Skip to navigation

Bug Fix Advisory kernel bug fix update

Advisory: RHBA-2010:0778-1
Type: Bug Fix Advisory
Severity: N/A
Issued on: 2010-10-19
Last updated on: 2010-10-19
Affected Products: Red Hat Enterprise Linux EUS (v. 5.4.z server)

Details

Updated kernel packages that resolve several issues are now available for Red
Hat Enterprise Linux 5.4 Extended Update Support.

The kernel packages contain the Linux kernel, the core of any Linux operating
system.

These updated kernel packages provide fixes for the following bugs:

* Previously, migrating a hardware virtual machine (HVM) guest with both UP and
PV drivers may have caused the guest to stop responding. With this update, HVM
guest migration works as expected. (BZ#630987)

* To build the CCW requests, the direct access storage device (DASD) reserve and
release ioctl system calls use a preallocated memory pool of the respective
device. Previously, this pool may have been emptied due to lack of memory,
causing such system calls to fail. With this update, a memory is preallocated
for each of these requests, and ioctl calls now work as expected. (BZ#631807)

* Prior to this update, ccw_device_set_options() in dasd_generic_probe() unset
the CWDEV_ALLOW_FORCE flag set in dasd_eckd_probe(). As a result, the
unconditional reserve was not allowed on ECKD direct access storage devices
(DASDs). With this update, the flags are set only in discipline specific probe
functions. (BZ#631809)

* The cnic parts resets could cause a deadlock when the bnx2 device was enslaved
in a bonding device and that device had an associated VLAN. (BZ#631854)

* Previously, running the dd command on an iSCSI device with the qla3xxx driver
may have caused the system to crash. This error has been fixed, and running the
dd command on such device no longer crashes the system. (BZ#637204)

* Recently applied patch introduced a bug, which caused the Xen guest networking
not to work properly on 64-bit Itanium processors. However, this bug also
revealed an issue, which may have led to a data corruption. With this update,
both errors have been fixed, and Xen virtual guest networking now works as
expected. (BZ#637219)

* Under certain circumstances, an attempt to dereference a NULL pointer in the
lpfc_nlp_put() function may have caused the system to crash. With this update,
several changes have been made to ensure the correct reference count, resolving
this issue. (BZ#637726)

Users should upgrade to these updated packages, which contain backported patches
to correct these issues. The system must be rebooted for this update to take
effect.


Solution

Before applying this update, make sure that all previously-released errata
relevant to your system have been applied.

This update is available via Red Hat Network. Details on how to use the Red
Hat Network to apply this update are available at
https://access.redhat.com/kb/docs/DOC-11259

To install kernel packages manually, use "rpm -ivh [package]". Do not use
"rpm -Uvh" as that will remove the running kernel binaries from your
system. You may use "rpm -e" to remove old kernels after determining that
the new kernel functions properly on your system.

Updated packages

Red Hat Enterprise Linux EUS (v. 5.4.z server)

SRPMS:
kernel-2.6.18-164.28.1.el5.src.rpm
File outdated by:  RHBA-2011:0956
    MD5: 185fb14513bdccddfac68c377e1c2a06
SHA-256: 9563d913a46e0715987a2cf9e0aada304fcc7a2b9e753282738a3ed781cefa27
 
