From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (qmail 24561 invoked by alias); 14 Jun 2012 21:57:10 -0000 Received: (qmail 24551 invoked by uid 22791); 14 Jun 2012 21:57:09 -0000 X-SWARE-Spam-Status: No, hits=-2.9 required=5.0 tests=ALL_TRUSTED,AWL,BAYES_00,TW_GF X-Spam-Check-By: sourceware.org Received: from localhost (HELO sourceware.org) (127.0.0.1) by sourceware.org (qpsmtpd/0.43rc1) with ESMTP; Thu, 14 Jun 2012 21:56:57 +0000 From: "jistone at redhat dot com" To: systemtap@sourceware.org Subject: [Bug runtime/14245] New: Support debugfs mounted 0700 Date: Thu, 14 Jun 2012 21:57:00 -0000 X-Bugzilla-Reason: AssignedTo X-Bugzilla-Type: new X-Bugzilla-Watch-Reason: None X-Bugzilla-Product: systemtap X-Bugzilla-Component: runtime X-Bugzilla-Keywords: X-Bugzilla-Severity: enhancement X-Bugzilla-Who: jistone at redhat dot com X-Bugzilla-Status: NEW X-Bugzilla-Priority: P2 X-Bugzilla-Assigned-To: systemtap at sourceware dot org X-Bugzilla-Target-Milestone: --- X-Bugzilla-Changed-Fields: Message-ID: X-Bugzilla-URL: http://sourceware.org/bugzilla/ Auto-Submitted: auto-generated Content-Type: text/plain; charset="UTF-8" MIME-Version: 1.0 Mailing-List: contact systemtap-help@sourceware.org; run by ezmlm Precedence: bulk List-Id: List-Subscribe: List-Post: List-Help: , Sender: systemtap-owner@sourceware.org X-SW-Source: 2012-q2/txt/msg00262.txt.bz2 http://sourceware.org/bugzilla/show_bug.cgi?id=14245 Bug #: 14245 Summary: Support debugfs mounted 0700 Product: systemtap Version: unspecified Status: NEW Severity: enhancement Priority: P2 Component: runtime AssignedTo: systemtap@sourceware.org ReportedBy: jistone@redhat.com Classification: Unclassified Related to bug #14244, it would be nice we could support non-root users running on systems with mode 0700 debugfs. Apparently Ubuntu has started defaulting this way. See again this thread: http://sourceware.org/ml/systemtap/2012-q2/msg00243.html There I briefly started brainstorming what would be needed, "We could open the directory in staprun and do the access check with faccessat(). Then we'd have to also pass a control_channel fd across the exec to stapio, since it can't open that path itself." This will require a good dose of security-conscious caution. -- Configure bugmail: http://sourceware.org/bugzilla/userprefs.cgi?tab=email ------- You are receiving this mail because: ------- You are the assignee for the bug.