[GH-ISSUE #6910] playonlinux: Cannot start application: Permission denied #3414

Closed
opened 2026-05-05 09:58:23 -06:00 by gitea-mirror · 3 comments
Owner

Originally created by @davew-fj on GitHub (Sep 25, 2025).
Original GitHub issue: https://github.com/netblue30/firejail/issues/6910

I recently updated from antix22 to antix23.2 operating system. On antix22, I was using firejail 0.9.64.4-2, and playonlinux worked. antix23 came with firejail 0.9.72, but I upgraded to 0.9.74, because Firefox and Librewolf (and others) didn't load right in firejail.

With Playonlinux on firejail 0.9.74, I have gotten passed several error messages, by whitelisting several directories in playonlinux.local. Now, the process stops with "permission denied". Perhaps that means permission needs to be changed on some file or directory. But how do I locate the point of denial?

"firejail --noprofile playonlinux" loads properly.

Thank you.
DaveW

Originally created by @davew-fj on GitHub (Sep 25, 2025). Original GitHub issue: https://github.com/netblue30/firejail/issues/6910 I recently updated from antix22 to antix23.2 operating system. On antix22, I was using firejail 0.9.64.4-2, and playonlinux worked. antix23 came with firejail 0.9.72, but I upgraded to 0.9.74, because Firefox and Librewolf (and others) didn't load right in firejail. With Playonlinux on firejail 0.9.74, I have gotten passed several error messages, by whitelisting several directories in playonlinux.local. Now, the process stops with "permission denied". Perhaps that means permission needs to be changed on some file or directory. But how do I locate the point of denial? "firejail --noprofile playonlinux" loads properly. Thank you. DaveW
gitea-mirror 2026-05-05 09:58:23 -06:00
Author
Owner

@davew-fj commented on GitHub (Sep 25, 2025):

Here is additional information. Let me know what else might be helpful.
The O.S. is Antix23.2, 64 bit (Debian bookworm, without systemD). Computer is Dell Latitude E5430.
PlayOnLinux is version 4.3.4.
More than one error, including failed to create DBus proxy for org.ally.Bus were bypassed by whitelisting several directories in playonlinux.local (I see that several of these entries are already covered by relevant firejail profiles, but I haven't taken time to delete unneeded ones from the list.) Here is my playonlinux.local

whitelist /usr/bin/nc
whitelist /usr/lib/firejail/seccomp.debug32
whitelist ${HOME}/.PlayOnLinux
whitelist ${HOME}/~PlayOnLinux's virtual drives

whitelist /usr/bin/playonlinux
whitelist /usr/bin/playonlinux-pkg
whitelist /usr/share/wine
whitelist /usr/share/applications

whitelist /usr/share/playonlinux/playonlinux
whitelist /usr/bin/python3

With the above, running "firejail playonlinux" in terminal produces the following:

$ firejail playonlinux
Reading profile /etc/firejail/playonlinux.profile
Reading profile /home/my3epc/.config/firejail/playonlinux.local
Reading profile /etc/firejail/allow-perl.inc
Reading profile /etc/firejail/allow-python2.inc
Reading profile /etc/firejail/allow-python3.inc
Reading profile /etc/firejail/wine.profile
Reading profile /etc/firejail/disable-common.inc
Reading profile /etc/firejail/disable-devel.inc
Reading profile /etc/firejail/disable-interpreters.inc
Reading profile /etc/firejail/disable-programs.inc
Reading profile /etc/firejail/whitelist-var-common.inc
firejail version 0.9.74

Parent pid 3326, child pid 3327
Base filesystem installed in 44.90 ms
Child process initialized in 110.00 ms
Cannot start application: Permission denied

Parent is shutting down, bye...

Running firejail --debug playonlinux produces the following:

debug log

$ firejail --debug playonlinux
Looking for kernel processes
Found kthreadd process, we are not running in a sandbox
pid=3451: locking /run/firejail/firejail-run.lock ...
pid=3451: locked /run/firejail/firejail-run.lock
pid=3451: unlocking /run/firejail/firejail-run.lock ...
pid=3451: unlocked /run/firejail/firejail-run.lock
Building quoted command line: 'playonlinux' 
Command name #playonlinux#
Found playonlinux.profile profile in /etc/firejail directory
Reading profile /etc/firejail/playonlinux.profile
Found playonlinux.local profile in /home/my3epc/.config/firejail directory
Reading profile /home/my3epc/.config/firejail/playonlinux.local
Found allow-perl.inc profile in /etc/firejail directory
Reading profile /etc/firejail/allow-perl.inc
Cannot access .local file allow-perl.local: No such file or directory, skipping...
Found allow-python2.inc profile in /etc/firejail directory
Reading profile /etc/firejail/allow-python2.inc
Cannot access .local file allow-python2.local: No such file or directory, skipping...
Found allow-python3.inc profile in /etc/firejail directory
Reading profile /etc/firejail/allow-python3.inc
Cannot access .local file allow-python3.local: No such file or directory, skipping...
Found wine.profile profile in /etc/firejail directory
Reading profile /etc/firejail/wine.profile
Cannot access .local file wine.local: No such file or directory, skipping...
Cannot access .local file globals.local: No such file or directory, skipping...
Found disable-common.inc profile in /etc/firejail directory
Reading profile /etc/firejail/disable-common.inc
Cannot access .local file disable-common.local: No such file or directory, skipping...
Found disable-devel.inc profile in /etc/firejail directory
Reading profile /etc/firejail/disable-devel.inc
Cannot access .local file disable-devel.local: No such file or directory, skipping...
Found disable-interpreters.inc profile in /etc/firejail directory
Reading profile /etc/firejail/disable-interpreters.inc
Cannot access .local file disable-interpreters.local: No such file or directory, skipping...
Found disable-programs.inc profile in /etc/firejail directory
Reading profile /etc/firejail/disable-programs.inc
Cannot access .local file disable-programs.local: No such file or directory, skipping...
Found whitelist-var-common.inc profile in /etc/firejail directory
Reading profile /etc/firejail/whitelist-var-common.inc
Cannot access .local file whitelist-var-common.local: No such file or directory, skipping...
firejail version 0.9.74

