/netbsd-current/sys/miscfs/genfs/ |
H A D | genfs_vnops.c | 687 mode_t file_mode, struct acl *acl, accmode_t accmode) 692 KASSERT((accmode & ~(VEXEC | VWRITE | VREAD | VADMIN | VAPPEND)) == 0); 693 KASSERT((accmode & VAPPEND) == 0 || (accmode & VWRITE)); 740 if ((accmode & dac_granted) == accmode) 743 return (accmode & VADMIN) ? EPERM : EACCES; 755 gid_t file_gid, mode_t file_mode, struct acl *acl, accmode_t accmode) 763 KASSERT((accmode & ~(VEXEC | VWRITE | VREAD | VADMIN | VAPPEND)) == 0); 764 KASSERT((accmode 686 genfs_can_access(vnode_t *vp, kauth_cred_t cred, uid_t file_uid, gid_t file_gid, mode_t file_mode, struct acl *acl, accmode_t accmode) argument 754 genfs_can_access_acl_posix1e(vnode_t *vp, kauth_cred_t cred, uid_t file_uid, gid_t file_gid, mode_t file_mode, struct acl *acl, accmode_t accmode) argument 985 accmode_t accmode; member in struct:__anon42 1006 _access_mask_from_accmode(accmode_t accmode) argument 1095 genfs_can_access_acl_nfs4(vnode_t *vp, kauth_cred_t cred, uid_t file_uid, gid_t file_gid, mode_t file_mode, struct acl *aclp, accmode_t accmode) argument 1387 genfs_can_extattr(vnode_t *vp, kauth_cred_t cred, accmode_t accmode, int attrnamespace) argument 1423 accmode_t accmode = ap->a_accmode; local [all...] |
H A D | layer_vnops.c | 474 accmode_t accmode = ap->a_accmode; local 481 if (accmode & VWRITE) {
|
/netbsd-current/sys/kern/ |
H A D | vfs_getcwd.c | 279 accmode_t accmode = VEXEC; local 327 error = VOP_ACCESS(lvp, accmode, cred); 363 error = VOP_ACCESS(lvp, accmode, cred); 377 accmode); 400 accmode = VEXEC | VREAD;
|
H A D | vfs_init.c | 385 accmode_t accmode = (accmode_t)(unsigned long)arg3; local 388 error = VOP_ACCESS(devvp, accmode, cred);
|
H A D | vfs_subr.c | 1406 * access checks using 'accmode' as modified by this routine. If it 1410 * Note that after this routine runs, accmode may be zero. 1413 vfs_unixify_accmode(accmode_t *accmode) argument 1419 if (*accmode & VEXPLICIT_DENY) { 1420 *accmode = 0; 1430 if (*accmode & (VDELETE_CHILD | VDELETE)) 1433 if (*accmode & VADMIN_PERMS) { 1434 *accmode &= ~VADMIN_PERMS; 1435 *accmode |= VADMIN; 1442 *accmode [all...] |
H A D | sys_mqueue.c | 396 accmode_t accmode = 0; local 400 accmode |= VREAD; 403 accmode |= VWRITE; 406 mq->mq_mode, NULL, accmode)) {
|
H A D | kern_auth.c | 1114 kauth_accmode_to_action(accmode_t accmode) argument 1120 if (accmode & (VSTAT_PERMS|VREAD)) 1122 if (accmode & (VMODIFY_PERMS|VADMIN_PERMS)) 1124 if (accmode & VEXEC)
|
/netbsd-current/external/cddl/osnet/sys/sys/ |
H A D | policy.h | 54 accmode_t accmode);
|
/netbsd-current/sys/fs/adosfs/ |
H A D | advnops.c | 703 adosfs_check_possible(struct vnode *vp, struct anode *ap, accmode_t accmode) argument 711 if (accmode & VWRITE) { 726 adosfs_check_permitted(struct vnode *vp, struct anode *ap, accmode_t accmode, argument 731 return kauth_authorize_vnode(cred, KAUTH_ACCESS_ACTION(accmode, 733 cred, ap->uid, ap->gid, file_mode, NULL, accmode));
|
/netbsd-current/sys/ufs/lfs/ |
H A D | ulfs_vnops.c | 147 ulfs_check_possible(struct vnode *vp, struct inode *ip, accmode_t accmode, argument 159 if (accmode & VWRITE) { 187 if ((accmode & VWRITE) && (ip->i_flags & IMMUTABLE)) 194 ulfs_check_permitted(struct vnode *vp, struct inode *ip, accmode_t accmode, argument 198 return kauth_authorize_vnode(cred, KAUTH_ACCESS_ACTION(accmode, 201 NULL, accmode)); 214 accmode_t accmode; local 218 accmode = ap->a_accmode; 224 error = ulfs_check_possible(vp, ip, accmode, ap->a_cred); 228 error = ulfs_check_permitted(vp, ip, accmode, a [all...] |
/netbsd-current/sys/fs/nilfs/ |
H A D | nilfs_vnops.c | 986 nilfs_check_possible(struct vnode *vp, struct vattr *vap, accmode_t accmode) argument 999 if ((accmode & VWRITE) && (vp->v_mount->mnt_flag & MNT_RDONLY)) 1019 if ((accmode & VWRITE) && (flags & IMMUTABLE)) 1026 nilfs_check_permitted(struct vnode *vp, struct vattr *vap, accmode_t accmode, argument 1031 return kauth_authorize_vnode(cred, KAUTH_ACCESS_ACTION(accmode, 1033 vap->va_uid, vap->va_gid, vap->va_mode, NULL, accmode)); 1046 accmode_t accmode = ap->a_accmode; local 1058 error = nilfs_check_possible(vp, &vap, accmode); 1062 error = nilfs_check_permitted(vp, &vap, accmode, cred);
|
/netbsd-current/sys/fs/filecorefs/ |
H A D | filecore_vnops.c | 125 accmode_t accmode, kauth_cred_t cred) 129 return kauth_authorize_vnode(cred, KAUTH_ACCESS_ACTION(accmode, 132 filecore_mode(ip), NULL, accmode)); 124 filecore_check_permitted(struct vnode *vp, struct filecore_node *ip, accmode_t accmode, kauth_cred_t cred) argument
|
/netbsd-current/sys/rump/librump/rumpvfs/ |
H A D | rumpvnode_if.c | 155 accmode_t accmode, 161 error = VOP_ACCESS(vp, accmode, cred); 169 accmode_t accmode, 175 error = VOP_ACCESSX(vp, accmode, cred); 154 RUMP_VOP_ACCESS(struct vnode *vp, accmode_t accmode, struct kauth_cred *cred) argument 168 RUMP_VOP_ACCESSX(struct vnode *vp, accmode_t accmode, struct kauth_cred *cred) argument
|
/netbsd-current/sys/ufs/ufs/ |
H A D | ufs_vnops.c | 264 ufs_check_possible(struct vnode *vp, struct inode *ip, accmode_t accmode, argument 276 if (accmode & VMODIFY_PERMS) { 307 if ((accmode & (VMODIFY_PERMS & ~VADMIN_PERMS)) && 316 struct acl *acl, accmode_t accmode, kauth_cred_t cred, 321 return kauth_authorize_vnode(cred, KAUTH_ACCESS_ACTION(accmode, 323 ip->i_uid, ip->i_gid, ip->i_mode & ALLPERMS, acl, accmode)); 336 accmode_t accmode = ap->a_accmode; local 343 error = ufs_check_possible(vp, ip, accmode, ap->a_cred); 362 ip, acl, accmode, ap->a_cred, 365 error = vfs_unixify_accmode(&accmode); 315 ufs_check_permitted(struct vnode *vp, struct inode *ip, struct acl *acl, accmode_t accmode, kauth_cred_t cred, int (*func)(struct vnode *, kauth_cred_t, uid_t, gid_t, mode_t, struct acl *, accmode_t)) argument [all...] |
/netbsd-current/sys/fs/unionfs/ |
H A D | unionfs_vnops.c | 641 int accmode; local 650 accmode = ap->a_accmode; 653 if ((accmode & VWRITE) && 666 error = VOP_ACCESS(uvp, accmode, ap->a_cred); 674 if (accmode & VWRITE) { 693 accmode, &va, ap->a_cred); 698 accmode &= ~VWRITE; 699 accmode |= VREAD; /* will copy to upper */ 701 error = VOP_ACCESS(lvp, accmode, ap->a_cred);
|
/netbsd-current/sys/fs/ntfs/ |
H A D | ntfs_vnops.c | 402 ntfs_check_possible(struct vnode *vp, struct ntnode *ip, accmode_t accmode) argument 410 if (accmode & VWRITE) { 425 ntfs_check_permitted(struct vnode *vp, struct ntnode *ip, accmode_t accmode, argument 432 return kauth_authorize_vnode(cred, KAUTH_ACCESS_ACTION(accmode, 434 ip->i_mp->ntm_uid, ip->i_mp->ntm_gid, file_mode, NULL, accmode));
|
/netbsd-current/sys/fs/hfs/ |
H A D | hfs_vnops.c | 518 hfs_check_possible(struct vnode *vp, accmode_t accmode) argument 526 if (accmode & VWRITE) { 541 hfs_check_permitted(vnode_t *vp, struct vattr *va, accmode_t accmode, argument 545 return kauth_authorize_vnode(cred, KAUTH_ACCESS_ACTION(accmode, 547 va->va_uid, va->va_gid, va->va_mode, NULL, accmode));
|
/netbsd-current/sys/fs/efs/ |
H A D | efs_vnops.c | 118 efs_check_possible(struct vnode *vp, struct efs_inode *eip, accmode_t accmode) argument 121 if ((accmode & VWRITE) && (vp->v_mount->mnt_flag & MNT_RDONLY)) 134 efs_check_permitted(struct vnode *vp, struct efs_inode *eip, accmode_t accmode, argument 138 return kauth_authorize_vnode(cred, KAUTH_ACCESS_ACTION(accmode, 140 cred, eip->ei_uid, eip->ei_gid, eip->ei_mode, NULL, accmode));
|
/netbsd-current/sys/fs/cd9660/ |
H A D | cd9660_vnops.c | 89 cd9660_check_possible(struct vnode *vp, struct iso_node *ip, accmode_t accmode) argument 97 if (accmode & VWRITE) { 117 cd9660_check_permitted(struct vnode *vp, struct iso_node *ip, accmode_t accmode, argument 132 return kauth_authorize_vnode(cred, KAUTH_ACCESS_ACTION(accmode, 135 file_mode, NULL, accmode));
|
/netbsd-current/sys/fs/nfs/nlm/ |
H A D | nlm_prot_impl.c | 1762 fhandle_t *fhp, struct vfs_state *vs, accmode_t accmode) 1774 /* accmode == 0 means don't check, since it is an unlock. */ 1775 if (accmode != 0) { 1794 if (accmode != 0) { 1808 error = VOP_ACCESS(vs->vs_vp, accmode, cred, curthread); 1810 * If this failed and accmode != VWRITE, try again with 1814 if (error != 0 && accmode != VWRITE) 1871 accmode_t accmode; local 1897 accmode = argp->exclusive ? VWRITE : VREAD; 1898 error = nlm_get_vfs_state(host, rqstp, &fh, &vs, accmode); 1761 nlm_get_vfs_state(struct nlm_host *host, struct svc_req *rqstp, fhandle_t *fhp, struct vfs_state *vs, accmode_t accmode) argument 1969 accmode_t accmode; local [all...] |
/netbsd-current/sys/fs/msdosfs/ |
H A D | msdosfs_vnops.c | 183 msdosfs_check_possible(struct vnode *vp, struct denode *dep, accmode_t accmode) argument 191 if (accmode & VWRITE) { 207 msdosfs_check_permitted(struct vnode *vp, struct denode *dep, accmode_t accmode, argument 220 return kauth_authorize_vnode(cred, KAUTH_ACCESS_ACTION(accmode, 222 pmp->pm_uid, pmp->pm_gid, file_mode, NULL, accmode));
|
/netbsd-current/sys/fs/udf/ |
H A D | udf_vnops.c | 1436 udf_check_permitted(struct vnode *vp, struct vattr *vap, accmode_t accmode, argument 1440 return kauth_authorize_vnode(cred, KAUTH_ACCESS_ACTION(accmode, 1442 vap->va_uid, vap->va_gid, vap->va_mode, NULL, accmode)); 1455 accmode_t accmode = ap->a_accmode; local 1467 error = udf_check_possible(vp, &vap, accmode); 1471 error = udf_check_permitted(vp, &vap, accmode, cred);
|
/netbsd-current/sys/coda/ |
H A D | coda_vnops.c | 668 accmode_t accmode = ap->a_accmode; local 675 KASSERT((accmode & ~(VEXEC | VWRITE | VREAD | VADMIN | VAPPEND)) == 0); 681 return(((accmode & VREAD) && !(accmode & (VWRITE | VEXEC))) 691 if ((vp->v_type == VDIR) && (accmode & VEXEC)) { 699 error = venus_access(vtomi(vp), &cp->c_fid, accmode, cred, curlwp);
|
/netbsd-current/sys/fs/tmpfs/ |
H A D | tmpfs_vnops.c | 386 accmode_t accmode = ap->a_accmode; local 389 const bool writing = (accmode & VWRITE) != 0; 414 return kauth_authorize_vnode(cred, KAUTH_ACCESS_ACTION(accmode, 416 node->tn_uid, node->tn_gid, node->tn_mode, NULL, accmode));
|
/netbsd-current/sys/fs/sysvbfs/ |
H A D | sysvbfs_vnops.c | 252 accmode_t accmode, kauth_cred_t cred) 256 return kauth_authorize_vnode(cred, KAUTH_ACCESS_ACTION(accmode, 258 attr->uid, attr->gid, attr->mode, NULL, accmode)); 251 sysvbfs_check_permitted(struct vnode *vp, struct sysvbfs_node *bnode, accmode_t accmode, kauth_cred_t cred) argument
|