Skip to navigation

Bug Fix Advisory crash bug fix update

Advisory: RHBA-2010:0523-1
Type: Bug Fix Advisory
Severity: N/A
Issued on: 2010-07-12
Last updated on: 2010-07-12
Affected Products: RHEL Desktop Workstation (v. 5 client)
Red Hat Enterprise Linux (v. 5 server)
Red Hat Enterprise Linux Desktop (v. 5 client)

Details

Updated crash packages that fix various bugs are now available.

crash is a self-contained tool that can be used to investigate live systems,
kernel core dumps created from the netdump, diskdump and kdump packages from Red
Hat Linux, the mcore kernel patch offered by Mission Critical Linux, or the LKCD
kernel patch.

These updated packages fix the following bugs:

* the "bt" subcommand of the crash tool occasionally did not output the
backtrace correctly. The error appeared in x86_64 NMI-interrupted tasks which
had not yet switched their stack pointer from the user-space stack to the kernel
stack. This issue has been resolved. (BZ#601081)

* a segmentation violation happened when running the "mach -m" command option on
x86 or x86_64 systems whose BIOS-provided e820 map contained an EFI-related
memory type value that has previously not been mapped to an E820 type. This
issue has been resolved. (BZ#601082).

* the "kmem -s list" subcommand in crash couldn't read the kmem_cache_s.name
string. This issue has been resolved. The list now skips the list_head and only
displays the actual kmem_cache names/addresses. (BZ#601084)

* if a ppc64 kernel was booted with "smt-enabled=off", the initial system banner
and the "sys" and "mach" commands displayed an incorrect CPU count. They have
been changed to display the number of cpus online. (BZ#601088)

* the "bt" subcommand of crash could not resolve the stack trace when an x86
NMI-interrupted task had just entered the kernel from user-space, but had not
yet called the requested system call function. The same issue occurred when the
resumption EIP address value of a newly forked x86 task was set to the
"ret_from_fork" entry point by copy_thread(). This issue has been resolved in
both cases. (BZ#601089)


Solution

All users of crash are advised to upgrade to these updated packages, which
resolve these issues.

Before applying this update, make sure all previously-released errata relevant
to your system have been applied.

This update is available via the Red Hat Network. Details on how to use the Red
Hat Network to apply this update are available at
http://kbase.redhat.com/faq/docs/DOC-11259

Updated packages

RHEL Desktop Workstation (v. 5 client)

SRPMS:
crash-4.1.2-4.el5_5.1.src.rpm
File outdated by:  RHBA-2013:0140
    MD5: 1ba3d3a4b3e76ba849dce6da901ea9a4
SHA-256: e98748104102d9486bfe18264113a70497172e292b71d762a3e73a9a4d76c2c1
 
IA-32:
crash-devel-4.1.2-4.el5_5.1.i386.rpm
File outdated by:  RHBA-2013:0140
    MD5: 81f6317621e812c61b63e84c1c343668
SHA-256: 5f9214def4a63634c2e96c247a8d57bfb36ad937bb167e08f2f62c6686e9cf66
 
x86_64:
crash-devel-4.1.2-4.el5_5.1.i386.rpm
File outdated by:  RHBA-2013:0140
    MD5: 81f6317621e812c61b63e84c1c343668
SHA-256: 5f9214def4a63634c2e96c247a8d57bfb36ad937bb167e08f2f62c6686e9cf66
crash-devel-4.1.2-4.el5_5.1.x86_64.rpm
File outdated by:  RHBA-2013:0140
    MD5: 592f8010a56f2586c65719217f38f671
SHA-256: 3d0b4d356fda8a277876ed45b6ca6edfd5291ef6de3edb22720145c4a63df418
 
Red Hat Enterprise Linux (v. 5 server)

SRPMS:
crash-4.1.2-4.el5_5.1.src.rpm
File outdated by:  RHBA-2013:0140
    MD5: 1ba3d3a4b3e76ba849dce6da901ea9a4
SHA-256: e98748104102d9486bfe18264113a70497172e292b71d762a3e73a9a4d76c2c1
 
IA-32:
crash-4.1.2-4.el5_5.1.i386.rpm
File outdated by:  RHBA-2013:0140
    MD5: e77cc877103ae0c8cbe1ef93242c8d65
SHA-256: 02e169667e750f8d1602f3fec8852405b8511b69d60e8defd236bdb81d4f9460
crash-devel-4.1.2-4.el5_5.1.i386.rpm
File outdated by:  RHBA-2013:0140
    MD5: 81f6317621e812c61b63e84c1c343668
SHA-256: 5f9214def4a63634c2e96c247a8d57bfb36ad937bb167e08f2f62c6686e9cf66
 
