/illumos-gate/usr/src/uts/common/fs/smbsrv/ |
H A D | smb_ofile.c | 1219 * Encode open file information into a buffer; needed in user space to 1241 smb_user_t *user; local 1249 user = of->f_user; 1251 ASSERT(user); 1298 fi->fi_namelen = user->u_domain_len + user->u_name_len + 2; 1301 user->u_domain, user->u_name); 1320 * A query of user and group quotas may span multiple requests.
|
/illumos-gate/usr/src/uts/common/fs/zfs/ |
H A D | dbuf.c | 319 /* Only data blocks support the attachment of user data. */ 322 /* Clients must resolve a dbuf before attaching user data. */ 2877 dmu_buf_set_user(dmu_buf_t *db_fake, dmu_buf_user_t *user) argument 2879 return (dmu_buf_replace_user(db_fake, NULL, user)); 2883 dmu_buf_set_user_ie(dmu_buf_t *db_fake, dmu_buf_user_t *user) argument 2888 return (dmu_buf_set_user(db_fake, user)); 2892 dmu_buf_remove_user(dmu_buf_t *db_fake, dmu_buf_user_t *user) argument 2894 return (dmu_buf_replace_user(db_fake, user, NULL));
|
H A D | dmu_objset.c | 1071 * dnode and user/group accounting objects). 1291 uint64_t user, uint64_t group, boolean_t subtract) 1298 userquota_update_cache(&cache->uqc_user_deltas, user, delta); 1324 /* Allocate the user/groupused objects if necessary. */ 1415 uint64_t *user = NULL; local 1460 user = &dn->dn_olduid; 1463 user = &dn->dn_newuid; 1472 user, group); 1290 do_userquota_update(userquota_cache_t *cache, uint64_t used, uint64_t flags, uint64_t user, uint64_t group, boolean_t subtract) argument
|
/illumos-gate/usr/src/cmd/zfs/ |
H A D | zfs_main.c | 288 "<\"everyone\"|user|group>[,...] <perm|@setname>[,...]\n" 297 "<\"everyone\"|user|group>[,...]\n" 460 (void) fprintf(fp, gettext("\nThe {user|group}{used|quota}@ " 462 "a user or group specifier of one of these forms:\n" 685 * If the user doesn't want the dataset 723 * For volumes, the user must specify a size to be used. 891 * verbose error message to let the user know that their filesystem was 893 * If the user doesn't want the dataset automatically mounted, 1473 * Prints properties for the given datasets. The user can control which 1797 * need to know the maximum name length. However, the user likel 4705 boolean_t user; member in struct:allow_opts [all...] |
/illumos-gate/usr/src/cmd/zonecfg/ |
H A D | zonecfg.c | 234 "user", 511 "set user=", 1251 gettext("<single user or role name>")); 2232 "to even the root user; " 2312 "to even the root user; " 2607 * so that the user can later create a new zone with the same name. 2647 * user if the zone is not configured. In force mode, we don't 2689 * begin with, then user had typed delete (or delete -F) multiple 4224 "to even the root user; " 4401 * Special case: the user ca 5180 struct zone_fstab lookup, user; local 5230 struct zone_nwiftab lookup, user; local 5274 struct zone_devtab lookup, user; local 5322 struct zone_rctltab lookup, user; local 5360 struct zone_attrtab lookup, user; local 5404 struct zone_dstab lookup, user; local 5589 struct zone_admintab lookup, user; local [all...] |
/illumos-gate/usr/src/head/ |
H A D | libzonecfg.h | 263 char user[MAXUSERNAME]; member in struct:zone_userauths
|
/illumos-gate/usr/src/lib/libzonecfg/common/ |
H A D | libzonecfg.c | 135 #define DTD_ATTR_USER (const xmlChar *) "user" 970 * The user deals in absolute paths in the running global zone, but the 1488 * the user will need access to the directory so use that as a heuristic. 2716 char user[MAXUSERNAME]; local 2730 if ((fetchprop(cur, DTD_ATTR_USER, user, 2731 sizeof (user)) == Z_OK) && 2732 (strcmp(tabptr->zone_admin_user, user) == 0)) { 4283 * This validation is the one we expect to fail if the user specified 8003 * depending on the type of the specified user. It is also 8014 zonecfg_authorize_user_impl(zone_dochandle_t handle, char *user, argument 8167 char user[MAXUSERNAME]; local 8193 zonecfg_deauthorize_user(zone_dochandle_t handle, char *user, char *zonename) argument 8203 char user[MAXUSERNAME]; local 8223 zonecfg_insert_userauths(zone_dochandle_t handle, char *user, char *zonename) argument 8254 zonecfg_remove_userauths(zone_dochandle_t handle, char *user, char *zonename, boolean_t deauthorize) argument [all...] |
/illumos-gate/usr/src/cmd/halt/ |
H A D | halt.c | 1446 * For all the other errors, we continue on in case user 1447 * user want to force fast reboot, or fall back to regular 1460 char *user = getlogin(); local 1465 if (user == NULL && (pw = getpwuid(getuid())) != NULL) 1466 user = pw->pw_name; 1467 if (user == NULL) 1468 user = "root"; 1473 syslog(LOG_CRIT, "initiated by %s", user); 1475 syslog(LOG_CRIT, "initiated by %s on %s", user, tty);
|
/illumos-gate/usr/src/common/ficl/ |
H A D | ficl.h | 264 * Enables user variables: per-instance variables bound to the VM. 285 * OOP support requires locals and user variables! 1014 ficlCell user[FICL_USER_CELLS]; member in struct:ficlVm 1039 /* user wants to quit */ 1117 * FICL_VM_STATUS_USER_EXIT means that the user executed the "bye" command 1186 * For precompiled words, the code is all there is. For user defined 1505 * by default, user can redefine to guarantee exclusive dictionary
|
/illumos-gate/usr/src/uts/common/nfs/ |
H A D | nfs4_kprot.h | 380 avl_tree_t user; member in struct:ace4_list
|
/illumos-gate/usr/src/cmd/power/ |
H A D | powerd.c | 685 * Only when everything else is idle, run the user's idlecheck 940 * Execute the user's idlecheck script and set variable PM_IDLETIME. 1007 char *home, *user; local 1032 user = malloc(strlen(pwd->pw_name) + sizeof (euser)); 1033 if (home == NULL || user == NULL) { 1035 free(user); 1042 (void) strcpy(user, euser); 1043 (void) strcat(user, pwd->pw_name); 1046 * Need to simulate the user enviroment, minimaly set HOME, and USER. 1050 (void) putenv(user); [all...] |
/illumos-gate/usr/src/lib/libdtrace/common/ |
H A D | dt_parser.c | 675 boolean_t user) 707 if (user) 761 * Here we have a 32-bit user pointer that is being used with a 64-bit 1341 * Explicit references to user types (C or D) are assigned the default 2652 * If two marks in a row are found, set 'uref' (user symbol reference). 2736 static const char *const kunames[] = { "kernel", "user" }; 4126 * up and report failure back to the user. There are five possible paths: 4144 * user can simply use the D variable declaration syntax to work around them. 674 dt_node_type_assign(dt_node_t *dnp, ctf_file_t *fp, ctf_id_t type, boolean_t user) argument
|
/illumos-gate/usr/src/cmd/isns/isnsd/ |
H A D | door.c | 915 uid_t user; local 935 user = ucred_getruid(uc); 936 ret = getpwuid_r(user, &pwds, buf_pwd, sizeof (buf_pwd), &pwd);
|
/illumos-gate/usr/src/cmd/oamuser/user/ |
H A D | homedir.c | 70 /* uid of new user */ 71 /* group id of new user */ 275 rm_files(char *homedir, char *user, int flags) argument
|
/illumos-gate/usr/src/cmd/stat/iostat/ |
H A D | iostat.c | 948 "\t\t\tin user/system/dtrace/idle mode\n" 1570 uint64_t user; local 1585 user = kstat_delta(oldks, &newss->s_sys.ss_agg_sys, "cpu_ticks_user"); 1591 push_out(fstr, user * percent, kern * percent,
|
/illumos-gate/usr/src/common/acl/ |
