patches and low-level development discussion
 help / color / mirror / code / Atom feed
From: Demi Marie Obenour <demiobenour@gmail.com>
To: Alyssa Ross <hi@alyssa.is>, devel@spectrum-os.org
Subject: Re: [PATCH 4/8] host/rootfs: run xdg-desktop-portal-spectrum-host as non-root
Date: Wed, 10 Dec 2025 12:26:44 -0500	[thread overview]
Message-ID: <7ea7bb56-680a-4929-acad-9073b5c7ef96@gmail.com> (raw)
In-Reply-To: <20251210124757.1080443-4-hi@alyssa.is>


[-- Attachment #1.1.1: Type: text/plain, Size: 4312 bytes --]

On 12/10/25 07:47, Alyssa Ross wrote:
> Signed-off-by: Alyssa Ross <hi@alyssa.is>
> ---
>  host/rootfs/file-list.mk                      |  1 +
>  host/rootfs/image/etc/dbus-portal.conf.in     | 11 +++++++++++
>  .../template/data/service/dbus/run            |  8 +++++++-
>  .../xdg-desktop-portal-spectrum-host/run      |  2 ++
>  host/rootfs/image/usr/bin/run-appimage        |  1 +
>  host/rootfs/image/usr/bin/run-flatpak         |  1 +
>  host/rootfs/image/usr/bin/vm-import           |  1 +
>  host/rootfs/image/usr/bin/vm-start            | 19 ++++++++++++++++++-
>  8 files changed, 42 insertions(+), 2 deletions(-)
>  create mode 100644 host/rootfs/image/etc/dbus-portal.conf.in
> 
> diff --git a/host/rootfs/file-list.mk b/host/rootfs/file-list.mk
> index f69775d2..59d83b7e 100644
> --- a/host/rootfs/file-list.mk
> +++ b/host/rootfs/file-list.mk
> @@ -2,6 +2,7 @@
>  # SPDX-FileCopyrightText: 2025 Demi Marie Obenour <demiobenour@gmail.com>
>  
>  FILES = \
> +	image/etc/dbus-portal.conf.in \
>  	image/etc/fonts/fonts.conf \
>  	image/etc/fstab \
>  	image/etc/init \
> diff --git a/host/rootfs/image/etc/dbus-portal.conf.in b/host/rootfs/image/etc/dbus-portal.conf.in
> new file mode 100644
> index 00000000..3e0e6725
> --- /dev/null
> +++ b/host/rootfs/image/etc/dbus-portal.conf.in
> @@ -0,0 +1,11 @@
> +<?xml version="1.0" encoding="UTF-8"?>
> +<!-- SPDX-License-Identifier: CC0-1.0 -->
> +<!-- SPDX-FileCopyrightText: 2025 Alyssa Ross <hi@alyssa.is> -->
> +<!DOCTYPE busconfig SYSTEM "busconfig.dtd">
> +<busconfig>
> +  <include>/usr/share/dbus-1/session.conf</include>
> +
> +  <policy context="default">
> +    <allow user="@XDP_SPECTRUM_USER@"/>
> +  </policy>
> +</busconfig>
> diff --git a/host/rootfs/image/etc/s6-linux-init/run-image/service/vm-services/template/data/service/dbus/run b/host/rootfs/image/etc/s6-linux-init/run-image/service/vm-services/template/data/service/dbus/run
> index 83e97c65..20f1daff 100755
> --- a/host/rootfs/image/etc/s6-linux-init/run-image/service/vm-services/template/data/service/dbus/run
> +++ b/host/rootfs/image/etc/s6-linux-init/run-image/service/vm-services/template/data/service/dbus/run
> @@ -4,11 +4,17 @@
>  
>  importas -i VM VM
>  
> +if {
> +  redirfd -w 1 data/dbus.conf
> +  sed "s/@XDP_SPECTRUM_USER@/xdp-spectrum-${VM}/g" /etc/dbus-portal.conf.in
> +}

This makes me nervous.  I know that $VM is trusted, but I'd feel
better if this was validated with a case command.  There's a bug in
case that makes this not work properly, but that's fixed in execline
git right now.

>  s6-ipcserver-socketbinder -B /run/portal-bus/${VM}
>  
>  fdmove -c 3 0
>  redirfd -r 0 /dev/null
>  
> +getcwd -E dir
>  nsenter --mount=/run/vm/by-id/${VM}/mount
>  
>  unshare --cgroup --ipc --net --uts
> @@ -17,6 +23,6 @@ export LISTEN_FDS 1
>  getpid LISTEN_PID
>  
>  dbus-daemon
> -  --config-file /usr/share/dbus-1/session.conf
> +  --config-file ${dir}/data/dbus.conf
>    --print-address 4
>    --address systemd:

(snip)

> diff --git a/host/rootfs/image/usr/bin/vm-start b/host/rootfs/image/usr/bin/vm-start
> index 67480e52..c8031eec 100755
> --- a/host/rootfs/image/usr/bin/vm-start
> +++ b/host/rootfs/image/usr/bin/vm-start
> @@ -20,4 +20,21 @@ foreground {
>    redirfd -w 2 /dev/null
>    s6-svwait -U /run/service/vmm/instance/${1}
>  }
> -ch-remote --api-socket /run/vm/by-id/${1}/vmm boot
> +foreground { ch-remote --api-socket /run/vm/by-id/${1}/vmm boot }
> +importas -Siu ?
> +if {
> +  if -t { test $? -eq 0 }
> +
> +  # This is technically racy: if somehow we don't get here before the VM boots
> +  # and connects to xdg-desktop-portal-spectrum-host, it won't be able to
> +  # connect.  The VM rebooting will also break this, because the socket will be
> +  # re-created with the wrong mode, but VM reboots are broken anyway at the time
> +  # of writing:
> +  #
> +  # https://github.com/cloud-hypervisor/cloud-hypervisor/issues/7547
> +  #
> +  # Ideally we'd be able to give a listening socket FD to Cloud Hypervisor for
> +  # its VSOCK socket.
> +  chown xdp-spectrum-${1} /run/vsock/${1}/vsock

It's possible to avoid the race using extended ACLs.

> +}
> +exit $?
-- 
Sincerely,
Demi Marie Obenour (she/her/hers)

[-- Attachment #1.1.2: OpenPGP public key --]
[-- Type: application/pgp-keys, Size: 7253 bytes --]

[-- Attachment #2: OpenPGP digital signature --]
[-- Type: application/pgp-signature, Size: 833 bytes --]

  reply	other threads:[~2025-12-10 17:27 UTC|newest]

Thread overview: 21+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2025-12-10 12:47 [PATCH 1/8] host/rootfs: create dbus socket externally Alyssa Ross
2025-12-10 12:47 ` [PATCH 2/8] host/rootfs: move vsock sockets out of VM dir Alyssa Ross
2025-12-10 12:47 ` [PATCH 3/8] host/rootfs: move portal bus socket " Alyssa Ross
2025-12-10 12:47 ` [PATCH 4/8] host/rootfs: run xdg-desktop-portal-spectrum-host as non-root Alyssa Ross
2025-12-10 17:26   ` Demi Marie Obenour [this message]
2025-12-11 12:19     ` Alyssa Ross
2025-12-11 14:05       ` Alyssa Ross
2025-12-12 17:54       ` Demi Marie Obenour
2025-12-10 12:47 ` [PATCH 5/8] host/rootfs: create a per-VM user namespace Alyssa Ross
2025-12-10 17:39   ` Demi Marie Obenour
2025-12-11 12:41     ` Alyssa Ross
2025-12-12 17:51       ` Demi Marie Obenour
2025-12-12 17:56         ` Alyssa Ross
2025-12-10 12:47 ` [PATCH 6/8] host/rootfs: move xdp runtime dir out of VM dir Alyssa Ross
2025-12-10 17:43   ` Demi Marie Obenour
2025-12-11 12:47     ` Alyssa Ross
2025-12-11 13:06       ` Alyssa Ross
2025-12-10 12:47 ` [PATCH 7/8] host/rootfs: move fs directory out of VM directory Alyssa Ross
2025-12-10 12:47 ` [PATCH 8/8] host/rootfs: run filesystem daemons as non-root Alyssa Ross
2025-12-10 18:29   ` Demi Marie Obenour
2025-12-11 12:46     ` Alyssa Ross

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=7ea7bb56-680a-4929-acad-9073b5c7ef96@gmail.com \
    --to=demiobenour@gmail.com \
    --cc=devel@spectrum-os.org \
    --cc=hi@alyssa.is \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
Code repositories for project(s) associated with this public inbox

	https://spectrum-os.org/git/crosvm
	https://spectrum-os.org/git/doc
	https://spectrum-os.org/git/mktuntap
	https://spectrum-os.org/git/nixpkgs
	https://spectrum-os.org/git/spectrum
	https://spectrum-os.org/git/ucspi-vsock
	https://spectrum-os.org/git/www

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).