This is the mail archive of the
systemtap@sourceware.org
mailing list for the systemtap project.
[Bug uprobes/10595] uprobe probes causes selinux failures
- From: "fche at redhat dot com" <sourceware-bugzilla at sourceware dot org>
- To: systemtap at sources dot redhat dot com
- Date: 10 Sep 2009 15:49:41 -0000
- Subject: [Bug uprobes/10595] uprobe probes causes selinux failures
- References: <20090903122458.10595.mjw@redhat.com>
- Reply-to: sourceware-bugzilla at sourceware dot org
------- Additional Comments From fche at redhat dot com 2009-09-10 15:49 -------
I can't seem to reproduce this exactly on a pretty plain rawhide x86-64 box:
sudo ./stap -e 'probe process("./stap").function("*").return {}' -t -c './stap -V'
WARNING: u*probe failed stap[1567]
'process("/notnfs/BUILDg3/stap").function("~basic_stringbuf@/usr/lib/gcc/x86_64-redhat-linux/4.4.1/../../../../include/c++/4.4.1/iosfwd:63").return'
addr (null) rc -22
SystemTap translator/driver (version 0.9.9/0.142 commit release-0.9.9-278-ged4abdf)
Copyright (C) 2005-2009 Red Hat, Inc. and others
This is free software; see the source for copying conditions.
WARNING: Number of errors: 0, skipped probes: 1
WARNING: Skipped due to uprobe register failure: 1
probe process("./stap").function("*").return (<input>:1:1), hits: 40, cycles:
440min/839avg/3192max
Note that we're registering 40 hits.
Linux vm-rawhide-64 2.6.31-0.204.rc9.fc12.x86_64 #1 SMP Sat Sep 5 20:45:55 EDT
2009 x86_64 x86_64 x86_64 GNU/Linux
[11:45:19] % getenforce
Enforcing
[11:45:26] % getsebool -a | grep exec
allow_execheap --> off
allow_execmem --> off
allow_execmod --> off
allow_execstack --> off
allow_guest_exec_content --> off
allow_java_execstack --> off
allow_mplayer_execstack --> off
allow_nsplugin_execmem --> on
allow_staff_exec_content --> on
allow_sysadm_exec_content --> on
allow_user_exec_content --> on
allow_xguest_exec_content --> off
allow_xserver_execmem --> off
httpd_execmem --> off
httpd_ssi_exec --> off
But here comes dmesg:
Sep 10 11:44:23 vm-rawhide-64 setroubleshoot: SELinux is preventing stap from
changing a writable memory segment executable. For complete SELinux messages.
run sealert -l ceedcc9e-b241-4b91-8307-bda74d8c2048
--
http://sourceware.org/bugzilla/show_bug.cgi?id=10595
------- You are receiving this mail because: -------
You are the assignee for the bug, or are watching the assignee.