It's 2023 now, and I just ran across this problem. What is the solution?

I searched on Google and found people having variations of this or
similar problems since 2018. That FIVE years.

The newest discussion I found on Google (and don't find anymore)
explained that this is an issue with the Kernel and some cgroups. When
upgrading the release to 22.10 and installing proposed kernels didn't
help, I was about to uninstall Ubuntu that I just used to replace the
outdated Macos on my kids computers. I told them Linux is faster, just
as beautiful and there are no issues with random stuff not working.

By replacing APT packages with snaps you are forcing your users to use
snaps. I have no quarrels with snap. Go ahead and replace Debian with
it. But at least make them work for Gods sake.

If you don't care for human users and want to get big in cloud
enterprise, that's fine too, just tell us that we're no longer relevant
as users. I choose ubuntu exactly because I did not want to be bothered
by having to fix my kids computers. I choose ubuntu for my work
environment because it worked so far. I'm using Linux since it was first
published. I have no sensibility that creating home directories in a
place other than /home is a problem that will lead to basic programs
such as browsers not working anymore.

When I see an error message "Permission denied", I expect to see a
filesystem object with permissions denying access, not a directory to
which that very user actually has full access.

This is the output of `mount`:

```

sysfs on /sys type sysfs (rw,nosuid,nodev,noexec,relatime)
proc on /proc type proc (rw,nosuid,nodev,noexec,relatime)
udev on /dev type devtmpfs 
(rw,nosuid,relatime,size=3874748k,nr_inodes=968687,mode=755,inode64)
devpts on /dev/pts type devpts 
(rw,nosuid,noexec,relatime,gid=5,mode=620,ptmxmode=000)
tmpfs on /run type tmpfs 
(rw,nosuid,nodev,noexec,relatime,size=787660k,mode=755,inode64)
/dev/mapper/ubuntu--vg-ubuntu--lv on / type ext4 (rw,relatime)
securityfs on /sys/kernel/security type securityfs 
(rw,nosuid,nodev,noexec,relatime)
tmpfs on /dev/shm type tmpfs (rw,nosuid,nodev,inode64)
tmpfs on /run/lock type tmpfs 
(rw,nosuid,nodev,noexec,relatime,size=5120k,inode64)
cgroup2 on /sys/fs/cgroup type cgroup2 
(rw,nosuid,nodev,noexec,relatime,nsdelegate,memory_recursiveprot)
pstore on /sys/fs/pstore type pstore (rw,nosuid,nodev,noexec,relatime)
efivarfs on /sys/firmware/efi/efivars type efivarfs 
(rw,nosuid,nodev,noexec,relatime)
bpf on /sys/fs/bpf type bpf (rw,nosuid,nodev,noexec,relatime,mode=700)
systemd-1 on /proc/sys/fs/binfmt_misc type autofs 
(rw,relatime,fd=29,pgrp=1,timeout=0,minproto=5,maxproto=5,direct,pipe_ino=19470)
debugfs on /sys/kernel/debug type debugfs (rw,nosuid,nodev,noexec,relatime)
hugetlbfs on /dev/hugepages type hugetlbfs (rw,relatime,pagesize=2M)
mqueue on /dev/mqueue type mqueue (rw,nosuid,nodev,noexec,relatime)
tracefs on /sys/kernel/tracing type tracefs (rw,nosuid,nodev,noexec,relatime)
fusectl on /sys/fs/fuse/connections type fusectl 
(rw,nosuid,nodev,noexec,relatime)
configfs on /sys/kernel/config type configfs (rw,nosuid,nodev,noexec,relatime)
ramfs on /run/credentials/systemd-sysusers.service type ramfs 
(ro,nosuid,nodev,noexec,relatime,mode=700)
/var/lib/snapd/snaps/bare_5.snap on /snap/bare/5 type squashfs 
(ro,nodev,relatime,errors=continue,x-gdu.hide,x-gvfs-hide)
/var/lib/snapd/snaps/chromium_2295.snap on /snap/chromium/2295 type squashfs 
(ro,nodev,relatime,errors=continue,x-gdu.hide,x-gvfs-hide)
/var/lib/snapd/snaps/core20_1587.snap on /snap/core20/1587 type squashfs 
(ro,nodev,relatime,errors=continue,x-gdu.hide,x-gvfs-hide)
/var/lib/snapd/snaps/core20_1778.snap on /snap/core20/1778 type squashfs 
(ro,nodev,relatime,errors=continue,x-gdu.hide,x-gvfs-hide)
/var/lib/snapd/snaps/cups_872.snap on /snap/cups/872 type squashfs 
(ro,nodev,relatime,errors=continue,x-gdu.hide,x-gvfs-hide)
/var/lib/snapd/snaps/firefox_2277.snap on /snap/firefox/2277 type squashfs 
(ro,nodev,relatime,errors=continue,x-gdu.hide,x-gvfs-hide)
/var/lib/snapd/snaps/gnome-3-38-2004_119.snap on /snap/gnome-3-38-2004/119 type 
squashfs (ro,nodev,relatime,errors=continue,x-gdu.hide,x-gvfs-hide)
/var/lib/snapd/snaps/gtk-common-themes_1535.snap on 
/snap/gtk-common-themes/1535 type squashfs 
(ro,nodev,relatime,errors=continue,x-gdu.hide,x-gvfs-hide)
/var/lib/snapd/snaps/lxd_24322.snap on /snap/lxd/24322 type squashfs 
(ro,nodev,relatime,errors=continue,x-gdu.hide,x-gvfs-hide)
/var/lib/snapd/snaps/lxd_23541.snap on /snap/lxd/23541 type squashfs 
(ro,nodev,relatime,errors=continue,x-gdu.hide,x-gvfs-hide)
/var/lib/snapd/snaps/snap-store_638.snap on /snap/snap-store/638 type squashfs 
(ro,nodev,relatime,errors=continue,x-gdu.hide,x-gvfs-hide)
/var/lib/snapd/snaps/snapd_17950.snap on /snap/snapd/17950 type squashfs 
(ro,nodev,relatime,errors=continue,x-gdu.hide,x-gvfs-hide)
/var/lib/snapd/snaps/snapd-desktop-integration_49.snap on 
/snap/snapd-desktop-integration/49 type squashfs 
(ro,nodev,relatime,errors=continue,x-gdu.hide,x-gvfs-hide)
/dev/mapper/ubuntu--vg-ubuntu--lv on /var/snap/firefox/common/host-hunspell 
type ext4 (ro,noexec,noatime)
/dev/sdb2 on /boot type ext4 (rw,relatime)
/dev/sdb1 on /boot/efi type vfat 
(rw,relatime,fmask=0022,dmask=0022,codepage=437,iocharset=iso8859-1,shortname=mixed,errors=remount-ro)
/dev/mapper/ubuntu--vg-lv--home on /home type ext4 (rw,relatime)
binfmt_misc on /proc/sys/fs/binfmt_misc type binfmt_misc 
(rw,nosuid,nodev,noexec,relatime)
tmpfs on /run/snapd/ns type tmpfs 
(rw,nosuid,nodev,noexec,relatime,size=787660k,mode=755,inode64)
nsfs on /run/snapd/ns/lxd.mnt type nsfs (rw)
nsfs on /run/snapd/ns/cups.mnt type nsfs (rw)
nsfs on /run/snapd/ns/snapd-desktop-integration.mnt type nsfs (rw)
tmpfs on /run/user/10002 type tmpfs 
(rw,nosuid,nodev,relatime,size=787660k,nr_inodes=196915,mode=700,uid=10002,gid=10002,inode64)
gvfsd-fuse on /run/user/10002/gvfs type fuse.gvfsd-fuse 
(rw,nosuid,nodev,relatime,user_id=10002,group_id=10002)
portal on /run/user/10002/doc type fuse.portal 
(rw,nosuid,nodev,relatime,user_id=10002,group_id=10002)
nsfs on /run/snapd/ns/firefox.mnt type nsfs (rw)
nsfs on /run/snapd/ns/chromium.mnt type nsfs (rw)
/dev/fuse on /run/user/10002/gnome-remote-desktop/cliprdr-Ym7IIO type fuse 
(rw,nosuid,nodev,relatime,user_id=10002,group_id=10002)
tmpfs on /run/user/1000 type tmpfs 
(rw,nosuid,nodev,relatime,size=787660k,nr_inodes=196915,mode=700,uid=1000,gid=1000,inode64)
portal on /run/user/1000/doc type fuse.portal 
(rw,nosuid,nodev,relatime,user_id=1000,group_id=1000)
gvfsd-fuse on /run/user/1000/gvfs type fuse.gvfsd-fuse 
(rw,nosuid,nodev,relatime,user_id=1000,group_id=1000)
```

A lot of stuff to post, right?

Out of these, here are the things I saw mount show me at a time when
mount was related to actual mounts of filesystems:

```
/dev/mapper/ubuntu--vg-ubuntu--lv on /var/snap/firefox/common/host-hunspell 
type ext4 (ro,noexec,noatime)
/dev/sdb2 on /boot type ext4 (rw,relatime)
/dev/sdb1 on /boot/efi type vfat 
(rw,relatime,fmask=0022,dmask=0022,codepage=437,iocharset=iso8859-1,shortname=mixed,errors=remount-ro)
/dev/mapper/ubuntu--vg-lv--home on /home type ext4 (rw,relatime)
```

Except that `/dev/mapper/ubuntu--vg-ubuntu--lv` should actually be
mounted as `/`. I have no idea what that entry can possibly mean.

Also, why are there **NFS** mounts? I don't want NFS on that computer. I
don't need it. I did not tell Ubuntu to mount strange NFS file systems
from somehwere. Why NFS of all choices????

I'm working with Unixes for more than 30 years and I have not the
slightest clue what all of this chaos is about.

And what for? So that stuff like firefox can run safely in a sandbox?
**SAFELY**? How many bugs and security holes are in these myriad layers
of unnecessary complexity you create here? I don't know. You don't know
either, because otherwise I would not experience a bug that you could
not fix in more than 4 years.


This is a monumental catastrophe in terms of user experience.

-- 
You received this bug notification because you are a member of Desktop
Packages, which is subscribed to chromium-browser in Ubuntu.
https://bugs.launchpad.net/bugs/1776800

Title:
  Unable to start snap applications if user's home directory is not
  /home/$USER

Status in snapd:
  In Progress
Status in chromium-browser package in Ubuntu:
  Confirmed
Status in firefox package in Ubuntu:
  Confirmed
Status in lxd package in Ubuntu:
  Confirmed

Bug description:
  Users with home directories in /home/$USER can run snap application,
  but users in /home/users/$USER can't.

  nate@WorkstationC:~$ snap --version
  snap    2.32.8+18.04
  snapd   2.32.8+18.04
  series  16
  ubuntu  18.04
  kernel  4.15.0-22-generic
  nate@WorkstationC:~$ echo $HOME
  /home/users/nate
  nate@WorkstationC:~$ which hello-world
  /snap/bin/hello-world
  nate@WorkstationC:~$ hello-world
  cannot create nate data directory: /home/users/nate/snap/hello-world/27: 
Permission denied

To manage notifications about this bug go to:
https://bugs.launchpad.net/snapd/+bug/1776800/+subscriptions


-- 
Mailing list: https://launchpad.net/~desktop-packages
Post to     : desktop-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~desktop-packages
More help   : https://help.launchpad.net/ListHelp

Reply via email to