Received: by 2002:a25:23cc:0:0:0:0:0 with SMTP id j195csp868973ybj; Tue, 5 May 2020 08:49:16 -0700 (PDT) X-Google-Smtp-Source: APiQypJ3+8UBHfOVV1lN0mlySylUzbloeEQioKcKcI+g9OZ5dW1+5WBoNYOKAnEM5L0/YbNKj86g X-Received: by 2002:aa7:cb43:: with SMTP id w3mr3162516edt.95.1588693756405; Tue, 05 May 2020 08:49:16 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1588693756; cv=none; d=google.com; s=arc-20160816; b=T0Y8+vPYT0CSN3NEs6CDVLMSTo1i6rvm0m6IMYDA5+wxDpxsydVOjiXenhQV/7flC5 RjreFMpkKx7UFGSP3DUohxQpR67WHaTX1FYOCw3uiMbdZzbHmz7M9L72+0rqvDdTDg2x +GGvJlES2S8EAXOyWqr7Kid6Yq+nBrU4Tug4pq2dVwChj8ya9W8psnZmnKBbcDMy4PfK QNK0NycOILWFXCJm3qWm8z1xE3yUGi2eUQig/WY8t0LlT4CDX8JVY4ih1MynokwRxc7I 1xx61fMcorSQFB91g+H0XPtog1L3MAGVR05fbrgYUYryAE/Zfq3yInVEgHclGz7ldUNI o+OA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding :content-language:in-reply-to:mime-version:user-agent:date :message-id:from:references:cc:to:subject:dkim-signature; bh=4pG9Q3mxGfQII0zN/KiOtZT4U+FTy9kLkMvMkZu6fuA=; b=UzPDQX9qyOW3LiuVtyBaUuUJCKrwGmHhBfI+MvS/jymbGHq1ICNBH8c4NOuIh++eg5 jLO6zOR1Edn++p1SP5u8vxJ7VSGYjOjuNw0i5Iz54bF65CeI5hGE4JZ/b638ZK+A9xL/ /ydflXRnccIwPh+LY2yzCnpS88Dc1WT7YPbENi1T88YRvVcteSM95ms7z+x7C9s5B6bW u9MnTyoy9NwKSAvnncRS5AnOXJs5CKbIdfFHDDtbZ0qp+M6kAiLN9niIFUbtPYchAcrw 0HWdnRRqKZ3UjdXsUFslMd9SN/nbgKxNUeQXgofwJ9jB8t/o8nVw1Hrs++7o9o4UzbGK PfxA== ARC-Authentication-Results: i=1; mx.google.com; dkim=fail header.i=@infradead.org header.s=bombadil.20170209 header.b=aDgjCnQ8; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id bo2si1520639edb.438.2020.05.05.08.48.52; Tue, 05 May 2020 08:49:16 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=fail header.i=@infradead.org header.s=bombadil.20170209 header.b=aDgjCnQ8; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1730476AbgEEPon (ORCPT + 99 others); Tue, 5 May 2020 11:44:43 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:34900 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1729510AbgEEPom (ORCPT ); Tue, 5 May 2020 11:44:42 -0400 Received: from bombadil.infradead.org (bombadil.infradead.org [IPv6:2607:7c80:54:e::133]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 41F6DC061A0F; Tue, 5 May 2020 08:44:42 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=infradead.org; s=bombadil.20170209; h=Content-Transfer-Encoding: Content-Type:In-Reply-To:MIME-Version:Date:Message-ID:From:References:Cc:To: Subject:Sender:Reply-To:Content-ID:Content-Description; bh=4pG9Q3mxGfQII0zN/KiOtZT4U+FTy9kLkMvMkZu6fuA=; b=aDgjCnQ88jQ8GWFdgLyeqhtywg 4RPASZALdwfDM4GEFmKBqGjztwc5XP2UhxJQ4+jaUW9tf6+iQklDSbXlEDQayXqxCOiWMpxtilwdA qp5fykFBHZVnEqCXoKwGlpmPY9ZWatL+x47eD0VMek2+hRum8YLdbmR0a2Iyqi3M2nRUbRoaQqIlP jsZladMw2HtoZURiCgQsp/MwTnPYCsFnoE4TLRv+s9p+GYNhWayJPcsnIm0MxlP2fGRWP2lWct/uo oHca+LId/MCvpFZSlrm3j1tjVqMkj42sniuYrbHH/nWWF0D1RfTSFI3Hs29hcwIOnq1v7hwdGeZ94 Ibk/A2Ng==; Received: from [2601:1c0:6280:3f0::19c2] by bombadil.infradead.org with esmtpsa (Exim 4.92.3 #3 (Red Hat Linux)) id 1jVzkM-0004EJ-PU; Tue, 05 May 2020 15:44:38 +0000 Subject: Re: [PATCH v5 3/6] fs: Enable to enforce noexec mounts or file exec through O_MAYEXEC To: =?UTF-8?Q?Micka=c3=abl_Sala=c3=bcn?