Searched refs:kid_t (Results 1 – 2 of 2) sorted by relevance
/openbmc/linux/security/safesetid/ |
H A D | lsm.c | 33 kid_t src, kid_t dst) in _setid_policy_lookup() 66 static enum sid_policy_type setid_policy_lookup(kid_t src, kid_t dst, enum setid_type new_type) in setid_policy_lookup() 113 if (setid_policy_lookup((kid_t){.uid = cred->uid}, INVALID_ID, UID) == SIDPOL_DEFAULT) in safesetid_security_capable() 127 if (setid_policy_lookup((kid_t){.gid = cred->gid}, INVALID_ID, GID) == SIDPOL_DEFAULT) in safesetid_security_capable() 147 static bool id_permitted_for_cred(const struct cred *old, kid_t new_id, enum setid_type new_type) in id_permitted_for_cred() 168 setid_policy_lookup((kid_t){.uid = old->uid}, new_id, new_type) != SIDPOL_CONSTRAINED; in id_permitted_for_cred() 196 if (setid_policy_lookup((kid_t){.uid = old->uid}, INVALID_ID, UID) == SIDPOL_DEFAULT) in safesetid_task_fix_setuid() 199 if (id_permitted_for_cred(old, (kid_t){.uid = new->uid}, UID) && in safesetid_task_fix_setuid() 200 id_permitted_for_cred(old, (kid_t){.uid = new->euid}, UID) && in safesetid_task_fix_setuid() 201 id_permitted_for_cred(old, (kid_t){.uid = new->suid}, UID) && in safesetid_task_fix_setuid() [all …]
|
H A D | lsm.h | 33 } kid_t; typedef 46 kid_t src_id; 47 kid_t dst_id; 56 #define INVALID_ID (kid_t){.uid = INVALID_UID} 68 kid_t src, kid_t dst);
|