Linux plex desktop snap fails to launch

It was working OK, presume the snap updated and now it just fails to launch:

fred@HP-Laptop:~$ plex-desktop 
[29506:29506:1201/211341.389873:FATAL:credentials.cc(123)] Check failed: . : Permission denied (13)
Trace/breakpoint trap (core dumped)

tried via sudo also, still fails

Name          Version  Rev  Tracking       Publisher  Notes
plex-desktop  1.105.1  79   latest/stable  plexinc✓   -

Seeing the same thing here. Ubuntu 22.04.5.

This is still the case on Ubuntu 24.04. I see the same error that was reported above.

I’ve tried removing and re-installing the snap.

My snap version, however, is 1.106.0 Rev 81.

The following is a work-around:

$ plex-desktop --no-sandbox

1 Like

I just started having the same problem this afternoon. Ubuntu 24.04 LTS. I get the same output. It had worked previously.

I’m in the same boat. It appears that plex-desktop is unable to access my home directory and therefore the --no-sandbox does work around the issue, but this is crazy. I shouldn’t have to run it this way. I despise snaps as it is, but plex should be allowing more interaction with the desktop than this.

I wanted to add though that my directory is within the /home directory structure. This is what i am seeing utilizing a trace function.

strace -z -tt -e trace=open,openat -f plex-desktop
10:59:46.969995 openat(AT_FDCWD, “/etc/ld.so.cache”, O_RDONLY|O_CLOEXEC) = 3
10:59:46.970762 openat(AT_FDCWD, “/lib/x86_64-linux-gnu/libc.so.6”, O_RDONLY|O_CLOEXEC) = 3
10:59:46.975736 openat(AT_FDCWD, “/proc/self/maps”, O_RDONLY|O_CLOEXEC) = 3
10:59:46.977184 openat(AT_FDCWD, “/sys/kernel/mm/transparent_hugepage/hpage_pmd_size”, O_RDONLY) = 3
strace: Process 14534 attached
strace: Process 14535 attached
strace: Process 14536 attached
strace: Process 14537 attached
strace: Process 14538 attached
[pid 14533] 10:59:46.990514 openat(AT_FDCWD, “/etc/os-release”, O_RDONLY|O_CLOEXEC) = 3
[pid 14533] 10:59:46.996576 openat(AT_FDCWD, “/proc/cgroups”, O_RDONLY|O_CLOEXEC) = 7
[pid 14533] 10:59:47.000150 — SIGURG {si_signo=SIGURG, si_code=SI_TKILL, si_pid=14533, si_uid=1000} —
[pid 14533] 10:59:47.001795 openat(AT_FDCWD, “/proc/cmdline”, O_RDONLY|O_CLOEXEC) = 7
[pid 14533] 10:59:47.002056 openat(AT_FDCWD, “/snap/snapd/current/usr/lib/snapd/info”, O_RDONLY|O_CLOEXEC) = 7
[pid 14538] 10:59:47.002436 +++ exited with 0 +++
[pid 14537] 10:59:47.002446 +++ exited with 0 +++
[pid 14536] 10:59:47.002453 +++ exited with 0 +++
[pid 14535] 10:59:47.002459 +++ exited with 0 +++
[pid 14534] 10:59:47.002466 +++ exited with 0 +++
10:59:47.004238 openat(AT_FDCWD, “/snap/snapd/current/usr/lib/x86_64-linux-gnu/libc.so.6”, O_RDONLY|O_CLOEXEC) = 3
10:59:47.007005 openat(AT_FDCWD, “/sys/kernel/mm/transparent_hugepage/hpage_pmd_size”, O_RDONLY) = 3
strace: Process 14539 attached
strace: Process 14540 attached
strace: Process 14541 attached
strace: Process 14542 attached
strace: Process 14543 attached
[pid 14533] 10:59:47.013306 openat(AT_FDCWD, “/etc/os-release”, O_RDONLY|O_CLOEXEC) = 3
[pid 14533] 10:59:47.014696 openat(AT_FDCWD, “/usr/lib/snapd/info”, O_RDONLY|O_CLOEXEC) = 7
strace: Process 14544 attached
strace: Process 14545 attached
[pid 14533] 10:59:47.018459 openat(AT_FDCWD, “/sys/fs/cgroup/cgroup.controllers”, O_RDONLY|O_CLOEXEC) = 7
[pid 14533] 10:59:47.019849 openat(AT_FDCWD, “/proc/cmdline”, O_RDONLY|O_CLOEXEC) = 7
[pid 14533] 10:59:47.020363 openat(AT_FDCWD, “/snap/snapd/23545/usr/lib/snapd/snapd”, O_RDONLY|O_CLOEXEC) = 7
[pid 14533] 10:59:47.021052 openat(AT_FDCWD, “/snap/snapd/23545/usr/lib/snapd/snapd”, O_RDONLY|O_CLOEXEC) = 7
[pid 14533] 10:59:47.021618 openat(AT_FDCWD, “/sys/kernel/security/apparmor/features”, O_RDONLY|O_CLOEXEC) = 7
[pid 14533] 10:59:47.021741 openat(AT_FDCWD, “/sys/kernel/security/apparmor/features/caps”, O_RDONLY|O_CLOEXEC) = 7
[pid 14533] 10:59:47.021812 openat(AT_FDCWD, “/sys/kernel/security/apparmor/features/dbus”, O_RDONLY|O_CLOEXEC) = 7
[pid 14533] 10:59:47.021874 openat(AT_FDCWD, “/sys/kernel/security/apparmor/features/domain”, O_RDONLY|O_CLOEXEC) = 7
[pid 14533] 10:59:47.021947 openat(AT_FDCWD, “/sys/kernel/security/apparmor/features/domain/attach_conditions”, O_RDONLY|O_CLOEXEC) = 7
[pid 14533] 10:59:47.022012 openat(AT_FDCWD, “/sys/kernel/security/apparmor/features/file”, O_RDONLY|O_CLOEXEC) = 7
[pid 14533] 10:59:47.022074 openat(AT_FDCWD, “/sys/kernel/security/apparmor/features/io_uring”, O_RDONLY|O_CLOEXEC) = 7
[pid 14533] 10:59:47.022180 openat(AT_FDCWD, “/sys/kernel/security/apparmor/features/ipc”, O_RDONLY|O_CLOEXEC) = 7
[pid 14533] 10:59:47.022248 openat(AT_FDCWD, “/sys/kernel/security/apparmor/features/mount”, O_RDONLY|O_CLOEXEC) = 7
[pid 14533] 10:59:47.022316 openat(AT_FDCWD, “/sys/kernel/security/apparmor/features/namespaces”, O_RDONLY|O_CLOEXEC) = 7
[pid 14533] 10:59:47.022379 openat(AT_FDCWD, “/sys/kernel/security/apparmor/features/network”, O_RDONLY|O_CLOEXEC) = 7
[pid 14533] 10:59:47.022441 openat(AT_FDCWD, “/sys/kernel/security/apparmor/features/network_v8”, O_RDONLY|O_CLOEXEC) = 7
[pid 14533] 10:59:47.022503 openat(AT_FDCWD, “/sys/kernel/security/apparmor/features/policy”, O_RDONLY|O_CLOEXEC) = 7
[pid 14533] 10:59:47.022567 openat(AT_FDCWD, “/sys/kernel/security/apparmor/features/policy/unconfined_restrictions”, O_RDONLY|O_CLOEXEC) = 7
[pid 14533] 10:59:47.022635 openat(AT_FDCWD, “/sys/kernel/security/apparmor/features/policy/versions”, O_RDONLY|O_CLOEXEC) = 7
[pid 14533] 10:59:47.022699 openat(AT_FDCWD, “/sys/kernel/security/apparmor/features/ptrace”, O_RDONLY|O_CLOEXEC) = 7
[pid 14533] 10:59:47.022761 openat(AT_FDCWD, “/sys/kernel/security/apparmor/features/query”, O_RDONLY|O_CLOEXEC) = 7
[pid 14533] 10:59:47.022824 openat(AT_FDCWD, “/sys/kernel/security/apparmor/features/query/label”, O_RDONLY|O_CLOEXEC) = 7
[pid 14533] 10:59:47.022890 openat(AT_FDCWD, “/sys/kernel/security/apparmor/features/rlimit”, O_RDONLY|O_CLOEXEC) = 7
[pid 14533] 10:59:47.022955 openat(AT_FDCWD, “/sys/kernel/security/apparmor/features/signal”, O_RDONLY|O_CLOEXEC) = 7
[pid 14533] 10:59:47.023017 openat(AT_FDCWD, “/sys/kernel/security/apparmor/features/policy/permstable32”, O_RDONLY|O_CLOEXEC) = 7
[pid 14533] 10:59:47.023152 openat(AT_FDCWD, “/usr/lib/snapd/info”, O_RDONLY|O_CLOEXEC) = 7
[pid 14533] 10:59:47.023273 openat(AT_FDCWD, “/proc/self/mountinfo”, O_RDONLY|O_CLOEXEC) = 7
[pid 14533] 10:59:47.023717 openat(AT_FDCWD, “/etc/fstab”, O_RDONLY|O_CLOEXEC) = 7
[pid 14533] 10:59:47.023791 openat(AT_FDCWD, “/proc/self/mountinfo”, O_RDONLY|O_CLOEXEC) = 7
[pid 14533] 10:59:47.024974 — SIGURG {si_signo=SIGURG, si_code=SI_TKILL, si_pid=14533, si_uid=1000} —
[pid 14541] 10:59:47.024987 — SIGURG {si_signo=SIGURG, si_code=SI_TKILL, si_pid=14533, si_uid=1000} —
[pid 14542] 10:59:47.025068 — SIGURG {si_signo=SIGURG, si_code=SI_TKILL, si_pid=14533, si_uid=1000} —
[pid 14533] 10:59:47.025099 — SIGURG {si_signo=SIGURG, si_code=SI_TKILL, si_pid=14533, si_uid=1000} —
[pid 14545] 10:59:47.025225 — SIGURG {si_signo=SIGURG, si_code=SI_TKILL, si_pid=14533, si_uid=1000} —
strace: Process 14546 attached
[pid 14542] 10:59:47.025257 — SIGURG {si_signo=SIGURG, si_code=SI_TKILL, si_pid=14533, si_uid=1000} —
[pid 14541] 10:59:47.025270 — SIGURG {si_signo=SIGURG, si_code=SI_TKILL, si_pid=14533, si_uid=1000} —
[pid 14533] 10:59:47.025317 — SIGURG {si_signo=SIGURG, si_code=SI_TKILL, si_pid=14533, si_uid=1000} —
[pid 14544] 10:59:47.025356 — SIGURG {si_signo=SIGURG, si_code=SI_TKILL, si_pid=14533, si_uid=1000} —
[pid 14542] 10:59:47.025420 — SIGURG {si_signo=SIGURG, si_code=SI_TKILL, si_pid=14533, si_uid=1000} —
[pid 14541] 10:59:47.025429 — SIGURG {si_signo=SIGURG, si_code=SI_TKILL, si_pid=14533, si_uid=1000} —
[pid 14540] 10:59:47.025467 — SIGURG {si_signo=SIGURG, si_code=SI_TKILL, si_pid=14533, si_uid=1000} —
[pid 14542] 10:59:47.025526 — SIGURG {si_signo=SIGURG, si_code=SI_TKILL, si_pid=14533, si_uid=1000} —
[pid 14544] 10:59:47.025536 — SIGURG {si_signo=SIGURG, si_code=SI_TKILL, si_pid=14533, si_uid=1000} —
[pid 14533] 10:59:47.025548 — SIGURG {si_signo=SIGURG, si_code=SI_TKILL, si_pid=14533, si_uid=1000} —
[pid 14542] 10:59:47.025659 — SIGURG {si_signo=SIGURG, si_code=SI_TKILL, si_pid=14533, si_uid=1000} —
[pid 14541] 10:59:47.025692 — SIGURG {si_signo=SIGURG, si_code=SI_TKILL, si_pid=14533, si_uid=1000} —
[pid 14540] 10:59:47.025702 — SIGURG {si_signo=SIGURG, si_code=SI_TKILL, si_pid=14533, si_uid=1000} —
strace: Process 14547 attached
[pid 14533] 10:59:47.025992 openat(AT_FDCWD, “/proc/sys/kernel/seccomp/actions_avail”, O_RDONLY|O_CLOEXEC) = 7
[pid 14533] 10:59:47.026193 — SIGURG {si_signo=SIGURG, si_code=SI_TKILL, si_pid=14533, si_uid=1000} —
[pid 14533] 10:59:47.026241 openat(AT_FDCWD, “/dev/null”, O_RDONLY|O_CLOEXEC) = 7
[pid 14533] 10:59:47.026324 — SIGURG {si_signo=SIGURG, si_code=SI_TKILL, si_pid=14533, si_uid=1000} —
[pid 14533] 10:59:47.026476 — SIGURG {si_signo=SIGURG, si_code=SI_TKILL, si_pid=14533, si_uid=1000} —
strace: Process 14548 attached
[pid 14548] 10:59:47.030313 openat(AT_FDCWD, “/snap/snapd/current/usr/lib/x86_64-linux-gnu/libseccomp.so.2”, O_RDONLY|O_CLOEXEC) = 3
[pid 14548] 10:59:47.030654 openat(AT_FDCWD, “/snap/snapd/current/usr/lib/x86_64-linux-gnu/libc.so.6”, O_RDONLY|O_CLOEXEC) = 3
[pid 14548] 10:59:47.032128 openat(AT_FDCWD, “/sys/kernel/mm/transparent_hugepage/hpage_pmd_size”, O_RDONLY) = 3
strace: Process 14549 attached
strace: Process 14550 attached
strace: Process 14551 attached
strace: Process 14552 attached
[pid 14551] 10:59:47.037286 — SIGURG {si_signo=SIGURG, si_code=SI_TKILL, si_pid=14548, si_uid=1000} —
strace: Process 14553 attached
[pid 14548] 10:59:47.038850 openat(AT_FDCWD, “/snap/snapd/23545/usr/lib/snapd/snap-seccomp”, O_RDONLY|O_CLOEXEC) = 3
[pid 14552] 10:59:47.041216 +++ exited with 0 +++
[pid 14551] 10:59:47.041232 +++ exited with 0 +++
[pid 14550] 10:59:47.041242 +++ exited with 0 +++
[pid 14549] 10:59:47.041251 +++ exited with 0 +++
[pid 14553] 10:59:47.041693 +++ exited with 0 +++
[pid 14548] 10:59:47.041702 +++ exited with 0 +++
[pid 14541] 10:59:47.041731 — SIGCHLD {si_signo=SIGCHLD, si_code=CLD_EXITED, si_pid=14548, si_uid=1000, si_status=0, si_utime=0, si_stime=0} —
[pid 14547] 10:59:47.041996 openat(AT_FDCWD, “/var/lib/snapd/system-key”, O_RDONLY|O_CLOEXEC) = 3
[pid 14547] 10:59:47.042431 openat(AT_FDCWD, “/sys/kernel/security/apparmor/features/policy/permstable32_version”, O_RDONLY|O_CLOEXEC) = 3
[pid 14547] 10:59:47.042716 openat(AT_FDCWD, “/var/lib/snapd/inhibit/plex-desktop.lock”, O_RDONLY|O_NOFOLLOW|O_CLOEXEC) = 3
[pid 14547] 10:59:47.042913 openat(AT_FDCWD, “/snap/plex-desktop/81/meta/snap.yaml”, O_RDONLY|O_CLOEXEC) = 7
[pid 14547] 10:59:47.043630 openat(AT_FDCWD, “/snap/plex-desktop/81/meta/hooks”, O_RDONLY|O_CLOEXEC) = 7
[pid 14547] 10:59:47.043935 openat(AT_FDCWD, “/var/lib/snapd/sequence/plex-desktop.json”, O_RDONLY|O_CLOEXEC) = 7
[pid 14547] 10:59:47.044442 openat(AT_FDCWD, “/dev/null”, O_RDONLY|O_CLOEXEC) = 7
strace: Process 14554 attached
[pid 14554] 10:59:47.047501 openat(AT_FDCWD, “/etc/ld.so.cache”, O_RDONLY|O_CLOEXEC) = 3
[pid 14554] 10:59:47.047741 openat(AT_FDCWD, “/lib/x86_64-linux-gnu/libc.so.6”, O_RDONLY|O_CLOEXEC) = 3
[pid 14554] 10:59:47.048775 openat(AT_FDCWD, “/usr/lib/locale/locale-archive”, O_RDONLY|O_CLOEXEC) = 3
[pid 14554] 10:59:47.049344 openat(AT_FDCWD, “/etc/nsswitch.conf”, O_RDONLY|O_CLOEXEC) = 3
[pid 14554] 10:59:47.049569 openat(AT_FDCWD, “/etc/passwd”, O_RDONLY|O_CLOEXEC) = 3
[pid 14554] 10:59:47.049970 +++ exited with 0 +++
[pid 14547] 10:59:47.050004 — SIGCHLD {si_signo=SIGCHLD, si_code=CLD_EXITED, si_pid=14554, si_uid=1000, si_status=0, si_utime=0, si_stime=0} —
[pid 14533] 10:59:47.050360 openat(AT_FDCWD, “/proc/self/mountinfo”, O_RDONLY|O_CLOEXEC) = 7
[pid 14533] 10:59:47.051383 openat(AT_FDCWD, “/dev/null”, O_RDONLY|O_CLOEXEC) = 7
strace: Process 14555 attached
[pid 14555] 10:59:47.053759 openat(AT_FDCWD, “/etc/ld.so.cache”, O_RDONLY|O_CLOEXEC) = 3
[pid 14555] 10:59:47.053905 openat(AT_FDCWD, “/lib/x86_64-linux-gnu/libc.so.6”, O_RDONLY|O_CLOEXEC) = 3
