mirror of
https://git.kernel.org/pub/scm/linux/kernel/git/next/linux-next.git
synced 2025-01-07 14:32:23 +00:00
87 lines
3.1 KiB
ReStructuredText
87 lines
3.1 KiB
ReStructuredText
|
.. SPDX-License-Identifier: GPL-2.0
|
|||
|
|
|||
|
==================================
|
|||
|
Introduction of non-executable mfd
|
|||
|
==================================
|
|||
|
:Author:
|
|||
|
Daniel Verkamp <dverkamp@chromium.org>
|
|||
|
Jeff Xu <jeffxu@chromium.org>
|
|||
|
|
|||
|
:Contributor:
|
|||
|
Aleksa Sarai <cyphar@cyphar.com>
|
|||
|
|
|||
|
Since Linux introduced the memfd feature, memfds have always had their
|
|||
|
execute bit set, and the memfd_create() syscall doesn't allow setting
|
|||
|
it differently.
|
|||
|
|
|||
|
However, in a secure-by-default system, such as ChromeOS, (where all
|
|||
|
executables should come from the rootfs, which is protected by verified
|
|||
|
boot), this executable nature of memfd opens a door for NoExec bypass
|
|||
|
and enables “confused deputy attack”. E.g, in VRP bug [1]: cros_vm
|
|||
|
process created a memfd to share the content with an external process,
|
|||
|
however the memfd is overwritten and used for executing arbitrary code
|
|||
|
and root escalation. [2] lists more VRP of this kind.
|
|||
|
|
|||
|
On the other hand, executable memfd has its legit use: runc uses memfd’s
|
|||
|
seal and executable feature to copy the contents of the binary then
|
|||
|
execute them. For such a system, we need a solution to differentiate runc's
|
|||
|
use of executable memfds and an attacker's [3].
|
|||
|
|
|||
|
To address those above:
|
|||
|
- Let memfd_create() set X bit at creation time.
|
|||
|
- Let memfd be sealed for modifying X bit when NX is set.
|
|||
|
- Add a new pid namespace sysctl: vm.memfd_noexec to help applications in
|
|||
|
migrating and enforcing non-executable MFD.
|
|||
|
|
|||
|
User API
|
|||
|
========
|
|||
|
``int memfd_create(const char *name, unsigned int flags)``
|
|||
|
|
|||
|
``MFD_NOEXEC_SEAL``
|
|||
|
When MFD_NOEXEC_SEAL bit is set in the ``flags``, memfd is created
|
|||
|
with NX. F_SEAL_EXEC is set and the memfd can't be modified to
|
|||
|
add X later. MFD_ALLOW_SEALING is also implied.
|
|||
|
This is the most common case for the application to use memfd.
|
|||
|
|
|||
|
``MFD_EXEC``
|
|||
|
When MFD_EXEC bit is set in the ``flags``, memfd is created with X.
|
|||
|
|
|||
|
Note:
|
|||
|
``MFD_NOEXEC_SEAL`` implies ``MFD_ALLOW_SEALING``. In case that
|
|||
|
an app doesn't want sealing, it can add F_SEAL_SEAL after creation.
|
|||
|
|
|||
|
|
|||
|
Sysctl:
|
|||
|
========
|
|||
|
``pid namespaced sysctl vm.memfd_noexec``
|
|||
|
|
|||
|
The new pid namespaced sysctl vm.memfd_noexec has 3 values:
|
|||
|
|
|||
|
- 0: MEMFD_NOEXEC_SCOPE_EXEC
|
|||
|
memfd_create() without MFD_EXEC nor MFD_NOEXEC_SEAL acts like
|
|||
|
MFD_EXEC was set.
|
|||
|
|
|||
|
- 1: MEMFD_NOEXEC_SCOPE_NOEXEC_SEAL
|
|||
|
memfd_create() without MFD_EXEC nor MFD_NOEXEC_SEAL acts like
|
|||
|
MFD_NOEXEC_SEAL was set.
|
|||
|
|
|||
|
- 2: MEMFD_NOEXEC_SCOPE_NOEXEC_ENFORCED
|
|||
|
memfd_create() without MFD_NOEXEC_SEAL will be rejected.
|
|||
|
|
|||
|
The sysctl allows finer control of memfd_create for old software that
|
|||
|
doesn't set the executable bit; for example, a container with
|
|||
|
vm.memfd_noexec=1 means the old software will create non-executable memfd
|
|||
|
by default while new software can create executable memfd by setting
|
|||
|
MFD_EXEC.
|
|||
|
|
|||
|
The value of vm.memfd_noexec is passed to child namespace at creation
|
|||
|
time. In addition, the setting is hierarchical, i.e. during memfd_create,
|
|||
|
we will search from current ns to root ns and use the most restrictive
|
|||
|
setting.
|
|||
|
|
|||
|
[1] https://crbug.com/1305267
|
|||
|
|
|||
|
[2] https://bugs.chromium.org/p/chromium/issues/list?q=type%3Dbug-security%20memfd%20escalation&can=1
|
|||
|
|
|||
|
[3] https://lwn.net/Articles/781013/
|