| /kernel/linux/linux-4.19/Documentation/filesystems/ |
| D | adfs.txt | 8 ownmask=nnn The permission mask for ADFS 'owner' permissions 10 othmask=nnn The permission mask for ADFS 'other' permissions 16 Mapping of ADFS permissions to Linux permissions 19 ADFS permissions consist of the following: 36 Possible owner mode permissions -> -rwx------ 42 Possible other mode permissions -> ----rwxrwx 45 not a UnixExec filetype, then the permissions will be: 60 desire the permissions should be under Linux.
|
| D | isofs.txt | 26 mode=xxx Sets the permissions on files to xxx unless Rock Ridge 27 extensions set the permissions otherwise 28 dmode=xxx Sets the permissions on directories to xxx unless Rock Ridge 29 extensions set the permissions otherwise 30 overriderockperm Set permissions on files and directories according to
|
| /kernel/linux/linux-5.10/Documentation/filesystems/ |
| D | adfs.rst | 39 ownmask=nnn The permission mask for ADFS 'owner' permissions 41 othmask=nnn The permission mask for ADFS 'other' permissions 48 Mapping of ADFS permissions to Linux permissions 51 ADFS permissions consist of the following: 68 Possible owner mode permissions -> -rwx------ 74 Possible other mode permissions -> ----rwxrwx 77 not a UnixExec filetype, then the permissions will be:: 93 desire the permissions should be under Linux.
|
| D | isofs.rst | 39 mode=xxx Sets the permissions on files to xxx unless Rock Ridge 40 extensions set the permissions otherwise 41 dmode=xxx Sets the permissions on directories to xxx unless Rock Ridge 42 extensions set the permissions otherwise 43 overriderockperm Set permissions on files and directories according to
|
| /kernel/linux/linux-4.19/security/keys/ |
| D | permission.c | 20 * @perm: The permissions to check for. 28 * permissions bits or the LSM check. 39 /* use the second 8-bits of permissions for keys the caller owns */ in key_task_permission() 45 /* use the third 8-bits of permissions for keys the caller has a group in key_task_permission() 65 /* use the top 8-bits of permissions for keys the caller possesses in key_task_permission() 66 * - possessor permissions are additive with other permissions in key_task_permission()
|
| /kernel/linux/linux-5.10/security/selinux/ss/ |
| D | avtab.h | 38 /* extended permissions */ 51 * For operations that require more than the 32 permissions provided by the avc 52 * extended permissions may be used to provide 256 bits of permissions. 63 * specifies which permissions are included. 66 /* 256 bits of permissions */
|
| D | constraint.h | 4 * order for one or more permissions to be granted. 58 u32 permissions; /* constrained permissions */ member 59 struct constraint_expr *expr; /* constraint on permissions */
|
| /kernel/linux/linux-5.10/security/keys/ |
| D | permission.c | 24 * permissions bits or the LSM check. 53 /* use the second 8-bits of permissions for keys the caller owns */ in key_task_permission() 59 /* use the third 8-bits of permissions for keys the caller has a group in key_task_permission() 79 /* use the top 8-bits of permissions for keys the caller possesses in key_task_permission() 80 * - possessor permissions are additive with other permissions in key_task_permission()
|
| /kernel/linux/linux-4.19/security/selinux/ss/ |
| D | avtab.h | 41 /* extended permissions */ 54 * For operations that require more than the 32 permissions provided by the avc 55 * extended permissions may be used to provide 256 bits of permissions. 66 * specifies which permissions are included. 69 /* 256 bits of permissions */
|
| D | constraint.h | 4 * order for one or more permissions to be granted. 58 u32 permissions; /* constrained permissions */ member 59 struct constraint_expr *expr; /* constraint on permissions */
|
| /kernel/linux/linux-5.10/include/linux/ |
