Searched refs:PTRACE_ATTACH (Results 1 – 10 of 10) sorted by relevance
/Linux-v4.19/Documentation/admin-guide/LSM/ |
D | Yama.rst | 39 other process (and its descendants) are allowed to call ``PTRACE_ATTACH`` 51 a process can ``PTRACE_ATTACH`` to any other 59 with the inferior it wants to call ``PTRACE_ATTACH`` on. By default, 63 an allowed debugger PID to call ``PTRACE_ATTACH`` on the inferior. 68 with ``PTRACE_ATTACH``, or through children calling ``PTRACE_TRACEME``. 71 no processes may use ptrace with ``PTRACE_ATTACH`` nor via
|
D | Smack.rst | 294 object. For the ``PTRACE_ATTACH`` a read-write access is required. 297 this is the policy that limits ``PTRACE_ATTACH``. Attach is
|
/Linux-v4.19/include/uapi/linux/ |
D | ptrace.h | 22 #define PTRACE_ATTACH 16 macro
|
/Linux-v4.19/tools/testing/selftests/x86/ |
D | mov_ss_trap.c | 74 if (ptrace(PTRACE_ATTACH, parent, NULL, NULL) != 0) in enable_watchpoint()
|
D | protection_keys.c | 1238 ret = ptrace(PTRACE_ATTACH, child_pid, ignored, ignored); in test_ptrace_of_child()
|
/Linux-v4.19/tools/testing/selftests/ptrace/ |
D | peeksiginfo.c | 188 if (sys_ptrace(PTRACE_ATTACH, child, NULL, NULL) == -1) in main()
|
/Linux-v4.19/kernel/ |
D | ptrace.c | 441 proc_ptrace_connector(task, PTRACE_ATTACH); in ptrace_attach() 1129 if (request == PTRACE_ATTACH || request == PTRACE_SEIZE) { in SYSCALL_DEFINE4() 1275 if (request == PTRACE_ATTACH || request == PTRACE_SEIZE) { in COMPAT_SYSCALL_DEFINE4()
|
/Linux-v4.19/drivers/connector/ |
D | cn_proc.c | 208 if (ptrace_id == PTRACE_ATTACH) { in proc_ptrace_connector()
|
/Linux-v4.19/tools/testing/selftests/powerpc/ptrace/ |
D | ptrace.h | 68 ret = ptrace(PTRACE_ATTACH, child, NULL, NULL); in start_trace()
|
/Linux-v4.19/tools/testing/selftests/seccomp/ |
D | seccomp_bpf.c | 1335 ret = ptrace(PTRACE_ATTACH, tracee, NULL, 0); in start_tracer() 2910 ASSERT_EQ(0, ptrace(PTRACE_ATTACH, pid)); in TEST()
|