Some recent change breaks starting Whonix Workstation on Qubes - privleap suspected

Yes, AppArmor issue seems to be fixed. But systemcheck still fails.
There is still:

ERROR: You are unauthorized to run action 'tor-verify-config'.

and I see also:

Feb 16 05:16:42 host PAM_tmpdir[1874]: /tmp/user/1000 owned by uid 0 instead of uid 1000. Failed to create safe $TMPDIR

with some more context:

[2025-02-16 00:16:42] [   29.463894] qubes-gui[1229]: Waiting on /var/run/xf86-qubes-socket socket...
[2025-02-16 00:16:42] [   29.558826] loginctl[1872]: Could not attach device: Failed to open device '/sys/devices/platform/pcspkr/input/*': No such device
[2025-02-16 00:16:42] [   29.654982] qrexec-agent[1864]: pam_unix(qrexec:session): session opened for user user(uid=1000) by (uid=0)
[2025-02-16 00:16:42] [   29.655091] qrexec-agent[1864]: pam_succeed_if(qrexec:session): requirement "uid eq 0" not met by user "user"
[2025-02-16 00:16:42] [   29.655250] qubes-gui-runuser[1865]: pam_unix(qubes-gui-agent:session): session opened for user user(uid=1000) by (uid=0)
[2025-02-16 00:16:42] [   29.655299] qubes-gui-runuser[1865]: pam_succeed_if(qubes-gui-agent:session): requirement "uid eq 0" not met by user "user"
[2025-02-16 00:16:42] [   29.658632] PAM_tmpdir[1874]: /tmp/user/1000 owned by uid 0 instead of uid 1000. Failed to create safe $TMPDIR
[2025-02-16 00:16:42] [   29.736356] systemd[1]: Created slice system-leapctl.slice - Slice /system/leapctl.
[2025-02-16 00:16:42] [   29.737651] systemd[1]: Created slice user-1000.slice - User Slice of UID 1000.
[2025-02-16 00:16:42] [   29.738825] systemd[1]: Starting leapctl@1000.service - leapctl - Enable access to privleap for each user...
[2025-02-16 00:16:42] [   29.751323] systemd[1]: Starting user-runtime-dir@1000.service - User Runtime Directory /run/user/1000...
[2025-02-16 00:16:42] [   29.786415] systemd-logind[1032]: New session c2 of user user.

Log from recent run: https://openqa.qubes-os.org/tests/128885/file/suspend-whonixcheck-sys-whonix.log

2 Likes