Home
last modified time | relevance | path

Searched full:permissions (Results 1 – 25 of 928) sorted by relevance

12345678910>>...38

/kernel/linux/linux-5.10/Documentation/filesystems/
Dadfs.rst39 ownmask=nnn The permission mask for ADFS 'owner' permissions
41 othmask=nnn The permission mask for ADFS 'other' permissions
48 Mapping of ADFS permissions to Linux permissions
51 ADFS permissions consist of the following:
68 Possible owner mode permissions -> -rwx------
74 Possible other mode permissions -> ----rwxrwx
77 not a UnixExec filetype, then the permissions will be::
93 desire the permissions should be under Linux.
Disofs.rst39 mode=xxx Sets the permissions on files to xxx unless Rock Ridge
40 extensions set the permissions otherwise
41 dmode=xxx Sets the permissions on directories to xxx unless Rock Ridge
42 extensions set the permissions otherwise
43 overriderockperm Set permissions on files and directories according to
/kernel/linux/linux-5.10/security/selinux/ss/
Davtab.h38 /* extended permissions */
51 * For operations that require more than the 32 permissions provided by the avc
52 * extended permissions may be used to provide 256 bits of permissions.
63 * specifies which permissions are included.
66 /* 256 bits of permissions */
Dconstraint.h4 * order for one or more permissions to be granted.
58 u32 permissions; /* constrained permissions */ member
59 struct constraint_expr *expr; /* constraint on permissions */
Dservices.h15 unsigned int num_perms; /* number of permissions in class */
16 u32 perms[sizeof(u32) * 8]; /* policy values for permissions */
/kernel/linux/linux-5.10/security/keys/
Dpermission.c24 * permissions bits or the LSM check.
53 /* use the second 8-bits of permissions for keys the caller owns */ in key_task_permission()
59 /* use the third 8-bits of permissions for keys the caller has a group in key_task_permission()
79 /* use the top 8-bits of permissions for keys the caller possesses in key_task_permission()
80 * - possessor permissions are additive with other permissions in key_task_permission()
/kernel/linux/linux-5.10/include/linux/
Dlsm_hooks.h41 * new program. This hook may also optionally check permissions
54 * hook may also optionally check permissions (e.g. for transitions
152 * Mount this @sb if allowed by permissions.
283 * Check permissions to create a new directory in the existing directory
291 * Check permissions to create a new directory in the existing directory
311 * Check permissions when creating a special file (or a socket or a fifo
321 * Check permissions when creating a file. Note that this hook is called
361 * Check permissions before setting a watch on events as defined by @mask,
491 * Check file permissions before accessing an open file. This hook is
494 * operations, e.g. to revalidate permissions on use to support privilege
[all …]
/kernel/linux/linux-5.10/tools/testing/selftests/powerpc/mm/
Dpkey_exec_prot.c59 /* Restore permissions in order to continue */ in segv_handler()
63 sigsafe_err("failed to set access permissions\n"); in segv_handler()
82 * permissions. in segv_handler()
85 sigsafe_err("failed to set execute permissions\n"); in segv_handler()
180 printf("read from %p, pkey permissions are %s\n", fault_addr, in test()
197 printf("write to %p, pkey permissions are %s\n", fault_addr, in test()
218 printf("read from %p, pkey permissions are %s\n", fault_addr, in test()
235 printf("write to %p, pkey permissions are %s\n", fault_addr, in test()
271 printf("execute at %p, pkey permissions are %s\n", fault_addr, in test()
/kernel/linux/linux-5.10/arch/arm64/include/asm/
Dkvm_pgtable.h33 * enum kvm_pgtable_prot - Page-table permissions and attributes.
109 * @prot: Permissions and attributes for the mapping.
149 * @prot: Permissions and attributes for the mapping.
200 * calling this function to ensure that the updated permissions are visible
232 * calling this function to ensure that the updated permissions are visible
240 * kvm_pgtable_stage2_relax_perms() - Relax the permissions enforced by a
244 * @prot: Additional permissions to grant for the mapping.
249 * relax the permissions in that entry according to the read, write and
250 * execute permissions specified by @prot. No permissions are removed, and
/kernel/linux/linux-5.10/security/apparmor/
Dfile.c78 * @perms: the permissions computed for the request (NOT NULL)
80 * @request: permissions requested
121 /* only report permissions that were denied */ in aa_audit_file()
218 * splits the permissions from the dfa. This mapping can be in aa_compute_fperms()
251 * @perms: Returns - the permissions found when matching @name
303 * aa_path_perm - do permissions check & audit for @path
306 * @path: path to check permissions of (NOT NULL)
308 * @request: requested permissions
341 * test target x permissions are equal OR a subset of link x permissions
343 * a subset of permissions that the target has.
[all …]
/kernel/linux/linux-5.10/security/selinux/
Davc.c555 * (@ssid, @tsid), interpreting the permissions
604 * @xp_node: resulting extended permissions
850 * then we must not add permissions to a cache entry in avc_update_node()
853 * will find the permissions already granted in the cache entry in avc_update_node()
969 * avc_ss_reset - Flush the cache and revalidate migrated permissions.
1034 * The avc extended permissions logic adds an additional 256 bits of
