Home
last modified time | relevance | path

Searched refs:MAY_EXEC (Results 1 – 25 of 39) sorted by relevance

12

/openbmc/openbmc/meta-security/meta-integrity/recipes-security/ima_policy_hashed/files/
H A Dima_policy_hashed72 # appraise appraise_type=imasig func=FILE_MMAP mask=MAY_EXEC
73 # appraise appraise_type=imasig func=BPRM_CHECK mask=MAY_EXEC
77 # mask=MAY_EXEC) because otherwise writing does not update the file
/openbmc/linux/security/integrity/ima/
H A Dima_main.c446 0, MAY_EXEC, MMAP_CHECK_REQPROT); in ima_file_mmap()
453 0, MAY_EXEC, MMAP_CHECK); in ima_file_mmap()
492 current_cred(), secid, MAY_EXEC, MMAP_CHECK, in ima_file_mprotect()
495 current_cred(), secid, MAY_EXEC, in ima_file_mprotect()
536 MAY_EXEC, BPRM_CHECK); in ima_bprm_check()
542 MAY_EXEC, CREDS_CHECK);
548 * @mask: contains MAY_READ, MAY_WRITE, MAY_EXEC or MAY_APPEND
561 mask & (MAY_READ | MAY_WRITE | MAY_EXEC |
H A Dima_policy.c166 {.action = MEASURE, .func = MMAP_CHECK, .mask = MAY_EXEC,
168 {.action = MEASURE, .func = BPRM_CHECK, .mask = MAY_EXEC,
178 {.action = MEASURE, .func = MMAP_CHECK, .mask = MAY_EXEC,
180 {.action = MEASURE, .func = BPRM_CHECK, .mask = MAY_EXEC,
1552 entry->mask = MAY_EXEC; in ima_parse_rule()
2111 if (entry->mask & MAY_EXEC) in ima_policy_show()
/openbmc/linux/security/apparmor/include/
H A Dfile.h24 #define mask_mode_t(X) (X & (MAY_EXEC | MAY_WRITE | MAY_READ | MAY_APPEND))
26 #define AA_AUDIT_FILE_MASK (MAY_READ | MAY_WRITE | MAY_EXEC | MAY_APPEND |\
H A Dperms.h16 #define AA_MAY_EXEC MAY_EXEC
/openbmc/linux/fs/afs/
H A Dsecurity.c441 if (mask & (MAY_EXEC | MAY_READ | MAY_CHDIR)) { in afs_permission()
453 if ((mask & MAY_EXEC) && !(inode->i_mode & S_IXUSR)) in afs_permission()
455 if (mask & (MAY_EXEC | MAY_READ)) { in afs_permission()
/openbmc/linux/fs/coda/
H A Dpioctl.c47 return (mask & MAY_EXEC) ? -EACCES : 0; in coda_ioctl_permission()
H A Ddir.c84 mask &= MAY_READ | MAY_WRITE | MAY_EXEC; in coda_permission()
89 if ((mask & MAY_EXEC) && !execute_ok(inode)) in coda_permission()
/openbmc/openbmc/meta-security/meta-integrity/recipes-security/ima_policy_appraise_all/files/
H A Dima_policy_appraise_all34 appraise func=MMAP_CHECK mask=MAY_EXEC
/openbmc/linux/fs/
H A Dinit.c52 error = path_permission(&path, MAY_EXEC | MAY_CHDIR); in init_chdir()
67 error = path_permission(&path, MAY_EXEC | MAY_CHDIR); in init_chroot()
H A Dopen.c489 if ((mode & MAY_EXEC) && S_ISREG(inode->i_mode)) { in do_faccessat()
555 error = path_permission(&path, MAY_EXEC | MAY_CHDIR); in SYSCALL_DEFINE1()
584 error = file_permission(f.file, MAY_EXEC | MAY_CHDIR); in SYSCALL_DEFINE1()
603 error = path_permission(&path, MAY_EXEC | MAY_CHDIR); in SYSCALL_DEFINE1()
H A Dnamei.c427 mask &= MAY_READ | MAY_WRITE | MAY_EXEC; in generic_permission()
437 if (!(mask & MAY_EXEC) || (inode->i_mode & S_IXUGO)) in generic_permission()
1720 int err = inode_permission(idmap, nd->inode, MAY_EXEC|MAY_NOT_BLOCK); in may_lookup()
1724 return inode_permission(idmap, nd->inode, MAY_EXEC); in may_lookup()
2688 return inode_permission(idmap, base->d_inode, MAY_EXEC); in lookup_one_common()
2968 error = inode_permission(idmap, dir, MAY_WRITE | MAY_EXEC); in may_delete()
3012 return inode_permission(idmap, dir, MAY_WRITE | MAY_EXEC); in may_create()
3240 if (acc_mode & MAY_EXEC) in may_open()
3250 if (acc_mode & MAY_EXEC) in may_open()
3255 if ((acc_mode & MAY_EXEC) && path_noexec(path)) in may_open()
[all …]
H A Dexec.c131 .acc_mode = MAY_READ | MAY_EXEC, in SYSCALL_DEFINE1()
912 .acc_mode = MAY_EXEC, in do_open_execat()
1654 err = inode_permission(idmap, inode, MAY_EXEC); in bprm_fill_uid()
/openbmc/linux/security/apparmor/
H A Ddomain.c340 if (!(perm & MAY_EXEC)) { in aa_xattrs_match()
426 if (perm & MAY_EXEC) { in find_attach()
674 if (perms.allow & MAY_EXEC) { in profile_transition()
685 perms.allow &= ~MAY_EXEC; in profile_transition()
720 aa_audit_file(subj_cred, profile, &perms, OP_EXEC, MAY_EXEC, name, in profile_transition()
993 OP_EXEC, MAY_EXEC, in apparmor_bprm_creds_for_exec()
H A Dfile.c397 } else if ((lperms.allow & MAY_EXEC) && in profile_path_link()
399 lperms.allow &= ~MAY_EXEC; in profile_path_link()
400 request |= MAY_EXEC; in profile_path_link()
/openbmc/linux/Documentation/ABI/testing/
H A Dima_policy40 [[^]MAY_EXEC]
115 measure func=FILE_MMAP mask=MAY_EXEC
/openbmc/linux/fs/configfs/
H A Dsymlink.c200 MAY_WRITE | MAY_EXEC); in configfs_symlink()
/openbmc/linux/security/smack/
H A Dsmack.h245 #define MAY_ANYREAD (MAY_READ | MAY_EXEC)
H A Dsmack_access.c294 if (access & MAY_EXEC) in smack_str_from_perm()
/openbmc/linux/fs/gfs2/
H A Dinode.c334 error = gfs2_permission(&nop_mnt_idmap, dir, MAY_EXEC); in gfs2_lookupi()
365 MAY_WRITE | MAY_EXEC); in create_ok()
978 error = gfs2_permission(&nop_mnt_idmap, dir, MAY_WRITE | MAY_EXEC); in gfs2_link()
1094 MAY_WRITE | MAY_EXEC); in gfs2_unlink_ok()
1520 MAY_WRITE | MAY_EXEC); in gfs2_rename()
/openbmc/linux/fs/nfs/
H A Ddir.c3183 mask |= MAY_EXEC; in nfs_access_calc_mask()
3188 mask |= MAY_EXEC; in nfs_access_calc_mask()
3239 if ((mask & ~cache_mask & (MAY_READ | MAY_WRITE | MAY_EXEC)) != 0) in nfs_do_access()
3252 mask = MAY_EXEC; in nfs_open_permission_mask()
3295 if ((mask & (MAY_READ | MAY_WRITE | MAY_EXEC)) == 0) in nfs_permission()
3324 if (!res && (mask & MAY_EXEC)) in nfs_permission()
/openbmc/linux/fs/nfsd/
H A Dnfsfh.c44 d_inode(parent), MAY_EXEC); in nfsd_acceptable()
/openbmc/linux/fs/fuse/
H A Ddir.c1465 inarg.mask = mask & (MAY_READ | MAY_WRITE | MAY_EXEC); in fuse_access()
1518 ((mask & MAY_EXEC) && S_ISREG(inode->i_mode))) { in fuse_permission()
1551 } else if ((mask & MAY_EXEC) && S_ISREG(inode->i_mode)) { in fuse_permission()
/openbmc/linux/fs/proc/
H A Dproc_sysctl.c424 if ((op & ~mode & (MAY_READ|MAY_WRITE|MAY_EXEC)) == 0) in test_perm()
808 if ((mask & MAY_EXEC) && S_ISREG(inode->i_mode)) in proc_sys_permission()
/openbmc/linux/fs/smb/server/
H A Dvfs.c157 if (!inode_permission(idmap, d_inode(dentry), MAY_OPEN | MAY_EXEC)) in ksmbd_vfs_query_maximal_access()
160 if (!inode_permission(idmap, d_inode(dentry->d_parent), MAY_EXEC | MAY_WRITE)) in ksmbd_vfs_query_maximal_access()

12