# https://linux-audit.com/protect-ptrace-processes-kernel-yama-ptrace_scope/ # kernel.yama.ptrace_scope = 0: all processes can be debugged, as long as they have same uid. This is the classical way of how ptracing worked. sysctl kernel.yama.ptrace_scope = 0