Lines Matching refs:egid
296 * Get effective group ID. The "egid" is groups[0], and could be obtained
853 * compatible. It says that setting the uid/gid to euid/egid is a special
1090 * Do we have "appropriate privileges" (are we root or gid == egid)
1121 * In all cases permitted cases, we are changing the egid.
1141 gid_t egid;
1150 gid_t egid;
1153 egid = uap->egid;
1154 AUDIT_ARG_EGID(egid);
1160 error = mac_cred_check_setegid(oldcred, egid);
1165 if (egid != oldcred->cr_rgid && /* allow setegid(getgid()) */
1166 egid != oldcred->cr_svgid && /* allow setegid(saved gid) */
1170 if (oldcred->cr_groups[0] != egid) {
1171 change_egid(newcred, egid);
1271 * have the egid in the groups[0]). We risk security holes
1368 gid_t egid;
1377 gid_t egid, rgid;
1380 egid = uap->egid;
1382 AUDIT_ARG_EGID(egid);
1389 error = mac_cred_check_setregid(oldcred, rgid, egid);
1396 (egid != (gid_t)-1 && egid != oldcred->cr_groups[0] &&
1397 egid != oldcred->cr_rgid && egid != oldcred->cr_svgid)) &&
1401 if (egid != (gid_t)-1 && oldcred->cr_groups[0] != egid) {
1402 change_egid(newcred, egid);
1513 * setresgid(rgid, egid, sgid) is like setregid except control over the saved
1519 gid_t egid;
1529 gid_t egid, rgid, sgid;
1532 egid = uap->egid;
1535 AUDIT_ARG_EGID(egid);
1543 error = mac_cred_check_setresgid(oldcred, rgid, egid, sgid);
1551 (egid != (gid_t)-1 && egid != oldcred->cr_rgid &&
1552 egid != oldcred->cr_svgid &&
1553 egid != oldcred->cr_groups[0]) ||
1560 if (egid != (gid_t)-1 && oldcred->cr_groups[0] != egid) {
1561 change_egid(newcred, egid);
1613 gid_t *egid;
1628 if (uap->egid)
1630 uap->egid, sizeof(cred->cr_groups[0]));
2183 * includes p's egid, group access list, rgid, and svgid.
3001 change_egid(struct ucred *newcred, gid_t egid)
3004 newcred->cr_groups[0] = egid;