Home
last modified time | relevance | path

Searched refs:CAP_SYS_PTRACE (Results 1 – 10 of 10) sorted by relevance

/Linux-v4.19/security/yama/
Dyama_lsm.c373 !ns_capable(__task_cred(child)->user_ns, CAP_SYS_PTRACE)) in yama_ptrace_access_check()
379 if (!ns_capable(__task_cred(child)->user_ns, CAP_SYS_PTRACE)) in yama_ptrace_access_check()
409 if (!has_ns_capability(parent, current_user_ns(), CAP_SYS_PTRACE)) in yama_ptrace_traceme()
439 if (write && !capable(CAP_SYS_PTRACE)) in yama_dointvec_minmax()
/Linux-v4.19/Documentation/admin-guide/LSM/
DYama.rst33 work), or with ``CAP_SYS_PTRACE`` (i.e. "gdb --pid=PID", and "strace -p PID"
48 The sysctl settings (writable only with ``CAP_SYS_PTRACE``) are:
67 only processes with ``CAP_SYS_PTRACE`` may use ptrace
DSmack.rst299 ``PTRACE_READ`` is not affected. Can be overridden with ``CAP_SYS_PTRACE``.
303 exception that it can't be overridden with ``CAP_SYS_PTRACE``.
/Linux-v4.19/include/uapi/linux/
Dcapability.h235 #define CAP_SYS_PTRACE 19 macro
/Linux-v4.19/security/apparmor/
Dipc.c110 aad(sa)->error = aa_capable(&tracer->label, CAP_SYS_PTRACE, 1); in profile_tracer_perm()
/Linux-v4.19/kernel/
Dcapability.c506 ret = security_capable_noaudit(cred, ns, CAP_SYS_PTRACE); in ptracer_capable()
Dptrace.c265 return has_ns_capability_noaudit(current, ns, CAP_SYS_PTRACE); in ptrace_has_cap()
267 return has_ns_capability(current, ns, CAP_SYS_PTRACE); in ptrace_has_cap()
/Linux-v4.19/security/
Dcommoncap.c155 if (ns_capable(child_cred->user_ns, CAP_SYS_PTRACE)) in cap_ptrace_access_check()
187 if (has_ns_capability(parent, child_cred->user_ns, CAP_SYS_PTRACE)) in cap_ptrace_traceme()
/Linux-v4.19/security/smack/
Dsmack_lsm.c442 else if (capable(CAP_SYS_PTRACE)) in smk_ptrace_rule_check()
/Linux-v4.19/arch/ia64/kernel/
Dperfmon.c2383 || (!gid_eq(gid, tcred->gid))) && !capable(CAP_SYS_PTRACE); in pfm_bad_permissions()