This is the mail archive of the
systemtap@sourceware.org
mailing list for the systemtap project.
[Bug translator/12916] New: Aliased process probes aren't allowed for unprivileged
- From: "jistone at redhat dot com" <sourceware-bugzilla at sourceware dot org>
- To: systemtap at sourceware dot org
- Date: Tue, 21 Jun 2011 17:43:28 +0000
- Subject: [Bug translator/12916] New: Aliased process probes aren't allowed for unprivileged
- Auto-submitted: auto-generated
http://sourceware.org/bugzilla/show_bug.cgi?id=12916
Summary: Aliased process probes aren't allowed for unprivileged
Product: systemtap
Version: unspecified
Status: NEW
Severity: normal
Priority: P2
Component: translator
AssignedTo: systemtap@sourceware.org
ReportedBy: jistone@redhat.com
A simple process probe aliased in stap itself:
> $ stap -l 'stap.system'
> stap.system
It ought to be allowed to unprivileged users too, but this fails:
> $ stap -l 'stap.system' --unprivileged
> $ echo $?
> 1
Manually specifying the probepoint works:
> $ stap -l 'process("stap").mark("stap_system__start")' --unprivileged
> process("stap").mark("stap_system__start")
So it seems that the alias breaks unprivileged access.
--
Configure bugmail: http://sourceware.org/bugzilla/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are the assignee for the bug.