- Issued:
- 2018-05-29
- Updated:
- 2018-05-29
RHBA-2018:1752 - Bug Fix Advisory
Synopsis
kernel-rt bug fix update
Type/Severity
Bug Fix Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
An update for kernel-rt is now available for Red Hat Enterprise MRG 2.
Description
The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.
The kernel-rt packages have been upgraded to version 3.10.0-693.33.1.rt56.621, which provides a number of bug fixes over the previous version. (BZ#1570863)
This update also fixes the following bugs:
- The attempt to join to a multicast group without ensuring that CMA device exists was leading the system to a crash. The solution for this fix was then to verify if the device exists before joining to the multicast group, returning an error in the case of the non-existing device. (BZ#1547623)
- Previously, the realtime kernel used the EXPORT_SYMBOL_GPL symbol to export the rt_mutex_destroy() function. Consequently, Nvidia proprietary GPU driver could not resolve the symbol due to not being GPL-licensed. This update modifies the realtime kernel to use the EXPORT_SYMBOL symbol instead. As a result, the Nvidia driver successfully resolves rt_mutex_destroy() and loads as expected. (BZ#1575505)
Solution
For details on how to apply this update, which includes the changes described in this advisory, refer to:
https://access.redhat.com/articles/11258
The system must be rebooted for this update to take effect.
Affected Products
- MRG Realtime 2 x86_64
Fixes
- BZ - 1547623 - A few tasks blocked waiting on the rescuer task assigned to the workqueue "close_wq"
- BZ - 1570863 - update the MRG 2.5.z 3.10 kernel-rt sources
CVEs
(none)
References
(none)
MRG Realtime 2
SRPM | |
---|---|
kernel-rt-3.10.0-693.33.1.rt56.621.el6rt.src.rpm | SHA-256: 29b01d87295fcaa764326c74774fea14e1dfa4838cff466e37c8012641737a5a |
x86_64 | |
kernel-rt-3.10.0-693.33.1.rt56.621.el6rt.x86_64.rpm | SHA-256: b7d9e8ed81c274102664436e7aa3779eb89fc5a17b1a6761598b0249c3c7d6c3 |
kernel-rt-debug-3.10.0-693.33.1.rt56.621.el6rt.x86_64.rpm | SHA-256: 84963f14a9a1b8f50792ae5fbdaf58a59ec8f7092e0bde8a5b2244f88ea8915d |
kernel-rt-debug-debuginfo-3.10.0-693.33.1.rt56.621.el6rt.x86_64.rpm | SHA-256: 680f302720f94f79f958c3d5f85a654ee362dc805055e8bacdbc216e4414752c |
kernel-rt-debug-devel-3.10.0-693.33.1.rt56.621.el6rt.x86_64.rpm | SHA-256: 22fdc3e75fc269aeb179009f996505ace8cdb389127360d0a893ed96f8d4a879 |
kernel-rt-debuginfo-3.10.0-693.33.1.rt56.621.el6rt.x86_64.rpm | SHA-256: 319255ce5105ffd2cfb7325858c57442fdada74c992b849fabab4cd9d75a5958 |
kernel-rt-debuginfo-common-x86_64-3.10.0-693.33.1.rt56.621.el6rt.x86_64.rpm | SHA-256: babbe6330ca3e260ad66c43919189600e858881d2c1b1337f42ca4941ff48e10 |
kernel-rt-devel-3.10.0-693.33.1.rt56.621.el6rt.x86_64.rpm | SHA-256: 6c310900cc25faf6fe90a6cb56102a4137ee7da6b6c10fd29a67a3c8fc19e901 |
kernel-rt-doc-3.10.0-693.33.1.rt56.621.el6rt.noarch.rpm | SHA-256: 311f71d933a04da119e4798964c5d5264f95a8cf65330d31c52b69bb1f4b373e |
kernel-rt-firmware-3.10.0-693.33.1.rt56.621.el6rt.noarch.rpm | SHA-256: 005b60195224b54a806e5ab14afe70592a8e50c2a0f17f5189cde4680d7af669 |
kernel-rt-trace-3.10.0-693.33.1.rt56.621.el6rt.x86_64.rpm | SHA-256: 02f386b8000fe6feba37a12872e87dc2de7d320c932ae46c96c21125e135260d |
kernel-rt-trace-debuginfo-3.10.0-693.33.1.rt56.621.el6rt.x86_64.rpm | SHA-256: 4dbc1a23ef0daa1a5e17569796266976c28bdc710ed497f790975760da374af2 |
kernel-rt-trace-devel-3.10.0-693.33.1.rt56.621.el6rt.x86_64.rpm | SHA-256: 891c781767bcdf6ad8d4bf0a0aab39bda87276cc674ddda313bf0f18cf771dd0 |
kernel-rt-vanilla-3.10.0-693.33.1.rt56.621.el6rt.x86_64.rpm | SHA-256: cea7b9815daf6a936d69c1840b783293e3e210fe923fb1a1ba508003077d0e1b |
kernel-rt-vanilla-debuginfo-3.10.0-693.33.1.rt56.621.el6rt.x86_64.rpm | SHA-256: b4ca0376d91c9025920c3aa2cb9cc9cdf2619f353fd35da839a63a3f755ae286 |
kernel-rt-vanilla-devel-3.10.0-693.33.1.rt56.621.el6rt.x86_64.rpm | SHA-256: 10e853895d795bfc96ae6cb79b7105123a3204b76cb3aa26deffeb62fee530bf |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.