Lines Matching defs:new
165 * Transitions to new UIDs require a check against the policy of the old
188 * set*uid to user under new cred struct, or the UID transition is allowed (by
191 static int safesetid_task_fix_setuid(struct cred *new,
200 if (id_permitted_for_cred(old, (kid_t){.uid = new->uid}, UID) &&
201 id_permitted_for_cred(old, (kid_t){.uid = new->euid}, UID) &&
202 id_permitted_for_cred(old, (kid_t){.uid = new->suid}, UID) &&
203 id_permitted_for_cred(old, (kid_t){.uid = new->fsuid}, UID))
215 static int safesetid_task_fix_setgid(struct cred *new,
224 if (id_permitted_for_cred(old, (kid_t){.gid = new->gid}, GID) &&
225 id_permitted_for_cred(old, (kid_t){.gid = new->egid}, GID) &&
226 id_permitted_for_cred(old, (kid_t){.gid = new->sgid}, GID) &&
227 id_permitted_for_cred(old, (kid_t){.gid = new->fsgid}, GID))
239 static int safesetid_task_fix_setgroups(struct cred *new, const struct cred *old)
247 get_group_info(new->group_info);
248 for (i = 0; i < new->group_info->ngroups; i++) {
249 if (!id_permitted_for_cred(old, (kid_t){.gid = new->group_info->gid[i]}, GID)) {
250 put_group_info(new->group_info);
261 put_group_info(new->group_info);