Lines Matching refs:kid_t
33 kid_t src, kid_t dst)
66 static enum sid_policy_type setid_policy_lookup(kid_t src, kid_t dst, enum setid_type new_type)
119 if (setid_policy_lookup((kid_t){.uid = cred->uid}, INVALID_ID, UID) == SIDPOL_DEFAULT)
134 if (setid_policy_lookup((kid_t){.gid = cred->gid}, INVALID_ID, GID) == SIDPOL_DEFAULT)
156 static bool id_permitted_for_cred(const struct cred *old, kid_t new_id, enum setid_type new_type)
177 setid_policy_lookup((kid_t){.uid = old->uid}, new_id, new_type) != SIDPOL_CONSTRAINED;
205 if (setid_policy_lookup((kid_t){.uid = old->uid}, INVALID_ID, UID) == SIDPOL_DEFAULT)
208 if (id_permitted_for_cred(old, (kid_t){.uid = new->uid}, UID) &&
209 id_permitted_for_cred(old, (kid_t){.uid = new->euid}, UID) &&
210 id_permitted_for_cred(old, (kid_t){.uid = new->suid}, UID) &&
211 id_permitted_for_cred(old, (kid_t){.uid = new->fsuid}, UID))
229 if (setid_policy_lookup((kid_t){.gid = old->gid}, INVALID_ID, GID) == SIDPOL_DEFAULT)
232 if (id_permitted_for_cred(old, (kid_t){.gid = new->gid}, GID) &&
233 id_permitted_for_cred(old, (kid_t){.gid = new->egid}, GID) &&
234 id_permitted_for_cred(old, (kid_t){.gid = new->sgid}, GID) &&
235 id_permitted_for_cred(old, (kid_t){.gid = new->fsgid}, GID))