Searched refs:allow (Results 1 – 23 of 23) sorted by relevance
| /fs/nfsd/ |
| A D | nfs4acl.c | 420 u32 allow; member 484 state->mask.allow |= astate->allow; in add_to_mask() 518 low_mode_from_nfs4(state->owner.allow, &pace->e_perm, flags); in posix_state_to_acl() 523 low_mode_from_nfs4(state->users->aces[i].perms.allow, in posix_state_to_acl() 531 low_mode_from_nfs4(state->group.allow, &pace->e_perm, flags); in posix_state_to_acl() 537 low_mode_from_nfs4(state->groups->aces[i].perms.allow, in posix_state_to_acl() 546 low_mode_from_nfs4(state->mask.allow, &pace->e_perm, flags); in posix_state_to_acl() 559 astate->allow |= mask & ~astate->deny; in allow_bits() 565 astate->deny |= mask & ~astate->allow; in deny_bits() 579 a->aces[i].perms.allow = state->everyone.allow; in find_uid() [all …]
|
| A D | Kconfig | 16 Choose Y here if you want to allow other computers to access 157 support for NFS version 4. Security labels allow security modules like
|
| A D | nfs4proc.c | 3763 struct nfs4_op_map *allow = &cstate->clp->cl_spo_must_allow; in nfsd4_spo_must_allow() local 3776 if (test_bit(this->opnum, allow->u.longs) && in nfsd4_spo_must_allow()
|
| /fs/smb/server/ |
| A D | smbacl.c | 311 pace->e_perm = state->owner.allow; in posix_state_to_acl() 316 pace->e_perm = state->users->aces[i].perms.allow; in posix_state_to_acl() 321 pace->e_perm = state->group.allow; in posix_state_to_acl() 327 pace->e_perm = state->groups->aces[i].perms.allow; in posix_state_to_acl() 333 pace->e_perm = state->mask.allow; in posix_state_to_acl() 338 pace->e_perm = state->other.allow; in posix_state_to_acl() 538 acl_state.group.allow = (mode & 0070) >> 3; in parse_dacl() 554 acl_state.other.allow = mode & 0007; in parse_dacl() 555 default_acl_state.other.allow = mode & 0007; in parse_dacl() 559 acl_state.mask.allow = 0x07; in parse_dacl() [all …]
|
| A D | vfs.c | 1876 acl_state.owner.allow = (inode->i_mode & 0700) >> 6; in ksmbd_vfs_set_init_posix_acl() 1877 acl_state.group.allow = (inode->i_mode & 0070) >> 3; in ksmbd_vfs_set_init_posix_acl() 1878 acl_state.other.allow = inode->i_mode & 0007; in ksmbd_vfs_set_init_posix_acl() 1880 acl_state.users->aces[acl_state.users->n++].perms.allow = in ksmbd_vfs_set_init_posix_acl() 1881 acl_state.owner.allow; in ksmbd_vfs_set_init_posix_acl() 1883 acl_state.groups->aces[acl_state.groups->n++].perms.allow = in ksmbd_vfs_set_init_posix_acl() 1884 acl_state.group.allow; in ksmbd_vfs_set_init_posix_acl() 1885 acl_state.mask.allow = 0x07; in ksmbd_vfs_set_init_posix_acl()
|
| A D | smbacl.h | 52 u32 allow; member
|
| A D | Kconfig | 26 Choose Y here if you want to allow SMB3 compliant clients
|
| /fs/fuse/ |
| A D | Kconfig | 54 If you want to allow mounting a Virtio Filesystem with the "dax" 66 If you want to allow passthrough operations, answer Y. 77 If you want to allow fuse server/client communication through io-uring,
|
| A D | dir.c | 1489 bool allow; in fuse_allow_current_process() local 1492 allow = current_in_userns(fc->user_ns); in fuse_allow_current_process() 1494 allow = fuse_permissible_uidgid(fc); in fuse_allow_current_process() 1496 if (!allow && allow_sys_admin_access && capable(CAP_SYS_ADMIN)) in fuse_allow_current_process() 1497 allow = true; in fuse_allow_current_process() 1499 return allow; in fuse_allow_current_process()
|
| /fs/affs/ |
| A D | Changes | 100 - Changed partition checker to allow devices 167 - Added dentry callbacks to allow the dcache to 256 casing any more (though mv(1) still won't allow 316 - Fixed a nasty bug which didn't allow read-only
|
| /fs/bfs/ |
| A D | Kconfig | 8 allow the bootloader access to the kernel image and other important
|
| /fs/gfs2/ |
| A D | Kconfig | 15 a lock module to allow the computers coordinate their I/O so
|
| /fs/romfs/ |
| A D | Kconfig | 34 cache as the medium from which to retrieve data. It does not allow
|
| /fs/ufs/ |
| A D | Kconfig | 10 this file system as well. Saying Y here will allow you to read from
|
| /fs/isofs/ |
| A D | Kconfig | 8 Unix systems. The so-called Rock-Ridge extensions which allow for
|
| /fs/ocfs2/ |
| A D | Kconfig | 47 This option will allow OCFS2 to use userspace clustering services
|
| /fs/smb/client/ |
| A D | Kconfig | 60 Enabling this option will allow more detailed statistics on SMB 62 allow optional logging of slow responses to dmesg (depending on the
|
| /fs/ |
| A D | Kconfig.binfmt | 64 ELF FDPIC binaries are based on ELF, but allow the individual load
|
| /fs/nfs/ |
| A D | Kconfig | 67 protocol extension and you want your NFS client to allow
|
| A D | nfs4proc.c | 8836 .allow.u.words = { 8877 if (test_bit(i, sp->allow.u.longs)) in nfs4_sp4_select_mode() 8912 if (test_bit(OP_CLOSE, sp->allow.u.longs) && in nfs4_sp4_select_mode() 8914 test_bit(OP_DELEGRETURN, sp->allow.u.longs) && in nfs4_sp4_select_mode() 8915 test_bit(OP_LOCKU, sp->allow.u.longs)) { in nfs4_sp4_select_mode() 8920 if (test_bit(OP_LAYOUTRETURN, sp->allow.u.longs)) { in nfs4_sp4_select_mode() 8925 if (test_bit(OP_SECINFO, sp->allow.u.longs) && in nfs4_sp4_select_mode() 8931 if (test_bit(OP_TEST_STATEID, sp->allow.u.longs) && in nfs4_sp4_select_mode() 8932 test_bit(OP_FREE_STATEID, sp->allow.u.longs)) { in nfs4_sp4_select_mode() 8937 if (test_bit(OP_WRITE, sp->allow.u.longs)) { in nfs4_sp4_select_mode() [all …]
|
| A D | nfs4xdr.c | 1863 encode_op_map(xdr, &args->state_protect.allow); in encode_exchange_id() 5755 status = decode_op_map(xdr, &res->state_protect.allow); in decode_exchange_id()
|
| /fs/cramfs/ |
| A D | README | 64 the block data. This is used to allow discontiguous data layout
|
| /fs/befs/ |
| A D | ChangeLog | 106 linux VFS doesn't allow us to keep any state between calls. Updated
|
Completed in 89 milliseconds