/linux-5.19.10/security/apparmor/include/ |
D | ipc.h | 19 #define AA_PTRACE_READ MAY_READ 26 #define AA_SIGNAL_PERM_MASK (MAY_READ | MAY_WRITE)
|
D | file.h | 23 #define mask_mode_t(X) (X & (MAY_EXEC | MAY_WRITE | MAY_READ | MAY_APPEND)) 25 #define AA_AUDIT_FILE_MASK (MAY_READ | MAY_WRITE | MAY_EXEC | MAY_APPEND |\ 224 perms |= MAY_READ; in aa_map_file_to_perms()
|
D | perms.h | 18 #define AA_MAY_READ MAY_READ 52 #define PERMS_CHRS_MASK (MAY_READ | MAY_WRITE | AA_MAY_CREATE | \
|
/linux-5.19.10/security/apparmor/ |
D | ipc.c | 30 case MAY_READ: in audit_ptrace_mask() 150 if (mask & MAY_READ) in audit_signal_mask() 217 profile_signal_perm(profile, sender, MAY_READ, &sa)); in aa_may_signal()
|
D | file.c | 32 m |= MAY_READ; in map_mask_to_chr_mask() 186 if (old & MAY_READ) in map_old_perms() 664 if (aa_file_perm(OP_INHERIT, label, file, MAY_READ | MAY_WRITE, in revalidate_tty()
|
D | lsm.c | 387 MAY_READ | AA_MAY_GETATTR | MAY_WRITE | in apparmor_path_rename() 398 MAY_READ | AA_MAY_GETATTR | MAY_WRITE | in apparmor_path_rename() 442 fctx->allow = MAY_EXEC | MAY_READ | AA_EXEC_MMAP; in apparmor_file_open() 531 mask |= MAY_READ; in common_mmap()
|
/linux-5.19.10/Documentation/ABI/testing/ |
D | ima_policy | 39 mask:= [[^]MAY_READ] [[^]MAY_WRITE] [[^]MAY_APPEND] 116 measure func=FILE_CHECK mask=MAY_READ uid=0 134 measure subj_user=system_u func=FILE_CHECK mask=MAY_READ 135 measure subj_role=system_r func=FILE_CHECK mask=MAY_READ 139 measure subj_user=_ func=FILE_CHECK mask=MAY_READ
|
/linux-5.19.10/security/smack/ |
D | smack_lsm.c | 101 if (mode & MAY_READ) in smk_bu_mode() 404 return MAY_READ; in smk_ptrace_mode() 867 rc = smk_curacc(sbp->smk_floor, MAY_READ, &ad); in smack_sb_statfs() 868 rc = smk_bu_current("statfs", sbp->smk_floor, MAY_READ, rc); in smack_sb_statfs() 1151 mask &= (MAY_READ|MAY_WRITE|MAY_EXEC|MAY_APPEND); in smack_inode_permission() 1212 rc = smk_curacc(smk_of_inode(inode), MAY_READ, &ad); in smack_inode_getattr() 1213 rc = smk_bu_inode(inode, MAY_READ, rc); in smack_inode_getattr() 1339 rc = smk_curacc(smk_of_inode(d_backing_inode(dentry)), MAY_READ, &ad); in smack_inode_getxattr() 1340 rc = smk_bu_inode(d_backing_inode(dentry), MAY_READ, rc); in smack_inode_getxattr() 1551 rc = smk_curacc(smk_of_inode(inode), MAY_READ, &ad); in smack_file_ioctl() [all …]
|
D | smack.h | 253 #define MAY_ANYREAD (MAY_READ | MAY_EXEC) 254 #define MAY_READWRITE (MAY_READ | MAY_WRITE)
|
D | smack_access.c | 290 if (access & MAY_READ) in smack_str_from_perm()
|
/linux-5.19.10/include/linux/ |
D | device_cgroup.h | 33 if (mask & MAY_READ) in devcgroup_inode_permission()
|
D | fsnotify.h | 108 if (!(mask & (MAY_READ | MAY_OPEN))) in fsnotify_perm() 120 } else if (mask & MAY_READ) { in fsnotify_perm()
|
/linux-5.19.10/security/integrity/ima/ |
D | ima_main.c | 518 mask & (MAY_READ | MAY_WRITE | MAY_EXEC | in ima_file_check() 735 0, MAY_READ, func); in ima_read_file() 778 MAY_READ, func); in ima_post_read_file()
|
D | ima_policy.c | 146 {.action = MEASURE, .func = FILE_CHECK, .mask = MAY_READ, 158 {.action = MEASURE, .func = FILE_CHECK, .mask = MAY_READ, 161 {.action = MEASURE, .func = FILE_CHECK, .mask = MAY_READ, 1503 entry->mask = MAY_READ; in ima_parse_rule() 2066 if (entry->mask & MAY_READ) in ima_policy_show()
|
/linux-5.19.10/fs/afs/ |
D | security.c | 441 if (mask & (MAY_EXEC | MAY_READ | MAY_CHDIR)) { in afs_permission() 455 if (mask & (MAY_EXEC | MAY_READ)) { in afs_permission()
|
/linux-5.19.10/fs/udf/ |
D | file.c | 188 if (file_permission(filp, MAY_READ) != 0) { in udf_ioctl()
|
/linux-5.19.10/fs/nfs/ |
D | dir.c | 3082 mask |= MAY_READ; in nfs_access_calc_mask() 3143 if ((mask & ~cache_mask & (MAY_READ | MAY_WRITE | MAY_EXEC)) != 0) in nfs_do_access() 3159 mask |= MAY_READ; in nfs_open_permission_mask() 3199 if ((mask & (MAY_READ | MAY_WRITE | MAY_EXEC)) == 0) in nfs_permission() 3218 if ((mask & MAY_WRITE) && !(mask & MAY_READ)) in nfs_permission()
|
/linux-5.19.10/fs/ |
D | remap_range.c | 109 return security_file_permission(file, write ? MAY_WRITE : MAY_READ); in remap_verify_area()
|
D | xattr.c | 365 error = xattr_permission(mnt_userns, inode, name, MAY_READ); in vfs_getxattr_alloc() 412 error = xattr_permission(mnt_userns, inode, name, MAY_READ); in vfs_getxattr()
|
D | readdir.c | 50 res = security_file_permission(file, MAY_READ); in iterate_dir()
|
D | posix_acl.c | 367 want &= MAY_READ | MAY_WRITE | MAY_EXEC; in posix_acl_permission()
|
D | exec.c | 130 .acc_mode = MAY_READ | MAY_EXEC, in SYSCALL_DEFINE1() 1419 if (inode_permission(mnt_userns, inode, MAY_READ) < 0) { in would_dump()
|
/linux-5.19.10/fs/coda/ |
D | dir.c | 84 mask &= MAY_READ | MAY_WRITE | MAY_EXEC; in coda_permission()
|
/linux-5.19.10/kernel/bpf/ |
D | inode.c | 562 int ret = inode_permission(&init_user_ns, inode, MAY_READ); in __get_prog_inode()
|
/linux-5.19.10/fs/notify/inotify/ |
D | inotify_user.c | 382 error = path_permission(path, MAY_READ); in inotify_find_inode()
|