tracee 32 security/apparmor/include/ipc.h int aa_may_ptrace(struct aa_label *tracer, struct aa_label *tracee, tracee 78 security/apparmor/ipc.c static int profile_tracee_perm(struct aa_profile *tracee, tracee 82 security/apparmor/ipc.c if (profile_unconfined(tracee) || unconfined(tracer) || tracee 83 security/apparmor/ipc.c !PROFILE_MEDIATES(tracee, AA_CLASS_PTRACE)) tracee 86 security/apparmor/ipc.c return profile_ptrace_perm(tracee, tracer, request, sa); tracee 90 security/apparmor/ipc.c struct aa_label *tracee, u32 request, tracee 97 security/apparmor/ipc.c return profile_ptrace_perm(tracer, tracee, request, sa); tracee 100 security/apparmor/ipc.c if (&tracer->label == tracee) tracee 104 security/apparmor/ipc.c aad(sa)->peer = tracee; tracee 120 security/apparmor/ipc.c int aa_may_ptrace(struct aa_label *tracer, struct aa_label *tracee, tracee 127 security/apparmor/ipc.c return xcheck_labels(tracer, tracee, profile, tracee 128 security/apparmor/ipc.c profile_tracer_perm(profile, tracee, request, &sa), tracee 108 security/apparmor/lsm.c struct aa_label *tracer, *tracee; tracee 112 security/apparmor/lsm.c tracee = aa_get_task_label(child); tracee 113 security/apparmor/lsm.c error = aa_may_ptrace(tracer, tracee, tracee 116 security/apparmor/lsm.c aa_put_label(tracee); tracee 124 security/apparmor/lsm.c struct aa_label *tracer, *tracee; tracee 127 security/apparmor/lsm.c tracee = __begin_current_label_crit_section(); tracee 129 security/apparmor/lsm.c error = aa_may_ptrace(tracer, tracee, AA_PTRACE_TRACE); tracee 131 security/apparmor/lsm.c __end_current_label_crit_section(tracee); tracee 32 security/yama/yama_lsm.c struct task_struct *tracee; tracee 142 security/yama/yama_lsm.c struct task_struct *tracee) tracee 150 security/yama/yama_lsm.c added->tracee = tracee; tracee 159 security/yama/yama_lsm.c if (relation->tracee == tracee) { tracee 180 security/yama/yama_lsm.c struct task_struct *tracee) tracee 189 security/yama/yama_lsm.c if (relation->tracee == tracee || tracee 306 security/yama/yama_lsm.c struct task_struct *tracee) tracee 319 security/yama/yama_lsm.c parent = ptrace_parent(tracee); tracee 326 security/yama/yama_lsm.c if (!thread_group_leader(tracee)) tracee 327 security/yama/yama_lsm.c tracee = rcu_dereference(tracee->group_leader); tracee 331 security/yama/yama_lsm.c if (relation->tracee == tracee) { tracee 1370 tools/testing/selftests/seccomp/seccomp_bpf.c pid_t tracee, int status, void *args); tracee 1372 tools/testing/selftests/seccomp/seccomp_bpf.c void start_tracer(struct __test_metadata *_metadata, int fd, pid_t tracee, tracee 1386 tools/testing/selftests/seccomp/seccomp_bpf.c ret = ptrace(PTRACE_ATTACH, tracee, NULL, 0); tracee 1388 tools/testing/selftests/seccomp/seccomp_bpf.c kill(tracee, SIGKILL); tracee 1393 tools/testing/selftests/seccomp/seccomp_bpf.c ret = ptrace(PTRACE_SETOPTIONS, tracee, NULL, ptrace_syscall ? tracee 1398 tools/testing/selftests/seccomp/seccomp_bpf.c kill(tracee, SIGKILL); tracee 1401 tools/testing/selftests/seccomp/seccomp_bpf.c tracee, NULL, 0); tracee 1412 tools/testing/selftests/seccomp/seccomp_bpf.c if (wait(&status) != tracee) tracee 1421 tools/testing/selftests/seccomp/seccomp_bpf.c tracer_func(_metadata, tracee, status, args); tracee 1424 tools/testing/selftests/seccomp/seccomp_bpf.c tracee, NULL, 0); tracee 1440 tools/testing/selftests/seccomp/seccomp_bpf.c pid_t tracee = getpid(); tracee 1451 tools/testing/selftests/seccomp/seccomp_bpf.c start_tracer(_metadata, pipefd[1], tracee, func, args, tracee 1483 tools/testing/selftests/seccomp/seccomp_bpf.c void tracer_poke(struct __test_metadata *_metadata, pid_t tracee, int status, tracee 1490 tools/testing/selftests/seccomp/seccomp_bpf.c ret = ptrace(PTRACE_GETEVENTMSG, tracee, NULL, &msg); tracee 1494 tools/testing/selftests/seccomp/seccomp_bpf.c kill(tracee, SIGKILL); tracee 1501 tools/testing/selftests/seccomp/seccomp_bpf.c ret = ptrace(PTRACE_POKEDATA, tracee, info->poke_addr, 0x1001); tracee 1637 tools/testing/selftests/seccomp/seccomp_bpf.c int get_syscall(struct __test_metadata *_metadata, pid_t tracee) tracee 1641 tools/testing/selftests/seccomp/seccomp_bpf.c EXPECT_EQ(0, ptrace(PTRACE_GETREGS, tracee, 0, ®s)) { tracee 1650 tools/testing/selftests/seccomp/seccomp_bpf.c EXPECT_EQ(0, ptrace(PTRACE_GETREGSET, tracee, NT_PRSTATUS, &iov)) { tracee 1665 tools/testing/selftests/seccomp/seccomp_bpf.c pid_t tracee, int syscall, int result) tracee 1670 tools/testing/selftests/seccomp/seccomp_bpf.c ret = ptrace(PTRACE_GETREGS, tracee, 0, ®s); tracee 1675 tools/testing/selftests/seccomp/seccomp_bpf.c ret = ptrace(PTRACE_GETREGSET, tracee, NT_PRSTATUS, &iov); tracee 1697 tools/testing/selftests/seccomp/seccomp_bpf.c ret = ptrace(PTRACE_SET_SYSCALL, tracee, NULL, syscall); tracee 1708 tools/testing/selftests/seccomp/seccomp_bpf.c ret = ptrace(PTRACE_SETREGSET, tracee, NT_ARM_SYSTEM_CALL, tracee 1728 tools/testing/selftests/seccomp/seccomp_bpf.c ret = ptrace(PTRACE_SETREGS, tracee, 0, ®s); tracee 1732 tools/testing/selftests/seccomp/seccomp_bpf.c ret = ptrace(PTRACE_SETREGSET, tracee, NT_PRSTATUS, &iov); tracee 1737 tools/testing/selftests/seccomp/seccomp_bpf.c void tracer_syscall(struct __test_metadata *_metadata, pid_t tracee, tracee 1744 tools/testing/selftests/seccomp/seccomp_bpf.c ret = ptrace(PTRACE_GETEVENTMSG, tracee, NULL, &msg); tracee 1751 tools/testing/selftests/seccomp/seccomp_bpf.c EXPECT_EQ(__NR_getpid, get_syscall(_metadata, tracee)); tracee 1752 tools/testing/selftests/seccomp/seccomp_bpf.c change_syscall(_metadata, tracee, __NR_getppid, 0); tracee 1756 tools/testing/selftests/seccomp/seccomp_bpf.c EXPECT_EQ(__NR_gettid, get_syscall(_metadata, tracee)); tracee 1757 tools/testing/selftests/seccomp/seccomp_bpf.c change_syscall(_metadata, tracee, -1, 45000); tracee 1761 tools/testing/selftests/seccomp/seccomp_bpf.c EXPECT_EQ(__NR_openat, get_syscall(_metadata, tracee)); tracee 1762 tools/testing/selftests/seccomp/seccomp_bpf.c change_syscall(_metadata, tracee, -1, -ESRCH); tracee 1766 tools/testing/selftests/seccomp/seccomp_bpf.c EXPECT_EQ(__NR_getppid, get_syscall(_metadata, tracee)); tracee 1771 tools/testing/selftests/seccomp/seccomp_bpf.c kill(tracee, SIGKILL); tracee 1777 tools/testing/selftests/seccomp/seccomp_bpf.c void tracer_ptrace(struct __test_metadata *_metadata, pid_t tracee, tracee 1791 tools/testing/selftests/seccomp/seccomp_bpf.c ret = ptrace(PTRACE_GETEVENTMSG, tracee, NULL, &msg); tracee 1799 tools/testing/selftests/seccomp/seccomp_bpf.c nr = get_syscall(_metadata, tracee); tracee 1802 tools/testing/selftests/seccomp/seccomp_bpf.c change_syscall(_metadata, tracee, __NR_getppid, 0); tracee 1804 tools/testing/selftests/seccomp/seccomp_bpf.c change_syscall(_metadata, tracee, -1, 45000); tracee 1806 tools/testing/selftests/seccomp/seccomp_bpf.c change_syscall(_metadata, tracee, -1, -ESRCH);