IA-32:
kernel-2.6.18-164.28.1.el5.i686.rpm
File outdated by:  RHBA-2011:0956
    MD5: f156b4cf8af66637e19f3f97df13b0b1
SHA-256: 3f691d23d9dd0c4c96905592a858ca433eff9a16285bf832143a5feac95c5c4a
kernel-PAE-2.6.18-164.28.1.el5.i686.rpm
File outdated by:  RHBA-2011:0956
    MD5: f483d579bb8e57e959ed737930b7b267
SHA-256: c875ac5fa80ea7756b715af7f226944d2dc363b3399cb016924325d78996bbd7
kernel-PAE-devel-2.6.18-164.28.1.el5.i686.rpm
File outdated by:  RHBA-2011:0956
    MD5: e4df886711460e2d3d384b0661fddae0
SHA-256: f0183a92bf9b04269a0fb812d2fb7a4b31668678afc48da5a5ea9b501632a8fc
kernel-debug-2.6.18-164.28.1.el5.i686.rpm
File outdated by:  RHBA-2011:0956
    MD5: cff5cbb3b000837445ab167f94eb3205
SHA-256: 5538eb5b84a1c0354949a2aba75f2530b6866a063bbcf0a9a3480815ed1b6173
kernel-debug-devel-2.6.18-164.28.1.el5.i686.rpm
File outdated by:  RHBA-2011:0956
    MD5: f3e338f4163545c4686271f9eefc4db8
SHA-256: 80b70a013d5859b049ed4aade950d6168074251d6a532b37385874b227100253
kernel-devel-2.6.18-164.28.1.el5.i686.rpm
File outdated by:  RHBA-2011:0956
    MD5: d31236654804351db4eadda9689c4049
SHA-256: 5e1147c75c3b8f281f7bda3cbeb310b657a49b63cccb344afbd51e6aa3cbb70d
kernel-doc-2.6.18-164.28.1.el5.noarch.rpm
File outdated by:  RHBA-2011:0956
    MD5: 8735aac0fc0d42779acab4ba91ae4d62
SHA-256: 0188dafee9495ba5856fdb3686e43065fc40a8b59feedf6923473b982fd4b02c
kernel-headers-2.6.18-164.28.1.el5.i386.rpm
File outdated by:  RHBA-2011:0956
    MD5: 0d237a2e5c826fc78f01960cd666ea5e
SHA-256: 1d4f3632f6c662274dd96248877a73b913924031b8a7e40951d76ca3887aeab4
kernel-xen-2.6.18-164.28.1.el5.i686.rpm
File outdated by:  RHBA-2011:0956
    MD5: 283c82232b95d7ab27d5abf6310de8ba
SHA-256: 5bbd10ad4da41ea64e1fc6461169fdf0dd03128dd8b082a8c3213159ad088b1d
kernel-xen-devel-2.6.18-164.28.1.el5.i686.rpm
File outdated by:  RHBA-2011:0956
    MD5: c2ce8aca3f8ae6a86237d285d78932c2
SHA-256: b7697421c386b6fec820418bb8fe7133a5a3c635c5607826f7658afe6dcb3522
 
IA-64:
kernel-2.6.18-164.28.1.el5.ia64.rpm
File outdated by:  RHBA-2011:0956
    MD5: 28e9239dce94f66bfe8f6ccd66cf3e9f
SHA-256: 031c3bbd67d7b3c65cac3efedd907fecb8d470e3892d710e34d4e50fd9a495e4
kernel-debug-2.6.18-164.28.1.el5.ia64.rpm
File outdated by:  RHBA-2011:0956
    MD5: 912cc204b97724db43fba4d5bd5b914a
SHA-256: 54a13bc1057bee73391b4650e0e4091174f1bd5aa5dddbb2ccf39cc4f5f19c02
kernel-debug-devel-2.6.18-164.28.1.el5.ia64.rpm
File outdated by:  RHBA-2011:0956
    MD5: 0353fae8bd5957519004188685ec9870
SHA-256: a8b519acd3a34c03941b40d87d0e8f8eb7b5a9378e8fcdf8f634596b22a01f4e
kernel-devel-2.6.18-164.28.1.el5.ia64.rpm
File outdated by:  RHBA-2011:0956
    MD5: 20f0cd77520fe0883680686cef226d58
SHA-256: fd9e0ae4b487e51c847853e85fe2a7409c49b4eae189ab61d781df565f1a0894
kernel-doc-2.6.18-164.28.1.el5.noarch.rpm
File outdated by:  RHBA-2011:0956
    MD5: 8735aac0fc0d42779acab4ba91ae4d62
SHA-256: 0188dafee9495ba5856fdb3686e43065fc40a8b59feedf6923473b982fd4b02c
kernel-headers-2.6.18-164.28.1.el5.ia64.rpm
File outdated by:  RHBA-2011:0956
    MD5: f1c606dae1382b52a2147e9df3a302d6
SHA-256: 6aaa9d39d281ab180369d630ad65bc3a9baafc3740d0e63fa719010ec877e469
kernel-xen-2.6.18-164.28.1.el5.ia64.rpm
File outdated by:  RHBA-2011:0956
    MD5: 79b4bdad1a1ce69fe843068b74a81d8f
SHA-256: 8d0c6e2dd9e498b2fdee5ff94229a57207f1bb393bfaef9a00a4f12cd6c2825c
kernel-xen-devel-2.6.18-164.28.1.el5.ia64.rpm
File outdated by:  RHBA-2011:0956
    MD5: a722aa1eaedc45888af92e8bfa0b25e1
SHA-256: c7d5a8ebfddc2134c528b9d72dc811fd35711a7b749c2ec958dc5881171d5b80
 
