Searched refs:tracee (Results 1 – 7 of 7) sorted by relevance
| /Linux-v5.10/security/yama/ |
| D | yama_lsm.c | 32 struct task_struct *tracee; member 142 struct task_struct *tracee) in yama_ptracer_add() argument 150 added->tracee = tracee; in yama_ptracer_add() 159 if (relation->tracee == tracee) { in yama_ptracer_add() 180 struct task_struct *tracee) in yama_ptracer_del() argument 189 if (relation->tracee == tracee || in yama_ptracer_del() 306 struct task_struct *tracee) in ptracer_exception_found() argument 319 parent = ptrace_parent(tracee); in ptracer_exception_found() 326 if (!thread_group_leader(tracee)) in ptracer_exception_found() 327 tracee = rcu_dereference(tracee->group_leader); in ptracer_exception_found() [all …]
|
| /Linux-v5.10/security/apparmor/ |
| D | ipc.c | 76 static int profile_tracee_perm(struct aa_profile *tracee, in profile_tracee_perm() argument 80 if (profile_unconfined(tracee) || unconfined(tracer) || in profile_tracee_perm() 81 !PROFILE_MEDIATES(tracee, AA_CLASS_PTRACE)) in profile_tracee_perm() 84 return profile_ptrace_perm(tracee, tracer, request, sa); in profile_tracee_perm() 88 struct aa_label *tracee, u32 request, in profile_tracer_perm() argument 95 return profile_ptrace_perm(tracer, tracee, request, sa); in profile_tracer_perm() 98 if (&tracer->label == tracee) in profile_tracer_perm() 102 aad(sa)->peer = tracee; in profile_tracer_perm() 118 int aa_may_ptrace(struct aa_label *tracer, struct aa_label *tracee, in aa_may_ptrace() argument 125 return xcheck_labels(tracer, tracee, profile, in aa_may_ptrace() [all …]
|
| D | lsm.c | 118 struct aa_label *tracer, *tracee; in apparmor_ptrace_access_check() local 122 tracee = aa_get_task_label(child); in apparmor_ptrace_access_check() 123 error = aa_may_ptrace(tracer, tracee, in apparmor_ptrace_access_check() 126 aa_put_label(tracee); in apparmor_ptrace_access_check() 134 struct aa_label *tracer, *tracee; in apparmor_ptrace_traceme() local 137 tracee = __begin_current_label_crit_section(); in apparmor_ptrace_traceme() 139 error = aa_may_ptrace(tracer, tracee, AA_PTRACE_TRACE); in apparmor_ptrace_traceme() 141 __end_current_label_crit_section(tracee); in apparmor_ptrace_traceme()
|
| /Linux-v5.10/tools/testing/selftests/seccomp/ |
| D | seccomp_bpf.c | 1494 pid_t tracee, int status, void *args); 1496 void start_tracer(struct __test_metadata *_metadata, int fd, pid_t tracee, in start_tracer() argument 1510 ret = ptrace(PTRACE_ATTACH, tracee, NULL, 0); in start_tracer() 1512 kill(tracee, SIGKILL); in start_tracer() 1517 ret = ptrace(PTRACE_SETOPTIONS, tracee, NULL, ptrace_syscall ? in start_tracer() 1522 kill(tracee, SIGKILL); in start_tracer() 1525 tracee, NULL, 0); in start_tracer() 1536 if (wait(&status) != tracee) in start_tracer() 1545 tracer_func(_metadata, tracee, status, args); in start_tracer() 1548 tracee, NULL, 0); in start_tracer() [all …]
|
| /Linux-v5.10/Documentation/arm64/ |
| D | memory-tagging-extension.rst | 143 the tags from or set the tags to a tracee's address space. The 148 - ``pid`` - the tracee's PID. 149 - ``addr`` - address in the tracee's address space. 155 tracee's address space. 164 ``iov_len`` if the requested address range in the tracee's or the 167 - ``-EIO`` - the tracee's address range cannot be accessed (e.g. invalid 171 - ``-EOPNOTSUPP`` - the tracee's address does not have valid tags (never
|
| /Linux-v5.10/security/apparmor/include/ |
| D | ipc.h | 32 int aa_may_ptrace(struct aa_label *tracer, struct aa_label *tracee,
|
| /Linux-v5.10/Documentation/userspace-api/ |
| D | seccomp_filter.rst | 266 above in this document: all arguments being read from the tracee's memory
|