patches and low-level development discussion
 help / color / mirror / code / Atom feed
From: Alyssa Ross <hi@alyssa.is>
To: Demi Marie Obenour <demiobenour@gmail.com>, devel@spectrum-os.org
Subject: Re: Camera virtualization in Spectrum
Date: Thu, 05 Jun 2025 15:44:24 +0200	[thread overview]
Message-ID: <878qm6cngn.fsf@alyssa.is> (raw)
In-Reply-To: <d41c1c72-5cba-49a0-813a-fe0705b1be8e@gmail.com>

[-- Attachment #1: Type: text/plain, Size: 1274 bytes --]

Demi Marie Obenour <demiobenour@gmail.com> writes:

> This leaves virtio-media and a fully custom solution based on PipeWire.
> During the discussion, the possibility of hardening virtio-media against
> a malicious device was considered.  After the call, however, I found out
> that while hardening the kernel side is definitely possible, it is also
> insufficient.  The reason is that virtio-media, as currently implemented,
> appears to be effectively V4L2 API passthrough, which would mean that the
> device can respond to V4L2 IOCTLs however it wants.  Guest userspace will
> almost certainly treat V4L2 IOCTL outputs as trusted, so hardening the
> guest kernel would be of only limited value.  Adding validation in the
> guest kernel driver would be an option, but it would add substantial
> complexity.

I've just noticed from reading the cover letter[1] for the virtio-media
spec that it looks like virtio-video might still happen:

> There is some overlap with virtio-video in regards
> to which devices it can handle. However, they take
> different approaches, potentially making them
> the preferable choice for different scenarios.

Have you looked at virtio-video at all?

[1]: https://lore.kernel.org/virtio-comment/20250304130134.1856056-1-aesteve@redhat.com/

[-- Attachment #2: signature.asc --]
[-- Type: application/pgp-signature, Size: 227 bytes --]

      parent reply	other threads:[~2025-06-05 13:44 UTC|newest]

Thread overview: 3+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2025-06-04  3:38 Camera virtualization in Spectrum Demi Marie Obenour
2025-06-05 13:10 ` Alyssa Ross
2025-06-05 13:44 ` Alyssa Ross [this message]

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=878qm6cngn.fsf@alyssa.is \
    --to=hi@alyssa.is \
    --cc=demiobenour@gmail.com \
    --cc=devel@spectrum-os.org \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
Code repositories for project(s) associated with this public inbox

	https://spectrum-os.org/git/crosvm
	https://spectrum-os.org/git/doc
	https://spectrum-os.org/git/mktuntap
	https://spectrum-os.org/git/nixpkgs
	https://spectrum-os.org/git/spectrum
	https://spectrum-os.org/git/ucspi-vsock
	https://spectrum-os.org/git/www

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).