[PATCH v3 2/5] fs: Add a MAY_EXECMOUNT flag to infer the noexec mount property

James Morris jmorris at namei.org
Fri May 1 04:02:16 UTC 2020


On Tue, 28 Apr 2020, Mickaël Salaün wrote:

> An LSM doesn't get path information related to an access request to open
> an inode.  This new (internal) MAY_EXECMOUNT flag enables an LSM to
> check if the underlying mount point of an inode is marked as executable.
> This is useful to implement a security policy taking advantage of the
> noexec mount option.
> 
> This flag is set according to path_noexec(), which checks if a mount
> point is mounted with MNT_NOEXEC or if the underlying superblock is
> SB_I_NOEXEC.
> 
> Signed-off-by: Mickaël Salaün <mic at digikod.net>
> Reviewed-by: Philippe Trébuchet <philippe.trebuchet at ssi.gouv.fr>
> Reviewed-by: Thibaut Sautereau <thibaut.sautereau at ssi.gouv.fr>
> Cc: Aleksa Sarai <cyphar at cyphar.com>
> Cc: Al Viro <viro at zeniv.linux.org.uk>
> Cc: Kees Cook <keescook at chromium.org>

Are there any existing LSMs which plan to use this aspect?

-- 
James Morris
<jmorris at namei.org>


More information about the Linux-security-module-archive mailing list