Lines Matching defs:to

4  * The contents of this file are subject to the terms of the
108 * macro for static dtrace probes to trace server namespace ref count mods.
189 * Allocate and copy a secinfo data from "from" to "to".
191 * This routine is used by srv_secinfo_add() to add a new flavor to an
193 * allowable rootname access only applies to the explicit exported node,
196 * "to" should have already been allocated and zeroed before calling
202 srv_secinfo_copy(struct secinfo *from, struct secinfo *to)
204 to->s_secinfo.sc_nfsnum = from->s_secinfo.sc_nfsnum;
205 to->s_secinfo.sc_rpcnum = from->s_secinfo.sc_rpcnum;
208 to->s_secinfo.sc_service = from->s_secinfo.sc_service;
209 bcopy(from->s_secinfo.sc_name, to->s_secinfo.sc_name,
211 bcopy(from->s_secinfo.sc_gss_mech, to->s_secinfo.sc_gss_mech,
215 to->s_secinfo.sc_gss_mech_type =
217 to->s_secinfo.sc_gss_mech_type->length =
219 to->s_secinfo.sc_gss_mech_type->elements =
223 to->s_secinfo.sc_gss_mech_type->elements,
227 to->s_refcnt = from->s_refcnt;
228 to->s_window = from->s_window;
229 /* no need to copy the mode bits - s_flags */
234 * flavor list is used to propagate flavor ref counts to an
277 * Add the new security flavors from newdata to the current list, pcursec.
320 /* move current secinfo list data to the new list */
390 * counts are decremented and propagated to ancestors.
424 return; /* no change; no flavors to remove */
435 /* walk thru the given secinfo list to remove the flavors */
450 * within the list have either been moved to msec or freed
462 * 2) transfer flavor refs of descendants to new/reshared exportdata
469 * If there is more than 1 export reference to an old flavor (i.e. some
471 * needs to be transferred to the new exportdata struct. A flavor in
500 * refs to the new seclist (curdata.ex_secinfo).
516 * add old reference to the current
527 * to account for the initial reference.
546 return; /* no more transfer to do */
554 /* move current secinfo list data to the new list */
605 * if there is more than 1 export reference to an old flavor (i.e. some of
606 * its children shared with this flavor), this flavor information needs to
607 * be transferred to the new shared node.
625 * transfer the information to the curdata.
635 return; /* no transfer to do */
676 * Note: We could add new pointer either to treenode or
677 * to exp_visible, which will point there directly.
728 * Move to parent node and propagate sec flavor
729 * to exportinfo and to visible structures.
805 * is all zeroes. It is initially set to the root filesystem.
848 * Finalization routine for export routines. Called to cleanup previously
884 * This routine is used by rpc to map rpc security number
885 * to nfs specific security flavor number.
891 * we cast them to void.
957 * table, assign the nfsflavor to NFS_FLAVOR_NOMAP. In V4, we may
965 * rpcsec_gss module calls this routine to do the mapping,
968 * What we need is to let the nfs layer rejects the request.
975 * XXX NFS_FLAVOR_NOMAP is defined in Solaris to work around
1056 * if fname resolves to / we get EINVAL error
1079 * VOP_ACCESS() to trigger the mount of the
1248 * Get the path to the logging buffer and the tag
1289 * All of these nested structures need to be converted to
1413 * Check the index flag. Do this here to avoid holding the
1460 * point to this entry and turn off the public bit so that
1483 * need to be created to provide a path for
1515 * flavor(s) of the new share were propagated to the
1518 * pseudo exprot root to the new (real) export root.
1524 * First transfer implicit flavor refs to new export.
1534 * transfer it to the new export.
1546 * Log share operation to this buffer only.
1634 * If there's a visible list, then need to leave
1635 * a pseudo export here to retain the visible list
1636 * for paths to exports below.
1655 * Need to call into the NFSv4 server and release all data
1670 * the public filehandle to the root.
1715 * if fname resolves to / we get EINVAL error
1737 * VOP_ACCESS() to trigger the mount of the
1812 * If we need to do NFS logging, the filehandle
1813 * must be downsized to 32 bytes.
1905 * it's time to stop (with failure).
1986 * the status octet, and two padded octets to make them XDR
1997 * flavors (1 means yes, 0 means no) that require the client to
1998 * perform another 0x81 LOOKUP to get them,
2005 * and it tells server where to start within the secinfo array.
2027 * WebNFS clients need to know the unique set of explicitly
2029 * "TRUE" is passed to build_seclist_nodups(), only explicitly
2049 * are more security flavors the client needs to get.
2100 * up to 64
2110 * to perform another 0x81 LOOKUP to get them.
2125 * WebNFS clients need to know the unique set of explicitly
2127 * "TRUE" is passed to build_seclist_nodups(), only explicitly
2149 * are more security flavors the client needs to get.
2177 * vop_fid_pseudo() is used to set up NFSv4 namespace, so
2178 * use vop_fid_pseudo() here to get the fid instead of VOP_FID.
2202 * Use the rnode volatile_id value to add volatility to the fh.
2208 * case use the vnode volatile_id value (which is set to the
2228 * Uses the file id (fh_len + fh_data) in the fhandle to get the vnode.
2279 * Uses the file id (fh_len + fh_data) in the fhandle to get the vnode.
2306 * Uses the file id (fh_len + fh_data) in the file handle to get the vnode.
2348 * Uses the file id (fh_len + fh_data) in the file handle to get the vnode.
2382 * Uses the file id (fh_len + fh_data) in the file handle to get the vnode.
2644 * Test for volatile fh's - add file handle to list and set its volatile id
2645 * to time it was renamed. If EX_VOLFH is also on and the fs is reshared,
2649 * needs to tie a rename list to the export struct and (more
2650 * important), protect access to the exi rename list using a write lock.
2705 /* no need to hold mutex lock - this one is called from exportfree */
2714 * Add a file handle to the volatile on rename list.