*** UNIX MANUAL PAGE BROWSER ***

A Nergahak database for man pages research.

Navigation

Directory Browser

1Browse 4.4BSD4.4BSD
1Browse Digital UNIXDigital UNIX 4.0e
1Browse FreeBSDFreeBSD 14.3
1Browse MINIXMINIX 3.4.0rc6-d5e4fc0
1Browse NetBSDNetBSD 10.1
1Browse OpenBSDOpenBSD 7.7
1Browse UNIX v7Version 7 UNIX
1Browse UNIX v10Version 10 UNIX

Manual Page Search

Manual Page Result

0 Command: p_candebug | Section: 9 | Source: FreeBSD | File: p_candebug.9.gz
P_CANDEBUG(9) FreeBSD Kernel Developer's Manual P_CANDEBUG(9) NAME p_candebug - determine debuggability of a process SYNOPSIS #include <sys/param.h> #include <sys/proc.h> int p_candebug(struct thread *td, struct proc *p); DESCRIPTION This function determines if a given process p is debuggable by some thread td. The following sysctl(8) variables directly influence the behaviour of p_candebug(): security.bsd.unprivileged_proc_debug Must be set to a non-zero value to allow unprivileged processes access to the kernel's debug facilities. kern.securelevel Debugging of the init process is not allowed if this variable is 1 or greater. Other such variables indirectly influence it; see cr_bsd_visible(9). RETURN VALUES The p_candebug() function returns 0 if the process denoted by p is debuggable by thread td, or a non-zero error return value otherwise. ERRORS [EPERM] An unprivileged process attempted to debug another process but the system is configured to deny it (see sysctl(8) variable security.bsd.unprivileged_proc_debug above). [ESRCH] Thread td has been jailed and the process to debug does not belong to the same jail or one of its sub- jails, as determined by prison_check(9). [ESRCH] cr_bsd_visible(9) denied visibility according to the BSD security policies in force. [EPERM] Thread td lacks superuser credentials and its (effective) group set is not a superset of process p's whole group set (including real, effective and saved group IDs). [EPERM] Thread td lacks superuser credentials and its (effective) user ID does not match all user IDs of process p. [EPERM] Thread td lacks superuser credentials and process p is executing a set-user-ID or set-group-ID executable. [EPERM] Process p denotes the initial process initproc() and the sysctl(8) variable kern.securelevel is greater than zero. [EBUSY] Process p is in the process of being exec()'ed. [EPERM] Process p denied debuggability (see procctl(2), command PROC_TRACE_CTL). SEE ALSO procctl(2), cr_bsd_visible(9), mac(9), p_cansee(9), prison_check(9) FreeBSD 14.1-RELEASE-p8 August 18, 2023 FreeBSD 14.1-RELEASE-p8

Navigation Options