@Brian2026 I'm sorry but please refrain from posting random output generated by Claude, or at least verify it before posting.
RestrictFileSystems is empty, nothing is denied. PrivateMounts is not set by default.
$ systemctl show -p RestrictFileSystems -p PrivateMounts snapd.service
PrivateMounts=no
RestrictFileSystems=~
The model is clearly making this up. I would strongly advise you to refrain from posting random snippets that rewrite service units. People may break their systems if they copy them blindly.
However, what could be causing this apparmor.d, but it's even not in Arch repositories and you need to install it explicitly from AUR. I heard there are compatibility problems with some tools. but I'm not using it myself and cannot comment. However, looking at https://github.com/roddhjav/apparmor.d/blob/f8de8d248ba607d48c8f3e798b19cd35f814d71c/apparmor.d/groups/snap/snapd#L47 the mount in question is allowed, and it's been like this for the last 3 years. If it really is prevented by AppArmor, you would see a denial in dmesg/journal. Do you see one?
Next, since it's related to mounts, you may add the following drop in file to debug this further:
[Service]
Environment=LIBMOUNT_DEBUG=all
restart snapd. You should see a very long log from libmount when snapd probes squashfs support. Perhaps it contains some useful output or a hint what's wrong.
I'm sorry, but I don't run CachyOS so can't help you much with that. You can try posting in snapcraft forum.
Pinned Comments
bboozzoo commented on 2018-10-25 11:56 (UTC) (edited on 2025-07-10 11:42 (UTC) by bboozzoo)
Package update notes
2.36
2.36 is the first release with AppArmor enabled by default on Arch.
If you do not have AppArmor enabled at boot there should be no functional changes visible.
If you wish to use snaps with Apparmor, first make sure that Apparmor is enabled during boot, see https://wiki.archlinux.org/index.php/AppArmor for details. After upgrading the package, you need to do the following steps:
systemctl restart apparmor.servicesnapd:systemctl restart snapd.servicesystemctl enable --now snapd.apparmor.service2.62
Since 2.62 snapd generated additional files describing the sandbox. The snapd service needs to be restarted after the update for snaps to continue working (unless the system is rebooted after the update, in which case no additional steps are needed). To restart, run
systemctl restart snapd.service2.70
Snapd 2.70 drops setuid permissions on /usr/lib/snapd/snap-confine in favor of explicit file capabilities. After an upgrade to 2.70, the users are prompted to restart the
apparmor.serviceotherwise attempts to run snaps will error withcannot set capabilitiesmessage.