Lines Matching refs:GID
47 } else if (policy->type == GID) {
75 else if (new_type == GID)
128 if (setid_policy_lookup((kid_t){.gid = cred->gid}, INVALID_ID, GID) == SIDPOL_DEFAULT)
134 pr_warn("Operation requires CAP_SETGID, which is not available to GID %u for operations besides approved set*gid transitions\n",
138 /* Error, the only capabilities were checking for is CAP_SETUID/GID */
157 } else if (new_type == GID){
176 } else if (new_type == GID) {
177 pr_warn("GID transition ((%d,%d,%d) -> %d) blocked\n",
221 if (setid_policy_lookup((kid_t){.gid = old->gid}, INVALID_ID, GID) == SIDPOL_DEFAULT)
224 if (id_permitted_for_cred(old, (kid_t){.gid = new->gid}, GID) &&
225 id_permitted_for_cred(old, (kid_t){.gid = new->egid}, GID) &&
226 id_permitted_for_cred(old, (kid_t){.gid = new->sgid}, GID) &&
227 id_permitted_for_cred(old, (kid_t){.gid = new->fsgid}, GID))
244 if (setid_policy_lookup((kid_t){.gid = old->gid}, INVALID_ID, GID) == SIDPOL_DEFAULT)
249 if (!id_permitted_for_cred(old, (kid_t){.gid = new->group_info->gid[i]}, GID)) {