/security/integrity/ima/ |
H A D | ima_main.c | 277 * @bprm: contains the linux_binprm structure 288 int ima_bprm_check(struct linux_binprm *bprm) argument 290 return process_measurement(bprm->file, MAY_EXEC, BPRM_CHECK, 0);
|
/security/tomoyo/ |
H A D | audit.c | 13 * @bprm: Pointer to "struct linux_binprm". 16 * Returns the contents of @bprm on success, NULL otherwise. 21 static char *tomoyo_print_bprm(struct linux_binprm *bprm, argument 29 unsigned long pos = bprm->p; 31 int argv_count = bprm->argc; 32 int envp_count = bprm->envc; 44 if (!tomoyo_dump_page(bprm, pos, dump)) 257 struct file *file = r->ee->bprm->file; 259 bprm_info = tomoyo_print_bprm(r->ee->bprm, &r->ee->dump); 276 struct linux_binprm *bprm local [all...] |
H A D | condition.c | 104 struct linux_binprm *bprm = ee->bprm; local 108 unsigned long pos = bprm->p; 110 int argv_count = bprm->argc; 111 int envp_count = bprm->envc; 124 if (!tomoyo_dump_page(bprm, pos, dump)) { 153 if (!tomoyo_argv(bprm->argc - argv_count, 190 * bprm->argv[] are not matched. 202 * in bprm->envp[] are either undefined or not matched. 759 struct linux_binprm *bprm local [all...] |
H A D | domain.c | 591 struct linux_binprm *bprm = ee->bprm; local 596 unsigned long pos = bprm->p; 598 int argv_count = bprm->argc; 599 int envp_count = bprm->envc; 612 if (!tomoyo_dump_page(bprm, pos, &env_page)) 670 * @bprm: Pointer to "struct linux_binprm". 676 int tomoyo_find_next_domain(struct linux_binprm *bprm) argument 680 const char *original_name = bprm->filename; 697 ee->bprm 864 tomoyo_dump_page(struct linux_binprm *bprm, unsigned long pos, struct tomoyo_page_dump *dump) argument [all...] |
H A D | tomoyo.c | 69 * @bprm: Pointer to "struct linux_binprm". 73 static int tomoyo_bprm_set_creds(struct linux_binprm *bprm) argument 77 rc = cap_bprm_set_creds(bprm); 85 if (bprm->cred_prepared) 93 tomoyo_load_policy(bprm->filename); 97 * "bprm->cred->security". New reference to "struct tomoyo_domain_info" 98 * stored inside "bprm->cred->security" will be acquired later inside 102 bprm->cred->security)->users); 107 bprm->cred->security = NULL; 114 * @bprm 118 tomoyo_bprm_check_security(struct linux_binprm *bprm) argument [all...] |
H A D | common.h | 620 struct linux_binprm *bprm; member in struct:tomoyo_execve 927 bool tomoyo_dump_page(struct linux_binprm *bprm, unsigned long pos, 965 int tomoyo_find_next_domain(struct linux_binprm *bprm);
|
/security/apparmor/ |
H A D | domain.c | 332 * apparmor_bprm_set_creds - set the new creds on the bprm struct 333 * @bprm: binprm for the exec (NOT NULL) 337 int apparmor_bprm_set_creds(struct linux_binprm *bprm) argument 346 file_inode(bprm->file)->i_uid, 347 file_inode(bprm->file)->i_mode 350 int error = cap_bprm_set_creds(bprm); 354 if (bprm->cred_prepared) 357 cxt = cred_cxt(bprm->cred); 369 error = aa_path_name(&bprm->file->f_path, profile->path_flags, &buffer, 375 name = bprm 532 apparmor_bprm_secureexec(struct linux_binprm *bprm) argument 549 apparmor_bprm_committing_creds(struct linux_binprm *bprm) argument 569 apparmor_bprm_committed_creds(struct linux_binprm *bprm) argument [all...] |
/security/ |
H A D | commoncap.c | 292 static inline void bprm_clear_caps(struct linux_binprm *bprm) argument 294 cap_clear(bprm->cred->cap_permitted); 295 bprm->cap_effective = false; 346 struct linux_binprm *bprm, 350 struct cred *new = bprm->cred; 446 static int get_file_caps(struct linux_binprm *bprm, bool *effective, bool *has_cap) argument 452 bprm_clear_caps(bprm); 457 if (bprm->file->f_path.mnt->mnt_flags & MNT_NOSUID) 460 dentry = dget(bprm->file->f_dentry); 466 __func__, rc, bprm 345 bprm_caps_from_vfs_caps(struct cpu_vfs_cap_data *caps, struct linux_binprm *bprm, bool *effective, bool *has_cap) argument 493 cap_bprm_set_creds(struct linux_binprm *bprm) argument 604 cap_bprm_secureexec(struct linux_binprm *bprm) argument [all...] |
H A D | capability.c | 50 static int cap_bprm_check_security(struct linux_binprm *bprm) argument 55 static void cap_bprm_committing_creds(struct linux_binprm *bprm) argument 59 static void cap_bprm_committed_creds(struct linux_binprm *bprm) argument
|
H A D | security.c | 234 int security_bprm_set_creds(struct linux_binprm *bprm) argument 236 return security_ops->bprm_set_creds(bprm); 239 int security_bprm_check(struct linux_binprm *bprm) argument 243 ret = security_ops->bprm_check_security(bprm); 246 return ima_bprm_check(bprm); 249 void security_bprm_committing_creds(struct linux_binprm *bprm) argument 251 security_ops->bprm_committing_creds(bprm); 254 void security_bprm_committed_creds(struct linux_binprm *bprm) argument 256 security_ops->bprm_committed_creds(bprm); 259 int security_bprm_secureexec(struct linux_binprm *bprm) argument [all...] |
/security/smack/ |
H A D | smack_lsm.c | 665 * @bprm: the exec information 669 static int smack_bprm_set_creds(struct linux_binprm *bprm) argument 671 struct inode *inode = file_inode(bprm->file); 672 struct task_smack *bsp = bprm->cred->security; 676 rc = cap_bprm_set_creds(bprm); 680 if (bprm->cred_prepared) 687 if (bprm->unsafe & (LSM_UNSAFE_PTRACE | LSM_UNSAFE_PTRACE_CAP)) { 702 } else if (bprm->unsafe) 706 bprm->per_clear |= PER_CLEAR_ON_SETID; 713 * from bprm 717 smack_bprm_committing_creds(struct linux_binprm *bprm) argument 731 smack_bprm_secureexec(struct linux_binprm *bprm) argument [all...] |
/security/selinux/ |
H A D | hooks.c | 2151 static int check_nnp_nosuid(const struct linux_binprm *bprm, argument 2155 int nnp = (bprm->unsafe & LSM_UNSAFE_NO_NEW_PRIVS); 2156 int nosuid = (bprm->file->f_path.mnt->mnt_flags & MNT_NOSUID); 2186 static int selinux_bprm_set_creds(struct linux_binprm *bprm) argument 2192 struct inode *inode = file_inode(bprm->file); 2195 rc = cap_bprm_set_creds(bprm); 2201 if (bprm->cred_prepared) 2205 new_tsec = bprm->cred->security; 2223 rc = check_nnp_nosuid(bprm, old_tsec, new_tsec); 2238 rc = check_nnp_nosuid(bprm, old_tse 2304 selinux_bprm_secureexec(struct linux_binprm *bprm) argument 2382 selinux_bprm_committing_creds(struct linux_binprm *bprm) argument 2427 selinux_bprm_committed_creds(struct linux_binprm *bprm) argument [all...] |