Based on kernel version 6.11
. Page generated on 2024-09-24 08:21 EST
.
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 | .. SPDX-License-Identifier: GPL-2.0 ================================== Introduction of non-executable mfd ================================== :Author: Daniel Verkamp <dverkamp@chromium.org> Jeff Xu <jeffxu@chromium.org> :Contributor: Aleksa Sarai <cyphar@cyphar.com> Since Linux introduced the memfd feature, memfds have always had their execute bit set, and the memfd_create() syscall doesn't allow setting it differently. However, in a secure-by-default system, such as ChromeOS, (where all executables should come from the rootfs, which is protected by verified boot), this executable nature of memfd opens a door for NoExec bypass and enables “confused deputy attack”. E.g, in VRP bug [1]: cros_vm process created a memfd to share the content with an external process, however the memfd is overwritten and used for executing arbitrary code and root escalation. [2] lists more VRP of this kind. On the other hand, executable memfd has its legit use: runc uses memfd’s seal and executable feature to copy the contents of the binary then execute them. For such a system, we need a solution to differentiate runc's use of executable memfds and an attacker's [3]. To address those above: - Let memfd_create() set X bit at creation time. - Let memfd be sealed for modifying X bit when NX is set. - Add a new pid namespace sysctl: vm.memfd_noexec to help applications in migrating and enforcing non-executable MFD. User API ======== ``int memfd_create(const char *name, unsigned int flags)`` ``MFD_NOEXEC_SEAL`` When MFD_NOEXEC_SEAL bit is set in the ``flags``, memfd is created with NX. F_SEAL_EXEC is set and the memfd can't be modified to add X later. MFD_ALLOW_SEALING is also implied. This is the most common case for the application to use memfd. ``MFD_EXEC`` When MFD_EXEC bit is set in the ``flags``, memfd is created with X. Note: ``MFD_NOEXEC_SEAL`` implies ``MFD_ALLOW_SEALING``. In case that an app doesn't want sealing, it can add F_SEAL_SEAL after creation. Sysctl: ======== ``pid namespaced sysctl vm.memfd_noexec`` The new pid namespaced sysctl vm.memfd_noexec has 3 values: - 0: MEMFD_NOEXEC_SCOPE_EXEC memfd_create() without MFD_EXEC nor MFD_NOEXEC_SEAL acts like MFD_EXEC was set. - 1: MEMFD_NOEXEC_SCOPE_NOEXEC_SEAL memfd_create() without MFD_EXEC nor MFD_NOEXEC_SEAL acts like MFD_NOEXEC_SEAL was set. - 2: MEMFD_NOEXEC_SCOPE_NOEXEC_ENFORCED memfd_create() without MFD_NOEXEC_SEAL will be rejected. The sysctl allows finer control of memfd_create for old software that doesn't set the executable bit; for example, a container with vm.memfd_noexec=1 means the old software will create non-executable memfd by default while new software can create executable memfd by setting MFD_EXEC. The value of vm.memfd_noexec is passed to child namespace at creation time. In addition, the setting is hierarchical, i.e. during memfd_create, we will search from current ns to root ns and use the most restrictive setting. [1] https://crbug.com/1305267 [2] https://bugs.chromium.org/p/chromium/issues/list?q=type%3Dbug-security%20memfd%20escalation&can=1 [3] https://lwn.net/Articles/781013/ |