/linux-6.3-rc2/security/apparmor/include/ |
A D | file.h | 24 #define mask_mode_t(X) (X & (MAY_EXEC | MAY_WRITE | MAY_READ | MAY_APPEND)) 26 #define AA_AUDIT_FILE_MASK (MAY_READ | MAY_WRITE | MAY_EXEC | MAY_APPEND |\
|
A D | perms.h | 16 #define AA_MAY_EXEC MAY_EXEC
|
/linux-6.3-rc2/security/integrity/ima/ |
A D | ima_main.c | 425 0, MAY_EXEC, MMAP_CHECK_REQPROT); in ima_file_mmap() 432 0, MAY_EXEC, MMAP_CHECK); in ima_file_mmap() 471 current_cred(), secid, MAY_EXEC, MMAP_CHECK, in ima_file_mprotect() 474 current_cred(), secid, MAY_EXEC, in ima_file_mprotect() 515 MAY_EXEC, BPRM_CHECK); in ima_bprm_check() 521 MAY_EXEC, CREDS_CHECK); in ima_bprm_check() 540 mask & (MAY_READ | MAY_WRITE | MAY_EXEC | in ima_file_check()
|
A D | ima_policy.c | 166 {.action = MEASURE, .func = MMAP_CHECK, .mask = MAY_EXEC, 168 {.action = MEASURE, .func = BPRM_CHECK, .mask = MAY_EXEC, 178 {.action = MEASURE, .func = MMAP_CHECK, .mask = MAY_EXEC, 180 {.action = MEASURE, .func = BPRM_CHECK, .mask = MAY_EXEC, 1548 entry->mask = MAY_EXEC; in ima_parse_rule() 2112 if (entry->mask & MAY_EXEC) in ima_policy_show()
|
/linux-6.3-rc2/fs/coda/ |
A D | pioctl.c | 47 return (mask & MAY_EXEC) ? -EACCES : 0; in coda_ioctl_permission()
|
A D | dir.c | 84 mask &= MAY_READ | MAY_WRITE | MAY_EXEC; in coda_permission() 89 if ((mask & MAY_EXEC) && !execute_ok(inode)) in coda_permission()
|
/linux-6.3-rc2/fs/afs/ |
A D | security.c | 441 if (mask & (MAY_EXEC | MAY_READ | MAY_CHDIR)) { in afs_permission() 453 if ((mask & MAY_EXEC) && !(inode->i_mode & S_IXUSR)) in afs_permission() 455 if (mask & (MAY_EXEC | MAY_READ)) { in afs_permission()
|
/linux-6.3-rc2/fs/ |
A D | init.c | 52 error = path_permission(&path, MAY_EXEC | MAY_CHDIR); in init_chdir() 67 error = path_permission(&path, MAY_EXEC | MAY_CHDIR); in init_chroot()
|
A D | open.c | 489 if ((mode & MAY_EXEC) && S_ISREG(inode->i_mode)) { in do_faccessat() 555 error = path_permission(&path, MAY_EXEC | MAY_CHDIR); in SYSCALL_DEFINE1() 584 error = file_permission(f.file, MAY_EXEC | MAY_CHDIR); in SYSCALL_DEFINE1() 603 error = path_permission(&path, MAY_EXEC | MAY_CHDIR); in SYSCALL_DEFINE1()
|
A D | namei.c | 424 mask &= MAY_READ | MAY_WRITE | MAY_EXEC; in generic_permission() 434 if (!(mask & MAY_EXEC) || (inode->i_mode & S_IXUGO)) in generic_permission() 1716 return inode_permission(idmap, nd->inode, MAY_EXEC); in may_lookup() 2656 return inode_permission(idmap, base->d_inode, MAY_EXEC); in lookup_one_common() 2936 error = inode_permission(idmap, dir, MAY_WRITE | MAY_EXEC); in may_delete() 2980 return inode_permission(idmap, dir, MAY_WRITE | MAY_EXEC); in may_create() 3168 if (acc_mode & MAY_EXEC) in may_open() 3178 if (acc_mode & MAY_EXEC) in may_open() 3183 if ((acc_mode & MAY_EXEC) && path_noexec(path)) in may_open() 3246 MAY_WRITE | MAY_EXEC); in may_o_create() [all …]
|
A D | exec.c | 130 .acc_mode = MAY_READ | MAY_EXEC, in SYSCALL_DEFINE1() 906 .acc_mode = MAY_EXEC, in do_open_execat()
|
A D | posix_acl.c | 385 want &= MAY_READ | MAY_WRITE | MAY_EXEC; in posix_acl_permission()
|
/linux-6.3-rc2/security/apparmor/ |
A D | domain.c | 333 if (!(perm & MAY_EXEC)) { in aa_xattrs_match() 419 if (perm & MAY_EXEC) { in find_attach() 666 if (perms.allow & MAY_EXEC) { in profile_transition() 677 perms.allow &= ~MAY_EXEC; in profile_transition() 712 aa_audit_file(profile, &perms, OP_EXEC, MAY_EXEC, name, target, new, in profile_transition() 974 aa_audit_file(profile, &nullperms, OP_EXEC, MAY_EXEC, in apparmor_bprm_creds_for_exec()
|
A D | file.c | 372 } else if ((lperms.allow & MAY_EXEC) && in profile_path_link() 374 lperms.allow &= ~MAY_EXEC; in profile_path_link() 375 request |= MAY_EXEC; in profile_path_link()
|
/linux-6.3-rc2/Documentation/ABI/testing/ |
A D | ima_policy | 40 [[^]MAY_EXEC] 115 measure func=FILE_MMAP mask=MAY_EXEC
|
/linux-6.3-rc2/fs/configfs/ |
A D | symlink.c | 200 MAY_WRITE | MAY_EXEC); in configfs_symlink()
|
/linux-6.3-rc2/security/smack/ |
A D | smack.h | 244 #define MAY_ANYREAD (MAY_READ | MAY_EXEC)
|
A D | smack_access.c | 294 if (access & MAY_EXEC) in smack_str_from_perm()
|
/linux-6.3-rc2/fs/gfs2/ |
A D | inode.c | 327 error = gfs2_permission(&nop_mnt_idmap, dir, MAY_EXEC); in gfs2_lookupi() 358 MAY_WRITE | MAY_EXEC); in create_ok() 971 error = gfs2_permission(&nop_mnt_idmap, dir, MAY_WRITE | MAY_EXEC); in gfs2_link() 1090 MAY_WRITE | MAY_EXEC); in gfs2_unlink_ok() 1516 MAY_WRITE | MAY_EXEC); in gfs2_rename()
|
/linux-6.3-rc2/fs/nfs/ |
A D | dir.c | 3162 mask |= MAY_EXEC; in nfs_access_calc_mask() 3167 mask |= MAY_EXEC; in nfs_access_calc_mask() 3218 if ((mask & ~cache_mask & (MAY_READ | MAY_WRITE | MAY_EXEC)) != 0) in nfs_do_access() 3231 mask = MAY_EXEC; in nfs_open_permission_mask() 3274 if ((mask & (MAY_READ | MAY_WRITE | MAY_EXEC)) == 0) in nfs_permission() 3303 if (!res && (mask & MAY_EXEC)) in nfs_permission()
|
/linux-6.3-rc2/fs/ksmbd/ |
A D | vfs.c | 114 MAY_EXEC | MAY_WRITE); in ksmbd_vfs_may_delete() 138 if (!inode_permission(idmap, d_inode(dentry), MAY_OPEN | MAY_EXEC)) in ksmbd_vfs_query_maximal_access() 148 if (!inode_permission(idmap, d_inode(parent), MAY_EXEC | MAY_WRITE)) in ksmbd_vfs_query_maximal_access()
|
/linux-6.3-rc2/fs/nfsd/ |
A D | nfsfh.c | 44 d_inode(parent), MAY_EXEC); in nfsd_acceptable()
|
/linux-6.3-rc2/fs/fuse/ |
A D | dir.c | 1361 inarg.mask = mask & (MAY_READ | MAY_WRITE | MAY_EXEC); in fuse_access() 1414 ((mask & MAY_EXEC) && S_ISREG(inode->i_mode))) { in fuse_permission() 1447 } else if ((mask & MAY_EXEC) && S_ISREG(inode->i_mode)) { in fuse_permission()
|
/linux-6.3-rc2/fs/proc/ |
A D | proc_sysctl.c | 427 if ((op & ~mode & (MAY_READ|MAY_WRITE|MAY_EXEC)) == 0) in test_perm() 813 if ((mask & MAY_EXEC) && S_ISREG(inode->i_mode)) in proc_sys_permission()
|
/linux-6.3-rc2/fs/hostfs/ |
A D | hostfs_kern.c | 778 if (desired & MAY_EXEC) x = 1; in hostfs_permission()
|