Home
last modified time | relevance | path

Searched full:permissions (Results 1 – 25 of 603) sorted by relevance

12345678910>>...25

/linux-6.14.4/Documentation/filesystems/
Dadfs.rst39 ownmask=nnn The permission mask for ADFS 'owner' permissions
41 othmask=nnn The permission mask for ADFS 'other' permissions
48 Mapping of ADFS permissions to Linux permissions
51 ADFS permissions consist of the following:
68 Possible owner mode permissions -> -rwx------
74 Possible other mode permissions -> ----rwxrwx
77 not a UnixExec filetype, then the permissions will be::
93 desire the permissions should be under Linux.
Disofs.rst39 mode=xxx Sets the permissions on files to xxx unless Rock Ridge
40 extensions set the permissions otherwise
41 dmode=xxx Sets the permissions on directories to xxx unless Rock Ridge
42 extensions set the permissions otherwise
43 overriderockperm Set permissions on files and directories according to
/linux-6.14.4/security/keys/
Dpermission.c24 * permissions bits or the LSM check.
53 /* use the second 8-bits of permissions for keys the caller owns */ in key_task_permission()
59 /* use the third 8-bits of permissions for keys the caller has a group in key_task_permission()
79 /* use the top 8-bits of permissions for keys the caller possesses in key_task_permission()
80 * - possessor permissions are additive with other permissions in key_task_permission()
/linux-6.14.4/security/selinux/ss/
Davtab.h38 /* extended permissions */
51 * For operations that require more than the 32 permissions provided by the avc
52 * extended permissions may be used to provide 256 bits of permissions.
64 * specifies which permissions are included.
67 /* 256 bits of permissions */
Dconstraint.h4 * order for one or more permissions to be granted.
59 u32 permissions; /* constrained permissions */ member
60 struct constraint_expr *expr; /* constraint on permissions */
/linux-6.14.4/tools/testing/selftests/powerpc/mm/
Dpkey_exec_prot.c59 /* Restore permissions in order to continue */ in segv_handler()
63 sigsafe_err("failed to set access permissions\n"); in segv_handler()
82 * permissions. in segv_handler()
85 sigsafe_err("failed to set execute permissions\n"); in segv_handler()
180 printf("read from %p, pkey permissions are %s\n", fault_addr, in test()
197 printf("write to %p, pkey permissions are %s\n", fault_addr, in test()
218 printf("read from %p, pkey permissions are %s\n", fault_addr, in test()
235 printf("write to %p, pkey permissions are %s\n", fault_addr, in test()
271 printf("execute at %p, pkey permissions are %s\n", fault_addr, in test()
/linux-6.14.4/security/apparmor/
Dfile.c82 * @perms: the permissions computed for the request (NOT NULL)
84 * @request: permissions requested
126 /* only report permissions that were denied */ in aa_audit_file()
200 * @perms: Returns - the permissions found when matching @name
258 * aa_path_perm - do permissions check & audit for @path
262 * @path: path to check permissions of (NOT NULL)
264 * @request: requested permissions
298 * test target x permissions are equal OR a subset of link x permissions
300 * a subset of permissions that the target has.
372 * a subset of the allowed permissions on target. in profile_path_link()
[all …]
/linux-6.14.4/security/selinux/
Davc.c548 * (@ssid, @tsid), interpreting the permissions
595 * @xp_node: resulting extended permissions
817 * @xperm: xperm permissions
951 * avc_ss_reset - Flush the cache and revalidate migrated permissions.
981 * @xp_node: AVC extended permissions node
1013 * The avc extended permissions logic adds an additional 256 bits of
1014 * permissions to an avc node when extended permissions for that node are
1015 * specified in the avtab. If the additional 256 permissions is not adequate,
1048 /* if extended permissions are not defined, only consider av_decision */ in avc_has_extended_perms()
1102 * @requested: requested permissions
[all …]
/linux-6.14.4/arch/x86/kernel/cpu/sgx/
Dioctl.c191 * CPU will silently overwrite the permissions as zero, which means in sgx_validate_secinfo()
384 * A SECINFO for a TCS is required to always contain zero permissions because
388 * mmap()'s protection bits are capped by the page permissions. For each page
392 * 1. A regular page: PROT_R, PROT_W and PROT_X match the SECINFO permissions.
732 * sgx_enclave_restrict_permissions() - Restrict EPCM permissions
735 * their new permissions.
753 secinfo.flags = modp->permissions & SGX_SECINFO_PERMISSION_MASK; in sgx_enclave_restrict_permissions()
769 * Changing EPCM permissions is only supported on regular in sgx_enclave_restrict_permissions()
781 * how EPCM permissions can be relaxed from within the enclave. in sgx_enclave_restrict_permissions()
782 * ENCLS[EMODPR] can only remove existing EPCM permissions, in sgx_enclave_restrict_permissions()
[all …]
/linux-6.14.4/Documentation/core-api/
Dprotection-keys.rst31 theoretically space in the PAE PTEs. These permissions are enforced on data
42 overlay permissions for each protection key index.
47 Unlike x86_64, the protection key permissions also apply to instruction
62 to change access permissions to memory covered with a key. In this example
116 the plain mprotect() permissions are violated.
/linux-6.14.4/security/selinux/include/
Davc.h76 * actual permissions that were denied. As an example lets in avc_audit_required()
101 * avc_audit - Audit the granting or denial of permissions.
105 * @requested: requested permissions
110 * Audit the granting or denial of permissions in accordance
132 #define AVC_EXTENDED_PERMS 2 /* update extended permissions */
/linux-6.14.4/ipc/
Dutil.c269 * Add an entry 'new' to the ipc ids idr. The permissions object is
351 * ipc_check_perms - check security and permissions for an ipc object
543 * ipcperms - check ipc permissions
548 * Check user, group, other permissions for access
580 * kernel_to_ipc64_perm - convert kernel ipc permissions to user
581 * @in: kernel permissions
582 * @out: new style ipc permissions
584 * Turn the kernel object @in into a set of permissions descriptions
599 * ipc64_perm_to_ipc_perm - convert new ipc permissions to old
600 * @in: new style ipc permissions
[all …]
/linux-6.14.4/arch/x86/kernel/
Dioport.c63 * This changes the io permissions bitmap in the current task.
84 /* No point to allocate a bitmap just to clear permissions */ in ksys_ioperm()
111 * permissions are dropped has the pointer set up. in ksys_ioperm()
135 /* All permissions dropped? */ in ksys_ioperm()
168 * Setting IOPL to level 0-2 is disabling I/O permissions. Level 3
/linux-6.14.4/fs/coda/
Dcoda_fs_i.h28 unsigned int c_cached_epoch; /* epoch for cached permissions */
29 kuid_t c_uid; /* fsuid for cached permissions */
30 unsigned int c_cached_perm; /* cached access permissions */
/linux-6.14.4/fs/
Dattr.c83 * chown_ok - verify permissions to chown inode
85 * @inode: inode to check permissions on
91 * permissions. On non-idmapped mounts or if permission checking is to be
110 * chgrp_ok - verify permissions to chgrp inode
112 * @inode: inode to check permissions on
118 * permissions. On non-idmapped mounts or if permission checking is to be
155 * permissions. On non-idmapped mounts or if permission checking is to be
239 * permissions to allow truncate (inode_newsize_ok does NOT check these
333 * permissions. On non-idmapped mounts or if permission checking is to be
423 * permissions. On non-idmapped mounts or if permission checking is to be
/linux-6.14.4/arch/arm64/include/asm/
Dkvm_pgtable.h237 * enum kvm_pgtable_prot - Page-table permissions and attributes.
457 * @prot: Permissions and attributes for the mapping.
565 * @prot: Permissions and attributes for the mapping.
592 * @prot: Permissions and attributes for the mapping.
606 * permissions. Instead, the vCPU will exit one more time from guest if still
607 * needed and then go through the path of relaxing permissions.
669 * calling this function to ensure that the updated permissions are visible
704 * calling this function to ensure that the updated permissions are visible
713 * kvm_pgtable_stage2_relax_perms() - Relax the permissions enforced by a
717 * @prot: Additional permissions to grant for the mapping.
[all …]
/linux-6.14.4/Documentation/usb/
Dtext_files.rst13 USB devfs drop permissions source
16 .. literalinclude:: usbdevfs-drop-permissions.c
/linux-6.14.4/include/rdma/
Dib_umem_odp.h22 * The lower two bits designate access permissions.
71 * The lower 2 bits of the DMA address signal the R/W permissions for
72 * the entry. To upgrade the permissions, provide the appropriate
/linux-6.14.4/Documentation/ABI/testing/
Dprocfs-attr-prev8 The details of permissions required to read from
12 The other details of permissions required to write to
Dprocfs-attr-current7 The details of permissions required to read from
12 The other details of permissions required to write to
Dprocfs-attr-exec8 The details of permissions required to read from
13 The other details of permissions required to write to
/linux-6.14.4/fs/notify/fanotify/
DKconfig16 bool "fanotify permissions checking"
20 Say Y here is you want fanotify listeners to be able to make permissions
/linux-6.14.4/drivers/infiniband/hw/efa/
Defa_io_defs.h180 * permissions
181 * 0 : local_write_enable - Local write permissions:
185 * permissions: must be set to enable RDMA write to
187 * 2 : remote_read_enable - Remote read permissions:
191 u8 permissions; member
/linux-6.14.4/fs/hfsplus/
Dinode.c516 hfsplus_get_perms(inode, &folder->permissions, 1); in hfsplus_cat_read_inode()
545 hfsplus_get_perms(inode, &file->permissions, 0); in hfsplus_cat_read_inode()
548 if (file->permissions.dev) in hfsplus_cat_read_inode()
550 be32_to_cpu(file->permissions.dev)); in hfsplus_cat_read_inode()
560 be32_to_cpu(file->permissions.dev)); in hfsplus_cat_read_inode()
608 hfsplus_cat_set_perms(inode, &folder->permissions); in hfsplus_cat_write_inode()
637 hfsplus_cat_set_perms(inode, &file->permissions); in hfsplus_cat_write_inode()
639 (file->permissions.rootflags | in hfsplus_cat_write_inode()
640 file->permissions.userflags)) in hfsplus_cat_write_inode()
/linux-6.14.4/tools/testing/selftests/sgx/
Dmain.c604 * Second page of .data segment is used to test changing PTE permissions.
609 * 2) Change PTE permissions (RW -> RO) of target page within enclave.
612 * 4) Change PTE permissions of target page within enclave back to be RW.
634 * have its permissions manipulated. in TEST_F()
665 /* Change PTE permissions of target page within the enclave */ in TEST_F()
671 * PTE permissions of target page changed to read-only, EPCM in TEST_F()
672 * permissions unchanged (EPCM permissions are RW), attempt to in TEST_F()
689 * Change PTE permissions back to enable enclave to write to the in TEST_F()
718 * Modifying permissions of TCS page should not be possible.
759 ioc.permissions = SGX_SECINFO_R; in TEST_F()
[all …]

12345678910>>...25