/linux/security/apparmor/include/ |
H A D | file.h | 24 #define mask_mode_t(X) (X & (MAY_EXEC | MAY_WRITE | MAY_READ | MAY_APPEND)) 26 #define AA_AUDIT_FILE_MASK (MAY_READ | MAY_WRITE | MAY_EXEC | MAY_APPEND |\
|
H A D | perms.h | 16 #define AA_MAY_EXEC MAY_EXEC
|
/linux/security/integrity/ima/ |
H A D | ima_main.c | 456 0, MAY_EXEC, MMAP_CHECK_REQPROT); in ima_file_mmap() 463 0, MAY_EXEC, MMAP_CHECK); in ima_file_mmap() 504 current_cred(), &prop, MAY_EXEC, MMAP_CHECK, in ima_file_mprotect() 507 current_cred(), &prop, MAY_EXEC, in ima_file_mprotect() 548 &prop, NULL, 0, MAY_EXEC, BPRM_CHECK); in ima_bprm_check() 554 MAY_EXEC, CREDS_CHECK); in ima_bprm_check() 573 mask & (MAY_READ | MAY_WRITE | MAY_EXEC | in ima_file_check()
|
H A D | ima_policy.c | 166 {.action = MEASURE, .func = MMAP_CHECK, .mask = MAY_EXEC, 168 {.action = MEASURE, .func = BPRM_CHECK, .mask = MAY_EXEC, 178 {.action = MEASURE, .func = MMAP_CHECK, .mask = MAY_EXEC, 180 {.action = MEASURE, .func = BPRM_CHECK, .mask = MAY_EXEC, 1553 entry->mask = MAY_EXEC; in ima_parse_rule() 2112 if (entry->mask & MAY_EXEC) in ima_policy_show()
|
/linux/fs/afs/ |
H A D | security.c | 441 if (mask & (MAY_EXEC | MAY_READ | MAY_CHDIR)) { in afs_permission() 453 if ((mask & MAY_EXEC) && !(inode->i_mode & S_IXUSR)) in afs_permission() 455 if (mask & (MAY_EXEC | MAY_READ)) { in afs_permission()
|
/linux/fs/coda/ |
H A D | pioctl.c | 47 return (mask & MAY_EXEC) ? -EACCES : 0; in coda_ioctl_permission()
|
H A D | dir.c | 84 mask &= MAY_READ | MAY_WRITE | MAY_EXEC; in coda_permission() 89 if ((mask & MAY_EXEC) && !execute_ok(inode)) in coda_permission()
|
/linux/fs/ |
H A D | init.c | 52 error = path_permission(&path, MAY_EXEC | MAY_CHDIR); in init_chdir() 67 error = path_permission(&path, MAY_EXEC | MAY_CHDIR); in init_chroot()
|
H A D | open.c | 491 if ((mode & MAY_EXEC) && S_ISREG(inode->i_mode)) { in do_faccessat() 557 error = path_permission(&path, MAY_EXEC | MAY_CHDIR); in SYSCALL_DEFINE1() 584 error = file_permission(fd_file(f), MAY_EXEC | MAY_CHDIR); in SYSCALL_DEFINE1() 600 error = path_permission(&path, MAY_EXEC | MAY_CHDIR); in SYSCALL_DEFINE1()
|
H A D | namei.c | 490 mask &= MAY_READ | MAY_WRITE | MAY_EXEC; in generic_permission() 500 if (!(mask & MAY_EXEC) || (inode->i_mode & S_IXUGO)) in generic_permission() 1819 err = inode_permission(idmap, nd->inode, mask | MAY_EXEC); in may_lookup() 1834 return inode_permission(idmap, nd->inode, MAY_EXEC); in may_lookup() 2849 return inode_permission(idmap, base->d_inode, MAY_EXEC); in lookup_one_common() 3129 error = inode_permission(idmap, dir, MAY_WRITE | MAY_EXEC); in may_delete() 3173 return inode_permission(idmap, dir, MAY_WRITE | MAY_EXEC); in may_create() 3398 if (acc_mode & MAY_EXEC) in may_open() 3408 if (acc_mode & MAY_EXEC) in may_open() 3413 if ((acc_mode & MAY_EXEC) && path_noexec(path)) in may_open() [all …]
