1deallocate(1) User Commands deallocate(1)
2
3
4
6 deallocate - device deallocation
7
9 deallocate [-s] [-w] [-F] [-z zonename]
10 [-c dev-class | -g dev-type | device]
11
12
13 deallocate [-s] [-w] [-F] [-z zonename] -I
14
15
17 The deallocate command frees an allocated device. It resets the owner‐
18 ship and permissions on all device special files associated with the
19 device, disabling access to that device. deallocate runs the device
20 cleaning program for that device as specified in device_allocate(4).
21
22
23 The default deallocate operation deallocates devices allocated to the
24 user.
25
27 The following options are supported:
28
29 -c dev-class Deallocates all devices of the specified device class.
30
31
32 -F device Forces deallocation of the device associated with the
33 file specified by device. Only a user with the
34 solaris.device.revoke authorization is permitted to use
35 this option.
36
37
38 -I Forces deallocation of all allocatable devices. Only a
39 user with the solaris.device.revoke authorization is
40 permitted to use this option. This option should only
41 be used at system initialization.
42
43
44 -s Silent. Suppresses any diagnostic output.
45
46
47
48 The following options are supported when the system is configured with
49 Trusted Extensions:
50
51 -g dev-type Deallocates a device of device type matching dev-type.
52
53
54 -w Runs the device cleaning program in a windowing environ‐
55 ment. If a windowing version of the program exists, it
56 is used. Otherwise, the standard version is run in a
57 terminal window.
58
59
60 -z zonename Deallocates device from the zone specified by zonename.
61
62
64 The following operands are supported:
65
66 device Deallocates the specified device.
67
68
70 The following exit values are returned:
71
72 0 Successful completion.
73
74
75 20 No entry for the specified device.
76
77
78 other value An error occurred.
79
80
82 /etc/security/device_allocate
83
84
85 /etc/security/device_maps
86
87
88 /etc/security/dev/*
89
90
91 /etc/security/lib/*
92
94 See attributes(5) for descriptions of the following attributes:
95
96
97
98
99 ┌─────────────────────────────┬─────────────────────────────┐
100 │ ATTRIBUTE TYPE │ ATTRIBUTE VALUE │
101 ├─────────────────────────────┼─────────────────────────────┤
102 │Availability │SUNWcsu │
103 ├─────────────────────────────┼─────────────────────────────┤
104 │Interface Stability │See below. │
105 └─────────────────────────────┴─────────────────────────────┘
106
107
108 The invocation is Uncommitted. The options are Uncommitted. The output
109 is Not-an-Interface.
110
112 allocate(1), list_devices(1), bsmconv(1M), dminfo(1M), mkdevalloc(1M),
113 mkdevmaps(1M), device_allocate(4), device_maps(4), attributes(5)
114
115
116 Controlling Access to Devices
117
119 The functionality described in this man page is available only if
120 Solaris Auditing has been enabled. See bsmconv(1M) for more informa‐
121 tion.
122
123
124 On systems configured with Trusted Extensions, the functionality is
125 enabled by default.
126
127
128 /etc/security/dev, mkdevalloc(1M), and mkdevmaps(1M) might not be sup‐
129 ported in a future release of the Solaris Operating Environment.
130
131
132
133SunOS 5.11 30 Apr 2008 deallocate(1)