Home
last modified time | relevance | path

Searched refs:permissions (Results 1 – 113 of 113) sorted by relevance

/linux-4.4.14/Documentation/filesystems/
Dadfs.txt8 ownmask=nnn The permission mask for ADFS 'owner' permissions
10 othmask=nnn The permission mask for ADFS 'other' permissions
16 Mapping of ADFS permissions to Linux permissions
19 ADFS permissions consist of the following:
36 Possible owner mode permissions -> -rwx------
42 Possible other mode permissions -> ----rwxrwx
45 not a UnixExec filetype, then the permissions will be:
60 desire the permissions should be under Linux.
Disofs.txt26 mode=xxx Sets the permissions on files to xxx unless Rock Ridge
27 extensions set the permissions otherwise
28 dmode=xxx Sets the permissions on directories to xxx unless Rock Ridge
29 extensions set the permissions otherwise
30 overriderockperm Set permissions on files and directories according to
Dhfsplus.txt21 that have uninitialized permissions structures.
26 that have uninitialized permissions structures.
Ddevpts.txt26 is the presence of new, '/dev/pts/ptmx' node with permissions 0000, which
115 6. The permissions for /dev/pts/ptmx node should be specified when mounting
120 The permissions can be later be changed as usual with 'chmod'.
Dudf.txt27 mode= Set the default file permissions.
28 dmode= Set the default directory permissions.
Dspufs.txt15 message queues. Users that have write permissions on the file system
20 logical SPU. Users can change permissions on those files, but not actu-
46 tions, but will not be able to grant permissions that contradict the
440 The mode parameter specifies the permissions used for creating the new
443 file permissions mask out some more bits of mode because they typically
Dpath-lookup.txt56 permissions on the parent inode to be able to walk into it.
68 - perform permissions and validity checks on inodes;
204 queried for permissions.
309 * i_mode, i_uid, i_gid can be tested for exec permissions during path walk.
Dfuse.txt93 By default FUSE doesn't check file access permissions, the
269 permissions on the mountpoint and only allowing the mount if
Dntfs.txt129 he/she has read and write permissions, as well as
131 access permissions. I.e. the mode on all files is by
134 Using a umask of zero will grant all permissions to
Dtmpfs.txt130 mode: The permissions as an octal number
Dqnx6.txt80 The metadata about an object includes the permissions, owner, group, flags,
Dramfs-rootfs-initramfs.txt159 set permissions or create device nodes in the new archive. (Note that those
208 to minimize problems with permissions on directories that are unwritable or not
Dromfs.txt110 permissions are assumed to be world readable, if this bit is not set,
Daffs.txt47 of the original permissions. Directories will get an x
Dmandatory-locking.txt169 permissions (remove the setgid bit) before trying to read or write to it.
Ddebugfs.txt46 permissions the file should have, parent indicates the directory which
Dext2.txt139 its name. The metadata about an object includes the permissions, owner,
Dproc.txt337 their access permissions.
365 is a set of permissions:
/linux-4.4.14/fs/hfsplus/
Dinode.c494 hfsplus_get_perms(inode, &folder->permissions, 1); in hfsplus_cat_read_inode()
518 hfsplus_get_perms(inode, &file->permissions, 0); in hfsplus_cat_read_inode()
521 if (file->permissions.dev) in hfsplus_cat_read_inode()
523 be32_to_cpu(file->permissions.dev)); in hfsplus_cat_read_inode()
532 be32_to_cpu(file->permissions.dev)); in hfsplus_cat_read_inode()
573 hfsplus_cat_set_perms(inode, &folder->permissions); in hfsplus_cat_write_inode()
599 hfsplus_cat_set_perms(inode, &file->permissions); in hfsplus_cat_write_inode()
601 (file->permissions.rootflags | in hfsplus_cat_write_inode()
602 file->permissions.userflags)) in hfsplus_cat_write_inode()
DKconfig13 style features such as file ownership and permissions.
