This is the mail archive of the
systemtap@sourceware.org
mailing list for the systemtap project.
Re: staprun:init_cap:73: ERROR: cap_set_proc: Operation not permitted
- From: fche at redhat dot com (Frank Ch. Eigler)
- To: David Smith <dsmith at redhat dot com>
- Cc: David Wilder <dwilder at us dot ibm dot com>, SystemTAP <systemtap at sources dot redhat dot com>
- Date: Wed, 16 Jan 2008 11:29:58 -0500
- Subject: Re: staprun:init_cap:73: ERROR: cap_set_proc: Operation not permitted
- References: <478CFC1D.2010006@us.ibm.com> <478D0DCC.5030407@redhat.com>
David Smith <dsmith@redhat.com> writes:
>> Red Hat Enterprise Linux Server release 5 (Tikanga)
>> Kernel 2.6.24-rc7
(Just for clarity, that's not an RHEL5 kernel.)
>> [...]
>> staprun:init_cap:73: ERROR: cap_set_proc: Operation not permitted
> The answer before (from Martin) was that the kernel needs to be built
> with CONFIG_SECURITY_CAPABILITIES=y
It would be nice if we had a reduced(?)-security fallback mode in the
runtime to tolerate capability-less kernels.
- FChE