Searched refs:GID (Results 1 - 6 of 6) sorted by relevance
/linux-master/security/safesetid/ |
H A D | lsm.c | 47 } else if (policy->type == GID) { 75 else if (new_type == GID) 128 if (setid_policy_lookup((kid_t){.gid = cred->gid}, INVALID_ID, GID) == SIDPOL_DEFAULT) 134 pr_warn("Operation requires CAP_SETGID, which is not available to GID %u for operations besides approved set*gid transitions\n", 138 /* Error, the only capabilities were checking for is CAP_SETUID/GID */ 157 } else if (new_type == GID){ 176 } else if (new_type == GID) { 177 pr_warn("GID transition ((%d,%d,%d) -> %d) blocked\n", 221 if (setid_policy_lookup((kid_t){.gid = old->gid}, INVALID_ID, GID) == SIDPOL_DEFAULT) 224 if (id_permitted_for_cred(old, (kid_t){.gid = new->gid}, GID) [all...] |
H A D | lsm.h | 37 GID enumerator in enum:setid_type 49 /* Flag to signal if rule is for UID's or GID's */ 63 //Flag to signal if ruleset is for UID's or GID's
|
H A D | securityfs.c | 38 /* Format of |buf| string should be <UID>:<UID> or <GID>:<GID> */ 58 } else if (rule->type == GID){ 92 else if (pol->type == GID) 94 else /* Error, pol->type is neither UID or GID */ 110 } else if (pol->type == GID) { 128 } else { /* pol->type must be GID if we've made it to here */ 131 nrule->type = GID; 216 } else if (policy_type == GID) { 222 /* Error, policy type is neither UID or GID */ [all...] |
/linux-master/tools/perf/trace/beauty/ |
H A D | statx.c | 60 P_FLAG(GID);
|
/linux-master/drivers/net/ethernet/renesas/ |
H A D | ravb_ptp.c | 199 ravb_write(ndev, GID_PTCD, GID); 265 ravb_write(ndev, GID_PTMD0, GID);
|
H A D | ravb.h | 174 GID = 0x03D0, /* R-Car Gen3 only */ enumerator in enum:ravb_reg 661 /* GID (R-Car Gen3 only) */
|
Completed in 221 milliseconds