| /linux/security/apparmor/include/ |
| H A D | file.h | 24 #define mask_mode_t(X) (X & (MAY_EXEC | MAY_WRITE | MAY_READ | MAY_APPEND)) 26 #define AA_AUDIT_FILE_MASK (MAY_READ | MAY_WRITE | MAY_EXEC | MAY_APPEND |\
|
| H A D | perms.h | 16 #define AA_MAY_EXEC MAY_EXEC
|
| /linux/security/apparmor/ |
| H A D | domain.c | 345 if (!(perms->allow & MAY_EXEC)) { in aa_xattrs_match() 430 if (perms->allow & MAY_EXEC) { in find_attach() 703 perms.audit |= MAY_EXEC; in profile_transition() 704 perms.allow |= MAY_EXEC; in profile_transition() 707 OP_EXEC, MAY_EXEC, name, target, new, cond->uid, in profile_transition() 720 if (perms.allow & MAY_EXEC) { in profile_transition() 731 perms.audit |= MAY_EXEC; in profile_transition() 742 perms.allow &= ~MAY_EXEC; in profile_transition() 781 aa_audit_file(subj_cred, profile, &perms, OP_EXEC, MAY_EXEC, name, in profile_transition() 1041 OP_EXEC, MAY_EXEC, in apparmor_bprm_creds_for_exec()
|
| H A D | file.c | 394 } else if ((lperms.allow & MAY_EXEC) && in profile_path_link() 396 lperms.allow &= ~MAY_EXEC; in profile_path_link() 397 request |= MAY_EXEC; in profile_path_link()
|
| /linux/security/integrity/ima/ |
| H A D | ima_main.c | 498 0, MAY_EXEC, MMAP_CHECK_REQPROT, 0, in ima_file_mmap() 506 0, MAY_EXEC, MMAP_CHECK, 0, false); in ima_file_mmap() 547 current_cred(), &prop, MAY_EXEC, MMAP_CHECK, in ima_file_mprotect() 550 current_cred(), &prop, MAY_EXEC, in ima_file_mprotect() 590 &prop, NULL, 0, MAY_EXEC, BPRM_CHECK, 0, 621 0, MAY_EXEC, CREDS_CHECK, 0, false); 655 * @mask: contains MAY_READ, MAY_WRITE, MAY_EXEC or MAY_APPEND 668 mask & (MAY_READ | MAY_WRITE | MAY_EXEC | in __ima_inode_hash()
|
| H A D | ima_policy.c | 170 {.action = MEASURE, .func = MMAP_CHECK, .mask = MAY_EXEC, 172 {.action = MEASURE, .func = BPRM_CHECK, .mask = MAY_EXEC, 182 {.action = MEASURE, .func = MMAP_CHECK, .mask = MAY_EXEC, 184 {.action = MEASURE, .func = BPRM_CHECK, .mask = MAY_EXEC, 1577 entry->mask = MAY_EXEC; in ima_parse_rule() 2154 if (entry->mask & MAY_EXEC) in ima_policy_show()
|
| /linux/fs/afs/ |
| H A D | security.c | 474 if (mask & (MAY_EXEC | MAY_READ | MAY_CHDIR)) { in afs_permission() 486 if ((mask & MAY_EXEC) && !(inode->i_mode & S_IXUSR)) in afs_permission() 488 if (mask & (MAY_EXEC | MAY_READ)) { in afs_permission()
|
| /linux/fs/coda/ |
| H A D | pioctl.c | 47 return (mask & MAY_EXEC) ? -EACCES : 0; in coda_ioctl_permission()
|
| H A D | dir.c | 84 mask &= MAY_READ | MAY_WRITE | MAY_EXEC; in coda_permission() 89 if ((mask & MAY_EXEC) && !execute_ok(inode)) in coda_permission()
|
| /linux/Documentation/ABI/testing/ |
| H A D | ima_policy | 41 [[^]MAY_EXEC] 116 measure func=FILE_MMAP mask=MAY_EXEC
|
| /linux/fs/configfs/ |
| H A D | symlink.c | 194 MAY_WRITE | MAY_EXEC); in configfs_symlink()
|
| /linux/security/smack/ |
| H A D | smack.h | 249 #define MAY_ANYREAD (MAY_READ | MAY_EXEC)
