This has been bugging me the whole time I read through that code. Enough so to send a patch for this trivial thing.
Signed-off-by: Christian Brauner <christian.brau...@ubuntu.com> --- kernel/ptrace.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/kernel/ptrace.c b/kernel/ptrace.c index 84b1367935e4..374a0d4fd022 100644 --- a/kernel/ptrace.c +++ b/kernel/ptrace.c @@ -326,7 +326,7 @@ static int __ptrace_may_access(struct task_struct *task, unsigned int mode) if (mm && ((get_dumpable(mm) != SUID_DUMP_USER) && !ptrace_has_cap(mm->user_ns, mode))) - return -EPERM; + return -EPERM; return security_ptrace_access_check(task, mode); } -- 2.14.1