/security/safesetid/ |
D | lsm.c | 47 hash_for_each_possible(policy->rules, rule, next, __kgid_val(src.gid)) { in _setid_policy_lookup() 48 if (!gid_eq(rule->src_id.gid, src.gid)) in _setid_policy_lookup() 50 if (gid_eq(rule->dst_id.gid, dst.gid)){ in _setid_policy_lookup() 133 if (setid_policy_lookup((kid_t){.gid = cred->gid}, INVALID_ID, GID) == SIDPOL_DEFAULT) in safesetid_security_capable() 163 if (gid_eq(new_id.gid, old->gid) || gid_eq(new_id.gid, old->egid) || in id_permitted_for_cred() 164 gid_eq(new_id.gid, old->sgid)) in id_permitted_for_cred() 183 __kgid_val(old->gid), __kgid_val(old->egid), in id_permitted_for_cred() 184 __kgid_val(old->sgid), __kgid_val(new_id.gid)); in id_permitted_for_cred() 226 if (setid_policy_lookup((kid_t){.gid = old->gid}, INVALID_ID, GID) == SIDPOL_DEFAULT) in safesetid_task_fix_setgid() 229 if (id_permitted_for_cred(old, (kid_t){.gid = new->gid}, GID) && in safesetid_task_fix_setgid() [all …]
|
D | securityfs.c | 59 rule->src_id.gid = make_kgid(file->f_cred->user_ns, parsed_parent); in parse_policy_line() 60 rule->dst_id.gid = make_kgid(file->f_cred->user_ns, parsed_child); in parse_policy_line() 61 if (!gid_valid(rule->src_id.gid) || !gid_valid(rule->dst_id.gid)) in parse_policy_line() 93 hash_add(pol->rules, &rule->next, __kgid_val(rule->src_id.gid)); in insert_rule() 112 __kgid_val(rule->src_id.gid), in verify_ruleset() 113 __kgid_val(rule->dst_id.gid)); in verify_ruleset() 129 nrule->src_id.gid = rule->dst_id.gid; in verify_ruleset() 130 nrule->dst_id.gid = rule->dst_id.gid; in verify_ruleset()
|
D | lsm.h | 32 kgid_t gid; member
|
/security/keys/ |
D | permission.c | 61 if (gid_valid(key->gid) && key->perm & KEY_GRP_ALL) { in key_task_permission() 62 if (gid_eq(key->gid, cred->fsgid)) { in key_task_permission() 67 ret = groups_search(cred->group_info, key->gid); in key_task_permission()
|
D | process_keys.c | 228 keyring = keyring_alloc("_tid", new->uid, new->gid, new, in install_thread_keyring_to_cred() 275 keyring = keyring_alloc("_pid", new->uid, new->gid, new, in install_process_keyring_to_cred() 330 keyring = keyring_alloc("_ses", cred->uid, cred->gid, cred, in install_session_keyring_to_cred() 395 new_cred->thread_keyring->gid = new_cred->fsgid; in key_fsgid_changed() 870 name, old->uid, old->gid, old, in join_session_keyring() 932 new-> gid = old-> gid; in key_change_session_keyring()
|
D | keyctl.c | 684 from_kgid_munged(current_user_ns(), key->gid), in keyctl_describe_key() 956 kgid_t gid; in keyctl_chown_key() local 959 gid = make_kgid(current_user_ns(), group); in keyctl_chown_key() 963 if ((group != (gid_t) -1) && !gid_valid(gid)) in keyctl_chown_key() 992 if (group != (gid_t) -1 && !gid_eq(gid, key->gid) && !in_group_p(gid)) in keyctl_chown_key() 1045 key->gid = gid; in keyctl_chown_key() 1685 !gid_eq(pcred->gid, mycred->egid) || in keyctl_session_to_parent()
|
D | key.c | 226 kuid_t uid, kgid_t gid, const struct cred *cred, in key_alloc() argument 295 key->gid = gid; in key_alloc()
|
D | proc.c | 239 from_kgid_munged(seq_user_ns(m), key->gid), in proc_keys_show()
|
D | keyring.c | 517 struct key *keyring_alloc(const char *description, kuid_t uid, kgid_t gid, in keyring_alloc() argument 527 uid, gid, cred, perm, flags, restrict_link); in keyring_alloc()
|
/security/tomoyo/ |
D | tomoyo.c | 353 static int tomoyo_path_chown(const struct path *path, kuid_t uid, kgid_t gid) in tomoyo_path_chown() argument 360 if (!error && gid_valid(gid)) in tomoyo_path_chown() 362 from_kgid(&init_user_ns, gid)); in tomoyo_path_chown()
|
D | audit.c | 201 from_kgid(&init_user_ns, stat->gid), in tomoyo_print_header() 210 from_kgid(&init_user_ns, stat->gid), in tomoyo_print_header()
|
D | condition.c | 743 stat->gid = inode->i_gid; in tomoyo_get_attributes() 1005 value = from_kgid(&init_user_ns, stat->gid); in tomoyo_condition()
|
D | common.h | 569 kgid_t gid; member
|
/security/integrity/evm/ |
D | evm_crypto.c | 149 gid_t gid; in hmac_add_misc() member 170 hmac_misc.gid = from_kgid(&init_user_ns, inode->i_gid); in hmac_add_misc()
|
/security/ |
D | commoncap.c | 841 { return !gid_eq(new->egid, old->gid); } in __is_setgid() 931 new->egid = new->gid; in cap_bprm_creds_from_file()
|
D | security.c | 1225 int security_path_chown(const struct path *path, kuid_t uid, kgid_t gid) in security_path_chown() argument 1229 return call_int_hook(path_chown, 0, path, uid, gid); in security_path_chown()
|
/security/apparmor/ |
D | lsm.c | 397 static int apparmor_path_chown(const struct path *path, kuid_t uid, kgid_t gid) in apparmor_path_chown() argument
|