An update for kexec-tools is now available for Red Hat Enterprise Linux 6.8.

The kexec-tools packages contain the /sbin/kexec binary and utilities thattogether form the user-space component of the kernel’s kexec feature.

The/sbin/kexec binary facilitates a new kernel to boot using the kernel’s kexecfeature either on a normal or a panic reboot.

The kexec fastboot mechanismallows booting a Linux kernel from the context of an already running kernel.

For detailed information on changes in this release, see the Red Hat EnterpriseLinux 6.8 Release Notes and Red Hat Enterprise Linux 6.8 Technical Notes linkedfrom the References section.Users of kexec-tools are advised to upgrade to these updated packages.
Red Hat Enterprise Linux Desktop (v. 6)

SRPMS:
kexec-tools-2.0.0-300.el6.src.rpm
    MD5: 03a65538bad1b32b29b8d1e5f057ffd8SHA-256: 04bec6193d701629cc1f0423d95e70f128bf30044f147ac914c2a9c8075a8823
 
IA-32:
kexec-tools-2.0.0-300.el6.i686.rpm
    MD5: 05ce18090a76d35d8db60ac47df852a1SHA-256: 5e7b49390e4986b6a8969cf2e3adce2b99064a73428ad677ce9a63ff573db683
kexec-tools-debuginfo-2.0.0-300.el6.i686.rpm
    MD5: fa5af4c4aef7639fe71ddea6fbd6a047SHA-256: 4994963c86e995c9c3b0384c127193d3446a2189ed8772b2bc0a947c929618f0
kexec-tools-eppic-2.0.0-300.el6.i686.rpm
    MD5: 4399c3c4108bbe300485b725eccf2823SHA-256: ea69c86d7979aa4123c1131bb83dc991e21c18273396cebe8824917ca17165db
 
x86_64:
kexec-tools-2.0.0-300.el6.x86_64.rpm
    MD5: f1ca1d31e30a8c5a75e6f4dc415b8b80SHA-256: 419fb6e353d38e866fd0275d371745bab2576d476f6d01538f7447f62f83e1f4
kexec-tools-debuginfo-2.0.0-300.el6.x86_64.rpm
    MD5: bf962cd921b7598e3aabc7662a01402fSHA-256: b8dbd1f9182898abb6a3d3f01554854861034bb9c44d8f5c488b18a1aa229e10
kexec-tools-eppic-2.0.0-300.el6.x86_64.rpm
    MD5: 19869b5ebbea4d90d3875f43ebce3ae1SHA-256: 813f276c6c77bdf8a94f45aef1a1a676c3cf4c710adae246cf3ffe35f9b936b3
 
Red Hat Enterprise Linux HPC Node (v. 6)

SRPMS:
kexec-tools-2.0.0-300.el6.src.rpm
    MD5: 03a65538bad1b32b29b8d1e5f057ffd8SHA-256: 04bec6193d701629cc1f0423d95e70f128bf30044f147ac914c2a9c8075a8823
 
x86_64:
kexec-tools-2.0.0-300.el6.x86_64.rpm
    MD5: f1ca1d31e30a8c5a75e6f4dc415b8b80SHA-256: 419fb6e353d38e866fd0275d371745bab2576d476f6d01538f7447f62f83e1f4
kexec-tools-debuginfo-2.0.0-300.el6.x86_64.rpm
    MD5: bf962cd921b7598e3aabc7662a01402fSHA-256: b8dbd1f9182898abb6a3d3f01554854861034bb9c44d8f5c488b18a1aa229e10
kexec-tools-eppic-2.0.0-300.el6.x86_64.rpm
    MD5: 19869b5ebbea4d90d3875f43ebce3ae1SHA-256: 813f276c6c77bdf8a94f45aef1a1a676c3cf4c710adae246cf3ffe35f9b936b3
 
Red Hat Enterprise Linux Server (v. 6)

SRPMS:
kexec-tools-2.0.0-300.el6.src.rpm
    MD5: 03a65538bad1b32b29b8d1e5f057ffd8SHA-256: 04bec6193d701629cc1f0423d95e70f128bf30044f147ac914c2a9c8075a8823
 
IA-32:
kexec-tools-2.0.0-300.el6.i686.rpm
    MD5: 05ce18090a76d35d8db60ac47df852a1SHA-256: 5e7b49390e4986b6a8969cf2e3adce2b99064a73428ad677ce9a63ff573db683
kexec-tools-debuginfo-2.0.0-300.el6.i686.rpm
    MD5: fa5af4c4aef7639fe71ddea6fbd6a047SHA-256: 4994963c86e995c9c3b0384c127193d3446a2189ed8772b2bc0a947c929618f0
kexec-tools-eppic-2.0.0-300.el6.i686.rpm
    MD5: 4399c3c4108bbe300485b725eccf2823SHA-256: ea69c86d7979aa4123c1131bb83dc991e21c18273396cebe8824917ca17165db
 
