Skip to navigation

Enhancement Advisory systemtap enhancement update

Advisory: RHEA-2009:0184-3
Type: Product Enhancement Advisory
Severity: N/A
Issued on: 2009-01-20
Last updated on: 2009-01-20
Affected Products: Red Hat Enterprise Linux (v. 5 server)
Red Hat Enterprise Linux Desktop (v. 5 client)

Details

Updated systemtap packages that add enhancements are now available.

SystemTap provides an instrumentation infrastructure for systems running
the Linux 2.6 kernel. Developers can write scripts to collect data on the
operation of the system.

These updated packages add the following enhancements:

* An initial implementation of user-space probing. With debugging
information available, probes such as the following now work:

probe process("ls").function("*").call { log ($$parms) }

* Several extensions of the probing blacklist and the trace management
component, which increase robustness.

* Several extensions of the scripting language and translator automation to
make some common tracing operations more compact.

* An avahi-based compile client/server script suite have been added, which
permit a systemtap development environment (stap, gcc, kernel
devel/debuginfo) to be installed at a central remote server that clients
can automatically use. This prototype is bundled into the systemtap-client
and systemtap-server subrpms.

* the systemtap packages have been updated to the latest upstream version,
as of September 2008. For further information, refer to the
"/usr/share/doc/systemtap-[version]/NEWS" file.

Note: the Linux kernel may become unstable with excessive wildcard usage
that probes every part of the kernel. As well, certain test suite failures
(which do not pose any major issues) can occur due to debuginfo limitations
or incomplete tapset porting.

SystemTap is no longer a technical preview, and now has production
support. It is recommended to run scripts on development machines
before deployment in production environments. Since SystemTap is an
optional diagnostic tool, if it causes problems, users can simply stop
using the tool in that way. Options such as "-g" for Guru mode, and "-D*",
allow users to disable several security checks. Scripts using these options
may not be supported.

Red Hat plans to fix problems in SystemTap, or the Linux kernel,
as they arise in connection with new scripts. In some cases, a fix may
include extending the blacklist for known areas of the Linux kernel that
are unsafe to probe. In such a case, scripts causing these problems would
have to be changed.

Users of systemtap are advised to upgrade to these updated packages, which
add these enhancements.


Solution

Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.

This update is available via Red Hat Network. Details on how to use
the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/FAQ_58_10188

Updated packages

Red Hat Enterprise Linux (v. 5 server)

SRPMS:
systemtap-0.7.2-2.el5.src.rpm
File outdated by:  RHBA-2013:0058
    MD5: 141e1803941a0024f0226012d68e80cd
 
IA-32:
systemtap-0.7.2-2.el5.i386.rpm
File outdated by:  RHBA-2013:0058
    MD5: 62d9b88f031288670367788f16e10f49
systemtap-client-0.7.2-2.el5.i386.rpm
File outdated by:  RHBA-2013:0058
    MD5: 3d00f1f7a33d5f96b0343d3d677e1b4b
systemtap-runtime-0.7.2-2.el5.i386.rpm
File outdated by:  RHBA-2013:0058
    MD5: b022a430b2731bf024b38aff91b72f08
systemtap-server-0.7.2-2.el5.i386.rpm
File outdated by:  RHBA-2013:0058
    MD5: 016a9acfb6974acbd58a0143f4c0453a
systemtap-testsuite-0.7.2-2.el5.i386.rpm
File outdated by:  RHBA-2013:0058
    MD5: 9a671a8bef39e750415ca1c9364c1a51
 
IA-64:
systemtap-0.7.2-2.el5.ia64.rpm
File outdated by:  RHBA-2013:0058
    MD5: ef32e423977eddeff68279f171376b10
systemtap-client-0.7.2-2.el5.ia64.rpm
File outdated by:  RHBA-2013:0058
    MD5: b9406637911ea915d5bef472972d261e
systemtap-runtime-0.7.2-2.el5.ia64.rpm
File outdated by:  RHBA-2013:0058
    MD5: 479830764899dbf9b99c9f5fc35dfefb
systemtap-server-0.7.2-2.el5.ia64.rpm
File outdated by:  RHBA-2013:0058
    MD5: ce1fa1216603e4c340a9efd2d1e9dd3a
systemtap-testsuite-0.7.2-2.el5.ia64.rpm
File outdated by:  RHBA-2013:0058
    MD5: 3e704de8f690b64dc0a237313ebc6f48
 
