- Issued:
- 2009-09-02
- Updated:
- 2009-09-02
RHBA-2009:1258 - Bug Fix Advisory
Synopsis
kexec-tools bug fix and enhancement update
Type/Severity
Bug Fix Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
An updated kexec-tools package that fixes various bugs and adds
enhancements is now available.
Description
kexec-tools provides the /sbin/kexec binary that facilitates a new kernel
to boot using the kernel's kexec feature either on a normal or a panic
reboot. This package contains the /sbin/kexec binary and ancillary
utilities that together form the userspace component of the kernel's kexec
feature.
Bugs fixed in and enhancements added to this updated package include:
- the addition of reserved memory regions in kdump to improve booting on
various systems. (BZ#475843)
- various other system-specific boot aids. (BZ#473730, BZ#494782 and
BZ#277531)
- a fix to handle network config files that are lacking an ending newline.
(BZ#476063)
- improved the ability to detect md arrays. (BZ#479211 and BZ#490818)
- fixed some bad status messages when using the ssh dump target.
(BZ#466450)
- fixed an issue in which sata_nv was not included in the initramfs.
(BZ#476368)
- enhanced our dump filtering with the ability to dump dmesg logs.
(BZ#475414)
- added a condrestart directive to the service initscript. (BZ#494483)
- updated the initramfs for kdump to use hostnames instead of ip addresses.
(BZ#493690)
- cleaned up a few erroneous error messages. (BZ#496965, BZ#506652 and
BZ#509947)
- improved kdump documentation. (BZ#494473)
- fixed a bug in which kdump tried to unmount an un-mounted file system.
(BZ#495601)
- improved kdump so that fsck operations were non-interactive. (BZ#497012)
- enhanced makedumpfile so that the utsname of the crashed kernel is saved
in the dump header. (BZ#497021)
- fixed initrd generation to properly clean up files in /tmp. (BZ#483092)
- enhanced kdump to pickup virtio modules in use with kvm. (BZ#506863)
- made makedumpfile verbosity configurable. (BZ#466436)
Users should upgrade to this updated package, which resolves these issues.
Solution
Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.
This update is available via Red Hat Network. Details on how to use
the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/docs/DOC-11259
Affected Products
- Red Hat Enterprise Linux Server 5 x86_64
- Red Hat Enterprise Linux Server 5 ia64
- Red Hat Enterprise Linux Server 5 i386
- Red Hat Enterprise Linux Workstation 5 x86_64
- Red Hat Enterprise Linux Workstation 5 i386
- Red Hat Enterprise Linux Desktop 5 x86_64
- Red Hat Enterprise Linux Desktop 5 i386
- Red Hat Enterprise Linux for IBM z Systems 5 s390x
- Red Hat Enterprise Linux for Power, big endian 5 ppc
- Red Hat Enterprise Linux Server from RHUI 5 x86_64
- Red Hat Enterprise Linux Server from RHUI 5 i386
Fixes
- BZ - 466436 - [5.3][RFE] Makedumpfile Error Messages
- BZ - 473730 - FEAT RHEL5.4 (1402): Updated ia64 kexec-tools
- BZ - 475843 - kdump boot hangs in msleep on several HP XW systems
- BZ - 476368 - mkdumprd generates bad kexec initrd on systems that use RAID and/or sata_nv
- BZ - 479211 - [PATCH] mkdumprd does not work for raid[456]-rooted installations
- BZ - 483092 - misconfigured kdump.conf forces mkdumprd to leave incomplete builds in /tmp
- BZ - 490818 - [PATCH] mkdumprd's interaction with mdadm could be improved
- BZ - 496965 - [5.3] Unnecessary error messages displayed when mounting fs fails
CVEs
(none)
References
(none)
Red Hat Enterprise Linux Server 5
SRPM | |
---|---|
kexec-tools-1.102pre-77.el5.src.rpm | SHA-256: b38955c955694ca80489ba8f67561af68d0845310279ce5fe8568dce47b45ac5 |
x86_64 | |
kexec-tools-1.102pre-77.el5.x86_64.rpm | SHA-256: 1dfeaf23509e244df9db93a7f8d439fad29e0e5ee98bcd70530b3aa79d66a709 |
ia64 | |
kexec-tools-1.102pre-77.el5.ia64.rpm | SHA-256: a6e7960acb957b9a05c53ae3981cbda69bc485b55de8b99c03dc127398137b53 |
i386 | |
kexec-tools-1.102pre-77.el5.i386.rpm | SHA-256: c1cc8555d62b381ad0ac1ef2ebaa862b196764d99fdb28afb9e55db47fb1eb26 |
Red Hat Enterprise Linux Workstation 5
SRPM | |
---|---|
kexec-tools-1.102pre-77.el5.src.rpm | SHA-256: b38955c955694ca80489ba8f67561af68d0845310279ce5fe8568dce47b45ac5 |
x86_64 | |
kexec-tools-1.102pre-77.el5.x86_64.rpm | SHA-256: 1dfeaf23509e244df9db93a7f8d439fad29e0e5ee98bcd70530b3aa79d66a709 |
i386 | |
kexec-tools-1.102pre-77.el5.i386.rpm | SHA-256: c1cc8555d62b381ad0ac1ef2ebaa862b196764d99fdb28afb9e55db47fb1eb26 |
Red Hat Enterprise Linux Desktop 5
SRPM | |
---|---|
kexec-tools-1.102pre-77.el5.src.rpm | SHA-256: b38955c955694ca80489ba8f67561af68d0845310279ce5fe8568dce47b45ac5 |
x86_64 | |
kexec-tools-1.102pre-77.el5.x86_64.rpm | SHA-256: 1dfeaf23509e244df9db93a7f8d439fad29e0e5ee98bcd70530b3aa79d66a709 |
i386 | |
kexec-tools-1.102pre-77.el5.i386.rpm | SHA-256: c1cc8555d62b381ad0ac1ef2ebaa862b196764d99fdb28afb9e55db47fb1eb26 |
Red Hat Enterprise Linux for IBM z Systems 5
SRPM | |
---|---|
kexec-tools-1.102pre-77.el5.src.rpm | SHA-256: b38955c955694ca80489ba8f67561af68d0845310279ce5fe8568dce47b45ac5 |
s390x | |
kexec-tools-1.102pre-77.el5.s390x.rpm | SHA-256: e6ac70088006d30e1c163da6f0f1794cd95b025c34de5a816374c3e82c01e2be |
Red Hat Enterprise Linux for Power, big endian 5
SRPM | |
---|---|
kexec-tools-1.102pre-77.el5.src.rpm | SHA-256: b38955c955694ca80489ba8f67561af68d0845310279ce5fe8568dce47b45ac5 |
ppc | |
kexec-tools-1.102pre-77.el5.ppc64.rpm | SHA-256: fe3954fafe6377ec4a27e86e4ae25c47f9c3ffcee9daf8d1b2e2e7163fee245f |
Red Hat Enterprise Linux Server from RHUI 5
SRPM | |
---|---|
kexec-tools-1.102pre-77.el5.src.rpm | SHA-256: b38955c955694ca80489ba8f67561af68d0845310279ce5fe8568dce47b45ac5 |
x86_64 | |
kexec-tools-1.102pre-77.el5.x86_64.rpm | SHA-256: 1dfeaf23509e244df9db93a7f8d439fad29e0e5ee98bcd70530b3aa79d66a709 |
i386 | |
kexec-tools-1.102pre-77.el5.i386.rpm | SHA-256: c1cc8555d62b381ad0ac1ef2ebaa862b196764d99fdb28afb9e55db47fb1eb26 |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.