| /linux/fs/ |
| H A D | fcntl.c | 840 struct fown_struct *fown, int sig) in sigio_perm() argument 847 ret = ((uid_eq(fown->euid, GLOBAL_ROOT_UID) || in sigio_perm() 848 uid_eq(fown->euid, cred->suid) || uid_eq(fown->euid, cred->uid) || in sigio_perm() 849 uid_eq(fown->uid, cred->suid) || uid_eq(fown->uid, cred->uid)) && in sigio_perm() 850 !security_file_send_sigiotask(p, fown, sig)); in sigio_perm() 856 struct fown_struct *fown, in send_sigio_to_task() argument 863 int signum = READ_ONCE(fown->signum); in send_sigio_to_task() 865 if (!sigio_perm(p, fown, signum)) in send_sigio_to_task() 911 void send_sigio(struct fown_struct *fown, int fd, int band) in send_sigio() argument 918 read_lock_irqsave(&fown->lock, flags); in send_sigio() [all …]
|
| /linux/tools/testing/selftests/landlock/ |
| H A D | scoped_signal_test.c | 404 FIXTURE(fown) {}; in TEST_F() 414 FIXTURE_VARIANT(fown) in TEST_F() 420 FIXTURE_VARIANT_ADD(fown, no_sandbox) { in TEST_F() 426 FIXTURE_VARIANT_ADD(fown, sandbox_before_fork) { in TEST_F() 432 FIXTURE_VARIANT_ADD(fown, sandbox_before_setown) { in TEST_F() 438 FIXTURE_VARIANT_ADD(fown, sandbox_after_setown) { in TEST_F() 443 FIXTURE_SETUP(fown) in TEST_F() 448 FIXTURE_TEARDOWN(fown) in TEST_F() 456 TEST_F(fown, sigurg_socket) in TEST_F() 326 FIXTURE(fown) FIXTURE() argument 336 FIXTURE_VARIANT(fown) FIXTURE_VARIANT() argument 342 FIXTURE_VARIANT_ADD(fown,no_sandbox) FIXTURE_VARIANT_ADD() argument 348 FIXTURE_VARIANT_ADD(fown,sandbox_before_fork) FIXTURE_VARIANT_ADD() argument 354 FIXTURE_VARIANT_ADD(fown,sandbox_before_setown) FIXTURE_VARIANT_ADD() argument 360 FIXTURE_VARIANT_ADD(fown,sandbox_after_setown) FIXTURE_VARIANT_ADD() argument 365 FIXTURE_SETUP(fown) FIXTURE_SETUP() argument 370 FIXTURE_TEARDOWN(fown) FIXTURE_TEARDOWN() argument 378 TEST_F(fown,sigurg_socket) TEST_F() argument
|
| /linux/security/landlock/ |
| H A D | task.c | 391 struct fown_struct *fown, int signum) in hook_file_send_sigiotask() argument 397 lockdep_assert_held(&fown->lock); in hook_file_send_sigiotask() 398 subject = &landlock_file(fown->file)->fown_subject; in hook_file_send_sigiotask() 427 .layer_plus_one = landlock_file(fown->file)->fown_layer + 1, in hook_file_send_sigiotask()
|
| H A D | fs.c | 1767 static bool control_current_fowner(struct fown_struct *const fown) in control_current_fowner() argument 1775 lockdep_assert_held(&fown->lock); in control_current_fowner() 1782 p = pid_task(fown->pid, fown->pid_type); in control_current_fowner()
|
| /linux/fs/notify/dnotify/ |
| H A D | dnotify.c | 96 struct fown_struct *fown; in dnotify_handle_event() local 112 fown = file_f_owner(dn->dn_filp); in dnotify_handle_event() 113 send_sigio(fown, dn->dn_fd, POLL_MSG); in dnotify_handle_event()
|
| /linux/include/linux/ |
| H A D | lsm_hook_defs.h | 208 struct fown_struct *fown, int sig)
|
| H A D | fs.h | 1348 extern void send_sigio(struct fown_struct *fown, int fd, int band);
|
| /linux/security/ |
| H A D | security.c | 2590 * @fown: signal sender 2593 * Check permission for the file owner @fown to send SIGIO or SIGURG to the 2595 * that the fown_struct, @fown, is never outside the context of a struct file, 2597 * obtained: container_of(fown, struct file, f_owner). 2602 struct fown_struct *fown, int sig) in security_file_send_sigiotask() argument 2604 return call_int_hook(file_send_sigiotask, tsk, fown, sig); in security_file_send_sigiotask()
|
| /linux/security/smack/ |
| H A D | smack_lsm.c | 1968 struct fown_struct *fown, int signum) in smack_file_send_sigiotask() argument 1981 file = fown->file; in smack_file_send_sigiotask()
|
| /linux/security/selinux/ |
| H A D | hooks.c | 4116 struct fown_struct *fown, int signum) in selinux_file_send_sigiotask() argument 4124 file = fown->file; in selinux_file_send_sigiotask()
|