| /OK3568_Linux_fs/kernel/Documentation/admin-guide/LSM/ |
| H A D | Yama.rst | 40 other process (and its descendants) are allowed to call ``PTRACE_ATTACH`` 52 a process can ``PTRACE_ATTACH`` to any other 60 with the inferior it wants to call ``PTRACE_ATTACH`` on. By default, 64 an allowed debugger PID to call ``PTRACE_ATTACH`` on the inferior. 69 ``PTRACE_ATTACH`` or through children calling ``PTRACE_TRACEME``. 72 no processes may use ptrace with ``PTRACE_ATTACH`` nor via
|
| H A D | Smack.rst | 294 object. For the ``PTRACE_ATTACH`` a read-write access is required. 297 this is the policy that limits ``PTRACE_ATTACH``. Attach is
|
| /OK3568_Linux_fs/prebuilts/gcc/linux-x86/aarch64/gcc-arm-10.3-2021.07-x86_64-aarch64-none-linux-gnu/aarch64-none-linux-gnu/libc/usr/include/sys/ |
| H A D | ptrace.h | 74 PTRACE_ATTACH = 16, enumerator 75 #define PT_ATTACH PTRACE_ATTACH
|
| /OK3568_Linux_fs/prebuilts/gcc/linux-x86/arm/gcc-arm-10.3-2021.07-x86_64-arm-none-linux-gnueabihf/arm-none-linux-gnueabihf/libc/usr/include/sys/ |
| H A D | ptrace.h | 90 PTRACE_ATTACH = 16, enumerator 91 #define PT_ATTACH PTRACE_ATTACH
|
| /OK3568_Linux_fs/kernel/tools/testing/selftests/ptrace/ |
| H A D | vmaccess.c | 59 k = ptrace(PTRACE_ATTACH, pid, 0L, 0L); in TEST() 69 k = ptrace(PTRACE_ATTACH, pid, 0L, 0L); in TEST()
|
| H A D | peeksiginfo.c | 188 if (sys_ptrace(PTRACE_ATTACH, child, NULL, NULL) == -1) in main()
|
| /OK3568_Linux_fs/prebuilts/gcc/linux-x86/arm/gcc-arm-10.3-2021.07-x86_64-arm-none-linux-gnueabihf/arm-none-linux-gnueabihf/libc/usr/include/linux/ |
| H A D | ptrace.h | 22 #define PTRACE_ATTACH 16 macro
|
| /OK3568_Linux_fs/prebuilts/gcc/linux-x86/aarch64/gcc-arm-10.3-2021.07-x86_64-aarch64-none-linux-gnu/aarch64-none-linux-gnu/libc/usr/include/linux/ |
| H A D | ptrace.h | 22 #define PTRACE_ATTACH 16 macro
|
| /OK3568_Linux_fs/kernel/include/uapi/linux/ |
| H A D | ptrace.h | 22 #define PTRACE_ATTACH 16 macro
|
| /OK3568_Linux_fs/kernel/tools/testing/selftests/x86/ |
| H A D | mov_ss_trap.c | 74 if (ptrace(PTRACE_ATTACH, parent, NULL, NULL) != 0) in enable_watchpoint()
|
| /OK3568_Linux_fs/kernel/kernel/ |
| H A D | ptrace.c | 499 proc_ptrace_connector(task, PTRACE_ATTACH); in ptrace_attach() 1287 if (request == PTRACE_ATTACH || request == PTRACE_SEIZE) { in SYSCALL_DEFINE4() 1432 if (request == PTRACE_ATTACH || request == PTRACE_SEIZE) { in COMPAT_SYSCALL_DEFINE4()
|
| /OK3568_Linux_fs/kernel/drivers/connector/ |
| H A D | cn_proc.c | 201 if (ptrace_id == PTRACE_ATTACH) { in proc_ptrace_connector()
|
| /OK3568_Linux_fs/kernel/tools/testing/selftests/powerpc/ptrace/ |
| H A D | ptrace.h | 64 ret = ptrace(PTRACE_ATTACH, child, NULL, NULL); in start_trace()
|
| /OK3568_Linux_fs/kernel/tools/testing/selftests/vm/ |
| H A D | protection_keys.c | 1331 ret = ptrace(PTRACE_ATTACH, child_pid, ignored, ignored); in test_ptrace_of_child()
|
| /OK3568_Linux_fs/kernel/tools/testing/selftests/seccomp/ |
| H A D | seccomp_bpf.c | 1510 ret = ptrace(PTRACE_ATTACH, tracee, NULL, 0); in start_tracer() 3243 ASSERT_EQ(0, ptrace(PTRACE_ATTACH, pid)); in TEST()
|