/openbmc/linux/security/apparmor/include/ |
H A D | file.h | 24 #define mask_mode_t(X) (X & (MAY_EXEC | MAY_WRITE | MAY_READ | MAY_APPEND)) 26 #define AA_AUDIT_FILE_MASK (MAY_READ | MAY_WRITE | MAY_EXEC | MAY_APPEND |\ 152 perms |= MAY_READ; in aa_map_file_to_perms()
|
H A D | task.h | 81 #define AA_PTRACE_READ MAY_READ 88 #define AA_SIGNAL_PERM_MASK (MAY_READ | MAY_WRITE)
|
H A D | perms.h | 18 #define AA_MAY_READ MAY_READ 52 #define PERMS_CHRS_MASK (MAY_READ | MAY_WRITE | AA_MAY_CREATE | \
|
/openbmc/linux/security/apparmor/ |
H A D | ipc.c | 40 if (mask & MAY_READ) in audit_signal_mask() 116 MAY_READ, &ad)); in aa_may_signal()
|
H A D | task.c | 195 case MAY_READ: in audit_ptrace_mask()
|
H A D | file.c | 32 m |= MAY_READ; in map_mask_to_chr_mask() 652 MAY_READ | MAY_WRITE, IN_ATOMIC)) in revalidate_tty()
|
H A D | lsm.c | 408 MAY_READ | AA_MAY_GETATTR | MAY_WRITE | in apparmor_path_rename() 421 MAY_READ | AA_MAY_GETATTR | MAY_WRITE | in apparmor_path_rename() 466 fctx->allow = MAY_EXEC | MAY_READ | AA_EXEC_MMAP; in apparmor_file_open() 558 mask |= MAY_READ; in common_mmap()
|
H A D | policy_compat.c | 82 if (old & MAY_READ) in map_old_perms()
|
/openbmc/linux/Documentation/ABI/testing/ |
H A D | ima_policy | 39 mask:= [[^]MAY_READ] [[^]MAY_WRITE] [[^]MAY_APPEND] 116 measure func=FILE_CHECK mask=MAY_READ uid=0 134 measure subj_user=system_u func=FILE_CHECK mask=MAY_READ 135 measure subj_role=system_r func=FILE_CHECK mask=MAY_READ 139 measure subj_user=_ func=FILE_CHECK mask=MAY_READ
|
/openbmc/linux/security/smack/ |
H A D | smack_lsm.c | 110 if (mode & MAY_READ) in smk_bu_mode() 413 return MAY_READ; in smk_ptrace_mode() 901 rc = smk_curacc(sbp->smk_floor, MAY_READ, &ad); in smack_sb_statfs() 1272 rc = smk_bu_inode(inode, MAY_READ, rc); in smack_inode_getattr() 1694 rc = smk_bu_file(file, MAY_READ, rc); in smack_file_ioctl() 1983 may = MAY_READ; in smack_file_receive() 3050 may |= MAY_READ; in smack_flags_to_may() 3152 may = MAY_READ; in smack_shm_shmctl() 3246 may = MAY_READ; in smack_sem_semctl() 3336 may = MAY_READ; in smack_msg_queue_msgctl() [all …]
|
H A D | smack.h | 245 #define MAY_ANYREAD (MAY_READ | MAY_EXEC) 246 #define MAY_READWRITE (MAY_READ | MAY_WRITE)
|
H A D | smack_access.c | 290 if (access & MAY_READ) in smack_str_from_perm()
|
/openbmc/openbmc/meta-security/meta-integrity/recipes-security/ima_policy_hashed/files/ |
H A D | ima_policy_hashed | 68 # appraise appraise_type=imasig func=FILE_CHECK mask=MAY_READ fgroup=200 76 # determine what to do in case of reading (mask=MAY_READ or
|
/openbmc/linux/include/linux/ |
H A D | device_cgroup.h | 33 if (mask & MAY_READ) in devcgroup_inode_permission()
|
H A D | fsnotify.h | 116 if (!(mask & (MAY_READ | MAY_OPEN))) in fsnotify_perm() 128 } else if (mask & MAY_READ) { in fsnotify_perm()
|
/openbmc/linux/fs/afs/ |
H A D | security.c | 441 if (mask & (MAY_EXEC | MAY_READ | MAY_CHDIR)) { in afs_permission() 455 if (mask & (MAY_EXEC | MAY_READ)) { in afs_permission()
|
/openbmc/linux/security/integrity/ima/ |
H A D | ima_main.c | 558 mask & (MAY_READ | MAY_WRITE | MAY_EXEC | in ima_file_check() 780 0, MAY_READ, func); in ima_read_file() 823 MAY_READ, func); in ima_post_read_file()
|
H A D | ima_policy.c | 170 {.action = MEASURE, .func = FILE_CHECK, .mask = MAY_READ, 182 {.action = MEASURE, .func = FILE_CHECK, .mask = MAY_READ, 185 {.action = MEASURE, .func = FILE_CHECK, .mask = MAY_READ, 1556 entry->mask = MAY_READ; in ima_parse_rule() 2115 if (entry->mask & MAY_READ) in ima_policy_show()
|
/openbmc/linux/fs/udf/ |
H A D | file.c | 134 if (file_permission(filp, MAY_READ) != 0) { in udf_ioctl()
|
/openbmc/linux/fs/ |
H A D | remap_range.c | 113 return security_file_permission(file, write ? MAY_WRITE : MAY_READ); in remap_verify_area()
|
H A D | xattr.c | 385 error = xattr_permission(idmap, inode, name, MAY_READ); in vfs_getxattr_alloc() 435 error = xattr_permission(idmap, inode, name, MAY_READ); in vfs_getxattr()
|
H A D | readdir.c | 95 res = security_file_permission(file, MAY_READ); in iterate_dir()
|
/openbmc/linux/fs/coda/ |
H A D | dir.c | 84 mask &= MAY_READ | MAY_WRITE | MAY_EXEC; in coda_permission()
|
/openbmc/linux/fs/nfs/ |
H A D | dir.c | 3178 mask |= MAY_READ; in nfs_access_calc_mask() 3239 if ((mask & ~cache_mask & (MAY_READ | MAY_WRITE | MAY_EXEC)) != 0) in nfs_do_access() 3255 mask |= MAY_READ; in nfs_open_permission_mask() 3295 if ((mask & (MAY_READ | MAY_WRITE | MAY_EXEC)) == 0) in nfs_permission() 3314 if ((mask & MAY_WRITE) && !(mask & MAY_READ)) in nfs_permission()
|
/openbmc/linux/kernel/bpf/ |
H A D | inode.c | 559 int ret = inode_permission(&nop_mnt_idmap, inode, MAY_READ); in __get_prog_inode()
|