- Issued:
- 2011-01-13
- Updated:
- 2011-01-13
RHEA-2011:0037 - Product Enhancement Advisory
Synopsis
systemtap enhancement update
Type/Severity
Product Enhancement Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
Updated systemtap packages that rebase to upstream version 1.3 are now available
for Red Hat Enterprise Linux 5.
Description
SystemTap is an instrumentation system for systems running the Linux kernel,
version 2.6. Developers can write scripts to collect data on the operation of
the system.
With this update SystemTap is now re-based on upstream version 1.3. This re-base
features several enhancements, including improved userspace probing, new
scripting
language features, more robust backtracing/symbol-processing, and extended
probing reach. In addition, this re-base also applies several upstream bug
fixes, including:
- When loading a module, stap executes stapio to handle interactions. A bug in
runtime/staprun/mainloop.c made it possible for stapio to fail in executing a
module control file even after successfully opening it. When this occurred,
stapio returned an "ERROR: unexpected EOF" when loading/unloading a kernel
module concurrently. This update applies an upstream patch to
runtime/staprun/mainloop.c that instructs stapio to quit (instead of retrying)
when a read error occurs, avoiding a loop. (BZ#557165)
- When running rpm -V systemtap systemtap-server, TPS reports two verification
failures: systemtap-server.ppc64: /var/log/stap-server.log .M...UG. [tps:B] and
systemtap.ppc64: /usr/share/systemtap/runtime/uprobes .M....G. [tps:B]. This
update applies an upstream patch that corrects this. (BZ#559633)
For more details on bug fixes and enhancements applied by this update, please
refer to the "systemtap" section in the Red Hat Enterprise Linux 5.6 Technical
Notes:
http://www.redhat.com/docs/en-US/Red_Hat_Enterprise_Linux/5.6/html/Technical_Notes/index.html
All SystemTap users are advised to apply this update.
Solution
Before applying this update, make sure all previously-released errata
relevant to your system have been applied.
This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/docs/DOC-11259
Affected Products
- Red Hat Enterprise Linux Server 5 x86_64
- Red Hat Enterprise Linux Server 5 ia64
- Red Hat Enterprise Linux Server 5 i386
- Red Hat Enterprise Linux Workstation 5 x86_64
- Red Hat Enterprise Linux Workstation 5 i386
- Red Hat Enterprise Linux Desktop 5 x86_64
- Red Hat Enterprise Linux Desktop 5 i386
- Red Hat Enterprise Linux for IBM z Systems 5 s390x
- Red Hat Enterprise Linux for Power, big endian 5 ppc
- Red Hat Enterprise Linux Server from RHUI 5 x86_64
- Red Hat Enterprise Linux Server from RHUI 5 i386
Fixes
- BZ - 513672 - stap-prep doesn't work without yum-utils, but no dep on it
- BZ - 555808 - Systemtap uses useradd without specifying UID
- BZ - 557165 - [S1][RHEL5.4] A stapio damemon outputs 'ERROR: Unexpected EOF' permanently when loading /unloading a kernel moudule concurrently.
- BZ - 559633 - Errata testing: rpm -V fails due to packaging issues
- BZ - 560720 - [Errata testing] socketpair syscall argstr has wrong "UNKNOWN VALUE" string
- BZ - 573031 - [errata testing] stap-prep script missing
- BZ - 598615 - Changing register contents (such as $return) causes crash
- BZ - 602706 - Potential early unload problem causing kernel crash
- BZ - 606726 - rebase systemtap for rhel5.6
- BZ - 629190 - unresolved dependency: systemtap-testsuite.ia64 -> prelink
- BZ - 648420 - [REG][5.6] When systemtap is used with '-I' option, segmentation fault occurs.
CVEs
(none)
References
(none)
Red Hat Enterprise Linux Server 5
SRPM | |
---|---|
systemtap-1.3-4.el5.src.rpm | SHA-256: 33a9e5cd31900745a267c53aeb9c95b130a17872ef4594de3ff470413010d637 |
x86_64 | |
systemtap-1.3-4.el5.x86_64.rpm | SHA-256: 81d323e456f97e293e3a7326bf9560e92821ddce1db580fa4983e1ba140459d1 |
systemtap-client-1.3-4.el5.x86_64.rpm | SHA-256: 72f46c3a930a87c094603adbcbb1841b89051c06240a14cd2344bcde048f68ab |
systemtap-initscript-1.3-4.el5.x86_64.rpm | SHA-256: ddddbf0fa9fce3637da5ca6b6dadd19b999fc1685d8c7dcbbc02727de3d957de |
systemtap-runtime-1.3-4.el5.x86_64.rpm | SHA-256: a0693568aafc4b6cd15f11ff54ccc27cc4dc965d73c2a70ff07e3fa43a1804fe |
systemtap-sdt-devel-1.3-4.el5.i386.rpm | SHA-256: 5992f4eac105b74aa51ff12eaf6f3831e23f9a277499a30d2ec612df15116dc7 |
systemtap-sdt-devel-1.3-4.el5.x86_64.rpm | SHA-256: 32ee46f0c944c46ae33cd1cb120eccafad4b40d8776407bfa7754ef5b4ed2cb6 |
systemtap-server-1.3-4.el5.x86_64.rpm | SHA-256: 5d048967a0d656d09f87abab04a16573992451209ab7366f7efe943940ecc6a1 |
systemtap-testsuite-1.3-4.el5.x86_64.rpm | SHA-256: 587e57f0c7ac75275a4875586dea335a97bf5e7b7a5d87d9aa6ade8fae0fbbde |
ia64 | |
systemtap-1.3-4.el5.ia64.rpm | SHA-256: c3e65d9980584ff6db93659826361c12822ad61b0f13debbb0e40a6fd1057773 |
systemtap-client-1.3-4.el5.ia64.rpm | SHA-256: f494a63eb7a903bc1f988ad9df1a5df496d61370de26e6a3ca074e8e25add38f |
systemtap-initscript-1.3-4.el5.ia64.rpm | SHA-256: 7428e5d63215e8f64ad36d2795290929fa85aa428835a9c50095a29c7e2767d1 |
systemtap-runtime-1.3-4.el5.ia64.rpm | SHA-256: 88b2c09a504b9a4dfe1dce6925dae1209df5daf0a5e9eb15c37fdc395dde6472 |
systemtap-sdt-devel-1.3-4.el5.ia64.rpm | SHA-256: 2eb81b509fdf2606fa1b17f89ed0f8d15d4539698c7526818d349233a6dd1b6b |
systemtap-server-1.3-4.el5.ia64.rpm | SHA-256: e5879a66670c1364e94216eae50e95de25bbe742f58836fb90f5df68727e0a04 |
systemtap-testsuite-1.3-4.el5.ia64.rpm | SHA-256: df08b0b8a65d20fa03cae4d209ec73efe0bf891644eeeab0b1b574cee7669ed8 |
i386 | |
systemtap-1.3-4.el5.i386.rpm | SHA-256: f8df174e4d00e14939c7942a982d0a612e77ed7053abed773609f0527830dc0e |
systemtap-client-1.3-4.el5.i386.rpm | SHA-256: 088f2e8c4b22748cf86a2c1961c835a9f41806b74a9b40c1ac2bb19b19cfc01d |
systemtap-initscript-1.3-4.el5.i386.rpm | SHA-256: 409b503c1c45bd013fc2d6dbc63f4bad6ced520f30b5e6a74b70e2da3158d6b1 |
systemtap-runtime-1.3-4.el5.i386.rpm | SHA-256: dda3aa8dbe76b9e031c3b18bd2e1881e232b617cb14ea169966975bf82331d6b |
systemtap-sdt-devel-1.3-4.el5.i386.rpm | SHA-256: 5992f4eac105b74aa51ff12eaf6f3831e23f9a277499a30d2ec612df15116dc7 |
systemtap-server-1.3-4.el5.i386.rpm | SHA-256: cb4dfc3f1606e48a22657cf3130b71af312034ad2e5f211be06fdb2eb715b726 |
systemtap-testsuite-1.3-4.el5.i386.rpm | SHA-256: 1e82f23292ff24c9cb29fafa52a43943c6a70004f1ac82c0b2b0abd48e405216 |
Red Hat Enterprise Linux Workstation 5
SRPM | |
---|---|
systemtap-1.3-4.el5.src.rpm | SHA-256: 33a9e5cd31900745a267c53aeb9c95b130a17872ef4594de3ff470413010d637 |
x86_64 | |
systemtap-1.3-4.el5.x86_64.rpm | SHA-256: 81d323e456f97e293e3a7326bf9560e92821ddce1db580fa4983e1ba140459d1 |
systemtap-client-1.3-4.el5.x86_64.rpm | SHA-256: 72f46c3a930a87c094603adbcbb1841b89051c06240a14cd2344bcde048f68ab |
systemtap-initscript-1.3-4.el5.x86_64.rpm | SHA-256: ddddbf0fa9fce3637da5ca6b6dadd19b999fc1685d8c7dcbbc02727de3d957de |
systemtap-runtime-1.3-4.el5.x86_64.rpm | SHA-256: a0693568aafc4b6cd15f11ff54ccc27cc4dc965d73c2a70ff07e3fa43a1804fe |
systemtap-sdt-devel-1.3-4.el5.i386.rpm | SHA-256: 5992f4eac105b74aa51ff12eaf6f3831e23f9a277499a30d2ec612df15116dc7 |
systemtap-sdt-devel-1.3-4.el5.x86_64.rpm | SHA-256: 32ee46f0c944c46ae33cd1cb120eccafad4b40d8776407bfa7754ef5b4ed2cb6 |
systemtap-server-1.3-4.el5.x86_64.rpm | SHA-256: 5d048967a0d656d09f87abab04a16573992451209ab7366f7efe943940ecc6a1 |
systemtap-testsuite-1.3-4.el5.x86_64.rpm | SHA-256: 587e57f0c7ac75275a4875586dea335a97bf5e7b7a5d87d9aa6ade8fae0fbbde |
i386 | |
systemtap-1.3-4.el5.i386.rpm | SHA-256: f8df174e4d00e14939c7942a982d0a612e77ed7053abed773609f0527830dc0e |
systemtap-client-1.3-4.el5.i386.rpm | SHA-256: 088f2e8c4b22748cf86a2c1961c835a9f41806b74a9b40c1ac2bb19b19cfc01d |
systemtap-initscript-1.3-4.el5.i386.rpm | SHA-256: 409b503c1c45bd013fc2d6dbc63f4bad6ced520f30b5e6a74b70e2da3158d6b1 |
systemtap-runtime-1.3-4.el5.i386.rpm | SHA-256: dda3aa8dbe76b9e031c3b18bd2e1881e232b617cb14ea169966975bf82331d6b |
systemtap-sdt-devel-1.3-4.el5.i386.rpm | SHA-256: 5992f4eac105b74aa51ff12eaf6f3831e23f9a277499a30d2ec612df15116dc7 |
systemtap-server-1.3-4.el5.i386.rpm | SHA-256: cb4dfc3f1606e48a22657cf3130b71af312034ad2e5f211be06fdb2eb715b726 |
systemtap-testsuite-1.3-4.el5.i386.rpm | SHA-256: 1e82f23292ff24c9cb29fafa52a43943c6a70004f1ac82c0b2b0abd48e405216 |
Red Hat Enterprise Linux Desktop 5
SRPM | |
---|---|
systemtap-1.3-4.el5.src.rpm | SHA-256: 33a9e5cd31900745a267c53aeb9c95b130a17872ef4594de3ff470413010d637 |
x86_64 | |
systemtap-1.3-4.el5.x86_64.rpm | SHA-256: 81d323e456f97e293e3a7326bf9560e92821ddce1db580fa4983e1ba140459d1 |
systemtap-client-1.3-4.el5.x86_64.rpm | SHA-256: 72f46c3a930a87c094603adbcbb1841b89051c06240a14cd2344bcde048f68ab |
systemtap-initscript-1.3-4.el5.x86_64.rpm | SHA-256: ddddbf0fa9fce3637da5ca6b6dadd19b999fc1685d8c7dcbbc02727de3d957de |
systemtap-runtime-1.3-4.el5.x86_64.rpm | SHA-256: a0693568aafc4b6cd15f11ff54ccc27cc4dc965d73c2a70ff07e3fa43a1804fe |
systemtap-sdt-devel-1.3-4.el5.i386.rpm | SHA-256: 5992f4eac105b74aa51ff12eaf6f3831e23f9a277499a30d2ec612df15116dc7 |
systemtap-sdt-devel-1.3-4.el5.x86_64.rpm | SHA-256: 32ee46f0c944c46ae33cd1cb120eccafad4b40d8776407bfa7754ef5b4ed2cb6 |
systemtap-server-1.3-4.el5.x86_64.rpm | SHA-256: 5d048967a0d656d09f87abab04a16573992451209ab7366f7efe943940ecc6a1 |
systemtap-testsuite-1.3-4.el5.x86_64.rpm | SHA-256: 587e57f0c7ac75275a4875586dea335a97bf5e7b7a5d87d9aa6ade8fae0fbbde |
i386 | |
systemtap-1.3-4.el5.i386.rpm | SHA-256: f8df174e4d00e14939c7942a982d0a612e77ed7053abed773609f0527830dc0e |
systemtap-client-1.3-4.el5.i386.rpm | SHA-256: 088f2e8c4b22748cf86a2c1961c835a9f41806b74a9b40c1ac2bb19b19cfc01d |
systemtap-initscript-1.3-4.el5.i386.rpm | SHA-256: 409b503c1c45bd013fc2d6dbc63f4bad6ced520f30b5e6a74b70e2da3158d6b1 |
systemtap-runtime-1.3-4.el5.i386.rpm | SHA-256: dda3aa8dbe76b9e031c3b18bd2e1881e232b617cb14ea169966975bf82331d6b |
systemtap-sdt-devel-1.3-4.el5.i386.rpm | SHA-256: 5992f4eac105b74aa51ff12eaf6f3831e23f9a277499a30d2ec612df15116dc7 |
systemtap-server-1.3-4.el5.i386.rpm | SHA-256: cb4dfc3f1606e48a22657cf3130b71af312034ad2e5f211be06fdb2eb715b726 |
systemtap-testsuite-1.3-4.el5.i386.rpm | SHA-256: 1e82f23292ff24c9cb29fafa52a43943c6a70004f1ac82c0b2b0abd48e405216 |
Red Hat Enterprise Linux for IBM z Systems 5
SRPM | |
---|---|
systemtap-1.3-4.el5.src.rpm | SHA-256: 33a9e5cd31900745a267c53aeb9c95b130a17872ef4594de3ff470413010d637 |
s390x | |
systemtap-1.3-4.el5.s390x.rpm | SHA-256: eddfe97d7a4860b091bbf6ac6e099097e53e03485618814a9b26ff27ccb3f476 |
systemtap-client-1.3-4.el5.s390x.rpm | SHA-256: 413de3695d54b3e5105c83911bdc60bbddf2d392b094ede8fcc96afb94bf1592 |
systemtap-initscript-1.3-4.el5.s390x.rpm | SHA-256: bcef40a263c523a1477761711a3e81b0ec0b0d2ade2e674c332649cd41293664 |
systemtap-runtime-1.3-4.el5.s390x.rpm | SHA-256: 1baf34ba01ef61594fe8f0ef6b8ab8a0d49ebf75d4bce303f39bacccbcf5a471 |
systemtap-sdt-devel-1.3-4.el5.s390.rpm | SHA-256: 4237637576b2b5d322ac7d62beaad96c87ee1267049abda39170f56f7f448a49 |
systemtap-sdt-devel-1.3-4.el5.s390x.rpm | SHA-256: 6fd0ed0c170de117293161d26e1fb557c71f3c44e0b3ea448002b6098b710c20 |
systemtap-server-1.3-4.el5.s390x.rpm | SHA-256: 49c54329b279493449d5575140d18fc4799f4a93cd7f8fffb198c3c0284e3986 |
systemtap-testsuite-1.3-4.el5.s390x.rpm | SHA-256: d59498e5284358d544f45bbf01ce6d67588b82bfef3774de1e8ea938a803d587 |
Red Hat Enterprise Linux for Power, big endian 5
SRPM | |
---|---|
systemtap-1.3-4.el5.src.rpm | SHA-256: 33a9e5cd31900745a267c53aeb9c95b130a17872ef4594de3ff470413010d637 |
ppc | |
systemtap-1.3-4.el5.ppc64.rpm | SHA-256: 6e6b31131ea5bdb496a7cf76719a0cc3d2cb3af90730214369f2d0f7a6626047 |
