Home
last modified time | relevance | path

Searched refs:PTRACE_ATTACH (Results 1 – 7 of 7) sorted by relevance

/linux-4.4.14/Documentation/security/
DYama.txt38 other process (and its descendants) are allowed to call PTRACE_ATTACH
49 0 - classic ptrace permissions: a process can PTRACE_ATTACH to any other
56 with the inferior it wants to call PTRACE_ATTACH on. By default,
60 an allowed debugger PID to call PTRACE_ATTACH on the inferior.
64 with PTRACE_ATTACH, or through children calling PTRACE_TRACEME.
66 3 - no attach: no processes may use ptrace with PTRACE_ATTACH nor via
DSmack.txt242 object. For the PTRACE_ATTACH a read-write access is required.
243 1 - exact: this is the policy that limits PTRACE_ATTACH. Attach is
/linux-4.4.14/include/uapi/linux/
Dptrace.h21 #define PTRACE_ATTACH 16 macro
/linux-4.4.14/tools/testing/selftests/ptrace/
Dpeeksiginfo.c187 if (sys_ptrace(PTRACE_ATTACH, child, NULL, NULL) == -1) in main()
/linux-4.4.14/kernel/
Dptrace.c392 proc_ptrace_connector(task, PTRACE_ATTACH); in ptrace_attach()
1092 if (request == PTRACE_ATTACH || request == PTRACE_SEIZE) { in SYSCALL_DEFINE4()
1236 if (request == PTRACE_ATTACH || request == PTRACE_SEIZE) { in COMPAT_SYSCALL_DEFINE4()
/linux-4.4.14/drivers/connector/
Dcn_proc.c205 if (ptrace_id == PTRACE_ATTACH) { in proc_ptrace_connector()
/linux-4.4.14/tools/testing/selftests/seccomp/
Dseccomp_bpf.c1038 ret = ptrace(PTRACE_ATTACH, tracee, NULL, 0); in tracer()