This is the mail archive of the systemtap@sourceware.org mailing list for the systemtap project.


Index Nav: [Date Index] [Subject Index] [Author Index] [Thread Index]
Message Nav: [Date Prev] [Date Next] [Thread Prev] [Thread Next]
Other format: [Raw text]

[Bug uprobes/10595] uprobe probes causes selinux failures


------- Additional Comments From fche at redhat dot com  2009-09-17 15:53 -------
Possibly related crash:  4-cpu i686 VM: 

Linux version 2.6.31-12.fc12.i686 (mockbuild@x86-4.fedora.phx.redhat.com) (gcc
version 4.4.1 20090911 (Red Hat 4.4.1-13) (GCC) ) #1 SMP Mon Sep 14 02:27:06 EDT
2009

stap_e809d5710cc468e42f174557192e2ead_4791: systemtap: 0.9.9/0.142, base:
f7ffd000, memory: 49152+24576+2464+13600 data+text+ctx+net, probes: 5
type=1400 audit(1253202047.130:18): avc:  denied  { execmem } for  pid=11876
comm="static_user_mar"
scontext=unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023
tcontext=unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023 tclass=process
BUG: unable to handle kernel paging request at f80030b0
IP: [<f7fff857>] stap_uprobe_process_found+0x17a/0x270
[stap_e809d5710cc468e42f174557192e2ead_4791]
*pde = 35991067 *pte = 7effd161 
Oops: 0003 [#1] SMP 
last sysfs file: /sys/module/virtio_pci/sections/__mcount_loc
Modules linked in: stap_e809d5710cc468e42f174557192e2ead_4791 uprobes netconsole
iptable_nat nf_nat nfsd exportfs configfs nfs lockd fscache nfs_acl auth_rpcgss
sunrpc ipv6 dm_multipath uinput ppdev 8139too parport_pc i2c_piix4 parport
i2c_core 8139cp mii virtio_balloon floppy virtio_pci [last unloaded:
stap_aabe53c3fe286bb5f3adf68485fc5693_12327]

Pid: 11876, comm: static_user_mar Tainted: G        W  (2.6.31-12.fc12.i686 #1) 
EIP: 0060:[<f7fff857>] EFLAGS: 00210206 CPU: 2
EIP is at stap_uprobe_process_found+0x17a/0x270
[stap_e809d5710cc468e42f174557192e2ead_4791]
EAX: da1b8000 EBX: f800309c ECX: d9c17e0c EDX: 08048600
ESI: f8008304 EDI: da1b8000 EBP: d9c17e20 ESP: d9c17dfc
 DS: 007b ES: 007b FS: 00d8 GS: 00e0 SS: 0068
Process static_user_mar (pid: 11876, ti=d9c16000 task=da1b8000 task.ti=d9c16000)
Stack:
 00000001 00000000 da1b833c 00000000 0a640f34 0a640f34 f8007258 da1b8000
<0> f7fff6dd d9c17e48 f7fff9dd 00000001 00000001 00000001 f8007250 0a640f34
<0> da1b8000 db7fa048 da1b8440 d9c17e7c f8000a4b 00000001 00000002 00200246
Call Trace:
 [<f7fff6dd>] ? stap_uprobe_process_found+0x0/0x270
[stap_e809d5710cc468e42f174557192e2ead_4791]
 [<f7fff9dd>] ? __stp_call_callbacks+0x50/0x8f
[stap_e809d5710cc468e42f174557192e2ead_4791]
 [<f8000a4b>] ? __stp_utrace_task_finder_target_quiesce+0xf5/0x2a5
[stap_e809d5710cc468e42f174557192e2ead_4791]
 [<c048b856>] ? start_report+0x34/0x79
 [<c048baf1>] ? start_callback+0x53/0xb7
 [<c048d014>] ? utrace_resume+0xbb/0xf3
 [<c040332b>] ? do_notify_resume+0x773/0x7a7
 [<c06065d1>] ? debug_check_no_obj_freed+0x7c/0x175
 [<c04ee5e7>] ? check_valid_pointer+0x2c/0x6c
 [<c04f0530>] ? __slab_free+0x219/0x24e
 [<c046fd09>] ? trace_hardirqs_on_caller+0x26/0x155
 [<c0504348>] ? putname+0x39/0x53
 [<c046f084>] ? trace_hardirqs_off_caller+0x26/0xb7
 [<c0403b58>] ? work_notifysig+0x13/0x1b
Code: 75 00 f8 40 83 f8 64 7e 14 c7 05 38 75 00 f8 02 00 00 00 c7 05 28 75 00 f8
01 00 00 00 83 7b 10 00 74 26 8b 53 10 8d 4d ec 89 f8 <89> 7b 14 6a 00 e8 0f f5
ff ff 8d 4d ec 89 f8 ff 45 ec 8b 53 10 
EIP: [<f7fff857>] stap_uprobe_process_found+0x17a/0x270
[stap_e809d5710cc468e42f174557192e2ead_4791] SS:ESP 0068:d9c17dfc
CR2: 00000000f80030b0


-- 


http://sourceware.org/bugzilla/show_bug.cgi?id=10595

------- You are receiving this mail because: -------
You are the assignee for the bug, or are watching the assignee.


Index Nav: [Date Index] [Subject Index] [Author Index] [Thread Index]
Message Nav: [Date Prev] [Date Next] [Thread Prev] [Thread Next]