Lines Matching refs:gid
48 hash_for_each_possible(policy->rules, rule, next, __kgid_val(src.gid)) {
49 if (!gid_eq(rule->src_id.gid, src.gid))
51 if (gid_eq(rule->dst_id.gid, dst.gid)){
128 if (setid_policy_lookup((kid_t){.gid = cred->gid}, INVALID_ID, GID) == SIDPOL_DEFAULT)
132 * set*gid() (e.g. setting up userns gid mappings).
134 pr_warn("Operation requires CAP_SETGID, which is not available to GID %u for operations besides approved set*gid transitions\n",
135 __kgid_val(cred->gid));
158 if (gid_eq(new_id.gid, old->gid) || gid_eq(new_id.gid, old->egid) ||
159 gid_eq(new_id.gid, old->sgid))
178 __kgid_val(old->gid), __kgid_val(old->egid),
179 __kgid_val(old->sgid), __kgid_val(new_id.gid));
221 if (setid_policy_lookup((kid_t){.gid = old->gid}, INVALID_ID, GID) == SIDPOL_DEFAULT)
224 if (id_permitted_for_cred(old, (kid_t){.gid = new->gid}, GID) &&
225 id_permitted_for_cred(old, (kid_t){.gid = new->egid}, GID) &&
226 id_permitted_for_cred(old, (kid_t){.gid = new->sgid}, GID) &&
227 id_permitted_for_cred(old, (kid_t){.gid = new->fsgid}, GID))
244 if (setid_policy_lookup((kid_t){.gid = old->gid}, INVALID_ID, GID) == SIDPOL_DEFAULT)
249 if (!id_permitted_for_cred(old, (kid_t){.gid = new->group_info->gid[i]}, GID)) {