Skip to navigation

Bug Fix Advisory kexec-tools bug fix update

Advisory: RHBA-2012:0479-2
Type: Bug Fix Advisory
Severity: N/A
Issued on: 2012-04-13
Last updated on: 2012-04-13
Affected Products: Red Hat Enterprise Linux Desktop (v. 6)
Red Hat Enterprise Linux HPC Node (v. 6)
Red Hat Enterprise Linux Server (v. 6)
Red Hat Enterprise Linux Server AUS (v. 6.2)
Red Hat Enterprise Linux Server EUS (v. 6.2.z)
Red Hat Enterprise Linux Workstation (v. 6)

Details

Updated kexec-tools packages that fix one bug and add one enhancement are now
available for Red Hat Enterprise Linux 6.

The kexec-tools package contains the /sbin/kexec binary and utilities that
together form the user-space component of the kernel's kexec feature. The
/sbin/kexec binary facilitates a new kernel to boot using the kernel's kexec
feature either on a normal or a panic reboot. The kexec fastboot mechanism
allows booting a Linux kernel from the context of an already running kernel.

This update fixes the following bug:

* When running kdump after a kernel crash on the system using the ext4 file
systems, the kdump initrd could have been created with the zero byte size. This
happened because the system waits for several seconds before writing the changes
to the disk when using the ext4 file system. Consequently, the kdump initial
root file system (rootfs) could not have been mounted and kdump failed. This
update modifies kexec-tools to perform the sync operations after creating the
initrd. This ensures that initrd is properly written to the disk before trying
to mount rootfs so that kdump now successfully proceeds and captures a core
dump. (BZ#773358)

In addition, this update adds the following enhancement:

* The kdump utility does not support Xen para-virtualized (PV) drivers on
Hardware Virtualized Machine (HVM) guests in Red Hat Enterprise Linux 6.
Therefore, kdump failed to start if the guest had loaded PV drivers. This update
modifies underlying code to allow kdump to start without PV drivers on HVM
guests configured with PV drivers. (BZ#808466)

All users of kexec-tools are advised to upgrade to these updated packages, which
fix this bug add this enhancement.


Solution

Before applying this update, make sure all previously-released errata relevant
to your system have been applied.

This update is available via the Red Hat Network. Details on how to use the Red
Hat Network to apply this update are available at
https://access.redhat.com/knowledge/articles/11258

Updated packages

Red Hat Enterprise Linux Desktop (v. 6)

SRPMS:
kexec-tools-2.0.0-209.el6_2.5.src.rpm
File outdated by:  RHBA-2013:1576
    MD5: 4eb736d30f2f913f68383d9bc330ea38
SHA-256: 8041d0643c3f7a2c8a8b51d7df48eb592b8cb01c66b56bc4ec61f32873bee643
 
IA-32:
kexec-tools-2.0.0-209.el6_2.5.i686.rpm
File outdated by:  RHBA-2013:1576
    MD5: 093e05cb87efc1b898c49644cfe8ea41
SHA-256: 3a08936b022cddf1b71463d0f747a984f01e82fc1274ef7802ebf78f59c79d5f
kexec-tools-debuginfo-2.0.0-209.el6_2.5.i686.rpm
File outdated by:  RHBA-2013:1576
    MD5: d4c422d9e20110ec98621b85b2d73487
SHA-256: da4ff9b1cc43234493a65039da9fcb47e276a8568743914f004dae4b68944370
 
x86_64:
kexec-tools-2.0.0-209.el6_2.5.x86_64.rpm
File outdated by:  RHBA-2013:1576
    MD5: 67c60d3cd240bf2c40855d5bd016c991
SHA-256: eab06ea6d5f80262f06002376ad880cfcc34a595e701b9a84a65025eba6b7db2
kexec-tools-debuginfo-2.0.0-209.el6_2.5.x86_64.rpm
File outdated by:  RHBA-2013:1576
    MD5: ba4b99e1596927a07b8aea9aca331dc9
SHA-256: a4b8d774daddc536019293e11e78f5679844bac40fbc3a9a31e62668b8571a2e
 
Red Hat Enterprise Linux HPC Node (v. 6)

