sudo aa-status
you will be able to list the binaries that are restricted by some profile. If you can change the char "/" for a dot of the path of each listed binary and you will obtain the name of the apparmor profile inside the mentioned folder./etc/passwd r,
to allow the binary read /etc/passwd
for example.service_bin
:--cap-add=SYS_ADMIN
__ give __ SYS_ADMIN
cap--cap-add=ALL
__ give __ all caps--cap-drop=ALL --cap-add=SYS_PTRACE
drop all caps and only give SYS_PTRACE
/proc
if you can configure how the container is going to be run, you could mount the proc directory of the host inside /host/proc
and it won't be protected by AppArmor anymore.#!/usr/bin/perl
and you execute the file directly, you will be able to execute whatever you want. E.g.: