mirror of
https://github.com/cloud-hypervisor/cloud-hypervisor.git
synced 2024-11-09 21:30:07 +00:00
87 lines
2.8 KiB
Markdown
87 lines
2.8 KiB
Markdown
|
# Sandboxing using Landlock
|
||
|
|
||
|
Landlock is a lightweight mechanism to allow unprivileged applications to
|
||
|
sandbox themselves.
|
||
|
|
||
|
During initial stages of running, applications can define the set of resources
|
||
|
(mostly files) they need to access during their lifetime. All such rules are
|
||
|
used to create a ruleset. Once the ruleset is applied, the process cannot access
|
||
|
any resources outside of the ruleset during its lifetime, even if it were
|
||
|
compromised.
|
||
|
|
||
|
Under the scope of `read` and `write` access, Landlock currently allows some
|
||
|
additional accesses (eg: for now, access to extended file attributes is always
|
||
|
allowed). Eventually, Landlock will only allow accesses similar to Unix
|
||
|
permissions.
|
||
|
|
||
|
## Host Setup
|
||
|
|
||
|
Landlock should be enabled in Host kernel to use it with cloud-hypervisor.
|
||
|
Please following [Kernel-Support](https://docs.kernel.org/userspace-api/landlock.html#kernel-support) link to enable Landlock on Host kernel.
|
||
|
|
||
|
|
||
|
Landlock support can be checked with following command:
|
||
|
```
|
||
|
$ sudo dmesg | grep -w landlock
|
||
|
[ 0.000000] landlock: Up and running.
|
||
|
```
|
||
|
Linux kernel confirms Landlock support with above message in dmesg.
|
||
|
|
||
|
## Implementation Details
|
||
|
|
||
|
To enable Landlock, Cloud-Hypervisor process needs the full list of files it
|
||
|
needs to access over its lifetime. Most of these files are received as VM
|
||
|
Configuration (`struct VmConfig`). Landlock is enabled in `vm_create` stage, as
|
||
|
this is the earliest stage in guest boot sequence which has access to guest's
|
||
|
VM Configuration.
|
||
|
|
||
|
## Enable Landlock
|
||
|
|
||
|
Append `--landlock` to Cloud-Hypervisor's command line to enable Landlock
|
||
|
support.
|
||
|
|
||
|
If you expect guest to access additional paths after it boots
|
||
|
(ex: during hotplug), those paths can be passed using `--landlock-rules` command
|
||
|
line parameter.
|
||
|
|
||
|
## Usage Examples
|
||
|
|
||
|
To enable Landlock:
|
||
|
|
||
|
```
|
||
|
./cloud-hypervisor \
|
||
|
--kernel ./linux-cloud-hypervisor/arch/x86/boot/compressed/vmlinux.bin \
|
||
|
--disk path=focal-server-cloudimg-amd64.raw path=/tmp/ubuntu-cloudinit.img \
|
||
|
--cmdline "console=hvc0 root=/dev/vda1 rw" \
|
||
|
--cpus boot=4 \
|
||
|
--memory size=1024M \
|
||
|
--net "tap=,mac=,ip=,mask=" \
|
||
|
--landlock
|
||
|
```
|
||
|
Hotplugging any new file-backed resources to above guest will result in
|
||
|
**Permission Denied** error.
|
||
|
|
||
|
To enable Landlock with hotplug support:
|
||
|
|
||
|
```
|
||
|
./cloud-hypervisor \
|
||
|
--api-socket /tmpXXXX/ch.socket \
|
||
|
--kernel ./linux-cloud-hypervisor/arch/x86/boot/compressed/vmlinux.bin \
|
||
|
--disk path=focal-server-cloudimg-amd64.raw path=/tmp/ubuntu-cloudinit.img \
|
||
|
--cmdline "console=hvc0 root=/dev/vda1 rw" \
|
||
|
--cpus boot=4 \
|
||
|
--memory size=1024M \
|
||
|
--net "tap=,mac=,ip=,mask=" \
|
||
|
--landlock \
|
||
|
--landlock-rules path="/path/to/hotplug1",access="rw" path="/path/to/hotplug2",access="rw"
|
||
|
|
||
|
./ch-remote --api-socket /tmpXXXX/ch.socket \
|
||
|
add-disk "path=/path/to/hotplug/blk.raw"
|
||
|
```
|
||
|
|
||
|
`--landlock-rules` accepts file or directory paths among its options.
|
||
|
|
||
|
# References
|
||
|
|
||
|
* https://landlock.io/
|