- Issued:
- 2009-01-20
- Updated:
- 2009-01-20
RHEA-2009:0184 - Product Enhancement Advisory
Synopsis
systemtap enhancement update
Type/Severity
Product Enhancement Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
Updated systemtap packages that add enhancements are now available.
Description
SystemTap provides an instrumentation infrastructure for systems running
the Linux 2.6 kernel. Developers can write scripts to collect data on the
operation of the system.
These updated packages add the following enhancements:
- An initial implementation of user-space probing. With debugging
information available, probes such as the following now work:
probe process("ls").function("*").call { log ($$parms) }
- Several extensions of the probing blacklist and the trace management
component, which increase robustness.
- Several extensions of the scripting language and translator automation to
make some common tracing operations more compact.
- An avahi-based compile client/server script suite have been added, which
permit a systemtap development environment (stap, gcc, kernel
devel/debuginfo) to be installed at a central remote server that clients
can automatically use. This prototype is bundled into the systemtap-client
and systemtap-server subrpms.
- the systemtap packages have been updated to the latest upstream version,
as of September 2008. For further information, refer to the
"/usr/share/doc/systemtap-[version]/NEWS" file.
Note: the Linux kernel may become unstable with excessive wildcard usage
that probes every part of the kernel. As well, certain test suite failures
(which do not pose any major issues) can occur due to debuginfo limitations
or incomplete tapset porting.
SystemTap is no longer a technical preview, and now has production
support. It is recommended to run scripts on development machines
before deployment in production environments. Since SystemTap is an
optional diagnostic tool, if it causes problems, users can simply stop
using the tool in that way. Options such as "-g" for Guru mode, and "-D*",
allow users to disable several security checks. Scripts using these options
may not be supported.
Red Hat plans to fix problems in SystemTap, or the Linux kernel,
as they arise in connection with new scripts. In some cases, a fix may
include extending the blacklist for known areas of the Linux kernel that
are unsafe to probe. In such a case, scripts causing these problems would
have to be changed.
Users of systemtap are advised to upgrade to these updated packages, which
add these enhancements.
Solution
Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.
This update is available via Red Hat Network. Details on how to use
the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/FAQ_58_10188
Affected Products
- Red Hat Enterprise Linux Server 5 x86_64
- Red Hat Enterprise Linux Server 5 ia64
- Red Hat Enterprise Linux Server 5 i386
- Red Hat Enterprise Linux Workstation 5 x86_64
- Red Hat Enterprise Linux Workstation 5 i386
- Red Hat Enterprise Linux Desktop 5 x86_64
- Red Hat Enterprise Linux Desktop 5 i386
- Red Hat Enterprise Linux for IBM z Systems 5 s390x
- Red Hat Enterprise Linux for Power, big endian 5 ppc
- Red Hat Enterprise Linux Server from RHUI 5 x86_64
- Red Hat Enterprise Linux Server from RHUI 5 i386
Fixes
- BZ - 441859 - rhel5.3: systemtap refresh
- BZ - 464010 - uprobes on cloney shells can cause SEGV
- BZ - 467652 - Systemtap regression "-c" doesn't allow for shell redirection.
- BZ - 468139 - regression: Unused (unread ?) global variables are being displayed.
- BZ - 468759 - misinherited uretprobes
- BZ - 469199 - systemtap testsuite regressions
- BZ - 469201 - syscall tapset broken on s390x
- BZ - 469203 - vfs tapset broken on RHEL5.3
CVEs
(none)
References
(none)
Red Hat Enterprise Linux Server 5
SRPM | |
---|---|
systemtap-0.7.2-2.el5.src.rpm | SHA-256: fa9e170829e4d292fd213e87ef4b4b7e3d7d1b19b4899d2b7d36fac5c4c13511 |
x86_64 | |
systemtap-0.7.2-2.el5.x86_64.rpm | SHA-256: 072ea26001886231041fc88568caa5fc8d475662a6bf3830f65840cec0d20507 |
systemtap-client-0.7.2-2.el5.x86_64.rpm | SHA-256: c7cf776e3234dc21bc88134c6bfbfca69de713b6277a09be78ed66ee4cdb9fdb |
systemtap-runtime-0.7.2-2.el5.x86_64.rpm | SHA-256: 988503d45f860fbbbb6762e1d22a4baa3345040398235936af862e6566082edb |
systemtap-server-0.7.2-2.el5.x86_64.rpm | SHA-256: f237e0ee266964db21ffa8acf2dac9cdca8e5431e236b07988e6527d861aea61 |
systemtap-testsuite-0.7.2-2.el5.x86_64.rpm | SHA-256: badc40a7ec8be3b4ef985cf6bbaad938f6b120f8da9c63e6fd4d4dbd5f6541ba |
ia64 | |
systemtap-0.7.2-2.el5.ia64.rpm | SHA-256: 23bde4f2066beab3b3466b913dd47061b9d2ac4d6dddf9d97542633bbe39287a |
systemtap-client-0.7.2-2.el5.ia64.rpm | SHA-256: 049c4cff4385bd8eb1703b3d7c8e804f9e3ec2989108f95aced1ba18b1cffccf |
systemtap-runtime-0.7.2-2.el5.ia64.rpm | SHA-256: b48ef692bbd491619fa12853f50af659af8b5414df62cde0f49be680481a6391 |
systemtap-server-0.7.2-2.el5.ia64.rpm | SHA-256: 472c0a92a3aac32814c98dea91ea8770524bc31cb7c3da9df3dcc539d5f337f3 |
systemtap-testsuite-0.7.2-2.el5.ia64.rpm | SHA-256: c36d5e6f19c688a191ee6e15f1c91e3f42d42349663663b2f405425c826bdf4d |
i386 | |
systemtap-0.7.2-2.el5.i386.rpm | SHA-256: eae457131d7fee68e7eca1b1eb6ef90c2f1c7b4858a971f00dc3d8c9566c6d50 |
systemtap-client-0.7.2-2.el5.i386.rpm | SHA-256: 4960e471cdf79bc3538e43615b12c9c996462afbc80e833d2ba394345a2e7651 |
systemtap-runtime-0.7.2-2.el5.i386.rpm | SHA-256: 402ace9138eeaae0724315b3badf149fad8ffaf8034d75e28e5a236eb60a8ef0 |
systemtap-server-0.7.2-2.el5.i386.rpm | SHA-256: 52c998869e0c5c26787eb78c423d74d1ebb5e7cc92e9f2ea0c58b80084406104 |
systemtap-testsuite-0.7.2-2.el5.i386.rpm | SHA-256: af1327f72e89de79b64d0a7a4583d7ab01506a72da21962afb0476228e36b7cd |
Red Hat Enterprise Linux Workstation 5
SRPM | |
---|---|
systemtap-0.7.2-2.el5.src.rpm | SHA-256: fa9e170829e4d292fd213e87ef4b4b7e3d7d1b19b4899d2b7d36fac5c4c13511 |
x86_64 | |
systemtap-0.7.2-2.el5.x86_64.rpm | SHA-256: 072ea26001886231041fc88568caa5fc8d475662a6bf3830f65840cec0d20507 |
systemtap-client-0.7.2-2.el5.x86_64.rpm | SHA-256: c7cf776e3234dc21bc88134c6bfbfca69de713b6277a09be78ed66ee4cdb9fdb |