PPC:
systemtap-0.7.2-2.el5.ppc64.rpm
File outdated by:  RHBA-2013:0058
    MD5: 889bad59462b9280e41cd4b440688ffd
systemtap-client-0.7.2-2.el5.ppc64.rpm
File outdated by:  RHBA-2013:0058
    MD5: e23204581d18b5393fbce65020a57a35
systemtap-runtime-0.7.2-2.el5.ppc64.rpm
File outdated by:  RHBA-2013:0058
    MD5: 669b77b960e55578b6987b0c8f0d9333
systemtap-server-0.7.2-2.el5.ppc64.rpm
File outdated by:  RHBA-2013:0058
    MD5: 84cd57550668bc9527ac1e98b1c8bf3d
systemtap-testsuite-0.7.2-2.el5.ppc64.rpm
File outdated by:  RHBA-2013:0058
    MD5: 99376e4e1e8559972c763d972c2fe39e
 
s390x:
systemtap-0.7.2-2.el5.s390x.rpm
File outdated by:  RHBA-2013:0058
    MD5: eb88fd07cf9fb20df8549c5419e173c9
systemtap-client-0.7.2-2.el5.s390x.rpm
File outdated by:  RHBA-2013:0058
    MD5: b8a1c2715103654aee7bee03231a5766
systemtap-runtime-0.7.2-2.el5.s390x.rpm
File outdated by:  RHBA-2013:0058
    MD5: 2545373fc2c3711c9aa5b57c84b37b34
systemtap-server-0.7.2-2.el5.s390x.rpm
File outdated by:  RHBA-2013:0058
    MD5: dd23b643587a5a12300dc4fdf349565e
systemtap-testsuite-0.7.2-2.el5.s390x.rpm
File outdated by:  RHBA-2013:0058
    MD5: 2e18e7bd24e9cf56d251cedd64e3cd19
 
x86_64:
systemtap-0.7.2-2.el5.x86_64.rpm
File outdated by:  RHBA-2013:0058
    MD5: b30ea1d1161faf9074cce5fe1630b7b3
systemtap-client-0.7.2-2.el5.x86_64.rpm
File outdated by:  RHBA-2013:0058
    MD5: 93fec8a054f76e55c9497d9e4ac32bf7
systemtap-runtime-0.7.2-2.el5.x86_64.rpm
File outdated by:  RHBA-2013:0058
    MD5: d78dc619626d81ab6318842eddaa623a
systemtap-server-0.7.2-2.el5.x86_64.rpm
File outdated by:  RHBA-2013:0058
    MD5: 37c276ca991f95d3cb5c3a0060dcd979
systemtap-testsuite-0.7.2-2.el5.x86_64.rpm
File outdated by:  RHBA-2013:0058
    MD5: c2d9d5ae040ef3db5d0fc90e6d8bb367
 
Red Hat Enterprise Linux Desktop (v. 5 client)

SRPMS:
systemtap-0.7.2-2.el5.src.rpm
File outdated by:  RHBA-2013:0058
    MD5: 141e1803941a0024f0226012d68e80cd
 
IA-32:
systemtap-0.7.2-2.el5.i386.rpm
File outdated by:  RHBA-2013:0058
    MD5: 62d9b88f031288670367788f16e10f49
systemtap-client-0.7.2-2.el5.i386.rpm
File outdated by:  RHBA-2013:0058
    MD5: 3d00f1f7a33d5f96b0343d3d677e1b4b
systemtap-runtime-0.7.2-2.el5.i386.rpm
File outdated by:  RHBA-2013:0058
    MD5: b022a430b2731bf024b38aff91b72f08
systemtap-server-0.7.2-2.el5.i386.rpm
File outdated by:  RHBA-2013:0058
    MD5: 016a9acfb6974acbd58a0143f4c0453a
systemtap-testsuite-0.7.2-2.el5.i386.rpm
File outdated by:  RHSA-2012:0376
    MD5: 9a671a8bef39e750415ca1c9364c1a51
 
x86_64:
systemtap-0.7.2-2.el5.x86_64.rpm
File outdated by:  RHBA-2013:0058
    MD5: b30ea1d1161faf9074cce5fe1630b7b3
systemtap-client-0.7.2-2.el5.x86_64.rpm
File outdated by:  RHBA-2013:0058
    MD5: 93fec8a054f76e55c9497d9e4ac32bf7
systemtap-runtime-0.7.2-2.el5.x86_64.rpm
File outdated by:  RHBA-2013:0058
    MD5: d78dc619626d81ab6318842eddaa623a
systemtap-server-0.7.2-2.el5.x86_64.rpm
File outdated by:  RHBA-2013:0058
    MD5: 37c276ca991f95d3cb5c3a0060dcd979
systemtap-testsuite-0.7.2-2.el5.x86_64.rpm
File outdated by:  RHSA-2012:0376
    MD5: c2d9d5ae040ef3db5d0fc90e6d8bb367
 
(The unlinked packages above are only available from the Red Hat Network)

Bugs fixed (see bugzilla for more information)

441859 - rhel5.3: systemtap refresh
464010 - uprobes on cloney shells can cause SEGV
467652 - Systemtap regression "-c" doesn't allow for shell redirection.
468139 - regression: Unused (unread ?) global variables are being displayed.
468759 - misinherited uretprobes
469199 - systemtap testsuite regressions
469201 - syscall tapset broken on s390x
469203 - vfs tapset broken on RHEL5.3



These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/