PPC:
kernel-2.6.18-164.28.1.el5.ppc64.rpm
File outdated by:  RHBA-2011:0956
    MD5: 3ec7d23f04a94abf77a9cb4cba343e4e
SHA-256: 4f7876bca018fe644fef48704905e2ab06fc50922cd5e8bcbf676c81dfc88b33
kernel-debug-2.6.18-164.28.1.el5.ppc64.rpm
File outdated by:  RHBA-2011:0956
    MD5: e4ea65d8d3ad2614b7697a8d680636cd
SHA-256: 8148e0b39ea710d6f5dd4bd2adaee7ad433cd3f75914542440c4dc3071e1aef1
kernel-debug-devel-2.6.18-164.28.1.el5.ppc64.rpm
File outdated by:  RHBA-2011:0956
    MD5: 8982593ab61c126bf08d7c0fec9fcdfe
SHA-256: f61a661cafcbc655c88536c481398f1935aa214f3c5f3746d6e593f3c5784851
kernel-devel-2.6.18-164.28.1.el5.ppc64.rpm
File outdated by:  RHBA-2011:0956
    MD5: 52f650616f3483c914dd557a5f959c47
SHA-256: dbbda7e5069d5671d64544b54f72d78cafdb9700193518bd24835f1157e45800
kernel-doc-2.6.18-164.28.1.el5.noarch.rpm
File outdated by:  RHBA-2011:0956
    MD5: 8735aac0fc0d42779acab4ba91ae4d62
SHA-256: 0188dafee9495ba5856fdb3686e43065fc40a8b59feedf6923473b982fd4b02c
kernel-headers-2.6.18-164.28.1.el5.ppc.rpm
File outdated by:  RHBA-2011:0956
    MD5: a4fe7d032cfb1a1a0a965738ff00f0b5
SHA-256: 2d91720bc9954b8e5dac540969f8ba5a5c7b13bbd2aca5b6c69bc74de8e444e8
kernel-headers-2.6.18-164.28.1.el5.ppc64.rpm
File outdated by:  RHBA-2011:0956
    MD5: 75d5f332a308009e38f1c683f715ed04
SHA-256: 3d6836fca92dc5def1788c0c0aea7094ac1c82826b80e148f7d1ae34c11482d7
kernel-kdump-2.6.18-164.28.1.el5.ppc64.rpm
File outdated by:  RHBA-2011:0956
    MD5: e66a5bbece0c83e404cbbace1bfd5b03
SHA-256: 707e8170d6143349cbd3f95a1fca07910f339aa6117d130490100b13a4de7398
kernel-kdump-devel-2.6.18-164.28.1.el5.ppc64.rpm
File outdated by:  RHBA-2011:0956
    MD5: ca3f1f14c573f6a8f7d8066d25d43367
SHA-256: 3ce5407814087624b9cb6b78369e550213ad0f092ed09d12785b25052b6304da
 
s390x:
kernel-2.6.18-164.28.1.el5.s390x.rpm
File outdated by:  RHBA-2011:0956
    MD5: 4860a5beb2f91b2e97af0b21824f8fb6
SHA-256: 07dc94b4aa8cc2da5e020470aa090dc96781c0021c5f3f7f183b8e0515ecc78a
kernel-debug-2.6.18-164.28.1.el5.s390x.rpm
File outdated by:  RHBA-2011:0956
    MD5: 24f12bb42280769b38568e2a50b46271
SHA-256: 9432957b2214d850c5282fc25ea681686232bfb0db91246eaf1f318602e6f373
kernel-debug-devel-2.6.18-164.28.1.el5.s390x.rpm
File outdated by:  RHBA-2011:0956
    MD5: af397c6a849c53a38697aab396600cc2
SHA-256: 12d8df1327da9608c35bdae01b7a3929327f2d512ad5dd9569c9c8d1fefa9ad5
kernel-devel-2.6.18-164.28.1.el5.s390x.rpm
File outdated by:  RHBA-2011:0956
    MD5: 79327874d0f5ac2dbb1b56c4714e7cb7
SHA-256: 0201eb98386b2aa4d0546384d1dbcd11b453d7ca9c3375ddc95726986e75b556
kernel-doc-2.6.18-164.28.1.el5.noarch.rpm
File outdated by:  RHBA-2011:0956
    MD5: 8735aac0fc0d42779acab4ba91ae4d62
SHA-256: 0188dafee9495ba5856fdb3686e43065fc40a8b59feedf6923473b982fd4b02c
kernel-headers-2.6.18-164.28.1.el5.s390x.rpm
File outdated by:  RHBA-2011:0956
    MD5: ed1790db3af2f1c0af55b87eafab87aa
SHA-256: f746db2eb3d16346ace05ab08c0c799d9ed7eb1ca585b043fef074e9f8f6c1e7
kernel-kdump-2.6.18-164.28.1.el5.s390x.rpm
File outdated by:  RHBA-2011:0956
    MD5: 1bf53f87849a35ce93e175615ff07fac
SHA-256: b3c0cceae24fdd509e5f50383512054ec4f969c1ee71d69115def6201d7b15b8
kernel-kdump-devel-2.6.18-164.28.1.el5.s390x.rpm
File outdated by:  RHBA-2011:0956
    MD5: fc7dcd368265d17470641fb3888c6785
SHA-256: a566db60209aed7c4bb15e588e5c0ff81056aa71991492efc622614f164a65ee
 
x86_64:
kernel-2.6.18-164.28.1.el5.x86_64.rpm
File outdated by:  RHBA-2011:0956
    MD5: 95cb281e5341bd328a62ef48eb0c1f3a
SHA-256: 0aa946a248a632da96685ae6c52663c270e2e17aa784821f21ef19c41d5bdb90
kernel-debug-2.6.18-164.28.1.el5.x86_64.rpm
File outdated by:  RHBA-2011:0956
    MD5: 966bbbe66d5206754a90ac8f346af9c7
SHA-256: f2328bb2448ff4a8b58e7e85ffe6decea877d88ef216bc74918396f895fcdc41
kernel-debug-devel-2.6.18-164.28.1.el5.x86_64.rpm
File outdated by:  RHBA-2011:0956
    MD5: 25dfb0d36d52055b89189dc882123e7e
SHA-256: 2c340594f17d872f9237c70eae09a25f68f544541379fdbf8124f11d295487ec
kernel-devel-2.6.18-164.28.1.el5.x86_64.rpm
File outdated by:  RHBA-2011:0956
    MD5: ede21722d51d14fcb92efeb8fdb4a9a6
SHA-256: 8a83ebfb1a45d8e2fa53a2f664d82401b71bd3af01090483e6e5a30ca04e32cf
kernel-doc-2.6.18-164.28.1.el5.noarch.rpm
File outdated by:  RHBA-2011:0956
    MD5: 8735aac0fc0d42779acab4ba91ae4d62
SHA-256: 0188dafee9495ba5856fdb3686e43065fc40a8b59feedf6923473b982fd4b02c
kernel-headers-2.6.18-164.28.1.el5.x86_64.rpm
File outdated by:  RHBA-2011:0956
    MD5: 6df736ecbf358a9c8f4fb7d31156faaa
SHA-256: e7625788fc38f003c81b081e4e884215e84ed914c8966bbf3cc00021ab45bf07
kernel-xen-2.6.18-164.28.1.el5.x86_64.rpm
File outdated by:  RHBA-2011:0956
    MD5: c0a4d86df4c9d306ac19c7ae2c1977d6
SHA-256: a3dddc323f46ab6a7a392aa901abc4849f42a2e1dc4d1021be01fc68788f3d30
kernel-xen-devel-2.6.18-164.28.1.el5.x86_64.rpm
File outdated by:  RHBA-2011:0956
    MD5: 415d1e2e3d13c0ebe660e84ab7935747
SHA-256: e60191b01ec0847a13cfe0b00dfca30671e643b5825e693de070faedf1ca2736
 
(The unlinked packages above are only available from the Red Hat Network)

Bugs fixed (see bugzilla for more information)

630987 - HVM guest w/ UP and PV driver hangs after live migration or suspend/resume [rhel-5.4.z]
631807 - dasd: allocate fallback cqr for reserve/release [rhel-5.4.z]
631809 - dasd: force online does not work. [rhel-5.4.z]
631854 - Kernel: network: bonding: scheduling while atomic: ifdown-eth/0x00000100/21775 [rhel-5.4.z]
637204 - system crashes due to corrupt net_device_wrapper structure [rhel-5.4.z]
637219 - [RHEL5 IA64 XEN] netfront driver: alloc_dev: Private data too big. [rhel-5.4.z]
637726 - lpfc ioctl crash in lpfc_nlp_put() [rhel-5.4.z]



These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/