AppArmorGenSecurityLabel is called on qemudStartVMDaemon That calls load_profile And that does a check on the xml if it can be generated. xml = virDomainDefFormat(def, NULL, VIR_DOMAIN_DEF_FORMAT_SECURE); => is the backingStore missing as I assume? Also track the command that is executed in cmd = virCommandNewArgList(VIRT_AA_HELPER, "-p", probe, ... => any change in arguments? Before gdb'ing that down too much. Just place custom wrapper and dump args as well as stdin.
# disable AA for debugging # save orig $ mv /usr/lib/libvirt/virt-aa-helper /usr/lib/libvirt/virt-aa-helper.orig $ cat /usr/lib/libvirt/virt-aa-helper #!/bin/bash exec >> /tmp/virt-aa-helper.log exec 2>&1 echo "ARGS" echo $@ echo "STDIN" while read l do echo $l done 2.5 and 3.5 seem to have an empty backing store on the call. <disk type='file' device='disk'> <driver name='qemu' type='qcow2'/> <source file='/var/lib/uvtool/libvirt/images/kvmguest-artful-normal-z2.qcow'/> <backingStore/> <target dev='vda' bus='virtio'/> <address type='pci' domain='0x0000' bus='0x00' slot='0x03' function='0x0'/> </disk> so TL;DR: the raw xml content that is passed is the same. Need to debug the actual parsing if the object references differ e.g. in the in memory representation of "disks" when going into the loop that iterates into the subelements. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1704782 Title: qcow base image apparmor rule missing in artful To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/libvirt/+bug/1704782/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs