/linux-4.1.27/security/integrity/ima/ |
H A D | ima_main.c | 272 return process_measurement(file, MAY_EXEC, MMAP_CHECK, 0); ima_file_mmap() 291 return process_measurement(bprm->file, MAY_EXEC, BPRM_CHECK, 0); ima_bprm_check() 307 mask & (MAY_READ | MAY_WRITE | MAY_EXEC), ima_file_check() 331 return process_measurement(file, MAY_EXEC, MODULE_CHECK, 0); ima_module_check() 342 return process_measurement(file, MAY_EXEC, FIRMWARE_CHECK, 0); ima_fw_from_file()
|
H A D | ima_policy.c | 92 {.action = MEASURE, .func = MMAP_CHECK, .mask = MAY_EXEC, 94 {.action = MEASURE, .func = BPRM_CHECK, .mask = MAY_EXEC, 103 {.action = MEASURE, .func = MMAP_CHECK, .mask = MAY_EXEC, 105 {.action = MEASURE, .func = BPRM_CHECK, .mask = MAY_EXEC, 207 * @mask: requested action (MAY_READ | MAY_WRITE | MAY_APPEND | MAY_EXEC) 317 * @mask: requested action (MAY_READ | MAY_WRITE | MAY_APPEND | MAY_EXEC) 597 if ((strcmp(from, "MAY_EXEC")) == 0) ima_parse_rule() 598 entry->mask = MAY_EXEC; ima_parse_rule()
|
/linux-4.1.27/fs/coda/ |
H A D | pioctl.c | 46 return (mask & MAY_EXEC) ? -EACCES : 0; coda_ioctl_permission()
|
H A D | dir.c | 82 mask &= MAY_READ | MAY_WRITE | MAY_EXEC; coda_permission() 87 if ((mask & MAY_EXEC) && !execute_ok(inode)) coda_permission()
|
/linux-4.1.27/security/apparmor/include/ |
H A D | file.h | 25 * We use MAY_EXEC, MAY_WRITE, MAY_READ, MAY_APPEND and the following flags 44 #define AA_AUDIT_FILE_MASK (MAY_READ | MAY_WRITE | MAY_EXEC | MAY_APPEND |\ 83 * @xindex: exec transition index if @allow contains MAY_EXEC
|
/linux-4.1.27/security/apparmor/ |
H A D | file.c | 53 if (mask & MAY_EXEC) audit_file_mask() 419 } else if ((lperms.allow & MAY_EXEC) && aa_path_link() 421 lperms.allow &= ~MAY_EXEC; aa_path_link() 422 request |= MAY_EXEC; aa_path_link()
|
H A D | domain.c | 153 if (perm & MAY_EXEC) { list_for_each_entry_rcu() 422 if (perms.allow & MAY_EXEC) { apparmor_bprm_set_creds() 440 /* remove MAY_EXEC to audit as failure */ apparmor_bprm_set_creds() 441 perms.allow &= ~MAY_EXEC; apparmor_bprm_set_creds() 516 error = aa_audit_file(profile, &perms, GFP_KERNEL, OP_EXEC, MAY_EXEC, apparmor_bprm_set_creds()
|
H A D | lsm.c | 391 fcxt->allow = MAY_EXEC | MAY_READ | AA_EXEC_MMAP; apparmor_file_open()
|
/linux-4.1.27/fs/nfsd/ |
H A D | vfs.h | 15 #define NFSD_MAY_EXEC 0x001 /* == MAY_EXEC */
|
H A D | nfsfh.c | 41 err = inode_permission(d_inode(parent), MAY_EXEC); nfsd_acceptable()
|
H A D | vfs.c | 2085 err = inode_permission(inode, acc & (MAY_READ|MAY_WRITE|MAY_EXEC)); nfsd_permission() 2091 err = inode_permission(inode, MAY_EXEC); nfsd_permission()
|
/linux-4.1.27/fs/afs/ |
