This is an automated email from the ASF dual-hosted git repository.

bneradt pushed a commit to branch main
in repository https://gitbox.apache.org/repos/asf/trafficserver-ci.git


The following commit(s) were added to refs/heads/main by this push:
     new 70e244e  Run centos pipeline in privileged mode for ptrace (#414)
70e244e is described below

commit 70e244ead91c4dc87ef1acdbb96d7814dfb1a5ca
Author: Brian Neradt <[email protected]>
AuthorDate: Tue Dec 23 16:35:24 2025 -0600

    Run centos pipeline in privileged mode for ptrace (#414)
    
    The traffic_crashlog helper uses ptrace to get backtraces from the
    crashed traffic_server process. For ptrace to work, the process needs
    either:
    1. CAP_SYS_PTRACE in its effective capability set, or
    2. YAMA ptrace_scope set to 0 (classic permissions)
    
    With Docker's --cap-add=SYS_PTRACE, the capability is only added to the
    container's initial process but not inherited by child processes like
    traffic_server and traffic_crashlog. Additionally, YAMA's default
    ptrace_scope=1 only allows tracing children, not parents.
    
    Using --privileged mode gives the container full capabilities and
    disables security restrictions, allowing traffic_crashlog to ptrace
    its parent process (traffic_server).
---
 jenkins/github/centos.pipeline | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/jenkins/github/centos.pipeline b/jenkins/github/centos.pipeline
index a70ffb8..f935d9e 100644
--- a/jenkins/github/centos.pipeline
+++ b/jenkins/github/centos.pipeline
@@ -4,7 +4,7 @@ pipeline {
             image 'ci.trafficserver.apache.org/ats/centos:7'
             registryUrl 'https://ci.trafficserver.apache.org/'
             label 'docker'
-            args '--init --cap-add=SYS_PTRACE --security-opt 
seccomp=unconfined -v ${HOME}/ccache:/tmp/ccache:rw'
+            args '--init --privileged -v ${HOME}/ccache:/tmp/ccache:rw'
         }
     }
     environment {

Reply via email to