Home
last modified time | relevance | path

Searched full:permissions (Results 1 – 25 of 481) sorted by relevance

12345678910>>...20

/linux/Documentation/filesystems/
H A Dadfs.rst39 ownmask=nnn The permission mask for ADFS 'owner' permissions
41 othmask=nnn The permission mask for ADFS 'other' permissions
48 Mapping of ADFS permissions to Linux permissions
51 ADFS permissions consist of the following:
68 Possible owner mode permissions -> -rwx------
74 Possible other mode permissions -> ----rwxrwx
77 not a UnixExec filetype, then the permissions will be::
93 desire the permissions should be under Linux.
H A Disofs.rst39 mode=xxx Sets the permissions on files to xxx unless Rock Ridge
40 extensions set the permissions otherwise
41 dmode=xxx Sets the permissions on directories to xxx unless Rock Ridge
42 extensions set the permissions otherwise
43 overriderockperm Set permissions on files and directories according to
/linux/include/linux/
H A Dexecmem.h22 * permissions, alignment and other parameters for memory that can be used
70 * execmem_restore_rox - restore read-only-execute permissions
74 * Restores read-only-execute permissions on a range [@ptr, @ptr + @size)
93 * @pgprot: permissions for memory in this address space
162 * Forces writable permissions on the allocated memory and the caller is
163 * responsible to manage the permissions afterwards.
165 * For architectures that use ROX cache the permissions will be set to R+W.
166 * For architectures that don't use ROX cache the default permissions for @type
/linux/security/keys/
H A Dpermission.c24 * permissions bits or the LSM check.
53 /* use the second 8-bits of permissions for keys the caller owns */ in key_task_permission()
59 /* use the third 8-bits of permissions for keys the caller has a group in key_task_permission()
79 /* use the top 8-bits of permissions for keys the caller possesses in key_task_permission()
80 * - possessor permissions are additive with other permissions in key_task_permission()
/linux/security/selinux/
H A Davc.c548 * (@ssid, @tsid), interpreting the permissions
595 * @xp_node: resulting extended permissions
817 * @xperm: xperm permissions
951 * avc_ss_reset - Flush the cache and revalidate migrated permissions.
981 * @xp_node: AVC extended permissions node
1013 * The avc extended permissions logic adds an additional 256 bits of
1014 * permissions to an avc node when extended permissions for that node are
1015 * specified in the avtab. If the additional 256 permissions is not adequate,
1048 /* if extended permissions are not defined, only consider av_decision */ in avc_has_extended_perms()
1102 * @requested: requested permissions
[all …]
/linux/arch/x86/kernel/cpu/sgx/
H A Dioctl.c192 * CPU will silently overwrite the permissions as zero, which means in sgx_validate_secinfo()
385 * A SECINFO for a TCS is required to always contain zero permissions because
389 * mmap()'s protection bits are capped by the page permissions. For each page
393 * 1. A regular page: PROT_R, PROT_W and PROT_X match the SECINFO permissions.
706 * sgx_enclave_restrict_permissions() - Restrict EPCM permissions
709 * their new permissions.
727 secinfo.flags = modp->permissions & SGX_SECINFO_PERMISSION_MASK; in sgx_enclave_restrict_permissions()
743 * Changing EPCM permissions is only supported on regular in sgx_enclave_restrict_permissions()
755 * how EPCM permissions can be relaxed from within the enclave. in sgx_enclave_restrict_permissions()
756 * ENCLS[EMODPR] can only remove existing EPCM permissions, in sgx_enclave_restrict_permissions()
[all …]
H A Dencl.c293 * permissions than the VMA permissions (i.e. the subset of {VM_READ, in sgx_encl_load_page_in_vma()
345 * phase. The enclave decides the permissions by the means of in sgx_encl_eaug_page()
512 * that the permissions requested by a subset of {VM_READ, VM_WRITE, VM_EXEC}
513 * do not contain any permissions that are not contained in the build time
514 * permissions of any of the enclave pages within the given address range.
516 * An enclave creator must declare the strongest permissions that will be
518 * or weaker permissions than the earlier declared permissions.
538 * Disallow READ_IMPLIES_EXEC tasks as their VMA permissions might in sgx_encl_may_map()
539 * conflict with the enclave page permissions. in sgx_encl_may_map()
1179 * permissions are *always* zero - the CPU ignores the user provided in sgx_encl_page_alloc()
[all …]
/linux/security/apparmor/
H A Dfile.c83 * @perms: the permissions computed for the request (NOT NULL)
85 * @request: permissions requested
128 /* only report permissions that were denied */ in aa_audit_file()
210 * @perms: Returns - the permissions found when matching @name
269 * aa_path_perm - do permissions check & audit for @path
273 * @path: path to check permissions of (NOT NULL)
275 * @request: requested permissions
309 * test target x permissions are equal OR a subset of link x permissions
311 * a subset of permissions that the target has.
382 * a subset of the allowed permissions on target. in profile_path_link()
[all …]
/linux/security/selinux/ss/
H A Dconstraint.h4 * order for one or more permissions to be granted.
59 u32 permissions; /* constrained permissions */ member
