Skip to content

capablevms/CHERI-ELF-comp

Repository files navigation

CHERI ELF compartmentalisation

An approach to provide compartmentalisation to user-code in a hybrid CHERI environment.

Overview

The idea is to provide a library with an API to allow user-code to be compartmentalized with respect to data. This means that when we enter a compartment, we expect to not be able to read or write from memory that is not associated with that compartment. This is achieved via the default data capability (DDC) register.

Eventual desired functionality:

  • load a binary, identifying appropriate entry points
  • execute a loaded binary, given a previously identified valid entry point
  • inter-compartment communication, either via capabilities, or shared memory

High-level idea

This project provides an API for managing compartments. The exposed functionality includes:

  • creating compartments from a given, pre-compiled ELF shared object file;
  • mapping the compartment to memory (essentially instantiating it);
  • executing a compartment by calling pre-defined entry points (not fully implemented as of yet);
  • and disposing of a compartment (not fully implemented as of yet).

Each compartment is defined around a single, given shared object ELF file. Additional library dependencies of the original ELF file are searched (currently using the COMP_LIBRARY_PATH environment variable), and loaded in the same compartment, alongside the original library file. Each compartment will be restricted to its own memory chunk (including malloc operations and stack), and should not be able to access (i.e., load or store) any memory outside the chunk determined by the manager.

Compartments are allocated a chunk of the manager process' memory, and the executable code of the compartment is loaded inside that chunk. A capability is created, bounding the allocated chunk, and the compartment is "defined" by this capability. Whenever we transition to a given compartment, we load its respective capability inside the DDC, essentially limiting memory loads and stores within the compartment's allocated memory region. Once the compartment is loaded into memory, we are able to call functions defined in the binary from the manager.

There is one exception when a compartment may access memory outside its designated region: if it is passed a capability by another compartment, then that capability may be used to access memory defined by the capability, which originally would be exclusively owned by the original owner of that (now) shared memory chunk. This would be useful for sharing more complex data across compartments, but doing so essentially removes the security over the shared region for the original owner compartment, so must be done so sparsely.

Structure overview

The project is split into the following components (subject to change):

  • manager - this exposes the main API that users are expected to use. It offers functions to initialize a compartment from a given ELF binary, execute a compartment, and general compartment management features. It currently does not support deleting compartments.
  • compartment - this is mainly to do with compartment internals, and reading ELF data for the given input file, managing memory, and various other interesting bits we do to ensure code can function when DDC-compartmentalized.
  • intercept - a feature to automatically intercept functions within compartments that need to be executed within a higher-trust level. To our knowledge, these are functions that might call into vDSO12, or perform system calls. Other situations might be added here as we explore more.
  • mem_mng - we implement a simple bump allocator to ensure that internal compartment memory allocations are done within the compartment, in the area specifically marked to be used as heap. This is the implementation of the allocator

Executing a compartment

TODO

  • transitioning into a compartment, ensuring no data is leaked, and state is consistent;
  • inter-compartment communication;
  • transitioning out of a compartment, returning some required result;
  • defining compartment entry points.

Function interception

Not all functions within a compartment can be executed with a restrained DDC. For example, vDSO functions would not have access to the vDSO page dynamically loaded against the manager, and memory management functions are not aware of the limited space allocated to a compartment for scratch memory. As such, we intercept these functions, in order to execute them with higher privilege (i.e., unbound DDC), and in a controlled fashion. This involves patching each intercepted function with code to perform a transition into the manager (at the same time unbounding the DDC), performing the associated function, then transitioning back into the compartment.

Limitations (and sort-of main TODO list)

Current limitations (as this is a work in progress, some of these are planned to be addressed):

  • single compartment;
  • only 3 arguments supported for argument passing, not floats or pointers.
  • did not check for support for capabilities within compartments

Footnotes

  1. https://en.wikipedia.org/wiki/VDSO

  2. https://lwn.net/Articles/446528/

About

No description, website, or topics provided.

Resources

License

Unknown, MIT licenses found

Licenses found

Unknown
LICENSE-APACHE
MIT
LICENSE-MIT

Stars

Watchers

Forks

Packages

No packages published

Contributors 3

  •  
  •  
  •