• Home
  • History
  • Annotate
  • Raw
  • Download
  • only in /macosx-10.5.8/xnu-1228.15.4/bsd/vfs/

Lines Matching defs:path

169        const char *path;	/* pathname of the target file       */
173 const char *path; /* pathname of the file to be created */
178 const char *path; /* pathname of the target file */
217 muap.path = uap->path;
258 UIO_USERSPACE, uap->path, ctx);
361 /* XXXAUDIT: Should we capture the type on the error path as well? */
647 * insure that everyone is out of the fast path who
691 /* Check if this file system supports path from id lookups. */
696 /* Legacy MNT_DOVOLFS flag also implies path from id lookups. */
928 * Note: unmount takes a path to the vnode mounted on as argument,
942 UIO_USERSPACE, uap->path, ctx);
1055 * anyone currently in the fast path that
1057 * dumped out and forced into the slow path
1065 * insure that everyone is out of the fast path who
1314 UIO_USERSPACE, uap->path, ctx);
1422 UIO_USERSPACE, uap->path, ctx);
1522 UIO_USERSPACE, uap->path, ctxp);
1813 * for this code path is to return 0 preemptively after zapping
1931 UIO_USERSPACE, uap->path, ctx);
1998 UIO_USERSPACE, uap->path, ctx);
2215 * because it's not passed as a parameter in the open path.
2270 * Indirect: uap->path Path to open (same as 'open')
2310 NDINIT(&nd, LOOKUP, FOLLOW | AUDITVNPATH1, UIO_USERSPACE, uap->path, vfs_context_current());
2340 NDINIT(&nd, LOOKUP, FOLLOW | AUDITVNPATH1, UIO_USERSPACE, uap->path, vfs_context_current());
2367 return(mkfifo1(ctx, uap->path, &va));
2375 UIO_USERSPACE, uap->path, ctx);
2525 * Indirect: uap->path Path to fifo (same as 'mkfifo')
2561 ciferror = mkfifo1(vfs_context_current(), uap->path, &va);
2577 return(mkfifo1(vfs_context_current(), uap->path, &va));
2607 UIO_USERSPACE, uap->path, ctx);
2689 /* build the path to the new link file */
2705 /* build the path to file we are linking to */
2729 // build the path to the destination of the link
2766 char *path;
2773 MALLOC_ZONE(path, char *, MAXPATHLEN, M_NAMEI, M_WAITOK);
2774 error = copyinstr(uap->path, path, MAXPATHLEN, &dummy);
2777 AUDIT_ARG(text, path); /* This is the link string */
2810 error = VNOP_SYMLINK(dvp, &vp, &nd.ni_cnd, &va, path, ctx);
2838 /* build the path to the new link file */
2848 (uintptr_t)path, (uintptr_t)new_link_path);
2880 FREE_ZONE(path, MAXPATHLEN, M_NAMEI);
2899 UIO_USERSPACE, uap->path, ctx);
2934 char *path = NULL;
3000 GET_PATH(path);
3001 if (path == NULL) {
3006 vn_getpath(vp, path, &len);
3025 (uintptr_t)path);
3031 // v_parent link because the path that got us to this
3033 // force the next call to get the path to ask the file
3045 FSE_ARG_STRING, len, path,
3051 if (path != NULL)
3052 RELEASE_PATH(path);
3083 NDINIT(&nd, DELETE, AUDITVNPATH1, UIO_USERSPACE, uap->path, ctx);
3096 NDINIT(&nd, DELETE, AUDITVNPATH1, UIO_USERSPACE, uap->path, ctx);
3539 NDINIT(&nd, LOOKUP, niopts, UIO_USERSPACE, uap->path, &context);
3721 stat1(user_addr_t path, user_addr_t ub, user_addr_t xsecurity, user_addr_t xsecurity_size, int isstat64)
3727 UIO_USERSPACE, path, ctx);
3734 return (stat1(uap->path, uap->ub, uap->xsecurity, uap->xsecurity_size, 0));
3744 return(stat1(uap->path, uap->ub, 0, 0, 0));
3750 return(stat1(uap->path, uap->ub, 0, 0, 1));
3756 return (stat1(uap->path, uap->ub, uap->xsecurity, uap->xsecurity_size, 1));
3762 lstat1(user_addr_t path, user_addr_t ub, user_addr_t xsecurity, user_addr_t xsecurity_size, int isstat64)
3768 UIO_USERSPACE, path, ctx);
3776 return (lstat1(uap->path, uap->ub, uap->xsecurity, uap->xsecurity_size, 0));
3782 return(lstat1(uap->path, uap->ub, 0, 0, 0));
3787 return(lstat1(uap->path, uap->ub, 0, 0, 1));
3793 return (lstat1(uap->path, uap->ub, uap->xsecurity, uap->xsecurity_size, 1));
3820 UIO_USERSPACE, uap->path, ctx);
3848 UIO_USERSPACE, uap->path, ctx);
3917 * Change flags of a file given a path name.
3930 UIO_USERSPACE, uap->path, ctx);
4019 * Change mode of a file given path name.
4026 chmod1(vfs_context_t ctx, user_addr_t path, struct vnode_attr *vap)
4032 UIO_USERSPACE, path, ctx);
4049 * Indirect: uap->path Path to object (same as 'chmod')
4094 error = chmod1(vfs_context_current(), uap->path, &va);
4113 return(chmod1(vfs_context_current(), uap->path, &va));
4197 * Set ownership given a path name.
4212 UIO_USERSPACE, uap->path, ctx);
4418 * name lookup first because auditing wants the path.
4421 UIO_USERSPACE, uap->path, ctx);
4472 * Truncate a file given its path name.
4488 UIO_USERSPACE, uap->path, ctx);
5093 // if the path is not just "/", then append a "/"
5276 mkdir1(vfs_context_t ctx, user_addr_t path, struct vnode_attr *vap)
5285 UIO_USERSPACE, path, ctx);
5361 ciferror = mkdir1(vfs_context_current(), uap->path, &va);
5375 return(mkdir1(vfs_context_current(), uap->path, &va));
5401 UIO_USERSPACE, uap->path, ctx);
5443 char *path = NULL;
5457 GET_PATH(path);
5458 if (path == NULL) {
5463 vn_getpath(vp, path, &len);
5498 (uintptr_t)path);
5510 FSE_ARG_STRING, len, path,
5516 if (path != NULL)
5517 RELEASE_PATH(path);
5817 UIO_USERSPACE, uap->path, ctx);
6267 UIO_USERSPACE, uap->path, ctx);
6394 NDINIT(&nd, LOOKUP, nameiflags, UIO_USERSPACE, uap->path, ctx);
6468 NDINIT(&nd, LOOKUP, nameiflags, spacetype, uap->path, ctx);
6582 NDINIT(&nd, LOOKUP, nameiflags, spacetype, uap->path, ctx);
6683 NDINIT(&nd, LOOKUP, nameiflags, spacetype, uap->path, ctx);
6768 NDINIT(&nd, LOOKUP, nameiflags, spacetype, uap->path, ctx);