- Issued:
- 2007-11-07
- Updated:
- 2007-11-07
RHBA-2007:0548 - Bug Fix Advisory
Synopsis
kexec-tools bug fix and enhancement update
Type/Severity
Bug Fix Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
An updated kexec-tools package that fixes multiple bugs and includes
several feature enhancements is now available.
Description
The kexec-tools package provides user-space tools for the kexec system
call. This provides functionality for capturing kernel vmcores and loading
another kernel from the currently running Linux kernel.
The following issues are fixed with the updated kexec tools packages:
- an error causing the second kernel to panic during kdump to NFS if the
remote server was not found.
- partial dump using makedumpfile over SSH.
- kdump init scripts do not work if a user supplies KDUMP_COMMANDLINE.
- makedumpfile has a limited method for determining kernel version.
- firstboot module detects xen kernel via /proc/xen.
- Xen kdump function is now enabled.
- an error causing kdump on non-Xen kernels to not capture vmcores from a
Xen kernel following the Xen 3.1 rebase.
- mkdumprd failed to test local non-root fs when it has been mounted
on /mnt.
- kdump rebooted or dropped into shell before saving vmcore.
- kdump service did not accept NFS destination.
- mkdumprd now has a man page.
- removed a bogus shell script item in mkdumprd.
- dump triggering methods added to kdump documentation.
- mkdumprd no longer indicates any directories used temporarily.
- kexec is now working with upstream kernels in Red Hat Enterprise Linux 5.
- the error, "crash: read error: kernel virtual...", occurred when using
kdump.
- "kdump propagate" created ssh authorized_keys2 with 664 permissions. Keys
are now created with file permissions changed to 600.
- mkdumprd created a non-working initrd when kdump.conf was empty.
- corrected some minor documentation issues.
- dumping directly to partitions on cciss and cpqarray controllers.
The following enhancements are also included in this update:
- kexec-tools updated for Xen support.
- the ability to use makedumpfile over ssh and raw devices.
- added a "halt" default action option.
- support for running custom post-capture executables.
- kdump ppc64 support for dynamic memory range allocation.
- included arbitrary user-specified kernel modules in initrd.
Users should upgrade to this updated package, which resolves these issues
and adds these enhancements.
Solution
Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.
This update is available via Red Hat Network. Details on how to use
the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/FAQ_58_10188
Affected Products
- Red Hat Enterprise Linux Server 5 x86_64
- Red Hat Enterprise Linux Server 5 ia64
- Red Hat Enterprise Linux Server 5 i386
- Red Hat Enterprise Linux Workstation 5 x86_64
- Red Hat Enterprise Linux Workstation 5 i386
- Red Hat Enterprise Linux Desktop 5 x86_64
- Red Hat Enterprise Linux Desktop 5 i386
- Red Hat Enterprise Linux for IBM z Systems 5 s390x
- Red Hat Enterprise Linux for Power, big endian 5 ppc
- Red Hat Enterprise Linux Server from RHUI 5 x86_64
- Red Hat Enterprise Linux Server from RHUI 5 i386
Fixes
- BZ - 229069 - kexec does not work with upstream kernels in RHEL5
- BZ - 235986 - kdump propagate create authorized_keys2 with 664 permission
- BZ - 243118 - kexec-tools package needs update to work with xen
- BZ - 243931 - Xen kdump function not enabled
- BZ - 244649 - kdump init scripts don't work if user supplies KDUMP_COMMANDLINE
- BZ - 245187 - makedumpfile has a pretty limited method for determining kernel version
CVEs
(none)
References
(none)
Red Hat Enterprise Linux Server 5
SRPM | |
---|---|
kexec-tools-1.101-194.4.el5.src.rpm | SHA-256: 28b64075e31f5e8d475fd56375283c8bdf2d379723ec6b14217825393e43c280 |
x86_64 | |
kexec-tools-1.101-194.4.el5.x86_64.rpm | SHA-256: 8b4d6a1cdd57603ee0bbf3453f39e08b2ff22b2740a0e1bbaae23da03d646220 |
ia64 | |
kexec-tools-1.101-194.4.el5.ia64.rpm | SHA-256: 4b6d39969d7c50c03d433ab814d488385b3a26c9494946850f10fe479c93dbee |
i386 | |
kexec-tools-1.101-194.4.el5.i386.rpm | SHA-256: d3957063e72c57057e5135d6f0e6b4a37e305aa5696f49f7ce1fa5e411dcd41a |
Red Hat Enterprise Linux Workstation 5
SRPM | |
---|---|
kexec-tools-1.101-194.4.el5.src.rpm | SHA-256: 28b64075e31f5e8d475fd56375283c8bdf2d379723ec6b14217825393e43c280 |
x86_64 | |
kexec-tools-1.101-194.4.el5.x86_64.rpm | SHA-256: 8b4d6a1cdd57603ee0bbf3453f39e08b2ff22b2740a0e1bbaae23da03d646220 |
i386 | |
kexec-tools-1.101-194.4.el5.i386.rpm | SHA-256: d3957063e72c57057e5135d6f0e6b4a37e305aa5696f49f7ce1fa5e411dcd41a |
Red Hat Enterprise Linux Desktop 5
SRPM | |
---|---|
kexec-tools-1.101-194.4.el5.src.rpm | SHA-256: 28b64075e31f5e8d475fd56375283c8bdf2d379723ec6b14217825393e43c280 |
x86_64 | |
kexec-tools-1.101-194.4.el5.x86_64.rpm | SHA-256: 8b4d6a1cdd57603ee0bbf3453f39e08b2ff22b2740a0e1bbaae23da03d646220 |
i386 | |
kexec-tools-1.101-194.4.el5.i386.rpm | SHA-256: d3957063e72c57057e5135d6f0e6b4a37e305aa5696f49f7ce1fa5e411dcd41a |
Red Hat Enterprise Linux for IBM z Systems 5
SRPM | |
---|---|
kexec-tools-1.101-194.4.el5.src.rpm | SHA-256: 28b64075e31f5e8d475fd56375283c8bdf2d379723ec6b14217825393e43c280 |
s390x | |
kexec-tools-1.101-194.4.el5.s390x.rpm | SHA-256: cdc3de39fbe92d5fa4bf84f3e0662f3197f8fe2eb2025461f5d6166b3c08798d |
Red Hat Enterprise Linux for Power, big endian 5
SRPM | |
---|---|
kexec-tools-1.101-194.4.el5.src.rpm | SHA-256: 28b64075e31f5e8d475fd56375283c8bdf2d379723ec6b14217825393e43c280 |
ppc | |
kexec-tools-1.101-194.4.el5.ppc64.rpm | SHA-256: df13dd501370ca82d2ca0aa92f6d45429b0e1c9d18bdff0961ca651b71360d3d |
Red Hat Enterprise Linux Server from RHUI 5
SRPM | |
---|---|
kexec-tools-1.101-194.4.el5.src.rpm | SHA-256: 28b64075e31f5e8d475fd56375283c8bdf2d379723ec6b14217825393e43c280 |
x86_64 | |
kexec-tools-1.101-194.4.el5.x86_64.rpm | SHA-256: 8b4d6a1cdd57603ee0bbf3453f39e08b2ff22b2740a0e1bbaae23da03d646220 |
i386 | |
kexec-tools-1.101-194.4.el5.i386.rpm | SHA-256: d3957063e72c57057e5135d6f0e6b4a37e305aa5696f49f7ce1fa5e411dcd41a |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.