Brian Kolaci wrote:
> Hi,
>
> A customer would like to run DTrace on some production boxes
> however they need a way to prove that no destructive actions
> can be taken, not even by accident.  This "proof" is required
> before they can do anything on the production boxes.
>
> Is there an executable or possibly an RBAC controllable
> action that can be done to strip the "-w" functionality from
> the DTrace executable?  Or possibly strip some privileges that
> won't allow DTrace to do anything destructive?
>
> Thanks,
>
> Brian 
> _______________________________________________
> dtrace-discuss mailing list
> dtrace-discuss@opensolaris.org
>   
According to the manual, if you give all of the dtrace privs to a normal 
user, that user can access everything except destructive actions, which 
is still reserved for the super user.  As such a user a ran a script 
that did a "chip(10)", and got the following error:

dtrace: error on enabled probe ID 3 (ID 13: syscall::read:return): 
invalid kernel access in action #2


Chip
_______________________________________________
dtrace-discuss mailing list
dtrace-discuss@opensolaris.org

Reply via email to