Print this page


Split Close
Expand all
Collapse all
          --- old/usr/src/uts/common/os/policy.c
          +++ new/usr/src/uts/common/os/policy.c
↓ open down ↓ 2087 lines elided ↑ open up ↑
2088 2088          return (PRIV_POLICY(cr, PRIV_PROC_TASKID, B_FALSE, EPERM, NULL));
2089 2089  }
2090 2090  
2091 2091  int
2092 2092  secpolicy_meminfo(const cred_t *cr)
2093 2093  {
2094 2094          return (PRIV_POLICY(cr, PRIV_PROC_MEMINFO, B_FALSE, EPERM, NULL));
2095 2095  }
2096 2096  
2097 2097  int
2098      -secpolicy_fs_import(const cred_t *cr)
2099      -{
2100      -        return (PRIV_POLICY(cr, PRIV_SYS_FS_IMPORT, B_FALSE, EPERM, NULL));
2101      -}
2102      -
2103      -
2104      -int
2105 2098  secpolicy_pfexec_register(const cred_t *cr)
2106 2099  {
2107 2100          return (PRIV_POLICY(cr, PRIV_SYS_ADMIN, B_TRUE, EPERM, NULL));
2108 2101  }
2109 2102  
2110 2103  /*
2111 2104   * Basic privilege checks.
2112 2105   */
2113 2106  int
2114 2107  secpolicy_basic_exec(const cred_t *cr, vnode_t *vp)
↓ open down ↓ 482 lines elided ↑ open up ↑
2597 2590   *
2598 2591   * Determine if the subject has sufficient privileges to configure PPP and
2599 2592   * PPP-related devices.
2600 2593   */
2601 2594  int
2602 2595  secpolicy_ppp_config(const cred_t *cr)
2603 2596  {
2604 2597          if (PRIV_POLICY_ONLY(cr, PRIV_SYS_NET_CONFIG, B_FALSE))
2605 2598                  return (secpolicy_net_config(cr, B_FALSE));
2606 2599          return (PRIV_POLICY(cr, PRIV_SYS_PPP_CONFIG, B_FALSE, EPERM, NULL));
2607      -}
2608      -
2609      -int
2610      -secpolicy_hyprlofs_control(const cred_t *cr)
2611      -{
2612      -        if (PRIV_POLICY(cr, PRIV_HYPRLOFS_CONTROL, B_FALSE, EPERM, NULL))
2613      -                return (EPERM);
2614      -        return (0);
2615 2600  }
    
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX