From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (qmail 11964 invoked by alias); 10 Sep 2009 15:50:09 -0000 Received: (qmail 11654 invoked by uid 48); 10 Sep 2009 15:49:41 -0000 Date: Thu, 10 Sep 2009 15:50:00 -0000 Message-ID: <20090910154941.11653.qmail@sourceware.org> From: "fche at redhat dot com" To: systemtap@sources.redhat.com In-Reply-To: <20090903122458.10595.mjw@redhat.com> References: <20090903122458.10595.mjw@redhat.com> Reply-To: sourceware-bugzilla@sourceware.org Subject: [Bug uprobes/10595] uprobe probes causes selinux failures X-Bugzilla-Reason: AssignedTo Mailing-List: contact systemtap-help@sourceware.org; run by ezmlm Precedence: bulk List-Id: List-Subscribe: List-Post: List-Help: , Sender: systemtap-owner@sourceware.org X-SW-Source: 2009-q3/txt/msg00649.txt.bz2 ------- Additional Comments From fche at redhat dot com 2009-09-10 15:49 ------- I can't seem to reproduce this exactly on a pretty plain rawhide x86-64 box: sudo ./stap -e 'probe process("./stap").function("*").return {}' -t -c './stap -V' WARNING: u*probe failed stap[1567] 'process("/notnfs/BUILDg3/stap").function("~basic_stringbuf@/usr/lib/gcc/x86_64-redhat-linux/4.4.1/../../../../include/c++/4.4.1/iosfwd:63").return' addr (null) rc -22 SystemTap translator/driver (version 0.9.9/0.142 commit release-0.9.9-278-ged4abdf) Copyright (C) 2005-2009 Red Hat, Inc. and others This is free software; see the source for copying conditions. WARNING: Number of errors: 0, skipped probes: 1 WARNING: Skipped due to uprobe register failure: 1 probe process("./stap").function("*").return (:1:1), hits: 40, cycles: 440min/839avg/3192max Note that we're registering 40 hits. Linux vm-rawhide-64 2.6.31-0.204.rc9.fc12.x86_64 #1 SMP Sat Sep 5 20:45:55 EDT 2009 x86_64 x86_64 x86_64 GNU/Linux [11:45:19] % getenforce Enforcing [11:45:26] % getsebool -a | grep exec allow_execheap --> off allow_execmem --> off allow_execmod --> off allow_execstack --> off allow_guest_exec_content --> off allow_java_execstack --> off allow_mplayer_execstack --> off allow_nsplugin_execmem --> on allow_staff_exec_content --> on allow_sysadm_exec_content --> on allow_user_exec_content --> on allow_xguest_exec_content --> off allow_xserver_execmem --> off httpd_execmem --> off httpd_ssi_exec --> off But here comes dmesg: Sep 10 11:44:23 vm-rawhide-64 setroubleshoot: SELinux is preventing stap from changing a writable memory segment executable. For complete SELinux messages. run sealert -l ceedcc9e-b241-4b91-8307-bda74d8c2048 -- http://sourceware.org/bugzilla/show_bug.cgi?id=10595 ------- You are receiving this mail because: ------- You are the assignee for the bug, or are watching the assignee.