VREAD
accmode = VREAD;
error = VOP_ACCESS(devvp, VREAD | VWRITE,
accmode = VREAD;
ap->a_cred, ap->a_td, VREAD);
ap->a_cred, ap->a_td, VREAD);
if ((mode & VREAD) != 0)
err = mac_check_vnode_open(td->td_ucred, devvp, VREAD | VWRITE);
err = VOP_ACCESS(devvp, VREAD | VWRITE, td->td_ucred, td);
err = fuse_extattr_check_cred(vp, ap->a_attrnamespace, cred, td, VREAD);
err = fuse_extattr_check_cred(vp, ap->a_attrnamespace, cred, td, VREAD);
error = VOP_ACCESS(odevvp, VREAD | VWRITE,
accmode = VREAD;
if (acmode & VREAD)
if (ap->a_accmode & VREAD)
if (ap->a_cred->cr_uid == 0 && (ap->a_accmode & VREAD)
if (nfsvno_accchk(vp, VREAD, nd->nd_cred, exp, p,
if (nfsvno_accchk(vp, VREAD, nd->nd_cred, exp, p,
if (nfsvno_accchk(vp, VREAD, nd->nd_cred, exp, p,
nd->nd_repstat = nfsvno_accchk(vp, VREAD,
nd->nd_repstat = nfsvno_accchk(vp, VREAD, nd->nd_cred,
nd->nd_repstat = nfsvno_accchk(vp, VREAD, nd->nd_cred, exp,
nd->nd_repstat = nfsvno_accchk(vp, VREAD, nd->nd_cred, exp,
nd->nd_repstat = nfsvno_accchk(vp, VREAD, nd->nd_cred, exp,
nd->nd_repstat = nfsvno_accchk(vp, VREAD,
error = VOP_ACCESS(vp, VREAD, cred, td);
if (accmode == VREAD) {
ap->a_cred, ap->a_td, VREAD);
ap->a_cred, ap->a_td, VREAD);
error = VOP_ACCESS(devvp, VREAD, td->td_ucred, td);
error = VOP_ACCESS(lvp, VREAD, cred, td);
if ((error = mac_vnode_check_open(cred, lvp, VEXEC | VREAD)) != 0)
if ((error = VOP_ACCESS(lvp, VEXEC | VREAD, cred, td)) != 0)
accmode |= VREAD; /* will copy to upper */
if (accmode & VREAD)
if (accmode & VREAD)
if (accmode & VREAD)
error = mac_vnode_check_open(td->td_ucred, vp, VREAD);
KASSERT((accmode & ~(VEXEC | VWRITE | VREAD | VADMIN | VAPPEND |
if ((accmode & VREAD) && !priv_check_cred(cred, PRIV_VFS_READ))
priv_granted |= VREAD;
} accmode2mask[] = {{VREAD, ACL_READ_DATA},
if ((accmode & VREAD) && !priv_check_cred(cred, PRIV_VFS_READ))
priv_granted |= VREAD;
dac_granted |= VREAD;
acl_mask_granted |= VREAD;
acl_mask_granted = VEXEC | VREAD | VWRITE | VAPPEND;
dac_granted |= VREAD;
dac_granted |= VREAD;
dac_granted |= VREAD;
dac_granted |= VREAD;
dac_granted |= VREAD;
dac_granted |= VREAD;
KASSERT((accmode & ~(VEXEC | VWRITE | VREAD | VADMIN | VAPPEND)) == 0,
accmode |= VREAD;
VREAD | VWRITE, ucred);
accmode |= VREAD;
error = mac_vnode_check_open(td->td_ucred, vp, VWRITE | VREAD);
KASSERT((ap->a_accmode & ~(VEXEC | VWRITE | VREAD | VADMIN |
error = VOP_ACCESS(vp, VREAD, td->td_ucred, td);
KASSERT((accmode & ~(VEXEC | VWRITE | VREAD | VADMIN | VAPPEND)) == 0,
dac_granted |= VREAD;
dac_granted |= VREAD;
dac_granted |= VREAD;
if ((accmode & VREAD) && ((dac_granted & VREAD) == 0) &&
priv_granted |= VREAD;
accmode |= VREAD;
accmode |= VREAD;
VOP_ACCESS(vp, VREAD, cred, td) == 0)
accmode = argp->exclusive ? VWRITE : VREAD;
accmode = argp->exclusive ? VWRITE : VREAD;
if (accmode & (VREAD | VEXEC | VSTAT_PERMS)) {
if (accmode & (VREAD | VEXEC | VSTAT_PERMS)) {
if (accmode & VREAD)
if (accmode & (VREAD | VEXEC | VSTAT_PERMS)) {
if (accmode & (VREAD | VEXEC | VSTAT_PERMS)) {
error = VOP_ACCESS(ump->um_odevvp, VREAD | VWRITE,
accmode = VREAD;
error = VOP_ACCESS(odevvp, VREAD | VWRITE,
ap->a_cred, ap->a_td, VREAD);
ap->a_cred, ap->a_td, VREAD);
error = extattr_check_cred(vp, attrnamespace, cred, td, VREAD);