pid=3451: locking /run/firejail/firejail-run.lock ...
pid=3451: locked /run/firejail/firejail-run.lock
DISPLAY=:0.0 parsed as 0
pid=3451: unlocking /run/firejail/firejail-run.lock ...
pid=3451: unlocked /run/firejail/firejail-run.lock
Using the local network stack
Parent pid 3451, child pid 3452
Initializing child process
Host network configured
PID namespace installed
Mounting tmpfs on /run/firejail/mnt directory
Creating empty /run/firejail/mnt/seccomp directory
Creating empty /run/firejail/mnt/seccomp/seccomp.protocol file
Creating empty /run/firejail/mnt/seccomp/seccomp.postexec file
Creating empty /run/firejail/mnt/seccomp/seccomp.postexec32 file
Drop privileges: pid 2, uid 1000, gid 1000, force_nogroups 0
Supplementary groups: 29 44 7 46 
Mounting /proc filesystem representing the PID namespace
Basic read-only filesystem:
Mounting read-only /etc
52 35 8:3 /etc /etc ro,noatime - ext4 /dev/sda3 rw,discard
mountid=52 fsname=/etc dir=/etc fstype=ext4
Mounting noexec /etc
53 52 8:3 /etc /etc ro,nosuid,nodev,noexec,noatime - ext4 /dev/sda3 rw,discard
mountid=53 fsname=/etc dir=/etc fstype=ext4
Mounting read-only /var
54 35 8:3 /var /var ro,noatime - ext4 /dev/sda3 rw,discard
mountid=54 fsname=/var dir=/var fstype=ext4
Mounting noexec /var
55 54 8:3 /var /var ro,nosuid,nodev,noexec,noatime - ext4 /dev/sda3 rw,discard
mountid=55 fsname=/var dir=/var fstype=ext4
Mounting read-only /usr
56 35 8:3 /usr /usr ro,noatime - ext4 /dev/sda3 rw,discard
mountid=56 fsname=/usr dir=/usr fstype=ext4
Mounting tmpfs on /var/lock
Mounting tmpfs on /var/tmp
Mounting tmpfs on /var/log
Mounting tmpfs on /var/lib/dhcp
Mounting tmpfs on /var/lib/snmp
Mounting tmpfs on /var/lib/sudo
Create the new utmp file
Mount the new utmp file
Cleaning /home directory
Cleaning /run/user directory
Cannot open /run/user/1000 directory
Sanitizing /etc/passwd, UID_MIN 1000
Sanitizing /etc/group, GID_MIN 1000
Disable /home/my3epc/.config/firejail
Disable /run/firejail/sandbox
Disable /run/firejail/network
Disable /run/firejail/bandwidth
Disable /run/firejail/name
Disable /run/firejail/profile
Disable /run/firejail/x11
Mounting tmpfs on /dev
mounting /run/firejail/mnt/dev/snd directory
mounting /run/firejail/mnt/dev/dri directory
mounting /run/firejail/mnt/dev/video0 file
mounting /run/firejail/mnt/dev/video1 file
Process /dev/shm directory
blacklist /run/firejail/dbus
Creating a new /etc/hostname file
Creating empty /run/firejail/mnt/hostname file
Creating a new /etc/hosts file
Loading user hosts file
Mounting read-only /proc/sys
Remounting /sys directory
Disable /sys/firmware
Disable /sys/power
Disable /sys/kernel/debug
Disable /sys/kernel/vmcoreinfo
Disable /sys/kernel/uevent_helper
Disable /proc/sys/fs/binfmt_misc
Disable /proc/sys/kernel/core_pattern
Disable /proc/sys/kernel/modprobe
Disable /proc/sysrq-trigger
Disable /proc/sys/kernel/hotplug
Disable /proc/sys/vm/panic_on_oom
Disable /proc/irq
Disable /proc/bus
Disable /proc/timer_list
Disable /proc/kcore
Disable /proc/kallsyms
Disable /proc/kmsg
Debug 588: whitelist /usr/bin/nc
Debug 609: expanded: /usr/bin/nc
Debug 620: new_name: /usr/bin/nc
Debug 630: dir: /usr/bin
Adding whitelist top level directory /usr/bin
Debug 588: whitelist /usr/lib/firejail/seccomp.debug32
Debug 609: expanded: /usr/lib/firejail/seccomp.debug32
Debug 620: new_name: /usr/lib/firejail/seccomp.debug32
Debug 630: dir: /usr/lib
Adding whitelist top level directory /usr/lib
Debug 588: whitelist ${HOME}/.PlayOnLinux
Debug 609: expanded: /home/my3epc/.PlayOnLinux
Debug 620: new_name: /home/my3epc/.PlayOnLinux
Debug 630: dir: /home/my3epc
Adding whitelist top level directory /home/my3epc
Debug 588: whitelist ${HOME}/~PlayOnLinux's virtual drives
Debug 609: expanded: /home/my3epc/~PlayOnLinux's virtual drives
Debug 620: new_name: /home/my3epc/~PlayOnLinux's virtual drives
Debug 630: dir: /home/my3epc
Removed path: whitelist ${HOME}/~PlayOnLinux's virtual drives
	new_name: /home/my3epc/~PlayOnLinux's virtual drives
	realpath: (null)
	No such file or directory
Debug 588: whitelist /usr/bin/playonlinux
Debug 609: expanded: /usr/bin/playonlinux
Debug 620: new_name: /usr/bin/playonlinux
Debug 630: dir: /usr/bin
Debug 588: whitelist /usr/bin/playonlinux-pkg
Debug 609: expanded: /usr/bin/playonlinux-pkg
Debug 620: new_name: /usr/bin/playonlinux-pkg
Debug 630: dir: /usr/bin
Debug 588: whitelist /usr/share/wine
Debug 609: expanded: /usr/share/wine
Debug 620: new_name: /usr/share/wine
Debug 630: dir: /usr/share
Adding whitelist top level directory /usr/share
Debug 588: whitelist /usr/share/applications
Debug 609: expanded: /usr/share/applications
Debug 620: new_name: /usr/share/applications
Debug 630: dir: /usr/share
Debug 588: whitelist /usr/share/playonlinux/playonlinux
Debug 609: expanded: /usr/share/playonlinux/playonlinux
Debug 620: new_name: /usr/share/playonlinux/playonlinux
Debug 630: dir: /usr/share
Debug 588: whitelist /usr/bin/python3
Debug 609: expanded: /usr/bin/python3
Debug 620: new_name: /usr/bin/python3
Debug 630: dir: /usr/bin
Debug 588: whitelist /var/lib/aspell
Debug 609: expanded: /var/lib/aspell
Debug 620: new_name: /var/lib/aspell
Debug 630: dir: /var
Adding whitelist top level directory /var
Debug 588: whitelist /var/lib/ca-certificates
Debug 609: expanded: /var/lib/ca-certificates
Debug 620: new_name: /var/lib/ca-certificates
Debug 630: dir: /var
Removed path: whitelist /var/lib/ca-certificates
	new_name: /var/lib/ca-certificates
	realpath: (null)
	No such file or directory
Debug 588: whitelist /var/lib/dbus
Debug 609: expanded: /var/lib/dbus
Debug 620: new_name: /var/lib/dbus
Debug 630: dir: /var
Debug 588: whitelist /var/lib/menu-xdg
Debug 609: expanded: /var/lib/menu-xdg
Debug 620: new_name: /var/lib/menu-xdg
Debug 630: dir: /var
Removed path: whitelist /var/lib/menu-xdg
	new_name: /var/lib/menu-xdg
	realpath: (null)
	No such file or directory
Debug 588: whitelist /var/lib/uim
Debug 609: expanded: /var/lib/uim
Debug 620: new_name: /var/lib/uim
Debug 630: dir: /var
Removed path: whitelist /var/lib/uim
	new_name: /var/lib/uim
	realpath: (null)
	No such file or directory
Debug 588: whitelist /var/cache/fontconfig
Debug 609: expanded: /var/cache/fontconfig
Debug 620: new_name: /var/cache/fontconfig
Debug 630: dir: /var
Debug 588: whitelist /var/tmp
Debug 609: expanded: /var/tmp
Debug 620: new_name: /var/tmp
Debug 630: dir: /var
Debug 588: whitelist /var/run
Debug 609: expanded: /var/run
Debug 620: new_name: /var/run
Debug 630: dir: /var
Debug 588: whitelist /var/lock
Debug 609: expanded: /var/lock
Debug 620: new_name: /var/lock
Debug 630: dir: /var
Debug 588: whitelist /var/games
Debug 609: expanded: /var/games
Debug 620: new_name: /var/games
Debug 630: dir: /var
Removed path: whitelist /var/games
	new_name: /var/games
	realpath: (null)
	No such file or directory
Mounting tmpfs on /usr/bin, check owner: no
106 56 0:38 / /usr/bin rw,nosuid,nodev,noatime - tmpfs tmpfs rw,mode=755,inode64
mountid=106 fsname=/ dir=/usr/bin fstype=tmpfs
Mounting tmpfs on /usr/lib, check owner: no
107 56 0:39 / /usr/lib rw,nosuid,nodev,noatime - tmpfs tmpfs rw,mode=755,inode64
mountid=107 fsname=/ dir=/usr/lib fstype=tmpfs
Mounting tmpfs on /usr/share, check owner: no
108 56 0:40 / /usr/share rw,nosuid,nodev,noatime - tmpfs tmpfs rw,mode=755,inode64
mountid=108 fsname=/ dir=/usr/share fstype=tmpfs
Mounting tmpfs on /var, check owner: no
109 55 0:41 / /var rw,nosuid,nodev,noexec,noatime - tmpfs tmpfs rw,mode=755,inode64
mountid=109 fsname=/ dir=/var fstype=tmpfs
Drop privileges: pid 3, uid 1000, gid 1000, force_nogroups 0
Supplementary groups: 29 44 7 46 
Mounting a new /root directory
Mounting a new /home directory
Create a new user directory
Drop privileges: pid 4, uid 1000, gid 1000, force_nogroups 0
Supplementary groups: 29 44 7 46 
Drop privileges: pid 5, uid 1000, gid 1000, force_nogroups 0
Supplementary groups: 29 44 7 46 
Whitelisting /usr/bin/nc.traditional
112 106 8:3 /usr/bin/nc.traditional /usr/bin/nc.traditional ro,noatime - ext4 /dev/sda3 rw,discard
mountid=112 fsname=/usr/bin/nc.traditional dir=/usr/bin/nc.traditional fstype=ext4
Created symbolic link /usr/bin/nc -> /usr/bin/nc.traditional
Whitelisting /usr/lib/firejail/seccomp.debug32
113 107 8:3 /usr/lib/firejail/seccomp.debug32 /usr/lib/firejail/seccomp.debug32 ro,noatime - ext4 /dev/sda3 rw,discard
mountid=113 fsname=/usr/lib/firejail/seccomp.debug32 dir=/usr/lib/firejail/seccomp.debug32 fstype=ext4
Whitelisting /home/my3epc/.PlayOnLinux
114 111 8:3 /home/my3epc/.PlayOnLinux /home/my3epc/.PlayOnLinux rw,noatime - ext4 /dev/sda3 rw,discard
mountid=114 fsname=/home/my3epc/.PlayOnLinux dir=/home/my3epc/.PlayOnLinux fstype=ext4
Whitelisting /usr/bin/playonlinux
115 106 8:3 /usr/bin/playonlinux /usr/bin/playonlinux ro,noatime - ext4 /dev/sda3 rw,discard
mountid=115 fsname=/usr/bin/playonlinux dir=/usr/bin/playonlinux fstype=ext4
Whitelisting /usr/bin/playonlinux-pkg
116 106 8:3 /usr/bin/playonlinux-pkg /usr/bin/playonlinux-pkg ro,noatime - ext4 /dev/sda3 rw,discard
mountid=116 fsname=/usr/bin/playonlinux-pkg dir=/usr/bin/playonlinux-pkg fstype=ext4
Whitelisting /usr/share/wine
117 108 8:3 /usr/share/wine /usr/share/wine ro,noatime - ext4 /dev/sda3 rw,discard
mountid=117 fsname=/usr/share/wine dir=/usr/share/wine fstype=ext4
Whitelisting /usr/share/applications
118 108 8:3 /usr/share/applications /usr/share/applications ro,noatime - ext4 /dev/sda3 rw,discard
mountid=118 fsname=/usr/share/applications dir=/usr/share/applications fstype=ext4
Whitelisting /usr/share/playonlinux/playonlinux
119 108 8:3 /usr/share/playonlinux/playonlinux /usr/share/playonlinux/playonlinux ro,noatime - ext4 /dev/sda3 rw,discard
mountid=119 fsname=/usr/share/playonlinux/playonlinux dir=/usr/share/playonlinux/playonlinux fstype=ext4
Whitelisting /usr/bin/python3.11
120 106 8:3 /usr/bin/python3.11 /usr/bin/python3.11 ro,noatime - ext4 /dev/sda3 rw,discard
mountid=120 fsname=/usr/bin/python3.11 dir=/usr/bin/python3.11 fstype=ext4
Created symbolic link /usr/bin/python3 -> /usr/bin/python3.11
Whitelisting /var/lib/aspell
121 109 8:3 /var/lib/aspell /var/lib/aspell ro,nosuid,nodev,noexec,noatime - ext4 /dev/sda3 rw,discard
mountid=121 fsname=/var/lib/aspell dir=/var/lib/aspell fstype=ext4
Whitelisting /var/lib/dbus
122 109 8:3 /var/lib/dbus /var/lib/dbus ro,nosuid,nodev,noexec,noatime - ext4 /dev/sda3 rw,discard
mountid=122 fsname=/var/lib/dbus dir=/var/lib/dbus fstype=ext4
Whitelisting /var/cache/fontconfig
123 109 8:3 /var/cache/fontconfig /var/cache/fontconfig ro,nosuid,nodev,noexec,noatime - ext4 /dev/sda3 rw,discard
mountid=123 fsname=/var/cache/fontconfig dir=/var/cache/fontconfig fstype=ext4
Whitelisting /var/tmp
124 109 0:30 / /var/tmp rw,nosuid,nodev,noexec - tmpfs tmpfs rw,inode64
mountid=124 fsname=/ dir=/var/tmp fstype=tmpfs
Created symbolic link /var/run -> /run
Created symbolic link /var/lock -> /run/lock
Add path entry /usr/local/bin
Add path entry /usr/bin
Add path entry /usr/local/games
Add path entry /usr/games
Add path entry /sbin
Add path entry /usr/sbin
Number of path entries: 6
Disable /etc/X11/Xsession.d
Disable /etc/xdg/autostart
Mounting read-only /home/my3epc/.Xauthority
