- Issued:
- 2008-05-21
- Updated:
- 2008-05-21
RHBA-2008:0461 - Bug Fix Advisory
Synopsis
frysk bug fix and enhancement update
Type/Severity
Bug Fix Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
Updated frysk technology preview packages that fix several bugs and add
enhancements are now available.
Description
Frysk is an execution-analysis technology implemented using native Java and
C++. It provides developers and system administrators with the ability to
examine and analyze multi-host, multi-process, and multithreaded systems
while they are running.
These updated packages fix the following bugs:
- when running "frysk" as the root user, it was possible to select and
attach an observer to the init process. In these updated packages, it is no
longer possible to select or attach an observer to the init process, which
resolves this issue.
- in certain situations, "fstep" did not start stepping at the first
instruction. For example, the "Total steps" were different each time the
"fstep true" command was ran. In these updated packages, "fstep" correctly
starts stepping at the first instruction, which resolves this issue.
- the "fcore" command was unable to handle detaching when it involved a
pending signal. In these situations, signals could be dropped during
detachment. In these updated packages, "fcore" correctly handles pending
signals, which resolves this issue.
In these technology preview packages, the following limitations apply:
- when stopped, or instruction-stepping through an AMD64 or Intel(R) 64 PLT
entry, the stack trace is incorrectly truncated to a single frame.
- the "-sysroot /path/to/rooted/directory" option is limited to finding
source code and separate debug-information, which are contained in the
"-debuginfo" RPM. Certain executables and shared libraries in the directory
specified with "-sysroot" are ignored.
- when using "fcatch" to generate a stack trace of a program with many
shared libraries, the fcatch processes uses a very large amount of resident
memory, for example, 1GB.
- the fhpd "disassemble" command, and the "fstep" utility print hexadecimal
memory dumps, instead of assembler.
- the expression parser has limited support for type-casts; therefore,
complex casts, for example, "(fhpd) print (const char *)0x1234", do not
work.
- it is not possible to load several executables and then only run the
first, for example, the "(fhpd) load /bin/ls // (fhpd) load /bin/bash //
(fhpd) [0.0] run" command will fail. As well, the kill command was unable
to handle multithreaded processes consistently. For example, in certain
situations, using the kill command to remove a process caused an error,
instead of returning normally.
As well, these updated packages add the following enhancements:
- upgrades frysk to frysk-0.0.1.2008.03.19.rh1, which includes a number of
bug fixes and enhancements.
- the "frysk-gnome" package contains a prototype visual debugging and
monitoring tool (frysk), and the "frysk-devel" package includes a prototype
test suite (funit).
Note: these updated packages are a technology preview, and as such, the
Frysk APIs, the Frysk GNOME interface, and all developer components, are
subject to change. A fully supported release of Frysk is planned for future
Red Hat Enterprise Linux releases.
Users of frysk are advised to upgrade to these updated packages, which
resolve these issues and add these enhancements.
Solution
Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.
This update is available via Red Hat Network. Details on how to use
the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/FAQ_58_10188
Affected Products
- Red Hat Enterprise Linux Server 5 x86_64
- Red Hat Enterprise Linux Server 5 i386
- Red Hat Enterprise Linux Workstation 5 x86_64
- Red Hat Enterprise Linux Workstation 5 i386
- Red Hat Enterprise Linux Desktop 5 x86_64
- Red Hat Enterprise Linux Desktop 5 i386
- Red Hat Enterprise Linux Server from RHUI 5 x86_64
- Red Hat Enterprise Linux Server from RHUI 5 i386
Fixes
