Searched refs:revoked (Results 1 - 50 of 50) sorted by relevance

/linux-4.1.27/fs/jbd/
H A Drevoke.c20 * transaction's revoked blocks to the journal
23 * revoked blocks. If there are multiple revoke records in the log
31 * Block is revoked and then journaled:
35 * Block is journaled and then revoked:
44 * Block is revoked and then written as data:
58 * buffer has not been revoked, and cancel_revoke
61 * buffer has been revoked.
101 /* Each revoke record represents one single revoked block. During
368 /* ...then it better be revoked too, journal_revoke()
371 * not marked revoked --- that would journal_revoke()
416 * This would break if it were possible for a buffer to be revoked and
418 * a case we would have lost the revoked bit, but when we arrived here
465 * revoked status on any hashed alias too, otherwise the revoke journal_cancel_revoke()
480 * journal_clear_revoked_flags clears revoked flag of buffers in
481 * revoke table to reflect there is no revoked buffer in the next
660 * (ie. has not been revoked by a revoke record in that or a subsequent
668 * every block ever revoked in the log as we scan it for recovery, and
692 * that block been revoked? A revoke record with a given transaction
H A Drecovery.c221 * blocks. In the third and final pass, we replay any un-revoked blocks
256 jbd_debug(1, "JBD: Replayed %d and revoked %d/%d blocks\n", journal_recover()
454 * revoked, then we're all done do_one_pass()
570 /* Scan a revoke record, marking all blocks mentioned as revoked. */
H A Dcommit.c419 * Clear revoked flag to reflect there is no revoked buffers journal_commit_transaction()
H A Dtransaction.c843 * blocks which contain freed but then revoked metadata. We need journal_get_create_access()
/linux-4.1.27/fs/jbd2/
H A Drevoke.c20 * transaction's revoked blocks to the journal
23 * revoked blocks. If there are multiple revoke records in the log
31 * Block is revoked and then journaled:
35 * Block is journaled and then revoked:
44 * Block is revoked and then written as data:
58 * buffer has not been revoked, and cancel_revoke
61 * buffer has been revoked.
101 /* Each revoke record represents one single revoked block. During
365 /* ...then it better be revoked too, jbd2_journal_revoke()
368 * not marked revoked --- that would jbd2_journal_revoke()
413 * This would break if it were possible for a buffer to be revoked and
415 * a case we would have lost the revoked bit, but when we arrived here
462 * revoked status on any hashed alias too, otherwise the revoke jbd2_journal_cancel_revoke()
477 * journal_clear_revoked_flag clears revoked flag of buffers in
478 * revoke table to reflect there is no revoked buffers in the next
691 * (ie. has not been revoked by a revoke record in that or a subsequent
699 * every block ever revoked in the log as we scan it for recovery, and
723 * that block been revoked? A revoke record with a given transaction
H A Drecovery.c245 * blocks. In the third and final pass, we replay any un-revoked blocks
280 jbd_debug(1, "JBD2: Replayed %d and revoked %d/%d blocks\n", jbd2_journal_recover()
590 * revoked, then we're all done do_one_pass()
838 /* Scan a revoke record, marking all blocks mentioned as revoked. */
H A Dcommit.c519 * Clear revoked flag to reflect there is no revoked buffers jbd2_journal_commit_transaction()
H A Dtransaction.c1103 * blocks which contain freed but then revoked metadata. We need jbd2_journal_get_create_access()
/linux-4.1.27/drivers/staging/unisys/common-spar/include/channels/
H A Dcontrolframework.h36 u16 revoked:1; /* Bit 3: similar to partition state member in struct:spar_segment_state
/linux-4.1.27/drivers/input/
H A Devdev.c60 bool revoked; member in struct:evdev_client
220 if (client->revoked) evdev_pass_values()
296 if (evdev->exist && !client->revoked) evdev_flush()
489 if (!evdev->exist || client->revoked) { evdev_write()
542 if (!evdev->exist || client->revoked) evdev_read()
571 !evdev->exist || client->revoked); evdev_read()
589 if (evdev->exist && !client->revoked) evdev_poll()
847 client->revoked = true; evdev_revoke()
1068 if (!evdev->exist || client->revoked) { evdev_ioctl_handler()
/linux-4.1.27/security/keys/
H A Dpermission.c87 * the key has been revoked or -EKEYEXPIRED if the key has expired.
H A Dbig_key.c121 * dispose of the links from a revoked keyring
H A Duser_defined.c141 * dispose of the links from a revoked keyring
H A Drequest_key.c30 * if an error is indicated. The authorisation key will be revoked
497 * or -EKEYEXPIRED if an inaccessible, negative, revoked or expired key was
584 * revoked or expired.
H A Dkeyring.c539 /* skip invalidated, revoked and expired keys */ keyring_search_iterator()
843 * successful; -EAGAIN if no matching keys were found, or if expired or revoked
971 * revoked are skipped.
990 * that's readable and that hasn't been revoked */ find_keyring_by_name()
1206 * -EKEYREVOKED if the keyring has been revoked, -ENFILE if the keyring is
1326 * Dispose of the links from a revoked keyring.
H A Dkey.c467 * If successful, 0 is returned, the authorisation token is revoked and anyone
528 * If successful, 0 is returned, the authorisation token is revoked and anyone
973 * @key: The key to be revoked.
