Searched refs:SIDPOL_DEFAULT (Results 1 – 9 of 9) sorted by relevance
/dports/multimedia/v4l_compat/linux-5.13-rc2/security/safesetid/ |
H A D | lsm.c | 36 enum sid_policy_type result = SIDPOL_DEFAULT; in _setid_policy_lookup() 68 enum sid_policy_type result = SIDPOL_DEFAULT; in setid_policy_lookup() 119 if (setid_policy_lookup((kid_t){.uid = cred->uid}, INVALID_ID, UID) == SIDPOL_DEFAULT) in safesetid_security_capable() 133 if (setid_policy_lookup((kid_t){.gid = cred->gid}, INVALID_ID, GID) == SIDPOL_DEFAULT) in safesetid_security_capable() 202 if (setid_policy_lookup((kid_t){.uid = old->uid}, INVALID_ID, UID) == SIDPOL_DEFAULT) in safesetid_task_fix_setuid() 226 if (setid_policy_lookup((kid_t){.gid = old->gid}, INVALID_ID, GID) == SIDPOL_DEFAULT) in safesetid_task_fix_setgid()
|
H A D | lsm.h | 25 SIDPOL_DEFAULT, /* source ID is unaffected by policy */ enumerator
|
H A D | securityfs.c | 105 if (_setid_policy_lookup(pol, rule->dst_id, INVALID_ID) == SIDPOL_DEFAULT) { in verify_ruleset()
|
/dports/multimedia/libv4l/linux-5.13-rc2/security/safesetid/ |
H A D | lsm.c | 36 enum sid_policy_type result = SIDPOL_DEFAULT; in _setid_policy_lookup() 68 enum sid_policy_type result = SIDPOL_DEFAULT; in setid_policy_lookup() 119 if (setid_policy_lookup((kid_t){.uid = cred->uid}, INVALID_ID, UID) == SIDPOL_DEFAULT) in safesetid_security_capable() 133 if (setid_policy_lookup((kid_t){.gid = cred->gid}, INVALID_ID, GID) == SIDPOL_DEFAULT) in safesetid_security_capable() 202 if (setid_policy_lookup((kid_t){.uid = old->uid}, INVALID_ID, UID) == SIDPOL_DEFAULT) in safesetid_task_fix_setuid() 226 if (setid_policy_lookup((kid_t){.gid = old->gid}, INVALID_ID, GID) == SIDPOL_DEFAULT) in safesetid_task_fix_setgid()
|
H A D | lsm.h | 25 SIDPOL_DEFAULT, /* source ID is unaffected by policy */ enumerator
|
H A D | securityfs.c | 105 if (_setid_policy_lookup(pol, rule->dst_id, INVALID_ID) == SIDPOL_DEFAULT) { in verify_ruleset()
|
/dports/multimedia/v4l-utils/linux-5.13-rc2/security/safesetid/ |
H A D | lsm.c | 36 enum sid_policy_type result = SIDPOL_DEFAULT; in _setid_policy_lookup() 68 enum sid_policy_type result = SIDPOL_DEFAULT; in setid_policy_lookup() 119 if (setid_policy_lookup((kid_t){.uid = cred->uid}, INVALID_ID, UID) == SIDPOL_DEFAULT) in safesetid_security_capable() 133 if (setid_policy_lookup((kid_t){.gid = cred->gid}, INVALID_ID, GID) == SIDPOL_DEFAULT) in safesetid_security_capable() 202 if (setid_policy_lookup((kid_t){.uid = old->uid}, INVALID_ID, UID) == SIDPOL_DEFAULT) in safesetid_task_fix_setuid() 226 if (setid_policy_lookup((kid_t){.gid = old->gid}, INVALID_ID, GID) == SIDPOL_DEFAULT) in safesetid_task_fix_setgid()
|
H A D | lsm.h | 25 SIDPOL_DEFAULT, /* source ID is unaffected by policy */ enumerator
|
H A D | securityfs.c | 105 if (_setid_policy_lookup(pol, rule->dst_id, INVALID_ID) == SIDPOL_DEFAULT) { in verify_ruleset()
|