- BZ - 300751 - frysk looses attach signal during detach
CVEs
(none)
References
Red Hat Enterprise Linux Server 5
SRPM | |
---|---|
frysk-0.0.1.2008.03.19.rh1-1.el5.src.rpm | SHA-256: 1d54400a41adb93327dc82343d784f322eaa624fe25dd4bd08ca3bb1c3bc341a |
x86_64 | |
frysk-0.0.1.2008.03.19.rh1-1.el5.x86_64.rpm | SHA-256: 73168b2f461fe4391a4fa7ff85fbfaace8b08aae21bf407ff5e3362f9bea4652 |
frysk-devel-0.0.1.2008.03.19.rh1-1.el5.i686.rpm | SHA-256: 5008302118ce6c2eec0b57517f17fe413212dc669b424e7046cfc0a91773a3b5 |
frysk-devel-0.0.1.2008.03.19.rh1-1.el5.x86_64.rpm | SHA-256: 1cc41c1a5e14b252ba47e8eefd0d002d0a1af15583cde4b6350cec6eafdabf7f |
frysk-gnome-0.0.1.2008.03.19.rh1-1.el5.x86_64.rpm | SHA-256: 7a9dcd00381ff07d2a944b9acb8f82c1ca127461604a90275948195aa7bfe92e |
i386 | |
frysk-0.0.1.2008.03.19.rh1-1.el5.i686.rpm | SHA-256: bdd279848b36345c15a306aa46690680dc0c3d6aca7df8ffd8431dcba15be083 |
frysk-devel-0.0.1.2008.03.19.rh1-1.el5.i686.rpm | SHA-256: 5008302118ce6c2eec0b57517f17fe413212dc669b424e7046cfc0a91773a3b5 |
frysk-gnome-0.0.1.2008.03.19.rh1-1.el5.i686.rpm | SHA-256: 702708cbf04e647096c94e2a557e8ebd82daefe3df1de54b23ac5f9ac1af24fc |
Red Hat Enterprise Linux Workstation 5
SRPM | |
---|---|
frysk-0.0.1.2008.03.19.rh1-1.el5.src.rpm | SHA-256: 1d54400a41adb93327dc82343d784f322eaa624fe25dd4bd08ca3bb1c3bc341a |
x86_64 | |
frysk-0.0.1.2008.03.19.rh1-1.el5.x86_64.rpm | SHA-256: 73168b2f461fe4391a4fa7ff85fbfaace8b08aae21bf407ff5e3362f9bea4652 |
frysk-devel-0.0.1.2008.03.19.rh1-1.el5.i686.rpm | SHA-256: 5008302118ce6c2eec0b57517f17fe413212dc669b424e7046cfc0a91773a3b5 |
frysk-devel-0.0.1.2008.03.19.rh1-1.el5.x86_64.rpm | SHA-256: 1cc41c1a5e14b252ba47e8eefd0d002d0a1af15583cde4b6350cec6eafdabf7f |
frysk-gnome-0.0.1.2008.03.19.rh1-1.el5.x86_64.rpm | SHA-256: 7a9dcd00381ff07d2a944b9acb8f82c1ca127461604a90275948195aa7bfe92e |
i386 | |
frysk-0.0.1.2008.03.19.rh1-1.el5.i686.rpm | SHA-256: bdd279848b36345c15a306aa46690680dc0c3d6aca7df8ffd8431dcba15be083 |
frysk-devel-0.0.1.2008.03.19.rh1-1.el5.i686.rpm | SHA-256: 5008302118ce6c2eec0b57517f17fe413212dc669b424e7046cfc0a91773a3b5 |
frysk-gnome-0.0.1.2008.03.19.rh1-1.el5.i686.rpm | SHA-256: 702708cbf04e647096c94e2a557e8ebd82daefe3df1de54b23ac5f9ac1af24fc |
Red Hat Enterprise Linux Desktop 5
SRPM | |
---|---|
frysk-0.0.1.2008.03.19.rh1-1.el5.src.rpm | SHA-256: 1d54400a41adb93327dc82343d784f322eaa624fe25dd4bd08ca3bb1c3bc341a |
x86_64 | |
frysk-0.0.1.2008.03.19.rh1-1.el5.x86_64.rpm | SHA-256: 73168b2f461fe4391a4fa7ff85fbfaace8b08aae21bf407ff5e3362f9bea4652 |
frysk-gnome-0.0.1.2008.03.19.rh1-1.el5.x86_64.rpm | SHA-256: 7a9dcd00381ff07d2a944b9acb8f82c1ca127461604a90275948195aa7bfe92e |
i386 | |
frysk-0.0.1.2008.03.19.rh1-1.el5.i686.rpm | SHA-256: bdd279848b36345c15a306aa46690680dc0c3d6aca7df8ffd8431dcba15be083 |
frysk-gnome-0.0.1.2008.03.19.rh1-1.el5.i686.rpm | SHA-256: 702708cbf04e647096c94e2a557e8ebd82daefe3df1de54b23ac5f9ac1af24fc |
Red Hat Enterprise Linux Server from RHUI 5
SRPM | |
---|---|
frysk-0.0.1.2008.03.19.rh1-1.el5.src.rpm | SHA-256: 1d54400a41adb93327dc82343d784f322eaa624fe25dd4bd08ca3bb1c3bc341a |
x86_64 | |
frysk-0.0.1.2008.03.19.rh1-1.el5.x86_64.rpm | SHA-256: 73168b2f461fe4391a4fa7ff85fbfaace8b08aae21bf407ff5e3362f9bea4652 |
frysk-devel-0.0.1.2008.03.19.rh1-1.el5.i686.rpm | SHA-256: 5008302118ce6c2eec0b57517f17fe413212dc669b424e7046cfc0a91773a3b5 |
frysk-devel-0.0.1.2008.03.19.rh1-1.el5.x86_64.rpm | SHA-256: 1cc41c1a5e14b252ba47e8eefd0d002d0a1af15583cde4b6350cec6eafdabf7f |
frysk-gnome-0.0.1.2008.03.19.rh1-1.el5.x86_64.rpm | SHA-256: 7a9dcd00381ff07d2a944b9acb8f82c1ca127461604a90275948195aa7bfe92e |
i386 | |
frysk-0.0.1.2008.03.19.rh1-1.el5.i686.rpm | SHA-256: bdd279848b36345c15a306aa46690680dc0c3d6aca7df8ffd8431dcba15be083 |
frysk-devel-0.0.1.2008.03.19.rh1-1.el5.i686.rpm | SHA-256: 5008302118ce6c2eec0b57517f17fe413212dc669b424e7046cfc0a91773a3b5 |
frysk-gnome-0.0.1.2008.03.19.rh1-1.el5.i686.rpm | SHA-256: 702708cbf04e647096c94e2a557e8ebd82daefe3df1de54b23ac5f9ac1af24fc |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.