From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from eggs.gnu.org ([140.186.70.92]:34230) by lists.gnu.org with esmtp (Exim 4.71) (envelope-from ) id 1RZ395-0003fO-PG for qemu-devel@nongnu.org; Fri, 09 Dec 2011 11:18:03 -0500 Received: from Debian-exim by eggs.gnu.org with spam-scanned (Exim 4.71) (envelope-from ) id 1RZ394-0003Yq-Qd for qemu-devel@nongnu.org; Fri, 09 Dec 2011 11:17:59 -0500 Received: from relay1.mentorg.com ([192.94.38.131]:40417) by eggs.gnu.org with esmtp (Exim 4.71) (envelope-from ) id 1RZ394-0003Yl-JF for qemu-devel@nongnu.org; Fri, 09 Dec 2011 11:17:58 -0500 From: Paul Brook Date: Fri, 9 Dec 2011 16:17:50 +0000 References: <4EDFAF91.4070904@linux.vnet.ibm.com> In-Reply-To: <4EDFAF91.4070904@linux.vnet.ibm.com> MIME-Version: 1.0 Content-Type: Text/Plain; charset="utf-8" Content-Transfer-Encoding: 7bit Message-Id: <201112091617.50928.paul@codesourcery.com> Subject: Re: [Qemu-devel] [RFC] Device sandboxing List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , To: qemu-devel@nongnu.org Cc: Ashley D Lai , Anthony Liguori , Stefan Hajnoczi , Corey Bryant , Michael Halcrow , Eric Paris , Paul Moore , Radim =?utf-8?q?Kr=C4=8Dm=C3=A1=C5=99?= , Avi Kivity , Richa Marwaha , Amit Shah , Eduardo Terrell Ferrari Otubo , Lee Terrell , George Wilson > A group of us are starting to work on sandboxing QEMU device emulation > code. We're just getting started investigating various approaches, and > want to engage the community to gather input. > > Following are the design points that we are currently considering: > > * Decompose QEMU into multiple processes: > > * This could be done such that QEMU devices execute in separate > processes based on device type, e.g. all block devices in one > process and all network devices in a second process. Another > alternative is executing a separate process per device. I can't help wondering if nested virtualization would be a better solution. i.e. have an outer VM that only implements a trusted subset of devices. Inside that run a VM that provides the flakey legacy device emulation you expect to be compromised. Paul