Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Lightspeed
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Lightspeed
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHBA-2012:0203 - Bug Fix Advisory
Issued:
2012-02-20
Updated:
2012-02-20

RHBA-2012:0203 - Bug Fix Advisory

  • Overview
  • Updated Packages

Synopsis

crash bug fix and enhancement update

Type/Severity

Bug Fix Advisory

Red Hat Lightspeed patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

An updated crash package that fixes various bugs is now available for Red Hat
Enterprise Linux 5

Description

The crash package provides a self-contained tool that can be used to investigate
live systems, and kernel core dumps created from the netdump, diskdump, kdump,
and Xen/KVM "virsh dump" facilities from Red Hat Enterprise Linux.

This updated crash package includes fixes for the following bugs:

  • The crash package has been upgraded to upstream version 5.1.8, which provides

a number of enhancements and bug fixes over the previous version. (BZ#715072)

  • On AMD64 and Intel 64 architectures, the "bt" command failed when the shutdown

NMI was issued to a 32-bit task that had executed a "sysenter" instruction and
the RSP still contained the zero value loaded from the MSR_IA32_SYSENTER_ESP
register. Consequently, the backtrace issued the following warning message:

"WARNING: possibly bogus exception frame"

and was unable to make a transition from the NMI exception stack back to the
process stack. With this update, the underlying source code has been modified to
address this issue, and the aforementioned command no longer fails. (BZ#676408)

  • On AMD64 and Intel 64 architectures, the "bt" command failed with several

backtrace errors for non-crashing active tasks:

"bt: cannot resolve stack trace"

This was due to a failure to properly transition from the shutdown NMI stack
back to the process stack. This update fixes these errors, and executing the
"bt" command on non-crashing active tasks works as expected. (BZ#713050)

  • KVM virtual systems contain an I/O hole in the physical memory region from

0xe0000000 to 0x100000000 (3.5 GB to 4 GB). If a guest is provisioned with more
than 3.5 GB of RAM, then the memory above 3.5 GB is "pushed up" to start at
0x100000000 (4 GB). However, the "ram" device headers in the KVM dumpfiles do
not reflect that. As a result, numerous error messages were displayed during
invocation, and the session would often fail. With this update, the crash
utility takes the I/O hole into account despite the fact that the "ram" device
headers in KVM dumpfiles do not; consequently, error messages are no longer
displayed during invocation. (BZ#716327)

  • The KVM I/O hole size is currently set to either 1 GB or 512 MB, but its

setting is hardwired into the Qemu code that was used to create the dumpfile.
The dumpfile is a "savevm" file that is designed to be used for guest migration,
and since inter-version save/load operations are not supported, the I/O hole
information does not have to be encoded into the dumpfile. Prior to this update,
the I/O hole for dumpfiles created by older Qemu version was not being set to
1GB, so if the KVM guest was configured with more than 3GB of memory, the crash
session would typically display numerous "read error" messages during session
initialization. With this update, the crash session does not return any error
messages during session initialization. (BZ#715070)

All users of crash are advised to upgrade to this updated package, which
resolves these issues.

Solution

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/kb/docs/DOC-11259

Affected Products

  • Red Hat Enterprise Linux Server 5 x86_64
  • Red Hat Enterprise Linux Server 5 ia64
  • Red Hat Enterprise Linux Server 5 i386
  • Red Hat Enterprise Linux Workstation 5 x86_64
  • Red Hat Enterprise Linux Workstation 5 i386
  • Red Hat Enterprise Linux Desktop 5 x86_64
  • Red Hat Enterprise Linux Desktop 5 i386
  • Red Hat Enterprise Linux for IBM z Systems 5 s390x
  • Red Hat Enterprise Linux for Power, big endian 5 ppc
  • Red Hat Enterprise Linux Server from RHUI 5 x86_64
  • Red Hat Enterprise Linux Server from RHUI 5 i386

Fixes

  • BZ - 676408 - bt: WARNING: possibly bogus exception frame
  • BZ - 715070 - crash: RHEL5 "virsh dump" support fails if guest has >= 3GB memory
  • BZ - 715072 - Rebase request for crash utility RHEL5.8 errata

CVEs

(none)

References

(none)

Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux Server 5

SRPM
crash-5.1.8-1.el5.src.rpm SHA-256: b3ee9958bb98735c8570d02c5031c069ca71b5c51220793c0644fc9e32934fd9
x86_64
crash-5.1.8-1.el5.x86_64.rpm SHA-256: cc141540a7e21baf2b5ae399989fe2dc0dfcbd869ae75ce04dab6710fce66ced
crash-devel-5.1.8-1.el5.i386.rpm SHA-256: ff7f022c47cf3da684ba9a9cf3eb93d4ac40fc803d9b495f496b8aadbb2c1a5b
crash-devel-5.1.8-1.el5.x86_64.rpm SHA-256: 771cf6e5551d5846e9881d64d6c369f15c951f8ea0dd01c7885bcd36fe22be94
ia64
crash-5.1.8-1.el5.ia64.rpm SHA-256: caf7df9fccb1df67fd1362d4b7464c12f82169a7df76681df1b16bd7e3d063d3
crash-devel-5.1.8-1.el5.ia64.rpm SHA-256: 5e7f297b25d0f4b3d8613a02262f859d569d74e2d418596cc2bcb79a87474d42
i386
crash-5.1.8-1.el5.i386.rpm SHA-256: 4c279b0da14c4c95209f12bf9a3dfd298f8d4708a30c17eddc084b115a749866
crash-devel-5.1.8-1.el5.i386.rpm SHA-256: ff7f022c47cf3da684ba9a9cf3eb93d4ac40fc803d9b495f496b8aadbb2c1a5b

Red Hat Enterprise Linux Workstation 5

SRPM
crash-5.1.8-1.el5.src.rpm SHA-256: b3ee9958bb98735c8570d02c5031c069ca71b5c51220793c0644fc9e32934fd9
x86_64
crash-5.1.8-1.el5.x86_64.rpm SHA-256: cc141540a7e21baf2b5ae399989fe2dc0dfcbd869ae75ce04dab6710fce66ced
crash-devel-5.1.8-1.el5.i386.rpm SHA-256: ff7f022c47cf3da684ba9a9cf3eb93d4ac40fc803d9b495f496b8aadbb2c1a5b
crash-devel-5.1.8-1.el5.x86_64.rpm SHA-256: 771cf6e5551d5846e9881d64d6c369f15c951f8ea0dd01c7885bcd36fe22be94
i386
crash-5.1.8-1.el5.i386.rpm SHA-256: 4c279b0da14c4c95209f12bf9a3dfd298f8d4708a30c17eddc084b115a749866
crash-devel-5.1.8-1.el5.i386.rpm SHA-256: ff7f022c47cf3da684ba9a9cf3eb93d4ac40fc803d9b495f496b8aadbb2c1a5b

Red Hat Enterprise Linux Desktop 5

SRPM
crash-5.1.8-1.el5.src.rpm SHA-256: b3ee9958bb98735c8570d02c5031c069ca71b5c51220793c0644fc9e32934fd9
x86_64
crash-5.1.8-1.el5.x86_64.rpm SHA-256: cc141540a7e21baf2b5ae399989fe2dc0dfcbd869ae75ce04dab6710fce66ced
i386
crash-5.1.8-1.el5.i386.rpm SHA-256: 4c279b0da14c4c95209f12bf9a3dfd298f8d4708a30c17eddc084b115a749866

Red Hat Enterprise Linux for IBM z Systems 5

SRPM
crash-5.1.8-1.el5.src.rpm SHA-256: b3ee9958bb98735c8570d02c5031c069ca71b5c51220793c0644fc9e32934fd9
s390x
crash-5.1.8-1.el5.s390x.rpm SHA-256: eb80eae956cc384112293237babcb887840abd5699e7bfee2372aeec4299cb40
crash-devel-5.1.8-1.el5.s390.rpm SHA-256: 01afc1d93b566a33b760727e356dbc34fea56935901b722d5089e1d9093cd110
crash-devel-5.1.8-1.el5.s390x.rpm SHA-256: e6b9ca54c8d6321e7740514d38594d1e6f65132560b01cb93cf3e0d318aabb95

Red Hat Enterprise Linux for Power, big endian 5

SRPM
crash-5.1.8-1.el5.src.rpm SHA-256: b3ee9958bb98735c8570d02c5031c069ca71b5c51220793c0644fc9e32934fd9
ppc
crash-5.1.8-1.el5.ppc64.rpm SHA-256: 6aebbdd902e1aea35c61d028666586c101b8ad15f856a71c3d550d03ea0a237e
crash-devel-5.1.8-1.el5.ppc64.rpm SHA-256: d4e2fabeb89071ed071c59031aa7dd5ffadcb313596909df901ff1e3f1482b48

Red Hat Enterprise Linux Server from RHUI 5

SRPM
crash-5.1.8-1.el5.src.rpm SHA-256: b3ee9958bb98735c8570d02c5031c069ca71b5c51220793c0644fc9e32934fd9
x86_64
crash-5.1.8-1.el5.x86_64.rpm SHA-256: cc141540a7e21baf2b5ae399989fe2dc0dfcbd869ae75ce04dab6710fce66ced
crash-devel-5.1.8-1.el5.i386.rpm SHA-256: ff7f022c47cf3da684ba9a9cf3eb93d4ac40fc803d9b495f496b8aadbb2c1a5b
crash-devel-5.1.8-1.el5.x86_64.rpm SHA-256: 771cf6e5551d5846e9881d64d6c369f15c951f8ea0dd01c7885bcd36fe22be94
i386
crash-5.1.8-1.el5.i386.rpm SHA-256: 4c279b0da14c4c95209f12bf9a3dfd298f8d4708a30c17eddc084b115a749866
crash-devel-5.1.8-1.el5.i386.rpm SHA-256: ff7f022c47cf3da684ba9a9cf3eb93d4ac40fc803d9b495f496b8aadbb2c1a5b

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat LinkedIn YouTube Facebook X, formerly Twitter

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2025 Red Hat

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility