Skip to navigation

Bug Fix Advisory systemtap bug fix update

Advisory: RHBA-2012:0200-1
Type: Bug Fix Advisory
Severity: N/A
Issued on: 2012-02-20
Last updated on: 2012-02-20
Affected Products: Red Hat Enterprise Linux (v. 5 server)
Red Hat Enterprise Linux Desktop (v. 5 client)

Details

Updated systemtap packages that fix various bugs are now available for Red Hat
Enterprise Linux 5.

SystemTap provides infrastructure to simplify the gathering of information about
the running Linux system. This assists diagnosis of a performance or a
functional problem. Developers can write scripts to collect data without the
need to go through the tedious and disruptive instrument, recompile, install,
and reboot sequence that may be otherwise required to collect data.

The systemtap package has been upgraded to upstream version 1.6, which provides
a number of bug fixes and enhancements over the previous version. (BZ#683481)

This update fixes the following bugs:

* When running the "with server" portion of the SystemTap buildok test suite,
the server needs an authorized certificate for signing the code the compiler
server built. In some cases, a client running the test suite never obtained the
authorized certificate. Consequently, additional failures were reported by the
test suite compared to the self-hosted buildok test runs. This bug has been
fixed and now, results for the "with server" portion of test suite and the
self-hosted test suite match. (BZ#718678)

* The systemtap data structure to track address accesses requires a locking
mechanism to prevent data corruption. Previously, spinlocks were used but they
caused kernel panics if excessive contention for reading the data structure
occurred. With this update, the locking mechanism has been changed to rwlock,
which allows concurrent reading of the data structure, thus fixing this bug.
(BZ#709190)

* For some error conditions (such as "out of memory"), the debugfs directory
associated with a systemtap script remained in the system even after the script
exited. Consequently, other scripts run afterwards were unable to create their
own debugfs directory until the system had been rebooted. With this update, the
runtime transport code has been updated to remove debugfs directories every time
a systemtap script exits. (BZ#711976)

* Previously, tracepoint names for softirq probe points (used in older kernels)
and for the irq.stp tapset (used in newer kernels) did not match. Consequently,
the softirq.* probe points were not found on kernels in Red Hat Enterprise Linux
5. Now, the irq.stp tapset has been updated to allow systemtap to find older
softirq probe points in older kernels. (BZ#706185)

* In some cases, the operands in the newest version of user-space markers could
not be parsed, causing some tests to fail. With this update, SystemTap parsing
of marker arguments has been fixed to handle the operands for the newest version
of user-space markers and the tests now pass as expected. (BZ#757118)

* The memory-write_shared_copy.stp test uses the memory.stp tapset's
vm.write_shared_copy probe. In earlier versions of systemtap, this probe was a
dummy, letting the test case falsely pass. In later versions, it became a real
probe, but due to incomplete debug information generated by the gcc compiler, it
cannot be fully resolved on a Red Hat Enterprise Linux 5 kernel. Consequently,
the test case fails. This appeared as a regression, because the earlier pass of
the test was in fact false. With this update, this test case has been designated
as a "KFAIL" (known failure) and is no longer considered a regression.
(BZ#757723)

Users of systemtap are advised to upgrade to these updated packages, which fix
these bugs.


Solution

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/kb/docs/DOC-11259

Updated packages

Red Hat Enterprise Linux (v. 5 server)

SRPMS:
systemtap-1.6-6.el5.src.rpm
File outdated by:  RHBA-2013:0058
    MD5: 364cd17aa8fdeb8b5cd2f43bc1442382
SHA-256: 9d58ec41f76cd9e90b3b6ef499bc0bc405828ee0347bc620fd230db95b44fd16
 
IA-32:
systemtap-1.6-6.el5.i386.rpm
File outdated by:  RHBA-2013:0058
    MD5: c3d8e1a04f3c49a7cc4694d15f5f093a
SHA-256: 744e4301760dbbf04fe9742788c570fea7a129aed71fc77572bfdb2649149398
systemtap-initscript-1.6-6.el5.i386.rpm
File outdated by:  RHBA-2013:0058
    MD5: 3fbf1294f6ab7f13c16f73a300eabfc4
SHA-256: c2c9c697f345208ed81966a4fc3410ac8eb22f5a1a9b67294be0f70e7b5d7b96
systemtap-runtime-1.6-6.el5.i386.rpm
File outdated by:  RHBA-2013:0058
    MD5: 1ccbe73ea9c4997a0926e1cd4e7c4eb6
SHA-256: 35605fefeaea2d28e0b067e7ea38e6fa9c22a186f7d721a56ff67c599eb169b7
systemtap-sdt-devel-1.6-6.el5.i386.rpm
File outdated by:  RHBA-2013:0058
    MD5: ddb48205a916820c93cb57bd6da3b13c
SHA-256: 364364865f8da7262f5a2efec7512c6069e2bf50265ee95fc11622d688cbb7cd
systemtap-server-1.6-6.el5.i386.rpm
File outdated by:  RHBA-2013:0058
    MD5: a7a989dedcd9e3f7cfba6927db10f324
SHA-256: 6779c847e886aa6b10b1eb23b41cabb1406478c4e45a91dfb8ccede3fb4092ef
systemtap-testsuite-1.6-6.el5.i386.rpm
File outdated by:  RHBA-2013:0058
    MD5: 82859a920680398443689f56207cf79c
SHA-256: 6a2185911e1750e8a27315e3e6c4f8a3a63991b3b958482406b80343a6df5aef
 
IA-64:
systemtap-1.6-6.el5.ia64.rpm
File outdated by:  RHBA-2013:0058
    MD5: c71dbd40646b4a1b60295ea6b2745e94
SHA-256: e3b3b24586c6d9082f81a09e5b641c59126f8e4b5ac364a54ede2a55d8161f5a
systemtap-initscript-1.6-6.el5.ia64.rpm
File outdated by:  RHBA-2013:0058
    MD5: 698ac6e24703345fe1d624dafd06cf4a
SHA-256: 798f8a5c9b40a715003941f191598707a141f1703fe19b5278d0071a4a58d4a6
systemtap-runtime-1.6-6.el5.ia64.rpm
File outdated by:  RHBA-2013:0058
    MD5: 7916ab590223900349beb60aa43ba300
SHA-256: d1a27976ecec4b1a828f9b2454c9942f888ae3fe368235dbf94dc9b54a6994cd
systemtap-sdt-devel-1.6-6.el5.ia64.rpm
File outdated by:  RHBA-2013:0058
    MD5: 2bde219ce4795250b66cb38646147148
SHA-256: 27dba86be8617b91a63f7beecf51237707f88809e8d804c3967c452e703e5856
systemtap-server-1.6-6.el5.ia64.rpm
File outdated by:  RHBA-2013:0058
    MD5: 25e0701f000aeae69897df02e8c5492d
SHA-256: 28f08932725ad0dbc3823366f634482b430db60269fc72b7e242735990eb8181
systemtap-testsuite-1.6-6.el5.ia64.rpm
File outdated by:  RHBA-2013:0058
    MD5: ed92d32e9cafaad284d4e512d5842382
SHA-256: c917c1f0308b24a16cfeec171b165ba1698f725b107daf47e5967befeb636502
 
PPC:
systemtap-1.6-6.el5.ppc64.rpm
File outdated by:  RHBA-2013:0058
    MD5: 33360b1d29ae92fd8de0df461e4213c5
SHA-256: 3fb44fcb4781de9b93004ca6f3b11439ee1c7e5af8eb10364e24765b700bce03
systemtap-initscript-1.6-6.el5.ppc64.rpm
File outdated by:  RHBA-2013:0058
    MD5: dcb0cb93d31ed4c66e6f6311ed6cfca7
SHA-256: 5da051e437e071ec5a623daf6d9bb939911973f94c3a73d6101a480086e0f9c5
systemtap-runtime-1.6-6.el5.ppc64.rpm
File outdated by:  RHBA-2013:0058
    MD5: 989b463cd18ddd31094fc7f3d382c110
SHA-256: bcb3f2d485595e605653bc27bcda7336bea62db0b5633093de31e2cf51f7562b
systemtap-sdt-devel-1.6-6.el5.ppc64.rpm
File outdated by:  RHBA-2013:0058
    MD5: b9f478dd3955b207d91fc122c6e7bea4
SHA-256: d11d40b36b1502e557094f5b664797e96628eceaffd36f69f5339de3f52ae9ac
systemtap-server-1.6-6.el5.ppc64.rpm
File outdated by:  RHBA-2013:0058
    MD5: 201cebde3f5133f0493a622a55e60c1a
SHA-256: 5ab092bdb647a8b3f304c6d533a8bc9aa811e32b6cf6954a4a16bd7ed2cd26be
systemtap-testsuite-1.6-6.el5.ppc64.rpm
File outdated by:  RHBA-2013:0058
    MD5: fd17a3935984242375c03f59f6851697
SHA-256: df47cc159dff7e65418c2e0bf41bfcafa91a474a27080aed880ad5fffe997028
 
