Skip to navigation

Bug Fix Advisory kexec-tools bug fix update

Advisory: RHBA-2011:0736-1
Type: Bug Fix Advisory
Severity: N/A
Issued on: 2011-05-19
Last updated on: 2011-05-19
Affected Products: Red Hat Enterprise Linux Desktop (v. 6)
Red Hat Enterprise Linux HPC Node (v. 6)
Red Hat Enterprise Linux Server (v. 6)
Red Hat Enterprise Linux Workstation (v. 6)

Details

An updated kexec-tools package that fixes several bugs and adds various
enhancements is now available for Red Hat Enterprise Linux 6.

The kexec fastboot mechanism allows booting a Linux kernel from the context of
an already running kernel. The kexec-tools package provides the /sbin/kexec
binary and ancillary utilities that form the user-space component of the
kernel's kexec feature.

This updated kexec-tools package includes numerous bug fixes and enhancements.
Space precludes documenting all of these changes in this advisory. Users are
directed to the Red Hat Enterprise Linux 6.1 Technical Notes for information on
the most significant of these changes:

https://docs.redhat.com/docs/en-US/Red_Hat_Enterprise_Linux/6/html-single/6.1_Technical_Notes/index.html#RHBA-2011-0736

All users of kexec-tools are advised to upgrade to this updated package, which
provides numerous bug fixes and enhancements.


Solution

Before applying this update, make sure that all previously-released errata
relevant to your system have been applied.

This update is available via Red Hat Network. Details on how to use the Red
Hat Network to apply this update are available at
https://access.redhat.com/kb/docs/DOC-11259

Updated packages

Red Hat Enterprise Linux Desktop (v. 6)

SRPMS:
kexec-tools-2.0.0-188.el6.src.rpm
File outdated by:  RHBA-2013:1576
    MD5: 6dfb23664aa81d987a931e2b97fb39a6
SHA-256: c27ee7d5afbef7c2268e5b2435878aa813171d911b3ff2d6d6511df448df54a1
 
IA-32:
kexec-tools-2.0.0-188.el6.i686.rpm
File outdated by:  RHBA-2013:1576
    MD5: 95a69dc3e6717a162c8e16cf81971ad4
SHA-256: a4b7393434eca0405c3b24d2f926b295e034c9de10fbd335dca821bfc53e4981
kexec-tools-debuginfo-2.0.0-188.el6.i686.rpm
File outdated by:  RHBA-2013:1576
    MD5: 9f6e061065fbab57d5520f95cc6f0510
SHA-256: c39dcf3d3c98c02948ec75c846386dfe018b920c0dfd5f60a644db4402a96c93
 
x86_64:
kexec-tools-2.0.0-188.el6.x86_64.rpm
File outdated by:  RHBA-2013:1576
    MD5: 4e847154a406e6346ac45d6da1f975eb
SHA-256: aed44b6c52a1aaae2e3db8e558767d0ee661f1d97437f40188ec80a5422fdf8f
kexec-tools-debuginfo-2.0.0-188.el6.x86_64.rpm
File outdated by:  RHBA-2013:1576
    MD5: 4012662aa638a3a4edfad631737092c7
SHA-256: 436147d85c47cb3d168a290bdc9587e326d23f54790c733c2e6f0cd90525e0d0
 
Red Hat Enterprise Linux HPC Node (v. 6)

SRPMS:
kexec-tools-2.0.0-188.el6.src.rpm
File outdated by:  RHBA-2013:1576
    MD5: 6dfb23664aa81d987a931e2b97fb39a6
SHA-256: c27ee7d5afbef7c2268e5b2435878aa813171d911b3ff2d6d6511df448df54a1
 
x86_64:
kexec-tools-2.0.0-188.el6.x86_64.rpm
File outdated by:  RHBA-2013:1576
    MD5: 4e847154a406e6346ac45d6da1f975eb
SHA-256: aed44b6c52a1aaae2e3db8e558767d0ee661f1d97437f40188ec80a5422fdf8f
kexec-tools-debuginfo-2.0.0-188.el6.x86_64.rpm
File outdated by:  RHBA-2013:1576
    MD5: 4012662aa638a3a4edfad631737092c7
SHA-256: 436147d85c47cb3d168a290bdc9587e326d23f54790c733c2e6f0cd90525e0d0
 
Red Hat Enterprise Linux Server (v. 6)

SRPMS:
kexec-tools-2.0.0-188.el6.src.rpm
File outdated by:  RHBA-2013:1576
    MD5: 6dfb23664aa81d987a931e2b97fb39a6
SHA-256: c27ee7d5afbef7c2268e5b2435878aa813171d911b3ff2d6d6511df448df54a1
 
IA-32:
kexec-tools-2.0.0-188.el6.i686.rpm
File outdated by:  RHBA-2013:1576
    MD5: 95a69dc3e6717a162c8e16cf81971ad4
SHA-256: a4b7393434eca0405c3b24d2f926b295e034c9de10fbd335dca821bfc53e4981
kexec-tools-debuginfo-2.0.0-188.el6.i686.rpm
File outdated by:  RHBA-2013:1576
    MD5: 9f6e061065fbab57d5520f95cc6f0510
SHA-256: c39dcf3d3c98c02948ec75c846386dfe018b920c0dfd5f60a644db4402a96c93
 
PPC:
kexec-tools-2.0.0-188.el6.ppc64.rpm
File outdated by:  RHBA-2013:1576
    MD5: 97f531ac82b31cae08550c2f6e95540a
SHA-256: b4d29dc98e87cdfafa939816182fdf89f207cf3a8a9da704a9de0b36c64e0c08
kexec-tools-debuginfo-2.0.0-188.el6.ppc64.rpm
File outdated by:  RHBA-2013:1576
    MD5: dfc5bfefc11cd6ee63b935418770e61b
SHA-256: e96da2fac2d3237dade4791b139d0999f1556e0a88f22265b5c77e5236217d09
 
s390x:
kexec-tools-2.0.0-188.el6.s390x.rpm
File outdated by:  RHBA-2013:1576
    MD5: a97bd7a6a49c42e7bae3fa3b8ef7ac35
SHA-256: 9ef4af069e696c418e341396f90b2cfece6e2849867f139fc4c5168a058f33e2
kexec-tools-debuginfo-2.0.0-188.el6.s390x.rpm
File outdated by:  RHBA-2013:1576
    MD5: 56e680df63429bb5e3165725498be8a5
SHA-256: d81a30c2e677cd123d4cccc20e9f7c8e749dd09474e30b3ae9d9616eec1fe79b
 
x86_64:
kexec-tools-2.0.0-188.el6.x86_64.rpm
File outdated by:  RHBA-2013:1576
    MD5: 4e847154a406e6346ac45d6da1f975eb
SHA-256: aed44b6c52a1aaae2e3db8e558767d0ee661f1d97437f40188ec80a5422fdf8f
kexec-tools-debuginfo-2.0.0-188.el6.x86_64.rpm
File outdated by:  RHBA-2013:1576
    MD5: 4012662aa638a3a4edfad631737092c7
SHA-256: 436147d85c47cb3d168a290bdc9587e326d23f54790c733c2e6f0cd90525e0d0
 
Red Hat Enterprise Linux Workstation (v. 6)

SRPMS:
kexec-tools-2.0.0-188.el6.src.rpm
File outdated by:  RHBA-2013:1576
    MD5: 6dfb23664aa81d987a931e2b97fb39a6
SHA-256: c27ee7d5afbef7c2268e5b2435878aa813171d911b3ff2d6d6511df448df54a1
 
IA-32:
kexec-tools-2.0.0-188.el6.i686.rpm
File outdated by:  RHBA-2013:1576
    MD5: 95a69dc3e6717a162c8e16cf81971ad4
SHA-256: a4b7393434eca0405c3b24d2f926b295e034c9de10fbd335dca821bfc53e4981
kexec-tools-debuginfo-2.0.0-188.el6.i686.rpm
File outdated by:  RHBA-2013:1576
    MD5: 9f6e061065fbab57d5520f95cc6f0510
SHA-256: c39dcf3d3c98c02948ec75c846386dfe018b920c0dfd5f60a644db4402a96c93
 
x86_64:
kexec-tools-2.0.0-188.el6.x86_64.rpm
File outdated by:  RHBA-2013:1576
    MD5: 4e847154a406e6346ac45d6da1f975eb
SHA-256: aed44b6c52a1aaae2e3db8e558767d0ee661f1d97437f40188ec80a5422fdf8f
kexec-tools-debuginfo-2.0.0-188.el6.x86_64.rpm
File outdated by:  RHBA-2013:1576
    MD5: 4012662aa638a3a4edfad631737092c7
SHA-256: 436147d85c47cb3d168a290bdc9587e326d23f54790c733c2e6f0cd90525e0d0
 
(The unlinked packages above are only available from the Red Hat Network)

Bugs fixed (see bugzilla for more information)

605411 - check raw partition for core dump when starting kdump service
607400 - UV support: kexec command: extend for large cpu count and memory
619682 - [RHEL6]blacklist should be added to man page
626606 - mkdumprd does not complete and hangs forever
626746 - Please reflect the setting of "path" line in /etc/kdump.conf
627834 - 'Netmask is missed!' when bonding or bridge is used
628827 - misleading comment about 'cp' in /etc/kdump.conf
630305 - [firstboot][ml_IN] - Translation Short-cuts are inconsistent, some English, some Malayalam
630309 - [kexec-tools][ml_IN] Translation problem and keyboard Selection Section untranslated
632709 - [6.1 FEAT] makedumpfile port to zLinux.
642855 - dhcp cannot get IP when trying to dump to remote server
652191 - 'core_collector cp' causes vmcore being named vmcore.flat though it's copied by scp
652724 - "Insufficient memory to configure kdump!" during install
654245 - firstboot gives "Insufficient memory to configure kdump!" warning when configuring kdump on 4G RAM system
669655 - mkdumprd failed to build initrd in read-only root
671013 - Kdump fails after updating drive firmware.
676758 - firstboot doesn't recognize the new crashkernel syntax
679310 - [ru_RU] Firstboot Kdump page contains tag —
680741 - makedumpfile -V segfaults
683713 - kill: cannot kill pid 887: No such process
683735 - Makedumpfile fails to recover the raw dump file
688150 - Firstboot - Closing an window is accepted as "Yes"
691632 - readmem: Can't read the dump memory(/proc/vmcore). Cannot allocate memory
693015 - mdadm: No arrays found in config file or automatically


References



These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/