[PATCH v3 2/5] fs: Add a MAY_EXECMOUNT flag to infer the noexec mount property
James Morris
jmorris at namei.org
Fri May 1 04:02:16 UTC 2020
On Tue, 28 Apr 2020, Mickaël Salaün wrote:
> An LSM doesn't get path information related to an access request to open
> an inode. This new (internal) MAY_EXECMOUNT flag enables an LSM to
> check if the underlying mount point of an inode is marked as executable.
> This is useful to implement a security policy taking advantage of the
> noexec mount option.
>
> This flag is set according to path_noexec(), which checks if a mount
> point is mounted with MNT_NOEXEC or if the underlying superblock is
> SB_I_NOEXEC.
>
> Signed-off-by: Mickaël Salaün <mic at digikod.net>
> Reviewed-by: Philippe Trébuchet <philippe.trebuchet at ssi.gouv.fr>
> Reviewed-by: Thibaut Sautereau <thibaut.sautereau at ssi.gouv.fr>
> Cc: Aleksa Sarai <cyphar at cyphar.com>
> Cc: Al Viro <viro at zeniv.linux.org.uk>
> Cc: Kees Cook <keescook at chromium.org>
Are there any existing LSMs which plan to use this aspect?
--
James Morris
<jmorris at namei.org>
More information about the Linux-security-module-archive
mailing list