Skip to content

Mentions kernel.yama.ptrace_scope = 3 breaks lxc v6+ procfs #14

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Merged
merged 2 commits into from
May 2, 2024
Merged

Mentions kernel.yama.ptrace_scope = 3 breaks lxc v6+ procfs #14

merged 2 commits into from
May 2, 2024

Conversation

HorlogeSkynet
Copy link
Contributor

@HorlogeSkynet HorlogeSkynet commented May 2, 2024

Hello @k4yt3x 👋

I've been recently struggling with this, and as lxc (unprivileged) containers are widely used to isolate some environments, I wondered whether this mention could be included here (as default Yama ptrace scope of 3 definitely breaks procfs emulation, and could not be reverted without a reboot...).

Thanks for your time, bye 👋


Upstream issue : lxc/lxcfs#636
Upstream mitigation (this is not a fix) : lxc/lxcfs#639

@k4yt3x
Copy link
Owner

k4yt3x commented May 2, 2024

Thanks for the PR. I've read the other thread, nice debugging efforts. Restricting ptrace indeed has a lot of implications. I'll amend the text slightly and merge in a bit.

@k4yt3x k4yt3x merged commit 1d2f9f7 into k4yt3x:master May 2, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants