/linux/Documentation/filesystems/ |
H A D | adfs.rst | 39 ownmask=nnn The permission mask for ADFS 'owner' permissions 41 othmask=nnn The permission mask for ADFS 'other' permissions 48 Mapping of ADFS permissions to Linux permissions 51 ADFS permissions consist of the following: 68 Possible owner mode permissions -> -rwx------ 74 Possible other mode permissions -> ----rwxrwx 77 not a UnixExec filetype, then the permissions will be:: 93 desire the permissions should be under Linux.
|
H A D | isofs.rst | 39 mode=xxx Sets the permissions on files to xxx unless Rock Ridge 40 extensions set the permissions otherwise 41 dmode=xxx Sets the permissions on directories to xxx unless Rock Ridge 42 extensions set the permissions otherwise 43 overriderockperm Set permissions on files and directories according to
|
/linux/include/linux/ |
H A D | execmem.h | 22 * permissions, alignment and other parameters for memory that can be used 70 * execmem_restore_rox - restore read-only-execute permissions 74 * Restores read-only-execute permissions on a range [@ptr, @ptr + @size) 93 * @pgprot: permissions for memory in this address space 162 * Forces writable permissions on the allocated memory and the caller is 163 * responsible to manage the permissions afterwards. 165 * For architectures that use ROX cache the permissions will be set to R+W. 166 * For architectures that don't use ROX cache the default permissions for @type
|
/linux/security/keys/ |
H A D | permission.c | 24 * permissions bits or the LSM check. 53 /* use the second 8-bits of permissions for keys the caller owns */ in key_task_permission() 59 /* use the third 8-bits of permissions for keys the caller has a group in key_task_permission() 79 /* use the top 8-bits of permissions for keys the caller possesses in key_task_permission() 80 * - possessor permissions are additive with other permissions in key_task_permission()
|
/linux/security/selinux/ |
H A D | avc.c | 547 * (@ssid, @tsid), interpreting the permissions 594 * @xp_node: resulting extended permissions 816 * @xperm: xperm permissions 950 * avc_ss_reset - Flush the cache and revalidate migrated permissions. 980 * @xp_node: AVC extended permissions node 1012 * The avc extended permissions logic adds an additional 256 bits of 1013 * permissions to an avc node when extended permissions for that node are 1014 * specified in the avtab. If the additional 256 permissions is not adequate, 1047 /* if extended permissions are not defined, only consider av_decision */ in avc_has_extended_perms() 1101 * @requested: requested permissions [all …]
|
/linux/arch/x86/kernel/cpu/sgx/ |
H A D | ioctl.c | 192 * CPU will silently overwrite the permissions as zero, which means in sgx_validate_secinfo() 385 * A SECINFO for a TCS is required to always contain zero permissions because 389 * mmap()'s protection bits are capped by the page permissions. For each page 393 * 1. A regular page: PROT_R, PROT_W and PROT_X match the SECINFO permissions. 706 * sgx_enclave_restrict_permissions() - Restrict EPCM permissions 709 * their new permissions. 727 secinfo.flags = modp->permissions & SGX_SECINFO_PERMISSION_MASK; in sgx_enclave_restrict_permissions() 743 * Changing EPCM permissions is only supported on regular in sgx_enclave_restrict_permissions() 755 * how EPCM permissions can be relaxed from within the enclave. in sgx_enclave_restrict_permissions() 756 * ENCLS[EMODPR] can only remove existing EPCM permissions, in sgx_enclave_restrict_permissions() [all …]
|
/linux/security/selinux/ss/ |
H A D | constraint.h | 4 * order for one or more permissions to be granted. 59 u32 permissions; /* constrained permissions */ member 60 struct constraint_expr *expr; /* constraint on permissions */
|
H A D | services.h | 16 u16 num_perms; /* number of permissions in class */ 17 u32 perms[sizeof(u32) * 8]; /* policy values for permissions */
|
/linux/security/apparmor/ |
H A D | file.c | 83 * @perms: the permissions computed for the request (NOT NULL) 85 * @request: permissions requested 127 /* only report permissions that were denied */ in aa_audit_file() 205 * @perms: Returns - the permissions found when matching @name 264 * aa_path_perm - do permissions check & audit for @path 268 * @path: path to check permissions of (NOT NULL) 270 * @request: requested permissions 304 * test target x permissions are equal OR a subset of link x permissions 306 * a subset of permissions that the target has. 377 * a subset of the allowed permissions on target. in profile_path_link() [all …]
|
/linux/Documentation/core-api/ |
H A D | protection-keys.rst | 31 theoretically space in the PAE PTEs. These permissions are enforced on data 42 overlay permissions for each protection key index. 47 Unlike x86_64, the protection key permissions also apply to instruction 62 to change access permissions to memory covered with a key. In this example 116 the plain mprotect() permissions are violated.
|
/linux/security/selinux/include/ |
H A D | avc.h | 80 * actual permissions that were denied. As an example lets in avc_audit_required() 105 * avc_audit - Audit the granting or denial of permissions. 109 * @requested: requested permissions 114 * Audit the granting or denial of permissions in accordance 136 #define AVC_EXTENDED_PERMS 2 /* update extended permissions */
|
/linux/arch/x86/kernel/ |
H A D | ioport.c | 69 * This changes the io permissions bitmap in the current task. 90 /* No point to allocate a bitmap just to clear permissions */ in ksys_ioperm() 117 * permissions are dropped has the pointer set up. in ksys_ioperm() 141 /* All permissions dropped? */ in ksys_ioperm() 174 * Setting IOPL to level 0-2 is disabling I/O permissions. Level 3
|
/linux/fs/ |
H A D | attr.c | 83 * chown_ok - verify permissions to chown inode 85 * @inode: inode to check permissions on 91 * permissions. On non-idmapped mounts or if permission checking is to be 110 * chgrp_ok - verify permissions to chgrp inode 112 * @inode: inode to check permissions on 118 * permissions. On non-idmapped mounts or if permission checking is to be 155 * permissions. On non-idmapped mounts or if permission checking is to be 239 * permissions to allow truncate (inode_newsize_ok does NOT check these 325 * permissions. On non-idmapped mounts or if permission checking is to be 414 * permissions. On non-idmapped mounts or if permission checking is to be
|
/linux/fs/coda/ |
H A D | coda_fs_i.h | 28 unsigned int c_cached_epoch; /* epoch for cached permissions */ 29 kuid_t c_uid; /* fsuid for cached permissions */ 30 unsigned int c_cached_perm; /* cached access permissions */
|
/linux/arch/arm64/include/asm/ |
H A D | kvm_pgtable.h | 242 * enum kvm_pgtable_prot - Page-table permissions and attributes. 462 * @prot: Permissions and attributes for the mapping. 570 * @prot: Permissions and attributes for the mapping. 597 * @prot: Permissions and attributes for the mapping. 611 * permissions. Instead, the vCPU will exit one more time from guest if still 612 * needed and then go through the path of relaxing permissions. 674 * calling this function to ensure that the updated permissions are visible 709 * calling this function to ensure that the updated permissions are visible 718 * kvm_pgtable_stage2_relax_perms() - Relax the permissions enforced by a 722 * @prot: Additional permissions to grant for the mapping. [all …]
|
/linux/Documentation/usb/ |
H A D | text_files.rst | 13 USB devfs drop permissions source 16 .. literalinclude:: usbdevfs-drop-permissions.c
|
/linux/Documentation/ABI/testing/ |
H A D | procfs-attr-prev | 8 The details of permissions required to read from 12 The other details of permissions required to write to
|
H A D | procfs-attr-current | 7 The details of permissions required to read from 12 The other details of permissions required to write to
|
H A D | procfs-attr-exec | 8 The details of permissions required to read from 13 The other details of permissions required to write to
|
/linux/fs/hfsplus/ |
H A D | inode.c | 519 hfsplus_get_perms(inode, &folder->permissions, 1); in hfsplus_cat_read_inode() 548 hfsplus_get_perms(inode, &file->permissions, 0); in hfsplus_cat_read_inode() 551 if (file->permissions.dev) in hfsplus_cat_read_inode() 553 be32_to_cpu(file->permissions.dev)); in hfsplus_cat_read_inode() 563 be32_to_cpu(file->permissions.dev)); in hfsplus_cat_read_inode() 611 hfsplus_cat_set_perms(inode, &folder->permissions); in hfsplus_cat_write_inode() 640 hfsplus_cat_set_perms(inode, &file->permissions); in hfsplus_cat_write_inode() 642 (file->permissions.rootflags | in hfsplus_cat_write_inode() 643 file->permissions.userflags)) in hfsplus_cat_write_inode()
|
/linux/tools/testing/selftests/sgx/ |
H A D | main.c | 604 * Second page of .data segment is used to test changing PTE permissions. 609 * 2) Change PTE permissions (RW -> RO) of target page within enclave. 612 * 4) Change PTE permissions of target page within enclave back to be RW. 634 * have its permissions manipulated. in TEST_F() 665 /* Change PTE permissions of target page within the enclave */ in TEST_F() 671 * PTE permissions of target page changed to read-only, EPCM in TEST_F() 672 * permissions unchanged (EPCM permissions are RW), attempt to in TEST_F() 689 * Change PTE permissions back to enable enclave to write to the in TEST_F() 718 * Modifying permissions of TCS page should not be possible. 759 ioc.permissions = SGX_SECINFO_R; in TEST_F() [all …]
|
/linux/tools/perf/tests/ |
H A D | mmap-basic.c | 90 /* Permissions failure, flag the failure as a skip. */ in test__basic_mmap() 402 "permissions"), 407 "permissions" 416 "permissions" 425 "permissions" 434 "permissions"
|
/linux/tools/testing/selftests/cgroup/ |
H A D | test_cpuset.c | 58 * The success should only depend on the parent cgroup permissions and not the 63 * permissions between two different cpusets. 107 /* Enable permissions along src->dst tree path */ in test_cpuset_perms_object() 196 /* Enable permissions as in a delegated subtree */ in test_cpuset_perms_subtree()
|
/linux/arch/mips/include/uapi/asm/ |
H A D | sembuf.h | 18 struct ipc64_perm sem_perm; /* permissions .. see ipc.h */ 27 struct ipc64_perm sem_perm; /* permissions .. see ipc.h */
|
/linux/drivers/infiniband/sw/siw/ |
H A D | siw_mem.c | 126 * Check protection domain, STAG state, access permissions and 132 * @perms: requested access permissions 148 * check access permissions in siw_check_mem() 151 siw_dbg_pd(pd, "permissions 0x%08x < 0x%08x\n", in siw_check_mem() 181 * @perms: requested access permissions
|