Home
last modified time | relevance | path

Searched refs:tracee (Results 1 – 9 of 9) sorted by relevance

/linux/security/yama/
A Dyama_lsm.c33 struct task_struct *tracee; member
144 struct task_struct *tracee) in yama_ptracer_add() argument
152 added->tracee = tracee; in yama_ptracer_add()
161 if (relation->tracee == tracee) { in yama_ptracer_add()
182 struct task_struct *tracee) in yama_ptracer_del() argument
191 if (relation->tracee == tracee || in yama_ptracer_del()
308 struct task_struct *tracee) in ptracer_exception_found() argument
321 parent = ptrace_parent(tracee); in ptracer_exception_found()
328 if (!thread_group_leader(tracee)) in ptracer_exception_found()
329 tracee = rcu_dereference(tracee->group_leader); in ptracer_exception_found()
[all …]
/linux/security/apparmor/
A Dtask.c244 struct aa_profile *tracee, in profile_tracee_perm() argument
248 if (profile_unconfined(tracee) || unconfined(tracer) || in profile_tracee_perm()
249 !ANY_RULE_MEDIATES(&tracee->rules, AA_CLASS_PTRACE)) in profile_tracee_perm()
252 return profile_ptrace_perm(cred, tracee, tracer, request, ad); in profile_tracee_perm()
257 struct aa_label *tracee, u32 request, in profile_tracer_perm() argument
264 return profile_ptrace_perm(cred, tracer, tracee, request, ad); in profile_tracer_perm()
267 if (&tracer->label == tracee) in profile_tracer_perm()
271 ad->peer = tracee; in profile_tracer_perm()
290 const struct cred *tracee_cred, struct aa_label *tracee, in aa_may_ptrace() argument
297 return xcheck_labels(tracer, tracee, profile, in aa_may_ptrace()
[all …]
A Dlsm.c126 struct aa_label *tracer, *tracee; in apparmor_ptrace_access_check() local
131 tracee = cred_label(cred); /* ref count on cred */ in apparmor_ptrace_access_check()
133 error = aa_may_ptrace(current_cred(), tracer, cred, tracee, in apparmor_ptrace_access_check()
144 struct aa_label *tracer, *tracee; in apparmor_ptrace_traceme() local
148 tracee = __begin_current_label_crit_section(); in apparmor_ptrace_traceme()
151 error = aa_may_ptrace(cred, tracer, current_cred(), tracee, in apparmor_ptrace_traceme()
154 __end_current_label_crit_section(tracee); in apparmor_ptrace_traceme()
/linux/tools/testing/selftests/seccomp/
A Dseccomp_bpf.c1513 pid_t tracee, int status, void *args);
1531 kill(tracee, SIGKILL); in start_tracer()
1541 kill(tracee, SIGKILL); in start_tracer()
1544 tracee, NULL, 0); in start_tracer()
1555 if (wait(&status) != tracee) in start_tracer()
1577 tracee, NULL, 0); in start_tracer()
1593 pid_t tracee = getpid(); in setup_trace_fixture() local
1648 kill(tracee, SIGKILL); in tracer_poke()
1977 pid_t tracee, long syscall) in change_syscall_nr() argument
1984 pid_t tracee, long ret) in change_syscall_ret() argument
[all …]
/linux/samples/ftrace/
A Dftrace-ops.c120 static struct sample_ops *ops_alloc_init(void *tracee, ftrace_func_t func, in ops_alloc_init() argument
132 WARN_ON_ONCE(ftrace_set_filter_ip(&ops[i].ops, (unsigned long)tracee, 0, 0)); in ops_alloc_init()
/linux/Documentation/arch/arm64/
A Dmemory-tagging-extension.rst186 the tags from or set the tags to a tracee's address space. The
191 - ``pid`` - the tracee's PID.
192 - ``addr`` - address in the tracee's address space.
198 tracee's address space.
207 ``iov_len`` if the requested address range in the tracee's or the
210 - ``-EIO`` - the tracee's address range cannot be accessed (e.g. invalid
214 - ``-EOPNOTSUPP`` - the tracee's address does not have valid tags (never
/linux/security/apparmor/include/
A Dtask.h95 const struct cred *tracee_cred, struct aa_label *tracee,
/linux/Documentation/userspace-api/
A Dseccomp_filter.rst288 above in this document: all arguments being read from the tracee's memory
A Dlandlock.rst314 access rights, which means the tracee must be in a sub-domain of the tracer.

Completed in 31 milliseconds