Lines Matching full:these
42 provides a library for userland access to and manipulation of these ACLs.
57 all of these support routines are implemented in
93 These functions are described in
103 These functions are described in
148 These functions are described in
189 These functions are described in
220 These functions are described in
229 These functions are described in
235 Documentation of the internal kernel interfaces backing these calls may
282 These additional labels provide fine-grained discretionary access control,
285 POSIX.2c describes a set of userland utilities for manipulating these