/linux-6.14.4/Documentation/filesystems/ |
D | adfs.rst | 39 ownmask=nnn The permission mask for ADFS 'owner' permissions 41 othmask=nnn The permission mask for ADFS 'other' permissions 48 Mapping of ADFS permissions to Linux permissions 51 ADFS permissions consist of the following: 68 Possible owner mode permissions -> -rwx------ 74 Possible other mode permissions -> ----rwxrwx 77 not a UnixExec filetype, then the permissions will be:: 93 desire the permissions should be under Linux.
|
D | isofs.rst | 39 mode=xxx Sets the permissions on files to xxx unless Rock Ridge 40 extensions set the permissions otherwise 41 dmode=xxx Sets the permissions on directories to xxx unless Rock Ridge 42 extensions set the permissions otherwise 43 overriderockperm Set permissions on files and directories according to
|
/linux-6.14.4/security/keys/ |
D | permission.c | 24 * permissions bits or the LSM check. 53 /* use the second 8-bits of permissions for keys the caller owns */ in key_task_permission() 59 /* use the third 8-bits of permissions for keys the caller has a group in key_task_permission() 79 /* use the top 8-bits of permissions for keys the caller possesses in key_task_permission() 80 * - possessor permissions are additive with other permissions in key_task_permission()
|
/linux-6.14.4/security/selinux/ss/ |
D | avtab.h | 38 /* extended permissions */ 51 * For operations that require more than the 32 permissions provided by the avc 52 * extended permissions may be used to provide 256 bits of permissions. 64 * specifies which permissions are included. 67 /* 256 bits of permissions */
|
D | constraint.h | 4 * order for one or more permissions to be granted. 59 u32 permissions; /* constrained permissions */ member 60 struct constraint_expr *expr; /* constraint on permissions */
|
/linux-6.14.4/tools/testing/selftests/powerpc/mm/ |
D | pkey_exec_prot.c | 59 /* Restore permissions in order to continue */ in segv_handler() 63 sigsafe_err("failed to set access permissions\n"); in segv_handler() 82 * permissions. in segv_handler() 85 sigsafe_err("failed to set execute permissions\n"); in segv_handler() 180 printf("read from %p, pkey permissions are %s\n", fault_addr, in test() 197 printf("write to %p, pkey permissions are %s\n", fault_addr, in test() 218 printf("read from %p, pkey permissions are %s\n", fault_addr, in test() 235 printf("write to %p, pkey permissions are %s\n", fault_addr, in test() 271 printf("execute at %p, pkey permissions are %s\n", fault_addr, in test()
|
/linux-6.14.4/security/apparmor/ |
D | file.c | 82 * @perms: the permissions computed for the request (NOT NULL) 84 * @request: permissions requested 126 /* only report permissions that were denied */ in aa_audit_file() 200 * @perms: Returns - the permissions found when matching @name 258 * aa_path_perm - do permissions check & audit for @path 262 * @path: path to check permissions of (NOT NULL) 264 * @request: requested permissions 298 * test target x permissions are equal OR a subset of link x permissions 300 * a subset of permissions that the target has. 372 * a subset of the allowed permissions on target. in profile_path_link() [all …]
|
/linux-6.14.4/security/selinux/ |
D | avc.c | 548 * (@ssid, @tsid), interpreting the permissions 595 * @xp_node: resulting extended permissions 817 * @xperm: xperm permissions 951 * avc_ss_reset - Flush the cache and revalidate migrated permissions. 981 * @xp_node: AVC extended permissions node 1013 * The avc extended permissions logic adds an additional 256 bits of 1014 * permissions to an avc node when extended permissions for that node are 1015 * specified in the avtab. If the additional 256 permissions is not adequate, 1048 /* if extended permissions are not defined, only consider av_decision */ in avc_has_extended_perms() 1102 * @requested: requested permissions [all …]
|
/linux-6.14.4/arch/x86/kernel/cpu/sgx/ |
D | ioctl.c | 191 * CPU will silently overwrite the permissions as zero, which means in sgx_validate_secinfo() 384 * A SECINFO for a TCS is required to always contain zero permissions because 388 * mmap()'s protection bits are capped by the page permissions. For each page 392 * 1. A regular page: PROT_R, PROT_W and PROT_X match the SECINFO permissions. 732 * sgx_enclave_restrict_permissions() - Restrict EPCM permissions 735 * their new permissions. 753 secinfo.flags = modp->permissions & SGX_SECINFO_PERMISSION_MASK; in sgx_enclave_restrict_permissions() 769 * Changing EPCM permissions is only supported on regular in sgx_enclave_restrict_permissions() 781 * how EPCM permissions can be relaxed from within the enclave. in sgx_enclave_restrict_permissions() 782 * ENCLS[EMODPR] can only remove existing EPCM permissions, in sgx_enclave_restrict_permissions() [all …]
|
/linux-6.14.4/Documentation/core-api/ |
D | protection-keys.rst | 31 theoretically space in the PAE PTEs. These permissions are enforced on data 42 overlay permissions for each protection key index. 47 Unlike x86_64, the protection key permissions also apply to instruction 62 to change access permissions to memory covered with a key. In this example 116 the plain mprotect() permissions are violated.
