/linux-4.1.27/fs/jbd/ |
H A D | revoke.c | 20 * transaction's revoked blocks to the journal 23 * revoked blocks. If there are multiple revoke records in the log 31 * Block is revoked and then journaled: 35 * Block is journaled and then revoked: 44 * Block is revoked and then written as data: 58 * buffer has not been revoked, and cancel_revoke 61 * buffer has been revoked. 101 /* Each revoke record represents one single revoked block. During 368 /* ...then it better be revoked too, journal_revoke() 371 * not marked revoked --- that would journal_revoke() 416 * This would break if it were possible for a buffer to be revoked and 418 * a case we would have lost the revoked bit, but when we arrived here 465 * revoked status on any hashed alias too, otherwise the revoke journal_cancel_revoke() 480 * journal_clear_revoked_flags clears revoked flag of buffers in 481 * revoke table to reflect there is no revoked buffer in the next 660 * (ie. has not been revoked by a revoke record in that or a subsequent 668 * every block ever revoked in the log as we scan it for recovery, and 692 * that block been revoked? A revoke record with a given transaction
|
H A D | recovery.c | 221 * blocks. In the third and final pass, we replay any un-revoked blocks 256 jbd_debug(1, "JBD: Replayed %d and revoked %d/%d blocks\n", journal_recover() 454 * revoked, then we're all done do_one_pass() 570 /* Scan a revoke record, marking all blocks mentioned as revoked. */
|
H A D | commit.c | 419 * Clear revoked flag to reflect there is no revoked buffers journal_commit_transaction()
|
H A D | transaction.c | 843 * blocks which contain freed but then revoked metadata. We need journal_get_create_access()
|
/linux-4.1.27/fs/jbd2/ |
H A D | revoke.c | 20 * transaction's revoked blocks to the journal 23 * revoked blocks. If there are multiple revoke records in the log 31 * Block is revoked and then journaled: 35 * Block is journaled and then revoked: 44 * Block is revoked and then written as data: 58 * buffer has not been revoked, and cancel_revoke 61 * buffer has been revoked. 101 /* Each revoke record represents one single revoked block. During 365 /* ...then it better be revoked too, jbd2_journal_revoke() 368 * not marked revoked --- that would jbd2_journal_revoke() 413 * This would break if it were possible for a buffer to be revoked and 415 * a case we would have lost the revoked bit, but when we arrived here 462 * revoked status on any hashed alias too, otherwise the revoke jbd2_journal_cancel_revoke() 477 * journal_clear_revoked_flag clears revoked flag of buffers in 478 * revoke table to reflect there is no revoked buffers in the next 691 * (ie. has not been revoked by a revoke record in that or a subsequent 699 * every block ever revoked in the log as we scan it for recovery, and 723 * that block been revoked? A revoke record with a given transaction
|
H A D | recovery.c | 245 * blocks. In the third and final pass, we replay any un-revoked blocks 280 jbd_debug(1, "JBD2: Replayed %d and revoked %d/%d blocks\n", jbd2_journal_recover() 590 * revoked, then we're all done do_one_pass() 838 /* Scan a revoke record, marking all blocks mentioned as revoked. */
|
H A D | commit.c | 519 * Clear revoked flag to reflect there is no revoked buffers jbd2_journal_commit_transaction()
|
H A D | transaction.c | 1103 * blocks which contain freed but then revoked metadata. We need jbd2_journal_get_create_access()
|
/linux-4.1.27/drivers/staging/unisys/common-spar/include/channels/ |
H A D | controlframework.h | 36 u16 revoked:1; /* Bit 3: similar to partition state member in struct:spar_segment_state
|
/linux-4.1.27/drivers/input/ |
H A D | evdev.c | 60 bool revoked; member in struct:evdev_client 220 if (client->revoked) evdev_pass_values() 296 if (evdev->exist && !client->revoked) evdev_flush() 489 if (!evdev->exist || client->revoked) { evdev_write() 542 if (!evdev->exist || client->revoked) evdev_read() 571 !evdev->exist || client->revoked); evdev_read() 589 if (evdev->exist && !client->revoked) evdev_poll() 847 client->revoked = true; evdev_revoke() 1068 if (!evdev->exist || client->revoked) { evdev_ioctl_handler()
|
/linux-4.1.27/security/keys/ |
H A D | permission.c | 87 * the key has been revoked or -EKEYEXPIRED if the key has expired.
