summaryrefslogtreecommitdiffstats
path: root/runtime/staprun
diff options
context:
space:
mode:
authorDave Brolley <brolley@redhat.com>2009-09-03 16:13:30 -0400
committerDave Brolley <brolley@redhat.com>2009-09-03 16:13:30 -0400
commit5e8a3b7b558273fa06525f642fdf2d678dde85eb (patch)
tree9c38b52b46692ac7e906deb33f2a81d062704a6f /runtime/staprun
parentceca17997ef0a5310cf887d451651acec73b41da (diff)
downloadsystemtap-steved-5e8a3b7b558273fa06525f642fdf2d678dde85eb.tar.gz
systemtap-steved-5e8a3b7b558273fa06525f642fdf2d678dde85eb.tar.xz
systemtap-steved-5e8a3b7b558273fa06525f642fdf2d678dde85eb.zip
Allow process begin/end probes for unprivileged users.
2009-09-03 Dave Brolley <brolley@redhat.com> * tapsets.cxx (visit_cast_op): Don't disallow unprivileged users. Annotate synthesized function with /* unprivileged */. * tapset-utrace.cxx (register_tapset_utrace): Call allow_unprivileged for process begin and end probes. * translate.cxx (translate_pass): Generate '#define STP_PRIVILEGED 1' unless --unprivileged was specified. * runtime/transport/transport.c: Don't define _stp_unprivileged_user. * runtime/task_finder.c (__stp_utrace_attach_match_filename): Check that _stp_uid equals the task euid when STP_PRIVILEGED is not defined. (stap_start_task_finder): Likewise. * runtime/staprun/staprun.c (insert_stap_module): Don't generate module option _stp_unprivileged_user.
Diffstat (limited to 'runtime/staprun')
-rw-r--r--runtime/staprun/staprun.c10
1 files changed, 1 insertions, 9 deletions
diff --git a/runtime/staprun/staprun.c b/runtime/staprun/staprun.c
index 7eb7f28f..da3e304b 100644
--- a/runtime/staprun/staprun.c
+++ b/runtime/staprun/staprun.c
@@ -145,19 +145,11 @@ static int enable_uprobes(void)
static int insert_stap_module(void)
{
char special_options[128];
- char *bufptr = special_options;
/* Add the _stp_bufsize option. */
- if (snprintf_chk(bufptr, sizeof (special_options), "_stp_bufsize=%d", buffer_size))
+ if (snprintf_chk(special_options, sizeof (special_options), "_stp_bufsize=%d", buffer_size))
return -1;
- /* Add the _stp_unprivileged_user option. */
- bufptr += strlen (bufptr);
- if (snprintf_chk(bufptr,
- sizeof (special_options) - (bufptr - special_options),
- " _stp_unprivileged_user=%d", unprivileged_user))
- return -1;
-
return insert_module(modpath, special_options, modoptions);
}