Skip to content

Conversation

@HorlogeSkynet
Copy link
Contributor

@HorlogeSkynet HorlogeSkynet commented May 2, 2024

Hello @k4yt3x 👋

I've been recently struggling with this, and as lxc (unprivileged) containers are widely used to isolate some environments, I wondered whether this mention could be included here (as default Yama ptrace scope of 3 definitely breaks procfs emulation, and could not be reverted without a reboot...).

Thanks for your time, bye 👋


Upstream issue : lxc/lxcfs#636
Upstream mitigation (this is not a fix) : lxc/lxcfs#639

@k4yt3x
Copy link
Owner

k4yt3x commented May 2, 2024

Thanks for the PR. I've read the other thread, nice debugging efforts. Restricting ptrace indeed has a lot of implications. I'll amend the text slightly and merge in a bit.

@k4yt3x k4yt3x merged commit 1d2f9f7 into k4yt3x:master May 2, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants