- Issued:
- 2013-10-01
- Updated:
- 2013-10-01
RHBA-2013:1398 - Bug Fix Advisory
Synopsis
kernel-rt bug fix update
Type/Severity
Bug Fix Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
Updated kernel-rt packages that fix multiple bugs are now available for Red
Hat Enterprise MRG 2.4.
Description
The kernel-rt packages contain the Linux kernel, the core of any Linux operating
system. This update provides a build of the kernel-rt package for MRG 2.4, which
is layered on Red Hat Enterprise Linux 6 and upgrades the kernel-rt kernel to
version kernel-rt-3.8.13-rt14.20. This update also fixes the following bugs:
- The hpsa driver in the MRG Enterprise Realtime kernel used smp_processor_id()
in a preemptable context, which could cause an Oops backtrace to be generated.
To resolve this issue, the code was converted to use raw_smp_processor_id() to
avoid a backtrace. (BZ#989632)
- A race condition existed in NFS workqueue code, which could cause the MRG
Enterprise Realtime kernel to panic when using NFS while under a load. The NFS
RPC code was modified to change the order of lock-less operation to avoid the
race condition that lead to the panic. (BZ#987150)
- The RT patchset converted the acpi_glb_hardware_lock function to a sleeping
spinlock (rt_mutex_t) in the MRG Enterprise Realtime kernel. This system could
then panic due to sleeping in atomic context. The acpi_glb_hardware_lock
function was converted back to a raw_spinlock_t to provide correct operation.
(BZ#974608)
- The following drivers have been updated, fixing a number of bugs: myri10ge,
bna, enic, mlx4, bgmac, bcma, cxgb3, cxgb4, qlcnic, r8169, be2net, e100, e1000,
e1000e, igb, ixgbe, brcm80211, cpsw, pch_gbe, bfin_mac, bnx2x, bnx2, cnic, tg3,
and sfc. (BZ#974144)
- The bfa driver in the MRG Enterprise Realtime kernel was upgraded without
upgrading the corresponding firmware. This caused the bfa driver to not function
as it was not initialized properly. The appropriate bfa firmware was added to
the to rt-firmware package allowing the bfa driver to work properly with 3.8
Realtime kernel. (BZ#910551)
Solution
Users of the Realtime capabilities of Red Hat Enterprise MRG 2.4, which is
layered on Red Hat Enterprise Linux 6, are advised to upgrade to these updated
packages, which upgrade the kernel-rt kernel to version kernel-rt-3.8.13-rt14.20
and fix these bugs. Note that the system must be rebooted for this update to
take effect.
Before applying this update, make sure all previously-released errata
relevant to your system have been applied.
This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/site/articles/11258
To install kernel packages manually, use "rpm -ivh [package]". Do not
use "rpm -Uvh" as that will remove the running kernel binaries from
your system. You may use "rpm -e" to remove old kernels after
determining that the new kernel functions properly on your system.
Affected Products
- MRG Realtime 2 x86_64
Fixes
- BZ - 910551 - bfa driver stalls udevd
- BZ - 974144 - MRG 2.4 kernel drivers update
- BZ - 974608 - Panic on HP BL460c G1 with 3.8 debug kernel
- BZ - 989632 - BUG: using smp_processor_id() in preemptible [00000000 00000000] code: hpsa
CVEs
(none)
References
(none)
MRG Realtime 2
SRPM | |
---|---|
kernel-rt-3.8.13-rt14.20.el6rt.src.rpm | SHA-256: ed743828d9f1b62973d0213c0f67bc5cee6341c3153c6cbfd504497f602f671e |
x86_64 | |
kernel-rt-3.8.13-rt14.20.el6rt.x86_64.rpm | SHA-256: 259fa2c4eece6579076a2bbbdd299489a369ac59a669e822e634bb07f7889173 |
kernel-rt-debug-3.8.13-rt14.20.el6rt.x86_64.rpm | SHA-256: 4376d52d4629354affed3192ba66abd530b8637f1092333f9e6a8be23e069a54 |
kernel-rt-debug-debuginfo-3.8.13-rt14.20.el6rt.x86_64.rpm | SHA-256: 0c74baa81f951db9e702313ec6bd0c45d70079884438f510566269eb814706eb |
kernel-rt-debug-devel-3.8.13-rt14.20.el6rt.x86_64.rpm | SHA-256: 0017e612c2146aacb60fc33e9f7ced9fa7aae0599fbf56c18f25567172c9175c |
kernel-rt-debuginfo-3.8.13-rt14.20.el6rt.x86_64.rpm | SHA-256: f983dee96b9f80e633d608d30fb0f76a43a3fcb083c9c518c5475bf8975d89e6 |
kernel-rt-debuginfo-common-x86_64-3.8.13-rt14.20.el6rt.x86_64.rpm | SHA-256: 5bc8f8e0b4568f86e98a7692d3d1c5c05525397f3ddf74a5aabdc30b79d665dd |
kernel-rt-devel-3.8.13-rt14.20.el6rt.x86_64.rpm | SHA-256: 85c1870ca74ee4711344db29d7063e5b11f3e7dbc76e43f23738e9e5382d138e |
kernel-rt-doc-3.8.13-rt14.20.el6rt.noarch.rpm | SHA-256: f444879cf35ec4b8456833376441883a01fd6d28399509d5bffcd7c164955403 |
kernel-rt-firmware-3.8.13-rt14.20.el6rt.noarch.rpm | SHA-256: 78603ca869af544d1abd8ff89cd129dc04b1faba10454bc7749335ccd8c8e3cc |
kernel-rt-trace-3.8.13-rt14.20.el6rt.x86_64.rpm | SHA-256: ddf41d34068d6cc3c83e6734def9d2aa31afe3cbc3fd12e1d70c937caaba2ab4 |
kernel-rt-trace-debuginfo-3.8.13-rt14.20.el6rt.x86_64.rpm | SHA-256: df34897faefebc2c6adfa6668c9b03c11a8c850602460e45b142043d71dbdde3 |
kernel-rt-trace-devel-3.8.13-rt14.20.el6rt.x86_64.rpm | SHA-256: 697386d32dd4999b4bb56de0a529ac843c233c2fc68d02422c4d5f19bdaaebfa |
kernel-rt-vanilla-3.8.13-rt14.20.el6rt.x86_64.rpm | SHA-256: 369b55af1bd0d922300ba70b2e72000236399ec7a89b853987193e492a099f4d |
kernel-rt-vanilla-debuginfo-3.8.13-rt14.20.el6rt.x86_64.rpm | SHA-256: 51284d6321c9aed2d0602fd18bcacc9ebeddccd7636093640d020da107cdb4d5 |
kernel-rt-vanilla-devel-3.8.13-rt14.20.el6rt.x86_64.rpm | SHA-256: c2db4076823618ffe5ae39ad56c74ef8b4867a2609b30973cef79d55ad192f12 |
mrg-rt-release-3.8.13-rt14.20.el6rt.noarch.rpm | SHA-256: cbcb0f2527b83188d8f52dd5c5112566f0fc254c059f9a15226f6bb9761e27d5 |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.