/linux/fs/ceph/ |
H A D | snap.c | 31 * of the files contained by each realm share the same set of 32 * snapshots. An individual realm's snap set contains snapshots 33 * explicitly created on that realm, as well as any snaps in its 40 * realm relationship, and for each realm has an explicit list of snaps 44 * with an open cap in the system. (The needed snap realm information is 46 * version number is used to ensure that as realm parameters change (new 47 * snapshot, new parent, etc.) the client's realm hierarchy is updated. 49 * The realm hierarchy drives the generation of a 'snap context' for each 50 * realm, which simply lists the resulting set of snaps for the realm. This 55 * update, but don't have enough memory to update our realm hierarchy, [all …]
|
H A D | super.h | 454 struct ceph_snap_realm *i_snap_realm; /* snap realm (if caps) */ 912 * A "snap realm" describes a subset of the file hierarchy sharing 917 * All inodes within the realm that have capabilities are linked into a 918 * per-realm list. 932 u64 *snaps; /* snaps specific to this realm */ 941 struct list_head dirty_item; /* if realm needs new context */ 945 /* the current set of snaps for this realm */ 988 struct ceph_snap_realm *realm); 990 struct ceph_snap_realm *realm); 994 void ceph_change_snap_realm(struct inode *inode, struct ceph_snap_realm *realm);
|
H A D | mds_client.c | 3794 struct ceph_snap_realm *realm; in handle_reply() local 3916 realm = NULL; in handle_reply() 3922 &realm); in handle_reply() 3948 if (realm) in handle_reply() 3949 ceph_put_snap_realm(mdsc, realm); in handle_reply() 4468 /* can't handle message that contains both caps and realm */ in send_reconnect_partial() 4780 struct ceph_snap_realm *realm = in encode_snap_realms() local 4804 doutc(cl, " adding snap realm %llx seq %lld parent %llx\n", in encode_snap_realms() 4805 realm->ino, realm->seq, realm->parent_ino); in encode_snap_realms() 4806 sr_rec.ino = cpu_to_le64(realm->ino); in encode_snap_realms() [all …]
|
H A D | caps.c | 724 * add this inode to the appropriate snap realm in ceph_add_cap() 726 struct ceph_snap_realm *realm = ceph_lookup_snap_realm(mdsc, in ceph_add_cap() local 728 if (realm) in ceph_add_cap() 729 ceph_change_snap_realm(inode, realm); in ceph_add_cap() 731 WARN(1, "%s: couldn't find snap realm 0x%llx (ino 0x%llx oldrealm 0x%llx)\n", in ceph_add_cap() 4213 u64 realmino = le64_to_cpu(im->realm); in handle_cap_import() 4337 struct ceph_snap_realm *realm = NULL; in ceph_handle_caps() local 4485 realm = NULL; in ceph_handle_caps() 4490 false, &realm)) { in ceph_handle_caps() 4504 if (realm) in ceph_handle_caps() [all …]
|
H A D | inode.c | 718 doutc(cl, " dropping residual ref to snap realm %p\n", in ceph_evict_inode() 1265 le64_to_cpu(info->cap.realm), in ceph_fill_inode() 3102 struct ceph_snap_realm *realm; in ceph_getattr() local 3111 realm = pci->i_snap_realm; in ceph_getattr() 3112 if (realm) in ceph_getattr() 3113 stat->size = realm->num_snaps; in ceph_getattr()
|
/linux/Documentation/devicetree/bindings/interrupt-controller/ |
H A D | arm,gic-v5.yaml | 99 "ns-" stands for non-secure, "s-" for secure, "realm-" for realm 104 enum: [ ns-config, s-config, realm-config, el3-config, ns-setlpi, 105 s-setlpi, realm-setlpi, el3-setlpi ] 151 "ns-" stands for non-secure, "s-" for secure, "realm-" for realm 156 enum: [ ns-config, s-config, realm-config, el3-config ] 187 "ns-" stands for non-secure, "s-" for secure, "realm-" for realm 192 enum: [ ns-translate, s-translate, realm-translate, el3-translate ]
|
/linux/net/netfilter/ |
H A D | xt_realm.c | 2 /* IP tables module for matching the routing realm 18 MODULE_DESCRIPTION("Xtables: Routing realm match"); 31 .name = "realm",
|
H A D | Kconfig | 1545 tristate '"realm" match support' 1549 This option adds a `realm' match, which allows you to use the realm
|
/linux/include/linux/ceph/ |
H A D | ceph_fs.h | 562 __le64 realm; /* snap realm */ member 769 __le64 ino, realm; member 854 __le64 ino; /* snap realm base */ 855 __le64 seq; /* snap seq for this snap realm */ 856 __le64 parent; /* parent realm */ 875 __le32 num_split_inos; /* # inos belonging to new child realm */ 876 __le32 num_split_realms; /* # child realms udner new child realm */ 887 __le64 parent; /* ino: parent realm */
|
/linux/drivers/virt/coco/arm-cca-guest/ |
H A D | Kconfig | 7 attestation report from the Realm Management Monitor(RMM).
|
H A D | arm-cca-guest.c | 195 * * %-ENODEV - The execution context is not an Arm Realm.
|
/linux/Documentation/trace/rv/ |
H A D | monitor_synthesis.rst | 22 Realm | | Realm
|
/linux/fs/smb/client/ |
H A D | ntlmssp.h | 19 #define NTLMSSP_REQUEST_TARGET 0x04 /* Srv returns its auth realm */
|
/linux/fs/smb/server/ |
H A D | ntlmssp.h | 36 #define NTLMSSP_REQUEST_TARGET 0x04 /* Srv returns its auth realm */
|
/linux/include/linux/sunrpc/ |
H A D | svcauth.h | 27 /* name of form servicetype/hostname@REALM, passed down by
|
/linux/kernel/trace/rv/ |
H A D | rv.c | 47 * Realm | | Realm
|
/linux/Documentation/filesystems/ |
H A D | afs.rst | 213 Currently the username, realm, password and proposed ticket lifetime are
|
/linux/net/rxrpc/ |
H A D | rxkad.c | 1017 name = Z(REALM, realm); in rxkad_decrypt_response() 1018 _debug("KIV REALM: %s", name); in rxkad_decrypt_response()
|
/linux/net/sunrpc/auth_gss/ |
H A D | gss_rpc_upcall.c | 242 /* terminate and remove realm part */ in gssp_hostbased_service()
|
/linux/net/sched/ |
H A D | cls_route.c | 688 MODULE_DESCRIPTION("Routing table realm based TC classifier");
|
/linux/include/uapi/linux/netfilter/ |
H A D | nf_tables.h | 939 * @NFT_META_RTCLASSID: realm value of packet's route (skb->dst->tclassid) 1007 * @NFT_RT_CLASSID: realm value of packet's route (skb->dst->tclassid)
|
/linux/Documentation/arch/arm64/ |
H A D | booting.rst | 45 protected RAM has a Realm IPA state (RIPAS) of "RAM".
|
/linux/Documentation/netlink/specs/ |
H A D | nl80211.yaml | 1008 name: fils-erp-realm
|
/linux/kernel/ |
H A D | seccomp.c | 653 * As threads are considered to be trust-realm in seccomp_sync_threads()
|
/linux/arch/arm64/tools/ |
H A D | sysreg | 5061 0b11 REALM
|