PPC:
kexec-tools-2.0.0-300.el6.ppc64.rpm
    MD5: 189f2abb483bf6b208c98c388352dba2SHA-256: 86fafe60f094f27692d5edba0fc81444af9165809d84ec0b4604790325e658de
kexec-tools-debuginfo-2.0.0-300.el6.ppc64.rpm
    MD5: d1aec8f116615408298a4c5d65186367SHA-256: 309c74fe3c955a7c3019e9c2a7e3561c706afc0f9b808e22f1b4966b2f411d81
kexec-tools-eppic-2.0.0-300.el6.ppc64.rpm
    MD5: 748cc08eac6a6ab786c365a9f137668fSHA-256: 2a122ad425312f9738251dd6e0fb37e15e42ce78c0cf2567b7588dbbfef2542e
 
s390x:
kexec-tools-2.0.0-300.el6.s390x.rpm
    MD5: 784136abb960512f3e1837d812fe48d2SHA-256: 00e84d9b389eb52db5148c2ee61ddbd3b0926e811fc03c8bf86d6b3b264c2ae9
kexec-tools-debuginfo-2.0.0-300.el6.s390x.rpm
    MD5: 1a83030878ba4e0d9a09da2c69899d8eSHA-256: 0276c952a19b22c7636b7c7f37dc2a89a04de4b29cd0119bf05c89ec0919cf0d
kexec-tools-eppic-2.0.0-300.el6.s390x.rpm
    MD5: 138a61a5a08b73dfa0ddd8bc3167f0fbSHA-256: f5a98955f90f779a9d2d789a2a39c2d08bd3ebae83d5b538985ad17143c714f0
 
x86_64:
kexec-tools-2.0.0-300.el6.x86_64.rpm
    MD5: f1ca1d31e30a8c5a75e6f4dc415b8b80SHA-256: 419fb6e353d38e866fd0275d371745bab2576d476f6d01538f7447f62f83e1f4
kexec-tools-debuginfo-2.0.0-300.el6.x86_64.rpm
    MD5: bf962cd921b7598e3aabc7662a01402fSHA-256: b8dbd1f9182898abb6a3d3f01554854861034bb9c44d8f5c488b18a1aa229e10
kexec-tools-eppic-2.0.0-300.el6.x86_64.rpm
    MD5: 19869b5ebbea4d90d3875f43ebce3ae1SHA-256: 813f276c6c77bdf8a94f45aef1a1a676c3cf4c710adae246cf3ffe35f9b936b3
 
Red Hat Enterprise Linux Workstation (v. 6)

SRPMS:
kexec-tools-2.0.0-300.el6.src.rpm
    MD5: 03a65538bad1b32b29b8d1e5f057ffd8SHA-256: 04bec6193d701629cc1f0423d95e70f128bf30044f147ac914c2a9c8075a8823
 
IA-32:
kexec-tools-2.0.0-300.el6.i686.rpm
    MD5: 05ce18090a76d35d8db60ac47df852a1SHA-256: 5e7b49390e4986b6a8969cf2e3adce2b99064a73428ad677ce9a63ff573db683
kexec-tools-debuginfo-2.0.0-300.el6.i686.rpm
    MD5: fa5af4c4aef7639fe71ddea6fbd6a047SHA-256: 4994963c86e995c9c3b0384c127193d3446a2189ed8772b2bc0a947c929618f0
kexec-tools-eppic-2.0.0-300.el6.i686.rpm
    MD5: 4399c3c4108bbe300485b725eccf2823SHA-256: ea69c86d7979aa4123c1131bb83dc991e21c18273396cebe8824917ca17165db
 
x86_64:
kexec-tools-2.0.0-300.el6.x86_64.rpm
    MD5: f1ca1d31e30a8c5a75e6f4dc415b8b80SHA-256: 419fb6e353d38e866fd0275d371745bab2576d476f6d01538f7447f62f83e1f4
kexec-tools-debuginfo-2.0.0-300.el6.x86_64.rpm
    MD5: bf962cd921b7598e3aabc7662a01402fSHA-256: b8dbd1f9182898abb6a3d3f01554854861034bb9c44d8f5c488b18a1aa229e10
kexec-tools-eppic-2.0.0-300.el6.x86_64.rpm
    MD5: 19869b5ebbea4d90d3875f43ebce3ae1SHA-256: 813f276c6c77bdf8a94f45aef1a1a676c3cf4c710adae246cf3ffe35f9b936b3
 
(The unlinked packages above are only available from the Red Hat Network)
1283191 – mkdumprd fails on RHEV hosts with running VMs1294327 – /root/.ssh has incorrect mode873064 – Remove useless code about kdump-adv-conf903510 – kdump documentation unclear regarding minix

These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from: