[GH-ISSUE #530] Error mkdir:fs_private(324): File exists #375

Closed
opened 2026-05-05 05:43:11 -06:00 by gitea-mirror · 4 comments
Owner

Originally created by @frank-github on GitHub (May 21, 2016).
Original GitHub issue: https://github.com/netblue30/firejail/issues/530

what do I wrong? Which file exists?
Which do I have to delete?
Problem exists from beginning of installing firejail

frank@ubuntu:/.config/firejail$ firejail --private midori
Reading profile /etc/firejail/midori.profile
Reading profile /etc/firejail/disable-mgmt.inc
Reading profile /etc/firejail/disable-secret.inc
Reading profile /etc/firejail/disable-common.inc
Reading profile /etc/firejail/disable-devel.inc
Parent pid 13620, child pid 13621
Error mkdir:fs_private(324): File exists
Error: cannot establish communication with the parent, exiting...
frank@ubuntu:
/.config/firejail$ firejail --private
Reading profile /etc/firejail/generic.profile
Reading profile /etc/firejail/disable-mgmt.inc
Reading profile /etc/firejail/disable-secret.inc
Reading profile /etc/firejail/disable-common.inc

** Note: you can use --noprofile to disable generic.profile **

Parent pid 13630, child pid 13631
Error mkdir:fs_private(324): File exists
Error: cannot establish communication with the parent, exiting...

Originally created by @frank-github on GitHub (May 21, 2016). Original GitHub issue: https://github.com/netblue30/firejail/issues/530 what do I wrong? Which file exists? Which do I have to delete? Problem exists from beginning of installing firejail frank@ubuntu:~/.config/firejail$ firejail --private midori Reading profile /etc/firejail/midori.profile Reading profile /etc/firejail/disable-mgmt.inc Reading profile /etc/firejail/disable-secret.inc Reading profile /etc/firejail/disable-common.inc Reading profile /etc/firejail/disable-devel.inc Parent pid 13620, child pid 13621 **Error mkdir:fs_private(324): File exists** Error: cannot establish communication with the parent, exiting... frank@ubuntu:~/.config/firejail$ firejail --private Reading profile /etc/firejail/generic.profile Reading profile /etc/firejail/disable-mgmt.inc Reading profile /etc/firejail/disable-secret.inc Reading profile /etc/firejail/disable-common.inc *\* Note: you can use --noprofile to disable generic.profile ** Parent pid 13630, child pid 13631 **Error mkdir:fs_private(324): File exists** Error: cannot establish communication with the parent, exiting...
gitea-mirror 2026-05-05 05:43:11 -06:00
Author
Owner

@frank-github commented on GitHub (May 23, 2016):

running with debug option don't give more informations :-(
Which file was checked and is existing?

Mounting a new /home directory
Mounting a new /root directory
Create a new user directory
Error mkdir:fs_private(324): File exists
Error: cannot establish communication with the parent, exiting...

<!-- gh-comment-id:220872442 --> @frank-github commented on GitHub (May 23, 2016): running with debug option don't give more informations :-( Which file was checked and is existing? Mounting a new /home directory Mounting a new /root directory Create a new user directory Error mkdir:fs_private(324): File exists Error: cannot establish communication with the parent, exiting...
Author
Owner

@netblue30 commented on GitHub (May 23, 2016):

This could happen only if your user home directory is not under /home. Where do you keep your home directory?

<!-- gh-comment-id:221034692 --> @netblue30 commented on GitHub (May 23, 2016): This could happen only if your user home directory is not under /home. Where do you keep your home directory?
Author
Owner

@frank-github commented on GitHub (May 23, 2016):

you are right :-)

user:x:1000:1000:User,,,,:/media/daten/user:/bin/bash

and /home has a softlink

`user@ubuntu:~$ ls -l /home

lrwxrwxrwx 1 root root 18 Apr 27 2014 user -> /media/daten/user
`
any chance to get this working, without users home within /home?

<!-- gh-comment-id:221080365 --> @frank-github commented on GitHub (May 23, 2016): you are right :-) `user:x:1000:1000:User,,,,:/media/daten/user:/bin/bash` and /home has a softlink `user@ubuntu:~$ ls -l /home lrwxrwxrwx 1 root root 18 Apr 27 2014 user -> /media/daten/user ` any chance to get this working, without users home within /home?
Author
Owner

@netblue30 commented on GitHub (May 25, 2016):

--private also disables all other users under /home, so in this case I don't know where the other users are. Maybe in a future version I'll manage to add support for this type of home directory.

<!-- gh-comment-id:221572044 --> @netblue30 commented on GitHub (May 25, 2016): --private also disables all other users under /home, so in this case I don't know where the other users are. Maybe in a future version I'll manage to add support for this type of home directory.
Sign in to join this conversation.
No milestone
No project
No assignees
1 participant
Notifications
Due date
The due date is invalid or out of range. Please use the format "yyyy-mm-dd".

No due date set.

Dependencies

No dependencies set.

Reference: github-starred/firejail#375
No description provided.