From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (qmail 29163 invoked by alias); 23 Nov 2011 18:48:14 -0000 Received: (qmail 29121 invoked by uid 448); 23 Nov 2011 18:48:10 -0000 Date: Wed, 23 Nov 2011 18:48:00 -0000 Message-ID: <20111123184810.29108.qmail@sourceware.org> From: brolley@sourceware.org To: systemtap-cvs@sourceware.org Subject: [SCM] systemtap: system-wide probe/trace tool branch, master, updated. release-1.6-487-gbb4470c X-Git-Refname: refs/heads/master X-Git-Reftype: branch X-Git-Oldrev: be898cc4485951b10e692932a49144b5a00deef1 X-Git-Newrev: bb4470cacb3f7ce5161f9e8a1b7c37a87516a6c3 Mailing-List: contact systemtap-cvs-help@sourceware.org; run by ezmlm Precedence: bulk List-Id: List-Subscribe: List-Post: List-Help: , Sender: systemtap-cvs-owner@sourceware.org List-Archive: Reply-To: systemtap@sourceware.org X-SW-Source: 2011-q4/txt/msg00149.txt.bz2 This is an automated email from the git hooks/post-receive script. It was generated because a ref change was pushed to the repository containing the project "systemtap: system-wide probe/trace tool". The branch, master has been updated via bb4470cacb3f7ce5161f9e8a1b7c37a87516a6c3 (commit) via f6be7c061559d319c4422ce5ad17e7ae5a0e405e (commit) from be898cc4485951b10e692932a49144b5a00deef1 (commit) Those revisions listed above that are new to this repository have not appeared on any other notification email; so we list those revisions in full, below. - Log ----------------------------------------------------------------- commit bb4470cacb3f7ce5161f9e8a1b7c37a87516a6c3 Author: Dave Brolley Date: Wed Nov 23 13:44:40 2011 -0500 PR 13128: Implement module privilege check in staprun. - staprun extracts the required privilege level from signed modules and compares it against the user's actual privilege credentials before loading. commit f6be7c061559d319c4422ce5ad17e7ae5a0e405e Author: Dave Brolley Date: Tue Nov 22 11:13:28 2011 -0500 PR 13128: Implement the new --privilege=stapsys - Users belonging to the group stapsys can use all probe points and tapset functions (including those which contain embedded C), but cannot use the -g option. - Loading of modules for stapsys users requires signing by a trusted compile-server. - Add testing for stapsys throughout as appropriate. - Update existing unprivileged test suites to test stapsys as appropriate. - New test suite tests -g against all privilege levels. ----------------------------------------------------------------------- Summary of changes: csclient.cxx | 2 +- elaborate.cxx | 8 +- elaborate.h | 2 +- privilege.cxx | 40 ++- privilege.h | 12 +- runtime/addr-map.c | 6 +- runtime/runtime.h | 4 +- runtime/staprun/staprun_funcs.c | 316 ++++++++++++-------- runtime/task_finder.c | 6 +- session.cxx | 86 ++++-- stap-serverd.cxx | 24 +- staptree.cxx | 4 +- systemtap.spec | 1 + tapsets.cxx | 3 +- testsuite/systemtap.server/client.exp | 174 ++++++----- testsuite/systemtap.server/client_args.exp | 39 +++- .../unprivileged_embedded_C.exp | 59 +++-- .../systemtap.unprivileged/unprivileged_myproc.exp | 131 ++++++--- .../unprivileged_options.exp | 48 +++ .../systemtap.unprivileged/unprivileged_probes.exp | 125 ++++++--- translate.cxx | 5 +- 21 files changed, 713 insertions(+), 382 deletions(-) create mode 100644 testsuite/systemtap.unprivileged/unprivileged_options.exp hooks/post-receive -- systemtap: system-wide probe/trace tool