On Mon, 2009-04-20 at 18:24 -0400, Eric Paris wrote: > On Mon, 2009-04-20 at 15:41 -0400, Stephen Smalley wrote: > > > diff --git a/fs/open.c b/fs/open.c > > > index 377eb25..485cfd8 100644 > > > --- a/fs/open.c > > > +++ b/fs/open.c > > > @@ -493,7 +493,7 @@ SYSCALL_DEFINE3(faccessat, int, dfd, const char __user *, filename, int, mode) > > > goto out_path_release; > > > } > > > > > > - res = inode_permission(inode, mode | MAY_ACCESS); > > > + res = inode_access_permission(inode, mode | MAY_ACCESS); > > > > I had forgotten that there is already a MAY_ACCESS flag defined and used > > by the vfs. So why can't we just pass that on to the security modules > > and use that to distinguish access(2) from open(2)? Looks like it gets > > used on chdir(2) and chroot(2) as well, which is unfortunate, and I > > don't quite understand why. Maybe we need to look back at the origins > > of the MAY_ACCESS flag and its rationale. > > Actually since both of those should be S_ISDIR we should still be able > to tell in the case we care about. I'm not sure what I was smoking when I thought this... Can we just pretend that line of that e-mail was never sent? -- This message was distributed to subscribers of the selinux mailing list. If you no longer wish to subscribe, send mail to majordomo@xxxxxxxxxxxxx with the words "unsubscribe selinux" without quotes as the message.