H A D | acl_common.c | 140 avl_tree_t user; member in struct:ace_list 527 * user|group for the mask (the group_obj was added 1133 for (vals = avl_first(&list->user); vals != NULL; 1134 vals = AVL_NEXT(&list->user, vals)) { 1232 while ((node = avl_destroy_nodes(&al->user, &cookie)) != NULL) 1238 avl_destroy(&al->user); 1295 avl_create(&normacl->user, acevals_compare, sizeof (acevals_t), 1306 avl_create(&dfacl->user, acevals_compare, sizeof (acevals_t), 1388 vals = acevals_find(acep, &acl->user,
|
/illumos-gate/usr/src/cmd/fm/modules/common/ext-event-transport/ |
H A D | fmevt_inbound.c | 208 fmevt_detector(nvlist_t *attr, char *ruleset, int user, int priv, argument 265 user ? "userland" : "kernel"); 496 int user, priv; local 505 user = (cbarg & CBF_USER) != 0; 530 if ((dtcr = fmevt_detector(rawattr, ruleset, user, priv, 539 ea.pp_user = user;
|
/illumos-gate/usr/src/cmd/syseventd/modules/sysevent_conf_mod/ |
H A D | sysevent_conf_mod.c | 35 * data, and a user specification so that commands can be invoked 450 * class subclass vendor publisher user reserved1 reserved path arguments 472 * user 473 * The name of the user under which the command should be 475 * other than those for root. The user field should be '-' 501 char *user; local 543 if ((user = next_field(&lp)) == NULL) 554 * validate user 557 if ((strcmp(user, "-") != 0) && (strcmp(user, "roo [all...] |
/illumos-gate/usr/src/lib/libpool/common/ |
H A D | pool_kernel.c | 730 * load_group to allocate the user-land representation of the 876 pool_value_t *pval, void *user) 878 struct knl_to_xml *info = (struct knl_to_xml *)user; 2990 * however the kernel update is delayed until the user calls 875 prop_build_cb(pool_conf_t *UNUSED, pool_elem_t *pe, const char *name, pool_value_t *pval, void *user) argument
|
/illumos-gate/usr/src/cmd/ptools/ptime/ |
H A D | ptime.c | 197 timestruc_t real, user, sys; local 220 user = pup->pr_utime; 231 prtime("user", &user);
|
/illumos-gate/usr/src/lib/pam_modules/unix_session/ |
H A D | unix_session.c | 91 char *ttyn, *rhost, *user; local 116 (error = pam_get_item(pamh, PAM_USER, (void **)&user)) 123 if (user == NULL || *user == '\0') 130 if (getpwnam_r(user, &pwd, buffer, sizeof (buffer)) == NULL) { 180 "user = %s, time = %s, tty = %s, host = %s.", 181 user, buf, newll.ll_line, newll.ll_host);
|
/illumos-gate/usr/src/lib/smbsrv/libmlsvc/common/ |
H A D | lsalib.c | 63 * If the name is a domain account, it may refer to a user, group or 145 char user[SMB_USERNAME_MAXLEN]; local 148 smb_ipc_get_user(user, SMB_USERNAME_MAXLEN); 150 status = lsar_open(server, domain, user, &domain_handle); 174 char user[SMB_USERNAME_MAXLEN]; local 177 smb_ipc_get_user(user, SMB_USERNAME_MAXLEN); 179 status = lsar_open(server, domain, user, &domain_handle); 204 char user[SMB_USERNAME_MAXLEN]; local 207 smb_ipc_get_user(user, SMB_USERNAME_MAXLEN); 209 status = lsar_open(server, domain, user, 234 char user[SMB_USERNAME_MAXLEN]; local 274 char user[SMB_USERNAME_MAXLEN]; local 356 char user[SMB_USERNAME_MAXLEN]; local 394 char user[SMB_USERNAME_MAXLEN]; local 426 char user[SMB_USERNAME_MAXLEN]; local 551 char user[SMB_USERNAME_MAXLEN]; local [all...] |
H A D | lsar_clnt.c | 121 lsar_open_policy2(char *server, char *domain, char *user, argument 129 status = ndr_rpc_bind(lsa_handle, server, domain, user, "LSARPC"); 478 * Lookup a name and obtain the domain and user rid.
|
H A D | lsar_svc.c | 514 * Return the account name and NetBIOS domain name for the user making 523 smb_netuserinfo_t *user = mxa->pipe->np_user; local 543 rc1 = NDR_MSTRING(mxa, user->ui_account, 545 rc2 = NDR_MSTRING(mxa, user->ui_domain,
|
H A D | netr_auth.c | 138 char user[SMB_USERNAME_MAXLEN]; local 141 smb_ipc_get_user(user, SMB_USERNAME_MAXLEN); 143 status = ndr_rpc_bind(netr_handle, server, domain, user, "NETR");
|