patches and low-level development discussion
 help / color / mirror / code / Atom feed
From: Demi Marie Obenour <demiobenour@gmail.com>
To: Spectrum OS Development <devel@spectrum-os.org>
Subject: Sandboxing strategy
Date: Tue, 9 Sep 2025 03:57:29 -0400	[thread overview]
Message-ID: <fa66c683-5644-4dc7-9719-3b72be949ac9@gmail.com> (raw)


[-- Attachment #1.1.1: Type: text/plain, Size: 1562 bytes --]

I was thinking about how to sandbox the various per-VM daemons
and came up with the following strategy:

- Each VM gets its own PID and mount namespace and set of user IDs.

- Mount namespace includes /proc, /sys, /dev, and the host rootfs.

- Each service gets its own /tmp and /dev/shm if they are needed at all.

- virtiofsd gets r/w access to the VM private storage.

- IPC namespaces are irrelevant because the kernel is
  built without System V IPC or POSIX message queues.

- Sending signals between services in the namespace is blocked
  by Landlock.  Landlock also blocks ptrace() and other nastiness,
  as well as communication via abstract AF_UNIX sockets.

- Since AF_UNIX abstract sockets between services are blocked by
  Landlock and Spectrum builds without IP or even Ethernet on the
  host there is no need for network namespacing.

- The sandbox manager is PID 1 in the VM's PID namespace.
  When s6 tells it to shut down, it tries to gracefully shut
  down the VM.  After a timeout or once the VM has shut down,
  it exits, and Linux automatically kills all the processes
  and cleans up the mount namespace.

- The sandbox manager uses prctl(PR_SET_PDEATHSIG) to ensure it
  dies if the parent s6 process dies.  This requires s6 to provide
  its own PID to avoid races, but that is easy to implement.

All of this behavior will be hard-coded into C and Rust source code,
so it will be vastly simpler than a generic program that must support
many use-cases.
-- 
Sincerely,
Demi Marie Obenour (she/her/hers)

[-- Attachment #1.1.2: OpenPGP public key --]
[-- Type: application/pgp-keys, Size: 7253 bytes --]

[-- Attachment #2: OpenPGP digital signature --]
[-- Type: application/pgp-signature, Size: 833 bytes --]

             reply	other threads:[~2025-09-09  7:57 UTC|newest]

Thread overview: 8+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2025-09-09  7:57 Demi Marie Obenour [this message]
2025-09-10 15:11 ` Sandboxing strategy Alyssa Ross
2025-09-10 15:14   ` Alyssa Ross
2025-09-10 20:35   ` Demi Marie Obenour
2025-09-17 11:27     ` Alyssa Ross
2025-09-18  2:34       ` Demi Marie Obenour
2025-09-19 13:17         ` Alyssa Ross
2025-09-19 19:37           ` Demi Marie Obenour

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=fa66c683-5644-4dc7-9719-3b72be949ac9@gmail.com \
    --to=demiobenour@gmail.com \
    --cc=devel@spectrum-os.org \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
Code repositories for project(s) associated with this public inbox

	https://spectrum-os.org/git/crosvm
	https://spectrum-os.org/git/doc
	https://spectrum-os.org/git/mktuntap
	https://spectrum-os.org/git/nixpkgs
	https://spectrum-os.org/git/spectrum
	https://spectrum-os.org/git/ucspi-vsock
	https://spectrum-os.org/git/www

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).