Home
last modified time | relevance | path

Searched refs:tracee (Results 1 – 6 of 6) sorted by relevance

/Linux-v5.4/security/yama/
Dyama_lsm.c32 struct task_struct *tracee; member
142 struct task_struct *tracee) in yama_ptracer_add() argument
150 added->tracee = tracee; in yama_ptracer_add()
159 if (relation->tracee == tracee) { in yama_ptracer_add()
180 struct task_struct *tracee) in yama_ptracer_del() argument
189 if (relation->tracee == tracee || in yama_ptracer_del()
306 struct task_struct *tracee) in ptracer_exception_found() argument
319 parent = ptrace_parent(tracee); in ptracer_exception_found()
326 if (!thread_group_leader(tracee)) in ptracer_exception_found()
327 tracee = rcu_dereference(tracee->group_leader); in ptracer_exception_found()
[all …]
/Linux-v5.4/security/apparmor/
Dipc.c78 static int profile_tracee_perm(struct aa_profile *tracee, in profile_tracee_perm() argument
82 if (profile_unconfined(tracee) || unconfined(tracer) || in profile_tracee_perm()
83 !PROFILE_MEDIATES(tracee, AA_CLASS_PTRACE)) in profile_tracee_perm()
86 return profile_ptrace_perm(tracee, tracer, request, sa); in profile_tracee_perm()
90 struct aa_label *tracee, u32 request, in profile_tracer_perm() argument
97 return profile_ptrace_perm(tracer, tracee, request, sa); in profile_tracer_perm()
100 if (&tracer->label == tracee) in profile_tracer_perm()
104 aad(sa)->peer = tracee; in profile_tracer_perm()
120 int aa_may_ptrace(struct aa_label *tracer, struct aa_label *tracee, in aa_may_ptrace() argument
127 return xcheck_labels(tracer, tracee, profile, in aa_may_ptrace()
[all …]
Dlsm.c108 struct aa_label *tracer, *tracee; in apparmor_ptrace_access_check() local
112 tracee = aa_get_task_label(child); in apparmor_ptrace_access_check()
113 error = aa_may_ptrace(tracer, tracee, in apparmor_ptrace_access_check()
116 aa_put_label(tracee); in apparmor_ptrace_access_check()
124 struct aa_label *tracer, *tracee; in apparmor_ptrace_traceme() local
127 tracee = __begin_current_label_crit_section(); in apparmor_ptrace_traceme()
129 error = aa_may_ptrace(tracer, tracee, AA_PTRACE_TRACE); in apparmor_ptrace_traceme()
131 __end_current_label_crit_section(tracee); in apparmor_ptrace_traceme()
/Linux-v5.4/tools/testing/selftests/seccomp/
Dseccomp_bpf.c1369 pid_t tracee, int status, void *args);
1371 void start_tracer(struct __test_metadata *_metadata, int fd, pid_t tracee, in start_tracer() argument
1385 ret = ptrace(PTRACE_ATTACH, tracee, NULL, 0); in start_tracer()
1387 kill(tracee, SIGKILL); in start_tracer()
1392 ret = ptrace(PTRACE_SETOPTIONS, tracee, NULL, ptrace_syscall ? in start_tracer()
1397 kill(tracee, SIGKILL); in start_tracer()
1400 tracee, NULL, 0); in start_tracer()
1411 if (wait(&status) != tracee) in start_tracer()
1420 tracer_func(_metadata, tracee, status, args); in start_tracer()
1423 tracee, NULL, 0); in start_tracer()
[all …]
/Linux-v5.4/security/apparmor/include/
Dipc.h32 int aa_may_ptrace(struct aa_label *tracer, struct aa_label *tracee,
/Linux-v5.4/Documentation/userspace-api/
Dseccomp_filter.rst266 above in this document: all arguments being read from the tracee's memory