|
H A D | big_key.c | 121 * dispose of the links from a revoked keyring
|
H A D | user_defined.c | 141 * dispose of the links from a revoked keyring
|
H A D | request_key.c | 30 * if an error is indicated. The authorisation key will be revoked 497 * or -EKEYEXPIRED if an inaccessible, negative, revoked or expired key was 584 * revoked or expired.
|
H A D | keyring.c | 539 /* skip invalidated, revoked and expired keys */ keyring_search_iterator() 843 * successful; -EAGAIN if no matching keys were found, or if expired or revoked 971 * revoked are skipped. 990 * that's readable and that hasn't been revoked */ find_keyring_by_name() 1206 * -EKEYREVOKED if the keyring has been revoked, -ENFILE if the keyring is 1326 * Dispose of the links from a revoked keyring.
|
H A D | key.c | 467 * If successful, 0 is returned, the authorisation token is revoked and anyone 528 * If successful, 0 is returned, the authorisation token is revoked and anyone 973 * @key: The key to be revoked. 975 * Mark a key as being revoked and ask the type to free up its resources. The
|
H A D | request_key_auth.c | 177 /* if the auth key has been revoked, then the key we're request_key_auth_new()
|
H A D | process_keys.c | 456 /* defend against the auth key being revoked */ search_process_keyrings() 509 * -EKEYEXPIRED if the best found key was revoked or expired; -EACCES if the
|
H A D | keyctl.c | 363 * work. The key type should give up its quota claim when revoked. The key 763 * to protect against the key being updated or revoked. keyctl_read_key()
|
/linux-4.1.27/fs/ext4/ |
H A D | ext4_jbd2.c | 175 * revoked in all cases. 179 * still needs to be revoked.
|
/linux-4.1.27/arch/sparc/include/uapi/asm/ |
H A D | errno.h | 106 #define EKEYREVOKED 130 /* Key has been revoked */
|
/linux-4.1.27/include/uapi/asm-generic/ |
H A D | errno.h | 111 #define EKEYREVOKED 128 /* Key has been revoked */
|
/linux-4.1.27/arch/mips/include/uapi/asm/ |
H A D | errno.h | 115 #define EKEYREVOKED 163 /* Key has been revoked */
|
/linux-4.1.27/arch/parisc/include/uapi/asm/ |
H A D | errno.h | 72 #define EKEYREVOKED 186 /* Key has been revoked */
|
/linux-4.1.27/arch/alpha/include/uapi/asm/ |
H A D | errno.h | 116 #define EKEYREVOKED 134 /* Key has been revoked */
|
/linux-4.1.27/include/linux/ |
H A D | key.h | 144 time_t revoked_at; /* time at which key was revoked */ 165 #define KEY_FLAG_REVOKED 2 /* set if key had been revoked */
|
H A D | jbd.h | 158 * be revoked from the log 249 BH_Revoked, /* Has been revoked from the log */ 262 BUFFER_FNS(Revoked, revoked) 263 TAS_BUFFER_FNS(Revoked, revoked) 559 * @j_revoke: The revoke table - maintains the list of revoked blocks in the 748 * The revoke table: maintains the list of revoked blocks in the
|
H A D | jbd2.h | 209 * be revoked from the log 317 BH_Revoked, /* Has been revoked from the log */ 331 BUFFER_FNS(Revoked, revoked) 332 TAS_BUFFER_FNS(Revoked, revoked) 740 * @j_revoke: The revoke table - maintains the list of revoked blocks in the 938 * The revoke table: maintains the list of revoked blocks in the
|
H A D | nfs4.h | 254 NFS4ERR_DELEG_REVOKED = 10087, /* deleg./layout revoked */
|
H A D | ipack.h | 118 * device should be revoked.
|
/linux-4.1.27/fs/nfsd/ |
H A D | state.h | 109 * alloc'd, put when it's returned or revoked) 120 * revoked delegations (v4.1+). 300 struct list_head cl_revoked; /* unacknowledged, revoked 4.1 state */
|
H A D | vfs.c | 693 * in case a chmod has now revoked permission. nfsd_open()
|
H A D | nfs4state.c | 4858 * revoked delegations are kept only for free_stateid. nfs4_seqid_op_checks()
|
/linux-4.1.27/drivers/staging/lustre/lustre/include/lustre/ |
H A D | lustre_errno.h | 180 #define LUSTRE_EKEYREVOKED 128 /* Key has been revoked */
|
/linux-4.1.27/net/ceph/ |
H A D | ceph_common.c | 304 pr_warn("ceph: Mount failed due to revoked key: %s\n", get_secret()
|
H A D | messenger.c | 1565 * been revoked, so use the zero page. write_partial_message_data() 3111 dout("%s %p msg %p revoked\n", __func__, con, msg); ceph_msg_revoke_incoming()
|
/linux-4.1.27/drivers/gpu/drm/i915/ |
H A D | intel_fbc.c | 608 * cannot be unpinned (and have its GTT offset and fence revoked) intel_fbc_update()
|
H A D | i915_gem.c | 1747 * aperture, than pages mapped into userspace must be revoked. Removing the
|
/linux-4.1.27/fs/ceph/ |
H A D | caps.c | 799 * Return true if mask caps are currently being revoked by an MDS. 1115 * Make note of max_size reported/requested from mds, revoked caps 1511 * versus held caps. Release, flush, ack revoked caps to mds as 2525 * If CACHE is being revoked, and we have no dirty buffers,
|
H A D | addr.c | 704 * cap is being revoked. ceph_writepages_start()
|
H A D | dir.c | 117 * defined IFF we hold CEPH_CAP_FILE_SHARED (which will be revoked by
|
H A D | inode.c | 559 /* the MDS should have revoked these caps */ ceph_fill_file_size()
|
/linux-4.1.27/fs/nfs/ |
H A D | nfs4state.c | 2197 dprintk("%s: state revoked on server %s\n", __func__, clp->cl_hostname); nfs41_handle_state_revoked() 2204 dprintk("%s: Recallable state revoked on server %s!\n", __func__, nfs41_handle_recallable_state_revoked()
|
/linux-4.1.27/drivers/staging/lustre/lustre/obdclass/ |
H A D | obd_mount.c | 66 * (whenever the config lock is revoked) until lustre_end_log
|
/linux-4.1.27/net/sunrpc/xprtrdma/ |
H A D | verbs.c | 636 * revoked after the corresponding completion similar to a storage rpcrdma_ia_open()
|
/linux-4.1.27/drivers/scsi/ |
H A D | constants.c | 566 {0x2306, "Invalid token operation, token revoked"},
|
/linux-4.1.27/fs/ecryptfs/ |
H A D | keystore.c | 56 ecryptfs_printk(KERN_WARNING, "Key revoked\n"); process_request_key_err()
|
/linux-4.1.27/fs/fuse/ |
H A D | dir.c | 1118 exist. So if permissions are revoked this won't be fuse_permission()
|
/linux-4.1.27/fs/ext3/ |
H A D | inode.c | 52 * revoked in all cases. 56 * still needs to be revoked.
|
/linux-4.1.27/drivers/staging/lustre/lustre/llite/ |
H A D | file.c | 3509 * This function will not hold layout lock so it may be revoked any time after
|