http://bugs.winehq.org/show_bug.cgi?id=24193
Scott Ritchie scott@open-vote.org changed:
What |Removed |Added ---------------------------------------------------------------------------- CC| |scott@open-vote.org
--- Comment #2 from Scott Ritchie scott@open-vote.org 2010-08-29 17:46:27 CDT ---
From the wiki, it seems like this can be worked around with a runtime override:
This behavior is controlled via the /proc/sys/kernel/yama/ptrace_scope sysctl value. The default is "1" to block non-child ptrace. A value of "0" restores the prior more permissive behavior, which may be more appropriate for some development systems and servers with only admin accounts. Using "sudo" can also grant temporarily ptrace permissions via the CAP_SYS_PTRACE capability, though this method allows the ptrace of any process.
This can also probably be set with a variable in /etc/sysctl.d/