Home
last modified time | relevance | path

Searched full:permissions (Results 1 – 25 of 573) sorted by relevance

12345678910>>...23

/linux-6.8/Documentation/filesystems/
Dadfs.rst39 ownmask=nnn The permission mask for ADFS 'owner' permissions
41 othmask=nnn The permission mask for ADFS 'other' permissions
48 Mapping of ADFS permissions to Linux permissions
51 ADFS permissions consist of the following:
68 Possible owner mode permissions -> -rwx------
74 Possible other mode permissions -> ----rwxrwx
77 not a UnixExec filetype, then the permissions will be::
93 desire the permissions should be under Linux.
Disofs.rst39 mode=xxx Sets the permissions on files to xxx unless Rock Ridge
40 extensions set the permissions otherwise
41 dmode=xxx Sets the permissions on directories to xxx unless Rock Ridge
42 extensions set the permissions otherwise
43 overriderockperm Set permissions on files and directories according to
/linux-6.8/security/keys/
Dpermission.c24 * permissions bits or the LSM check.
53 /* use the second 8-bits of permissions for keys the caller owns */ in key_task_permission()
59 /* use the third 8-bits of permissions for keys the caller has a group in key_task_permission()
79 /* use the top 8-bits of permissions for keys the caller possesses in key_task_permission()
80 * - possessor permissions are additive with other permissions in key_task_permission()
/linux-6.8/security/selinux/ss/
Davtab.h38 /* extended permissions */
51 * For operations that require more than the 32 permissions provided by the avc
52 * extended permissions may be used to provide 256 bits of permissions.
63 * specifies which permissions are included.
66 /* 256 bits of permissions */
Dconstraint.h4 * order for one or more permissions to be granted.
58 u32 permissions; /* constrained permissions */ member
59 struct constraint_expr *expr; /* constraint on permissions */
/linux-6.8/tools/testing/selftests/powerpc/mm/
Dpkey_exec_prot.c59 /* Restore permissions in order to continue */ in segv_handler()
63 sigsafe_err("failed to set access permissions\n"); in segv_handler()
82 * permissions. in segv_handler()
85 sigsafe_err("failed to set execute permissions\n"); in segv_handler()
180 printf("read from %p, pkey permissions are %s\n", fault_addr, in test()
197 printf("write to %p, pkey permissions are %s\n", fault_addr, in test()
218 printf("read from %p, pkey permissions are %s\n", fault_addr, in test()
235 printf("write to %p, pkey permissions are %s\n", fault_addr, in test()
271 printf("execute at %p, pkey permissions are %s\n", fault_addr, in test()
/linux-6.8/security/selinux/
Davc.c550 * (@ssid, @tsid), interpreting the permissions
597 * @xp_node: resulting extended permissions
818 * @xperm: xperm permissions
949 * avc_ss_reset - Flush the cache and revalidate migrated permissions.
979 * @xp_node: AVC extended permissions node
1012 * The avc extended permissions logic adds an additional 256 bits of
1013 * permissions to an avc node when extended permissions for that node are
1014 * specified in the avtab. If the additional 256 permissions is not adequate,
1046 /* if extended permissions are not defined, only consider av_decision */ in avc_has_extended_perms()
1099 * @requested: requested permissions
[all …]
/linux-6.8/arch/x86/kernel/cpu/sgx/
Dioctl.c184 * CPU will silently overwrite the permissions as zero, which means in sgx_validate_secinfo()
377 * A SECINFO for a TCS is required to always contain zero permissions because
381 * mmap()'s protection bits are capped by the page permissions. For each page
385 * 1. A regular page: PROT_R, PROT_W and PROT_X match the SECINFO permissions.
725 * sgx_enclave_restrict_permissions() - Restrict EPCM permissions
728 * their new permissions.
746 secinfo.flags = modp->permissions & SGX_SECINFO_PERMISSION_MASK; in sgx_enclave_restrict_permissions()
762 * Changing EPCM permissions is only supported on regular in sgx_enclave_restrict_permissions()
774 * how EPCM permissions can be relaxed from within the enclave. in sgx_enclave_restrict_permissions()
775 * ENCLS[EMODPR] can only remove existing EPCM permissions, in sgx_enclave_restrict_permissions()
[all …]
/linux-6.8/security/apparmor/
Dfile.c82 * @perms: the permissions computed for the request (NOT NULL)
84 * @request: permissions requested
126 /* only report permissions that were denied */ in aa_audit_file()
213 * @perms: Returns - the permissions found when matching @name
271 * aa_path_perm - do permissions check & audit for @path
275 * @path: path to check permissions of (NOT NULL)
277 * @request: requested permissions
311 * test target x permissions are equal OR a subset of link x permissions
313 * a subset of permissions that the target has.
385 * a subset of the allowed permissions on target. in profile_path_link()
[all …]
/linux-6.8/security/selinux/include/
Davc.h76 * actual permissions that were denied. As an example lets in avc_audit_required()
101 * avc_audit - Audit the granting or denial of permissions.
105 * @requested: requested permissions
110 * Audit the granting or denial of permissions in accordance
132 #define AVC_EXTENDED_PERMS 2 /* update extended permissions */
/linux-6.8/fs/
Dattr.c87 * chown_ok - verify permissions to chown inode
89 * @inode: inode to check permissions on
95 * permissions. On non-idmapped mounts or if permission checking is to be
114 * chgrp_ok - verify permissions to chgrp inode
116 * @inode: inode to check permissions on
122 * permissions. On non-idmapped mounts or if permission checking is to be
159 * permissions. On non-idmapped mounts or if permission checking is to be
243 * permissions to allow truncate (inode_newsize_ok does NOT check these
296 * permissions. On non-idmapped mounts or if permission checking is to be
378 * permissions. On non-idmapped mounts or if permission checking is to be
/linux-6.8/ipc/
Dutil.c269 * Add an entry 'new' to the ipc ids idr. The permissions object is
351 * ipc_check_perms - check security and permissions for an ipc object
543 * ipcperms - check ipc permissions
548 * Check user, group, other permissions for access
580 * kernel_to_ipc64_perm - convert kernel ipc permissions to user
581 * @in: kernel permissions
582 * @out: new style ipc permissions
584 * Turn the kernel object @in into a set of permissions descriptions
599 * ipc64_perm_to_ipc_perm - convert new ipc permissions to old
600 * @in: new style ipc permissions
[all …]
/linux-6.8/arch/x86/kernel/
Dioport.c63 * This changes the io permissions bitmap in the current task.
84 /* No point to allocate a bitmap just to clear permissions */ in ksys_ioperm()
111 * permissions are dropped has the pointer set up. in ksys_ioperm()
135 /* All permissions dropped? */ in ksys_ioperm()
168 * Setting IOPL to level 0-2 is disabling I/O permissions. Level 3
/linux-6.8/fs/coda/
Dcoda_fs_i.h28 unsigned int c_cached_epoch; /* epoch for cached permissions */
29 kuid_t c_uid; /* fsuid for cached permissions */
30 unsigned int c_cached_perm; /* cached access permissions */
/linux-6.8/arch/arm64/include/asm/
Dkvm_pgtable.h195 * enum kvm_pgtable_prot - Page-table permissions and attributes.
408 * @prot: Permissions and attributes for the mapping.
513 * @prot: Permissions and attributes for the mapping.
540 * @prot: Permissions and attributes for the mapping.
554 * permissions. Instead, the vCPU will exit one more time from guest if still
555 * needed and then go through the path of relaxing permissions.
617 * calling this function to ensure that the updated permissions are visible
652 * calling this function to ensure that the updated permissions are visible
661 * kvm_pgtable_stage2_relax_perms() - Relax the permissions enforced by a
665 * @prot: Additional permissions to grant for the mapping.
[all …]
/linux-6.8/Documentation/usb/
Dtext_files.rst13 USB devfs drop permissions source
16 .. literalinclude:: usbdevfs-drop-permissions.c
/linux-6.8/include/rdma/
Dib_umem_odp.h22 * The lower two bits designate access permissions.
71 * The lower 2 bits of the DMA address signal the R/W permissions for
72 * the entry. To upgrade the permissions, provide the appropriate
/linux-6.8/Documentation/ABI/testing/
Dprocfs-attr-prev8 The details of permissions required to read from
12 The other details of permissions required to write to
Dprocfs-attr-exec8 The details of permissions required to read from
13 The other details of permissions required to write to
Dprocfs-attr-current7 The details of permissions required to read from
12 The other details of permissions required to write to
/linux-6.8/fs/notify/fanotify/
DKconfig16 bool "fanotify permissions checking"
21 Say Y here is you want fanotify listeners to be able to make permissions
/linux-6.8/Documentation/core-api/
Dprotection-keys.rst28 theoretically space in the PAE PTEs. These permissions are enforced on data
43 directly in order to change access permissions to memory covered
98 the plain mprotect() permissions are violated.
/linux-6.8/fs/hfsplus/
Dinode.c517 hfsplus_get_perms(inode, &folder->permissions, 1); in hfsplus_cat_read_inode()
546 hfsplus_get_perms(inode, &file->permissions, 0); in hfsplus_cat_read_inode()
549 if (file->permissions.dev) in hfsplus_cat_read_inode()
551 be32_to_cpu(file->permissions.dev)); in hfsplus_cat_read_inode()
561 be32_to_cpu(file->permissions.dev)); in hfsplus_cat_read_inode()
609 hfsplus_cat_set_perms(inode, &folder->permissions); in hfsplus_cat_write_inode()
638 hfsplus_cat_set_perms(inode, &file->permissions); in hfsplus_cat_write_inode()
640 (file->permissions.rootflags | in hfsplus_cat_write_inode()
641 file->permissions.userflags)) in hfsplus_cat_write_inode()
/linux-6.8/tools/testing/selftests/sgx/
Dmain.c604 * Second page of .data segment is used to test changing PTE permissions.
609 * 2) Change PTE permissions (RW -> RO) of target page within enclave.
612 * 4) Change PTE permissions of target page within enclave back to be RW.
634 * have its permissions manipulated. in TEST_F()
665 /* Change PTE permissions of target page within the enclave */ in TEST_F()
671 * PTE permissions of target page changed to read-only, EPCM in TEST_F()
672 * permissions unchanged (EPCM permissions are RW), attempt to in TEST_F()
689 * Change PTE permissions back to enable enclave to write to the in TEST_F()
718 * Modifying permissions of TCS page should not be possible.
759 ioc.permissions = SGX_SECINFO_R; in TEST_F()
[all …]
/linux-6.8/arch/mips/include/uapi/asm/
Dsembuf.h18 struct ipc64_perm sem_perm; /* permissions .. see ipc.h */
27 struct ipc64_perm sem_perm; /* permissions .. see ipc.h */

12345678910>>...23