1035 * permissions to an avc node when extended permissions for that node are
1036 * specified in the avtab. If the additional 256 permissions is not adequate,
1069 /* if extended permissions are not defined, only consider av_decision */ in avc_has_extended_perms()
1118 * avc_has_perm_noaudit - Check permissions but perform no auditing.
[all …]
/kernel/linux/linux-5.10/security/selinux/include/
Davc.h79 * actual permissions that were denied. As an example lets in avc_audit_required()
106 * avc_audit - Audit the granting or denial of permissions.
110 * @requested: requested permissions
116 * Audit the granting or denial of permissions in accordance
146 #define AVC_EXTENDED_PERMS 2 /* update extended permissions */
/kernel/liteos_m/arch/risc-v/nuclei/gcc/nmsis/Core/Include/
Dnmsis_gcc.h15 * See the License for the specific language governing permissions and
210 /** \brief Defines 'read only' permissions */
216 /** \brief Defines 'write only' permissions */
218 /** \brief Defines 'read / write' permissions */
222 /** \brief Defines 'read only' structure member permissions */
224 /** \brief Defines 'write only' structure member permissions */
226 /** \brief Defines 'read/write' structure member permissions */
/kernel/linux/linux-5.10/fs/coda/
Dcoda_fs_i.h28 unsigned int c_cached_epoch; /* epoch for cached permissions */
29 kuid_t c_uid; /* fsuid for cached permissions */
30 unsigned int c_cached_perm; /* cached access permissions */
/kernel/linux/linux-5.10/arch/x86/kernel/
Dioport.c63 * This changes the io permissions bitmap in the current task.
84 /* No point to allocate a bitmap just to clear permissions */ in ksys_ioperm()
111 * permissions are dropped has the pointer set up. in ksys_ioperm()
135 /* All permissions dropped? */ in ksys_ioperm()
168 * Setting IOPL to level 0-2 is disabling I/O permissions. Level 3
/kernel/linux/linux-5.10/ipc/
Dutil.c268 * Add an entry 'new' to the ipc ids idr. The permissions object is
350 * ipc_check_perms - check security and permissions for an ipc object
509 * ipcperms - check ipc permissions
514 * Check user, group, other permissions for access
546 * kernel_to_ipc64_perm - convert kernel ipc permissions to user
547 * @in: kernel permissions
548 * @out: new style ipc permissions
550 * Turn the kernel object @in into a set of permissions descriptions
565 * ipc64_perm_to_ipc_perm - convert new ipc permissions to old
566 * @in: new style ipc permissions
[all …]
/kernel/linux/linux-5.10/fs/sharefs/
DKconfig5 between applications. Sharefs manages permissions through different
6 permissions for reading and writing directories.
/kernel/linux/linux-5.10/drivers/staging/gasket/
Dgasket_core.h179 /* Describe the offset, size, and permissions for a device bar. */
191 /* The permissions for this bar. (Should be VM_WRITE/VM_READ/VM_EXEC,
195 ulong permissions; member
208 /* Describes the offset, size, and permissions for a coherent buffer. */
213 /* The permissions for this bar. (Should be VM_WRITE/VM_READ/VM_EXEC,
217 ulong permissions; member
235 /* Description of Gasket-specific permissions in the mmap field. */
309 /* Type of the ioctl permissions check callback. See below. */
455 * ioctl_permissions_cb: Check permissions for generic ioctls.
563 * Get the ioctl permissions callback.
/kernel/linux/linux-5.10/Documentation/usb/
Dtext_files.rst13 USB devfs drop permissions source
16 .. literalinclude:: usbdevfs-drop-permissions.c
/kernel/linux/linux-5.10/fs/notify/fanotify/
DKconfig16 bool "fanotify permissions checking"
21 Say Y here is you want fanotify listeners to be able to make permissions
/kernel/linux/linux-5.10/include/rdma/
Dib_umem_odp.h22 * The lower two bits designate access permissions.
71 * The lower 2 bits of the DMA address signal the R/W permissions for
72 * the entry. To upgrade the permissions, provide the appropriate
/kernel/linux/linux-5.10/fs/hfsplus/
Dinode.c504 hfsplus_get_perms(inode, &folder->permissions, 1); in hfsplus_cat_read_inode()
528 hfsplus_get_perms(inode, &file->permissions, 0); in hfsplus_cat_read_inode()
531 if (file->permissions.dev) in hfsplus_cat_read_inode()
533 be32_to_cpu(file->permissions.dev)); in hfsplus_cat_read_inode()
543 be32_to_cpu(file->permissions.dev)); in hfsplus_cat_read_inode()
584 hfsplus_cat_set_perms(inode, &folder->permissions); in hfsplus_cat_write_inode()
610 hfsplus_cat_set_perms(inode, &file->permissions); in hfsplus_cat_write_inode()
612 (file->permissions.rootflags | in hfsplus_cat_write_inode()
613 file->permissions.userflags)) in hfsplus_cat_write_inode()
/kernel/linux/linux-5.10/Documentation/core-api/
Dprotection-keys.rst30 permissions are enforced on data access only and have no effect on
45 directly in order to change access permissions to memory covered
100 the plain mprotect() permissions are violated.
/kernel/linux/linux-5.10/arch/mips/include/uapi/asm/
Dsembuf.h18 struct ipc64_perm sem_perm; /* permissions .. see ipc.h */
27 struct ipc64_perm sem_perm; /* permissions .. see ipc.h */
/kernel/linux/linux-5.10/security/apparmor/include/
Dfile.h141 * map old dfa inline permissions to new format
165 * struct aa_file_rules - components used for file rule permissions
211 * aa_map_file_perms - map file flags to AppArmor permissions
212 * @file: open file to map flags to AppArmor permissions

12345678910>>...38