------------------------------------------------------------------------ pset2020_2: # 83496 (BDUX80554): Crash in refresh_local_function_symbols_for_debug_local Date: Tue, 15 Sep 2020 14:53:38 +0200 Created on: pset2020_3 Type: bugfix _Problem Description (Customer terms)_ Problems with debugging Problems with missing DD's _Affected Executables_ bshell6.2 ------------------------------------------------------------------------ pset2020_2: # 83469 (BDUX80523): PROFILE_TRAMPOLINE does not work correctly Date: Thu, 10 Sep 2020 08:51:42 +0200 Created on: pset2020_3 Type: bugfix _Problem Description (Customer terms)_ The initial_debug_options PROFILE_TRAMPOLINE=stat.info,mb is not working zipped bshell.gehermani.305526 exceeds the 8mb -. not attached. Where did the defect occur? (Session code, etcetera) nlbawappsdev2 PACKAGE_COMB=ce01sy01 Company 551 How can the defect be reproduced? (Description of the test actions, step by step, starting from the main session) set initial_debug_options. restart start ttfmafileman select folder tmp exit _Test Procedure_ RegTests and defect description _Affected Executables_ bshell6.2 _Motive source_ TCS:800-229195 ------------------------------------------------------------------------ pset2020_2: # 83327 (BDUX80420): Debugging in the Cloud: move local symbols to extended header Date: Wed, 19 Aug 2020 17:38:40 +0200 Created on: pset2020_2 Type: bugfix _Problem Description (Customer terms)_ Debugging in the Cloud: - move local symbol names to the extended object header - read local symbol names only during debugging and/or specific trace levels _Workaround_ Accept memory increase _Test Procedure_ RegTests added _Affected Executables_ bshell6.2 bic6.2 bic_info6.2 _Motive source_ JIRA:LND2-32510 ------------------------------------------------------------------------ pset2020_2: # 83207 (BDUX80255): Disable ASLR in porting set code for Linux Hosts Date: Wed, 22 Jul 2020 09:55:26 +0200 Created on: pset2020_2 Type: enhancement _Problem Description (Customer terms)_ Address space layout randomization (ASLR) is a computer security technique involved in preventing exploitation of memory corruption vulnerabilities. This is enabled by default in Linux hosts. The porting set shared memory system is not compatible with the ASLR enabled dynamic loading mechanisms. The change disables the ASLR for Linux host in the porting set code. _Workaround_ Disable ASLR system wide. command : echo 0 > /proc/sys/kernel/randomize_va_space _Test Procedure_ Regression run in ASLR enabled system. _Affected Executables_ All using shared memory ------------------------------------------------------------------------ pset2020_2: # 83190 (BDUX80233): shell server: do not create unnecessary SAML files Date: Wed, 15 Jul 2020 09:17:45 +0200 Created on: pset2019_4 Type: bugfix _Problem Description (Customer terms)_ In some cases, the shell server created SAML files where these were not needed and would not be cleaned up by the application in question. This fix ensures that this will not happen. _Test Procedure_ Built and tested on dev6, pset8, cp1, cp2 and td5. _Motive source_ InforXtreme:729894 ------------------------------------------------------------------------ pset2020_2: # 83092 (BDUX80074): Tenant offline to admin not via online Date: Tue, 23 Jun 2020 10:42:07 +0200 Created on: pset2020_2 Type: bugfix _Problem Description (Customer terms)_ Verified that tenants can be moved to admin mode from offline mode without going to online mode first. _Test Procedure_ Following test added: saml_passthru_for_tenant_in_admin_mode_via_offline_for_admin_user.test /vobs/db/lib/sql/Test/tests/multi_tenant/offline_to_admin.test _Affected Executables_ None _Motive source_ Jira : LND2-31727 https://jira.infor.com/browse/LND2-31727 ------------------------------------------------------------------------ pset2020_2: # 83037 (BDNT79889): Make tools function expr.compile() as trusted function in LN CE. Date: Tue, 16 Jun 2020 11:30:27 +0200 Created on: pset2019_4 Type: bugfix _Problem Description (Customer terms)_ Cannot make a table extension and add a check to item code, to evaluate a regular expression _Workaround_ N/A _Test Procedure_ Run al test scripts _Affected Executables_ Bshell _Motive source_ InforXtreme:728453 ------------------------------------------------------------------------ pset2020_2: # 83000 (BDUX79973): Debugging in the Cloud. Crash in bic during compilation Date: Wed, 10 Jun 2020 12:49:27 +0200 Created on: pset2020_1 Type: bugfix _Problem Description (Customer terms)_ Crash in bic with new object format _Test Procedure_ Regtest Global compile of Tools and Apps _Affected Executables_ bic6.2 ------------------------------------------------------------------------ pset2020_2: # 82956 (BDUX79887): Crash in bic with object version 8 Date: Fri, 05 Jun 2020 11:50:12 +0200 Created on: pset2020_1 Type: bugfix _Problem Description (Customer terms)_ bic crashes during global compile _Test Procedure_ RegTest Global Compile _Affected Executables_ bic6.2 ------------------------------------------------------------------------ pset2020_2: # 82943 (BDNT79884): DF: 727104, DMS message limit Date: Thu, 04 Jun 2020 16:54:55 +0200 Created on: pset2020_1 Type: bugfix _Problem Description (Customer terms)_ When the table tcibd001 is extended with many CDFs (or MLE languages) and the record size becomes larger than 16384 bytes (16kb), then the parent child synchronization does not work anymore _Workaround_ Keep the message smaller then the 16k _Test Procedure_ run the next small script. function main() { string rcd(16444) string rd(16444) long ret set.mem(rcd, "x", 16444) bms.send(rcd, 0, ", pid, 16444) bms.receive.buffer(rd, ret) } _Affected Executables_ bshell _Motive source_ InforXtreme:727104 ------------------------------------------------------------------------ pset2020_2: # 82916 (BDUX79874): audit: Cannot update MLE for rcd_buf \> 32k Date: Wed, 03 Jun 2020 14:45:53 +0200 Created on: pset2019_4 Type: bugfix _Problem Description (Customer terms)_ audit: Cannot update MLE for rcd_buf > 32k _Workaround_ Keep the rcd_buf < 32k _Test Procedure_ MLE sustem _Affected Executables_ audit_srv _Motive source_ InforXtreme:710605 ------------------------------------------------------------------------ pset2020_2: # 82838 (BDUX79772): Revert BMS send debugger studio fix Date: Thu, 21 May 2020 15:51:50 +0200 Created on: pset2020_1 Type: bugfix _Problem Description (Customer terms)_ Lots of problems with BMS like processes - stdlib wrong parent - bflow fails - etc _Affected Executables_ bshell6.2 _Motive source_ TCS:800-236412 TCS:800-236413 TCS:800-236285 ------------------------------------------------------------------------