- Issued:
- 2005-10-05
- Updated:
- 2005-10-05
RHEA-2005:600 - Product Enhancement Advisory
Synopsis
crash enhancement update
Type/Severity
Product Enhancement Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
An updated crash package that adds support for multiple PT_LOAD segments
in ELF vmcore files, and fixes an x86_64-specific initialization bug,
is now available.
Description
Currently the ELF vmcore file created by the netdump and diskdumputils
packages contains a single PT_LOAD segment that describes all of physical
memory as one object. When a dumping system contains non-existent holes
in physical memory, those ranges of non-existent memory are represented
by sparse file space in the vmcore file. However, if the system has
extremely large memory holes, the vmcore file size may exceed the
file-size limit of the underlying filesystem type.
To address this problem, the RHEL4-U2 diskdumputils package has been
updated (see errata RHBA-2005:578) to create vmcore files with multiple
PT_LOAD segments, creating a new segment when it encounters a memory hole
of 256 pages or more. Accordingly, the crash utility has been enhanced
to handle multiple PT_LOAD segments in ELF vmcore files.
Secondly, when running against an x86_64 RHEL4 kernel that has
CONFIG_NR_CPUS set to 8, and the system has exactly 8 cpus installed,
crash will fail during initialization with a read error of the sort:
crash: read error: kernel virtual address: 20000800403acd23 type:
"tss_struct ist array"
This occurs with both live systems and vmcore dumpfiles; this bug has
been fixed in this version of crash.
Users are advised to upgrade to this updated package.
Solution
Before applying this update, make sure all previously released errata
relevant to your system have been applied.
This update is available via Red Hat Network. To use Red Hat Network,
launch the Red Hat Update Agent with the following command:
up2date
This will start an interactive process that will result in the appropriate
RPMs being upgraded on your system.
Affected Products
- Red Hat Enterprise Linux Server 4 x86_64
- Red Hat Enterprise Linux Server 4 ia64
- Red Hat Enterprise Linux Server 4 i386
- Red Hat Enterprise Linux Workstation 4 x86_64
- Red Hat Enterprise Linux Workstation 4 ia64
- Red Hat Enterprise Linux Workstation 4 i386
- Red Hat Enterprise Linux Desktop 4 x86_64
- Red Hat Enterprise Linux Desktop 4 i386
- Red Hat Enterprise Linux for Power, big endian 4 ppc
Fixes
- BZ - 154566 - x86_64 crash session fails with read error during initialization
- BZ - 155997 - [RHEL4-U2] crash - multiple PT_LOAD segments support
CVEs
(none)
References
(none)
Red Hat Enterprise Linux Server 4
SRPM | |
---|---|
crash-4.0-2.src.rpm | SHA-256: 339dd3ba201b71c7227348365f0cbdc1f23707a2b2d84f76f957a00ba6b06a8f |
x86_64 | |
crash-4.0-2.x86_64.rpm | SHA-256: de8a4c0b38bdbef4596e46d59150df63d16382073c358f97ff2104a07ab89d25 |
crash-4.0-2.x86_64.rpm | SHA-256: de8a4c0b38bdbef4596e46d59150df63d16382073c358f97ff2104a07ab89d25 |
ia64 | |
crash-4.0-2.ia64.rpm | SHA-256: 8b46979cd53789ed2606c2359f7b499cbadeda50fcdfb30bf426a01e7c6c8698 |
crash-4.0-2.ia64.rpm | SHA-256: 8b46979cd53789ed2606c2359f7b499cbadeda50fcdfb30bf426a01e7c6c8698 |
i386 | |
crash-4.0-2.i386.rpm | SHA-256: 17b9e025d58d09e47e2f898c67564bc73b97fc647d1312c0c164b7a7e1964950 |
crash-4.0-2.i386.rpm | SHA-256: 17b9e025d58d09e47e2f898c67564bc73b97fc647d1312c0c164b7a7e1964950 |
Red Hat Enterprise Linux Workstation 4
SRPM | |
---|---|
crash-4.0-2.src.rpm | SHA-256: 339dd3ba201b71c7227348365f0cbdc1f23707a2b2d84f76f957a00ba6b06a8f |
x86_64 | |
crash-4.0-2.x86_64.rpm | SHA-256: de8a4c0b38bdbef4596e46d59150df63d16382073c358f97ff2104a07ab89d25 |
ia64 | |
crash-4.0-2.ia64.rpm | SHA-256: 8b46979cd53789ed2606c2359f7b499cbadeda50fcdfb30bf426a01e7c6c8698 |
i386 | |
crash-4.0-2.i386.rpm | SHA-256: 17b9e025d58d09e47e2f898c67564bc73b97fc647d1312c0c164b7a7e1964950 |
Red Hat Enterprise Linux Desktop 4
SRPM | |
---|---|
crash-4.0-2.src.rpm | SHA-256: 339dd3ba201b71c7227348365f0cbdc1f23707a2b2d84f76f957a00ba6b06a8f |
x86_64 | |
crash-4.0-2.x86_64.rpm | SHA-256: de8a4c0b38bdbef4596e46d59150df63d16382073c358f97ff2104a07ab89d25 |
i386 | |
crash-4.0-2.i386.rpm | SHA-256: 17b9e025d58d09e47e2f898c67564bc73b97fc647d1312c0c164b7a7e1964950 |
Red Hat Enterprise Linux for Power, big endian 4
SRPM | |
---|---|
crash-4.0-2.src.rpm | SHA-256: 339dd3ba201b71c7227348365f0cbdc1f23707a2b2d84f76f957a00ba6b06a8f |
ppc | |
crash-4.0-2.ppc64.rpm | SHA-256: 996a3c53500d4c49c38acced479779270c316feadd45c72f4473635f400e0753 |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.