Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Lightspeed
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Lightspeed
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHBA-2012:0200 - Bug Fix Advisory
Issued:
2012-02-20
Updated:
2012-02-20

RHBA-2012:0200 - Bug Fix Advisory

  • Overview
  • Updated Packages

Synopsis

systemtap bug fix update

Type/Severity

Bug Fix Advisory

Red Hat Lightspeed patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

Updated systemtap packages that fix various bugs are now available for Red Hat
Enterprise Linux 5.

Description

SystemTap provides infrastructure to simplify the gathering of information about
the running Linux system. This assists diagnosis of a performance or a
functional problem. Developers can write scripts to collect data without the
need to go through the tedious and disruptive instrument, recompile, install,
and reboot sequence that may be otherwise required to collect data.

The systemtap package has been upgraded to upstream version 1.6, which provides
a number of bug fixes and enhancements over the previous version. (BZ#683481)

This update fixes the following bugs:

  • When running the "with server" portion of the SystemTap buildok test suite,

the server needs an authorized certificate for signing the code the compiler
server built. In some cases, a client running the test suite never obtained the
authorized certificate. Consequently, additional failures were reported by the
test suite compared to the self-hosted buildok test runs. This bug has been
fixed and now, results for the "with server" portion of test suite and the
self-hosted test suite match. (BZ#718678)

  • The systemtap data structure to track address accesses requires a locking

mechanism to prevent data corruption. Previously, spinlocks were used but they
caused kernel panics if excessive contention for reading the data structure
occurred. With this update, the locking mechanism has been changed to rwlock,
which allows concurrent reading of the data structure, thus fixing this bug.
(BZ#709190)

  • For some error conditions (such as "out of memory"), the debugfs directory

associated with a systemtap script remained in the system even after the script
exited. Consequently, other scripts run afterwards were unable to create their
own debugfs directory until the system had been rebooted. With this update, the
runtime transport code has been updated to remove debugfs directories every time
a systemtap script exits. (BZ#711976)

  • Previously, tracepoint names for softirq probe points (used in older kernels)

and for the irq.stp tapset (used in newer kernels) did not match. Consequently,
the softirq.* probe points were not found on kernels in Red Hat Enterprise Linux
5. Now, the irq.stp tapset has been updated to allow systemtap to find older
softirq probe points in older kernels. (BZ#706185)

  • In some cases, the operands in the newest version of user-space markers could

not be parsed, causing some tests to fail. With this update, SystemTap parsing
of marker arguments has been fixed to handle the operands for the newest version
of user-space markers and the tests now pass as expected. (BZ#757118)

  • The memory-write_shared_copy.stp test uses the memory.stp tapset's

vm.write_shared_copy probe. In earlier versions of systemtap, this probe was a
dummy, letting the test case falsely pass. In later versions, it became a real
probe, but due to incomplete debug information generated by the gcc compiler, it
cannot be fully resolved on a Red Hat Enterprise Linux 5 kernel. Consequently,
the test case fails. This appeared as a regression, because the earlier pass of
the test was in fact false. With this update, this test case has been designated
as a "KFAIL" (known failure) and is no longer considered a regression.
(BZ#757723)

Users of systemtap are advised to upgrade to these updated packages, which fix
these bugs.

Solution

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/kb/docs/DOC-11259

Affected Products

  • Red Hat Enterprise Linux Server 5 x86_64
  • Red Hat Enterprise Linux Server 5 ia64
  • Red Hat Enterprise Linux Server 5 i386
  • Red Hat Enterprise Linux Workstation 5 x86_64
  • Red Hat Enterprise Linux Workstation 5 i386
  • Red Hat Enterprise Linux Desktop 5 x86_64
  • Red Hat Enterprise Linux Desktop 5 i386
  • Red Hat Enterprise Linux for IBM z Systems 5 s390x
  • Red Hat Enterprise Linux for Power, big endian 5 ppc
  • Red Hat Enterprise Linux Server from RHUI 5 x86_64
  • Red Hat Enterprise Linux Server from RHUI 5 i386

Fixes

  • BZ - 683481 - Rebase to systemtap 1.6 for rhel5.8
  • BZ - 706185 - softirq.* probes do not work on el5 kernels
  • BZ - 757118 - semok/thirtysix.stp PASS -> FAIL
  • BZ - 757723 - buildok/memory-write_shared_copy.stp fails to build

CVEs

(none)

References

(none)

Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux Server 5

SRPM
systemtap-1.6-6.el5.src.rpm SHA-256: 9d58ec41f76cd9e90b3b6ef499bc0bc405828ee0347bc620fd230db95b44fd16
x86_64
systemtap-1.6-6.el5.x86_64.rpm SHA-256: 0d589b26e786d92fb3f0e220c82d51a65c7833e739767287f1c512d32ecd127a
systemtap-initscript-1.6-6.el5.x86_64.rpm SHA-256: 8de540dea3ecb437413f601a15bdf1cc04dc91d10a0f9896329320eadb69c614
systemtap-runtime-1.6-6.el5.x86_64.rpm SHA-256: 6c119bd1aff7b78e882aec2bd568b35c8cb155f1e5ba1ed3b1b907d7576d5496
systemtap-sdt-devel-1.6-6.el5.i386.rpm SHA-256: 364364865f8da7262f5a2efec7512c6069e2bf50265ee95fc11622d688cbb7cd
systemtap-sdt-devel-1.6-6.el5.x86_64.rpm SHA-256: 09c80c3442c32d0c35fdcd5972f00425a3cc184b95b9b2e1885120cffb0d8982
systemtap-server-1.6-6.el5.x86_64.rpm SHA-256: ba1d5fd3464616827f2c30c564ce6a768b168f9166db94d1eea20c04f5f00a55
systemtap-testsuite-1.6-6.el5.x86_64.rpm SHA-256: 5fb4b0446aca12406fb374ed531047a5b4445ed7f686a1687f613a822a1b7ff6
ia64
systemtap-1.6-6.el5.ia64.rpm SHA-256: e3b3b24586c6d9082f81a09e5b641c59126f8e4b5ac364a54ede2a55d8161f5a
systemtap-initscript-1.6-6.el5.ia64.rpm SHA-256: 798f8a5c9b40a715003941f191598707a141f1703fe19b5278d0071a4a58d4a6
systemtap-runtime-1.6-6.el5.ia64.rpm SHA-256: d1a27976ecec4b1a828f9b2454c9942f888ae3fe368235dbf94dc9b54a6994cd
systemtap-sdt-devel-1.6-6.el5.ia64.rpm SHA-256: 27dba86be8617b91a63f7beecf51237707f88809e8d804c3967c452e703e5856
systemtap-server-1.6-6.el5.ia64.rpm SHA-256: 28f08932725ad0dbc3823366f634482b430db60269fc72b7e242735990eb8181
systemtap-testsuite-1.6-6.el5.ia64.rpm SHA-256: c917c1f0308b24a16cfeec171b165ba1698f725b107daf47e5967befeb636502
i386
systemtap-1.6-6.el5.i386.rpm SHA-256: 744e4301760dbbf04fe9742788c570fea7a129aed71fc77572bfdb2649149398
systemtap-initscript-1.6-6.el5.i386.rpm SHA-256: c2c9c697f345208ed81966a4fc3410ac8eb22f5a1a9b67294be0f70e7b5d7b96
systemtap-runtime-1.6-6.el5.i386.rpm SHA-256: 35605fefeaea2d28e0b067e7ea38e6fa9c22a186f7d721a56ff67c599eb169b7
systemtap-sdt-devel-1.6-6.el5.i386.rpm SHA-256: 364364865f8da7262f5a2efec7512c6069e2bf50265ee95fc11622d688cbb7cd
systemtap-server-1.6-6.el5.i386.rpm SHA-256: 6779c847e886aa6b10b1eb23b41cabb1406478c4e45a91dfb8ccede3fb4092ef
systemtap-testsuite-1.6-6.el5.i386.rpm SHA-256: 6a2185911e1750e8a27315e3e6c4f8a3a63991b3b958482406b80343a6df5aef

