On 09/24/2018 11:49 AM, Ian Jackson wrote:
> George Dunlap writes ("[PATCH v2 6/6] RFC: tools/dm_restrict: Enable QEMU 
> sandboxing"):
>> QEMU has a `sandbox` feature, wherein it will use seccomp2 to restrict
>> what system calls it is able to make.
> ...
>> +        flexarray_append(dm_args, 
>> "on,obsolete=deny,elevateprivileges=allow,spawn=deny,resourcecontrol=deny");
> 
> Why `elevateprivileges=allow' ?

From qemu-depriv.md:

`elevateprivileges` is currently required to allow `-runas` to work.
Removing this requirement would mean making sure that the uid change
happened before the seccomp2 call, perhaps by changing the uid before
executing QEMU.  (But this would then require other changes to create
the QMP socket, VNC socket, and so on).

Should I C&P this into a comment here?

> In this syntax, what happens with unmentioned abilities ?

Good question -- the -help doesn't seem to say.  Looking at the code
(qemu-seccomp.c:parse_sandbox()) for those who want to follow along at
home), it seems different options have different default values (which
are not mentioned) -- obsolete is default deny, but spawn,
elevateprivileges, and resourcsecontrol are default allow.

 -George

_______________________________________________
Xen-devel mailing list
Xen-devel@lists.xenproject.org
https://lists.xenproject.org/mailman/listinfo/xen-devel

Reply via email to