/linux-4.4.14/Documentation/filesystems/ |
D | adfs.txt | 8 ownmask=nnn The permission mask for ADFS 'owner' permissions 10 othmask=nnn The permission mask for ADFS 'other' permissions 16 Mapping of ADFS permissions to Linux permissions 19 ADFS permissions consist of the following: 36 Possible owner mode permissions -> -rwx------ 42 Possible other mode permissions -> ----rwxrwx 45 not a UnixExec filetype, then the permissions will be: 60 desire the permissions should be under Linux.
|
D | isofs.txt | 26 mode=xxx Sets the permissions on files to xxx unless Rock Ridge 27 extensions set the permissions otherwise 28 dmode=xxx Sets the permissions on directories to xxx unless Rock Ridge 29 extensions set the permissions otherwise 30 overriderockperm Set permissions on files and directories according to
|
D | hfsplus.txt | 21 that have uninitialized permissions structures. 26 that have uninitialized permissions structures.
|
D | devpts.txt | 26 is the presence of new, '/dev/pts/ptmx' node with permissions 0000, which 115 6. The permissions for /dev/pts/ptmx node should be specified when mounting 120 The permissions can be later be changed as usual with 'chmod'.
|
D | udf.txt | 27 mode= Set the default file permissions. 28 dmode= Set the default directory permissions.
|
D | spufs.txt | 15 message queues. Users that have write permissions on the file system 20 logical SPU. Users can change permissions on those files, but not actu- 46 tions, but will not be able to grant permissions that contradict the 440 The mode parameter specifies the permissions used for creating the new 443 file permissions mask out some more bits of mode because they typically
|
D | path-lookup.txt | 56 permissions on the parent inode to be able to walk into it. 68 - perform permissions and validity checks on inodes; 204 queried for permissions. 309 * i_mode, i_uid, i_gid can be tested for exec permissions during path walk.
|
D | fuse.txt | 93 By default FUSE doesn't check file access permissions, the 269 permissions on the mountpoint and only allowing the mount if
|
D | ntfs.txt | 129 he/she has read and write permissions, as well as 131 access permissions. I.e. the mode on all files is by 134 Using a umask of zero will grant all permissions to
|
D | tmpfs.txt | 130 mode: The permissions as an octal number
|
D | qnx6.txt | 80 The metadata about an object includes the permissions, owner, group, flags,
|
D | ramfs-rootfs-initramfs.txt | 159 set permissions or create device nodes in the new archive. (Note that those 208 to minimize problems with permissions on directories that are unwritable or not
|
D | romfs.txt | 110 permissions are assumed to be world readable, if this bit is not set,
|
D | affs.txt | 47 of the original permissions. Directories will get an x
|
D | mandatory-locking.txt | 169 permissions (remove the setgid bit) before trying to read or write to it.
|
D | debugfs.txt | 46 permissions the file should have, parent indicates the directory which
|
D | ext2.txt | 139 its name. The metadata about an object includes the permissions, owner,
|
D | proc.txt | 337 their access permissions. 365 is a set of permissions:
|
/linux-4.4.14/fs/hfsplus/ |
D | inode.c | 494 hfsplus_get_perms(inode, &folder->permissions, 1); in hfsplus_cat_read_inode() 518 hfsplus_get_perms(inode, &file->permissions, 0); in hfsplus_cat_read_inode() 521 if (file->permissions.dev) in hfsplus_cat_read_inode() 523 be32_to_cpu(file->permissions.dev)); in hfsplus_cat_read_inode() 532 be32_to_cpu(file->permissions.dev)); in hfsplus_cat_read_inode() 573 hfsplus_cat_set_perms(inode, &folder->permissions); in hfsplus_cat_write_inode() 599 hfsplus_cat_set_perms(inode, &file->permissions); in hfsplus_cat_write_inode() 601 (file->permissions.rootflags | in hfsplus_cat_write_inode() 602 file->permissions.userflags)) in hfsplus_cat_write_inode()
|
D | Kconfig | 13 style features such as file ownership and permissions. 20 POSIX Access Control Lists (ACLs) support permissions for users and
|
D | catalog.c | 123 hfsplus_cat_set_perms(inode, &folder->permissions); in hfsplus_cat_build_record() 142 hfsplus_cat_set_perms(inode, &file->permissions); in hfsplus_cat_build_record() 155 (file->permissions.rootflags | in hfsplus_cat_build_record() 156 file->permissions.userflags)) in hfsplus_cat_build_record() 168 file->permissions.dev = in hfsplus_cat_build_record()
|
D | hfsplus_raw.h | 261 struct hfsplus_perm permissions; member 295 struct hfsplus_perm permissions; member
|
D | dir.c | 100 be32_to_cpu(entry.file.permissions.dev); in hfsplus_lookup() 235 mode = be16_to_cpu(entry.file.permissions.mode); in hfsplus_readdir()
|
/linux-4.4.14/fs/notify/fanotify/ |
D | Kconfig | 15 bool "fanotify permissions checking" 20 Say Y here is you want fanotify listeners to be able to make permissions
|
/linux-4.4.14/Documentation/security/ |
D | apparmor.txt | 7 permissions. 26 For AppArmor to enforce any restrictions beyond standard Linux DAC permissions
|
D | keys.txt | 21 - Key access permissions 71 (*) Each key has an owner user ID, a group ID and a permissions mask. These 214 Keys have an owner user ID, a group access ID, and a permissions mask. The mask 216 six of each set of eight bits are defined. These permissions granted are: 246 This permits a key's UID, GID and permissions mask to be changed. 248 For changing the ownership, group ID or permissions mask, being the owner of 259 Currently, all of the basic permissions explained above are provided in SELinux 295 file, giving information about their type, description and permissions. 405 to update it. The new key will have all user permissions granted and no 406 group or third party permissions. [all …]
|
D | Yama.txt | 49 0 - classic ptrace permissions: a process can PTRACE_ATTACH to any other
|
D | credentials.txt | 120 A traditional UNIX file, for example, includes a permissions mask that 124 in question). UNIX file permissions do not allow the arbitrary 128 that grants various permissions to arbitrary subjects.
|
D | Smack.txt | 141 modified by enabling the permissions in the third string and disabling 189 permissions that are not allowed. The string "r-x--" would 201 permissions that are not allowed. The string "r-x--" would 481 and devices require access permissions that closely match those used by mode
|
/linux-4.4.14/security/selinux/ss/ |
D | constraint.h | 57 u32 permissions; /* constrained permissions */ member
|
D | policydb.h | 52 struct symtab permissions; /* common permissions */ member 60 struct symtab permissions; /* class-specific permission symbol table */ member
|
D | policydb.c | 623 hashtab_map(comdatum->permissions.table, perm_destroy, NULL); in common_destroy() 624 hashtab_destroy(comdatum->permissions.table); in common_destroy() 652 hashtab_map(cladatum->permissions.table, perm_destroy, NULL); in cls_destroy() 653 hashtab_destroy(cladatum->permissions.table); in cls_destroy() 1166 rc = symtab_init(&comdatum->permissions, PERM_SYMTAB_SIZE); in common_read() 1169 comdatum->permissions.nprim = le32_to_cpu(buf[2]); in common_read() 1177 rc = perm_read(p, comdatum->permissions.table, fp); in common_read() 1240 c->permissions = le32_to_cpu(buf[0]); in read_cons_helper() 1333 rc = symtab_init(&cladatum->permissions, PERM_SYMTAB_SIZE); in class_read() 1336 cladatum->permissions.nprim = le32_to_cpu(buf[3]); in class_read() [all …]
|
D | services.c | 465 u32 permissions, in security_dump_masked_av() argument 479 if (!permissions) in security_dump_masked_av() 488 hashtab_map(common_dat->permissions.table, in security_dump_masked_av() 492 if (hashtab_map(tclass_dat->permissions.table, in security_dump_masked_av() 518 if ((mask & permissions) == 0) in security_dump_masked_av() 719 if ((constraint->permissions & (avd->allowed)) && in context_struct_compute_av() 722 avd->allowed &= ~(constraint->permissions); in context_struct_compute_av() 2947 *nperms = match->permissions.nprim; in security_get_permissions() 2953 rc = hashtab_map(match->comdatum->permissions.table, in security_get_permissions() 2959 rc = hashtab_map(match->permissions.table, get_permissions_callback, in security_get_permissions()
|
/linux-4.4.14/tools/perf/Documentation/ |
D | perf-buildid-cache.txt | 27 /proc/kcore which requires root permissions to read. Be aware that 33 permissions for root only. kcore will not be added if there is already a
|
D | perf-top.txt | 228 levels are subject to permissions. When sampling on multiple events, branch stack sampling
|
D | perf-record.txt | 257 levels are subject to permissions. When sampling on multiple events, branch stack sampling
|
/linux-4.4.14/Documentation/filesystems/pohmelfs/ |
D | info.txt | 65 Change permissions to read-only (-I 1 option, '-I 2' - write-only, 3 - rw): 75 idx addr(:port) socket_type protocol active priority permissions 82 …rking root directory (note, that server chroots there, so you have to have appropriate permissions)
|
D | design_notes.txt | 62 are connected with write permission turned on. IO priority and permissions can be changed in
|
D | network_protocol.txt | 85 mode (permissions and type) and length of the name as long as name itself.
|
/linux-4.4.14/Documentation/usb/ |
D | rio.txt | 113 Set appropriate permissions for /dev/usb/rio500 (don't forget about 114 group and world permissions). Both read and write permissions are
|
D | proc_usb_info.txt | 77 grant read/write permissions to other users by using "chmod". Also,
|
/linux-4.4.14/net/ |
D | sysctl_net.c | 64 .permissions = net_ctl_permissions,
|
/linux-4.4.14/fs/ceph/ |
D | Kconfig | 34 POSIX Access Control Lists (ACLs) support permissions for users and
|
/linux-4.4.14/arch/x86/kvm/ |
D | mmu.h | 172 return (mmu->permissions[index] >> pte_access) & 1; in permission_fault()
|
D | mmu.c | 3818 for (byte = 0; byte < ARRAY_SIZE(mmu->permissions); ++byte) { in update_permission_bitmask() 3870 mmu->permissions[byte] = map; in update_permission_bitmask()
|
/linux-4.4.14/arch/arc/mm/ |
D | tlbex.S | 323 ; VERIFY_PTE: Check if PTE permissions approp for executing code 364 ; VERIFY_PTE: Chk if PTE permissions approp for data access (R/W/R+W) 372 ; -Otherwise they are user-mode permissions, and those are exactly
|
/linux-4.4.14/arch/xtensa/ |
D | Kconfig.debug | 10 This check can spot missing TLB invalidation/wrong PTE permissions/
|
/linux-4.4.14/fs/9p/ |
D | Kconfig | 25 POSIX Access Control Lists (ACLs) support permissions for users and
|
/linux-4.4.14/fs/ext2/ |
D | Kconfig | 26 Posix Access Control Lists (ACLs) support permissions for users and
|
/linux-4.4.14/Documentation/namespaces/ |
D | compatibility-list.txt | 31 access permissions to files, belonging to user 10 in another
|
/linux-4.4.14/include/linux/ |
D | sysctl.h | 159 int (*permissions)(struct ctl_table_header *head, struct ctl_table *table); member
|
/linux-4.4.14/fs/jfs/ |
D | Kconfig | 16 Posix Access Control Lists (ACLs) support permissions for users and
|
/linux-4.4.14/Documentation/cgroups/ |
D | devices.txt | 49 A cgroup may not be granted more permissions than the cgroup's 55 access permissions than its parent. Every time an entry is written to
|
D | cpusets.txt | 63 virtual file system, manage the attributes and permissions of these 198 may be re-attached to any other cpuset, if allowed by the permissions
|
D | cgroups.txt | 259 any other cgroup, if allowed by the permissions on the necessary
|
D | unified-hierarchy.txt | 604 ownership and/or permissions on the cgroup directory and
|
/linux-4.4.14/Documentation/early-userspace/ |
D | buffer-format.txt | 55 c_mode 8 bytes File mode and permissions 70 on Linux, and encodes the file type and file permissions.
