Lines Matching refs:gid
47 hash_for_each_possible(policy->rules, rule, next, __kgid_val(src.gid)) {
48 if (!gid_eq(rule->src_id.gid, src.gid))
50 if (gid_eq(rule->dst_id.gid, dst.gid)){
134 if (setid_policy_lookup((kid_t){.gid = cred->gid}, INVALID_ID, GID) == SIDPOL_DEFAULT)
138 * set*gid() (e.g. setting up userns gid mappings).
140 pr_warn("Operation requires CAP_SETGID, which is not available to GID %u for operations besides approved set*gid transitions\n",
166 if (gid_eq(new_id.gid, old->gid) || gid_eq(new_id.gid, old->egid) ||
167 gid_eq(new_id.gid, old->sgid))
186 __kgid_val(old->gid), __kgid_val(old->egid),
187 __kgid_val(old->sgid), __kgid_val(new_id.gid));
229 if (setid_policy_lookup((kid_t){.gid = old->gid}, INVALID_ID, GID) == SIDPOL_DEFAULT)
232 if (id_permitted_for_cred(old, (kid_t){.gid = new->gid}, GID) &&
233 id_permitted_for_cred(old, (kid_t){.gid = new->egid}, GID) &&
234 id_permitted_for_cred(old, (kid_t){.gid = new->sgid}, GID) &&
235 id_permitted_for_cred(old, (kid_t){.gid = new->fsgid}, GID))