|
From: Andi K. <ak...@mu...> - 2005-05-17 20:36:33
|
Jeremy Fitzhardinge <je...@go...> writes: > Beorn Johnson wrote: > >>Then I realized my problem: my process uses 'seteuid( )' >>(before 'dlopen( )'-ing it's shared objects), which changes >>the effective uid of the process but not of '/proc/self/'. >>So, 'readlink( )' can't read "/proc/self/fd/nn", >>and the 'mmap( )' doesn't have the associated filename >>with which to generate address->name mapping. >> > Hm, interesting. I wonder if that could be considered a kernel bug... It's a redhat specific bug, side effect of execshield which considers your /proc/self/maps as a secret and changes the permissions. Just unapply the execshield patch or use a mainline kernel. -Andi |