From c1497bdb2a1deaa467fa75a80b1fb993a7d500f5 Mon Sep 17 00:00:00 2001
From: Martin Milata <mmilata@redhat.com>
Date: Mon, 8 Dec 2014 15:37:17 +0100
Subject: [PATCH 5/5] Disable hook unwind on kernels w/o PTRACE_SEIZE
Related to abrt/abrt#829.
Signed-off-by: Martin Milata <mmilata@redhat.com>
---
lib/core_unwind.c | 7 ++++---
lib/core_unwind_elfutils.c | 6 ++++++
2 files changed, 10 insertions(+), 3 deletions(-)
diff --git a/lib/core_unwind.c b/lib/core_unwind.c
index 8599f0f..cf9973a 100644
--- a/lib/core_unwind.c
+++ b/lib/core_unwind.c
@@ -25,6 +25,7 @@
#include <string.h>
#include <errno.h>
#include <sys/procfs.h> /* struct elf_prstatus */
+#include <sys/ptrace.h> /* PTRACE_SEIZE */
#include "utils.h"
#include "core/unwind.h"
@@ -52,19 +53,19 @@ sr_parse_coredump(const char *coredump_filename,
#endif /* !defined WITH_LIBDWFL && !defined WITH_LIBUNWIND */
-#if !defined WITH_LIBDWFL
+#if (!defined WITH_LIBDWFL || !defined PTRACE_SEIZE)
struct sr_core_stacktrace *
sr_core_stacktrace_from_core_hook(pid_t thread_id,
const char *executable_filename,
int signum,
- char **error_message);
+ char **error_message)
{
*error_message = sr_asprintf("satyr is built without live process unwind support");
return NULL;
}
-#endif /* !defined WITH_LIBDWFL */
+#endif /* !defined WITH_LIBDWFL || !defined PTRACE_SEIZE */
/* FIXME: is there another way to pass the executable name to the find_elf
* callback? */
diff --git a/lib/core_unwind_elfutils.c b/lib/core_unwind_elfutils.c
index eb366cd..1482dba 100644
--- a/lib/core_unwind_elfutils.c
+++ b/lib/core_unwind_elfutils.c
@@ -212,6 +212,10 @@ fail:
return stacktrace;
}
+/* If PTRACE_SEIZE is not defined (kernel < 3.4), stub function from
+ * core_unwind.c is used. */
+#ifdef PTRACE_SEIZE
+
struct sr_core_stacktrace *
sr_core_stacktrace_from_core_hook(pid_t tid,
const char *executable,
@@ -344,4 +348,6 @@ fail:
return stacktrace;
}
+#endif /* PTRACE_SEIZE */
+
#endif /* WITH_LIBDWFL */
--
2.4.3