Searched refs:CAP_SYS_PTRACE (Results 1 – 12 of 12) sorted by relevance
| /Linux-v5.4/security/yama/ |
| D | yama_lsm.c | 371 !ns_capable(__task_cred(child)->user_ns, CAP_SYS_PTRACE)) in yama_ptrace_access_check() 377 if (!ns_capable(__task_cred(child)->user_ns, CAP_SYS_PTRACE)) in yama_ptrace_access_check() 407 if (!has_ns_capability(parent, current_user_ns(), CAP_SYS_PTRACE)) in yama_ptrace_traceme() 437 if (write && !capable(CAP_SYS_PTRACE)) in yama_dointvec_minmax()
|
| /Linux-v5.4/Documentation/admin-guide/LSM/ |
| D | Yama.rst | 33 work), or with ``CAP_SYS_PTRACE`` (i.e. "gdb --pid=PID", and "strace -p PID" 48 The sysctl settings (writable only with ``CAP_SYS_PTRACE``) are: 67 only processes with ``CAP_SYS_PTRACE`` may use ptrace, either with
|
| D | Smack.rst | 299 ``PTRACE_READ`` is not affected. Can be overridden with ``CAP_SYS_PTRACE``. 303 exception that it can't be overridden with ``CAP_SYS_PTRACE``.
|
| /Linux-v5.4/include/uapi/linux/ |
| D | capability.h | 235 #define CAP_SYS_PTRACE 19 macro
|
| /Linux-v5.4/security/apparmor/ |
| D | ipc.c | 106 aad(sa)->error = aa_capable(&tracer->label, CAP_SYS_PTRACE, in profile_tracer_perm()
|
| /Linux-v5.4/kernel/ |
| D | capability.c | 526 ret = security_capable(cred, ns, CAP_SYS_PTRACE, in ptracer_capable()
|
| D | ptrace.c | 270 return has_ns_capability_noaudit(current, ns, CAP_SYS_PTRACE); in ptrace_has_cap() 272 return has_ns_capability(current, ns, CAP_SYS_PTRACE); in ptrace_has_cap()
|
| /Linux-v5.4/security/ |
| D | commoncap.c | 149 if (ns_capable(child_cred->user_ns, CAP_SYS_PTRACE)) in cap_ptrace_access_check() 181 if (has_ns_capability(parent, child_cred->user_ns, CAP_SYS_PTRACE)) in cap_ptrace_traceme()
|
| /Linux-v5.4/Documentation/admin-guide/ |
| D | perf-security.rst | 76 processes provided with CAP_SYS_PTRACE capability are effectively
|
| /Linux-v5.4/fs/ |
| D | userfaultfd.c | 1946 if (!sysctl_unprivileged_userfaultfd && !capable(CAP_SYS_PTRACE)) in SYSCALL_DEFINE1()
|
| /Linux-v5.4/security/smack/ |
| D | smack_lsm.c | 447 else if (smack_privileged_cred(CAP_SYS_PTRACE, tracercred)) in smk_ptrace_rule_check()
|
| /Linux-v5.4/arch/ia64/kernel/ |
| D | perfmon.c | 2336 || (!gid_eq(gid, tcred->gid))) && !capable(CAP_SYS_PTRACE); in pfm_bad_permissions()
|