Skip to navigation

Bug Fix Advisory crash bug fix and enhancement update

Advisory: RHBA-2011:0561-1
Type: Bug Fix Advisory
Severity: N/A
Issued on: 2011-05-19
Last updated on: 2011-05-19
Affected Products: Red Hat Enterprise Linux Desktop (v. 6)
Red Hat Enterprise Linux HPC Node (v. 6)
Red Hat Enterprise Linux Server (v. 6)
Red Hat Enterprise Linux Workstation (v. 6)

Details

An updated crash package that fixes various bugs and adds two enhancements is
now available for Red Hat Enterprise Linux 6.

The crash package provides a self-contained tool that can be used to investigate
live systems, and kernel core dumps created from the netdump, diskdump, kdump,
and Xen/KVM "virsh dump" facilities from Red Hat Enterprise Linux.

This update fixes the following bugs:

* The crash package has been upgraded to upstream version 5.1.1, which provides
a number of bug fixes over the previous version. (BZ#649070)

* On 64-bit x86 architectures, using the "bt" command to analyze core dumps from
kernel 2.6.27 or later caused it to display an invalid "vgettimeofday" frame
above the topmost "system_call_fastpath" frame, followed by two read error
messages similar to the following:

bt: read error: kernel virtual address: ffffffffff600000 type:
"gdb_readmem_callback"

This error no longer occurs, and the "bt" command now produces correct results
for these kernels. (BZ#637735)

* When analyzing a KVM dump file from a 64-bit x86 guest system, the crash
utility failed to determine the starting RIP and RSP hooks. This rendered it
unable to produce a correct backtrace for tasks that were either running in user
space when the "virsh dump" operation was performed on a live guest, or that
were running on interrupt or exception stacks. With this update, the RIP and RSP
hooks for a particular dump file are now determined by using the content of the
per-CPU registers in the CPU device format. As a result, the "bt" command no
longer produces incorrect backtraces for such dump files. (BZ#649050)

* When analyzing a KVM dump file from an x86 guest system, the crash utility was
unable to determine the starting EIP and ESP hooks, and produced an invalid
backtrace. With this update, the crash utility has been updated to use the
64-bit CPU device format in x86 KVM dump files by default, and only use the
32-bit format when it is determined that the host machine was running a 32-bit
kernel. As a result, running the "bt" command when analyzing such a dump file
now produces a correct backtrace. (BZ#649051)

* When creating a KVM dump file, the "virsh dump" operation marks all
non-crashing CPUs as offline. Due to an incorrect use of the "cpu_online_map"
mask to determine the CPU count, previous version of the crash utility may have
reported a wrong number of CPUs when analyzing dumps created by the "virsh dump"
command on x86 guest systems. With this update, the underlying source code has
been adapted to use the "cpu_present_map" mask instead, so that the crash
utility reports the correct number of CPUs. (BZ#649053)

* Prior to this update, an attempt to display a backtrace of a non-active
swapper task on a 32-bit x86 architecture could cause the crash utility to
display the following message:

bt: cannot resolve stack trace:
#0 [c09f1ef4] ia32_sysenter_target at c08208ce

This update applies a patch that resolves this issue, and the crash utility now
resolves such backtraces as expected. Additionally, this update ensures that the
crash utility is no longer negatively affected by the changes that were
introduced in kernel 2.6.32-112. (BZ#682129)

As well, this update adds the following enhancements:

* The crash utility has been updated to provide support for dump files created
on the IBM System z architecture. (BZ#633449)

* The crash utility now supports compressed and/or filtered dump files generated
by the makedumpfile utility on IBM System z. (BZ#637197)

All users of crash are advised to upgrade to this updated package, which fixes
these bugs and adds these enhancements.


Solution

Before applying this update, make sure that all previously-released errata
relevant to your system have been applied.

This update is available via Red Hat Network. Details on how to use the Red
Hat Network to apply this update are available at
https://access.redhat.com/kb/docs/DOC-11259

Updated packages

Red Hat Enterprise Linux Desktop (v. 6)

SRPMS:
crash-5.1.1-2.el6.src.rpm
File outdated by:  RHEA-2013:1565
    MD5: 2334c00f757e3803b56d68dd797157d3
SHA-256: c60ed367590678816a6f0fa016325ef15e643e13bb5812487c8a8e8ed5dd2f06
 
IA-32:
crash-5.1.1-2.el6.i686.rpm
File outdated by:  RHEA-2013:1565
    MD5: 94018cc253a45e1ba561a9ae45c0e01a
SHA-256: f2d05779c43f556ea0f9dbdc17865e0c4cc148ed4e6c98d91498721e0bf3e239
crash-debuginfo-5.1.1-2.el6.i686.rpm
File outdated by:  RHEA-2013:1565
    MD5: ac7e2a80ff23e1521749234c8d6aa194
SHA-256: f9a9a0099c3854e219946643d87b5972edde21dbe22b42789c0e54d073b48179
crash-devel-5.1.1-2.el6.i686.rpm
File outdated by:  RHEA-2013:1565
    MD5: d7b776da07454acde3e996783ae0fd6b
SHA-256: a779929e843e382b4604c79159d8a0760e7dfbb1b31771b9caf87edcaa1834a4
 
x86_64:
crash-5.1.1-2.el6.x86_64.rpm
File outdated by:  RHEA-2013:1565
    MD5: 89ca9813cf5e86350bf47419d4f8be17
SHA-256: 4dc90a484567c2a116ad944c332e660fcca057731012d55eb8e8a0284a07cb6f
crash-debuginfo-5.1.1-2.el6.i686.rpm
File outdated by:  RHEA-2013:1565
    MD5: ac7e2a80ff23e1521749234c8d6aa194
SHA-256: f9a9a0099c3854e219946643d87b5972edde21dbe22b42789c0e54d073b48179
crash-debuginfo-5.1.1-2.el6.x86_64.rpm
File outdated by:  RHEA-2013:1565
    MD5: c97255cf26946f76b445db23ed69790c
SHA-256: 48e6c0076846c705202dea26c340f1ccfbac5c1250d7872464a037cce87c24ab
crash-devel-5.1.1-2.el6.i686.rpm
File outdated by:  RHEA-2013:1565
    MD5: d7b776da07454acde3e996783ae0fd6b
SHA-256: a779929e843e382b4604c79159d8a0760e7dfbb1b31771b9caf87edcaa1834a4
crash-devel-5.1.1-2.el6.x86_64.rpm
File outdated by:  RHEA-2013:1565
    MD5: 8c1bb26c025a08babb53dc70122c9edc
SHA-256: 864fa16b82c41355e51e1c376f828d1dd162c9efbbc4b58f2c320cecaa602c4b
 
Red Hat Enterprise Linux HPC Node (v. 6)

SRPMS:
crash-5.1.1-2.el6.src.rpm
File outdated by:  RHEA-2013:1565
    MD5: 2334c00f757e3803b56d68dd797157d3
SHA-256: c60ed367590678816a6f0fa016325ef15e643e13bb5812487c8a8e8ed5dd2f06
 
x86_64:
crash-5.1.1-2.el6.x86_64.rpm
File outdated by:  RHEA-2013:1565
    MD5: 89ca9813cf5e86350bf47419d4f8be17
SHA-256: 4dc90a484567c2a116ad944c332e660fcca057731012d55eb8e8a0284a07cb6f
crash-debuginfo-5.1.1-2.el6.i686.rpm
File outdated by:  RHEA-2013:1565
    MD5: ac7e2a80ff23e1521749234c8d6aa194
SHA-256: f9a9a0099c3854e219946643d87b5972edde21dbe22b42789c0e54d073b48179
crash-debuginfo-5.1.1-2.el6.x86_64.rpm
File outdated by:  RHEA-2013:1565
    MD5: c97255cf26946f76b445db23ed69790c
SHA-256: 48e6c0076846c705202dea26c340f1ccfbac5c1250d7872464a037cce87c24ab
crash-devel-5.1.1-2.el6.i686.rpm
File outdated by:  RHEA-2013:1565
    MD5: d7b776da07454acde3e996783ae0fd6b
SHA-256: a779929e843e382b4604c79159d8a0760e7dfbb1b31771b9caf87edcaa1834a4
crash-devel-5.1.1-2.el6.x86_64.rpm
File outdated by:  RHEA-2013:1565
    MD5: 8c1bb26c025a08babb53dc70122c9edc
SHA-256: 864fa16b82c41355e51e1c376f828d1dd162c9efbbc4b58f2c320cecaa602c4b
 
Red Hat Enterprise Linux Server (v. 6)

