From nobody Tue Feb 10 01:34:30 2026 Delivered-To: importer@patchew.org Received-SPF: pass (zohomail.com: domain of gnu.org designates 209.51.188.17 as permitted sender) client-ip=209.51.188.17; envelope-from=qemu-devel-bounces+importer=patchew.org@nongnu.org; helo=lists.gnu.org; Authentication-Results: mx.zohomail.com; dkim=fail; spf=pass (zohomail.com: domain of gnu.org designates 209.51.188.17 as permitted sender) smtp.mailfrom=qemu-devel-bounces+importer=patchew.org@nongnu.org; dmarc=fail(p=none dis=none) header.from=redhat.com ARC-Seal: i=1; a=rsa-sha256; t=1576854616; cv=none; d=zohomail.com; s=zohoarc; b=ICqOXKE8/hJnFR50HeXViwR15agGNZtFiyOqml6QiuuojDuy1u0C84BJWUWYS0IreYuYijgotJPof+Lt1vPw1tHntI7NhddUnMnhj1a4SBX8oRamSZ5Fvzu7z7b4faLjKNH8ysj7pfIQAvT6jO5y3yu6ebKfmpHQGGCCHaCfyoo= ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=zohomail.com; s=zohoarc; t=1576854616; h=Content-Type:Content-Transfer-Encoding:Cc:Date:From:In-Reply-To:List-Subscribe:List-Post:List-Id:List-Archive:List-Help:List-Unsubscribe:MIME-Version:Message-ID:References:Sender:Subject:To; bh=8khN/Yw4pybLPkt+SaIgtu20Dc95X9OgJvI+VEpF70g=; b=bTeEBAxdgptXfQzALPGKELldSQi0FRZLpWFr2RTWgVhsbsP6iPg2gzGrGKnuDfRO2mdBB/LA8tR5/4TKIfoHoLeJuYrS6pv5M2AboDiNI9qeQtWEWzndWG7hMH0JNw52qazvHFYlK76YcNUasWvaU59NkMRosWnuPTB8EVUilB4= ARC-Authentication-Results: i=1; mx.zohomail.com; dkim=fail; spf=pass (zohomail.com: domain of gnu.org designates 209.51.188.17 as permitted sender) smtp.mailfrom=qemu-devel-bounces+importer=patchew.org@nongnu.org; dmarc=fail header.from= (p=none dis=none) header.from= Return-Path: Received: from lists.gnu.org (lists.gnu.org [209.51.188.17]) by mx.zohomail.com with SMTPS id 1576854616015906.0716824246173; Fri, 20 Dec 2019 07:10:16 -0800 (PST) Received: from localhost ([::1]:57774 helo=lists1p.gnu.org) by lists.gnu.org with esmtp (Exim 4.90_1) (envelope-from ) id 1iiJuw-0004Yo-NY for importer@patchew.org; Fri, 20 Dec 2019 10:10:14 -0500 Received: from eggs.gnu.org ([2001:470:142:3::10]:45113) by lists.gnu.org with esmtp (Exim 4.90_1) (envelope-from ) id 1iiJr9-0007Av-CB for qemu-devel@nongnu.org; Fri, 20 Dec 2019 10:06:20 -0500 Received: from Debian-exim by eggs.gnu.org with spam-scanned (Exim 4.71) (envelope-from ) id 1iiJr7-00009K-RE for qemu-devel@nongnu.org; Fri, 20 Dec 2019 10:06:19 -0500 Received: from us-smtp-1.mimecast.com ([205.139.110.61]:40121 helo=us-smtp-delivery-1.mimecast.com) by eggs.gnu.org with esmtps (TLS1.0:DHE_RSA_AES_256_CBC_SHA1:32) (Exim 4.71) (envelope-from ) id 1iiJr7-00008P-Mc for qemu-devel@nongnu.org; Fri, 20 Dec 2019 10:06:17 -0500 Received: from mimecast-mx01.redhat.com (mimecast-mx01.redhat.com [209.132.183.4]) (Using TLS) by relay.mimecast.com with ESMTP id us-mta-288-d3_5E9afN4uKwZqBHc0y3g-1; Fri, 20 Dec 2019 10:06:04 -0500 Received: from smtp.corp.redhat.com (int-mx08.intmail.prod.int.phx2.redhat.com [10.5.11.23]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mimecast-mx01.redhat.com (Postfix) with ESMTPS id 63065184BED5; Fri, 20 Dec 2019 15:06:03 +0000 (UTC) Received: from localhost (ovpn-112-54.ams2.redhat.com [10.36.112.54]) by smtp.corp.redhat.com (Postfix) with ESMTP id 10CD326FBF; Fri, 20 Dec 2019 15:05:58 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1576854377; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=8khN/Yw4pybLPkt+SaIgtu20Dc95X9OgJvI+VEpF70g=; b=atmZal39GnImpbVd4rEdYOrrSCtiCtmMHP9lkFtSENPflkttr5WSe1xfYA13zP9X/Slfqh KmVV0DMBQoVNNPhnEsEwQR9vqXJjv5Rovuz0k7jW1ZfvN6nGtJCYD1IsQ+bEsI9Jqj0MH3 XOgePhwUnQfsQIEE/g7Vfv+7yyNObFs= From: =?UTF-8?q?Marc-Andr=C3=A9=20Lureau?= To: peter.maydell@linaro.org, qemu-devel@nongnu.org Subject: [PULL 3/9] docs: start a document to describe D-Bus usage Date: Fri, 20 Dec 2019 19:05:16 +0400 Message-Id: <20191220150522.633032-4-marcandre.lureau@redhat.com> In-Reply-To: <20191220150522.633032-1-marcandre.lureau@redhat.com> References: <20191220150522.633032-1-marcandre.lureau@redhat.com> MIME-Version: 1.0 X-Scanned-By: MIMEDefang 2.84 on 10.5.11.23 X-MC-Unique: d3_5E9afN4uKwZqBHc0y3g-1 X-Mimecast-Spam-Score: 0 Content-Transfer-Encoding: quoted-printable X-detected-operating-system: by eggs.gnu.org: GNU/Linux 2.2.x-3.x [generic] [fuzzy] X-Received-From: 205.139.110.61 X-BeenThere: qemu-devel@nongnu.org X-Mailman-Version: 2.1.23 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Cc: berrange@redhat.com, quintela@redhat.com, mprivozn@redhat.com, dgilbert@redhat.com, =?UTF-8?q?Marc-Andr=C3=A9=20Lureau?