| /freebsd/lib/libc/posix1e/ |
| H A D | acl_add_perm.3 | 31 .Nd add permissions to a permission set 43 is a POSIX.1e call that adds the permission contained in 45 to the permission set 49 that already exist in the permission set. 53 .It ACL_EXECUTE Execute permission 54 .It ACL_WRITE Write permission 55 .It ACL_READ Read permission 60 .It ACL_READ_DATA Ta "Read permission" 62 .It ACL_WRITE_DATA Ta "Write permission, or permission to create files" 64 .It ACL_APPEND_DATA Ta "Permission to create directories. Ignored for files" [all …]
|
| H A D | acl_get_perm_np.3 | 31 .Nd "check if a permission is set in a permission set" 43 is a non-portable function that checks if a permission is set in 44 a permission set. 46 If the permission in 48 is set in the permission set 67 does not contain a valid ACL permission or argument
|
| /freebsd/contrib/llvm-project/lldb/include/lldb/Breakpoint/ |
| H A D | BreakpointName.h | 79 // merge set permissions, and most restrictive permission wins. 97 bool GetPermission(enum PermissionKinds permission) const in GetPermission() argument 99 return m_permissions[permission]; in GetPermission() 104 bool IsSet(enum PermissionKinds permission) const in IsSet() argument 106 return m_set_mask.Test(permissions_mask[permission]); in IsSet() 119 bool SetPermission(enum PermissionKinds permission, bool value) in SetPermission() argument 121 bool old_value = m_permissions[permission]; in SetPermission() 122 m_permissions[permission] = value; in SetPermission() 123 m_set_mask.Set(permissions_mask[permission]); in SetPermission() 127 // If either side disallows the permission, the resultant disallows it. [all …]
|
| /freebsd/contrib/ntp/libntp/lib/isc/win32/include/isc/ |
| H A D | stat.h | 5 * Permission to use, copy, modify, and/or distribute this software for any 7 * copyright notice and this permission notice appear in all copies. 30 #define S_IREAD _S_IREAD /* read permission, owner */ 31 #define S_IWRITE _S_IWRITE /* write permission, owner */ 32 #define S_IEXEC _S_IEXEC /* execute/search permission, owner */ 33 #define S_IRUSR _S_IREAD /* Owner read permission */ 34 #define S_IWUSR _S_IWRITE /* Owner write permission */ 35 #define S_IRGRP _S_IREAD /* Group read permission */ 36 #define S_IWGRP _S_IWRITE /* Group write permission */ 37 #define S_IROTH _S_IREAD /* Other read permission */ [all …]
|
| /freebsd/sys/contrib/openzfs/config/ |
| H A D | kernel-inode-permission.m4 | 4 dnl # iops->permission() now takes struct mnt_idmap* 16 .permission = test_permission, 33 .permission = test_permission, 39 AC_MSG_CHECKING([whether iops->permission() takes struct mnt_idmap*]) 43 [iops->permission() takes struct mnt_idmap*]) 47 AC_MSG_CHECKING([whether iops->permission() takes struct user_namespace*]) 51 [iops->permission() takes struct user_namespace*])
|
| /freebsd/contrib/libpcap/doc/ |
| H A D | README.macos | 7 changed to give users other than root permission to read or write those 12 devices to give users other than root permission to read or write those 27 "admin" group owns them, and will change the permission of the BPF 61 If you want to give a particular user permission to access the BPF 62 devices, rather than giving all administrative users permission to 65 give a particular user permission to read and write the BPF devices and 66 give the administrative users permission to read but not write the BPF 72 to grant write permission to everybody who should be allowed to capture
|
| /freebsd/tests/sys/cddl/zfs/tests/delegate/ |
| H A D | zfs_allow_008_pos.ksh | 37 # other else user when it get 'allow' permission. 41 # 2. Verify the non-root user can allow permission if he has allow 42 # permission. 66 # Delegate local permission to $STAFF1 72 # $perms1 is local permission in $ROOT_TESTFS 77 # Verify 'allow' give non-privilege user delegated permission. 81 # $perms2 was not allow to $STAFF1, so he have no permission to 82 # delegate permission to other else.
|
| H A D | zfs_unallow_005_pos.ksh | 36 # Verify option '-c' will remove the created permission set. 40 # 2. Allow permission create to $STAFF1 on $ROOT_TESTFS. 42 # 4. Verify $STAFF1 has created time permission. 43 # 5. Unallow created time permission with option '-c'. 58 log_assert "Verify option '-c' will remove the created permission set." 82 log_pass "Verify option '-c' will remove the created permission set passed."
|
| /freebsd/sys/contrib/openzfs/tests/zfs-tests/tests/functional/delegate/ |
| H A D | zfs_allow_008_pos.ksh | 38 # they have, if they also have the 'allow' permission. 43 # 'allow' permission. 58 # Delegate local permission to $STAFF1 64 # $perms1 is local permission in $ROOT_TESTFS 69 # Verify 'allow' give non-privilege user delegated permission. 74 # permission to delegate permission to other users.
