|
Message-ID: <635df0655b644408ac4822def8900383@AcuMS.aculab.com> Date: Thu, 7 May 2020 09:44:18 +0000 From: David Laight <David.Laight@...LAB.COM> To: 'Mickaël Salaün' <mic@...ikod.net>, "linux-kernel@...r.kernel.org" <linux-kernel@...r.kernel.org> CC: Aleksa Sarai <cyphar@...har.com>, Alexei Starovoitov <ast@...nel.org>, "Al Viro" <viro@...iv.linux.org.uk>, Andy Lutomirski <luto@...nel.org>, "Christian Heimes" <christian@...hon.org>, Daniel Borkmann <daniel@...earbox.net>, "Deven Bowers" <deven.desai@...ux.microsoft.com>, Eric Chiang <ericchiang@...gle.com>, Florian Weimer <fweimer@...hat.com>, James Morris <jmorris@...ei.org>, Jan Kara <jack@...e.cz>, Jann Horn <jannh@...gle.com>, Jonathan Corbet <corbet@....net>, Kees Cook <keescook@...omium.org>, "Lakshmi Ramasubramanian" <nramas@...ux.microsoft.com>, Matthew Garrett <mjg59@...gle.com>, Matthew Wilcox <willy@...radead.org>, Michael Kerrisk <mtk.manpages@...il.com>, Mickaël Salaün <mickael.salaun@....gouv.fr>, Mimi Zohar <zohar@...ux.ibm.com>, Philippe Trébuchet <philippe.trebuchet@....gouv.fr>, Scott Shell <scottsh@...rosoft.com>, Sean Christopherson <sean.j.christopherson@...el.com>, Shuah Khan <shuah@...nel.org>, Steve Dower <steve.dower@...hon.org>, Steve Grubb <sgrubb@...hat.com>, Thibaut Sautereau <thibaut.sautereau@....gouv.fr>, Vincent Strubel <vincent.strubel@....gouv.fr>, "kernel-hardening@...ts.openwall.com" <kernel-hardening@...ts.openwall.com>, "linux-api@...r.kernel.org" <linux-api@...r.kernel.org>, "linux-integrity@...r.kernel.org" <linux-integrity@...r.kernel.org>, "linux-security-module@...r.kernel.org" <linux-security-module@...r.kernel.org>, "linux-fsdevel@...r.kernel.org" <linux-fsdevel@...r.kernel.org> Subject: RE: [PATCH v5 0/6] Add support for O_MAYEXEC From: Mickaël Salaün <mic@...ikod.net> > Sent: 07 May 2020 10:30 > On 07/05/2020 11:00, David Laight wrote: > > From: Mickaël Salaün > >> Sent: 07 May 2020 09:37 > > ... > >>> None of that description actually says what the patch actually does. > >> > >> "Add support for O_MAYEXEC" "to enable to control script execution". > >> What is not clear here? This seems well understood by other commenters. > >> The documentation patch and the talks can also help. > > > > I'm guessing that passing O_MAYEXEC to open() requests the kernel > > check for execute 'x' permissions (as well as read). > > Yes, but only with openat2(). It can't matter if the flag is ignored. It just means the kernel isn't enforcing the policy. If openat2() fail because the flag is unsupported then the application will need to retry without the flag. So if the user has any ability create executable files this is all pointless (from a security point of view). The user can either copy the file or copy in an interpreter that doesn't request O_MAYEXEC. It might stop accidental issues, but nothing malicious. > > Then kernel policy determines whether 'read' access is actually enough, > > or whether 'x' access (possibly masked by mount permissions) is needed. > > > > If that is true, two lines say what is does. > > The "A simple system-wide security policy" paragraph introduce that, but > I'll highlight it in the next cover letter. No it doesn't. It just says there is some kind of policy that some flags change. It doesn't say what is being checked for. > The most important point is > to understand why it is required, before getting to how it will be > implemented. But you don't say what is required. Just a load of buzzword ramblings. David - Registered Address Lakeside, Bramley Road, Mount Farm, Milton Keynes, MK1 1PT, UK Registration No: 1397386 (Wales)
Powered by blists - more mailing lists
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.