60 struct constraint_expr *expr; /* constraint on permissions */
H A Dservices.h16 u16 num_perms; /* number of permissions in class */
17 u32 perms[sizeof(u32) * 8]; /* policy values for permissions */
/linux/Documentation/core-api/
H A Dprotection-keys.rst31 theoretically space in the PAE PTEs. These permissions are enforced on data
42 overlay permissions for each protection key index.
47 Unlike x86_64, the protection key permissions also apply to instruction
62 to change access permissions to memory covered with a key. In this example
116 the plain mprotect() permissions are violated.
/linux/security/selinux/include/
H A Davc.h80 * actual permissions that were denied. As an example lets in avc_audit_required()
105 * avc_audit - Audit the granting or denial of permissions.
109 * @requested: requested permissions
114 * Audit the granting or denial of permissions in accordance
136 #define AVC_EXTENDED_PERMS 2 /* update extended permissions */
/linux/ipc/
H A Dutil.c269 * Add an entry 'new' to the ipc ids idr. The permissions object is
351 * ipc_check_perms - check security and permissions for an ipc object
543 * ipcperms - check ipc permissions
548 * Check user, group, other permissions for access
580 * kernel_to_ipc64_perm - convert kernel ipc permissions to user
581 * @in: kernel permissions
582 * @out: new style ipc permissions
584 * Turn the kernel object @in into a set of permissions descriptions
599 * ipc64_perm_to_ipc_perm - convert new ipc permissions to old
600 * @in: new style ipc permissions
[all …]
/linux/arch/x86/kernel/
H A Dioport.c69 * This changes the io permissions bitmap in the current task.
90 /* No point to allocate a bitmap just to clear permissions */ in ksys_ioperm()
117 * permissions are dropped has the pointer set up. in ksys_ioperm()
141 /* All permissions dropped? */ in ksys_ioperm()
174 * Setting IOPL to level 0-2 is disabling I/O permissions. Level 3
/linux/fs/coda/
H A Dcoda_fs_i.h28 unsigned int c_cached_epoch; /* epoch for cached permissions */
29 kuid_t c_uid; /* fsuid for cached permissions */
30 unsigned int c_cached_perm; /* cached access permissions */
/linux/arch/arm64/include/asm/
H A Dkvm_pgtable.h243 * enum kvm_pgtable_prot - Page-table permissions and attributes.
478 * @prot: Permissions and attributes for the mapping.
606 * @prot: Permissions and attributes for the mapping.
633 * @prot: Permissions and attributes for the mapping.
647 * permissions. Instead, the vCPU will exit one more time from guest if still
648 * needed and then go through the path of relaxing permissions.
710 * calling this function to ensure that the updated permissions are visible
745 * calling this function to ensure that the updated permissions are visible
754 * kvm_pgtable_stage2_relax_perms() - Relax the permissions enforced by a
758 * @prot: Additional permissions to grant for the mapping.
[all …]
/linux/tools/testing/selftests/sgx/
H A Dmain.c604 * Second page of .data segment is used to test changing PTE permissions.
609 * 2) Change PTE permissions (RW -> RO) of target page within enclave.
612 * 4) Change PTE permissions of target page within enclave back to be RW.
634 * have its permissions manipulated. in TEST_F()
665 /* Change PTE permissions of target page within the enclave */ in TEST_F()
671 * PTE permissions of target page changed to read-only, EPCM in TEST_F()
672 * permissions unchanged (EPCM permissions are RW), attempt to in TEST_F()
689 * Change PTE permissions back to enable enclave to write to the in TEST_F()
718 * Modifying permissions of TCS page should not be possible.
759 ioc.permissions = SGX_SECINFO_R; in TEST_F()
[all …]
/linux/tools/perf/tests/
H A Dmmap-basic.c90 /* Permissions failure, flag the failure as a skip. */ in test__basic_mmap()
402 "permissions"),
407 "permissions"
416 "permissions"
425 "permissions"
434 "permissions"
/linux/Documentation/usb/
H A Dtext_files.rst13 USB devfs drop permissions source
16 .. literalinclude:: usbdevfs-drop-permissions.c
/linux/Documentation/ABI/testing/
H A Dprocfs-attr-prev8 The details of permissions required to read from
12 The other details of permissions required to write to
H A Dprocfs-attr-current7 The details of permissions required to read from
12 The other details of permissions required to write to
H A Dprocfs-attr-exec8 The details of permissions required to read from
13 The other details of permissions required to write to
/linux/tools/testing/selftests/cgroup/
H A Dtest_cpuset.c58 * The success should only depend on the parent cgroup permissions and not the
63 * permissions between two different cpusets.
107 /* Enable permissions along src->dst tree path */ in test_cpuset_perms_object()
196 /* Enable permissions as in a delegated subtree */ in test_cpuset_perms_subtree()
/linux/arch/mips/include/uapi/asm/
H A Dsembuf.h18 struct ipc64_perm sem_perm; /* permissions .. see ipc.h */
27 struct ipc64_perm sem_perm; /* permissions .. see ipc.h */
/linux/drivers/infiniband/sw/siw/
H A Dsiw_mem.c126 * Check protection domain, STAG state, access permissions and
132 * @perms: requested access permissions
148 * check access permissions in siw_check_mem()
151 siw_dbg_pd(pd, "permissions 0x%08x < 0x%08x\n", in siw_check_mem()
181 * @perms: requested access permissions

12345678910>>...20