This is the mail archive of the
systemtap@sourceware.org
mailing list for the systemtap project.
[Bug translator/12172] make unprivileged mode default under certain conditions
- From: "brolley at redhat dot com" <sourceware-bugzilla at sourceware dot org>
- To: systemtap at sources dot redhat dot com
- Date: Tue, 2 Nov 2010 17:53:22 +0000
- Subject: [Bug translator/12172] make unprivileged mode default under certain conditions
- Auto-submitted: auto-generated
- References: <bug-12172-1110@http.sourceware.org/bugzilla/>
http://sourceware.org/bugzilla/show_bug.cgi?id=12172
Dave Brolley <brolley at redhat dot com> changed:
What |Removed |Added
----------------------------------------------------------------------------
CC| |brolley at redhat dot com
AssignedTo|systemtap at sources dot |brolley at redhat dot com
|redhat.com |
--- Comment #1 from Dave Brolley <brolley at redhat dot com> 2010-11-02 17:53:04 UTC ---
(In reply to comment #0)
> For a stapusr person invoking stap, the translator should
> probably default --unprivileged --use-server, since that's
> the only way the stapusr will get anywhere.
I would agree that, currently, --unprivileged is the only useful mode for
stapusr members when it comes to loading their modules, however, for phases
1-4, why restrict them?
- they may benefit from compiling script beyond the scope of --unprivileged for
the purposes of learning about stap or out of curiosity.
- they can benefit from being able to list probe points beyond the scope of
--unprivileged for the same reason
With respect to --use-server, it may be useful for stapusr members to have stap
check their scripts locally, either for efficiency or when a server is not
available.
And what about completely unprivileged users (i.e. not even a member of
stapusr)? Are we not planning on someday removing the restriction that
--unprivileged users must be members of stapusr?
--
Configure bugmail: http://sourceware.org/bugzilla/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are the assignee for the bug.