A simple process probe aliased in stap itself: > $ stap -l 'stap.system' > stap.system It ought to be allowed to unprivileged users too, but this fails: > $ stap -l 'stap.system' --unprivileged > $ echo $? > 1 Manually specifying the probepoint works: > $ stap -l 'process("stap").mark("stap_system__start")' --unprivileged > process("stap").mark("stap_system__start") So it seems that the alias breaks unprivileged access.
commit 373027ba325454572eeed5abcf5b9c1f3b4a4c14