H A D | security.c | 326 if (mask & MAY_EXEC) { afs_permission() 343 if (mask & (MAY_EXEC | MAY_READ)) { afs_permission()
|
/linux-4.1.27/fs/ |
H A D | open.c | 372 if ((mode & MAY_EXEC) && S_ISREG(inode->i_mode)) { SYSCALL_DEFINE3() 374 * MAY_EXEC on regular files is denied if the fs is mounted SYSCALL_DEFINE3() 426 error = inode_permission(path.dentry->d_inode, MAY_EXEC | MAY_CHDIR); SYSCALL_DEFINE1() 458 error = inode_permission(inode, MAY_EXEC | MAY_CHDIR); SYSCALL_DEFINE1() 477 error = inode_permission(path.dentry->d_inode, MAY_EXEC | MAY_CHDIR); SYSCALL_DEFINE1()
|
H A D | namei.c | 309 if ((mask & ~mode & (MAY_READ | MAY_WRITE | MAY_EXEC)) == 0) acl_permission_check() 317 * @mask: right to check for (%MAY_READ, %MAY_WRITE, %MAY_EXEC, ...) 354 if (!(mask & MAY_EXEC) || (inode->i_mode & S_IXUGO)) generic_permission() 361 mask &= MAY_READ | MAY_WRITE | MAY_EXEC; generic_permission() 393 * @mask: Right to check for (%MAY_READ, %MAY_WRITE, %MAY_EXEC) 430 * @mask: Right to check for (%MAY_READ, %MAY_WRITE, %MAY_EXEC) 450 * @mask: Right to check for (%MAY_READ, %MAY_WRITE, %MAY_EXEC) 1557 int err = inode_permission(nd->inode, MAY_EXEC|MAY_NOT_BLOCK); may_lookup() 1563 return inode_permission(nd->inode, MAY_EXEC); may_lookup() 1907 retval = inode_permission(inode, MAY_EXEC); path_init() 2214 err = inode_permission(base->d_inode, MAY_EXEC); lookup_one_len() 2498 error = inode_permission(dir, MAY_WRITE | MAY_EXEC); may_delete() 2536 return inode_permission(dir, MAY_WRITE | MAY_EXEC); may_create() 2691 error = inode_permission(dir->dentry->d_inode, MAY_WRITE | MAY_EXEC); may_o_create() 3196 error = inode_permission(nd->inode, MAY_WRITE | MAY_EXEC); do_tmpfile()
|
H A D | posix_acl.c | 317 want &= MAY_READ | MAY_WRITE | MAY_EXEC | MAY_NOT_BLOCK; posix_acl_permission()
|
H A D | exec.c | 116 .acc_mode = MAY_READ | MAY_EXEC | MAY_OPEN, SYSCALL_DEFINE1() 760 .acc_mode = MAY_EXEC | MAY_OPEN, do_open_execat()
|
/linux-4.1.27/fs/nfs/ |
H A D | nfs3proc.c | 208 if (mode & MAY_EXEC) nfs3_proc_access() 213 if (mode & MAY_EXEC) nfs3_proc_access() 230 entry->mask |= MAY_EXEC; nfs3_proc_access()
|
H A D | dir.c | 2383 entry->mask |= MAY_EXEC; nfs_access_set_mask() 2405 cache.mask = MAY_EXEC | MAY_WRITE | MAY_READ; nfs_do_access() 2419 if ((mask & ~cache.mask & (MAY_READ | MAY_WRITE | MAY_EXEC)) != 0) nfs_do_access() 2432 mask = MAY_EXEC; nfs_open_permission_mask() 2456 if ((mask & (MAY_READ | MAY_WRITE | MAY_EXEC)) == 0) nfs_permission() 2498 if (!res && (mask & MAY_EXEC) && !execute_ok(inode)) nfs_permission()
|
