Lines Matching defs:group

143  *		SID for generic creator-group
180 * Local users group recognized as world
184 * as a mapped group.)
220 * Test whether a SID means "some user (or group)"
234 * Test whether a SID means "some special group"
273 * First check group, which is the last field in all descriptors
277 offgroup = le32_to_cpu(phead->group);
449 * Find Linux group mapped to a gsid
516 * Find Linux group mapped to a gsid
623 * and owner and group SID are valid
630 offgroup = le32_to_cpu(phead->group);
653 && !(phead->group & const_cpu_to_le32(3))
845 * creator-owner (and creator-group)
856 * creator-group by owner and group
999 * Reject multiple owner, group or other
1061 /* do not check owner, group or other are present in */
1418 /* owning group was missing */
1701 /* induely get from administrator, group or world */
1702 /* unless owner is administrator or group */
1839 /* a grant ACE for group */
1840 /* unless group-obj has the same rights as world */
1841 /* but present if group is owner or owner is administrator */
1842 /* this ACE will be inserted after denials for group */
1888 * each group
1893 * to some user group
1950 /* a possible ACE to deny group what it would get from world */
1951 /* or administrator, unless owner is administrator or group */
1988 /* now insert grants to group if more than world */
2020 * 1) if root is neither owner nor group up to 7 ACE's are set up :
2021 * - denials to owner (preventing grants to world or group to apply)
2026 * + mask denial to group (unless mask allows all)
2027 * - denials to group (preventing grants to world to apply)
2028 * - grants to group (unless group has no more than world rights)
2029 * + mask denials to designated group (unless mask allows all)
2030 * + grants to designated group
2031 * + denials to designated group
2045 * Note that denials to group are located after grants to owner.
2047 * has more rights than group and cannot be avoided if owner and other
2048 * have some common right which is denied to group (eg for mode 745
2049 * executing has to be denied to group, but not to owner or world).
2052 * consequence of applying the group denials to the Windows owner.
2055 * 2) if root is either owner or group, two problems arise :
2060 * from an administrator group. Hence Linux permissions for owner
2061 * would always be similar to permissions to group.
2063 * as a work-around, up to 5 ACE's are set up if owner or group :
2065 * - grants to group, always present
2071 * are redundant (owner, group and administrator are the same,
2075 * neither grants to group are applied to owner, nor grants to
2076 * world are applied to owner or group.
2078 * 3) finally a similar situation arises when group is owner (they
2084 * - grants to group (unless groups has same rights as world)
2090 * are redundant (as owner and group are the same), but this has
2149 * Determine what is allowed to some group or world
2152 * Do the same if owner and group appear as designated
2153 * user or group
2199 /* root as designated group is processed apart */
2315 /* denials and grants for group when needed */
2499 /* induely get from administrator, group or world */
2500 /* unless owner is administrator or group */
2579 /* a grant ACE for group */
2580 /* unless group has the same rights as world */
2581 /* but present if group is owner or owner is administrator */
2582 /* this ACE will be inserted after denials for group */
2605 /* a possible ACE to deny group what it would get from world */
2606 /* or administrator, unless owner is administrator or group */
2642 /* now insert grants to group */
2776 + 3*(8 + gsidsz) /* three possible ACE for group and mask */
2823 pnhead->group =
2875 + 2*(8 + gsidsz) /* two possible ACE for group */
2914 pnhead->group =
2934 * from owner, group and world grants as represented in ACEs
2938 le32 owner, le32 group, le32 world, le32 special)
2968 /* build group permission */
2969 if (group) {
2972 if (group & DIR_GEXEC)
2975 if (group & DIR_GWRITE)
2978 if (group & DIR_GREAD)
2982 if (group & FILE_GEXEC)
2985 if (group & FILE_GWRITE)
2988 if (group & FILE_GREAD)
3033 * (standard case : different owner, group and administrator)
3055 * Determine what is granted to some group or world
3189 * (standard case : different owner, group and administrator)
3261 * Add to owner rights granted to group or world
3262 * unless denied personaly, and add to group rights
3276 * (special case : owner and group are the same,
3358 * (special case : owner or/and group is administrator)
3466 * (special case : owner or/and group is administrator)
3720 * a group ACE later in access and default ACLs
3752 * grants for root as a designated user or group
3767 * a group was defined same as owner
3768 * or admin was owner or group :
3770 * and grants are meant to group
3796 * when group owns, late denials for owner
3797 * mean group mask
3904 * designated user or group
4008 * Also duplicate world perms as group perms if they
4009 * were converted to mask and not followed by a group entry
4321 struct MAPPING *group;
4326 /* do not free SIDs used for group mappings */
4327 group = mapping[MAPGROUPS];
4328 while (group && (group->sid != user->sid))
4329 group = group->next;
4330 if (!group)
4332 /* free group list if any */
4339 /* free group mappings */
4341 group = mapping[MAPGROUPS];
4342 free(group->sid);
4344 mapping[MAPGROUPS] = group->next;
4345 free(group);
4426 * Build the group mapping list
4427 * group identification may be given in symbolic or numeric format
4432 * ! Note ! : does getgrnam() read /etc/group or some other file ?
4443 struct group *grp;
4467 ntfs_log_early_error("Invalid group \"%s\"\n",