Skip to navigation

Bug Fix Advisory crash bug fix and enhancement update

Advisory: RHBA-2012:0203-1
Type: Bug Fix Advisory
Severity: N/A
Issued on: 2012-02-20
Last updated on: 2012-02-20
Affected Products: RHEL Desktop Workstation (v. 5 client)
Red Hat Enterprise Linux (v. 5 server)
Red Hat Enterprise Linux Desktop (v. 5 client)

Details

An updated crash package that fixes various bugs is now available for Red Hat
Enterprise Linux 5

The crash package provides a self-contained tool that can be used to investigate
live systems, and kernel core dumps created from the netdump, diskdump, kdump,
and Xen/KVM "virsh dump" facilities from Red Hat Enterprise Linux.

This updated crash package includes fixes for the following bugs:

* The crash package has been upgraded to upstream version 5.1.8, which provides
a number of enhancements and bug fixes over the previous version. (BZ#715072)

* On AMD64 and Intel 64 architectures, the "bt" command failed when the shutdown
NMI was issued to a 32-bit task that had executed a "sysenter" instruction and
the RSP still contained the zero value loaded from the MSR_IA32_SYSENTER_ESP
register. Consequently, the backtrace issued the following warning message:

"WARNING: possibly bogus exception frame"

and was unable to make a transition from the NMI exception stack back to the
process stack. With this update, the underlying source code has been modified to
address this issue, and the aforementioned command no longer fails. (BZ#676408)

* On AMD64 and Intel 64 architectures, the "bt" command failed with several
backtrace errors for non-crashing active tasks:

"bt: cannot resolve stack trace"

This was due to a failure to properly transition from the shutdown NMI stack
back to the process stack. This update fixes these errors, and executing the
"bt" command on non-crashing active tasks works as expected. (BZ#713050)

* KVM virtual systems contain an I/O hole in the physical memory region from
0xe0000000 to 0x100000000 (3.5 GB to 4 GB). If a guest is provisioned with more
than 3.5 GB of RAM, then the memory above 3.5 GB is "pushed up" to start at
0x100000000 (4 GB). However, the "ram" device headers in the KVM dumpfiles do
not reflect that. As a result, numerous error messages were displayed during
invocation, and the session would often fail. With this update, the crash
utility takes the I/O hole into account despite the fact that the "ram" device
headers in KVM dumpfiles do not; consequently, error messages are no longer
displayed during invocation. (BZ#716327)

* The KVM I/O hole size is currently set to either 1 GB or 512 MB, but its
setting is hardwired into the Qemu code that was used to create the dumpfile.
The dumpfile is a "savevm" file that is designed to be used for guest migration,
and since inter-version save/load operations are not supported, the I/O hole
information does not have to be encoded into the dumpfile. Prior to this update,
the I/O hole for dumpfiles created by older Qemu version was not being set to
1GB, so if the KVM guest was configured with more than 3GB of memory, the crash
session would typically display numerous "read error" messages during session
initialization. With this update, the crash session does not return any error
messages during session initialization. (BZ#715070)

All users of crash are advised to upgrade to this updated package, which
resolves these issues.


Solution

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/kb/docs/DOC-11259

Updated packages

RHEL Desktop Workstation (v. 5 client)

SRPMS:
crash-5.1.8-1.el5.src.rpm
File outdated by:  RHBA-2013:0140
    MD5: 7e2c5c6dc3070572fe4cf1dd656d8587
SHA-256: b3ee9958bb98735c8570d02c5031c069ca71b5c51220793c0644fc9e32934fd9
 
IA-32:
crash-devel-5.1.8-1.el5.i386.rpm
File outdated by:  RHBA-2013:0140
    MD5: d64dcc345800b646fe702ee2e5777590
SHA-256: ff7f022c47cf3da684ba9a9cf3eb93d4ac40fc803d9b495f496b8aadbb2c1a5b
 
x86_64:
crash-devel-5.1.8-1.el5.i386.rpm
File outdated by:  RHBA-2013:0140
    MD5: d64dcc345800b646fe702ee2e5777590
SHA-256: ff7f022c47cf3da684ba9a9cf3eb93d4ac40fc803d9b495f496b8aadbb2c1a5b
crash-devel-5.1.8-1.el5.x86_64.rpm
File outdated by:  RHBA-2013:0140
    MD5: 76739c10f6274e8cf18662ccae8abd15
SHA-256: 771cf6e5551d5846e9881d64d6c369f15c951f8ea0dd01c7885bcd36fe22be94
 
Red Hat Enterprise Linux (v. 5 server)

SRPMS:
crash-5.1.8-1.el5.src.rpm
File outdated by:  RHBA-2013:0140
    MD5: 7e2c5c6dc3070572fe4cf1dd656d8587
SHA-256: b3ee9958bb98735c8570d02c5031c069ca71b5c51220793c0644fc9e32934fd9
 
