tracee             32 security/apparmor/include/ipc.h int aa_may_ptrace(struct aa_label *tracer, struct aa_label *tracee,
tracee             78 security/apparmor/ipc.c static int profile_tracee_perm(struct aa_profile *tracee,
tracee             82 security/apparmor/ipc.c 	if (profile_unconfined(tracee) || unconfined(tracer) ||
tracee             83 security/apparmor/ipc.c 	    !PROFILE_MEDIATES(tracee, AA_CLASS_PTRACE))
tracee             86 security/apparmor/ipc.c 	return profile_ptrace_perm(tracee, tracer, request, sa);
tracee             90 security/apparmor/ipc.c 			       struct aa_label *tracee, u32 request,
tracee             97 security/apparmor/ipc.c 		return profile_ptrace_perm(tracer, tracee, request, sa);
tracee            100 security/apparmor/ipc.c 	if (&tracer->label == tracee)
tracee            104 security/apparmor/ipc.c 	aad(sa)->peer = tracee;
tracee            120 security/apparmor/ipc.c int aa_may_ptrace(struct aa_label *tracer, struct aa_label *tracee,
tracee            127 security/apparmor/ipc.c 	return xcheck_labels(tracer, tracee, profile,
tracee            128 security/apparmor/ipc.c 			profile_tracer_perm(profile, tracee, request, &sa),
tracee            108 security/apparmor/lsm.c 	struct aa_label *tracer, *tracee;
tracee            112 security/apparmor/lsm.c 	tracee = aa_get_task_label(child);
tracee            113 security/apparmor/lsm.c 	error = aa_may_ptrace(tracer, tracee,
tracee            116 security/apparmor/lsm.c 	aa_put_label(tracee);
tracee            124 security/apparmor/lsm.c 	struct aa_label *tracer, *tracee;
tracee            127 security/apparmor/lsm.c 	tracee = __begin_current_label_crit_section();
tracee            129 security/apparmor/lsm.c 	error = aa_may_ptrace(tracer, tracee, AA_PTRACE_TRACE);
tracee            131 security/apparmor/lsm.c 	__end_current_label_crit_section(tracee);
tracee             32 security/yama/yama_lsm.c 	struct task_struct *tracee;
tracee            142 security/yama/yama_lsm.c 			    struct task_struct *tracee)
tracee            150 security/yama/yama_lsm.c 	added->tracee = tracee;
tracee            159 security/yama/yama_lsm.c 		if (relation->tracee == tracee) {
tracee            180 security/yama/yama_lsm.c 			     struct task_struct *tracee)
tracee            189 security/yama/yama_lsm.c 		if (relation->tracee == tracee ||
tracee            306 security/yama/yama_lsm.c 				   struct task_struct *tracee)
tracee            319 security/yama/yama_lsm.c 	parent = ptrace_parent(tracee);
tracee            326 security/yama/yama_lsm.c 	if (!thread_group_leader(tracee))
tracee            327 security/yama/yama_lsm.c 		tracee = rcu_dereference(tracee->group_leader);
tracee            331 security/yama/yama_lsm.c 		if (relation->tracee == tracee) {
tracee           1370 tools/testing/selftests/seccomp/seccomp_bpf.c 			   pid_t tracee, int status, void *args);
tracee           1372 tools/testing/selftests/seccomp/seccomp_bpf.c void start_tracer(struct __test_metadata *_metadata, int fd, pid_t tracee,
tracee           1386 tools/testing/selftests/seccomp/seccomp_bpf.c 		ret = ptrace(PTRACE_ATTACH, tracee, NULL, 0);
tracee           1388 tools/testing/selftests/seccomp/seccomp_bpf.c 		kill(tracee, SIGKILL);
tracee           1393 tools/testing/selftests/seccomp/seccomp_bpf.c 	ret = ptrace(PTRACE_SETOPTIONS, tracee, NULL, ptrace_syscall ?
