Lines Matching defs:bprm

1046  * @bprm: binary program information
1048 * If the setup in prepare_exec_creds did not setup @bprm->cred->security
1049 * properly for executing @bprm->file, update the LSM's portion of
1050 * @bprm->cred->security to be what commit_creds needs to install for the new
1052 * transitions between security domains). The hook must set @bprm->secureexec
1053 * to 1 if AT_SECURE should be set to request libc enable secure mode. @bprm
1058 int security_bprm_creds_for_exec(struct linux_binprm *bprm)
1060 return call_int_hook(bprm_creds_for_exec, 0, bprm);
1065 * @bprm: binary program information
1069 * exec, update @bprm->cred to reflect that change. This is called after
1074 * transitions between security domains). The hook must set @bprm->secureexec
1076 * hook must add to @bprm->per_clear any personality flags that should be
1077 * cleared from current->personality. @bprm contains the linux_binprm
1082 int security_bprm_creds_from_file(struct linux_binprm *bprm, struct file *file)
1084 return call_int_hook(bprm_creds_from_file, 0, bprm, file);
1089 * @bprm: binary program information
1092 * It allows a check against the @bprm->cred->security value which was set in
1094 * available in @bprm. This hook may be called multiple times during a single
1095 * execve. @bprm contains the linux_binprm structure.
1099 int security_bprm_check(struct linux_binprm *bprm)
1103 ret = call_int_hook(bprm_check_security, 0, bprm);
1106 return ima_bprm_check(bprm);
1111 * @bprm: binary program information
1115 * by @current->cred and the information set in @bprm->cred by the
1116 * bprm_creds_for_exec hook. @bprm points to the linux_binprm structure. This
1121 void security_bprm_committing_creds(struct linux_binprm *bprm)
1123 call_void_hook(bprm_committing_creds, bprm);
1128 * @bprm: binary program information
1132 * point, been set to @current->cred. @bprm points to the linux_binprm
1137 void security_bprm_committed_creds(struct linux_binprm *bprm)
1139 call_void_hook(bprm_committed_creds, bprm);