From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-7.1 required=3.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,HEADER_FROM_DIFFERENT_DOMAINS, MAILING_LIST_MULTI,SIGNED_OFF_BY,SPF_HELO_NONE,SPF_PASS,URIBL_BLOCKED autolearn=no autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id 02C92C433E4 for ; Fri, 24 Jul 2020 19:04:13 +0000 (UTC) Received: from mother.openwall.net (mother.openwall.net [195.42.179.200]) by mail.kernel.org (Postfix) with SMTP id 5645E206F6 for ; Fri, 24 Jul 2020 19:04:12 +0000 (UTC) Authentication-Results: mail.kernel.org; dkim=pass (1024-bit key) header.d=chromium.org header.i=@chromium.org header.b="U21XHuTN" DMARC-Filter: OpenDMARC Filter v1.3.2 mail.kernel.org 5645E206F6 Authentication-Results: mail.kernel.org; dmarc=fail (p=none dis=none) header.from=chromium.org Authentication-Results: mail.kernel.org; spf=pass smtp.mailfrom=kernel-hardening-return-19446-kernel-hardening=archiver.kernel.org@lists.openwall.com Received: (qmail 7946 invoked by uid 550); 24 Jul 2020 19:04:05 -0000 Mailing-List: contact kernel-hardening-help@lists.openwall.com; run by ezmlm Precedence: bulk List-Post: List-Help: List-Unsubscribe: List-Subscribe: List-ID: Received: (qmail 7923 invoked from network); 24 Jul 2020 19:04:04 -0000 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=chromium.org; s=google; h=date:from:to:cc:subject:message-id:references:mime-version :content-disposition:content-transfer-encoding:in-reply-to; bh=sdXgEvqGYHlymvqSceJ6jkKcKZE63vnTThrEFoJfoJI=; b=U21XHuTNZcd9Xi31/xCf87Rkodq7UIatsvvV/UwKN/JzlFCu0PB6GXerCOvF6wBSK+ SC2WOUDhPlu1q875fotSfx1rUNIyJCPwLsBy0JiUGot5W6Q50r/BPrfciAdVtp7Uwlle rtPo4Tole4s/1hOtfMBeGT54AFN8aogMq5g4g= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:date:from:to:cc:subject:message-id:references :mime-version:content-disposition:content-transfer-encoding :in-reply-to; bh=sdXgEvqGYHlymvqSceJ6jkKcKZE63vnTThrEFoJfoJI=; b=uU80vXAuLEr/8WHhiKTsIl9DnD7v/kB4ayhyZKz6Famf6G2E9xvi9Z2ZQr9hSk9u6c zVxrP6urTRvjn/zwCCqFDlt5pwM43BTJK+pDQsZtwmqDKdXvThXwutu0+bYDI8tm24ng CrOeTsTzL6bQdjcE8kwlYthLMotA3EOxI2PzhXKuB43NQ7hW2YTFG3KT1M48AJEhRAmF J6XuwGuFCSpPsrAg9FkHTBHCElXJF7ZlyFabhZ9m24EgAbozV2biFiDlIu2J7S3U0SH4 LQtkl0LMNJ5uSqaXDqR7NS6c5gh/BtKakdNvV2ozJuH+6RSKlqyoOaUkdQX1YY5TauFK jBzg== X-Gm-Message-State: AOAM531b0VfmzjsH4O+qlsFLrViIgjFWpTLhOwFUDzgBA0EcO6AAlHJ4 GVU2xJWZunGTmOmaGr3W2tkqkg== X-Google-Smtp-Source: ABdhPJxz4vuqoUWyBigx8RahhArmNJ84Nut7BOOCsUQANkvjswnwvqIw0Juf0zWwzmKl2+qs8JH6nQ== X-Received: by 2002:a63:140f:: with SMTP id u15mr9259752pgl.94.1595617432993; Fri, 24 Jul 2020 12:03:52 -0700 (PDT) Date: Fri, 24 Jul 2020 12:03:51 -0700 From: Kees Cook To: =?iso-8859-1?Q?Micka=EBl_Sala=FCn?= Cc: linux-kernel@vger.kernel.org, Aleksa Sarai , Alexei Starovoitov , Al Viro , Andrew Morton , Andy Lutomirski , Christian Brauner , Christian Heimes , Daniel Borkmann , Deven Bowers , Dmitry Vyukov , Eric Biggers , Eric Chiang , Florian Weimer , James Morris , Jan Kara , Jann Horn , Jonathan Corbet , Lakshmi Ramasubramanian , Matthew Garrett , Matthew Wilcox , Michael Kerrisk , Mimi Zohar , Philippe =?iso-8859-1?Q?Tr=E9buchet?= , Scott Shell , Sean Christopherson , Shuah Khan , Steve Dower , Steve Grubb , Tetsuo Handa , Thibaut Sautereau , Vincent Strubel , kernel-hardening@lists.openwall.com, linux-api@vger.kernel.org, linux-integrity@vger.kernel.org, linux-security-module@vger.kernel.org, linux-fsdevel@vger.kernel.org, Thibaut Sautereau Subject: Re: [PATCH v7 6/7] selftest/openat2: Add tests for O_MAYEXEC enforcing Message-ID: <202007241203.E4A515733@keescook> References: <20200723171227.446711-1-mic@digikod.net> <20200723171227.446711-7-mic@digikod.net> MIME-Version: 1.0 Content-Type: text/plain; charset=iso-8859-1 Content-Disposition: inline Content-Transfer-Encoding: 8bit In-Reply-To: <20200723171227.446711-7-mic@digikod.net> On Thu, Jul 23, 2020 at 07:12:26PM +0200, Mickaël Salaün wrote: > Test propagation of noexec mount points or file executability through > files open with or without O_MAYEXEC, thanks to the > fs.open_mayexec_enforce sysctl. > > Signed-off-by: Mickaël Salaün Reviewed-by: Kees Cook -- Kees Cook