| .. SPDX-License-Identifier: GPL-2.0 | 
 | .. Copyright © 2024 Microsoft Corporation | 
 |  | 
 | =================== | 
 | Executability check | 
 | =================== | 
 |  | 
 | The ``AT_EXECVE_CHECK`` :manpage:`execveat(2)` flag, and the | 
 | ``SECBIT_EXEC_RESTRICT_FILE`` and ``SECBIT_EXEC_DENY_INTERACTIVE`` securebits | 
 | are intended for script interpreters and dynamic linkers to enforce a | 
 | consistent execution security policy handled by the kernel.  See the | 
 | `samples/check-exec/inc.c`_ example. | 
 |  | 
 | Whether an interpreter should check these securebits or not depends on the | 
 | security risk of running malicious scripts with respect to the execution | 
 | environment, and whether the kernel can check if a script is trustworthy or | 
 | not.  For instance, Python scripts running on a server can use arbitrary | 
 | syscalls and access arbitrary files.  Such interpreters should then be | 
 | enlighten to use these securebits and let users define their security policy. | 
 | However, a JavaScript engine running in a web browser should already be | 
 | sandboxed and then should not be able to harm the user's environment. | 
 |  | 
 | Script interpreters or dynamic linkers built for tailored execution environments | 
 | (e.g. hardened Linux distributions or hermetic container images) could use | 
 | ``AT_EXECVE_CHECK`` without checking the related securebits if backward | 
 | compatibility is handled by something else (e.g. atomic update ensuring that | 
 | all legitimate libraries are allowed to be executed).  It is then recommended | 
 | for script interpreters and dynamic linkers to check the securebits at run time | 
 | by default, but also to provide the ability for custom builds to behave like if | 
 | ``SECBIT_EXEC_RESTRICT_FILE`` or ``SECBIT_EXEC_DENY_INTERACTIVE`` were always | 
 | set to 1 (i.e. always enforce restrictions). | 
 |  | 
 | AT_EXECVE_CHECK | 
 | =============== | 
 |  | 
 | Passing the ``AT_EXECVE_CHECK`` flag to :manpage:`execveat(2)` only performs a | 
 | check on a regular file and returns 0 if execution of this file would be | 
 | allowed, ignoring the file format and then the related interpreter dependencies | 
 | (e.g. ELF libraries, script's shebang). | 
 |  | 
 | Programs should always perform this check to apply kernel-level checks against | 
 | files that are not directly executed by the kernel but passed to a user space | 
 | interpreter instead.  All files that contain executable code, from the point of | 
 | view of the interpreter, should be checked.  However the result of this check | 
 | should only be enforced according to ``SECBIT_EXEC_RESTRICT_FILE`` or | 
 | ``SECBIT_EXEC_DENY_INTERACTIVE.``. | 
 |  | 
 | The main purpose of this flag is to improve the security and consistency of an | 
 | execution environment to ensure that direct file execution (e.g. | 
 | ``./script.sh``) and indirect file execution (e.g. ``sh script.sh``) lead to | 
 | the same result.  For instance, this can be used to check if a file is | 
 | trustworthy according to the caller's environment. | 
 |  | 
 | In a secure environment, libraries and any executable dependencies should also | 
 | be checked.  For instance, dynamic linking should make sure that all libraries | 
 | are allowed for execution to avoid trivial bypass (e.g. using ``LD_PRELOAD``). | 
 | For such secure execution environment to make sense, only trusted code should | 
 | be executable, which also requires integrity guarantees. | 
 |  | 
 | To avoid race conditions leading to time-of-check to time-of-use issues, | 
 | ``AT_EXECVE_CHECK`` should be used with ``AT_EMPTY_PATH`` to check against a | 
 | file descriptor instead of a path. | 
 |  | 
 | SECBIT_EXEC_RESTRICT_FILE and SECBIT_EXEC_DENY_INTERACTIVE | 
 | ========================================================== | 
 |  | 
 | When ``SECBIT_EXEC_RESTRICT_FILE`` is set, a process should only interpret or | 
 | execute a file if a call to :manpage:`execveat(2)` with the related file | 
 | descriptor and the ``AT_EXECVE_CHECK`` flag succeed. | 
 |  | 
 | This secure bit may be set by user session managers, service managers, | 
 | container runtimes, sandboxer tools...  Except for test environments, the | 
 | related ``SECBIT_EXEC_RESTRICT_FILE_LOCKED`` bit should also be set. | 
 |  | 
 | Programs should only enforce consistent restrictions according to the | 
 | securebits but without relying on any other user-controlled configuration. | 
 | Indeed, the use case for these securebits is to only trust executable code | 
 | vetted by the system configuration (through the kernel), so we should be | 
 | careful to not let untrusted users control this configuration. | 
 |  | 
 | However, script interpreters may still use user configuration such as | 
 | environment variables as long as it is not a way to disable the securebits | 
 | checks.  For instance, the ``PATH`` and ``LD_PRELOAD`` variables can be set by | 
 | a script's caller.  Changing these variables may lead to unintended code | 
 | executions, but only from vetted executable programs, which is OK.  For this to | 
 | make sense, the system should provide a consistent security policy to avoid | 
 | arbitrary code execution e.g., by enforcing a write xor execute policy. | 
 |  | 
 | When ``SECBIT_EXEC_DENY_INTERACTIVE`` is set, a process should never interpret | 
 | interactive user commands (e.g. scripts).  However, if such commands are passed | 
 | through a file descriptor (e.g. stdin), its content should be interpreted if a | 
 | call to :manpage:`execveat(2)` with the related file descriptor and the | 
 | ``AT_EXECVE_CHECK`` flag succeed. | 
 |  | 
 | For instance, script interpreters called with a script snippet as argument | 
 | should always deny such execution if ``SECBIT_EXEC_DENY_INTERACTIVE`` is set. | 
 |  | 
 | This secure bit may be set by user session managers, service managers, | 
 | container runtimes, sandboxer tools...  Except for test environments, the | 
 | related ``SECBIT_EXEC_DENY_INTERACTIVE_LOCKED`` bit should also be set. | 
 |  | 
 | Here is the expected behavior for a script interpreter according to combination | 
 | of any exec securebits: | 
 |  | 
 | 1. ``SECBIT_EXEC_RESTRICT_FILE=0`` and ``SECBIT_EXEC_DENY_INTERACTIVE=0`` | 
 |  | 
 |    Always interpret scripts, and allow arbitrary user commands (default). | 
 |  | 
 |    No threat, everyone and everything is trusted, but we can get ahead of | 
 |    potential issues thanks to the call to :manpage:`execveat(2)` with | 
 |    ``AT_EXECVE_CHECK`` which should always be performed but ignored by the | 
 |    script interpreter.  Indeed, this check is still important to enable systems | 
 |    administrators to verify requests (e.g. with audit) and prepare for | 
 |    migration to a secure mode. | 
 |  | 
 | 2. ``SECBIT_EXEC_RESTRICT_FILE=1`` and ``SECBIT_EXEC_DENY_INTERACTIVE=0`` | 
 |  | 
 |    Deny script interpretation if they are not executable, but allow | 
 |    arbitrary user commands. | 
 |  | 
 |    The threat is (potential) malicious scripts run by trusted (and not fooled) | 
 |    users.  That can protect against unintended script executions (e.g. ``sh | 
 |    /tmp/*.sh``).  This makes sense for (semi-restricted) user sessions. | 
 |  | 
 | 3. ``SECBIT_EXEC_RESTRICT_FILE=0`` and ``SECBIT_EXEC_DENY_INTERACTIVE=1`` | 
 |  | 
 |    Always interpret scripts, but deny arbitrary user commands. | 
 |  | 
 |    This use case may be useful for secure services (i.e. without interactive | 
 |    user session) where scripts' integrity is verified (e.g.  with IMA/EVM or | 
 |    dm-verity/IPE) but where access rights might not be ready yet.  Indeed, | 
 |    arbitrary interactive commands would be much more difficult to check. | 
 |  | 
 | 4. ``SECBIT_EXEC_RESTRICT_FILE=1`` and ``SECBIT_EXEC_DENY_INTERACTIVE=1`` | 
 |  | 
 |    Deny script interpretation if they are not executable, and also deny | 
 |    any arbitrary user commands. | 
 |  | 
 |    The threat is malicious scripts run by untrusted users (but trusted code). | 
 |    This makes sense for system services that may only execute trusted scripts. | 
 |  | 
 | .. Links | 
 | .. _samples/check-exec/inc.c: | 
 |    https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/tree/samples/check-exec/inc.c |