/Linux-v5.10/Documentation/filesystems/ |
D | adfs.rst | 39 ownmask=nnn The permission mask for ADFS 'owner' permissions 41 othmask=nnn The permission mask for ADFS 'other' permissions 48 Mapping of ADFS permissions to Linux permissions 51 ADFS permissions consist of the following: 68 Possible owner mode permissions -> -rwx------ 74 Possible other mode permissions -> ----rwxrwx 77 not a UnixExec filetype, then the permissions will be:: 93 desire the permissions should be under Linux.
|
D | isofs.rst | 39 mode=xxx Sets the permissions on files to xxx unless Rock Ridge 40 extensions set the permissions otherwise 41 dmode=xxx Sets the permissions on directories to xxx unless Rock Ridge 42 extensions set the permissions otherwise 43 overriderockperm Set permissions on files and directories according to
|
D | hfsplus.rst | 23 that have uninitialized permissions structures. 28 that have uninitialized permissions structures.
|
D | udf.rst | 29 mode= Set the default file permissions. 30 dmode= Set the default directory permissions.
|
/Linux-v5.10/Documentation/usb/ |
D | text_files.rst | 13 USB devfs drop permissions source 16 .. literalinclude:: usbdevfs-drop-permissions.c
|
/Linux-v5.10/fs/hfsplus/ |
D | inode.c | 504 hfsplus_get_perms(inode, &folder->permissions, 1); in hfsplus_cat_read_inode() 528 hfsplus_get_perms(inode, &file->permissions, 0); in hfsplus_cat_read_inode() 531 if (file->permissions.dev) in hfsplus_cat_read_inode() 533 be32_to_cpu(file->permissions.dev)); in hfsplus_cat_read_inode() 543 be32_to_cpu(file->permissions.dev)); in hfsplus_cat_read_inode() 584 hfsplus_cat_set_perms(inode, &folder->permissions); in hfsplus_cat_write_inode() 610 hfsplus_cat_set_perms(inode, &file->permissions); in hfsplus_cat_write_inode() 612 (file->permissions.rootflags | in hfsplus_cat_write_inode() 613 file->permissions.userflags)) in hfsplus_cat_write_inode()
|
D | catalog.c | 124 hfsplus_cat_set_perms(inode, &folder->permissions); in hfsplus_cat_build_record() 143 hfsplus_cat_set_perms(inode, &file->permissions); in hfsplus_cat_build_record() 156 (file->permissions.rootflags | in hfsplus_cat_build_record() 157 file->permissions.userflags)) in hfsplus_cat_build_record() 169 file->permissions.dev = in hfsplus_cat_build_record()
|
D | Kconfig | 14 style features such as file ownership and permissions.
|
D | hfsplus_raw.h | 262 struct hfsplus_perm permissions; member 296 struct hfsplus_perm permissions; member
|
/Linux-v5.10/fs/notify/fanotify/ |
D | Kconfig | 16 bool "fanotify permissions checking" 21 Say Y here is you want fanotify listeners to be able to make permissions
|
/Linux-v5.10/Documentation/admin-guide/LSM/ |
D | apparmor.rst | 12 permissions. 33 For AppArmor to enforce any restrictions beyond standard Linux DAC permissions
|
/Linux-v5.10/drivers/staging/gasket/ |
D | gasket_core.c | 447 if (bar_desc.permissions == GASKET_NOMAP) in gasket_write_mappable_regions() 721 if (coh_buff_desc.permissions != GASKET_NOMAP) { in gasket_is_coherent_region() 741 if (bar_desc.permissions != GASKET_NOMAP) { in gasket_get_bar_index() 974 ulong permissions; in gasket_mmap_coherent() local 982 permissions = driver_desc->coherent_buffer_description.permissions; in gasket_mmap_coherent() 983 if (!gasket_mmap_has_permissions(gasket_dev, vma, permissions)) { in gasket_mmap_coherent() 1016 ulong permissions; in gasket_mmap() local 1076 permissions = bar_desc->permissions; in gasket_mmap() 1077 if (!gasket_mmap_has_permissions(gasket_dev, vma, permissions)) { in gasket_mmap() 1092 bar_desc->permissions)) { in gasket_mmap()
|
D | gasket_core.h | 195 ulong permissions; member 217 ulong permissions; member
|
/Linux-v5.10/Documentation/core-api/ |
D | protection-keys.rst | 30 permissions are enforced on data access only and have no effect on 45 directly in order to change access permissions to memory covered 100 the plain mprotect() permissions are violated.
|
/Linux-v5.10/security/selinux/ss/ |
D | constraint.h | 58 u32 permissions; /* constrained permissions */ member
|
D | policydb.h | 48 struct symtab permissions; /* common permissions */ member 56 struct symtab permissions; /* class-specific permission symbol table */ member
|
D | policydb.c | 198 hashtab_map(&comdatum->permissions.table, perm_destroy, NULL); in common_destroy() 199 hashtab_destroy(&comdatum->permissions.table); in common_destroy() 227 hashtab_map(&cladatum->permissions.table, perm_destroy, NULL); in cls_destroy() 228 hashtab_destroy(&cladatum->permissions.table); in cls_destroy() 1153 rc = symtab_init(&comdatum->permissions, nel); in common_read() 1156 comdatum->permissions.nprim = le32_to_cpu(buf[2]); in common_read() 1163 rc = perm_read(p, &comdatum->permissions, fp); in common_read() 1226 c->permissions = le32_to_cpu(buf[0]); in read_cons_helper() 1318 rc = symtab_init(&cladatum->permissions, nel); in class_read() 1321 cladatum->permissions.nprim = le32_to_cpu(buf[3]); in class_read() [all …]
|
/Linux-v5.10/tools/perf/Documentation/ |
D | perf-buildid-cache.txt | 33 /proc/kcore which requires root permissions to read. Be aware that 39 permissions for root only. kcore will not be added if there is already a
|
/Linux-v5.10/Documentation/admin-guide/gpio/ |
D | gpio-aggregator.rst | 15 system permissions, on an all-or-nothing basis: either a GPIO controller is 20 using standard UNIX file ownership and permissions. Furthermore, this
|
/Linux-v5.10/arch/arc/mm/ |
D | tlbex.S | 313 ; VERIFY_PTE: Check if PTE permissions approp for executing code 348 ; VERIFY_PTE: Chk if PTE permissions approp for data access (R/W/R+W) 356 ; -Otherwise they are user-mode permissions, and those are exactly
|
/Linux-v5.10/Documentation/userspace-api/media/dvb/ |
D | fe-diseqc-send-burst.rst | 36 read/write permissions.
|
/Linux-v5.10/LICENSES/exceptions/ |
D | GCC-exception-2.0 | 12 In addition to the permissions in the GNU Library General Public License,
|
/Linux-v5.10/net/ |
D | sysctl_net.c | 75 .permissions = net_ctl_permissions,
|
/Linux-v5.10/Documentation/filesystems/spufs/ |
D | spu_create.rst | 46 The mode parameter specifies the permissions used for creating the new 49 file permissions mask out some more bits of mode because they typically
|
/Linux-v5.10/fs/9p/ |
D | Kconfig | 26 POSIX Access Control Lists (ACLs) support permissions for users and
|