|
/linux-6.14.4/security/selinux/include/ |
D | avc.h | 76 * actual permissions that were denied. As an example lets in avc_audit_required() 101 * avc_audit - Audit the granting or denial of permissions. 105 * @requested: requested permissions 110 * Audit the granting or denial of permissions in accordance 132 #define AVC_EXTENDED_PERMS 2 /* update extended permissions */
|
/linux-6.14.4/ipc/ |
D | util.c | 269 * Add an entry 'new' to the ipc ids idr. The permissions object is 351 * ipc_check_perms - check security and permissions for an ipc object 543 * ipcperms - check ipc permissions 548 * Check user, group, other permissions for access 580 * kernel_to_ipc64_perm - convert kernel ipc permissions to user 581 * @in: kernel permissions 582 * @out: new style ipc permissions 584 * Turn the kernel object @in into a set of permissions descriptions 599 * ipc64_perm_to_ipc_perm - convert new ipc permissions to old 600 * @in: new style ipc permissions [all …]
|
/linux-6.14.4/arch/x86/kernel/ |
D | ioport.c | 63 * This changes the io permissions bitmap in the current task. 84 /* No point to allocate a bitmap just to clear permissions */ in ksys_ioperm() 111 * permissions are dropped has the pointer set up. in ksys_ioperm() 135 /* All permissions dropped? */ in ksys_ioperm() 168 * Setting IOPL to level 0-2 is disabling I/O permissions. Level 3
|
/linux-6.14.4/fs/coda/ |
D | coda_fs_i.h | 28 unsigned int c_cached_epoch; /* epoch for cached permissions */ 29 kuid_t c_uid; /* fsuid for cached permissions */ 30 unsigned int c_cached_perm; /* cached access permissions */
|
/linux-6.14.4/fs/ |
D | attr.c | 83 * chown_ok - verify permissions to chown inode 85 * @inode: inode to check permissions on 91 * permissions. On non-idmapped mounts or if permission checking is to be 110 * chgrp_ok - verify permissions to chgrp inode 112 * @inode: inode to check permissions on 118 * permissions. On non-idmapped mounts or if permission checking is to be 155 * permissions. On non-idmapped mounts or if permission checking is to be 239 * permissions to allow truncate (inode_newsize_ok does NOT check these 333 * permissions. On non-idmapped mounts or if permission checking is to be 423 * permissions. On non-idmapped mounts or if permission checking is to be
|
/linux-6.14.4/arch/arm64/include/asm/ |
D | kvm_pgtable.h | 237 * enum kvm_pgtable_prot - Page-table permissions and attributes. 457 * @prot: Permissions and attributes for the mapping. 565 * @prot: Permissions and attributes for the mapping. 592 * @prot: Permissions and attributes for the mapping. 606 * permissions. Instead, the vCPU will exit one more time from guest if still 607 * needed and then go through the path of relaxing permissions. 669 * calling this function to ensure that the updated permissions are visible 704 * calling this function to ensure that the updated permissions are visible 713 * kvm_pgtable_stage2_relax_perms() - Relax the permissions enforced by a 717 * @prot: Additional permissions to grant for the mapping. [all …]
|
/linux-6.14.4/Documentation/usb/ |
D | text_files.rst | 13 USB devfs drop permissions source 16 .. literalinclude:: usbdevfs-drop-permissions.c
|
/linux-6.14.4/include/rdma/ |
D | ib_umem_odp.h | 22 * The lower two bits designate access permissions. 71 * The lower 2 bits of the DMA address signal the R/W permissions for 72 * the entry. To upgrade the permissions, provide the appropriate
|
/linux-6.14.4/Documentation/ABI/testing/ |
D | procfs-attr-prev | 8 The details of permissions required to read from 12 The other details of permissions required to write to
|
D | procfs-attr-current | 7 The details of permissions required to read from 12 The other details of permissions required to write to
|
D | procfs-attr-exec | 8 The details of permissions required to read from 13 The other details of permissions required to write to
|
/linux-6.14.4/fs/notify/fanotify/ |
D | Kconfig | 16 bool "fanotify permissions checking" 20 Say Y here is you want fanotify listeners to be able to make permissions
|
/linux-6.14.4/drivers/infiniband/hw/efa/ |
D | efa_io_defs.h | 180 * permissions 181 * 0 : local_write_enable - Local write permissions: 185 * permissions: must be set to enable RDMA write to 187 * 2 : remote_read_enable - Remote read permissions: 191 u8 permissions; member
|
/linux-6.14.4/fs/hfsplus/ |
D | inode.c | 516 hfsplus_get_perms(inode, &folder->permissions, 1); in hfsplus_cat_read_inode() 545 hfsplus_get_perms(inode, &file->permissions, 0); in hfsplus_cat_read_inode() 548 if (file->permissions.dev) in hfsplus_cat_read_inode() 550 be32_to_cpu(file->permissions.dev)); in hfsplus_cat_read_inode() 560 be32_to_cpu(file->permissions.dev)); in hfsplus_cat_read_inode() 608 hfsplus_cat_set_perms(inode, &folder->permissions); in hfsplus_cat_write_inode() 637 hfsplus_cat_set_perms(inode, &file->permissions); in hfsplus_cat_write_inode() 639 (file->permissions.rootflags | in hfsplus_cat_write_inode() 640 file->permissions.userflags)) in hfsplus_cat_write_inode()
|
/linux-6.14.4/tools/testing/selftests/sgx/ |
D | main.c | 604 * Second page of .data segment is used to test changing PTE permissions. 609 * 2) Change PTE permissions (RW -> RO) of target page within enclave. 612 * 4) Change PTE permissions of target page within enclave back to be RW. 634 * have its permissions manipulated. in TEST_F() 665 /* Change PTE permissions of target page within the enclave */ in TEST_F() 671 * PTE permissions of target page changed to read-only, EPCM in TEST_F() 672 * permissions unchanged (EPCM permissions are RW), attempt to in TEST_F() 689 * Change PTE permissions back to enable enclave to write to the in TEST_F() 718 * Modifying permissions of TCS page should not be possible. 759 ioc.permissions = SGX_SECINFO_R; in TEST_F() [all …]
|