tracee           1398 tools/testing/selftests/seccomp/seccomp_bpf.c 		kill(tracee, SIGKILL);
tracee           1401 tools/testing/selftests/seccomp/seccomp_bpf.c 		     tracee, NULL, 0);
tracee           1412 tools/testing/selftests/seccomp/seccomp_bpf.c 		if (wait(&status) != tracee)
tracee           1421 tools/testing/selftests/seccomp/seccomp_bpf.c 		tracer_func(_metadata, tracee, status, args);
tracee           1424 tools/testing/selftests/seccomp/seccomp_bpf.c 			     tracee, NULL, 0);
tracee           1440 tools/testing/selftests/seccomp/seccomp_bpf.c 	pid_t tracee = getpid();
tracee           1451 tools/testing/selftests/seccomp/seccomp_bpf.c 		start_tracer(_metadata, pipefd[1], tracee, func, args,
tracee           1483 tools/testing/selftests/seccomp/seccomp_bpf.c void tracer_poke(struct __test_metadata *_metadata, pid_t tracee, int status,
tracee           1490 tools/testing/selftests/seccomp/seccomp_bpf.c 	ret = ptrace(PTRACE_GETEVENTMSG, tracee, NULL, &msg);
tracee           1494 tools/testing/selftests/seccomp/seccomp_bpf.c 		kill(tracee, SIGKILL);
tracee           1501 tools/testing/selftests/seccomp/seccomp_bpf.c 	ret = ptrace(PTRACE_POKEDATA, tracee, info->poke_addr, 0x1001);
tracee           1637 tools/testing/selftests/seccomp/seccomp_bpf.c int get_syscall(struct __test_metadata *_metadata, pid_t tracee)
tracee           1641 tools/testing/selftests/seccomp/seccomp_bpf.c 	EXPECT_EQ(0, ptrace(PTRACE_GETREGS, tracee, 0, &regs)) {
tracee           1650 tools/testing/selftests/seccomp/seccomp_bpf.c 	EXPECT_EQ(0, ptrace(PTRACE_GETREGSET, tracee, NT_PRSTATUS, &iov)) {
tracee           1665 tools/testing/selftests/seccomp/seccomp_bpf.c 		    pid_t tracee, int syscall, int result)
tracee           1670 tools/testing/selftests/seccomp/seccomp_bpf.c 	ret = ptrace(PTRACE_GETREGS, tracee, 0, &regs);
tracee           1675 tools/testing/selftests/seccomp/seccomp_bpf.c 	ret = ptrace(PTRACE_GETREGSET, tracee, NT_PRSTATUS, &iov);
tracee           1697 tools/testing/selftests/seccomp/seccomp_bpf.c 		ret = ptrace(PTRACE_SET_SYSCALL, tracee, NULL, syscall);
tracee           1708 tools/testing/selftests/seccomp/seccomp_bpf.c 		ret = ptrace(PTRACE_SETREGSET, tracee, NT_ARM_SYSTEM_CALL,
tracee           1728 tools/testing/selftests/seccomp/seccomp_bpf.c 	ret = ptrace(PTRACE_SETREGS, tracee, 0, &regs);
tracee           1732 tools/testing/selftests/seccomp/seccomp_bpf.c 	ret = ptrace(PTRACE_SETREGSET, tracee, NT_PRSTATUS, &iov);
tracee           1737 tools/testing/selftests/seccomp/seccomp_bpf.c void tracer_syscall(struct __test_metadata *_metadata, pid_t tracee,
tracee           1744 tools/testing/selftests/seccomp/seccomp_bpf.c 	ret = ptrace(PTRACE_GETEVENTMSG, tracee, NULL, &msg);
tracee           1751 tools/testing/selftests/seccomp/seccomp_bpf.c 		EXPECT_EQ(__NR_getpid, get_syscall(_metadata, tracee));
tracee           1752 tools/testing/selftests/seccomp/seccomp_bpf.c 		change_syscall(_metadata, tracee, __NR_getppid, 0);
tracee           1756 tools/testing/selftests/seccomp/seccomp_bpf.c 		EXPECT_EQ(__NR_gettid, get_syscall(_metadata, tracee));
tracee           1757 tools/testing/selftests/seccomp/seccomp_bpf.c 		change_syscall(_metadata, tracee, -1, 45000);
tracee           1761 tools/testing/selftests/seccomp/seccomp_bpf.c 		EXPECT_EQ(__NR_openat, get_syscall(_metadata, tracee));
tracee           1762 tools/testing/selftests/seccomp/seccomp_bpf.c 		change_syscall(_metadata, tracee, -1, -ESRCH);
tracee           1766 tools/testing/selftests/seccomp/seccomp_bpf.c 		EXPECT_EQ(__NR_getppid, get_syscall(_metadata, tracee));
tracee           1771 tools/testing/selftests/seccomp/seccomp_bpf.c 			kill(tracee, SIGKILL);
tracee           1777 tools/testing/selftests/seccomp/seccomp_bpf.c void tracer_ptrace(struct __test_metadata *_metadata, pid_t tracee,
tracee           1791 tools/testing/selftests/seccomp/seccomp_bpf.c 	ret = ptrace(PTRACE_GETEVENTMSG, tracee, NULL, &msg);
tracee           1799 tools/testing/selftests/seccomp/seccomp_bpf.c 	nr = get_syscall(_metadata, tracee);
tracee           1802 tools/testing/selftests/seccomp/seccomp_bpf.c 		change_syscall(_metadata, tracee, __NR_getppid, 0);
tracee           1804 tools/testing/selftests/seccomp/seccomp_bpf.c 		change_syscall(_metadata, tracee, -1, 45000);
tracee           1806 tools/testing/selftests/seccomp/seccomp_bpf.c 		change_syscall(_metadata, tracee, -1, -ESRCH);