|
/linux-4.4.14/arch/arm/ |
D | Kconfig-nommu | 60 Unit (MPU) that defines the type and permissions for regions of
|
/linux-4.4.14/kernel/debug/kdb/ |
D | kdb_main.c | 202 static inline bool kdb_check_flags(kdb_cmdflags_t flags, int permissions, in kdb_check_flags() argument 206 permissions &= KDB_ENABLE_MASK; in kdb_check_flags() 207 permissions |= KDB_ENABLE_ALWAYS_SAFE; in kdb_check_flags() 211 permissions |= permissions << KDB_ENABLE_NO_ARGS_SHIFT; in kdb_check_flags() 215 return permissions & flags; in kdb_check_flags()
|
/linux-4.4.14/Documentation/ |
D | mono.txt | 66 that the .exe file has execute permissions.
|
D | binfmt_misc.txt | 67 will run with root permissions when a setuid binary owned by root
|
D | java.txt | 383 Set the executable permissions of the binary file, with:
|
D | nommu-mmap.txt | 42 same segment of the same file if that has compatible permissions,
|
D | initrd.txt | 145 Note that /sbin/init's permissions must include "x" (execute).
|
D | adding-syscalls.txt | 156 only a calling process with the same permissions as the target process, or
|
D | devices.txt | 2169 the proper permissions and modes by mounting the
|
/linux-4.4.14/fs/udf/ |
D | ecma_167.h | 548 __le32 permissions; member 772 __le32 permissions; member
|
D | inode.c | 1594 uint32_t permissions; in udf_convert_permissions() local 1597 permissions = le32_to_cpu(fe->permissions); in udf_convert_permissions() 1600 mode = ((permissions) & S_IRWXO) | in udf_convert_permissions() 1601 ((permissions >> 2) & S_IRWXG) | in udf_convert_permissions() 1602 ((permissions >> 4) & S_IRWXU) | in udf_convert_permissions() 1674 udfperms |= (le32_to_cpu(fe->permissions) & in udf_update_inode() 1678 fe->permissions = cpu_to_le32(udfperms); in udf_update_inode()
|
/linux-4.4.14/tools/perf/tests/attr/ |
D | README | 19 and write permissions.
|
/linux-4.4.14/drivers/base/ |
D | Kconfig | 33 nodes with their default names and permissions for all 36 symlinks, and apply needed permissions. 38 udev runs on top, managing permissions and adding meaningful
|
/linux-4.4.14/fs/f2fs/ |
D | Kconfig | 47 Posix Access Control Lists (ACLs) support permissions for users and
|
/linux-4.4.14/fs/btrfs/ |
D | Kconfig | 36 POSIX Access Control Lists (ACLs) support permissions for users and
|
/linux-4.4.14/Documentation/devicetree/bindings/iommu/ |
D | samsung,sysmmu.txt | 9 permissions, shareability and security protection. In addition, System MMU has
|
/linux-4.4.14/fs/reiserfs/ |
D | Kconfig | 70 Posix Access Control Lists (ACLs) support permissions for users and
|
/linux-4.4.14/arch/alpha/math-emu/ |
D | qrnnd.S | 11 # In addition to the permissions in the GNU General Public License, the
|
/linux-4.4.14/Documentation/ABI/stable/ |
D | sysfs-bus-firewire | 38 Users: udev rules to set ownership and access permissions or ACLs of
|
/linux-4.4.14/fs/xfs/ |
D | Kconfig | 47 POSIX Access Control Lists (ACLs) support permissions for users and
|
/linux-4.4.14/fs/ext4/ |
D | Kconfig | 81 POSIX Access Control Lists (ACLs) support permissions for users and
|
/linux-4.4.14/Documentation/cpu-freq/ |
D | boost.txt | 56 Explicitly changing the permissions and writing to that file anyway will
|
/linux-4.4.14/Documentation/virtual/kvm/ |
D | mmu.txt | 155 Inherited guest access permissions in the form uwx. Note execute 301 - if permissions are insufficient, reflect the fault back to the guest 344 we cannot map the permissions for gpte.u=1, gpte.w=0 to any spte (the 347 We handle this by mapping the permissions to two possible sptes, depending
|
/linux-4.4.14/fs/jffs2/ |
D | Kconfig | 82 Posix Access Control Lists (ACLs) support permissions for users and
|
/linux-4.4.14/Documentation/arm/nwfpe/ |
D | README.FPE | 93 the requested permissions conditions, and performs the requested operation.
