Home
last modified time | relevance | path

Searched refs:access (Results 1 – 25 of 58) sorted by relevance

123

/fs/afs/
Dsecurity.c131 h += permits->permits[i].access; in afs_hash_permits()
168 if (permits->permits[i].access != caller_access) { in afs_cache_permit()
235 new->permits[j].access = caller_access; in afs_cache_permit()
239 new->permits[j].access = permits->permits[i].access; in afs_cache_permit()
246 new->permits[j].access = caller_access; in afs_cache_permit()
330 *_access = permits->permits[i].access; in afs_check_permit_rcu()
370 *_access = permits->permits[i].access; in afs_check_permit()
404 afs_access_t uninitialized_var(access); in afs_permission()
418 !afs_check_permit_rcu(vnode, key, &access)) in afs_permission()
432 ret = afs_check_permit(vnode, key, &access); in afs_permission()
[all …]
Dflock.c426 afs_access_t access; in afs_do_setlk_check() local
439 ret = afs_check_permit(vnode, key, &access); in afs_do_setlk_check()
450 if (!(access & (AFS_ACE_INSERT | AFS_ACE_WRITE | AFS_ACE_LOCK))) in afs_do_setlk_check()
453 if (!(access & (AFS_ACE_INSERT | AFS_ACE_WRITE))) in afs_do_setlk_check()
DKconfig9 driver. It currently only supports unsecured read-only AFS access.
/fs/nfsd/
Dnfs2acl.c172 argp->access); in nfsacld_proc_access()
175 resp->access = argp->access; in nfsacld_proc_access()
176 nfserr = nfsd_access(rqstp, &resp->fh, &resp->access, NULL); in nfsacld_proc_access()
242 argp->access = ntohl(*p++); in nfsaclsvc_decode_accessargs()
320 *p++ = htonl(resp->access); in nfsaclsvc_encode_accessres()
379 PROC(access, access, access, access, RC_NOCACHE, ST+AT+1),
Dnfsfh.c321 fh_verify(struct svc_rqst *rqstp, struct svc_fh *fhp, umode_t type, int access) in fh_verify() argument
369 if (access & NFSD_MAY_LOCK || access & NFSD_MAY_BYPASS_GSS) in fh_verify()
376 if (access & NFSD_MAY_BYPASS_GSS_ON_ROOT in fh_verify()
386 error = nfsd_permission(rqstp, exp, dentry, access); in fh_verify()
392 access, ntohl(error)); in fh_verify()
Dvfs.c584 u32 access; member
623 nfsd_access(struct svc_rqst *rqstp, struct svc_fh *fhp, u32 *access, u32 *supported) in nfsd_access() argument
646 query = *access; in nfsd_access()
647 for (; map->access; map++) { in nfsd_access()
648 if (map->access & query) { in nfsd_access()
651 sresult |= map->access; in nfsd_access()
656 result |= map->access; in nfsd_access()
672 *access = result; in nfsd_access()
681 int nfsd_open_break_lease(struct inode *inode, int access) in nfsd_open_break_lease() argument
685 if (access & NFSD_MAY_NOT_BREAK_LEASE) in nfsd_open_break_lease()
[all …]
Dnfs4state.c544 __nfs4_file_get_access(struct nfs4_file *fp, u32 access) in __nfs4_file_get_access() argument
548 if (access & NFS4_SHARE_ACCESS_WRITE) in __nfs4_file_get_access()
550 if (access & NFS4_SHARE_ACCESS_READ) in __nfs4_file_get_access()
555 nfs4_file_get_access(struct nfs4_file *fp, u32 access) in nfs4_file_get_access() argument
560 if (access & ~NFS4_SHARE_ACCESS_BOTH) in nfs4_file_get_access()
564 if ((access & fp->fi_share_deny) != 0) in nfs4_file_get_access()
567 __nfs4_file_get_access(fp, access); in nfs4_file_get_access()
609 static void nfs4_file_put_access(struct nfs4_file *fp, u32 access) in nfs4_file_put_access() argument
611 WARN_ON_ONCE(access & ~NFS4_SHARE_ACCESS_BOTH); in nfs4_file_put_access()
613 if (access & NFS4_SHARE_ACCESS_WRITE) in nfs4_file_put_access()
[all …]
Dxdr3.h28 unsigned int access; member
140 __u32 access; member
Dnfs3proc.c120 argp->access); in nfsd3_proc_access()
123 resp->access = argp->access; in nfsd3_proc_access()
124 nfserr = nfsd_access(rqstp, &resp->fh, &resp->access, NULL); in nfsd3_proc_access()
DKconfig13 Choose Y here if you want to allow other computers to access
63 access and modify ACLs on your NFS server.
/fs/9p/
Dfid.c106 int i, n, l, clone, access; in v9fs_fid_lookup_with_uid() local
111 access = v9ses->flags & V9FS_ACCESS_MASK; in v9fs_fid_lookup_with_uid()
134 if (access == V9FS_ACCESS_SINGLE) in v9fs_fid_lookup_with_uid()
219 int any, access; in v9fs_fid_lookup() local
223 access = v9ses->flags & V9FS_ACCESS_MASK; in v9fs_fid_lookup()
224 switch (access) { in v9fs_fid_lookup()
DKconfig38 Security labels support alternative access control models
/fs/notify/fanotify/
DKconfig3 bool "Filesystem wide access notification"
8 Say Y here to enable fanotify support. fanotify is a file access
23 listeners which need to scan files before allowing the system access to
/fs/ceph/
DKconfig14 reliable access to petabytes of storage.
44 Security labels support alternative access control models
/fs/jffs2/
DREADME.Locking74 This is used to serialise access to the eraseblock lists, to the
112 will not be removed. So, it is allowed to access it without locking
141 This read/write semaphore protects against concurrent access to the
154 This read/write semaphore protects against concurrent access to the
/fs/fat/
DKconfig9 diskettes with FAT-based file systems and transparently access the
41 they are compressed; to access compressed MSDOS partitions under
47 here) and MSDOS floppies. This means that file access becomes
/fs/hfs/
DKconfig8 floppy disks and hard drive partitions with full read-write access.
/fs/hfsplus/
DKconfig9 Macintosh-formatted hard drive partitions with full read-write access.
/fs/efs/
DKconfig10 This implementation only offers read-only access. If you don't know
/fs/bfs/
DKconfig7 allow the bootloader access to the kernel image and other important
/fs/ext2/
DKconfig35 Security labels support alternative access control models
/fs/coda/
DKconfig7 enables you to mount file systems of a remote server and access them
/fs/freevxfs/
DKconfig13 Currently only readonly access is supported and VxFX versions
/fs/kernfs/
Dfile.c406 if (of->vm_ops->access) in kernfs_vma_access()
407 ret = of->vm_ops->access(vma, addr, buf, len, write); in kernfs_vma_access()
462 .access = kernfs_vma_access,
/fs/jfs/
DKconfig26 Security labels support alternative access control models

123