Lines Matching refs:security
350 scx->mapping[MAPUSERS] = ctx->security.mapping[MAPUSERS]; in ntfs_fuse_fill_security_context()
351 scx->mapping[MAPGROUPS] = ctx->security.mapping[MAPGROUPS]; in ntfs_fuse_fill_security_context()
372 return (ctx->security.mapping[MAPUSERS] != (struct MAPPING*)NULL); in ntfs_fuse_fill_security_context()
988 struct SECURITY_CONTEXT security; in ntfs_fuse_getattr() local
994 ntfs_fuse_fill_security_context(req, &security); in ntfs_fuse_getattr()
995 res = ntfs_fuse_getstat(&security, ni, &stbuf); in ntfs_fuse_getattr()
1030 struct SECURITY_CONTEXT security; in ntfs_fuse_lookup() local
1043 if (ntfs_fuse_fill_security_context(req, &security) in ntfs_fuse_lookup()
1044 && !ntfs_allowed_access(&security,dir_ni,S_IEXEC)) { in ntfs_fuse_lookup()
1049 ntfs_fuse_fill_security_context(req, &security); in ntfs_fuse_lookup()
1061 &security,&entry,iref); in ntfs_fuse_lookup()
1383 struct SECURITY_CONTEXT security; in ntfs_fuse_opendir() local
1387 if (ntfs_fuse_fill_security_context(req, &security)) { in ntfs_fuse_opendir()
1395 if (!ntfs_allowed_access(&security,ni,accesstype)) in ntfs_fuse_opendir()
1611 struct SECURITY_CONTEXT security; in ntfs_fuse_open() local
1624 if (ntfs_fuse_fill_security_context(req, &security)) { in ntfs_fuse_open()
1633 if (!ntfs_allowed_access(&security, in ntfs_fuse_open()
2219 struct SECURITY_CONTEXT security; in ntfs_fuse_setattr() local
2222 ntfs_fuse_fill_security_context(req, &security); in ntfs_fuse_setattr()
2233 res = ntfs_fuse_getstat(&security, ni, &stbuf); in ntfs_fuse_setattr()
2246 res = ntfs_fuse_chmod(&security, ino, in ntfs_fuse_setattr()
2250 res = ntfs_fuse_chown(&security, ino, attr->st_uid, in ntfs_fuse_setattr()
2254 res = ntfs_fuse_chown(&security, ino, (uid_t)-1, in ntfs_fuse_setattr()
2258 res = ntfs_fuse_chown(&security, ino, attr->st_uid, in ntfs_fuse_setattr()
2262 res = ntfs_fuse_chownmod(&security, ino, attr->st_uid, in ntfs_fuse_setattr()
2267 res = ntfs_fuse_chownmod(&security, ino, (uid_t)-1, in ntfs_fuse_setattr()
2272 res = ntfs_fuse_chownmod(&security, ino, attr->st_uid, in ntfs_fuse_setattr()
2281 res = ntfs_fuse_trunc(&security, ino, attr->st_size, in ntfs_fuse_setattr()
2287 res = ntfs_fuse_utimens(&security, ino, attr, &stbuf, to_set); in ntfs_fuse_setattr()
2289 res = ntfs_fuse_utime(&security, ino, attr, &stbuf); in ntfs_fuse_setattr()
2305 struct SECURITY_CONTEXT security; in ntfs_fuse_access() local
2308 if (!ntfs_fuse_fill_security_context(req, &security)) { in ntfs_fuse_access()
2323 if (!ntfs_allowed_access(&security, in ntfs_fuse_access()
2353 struct SECURITY_CONTEXT security; in ntfs_fuse_create() local
2377 if (!ntfs_fuse_fill_security_context(req, &security) in ntfs_fuse_create()
2378 || ntfs_allowed_create(&security, in ntfs_fuse_create()
2381 ntfs_fuse_fill_security_context(req, &security); in ntfs_fuse_create()
2382 ntfs_allowed_create(&security, dir_ni, &gid, &dsetgid); in ntfs_fuse_create()
2399 if (!ctx->security.mapping[MAPUSERS]) in ntfs_fuse_create()
2403 securid = ntfs_inherited_id(&security, in ntfs_fuse_create()
2407 securid = ntfs_alloc_securid(&security, in ntfs_fuse_create()
2408 security.uid, gid, in ntfs_fuse_create()
2411 securid = ntfs_alloc_securid(&security, in ntfs_fuse_create()
2412 security.uid, gid, in ntfs_fuse_create()
2413 perm & ~security.umask, S_ISDIR(type)); in ntfs_fuse_create()
2466 if (ctx->security.mapping[MAPUSERS]) { in ntfs_fuse_create()
2469 && ntfs_set_inherited_posix(&security, ni, in ntfs_fuse_create()
2470 security.uid, gid, in ntfs_fuse_create()
2475 && ntfs_set_owner_mode(&security, ni, in ntfs_fuse_create()
2476 security.uid, gid, in ntfs_fuse_create()
2477 perm & ~security.umask) < 0) in ntfs_fuse_create()
2501 res = ntfs_fuse_getstat(&security, ni, &e->attr); in ntfs_fuse_create()
