Uploaded image for project: 'RHEL'
  1. RHEL
  2. RHEL-87742

[RHEL-10.1] New SELinux domain required for TDX confidential virtualization "qgs" daemon

Linking RHIVOS CVEs to...Migration: Automation ...SWIFT: POC ConversionSync from "Extern...XMLWordPrintable

    • selinux-policy-40.13.35-1.el10
    • Important
    • 1
    • rhel-security-selinux
    • ssg_security
    • 22
    • 2
    • False
    • False
    • Hide

      None

      Show
      None
    • No
    • SELINUX 250716: 9
    • Hide

      The qgs service starts and runs successfully under the new SELinux label: qgs_t.

      Show
      The qgs service starts and runs successfully under the new SELinux label: qgs_t.
    • Pass
    • RegressionOnly
    • Feature
    • Hide
      .The SELinux policy adds rules and type for the `qgs` daemon

      The `qgs` daemon was added to RHEL with the `linux-sgx` package, which supports TDX confidential virtualization. The `qgs` daemon communicates with QEMU over a UNIX domain socket when the guest OS requests attestation of the virtual machine (VM). To make this possible, the SELinux policy adds a new `qgs_t` type, access rules, and permissions.
      Show
      .The SELinux policy adds rules and type for the `qgs` daemon The `qgs` daemon was added to RHEL with the `linux-sgx` package, which supports TDX confidential virtualization. The `qgs` daemon communicates with QEMU over a UNIX domain socket when the guest OS requests attestation of the virtual machine (VM). To make this possible, the SELinux policy adds a new `qgs_t` type, access rules, and permissions.
    • Done
    • Unspecified
    • Unspecified
    • Unspecified
    • x86_64
    • None

      The 'linux-sgx' package is adding host software  needed to support Intel TDX confidential virtualization. The most important piece in this package is the 'qgs' daemon which provides an attestation service. QEMU will speak to 'qgs' over a UNIX domain socket when the guest OS requests attestation of the VM.

      Given that QEMU is a strictly confined daemon under SELinux Policy, we need to define a new 'qgs_t' SELinux domain, write suitable access rules, and permit the 'svirt_t' domain to communicate with it.

      Without a QGS policy, the current default QEMU svirt_t policy will block access to QGS, so this will be a blocker for shipping TDX support in RHEL.

              rhn-support-zpytela Zdenek Pytela
              rhn-engineering-berrange Daniel Berrangé
              Zdenek Pytela Zdenek Pytela
              Milos Malik Milos Malik
              Jan Fiala Jan Fiala
              Votes:
              0 Vote for this issue
              Watchers:
              8 Start watching this issue

                Created:
                Updated: