Bug 464010 - uprobes on cloney shells can cause SEGV
Summary: uprobes on cloney shells can cause SEGV
Keywords:
Status: CLOSED ERRATA
Alias: None
Product: Red Hat Enterprise Linux 5
Classification: Red Hat
Component: systemtap
Version: 5.3
Hardware: All
OS: Linux
medium
high
Target Milestone: rc
: ---
Assignee: Frank Ch. Eigler
QA Contact: BaseOS QE
URL:
Whiteboard:
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2008-09-25 20:47 UTC by Frank Ch. Eigler
Modified: 2009-01-20 21:06 UTC (History)
4 users (show)

Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Clone Of:
Environment:
Last Closed: 2009-01-20 21:06:48 UTC
Target Upstream Version:
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHEA-2009:0184 0 normal SHIPPED_LIVE systemtap enhancement update 2009-01-20 16:05:50 UTC

Description Frank Ch. Eigler 2008-09-25 20:47:21 UTC
See http://sources.redhat.com/PR6829.
Reproducer:

# stap -e 'probe process("zsh").function("main") {log(pp())}' &
# zsh
segmentation fault | done | ...

A fix is in development and will need to be copied to the RHEL5.3
branch.

Comment 4 Frank Ch. Eigler 2008-10-22 20:31:32 UTC
This bug will be linked to that erratum once its fix is ready for
backporting to the rhel5.3 branch code ("MODIFIED").  There will
probably be some other related fixes also coming along, such as
systemtap PR 5274.

Comment 5 David Smith 2008-11-05 15:32:48 UTC
The following set of patches have been added to the specfile for this issue:

systemtap-0.7.2-PR6829-avoid-unregister_uprobe.patch
systemtap-0.7.2-PR6871-weaken-prologue-assertion.patch
systemtap-0.7.2-PR5274-s390-uprobes-longjump-support.patch
systemtap-0.7.2-PR5274-s390-task_finder-support.patch

Comment 10 errata-xmlrpc 2009-01-20 21:06:48 UTC
An advisory has been issued which should help the problem
described in this bug report. This report is therefore being
closed with a resolution of ERRATA. For more information
on therefore solution and/or where to find the updated files,
please follow the link below. You may reopen this bug report
if the solution does not work for you.

http://rhn.redhat.com/errata/RHEA-2009-0184.html


Note You need to log in before you can comment on or make changes to this bug.