Home
last modified time | relevance | path

Searched refs:permissions (Results 1 – 25 of 136) sorted by relevance

123456

/Linux-v5.4/Documentation/filesystems/
Dadfs.txt8 ownmask=nnn The permission mask for ADFS 'owner' permissions
10 othmask=nnn The permission mask for ADFS 'other' permissions
16 Mapping of ADFS permissions to Linux permissions
19 ADFS permissions consist of the following:
36 Possible owner mode permissions -> -rwx------
42 Possible other mode permissions -> ----rwxrwx
45 not a UnixExec filetype, then the permissions will be:
60 desire the permissions should be under Linux.
Disofs.txt26 mode=xxx Sets the permissions on files to xxx unless Rock Ridge
27 extensions set the permissions otherwise
28 dmode=xxx Sets the permissions on directories to xxx unless Rock Ridge
29 extensions set the permissions otherwise
30 overriderockperm Set permissions on files and directories according to
Dhfsplus.txt21 that have uninitialized permissions structures.
26 that have uninitialized permissions structures.
Dudf.txt25 mode= Set the default file permissions.
26 dmode= Set the default directory permissions.
/Linux-v5.4/Documentation/usb/
Dtext_files.rst13 USB devfs drop permissions source
16 .. literalinclude:: usbdevfs-drop-permissions.c
/Linux-v5.4/fs/hfsplus/
Dinode.c504 hfsplus_get_perms(inode, &folder->permissions, 1); in hfsplus_cat_read_inode()
528 hfsplus_get_perms(inode, &file->permissions, 0); in hfsplus_cat_read_inode()
531 if (file->permissions.dev) in hfsplus_cat_read_inode()
533 be32_to_cpu(file->permissions.dev)); in hfsplus_cat_read_inode()
543 be32_to_cpu(file->permissions.dev)); in hfsplus_cat_read_inode()
584 hfsplus_cat_set_perms(inode, &folder->permissions); in hfsplus_cat_write_inode()
610 hfsplus_cat_set_perms(inode, &file->permissions); in hfsplus_cat_write_inode()
612 (file->permissions.rootflags | in hfsplus_cat_write_inode()
613 file->permissions.userflags)) in hfsplus_cat_write_inode()
Dcatalog.c124 hfsplus_cat_set_perms(inode, &folder->permissions); in hfsplus_cat_build_record()
143 hfsplus_cat_set_perms(inode, &file->permissions); in hfsplus_cat_build_record()
156 (file->permissions.rootflags | in hfsplus_cat_build_record()
157 file->permissions.userflags)) in hfsplus_cat_build_record()
169 file->permissions.dev = in hfsplus_cat_build_record()
DKconfig14 style features such as file ownership and permissions.
Dhfsplus_raw.h262 struct hfsplus_perm permissions; member
296 struct hfsplus_perm permissions; member
/Linux-v5.4/fs/notify/fanotify/
DKconfig16 bool "fanotify permissions checking"
21 Say Y here is you want fanotify listeners to be able to make permissions
/Linux-v5.4/Documentation/admin-guide/LSM/
Dapparmor.rst12 permissions.
33 For AppArmor to enforce any restrictions beyond standard Linux DAC permissions
/Linux-v5.4/drivers/staging/gasket/
Dgasket_core.c448 if (bar_desc.permissions == GASKET_NOMAP) in gasket_write_mappable_regions()
723 if (coh_buff_desc.permissions != GASKET_NOMAP) { in gasket_is_coherent_region()
743 if (bar_desc.permissions != GASKET_NOMAP) { in gasket_get_bar_index()
972 ulong permissions; in gasket_mmap_coherent() local
980 permissions = driver_desc->coherent_buffer_description.permissions; in gasket_mmap_coherent()
981 if (!gasket_mmap_has_permissions(gasket_dev, vma, permissions)) { in gasket_mmap_coherent()
1014 ulong permissions; in gasket_mmap() local
1074 permissions = bar_desc->permissions; in gasket_mmap()
1075 if (!gasket_mmap_has_permissions(gasket_dev, vma, permissions)) { in gasket_mmap()
1090 bar_desc->permissions)) { in gasket_mmap()
Dgasket_core.h195 ulong permissions; member
217 ulong permissions; member
/Linux-v5.4/Documentation/core-api/
Dprotection-keys.rst29 permissions are enforced on data access only and have no effect on
44 directly in order to change access permissions to memory covered
99 the plain mprotect() permissions are violated.
/Linux-v5.4/security/selinux/ss/
Dconstraint.h58 u32 permissions; /* constrained permissions */ member
Dpolicydb.h48 struct symtab permissions; /* common permissions */ member
56 struct symtab permissions; /* class-specific permission symbol table */ member
Dpolicydb.c199 hashtab_map(comdatum->permissions.table, perm_destroy, NULL); in common_destroy()
200 hashtab_destroy(comdatum->permissions.table); in common_destroy()
228 hashtab_map(cladatum->permissions.table, perm_destroy, NULL); in cls_destroy()
229 hashtab_destroy(cladatum->permissions.table); in cls_destroy()
1134 rc = symtab_init(&comdatum->permissions, PERM_SYMTAB_SIZE); in common_read()
1137 comdatum->permissions.nprim = le32_to_cpu(buf[2]); in common_read()
1145 rc = perm_read(p, comdatum->permissions.table, fp); in common_read()
1208 c->permissions = le32_to_cpu(buf[0]); in read_cons_helper()
1300 rc = symtab_init(&cladatum->permissions, PERM_SYMTAB_SIZE); in class_read()
1303 cladatum->permissions.nprim = le32_to_cpu(buf[3]); in class_read()
[all …]
/Linux-v5.4/tools/perf/Documentation/
Dperf-buildid-cache.txt33 /proc/kcore which requires root permissions to read. Be aware that
39 permissions for root only. kcore will not be added if there is already a
/Linux-v5.4/drivers/staging/android/
DTODO17 - Add debugfs support for examining the permissions of regions.
/Linux-v5.4/arch/xtensa/
DKconfig.debug8 This check can spot missing TLB invalidation/wrong PTE permissions/
/Linux-v5.4/net/
Dsysctl_net.c75 .permissions = net_ctl_permissions,
/Linux-v5.4/LICENSES/exceptions/
DGCC-exception-2.012 In addition to the permissions in the GNU Library General Public License,
/Linux-v5.4/arch/arc/mm/
Dtlbex.S314 ; VERIFY_PTE: Check if PTE permissions approp for executing code
349 ; VERIFY_PTE: Chk if PTE permissions approp for data access (R/W/R+W)
357 ; -Otherwise they are user-mode permissions, and those are exactly
/Linux-v5.4/fs/9p/
DKconfig26 POSIX Access Control Lists (ACLs) support permissions for users and
/Linux-v5.4/fs/ext2/
DKconfig26 Posix Access Control Lists (ACLs) support permissions for users and

123456