|
H A D | posix_acl.c | 383 want &= MAY_READ | MAY_WRITE | MAY_EXEC; in posix_acl_permission()
|
/linux/security/apparmor/ |
H A D | domain.c | 340 if (!(perm & MAY_EXEC)) { in aa_xattrs_match() 426 if (perm & MAY_EXEC) { in find_attach() 676 if (perms.allow & MAY_EXEC) { in profile_transition() 685 /* remove MAY_EXEC to audit as failure or complaint */ in profile_transition() 686 perms.allow &= ~MAY_EXEC; in profile_transition() 725 aa_audit_file(subj_cred, profile, &perms, OP_EXEC, MAY_EXEC, name, in profile_transition() 984 OP_EXEC, MAY_EXEC, in apparmor_bprm_creds_for_exec()
|
H A D | file.c | 384 } else if ((lperms.allow & MAY_EXEC) && in profile_path_link() 386 lperms.allow &= ~MAY_EXEC; in profile_path_link() 387 request |= MAY_EXEC; in profile_path_link()
|
H A D | lsm.c | 477 fctx->allow = MAY_EXEC | MAY_READ | AA_EXEC_MMAP; in apparmor_file_open()
|
/linux/Documentation/ABI/testing/ |
H A D | ima_policy | 40 [[^]MAY_EXEC] 115 measure func=FILE_MMAP mask=MAY_EXEC
|
/linux/fs/configfs/ |
H A D | symlink.c | 200 MAY_WRITE | MAY_EXEC); in configfs_symlink()
|
/linux/security/smack/ |
H A D | smack.h | 245 #define MAY_ANYREAD (MAY_READ | MAY_EXEC)
|
H A D | smack_access.c | 294 if (access & MAY_EXEC) in smack_str_from_perm()
|
H A D | smackfs.c | 278 perm |= MAY_EXEC; in smk_perm_from_str() 588 if (srp->smk_access & MAY_EXEC) in smk_rule_show()
|
H A D | smack_lsm.c | 116 if (mode & MAY_EXEC) in smk_bu_mode() 1217 mask &= (MAY_READ|MAY_WRITE|MAY_EXEC|MAY_APPEND); in smack_inode_permission() 3087 may |= MAY_EXEC; in smack_flags_to_may()
|
/linux/fs/nfs/ |
H A D | dir.c | 3231 mask |= MAY_EXEC; in nfs_access_calc_mask() 3236 mask |= MAY_EXEC; in nfs_access_calc_mask() 3287 if ((mask & ~cache_mask & (MAY_READ | MAY_WRITE | MAY_EXEC)) != 0) in nfs_do_access() 3300 mask = MAY_EXEC; in nfs_open_permission_mask() 3343 if ((mask & (MAY_READ | MAY_WRITE | MAY_EXEC)) == 0) in nfs_permission() 3372 if (!res && (mask & MAY_EXEC)) in nfs_permission()
|
/linux/fs/bcachefs/ |
H A D | fs-ioctl.c | 457 dir, MAY_WRITE | MAY_EXEC); in bch2_ioctl_subvolume_create()
|
/linux/fs/smb/server/ |
H A D | vfs.c | 157 if (!inode_permission(idmap, d_inode(dentry), MAY_OPEN | MAY_EXEC)) in ksmbd_vfs_query_maximal_access() 160 if (!inode_permission(idmap, d_inode(dentry->d_parent), MAY_EXEC | MAY_WRITE)) in ksmbd_vfs_query_maximal_access()
|
/linux/fs/hostfs/ |
H A D | hostfs_kern.c | 792 if (desired & MAY_EXEC) x = 1; in hostfs_permission()
|
/linux/fs/btrfs/ |
H A D | ioctl.c | 947 error = inode_permission(idmap, dir, MAY_WRITE | MAY_EXEC); in btrfs_may_delete() 980 return inode_permission(idmap, dir, MAY_WRITE | MAY_EXEC); in btrfs_may_create() 2010 MAY_READ | MAY_EXEC); in btrfs_search_path_in_tree_user() 2564 ret = inode_permission(idmap, inode, MAY_WRITE | MAY_EXEC); in btrfs_ioctl_snap_destroy()
|