Searched refs:CAP_SYS_PTRACE (Results 1 – 9 of 9) sorted by relevance
/linux-4.1.27/security/yama/ |
D | yama_lsm.c | 304 !ns_capable(__task_cred(child)->user_ns, CAP_SYS_PTRACE)) in yama_ptrace_access_check() 310 if (!ns_capable(__task_cred(child)->user_ns, CAP_SYS_PTRACE)) in yama_ptrace_access_check() 350 if (!has_ns_capability(parent, current_user_ns(), CAP_SYS_PTRACE)) in yama_ptrace_traceme() 384 if (write && !capable(CAP_SYS_PTRACE)) in yama_dointvec_minmax()
|
/linux-4.1.27/Documentation/security/ |
D | Yama.txt | 34 work), or with CAP_SYS_PTRACE (i.e. "gdb --pid=PID", and "strace -p PID" 49 The sysctl settings (writable only with CAP_SYS_PTRACE) are: 65 2 - admin-only attach: only processes with CAP_SYS_PTRACE may use ptrace
|
D | Smack.txt | 221 PTRACE_READ is not affected. Can be overridden with CAP_SYS_PTRACE. 223 exception that it can't be overridden with CAP_SYS_PTRACE.
|
/linux-4.1.27/security/apparmor/ |
D | ipc.c | 74 return aa_capable(tracer, CAP_SYS_PTRACE, 1); in aa_may_ptrace()
|
/linux-4.1.27/include/uapi/linux/ |
D | capability.h | 220 #define CAP_SYS_PTRACE 19 macro
|
/linux-4.1.27/kernel/ |
D | ptrace.c | 213 return has_ns_capability_noaudit(current, ns, CAP_SYS_PTRACE); in ptrace_has_cap() 215 return has_ns_capability(current, ns, CAP_SYS_PTRACE); in ptrace_has_cap() 347 if (ns_capable(__task_cred(task)->user_ns, CAP_SYS_PTRACE)) in ptrace_attach()
|
/linux-4.1.27/security/ |
D | commoncap.c | 157 if (ns_capable(child_cred->user_ns, CAP_SYS_PTRACE)) in cap_ptrace_access_check() 189 if (has_ns_capability(parent, child_cred->user_ns, CAP_SYS_PTRACE)) in cap_ptrace_traceme()
|
/linux-4.1.27/security/smack/ |
D | smack_lsm.c | 400 else if (capable(CAP_SYS_PTRACE)) in smk_ptrace_rule_check()
|
/linux-4.1.27/arch/ia64/kernel/ |
D | perfmon.c | 2384 || (!gid_eq(gid, tcred->gid))) && !capable(CAP_SYS_PTRACE); in pfm_bad_permissions()
|