From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from mail.hallyn.com (mail.hallyn.com [178.63.66.53]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 6B0BEA94F; Sun, 13 Oct 2024 03:04:18 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=178.63.66.53 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1728788660; cv=none; b=KuccJkSgWpl+sd+9IoyIr0u+Rb3iXFgqdBnQk+OT6Gs+RzvoajxAcxp8qBCycdqnwWzZ2iQi0yRCF4Up34t//fVWiwCHxbCV0sWVp7iCaWvGiX3f6WFGE1wQmPzl4A51b/gCGL1fbXvruzgps2/Org4f7THXkLStBO4hc0ujIe4= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1728788660; c=relaxed/simple; bh=Cu//dJwjvJhpfSidt16kc+lh4DfW37eE+mpvTKJMA60=; h=Date:From:To:Cc:Subject:Message-ID:References:MIME-Version: Content-Type:Content-Disposition:In-Reply-To; b=SdBJjTcjwNNU+D2x8AONAwMJ12NJ1e5mvACnJqpZyWiSV7SXXzNdFwL5LL6F2VZQKfyST+g70oE4am2M5f38TAPhNAxsvZdO/tUEaIaGH+pZiNjhtZAHOyJNRU2w4paYMkv7npwNnl6i8SJ3JeAGTu/aOA1zeeOy00fa6iMg9Uw= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dmarc=none (p=none dis=none) header.from=hallyn.com; spf=pass smtp.mailfrom=mail.hallyn.com; arc=none smtp.client-ip=178.63.66.53 Authentication-Results: smtp.subspace.kernel.org; dmarc=none (p=none dis=none) header.from=hallyn.com Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=mail.hallyn.com Received: by mail.hallyn.com (Postfix, from userid 1001) id 40C2B4B5; Sat, 12 Oct 2024 22:04:16 -0500 (CDT) Date: Sat, 12 Oct 2024 22:04:16 -0500 From: "Serge E. Hallyn" To: =?iso-8859-1?Q?Micka=EBl_Sala=FCn?= Cc: Al Viro , Christian Brauner , Kees Cook , Linus Torvalds , Paul Moore , Serge Hallyn , Theodore Ts'o , Adhemerval Zanella Netto , Alejandro Colomar , Aleksa Sarai , Andrew Morton , Andy Lutomirski , Arnd Bergmann , Casey Schaufler , Christian Heimes , Dmitry Vyukov , Elliott Hughes , Eric Biggers , Eric Chiang , Fan Wu , Florian Weimer , Geert Uytterhoeven , James Morris , Jan Kara , Jann Horn , Jeff Xu , Jonathan Corbet , Jordan R Abrahams , Lakshmi Ramasubramanian , Luca Boccassi , Luis Chamberlain , "Madhavan T . Venkataraman" , Matt Bobrowski , Matthew Garrett , Matthew Wilcox , Miklos Szeredi , Mimi Zohar , Nicolas Bouchinet , Scott Shell , Shuah Khan , Stephen Rothwell , Steve Dower , Steve Grubb , Thibaut Sautereau , Vincent Strubel , Xiaoming Ni , Yin Fengwei , kernel-hardening@lists.openwall.com, linux-api@vger.kernel.org, linux-fsdevel@vger.kernel.org, linux-integrity@vger.kernel.org, linux-kernel@vger.kernel.org, linux-security-module@vger.kernel.org Subject: Re: [PATCH v20 1/6] exec: Add a new AT_CHECK flag to execveat(2) Message-ID: <20241013030416.GA1056921@mail.hallyn.com> References: <20241011184422.977903-1-mic@digikod.net> <20241011184422.977903-2-mic@digikod.net> Precedence: bulk X-Mailing-List: linux-security-module@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Type: text/plain; charset=iso-8859-1 Content-Disposition: inline Content-Transfer-Encoding: 8bit In-Reply-To: <20241011184422.977903-2-mic@digikod.net> On Fri, Oct 11, 2024 at 08:44:17PM +0200, Mickaël Salaün wrote: > Add a new AT_CHECK flag to execveat(2) to check if a file would be Apologies for both bikeshedding and missing earlier discussions. But AT_CHECK sounds quite generic. How about AT_EXEC_CHECK, or AT_CHECK_EXEC_CREDS? (I would suggest just AT_CHECK_CREDS since it's for use in execveat(2), but as it's an AT_ flag, it's probably worth being more precise).