Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Lightspeed
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Lightspeed
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHBA-2009:0105 - Bug Fix Advisory
Issued:
2009-01-20
Updated:
2009-01-20

RHBA-2009:0105 - Bug Fix Advisory

  • Overview
  • Updated Packages

Synopsis

kexec-tools bug fix and enhancement update

Type/Severity

Bug Fix Advisory

Red Hat Lightspeed patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

Updated kexec-tools packages that fix several bugs and add various
enhancements are now available.

Description

kexec is a set of system calls which allow a kernel to be loaded from the
currently-executing Linux kernel. In addition to the kexec command, these
packages contain ancillary utilities which comprise the user-space component
of the kernel's kexec feature.

The following bugs have been fixed:

  • the mkdumprd command incorrectly parsed comment lines in the

/etc/mdadm.conf configuration file.

  • kdump's initial ramdisk, dumprd, was not being rebuilt after its

components were updated.

  • kdump became unresponsive when a device entry listed in /etc/fstab did

not exist (such as a nonexistent swap directory).

A bug in the IDE/ATA driver stack that could prevent a system using
kernel-xen from booting into the kdump environment has been now fixed. In
previous releases, this occurred if the system encountered a kernel panic
while an IDE device was performing I/O and a device driver other than
libata controlled the device.

  • kdump became unresponsive when parsing custom device nodes, such as

custom RAID software-created nodes.

  • the Graphics Address Remapping Table (GART) region is now excluded from

/proc/vmcore, resolving potential problems such as unwanted reboots.

  • the kdump initrd now waits for critical block devices.
  • unnecessary warnings concerning the ld.conf file have been removed.
  • VMCore files could not be saved to remote hosts when running the xend

daemon and network-bridge on a dom0 hypervisor.

  • on the Itanium(r) architecture, when the kdump kernel was booted, this

message appeared in the boot log:

mknod: /tmp/initrd.[numbers omitted]/dev/efirtc: No such file or directory"

This message, which resulted from a malformed reuest to create the efirtc
in an incorrect path, is redundant, because this device path is created
statically in the initramfs when kdump is started, and as also harmless, in
that it should not affect kdump's performance.

  • in certain circumstances, makedumpfile failed on the 64-bit PowerPC

architecture due to a memory region size miscalculation.

  • the kexec-kdump-howto.txt file now contains information about the correct

usage with scp.

  • makedumpfile failed on the Itanium(r) architecture due to an issue with

overlapping segments.

  • some invalid statements in the mkdumprd man page have been clarified.
  • kdump failed to locate LVM volumes and save the crash dump due to a file

name parsing error.

  • special "md" and "cciss" devices are now excluded from

/etc/critical_disks when running mkdumprd.

  • mkdumprd is now able to handle more complicated bonded interface

configurations.

  • the kdump init script contained some now-corrected typos.
  • mkdumprd was unable to drop the user to a shell prompt as a last resort

after failing to capture a VMCore.

  • previously, RAID 5 systems resulted in mkdumprd issuing the following

(abbreviated) error message: "No module raid5 found...Failed to run mkdumprd".

  • makedumpfile now handles a corner case when building filter maps.

These packages also feature these enhancements:

  • the makedumpfile command can now be used on dom0 hypervisors without

requiring the use of the kernel debugging packages.

  • dumprd now displays VMCore capture progress.
  • kdump.conf can now override the /etc/modprobe.conf module options.
  • a manual page for the kdump.conf configuration file has been added, which

include information about the kdump_pre and kdump_post directives.

  • makedumpfile now supports hypervisor kernels.
  • new udev rules have been added to restart the kdump service on CPU and

memory hot plug devices.

  • kexec is now statically linked to the zlib library to enable faster

reboot times.

  • "makedumpfile --help" now provides help information.
  • kdump now benefits from improved support for certain HP systems when used

with the 5.3 kernel.

Users are advised to upgrade to these updated kexec-tools packages, which
resolve these issues and add these enhancements.

Solution

Before applying this update, make sure that all previously-released errata
relevant to your system have been applied.

This update is available via Red Hat Network. Details on how to use the Red
Hat Network to apply this update are available at
http://kbase.redhat.com/faq/docs/DOC-11259

Affected Products

  • Red Hat Enterprise Linux Server 5 x86_64
  • Red Hat Enterprise Linux Server 5 ia64
  • Red Hat Enterprise Linux Server 5 i386
  • Red Hat Enterprise Linux Workstation 5 x86_64
  • Red Hat Enterprise Linux Workstation 5 i386
  • Red Hat Enterprise Linux Desktop 5 x86_64
  • Red Hat Enterprise Linux Desktop 5 i386
  • Red Hat Enterprise Linux for IBM z Systems 5 s390x
  • Red Hat Enterprise Linux for Power, big endian 5 ppc
  • Red Hat Enterprise Linux Server from RHUI 5 x86_64
  • Red Hat Enterprise Linux Server from RHUI 5 i386

Fixes

  • BZ - 254163 - kdump under kernel-xen fails with I/O load on aic7xxx or megaraid_mbox
  • BZ - 360111 - kdump not working with non-default LVM names
  • BZ - 438056 - makedumpfile -c on an existing vmcore fails on ppc
  • BZ - 438459 - [5.2][kdump] "ls: /etc/ld.so.conf.d/*: No such file or directory" warning
  • BZ - 438755 - mkdumprd creates /dev/efirtc in wrong location in initrd
  • BZ - 440983 - Description about ssh/scp in kexec-kdump-howto.txt needs to be updated
  • BZ - 442678 - [5.2][kdump] unable to mount rootfs. Dropping to shell
  • BZ - 444824 - not all mkdumprd options work
  • BZ - 446279 - kdump initrd does not handle lun scanning race condition
  • BZ - 449111 - [RHEL5.2] makedumpfile corrupts vmcore on ia64: crash's bt fails to unwind
  • BZ - 450549 - makedumpfile core_collector comment in kdump.conf incorrect
  • BZ - 456154 - mdadm usage bug in /sbin/mkdumprd may cause dumps to be lost
  • BZ - 457758 - /sbin/mkdumprd parses comment lines of /etc/mdadm.conf
  • BZ - 457904 - Confusion about Default Action
  • BZ - 458702 - kdump initrd hangs waiting on cciss or md devices
  • BZ - 459614 - kdump's dumprd not rebuilding when appropriate.
  • BZ - 459622 - pre- and post- scripts silently ignored
  • BZ - 459879 - kdump via bond device doesn't work for non-basic config.
  • BZ - 461551 - initscripts unmounts /usr before calling kexec which needs it...
  • BZ - 461616 - Typos in kdump inistscript
  • BZ - 462829 - [5.3] Bad Message - not space enough
  • BZ - 463878 - [5.3] mkdumprd Not Robust Enough
  • BZ - 463915 - [5.3] SCP - dd: /dev/mem: Bad address
  • BZ - 465361 - mkdumprd doesn't handle raid5 properly
  • BZ - 469147 - [5.3] TPS Verify Test Failure
  • BZ - 472575 - kdump is failed by nonexistent device entry in /etc/fstab
  • BZ - 475505 - need to add code to exclude gart region from vmcore

CVEs

(none)

References

(none)

Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux Server 5

SRPM
kexec-tools-1.102pre-56.el5.src.rpm SHA-256: fbdb015e494354820d564e6b121c1befe5d4b1484ca126698a320758b4cf1b4e
x86_64
kexec-tools-1.102pre-56.el5.x86_64.rpm SHA-256: 3317280ceae7481a11e34fceca68c0583278902eb529de80923964930686ffb6
ia64
kexec-tools-1.102pre-56.el5.ia64.rpm SHA-256: 87d294538feb4221ad42e47052209e8524588624608bdf97d110510861443f72
i386
kexec-tools-1.102pre-56.el5.i386.rpm SHA-256: 540bb56b6a447432eb35f14139d751c8ca701101304926dd237a7d896754f073

Red Hat Enterprise Linux Workstation 5

SRPM
kexec-tools-1.102pre-56.el5.src.rpm SHA-256: fbdb015e494354820d564e6b121c1befe5d4b1484ca126698a320758b4cf1b4e
x86_64
kexec-tools-1.102pre-56.el5.x86_64.rpm SHA-256: 3317280ceae7481a11e34fceca68c0583278902eb529de80923964930686ffb6
i386
kexec-tools-1.102pre-56.el5.i386.rpm SHA-256: 540bb56b6a447432eb35f14139d751c8ca701101304926dd237a7d896754f073

Red Hat Enterprise Linux Desktop 5

SRPM
kexec-tools-1.102pre-56.el5.src.rpm SHA-256: fbdb015e494354820d564e6b121c1befe5d4b1484ca126698a320758b4cf1b4e
x86_64
kexec-tools-1.102pre-56.el5.x86_64.rpm SHA-256: 3317280ceae7481a11e34fceca68c0583278902eb529de80923964930686ffb6
i386
kexec-tools-1.102pre-56.el5.i386.rpm SHA-256: 540bb56b6a447432eb35f14139d751c8ca701101304926dd237a7d896754f073

Red Hat Enterprise Linux for IBM z Systems 5

SRPM
kexec-tools-1.102pre-56.el5.src.rpm SHA-256: fbdb015e494354820d564e6b121c1befe5d4b1484ca126698a320758b4cf1b4e
s390x
kexec-tools-1.102pre-56.el5.s390x.rpm SHA-256: b9f8c9b93625c67b10abe4c2fe9cf70f1e3577f79ded36f22680b9163b24905d

Red Hat Enterprise Linux for Power, big endian 5

SRPM
kexec-tools-1.102pre-56.el5.src.rpm SHA-256: fbdb015e494354820d564e6b121c1befe5d4b1484ca126698a320758b4cf1b4e
ppc
kexec-tools-1.102pre-56.el5.ppc64.rpm SHA-256: d61e3bbbbdf7f0d0e07e4b3e541e18f8364c20fb25ad7d9ad6e1d228c92dba8a

Red Hat Enterprise Linux Server from RHUI 5

SRPM
kexec-tools-1.102pre-56.el5.src.rpm SHA-256: fbdb015e494354820d564e6b121c1befe5d4b1484ca126698a320758b4cf1b4e
x86_64
kexec-tools-1.102pre-56.el5.x86_64.rpm SHA-256: 3317280ceae7481a11e34fceca68c0583278902eb529de80923964930686ffb6
i386
kexec-tools-1.102pre-56.el5.i386.rpm SHA-256: 540bb56b6a447432eb35f14139d751c8ca701101304926dd237a7d896754f073

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat LinkedIn YouTube Facebook X, formerly Twitter

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2025 Red Hat

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility