From nobody Tue Feb 10 02:27:50 2026 Delivered-To: importer@patchew.org Received-SPF: pass (zohomail.com: domain of redhat.com designates 207.211.31.120 as permitted sender) client-ip=207.211.31.120; envelope-from=libvir-list-bounces@redhat.com; helo=us-smtp-1.mimecast.com; Authentication-Results: mx.zohomail.com; spf=pass (zohomail.com: domain of redhat.com designates 207.211.31.120 as permitted sender) smtp.mailfrom=libvir-list-bounces@redhat.com; dmarc=fail(p=none dis=none) header.from=canonical.com ARC-Seal: i=1; a=rsa-sha256; t=1596555214; cv=none; d=zohomail.com; s=zohoarc; b=SvJXQHr0p7FK2MFYhppFlYIa30v4b+Pi6ETYcWmjOHFmpGX5dc5hRVTaGbq3kgpRIdFY05KxlYtl4cLa5b9ymIC4OBcD+xHFCqf0FDSTu/B2J/x+VqLnH3BXFag2PE5z7+YpTwZYVxi2AuauquELuqHhnUzY9GBcAgHIK4HVpYE= ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=zohomail.com; s=zohoarc; t=1596555214; h=Content-Type:Content-Transfer-Encoding:Cc:Date:From:In-Reply-To:List-Subscribe:List-Post:List-Id:List-Archive:List-Help:List-Unsubscribe:MIME-Version:Message-ID:References:Sender:Subject:To; bh=6sf6nxGgI2wVxgwXmAK/EyvlbjAtxJL1UdpNgN+m0gM=; b=aOceSg1xnf8J2083WsmPUXrSET1uQ7fAbl12CLKNVPMl4BQ+dWgFDzvyDVnHlnaydafNyKHZdqVgIPi6PsHUHU60dcUf0hd6Kw0ekqRjnW/fBIrtcGm91v5rIByh07a7wgkBfOejtKfsPSDebDfrkKYd8JuK7mgJdnTtcZZ8qoM= ARC-Authentication-Results: i=1; mx.zohomail.com; spf=pass (zohomail.com: domain of redhat.com designates 207.211.31.120 as permitted sender) smtp.mailfrom=libvir-list-bounces@redhat.com; dmarc=fail header.from= (p=none dis=none) header.from= Return-Path: Received: from us-smtp-1.mimecast.com (us-smtp-delivery-1.mimecast.com [207.211.31.120]) by mx.zohomail.com with SMTPS id 1596555214379653.8860817145295; Tue, 4 Aug 2020 08:33:34 -0700 (PDT) Received: from mimecast-mx01.redhat.com (mimecast-mx01.redhat.com [209.132.183.4]) (Using TLS) by relay.mimecast.com with ESMTP id us-mta-143-ZUoqyv3kPQCTrYRXTT18dg-1; Tue, 04 Aug 2020 11:32:50 -0400 Received: from smtp.corp.redhat.com (int-mx05.intmail.prod.int.phx2.redhat.com [10.5.11.15]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mimecast-mx01.redhat.com (Postfix) with ESMTPS id E4EF49127F; Tue, 4 Aug 2020 15:32:44 +0000 (UTC) Received: from colo-mx.corp.redhat.com (colo-mx02.intmail.prod.int.phx2.redhat.com [10.5.11.21]) by smtp.corp.redhat.com (Postfix) with ESMTPS id C72E371771; Tue, 4 Aug 2020 15:32:44 +0000 (UTC) Received: from lists01.pubmisc.prod.ext.phx2.redhat.com (lists01.pubmisc.prod.ext.phx2.redhat.com [10.5.19.33]) by colo-mx.corp.redhat.com (Postfix) with ESMTP id 964DF97382; Tue, 4 Aug 2020 15:32:44 +0000 (UTC) Received: from smtp.corp.redhat.com (int-mx05.intmail.prod.int.rdu2.redhat.com [10.11.54.5]) by lists01.pubmisc.prod.ext.phx2.redhat.com (8.13.8/8.13.8) with ESMTP id 074FWUfK020805 for ; Tue, 4 Aug 2020 11:32:30 -0400 Received: by smtp.corp.redhat.com (Postfix) id ADDBEED174; Tue, 4 Aug 2020 15:32:30 +0000 (UTC) Received: from mimecast-mx02.redhat.com (mimecast03.extmail.prod.ext.rdu2.redhat.com [10.11.55.19]) by smtp.corp.redhat.com (Postfix) with ESMTPS id A752CEB35C for ; Tue, 4 Aug 2020 15:32:28 +0000 (UTC) Received: from us-smtp-1.mimecast.com (us-smtp-1.mimecast.com [207.211.31.81]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by mimecast-mx02.redhat.com (Postfix) with ESMTPS id 2FDF8800050 for ; Tue, 4 Aug 2020 15:32:28 +0000 (UTC) Received: from youngberry.canonical.com (youngberry.canonical.com [91.189.89.112]) (Using TLS) by relay.mimecast.com with ESMTP id us-mta-51-GKI8ZtyEMe2LH4FE-fko4Q-1; Tue, 04 Aug 2020 11:32:20 -0400 Received: from 2.general.paelzer.uk.vpn ([10.172.196.173] helo=Keschdeichel.fritz.box) by youngberry.canonical.com with esmtpsa (TLS1.2:ECDHE_RSA_AES_128_GCM_SHA256:128) (Exim 4.86_2) (envelope-from ) id 1k2yvL-0002BM-2A; Tue, 04 Aug 2020 15:32:19 +0000 X-MC-Unique: ZUoqyv3kPQCTrYRXTT18dg-1 X-MC-Unique: GKI8ZtyEMe2LH4FE-fko4Q-1 From: Christian Ehrhardt To: libvir-list@redhat.com Subject: [PATCH v2 4/5] apparmor: qemu access to @{PROC}/*/auxv for hw_cap Date: Tue, 4 Aug 2020 17:32:13 +0200 Message-Id: <20200804153214.1305009-5-christian.ehrhardt@canonical.com> In-Reply-To: <20200804153214.1305009-1-christian.ehrhardt@canonical.com> References: <20200804153214.1305009-1-christian.ehrhardt@canonical.com> MIME-Version: 1.0 X-Mimecast-Impersonation-Protect: Policy=CLT - Impersonation Protection Definition; Similar Internal Domain=false; Similar Monitored External Domain=false; Custom External Domain=false; Mimecast External Domain=false; Newly Observed Domain=false; Internal User Name=false; Custom Display Name List=false; Reply-to Address Mismatch=false; Targeted Threat Dictionary=false; Mimecast Threat Dictionary=false; Custom Threat Dictionary=false; X-Scanned-By: MIMEDefang 2.79 on 10.11.54.5 X-loop: libvir-list@redhat.com Cc: Jamie Strandboge , =?UTF-8?q?Guido=20G=C3=BCnther?= , Andrea Bolognani , Stefan Bader , Christian Ehrhardt X-BeenThere: libvir-list@redhat.com X-Mailman-Version: 2.1.12 Precedence: junk List-Id: Development discussions about the libvirt library & tools List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Sender: libvir-list-bounces@redhat.com Errors-To: libvir-list-bounces@redhat.com X-Scanned-By: MIMEDefang 2.79 on 10.5.11.15 X-Mimecast-Spam-Score: 0 X-Mimecast-Originator: redhat.com Content-Transfer-Encoding: quoted-printable Content-Type: text/plain; charset="utf-8" From: Stefan Bader On some architectures (ppc, s390x, sparc, arm) qemu will read auxv to detect hardware capabilities via qemu_getauxval. Allow that access read-only for the entry owned by the current qemu process. Signed-off-by: Christian Ehrhardt Signed-off-by: Stefan Bader Acked-by: Jamie Strandboge --- src/security/apparmor/libvirt-qemu | 2 ++ 1 file changed, 2 insertions(+) diff --git a/src/security/apparmor/libvirt-qemu b/src/security/apparmor/lib= virt-qemu index b132cf0226..ae3db68f82 100644 --- a/src/security/apparmor/libvirt-qemu +++ b/src/security/apparmor/libvirt-qemu @@ -33,6 +33,8 @@ owner @{PROC}/@{pid}/task/@{tid}/comm rw, @{PROC}/sys/kernel/cap_last_cap r, @{PROC}/sys/vm/overcommit_memory r, + # detect hardware capabilities via qemu_getauxval + owner @{PROC}/*/auxv r, =20 # For hostdev access. The actual devices will be added dynamically /sys/bus/usb/devices/ r, --=20 2.27.0