Re: strace exposes kernel bug?

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Tue, 2003-04-15 at 14:34, Bill Nottingham wrote:
> > Bug #3 kernel?
> > ==============
> > This is an unrelated bug and perhaps not the fault of dovecot.  When I
> > attempted to use strace to get some debugging info on the [imap]
> > process, this happened:
> > 
> > [root@xxxxxx /]# strace -p 20486
> > trace: ptrace(PTRACE_SYSCALL, ...): Operation not permitted
> > detach: ptrace(PTRACE_DETACH, ...): Operation not permitted
> > [root@xxxxxx /]# 
> 
> This is a result of the ptrace patch.
> 
> Bill

https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=86382
Somebody had already reported this kernel bug.  While it isn't a DoS
threat since you need to be root to cause the process failure, this
makes it impossible to debug these types of processes.  Also it isn't
immediately apparent that the process can be revived with SIGCONT, so
most people think they have an unkillable process after kill -9 fails.

-- 
Warren Togami                                   Fedora Linux Project
warren@xxxxxxxxxx                               http://www.fedora.us
GPG 0x54A2ACF1       3rd party packaging community for Red Hat Linux
785A 304B 08C1 F291 F54F  9A68 6BDD FE8E 54A2 ACF1

Attachment: signature.asc
Description: This is a digitally signed message part


[Index of Archives]     [Fedora Users]     [Centos Users]     [Kernel Development]     [Red Hat Install]     [Red Hat Watch]     [Red Hat Development]     [Red Hat Phoebe Beta]     [Yosemite Forum]     [Fedora Discussion]     [Gimp]     [Stuff]     [Yosemite News]

  Powered by Linux