Home
last modified time | relevance | path

Searched refs:permissions (Results 1 – 25 of 132) sorted by relevance

123456

/Linux-v4.19/Documentation/filesystems/
Dadfs.txt8 ownmask=nnn The permission mask for ADFS 'owner' permissions
10 othmask=nnn The permission mask for ADFS 'other' permissions
16 Mapping of ADFS permissions to Linux permissions
19 ADFS permissions consist of the following:
36 Possible owner mode permissions -> -rwx------
42 Possible other mode permissions -> ----rwxrwx
45 not a UnixExec filetype, then the permissions will be:
60 desire the permissions should be under Linux.
Disofs.txt26 mode=xxx Sets the permissions on files to xxx unless Rock Ridge
27 extensions set the permissions otherwise
28 dmode=xxx Sets the permissions on directories to xxx unless Rock Ridge
29 extensions set the permissions otherwise
30 overriderockperm Set permissions on files and directories according to
Dhfsplus.txt21 that have uninitialized permissions structures.
26 that have uninitialized permissions structures.
Dudf.txt25 mode= Set the default file permissions.
26 dmode= Set the default directory permissions.
/Linux-v4.19/fs/hfsplus/
Dinode.c482 hfsplus_get_perms(inode, &folder->permissions, 1); in hfsplus_cat_read_inode()
506 hfsplus_get_perms(inode, &file->permissions, 0); in hfsplus_cat_read_inode()
509 if (file->permissions.dev) in hfsplus_cat_read_inode()
511 be32_to_cpu(file->permissions.dev)); in hfsplus_cat_read_inode()
521 be32_to_cpu(file->permissions.dev)); in hfsplus_cat_read_inode()
562 hfsplus_cat_set_perms(inode, &folder->permissions); in hfsplus_cat_write_inode()
588 hfsplus_cat_set_perms(inode, &file->permissions); in hfsplus_cat_write_inode()
590 (file->permissions.rootflags | in hfsplus_cat_write_inode()
591 file->permissions.userflags)) in hfsplus_cat_write_inode()
Dcatalog.c124 hfsplus_cat_set_perms(inode, &folder->permissions); in hfsplus_cat_build_record()
143 hfsplus_cat_set_perms(inode, &file->permissions); in hfsplus_cat_build_record()
156 (file->permissions.rootflags | in hfsplus_cat_build_record()
157 file->permissions.userflags)) in hfsplus_cat_build_record()
169 file->permissions.dev = in hfsplus_cat_build_record()
DKconfig13 style features such as file ownership and permissions.
Dhfsplus_raw.h262 struct hfsplus_perm permissions; member
296 struct hfsplus_perm permissions; member
/Linux-v4.19/fs/notify/fanotify/
DKconfig15 bool "fanotify permissions checking"
20 Say Y here is you want fanotify listeners to be able to make permissions
/Linux-v4.19/Documentation/admin-guide/LSM/
Dapparmor.rst12 permissions.
33 For AppArmor to enforce any restrictions beyond standard Linux DAC permissions
/Linux-v4.19/drivers/staging/gasket/
Dgasket_core.c454 if (bar_desc.permissions == GASKET_NOMAP) in gasket_write_mappable_regions()
730 if (coh_buff_desc.permissions != GASKET_NOMAP) { in gasket_is_coherent_region()
750 if (bar_desc.permissions != GASKET_NOMAP) { in gasket_get_bar_index()
979 ulong permissions; in gasket_mmap_coherent() local
987 permissions = driver_desc->coherent_buffer_description.permissions; in gasket_mmap_coherent()
988 if (!gasket_mmap_has_permissions(gasket_dev, vma, permissions)) { in gasket_mmap_coherent()
1021 ulong permissions; in gasket_mmap() local
1082 permissions = bar_desc->permissions; in gasket_mmap()
1083 if (!gasket_mmap_has_permissions(gasket_dev, vma, permissions)) { in gasket_mmap()
1098 bar_desc->permissions)) { in gasket_mmap()
Dgasket_core.h203 ulong permissions; member
225 ulong permissions; member
/Linux-v4.19/Documentation/x86/
Dprotection-keys.txt23 permissions are enforced on data access only and have no effect on
37 directly in order to change access permissions to memory covered
90 the plain mprotect() permissions are violated.
/Linux-v4.19/security/selinux/ss/
Dconstraint.h58 u32 permissions; /* constrained permissions */ member
Dpolicydb.c629 hashtab_map(comdatum->permissions.table, perm_destroy, NULL); in common_destroy()
630 hashtab_destroy(comdatum->permissions.table); in common_destroy()
658 hashtab_map(cladatum->permissions.table, perm_destroy, NULL); in cls_destroy()
659 hashtab_destroy(cladatum->permissions.table); in cls_destroy()
1171 rc = symtab_init(&comdatum->permissions, PERM_SYMTAB_SIZE); in common_read()
1174 comdatum->permissions.nprim = le32_to_cpu(buf[2]); in common_read()
1182 rc = perm_read(p, comdatum->permissions.table, fp); in common_read()
1245 c->permissions = le32_to_cpu(buf[0]); in read_cons_helper()
1337 rc = symtab_init(&cladatum->permissions, PERM_SYMTAB_SIZE); in class_read()
1340 cladatum->permissions.nprim = le32_to_cpu(buf[3]); in class_read()
[all …]
Dpolicydb.h52 struct symtab permissions; /* common permissions */ member
60 struct symtab permissions; /* class-specific permission symbol table */ member
/Linux-v4.19/Documentation/filesystems/pohmelfs/
Dinfo.txt65 Change permissions to read-only (-I 1 option, '-I 2' - write-only, 3 - rw):
75 idx addr(:port) socket_type protocol active priority permissions
82 …rking root directory (note, that server chroots there, so you have to have appropriate permissions)
/Linux-v4.19/Documentation/usb/
Drio.txt113 Set appropriate permissions for /dev/usb/rio500 (don't forget about
114 group and world permissions). Both read and write permissions are
/Linux-v4.19/tools/perf/Documentation/
Dperf-buildid-cache.txt33 /proc/kcore which requires root permissions to read. Be aware that
39 permissions for root only. kcore will not be added if there is already a
/Linux-v4.19/Documentation/media/uapi/dvb/
Dfe-diseqc-send-burst.rst37 read/write permissions.
/Linux-v4.19/fs/ceph/
DKconfig34 POSIX Access Control Lists (ACLs) support permissions for users and
/Linux-v4.19/arch/arc/mm/
Dtlbex.S317 ; VERIFY_PTE: Check if PTE permissions approp for executing code
352 ; VERIFY_PTE: Chk if PTE permissions approp for data access (R/W/R+W)
360 ; -Otherwise they are user-mode permissions, and those are exactly
/Linux-v4.19/net/
Dsysctl_net.c74 .permissions = net_ctl_permissions,
/Linux-v4.19/arch/xtensa/
DKconfig.debug8 This check can spot missing TLB invalidation/wrong PTE permissions/
/Linux-v4.19/drivers/staging/android/
DTODO19 - Add debugfs support for examining the permissions of regions.

123456