20 POSIX Access Control Lists (ACLs) support permissions for users and
Dcatalog.c123 hfsplus_cat_set_perms(inode, &folder->permissions); in hfsplus_cat_build_record()
142 hfsplus_cat_set_perms(inode, &file->permissions); in hfsplus_cat_build_record()
155 (file->permissions.rootflags | in hfsplus_cat_build_record()
156 file->permissions.userflags)) in hfsplus_cat_build_record()
168 file->permissions.dev = in hfsplus_cat_build_record()
Dhfsplus_raw.h261 struct hfsplus_perm permissions; member
295 struct hfsplus_perm permissions; member
Ddir.c100 be32_to_cpu(entry.file.permissions.dev); in hfsplus_lookup()
235 mode = be16_to_cpu(entry.file.permissions.mode); in hfsplus_readdir()
/linux-4.4.14/fs/notify/fanotify/
DKconfig15 bool "fanotify permissions checking"
20 Say Y here is you want fanotify listeners to be able to make permissions
/linux-4.4.14/Documentation/security/
Dapparmor.txt7 permissions.
26 For AppArmor to enforce any restrictions beyond standard Linux DAC permissions
Dkeys.txt21 - Key access permissions
71 (*) Each key has an owner user ID, a group ID and a permissions mask. These
214 Keys have an owner user ID, a group access ID, and a permissions mask. The mask
216 six of each set of eight bits are defined. These permissions granted are:
246 This permits a key's UID, GID and permissions mask to be changed.
248 For changing the ownership, group ID or permissions mask, being the owner of
259 Currently, all of the basic permissions explained above are provided in SELinux
295 file, giving information about their type, description and permissions.
405 to update it. The new key will have all user permissions granted and no
406 group or third party permissions.
[all …]
DYama.txt49 0 - classic ptrace permissions: a process can PTRACE_ATTACH to any other
Dcredentials.txt120 A traditional UNIX file, for example, includes a permissions mask that
124 in question). UNIX file permissions do not allow the arbitrary
128 that grants various permissions to arbitrary subjects.
DSmack.txt141 modified by enabling the permissions in the third string and disabling
189 permissions that are not allowed. The string "r-x--" would
201 permissions that are not allowed. The string "r-x--" would
481 and devices require access permissions that closely match those used by mode
/linux-4.4.14/security/selinux/ss/
Dconstraint.h57 u32 permissions; /* constrained permissions */ member
Dpolicydb.h52 struct symtab permissions; /* common permissions */ member
60 struct symtab permissions; /* class-specific permission symbol table */ member
Dpolicydb.c623 hashtab_map(comdatum->permissions.table, perm_destroy, NULL); in common_destroy()
624 hashtab_destroy(comdatum->permissions.table); in common_destroy()
652 hashtab_map(cladatum->permissions.table, perm_destroy, NULL); in cls_destroy()
653 hashtab_destroy(cladatum->permissions.table); in cls_destroy()
1166 rc = symtab_init(&comdatum->permissions, PERM_SYMTAB_SIZE); in common_read()
1169 comdatum->permissions.nprim = le32_to_cpu(buf[2]); in common_read()
1177 rc = perm_read(p, comdatum->permissions.table, fp); in common_read()
1240 c->permissions = le32_to_cpu(buf[0]); in read_cons_helper()
1333 rc = symtab_init(&cladatum->permissions, PERM_SYMTAB_SIZE); in class_read()
1336 cladatum->permissions.nprim = le32_to_cpu(buf[3]); in class_read()
[all …]
Dservices.c465 u32 permissions, in security_dump_masked_av() argument
479 if (!permissions) in security_dump_masked_av()
488 hashtab_map(common_dat->permissions.table, in security_dump_masked_av()
492 if (hashtab_map(tclass_dat->permissions.table, in security_dump_masked_av()
518 if ((mask & permissions) == 0) in security_dump_masked_av()
