/freebsd-src/lib/libc/posix1e/ |
H A D | acl_add_perm.3 | 31 .Nd add permissions to a permission set 43 is a POSIX.1e call that adds the permission contained in 45 to the permission set 49 that already exist in the permission set. 53 .It ACL_EXECUTE Execute permission 54 .It ACL_WRITE Write permission 55 .It ACL_READ Read permission 60 .It ACL_READ_DATA Ta "Read permission" 62 .It ACL_WRITE_DATA Ta "Write permission, or permission to create files" 64 .It ACL_APPEND_DATA Ta "Permission to create directories. Ignored for files" [all …]
|
H A D | acl_get_perm_np.3 | 31 .Nd "check if a permission is set in a permission set" 43 is a non-portable function that checks if a permission is set in 44 a permission set. 46 If the permission in 48 is set in the permission set 67 does not contain a valid ACL permission or argument
|
H A D | acl_perm.c | 52 * acl_add_perm() (23.4.1): add the permission contained in perm to the 53 * permission set permset_d 73 * acl_clear_perms() (23.4.3): clear all permisions from the permission 91 * acl_delete_perm() (23.4.10): remove the permission in perm from the 92 * permission set permset_d
|
/freebsd-src/contrib/llvm-project/lldb/include/lldb/Breakpoint/ |
H A D | BreakpointName.h | 79 // merge set permissions, and most restrictive permission wins. 97 bool GetPermission(enum PermissionKinds permission) const in GetPermission() argument 99 return m_permissions[permission]; in GetPermission() 104 bool IsSet(enum PermissionKinds permission) const in IsSet() argument 106 return m_set_mask.Test(permissions_mask[permission]); in IsSet() 119 bool SetPermission(enum PermissionKinds permission, bool value) in SetPermission() argument 121 bool old_value = m_permissions[permission]; in SetPermission() 122 m_permissions[permission] = value; in SetPermission() 123 m_set_mask.Set(permissions_mask[permission]); in SetPermission() 127 // If either side disallows the permission, th 129 MergePermission(const Permissions & incoming,enum PermissionKinds permission) MergePermission() argument 164 GetPermission(Permissions::PermissionKinds permission) GetPermission() argument [all...] |
/freebsd-src/contrib/ntp/libntp/lib/isc/win32/include/isc/ |
H A D | stat.h | 5 * Permission to use, copy, modify, and/or distribute this software for any 7 * copyright notice and this permission notice appear in all copies. 30 #define S_IREAD _S_IREAD /* read permission, owner */ 31 #define S_IWRITE _S_IWRITE /* write permission, owner */ 32 #define S_IEXEC _S_IEXEC /* execute/search permission, owner */ 33 #define S_IRUSR _S_IREAD /* Owner read permission */ 34 #define S_IWUSR _S_IWRITE /* Owner write permission */ 35 #define S_IRGRP _S_IREAD /* Group read permission */ 36 #define S_IWGRP _S_IWRITE /* Group write permission */ 37 #define S_IROTH _S_IREAD /* Other read permission */ [all …]
|
/freebsd-src/sys/contrib/openzfs/config/ |
H A D | kernel-inode-permission.m4 | 4 dnl # iops->permission() now takes struct mnt_idmap* 16 .permission = test_permission, 33 .permission = test_permission, 39 AC_MSG_CHECKING([whether iops->permission() takes struct mnt_idmap*]) 43 [iops->permission() takes struct mnt_idmap*]) 47 AC_MSG_CHECKING([whether iops->permission() takes struct user_namespace*]) 51 [iops->permission() takes struct user_namespace*])
|
/freebsd-src/tests/sys/cddl/zfs/tests/delegate/ |
H A D | zfs_allow_008_pos.ksh | 37 # other else user when it get 'allow' permission. 41 # 2. Verify the non-root user can allow permission if he has allow 42 # permission. 66 # Delegate local permission to $STAFF1 72 # $perms1 is local permission in $ROOT_TESTFS 77 # Verify 'allow' give non-privilege user delegated permission. 81 # $perms2 was not allow to $STAFF1, so he have no permission to 82 # delegate permission to other else.
|
H A D | zfs_unallow_005_pos.ksh | 36 # Verify option '-c' will remove the created permission set. 40 # 2. Allow permission create to $STAFF1 on $ROOT_TESTFS. 42 # 4. Verify $STAFF1 has created time permission. 43 # 5. Unallow created time permission with option '-c'. 58 log_assert "Verify option '-c' will remove the created permission set." 82 log_pass "Verify option '-c' will remove the created permission set passed."
|
/freebsd-src/contrib/libpcap/doc/ |
H A D | README.macos | 7 changed to give users other than root permission to read or write those 12 devices to give users other than root permission to read or write those 27 "admin" group owns them, and will change the permission of the BPF 61 If you want to give a particular user permission to access the BPF 62 devices, rather than giving all administrative users permission to 65 give a particular user permission to read and write the BPF devices and 66 give the administrative users permission to read but not write the BPF 72 to grant write permission to everybody who should be allowed to capture
|
/freebsd-src/sys/contrib/openzfs/tests/zfs-tests/tests/functional/delegate/ |
H A D | zfs_allow_008_pos.ksh | 37 # they have, if they also have the 'allow' permission. 42 # 'allow' permission. 57 # Delegate local permission to $STAFF1 63 # $perms1 is local permission in $ROOT_TESTFS 68 # Verify 'allow' give non-privilege user delegated permission. 73 # permission to delegate permission to other users.
|
H A D | zfs_unallow_005_pos.ksh | 36 # Verify option '-c' will remove the created permission set. 40 # 2. Allow permission create to $STAFF1 on $ROOT_TESTFS. 42 # 4. Verify $STAFF1 has created time permission. 43 # 5. Unallow created time permission with option '-c'. 49 log_assert "Verify option '-c' will remove the created permission set." 73 log_pass "Verify option '-c' will remove the created permission set passed."
|
/freebsd-src/lib/libsys/ |
H A D | stat.2 | 14 .\" without specific prior written permission. 55 permission of the named file is not required, but all directories 297 #define S_IRUSR 0000400 /* read permission, owner */ 298 #define S_IWUSR 0000200 /* write permission, owner */ 299 #define S_IXUSR 0000100 /* execute/search permission, owner */ 301 #define S_IRGRP 0000040 /* read permission, group */ 302 #define S_IWGRP 0000020 /* write permission, group */ 303 #define S_IXGRP 0000010 /* execute/search permission, group */ 305 #define S_IROTH 0000004 /* read permission, other */ 306 #define S_IWOTH 0000002 /* write permission, other */ [all …]
|
H A D | access.2 | 14 .\" without specific prior written permission. 63 for read permission, 65 for write permission, and 67 for execute / search permission 166 the file may not actually have execute permission bits set. 200 Permission bits of the file mode do not permit the requested 201 access, or search permission is denied on a component of the 275 should not be relied upon for file permission enforcement purposes.
|
/freebsd-src/tests/sys/mac/bsdextended/ |
H A D | matches_test.sh | 114 atf_check -s not-exit:0 -e match:"Permission denied" \ 138 atf_check -s not-exit:0 -e match:"Permission denied" \ 194 atf_check -s not-exit:0 -e match:"Permission denied" \ 202 atf_check -s not-exit:0 -e match:"Permission denied" \ 226 atf_check -s not-exit:0 -e match:"Permission denied" \ 232 atf_check -s not-exit:0 -e match:"Permission denied" \ 258 atf_check -s not-exit:0 -e match:"Permission denied" \ 281 atf_check -s not-exit:0 -e match:"Permission denied" \ 306 atf_check -s not-exit:0 -e match:"Permission denied" \ 330 atf_check -s not-exit:0 -e match:"Permission denied" \ [all …]
|
/freebsd-src/tests/sys/cddl/zfs/tests/history/ |
H A D | history_009_pos.ksh | 42 # Ul$<id> identifies permission sets granted locally for this userid. 43 # Ud$<id> identifies permission sets granted on descendent datasets for 50 # Gl$<id> identifies permission sets granted locally for this groupid. 51 # Gd$<id> identifies permission sets granted on descendent datasets for 58 # El$ identifies permission sets granted locally for everyone. 59 # Ed$ identifies permission sets granted to descendent datasets 62 # c-$ identifies permission to create at dataset creation time. 63 # C-$ identifies permission sets to grant locally at dataset 71 # 2. Define permission sets and verify the internal history correctly.
