Home
last modified time | relevance | path

Searched refs:permissions (Results 1 – 25 of 139) sorted by relevance

123456

/Linux-v5.10/Documentation/filesystems/
Dadfs.rst39 ownmask=nnn The permission mask for ADFS 'owner' permissions
41 othmask=nnn The permission mask for ADFS 'other' permissions
48 Mapping of ADFS permissions to Linux permissions
51 ADFS permissions consist of the following:
68 Possible owner mode permissions -> -rwx------
74 Possible other mode permissions -> ----rwxrwx
77 not a UnixExec filetype, then the permissions will be::
93 desire the permissions should be under Linux.
Disofs.rst39 mode=xxx Sets the permissions on files to xxx unless Rock Ridge
40 extensions set the permissions otherwise
41 dmode=xxx Sets the permissions on directories to xxx unless Rock Ridge
42 extensions set the permissions otherwise
43 overriderockperm Set permissions on files and directories according to
Dhfsplus.rst23 that have uninitialized permissions structures.
28 that have uninitialized permissions structures.
Dudf.rst29 mode= Set the default file permissions.
30 dmode= Set the default directory permissions.
/Linux-v5.10/Documentation/usb/
Dtext_files.rst13 USB devfs drop permissions source
16 .. literalinclude:: usbdevfs-drop-permissions.c
/Linux-v5.10/fs/hfsplus/
Dinode.c504 hfsplus_get_perms(inode, &folder->permissions, 1); in hfsplus_cat_read_inode()
528 hfsplus_get_perms(inode, &file->permissions, 0); in hfsplus_cat_read_inode()
531 if (file->permissions.dev) in hfsplus_cat_read_inode()
533 be32_to_cpu(file->permissions.dev)); in hfsplus_cat_read_inode()
543 be32_to_cpu(file->permissions.dev)); in hfsplus_cat_read_inode()
584 hfsplus_cat_set_perms(inode, &folder->permissions); in hfsplus_cat_write_inode()
610 hfsplus_cat_set_perms(inode, &file->permissions); in hfsplus_cat_write_inode()
612 (file->permissions.rootflags | in hfsplus_cat_write_inode()
613 file->permissions.userflags)) in hfsplus_cat_write_inode()
Dcatalog.c124 hfsplus_cat_set_perms(inode, &folder->permissions); in hfsplus_cat_build_record()
143 hfsplus_cat_set_perms(inode, &file->permissions); in hfsplus_cat_build_record()
156 (file->permissions.rootflags | in hfsplus_cat_build_record()
157 file->permissions.userflags)) in hfsplus_cat_build_record()
169 file->permissions.dev = in hfsplus_cat_build_record()
DKconfig14 style features such as file ownership and permissions.
Dhfsplus_raw.h262 struct hfsplus_perm permissions; member
296 struct hfsplus_perm permissions; member
/Linux-v5.10/fs/notify/fanotify/
DKconfig16 bool "fanotify permissions checking"
21 Say Y here is you want fanotify listeners to be able to make permissions
/Linux-v5.10/Documentation/admin-guide/LSM/
Dapparmor.rst12 permissions.
33 For AppArmor to enforce any restrictions beyond standard Linux DAC permissions
/Linux-v5.10/drivers/staging/gasket/
Dgasket_core.c447 if (bar_desc.permissions == GASKET_NOMAP) in gasket_write_mappable_regions()
721 if (coh_buff_desc.permissions != GASKET_NOMAP) { in gasket_is_coherent_region()
741 if (bar_desc.permissions != GASKET_NOMAP) { in gasket_get_bar_index()
974 ulong permissions; in gasket_mmap_coherent() local
982 permissions = driver_desc->coherent_buffer_description.permissions; in gasket_mmap_coherent()
983 if (!gasket_mmap_has_permissions(gasket_dev, vma, permissions)) { in gasket_mmap_coherent()
1016 ulong permissions; in gasket_mmap() local
1076 permissions = bar_desc->permissions; in gasket_mmap()
1077 if (!gasket_mmap_has_permissions(gasket_dev, vma, permissions)) { in gasket_mmap()
1092 bar_desc->permissions)) { in gasket_mmap()
Dgasket_core.h195 ulong permissions; member
217 ulong permissions; member
/Linux-v5.10/Documentation/core-api/
Dprotection-keys.rst30 permissions are enforced on data access only and have no effect on
45 directly in order to change access permissions to memory covered
100 the plain mprotect() permissions are violated.
/Linux-v5.10/security/selinux/ss/
Dconstraint.h58 u32 permissions; /* constrained permissions */ member
Dpolicydb.h48 struct symtab permissions; /* common permissions */ member
56 struct symtab permissions; /* class-specific permission symbol table */ member
Dpolicydb.c198 hashtab_map(&comdatum->permissions.table, perm_destroy, NULL); in common_destroy()
199 hashtab_destroy(&comdatum->permissions.table); in common_destroy()
227 hashtab_map(&cladatum->permissions.table, perm_destroy, NULL); in cls_destroy()
228 hashtab_destroy(&cladatum->permissions.table); in cls_destroy()
1153 rc = symtab_init(&comdatum->permissions, nel); in common_read()
1156 comdatum->permissions.nprim = le32_to_cpu(buf[2]); in common_read()
1163 rc = perm_read(p, &comdatum->permissions, fp); in common_read()
1226 c->permissions = le32_to_cpu(buf[0]); in read_cons_helper()
1318 rc = symtab_init(&cladatum->permissions, nel); in class_read()
1321 cladatum->permissions.nprim = le32_to_cpu(buf[3]); in class_read()
[all …]
/Linux-v5.10/tools/perf/Documentation/
Dperf-buildid-cache.txt33 /proc/kcore which requires root permissions to read. Be aware that
39 permissions for root only. kcore will not be added if there is already a
/Linux-v5.10/Documentation/admin-guide/gpio/
Dgpio-aggregator.rst15 system permissions, on an all-or-nothing basis: either a GPIO controller is
20 using standard UNIX file ownership and permissions. Furthermore, this
/Linux-v5.10/arch/arc/mm/
Dtlbex.S313 ; VERIFY_PTE: Check if PTE permissions approp for executing code
348 ; VERIFY_PTE: Chk if PTE permissions approp for data access (R/W/R+W)
356 ; -Otherwise they are user-mode permissions, and those are exactly
/Linux-v5.10/Documentation/userspace-api/media/dvb/
Dfe-diseqc-send-burst.rst36 read/write permissions.
/Linux-v5.10/LICENSES/exceptions/
DGCC-exception-2.012 In addition to the permissions in the GNU Library General Public License,
/Linux-v5.10/net/
Dsysctl_net.c75 .permissions = net_ctl_permissions,
/Linux-v5.10/Documentation/filesystems/spufs/
Dspu_create.rst46 The mode parameter specifies the permissions used for creating the new
49 file permissions mask out some more bits of mode because they typically
/Linux-v5.10/fs/9p/
DKconfig26 POSIX Access Control Lists (ACLs) support permissions for users and

123456