Home
last modified time | relevance | path

Searched full:permissions (Results 1 – 25 of 404) sorted by relevance

12345678910>>...17

/linux/Documentation/filesystems/
H A Dadfs.rst39 ownmask=nnn The permission mask for ADFS 'owner' permissions
41 othmask=nnn The permission mask for ADFS 'other' permissions
48 Mapping of ADFS permissions to Linux permissions
51 ADFS permissions consist of the following:
68 Possible owner mode permissions -> -rwx------
74 Possible other mode permissions -> ----rwxrwx
77 not a UnixExec filetype, then the permissions will be::
93 desire the permissions should be under Linux.
H A Disofs.rst39 mode=xxx Sets the permissions on files to xxx unless Rock Ridge
40 extensions set the permissions otherwise
41 dmode=xxx Sets the permissions on directories to xxx unless Rock Ridge
42 extensions set the permissions otherwise
43 overriderockperm Set permissions on files and directories according to
/linux/include/linux/
H A Dexecmem.h22 * permissions, alignment and other parameters for memory that can be used
70 * execmem_restore_rox - restore read-only-execute permissions
74 * Restores read-only-execute permissions on a range [@ptr, @ptr + @size)
93 * @pgprot: permissions for memory in this address space
162 * Forces writable permissions on the allocated memory and the caller is
163 * responsible to manage the permissions afterwards.
165 * For architectures that use ROX cache the permissions will be set to R+W.
166 * For architectures that don't use ROX cache the default permissions for @type
/linux/security/keys/
H A Dpermission.c24 * permissions bits or the LSM check.
53 /* use the second 8-bits of permissions for keys the caller owns */ in key_task_permission()
59 /* use the third 8-bits of permissions for keys the caller has a group in key_task_permission()
79 /* use the top 8-bits of permissions for keys the caller possesses in key_task_permission()
80 * - possessor permissions are additive with other permissions in key_task_permission()
/linux/security/selinux/
H A Davc.c548 * (@ssid, @tsid), interpreting the permissions
595 * @xp_node: resulting extended permissions
817 * @xperm: xperm permissions
951 * avc_ss_reset - Flush the cache and revalidate migrated permissions.
981 * @xp_node: AVC extended permissions node
1013 * The avc extended permissions logic adds an additional 256 bits of
1014 * permissions to an avc node when extended permissions for that node are
1015 * specified in the avtab. If the additional 256 permissions is not adequate,
1048 /* if extended permissions are not defined, only consider av_decision */ in avc_has_extended_perms()
1102 * @requested: requested permissions
[all …]
/linux/arch/x86/kernel/cpu/sgx/
H A Dioctl.c192 * CPU will silently overwrite the permissions as zero, which means in sgx_validate_secinfo()
385 * A SECINFO for a TCS is required to always contain zero permissions because
389 * mmap()'s protection bits are capped by the page permissions. For each page
393 * 1. A regular page: PROT_R, PROT_W and PROT_X match the SECINFO permissions.
706 * sgx_enclave_restrict_permissions() - Restrict EPCM permissions
709 * their new permissions.
727 secinfo.flags = modp->permissions & SGX_SECINFO_PERMISSION_MASK; in sgx_enclave_restrict_permissions()
743 * Changing EPCM permissions is only supported on regular in sgx_enclave_restrict_permissions()
755 * how EPCM permissions can be relaxed from within the enclave. in sgx_enclave_restrict_permissions()
756 * ENCLS[EMODPR] can only remove existing EPCM permissions, in sgx_enclave_restrict_permissions()
[all …]
/linux/security/apparmor/
H A Dfile.c83 * @perms: the permissions computed for the request (NOT NULL)
85 * @request: permissions requested
128 /* only report permissions that were denied */ in aa_audit_file()
210 * @perms: Returns - the permissions found when matching @name
269 * aa_path_perm - do permissions check & audit for @path
273 * @path: path to check permissions of (NOT NULL)
275 * @request: requested permissions
309 * test target x permissions are equal OR a subset of link x permissions
311 * a subset of permissions that the target has.
382 * a subset of the allowed permissions on target. in profile_path_link()
[all …]
/linux/security/selinux/ss/
H A Dconstraint.h4 * order for one or more permissions to be granted.
59 u32 permissions; /* constrained permissions */ member
60 struct constraint_expr *expr; /* constraint on permissions */
H A Dservices.h16 u16 num_perms; /* number of permissions in class */
17 u32 perms[sizeof(u32) * 8]; /* policy values for permissions */
/linux/Documentation/core-api/
H A Dprotection-keys.rst31 theoretically space in the PAE PTEs. These permissions are enforced on data
42 overlay permissions for each protection key index.
47 Unlike x86_64, the protection key permissions also apply to instruction
62 to change access permissions to memory covered with a key. In this example
116 the plain mprotect() permissions are violated.
/linux/security/selinux/include/
H A Davc.h80 * actual permissions that were denied. As an example lets in avc_audit_required()
105 * avc_audit - Audit the granting or denial of permissions.
109 * @requested: requested permissions
114 * Audit the granting or denial of permissions in accordance
136 #define AVC_EXTENDED_PERMS 2 /* update extended permissions */
/linux/ipc/
H A Dutil.c269 * Add an entry 'new' to the ipc ids idr. The permissions object is
351 * ipc_check_perms - check security and permissions for an ipc object
543 * ipcperms - check ipc permissions
548 * Check user, group, other permissions for access
580 * kernel_to_ipc64_perm - convert kernel ipc permissions to user
581 * @in: kernel permissions
582 * @out: new style ipc permissions
584 * Turn the kernel object @in into a set of permissions descriptions
599 * ipc64_perm_to_ipc_perm - convert new ipc permissions to old
600 * @in: new style ipc permissions
[all …]
/linux/arch/x86/kernel/
H A Dioport.c69 * This changes the io permissions bitmap in the current task.
90 /* No point to allocate a bitmap just to clear permissions */ in ksys_ioperm()
117 * permissions are dropped has the pointer set up. in ksys_ioperm()
141 /* All permissions dropped? */ in ksys_ioperm()
174 * Setting IOPL to level 0-2 is disabling I/O permissions. Level 3
/linux/fs/coda/
H A Dcoda_fs_i.h28 unsigned int c_cached_epoch; /* epoch for cached permissions */
29 kuid_t c_uid; /* fsuid for cached permissions */
30 unsigned int c_cached_perm; /* cached access permissions */
/linux/tools/testing/selftests/sgx/
H A Dmain.c604 * Second page of .data segment is used to test changing PTE permissions.
609 * 2) Change PTE permissions (RW -> RO) of target page within enclave.
612 * 4) Change PTE permissions of target page within enclave back to be RW.
634 * have its permissions manipulated. in TEST_F()
665 /* Change PTE permissions of target page within the enclave */ in TEST_F()
671 * PTE permissions of target page changed to read-only, EPCM in TEST_F()
672 * permissions unchanged (EPCM permissions are RW), attempt to in TEST_F()
689 * Change PTE permissions back to enable enclave to write to the in TEST_F()
718 * Modifying permissions of TCS page should not be possible.
759 ioc.permissions = SGX_SECINFO_R; in TEST_F()
[all …]
/linux/Documentation/usb/
H A Dtext_files.rst13 USB devfs drop permissions source
16 .. literalinclude:: usbdevfs-drop-permissions.c
/linux/Documentation/ABI/testing/
H A Dprocfs-attr-prev8 The details of permissions required to read from
12 The other details of permissions required to write to
H A Dprocfs-attr-current7 The details of permissions required to read from
12 The other details of permissions required to write to
H A Dprocfs-attr-exec8 The details of permissions required to read from
13 The other details of permissions required to write to
/linux/tools/perf/tests/
H A Dmmap-basic.c90 /* Permissions failure, flag the failure as a skip. */ in test__basic_mmap()
402 "permissions"),
407 "permissions"
416 "permissions"
425 "permissions"
434 "permissions"
/linux/tools/testing/selftests/cgroup/
H A Dtest_cpuset.c58 * The success should only depend on the parent cgroup permissions and not the
63 * permissions between two different cpusets.
107 /* Enable permissions along src->dst tree path */ in test_cpuset_perms_object()
196 /* Enable permissions as in a delegated subtree */ in test_cpuset_perms_subtree()
/linux/arch/mips/include/uapi/asm/
H A Dsembuf.h18 struct ipc64_perm sem_perm; /* permissions .. see ipc.h */
27 struct ipc64_perm sem_perm; /* permissions .. see ipc.h */
/linux/drivers/infiniband/sw/siw/
H A Dsiw_mem.c126 * Check protection domain, STAG state, access permissions and
132 * @perms: requested access permissions
148 * check access permissions in siw_check_mem()
151 siw_dbg_pd(pd, "permissions 0x%08x < 0x%08x\n", in siw_check_mem()
181 * @perms: requested access permissions
/linux/security/
H A DKconfig27 permissions for users like ptrace, assuming they have ptrace
37 permissions if you have ptrace access rights.
43 permissions for active ptracers like gdb.
48 Never override memory mapping permissions
/linux/tools/perf/tests/shell/
H A Dtimechart.sh29 # If it fails (e.g. permissions, missing tracepoints), skip the test.
31 echo "Basic perf timechart test [Skipped: perf timechart record failed (permissions/events?)]"

12345678910>>...17