Home
last modified time | relevance | path

Searched refs:access (Results 1 – 25 of 63) sorted by relevance

123

/fs/afs/
Dsecurity.c131 h += permits->permits[i].access; in afs_hash_permits()
168 if (permits->permits[i].access != caller_access) { in afs_cache_permit()
234 new->permits[j].access = caller_access; in afs_cache_permit()
238 new->permits[j].access = permits->permits[i].access; in afs_cache_permit()
245 new->permits[j].access = caller_access; in afs_cache_permit()
328 *_access = permits->permits[i].access; in afs_check_permit_rcu()
368 *_access = permits->permits[i].access; in afs_check_permit()
402 afs_access_t access; in afs_permission() local
416 !afs_check_permit_rcu(vnode, key, &access)) in afs_permission()
430 ret = afs_check_permit(vnode, key, &access); in afs_permission()
[all …]
Dflock.c415 afs_access_t access; in afs_do_setlk_check() local
428 ret = afs_check_permit(vnode, key, &access); in afs_do_setlk_check()
439 if (!(access & (AFS_ACE_INSERT | AFS_ACE_WRITE | AFS_ACE_LOCK))) in afs_do_setlk_check()
442 if (!(access & (AFS_ACE_INSERT | AFS_ACE_WRITE))) in afs_do_setlk_check()
DKconfig9 driver. It currently only supports unsecured read-only AFS access.
/fs/9p/
Dfid.c106 int i, n, l, clone, access; in v9fs_fid_lookup_with_uid() local
111 access = v9ses->flags & V9FS_ACCESS_MASK; in v9fs_fid_lookup_with_uid()
134 if (access == V9FS_ACCESS_SINGLE) in v9fs_fid_lookup_with_uid()
219 int any, access; in v9fs_fid_lookup() local
223 access = v9ses->flags & V9FS_ACCESS_MASK; in v9fs_fid_lookup()
224 switch (access) { in v9fs_fid_lookup()
DKconfig38 Security labels support alternative access control models
/fs/notify/fanotify/
DKconfig3 bool "Filesystem wide access notification"
8 Say Y here to enable fanotify support. fanotify is a file access
23 listeners which need to scan files before allowing the system access to
/fs/nfsd/
Dnfs2acl.c173 argp->access); in nfsacld_proc_access()
176 resp->access = argp->access; in nfsacld_proc_access()
177 resp->status = nfsd_access(rqstp, &resp->fh, &resp->access, NULL); in nfsacld_proc_access()
249 argp->access = ntohl(*p++); in nfsaclsvc_decode_accessargs()
340 *p++ = htonl(resp->access); in nfsaclsvc_encode_accessres()
Dnfsfh.c328 fh_verify(struct svc_rqst *rqstp, struct svc_fh *fhp, umode_t type, int access) in fh_verify() argument
376 if (access & NFSD_MAY_LOCK || access & NFSD_MAY_BYPASS_GSS) in fh_verify()
383 if (access & NFSD_MAY_BYPASS_GSS_ON_ROOT in fh_verify()
393 error = nfsd_permission(rqstp, exp, dentry, access); in fh_verify()
399 access, ntohl(error)); in fh_verify()
Dvfs.c614 u32 access; member
665 nfsd_access(struct svc_rqst *rqstp, struct svc_fh *fhp, u32 *access, u32 *supported) in nfsd_access() argument
688 query = *access; in nfsd_access()
689 for (; map->access; map++) { in nfsd_access()
690 if (map->access & query) { in nfsd_access()
693 sresult |= map->access; in nfsd_access()
698 result |= map->access; in nfsd_access()
714 *access = result; in nfsd_access()
723 int nfsd_open_break_lease(struct inode *inode, int access) in nfsd_open_break_lease() argument
727 if (access & NFSD_MAY_NOT_BREAK_LEASE) in nfsd_open_break_lease()
[all …]
Dnfs4state.c569 __nfs4_file_get_access(struct nfs4_file *fp, u32 access) in __nfs4_file_get_access() argument
573 if (access & NFS4_SHARE_ACCESS_WRITE) in __nfs4_file_get_access()
575 if (access & NFS4_SHARE_ACCESS_READ) in __nfs4_file_get_access()
580 nfs4_file_get_access(struct nfs4_file *fp, u32 access) in nfs4_file_get_access() argument
585 if (access & ~NFS4_SHARE_ACCESS_BOTH) in nfs4_file_get_access()
589 if ((access & fp->fi_share_deny) != 0) in nfs4_file_get_access()
592 __nfs4_file_get_access(fp, access); in nfs4_file_get_access()
634 static void nfs4_file_put_access(struct nfs4_file *fp, u32 access) in nfs4_file_put_access() argument
636 WARN_ON_ONCE(access & ~NFS4_SHARE_ACCESS_BOTH); in nfs4_file_put_access()
638 if (access & NFS4_SHARE_ACCESS_WRITE) in nfs4_file_put_access()
[all …]
Dxdr3.h28 unsigned int access; member
140 __u32 access; member
Dnfs3proc.c113 argp->access); in nfsd3_proc_access()
116 resp->access = argp->access; in nfsd3_proc_access()
117 resp->status = nfsd_access(rqstp, &resp->fh, &resp->access, NULL); in nfsd3_proc_access()
DKconfig13 Choose Y here if you want to allow other computers to access
63 access and modify ACLs on your NFS server.
/fs/ceph/
DKconfig14 reliable access to petabytes of storage.
44 Security labels support alternative access control models
/fs/jffs2/
DREADME.Locking74 This is used to serialise access to the eraseblock lists, to the
112 will not be removed. So, it is allowed to access it without locking
141 This read/write semaphore protects against concurrent access to the
154 This read/write semaphore protects against concurrent access to the
/fs/fat/
DKconfig9 diskettes with FAT-based file systems and transparently access the
41 they are compressed; to access compressed MSDOS partitions under
47 here) and MSDOS floppies. This means that file access becomes
/fs/hfs/
DKconfig8 floppy disks and hard drive partitions with full read-write access.
/fs/hfsplus/
DKconfig9 Macintosh-formatted hard drive partitions with full read-write access.
/fs/efs/
DKconfig10 This implementation only offers read-only access. If you don't know
/fs/bfs/
DKconfig7 allow the bootloader access to the kernel image and other important
/fs/coda/
DKconfig7 enables you to mount file systems of a remote server and access them
/fs/ext2/
DKconfig35 Security labels support alternative access control models
/fs/freevxfs/
DKconfig13 Currently only readonly access is supported and VxFX versions
/fs/kernfs/
Dfile.c387 if (of->vm_ops->access) in kernfs_vma_access()
388 ret = of->vm_ops->access(vma, addr, buf, len, write); in kernfs_vma_access()
443 .access = kernfs_vma_access,
/fs/jfs/
DKconfig26 Security labels support alternative access control models

123