| /kernel/linux/linux-5.10/Documentation/filesystems/ |
| D | adfs.rst | 39 ownmask=nnn The permission mask for ADFS 'owner' permissions 41 othmask=nnn The permission mask for ADFS 'other' permissions 48 Mapping of ADFS permissions to Linux permissions 51 ADFS permissions consist of the following: 68 Possible owner mode permissions -> -rwx------ 74 Possible other mode permissions -> ----rwxrwx 77 not a UnixExec filetype, then the permissions will be:: 93 desire the permissions should be under Linux.
|
| D | isofs.rst | 39 mode=xxx Sets the permissions on files to xxx unless Rock Ridge 40 extensions set the permissions otherwise 41 dmode=xxx Sets the permissions on directories to xxx unless Rock Ridge 42 extensions set the permissions otherwise 43 overriderockperm Set permissions on files and directories according to
|
| /kernel/linux/linux-5.10/security/selinux/ss/ |
| D | avtab.h | 38 /* extended permissions */ 51 * For operations that require more than the 32 permissions provided by the avc 52 * extended permissions may be used to provide 256 bits of permissions. 63 * specifies which permissions are included. 66 /* 256 bits of permissions */
|
| D | constraint.h | 4 * order for one or more permissions to be granted. 58 u32 permissions; /* constrained permissions */ member 59 struct constraint_expr *expr; /* constraint on permissions */
|
| D | services.h | 15 unsigned int num_perms; /* number of permissions in class */ 16 u32 perms[sizeof(u32) * 8]; /* policy values for permissions */
|
| /kernel/linux/linux-5.10/security/keys/ |
| D | permission.c | 24 * permissions bits or the LSM check. 53 /* use the second 8-bits of permissions for keys the caller owns */ in key_task_permission() 59 /* use the third 8-bits of permissions for keys the caller has a group in key_task_permission() 79 /* use the top 8-bits of permissions for keys the caller possesses in key_task_permission() 80 * - possessor permissions are additive with other permissions in key_task_permission()
|
| /kernel/linux/linux-5.10/include/linux/ |
| D | lsm_hooks.h | 41 * new program. This hook may also optionally check permissions 54 * hook may also optionally check permissions (e.g. for transitions 152 * Mount this @sb if allowed by permissions. 283 * Check permissions to create a new directory in the existing directory 291 * Check permissions to create a new directory in the existing directory 311 * Check permissions when creating a special file (or a socket or a fifo 321 * Check permissions when creating a file. Note that this hook is called 361 * Check permissions before setting a watch on events as defined by @mask, 491 * Check file permissions before accessing an open file. This hook is 494 * operations, e.g. to revalidate permissions on use to support privilege [all …]
|
| /kernel/linux/linux-5.10/tools/testing/selftests/powerpc/mm/ |
| D | pkey_exec_prot.c | 59 /* Restore permissions in order to continue */ in segv_handler() 63 sigsafe_err("failed to set access permissions\n"); in segv_handler() 82 * permissions. in segv_handler() 85 sigsafe_err("failed to set execute permissions\n"); in segv_handler() 180 printf("read from %p, pkey permissions are %s\n", fault_addr, in test() 197 printf("write to %p, pkey permissions are %s\n", fault_addr, in test() 218 printf("read from %p, pkey permissions are %s\n", fault_addr, in test() 235 printf("write to %p, pkey permissions are %s\n", fault_addr, in test() 271 printf("execute at %p, pkey permissions are %s\n", fault_addr, in test()
|
| /kernel/linux/linux-5.10/arch/arm64/include/asm/ |
| D | kvm_pgtable.h | 33 * enum kvm_pgtable_prot - Page-table permissions and attributes. 109 * @prot: Permissions and attributes for the mapping. 149 * @prot: Permissions and attributes for the mapping. 200 * calling this function to ensure that the updated permissions are visible 232 * calling this function to ensure that the updated permissions are visible 240 * kvm_pgtable_stage2_relax_perms() - Relax the permissions enforced by a 244 * @prot: Additional permissions to grant for the mapping. 249 * relax the permissions in that entry according to the read, write and 250 * execute permissions specified by @prot. No permissions are removed, and
|
| /kernel/linux/linux-5.10/security/apparmor/ |
| D | file.c | 78 * @perms: the permissions computed for the request (NOT NULL) 80 * @request: permissions requested 121 /* only report permissions that were denied */ in aa_audit_file() 218 * splits the permissions from the dfa. This mapping can be in aa_compute_fperms() 251 * @perms: Returns - the permissions found when matching @name 303 * aa_path_perm - do permissions check & audit for @path 306 * @path: path to check permissions of (NOT NULL) 308 * @request: requested permissions 341 * test target x permissions are equal OR a subset of link x permissions 343 * a subset of permissions that the target has. [all …]
|
| /kernel/linux/linux-5.10/security/selinux/ |
| D | avc.c | 555 * (@ssid, @tsid), interpreting the permissions 604 * @xp_node: resulting extended permissions 850 * then we must not add permissions to a cache entry in avc_update_node() 853 * will find the permissions already granted in the cache entry in avc_update_node() 969 * avc_ss_reset - Flush the cache and revalidate migrated permissions. 1034 * The avc extended permissions logic adds an additional 256 bits of 1035 * permissions to an avc node when extended permissions for that node are 1036 * specified in the avtab. If the additional 256 permissions is not adequate, 1069 /* if extended permissions are not defined, only consider av_decision */ in avc_has_extended_perms() 1118 * avc_has_perm_noaudit - Check permissions but perform no auditing. [all …]
|
| /kernel/linux/linux-5.10/security/selinux/include/ |
| D | avc.h | 79 * actual permissions that were denied. As an example lets in avc_audit_required() 106 * avc_audit - Audit the granting or denial of permissions. 110 * @requested: requested permissions 116 * Audit the granting or denial of permissions in accordance 146 #define AVC_EXTENDED_PERMS 2 /* update extended permissions */
|
| /kernel/liteos_m/arch/risc-v/nuclei/gcc/nmsis/Core/Include/ |
| D | nmsis_gcc.h | 15 * See the License for the specific language governing permissions and 210 /** \brief Defines 'read only' permissions */ 216 /** \brief Defines 'write only' permissions */ 218 /** \brief Defines 'read / write' permissions */ 222 /** \brief Defines 'read only' structure member permissions */ 224 /** \brief Defines 'write only' structure member permissions */ 226 /** \brief Defines 'read/write' structure member permissions */
|
| /kernel/linux/linux-5.10/fs/coda/ |
| D | coda_fs_i.h | 28 unsigned int c_cached_epoch; /* epoch for cached permissions */ 29 kuid_t c_uid; /* fsuid for cached permissions */ 30 unsigned int c_cached_perm; /* cached access permissions */
|
| /kernel/linux/linux-5.10/arch/x86/kernel/ |
| D | ioport.c | 63 * This changes the io permissions bitmap in the current task. 84 /* No point to allocate a bitmap just to clear permissions */ in ksys_ioperm() 111 * permissions are dropped has the pointer set up. in ksys_ioperm() 135 /* All permissions dropped? */ in ksys_ioperm() 168 * Setting IOPL to level 0-2 is disabling I/O permissions. Level 3
|
| /kernel/linux/linux-5.10/ipc/ |
| D | util.c | 268 * Add an entry 'new' to the ipc ids idr. The permissions object is 350 * ipc_check_perms - check security and permissions for an ipc object 509 * ipcperms - check ipc permissions 514 * Check user, group, other permissions for access 546 * kernel_to_ipc64_perm - convert kernel ipc permissions to user 547 * @in: kernel permissions 548 * @out: new style ipc permissions 550 * Turn the kernel object @in into a set of permissions descriptions 565 * ipc64_perm_to_ipc_perm - convert new ipc permissions to old 566 * @in: new style ipc permissions [all …]
|
| /kernel/linux/linux-5.10/fs/sharefs/ |
| D | Kconfig | 5 between applications. Sharefs manages permissions through different 6 permissions for reading and writing directories.
|
| /kernel/linux/linux-5.10/drivers/staging/gasket/ |
| D | gasket_core.h | 179 /* Describe the offset, size, and permissions for a device bar. */ 191 /* The permissions for this bar. (Should be VM_WRITE/VM_READ/VM_EXEC, 195 ulong permissions; member 208 /* Describes the offset, size, and permissions for a coherent buffer. */ 213 /* The permissions for this bar. (Should be VM_WRITE/VM_READ/VM_EXEC, 217 ulong permissions; member 235 /* Description of Gasket-specific permissions in the mmap field. */ 309 /* Type of the ioctl permissions check callback. See below. */ 455 * ioctl_permissions_cb: Check permissions for generic ioctls. 563 * Get the ioctl permissions callback.
|
| /kernel/linux/linux-5.10/Documentation/usb/ |
| D | text_files.rst | 13 USB devfs drop permissions source 16 .. literalinclude:: usbdevfs-drop-permissions.c
|
| /kernel/linux/linux-5.10/fs/notify/fanotify/ |
| D | Kconfig | 16 bool "fanotify permissions checking" 21 Say Y here is you want fanotify listeners to be able to make permissions
|
| /kernel/linux/linux-5.10/include/rdma/ |
| D | ib_umem_odp.h | 22 * The lower two bits designate access permissions. 71 * The lower 2 bits of the DMA address signal the R/W permissions for 72 * the entry. To upgrade the permissions, provide the appropriate
|
| /kernel/linux/linux-5.10/fs/hfsplus/ |
| D | inode.c | 504 hfsplus_get_perms(inode, &folder->permissions, 1); in hfsplus_cat_read_inode() 528 hfsplus_get_perms(inode, &file->permissions, 0); in hfsplus_cat_read_inode() 531 if (file->permissions.dev) in hfsplus_cat_read_inode() 533 be32_to_cpu(file->permissions.dev)); in hfsplus_cat_read_inode() 543 be32_to_cpu(file->permissions.dev)); in hfsplus_cat_read_inode() 584 hfsplus_cat_set_perms(inode, &folder->permissions); in hfsplus_cat_write_inode() 610 hfsplus_cat_set_perms(inode, &file->permissions); in hfsplus_cat_write_inode() 612 (file->permissions.rootflags | in hfsplus_cat_write_inode() 613 file->permissions.userflags)) in hfsplus_cat_write_inode()
|
| /kernel/linux/linux-5.10/Documentation/core-api/ |
| D | protection-keys.rst | 30 permissions are enforced on data access only and have no effect on 45 directly in order to change access permissions to memory covered 100 the plain mprotect() permissions are violated.
|
| /kernel/linux/linux-5.10/arch/mips/include/uapi/asm/ |
| D | sembuf.h | 18 struct ipc64_perm sem_perm; /* permissions .. see ipc.h */ 27 struct ipc64_perm sem_perm; /* permissions .. see ipc.h */
|
| /kernel/linux/linux-5.10/security/apparmor/include/ |
| D | file.h | 141 * map old dfa inline permissions to new format 165 * struct aa_file_rules - components used for file rule permissions 211 * aa_map_file_perms - map file flags to AppArmor permissions 212 * @file: open file to map flags to AppArmor permissions
|