975 * Mark a key as being revoked and ask the type to free up its resources. The
H A Drequest_key_auth.c177 /* if the auth key has been revoked, then the key we're request_key_auth_new()
H A Dprocess_keys.c456 /* defend against the auth key being revoked */ search_process_keyrings()
509 * -EKEYEXPIRED if the best found key was revoked or expired; -EACCES if the
H A Dkeyctl.c363 * work. The key type should give up its quota claim when revoked. The key
763 * to protect against the key being updated or revoked. keyctl_read_key()
/linux-4.1.27/fs/ext4/
H A Dext4_jbd2.c175 * revoked in all cases.
179 * still needs to be revoked.
/linux-4.1.27/arch/sparc/include/uapi/asm/
H A Derrno.h106 #define EKEYREVOKED 130 /* Key has been revoked */
/linux-4.1.27/include/uapi/asm-generic/
H A Derrno.h111 #define EKEYREVOKED 128 /* Key has been revoked */
/linux-4.1.27/arch/mips/include/uapi/asm/
H A Derrno.h115 #define EKEYREVOKED 163 /* Key has been revoked */
/linux-4.1.27/arch/parisc/include/uapi/asm/
H A Derrno.h72 #define EKEYREVOKED 186 /* Key has been revoked */
/linux-4.1.27/arch/alpha/include/uapi/asm/
H A Derrno.h116 #define EKEYREVOKED 134 /* Key has been revoked */
/linux-4.1.27/include/linux/
H A Dkey.h144 time_t revoked_at; /* time at which key was revoked */
165 #define KEY_FLAG_REVOKED 2 /* set if key had been revoked */
H A Djbd.h158 * be revoked from the log
249 BH_Revoked, /* Has been revoked from the log */
262 BUFFER_FNS(Revoked, revoked)
263 TAS_BUFFER_FNS(Revoked, revoked)
559 * @j_revoke: The revoke table - maintains the list of revoked blocks in the
748 * The revoke table: maintains the list of revoked blocks in the
H A Djbd2.h209 * be revoked from the log
317 BH_Revoked, /* Has been revoked from the log */
331 BUFFER_FNS(Revoked, revoked)
332 TAS_BUFFER_FNS(Revoked, revoked)
740 * @j_revoke: The revoke table - maintains the list of revoked blocks in the
938 * The revoke table: maintains the list of revoked blocks in the
H A Dnfs4.h254 NFS4ERR_DELEG_REVOKED = 10087, /* deleg./layout revoked */
H A Dipack.h118 * device should be revoked.
/linux-4.1.27/fs/nfsd/
H A Dstate.h109 * alloc'd, put when it's returned or revoked)
120 * revoked delegations (v4.1+).
300 struct list_head cl_revoked; /* unacknowledged, revoked 4.1 state */
H A Dvfs.c693 * in case a chmod has now revoked permission. nfsd_open()
H A Dnfs4state.c4858 * revoked delegations are kept only for free_stateid. nfs4_seqid_op_checks()
/linux-4.1.27/drivers/staging/lustre/lustre/include/lustre/
H A Dlustre_errno.h180 #define LUSTRE_EKEYREVOKED 128 /* Key has been revoked */
/linux-4.1.27/net/ceph/
H A Dceph_common.c304 pr_warn("ceph: Mount failed due to revoked key: %s\n", get_secret()
H A Dmessenger.c1565 * been revoked, so use the zero page. write_partial_message_data()
3111 dout("%s %p msg %p revoked\n", __func__, con, msg); ceph_msg_revoke_incoming()
/linux-4.1.27/drivers/gpu/drm/i915/
H A Dintel_fbc.c608 * cannot be unpinned (and have its GTT offset and fence revoked) intel_fbc_update()
H A Di915_gem.c1747 * aperture, than pages mapped into userspace must be revoked. Removing the
/linux-4.1.27/fs/ceph/
H A Dcaps.c799 * Return true if mask caps are currently being revoked by an MDS.
1115 * Make note of max_size reported/requested from mds, revoked caps
1511 * versus held caps. Release, flush, ack revoked caps to mds as
2525 * If CACHE is being revoked, and we have no dirty buffers,
H A Daddr.c704 * cap is being revoked. ceph_writepages_start()
H A Ddir.c117 * defined IFF we hold CEPH_CAP_FILE_SHARED (which will be revoked by
H A Dinode.c559 /* the MDS should have revoked these caps */ ceph_fill_file_size()
/linux-4.1.27/fs/nfs/
H A Dnfs4state.c2197 dprintk("%s: state revoked on server %s\n", __func__, clp->cl_hostname); nfs41_handle_state_revoked()
2204 dprintk("%s: Recallable state revoked on server %s!\n", __func__, nfs41_handle_recallable_state_revoked()
/linux-4.1.27/drivers/staging/lustre/lustre/obdclass/
H A Dobd_mount.c66 * (whenever the config lock is revoked) until lustre_end_log
/linux-4.1.27/net/sunrpc/xprtrdma/
H A Dverbs.c636 * revoked after the corresponding completion similar to a storage rpcrdma_ia_open()
/linux-4.1.27/drivers/scsi/
H A Dconstants.c566 {0x2306, "Invalid token operation, token revoked"},
/linux-4.1.27/fs/ecryptfs/
H A Dkeystore.c56 ecryptfs_printk(KERN_WARNING, "Key revoked\n"); process_request_key_err()
/linux-4.1.27/fs/fuse/
H A Ddir.c1118 exist. So if permissions are revoked this won't be fuse_permission()
/linux-4.1.27/fs/ext3/
H A Dinode.c52 * revoked in all cases.
56 * still needs to be revoked.
/linux-4.1.27/drivers/staging/lustre/lustre/llite/
H A Dfile.c3509 * This function will not hold layout lock so it may be revoked any time after

Completed in 2048 milliseconds