Home
last modified time | relevance | path

Searched refs:ptrace_may_access (Results 1 – 18 of 18) sorted by relevance

/openbmc/linux/fs/proc/
H A Dnamespaces.c58 if (!ptrace_may_access(task, PTRACE_MODE_READ_FSCREDS)) in proc_ns_get_link()
83 if (ptrace_may_access(task, PTRACE_MODE_READ_FSCREDS)) { in proc_ns_readlink()
H A Dbase.c427 if (!ptrace_may_access(task, PTRACE_MODE_READ_FSCREDS)) in proc_pid_wchan()
447 if (!ptrace_may_access(task, PTRACE_MODE_ATTACH_FSCREDS)) { in lock_trace()
718 allowed = ptrace_may_access(task, PTRACE_MODE_READ_FSCREDS); in proc_fd_access_allowed()
755 return ptrace_may_access(task, PTRACE_MODE_READ_FSCREDS); in has_pid_permissions()
761 return ptrace_may_access(task, PTRACE_MODE_READ_FSCREDS); in has_pid_permissions()
2362 if (!ptrace_may_access(task, PTRACE_MODE_READ_FSCREDS)) in proc_map_files_lookup()
2422 if (!ptrace_may_access(task, PTRACE_MODE_READ_FSCREDS)) in proc_map_files_readdir()
3046 if (!ptrace_may_access(task, PTRACE_MODE_READ_FSCREDS)) { in do_io_accounting()
H A Dfd.c96 allowed = ptrace_may_access(task, PTRACE_MODE_READ_FSCREDS); in proc_fdinfo_permission()
H A Darray.c490 permitted = ptrace_may_access(task, PTRACE_MODE_READ_FSCREDS | PTRACE_MODE_NOAUDIT); in do_task_stat()
/openbmc/linux/kernel/
H A Dkcmp.c163 if (!ptrace_may_access(task1, PTRACE_MODE_READ_REALCREDS) || in SYSCALL_DEFINE5()
164 !ptrace_may_access(task2, PTRACE_MODE_READ_REALCREDS)) { in SYSCALL_DEFINE5()
H A Dnsproxy.c392 if (!ptrace_may_access(tsk, PTRACE_MODE_READ_REALCREDS)) { in validate_nsset()
H A Dpid.c678 if (ptrace_may_access(task, PTRACE_MODE_ATTACH_REALCREDS)) in __pidfd_fget()
H A Dptrace.c360 bool ptrace_may_access(struct task_struct *task, unsigned int mode) in ptrace_may_access() function
H A Dfork.c1562 !ptrace_may_access(task, mode)) { in mm_access()
/openbmc/linux/kernel/sched/
H A Dcore_sched.c165 if (!ptrace_may_access(task, PTRACE_MODE_READ_REALCREDS)) { in sched_core_share_pid()
219 if (!ptrace_may_access(p, PTRACE_MODE_READ_REALCREDS)) { in sched_core_share_pid()
/openbmc/linux/kernel/futex/
H A Dsyscalls.c69 if (!ptrace_may_access(p, PTRACE_MODE_READ_REALCREDS)) in SYSCALL_DEFINE3()
341 if (!ptrace_may_access(p, PTRACE_MODE_READ_REALCREDS)) in COMPAT_SYSCALL_DEFINE3()
/openbmc/linux/include/linux/
H A Dptrace.h88 extern bool ptrace_may_access(struct task_struct *task, unsigned int mode);
/openbmc/linux/mm/
H A Dmigrate.c2399 if (!ptrace_may_access(task, PTRACE_MODE_READ_REALCREDS)) { in find_mm_struct()
H A Dmempolicy.c1634 if (!ptrace_may_access(task, PTRACE_MODE_READ_REALCREDS)) { in kernel_migrate_pages()
/openbmc/linux/Documentation/process/
H A Dadding-syscalls.rst165 ``ptrace_may_access()``) so that only a calling process with the same
/openbmc/linux/Documentation/translations/sp_SP/process/
H A Dadding-syscalls.rst187 a ``ptrace_may_access()``) de forma que el único proceso con los mismos
/openbmc/linux/Documentation/translations/it_IT/process/
H A Dadding-syscalls.rst183 la chiamata ``ptrace_may_access()``) di modo che solo un processo chiamante
/openbmc/linux/kernel/events/
H A Dcore.c12442 return is_capable || ptrace_may_access(task, ptrace_mode); in perf_check_permission()