From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (qmail 28239 invoked by alias); 30 Jan 2012 18:51:04 -0000 Received: (qmail 28210 invoked by uid 448); 30 Jan 2012 18:51:01 -0000 Date: Mon, 30 Jan 2012 18:51:00 -0000 Message-ID: <20120130185101.28200.qmail@sourceware.org> From: brolley@sourceware.org To: systemtap-cvs@sourceware.org Subject: [SCM] systemtap: system-wide probe/trace tool branch, master, updated. release-1.6-695-g73f52eb X-Git-Refname: refs/heads/master X-Git-Reftype: branch X-Git-Oldrev: d680a5e139d81c95862277923124b16094d903cb X-Git-Newrev: 73f52eb43a66f78c21bd8e61bd25f63415f396f0 Mailing-List: contact systemtap-cvs-help@sourceware.org; run by ezmlm Precedence: bulk List-Id: List-Subscribe: List-Post: List-Help: , Sender: systemtap-cvs-owner@sourceware.org List-Archive: Reply-To: systemtap@sourceware.org X-SW-Source: 2012-q1/txt/msg00039.txt.bz2 This is an automated email from the git hooks/post-receive script. It was generated because a ref change was pushed to the repository containing the project "systemtap: system-wide probe/trace tool". The branch, master has been updated via 73f52eb43a66f78c21bd8e61bd25f63415f396f0 (commit) from d680a5e139d81c95862277923124b16094d903cb (commit) Those revisions listed above that are new to this repository have not appeared on any other notification email; so we list those revisions in full, below. - Log ----------------------------------------------------------------- commit 73f52eb43a66f78c21bd8e61bd25f63415f396f0 Author: Dave Brolley Date: Mon Jan 30 13:40:16 2012 -0500 PR 13631 and other rework of multi-privilege level support - PR 13631 - Detection of Reqested Privilege Level in stap-server - Parsing of the client's command now uses getopt_long and shares the getopt input with session.cxx - cmdline.cxx, cmdline.h - Do not allow multiple privilege-setting options to specify different privilege levels. - No longer a need for stap-serverd to generate a --privilege option for the spawned stap. - stap-serverd cannot (and no longer does) rely on knowledge of the highest signed privilege level when evaluating the user's credentials. - Simplified user credentials test against those required by the module in stap-serverd. - Some kernel.* probes were being registered for use by stapdev only. Corrected to be stapdev | stapsys. - Corrected testsuite problem which was hiding this bug. ----------------------------------------------------------------------- Summary of changes: Makefile.am | 4 +- Makefile.in | 44 ++++++- cmdline.cxx | 54 +++++++ cmdline.h | 55 ++++++++ privilege.cxx | 18 --- privilege.h | 10 +- runtime/staprun/staprun_funcs.c | 35 +++--- session.cxx | 147 +++++++------------- session.h | 3 +- stap-serverd.cxx | 102 ++++++++++---- tapsets.cxx | 4 +- .../systemtap.unprivileged/unprivileged_probes.exp | 2 +- translate.cxx | 1 - 13 files changed, 302 insertions(+), 177 deletions(-) create mode 100644 cmdline.cxx create mode 100644 cmdline.h hooks/post-receive -- systemtap: system-wide probe/trace tool