127 111 0:43 /my3epc/.Xauthority /home/my3epc/.Xauthority ro,nosuid,nodev,noexec - tmpfs tmpfs rw,mode=755,inode64
mountid=127 fsname=/my3epc/.Xauthority dir=/home/my3epc/.Xauthority fstype=tmpfs
Disable /etc/systemd/system
Disable /etc/init.d
Disable /run/acpid.socket (requested /var/run/acpid.socket)
Disable /run/rpcbind.sock (requested /var/run/rpcbind.sock)
Disable /etc/adduser.conf
Disable /etc/anacrontab
Disable /etc/apparmor.d
Disable /etc/cron.hourly
Disable /etc/crontab
Disable /etc/cron.monthly
Disable /etc/cron.daily
Disable /etc/cron.d
Disable /etc/cron.yearly
Disable /etc/cron.weekly
Disable /etc/default
Disable /etc/dkms
Disable /etc/grub.d
Disable /etc/kernel
Disable /etc/logrotate.d
Disable /etc/logrotate.conf
Disable /etc/modules
Disable /etc/modules-load.d
Disable /etc/rc.local
Disable /etc/rc2.d
Disable /etc/rc5.d
Disable /etc/rc1.d
Disable /etc/rc4.d
Disable /etc/rc3.d
Disable /etc/rc6.d
Disable /etc/rc0.d
Disable /etc/rcS.d
Disable /etc/logcheck
Mounting read-only /home/my3epc/.bashrc
160 111 0:43 /my3epc/.bashrc /home/my3epc/.bashrc ro,nosuid,nodev,noexec - tmpfs tmpfs rw,mode=755,inode64
mountid=160 fsname=/my3epc/.bashrc dir=/home/my3epc/.bashrc fstype=tmpfs
Disable /etc/group-
Disable /etc/gshadow
Disable /etc/gshadow-
Disable /etc/shadow
Disable /etc/ssh
Disable /etc/sudo_logsrvd.conf
Disable /etc/sudo.conf
Disable /etc/sudoers
Disable /etc/sudoers.d
Disable /usr/sbin (requested /sbin)
Disable /usr/local/sbin
Disable /usr/sbin
Not blacklist /usr/local/bin/nc
Not blacklist /usr/bin/nc
Not blacklist /usr/local/games/nc
Not blacklist /usr/games/nc
Not blacklist /sbin/nc
Not blacklist /usr/sbin/nc
Disable /usr/bin/nc.traditional
Disable /usr/include
Disable /usr/local/include
Disable /usr/local/src
Disable /usr/src
Not blacklist /usr/local/bin/core_perl
Not blacklist /usr/bin/core_perl
Not blacklist /usr/local/games/core_perl
Not blacklist /usr/games/core_perl
Not blacklist /sbin/core_perl
Not blacklist /usr/sbin/core_perl
Not blacklist /usr/local/bin/cpan*
Not blacklist /usr/bin/cpan*
Not blacklist /usr/local/games/cpan*
Not blacklist /usr/games/cpan*
Not blacklist /sbin/cpan*
Not blacklist /usr/sbin/cpan*
Not blacklist /usr/local/bin/perl
Not blacklist /usr/bin/perl
Not blacklist /usr/local/games/perl
Not blacklist /usr/games/perl
Not blacklist /sbin/perl
Not blacklist /usr/sbin/perl
Not blacklist /usr/local/bin/site_perl
Not blacklist /usr/bin/site_perl
Not blacklist /usr/local/games/site_perl
Not blacklist /usr/games/site_perl
Not blacklist /sbin/site_perl
Not blacklist /usr/sbin/site_perl
Not blacklist /usr/local/bin/vendor_perl
Not blacklist /usr/bin/vendor_perl
Not blacklist /usr/local/games/vendor_perl
Not blacklist /usr/games/vendor_perl
Not blacklist /sbin/vendor_perl
Not blacklist /usr/sbin/vendor_perl
Not blacklist /usr/lib/perl*
Not blacklist /usr/lib64/perl*
Not blacklist /usr/share/perl*
Not blacklist /usr/local/bin/rxvt
Not blacklist /usr/bin/rxvt
Not blacklist /usr/local/games/rxvt
Not blacklist /usr/games/rxvt
Not blacklist /sbin/rxvt
Not blacklist /usr/sbin/rxvt
Not blacklist /home/my3epc/.local/lib/python2*
Not blacklist /usr/local/bin/python2*
Not blacklist /usr/bin/python2*
Not blacklist /usr/local/games/python2*
Not blacklist /usr/games/python2*
Not blacklist /sbin/python2*
Not blacklist /usr/sbin/python2*
Not blacklist /usr/include/python2*
Not blacklist /usr/lib/python2*
Not blacklist /usr/local/lib/python2*
Not blacklist /usr/share/python2*
Not blacklist /home/my3epc/.local/lib/python3*
Not blacklist /usr/local/bin/python3*
Not blacklist /usr/bin/python3
Not blacklist /usr/bin/python3.11
Not blacklist /usr/local/games/python3*
Not blacklist /usr/games/python3*
Not blacklist /sbin/python3*
Not blacklist /usr/sbin/python3*
Not blacklist /usr/include/python3*
Not blacklist /usr/lib/python3*
Not blacklist /usr/lib64/python3*
Not blacklist /usr/local/lib/python3.11
Not blacklist /usr/share/python3*
Not blacklist /home/my3epc/.PlayOnLinux
Not blacklist /home/my3epc/.Steam
Not blacklist /home/my3epc/.cache/wine
Not blacklist /home/my3epc/.cache/winetricks
Not blacklist /home/my3epc/.local/share/Steam
Not blacklist /home/my3epc/.local/share/steam
Not blacklist /home/my3epc/.steam
Not blacklist /home/my3epc/.wine
Not blacklist /tmp/.wine-*
Disable /sys/fs
Disable /sys/module
Base filesystem installed in 34.82 ms
Drop privileges: pid 6, uid 1000, gid 1000, force_nogroups 0
Supplementary groups: 29 44 7 46 
Creating empty /home/my3epc/.config directory
Drop privileges: pid 7, uid 1000, gid 1000, force_nogroups 0
Supplementary groups: 29 44 7 46 
Creating empty /home/my3epc/.config/pulse directory
Mounting noexec /run/firejail/mnt/pulse
180 49 0:27 /pulse /run/firejail/mnt/pulse rw,nosuid,nodev,noexec - tmpfs tmpfs rw,mode=755,inode64
mountid=180 fsname=/pulse dir=/run/firejail/mnt/pulse fstype=tmpfs
Mounting /run/firejail/mnt/pulse on /home/my3epc/.config/pulse
181 111 0:27 /pulse /home/my3epc/.config/pulse rw,nosuid,nodev,noexec - tmpfs tmpfs rw,mode=755,inode64
mountid=181 fsname=/pulse dir=/home/my3epc/.config/pulse fstype=tmpfs
Current directory: /home/my3epc
DISPLAY=:0.0 parsed as 0
configuring 77 seccomp entries in /run/firejail/mnt/seccomp/seccomp.32
sbox run: /run/firejail/lib/fsec-print /run/firejail/mnt/seccomp/seccomp.32 
Dropping all capabilities
Drop privileges: pid 8, uid 1000, gid 1000, force_nogroups 1
No supplementary groups
fexecve: No such file or directory
Error: failed to run /run/firejail/lib/fsec-print, exiting...
Error: proc 3451 cannot sync with peer: unexpected EOF
Peer 3452 unexpectedly exited with status 1