|
| H A D | zfs_unallow_005_pos.ksh | 37 # Verify option '-c' will remove the created permission set. 41 # 2. Allow permission create to $STAFF1 on $ROOT_TESTFS. 43 # 4. Verify $STAFF1 has created time permission. 44 # 5. Unallow created time permission with option '-c'. 50 log_assert "Verify option '-c' will remove the created permission set." 74 log_pass "Verify option '-c' will remove the created permission set passed."
|
| /freebsd/tests/sys/mac/bsdextended/ |
| H A D | matches_test.sh | 111 atf_check -s not-exit:0 -e match:"Permission denied" \ 135 atf_check -s not-exit:0 -e match:"Permission denied" \ 191 atf_check -s not-exit:0 -e match:"Permission denied" \ 199 atf_check -s not-exit:0 -e match:"Permission denied" \ 223 atf_check -s not-exit:0 -e match:"Permission denied" \ 229 atf_check -s not-exit:0 -e match:"Permission denied" \ 255 atf_check -s not-exit:0 -e match:"Permission denied" \ 278 atf_check -s not-exit:0 -e match:"Permission denied" \ 303 atf_check -s not-exit:0 -e match:"Permission denied" \ 327 atf_check -s not-exit:0 -e match:"Permission denied" \ [all …]
|
| /freebsd/lib/libsys/ |
| H A D | stat.2 | 14 .\" without specific prior written permission. 55 permission of the named file is not required, but all directories 300 #define S_IRUSR 0000400 /* read permission, owner */ 301 #define S_IWUSR 0000200 /* write permission, owner */ 302 #define S_IXUSR 0000100 /* execute/search permission, owner */ 304 #define S_IRGRP 0000040 /* read permission, group */ 305 #define S_IWGRP 0000020 /* write permission, group */ 306 #define S_IXGRP 0000010 /* execute/search permission, group */ 308 #define S_IROTH 0000004 /* read permission, other */ 309 #define S_IWOTH 0000002 /* write permission, other */ [all …]
|
| H A D | access.2 | 14 .\" without specific prior written permission. 63 for read permission, 65 for write permission, and 67 for execute / search permission 166 the file may not actually have execute permission bits set. 200 Permission bits of the file mode do not permit the requested 201 access, or search permission is denied on a component of the 275 should not be relied upon for file permission enforcement purposes.
|
| /freebsd/crypto/krb5/src/lib/gssapi/krb5/ |
| H A D | wrap_size_limit.c | 11 * WITHIN THAT CONSTRAINT, permission to use, copy, modify, and 15 * this permission notice appear in supporting documentation, and that 18 * permission. Furthermore if you modify this software you must label 28 * Permission to use, copy, modify, distribute, and sell this software 31 * that both that copyright notice and this permission notice appear in 34 * without specific, written prior permission. OpenVision makes no 57 * WITHIN THAT CONSTRAINT, permission to use, copy, modify, and 61 * this permission notice appear in supporting documentation, and that 64 * permission. FundsXpress makes no representations about the suitability of
|
| /freebsd/sys/contrib/openzfs/module/zfs/ |
| H A D | dsl_deleg.c | 32 * it is a local or descendent permission. The first letter 38 * Ul$<id> identifies permission sets granted locally for this userid. 39 * Ud$<id> identifies permission sets granted on descendent datasets for 44 * Gl$<id> identifies permission sets granted locally for this groupid. 45 * Gd$<id> identifies permission sets granted on descendent datasets for 50 * El$ identifies permission sets granted locally for everyone. 51 * Ed$ identifies permission sets granted to descendent datasets for 53 * c-$ identifies permission to create at dataset creation time. 54 * C-$ identifies permission sets to grant locally at dataset creation 60 * attribute for each allowed permission, such as create, destroy,... [all …]
|
| /freebsd/crypto/krb5/ |
| H A D | NOTICE | 52 prior written permission of MIT. 61 The following copyright and permission notice applies to the 120 WITHIN THAT CONSTRAINT, permission to use, copy, modify, and 124 this permission notice appear in supporting documentation, and that 127 written prior permission. FundsXpress makes no representations 182 from this software without specific prior written permission. 203 Permission is hereby granted, free of charge, to any person 211 The above copyright notice and this permission notice shall be 315 Permission is hereby granted, free of charge, to any person 323 The above copyright notice and this permission notice shall be [all …]
|
| /freebsd/sys/contrib/openzfs/man/man8/ |
| H A D | zfs-unallow.8 | 138 Delegates ZFS administration permission for the file systems to non-privileged 178 Permission names are the same as ZFS subcommand and property names. 200 allow subcommand Must also have the permission that is being allowed 312 Defines or adds permissions to a permission set. 317 Permission sets follow the same naming restrictions as ZFS file systems, but the 353 For example, if the permission is granted by an ancestor. 386 Removes permissions from a permission set. 412 mount point permission is set to 755 by default, user 434 Permission sets: 440 .Ss Example 3 : No Defining and Granting a Permission Se [all...] |