H A D | nfs4proc.c | 2059 mask = MAY_EXEC; nfs4_opendata_access() 2068 if ((mask & ~cache.mask & (MAY_READ | MAY_EXEC)) == 0) nfs4_opendata_access() 3448 if (mode & MAY_EXEC) _nfs4_proc_access() 3453 if (mode & MAY_EXEC) _nfs4_proc_access()
|
/linux-4.1.27/fs/gfs2/ |
H A D | inode.c | 311 error = gfs2_permission(dir, MAY_EXEC); gfs2_lookupi() 341 error = gfs2_permission(&dip->i_inode, MAY_WRITE | MAY_EXEC); create_ok() 920 error = gfs2_permission(dir, MAY_WRITE | MAY_EXEC); gfs2_link() 1036 error = gfs2_permission(&dip->i_inode, MAY_WRITE | MAY_EXEC); gfs2_unlink_ok() 1425 error = gfs2_permission(ndir, MAY_WRITE | MAY_EXEC); gfs2_rename()
|
/linux-4.1.27/security/smack/ |
H A D | smack.h | 204 #define MAY_ANYREAD (MAY_READ | MAY_EXEC)
|
H A D | smack_access.c | 304 if (access & MAY_EXEC) smack_str_from_perm()
|
H A D | smackfs.c | 308 perm |= MAY_EXEC; smk_perm_from_str() 632 if (srp->smk_access & MAY_EXEC) smk_rule_show()
|
H A D | smack_lsm.c | 75 if (mode & MAY_EXEC) smk_bu_mode() 1024 mask &= (MAY_READ|MAY_WRITE|MAY_EXEC|MAY_APPEND); smack_inode_permission() 2584 may |= MAY_EXEC; smack_flags_to_may()
|
/linux-4.1.27/fs/fuse/ |
H A D | dir.c | 1045 inarg.mask = mask & (MAY_READ | MAY_WRITE | MAY_EXEC); fuse_access() 1093 ((mask & MAY_EXEC) && S_ISREG(inode->i_mode))) { fuse_permission() 1123 } else if ((mask & MAY_EXEC) && S_ISREG(inode->i_mode)) { fuse_permission()
|
/linux-4.1.27/fs/hostfs/ |
H A D | hostfs_kern.c | 790 if (desired & MAY_EXEC) x = 1; hostfs_permission()
|
/linux-4.1.27/fs/proc/ |
H A D | proc_sysctl.c | 412 if ((op & ~mode & (MAY_READ|MAY_WRITE|MAY_EXEC)) == 0) test_perm() 731 if ((mask & MAY_EXEC) && S_ISREG(inode->i_mode)) proc_sys_permission()
|
/linux-4.1.27/fs/cifs/ |
H A D | cifsfs.c | 229 if ((mask & MAY_EXEC) && !execute_ok(inode)) cifs_permission()
|
/linux-4.1.27/fs/btrfs/ |
H A D | ioctl.c | 781 error = inode_permission(dir, MAY_WRITE | MAY_EXEC); btrfs_may_delete() 810 return inode_permission(dir, MAY_WRITE | MAY_EXEC); btrfs_may_create() 2383 err = inode_permission(inode, MAY_WRITE | MAY_EXEC); btrfs_ioctl_snap_destroy()
|
/linux-4.1.27/security/selinux/ |
H A D | hooks.c | 1862 if (mask & MAY_EXEC) file_mask_to_av() 1873 if (mask & MAY_EXEC) file_mask_to_av() 2904 mask &= (MAY_READ|MAY_WRITE|MAY_EXEC|MAY_APPEND); selinux_inode_permission()
|
/linux-4.1.27/kernel/ |
H A D | sys.c | 1675 err = inode_permission(inode, MAY_EXEC); prctl_set_mm_exe_file()
|
/linux-4.1.27/fs/ocfs2/ |
H A D | refcounttree.c | 4351 return inode_permission(dir, MAY_WRITE | MAY_EXEC); ocfs2_may_create()
|
/linux-4.1.27/include/linux/ |
H A D | fs.h | 75 #define MAY_EXEC 0x00000001 macro
|