/Linux-v4.19/security/apparmor/include/ |
D | file.h | 27 #define mask_mode_t(X) (X & (MAY_EXEC | MAY_WRITE | MAY_READ | MAY_APPEND)) 29 #define AA_AUDIT_FILE_MASK (MAY_READ | MAY_WRITE | MAY_EXEC | MAY_APPEND |\ 223 perms |= MAY_WRITE; in aa_map_file_to_perms() 227 if ((flags & O_APPEND) && (perms & MAY_WRITE)) in aa_map_file_to_perms() 228 perms = (perms & ~MAY_WRITE) | MAY_APPEND; in aa_map_file_to_perms() 231 perms |= MAY_WRITE; in aa_map_file_to_perms()
|
D | ipc.h | 22 #define AA_PTRACE_TRACE MAY_WRITE 30 #define AA_SIGNAL_PERM_MASK (MAY_READ | MAY_WRITE)
|
D | perms.h | 21 #define AA_MAY_WRITE MAY_WRITE 56 #define PERMS_CHRS_MASK (MAY_READ | MAY_WRITE | AA_MAY_CREATE | \
|
/Linux-v4.19/security/smack/ |
D | smack_lsm.c | 85 if (mode & MAY_WRITE) in smk_bu_mode() 181 (mode & (MAY_WRITE | MAY_APPEND))) in smk_bu_inode() 1088 rc = smk_curacc(isp, MAY_WRITE, &ad); in smack_inode_link() 1089 rc = smk_bu_inode(d_backing_inode(old_dentry), MAY_WRITE, rc); in smack_inode_link() 1094 rc = smk_curacc(isp, MAY_WRITE, &ad); in smack_inode_link() 1095 rc = smk_bu_inode(d_backing_inode(new_dentry), MAY_WRITE, rc); in smack_inode_link() 1121 rc = smk_curacc(smk_of_inode(ip), MAY_WRITE, &ad); in smack_inode_unlink() 1122 rc = smk_bu_inode(ip, MAY_WRITE, rc); in smack_inode_unlink() 1129 rc = smk_curacc(smk_of_inode(dir), MAY_WRITE, &ad); in smack_inode_unlink() 1130 rc = smk_bu_inode(dir, MAY_WRITE, rc); in smack_inode_unlink() [all …]
|
D | smack_access.c | 102 if ((may & MAY_WRITE) == MAY_WRITE) in smk_access_entry() 297 if (access & MAY_WRITE) in smack_str_from_perm()
|
D | smack.h | 269 #define MAY_DELIVER MAY_WRITE /* Signal delivery requires write */ 280 #define MAY_READWRITE (MAY_READ | MAY_WRITE)
|
/Linux-v4.19/security/apparmor/ |
D | ipc.c | 36 case MAY_WRITE: in audit_ptrace_mask() 156 if (mask & MAY_WRITE) in audit_signal_mask() 219 profile_signal_perm(profile, target, MAY_WRITE, &sa), in aa_may_signal()
|
D | file.c | 36 m |= MAY_WRITE; in map_mask_to_chr_mask() 201 if (old & MAY_WRITE) in map_old_perms() 662 if (aa_file_perm(OP_INHERIT, label, file, MAY_READ | MAY_WRITE)) in revalidate_tty()
|
D | lsm.c | 322 return common_perm_cond(OP_TRUNC, path, MAY_WRITE | AA_MAY_SETATTR); in apparmor_path_truncate() 369 MAY_READ | AA_MAY_GETATTR | MAY_WRITE | in apparmor_path_rename() 374 0, MAY_WRITE | AA_MAY_SETATTR | in apparmor_path_rename() 482 mask |= MAY_WRITE; in apparmor_file_lock() 502 mask |= MAY_WRITE; in common_mmap()
|
/Linux-v4.19/fs/ |
D | xattr.c | 91 if (mask & MAY_WRITE) { in xattr_permission() 116 return (mask & MAY_WRITE) ? -EPERM : -ENODATA; in xattr_permission() 127 return (mask & MAY_WRITE) ? -EPERM : -ENODATA; in xattr_permission() 129 (mask & MAY_WRITE) && !inode_owner_or_capable(inode)) in xattr_permission() 214 error = xattr_permission(inode, name, MAY_WRITE); in vfs_setxattr() 386 error = xattr_permission(inode, name, MAY_WRITE); in vfs_removexattr()
|
D | open.c | 85 error = inode_permission(inode, MAY_WRITE); in vfs_truncate() 287 ret = security_file_permission(file, MAY_WRITE); in vfs_fallocate() 955 if (!(acc_mode & MAY_WRITE)) in build_open_flags() 970 acc_mode |= MAY_WRITE; in build_open_flags()
|
