/Linux-v6.6/security/apparmor/include/ |
D | file.h | 24 #define mask_mode_t(X) (X & (MAY_EXEC | MAY_WRITE | MAY_READ | MAY_APPEND)) 26 #define AA_AUDIT_FILE_MASK (MAY_READ | MAY_WRITE | MAY_EXEC | MAY_APPEND |\
|
D | perms.h | 16 #define AA_MAY_EXEC MAY_EXEC
|
/Linux-v6.6/security/integrity/ima/ |
D | ima_main.c | 429 0, MAY_EXEC, MMAP_CHECK_REQPROT); in ima_file_mmap() 436 0, MAY_EXEC, MMAP_CHECK); in ima_file_mmap() 475 current_cred(), secid, MAY_EXEC, MMAP_CHECK, in ima_file_mprotect() 478 current_cred(), secid, MAY_EXEC, in ima_file_mprotect() 519 MAY_EXEC, BPRM_CHECK); in ima_bprm_check() 525 MAY_EXEC, CREDS_CHECK); in ima_bprm_check() 544 mask & (MAY_READ | MAY_WRITE | MAY_EXEC | in ima_file_check()
|
D | ima_policy.c | 166 {.action = MEASURE, .func = MMAP_CHECK, .mask = MAY_EXEC, 168 {.action = MEASURE, .func = BPRM_CHECK, .mask = MAY_EXEC, 178 {.action = MEASURE, .func = MMAP_CHECK, .mask = MAY_EXEC, 180 {.action = MEASURE, .func = BPRM_CHECK, .mask = MAY_EXEC, 1549 entry->mask = MAY_EXEC; in ima_parse_rule() 2108 if (entry->mask & MAY_EXEC) in ima_policy_show()
|
/Linux-v6.6/fs/coda/ |
D | pioctl.c | 47 return (mask & MAY_EXEC) ? -EACCES : 0; in coda_ioctl_permission()
|
D | dir.c | 84 mask &= MAY_READ | MAY_WRITE | MAY_EXEC; in coda_permission() 89 if ((mask & MAY_EXEC) && !execute_ok(inode)) in coda_permission()
|
/Linux-v6.6/fs/afs/ |
D | security.c | 441 if (mask & (MAY_EXEC | MAY_READ | MAY_CHDIR)) { in afs_permission() 453 if ((mask & MAY_EXEC) && !(inode->i_mode & S_IXUSR)) in afs_permission() 455 if (mask & (MAY_EXEC | MAY_READ)) { in afs_permission()
|
/Linux-v6.6/fs/ |
D | init.c | 52 error = path_permission(&path, MAY_EXEC | MAY_CHDIR); in init_chdir() 67 error = path_permission(&path, MAY_EXEC | MAY_CHDIR); in init_chroot()
|
D | open.c | 489 if ((mode & MAY_EXEC) && S_ISREG(inode->i_mode)) { in do_faccessat() 555 error = path_permission(&path, MAY_EXEC | MAY_CHDIR); in SYSCALL_DEFINE1() 584 error = file_permission(f.file, MAY_EXEC | MAY_CHDIR); in SYSCALL_DEFINE1() 603 error = path_permission(&path, MAY_EXEC | MAY_CHDIR); in SYSCALL_DEFINE1()
|
D | namei.c | 427 mask &= MAY_READ | MAY_WRITE | MAY_EXEC; in generic_permission() 437 if (!(mask & MAY_EXEC) || (inode->i_mode & S_IXUGO)) in generic_permission() 1720 int err = inode_permission(idmap, nd->inode, MAY_EXEC|MAY_NOT_BLOCK); in may_lookup() 1724 return inode_permission(idmap, nd->inode, MAY_EXEC); in may_lookup() 2690 return inode_permission(idmap, base->d_inode, MAY_EXEC); in lookup_one_common() 2970 error = inode_permission(idmap, dir, MAY_WRITE | MAY_EXEC); in may_delete() 3014 return inode_permission(idmap, dir, MAY_WRITE | MAY_EXEC); in may_create() 3248 if (acc_mode & MAY_EXEC) in may_open() 3258 if (acc_mode & MAY_EXEC) in may_open() 3263 if ((acc_mode & MAY_EXEC) && path_noexec(path)) in may_open() [all …]
|
D | exec.c | 131 .acc_mode = MAY_READ | MAY_EXEC, in SYSCALL_DEFINE1() 912 .acc_mode = MAY_EXEC, in do_open_execat()
|
D | posix_acl.c | 385 want &= MAY_READ | MAY_WRITE | MAY_EXEC; in posix_acl_permission()
|
/Linux-v6.6/security/apparmor/ |
D | domain.c | 333 if (!(perm & MAY_EXEC)) { in aa_xattrs_match() 419 if (perm & MAY_EXEC) { in find_attach() 666 if (perms.allow & MAY_EXEC) { in profile_transition() 677 perms.allow &= ~MAY_EXEC; in profile_transition() 712 aa_audit_file(profile, &perms, OP_EXEC, MAY_EXEC, name, target, new, in profile_transition() 974 aa_audit_file(profile, &nullperms, OP_EXEC, MAY_EXEC, in apparmor_bprm_creds_for_exec()
|
D | file.c | 372 } else if ((lperms.allow & MAY_EXEC) && in profile_path_link() 374 lperms.allow &= ~MAY_EXEC; in profile_path_link() 375 request |= MAY_EXEC; in profile_path_link()
|
/Linux-v6.6/Documentation/ABI/testing/ |
D | ima_policy | 40 [[^]MAY_EXEC] 115 measure func=FILE_MMAP mask=MAY_EXEC
|
/Linux-v6.6/fs/configfs/ |
D | symlink.c | 200 MAY_WRITE | MAY_EXEC); in configfs_symlink()
|
/Linux-v6.6/security/smack/ |
D | smack.h | 245 #define MAY_ANYREAD (MAY_READ | MAY_EXEC)
|
D | smack_access.c | 294 if (access & MAY_EXEC) in smack_str_from_perm()
|
/Linux-v6.6/fs/gfs2/ |
D | inode.c | 333 error = gfs2_permission(&nop_mnt_idmap, dir, MAY_EXEC); in gfs2_lookupi() 364 MAY_WRITE | MAY_EXEC); in create_ok() 977 error = gfs2_permission(&nop_mnt_idmap, dir, MAY_WRITE | MAY_EXEC); in gfs2_link() 1093 MAY_WRITE | MAY_EXEC); in gfs2_unlink_ok() 1519 MAY_WRITE | MAY_EXEC); in gfs2_rename()
|
/Linux-v6.6/fs/nfs/ |
D | dir.c | 3167 mask |= MAY_EXEC; in nfs_access_calc_mask() 3172 mask |= MAY_EXEC; in nfs_access_calc_mask() 3223 if ((mask & ~cache_mask & (MAY_READ | MAY_WRITE | MAY_EXEC)) != 0) in nfs_do_access() 3236 mask = MAY_EXEC; in nfs_open_permission_mask() 3279 if ((mask & (MAY_READ | MAY_WRITE | MAY_EXEC)) == 0) in nfs_permission() 3308 if (!res && (mask & MAY_EXEC)) in nfs_permission()
|
/Linux-v6.6/fs/nfsd/ |
D | nfsfh.c | 44 d_inode(parent), MAY_EXEC); in nfsd_acceptable()
|
/Linux-v6.6/fs/fuse/ |
D | dir.c | 1460 inarg.mask = mask & (MAY_READ | MAY_WRITE | MAY_EXEC); in fuse_access() 1513 ((mask & MAY_EXEC) && S_ISREG(inode->i_mode))) { in fuse_permission() 1546 } else if ((mask & MAY_EXEC) && S_ISREG(inode->i_mode)) { in fuse_permission()
|
/Linux-v6.6/fs/proc/ |
D | proc_sysctl.c | 423 if ((op & ~mode & (MAY_READ|MAY_WRITE|MAY_EXEC)) == 0) in test_perm() 809 if ((mask & MAY_EXEC) && S_ISREG(inode->i_mode)) in proc_sys_permission()
|
/Linux-v6.6/fs/smb/server/ |
D | vfs.c | 145 if (!inode_permission(idmap, d_inode(dentry), MAY_OPEN | MAY_EXEC)) in ksmbd_vfs_query_maximal_access() 148 if (!inode_permission(idmap, d_inode(dentry->d_parent), MAY_EXEC | MAY_WRITE)) in ksmbd_vfs_query_maximal_access()
|
/Linux-v6.6/fs/btrfs/ |
D | ioctl.c | 913 error = inode_permission(idmap, dir, MAY_WRITE | MAY_EXEC); in btrfs_may_delete() 946 return inode_permission(idmap, dir, MAY_WRITE | MAY_EXEC); in btrfs_may_create() 1974 MAY_READ | MAY_EXEC); in btrfs_search_path_in_tree_user() 2523 err = inode_permission(idmap, inode, MAY_WRITE | MAY_EXEC); in btrfs_ioctl_snap_destroy()
|