Home
last modified time | relevance | path

Searched full:permission (Results 1 – 25 of 10631) sorted by relevance

12345678910>>...426

/freebsd-src/lib/libc/posix1e/
H A Dacl_add_perm.331 .Nd add permissions to a permission set
43 is a POSIX.1e call that adds the permission contained in
45 to the permission set
49 that already exist in the permission set.
53 .It ACL_EXECUTE Execute permission
54 .It ACL_WRITE Write permission
55 .It ACL_READ Read permission
60 .It ACL_READ_DATA Ta "Read permission"
62 .It ACL_WRITE_DATA Ta "Write permission, or permission to create files"
64 .It ACL_APPEND_DATA Ta "Permission to create directories. Ignored for files"
[all …]
H A Dacl_get_perm_np.331 .Nd "check if a permission is set in a permission set"
43 is a non-portable function that checks if a permission is set in
44 a permission set.
46 If the permission in
48 is set in the permission set
67 does not contain a valid ACL permission or argument
H A Dacl_perm.c52 * acl_add_perm() (23.4.1): add the permission contained in perm to the
53 * permission set permset_d
73 * acl_clear_perms() (23.4.3): clear all permisions from the permission
91 * acl_delete_perm() (23.4.10): remove the permission in perm from the
92 * permission set permset_d
/freebsd-src/contrib/llvm-project/lldb/include/lldb/Breakpoint/
H A DBreakpointName.h79 // merge set permissions, and most restrictive permission wins.
97 bool GetPermission(enum PermissionKinds permission) const in GetPermission() argument
99 return m_permissions[permission]; in GetPermission()
104 bool IsSet(enum PermissionKinds permission) const in IsSet() argument
106 return m_set_mask.Test(permissions_mask[permission]); in IsSet()
119 bool SetPermission(enum PermissionKinds permission, bool value) in SetPermission() argument
121 bool old_value = m_permissions[permission]; in SetPermission()
122 m_permissions[permission] = value; in SetPermission()
123 m_set_mask.Set(permissions_mask[permission]); in SetPermission()
127 // If either side disallows the permission, th
129 MergePermission(const Permissions & incoming,enum PermissionKinds permission) MergePermission() argument
164 GetPermission(Permissions::PermissionKinds permission) GetPermission() argument
[all...]
/freebsd-src/contrib/ntp/libntp/lib/isc/win32/include/isc/
H A Dstat.h5 * Permission to use, copy, modify, and/or distribute this software for any
7 * copyright notice and this permission notice appear in all copies.
30 #define S_IREAD _S_IREAD /* read permission, owner */
31 #define S_IWRITE _S_IWRITE /* write permission, owner */
32 #define S_IEXEC _S_IEXEC /* execute/search permission, owner */
33 #define S_IRUSR _S_IREAD /* Owner read permission */
34 #define S_IWUSR _S_IWRITE /* Owner write permission */
35 #define S_IRGRP _S_IREAD /* Group read permission */
36 #define S_IWGRP _S_IWRITE /* Group write permission */
37 #define S_IROTH _S_IREAD /* Other read permission */
[all …]
/freebsd-src/sys/contrib/openzfs/config/
H A Dkernel-inode-permission.m44 dnl # iops->permission() now takes struct mnt_idmap*
16 .permission = test_permission,
33 .permission = test_permission,
39 AC_MSG_CHECKING([whether iops->permission() takes struct mnt_idmap*])
43 [iops->permission() takes struct mnt_idmap*])
47 AC_MSG_CHECKING([whether iops->permission() takes struct user_namespace*])
51 [iops->permission() takes struct user_namespace*])
/freebsd-src/tests/sys/cddl/zfs/tests/delegate/
H A Dzfs_allow_008_pos.ksh37 # other else user when it get 'allow' permission.
41 # 2. Verify the non-root user can allow permission if he has allow
42 # permission.
66 # Delegate local permission to $STAFF1
72 # $perms1 is local permission in $ROOT_TESTFS
77 # Verify 'allow' give non-privilege user delegated permission.
81 # $perms2 was not allow to $STAFF1, so he have no permission to
82 # delegate permission to other else.
H A Dzfs_unallow_005_pos.ksh36 # Verify option '-c' will remove the created permission set.
40 # 2. Allow permission create to $STAFF1 on $ROOT_TESTFS.
42 # 4. Verify $STAFF1 has created time permission.
43 # 5. Unallow created time permission with option '-c'.
58 log_assert "Verify option '-c' will remove the created permission set."
82 log_pass "Verify option '-c' will remove the created permission set passed."
/freebsd-src/contrib/libpcap/doc/
H A DREADME.macos7 changed to give users other than root permission to read or write those
12 devices to give users other than root permission to read or write those
27 "admin" group owns them, and will change the permission of the BPF
61 If you want to give a particular user permission to access the BPF
62 devices, rather than giving all administrative users permission to
65 give a particular user permission to read and write the BPF devices and
66 give the administrative users permission to read but not write the BPF
72 to grant write permission to everybody who should be allowed to capture
/freebsd-src/sys/contrib/openzfs/tests/zfs-tests/tests/functional/delegate/
H A Dzfs_allow_008_pos.ksh37 # they have, if they also have the 'allow' permission.
42 # 'allow' permission.
57 # Delegate local permission to $STAFF1
63 # $perms1 is local permission in $ROOT_TESTFS
68 # Verify 'allow' give non-privilege user delegated permission.
73 # permission to delegate permission to other users.
H A Dzfs_unallow_005_pos.ksh36 # Verify option '-c' will remove the created permission set.
40 # 2. Allow permission create to $STAFF1 on $ROOT_TESTFS.
42 # 4. Verify $STAFF1 has created time permission.
43 # 5. Unallow created time permission with option '-c'.
49 log_assert "Verify option '-c' will remove the created permission set."
73 log_pass "Verify option '-c' will remove the created permission set passed."
/freebsd-src/lib/libsys/
H A Dstat.214 .\" without specific prior written permission.
55 permission of the named file is not required, but all directories
297 #define S_IRUSR 0000400 /* read permission, owner */
298 #define S_IWUSR 0000200 /* write permission, owner */
299 #define S_IXUSR 0000100 /* execute/search permission, owner */
301 #define S_IRGRP 0000040 /* read permission, group */
302 #define S_IWGRP 0000020 /* write permission, group */
303 #define S_IXGRP 0000010 /* execute/search permission, group */
305 #define S_IROTH 0000004 /* read permission, other */
306 #define S_IWOTH 0000002 /* write permission, other */
[all …]
H A Daccess.214 .\" without specific prior written permission.
63 for read permission,
65 for write permission, and
67 for execute / search permission
166 the file may not actually have execute permission bits set.
200 Permission bits of the file mode do not permit the requested
201 access, or search permission is denied on a component of the
275 should not be relied upon for file permission enforcement purposes.
/freebsd-src/tests/sys/mac/bsdextended/
H A Dmatches_test.sh114 atf_check -s not-exit:0 -e match:"Permission denied" \
138 atf_check -s not-exit:0 -e match:"Permission denied" \
194 atf_check -s not-exit:0 -e match:"Permission denied" \
202 atf_check -s not-exit:0 -e match:"Permission denied" \
226 atf_check -s not-exit:0 -e match:"Permission denied" \
232 atf_check -s not-exit:0 -e match:"Permission denied" \
258 atf_check -s not-exit:0 -e match:"Permission denied" \
281 atf_check -s not-exit:0 -e match:"Permission denied" \
306 atf_check -s not-exit:0 -e match:"Permission denied" \
330 atf_check -s not-exit:0 -e match:"Permission denied" \
[all …]
/freebsd-src/tests/sys/cddl/zfs/tests/history/
H A Dhistory_009_pos.ksh42 # Ul$<id> identifies permission sets granted locally for this userid.
43 # Ud$<id> identifies permission sets granted on descendent datasets for
50 # Gl$<id> identifies permission sets granted locally for this groupid.
51 # Gd$<id> identifies permission sets granted on descendent datasets for
58 # El$ identifies permission sets granted locally for everyone.
59 # Ed$ identifies permission sets granted to descendent datasets
62 # c-$ identifies permission to create at dataset creation time.
63 # C-$ identifies permission sets to grant locally at dataset
71 # 2. Define permission sets and verify the internal history correctly.
/freebsd-src/sys/fs/p9fs/
H A Dp9_protocol.h121 P9PROTO_DMDIR = 0x80000000, /* permission bit for directories */
122 P9PROTO_DMAPPEND = 0x40000000, /* permission bit for is append-only */
123 P9PROTO_DMEXCL = 0x20000000, /* permission bit for exclusive use (only one open handle allowed) */
124 P9PROTO_DMMOUNT = 0x10000000, /* permission bit for mount points */
125 P9PROTO_DMAUTH = 0x08000000, /* permission bit for authentication file */
126 P9PROTO_DMTMP = 0x04000000, /* permission bit for non-backed-up files */
127 P9PROTO_DMSYMLINK = 0x02000000, /* permission bit for symbolic link (9P2000.u) */
128 P9PROTO_DMLINK = 0x01000000, /* permission bit for hard-link (9P2000.u) */
129 P9PROTO_DMDEVICE = 0x00800000, /* permission bit for device files (9P2000.u) */
130 P9PROTO_DMNAMEDPIPE = 0x00200000,/* permission bi
[all...]
/freebsd-src/sys/contrib/openzfs/man/man8/
H A Dzfs-unallow.8137 Delegates ZFS administration permission for the file systems to non-privileged
177 Permission names are the same as ZFS subcommand and property names.
199 allow subcommand Must also have the permission that is being allowed
309 Defines or adds permissions to a permission set.
314 Permission sets follow the same naming restrictions as ZFS file systems, but the
350 For example, if the permission is granted by an ancestor.
383 Removes permissions from a permission set.
409 mount point permission is set to 755 by default, user
431 Permission sets:
437 .Ss Example 3 : No Defining and Granting a Permission Set on a ZFS Dataset
[all …]
H A Dzfs-allow.8137 Delegates ZFS administration permission for the file systems to non-privileged
177 Permission names are the same as ZFS subcommand and property names.
199 allow subcommand Must also have the permission that is being allowed
309 Defines or adds permissions to a permission set.
314 Permission sets follow the same naming restrictions as ZFS file systems, but the
350 For example, if the permission is granted by an ancestor.
383 Removes permissions from a permission set.
409 mount point permission is set to 755 by default, user
431 Permission sets:
437 .Ss Example 3 : No Defining and Granting a Permission Set on a ZFS Dataset
[all …]
/freebsd-src/sys/contrib/openzfs/module/zfs/
H A Ddsl_deleg.c31 * it is a local or descendent permission. The first letter
37 * Ul$<id> identifies permission sets granted locally for this userid.
38 * Ud$<id> identifies permission sets granted on descendent datasets for
43 * Gl$<id> identifies permission sets granted locally for this groupid.
44 * Gd$<id> identifies permission sets granted on descendent datasets for
49 * El$ identifies permission sets granted locally for everyone.
50 * Ed$ identifies permission sets granted to descendent datasets for
52 * c-$ identifies permission to create at dataset creation time.
53 * C-$ identifies permission sets to grant locally at dataset creation
59 * attribute for each allowed permission, suc
[all...]
/freebsd-src/bin/chmod/
H A Dchmod.118 .\" without specific prior written permission.
222 The user permission bits in the original mode of the file.
224 The group permission bits in the original mode of the file.
226 The other permission bits in the original mode of the file.
239 each permission bit specified in
256 each permission bit specified in
274 each permission bit specified in
296 The ``w'' permission on directories will permit file creation, relocation,
305 deny write permission to group and others.
/freebsd-src/sys/sys/
H A Dipc.h11 * the permission of UNIX System Laboratories, Inc.
27 * without specific prior written permission.
79 unsigned short mode; /* r/w permission */
90 mode_t mode; /* r/w permission */
97 #define IPC_R 000400 /* read permission */
98 #define IPC_W 000200 /* write/alter permission */
99 #define IPC_M 010000 /* permission to change control info */
/freebsd-src/contrib/dialog/package/debian/
H A Dcopyright31 Permission is hereby granted, free of charge, to any person obtaining a
39 The above copyright notice and this permission notice shall be included
58 Permission is hereby granted, free of charge, to any person obtaining a copy
65 The above copyright notice and this permission notice shall be included in
93 Permission to use, copy, modify, and distribute this software and its
96 both that copyright notice and this permission notice appear in
100 permission.
/freebsd-src/share/doc/psd/27.nfsrpc/
H A Dnfs.rfc.ms242 Permission denied. The caller does not have the
243 correct permission to perform the requested operation.
403 0000400&Read permission for owner.
404 0000200&Write permission for owner.
405 0000100&Execute and search permission for owner.
406 0000040&Read permission for group.
407 0000020&Write permission for group.
408 0000010&Execute and search permission for group.
409 0000004&Read permission for others.
410 0000002&Write permission for others.
[all …]
/freebsd-src/bin/mkdir/
H A Dmkdir.118 .\" without specific prior written permission.
56 Set the file permission bits of the final created directory to
75 Intermediate directories are created with permission bits of
79 permission for the owner.
84 The user must have write permission in the parent directory.
/freebsd-src/share/man/man9/
H A Dvaccess.976 selects a component of the file permission bits based on comparing the
79 owner component of the permission bits is selected.
82 a match, then the group component of the permission bits is selected.
84 group, then the other component of the permission bits is selected.
98 Permission denied.

12345678910>>...426