719 if ((constraint->permissions & (avd->allowed)) && in context_struct_compute_av()
722 avd->allowed &= ~(constraint->permissions); in context_struct_compute_av()
2947 *nperms = match->permissions.nprim; in security_get_permissions()
2953 rc = hashtab_map(match->comdatum->permissions.table, in security_get_permissions()
2959 rc = hashtab_map(match->permissions.table, get_permissions_callback, in security_get_permissions()
/linux-4.4.14/tools/perf/Documentation/
Dperf-buildid-cache.txt27 /proc/kcore which requires root permissions to read. Be aware that
33 permissions for root only. kcore will not be added if there is already a
Dperf-top.txt228 levels are subject to permissions. When sampling on multiple events, branch stack sampling
Dperf-record.txt257 levels are subject to permissions. When sampling on multiple events, branch stack sampling
/linux-4.4.14/Documentation/filesystems/pohmelfs/
Dinfo.txt65 Change permissions to read-only (-I 1 option, '-I 2' - write-only, 3 - rw):
75 idx addr(:port) socket_type protocol active priority permissions
82 …rking root directory (note, that server chroots there, so you have to have appropriate permissions)
Ddesign_notes.txt62 are connected with write permission turned on. IO priority and permissions can be changed in
Dnetwork_protocol.txt85 mode (permissions and type) and length of the name as long as name itself.
/linux-4.4.14/Documentation/usb/
Drio.txt113 Set appropriate permissions for /dev/usb/rio500 (don't forget about
114 group and world permissions). Both read and write permissions are
Dproc_usb_info.txt77 grant read/write permissions to other users by using "chmod". Also,
/linux-4.4.14/net/
Dsysctl_net.c64 .permissions = net_ctl_permissions,
/linux-4.4.14/fs/ceph/
DKconfig34 POSIX Access Control Lists (ACLs) support permissions for users and
/linux-4.4.14/arch/x86/kvm/
Dmmu.h172 return (mmu->permissions[index] >> pte_access) & 1; in permission_fault()
Dmmu.c3818 for (byte = 0; byte < ARRAY_SIZE(mmu->permissions); ++byte) { in update_permission_bitmask()
3870 mmu->permissions[byte] = map; in update_permission_bitmask()
/linux-4.4.14/arch/arc/mm/
Dtlbex.S323 ; VERIFY_PTE: Check if PTE permissions approp for executing code
364 ; VERIFY_PTE: Chk if PTE permissions approp for data access (R/W/R+W)
372 ; -Otherwise they are user-mode permissions, and those are exactly
/linux-4.4.14/arch/xtensa/
DKconfig.debug10 This check can spot missing TLB invalidation/wrong PTE permissions/
/linux-4.4.14/fs/9p/
DKconfig25 POSIX Access Control Lists (ACLs) support permissions for users and
/linux-4.4.14/fs/ext2/
DKconfig26 Posix Access Control Lists (ACLs) support permissions for users and
/linux-4.4.14/Documentation/namespaces/
Dcompatibility-list.txt31 access permissions to files, belonging to user 10 in another
/linux-4.4.14/include/linux/
Dsysctl.h159 int (*permissions)(struct ctl_table_header *head, struct ctl_table *table); member
/linux-4.4.14/fs/jfs/
DKconfig16 Posix Access Control Lists (ACLs) support permissions for users and
/linux-4.4.14/Documentation/cgroups/
Ddevices.txt49 A cgroup may not be granted more permissions than the cgroup's
55 access permissions than its parent. Every time an entry is written to
Dcpusets.txt63 virtual file system, manage the attributes and permissions of these
198 may be re-attached to any other cpuset, if allowed by the permissions
Dcgroups.txt259 any other cgroup, if allowed by the permissions on the necessary
Dunified-hierarchy.txt604 ownership and/or permissions on the cgroup directory and
/linux-4.4.14/Documentation/early-userspace/
Dbuffer-format.txt55 c_mode 8 bytes File mode and permissions
70 on Linux, and encodes the file type and file permissions.
