( Resending via neomutt as plaintext since I think mlmmj may be filtering, please keep in mind this was originally intended for android kernel team and the set of CC's on replies should be: "Andrew Wheeler" <awheeler@xxxxxxxxxxxx>; "Sammy Que" <quebs2@xxxxxxxxxxxx>; Neill Kapron <nkapron@xxxxxxxxxx>; Todd Kjos <tkjos@xxxxxxxxxx>; Viktor Martensson <vmartensson@xxxxxxxxxx>; Andy Lutomirski <luto@xxxxxxxxxxxxxx>; keescook@xxxxxxxxxxxx <keescook@xxxxxxxxxxxx>; Will Drewry <wad@xxxxxxxxxxxx>; Andy Gross <agross@xxxxxxxxxx>; Bjorn Andersson <andersson@xxxxxxxxxx>; Konrad Dybcio <konrad.dybcio@xxxxxxxxxxxxxx>; kernel-team <kernel-team@xxxxxxxxxxx> ) Apologies if this is a "duplicate". Am sending to msm-kernel since this list should also be somewhat aware and may have engineer with knowledge on generated seccomp sandbox code. Thanks! (-: Hi Kernel Team, + Kees, Andy, and Will since their input may be valuable. It has been a while! (~9 months to be exact). This January, I sent out a small message on BPF code loading ("unprivileged BPF considered harmful" or something like that). In it, I noted new BPF programs are compiled all the time and thrown into the kernel. At the time, I did not know these programs were just compiled seccomp filter policies, loaded in as new BPF programs continuously through the libminijail interface as well as direct syscall. As of two days ago, I now know this (and now you do too, if not already). OK, yes, syscall filtering is very important, but this is creating a catch-22 issue. For one, see step (4) under "Exploitation overview" for https://www.qualys.com/2021/07/20/cve-2021-33909/sequoia-local-privilege-escalation-linux.txt. Second, this minor lack of caching is adding load time to more than 90 binaries/services on the standard QCOM baseline—I'll admit, it is probably negligible in the grand scheme of things (a quick approximation puts the data operated on around 0.1188 MB). But most importantly, third, without some degree of provenance, I have no way of telling if someone has injected malicious code into the kernel, and unfortunately even knowing the correct bytes is still "iffy", as in order to prevent JIT spray attacks, each of these filters is offset by some random number of uint32_t's, making every 4-byte shift of the filter a "valid" codepage to be loaded at runtime. You might be thinking, "but wait, bionic's libc only defines a couple of restricted policies, primary and secondary for system and user apps respectively." I know! For the most part, apps fall into either what I presume is the default app/system policies, but there are lots of QCOM binaries and other magic programs (dolby dax) that are sending up these programs as well. I'm seeing more than 20 different programs for around a minute's worth of runtime. One example is attached at the end. So, the proposal: a "CONFIG_SECCOMMP_STATIC_POLICY" for seccomp. This would change the Android kernel's generic SYS_seccomp call, which takes in a filter with an array of BPF instructions, to instead reference an ID which corresponds to a fixed file on /sys/bpf/seccomp or something like that. The sandboxing behavior of these apps should be known at compile-time, even if there are multiple "permission set types" that may need to be dispatched. User apps should always have a single, fixed policy. This way it is possible to say for every code page loaded into the kernel where it came from and what it should look like. Unfortunately, I do not know Motorola has enough "weight" to convince QCOM to do the right foundational thing here, or to "define" the seccomp APIs for Android, so it would be good to have Google's buy in, know if there are plans to fix this issue, or some discussion of how to best fix the problem? If anything, a contact at QCOM that might be able to actually hunt down and document valid bytes for these policies? The end goal is simple: when we see a code page is allocated in the kernel, we can be sure that (1) it isn't malicious and (2) has not been modified in transit. I'm fine putting code where my mouth is, but right now that code would involve having to fingerprint the signatures loaded by Qualcomm components every time a new one is released, or pinging Google with a huge patch changing how seccomp works with no idea of what requirements QCOM may have on seccomp policy generation. Thoughts? Is this doable, and if not, why? I'd also love help with the code and adapting existing minijail code to use a new, more integrity-preserving interface. If I am mistaken and it is possible to grab out valid BPF policy code at compile time, please let me know how! Regards, Maxwell Bland Standard filter, (from, for example, com.google.android.gms) "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", Unknown filter (from QCOM's /vendor/bin/qesdk-secmanager) "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", List of services loading seccomp filters pulled from one run of the phone: com.google.android.deskclock /vendor/bin/qesdk-secmanager media.hwcodec/vendor.qti.media.c2@1.0-service media.audio.qc.codec.qti.media.c2audio@1.0-service /vendor/bin/vendor.qti.qspmhal-service /vendor/bin/qsap_sensors media.extractoraextractor /system_ext/bin/perfservice /vendor/bin/wfdhdcphalservice /vendor/bin/wifidisplayhalservice /vendor/bin/qsap_dcfd /vendor/bin/qms /vendor/bin/qsap_location /vendor/bin/qsap_qapeservice /vendor/bin/wfdvndservice media.swcodecoid.media.swcodec/bin/mediaswcodec /vendor/bin/hw/qcrilNrd qsap_qms_13qms16 qsap_qms_24qms17 /vendor/bin/ATFWD-daemon /vendor/bin/hw/sxrservice /vendor/bin/hw/qcrilNrd-c2 system_server /vendor/bin/qmi_motext_hook1013170 /vendor/bin/qmi_motext_hook1013171 /vendor/bin/ims_rtp_daemon com.android.systemui webview_zygote com.dolby.daxservice vendor.qti.qesdk.sysservice org.codeaurora.ims com.android.se com.android.phone com.qti.qcc com.google.android.ext.services com.google.android.gms com.google.android.euicc com.google.android.googlequicksearchbox:interactor com.google.android.apps.messaging:rcs com.android.nfc com.qualcomm.qti.workloadclassifier com.qualcomm.location com.google.android.gms.unstable com.thundercomm.ar.core com.android.vending:background com.android.vending:quick_launch com.android.dynsystem com.android.managedprovisioning com.android.shell