base_role/overlay/Linux/etc/sysctl.d/10_ptrace.conf
embed@git.macaw.me b50fd16591 first
2024-01-06 01:38:28 +00:00

5 lines
258 B
Plaintext

# https://linux-audit.com/protect-ptrace-processes-kernel-yama-ptrace_scope/
# kernel.yama.ptrace_scope = 0: all processes can be debugged, as long as they have same uid. This is the classical way of how ptracing worked.
sysctl kernel.yama.ptrace_scope = 0