Home
last modified time | relevance | path

Searched refs:access (Results 1 – 25 of 55) sorted by relevance

123

/fs/ncpfs/
Dfile.c37 int access; in ncp_make_open() local
56 finfo.access = O_RDWR; in ncp_make_open()
65 finfo.access = O_RDONLY; in ncp_make_open()
71 finfo.access = O_WRONLY; in ncp_make_open()
89 access = NCP_FINFO(inode)->access; in ncp_make_open()
90 PPRINTK("ncp_make_open: file open, access=%x\n", access); in ncp_make_open()
91 if (access == right || access == O_RDWR) { in ncp_make_open()
DKconfig11 to mount NetWare file server volumes and to access them just like
93 may be useful, if you want to access the server with other operating
/fs/afs/
Dsecurity.c290 afs_access_t uninitialized_var(access); in afs_permission()
313 ret = afs_check_permit(vnode, key, &access); in afs_permission()
319 mask, access, S_ISDIR(inode->i_mode) ? "dir" : "file"); in afs_permission()
323 if (!(access & AFS_ACE_LOOKUP)) in afs_permission()
326 if (!(access & AFS_ACE_READ)) in afs_permission()
329 if (!(access & (AFS_ACE_DELETE | /* rmdir, unlink, rename from */ in afs_permission()
337 if (!(access & AFS_ACE_LOOKUP)) in afs_permission()
340 if (!(access & AFS_ACE_READ)) in afs_permission()
343 if (!(access & AFS_ACE_WRITE)) in afs_permission()
DKconfig7 driver. It currently only supports unsecured read-only AFS access.
/fs/nfsd/
Dnfs2acl.c151 argp->access); in nfsacld_proc_access()
154 resp->access = argp->access; in nfsacld_proc_access()
155 nfserr = nfsd_access(rqstp, &resp->fh, &resp->access, NULL); in nfsacld_proc_access()
211 argp->access = ntohl(*p++); in nfsaclsvc_decode_accessargs()
280 *p++ = htonl(resp->access); in nfsaclsvc_encode_accessres()
340 PROC(access, access, access, access, RC_NOCACHE, ST+AT+1),
Dnfs3proc.c131 argp->access); in nfsd3_proc_access()
134 resp->access = argp->access; in nfsd3_proc_access()
135 nfserr = nfsd_access(rqstp, &resp->fh, &resp->access, NULL); in nfsd3_proc_access()
691 PROC(access, access, access, fhandle, RC_NOCACHE, ST+pAT+1),
Dvfs.c566 u32 access; member
605 nfsd_access(struct svc_rqst *rqstp, struct svc_fh *fhp, u32 *access, u32 *supported) in nfsd_access() argument
628 query = *access; in nfsd_access()
629 for (; map->access; map++) { in nfsd_access()
630 if (map->access & query) { in nfsd_access()
633 sresult |= map->access; in nfsd_access()
638 result |= map->access; in nfsd_access()
654 *access = result; in nfsd_access()
672 int access, struct file **filp) in nfsd_open() argument
686 err = fh_verify(rqstp, fhp, type, access | NFSD_MAY_OWNER_OVERRIDE); in nfsd_open()
[all …]
Dnfsfh.c289 fh_verify(struct svc_rqst *rqstp, struct svc_fh *fhp, int type, int access) in fh_verify() argument
333 if (access & NFSD_MAY_LOCK) in fh_verify()
340 if (access & NFSD_MAY_BYPASS_GSS_ON_ROOT in fh_verify()
350 error = nfsd_permission(rqstp, exp, dentry, access); in fh_verify()
357 access, ntohl(error)); in fh_verify()
DKconfig9 Choose Y here if you want to allow other computers to access
59 access and modify ACLs on your NFS server.
Dnfs4proc.c331 struct nfsd4_access *access) in nfsd4_access() argument
333 if (access->ac_req_access & ~NFS3_ACCESS_FULL) in nfsd4_access()
336 access->ac_resp_access = access->ac_req_access; in nfsd4_access()
337 return nfsd_access(rqstp, &cstate->current_fh, &access->ac_resp_access, in nfsd4_access()
338 &access->ac_supported); in nfsd4_access()
/fs/gfs2/
Dacl.c34 int gfs2_acl_validate_set(struct gfs2_inode *ip, int access, in gfs2_acl_validate_set() argument
41 error = gfs2_acl_validate_remove(ip, access); in gfs2_acl_validate_set()
60 if (access) { in gfs2_acl_validate_set()
73 int gfs2_acl_validate_remove(struct gfs2_inode *ip, int access) in gfs2_acl_validate_remove() argument
81 if (!access && !S_ISDIR(ip->i_inode.i_mode)) in gfs2_acl_validate_remove()
87 static int acl_get(struct gfs2_inode *ip, int access, struct posix_acl **acl, in acl_get() argument
98 if (access) { in acl_get()
Dacl.h30 int gfs2_acl_validate_set(struct gfs2_inode *ip, int access,
33 int gfs2_acl_validate_remove(struct gfs2_inode *ip, int access);
/fs/9p/
Dfid.c111 int i, n, l, clone, any, access; in v9fs_fid_lookup() local
119 access = v9ses->flags & V9FS_ACCESS_MASK; in v9fs_fid_lookup()
120 switch (access) { in v9fs_fid_lookup()
151 if (access == V9FS_ACCESS_SINGLE) in v9fs_fid_lookup()
/fs/nfs/
Dnfs3proc.c200 arg.access |= NFS3_ACCESS_READ; in nfs3_proc_access()
203 arg.access |= NFS3_ACCESS_MODIFY | NFS3_ACCESS_EXTEND | NFS3_ACCESS_DELETE; in nfs3_proc_access()
205 arg.access |= NFS3_ACCESS_LOOKUP; in nfs3_proc_access()
208 arg.access |= NFS3_ACCESS_MODIFY | NFS3_ACCESS_EXTEND; in nfs3_proc_access()
210 arg.access |= NFS3_ACCESS_EXECUTE; in nfs3_proc_access()
217 if (res.access & NFS3_ACCESS_READ) in nfs3_proc_access()
219 if (res.access & (NFS3_ACCESS_MODIFY | NFS3_ACCESS_EXTEND | NFS3_ACCESS_DELETE)) in nfs3_proc_access()
221 if (res.access & (NFS3_ACCESS_LOOKUP|NFS3_ACCESS_EXECUTE)) in nfs3_proc_access()
812 .access = nfs3_proc_access,
DKconfig8 Choose Y here if you want to access files residing on other
54 applications to access and modify ACLs on files on the server.
/fs/fat/
DKconfig8 diskettes with FAT-based file systems and transparently access the
40 they are compressed; to access compressed MSDOS partitions under
46 here) and MSDOS floppies. This means that file access becomes
/fs/jffs2/
DREADME.Locking77 This is used to serialise access to the eraseblock lists, to the
115 will not be removed. So, it is allowed to access it without locking
144 This read/write semaphore protects against concurrent access to the
157 This read/write semaphore protects against concurrent access to the
/fs/hfs/
DKconfig7 floppy disks and hard drive partitions with full read-write access.
/fs/hfsplus/
DKconfig8 Macintosh-formatted hard drive partitions with full read-write access.
/fs/efs/
DKconfig9 This implementation only offers read-only access. If you don't know
/fs/freevxfs/
DKconfig9 Currently only readonly access is supported.
/fs/coda/
DKconfig6 enables you to mount file systems of a remote server and access them
/fs/bfs/
DKconfig6 allow the bootloader access to the kernel image and other important
/fs/jfs/
DKconfig27 Security labels support alternative access control models
/fs/ocfs2/
Ddir.c515 ocfs2_journal_access_func access = ocfs2_journal_access_db; in ocfs2_update_entry() local
524 access = ocfs2_journal_access_di; in ocfs2_update_entry()
526 ret = access(handle, dir, de_bh, OCFS2_JOURNAL_ACCESS_WRITE); in ocfs2_update_entry()
548 ocfs2_journal_access_func access = ocfs2_journal_access_db; in __ocfs2_delete_entry() local
553 access = ocfs2_journal_access_di; in __ocfs2_delete_entry()
565 status = access(handle, dir, bh, in __ocfs2_delete_entry()

123