| /Linux-v5.4/Documentation/filesystems/ |
| D | adfs.txt | 8 ownmask=nnn The permission mask for ADFS 'owner' permissions 10 othmask=nnn The permission mask for ADFS 'other' permissions 16 Mapping of ADFS permissions to Linux permissions 19 ADFS permissions consist of the following: 36 Possible owner mode permissions -> -rwx------ 42 Possible other mode permissions -> ----rwxrwx 45 not a UnixExec filetype, then the permissions will be: 60 desire the permissions should be under Linux.
|
| D | isofs.txt | 26 mode=xxx Sets the permissions on files to xxx unless Rock Ridge 27 extensions set the permissions otherwise 28 dmode=xxx Sets the permissions on directories to xxx unless Rock Ridge 29 extensions set the permissions otherwise 30 overriderockperm Set permissions on files and directories according to
|
| D | hfsplus.txt | 21 that have uninitialized permissions structures. 26 that have uninitialized permissions structures.
|
| D | udf.txt | 25 mode= Set the default file permissions. 26 dmode= Set the default directory permissions.
|
| /Linux-v5.4/Documentation/usb/ |
| D | text_files.rst | 13 USB devfs drop permissions source 16 .. literalinclude:: usbdevfs-drop-permissions.c
|
| /Linux-v5.4/fs/hfsplus/ |
| D | inode.c | 504 hfsplus_get_perms(inode, &folder->permissions, 1); in hfsplus_cat_read_inode() 528 hfsplus_get_perms(inode, &file->permissions, 0); in hfsplus_cat_read_inode() 531 if (file->permissions.dev) in hfsplus_cat_read_inode() 533 be32_to_cpu(file->permissions.dev)); in hfsplus_cat_read_inode() 543 be32_to_cpu(file->permissions.dev)); in hfsplus_cat_read_inode() 584 hfsplus_cat_set_perms(inode, &folder->permissions); in hfsplus_cat_write_inode() 610 hfsplus_cat_set_perms(inode, &file->permissions); in hfsplus_cat_write_inode() 612 (file->permissions.rootflags | in hfsplus_cat_write_inode() 613 file->permissions.userflags)) in hfsplus_cat_write_inode()
|
| D | catalog.c | 124 hfsplus_cat_set_perms(inode, &folder->permissions); in hfsplus_cat_build_record() 143 hfsplus_cat_set_perms(inode, &file->permissions); in hfsplus_cat_build_record() 156 (file->permissions.rootflags | in hfsplus_cat_build_record() 157 file->permissions.userflags)) in hfsplus_cat_build_record() 169 file->permissions.dev = in hfsplus_cat_build_record()
|
| D | Kconfig | 14 style features such as file ownership and permissions.
|
| D | hfsplus_raw.h | 262 struct hfsplus_perm permissions; member 296 struct hfsplus_perm permissions; member
|
| /Linux-v5.4/fs/notify/fanotify/ |
| D | Kconfig | 16 bool "fanotify permissions checking" 21 Say Y here is you want fanotify listeners to be able to make permissions
|
| /Linux-v5.4/Documentation/admin-guide/LSM/ |
| D | apparmor.rst | 12 permissions. 33 For AppArmor to enforce any restrictions beyond standard Linux DAC permissions
|
| /Linux-v5.4/drivers/staging/gasket/ |
| D | gasket_core.c | 448 if (bar_desc.permissions == GASKET_NOMAP) in gasket_write_mappable_regions() 723 if (coh_buff_desc.permissions != GASKET_NOMAP) { in gasket_is_coherent_region() 743 if (bar_desc.permissions != GASKET_NOMAP) { in gasket_get_bar_index() 972 ulong permissions; in gasket_mmap_coherent() local 980 permissions = driver_desc->coherent_buffer_description.permissions; in gasket_mmap_coherent() 981 if (!gasket_mmap_has_permissions(gasket_dev, vma, permissions)) { in gasket_mmap_coherent() 1014 ulong permissions; in gasket_mmap() local 1074 permissions = bar_desc->permissions; in gasket_mmap() 1075 if (!gasket_mmap_has_permissions(gasket_dev, vma, permissions)) { in gasket_mmap() 1090 bar_desc->permissions)) { in gasket_mmap()
|
| D | gasket_core.h | 195 ulong permissions; member 217 ulong permissions; member
|
| /Linux-v5.4/Documentation/core-api/ |
| D | protection-keys.rst | 29 permissions are enforced on data access only and have no effect on 44 directly in order to change access permissions to memory covered 99 the plain mprotect() permissions are violated.
|
| /Linux-v5.4/security/selinux/ss/ |
| D | constraint.h | 58 u32 permissions; /* constrained permissions */ member
|
| D | policydb.h | 48 struct symtab permissions; /* common permissions */ member 56 struct symtab permissions; /* class-specific permission symbol table */ member
|
| D | policydb.c | 199 hashtab_map(comdatum->permissions.table, perm_destroy, NULL); in common_destroy() 200 hashtab_destroy(comdatum->permissions.table); in common_destroy() 228 hashtab_map(cladatum->permissions.table, perm_destroy, NULL); in cls_destroy() 229 hashtab_destroy(cladatum->permissions.table); in cls_destroy() 1134 rc = symtab_init(&comdatum->permissions, PERM_SYMTAB_SIZE); in common_read() 1137 comdatum->permissions.nprim = le32_to_cpu(buf[2]); in common_read() 1145 rc = perm_read(p, comdatum->permissions.table, fp); in common_read() 1208 c->permissions = le32_to_cpu(buf[0]); in read_cons_helper() 1300 rc = symtab_init(&cladatum->permissions, PERM_SYMTAB_SIZE); in class_read() 1303 cladatum->permissions.nprim = le32_to_cpu(buf[3]); in class_read() [all …]
|
| /Linux-v5.4/tools/perf/Documentation/ |
| D | perf-buildid-cache.txt | 33 /proc/kcore which requires root permissions to read. Be aware that 39 permissions for root only. kcore will not be added if there is already a
|
| /Linux-v5.4/drivers/staging/android/ |
| D | TODO | 17 - Add debugfs support for examining the permissions of regions.
|
| /Linux-v5.4/arch/xtensa/ |
| D | Kconfig.debug | 8 This check can spot missing TLB invalidation/wrong PTE permissions/
|
| /Linux-v5.4/net/ |
| D | sysctl_net.c | 75 .permissions = net_ctl_permissions,
|
| /Linux-v5.4/LICENSES/exceptions/ |
| D | GCC-exception-2.0 | 12 In addition to the permissions in the GNU Library General Public License,
|
| /Linux-v5.4/arch/arc/mm/ |
| D | tlbex.S | 314 ; VERIFY_PTE: Check if PTE permissions approp for executing code 349 ; VERIFY_PTE: Chk if PTE permissions approp for data access (R/W/R+W) 357 ; -Otherwise they are user-mode permissions, and those are exactly
|
| /Linux-v5.4/fs/9p/ |
| D | Kconfig | 26 POSIX Access Control Lists (ACLs) support permissions for users and
|
| /Linux-v5.4/fs/ext2/ |
| D | Kconfig | 26 Posix Access Control Lists (ACLs) support permissions for users and
|