|  | .. SPDX-License-Identifier: GPL-2.0 | 
|  |  | 
|  | ================================== | 
|  | Introduction of non-executable mfd | 
|  | ================================== | 
|  | :Author: | 
|  | Daniel Verkamp <dverkamp@chromium.org> | 
|  | Jeff Xu <jeffxu@chromium.org> | 
|  |  | 
|  | :Contributor: | 
|  | Aleksa Sarai <cyphar@cyphar.com> | 
|  |  | 
|  | Since Linux introduced the memfd feature, memfds have always had their | 
|  | execute bit set, and the memfd_create() syscall doesn't allow setting | 
|  | it differently. | 
|  |  | 
|  | However, in a secure-by-default system, such as ChromeOS, (where all | 
|  | executables should come from the rootfs, which is protected by verified | 
|  | boot), this executable nature of memfd opens a door for NoExec bypass | 
|  | and enables “confused deputy attack”.  E.g, in VRP bug [1]: cros_vm | 
|  | process created a memfd to share the content with an external process, | 
|  | however the memfd is overwritten and used for executing arbitrary code | 
|  | and root escalation. [2] lists more VRP of this kind. | 
|  |  | 
|  | On the other hand, executable memfd has its legit use: runc uses memfd’s | 
|  | seal and executable feature to copy the contents of the binary then | 
|  | execute them. For such a system, we need a solution to differentiate runc's | 
|  | use of executable memfds and an attacker's [3]. | 
|  |  | 
|  | To address those above: | 
|  | - Let memfd_create() set X bit at creation time. | 
|  | - Let memfd be sealed for modifying X bit when NX is set. | 
|  | - Add a new pid namespace sysctl: vm.memfd_noexec to help applications in | 
|  | migrating and enforcing non-executable MFD. | 
|  |  | 
|  | User API | 
|  | ======== | 
|  | ``int memfd_create(const char *name, unsigned int flags)`` | 
|  |  | 
|  | ``MFD_NOEXEC_SEAL`` | 
|  | When MFD_NOEXEC_SEAL bit is set in the ``flags``, memfd is created | 
|  | with NX. F_SEAL_EXEC is set and the memfd can't be modified to | 
|  | add X later. MFD_ALLOW_SEALING is also implied. | 
|  | This is the most common case for the application to use memfd. | 
|  |  | 
|  | ``MFD_EXEC`` | 
|  | When MFD_EXEC bit is set in the ``flags``, memfd is created with X. | 
|  |  | 
|  | Note: | 
|  | ``MFD_NOEXEC_SEAL`` implies ``MFD_ALLOW_SEALING``. In case that | 
|  | an app doesn't want sealing, it can add F_SEAL_SEAL after creation. | 
|  |  | 
|  |  | 
|  | Sysctl: | 
|  | ======== | 
|  | ``pid namespaced sysctl vm.memfd_noexec`` | 
|  |  | 
|  | The new pid namespaced sysctl vm.memfd_noexec has 3 values: | 
|  |  | 
|  | - 0: MEMFD_NOEXEC_SCOPE_EXEC | 
|  | memfd_create() without MFD_EXEC nor MFD_NOEXEC_SEAL acts like | 
|  | MFD_EXEC was set. | 
|  |  | 
|  | - 1: MEMFD_NOEXEC_SCOPE_NOEXEC_SEAL | 
|  | memfd_create() without MFD_EXEC nor MFD_NOEXEC_SEAL acts like | 
|  | MFD_NOEXEC_SEAL was set. | 
|  |  | 
|  | - 2: MEMFD_NOEXEC_SCOPE_NOEXEC_ENFORCED | 
|  | memfd_create() without MFD_NOEXEC_SEAL will be rejected. | 
|  |  | 
|  | The sysctl allows finer control of memfd_create for old software that | 
|  | doesn't set the executable bit; for example, a container with | 
|  | vm.memfd_noexec=1 means the old software will create non-executable memfd | 
|  | by default while new software can create executable memfd by setting | 
|  | MFD_EXEC. | 
|  |  | 
|  | The value of vm.memfd_noexec is passed to child namespace at creation | 
|  | time. In addition, the setting is hierarchical, i.e. during memfd_create, | 
|  | we will search from current ns to root ns and use the most restrictive | 
|  | setting. | 
|  |  | 
|  | [1] https://crbug.com/1305267 | 
|  |  | 
|  | [2] https://bugs.chromium.org/p/chromium/issues/list?q=type%3Dbug-security%20memfd%20escalation&can=1 | 
|  |  | 
|  | [3] https://lwn.net/Articles/781013/ |