Yes, AppArmor issue seems to be fixed. But systemcheck still fails.
There is still:
ERROR: You are unauthorized to run action 'tor-verify-config'.
and I see also:
Feb 16 05:16:42 host PAM_tmpdir[1874]: /tmp/user/1000 owned by uid 0 instead of uid 1000. Failed to create safe $TMPDIR
with some more context:
[2025-02-16 00:16:42] [ 29.463894] qubes-gui[1229]: Waiting on /var/run/xf86-qubes-socket socket...
[2025-02-16 00:16:42] [ 29.558826] loginctl[1872]: Could not attach device: Failed to open device '/sys/devices/platform/pcspkr/input/*': No such device
[2025-02-16 00:16:42] [ 29.654982] qrexec-agent[1864]: pam_unix(qrexec:session): session opened for user user(uid=1000) by (uid=0)
[2025-02-16 00:16:42] [ 29.655091] qrexec-agent[1864]: pam_succeed_if(qrexec:session): requirement "uid eq 0" not met by user "user"
[2025-02-16 00:16:42] [ 29.655250] qubes-gui-runuser[1865]: pam_unix(qubes-gui-agent:session): session opened for user user(uid=1000) by (uid=0)
[2025-02-16 00:16:42] [ 29.655299] qubes-gui-runuser[1865]: pam_succeed_if(qubes-gui-agent:session): requirement "uid eq 0" not met by user "user"
[2025-02-16 00:16:42] [ 29.658632] PAM_tmpdir[1874]: /tmp/user/1000 owned by uid 0 instead of uid 1000. Failed to create safe $TMPDIR
[2025-02-16 00:16:42] [ 29.736356] systemd[1]: Created slice system-leapctl.slice - Slice /system/leapctl.
[2025-02-16 00:16:42] [ 29.737651] systemd[1]: Created slice user-1000.slice - User Slice of UID 1000.
[2025-02-16 00:16:42] [ 29.738825] systemd[1]: Starting leapctl@1000.service - leapctl - Enable access to privleap for each user...
[2025-02-16 00:16:42] [ 29.751323] systemd[1]: Starting user-runtime-dir@1000.service - User Runtime Directory /run/user/1000...
[2025-02-16 00:16:42] [ 29.786415] systemd-logind[1032]: New session c2 of user user.
Log from recent run: https://openqa.qubes-os.org/tests/128885/file/suspend-whonixcheck-sys-whonix.log