diff options
author | Dave Brolley <brolley@redhat.com> | 2009-09-03 16:13:30 -0400 |
---|---|---|
committer | Dave Brolley <brolley@redhat.com> | 2009-09-03 16:13:30 -0400 |
commit | 5e8a3b7b558273fa06525f642fdf2d678dde85eb (patch) | |
tree | 9c38b52b46692ac7e906deb33f2a81d062704a6f /tapset-utrace.cxx | |
parent | ceca17997ef0a5310cf887d451651acec73b41da (diff) | |
download | systemtap-steved-5e8a3b7b558273fa06525f642fdf2d678dde85eb.tar.gz systemtap-steved-5e8a3b7b558273fa06525f642fdf2d678dde85eb.tar.xz systemtap-steved-5e8a3b7b558273fa06525f642fdf2d678dde85eb.zip |
Allow process begin/end probes for unprivileged users.
2009-09-03 Dave Brolley <brolley@redhat.com>
* tapsets.cxx (visit_cast_op): Don't disallow unprivileged users.
Annotate synthesized function with /* unprivileged */.
* tapset-utrace.cxx (register_tapset_utrace): Call allow_unprivileged
for process begin and end probes.
* translate.cxx (translate_pass): Generate '#define STP_PRIVILEGED 1'
unless --unprivileged was specified.
* runtime/transport/transport.c: Don't define _stp_unprivileged_user.
* runtime/task_finder.c (__stp_utrace_attach_match_filename): Check
that _stp_uid equals the task euid when STP_PRIVILEGED is not defined.
(stap_start_task_finder): Likewise.
* runtime/staprun/staprun.c (insert_stap_module): Don't generate
module option _stp_unprivileged_user.
Diffstat (limited to 'tapset-utrace.cxx')
-rw-r--r-- | tapset-utrace.cxx | 20 |
1 files changed, 14 insertions, 6 deletions
diff --git a/tapset-utrace.cxx b/tapset-utrace.cxx index 6872c87c..d9d95f82 100644 --- a/tapset-utrace.cxx +++ b/tapset-utrace.cxx @@ -1033,12 +1033,20 @@ register_tapset_utrace(systemtap_session& s) for (unsigned i = 0; i < roots.size(); ++i) { - roots[i]->bind(TOK_BEGIN)->bind(builder); - roots[i]->bind(TOK_END)->bind(builder); - roots[i]->bind(TOK_THREAD)->bind(TOK_BEGIN)->bind(builder); - roots[i]->bind(TOK_THREAD)->bind(TOK_END)->bind(builder); - roots[i]->bind(TOK_SYSCALL)->bind(builder); - roots[i]->bind(TOK_SYSCALL)->bind(TOK_RETURN)->bind(builder); + roots[i]->bind(TOK_BEGIN) + ->allow_unprivileged() + ->bind(builder); + roots[i]->bind(TOK_END) + ->allow_unprivileged() + ->bind(builder); + roots[i]->bind(TOK_THREAD)->bind(TOK_BEGIN) + ->bind(builder); + roots[i]->bind(TOK_THREAD)->bind(TOK_END) + ->bind(builder); + roots[i]->bind(TOK_SYSCALL) + ->bind(builder); + roots[i]->bind(TOK_SYSCALL)->bind(TOK_RETURN) + ->bind(builder); } } |