Things like link_path_walk check for MAY_EXEC on directories as it walks path names. The open perms checking was actually checking open on these as well. This patch excludes checking open when the only requested permission on the dir was MAY_EXEC. open and opendir both still require open perms. Signed-off-by: Eric Paris <eparis@xxxxxxxxxx> --- security/selinux/hooks.c | 9 +++++---- 1 files changed, 5 insertions(+), 4 deletions(-) diff --git a/security/selinux/hooks.c b/security/selinux/hooks.c index 3e3fde7..188284f 100644 --- a/security/selinux/hooks.c +++ b/security/selinux/hooks.c @@ -1707,11 +1707,12 @@ static inline u32 open_file_mask_to_av(int mode, int mask) av |= BLK_FILE__OPEN; else if (S_ISFIFO(mode)) av |= FIFO_FILE__OPEN; - else if (S_ISDIR(mode)) - av |= DIR__OPEN; - else + else if (S_ISDIR(mode)) { + if (mask != MAY_EXEC) + av |= DIR__OPEN; + } else printk(KERN_ERR "SELinux: WARNING: inside %s with " - "unknown mode:%x\n", __func__, mode); + "unknown mode:%o mask:%x\n", __func__, mode, mask); } return av; } -- This message was distributed to subscribers of the selinux mailing list. If you no longer wish to subscribe, send mail to majordomo@xxxxxxxxxxxxx with the words "unsubscribe selinux" without quotes as the message.