From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (qmail 8049 invoked by alias); 21 Dec 2009 19:12:17 -0000 Received: (qmail 8034 invoked by uid 22791); 21 Dec 2009 19:12:14 -0000 X-SWARE-Spam-Status: No, hits=-1.1 required=5.0 tests=AWL,BAYES_50,SPF_HELO_PASS,SPF_PASS X-Spam-Check-By: sourceware.org Received: from mx1.redhat.com (HELO mx1.redhat.com) (209.132.183.28) by sourceware.org (qpsmtpd/0.43rc1) with ESMTP; Mon, 21 Dec 2009 19:12:07 +0000 Received: from int-mx02.intmail.prod.int.phx2.redhat.com (int-mx02.intmail.prod.int.phx2.redhat.com [10.5.11.12]) by mx1.redhat.com (8.13.8/8.13.8) with ESMTP id nBLJC5Rm005675 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=OK) for ; Mon, 21 Dec 2009 14:12:06 -0500 Received: from localhost.localdomain (dst61.hsv.redhat.com [10.15.1.185]) by int-mx02.intmail.prod.int.phx2.redhat.com (8.13.8/8.13.8) with ESMTP id nBLJC4sg013322 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO) for ; Mon, 21 Dec 2009 14:12:05 -0500 Message-ID: <4B2FC888.3000002@redhat.com> Date: Mon, 21 Dec 2009 19:12:00 -0000 From: David Smith User-Agent: Mozilla/5.0 (X11; U; Linux x86_64; en-US; rv:1.9.1.5) Gecko/20091209 Fedora/3.0-4.fc12 Lightning/1.0pre Thunderbird/3.0 MIME-Version: 1.0 To: "systemtap@sourceware.org" Subject: draft release notes Content-Type: multipart/mixed; boundary="------------080208080305080000030707" X-IsSubscribed: yes Mailing-List: contact systemtap-help@sourceware.org; run by ezmlm Precedence: bulk List-Id: List-Subscribe: List-Post: List-Help: , Sender: systemtap-owner@sourceware.org X-SW-Source: 2009-q4/txt/msg01002.txt.bz2 This is a multi-part message in MIME format. --------------080208080305080000030707 Content-Type: text/plain; charset=ISO-8859-1 Content-Transfer-Encoding: 7bit Content-length: 294 Here are some draft release notes for the next systemtap release. Please review them and let me know if you have suggestions for improvement or if you see anything I've left out. Thanks. -- David Smith dsmith@redhat.com Red Hat http://www.redhat.com 256.217.0141 (direct) 256.837.0057 (fax) --------------080208080305080000030707 Content-Type: text/plain; name="release-1.XXX.txt" Content-Transfer-Encoding: 7bit Content-Disposition: attachment; filename="release-1.XXX.txt" Content-length: 7272 The SystemTap team announces release 1.XXX. better support for gcc 4.5 richer DWARF debuginfo, new preprocessor conditional for kernel 'CONFIG_*' testing, improved (experimental) unprivileged user support, better local-vs-global variable warnings, better return codes, bug fixes, and more... = Where to get it http://sourceware.org/systemtap/ - our project page http://sourceware.org/systemtap/ftp/releases/systemtap-1.XXX.tar.gz http://koji.fedoraproject.org/koji/packageinfo?packageID=615 git tag release-1.XXX (commit FIXME) = How to build it See the README and NEWS files at http://sourceware.org/git/?p=systemtap.git;a=tree Further information at http://sourceware.org/systemtap/wiki/ = SystemTap frontend (stap) changes - Systemtap now warns about global variables being referenced from other script files. This aims to protect against unintended local-vs-global namespace collisions such as: % cat some_tapset.stp probe baz.one = bar { foo = $foo; bar = $bar } % cat end_user_script.stp global foo # intended to be private variable probe timer.s(1) { foo ++ } probe baz.* { println(foo, pp()) } % stap end_user_script.stp WARNING: cross-file global variable reference to foo from some_tapset.stp - Better support for richer DWARF debuginfo output from GCC 4.5 (variable tracking assignments). Kernel modules are now always resolved against all their dependencies to find any info referring to missing symbols. DW_AT_const_value is now supported when no DW_AT_location is available. - Any output line that starts with "ERROR", as in error("foo"), will promote a "Pass 5: run failed", and the return code is 1. - The loading of signed modules by staprun is no longer allowed for ordinary, unprivileged users. This means that only root, members of the group 'stapdev' and members of the group 'stapusr' can load systemtap modules using staprun, stap or stap-client. The minimum privilege required to run arbitrary --unprivileged scripts is now 'stapusr' membership. = SystemTap script language changes - Preprocessor conditional for kernel configuration testing: %( CONFIG_foo == "y" %? ... %) = SystemTap tapset changes - ftrace(msg:string) tapset function to send strings to the system-wide ftrace ring-buffer (if any). = New script examples - interrupt/interrupts-by-dev.stp Tracks interrupts by device - io/mbrwatch.stp Monitors MBR reads/writes - memory/vm.tracepoints.stp Tracks memory slab/slub allocations - network/tcp_trace.stp Tcp connection tracing utility - process/plimit.stp Prints pid resource limits - profiling/sched_switch.stp Display scheduler task switches = Other notes - The stap-server initscript is available. This initscript allows you to start systemtap compile servers as a system service and to manage these servers as a group or individually. The stap-server initscript is installed by the systemtap-server rpm. The build directory for the uprobes module (/usr/share/systemtap/runtime/uprobes) is made writable by the 'stap-server' group. All of the files generated when building the uprobes module, including the digital signature, are also writable by members of stap-server. See initscript/README.stap-server for details. - When using the systemtap client and server udp port 5353 must be open in your firewall in order for the clent to find servers using avahi-browse. - Some kernel crashes continue to be reported when a script probes broad kernel function wildcards. = Bugs fixed for this release 4037 make staprun 32/64-bit interoperable 4571 NFS tests missing from test suite 5150 buildok/nfs-all-probes.stp fails 5434 Error processing (missing) nfsservctl syscall 5872 Scsi tapset needs updation for 2.6.25-rc* kernels 5890 sys.stp fails on 2.6.25 x86_64 5916 Exploit kretprobe entry_handler + data pouch? 6979 loc2c code generation error 6991 accept system call missed on 2.6.27 9973 module signing for unprivileged users 10010 support $globals in shared libraries 10013 Support ENABLED sdt probe macro 10015 Possible uninitialized variable use in sym.c 10081 improve build-id mismatch message 10099 extend printf %M to support hexdumping large buffers 10231 Systemtap variable references fail on custom ppc64 kernels 10390 option to print into systemwide ftrace buffer 10466 stap -L misrepresents variables available to multi-probe aliases 10516 on rawhide, getting a warning about bad percpu allocation 10561 stap-server: take over signing duties, allow arg passing 10574 Some functions resolve to pc=0x0 10575 occasional stapio hangs for -c CMD 10593 Old gcc fails --with-elfutils configure 10595 uprobe probes causes selinux failures 10621 init.d script for systemtap-server 10622 unsuccessful location searches for extern $variables 10632 Random number generator for .stp 10644 forward-port staplog 10650 unprivileged embedded-c functions in tapset 10653 intermittent itrace crashes 10658 uprobes uproc->rwsem possible recursive locking detected 10678 vta-gcc: cannot find module nfs debuginfo 10700 log() doesn't output newline anymore 10702 preprocessor directive for kernel CONFIG_foo 10703 compilation error of ext4 tracepoint on 2.6.32 10706 line buffering needed in staprun? 10724 stap should not retry if there is a permissions error 10726 Getting wrong scope for inlined function 10746 utrace-less kernels generate funky errors 10750 translator permits excessively-vararged call into runtime 10761 pass staprun/stapio verbosity to final staprun -d 10799 global vs local variable confusion 10820 stap -L should take varaible location list into account 10822 procfs file created too late 10839 KRETACTIVE should have a smaller default value 10849 make MAXSKIPPED overflow trigger an error message 10854 Race between script startup and abnormal shutdown 10866 exit with rc != 0 on script ERRORs 10869 kretprobes waste a lot of memory on kretprobe_instances 10877 improve probe point error reporting 10923 frame_base given by DW_OP_call_frame_cfa in .debug_frame fail 10927 do-while statement unimplemented, but documented 10951 Process probes not in language reference manual 10974 testsuite/buildok/aux_syscalls-embedded.stp failure 10976 Untrusted uprobes.ko.sig shouldn't be fatal for the privileged 10981 buildok/netdev.stp failures on rhel5 10983 Power tracepoints use the wrong header in 2.6.32-rc7 10984 restrict unprivileged mode operation to "stapusr" or similar 11015 Support shared library reloading (in different processes) 11020 SIGUSR2 file switching doesn't work with busy script 11034 review context struct allocation mechanism 11089 process.mark() probes with same name trigger wrongly 11097 debug memory tracker shows memory overwrite in MAXNESTING = Test results on various systems - After running "sudo make installcheck" from the test suite, on a suitably equipped machine (kernel debugging data and other stuff installed), you should see 1000-1100 passes and a small handful of failures. --------------080208080305080000030707--