"Namsun Ch'o" <namn...@safe-mail.net> writes:

>> If we intend seccomp to protect against flaws during QEMU setup, then having
>> it earlier is neccessary. eg QEMU opening a corrupt qcow2 image which might
>> exploit QEMU before the guest CPUs start.
>
>> If the latter is the case, then we could start with a relaxed seccomp
>> sandbox which included the setuid/chroot features, and then switch to a
>> more restricted one which blocked them before main_loop() runs.
>
> That's not possible. Seccomp will not be enforced until seccomp_load(ctx) is
> called, after which no new changes to the filter can be made.

That's a pity.

As long as it's the case, we need to pick: either we protect against
rogue guests, or against rogue images.  The original idea was the
former, and it still makes the most sense to me.

Reply via email to