SRPMS:
crash-5.1.1-2.el6.src.rpm
File outdated by:  RHEA-2013:1565
    MD5: 2334c00f757e3803b56d68dd797157d3
SHA-256: c60ed367590678816a6f0fa016325ef15e643e13bb5812487c8a8e8ed5dd2f06
 
IA-32:
crash-5.1.1-2.el6.i686.rpm
File outdated by:  RHEA-2013:1565
    MD5: 94018cc253a45e1ba561a9ae45c0e01a
SHA-256: f2d05779c43f556ea0f9dbdc17865e0c4cc148ed4e6c98d91498721e0bf3e239
crash-debuginfo-5.1.1-2.el6.i686.rpm
File outdated by:  RHEA-2013:1565
    MD5: ac7e2a80ff23e1521749234c8d6aa194
SHA-256: f9a9a0099c3854e219946643d87b5972edde21dbe22b42789c0e54d073b48179
crash-devel-5.1.1-2.el6.i686.rpm
File outdated by:  RHEA-2013:1565
    MD5: d7b776da07454acde3e996783ae0fd6b
SHA-256: a779929e843e382b4604c79159d8a0760e7dfbb1b31771b9caf87edcaa1834a4
 
PPC:
crash-5.1.1-2.el6.ppc64.rpm
File outdated by:  RHEA-2013:1565
    MD5: f8d52a6134b56ee4ddb1db6e2cbb0061
SHA-256: 1a0d472c00b2918e084552cfc29c6e83f3796f40f365e9496cbee8dd4ef269f3
crash-debuginfo-5.1.1-2.el6.ppc64.rpm
File outdated by:  RHEA-2013:1565
    MD5: efc1a0bf56ba097a403bc0e69a41ef4f
SHA-256: d09a5b329c72ee4e96b19060d1fa270632b0a68260c230b383650027208d9997
crash-devel-5.1.1-2.el6.ppc64.rpm
File outdated by:  RHEA-2013:1565
    MD5: 437c5d0eb6586ec35fdb7b2a0fe2e300
SHA-256: 0b109e13ff75284caaccfec210452d5a31977a722944b0a524d82390c0b70e12
 
s390x:
crash-5.1.1-2.el6.s390x.rpm
File outdated by:  RHEA-2013:1565
    MD5: b761fde9a7c711d52d6ca9a19124fbef
SHA-256: 67200b0379a41fcb95f2f6b8e3f7fa9ca31b04c5a5e2ca1c45e6f360e03bb0b6
crash-debuginfo-5.1.1-2.el6.s390.rpm
File outdated by:  RHEA-2013:1565
    MD5: 75c2b3b898de2a3d395b832ed0acc073
SHA-256: 134f1ba9b176c0596e2b7c547144a13b22a183a1fe080678188dbf5cbc5069d5
crash-debuginfo-5.1.1-2.el6.s390x.rpm
File outdated by:  RHEA-2013:1565
    MD5: 3c03109b8fdde20ca0328c3e81a393b5
SHA-256: 724d605c0fa184e8b154da821dbf390a0ffbafae34444fecfdf39cb8c125d69d
crash-devel-5.1.1-2.el6.s390.rpm
File outdated by:  RHEA-2013:1565
    MD5: 02207fc81b12658bd8d2415338e86c96
SHA-256: 773ed53227d0666fda2d6867ffc15ddcdc88ebb23dd611438d4dba8cf1e5d10d
crash-devel-5.1.1-2.el6.s390x.rpm
File outdated by:  RHEA-2013:1565
    MD5: d576d50ae75648e202211cc1e9ef1656
SHA-256: ff8cf02c8d2515b6ea2acc55ab86a4f33b9d566f993608d07e7cbce16a699024
 
x86_64:
crash-5.1.1-2.el6.x86_64.rpm
File outdated by:  RHEA-2013:1565
    MD5: 89ca9813cf5e86350bf47419d4f8be17
SHA-256: 4dc90a484567c2a116ad944c332e660fcca057731012d55eb8e8a0284a07cb6f
crash-debuginfo-5.1.1-2.el6.i686.rpm
File outdated by:  RHEA-2013:1565
    MD5: ac7e2a80ff23e1521749234c8d6aa194
SHA-256: f9a9a0099c3854e219946643d87b5972edde21dbe22b42789c0e54d073b48179
crash-debuginfo-5.1.1-2.el6.x86_64.rpm
File outdated by:  RHEA-2013:1565
    MD5: c97255cf26946f76b445db23ed69790c
SHA-256: 48e6c0076846c705202dea26c340f1ccfbac5c1250d7872464a037cce87c24ab
crash-devel-5.1.1-2.el6.i686.rpm
File outdated by:  RHEA-2013:1565
    MD5: d7b776da07454acde3e996783ae0fd6b
SHA-256: a779929e843e382b4604c79159d8a0760e7dfbb1b31771b9caf87edcaa1834a4
crash-devel-5.1.1-2.el6.x86_64.rpm
File outdated by:  RHEA-2013:1565
    MD5: 8c1bb26c025a08babb53dc70122c9edc
SHA-256: 864fa16b82c41355e51e1c376f828d1dd162c9efbbc4b58f2c320cecaa602c4b
 
Red Hat Enterprise Linux Workstation (v. 6)

SRPMS:
crash-5.1.1-2.el6.src.rpm
File outdated by:  RHEA-2013:1565
    MD5: 2334c00f757e3803b56d68dd797157d3
SHA-256: c60ed367590678816a6f0fa016325ef15e643e13bb5812487c8a8e8ed5dd2f06
 
IA-32:
crash-5.1.1-2.el6.i686.rpm
File outdated by:  RHEA-2013:1565
    MD5: 94018cc253a45e1ba561a9ae45c0e01a
SHA-256: f2d05779c43f556ea0f9dbdc17865e0c4cc148ed4e6c98d91498721e0bf3e239
crash-debuginfo-5.1.1-2.el6.i686.rpm
File outdated by:  RHEA-2013:1565
    MD5: ac7e2a80ff23e1521749234c8d6aa194
SHA-256: f9a9a0099c3854e219946643d87b5972edde21dbe22b42789c0e54d073b48179
crash-devel-5.1.1-2.el6.i686.rpm
File outdated by:  RHEA-2013:1565
    MD5: d7b776da07454acde3e996783ae0fd6b
SHA-256: a779929e843e382b4604c79159d8a0760e7dfbb1b31771b9caf87edcaa1834a4
 
x86_64:
crash-5.1.1-2.el6.x86_64.rpm
File outdated by:  RHEA-2013:1565
    MD5: 89ca9813cf5e86350bf47419d4f8be17
SHA-256: 4dc90a484567c2a116ad944c332e660fcca057731012d55eb8e8a0284a07cb6f
crash-debuginfo-5.1.1-2.el6.i686.rpm
File outdated by:  RHEA-2013:1565
    MD5: ac7e2a80ff23e1521749234c8d6aa194
SHA-256: f9a9a0099c3854e219946643d87b5972edde21dbe22b42789c0e54d073b48179
crash-debuginfo-5.1.1-2.el6.x86_64.rpm
File outdated by:  RHEA-2013:1565
    MD5: c97255cf26946f76b445db23ed69790c
SHA-256: 48e6c0076846c705202dea26c340f1ccfbac5c1250d7872464a037cce87c24ab
crash-devel-5.1.1-2.el6.i686.rpm
File outdated by:  RHEA-2013:1565
    MD5: d7b776da07454acde3e996783ae0fd6b
SHA-256: a779929e843e382b4604c79159d8a0760e7dfbb1b31771b9caf87edcaa1834a4
crash-devel-5.1.1-2.el6.x86_64.rpm
File outdated by:  RHEA-2013:1565
    MD5: 8c1bb26c025a08babb53dc70122c9edc
SHA-256: 864fa16b82c41355e51e1c376f828d1dd162c9efbbc4b58f2c320cecaa602c4b
 
(The unlinked packages above are only available from the Red Hat Network)

Bugs fixed (see bugzilla for more information)

633449 - [6.1 FEAT] makedumpfile support - convert Linux on z dumps to ELF - crash part
637197 - [6.1 FEAT] Crash Utility support to read compressed/filtered dumpfile generated by makedumpfile for s390x
637735 - bt read error when analysing kvm guest vmcore
649050 - KVM dumpfiles: x86_64 backtrace fixes on live and crashed systems
649051 - KVM dumpfiles: x86 backtrace fixes on live and crashed systems
649053 - KVM dumpfiles: fix x86/x86_64 cpu count determination for crashed guests
649070 - Rebase request for crash utility RHEL6.1 errata
682129 - [kdump] bt: cannot resolve stack trace:



These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/