/kernel/linux/linux-6.6/security/apparmor/include/ |
H A D | file.h | 24 #define mask_mode_t(X) (X & (MAY_EXEC | MAY_WRITE | MAY_READ | MAY_APPEND)) 26 #define AA_AUDIT_FILE_MASK (MAY_READ | MAY_WRITE | MAY_EXEC | MAY_APPEND |\
|
/kernel/linux/linux-6.6/security/integrity/ima/ |
H A D | ima_main.c | 443 0, MAY_EXEC, MMAP_CHECK_REQPROT); in ima_file_mmap() 450 0, MAY_EXEC, MMAP_CHECK); in ima_file_mmap() 489 current_cred(), secid, MAY_EXEC, MMAP_CHECK, in ima_file_mprotect() 492 current_cred(), secid, MAY_EXEC, in ima_file_mprotect() 533 MAY_EXEC, BPRM_CHECK); in ima_bprm_check() 539 MAY_EXEC, CREDS_CHECK); in ima_bprm_check() 545 * @mask: contains MAY_READ, MAY_WRITE, MAY_EXEC or MAY_APPEND 558 mask & (MAY_READ | MAY_WRITE | MAY_EXEC | in ima_file_check()
|
H A D | ima_policy.c | 166 {.action = MEASURE, .func = MMAP_CHECK, .mask = MAY_EXEC, 168 {.action = MEASURE, .func = BPRM_CHECK, .mask = MAY_EXEC, 178 {.action = MEASURE, .func = MMAP_CHECK, .mask = MAY_EXEC, 180 {.action = MEASURE, .func = BPRM_CHECK, .mask = MAY_EXEC, 560 * @mask: requested action (MAY_READ | MAY_WRITE | MAY_APPEND | MAY_EXEC) 723 * @mask: requested action (MAY_READ | MAY_WRITE | MAY_APPEND | MAY_EXEC) 1548 if ((strcmp(from, "MAY_EXEC")) == 0) in ima_parse_rule() 1549 entry->mask = MAY_EXEC; in ima_parse_rule() 1987 "^MAY_EXEC", 2108 if (entry->mask & MAY_EXEC) in ima_policy_show() [all...] |
/kernel/linux/linux-5.10/security/integrity/ima/ |
H A D | ima_main.c | 413 0, MAY_EXEC, MMAP_CHECK); in ima_file_mmap() 451 action = ima_get_action(inode, current_cred(), secid, MAY_EXEC, in ima_file_mprotect() 491 MAY_EXEC, BPRM_CHECK); in ima_bprm_check() 497 MAY_EXEC, CREDS_CHECK); in ima_bprm_check() 503 * @mask: contains MAY_READ, MAY_WRITE, MAY_EXEC or MAY_APPEND 516 mask & (MAY_READ | MAY_WRITE | MAY_EXEC | in ima_file_check()
|
H A D | ima_policy.c | 121 {.action = MEASURE, .func = MMAP_CHECK, .mask = MAY_EXEC, 123 {.action = MEASURE, .func = BPRM_CHECK, .mask = MAY_EXEC, 133 {.action = MEASURE, .func = MMAP_CHECK, .mask = MAY_EXEC, 135 {.action = MEASURE, .func = BPRM_CHECK, .mask = MAY_EXEC, 491 * @mask: requested action (MAY_READ | MAY_WRITE | MAY_APPEND | MAY_EXEC) 630 * @mask: requested action (MAY_READ | MAY_WRITE | MAY_APPEND | MAY_EXEC) 1278 if ((strcmp(from, "MAY_EXEC")) == 0) in ima_parse_rule() 1279 entry->mask = MAY_EXEC; in ima_parse_rule() 1591 "^MAY_EXEC", 1692 if (entry->mask & MAY_EXEC) in ima_policy_show() [all...] |
/kernel/linux/linux-5.10/security/apparmor/include/ |
H A D | file.h | 23 #define mask_mode_t(X) (X & (MAY_EXEC | MAY_WRITE | MAY_READ | MAY_APPEND)) 25 #define AA_AUDIT_FILE_MASK (MAY_READ | MAY_WRITE | MAY_EXEC | MAY_APPEND |\
|
H A D | perms.h | 16 #define AA_MAY_EXEC MAY_EXEC
|
/kernel/linux/linux-5.10/fs/coda/ |
H A D | pioctl.c | 45 return (mask & MAY_EXEC) ? -EACCES : 0; in coda_ioctl_permission()
|
H A D | dir.c | 83 mask &= MAY_READ | MAY_WRITE | MAY_EXEC; in coda_permission() 88 if ((mask & MAY_EXEC) && !execute_ok(inode)) in coda_permission()
|
/kernel/linux/linux-6.6/fs/coda/ |
H A D | pioctl.c | 47 return (mask & MAY_EXEC) ? -EACCES : 0; in coda_ioctl_permission()
|
H A D | dir.c | 84 mask &= MAY_READ | MAY_WRITE | MAY_EXEC; in coda_permission() 89 if ((mask & MAY_EXEC) && !execute_ok(inode)) in coda_permission()
|
/kernel/linux/linux-5.10/fs/afs/ |
H A D | security.c | 441 if (mask & (MAY_EXEC | MAY_READ | MAY_CHDIR)) { in afs_permission() 453 if ((mask & MAY_EXEC) && !(inode->i_mode & S_IXUSR)) in afs_permission() 455 if (mask & (MAY_EXEC | MAY_READ)) { in afs_permission()
|
/kernel/linux/linux-6.6/fs/afs/ |
H A D | security.c | 441 if (mask & (MAY_EXEC | MAY_READ | MAY_CHDIR)) { in afs_permission() 453 if ((mask & MAY_EXEC) && !(inode->i_mode & S_IXUSR)) in afs_permission() 455 if (mask & (MAY_EXEC | MAY_READ)) { in afs_permission()
|
/kernel/linux/linux-5.10/fs/ |
H A D | init.c | 52 error = inode_permission(path.dentry->d_inode, MAY_EXEC | MAY_CHDIR); in init_chdir() 67 error = inode_permission(path.dentry->d_inode, MAY_EXEC | MAY_CHDIR); in init_chroot()
|
H A D | open.c | 429 if ((mode & MAY_EXEC) && S_ISREG(inode->i_mode)) { in do_faccessat() 431 * MAY_EXEC on regular files is denied if the fs is mounted in do_faccessat() 495 error = inode_permission(path.dentry->d_inode, MAY_EXEC | MAY_CHDIR); in SYSCALL_DEFINE1() 524 error = inode_permission(file_inode(f.file), MAY_EXEC | MAY_CHDIR); in SYSCALL_DEFINE1() 543 error = inode_permission(path.dentry->d_inode, MAY_EXEC | MAY_CHDIR); in SYSCALL_DEFINE1()
|
/kernel/linux/linux-6.6/fs/ |
H A D | init.c | 52 error = path_permission(&path, MAY_EXEC | MAY_CHDIR); in init_chdir() 67 error = path_permission(&path, MAY_EXEC | MAY_CHDIR); in init_chroot()
|
H A D | open.c | 489 if ((mode & MAY_EXEC) && S_ISREG(inode->i_mode)) { in do_faccessat() 491 * MAY_EXEC on regular files is denied if the fs is mounted in do_faccessat() 555 error = path_permission(&path, MAY_EXEC | MAY_CHDIR); in SYSCALL_DEFINE1() 584 error = file_permission(f.file, MAY_EXEC | MAY_CHDIR); in SYSCALL_DEFINE1() 603 error = path_permission(&path, MAY_EXEC | MAY_CHDIR); in SYSCALL_DEFINE1()
|
/kernel/linux/linux-5.10/security/apparmor/ |
H A D | domain.c | 342 if (!(perm & MAY_EXEC)) { in aa_xattrs_match() 423 if (perm & MAY_EXEC) { in find_attach() 664 if (perms.allow & MAY_EXEC) { in profile_transition() 674 /* remove MAY_EXEC to audit as failure */ in profile_transition() 675 perms.allow &= ~MAY_EXEC; in profile_transition() 710 aa_audit_file(profile, &perms, OP_EXEC, MAY_EXEC, name, target, new, in profile_transition() 968 aa_audit_file(profile, &nullperms, OP_EXEC, MAY_EXEC, in apparmor_bprm_creds_for_exec()
|
H A D | file.c | 421 } else if ((lperms.allow & MAY_EXEC) && in profile_path_link() 423 lperms.allow &= ~MAY_EXEC; in profile_path_link() 424 request |= MAY_EXEC; in profile_path_link()
|
/kernel/linux/linux-6.6/security/apparmor/ |
H A D | domain.c | 340 if (!(perm & MAY_EXEC)) { in aa_xattrs_match() 426 if (perm & MAY_EXEC) { in find_attach() 674 if (perms.allow & MAY_EXEC) { in profile_transition() 684 /* remove MAY_EXEC to audit as failure */ in profile_transition() 685 perms.allow &= ~MAY_EXEC; in profile_transition() 720 aa_audit_file(subj_cred, profile, &perms, OP_EXEC, MAY_EXEC, name, in profile_transition() 993 OP_EXEC, MAY_EXEC, in apparmor_bprm_creds_for_exec()
|
H A D | file.c | 397 } else if ((lperms.allow & MAY_EXEC) && in profile_path_link() 399 lperms.allow &= ~MAY_EXEC; in profile_path_link() 400 request |= MAY_EXEC; in profile_path_link()
|
/kernel/linux/linux-5.10/fs/configfs/ |
H A D | symlink.c | 200 ret = inode_permission(dir, MAY_WRITE | MAY_EXEC); in configfs_symlink()
|
/kernel/linux/linux-6.6/fs/configfs/ |
H A D | symlink.c | 200 MAY_WRITE | MAY_EXEC); in configfs_symlink()
|
/kernel/linux/linux-5.10/fs/gfs2/ |
H A D | inode.c | 324 error = gfs2_permission(dir, MAY_EXEC); in gfs2_lookupi() 354 error = gfs2_permission(&dip->i_inode, MAY_WRITE | MAY_EXEC); in create_ok() 954 error = gfs2_permission(dir, MAY_WRITE | MAY_EXEC); in gfs2_link() 1071 error = gfs2_permission(&dip->i_inode, MAY_WRITE | MAY_EXEC); in gfs2_unlink_ok() 1493 error = gfs2_permission(ndir, MAY_WRITE | MAY_EXEC); in gfs2_rename()
|
/kernel/linux/linux-6.6/fs/gfs2/ |
H A D | inode.c | 333 error = gfs2_permission(&nop_mnt_idmap, dir, MAY_EXEC); in gfs2_lookupi() 364 MAY_WRITE | MAY_EXEC); in create_ok() 977 error = gfs2_permission(&nop_mnt_idmap, dir, MAY_WRITE | MAY_EXEC); in gfs2_link() 1093 MAY_WRITE | MAY_EXEC); in gfs2_unlink_ok() 1519 MAY_WRITE | MAY_EXEC); in gfs2_rename()
|