Skip to navigation

Bug Fix Advisory kexec-tools bug fix update

Advisory: RHBA-2010:0375-1
Type: Bug Fix Advisory
Severity: N/A
Issued on: 2010-04-23
Last updated on: 2010-04-23
Affected Products: Red Hat Enterprise Linux (v. 5 server)
Red Hat Enterprise Linux Desktop (v. 5 client)

Details

An updated kexec-tools package that fixes various bugs is now available.

kexec-tools provides /sbin/kexec binary that facilitates a new kernel to boot
using the kernel's kexec feature either on a normal or a panic reboot. This
package contains the /sbin/kexec binary and ancillary utilities that together
form the user-space component of the kernel's kexec feature.

This updated kexec-tools package fixes the following bug:

* systems running a 32-bit kernel with the PAE (Physical Address Extension)
feature enabled restrict the range of accessible memory to 64 GB, even when the
system contains more physical RAM than 64 GB. On such a system, the kernel
exports all of the detected memory via /proc/iomem, not just the amount of
accessible memory. The kexec user-space tools use /proc/iomem to determine the
amount of system memory in order to format its vmcore file so that all memory is
accessible. However, on systems with more than 64 GB of RAM, the value read by
kexec from /proc/iomem did not represent the amount of actual memory used by the
system, which resulted in /proc/vmcore read errors when the kdump mechanism
activated.

This update restricts the size of the vmcore file on 32-bit systems to 64 GB,
thus preventing /proc/vmcore read errors due to an incorrectly-sized vmcore
file. (BZ#582349)

All users of kexec-tools are advised to upgrade to this updated package, which
resolves this issue.


Solution

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/docs/DOC-11259

Updated packages

Red Hat Enterprise Linux (v. 5 server)

SRPMS:
kexec-tools-1.102pre-96.el5_5.1.src.rpm
File outdated by:  RHBA-2013:1321
    MD5: 149f098c87166a62b3745cce142cb707
SHA-256: 61550299405a7a0dc02bdf9c473f33dcc3affd572785fbce2bb2c4e04e1edaec
 
IA-32:
kexec-tools-1.102pre-96.el5_5.1.i386.rpm
File outdated by:  RHBA-2013:1321
    MD5: 0471d691b7fb45d5a8e96204577b8c44
SHA-256: 4f8df86439d428bd3d7b13f4aef3ad5096621537fa8973c940c6f005829e2763
 
IA-64:
kexec-tools-1.102pre-96.el5_5.1.ia64.rpm
File outdated by:  RHBA-2013:1321
    MD5: 02f6fdfdc0cf8000f0b08b2713ae2d5c
SHA-256: 2a3e8191d8b552895887cb6e7cd2b0ca0b896a30b247cca03cb4a9031d952bfb
 
PPC:
kexec-tools-1.102pre-96.el5_5.1.ppc64.rpm
File outdated by:  RHBA-2013:1321
    MD5: 8ec64bb0e6230a59c9243c233129d0b5
SHA-256: 3c6cb1eefcf4cc01a270c0fafa52cdf71414233af2c17c67c7cb17b49131c624
 
s390x:
kexec-tools-1.102pre-96.el5_5.1.s390x.rpm
File outdated by:  RHBA-2013:1321
    MD5: f3174241569fa3996c73eca747053c32
SHA-256: 8c520e24290a7d4beafd1152b3af05448400f420a27b4761cacf707525f3b8d0
 
x86_64:
kexec-tools-1.102pre-96.el5_5.1.x86_64.rpm
File outdated by:  RHBA-2013:1321
    MD5: 4ecd662a1eebf599110607275678131f
SHA-256: 7eb94d97e3fb7b1624822a4e441f9e32f222578d32e47f795511577ea88cb079
 
Red Hat Enterprise Linux Desktop (v. 5 client)

SRPMS:
kexec-tools-1.102pre-96.el5_5.1.src.rpm
File outdated by:  RHBA-2013:1321
    MD5: 149f098c87166a62b3745cce142cb707
SHA-256: 61550299405a7a0dc02bdf9c473f33dcc3affd572785fbce2bb2c4e04e1edaec
 
IA-32:
kexec-tools-1.102pre-96.el5_5.1.i386.rpm
File outdated by:  RHBA-2013:1321
    MD5: 0471d691b7fb45d5a8e96204577b8c44
SHA-256: 4f8df86439d428bd3d7b13f4aef3ad5096621537fa8973c940c6f005829e2763
 
x86_64:
kexec-tools-1.102pre-96.el5_5.1.x86_64.rpm
File outdated by:  RHBA-2013:1321
    MD5: 4ecd662a1eebf599110607275678131f
SHA-256: 7eb94d97e3fb7b1624822a4e441f9e32f222578d32e47f795511577ea88cb079
 
(The unlinked packages above are only available from the Red Hat Network)

Bugs fixed (see bugzilla for more information)

582349 - failed to dump vmcore on Nehalem EX machine



These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/