name: /home/user/.config/pkcs11
Debug 599: dir: /home/user
Removed path: whitelist ${HOME}/.config/pkcs11
	expanded: /home/user/.config/pkcs11
	realpath: (null)
	No such file or directory
Debug 553: whitelist ${HOME}/.config/user-dirs.dirs
Debug 574: expanded: /home/user/.config/user-dirs.dirs
Debug 585: new_name: /home/user/.config/user-dirs.dirs
Debug 599: dir: /home/user
Debug 553: whitelist ${HOME}/.config/user-dirs.locale
Debug 574: expanded: /home/user/.config/user-dirs.locale
Debug 585: new_name: /home/user/.config/user-dirs.locale
Debug 599: dir: /home/user
Debug 553: whitelist ${HOME}/.drirc
Debug 574: expanded: /home/user/.drirc
Debug 585: new_name: /home/user/.drirc
Debug 599: dir: /home/user
Removed path: whitelist ${HOME}/.drirc
	expanded: /home/user/.drirc
	realpath: (null)
	No such file or directory
Debug 553: whitelist ${HOME}/.icons
Debug 574: expanded: /home/user/.icons
Debug 585: new_name: /home/user/.icons
Debug 599: dir: /home/user
Debug 553: whitelist ${HOME}/.local/share/applications
Debug 574: expanded: /home/user/.local/share/applications
Debug 585: new_name: /home/user/.local/share/applications
Debug 599: dir: /home/user
Debug 553: whitelist ${HOME}/.local/share/icons
Debug 574: expanded: /home/user/.local/share/icons
Debug 585: new_name: /home/user/.local/share/icons
Debug 599: dir: /home/user
Debug 553: whitelist ${HOME}/.local/share/mime
Debug 574: expanded: /home/user/.local/share/mime
Debug 585: new_name: /home/user/.local/share/mime
Debug 599: dir: /home/user
Debug 553: whitelist ${HOME}/.mime.types
Debug 574: expanded: /home/user/.mime.types
Debug 585: new_name: /home/user/.mime.types
Debug 599: dir: /home/user
Removed path: whitelist ${HOME}/.mime.types
	expanded: /home/user/.mime.types
	realpath: (null)
	No such file or directory
Debug 553: whitelist ${HOME}/.uim.d
Debug 574: expanded: /home/user/.uim.d
Debug 585: new_name: /home/user/.uim.d
Debug 599: dir: /home/user
Removed path: whitelist ${HOME}/.uim.d
	expanded: /home/user/.uim.d
	realpath: (null)
	No such file or directory
Debug 553: whitelist ${HOME}/.config/dconf
Debug 574: expanded: /home/user/.config/dconf
Debug 585: new_name: /home/user/.config/dconf
Debug 599: dir: /home/user
Debug 553: whitelist ${HOME}/.cache/fontconfig
Debug 574: expanded: /home/user/.cache/fontconfig
Debug 585: new_name: /home/user/.cache/fontconfig
Debug 599: dir: /home/user
Debug 553: whitelist ${HOME}/.config/fontconfig
Debug 574: expanded: /home/user/.config/fontconfig
Debug 585: new_name: /home/user/.config/fontconfig
Debug 599: dir: /home/user
Debug 553: whitelist ${HOME}/.fontconfig
Debug 574: expanded: /home/user/.fontconfig
Debug 585: new_name: /home/user/.fontconfig
Debug 599: dir: /home/user
Removed path: whitelist ${HOME}/.fontconfig
	expanded: /home/user/.fontconfig
	realpath: (null)
	No such file or directory
Debug 553: whitelist ${HOME}/.fonts
Debug 574: expanded: /home/user/.fonts
Debug 585: new_name: /home/user/.fonts
Debug 599: dir: /home/user
Debug 553: whitelist ${HOME}/.fonts.conf
Debug 574: expanded: /home/user/.fonts.conf
Debug 585: new_name: /home/user/.fonts.conf
Debug 599: dir: /home/user
Debug 553: whitelist ${HOME}/.fonts.conf.d
Debug 574: expanded: /home/user/.fonts.conf.d
Debug 585: new_name: /home/user/.fonts.conf.d
Debug 599: dir: /home/user
Removed path: whitelist ${HOME}/.fonts.conf.d
	expanded: /home/user/.fonts.conf.d
	realpath: (null)
	No such file or directory
Debug 553: whitelist ${HOME}/.fonts.d
Debug 574: expanded: /home/user/.fonts.d
Debug 585: new_name: /home/user/.fonts.d
Debug 599: dir: /home/user
Removed path: whitelist ${HOME}/.fonts.d
	expanded: /home/user/.fonts.d
	realpath: (null)
	No such file or directory
Debug 553: whitelist ${HOME}/.local/share/fonts
Debug 574: expanded: /home/user/.local/share/fonts
Debug 585: new_name: /home/user/.local/share/fonts
Debug 599: dir: /home/user
Removed path: whitelist ${HOME}/.local/share/fonts
	expanded: /home/user/.local/share/fonts
	realpath: (null)
	No such file or directory
Debug 553: whitelist ${HOME}/.pangorc
Debug 574: expanded: /home/user/.pangorc
Debug 585: new_name: /home/user/.pangorc
Debug 599: dir: /home/user
Removed path: whitelist ${HOME}/.pangorc
	expanded: /home/user/.pangorc
	realpath: (null)
	No such file or directory
Debug 553: whitelist ${HOME}/.config/gtk-2.0
Debug 574: expanded: /home/user/.config/gtk-2.0
Debug 585: new_name: /home/user/.config/gtk-2.0
Debug 599: dir: /home/user
Debug 553: whitelist ${HOME}/.config/gtk-3.0
Debug 574: expanded: /home/user/.config/gtk-3.0
Debug 585: new_name: /home/user/.config/gtk-3.0
Debug 599: dir: /home/user
Debug 553: whitelist ${HOME}/.config/gtk-4.0
Debug 574: expanded: /home/user/.config/gtk-4.0
Debug 585: new_name: /home/user/.config/gtk-4.0
Debug 599: dir: /home/user
Debug 553: whitelist ${HOME}/.config/gtkrc
Debug 574: expanded: /home/user/.config/gtkrc
Debug 585: new_name: /home/user/.config/gtkrc
Debug 599: dir: /home/user
Debug 553: whitelist ${HOME}/.config/gtkrc-2.0
Debug 574: expanded: /home/user/.config/gtkrc-2.0
Debug 585: new_name: /home/user/.config/gtkrc-2.0
Debug 599: dir: /home/user
Debug 553: whitelist ${HOME}/.gnome2
Debug 574: expanded: /home/user/.gnome2
Debug 585: new_name: /home/user/.gnome2
Debug 599: dir: /home/user
Removed path: whitelist ${HOME}/.gnome2
	expanded: /home/user/.gnome2
	realpath: (null)
	No such file or directory
Debug 553: whitelist ${HOME}/.gnome2-private
Debug 574: expanded: /home/user/.gnome2-private
Debug 585: new_name: /home/user/.gnome2-private
Debug 599: dir: /home/user
Removed path: whitelist ${HOME}/.gnome2-private
	expanded: /home/user/.gnome2-private
	realpath: (null)
	No such file or directory
Debug 553: whitelist ${HOME}/.gtk-2.0
Debug 574: expanded: /home/user/.gtk-2.0
Debug 585: new_name: /home/user/.gtk-2.0
Debug 599: dir: /home/user
Removed path: whitelist ${HOME}/.gtk-2.0
	expanded: /home/user/.gtk-2.0
	realpath: (null)
	No such file or directory
Debug 553: whitelist ${HOME}/.gtkrc
Debug 574: expanded: /home/user/.gtkrc
Debug 585: new_name: /home/user/.gtkrc
Debug 599: dir: /home/user
Removed path: whitelist ${HOME}/.gtkrc
	expanded: /home/user/.gtkrc
	realpath: (null)
	No such file or directory
Debug 553: whitelist ${HOME}/.gtkrc-2.0
Debug 574: expanded: /home/user/.gtkrc-2.0
Debug 585: new_name: /home/user/.gtkrc-2.0
Debug 599: dir: /home/user
Debug 553: whitelist ${HOME}/.kde/share/config/gtkrc
Debug 574: expanded: /home/user/.kde/share/config/gtkrc
Debug 585: new_name: /home/user/.kde/share/config/gtkrc
Debug 599: dir: /home/user
Removed path: whitelist ${HOME}/.kde/share/config/gtkrc
	expanded: /home/user/.kde/share/config/gtkrc
	realpath: (null)
	No such file or directory
Debug 553: whitelist ${HOME}/.kde/share/config/gtkrc-2.0
Debug 574: expanded: /home/user/.kde/share/config/gtkrc-2.0
Debug 585: new_name: /home/user/.kde/share/config/gtkrc-2.0
Debug 599: dir: /home/user
Removed path: whitelist ${HOME}/.kde/share/config/gtkrc-2.0
	expanded: /home/user/.kde/share/config/gtkrc-2.0
	realpath: (null)
	No such file or directory
Debug 553: whitelist ${HOME}/.kde4/share/config/gtkrc
Debug 574: expanded: /home/user/.kde4/share/config/gtkrc
Debug 585: new_name: /home/user/.kde4/share/config/gtkrc
Debug 599: dir: /home/user
Removed path: whitelist ${HOME}/.kde4/share/config/gtkrc
	expanded: /home/user/.kde4/share/config/gtkrc
	realpath: (null)
	No such file or directory
Debug 553: whitelist ${HOME}/.kde4/share/config/gtkrc-2.0
Debug 574: expanded: /home/user/.kde4/share/config/gtkrc-2.0
Debug 585: new_name: /home/user/.kde4/share/config/gtkrc-2.0
Debug 599: dir: /home/user
Removed path: whitelist ${HOME}/.kde4/share/config/gtkrc-2.0
	expanded: /home/user/.kde4/share/config/gtkrc-2.0
	realpath: (null)
	No such file or directory
Debug 553: whitelist ${HOME}/.local/share/themes
Debug 574: expanded: /home/user/.local/share/themes
Debug 585: new_name: /home/user/.local/share/themes
Debug 599: dir: /home/user
Removed path: whitelist ${HOME}/.local/share/themes
	expanded: /home/user/.local/share/themes
	realpath: (null)
	No such file or directory
Debug 553: whitelist ${HOME}/.themes
Debug 574: expanded: /home/user/.themes
Debug 585: new_name: /home/user/.themes
Debug 599: dir: /home/user
Removed path: whitelist ${HOME}/.themes
	expanded: /home/user/.themes
	realpath: (null)
	No such file or directory
Debug 553: whitelist ${HOME}/.cache/kioexec/krun
Debug 574: expanded: /home/user/.cache/kioexec/krun
Debug 585: new_name: /home/user/.cache/kioexec/krun
Debug 599: dir: /home/user
Debug 553: whitelist ${HOME}/.config/Kvantum
Debug 574: expanded: /home/user/.config/Kvantum
Debug 585: new_name: /home/user/.config/Kvantum
Debug 599: dir: /home/user
Debug 553: whitelist ${HOME}/.config/Trolltech.conf
Debug 574: expanded: /home/user/.config/Trolltech.conf
Debug 585: new_name: /home/user/.config/Trolltech.conf
Debug 599: dir: /home/user
Debug 553: whitelist ${HOME}/.config/QtProject.conf
Debug 574: expanded: /home/user/.config/QtProject.conf
Debug 585: new_name: /home/user/.config/QtProject.conf
Debug 599: dir: /home/user
Debug 553: whitelist ${HOME}/.config/kdeglobals
Debug 574: expanded: /home/user/.config/kdeglobals
Debug 585: new_name: /home/user/.config/kdeglobals
Debug 599: dir: /home/user
Debug 553: whitelist ${HOME}/.config/kio_httprc
Debug 574: expanded: /home/user/.config/kio_httprc
Debug 585: new_name: /home/user/.config/kio_httprc
Debug 599: dir: /home/user
Debug 553: whitelist ${HOME}/.config/kioslaverc
Debug 574: expanded: /home/user/.config/kioslaverc
Debug 585: new_name: /home/user/.config/kioslaverc
Debug 599: dir: /home/user
Debug 553: whitelist ${HOME}/.config/ksslcablacklist
Debug 574: expanded: /home/user/.config/ksslcablacklist
Debug 585: new_name: /home/user/.config/ksslcablacklist
Debug 599: dir: /home/user
Removed path: whitelist ${HOME}/.config/ksslcablacklist
	expanded: /home/user/.config/ksslcablacklist
	realpath: (null)
	No such file or directory
Debug 553: whitelist ${HOME}/.config/qt5ct
Debug 574: expanded: /home/user/.config/qt5ct
Debug 585: new_name: /home/user/.config/qt5ct
Debug 599: dir: /home/user
Removed path: whitelist ${HOME}/.config/qt5ct
	expanded: /home/user/.config/qt5ct
	realpath: (null)
	No such file or directory
Debug 553: whitelist ${HOME}/.config/qtcurve
Debug 574: expanded: /home/user/.config/qtcurve
Debug 585: new_name: /home/user/.config/qtcurve
Debug 599: dir: /home/user
Removed path: whitelist ${HOME}/.config/qtcurve
	expanded: /home/user/.config/qtcurve
	realpath: (null)
	No such file or directory
Debug 553: whitelist ${HOME}/.kde/share/config/kdeglobals
Debug 574: expanded: /home/user/.kde/share/config/kdeglobals
Debug 585: new_name: /home/user/.kde/share/config/kdeglobals
Debug 599: dir: /home/user
Removed path: whitelist ${HOME}/.kde/share/config/kdeglobals
	expanded: /home/user/.kde/share/config/kdeglobals
	realpath: (null)
	No such file or directory
Debug 553: whitelist ${HOME}/.kde/share/config/kio_httprc
Debug 574: expanded: /home/user/.kde/share/config/kio_httprc
Debug 585: new_name: /home/user/.kde/share/config/kio_httprc
Debug 599: dir: /home/user
Removed path: whitelist ${HOME}/.kde/share/config/kio_httprc
	expanded: /home/user/.kde/share/config/kio_httprc
	realpath: (null)
	No such file or directory
Debug 553: whitelist ${HOME}/.kde/share/config/kioslaverc
Debug 574: expanded: /home/user/.kde/share/config/kioslaverc
Debug 585: new_name: /home/user/.kde/share/config/kioslaverc
Debug 599: dir: /home/user
Removed path: whitelist ${HOME}/.kde/share/config/kioslaverc
	expanded: /home/user/.kde/share/config/kioslaverc
	realpath: (null)
	No such file or directory
Debug 553: whitelist ${HOME}/.kde/share/config/ksslcablacklist
Debug 574: expanded: /home/user/.kde/share/config/ksslcablacklist
Debug 585: new_name: /home/user/.kde/share/config/ksslcablacklist
Debug 599: dir: /home/user
Removed path: whitelist ${HOME}/.kde/share/config/ksslcablacklist
	expanded: /home/user/.kde/share/config/ksslcablacklist
	realpath: (null)
	No such file or directory
Debug 553: whitelist ${HOME}/.kde/share/config/oxygenrc
Debug 574: expanded: /home/user/.kde/share/config/oxygenrc
Debug 585: new_name: /home/user/.kde/share/config/oxygenrc
Debug 599: dir: /home/user
Removed path: whitelist ${HOME}/.kde/share/config/oxygenrc
	expanded: /home/user/.kde/share/config/oxygenrc
	realpath: (null)
	No such file or directory
Debug 553: whitelist ${HOME}/.kde/share/icons
Debug 574: expanded: /home/user/.kde/share/icons
Debug 585: new_name: /home/user/.kde/share/icons
Debug 599: dir: /home/user
Removed path: whitelist ${HOME}/.kde/share/icons
	expanded: /home/user/.kde/share/icons
	realpath: (null)
	No such file or directory
Debug 553: whitelist ${HOME}/.kde4/share/config/kdeglobals
Debug 574: expanded: /home/user/.kde4/share/config/kdeglobals
Debug 585: new_name: /home/user/.kde4/share/config/kdeglobals
Debug 599: dir: /home/user
Debug 553: whitelist ${HOME}/.kde4/share/config/kio_httprc
Debug 574: expanded: /home/user/.kde4/share/config/kio_httprc
Debug 585: new_name: /home/user/.kde4/share/config/kio_httprc
Debug 599: dir: /home/user
Debug 553: whitelist ${HOME}/.kde4/share/config/kioslaverc
Debug 574: expanded: /home/user/.kde4/share/config/kioslaverc
Debug 585: new_name: /home/user/.kde4/share/config/kioslaverc
Debug 599: dir: /home/user
Debug 553: whitelist ${HOME}/.kde4/share/config/ksslcablacklist
Debug 574: expanded: /home/user/.kde4/share/config/ksslcablacklist
Debug 585: new_name: /home/user/.kde4/share/config/ksslcablacklist
Debug 599: dir: /home/user
Removed path: whitelist ${HOME}/.kde4/share/config/ksslcablacklist
	expanded: /home/user/.kde4/share/config/ksslcablacklist
	realpath: (null)
	No such file or directory
Debug 553: whitelist ${HOME}/.kde4/share/config/oxygenrc
Debug 574: expanded: /home/user/.kde4/share/config/oxygenrc
Debug 585: new_name: /home/user/.kde4/share/config/oxygenrc
Debug 599: dir: /home/user
Removed path: whitelist ${HOME}/.kde4/share/config/oxygenrc
	expanded: /home/user/.kde4/share/config/oxygenrc
	realpath: (null)
	No such file or directory
Debug 553: whitelist ${HOME}/.kde4/share/icons
Debug 574: expanded: /home/user/.kde4/share/icons
Debug 585: new_name: /home/user/.kde4/share/icons
Debug 599: dir: /home/user
Removed path: whitelist ${HOME}/.kde4/share/icons
	expanded: /home/user/.kde4/share/icons
	realpath: (null)
	No such file or directory
Debug 553: whitelist ${HOME}/.local/share/qt5ct
Debug 574: expanded: /home/user/.local/share/qt5ct
Debug 585: new_name: /home/user/.local/share/qt5ct
Debug 599: dir: /home/user
Removed path: whitelist ${HOME}/.local/share/qt5ct
	expanded: /home/user/.local/share/qt5ct
	realpath: (null)
	No such file or directory
Debug 553: whitelist /var/lib/aspell
Debug 574: expanded: /var/lib/aspell
Debug 585: new_name: /var/lib/aspell
Debug 599: dir: /var
Adding whitelist top level directory /var
Removed path: whitelist /var/lib/aspell
	expanded: /var/lib/aspell
	realpath: (null)
	No such file or directory
Debug 553: whitelist /var/lib/ca-certificates
Debug 574: expanded: /var/lib/ca-certificates
Debug 585: new_name: /var/lib/ca-certificates
Debug 599: dir: /var
Removed path: whitelist /var/lib/ca-certificates
	expanded: /var/lib/ca-certificates
	realpath: (null)
	No such file or directory
Debug 553: whitelist /var/lib/dbus
Debug 574: expanded: /var/lib/dbus
Debug 585: new_name: /var/lib/dbus
Debug 599: dir: /var
Debug 553: whitelist /var/lib/menu-xdg
Debug 574: expanded: /var/lib/menu-xdg
Debug 585: new_name: /var/lib/menu-xdg
Debug 599: dir: /var
Removed path: whitelist /var/lib/menu-xdg
	expanded: /var/lib/menu-xdg
	realpath: (null)
	No such file or directory
Debug 553: whitelist /var/lib/uim
Debug 574: expanded: /var/lib/uim
Debug 585: new_name: /var/lib/uim
Debug 599: dir: /var
Removed path: whitelist /var/lib/uim
	expanded: /var/lib/uim
	realpath: (null)
	No such file or directory
Debug 553: whitelist /var/cache/fontconfig
Debug 574: expanded: /var/cache/fontconfig
Debug 585: new_name: /var/cache/fontconfig
Debug 599: dir: /var
Debug 553: whitelist /var/tmp
Debug 574: expanded: /var/tmp
Debug 585: new_name: /var/tmp
Debug 599: dir: /var
Debug 553: whitelist /var/run
Debug 574: expanded: /var/run
Debug 585: new_name: /var/run
Debug 599: dir: /var
Debug 553: whitelist /var/lock
Debug 574: expanded: /var/lock
Debug 585: new_name: /var/lock
Debug 599: dir: /var
Debug 553: whitelist /tmp/.X11-unix
Debug 574: expanded: /tmp/.X11-unix
Debug 585: new_name: /tmp/.X11-unix
Debug 599: dir: /tmp
Adding whitelist top level directory /tmp
Mounting tmpfs on /var, check owner: no
2275 2216 0:121 / /var rw,nosuid,nodev,noexec,noatime - tmpfs tmpfs rw,mode=755,inode64
mountid=2275 fsname=/ dir=/var fstype=tmpfs
Mounting tmpfs on /tmp, check owner: no
2276 2208 0:122 / /tmp rw,nosuid,nodev,relatime - tmpfs tmpfs rw,inode64
mountid=2276 fsname=/ dir=/tmp fstype=tmpfs
Mounting a new /root directory
Mounting a new /home directory
Create a new user directory
Debug 735: file: /home/user/.config/discord; dirfd: 4; topdir: /home/user; rel: .config/discord
Whitelisting /home/user/.config/discord
2279 2278 254:0 /home/user/.config/discord /home/user/.config/discord rw,noatime master:1 - ext4 /dev/mapper/root rw
mountid=2279 fsname=/home/user/.config/discord dir=/home/user/.config/discord fstype=ext4
Debug 735: file: /home/user/Downloads; dirfd: 4; topdir: /home/user; rel: Downloads
Whitelisting /home/user/Downloads
2280 2278 254:0 /home/user/Downloads /home/user/Downloads rw,noatime master:1 - ext4 /dev/mapper/root rw
mountid=2280 fsname=/home/user/Downloads dir=/home/user/Downloads fstype=ext4
Debug 735: file: /home/user/.config/mimeapps.list; dirfd: 4; topdir: /home/user; rel: .config/mimeapps.list
Whitelisting /home/user/.config/mimeapps.list
2281 2278 254:0 /home/user/.config/mimeapps.list /home/user/.config/mimeapps.list rw,noatime master:1 - ext4 /dev/mapper/root rw
mountid=2281 fsname=/home/user/.config/mimeapps.list dir=/home/user/.config/mimeapps.list fstype=ext4
Debug 735: file: /home/user/.config/user-dirs.dirs; dirfd: 4; topdir: /home/user; rel: .config/user-dirs.dirs
Whitelisting /home/user/.config/user-dirs.dirs
2282 2278 254:0 /home/user/.config/user-dirs.dirs /home/user/.config/user-dirs.dirs rw,noatime master:1 - ext4 /dev/mapper/root rw
mountid=2282 fsname=/home/user/.config/user-dirs.dirs dir=/home/user/.config/user-dirs.dirs fstype=ext4
Debug 735: file: /home/user/.config/user-dirs.locale; dirfd: 4; topdir: /home/user; rel: .config/user-dirs.locale
Whitelisting /home/user/.config/user-dirs.locale
2283 2278 254:0 /home/user/.config/user-dirs.locale /home/user/.config/user-dirs.locale rw,noatime master:1 - ext4 /dev/mapper/root rw
mountid=2283 fsname=/home/user/.config/user-dirs.locale dir=/home/user/.config/user-dirs.locale fstype=ext4
Debug 735: file: /home/user/.icons; dirfd: 4; topdir: /home/user; rel: .icons
Whitelisting /home/user/.icons
2284 2278 254:0 /home/user/.icons /home/user/.icons rw,noatime master:1 - ext4 /dev/mapper/root rw
mountid=2284 fsname=/home/user/.icons dir=/home/user/.icons fstype=ext4
Debug 735: file: /home/user/.local/share/applications; dirfd: 4; topdir: /home/user; rel: .local/share/applications
Whitelisting /home/user/.local/share/applications
2285 2278 254:0 /home/user/.local/share/applications /home/user/.local/share/applications rw,noatime master:1 - ext4 /dev/mapper/root rw
mountid=2285 fsname=/home/user/.local/share/applications dir=/home/user/.local/share/applications fstype=ext4
Debug 735: file: /home/user/.local/share/icons; dirfd: 4; topdir: /home/user; rel: .local/share/icons
Whitelisting /home/user/.local/share/icons
2286 2278 254:0 /home/user/.local/share/icons /home/user/.local/share/icons rw,noatime master:1 - ext4 /dev/mapper/root rw
mountid=2286 fsname=/home/user/.local/share/icons dir=/home/user/.local/share/icons fstype=ext4
Debug 735: file: /home/user/.local/share/mime; dirfd: 4; topdir: /home/user; rel: .local/share/mime
Whitelisting /home/user/.local/share/mime
2287 2278 254:0 /home/user/.local/share/mime /home/user/.local/share/mime rw,noatime master:1 - ext4 /dev/mapper/root rw
mountid=2287 fsname=/home/user/.local/share/mime dir=/home/user/.local/share/mime fstype=ext4
Debug 735: file: /home/user/.config/dconf; dirfd: 4; topdir: /home/user; rel: .config/dconf
Whitelisting /home/user/.config/dconf
2288 2278 254:0 /home/user/.config/dconf /home/user/.config/dconf rw,noatime master:1 - ext4 /dev/mapper/root rw
mountid=2288 fsname=/home/user/.config/dconf dir=/home/user/.config/dconf fstype=ext4
Debug 735: file: /home/user/.cache/fontconfig; dirfd: 4; topdir: /home/user; rel: .cache/fontconfig
Whitelisting /home/user/.cache/fontconfig
2289 2278 254:0 /home/user/.cache/fontconfig /home/user/.cache/fontconfig rw,noatime master:1 - ext4 /dev/mapper/root rw
mountid=2289 fsname=/home/user/.cache/fontconfig dir=/home/user/.cache/fontconfig fstype=ext4
Debug 735: file: /home/user/.config/fontconfig; dirfd: 4; topdir: /home/user; rel: .config/fontconfig
Whitelisting /home/user/.config/fontconfig
2290 2278 254:0 /home/user/.config/fontconfig /home/user/.config/fontconfig rw,noatime master:1 - ext4 /dev/mapper/root rw
mountid=2290 fsname=/home/user/.config/fontconfig dir=/home/user/.config/fontconfig fstype=ext4
Debug 735: file: /home/user/.fonts; dirfd: 4; topdir: /home/user; rel: .fonts
Whitelisting /home/user/.fonts
2291 2278 254:0 /home/user/.fonts /home/user/.fonts rw,noatime master:1 - ext4 /dev/mapper/root rw
mountid=2291 fsname=/home/user/.fonts dir=/home/user/.fonts fstype=ext4
Debug 735: file: /home/user/.config/fontconfig/fonts.conf; dirfd: 4; topdir: /home/user; rel: .config/fontconfig/fonts.conf
Created symbolic link /home/user/.fonts.conf -> /home/user/.config/fontconfig/fonts.conf
Debug 735: file: /home/user/.config/gtk-2.0; dirfd: 4; topdir: /home/user; rel: .config/gtk-2.0
Whitelisting /home/user/.config/gtk-2.0
2292 2278 254:0 /home/user/.config/gtk-2.0 /home/user/.config/gtk-2.0 rw,noatime master:1 - ext4 /dev/mapper/root rw
mountid=2292 fsname=/home/user/.config/gtk-2.0 dir=/home/user/.config/gtk-2.0 fstype=ext4
Debug 735: file: /home/user/.config/gtk-3.0; dirfd: 4; topdir: /home/user; rel: .config/gtk-3.0
Whitelisting /home/user/.config/gtk-3.0
2293 2278 254:0 /home/user/.config/gtk-3.0 /home/user/.config/gtk-3.0 rw,noatime master:1 - ext4 /dev/mapper/root rw
mountid=2293 fsname=/home/user/.config/gtk-3.0 dir=/home/user/.config/gtk-3.0 fstype=ext4
Debug 735: file: /home/user/.config/gtk-4.0; dirfd: 4; topdir: /home/user; rel: .config/gtk-4.0
Whitelisting /home/user/.config/gtk-4.0
2294 2278 254:0 /home/user/.config/gtk-4.0 /home/user/.config/gtk-4.0 rw,noatime master:1 - ext4 /dev/mapper/root rw
mountid=2294 fsname=/home/user/.config/gtk-4.0 dir=/home/user/.config/gtk-4.0 fstype=ext4
Debug 735: file: /home/user/.config/gtkrc; dirfd: 4; topdir: /home/user; rel: .config/gtkrc
Whitelisting /home/user/.config/gtkrc
2295 2278 254:0 /home/user/.config/gtkrc /home/user/.config/gtkrc rw,noatime master:1 - ext4 /dev/mapper/root rw
mountid=2295 fsname=/home/user/.config/gtkrc dir=/home/user/.config/gtkrc fstype=ext4
Debug 735: file: /home/user/.config/gtkrc-2.0; dirfd: 4; topdir: /home/user; rel: .config/gtkrc-2.0
Whitelisting /home/user/.config/gtkrc-2.0
2296 2278 254:0 /home/user/.config/gtkrc-2.0 /home/user/.config/gtkrc-2.0 rw,noatime master:1 - ext4 /dev/mapper/root rw
mountid=2296 fsname=/home/user/.config/gtkrc-2.0 dir=/home/user/.config/gtkrc-2.0 fstype=ext4
Debug 735: file: /home/user/.gtkrc-2.0; dirfd: 4; topdir: /home/user; rel: .gtkrc-2.0
Whitelisting /home/user/.gtkrc-2.0
2297 2278 254:0 /home/user/.gtkrc-2.0 /home/user/.gtkrc-2.0 rw,noatime master:1 - ext4 /dev/mapper/root rw
mountid=2297 fsname=/home/user/.gtkrc-2.0 dir=/home/user/.gtkrc-2.0 fstype=ext4
Debug 735: file: /home/user/.cache/kioexec/krun; dirfd: 4; topdir: /home/user; rel: .cache/kioexec/krun
Whitelisting /home/user/.cache/kioexec/krun
2298 2278 254:0 /home/user/.cache/kioexec/krun /home/user/.cache/kioexec/krun rw,noatime master:1 - ext4 /dev/mapper/root rw
mountid=2298 fsname=/home/user/.cache/kioexec/krun dir=/home/user/.cache/kioexec/krun fstype=ext4
Debug 735: file: /home/user/.config/Kvantum; dirfd: 4; topdir: /home/user; rel: .config/Kvantum
Whitelisting /home/user/.config/Kvantum
2299 2278 254:0 /home/user/.config/Kvantum /home/user/.config/Kvantum rw,noatime master:1 - ext4 /dev/mapper/root rw
mountid=2299 fsname=/home/user/.config/Kvantum dir=/home/user/.config/Kvantum fstype=ext4
Debug 735: file: /home/user/.config/Trolltech.conf; dirfd: 4; topdir: /home/user; rel: .config/Trolltech.conf
Whitelisting /home/user/.config/Trolltech.conf
2300 2278 254:0 /home/user/.config/Trolltech.conf /home/user/.config/Trolltech.conf rw,noatime master:1 - ext4 /dev/mapper/root rw
mountid=2300 fsname=/home/user/.config/Trolltech.conf dir=/home/user/.config/Trolltech.conf fstype=ext4
Debug 735: file: /home/user/.config/QtProject.conf; dirfd: 4; topdir: /home/user; rel: .config/QtProject.conf
Whitelisting /home/user/.config/QtProject.conf
2301 2278 254:0 /home/user/.config/QtProject.conf /home/user/.config/QtProject.conf rw,noatime master:1 - ext4 /dev/mapper/root rw
mountid=2301 fsname=/home/user/.config/QtProject.conf dir=/home/user/.config/QtProject.conf fstype=ext4
Debug 735: file: /home/user/.config/kdeglobals; dirfd: 4; topdir: /home/user; rel: .config/kdeglobals
Whitelisting /home/user/.config/kdeglobals
2302 2278 254:0 /home/user/.config/kdeglobals /home/user/.config/kdeglobals rw,noatime master:1 - ext4 /dev/mapper/root rw
mountid=2302 fsname=/home/user/.config/kdeglobals dir=/home/user/.config/kdeglobals fstype=ext4
Debug 735: file: /home/user/.config/kio_httprc; dirfd: 4; topdir: /home/user; rel: .config/kio_httprc
Whitelisting /home/user/.config/kio_httprc
2303 2278 254:0 /home/user/.config/kio_httprc /home/user/.config/kio_httprc rw,noatime master:1 - ext4 /dev/mapper/root rw
mountid=2303 fsname=/home/user/.config/kio_httprc dir=/home/user/.config/kio_httprc fstype=ext4
Debug 735: file: /home/user/.config/kioslaverc; dirfd: 4; topdir: /home/user; rel: .config/kioslaverc
Whitelisting /home/user/.config/kioslaverc
2304 2278 254:0 /home/user/.config/kioslaverc /home/user/.config/kioslaverc rw,noatime master:1 - ext4 /dev/mapper/root rw
mountid=2304 fsname=/home/user/.config/kioslaverc dir=/home/user/.config/kioslaverc fstype=ext4
Debug 735: file: /home/user/.kde4/share/config/kdeglobals; dirfd: 4; topdir: /home/user; rel: .kde4/share/config/kdeglobals
Whitelisting /home/user/.kde4/share/config/kdeglobals
2305 2278 254:0 /home/user/.kde4/share/config/kdeglobals /home/user/.kde4/share/config/kdeglobals rw,noatime master:1 - ext4 /dev/mapper/root rw
mountid=2305 fsname=/home/user/.kde4/share/config/kdeglobals dir=/home/user/.kde4/share/config/kdeglobals fstype=ext4
Debug 735: file: /home/user/.kde4/share/config/kio_httprc; dirfd: 4; topdir: /home/user; rel: .kde4/share/config/kio_httprc
Whitelisting /home/user/.kde4/share/config/kio_httprc
2306 2278 254:0 /home/user/.kde4/share/config/kio_httprc /home/user/.kde4/share/config/kio_httprc rw,noatime master:1 - ext4 /dev/mapper/root rw
mountid=2306 fsname=/home/user/.kde4/share/config/kio_httprc dir=/home/user/.kde4/share/config/kio_httprc fstype=ext4
Debug 735: file: /home/user/.kde4/share/config/kioslaverc; dirfd: 4; topdir: /home/user; rel: .kde4/share/config/kioslaverc
Whitelisting /home/user/.kde4/share/config/kioslaverc
2307 2278 254:0 /home/user/.kde4/share/config/kioslaverc /home/user/.kde4/share/config/kioslaverc rw,noatime master:1 - ext4 /dev/mapper/root rw
mountid=2307 fsname=/home/user/.kde4/share/config/kioslaverc dir=/home/user/.kde4/share/config/kioslaverc fstype=ext4
Debug 735: file: /var/lib/dbus; dirfd: 5; topdir: /var; rel: lib/dbus
Whitelisting /var/lib/dbus
2308 2275 254:0 /var/lib/dbus /var/lib/dbus ro,nosuid,nodev,noexec,noatime master:1 - ext4 /dev/mapper/root rw
mountid=2308 fsname=/var/lib/dbus dir=/var/lib/dbus fstype=ext4
Debug 735: file: /var/cache/fontconfig; dirfd: 5; topdir: /var; rel: cache/fontconfig
Whitelisting /var/cache/fontconfig
2309 2275 254:0 /var/cache/fontconfig /var/cache/fontconfig ro,nosuid,nodev,noexec,noatime master:1 - ext4 /dev/mapper/root rw
mountid=2309 fsname=/var/cache/fontconfig dir=/var/cache/fontconfig fstype=ext4
Debug 735: file: /var/tmp; dirfd: 5; topdir: /var; rel: tmp
Whitelisting /var/tmp
2310 2275 0:95 / /var/tmp rw,nosuid,nodev,noexec - tmpfs tmpfs rw,inode64
mountid=2310 fsname=/ dir=/var/tmp fstype=tmpfs
Created symbolic link /var/run -> /run
Created symbolic link /var/lock -> /run/lock
Debug 735: file: /tmp/.X11-unix; dirfd: 7; topdir: /tmp; rel: .X11-unix
Whitelisting /tmp/.X11-unix
2311 2276 0:38 /.X11-unix /tmp/.X11-unix rw,nosuid,nodev,relatime master:81 - tmpfs tmpfs rw,size=10485760k,inode64
mountid=2311 fsname=/.X11-unix dir=/tmp/.X11-unix fstype=tmpfs
Disable /data
Mounting read-only /home/user/.Xauthority
2313 2278 0:125 /user/.Xauthority /home/user/.Xauthority ro,nosuid,nodev,noexec - tmpfs tmpfs rw,mode=755,inode64
mountid=2313 fsname=/user/.Xauthority dir=/home/user/.Xauthority fstype=tmpfs
Mounting read-only /home/user/.config/kdeglobals
2314 2302 254:0 /home/user/.config/kdeglobals /home/user/.config/kdeglobals ro,noatime master:1 - ext4 /dev/mapper/root rw
mountid=2314 fsname=/home/user/.config/kdeglobals dir=/home/user/.config/kdeglobals fstype=ext4
Mounting read-only /home/user/.config/kio_httprc
2315 2303 254:0 /home/user/.config/kio_httprc /home/user/.config/kio_httprc ro,noatime master:1 - ext4 /dev/mapper/root rw
mountid=2315 fsname=/home/user/.config/kio_httprc dir=/home/user/.config/kio_httprc fstype=ext4
Mounting read-only /home/user/.config/kioslaverc
2316 2304 254:0 /home/user/.config/kioslaverc /home/user/.config/kioslaverc ro,noatime master:1 - ext4 /dev/mapper/root rw
mountid=2316 fsname=/home/user/.config/kioslaverc dir=/home/user/.config/kioslaverc fstype=ext4
Mounting read-only /home/user/.kde4/share/config/kdeglobals
2317 2305 254:0 /home/user/.kde4/share/config/kdeglobals /home/user/.kde4/share/config/kdeglobals ro,noatime master:1 - ext4 /dev/mapper/root rw
mountid=2317 fsname=/home/user/.kde4/share/config/kdeglobals dir=/home/user/.kde4/share/config/kdeglobals fstype=ext4
Mounting read-only /home/user/.kde4/share/config/kio_httprc
2318 2306 254:0 /home/user/.kde4/share/config/kio_httprc /home/user/.kde4/share/config/kio_httprc ro,noatime master:1 - ext4 /dev/mapper/root rw
mountid=2318 fsname=/home/user/.kde4/share/config/kio_httprc dir=/home/user/.kde4/share/config/kio_httprc fstype=ext4
Mounting read-only /home/user/.kde4/share/config/kioslaverc
2319 2307 254:0 /home/user/.kde4/share/config/kioslaverc /home/user/.kde4/share/config/kioslaverc ro,noatime master:1 - ext4 /dev/mapper/root rw
mountid=2319 fsname=/home/user/.kde4/share/config/kioslaverc dir=/home/user/.kde4/share/config/kioslaverc fstype=ext4
Disable /run/user/1000/klauncherqDGjjZ.1.slave-socket
Disable /run/user/1000/klauncherWjdCXV.1.slave-socket
Disable /run/user/1000/klauncherjrSMBI.1.slave-socket
Disable /run/user/1000/kdeinit5__0
Mounting read-only /home/user/.config/dconf
2324 2288 254:0 /home/user/.config/dconf /home/user/.config/dconf ro,noatime master:1 - ext4 /dev/mapper/root rw
mountid=2324 fsname=/home/user/.config/dconf dir=/home/user/.config/dconf fstype=ext4
Disable /run/user/1000/systemd
Disable /usr/share/applications/veracrypt.desktop
Disable /usr/share/pixmaps/veracrypt.xpm
Disable /run/screens (requested /var/run/screens)
Mounting read-only /home/user/.local/share/applications
2329 2285 254:0 /home/user/.local/share/applications /home/user/.local/share/applications ro,noatime master:1 - ext4 /dev/mapper/root rw
mountid=2329 fsname=/home/user/.local/share/applications dir=/home/user/.local/share/applications fstype=ext4
Mounting read-only /home/user/.config/mimeapps.list
2330 2281 254:0 /home/user/.config/mimeapps.list /home/user/.config/mimeapps.list ro,noatime master:1 - ext4 /dev/mapper/root rw
mountid=2330 fsname=/home/user/.config/mimeapps.list dir=/home/user/.config/mimeapps.list fstype=ext4
Mounting read-only /home/user/.config/user-dirs.dirs
2331 2282 254:0 /home/user/.config/user-dirs.dirs /home/user/.config/user-dirs.dirs ro,noatime master:1 - ext4 /dev/mapper/root rw
mountid=2331 fsname=/home/user/.config/user-dirs.dirs dir=/home/user/.config/user-dirs.dirs fstype=ext4
Mounting read-only /home/user/.config/user-dirs.locale
2332 2283 254:0 /home/user/.config/user-dirs.locale /home/user/.config/user-dirs.locale ro,noatime master:1 - ext4 /dev/mapper/root rw
mountid=2332 fsname=/home/user/.config/user-dirs.locale dir=/home/user/.config/user-dirs.locale fstype=ext4
Mounting read-only /home/user/.local/share/mime
2333 2287 254:0 /home/user/.local/share/mime /home/user/.local/share/mime ro,noatime master:1 - ext4 /dev/mapper/root rw
mountid=2333 fsname=/home/user/.local/share/mime dir=/home/user/.local/share/mime fstype=ext4
Disable /usr/local/sbin
Warning (blacklisting): cannot open /usr/local/sbin/at: Permission denied
Warning (blacklisting): cannot open /usr/local/sbin/busybox: Permission denied
Warning (blacklisting): cannot open /usr/local/sbin/chage: Permission denied
Warning (blacklisting): cannot open /usr/local/sbin/chfn: Permission denied
Warning (blacklisting): cannot open /usr/local/sbin/chsh: Permission denied
Warning (blacklisting): cannot open /usr/local/sbin/crontab: Permission denied
Warning (blacklisting): cannot open /usr/local/sbin/evtest: Permission denied
Warning (blacklisting): cannot open /usr/local/sbin/expiry: Permission denied
Warning (blacklisting): cannot open /usr/local/sbin/fusermount: Permission denied
Warning (blacklisting): cannot open /usr/local/sbin/gksu: Permission denied
Warning (blacklisting): cannot open /usr/local/sbin/gksudo: Permission denied
Warning (blacklisting): cannot open /usr/local/sbin/gpasswd: Permission denied
Warning (blacklisting): cannot open /usr/local/sbin/kdesudo: Permission denied
Warning (blacklisting): cannot open /usr/local/sbin/ksu: Permission denied
Warning (blacklisting): cannot open /usr/local/sbin/mount: Permission denied
Warning (blacklisting): cannot open /usr/local/sbin/mount.ecryptfs_private: Permission denied
Warning (blacklisting): cannot open /usr/local/sbin/nc: Permission denied
Warning (blacklisting): cannot open /usr/local/sbin/ncat: Permission denied
Warning (blacklisting): cannot open /usr/local/sbin/nmap: Permission denied
Warning (blacklisting): cannot open /usr/local/sbin/newgidmap: Permission denied
Warning (blacklisting): cannot open /usr/local/sbin/newgrp: Permission denied
Warning (blacklisting): cannot open /usr/local/sbin/newuidmap: Permission denied
Warning (blacklisting): cannot open /usr/local/sbin/ntfs-3g: Permission denied
Warning (blacklisting): cannot open /usr/local/sbin/pkexec: Permission denied
Warning (blacklisting): cannot open /usr/local/sbin/procmail: Permission denied
Warning (blacklisting): cannot open /usr/local/sbin/sg: Permission denied
Warning (blacklisting): cannot open /usr/local/sbin/strace: Permission denied
Warning (blacklisting): cannot open /usr/local/sbin/su: Permission denied
Warning (blacklisting): cannot open /usr/local/sbin/sudo: Permission denied
Warning (blacklisting): cannot open /usr/local/sbin/tcpdump: Permission denied
Warning (blacklisting): cannot open /usr/local/sbin/umount: Permission denied
Warning (blacklisting): cannot open /usr/local/sbin/unix_chkpwd: Permission denied
Warning (blacklisting): cannot open /usr/local/sbin/xev: Permission denied
Warning (blacklisting): cannot open /usr/local/sbin/xinput: Permission denied
Warning (blacklisting): cannot open /usr/local/sbin/lxterminal: Permission denied
Warning (blacklisting): cannot open /usr/local/sbin/gnome-terminal: Permission denied
Warning (blacklisting): cannot open /usr/local/sbin/gnome-terminal.wrapper: Permission denied
Warning (blacklisting): cannot open /usr/local/sbin/lilyterm: Permission denied
Warning (blacklisting): cannot open /usr/local/sbin/mate-terminal: Permission denied
Warning (blacklisting): cannot open /usr/local/sbin/mate-terminal.wrapper: Permission denied
Warning (blacklisting): cannot open /usr/local/sbin/pantheon-terminal: Permission denied
Warning (blacklisting): cannot open /usr/local/sbin/roxterm: Permission denied
Warning (blacklisting): cannot open /usr/local/sbin/roxterm-config: Permission denied
Warning (blacklisting): cannot open /usr/local/sbin/terminix: Permission denied
Warning (blacklisting): cannot open /usr/local/sbin/tilix: Permission denied
Warning (blacklisting): cannot open /usr/local/sbin/urxvtc: Permission denied
Warning (blacklisting): cannot open /usr/local/sbin/urxvtcd: Permission denied
Warning (blacklisting): cannot open /usr/local/sbin/xfce4-terminal: Permission denied
Warning (blacklisting): cannot open /usr/local/sbin/xfce4-terminal.wrapper: Permission denied
Warning (blacklisting): cannot access /run/user/1000/doc: Permission denied
Disable /usr/share/flatpak
Warning (blacklisting): cannot open /usr/local/sbin/bwrap: Permission denied
Disable /proc/config.gz
Warning (blacklisting): cannot open /usr/local/sbin/dig: Permission denied
Warning (blacklisting): cannot open /usr/local/sbin/dlint: Permission denied
Warning (blacklisting): cannot open /usr/local/sbin/dns2tcp: Permission denied
Warning (blacklisting): cannot open /usr/local/sbin/dnssec-*: Permission denied
Warning (blacklisting): cannot open /usr/local/sbin/dnswalk: Permission denied
Warning (blacklisting): cannot open /usr/local/sbin/drill: Permission denied
Warning (blacklisting): cannot open /usr/local/sbin/host: Permission denied
Warning (blacklisting): cannot open /usr/local/sbin/iodine: Permission denied
Warning (blacklisting): cannot open /usr/local/sbin/kdig: Permission denied
Warning (blacklisting): cannot open /usr/local/sbin/khost: Permission denied
Warning (blacklisting): cannot open /usr/local/sbin/knsupdate: Permission denied
Warning (blacklisting): cannot open /usr/local/sbin/ldns-*: Permission denied
Warning (blacklisting): cannot open /usr/local/sbin/ldnsd: Permission denied
Warning (blacklisting): cannot open /usr/local/sbin/nslookup: Permission denied
Warning (blacklisting): cannot open /usr/local/sbin/resolvectl: Permission denied
Warning (blacklisting): cannot open /usr/local/sbin/unbound-host: Permission denied
Warning (blacklisting): cannot open /usr/local/sbin/clang*: Permission denied
Warning (blacklisting): cannot open /usr/local/sbin/lldb*: Permission denied
Warning (blacklisting): cannot open /usr/local/sbin/llvm*: Permission denied
Warning (blacklisting): cannot open /usr/local/sbin/as: Permission denied
Warning (blacklisting): cannot open /usr/local/sbin/cc: Permission denied
Warning (blacklisting): cannot open /usr/local/sbin/c++*: Permission denied
Warning (blacklisting): cannot open /usr/local/sbin/c8*: Permission denied
Warning (blacklisting): cannot open /usr/local/sbin/c9*: Permission denied
Warning (blacklisting): cannot open /usr/local/sbin/cpp*: Permission denied
Warning (blacklisting): cannot open /usr/local/sbin/g++*: Permission denied
Warning (blacklisting): cannot open /usr/local/sbin/gcc*: Permission denied
Warning (blacklisting): cannot open /usr/local/sbin/gdb: Permission denied
Warning (blacklisting): cannot open /usr/local/sbin/ld: Permission denied
Warning (blacklisting): cannot open /usr/local/sbin/*-gcc*: Permission denied
Warning (blacklisting): cannot open /usr/local/sbin/*-g++*: Permission denied
Warning (blacklisting): cannot open /usr/local/sbin/*-gcc*: Permission denied
Warning (blacklisting): cannot open /usr/local/sbin/*-g++*: Permission denied
Warning (blacklisting): cannot open /usr/local/sbin/gccgo: Permission denied
Warning (blacklisting): cannot open /usr/local/sbin/go: Permission denied
Warning (blacklisting): cannot open /usr/local/sbin/gofmt: Permission denied
Warning (blacklisting): cannot open /usr/local/sbin/java: Permission denied
Disable /usr/lib/jvm/java-8-openjdk/jre/bin/java (requested /usr/lib/jvm/default/bin/java)
Warning (blacklisting): cannot open /usr/local/sbin/javac: Permission denied
Disable /usr/lib/jvm/java-8-openjdk/bin/javac (requested /usr/lib/jvm/default/bin/javac)
Disable /usr/share/java
Warning (blacklisting): cannot open /usr/local/sbin/openssl: Permission denied
Warning (blacklisting): cannot open /usr/local/sbin/openssl-1.0: Permission denied
Warning (blacklisting): cannot open /usr/local/sbin/rust-gdb: Permission denied
Warning (blacklisting): cannot open /usr/local/sbin/rust-lldb: Permission denied
Warning (blacklisting): cannot open /usr/local/sbin/rustc: Permission denied
Warning (blacklisting): cannot open /usr/local/sbin/tcc: Permission denied
Warning (blacklisting): cannot open /usr/local/sbin/x86_64-tcc: Permission denied
Warning (blacklisting): cannot open /usr/local/sbin/valgrind*: Permission denied
Disable /usr/src
Disable /usr/local/src
Disable /usr/include
Disable /usr/local/include
Mounting noexec /run/user/1000
2353 2344 0:24 /firejail/firejail.ro.file /run/user/1000/kdeinit5__0 rw,nosuid,nodev,relatime master:12 - tmpfs run rw,mode=755,inode64
mountid=2353 fsname=/firejail/firejail.ro.file dir=/run/user/1000/kdeinit5__0 fstype=tmpfs
Mounting noexec /dev/shm
2354 2244 0:99 /shm /dev/shm rw,nosuid,nodev,noexec - tmpfs tmpfs rw,mode=755,inode64
mountid=2354 fsname=/shm dir=/dev/shm fstype=tmpfs
Mounting noexec /tmp
2356 2355 0:38 /.X11-unix /tmp/.X11-unix rw,nosuid,nodev,relatime master:81 - tmpfs tmpfs rw,size=10485760k,inode64
mountid=2356 fsname=/.X11-unix dir=/tmp/.X11-unix fstype=tmpfs
Mounting noexec /tmp/.X11-unix
2357 2356 0:38 /.X11-unix /tmp/.X11-unix rw,nosuid,nodev,noexec,relatime master:81 - tmpfs tmpfs rw,size=10485760k,inode64
mountid=2357 fsname=/.X11-unix dir=/tmp/.X11-unix fstype=tmpfs
Not blacklist /home/user/.config/discord
Mounting read-only /tmp/.X11-unix
2358 2357 0:38 /.X11-unix /tmp/.X11-unix ro,nosuid,nodev,noexec,relatime master:81 - tmpfs tmpfs rw,size=10485760k,inode64
mountid=2358 fsname=/.X11-unix dir=/tmp/.X11-unix fstype=tmpfs
Disable /sys/fs
Disable /sys/module
Creating empty /home/user/.config/pulse directory
Drop privileges: pid 32, uid 1000, gid 1000, nogroun denied
Warning (blacklisting): cannot open /usr/local/sbin/nslookup: Permission denied
Warning (blacklisting): cannot open /usr/local/sbin/resolvectl: Permission denied
Warning (blacklisting): cannot open /usr/local/sbin/unbound-host: Permission denied
Warning (blacklisting): cannot open /usr/local/sbin/clang*: Permission denied
Warning (blacklisting): cannot open /usr/local/sbin/lldb*: Permission denied
Warning (blacklisting): cannot open /usr/local/sbin/llvm*: Permission denied
Warning (blacklisting): cannot open /usr/local/sbin/as: Permission denied
Warning (blacklisting): cannot open /usr/local/sbin/cc: Permission denied
Warning (blacklisting): cannot open /usr/local/sbin/c++*: Permission denied
Warning (blacklisting): cannot open /usr/local/sbin/c8*: Permission denied
Warning (blacklisting): cannot open /usr/local/sbin/c9*: Permission denied
Warning (blacklisting): cannot open /usr/local/sbin/cpp*: Permission denied
Warning (blacklisting): cannot open /usr/local/sbin/g++*: Permission denied
Warning (blacklisting): cannot open /usr/local/sbin/gcc*: Permission denied
Warning (blacklisting): cannot open /usr/local/sbin/gdb: Permission denied
Warning (blacklisting): cannot open /usr/local/sbin/ld: Permission denied
Warning (blacklisting): cannot open /usr/local/sbin/*-gcc*: Permission denied
Warning (blacklisting): cannot open /usr/local/sbin/*-g++*: Permission denied
Warning (blacklisting): cannot open /usr/local/sbin/*-gcc*: Permission denied
Warning (blacklisting): cannot open /usr/local/sbin/*-g++*: Permission denied
Warning (blacklisting): cannot open /usr/local/sbin/gccgo: Permission denied
Warning (blacklisting): cannot open /usr/local/sbin/go: Permission denied
Warning (blacklisting): cannot open /usr/local/sbin/gofmt: Permission denied
Warning (blacklisting): cannot open /usr/local/sbin/java: Permission denied
Disable /usr/lib/jvm/java-8-openjdk/jre/bin/java (requested /usr/lib/jvm/default/bin/java)
Warning (blacklisting): cannot open /usr/local/sbin/javac: Permission denied
Disable /usr/lib/jvm/java-8-openjdk/bin/javac (requested /usr/lib/jvm/default/bin/javac)
Disable /usr/share/java
Warning (blacklisting): cannot open /usr/local/sbin/openssl: Permission denied
Warning (blacklisting): cannot open /usr/local/sbin/openssl-1.0: Permission denied
Warning (blacklisting): cannot open /usr/local/sbin/rust-gdb: Permission denied
Warning (blacklisting): cannot open /usr/local/sbin/rust-lldb: Permission denied
Warning (blacklisting): cannot open /usr/local/sbin/rustc: Permission denied
Warning (blacklisting): cannot open /usr/local/sbin/tcc: Permission denied
Warning (blacklisting): cannot open /usr/local/sbin/x86_64-tcc: Permission denied
Warning (blacklisting): cannot open /usr/local/sbin/valgrind*: Permission denied
Disable /usr/src
Disable /usr/local/src
Disable /usr/include
Disable /usr/local/include
Mounting noexec /run/user/1000
2353 2344 0:24 /firejail/firejail.ro.file /run/user/1000/kdeinit5__0 rw,nosuid,nodev,relatime master:12 - tmpfs run rw,mode=755,inode64
mountid=2353 fsname=/firejail/firejail.ro.file dir=/run/user/1000/kdeinit5__0 fstype=tmpfs
Mounting noexec /dev/shm
2354 2244 0:99 /shm /dev/shm rw,nosuid,nodev,noexec - tmpfs tmpfs rw,mode=755,inode64
mountid=2354 fsname=/shm dir=/dev/shm fstype=tmpfs
Mounting noexec /tmp
2356 2355 0:38 /.X11-unix /tmp/.X11-unix rw,nosuid,nodev,relatime master:81 - tmpfs tmpfs rw,size=10485760k,inode64
mountid=2356 fsname=/.X11-unix dir=/tmp/.X11-unix fstype=tmpfs
Mounting noexec /tmp/.X11-unix
2357 2356 0:38 /.X11-unix /tmp/.X11-unix rw,nosuid,nodev,noexec,relatime master:81 - tmpfs tmpfs rw,size=10485760k,inode64
mountid=2357 fsname=/.X11-unix dir=/tmp/.X11-unix fstype=tmpfs
Not blacklist /home/user/.config/discord
Mounting read-only /tmp/.X11-unix
2358 2357 0:38 /.X11-unix /tmp/.X11-unix ro,nosuid,nodev,noexec,relatime master:81 - tmpfs tmpfs rw,size=10485760k,inode64
mountid=2358 fsname=/.X11-unix dir=/tmp/.X11-unix fstype=tmpfs
Disable /sys/fs
Disable /sys/module
Creating empty /home/user/.config/pulse directory
Mounting noexec /run/firejail/mnt/pulse
2361 2210 0:92 /pulse /run/firejail/mnt/pulse rw,nosuid,nodev,noexec - tmpfs tmpfs rw,mode=755,inode64
mountid=2361 fsname=/pulse dir=/run/firejail/mnt/pulse fstype=tmpfs
Mounting /run/firejail/mnt/pulse on /home/user/.config/pulse
2362 2278 0:92 /pulse /home/user/.config/pulse rw,nosuid,nodev,noexec - tmpfs tmpfs rw,mode=755,inode64
mountid=2362 fsname=/pulse dir=/home/user/.config/pulse fstype=tmpfs
Current directory: /home/user
Mounting read-only /run/firejail/mnt/seccomp
2364 2210 0:92 /seccomp /run/firejail/mnt/seccomp ro,nosuid - tmpfs tmpfs rw,mode=755,inode64
mountid=2364 fsname=/seccomp dir=/run/firejail/mnt/seccomp fstype=tmpfs
Seccomp directory:
ls /run/firejail/mnt/seccomp
drwxr-xr-x root     root             120 .
drwxr-xr-x root     root             300 ..
-rw-r--r-- 1000     user             568 seccomp
-rw-r--r-- 1000     user             432 seccomp.32
-rw-r--r-- 1000     user               0 seccomp.postexec
-rw-r--r-- 1000     user               0 seccomp.postexec32
No active seccomp files
Set caps filter 240000
Drop privileges: pid 1, uid 1000, gid 1000, nogroups 1
No supplementary groups
Starting application
LD_PRELOAD=(null)
execvp argument 0: discord

debug output discord_arch_electron
Autoselecting /bin/bash as shell
Building quoted command line: 'discord' 
Command name #discord#
Found discord.profile profile in /etc/firejail directory
Found discord.local profile in /etc/firejail directory
Found globals.local profile in /etc/firejail directory
Found discord-common.profile profile in /etc/firejail directory
Found electron.profile profile in /etc/firejail directory
Found disable-common.inc profile in /etc/firejail directory
Found disable-devel.inc profile in /etc/firejail directory
Found disable-exec.inc profile in /etc/firejail directory
Found disable-passwdmgr.inc profile in /etc/firejail directory
Found disable-programs.inc profile in /etc/firejail directory
Found whitelist-common.inc profile in /etc/firejail directory
Found whitelist-var-common.inc profile in /etc/firejail directory
Using the local network stack
Using the local network stack
Initializing child process
PID namespace installed
Mounting tmpfs on /run/firejail/mnt directory
Creating empty /run/firejail/mnt/seccomp directory
Creating empty /run/firejail/mnt/seccomp/seccomp.protocol file
Creating empty /run/firejail/mnt/seccomp/seccomp.postexec file
Creating empty /run/firejail/mnt/seccomp/seccomp.postexec32 file
Mounting /proc filesystem representing the PID namespace
Basic read-only filesystem:
Mounting read-only /etc
2207 1306 254:0 /etc /etc ro,noatime master:1 - ext4 /dev/mapper/root rw
mountid=2207 fsname=/etc dir=/etc fstype=ext4
Mounting noexec /etc
2208 2207 254:0 /etc /etc ro,nosuid,nodev,noexec,noatime master:1 - ext4 /dev/mapper/root rw
mountid=2208 fsname=/etc dir=/etc fstype=ext4
Mounting read-only /var
2209 1306 254:0 /var /var ro,noatime master:1 - ext4 /dev/mapper/root rw
mountid=2209 fsname=/var dir=/var fstype=ext4
Mounting noexec /var
2210 2209 254:0 /var /var ro,nosuid,nodev,noexec,noatime master:1 - ext4 /dev/mapper/root rw
mountid=2210 fsname=/var dir=/var fstype=ext4
Mounting read-only /usr
2211 1306 254:0 /usr /usr ro,noatime master:1 - ext4 /dev/mapper/root rw
mountid=2211 fsname=/usr dir=/usr fstype=ext4
Mounting tmpfs on /var/lock
Mounting tmpfs on /var/tmp
Mounting tmpfs on /var/log
Create the new utmp file
Mount the new utmp file
Cleaning /home directory
Cleaning /run/user directory
Sanitizing /etc/passwd, UID_MIN 1000
Sanitizing /etc/group, GID_MIN 1000
Disable /run/firejail/network
Disable /run/firejail/bandwidth
Disable /run/firejail/name
Disable /run/firejail/profile
Disable /run/firejail/x11
Mounting tmpfs on /dev
mounting /run/firejail/mnt/dev/snd directory
mounting /run/firejail/mnt/dev/dri directory
Process /dev/shm directory
Copying files in the new /opt directory:
Mount-bind /run/firejail/mnt/opt on top of /opt
Copying files in the new bin directory
Checking /usr/local/bin/discord
Checking /usr/bin/discord
sbox run: /run/firejail/lib/fcopy /usr/bin/discord /run/firejail/mnt/bin 
Checking /usr/local/bin/bash
Checking /usr/bin/bash
sbox run: /run/firejail/lib/fcopy /usr/bin/bash /run/firejail/mnt/bin 
Checking /usr/local/bin/cut
Checking /usr/bin/cut
sbox run: /run/firejail/lib/fcopy /usr/bin/cut /run/firejail/mnt/bin 
Checking /usr/local/bin/echo
Checking /usr/bin/echo
sbox run: /run/firejail/lib/fcopy /usr/bin/echo /run/firejail/mnt/bin 
Checking /usr/local/bin/egrep
Checking /usr/bin/egrep
sbox run: /run/firejail/lib/fcopy /usr/bin/egrep /run/firejail/mnt/bin 
Checking /usr/local/bin/fish
Checking /usr/bin/fish
sbox run: /run/firejail/lib/fcopy /usr/bin/fish /run/firejail/mnt/bin 
Checking /usr/local/bin/grep
Checking /usr/bin/grep
sbox run: /run/firejail/lib/fcopy /usr/bin/grep /run/firejail/mnt/bin 
Checking /usr/local/bin/head
Checking /usr/bin/head
sbox run: /run/firejail/lib/fcopy /usr/bin/head /run/firejail/mnt/bin 
Checking /usr/local/bin/sed
Checking /usr/bin/sed
sbox run: /run/firejail/lib/fcopy /usr/bin/sed /run/firejail/mnt/bin 
Checking /usr/local/bin/sh
Checking /usr/bin/sh
sbox run: /run/firejail/lib/fcopy /usr/bin/bash /run/firejail/mnt/bin 
sbox run: /run/firejail/lib/fcopy /usr/bin/sh /run/firejail/mnt/bin 
Checking /usr/local/bin/tclsh
Checking /usr/bin/tclsh
sbox run: /run/firejail/lib/fcopy /usr/bin/tclsh8.6 /run/firejail/mnt/bin 
sbox run: /run/firejail/lib/fcopy /usr/bin/tclsh /run/firejail/mnt/bin 
Checking /usr/local/bin/tr
Checking /usr/bin/tr
sbox run: /run/firejail/lib/fcopy /usr/bin/tr /run/firejail/mnt/bin 
Checking /usr/local/bin/xdg-mime
Checking /usr/bin/xdg-mime
sbox run: /run/firejail/lib/fcopy /usr/bin/xdg-mime /run/firejail/mnt/bin 
Checking /usr/local/bin/xdg-open
Checking /usr/bin/xdg-open
sbox run: /run/firejail/lib/fcopy /usr/bin/xdg-open /run/firejail/mnt/bin 
Checking /usr/local/bin/zsh
Checking /usr/bin/zsh
sbox run: /run/firejail/lib/fcopy /usr/bin/zsh /run/firejail/mnt/bin 
Mount-bind /run/firejail/mnt/bin on top of /usr/local/bin
Mount-bind /run/firejail/mnt/bin on top of /usr/bin
Mount-bind /run/firejail/mnt/bin on top of /bin
Mount-bind /run/firejail/mnt/bin on top of /usr/local/games
Mount-bind /run/firejail/mnt/bin on top of /usr/local/sbin
Mount-bind /run/firejail/mnt/bin on top of /usr/sbin
Mount-bind /run/firejail/mnt/bin on top of /sbin
Generate private-tmp whitelist commands
blacklist /run/firejail/dbus
Mounting read-only /proc/sys
Remounting /sys directory
Disable /sys/firmware
Disable /sys/hypervisor
Disable /sys/power
Disable /sys/kernel/debug
Disable /sys/kernel/vmcoreinfo
Disable /proc/sys/fs/binfmt_misc
Disable /proc/sys/kernel/core_pattern
Disable /proc/sys/kernel/modprobe
Disable /proc/sysrq-trigger
Disable /proc/sys/vm/panic_on_oom
Disable /proc/irq
Disable /proc/bus
Disable /proc/timer_list
Disable /proc/kcore
Disable /proc/kallsyms
Disable /usr/lib/modules (requested /lib/modules)
Disable /boot
Disable /run/user/1000/gnupg
Disable /run/user/1000/systemd
Disable /proc/kmsg
Copying files in the new /etc directory:
Copying /etc/ca-certificates to private /etc
Creating empty /run/firejail/mnt/etc/ca-certificates directory
sbox run: /run/firejail/lib/fcopy /etc/ca-certificates /run/firejail/mnt/etc/ca-certificates 
Copying /etc/fonts to private /etc
Creating empty /run/firejail/mnt/etc/fonts directory
sbox run: /run/firejail/lib/fcopy /etc/fonts /run/firejail/mnt/etc/fonts 
Copying /etc/group to private /etc
sbox run: /run/firejail/lib/fcopy /etc/group /run/firejail/mnt/etc 
Copying /etc/ld.so.cache to private /etc
sbox run: /run/firejail/lib/fcopy /etc/ld.so.cache /run/firejail/mnt/etc 
Copying /etc/localtime to private /etc
sbox run: /run/firejail/lib/fcopy /etc/localtime /run/firejail/mnt/etc 
Copying /etc/login.defs to private /etc
sbox run: /run/firejail/lib/fcopy /etc/login.defs /run/firejail/mnt/etc 
Copying /etc/machine-id to private /etc
sbox run: /run/firejail/lib/fcopy /etc/machine-id /run/firejail/mnt/etc 
Copying /etc/pulse to private /etc
Creating empty /run/firejail/mnt/etc/pulse directory
sbox run: /run/firejail/lib/fcopy /etc/pulse /run/firejail/mnt/etc/pulse 
Copying /etc/resolv.conf to private /etc
sbox run: /run/firejail/lib/fcopy /etc/resolv.conf /run/firejail/mnt/etc 
Copying /etc/ssl to private /etc
Creating empty /run/firejail/mnt/etc/ssl directory
sbox run: /run/firejail/lib/fcopy /etc/ssl /run/firejail/mnt/etc/ssl 
Mount-bind /run/firejail/mnt/etc on top of /etc
Copying files in the new /usr/etc directory:
Mount-bind /run/firejail/mnt/usretc on top of /usr/etc
Debug 553: whitelist /usr/bin/electron
Debug 574: expanded: /usr/bin/electron
Debug 585: new_name: /usr/bin/electron
Debug 599: dir: /usr/bin
Adding whitelist top level directory /usr/bin
Removed path: whitelist /usr/bin/electron
	expanded: /usr/bin/electron
	realpath: (null)
	No such file or directory
Debug 553: whitelist ${HOME}/.config/discord
Debug 574: expanded: /home/user/.config/discord
Debug 585: new_name: /home/user/.config/discord
Debug 599: dir: /home/user
Adding whitelist top level directory /home/user
Debug 553: whitelist ${HOME}/.config/BetterDiscord
Debug 574: expanded: /home/user/.config/BetterDiscord
Debug 585: new_name: /home/user/.config/BetterDiscord
Debug 599: dir: /home/user
Removed path: whitelist ${HOME}/.config/BetterDiscord
	expanded: /home/user/.config/BetterDiscord
	realpath: (null)
	No such file or directory
Debug 553: whitelist ${HOME}/.local/share/betterdiscordctl
Debug 574: expanded: /home/user/.local/share/betterdiscordctl
Debug 585: new_name: /home/user/.local/share/betterdiscordctl
Debug 599: dir: /home/user
Removed path: whitelist ${HOME}/.local/share/betterdiscordctl
	expanded: /home/user/.local/share/betterdiscordctl
	realpath: (null)
	No such file or directory
Debug 553: whitelist ${DOWNLOADS}
Directory ${DOWNLOADS} resolved as Downloads
Debug 574: expanded: /home/user/Downloads
Debug 585: new_name: /home/user/Downloads
Debug 599: dir: /home/user
Debug 553: whitelist ${HOME}/.XCompose
Debug 574: expanded: /home/user/.XCompose
Debug 585: new_name: /home/user/.XCompose
Debug 599: dir: /home/user
Removed path: whitelist ${HOME}/.XCompose
	expanded: /home/user/.XCompose
	realpath: (null)
	No such file or directory
Debug 553: whitelist ${HOME}/.alsaequal.bin
Debug 574: expanded: /home/user/.alsaequal.bin
Debug 585: new_name: /home/user/.alsaequal.bin
Debug 599: dir: /home/user
Removed path: whitelist ${HOME}/.alsaequal.bin
	expanded: /home/user/.alsaequal.bin
	realpath: (null)
	No such file or directory
Debug 553: whitelist ${HOME}/.asoundrc
Debug 574: expanded: /home/user/.asoundrc
Debug 585: new_name: /home/user/.asoundrc
Debug 599: dir: /home/user
Removed path: whitelist ${HOME}/.asoundrc
	expanded: /home/user/.asoundrc
	realpath: (null)
	No such file or directory
Debug 553: whitelist ${HOME}/.config/ibus
Debug 574: expanded: /home/user/.config/ibus
Debug 585: new_name: /home/user/.config/ibus
Debug 599: dir: /home/user
Removed path: whitelist ${HOME}/.config/ibus
	expanded: /home/user/.config/ibus
	realpath: (null)
	No such file or directory
Debug 553: whitelist ${HOME}/.config/mimeapps.list
Debug 574: expanded: /home/user/.config/mimeapps.list
Debug 585: new_name: /home/user/.config/mimeapps.list
Debug 599: dir: /home/user
Debug 553: whitelist ${HOME}/.config/pkcs11
Debug 574: expanded: /home/user/.config/pkcs11
Debug 585: new_name: /home/user/.config/pkcs11
Debug 599: dir: /home/user
Removed path: whitelist ${HOME}/.config/pkcs11
	expanded: /home/user/.config/pkcs11
	realpath: (null)
	No such file or directory
Debug 553: whitelist ${HOME}/.config/user-dirs.dirs
Debug 574: expanded: /home/user/.config/user-dirs.dirs
Debug 585: new_name: /home/user/.config/user-dirs.dirs
Debug 599: dir: /home/user
Debug 553: whitelist ${HOME}/.config/user-dirs.locale
Debug 574: expanded: /home/user/.config/user-dirs.locale
Debug 585: new_name: /home/user/.config/user-dirs.locale
Debug 599: dir: /home/user
Debug 553: whitelist ${HOME}/.drirc
Debug 574: expanded: /home/user/.drirc
Debug 585: new_name: /home/user/.drirc
Debug 599: dir: /home/user
Removed path: whitelist ${HOME}/.drirc
	expanded: /home/user/.drirc
	realpath: (null)
	No such file or directory
Debug 553: whitelist ${HOME}/.icons
Debug 574: expanded: /home/user/.icons
Debug 585: new_name: /home/user/.icons
Debug 599: dir: /home/user
Debug 553: whitelist ${HOME}/.local/share/applications
Debug 574: expanded: /home/user/.local/share/applications
Debug 585: new_name: /home/user/.local/share/applications
Debug 599: dir: /home/user
Debug 553: whitelist ${HOME}/.local/share/icons
Debug 574: expanded: /home/user/.local/share/icons
Debug 585: new_name: /home/user/.local/share/icons
Debug 599: dir: /home/user
Debug 553: whitelist ${HOME}/.local/share/mime
Debug 574: expanded: /home/user/.local/share/mime
Debug 585: new_name: /home/user/.local/share/mime
Debug 599: dir: /home/user
Debug 553: whitelist ${HOME}/.mime.types
Debug 574: expanded: /home/user/.mime.types
Debug 585: new_name: /home/user/.mime.types
Debug 599: dir: /home/user
Removed path: whitelist ${HOME}/.mime.types
	expanded: /home/user/.mime.types
	realpath: (null)
	No such file or directory
Debug 553: whitelist ${HOME}/.uim.d
Debug 574: expanded: /home/user/.uim.d
Debug 585: new_name: /home/user/.uim.d
Debug 599: dir: /home/user
Removed path: whitelist ${HOME}/.uim.d
	expanded: /home/user/.uim.d
	realpath: (null)
	No such file or directory
Debug 553: whitelist ${HOME}/.config/dconf
Debug 574: expanded: /home/user/.config/dconf
Debug 585: new_name: /home/user/.config/dconf
Debug 599: dir: /home/user
Debug 553: whitelist ${HOME}/.cache/fontconfig
Debug 574: expanded: /home/user/.cache/fontconfig
Debug 585: new_name: /home/user/.cache/fontconfig
Debug 599: dir: /home/user
Debug 553: whitelist ${HOME}/.config/fontconfig
Debug 574: expanded: /home/user/.config/fontconfig
Debug 585: new_name: /home/user/.config/fontconfig
Debug 599: dir: /home/user
Debug 553: whitelist ${HOME}/.fontconfig
Debug 574: expanded: /home/user/.fontconfig
Debug 585: new_name: /home/user/.fontconfig
Debug 599: dir: /home/user
Removed path: whitelist ${HOME}/.fontconfig
	expanded: /home/user/.fontconfig
	realpath: (null)
	No such file or directory
Debug 553: whitelist ${HOME}/.fonts
Debug 574: expanded: /home/user/.fonts
Debug 585: new_name: /home/user/.fonts
Debug 599: dir: /home/user
Debug 553: whitelist ${HOME}/.fonts.conf
Debug 574: expanded: /home/user/.fonts.conf
Debug 585: new_name: /home/user/.fonts.conf
Debug 599: dir: /home/user
Debug 553: whitelist ${HOME}/.fonts.conf.d
Debug 574: expanded: /home/user/.fonts.conf.d
Debug 585: new_name: /home/user/.fonts.conf.d
Debug 599: dir: /home/user
Removed path: whitelist ${HOME}/.fonts.conf.d
	expanded: /home/user/.fonts.conf.d
	realpath: (null)
	No such file or directory
Debug 553: whitelist ${HOME}/.fonts.d
Debug 574: expanded: /home/user/.fonts.d
Debug 585: new_name: /home/user/.fonts.d
Debug 599: dir: /home/user
Removed path: whitelist ${HOME}/.fonts.d
	expanded: /home/user/.fonts.d
	realpath: (null)
	No such file or directory
Debug 553: whitelist ${HOME}/.local/share/fonts
Debug 574: expanded: /home/user/.local/share/fonts
Debug 585: new_name: /home/user/.local/share/fonts
Debug 599: dir: /home/user
Removed path: whitelist ${HOME}/.local/share/fonts
	expanded: /home/user/.local/share/fonts
	realpath: (null)
	No such file or directory
Debug 553: whitelist ${HOME}/.pangorc
Debug 574: expanded: /home/user/.pangorc
Debug 585: new_name: /home/user/.pangorc
Debug 599: dir: /home/user
Removed path: whitelist ${HOME}/.pangorc
	expanded: /home/user/.pangorc
	realpath: (null)
	No such file or directory
Debug 553: whitelist ${HOME}/.config/gtk-2.0
Debug 574: expanded: /home/user/.config/gtk-2.0
Debug 585: new_name: /home/user/.config/gtk-2.0
Debug 599: dir: /home/user
Debug 553: whitelist ${HOME}/.config/gtk-3.0
Debug 574: expanded: /home/user/.config/gtk-3.0
Debug 585: new_name: /home/user/.config/gtk-3.0
Debug 599: dir: /home/user
Debug 553: whitelist ${HOME}/.config/gtk-4.0
Debug 574: expanded: /home/user/.config/gtk-4.0
Debug 585: new_name: /home/user/.config/gtk-4.0
Debug 599: dir: /home/user
Debug 553: whitelist ${HOME}/.config/gtkrc
Debug 574: expanded: /home/user/.config/gtkrc
Debug 585: new_name: /home/user/.config/gtkrc
Debug 599: dir: /home/user
Debug 553: whitelist ${HOME}/.config/gtkrc-2.0
Debug 574: expanded: /home/user/.config/gtkrc-2.0
Debug 585: new_name: /home/user/.config/gtkrc-2.0
Debug 599: dir: /home/user
Debug 553: whitelist ${HOME}/.gnome2
Debug 574: expanded: /home/user/.gnome2
Debug 585: new_name: /home/user/.gnome2
Debug 599: dir: /home/user
Removed path: whitelist ${HOME}/.gnome2
	expanded: /home/user/.gnome2
	realpath: (null)
	No such file or directory
Debug 553: whitelist ${HOME}/.gnome2-private
Debug 574: expanded: /home/user/.gnome2-private
Debug 585: new_name: /home/user/.gnome2-private
Debug 599: dir: /home/user
Removed path: whitelist ${HOME}/.gnome2-private
	expanded: /home/user/.gnome2-private
	realpath: (null)
	No such file or directory
Debug 553: whitelist ${HOME}/.gtk-2.0
Debug 574: expanded: /home/user/.gtk-2.0
Debug 585: new_name: /home/user/.gtk-2.0
Debug 599: dir: /home/user
Removed path: whitelist ${HOME}/.gtk-2.0
	expanded: /home/user/.gtk-2.0
	realpath: (null)
	No such file or directory
Debug 553: whitelist ${HOME}/.gtkrc
Debug 574: expanded: /home/user/.gtkrc
Debug 585: new_name: /home/user/.gtkrc
Debug 599: dir: /home/user
Removed path: whitelist ${HOME}/.gtkrc
	expanded: /home/user/.gtkrc
	realpath: (null)
	No such file or directory
Debug 553: whitelist ${HOME}/.gtkrc-2.0
Debug 574: expanded: /home/user/.gtkrc-2.0
Debug 585: new_name: /home/user/.gtkrc-2.0
Debug 599: dir: /home/user
Debug 553: whitelist ${HOME}/.kde/share/config/gtkrc
Debug 574: expanded: /home/user/.kde/share/config/gtkrc
Debug 585: new_name: /home/user/.kde/share/config/gtkrc
Debug 599: dir: /home/user
Removed path: whitelist ${HOME}/.kde/share/config/gtkrc
	expanded: /home/user/.kde/share/config/gtkrc
	realpath: (null)
	No such file or directory
Debug 553: whitelist ${HOME}/.kde/share/config/gtkrc-2.0
Debug 574: expanded: /home/user/.kde/share/config/gtkrc-2.0
Debug 585: new_name: /home/user/.kde/share/config/gtkrc-2.0
Debug 599: dir: /home/user
Removed path: whitelist ${HOME}/.kde/share/config/gtkrc-2.0
	expanded: /home/user/.kde/share/config/gtkrc-2.0
	realpath: (null)
	No such file or directory
Debug 553: whitelist ${HOME}/.kde4/share/config/gtkrc
Debug 574: expanded: /home/user/.kde4/share/config/gtkrc
Debug 585: new_name: /home/user/.kde4/share/config/gtkrc
Debug 599: dir: /home/user
Removed path: whitelist ${HOME}/.kde4/share/config/gtkrc
	expanded: /home/user/.kde4/share/config/gtkrc
	realpath: (null)
	No such file or directory
Debug 553: whitelist ${HOME}/.kde4/share/config/gtkrc-2.0
Debug 574: expanded: /home/user/.kde4/share/config/gtkrc-2.0
Debug 585: new_name: /home/user/.kde4/share/config/gtkrc-2.0
Debug 599: dir: /home/user
Removed path: whitelist ${HOME}/.kde4/share/config/gtkrc-2.0
	expanded: /home/user/.kde4/share/config/gtkrc-2.0
	realpath: (null)
	No such file or directory
Debug 553: whitelist ${HOME}/.local/share/themes
Debug 574: expanded: /home/user/.local/share/themes
Debug 585: new_name: /home/user/.local/share/themes
Debug 599: dir: /home/user
Removed path: whitelist ${HOME}/.local/share/themes
	expanded: /home/user/.local/share/themes
	realpath: (null)
	No such file or directory
Debug 553: whitelist ${HOME}/.themes
Debug 574: expanded: /home/user/.themes
Debug 585: new_name: /home/user/.themes
Debug 599: dir: /home/user
Removed path: whitelist ${HOME}/.themes
	expanded: /home/user/.themes
	realpath: (null)
	No such file or directory
Debug 553: whitelist ${HOME}/.cache/kioexec/krun
Debug 574: expanded: /home/user/.cache/kioexec/krun
Debug 585: new_name: /home/user/.cache/kioexec/krun
Debug 599: dir: /home/user
Debug 553: whitelist ${HOME}/.config/Kvantum
Debug 574: expanded: /home/user/.config/Kvantum
Debug 585: new_name: /home/user/.config/Kvantum
Debug 599: dir: /home/user
Debug 553: whitelist ${HOME}/.config/Trolltech.conf
Debug 574: expanded: /home/user/.config/Trolltech.conf
Debug 585: new_name: /home/user/.config/Trolltech.conf
Debug 599: dir: /home/user
Debug 553: whitelist ${HOME}/.config/QtProject.conf
Debug 574: expanded: /home/user/.config/QtProject.conf
Debug 585: new_name: /home/user/.config/QtProject.conf
Debug 599: dir: /home/user
Debug 553: whitelist ${HOME}/.config/kdeglobals
Debug 574: expanded: /home/user/.config/kdeglobals
Debug 585: new_name: /home/user/.config/kdeglobals
Debug 599: dir: /home/user
Debug 553: whitelist ${HOME}/.config/kio_httprc
Debug 574: expanded: /home/user/.config/kio_httprc
Debug 585: new_name: /home/user/.config/kio_httprc
Debug 599: dir: /home/user
Debug 553: whitelist ${HOME}/.config/kioslaverc
Debug 574: expanded: /home/user/.config/kioslaverc
Debug 585: new_name: /home/user/.config/kioslaverc
Debug 599: dir: /home/user
Debug 553: whitelist ${HOME}/.config/ksslcablacklist
Debug 574: expanded: /home/user/.config/ksslcablacklist
Debug 585: new_name: /home/user/.config/ksslcablacklist
Debug 599: dir: /home/user
Removed path: whitelist ${HOME}/.config/ksslcablacklist
	expanded: /home/user/.config/ksslcablacklist
	realpath: (null)
	No such file or directory
Debug 553: whitelist ${HOME}/.config/qt5ct
Debug 574: expanded: /home/user/.config/qt5ct
Debug 585: new_name: /home/user/.config/qt5ct
Debug 599: dir: /home/user
Removed path: whitelist ${HOME}/.config/qt5ct
	expanded: /home/user/.config/qt5ct
	realpath: (null)
	No such file or directory
Debug 553: whitelist ${HOME}/.config/qtcurve
Debug 574: expanded: /home/user/.config/qtcurve
Debug 585: new_name: /home/user/.config/qtcurve
Debug 599: dir: /home/user
Removed path: whitelist ${HOME}/.config/qtcurve
	expanded: /home/user/.config/qtcurve
	realpath: (null)
	No such file or directory
Debug 553: whitelist ${HOME}/.kde/share/config/kdeglobals
Debug 574: expanded: /home/user/.kde/share/config/kdeglobals
Debug 585: new_name: /home/user/.kde/share/config/kdeglobals
Debug 599: dir: /home/user
Removed path: whitelist ${HOME}/.kde/share/config/kdeglobals
	expanded: /home/user/.kde/share/config/kdeglobals
	realpath: (null)
	No such file or directory
Debug 553: whitelist ${HOME}/.kde/share/config/kio_httprc
Debug 574: expanded: /home/user/.kde/share/config/kio_httprc
Debug 585: new_name: /home/user/.kde/share/config/kio_httprc
Debug 599: dir: /home/user
Removed path: whitelist ${HOME}/.kde/share/config/kio_httprc
	expanded: /home/user/.kde/share/config/kio_httprc
	realpath: (null)
	No such file or directory
Debug 553: whitelist ${HOME}/.kde/share/config/kioslaverc
Debug 574: expanded: /home/user/.kde/share/config/kioslaverc
Debug 585: new_name: /home/user/.kde/share/config/kioslaverc
Debug 599: dir: /home/user
Removed path: whitelist ${HOME}/.kde/share/config/kioslaverc
	expanded: /home/user/.kde/share/config/kioslaverc
	realpath: (null)
	No such file or directory
Debug 553: whitelist ${HOME}/.kde/share/config/ksslcablacklist
Debug 574: expanded: /home/user/.kde/share/config/ksslcablacklist
Debug 585: new_name: /home/user/.kde/share/config/ksslcablacklist
Debug 599: dir: /home/user
Removed path: whitelist ${HOME}/.kde/share/config/ksslcablacklist
	expanded: /home/user/.kde/share/config/ksslcablacklist
	realpath: (null)
	No such file or directory
Debug 553: whitelist ${HOME}/.kde/share/config/oxygenrc
Debug 574: expanded: /home/user/.kde/share/config/oxygenrc
Debug 585: new_name: /home/user/.kde/share/config/oxygenrc
Debug 599: dir: /home/user
Removed path: whitelist ${HOME}/.kde/share/config/oxygenrc
	expanded: /home/user/.kde/share/config/oxygenrc
	realpath: (null)
	No such file or directory
Debug 553: whitelist ${HOME}/.kde/share/icons
Debug 574: expanded: /home/user/.kde/share/icons
Debug 585: new_name: /home/user/.kde/share/icons
Debug 599: dir: /home/user
Removed path: whitelist ${HOME}/.kde/share/icons
	expanded: /home/user/.kde/share/icons
	realpath: (null)
	No such file or directory
Debug 553: whitelist ${HOME}/.kde4/share/config/kdeglobals
Debug 574: expanded: /home/user/.kde4/share/config/kdeglobals
Debug 585: new_name: /home/user/.kde4/share/config/kdeglobals
Debug 599: dir: /home/user
Debug 553: whitelist ${HOME}/.kde4/share/config/kio_httprc
Debug 574: expanded: /home/user/.kde4/share/config/kio_httprc
Debug 585: new_name: /home/user/.kde4/share/config/kio_httprc
Debug 599: dir: /home/user
Debug 553: whitelist ${HOME}/.kde4/share/config/kioslaverc
Debug 574: expanded: /home/user/.kde4/share/config/kioslaverc
Debug 585: new_name: /home/user/.kde4/share/config/kioslaverc
Debug 599: dir: /home/user
Debug 553: whitelist ${HOME}/.kde4/share/config/ksslcablacklist
Debug 574: expanded: /home/user/.kde4/share/config/ksslcablacklist
Debug 585: new_name: /home/user/.kde4/share/config/ksslcablacklist
Debug 599: dir: /home/user
Removed path: whitelist ${HOME}/.kde4/share/config/ksslcablacklist
	expanded: /home/user/.kde4/share/config/ksslcablacklist
	realpath: (null)
	No such file or directory
Debug 553: whitelist ${HOME}/.kde4/share/config/oxygenrc
Debug 574: expanded: /home/user/.kde4/share/config/oxygenrc
Debug 585: new_name: /home/user/.kde4/share/config/oxygenrc
Debug 599: dir: /home/user
Removed path: whitelist ${HOME}/.kde4/share/config/oxygenrc
	expanded: /home/user/.kde4/share/config/oxygenrc
	realpath: (null)
	No such file or directory
Debug 553: whitelist ${HOME}/.kde4/share/icons
Debug 574: expanded: /home/user/.kde4/share/icons
Debug 585: new_name: /home/user/.kde4/share/icons
Debug 599: dir: /home/user
Removed path: whitelist ${HOME}/.kde4/share/icons
	expanded: /home/user/.kde4/share/icons
	realpath: (null)
	No such file or directory
Debug 553: whitelist ${HOME}/.local/share/qt5ct
Debug 574: expanded: /home/user/.local/share/qt5ct
Debug 585: new_name: /home/user/.local/share/qt5ct
Debug 599: dir: /home/user
Removed path: whitelist ${HOME}/.local/share/qt5ct
	expanded: /home/user/.local/share/qt5ct
	realpath: (null)
	No such file or directory
Debug 553: whitelist /var/lib/aspell
Debug 574: expanded: /var/lib/aspell
Debug 585: new_name: /var/lib/aspell
Debug 599: dir: /var
Adding whitelist top level directory /var
Removed path: whitelist /var/lib/aspell
	expanded: /var/lib/aspell
	realpath: (null)
	No such file or directory
Debug 553: whitelist /var/lib/ca-certificates
Debug 574: expanded: /var/lib/ca-certificates
Debug 585: new_name: /var/lib/ca-certificates
Debug 599: dir: /var
Removed path: whitelist /var/lib/ca-certificates
	expanded: /var/lib/ca-certificates
	realpath: (null)
	No such file or directory
Debug 553: whitelist /var/lib/dbus
Debug 574: expanded: /var/lib/dbus
Debug 585: new_name: /var/lib/dbus
Debug 599: dir: /var
Debug 553: whitelist /var/lib/menu-xdg
Debug 574: expanded: /var/lib/menu-xdg
Debug 585: new_name: /var/lib/menu-xdg
Debug 599: dir: /var
Removed path: whitelist /var/lib/menu-xdg
	expanded: /var/lib/menu-xdg
	realpath: (null)
	No such file or directory
Debug 553: whitelist /var/lib/uim
Debug 574: expanded: /var/lib/uim
Debug 585: new_name: /var/lib/uim
Debug 599: dir: /var
Removed path: whitelist /var/lib/uim
	expanded: /var/lib/uim
	realpath: (null)
	No such file or directory
Debug 553: whitelist /var/cache/fontconfig
Debug 574: expanded: /var/cache/fontconfig
Debug 585: new_name: /var/cache/fontconfig
Debug 599: dir: /var
Debug 553: whitelist /var/tmp
Debug 574: expanded: /var/tmp
Debug 585: new_name: /var/tmp
Debug 599: dir: /var
Debug 553: whitelist /var/run
Debug 574: expanded: /var/run
Debug 585: new_name: /var/run
Debug 599: dir: /var
Debug 553: whitelist /var/lock
Debug 574: expanded: /var/lock
Debug 585: new_name: /var/lock
Debug 599: dir: /var
Debug 553: whitelist /tmp/.X11-unix
Debug 574: expanded: /tmp/.X11-unix
Debug 585: new_name: /tmp/.X11-unix
Debug 599: dir: /tmp
Adding whitelist top level directory /tmp
Mounting tmpfs on /usr/bin, check owner: no
2269 2253 0:121 / /usr/bin rw,nosuid,nodev,relatime - tmpfs tmpfs rw,mode=755,inode64
mountid=2269 fsname=/ dir=/usr/bin fstype=tmpfs
Mounting tmpfs on /var, check owner: no
2270 2210 0:122 / /var rw,nosuid,nodev,noexec,noatime - tmpfs tmpfs rw,mode=755,inode64
mountid=2270 fsname=/ dir=/var fstype=tmpfs
Mounting tmpfs on /tmp, check owner: no
2271 2202 0:124 / /tmp rw,nosuid,nodev,relatime - tmpfs tmpfs rw,inode64
mountid=2271 fsname=/ dir=/tmp fstype=tmpfs
Mounting a new /root directory
Mounting a new /home directory
Create a new user directory
Debug 735: file: /home/user/.config/discord; dirfd: 5; topdir: /home/user; rel: .config/discord
Whitelisting /home/user/.config/discord
2274 2273 254:0 /home/user/.config/discord /home/user/.config/discord rw,noatime master:1 - ext4 /dev/mapper/root rw
mountid=2274 fsname=/home/user/.config/discord dir=/home/user/.config/discord fstype=ext4
Debug 735: file: /home/user/Downloads; dirfd: 5; topdir: /home/user; rel: Downloads
Whitelisting /home/user/Downloads
2275 2273 254:0 /home/user/Downloads /home/user/Downloads rw,noatime master:1 - ext4 /dev/mapper/root rw
mountid=2275 fsname=/home/user/Downloads dir=/home/user/Downloads fstype=ext4
Debug 735: file: /home/user/.config/mimeapps.list; dirfd: 5; topdir: /home/user; rel: .config/mimeapps.list
Whitelisting /home/user/.config/mimeapps.list
2276 2273 254:0 /home/user/.config/mimeapps.list /home/user/.config/mimeapps.list rw,noatime master:1 - ext4 /dev/mapper/root rw
mountid=2276 fsname=/home/user/.config/mimeapps.list dir=/home/user/.config/mimeapps.list fstype=ext4
Debug 735: file: /home/user/.config/user-dirs.dirs; dirfd: 5; topdir: /home/user; rel: .config/user-dirs.dirs
Whitelisting /home/user/.config/user-dirs.dirs
2277 2273 254:0 /home/user/.config/user-dirs.dirs /home/user/.config/user-dirs.dirs rw,noatime master:1 - ext4 /dev/mapper/root rw
mountid=2277 fsname=/home/user/.config/user-dirs.dirs dir=/home/user/.config/user-dirs.dirs fstype=ext4
Debug 735: file: /home/user/.config/user-dirs.locale; dirfd: 5; topdir: /home/user; rel: .config/user-dirs.locale
Whitelisting /home/user/.config/user-dirs.locale
2278 2273 254:0 /home/user/.config/user-dirs.locale /home/user/.config/user-dirs.locale rw,noatime master:1 - ext4 /dev/mapper/root rw
mountid=2278 fsname=/home/user/.config/user-dirs.locale dir=/home/user/.config/user-dirs.locale fstype=ext4
Debug 735: file: /home/user/.icons; dirfd: 5; topdir: /home/user; rel: .icons
Whitelisting /home/user/.icons
2279 2273 254:0 /home/user/.icons /home/user/.icons rw,noatime master:1 - ext4 /dev/mapper/root rw
mountid=2279 fsname=/home/user/.icons dir=/home/user/.icons fstype=ext4
Debug 735: file: /home/user/.local/share/applications; dirfd: 5; topdir: /home/user; rel: .local/share/applications
Whitelisting /home/user/.local/share/applications
2280 2273 254:0 /home/user/.local/share/applications /home/user/.local/share/applications rw,noatime master:1 - ext4 /dev/mapper/root rw
mountid=2280 fsname=/home/user/.local/share/applications dir=/home/user/.local/share/applications fstype=ext4
Debug 735: file: /home/user/.local/share/icons; dirfd: 5; topdir: /home/user; rel: .local/share/icons
Whitelisting /home/user/.local/share/icons
2281 2273 254:0 /home/user/.local/share/icons /home/user/.local/share/icons rw,noatime master:1 - ext4 /dev/mapper/root rw
mountid=2281 fsname=/home/user/.local/share/icons dir=/home/user/.local/share/icons fstype=ext4
Debug 735: file: /home/user/.local/share/mime; dirfd: 5; topdir: /home/user; rel: .local/share/mime
Whitelisting /home/user/.local/share/mime
2282 2273 254:0 /home/user/.local/share/mime /home/user/.local/share/mime rw,noatime master:1 - ext4 /dev/mapper/root rw
mountid=2282 fsname=/home/user/.local/share/mime dir=/home/user/.local/share/mime fstype=ext4
Debug 735: file: /home/user/.config/dconf; dirfd: 5; topdir: /home/user; rel: .config/dconf
Whitelisting /home/user/.config/dconf
2283 2273 254:0 /home/user/.config/dconf /home/user/.config/dconf rw,noatime master:1 - ext4 /dev/mapper/root rw
mountid=2283 fsname=/home/user/.config/dconf dir=/home/user/.config/dconf fstype=ext4
Debug 735: file: /home/user/.cache/fontconfig; dirfd: 5; topdir: /home/user; rel: .cache/fontconfig
Whitelisting /home/user/.cache/fontconfig
2284 2273 254:0 /home/user/.cache/fontconfig /home/user/.cache/fontconfig rw,noatime master:1 - ext4 /dev/mapper/root rw
mountid=2284 fsname=/home/user/.cache/fontconfig dir=/home/user/.cache/fontconfig fstype=ext4
Debug 735: file: /home/user/.config/fontconfig; dirfd: 5; topdir: /home/user; rel: .config/fontconfig
Whitelisting /home/user/.config/fontconfig
2285 2273 254:0 /home/user/.config/fontconfig /home/user/.config/fontconfig rw,noatime master:1 - ext4 /dev/mapper/root rw
mountid=2285 fsname=/home/user/.config/fontconfig dir=/home/user/.config/fontconfig fstype=ext4
Debug 735: file: /home/user/.fonts; dirfd: 5; topdir: /home/user; rel: .fonts
Whitelisting /home/user/.fonts
2286 2273 254:0 /home/user/.fonts /home/user/.fonts rw,noatime master:1 - ext4 /dev/mapper/root rw
mountid=2286 fsname=/home/user/.fonts dir=/home/user/.fonts fstype=ext4
Debug 735: file: /home/user/.config/fontconfig/fonts.conf; dirfd: 5; topdir: /home/user; rel: .config/fontconfig/fonts.conf
Created symbolic link /home/user/.fonts.conf -> /home/user/.config/fontconfig/fonts.conf
Debug 735: file: /home/user/.config/gtk-2.0; dirfd: 5; topdir: /home/user; rel: .config/gtk-2.0
Whitelisting /home/user/.config/gtk-2.0
2287 2273 254:0 /home/user/.config/gtk-2.0 /home/user/.config/gtk-2.0 rw,noatime master:1 - ext4 /dev/mapper/root rw
mountid=2287 fsname=/home/user/.config/gtk-2.0 dir=/home/user/.config/gtk-2.0 fstype=ext4
Debug 735: file: /home/user/.config/gtk-3.0; dirfd: 5; topdir: /home/user; rel: .config/gtk-3.0
Whitelisting /home/user/.config/gtk-3.0
2288 2273 254:0 /home/user/.config/gtk-3.0 /home/user/.config/gtk-3.0 rw,noatime master:1 - ext4 /dev/mapper/root rw
mountid=2288 fsname=/home/user/.config/gtk-3.0 dir=/home/user/.config/gtk-3.0 fstype=ext4
Debug 735: file: /home/user/.config/gtk-4.0; dirfd: 5; topdir: /home/user; rel: .config/gtk-4.0
Whitelisting /home/user/.config/gtk-4.0
2289 2273 254:0 /home/user/.config/gtk-4.0 /home/user/.config/gtk-4.0 rw,noatime master:1 - ext4 /dev/mapper/root rw
mountid=2289 fsname=/home/user/.config/gtk-4.0 dir=/home/user/.config/gtk-4.0 fstype=ext4
Debug 735: file: /home/user/.config/gtkrc; dirfd: 5; topdir: /home/user; rel: .config/gtkrc
Whitelisting /home/user/.config/gtkrc
2290 2273 254:0 /home/user/.config/gtkrc /home/user/.config/gtkrc rw,noatime master:1 - ext4 /dev/mapper/root rw
mountid=2290 fsname=/home/user/.config/gtkrc dir=/home/user/.config/gtkrc fstype=ext4
Debug 735: file: /home/user/.config/gtkrc-2.0; dirfd: 5; topdir: /home/user; rel: .config/gtkrc-2.0
Whitelisting /home/user/.config/gtkrc-2.0
2291 2273 254:0 /home/user/.config/gtkrc-2.0 /home/user/.config/gtkrc-2.0 rw,noatime master:1 - ext4 /dev/mapper/root rw
mountid=2291 fsname=/home/user/.config/gtkrc-2.0 dir=/home/user/.config/gtkrc-2.0 fstype=ext4
Debug 735: file: /home/user/.gtkrc-2.0; dirfd: 5; topdir: /home/user; rel: .gtkrc-2.0
Whitelisting /home/user/.gtkrc-2.0
2292 2273 254:0 /home/user/.gtkrc-2.0 /home/user/.gtkrc-2.0 rw,noatime master:1 - ext4 /dev/mapper/root rw
mountid=2292 fsname=/home/user/.gtkrc-2.0 dir=/home/user/.gtkrc-2.0 fstype=ext4
Debug 735: file: /home/user/.cache/kioexec/krun; dirfd: 5; topdir: /home/user; rel: .cache/kioexec/krun
Whitelisting /home/user/.cache/kioexec/krun
2293 2273 254:0 /home/user/.cache/kioexec/krun /home/user/.cache/kioexec/krun rw,noatime master:1 - ext4 /dev/mapper/root rw
mountid=2293 fsname=/home/user/.cache/kioexec/krun dir=/home/user/.cache/kioexec/krun fstype=ext4
Debug 735: file: /home/user/.config/Kvantum; dirfd: 5; topdir: /home/user; rel: .config/Kvantum
Whitelisting /home/user/.config/Kvantum
2294 2273 254:0 /home/user/.config/Kvantum /home/user/.config/Kvantum rw,noatime master:1 - ext4 /dev/mapper/root rw
mountid=2294 fsname=/home/user/.config/Kvantum dir=/home/user/.config/Kvantum fstype=ext4
Debug 735: file: /home/user/.config/Trolltech.conf; dirfd: 5; topdir: /home/user; rel: .config/Trolltech.conf
Whitelisting /home/user/.config/Trolltech.conf
2295 2273 254:0 /home/user/.config/Trolltech.conf /home/user/.config/Trolltech.conf rw,noatime master:1 - ext4 /dev/mapper/root rw
mountid=2295 fsname=/home/user/.config/Trolltech.conf dir=/home/user/.config/Trolltech.conf fstype=ext4
Debug 735: file: /home/user/.config/QtProject.conf; dirfd: 5; topdir: /home/user; rel: .config/QtProject.conf
Whitelisting /home/user/.config/QtProject.conf
2296 2273 254:0 /home/user/.config/QtProject.conf /home/user/.config/QtProject.conf rw,noatime master:1 - ext4 /dev/mapper/root rw
mountid=2296 fsname=/home/user/.config/QtProject.conf dir=/home/user/.config/QtProject.conf fstype=ext4
Debug 735: file: /home/user/.config/kdeglobals; dirfd: 5; topdir: /home/user; rel: .config/kdeglobals
Whitelisting /home/user/.config/kdeglobals
2297 2273 254:0 /home/user/.config/kdeglobals /home/user/.config/kdeglobals rw,noatime master:1 - ext4 /dev/mapper/root rw
mountid=2297 fsname=/home/user/.config/kdeglobals dir=/home/user/.config/kdeglobals fstype=ext4
Debug 735: file: /home/user/.config/kio_httprc; dirfd: 5; topdir: /home/user; rel: .config/kio_httprc
Whitelisting /home/user/.config/kio_httprc
2298 2273 254:0 /home/user/.config/kio_httprc /home/user/.config/kio_httprc rw,noatime master:1 - ext4 /dev/mapper/root rw
mountid=2298 fsname=/home/user/.config/kio_httprc dir=/home/user/.config/kio_httprc fstype=ext4
Debug 735: file: /home/user/.config/kioslaverc; dirfd: 5; topdir: /home/user; rel: .config/kioslaverc
Whitelisting /home/user/.config/kioslaverc
2299 2273 254:0 /home/user/.config/kioslaverc /home/user/.config/kioslaverc rw,noatime master:1 - ext4 /dev/mapper/root rw
mountid=2299 fsname=/home/user/.config/kioslaverc dir=/home/user/.config/kioslaverc fstype=ext4
Debug 735: file: /home/user/.kde4/share/config/kdeglobals; dirfd: 5; topdir: /home/user; rel: .kde4/share/config/kdeglobals
Whitelisting /home/user/.kde4/share/config/kdeglobals
2300 2273 254:0 /home/user/.kde4/share/config/kdeglobals /home/user/.kde4/share/config/kdeglobals rw,noatime master:1 - ext4 /dev/mapper/root rw
mountid=2300 fsname=/home/user/.kde4/share/config/kdeglobals dir=/home/user/.kde4/share/config/kdeglobals fstype=ext4
Debug 735: file: /home/user/.kde4/share/config/kio_httprc; dirfd: 5; topdir: /home/user; rel: .kde4/share/config/kio_httprc
Whitelisting /home/user/.kde4/share/config/kio_httprc
2301 2273 254:0 /home/user/.kde4/share/config/kio_httprc /home/user/.kde4/share/config/kio_httprc rw,noatime master:1 - ext4 /dev/mapper/root rw
mountid=2301 fsname=/home/user/.kde4/share/config/kio_httprc dir=/home/user/.kde4/share/config/kio_httprc fstype=ext4
Debug 735: file: /home/user/.kde4/share/config/kioslaverc; dirfd: 5; topdir: /home/user; rel: .kde4/share/config/kioslaverc
Whitelisting /home/user/.kde4/share/config/kioslaverc
2302 2273 254:0 /home/user/.kde4/share/config/kioslaverc /home/user/.kde4/share/config/kioslaverc rw,noatime master:1 - ext4 /dev/mapper/root rw
mountid=2302 fsname=/home/user/.kde4/share/config/kioslaverc dir=/home/user/.kde4/share/config/kioslaverc fstype=ext4
Debug 735: file: /var/lib/dbus; dirfd: 7; topdir: /var; rel: lib/dbus
Whitelisting /var/lib/dbus
2303 2270 254:0 /var/lib/dbus /var/lib/dbus ro,nosuid,nodev,noexec,noatime master:1 - ext4 /dev/mapper/root rw
mountid=2303 fsname=/var/lib/dbus dir=/var/lib/dbus fstype=ext4
Debug 735: file: /var/cache/fontconfig; dirfd: 7; topdir: /var; rel: cache/fontconfig
Whitelisting /var/cache/fontconfig
2304 2270 254:0 /var/cache/fontconfig /var/cache/fontconfig ro,nosuid,nodev,noexec,noatime master:1 - ext4 /dev/mapper/root rw
mountid=2304 fsname=/var/cache/fontconfig dir=/var/cache/fontconfig fstype=ext4
Debug 735: file: /var/tmp; dirfd: 7; topdir: /var; rel: tmp
Whitelisting /var/tmp
2305 2270 0:95 / /var/tmp rw,nosuid,nodev,noexec - tmpfs tmpfs rw,inode64
mountid=2305 fsname=/ dir=/var/tmp fstype=tmpfs
Created symbolic link /var/run -> /run
Created symbolic link /var/lock -> /run/lock
Debug 735: file: /tmp/.X11-unix; dirfd: 8; topdir: /tmp; rel: .X11-unix
Whitelisting /tmp/.X11-unix
2306 2271 0:38 /.X11-unix /tmp/.X11-unix rw,nosuid,nodev,relatime master:81 - tmpfs tmpfs rw,size=10485760k,inode64
mountid=2306 fsname=/.X11-unix dir=/tmp/.X11-unix fstype=tmpfs
Disable /data
Mounting read-only /home/user/.Xauthority
2308 2273 0:126 /user/.Xauthority /home/user/.Xauthority ro,nosuid,nodev,noexec - tmpfs tmpfs rw,mode=755,inode64
mountid=2308 fsname=/user/.Xauthority dir=/home/user/.Xauthority fstype=tmpfs
Mounting read-only /home/user/.config/kdeglobals
2309 2297 254:0 /home/user/.config/kdeglobals /home/user/.config/kdeglobals ro,noatime master:1 - ext4 /dev/mapper/root rw
mountid=2309 fsname=/home/user/.config/kdeglobals dir=/home/user/.config/kdeglobals fstype=ext4
Mounting read-only /home/user/.config/kio_httprc
2310 2298 254:0 /home/user/.config/kio_httprc /home/user/.config/kio_httprc ro,noatime master:1 - ext4 /dev/mapper/root rw
mountid=2310 fsname=/home/user/.config/kio_httprc dir=/home/user/.config/kio_httprc fstype=ext4
Mounting read-only /home/user/.config/kioslaverc
2311 2299 254:0 /home/user/.config/kioslaverc /home/user/.config/kioslaverc ro,noatime master:1 - ext4 /dev/mapper/root rw
mountid=2311 fsname=/home/user/.config/kioslaverc dir=/home/user/.config/kioslaverc fstype=ext4
Mounting read-only /home/user/.kde4/share/config/kdeglobals
2312 2300 254:0 /home/user/.kde4/share/config/kdeglobals /home/user/.kde4/share/config/kdeglobals ro,noatime master:1 - ext4 /dev/mapper/root rw
mountid=2312 fsname=/home/user/.kde4/share/config/kdeglobals dir=/home/user/.kde4/share/config/kdeglobals fstype=ext4
Mounting read-only /home/user/.kde4/share/config/kio_httprc
2313 2301 254:0 /home/user/.kde4/share/config/kio_httprc /home/user/.kde4/share/config/kio_httprc ro,noatime master:1 - ext4 /dev/mapper/root rw
mountid=2313 fsname=/home/user/.kde4/share/config/kio_httprc dir=/home/user/.kde4/share/config/kio_httprc fstype=ext4
Mounting read-only /home/user/.kde4/share/config/kioslaverc
2314 2302 254:0 /home/user/.kde4/share/config/kioslaverc /home/user/.kde4/share/config/kioslaverc ro,noatime master:1 - ext4 /dev/mapper/root rw
mountid=2314 fsname=/home/user/.kde4/share/config/kioslaverc dir=/home/user/.kde4/share/config/kioslaverc fstype=ext4
Disable /run/user/1000/klauncherqDGjjZ.1.slave-socket
Disable /run/user/1000/klauncherWjdCXV.1.slave-socket
Disable /run/user/1000/klauncherjrSMBI.1.slave-socket
Disable /run/user/1000/kdeinit5__0
Mounting read-only /home/user/.config/dconf
2319 2283 254:0 /home/user/.config/dconf /home/user/.config/dconf ro,noatime master:1 - ext4 /dev/mapper/root rw
mountid=2319 fsname=/home/user/.config/dconf dir=/home/user/.config/dconf fstype=ext4
Disable /run/user/1000/systemd
Disable /usr/share/applications/veracrypt.desktop
Disable /usr/share/pixmaps/veracrypt.xpm
Disable /run/screens (requested /var/run/screens)
Mounting read-only /home/user/.local/share/applications
2324 2280 254:0 /home/user/.local/share/applications /home/user/.local/share/applications ro,noatime master:1 - ext4 /dev/mapper/root rw
mountid=2324 fsname=/home/user/.local/share/applications dir=/home/user/.local/share/applications fstype=ext4
Mounting read-only /home/user/.config/mimeapps.list
2325 2276 254:0 /home/user/.config/mimeapps.list /home/user/.config/mimeapps.list ro,noatime master:1 - ext4 /dev/mapper/root rw
mountid=2325 fsname=/home/user/.config/mimeapps.list dir=/home/user/.config/mimeapps.list fstype=ext4
Mounting read-only /home/user/.config/user-dirs.dirs
2326 2277 254:0 /home/user/.config/user-dirs.dirs /home/user/.config/user-dirs.dirs ro,noatime master:1 - ext4 /dev/mapper/root rw
mountid=2326 fsname=/home/user/.config/user-dirs.dirs dir=/home/user/.config/user-dirs.dirs fstype=ext4
Mounting read-only /home/user/.config/user-dirs.locale
2327 2278 254:0 /home/user/.config/user-dirs.locale /home/user/.config/user-dirs.locale ro,noatime master:1 - ext4 /dev/mapper/root rw
mountid=2327 fsname=/home/user/.config/user-dirs.locale dir=/home/user/.config/user-dirs.locale fstype=ext4
Mounting read-only /home/user/.local/share/mime
2328 2282 254:0 /home/user/.local/share/mime /home/user/.local/share/mime ro,noatime master:1 - ext4 /dev/mapper/root rw
mountid=2328 fsname=/home/user/.local/share/mime dir=/home/user/.local/share/mime fstype=ext4
Disable /usr/local/sbin
Warning (blacklisting): cannot open /usr/local/sbin/at: Permission denied
Warning (blacklisting): cannot open /usr/local/sbin/busybox: Permission denied
Warning (blacklisting): cannot open /usr/local/sbin/chage: Permission denied
Warning (blacklisting): cannot open /usr/local/sbin/chfn: Permission denied
Warning (blacklisting): cannot open /usr/local/sbin/chsh: Permission denied
Warning (blacklisting): cannot open /usr/local/sbin/crontab: Permission denied
Warning (blacklisting): cannot open /usr/local/sbin/evtest: Permission denied
Warning (blacklisting): cannot open /usr/local/sbin/expiry: Permission denied
Warning (blacklisting): cannot open /usr/local/sbin/fusermount: Permission denied
Warning (blacklisting): cannot open /usr/local/sbin/gksu: Permission denied
Warning (blacklisting): cannot open /usr/local/sbin/gksudo: Permission denied
Warning (blacklisting): cannot open /usr/local/sbin/gpasswd: Permission denied
Warning (blacklisting): cannot open /usr/local/sbin/kdesudo: Permission denied
Warning (blacklisting): cannot open /usr/local/sbin/ksu: Permission denied
Warning (blacklisting): cannot open /usr/local/sbin/mount: Permission denied
Warning (blacklisting): cannot open /usr/local/sbin/mount.ecryptfs_private: Permission denied
Warning (blacklisting): cannot open /usr/local/sbin/nc: Permission denied
Warning (blacklisting): cannot open /usr/local/sbin/ncat: Permission denied
Warning (blacklisting): cannot open /usr/local/sbin/nmap: Permission denied
Warning (blacklisting): cannot open /usr/local/sbin/newgidmap: Permission denied
Warning (blacklisting): cannot open /usr/local/sbin/newgrp: Permission denied
Warning (blacklisting): cannot open /usr/local/sbin/newuidmap: Permission denied
Warning (blacklisting): cannot open /usr/local/sbin/ntfs-3g: Permission denied
Warning (blacklisting): cannot open /usr/local/sbin/pkexec: Permission denied
Warning (blacklisting): cannot open /usr/local/sbin/procmail: Permission denied
Warning (blacklisting): cannot open /usr/local/sbin/sg: Permission denied
Warning (blacklisting): cannot open /usr/local/sbin/strace: Permission denied
Warning (blacklisting): cannot open /usr/local/sbin/su: Permission denied
Warning (blacklisting): cannot open /usr/local/sbin/sudo: Permission denied
Warning (blacklisting): cannot open /usr/local/sbin/tcpdump: Permission denied
Warning (blacklisting): cannot open /usr/local/sbin/umount: Permission denied
Warning (blacklisting): cannot open /usr/local/sbin/unix_chkpwd: Permission denied
Warning (blacklisting): cannot open /usr/local/sbin/xev: Permission denied
Warning (blacklisting): cannot open /usr/local/sbin/xinput: Permission denied
Warning (blacklisting): cannot open /usr/local/sbin/lxterminal: Permission denied
Warning (blacklisting): cannot open /usr/local/sbin/gnome-terminal: Permission denied
Warning (blacklisting): cannot open /usr/local/sbin/gnome-terminal.wrapper: Permission denied
Warning (blacklisting): cannot open /usr/local/sbin/lilyterm: Permission denied
Warning (blacklisting): cannot open /usr/local/sbin/mate-terminal: Permission denied
Warning (blacklisting): cannot open /usr/local/sbin/mate-terminal.wrapper: Permission denied
Warning (blacklisting): cannot open /usr/local/sbin/pantheon-terminal: Permission denied
Warning (blacklisting): cannot open /usr/local/sbin/roxterm: Permission denied
Warning (blacklisting): cannot open /usr/local/sbin/roxterm-config: Permission denied
Warning (blacklisting): cannot open /usr/local/sbin/terminix: Permission denied
Warning (blacklisting): cannot open /usr/local/sbin/tilix: Permission denied
Warning (blacklisting): cannot open /usr/local/sbin/urxvtc: Permission denied
Warning (blacklisting): cannot open /usr/local/sbin/urxvtcd: Permission denied
Warning (blacklisting): cannot open /usr/local/sbin/xfce4-terminal: Permission denied
Warning (blacklisting): cannot open /usr/local/sbin/xfce4-terminal.wrapper: Permission denied
Warning (blacklisting): cannot access /run/user/1000/doc: Permission denied
Disable /usr/share/flatpak
Warning (blacklisting): cannot open /usr/local/sbin/bwrap: Permission denied
Disable /proc/config.gz
Warning (blacklisting): cannot open /usr/local/sbin/dig: Permission denied
Warning (blacklisting): cannot open /usr/local/sbin/dlint: Permission denied
Warning (blacklisting): cannot open /usr/local/sbin/dns2tcp: Permission denied
Warning (blacklisting): cannot open /usr/local/sbin/dnssec-*: Permission denied
Warning (blacklisting): cannot open /usr/local/sbin/dnswalk: Permission denied
Warning (blacklisting): cannot open /usr/local/sbin/drill: Permission denied
Warning (blacklisting): cannot open /usr/local/sbin/host: Permission denied
Warning (blacklisting): cannot open /usr/local/sbin/iodine: Permission denied
Warning (blacklisting): cannot open /usr/local/sbin/kdig: Permission denied
Warning (blacklisting): cannot open /usr/local/sbin/khost: Permission denied
Warning (blacklisting): cannot open /usr/local/sbin/knsupdate: Permission denied
Warning (blacklisting): cannot open /usr/local/sbin/ldns-*: Permission denied
Warning (blacklisting): cannot open /usr/local/sbin/ldnsd: Permission denied
Warning (blacklisting): cannot open /usr/local/sbin/nslookup: Permission denied
Warning (blacklisting): cannot open /usr/local/sbin/resolvectl: Permission denied
Warning (blacklisting): cannot open /usr/local/sbin/unbound-host: Permission denied
Warning (blacklisting): cannot open /usr/local/sbin/clang*: Permission denied
Warning (blacklisting): cannot open /usr/local/sbin/lldb*: Permission denied
Warning (blacklisting): cannot open /usr/local/sbin/llvm*: Permission denied
Warning (blacklisting): cannot open /usr/local/sbin/as: Permission denied
Warning (blacklisting): cannot open /usr/local/sbin/cc: Permission denied
Warning (blacklisting): cannot open /usr/local/sbin/c++*: Permission denied
Warning (blacklisting): cannot open /usr/local/sbin/c8*: Permission denied
Warning (blacklisting): cannot open /usr/local/sbin/c9*: Permission denied
Warning (blacklisting): cannot open /usr/local/sbin/cpp*: Permission denied
Warning (blacklisting): cannot open /usr/local/sbin/g++*: Permission denied
Warning (blacklisting): cannot open /usr/local/sbin/gcc*: Permission denied
Warning (blacklisting): cannot open /usr/local/sbin/gdb: Permission denied
Warning (blacklisting): cannot open /usr/local/sbin/ld: Permission denied
Warning (blacklisting): cannot open /usr/local/sbin/*-gcc*: Permission denied
Warning (blacklisting): cannot open /usr/local/sbin/*-g++*: Permission denied
Warning (blacklisting): cannot open /usr/local/sbin/*-gcc*: Permission denied
Warning (blacklisting): cannot open /usr/local/sbin/*-g++*: Permission denied
Warning (blacklisting): cannot open /usr/local/sbin/gccgo: Permission denied
Warning (blacklisting): cannot open /usr/local/sbin/go: Permission denied
Warning (blacklisting): cannot open /usr/local/sbin/gofmt: Permission denied
Warning (blacklisting): cannot open /usr/local/sbin/java: Permission denied
Disable /usr/lib/jvm/java-8-openjdk/jre/bin/java (requested /usr/lib/jvm/default/bin/java)
Warning (blacklisting): cannot open /usr/local/sbin/javac: Permission denied
Disable /usr/lib/jvm/java-8-openjdk/bin/javac (requested /usr/lib/jvm/default/bin/javac)
Disable /usr/share/java
Warning (blacklisting): cannot open /usr/local/sbin/openssl: Permission denied
Warning (blacklisting): cannot open /usr/local/sbin/openssl-1.0: Permission denied
Warning (blacklisting): cannot open /usr/local/sbin/rust-gdb: Permission denied
Warning (blacklisting): cannot open /usr/local/sbin/rust-lldb: Permission denied
Warning (blacklisting): cannot open /usr/local/sbin/rustc: Permission denied
Warning (blacklisting): cannot open /usr/local/sbin/tcc: Permission denied
Warning (blacklisting): cannot open /usr/local/sbin/x86_64-tcc: Permission denied
Warning (blacklisting): cannot open /usr/local/sbin/valgrind*: Permission denied
Disable /usr/src
Disable /usr/local/src
Disable /usr/include
Disable /usr/local/include
Mounting noexec /run/user/1000
2348 2339 0:24 /firejail/firejail.ro.file /run/user/1000/kdeinit5__0 rw,nosuid,nodev,relatime master:12 - tmpfs run rw,mode=755,inode64
mountid=2348 fsname=/firejail/firejail.ro.file dir=/run/user/1000/kdeinit5__0 fstype=tmpfs
Mounting noexec /dev/shm
2349 2238 0:99 /shm /dev/shm rw,nosuid,nodev,noexec - tmpfs tmpfs rw,mode=755,inode64
mountid=2349 fsname=/shm dir=/dev/shm fstype=tmpfs
Mounting noexec /tmp
2351 2350 0:38 /.X11-unix /tmp/.X11-unix rw,nosuid,nodev,relatime master:81 - tmpfs tmpfs rw,size=10485760k,inode64
mountid=2351 fsname=/.X11-unix dir=/tmp/.X11-unix fstype=tmpfs
Mounting noexec /tmp/.X11-unix
2352 2351 0:38 /.X11-unix /tmp/.X11-unix rw,nosuid,nodev,noexec,relatime master:81 - tmpfs tmpfs rw,size=10485760k,inode64
mountid=2352 fsname=/.X11-unix dir=/tmp/.X11-unix fstype=tmpfs
Not blacklist /home/user/.config/discord
Mounting read-only /tmp/.X11-unix
2353 2352 0:38 /.X11-unix /tmp/.X11-unix ro,nosuid,nodev,noexec,relatime master:81 - tmpfs tmpfs rw,size=10485760k,inode64
mountid=2353 fsname=/.X11-unix dir=/tmp/.X11-unix fstype=tmpfs
Disable /sys/fs
Disable /sys/module
Creating empty /home/user/.config/pulse directory
Mounting noexec /run/firejail/mnt/pulse
2356 2204 0:92 /pulse /run/firejail/mnt/pulse rw,nosuid,nodev,noexec - tmpfs tmpfs rw,mode=755,inode64
mountid=2356 fsname=/pulse dir=/run/firejail/mnt/pulse fstype=tmpfs
Mounting /run/firejail/mnt/pulse on /home/user/.config/pulse
2357 2273 0:92 /pulse /home/user/.config/pulse rw,nosuid,nodev,noexec - tmpfs tmpfs rw,mode=755,inode64
mountid=2357 fsname=/pulse dir=/home/user/.config/pulse fstype=tmpfs
Current directory: /home/user
Mounting read-only /run/firejail/mnt/seccomp
2359 2204 0:92 /seccomp /run/firejail/mnt/seccomp ro,nosuid - tmpfs tmpfs rw,mode=755,inode64
mountid=2359 fsname=/seccomp dir=/run/firejail/mnt/seccomp fstype=tmpfs
Seccomp directory:
ls /run/firejail/mnt/seccomp
drwxr-xr-x root     root             120 .
drwxr-xr-x root     root             300 ..
-rw-r--r-- 1000     user             568 seccomp
-rw-r--r-- 1000     user             432 seccomp.32
-rw-r--r-- 1000     user               0 seccomp.postexec
-rw-r--r-- 1000     user               0 seccomp.postexec32
No active seccomp files
Set caps filter 240000
Drop privileges: pid 1, uid 1000, gid 1000, nogroups 1
No supplementary groups
Starting application
LD_PRELOAD=(null)
execvp argument 0: discord
Searching $PATH for discord
trying #/home/user/.local/bin/discord#
trying #/bin/discord#
trying #/usr/bin/discord#
trying #/usr/local/bin/discord#

Originally created by @DatAres37 on GitHub (Jul 31, 2021). Original GitHub issue: https://github.com/netblue30/firejail/issues/4430 I'm rather a newbie with firejail, so I hope it's not my own fault. I tried to read the docs first and looked for similar issues. **Bug and expected behavior** I tried to start Discord (Manjaro repository) and discord_arch_electron (AUR; preferably) with the default firejail profile, but non of them seem to work. **No profile and disabling firejail** - What changed calling `firejail --noprofile /path/to/program` in a terminal? - Default Discord: ``` Parent pid 479722, child pid 479723 Child process initialized in 5.47 ms Parent is shutting down, bye... ``` - discord_arch_electron: ```Parent pid 465930, child pid 465931 Child process initialized in 5.51 ms [1:0731/174547.351658:FATAL:proc_util.cc(97)] Check failed: . : Permission denied (13) Parent is shutting down, bye... ``` - What changed calling the program by path (e.g. `/usr/bin/vlc`)? The applications run without a problem **Reproduce** Steps to reproduce the behavior: 1. Run in bash `firejail discord` 2. The application isn't starting <details><summary> Default Discord </summary> ``` Reading profile /etc/firejail/discord.profile Reading profile /etc/firejail/globals.local Reading profile /etc/firejail/discord-common.profile Reading profile /etc/firejail/electron.profile Reading profile /etc/firejail/disable-common.inc Reading profile /etc/firejail/disable-devel.inc Reading profile /etc/firejail/disable-exec.inc Reading profile /etc/firejail/disable-passwdmgr.inc Reading profile /etc/firejail/disable-programs.inc Reading profile /etc/firejail/whitelist-common.inc Reading profile /etc/firejail/whitelist-var-common.inc Parent pid 486527, child pid 486528 Private /opt installed in 327.82 ms 17 programs installed in 26.23 ms Warning: skipping alternatives for private /etc Warning: skipping crypto-policies for private /etc Warning: skipping password for private /etc Warning: skipping pki for private /etc Private /etc installed in 33.17 ms Warning: skipping alternatives for private /usr/etc Warning: skipping ca-certificates for private /usr/etc Warning: skipping crypto-policies for private /usr/etc Warning: skipping fonts for private /usr/etc Warning: skipping group for private /usr/etc Warning: skipping ld.so.cache for private /usr/etc Warning: skipping localtime for private /usr/etc Warning: skipping login.defs for private /usr/etc Warning: skipping machine-id for private /usr/etc Warning: skipping password for private /usr/etc Warning: skipping pki for private /usr/etc Warning: skipping pulse for private /usr/etc Warning: skipping resolv.conf for private /usr/etc Warning: skipping ssl for private /usr/etc Private /usr/etc installed in 0.16 ms Warning: /sbin directory link was not blacklisted Warning: /usr/sbin directory link was not blacklisted Warning: not remounting /run/user/1000/gvfs Warning: not remounting /run/user/1000/doc Child process initialized in 468.64 ms Parent is shutting down, bye... ``` </details> <details><summary> discord_arch_electron </summary> ``` Reading profile /etc/firejail/discord.profile Reading profile /etc/firejail/globals.local Reading profile /etc/firejail/discord-common.profile Reading profile /etc/firejail/electron.profile Reading profile /etc/firejail/disable-common.inc Reading profile /etc/firejail/disable-devel.inc Reading profile /etc/firejail/disable-exec.inc Reading profile /etc/firejail/disable-passwdmgr.inc Reading profile /etc/firejail/disable-programs.inc Reading profile /etc/firejail/whitelist-common.inc Reading profile /etc/firejail/whitelist-var-common.inc Parent pid 473030, child pid 473031 Warning: skipping discord for private /opt Private /opt installed in 0.10 ms 17 programs installed in 27.57 ms Warning: skipping alternatives for private /etc Warning: skipping crypto-policies for private /etc Warning: skipping password for private /etc Warning: skipping pki for private /etc Private /etc installed in 32.46 ms Warning: skipping alternatives for private /usr/etc Warning: skipping ca-certificates for private /usr/etc Warning: skipping crypto-policies for private /usr/etc Warning: skipping fonts for private /usr/etc Warning: skipping group for private /usr/etc Warning: skipping ld.so.cache for private /usr/etc Warning: skipping localtime for private /usr/etc Warning: skipping login.defs for private /usr/etc Warning: skipping machine-id for private /usr/etc Warning: skipping password for private /usr/etc Warning: skipping pki for private /usr/etc Warning: skipping pulse for private /usr/etc Warning: skipping resolv.conf for private /usr/etc Warning: skipping ssl for private /usr/etc Private /usr/etc installed in 0.20 ms Warning: /sbin directory link was not blacklisted Warning: /usr/sbin directory link was not blacklisted Warning: not remounting /run/user/1000/gvfs Warning: not remounting /run/user/1000/doc Child process initialized in 146.68 ms /bin/discord: Line 2: exec: electron: Not found. Parent is shutting down, bye... ``` When I whitelist /usr/bin/electron for discord_arch_electron it's `Cannot start application: Permission denied` </details> **Environment** - Manjaro 21.1.0 - firejail version 0.9.66 **Additional context** Apparently there is a symlink /usr/bin/discord -> /opt/discord/Discord for the default Discord installation. **Checklist** - [X] The profile (and redirect profile if exists) hasn't already been fixed [upstream](https://github.com/netblue30/firejail/tree/master/etc). - [X] The program has a profile. (If not, request one in `https://github.com/netblue30/firejail/issues/1139`) - [X] I have performed a short search for similar issues (to avoid opening a duplicate). - [X] If it is a AppImage, `--profile=PROFILENAME` is used to set the right profile. - [ ] Used `LC_ALL=en_US.UTF-8 LANG=en_US.UTF-8 PROGRAM` to get english error-messages. - [ ] I'm aware of `browser-allow-drm yes`/`browser-disable-u2f no` in `firejail.config` to allow DRM/U2F in browsers. - [X] This is not a question. Questions should be asked in https://github.com/netblue30/firejail/discussions. <details><summary> debug output default discord </summary> ``` Autoselecting /bin/bash as shell Building quoted command line: 'discord' Command name #discord# Found discord.profile profile in /etc/firejail directory Found globals.local profile in /etc/firejail directory Found discord-common.profile profile in /etc/firejail directory Found electron.profile profile in /etc/firejail directory Found disable-common.inc profile in /etc/firejail directory Found disable-devel.inc profile in /etc/firejail directory Found disable-exec.inc profile in /etc/firejail directory Found disable-passwdmgr.inc profile in /etc/firejail directory Found disable-programs.inc profile in /etc/firejail directory Found whitelist-common.inc profile in /etc/firejail directory Found whitelist-var-common.inc profile in /etc/firejail directory Using the local network stack Using the local network stack Initializing child process PID namespace installed Mounting tmpfs on /run/firejail/mnt directory Creating empty /run/firejail/mnt/seccomp directory Creating empty /run/firejail/mnt/seccomp/seccomp.protocol file Creating empty /run/firejail/mnt/seccomp/seccomp.postexec file Creating empty /run/firejail/mnt/seccomp/seccomp.postexec32 file Mounting /proc filesystem representing the PID namespace Basic read-only filesystem: Mounting read-only /etc 2213 2180 254:0 /etc /etc ro,noatime master:1 - ext4 /dev/mapper/root rw mountid=2213 fsname=/etc dir=/etc fstype=ext4 Mounting noexec /etc 2214 2213 254:0 /etc /etc ro,nosuid,nodev,noexec,noatime master:1 - ext4 /dev/mapper/root rw mountid=2214 fsname=/etc dir=/etc fstype=ext4 Mounting read-only /var 2215 2180 254:0 /var /var ro,noatime master:1 - ext4 /dev/mapper/root rw mountid=2215 fsname=/var dir=/var fstype=ext4 Mounting noexec /var 2216 2215 254:0 /var /var ro,nosuid,nodev,noexec,noatime master:1 - ext4 /dev/mapper/root rw mountid=2216 fsname=/var dir=/var fstype=ext4 Mounting read-only /usr 2217 2180 254:0 /usr /usr ro,noatime master:1 - ext4 /dev/mapper/root rw mountid=2217 fsname=/usr dir=/usr fstype=ext4 Mounting tmpfs on /var/lock Mounting tmpfs on /var/tmp Mounting tmpfs on /var/log Create the new utmp file Mount the new utmp file Cleaning /home directory Cleaning /run/user directory Sanitizing /etc/passwd, UID_MIN 1000 Sanitizing /etc/group, GID_MIN 1000 Disable /run/firejail/network Disable /run/firejail/bandwidth Disable /run/firejail/name Disable /run/firejail/profile Disable /run/firejail/x11 Mounting tmpfs on /dev mounting /run/firejail/mnt/dev/snd directory mounting /run/firejail/mnt/dev/dri directory Process /dev/shm directory Copying files in the new /opt directory: Copying /opt/discord to private /opt Creating empty /run/firejail/mnt/opt/discord directory sbox run: /run/firejail/lib/fcopy /opt/discord /run/firejail/mnt/opt/discord Mount-bind /run/firejail/mnt/opt on top of /opt Copying files in the new bin directory Checking /usr/local/bin/discord Checking /usr/bin/discord file /opt/discord/Discord not found sbox run: /run/firejail/lib/fcopy /usr/bin/discord /run/firejail/mnt/bin Checking /usr/local/bin/bash Checking /usr/bin/bash sbox run: /run/firejail/lib/fcopy /usr/bin/bash /run/firejail/mnt/bin Checking /usr/local/bin/cut Checking /usr/bin/cut sbox run: /run/firejail/lib/fcopy /usr/bin/cut /run/firejail/mnt/bin Checking /usr/local/bin/echo Checking /usr/bin/echo sbox run: /run/firejail/lib/fcopy /usr/bin/echo /run/firejail/mnt/bin Checking /usr/local/bin/egrep Checking /usr/bin/egrep sbox run: /run/firejail/lib/fcopy /usr/bin/egrep /run/firejail/mnt/bin Checking /usr/local/bin/fish Checking /usr/bin/fish sbox run: /run/firejail/lib/fcopy /usr/bin/fish /run/firejail/mnt/bin Checking /usr/local/bin/grep Checking /usr/bin/grep sbox run: /run/firejail/lib/fcopy /usr/bin/grep /run/firejail/mnt/bin Checking /usr/local/bin/head Checking /usr/bin/head sbox run: /run/firejail/lib/fcopy /usr/bin/head /run/firejail/mnt/bin Checking /usr/local/bin/sed Checking /usr/bin/sed sbox run: /run/firejail/lib/fcopy /usr/bin/sed /run/firejail/mnt/bin Checking /usr/local/bin/sh Checking /usr/bin/sh sbox run: /run/firejail/lib/fcopy /usr/bin/bash /run/firejail/mnt/bin sbox run: /run/firejail/lib/fcopy /usr/bin/sh /run/firejail/mnt/bin Checking /usr/local/bin/tclsh Checking /usr/bin/tclsh sbox run: /run/firejail/lib/fcopy /usr/bin/tclsh8.6 /run/firejail/mnt/bin sbox run: /run/firejail/lib/fcopy /usr/bin/tclsh /run/firejail/mnt/bin Checking /usr/local/bin/tr Checking /usr/bin/tr sbox run: /run/firejail/lib/fcopy /usr/bin/tr /run/firejail/mnt/bin Checking /usr/local/bin/xdg-mime Checking /usr/bin/xdg-mime sbox run: /run/firejail/lib/fcopy /usr/bin/xdg-mime /run/firejail/mnt/bin Checking /usr/local/bin/xdg-open Checking /usr/bin/xdg-open sbox run: /run/firejail/lib/fcopy /usr/bin/xdg-open /run/firejail/mnt/bin Checking /usr/local/bin/zsh Checking /usr/bin/zsh sbox run: /run/firejail/lib/fcopy /usr/bin/zsh /run/firejail/mnt/bin Mount-bind /run/firejail/mnt/bin on top of /usr/local/bin Mount-bind /run/firejail/mnt/bin on top of /usr/bin Mount-bind /run/firejail/mnt/bin on top of /bin Mount-bind /run/firejail/mnt/bin on top of /usr/local/games Mount-bind /run/firejail/mnt/bin on top of /usr/local/sbin Mount-bind /run/firejail/mnt/bin on top of /usr/sbin Mount-bind /run/firejail/mnt/bin on top of /sbin Generate private-tmp whitelist commands blacklist /run/firejail/dbus Mounting read-only /proc/sys Remounting /sys directory Disable /sys/firmware Disable /sys/hypervisor Disable /sys/power Disable /sys/kernel/debug Disable /sys/kernel/vmcoreinfo Disable /proc/sys/fs/binfmt_misc Disable /proc/sys/kernel/core_pattern Disable /proc/sys/kernel/modprobe Disable /proc/sysrq-trigger Disable /proc/sys/vm/panic_on_oom Disable /proc/irq Disable /proc/bus Disable /proc/timer_list Disable /proc/kcore Disable /proc/kallsyms Disable /usr/lib/modules (requested /lib/modules) Disable /boot Disable /run/user/1000/gnupg Disable /run/user/1000/systemd Disable /proc/kmsg Copying files in the new /etc directory: Copying /etc/ca-certificates to private /etc Creating empty /run/firejail/mnt/etc/ca-certificates directory sbox run: /run/firejail/lib/fcopy /etc/ca-certificates /run/firejail/mnt/etc/ca-certificates Copying /etc/fonts to private /etc Creating empty /run/firejail/mnt/etc/fonts directory sbox run: /run/firejail/lib/fcopy /etc/fonts /run/firejail/mnt/etc/fonts Copying /etc/group to private /etc sbox run: /run/firejail/lib/fcopy /etc/group /run/firejail/mnt/etc Copying /etc/ld.so.cache to private /etc sbox run: /run/firejail/lib/fcopy /etc/ld.so.cache /run/firejail/mnt/etc Copying /etc/localtime to private /etc sbox run: /run/firejail/lib/fcopy /etc/localtime /run/firejail/mnt/etc Copying /etc/login.defs to private /etc sbox run: /run/firejail/lib/fcopy /etc/login.defs /run/firejail/mnt/etc Copying /etc/machine-id to private /etc sbox run: /run/firejail/lib/fcopy /etc/machine-id /run/firejail/mnt/etc Copying /etc/pulse to private /etc Creating empty /run/firejail/mnt/etc/pulse directory sbox run: /run/firejail/lib/fcopy /etc/pulse /run/firejail/mnt/etc/pulse Copying /etc/resolv.conf to private /etc sbox run: /run/firejail/lib/fcopy /etc/resolv.conf /run/firejail/mnt/etc Copying /etc/ssl to private /etc Creating empty /run/firejail/mnt/etc/ssl directory sbox run: /run/firejail/lib/fcopy /etc/ssl /run/firejail/mnt/etc/ssl Mount-bind /run/firejail/mnt/etc on top of /etc Copying files in the new /usr/etc directory: Mount-bind /run/firejail/mnt/usretc on top of /usr/etc Debug 553: whitelist ${HOME}/.config/discord Debug 574: expanded: /home/user/.config/discord Debug 585: new_name: /home/user/.config/discord Debug 599: dir: /home/user Adding whitelist top level directory /home/user Debug 553: whitelist ${HOME}/.config/BetterDiscord Debug 574: expanded: /home/user/.config/BetterDiscord Debug 585: new_name: /home/user/.config/BetterDiscord Debug 599: dir: /home/user Removed path: whitelist ${HOME}/.config/BetterDiscord expanded: /home/user/.config/BetterDiscord realpath: (null) No such file or directory Debug 553: whitelist ${HOME}/.local/share/betterdiscordctl Debug 574: expanded: /home/user/.local/share/betterdiscordctl Debug 585: new_name: /home/user/.local/share/betterdiscordctl Debug 599: dir: /home/user Removed path: whitelist ${HOME}/.local/share/betterdiscordctl expanded: /home/user/.local/share/betterdiscordctl realpath: (null) No such file or directory Debug 553: whitelist ${DOWNLOADS} Directory ${DOWNLOADS} resolved as Downloads Debug 574: expanded: /home/user/Downloads Debug 585: new_name: /home/user/Downloads Debug 599: dir: /home/user Debug 553: whitelist ${HOME}/.XCompose Debug 574: expanded: /home/user/.XCompose Debug 585: new_name: /home/user/.XCompose Debug 599: dir: /home/user Removed path: whitelist ${HOME}/.XCompose expanded: /home/user/.XCompose realpath: (null) No such file or directory Debug 553: whitelist ${HOME}/.alsaequal.bin Debug 574: expanded: /home/user/.alsaequal.bin Debug 585: new_name: /home/user/.alsaequal.bin Debug 599: dir: /home/user Removed path: whitelist ${HOME}/.alsaequal.bin expanded: /home/user/.alsaequal.bin realpath: (null) No such file or directory Debug 553: whitelist ${HOME}/.asoundrc Debug 574: expanded: /home/user/.asoundrc Debug 585: new_name: /home/user/.asoundrc Debug 599: dir: /home/user Removed path: whitelist ${HOME}/.asoundrc expanded: /home/user/.asoundrc realpath: (null) No such file or directory Debug 553: whitelist ${HOME}/.config/ibus Debug 574: expanded: /home/user/.config/ibus Debug 585: new_name: /home/user/.config/ibus Debug 599: dir: /home/user Removed path: whitelist ${HOME}/.config/ibus expanded: /home/user/.config/ibus realpath: (null) No such file or directory Debug 553: whitelist ${HOME}/.config/mimeapps.list Debug 574: expanded: /home/user/.config/mimeapps.list Debug 585: new_name: /home/user/.config/mimeapps.list Debug 599: dir: /home/user Debug 553: whitelist ${HOME}/.config/pkcs11 Debug 574: expanded: /home/user/.config/pkcs11 Debug 585: new_name: /home/user/.config/pkcs11 Debug 599: dir: /home/user Removed path: whitelist ${HOME}/.config/pkcs11 expanded: /home/user/.config/pkcs11 realpath: (null) No such file or directory Debug 553: whitelist ${HOME}/.config/user-dirs.dirs Debug 574: expanded: /home/user/.config/user-dirs.dirs Debug 585: new_name: /home/user/.config/user-dirs.dirs Debug 599: dir: /home/user Debug 553: whitelist ${HOME}/.config/user-dirs.locale Debug 574: expanded: /home/user/.config/user-dirs.locale Debug 585: new_name: /home/user/.config/user-dirs.locale Debug 599: dir: /home/user Debug 553: whitelist ${HOME}/.drirc Debug 574: expanded: /home/user/.drirc Debug 585: new_name: /home/user/.drirc Debug 599: dir: /home/user Removed path: whitelist ${HOME}/.drirc expanded: /home/user/.drirc realpath: (null) No such file or directory Debug 553: whitelist ${HOME}/.icons Debug 574: expanded: /home/user/.icons Debug 585: new_name: /home/user/.icons Debug 599: dir: /home/user Debug 553: whitelist ${HOME}/.local/share/applications Debug 574: expanded: /home/user/.local/share/applications Debug 585: new_name: /home/user/.local/share/applications Debug 599: dir: /home/user Debug 553: whitelist ${HOME}/.local/share/icons Debug 574: expanded: /home/user/.local/share/icons Debug 585: new_name: /home/user/.local/share/icons Debug 599: dir: /home/user Debug 553: whitelist ${HOME}/.local/share/mime Debug 574: expanded: /home/user/.local/share/mime Debug 585: new_name: /home/user/.local/share/mime Debug 599: dir: /home/user Debug 553: whitelist ${HOME}/.mime.types Debug 574: expanded: /home/user/.mime.types Debug 585: new_name: /home/user/.mime.types Debug 599: dir: /home/user Removed path: whitelist ${HOME}/.mime.types expanded: /home/user/.mime.types realpath: (null) No such file or directory Debug 553: whitelist ${HOME}/.uim.d Debug 574: expanded: /home/user/.uim.d Debug 585: new_name: /home/user/.uim.d Debug 599: dir: /home/user Removed path: whitelist ${HOME}/.uim.d expanded: /home/user/.uim.d realpath: (null) No such file or directory Debug 553: whitelist ${HOME}/.config/dconf Debug 574: expanded: /home/user/.config/dconf Debug 585: new_name: /home/user/.config/dconf Debug 599: dir: /home/user Debug 553: whitelist ${HOME}/.cache/fontconfig Debug 574: expanded: /home/user/.cache/fontconfig Debug 585: new_name: /home/user/.cache/fontconfig Debug 599: dir: /home/user Debug 553: whitelist ${HOME}/.config/fontconfig Debug 574: expanded: /home/user/.config/fontconfig Debug 585: new_name: /home/user/.config/fontconfig Debug 599: dir: /home/user Debug 553: whitelist ${HOME}/.fontconfig Debug 574: expanded: /home/user/.fontconfig Debug 585: new_name: /home/user/.fontconfig Debug 599: dir: /home/user Removed path: whitelist ${HOME}/.fontconfig expanded: /home/user/.fontconfig realpath: (null) No such file or directory Debug 553: whitelist ${HOME}/.fonts Debug 574: expanded: /home/user/.fonts Debug 585: new_name: /home/user/.fonts Debug 599: dir: /home/user Debug 553: whitelist ${HOME}/.fonts.conf Debug 574: expanded: /home/user/.fonts.conf Debug 585: new_name: /home/user/.fonts.conf Debug 599: dir: /home/user Debug 553: whitelist ${HOME}/.fonts.conf.d Debug 574: expanded: /home/user/.fonts.conf.d Debug 585: new_name: /home/user/.fonts.conf.d Debug 599: dir: /home/user Removed path: whitelist ${HOME}/.fonts.conf.d expanded: /home/user/.fonts.conf.d realpath: (null) No such file or directory Debug 553: whitelist ${HOME}/.fonts.d Debug 574: expanded: /home/user/.fonts.d Debug 585: new_name: /home/user/.fonts.d Debug 599: dir: /home/user Removed path: whitelist ${HOME}/.fonts.d expanded: /home/user/.fonts.d realpath: (null) No such file or directory Debug 553: whitelist ${HOME}/.local/share/fonts Debug 574: expanded: /home/user/.local/share/fonts Debug 585: new_name: /home/user/.local/share/fonts Debug 599: dir: /home/user Removed path: whitelist ${HOME}/.local/share/fonts expanded: /home/user/.local/share/fonts realpath: (null) No such file or directory Debug 553: whitelist ${HOME}/.pangorc Debug 574: expanded: /home/user/.pangorc Debug 585: new_name: /home/user/.pangorc Debug 599: dir: /home/user Removed path: whitelist ${HOME}/.pangorc expanded: /home/user/.pangorc realpath: (null) No such file or directory Debug 553: whitelist ${HOME}/.config/gtk-2.0 Debug 574: expanded: /home/user/.config/gtk-2.0 Debug 585: new_name: /home/user/.config/gtk-2.0 Debug 599: dir: /home/user Debug 553: whitelist ${HOME}/.config/gtk-3.0 Debug 574: expanded: /home/user/.config/gtk-3.0 Debug 585: new_name: /home/user/.config/gtk-3.0 Debug 599: dir: /home/user Debug 553: whitelist ${HOME}/.config/gtk-4.0 Debug 574: expanded: /home/user/.config/gtk-4.0 Debug 585: new_name: /home/user/.config/gtk-4.0 Debug 599: dir: /home/user Debug 553: whitelist ${HOME}/.config/gtkrc Debug 574: expanded: /home/user/.config/gtkrc Debug 585: new_name: /home/user/.config/gtkrc Debug 599: dir: /home/user Debug 553: whitelist ${HOME}/.config/gtkrc-2.0 Debug 574: expanded: /home/user/.config/gtkrc-2.0 Debug 585: new_name: /home/user/.config/gtkrc-2.0 Debug 599: dir: /home/user Debug 553: whitelist ${HOME}/.gnome2 Debug 574: expanded: /home/user/.gnome2 Debug 585: new_name: /home/user/.gnome2 Debug 599: dir: /home/user Removed path: whitelist ${HOME}/.gnome2 expanded: /home/user/.gnome2 realpath: (null) No such file or directory Debug 553: whitelist ${HOME}/.gnome2-private Debug 574: expanded: /home/user/.gnome2-private Debug 585: new_name: /home/user/.gnome2-private Debug 599: dir: /home/user Removed path: whitelist ${HOME}/.gnome2-private expanded: /home/user/.gnome2-private realpath: (null) No such file or directory Debug 553: whitelist ${HOME}/.gtk-2.0 Debug 574: expanded: /home/user/.gtk-2.0 Debug 585: new_name: /home/user/.gtk-2.0 Debug 599: dir: /home/user Removed path: whitelist ${HOME}/.gtk-2.0 expanded: /home/user/.gtk-2.0 realpath: (null) No such file or directory Debug 553: whitelist ${HOME}/.gtkrc Debug 574: expanded: /home/user/.gtkrc Debug 585: new_name: /home/user/.gtkrc Debug 599: dir: /home/user Removed path: whitelist ${HOME}/.gtkrc expanded: /home/user/.gtkrc realpath: (null) No such file or directory Debug 553: whitelist ${HOME}/.gtkrc-2.0 Debug 574: expanded: /home/user/.gtkrc-2.0 Debug 585: new_name: /home/user/.gtkrc-2.0 Debug 599: dir: /home/user Debug 553: whitelist ${HOME}/.kde/share/config/gtkrc Debug 574: expanded: /home/user/.kde/share/config/gtkrc Debug 585: new_name: /home/user/.kde/share/config/gtkrc Debug 599: dir: /home/user Removed path: whitelist ${HOME}/.kde/share/config/gtkrc expanded: /home/user/.kde/share/config/gtkrc realpath: (null) No such file or directory Debug 553: whitelist ${HOME}/.kde/share/config/gtkrc-2.0 Debug 574: expanded: /home/user/.kde/share/config/gtkrc-2.0 Debug 585: new_name: /home/user/.kde/share/config/gtkrc-2.0 Debug 599: dir: /home/user Removed path: whitelist ${HOME}/.kde/share/config/gtkrc-2.0 expanded: /home/user/.kde/share/config/gtkrc-2.0 realpath: (null) No such file or directory Debug 553: whitelist ${HOME}/.kde4/share/config/gtkrc Debug 574: expanded: /home/user/.kde4/share/config/gtkrc Debug 585: new_name: /home/user/.kde4/share/config/gtkrc Debug 599: dir: /home/user Removed path: whitelist ${HOME}/.kde4/share/config/gtkrc expanded: /home/user/.kde4/share/config/gtkrc realpath: (null) No such file or directory Debug 553: whitelist ${HOME}/.kde4/share/config/gtkrc-2.0 Debug 574: expanded: /home/user/.kde4/share/config/gtkrc-2.0 Debug 585: new_name: /home/user/.kde4/share/config/gtkrc-2.0 Debug 599: dir: /home/user Removed path: whitelist ${HOME}/.kde4/share/config/gtkrc-2.0 expanded: /home/user/.kde4/share/config/gtkrc-2.0 realpath: (null) No such file or directory Debug 553: whitelist ${HOME}/.local/share/themes Debug 574: expanded: /home/user/.local/share/themes Debug 585: new_name: /home/user/.local/share/themes Debug 599: dir: /home/user Removed path: whitelist ${HOME}/.local/share/themes expanded: /home/user/.local/share/themes realpath: (null) No such file or directory Debug 553: whitelist ${HOME}/.themes Debug 574: expanded: /home/user/.themes Debug 585: new_name: /home/user/.themes Debug 599: dir: /home/user Removed path: whitelist ${HOME}/.themes expanded: /home/user/.themes realpath: (null) No such file or directory Debug 553: whitelist ${HOME}/.cache/kioexec/krun Debug 574: expanded: /home/user/.cache/kioexec/krun Debug 585: new_name: /home/user/.cache/kioexec/krun Debug 599: dir: /home/user Debug 553: whitelist ${HOME}/.config/Kvantum Debug 574: expanded: /home/user/.config/Kvantum Debug 585: new_name: /home/user/.config/Kvantum Debug 599: dir: /home/user Debug 553: whitelist ${HOME}/.config/Trolltech.conf Debug 574: expanded: /home/user/.config/Trolltech.conf Debug 585: new_name: /home/user/.config/Trolltech.conf Debug 599: dir: /home/user Debug 553: whitelist ${HOME}/.config/QtProject.conf Debug 574: expanded: /home/user/.config/QtProject.conf Debug 585: new_name: /home/user/.config/QtProject.conf Debug 599: dir: /home/user Debug 553: whitelist ${HOME}/.config/kdeglobals Debug 574: expanded: /home/user/.config/kdeglobals Debug 585: new_name: /home/user/.config/kdeglobals Debug 599: dir: /home/user Debug 553: whitelist ${HOME}/.config/kio_httprc Debug 574: expanded: /home/user/.config/kio_httprc Debug 585: new_name: /home/user/.config/kio_httprc Debug 599: dir: /home/user Debug 553: whitelist ${HOME}/.config/kioslaverc Debug 574: expanded: /home/user/.config/kioslaverc Debug 585: new_name: /home/user/.config/kioslaverc Debug 599: dir: /home/user Debug 553: whitelist ${HOME}/.config/ksslcablacklist Debug 574: expanded: /home/user/.config/ksslcablacklist Debug 585: new_name: /home/user/.config/ksslcablacklist Debug 599: dir: /home/user Removed path: whitelist ${HOME}/.config/ksslcablacklist expanded: /home/user/.config/ksslcablacklist realpath: (null) No such file or directory Debug 553: whitelist ${HOME}/.config/qt5ct Debug 574: expanded: /home/user/.config/qt5ct Debug 585: new_name: /home/user/.config/qt5ct Debug 599: dir: /home/user Removed path: whitelist ${HOME}/.config/qt5ct expanded: /home/user/.config/qt5ct realpath: (null) No such file or directory Debug 553: whitelist ${HOME}/.config/qtcurve Debug 574: expanded: /home/user/.config/qtcurve Debug 585: new_name: /home/user/.config/qtcurve Debug 599: dir: /home/user Removed path: whitelist ${HOME}/.config/qtcurve expanded: /home/user/.config/qtcurve realpath: (null) No such file or directory Debug 553: whitelist ${HOME}/.kde/share/config/kdeglobals Debug 574: expanded: /home/user/.kde/share/config/kdeglobals Debug 585: new_name: /home/user/.kde/share/config/kdeglobals Debug 599: dir: /home/user Removed path: whitelist ${HOME}/.kde/share/config/kdeglobals expanded: /home/user/.kde/share/config/kdeglobals realpath: (null) No such file or directory Debug 553: whitelist ${HOME}/.kde/share/config/kio_httprc Debug 574: expanded: /home/user/.kde/share/config/kio_httprc Debug 585: new_name: /home/user/.kde/share/config/kio_httprc Debug 599: dir: /home/user Removed path: whitelist ${HOME}/.kde/share/config/kio_httprc expanded: /home/user/.kde/share/config/kio_httprc realpath: (null) No such file or directory Debug 553: whitelist ${HOME}/.kde/share/config/kioslaverc Debug 574: expanded: /home/user/.kde/share/config/kioslaverc Debug 585: new_name: /home/user/.kde/share/config/kioslaverc Debug 599: dir: /home/user Removed path: whitelist ${HOME}/.kde/share/config/kioslaverc expanded: /home/user/.kde/share/config/kioslaverc realpath: (null) No such file or directory Debug 553: whitelist ${HOME}/.kde/share/config/ksslcablacklist Debug 574: expanded: /home/user/.kde/share/config/ksslcablacklist Debug 585: new_name: /home/user/.kde/share/config/ksslcablacklist Debug 599: dir: /home/user Removed path: whitelist ${HOME}/.kde/share/config/ksslcablacklist expanded: /home/user/.kde/share/config/ksslcablacklist realpath: (null) No such file or directory Debug 553: whitelist ${HOME}/.kde/share/config/oxygenrc Debug 574: expanded: /home/user/.kde/share/config/oxygenrc Debug 585: new_name: /home/user/.kde/share/config/oxygenrc Debug 599: dir: /home/user Removed path: whitelist ${HOME}/.kde/share/config/oxygenrc expanded: /home/user/.kde/share/config/oxygenrc realpath: (null) No such file or directory Debug 553: whitelist ${HOME}/.kde/share/icons Debug 574: expanded: /home/user/.kde/share/icons Debug 585: new_name: /home/user/.kde/share/icons Debug 599: dir: /home/user Removed path: whitelist ${HOME}/.kde/share/icons expanded: /home/user/.kde/share/icons realpath: (null) No such file or directory Debug 553: whitelist ${HOME}/.kde4/share/config/kdeglobals Debug 574: expanded: /home/user/.kde4/share/config/kdeglobals Debug 585: new_name: /home/user/.kde4/share/config/kdeglobals Debug 599: dir: /home/user Debug 553: whitelist ${HOME}/.kde4/share/config/kio_httprc Debug 574: expanded: /home/user/.kde4/share/config/kio_httprc Debug 585: new_name: /home/user/.kde4/share/config/kio_httprc Debug 599: dir: /home/user Debug 553: whitelist ${HOME}/.kde4/share/config/kioslaverc Debug 574: expanded: /home/user/.kde4/share/config/kioslaverc Debug 585: new_name: /home/user/.kde4/share/config/kioslaverc Debug 599: dir: /home/user Debug 553: whitelist ${HOME}/.kde4/share/config/ksslcablacklist Debug 574: expanded: /home/user/.kde4/share/config/ksslcablacklist Debug 585: new_name: /home/user/.kde4/share/config/ksslcablacklist Debug 599: dir: /home/user Removed path: whitelist ${HOME}/.kde4/share/config/ksslcablacklist expanded: /home/user/.kde4/share/config/ksslcablacklist realpath: (null) No such file or directory Debug 553: whitelist ${HOME}/.kde4/share/config/oxygenrc Debug 574: expanded: /home/user/.kde4/share/config/oxygenrc Debug 585: new_name: /home/user/.kde4/share/config/oxygenrc Debug 599: dir: /home/user Removed path: whitelist ${HOME}/.kde4/share/config/oxygenrc expanded: /home/user/.kde4/share/config/oxygenrc realpath: (null) No such file or directory Debug 553: whitelist ${HOME}/.kde4/share/icons Debug 574: expanded: /home/user/.kde4/share/icons Debug 585: new_name: /home/user/.kde4/share/icons Debug 599: dir: /home/user Removed path: whitelist ${HOME}/.kde4/share/icons expanded: /home/user/.kde4/share/icons realpath: (null) No such file or directory Debug 553: whitelist ${HOME}/.local/share/qt5ct Debug 574: expanded: /home/user/.local/share/qt5ct Debug 585: new_name: /home/user/.local/share/qt5ct Debug 599: dir: /home/user Removed path: whitelist ${HOME}/.local/share/qt5ct expanded: /home/user/.local/share/qt5ct realpath: (null) No such file or directory Debug 553: whitelist /var/lib/aspell Debug 574: expanded: /var/lib/aspell Debug 585: new_name: /var/lib/aspell Debug 599: dir: /var Adding whitelist top level directory /var Removed path: whitelist /var/lib/aspell expanded: /var/lib/aspell realpath: (null) No such file or directory Debug 553: whitelist /var/lib/ca-certificates Debug 574: expanded: /var/lib/ca-certificates Debug 585: new_name: /var/lib/ca-certificates Debug 599: dir: /var Removed path: whitelist /var/lib/ca-certificates expanded: /var/lib/ca-certificates realpath: (null) No such file or directory Debug 553: whitelist /var/lib/dbus Debug 574: expanded: /var/lib/dbus Debug 585: new_name: /var/lib/dbus Debug 599: dir: /var Debug 553: whitelist /var/lib/menu-xdg Debug 574: expanded: /var/lib/menu-xdg Debug 585: new_name: /var/lib/menu-xdg Debug 599: dir: /var Removed path: whitelist /var/lib/menu-xdg expanded: /var/lib/menu-xdg realpath: (null) No such file or directory Debug 553: whitelist /var/lib/uim Debug 574: expanded: /var/lib/uim Debug 585: new_name: /var/lib/uim Debug 599: dir: /var Removed path: whitelist /var/lib/uim expanded: /var/lib/uim realpath: (null) No such file or directory Debug 553: whitelist /var/cache/fontconfig Debug 574: expanded: /var/cache/fontconfig Debug 585: new_name: /var/cache/fontconfig Debug 599: dir: /var Debug 553: whitelist /var/tmp Debug 574: expanded: /var/tmp Debug 585: new_name: /var/tmp Debug 599: dir: /var Debug 553: whitelist /var/run Debug 574: expanded: /var/run Debug 585: new_name: /var/run Debug 599: dir: /var Debug 553: whitelist /var/lock Debug 574: expanded: /var/lock Debug 585: new_name: /var/lock Debug 599: dir: /var Debug 553: whitelist /tmp/.X11-unix Debug 574: expanded: /tmp/.X11-unix Debug 585: new_name: /tmp/.X11-unix Debug 599: dir: /tmp Adding whitelist top level directory /tmp Mounting tmpfs on /var, check owner: no 2275 2216 0:121 / /var rw,nosuid,nodev,noexec,noatime - tmpfs tmpfs rw,mode=755,inode64 mountid=2275 fsname=/ dir=/var fstype=tmpfs Mounting tmpfs on /tmp, check owner: no 2276 2208 0:122 / /tmp rw,nosuid,nodev,relatime - tmpfs tmpfs rw,inode64 mountid=2276 fsname=/ dir=/tmp fstype=tmpfs Mounting a new /root directory Mounting a new /home directory Create a new user directory Debug 735: file: /home/user/.config/discord; dirfd: 4; topdir: /home/user; rel: .config/discord Whitelisting /home/user/.config/discord 2279 2278 254:0 /home/user/.config/discord /home/user/.config/discord rw,noatime master:1 - ext4 /dev/mapper/root rw mountid=2279 fsname=/home/user/.config/discord dir=/home/user/.config/discord fstype=ext4 Debug 735: file: /home/user/Downloads; dirfd: 4; topdir: /home/user; rel: Downloads Whitelisting /home/user/Downloads 2280 2278 254:0 /home/user/Downloads /home/user/Downloads rw,noatime master:1 - ext4 /dev/mapper/root rw mountid=2280 fsname=/home/user/Downloads dir=/home/user/Downloads fstype=ext4 Debug 735: file: /home/user/.config/mimeapps.list; dirfd: 4; topdir: /home/user; rel: .config/mimeapps.list Whitelisting /home/user/.config/mimeapps.list 2281 2278 254:0 /home/user/.config/mimeapps.list /home/user/.config/mimeapps.list rw,noatime master:1 - ext4 /dev/mapper/root rw mountid=2281 fsname=/home/user/.config/mimeapps.list dir=/home/user/.config/mimeapps.list fstype=ext4 Debug 735: file: /home/user/.config/user-dirs.dirs; dirfd: 4; topdir: /home/user; rel: .config/user-dirs.dirs Whitelisting /home/user/.config/user-dirs.dirs 2282 2278 254:0 /home/user/.config/user-dirs.dirs /home/user/.config/user-dirs.dirs rw,noatime master:1 - ext4 /dev/mapper/root rw mountid=2282 fsname=/home/user/.config/user-dirs.dirs dir=/home/user/.config/user-dirs.dirs fstype=ext4 Debug 735: file: /home/user/.config/user-dirs.locale; dirfd: 4; topdir: /home/user; rel: .config/user-dirs.locale Whitelisting /home/user/.config/user-dirs.locale 2283 2278 254:0 /home/user/.config/user-dirs.locale /home/user/.config/user-dirs.locale rw,noatime master:1 - ext4 /dev/mapper/root rw mountid=2283 fsname=/home/user/.config/user-dirs.locale dir=/home/user/.config/user-dirs.locale fstype=ext4 Debug 735: file: /home/user/.icons; dirfd: 4; topdir: /home/user; rel: .icons Whitelisting /home/user/.icons 2284 2278 254:0 /home/user/.icons /home/user/.icons rw,noatime master:1 - ext4 /dev/mapper/root rw mountid=2284 fsname=/home/user/.icons dir=/home/user/.icons fstype=ext4 Debug 735: file: /home/user/.local/share/applications; dirfd: 4; topdir: /home/user; rel: .local/share/applications Whitelisting /home/user/.local/share/applications 2285 2278 254:0 /home/user/.local/share/applications /home/user/.local/share/applications rw,noatime master:1 - ext4 /dev/mapper/root rw mountid=2285 fsname=/home/user/.local/share/applications dir=/home/user/.local/share/applications fstype=ext4 Debug 735: file: /home/user/.local/share/icons; dirfd: 4; topdir: /home/user; rel: .local/share/icons Whitelisting /home/user/.local/share/icons 2286 2278 254:0 /home/user/.local/share/icons /home/user/.local/share/icons rw,noatime master:1 - ext4 /dev/mapper/root rw mountid=2286 fsname=/home/user/.local/share/icons dir=/home/user/.local/share/icons fstype=ext4 Debug 735: file: /home/user/.local/share/mime; dirfd: 4; topdir: /home/user; rel: .local/share/mime Whitelisting /home/user/.local/share/mime 2287 2278 254:0 /home/user/.local/share/mime /home/user/.local/share/mime rw,noatime master:1 - ext4 /dev/mapper/root rw mountid=2287 fsname=/home/user/.local/share/mime dir=/home/user/.local/share/mime fstype=ext4 Debug 735: file: /home/user/.config/dconf; dirfd: 4; topdir: /home/user; rel: .config/dconf Whitelisting /home/user/.config/dconf 2288 2278 254:0 /home/user/.config/dconf /home/user/.config/dconf rw,noatime master:1 - ext4 /dev/mapper/root rw mountid=2288 fsname=/home/user/.config/dconf dir=/home/user/.config/dconf fstype=ext4 Debug 735: file: /home/user/.cache/fontconfig; dirfd: 4; topdir: /home/user; rel: .cache/fontconfig Whitelisting /home/user/.cache/fontconfig 2289 2278 254:0 /home/user/.cache/fontconfig /home/user/.cache/fontconfig rw,noatime master:1 - ext4 /dev/mapper/root rw mountid=2289 fsname=/home/user/.cache/fontconfig dir=/home/user/.cache/fontconfig fstype=ext4 Debug 735: file: /home/user/.config/fontconfig; dirfd: 4; topdir: /home/user; rel: .config/fontconfig Whitelisting /home/user/.config/fontconfig 2290 2278 254:0 /home/user/.config/fontconfig /home/user/.config/fontconfig rw,noatime master:1 - ext4 /dev/mapper/root rw mountid=2290 fsname=/home/user/.config/fontconfig dir=/home/user/.config/fontconfig fstype=ext4 Debug 735: file: /home/user/.fonts; dirfd: 4; topdir: /home/user; rel: .fonts Whitelisting /home/user/.fonts 2291 2278 254:0 /home/user/.fonts /home/user/.fonts rw,noatime master:1 - ext4 /dev/mapper/root rw mountid=2291 fsname=/home/user/.fonts dir=/home/user/.fonts fstype=ext4 Debug 735: file: /home/user/.config/fontconfig/fonts.conf; dirfd: 4; topdir: /home/user; rel: .config/fontconfig/fonts.conf Created symbolic link /home/user/.fonts.conf -> /home/user/.config/fontconfig/fonts.conf Debug 735: file: /home/user/.config/gtk-2.0; dirfd: 4; topdir: /home/user; rel: .config/gtk-2.0 Whitelisting /home/user/.config/gtk-2.0 2292 2278 254:0 /home/user/.config/gtk-2.0 /home/user/.config/gtk-2.0 rw,noatime master:1 - ext4 /dev/mapper/root rw mountid=2292 fsname=/home/user/.config/gtk-2.0 dir=/home/user/.config/gtk-2.0 fstype=ext4 Debug 735: file: /home/user/.config/gtk-3.0; dirfd: 4; topdir: /home/user; rel: .config/gtk-3.0 Whitelisting /home/user/.config/gtk-3.0 2293 2278 254:0 /home/user/.config/gtk-3.0 /home/user/.config/gtk-3.0 rw,noatime master:1 - ext4 /dev/mapper/root rw mountid=2293 fsname=/home/user/.config/gtk-3.0 dir=/home/user/.config/gtk-3.0 fstype=ext4 Debug 735: file: /home/user/.config/gtk-4.0; dirfd: 4; topdir: /home/user; rel: .config/gtk-4.0 Whitelisting /home/user/.config/gtk-4.0 2294 2278 254:0 /home/user/.config/gtk-4.0 /home/user/.config/gtk-4.0 rw,noatime master:1 - ext4 /dev/mapper/root rw mountid=2294 fsname=/home/user/.config/gtk-4.0 dir=/home/user/.config/gtk-4.0 fstype=ext4 Debug 735: file: /home/user/.config/gtkrc; dirfd: 4; topdir: /home/user; rel: .config/gtkrc Whitelisting /home/user/.config/gtkrc 2295 2278 254:0 /home/user/.config/gtkrc /home/user/.config/gtkrc rw,noatime master:1 - ext4 /dev/mapper/root rw mountid=2295 fsname=/home/user/.config/gtkrc dir=/home/user/.config/gtkrc fstype=ext4 Debug 735: file: /home/user/.config/gtkrc-2.0; dirfd: 4; topdir: /home/user; rel: .config/gtkrc-2.0 Whitelisting /home/user/.config/gtkrc-2.0 2296 2278 254:0 /home/user/.config/gtkrc-2.0 /home/user/.config/gtkrc-2.0 rw,noatime master:1 - ext4 /dev/mapper/root rw mountid=2296 fsname=/home/user/.config/gtkrc-2.0 dir=/home/user/.config/gtkrc-2.0 fstype=ext4 Debug 735: file: /home/user/.gtkrc-2.0; dirfd: 4; topdir: /home/user; rel: .gtkrc-2.0 Whitelisting /home/user/.gtkrc-2.0 2297 2278 254:0 /home/user/.gtkrc-2.0 /home/user/.gtkrc-2.0 rw,noatime master:1 - ext4 /dev/mapper/root rw mountid=2297 fsname=/home/user/.gtkrc-2.0 dir=/home/user/.gtkrc-2.0 fstype=ext4 Debug 735: file: /home/user/.cache/kioexec/krun; dirfd: 4; topdir: /home/user; rel: .cache/kioexec/krun Whitelisting /home/user/.cache/kioexec/krun 2298 2278 254:0 /home/user/.cache/kioexec/krun /home/user/.cache/kioexec/krun rw,noatime master:1 - ext4 /dev/mapper/root rw mountid=2298 fsname=/home/user/.cache/kioexec/krun dir=/home/user/.cache/kioexec/krun fstype=ext4 Debug 735: file: /home/user/.config/Kvantum; dirfd: 4; topdir: /home/user; rel: .config/Kvantum Whitelisting /home/user/.config/Kvantum 2299 2278 254:0 /home/user/.config/Kvantum /home/user/.config/Kvantum rw,noatime master:1 - ext4 /dev/mapper/root rw mountid=2299 fsname=/home/user/.config/Kvantum dir=/home/user/.config/Kvantum fstype=ext4 Debug 735: file: /home/user/.config/Trolltech.conf; dirfd: 4; topdir: /home/user; rel: .config/Trolltech.conf Whitelisting /home/user/.config/Trolltech.conf 2300 2278 254:0 /home/user/.config/Trolltech.conf /home/user/.config/Trolltech.conf rw,noatime master:1 - ext4 /dev/mapper/root rw mountid=2300 fsname=/home/user/.config/Trolltech.conf dir=/home/user/.config/Trolltech.conf fstype=ext4 Debug 735: file: /home/user/.config/QtProject.conf; dirfd: 4; topdir: /home/user; rel: .config/QtProject.conf Whitelisting /home/user/.config/QtProject.conf 2301 2278 254:0 /home/user/.config/QtProject.conf /home/user/.config/QtProject.conf rw,noatime master:1 - ext4 /dev/mapper/root rw mountid=2301 fsname=/home/user/.config/QtProject.conf dir=/home/user/.config/QtProject.conf fstype=ext4 Debug 735: file: /home/user/.config/kdeglobals; dirfd: 4; topdir: /home/user; rel: .config/kdeglobals Whitelisting /home/user/.config/kdeglobals 2302 2278 254:0 /home/user/.config/kdeglobals /home/user/.config/kdeglobals rw,noatime master:1 - ext4 /dev/mapper/root rw mountid=2302 fsname=/home/user/.config/kdeglobals dir=/home/user/.config/kdeglobals fstype=ext4 Debug 735: file: /home/user/.config/kio_httprc; dirfd: 4; topdir: /home/user; rel: .config/kio_httprc Whitelisting /home/user/.config/kio_httprc 2303 2278 254:0 /home/user/.config/kio_httprc /home/user/.config/kio_httprc rw,noatime master:1 - ext4 /dev/mapper/root rw mountid=2303 fsname=/home/user/.config/kio_httprc dir=/home/user/.config/kio_httprc fstype=ext4 Debug 735: file: /home/user/.config/kioslaverc; dirfd: 4; topdir: /home/user; rel: .config/kioslaverc Whitelisting /home/user/.config/kioslaverc 2304 2278 254:0 /home/user/.config/kioslaverc /home/user/.config/kioslaverc rw,noatime master:1 - ext4 /dev/mapper/root rw mountid=2304 fsname=/home/user/.config/kioslaverc dir=/home/user/.config/kioslaverc fstype=ext4 Debug 735: file: /home/user/.kde4/share/config/kdeglobals; dirfd: 4; topdir: /home/user; rel: .kde4/share/config/kdeglobals Whitelisting /home/user/.kde4/share/config/kdeglobals 2305 2278 254:0 /home/user/.kde4/share/config/kdeglobals /home/user/.kde4/share/config/kdeglobals rw,noatime master:1 - ext4 /dev/mapper/root rw mountid=2305 fsname=/home/user/.kde4/share/config/kdeglobals dir=/home/user/.kde4/share/config/kdeglobals fstype=ext4 Debug 735: file: /home/user/.kde4/share/config/kio_httprc; dirfd: 4; topdir: /home/user; rel: .kde4/share/config/kio_httprc Whitelisting /home/user/.kde4/share/config/kio_httprc 2306 2278 254:0 /home/user/.kde4/share/config/kio_httprc /home/user/.kde4/share/config/kio_httprc rw,noatime master:1 - ext4 /dev/mapper/root rw mountid=2306 fsname=/home/user/.kde4/share/config/kio_httprc dir=/home/user/.kde4/share/config/kio_httprc fstype=ext4 Debug 735: file: /home/user/.kde4/share/config/kioslaverc; dirfd: 4; topdir: /home/user; rel: .kde4/share/config/kioslaverc Whitelisting /home/user/.kde4/share/config/kioslaverc 2307 2278 254:0 /home/user/.kde4/share/config/kioslaverc /home/user/.kde4/share/config/kioslaverc rw,noatime master:1 - ext4 /dev/mapper/root rw mountid=2307 fsname=/home/user/.kde4/share/config/kioslaverc dir=/home/user/.kde4/share/config/kioslaverc fstype=ext4 Debug 735: file: /var/lib/dbus; dirfd: 5; topdir: /var; rel: lib/dbus Whitelisting /var/lib/dbus 2308 2275 254:0 /var/lib/dbus /var/lib/dbus ro,nosuid,nodev,noexec,noatime master:1 - ext4 /dev/mapper/root rw mountid=2308 fsname=/var/lib/dbus dir=/var/lib/dbus fstype=ext4 Debug 735: file: /var/cache/fontconfig; dirfd: 5; topdir: /var; rel: cache/fontconfig Whitelisting /var/cache/fontconfig 2309 2275 254:0 /var/cache/fontconfig /var/cache/fontconfig ro,nosuid,nodev,noexec,noatime master:1 - ext4 /dev/mapper/root rw mountid=2309 fsname=/var/cache/fontconfig dir=/var/cache/fontconfig fstype=ext4 Debug 735: file: /var/tmp; dirfd: 5; topdir: /var; rel: tmp Whitelisting /var/tmp 2310 2275 0:95 / /var/tmp rw,nosuid,nodev,noexec - tmpfs tmpfs rw,inode64 mountid=2310 fsname=/ dir=/var/tmp fstype=tmpfs Created symbolic link /var/run -> /run Created symbolic link /var/lock -> /run/lock Debug 735: file: /tmp/.X11-unix; dirfd: 7; topdir: /tmp; rel: .X11-unix Whitelisting /tmp/.X11-unix 2311 2276 0:38 /.X11-unix /tmp/.X11-unix rw,nosuid,nodev,relatime master:81 - tmpfs tmpfs rw,size=10485760k,inode64 mountid=2311 fsname=/.X11-unix dir=/tmp/.X11-unix fstype=tmpfs Disable /data Mounting read-only /home/user/.Xauthority 2313 2278 0:125 /user/.Xauthority /home/user/.Xauthority ro,nosuid,nodev,noexec - tmpfs tmpfs rw,mode=755,inode64 mountid=2313 fsname=/user/.Xauthority dir=/home/user/.Xauthority fstype=tmpfs Mounting read-only /home/user/.config/kdeglobals 2314 2302 254:0 /home/user/.config/kdeglobals /home/user/.config/kdeglobals ro,noatime master:1 - ext4 /dev/mapper/root rw mountid=2314 fsname=/home/user/.config/kdeglobals dir=/home/user/.config/kdeglobals fstype=ext4 Mounting read-only /home/user/.config/kio_httprc 2315 2303 254:0 /home/user/.config/kio_httprc /home/user/.config/kio_httprc ro,noatime master:1 - ext4 /dev/mapper/root rw mountid=2315 fsname=/home/user/.config/kio_httprc dir=/home/user/.config/kio_httprc fstype=ext4 Mounting read-only /home/user/.config/kioslaverc 2316 2304 254:0 /home/user/.config/kioslaverc /home/user/.config/kioslaverc ro,noatime master:1 - ext4 /dev/mapper/root rw mountid=2316 fsname=/home/user/.config/kioslaverc dir=/home/user/.config/kioslaverc fstype=ext4 Mounting read-only /home/user/.kde4/share/config/kdeglobals 2317 2305 254:0 /home/user/.kde4/share/config/kdeglobals /home/user/.kde4/share/config/kdeglobals ro,noatime master:1 - ext4 /dev/mapper/root rw mountid=2317 fsname=/home/user/.kde4/share/config/kdeglobals dir=/home/user/.kde4/share/config/kdeglobals fstype=ext4 Mounting read-only /home/user/.kde4/share/config/kio_httprc 2318 2306 254:0 /home/user/.kde4/share/config/kio_httprc /home/user/.kde4/share/config/kio_httprc ro,noatime master:1 - ext4 /dev/mapper/root rw mountid=2318 fsname=/home/user/.kde4/share/config/kio_httprc dir=/home/user/.kde4/share/config/kio_httprc fstype=ext4 Mounting read-only /home/user/.kde4/share/config/kioslaverc 2319 2307 254:0 /home/user/.kde4/share/config/kioslaverc /home/user/.kde4/share/config/kioslaverc ro,noatime master:1 - ext4 /dev/mapper/root rw mountid=2319 fsname=/home/user/.kde4/share/config/kioslaverc dir=/home/user/.kde4/share/config/kioslaverc fstype=ext4 Disable /run/user/1000/klauncherqDGjjZ.1.slave-socket Disable /run/user/1000/klauncherWjdCXV.1.slave-socket Disable /run/user/1000/klauncherjrSMBI.1.slave-socket Disable /run/user/1000/kdeinit5__0 Mounting read-only /home/user/.config/dconf 2324 2288 254:0 /home/user/.config/dconf /home/user/.config/dconf ro,noatime master:1 - ext4 /dev/mapper/root rw mountid=2324 fsname=/home/user/.config/dconf dir=/home/user/.config/dconf fstype=ext4 Disable /run/user/1000/systemd Disable /usr/share/applications/veracrypt.desktop Disable /usr/share/pixmaps/veracrypt.xpm Disable /run/screens (requested /var/run/screens) Mounting read-only /home/user/.local/share/applications 2329 2285 254:0 /home/user/.local/share/applications /home/user/.local/share/applications ro,noatime master:1 - ext4 /dev/mapper/root rw mountid=2329 fsname=/home/user/.local/share/applications dir=/home/user/.local/share/applications fstype=ext4 Mounting read-only /home/user/.config/mimeapps.list 2330 2281 254:0 /home/user/.config/mimeapps.list /home/user/.config/mimeapps.list ro,noatime master:1 - ext4 /dev/mapper/root rw mountid=2330 fsname=/home/user/.config/mimeapps.list dir=/home/user/.config/mimeapps.list fstype=ext4 Mounting read-only /home/user/.config/user-dirs.dirs 2331 2282 254:0 /home/user/.config/user-dirs.dirs /home/user/.config/user-dirs.dirs ro,noatime master:1 - ext4 /dev/mapper/root rw mountid=2331 fsname=/home/user/.config/user-dirs.dirs dir=/home/user/.config/user-dirs.dirs fstype=ext4 Mounting read-only /home/user/.config/user-dirs.locale 2332 2283 254:0 /home/user/.config/user-dirs.locale /home/user/.config/user-dirs.locale ro,noatime master:1 - ext4 /dev/mapper/root rw mountid=2332 fsname=/home/user/.config/user-dirs.locale dir=/home/user/.config/user-dirs.locale fstype=ext4 Mounting read-only /home/user/.local/share/mime 2333 2287 254:0 /home/user/.local/share/mime /home/user/.local/share/mime ro,noatime master:1 - ext4 /dev/mapper/root rw mountid=2333 fsname=/home/user/.local/share/mime dir=/home/user/.local/share/mime fstype=ext4 Disable /usr/local/sbin Warning (blacklisting): cannot open /usr/local/sbin/at: Permission denied Warning (blacklisting): cannot open /usr/local/sbin/busybox: Permission denied Warning (blacklisting): cannot open /usr/local/sbin/chage: Permission denied Warning (blacklisting): cannot open /usr/local/sbin/chfn: Permission denied Warning (blacklisting): cannot open /usr/local/sbin/chsh: Permission denied Warning (blacklisting): cannot open /usr/local/sbin/crontab: Permission denied Warning (blacklisting): cannot open /usr/local/sbin/evtest: Permission denied Warning (blacklisting): cannot open /usr/local/sbin/expiry: Permission denied Warning (blacklisting): cannot open /usr/local/sbin/fusermount: Permission denied Warning (blacklisting): cannot open /usr/local/sbin/gksu: Permission denied Warning (blacklisting): cannot open /usr/local/sbin/gksudo: Permission denied Warning (blacklisting): cannot open /usr/local/sbin/gpasswd: Permission denied Warning (blacklisting): cannot open /usr/local/sbin/kdesudo: Permission denied Warning (blacklisting): cannot open /usr/local/sbin/ksu: Permission denied Warning (blacklisting): cannot open /usr/local/sbin/mount: Permission denied Warning (blacklisting): cannot open /usr/local/sbin/mount.ecryptfs_private: Permission denied Warning (blacklisting): cannot open /usr/local/sbin/nc: Permission denied Warning (blacklisting): cannot open /usr/local/sbin/ncat: Permission denied Warning (blacklisting): cannot open /usr/local/sbin/nmap: Permission denied Warning (blacklisting): cannot open /usr/local/sbin/newgidmap: Permission denied Warning (blacklisting): cannot open /usr/local/sbin/newgrp: Permission denied Warning (blacklisting): cannot open /usr/local/sbin/newuidmap: Permission denied Warning (blacklisting): cannot open /usr/local/sbin/ntfs-3g: Permission denied Warning (blacklisting): cannot open /usr/local/sbin/pkexec: Permission denied Warning (blacklisting): cannot open /usr/local/sbin/procmail: Permission denied Warning (blacklisting): cannot open /usr/local/sbin/sg: Permission denied Warning (blacklisting): cannot open /usr/local/sbin/strace: Permission denied Warning (blacklisting): cannot open /usr/local/sbin/su: Permission denied Warning (blacklisting): cannot open /usr/local/sbin/sudo: Permission denied Warning (blacklisting): cannot open /usr/local/sbin/tcpdump: Permission denied Warning (blacklisting): cannot open /usr/local/sbin/umount: Permission denied Warning (blacklisting): cannot open /usr/local/sbin/unix_chkpwd: Permission denied Warning (blacklisting): cannot open /usr/local/sbin/xev: Permission denied Warning (blacklisting): cannot open /usr/local/sbin/xinput: Permission denied Warning (blacklisting): cannot open /usr/local/sbin/lxterminal: Permission denied Warning (blacklisting): cannot open /usr/local/sbin/gnome-terminal: Permission denied Warning (blacklisting): cannot open /usr/local/sbin/gnome-terminal.wrapper: Permission denied Warning (blacklisting): cannot open /usr/local/sbin/lilyterm: Permission denied Warning (blacklisting): cannot open /usr/local/sbin/mate-terminal: Permission denied Warning (blacklisting): cannot open /usr/local/sbin/mate-terminal.wrapper: Permission denied Warning (blacklisting): cannot open /usr/local/sbin/pantheon-terminal: Permission denied Warning (blacklisting): cannot open /usr/local/sbin/roxterm: Permission denied Warning (blacklisting): cannot open /usr/local/sbin/roxterm-config: Permission denied Warning (blacklisting): cannot open /usr/local/sbin/terminix: Permission denied Warning (blacklisting): cannot open /usr/local/sbin/tilix: Permission denied Warning (blacklisting): cannot open /usr/local/sbin/urxvtc: Permission denied Warning (blacklisting): cannot open /usr/local/sbin/urxvtcd: Permission denied Warning (blacklisting): cannot open /usr/local/sbin/xfce4-terminal: Permission denied Warning (blacklisting): cannot open /usr/local/sbin/xfce4-terminal.wrapper: Permission denied Warning (blacklisting): cannot access /run/user/1000/doc: Permission denied Disable /usr/share/flatpak Warning (blacklisting): cannot open /usr/local/sbin/bwrap: Permission denied Disable /proc/config.gz Warning (blacklisting): cannot open /usr/local/sbin/dig: Permission denied Warning (blacklisting): cannot open /usr/local/sbin/dlint: Permission denied Warning (blacklisting): cannot open /usr/local/sbin/dns2tcp: Permission denied Warning (blacklisting): cannot open /usr/local/sbin/dnssec-*: Permission denied Warning (blacklisting): cannot open /usr/local/sbin/dnswalk: Permission denied Warning (blacklisting): cannot open /usr/local/sbin/drill: Permission denied Warning (blacklisting): cannot open /usr/local/sbin/host: Permission denied Warning (blacklisting): cannot open /usr/local/sbin/iodine: Permission denied Warning (blacklisting): cannot open /usr/local/sbin/kdig: Permission denied Warning (blacklisting): cannot open /usr/local/sbin/khost: Permission denied Warning (blacklisting): cannot open /usr/local/sbin/knsupdate: Permission denied Warning (blacklisting): cannot open /usr/local/sbin/ldns-*: Permission denied Warning (blacklisting): cannot open /usr/local/sbin/ldnsd: Permission denied Warning (blacklisting): cannot open /usr/local/sbin/nslookup: Permission denied Warning (blacklisting): cannot open /usr/local/sbin/resolvectl: Permission denied Warning (blacklisting): cannot open /usr/local/sbin/unbound-host: Permission denied Warning (blacklisting): cannot open /usr/local/sbin/clang*: Permission denied Warning (blacklisting): cannot open /usr/local/sbin/lldb*: Permission denied Warning (blacklisting): cannot open /usr/local/sbin/llvm*: Permission denied Warning (blacklisting): cannot open /usr/local/sbin/as: Permission denied Warning (blacklisting): cannot open /usr/local/sbin/cc: Permission denied Warning (blacklisting): cannot open /usr/local/sbin/c++*: Permission denied Warning (blacklisting): cannot open /usr/local/sbin/c8*: Permission denied Warning (blacklisting): cannot open /usr/local/sbin/c9*: Permission denied Warning (blacklisting): cannot open /usr/local/sbin/cpp*: Permission denied Warning (blacklisting): cannot open /usr/local/sbin/g++*: Permission denied Warning (blacklisting): cannot open /usr/local/sbin/gcc*: Permission denied Warning (blacklisting): cannot open /usr/local/sbin/gdb: Permission denied Warning (blacklisting): cannot open /usr/local/sbin/ld: Permission denied Warning (blacklisting): cannot open /usr/local/sbin/*-gcc*: Permission denied Warning (blacklisting): cannot open /usr/local/sbin/*-g++*: Permission denied Warning (blacklisting): cannot open /usr/local/sbin/*-gcc*: Permission denied Warning (blacklisting): cannot open /usr/local/sbin/*-g++*: Permission denied Warning (blacklisting): cannot open /usr/local/sbin/gccgo: Permission denied Warning (blacklisting): cannot open /usr/local/sbin/go: Permission denied Warning (blacklisting): cannot open /usr/local/sbin/gofmt: Permission denied Warning (blacklisting): cannot open /usr/local/sbin/java: Permission denied Disable /usr/lib/jvm/java-8-openjdk/jre/bin/java (requested /usr/lib/jvm/default/bin/java) Warning (blacklisting): cannot open /usr/local/sbin/javac: Permission denied Disable /usr/lib/jvm/java-8-openjdk/bin/javac (requested /usr/lib/jvm/default/bin/javac) Disable /usr/share/java Warning (blacklisting): cannot open /usr/local/sbin/openssl: Permission denied Warning (blacklisting): cannot open /usr/local/sbin/openssl-1.0: Permission denied Warning (blacklisting): cannot open /usr/local/sbin/rust-gdb: Permission denied Warning (blacklisting): cannot open /usr/local/sbin/rust-lldb: Permission denied Warning (blacklisting): cannot open /usr/local/sbin/rustc: Permission denied Warning (blacklisting): cannot open /usr/local/sbin/tcc: Permission denied Warning (blacklisting): cannot open /usr/local/sbin/x86_64-tcc: Permission denied Warning (blacklisting): cannot open /usr/local/sbin/valgrind*: Permission denied Disable /usr/src Disable /usr/local/src Disable /usr/include Disable /usr/local/include Mounting noexec /run/user/1000 2353 2344 0:24 /firejail/firejail.ro.file /run/user/1000/kdeinit5__0 rw,nosuid,nodev,relatime master:12 - tmpfs run rw,mode=755,inode64 mountid=2353 fsname=/firejail/firejail.ro.file dir=/run/user/1000/kdeinit5__0 fstype=tmpfs Mounting noexec /dev/shm 2354 2244 0:99 /shm /dev/shm rw,nosuid,nodev,noexec - tmpfs tmpfs rw,mode=755,inode64 mountid=2354 fsname=/shm dir=/dev/shm fstype=tmpfs Mounting noexec /tmp 2356 2355 0:38 /.X11-unix /tmp/.X11-unix rw,nosuid,nodev,relatime master:81 - tmpfs tmpfs rw,size=10485760k,inode64 mountid=2356 fsname=/.X11-unix dir=/tmp/.X11-unix fstype=tmpfs Mounting noexec /tmp/.X11-unix 2357 2356 0:38 /.X11-unix /tmp/.X11-unix rw,nosuid,nodev,noexec,relatime master:81 - tmpfs tmpfs rw,size=10485760k,inode64 mountid=2357 fsname=/.X11-unix dir=/tmp/.X11-unix fstype=tmpfs Not blacklist /home/user/.config/discord Mounting read-only /tmp/.X11-unix 2358 2357 0:38 /.X11-unix /tmp/.X11-unix ro,nosuid,nodev,noexec,relatime master:81 - tmpfs tmpfs rw,size=10485760k,inode64 mountid=2358 fsname=/.X11-unix dir=/tmp/.X11-unix fstype=tmpfs Disable /sys/fs Disable /sys/module Creating empty /home/user/.config/pulse directory Drop privileges: pid 32, uid 1000, gid 1000, nogroun denied Warning (blacklisting): cannot open /usr/local/sbin/nslookup: Permission denied Warning (blacklisting): cannot open /usr/local/sbin/resolvectl: Permission denied Warning (blacklisting): cannot open /usr/local/sbin/unbound-host: Permission denied Warning (blacklisting): cannot open /usr/local/sbin/clang*: Permission denied Warning (blacklisting): cannot open /usr/local/sbin/lldb*: Permission denied Warning (blacklisting): cannot open /usr/local/sbin/llvm*: Permission denied Warning (blacklisting): cannot open /usr/local/sbin/as: Permission denied Warning (blacklisting): cannot open /usr/local/sbin/cc: Permission denied Warning (blacklisting): cannot open /usr/local/sbin/c++*: Permission denied Warning (blacklisting): cannot open /usr/local/sbin/c8*: Permission denied Warning (blacklisting): cannot open /usr/local/sbin/c9*: Permission denied Warning (blacklisting): cannot open /usr/local/sbin/cpp*: Permission denied Warning (blacklisting): cannot open /usr/local/sbin/g++*: Permission denied Warning (blacklisting): cannot open /usr/local/sbin/gcc*: Permission denied Warning (blacklisting): cannot open /usr/local/sbin/gdb: Permission denied Warning (blacklisting): cannot open /usr/local/sbin/ld: Permission denied Warning (blacklisting): cannot open /usr/local/sbin/*-gcc*: Permission denied Warning (blacklisting): cannot open /usr/local/sbin/*-g++*: Permission denied Warning (blacklisting): cannot open /usr/local/sbin/*-gcc*: Permission denied Warning (blacklisting): cannot open /usr/local/sbin/*-g++*: Permission denied Warning (blacklisting): cannot open /usr/local/sbin/gccgo: Permission denied Warning (blacklisting): cannot open /usr/local/sbin/go: Permission denied Warning (blacklisting): cannot open /usr/local/sbin/gofmt: Permission denied Warning (blacklisting): cannot open /usr/local/sbin/java: Permission denied Disable /usr/lib/jvm/java-8-openjdk/jre/bin/java (requested /usr/lib/jvm/default/bin/java) Warning (blacklisting): cannot open /usr/local/sbin/javac: Permission denied Disable /usr/lib/jvm/java-8-openjdk/bin/javac (requested /usr/lib/jvm/default/bin/javac) Disable /usr/share/java Warning (blacklisting): cannot open /usr/local/sbin/openssl: Permission denied Warning (blacklisting): cannot open /usr/local/sbin/openssl-1.0: Permission denied Warning (blacklisting): cannot open /usr/local/sbin/rust-gdb: Permission denied Warning (blacklisting): cannot open /usr/local/sbin/rust-lldb: Permission denied Warning (blacklisting): cannot open /usr/local/sbin/rustc: Permission denied Warning (blacklisting): cannot open /usr/local/sbin/tcc: Permission denied Warning (blacklisting): cannot open /usr/local/sbin/x86_64-tcc: Permission denied Warning (blacklisting): cannot open /usr/local/sbin/valgrind*: Permission denied Disable /usr/src Disable /usr/local/src Disable /usr/include Disable /usr/local/include Mounting noexec /run/user/1000 2353 2344 0:24 /firejail/firejail.ro.file /run/user/1000/kdeinit5__0 rw,nosuid,nodev,relatime master:12 - tmpfs run rw,mode=755,inode64 mountid=2353 fsname=/firejail/firejail.ro.file dir=/run/user/1000/kdeinit5__0 fstype=tmpfs Mounting noexec /dev/shm 2354 2244 0:99 /shm /dev/shm rw,nosuid,nodev,noexec - tmpfs tmpfs rw,mode=755,inode64 mountid=2354 fsname=/shm dir=/dev/shm fstype=tmpfs Mounting noexec /tmp 2356 2355 0:38 /.X11-unix /tmp/.X11-unix rw,nosuid,nodev,relatime master:81 - tmpfs tmpfs rw,size=10485760k,inode64 mountid=2356 fsname=/.X11-unix dir=/tmp/.X11-unix fstype=tmpfs Mounting noexec /tmp/.X11-unix 2357 2356 0:38 /.X11-unix /tmp/.X11-unix rw,nosuid,nodev,noexec,relatime master:81 - tmpfs tmpfs rw,size=10485760k,inode64 mountid=2357 fsname=/.X11-unix dir=/tmp/.X11-unix fstype=tmpfs Not blacklist /home/user/.config/discord Mounting read-only /tmp/.X11-unix 2358 2357 0:38 /.X11-unix /tmp/.X11-unix ro,nosuid,nodev,noexec,relatime master:81 - tmpfs tmpfs rw,size=10485760k,inode64 mountid=2358 fsname=/.X11-unix dir=/tmp/.X11-unix fstype=tmpfs Disable /sys/fs Disable /sys/module Creating empty /home/user/.config/pulse directory Mounting noexec /run/firejail/mnt/pulse 2361 2210 0:92 /pulse /run/firejail/mnt/pulse rw,nosuid,nodev,noexec - tmpfs tmpfs rw,mode=755,inode64 mountid=2361 fsname=/pulse dir=/run/firejail/mnt/pulse fstype=tmpfs Mounting /run/firejail/mnt/pulse on /home/user/.config/pulse 2362 2278 0:92 /pulse /home/user/.config/pulse rw,nosuid,nodev,noexec - tmpfs tmpfs rw,mode=755,inode64 mountid=2362 fsname=/pulse dir=/home/user/.config/pulse fstype=tmpfs Current directory: /home/user Mounting read-only /run/firejail/mnt/seccomp 2364 2210 0:92 /seccomp /run/firejail/mnt/seccomp ro,nosuid - tmpfs tmpfs rw,mode=755,inode64 mountid=2364 fsname=/seccomp dir=/run/firejail/mnt/seccomp fstype=tmpfs Seccomp directory: ls /run/firejail/mnt/seccomp drwxr-xr-x root root 120 . drwxr-xr-x root root 300 .. -rw-r--r-- 1000 user 568 seccomp -rw-r--r-- 1000 user 432 seccomp.32 -rw-r--r-- 1000 user 0 seccomp.postexec -rw-r--r-- 1000 user 0 seccomp.postexec32 No active seccomp files Set caps filter 240000 Drop privileges: pid 1, uid 1000, gid 1000, nogroups 1 No supplementary groups Starting application LD_PRELOAD=(null) execvp argument 0: discord ``` </details> <details><summary> debug output discord_arch_electron </summary> ``` Autoselecting /bin/bash as shell Building quoted command line: 'discord' Command name #discord# Found discord.profile profile in /etc/firejail directory Found discord.local profile in /etc/firejail directory Found globals.local profile in /etc/firejail directory Found discord-common.profile profile in /etc/firejail directory Found electron.profile profile in /etc/firejail directory Found disable-common.inc profile in /etc/firejail directory Found disable-devel.inc profile in /etc/firejail directory Found disable-exec.inc profile in /etc/firejail directory Found disable-passwdmgr.inc profile in /etc/firejail directory Found disable-programs.inc profile in /etc/firejail directory Found whitelist-common.inc profile in /etc/firejail directory Found whitelist-var-common.inc profile in /etc/firejail directory Using the local network stack Using the local network stack Initializing child process PID namespace installed Mounting tmpfs on /run/firejail/mnt directory Creating empty /run/firejail/mnt/seccomp directory Creating empty /run/firejail/mnt/seccomp/seccomp.protocol file Creating empty /run/firejail/mnt/seccomp/seccomp.postexec file Creating empty /run/firejail/mnt/seccomp/seccomp.postexec32 file Mounting /proc filesystem representing the PID namespace Basic read-only filesystem: Mounting read-only /etc 2207 1306 254:0 /etc /etc ro,noatime master:1 - ext4 /dev/mapper/root rw mountid=2207 fsname=/etc dir=/etc fstype=ext4 Mounting noexec /etc 2208 2207 254:0 /etc /etc ro,nosuid,nodev,noexec,noatime master:1 - ext4 /dev/mapper/root rw mountid=2208 fsname=/etc dir=/etc fstype=ext4 Mounting read-only /var 2209 1306 254:0 /var /var ro,noatime master:1 - ext4 /dev/mapper/root rw mountid=2209 fsname=/var dir=/var fstype=ext4 Mounting noexec /var 2210 2209 254:0 /var /var ro,nosuid,nodev,noexec,noatime master:1 - ext4 /dev/mapper/root rw mountid=2210 fsname=/var dir=/var fstype=ext4 Mounting read-only /usr 2211 1306 254:0 /usr /usr ro,noatime master:1 - ext4 /dev/mapper/root rw mountid=2211 fsname=/usr dir=/usr fstype=ext4 Mounting tmpfs on /var/lock Mounting tmpfs on /var/tmp Mounting tmpfs on /var/log Create the new utmp file Mount the new utmp file Cleaning /home directory Cleaning /run/user directory Sanitizing /etc/passwd, UID_MIN 1000 Sanitizing /etc/group, GID_MIN 1000 Disable /run/firejail/network Disable /run/firejail/bandwidth Disable /run/firejail/name Disable /run/firejail/profile Disable /run/firejail/x11 Mounting tmpfs on /dev mounting /run/firejail/mnt/dev/snd directory mounting /run/firejail/mnt/dev/dri directory Process /dev/shm directory Copying files in the new /opt directory: Mount-bind /run/firejail/mnt/opt on top of /opt Copying files in the new bin directory Checking /usr/local/bin/discord Checking /usr/bin/discord sbox run: /run/firejail/lib/fcopy /usr/bin/discord /run/firejail/mnt/bin Checking /usr/local/bin/bash Checking /usr/bin/bash sbox run: /run/firejail/lib/fcopy /usr/bin/bash /run/firejail/mnt/bin Checking /usr/local/bin/cut Checking /usr/bin/cut sbox run: /run/firejail/lib/fcopy /usr/bin/cut /run/firejail/mnt/bin Checking /usr/local/bin/echo Checking /usr/bin/echo sbox run: /run/firejail/lib/fcopy /usr/bin/echo /run/firejail/mnt/bin Checking /usr/local/bin/egrep Checking /usr/bin/egrep sbox run: /run/firejail/lib/fcopy /usr/bin/egrep /run/firejail/mnt/bin Checking /usr/local/bin/fish Checking /usr/bin/fish sbox run: /run/firejail/lib/fcopy /usr/bin/fish /run/firejail/mnt/bin Checking /usr/local/bin/grep Checking /usr/bin/grep sbox run: /run/firejail/lib/fcopy /usr/bin/grep /run/firejail/mnt/bin Checking /usr/local/bin/head Checking /usr/bin/head sbox run: /run/firejail/lib/fcopy /usr/bin/head /run/firejail/mnt/bin Checking /usr/local/bin/sed Checking /usr/bin/sed sbox run: /run/firejail/lib/fcopy /usr/bin/sed /run/firejail/mnt/bin Checking /usr/local/bin/sh Checking /usr/bin/sh sbox run: /run/firejail/lib/fcopy /usr/bin/bash /run/firejail/mnt/bin sbox run: /run/firejail/lib/fcopy /usr/bin/sh /run/firejail/mnt/bin Checking /usr/local/bin/tclsh Checking /usr/bin/tclsh sbox run: /run/firejail/lib/fcopy /usr/bin/tclsh8.6 /run/firejail/mnt/bin sbox run: /run/firejail/lib/fcopy /usr/bin/tclsh /run/firejail/mnt/bin Checking /usr/local/bin/tr Checking /usr/bin/tr sbox run: /run/firejail/lib/fcopy /usr/bin/tr /run/firejail/mnt/bin Checking /usr/local/bin/xdg-mime Checking /usr/bin/xdg-mime sbox run: /run/firejail/lib/fcopy /usr/bin/xdg-mime /run/firejail/mnt/bin Checking /usr/local/bin/xdg-open Checking /usr/bin/xdg-open sbox run: /run/firejail/lib/fcopy /usr/bin/xdg-open /run/firejail/mnt/bin Checking /usr/local/bin/zsh Checking /usr/bin/zsh sbox run: /run/firejail/lib/fcopy /usr/bin/zsh /run/firejail/mnt/bin Mount-bind /run/firejail/mnt/bin on top of /usr/local/bin Mount-bind /run/firejail/mnt/bin on top of /usr/bin Mount-bind /run/firejail/mnt/bin on top of /bin Mount-bind /run/firejail/mnt/bin on top of /usr/local/games Mount-bind /run/firejail/mnt/bin on top of /usr/local/sbin Mount-bind /run/firejail/mnt/bin on top of /usr/sbin Mount-bind /run/firejail/mnt/bin on top of /sbin Generate private-tmp whitelist commands blacklist /run/firejail/dbus Mounting read-only /proc/sys Remounting /sys directory Disable /sys/firmware Disable /sys/hypervisor Disable /sys/power Disable /sys/kernel/debug Disable /sys/kernel/vmcoreinfo Disable /proc/sys/fs/binfmt_misc Disable /proc/sys/kernel/core_pattern Disable /proc/sys/kernel/modprobe Disable /proc/sysrq-trigger Disable /proc/sys/vm/panic_on_oom Disable /proc/irq Disable /proc/bus Disable /proc/timer_list Disable /proc/kcore Disable /proc/kallsyms Disable /usr/lib/modules (requested /lib/modules) Disable /boot Disable /run/user/1000/gnupg Disable /run/user/1000/systemd Disable /proc/kmsg Copying files in the new /etc directory: Copying /etc/ca-certificates to private /etc Creating empty /run/firejail/mnt/etc/ca-certificates directory sbox run: /run/firejail/lib/fcopy /etc/ca-certificates /run/firejail/mnt/etc/ca-certificates Copying /etc/fonts to private /etc Creating empty /run/firejail/mnt/etc/fonts directory sbox run: /run/firejail/lib/fcopy /etc/fonts /run/firejail/mnt/etc/fonts Copying /etc/group to private /etc sbox run: /run/firejail/lib/fcopy /etc/group /run/firejail/mnt/etc Copying /etc/ld.so.cache to private /etc sbox run: /run/firejail/lib/fcopy /etc/ld.so.cache /run/firejail/mnt/etc Copying /etc/localtime to private /etc sbox run: /run/firejail/lib/fcopy /etc/localtime /run/firejail/mnt/etc Copying /etc/login.defs to private /etc sbox run: /run/firejail/lib/fcopy /etc/login.defs /run/firejail/mnt/etc Copying /etc/machine-id to private /etc sbox run: /run/firejail/lib/fcopy /etc/machine-id /run/firejail/mnt/etc Copying /etc/pulse to private /etc Creating empty /run/firejail/mnt/etc/pulse directory sbox run: /run/firejail/lib/fcopy /etc/pulse /run/firejail/mnt/etc/pulse Copying /etc/resolv.conf to private /etc sbox run: /run/firejail/lib/fcopy /etc/resolv.conf /run/firejail/mnt/etc Copying /etc/ssl to private /etc Creating empty /run/firejail/mnt/etc/ssl directory sbox run: /run/firejail/lib/fcopy /etc/ssl /run/firejail/mnt/etc/ssl Mount-bind /run/firejail/mnt/etc on top of /etc Copying files in the new /usr/etc directory: Mount-bind /run/firejail/mnt/usretc on top of /usr/etc Debug 553: whitelist /usr/bin/electron Debug 574: expanded: /usr/bin/electron Debug 585: new_name: /usr/bin/electron Debug 599: dir: /usr/bin Adding whitelist top level directory /usr/bin Removed path: whitelist /usr/bin/electron expanded: /usr/bin/electron realpath: (null) No such file or directory Debug 553: whitelist ${HOME}/.config/discord Debug 574: expanded: /home/user/.config/discord Debug 585: new_name: /home/user/.config/discord Debug 599: dir: /home/user Adding whitelist top level directory /home/user Debug 553: whitelist ${HOME}/.config/BetterDiscord Debug 574: expanded: /home/user/.config/BetterDiscord Debug 585: new_name: /home/user/.config/BetterDiscord Debug 599: dir: /home/user Removed path: whitelist ${HOME}/.config/BetterDiscord expanded: /home/user/.config/BetterDiscord realpath: (null) No such file or directory Debug 553: whitelist ${HOME}/.local/share/betterdiscordctl Debug 574: expanded: /home/user/.local/share/betterdiscordctl Debug 585: new_name: /home/user/.local/share/betterdiscordctl Debug 599: dir: /home/user Removed path: whitelist ${HOME}/.local/share/betterdiscordctl expanded: /home/user/.local/share/betterdiscordctl realpath: (null) No such file or directory Debug 553: whitelist ${DOWNLOADS} Directory ${DOWNLOADS} resolved as Downloads Debug 574: expanded: /home/user/Downloads Debug 585: new_name: /home/user/Downloads Debug 599: dir: /home/user Debug 553: whitelist ${HOME}/.XCompose Debug 574: expanded: /home/user/.XCompose Debug 585: new_name: /home/user/.XCompose Debug 599: dir: /home/user Removed path: whitelist ${HOME}/.XCompose expanded: /home/user/.XCompose realpath: (null) No such file or directory Debug 553: whitelist ${HOME}/.alsaequal.bin Debug 574: expanded: /home/user/.alsaequal.bin Debug 585: new_name: /home/user/.alsaequal.bin Debug 599: dir: /home/user Removed path: whitelist ${HOME}/.alsaequal.bin expanded: /home/user/.alsaequal.bin realpath: (null) No such file or directory Debug 553: whitelist ${HOME}/.asoundrc Debug 574: expanded: /home/user/.asoundrc Debug 585: new_name: /home/user/.asoundrc Debug 599: dir: /home/user Removed path: whitelist ${HOME}/.asoundrc expanded: /home/user/.asoundrc realpath: (null) No such file or directory Debug 553: whitelist ${HOME}/.config/ibus Debug 574: expanded: /home/user/.config/ibus Debug 585: new_name: /home/user/.config/ibus Debug 599: dir: /home/user Removed path: whitelist ${HOME}/.config/ibus expanded: /home/user/.config/ibus realpath: (null) No such file or directory Debug 553: whitelist ${HOME}/.config/mimeapps.list Debug 574: expanded: /home/user/.config/mimeapps.list Debug 585: new_name: /home/user/.config/mimeapps.list Debug 599: dir: /home/user Debug 553: whitelist ${HOME}/.config/pkcs11 Debug 574: expanded: /home/user/.config/pkcs11 Debug 585: new_name: /home/user/.config/pkcs11 Debug 599: dir: /home/user Removed path: whitelist ${HOME}/.config/pkcs11 expanded: /home/user/.config/pkcs11 realpath: (null) No such file or directory Debug 553: whitelist ${HOME}/.config/user-dirs.dirs Debug 574: expanded: /home/user/.config/user-dirs.dirs Debug 585: new_name: /home/user/.config/user-dirs.dirs Debug 599: dir: /home/user Debug 553: whitelist ${HOME}/.config/user-dirs.locale Debug 574: expanded: /home/user/.config/user-dirs.locale Debug 585: new_name: /home/user/.config/user-dirs.locale Debug 599: dir: /home/user Debug 553: whitelist ${HOME}/.drirc Debug 574: expanded: /home/user/.drirc Debug 585: new_name: /home/user/.drirc Debug 599: dir: /home/user Removed path: whitelist ${HOME}/.drirc expanded: /home/user/.drirc realpath: (null) No such file or directory Debug 553: whitelist ${HOME}/.icons Debug 574: expanded: /home/user/.icons Debug 585: new_name: /home/user/.icons Debug 599: dir: /home/user Debug 553: whitelist ${HOME}/.local/share/applications Debug 574: expanded: /home/user/.local/share/applications Debug 585: new_name: /home/user/.local/share/applications Debug 599: dir: /home/user Debug 553: whitelist ${HOME}/.local/share/icons Debug 574: expanded: /home/user/.local/share/icons Debug 585: new_name: /home/user/.local/share/icons Debug 599: dir: /home/user Debug 553: whitelist ${HOME}/.local/share/mime Debug 574: expanded: /home/user/.local/share/mime Debug 585: new_name: /home/user/.local/share/mime Debug 599: dir: /home/user Debug 553: whitelist ${HOME}/.mime.types Debug 574: expanded: /home/user/.mime.types Debug 585: new_name: /home/user/.mime.types Debug 599: dir: /home/user Removed path: whitelist ${HOME}/.mime.types expanded: /home/user/.mime.types realpath: (null) No such file or directory Debug 553: whitelist ${HOME}/.uim.d Debug 574: expanded: /home/user/.uim.d Debug 585: new_name: /home/user/.uim.d Debug 599: dir: /home/user Removed path: whitelist ${HOME}/.uim.d expanded: /home/user/.uim.d realpath: (null) No such file or directory Debug 553: whitelist ${HOME}/.config/dconf Debug 574: expanded: /home/user/.config/dconf Debug 585: new_name: /home/user/.config/dconf Debug 599: dir: /home/user Debug 553: whitelist ${HOME}/.cache/fontconfig Debug 574: expanded: /home/user/.cache/fontconfig Debug 585: new_name: /home/user/.cache/fontconfig Debug 599: dir: /home/user Debug 553: whitelist ${HOME}/.config/fontconfig Debug 574: expanded: /home/user/.config/fontconfig Debug 585: new_name: /home/user/.config/fontconfig Debug 599: dir: /home/user Debug 553: whitelist ${HOME}/.fontconfig Debug 574: expanded: /home/user/.fontconfig Debug 585: new_name: /home/user/.fontconfig Debug 599: dir: /home/user Removed path: whitelist ${HOME}/.fontconfig expanded: /home/user/.fontconfig realpath: (null) No such file or directory Debug 553: whitelist ${HOME}/.fonts Debug 574: expanded: /home/user/.fonts Debug 585: new_name: /home/user/.fonts Debug 599: dir: /home/user Debug 553: whitelist ${HOME}/.fonts.conf Debug 574: expanded: /home/user/.fonts.conf Debug 585: new_name: /home/user/.fonts.conf Debug 599: dir: /home/user Debug 553: whitelist ${HOME}/.fonts.conf.d Debug 574: expanded: /home/user/.fonts.conf.d Debug 585: new_name: /home/user/.fonts.conf.d Debug 599: dir: /home/user Removed path: whitelist ${HOME}/.fonts.conf.d expanded: /home/user/.fonts.conf.d realpath: (null) No such file or directory Debug 553: whitelist ${HOME}/.fonts.d Debug 574: expanded: /home/user/.fonts.d Debug 585: new_name: /home/user/.fonts.d Debug 599: dir: /home/user Removed path: whitelist ${HOME}/.fonts.d expanded: /home/user/.fonts.d realpath: (null) No such file or directory Debug 553: whitelist ${HOME}/.local/share/fonts Debug 574: expanded: /home/user/.local/share/fonts Debug 585: new_name: /home/user/.local/share/fonts Debug 599: dir: /home/user Removed path: whitelist ${HOME}/.local/share/fonts expanded: /home/user/.local/share/fonts realpath: (null) No such file or directory Debug 553: whitelist ${HOME}/.pangorc Debug 574: expanded: /home/user/.pangorc Debug 585: new_name: /home/user/.pangorc Debug 599: dir: /home/user Removed path: whitelist ${HOME}/.pangorc expanded: /home/user/.pangorc realpath: (null) No such file or directory Debug 553: whitelist ${HOME}/.config/gtk-2.0 Debug 574: expanded: /home/user/.config/gtk-2.0 Debug 585: new_name: /home/user/.config/gtk-2.0 Debug 599: dir: /home/user Debug 553: whitelist ${HOME}/.config/gtk-3.0 Debug 574: expanded: /home/user/.config/gtk-3.0 Debug 585: new_name: /home/user/.config/gtk-3.0 Debug 599: dir: /home/user Debug 553: whitelist ${HOME}/.config/gtk-4.0 Debug 574: expanded: /home/user/.config/gtk-4.0 Debug 585: new_name: /home/user/.config/gtk-4.0 Debug 599: dir: /home/user Debug 553: whitelist ${HOME}/.config/gtkrc Debug 574: expanded: /home/user/.config/gtkrc Debug 585: new_name: /home/user/.config/gtkrc Debug 599: dir: /home/user Debug 553: whitelist ${HOME}/.config/gtkrc-2.0 Debug 574: expanded: /home/user/.config/gtkrc-2.0 Debug 585: new_name: /home/user/.config/gtkrc-2.0 Debug 599: dir: /home/user Debug 553: whitelist ${HOME}/.gnome2 Debug 574: expanded: /home/user/.gnome2 Debug 585: new_name: /home/user/.gnome2 Debug 599: dir: /home/user Removed path: whitelist ${HOME}/.gnome2 expanded: /home/user/.gnome2 realpath: (null) No such file or directory Debug 553: whitelist ${HOME}/.gnome2-private Debug 574: expanded: /home/user/.gnome2-private Debug 585: new_name: /home/user/.gnome2-private Debug 599: dir: /home/user Removed path: whitelist ${HOME}/.gnome2-private expanded: /home/user/.gnome2-private realpath: (null) No such file or directory Debug 553: whitelist ${HOME}/.gtk-2.0 Debug 574: expanded: /home/user/.gtk-2.0 Debug 585: new_name: /home/user/.gtk-2.0 Debug 599: dir: /home/user Removed path: whitelist ${HOME}/.gtk-2.0 expanded: /home/user/.gtk-2.0 realpath: (null) No such file or directory Debug 553: whitelist ${HOME}/.gtkrc Debug 574: expanded: /home/user/.gtkrc Debug 585: new_name: /home/user/.gtkrc Debug 599: dir: /home/user Removed path: whitelist ${HOME}/.gtkrc expanded: /home/user/.gtkrc realpath: (null) No such file or directory Debug 553: whitelist ${HOME}/.gtkrc-2.0 Debug 574: expanded: /home/user/.gtkrc-2.0 Debug 585: new_name: /home/user/.gtkrc-2.0 Debug 599: dir: /home/user Debug 553: whitelist ${HOME}/.kde/share/config/gtkrc Debug 574: expanded: /home/user/.kde/share/config/gtkrc Debug 585: new_name: /home/user/.kde/share/config/gtkrc Debug 599: dir: /home/user Removed path: whitelist ${HOME}/.kde/share/config/gtkrc expanded: /home/user/.kde/share/config/gtkrc realpath: (null) No such file or directory Debug 553: whitelist ${HOME}/.kde/share/config/gtkrc-2.0 Debug 574: expanded: /home/user/.kde/share/config/gtkrc-2.0 Debug 585: new_name: /home/user/.kde/share/config/gtkrc-2.0 Debug 599: dir: /home/user Removed path: whitelist ${HOME}/.kde/share/config/gtkrc-2.0 expanded: /home/user/.kde/share/config/gtkrc-2.0 realpath: (null) No such file or directory Debug 553: whitelist ${HOME}/.kde4/share/config/gtkrc Debug 574: expanded: /home/user/.kde4/share/config/gtkrc Debug 585: new_name: /home/user/.kde4/share/config/gtkrc Debug 599: dir: /home/user Removed path: whitelist ${HOME}/.kde4/share/config/gtkrc expanded: /home/user/.kde4/share/config/gtkrc realpath: (null) No such file or directory Debug 553: whitelist ${HOME}/.kde4/share/config/gtkrc-2.0 Debug 574: expanded: /home/user/.kde4/share/config/gtkrc-2.0 Debug 585: new_name: /home/user/.kde4/share/config/gtkrc-2.0 Debug 599: dir: /home/user Removed path: whitelist ${HOME}/.kde4/share/config/gtkrc-2.0 expanded: /home/user/.kde4/share/config/gtkrc-2.0 realpath: (null) No such file or directory Debug 553: whitelist ${HOME}/.local/share/themes Debug 574: expanded: /home/user/.local/share/themes Debug 585: new_name: /home/user/.local/share/themes Debug 599: dir: /home/user Removed path: whitelist ${HOME}/.local/share/themes expanded: /home/user/.local/share/themes realpath: (null) No such file or directory Debug 553: whitelist ${HOME}/.themes Debug 574: expanded: /home/user/.themes Debug 585: new_name: /home/user/.themes Debug 599: dir: /home/user Removed path: whitelist ${HOME}/.themes expanded: /home/user/.themes realpath: (null) No such file or directory Debug 553: whitelist ${HOME}/.cache/kioexec/krun Debug 574: expanded: /home/user/.cache/kioexec/krun Debug 585: new_name: /home/user/.cache/kioexec/krun Debug 599: dir: /home/user Debug 553: whitelist ${HOME}/.config/Kvantum Debug 574: expanded: /home/user/.config/Kvantum Debug 585: new_name: /home/user/.config/Kvantum Debug 599: dir: /home/user Debug 553: whitelist ${HOME}/.config/Trolltech.conf Debug 574: expanded: /home/user/.config/Trolltech.conf Debug 585: new_name: /home/user/.config/Trolltech.conf Debug 599: dir: /home/user Debug 553: whitelist ${HOME}/.config/QtProject.conf Debug 574: expanded: /home/user/.config/QtProject.conf Debug 585: new_name: /home/user/.config/QtProject.conf Debug 599: dir: /home/user Debug 553: whitelist ${HOME}/.config/kdeglobals Debug 574: expanded: /home/user/.config/kdeglobals Debug 585: new_name: /home/user/.config/kdeglobals Debug 599: dir: /home/user Debug 553: whitelist ${HOME}/.config/kio_httprc Debug 574: expanded: /home/user/.config/kio_httprc Debug 585: new_name: /home/user/.config/kio_httprc Debug 599: dir: /home/user Debug 553: whitelist ${HOME}/.config/kioslaverc Debug 574: expanded: /home/user/.config/kioslaverc Debug 585: new_name: /home/user/.config/kioslaverc Debug 599: dir: /home/user Debug 553: whitelist ${HOME}/.config/ksslcablacklist Debug 574: expanded: /home/user/.config/ksslcablacklist Debug 585: new_name: /home/user/.config/ksslcablacklist Debug 599: dir: /home/user Removed path: whitelist ${HOME}/.config/ksslcablacklist expanded: /home/user/.config/ksslcablacklist realpath: (null) No such file or directory Debug 553: whitelist ${HOME}/.config/qt5ct Debug 574: expanded: /home/user/.config/qt5ct Debug 585: new_name: /home/user/.config/qt5ct Debug 599: dir: /home/user Removed path: whitelist ${HOME}/.config/qt5ct expanded: /home/user/.config/qt5ct realpath: (null) No such file or directory Debug 553: whitelist ${HOME}/.config/qtcurve Debug 574: expanded: /home/user/.config/qtcurve Debug 585: new_name: /home/user/.config/qtcurve Debug 599: dir: /home/user Removed path: whitelist ${HOME}/.config/qtcurve expanded: /home/user/.config/qtcurve realpath: (null) No such file or directory Debug 553: whitelist ${HOME}/.kde/share/config/kdeglobals Debug 574: expanded: /home/user/.kde/share/config/kdeglobals Debug 585: new_name: /home/user/.kde/share/config/kdeglobals Debug 599: dir: /home/user Removed path: whitelist ${HOME}/.kde/share/config/kdeglobals expanded: /home/user/.kde/share/config/kdeglobals realpath: (null) No such file or directory Debug 553: whitelist ${HOME}/.kde/share/config/kio_httprc Debug 574: expanded: /home/user/.kde/share/config/kio_httprc Debug 585: new_name: /home/user/.kde/share/config/kio_httprc Debug 599: dir: /home/user Removed path: whitelist ${HOME}/.kde/share/config/kio_httprc expanded: /home/user/.kde/share/config/kio_httprc realpath: (null) No such file or directory Debug 553: whitelist ${HOME}/.kde/share/config/kioslaverc Debug 574: expanded: /home/user/.kde/share/config/kioslaverc Debug 585: new_name: /home/user/.kde/share/config/kioslaverc Debug 599: dir: /home/user Removed path: whitelist ${HOME}/.kde/share/config/kioslaverc expanded: /home/user/.kde/share/config/kioslaverc realpath: (null) No such file or directory Debug 553: whitelist ${HOME}/.kde/share/config/ksslcablacklist Debug 574: expanded: /home/user/.kde/share/config/ksslcablacklist Debug 585: new_name: /home/user/.kde/share/config/ksslcablacklist Debug 599: dir: /home/user Removed path: whitelist ${HOME}/.kde/share/config/ksslcablacklist expanded: /home/user/.kde/share/config/ksslcablacklist realpath: (null) No such file or directory Debug 553: whitelist ${HOME}/.kde/share/config/oxygenrc Debug 574: expanded: /home/user/.kde/share/config/oxygenrc Debug 585: new_name: /home/user/.kde/share/config/oxygenrc Debug 599: dir: /home/user Removed path: whitelist ${HOME}/.kde/share/config/oxygenrc expanded: /home/user/.kde/share/config/oxygenrc realpath: (null) No such file or directory Debug 553: whitelist ${HOME}/.kde/share/icons Debug 574: expanded: /home/user/.kde/share/icons Debug 585: new_name: /home/user/.kde/share/icons Debug 599: dir: /home/user Removed path: whitelist ${HOME}/.kde/share/icons expanded: /home/user/.kde/share/icons realpath: (null) No such file or directory Debug 553: whitelist ${HOME}/.kde4/share/config/kdeglobals Debug 574: expanded: /home/user/.kde4/share/config/kdeglobals Debug 585: new_name: /home/user/.kde4/share/config/kdeglobals Debug 599: dir: /home/user Debug 553: whitelist ${HOME}/.kde4/share/config/kio_httprc Debug 574: expanded: /home/user/.kde4/share/config/kio_httprc Debug 585: new_name: /home/user/.kde4/share/config/kio_httprc Debug 599: dir: /home/user Debug 553: whitelist ${HOME}/.kde4/share/config/kioslaverc Debug 574: expanded: /home/user/.kde4/share/config/kioslaverc Debug 585: new_name: /home/user/.kde4/share/config/kioslaverc Debug 599: dir: /home/user Debug 553: whitelist ${HOME}/.kde4/share/config/ksslcablacklist Debug 574: expanded: /home/user/.kde4/share/config/ksslcablacklist Debug 585: new_name: /home/user/.kde4/share/config/ksslcablacklist Debug 599: dir: /home/user Removed path: whitelist ${HOME}/.kde4/share/config/ksslcablacklist expanded: /home/user/.kde4/share/config/ksslcablacklist realpath: (null) No such file or directory Debug 553: whitelist ${HOME}/.kde4/share/config/oxygenrc Debug 574: expanded: /home/user/.kde4/share/config/oxygenrc Debug 585: new_name: /home/user/.kde4/share/config/oxygenrc Debug 599: dir: /home/user Removed path: whitelist ${HOME}/.kde4/share/config/oxygenrc expanded: /home/user/.kde4/share/config/oxygenrc realpath: (null) No such file or directory Debug 553: whitelist ${HOME}/.kde4/share/icons Debug 574: expanded: /home/user/.kde4/share/icons Debug 585: new_name: /home/user/.kde4/share/icons Debug 599: dir: /home/user Removed path: whitelist ${HOME}/.kde4/share/icons expanded: /home/user/.kde4/share/icons realpath: (null) No such file or directory Debug 553: whitelist ${HOME}/.local/share/qt5ct Debug 574: expanded: /home/user/.local/share/qt5ct Debug 585: new_name: /home/user/.local/share/qt5ct Debug 599: dir: /home/user Removed path: whitelist ${HOME}/.local/share/qt5ct expanded: /home/user/.local/share/qt5ct realpath: (null) No such file or directory Debug 553: whitelist /var/lib/aspell Debug 574: expanded: /var/lib/aspell Debug 585: new_name: /var/lib/aspell Debug 599: dir: /var Adding whitelist top level directory /var Removed path: whitelist /var/lib/aspell expanded: /var/lib/aspell realpath: (null) No such file or directory Debug 553: whitelist /var/lib/ca-certificates Debug 574: expanded: /var/lib/ca-certificates Debug 585: new_name: /var/lib/ca-certificates Debug 599: dir: /var Removed path: whitelist /var/lib/ca-certificates expanded: /var/lib/ca-certificates realpath: (null) No such file or directory Debug 553: whitelist /var/lib/dbus Debug 574: expanded: /var/lib/dbus Debug 585: new_name: /var/lib/dbus Debug 599: dir: /var Debug 553: whitelist /var/lib/menu-xdg Debug 574: expanded: /var/lib/menu-xdg Debug 585: new_name: /var/lib/menu-xdg Debug 599: dir: /var Removed path: whitelist /var/lib/menu-xdg expanded: /var/lib/menu-xdg realpath: (null) No such file or directory Debug 553: whitelist /var/lib/uim Debug 574: expanded: /var/lib/uim Debug 585: new_name: /var/lib/uim Debug 599: dir: /var Removed path: whitelist /var/lib/uim expanded: /var/lib/uim realpath: (null) No such file or directory Debug 553: whitelist /var/cache/fontconfig Debug 574: expanded: /var/cache/fontconfig Debug 585: new_name: /var/cache/fontconfig Debug 599: dir: /var Debug 553: whitelist /var/tmp Debug 574: expanded: /var/tmp Debug 585: new_name: /var/tmp Debug 599: dir: /var Debug 553: whitelist /var/run Debug 574: expanded: /var/run Debug 585: new_name: /var/run Debug 599: dir: /var Debug 553: whitelist /var/lock Debug 574: expanded: /var/lock Debug 585: new_name: /var/lock Debug 599: dir: /var Debug 553: whitelist /tmp/.X11-unix Debug 574: expanded: /tmp/.X11-unix Debug 585: new_name: /tmp/.X11-unix Debug 599: dir: /tmp Adding whitelist top level directory /tmp Mounting tmpfs on /usr/bin, check owner: no 2269 2253 0:121 / /usr/bin rw,nosuid,nodev,relatime - tmpfs tmpfs rw,mode=755,inode64 mountid=2269 fsname=/ dir=/usr/bin fstype=tmpfs Mounting tmpfs on /var, check owner: no 2270 2210 0:122 / /var rw,nosuid,nodev,noexec,noatime - tmpfs tmpfs rw,mode=755,inode64 mountid=2270 fsname=/ dir=/var fstype=tmpfs Mounting tmpfs on /tmp, check owner: no 2271 2202 0:124 / /tmp rw,nosuid,nodev,relatime - tmpfs tmpfs rw,inode64 mountid=2271 fsname=/ dir=/tmp fstype=tmpfs Mounting a new /root directory Mounting a new /home directory Create a new user directory Debug 735: file: /home/user/.config/discord; dirfd: 5; topdir: /home/user; rel: .config/discord Whitelisting /home/user/.config/discord 2274 2273 254:0 /home/user/.config/discord /home/user/.config/discord rw,noatime master:1 - ext4 /dev/mapper/root rw mountid=2274 fsname=/home/user/.config/discord dir=/home/user/.config/discord fstype=ext4 Debug 735: file: /home/user/Downloads; dirfd: 5; topdir: /home/user; rel: Downloads Whitelisting /home/user/Downloads 2275 2273 254:0 /home/user/Downloads /home/user/Downloads rw,noatime master:1 - ext4 /dev/mapper/root rw mountid=2275 fsname=/home/user/Downloads dir=/home/user/Downloads fstype=ext4 Debug 735: file: /home/user/.config/mimeapps.list; dirfd: 5; topdir: /home/user; rel: .config/mimeapps.list Whitelisting /home/user/.config/mimeapps.list 2276 2273 254:0 /home/user/.config/mimeapps.list /home/user/.config/mimeapps.list rw,noatime master:1 - ext4 /dev/mapper/root rw mountid=2276 fsname=/home/user/.config/mimeapps.list dir=/home/user/.config/mimeapps.list fstype=ext4 Debug 735: file: /home/user/.config/user-dirs.dirs; dirfd: 5; topdir: /home/user; rel: .config/user-dirs.dirs Whitelisting /home/user/.config/user-dirs.dirs 2277 2273 254:0 /home/user/.config/user-dirs.dirs /home/user/.config/user-dirs.dirs rw,noatime master:1 - ext4 /dev/mapper/root rw mountid=2277 fsname=/home/user/.config/user-dirs.dirs dir=/home/user/.config/user-dirs.dirs fstype=ext4 Debug 735: file: /home/user/.config/user-dirs.locale; dirfd: 5; topdir: /home/user; rel: .config/user-dirs.locale Whitelisting /home/user/.config/user-dirs.locale 2278 2273 254:0 /home/user/.config/user-dirs.locale /home/user/.config/user-dirs.locale rw,noatime master:1 - ext4 /dev/mapper/root rw mountid=2278 fsname=/home/user/.config/user-dirs.locale dir=/home/user/.config/user-dirs.locale fstype=ext4 Debug 735: file: /home/user/.icons; dirfd: 5; topdir: /home/user; rel: .icons Whitelisting /home/user/.icons 2279 2273 254:0 /home/user/.icons /home/user/.icons rw,noatime master:1 - ext4 /dev/mapper/root rw mountid=2279 fsname=/home/user/.icons dir=/home/user/.icons fstype=ext4 Debug 735: file: /home/user/.local/share/applications; dirfd: 5; topdir: /home/user; rel: .local/share/applications Whitelisting /home/user/.local/share/applications 2280 2273 254:0 /home/user/.local/share/applications /home/user/.local/share/applications rw,noatime master:1 - ext4 /dev/mapper/root rw mountid=2280 fsname=/home/user/.local/share/applications dir=/home/user/.local/share/applications fstype=ext4 Debug 735: file: /home/user/.local/share/icons; dirfd: 5; topdir: /home/user; rel: .local/share/icons Whitelisting /home/user/.local/share/icons 2281 2273 254:0 /home/user/.local/share/icons /home/user/.local/share/icons rw,noatime master:1 - ext4 /dev/mapper/root rw mountid=2281 fsname=/home/user/.local/share/icons dir=/home/user/.local/share/icons fstype=ext4 Debug 735: file: /home/user/.local/share/mime; dirfd: 5; topdir: /home/user; rel: .local/share/mime Whitelisting /home/user/.local/share/mime 2282 2273 254:0 /home/user/.local/share/mime /home/user/.local/share/mime rw,noatime master:1 - ext4 /dev/mapper/root rw mountid=2282 fsname=/home/user/.local/share/mime dir=/home/user/.local/share/mime fstype=ext4 Debug 735: file: /home/user/.config/dconf; dirfd: 5; topdir: /home/user; rel: .config/dconf Whitelisting /home/user/.config/dconf 2283 2273 254:0 /home/user/.config/dconf /home/user/.config/dconf rw,noatime master:1 - ext4 /dev/mapper/root rw mountid=2283 fsname=/home/user/.config/dconf dir=/home/user/.config/dconf fstype=ext4 Debug 735: file: /home/user/.cache/fontconfig; dirfd: 5; topdir: /home/user; rel: .cache/fontconfig Whitelisting /home/user/.cache/fontconfig 2284 2273 254:0 /home/user/.cache/fontconfig /home/user/.cache/fontconfig rw,noatime master:1 - ext4 /dev/mapper/root rw mountid=2284 fsname=/home/user/.cache/fontconfig dir=/home/user/.cache/fontconfig fstype=ext4 Debug 735: file: /home/user/.config/fontconfig; dirfd: 5; topdir: /home/user; rel: .config/fontconfig Whitelisting /home/user/.config/fontconfig 2285 2273 254:0 /home/user/.config/fontconfig /home/user/.config/fontconfig rw,noatime master:1 - ext4 /dev/mapper/root rw mountid=2285 fsname=/home/user/.config/fontconfig dir=/home/user/.config/fontconfig fstype=ext4 Debug 735: file: /home/user/.fonts; dirfd: 5; topdir: /home/user; rel: .fonts Whitelisting /home/user/.fonts 2286 2273 254:0 /home/user/.fonts /home/user/.fonts rw,noatime master:1 - ext4 /dev/mapper/root rw mountid=2286 fsname=/home/user/.fonts dir=/home/user/.fonts fstype=ext4 Debug 735: file: /home/user/.config/fontconfig/fonts.conf; dirfd: 5; topdir: /home/user; rel: .config/fontconfig/fonts.conf Created symbolic link /home/user/.fonts.conf -> /home/user/.config/fontconfig/fonts.conf Debug 735: file: /home/user/.config/gtk-2.0; dirfd: 5; topdir: /home/user; rel: .config/gtk-2.0 Whitelisting /home/user/.config/gtk-2.0 2287 2273 254:0 /home/user/.config/gtk-2.0 /home/user/.config/gtk-2.0 rw,noatime master:1 - ext4 /dev/mapper/root rw mountid=2287 fsname=/home/user/.config/gtk-2.0 dir=/home/user/.config/gtk-2.0 fstype=ext4 Debug 735: file: /home/user/.config/gtk-3.0; dirfd: 5; topdir: /home/user; rel: .config/gtk-3.0 Whitelisting /home/user/.config/gtk-3.0 2288 2273 254:0 /home/user/.config/gtk-3.0 /home/user/.config/gtk-3.0 rw,noatime master:1 - ext4 /dev/mapper/root rw mountid=2288 fsname=/home/user/.config/gtk-3.0 dir=/home/user/.config/gtk-3.0 fstype=ext4 Debug 735: file: /home/user/.config/gtk-4.0; dirfd: 5; topdir: /home/user; rel: .config/gtk-4.0 Whitelisting /home/user/.config/gtk-4.0 2289 2273 254:0 /home/user/.config/gtk-4.0 /home/user/.config/gtk-4.0 rw,noatime master:1 - ext4 /dev/mapper/root rw mountid=2289 fsname=/home/user/.config/gtk-4.0 dir=/home/user/.config/gtk-4.0 fstype=ext4 Debug 735: file: /home/user/.config/gtkrc; dirfd: 5; topdir: /home/user; rel: .config/gtkrc Whitelisting /home/user/.config/gtkrc 2290 2273 254:0 /home/user/.config/gtkrc /home/user/.config/gtkrc rw,noatime master:1 - ext4 /dev/mapper/root rw mountid=2290 fsname=/home/user/.config/gtkrc dir=/home/user/.config/gtkrc fstype=ext4 Debug 735: file: /home/user/.config/gtkrc-2.0; dirfd: 5; topdir: /home/user; rel: .config/gtkrc-2.0 Whitelisting /home/user/.config/gtkrc-2.0 2291 2273 254:0 /home/user/.config/gtkrc-2.0 /home/user/.config/gtkrc-2.0 rw,noatime master:1 - ext4 /dev/mapper/root rw mountid=2291 fsname=/home/user/.config/gtkrc-2.0 dir=/home/user/.config/gtkrc-2.0 fstype=ext4 Debug 735: file: /home/user/.gtkrc-2.0; dirfd: 5; topdir: /home/user; rel: .gtkrc-2.0 Whitelisting /home/user/.gtkrc-2.0 2292 2273 254:0 /home/user/.gtkrc-2.0 /home/user/.gtkrc-2.0 rw,noatime master:1 - ext4 /dev/mapper/root rw mountid=2292 fsname=/home/user/.gtkrc-2.0 dir=/home/user/.gtkrc-2.0 fstype=ext4 Debug 735: file: /home/user/.cache/kioexec/krun; dirfd: 5; topdir: /home/user; rel: .cache/kioexec/krun Whitelisting /home/user/.cache/kioexec/krun 2293 2273 254:0 /home/user/.cache/kioexec/krun /home/user/.cache/kioexec/krun rw,noatime master:1 - ext4 /dev/mapper/root rw mountid=2293 fsname=/home/user/.cache/kioexec/krun dir=/home/user/.cache/kioexec/krun fstype=ext4 Debug 735: file: /home/user/.config/Kvantum; dirfd: 5; topdir: /home/user; rel: .config/Kvantum Whitelisting /home/user/.config/Kvantum 2294 2273 254:0 /home/user/.config/Kvantum /home/user/.config/Kvantum rw,noatime master:1 - ext4 /dev/mapper/root rw mountid=2294 fsname=/home/user/.config/Kvantum dir=/home/user/.config/Kvantum fstype=ext4 Debug 735: file: /home/user/.config/Trolltech.conf; dirfd: 5; topdir: /home/user; rel: .config/Trolltech.conf Whitelisting /home/user/.config/Trolltech.conf 2295 2273 254:0 /home/user/.config/Trolltech.conf /home/user/.config/Trolltech.conf rw,noatime master:1 - ext4 /dev/mapper/root rw mountid=2295 fsname=/home/user/.config/Trolltech.conf dir=/home/user/.config/Trolltech.conf fstype=ext4 Debug 735: file: /home/user/.config/QtProject.conf; dirfd: 5; topdir: /home/user; rel: .config/QtProject.conf Whitelisting /home/user/.config/QtProject.conf 2296 2273 254:0 /home/user/.config/QtProject.conf /home/user/.config/QtProject.conf rw,noatime master:1 - ext4 /dev/mapper/root rw mountid=2296 fsname=/home/user/.config/QtProject.conf dir=/home/user/.config/QtProject.conf fstype=ext4 Debug 735: file: /home/user/.config/kdeglobals; dirfd: 5; topdir: /home/user; rel: .config/kdeglobals Whitelisting /home/user/.config/kdeglobals 2297 2273 254:0 /home/user/.config/kdeglobals /home/user/.config/kdeglobals rw,noatime master:1 - ext4 /dev/mapper/root rw mountid=2297 fsname=/home/user/.config/kdeglobals dir=/home/user/.config/kdeglobals fstype=ext4 Debug 735: file: /home/user/.config/kio_httprc; dirfd: 5; topdir: /home/user; rel: .config/kio_httprc Whitelisting /home/user/.config/kio_httprc 2298 2273 254:0 /home/user/.config/kio_httprc /home/user/.config/kio_httprc rw,noatime master:1 - ext4 /dev/mapper/root rw mountid=2298 fsname=/home/user/.config/kio_httprc dir=/home/user/.config/kio_httprc fstype=ext4 Debug 735: file: /home/user/.config/kioslaverc; dirfd: 5; topdir: /home/user; rel: .config/kioslaverc Whitelisting /home/user/.config/kioslaverc 2299 2273 254:0 /home/user/.config/kioslaverc /home/user/.config/kioslaverc rw,noatime master:1 - ext4 /dev/mapper/root rw mountid=2299 fsname=/home/user/.config/kioslaverc dir=/home/user/.config/kioslaverc fstype=ext4 Debug 735: file: /home/user/.kde4/share/config/kdeglobals; dirfd: 5; topdir: /home/user; rel: .kde4/share/config/kdeglobals Whitelisting /home/user/.kde4/share/config/kdeglobals 2300 2273 254:0 /home/user/.kde4/share/config/kdeglobals /home/user/.kde4/share/config/kdeglobals rw,noatime master:1 - ext4 /dev/mapper/root rw mountid=2300 fsname=/home/user/.kde4/share/config/kdeglobals dir=/home/user/.kde4/share/config/kdeglobals fstype=ext4 Debug 735: file: /home/user/.kde4/share/config/kio_httprc; dirfd: 5; topdir: /home/user; rel: .kde4/share/config/kio_httprc Whitelisting /home/user/.kde4/share/config/kio_httprc 2301 2273 254:0 /home/user/.kde4/share/config/kio_httprc /home/user/.kde4/share/config/kio_httprc rw,noatime master:1 - ext4 /dev/mapper/root rw mountid=2301 fsname=/home/user/.kde4/share/config/kio_httprc dir=/home/user/.kde4/share/config/kio_httprc fstype=ext4 Debug 735: file: /home/user/.kde4/share/config/kioslaverc; dirfd: 5; topdir: /home/user; rel: .kde4/share/config/kioslaverc Whitelisting /home/user/.kde4/share/config/kioslaverc 2302 2273 254:0 /home/user/.kde4/share/config/kioslaverc /home/user/.kde4/share/config/kioslaverc rw,noatime master:1 - ext4 /dev/mapper/root rw mountid=2302 fsname=/home/user/.kde4/share/config/kioslaverc dir=/home/user/.kde4/share/config/kioslaverc fstype=ext4 Debug 735: file: /var/lib/dbus; dirfd: 7; topdir: /var; rel: lib/dbus Whitelisting /var/lib/dbus 2303 2270 254:0 /var/lib/dbus /var/lib/dbus ro,nosuid,nodev,noexec,noatime master:1 - ext4 /dev/mapper/root rw mountid=2303 fsname=/var/lib/dbus dir=/var/lib/dbus fstype=ext4 Debug 735: file: /var/cache/fontconfig; dirfd: 7; topdir: /var; rel: cache/fontconfig Whitelisting /var/cache/fontconfig 2304 2270 254:0 /var/cache/fontconfig /var/cache/fontconfig ro,nosuid,nodev,noexec,noatime master:1 - ext4 /dev/mapper/root rw mountid=2304 fsname=/var/cache/fontconfig dir=/var/cache/fontconfig fstype=ext4 Debug 735: file: /var/tmp; dirfd: 7; topdir: /var; rel: tmp Whitelisting /var/tmp 2305 2270 0:95 / /var/tmp rw,nosuid,nodev,noexec - tmpfs tmpfs rw,inode64 mountid=2305 fsname=/ dir=/var/tmp fstype=tmpfs Created symbolic link /var/run -> /run Created symbolic link /var/lock -> /run/lock Debug 735: file: /tmp/.X11-unix; dirfd: 8; topdir: /tmp; rel: .X11-unix Whitelisting /tmp/.X11-unix 2306 2271 0:38 /.X11-unix /tmp/.X11-unix rw,nosuid,nodev,relatime master:81 - tmpfs tmpfs rw,size=10485760k,inode64 mountid=2306 fsname=/.X11-unix dir=/tmp/.X11-unix fstype=tmpfs Disable /data Mounting read-only /home/user/.Xauthority 2308 2273 0:126 /user/.Xauthority /home/user/.Xauthority ro,nosuid,nodev,noexec - tmpfs tmpfs rw,mode=755,inode64 mountid=2308 fsname=/user/.Xauthority dir=/home/user/.Xauthority fstype=tmpfs Mounting read-only /home/user/.config/kdeglobals 2309 2297 254:0 /home/user/.config/kdeglobals /home/user/.config/kdeglobals ro,noatime master:1 - ext4 /dev/mapper/root rw mountid=2309 fsname=/home/user/.config/kdeglobals dir=/home/user/.config/kdeglobals fstype=ext4 Mounting read-only /home/user/.config/kio_httprc 2310 2298 254:0 /home/user/.config/kio_httprc /home/user/.config/kio_httprc ro,noatime master:1 - ext4 /dev/mapper/root rw mountid=2310 fsname=/home/user/.config/kio_httprc dir=/home/user/.config/kio_httprc fstype=ext4 Mounting read-only /home/user/.config/kioslaverc 2311 2299 254:0 /home/user/.config/kioslaverc /home/user/.config/kioslaverc ro,noatime master:1 - ext4 /dev/mapper/root rw mountid=2311 fsname=/home/user/.config/kioslaverc dir=/home/user/.config/kioslaverc fstype=ext4 Mounting read-only /home/user/.kde4/share/config/kdeglobals 2312 2300 254:0 /home/user/.kde4/share/config/kdeglobals /home/user/.kde4/share/config/kdeglobals ro,noatime master:1 - ext4 /dev/mapper/root rw mountid=2312 fsname=/home/user/.kde4/share/config/kdeglobals dir=/home/user/.kde4/share/config/kdeglobals fstype=ext4 Mounting read-only /home/user/.kde4/share/config/kio_httprc 2313 2301 254:0 /home/user/.kde4/share/config/kio_httprc /home/user/.kde4/share/config/kio_httprc ro,noatime master:1 - ext4 /dev/mapper/root rw mountid=2313 fsname=/home/user/.kde4/share/config/kio_httprc dir=/home/user/.kde4/share/config/kio_httprc fstype=ext4 Mounting read-only /home/user/.kde4/share/config/kioslaverc 2314 2302 254:0 /home/user/.kde4/share/config/kioslaverc /home/user/.kde4/share/config/kioslaverc ro,noatime master:1 - ext4 /dev/mapper/root rw mountid=2314 fsname=/home/user/.kde4/share/config/kioslaverc dir=/home/user/.kde4/share/config/kioslaverc fstype=ext4 Disable /run/user/1000/klauncherqDGjjZ.1.slave-socket Disable /run/user/1000/klauncherWjdCXV.1.slave-socket Disable /run/user/1000/klauncherjrSMBI.1.slave-socket Disable /run/user/1000/kdeinit5__0 Mounting read-only /home/user/.config/dconf 2319 2283 254:0 /home/user/.config/dconf /home/user/.config/dconf ro,noatime master:1 - ext4 /dev/mapper/root rw mountid=2319 fsname=/home/user/.config/dconf dir=/home/user/.config/dconf fstype=ext4 Disable /run/user/1000/systemd Disable /usr/share/applications/veracrypt.desktop Disable /usr/share/pixmaps/veracrypt.xpm Disable /run/screens (requested /var/run/screens) Mounting read-only /home/user/.local/share/applications 2324 2280 254:0 /home/user/.local/share/applications /home/user/.local/share/applications ro,noatime master:1 - ext4 /dev/mapper/root rw mountid=2324 fsname=/home/user/.local/share/applications dir=/home/user/.local/share/applications fstype=ext4 Mounting read-only /home/user/.config/mimeapps.list 2325 2276 254:0 /home/user/.config/mimeapps.list /home/user/.config/mimeapps.list ro,noatime master:1 - ext4 /dev/mapper/root rw mountid=2325 fsname=/home/user/.config/mimeapps.list dir=/home/user/.config/mimeapps.list fstype=ext4 Mounting read-only /home/user/.config/user-dirs.dirs 2326 2277 254:0 /home/user/.config/user-dirs.dirs /home/user/.config/user-dirs.dirs ro,noatime master:1 - ext4 /dev/mapper/root rw mountid=2326 fsname=/home/user/.config/user-dirs.dirs dir=/home/user/.config/user-dirs.dirs fstype=ext4 Mounting read-only /home/user/.config/user-dirs.locale 2327 2278 254:0 /home/user/.config/user-dirs.locale /home/user/.config/user-dirs.locale ro,noatime master:1 - ext4 /dev/mapper/root rw mountid=2327 fsname=/home/user/.config/user-dirs.locale dir=/home/user/.config/user-dirs.locale fstype=ext4 Mounting read-only /home/user/.local/share/mime 2328 2282 254:0 /home/user/.local/share/mime /home/user/.local/share/mime ro,noatime master:1 - ext4 /dev/mapper/root rw mountid=2328 fsname=/home/user/.local/share/mime dir=/home/user/.local/share/mime fstype=ext4 Disable /usr/local/sbin Warning (blacklisting): cannot open /usr/local/sbin/at: Permission denied Warning (blacklisting): cannot open /usr/local/sbin/busybox: Permission denied Warning (blacklisting): cannot open /usr/local/sbin/chage: Permission denied Warning (blacklisting): cannot open /usr/local/sbin/chfn: Permission denied Warning (blacklisting): cannot open /usr/local/sbin/chsh: Permission denied Warning (blacklisting): cannot open /usr/local/sbin/crontab: Permission denied Warning (blacklisting): cannot open /usr/local/sbin/evtest: Permission denied Warning (blacklisting): cannot open /usr/local/sbin/expiry: Permission denied Warning (blacklisting): cannot open /usr/local/sbin/fusermount: Permission denied Warning (blacklisting): cannot open /usr/local/sbin/gksu: Permission denied Warning (blacklisting): cannot open /usr/local/sbin/gksudo: Permission denied Warning (blacklisting): cannot open /usr/local/sbin/gpasswd: Permission denied Warning (blacklisting): cannot open /usr/local/sbin/kdesudo: Permission denied Warning (blacklisting): cannot open /usr/local/sbin/ksu: Permission denied Warning (blacklisting): cannot open /usr/local/sbin/mount: Permission denied Warning (blacklisting): cannot open /usr/local/sbin/mount.ecryptfs_private: Permission denied Warning (blacklisting): cannot open /usr/local/sbin/nc: Permission denied Warning (blacklisting): cannot open /usr/local/sbin/ncat: Permission denied Warning (blacklisting): cannot open /usr/local/sbin/nmap: Permission denied Warning (blacklisting): cannot open /usr/local/sbin/newgidmap: Permission denied Warning (blacklisting): cannot open /usr/local/sbin/newgrp: Permission denied Warning (blacklisting): cannot open /usr/local/sbin/newuidmap: Permission denied Warning (blacklisting): cannot open /usr/local/sbin/ntfs-3g: Permission denied Warning (blacklisting): cannot open /usr/local/sbin/pkexec: Permission denied Warning (blacklisting): cannot open /usr/local/sbin/procmail: Permission denied Warning (blacklisting): cannot open /usr/local/sbin/sg: Permission denied Warning (blacklisting): cannot open /usr/local/sbin/strace: Permission denied Warning (blacklisting): cannot open /usr/local/sbin/su: Permission denied Warning (blacklisting): cannot open /usr/local/sbin/sudo: Permission denied Warning (blacklisting): cannot open /usr/local/sbin/tcpdump: Permission denied Warning (blacklisting): cannot open /usr/local/sbin/umount: Permission denied Warning (blacklisting): cannot open /usr/local/sbin/unix_chkpwd: Permission denied Warning (blacklisting): cannot open /usr/local/sbin/xev: Permission denied Warning (blacklisting): cannot open /usr/local/sbin/xinput: Permission denied Warning (blacklisting): cannot open /usr/local/sbin/lxterminal: Permission denied Warning (blacklisting): cannot open /usr/local/sbin/gnome-terminal: Permission denied Warning (blacklisting): cannot open /usr/local/sbin/gnome-terminal.wrapper: Permission denied Warning (blacklisting): cannot open /usr/local/sbin/lilyterm: Permission denied Warning (blacklisting): cannot open /usr/local/sbin/mate-terminal: Permission denied Warning (blacklisting): cannot open /usr/local/sbin/mate-terminal.wrapper: Permission denied Warning (blacklisting): cannot open /usr/local/sbin/pantheon-terminal: Permission denied Warning (blacklisting): cannot open /usr/local/sbin/roxterm: Permission denied Warning (blacklisting): cannot open /usr/local/sbin/roxterm-config: Permission denied Warning (blacklisting): cannot open /usr/local/sbin/terminix: Permission denied Warning (blacklisting): cannot open /usr/local/sbin/tilix: Permission denied Warning (blacklisting): cannot open /usr/local/sbin/urxvtc: Permission denied Warning (blacklisting): cannot open /usr/local/sbin/urxvtcd: Permission denied Warning (blacklisting): cannot open /usr/local/sbin/xfce4-terminal: Permission denied Warning (blacklisting): cannot open /usr/local/sbin/xfce4-terminal.wrapper: Permission denied Warning (blacklisting): cannot access /run/user/1000/doc: Permission denied Disable /usr/share/flatpak Warning (blacklisting): cannot open /usr/local/sbin/bwrap: Permission denied Disable /proc/config.gz Warning (blacklisting): cannot open /usr/local/sbin/dig: Permission denied Warning (blacklisting): cannot open /usr/local/sbin/dlint: Permission denied Warning (blacklisting): cannot open /usr/local/sbin/dns2tcp: Permission denied Warning (blacklisting): cannot open /usr/local/sbin/dnssec-*: Permission denied Warning (blacklisting): cannot open /usr/local/sbin/dnswalk: Permission denied Warning (blacklisting): cannot open /usr/local/sbin/drill: Permission denied Warning (blacklisting): cannot open /usr/local/sbin/host: Permission denied Warning (blacklisting): cannot open /usr/local/sbin/iodine: Permission denied Warning (blacklisting): cannot open /usr/local/sbin/kdig: Permission denied Warning (blacklisting): cannot open /usr/local/sbin/khost: Permission denied Warning (blacklisting): cannot open /usr/local/sbin/knsupdate: Permission denied Warning (blacklisting): cannot open /usr/local/sbin/ldns-*: Permission denied Warning (blacklisting): cannot open /usr/local/sbin/ldnsd: Permission denied Warning (blacklisting): cannot open /usr/local/sbin/nslookup: Permission denied Warning (blacklisting): cannot open /usr/local/sbin/resolvectl: Permission denied Warning (blacklisting): cannot open /usr/local/sbin/unbound-host: Permission denied Warning (blacklisting): cannot open /usr/local/sbin/clang*: Permission denied Warning (blacklisting): cannot open /usr/local/sbin/lldb*: Permission denied Warning (blacklisting): cannot open /usr/local/sbin/llvm*: Permission denied Warning (blacklisting): cannot open /usr/local/sbin/as: Permission denied Warning (blacklisting): cannot open /usr/local/sbin/cc: Permission denied Warning (blacklisting): cannot open /usr/local/sbin/c++*: Permission denied Warning (blacklisting): cannot open /usr/local/sbin/c8*: Permission denied Warning (blacklisting): cannot open /usr/local/sbin/c9*: Permission denied Warning (blacklisting): cannot open /usr/local/sbin/cpp*: Permission denied Warning (blacklisting): cannot open /usr/local/sbin/g++*: Permission denied Warning (blacklisting): cannot open /usr/local/sbin/gcc*: Permission denied Warning (blacklisting): cannot open /usr/local/sbin/gdb: Permission denied Warning (blacklisting): cannot open /usr/local/sbin/ld: Permission denied Warning (blacklisting): cannot open /usr/local/sbin/*-gcc*: Permission denied Warning (blacklisting): cannot open /usr/local/sbin/*-g++*: Permission denied Warning (blacklisting): cannot open /usr/local/sbin/*-gcc*: Permission denied Warning (blacklisting): cannot open /usr/local/sbin/*-g++*: Permission denied Warning (blacklisting): cannot open /usr/local/sbin/gccgo: Permission denied Warning (blacklisting): cannot open /usr/local/sbin/go: Permission denied Warning (blacklisting): cannot open /usr/local/sbin/gofmt: Permission denied Warning (blacklisting): cannot open /usr/local/sbin/java: Permission denied Disable /usr/lib/jvm/java-8-openjdk/jre/bin/java (requested /usr/lib/jvm/default/bin/java) Warning (blacklisting): cannot open /usr/local/sbin/javac: Permission denied Disable /usr/lib/jvm/java-8-openjdk/bin/javac (requested /usr/lib/jvm/default/bin/javac) Disable /usr/share/java Warning (blacklisting): cannot open /usr/local/sbin/openssl: Permission denied Warning (blacklisting): cannot open /usr/local/sbin/openssl-1.0: Permission denied Warning (blacklisting): cannot open /usr/local/sbin/rust-gdb: Permission denied Warning (blacklisting): cannot open /usr/local/sbin/rust-lldb: Permission denied Warning (blacklisting): cannot open /usr/local/sbin/rustc: Permission denied Warning (blacklisting): cannot open /usr/local/sbin/tcc: Permission denied Warning (blacklisting): cannot open /usr/local/sbin/x86_64-tcc: Permission denied Warning (blacklisting): cannot open /usr/local/sbin/valgrind*: Permission denied Disable /usr/src Disable /usr/local/src Disable /usr/include Disable /usr/local/include Mounting noexec /run/user/1000 2348 2339 0:24 /firejail/firejail.ro.file /run/user/1000/kdeinit5__0 rw,nosuid,nodev,relatime master:12 - tmpfs run rw,mode=755,inode64 mountid=2348 fsname=/firejail/firejail.ro.file dir=/run/user/1000/kdeinit5__0 fstype=tmpfs Mounting noexec /dev/shm 2349 2238 0:99 /shm /dev/shm rw,nosuid,nodev,noexec - tmpfs tmpfs rw,mode=755,inode64 mountid=2349 fsname=/shm dir=/dev/shm fstype=tmpfs Mounting noexec /tmp 2351 2350 0:38 /.X11-unix /tmp/.X11-unix rw,nosuid,nodev,relatime master:81 - tmpfs tmpfs rw,size=10485760k,inode64 mountid=2351 fsname=/.X11-unix dir=/tmp/.X11-unix fstype=tmpfs Mounting noexec /tmp/.X11-unix 2352 2351 0:38 /.X11-unix /tmp/.X11-unix rw,nosuid,nodev,noexec,relatime master:81 - tmpfs tmpfs rw,size=10485760k,inode64 mountid=2352 fsname=/.X11-unix dir=/tmp/.X11-unix fstype=tmpfs Not blacklist /home/user/.config/discord Mounting read-only /tmp/.X11-unix 2353 2352 0:38 /.X11-unix /tmp/.X11-unix ro,nosuid,nodev,noexec,relatime master:81 - tmpfs tmpfs rw,size=10485760k,inode64 mountid=2353 fsname=/.X11-unix dir=/tmp/.X11-unix fstype=tmpfs Disable /sys/fs Disable /sys/module Creating empty /home/user/.config/pulse directory Mounting noexec /run/firejail/mnt/pulse 2356 2204 0:92 /pulse /run/firejail/mnt/pulse rw,nosuid,nodev,noexec - tmpfs tmpfs rw,mode=755,inode64 mountid=2356 fsname=/pulse dir=/run/firejail/mnt/pulse fstype=tmpfs Mounting /run/firejail/mnt/pulse on /home/user/.config/pulse 2357 2273 0:92 /pulse /home/user/.config/pulse rw,nosuid,nodev,noexec - tmpfs tmpfs rw,mode=755,inode64 mountid=2357 fsname=/pulse dir=/home/user/.config/pulse fstype=tmpfs Current directory: /home/user Mounting read-only /run/firejail/mnt/seccomp 2359 2204 0:92 /seccomp /run/firejail/mnt/seccomp ro,nosuid - tmpfs tmpfs rw,mode=755,inode64 mountid=2359 fsname=/seccomp dir=/run/firejail/mnt/seccomp fstype=tmpfs Seccomp directory: ls /run/firejail/mnt/seccomp drwxr-xr-x root root 120 . drwxr-xr-x root root 300 .. -rw-r--r-- 1000 user 568 seccomp -rw-r--r-- 1000 user 432 seccomp.32 -rw-r--r-- 1000 user 0 seccomp.postexec -rw-r--r-- 1000 user 0 seccomp.postexec32 No active seccomp files Set caps filter 240000 Drop privileges: pid 1, uid 1000, gid 1000, nogroups 1 No supplementary groups Starting application LD_PRELOAD=(null) execvp argument 0: discord Searching $PATH for discord trying #/home/user/.local/bin/discord# trying #/bin/discord# trying #/usr/bin/discord# trying #/usr/local/bin/discord# ``` </details>
Author
Owner

@rusty-snake commented on GitHub (Jul 31, 2021):

What does sysctl kernel.unprivileged_userns_clone show?

Reading profile /etc/firejail/globals.local

What's in it?

/bin/discord: Line 2: exec: electron: Not found.

I'll add private-bin electron,electron[0-9],electron[0-9][0-9] to all of them.

$ grep "^private-bin" $(grep -l "^include electron.profile$" /etc/firejail/*.profile)
/etc/firejail/discord-common.profile:private-bin bash,cut,echo,egrep,fish,grep,head,sed,sh,tclsh,tr,xdg-mime,xdg-open,zsh
/etc/firejail/freetube.profile:private-bin freetube
/etc/firejail/jitsi-meet-desktop.profile:private-bin bash,electron,electron[0-9],electron[0-9][0-9],jitsi-meet-desktop,sh
/etc/firejail/slack.profile:private-bin electron,electron[0-9],electron[0-9][0-9],locale,sh,slack
/etc/firejail/teams-for-linux.profile:private-bin bash,cut,echo,egrep,grep,head,sed,sh,teams-for-linux,tr,xdg-mime,xdg-open,zsh
/etc/firejail/twitch.profile:private-bin twitch
/etc/firejail/whalebird.profile:private-bin whalebird
/etc/firejail/wire-desktop.profile:private-bin bash,electron,electron[0-9],electron[0-9][0-9],env,sh,wire-desktop
/etc/firejail/youtubemusic-nativefier.profile:private-bin youtubemusic-nativefier
/etc/firejail/youtube.profile:private-bin youtube

What changed calling firejail --noprofile /path/to/program in a terminal?

So discord works then but discord_arch_electron not? If so try to run it with the noprofile.profile.

<!-- gh-comment-id:890376226 --> @rusty-snake commented on GitHub (Jul 31, 2021): What does `sysctl kernel.unprivileged_userns_clone` show? > Reading profile /etc/firejail/globals.local What's in it? > /bin/discord: Line 2: exec: electron: Not found. I'll add `private-bin electron,electron[0-9],electron[0-9][0-9]` to all of them. ```console $ grep "^private-bin" $(grep -l "^include electron.profile$" /etc/firejail/*.profile) /etc/firejail/discord-common.profile:private-bin bash,cut,echo,egrep,fish,grep,head,sed,sh,tclsh,tr,xdg-mime,xdg-open,zsh /etc/firejail/freetube.profile:private-bin freetube /etc/firejail/jitsi-meet-desktop.profile:private-bin bash,electron,electron[0-9],electron[0-9][0-9],jitsi-meet-desktop,sh /etc/firejail/slack.profile:private-bin electron,electron[0-9],electron[0-9][0-9],locale,sh,slack /etc/firejail/teams-for-linux.profile:private-bin bash,cut,echo,egrep,grep,head,sed,sh,teams-for-linux,tr,xdg-mime,xdg-open,zsh /etc/firejail/twitch.profile:private-bin twitch /etc/firejail/whalebird.profile:private-bin whalebird /etc/firejail/wire-desktop.profile:private-bin bash,electron,electron[0-9],electron[0-9][0-9],env,sh,wire-desktop /etc/firejail/youtubemusic-nativefier.profile:private-bin youtubemusic-nativefier /etc/firejail/youtube.profile:private-bin youtube ``` > What changed calling `firejail --noprofile /path/to/program` in a terminal? So discord works then but discord_arch_electron not? If so try to run it with the [noprofile.profile](https://gist.github.com/rusty-snake/bb234cb3e50e1e4e7429f29a7931cc72).
Author
Owner

@DatAres37 commented on GitHub (Jul 31, 2021):

What does sysctl kernel.unprivileged_userns_clone show?

kernel.unprivileged_userns_clone = 1

Reading profile /etc/firejail/globals.local

What's in it?

It only contains blacklist /data, a partition of mine.

/bin/discord: Line 2: exec: electron: Not found.

I'll add private-bin electron,electron[0-9],electron[0-9][0-9] to all of them.

$ grep "^private-bin" $(grep -l "^include electron.profile$" /etc/firejail/*.profile)
/etc/firejail/discord-common.profile:private-bin bash,cut,echo,egrep,fish,grep,head,sed,sh,tclsh,tr,xdg-mime,xdg-open,zsh
/etc/firejail/freetube.profile:private-bin freetube
/etc/firejail/jitsi-meet-desktop.profile:private-bin bash,electron,electron[0-9],electron[0-9][0-9],jitsi-meet-desktop,sh
/etc/firejail/slack.profile:private-bin electron,electron[0-9],electron[0-9][0-9],locale,sh,slack
/etc/firejail/teams-for-linux.profile:private-bin bash,cut,echo,egrep,grep,head,sed,sh,teams-for-linux,tr,xdg-mime,xdg-open,zsh
/etc/firejail/twitch.profile:private-bin twitch
/etc/firejail/whalebird.profile:private-bin whalebird
/etc/firejail/wire-desktop.profile:private-bin bash,electron,electron[0-9],electron[0-9][0-9],env,sh,wire-desktop
/etc/firejail/youtubemusic-nativefier.profile:private-bin youtubemusic-nativefier
/etc/firejail/youtube.profile:private-bin youtube

What changed calling firejail --noprofile /path/to/program in a terminal?

So discord works then but discord_arch_electron not? If so try to run it with the noprofile.profile.

No, both don't work with the output I posted.

firejail --noprofile /opt/discord/Discord 

Parent pid 604051, child pid 604052
Child process initialized in 5.37 ms

Parent is shutting down, bye...

Parent is shutting down is immediately shown when I run the default Discord.

Every other app I've tried yet works with firejail.

<!-- gh-comment-id:890378971 --> @DatAres37 commented on GitHub (Jul 31, 2021): > What does `sysctl kernel.unprivileged_userns_clone` show? `kernel.unprivileged_userns_clone = 1` > > Reading profile /etc/firejail/globals.local > > What's in it? It only contains `blacklist /data`, a partition of mine. > > /bin/discord: Line 2: exec: electron: Not found. > > I'll add `private-bin electron,electron[0-9],electron[0-9][0-9]` to all of them. > > ``` > $ grep "^private-bin" $(grep -l "^include electron.profile$" /etc/firejail/*.profile) > /etc/firejail/discord-common.profile:private-bin bash,cut,echo,egrep,fish,grep,head,sed,sh,tclsh,tr,xdg-mime,xdg-open,zsh > /etc/firejail/freetube.profile:private-bin freetube > /etc/firejail/jitsi-meet-desktop.profile:private-bin bash,electron,electron[0-9],electron[0-9][0-9],jitsi-meet-desktop,sh > /etc/firejail/slack.profile:private-bin electron,electron[0-9],electron[0-9][0-9],locale,sh,slack > /etc/firejail/teams-for-linux.profile:private-bin bash,cut,echo,egrep,grep,head,sed,sh,teams-for-linux,tr,xdg-mime,xdg-open,zsh > /etc/firejail/twitch.profile:private-bin twitch > /etc/firejail/whalebird.profile:private-bin whalebird > /etc/firejail/wire-desktop.profile:private-bin bash,electron,electron[0-9],electron[0-9][0-9],env,sh,wire-desktop > /etc/firejail/youtubemusic-nativefier.profile:private-bin youtubemusic-nativefier > /etc/firejail/youtube.profile:private-bin youtube > ``` > > > What changed calling `firejail --noprofile /path/to/program` in a terminal? > > So discord works then but discord_arch_electron not? If so try to run it with the [noprofile.profile](https://gist.github.com/rusty-snake/bb234cb3e50e1e4e7429f29a7931cc72). No, both don't work with the output I posted. ``` firejail --noprofile /opt/discord/Discord Parent pid 604051, child pid 604052 Child process initialized in 5.37 ms Parent is shutting down, bye... ``` `Parent is shutting down` is immediately shown when I run the default Discord. Every other app I've tried yet works with firejail.
Author
Owner

@rusty-snake commented on GitHub (Jul 31, 2021):

Does it work with noprofile.profile?

<!-- gh-comment-id:890381381 --> @rusty-snake commented on GitHub (Jul 31, 2021): Does it work with noprofile.profile?
Author
Owner

@DatAres37 commented on GitHub (Jul 31, 2021):

Does it work with noprofile.profile?

Oh, I thought this was the same as --noprofile. No it doesn't work apparently

firejail --profile=noprofile.profile /opt/discord/Discord

Reading profile noprofile.profile
Parent pid 641245, child pid 641246
Warning: cannot open source file /usr/lib/firejail/seccomp.debug32, file not copied
Child process initialized in 4.52 ms

Parent is shutting down, bye...

After creating a symlink from /usr/lib/firejail/seccomp.debug32 (not existing) to /usr/lib/firejail/seccomp.debug:

firejail --profile=noprofile.profile /opt/discord/Discord

Reading profile noprofile.profile
Parent pid 649805, child pid 649806
Child process initialized in 4.59 ms

Parent is shutting down, bye...

Again immediately shutting down 😕
I just wonder why I'm the first or the only one with the issue atm, I think discord is fairly popular.

Should it already work when I add private-bin electron,electron[0-9],electron[0-9][0-9] to discord.local with discord_arch_electron? Since I still get Cannot start application: Permission denied

<!-- gh-comment-id:890385368 --> @DatAres37 commented on GitHub (Jul 31, 2021): > Does it work with noprofile.profile? Oh, I thought this was the same as --noprofile. No it doesn't work apparently ``` firejail --profile=noprofile.profile /opt/discord/Discord Reading profile noprofile.profile Parent pid 641245, child pid 641246 Warning: cannot open source file /usr/lib/firejail/seccomp.debug32, file not copied Child process initialized in 4.52 ms Parent is shutting down, bye... ``` After creating a symlink from /usr/lib/firejail/seccomp.debug32 (not existing) to /usr/lib/firejail/seccomp.debug: ``` firejail --profile=noprofile.profile /opt/discord/Discord Reading profile noprofile.profile Parent pid 649805, child pid 649806 Child process initialized in 4.59 ms Parent is shutting down, bye... ``` Again immediately shutting down :confused: I just wonder why I'm the first or the only one with the issue atm, I think discord is fairly popular. Should it already work when I add `private-bin electron,electron[0-9],electron[0-9][0-9]` to discord.local with discord_arch_electron? Since I still get `Cannot start application: Permission denied`
Author
Owner

@rusty-snake commented on GitHub (Jul 31, 2021):

Oh, I thought this was the same as --noprofile. No it doesn't work apparently […] I just wonder why I'm the first or the only one with the issue atm, I think discord is fairly popular.

I'm wondering too but if noprofile.profile does not work there is little to no hope.

Sum up:

  • regular install, no snap or anything like that
  • noprofile.profile does not work, no firejail at all does work

Is there any difference between firejail --noprofile ls -l /opt/discord and ls -l /opt/discord.
Is there any non-default setting in /etc/firejail/firejail.config.
What does firejail --noprofile --debug /opt/discord/Discord show?
Anyone else, ideas?

After creating a symlink from /usr/lib/firejail/seccomp.debug32 (not existing) to /usr/lib/firejail/seccomp.debug

Don't do this. Never "fix" things by creating symlinks in /usr/lib.

<!-- gh-comment-id:890388669 --> @rusty-snake commented on GitHub (Jul 31, 2021): > Oh, I thought this was the same as --noprofile. No it doesn't work apparently […] I just wonder why I'm the first or the only one with the issue atm, I think discord is fairly popular. I'm wondering too but if noprofile.profile does not work there is little to no hope. Sum up: - regular install, no snap or anything like that - noprofile.profile does not work, no firejail at all does work Is there any difference between `firejail --noprofile ls -l /opt/discord` and `ls -l /opt/discord`. Is there any non-default setting in `/etc/firejail/firejail.config`. What does `firejail --noprofile --debug /opt/discord/Discord` show? Anyone else, ideas? > After creating a symlink from /usr/lib/firejail/seccomp.debug32 (not existing) to /usr/lib/firejail/seccomp.debug Don't do this. Never "fix" things by creating symlinks in /usr/lib.
Author
Owner

@DatAres37 commented on GitHub (Jul 31, 2021):

Is there any difference between firejail --noprofile ls -l /opt/discord and ls -l /opt/discord.

Nope, same files and subfolders.

Is there any non-default setting in /etc/firejail/firejail.config.

No differences. Just compared them to make sure.

What does firejail --noprofile --debug /opt/discord/Discord show?

Autoselecting /bin/bash as shell
Building quoted command line: '/opt/discord/Discord' 
Command name #Discord#
DISPLAY=:0 parsed as 0
Using the local network stack
Parent pid 74490, child pid 74491
Initializing child process
Host network configured
PID namespace installed
Mounting tmpfs on /run/firejail/mnt directory
Creating empty /run/firejail/mnt/seccomp directory
Creating empty /run/firejail/mnt/seccomp/seccomp.protocol file
Creating empty /run/firejail/mnt/seccomp/seccomp.postexec file
Creating empty /run/firejail/mnt/seccomp/seccomp.postexec32 file
Mounting /proc filesystem representing the PID namespace
Basic read-only filesystem:
Mounting read-only /etc
1462 1306 254:0 /etc /etc ro,noatime master:1 - ext4 /dev/mapper/root rw
mountid=1462 fsname=/etc dir=/etc fstype=ext4
Mounting noexec /etc
1463 1462 254:0 /etc /etc ro,nosuid,nodev,noexec,noatime master:1 - ext4 /dev/mapper/root rw
mountid=1463 fsname=/etc dir=/etc fstype=ext4
Mounting read-only /var
1464 1306 254:0 /var /var ro,noatime master:1 - ext4 /dev/mapper/root rw
mountid=1464 fsname=/var dir=/var fstype=ext4
Mounting noexec /var
1465 1464 254:0 /var /var ro,nosuid,nodev,noexec,noatime master:1 - ext4 /dev/mapper/root rw
mountid=1465 fsname=/var dir=/var fstype=ext4
Mounting read-only /usr
1466 1306 254:0 /usr /usr ro,noatime master:1 - ext4 /dev/mapper/root rw
mountid=1466 fsname=/usr dir=/usr fstype=ext4
Mounting tmpfs on /var/lock
Mounting tmpfs on /var/tmp
Mounting tmpfs on /var/log
Create the new utmp file
Mount the new utmp file
Cleaning /home directory
Cleaning /run/user directory
Sanitizing /etc/passwd, UID_MIN 1000
Sanitizing /etc/group, GID_MIN 1000
Disable /run/firejail/network
Disable /run/firejail/bandwidth
Disable /run/firejail/name
Disable /run/firejail/profile
Disable /run/firejail/x11
blacklist /run/firejail/dbus
Mounting read-only /proc/sys
Remounting /sys directory
Disable /sys/firmware
Disable /sys/hypervisor
Disable /sys/power
Disable /sys/kernel/debug
Disable /sys/kernel/vmcoreinfo
Disable /proc/sys/fs/binfmt_misc
Disable /proc/sys/kernel/core_pattern
Disable /proc/sys/kernel/modprobe
Disable /proc/sysrq-trigger
Disable /proc/sys/vm/panic_on_oom
Disable /proc/irq
Disable /proc/bus
Disable /proc/timer_list
Disable /proc/kcore
Disable /proc/kallsyms
Disable /usr/lib/modules (requested /lib/modules)
Disable /boot
Disable /dev/port
Disable /run/user/1000/gnupg
Disable /run/user/1000/systemd
Disable /dev/kmsg
Disable /proc/kmsg
Disable /sys/fs
Disable /sys/module
Current directory: /home/user
DISPLAY=:0 parsed as 0
Mounting read-only /run/firejail/mnt/seccomp
1504 1459 0:68 /seccomp /run/firejail/mnt/seccomp ro,nosuid - tmpfs tmpfs rw,mode=755,inode64
mountid=1504 fsname=/seccomp dir=/run/firejail/mnt/seccomp fstype=tmpfs
Seccomp directory:
ls /run/firejail/mnt/seccomp
drwxr-xr-x root     root             120 .
drwxr-xr-x root     root             160 ..
-rw-r--r-- user     user             568 seccomp
-rw-r--r-- user     user             432 seccomp.32
-rw-r--r-- user     user               0 seccomp.postexec
-rw-r--r-- user     user               0 seccomp.postexec32
No active seccomp files
Drop privileges: pid 1, uid 1000, gid 1000, nogroups 0
Starting application
LD_PRELOAD=(null)
Running '/opt/discord/Discord'  command through /bin/bash
execvp argument 0: /bin/bash
execvp argument 1: -c
execvp argument 2: '/opt/discord/Discord' 
Child process initialized in 6.10 ms
monitoring pid 2

Sandbox monitor: waitpid 2 retval 2 status 133
Sandbox monitor: monitoring 5
monitoring pid 5

Sandbox monitor: waitpid 5 retval 5 status 0
Sandbox monitor: monitoring 6
monitoring pid 6

Sandbox monitor: waitpid 6 retval 6 status 133

Parent is shutting down, bye...

I just tried the same thing on my laptop with an Arch install and it worked there 🤔 I haven't found a reason for this yet. I completely purged my Discord install with all config files.

<!-- gh-comment-id:890397768 --> @DatAres37 commented on GitHub (Jul 31, 2021): > Is there any difference between `firejail --noprofile ls -l /opt/discord` and `ls -l /opt/discord`. Nope, same files and subfolders. > Is there any non-default setting in `/etc/firejail/firejail.config`. No differences. Just compared them to make sure. > What does `firejail --noprofile --debug /opt/discord/Discord` show? ``` Autoselecting /bin/bash as shell Building quoted command line: '/opt/discord/Discord' Command name #Discord# DISPLAY=:0 parsed as 0 Using the local network stack Parent pid 74490, child pid 74491 Initializing child process Host network configured PID namespace installed Mounting tmpfs on /run/firejail/mnt directory Creating empty /run/firejail/mnt/seccomp directory Creating empty /run/firejail/mnt/seccomp/seccomp.protocol file Creating empty /run/firejail/mnt/seccomp/seccomp.postexec file Creating empty /run/firejail/mnt/seccomp/seccomp.postexec32 file Mounting /proc filesystem representing the PID namespace Basic read-only filesystem: Mounting read-only /etc 1462 1306 254:0 /etc /etc ro,noatime master:1 - ext4 /dev/mapper/root rw mountid=1462 fsname=/etc dir=/etc fstype=ext4 Mounting noexec /etc 1463 1462 254:0 /etc /etc ro,nosuid,nodev,noexec,noatime master:1 - ext4 /dev/mapper/root rw mountid=1463 fsname=/etc dir=/etc fstype=ext4 Mounting read-only /var 1464 1306 254:0 /var /var ro,noatime master:1 - ext4 /dev/mapper/root rw mountid=1464 fsname=/var dir=/var fstype=ext4 Mounting noexec /var 1465 1464 254:0 /var /var ro,nosuid,nodev,noexec,noatime master:1 - ext4 /dev/mapper/root rw mountid=1465 fsname=/var dir=/var fstype=ext4 Mounting read-only /usr 1466 1306 254:0 /usr /usr ro,noatime master:1 - ext4 /dev/mapper/root rw mountid=1466 fsname=/usr dir=/usr fstype=ext4 Mounting tmpfs on /var/lock Mounting tmpfs on /var/tmp Mounting tmpfs on /var/log Create the new utmp file Mount the new utmp file Cleaning /home directory Cleaning /run/user directory Sanitizing /etc/passwd, UID_MIN 1000 Sanitizing /etc/group, GID_MIN 1000 Disable /run/firejail/network Disable /run/firejail/bandwidth Disable /run/firejail/name Disable /run/firejail/profile Disable /run/firejail/x11 blacklist /run/firejail/dbus Mounting read-only /proc/sys Remounting /sys directory Disable /sys/firmware Disable /sys/hypervisor Disable /sys/power Disable /sys/kernel/debug Disable /sys/kernel/vmcoreinfo Disable /proc/sys/fs/binfmt_misc Disable /proc/sys/kernel/core_pattern Disable /proc/sys/kernel/modprobe Disable /proc/sysrq-trigger Disable /proc/sys/vm/panic_on_oom Disable /proc/irq Disable /proc/bus Disable /proc/timer_list Disable /proc/kcore Disable /proc/kallsyms Disable /usr/lib/modules (requested /lib/modules) Disable /boot Disable /dev/port Disable /run/user/1000/gnupg Disable /run/user/1000/systemd Disable /dev/kmsg Disable /proc/kmsg Disable /sys/fs Disable /sys/module Current directory: /home/user DISPLAY=:0 parsed as 0 Mounting read-only /run/firejail/mnt/seccomp 1504 1459 0:68 /seccomp /run/firejail/mnt/seccomp ro,nosuid - tmpfs tmpfs rw,mode=755,inode64 mountid=1504 fsname=/seccomp dir=/run/firejail/mnt/seccomp fstype=tmpfs Seccomp directory: ls /run/firejail/mnt/seccomp drwxr-xr-x root root 120 . drwxr-xr-x root root 160 .. -rw-r--r-- user user 568 seccomp -rw-r--r-- user user 432 seccomp.32 -rw-r--r-- user user 0 seccomp.postexec -rw-r--r-- user user 0 seccomp.postexec32 No active seccomp files Drop privileges: pid 1, uid 1000, gid 1000, nogroups 0 Starting application LD_PRELOAD=(null) Running '/opt/discord/Discord' command through /bin/bash execvp argument 0: /bin/bash execvp argument 1: -c execvp argument 2: '/opt/discord/Discord' Child process initialized in 6.10 ms monitoring pid 2 Sandbox monitor: waitpid 2 retval 2 status 133 Sandbox monitor: monitoring 5 monitoring pid 5 Sandbox monitor: waitpid 5 retval 5 status 0 Sandbox monitor: monitoring 6 monitoring pid 6 Sandbox monitor: waitpid 6 retval 6 status 133 Parent is shutting down, bye... ``` I just tried the same thing on my laptop with an Arch install and it worked there :thinking: I haven't found a reason for this yet. I completely purged my Discord install with all config files.
Author
Owner

@rusty-snake commented on GitHub (Jul 31, 2021):

Nope, same files and subfolders.

I mainly focused on permissions/owners

What does firejail --noprofile --debug /opt/discord/Discord show?

If you add --help to discord, does it show something (if it show somwthing w/o firejail).
IDK how you can set the log level in discord, but if you know try to set it to debug or so.

BTW is anything in the syslog? (watch journalctl --boot --pager-end --follow while starting discord)

<!-- gh-comment-id:890398723 --> @rusty-snake commented on GitHub (Jul 31, 2021): > Nope, same files and subfolders. I mainly focused on permissions/owners > What does firejail --noprofile --debug /opt/discord/Discord show? If you add `--help` to discord, does it show something (if it show somwthing w/o firejail). IDK how you can set the log level in discord, but if you know try to set it to debug or so. BTW is anything in the syslog? (watch `journalctl --boot --pager-end --follow` while starting discord)
Author
Owner

@DatAres37 commented on GitHub (Jul 31, 2021):

I just ran it with --apparmor and it works now. I don't really understand what this trigger does though. I'm using apparmor on my system, but the profiles for discord, chromium, electron etc. were not enforced. I even disabled apparmor completely and changed my boot parameters to disable it 😐

Does this make any sense?

<!-- gh-comment-id:890399341 --> @DatAres37 commented on GitHub (Jul 31, 2021): I just ran it with --apparmor and it works now. I don't really understand what this trigger does though. I'm using apparmor on my system, but the profiles for discord, chromium, electron etc. were **not** enforced. I even disabled apparmor completely and changed my boot parameters to disable it :neutral_face: Does this make any sense?
Author
Owner

@rusty-snake commented on GitHub (Jul 31, 2021):

I'm using apparmor on my system […] I even disabled apparmor completely

😕

Does this make any sense?

Not really however it can point us in the right direction.

<!-- gh-comment-id:890399789 --> @rusty-snake commented on GitHub (Jul 31, 2021): > I'm using apparmor on my system […] I even disabled apparmor completely :confused: > Does this make any sense? Not really however it can point us in the right direction.
Author
Owner

@DatAres37 commented on GitHub (Aug 2, 2021):

It now works after disabling the discord apparmor profile with aa-disable instead of aa-complain. Not sure how it survived the global deactivation of apparmor tho. I even deleted the discord apparmor profile at some point without success. Guess I have to read the manual again.

One last question: Is it recommended to run firejail applications with --apparmor as a additional security layer or not? If I understand the docs correctly it just uses the firejail-default profile. I didn't notice any difference running Discord with or without it.

<!-- gh-comment-id:890940100 --> @DatAres37 commented on GitHub (Aug 2, 2021): It now works after disabling the discord apparmor profile with `aa-disable` instead of `aa-complain`. Not sure how it survived the global deactivation of apparmor tho. I even deleted the discord apparmor profile at some point without success. Guess I have to read the manual again. One last question: Is it recommended to run firejail applications with --apparmor as a additional security layer or not? If I understand the docs correctly it just uses the firejail-default profile. I didn't notice any difference running Discord with or without it.
Author
Owner

@rusty-snake commented on GitHub (Aug 2, 2021):

Is it recommended to run firejail applications with --apparmor as a additional security layer or not?

Yes. (If your system and firejail have AA)

I didn't notice any difference running Discord with or without it.

What kind of difference did you expected?

<!-- gh-comment-id:891086826 --> @rusty-snake commented on GitHub (Aug 2, 2021): > Is it recommended to run firejail applications with --apparmor as a additional security layer or not? Yes. (If your system and firejail have AA) > I didn't notice any difference running Discord with or without it. What kind of difference did you expected?
Author
Owner

@DatAres37 commented on GitHub (Aug 2, 2021):

What kind of difference did you expected?

Nothing specific. I just assumed there would be some kind of difference, but apparmor is probably just doing its things behind the scenes 🙂

So could I just add apparmor to globals.local and every application would run with the firejail-default profile? I assume the firejail-default profile just provides everything firejail needs to run. I'd rather not use custom Apparmor profiles, since this probably generates a lot of headache.

<!-- gh-comment-id:891158082 --> @DatAres37 commented on GitHub (Aug 2, 2021): > What kind of difference did you expected? Nothing specific. I just assumed there would be some kind of difference, but apparmor is probably just doing its things behind the scenes :slightly_smiling_face: So could I just add `apparmor` to globals.local and every application would run with the firejail-default profile? I assume the firejail-default profile just provides everything firejail needs to run. I'd rather not use custom Apparmor profiles, since this probably generates a lot of headache.
Author
Owner

@rusty-snake commented on GitHub (Aug 2, 2021):

add apparmor to globals.local and every application would run with the firejail-default profile

The most applications will run but some don't. For them you need to add ignore apparmor to PROGRAM.local.
tor-browser for example.

<!-- gh-comment-id:891216018 --> @rusty-snake commented on GitHub (Aug 2, 2021): > add apparmor to globals.local and every application would run with the firejail-default profile The most applications will run but some don't. For them you need to add `ignore apparmor` to `PROGRAM.local`. tor-browser for example.
Author
Owner

@kmk3 commented on GitHub (Aug 3, 2021):

@rusty-snake commented 13 hours ago:

Is it recommended to run firejail applications with --apparmor as a
additional security layer or not?

Yes. (If your system and firejail have AA)

I don't know much about this, but the wiki makes it sound closer to "it
depends"[1]:

How does it compare with AppArmor?

[...]

It is recommended to only use AppArmor OR Firejail but not both at the same
time for the same app. If you set a tight AppArmor profile already then you
may want to stick with that.

In general to use both for a particular app, you will need to modify the
pre-packaged app profiles for both AppArmor and Firejail to get them to work
together. You need to add more privileges in AppArmor than is needed without
Firejail, and you need to use less Firejail features otherwise it would be
broken with AppArmor. Many times they will cancel eachother out rather than
be complementary. We have multiple reports about broken apps when AppArmor
and Firejail are used at the same time.

Keep in mind that AppArmor is mandatory when enabled while Firejail can be
easily circumvented (intentionally or not). It should be possible to use
Firejail just for seccomp and network control, those can not conflict with
prepackaged AppArmor. See #2248 for a discussion on this.

Is the above still the case or is it safe to always use firejail with apparmor
now?

[1] https://github.com/netblue30/firejail/wiki/Frequently-Asked-Questions/fdcdff99b805dc34ecdf6f2c0f12c3444846fcdf#how-does-it-compare-with-apparmor

<!-- gh-comment-id:891524669 --> @kmk3 commented on GitHub (Aug 3, 2021): @rusty-snake commented [13 hours ago](https://github.com/netblue30/firejail/issues/4430#issuecomment-891086826): > > Is it recommended to run firejail applications with --apparmor as a > > additional security layer or not? > > Yes. (If your system and firejail have AA) I don't know much about this, but the wiki makes it sound closer to "it depends"[1]: > How does it compare with AppArmor? [...] > It is recommended to only use AppArmor OR Firejail but not both at the same > time for the same app. If you set a tight AppArmor profile already then you > may want to stick with that. > > In general to use both for a particular app, you will need to modify the > pre-packaged app profiles for both AppArmor and Firejail to get them to work > together. You need to add more privileges in AppArmor than is needed without > Firejail, and you need to use less Firejail features otherwise it would be > broken with AppArmor. Many times they will cancel eachother out rather than > be complementary. We have multiple reports about broken apps when AppArmor > and Firejail are used at the same time. > > Keep in mind that AppArmor is mandatory when enabled while Firejail can be > easily circumvented (intentionally or not). It should be possible to use > Firejail just for seccomp and network control, those can not conflict with > prepackaged AppArmor. See #2248 for a discussion on this. Is the above still the case or is it safe to always use firejail with apparmor now? [1] https://github.com/netblue30/firejail/wiki/Frequently-Asked-Questions/fdcdff99b805dc34ecdf6f2c0f12c3444846fcdf#how-does-it-compare-with-apparmor
Author
Owner

@rusty-snake commented on GitHub (Aug 3, 2021):

It's still the case. You should either use firejail [--apparmor] or a AppArmor profile (e.g. usr.bin.firefox).
--apparmor isn't the problem, the problem is with full AA profiles for special programs.

<!-- gh-comment-id:891554733 --> @rusty-snake commented on GitHub (Aug 3, 2021): It's still the case. You should either use `firejail [--apparmor]` or a AppArmor profile (e.g. `usr.bin.firefox`). `--apparmor` isn't the problem, the problem is with full AA profiles for special programs.
Author
Owner

@kmk3 commented on GitHub (Aug 3, 2021):

It's still the case. You should either use firejail [--apparmor] or a
AppArmor profile (e.g. usr.bin.firefox). --apparmor isn't the problem,
the problem is with full AA profiles for special programs.

I see; I thought that apparmor was always either fully enforcing (i.e.: with
the app-specific profile) or off.

I didn't know that there were two different "security levels" (default profile
vs app-specific profile). From your reply and from reading the APPARMOR
section on the man page, this part makes sense now.

But the wiki and the man page talk about apparmor in very different ways, so it
still seems confusing. For example, the man page details what the default
profile does, but it does not mention app-specific profiles, nor that using
firejail + apparmor may cause issues. The wiki talks about configuring
app-specific profiles (but does not mention the default profile), that firejail
and apparmor may "cancel eachother out rather than be complementary" and that
there are "multiple reports about broken apps when AppArmor and Firejail are
used at the same time".

<!-- gh-comment-id:892104718 --> @kmk3 commented on GitHub (Aug 3, 2021): > It's still the case. You should either use `firejail [--apparmor]` or a > AppArmor profile (e.g. `usr.bin.firefox`). `--apparmor` isn't the problem, > the problem is with full AA profiles for special programs. I see; I thought that apparmor was always either fully enforcing (i.e.: with the app-specific profile) or off. I didn't know that there were two different "security levels" (default profile vs app-specific profile). From your reply and from reading the APPARMOR section on the man page, this part makes sense now. But the wiki and the man page talk about apparmor in very different ways, so it still seems confusing. For example, the man page details what the default profile does, but it does not mention app-specific profiles, nor that using firejail + apparmor may cause issues. The wiki talks about configuring app-specific profiles (but does not mention the default profile), that firejail and apparmor may "cancel eachother out rather than be complementary" and that there are "multiple reports about broken apps when AppArmor and Firejail are used at the same time".
Author
Owner

@DatAres37 commented on GitHub (Aug 4, 2021):

It's still the case. You should either use firejail [--apparmor] or a
AppArmor profile (e.g. usr.bin.firefox). --apparmor isn't the problem,
the problem is with full AA profiles for special programs.

I see; I thought that apparmor was always either fully enforcing (i.e.: with
the app-specific profile) or off.

I didn't know that there were two different "security levels" (default profile
vs app-specific profile). From your reply and from reading the APPARMOR
section on the man page, this part makes sense now.

But the wiki and the man page talk about apparmor in very different ways, so it
still seems confusing. For example, the man page details what the default
profile does, but it does not mention app-specific profiles, nor that using
firejail + apparmor may cause issues. The wiki talks about configuring
app-specific profiles (but does not mention the default profile), that firejail
and apparmor may "cancel eachother out rather than be complementary" and that
there are "multiple reports about broken apps when AppArmor and Firejail are
used at the same time".

That's true, the documentation on this could be a bit better. I had to look in three different places to get all the info I needed (this wiki, the official website and some other blog).

<!-- gh-comment-id:892526534 --> @DatAres37 commented on GitHub (Aug 4, 2021): > > It's still the case. You should either use `firejail [--apparmor]` or a > > AppArmor profile (e.g. `usr.bin.firefox`). `--apparmor` isn't the problem, > > the problem is with full AA profiles for special programs. > > I see; I thought that apparmor was always either fully enforcing (i.e.: with > the app-specific profile) or off. > > I didn't know that there were two different "security levels" (default profile > vs app-specific profile). From your reply and from reading the APPARMOR > section on the man page, this part makes sense now. > > But the wiki and the man page talk about apparmor in very different ways, so it > still seems confusing. For example, the man page details what the default > profile does, but it does not mention app-specific profiles, nor that using > firejail + apparmor may cause issues. The wiki talks about configuring > app-specific profiles (but does not mention the default profile), that firejail > and apparmor may "cancel eachother out rather than be complementary" and that > there are "multiple reports about broken apps when AppArmor and Firejail are > used at the same time". That's true, the documentation on this could be a bit better. I had to look in three different places to get all the info I needed (this wiki, the official website and some other blog).
Sign in to join this conversation.
No milestone
No project
No assignees
1 participant
Notifications
Due date
The due date is invalid or out of range. Please use the format "yyyy-mm-dd".

No due date set.

Dependencies

No dependencies set.

Reference: github-starred/firejail#2670
No description provided.