/illumos-gate/usr/src/cmd/mdb/intel/kmdb/ |
H A D | kmdb_fault_isadep.c | 45 print_frame(uintptr_t pc, int fnum, int safe) argument 47 if (safe) { 72 print_stack(kreg_t sp, int safe) argument 79 print_frame(fr->fr_savpc, frnum, safe); 93 kmdb_fault_display(kreg_t trapno, kreg_t pc, kreg_t sp, int safe) argument 97 if (!safe) 121 print_stack(sp, safe);
|
/illumos-gate/usr/src/cmd/mdb/sparc/kmdb/ |
H A D | kmdb_fault_isadep.c | 50 print_frame(uintptr_t sp, uintptr_t pc, int fnum, int safe) argument 52 if (safe) { 81 print_stack(kreg_t sp, int safe) argument 90 safe); 115 kmdb_fault_display(kreg_t tt, kreg_t pc, kreg_t sp, int safe) argument 118 if (!safe) 127 const char *fmt = safe ? "%s%p\n" : "%s%a\n"; 162 print_stack(sp, safe);
|
/illumos-gate/usr/src/lib/libc/port/gen/ |
H A D | catopen.c | 280 file_open(const char *name, int safe) argument 289 fd = nls_safe_open(name, &statbuf, &trust, safe);
|
H A D | nlspath_checks.c | 74 * use NLSPATH, it should specify the "safe" flag as 1. 85 nls_safe_open(const char *path, struct stat64 *statbuf, int *trust, int safe) argument 96 * If SAFE_F has been specified or NLSPATH is safe (or not set), 99 trust_path = *trust = safe || nlspath_safe; 114 * be safe. 624 if (!*p) /* None found, we're safe */
|
/illumos-gate/usr/src/cmd/cmd-inet/usr.sbin/ |
H A D | hostconfig.c | 67 int safe = 0; /* don't change anything */ variable 157 safe++; 344 if (!safe && !set) {
|
/illumos-gate/usr/src/cmd/tip/ |
H A D | remcap.c | 132 int safe = 1; /* reset only when we open the user's $REMOTE */ local 156 safe = strcmp(cp, SYSREMOTE) == 0; 157 if (!safe) 160 if (!safe) 203 if (!safe && strstr(bp, "dv=") != 0)
|
/illumos-gate/usr/src/uts/i86pc/os/ |
H A D | mp_pc.c | 416 mach_cpu_pause(volatile char *safe) argument 419 * This cpu is now safe. 421 *safe = PAUSE_WAIT; 425 * Now we wait. When we are allowed to continue, safe 428 while (*safe != PAUSE_IDLE)
|
/illumos-gate/usr/src/cmd/cmd-inet/usr.sbin/in.routed/ |
H A D | parms.c | 500 boolean_t safe) /* 1=from secure file */ 509 if (!safe) 594 boolean_t safe) /* 1=from secure file */ 769 msg = get_passwd(tgt, val0, &parm, RIP_AUTH_MD5, safe); 496 get_passwd(char *tgt, char *val, struct parm *parmp, uint16_t type, boolean_t safe) argument 593 parse_parms(char *line, boolean_t safe) argument
|
/illumos-gate/usr/src/uts/i86xpv/os/ |
H A D | mp_xen.c | 73 * Powered-off-CPUs are already safe, as we own the cpu_lock needed to 84 * responded by reaching a safe state and setting CPU_PHASE_SAFE, we 526 * check if we need to enter the safe phase. 542 * enter the safe phase (followed by a later start_cpus()). 545 mach_cpu_pause(volatile char *safe) argument 547 *safe = PAUSE_WAIT; 550 while (*safe != PAUSE_IDLE) { 787 * XXPV Is this enough? Is this safe?
|
/illumos-gate/usr/src/uts/sun4/os/ |
H A D | machdep.c | 810 mach_cpu_pause(volatile char *safe) argument 813 * This cpu is now safe. 815 *safe = PAUSE_WAIT; 819 * Now we wait. When we are allowed to continue, safe 822 while (*safe != PAUSE_IDLE)
|
/illumos-gate/usr/src/uts/common/klm/ |
H A D | nlm_client.c | 80 * Determines wether given lock "flp" is safe. 81 * The lock is considered to be safe when it 550 * The function determines whether it's safe to map 552 * The mapping is considered to be "safe" if file 562 int safe = 1; local 569 safe = 0; 576 if (!safe) 577 return (safe); 587 safe = 0; 593 return (safe); [all...] |
/illumos-gate/usr/src/cmd/cmd-inet/usr.bin/ftp/ |
H A D | ftp.c | 502 * 631 - base 64 encoded safe message 2419 int safe = 0; local 2433 case 631: /* 'safe' */ 2434 safe = 1; 2460 int conf_state = safe;
|
/illumos-gate/usr/src/uts/common/fs/nfs/ |
H A D | nfs4_client.c | 1442 * Exiting is considered to be safe for CPR as well 2737 * are safe if whole-file (length and offset are both zero). 2746 int safe = 1; local 2761 * Note that we can't bail out of the loop if we find a non-safe 2765 * non-safe lock. 2774 safe = 0; 2787 safe ? "safe" : "unsafe")); 2788 return (safe);
|
/illumos-gate/usr/src/uts/common/os/ |
H A D | cpu.c | 751 * This routine is called to place the CPUs in a safe place so that 767 volatile char *safe = &safe_list[index]; local 770 ASSERT((curthread->t_bound_cpu != NULL) || (*safe == PAUSE_DIE)); 772 while (*safe != PAUSE_DIE) { 773 *safe = PAUSE_READY; 779 * indicates that it's safe to do the spl. Until 804 mach_cpu_pause(safe); 815 *safe = PAUSE_DEAD; 866 * fact that it is safe for cpr suspend. 1204 * Put all the cpus into a known safe plac [all...] |
/illumos-gate/usr/src/uts/common/gssapi/mechs/krb5/include/ |
H A D | k5-int.h | 1579 * Warning, do not access hSession directly as this is not fork() safe. 1609 * Note, if the pid of the krb ctx == the current global pid then it is safe to 1886 krb5_safe *safe; member in struct:krb5_safe_with_body
|