This is the mail archive of the systemtap@sourceware.org mailing list for the systemtap project.


Index Nav: [Date Index] [Subject Index] [Author Index] [Thread Index]
Message Nav: [Date Prev] [Date Next] [Thread Prev] [Thread Next]
Other format: [Raw text]

[Bug translator/12916] New: Aliased process probes aren't allowed for unprivileged


http://sourceware.org/bugzilla/show_bug.cgi?id=12916

           Summary: Aliased process probes aren't allowed for unprivileged
           Product: systemtap
           Version: unspecified
            Status: NEW
          Severity: normal
          Priority: P2
         Component: translator
        AssignedTo: systemtap@sourceware.org
        ReportedBy: jistone@redhat.com


A simple process probe aliased in stap itself:
> $ stap -l 'stap.system'
> stap.system

It ought to be allowed to unprivileged users too, but this fails:
> $ stap -l 'stap.system' --unprivileged
> $ echo $?
> 1

Manually specifying the probepoint works:
> $ stap -l 'process("stap").mark("stap_system__start")' --unprivileged
> process("stap").mark("stap_system__start")

So it seems that the alias breaks unprivileged access.

-- 
Configure bugmail: http://sourceware.org/bugzilla/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are the assignee for the bug.


Index Nav: [Date Index] [Subject Index] [Author Index] [Thread Index]
Message Nav: [Date Prev] [Date Next] [Thread Prev] [Thread Next]