/linux-4.4.14/arch/arm/
DKconfig-nommu60 Unit (MPU) that defines the type and permissions for regions of
/linux-4.4.14/kernel/debug/kdb/
Dkdb_main.c202 static inline bool kdb_check_flags(kdb_cmdflags_t flags, int permissions, in kdb_check_flags() argument
206 permissions &= KDB_ENABLE_MASK; in kdb_check_flags()
207 permissions |= KDB_ENABLE_ALWAYS_SAFE; in kdb_check_flags()
211 permissions |= permissions << KDB_ENABLE_NO_ARGS_SHIFT; in kdb_check_flags()
215 return permissions & flags; in kdb_check_flags()
/linux-4.4.14/Documentation/
Dmono.txt66 that the .exe file has execute permissions.
Dbinfmt_misc.txt67 will run with root permissions when a setuid binary owned by root
Djava.txt383 Set the executable permissions of the binary file, with:
Dnommu-mmap.txt42 same segment of the same file if that has compatible permissions,
Dinitrd.txt145 Note that /sbin/init's permissions must include "x" (execute).
Dadding-syscalls.txt156 only a calling process with the same permissions as the target process, or
Ddevices.txt2169 the proper permissions and modes by mounting the
/linux-4.4.14/fs/udf/
Decma_167.h548 __le32 permissions; member
772 __le32 permissions; member
Dinode.c1594 uint32_t permissions; in udf_convert_permissions() local
1597 permissions = le32_to_cpu(fe->permissions); in udf_convert_permissions()
1600 mode = ((permissions) & S_IRWXO) | in udf_convert_permissions()
1601 ((permissions >> 2) & S_IRWXG) | in udf_convert_permissions()
1602 ((permissions >> 4) & S_IRWXU) | in udf_convert_permissions()
1674 udfperms |= (le32_to_cpu(fe->permissions) & in udf_update_inode()
1678 fe->permissions = cpu_to_le32(udfperms); in udf_update_inode()
/linux-4.4.14/tools/perf/tests/attr/
DREADME19 and write permissions.
/linux-4.4.14/drivers/base/
DKconfig33 nodes with their default names and permissions for all
36 symlinks, and apply needed permissions.
38 udev runs on top, managing permissions and adding meaningful
/linux-4.4.14/fs/f2fs/
DKconfig47 Posix Access Control Lists (ACLs) support permissions for users and
/linux-4.4.14/fs/btrfs/
DKconfig36 POSIX Access Control Lists (ACLs) support permissions for users and
/linux-4.4.14/Documentation/devicetree/bindings/iommu/
Dsamsung,sysmmu.txt9 permissions, shareability and security protection. In addition, System MMU has
/linux-4.4.14/fs/reiserfs/
DKconfig70 Posix Access Control Lists (ACLs) support permissions for users and
/linux-4.4.14/arch/alpha/math-emu/
Dqrnnd.S11 # In addition to the permissions in the GNU General Public License, the
/linux-4.4.14/Documentation/ABI/stable/
Dsysfs-bus-firewire38 Users: udev rules to set ownership and access permissions or ACLs of
/linux-4.4.14/fs/xfs/
DKconfig47 POSIX Access Control Lists (ACLs) support permissions for users and
/linux-4.4.14/fs/ext4/
DKconfig81 POSIX Access Control Lists (ACLs) support permissions for users and
/linux-4.4.14/Documentation/cpu-freq/
Dboost.txt56 Explicitly changing the permissions and writing to that file anyway will
/linux-4.4.14/Documentation/virtual/kvm/
Dmmu.txt155 Inherited guest access permissions in the form uwx. Note execute
301 - if permissions are insufficient, reflect the fault back to the guest
344 we cannot map the permissions for gpte.u=1, gpte.w=0 to any spte (the
347 We handle this by mapping the permissions to two possible sptes, depending
/linux-4.4.14/fs/jffs2/
DKconfig82 Posix Access Control Lists (ACLs) support permissions for users and
/linux-4.4.14/Documentation/arm/nwfpe/
DREADME.FPE93 the requested permissions conditions, and performs the requested operation.
/linux-4.4.14/Documentation/video4linux/
Duvcvideo.txt88 UVCIOC_CTRL_ADD and UVCIOC_CTRL_MAP ioctls require super user permissions.
/linux-4.4.14/Documentation/networking/
Dtuntap.txt41 Set permissions:
DREADME.sb1000101 frequently used commands like this with root permissions if possible. If you
DLICENSE.qlcnic131 this License, whose permissions for other licensees extend to the
DLICENSE.qlge131 this License, whose permissions for other licensees extend to the
/linux-4.4.14/fs/proc/
Dproc_sysctl.c422 if (root->permissions) in sysctl_perm()
423 mode = root->permissions(head, table); in sysctl_perm()
/linux-4.4.14/Documentation/filesystems/caching/
Dcachefiles.txt179 permissions to prevent random users being able to access them directly.
363 The daemon's security ID gives it only a very restricted set of permissions: it
/linux-4.4.14/Documentation/frv/
Dfeatures.txt218 filesystem permissions set on the device file.
/linux-4.4.14/Documentation/hwmon/
Ddme1737212 permissions and a short description:
/linux-4.4.14/Documentation/sound/oss/
DMultiSound557 X * This is Linux-specific, and must be run with root permissions.
/linux-4.4.14/arch/x86/include/asm/
Dkvm_host.h297 u8 permissions[16]; member
/linux-4.4.14/arch/arm/mm/
DKconfig1043 bool "Restrict kernel memory permissions"
1048 padded to section-size (1MiB) boundaries (because their permissions
/linux-4.4.14/Documentation/filesystems/cifs/
DREADME117 allow adding entries to a file to the /etc/permissions file to achieve the
133 Note that uid, gid and file permissions will display default values if you do
286 (such as Windows), permissions can also be checked at the
/linux-4.4.14/scripts/
Dspelling.txt717 permissons||permissions
/linux-4.4.14/Documentation/scsi/
Daic7xxx.txt381 * the permissions given by Adaptec.
DLICENSE.qla4xxx132 this License, whose permissions for other licensees extend to the
DLICENSE.qla2xxx133 this License, whose permissions for other licensees extend to the
Daic79xx.txt484 * the permissions given by Adaptec.
/linux-4.4.14/Documentation/sysctl/
Dkernel.txt379 if permissions are elevated between the open() and the read() (e.g via
383 world read permissions from files that use %pK, and using dmesg_restrict
/linux-4.4.14/Documentation/vm/
Dhugetlbpage.txt302 Regular chown, chgrp, and chmod commands (with right permissions) could be
Dunevictable-lru.txt402 get_user_pages() was enhanced to accept a flag to ignore the permissions when
/linux-4.4.14/
DREADME62 directory where you have permissions (eg. your home directory) and
DCOPYING137 this License, whose permissions for other licensees extend to the
/linux-4.4.14/drivers/staging/rtl8192u/
Dcopying121 this License, whose permissions for other licensees extend to the
/linux-4.4.14/tools/usb/usbip/
DCOPYING121 this License, whose permissions for other licensees extend to the
/linux-4.4.14/Documentation/filesystems/configfs/
Dconfigfs.txt197 filename. configfs_attribute->ca_mode specifies the file permissions.
/linux-4.4.14/drivers/staging/rtl8192e/
Dlicense124 permissions for other licensees extend to the entire whole, and thus to
/linux-4.4.14/Documentation/powerpc/
Dhvcs.txt480 permissions to use the /dev/hvcs* device.
/linux-4.4.14/arch/powerpc/
DKconfig620 to set access permissions (read/write, readonly, or no access)
/linux-4.4.14/Documentation/s390/
DDebugging390.txt1977 & memory access permissions for each virtual memory area.
/linux-4.4.14/drivers/staging/speakup/
Dspkguide.txt468 path, perhaps /usr/local/bin, and set the permissions to 755 with the