Home
last modified time | relevance | path

Searched refs:permissions (Results 1 – 25 of 144) sorted by relevance

123456

/Linux-v5.15/Documentation/filesystems/
Dadfs.rst39 ownmask=nnn The permission mask for ADFS 'owner' permissions
41 othmask=nnn The permission mask for ADFS 'other' permissions
48 Mapping of ADFS permissions to Linux permissions
51 ADFS permissions consist of the following:
68 Possible owner mode permissions -> -rwx------
74 Possible other mode permissions -> ----rwxrwx
77 not a UnixExec filetype, then the permissions will be::
93 desire the permissions should be under Linux.
Disofs.rst39 mode=xxx Sets the permissions on files to xxx unless Rock Ridge
40 extensions set the permissions otherwise
41 dmode=xxx Sets the permissions on directories to xxx unless Rock Ridge
42 extensions set the permissions otherwise
43 overriderockperm Set permissions on files and directories according to
Dhfsplus.rst23 that have uninitialized permissions structures.
28 that have uninitialized permissions structures.
Dudf.rst29 mode= Set the default file permissions.
30 dmode= Set the default directory permissions.
Dntfs3.rst51 - Controls the default permissions for files/directories created after
62 permissions.
/Linux-v5.15/Documentation/usb/
Dtext_files.rst13 USB devfs drop permissions source
16 .. literalinclude:: usbdevfs-drop-permissions.c
/Linux-v5.15/Documentation/ABI/testing/
Dprocfs-attr-prev8 The details of permissions required to read from
12 The other details of permissions required to write to
Dprocfs-attr-current7 The details of permissions required to read from
12 The other details of permissions required to write to
Dprocfs-attr-exec8 The details of permissions required to read from
13 The other details of permissions required to write to
/Linux-v5.15/fs/hfsplus/
Dinode.c516 hfsplus_get_perms(inode, &folder->permissions, 1); in hfsplus_cat_read_inode()
540 hfsplus_get_perms(inode, &file->permissions, 0); in hfsplus_cat_read_inode()
543 if (file->permissions.dev) in hfsplus_cat_read_inode()
545 be32_to_cpu(file->permissions.dev)); in hfsplus_cat_read_inode()
555 be32_to_cpu(file->permissions.dev)); in hfsplus_cat_read_inode()
596 hfsplus_cat_set_perms(inode, &folder->permissions); in hfsplus_cat_write_inode()
622 hfsplus_cat_set_perms(inode, &file->permissions); in hfsplus_cat_write_inode()
624 (file->permissions.rootflags | in hfsplus_cat_write_inode()
625 file->permissions.userflags)) in hfsplus_cat_write_inode()
Dcatalog.c124 hfsplus_cat_set_perms(inode, &folder->permissions); in hfsplus_cat_build_record()
143 hfsplus_cat_set_perms(inode, &file->permissions); in hfsplus_cat_build_record()
156 (file->permissions.rootflags | in hfsplus_cat_build_record()
157 file->permissions.userflags)) in hfsplus_cat_build_record()
169 file->permissions.dev = in hfsplus_cat_build_record()
DKconfig14 style features such as file ownership and permissions.
Dhfsplus_raw.h262 struct hfsplus_perm permissions; member
296 struct hfsplus_perm permissions; member
/Linux-v5.15/fs/notify/fanotify/
DKconfig16 bool "fanotify permissions checking"
21 Say Y here is you want fanotify listeners to be able to make permissions
/Linux-v5.15/Documentation/admin-guide/LSM/
Dapparmor.rst12 permissions.
33 For AppArmor to enforce any restrictions beyond standard Linux DAC permissions
/Linux-v5.15/Documentation/core-api/
Dprotection-keys.rst30 permissions are enforced on data access only and have no effect on
45 directly in order to change access permissions to memory covered
100 the plain mprotect() permissions are violated.
/Linux-v5.15/security/selinux/ss/
Dconstraint.h58 u32 permissions; /* constrained permissions */ member
Dpolicydb.h48 struct symtab permissions; /* common permissions */ member
56 struct symtab permissions; /* class-specific permission symbol table */ member
Dpolicydb.c198 hashtab_map(&comdatum->permissions.table, perm_destroy, NULL); in common_destroy()
199 hashtab_destroy(&comdatum->permissions.table); in common_destroy()
227 hashtab_map(&cladatum->permissions.table, perm_destroy, NULL); in cls_destroy()
228 hashtab_destroy(&cladatum->permissions.table); in cls_destroy()
1151 rc = symtab_init(&comdatum->permissions, nel); in common_read()
1154 comdatum->permissions.nprim = le32_to_cpu(buf[2]); in common_read()
1161 rc = perm_read(p, &comdatum->permissions, fp); in common_read()
1224 c->permissions = le32_to_cpu(buf[0]); in read_cons_helper()
1316 rc = symtab_init(&cladatum->permissions, nel); in class_read()
1319 cladatum->permissions.nprim = le32_to_cpu(buf[3]); in class_read()
[all …]
/Linux-v5.15/tools/perf/Documentation/
Dperf-buildid-cache.txt33 /proc/kcore which requires root permissions to read. Be aware that
39 permissions for root only. kcore will not be added if there is already a
/Linux-v5.15/Documentation/admin-guide/gpio/
Dgpio-aggregator.rst15 system permissions, on an all-or-nothing basis: either a GPIO controller is
20 using standard UNIX file ownership and permissions. Furthermore, this
/Linux-v5.15/Documentation/userspace-api/media/dvb/
Dfe-diseqc-send-burst.rst36 read/write permissions.
/Linux-v5.15/LICENSES/exceptions/
DGCC-exception-2.012 In addition to the permissions in the GNU Library General Public License,
/Linux-v5.15/Documentation/ABI/stable/
Dprocfs-audit_loginuid10 permissions are not needed to set it. The accessor must
/Linux-v5.15/Documentation/filesystems/spufs/
Dspu_create.rst46 The mode parameter specifies the permissions used for creating the new
49 file permissions mask out some more bits of mode because they typically

123456