CAP_SYS_PTRACE   2336 arch/ia64/kernel/perfmon.c 	       || (!gid_eq(gid, tcred->gid))) && !capable(CAP_SYS_PTRACE);
CAP_SYS_PTRACE   1841 fs/userfaultfd.c 	if ((features & UFFD_FEATURE_EVENT_FORK) && !capable(CAP_SYS_PTRACE))
CAP_SYS_PTRACE   1950 fs/userfaultfd.c 	if (!sysctl_unprivileged_userfaultfd && !capable(CAP_SYS_PTRACE))
CAP_SYS_PTRACE    526 kernel/capability.c 		ret = security_capable(cred, ns, CAP_SYS_PTRACE,
CAP_SYS_PTRACE    273 kernel/ptrace.c 		ret = security_capable(cred, ns, CAP_SYS_PTRACE, CAP_OPT_NOAUDIT);
CAP_SYS_PTRACE    275 kernel/ptrace.c 		ret = security_capable(cred, ns, CAP_SYS_PTRACE, CAP_OPT_NONE);
CAP_SYS_PTRACE    106 security/apparmor/ipc.c 	aad(sa)->error = aa_capable(&tracer->label, CAP_SYS_PTRACE,
CAP_SYS_PTRACE    149 security/commoncap.c 	if (ns_capable(child_cred->user_ns, CAP_SYS_PTRACE))
CAP_SYS_PTRACE    181 security/commoncap.c 	if (has_ns_capability(parent, child_cred->user_ns, CAP_SYS_PTRACE))
CAP_SYS_PTRACE    445 security/smack/smack_lsm.c 		else if (smack_privileged_cred(CAP_SYS_PTRACE, tracercred))
CAP_SYS_PTRACE    371 security/yama/yama_lsm.c 			    !ns_capable(__task_cred(child)->user_ns, CAP_SYS_PTRACE))
CAP_SYS_PTRACE    377 security/yama/yama_lsm.c 			if (!ns_capable(__task_cred(child)->user_ns, CAP_SYS_PTRACE))
CAP_SYS_PTRACE    407 security/yama/yama_lsm.c 		if (!has_ns_capability(parent, current_user_ns(), CAP_SYS_PTRACE))
CAP_SYS_PTRACE    437 security/yama/yama_lsm.c 	if (write && !capable(CAP_SYS_PTRACE))