|
/freebsd-src/sys/fs/p9fs/ |
H A D | p9_protocol.h | 121 P9PROTO_DMDIR = 0x80000000, /* permission bit for directories */ 122 P9PROTO_DMAPPEND = 0x40000000, /* permission bit for is append-only */ 123 P9PROTO_DMEXCL = 0x20000000, /* permission bit for exclusive use (only one open handle allowed) */ 124 P9PROTO_DMMOUNT = 0x10000000, /* permission bit for mount points */ 125 P9PROTO_DMAUTH = 0x08000000, /* permission bit for authentication file */ 126 P9PROTO_DMTMP = 0x04000000, /* permission bit for non-backed-up files */ 127 P9PROTO_DMSYMLINK = 0x02000000, /* permission bit for symbolic link (9P2000.u) */ 128 P9PROTO_DMLINK = 0x01000000, /* permission bit for hard-link (9P2000.u) */ 129 P9PROTO_DMDEVICE = 0x00800000, /* permission bit for device files (9P2000.u) */ 130 P9PROTO_DMNAMEDPIPE = 0x00200000,/* permission bi [all...] |
/freebsd-src/sys/contrib/openzfs/man/man8/ |
H A D | zfs-unallow.8 | 137 Delegates ZFS administration permission for the file systems to non-privileged 177 Permission names are the same as ZFS subcommand and property names. 199 allow subcommand Must also have the permission that is being allowed 309 Defines or adds permissions to a permission set. 314 Permission sets follow the same naming restrictions as ZFS file systems, but the 350 For example, if the permission is granted by an ancestor. 383 Removes permissions from a permission set. 409 mount point permission is set to 755 by default, user 431 Permission sets: 437 .Ss Example 3 : No Defining and Granting a Permission Set on a ZFS Dataset [all …]
|
H A D | zfs-allow.8 | 137 Delegates ZFS administration permission for the file systems to non-privileged 177 Permission names are the same as ZFS subcommand and property names. 199 allow subcommand Must also have the permission that is being allowed 309 Defines or adds permissions to a permission set. 314 Permission sets follow the same naming restrictions as ZFS file systems, but the 350 For example, if the permission is granted by an ancestor. 383 Removes permissions from a permission set. 409 mount point permission is set to 755 by default, user 431 Permission sets: 437 .Ss Example 3 : No Defining and Granting a Permission Set on a ZFS Dataset [all …]
|
/freebsd-src/sys/contrib/openzfs/module/zfs/ |
H A D | dsl_deleg.c | 31 * it is a local or descendent permission. The first letter 37 * Ul$<id> identifies permission sets granted locally for this userid. 38 * Ud$<id> identifies permission sets granted on descendent datasets for 43 * Gl$<id> identifies permission sets granted locally for this groupid. 44 * Gd$<id> identifies permission sets granted on descendent datasets for 49 * El$ identifies permission sets granted locally for everyone. 50 * Ed$ identifies permission sets granted to descendent datasets for 52 * c-$ identifies permission to create at dataset creation time. 53 * C-$ identifies permission sets to grant locally at dataset creation 59 * attribute for each allowed permission, suc [all...] |
/freebsd-src/bin/chmod/ |
H A D | chmod.1 | 18 .\" without specific prior written permission. 222 The user permission bits in the original mode of the file. 224 The group permission bits in the original mode of the file. 226 The other permission bits in the original mode of the file. 239 each permission bit specified in 256 each permission bit specified in 274 each permission bit specified in 296 The ``w'' permission on directories will permit file creation, relocation, 305 deny write permission to group and others.
|
/freebsd-src/sys/sys/ |
H A D | ipc.h | 11 * the permission of UNIX System Laboratories, Inc. 27 * without specific prior written permission. 79 unsigned short mode; /* r/w permission */ 90 mode_t mode; /* r/w permission */ 97 #define IPC_R 000400 /* read permission */ 98 #define IPC_W 000200 /* write/alter permission */ 99 #define IPC_M 010000 /* permission to change control info */
|
/freebsd-src/contrib/dialog/package/debian/ |
H A D | copyright | 31 Permission is hereby granted, free of charge, to any person obtaining a 39 The above copyright notice and this permission notice shall be included 58 Permission is hereby granted, free of charge, to any person obtaining a copy 65 The above copyright notice and this permission notice shall be included in 93 Permission to use, copy, modify, and distribute this software and its 96 both that copyright notice and this permission notice appear in 100 permission.
|
/freebsd-src/share/doc/psd/27.nfsrpc/ |
H A D | nfs.rfc.ms | 242 Permission denied. The caller does not have the 243 correct permission to perform the requested operation. 403 0000400&Read permission for owner. 404 0000200&Write permission for owner. 405 0000100&Execute and search permission for owner. 406 0000040&Read permission for group. 407 0000020&Write permission for group. 408 0000010&Execute and search permission for group. 409 0000004&Read permission for others. 410 0000002&Write permission for others. [all …]
|
/freebsd-src/bin/mkdir/ |
H A D | mkdir.1 | 18 .\" without specific prior written permission. 56 Set the file permission bits of the final created directory to 75 Intermediate directories are created with permission bits of 79 permission for the owner. 84 The user must have write permission in the parent directory.
|
/freebsd-src/share/man/man9/ |
H A D | vaccess.9 | 76 selects a component of the file permission bits based on comparing the 79 owner component of the permission bits is selected. 82 a match, then the group component of the permission bits is selected. 84 group, then the other component of the permission bits is selected. 98 Permission denied.
|