From: Demi Marie Obenour <demiobenour@gmail.com>
To: Spectrum OS Development <devel@spectrum-os.org>
Cc: Demi Marie Obenour <demiobenour@gmail.com>, Alyssa Ross <hi@alyssa.is>
Subject: [PATCH v2 0/4] Partially sandbox Cloud Hypervisor, crosvm, virtiofsd, and the router
Date: Mon, 01 Dec 2025 22:46:37 -0500 [thread overview]
Message-ID: <20251201-sandbox-v2-0-9f4e58252c2b@gmail.com> (raw)
In-Reply-To: <20251129-sandbox-v1-1-6dab926504d3@gmail.com>
This restricts the access of these programs to the system. Seccomp is
not enabled, though, and the processes still run as root. Full
sandboxing needs additional work. In particular, Cloud Hypervisor
should receive access to VFIO devices via file descriptor passing.
Sandboxing Cloud Hypervisor requires the use of sh, as there is no s6
or execline program to increase hard resource limits.
D-Bus and the portal are not sandboxed. They have full access to all
user files by design, so a breach of either is catastrophic no matter
what. Furthermore, sandboxing them even slightly proved very
difficult.
Signed-off-by: Demi Marie Obenour <demiobenour@gmail.com>
---
Changes in v2:
- Sandbox Cloud Hypervisor, virtiofsd, and the router
- Link to v1: https://spectrum-os.org/lists/archives/spectrum-devel/20251129-sandbox-v1-1-6dab926504d3@gmail.com
---
Demi Marie Obenour (4):
host/rootfs: Sandbox crosvm
host/rootfs: Sandbox router
host/rootfs: Sandbox virtiofsd
host/rootfs: Sandbox Cloud Hypervisor
host/rootfs/default.nix | 4 +--
.../template/data/service/spectrum-router/run | 19 +++++++++++--
.../template/data/service/vhost-user-fs/run | 28 ++++++++++++++++--
.../template/data/service/vhost-user-gpu/run | 24 +++++++++++++++-
.../image/etc/udev/rules.d/99-spectrum.rules | 3 ++
host/rootfs/image/usr/bin/run-vmm | 33 +++++++++++++++++++---
6 files changed, 98 insertions(+), 13 deletions(-)
---
base-commit: 44f32b7a4b3cfbb4046447318e6753dd0eb71add
change-id: 20251129-sandbox-5a42a6a41b59
--
Sincerely,
Demi Marie Obenour (she/her/hers)
next prev parent reply other threads:[~2025-12-02 3:47 UTC|newest]
Thread overview: 37+ messages / expand[flat|nested] mbox.gz Atom feed top
2025-11-29 22:31 [PATCH] host/rootfs: Sandbox crosvm Demi Marie Obenour
2025-12-02 3:46 ` Demi Marie Obenour [this message]
2025-12-02 3:46 ` [PATCH v2 1/4] " Demi Marie Obenour
2025-12-03 12:43 ` Alyssa Ross
2025-12-03 12:48 ` Demi Marie Obenour
2025-12-03 13:09 ` Alyssa Ross
2025-12-04 13:28 ` Alyssa Ross
2025-12-02 3:46 ` [PATCH v2 2/4] host/rootfs: Sandbox router Demi Marie Obenour
2025-12-02 3:46 ` [PATCH v2 3/4] host/rootfs: Sandbox virtiofsd Demi Marie Obenour
2025-12-02 3:46 ` [PATCH v2 4/4] host/rootfs: Sandbox Cloud Hypervisor Demi Marie Obenour
2025-12-02 13:14 ` [PATCH v2 0/4] Partially sandbox Cloud Hypervisor, crosvm, virtiofsd, and the router Alyssa Ross
2025-12-03 15:54 ` [PATCH v3 0/5] " Demi Marie Obenour
2025-12-03 15:54 ` [PATCH v3 1/5] host/rootfs: Sandbox crosvm Demi Marie Obenour
2025-12-03 15:54 ` [PATCH v3 2/5] host/rootfs: Sandbox router Demi Marie Obenour
2025-12-03 16:06 ` Yureka
2025-12-03 16:11 ` Alyssa Ross
2025-12-09 11:23 ` Yureka
2025-12-03 15:54 ` [PATCH v3 3/5] host/rootfs: Unshare a few more namespaces in virtiofsd Demi Marie Obenour
2025-12-03 15:54 ` [PATCH v3 4/5] host/rootfs: Sandbox Cloud Hypervisor Demi Marie Obenour
2025-12-03 15:54 ` [PATCH v3 5/5] host/rootfs: Try to protect the portal and dbus daemon Demi Marie Obenour
2025-12-04 2:20 ` [PATCH v4 0/6] Partially sandbox Cloud Hypervisor, crosvm, virtiofsd, and the router Demi Marie Obenour
2025-12-04 2:20 ` [PATCH v4 1/6] host/rootfs: Sandbox crosvm Demi Marie Obenour
2025-12-04 13:03 ` Alyssa Ross
2025-12-04 2:20 ` [PATCH v4 2/6] host/rootfs: Sandbox router Demi Marie Obenour
2025-12-04 13:47 ` Alyssa Ross
2025-12-04 2:20 ` [PATCH v4 3/6] host/rootfs: Unshare a few more namespaces in virtiofsd Demi Marie Obenour
2025-12-04 14:03 ` Alyssa Ross
2025-12-04 2:20 ` [PATCH v4 4/6] host/rootfs: Sandbox Cloud Hypervisor Demi Marie Obenour
2025-12-04 14:35 ` Alyssa Ross
2025-12-06 17:35 ` Demi Marie Obenour
2025-12-06 17:46 ` Alyssa Ross
2025-12-06 17:47 ` Demi Marie Obenour
2025-12-06 17:56 ` Alyssa Ross
2025-12-04 2:20 ` [PATCH v4 5/6] host/rootfs: Try to protect the portal and dbus daemon Demi Marie Obenour
2025-12-04 14:23 ` Alyssa Ross
2025-12-04 2:20 ` [PATCH v4 6/6] host/rootfs: "Sandbox" Weston Demi Marie Obenour
2025-12-04 14:47 ` Alyssa Ross
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=20251201-sandbox-v2-0-9f4e58252c2b@gmail.com \
--to=demiobenour@gmail.com \
--cc=devel@spectrum-os.org \
--cc=hi@alyssa.is \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
Code repositories for project(s) associated with this public inbox
https://spectrum-os.org/git/crosvm
https://spectrum-os.org/git/doc
https://spectrum-os.org/git/mktuntap
https://spectrum-os.org/git/nixpkgs
https://spectrum-os.org/git/spectrum
https://spectrum-os.org/git/ucspi-vsock
https://spectrum-os.org/git/www
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).