SRPMS:
kexec-tools-2.0.0-209.el6_2.5.src.rpm
File outdated by:  RHBA-2013:1576
    MD5: 4eb736d30f2f913f68383d9bc330ea38
SHA-256: 8041d0643c3f7a2c8a8b51d7df48eb592b8cb01c66b56bc4ec61f32873bee643
 
x86_64:
kexec-tools-2.0.0-209.el6_2.5.x86_64.rpm
File outdated by:  RHBA-2013:1576
    MD5: 67c60d3cd240bf2c40855d5bd016c991
SHA-256: eab06ea6d5f80262f06002376ad880cfcc34a595e701b9a84a65025eba6b7db2
kexec-tools-debuginfo-2.0.0-209.el6_2.5.x86_64.rpm
File outdated by:  RHBA-2013:1576
    MD5: ba4b99e1596927a07b8aea9aca331dc9
SHA-256: a4b8d774daddc536019293e11e78f5679844bac40fbc3a9a31e62668b8571a2e
 
Red Hat Enterprise Linux Server (v. 6)

SRPMS:
kexec-tools-2.0.0-209.el6_2.5.src.rpm
File outdated by:  RHBA-2013:1576
    MD5: 4eb736d30f2f913f68383d9bc330ea38
SHA-256: 8041d0643c3f7a2c8a8b51d7df48eb592b8cb01c66b56bc4ec61f32873bee643
 
IA-32:
kexec-tools-2.0.0-209.el6_2.5.i686.rpm
File outdated by:  RHBA-2013:1576
    MD5: 093e05cb87efc1b898c49644cfe8ea41
SHA-256: 3a08936b022cddf1b71463d0f747a984f01e82fc1274ef7802ebf78f59c79d5f
kexec-tools-debuginfo-2.0.0-209.el6_2.5.i686.rpm
File outdated by:  RHBA-2013:1576
    MD5: d4c422d9e20110ec98621b85b2d73487
SHA-256: da4ff9b1cc43234493a65039da9fcb47e276a8568743914f004dae4b68944370
 
PPC:
kexec-tools-2.0.0-209.el6_2.5.ppc64.rpm
File outdated by:  RHBA-2013:1576
    MD5: abc836afca39c464bc3425dcc1e36762
SHA-256: 6477fdd7a71de7d934ee016577a494419b9e1e44f6b4fb2c7c8d4ae60abc2298
kexec-tools-debuginfo-2.0.0-209.el6_2.5.ppc64.rpm
File outdated by:  RHBA-2013:1576
    MD5: 06429239e0f217a4f6c916ef5d3cf832
SHA-256: a66edd1c362adc724e86d387069c68467430875861e01502f0a9d76113c6fb22
 
s390x:
kexec-tools-2.0.0-209.el6_2.5.s390x.rpm
File outdated by:  RHBA-2013:1576
    MD5: a0d2ecef77db61463ddfaded5b30f7c3
SHA-256: e7dfd6bb322c405adb26361b6845845d8041a4d88b5a694b951ce87f5963b3bc
kexec-tools-debuginfo-2.0.0-209.el6_2.5.s390x.rpm
File outdated by:  RHBA-2013:1576
    MD5: b5082145a7799be0fb5f626effa0233e
SHA-256: a474d275d62bd6ddc94de90b55600ac8dd74b64f35f5a262bc27435235f32c21
 
x86_64:
kexec-tools-2.0.0-209.el6_2.5.x86_64.rpm
File outdated by:  RHBA-2013:1576
    MD5: 67c60d3cd240bf2c40855d5bd016c991
SHA-256: eab06ea6d5f80262f06002376ad880cfcc34a595e701b9a84a65025eba6b7db2
kexec-tools-debuginfo-2.0.0-209.el6_2.5.x86_64.rpm
File outdated by:  RHBA-2013:1576
    MD5: ba4b99e1596927a07b8aea9aca331dc9
SHA-256: a4b8d774daddc536019293e11e78f5679844bac40fbc3a9a31e62668b8571a2e
 
Red Hat Enterprise Linux Server AUS (v. 6.2)

SRPMS:
kexec-tools-2.0.0-209.el6_2.5.src.rpm
File outdated by:  RHBA-2013:1576
    MD5: 4eb736d30f2f913f68383d9bc330ea38
SHA-256: 8041d0643c3f7a2c8a8b51d7df48eb592b8cb01c66b56bc4ec61f32873bee643
 
x86_64:
kexec-tools-2.0.0-209.el6_2.5.x86_64.rpm     MD5: 67c60d3cd240bf2c40855d5bd016c991
SHA-256: eab06ea6d5f80262f06002376ad880cfcc34a595e701b9a84a65025eba6b7db2
kexec-tools-debuginfo-2.0.0-209.el6_2.5.x86_64.rpm     MD5: ba4b99e1596927a07b8aea9aca331dc9
SHA-256: a4b8d774daddc536019293e11e78f5679844bac40fbc3a9a31e62668b8571a2e
 
Red Hat Enterprise Linux Server EUS (v. 6.2.z)

SRPMS:
kexec-tools-2.0.0-209.el6_2.5.src.rpm
File outdated by:  RHBA-2013:1576
    MD5: 4eb736d30f2f913f68383d9bc330ea38
SHA-256: 8041d0643c3f7a2c8a8b51d7df48eb592b8cb01c66b56bc4ec61f32873bee643
 
IA-32:
kexec-tools-2.0.0-209.el6_2.5.i686.rpm     MD5: 093e05cb87efc1b898c49644cfe8ea41
SHA-256: 3a08936b022cddf1b71463d0f747a984f01e82fc1274ef7802ebf78f59c79d5f
kexec-tools-debuginfo-2.0.0-209.el6_2.5.i686.rpm     MD5: d4c422d9e20110ec98621b85b2d73487
SHA-256: da4ff9b1cc43234493a65039da9fcb47e276a8568743914f004dae4b68944370
 
PPC:
kexec-tools-2.0.0-209.el6_2.5.ppc64.rpm     MD5: abc836afca39c464bc3425dcc1e36762
SHA-256: 6477fdd7a71de7d934ee016577a494419b9e1e44f6b4fb2c7c8d4ae60abc2298
kexec-tools-debuginfo-2.0.0-209.el6_2.5.ppc64.rpm     MD5: 06429239e0f217a4f6c916ef5d3cf832
SHA-256: a66edd1c362adc724e86d387069c68467430875861e01502f0a9d76113c6fb22
 
s390x:
kexec-tools-2.0.0-209.el6_2.5.s390x.rpm     MD5: a0d2ecef77db61463ddfaded5b30f7c3
SHA-256: e7dfd6bb322c405adb26361b6845845d8041a4d88b5a694b951ce87f5963b3bc
kexec-tools-debuginfo-2.0.0-209.el6_2.5.s390x.rpm     MD5: b5082145a7799be0fb5f626effa0233e
SHA-256: a474d275d62bd6ddc94de90b55600ac8dd74b64f35f5a262bc27435235f32c21
 
x86_64:
kexec-tools-2.0.0-209.el6_2.5.x86_64.rpm     MD5: 67c60d3cd240bf2c40855d5bd016c991
SHA-256: eab06ea6d5f80262f06002376ad880cfcc34a595e701b9a84a65025eba6b7db2
kexec-tools-debuginfo-2.0.0-209.el6_2.5.x86_64.rpm     MD5: ba4b99e1596927a07b8aea9aca331dc9
SHA-256: a4b8d774daddc536019293e11e78f5679844bac40fbc3a9a31e62668b8571a2e
 
Red Hat Enterprise Linux Workstation (v. 6)

SRPMS:
kexec-tools-2.0.0-209.el6_2.5.src.rpm
File outdated by:  RHBA-2013:1576
    MD5: 4eb736d30f2f913f68383d9bc330ea38
SHA-256: 8041d0643c3f7a2c8a8b51d7df48eb592b8cb01c66b56bc4ec61f32873bee643
 
IA-32:
kexec-tools-2.0.0-209.el6_2.5.i686.rpm
File outdated by:  RHBA-2013:1576
    MD5: 093e05cb87efc1b898c49644cfe8ea41
SHA-256: 3a08936b022cddf1b71463d0f747a984f01e82fc1274ef7802ebf78f59c79d5f
kexec-tools-debuginfo-2.0.0-209.el6_2.5.i686.rpm
File outdated by:  RHBA-2013:1576
    MD5: d4c422d9e20110ec98621b85b2d73487
SHA-256: da4ff9b1cc43234493a65039da9fcb47e276a8568743914f004dae4b68944370
 
x86_64:
kexec-tools-2.0.0-209.el6_2.5.x86_64.rpm
File outdated by:  RHBA-2013:1576
    MD5: 67c60d3cd240bf2c40855d5bd016c991
SHA-256: eab06ea6d5f80262f06002376ad880cfcc34a595e701b9a84a65025eba6b7db2
kexec-tools-debuginfo-2.0.0-209.el6_2.5.x86_64.rpm
File outdated by:  RHBA-2013:1576
    MD5: ba4b99e1596927a07b8aea9aca331dc9
SHA-256: a4b8d774daddc536019293e11e78f5679844bac40fbc3a9a31e62668b8571a2e
 
(The unlinked packages above are only available from the Red Hat Network)


These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/