public inbox for systemtap-cvs@sourceware.org help / color / mirror / Atom feed
From: brolley@sourceware.org To: systemtap-cvs@sourceware.org Subject: [SCM] systemtap: system-wide probe/trace tool branch, master, updated. release-1.6-487-gbb4470c Date: Wed, 23 Nov 2011 18:48:00 -0000 [thread overview] Message-ID: <20111123184810.29108.qmail@sourceware.org> (raw) This is an automated email from the git hooks/post-receive script. It was generated because a ref change was pushed to the repository containing the project "systemtap: system-wide probe/trace tool". The branch, master has been updated via bb4470cacb3f7ce5161f9e8a1b7c37a87516a6c3 (commit) via f6be7c061559d319c4422ce5ad17e7ae5a0e405e (commit) from be898cc4485951b10e692932a49144b5a00deef1 (commit) Those revisions listed above that are new to this repository have not appeared on any other notification email; so we list those revisions in full, below. - Log ----------------------------------------------------------------- commit bb4470cacb3f7ce5161f9e8a1b7c37a87516a6c3 Author: Dave Brolley <brolley@redhat.com> Date: Wed Nov 23 13:44:40 2011 -0500 PR 13128: Implement module privilege check in staprun. - staprun extracts the required privilege level from signed modules and compares it against the user's actual privilege credentials before loading. commit f6be7c061559d319c4422ce5ad17e7ae5a0e405e Author: Dave Brolley <brolley@redhat.com> Date: Tue Nov 22 11:13:28 2011 -0500 PR 13128: Implement the new --privilege=stapsys - Users belonging to the group stapsys can use all probe points and tapset functions (including those which contain embedded C), but cannot use the -g option. - Loading of modules for stapsys users requires signing by a trusted compile-server. - Add testing for stapsys throughout as appropriate. - Update existing unprivileged test suites to test stapsys as appropriate. - New test suite tests -g against all privilege levels. ----------------------------------------------------------------------- Summary of changes: csclient.cxx | 2 +- elaborate.cxx | 8 +- elaborate.h | 2 +- privilege.cxx | 40 ++- privilege.h | 12 +- runtime/addr-map.c | 6 +- runtime/runtime.h | 4 +- runtime/staprun/staprun_funcs.c | 316 ++++++++++++-------- runtime/task_finder.c | 6 +- session.cxx | 86 ++++-- stap-serverd.cxx | 24 +- staptree.cxx | 4 +- systemtap.spec | 1 + tapsets.cxx | 3 +- testsuite/systemtap.server/client.exp | 174 ++++++----- testsuite/systemtap.server/client_args.exp | 39 +++- .../unprivileged_embedded_C.exp | 59 +++-- .../systemtap.unprivileged/unprivileged_myproc.exp | 131 ++++++--- .../unprivileged_options.exp | 48 +++ .../systemtap.unprivileged/unprivileged_probes.exp | 125 ++++++--- translate.cxx | 5 +- 21 files changed, 713 insertions(+), 382 deletions(-) create mode 100644 testsuite/systemtap.unprivileged/unprivileged_options.exp hooks/post-receive -- systemtap: system-wide probe/trace tool
reply other threads:[~2011-11-23 18:48 UTC|newest] Thread overview: [no followups] expand[flat|nested] mbox.gz Atom feed
Reply instructions: You may reply publicly to this message via plain-text email using any one of the following methods: * Save the following mbox file, import it into your mail client, and reply-to-all from there: mbox Avoid top-posting and favor interleaved quoting: https://en.wikipedia.org/wiki/Posting_style#Interleaved_style * Reply using the --to, --cc, and --in-reply-to switches of git-send-email(1): git send-email \ --in-reply-to=20111123184810.29108.qmail@sourceware.org \ --to=brolley@sourceware.org \ --cc=systemtap-cvs@sourceware.org \ --cc=systemtap@sourceware.org \ /path/to/YOUR_REPLY https://kernel.org/pub/software/scm/git/docs/git-send-email.html * If your mail client supports setting the In-Reply-To header via mailto: links, try the mailto: linkBe sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions for how to clone and mirror all data and code used for this inbox; as well as URLs for read-only IMAP folder(s) and NNTP newsgroup(s).