s390x:
systemtap-1.6-6.el5.s390x.rpm
File outdated by:  RHBA-2013:0058
    MD5: 71c3c0f7d0e9508d0c8a52d593d69e44
SHA-256: 00ca632ae6f3e71b61033643d954868f3f7f64df260b54810d2a3be3d028d5e2
systemtap-initscript-1.6-6.el5.s390x.rpm
File outdated by:  RHBA-2013:0058
    MD5: 43d62570069ea94e5320ed46793a2927
SHA-256: 034f7d299c1f1a3221d3f20a892e38f91583d77f429a16d87503562047fda65b
systemtap-runtime-1.6-6.el5.s390x.rpm
File outdated by:  RHBA-2013:0058
    MD5: ba5d8a9e0f6ceeeec135a540a55f6b2c
SHA-256: 5f4d52877ba84859d816660b7f2ef5f871af8e8022f29e21e31d92109f2a33c3
systemtap-sdt-devel-1.6-6.el5.s390.rpm
File outdated by:  RHBA-2013:0058
    MD5: 6b66728a998bad903644c26174b213eb
SHA-256: f1248a2e8fe19512a928f25d76b204b21502e74fbd103d95269f4aece39090e0
systemtap-sdt-devel-1.6-6.el5.s390x.rpm
File outdated by:  RHBA-2013:0058
    MD5: 6a424a49308b0f388a48cbd330b1472f
SHA-256: 80b4cc54270fda1ce305ab21c3bb74f045e78b8f50048d657ef9a4534dfac2db
systemtap-server-1.6-6.el5.s390x.rpm
File outdated by:  RHBA-2013:0058
    MD5: 300c043abd0aee0e88bb2d79b7ecc66b
SHA-256: 04522c9d1ebfed4fe41683eb1a1c8ef93d2a2eda4fbb038ef145087b419566da
systemtap-testsuite-1.6-6.el5.s390x.rpm
File outdated by:  RHBA-2013:0058
    MD5: 46bcf524c81ebec11494e2219ebf16d4
SHA-256: f12dd65b07cf185d9831dddea762b4b9303671001c7ba5a8b84de01f86588f24
 
x86_64:
systemtap-1.6-6.el5.x86_64.rpm
File outdated by:  RHBA-2013:0058
    MD5: 476d6ca412b8e69b11feb9d4bf20fa30
SHA-256: 0d589b26e786d92fb3f0e220c82d51a65c7833e739767287f1c512d32ecd127a
systemtap-initscript-1.6-6.el5.x86_64.rpm
File outdated by:  RHBA-2013:0058
    MD5: 10c7abb751b18d99d9296d9ba56bd835
SHA-256: 8de540dea3ecb437413f601a15bdf1cc04dc91d10a0f9896329320eadb69c614
systemtap-runtime-1.6-6.el5.x86_64.rpm
File outdated by:  RHBA-2013:0058
    MD5: 5100342f556644f9dcc81d2af767ad99
SHA-256: 6c119bd1aff7b78e882aec2bd568b35c8cb155f1e5ba1ed3b1b907d7576d5496
systemtap-sdt-devel-1.6-6.el5.i386.rpm
File outdated by:  RHBA-2013:0058
    MD5: ddb48205a916820c93cb57bd6da3b13c
SHA-256: 364364865f8da7262f5a2efec7512c6069e2bf50265ee95fc11622d688cbb7cd
systemtap-sdt-devel-1.6-6.el5.x86_64.rpm
File outdated by:  RHBA-2013:0058
    MD5: 257df91830e92fe73e619814b40cb0b0
SHA-256: 09c80c3442c32d0c35fdcd5972f00425a3cc184b95b9b2e1885120cffb0d8982
systemtap-server-1.6-6.el5.x86_64.rpm
File outdated by:  RHBA-2013:0058
    MD5: 8b687c5361fc539cea28d8f921331326
SHA-256: ba1d5fd3464616827f2c30c564ce6a768b168f9166db94d1eea20c04f5f00a55
systemtap-testsuite-1.6-6.el5.x86_64.rpm
File outdated by:  RHBA-2013:0058
    MD5: 7f76c8769588d10972b8908abbaa2ea2
SHA-256: 5fb4b0446aca12406fb374ed531047a5b4445ed7f686a1687f613a822a1b7ff6
 
Red Hat Enterprise Linux Desktop (v. 5 client)

SRPMS:
systemtap-1.6-6.el5.src.rpm
File outdated by:  RHBA-2013:0058
    MD5: 364cd17aa8fdeb8b5cd2f43bc1442382
SHA-256: 9d58ec41f76cd9e90b3b6ef499bc0bc405828ee0347bc620fd230db95b44fd16
 
IA-32:
systemtap-1.6-6.el5.i386.rpm
File outdated by:  RHBA-2013:0058
    MD5: c3d8e1a04f3c49a7cc4694d15f5f093a
SHA-256: 744e4301760dbbf04fe9742788c570fea7a129aed71fc77572bfdb2649149398
systemtap-initscript-1.6-6.el5.i386.rpm
File outdated by:  RHBA-2013:0058
    MD5: 3fbf1294f6ab7f13c16f73a300eabfc4
SHA-256: c2c9c697f345208ed81966a4fc3410ac8eb22f5a1a9b67294be0f70e7b5d7b96
systemtap-runtime-1.6-6.el5.i386.rpm
File outdated by:  RHBA-2013:0058
    MD5: 1ccbe73ea9c4997a0926e1cd4e7c4eb6
SHA-256: 35605fefeaea2d28e0b067e7ea38e6fa9c22a186f7d721a56ff67c599eb169b7
systemtap-sdt-devel-1.6-6.el5.i386.rpm
File outdated by:  RHBA-2013:0058
    MD5: ddb48205a916820c93cb57bd6da3b13c
SHA-256: 364364865f8da7262f5a2efec7512c6069e2bf50265ee95fc11622d688cbb7cd
systemtap-server-1.6-6.el5.i386.rpm
File outdated by:  RHBA-2013:0058
    MD5: a7a989dedcd9e3f7cfba6927db10f324
SHA-256: 6779c847e886aa6b10b1eb23b41cabb1406478c4e45a91dfb8ccede3fb4092ef
systemtap-testsuite-1.6-6.el5.i386.rpm
File outdated by:  RHSA-2012:0376
    MD5: 82859a920680398443689f56207cf79c
SHA-256: 6a2185911e1750e8a27315e3e6c4f8a3a63991b3b958482406b80343a6df5aef
 
x86_64:
systemtap-1.6-6.el5.x86_64.rpm
File outdated by:  RHBA-2013:0058
    MD5: 476d6ca412b8e69b11feb9d4bf20fa30
SHA-256: 0d589b26e786d92fb3f0e220c82d51a65c7833e739767287f1c512d32ecd127a
systemtap-initscript-1.6-6.el5.x86_64.rpm
File outdated by:  RHBA-2013:0058
    MD5: 10c7abb751b18d99d9296d9ba56bd835
SHA-256: 8de540dea3ecb437413f601a15bdf1cc04dc91d10a0f9896329320eadb69c614
systemtap-runtime-1.6-6.el5.x86_64.rpm
File outdated by:  RHBA-2013:0058
    MD5: 5100342f556644f9dcc81d2af767ad99
SHA-256: 6c119bd1aff7b78e882aec2bd568b35c8cb155f1e5ba1ed3b1b907d7576d5496
systemtap-sdt-devel-1.6-6.el5.i386.rpm
File outdated by:  RHBA-2013:0058
    MD5: ddb48205a916820c93cb57bd6da3b13c
SHA-256: 364364865f8da7262f5a2efec7512c6069e2bf50265ee95fc11622d688cbb7cd
systemtap-sdt-devel-1.6-6.el5.x86_64.rpm
File outdated by:  RHBA-2013:0058
    MD5: 257df91830e92fe73e619814b40cb0b0
SHA-256: 09c80c3442c32d0c35fdcd5972f00425a3cc184b95b9b2e1885120cffb0d8982
systemtap-server-1.6-6.el5.x86_64.rpm
File outdated by:  RHBA-2013:0058
    MD5: 8b687c5361fc539cea28d8f921331326
SHA-256: ba1d5fd3464616827f2c30c564ce6a768b168f9166db94d1eea20c04f5f00a55
systemtap-testsuite-1.6-6.el5.x86_64.rpm
File outdated by:  RHSA-2012:0376
    MD5: 7f76c8769588d10972b8908abbaa2ea2
SHA-256: 5fb4b0446aca12406fb374ed531047a5b4445ed7f686a1687f613a822a1b7ff6
 
(The unlinked packages above are only available from the Red Hat Network)

Bugs fixed (see bugzilla for more information)

683481 - Rebase to systemtap 1.6 for rhel5.8
706185 - softirq.* probes do not work on el5 kernels
757118 - semok/thirtysix.stp PASS -> FAIL
757723 - buildok/memory-write_shared_copy.stp fails to build



These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/