From: Demi Marie Obenour <demiobenour@gmail.com>
To: Spectrum OS Development <devel@spectrum-os.org>
Cc: Demi Marie Obenour <demiobenour@gmail.com>, Alyssa Ross <hi@alyssa.is>
Subject: [PATCH v3 0/5] Partially sandbox Cloud Hypervisor, crosvm, virtiofsd, and the router
Date: Wed, 03 Dec 2025 10:54:54 -0500 [thread overview]
Message-ID: <20251203-sandbox-v3-0-f16ae06a251e@gmail.com> (raw)
In-Reply-To: <20251201-sandbox-v2-0-9f4e58252c2b@gmail.com>
This restricts the access of these programs to the system. Seccomp is
not enabled, though, and the processes still run as root. Full
sandboxing needs additional work. In particular, Cloud Hypervisor
should receive access to VFIO devices via file descriptor passing.
D-Bus and the portal are not sandboxed. They have full access to all
user files by design, so a breach of either is catastrophic no matter
what. Furthermore, sandboxing them even slightly proved very
difficult.
Signed-off-by: Demi Marie Obenour <demiobenour@gmail.com>
---
Changes in v3:
- Protect bus daemon and portal from other services.
- Use s6-softlimit instead of sh to set hard RLIMIT_MEMLOCK.
- Link to v2: https://spectrum-os.org/lists/archives/spectrum-devel/20251201-sandbox-v2-0-9f4e58252c2b@gmail.com
Changes in v2:
- Sandbox Cloud Hypervisor, virtiofsd, and the router
- Link to v1: https://spectrum-os.org/lists/archives/spectrum-devel/20251129-sandbox-v1-1-6dab926504d3@gmail.com
---
Demi Marie Obenour (5):
host/rootfs: Sandbox crosvm
host/rootfs: Sandbox router
host/rootfs: Unshare a few more namespaces in virtiofsd
host/rootfs: Sandbox Cloud Hypervisor
host/rootfs: Try to protect the portal and dbus daemon
host/rootfs/default.nix | 4 +--
.../vm-services/template/data/service/dbus/run | 1 +
.../template/data/service/spectrum-router/run | 19 +++++++++++--
.../template/data/service/vhost-user-fs/run | 2 +-
.../template/data/service/vhost-user-gpu/run | 29 +++++++++++++++++++
.../image/etc/udev/rules.d/99-spectrum.rules | 3 ++
host/rootfs/image/usr/bin/run-vmm | 33 +++++++++++++++++++++-
7 files changed, 84 insertions(+), 7 deletions(-)
---
base-commit: 36d857a937900f85b460e9b3db89cf79737bd72c
change-id: 20251129-sandbox-5a42a6a41b59
--
Sincerely,
Demi Marie Obenour (she/her/hers)
next prev parent reply other threads:[~2025-12-03 15:55 UTC|newest]
Thread overview: 37+ messages / expand[flat|nested] mbox.gz Atom feed top
2025-11-29 22:31 [PATCH] host/rootfs: Sandbox crosvm Demi Marie Obenour
2025-12-02 3:46 ` [PATCH v2 0/4] Partially sandbox Cloud Hypervisor, crosvm, virtiofsd, and the router Demi Marie Obenour
2025-12-02 3:46 ` [PATCH v2 1/4] host/rootfs: Sandbox crosvm Demi Marie Obenour
2025-12-03 12:43 ` Alyssa Ross
2025-12-03 12:48 ` Demi Marie Obenour
2025-12-03 13:09 ` Alyssa Ross
2025-12-04 13:28 ` Alyssa Ross
2025-12-02 3:46 ` [PATCH v2 2/4] host/rootfs: Sandbox router Demi Marie Obenour
2025-12-02 3:46 ` [PATCH v2 3/4] host/rootfs: Sandbox virtiofsd Demi Marie Obenour
2025-12-02 3:46 ` [PATCH v2 4/4] host/rootfs: Sandbox Cloud Hypervisor Demi Marie Obenour
2025-12-02 13:14 ` [PATCH v2 0/4] Partially sandbox Cloud Hypervisor, crosvm, virtiofsd, and the router Alyssa Ross
2025-12-03 15:54 ` Demi Marie Obenour [this message]
2025-12-03 15:54 ` [PATCH v3 1/5] host/rootfs: Sandbox crosvm Demi Marie Obenour
2025-12-03 15:54 ` [PATCH v3 2/5] host/rootfs: Sandbox router Demi Marie Obenour
2025-12-03 16:06 ` Yureka
2025-12-03 16:11 ` Alyssa Ross
2025-12-09 11:23 ` Yureka
2025-12-03 15:54 ` [PATCH v3 3/5] host/rootfs: Unshare a few more namespaces in virtiofsd Demi Marie Obenour
2025-12-03 15:54 ` [PATCH v3 4/5] host/rootfs: Sandbox Cloud Hypervisor Demi Marie Obenour
2025-12-03 15:54 ` [PATCH v3 5/5] host/rootfs: Try to protect the portal and dbus daemon Demi Marie Obenour
2025-12-04 2:20 ` [PATCH v4 0/6] Partially sandbox Cloud Hypervisor, crosvm, virtiofsd, and the router Demi Marie Obenour
2025-12-04 2:20 ` [PATCH v4 1/6] host/rootfs: Sandbox crosvm Demi Marie Obenour
2025-12-04 13:03 ` Alyssa Ross
2025-12-04 2:20 ` [PATCH v4 2/6] host/rootfs: Sandbox router Demi Marie Obenour
2025-12-04 13:47 ` Alyssa Ross
2025-12-04 2:20 ` [PATCH v4 3/6] host/rootfs: Unshare a few more namespaces in virtiofsd Demi Marie Obenour
2025-12-04 14:03 ` Alyssa Ross
2025-12-04 2:20 ` [PATCH v4 4/6] host/rootfs: Sandbox Cloud Hypervisor Demi Marie Obenour
2025-12-04 14:35 ` Alyssa Ross
2025-12-06 17:35 ` Demi Marie Obenour
2025-12-06 17:46 ` Alyssa Ross
2025-12-06 17:47 ` Demi Marie Obenour
2025-12-06 17:56 ` Alyssa Ross
2025-12-04 2:20 ` [PATCH v4 5/6] host/rootfs: Try to protect the portal and dbus daemon Demi Marie Obenour
2025-12-04 14:23 ` Alyssa Ross
2025-12-04 2:20 ` [PATCH v4 6/6] host/rootfs: "Sandbox" Weston Demi Marie Obenour
2025-12-04 14:47 ` Alyssa Ross
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=20251203-sandbox-v3-0-f16ae06a251e@gmail.com \
--to=demiobenour@gmail.com \
--cc=devel@spectrum-os.org \
--cc=hi@alyssa.is \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
Code repositories for project(s) associated with this public inbox
https://spectrum-os.org/git/crosvm
https://spectrum-os.org/git/doc
https://spectrum-os.org/git/mktuntap
https://spectrum-os.org/git/nixpkgs
https://spectrum-os.org/git/spectrum
https://spectrum-os.org/git/ucspi-vsock
https://spectrum-os.org/git/www
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).