/openbmc/openbmc/meta-security/meta-integrity/recipes-security/ima_policy_hashed/files/ |
H A D | ima_policy_hashed | 72 # appraise appraise_type=imasig func=FILE_MMAP mask=MAY_EXEC 73 # appraise appraise_type=imasig func=BPRM_CHECK mask=MAY_EXEC 77 # mask=MAY_EXEC) because otherwise writing does not update the file
|
/openbmc/linux/security/integrity/ima/ |
H A D | ima_main.c | 446 0, MAY_EXEC, MMAP_CHECK_REQPROT); in ima_file_mmap() 453 0, MAY_EXEC, MMAP_CHECK); in ima_file_mmap() 492 current_cred(), secid, MAY_EXEC, MMAP_CHECK, in ima_file_mprotect() 495 current_cred(), secid, MAY_EXEC, in ima_file_mprotect() 536 MAY_EXEC, BPRM_CHECK); in ima_bprm_check() 542 MAY_EXEC, CREDS_CHECK); 548 * @mask: contains MAY_READ, MAY_WRITE, MAY_EXEC or MAY_APPEND 561 mask & (MAY_READ | MAY_WRITE | MAY_EXEC |
|
H A D | ima_policy.c | 166 {.action = MEASURE, .func = MMAP_CHECK, .mask = MAY_EXEC, 168 {.action = MEASURE, .func = BPRM_CHECK, .mask = MAY_EXEC, 178 {.action = MEASURE, .func = MMAP_CHECK, .mask = MAY_EXEC, 180 {.action = MEASURE, .func = BPRM_CHECK, .mask = MAY_EXEC, 1552 entry->mask = MAY_EXEC; in ima_parse_rule() 2111 if (entry->mask & MAY_EXEC) in ima_policy_show()
|
/openbmc/linux/security/apparmor/include/ |
H A D | file.h | 24 #define mask_mode_t(X) (X & (MAY_EXEC | MAY_WRITE | MAY_READ | MAY_APPEND)) 26 #define AA_AUDIT_FILE_MASK (MAY_READ | MAY_WRITE | MAY_EXEC | MAY_APPEND |\
|
H A D | perms.h | 16 #define AA_MAY_EXEC MAY_EXEC
|
/openbmc/linux/fs/afs/ |
H A D | security.c | 441 if (mask & (MAY_EXEC | MAY_READ | MAY_CHDIR)) { in afs_permission() 453 if ((mask & MAY_EXEC) && !(inode->i_mode & S_IXUSR)) in afs_permission() 455 if (mask & (MAY_EXEC | MAY_READ)) { in afs_permission()
|
/openbmc/linux/fs/coda/ |
H A D | pioctl.c | 47 return (mask & MAY_EXEC) ? -EACCES : 0; in coda_ioctl_permission()
|
H A D | dir.c | 84 mask &= MAY_READ | MAY_WRITE | MAY_EXEC; in coda_permission() 89 if ((mask & MAY_EXEC) && !execute_ok(inode)) in coda_permission()
|
/openbmc/openbmc/meta-security/meta-integrity/recipes-security/ima_policy_appraise_all/files/ |
H A D | ima_policy_appraise_all | 34 appraise func=MMAP_CHECK mask=MAY_EXEC
|
/openbmc/linux/fs/ |
H A D | init.c | 52 error = path_permission(&path, MAY_EXEC | MAY_CHDIR); in init_chdir() 67 error = path_permission(&path, MAY_EXEC | MAY_CHDIR); in init_chroot()
|
H A D | open.c | 489 if ((mode & MAY_EXEC) && S_ISREG(inode->i_mode)) { in do_faccessat() 555 error = path_permission(&path, MAY_EXEC | MAY_CHDIR); in SYSCALL_DEFINE1() 584 error = file_permission(f.file, MAY_EXEC | MAY_CHDIR); in SYSCALL_DEFINE1() 603 error = path_permission(&path, MAY_EXEC | MAY_CHDIR); in SYSCALL_DEFINE1()
|
H A D | namei.c | 427 mask &= MAY_READ | MAY_WRITE | MAY_EXEC; in generic_permission() 437 if (!(mask & MAY_EXEC) || (inode->i_mode & S_IXUGO)) in generic_permission() 1720 int err = inode_permission(idmap, nd->inode, MAY_EXEC|MAY_NOT_BLOCK); in may_lookup() 1724 return inode_permission(idmap, nd->inode, MAY_EXEC); in may_lookup() 2688 return inode_permission(idmap, base->d_inode, MAY_EXEC); in lookup_one_common() 2968 error = inode_permission(idmap, dir, MAY_WRITE | MAY_EXEC); in may_delete() 3012 return inode_permission(idmap, dir, MAY_WRITE | MAY_EXEC); in may_create() 3240 if (acc_mode & MAY_EXEC) in may_open() 3250 if (acc_mode & MAY_EXEC) in may_open() 3255 if ((acc_mode & MAY_EXEC) && path_noexec(path)) in may_open() [all …]
