This is the mail archive of the
systemtap@sourceware.org
mailing list for the systemtap project.
[Bug tapsets/13693] make probefunc unprivileged
- From: "smakarov at redhat dot com" <sourceware-bugzilla at sourceware dot org>
- To: systemtap at sourceware dot org
- Date: Fri, 28 Sep 2012 19:47:06 +0000
- Subject: [Bug tapsets/13693] make probefunc unprivileged
- Auto-submitted: auto-generated
- References: <bug-13693-6586@http.sourceware.org/bugzilla/>
http://sourceware.org/bugzilla/show_bug.cgi?id=13693
Serguei Makarov <smakarov at redhat dot com> changed:
What |Removed |Added
----------------------------------------------------------------------------
Status|NEW |RESOLVED
CC| |smakarov at redhat dot com
Resolution| |FIXED
--- Comment #3 from Serguei Makarov <smakarov at redhat dot com> 2012-09-28 19:47:06 UTC ---
Building on tapset improvements from PR6580, I implemented a preprocessor
conditional of the form %( systemtap_privilege == "privileged" / "unprivileged"
%? ... %: ... %). The probefunc() implementation now wraps all kernel-space
retrieval code in such a conditional, eliding it when compiled with a lower
privilege, while leaving the user-space code available.
This allows unprivileged use of probefunc() handily, while retaining backwards
compatibility with its kernel-space uses for privileged scripts (no
deprecation/rewriting necessary). For instance, para-callgraph* and such can
now be run in unprivileged mode, so long as the probe points they're handed are
appropriate of course.
It remains to document the new systemtap_privilege check in order to make it
available and documented if we want to consider it for similar uses in the
future. (i.e. for having a tapset function provide a subset of the normal
functionality in unprivileged mode)
--
Configure bugmail: http://sourceware.org/bugzilla/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are the assignee for the bug.