Home
last modified time | relevance | path

Searched full:permissions (Results 1 – 25 of 3756) sorted by relevance

12345678910>>...151

/freebsd/sys/contrib/openzfs/man/man8/
H A Dzfs-unallow.811 .\" See the License for the specific language governing permissions
39 .Nd delegate ZFS administration permissions to unprivileged users
103 Displays permissions that have been delegated on the specified filesystem or
117 These permissions cannot be delegated because the Linux
144 Specifies that the permissions be delegated to everyone.
146 Explicitly specify that permissions are delegated to the group.
152 Explicitly specify that permissions are delegated to the user.
154 Specifies to whom the permissions are delegated.
176 The permissions to delegate.
177 Multiple permissions ma
[all...]
H A Dzfs-allow.811 .\" See the License for the specific language governing permissions
39 .Nd delegate ZFS administration permissions to unprivileged users
103 Displays permissions that have been delegated on the specified filesystem or
117 These permissions cannot be delegated because the Linux
144 Specifies that the permissions be delegated to everyone.
146 Explicitly specify that permissions are delegated to the group.
152 Explicitly specify that permissions are delegated to the user.
154 Specifies to whom the permissions are delegated.
176 The permissions to delegate.
177 Multiple permissions may be specified as a comma-separated list.
[all …]
H A Dzfs.811 .\" See the License for the specific language governing permissions
279 Delegate permissions on the specified filesystem or volume.
281 Remove delegated permissions on the specified filesystem or volume.
592 .Ss Example 17 : No Delegating ZFS Administration Permissions on a ZFS Dataset
593 The following example shows how to set permissions so that user
597 The permissions on
603 ---- Permissions on tank/cindys --------------------------------------
604 Local+Descendent permissions:
617 .Ss Example 18 : No Delegating Create Time Permissions on a ZFS Dataset
624 The permissions on
[all …]
/freebsd/contrib/llvm-project/lldb/include/lldb/Breakpoint/
H A DBreakpointName.h32 class Permissions
39 Permissions(bool in_list, bool in_disable, bool in_delete) in Permissions() function
47 Permissions(const Permissions &rhs) in Permissions() function
55 Permissions() in Permissions() function
63 const Permissions &operator= (const Permissions &rhs)
75 *this = Permissions(); in Clear()
78 // Merge the permissions from incoming into this set of permissions. Only
79 // merge set permissions, and most restrictive permission wins.
80 void MergeInto(const Permissions &incoming) in MergeInto()
128 void MergePermission(const Permissions &incoming, in MergePermission()
[all …]
/freebsd/bin/setfacl/
H A Dsetfacl.169 entry, the permissions of the
127 Do not recalculate the permissions associated with the ACL
158 permissions:
205 .It Ar "access permissions"
206 The access permissions field contains up to one of each of
213 execute permissions, respectively.
238 ACL entry consisting of the union of the permissions associated
296 tags), discretionary access permissions, ACL inheritance flags, and ACL type:
333 .It Ar "access permissions"
334 Access permissions may be specified in either short or long form.
[all …]
/freebsd/contrib/libarchive/libarchive/
H A Darchive_entry_acl.3119 Each entry specifies the permission set as a bitmask of basic permissions.
120 Valid permissions in the
128 The permissions correspond to the normal Unix permissions.
144 The maximum permissions to be obtained via group permissions.
159 This specifies the permissions required for access to the file itself.
170 Allow principal to perform actions requiring given permissions.
172 Prevent principal from performing actions requiring given permissions.
174 Log access attempts by principal which require given permissions
[all...]
/freebsd/lib/libc/string/
H A Dstrmode.376 The next nine characters encode three sets of permissions, in three
78 The first three characters are the permissions for the owner of the
84 of permissions, the owner of the file will not be able to read the file.
86 permissions allow reading or the ``other'' permissions allow reading.
97 If the character is part of the owner permissions and the file is not
101 If the character is part of the group permissions and the file is not
105 If the character is part of the other permissions and the file is not
110 If the character is part of the owner permissions and the file is
114 If the character is part of the group permissions and the file is
118 If the character is part of the other permissions and the file is
/freebsd/contrib/llvm-project/lldb/include/lldb/Target/
H A DMemoryRegionInfo.h80 // Get permissions as a uint32_t that is a mask of one or more bits from the
81 // lldb::Permissions
83 uint32_t permissions = 0; in GetLLDBPermissions() local
85 permissions |= lldb::ePermissionsReadable; in GetLLDBPermissions()
87 permissions |= lldb::ePermissionsWritable; in GetLLDBPermissions()
89 permissions |= lldb::ePermissionsExecutable; in GetLLDBPermissions()
90 return permissions; in GetLLDBPermissions()
93 // Set permissions from a uint32_t that contains one or more bits from the
94 // lldb::Permissions
95 void SetLLDBPermissions(uint32_t permissions) { in SetLLDBPermissions() argument
[all...]
/freebsd/contrib/libpcap/doc/
H A DREADME.macos6 system, and the permissions and/or ownership on those devices can be
11 can be configured to set the permissions and/or ownership of those
17 devfs cannot be configured to set the permissions and/or ownership of
41 will be executed on the next reboot. To change the permissions before
52 it will be executed on the next reboot. To change the permissions
64 ownership of /dev/bpf* without changing the permissions. If you want to
68 group to "admin", and the permissions to rw-r-----. Other possibilities
71 (NOTE: due to a bug in Snow Leopard, if you change the permissions not
/freebsd/lib/libc/posix1e/
H A Dacl_set_tag_type.350 .It ACL_USER_OBJ Ta "Permissions apply to file owner"
51 .It ACL_USER Ta "Permissions apply to additional user specified by qualifier"
52 .It ACL_GROUP_OBJ Ta "Permissions apply to file group"
53 .It ACL_GROUP Ta "Permissions apply to additional group specified by qualifier"
54 .It ACL_MASK Ta "Permissions specify mask"
55 .It ACL_OTHER Ta Permissions apply to "other"
57 .It ACL_EVERYONE Ta Permissions apply to "everyone@"
H A Dacl_calc_mask.331 .Nd calculate and set ACL mask permissions
43 is a POSIX.1e call that calculates and set the permissions
49 The value of new permissions are the union of the permissions
61 entry, its permissions shall be
H A Dacl_equiv_mode_np.331 .Nd check if ACL can be represented as UNIX permissions
45 permissions contained in these entries consist only of ACL_READ, ACL_WRITE and
48 file permissions bits set.
53 value corresponding to permissions contained in the ACL.
56 as UNIX permissions and 1 if it is not possible.
/freebsd/sys/contrib/openzfs/tests/zfs-tests/tests/functional/delegate/
H A Dzfs_unallow_007_neg.ksh12 # See the License for the specific language governing permissions
37 # zfs unallow will not remove those permissions which inherited from
48 log_assert "zfs unallow won't remove those permissions which inherited from " \
59 # Athrough unallow the permissions which don't exists on the specific dataset
60 # return 0, the inherited permissions can't be removed in fact.
65 log_pass "Verify zfs unallow won't remove inherited permissions passed."
H A Dzfs_allow_006_pos.ksh12 # See the License for the specific language governing permissions
37 # Changing permissions in a set will change what is allowed wherever the
43 # 3. Verify $STAFF1 has create permissions.
45 # 5. Verify now $STAFF1 have create,allow,destroy permissions.
50 log_assert "Changing permissions in a set will change what is allowed " \
73 log_pass "Changing permissions in a set will change what is allowed passed."
H A Dzfs_allow_012_neg.ksh12 # See the License for the specific language governing permissions
37 # Scan all permissions one by one to verify privileged user
38 # can not use permissions properly when delegation property is set off
42 # 2. Verify privileged user can not use permissions properly when
54 log_assert "Verify privileged user can not use permissions properly when " \
93 log_pass "Verify privileged user can not use permissions properly when " \
H A Dzfs_unallow_001_pos.ksh12 # See the License for the specific language governing permissions
37 # Verify '-l' only removed the local permissions.
42 # 3. Verify '-l' only remove the local permissions.
47 log_assert "Verify '-l' only removed the local permissions."
66 log_pass "Verify '-l' only removed the local permissions passed."
H A Dzfs_unallow_002_pos.ksh12 # See the License for the specific language governing permissions
37 # Verify '-d' only remove the permissions on descendent filesystem.
