Peppermint OS Community Forum

Support => Hardware => Topic started by: Matthew on September 13, 2018, 01:14:31 am

Title: Peppermint 9 changes owner and permissions on exe program files (SOLVED)
Post by: Matthew on September 13, 2018, 01:14:31 am
This is a new problem for me.  I have a Journal (word processor organizer) program installed on a USB drive and run it via WINE.  The USB drive and program works as it should in Windows and in Peppermint 8 as well as Peppermint 7. 

Peppermint 9 always changes the owner to root and will not let the program load.  I've been trying to understand why the permissions and owner is always wrong in Peppermint 9 and I have been unable to change them.  I've tried opening the file manager as root and I have tried various command line methods to change the ownership but nothing works.  I don't have easy access to a Windows computer so that isn't feasible every time I need to run the program and I really do not want to have to log out of Peppermint 9 and into another system.

Has anyone else had this problem?  Is there a way to force the ownership to change and stay changed in Peppermint 9? 

Thanks for any help you can offer.
Title: Re: Peppermint 9 changes owner and permissions on exe program files
Post by: pin on September 13, 2018, 01:17:41 am
chown
https://linux.die.net/man/1/chown
Title: Re: Peppermint 9 changes owner and permissions on exe program files
Post by: Matthew on September 13, 2018, 02:14:46 am
I've tried every chown command I can find and the end result is always "Operation not  permitted."
Title: Re: Peppermint 9 changes owner and permissions on exe program files
Post by: pin on September 13, 2018, 02:26:59 am
sudo chown
?
Title: Re: Peppermint 9 changes owner and permissions on exe program files
Post by: PCNetSpec on September 13, 2018, 09:51:56 am
What file system is used on the USB stick (FAT32/NTFS/EXT4/etc.)

And how are you mounting the USB stick ?
(now that we dropped the automounter in Peppermint 9)

BTW, you do realise you can add the automounter back in Peppermint 9 if you wish
https://forum.peppermintos.com/index.php/topic,7102.msg72678.html#msg72678
Title: Re: Peppermint 9 changes owner and permissions on exe program files
Post by: Matthew on September 13, 2018, 12:36:13 pm
What file system is used on the USB stick (FAT32/NTFS/EXT4/etc.)

And how are you mounting the USB stick ?

(now that we dropped the automounter in Peppermint 9)

BTW, you do realise you can add the automounter back in Peppermint 9 if you wish
https://forum.peppermintos.com/index.php/topic,7102.msg72678.html#msg72678

The stick is formatted as W95 FAT32 (LBA).
I usually mount the drive by opening a file manager and clicking on the drive.  The drive opens and shows files and the problem only occurs when I try to run a program.


I do miss the automounter and will eventually put it back in. 
Title: Re: Peppermint 9 changes owner and permissions on exe program files
Post by: murraymint on September 13, 2018, 03:19:25 pm
FAT32 doesn't support Linux-style permissions so that's likely the problem. ext4 would be better.
Title: Re: Peppermint 9 changes owner and permissions on exe program files
Post by: Matthew on September 14, 2018, 12:34:03 am
FAT32 doesn't support Linux-style permissions so that's likely the problem. ext4 would be better.

That is what is confusing to me.  It works fine on other machines running Linux systems and even works on an old Netbook running Peppermint 9.  :-\
Title: Re: Peppermint 9 changes owner and permissions on exe program files
Post by: PCNetSpec on September 14, 2018, 12:27:21 pm
mount the drive in Peppermint 9, then post the output from
Code: [Select]
mount

then preferably do the same in Peppermint 8 .. so we can compare.
Title: Re: Peppermint 9 changes owner and permissions on exe program files
Post by: Matthew on September 14, 2018, 12:41:53 pm
Peppermint 9
Code: [Select]
matthew@matthew-Desktop-Peppermint-9-NY550AA-ABA-p6240f ~ $ mount
sysfs on /sys type sysfs (rw,nosuid,nodev,noexec,relatime)
proc on /proc type proc (rw,nosuid,nodev,noexec,relatime)
udev on /dev type devtmpfs (rw,nosuid,relatime,size=4034884k,nr_inodes=1008721,mode=755)
devpts on /dev/pts type devpts (rw,nosuid,noexec,relatime,gid=5,mode=620,ptmxmode=000)
tmpfs on /run type tmpfs (rw,nosuid,noexec,relatime,size=813328k,mode=755)
/dev/sda10 on / type ext4 (rw,relatime,errors=remount-ro,data=ordered)
securityfs on /sys/kernel/security type securityfs (rw,nosuid,nodev,noexec,relatime)
tmpfs on /dev/shm type tmpfs (rw,nosuid,nodev)
tmpfs on /run/lock type tmpfs (rw,nosuid,nodev,noexec,relatime,size=5120k)
tmpfs on /sys/fs/cgroup type tmpfs (ro,nosuid,nodev,noexec,mode=755)
cgroup on /sys/fs/cgroup/unified type cgroup2 (rw,nosuid,nodev,noexec,relatime,nsdelegate)
cgroup on /sys/fs/cgroup/systemd type cgroup (rw,nosuid,nodev,noexec,relatime,xattr,name=systemd)
pstore on /sys/fs/pstore type pstore (rw,nosuid,nodev,noexec,relatime)
cgroup on /sys/fs/cgroup/blkio type cgroup (rw,nosuid,nodev,noexec,relatime,blkio)
cgroup on /sys/fs/cgroup/rdma type cgroup (rw,nosuid,nodev,noexec,relatime,rdma)
cgroup on /sys/fs/cgroup/perf_event type cgroup (rw,nosuid,nodev,noexec,relatime,perf_event)
cgroup on /sys/fs/cgroup/cpu,cpuacct type cgroup (rw,nosuid,nodev,noexec,relatime,cpu,cpuacct)
cgroup on /sys/fs/cgroup/cpuset type cgroup (rw,nosuid,nodev,noexec,relatime,cpuset)
cgroup on /sys/fs/cgroup/freezer type cgroup (rw,nosuid,nodev,noexec,relatime,freezer)
cgroup on /sys/fs/cgroup/net_cls,net_prio type cgroup (rw,nosuid,nodev,noexec,relatime,net_cls,net_prio)
cgroup on /sys/fs/cgroup/hugetlb type cgroup (rw,nosuid,nodev,noexec,relatime,hugetlb)
cgroup on /sys/fs/cgroup/memory type cgroup (rw,nosuid,nodev,noexec,relatime,memory)
cgroup on /sys/fs/cgroup/devices type cgroup (rw,nosuid,nodev,noexec,relatime,devices)
cgroup on /sys/fs/cgroup/pids type cgroup (rw,nosuid,nodev,noexec,relatime,pids)
systemd-1 on /proc/sys/fs/binfmt_misc type autofs (rw,relatime,fd=40,pgrp=1,timeout=0,minproto=5,maxproto=5,direct,pipe_ino=1244)
debugfs on /sys/kernel/debug type debugfs (rw,relatime)
mqueue on /dev/mqueue type mqueue (rw,relatime)
hugetlbfs on /dev/hugepages type hugetlbfs (rw,relatime,pagesize=2M)
fusectl on /sys/fs/fuse/connections type fusectl (rw,relatime)
configfs on /sys/kernel/config type configfs (rw,relatime)
sunrpc on /run/rpc_pipefs type rpc_pipefs (rw,relatime)
tmpfs on /run/user/1000 type tmpfs (rw,nosuid,nodev,relatime,size=813324k,mode=700,uid=1000,gid=1000)
gvfsd-fuse on /run/user/1000/gvfs type fuse.gvfsd-fuse (rw,nosuid,nodev,relatime,user_id=1000,group_id=1000)
pcloud on /tmp/.mount_pcloud2KJhnV type fuse.pcloud (ro,nosuid,nodev,relatime,user_id=1000,group_id=1000)
/dev/fuse on /run/user/1000/doc type fuse (rw,nosuid,nodev,relatime,user_id=1000,group_id=1000)
pCloud.fs on /home/matthew/pCloudDrive type fuse (rw,nosuid,nodev,relatime,user_id=1000,group_id=1000)
/dev/sdh1 on /media/matthew/PATRIOT_128 type vfat (rw,nosuid,nodev,relatime,sync,fmask=0022,dmask=0022,codepage=437,iocharset=iso8859-1,shortname=mixed,errors=remount-ro,uhelper=udisks2)
matthew@matthew-Desktop-Peppermint-9-NY550AA-ABA-p6240f ~ $







Peppermint 8
Code: [Select]
matthew@matthew-Peppermint-8-Desktop-NY550AA-ABA-p6240f ~ $ mount
sysfs on /sys type sysfs (rw,nosuid,nodev,noexec,relatime)
proc on /proc type proc (rw,nosuid,nodev,noexec,relatime)
udev on /dev type devtmpfs (rw,nosuid,relatime,size=4035160k,nr_inodes=1008790,mode=755)
devpts on /dev/pts type devpts (rw,nosuid,noexec,relatime,gid=5,mode=620,ptmxmode=000)
tmpfs on /run type tmpfs (rw,nosuid,noexec,relatime,size=813328k,mode=755)
/dev/sda2 on / type ext4 (rw,relatime,errors=remount-ro,data=ordered)
securityfs on /sys/kernel/security type securityfs (rw,nosuid,nodev,noexec,relatime)
tmpfs on /dev/shm type tmpfs (rw,nosuid,nodev)
tmpfs on /run/lock type tmpfs (rw,nosuid,nodev,noexec,relatime,size=5120k)
tmpfs on /sys/fs/cgroup type tmpfs (ro,nosuid,nodev,noexec,mode=755)
cgroup on /sys/fs/cgroup/systemd type cgroup (rw,nosuid,nodev,noexec,relatime,xattr,release_agent=/lib/systemd/systemd-cgroups-agent,name=systemd)
pstore on /sys/fs/pstore type pstore (rw,nosuid,nodev,noexec,relatime)
cgroup on /sys/fs/cgroup/devices type cgroup (rw,nosuid,nodev,noexec,relatime,devices)
cgroup on /sys/fs/cgroup/blkio type cgroup (rw,nosuid,nodev,noexec,relatime,blkio)
cgroup on /sys/fs/cgroup/freezer type cgroup (rw,nosuid,nodev,noexec,relatime,freezer)
cgroup on /sys/fs/cgroup/net_cls,net_prio type cgroup (rw,nosuid,nodev,noexec,relatime,net_cls,net_prio)
cgroup on /sys/fs/cgroup/pids type cgroup (rw,nosuid,nodev,noexec,relatime,pids)
cgroup on /sys/fs/cgroup/perf_event type cgroup (rw,nosuid,nodev,noexec,relatime,perf_event)
cgroup on /sys/fs/cgroup/hugetlb type cgroup (rw,nosuid,nodev,noexec,relatime,hugetlb)
cgroup on /sys/fs/cgroup/memory type cgroup (rw,nosuid,nodev,noexec,relatime,memory)
cgroup on /sys/fs/cgroup/cpuset type cgroup (rw,nosuid,nodev,noexec,relatime,cpuset)
cgroup on /sys/fs/cgroup/cpu,cpuacct type cgroup (rw,nosuid,nodev,noexec,relatime,cpu,cpuacct)
cgroup on /sys/fs/cgroup/rdma type cgroup (rw,nosuid,nodev,noexec,relatime,rdma)
systemd-1 on /proc/sys/fs/binfmt_misc type autofs (rw,relatime,fd=27,pgrp=1,timeout=0,minproto=5,maxproto=5,direct,pipe_ino=14401)
debugfs on /sys/kernel/debug type debugfs (rw,relatime)
hugetlbfs on /dev/hugepages type hugetlbfs (rw,relatime,pagesize=2M)
mqueue on /dev/mqueue type mqueue (rw,relatime)
sunrpc on /run/rpc_pipefs type rpc_pipefs (rw,relatime)
configfs on /sys/kernel/config type configfs (rw,relatime)
fusectl on /sys/fs/fuse/connections type fusectl (rw,relatime)
binfmt_misc on /proc/sys/fs/binfmt_misc type binfmt_misc (rw,relatime)
tmpfs on /run/user/1000 type tmpfs (rw,nosuid,nodev,relatime,size=813328k,mode=700,uid=1000,gid=1000)
gvfsd-fuse on /run/user/1000/gvfs type fuse.gvfsd-fuse (rw,nosuid,nodev,relatime,user_id=1000,group_id=1000)
pcloud on /tmp/.mount_pcloudUzeAjo type fuse.pcloud (ro,nosuid,nodev,relatime,user_id=1000,group_id=1000)
pCloud.fs on /home/matthew/pCloudDrive type fuse (rw,nosuid,nodev,relatime,user_id=1000,group_id=1000)
/dev/sdh1 on /media/matthew/PATRIOT_128 type vfat (rw,nosuid,nodev,relatime,uid=1000,gid=1000,fmask=0022,dmask=0022,codepage=437,iocharset=iso8859-1,shortname=mixed,showexec,utf8,flush,errors=remount-ro,uhelper=udisks2)
matthew@matthew-Peppermint-8-Desktop-NY550AA-ABA-p6240f ~ $
Title: Re: Peppermint 9 changes owner and permissions on exe program files
Post by: murraymint on September 14, 2018, 02:06:35 pm
Yes, there's a user and group ID involved in the mounting on Peppermint 8 somehow.
Title: Re: Peppermint 9 changes owner and permissions on exe program files
Post by: PCNetSpec on September 14, 2018, 03:11:32 pm
Okay that's weird, for some reason your USB stick isn't being mounted with the uid=1000 and gid=1000 options set.

With the USB stick plugged in, what's the output from
Code: [Select]
lsusb
?

Now remove the USB stick and run:
Code: [Select]
sudo rm /media/matthew/PATRIOT_128
(DO NOT run that command with the USB stick plugged in)

Now plug the USB stick back in and post the output from:
Code: [Select]
dmesg | tail -n 40
and
Code: [Select]
mount
Title: Re: Peppermint 9 changes owner and permissions on exe program files
Post by: Matthew on September 15, 2018, 01:15:38 am
Here is the output with the stick plugged in but not mounted.
Code: [Select]
matthew@matthew-Desktop-Peppermint-9-NY550AA-ABA-p6240f ~ $ lsusb
Bus 002 Device 005: ID 058f:6362 Alcor Micro Corp. Flash Card Reader/Writer
Bus 002 Device 001: ID 1d6b:0002 Linux Foundation 2.0 root hub
Bus 008 Device 001: ID 1d6b:0001 Linux Foundation 1.1 root hub
Bus 007 Device 003: ID 051d:0002 American Power Conversion Uninterruptible Power Supply
Bus 007 Device 002: ID 062a:4102 Creative Labs
Bus 007 Device 001: ID 1d6b:0001 Linux Foundation 1.1 root hub
Bus 006 Device 002: ID 046d:c52b Logitech, Inc. Unifying Receiver
Bus 006 Device 001: ID 1d6b:0001 Linux Foundation 1.1 root hub
Bus 009 Device 002: ID 1058:25a2 Western Digital Technologies, Inc.
Bus 009 Device 001: ID 1d6b:0002 Linux Foundation 2.0 root hub
Bus 010 Device 003: ID 13fe:5500 Kingston Technology Company Inc.
Bus 010 Device 001: ID 1d6b:0003 Linux Foundation 3.0 root hub
Bus 001 Device 001: ID 1d6b:0002 Linux Foundation 2.0 root hub
Bus 005 Device 001: ID 1d6b:0001 Linux Foundation 1.1 root hub
Bus 004 Device 001: ID 1d6b:0001 Linux Foundation 1.1 root hub
Bus 003 Device 002: ID 0c45:760a Microdia
Bus 003 Device 001: ID 1d6b:0001 Linux Foundation 1.1 root hub
matthew@matthew-Desktop-Peppermint-9-NY550AA-ABA-p6240f ~ $

Code: [Select]
matthew@matthew-Desktop-Peppermint-9-NY550AA-ABA-p6240f ~ $ sudo rm /media/matthew/PATRIOT_128
[sudo] password for matthew:
rm: cannot remove '/media/matthew/PATRIOT_128': No such file or directory

Code: [Select]
matthew@matthew-Desktop-Peppermint-9-NY550AA-ABA-p6240f ~ $ dmesg | tail -n 40
[45330.924101] usb 10-3: USB disconnect, device number 3
[45454.696085] usb 10-3: new SuperSpeed USB device number 4 using xhci_hcd
[45454.841682] usb 10-3: New USB device found, idVendor=13fe, idProduct=5500
[45454.841686] usb 10-3: New USB device strings: Mfr=1, Product=2, SerialNumber=3
[45454.841689] usb 10-3: Product: Patriot Memory
[45454.841691] usb 10-3: Manufacturer:         
[45454.841693] usb 10-3: SerialNumber: 070B66A7EC5D6F07
[45454.842199] usb-storage 10-3:1.0: USB Mass Storage device detected
[45454.843814] scsi host4: usb-storage 10-3:1.0
[45456.791540] scsi 4:0:0:0: Direct-Access              Patriot Memory   PMAP PQ: 0 ANSI: 6
[45456.791969] sd 4:0:0:0: Attached scsi generic sg8 type 0
[45456.792637] sd 4:0:0:0: [sdh] 241827840 512-byte logical blocks: (124 GB/115 GiB)
[45456.792757] sd 4:0:0:0: [sdh] Write Protect is off
[45456.792760] sd 4:0:0:0: [sdh] Mode Sense: 23 00 00 00
[45456.792878] sd 4:0:0:0: [sdh] No Caching mode page found
[45456.792884] sd 4:0:0:0: [sdh] Assuming drive cache: write through
[45456.798289]  sdh: sdh1
[45456.799202] sd 4:0:0:0: [sdh] Attached SCSI removable disk
[45457.737142] FAT-fs (sdh1): Volume was not properly unmounted. Some data may be corrupt. Please run fsck.
[45516.948096] xhci_hcd 0000:03:00.0: Cannot set link state.
[45516.948108] usb usb10-port3: cannot disable (err = -32)
[45516.948115] usb 10-3: USB disconnect, device number 4
[45524.548084] usb 10-3: new SuperSpeed USB device number 5 using xhci_hcd
[45524.693667] usb 10-3: New USB device found, idVendor=13fe, idProduct=5500
[45524.693670] usb 10-3: New USB device strings: Mfr=1, Product=2, SerialNumber=3
[45524.693673] usb 10-3: Product: Patriot Memory
[45524.693675] usb 10-3: Manufacturer:         
[45524.693677] usb 10-3: SerialNumber: 070B66A7EC5D6F07
[45524.694168] usb-storage 10-3:1.0: USB Mass Storage device detected
[45524.694393] scsi host4: usb-storage 10-3:1.0
[45526.524492] scsi 4:0:0:0: Direct-Access              Patriot Memory   PMAP PQ: 0 ANSI: 6
[45526.524911] sd 4:0:0:0: Attached scsi generic sg8 type 0
[45526.526053] sd 4:0:0:0: [sdh] 241827840 512-byte logical blocks: (124 GB/115 GiB)
[45526.526166] sd 4:0:0:0: [sdh] Write Protect is off
[45526.526173] sd 4:0:0:0: [sdh] Mode Sense: 23 00 00 00
[45526.526286] sd 4:0:0:0: [sdh] No Caching mode page found
[45526.526291] sd 4:0:0:0: [sdh] Assuming drive cache: write through
[45526.528846]  sdh: sdh1
[45526.529962] sd 4:0:0:0: [sdh] Attached SCSI removable disk
[45527.471306] FAT-fs (sdh1): Volume was not properly unmounted. Some data may be corrupt. Please run fsck.
matthew@matthew-Desktop-Peppermint-9-NY550AA-ABA-p6240f ~ $

Code: [Select]
matthew@matthew-Desktop-Peppermint-9-NY550AA-ABA-p6240f ~ $ mount
sysfs on /sys type sysfs (rw,nosuid,nodev,noexec,relatime)
proc on /proc type proc (rw,nosuid,nodev,noexec,relatime)
udev on /dev type devtmpfs (rw,nosuid,relatime,size=4034884k,nr_inodes=1008721,mode=755)
devpts on /dev/pts type devpts (rw,nosuid,noexec,relatime,gid=5,mode=620,ptmxmode=000)
tmpfs on /run type tmpfs (rw,nosuid,noexec,relatime,size=813328k,mode=755)
/dev/sda10 on / type ext4 (rw,relatime,errors=remount-ro,data=ordered)
securityfs on /sys/kernel/security type securityfs (rw,nosuid,nodev,noexec,relatime)
tmpfs on /dev/shm type tmpfs (rw,nosuid,nodev)
tmpfs on /run/lock type tmpfs (rw,nosuid,nodev,noexec,relatime,size=5120k)
tmpfs on /sys/fs/cgroup type tmpfs (ro,nosuid,nodev,noexec,mode=755)
cgroup on /sys/fs/cgroup/unified type cgroup2 (rw,nosuid,nodev,noexec,relatime,nsdelegate)
cgroup on /sys/fs/cgroup/systemd type cgroup (rw,nosuid,nodev,noexec,relatime,xattr,name=systemd)
pstore on /sys/fs/pstore type pstore (rw,nosuid,nodev,noexec,relatime)
cgroup on /sys/fs/cgroup/blkio type cgroup (rw,nosuid,nodev,noexec,relatime,blkio)
cgroup on /sys/fs/cgroup/rdma type cgroup (rw,nosuid,nodev,noexec,relatime,rdma)
cgroup on /sys/fs/cgroup/perf_event type cgroup (rw,nosuid,nodev,noexec,relatime,perf_event)
cgroup on /sys/fs/cgroup/cpu,cpuacct type cgroup (rw,nosuid,nodev,noexec,relatime,cpu,cpuacct)
cgroup on /sys/fs/cgroup/cpuset type cgroup (rw,nosuid,nodev,noexec,relatime,cpuset)
cgroup on /sys/fs/cgroup/freezer type cgroup (rw,nosuid,nodev,noexec,relatime,freezer)
cgroup on /sys/fs/cgroup/net_cls,net_prio type cgroup (rw,nosuid,nodev,noexec,relatime,net_cls,net_prio)
cgroup on /sys/fs/cgroup/hugetlb type cgroup (rw,nosuid,nodev,noexec,relatime,hugetlb)
cgroup on /sys/fs/cgroup/memory type cgroup (rw,nosuid,nodev,noexec,relatime,memory)
cgroup on /sys/fs/cgroup/devices type cgroup (rw,nosuid,nodev,noexec,relatime,devices)
cgroup on /sys/fs/cgroup/pids type cgroup (rw,nosuid,nodev,noexec,relatime,pids)
systemd-1 on /proc/sys/fs/binfmt_misc type autofs (rw,relatime,fd=40,pgrp=1,timeout=0,minproto=5,maxproto=5,direct,pipe_ino=1244)
debugfs on /sys/kernel/debug type debugfs (rw,relatime)
mqueue on /dev/mqueue type mqueue (rw,relatime)
hugetlbfs on /dev/hugepages type hugetlbfs (rw,relatime,pagesize=2M)
fusectl on /sys/fs/fuse/connections type fusectl (rw,relatime)
configfs on /sys/kernel/config type configfs (rw,relatime)
sunrpc on /run/rpc_pipefs type rpc_pipefs (rw,relatime)
tmpfs on /run/user/1000 type tmpfs (rw,nosuid,nodev,relatime,size=813324k,mode=700,uid=1000,gid=1000)
gvfsd-fuse on /run/user/1000/gvfs type fuse.gvfsd-fuse (rw,nosuid,nodev,relatime,user_id=1000,group_id=1000)
pcloud on /tmp/.mount_pcloud2KJhnV type fuse.pcloud (ro,nosuid,nodev,relatime,user_id=1000,group_id=1000)
/dev/fuse on /run/user/1000/doc type fuse (rw,nosuid,nodev,relatime,user_id=1000,group_id=1000)
pCloud.fs on /home/matthew/pCloudDrive type fuse (rw,nosuid,nodev,relatime,user_id=1000,group_id=1000)
/dev/sda6 on /media/matthew/Fedora-home type ext4 (rw,nosuid,nodev,relatime,data=ordered,uhelper=udisks2)


