Home
last modified time | relevance | path

Searched full:permission (Results 1 – 25 of 87) sorted by relevance

1234

/Documentation/arch/x86/
Dxstate.rst49 has permission in userspace storage of type uint64_t. The second argument
56 ARCH_REQ_XCOMP_PERM allows to request permission for a dynamically enabled
63 When requesting permission for a feature, the kernel checks the
72 Permission, when granted, is valid per process. Permissions are inherited
77 permission to use the feature. If the process has no permission then the
78 kernel sends SIGILL to the application. If the process has permission then
123 explicitly ask permission to use it::
150 The permission for the guest state component needs to be managed separately
152 are extended to control the guest permission:
167 same semantics for the guest permission. While providing a similar
[all …]
/Documentation/filesystems/
Dadfs.rst39 ownmask=nnn The permission mask for ADFS 'owner' permissions
41 othmask=nnn The permission mask for ADFS 'other' permissions
58 (In older versions, an 'execute' permission did exist, but this
59 does not hold the same meaning as the Linux 'execute' permission
92 You can therefore tailor the permission translation to whatever you
Daffs.rst57 permission if the corresponding r bit is set.
133 - r permission will allow R for user, group and others.
135 - w permission will allow W for user, group and others.
137 - x permission of the user will allow E for plain files.
Dvfat.rst28 The permission mask (for files and directories, see *umask(1)*).
32 The permission mask for the directory.
36 The permission mask for files.
40 This option controls the permission check of mtime/atime.
160 If set, the execute permission bits of the file will be
Dpath-lookup.txt247 | name: "/" | inode's permission, and then look up the next
345 routine requiring rcu drop, permission for permission check requiring drop,
348 rcu-lookups restart nodentry link revalidate permission
/Documentation/security/keys/
Dcore.rst44 to it, subject to permission checking.
223 only recurse into nested keyrings that have search permission set.
228 keyring to a key, a process must have Write permission on the keyring and
229 Link permission on the key.
246 as well; SELinux is simply invoked after all basic permission checks have been
253 creation request. Tasks must be granted explicit permission to assign a
254 particular context to newly-created keys, using the "create" permission in the
284 The only keys included in the list are those that grant View permission to
389 type. The process must also have permission to write to the key to be able
396 does not have permission to write to the keyring.
[all …]
Drequest-key.rst156 if this denies permission, it doesn't search further.
166 grants permission, it recurses, executing steps (2) and (3) on that
169 The process stops immediately a valid key is found with permission granted to
207 the basal keyring does not grant Search permission.
/Documentation/userspace-api/media/
Dgen-errors.rst72 - Permission denied. Can be returned if the device needs write
73 permission, or some special capabilities is needed (e. g. root)
Dfdl-appendix.rst206 the original publisher of that version gives permission.
231 giving the public permission to use the
262 original publisher of the version it refers to gives permission.
309 replace the old one, on explicit permission from the previous publisher
313 do not by this License give permission to use their names for publicity
395 special permission from their copyright holders, but you may include
451 Permission is granted to copy, distribute and/or modify this
Dindex.rst46 Permission is granted to copy, distribute and/or modify this document
/Documentation/security/
DSCTP.rst38 service as shown in the permission check tables below.
234 | BIND Permission Checks |
243 | CONNECT Permission Checks |
292 SELinux SCTP support adds the ``name_connect`` permission for connecting
293 to a specific port type and the ``association`` permission that is explained
308 ``association`` permission be validated. This is validated by checking the
/Documentation/devicetree/bindings/soc/mediatek/
Ddevapc.yaml8 title: MediaTek Device Access Permission Control driver
/Documentation/trace/coresight/
Dcoresight-dummy.rst14 have permission to access or configure, e.g., CoreSight TPDMs on Qualcomm
/Documentation/sphinx/
Dkerneldoc.py5 # Permission is hereby granted, free of charge, to any person obtaining a
12 # The above copyright notice and this permission notice (including the next
/Documentation/userspace-api/gpio/
Derror-codes.rst55 - Permission denied. Typically returned in response to an attempt
/Documentation/devicetree/bindings/arm/
Darm,coresight-dummy-source.yaml18 devices kernel don't have permission to access or configure. For some SOCs,
Darm,coresight-dummy-sink.yaml18 kernel don't have permission to access or configure, e.g., CoreSight EUD on
/Documentation/userspace-api/media/v4l/
Dfunc-open.rst62 The caller has no permission to access the device.
/Documentation/scsi/
DLICENSE.FlashPoint48 permission.
/Documentation/admin-guide/
Dmono.rst69 If this fails with a permission denied error, check
/Documentation/mm/
Dhmm.rst219 permission, it sets::
225 in the range with at least read permission.
228 which it wants to have write permission. Now driver set::
236 write permission i.e., if the CPU pte does not have write permission set then HMM
/Documentation/process/
Dcode-of-conduct.rst36 address, without explicit permission
/Documentation/usb/
Dusbdevfs-drop-permissions.c87 "[3] Narrow interface permission mask\n" in main()
/Documentation/userspace-api/media/dvb/
Dfrontend_f_open.rst91 - The caller has no permission to access the device.
/Documentation/ABI/stable/
Dfirewire-cdev49 userland implement different access permission models, some

1234