Home
last modified time | relevance | path

Searched refs:CAP_SYS_PTRACE (Results 1 – 14 of 14) sorted by relevance

/openbmc/linux/security/yama/
H A Dyama_lsm.c371 !ns_capable(__task_cred(child)->user_ns, CAP_SYS_PTRACE)) in yama_ptrace_access_check()
377 if (!ns_capable(__task_cred(child)->user_ns, CAP_SYS_PTRACE)) in yama_ptrace_access_check()
407 if (!has_ns_capability(parent, current_user_ns(), CAP_SYS_PTRACE)) in yama_ptrace_traceme()
437 if (write && !capable(CAP_SYS_PTRACE)) in yama_dointvec_minmax()
/openbmc/linux/Documentation/admin-guide/LSM/
H A DYama.rst34 work), or with ``CAP_SYS_PTRACE`` (i.e. "gdb --pid=PID", and "strace -p PID"
49 The sysctl settings (writable only with ``CAP_SYS_PTRACE``) are:
68 only processes with ``CAP_SYS_PTRACE`` may use ptrace, either with
H A DSmack.rst299 ``PTRACE_READ`` is not affected. Can be overridden with ``CAP_SYS_PTRACE``.
303 exception that it can't be overridden with ``CAP_SYS_PTRACE``.
/openbmc/openbmc/meta-openembedded/meta-oe/recipes-support/colord/colord/
H A D08a32b2379fb5582f4312e59bf51a2823df56276.patch27 …CapabilityBoundingSet=~CAP_SETUID CAP_SETGID CAP_SETPCAP CAP_SYS_ADMIN CAP_SYS_PTRACE CAP_CHOWN CA…
/openbmc/linux/include/uapi/linux/
H A Dcapability.h236 #define CAP_SYS_PTRACE 19 macro
/openbmc/openbmc/meta-ibm/recipes-support/chrony/chrony/huygens/
H A Dchronyd.service18 CapabilityBoundingSet=~CAP_SYS_PTRACE CAP_SYS_RAWIO CAP_SYS_TTY_CONFIG CAP_WAKE_ALARM
/openbmc/linux/security/apparmor/
H A Dtask.c276 ad->error = aa_capable(cred, &tracer->label, CAP_SYS_PTRACE, in profile_tracer_perm()
/openbmc/linux/kernel/
H A Dcapability.c519 ret = security_capable(cred, ns, CAP_SYS_PTRACE, in ptracer_capable()
H A Dptrace.c282 return ns_capable_noaudit(ns, CAP_SYS_PTRACE); in ptrace_has_cap()
283 return ns_capable(ns, CAP_SYS_PTRACE); in ptrace_has_cap()
/openbmc/linux/security/
H A Dcommoncap.c150 if (ns_capable(child_cred->user_ns, CAP_SYS_PTRACE)) in cap_ptrace_access_check()
182 if (has_ns_capability(parent, child_cred->user_ns, CAP_SYS_PTRACE)) in cap_ptrace_traceme()
/openbmc/linux/Documentation/admin-guide/
H A Dperf-security.rst90 So unprivileged processes provided with CAP_SYS_PTRACE capability are
92 CAP_SYS_PTRACE capability is not required and CAP_PERFMON is enough to
/openbmc/linux/Documentation/admin-guide/mm/
H A Duserfaultfd.rst68 process needs the CAP_SYS_PTRACE capability, or the system must have
79 the same time (as e.g. granting CAP_SYS_PTRACE would do). Users who have access
/openbmc/linux/fs/
H A Duserfaultfd.c2056 if ((features & UFFD_FEATURE_EVENT_FORK) && !capable(CAP_SYS_PTRACE)) in userfaultfd_api()
2236 if (capable(CAP_SYS_PTRACE)) in userfaultfd_syscall_allowed()
/openbmc/linux/security/smack/
H A Dsmack_lsm.c455 else if (smack_privileged_cred(CAP_SYS_PTRACE, tracercred)) in smk_ptrace_rule_check()