getresuid([0], [0], [0]) = 0
open("/var/lib/snapd/seccomp/profiles//snap.hello.hello.bpf", O_RDONLY) = 3
read(3, " \0\0\0\4\0\0\0\25\0\1\0>\0\0\300\5\0\0\0e\1\0\0 \0\0\0\0\0\0\0"..., 32768) = 5784
close(3) = 0
prctl(PR_SET_NO_NEW_PRIVS, 1, 0, 0, 0) = 0
prctl(PR_SET_SECCOMP, SECCOMP_MODE_FILTER, {len = 723, filter = 0x7fff9f935a50}) = 0
geteuid() = 0
getuid() = 0
setresuid(-1, 0, -1) = 0
geteuid() = 0
setgid(0) = 0
setuid(0) = 0
execve("/usr/lib/snapd/snap-exec", ["/usr/lib/snapd/snap-exec", "hello"], [/* 66 vars */]) = -1 EPERM (Operation not permitted)
dup(2) = 3
fcntl(3, F_GETFL) = 0x8402 (flags O_RDWR|O_APPEND|O_LARGEFILE)
fstat(3, {st_mode=S_IFCHR|0600, st_rdev=makedev(136, 0), ...}) = 0
write(3, "execv failed: Operation not perm"..., 38execv failed: Operation not permitted
) = 38
close(3) = 0
exit_group(1) = ?
----
[ 3849.406130] ------------[ cut here ]------------
[ 3849.406137] WARNING: CPU: 0 PID: 29134 at /build/linux-0XAgc4/linux-4.4.0/security/apparmor/file.c:136 aa_audit_file+0x16e/0x180()
[ 3849.406139] AppArmor WARN aa_audit_file: ((!(&sa)->apparmor_audit_data->request)):
[ 3849.406140] Modules linked in:
[ 3849.406141] ppdev kvm_intel kvm irqbypass joydev input_leds serio_raw i2c_piix4 8250_fintek parport_pc parport mac_hid autofs4 btrfs xor raid6_pq psmouse e1000 pata_acpi floppy
[ 3849.406152] CPU: 0 PID: 29134 Comm: snap-confine Tainted: G W 4.4.0-78-generic #99-Ubuntu
[ 3849.406153] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.10.1-1ubuntu1 04/01/2014
[ 3849.406154] 0000000000000286 00000000a3126a30 ffff88005ae3b9d0 ffffffff813f8dd3
[ 3849.406156] ffff88005ae3ba18 ffffffff81cf8670 ffff88005ae3ba08 ffffffff81081302
[ 3849.406158] ffff880058461400 ffff88005ae3bb6c ffff880059ffab88 ffff88005ae3bd88
[ 3849.406160] Call Trace:
[ 3849.406163] [<ffffffff813f8dd3>] dump_stack+0x63/0x90
[ 3849.406167] [<ffffffff81081302>] warn_slowpath_common+0x82/0xc0
[ 3849.406168] [<ffffffff8108139c>] warn_slowpath_fmt+0x5c/0x80
[ 3849.406172] [<ffffffff81386cbc>] ? label_match.constprop.9+0x3dc/0x6c0
[ 3849.406174] [<ffffffff8139571e>] aa_audit_file+0x16e/0x180
[ 3849.406176] [<ffffffff813870dd>] profile_onexec+0x13d/0x3d0
[ 3849.406178] [<ffffffff8138913e>] handle_onexec+0x10e/0x10d0
[ 3849.406181] [<ffffffff81348e1b>] ? security_file_open+0x8b/0x90
[ 3849.406184] [<ffffffff81226554>] ? dput+0x34/0x220
[ 3849.406186] [<ffffffff812195e4>] ? terminate_walk+0x64/0xd0
[ 3849.406190] [<ffffffff811afbec>] ? zone_statistics+0x7c/0xa0
[ 3849.406192] [<ffffffff81197c14>] ? get_page_from_freelist+0x454/0xa50
[ 3849.406194] [<ffffffff8138a217>] apparmor_bprm_set_creds+0x117/0xa60
[ 3849.406196] [<ffffffff81198f69>] ? __alloc_pages_nodemask+0x159/0x2a0
[ 3849.406199] [<ffffffff812334ef>] ? mnt_may_suid+0x3f/0x50
[ 3849.406202] [<ffffffff813459b3>] ? cap_bprm_set_creds+0xa3/0x600
[ 3849.406203] [<ffffffff81347d03>] security_bprm_set_creds+0x33/0x50
[ 3849.406205] [<ffffffff812153e5>] prepare_binprm+0x85/0x190
[ 3849.406207] [<ffffffff81216c67>] do_execveat_common.isra.33+0x497/0x740
[ 3849.406209] [<ffffffff8121716a>] SyS_execve+0x3a/0x50
[ 3849.406212] [<ffffffff81840cd5>] stub_execve+0x5/0x5
[ 3849.406214] [<ffffffff81840b66>] ? tracesys_phase2+0x88/0x8d
[ 3849.406215] ---[ end trace daaa44b46dfdd221 ]---