42 # 3. Verify '-d' only remove the permissions on descendent filesystem.
47 log_assert "Verify '-d' only removed the descendent permissions."
62 log_pass "Verify '-d' only removed the descendent permissions passed"
H A Dzfs_unallow_004_pos.ksh12 # See the License for the specific language governing permissions
37 # Verify '-s' will remove permissions from the named set.
42 # 2. Verify $STAFF1 have @basic permissions.
48 log_assert "Verify '-s' will remove permissions from the named set."
60 log_pass "Verify '-s' will remove permissions from the named set passed."
H A Dzfs_unallow_005_pos.ksh12 # See the License for the specific language governing permissions
42 # 3. Create $SUBFS and verify $STAFF1 have created time permissions.
45 # 6. Created $SUBFS and verify $STAFF1 have not created time permissions.
56 # Create $SUBFS and verify $SUBFS has created time permissions.
65 # permissions any more.
/freebsd/cddl/contrib/opensolaris/lib/pyzfs/common/
H A Dallow.py11 # See the License for the specific language governing permissions
40 """This class represents all the permissions that are set on a
47 """Create a FSPerms based on the dict of raw permissions
114 # permissions into ld
126 s += _("Create time permissions:\n")
129 s += self.__ldstr(self.local, _("Local permissions:\n"))
130 s += self.__ldstr(self.descend, _("Descendent permissions:\n"))
131 s += self.__ldstr(self.ld, _("Local+Descendent permissions:\n"))
139 # remove all of someone's permissions
256 """Print the set of supported permissions."""
[all …]
/freebsd/tests/sys/cddl/zfs/tests/delegate/
H A Dzfs_unallow_007_neg.ksh11 # See the License for the specific language governing permissions
36 # zfs unallow will not remove those permissions which inherited from
56 log_assert "zfs unallow won't remove those permissions which inherited from " \
67 # Athrough unallow the permissions which don't exists on the specific dataset
68 # return 0, the inherited permissions can't be removed in fact.
73 log_pass "Verify zfs unallow won't remove inherited permissions passed."
H A Dzfs_allow_012_neg.ksh11 # See the License for the specific language governing permissions
36 # Scan all permissions one by one to verify privileged user
37 # can not use permissions properly when delegation property is set off
41 # 2. Verify privileged user can not use permissions properly when
54 log_assert "Verify privileged user can not use permissions properly when " \
79 log_pass "Verify privileged user can not use permissions properly when " \
H A Dzfs_allow_006_pos.ksh11 # See the License for the specific language governing permissions
36 # Changing permissions in a set will change what is allowed wherever the
42 # 3. Verify $STAFF1 has create permissions.
44 # 5. Verify now $STAFF1 have create,allow,destroy permissions.
58 log_assert "Changing permissions in a set will change what is allowed " \
86 log_pass "Changing permissions in a set will change what is allowed passed."
/freebsd/sbin/ipf/libipf/
H A Dinterror.c122 { 94, "need write permissions to disable/enable ipfilter" },
124 { 96, "need write permissions to set ipf tunable" },
125 { 97, "need write permissions to set ipf flags" },
128 { 100, "need write permissions to add another rule" },
129 { 101, "need write permissions to insert another rule" },
130 { 102, "need write permissions to swap active rule set" },
132 { 104, "need write permissions to zero ipf stats" },
133 { 105, "need write permissions to flush ipf v4 rules" },
136 { 108, "need write permissions to flush ipf v6 rules" },
140 { 112, "need write permissions to flush ipf logs" },
[all …]
/freebsd/sys/contrib/openzfs/module/zfs/
H A Ddsl_deleg.c11 * See the License for the specific language governing permissions
28 * DSL permissions are stored in a two level zap attribute
35 * ul$<id> identifies permissions granted locally for this userid.
36 * ud$<id> identifies permissions granted on descendent datasets for
41 * gl$<id> identifies permissions granted locally for this groupid.
42 * gd$<id> identifies permissions granted on descendent datasets for
47 * el$ identifies permissions granted locally for everyone.
48 * ed$ identifies permissions granted on descendent datasets
56 * s-$@<name> permissions defined in specified set @<name>
62 * rather than permissions.
[all …]

12345678910>>...151