Tor service crashes on Debian sid when seccomp enabled in torrc

I'm having issues with setting "Sandbox 1" in torrc on Debian sid. When I do, the process crashes and restarts indefinitely.

I see two suspect log entries, one from my auditd log, one from tor log.

First auditd:

type=SERVICE_START msg=audit(): pid=1 uid=0 auid= ses=____ msg='unit=tor@default comm="systemd" exe="/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed'

And here is a suspect tor log entry: (Sandbox) Caught a bad syscall attempt (syscall getsockopt)

Not entirely sure what is causing the issue. I also have apparmor enabled and enforced with the default system_tor profile, but I'm not seeing any denials being logged, so I'm assuming apparmor is not at fault.

The process restarts rapidly when this happens -- it exits and starts over and over. When I do one "ps aux | grep tor" to find the pid, then "pgrep tor" to confirm, and expect to look in /proc/(pid) to confirm sandboxing is enabled... the pid has already changed.