CAP_SYS_PTRACE
if ((features & UFFD_FEATURE_EVENT_FORK) && !capable(CAP_SYS_PTRACE))
if (capable(CAP_SYS_PTRACE))
ret = security_capable(cred, ns, CAP_SYS_PTRACE,
return ns_capable_noaudit(ns, CAP_SYS_PTRACE);
return ns_capable(ns, CAP_SYS_PTRACE);
ad->error = aa_capable(cred, &tracer->label, CAP_SYS_PTRACE,
if (ns_capable(child_cred->user_ns, CAP_SYS_PTRACE))
if (has_ns_capability(parent, child_cred->user_ns, CAP_SYS_PTRACE))
else if (smack_privileged_cred(CAP_SYS_PTRACE, tracercred))
!ns_capable(__task_cred(child)->user_ns, CAP_SYS_PTRACE))
if (!ns_capable(__task_cred(child)->user_ns, CAP_SYS_PTRACE))
if (!has_ns_capability(parent, current_user_ns(), CAP_SYS_PTRACE))
if (write && !capable(CAP_SYS_PTRACE))