I usually get an error message when I try to unmount or eject the stick.

[Failed to eject "Patriot_128" Error opening /dev/sdh: Device or resource busy.]  That never occurs anywhere but Peppermint 9.
Title: Re: Peppermint 9 changes owner and permissions on exe program files
Post by: PCNetSpec on September 15, 2018, 07:27:28 pm
Have you got a Windows PC that you can use to scan the USB stick for errors ?
Title: Re: Peppermint 9 changes owner and permissions on exe program files
Post by: Matthew on September 16, 2018, 01:03:54 am
Yes.  I plugged it into my wife's laptop and let it scan. Found no errors or problems.  It still works fine everywhere but Peppermint 9.

Does this look like a fixable problem?  If all else fails would a system reinstall cure it?  I'm fairly certain it isn't the stick.
Title: Re: Peppermint 9 changes owner and permissions on exe program files
Post by: PCNetSpec on September 16, 2018, 04:10:42 am
It is MUCH more likely It is the file system on the stick .. if you look at the dmesg output
Quote
FAT-fs (sdh1): Volume was not properly unmounted. Some data may be corrupt. Please run fsck.

The stick has been flagged as having a "dirty" file system because at some stage it was unmounted incorrectly (possibly just pulled out without first being unmounted).

Here's what I'd try...

1) Copy off all the data

2) In Gparted, create a new MSDOS style partition table (this will erase the drive at the same time)

3) Still in Gparted, create a new FAT32 partition.

4) Copy the data back
Title: Re: Peppermint 9 changes owner and permissions on exe program files
Post by: Matthew on September 16, 2018, 12:34:34 pm
I'll give that a try.  I'm always very careful to unmount before unplugging any drive but it's possible.  I just remembered plugging the drive into my phone to email a file a few days ago, that might be the culprit.  I'm guessing that perhaps Peppermint 9 is just "picky" about the file system conditions.

This has been a week for technological problems.  When I got to work a week ago Friday and turned my computer on I found the blue screen of diagnostic death.  The IT guys gave up and re imaged the thing.  I've been struggling all week just to get my special software reinstalled.

I will let you know if the suggestion solves the problem.
Title: Re: Peppermint 9 changes owner and permissions on exe program files
Post by: Matthew on September 16, 2018, 02:16:45 pm
I did as suggested.  Copied the drive, reformatted the stick and copied the contents back to the drive.  No change.  The owner is still listed as root and the problem remains.
Title: Re: Peppermint 9 changes owner and permissions on exe program files
Post by: PCNetSpec on September 17, 2018, 11:07:51 am
Try another stick then because when I mount a FAT32 USB stick in Pep9 I "do" get the uid=1000 and gid=1000 options.

If it still does it on another stick, we'll have to try figure out why your system is behaving differently.
Title: Re: Peppermint 9 changes owner and permissions on exe program files
Post by: Matthew on September 17, 2018, 09:20:02 pm
I formatted another stick as FAT32 and installed the app onto it.  When I try to run it the results are the same errors.  The app runs perfectly when it's installed on a stick formatted as ext4.  Switching to an ext4 stick could be a possibility but I would like to understand what the problem is.

There seems to be some debate, can Windows work with EXT4 file format?
Title: Re: Peppermint 9 changes owner and permissions on exe program files
Post by: PCNetSpec on September 18, 2018, 05:47:55 am
How large are the contents of this USB stick ?

It would be helpful if I could access the content so I can attempt to reproduce the issue .. is there any chance you could zip up the contents and host them somewhere so I could download them ?

Or does something exclude that, such as the software requires a license or paid account ?

If you'd rather they weren't made public, you could always PM (or email) me the link.
Title: Re: Peppermint 9 changes owner and permissions on exe program files
Post by: Matthew on September 18, 2018, 09:16:35 am
You can download the program from the web site and install it to a stick without any problem.  David gives a 45 day free trial so there won't be any licensing issues.  I installed it to a second stick for testing purposes while we sort this out. 

http://www.davidrm.com/thejournal/downloadupdate/
Title: Re: Peppermint 9 changes owner and permissions on exe program files
Post by: PCNetSpec on September 18, 2018, 01:00:54 pm
Can you explain "Install it to a stick" ?

How did you do this ? .. in Windows ? .. or by running jnl8setup.exe in WINE ?

Was the stick pre-formatted as a single FAT32 partition ?

Is this application the ONLY thing on your USB stick ? .. have you saved any 'journals' (or other stuff) on the stick as well as the application ?

[EDIT]

Oh, and once I install it to the USB stick, how do I start the app in WINE ?

[EDIT2]

Just out of interest, can you format a USB stick with a single FAT32 partition .. then leaving it EMPTY, insert the stick and mount it in the file manager .. then post the output from
Code: [Select]
mount
Title: Re: Peppermint 9 changes owner and permissions on exe program files
Post by: Matthew on September 19, 2018, 02:53:03 am
I pre-formatted the stick as a single partition MSDOS table, FAT32 format.

To install the program onto the stick right click on it and choose to run it via "WINE Program Loader".  The file has a built in installer.  It will default to a Windows "C" drive location.  Browse to the stick.  When asked about install options uncheck all the boxes except for "I am installing The Journal to a USB or Cloud drive."

The Journal 8 is the only thing on the stick.

To start the program navigate to the stick in a file manager.  Open the folder "The Journal 8".  Inside will be a Journal.exe file, right click and check "Properties", the permissions tab should have a box to be checked that makes the file executable.  Close the "Properties" window.  Right click the Journal.exe file again and choose to open with WINE Program Loader again.  This is the step that fails for me.  The main folder shows the owner as Root and I can open it but not change anything.  The exe won't run at all because it can't run as "read only" which is what is shown in the permissions.  In any other Linux os like Peppermint 7 or 8 the owner is always my user name.  In Peppermint 9 it is root and "read only".

I created an empty stick, single partition, formatted as FAT32.  I mounted it in the file manager and ran the mount command.

Code: [Select]
matthew@matthew-Desktop-Peppermint-9-NY550AA-ABA-p6240f ~ $ mount
sysfs on /sys type sysfs (rw,nosuid,nodev,noexec,relatime)
proc on /proc type proc (rw,nosuid,nodev,noexec,relatime)
udev on /dev type devtmpfs (rw,nosuid,relatime,size=4034884k,nr_inodes=1008721,mode=755)
devpts on /dev/pts type devpts (rw,nosuid,noexec,relatime,gid=5,mode=620,ptmxmode=000)
tmpfs on /run type tmpfs (rw,nosuid,noexec,relatime,size=813328k,mode=755)
/dev/sda10 on / type ext4 (rw,relatime,errors=remount-ro,data=ordered)
securityfs on /sys/kernel/security type securityfs (rw,nosuid,nodev,noexec,relatime)
tmpfs on /dev/shm type tmpfs (rw,nosuid,nodev)
tmpfs on /run/lock type tmpfs (rw,nosuid,nodev,noexec,relatime,size=5120k)
tmpfs on /sys/fs/cgroup type tmpfs (ro,nosuid,nodev,noexec,mode=755)
cgroup on /sys/fs/cgroup/unified type cgroup2 (rw,nosuid,nodev,noexec,relatime,nsdelegate)
cgroup on /sys/fs/cgroup/systemd type cgroup (rw,nosuid,nodev,noexec,relatime,xattr,name=systemd)
pstore on /sys/fs/pstore type pstore (rw,nosuid,nodev,noexec,relatime)
cgroup on /sys/fs/cgroup/cpu,cpuacct type cgroup (rw,nosuid,nodev,noexec,relatime,cpu,cpuacct)
cgroup on /sys/fs/cgroup/net_cls,net_prio type cgroup (rw,nosuid,nodev,noexec,relatime,net_cls,net_prio)
cgroup on /sys/fs/cgroup/freezer type cgroup (rw,nosuid,nodev,noexec,relatime,freezer)
cgroup on /sys/fs/cgroup/memory type cgroup (rw,nosuid,nodev,noexec,relatime,memory)
cgroup on /sys/fs/cgroup/blkio type cgroup (rw,nosuid,nodev,noexec,relatime,blkio)
cgroup on /sys/fs/cgroup/rdma type cgroup (rw,nosuid,nodev,noexec,relatime,rdma)
cgroup on /sys/fs/cgroup/devices type cgroup (rw,nosuid,nodev,noexec,relatime,devices)
cgroup on /sys/fs/cgroup/perf_event type cgroup (rw,nosuid,nodev,noexec,relatime,perf_event)
cgroup on /sys/fs/cgroup/pids type cgroup (rw,nosuid,nodev,noexec,relatime,pids)
cgroup on /sys/fs/cgroup/cpuset type cgroup (rw,nosuid,nodev,noexec,relatime,cpuset)
cgroup on /sys/fs/cgroup/hugetlb type cgroup (rw,nosuid,nodev,noexec,relatime,hugetlb)
systemd-1 on /proc/sys/fs/binfmt_misc type autofs (rw,relatime,fd=26,pgrp=1,timeout=0,minproto=5,maxproto=5,direct,pipe_ino=13672)
mqueue on /dev/mqueue type mqueue (rw,relatime)
hugetlbfs on /dev/hugepages type hugetlbfs (rw,relatime,pagesize=2M)
debugfs on /sys/kernel/debug type debugfs (rw,relatime)
sunrpc on /run/rpc_pipefs type rpc_pipefs (rw,relatime)
configfs on /sys/kernel/config type configfs (rw,relatime)
fusectl on /sys/fs/fuse/connections type fusectl (rw,relatime)
tmpfs on /run/user/1000 type tmpfs (rw,nosuid,nodev,relatime,size=813324k,mode=700,uid=1000,gid=1000)
gvfsd-fuse on /run/user/1000/gvfs type fuse.gvfsd-fuse (rw,nosuid,nodev,relatime,user_id=1000,group_id=1000)
pcloud on /tmp/.mount_pcloud20i3NR type fuse.pcloud (ro,nosuid,nodev,relatime,user_id=1000,group_id=1000)
/dev/fuse on /run/user/1000/doc type fuse (rw,nosuid,nodev,relatime,user_id=1000,group_id=1000)
pCloud.fs on /home/matthew/pCloudDrive type fuse (rw,nosuid,nodev,relatime,user_id=1000,group_id=1000)
/dev/sda6 on /media/matthew/Fedora-home type ext4 (rw,nosuid,nodev,relatime,data=ordered,uhelper=udisks2)
/dev/sdb1 on /media/matthew/3TStorage type ext4 (rw,nosuid,nodev,relatime,data=ordered,uhelper=udisks2)
/dev/sda12 on /media/matthew/Debian8-home type ext4 (rw,nosuid,nodev,relatime,data=ordered,uhelper=udisks2)
/dev/sda4 on /media/matthew/Debian8-boot type ext4 (rw,nosuid,nodev,relatime,stripe=4,data=ordered,uhelper=udisks2)
/dev/sdc1 on /media/matthew/WD Elements 2T type fuseblk (rw,nosuid,nodev,relatime,user_id=0,group_id=0,default_permissions,allow_other,blksize=4096,uhelper=udisks2)
/dev/sda11 on /media/matthew/Debian8-root type ext4 (rw,nosuid,nodev,relatime,data=ordered,uhelper=udisks2)
/dev/sda2 on /media/matthew/f5355bcf-2148-4e5c-85fd-c1cc380d9ed2 type ext4 (rw,nosuid,nodev,relatime,data=ordered,uhelper=udisks2)
/dev/sda5 on /media/matthew/1c69bcbb-dbe1-4d06-be92-5c2012e7f80e type ext4 (rw,nosuid,nodev,relatime,data=ordered,uhelper=udisks2)
/dev/sdh1 on /media/matthew/AC22-500E type vfat (rw,nosuid,nodev,relatime,sync,fmask=0022,dmask=0022,codepage=437,iocharset=iso8859-1,shortname=mixed,errors=remount-ro,uhelper=udisks2)
matthew@matthew-Desktop-Peppermint-9-NY550AA-ABA-p6240f ~ $

Interestingly, when I right click in the empty stick and check properties the empty drive owner is "root".  I can not paste a file or image into the empty stick because it is read only.
Title: Re: Peppermint 9 changes owner and permissions on exe program files
Post by: PCNetSpec on September 19, 2018, 06:51:04 am
Okay thanks for the info .. I'll test it as soon as I get back tonight.
Title: Re: Peppermint 9 changes owner and permissions on exe program files
Post by: PCNetSpec on September 19, 2018, 03:36:40 pm
Can you post the output from:
Code: [Select]
cat /etc/mtab
and
Code: [Select]
id
Title: Re: Peppermint 9 changes owner and permissions on exe program files
Post by: Matthew on September 20, 2018, 12:40:44 am
As requested.

Code: [Select]
matthew@matthew-Desktop-Peppermint-9-NY550AA-ABA-p6240f ~ $ cat /etc/mtab
sysfs /sys sysfs rw,nosuid,nodev,noexec,relatime 0 0
proc /proc proc rw,nosuid,nodev,noexec,relatime 0 0
udev /dev devtmpfs rw,nosuid,relatime,size=4034884k,nr_inodes=1008721,mode=755 0 0
devpts /dev/pts devpts rw,nosuid,noexec,relatime,gid=5,mode=620,ptmxmode=000 0 0
tmpfs /run tmpfs rw,nosuid,noexec,relatime,size=813328k,mode=755 0 0
/dev/sda10 / ext4 rw,relatime,errors=remount-ro,data=ordered 0 0
securityfs /sys/kernel/security securityfs rw,nosuid,nodev,noexec,relatime 0 0
tmpfs /dev/shm tmpfs rw,nosuid,nodev 0 0
tmpfs /run/lock tmpfs rw,nosuid,nodev,noexec,relatime,size=5120k 0 0
tmpfs /sys/fs/cgroup tmpfs ro,nosuid,nodev,noexec,mode=755 0 0
cgroup /sys/fs/cgroup/unified cgroup2 rw,nosuid,nodev,noexec,relatime,nsdelegate 0 0
cgroup /sys/fs/cgroup/systemd cgroup rw,nosuid,nodev,noexec,relatime,xattr,name=systemd 0 0
pstore /sys/fs/pstore pstore rw,nosuid,nodev,noexec,relatime 0 0
cgroup /sys/fs/cgroup/cpu,cpuacct cgroup rw,nosuid,nodev,noexec,relatime,cpu,cpuacct 0 0
cgroup /sys/fs/cgroup/net_cls,net_prio cgroup rw,nosuid,nodev,noexec,relatime,net_cls,net_prio 0 0
cgroup /sys/fs/cgroup/freezer cgroup rw,nosuid,nodev,noexec,relatime,freezer 0 0
cgroup /sys/fs/cgroup/memory cgroup rw,nosuid,nodev,noexec,relatime,memory 0 0
cgroup /sys/fs/cgroup/blkio cgroup rw,nosuid,nodev,noexec,relatime,blkio 0 0
cgroup /sys/fs/cgroup/rdma cgroup rw,nosuid,nodev,noexec,relatime,rdma 0 0
cgroup /sys/fs/cgroup/devices cgroup rw,nosuid,nodev,noexec,relatime,devices 0 0
cgroup /sys/fs/cgroup/perf_event cgroup rw,nosuid,nodev,noexec,relatime,perf_event 0 0
cgroup /sys/fs/cgroup/pids cgroup rw,nosuid,nodev,noexec,relatime,pids 0 0
cgroup /sys/fs/cgroup/cpuset cgroup rw,nosuid,nodev,noexec,relatime,cpuset 0 0
cgroup /sys/fs/cgroup/hugetlb cgroup rw,nosuid,nodev,noexec,relatime,hugetlb 0 0
systemd-1 /proc/sys/fs/binfmt_misc autofs rw,relatime,fd=26,pgrp=1,timeout=0,minproto=5,maxproto=5,direct,pipe_ino=13672 0 0
mqueue /dev/mqueue mqueue rw,relatime 0 0
hugetlbfs /dev/hugepages hugetlbfs rw,relatime,pagesize=2M 0 0
debugfs /sys/kernel/debug debugfs rw,relatime 0 0
sunrpc /run/rpc_pipefs rpc_pipefs rw,relatime 0 0
configfs /sys/kernel/config configfs rw,relatime 0 0
fusectl /sys/fs/fuse/connections fusectl rw,relatime 0 0
tmpfs /run/user/1000 tmpfs rw,nosuid,nodev,relatime,size=813324k,mode=700,uid=1000,gid=1000 0 0
gvfsd-fuse /run/user/1000/gvfs fuse.gvfsd-fuse rw,nosuid,nodev,relatime,user_id=1000,group_id=1000 0 0
pcloud /tmp/.mount_pcloud20i3NR fuse.pcloud ro,nosuid,nodev,relatime,user_id=1000,group_id=1000 0 0
/dev/fuse /run/user/1000/doc fuse rw,nosuid,nodev,relatime,user_id=1000,group_id=1000 0 0
pCloud.fs /home/matthew/pCloudDrive fuse rw,nosuid,nodev,relatime,user_id=1000,group_id=1000 0 0
/dev/sda6 /media/matthew/Fedora-home ext4 rw,nosuid,nodev,relatime,data=ordered 0 0
/dev/sdb1 /media/matthew/3TStorage ext4 rw,nosuid,nodev,relatime,data=ordered 0 0
/dev/sda12 /media/matthew/Debian8-home ext4 rw,nosuid,nodev,relatime,data=ordered 0 0
/dev/sda4 /media/matthew/Debian8-boot ext4 rw,nosuid,nodev,relatime,stripe=4,data=ordered 0 0
/dev/sdc1 /media/matthew/WD\040Elements\0402T fuseblk rw,nosuid,nodev,relatime,user_id=0,group_id=0,default_permissions,allow_other,blksize=4096 0 0
/dev/sda11 /media/matthew/Debian8-root ext4 rw,nosuid,nodev,relatime,data=ordered 0 0
/dev/sda2 /media/matthew/f5355bcf-2148-4e5c-85fd-c1cc380d9ed2 ext4 rw,nosuid,nodev,relatime,data=ordered 0 0
/dev/sda5 /media/matthew/1c69bcbb-dbe1-4d06-be92-5c2012e7f80e ext4 rw,nosuid,nodev,relatime,data=ordered 0 0
matthew@matthew-Desktop-Peppermint-9-NY550AA-ABA-p6240f ~ $ id
uid=1000(matthew) gid=1000(matthew) groups=1000(matthew),4(adm),24(cdrom),27(sudo),30(dip),46(plugdev),116(lpadmin),122(sambashare)
matthew@matthew-Desktop-Peppermint-9-NY550AA-ABA-p6240f ~ $
Title: Re: Peppermint 9 changes owner and permissions on exe program files
Post by: Matthew on September 26, 2018, 10:11:13 am
Any thoughts?
Title: Re: Peppermint 9 changes owner and permissions on exe program files
Post by: PCNetSpec on September 26, 2018, 04:03:10 pm
Looks like your USB sticks are being mounted as root.

Can you post the output (if any) from
Code: [Select]
dpkg -l | grep usbmount
[EDIT]

If you get any output from that command, purge usbmount (which is not a default package anyway) with
Code: [Select]
sudo apt-get remove --purge usbmount
now reboot, and test your USB stick.
Title: Re: Peppermint 9 changes owner and permissions on exe program files [SOLVED]
Post by: Matthew on September 27, 2018, 02:18:33 am
I did get some output, ran the remove command.  The stick now mounts with me as owner rather than owner as root.  Everything works as it should.

Thank you again!  :)

Code: [Select]
matthew@matthew-Desktop-Peppermint-9-NY550AA-ABA-p6240f ~ $ sudo apt-get remove --purge usbmount
[sudo] password for matthew:
Reading package lists... Done
Building dependency tree       
Reading state information... Done
The following packages were automatically installed and are no longer required:
  lockfile-progs pmount
Use 'sudo apt autoremove' to remove them.
The following packages will be REMOVED:
  usbmount*
0 upgraded, 0 newly installed, 1 to remove and 7 not upgraded.
After this operation, 82.9 kB disk space will be freed.
Do you want to continue? [Y/n] y
(Reading database ... 417221 files and directories currently installed.)
Removing usbmount (0.0.22) ...
(Reading database ... 417213 files and directories currently installed.)
Purging configuration files for usbmount (0.0.22) ...
matthew@matthew-Desktop-Peppermint-9-NY550AA-ABA-p6240f ~ $ dpkg -l | grep usbmount
matthew@matthew-Desktop-Peppermint-9-NY550AA-ABA-p6240f ~ $

Title: Re: Peppermint 9 changes owner and permissions on exe program files
Post by: PCNetSpec on September 27, 2018, 06:57:45 am
You're most welcome .. glad we got to the bottom of the problem :)

Feel free to remove those orphaned packages with
Code: [Select]
sudo apt-get remove --purge lockfile-progs pmount
if you'd like.



And if you require the automount feature back in Peppermint 9, follow these instructions
https://forum.peppermintos.com/index.php/topic,7102.0.html