ACE_READ_ACL
if (access_mask & ACE_READ_ACL)
if (ace->a_access_mask & ACE_READ_ACL)
if (ace->a_access_mask & ACE_READ_ACL) {
{ ACE_READ_ACL, "c" },
if ((acep->a_access_mask & ACE_READ_ACL) &&
if ((mask & (ACE_READ_ACL | ACE_READ_ATTRIBUTES)) !=
(ACE_READ_ACL | ACE_READ_ATTRIBUTES)) {
ACE_READ_ACL | \
ACE_WRITE_NAMED_ATTRS|ACE_READ_ACL|ACE_READ_ATTRIBUTES|
masks->group = ACE_READ_ACL|ACE_READ_ATTRIBUTES|ACE_READ_NAMED_ATTRS|
masks->everyone = ACE_READ_ACL|ACE_READ_ATTRIBUTES|ACE_READ_NAMED_ATTRS|
if ((mask & (ACE_READ_ACL|ACE_READ_ATTRIBUTES)) &&
access |= ACE_READ_ACL | ACE_READ_ATTRIBUTES;
ACE_READ_ATTRIBUTES | ACE_READ_ACL | ACE_WRITE_ACL)
ACE_READ_ACL | ACE_WRITE_ACL;
if (buf[i].a_access_mask & (ACE_READ_ACL|ACE_READ_ATTRIBUTES) &&
{(uint_t)-1, ACE_READ_ACL|ACE_READ_ATTRIBUTES|
{ 'c', ACE_READ_ACL},
if (mask & ACE_READ_ACL)
if (error == 0 && (mask & ACE_READ_ACL)) {
zace->a_access_mask = ACE_READ_ACL | ACE_WRITE_ACL |
*acet_mask |= ACE_READ_ACL;
if (acet_mask & ACE_READ_ACL)
zace->a_access_mask = ACE_READ_ACL | ACE_WRITE_ACL |
if (SMB_TREE_HAS_ACCESS(sr, ACE_READ_ACL) == 0)
ACE_READ_ATTRIBUTES, ACE_WRITE_ATTRIBUTES, ACE_DELETE, ACE_READ_ACL,
if (error = zfs_zaccess(zp, ACE_READ_ACL, 0, skipaclchk, cr))
if ((working_mode & (ACE_READ_ACL|ACE_READ_ATTRIBUTES)) &&
working_mode &= ~(ACE_READ_ACL|ACE_READ_ATTRIBUTES);
ACE_READ_ACL|ACE_READ_ATTRIBUTES|ACE_SYNCHRONIZE))
if ((working_mode & (ACE_READ_ACL|ACE_READ_ATTRIBUTES) &&
working_mode &= ~(ACE_READ_ACL|ACE_READ_ATTRIBUTES);
ACE_READ_ACL|ACE_READ_ATTRIBUTES|ACE_SYNCHRONIZE))
#define EVERYONE_ALLOW_MASK (ACE_READ_ACL|ACE_READ_ATTRIBUTES | \
#define ZFS_CHECKED_MASKS (ACE_READ_ACL|ACE_READ_ATTRIBUTES|ACE_READ_DATA| \
ACE_WRITE_ATTRIBUTES|ACE_DELETE|ACE_READ_ACL|ACE_WRITE_ACL| \
#define ACE_READ_PERMS (ACE_READ_DATA|ACE_READ_ACL|ACE_READ_ATTRIBUTES| \
ACE_WRITE_ATTRIBUTES|ACE_DELETE|ACE_READ_ACL|ACE_SYNCHRONIZE)