Searched refs:ptrace_may_access (Results 1 – 16 of 16) sorted by relevance
/linux/fs/proc/ |
H A D | namespaces.c | 58 if (!ptrace_may_access(task, PTRACE_MODE_READ_FSCREDS)) in proc_ns_get_link() 83 if (ptrace_may_access(task, PTRACE_MODE_READ_FSCREDS)) { in proc_ns_readlink()
|
H A D | fd.c | 94 allowed = ptrace_may_access(task, PTRACE_MODE_READ_FSCREDS); in proc_fdinfo_permission()
|
H A D | array.c | 490 permitted = ptrace_may_access(task, PTRACE_MODE_READ_FSCREDS | PTRACE_MODE_NOAUDIT); in do_task_stat()
|
/linux/kernel/sched/ |
H A D | core_sched.c | 165 if (!ptrace_may_access(task, PTRACE_MODE_READ_REALCREDS)) { in sched_core_share_pid() 219 if (!ptrace_may_access(p, PTRACE_MODE_READ_REALCREDS)) { in sched_core_share_pid()
|
/linux/kernel/futex/ |
H A D | syscalls.c | 68 if (!ptrace_may_access(p, PTRACE_MODE_READ_REALCREDS)) in SYSCALL_DEFINE3() 474 if (!ptrace_may_access(p, PTRACE_MODE_READ_REALCREDS)) in COMPAT_SYSCALL_DEFINE3()
|
/linux/include/linux/ |
H A D | ptrace.h | 88 extern bool ptrace_may_access(struct task_struct *task, unsigned int mode);
|
/linux/kernel/ |
H A D | nsproxy.c | 392 if (!ptrace_may_access(tsk, PTRACE_MODE_READ_REALCREDS)) { in validate_nsset()
|
H A D | pid.c | 677 if (ptrace_may_access(task, PTRACE_MODE_ATTACH_REALCREDS)) in __pidfd_fget()
|
H A D | ptrace.c | 349 bool ptrace_may_access(struct task_struct *task, unsigned int mode) in ptrace_may_access() function
|
H A D | fork.c | 1565 } else if (mm != current->mm && !ptrace_may_access(task, mode)) { in mm_access()
|
/linux/mm/ |
H A D | migrate.c | 2513 if (!ptrace_may_access(task, PTRACE_MODE_READ_REALCREDS)) { in find_mm_struct()
|
H A D | mempolicy.c | 1682 if (!ptrace_may_access(task, PTRACE_MODE_READ_REALCREDS)) { in kernel_migrate_pages()
|
/linux/Documentation/process/ |
H A D | adding-syscalls.rst | 165 ``ptrace_may_access()``) so that only a calling process with the same
|
/linux/Documentation/translations/it_IT/process/ |
H A D | adding-syscalls.rst | 183 la chiamata ``ptrace_may_access()``) di modo che solo un processo chiamante
|
/linux/Documentation/translations/sp_SP/process/ |
H A D | adding-syscalls.rst | 187 a ``ptrace_may_access()``) de forma que el único proceso con los mismos
|
/linux/kernel/events/ |
H A D | core.c | 12709 return is_capable || ptrace_may_access(task, ptrace_mode); in perf_check_permission()
|