/linux-6.6.21/Documentation/filesystems/ |
D | adfs.rst | 39 ownmask=nnn The permission mask for ADFS 'owner' permissions 41 othmask=nnn The permission mask for ADFS 'other' permissions 48 Mapping of ADFS permissions to Linux permissions 51 ADFS permissions consist of the following: 68 Possible owner mode permissions -> -rwx------ 74 Possible other mode permissions -> ----rwxrwx 77 not a UnixExec filetype, then the permissions will be:: 93 desire the permissions should be under Linux.
|
D | isofs.rst | 39 mode=xxx Sets the permissions on files to xxx unless Rock Ridge 40 extensions set the permissions otherwise 41 dmode=xxx Sets the permissions on directories to xxx unless Rock Ridge 42 extensions set the permissions otherwise 43 overriderockperm Set permissions on files and directories according to
|
D | hfsplus.rst | 23 that have uninitialized permissions structures. 28 that have uninitialized permissions structures.
|
D | udf.rst | 29 mode= Set the default file permissions. 30 dmode= Set the default directory permissions.
|
/linux-6.6.21/Documentation/usb/ |
D | text_files.rst | 13 USB devfs drop permissions source 16 .. literalinclude:: usbdevfs-drop-permissions.c
|
/linux-6.6.21/Documentation/ABI/testing/ |
D | procfs-attr-prev | 8 The details of permissions required to read from 12 The other details of permissions required to write to
|
D | procfs-attr-current | 7 The details of permissions required to read from 12 The other details of permissions required to write to
|
D | procfs-attr-exec | 8 The details of permissions required to read from 13 The other details of permissions required to write to
|
/linux-6.6.21/fs/notify/fanotify/ |
D | Kconfig | 16 bool "fanotify permissions checking" 21 Say Y here is you want fanotify listeners to be able to make permissions
|
/linux-6.6.21/fs/hfsplus/ |
D | inode.c | 521 hfsplus_get_perms(inode, &folder->permissions, 1); in hfsplus_cat_read_inode() 549 hfsplus_get_perms(inode, &file->permissions, 0); in hfsplus_cat_read_inode() 552 if (file->permissions.dev) in hfsplus_cat_read_inode() 554 be32_to_cpu(file->permissions.dev)); in hfsplus_cat_read_inode() 564 be32_to_cpu(file->permissions.dev)); in hfsplus_cat_read_inode() 611 hfsplus_cat_set_perms(inode, &folder->permissions); in hfsplus_cat_write_inode() 640 hfsplus_cat_set_perms(inode, &file->permissions); in hfsplus_cat_write_inode() 642 (file->permissions.rootflags | in hfsplus_cat_write_inode() 643 file->permissions.userflags)) in hfsplus_cat_write_inode()
|
D | catalog.c | 124 hfsplus_cat_set_perms(inode, &folder->permissions); in hfsplus_cat_build_record() 143 hfsplus_cat_set_perms(inode, &file->permissions); in hfsplus_cat_build_record() 156 (file->permissions.rootflags | in hfsplus_cat_build_record() 157 file->permissions.userflags)) in hfsplus_cat_build_record() 169 file->permissions.dev = in hfsplus_cat_build_record()
|
D | Kconfig | 16 style features such as file ownership and permissions.
|
D | hfsplus_raw.h | 262 struct hfsplus_perm permissions; member 298 struct hfsplus_perm permissions; member
|
/linux-6.6.21/Documentation/admin-guide/LSM/ |
D | apparmor.rst | 12 permissions. 33 For AppArmor to enforce any restrictions beyond standard Linux DAC permissions
|
/linux-6.6.21/Documentation/core-api/ |
D | protection-keys.rst | 28 theoretically space in the PAE PTEs. These permissions are enforced on data 43 directly in order to change access permissions to memory covered 98 the plain mprotect() permissions are violated.
|
/linux-6.6.21/Documentation/arch/arm64/ |
D | ptdump.rst | 9 kernel page tables to verify permissions and memory types. Examining the 10 page table entries and permissions helps identify potential security 37 access permissions, execution capability, type of mapping such as leaf
|
/linux-6.6.21/security/selinux/ss/ |
D | constraint.h | 58 u32 permissions; /* constrained permissions */ member
|
D | policydb.h | 48 struct symtab permissions; /* common permissions */ member 56 struct symtab permissions; /* class-specific permission symbol table */ member
|
D | policydb.c | 194 hashtab_map(&comdatum->permissions.table, perm_destroy, NULL); in common_destroy() 195 hashtab_destroy(&comdatum->permissions.table); in common_destroy() 223 hashtab_map(&cladatum->permissions.table, perm_destroy, NULL); in cls_destroy() 224 hashtab_destroy(&cladatum->permissions.table); in cls_destroy() 1146 rc = symtab_init(&comdatum->permissions, nel); in common_read() 1149 comdatum->permissions.nprim = le32_to_cpu(buf[2]); in common_read() 1156 rc = perm_read(p, &comdatum->permissions, fp); in common_read() 1219 c->permissions = le32_to_cpu(buf[0]); in read_cons_helper() 1311 rc = symtab_init(&cladatum->permissions, nel); in class_read() 1314 cladatum->permissions.nprim = le32_to_cpu(buf[3]); in class_read() [all …]
|
/linux-6.6.21/tools/perf/Documentation/ |
D | perf-buildid-cache.txt | 33 /proc/kcore which requires root permissions to read. Be aware that 39 permissions for root only. kcore will not be added if there is already a
|
/linux-6.6.21/arch/x86/include/uapi/asm/ |
D | sgx.h | 99 __u64 permissions; member
|
/linux-6.6.21/Documentation/admin-guide/gpio/ |
D | gpio-aggregator.rst | 15 system permissions, on an all-or-nothing basis: either a GPIO controller is 20 using standard UNIX file ownership and permissions. Furthermore, this
|
/linux-6.6.21/Documentation/userspace-api/media/dvb/ |
D | fe-diseqc-send-burst.rst | 36 read/write permissions.
|
/linux-6.6.21/Documentation/ABI/stable/ |
D | procfs-audit_loginuid | 10 permissions are not needed to set it. The accessor must
|
/linux-6.6.21/LICENSES/exceptions/ |
D | GCC-exception-2.0 | 12 In addition to the permissions in the GNU Library General Public License,
|