Received: by 2002:a25:1985:0:0:0:0:0 with SMTP id 127csp252271ybz; Thu, 30 Apr 2020 21:05:04 -0700 (PDT) X-Google-Smtp-Source: APiQypJxprlBDIuY9yMF7OvH9zwUdg3LcFhLC9J8rwpdekuQMJXRF3qVsOHhMtI6kUWIGq5HrrCU X-Received: by 2002:a50:8dc2:: with SMTP id s2mr2017332edh.318.1588305904131; Thu, 30 Apr 2020 21:05:04 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1588305904; cv=none; d=google.com; s=arc-20160816; b=e39pi9GHXQzhvfhuvwVEd1b9rqMHir90L2B8TvSFw+Wu5ZzwH20HSYZsoKcweHZwaI te1p6mRpsW+RbZdiXB0RrNKcQ33iIBPUGrk9aIG3CP+B+gQSyiaaocdFy02M7+/vrMHV W17Yyr3QwXPfZJKxtW/hJsbu8YxnsC4V2ZYGYbuRRs9bWP34ZMaC7berwyxwxlqds808 6+VrXvTggkebKCKzAvFCO6SMoMfVH25J5cDj6DLl3BLOshxvmaahOfJc5FI4ArKqZ7c+ aoX9lt942UJfJA4z8DbUiG8YiSYLtUhcyNi8XprSswNqX4UKZtPIbowNs1UHEWztWo65 UvgQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-id:mime-version:user-agent :references:message-id:in-reply-to:subject:cc:to:from:date; bh=/xhx2UcyofNlcY6F1MbacAYKquLnZTwWN3q7LV8wR0Q=; b=L0XUDx/zA4vHuXgmDRO+/qgbcNg8QyHXtikEflMRBSVrPrn/Iuou/1kTt4eZoxHdVq dCysz5/Lx+PdwIx3nNiko52pQ17qSQB946ykXFNelYmir4QMkvdoFVy4e3dIg+i62SVB o4kiPHJNA+YcstADOdYtB7csNs2p8TZHKMy5QRuK21+p3m1yOFvUqwSPyKghAtCl17oG mmmgXSGlJOUZidyXZ9TsVzjTk7RTiisik22yeHVW/EmuGguA+PJFtMqbogD/CZmhAJDR M5zEKMLIpeRfj/LbUYdzISFzWsEX/x7WFhY6S0ZzQWQW9oIdVrn8v6U8aCzLzzxLDmyi BtlQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id y89si1007240edy.357.2020.04.30.21.04.41; Thu, 30 Apr 2020 21:05:04 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728194AbgEAEDP (ORCPT + 99 others); Fri, 1 May 2020 00:03:15 -0400 Received: from namei.org ([65.99.196.166]:56446 "EHLO namei.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1725791AbgEAEDP (ORCPT ); Fri, 1 May 2020 00:03:15 -0400 Received: from localhost (localhost [127.0.0.1]) by namei.org (8.14.4/8.14.4) with ESMTP id 04142GZx030634; Fri, 1 May 2020 04:02:16 GMT Date: Fri, 1 May 2020 14:02:16 +1000 (AEST) From: James Morris To: =?ISO-8859-15?Q?Micka=EBl_Sala=FCn?= cc: linux-kernel@vger.kernel.org, Aleksa Sarai , Alexei Starovoitov , Al Viro , Andy Lutomirski , Christian Heimes , Daniel Borkmann , Deven Bowers , Eric Chiang , Florian Weimer , Jan Kara , Jann Horn , Jonathan Corbet , Kees Cook , Matthew Garrett , Matthew Wilcox , Michael Kerrisk , =?ISO-8859-15?Q?Micka=EBl_Sala=FCn?= , Mimi Zohar , =?ISO-8859-15?Q?Philippe_Tr=E9buchet?= , Scott Shell , Sean Christopherson , Shuah Khan , Steve Dower , Steve Grubb , Thibaut Sautereau , Vincent Strubel , kernel-hardening@lists.openwall.com, linux-api@vger.kernel.org, linux-security-module@vger.kernel.org, linux-fsdevel@vger.kernel.org Subject: Re: [PATCH v3 2/5] fs: Add a MAY_EXECMOUNT flag to infer the noexec mount property In-Reply-To: <20200428175129.634352-3-mic@digikod.net> Message-ID: References: <20200428175129.634352-1-mic@digikod.net> <20200428175129.634352-3-mic@digikod.net> User-Agent: Alpine 2.21 (LRH 202 2017-01-01) MIME-Version: 1.0 Content-Type: multipart/mixed; BOUNDARY="1665246916-2066436414-1588305635=:29679" Content-ID: Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org This message is in MIME format. The first part should be readable text, while the remaining parts are likely unreadable without MIME-aware tools. --1665246916-2066436414-1588305635=:29679 Content-Type: text/plain; CHARSET=ISO-8859-15 Content-Transfer-Encoding: 8BIT Content-ID: On Tue, 28 Apr 2020, Micka?l Sala?n wrote: > An LSM doesn't get path information related to an access request to open > an inode. This new (internal) MAY_EXECMOUNT flag enables an LSM to > check if the underlying mount point of an inode is marked as executable. > This is useful to implement a security policy taking advantage of the > noexec mount option. > > This flag is set according to path_noexec(), which checks if a mount > point is mounted with MNT_NOEXEC or if the underlying superblock is > SB_I_NOEXEC. > > Signed-off-by: Micka?l Sala?n > Reviewed-by: Philippe Tr?buchet > Reviewed-by: Thibaut Sautereau > Cc: Aleksa Sarai > Cc: Al Viro > Cc: Kees Cook Are there any existing LSMs which plan to use this aspect? -- James Morris --1665246916-2066436414-1588305635=:29679--