<!-- gh-comment-id:3335618473 --> @davew-fj commented on GitHub (Sep 25, 2025): Here is additional information. Let me know what else might be helpful. The O.S. is Antix23.2, 64 bit (Debian bookworm, without systemD). Computer is Dell Latitude E5430. PlayOnLinux is version 4.3.4. More than one error, including `failed to create DBus proxy for org.ally.Bus` were bypassed by whitelisting several directories in playonlinux.local (I see that several of these entries are already covered by relevant firejail profiles, but I haven't taken time to delete unneeded ones from the list.) Here is my playonlinux.local ``` whitelist /usr/bin/nc whitelist /usr/lib/firejail/seccomp.debug32 whitelist ${HOME}/.PlayOnLinux whitelist ${HOME}/~PlayOnLinux's virtual drives whitelist /usr/bin/playonlinux whitelist /usr/bin/playonlinux-pkg whitelist /usr/share/wine whitelist /usr/share/applications whitelist /usr/share/playonlinux/playonlinux whitelist /usr/bin/python3 ``` With the above, running "firejail playonlinux" in terminal produces the following: ``` $ firejail playonlinux Reading profile /etc/firejail/playonlinux.profile Reading profile /home/my3epc/.config/firejail/playonlinux.local Reading profile /etc/firejail/allow-perl.inc Reading profile /etc/firejail/allow-python2.inc Reading profile /etc/firejail/allow-python3.inc Reading profile /etc/firejail/wine.profile Reading profile /etc/firejail/disable-common.inc Reading profile /etc/firejail/disable-devel.inc Reading profile /etc/firejail/disable-interpreters.inc Reading profile /etc/firejail/disable-programs.inc Reading profile /etc/firejail/whitelist-var-common.inc firejail version 0.9.74 Parent pid 3326, child pid 3327 Base filesystem installed in 44.90 ms Child process initialized in 110.00 ms Cannot start application: Permission denied Parent is shutting down, bye... ``` Running `firejail --debug playonlinux` produces the following: <details> <summary>debug log</summary> <p> ``` $ firejail --debug playonlinux Looking for kernel processes Found kthreadd process, we are not running in a sandbox pid=3451: locking /run/firejail/firejail-run.lock ... pid=3451: locked /run/firejail/firejail-run.lock pid=3451: unlocking /run/firejail/firejail-run.lock ... pid=3451: unlocked /run/firejail/firejail-run.lock Building quoted command line: 'playonlinux' Command name #playonlinux# Found playonlinux.profile profile in /etc/firejail directory Reading profile /etc/firejail/playonlinux.profile Found playonlinux.local profile in /home/my3epc/.config/firejail directory Reading profile /home/my3epc/.config/firejail/playonlinux.local Found allow-perl.inc profile in /etc/firejail directory Reading profile /etc/firejail/allow-perl.inc Cannot access .local file allow-perl.local: No such file or directory, skipping... Found allow-python2.inc profile in /etc/firejail directory Reading profile /etc/firejail/allow-python2.inc Cannot access .local file allow-python2.local: No such file or directory, skipping... Found allow-python3.inc profile in /etc/firejail directory Reading profile /etc/firejail/allow-python3.inc Cannot access .local file allow-python3.local: No such file or directory, skipping... Found wine.profile profile in /etc/firejail directory Reading profile /etc/firejail/wine.profile Cannot access .local file wine.local: No such file or directory, skipping... Cannot access .local file globals.local: No such file or directory, skipping... Found disable-common.inc profile in /etc/firejail directory Reading profile /etc/firejail/disable-common.inc Cannot access .local file disable-common.local: No such file or directory, skipping... Found disable-devel.inc profile in /etc/firejail directory Reading profile /etc/firejail/disable-devel.inc Cannot access .local file disable-devel.local: No such file or directory, skipping... Found disable-interpreters.inc profile in /etc/firejail directory Reading profile /etc/firejail/disable-interpreters.inc Cannot access .local file disable-interpreters.local: No such file or directory, skipping... Found disable-programs.inc profile in /etc/firejail directory Reading profile /etc/firejail/disable-programs.inc Cannot access .local file disable-programs.local: No such file or directory, skipping... Found whitelist-var-common.inc profile in /etc/firejail directory Reading profile /etc/firejail/whitelist-var-common.inc Cannot access .local file whitelist-var-common.local: No such file or directory, skipping... firejail version 0.9.74 pid=3451: locking /run/firejail/firejail-run.lock ... pid=3451: locked /run/firejail/firejail-run.lock DISPLAY=:0.0 parsed as 0 pid=3451: unlocking /run/firejail/firejail-run.lock ... pid=3451: unlocked /run/firejail/firejail-run.lock Using the local network stack Parent pid 3451, child pid 3452 Initializing child process Host network configured PID namespace installed Mounting tmpfs on /run/firejail/mnt directory Creating empty /run/firejail/mnt/seccomp directory Creating empty /run/firejail/mnt/seccomp/seccomp.protocol file Creating empty /run/firejail/mnt/seccomp/seccomp.postexec file Creating empty /run/firejail/mnt/seccomp/seccomp.postexec32 file Drop privileges: pid 2, uid 1000, gid 1000, force_nogroups 0 Supplementary groups: 29 44 7 46 Mounting /proc filesystem representing the PID namespace Basic read-only filesystem: Mounting read-only /etc 52 35 8:3 /etc /etc ro,noatime - ext4 /dev/sda3 rw,discard mountid=52 fsname=/etc dir=/etc fstype=ext4 Mounting noexec /etc 53 52 8:3 /etc /etc ro,nosuid,nodev,noexec,noatime - ext4 /dev/sda3 rw,discard mountid=53 fsname=/etc dir=/etc fstype=ext4 Mounting read-only /var 54 35 8:3 /var /var ro,noatime - ext4 /dev/sda3 rw,discard mountid=54 fsname=/var dir=/var fstype=ext4 Mounting noexec /var 55 54 8:3 /var /var ro,nosuid,nodev,noexec,noatime - ext4 /dev/sda3 rw,discard mountid=55 fsname=/var dir=/var fstype=ext4 Mounting read-only /usr 56 35 8:3 /usr /usr ro,noatime - ext4 /dev/sda3 rw,discard mountid=56 fsname=/usr dir=/usr fstype=ext4 Mounting tmpfs on /var/lock Mounting tmpfs on /var/tmp Mounting tmpfs on /var/log Mounting tmpfs on /var/lib/dhcp Mounting tmpfs on /var/lib/snmp Mounting tmpfs on /var/lib/sudo Create the new utmp file Mount the new utmp file Cleaning /home directory Cleaning /run/user directory Cannot open /run/user/1000 directory Sanitizing /etc/passwd, UID_MIN 1000 Sanitizing /etc/group, GID_MIN 1000 Disable /home/my3epc/.config/firejail Disable /run/firejail/sandbox Disable /run/firejail/network Disable /run/firejail/bandwidth Disable /run/firejail/name Disable /run/firejail/profile Disable /run/firejail/x11 Mounting tmpfs on /dev mounting /run/firejail/mnt/dev/snd directory mounting /run/firejail/mnt/dev/dri directory mounting /run/firejail/mnt/dev/video0 file mounting /run/firejail/mnt/dev/video1 file Process /dev/shm directory blacklist /run/firejail/dbus Creating a new /etc/hostname file Creating empty /run/firejail/mnt/hostname file Creating a new /etc/hosts file Loading user hosts file Mounting read-only /proc/sys Remounting /sys directory Disable /sys/firmware Disable /sys/power Disable /sys/kernel/debug Disable /sys/kernel/vmcoreinfo Disable /sys/kernel/uevent_helper Disable /proc/sys/fs/binfmt_misc Disable /proc/sys/kernel/core_pattern Disable /proc/sys/kernel/modprobe Disable /proc/sysrq-trigger Disable /proc/sys/kernel/hotplug Disable /proc/sys/vm/panic_on_oom Disable /proc/irq Disable /proc/bus Disable /proc/timer_list Disable /proc/kcore Disable /proc/kallsyms Disable /proc/kmsg Debug 588: whitelist /usr/bin/nc Debug 609: expanded: /usr/bin/nc Debug 620: new_name: /usr/bin/nc Debug 630: dir: /usr/bin Adding whitelist top level directory /usr/bin Debug 588: whitelist /usr/lib/firejail/seccomp.debug32 Debug 609: expanded: /usr/lib/firejail/seccomp.debug32 Debug 620: new_name: /usr/lib/firejail/seccomp.debug32 Debug 630: dir: /usr/lib Adding whitelist top level directory /usr/lib Debug 588: whitelist ${HOME}/.PlayOnLinux Debug 609: expanded: /home/my3epc/.PlayOnLinux Debug 620: new_name: /home/my3epc/.PlayOnLinux Debug 630: dir: /home/my3epc Adding whitelist top level directory /home/my3epc Debug 588: whitelist ${HOME}/~PlayOnLinux's virtual drives Debug 609: expanded: /home/my3epc/~PlayOnLinux's virtual drives Debug 620: new_name: /home/my3epc/~PlayOnLinux's virtual drives Debug 630: dir: /home/my3epc Removed path: whitelist ${HOME}/~PlayOnLinux's virtual drives new_name: /home/my3epc/~PlayOnLinux's virtual drives realpath: (null) No such file or directory Debug 588: whitelist /usr/bin/playonlinux Debug 609: expanded: /usr/bin/playonlinux Debug 620: new_name: /usr/bin/playonlinux Debug 630: dir: /usr/bin Debug 588: whitelist /usr/bin/playonlinux-pkg Debug 609: expanded: /usr/bin/playonlinux-pkg Debug 620: new_name: /usr/bin/playonlinux-pkg Debug 630: dir: /usr/bin Debug 588: whitelist /usr/share/wine Debug 609: expanded: /usr/share/wine Debug 620: new_name: /usr/share/wine Debug 630: dir: /usr/share Adding whitelist top level directory /usr/share Debug 588: whitelist /usr/share/applications Debug 609: expanded: /usr/share/applications Debug 620: new_name: /usr/share/applications Debug 630: dir: /usr/share Debug 588: whitelist /usr/share/playonlinux/playonlinux Debug 609: expanded: /usr/share/playonlinux/playonlinux Debug 620: new_name: /usr/share/playonlinux/playonlinux Debug 630: dir: /usr/share Debug 588: whitelist /usr/bin/python3 Debug 609: expanded: /usr/bin/python3 Debug 620: new_name: /usr/bin/python3 Debug 630: dir: /usr/bin Debug 588: whitelist /var/lib/aspell Debug 609: expanded: /var/lib/aspell Debug 620: new_name: /var/lib/aspell Debug 630: dir: /var Adding whitelist top level directory /var Debug 588: whitelist /var/lib/ca-certificates Debug 609: expanded: /var/lib/ca-certificates Debug 620: new_name: /var/lib/ca-certificates Debug 630: dir: /var Removed path: whitelist /var/lib/ca-certificates new_name: /var/lib/ca-certificates realpath: (null) No such file or directory Debug 588: whitelist /var/lib/dbus Debug 609: expanded: /var/lib/dbus Debug 620: new_name: /var/lib/dbus Debug 630: dir: /var Debug 588: whitelist /var/lib/menu-xdg Debug 609: expanded: /var/lib/menu-xdg Debug 620: new_name: /var/lib/menu-xdg Debug 630: dir: /var Removed path: whitelist /var/lib/menu-xdg new_name: /var/lib/menu-xdg realpath: (null) No such file or directory Debug 588: whitelist /var/lib/uim Debug 609: expanded: /var/lib/uim Debug 620: new_name: /var/lib/uim Debug 630: dir: /var Removed path: whitelist /var/lib/uim new_name: /var/lib/uim realpath: (null) No such file or directory Debug 588: whitelist /var/cache/fontconfig Debug 609: expanded: /var/cache/fontconfig Debug 620: new_name: /var/cache/fontconfig Debug 630: dir: /var Debug 588: whitelist /var/tmp Debug 609: expanded: /var/tmp Debug 620: new_name: /var/tmp Debug 630: dir: /var Debug 588: whitelist /var/run Debug 609: expanded: /var/run Debug 620: new_name: /var/run Debug 630: dir: /var Debug 588: whitelist /var/lock Debug 609: expanded: /var/lock Debug 620: new_name: /var/lock Debug 630: dir: /var Debug 588: whitelist /var/games Debug 609: expanded: /var/games Debug 620: new_name: /var/games Debug 630: dir: /var Removed path: whitelist /var/games new_name: /var/games realpath: (null) No such file or directory Mounting tmpfs on /usr/bin, check owner: no 106 56 0:38 / /usr/bin rw,nosuid,nodev,noatime - tmpfs tmpfs rw,mode=755,inode64 mountid=106 fsname=/ dir=/usr/bin fstype=tmpfs Mounting tmpfs on /usr/lib, check owner: no 107 56 0:39 / /usr/lib rw,nosuid,nodev,noatime - tmpfs tmpfs rw,mode=755,inode64 mountid=107 fsname=/ dir=/usr/lib fstype=tmpfs Mounting tmpfs on /usr/share, check owner: no 108 56 0:40 / /usr/share rw,nosuid,nodev,noatime - tmpfs tmpfs rw,mode=755,inode64 mountid=108 fsname=/ dir=/usr/share fstype=tmpfs Mounting tmpfs on /var, check owner: no 109 55 0:41 / /var rw,nosuid,nodev,noexec,noatime - tmpfs tmpfs rw,mode=755,inode64 mountid=109 fsname=/ dir=/var fstype=tmpfs Drop privileges: pid 3, uid 1000, gid 1000, force_nogroups 0 Supplementary groups: 29 44 7 46 Mounting a new /root directory Mounting a new /home directory Create a new user directory Drop privileges: pid 4, uid 1000, gid 1000, force_nogroups 0 Supplementary groups: 29 44 7 46 Drop privileges: pid 5, uid 1000, gid 1000, force_nogroups 0 Supplementary groups: 29 44 7 46 Whitelisting /usr/bin/nc.traditional 112 106 8:3 /usr/bin/nc.traditional /usr/bin/nc.traditional ro,noatime - ext4 /dev/sda3 rw,discard mountid=112 fsname=/usr/bin/nc.traditional dir=/usr/bin/nc.traditional fstype=ext4 Created symbolic link /usr/bin/nc -> /usr/bin/nc.traditional Whitelisting /usr/lib/firejail/seccomp.debug32 113 107 8:3 /usr/lib/firejail/seccomp.debug32 /usr/lib/firejail/seccomp.debug32 ro,noatime - ext4 /dev/sda3 rw,discard mountid=113 fsname=/usr/lib/firejail/seccomp.debug32 dir=/usr/lib/firejail/seccomp.debug32 fstype=ext4 Whitelisting /home/my3epc/.PlayOnLinux 114 111 8:3 /home/my3epc/.PlayOnLinux /home/my3epc/.PlayOnLinux rw,noatime - ext4 /dev/sda3 rw,discard mountid=114 fsname=/home/my3epc/.PlayOnLinux dir=/home/my3epc/.PlayOnLinux fstype=ext4 Whitelisting /usr/bin/playonlinux 115 106 8:3 /usr/bin/playonlinux /usr/bin/playonlinux ro,noatime - ext4 /dev/sda3 rw,discard mountid=115 fsname=/usr/bin/playonlinux dir=/usr/bin/playonlinux fstype=ext4 Whitelisting /usr/bin/playonlinux-pkg 116 106 8:3 /usr/bin/playonlinux-pkg /usr/bin/playonlinux-pkg ro,noatime - ext4 /dev/sda3 rw,discard mountid=116 fsname=/usr/bin/playonlinux-pkg dir=/usr/bin/playonlinux-pkg fstype=ext4 Whitelisting /usr/share/wine 117 108 8:3 /usr/share/wine /usr/share/wine ro,noatime - ext4 /dev/sda3 rw,discard mountid=117 fsname=/usr/share/wine dir=/usr/share/wine fstype=ext4 Whitelisting /usr/share/applications 118 108 8:3 /usr/share/applications /usr/share/applications ro,noatime - ext4 /dev/sda3 rw,discard mountid=118 fsname=/usr/share/applications dir=/usr/share/applications fstype=ext4 Whitelisting /usr/share/playonlinux/playonlinux 119 108 8:3 /usr/share/playonlinux/playonlinux /usr/share/playonlinux/playonlinux ro,noatime - ext4 /dev/sda3 rw,discard mountid=119 fsname=/usr/share/playonlinux/playonlinux dir=/usr/share/playonlinux/playonlinux fstype=ext4 Whitelisting /usr/bin/python3.11 120 106 8:3 /usr/bin/python3.11 /usr/bin/python3.11 ro,noatime - ext4 /dev/sda3 rw,discard mountid=120 fsname=/usr/bin/python3.11 dir=/usr/bin/python3.11 fstype=ext4 Created symbolic link /usr/bin/python3 -> /usr/bin/python3.11 Whitelisting /var/lib/aspell 121 109 8:3 /var/lib/aspell /var/lib/aspell ro,nosuid,nodev,noexec,noatime - ext4 /dev/sda3 rw,discard mountid=121 fsname=/var/lib/aspell dir=/var/lib/aspell fstype=ext4 Whitelisting /var/lib/dbus 122 109 8:3 /var/lib/dbus /var/lib/dbus ro,nosuid,nodev,noexec,noatime - ext4 /dev/sda3 rw,discard mountid=122 fsname=/var/lib/dbus dir=/var/lib/dbus fstype=ext4 Whitelisting /var/cache/fontconfig 123 109 8:3 /var/cache/fontconfig /var/cache/fontconfig ro,nosuid,nodev,noexec,noatime - ext4 /dev/sda3 rw,discard mountid=123 fsname=/var/cache/fontconfig dir=/var/cache/fontconfig fstype=ext4 Whitelisting /var/tmp 124 109 0:30 / /var/tmp rw,nosuid,nodev,noexec - tmpfs tmpfs rw,inode64 mountid=124 fsname=/ dir=/var/tmp fstype=tmpfs Created symbolic link /var/run -> /run Created symbolic link /var/lock -> /run/lock Add path entry /usr/local/bin Add path entry /usr/bin Add path entry /usr/local/games Add path entry /usr/games Add path entry /sbin Add path entry /usr/sbin Number of path entries: 6 Disable /etc/X11/Xsession.d Disable /etc/xdg/autostart Mounting read-only /home/my3epc/.Xauthority 127 111 0:43 /my3epc/.Xauthority /home/my3epc/.Xauthority ro,nosuid,nodev,noexec - tmpfs tmpfs rw,mode=755,inode64 mountid=127 fsname=/my3epc/.Xauthority dir=/home/my3epc/.Xauthority fstype=tmpfs Disable /etc/systemd/system Disable /etc/init.d Disable /run/acpid.socket (requested /var/run/acpid.socket) Disable /run/rpcbind.sock (requested /var/run/rpcbind.sock) Disable /etc/adduser.conf Disable /etc/anacrontab Disable /etc/apparmor.d Disable /etc/cron.hourly Disable /etc/crontab Disable /etc/cron.monthly Disable /etc/cron.daily Disable /etc/cron.d Disable /etc/cron.yearly Disable /etc/cron.weekly Disable /etc/default Disable /etc/dkms Disable /etc/grub.d Disable /etc/kernel Disable /etc/logrotate.d Disable /etc/logrotate.conf Disable /etc/modules Disable /etc/modules-load.d Disable /etc/rc.local Disable /etc/rc2.d Disable /etc/rc5.d Disable /etc/rc1.d Disable /etc/rc4.d Disable /etc/rc3.d Disable /etc/rc6.d Disable /etc/rc0.d Disable /etc/rcS.d Disable /etc/logcheck Mounting read-only /home/my3epc/.bashrc 160 111 0:43 /my3epc/.bashrc /home/my3epc/.bashrc ro,nosuid,nodev,noexec - tmpfs tmpfs rw,mode=755,inode64 mountid=160 fsname=/my3epc/.bashrc dir=/home/my3epc/.bashrc fstype=tmpfs Disable /etc/group- Disable /etc/gshadow Disable /etc/gshadow- Disable /etc/shadow Disable /etc/ssh Disable /etc/sudo_logsrvd.conf Disable /etc/sudo.conf Disable /etc/sudoers Disable /etc/sudoers.d Disable /usr/sbin (requested /sbin) Disable /usr/local/sbin Disable /usr/sbin Not blacklist /usr/local/bin/nc Not blacklist /usr/bin/nc Not blacklist /usr/local/games/nc Not blacklist /usr/games/nc Not blacklist /sbin/nc Not blacklist /usr/sbin/nc Disable /usr/bin/nc.traditional Disable /usr/include Disable /usr/local/include Disable /usr/local/src Disable /usr/src Not blacklist /usr/local/bin/core_perl Not blacklist /usr/bin/core_perl Not blacklist /usr/local/games/core_perl Not blacklist /usr/games/core_perl Not blacklist /sbin/core_perl Not blacklist /usr/sbin/core_perl Not blacklist /usr/local/bin/cpan* Not blacklist /usr/bin/cpan* Not blacklist /usr/local/games/cpan* Not blacklist /usr/games/cpan* Not blacklist /sbin/cpan* Not blacklist /usr/sbin/cpan* Not blacklist /usr/local/bin/perl Not blacklist /usr/bin/perl Not blacklist /usr/local/games/perl Not blacklist /usr/games/perl Not blacklist /sbin/perl Not blacklist /usr/sbin/perl Not blacklist /usr/local/bin/site_perl Not blacklist /usr/bin/site_perl Not blacklist /usr/local/games/site_perl Not blacklist /usr/games/site_perl Not blacklist /sbin/site_perl Not blacklist /usr/sbin/site_perl Not blacklist /usr/local/bin/vendor_perl Not blacklist /usr/bin/vendor_perl Not blacklist /usr/local/games/vendor_perl Not blacklist /usr/games/vendor_perl Not blacklist /sbin/vendor_perl Not blacklist /usr/sbin/vendor_perl Not blacklist /usr/lib/perl* Not blacklist /usr/lib64/perl* Not blacklist /usr/share/perl* Not blacklist /usr/local/bin/rxvt Not blacklist /usr/bin/rxvt Not blacklist /usr/local/games/rxvt Not blacklist /usr/games/rxvt Not blacklist /sbin/rxvt Not blacklist /usr/sbin/rxvt Not blacklist /home/my3epc/.local/lib/python2* Not blacklist /usr/local/bin/python2* Not blacklist /usr/bin/python2* Not blacklist /usr/local/games/python2* Not blacklist /usr/games/python2* Not blacklist /sbin/python2* Not blacklist /usr/sbin/python2* Not blacklist /usr/include/python2* Not blacklist /usr/lib/python2* Not blacklist /usr/local/lib/python2* Not blacklist /usr/share/python2* Not blacklist /home/my3epc/.local/lib/python3* Not blacklist /usr/local/bin/python3* Not blacklist /usr/bin/python3 Not blacklist /usr/bin/python3.11 Not blacklist /usr/local/games/python3* Not blacklist /usr/games/python3* Not blacklist /sbin/python3* Not blacklist /usr/sbin/python3* Not blacklist /usr/include/python3* Not blacklist /usr/lib/python3* Not blacklist /usr/lib64/python3* Not blacklist /usr/local/lib/python3.11 Not blacklist /usr/share/python3* Not blacklist /home/my3epc/.PlayOnLinux Not blacklist /home/my3epc/.Steam Not blacklist /home/my3epc/.cache/wine Not blacklist /home/my3epc/.cache/winetricks Not blacklist /home/my3epc/.local/share/Steam Not blacklist /home/my3epc/.local/share/steam Not blacklist /home/my3epc/.steam Not blacklist /home/my3epc/.wine Not blacklist /tmp/.wine-* Disable /sys/fs Disable /sys/module Base filesystem installed in 34.82 ms Drop privileges: pid 6, uid 1000, gid 1000, force_nogroups 0 Supplementary groups: 29 44 7 46 Creating empty /home/my3epc/.config directory Drop privileges: pid 7, uid 1000, gid 1000, force_nogroups 0 Supplementary groups: 29 44 7 46 Creating empty /home/my3epc/.config/pulse directory Mounting noexec /run/firejail/mnt/pulse 180 49 0:27 /pulse /run/firejail/mnt/pulse rw,nosuid,nodev,noexec - tmpfs tmpfs rw,mode=755,inode64 mountid=180 fsname=/pulse dir=/run/firejail/mnt/pulse fstype=tmpfs Mounting /run/firejail/mnt/pulse on /home/my3epc/.config/pulse 181 111 0:27 /pulse /home/my3epc/.config/pulse rw,nosuid,nodev,noexec - tmpfs tmpfs rw,mode=755,inode64 mountid=181 fsname=/pulse dir=/home/my3epc/.config/pulse fstype=tmpfs Current directory: /home/my3epc DISPLAY=:0.0 parsed as 0 configuring 77 seccomp entries in /run/firejail/mnt/seccomp/seccomp.32 sbox run: /run/firejail/lib/fsec-print /run/firejail/mnt/seccomp/seccomp.32 Dropping all capabilities Drop privileges: pid 8, uid 1000, gid 1000, force_nogroups 1 No supplementary groups fexecve: No such file or directory Error: failed to run /run/firejail/lib/fsec-print, exiting... Error: proc 3451 cannot sync with peer: unexpected EOF Peer 3452 unexpectedly exited with status 1 ``` </p> </details>
Author
Owner

@kmk3 commented on GitHub (Sep 26, 2025):

Basic debugging information is missing; please follow the bug report template:

<!-- gh-comment-id:3336622853 --> @kmk3 commented on GitHub (Sep 26, 2025): Basic debugging information is missing; please follow the bug report template: * <https://github.com/netblue30/firejail/issues/new?template=bug_report.md>
Author
Owner

@davew-fj commented on GitHub (Sep 26, 2025):

In accord with the previous message, by following the link given, I opened a new issue (Replacing #6910 with #6911).
I apologize for my original submission, which was not according to correct protocol.

<!-- gh-comment-id:3336794889 --> @davew-fj commented on GitHub (Sep 26, 2025): In accord with the previous message, by following the link given, I opened a new issue (Replacing #6910 with #6911). I apologize for my original submission, which was not according to correct protocol.
Sign in to join this conversation.
No milestone
No project
No assignees
1 participant
Notifications
Due date
The due date is invalid or out of range. Please use the format "yyyy-mm-dd".

No due date set.

Dependencies

No dependencies set.

Reference: github-starred/firejail#3414
No description provided.