On Tue, 28 Apr 2020, Mickaël Salaün wrote: > An LSM doesn't get path information related to an access request to open > an inode. This new (internal) MAY_EXECMOUNT flag enables an LSM to > check if the underlying mount point of an inode is marked as executable. > This is useful to implement a security policy taking advantage of the > noexec mount option. > > This flag is set according to path_noexec(), which checks if a mount > point is mounted with MNT_NOEXEC or if the underlying superblock is > SB_I_NOEXEC. > > Signed-off-by: Mickaël Salaün <m...@digikod.net> > Reviewed-by: Philippe Trébuchet <philippe.trebuc...@ssi.gouv.fr> > Reviewed-by: Thibaut Sautereau <thibaut.sauter...@ssi.gouv.fr> > Cc: Aleksa Sarai <cyp...@cyphar.com> > Cc: Al Viro <v...@zeniv.linux.org.uk> > Cc: Kees Cook <keesc...@chromium.org>
Are there any existing LSMs which plan to use this aspect? -- James Morris <jmor...@namei.org>