/Linux-v4.19/Documentation/filesystems/ |
D | adfs.txt | 8 ownmask=nnn The permission mask for ADFS 'owner' permissions 10 othmask=nnn The permission mask for ADFS 'other' permissions 16 Mapping of ADFS permissions to Linux permissions 19 ADFS permissions consist of the following: 36 Possible owner mode permissions -> -rwx------ 42 Possible other mode permissions -> ----rwxrwx 45 not a UnixExec filetype, then the permissions will be: 60 desire the permissions should be under Linux.
|
D | isofs.txt | 26 mode=xxx Sets the permissions on files to xxx unless Rock Ridge 27 extensions set the permissions otherwise 28 dmode=xxx Sets the permissions on directories to xxx unless Rock Ridge 29 extensions set the permissions otherwise 30 overriderockperm Set permissions on files and directories according to
|
D | hfsplus.txt | 21 that have uninitialized permissions structures. 26 that have uninitialized permissions structures.
|
D | udf.txt | 25 mode= Set the default file permissions. 26 dmode= Set the default directory permissions.
|
/Linux-v4.19/fs/hfsplus/ |
D | inode.c | 482 hfsplus_get_perms(inode, &folder->permissions, 1); in hfsplus_cat_read_inode() 506 hfsplus_get_perms(inode, &file->permissions, 0); in hfsplus_cat_read_inode() 509 if (file->permissions.dev) in hfsplus_cat_read_inode() 511 be32_to_cpu(file->permissions.dev)); in hfsplus_cat_read_inode() 521 be32_to_cpu(file->permissions.dev)); in hfsplus_cat_read_inode() 562 hfsplus_cat_set_perms(inode, &folder->permissions); in hfsplus_cat_write_inode() 588 hfsplus_cat_set_perms(inode, &file->permissions); in hfsplus_cat_write_inode() 590 (file->permissions.rootflags | in hfsplus_cat_write_inode() 591 file->permissions.userflags)) in hfsplus_cat_write_inode()
|
D | catalog.c | 124 hfsplus_cat_set_perms(inode, &folder->permissions); in hfsplus_cat_build_record() 143 hfsplus_cat_set_perms(inode, &file->permissions); in hfsplus_cat_build_record() 156 (file->permissions.rootflags | in hfsplus_cat_build_record() 157 file->permissions.userflags)) in hfsplus_cat_build_record() 169 file->permissions.dev = in hfsplus_cat_build_record()
|
D | Kconfig | 13 style features such as file ownership and permissions.
|
D | hfsplus_raw.h | 262 struct hfsplus_perm permissions; member 296 struct hfsplus_perm permissions; member
|
/Linux-v4.19/fs/notify/fanotify/ |
D | Kconfig | 15 bool "fanotify permissions checking" 20 Say Y here is you want fanotify listeners to be able to make permissions
|
/Linux-v4.19/Documentation/admin-guide/LSM/ |
D | apparmor.rst | 12 permissions. 33 For AppArmor to enforce any restrictions beyond standard Linux DAC permissions
|
/Linux-v4.19/drivers/staging/gasket/ |
D | gasket_core.c | 454 if (bar_desc.permissions == GASKET_NOMAP) in gasket_write_mappable_regions() 730 if (coh_buff_desc.permissions != GASKET_NOMAP) { in gasket_is_coherent_region() 750 if (bar_desc.permissions != GASKET_NOMAP) { in gasket_get_bar_index() 979 ulong permissions; in gasket_mmap_coherent() local 987 permissions = driver_desc->coherent_buffer_description.permissions; in gasket_mmap_coherent() 988 if (!gasket_mmap_has_permissions(gasket_dev, vma, permissions)) { in gasket_mmap_coherent() 1021 ulong permissions; in gasket_mmap() local 1082 permissions = bar_desc->permissions; in gasket_mmap() 1083 if (!gasket_mmap_has_permissions(gasket_dev, vma, permissions)) { in gasket_mmap() 1098 bar_desc->permissions)) { in gasket_mmap()
|
D | gasket_core.h | 203 ulong permissions; member 225 ulong permissions; member
|
/Linux-v4.19/Documentation/x86/ |
D | protection-keys.txt | 23 permissions are enforced on data access only and have no effect on 37 directly in order to change access permissions to memory covered 90 the plain mprotect() permissions are violated.
|
/Linux-v4.19/security/selinux/ss/ |
D | constraint.h | 58 u32 permissions; /* constrained permissions */ member
|
D | policydb.c | 629 hashtab_map(comdatum->permissions.table, perm_destroy, NULL); in common_destroy() 630 hashtab_destroy(comdatum->permissions.table); in common_destroy() 658 hashtab_map(cladatum->permissions.table, perm_destroy, NULL); in cls_destroy() 659 hashtab_destroy(cladatum->permissions.table); in cls_destroy() 1171 rc = symtab_init(&comdatum->permissions, PERM_SYMTAB_SIZE); in common_read() 1174 comdatum->permissions.nprim = le32_to_cpu(buf[2]); in common_read() 1182 rc = perm_read(p, comdatum->permissions.table, fp); in common_read() 1245 c->permissions = le32_to_cpu(buf[0]); in read_cons_helper() 1337 rc = symtab_init(&cladatum->permissions, PERM_SYMTAB_SIZE); in class_read() 1340 cladatum->permissions.nprim = le32_to_cpu(buf[3]); in class_read() [all …]
|
D | policydb.h | 52 struct symtab permissions; /* common permissions */ member 60 struct symtab permissions; /* class-specific permission symbol table */ member
|
/Linux-v4.19/Documentation/filesystems/pohmelfs/ |
D | info.txt | 65 Change permissions to read-only (-I 1 option, '-I 2' - write-only, 3 - rw): 75 idx addr(:port) socket_type protocol active priority permissions 82 …rking root directory (note, that server chroots there, so you have to have appropriate permissions)
|
/Linux-v4.19/Documentation/usb/ |
D | rio.txt | 113 Set appropriate permissions for /dev/usb/rio500 (don't forget about 114 group and world permissions). Both read and write permissions are
|
/Linux-v4.19/tools/perf/Documentation/ |
D | perf-buildid-cache.txt | 33 /proc/kcore which requires root permissions to read. Be aware that 39 permissions for root only. kcore will not be added if there is already a
|
/Linux-v4.19/Documentation/media/uapi/dvb/ |
D | fe-diseqc-send-burst.rst | 37 read/write permissions.
|
/Linux-v4.19/fs/ceph/ |
D | Kconfig | 34 POSIX Access Control Lists (ACLs) support permissions for users and
|
/Linux-v4.19/arch/arc/mm/ |
D | tlbex.S | 317 ; VERIFY_PTE: Check if PTE permissions approp for executing code 352 ; VERIFY_PTE: Chk if PTE permissions approp for data access (R/W/R+W) 360 ; -Otherwise they are user-mode permissions, and those are exactly
|
/Linux-v4.19/net/ |
D | sysctl_net.c | 74 .permissions = net_ctl_permissions,
|
/Linux-v4.19/arch/xtensa/ |
D | Kconfig.debug | 8 This check can spot missing TLB invalidation/wrong PTE permissions/
|
/Linux-v4.19/drivers/staging/android/ |
D | TODO | 19 - Add debugfs support for examining the permissions of regions.
|