Updated kexec-tools packages that fix one bug are now available for Red HatEnterprise Linux 7.

The kexec-tools packages contain the /sbin/kexec binary and utilities thattogether form the user-space component of the kernel’s kexec feature. The/sbin/kexec binary facilitates a new kernel to boot using the kernel’s kexecfeature either on a normal or a panic reboot. The kexec fastboot mechanismallows booting a Linux kernel from the context of an already running kernel.This update fixes the following bug:* Due to the “ip” parameter duplication, the kdump kernel failed to boot in theiSCSI boot environment. This update fixes the underlying source code, and thekdump utility now succeeds and produces a vmcore file as intended in theaforementioned situation. (BZ#1149584)Users of kexec-tools are advised to upgrade to these updated packages, which fixthis bug.
Before applying this update, make sure all previously released errata relevantto your system have been applied.This update is available via the Red Hat Network. Details on how to use the RedHat Network to apply this update are available athttps://access.redhat.com/articles/11258Red Hat Enterprise Linux Desktop (v. 7)

SRPMS:
kexec-tools-2.0.4-32.el7_0.5.src.rpm
    MD5: b3bb9220d12d9ea6fee8a678d6b74912SHA-256: 196374550f46cc3cb486ecd6e69849e8e86eccca3e588bbe37bf857761c67e89
 
x86_64:
kexec-tools-2.0.4-32.el7_0.5.x86_64.rpm
    MD5: eb9aeab54c7a13f847c1cd429d3e7d43SHA-256: b37e883674b22c42096daad84f0860ff07c424f2c8c86067626b55bc9b3c90db
kexec-tools-debuginfo-2.0.4-32.el7_0.5.x86_64.rpm
    MD5: f11c5dd4451598269e212664207844f7SHA-256: 40bf736cd66354cf251d0992687812eacdff5e1c461e8675bb023962c45ed298
kexec-tools-eppic-2.0.4-32.el7_0.5.x86_64.rpm
    MD5: a2a984c023f1b6de260c517f6c83878fSHA-256: 56319ae1a24918019c75bd951fbc1b2b15ce4ff91a758685b9904b27f8827577
 
Red Hat Enterprise Linux HPC Node (v. 7)

SRPMS:
kexec-tools-2.0.4-32.el7_0.5.src.rpm
    MD5: b3bb9220d12d9ea6fee8a678d6b74912SHA-256: 196374550f46cc3cb486ecd6e69849e8e86eccca3e588bbe37bf857761c67e89
 
x86_64:
kexec-tools-2.0.4-32.el7_0.5.x86_64.rpm
    MD5: eb9aeab54c7a13f847c1cd429d3e7d43SHA-256: b37e883674b22c42096daad84f0860ff07c424f2c8c86067626b55bc9b3c90db
kexec-tools-debuginfo-2.0.4-32.el7_0.5.x86_64.rpm
    MD5: f11c5dd4451598269e212664207844f7SHA-256: 40bf736cd66354cf251d0992687812eacdff5e1c461e8675bb023962c45ed298
kexec-tools-eppic-2.0.4-32.el7_0.5.x86_64.rpm
    MD5: a2a984c023f1b6de260c517f6c83878fSHA-256: 56319ae1a24918019c75bd951fbc1b2b15ce4ff91a758685b9904b27f8827577
 
Red Hat Enterprise Linux Server (v. 7)

SRPMS:
kexec-tools-2.0.4-32.el7_0.5.src.rpm
    MD5: b3bb9220d12d9ea6fee8a678d6b74912SHA-256: 196374550f46cc3cb486ecd6e69849e8e86eccca3e588bbe37bf857761c67e89
 
PPC:
kexec-tools-2.0.4-32.el7_0.5.ppc64.rpm
    MD5: 62e93972d344f1678a79565fc8bc60adSHA-256: 8839edf6aa33c728028454e4864745512cd96e3fcf70bb180c22f68f2360bb91
kexec-tools-debuginfo-2.0.4-32.el7_0.5.ppc64.rpm
    MD5: 8339fab9e9a94eb423ec3ad1b97eb66bSHA-256: 83af6b42688f3f7ed13527d6acce6a56fe2599e21e9fcbb50ed76a2e9845af63
kexec-tools-eppic-2.0.4-32.el7_0.5.ppc64.rpm
    MD5: 96fd24667231ac5a9f9e2187b2e819eaSHA-256: 61c43f8d3a0b16f84d76773658e4d92a25059c4a23e2cb150d8d8a07f339e972
 
s390x:
kexec-tools-2.0.4-32.el7_0.5.s390x.rpm
    MD5: d2af927fd5540bbbf060b22b437adabbSHA-256: a3501de5adea5e7233f4d3e44afda902dec85559544e8a045dfa098395c01cbe
kexec-tools-debuginfo-2.0.4-32.el7_0.5.s390x.rpm
    MD5: 0c09616154e775c8d18b5153f57f6bd4SHA-256: d67a4637e546a80d80b994c60b49c1fa90baa1d6f5f138b7348cfe23ee56fe9a
kexec-tools-eppic-2.0.4-32.el7_0.5.s390x.rpm
    MD5: 5c9e30d8f86d357109e692bd8099bec3SHA-256: 5953898baa9b8bbdeecbd3991f89170593b87a03b5bfcc477f3d5d27087fef12
 
x86_64:
kexec-tools-2.0.4-32.el7_0.5.x86_64.rpm
    MD5: eb9aeab54c7a13f847c1cd429d3e7d43SHA-256: b37e883674b22c42096daad84f0860ff07c424f2c8c86067626b55bc9b3c90db
kexec-tools-debuginfo-2.0.4-32.el7_0.5.x86_64.rpm
    MD5: f11c5dd4451598269e212664207844f7SHA-256: 40bf736cd66354cf251d0992687812eacdff5e1c461e8675bb023962c45ed298
kexec-tools-eppic-2.0.4-32.el7_0.5.x86_64.rpm
    MD5: a2a984c023f1b6de260c517f6c83878fSHA-256: 56319ae1a24918019c75bd951fbc1b2b15ce4ff91a758685b9904b27f8827577
 
Red Hat Enterprise Linux Workstation (v. 7)

SRPMS:
kexec-tools-2.0.4-32.el7_0.5.src.rpm
    MD5: b3bb9220d12d9ea6fee8a678d6b74912SHA-256: 196374550f46cc3cb486ecd6e69849e8e86eccca3e588bbe37bf857761c67e89
 
x86_64:
kexec-tools-2.0.4-32.el7_0.5.x86_64.rpm
    MD5: eb9aeab54c7a13f847c1cd429d3e7d43SHA-256: b37e883674b22c42096daad84f0860ff07c424f2c8c86067626b55bc9b3c90db
kexec-tools-debuginfo-2.0.4-32.el7_0.5.x86_64.rpm
    MD5: f11c5dd4451598269e212664207844f7SHA-256: 40bf736cd66354cf251d0992687812eacdff5e1c461e8675bb023962c45ed298
kexec-tools-eppic-2.0.4-32.el7_0.5.x86_64.rpm
    MD5: a2a984c023f1b6de260c517f6c83878fSHA-256: 56319ae1a24918019c75bd951fbc1b2b15ce4ff91a758685b9904b27f8827577
 
(The unlinked packages above are only available from the Red Hat Network)
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from:

Leave a Reply