[pid 14555] 10:59:47.054749 openat(AT_FDCWD, “/usr/lib/locale/locale-archive”, O_RDONLY|O_CLOEXEC) = 3
[pid 14555] 10:59:47.055142 openat(AT_FDCWD, “/etc/nsswitch.conf”, O_RDONLY|O_CLOEXEC) = 3
[pid 14555] 10:59:47.055322 openat(AT_FDCWD, “/etc/passwd”, O_RDONLY|O_CLOEXEC) = 3
[pid 14555] 10:59:47.055642 +++ exited with 0 +++
[pid 14547] 10:59:47.055671 — SIGCHLD {si_signo=SIGCHLD, si_code=CLD_EXITED, si_pid=14555, si_uid=1000, si_status=0, si_utime=0, si_stime=0} —
[pid 14533] 10:59:47.056069 openat(AT_FDCWD, “/run/user/1000/gdm/Xauthority”, O_RDONLY|O_CLOEXEC) = 7
[pid 14533] 10:59:47.056677 openat(AT_FDCWD, “/dev/null”, O_RDONLY|O_CLOEXEC) = 7
strace: Process 14556 attached
[pid 14556] 10:59:47.060385 openat(AT_FDCWD, “/etc/ld.so.cache”, O_RDONLY|O_CLOEXEC) = 3
[pid 14556] 10:59:47.060689 openat(AT_FDCWD, “/lib/x86_64-linux-gnu/libc.so.6”, O_RDONLY|O_CLOEXEC) = 3
[pid 14556] 10:59:47.061695 openat(AT_FDCWD, “/usr/lib/locale/locale-archive”, O_RDONLY|O_CLOEXEC) = 3
[pid 14556] 10:59:47.062175 openat(AT_FDCWD, “/etc/nsswitch.conf”, O_RDONLY|O_CLOEXEC) = 3
[pid 14556] 10:59:47.062390 openat(AT_FDCWD, “/etc/passwd”, O_RDONLY|O_CLOEXEC) = 3
[pid 14556] 10:59:47.062759 +++ exited with 0 +++
[pid 14547] 10:59:47.062792 — SIGCHLD {si_signo=SIGCHLD, si_code=CLD_EXITED, si_pid=14556, si_uid=1000, si_status=0, si_utime=0, si_stime=0} —
[pid 14547] 10:59:47.063065 openat(AT_FDCWD, “/proc/self/mountinfo”, O_RDONLY|O_CLOEXEC) = 7
[pid 14547] 10:59:47.064266 openat(AT_FDCWD, “/dev/null”, O_RDONLY|O_CLOEXEC) = 7
strace: Process 14557 attached
[pid 14557] 10:59:47.066157 openat(AT_FDCWD, “/etc/ld.so.cache”, O_RDONLY|O_CLOEXEC) = 3
[pid 14557] 10:59:47.066274 openat(AT_FDCWD, “/lib/x86_64-linux-gnu/libc.so.6”, O_RDONLY|O_CLOEXEC) = 3
[pid 14557] 10:59:47.066925 openat(AT_FDCWD, “/usr/lib/locale/locale-archive”, O_RDONLY|O_CLOEXEC) = 3
[pid 14557] 10:59:47.067250 openat(AT_FDCWD, “/etc/nsswitch.conf”, O_RDONLY|O_CLOEXEC) = 3
[pid 14557] 10:59:47.067397 openat(AT_FDCWD, “/etc/passwd”, O_RDONLY|O_CLOEXEC) = 3
[pid 14557] 10:59:47.067704 +++ exited with 0 +++
[pid 14533] 10:59:47.067717 — SIGCHLD {si_signo=SIGCHLD, si_code=CLD_EXITED, si_pid=14557, si_uid=1000, si_status=0, si_utime=0, si_stime=0} —
[pid 14533] 10:59:47.067936 openat(AT_FDCWD, “/proc/14533/cgroup”, O_RDONLY|O_CLOEXEC) = 7
[pid 14541] 10:59:47.068897 openat(AT_FDCWD, “/proc/sys/kernel/random/uuid”, O_RDONLY|O_CLOEXEC) = 8
[pid 14541] 10:59:47.098616 openat(AT_FDCWD, “/proc/14533/cgroup”, O_RDONLY|O_CLOEXEC) = 8
[pid 14547] 10:59:47.098994 +++ exited with 0 +++
[pid 14545] 10:59:47.099001 +++ exited with 0 +++
[pid 14539] 10:59:47.099007 +++ exited with 0 +++
[pid 14546] 10:59:47.099105 +++ exited with 0 +++
[pid 14544] 10:59:47.099109 +++ exited with 0 +++
[pid 14543] 10:59:47.099112 +++ exited with 0 +++
[pid 14542] 10:59:47.099114 +++ exited with 0 +++
[pid 14540] 10:59:47.099117 +++ exited with 0 +++
10:59:47.099779 +++ superseded by execve in pid 14541 +++
cannot fstatat canonical snap directory: Permission denied

further updates, this issue definitely seems to come with the latest 1.106.0 rev 81 release as it is affecting both Ubuntu and Mint distributions and didn’t present until the snaps updated today. I hope plex can chime in on this as I’d like to know if we’ll be utilizing the --no-sandbox workaround from here forward. Additionally, the current plex-desktop/snap configuration causing this issue seems to affect most systems as the Linux Mint install and the other Ubuntu 24.04 install are as clean as can be, as one is completely fresh and the other was a clean/generic install from just a couple months ago. I will say that timing may be an issue as it might be tightening of security at the plex-desktop level, but it could also be due to snapd or even apparmor being updated. I did try to revert to 1.105.2, but the problem still persisted. Maybe a config change that was implemented at the time of 1.106 install. Again, I hope to hear what plex support replies with.

Same here. Ubuntu 24.04.1, Wayland, nvidia driver 565.77, snap plex-desktop app version 1.106.0.
Note: Uninstalled snap version and installed flatpak version and everything is working fine.

I’m not a fan of snap or flatpak and with Ubuntu, it’s almost impossible to get rid of snap. On the Mint machine it might be a viable option as I would prefer to have one or the other if not neither. That all being said, what benefits do you feel flatpak provides that snap does not?

Same here. Ubuntu 24.04, plex-desktop snap version 1.106.0

I have the same problem.

Same problem her on Ubuntu 24.04.01 and stuck somewhat with snap packages. Annoying.

Mr.Plex77, why are you stuck on snap?

Mainlt because I do not want to go through a whole setup process for another OS / de-snappifying my current setup.

Mr.Plex77, flatpak coexists perfectly fine with snap. I don’t like the extra overhead, but I will say that the flatpak, other than some minor gui issues (mouse pointer switching directions when in the app), seems to actually be performing better for plex. It does add an extra level of maintenance as, unlike snap, you have to refresh periodically, However, you do not have to de-snap your OS. On my Mint setup, I did remove snap in favor of flatpak, but on my two ubuntu based OS, it resides in parallel. It’s a simple install and I would highly recommend you consider it. The problem we are experiencing here seems to be snap/apparmour based and is a security issue. As flatpak is all about bundling the application with less concern about security, this type of issue doesn’t seem like it would become an issue under flatpak near as readily.

1 Like

Can confirm, same issue with my setup - plex-desktop 1.106.0 (snap) and Ubuntu 24.04.1 LTS. Plex desktop will launch with the “no-sandbox” option: snap run plex-desktop --no-sandbox

I just went the Flatpak route, works fine for Plex like this. Thanks for the explanation!

For full disclosure, I am noticing higher cpu usage with the flatpak than the snap. Particularly with 4K video. I have one system with both loaded and am switching between the two to discern differences in functionality and resource utilization.

You’re welcome! I did the same, installed Flatpak. Seems to work without issues.

I haven’t tried 4K video, but I haven’t noticed a massive difference streaming music from my local Plex Server, between the Snap and Flatpak versions. Maybe Flatpak is a little higher on resources, but nothing that would be a deal breaker for me. But I haven’t really dug into this, only glanced at it after reading your comment.

Would plex please respond?

1 Like