/Linux-v6.1/Documentation/filesystems/ |
D | adfs.rst | 39 ownmask=nnn The permission mask for ADFS 'owner' permissions 41 othmask=nnn The permission mask for ADFS 'other' permissions 48 Mapping of ADFS permissions to Linux permissions 51 ADFS permissions consist of the following: 68 Possible owner mode permissions -> -rwx------ 74 Possible other mode permissions -> ----rwxrwx 77 not a UnixExec filetype, then the permissions will be:: 93 desire the permissions should be under Linux.
|
D | isofs.rst | 39 mode=xxx Sets the permissions on files to xxx unless Rock Ridge 40 extensions set the permissions otherwise 41 dmode=xxx Sets the permissions on directories to xxx unless Rock Ridge 42 extensions set the permissions otherwise 43 overriderockperm Set permissions on files and directories according to
|
D | hfsplus.rst | 23 that have uninitialized permissions structures. 28 that have uninitialized permissions structures.
|
D | udf.rst | 29 mode= Set the default file permissions. 30 dmode= Set the default directory permissions.
|
D | ntfs3.rst | 51 - Controls the default permissions for files/directories created after 62 permissions.
|
/Linux-v6.1/Documentation/usb/ |
D | text_files.rst | 13 USB devfs drop permissions source 16 .. literalinclude:: usbdevfs-drop-permissions.c
|
/Linux-v6.1/Documentation/ABI/testing/ |
D | procfs-attr-prev | 8 The details of permissions required to read from 12 The other details of permissions required to write to
|
D | procfs-attr-current | 7 The details of permissions required to read from 12 The other details of permissions required to write to
|
D | procfs-attr-exec | 8 The details of permissions required to read from 13 The other details of permissions required to write to
|
/Linux-v6.1/fs/hfsplus/ |
D | inode.c | 517 hfsplus_get_perms(inode, &folder->permissions, 1); in hfsplus_cat_read_inode() 540 hfsplus_get_perms(inode, &file->permissions, 0); in hfsplus_cat_read_inode() 543 if (file->permissions.dev) in hfsplus_cat_read_inode() 545 be32_to_cpu(file->permissions.dev)); in hfsplus_cat_read_inode() 555 be32_to_cpu(file->permissions.dev)); in hfsplus_cat_read_inode() 595 hfsplus_cat_set_perms(inode, &folder->permissions); in hfsplus_cat_write_inode() 620 hfsplus_cat_set_perms(inode, &file->permissions); in hfsplus_cat_write_inode() 622 (file->permissions.rootflags | in hfsplus_cat_write_inode() 623 file->permissions.userflags)) in hfsplus_cat_write_inode()
|
D | catalog.c | 124 hfsplus_cat_set_perms(inode, &folder->permissions); in hfsplus_cat_build_record() 143 hfsplus_cat_set_perms(inode, &file->permissions); in hfsplus_cat_build_record() 156 (file->permissions.rootflags | in hfsplus_cat_build_record() 157 file->permissions.userflags)) in hfsplus_cat_build_record() 169 file->permissions.dev = in hfsplus_cat_build_record()
|
D | Kconfig | 14 style features such as file ownership and permissions.
|
D | hfsplus_raw.h | 262 struct hfsplus_perm permissions; member 298 struct hfsplus_perm permissions; member
|
/Linux-v6.1/fs/notify/fanotify/ |
D | Kconfig | 16 bool "fanotify permissions checking" 21 Say Y here is you want fanotify listeners to be able to make permissions
|
/Linux-v6.1/Documentation/admin-guide/LSM/ |
D | apparmor.rst | 12 permissions. 33 For AppArmor to enforce any restrictions beyond standard Linux DAC permissions
|
/Linux-v6.1/Documentation/core-api/ |
D | protection-keys.rst | 28 theoretically space in the PAE PTEs. These permissions are enforced on data 43 directly in order to change access permissions to memory covered 98 the plain mprotect() permissions are violated.
|
/Linux-v6.1/security/selinux/ss/ |
D | constraint.h | 58 u32 permissions; /* constrained permissions */ member
|
D | policydb.h | 48 struct symtab permissions; /* common permissions */ member 56 struct symtab permissions; /* class-specific permission symbol table */ member
|
D | policydb.c | 194 hashtab_map(&comdatum->permissions.table, perm_destroy, NULL); in common_destroy() 195 hashtab_destroy(&comdatum->permissions.table); in common_destroy() 223 hashtab_map(&cladatum->permissions.table, perm_destroy, NULL); in cls_destroy() 224 hashtab_destroy(&cladatum->permissions.table); in cls_destroy() 1145 rc = symtab_init(&comdatum->permissions, nel); in common_read() 1148 comdatum->permissions.nprim = le32_to_cpu(buf[2]); in common_read() 1155 rc = perm_read(p, &comdatum->permissions, fp); in common_read() 1218 c->permissions = le32_to_cpu(buf[0]); in read_cons_helper() 1310 rc = symtab_init(&cladatum->permissions, nel); in class_read() 1313 cladatum->permissions.nprim = le32_to_cpu(buf[3]); in class_read() [all …]
|
/Linux-v6.1/tools/perf/Documentation/ |
D | perf-buildid-cache.txt | 33 /proc/kcore which requires root permissions to read. Be aware that 39 permissions for root only. kcore will not be added if there is already a
|
/Linux-v6.1/arch/x86/include/uapi/asm/ |
D | sgx.h | 99 __u64 permissions; member
|
/Linux-v6.1/Documentation/admin-guide/gpio/ |
D | gpio-aggregator.rst | 15 system permissions, on an all-or-nothing basis: either a GPIO controller is 20 using standard UNIX file ownership and permissions. Furthermore, this
|
/Linux-v6.1/Documentation/userspace-api/media/dvb/ |
D | fe-diseqc-send-burst.rst | 36 read/write permissions.
|
/Linux-v6.1/LICENSES/exceptions/ |
D | GCC-exception-2.0 | 12 In addition to the permissions in the GNU Library General Public License,
|
/Linux-v6.1/Documentation/ABI/stable/ |
D | procfs-audit_loginuid | 10 permissions are not needed to set it. The accessor must
|