Update NEWS and spec files for version 0.5.2.
Signed-off-by: Kris Van Hees <kris.van.hees@oracle.com>
DTrace Kernel Modules News
==========================
+Release 0.5.2 (Feb 3rd, 2016)
+-----------------------------
+Kernel release: 4.1.12-33.el6uek
+
+Bugfixes:
+
+ - When both entry and return probes were enabled for a system call, upon
+ disabling the first, the function pointer in the system call table got
+ reset to its default value even though the 2nd probe might still be
+ active. This could cause race conditions in the state of the system
+ call probing.
+
+ - Access to the SPARC64 R_L7 register was consistenly failing due to an
+ off-by-one bug.
+
+ - It was possible to read past the beginning of the stack for a user
+ process. The mechanism for reading stack slots also got updated to
+ increase efficiency, consistency and reliability across architectures.
+
+ - While reading the stack of a userspace process, the stack bias was not
+ being applied for architectures that need it, causing an abundance of
+ essentially invalid values to polute the result.
+
+
Release 0.5.1 (Nov 17th, 2015)
------------------------------
Kernel release: 4.1.12-24.el6uek
%define variant %{?build_variant:%{build_variant}}%{!?build_variant:-uek}
# Set this to the version of the kernel this module is compiled against.
-%define kver %{?build_kver:%{build_kver}}%{!?build_kver:4.1.4-3.el6uek}
+%define kver %{?build_kver:%{build_kver}}%{!?build_kver:4.1.12-33.el6uek}
%define _signmodules %{?signmodules: %{signmodules}} %{?!signmodules: 1}
%define dt_0_4_6 1030
%define dt_0_5_0 1280
%define dt_0_5_1 1281
+%define dt_0_5_2 1282
%{lua:
local kver = rpm.expand("%{kver}")
rpm.define("arches x86_64")
end
- if rpm.vercmp(kver, "4.1.12-24") >= 0 then
+ if rpm.vercmp(kver, "4.1.12-33") >= 0 then
+ rpm.define("srcver 0.5.2")
+ rpm.define("bldrel 1")
+ rpm.define("dt_vcode "..rpm.expand("%{dt_0_5_2}"))
+ elseif rpm.vercmp(kver, "4.1.12-24") >= 0 then
rpm.define("srcver 0.5.1")
rpm.define("bldrel 1")
rpm.define("dt_vcode "..rpm.expand("%{dt_0_5_1}"))
%endif
%changelog
+%if %{dt_vcode} >= %{dt_0_5_2}
+* Thu Feb 4 2016 Kris Van Hees <kris.van.hees@oracle.com> - 0.5.2-1
+- Correct probe disable/enable mechanism for syscalls.
+ [Orabug: 22352636]
+- Fix access to uregs[I_R7] for sparc64.
+ (Nick Alcock) [Orabug: 22602870]
+- Use a more efficient, consistent, and reliable mechanism to read user
+ stack locations.
+ (Nick Alcock) [Orabug: 22629102]
+%endif
%if %{dt_vcode} >= %{dt_0_5_1}
* Tue Nov 17 2015 Kris Van Hees <kris.van.hees@oracle.com> - 0.5.1-1
- Remove explicit dependency on kernel RPM.
%define variant %{?build_variant:%{build_variant}}%{!?build_variant:-uek}
# Set this to the version of the kernel this module is compiled against.
-%define kver %{?build_kver:%{build_kver}}%{!?build_kver:4.1.4-3.el7uek}
+%define kver %{?build_kver:%{build_kver}}%{!?build_kver:4.1.12-33.el7uek}
%define _signmodules %{?signmodules: %{signmodules}} %{?!signmodules: 1}
%define dt_0_4_6 1030
%define dt_0_5_0 1280
%define dt_0_5_1 1281
+%define dt_0_5_2 1282
%{lua:
local kver = rpm.expand("%{kver}")
rpm.define("arches x86_64")
end
- if rpm.vercmp(kver, "4.1.12-24") >= 0 then
+ if rpm.vercmp(kver, "4.1.12-33") >= 0 then
+ rpm.define("srcver 0.5.2")
+ rpm.define("bldrel 1")
+ rpm.define("dt_vcode "..rpm.expand("%{dt_0_5_2}"))
+ elseif rpm.vercmp(kver, "4.1.12-24") >= 0 then
rpm.define("srcver 0.5.1")
rpm.define("bldrel 1")
rpm.define("dt_vcode "..rpm.expand("%{dt_0_5_1}"))
%endif
%changelog
-%if %{dt_vcode} >= %{dt_0_5_0}
+%if %{dt_vcode} >= %{dt_0_5_2}
+* Thu Feb 4 2016 Kris Van Hees <kris.van.hees@oracle.com> - 0.5.2-1
+- Correct probe disable/enable mechanism for syscalls.
+ [Orabug: 22352636]
+- Fix access to uregs[I_R7] for sparc64.
+ (Nick Alcock) [Orabug: 22602870]
+- Use a more efficient, consistent, and reliable mechanism to read user
+ stack locations.
+ (Nick Alcock) [Orabug: 22629102]
+%endif
+%if %{dt_vcode} >= %{dt_0_5_1}
* Tue Nov 17 2015 Kris Van Hees <kris.van.hees@oracle.com> - 0.5.1-1
- Remove explicit dependency on kernel RPM.
[Orabug: 21669543]