Bug 12916 - Aliased process probes aren't allowed for unprivileged
Summary: Aliased process probes aren't allowed for unprivileged
Status: RESOLVED FIXED
Alias: None
Product: systemtap
Classification: Unclassified
Component: translator (show other bugs)
Version: unspecified
: P2 normal
Target Milestone: ---
Assignee: Dave Brolley
URL:
Keywords:
Depends on:
Blocks:
 
Reported: 2011-06-21 17:43 UTC by Josh Stone
Modified: 2011-08-05 16:02 UTC (History)
1 user (show)

See Also:
Host:
Target:
Build:
Last reconfirmed:


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Josh Stone 2011-06-21 17:43:27 UTC
A simple process probe aliased in stap itself:
> $ stap -l 'stap.system'
> stap.system

It ought to be allowed to unprivileged users too, but this fails:
> $ stap -l 'stap.system' --unprivileged
> $ echo $?
> 1

Manually specifying the probepoint works:
> $ stap -l 'process("stap").mark("stap_system__start")' --unprivileged
> process("stap").mark("stap_system__start")

So it seems that the alias breaks unprivileged access.
Comment 1 Dave Brolley 2011-08-05 16:02:11 UTC
commit 373027ba325454572eeed5abcf5b9c1f3b4a4c14