Searched refs:PTRACE_ATTACH (Results 1 – 10 of 10) sorted by relevance
| /Linux-v5.4/Documentation/admin-guide/LSM/ |
| D | Yama.rst | 39 other process (and its descendants) are allowed to call ``PTRACE_ATTACH`` 51 a process can ``PTRACE_ATTACH`` to any other 59 with the inferior it wants to call ``PTRACE_ATTACH`` on. By default, 63 an allowed debugger PID to call ``PTRACE_ATTACH`` on the inferior. 68 ``PTRACE_ATTACH`` or through children calling ``PTRACE_TRACEME``. 71 no processes may use ptrace with ``PTRACE_ATTACH`` nor via
|
| D | Smack.rst | 294 object. For the ``PTRACE_ATTACH`` a read-write access is required. 297 this is the policy that limits ``PTRACE_ATTACH``. Attach is
|
| /Linux-v5.4/include/uapi/linux/ |
| D | ptrace.h | 22 #define PTRACE_ATTACH 16 macro
|
| /Linux-v5.4/tools/testing/selftests/x86/ |
| D | mov_ss_trap.c | 74 if (ptrace(PTRACE_ATTACH, parent, NULL, NULL) != 0) in enable_watchpoint()
|
| D | protection_keys.c | 1259 ret = ptrace(PTRACE_ATTACH, child_pid, ignored, ignored); in test_ptrace_of_child()
|
| /Linux-v5.4/tools/testing/selftests/ptrace/ |
| D | peeksiginfo.c | 188 if (sys_ptrace(PTRACE_ATTACH, child, NULL, NULL) == -1) in main()
|
| /Linux-v5.4/kernel/ |
| D | ptrace.c | 456 proc_ptrace_connector(task, PTRACE_ATTACH); in ptrace_attach() 1256 if (request == PTRACE_ATTACH || request == PTRACE_SEIZE) { in SYSCALL_DEFINE4() 1401 if (request == PTRACE_ATTACH || request == PTRACE_SEIZE) { in COMPAT_SYSCALL_DEFINE4()
|
| /Linux-v5.4/drivers/connector/ |
| D | cn_proc.c | 194 if (ptrace_id == PTRACE_ATTACH) { in proc_ptrace_connector()
|
| /Linux-v5.4/tools/testing/selftests/powerpc/ptrace/ |
| D | ptrace.h | 64 ret = ptrace(PTRACE_ATTACH, child, NULL, NULL); in start_trace()
|
| /Linux-v5.4/tools/testing/selftests/seccomp/ |
| D | seccomp_bpf.c | 1385 ret = ptrace(PTRACE_ATTACH, tracee, NULL, 0); in start_tracer() 3036 ASSERT_EQ(0, ptrace(PTRACE_ATTACH, pid)); in TEST()
|