On Tue, 28 Apr 2020, Mickaël Salaün wrote:

> An LSM doesn't get path information related to an access request to open
> an inode.  This new (internal) MAY_EXECMOUNT flag enables an LSM to
> check if the underlying mount point of an inode is marked as executable.
> This is useful to implement a security policy taking advantage of the
> noexec mount option.
> 
> This flag is set according to path_noexec(), which checks if a mount
> point is mounted with MNT_NOEXEC or if the underlying superblock is
> SB_I_NOEXEC.
> 
> Signed-off-by: Mickaël Salaün <m...@digikod.net>
> Reviewed-by: Philippe Trébuchet <philippe.trebuc...@ssi.gouv.fr>
> Reviewed-by: Thibaut Sautereau <thibaut.sauter...@ssi.gouv.fr>
> Cc: Aleksa Sarai <cyp...@cyphar.com>
> Cc: Al Viro <v...@zeniv.linux.org.uk>
> Cc: Kees Cook <keesc...@chromium.org>

Are there any existing LSMs which plan to use this aspect?

-- 
James Morris
<jmor...@namei.org>

Reply via email to