| D | lsm_hooks.h | 41 * new program. This hook may also optionally check permissions 54 * hook may also optionally check permissions (e.g. for transitions 152 * Mount this @sb if allowed by permissions. 283 * Check permissions to create a new directory in the existing directory 291 * Check permissions to create a new directory in the existing directory 311 * Check permissions when creating a special file (or a socket or a fifo 321 * Check permissions when creating a file. Note that this hook is called 361 * Check permissions before setting a watch on events as defined by @mask, 491 * Check file permissions before accessing an open file. This hook is 494 * operations, e.g. to revalidate permissions on use to support privilege [all …]
|
| /kernel/linux/linux-5.10/tools/testing/selftests/powerpc/mm/ |
| D | pkey_exec_prot.c | 59 /* Restore permissions in order to continue */ in segv_handler() 63 sigsafe_err("failed to set access permissions\n"); in segv_handler() 82 * permissions. in segv_handler() 85 sigsafe_err("failed to set execute permissions\n"); in segv_handler() 180 printf("read from %p, pkey permissions are %s\n", fault_addr, in test() 197 printf("write to %p, pkey permissions are %s\n", fault_addr, in test() 218 printf("read from %p, pkey permissions are %s\n", fault_addr, in test() 235 printf("write to %p, pkey permissions are %s\n", fault_addr, in test() 271 printf("execute at %p, pkey permissions are %s\n", fault_addr, in test()
|
| /kernel/linux/linux-5.10/arch/arm64/include/asm/ |
| D | kvm_pgtable.h | 33 * enum kvm_pgtable_prot - Page-table permissions and attributes. 109 * @prot: Permissions and attributes for the mapping. 149 * @prot: Permissions and attributes for the mapping. 200 * calling this function to ensure that the updated permissions are visible 232 * calling this function to ensure that the updated permissions are visible 240 * kvm_pgtable_stage2_relax_perms() - Relax the permissions enforced by a 244 * @prot: Additional permissions to grant for the mapping. 249 * relax the permissions in that entry according to the read, write and 250 * execute permissions specified by @prot. No permissions are removed, and
|
| /kernel/linux/linux-5.10/security/apparmor/ |
| D | file.c | 78 * @perms: the permissions computed for the request (NOT NULL) 80 * @request: permissions requested 121 /* only report permissions that were denied */ in aa_audit_file() 218 * splits the permissions from the dfa. This mapping can be in aa_compute_fperms() 251 * @perms: Returns - the permissions found when matching @name 303 * aa_path_perm - do permissions check & audit for @path 306 * @path: path to check permissions of (NOT NULL) 308 * @request: requested permissions 341 * test target x permissions are equal OR a subset of link x permissions 343 * a subset of permissions that the target has. [all …]
|
| /kernel/linux/linux-4.19/security/apparmor/ |
| D | file.c | 93 * @perms: the permissions computed for the request (NOT NULL) 95 * @request: permissions requested 136 /* only report permissions that were denied */ in aa_audit_file() 233 * splits the permissions from the dfa. This mapping can be in aa_compute_fperms() 266 * @perms: Returns - the permissions found when matching @name 318 * aa_path_perm - do permissions check & audit for @path 321 * @path: path to check permissions of (NOT NULL) 323 * @request: requested permissions 354 * test target x permissions are equal OR a subset of link x permissions 356 * a subset of permissions that the target has. [all …]
|
| /kernel/linux/linux-5.10/security/selinux/ |
| D | avc.c | 555 * (@ssid, @tsid), interpreting the permissions 604 * @xp_node: resulting extended permissions 850 * then we must not add permissions to a cache entry in avc_update_node() 853 * will find the permissions already granted in the cache entry in avc_update_node() 969 * avc_ss_reset - Flush the cache and revalidate migrated permissions. 1034 * The avc extended permissions logic adds an additional 256 bits of 1035 * permissions to an avc node when extended permissions for that node are 1036 * specified in the avtab. If the additional 256 permissions is not adequate, 1069 /* if extended permissions are not defined, only consider av_decision */ in avc_has_extended_perms() 1118 * avc_has_perm_noaudit - Check permissions but perform no auditing. [all …]
|
| /kernel/linux/linux-4.19/security/selinux/ |