|
/linux-4.4.14/Documentation/video4linux/ |
D | uvcvideo.txt | 88 UVCIOC_CTRL_ADD and UVCIOC_CTRL_MAP ioctls require super user permissions.
|
/linux-4.4.14/Documentation/networking/ |
D | tuntap.txt | 41 Set permissions:
|
D | README.sb1000 | 101 frequently used commands like this with root permissions if possible. If you
|
D | LICENSE.qlcnic | 131 this License, whose permissions for other licensees extend to the
|
D | LICENSE.qlge | 131 this License, whose permissions for other licensees extend to the
|
/linux-4.4.14/fs/proc/ |
D | proc_sysctl.c | 422 if (root->permissions) in sysctl_perm() 423 mode = root->permissions(head, table); in sysctl_perm()
|
/linux-4.4.14/Documentation/filesystems/caching/ |
D | cachefiles.txt | 179 permissions to prevent random users being able to access them directly. 363 The daemon's security ID gives it only a very restricted set of permissions: it
|
/linux-4.4.14/Documentation/frv/ |
D | features.txt | 218 filesystem permissions set on the device file.
|
/linux-4.4.14/Documentation/hwmon/ |
D | dme1737 | 212 permissions and a short description:
|
/linux-4.4.14/Documentation/sound/oss/ |
D | MultiSound | 557 X * This is Linux-specific, and must be run with root permissions.
|
/linux-4.4.14/arch/x86/include/asm/ |
D | kvm_host.h | 297 u8 permissions[16]; member
|
/linux-4.4.14/arch/arm/mm/ |
D | Kconfig | 1043 bool "Restrict kernel memory permissions" 1048 padded to section-size (1MiB) boundaries (because their permissions
|
/linux-4.4.14/Documentation/filesystems/cifs/ |
D | README | 117 allow adding entries to a file to the /etc/permissions file to achieve the 133 Note that uid, gid and file permissions will display default values if you do 286 (such as Windows), permissions can also be checked at the
|
/linux-4.4.14/scripts/ |
D | spelling.txt | 717 permissons||permissions
|
/linux-4.4.14/Documentation/scsi/ |
D | aic7xxx.txt | 381 * the permissions given by Adaptec.
|
D | LICENSE.qla4xxx | 132 this License, whose permissions for other licensees extend to the
|
D | LICENSE.qla2xxx | 133 this License, whose permissions for other licensees extend to the
|
D | aic79xx.txt | 484 * the permissions given by Adaptec.
|
/linux-4.4.14/Documentation/sysctl/ |
D | kernel.txt | 379 if permissions are elevated between the open() and the read() (e.g via 383 world read permissions from files that use %pK, and using dmesg_restrict
|
/linux-4.4.14/Documentation/vm/ |
D | hugetlbpage.txt | 302 Regular chown, chgrp, and chmod commands (with right permissions) could be
|
D | unevictable-lru.txt | 402 get_user_pages() was enhanced to accept a flag to ignore the permissions when
|
/linux-4.4.14/ |
D | README | 62 directory where you have permissions (eg. your home directory) and
|
D | COPYING | 137 this License, whose permissions for other licensees extend to the
|
/linux-4.4.14/drivers/staging/rtl8192u/ |
D | copying | 121 this License, whose permissions for other licensees extend to the
|
/linux-4.4.14/tools/usb/usbip/ |
D | COPYING | 121 this License, whose permissions for other licensees extend to the
|
/linux-4.4.14/Documentation/filesystems/configfs/ |
D | configfs.txt | 197 filename. configfs_attribute->ca_mode specifies the file permissions.
|
/linux-4.4.14/drivers/staging/rtl8192e/ |
D | license | 124 permissions for other licensees extend to the entire whole, and thus to
|
/linux-4.4.14/Documentation/powerpc/ |
D | hvcs.txt | 480 permissions to use the /dev/hvcs* device.
|
/linux-4.4.14/arch/powerpc/ |
D | Kconfig | 620 to set access permissions (read/write, readonly, or no access)
|
/linux-4.4.14/Documentation/s390/ |
D | Debugging390.txt | 1977 & memory access permissions for each virtual memory area.
|
/linux-4.4.14/drivers/staging/speakup/ |
D | spkguide.txt | 468 path, perhaps /usr/local/bin, and set the permissions to 755 with the
|