Home
last modified time | relevance | path

Searched full:permissions (Results 1 – 25 of 480) sorted by relevance

12345678910>>...20

/linux/Documentation/filesystems/
H A Dadfs.rst39 ownmask=nnn The permission mask for ADFS 'owner' permissions
41 othmask=nnn The permission mask for ADFS 'other' permissions
48 Mapping of ADFS permissions to Linux permissions
51 ADFS permissions consist of the following:
68 Possible owner mode permissions -> -rwx------
74 Possible other mode permissions -> ----rwxrwx
77 not a UnixExec filetype, then the permissions will be::
93 desire the permissions should be under Linux.
H A Disofs.rst39 mode=xxx Sets the permissions on files to xxx unless Rock Ridge
40 extensions set the permissions otherwise
41 dmode=xxx Sets the permissions on directories to xxx unless Rock Ridge
42 extensions set the permissions otherwise
43 overriderockperm Set permissions on files and directories according to
/linux/include/linux/
H A Dexecmem.h22 * permissions, alignment and other parameters for memory that can be used
70 * execmem_restore_rox - restore read-only-execute permissions
74 * Restores read-only-execute permissions on a range [@ptr, @ptr + @size)
93 * @pgprot: permissions for memory in this address space
162 * Forces writable permissions on the allocated memory and the caller is
163 * responsible to manage the permissions afterwards.
165 * For architectures that use ROX cache the permissions will be set to R+W.
166 * For architectures that don't use ROX cache the default permissions for @type
/linux/security/keys/
H A Dpermission.c24 * permissions bits or the LSM check.
53 /* use the second 8-bits of permissions for keys the caller owns */ in key_task_permission()
59 /* use the third 8-bits of permissions for keys the caller has a group in key_task_permission()
79 /* use the top 8-bits of permissions for keys the caller possesses in key_task_permission()
80 * - possessor permissions are additive with other permissions in key_task_permission()
/linux/security/selinux/
H A Davc.c547 * (@ssid, @tsid), interpreting the permissions
594 * @xp_node: resulting extended permissions
816 * @xperm: xperm permissions
950 * avc_ss_reset - Flush the cache and revalidate migrated permissions.
980 * @xp_node: AVC extended permissions node
1012 * The avc extended permissions logic adds an additional 256 bits of
1013 * permissions to an avc node when extended permissions for that node are
1014 * specified in the avtab. If the additional 256 permissions is not adequate,
1047 /* if extended permissions are not defined, only consider av_decision */ in avc_has_extended_perms()
1101 * @requested: requested permissions
[all …]
/linux/arch/x86/kernel/cpu/sgx/
H A Dioctl.c192 * CPU will silently overwrite the permissions as zero, which means in sgx_validate_secinfo()
385 * A SECINFO for a TCS is required to always contain zero permissions because
389 * mmap()'s protection bits are capped by the page permissions. For each page
393 * 1. A regular page: PROT_R, PROT_W and PROT_X match the SECINFO permissions.
706 * sgx_enclave_restrict_permissions() - Restrict EPCM permissions
709 * their new permissions.
727 secinfo.flags = modp->permissions & SGX_SECINFO_PERMISSION_MASK; in sgx_enclave_restrict_permissions()
743 * Changing EPCM permissions is only supported on regular in sgx_enclave_restrict_permissions()
755 * how EPCM permissions can be relaxed from within the enclave. in sgx_enclave_restrict_permissions()
756 * ENCLS[EMODPR] can only remove existing EPCM permissions, in sgx_enclave_restrict_permissions()
[all …]
/linux/security/selinux/ss/
H A Dconstraint.h4 * order for one or more permissions to be granted.
59 u32 permissions; /* constrained permissions */ member
60 struct constraint_expr *expr; /* constraint on permissions */
H A Dservices.h16 u16 num_perms; /* number of permissions in class */
17 u32 perms[sizeof(u32) * 8]; /* policy values for permissions */
/linux/security/apparmor/
H A Dfile.c83 * @perms: the permissions computed for the request (NOT NULL)
85 * @request: permissions requested
127 /* only report permissions that were denied */ in aa_audit_file()
205 * @perms: Returns - the permissions found when matching @name
264 * aa_path_perm - do permissions check & audit for @path
268 * @path: path to check permissions of (NOT NULL)
270 * @request: requested permissions
304 * test target x permissions are equal OR a subset of link x permissions
306 * a subset of permissions that the target has.
377 * a subset of the allowed permissions on target. in profile_path_link()
[all …]
/linux/Documentation/core-api/
H A Dprotection-keys.rst31 theoretically space in the PAE PTEs. These permissions are enforced on data
42 overlay permissions for each protection key index.
47 Unlike x86_64, the protection key permissions also apply to instruction
62 to change access permissions to memory covered with a key. In this example
116 the plain mprotect() permissions are violated.
/linux/security/selinux/include/
H A Davc.h80 * actual permissions that were denied. As an example lets in avc_audit_required()
105 * avc_audit - Audit the granting or denial of permissions.
109 * @requested: requested permissions
114 * Audit the granting or denial of permissions in accordance
136 #define AVC_EXTENDED_PERMS 2 /* update extended permissions */
/linux/arch/x86/kernel/
H A Dioport.c69 * This changes the io permissions bitmap in the current task.
90 /* No point to allocate a bitmap just to clear permissions */ in ksys_ioperm()
117 * permissions are dropped has the pointer set up. in ksys_ioperm()
141 /* All permissions dropped? */ in ksys_ioperm()
174 * Setting IOPL to level 0-2 is disabling I/O permissions. Level 3
/linux/fs/
H A Dattr.c83 * chown_ok - verify permissions to chown inode
85 * @inode: inode to check permissions on
91 * permissions. On non-idmapped mounts or if permission checking is to be
110 * chgrp_ok - verify permissions to chgrp inode
112 * @inode: inode to check permissions on
118 * permissions. On non-idmapped mounts or if permission checking is to be
155 * permissions. On non-idmapped mounts or if permission checking is to be
239 * permissions to allow truncate (inode_newsize_ok does NOT check these
325 * permissions. On non-idmapped mounts or if permission checking is to be
414 * permissions. On non-idmapped mounts or if permission checking is to be
/linux/fs/coda/
H A Dcoda_fs_i.h28 unsigned int c_cached_epoch; /* epoch for cached permissions */
29 kuid_t c_uid; /* fsuid for cached permissions */
30 unsigned int c_cached_perm; /* cached access permissions */
/linux/arch/arm64/include/asm/
H A Dkvm_pgtable.h242 * enum kvm_pgtable_prot - Page-table permissions and attributes.
462 * @prot: Permissions and attributes for the mapping.
570 * @prot: Permissions and attributes for the mapping.
597 * @prot: Permissions and attributes for the mapping.
611 * permissions. Instead, the vCPU will exit one more time from guest if still
612 * needed and then go through the path of relaxing permissions.
674 * calling this function to ensure that the updated permissions are visible
709 * calling this function to ensure that the updated permissions are visible
718 * kvm_pgtable_stage2_relax_perms() - Relax the permissions enforced by a
722 * @prot: Additional permissions to grant for the mapping.
[all …]
/linux/Documentation/usb/
H A Dtext_files.rst13 USB devfs drop permissions source
16 .. literalinclude:: usbdevfs-drop-permissions.c
/linux/Documentation/ABI/testing/
H A Dprocfs-attr-prev8 The details of permissions required to read from
12 The other details of permissions required to write to
H A Dprocfs-attr-current7 The details of permissions required to read from
12 The other details of permissions required to write to
H A Dprocfs-attr-exec8 The details of permissions required to read from
13 The other details of permissions required to write to
/linux/fs/hfsplus/
H A Dinode.c519 hfsplus_get_perms(inode, &folder->permissions, 1); in hfsplus_cat_read_inode()
548 hfsplus_get_perms(inode, &file->permissions, 0); in hfsplus_cat_read_inode()
551 if (file->permissions.dev) in hfsplus_cat_read_inode()
553 be32_to_cpu(file->permissions.dev)); in hfsplus_cat_read_inode()
563 be32_to_cpu(file->permissions.dev)); in hfsplus_cat_read_inode()
611 hfsplus_cat_set_perms(inode, &folder->permissions); in hfsplus_cat_write_inode()
640 hfsplus_cat_set_perms(inode, &file->permissions); in hfsplus_cat_write_inode()
642 (file->permissions.rootflags | in hfsplus_cat_write_inode()
643 file->permissions.userflags)) in hfsplus_cat_write_inode()
/linux/tools/testing/selftests/sgx/
H A Dmain.c604 * Second page of .data segment is used to test changing PTE permissions.
609 * 2) Change PTE permissions (RW -> RO) of target page within enclave.
612 * 4) Change PTE permissions of target page within enclave back to be RW.
634 * have its permissions manipulated. in TEST_F()
665 /* Change PTE permissions of target page within the enclave */ in TEST_F()
671 * PTE permissions of target page changed to read-only, EPCM in TEST_F()
672 * permissions unchanged (EPCM permissions are RW), attempt to in TEST_F()
689 * Change PTE permissions back to enable enclave to write to the in TEST_F()
718 * Modifying permissions of TCS page should not be possible.
759 ioc.permissions = SGX_SECINFO_R; in TEST_F()
[all …]
/linux/tools/perf/tests/
H A Dmmap-basic.c90 /* Permissions failure, flag the failure as a skip. */ in test__basic_mmap()
402 "permissions"),
407 "permissions"
416 "permissions"
425 "permissions"
434 "permissions"
/linux/tools/testing/selftests/cgroup/
H A Dtest_cpuset.c58 * The success should only depend on the parent cgroup permissions and not the
63 * permissions between two different cpusets.
107 /* Enable permissions along src->dst tree path */ in test_cpuset_perms_object()
196 /* Enable permissions as in a delegated subtree */ in test_cpuset_perms_subtree()
/linux/arch/mips/include/uapi/asm/
H A Dsembuf.h18 struct ipc64_perm sem_perm; /* permissions .. see ipc.h */
27 struct ipc64_perm sem_perm; /* permissions .. see ipc.h */
/linux/drivers/infiniband/sw/siw/
H A Dsiw_mem.c126 * Check protection domain, STAG state, access permissions and
132 * @perms: requested access permissions
148 * check access permissions in siw_check_mem()
151 siw_dbg_pd(pd, "permissions 0x%08x < 0x%08x\n", in siw_check_mem()
181 * @perms: requested access permissions

12345678910>>...20