| Function report | 
| Source Code: security\yama\yama_lsm.c | Create Date:2022-07-28 19:55:12 | 
| Last Modify:2020-03-12 14:18:49 | Copyright©Brick | 
| home page | Tree | 
| Annotation kernel can get tool activity | Download SCCT | Chinese | 
Name:yama_ptrace_access_check - validate PTRACE_ATTACH calls*@child: task that current task is attempting to ptrace*@mode: ptrace attach mode* Returns 0 if following the ptrace is allowed, -ve on error.
Proto:static int yama_ptrace_access_check(struct task_struct *child, unsigned int mode)
Type:int
Parameter:
| Type | Parameter | Name | 
|---|---|---|
| struct task_struct * | child | |
| unsigned int | mode | 
| 357 | rc = 0 | 
| 360 | If mode & PTRACE_MODE_ATTACH Then | 
| 362 | Case ptrace_scope == YAMA_SCOPE_DISABLED | 
| 364 | Break | 
| 365 | Case ptrace_scope == YAMA_SCOPE_RELATIONAL | 
| 374 | Break | 
| 375 | Case ptrace_scope == YAMA_SCOPE_CAPABILITY | 
| 377 | If Not ns_capable(user_ns, Allow ptrace() of any process ) Then rc = -EPERM | 
| 380 | Break | 
| 381 | Case ptrace_scope == YAMA_SCOPE_NO_ATTACH | 
| 382 | Default | 
| 388 | If rc && (mode & PTRACE_MODE_NOAUDIT) == 0 Then defers execution because cmdline access can sleep | 
| 391 | Return rc | 
| Source code conversion tool public plug-in interface | X | 
|---|---|
| Support c/c++/esqlc/java Oracle/Informix/Mysql Plug-in can realize: logical Report Code generation and batch code conversion |