|
| H A D | smack_access.c | 295 if (access & MAY_EXEC) in smack_str_from_perm()
|
| H A D | smack_lsm.c | 1234 mask &= (MAY_READ|MAY_WRITE|MAY_EXEC|MAY_APPEND); in smack_inode_permission() 3125 may |= MAY_EXEC; in smack_flags_to_may()
|
| /linux/fs/ |
| H A D | namei.c | 543 mask &= MAY_READ | MAY_WRITE | MAY_EXEC; in generic_permission() 553 if (!(mask & MAY_EXEC) || (inode->i_mode & S_IXUGO)) in generic_permission() 685 mask |= MAY_EXEC; in lookup_inode_permission_may_exec() 3118 return inode_permission(idmap, base->d_inode, MAY_EXEC); in lookup_one_common() 3668 error = inode_permission(idmap, dir, MAY_WRITE | MAY_EXEC); in may_delete_dentry() 3713 return inode_permission(idmap, dir, MAY_WRITE | MAY_EXEC); in may_create_dentry() 4226 if (acc_mode & MAY_EXEC) in may_open() 4236 if (acc_mode & MAY_EXEC) in may_open() 4241 if ((acc_mode & MAY_EXEC) && path_noexec(path)) in may_open() 4306 MAY_WRITE | MAY_EXEC); in may_o_create() [all …]
|
| H A D | exec.c | 770 .acc_mode = MAY_EXEC, in do_open_execat() 1557 err = inode_permission(idmap, inode, MAY_EXEC); in bprm_fill_uid()
|
| H A D | posix_acl.c | 383 want &= MAY_READ | MAY_WRITE | MAY_EXEC; in posix_acl_permission()
|
| /linux/fs/nfs/ |
| H A D | dir.c | 3273 mask |= MAY_EXEC; in nfs_access_calc_mask() 3278 mask |= MAY_EXEC; in nfs_access_calc_mask() 3329 if ((mask & ~cache_mask & (MAY_READ | MAY_WRITE | MAY_EXEC)) != 0) in nfs_do_access() 3342 mask = MAY_EXEC; in nfs_open_permission_mask() 3385 if ((mask & (MAY_READ | MAY_WRITE | MAY_EXEC)) == 0) in nfs_permission() 3414 if (!res && (mask & MAY_EXEC)) in nfs_permission()
|
| /linux/fs/nfsd/ |
| H A D | nfsfh.c | 44 d_inode(parent), MAY_EXEC); in nfsd_acceptable()
|
| H A D | vfs.c | 2884 acc & (MAY_READ | MAY_WRITE | MAY_EXEC)); in nfsd_permission() 2890 err = inode_permission(&nop_mnt_idmap, inode, MAY_EXEC); in nfsd_permission()
|
| /linux/fs/proc/ |
| H A D | proc_sysctl.c | 431 if ((op & ~mode & (MAY_READ|MAY_WRITE|MAY_EXEC)) == 0) in test_perm() 804 if ((mask & MAY_EXEC) && S_ISREG(inode->i_mode)) in proc_sys_permission()
|
| /linux/fs/fuse/ |
| H A D | dir.c | 1716 inarg.mask = mask & (MAY_READ | MAY_WRITE | MAY_EXEC); in fuse_access() 1769 ((mask & MAY_EXEC) && S_ISREG(inode->i_mode))) { in fuse_permission() 1802 } else if ((mask & MAY_EXEC) && S_ISREG(inode->i_mode)) { in fuse_permission()
|
| /linux/fs/smb/server/ |
| H A D | vfs.c | 136 if (!inode_permission(idmap, d_inode(dentry), MAY_OPEN | MAY_EXEC)) in ksmbd_vfs_query_maximal_access() 139 if (!inode_permission(idmap, d_inode(dentry->d_parent), MAY_EXEC | MAY_WRITE)) in ksmbd_vfs_query_maximal_access()
|
| /linux/fs/hostfs/ |
| H A D | hostfs_kern.c | 788 if (desired & MAY_EXEC) x = 1; in hostfs_permission()
|
| /linux/fs/smb/client/ |
| H A D | cifsfs.c | 429 if ((mask & MAY_EXEC) && !execute_ok(inode)) in cifs_permission()
|