AppArmorGenSecurityLabel is called on qemudStartVMDaemon
That calls load_profile
And that does a check on the xml if it can be generated.
  xml = virDomainDefFormat(def, NULL, VIR_DOMAIN_DEF_FORMAT_SECURE);
  => is the backingStore missing as I assume?
Also track the command that is executed in
  cmd = virCommandNewArgList(VIRT_AA_HELPER, "-p", probe, ...
  => any change in arguments?
  
Before gdb'ing that down too much.
Just place custom wrapper and dump args as well as stdin.

# disable AA for debugging
# save orig
$ mv /usr/lib/libvirt/virt-aa-helper /usr/lib/libvirt/virt-aa-helper.orig
$ cat /usr/lib/libvirt/virt-aa-helper
#!/bin/bash
exec >> /tmp/virt-aa-helper.log
exec 2>&1

echo "ARGS"
echo $@

echo "STDIN"
while read l
do
  echo $l
done

2.5 and 3.5 seem to have an empty backing store on the call.
<disk type='file' device='disk'>
<driver name='qemu' type='qcow2'/>
<source file='/var/lib/uvtool/libvirt/images/kvmguest-artful-normal-z2.qcow'/>
<backingStore/>
<target dev='vda' bus='virtio'/>
<address type='pci' domain='0x0000' bus='0x00' slot='0x03' function='0x0'/>
</disk>

so TL;DR: the raw xml content that is passed is the same.
Need to debug the actual parsing if the object references differ e.g. in the in 
memory representation of "disks" when going into the loop that iterates into 
the subelements.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1704782

Title:
  qcow base image apparmor rule missing in artful

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/libvirt/+bug/1704782/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to