= , linux-kernel@vger.kernel.org Cc: Aleksa Sarai , Alexei Starovoitov , Al Viro , Andy Lutomirski , Christian Heimes , Daniel Borkmann , Deven Bowers , Eric Chiang , Florian Weimer , James Morris , Jan Kara , Jann Horn , Jonathan Corbet , Kees Cook , Lakshmi Ramasubramanian , Matthew Garrett , Matthew Wilcox , Michael Kerrisk , =?UTF-8?Q?Micka=c3=abl_Sala=c3=bcn?= , Mimi Zohar , =?UTF-8?Q?Philippe_Tr=c3=a9buchet?= , Scott Shell , Sean Christopherson , Shuah Khan , Steve Dower , Steve Grubb , Thibaut Sautereau , Vincent Strubel , kernel-hardening@lists.openwall.com, linux-api@vger.kernel.org, linux-integrity@vger.kernel.org, linux-security-module@vger.kernel.org, linux-fsdevel@vger.kernel.org References: <20200505153156.925111-1-mic@digikod.net> <20200505153156.925111-4-mic@digikod.net> From: Randy Dunlap Message-ID: Date: Tue, 5 May 2020 08:44:35 -0700 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:68.0) Gecko/20100101 Thunderbird/68.7.0 MIME-Version: 1.0 In-Reply-To: <20200505153156.925111-4-mic@digikod.net> Content-Type: text/plain; charset=utf-8 Content-Language: en-US Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 5/5/20 8:31 AM, Mickaël Salaün wrote: > diff --git a/security/Kconfig b/security/Kconfig > index cd3cc7da3a55..d8fac9240d14 100644 > --- a/security/Kconfig > +++ b/security/Kconfig > @@ -230,6 +230,32 @@ config STATIC_USERMODEHELPER_PATH > If you wish for all usermode helper programs to be disabled, > specify an empty string here (i.e. ""). > > +menuconfig OMAYEXEC_STATIC > + tristate "Configure O_MAYEXEC behavior at build time" > + ---help--- > + Enable to enforce O_MAYEXEC at build time, and disable the dedicated > + fs.open_mayexec_enforce sysctl. That help message is a bit confusing IMO. Does setting/enabling OMAYEXEC_STATIC both enforce O_MAYEXEC at build time and also disable the dedicated sysctl? Or are these meant to be alternatives, one for what Enabling this kconfig symbol does and the other for what Disabling this symbol does? If so, it doesn't say that. > + > + See Documentation/admin-guide/sysctl/fs.rst for more details. > + > +if OMAYEXEC_STATIC > + > +config OMAYEXEC_ENFORCE_MOUNT > + bool "Mount restriction" > + default y > + ---help--- > + Forbid opening files with the O_MAYEXEC option if their underlying VFS is > + mounted with the noexec option or if their superblock forbids execution > + of its content (e.g., /proc). > + > +config OMAYEXEC_ENFORCE_FILE > + bool "File permission restriction" > + ---help--- > + Forbid opening files with the O_MAYEXEC option if they are not marked as > + executable for the current process (e.g., POSIX permissions). > + > +endif # OMAYEXEC_STATIC > + > source "security/selinux/Kconfig" > source "security/smack/Kconfig" > source "security/tomoyo/Kconfig" -- ~Randy Reported-by: Randy Dunlap