Home
last modified time | relevance | path

Searched refs:PTRACE_ATTACH (Results 1 – 10 of 10) sorted by relevance

/Linux-v4.19/Documentation/admin-guide/LSM/
DYama.rst39 other process (and its descendants) are allowed to call ``PTRACE_ATTACH``
51 a process can ``PTRACE_ATTACH`` to any other
59 with the inferior it wants to call ``PTRACE_ATTACH`` on. By default,
63 an allowed debugger PID to call ``PTRACE_ATTACH`` on the inferior.
68 with ``PTRACE_ATTACH``, or through children calling ``PTRACE_TRACEME``.
71 no processes may use ptrace with ``PTRACE_ATTACH`` nor via
DSmack.rst294 object. For the ``PTRACE_ATTACH`` a read-write access is required.
297 this is the policy that limits ``PTRACE_ATTACH``. Attach is
/Linux-v4.19/include/uapi/linux/
Dptrace.h22 #define PTRACE_ATTACH 16 macro
/Linux-v4.19/tools/testing/selftests/x86/
Dmov_ss_trap.c74 if (ptrace(PTRACE_ATTACH, parent, NULL, NULL) != 0) in enable_watchpoint()
Dprotection_keys.c1238 ret = ptrace(PTRACE_ATTACH, child_pid, ignored, ignored); in test_ptrace_of_child()
/Linux-v4.19/tools/testing/selftests/ptrace/
Dpeeksiginfo.c188 if (sys_ptrace(PTRACE_ATTACH, child, NULL, NULL) == -1) in main()
/Linux-v4.19/kernel/
Dptrace.c441 proc_ptrace_connector(task, PTRACE_ATTACH); in ptrace_attach()
1129 if (request == PTRACE_ATTACH || request == PTRACE_SEIZE) { in SYSCALL_DEFINE4()
1275 if (request == PTRACE_ATTACH || request == PTRACE_SEIZE) { in COMPAT_SYSCALL_DEFINE4()
/Linux-v4.19/drivers/connector/
Dcn_proc.c208 if (ptrace_id == PTRACE_ATTACH) { in proc_ptrace_connector()
/Linux-v4.19/tools/testing/selftests/powerpc/ptrace/
Dptrace.h68 ret = ptrace(PTRACE_ATTACH, child, NULL, NULL); in start_trace()
/Linux-v4.19/tools/testing/selftests/seccomp/
Dseccomp_bpf.c1335 ret = ptrace(PTRACE_ATTACH, tracee, NULL, 0); in start_tracer()
2910 ASSERT_EQ(0, ptrace(PTRACE_ATTACH, pid)); in TEST()