On Wed, Jan 23, 2019 at 03:02:28PM +0000, Singh, Brijesh wrote: > > > On 1/23/19 7:36 AM, Daniel P. Berrangé wrote: > > On Wed, Jan 23, 2019 at 02:33:01PM +0100, Erik Skultety wrote: > >> On Wed, Jan 23, 2019 at 01:24:13PM +0000, Daniel P. Berrangé wrote: > >>> On Wed, Jan 23, 2019 at 02:22:12PM +0100, Erik Skultety wrote: > >>>> On Wed, Jan 23, 2019 at 01:10:42PM +0000, Daniel P. Berrangé wrote: > >>>>> On Wed, Jan 23, 2019 at 01:55:06PM +0100, Erik Skultety wrote: > >>>>>> On Fri, Jan 18, 2019 at 12:51:50PM +0000, Singh, Brijesh wrote: > >>>>>>> > >>>>>>> On 1/18/19 3:39 AM, Erik Skultety wrote: > >>>>>>>> Hi, > >>>>>>>> this is a summary of a private discussion I've had with guys CC'd on > >>>>>>>> this email > >>>>>>>> about finding a solution to [1] - basically, the default permissions > >>>>>>>> on > >>>>>>>> /dev/sev (below) make it impossible to query for SEV platform > >>>>>>>> capabilities, > >>>>>>>> since by default we run QEMU as qemu:qemu when probing for > >>>>>>>> capabilities. It's > >>>>>>>> worth noting is that this is only relevant to probing, since for a > >>>>>>>> proper QEMU > >>>>>>>> VM we create a mount namespace for the process and chown all the > >>>>>>>> nodes (needs a > >>>>>>>> SEV fix though). > >>>>>>>> > >>>>>>>> # ll /dev/sev > >>>>>>>> crw-------. 1 root root > >>>>>>>> > >>>>>>>> I suggested either force running QEMU as root for probing (despite > >>>>>>>> the obvious > >>>>>>>> security implications) or using namespaces for probing too. Dan > >>>>>>>> argued that > >>>>>>>> this would have a significant perf impact and suggested we ask > >>>>>>>> systemd to add a > >>>>>>>> global udev rule. > >>>>>>>> > >>>>>>>> I proceeded with cloning [1] to systemd and creating an udev rule > >>>>>>>> that I planned > >>>>>>>> on submitting to systemd upstream - the initial idea was to mimic > >>>>>>>> /dev/kvm and > >>>>>>>> make it world accessible to which Brijesh from AMD expressed a > >>>>>>>> concern that > >>>>>>>> regular users might deplete the resources (limit on the number of > >>>>>>>> guests > >>>>>>>> allowed by the platform). > >>>>>>> > >>>>>>> > >>>>>>> During private discussion I didn't realized that we are discussing a > >>>>>>> probe issue hence things I have said earlier may not be applicable > >>>>>>> during the probe. The /dev/sev is managed by the CCP (aka PSP) driver. > >>>>>>> The /dev/sev is used for communicating with the SEV FW running inside > >>>>>>> the PSP. The SEV FW offers platform and guest specific services. The > >>>>>>> guest specific services are used during the guest launch, these > >>>>>>> services > >>>>>>> are available through KVM driver only. Whereas the platform services > >>>>>>> can > >>>>>>> be invoked at anytime. A typical platform specific services are: > >>>>>>> > >>>>>>> - importing certificates > >>>>>>> > >>>>>>> - exporting certificates > >>>>>>> > >>>>>>> - querying the SEV FW version etc etc > >>>>>>> > >>>>>>> In case of the probe we are not launch SEV guest hence we should not > >>>>>>> be > >>>>>>> worried about depleting the SEV ASID resources. > >>>>>>> > >>>>>>> IIRC, libvirt uses QEMP query-sev-capabilities to probe the SEV > >>>>>>> support. > >>>>>>> QEMU executes the below sequence to complete the request: > >>>>>>> > >>>>>>> 1. Exports the platform certificates (this is when /dev/sev is > >>>>>>> accessed). > >>>>>>> > >>>>>>> 2. Read the host MSR to determine the C-bit and reduced phys-bit > >>>>>>> position > >>>>>>> > >>>>>>> I don't see any reason why we can't give world a 'read' permission to > >>>>>>> /dev/sev. Anyone should be able to export the certificates and query > >>>>>> > >>>>>> Okay, makes sense to me. The problem I see is the sev_platform_ioctl > >>>>>> function > >>>>>> in QEMU which makes an _IOWR request, therefore the file descriptor > >>>>>> being > >>>>>> opened in sev_get_capabilities is O_RDWR. Now, I only understand ioctl > >>>>>> from > >>>>>> what I've read in the man page, so I don't quite understand the need > >>>>>> for IOWR > >>>>>> here - but my honest guess would be that it's because the commands like > >>>>>> SEV_PDH_CERT_EXPORT or SEV_PLATFORM_STATUS need to be copied from > >>>>>> userspace to > >>>>>> kernel to instruct kernel which services we want, ergo _IOWR, is that > >>>>>> right? > >>>>> > >>>>> I'm not seeing any permissions checks in the sev_ioctl() function in the > >>>>> kernel, so IIUC, that means any permissions are entirely based on > >>>>> whether > >>>>> you can open the /dev/sev, once open you can run any ioctl. What, if > >>>>> anything, > >>>>> enforces which ioctls you can run when the device is only O_RDONLY vs > >>>>> O_RDWR ? > >>>> > >>>> I don't know, that's why I'm asking, because the manual didn't make it > >>>> any > >>>> clear for me whether there's a connection between the device permissions > >>>> and > >>>> ioctls that you're allowed to run. > >>>> > >>>>> > >>>>>> In any case, a fix of some sort needs to land in QEMU first, because > >>>>>> no udev > >>>>>> rule would fix the current situation. Afterwards, I expect that having > >>>>>> a rule > >>>>>> like this: > >>>>>> > >>>>>> KERNEL=="sev", GROUP="kvm", MODE="0644" > >>>>>> > >>>>>> and a selinux policy rule adding the kvm_device_t label, we should be > >>>>>> fine, do > >>>>>> we agree on that? > >>>>> > >>>>> Based on what I think I see above, this looks like a bad idea. > >>>>> > >>>>> It still looks like we can solve this entirely in libvirt by just giving > >>>>> the libvirt capabilities probing code CAP_DAC_OVERRIDE. This would make > >>>>> libvirt work for all currently released SEV support in kernel/qemu. > >>>> > >>>> Sure we can, but that would make libvirt the only legitimate user of > >>>> /dev/sev > >>>> and everything else would require the admin to change the permissions > >>>> explicitly so that other apps could at least retrieve the platform info, > >>>> if > >>>> it was intended to be for public use? > >>>> Additionally, we'll still get shot down by SELinux because svirt_t > >>>> wouldn't be > >>>> able to access /dev/sev by default. > >>> > >>> That's separate form probing and just needs SELinux policy to define > >>> a new sev_device_t type and grant svirt_t access to it. > >> > >> I know, I misread "we can solve this entirely in libvirt" then, I thought > >> you > >> the SELinux part was included in the statement, my bad then. Still, back > >> to the > >> original issue, we could technically do both, libvirt would have run qemu > >> with > >> CAP_DAC_OVERRIDE and we keep working with everything's been released for > >> SEV in kernel/qemu and for everyone else, systemd might add 0644 for > >> /dev/sev, > >> that way, everyone's happy, not that I'd be a fan of libvirt often having > >> to work around something because projects underneath wouldn't backport > >> fixes to > >> all the distros we support, thus leaving the dirty work to us. > > > > Setting 0644 for /dev/sev looks unsafe to me unless someone can show > > where the permissions checks take place for the many ioctls that > > /dev/sev allows, such that only SEV_PDH_CERT_EXPORT or SEV_PLATFORM_STATUS > > is allowed when /dev/sev is opened by a user who doesn't have write > > permissions. > > > > Agree its not safe to do 0644. > > Currently, anyone who has access to /dev/sev (read or write) will be > able to execute SEV platform command. In other words there is no > permission check per command basis. I must admit that while developing > the driver I was under assumption that only root will ever access the > /dev/sev device hence overlooked it. But now knowing that others may > also need to access the /dev/sev, I can submit patch in kernel to do > per command access control. > > Until then, can we follow Daniel's recommendation to elevate privilege > of the probing code?
If that is the case, then I absolutely agree with Dan, I'll start working on the patches for libvirt, I'm glad I learned that there's no strict relation between ioctl ops and filesystem permissions unless explicitly defined. Thanks, Erik