systemtap-client-1.3-4.el5.ppc64.rpm | SHA-256: 375ce56aca9631b3cd894bc6fc131430e714fe8ecd54b5e7555a635d22b6a7a9 |
systemtap-initscript-1.3-4.el5.ppc64.rpm | SHA-256: a9ceeaa2137544a55c4801b8e08fba37a9c7986f1745bff979551ef47adbb0a2 |
systemtap-runtime-1.3-4.el5.ppc64.rpm | SHA-256: 37274feaf861535b0bbf06f84189dfc68b87ac58ddf73344590b53acff436e6c |
systemtap-sdt-devel-1.3-4.el5.ppc64.rpm | SHA-256: 1f83a2961889742224d8b882c2892bad324cb9123d15e42d91df7d92bdfe58e9 |
systemtap-server-1.3-4.el5.ppc64.rpm | SHA-256: 8f240ce27bad01a52a7dd43d36c55b31e03590c014028a589f6f9e2174a7adcc |
systemtap-testsuite-1.3-4.el5.ppc64.rpm | SHA-256: c1d682d2b3f9d9e5b856f480bab04d856f19c48bce548efc6c666ae3af25ce00 |
Red Hat Enterprise Linux Server from RHUI 5
SRPM | |
---|---|
systemtap-1.3-4.el5.src.rpm | SHA-256: 33a9e5cd31900745a267c53aeb9c95b130a17872ef4594de3ff470413010d637 |
x86_64 | |
systemtap-1.3-4.el5.x86_64.rpm | SHA-256: 81d323e456f97e293e3a7326bf9560e92821ddce1db580fa4983e1ba140459d1 |
systemtap-client-1.3-4.el5.x86_64.rpm | SHA-256: 72f46c3a930a87c094603adbcbb1841b89051c06240a14cd2344bcde048f68ab |
systemtap-initscript-1.3-4.el5.x86_64.rpm | SHA-256: ddddbf0fa9fce3637da5ca6b6dadd19b999fc1685d8c7dcbbc02727de3d957de |
systemtap-runtime-1.3-4.el5.x86_64.rpm | SHA-256: a0693568aafc4b6cd15f11ff54ccc27cc4dc965d73c2a70ff07e3fa43a1804fe |
systemtap-sdt-devel-1.3-4.el5.i386.rpm | SHA-256: 5992f4eac105b74aa51ff12eaf6f3831e23f9a277499a30d2ec612df15116dc7 |
systemtap-sdt-devel-1.3-4.el5.x86_64.rpm | SHA-256: 32ee46f0c944c46ae33cd1cb120eccafad4b40d8776407bfa7754ef5b4ed2cb6 |
systemtap-server-1.3-4.el5.x86_64.rpm | SHA-256: 5d048967a0d656d09f87abab04a16573992451209ab7366f7efe943940ecc6a1 |
systemtap-testsuite-1.3-4.el5.x86_64.rpm | SHA-256: 587e57f0c7ac75275a4875586dea335a97bf5e7b7a5d87d9aa6ade8fae0fbbde |
i386 | |
systemtap-1.3-4.el5.i386.rpm | SHA-256: f8df174e4d00e14939c7942a982d0a612e77ed7053abed773609f0527830dc0e |
systemtap-client-1.3-4.el5.i386.rpm | SHA-256: 088f2e8c4b22748cf86a2c1961c835a9f41806b74a9b40c1ac2bb19b19cfc01d |
systemtap-initscript-1.3-4.el5.i386.rpm | SHA-256: 409b503c1c45bd013fc2d6dbc63f4bad6ced520f30b5e6a74b70e2da3158d6b1 |
systemtap-runtime-1.3-4.el5.i386.rpm | SHA-256: dda3aa8dbe76b9e031c3b18bd2e1881e232b617cb14ea169966975bf82331d6b |
systemtap-sdt-devel-1.3-4.el5.i386.rpm | SHA-256: 5992f4eac105b74aa51ff12eaf6f3831e23f9a277499a30d2ec612df15116dc7 |
systemtap-server-1.3-4.el5.i386.rpm | SHA-256: cb4dfc3f1606e48a22657cf3130b71af312034ad2e5f211be06fdb2eb715b726 |
systemtap-testsuite-1.3-4.el5.i386.rpm | SHA-256: 1e82f23292ff24c9cb29fafa52a43943c6a70004f1ac82c0b2b0abd48e405216 |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.