Searched refs:ptrace_may_access (Results 1 – 11 of 11) sorted by relevance
/linux-4.4.14/kernel/ |
D | kcmp.c | 125 if (!ptrace_may_access(task1, PTRACE_MODE_READ_REALCREDS) || in SYSCALL_DEFINE5() 126 !ptrace_may_access(task2, PTRACE_MODE_READ_REALCREDS)) { in SYSCALL_DEFINE5()
|
D | futex_compat.c | 158 if (!ptrace_may_access(p, PTRACE_MODE_READ_REALCREDS)) in COMPAT_SYSCALL_DEFINE3()
|
D | ptrace.c | 287 bool ptrace_may_access(struct task_struct *task, unsigned int mode) in ptrace_may_access() function
|
D | fork.c | 803 !ptrace_may_access(task, mode)) { in mm_access()
|
D | futex.c | 2908 if (!ptrace_may_access(p, PTRACE_MODE_READ_REALCREDS)) in SYSCALL_DEFINE3()
|
/linux-4.4.14/fs/proc/ |
D | namespaces.c | 45 if (ptrace_may_access(task, PTRACE_MODE_READ_FSCREDS)) { in proc_ns_follow_link() 66 if (ptrace_may_access(task, PTRACE_MODE_READ_FSCREDS)) { in proc_ns_readlink()
|
D | base.c | 433 if (wchan && ptrace_may_access(task, PTRACE_MODE_READ_FSCREDS) in proc_pid_wchan() 448 if (!ptrace_may_access(task, PTRACE_MODE_ATTACH_FSCREDS)) { in lock_trace() 701 allowed = ptrace_may_access(task, PTRACE_MODE_READ_FSCREDS); in proc_fd_access_allowed() 736 return ptrace_may_access(task, PTRACE_MODE_READ_FSCREDS); in has_pid_permissions() 2012 if (!ptrace_may_access(task, PTRACE_MODE_READ_FSCREDS)) in proc_map_files_lookup() 2065 if (!ptrace_may_access(task, PTRACE_MODE_READ_FSCREDS)) in proc_map_files_readdir() 2535 if (!ptrace_may_access(task, PTRACE_MODE_READ_FSCREDS)) { in do_io_accounting()
|
D | array.c | 398 permitted = ptrace_may_access(task, PTRACE_MODE_READ_FSCREDS | PTRACE_MODE_NOAUDIT); in do_task_stat()
|
/linux-4.4.14/include/linux/ |
D | ptrace.h | 83 extern bool ptrace_may_access(struct task_struct *task, unsigned int mode);
|
/linux-4.4.14/Documentation/ |
D | adding-syscalls.txt | 155 process, it should be restricted (using a call to ptrace_may_access()) so that
|
/linux-4.4.14/kernel/events/ |
D | core.c | 8336 if (!ptrace_may_access(task, PTRACE_MODE_READ_REALCREDS)) in SYSCALL_DEFINE5()
|