Searched refs:GID (Results 1 - 6 of 6) sorted by relevance

/linux-master/security/safesetid/
H A Dlsm.c47 } else if (policy->type == GID) {
75 else if (new_type == GID)
128 if (setid_policy_lookup((kid_t){.gid = cred->gid}, INVALID_ID, GID) == SIDPOL_DEFAULT)
134 pr_warn("Operation requires CAP_SETGID, which is not available to GID %u for operations besides approved set*gid transitions\n",
138 /* Error, the only capabilities were checking for is CAP_SETUID/GID */
157 } else if (new_type == GID){
176 } else if (new_type == GID) {
177 pr_warn("GID transition ((%d,%d,%d) -> %d) blocked\n",
221 if (setid_policy_lookup((kid_t){.gid = old->gid}, INVALID_ID, GID) == SIDPOL_DEFAULT)
224 if (id_permitted_for_cred(old, (kid_t){.gid = new->gid}, GID)
[all...]
H A Dlsm.h37 GID enumerator in enum:setid_type
49 /* Flag to signal if rule is for UID's or GID's */
63 //Flag to signal if ruleset is for UID's or GID's
H A Dsecurityfs.c38 /* Format of |buf| string should be <UID>:<UID> or <GID>:<GID> */
58 } else if (rule->type == GID){
92 else if (pol->type == GID)
94 else /* Error, pol->type is neither UID or GID */
110 } else if (pol->type == GID) {
128 } else { /* pol->type must be GID if we've made it to here */
131 nrule->type = GID;
216 } else if (policy_type == GID) {
222 /* Error, policy type is neither UID or GID */
[all...]
/linux-master/tools/perf/trace/beauty/
H A Dstatx.c60 P_FLAG(GID);
/linux-master/drivers/net/ethernet/renesas/
H A Dravb_ptp.c199 ravb_write(ndev, GID_PTCD, GID);
265 ravb_write(ndev, GID_PTMD0, GID);
H A Dravb.h174 GID = 0x03D0, /* R-Car Gen3 only */ enumerator in enum:ravb_reg
661 /* GID (R-Car Gen3 only) */

Completed in 221 milliseconds