Lines Matching defs:owner
129 * SID for generic creator-owner
284 offowner = le32_to_cpu(phead->owner);
493 * Find Linux owner mapped to a usid
623 * and owner and group SID are valid
629 offowner = le32_to_cpu(phead->owner);
652 && !(phead->owner & const_cpu_to_le32(3))
845 * creator-owner (and creator-group)
855 * Replace generic creator-owner and
856 * creator-group by owner and group
930 * Prepare grouping similar ACE for owner
999 * Reject multiple owner, group or other
1061 /* do not check owner, group or other are present in */
1409 /* owner was missing */
1700 /* a possible ACE to deny owner what he/she would */
1702 /* unless owner is administrator or group */
1841 /* but present if group is owner or owner is administrator */
1951 /* or administrator, unless owner is administrator or group */
2020 * 1) if root is neither owner nor group up to 7 ACE's are set up :
2021 * - denials to owner (preventing grants to world or group to apply)
2024 * - grants to owner (always present - first grant)
2045 * Note that denials to group are located after grants to owner.
2047 * has more rights than group and cannot be avoided if owner and other
2049 * executing has to be denied to group, but not to owner or world).
2052 * consequence of applying the group denials to the Windows owner.
2055 * 2) if root is either owner or group, two problems arise :
2059 * - there is no different SID to separate an administrator owner
2060 * from an administrator group. Hence Linux permissions for owner
2063 * as a work-around, up to 5 ACE's are set up if owner or group :
2064 * - grants to owner, always present at first position
2071 * are redundant (owner, group and administrator are the same,
2075 * neither grants to group are applied to owner, nor grants to
2076 * world are applied to owner or group.
2078 * 3) finally a similar situation arises when group is owner (they
2082 * - denials to owner (preventing grants to world to apply)
2083 * - grants to owner (always present)
2090 * are redundant (as owner and group are the same), but this has
2152 * Do the same if owner and group appear as designated
2221 * First insert all denials for owner and each
2246 /* insert denial ACEs for each owner or allowed user */
2282 * - grants to owner and designated users
2306 /* ACE for each owner or allowed user */
2476 /* compute a grant ACE for owner */
2477 /* this ACE will be inserted after denial for owner */
2498 /* a possible ACE to deny owner what he/she would */
2500 /* unless owner is administrator or group */
2569 /* now insert grants to owner */
2581 /* but present if group is owner or owner is administrator */
2606 /* or administrator, unless owner is administrator or group */
2820 pnhead->owner =
2911 pnhead->owner =
2934 * from owner, group and world grants as represented in ACEs
2938 le32 owner, le32 group, le32 world, le32 special)
2944 /* build owner permission */
2945 if (owner) {
2948 if (owner & DIR_GEXEC)
2951 if (owner & DIR_GWRITE)
2954 if (owner & DIR_GREAD)
2958 if (owner & FILE_GEXEC)
2961 if (owner & FILE_GWRITE)
2964 if (owner & FILE_GREAD)
3033 * (standard case : different owner, group and administrator)
3189 * (standard case : different owner, group and administrator)
3253 * No indication about owner's rights : grant basic rights
3261 * Add to owner rights granted to group or world
3276 * (special case : owner and group are the same,
3358 * (special case : owner or/and group is administrator)
3466 * (special case : owner or/and group is administrator)
3552 * Define the owner of a file as the first user allowed
3553 * to change the owner, instead of the user defined as owner.
3596 usid = (const SID*)&securattr[le32_to_cpu(phead->owner)];
3721 * and add 2 more to be able to insert ACEs for owner
3766 * Owner has no write-owner right :
3767 * a group was defined same as owner
3768 * or admin was owner or group :
3769 * denials are meant to owner
3796 * when group owns, late denials for owner
3975 * Set basic owner perms if none (both lists)