forked from KDAB/hotspot
-
Notifications
You must be signed in to change notification settings - Fork 0
/
Copy pathelevate_perf_privileges.sh
executable file
·65 lines (55 loc) · 1.82 KB
/
elevate_perf_privileges.sh
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
#!/bin/sh
#
# SPDX-FileCopyrightText: Milian Wolff <[email protected]>
# SPDX-FileCopyrightText: 2016-2022 Klarälvdalens Datakonsult AB, a KDAB Group company, [email protected]
#
# SPDX-License-Identifier: GPL-2.0-or-later
#
if [ "$(id -u)" != "0" ]; then
echo "Error: This script must be run as root"
exit 1
fi
if [ ! -z "$1" ]; then
olduser=$(stat -c '%u' "$1")
chown "$(whoami)" "$1"
echo "rewriting to $1"
# redirect output to file, to enable parsing of output even when
# the graphical sudo helper like kdesudo isn't forwarding the text properly
$0 2>&1 | tee -a "$1"
chown "$olduser" "$1"
exit
fi
echo "querying current privileges..."
old_sysctl_state=$(sysctl kernel.kptr_restrict kernel.perf_event_paranoid | sed 's/ = /=/')
old_debug_permissions=$(stat -c "%a" /sys/kernel/debug)
old_tracing_permissions=$(stat -c "%a" /sys/kernel/debug/tracing)
printPrivileges() {
sysctl kernel.kptr_restrict kernel.perf_event_paranoid
stat -c "%n %a" /sys/kernel/debug /sys/kernel/debug/tracing
}
printPrivileges
echo
# restore old privileges when exiting this script
cleanup() {
echo "restoring old privileges..."
sysctl -wq $old_sysctl_state
mount -o remount,mode=$old_debug_permissions /sys/kernel/debug
mount -o remount,mode=$old_tracing_permissions /sys/kernel/debug/tracing
printPrivileges
}
trap cleanup EXIT
# handle term and int, such that the exit handler gets called (but only once)
# if we'd add INT and TERM to the cleanup trap above, it would get called twice
quit() {
echo "quitting..."
}
trap quit TERM INT
echo "elevating privileges..."
sysctl -wq kernel.kptr_restrict=0 kernel.perf_event_paranoid=-1
mount -o remount,mode=755 /sys/kernel/debug
mount -o remount,mode=755 /sys/kernel/debug/tracing
printPrivileges
echo
echo "privileges elevated!"
read something 2> /dev/null
echo