Lines Matching defs:cr
278 cred_t *cr);
376 zfs_secpolicy_none(zfs_cmd_t *zc, nvlist_t *innvl, cred_t *cr)
378 (void) zc, (void) innvl, (void) cr;
387 zfs_secpolicy_read(zfs_cmd_t *zc, nvlist_t *innvl, cred_t *cr)
389 (void) innvl, (void) cr;
398 zfs_dozonecheck_impl(const char *dataset, uint64_t zoned, cred_t *cr)
415 if (secpolicy_zfs(cr) && zoned)
432 zfs_dozonecheck(const char *dataset, cred_t *cr)
440 return (zfs_dozonecheck_impl(dataset, zoned, cr));
444 zfs_dozonecheck_ds(const char *dataset, dsl_dataset_t *ds, cred_t *cr)
451 return (zfs_dozonecheck_impl(dataset, zoned, cr));
456 const char *perm, cred_t *cr)
460 error = zfs_dozonecheck_ds(name, ds, cr);
462 error = secpolicy_zfs(cr);
464 error = dsl_deleg_access_impl(ds, perm, cr);
470 zfs_secpolicy_write_perms(const char *name, const char *perm, cred_t *cr)
481 if (INGLOBALZONE(curproc) && secpolicy_zfs(cr) == 0)
494 error = zfs_secpolicy_write_perms_ds(name, ds, perm, cr);
507 zfs_set_slabel_policy(const char *name, const char *strval, cred_t *cr)
595 return (PRIV_POLICY(cr, needed_priv, B_FALSE, EPERM, NULL));
604 cred_t *cr)
655 return (zfs_secpolicy_write_perms(dsname, zfs_prop_to_name(prop), cr));
659 zfs_secpolicy_set_fsacl(zfs_cmd_t *zc, nvlist_t *innvl, cred_t *cr)
666 return (zfs_dozonecheck(zc->zc_name, cr));
670 zfs_secpolicy_rollback(zfs_cmd_t *zc, nvlist_t *innvl, cred_t *cr)
674 ZFS_DELEG_PERM_ROLLBACK, cr));
678 zfs_secpolicy_send(zfs_cmd_t *zc, nvlist_t *innvl, cred_t *cr)
706 ZFS_DELEG_PERM_SEND, cr);
714 zfs_secpolicy_send_new(zfs_cmd_t *zc, nvlist_t *innvl, cred_t *cr)
718 ZFS_DELEG_PERM_SEND, cr));
722 zfs_secpolicy_share(zfs_cmd_t *zc, nvlist_t *innvl, cred_t *cr)
724 (void) zc, (void) innvl, (void) cr;
729 zfs_secpolicy_smb_acl(zfs_cmd_t *zc, nvlist_t *innvl, cred_t *cr)
731 (void) zc, (void) innvl, (void) cr;
758 zfs_secpolicy_destroy_perms(const char *name, cred_t *cr)
763 ZFS_DELEG_PERM_MOUNT, cr)) != 0)
766 return (zfs_secpolicy_write_perms(name, ZFS_DELEG_PERM_DESTROY, cr));
770 zfs_secpolicy_destroy(zfs_cmd_t *zc, nvlist_t *innvl, cred_t *cr)
773 return (zfs_secpolicy_destroy_perms(zc->zc_name, cr));
781 zfs_secpolicy_destroy_snaps(zfs_cmd_t *zc, nvlist_t *innvl, cred_t *cr)
793 error = zfs_secpolicy_destroy_perms(nvpair_name(pair), cr);
814 zfs_secpolicy_rename_perms(const char *from, const char *to, cred_t *cr)
820 ZFS_DELEG_PERM_RENAME, cr)) != 0)
824 ZFS_DELEG_PERM_MOUNT, cr)) != 0)
832 ZFS_DELEG_PERM_CREATE, cr)) != 0)
836 ZFS_DELEG_PERM_MOUNT, cr)) != 0)
843 zfs_secpolicy_rename(zfs_cmd_t *zc, nvlist_t *innvl, cred_t *cr)
846 return (zfs_secpolicy_rename_perms(zc->zc_name, zc->zc_value, cr));
850 zfs_secpolicy_promote(zfs_cmd_t *zc, nvlist_t *innvl, cred_t *cr)
858 ZFS_DELEG_PERM_PROMOTE, cr);
883 ZFS_DELEG_PERM_MOUNT, cr);
888 ZFS_DELEG_PERM_PROMOTE, cr);
898 zfs_secpolicy_recv(zfs_cmd_t *zc, nvlist_t *innvl, cred_t *cr)
904 ZFS_DELEG_PERM_RECEIVE, cr)) != 0)
908 ZFS_DELEG_PERM_MOUNT, cr)) != 0)
912 ZFS_DELEG_PERM_CREATE, cr));
916 zfs_secpolicy_snapshot_perms(const char *name, cred_t *cr)
919 ZFS_DELEG_PERM_SNAPSHOT, cr));
926 zfs_secpolicy_snapshot(zfs_cmd_t *zc, nvlist_t *innvl, cred_t *cr)
945 error = zfs_secpolicy_snapshot_perms(name, cr);
957 zfs_secpolicy_bookmark(zfs_cmd_t *zc, nvlist_t *innvl, cred_t *cr)
973 ZFS_DELEG_PERM_BOOKMARK, cr);
982 zfs_secpolicy_destroy_bookmarks(zfs_cmd_t *zc, nvlist_t *innvl, cred_t *cr)
1001 ZFS_DELEG_PERM_DESTROY, cr);
1023 zfs_secpolicy_log_history(zfs_cmd_t *zc, nvlist_t *innvl, cred_t *cr)
1025 (void) zc, (void) innvl, (void) cr;
1036 zfs_secpolicy_create_clone(zfs_cmd_t *zc, nvlist_t *innvl, cred_t *cr)
1048 ZFS_DELEG_PERM_CLONE, cr)) != 0)
1052 ZFS_DELEG_PERM_CREATE, cr)) != 0)
1056 ZFS_DELEG_PERM_MOUNT, cr));
1064 zfs_secpolicy_config(zfs_cmd_t *zc, nvlist_t *innvl, cred_t *cr)
1068 if (secpolicy_sys_config(cr, B_FALSE) != 0)
1078 zfs_secpolicy_diff(zfs_cmd_t *zc, nvlist_t *innvl, cred_t *cr)
1083 if (secpolicy_sys_config(cr, B_FALSE) == 0)
1086 error = zfs_secpolicy_write_perms(zc->zc_name, ZFS_DELEG_PERM_DIFF, cr);
1094 zfs_secpolicy_inject(zfs_cmd_t *zc, nvlist_t *innvl, cred_t *cr)
1097 return (secpolicy_zinject(cr));
1101 zfs_secpolicy_inherit_prop(zfs_cmd_t *zc, nvlist_t *innvl, cred_t *cr)
1110 ZFS_DELEG_PERM_USERPROP, cr));
1113 NULL, cr));
1118 zfs_secpolicy_userspace_one(zfs_cmd_t *zc, nvlist_t *innvl, cred_t *cr)
1120 int err = zfs_secpolicy_read(zc, innvl, cr);
1136 if (zc->zc_guid == crgetuid(cr))
1142 if (groupmember(zc->zc_guid, cr))
1149 userquota_perms[zc->zc_objset_type], cr));
1153 zfs_secpolicy_userspace_many(zfs_cmd_t *zc, nvlist_t *innvl, cred_t *cr)
1155 int err = zfs_secpolicy_read(zc, innvl, cr);
1163 userquota_perms[zc->zc_objset_type], cr));
1167 zfs_secpolicy_userspace_upgrade(zfs_cmd_t *zc, nvlist_t *innvl, cred_t *cr)
1171 NULL, cr));
1175 zfs_secpolicy_hold(zfs_cmd_t *zc, nvlist_t *innvl, cred_t *cr)
1191 ZFS_DELEG_PERM_HOLD, cr);
1199 zfs_secpolicy_release(zfs_cmd_t *zc, nvlist_t *innvl, cred_t *cr)
1212 ZFS_DELEG_PERM_RELEASE, cr);
1223 zfs_secpolicy_tmp_snapshot(zfs_cmd_t *zc, nvlist_t *innvl, cred_t *cr)
1233 ZFS_DELEG_PERM_DIFF, cr) == 0)
1236 error = zfs_secpolicy_snapshot_perms(zc->zc_name, cr);
1240 error = zfs_secpolicy_hold(zc, innvl, cr);
1242 error = zfs_secpolicy_release(zc, innvl, cr);
1244 error = zfs_secpolicy_destroy(zc, innvl, cr);
1250 zfs_secpolicy_load_key(zfs_cmd_t *zc, nvlist_t *innvl, cred_t *cr)
1253 ZFS_DELEG_PERM_LOAD_KEY, cr));
1257 zfs_secpolicy_change_key(zfs_cmd_t *zc, nvlist_t *innvl, cred_t *cr)
1260 ZFS_DELEG_PERM_CHANGE_KEY, cr));
3287 zfs_create_cb(objset_t *os, void *arg, cred_t *cr, dmu_tx_t *tx)
3291 zfs_create_fs(os, cr, zct->zct_zplprops, tx);
3479 void (*cbfunc)(objset_t *os, void *arg, cred_t *cr, dmu_tx_t *tx);
4719 zfs_check_settable(const char *dsname, nvpair_t *pair, cred_t *cr)
4730 ZFS_DELEG_PERM_USERPROP, cr)))
4773 if ((err = zfs_secpolicy_write_perms(dsname, perm, cr)))