IA-32:
crash-5.1.8-1.el5.i386.rpm
File outdated by:  RHBA-2013:0140
    MD5: d73dc09f8fbcf8cb321ed72dcd935960
SHA-256: 4c279b0da14c4c95209f12bf9a3dfd298f8d4708a30c17eddc084b115a749866
crash-devel-5.1.8-1.el5.i386.rpm
File outdated by:  RHBA-2013:0140
    MD5: d64dcc345800b646fe702ee2e5777590
SHA-256: ff7f022c47cf3da684ba9a9cf3eb93d4ac40fc803d9b495f496b8aadbb2c1a5b
 
IA-64:
crash-5.1.8-1.el5.ia64.rpm
File outdated by:  RHBA-2013:0140
    MD5: e24d3920ff90901c9f328032bf24dfd0
SHA-256: caf7df9fccb1df67fd1362d4b7464c12f82169a7df76681df1b16bd7e3d063d3
crash-devel-5.1.8-1.el5.ia64.rpm
File outdated by:  RHBA-2013:0140
    MD5: 91caa1ab49cb5abc443f2c1828548fa1
SHA-256: 5e7f297b25d0f4b3d8613a02262f859d569d74e2d418596cc2bcb79a87474d42
 
PPC:
crash-5.1.8-1.el5.ppc64.rpm
File outdated by:  RHBA-2013:0140
    MD5: b5914c24e230600cad2b0c814e328a29
SHA-256: 6aebbdd902e1aea35c61d028666586c101b8ad15f856a71c3d550d03ea0a237e
crash-devel-5.1.8-1.el5.ppc64.rpm
File outdated by:  RHBA-2013:0140
    MD5: 27751c85009c804559d91a4525a0971e
SHA-256: d4e2fabeb89071ed071c59031aa7dd5ffadcb313596909df901ff1e3f1482b48
 
s390x:
crash-5.1.8-1.el5.s390x.rpm
File outdated by:  RHBA-2013:0140
    MD5: e3905742b00f2de02811f52f267e1b87
SHA-256: eb80eae956cc384112293237babcb887840abd5699e7bfee2372aeec4299cb40
crash-devel-5.1.8-1.el5.s390.rpm
File outdated by:  RHBA-2013:0140
    MD5: b6582e808a832f978f5c6cdc76dfc372
SHA-256: 01afc1d93b566a33b760727e356dbc34fea56935901b722d5089e1d9093cd110
crash-devel-5.1.8-1.el5.s390x.rpm
File outdated by:  RHBA-2013:0140
    MD5: b2c043e2767dd7394fa0fe6a499f27a9
SHA-256: e6b9ca54c8d6321e7740514d38594d1e6f65132560b01cb93cf3e0d318aabb95
 
x86_64:
crash-5.1.8-1.el5.x86_64.rpm
File outdated by:  RHBA-2013:0140
    MD5: 94321e8c089d438e5a5c75e506eabd78
SHA-256: cc141540a7e21baf2b5ae399989fe2dc0dfcbd869ae75ce04dab6710fce66ced
crash-devel-5.1.8-1.el5.i386.rpm
File outdated by:  RHBA-2013:0140
    MD5: d64dcc345800b646fe702ee2e5777590
SHA-256: ff7f022c47cf3da684ba9a9cf3eb93d4ac40fc803d9b495f496b8aadbb2c1a5b
crash-devel-5.1.8-1.el5.x86_64.rpm
File outdated by:  RHBA-2013:0140
    MD5: 76739c10f6274e8cf18662ccae8abd15
SHA-256: 771cf6e5551d5846e9881d64d6c369f15c951f8ea0dd01c7885bcd36fe22be94
 
Red Hat Enterprise Linux Desktop (v. 5 client)

SRPMS:
crash-5.1.8-1.el5.src.rpm
File outdated by:  RHBA-2013:0140
    MD5: 7e2c5c6dc3070572fe4cf1dd656d8587
SHA-256: b3ee9958bb98735c8570d02c5031c069ca71b5c51220793c0644fc9e32934fd9
 
IA-32:
crash-5.1.8-1.el5.i386.rpm
File outdated by:  RHBA-2013:0140
    MD5: d73dc09f8fbcf8cb321ed72dcd935960
SHA-256: 4c279b0da14c4c95209f12bf9a3dfd298f8d4708a30c17eddc084b115a749866
 
x86_64:
crash-5.1.8-1.el5.x86_64.rpm
File outdated by:  RHBA-2013:0140
    MD5: 94321e8c089d438e5a5c75e506eabd78
SHA-256: cc141540a7e21baf2b5ae399989fe2dc0dfcbd869ae75ce04dab6710fce66ced
 
(The unlinked packages above are only available from the Red Hat Network)

Bugs fixed (see bugzilla for more information)

676408 - bt: WARNING: possibly bogus exception frame
715070 - crash: RHEL5 "virsh dump" support fails if guest has >= 3GB memory
715072 - Rebase request for crash utility RHEL5.8 errata



These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/