D7net
Home
Console
Upload
information
Create File
Create Folder
About
Tools
:
/
proc
/
self
/
root
/
usr
/
share
/
doc
/
systemd
/
Filename :
20-yama-ptrace.conf
back
Copy
# The ptrace system call is used for interprocess services, # communication and introspection (like synchronisation, signaling, # debugging, tracing and profiling) of processes. # # Usage of ptrace is restricted by normal user permissions. Normal # unprivileged processes cannot use ptrace on processes that they # cannot send signals to or processes that are running set-uid or # set-gid. Nevertheless, processes running under the same uid will # usually be able to ptrace one another. # # Fedora enables the Yama security mechanism which restricts ptrace # even further. Sysctl setting kernel.yama.ptrace_scope can have one # of the following values: # # 0 - Normal ptrace security permissions. # 1 - Restricted ptrace. Only child processes plus normal permissions. # 2 - Admin-only attach. Only executables with CAP_SYS_PTRACE. # 3 - No attach. No process may call ptrace at all. Irrevocable. # # For more information see Documentation/security/Yama.txt in the # kernel sources. # # The default is 1., which allows tracing of child processes, but # forbids tracing of arbitrary processes. This allows programs like # gdb or strace to work when the most common way of having the # debugger start the debuggee is used: # gdb /path/to/program ... # Attaching to already running programs is NOT allowed: # gdb -p ... # This default setting is suitable for the common case, because it # reduces the risk that one hacked process can be used to attack other # processes. (For example, a hacked firefox process in a user session # will not be able to ptrace the keyring process and extract passwords # stored only in memory.) # # Developers and administrators might want to disable those protections # to be able to attach debuggers to existing processes. Use # sysctl kernel.yama.ptrace_scope=0 # for change the setting temporarily, or copy this file to # /etc/sysctl.d/20-yama-ptrace.conf to set it for future boots. kernel.yama.ptrace_scope = 0
Name
Size
Last Modified
Owner
Permissions
Actions
20-yama-ptrace.conf
1.906
KB
April 22 2025 1:58:47
root
0644
CODING_STYLE
20.873
KB
June 22 2018 11:11:49
root
0644
DISTRO_PORTING
2.798
KB
June 22 2018 11:11:49
root
0644
ENVIRONMENT.md
6.229
KB
April 22 2025 1:58:09
root
0644
GVARIANT-SERIALIZATION
4.007
KB
June 22 2018 11:11:49
root
0644
HACKING
5.88
KB
June 22 2018 11:11:49
root
0644
NEWS
440.617
KB
June 22 2018 11:11:49
root
0644
README
13.502
KB
April 22 2025 1:57:58
root
0644
TRANSIENT-SETTINGS.md
8.964
KB
April 22 2025 1:58:00
root
0644
TRANSLATORS
0.745
KB
June 22 2018 11:11:49
root
0644
UIDS-GIDS.md
15.573
KB
June 22 2018 11:11:49
root
0644
2017 © D7net | D704T team