Searched refs:tracee (Results 1 - 6 of 6) sorted by relevance

/linux-master/security/yama/
H A Dyama_lsm.c33 struct task_struct *tracee; member in struct:ptrace_relation
133 * yama_ptracer_add - add/replace an exception for this tracer/tracee pair
135 * @tracee: the task_struct of the process to be ptraced
137 * Each tracee can have, at most, one tracer registered. Each time this
138 * is called, the prior registered tracer will be replaced for the tracee.
143 struct task_struct *tracee)
151 added->tracee = tracee;
160 if (relation->tracee == tracee) {
142 yama_ptracer_add(struct task_struct *tracer, struct task_struct *tracee) argument
180 yama_ptracer_del(struct task_struct *tracer, struct task_struct *tracee) argument
306 ptracer_exception_found(struct task_struct *tracer, struct task_struct *tracee) argument
[all...]
/linux-master/security/apparmor/
H A Dtask.c244 struct aa_profile *tracee,
248 if (profile_unconfined(tracee) || unconfined(tracer) ||
249 !ANY_RULE_MEDIATES(&tracee->rules, AA_CLASS_PTRACE))
252 return profile_ptrace_perm(cred, tracee, tracer, request, ad);
257 struct aa_label *tracee, u32 request,
264 return profile_ptrace_perm(cred, tracer, tracee, request, ad);
267 if (&tracer->label == tracee)
271 ad->peer = tracee;
280 * aa_may_ptrace - test if tracer task can trace the tracee
284 * @tracee
243 profile_tracee_perm(const struct cred *cred, struct aa_profile *tracee, struct aa_label *tracer, u32 request, struct apparmor_audit_data *ad) argument
255 profile_tracer_perm(const struct cred *cred, struct aa_profile *tracer, struct aa_label *tracee, u32 request, struct apparmor_audit_data *ad) argument
289 aa_may_ptrace(const struct cred *tracer_cred, struct aa_label *tracer, const struct cred *tracee_cred, struct aa_label *tracee, u32 request) argument
[all...]
H A Dlsm.c126 struct aa_label *tracer, *tracee; local
131 tracee = cred_label(cred); /* ref count on cred */
133 error = aa_may_ptrace(current_cred(), tracer, cred, tracee,
144 struct aa_label *tracer, *tracee; local
148 tracee = __begin_current_label_crit_section();
151 error = aa_may_ptrace(cred, tracer, current_cred(), tracee,
154 __end_current_label_crit_section(tracee);
/linux-master/security/apparmor/include/
H A Dtask.h95 const struct cred *tracee_cred, struct aa_label *tracee,
/linux-master/samples/ftrace/
H A Dftrace-ops.c17 MODULE_PARM_DESC(nr_function_calls, "How many times to call the relevant tracee");
26 MODULE_PARM_DESC(nr_ops_relevant, "How many ftrace_ops to associate with the relevant tracee");
35 MODULE_PARM_DESC(nr_ops_irrelevant, "How many ftrace_ops to associate with the irrelevant tracee");
120 static struct sample_ops *ops_alloc_init(void *tracee, ftrace_func_t func, argument
132 WARN_ON_ONCE(ftrace_set_filter_ip(&ops[i].ops, (unsigned long)tracee, 0, 0));
195 " tracee: %ps\n"
198 " tracee: %ps\n"
/linux-master/tools/testing/selftests/seccomp/
H A Dseccomp_bpf.c1511 pid_t tracee, int status, void *args);
1513 void start_tracer(struct __test_metadata *_metadata, int fd, pid_t tracee, argument
1527 ret = ptrace(PTRACE_ATTACH, tracee, NULL, 0);
1529 kill(tracee, SIGKILL);
1534 ret = ptrace(PTRACE_SETOPTIONS, tracee, NULL, ptrace_syscall ?
1539 kill(tracee, SIGKILL);
1542 tracee, NULL, 0);
1545 /* Unblock the tracee */
1553 if (wait(&status) != tracee)
1572 tracer_func(_metadata, tracee, statu
1591 pid_t tracee = getpid(); local
1635 tracer_poke(struct __test_metadata *_metadata, pid_t tracee, int status, void *args) argument
1936 get_syscall(struct __test_metadata *_metadata, pid_t tracee) argument
1948 __change_syscall(struct __test_metadata *_metadata, pid_t tracee, long *syscall, long *ret) argument
1974 change_syscall_nr(struct __test_metadata *_metadata, pid_t tracee, long syscall) argument
1981 change_syscall_ret(struct __test_metadata *_metadata, pid_t tracee, long ret) argument
1989 tracer_seccomp(struct __test_metadata *_metadata, pid_t tracee, int status, void *args) argument
2040 tracer_ptrace(struct __test_metadata *_metadata, pid_t tracee, int status, void *args) argument
[all...]

Completed in 360 milliseconds