CAP_SYS_PTRACE 2336 arch/ia64/kernel/perfmon.c || (!gid_eq(gid, tcred->gid))) && !capable(CAP_SYS_PTRACE); CAP_SYS_PTRACE 1841 fs/userfaultfd.c if ((features & UFFD_FEATURE_EVENT_FORK) && !capable(CAP_SYS_PTRACE)) CAP_SYS_PTRACE 1950 fs/userfaultfd.c if (!sysctl_unprivileged_userfaultfd && !capable(CAP_SYS_PTRACE)) CAP_SYS_PTRACE 526 kernel/capability.c ret = security_capable(cred, ns, CAP_SYS_PTRACE, CAP_SYS_PTRACE 273 kernel/ptrace.c ret = security_capable(cred, ns, CAP_SYS_PTRACE, CAP_OPT_NOAUDIT); CAP_SYS_PTRACE 275 kernel/ptrace.c ret = security_capable(cred, ns, CAP_SYS_PTRACE, CAP_OPT_NONE); CAP_SYS_PTRACE 106 security/apparmor/ipc.c aad(sa)->error = aa_capable(&tracer->label, CAP_SYS_PTRACE, CAP_SYS_PTRACE 149 security/commoncap.c if (ns_capable(child_cred->user_ns, CAP_SYS_PTRACE)) CAP_SYS_PTRACE 181 security/commoncap.c if (has_ns_capability(parent, child_cred->user_ns, CAP_SYS_PTRACE)) CAP_SYS_PTRACE 445 security/smack/smack_lsm.c else if (smack_privileged_cred(CAP_SYS_PTRACE, tracercred)) CAP_SYS_PTRACE 371 security/yama/yama_lsm.c !ns_capable(__task_cred(child)->user_ns, CAP_SYS_PTRACE)) CAP_SYS_PTRACE 377 security/yama/yama_lsm.c if (!ns_capable(__task_cred(child)->user_ns, CAP_SYS_PTRACE)) CAP_SYS_PTRACE 407 security/yama/yama_lsm.c if (!has_ns_capability(parent, current_user_ns(), CAP_SYS_PTRACE)) CAP_SYS_PTRACE 437 security/yama/yama_lsm.c if (write && !capable(CAP_SYS_PTRACE))