Add ptrace readby and tracedby to default AppArmor profile
Fixes https://github.com/containerd/containerd/issues/7695. The default profile allows processes within the container to trace others, but blocks reads/traces. This means that diagnostic facilities in processes can't easily collect crash/hang dumps. A usual workflow used by solutions like crashpad and similar projects is that the process that's unresponsive will spawn a process to collect diagnostic data using ptrace. seccomp-bpf, yama ptrace settings, and CAP_SYS_PTRACE already provide security mechanisms to reduce the scopes in which the API can be used. This enables reading from /proc/* files provided the tracer process passes all other checks. Signed-off-by: Juan Hoyos <juan.s.hoyos@outlook.com>
This commit is contained in:
		| @@ -84,7 +84,9 @@ profile {{.Name}} flags=(attach_disconnected,mediate_deleted) { | |||||||
|   deny /sys/kernel/security/** rwklx, |   deny /sys/kernel/security/** rwklx, | ||||||
|  |  | ||||||
| {{if ge .Version 208095}} | {{if ge .Version 208095}} | ||||||
|   ptrace (trace,read) peer={{.Name}}, |   # allow processes within the container to trace each other, | ||||||
|  |   # provided all other LSM and yama setting allow it. | ||||||
|  |   ptrace (trace,tracedby,read,readby) peer={{.Name}}, | ||||||
| {{end}} | {{end}} | ||||||
| } | } | ||||||
| ` | ` | ||||||
|   | |||||||
		Reference in New Issue
	
	Block a user
	 Juan Hoyos
					Juan Hoyos