/illumos-gate/usr/src/lib/pyzfs/common/ |
H A D | unallow.py | 25 import zfs.allow namespace 27 do_unallow = zfs.allow.do_allow
|
/illumos-gate/usr/src/lib/udapl/udapl_tavor/common/ |
H A D | dapl_rmr_util.c | 92 IN DAT_COMPLETION_FLAGS allow, 95 if ((mask & request) && !(mask & allow)) { 91 dapl_rmr_validate_completion_flag(IN DAT_COMPLETION_FLAGS mask, IN DAT_COMPLETION_FLAGS allow, IN DAT_COMPLETION_FLAGS request) argument
|
/illumos-gate/usr/src/cmd/lp/lib/access/ |
H A D | allowed.c | 76 char ** allow, 80 is_user_allowed (user, allow, deny) 82 **allow, 89 return (allowed(user, allow, deny)); 108 char **allow, local 111 if (loadaccess(Lp_A_Forms, form, "", &allow, &deny) == -1) 114 return (is_user_allowed(user, allow, deny)); 133 char **allow, local 136 if (loadaccess(Lp_A_Printers, printer, UACCESSPREFIX, &allow, &deny) == -1) 139 return (is_user_allowed(user, allow, den 74 is_user_allowed( char * user, char ** allow, char ** deny ) argument 158 char **allow, local 173 allowed( char * item, char ** allow, char ** deny ) argument [all...] |
/illumos-gate/usr/src/lib/pam_modules/list/ |
H A D | list.c | 49 string_mode_type(pam_list_mode_t op_mode, boolean_t allow) argument 52 (allow ? "allow" : "deny")); 79 boolean_t allow = B_FALSE; local 107 string_mode_type(op_mode, allow)); 110 } else if (strncasecmp(argv[i], "allow=", 111 sizeof ("allow=") - 1) == 0) { 114 sizeof ("allow=") - 1; 115 allow = B_TRUE; 119 log_illegal_combination("allow", [all...] |
/illumos-gate/usr/src/tools/ndrgen/ |
H A D | ndr_anal.c | 343 int allow; local 363 allow = ALLOW_NO_SWITCH; 367 allow); /* see above */ 386 int allow; local 410 allow = ALLOW_VARSIZE; 412 allow = 0; 414 analyze_member(mem_np, mem, &offset, allow); 503 unsigned long *offsetp, int allow) 633 if (allow & ALLOW_CASE) { 729 if (type_down->size_variable_part && !(allow 502 analyze_member(ndr_node_t *mem_np, ndr_member_t *mem, unsigned long *offsetp, int allow) argument [all...] |
/illumos-gate/usr/src/man/man4/ |
H A D | Makefile | 227 hosts.allow.4 \ 272 hosts.allow.4 := LINKSRC = hosts_access.4
|
/illumos-gate/usr/src/cmd/hal/tools/ |
H A D | hal-storage-mount.c | 734 char *allow = allowed_options[j]; local 735 int allow_len = strlen (allow); 737 if (strcmp (given, allow) == 0) { 741 if ((allow[allow_len - 1] == '=') && 742 (strncmp (given, allow, allow_len) == 0) && 748 if (strcmp (allow, "uid=") == 0) { 758 printf ("%s with uid %d\n", allow, uid);
|
/illumos-gate/usr/src/uts/common/inet/ip/ |
H A D | igmp.c | 1047 slist_t *allow, *block; local 1059 allow = b_minus_a; 1062 allow = a_minus_b; 1066 if (!SLIST_IS_EMPTY(allow)) 1068 allow, rp); 1138 slist_t *allow, *block; local 1150 allow = b_minus_a; 1153 allow = a_minus_b; 1156 if (!SLIST_IS_EMPTY(allow)) 1158 allow, r [all...] |
/illumos-gate/usr/src/uts/common/io/vscan/ |
H A D | vscan_svc.c | 461 boolean_t allow; local 470 if (vscan_svc_exempt_file(vp, &allow)) { 471 if ((allow == B_TRUE) || (async != 0)) 642 /* if vscan not enabled (shutting down), allow ACCESS */ 836 * allow access, set scanstamp, 839 * deny access if file quarantined, otherwise allow access 842 * otherwise, allow access 1070 * If the file is exempt from virus scanning, allow will be set 1078 vscan_svc_exempt_file(vnode_t *vp, boolean_t *allow) argument 1088 *allow [all...] |
/illumos-gate/usr/src/uts/common/fs/nfs/ |
H A D | nfs4_acl.c | 482 ace4_make_deny(nfsace4 *allow, nfsace4 *deny, int isdir, int isowner, argument 485 bcopy(allow, deny, sizeof (nfsace4)); 487 (void) utf8_copy(&allow->who, &deny->who); 497 deny->access_mask |= access_mask_set((allow->access_mask & 498 ACE4_WRITE_DATA), (allow->access_mask & ACE4_READ_DATA), isowner, 581 /* allow + deny for each aclent */ 619 * On the client, we do not allow an ACL with 735 * the allow ace. 1084 "ace4_to_aent_legal: neither allow nor deny")); 1202 "ace4vals_to_aent: mis-matched allow/den [all...] |
/illumos-gate/usr/src/common/acl/ |
H A D | acl_common.c | 434 ace_make_deny(ace_t *allow, ace_t *deny, int isdir, int isowner) argument 436 (void) memcpy(deny, allow, sizeof (ace_t)); 438 deny->a_who = allow->a_who; 448 deny->a_access_mask |= access_mask_set((allow->a_access_mask & 449 ACE_WRITE_DATA), (allow->a_access_mask & ACE_READ_DATA), isowner, 522 /* allow + deny for each aclent */ 623 * the allow ace. 1718 * Don't allow anybody to deny reading basic 1738 * only allow owner@ to have
|
/illumos-gate/usr/src/uts/common/fs/ |
H A D | vnode.c | 1729 * (but allow files like mnttab) 1847 * namefs doesn't allow directories to 2669 int allow = 1; local 2688 allow = 0; 2691 return (allow); 3138 * For now allow segvn to only use VOP_PAGEIO() with ufs and nfs.
|
/illumos-gate/usr/src/uts/common/os/ |
H A D | zone.c | 936 * because we want the design to allow for the list of zones 970 * because we want the design to allow for the list of zsd callbacks 2733 * This is so we can allow a zone to be rebooted while there are still 4642 * Don't allow zone creations which would cause one zone's rootpath to 5791 * swap. This is because the counting for zone.max-swap does not allow swap 5802 int allow = 1; local 5813 allow = 0; 5824 allow = 0; 5829 return (allow); 5943 * Moreover, we don't allow processe [all...] |