kernel_optimize_test/security/tomoyo
Eric W. Biederman be619f7f06 exec: Implement kernel_execve
To allow the kernel not to play games with set_fs to call exec
implement kernel_execve.  The function kernel_execve takes pointers
into kernel memory and copies the values pointed to onto the new
userspace stack.

The calls with arguments from kernel space of do_execve are replaced
with calls to kernel_execve.

The calls do_execve and do_execveat are made static as there are now
no callers outside of exec.

The comments that mention do_execve are updated to refer to
kernel_execve or execve depending on the circumstances.  In addition
to correcting the comments, this makes it easy to grep for do_execve
and verify it is not used.

Inspired-by: https://lkml.kernel.org/r/20200627072704.2447163-1-hch@lst.de
Reviewed-by: Kees Cook <keescook@chromium.org>
Link: https://lkml.kernel.org/r/87wo365ikj.fsf@x220.int.ebiederm.org
Signed-off-by: "Eric W. Biederman" <ebiederm@xmission.com>
2020-07-21 08:24:52 -05:00
..
policy
.gitignore
audit.c
common.c
common.h exec: Implement kernel_execve 2020-07-21 08:24:52 -05:00
condition.c
domain.c exec: Implement kernel_execve 2020-07-21 08:24:52 -05:00
environ.c
file.c
gc.c
group.c
Kconfig treewide: replace '---help---' in Kconfig files with 'help' 2020-06-14 01:57:21 +09:00
load_policy.c
Makefile
memory.c
mount.c
network.c
realpath.c
securityfs_if.c
tomoyo.c exec: Implement kernel_execve 2020-07-21 08:24:52 -05:00
util.c