/illumos-gate/usr/src/cmd/init/ |
H A D | init.c | 488 static char *SU = "/etc/sulogin"; /* Super-user program for single user */ 499 static int new_state; /* State user wants "init" to go to. */ 510 static int sflg = 0; /* Set if we were booted -s to single user */ 619 /* Parse the arguments to init. Check for single user */ 645 * Determine if we are the main init, or a user invoked init, whose job 656 * must be in 'user' mode. 711 * will work in case we need to go down to single user mode. 792 * exist default to single user mode. 983 * single-user mod 2617 char user[sizeof (up->ut_user) + 1]; local [all...] |
/illumos-gate/usr/src/cmd/zoneadm/ |
H A D | zoneadm.c | 239 "does not start any user\n\tprocesses in the zone.")); 1020 * before returning, so the user can learn everything that needs 1549 * user will likely need to do some manual cleanup. 1555 auth_check(char *user, char *zone, int cmd_num) argument 1589 if (chkauthattr(authname, user) == 0) { 1608 * 2. The calling user has sufficient privilege. 1660 zerror(gettext("only a privileged user may %s a zone."), 3626 "user is not authorized to read source zone."), 3846 * any user data alone. 3914 * the user dat [all...] |
/illumos-gate/usr/src/cmd/zonecfg/ |
H A D | zonecfg.c | 234 "user", 511 "set user=", 1251 gettext("<single user or role name>")); 2232 "to even the root user; " 2312 "to even the root user; " 2607 * so that the user can later create a new zone with the same name. 2647 * user if the zone is not configured. In force mode, we don't 2689 * begin with, then user had typed delete (or delete -F) multiple 4224 "to even the root user; " 4401 * Special case: the user ca 5180 struct zone_fstab lookup, user; local 5230 struct zone_nwiftab lookup, user; local 5274 struct zone_devtab lookup, user; local 5322 struct zone_rctltab lookup, user; local 5360 struct zone_attrtab lookup, user; local 5404 struct zone_dstab lookup, user; local 5589 struct zone_admintab lookup, user; local [all...] |
/illumos-gate/usr/src/cmd/zonestat/zonestatd/ |
H A D | zonestatd.c | 1547 uint64_t idle, intr, kern, user; local 1580 user = knp->value.ui64; 1590 cpu->zsc_nsec_user = user; 1609 idle = intr = kern = user = 0; 1620 user = cpu->zsc_nsec_user - cpu->zsc_nsec_user_prev; 1626 TIMESTRUC_ADD_NANOSEC(cpu->zsc_user, user); 1639 TIMESTRUC_ADD_NANOSEC(pset->zsp_user, user); 1648 TIMESTRUC_ADD_NANOSEC(pset_prev->zsp_user, user / 2); 1657 (user / 2) + (user 2776 timestruc_t user, sys, proc_usage; local [all...] |
/illumos-gate/usr/src/uts/common/gssapi/mechs/krb5/include/ |
H A D | k5-int.h | 73 * includes the user-visible definitions from krb5.h and then 74 * includes other definitions that are not user-visible but are 1169 krb5_principal user; member in struct:_krb5_pa_for_user 1715 krb5_data user_data; /* user data */ 1732 krb5_data user_data; /* user data */ 2778 * Kernel & user space realloc.
|
/illumos-gate/usr/src/cmd/zfs/ |
H A D | zfs_main.c | 288 "<\"everyone\"|user|group>[,...] <perm|@setname>[,...]\n" 297 "<\"everyone\"|user|group>[,...]\n" 460 (void) fprintf(fp, gettext("\nThe {user|group}{used|quota}@ " 462 "a user or group specifier of one of these forms:\n" 685 * If the user doesn't want the dataset 723 * For volumes, the user must specify a size to be used. 891 * verbose error message to let the user know that their filesystem was 893 * If the user doesn't want the dataset automatically mounted, 1473 * Prints properties for the given datasets. The user can control which 1797 * need to know the maximum name length. However, the user likel 4705 boolean_t user; member in struct:allow_opts [all...] |
/illumos-gate/usr/src/uts/common/nfs/ |
H A D | nfs4_kprot.h | 380 avl_tree_t user; member in struct:ace4_list
|
/illumos-gate/usr/src/lib/libzonecfg/common/ |
H A D | libzonecfg.c | 135 #define DTD_ATTR_USER (const xmlChar *) "user" 970 * The user deals in absolute paths in the running global zone, but the 1488 * the user will need access to the directory so use that as a heuristic. 2716 char user[MAXUSERNAME]; local 2730 if ((fetchprop(cur, DTD_ATTR_USER, user, 2731 sizeof (user)) == Z_OK) && 2732 (strcmp(tabptr->zone_admin_user, user) == 0)) { 4283 * This validation is the one we expect to fail if the user specified 8003 * depending on the type of the specified user. It is also 8014 zonecfg_authorize_user_impl(zone_dochandle_t handle, char *user, argument 8167 char user[MAXUSERNAME]; local 8193 zonecfg_deauthorize_user(zone_dochandle_t handle, char *user, char *zonename) argument 8203 char user[MAXUSERNAME]; local 8223 zonecfg_insert_userauths(zone_dochandle_t handle, char *user, char *zonename) argument 8254 zonecfg_remove_userauths(zone_dochandle_t handle, char *user, char *zonename, boolean_t deauthorize) argument [all...] |