This is the mail archive of the
systemtap-cvs@sourceware.org
mailing list for the systemtap project.
[SCM] systemtap: system-wide probe/trace tool branch, master, updated. release-1.7-327-gd4caed2
- From: jistone at sourceware dot org
- To: systemtap-cvs at sourceware dot org
- Date: 15 Jun 2012 00:09:32 -0000
- Subject: [SCM] systemtap: system-wide probe/trace tool branch, master, updated. release-1.7-327-gd4caed2
- Reply-to: systemtap at sourceware dot org
This is an automated email from the git hooks/post-receive script. It was
generated because a ref change was pushed to the repository containing
the project "systemtap: system-wide probe/trace tool".
The branch, master has been updated
via d4caed28490b1480b29191c9d4c875a0f41175bd (commit)
from fdb3f24278a7afc35b716d22b991efc0896a6479 (commit)
Those revisions listed above that are new to this repository have
not appeared on any other notification email; so we list those
revisions in full, below.
- Log -----------------------------------------------------------------
commit d4caed28490b1480b29191c9d4c875a0f41175bd
Author: Josh Stone <jistone@redhat.com>
Date: Thu Jun 14 16:52:28 2012 -0700
PR14244: Assert that the real UID has access to debugfs
Some systems are now defaulting debugfs to mode 0700. If the user has
no access to debugfs, then they won't be able to communicate with the
systemtap module. Thus, this should be a non-starter, before even
loading the module at all.
This was previously causing staprun to fail after loading the module,
when it checked R/W access to the module's .ctl file. But since we also
restrict removing modules to those you can control, staprun would not
unload the new module either.
-----------------------------------------------------------------------
Summary of changes:
runtime/staprun/staprun_funcs.c | 16 ++++++++++++++--
1 files changed, 14 insertions(+), 2 deletions(-)
hooks/post-receive
--
systemtap: system-wide probe/trace tool