Open wryMitts opened 8 months ago
Hi @wryMitts, Thanks for creating this issue!
As I understand the terminology in this LKML discussion, they use:
ret2dir
for executing exploit payload using the direct mapping,read2dir
for getting data needed for exploit using the direct mapping. On the Linux Kernel Defence Map, we already have ret2dir + ROP/JOP/COP
, but read2dir
would be a more generic term.Let's see whether read2dir
become a popular term (for adding it in future).
Please see the commit https://github.com/a13xp0p0v/linux-kernel-defence-map/commit/02cd95c11eb33a76e607c05f8a218c856b12865a, where I fixed the link from cluster_cfi
. Now CFI is connected to all control flow hijack techniques, which is more correct. Thank you!
Hmmm...
Maybe we need to add something like Userspace Data Access via direct mapping
(or linear mapping?) instead of read2dir
to show that the XPFO
approach provides additional security effects comparing to CFI.
But this concept looks very long.
After reading these conversations, per Torvalds and other devs it seems that XPFO's defense on ret2dir is less of a code execution threat, and more a data exposure threat. The term was coined "read2dir" instead.
Thoughts on the map, perhaps move ret2dir under CFI protections, but also split to have read2dir?
Related emails with Torvalds and other kernel dev comments: https://lore.kernel.org/all/CAHk-=whUwOjFW6RjHVM8kNOv1QVLJuHj2Dda0=mpLPdJ1UyatQ@mail.gmail.com/ https://lore.kernel.org/all/CALCETrXm9PuUTEEmzA8bQJmg=PHC_2XSywECittVhXbMJS1rSA@mail.gmail.com/ https://lore.kernel.org/all/CAGXu5jL-qJtW7eH8S2yhqciE+J+FWz8HHzTrGJTgVUbd55n6dQ@mail.gmail.com/ https://lore.kernel.org/all/8f9d059d-e720-cd24-faa6-45493fc012e0@oracle.com/ https://lore.kernel.org/all/302e3d5b-d2fd-3c25-335b-466ba83035c5@oracle.com/ https://lore.kernel.org/all/CAGXu5jLPkD_6BL1m2=13KVTfZ7znr-xAyz+CB23eoeboFgCSOg@mail.gmail.com/#t