8000 pkg/ebpf/tracee: fix capabilities for procfs reads by rafaeldtinoco · Pull Request #2406 · aquasecurity/tracee · GitHub
[go: up one dir, main page]
More Web Proxy on the site http://driver.im/
Skip to content

pkg/ebpf/tracee: fix capabilities for procfs reads #2406

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Merged
merged 1 commit into from
Nov 29, 2022
Merged

pkg/ebpf/tracee: fix capabilities for procfs reads #2406

merged 1 commit into from
Nov 29, 2022

Conversation

rafaeldtinoco
Copy link
Contributor

Last merge had wrong permissions and there are still errors reading procfs when dropping capabilities. This commit fixes the issue.

Last merge had wrong permissions and there are still errors reading
procfs when dropping capabilities. This commit fixes the issue.
Copy link
Collaborator
@yanivagman yanivagman left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

LGTM

Copy link
Member
@geyslan geyslan left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Tested with:

sudo TRACEE_LOGGER_LVL=debug ./dist/tracee-ebpf --install-path /tmp/tracee --cache cache-type=mem --cache mem-cache-size=512 --output none --output option:parse-arguments --output option:detect-syscall --containers --trace event=openat --capabilities bypass=false &> output
❯ grep ' cap' ./output 
{"level":"debug","ts":1669738552.548426,"msg":"enabling cap","pkg":"capabilities","file":"capabilities.go","line":310,"cap":"cap_sys_ptrace"}
{"level":"debug","ts":1669738552.5484693,"msg":"enabling cap","pkg":"capabilities","file":"capabilities.go","line":310,"cap":"cap_dac_read_search"}
{"level":"debug","ts":1669738552.744597,"msg":"enabling cap","pkg":"capabilities","file":"capabilities.go","line":310,"cap":"cap_bpf"}
{"level":"debug","ts":1669738552.7446027,"msg":"enabling cap","pkg":"capabilities","file":"capabilities.go","line":310,"cap":"cap_ipc_lock"}
{"level":"debug","ts":1669738552.7446058,"msg":"enabling cap","pkg":"capabilities","file":"capabilities.go","line":310,"cap":"cap_sys_resource"}
{"level":"debug","ts":1669738552.7446105,"msg":"e
8000
nabling cap","pkg":"capabilities","file":"capabilities.go","line":310,"cap":"cap_perfmon"}
{"level":"debug","ts":1669738553.1344943,"msg":"enabling cap","pkg":"capabilities","file":"capabilities.go","line":310,"cap":"cap_sys_ptrace"}
{"level":"debug","ts":1669738553.1345005,"msg":"enabling cap","pkg":"capabilities","file":"capabilities.go","line":310,"cap":"cap_dac_read_search"}
{"level":"debug","ts":1669738555.8535562,"msg":"enabling cap","pkg":"capabilities","file":"capabilities.go","line":310,"cap":"cap_perfmon"}
{"level":"debug","ts":1669738555.8535662,"msg":"enabling cap","pkg":"capabilities","file":"capabilities.go","line":310,"cap":"cap_bpf"}
{"level":"debug","ts":1669738555.8535728,"msg":"enabling cap","pkg":"capabilities","file":"capabilities.go","line":310,"cap":"cap_ipc_lock"}
{"level":"debug","ts":1669738555.8535783,"msg":"enabling cap","pkg":"capabilities","file":"capabilities.go","line":310,"cap":"cap_sys_resource"}

@rafaeldtinoco rafaeldtinoco merged commit 711e9e9 into aquasecurity:main Nov 29, 2022
@rafaeldtinoco rafaeldtinoco deleted the fix-caps branch November 29, 2022 16:23
@yanivagman
Copy link
Collaborator

Tested with:

sudo TRACEE_LOGGER_LVL=debug ./dist/tracee-ebpf --install-path /tmp/tracee --cache cache-type=mem --cache mem-cache-size=512 --output none --output option:parse-arguments --output option:detect-syscall --containers --trace event=openat --capabilities bypass=false &> output
❯ grep ' cap' ./output 
{"level":"debug","ts":1669738552.548426,"msg":"enabling cap","pkg":"capabilities","file":"capabilities.go","line":310,"cap":"cap_sys_ptrace"}
{"level":"debug","ts":1669738552.5484693,"msg":"enabling cap","pkg":"capabilities","file":"capabilities.go","line":310,"cap":"cap_dac_read_search"}
{"level":"debug","ts":1669738552.744597,"msg":"enabling cap","pkg":"capabilities","file":"capabilities.go","line":310,"cap":"cap_bpf"}
{"level":"debug","ts":1669738552.7446027,"msg":"enabling cap","pkg":"capabilities","file":"capabilities.go","line":310,"cap":"cap_ipc_lock"}
{"level":"debug","ts":1669738552.7446058,"msg":"enabling cap","pkg":"capabilities","file":"capabilities.go","line":310,"cap":"cap_sys_resource"}
{"level":"debug","ts":1669738552.7446105,"msg":"enabling cap","pkg":"capabilities","file":"capabilities.go","line":310,"cap":"cap_perfmon"}
{"level":"debug","ts":1669738553.1344943,"msg":"enabling cap","pkg":"capabilities","file":"capabilities.go","line":310,"cap":"cap_sys_ptrace"}
{"level":"debug","ts":1669738553.1345005,"msg":"enabling cap","pkg":"capabilities","file":"capabilities.go","line":310,"cap":"cap_dac_read_search"}
{"level":"debug","ts":1669738555.8535562,"msg":"enabling cap","pkg":"capabilities","file":"capabilities.go","line":310,"cap":"cap_perfmon"}
{"level":"debug","ts":1669738555.8535662,"msg":"enabling cap","pkg":"capabilities","file":"capabilities.go","line":310,"cap":"cap_bpf"}
{"level":"debug","ts":1669738555.8535728,"msg":"enabling cap","pkg":"capabilities","file":"capabilities.go","line":310,"cap":"cap_ipc_lock"}
{"level":"debug","ts":1669738555.8535783,"msg":"enabling cap","pkg":"capabilities","file":"capabilities.go","line":310,"cap":"cap_sys_resource"}

Nice! I like this new logger

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

3 participants
0