/freebsd/sys/contrib/openzfs/man/man8/ |
H A D | zfs-unallow.8 | 11 .\" See the License for the specific language governing permissions 39 .Nd delegate ZFS administration permissions to unprivileged users 103 Displays permissions that have been delegated on the specified filesystem or 117 These permissions cannot be delegated because the Linux 144 Specifies that the permissions be delegated to everyone. 146 Explicitly specify that permissions are delegated to the group. 152 Explicitly specify that permissions are delegated to the user. 154 Specifies to whom the permissions are delegated. 176 The permissions to delegate. 177 Multiple permissions ma [all...] |
H A D | zfs-allow.8 | 11 .\" See the License for the specific language governing permissions 39 .Nd delegate ZFS administration permissions to unprivileged users 103 Displays permissions that have been delegated on the specified filesystem or 117 These permissions cannot be delegated because the Linux 144 Specifies that the permissions be delegated to everyone. 146 Explicitly specify that permissions are delegated to the group. 152 Explicitly specify that permissions are delegated to the user. 154 Specifies to whom the permissions are delegated. 176 The permissions to delegate. 177 Multiple permissions may be specified as a comma-separated list. [all …]
|
H A D | zfs.8 | 11 .\" See the License for the specific language governing permissions 279 Delegate permissions on the specified filesystem or volume. 281 Remove delegated permissions on the specified filesystem or volume. 592 .Ss Example 17 : No Delegating ZFS Administration Permissions on a ZFS Dataset 593 The following example shows how to set permissions so that user 597 The permissions on 603 ---- Permissions on tank/cindys -------------------------------------- 604 Local+Descendent permissions: 617 .Ss Example 18 : No Delegating Create Time Permissions on a ZFS Dataset 624 The permissions on [all …]
|
/freebsd/contrib/llvm-project/lldb/include/lldb/Breakpoint/ |
H A D | BreakpointName.h | 32 class Permissions 39 Permissions(bool in_list, bool in_disable, bool in_delete) in Permissions() function 47 Permissions(const Permissions &rhs) in Permissions() function 55 Permissions() in Permissions() function 63 const Permissions &operator= (const Permissions &rhs) 75 *this = Permissions(); in Clear() 78 // Merge the permissions from incoming into this set of permissions. Only 79 // merge set permissions, and most restrictive permission wins. 80 void MergeInto(const Permissions &incoming) in MergeInto() 128 void MergePermission(const Permissions &incoming, in MergePermission() [all …]
|
/freebsd/bin/setfacl/ |
H A D | setfacl.1 | 69 entry, the permissions of the 127 Do not recalculate the permissions associated with the ACL 158 permissions: 205 .It Ar "access permissions" 206 The access permissions field contains up to one of each of 213 execute permissions, respectively. 238 ACL entry consisting of the union of the permissions associated 296 tags), discretionary access permissions, ACL inheritance flags, and ACL type: 333 .It Ar "access permissions" 334 Access permissions may be specified in either short or long form. [all …]
|
/freebsd/contrib/libarchive/libarchive/ |
H A D | archive_entry_acl.3 | 119 Each entry specifies the permission set as a bitmask of basic permissions. 120 Valid permissions in the 128 The permissions correspond to the normal Unix permissions. 144 The maximum permissions to be obtained via group permissions. 159 This specifies the permissions required for access to the file itself. 170 Allow principal to perform actions requiring given permissions. 172 Prevent principal from performing actions requiring given permissions. 174 Log access attempts by principal which require given permissions [all...] |
/freebsd/lib/libc/string/ |
H A D | strmode.3 | 76 The next nine characters encode three sets of permissions, in three 78 The first three characters are the permissions for the owner of the 84 of permissions, the owner of the file will not be able to read the file. 86 permissions allow reading or the ``other'' permissions allow reading. 97 If the character is part of the owner permissions and the file is not 101 If the character is part of the group permissions and the file is not 105 If the character is part of the other permissions and the file is not 110 If the character is part of the owner permissions and the file is 114 If the character is part of the group permissions and the file is 118 If the character is part of the other permissions and the file is
|
/freebsd/contrib/llvm-project/lldb/include/lldb/Target/ |
H A D | MemoryRegionInfo.h | 80 // Get permissions as a uint32_t that is a mask of one or more bits from the 81 // lldb::Permissions 83 uint32_t permissions = 0; in GetLLDBPermissions() local 85 permissions |= lldb::ePermissionsReadable; in GetLLDBPermissions() 87 permissions |= lldb::ePermissionsWritable; in GetLLDBPermissions() 89 permissions |= lldb::ePermissionsExecutable; in GetLLDBPermissions() 90 return permissions; in GetLLDBPermissions() 93 // Set permissions from a uint32_t that contains one or more bits from the 94 // lldb::Permissions 95 void SetLLDBPermissions(uint32_t permissions) { in SetLLDBPermissions() argument [all...] |
/freebsd/contrib/libpcap/doc/ |
H A D | README.macos | 6 system, and the permissions and/or ownership on those devices can be 11 can be configured to set the permissions and/or ownership of those 17 devfs cannot be configured to set the permissions and/or ownership of 41 will be executed on the next reboot. To change the permissions before 52 it will be executed on the next reboot. To change the permissions 64 ownership of /dev/bpf* without changing the permissions. If you want to 68 group to "admin", and the permissions to rw-r-----. Other possibilities 71 (NOTE: due to a bug in Snow Leopard, if you change the permissions not
|
/freebsd/lib/libc/posix1e/ |
H A D | acl_set_tag_type.3 | 50 .It ACL_USER_OBJ Ta "Permissions apply to file owner" 51 .It ACL_USER Ta "Permissions apply to additional user specified by qualifier" 52 .It ACL_GROUP_OBJ Ta "Permissions apply to file group" 53 .It ACL_GROUP Ta "Permissions apply to additional group specified by qualifier" 54 .It ACL_MASK Ta "Permissions specify mask" 55 .It ACL_OTHER Ta Permissions apply to "other" 57 .It ACL_EVERYONE Ta Permissions apply to "everyone@"
|
H A D | acl_calc_mask.3 | 31 .Nd calculate and set ACL mask permissions 43 is a POSIX.1e call that calculates and set the permissions 49 The value of new permissions are the union of the permissions 61 entry, its permissions shall be
|
H A D | acl_equiv_mode_np.3 | 31 .Nd check if ACL can be represented as UNIX permissions 45 permissions contained in these entries consist only of ACL_READ, ACL_WRITE and 48 file permissions bits set. 53 value corresponding to permissions contained in the ACL. 56 as UNIX permissions and 1 if it is not possible.
|
/freebsd/sys/contrib/openzfs/tests/zfs-tests/tests/functional/delegate/ |
H A D | zfs_unallow_007_neg.ksh | 12 # See the License for the specific language governing permissions 37 # zfs unallow will not remove those permissions which inherited from 48 log_assert "zfs unallow won't remove those permissions which inherited from " \ 59 # Athrough unallow the permissions which don't exists on the specific dataset 60 # return 0, the inherited permissions can't be removed in fact. 65 log_pass "Verify zfs unallow won't remove inherited permissions passed."
|
H A D | zfs_allow_006_pos.ksh | 12 # See the License for the specific language governing permissions 37 # Changing permissions in a set will change what is allowed wherever the 43 # 3. Verify $STAFF1 has create permissions. 45 # 5. Verify now $STAFF1 have create,allow,destroy permissions. 50 log_assert "Changing permissions in a set will change what is allowed " \ 73 log_pass "Changing permissions in a set will change what is allowed passed."
|
H A D | zfs_allow_012_neg.ksh | 12 # See the License for the specific language governing permissions 37 # Scan all permissions one by one to verify privileged user 38 # can not use permissions properly when delegation property is set off 42 # 2. Verify privileged user can not use permissions properly when 54 log_assert "Verify privileged user can not use permissions properly when " \ 93 log_pass "Verify privileged user can not use permissions properly when " \
|
H A D | zfs_unallow_001_pos.ksh | 12 # See the License for the specific language governing permissions 37 # Verify '-l' only removed the local permissions. 42 # 3. Verify '-l' only remove the local permissions. 47 log_assert "Verify '-l' only removed the local permissions." 66 log_pass "Verify '-l' only removed the local permissions passed."
|
H A D | zfs_unallow_002_pos.ksh | 12 # See the License for the specific language governing permissions 37 # Verify '-d' only remove the permissions on descendent filesystem. 42 # 3. Verify '-d' only remove the permissions on descendent filesystem. 47 log_assert "Verify '-d' only removed the descendent permissions." 62 log_pass "Verify '-d' only removed the descendent permissions passed"
|
H A D | zfs_unallow_004_pos.ksh | 12 # See the License for the specific language governing permissions 37 # Verify '-s' will remove permissions from the named set. 42 # 2. Verify $STAFF1 have @basic permissions. 48 log_assert "Verify '-s' will remove permissions from the named set." 60 log_pass "Verify '-s' will remove permissions from the named set passed."
|
H A D | zfs_unallow_005_pos.ksh | 12 # See the License for the specific language governing permissions 42 # 3. Create $SUBFS and verify $STAFF1 have created time permissions. 45 # 6. Created $SUBFS and verify $STAFF1 have not created time permissions. 56 # Create $SUBFS and verify $SUBFS has created time permissions. 65 # permissions any more.
|
/freebsd/cddl/contrib/opensolaris/lib/pyzfs/common/ |
H A D | allow.py | 11 # See the License for the specific language governing permissions 40 """This class represents all the permissions that are set on a 47 """Create a FSPerms based on the dict of raw permissions 114 # permissions into ld 126 s += _("Create time permissions:\n") 129 s += self.__ldstr(self.local, _("Local permissions:\n")) 130 s += self.__ldstr(self.descend, _("Descendent permissions:\n")) 131 s += self.__ldstr(self.ld, _("Local+Descendent permissions:\n")) 139 # remove all of someone's permissions 256 """Print the set of supported permissions.""" [all …]
|
/freebsd/tests/sys/cddl/zfs/tests/delegate/ |
H A D | zfs_unallow_007_neg.ksh | 11 # See the License for the specific language governing permissions 36 # zfs unallow will not remove those permissions which inherited from 56 log_assert "zfs unallow won't remove those permissions which inherited from " \ 67 # Athrough unallow the permissions which don't exists on the specific dataset 68 # return 0, the inherited permissions can't be removed in fact. 73 log_pass "Verify zfs unallow won't remove inherited permissions passed."
|
H A D | zfs_allow_012_neg.ksh | 11 # See the License for the specific language governing permissions 36 # Scan all permissions one by one to verify privileged user 37 # can not use permissions properly when delegation property is set off 41 # 2. Verify privileged user can not use permissions properly when 54 log_assert "Verify privileged user can not use permissions properly when " \ 79 log_pass "Verify privileged user can not use permissions properly when " \
|
H A D | zfs_allow_006_pos.ksh | 11 # See the License for the specific language governing permissions 36 # Changing permissions in a set will change what is allowed wherever the 42 # 3. Verify $STAFF1 has create permissions. 44 # 5. Verify now $STAFF1 have create,allow,destroy permissions. 58 log_assert "Changing permissions in a set will change what is allowed " \ 86 log_pass "Changing permissions in a set will change what is allowed passed."
|
/freebsd/sbin/ipf/libipf/ |
H A D | interror.c | 122 { 94, "need write permissions to disable/enable ipfilter" }, 124 { 96, "need write permissions to set ipf tunable" }, 125 { 97, "need write permissions to set ipf flags" }, 128 { 100, "need write permissions to add another rule" }, 129 { 101, "need write permissions to insert another rule" }, 130 { 102, "need write permissions to swap active rule set" }, 132 { 104, "need write permissions to zero ipf stats" }, 133 { 105, "need write permissions to flush ipf v4 rules" }, 136 { 108, "need write permissions to flush ipf v6 rules" }, 140 { 112, "need write permissions to flush ipf logs" }, [all …]
|
/freebsd/sys/contrib/openzfs/module/zfs/ |
H A D | dsl_deleg.c | 11 * See the License for the specific language governing permissions 28 * DSL permissions are stored in a two level zap attribute 35 * ul$<id> identifies permissions granted locally for this userid. 36 * ud$<id> identifies permissions granted on descendent datasets for 41 * gl$<id> identifies permissions granted locally for this groupid. 42 * gd$<id> identifies permissions granted on descendent datasets for 47 * el$ identifies permissions granted locally for everyone. 48 * ed$ identifies permissions granted on descendent datasets 56 * s-$@<name> permissions defined in specified set @<name> 62 * rather than permissions. [all …]
|