Red Hat Enterprise Linux Workstation 5

SRPM
systemtap-1.6-6.el5.src.rpm SHA-256: 9d58ec41f76cd9e90b3b6ef499bc0bc405828ee0347bc620fd230db95b44fd16
x86_64
systemtap-1.6-6.el5.x86_64.rpm SHA-256: 0d589b26e786d92fb3f0e220c82d51a65c7833e739767287f1c512d32ecd127a
systemtap-initscript-1.6-6.el5.x86_64.rpm SHA-256: 8de540dea3ecb437413f601a15bdf1cc04dc91d10a0f9896329320eadb69c614
systemtap-runtime-1.6-6.el5.x86_64.rpm SHA-256: 6c119bd1aff7b78e882aec2bd568b35c8cb155f1e5ba1ed3b1b907d7576d5496
systemtap-sdt-devel-1.6-6.el5.i386.rpm SHA-256: 364364865f8da7262f5a2efec7512c6069e2bf50265ee95fc11622d688cbb7cd
systemtap-sdt-devel-1.6-6.el5.x86_64.rpm SHA-256: 09c80c3442c32d0c35fdcd5972f00425a3cc184b95b9b2e1885120cffb0d8982
systemtap-server-1.6-6.el5.x86_64.rpm SHA-256: ba1d5fd3464616827f2c30c564ce6a768b168f9166db94d1eea20c04f5f00a55
systemtap-testsuite-1.6-6.el5.x86_64.rpm SHA-256: 5fb4b0446aca12406fb374ed531047a5b4445ed7f686a1687f613a822a1b7ff6
i386
systemtap-1.6-6.el5.i386.rpm SHA-256: 744e4301760dbbf04fe9742788c570fea7a129aed71fc77572bfdb2649149398
systemtap-initscript-1.6-6.el5.i386.rpm SHA-256: c2c9c697f345208ed81966a4fc3410ac8eb22f5a1a9b67294be0f70e7b5d7b96
systemtap-runtime-1.6-6.el5.i386.rpm SHA-256: 35605fefeaea2d28e0b067e7ea38e6fa9c22a186f7d721a56ff67c599eb169b7
systemtap-sdt-devel-1.6-6.el5.i386.rpm SHA-256: 364364865f8da7262f5a2efec7512c6069e2bf50265ee95fc11622d688cbb7cd
systemtap-server-1.6-6.el5.i386.rpm SHA-256: 6779c847e886aa6b10b1eb23b41cabb1406478c4e45a91dfb8ccede3fb4092ef
systemtap-testsuite-1.6-6.el5.i386.rpm SHA-256: 6a2185911e1750e8a27315e3e6c4f8a3a63991b3b958482406b80343a6df5aef