2590 struct SECURITY_CONTEXT security; in ntfs_fuse_newlink() local
2622 if (ntfs_fuse_fill_security_context(req, &security) in ntfs_fuse_newlink()
2623 && !ntfs_allowed_access(&security,dir_ni,S_IWRITE + S_IEXEC)) in ntfs_fuse_newlink()
2627 ntfs_fuse_fill_security_context(req, &security); in ntfs_fuse_newlink()
2655 res = ntfs_fuse_getstat(&security, ni, &e->attr); in ntfs_fuse_newlink()
2700 struct SECURITY_CONTEXT security; in ntfs_fuse_rm() local
2777 if (ntfs_fuse_fill_security_context(req, &security) in ntfs_fuse_rm()
2778 && !ntfs_allowed_dir_access(&security, dir_ni, ino, ni, in ntfs_fuse_rm()
2957 struct SECURITY_CONTEXT security; in ntfs_fuse_rename_existing_dest() local
2982 if (!ntfs_fuse_fill_security_context(req,&security) in ntfs_fuse_rename_existing_dest()
2983 || ntfs_allowed_dir_access(&security, newdir_ni, in ntfs_fuse_rename_existing_dest()
3318 struct SECURITY_CONTEXT *security, in ntfs_check_access_xattr() argument
3336 if (((!ntfs_fuse_fill_security_context(req, security) in ntfs_check_access_xattr()
3342 if (ctx->silent && !ctx->security.mapping[MAPUSERS]) in ntfs_check_access_xattr()
3363 || !ntfs_real_allowed_access(security, in ntfs_check_access_xattr()
3369 if (!ntfs_real_allowed_access(security, in ntfs_check_access_xattr()
3470 struct SECURITY_CONTEXT security; in ntfs_fuse_listxattr() local
3474 ntfs_fuse_fill_security_context(req, &security); in ntfs_fuse_listxattr()
3486 if (!ntfs_allowed_access(&security,ni,S_IREAD)) { in ntfs_fuse_listxattr()
3551 struct SECURITY_CONTEXT security; local
3574 ni = ntfs_check_access_xattr(req, &security, ino,
3577 if (ntfs_allowed_access(&security,ni,S_IREAD)) {
3582 res = ntfs_xattr_system_getxattr(&security,
3600 ntfs_fuse_fill_security_context(req, &security);
3605 res = ntfs_xattr_system_getxattr(&security,
3636 ntfs_fuse_fill_security_context(req,&security);
3639 && security.uid) {
3656 if (!ntfs_allowed_access(&security, ni, S_IREAD)) {
3732 struct SECURITY_CONTEXT security; local
3754 ni = ntfs_check_access_xattr(req,&security,ino,attr,TRUE);
3756 if (ntfs_allowed_as_owner(&security, ni)) {
3761 res = ntfs_xattr_system_setxattr(&security,
3780 ni = ntfs_check_access_xattr(req, &security,
3789 if (!ntfs_fuse_fill_security_context(req, &security)
3790 || ntfs_allowed_as_owner(&security, ni)) {
3795 res = ntfs_xattr_system_setxattr(&security,
3841 ntfs_fuse_fill_security_context(req,&security);
3845 && security.uid) {
3859 if (security.uid) {
3865 if (!ntfs_allowed_as_owner(&security, ni)) {
3876 if (!ntfs_allowed_access(&security,ni,S_IWRITE)) {
3979 struct SECURITY_CONTEXT security; local
4000 ni = ntfs_check_access_xattr(req, &security, ino,
4003 if (ntfs_allowed_as_owner(&security, ni)) {
4008 res = ntfs_xattr_system_removexattr(&security,
4027 ni = ntfs_check_access_xattr(req, &security,
4036 if (!ntfs_fuse_fill_security_context(req, &security)
4037 || ntfs_allowed_as_owner(&security, ni)) {
4042 res = ntfs_xattr_system_removexattr(&security,
4091 ntfs_fuse_fill_security_context(req,&security);
4095 && security.uid) {
4109 if (security.uid) {
4115 if (!ntfs_allowed_as_owner(&security, ni)) {
4126 if (!ntfs_allowed_access(&security,ni,S_IWRITE)) {
4205 struct SECURITY_CONTEXT security; local
4216 if (ntfs_fuse_fill_security_context((fuse_req_t)NULL, &security)) {
4228 ntfs_destroy_security_context(&security);
4685 ctx->security.uid = 0;
4686 ctx->security.gid = 0;
4690 ctx->security.uid = sbuf.st_uid;
4691 ctx->security.gid = sbuf.st_gid;
4747 ctx->security.vol = ctx->vol;
4752 if (!ntfs_build_mapping(&ctx->security,ctx->usermap_path,
4790 ctx->security.uid = ctx->uid;
4791 ctx->security.gid = ctx->gid;
4793 ctx->security.mapping[MAPUSERS] = (struct MAPPING*)NULL;
4794 ctx->security.mapping[MAPGROUPS] = (struct MAPPING*)NULL;