| D | avc.c | 623 * (@ssid, @tsid), interpreting the permissions 672 * @xp_node: resulting extended permissions 847 * then we must not add permissions to a cache entry in avc_update_node() 850 * will find the permissions already granted in the cache entry in avc_update_node() 966 * avc_ss_reset - Flush the cache and revalidate migrated permissions. 1031 * The avc extended permissions logic adds an additional 256 bits of 1032 * permissions to an avc node when extended permissions for that node are 1033 * specified in the avtab. If the additional 256 permissions is not adequate, 1065 /* if extended permissions are not defined, only consider av_decision */ in avc_has_extended_perms() 1114 * avc_has_perm_noaudit - Check permissions but perform no auditing. [all …]
|
| /kernel/linux/linux-4.19/security/selinux/include/ |
| D | avc.h | 79 * actual permissions that were denied. As an example lets in avc_audit_required() 106 * avc_audit - Audit the granting or denial of permissions. 110 * @requested: requested permissions 116 * Audit the granting or denial of permissions in accordance 146 #define AVC_EXTENDED_PERMS 2 /* update extended permissions */
|
| /kernel/linux/linux-5.10/security/selinux/include/ |
| D | avc.h | 79 * actual permissions that were denied. As an example lets in avc_audit_required() 106 * avc_audit - Audit the granting or denial of permissions. 110 * @requested: requested permissions 116 * Audit the granting or denial of permissions in accordance 146 #define AVC_EXTENDED_PERMS 2 /* update extended permissions */
|
| /kernel/liteos_m/arch/risc-v/nuclei/gcc/nmsis/Core/Include/ |
| D | nmsis_gcc.h | 15 * See the License for the specific language governing permissions and 210 /** \brief Defines 'read only' permissions */ 216 /** \brief Defines 'write only' permissions */ 218 /** \brief Defines 'read / write' permissions */ 222 /** \brief Defines 'read only' structure member permissions */ 224 /** \brief Defines 'write only' structure member permissions */ 226 /** \brief Defines 'read/write' structure member permissions */
|
| /kernel/linux/linux-4.19/ipc/ |
| D | util.c | 239 * Add an entry 'new' to the ipc ids idr. The permissions object is 321 * ipc_check_perms - check security and permissions for an ipc object 480 * ipcperms - check ipc permissions 485 * Check user, group, other permissions for access 517 * kernel_to_ipc64_perm - convert kernel ipc permissions to user 518 * @in: kernel permissions 519 * @out: new style ipc permissions 521 * Turn the kernel object @in into a set of permissions descriptions 536 * ipc64_perm_to_ipc_perm - convert new ipc permissions to old 537 * @in: new style ipc permissions [all …]
|
| /kernel/linux/linux-4.19/fs/coda/ |
| D | coda_fs_i.h | 28 unsigned int c_cached_epoch; /* epoch for cached permissions */ 29 kuid_t c_uid; /* fsuid for cached permissions */ 30 unsigned int c_cached_perm; /* cached access permissions */
|
| /kernel/linux/linux-5.10/fs/coda/ |
| D | coda_fs_i.h | 28 unsigned int c_cached_epoch; /* epoch for cached permissions */ 29 kuid_t c_uid; /* fsuid for cached permissions */ 30 unsigned int c_cached_perm; /* cached access permissions */
|
| /kernel/linux/linux-5.10/arch/x86/kernel/ |
| D | ioport.c | 63 * This changes the io permissions bitmap in the current task. 84 /* No point to allocate a bitmap just to clear permissions */ in ksys_ioperm() 111 * permissions are dropped has the pointer set up. in ksys_ioperm() 135 /* All permissions dropped? */ in ksys_ioperm() 168 * Setting IOPL to level 0-2 is disabling I/O permissions. Level 3
|
| /kernel/linux/linux-5.10/ipc/ |
| D | util.c | 268 * Add an entry 'new' to the ipc ids idr. The permissions object is 350 * ipc_check_perms - check security and permissions for an ipc object 509 * ipcperms - check ipc permissions 514 * Check user, group, other permissions for access 546 * kernel_to_ipc64_perm - convert kernel ipc permissions to user 547 * @in: kernel permissions 548 * @out: new style ipc permissions 550 * Turn the kernel object @in into a set of permissions descriptions 565 * ipc64_perm_to_ipc_perm - convert new ipc permissions to old 566 * @in: new style ipc permissions [all …]
|