| /linux/Documentation/filesystems/ |
| H A D | adfs.rst | 39 ownmask=nnn The permission mask for ADFS 'owner' permissions 41 othmask=nnn The permission mask for ADFS 'other' permissions 48 Mapping of ADFS permissions to Linux permissions 51 ADFS permissions consist of the following: 68 Possible owner mode permissions -> -rwx------ 74 Possible other mode permissions -> ----rwxrwx 77 not a UnixExec filetype, then the permissions will be:: 93 desire the permissions should be under Linux.
|
| H A D | isofs.rst | 39 mode=xxx Sets the permissions on files to xxx unless Rock Ridge 40 extensions set the permissions otherwise 41 dmode=xxx Sets the permissions on directories to xxx unless Rock Ridge 42 extensions set the permissions otherwise 43 overriderockperm Set permissions on files and directories according to
|
| H A D | hfsplus.rst | 23 that have uninitialized permissions structures. 28 that have uninitialized permissions structures.
|
| H A D | udf.rst | 29 mode= Set the default file permissions. 30 dmode= Set the default directory permissions.
|
| H A D | zonefs.rst | 171 * File access permissions: the default 640 access permissions can be changed. 232 permissions. 251 access permissions to render the file read-only. This disables changes to the 252 file attributes and data modification. For offline zones, all permissions 262 | "errors=xxx" | device | access permissions | 288 permissions to read-only applies to all files. The file system is remounted 304 the zone file access permissions as noted in the table above.
|
| /linux/Documentation/usb/ |
| H A D | text_files.rst | 13 USB devfs drop permissions source 16 .. literalinclude:: usbdevfs-drop-permissions.c
|
| /linux/Documentation/core-api/ |
| H A D | protection-keys.rst | 31 theoretically space in the PAE PTEs. These permissions are enforced on data 42 overlay permissions for each protection key index. 47 Unlike x86_64, the protection key permissions also apply to instruction 62 to change access permissions to memory covered with a key. In this example 116 the plain mprotect() permissions are violated.
|
| /linux/Documentation/ABI/testing/ |
| H A D | procfs-attr-prev | 8 The details of permissions required to read from 12 The other details of permissions required to write to
|
| H A D | procfs-attr-current | 7 The details of permissions required to read from 12 The other details of permissions required to write to
|
| H A D | procfs-attr-exec | 8 The details of permissions required to read from 13 The other details of permissions required to write to
|
| /linux/fs/hfsplus/ |
| H A D | catalog.c | 124 hfsplus_cat_set_perms(inode, &folder->permissions); in hfsplus_cat_build_record() 143 hfsplus_cat_set_perms(inode, &file->permissions); in hfsplus_cat_build_record() 156 (file->permissions.rootflags | in hfsplus_cat_build_record() 157 file->permissions.userflags)) in hfsplus_cat_build_record() 169 file->permissions.dev = in hfsplus_cat_build_record()
|
| /linux/security/selinux/ss/ |
| H A D | policydb.c | 203 hashtab_map(&comdatum->permissions.table, perm_destroy, NULL); in common_destroy() 204 hashtab_destroy(&comdatum->permissions.table); in common_destroy() 232 hashtab_map(&cladatum->permissions.table, perm_destroy, NULL); in cls_destroy() 233 hashtab_destroy(&cladatum->permissions.table); in cls_destroy() 1178 rc = symtab_init(&comdatum->permissions, nel); in common_read() 1181 comdatum->permissions.nprim = le32_to_cpu(buf[2]); in common_read() 1188 rc = perm_read(p, &comdatum->permissions, fp); in common_read() 1193 hash_eval(&comdatum->permissions.table, "common_permissions", key); in common_read() 1251 c->permissions = le32_to_cpu(buf[0]); in read_cons_helper() 1342 rc = symtab_init(&cladatum->permissions, nel); in class_read() [all …]
|
| H A D | constraint.h | 59 u32 permissions; /* constrained permissions */ member
|
| H A D | policydb.h | 46 struct symtab permissions; /* common permissions */ member 54 struct symtab permissions; /* class-specific permission symbol table */ member
|
| /linux/tools/perf/Documentation/ |
| H A D | perf-buildid-cache.txt | 33 /proc/kcore which requires root permissions to read. Be aware that 39 permissions for root only. kcore will not be added if there is already a
|
| /linux/arch/x86/kernel/cpu/sgx/ |
| H A D | ioctl.c | 727 secinfo.flags = modp->permissions & SGX_SECINFO_PERMISSION_MASK; in sgx_enclave_restrict_permissions() 839 if (params.permissions & ~SGX_SECINFO_PERMISSION_MASK) in sgx_ioc_enclave_restrict_permissions() 846 if ((params.permissions & SGX_SECINFO_W) && in sgx_ioc_enclave_restrict_permissions() 847 !(params.permissions & SGX_SECINFO_R)) in sgx_ioc_enclave_restrict_permissions()
|
| /linux/security/ |
| H A D | Kconfig | 27 permissions for users like ptrace, assuming they have ptrace 39 permissions if you have ptrace access rights. 45 permissions for active ptracers like gdb. 50 Never override memory mapping permissions
|
| /linux/Documentation/ABI/stable/ |
| H A D | procfs-audit_loginuid | 10 permissions are not needed to set it. The accessor must
|
| /linux/LICENSES/exceptions/ |
| H A D | GCC-exception-2.0 | 12 In addition to the permissions in the GNU Library General Public License,
|
| /linux/Documentation/arch/x86/ |
| H A D | sgx.rst | 74 EPCM permissions are separate from the normal page tables. This prevents the 76 remain read-only. EPCM permissions may only impose additional restrictions on 77 top of normal x86 page permissions. 95 pages and establish enclave page permissions. 107 enclaves: modifying enclave page permissions and type, and dynamically
|
| /linux/fs/9p/ |
| H A D | Kconfig | 27 POSIX Access Control Lists (ACLs) support permissions for users and
|
| /linux/Documentation/admin-guide/cgroup-v1/ |
| H A D | devices.rst | 54 A cgroup may not be granted more permissions than the cgroup's 61 access permissions than its parent. Every time an entry is written to
|
| /linux/fs/ceph/ |
| H A D | Kconfig | 34 POSIX Access Control Lists (ACLs) support permissions for users and
|
| /linux/drivers/base/ |
| H A D | Kconfig | 36 nodes with their default names and permissions for all 39 symlinks, and apply needed permissions. 41 udev runs on top, managing permissions and adding meaningful
|
| /linux/Documentation/admin-guide/namespaces/ |
| H A D | compatibility-list.rst | 36 access permissions to files, belonging to user 10 in another
|