Lines Matching defs:new
164 * Transitions to new UIDs require a check against the policy of the old
187 * set*uid to user under new cred struct, or the UID transition is allowed (by
190 static int safesetid_task_fix_setuid(struct cred *new,
199 if (id_permitted_for_cred(old, (kid_t){.uid = new->uid}, UID) &&
200 id_permitted_for_cred(old, (kid_t){.uid = new->euid}, UID) &&
201 id_permitted_for_cred(old, (kid_t){.uid = new->suid}, UID) &&
202 id_permitted_for_cred(old, (kid_t){.uid = new->fsuid}, UID))
214 static int safesetid_task_fix_setgid(struct cred *new,
223 if (id_permitted_for_cred(old, (kid_t){.gid = new->gid}, GID) &&
224 id_permitted_for_cred(old, (kid_t){.gid = new->egid}, GID) &&
225 id_permitted_for_cred(old, (kid_t){.gid = new->sgid}, GID) &&
226 id_permitted_for_cred(old, (kid_t){.gid = new->fsgid}, GID))
238 static int safesetid_task_fix_setgroups(struct cred *new, const struct cred *old)
246 get_group_info(new->group_info);
247 for (i = 0; i < new->group_info->ngroups; i++) {
248 if (!id_permitted_for_cred(old, (kid_t){.gid = new->group_info->gid[i]}, GID)) {
249 put_group_info(new->group_info);
260 put_group_info(new->group_info);