I'm running LTS kernels.
Last few kernel updates I've had to fix snap packages, i.e. failing to load, even though updates rebuilt kernels, I had to manually rebuild.
sudo mkinitcpio -P sometimes fixed things, assuming apparmor=1 security=apparmor is a part of the CMDLINE.
Today again it failed once more, complained about: snap-confine has elevated permissions and is not confined but should be. Refusing to continue to avoid permission escalation attacks xyz.app[4244]: Please make sure that the snapd.apparmor service is enabled and started.
The following fixed it: sudo apparmor_parser -r /etc/apparmor.d/snap-confine sudo apparmor_parser -r /var/lib/snapd/apparmor/profiles/snap-confine*
Pinned Comments
bboozzoo commented on 2018-10-25 11:56 (UTC) (edited on 2025-07-10 11:42 (UTC) by bboozzoo)
Package update notes
2.36
2.36 is the first release with AppArmor enabled by default on Arch.
If you do not have AppArmor enabled at boot there should be no functional changes visible.
If you wish to use snaps with Apparmor, first make sure that Apparmor is enabled during boot, see https://wiki.archlinux.org/index.php/AppArmor for details. After upgrading the package, you need to do the following steps:
systemctl restart apparmor.servicesnapd:systemctl restart snapd.servicesystemctl enable --now snapd.apparmor.service2.62
Since 2.62 snapd generated additional files describing the sandbox. The snapd service needs to be restarted after the update for snaps to continue working (unless the system is rebooted after the update, in which case no additional steps are needed). To restart, run
systemctl restart snapd.service2.70
Snapd 2.70 drops setuid permissions on /usr/lib/snapd/snap-confine in favor of explicit file capabilities. After an upgrade to 2.70, the users are prompted to restart the
apparmor.serviceotherwise attempts to run snaps will error withcannot set capabilitiesmessage.