| H A D | zfs-allow.8 | 138 Delegates ZFS administration permission for the file systems to non-privileged 178 Permission names are the same as ZFS subcommand and property names. 200 allow subcommand Must also have the permission that is being allowed 312 Defines or adds permissions to a permission set. 317 Permission sets follow the same naming restrictions as ZFS file systems, but the 353 For example, if the permission is granted by an ancestor. 386 Removes permissions from a permission set. 412 mount point permission is set to 755 by default, user 434 Permission sets: 440 .Ss Example 3 : No Defining and Granting a Permission Set on a ZFS Dataset [all …]
|
| /freebsd/sys/fs/p9fs/ |
| H A D | p9_protocol.h | 121 P9PROTO_DMDIR = 0x80000000, /* permission bit for directories */ 122 P9PROTO_DMAPPEND = 0x40000000, /* permission bit for is append-only */ 123 P9PROTO_DMEXCL = 0x20000000, /* permission bit for exclusive use (only one open handle allowed) */ 124 P9PROTO_DMMOUNT = 0x10000000, /* permission bit for mount points */ 125 P9PROTO_DMAUTH = 0x08000000, /* permission bit for authentication file */ 126 P9PROTO_DMTMP = 0x04000000, /* permission bit for non-backed-up files */ 127 P9PROTO_DMSYMLINK = 0x02000000, /* permission bit for symbolic link (9P2000.u) */ 128 P9PROTO_DMLINK = 0x01000000, /* permission bit for hard-link (9P2000.u) */ 129 P9PROTO_DMDEVICE = 0x00800000, /* permission bit for device files (9P2000.u) */ 130 P9PROTO_DMNAMEDPIPE = 0x00200000,/* permission bit for named pipe (9P2000.u) */ [all …]
|
| /freebsd/tests/sys/cddl/zfs/tests/history/ |
| H A D | history_009_pos.ksh | 42 # Ul$<id> identifies permission sets granted locally for this userid. 43 # Ud$<id> identifies permission sets granted on descendent datasets for 50 # Gl$<id> identifies permission sets granted locally for this groupid. 51 # Gd$<id> identifies permission sets granted on descendent datasets for 58 # El$ identifies permission sets granted locally for everyone. 59 # Ed$ identifies permission sets granted to descendent datasets 62 # c-$ identifies permission to create at dataset creation time. 63 # C-$ identifies permission sets to grant locally at dataset 71 # 2. Define permission sets and verify the internal history correctly.
|
| /freebsd/contrib/pam-krb5/ |
| H A D | LICENSE | 59 Permission is hereby granted, free of charge, to any person obtaining a 67 The above copyright notice and this permission notice shall be included 106 Permission is hereby granted, free of charge, to any person obtaining a 114 The above copyright notice and this permission notice shall be included 133 Permission to use, copy, modify, and distribute this software for any 135 copyright notice and this permission notice appear in all copies. 154 This file is free software; the authors give unlimited permission to copy 170 WITHIN THAT CONSTRAINT, permission to use, copy, modify, and 174 this permission notice appear in supporting documentation, and that 177 permission. Furthermore if you modify this software you must label [all …]
|
| /freebsd/bin/chmod/ |
| H A D | chmod.1 | 18 .\" without specific prior written permission. 222 The user permission bits in the original mode of the file. 224 The group permission bits in the original mode of the file. 226 The other permission bits in the original mode of the file. 239 each permission bit specified in 256 each permission bit specified in 274 each permission bit specified in 296 The ``w'' permission on directories will permit file creation, relocation, 305 deny write permission to group and others.
|
| /freebsd/share/doc/psd/27.nfsrpc/ |
| H A D | nfs.rfc.ms | 242 Permission denied. The caller does not have the 243 correct permission to perform the requested operation. 403 0000400&Read permission for owner. 404 0000200&Write permission for owner. 405 0000100&Execute and search permission for owner. 406 0000040&Read permission for group. 407 0000020&Write permission for group. 408 0000010&Execute and search permission for group. 409 0000004&Read permission for others. 410 0000002&Write permission for others. [all …]
|
| /freebsd/contrib/dialog/package/debian/ |
| H A D | copyright | 31 Permission is hereby granted, free of charge, to any person obtaining a 39 The above copyright notice and this permission notice shall be included 58 Permission is hereby granted, free of charge, to any person obtaining a copy 65 The above copyright notice and this permission notice shall be included in 93 Permission to use, copy, modify, and distribute this software and its 96 both that copyright notice and this permission notice appear in 100 permission.
|
| /freebsd/sys/sys/ |
| H A D | ipc.h | 11 * the permission of UNIX System Laboratories, Inc. 27 * without specific prior written permission. 79 unsigned short mode; /* r/w permission */ 90 mode_t mode; /* r/w permission */ 97 #define IPC_R 000400 /* read permission */ 98 #define IPC_W 000200 /* write/alter permission */ 99 #define IPC_M 010000 /* permission to change control info */
|