/illumos-gate/usr/src/tools/smatch/src/Documentation/ |
H A D | data-structures.txt | 32 An entrypoint has a list of basic blocks. 34 A basic block represents a series of instructions with no branches. 36 A branch only occurs at the end of a basic block, and branches can only target the beginning of a b… 37 …will consist of a basic block leading up to the branch, a basic block for the true case, a basic b… 39 … loop will normally have a basic block for the loop body, which can branch to the top at the end o… 40 So basic blocks represent a node in the control flow graph. 41 The edges in that graph lead from one basic block to a basic block which can follow it in the execu… 42 Each basic block has a series of instructions, "struct instruction". 45 So you have an entrypoint, which has a graph of basic blocks, each of which has a list of instructi… 54 For instance, the context checking works in terms of basic blocks.
|
/illumos-gate/usr/src/test/nvme-tests/runfiles/ |
H A D | non-destruct.run | 39 'basic-get-feature.32', 40 'basic-get-feature.64', 41 'basic-get-log.32', 42 'basic-get-log.64', 43 'basic-identify.32', 44 'basic-identify.64', 45 'basic-lock.32', 46 'basic-lock.64',
|
/illumos-gate/usr/src/lib/libdemangle/common/ |
H A D | rust-v0puny.c | 99 * if there are a non-zero number of basic (ASCII) code points. Since in rustv0_puny_decode() 100 * the delimiter itself is a basic code point, the last one present in rustv0_puny_decode() 101 * in the original string is the actual delimiter between the basic in rustv0_puny_decode() 102 * and non-basic code points. Earlier occurences of the delimiter in rustv0_puny_decode() 103 * are treated as normal basic code points. For plain punycode, an in rustv0_puny_decode() 105 * final delimiter, and a name with all non-basic code points would in rustv0_puny_decode() 110 * on this). For an all non-basic codepoint identifier, no delimiter in rustv0_puny_decode() 113 * when we transition from copying the basic code points (which there in rustv0_puny_decode() 114 * will be none in this situation) to non-basic code points. in rustv0_puny_decode() 129 /* Copy all the basic characters up to the delimiter into buf */ in rustv0_puny_decode() [all …]
|
/illumos-gate/usr/src/man/man8/ |
H A D | acctadm.8 | 174 \fBflowadm\fR(8), respectively. Basic network accounting relates only to 218 \fBExample 2 \fRActivating Basic Process Accounting 221 The following command activates basic process accounting: 226 $ \fBacctadm -e basic -f /var/adm/exacct/proc process\fR 244 basic pid,uid,gid,cpu,time,command,tty,flag 247 basic taskid,projid,cpu,time 251 basic saddr,daddr,sport,dport,proto,nbytes,npkts,action 256 basic name,devname,edest,vlan_tpid,vlan_tci,sap,cpuid, \e 280 basic taskid,projid,cpu,time
|
H A D | usermod.8 | 273 # \fBusermod -K defaultpriv=basic,proc_clock_highres jdoe\fR 285 jdoe::::type=normal;defaultpriv=basic,proc_clock_highres 311 jdoe::::type=normal;defaultpriv=basic,limitpriv=all,!sys_linkdir 316 \fBExample 3\fR Removing a Privilege from a User's Basic Set 325 # \fBusermod -K defaultpriv=basic,!proc_session jdoe\fR 337 jdoe::::type=normal;defaultpriv=basic,!proc_session;limitpriv=all 363 jdoe::::type=normal;roles=mailadm;defaultpriv=basic;limitpriv=all
|
/illumos-gate/usr/src/test/zfs-tests/tests/functional/delegate/ |
H A D | zfs_unallow_004_pos.ksh | 39 # 1. Set @basic set to $ROOT_TESTFS or $ROOT_TESTVOL and allow @basic 41 # 2. Verify $STAFF1 have @basic permissions. 51 log_must zfs allow -s @basic $LOCAL_DESC_SET $dtst 52 log_must zfs allow -u $STAFF1 @basic $dtst 55 log_must zfs unallow -s @basic $LOCAL_DESC_SET $dtst
|
H A D | zfs_allow_006_pos.ksh | 40 # 1. Set create as set @basic. 41 # 2. Allow set @basic to $STAFF1 on $ROOT_TESTFS or $ROOT_TESTVOL 43 # 4. Reset snapshot,allow to $basic 61 log_must zfs allow -s @basic $perms1 $dtst 62 log_must zfs allow $STAFF1 @basic $dtst 68 log_must zfs allow -s @basic $perms2 $dtst
|
/illumos-gate/usr/src/cmd/bnu/ |
H A D | README | 24 Basic Networking Utilities 27 Basic Networking Utilities Product Overview - release 1 # 307-038 28 Basic Networking Utilities Installation Guide and Release Notes 30 Basic Networking Utilities - release 1 # 307-165 65 (SEE Basic Networking Utilities - release 1 # 307-165 for details) 73 (SEE Basic Networking Utilities - release 1 # 307-165 for details) 96 (SEE Basic Networking Utilities - release 1 # 307-165 for details) 108 0- SEE Basic Networking Utilities - release 1 # 307-165
|
/illumos-gate/usr/src/man/man5/ |
H A D | nfslog.conf.5 | 51 [fhtable=<path><file>] [buffer=<path><file>] [logformat=basic|extended] 106 \fB\fBlogformat=basic|extended\fR\fR 109 Sets the format of the user-readable log file. If not specified, the basic 110 format is used. The basic format is compatible with log files generated by the 112 log, which includes directory modification operations not included in the basic 132 logformat=basic 161 the log files will remain in the basic format.
|
H A D | policy.conf.5 | 79 include \fBbasic\fR or \fBall\fR. Privileges should then be removed using 82 the basic privilege set, a user unexpectedly does not have the privileges he 87 privilege(s). Note also that dropping \fBbasic\fR privileges from the default 170 \fBall\fR for \fBPRIV_LIMIT\fR and \fBbasic\fR for \fBPRIV_DEFAULT\fR, then 177 PRIV_DEFAULT=basic,!file_link_any
|
/illumos-gate/usr/src/lib/libsecdb/ |
H A D | policy.conf | 31 PROFS_GRANTED=Basic Solaris User 61 # always include "basic" or "all"; privileges should then be removed using 64 # Similarly, PRIV_DEFAULT=basic,!file_link_any takes away only the 65 # file_link_any privilege from the basic privilege set; only that notation 67 # the basic privilege set. 72 #PRIV_DEFAULT=basic
|
/illumos-gate/usr/src/man/man3c/ |
H A D | priv_str_to_set.3c | 69 set of all privileges available within the caller's zone, and "basic" for the 70 set of basic privileges are also recognized. Set specifications are interpreted 80 To maintain future compatibility, the "basic" set of privileges is included as 82 operations migrate to the basic privilege set, the conversion back of the 83 result with \fBpriv_str_to_set()\fR includes the additional basic privileges, 87 \fBPRIV_STR_LIT\fR, the result does not treat basic privileges differently and 90 using the tokens "basic", "zone", "all", and negated privileges. This output is
|
/illumos-gate/usr/src/test/nvme-tests/tests/ioctl/ |
H A D | Makefile | 18 basic-get-feature \ 19 basic-get-log \ 20 basic-identify \ 21 basic-lock \
|
H A D | general-errors.c | 73 ioctl_test_one(int fd, const ioctl_test_t *test, void *unmap, priv_set_t *basic, in ioctl_test_one() argument 118 if (setppriv(PRIV_SET, PRIV_EFFECTIVE, basic) != 0) { in ioctl_test_one() 158 priv_set_t *basic, *cur; in main() local 166 basic = priv_allocset(); in main() 168 if (basic == NULL || cur == NULL) { in main() 171 priv_basicset(basic); in main() 179 if (!ioctl_test_one(fd, &ioctl_tests[i], unmap, basic, cur)) { in main()
|
/illumos-gate/usr/src/lib/libc/port/gen/ |
H A D | priv_str_xlate.c | 67 * Special tokens recognized: all, none, basic and "". 84 priv_set_t *basic; in priv_str_to_set() local 97 basic = priv_basic(); in priv_str_to_set() 107 if (basic != NULL && strcasecmp(offset, "basic") == 0) { in priv_str_to_set() 108 priv_union(basic, pset); in priv_str_to_set() 157 * PRIV_STR_PORT - portable output: basic,!basic 202 * port: basic,!missing_basic,other in __priv_set_to_str() 270 (void) strcpy(res, "basic"); in __priv_set_to_str()
|
/illumos-gate/usr/src/pkg/manifests/ |
H A D | system-test-nvmetest.p5m | 41 file path=opt/nvme-tests/tests/ioctl/basic-get-feature.32 mode=0555 42 file path=opt/nvme-tests/tests/ioctl/basic-get-feature.64 mode=0555 43 file path=opt/nvme-tests/tests/ioctl/basic-get-log.32 mode=0555 44 file path=opt/nvme-tests/tests/ioctl/basic-get-log.64 mode=0555 45 file path=opt/nvme-tests/tests/ioctl/basic-identify.32 mode=0555 46 file path=opt/nvme-tests/tests/ioctl/basic-identify.64 mode=0555 47 file path=opt/nvme-tests/tests/ioctl/basic-lock.32 mode=0555 48 file path=opt/nvme-tests/tests/ioctl/basic-lock.64 mode=0555
|
H A D | security-bart.p5m | 27 set name=pkg.summary value="Basic Audit Reporting Tool" 28 set name=pkg.description value="Basic Audit Reporting Tool (BART)" 41 legacy pkg=SUNWbart desc="Basic Audit Reporting Tool (BART)" \ 42 name="Basic Audit Reporting Tool"
|
H A D | network-ftp.p5m | 47 legacy pkg=SUNWbip desc="Basic IP commands" name="Basic IP commands (Usr)" 48 legacy pkg=SUNWbipr desc="Basic IP commands (Root)" \ 49 name="Basic IP commands (Root)"
|
/illumos-gate/usr/src/test/util-tests/tests/pcieadm/ |
H A D | Makefile | 23 header0-basic.out \ 24 header0-basic-L.out \ 25 header0-basic-LH.out \ 26 header0-basic-n.out \
|
/illumos-gate/usr/src/man/man1/ |
H A D | ppriv.1 | 197 E: basic 198 I: basic 199 P: basic 236 E: basic,!proc_session 237 I: basic,!proc_session 238 P: basic
|
H A D | prctl.1 | 13 \fBprctl\fR [\fB-P\fR] [\fB-t\fR [basic | privileged | system]] 21 allows access to the basic and privileged limits and the current usage on 134 basic task project, or zone resource control values, a recipient \fIpid\fR can 135 be specified using \fB-p\fR. When setting a new basic resource control or 172 If you do not specify the \fB-t\fR option, basic privilege is used. If you want 173 to set a basic task, process, or zone rctl, \fB-p\fR is required. If \fB-e\fR 188 \fB\fB-t\fR [ \fBbasic\fR | \fBprivileged\fR | \fBsystem\fR ]\fR 196 \fBRCTL_GLOBAL_LOWERABLE\fR flag. If the type is not specified, \fBbasic\fR is
|
/illumos-gate/usr/src/uts/common/io/bnxe/577xx/drivers/common/lm/fw/ |
H A D | 57xx_fcoe_rfc_constants.h | 11 #define FC_TYPE_BLS 0x00 /* basic link service */ 25 #define FC_RCTL_BLS 0x8 /* basic link services */ 41 /* Basic Link Services */ 42 #define FC_RCTL_BLS_NOP 0x0 /* basic link service NOP */ 43 #define FC_RCTL_BLS_ABTS 0x1 /* basic link service abort */ 45 #define FC_RCTL_BLS_ACC 0x4 /* basic accept */ 46 #define FC_RCTL_BLS_RJT 0x5 /* basic reject */
|
/illumos-gate/usr/src/lib/libkmf/libkmf/common/ |
H A D | policy.c | 83 vinfo->ocsp_info.basic.responderURI = in parseOCSPValidation() 87 vinfo->ocsp_info.basic.proxy = (char *)xmlGetProp(n, in parseOCSPValidation() 93 vinfo->ocsp_info.basic.uri_from_cert = 1; in parseOCSPValidation() 97 vinfo->ocsp_info.basic.response_lifetime = in parseOCSPValidation() 104 vinfo->ocsp_info.basic.ignore_response_sign = 1; in parseOCSPValidation() 564 KMF_OCSP_BASIC_POLICY *basic; in AddOCSPNodes() local 567 basic = &(ocsp->basic); in AddOCSPNodes() 570 if (basic->responderURI != NULL || basic->uri_from_cert == B_TRUE) { in AddOCSPNodes() 574 /* basic node */ in AddOCSPNodes() 585 if (basic->responderURI && newprop(n_basic, in AddOCSPNodes() [all …]
|
/illumos-gate/usr/src/cmd/hal/hald/ |
H A D | util_helper.c | 57 * Start with the 'basic' privilege set and then remove any in drop_privileges() 58 * of the 'basic' privileges that will not be needed. in drop_privileges() 65 * Establish the basic set of privileges. in drop_privileges() 67 * interfaces are included in the basic set. in drop_privileges() 71 /* Clear privileges we will not need from the 'basic' set */ in drop_privileges()
|
/illumos-gate/usr/src/test/os-tests/tests/imc/ |
H A D | imc_test_basic.c | 19 * This represents a basic configuration with a single socket, channel, and 95 .itc_desc = "decode basic single socket/channel/DIMM, dual rank (1)", 107 .itc_desc = "decode basic single socket/channel/DIMM, dual rank (2)", 119 .itc_desc = "decode basic single socket/channel/DIMM, dual rank (3)",
|