Home
last modified time | relevance | path

Searched refs:permissions (Results 1 – 25 of 116) sorted by relevance

12345

/linux/Documentation/filesystems/
H A Dadfs.rst39 ownmask=nnn The permission mask for ADFS 'owner' permissions
41 othmask=nnn The permission mask for ADFS 'other' permissions
48 Mapping of ADFS permissions to Linux permissions
51 ADFS permissions consist of the following:
68 Possible owner mode permissions -> -rwx------
74 Possible other mode permissions -> ----rwxrwx
77 not a UnixExec filetype, then the permissions will be::
93 desire the permissions should be under Linux.
H A Disofs.rst39 mode=xxx Sets the permissions on files to xxx unless Rock Ridge
40 extensions set the permissions otherwise
41 dmode=xxx Sets the permissions on directories to xxx unless Rock Ridge
42 extensions set the permissions otherwise
43 overriderockperm Set permissions on files and directories according to
H A Dhfsplus.rst23 that have uninitialized permissions structures.
28 that have uninitialized permissions structures.
H A Dudf.rst29 mode= Set the default file permissions.
30 dmode= Set the default directory permissions.
H A Dzonefs.rst171 * File access permissions: the default 640 access permissions can be changed.
232 permissions.
251 access permissions to render the file read-only. This disables changes to the
252 file attributes and data modification. For offline zones, all permissions
262 | "errors=xxx" | device | access permissions |
288 permissions to read-only applies to all files. The file system is remounted
304 the zone file access permissions as noted in the table above.
/linux/Documentation/usb/
H A Dtext_files.rst13 USB devfs drop permissions source
16 .. literalinclude:: usbdevfs-drop-permissions.c
/linux/Documentation/core-api/
H A Dprotection-keys.rst31 theoretically space in the PAE PTEs. These permissions are enforced on data
42 overlay permissions for each protection key index.
47 Unlike x86_64, the protection key permissions also apply to instruction
62 to change access permissions to memory covered with a key. In this example
116 the plain mprotect() permissions are violated.
/linux/Documentation/ABI/testing/
H A Dprocfs-attr-prev8 The details of permissions required to read from
12 The other details of permissions required to write to
H A Dprocfs-attr-current7 The details of permissions required to read from
12 The other details of permissions required to write to
H A Dprocfs-attr-exec8 The details of permissions required to read from
13 The other details of permissions required to write to
/linux/fs/hfsplus/
H A Dcatalog.c124 hfsplus_cat_set_perms(inode, &folder->permissions); in hfsplus_cat_build_record()
143 hfsplus_cat_set_perms(inode, &file->permissions); in hfsplus_cat_build_record()
156 (file->permissions.rootflags | in hfsplus_cat_build_record()
157 file->permissions.userflags)) in hfsplus_cat_build_record()
169 file->permissions.dev = in hfsplus_cat_build_record()
/linux/security/selinux/ss/
H A Dpolicydb.c203 hashtab_map(&comdatum->permissions.table, perm_destroy, NULL); in common_destroy()
204 hashtab_destroy(&comdatum->permissions.table); in common_destroy()
232 hashtab_map(&cladatum->permissions.table, perm_destroy, NULL); in cls_destroy()
233 hashtab_destroy(&cladatum->permissions.table); in cls_destroy()
1178 rc = symtab_init(&comdatum->permissions, nel); in common_read()
1181 comdatum->permissions.nprim = le32_to_cpu(buf[2]); in common_read()
1188 rc = perm_read(p, &comdatum->permissions, fp); in common_read()
1193 hash_eval(&comdatum->permissions.table, "common_permissions", key); in common_read()
1251 c->permissions = le32_to_cpu(buf[0]); in read_cons_helper()
1342 rc = symtab_init(&cladatum->permissions, nel); in class_read()
[all …]
H A Dconstraint.h59 u32 permissions; /* constrained permissions */ member
H A Dpolicydb.h46 struct symtab permissions; /* common permissions */ member
54 struct symtab permissions; /* class-specific permission symbol table */ member
/linux/tools/perf/Documentation/
H A Dperf-buildid-cache.txt33 /proc/kcore which requires root permissions to read. Be aware that
39 permissions for root only. kcore will not be added if there is already a
/linux/arch/x86/kernel/cpu/sgx/
H A Dioctl.c727 secinfo.flags = modp->permissions & SGX_SECINFO_PERMISSION_MASK; in sgx_enclave_restrict_permissions()
839 if (params.permissions & ~SGX_SECINFO_PERMISSION_MASK) in sgx_ioc_enclave_restrict_permissions()
846 if ((params.permissions & SGX_SECINFO_W) && in sgx_ioc_enclave_restrict_permissions()
847 !(params.permissions & SGX_SECINFO_R)) in sgx_ioc_enclave_restrict_permissions()
/linux/security/
H A DKconfig27 permissions for users like ptrace, assuming they have ptrace
39 permissions if you have ptrace access rights.
45 permissions for active ptracers like gdb.
50 Never override memory mapping permissions
/linux/Documentation/ABI/stable/
H A Dprocfs-audit_loginuid10 permissions are not needed to set it. The accessor must
/linux/LICENSES/exceptions/
H A DGCC-exception-2.012 In addition to the permissions in the GNU Library General Public License,
/linux/Documentation/arch/x86/
H A Dsgx.rst74 EPCM permissions are separate from the normal page tables. This prevents the
76 remain read-only. EPCM permissions may only impose additional restrictions on
77 top of normal x86 page permissions.
95 pages and establish enclave page permissions.
107 enclaves: modifying enclave page permissions and type, and dynamically
/linux/fs/9p/
H A DKconfig27 POSIX Access Control Lists (ACLs) support permissions for users and
/linux/Documentation/admin-guide/cgroup-v1/
H A Ddevices.rst54 A cgroup may not be granted more permissions than the cgroup's
61 access permissions than its parent. Every time an entry is written to
/linux/fs/ceph/
H A DKconfig34 POSIX Access Control Lists (ACLs) support permissions for users and
/linux/drivers/base/
H A DKconfig36 nodes with their default names and permissions for all
39 symlinks, and apply needed permissions.
41 udev runs on top, managing permissions and adding meaningful
/linux/Documentation/admin-guide/namespaces/
H A Dcompatibility-list.rst36 access permissions to files, belonging to user 10 in another

12345