On 1/23/19 7:36 AM, Daniel P. Berrangé wrote: > On Wed, Jan 23, 2019 at 02:33:01PM +0100, Erik Skultety wrote: >> On Wed, Jan 23, 2019 at 01:24:13PM +0000, Daniel P. Berrangé wrote: >>> On Wed, Jan 23, 2019 at 02:22:12PM +0100, Erik Skultety wrote: >>>> On Wed, Jan 23, 2019 at 01:10:42PM +0000, Daniel P. Berrangé wrote: >>>>> On Wed, Jan 23, 2019 at 01:55:06PM +0100, Erik Skultety wrote: >>>>>> On Fri, Jan 18, 2019 at 12:51:50PM +0000, Singh, Brijesh wrote: >>>>>>> >>>>>>> On 1/18/19 3:39 AM, Erik Skultety wrote: >>>>>>>> Hi, >>>>>>>> this is a summary of a private discussion I've had with guys CC'd on this email >>>>>>>> about finding a solution to [1] - basically, the default permissions on >>>>>>>> /dev/sev (below) make it impossible to query for SEV platform capabilities, >>>>>>>> since by default we run QEMU as qemu:qemu when probing for capabilities. It's >>>>>>>> worth noting is that this is only relevant to probing, since for a proper QEMU >>>>>>>> VM we create a mount namespace for the process and chown all the nodes (needs a >>>>>>>> SEV fix though). >>>>>>>> >>>>>>>> # ll /dev/sev >>>>>>>> crw-------. 1 root root >>>>>>>> >>>>>>>> I suggested either force running QEMU as root for probing (despite the obvious >>>>>>>> security implications) or using namespaces for probing too. Dan argued that >>>>>>>> this would have a significant perf impact and suggested we ask systemd to add a >>>>>>>> global udev rule. >>>>>>>> >>>>>>>> I proceeded with cloning [1] to systemd and creating an udev rule that I planned >>>>>>>> on submitting to systemd upstream - the initial idea was to mimic /dev/kvm and >>>>>>>> make it world accessible to which Brijesh from AMD expressed a concern that >>>>>>>> regular users might deplete the resources (limit on the number of guests >>>>>>>> allowed by the platform). >>>>>>> >>>>>>> >>>>>>> During private discussion I didn't realized that we are discussing a >>>>>>> probe issue hence things I have said earlier may not be applicable >>>>>>> during the probe. The /dev/sev is managed by the CCP (aka PSP) driver. >>>>>>> The /dev/sev is used for communicating with the SEV FW running inside >>>>>>> the PSP. The SEV FW offers platform and guest specific services. The >>>>>>> guest specific services are used during the guest launch, these services >>>>>>> are available through KVM driver only. Whereas the platform services can >>>>>>> be invoked at anytime. A typical platform specific services are: >>>>>>> >>>>>>> - importing certificates >>>>>>> >>>>>>> - exporting certificates >>>>>>> >>>>>>> - querying the SEV FW version etc etc >>>>>>> >>>>>>> In case of the probe we are not launch SEV guest hence we should not be >>>>>>> worried about depleting the SEV ASID resources. >>>>>>> >>>>>>> IIRC, libvirt uses QEMP query-sev-capabilities to probe the SEV support. >>>>>>> QEMU executes the below sequence to complete the request: >>>>>>> >>>>>>> 1. Exports the platform certificates (this is when /dev/sev is accessed). >>>>>>> >>>>>>> 2. Read the host MSR to determine the C-bit and reduced phys-bit position >>>>>>> >>>>>>> I don't see any reason why we can't give world a 'read' permission to >>>>>>> /dev/sev. Anyone should be able to export the certificates and query >>>>>> >>>>>> Okay, makes sense to me. The problem I see is the sev_platform_ioctl function >>>>>> in QEMU which makes an _IOWR request, therefore the file descriptor being >>>>>> opened in sev_get_capabilities is O_RDWR. Now, I only understand ioctl from >>>>>> what I've read in the man page, so I don't quite understand the need for IOWR >>>>>> here - but my honest guess would be that it's because the commands like >>>>>> SEV_PDH_CERT_EXPORT or SEV_PLATFORM_STATUS need to be copied from userspace to >>>>>> kernel to instruct kernel which services we want, ergo _IOWR, is that right? >>>>> >>>>> I'm not seeing any permissions checks in the sev_ioctl() function in the >>>>> kernel, so IIUC, that means any permissions are entirely based on whether >>>>> you can open the /dev/sev, once open you can run any ioctl. What, if anything, >>>>> enforces which ioctls you can run when the device is only O_RDONLY vs O_RDWR ? >>>> >>>> I don't know, that's why I'm asking, because the manual didn't make it any >>>> clear for me whether there's a connection between the device permissions and >>>> ioctls that you're allowed to run. >>>> >>>>> >>>>>> In any case, a fix of some sort needs to land in QEMU first, because no udev >>>>>> rule would fix the current situation. Afterwards, I expect that having a rule >>>>>> like this: >>>>>> >>>>>> KERNEL=="sev", GROUP="kvm", MODE="0644" >>>>>> >>>>>> and a selinux policy rule adding the kvm_device_t label, we should be fine, do >>>>>> we agree on that? >>>>> >>>>> Based on what I think I see above, this looks like a bad idea. >>>>> >>>>> It still looks like we can solve this entirely in libvirt by just giving >>>>> the libvirt capabilities probing code CAP_DAC_OVERRIDE. This would make >>>>> libvirt work for all currently released SEV support in kernel/qemu. >>>> >>>> Sure we can, but that would make libvirt the only legitimate user of /dev/sev >>>> and everything else would require the admin to change the permissions >>>> explicitly so that other apps could at least retrieve the platform info, if >>>> it was intended to be for public use? >>>> Additionally, we'll still get shot down by SELinux because svirt_t wouldn't be >>>> able to access /dev/sev by default. >>> >>> That's separate form probing and just needs SELinux policy to define >>> a new sev_device_t type and grant svirt_t access to it. >> >> I know, I misread "we can solve this entirely in libvirt" then, I thought you >> the SELinux part was included in the statement, my bad then. Still, back to the >> original issue, we could technically do both, libvirt would have run qemu with >> CAP_DAC_OVERRIDE and we keep working with everything's been released for >> SEV in kernel/qemu and for everyone else, systemd might add 0644 for /dev/sev, >> that way, everyone's happy, not that I'd be a fan of libvirt often having >> to work around something because projects underneath wouldn't backport fixes to >> all the distros we support, thus leaving the dirty work to us. > > Setting 0644 for /dev/sev looks unsafe to me unless someone can show > where the permissions checks take place for the many ioctls that > /dev/sev allows, such that only SEV_PDH_CERT_EXPORT or SEV_PLATFORM_STATUS > is allowed when /dev/sev is opened by a user who doesn't have write > permissions. > Agree its not safe to do 0644. Currently, anyone who has access to /dev/sev (read or write) will be able to execute SEV platform command. In other words there is no permission check per command basis. I must admit that while developing the driver I was under assumption that only root will ever access the /dev/sev device hence overlooked it. But now knowing that others may also need to access the /dev/sev, I can submit patch in kernel to do per command access control. Until then, can we follow Daniel's recommendation to elevate privilege of the probing code? -Brijesh -- libvir-list mailing list libvir-list@xxxxxxxxxx https://www.redhat.com/mailman/listinfo/libvir-list