D | namei.c | 315 if ((mask & ~mode & (MAY_READ | MAY_WRITE | MAY_EXEC)) == 0) in acl_permission_check() 347 if (!(mask & MAY_WRITE)) in generic_permission() 359 mask &= MAY_READ | MAY_WRITE | MAY_EXEC; in generic_permission() 406 if (unlikely(mask & MAY_WRITE)) { in sb_permission() 435 if (unlikely(mask & MAY_WRITE)) { in inode_permission() 969 if (inode_permission(inode, MAY_READ | MAY_WRITE)) in safe_hardlink_source() 2807 error = inode_permission(dir, MAY_WRITE | MAY_EXEC); in may_delete() 2851 return inode_permission(dir, MAY_WRITE | MAY_EXEC); in may_create() 2959 if (acc_mode & MAY_WRITE) in may_open() 3035 error = inode_permission(dir->dentry->d_inode, MAY_WRITE | MAY_EXEC); in may_o_create() [all …]
|
D | attr.c | 250 error = inode_permission(inode, MAY_WRITE); in notify_change()
|
/Linux-v4.19/include/linux/ |
D | device_cgroup.h | 49 if (mask & MAY_WRITE) in devcgroup_inode_permission()
|
/Linux-v4.19/fs/afs/ |
D | security.c | 379 if (mask & MAY_WRITE) { in afs_permission() 394 } else if (mask & MAY_WRITE) { in afs_permission()
|
/Linux-v4.19/fs/gfs2/ |
D | inode.c | 337 error = gfs2_permission(&dip->i_inode, MAY_WRITE | MAY_EXEC); in create_ok() 930 error = gfs2_permission(dir, MAY_WRITE | MAY_EXEC); in gfs2_link() 1046 error = gfs2_permission(&dip->i_inode, MAY_WRITE | MAY_EXEC); in gfs2_unlink_ok() 1453 error = gfs2_permission(ndir, MAY_WRITE | MAY_EXEC); in gfs2_rename() 1488 error = gfs2_permission(d_inode(odentry), MAY_WRITE); in gfs2_rename() 1641 error = gfs2_permission(odentry->d_inode, MAY_WRITE); in gfs2_exchange() 1646 error = gfs2_permission(ndentry->d_inode, MAY_WRITE); in gfs2_exchange() 1801 if ((mask & MAY_WRITE) && IS_IMMUTABLE(inode)) in gfs2_permission()
|
/Linux-v4.19/security/integrity/ima/ |
D | ima_main.c | 306 if ((mask & MAY_WRITE) && test_bit(IMA_DIGSIG, &iint->atomic_flags) && in process_measurement() 392 mask & (MAY_READ | MAY_WRITE | MAY_EXEC | in ima_file_check()
|
D | ima_policy.c | 807 entry->mask = MAY_WRITE; in ima_parse_rule() 1151 if (entry->mask & MAY_WRITE) in ima_policy_show()
|
/Linux-v4.19/Documentation/ABI/testing/ |
D | ima_policy | 32 mask:= [[^]MAY_READ] [[^]MAY_WRITE] [[^]MAY_APPEND]
|
/Linux-v4.19/fs/nfs/ |
D | dir.c | 2414 mask |= MAY_WRITE; in nfs_access_calc_mask() 2419 mask |= MAY_WRITE; in nfs_access_calc_mask() 2423 mask |= MAY_WRITE; in nfs_access_calc_mask() 2473 if ((mask & ~cache_mask & (MAY_READ | MAY_WRITE | MAY_EXEC)) != 0) in nfs_do_access() 2491 mask |= MAY_WRITE; in nfs_open_permission_mask() 2527 if ((mask & (MAY_READ | MAY_WRITE | MAY_EXEC)) == 0) in nfs_permission() 2546 if ((mask & MAY_WRITE) && !(mask & MAY_READ)) in nfs_permission()
|
/Linux-v4.19/fs/overlayfs/ |
D | inode.c | 291 !special_file(realinode->i_mode) && mask & MAY_WRITE) { in ovl_permission() 292 mask &= ~(MAY_WRITE | MAY_APPEND); in ovl_permission()
|
/Linux-v4.19/fs/proc/ |
D | proc_sysctl.c | 440 if ((op & ~mode & (MAY_READ|MAY_WRITE|MAY_EXEC)) == 0) in test_perm() 584 if (sysctl_perm(head, table, write ? MAY_WRITE : MAY_READ)) in proc_sys_call_handler() 803 error = mask & MAY_WRITE ? -EACCES : 0; in proc_sys_permission()
|
/Linux-v4.19/fs/coda/ |
D | dir.c | 83 mask &= MAY_READ | MAY_WRITE | MAY_EXEC; in coda_permission()
|
/Linux-v4.19/fs/fat/ |
D | file.c | 461 if (allow_utime & MAY_WRITE) in fat_allow_set_time()
|
/Linux-v4.19/kernel/bpf/ |
D | inode.c | 521 int ret = inode_permission(inode, MAY_READ | MAY_WRITE); in __get_prog_inode()
|