Looks like cups is also affected: 2024-04-30T15:32:24.172187+01:00 ubu-o-8aa620b8b277 kernel: audit: type=1400 audit(1714487544.169:235): apparmor="DENIED" operation="sendmsg" class="file" profile="/usr/sbin/cupsd" name="/systemd/notify" pid=4835 comm="cupsd" requested_mask="w" denied_mask="w" fsuid=0 ouid=0
The sssd process, however, was "ALLOWED", hinting that the apparmor profile is in complain mode:
[Tue Apr 30 15:32:05 2024] audit: type=1400 audit(1714487525.544:225): apparmor="ALLOWED" operation="sendmsg" class="file" info="Failed name lookup - disconnected path" error=-13 profile="/usr/sbin/sssd" name="systemd/notify" pid=4822 comm="sssd" requested_mask="w" denied_mask="w" fsuid=0 ouid=0
Can you try disabling the apparmor profile for sssd? It would be a command like:
sudo aa-disable /usr/sbin/sssd
Looks like cups is also affected: 30T15:32: 24.172187+ 01:00 ubu-o-8aa620b8b277 kernel: audit: type=1400 audit(171448754 4.169:235) : apparmor="DENIED" operation="sendmsg" class="file" profile= "/usr/sbin/ cupsd" name="/ systemd/ notify" pid=4835 comm="cupsd" requested_mask="w" denied_mask="w" fsuid=0 ouid=0
2024-04-
The sssd process, however, was "ALLOWED", hinting that the apparmor profile is in complain mode:
[Tue Apr 30 15:32:05 2024] audit: type=1400 audit(171448752 5.544:225) : apparmor="ALLOWED" operation="sendmsg" class="file" info="Failed name lookup - disconnected path" error=-13 profile= "/usr/sbin/ sssd" name="systemd/ notify" pid=4822 comm="sssd" requested_mask="w" denied_mask="w" fsuid=0 ouid=0
Can you try disabling the apparmor profile for sssd? It would be a command like:
sudo aa-disable /usr/sbin/sssd