1allocate(1) User Commands allocate(1)
2
3
4
6 allocate - device allocation
7
9 allocate [-s] [-w] [-F] [-U uname] [-z zonename] device
10
11
12 allocate [-s] [-w] [-F] [-U uname] [-z zonename] -g dev-type
13
14
16 The allocate utility manages the ownership of devices through its allo‐
17 cation mechanism. It ensures that each device is used by only one qual‐
18 ified user at a time.
19
20
21 The device argument specifies the device to be manipulated. To preserve
22 the integrity of the device's owner, the allocate operation is executed
23 on all the device special files associated with that device.
24
25
26 The default allocate operation allocates the device special files asso‐
27 ciated with device to the uid of the current process.
28
29
30 Only authorized users may allocate a device. The required authoriza‐
31 tions are specified in device_allocate(4).
32
33
34 When the system is configured with Trusted Extensions, allocate runs
35 the clean program for the device before it grants access to the caller
36 to that device. For devices with removable media that have a mountable
37 file system, allocate mounts the media if the caller chooses.
38
40 The following options are supported:
41
42 -F device Force allocates either free or pre-allocated devices.
43 This option is often used with the -U option to allo‐
44 cate/reallocate devices to a specific user. Only
45 those users that have solaris.device.revoke autho‐
46 rization are allowed to use this option.
47
48
49 -g dev−type Allocates devices with a device−type matching
50 dev−type. The dev−type argument specifies the device
51 type to be operated on.
52
53
54 -s Silent. Suppresses any diagnostic output.
55
56
57 -U uname Uses the user ID uname instead of the user ID of the
58 current process when performing the allocate opera‐
59 tion. Only a user with the solaris.device.revoke
60 authorization is permitted to use this option.
61
62
63
64 The following options are supported with Trusted Extensions:
65
66 -w Runs the device cleaning program in a windowing environ‐
67 ment. If a windowing version of the program exists, it
68 is used. Otherwise, the standard version is run in a
69 terminal window.
70
71
72 -z zonename Allocates device to the zone specified by zonename.
73
74
76 The following operands are supported:
77
78 device Specifies the name of the device to be allocated.
79
80
82 The following exit values are returned:
83
84 0 Successful completion.
85
86
87 20 No entry for the specified device.
88
89
90 other value An error occurred.
91
92
94 /etc/security/device_allocate
95
96
97 /etc/security/device_maps
98
99
100 /etc/security/dev/*
101
102
103 /etc/security/lib/*
104
106 See attributes(5) for descriptions of the following attributes:
107
108
109
110
111 ┌─────────────────────────────┬─────────────────────────────┐
112 │ ATTRIBUTE TYPE │ ATTRIBUTE VALUE │
113 ├─────────────────────────────┼─────────────────────────────┤
114 │Availability │SUNWcsu │
115 ├─────────────────────────────┼─────────────────────────────┤
116 │Interface Stability │See below. │
117 └─────────────────────────────┴─────────────────────────────┘
118
119
120 The invocation is Uncommitted. The options are Uncommitted. The output
121 is Not-an-Interface.
122
124 deallocate(1), list_devices(1), bsmconv(1M), dminfo(1M), mkdeval‐
125 loc(1M), mkdevmaps(1M), device_allocate(4), device_maps(4),
126 attributes(5)
127
128
129 Controlling Access to Devices
130
132 The functionality described in this man page is available only if
133 Solaris Auditing has been enabled. See bsmconv(1M) for more informa‐
134 tion.
135
136
137 On systems configured with Trusted Extensions, the functionality is
138 enabled by default.
139
140
141 /etc/security/dev, mkdevalloc(1M), and mkdevmaps(1M) might not be sup‐
142 ported in a future release of the Solaris Operating Environment.
143
144
145
146SunOS 5.11 30 Apr 2008 allocate(1)