|
H A D | exec.c | 131 .acc_mode = MAY_READ | MAY_EXEC, in SYSCALL_DEFINE1() 912 .acc_mode = MAY_EXEC, in do_open_execat() 1654 err = inode_permission(idmap, inode, MAY_EXEC); in bprm_fill_uid()
|
/openbmc/linux/security/apparmor/ |
H A D | domain.c | 340 if (!(perm & MAY_EXEC)) { in aa_xattrs_match() 426 if (perm & MAY_EXEC) { in find_attach() 674 if (perms.allow & MAY_EXEC) { in profile_transition() 685 perms.allow &= ~MAY_EXEC; in profile_transition() 720 aa_audit_file(subj_cred, profile, &perms, OP_EXEC, MAY_EXEC, name, in profile_transition() 993 OP_EXEC, MAY_EXEC, in apparmor_bprm_creds_for_exec()
|
H A D | file.c | 397 } else if ((lperms.allow & MAY_EXEC) && in profile_path_link() 399 lperms.allow &= ~MAY_EXEC; in profile_path_link() 400 request |= MAY_EXEC; in profile_path_link()
|
/openbmc/linux/Documentation/ABI/testing/ |
H A D | ima_policy | 40 [[^]MAY_EXEC] 115 measure func=FILE_MMAP mask=MAY_EXEC
|
/openbmc/linux/fs/configfs/ |
H A D | symlink.c | 200 MAY_WRITE | MAY_EXEC); in configfs_symlink()
|
/openbmc/linux/security/smack/ |
H A D | smack.h | 245 #define MAY_ANYREAD (MAY_READ | MAY_EXEC)
|
H A D | smack_access.c | 294 if (access & MAY_EXEC) in smack_str_from_perm()
|
/openbmc/linux/fs/gfs2/ |
H A D | inode.c | 334 error = gfs2_permission(&nop_mnt_idmap, dir, MAY_EXEC); in gfs2_lookupi() 365 MAY_WRITE | MAY_EXEC); in create_ok() 978 error = gfs2_permission(&nop_mnt_idmap, dir, MAY_WRITE | MAY_EXEC); in gfs2_link() 1094 MAY_WRITE | MAY_EXEC); in gfs2_unlink_ok() 1520 MAY_WRITE | MAY_EXEC); in gfs2_rename()
|
/openbmc/linux/fs/nfs/ |
H A D | dir.c | 3183 mask |= MAY_EXEC; in nfs_access_calc_mask() 3188 mask |= MAY_EXEC; in nfs_access_calc_mask() 3239 if ((mask & ~cache_mask & (MAY_READ | MAY_WRITE | MAY_EXEC)) != 0) in nfs_do_access() 3252 mask = MAY_EXEC; in nfs_open_permission_mask() 3295 if ((mask & (MAY_READ | MAY_WRITE | MAY_EXEC)) == 0) in nfs_permission() 3324 if (!res && (mask & MAY_EXEC)) in nfs_permission()
|
/openbmc/linux/fs/nfsd/ |
H A D | nfsfh.c | 44 d_inode(parent), MAY_EXEC); in nfsd_acceptable()
|
/openbmc/linux/fs/fuse/ |
H A D | dir.c | 1465 inarg.mask = mask & (MAY_READ | MAY_WRITE | MAY_EXEC); in fuse_access() 1518 ((mask & MAY_EXEC) && S_ISREG(inode->i_mode))) { in fuse_permission() 1551 } else if ((mask & MAY_EXEC) && S_ISREG(inode->i_mode)) { in fuse_permission()
|
/openbmc/linux/fs/proc/ |
H A D | proc_sysctl.c | 424 if ((op & ~mode & (MAY_READ|MAY_WRITE|MAY_EXEC)) == 0) in test_perm() 808 if ((mask & MAY_EXEC) && S_ISREG(inode->i_mode)) in proc_sys_permission()
|
/openbmc/linux/fs/smb/server/ |
H A D | vfs.c | 157 if (!inode_permission(idmap, d_inode(dentry), MAY_OPEN | MAY_EXEC)) in ksmbd_vfs_query_maximal_access() 160 if (!inode_permission(idmap, d_inode(dentry->d_parent), MAY_EXEC | MAY_WRITE)) in ksmbd_vfs_query_maximal_access()
|