Bug 1891985

Summary: userspace probes can't be targeted by hexadecimal buildid
Product: Red Hat Developer Toolset Reporter: Martin Cermak <mcermak>
Component: systemtapAssignee: Frank Ch. Eigler <fche>
Status: CLOSED ERRATA QA Contact: Martin Cermak <mcermak>
Severity: unspecified Docs Contact:
Priority: unspecified    
Version: DTS 10.0 RHEL 7CC: bmikulov, mcermak, mnewsome, ohudlick
Target Milestone: alpha   
Target Release: 10.0   
Hardware: Unspecified   
OS: Unspecified   
Whiteboard:
Fixed In Version: devtoolset-10-systemtap-4.3-8.el7 Doc Type: No Doc Update
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2020-12-01 12:14:02 UTC Type: Bug
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:

Description Martin Cermak 2020-10-27 19:48:11 UTC
The "userspace probes can be targeted by hexadecimal buildid" doesn't work with devtoolset-10-systemtap-4.3-7.el7:

scr0 dts10   7.9 Server x86_64 # readelf -n /bin/bash

Displaying notes found in: .note.ABI-tag
  Owner                Data size        Description
  GNU                  0x00000010       NT_GNU_ABI_TAG (ABI version tag)
    OS: Linux, ABI: 2.6.32

Displaying notes found in: .note.gnu.build-id
  Owner                Data size        Description
  GNU                  0x00000014       NT_GNU_BUILD_ID (unique build ID bitstring)
    Build ID: b818503fc3f8410d7c7021ea885e6e6a848c280e
scr0 dts10   7.9 Server x86_64 # stap -l 'process("b818503fc3f8410d7c7021ea885e6e6a848c280e").function("main")'
(1) scr0 dts10   7.9 Server x86_64 # stap -l 'process("/bin/bash").function("main")'
process("/usr/bin/bash").function("main")
scr0 dts10   7.9 Server x86_64 #

Comment 5 errata-xmlrpc 2020-12-01 12:14:02 UTC
Since the problem described in this bug report should be
resolved in a recent advisory, it has been closed with a
resolution of ERRATA.

For information on the advisory (new packages: devtoolset-10-systemtap), and where to find the updated
files, follow the link below.

If the solution does not work for you, open a new bug report.

https://access.redhat.com/errata/RHEA-2020:5293