Searched refs:ptrace_may_access (Results 1 – 18 of 18) sorted by relevance
/openbmc/linux/fs/proc/ |
H A D | namespaces.c | 58 if (!ptrace_may_access(task, PTRACE_MODE_READ_FSCREDS)) in proc_ns_get_link() 83 if (ptrace_may_access(task, PTRACE_MODE_READ_FSCREDS)) { in proc_ns_readlink()
|
H A D | base.c | 427 if (!ptrace_may_access(task, PTRACE_MODE_READ_FSCREDS)) in proc_pid_wchan() 447 if (!ptrace_may_access(task, PTRACE_MODE_ATTACH_FSCREDS)) { in lock_trace() 718 allowed = ptrace_may_access(task, PTRACE_MODE_READ_FSCREDS); in proc_fd_access_allowed() 755 return ptrace_may_access(task, PTRACE_MODE_READ_FSCREDS); in has_pid_permissions() 761 return ptrace_may_access(task, PTRACE_MODE_READ_FSCREDS); in has_pid_permissions() 2362 if (!ptrace_may_access(task, PTRACE_MODE_READ_FSCREDS)) in proc_map_files_lookup() 2422 if (!ptrace_may_access(task, PTRACE_MODE_READ_FSCREDS)) in proc_map_files_readdir() 3046 if (!ptrace_may_access(task, PTRACE_MODE_READ_FSCREDS)) { in do_io_accounting()
|
H A D | fd.c | 96 allowed = ptrace_may_access(task, PTRACE_MODE_READ_FSCREDS); in proc_fdinfo_permission()
|
H A D | array.c | 490 permitted = ptrace_may_access(task, PTRACE_MODE_READ_FSCREDS | PTRACE_MODE_NOAUDIT); in do_task_stat()
|
/openbmc/linux/kernel/ |
H A D | kcmp.c | 163 if (!ptrace_may_access(task1, PTRACE_MODE_READ_REALCREDS) || in SYSCALL_DEFINE5() 164 !ptrace_may_access(task2, PTRACE_MODE_READ_REALCREDS)) { in SYSCALL_DEFINE5()
|
H A D | nsproxy.c | 392 if (!ptrace_may_access(tsk, PTRACE_MODE_READ_REALCREDS)) { in validate_nsset()
|
H A D | pid.c | 678 if (ptrace_may_access(task, PTRACE_MODE_ATTACH_REALCREDS)) in __pidfd_fget()
|
H A D | ptrace.c | 360 bool ptrace_may_access(struct task_struct *task, unsigned int mode) in ptrace_may_access() function
|
H A D | fork.c | 1562 !ptrace_may_access(task, mode)) { in mm_access()
|
/openbmc/linux/kernel/sched/ |
H A D | core_sched.c | 165 if (!ptrace_may_access(task, PTRACE_MODE_READ_REALCREDS)) { in sched_core_share_pid() 219 if (!ptrace_may_access(p, PTRACE_MODE_READ_REALCREDS)) { in sched_core_share_pid()
|
/openbmc/linux/kernel/futex/ |
H A D | syscalls.c | 69 if (!ptrace_may_access(p, PTRACE_MODE_READ_REALCREDS)) in SYSCALL_DEFINE3() 341 if (!ptrace_may_access(p, PTRACE_MODE_READ_REALCREDS)) in COMPAT_SYSCALL_DEFINE3()
|
/openbmc/linux/include/linux/ |
H A D | ptrace.h | 88 extern bool ptrace_may_access(struct task_struct *task, unsigned int mode);
|
/openbmc/linux/mm/ |
H A D | migrate.c | 2399 if (!ptrace_may_access(task, PTRACE_MODE_READ_REALCREDS)) { in find_mm_struct()
|
H A D | mempolicy.c | 1634 if (!ptrace_may_access(task, PTRACE_MODE_READ_REALCREDS)) { in kernel_migrate_pages()
|
/openbmc/linux/Documentation/process/ |
H A D | adding-syscalls.rst | 165 ``ptrace_may_access()``) so that only a calling process with the same
|
/openbmc/linux/Documentation/translations/sp_SP/process/ |
H A D | adding-syscalls.rst | 187 a ``ptrace_may_access()``) de forma que el único proceso con los mismos
|
/openbmc/linux/Documentation/translations/it_IT/process/ |
H A D | adding-syscalls.rst | 183 la chiamata ``ptrace_may_access()``) di modo che solo un processo chiamante
|
/openbmc/linux/kernel/events/ |
H A D | core.c | 12442 return is_capable || ptrace_may_access(task, ptrace_mode); in perf_check_permission()
|