/linux-master/security/yama/ |
H A D | yama_lsm.c | 33 struct task_struct *tracee; member in struct:ptrace_relation 133 * yama_ptracer_add - add/replace an exception for this tracer/tracee pair 135 * @tracee: the task_struct of the process to be ptraced 137 * Each tracee can have, at most, one tracer registered. Each time this 138 * is called, the prior registered tracer will be replaced for the tracee. 143 struct task_struct *tracee) 151 added->tracee = tracee; 160 if (relation->tracee == tracee) { 142 yama_ptracer_add(struct task_struct *tracer, struct task_struct *tracee) argument 180 yama_ptracer_del(struct task_struct *tracer, struct task_struct *tracee) argument 306 ptracer_exception_found(struct task_struct *tracer, struct task_struct *tracee) argument [all...] |
/linux-master/security/apparmor/ |
H A D | task.c | 244 struct aa_profile *tracee, 248 if (profile_unconfined(tracee) || unconfined(tracer) || 249 !ANY_RULE_MEDIATES(&tracee->rules, AA_CLASS_PTRACE)) 252 return profile_ptrace_perm(cred, tracee, tracer, request, ad); 257 struct aa_label *tracee, u32 request, 264 return profile_ptrace_perm(cred, tracer, tracee, request, ad); 267 if (&tracer->label == tracee) 271 ad->peer = tracee; 280 * aa_may_ptrace - test if tracer task can trace the tracee 284 * @tracee 243 profile_tracee_perm(const struct cred *cred, struct aa_profile *tracee, struct aa_label *tracer, u32 request, struct apparmor_audit_data *ad) argument 255 profile_tracer_perm(const struct cred *cred, struct aa_profile *tracer, struct aa_label *tracee, u32 request, struct apparmor_audit_data *ad) argument 289 aa_may_ptrace(const struct cred *tracer_cred, struct aa_label *tracer, const struct cred *tracee_cred, struct aa_label *tracee, u32 request) argument [all...] |
H A D | lsm.c | 126 struct aa_label *tracer, *tracee; local 131 tracee = cred_label(cred); /* ref count on cred */ 133 error = aa_may_ptrace(current_cred(), tracer, cred, tracee, 144 struct aa_label *tracer, *tracee; local 148 tracee = __begin_current_label_crit_section(); 151 error = aa_may_ptrace(cred, tracer, current_cred(), tracee, 154 __end_current_label_crit_section(tracee);
|
/linux-master/security/apparmor/include/ |
H A D | task.h | 95 const struct cred *tracee_cred, struct aa_label *tracee,
|
/linux-master/samples/ftrace/ |
H A D | ftrace-ops.c | 17 MODULE_PARM_DESC(nr_function_calls, "How many times to call the relevant tracee"); 26 MODULE_PARM_DESC(nr_ops_relevant, "How many ftrace_ops to associate with the relevant tracee"); 35 MODULE_PARM_DESC(nr_ops_irrelevant, "How many ftrace_ops to associate with the irrelevant tracee"); 120 static struct sample_ops *ops_alloc_init(void *tracee, ftrace_func_t func, argument 132 WARN_ON_ONCE(ftrace_set_filter_ip(&ops[i].ops, (unsigned long)tracee, 0, 0)); 195 " tracee: %ps\n" 198 " tracee: %ps\n"
|
/linux-master/tools/testing/selftests/seccomp/ |
H A D | seccomp_bpf.c | 1511 pid_t tracee, int status, void *args); 1513 void start_tracer(struct __test_metadata *_metadata, int fd, pid_t tracee, argument 1527 ret = ptrace(PTRACE_ATTACH, tracee, NULL, 0); 1529 kill(tracee, SIGKILL); 1534 ret = ptrace(PTRACE_SETOPTIONS, tracee, NULL, ptrace_syscall ? 1539 kill(tracee, SIGKILL); 1542 tracee, NULL, 0); 1545 /* Unblock the tracee */ 1553 if (wait(&status) != tracee) 1572 tracer_func(_metadata, tracee, statu 1591 pid_t tracee = getpid(); local 1635 tracer_poke(struct __test_metadata *_metadata, pid_t tracee, int status, void *args) argument 1936 get_syscall(struct __test_metadata *_metadata, pid_t tracee) argument 1948 __change_syscall(struct __test_metadata *_metadata, pid_t tracee, long *syscall, long *ret) argument 1974 change_syscall_nr(struct __test_metadata *_metadata, pid_t tracee, long syscall) argument 1981 change_syscall_ret(struct __test_metadata *_metadata, pid_t tracee, long ret) argument 1989 tracer_seccomp(struct __test_metadata *_metadata, pid_t tracee, int status, void *args) argument 2040 tracer_ptrace(struct __test_metadata *_metadata, pid_t tracee, int status, void *args) argument [all...] |