IA-64:
crash-4.1.2-4.el5_5.1.ia64.rpm
File outdated by:  RHBA-2013:0140
    MD5: a339c506af8711246243476f648b9f93
SHA-256: d0d053b52b75b4619dd27d0afd983a6f955e60b7de325ab45f0e7ce78fc75217
crash-devel-4.1.2-4.el5_5.1.ia64.rpm
File outdated by:  RHBA-2013:0140
    MD5: d999048813416d2c80dcec7ad98d925a
SHA-256: cd02dc8ded0ca6d69f1a59277685af2eb9dd0bc2328d9a5bbfb1585a8b961ba9
 
PPC:
crash-4.1.2-4.el5_5.1.ppc64.rpm
File outdated by:  RHBA-2013:0140
    MD5: 6aa85a3e227f3448f7ca5009702040c2
SHA-256: d76cb00ca19acd7f20a238b84c6f08f7a64447e97154b004993fc44b4992b795
crash-devel-4.1.2-4.el5_5.1.ppc64.rpm
File outdated by:  RHBA-2013:0140
    MD5: a993a3b8731deb40829295e5451317cb
SHA-256: 948b19661c6a8a8340dcdc6f4d97a55823326f84960baf0dcf8dd859952b691b
 
s390x:
crash-4.1.2-4.el5_5.1.s390x.rpm
File outdated by:  RHBA-2013:0140
    MD5: bc1f883ec829fa5849ade894ab2f9dab
SHA-256: 968e241927a7121f18f568315a678168647a356594ce0b8b945c7403f3cc682c
crash-devel-4.1.2-4.el5_5.1.s390.rpm
File outdated by:  RHBA-2013:0140
    MD5: 47d4c4428dee6c130fd65a21a4d53e7c
SHA-256: 0b63fa5735b37d6572174d6247a6621f84313e1da62d0e5529292adad1059463
crash-devel-4.1.2-4.el5_5.1.s390x.rpm
File outdated by:  RHBA-2013:0140
    MD5: 49181c94431e24c802b7d5b4088eb3ed
SHA-256: 16d2eea1209f0d66975607db4f637ecca1e4523f6e292d8290527e6a90bbab16
 
x86_64:
crash-4.1.2-4.el5_5.1.x86_64.rpm
File outdated by:  RHBA-2013:0140
    MD5: d9baf731137d133c68a2f4436bd85e66
SHA-256: 587a2e2bd52e7660436f5ee888ebb12d478a9f0f82fe568185713673a916949b
crash-devel-4.1.2-4.el5_5.1.i386.rpm
File outdated by:  RHBA-2013:0140
    MD5: 81f6317621e812c61b63e84c1c343668
SHA-256: 5f9214def4a63634c2e96c247a8d57bfb36ad937bb167e08f2f62c6686e9cf66
crash-devel-4.1.2-4.el5_5.1.x86_64.rpm
File outdated by:  RHBA-2013:0140
    MD5: 592f8010a56f2586c65719217f38f671
SHA-256: 3d0b4d356fda8a277876ed45b6ca6edfd5291ef6de3edb22720145c4a63df418
 
Red Hat Enterprise Linux Desktop (v. 5 client)

SRPMS:
crash-4.1.2-4.el5_5.1.src.rpm
File outdated by:  RHBA-2013:0140
    MD5: 1ba3d3a4b3e76ba849dce6da901ea9a4
SHA-256: e98748104102d9486bfe18264113a70497172e292b71d762a3e73a9a4d76c2c1
 
IA-32:
crash-4.1.2-4.el5_5.1.i386.rpm
File outdated by:  RHBA-2013:0140
    MD5: e77cc877103ae0c8cbe1ef93242c8d65
SHA-256: 02e169667e750f8d1602f3fec8852405b8511b69d60e8defd236bdb81d4f9460
 
x86_64:
crash-4.1.2-4.el5_5.1.x86_64.rpm
File outdated by:  RHBA-2013:0140
    MD5: d9baf731137d133c68a2f4436bd85e66
SHA-256: 587a2e2bd52e7660436f5ee888ebb12d478a9f0f82fe568185713673a916949b
 
(The unlinked packages above are only available from the Red Hat Network)

Bugs fixed (see bugzilla for more information)

601081 - [5.5] Bt subcommand of crash occasionally does not output the backtrace normally.
601082 - 'mach -m' causes segmentation fault when analysing live system
601084 - "kmem -s list" sub-commands in crash utility doesn't work
601088 - crash tool shows wrong CPU totality when smt=off on RHEL5.5
601089 - [5.5] backtrace subcommand of crash command fails.



These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/