| /linux/fs/ceph/ |
| H A D | snap.c | 31 * of the files contained by each realm share the same set of 32 * snapshots. An individual realm's snap set contains snapshots 33 * explicitly created on that realm, as well as any snaps in its 40 * realm relationship, and for each realm has an explicit list of snaps 44 * with an open cap in the system. (The needed snap realm information is 46 * version number is used to ensure that as realm parameters change (new 47 * snapshot, new parent, etc.) the client's realm hierarchy is updated. 49 * The realm hierarchy drives the generation of a 'snap context' for each 50 * realm, which simply lists the resulting set of snaps for the realm. This 55 * update, but don't have enough memory to update our realm hierarchy, [all …]
|
| H A D | quota.c | 123 * This function will try to lookup a realm inode which isn't visible in the 132 struct ceph_snap_realm *realm) in lookup_quotarealm_inode() argument 138 qri = find_quotarealm_inode(mdsc, realm->ino); in lookup_quotarealm_inode() 163 in = ceph_lookup_inode(sb, realm->ino); in lookup_quotarealm_inode() 167 doutc(cl, "Can't lookup inode %llx (err: %ld)\n", realm->ino, in lookup_quotarealm_inode() 206 * returned realm. 220 struct ceph_snap_realm *realm, *next; in get_quota_realm() local 230 realm = ceph_inode(inode)->i_snap_realm; in get_quota_realm() 231 if (realm) in get_quota_realm() 232 ceph_get_snap_realm(mdsc, realm); in get_quota_realm() [all …]
|
| H A D | super.h | 490 struct ceph_snap_realm *i_snap_realm; /* snap realm (if caps) */ 950 * A "snap realm" describes a subset of the file hierarchy sharing 955 * All inodes within the realm that have capabilities are linked into a 956 * per-realm list. 970 u64 *snaps; /* snaps specific to this realm */ 979 struct list_head dirty_item; /* if realm needs new context */ 983 /* the current set of snaps for this realm */ 1026 struct ceph_snap_realm *realm); 1028 struct ceph_snap_realm *realm); 1032 void ceph_change_snap_realm(struct inode *inode, struct ceph_snap_realm *realm);
|
| H A D | mds_client.h | 478 * realm snap contexts. (later, we can do per-realm snap
|
| H A D | mds_client.c | 3905 struct ceph_snap_realm *realm; in handle_reply() local 4028 realm = NULL; in handle_reply() 4034 &realm); in handle_reply() 4060 if (realm) in handle_reply() 4061 ceph_put_snap_realm(mdsc, realm); in handle_reply() 4588 /* can't handle message that contains both caps and realm */ in send_reconnect_partial() 4896 struct ceph_snap_realm *realm = in encode_snap_realms() local 4920 doutc(cl, " adding snap realm %llx seq %lld parent %llx\n", in encode_snap_realms() 4921 realm->ino, realm->seq, realm->parent_ino); in encode_snap_realms() 4922 sr_rec.ino = cpu_to_le64(realm->ino); in encode_snap_realms() [all …]
|
| H A D | caps.c | 725 * add this inode to the appropriate snap realm in ceph_add_cap() 727 struct ceph_snap_realm *realm = ceph_lookup_snap_realm(mdsc, in ceph_add_cap() local 729 if (realm) in ceph_add_cap() 730 ceph_change_snap_realm(inode, realm); in ceph_add_cap() 732 WARN(1, "%s: couldn't find snap realm 0x%llx (ino 0x%llx oldrealm 0x%llx)\n", in ceph_add_cap() 4214 u64 realmino = le64_to_cpu(im->realm); in handle_cap_import() 4338 struct ceph_snap_realm *realm = NULL; in ceph_handle_caps() local 4489 realm = NULL; in ceph_handle_caps() 4494 false, &realm)) { in ceph_handle_caps() 4508 if (realm) in ceph_handle_caps() [all …]
|
| H A D | inode.c | 768 doutc(cl, " dropping residual ref to snap realm %p\n", in ceph_evict_inode() 1339 le64_to_cpu(info->cap.realm), in ceph_fill_inode() 3194 struct ceph_snap_realm *realm; in ceph_getattr() local 3203 realm = pci->i_snap_realm; in ceph_getattr() 3204 if (realm) in ceph_getattr() 3205 stat->size = realm->num_snaps; in ceph_getattr()
|
| H A D | file.c | 712 in.cap.realm = cpu_to_le64(ci->i_snap_realm->ino); in ceph_finish_async_create()
|
| /linux/Documentation/devicetree/bindings/interrupt-controller/ |
| H A D | arm,gic-v5.yaml | 99 "ns-" stands for non-secure, "s-" for secure, "realm-" for realm 104 enum: [ ns-config, s-config, realm-config, el3-config, ns-setlpi, 105 s-setlpi, realm-setlpi, el3-setlpi ] 151 "ns-" stands for non-secure, "s-" for secure, "realm-" for realm 156 enum: [ ns-config, s-config, realm-config, el3-config ] 187 "ns-" stands for non-secure, "s-" for secure, "realm-" for realm 192 enum: [ ns-translate, s-translate, realm-translate, el3-translate ]
|
| /linux/net/netfilter/ |
| H A D | xt_realm.c | 2 /* IP tables module for matching the routing realm 18 MODULE_DESCRIPTION("Xtables: Routing realm match"); 31 .name = "realm",
|
| /linux/include/linux/ceph/ |
| H A D | ceph_fs.h | 569 __le64 realm; /* snap realm */ member 776 __le64 ino, realm; member 861 __le64 ino; /* snap realm base */ 862 __le64 seq; /* snap seq for this snap realm */ 863 __le64 parent; /* parent realm */ 882 __le32 num_split_inos; /* # inos belonging to new child realm */ 883 __le32 num_split_realms; /* # child realms udner new child realm */ 894 __le64 parent; /* ino: parent realm */
|
| /linux/arch/arm64/kernel/ |
| H A D | rsi.c | 90 * mapping, or an MMIO emulated in the Realm world). 95 * RIPAS_DEV - A trusted device memory or a trusted emulated MMIO (in the Realm
|
| /linux/drivers/virt/coco/arm-cca-guest/ |
| H A D | Kconfig | 7 attestation report from the Realm Management Monitor(RMM).
|
| /linux/fs/smb/server/ |
| H A D | ntlmssp.h | 36 #define NTLMSSP_REQUEST_TARGET 0x04 /* Srv returns its auth realm */
|
| /linux/include/linux/sunrpc/ |
| H A D | svcauth.h | 27 /* name of form servicetype/hostname@REALM, passed down by
|
| /linux/kernel/trace/rv/ |
| H A D | rv.c | 47 * Realm | | Realm
|
| /linux/Documentation/filesystems/ |
| H A D | afs.rst | 213 Currently the username, realm, password and proposed ticket lifetime are
|
| /linux/net/rxrpc/ |
| H A D | rxkad.c | 1039 name = Z(REALM, realm); in rxkad_decrypt_ticket() 1040 _debug("KIV REALM: %s", name); in rxkad_decrypt_ticket()
|
| /linux/net/sunrpc/auth_gss/ |
| H A D | gss_rpc_upcall.c | 242 /* terminate and remove realm part */ in gssp_hostbased_service()
|
| /linux/Documentation/userspace-api/ |
| H A D | iommufd.rst | 113 be forwarded via this object too, such as security level or realm information
|
| /linux/net/sched/ |
| H A D | cls_route.c | 688 MODULE_DESCRIPTION("Routing table realm based TC classifier");
|
| /linux/kernel/ |
| H A D | seccomp.c | 653 * As threads are considered to be trust-realm in seccomp_sync_threads()
|
| /linux/fs/smb/client/ |
| H A D | cifsglob.h | 1069 char *serverDomain; /* security realm of server */
|
| /linux/include/trace/events/ |
| H A D | rxrpc.h | 67 EM(rxkad_abort_resp_tkt_realm, "rxkad-resp-tk-realm") \
|
| /linux/fs/btrfs/ |
| H A D | scrub.c | 2844 * out of RAID56 realm. in scrub_enumerate_chunks()
|