= , pbonzini@redhat.com Errors-To: qemu-devel-bounces+importer=patchew.org@nongnu.org Sender: "Qemu-devel" X-ZohoMail-DKIM: fail (Header signature does not verify) Content-Type: text/plain; charset="utf-8" Signed-off-by: Marc-Andr=C3=A9 Lureau Reviewed-by: Daniel P. Berrang=C3=A9 --- MAINTAINERS | 5 ++ docs/interop/dbus.rst | 105 +++++++++++++++++++++++++++++++++++++++++ docs/interop/index.rst | 1 + 3 files changed, 111 insertions(+) create mode 100644 docs/interop/dbus.rst diff --git a/MAINTAINERS b/MAINTAINERS index 0d2c909070..a722d030d9 100644 --- a/MAINTAINERS +++ b/MAINTAINERS @@ -2206,6 +2206,11 @@ F: tests/migration-test.c F: docs/devel/migration.rst F: qapi/migration.json =20 +D-Bus +M: Marc-Andr=C3=A9 Lureau +S: Maintained +F: docs/interop/dbus.rst + Seccomp M: Eduardo Otubo S: Supported diff --git a/docs/interop/dbus.rst b/docs/interop/dbus.rst new file mode 100644 index 0000000000..ef80d4204d --- /dev/null +++ b/docs/interop/dbus.rst @@ -0,0 +1,105 @@ +=3D=3D=3D=3D=3D +D-Bus +=3D=3D=3D=3D=3D + +Introduction +=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D + +QEMU may be running with various helper processes involved: + - vhost-user* processes (gpu, virtfs, input, etc...) + - TPM emulation (or other devices) + - user networking (slirp) + - network services (DHCP/DNS, samba/ftp etc) + - background tasks (compression, streaming etc) + - client UI + - admin & cli + +Having several processes allows stricter security rules, as well as +greater modularity. + +While QEMU itself uses QMP as primary IPC (and Spice/VNC for remote +display), D-Bus is the de facto IPC of choice on Unix systems. The +wire format is machine friendly, good bindings exist for various +languages, and there are various tools available. + +Using a bus, helper processes can discover and communicate with each +other easily, without going through QEMU. The bus topology is also +easier to apprehend and debug than a mesh. However, it is wise to +consider the security aspects of it. + +Security +=3D=3D=3D=3D=3D=3D=3D=3D + +A QEMU D-Bus bus should be private to a single VM. Thus, only +cooperative tasks are running on the same bus to serve the VM. + +D-Bus, the protocol and standard, doesn't have mechanisms to enforce +security between peers once the connection is established. Peers may +have additional mechanisms to enforce security rules, based for +example on UNIX credentials. + +The daemon can control which peers can send/recv messages using +various metadata attributes, however, this is alone is not generally +sufficient to make the deployment secure. The semantics of the actual +methods implemented using D-Bus are just as critical. Peers need to +carefully validate any information they received from a peer with a +different trust level. + +dbus-daemon policy +------------------ + +dbus-daemon can enforce various policies based on the UID/GID of the +processes that are connected to it. It is thus a good idea to run +helpers as different UID from QEMU and set appropriate policies. + +Depending on the use case, you may choose different scenarios: + + - Everything the same UID + + - Convenient for developers + - Improved reliability - crash of one part doens't take + out entire VM + - No security benefit over traditional QEMU, unless additional + unless additional controls such as SELinux or AppArmor are + applied + + - Two UIDs, one for QEMU, one for dbus & helpers + + - Moderately improved user based security isolation + + - Many UIDs, one for QEMU one for dbus and one for each helpers + + - Best user based security isolation + - Complex to manager distinct UIDs needed for each VM + +For example, to allow only ``qemu`` user to talk to ``qemu-helper`` +``org.qemu.Helper1`` service, a dbus-daemon policy may contain: + +.. code:: xml + + + + + + + + + + + +dbus-daemon can also perfom SELinux checks based on the security +context of the source and the target. For example, ``virtiofs_t`` +could be allowed to send a message to ``svirt_t``, but ``virtiofs_t`` +wouldn't be allowed to send a message to ``virtiofs_t``. + +See dbus-daemon man page for details. + +Guidelines +=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D + +When implementing new D-Bus interfaces, it is recommended to follow +the "D-Bus API Design Guidelines": +https://dbus.freedesktop.org/doc/dbus-api-design.html + +The "org.qemu.*" prefix is reserved for services implemented & +distributed by the QEMU project. diff --git a/docs/interop/index.rst b/docs/interop/index.rst index 3e33fb5933..ded134ea75 100644 --- a/docs/interop/index.rst +++ b/docs/interop/index.rst @@ -13,6 +13,7 @@ Contents: :maxdepth: 2 =20 bitmaps + dbus live-block-operations pr-helper qemu-ga --=20 2.24.0.308.g228f53135a