Received: by 2002:a25:1985:0:0:0:0:0 with SMTP id 127csp930813ybz; Fri, 1 May 2020 11:09:20 -0700 (PDT) X-Google-Smtp-Source: APiQypIBO38E9GbWtZDhvMQJ34yOL/pJ5Y5q57jy81ybXS8E1A66tE7NbiZwsucQ/U6XmECik2KF X-Received: by 2002:a17:906:f13:: with SMTP id z19mr4387107eji.380.1588356560646; Fri, 01 May 2020 11:09:20 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1588356560; cv=none; d=google.com; s=arc-20160816; b=nF8uPoQF00K3vzj8c2VrZJwYIFHKCB262XKwb8VqaZXRf4Lh0H1vftHPAxcVQUCahV umhnHwsU4IR0KR7SvxckULVLMcIB8Rt0Tvo+CMgKtUQPw41RGIrMtloJRr5XOeZt71JT ru6RQzuUO34+/57PR2RCajQoqlMrg1VY3Rlhua4ToUUPRlWnR61iWk9wXssKLeIMu9GJ Lg4xGOnbrauf3tHe95qHniG21+AlBOVWw7SkPzIGsVdk3WGvxtnOQywpqtxs7yrGoldT Q27agxRIr5Wg8Q/kDZAYzR4H0ZWDoC1ABrmRAApiZClrpEZRb3nV/XkEAJsukMkGk372 3OOw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:mime-version:user-agent:references :message-id:in-reply-to:subject:cc:to:from:date; bh=XbNRCANlQ1/gHy0kSy89VRoG/Kwq5MiuzdPdf339uDE=; b=q7g7OCGRBDn8lko8i7luD4rDDbjl7j6RCavzHkdbSn4/5teV0hvwcmtrYMEbRlC0QQ S/tbt6CKAS2+pZ7qYHEHH/JBOq19NO1mKLL01h103olk0NtKxZuuJAczaIbk0BdcnOdH KrTeJO6HJZLIlP8TqguGpuL/VqHzDs1iSXzS7PW5jA0jo/cmNpKVpOPQG3CPYKrhUxSB mAUTQDdU/BlzipB/pb0APv6kSiE6LmdPejKdh/7fuA29EyIXbHbHpy9FuMUr0K0YAhfS 6gN9ohCre/xQAm5q7HmlmvFkGiScDUpX15I7RKPDo5lVx1OW3sZJt9cwcGDpbLWOzm6K WmUw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id z18si151713ejf.186.2020.05.01.11.08.57; Fri, 01 May 2020 11:09:20 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1729894AbgEASHX (ORCPT + 99 others); Fri, 1 May 2020 14:07:23 -0400 Received: from namei.org ([65.99.196.166]:56664 "EHLO namei.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1729138AbgEASHX (ORCPT ); Fri, 1 May 2020 14:07:23 -0400 Received: from localhost (localhost [127.0.0.1]) by namei.org (8.14.4/8.14.4) with ESMTP id 041I5rjc006112; Fri, 1 May 2020 18:05:53 GMT Date: Sat, 2 May 2020 04:05:53 +1000 (AEST) From: James Morris To: =?ISO-8859-15?Q?Micka=EBl_Sala=FCn?= cc: linux-kernel@vger.kernel.org, Aleksa Sarai , Alexei Starovoitov , Al Viro , Andy Lutomirski , Christian Heimes , Daniel Borkmann , Deven Bowers , Eric Chiang , Florian Weimer , Jan Kara , Jann Horn , Jonathan Corbet , Kees Cook , Matthew Garrett , Matthew Wilcox , Michael Kerrisk , =?ISO-8859-15?Q?Micka=EBl_Sala=FCn?= , Mimi Zohar , =?ISO-8859-15?Q?Philippe_Tr=E9buchet?= , Scott Shell , Sean Christopherson , Shuah Khan , Steve Dower , Steve Grubb , Thibaut Sautereau , Vincent Strubel , kernel-hardening@lists.openwall.com, linux-api@vger.kernel.org, linux-security-module@vger.kernel.org, linux-fsdevel@vger.kernel.org Subject: Re: [PATCH v3 3/5] fs: Enable to enforce noexec mounts or file exec through RESOLVE_MAYEXEC In-Reply-To: Message-ID: References: <20200428175129.634352-1-mic@digikod.net> <20200428175129.634352-4-mic@digikod.net> User-Agent: Alpine 2.21 (LRH 202 2017-01-01) MIME-Version: 1.0 Content-Type: multipart/mixed; boundary="1665246916-1237382289-1588356355=:5924" Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org This message is in MIME format. The first part should be readable text, while the remaining parts are likely unreadable without MIME-aware tools. --1665246916-1237382289-1588356355=:5924 Content-Type: text/plain; charset=iso-8859-15 Content-Transfer-Encoding: 8BIT On Fri, 1 May 2020, Micka?l Sala?n wrote: > > However, for fully controlled distros such as CLIP OS, it make sense to > enforce such restrictions at kernel build time. I can add an alternative > kernel configuration to enforce a particular policy at boot and disable > this sysctl. Sounds good. -- James Morris --1665246916-1237382289-1588356355=:5924--