systemtap-runtime-0.7.2-2.el5.x86_64.rpm | SHA-256: 988503d45f860fbbbb6762e1d22a4baa3345040398235936af862e6566082edb |
systemtap-server-0.7.2-2.el5.x86_64.rpm | SHA-256: f237e0ee266964db21ffa8acf2dac9cdca8e5431e236b07988e6527d861aea61 |
systemtap-testsuite-0.7.2-2.el5.x86_64.rpm | SHA-256: badc40a7ec8be3b4ef985cf6bbaad938f6b120f8da9c63e6fd4d4dbd5f6541ba |
i386 | |
systemtap-0.7.2-2.el5.i386.rpm | SHA-256: eae457131d7fee68e7eca1b1eb6ef90c2f1c7b4858a971f00dc3d8c9566c6d50 |
systemtap-client-0.7.2-2.el5.i386.rpm | SHA-256: 4960e471cdf79bc3538e43615b12c9c996462afbc80e833d2ba394345a2e7651 |
systemtap-runtime-0.7.2-2.el5.i386.rpm | SHA-256: 402ace9138eeaae0724315b3badf149fad8ffaf8034d75e28e5a236eb60a8ef0 |
systemtap-server-0.7.2-2.el5.i386.rpm | SHA-256: 52c998869e0c5c26787eb78c423d74d1ebb5e7cc92e9f2ea0c58b80084406104 |
systemtap-testsuite-0.7.2-2.el5.i386.rpm | SHA-256: af1327f72e89de79b64d0a7a4583d7ab01506a72da21962afb0476228e36b7cd |
Red Hat Enterprise Linux Desktop 5
SRPM | |
---|---|
systemtap-0.7.2-2.el5.src.rpm | SHA-256: fa9e170829e4d292fd213e87ef4b4b7e3d7d1b19b4899d2b7d36fac5c4c13511 |
x86_64 | |
systemtap-0.7.2-2.el5.x86_64.rpm | SHA-256: 072ea26001886231041fc88568caa5fc8d475662a6bf3830f65840cec0d20507 |
systemtap-client-0.7.2-2.el5.x86_64.rpm | SHA-256: c7cf776e3234dc21bc88134c6bfbfca69de713b6277a09be78ed66ee4cdb9fdb |
systemtap-runtime-0.7.2-2.el5.x86_64.rpm | SHA-256: 988503d45f860fbbbb6762e1d22a4baa3345040398235936af862e6566082edb |
systemtap-server-0.7.2-2.el5.x86_64.rpm | SHA-256: f237e0ee266964db21ffa8acf2dac9cdca8e5431e236b07988e6527d861aea61 |
systemtap-testsuite-0.7.2-2.el5.x86_64.rpm | SHA-256: badc40a7ec8be3b4ef985cf6bbaad938f6b120f8da9c63e6fd4d4dbd5f6541ba |
i386 | |
systemtap-0.7.2-2.el5.i386.rpm | SHA-256: eae457131d7fee68e7eca1b1eb6ef90c2f1c7b4858a971f00dc3d8c9566c6d50 |
systemtap-client-0.7.2-2.el5.i386.rpm | SHA-256: 4960e471cdf79bc3538e43615b12c9c996462afbc80e833d2ba394345a2e7651 |
systemtap-runtime-0.7.2-2.el5.i386.rpm | SHA-256: 402ace9138eeaae0724315b3badf149fad8ffaf8034d75e28e5a236eb60a8ef0 |
systemtap-server-0.7.2-2.el5.i386.rpm | SHA-256: 52c998869e0c5c26787eb78c423d74d1ebb5e7cc92e9f2ea0c58b80084406104 |
systemtap-testsuite-0.7.2-2.el5.i386.rpm | SHA-256: af1327f72e89de79b64d0a7a4583d7ab01506a72da21962afb0476228e36b7cd |
Red Hat Enterprise Linux for IBM z Systems 5
SRPM | |
---|---|
systemtap-0.7.2-2.el5.src.rpm | SHA-256: fa9e170829e4d292fd213e87ef4b4b7e3d7d1b19b4899d2b7d36fac5c4c13511 |
s390x | |
systemtap-0.7.2-2.el5.s390x.rpm | SHA-256: 1e0a7a367c23ad103b95ad03f533ad2c920350dbf1730869374ac202ee40b558 |
systemtap-client-0.7.2-2.el5.s390x.rpm | SHA-256: af3c9e8e08c9f1c5b2f98d2712e929da662c8303776558c4a1dd051d55fed5c3 |
systemtap-runtime-0.7.2-2.el5.s390x.rpm | SHA-256: 579a2a03bd152c05f39601b2078fa65646a7621e4e27c1149cbc39d38b144412 |
systemtap-server-0.7.2-2.el5.s390x.rpm | SHA-256: 57360228985ae71335756d6e089135550363accc8d3c34328bec51bd19364261 |
systemtap-testsuite-0.7.2-2.el5.s390x.rpm | SHA-256: a08eb77b83c0a19c237f511dcc9770036b32f1a01af4fb43169172c3e16000c2 |
Red Hat Enterprise Linux for Power, big endian 5
SRPM | |
---|---|
systemtap-0.7.2-2.el5.src.rpm | SHA-256: fa9e170829e4d292fd213e87ef4b4b7e3d7d1b19b4899d2b7d36fac5c4c13511 |
ppc | |
systemtap-0.7.2-2.el5.ppc64.rpm | SHA-256: 84dc25dc1c814d5607fa7846eff19d39eca59805bcac20ecd81014686b814047 |
systemtap-client-0.7.2-2.el5.ppc64.rpm | SHA-256: 63e92e43ace4cd983931dad41ab9c75613f838d150dd3a51ba37fc3476413ecc |
systemtap-runtime-0.7.2-2.el5.ppc64.rpm | SHA-256: a71c50c9106ce3588145a5f94d0da8508b0f151dc4d9a940cb3cf3255491a439 |
systemtap-server-0.7.2-2.el5.ppc64.rpm | SHA-256: 2b81042a97833f07733f284cb409f72d12d5aab4e4af91c41691b1e287be64de |
systemtap-testsuite-0.7.2-2.el5.ppc64.rpm | SHA-256: 960c4370ca787d3b4046cdf66a283cfb1661517e96d0a3e6df86fd5e5570be82 |
Red Hat Enterprise Linux Server from RHUI 5
SRPM | |
---|---|
systemtap-0.7.2-2.el5.src.rpm | SHA-256: fa9e170829e4d292fd213e87ef4b4b7e3d7d1b19b4899d2b7d36fac5c4c13511 |
x86_64 | |
systemtap-0.7.2-2.el5.x86_64.rpm | SHA-256: 072ea26001886231041fc88568caa5fc8d475662a6bf3830f65840cec0d20507 |
systemtap-client-0.7.2-2.el5.x86_64.rpm | SHA-256: c7cf776e3234dc21bc88134c6bfbfca69de713b6277a09be78ed66ee4cdb9fdb |
systemtap-runtime-0.7.2-2.el5.x86_64.rpm | SHA-256: 988503d45f860fbbbb6762e1d22a4baa3345040398235936af862e6566082edb |
systemtap-server-0.7.2-2.el5.x86_64.rpm | SHA-256: f237e0ee266964db21ffa8acf2dac9cdca8e5431e236b07988e6527d861aea61 |
systemtap-testsuite-0.7.2-2.el5.x86_64.rpm | SHA-256: badc40a7ec8be3b4ef985cf6bbaad938f6b120f8da9c63e6fd4d4dbd5f6541ba |
i386 | |
systemtap-0.7.2-2.el5.i386.rpm | SHA-256: eae457131d7fee68e7eca1b1eb6ef90c2f1c7b4858a971f00dc3d8c9566c6d50 |
systemtap-client-0.7.2-2.el5.i386.rpm | SHA-256: 4960e471cdf79bc3538e43615b12c9c996462afbc80e833d2ba394345a2e7651 |
systemtap-runtime-0.7.2-2.el5.i386.rpm | SHA-256: 402ace9138eeaae0724315b3badf149fad8ffaf8034d75e28e5a236eb60a8ef0 |
systemtap-server-0.7.2-2.el5.i386.rpm | SHA-256: 52c998869e0c5c26787eb78c423d74d1ebb5e7cc92e9f2ea0c58b80084406104 |
systemtap-testsuite-0.7.2-2.el5.i386.rpm | SHA-256: af1327f72e89de79b64d0a7a4583d7ab01506a72da21962afb0476228e36b7cd |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.