Red Hat Enterprise Linux Desktop 5

SRPM
systemtap-1.6-6.el5.src.rpm SHA-256: 9d58ec41f76cd9e90b3b6ef499bc0bc405828ee0347bc620fd230db95b44fd16
x86_64
systemtap-1.6-6.el5.x86_64.rpm SHA-256: 0d589b26e786d92fb3f0e220c82d51a65c7833e739767287f1c512d32ecd127a
systemtap-initscript-1.6-6.el5.x86_64.rpm SHA-256: 8de540dea3ecb437413f601a15bdf1cc04dc91d10a0f9896329320eadb69c614
systemtap-runtime-1.6-6.el5.x86_64.rpm SHA-256: 6c119bd1aff7b78e882aec2bd568b35c8cb155f1e5ba1ed3b1b907d7576d5496
systemtap-sdt-devel-1.6-6.el5.i386.rpm SHA-256: 364364865f8da7262f5a2efec7512c6069e2bf50265ee95fc11622d688cbb7cd
systemtap-sdt-devel-1.6-6.el5.x86_64.rpm SHA-256: 09c80c3442c32d0c35fdcd5972f00425a3cc184b95b9b2e1885120cffb0d8982
systemtap-server-1.6-6.el5.x86_64.rpm SHA-256: ba1d5fd3464616827f2c30c564ce6a768b168f9166db94d1eea20c04f5f00a55
systemtap-testsuite-1.6-6.el5.x86_64.rpm SHA-256: 5fb4b0446aca12406fb374ed531047a5b4445ed7f686a1687f613a822a1b7ff6
i386
systemtap-1.6-6.el5.i386.rpm SHA-256: 744e4301760dbbf04fe9742788c570fea7a129aed71fc77572bfdb2649149398
systemtap-initscript-1.6-6.el5.i386.rpm SHA-256: c2c9c697f345208ed81966a4fc3410ac8eb22f5a1a9b67294be0f70e7b5d7b96
systemtap-runtime-1.6-6.el5.i386.rpm SHA-256: 35605fefeaea2d28e0b067e7ea38e6fa9c22a186f7d721a56ff67c599eb169b7
systemtap-sdt-devel-1.6-6.el5.i386.rpm SHA-256: 364364865f8da7262f5a2efec7512c6069e2bf50265ee95fc11622d688cbb7cd
systemtap-server-1.6-6.el5.i386.rpm SHA-256: 6779c847e886aa6b10b1eb23b41cabb1406478c4e45a91dfb8ccede3fb4092ef
systemtap-testsuite-1.6-6.el5.i386.rpm SHA-256: 6a2185911e1750e8a27315e3e6c4f8a3a63991b3b958482406b80343a6df5aef

Red Hat Enterprise Linux for IBM z Systems 5

SRPM
systemtap-1.6-6.el5.src.rpm SHA-256: 9d58ec41f76cd9e90b3b6ef499bc0bc405828ee0347bc620fd230db95b44fd16
s390x
systemtap-1.6-6.el5.s390x.rpm SHA-256: 00ca632ae6f3e71b61033643d954868f3f7f64df260b54810d2a3be3d028d5e2
systemtap-initscript-1.6-6.el5.s390x.rpm SHA-256: 034f7d299c1f1a3221d3f20a892e38f91583d77f429a16d87503562047fda65b
systemtap-runtime-1.6-6.el5.s390x.rpm SHA-256: 5f4d52877ba84859d816660b7f2ef5f871af8e8022f29e21e31d92109f2a33c3
systemtap-sdt-devel-1.6-6.el5.s390.rpm SHA-256: f1248a2e8fe19512a928f25d76b204b21502e74fbd103d95269f4aece39090e0
systemtap-sdt-devel-1.6-6.el5.s390x.rpm SHA-256: 80b4cc54270fda1ce305ab21c3bb74f045e78b8f50048d657ef9a4534dfac2db
systemtap-server-1.6-6.el5.s390x.rpm SHA-256: 04522c9d1ebfed4fe41683eb1a1c8ef93d2a2eda4fbb038ef145087b419566da
systemtap-testsuite-1.6-6.el5.s390x.rpm SHA-256: f12dd65b07cf185d9831dddea762b4b9303671001c7ba5a8b84de01f86588f24

Red Hat Enterprise Linux for Power, big endian 5

SRPM
systemtap-1.6-6.el5.src.rpm SHA-256: 9d58ec41f76cd9e90b3b6ef499bc0bc405828ee0347bc620fd230db95b44fd16
ppc
systemtap-1.6-6.el5.ppc64.rpm SHA-256: 3fb44fcb4781de9b93004ca6f3b11439ee1c7e5af8eb10364e24765b700bce03
systemtap-initscript-1.6-6.el5.ppc64.rpm SHA-256: 5da051e437e071ec5a623daf6d9bb939911973f94c3a73d6101a480086e0f9c5
systemtap-runtime-1.6-6.el5.ppc64.rpm SHA-256: bcb3f2d485595e605653bc27bcda7336bea62db0b5633093de31e2cf51f7562b
systemtap-sdt-devel-1.6-6.el5.ppc64.rpm SHA-256: d11d40b36b1502e557094f5b664797e96628eceaffd36f69f5339de3f52ae9ac
systemtap-server-1.6-6.el5.ppc64.rpm SHA-256: 5ab092bdb647a8b3f304c6d533a8bc9aa811e32b6cf6954a4a16bd7ed2cd26be
systemtap-testsuite-1.6-6.el5.ppc64.rpm SHA-256: df47cc159dff7e65418c2e0bf41bfcafa91a474a27080aed880ad5fffe997028

Red Hat Enterprise Linux Server from RHUI 5

SRPM
systemtap-1.6-6.el5.src.rpm SHA-256: 9d58ec41f76cd9e90b3b6ef499bc0bc405828ee0347bc620fd230db95b44fd16
x86_64
systemtap-1.6-6.el5.x86_64.rpm SHA-256: 0d589b26e786d92fb3f0e220c82d51a65c7833e739767287f1c512d32ecd127a
systemtap-initscript-1.6-6.el5.x86_64.rpm SHA-256: 8de540dea3ecb437413f601a15bdf1cc04dc91d10a0f9896329320eadb69c614
systemtap-runtime-1.6-6.el5.x86_64.rpm SHA-256: 6c119bd1aff7b78e882aec2bd568b35c8cb155f1e5ba1ed3b1b907d7576d5496
systemtap-sdt-devel-1.6-6.el5.i386.rpm SHA-256: 364364865f8da7262f5a2efec7512c6069e2bf50265ee95fc11622d688cbb7cd
systemtap-sdt-devel-1.6-6.el5.x86_64.rpm SHA-256: 09c80c3442c32d0c35fdcd5972f00425a3cc184b95b9b2e1885120cffb0d8982
systemtap-server-1.6-6.el5.x86_64.rpm SHA-256: ba1d5fd3464616827f2c30c564ce6a768b168f9166db94d1eea20c04f5f00a55
systemtap-testsuite-1.6-6.el5.x86_64.rpm SHA-256: 5fb4b0446aca12406fb374ed531047a5b4445ed7f686a1687f613a822a1b7ff6
i386
systemtap-1.6-6.el5.i386.rpm SHA-256: 744e4301760dbbf04fe9742788c570fea7a129aed71fc77572bfdb2649149398
systemtap-initscript-1.6-6.el5.i386.rpm SHA-256: c2c9c697f345208ed81966a4fc3410ac8eb22f5a1a9b67294be0f70e7b5d7b96
systemtap-runtime-1.6-6.el5.i386.rpm SHA-256: 35605fefeaea2d28e0b067e7ea38e6fa9c22a186f7d721a56ff67c599eb169b7
systemtap-sdt-devel-1.6-6.el5.i386.rpm SHA-256: 364364865f8da7262f5a2efec7512c6069e2bf50265ee95fc11622d688cbb7cd
systemtap-server-1.6-6.el5.i386.rpm SHA-256: 6779c847e886aa6b10b1eb23b41cabb1406478c4e45a91dfb8ccede3fb4092ef
systemtap-testsuite-1.6-6.el5.i386.rpm SHA-256: 6a2185911e1750e8a27315e3e6c4f8a3a63991b3b958482406b80343a6df5aef

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat LinkedIn YouTube Facebook X, formerly Twitter

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2026 Red Hat

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility