Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1753652Ab2KUAOG (ORCPT ); Tue, 20 Nov 2012 19:14:06 -0500 Received: from mail-bk0-f46.google.com ([209.85.214.46]:47012 "EHLO mail-bk0-f46.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1752977Ab2KUAOE (ORCPT ); Tue, 20 Nov 2012 19:14:04 -0500 MIME-Version: 1.0 In-Reply-To: <20121120204238.GA19554@www.outflux.net> References: <20121120204238.GA19554@www.outflux.net> From: Kay Sievers Date: Wed, 21 Nov 2012 01:13:42 +0100 Message-ID: Subject: Re: [PATCH v2] devtmpfs: mount with noexec and nosuid To: Kees Cook Cc: linux-kernel@vger.kernel.org, Greg Kroah-Hartman , ellyjones@chromium.org, Roland Eggner Content-Type: text/plain; charset=UTF-8 Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 838 Lines: 18 On Tue, Nov 20, 2012 at 9:42 PM, Kees Cook wrote: > Since devtmpfs is writable, make the default noexec,nosuid as well. This > protects from the case of a privileged process having an arbitrary file > write flaw and an argumentless arbitrary execution (i.e. it would lack > the ability to run "mount -o remount,exec,suid /dev"). This only really applies to systems without an initramfs when the kernel mounts /dev over the rootfs it has mounted; with an initramfs, /dev is always mounted by user code. Just checking, that is the use case you are doing that for? Kay -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/