/linux/security/yama/ |
H A D | yama_lsm.c | 33 struct task_struct *tracee; member 132 * yama_ptracer_add - add/replace an exception for this tracer/tracee pair 134 * @tracee: the task_struct of the process to be ptraced 136 * Each tracee can have, at most, one tracer registered. Each time this 137 * is called, the prior registered tracer will be replaced for the tracee. 142 struct task_struct *tracee) 150 added->tracee = tracee; in yama_ptracer_add() 159 if (relation->tracee == tracee) { in yama_ptracer_add() 144 yama_ptracer_add(struct task_struct * tracer,struct task_struct * tracee) yama_ptracer_add() argument 182 yama_ptracer_del(struct task_struct * tracer,struct task_struct * tracee) yama_ptracer_del() argument 308 ptracer_exception_found(struct task_struct * tracer,struct task_struct * tracee) ptracer_exception_found() argument [all...] |
/linux/security/apparmor/ |
H A D | task.c | 244 struct aa_profile *tracee, in profile_tracee_perm() argument 248 if (profile_unconfined(tracee) || unconfined(tracer) || in profile_tracee_perm() 249 !ANY_RULE_MEDIATES(&tracee->rules, AA_CLASS_PTRACE)) in profile_tracee_perm() 252 return profile_ptrace_perm(cred, tracee, tracer, request, ad); in profile_tracee_perm() 257 struct aa_label *tracee, u32 request, in profile_tracer_perm() argument 264 return profile_ptrace_perm(cred, tracer, tracee, request, ad); in profile_tracer_perm() 267 if (&tracer->label == tracee) in profile_tracer_perm() 271 ad->peer = tracee; in profile_tracer_perm() 290 const struct cred *tracee_cred, struct aa_label *tracee, in aa_may_ptrace() argument 297 return xcheck_labels(tracer, tracee, profile, in aa_may_ptrace() [all …]
|
/linux/tools/testing/selftests/seccomp/ |
H A D | seccomp_bpf.c | 1518 pid_t tracee, int status, void *args); 1520 void start_tracer(struct __test_metadata *_metadata, int fd, pid_t tracee, in start_tracer() argument 1534 ret = ptrace(PTRACE_ATTACH, tracee, NULL, 0); in start_tracer() 1536 kill(tracee, SIGKILL); in start_tracer() 1541 ret = ptrace(PTRACE_SETOPTIONS, tracee, NULL, ptrace_syscall ? in start_tracer() 1546 kill(tracee, SIGKILL); in start_tracer() 1549 tracee, NULL, 0); in start_tracer() 1560 if (wait(&status) != tracee) in start_tracer() 1579 tracer_func(_metadata, tracee, status, args); in start_tracer() 1582 tracee, NULL, 0); in start_tracer() [all …]
|
/linux/samples/ftrace/ |
H A D | ftrace-ops.c | 120 static struct sample_ops *ops_alloc_init(void *tracee, ftrace_func_t func, in ops_alloc_init() argument 132 WARN_ON_ONCE(ftrace_set_filter_ip(&ops[i].ops, (unsigned long)tracee, 0, 0)); in ops_alloc_init()
|
/linux/Documentation/arch/arm64/ |
H A D | memory-tagging-extension.rst | 186 the tags from or set the tags to a tracee's address space. The 191 - ``pid`` - the tracee's PID. 192 - ``addr`` - address in the tracee's address space. 198 tracee's address space. 207 ``iov_len`` if the requested address range in the tracee's or the 210 - ``-EIO`` - the tracee's address range cannot be accessed (e.g. invalid 214 - ``-EOPNOTSUPP`` - the tracee's address does not have valid tags (never
|
/linux/security/apparmor/include/ |
H A D | task.h | 95 const struct cred *tracee_cred, struct aa_label *tracee,
|
/linux/Documentation/userspace-api/ |
H A D | seccomp_filter.rst | 288 above in this document: all arguments being read from the tracee's memory
|
H A D | landlock.rst | 314 access rights, which means the tracee must be in a sub-domain of the tracer.
|