- Issued:
- 2012-01-25
- Updated:
- 2012-01-25
RHBA-2012:0063 - Bug Fix Advisory
Synopsis
kernel bug fix and enhancement update
Type/Severity
Bug Fix Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
Updated kernel packages that fix multiple bugs and add one enhancement are now
available for Red Hat Enterprise Linux 5 Extended Update Support.
Description
The kernel packages contain the Linux kernel, the core of any Linux operating
system.
This update fixes the following bugs:
- The kdump service did not work properly with some HP Smart Array controllers
and could fail to create a core dump file or could become unresponsive under
certain circumstances. This update provides multiple bug fixes and changes for
the cciss driver and thus ensures that kdump works as expected with most HP
Smart Array controllers.
On a Red Hat Enterprise Linux 5.6 system, it is advisable to update the firmware
of the HP ProLiant Generation 6 (G6) controller (which includes: P410i, P411,
P212, P712, and P812) to version 5.02 or later. After the successful firmware
update, reboot the system and kdump will work as expected.
However, kdump may still fail when using the HP Smart Array 5i Controller on a
Red Hat Enterprise Linux 5.6 system. (BZ#749187)
- When the SMP (Symmetric Multi Processing) kernel ran the crash_kexec()
function, the local Advanced Programmable Interrupt Controllers (APICs) could
have pending interrupt requests (IRQs) in their vector tables. If there was more
than one pending IRQ within the same 32-bit word in the Local APIC (LAPIC)
vector table registers, the I/O APIC subsystem would enter setup with pending
interrupts left in the LAPIC, causing various degrees of malfunctioning
depending on the stuck interrupt vector. This update adds the MAX_LOOPS
parameter to limit number of iterations and to provide enough time for the
pending IRQs to be cleared if the loop was to lock-up. (BZ#756943)
- The IDE error handling code uses the IDE interrupt handler and the general
interrupt handler. This could lead to the erroneous execution of kexec/kdump
code that was intended to only run at boot time. As a result, the asserted IDE
IRQ line would be cleared without the interrupt being handled, which in turn
caused the system to become unresponsive during the shut down of the kexec/kdump
kernel. To fix this bug, a new test for the IRQ status, which should be
IRQ_DISABLED, has been introduced to ensure that the code introduced for the
kexec/kdump kernel only executes at boot time. (BZ#759386)
- When kdump was triggered under a heavy load, the system became unresponsive
and failed to capture a crash dump. This update fixes interrupt handling for
kdump so that kdump successfully captures a crash dump while under a heavy load.
(BZ#761535)
- When a device triggered an interrupt request (IRQ) during kdump kernel
startup, the kernel tried to process the IRQ even though the respective
interrupt handler was not loaded. As a consequence, the kernel could not finish
its startup and the system became unresponsive. This update allows the kernel to
disable the IRQ line if the kernel receives a large number of IRQs and there is
no interrupt handler loaded in the kernel. The kernel now starts as expected and
kdump can successfully create a core dump. (BZ#761539)
In addition, this update adds the following enhancement:
- This update provides the latest cciss driver. The driver now allows the kernel
to wait for a reasonable amount of time after PCI Power Management resets a
CCISS device so the device can be properly detected. (BZ#758021)
All users are advised to upgrade to these updated packages, which fix these bugs
and add this enhancement. The system must be rebooted for this update to take
effect.
Solution
Before applying this update, make sure all previously-released errata
relevant to your system have been applied.
This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/kb/docs/DOC-11259
To install kernel packages manually, use "rpm -ivh [package]". Do not use "rpm
- Uvh" as that will remove the running kernel binaries from your system. You may
use "rpm -e" to remove old kernels after determining that the new kernel
functions properly on your system.
Affected Products
- Red Hat Enterprise Linux for x86_64 - Extended Update Support 5.6 x86_64
- Red Hat Enterprise Linux for x86_64 - Extended Update Support 5.6 ia64
- Red Hat Enterprise Linux for x86_64 - Extended Update Support 5.6 i386
- Red Hat Enterprise Linux Server - Extended Update Support from RHUI 5.6 x86_64
- Red Hat Enterprise Linux Server - Extended Update Support from RHUI 5.6 i386
- Red Hat Enterprise Linux Server - AUS 5.6 x86_64
- Red Hat Enterprise Linux Server - AUS 5.6 ia64
- Red Hat Enterprise Linux Server - AUS 5.6 i386
- Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 5.6 s390x
- Red Hat Enterprise Linux for Power, big endian - Extended Update Support 5.6 ppc
Fixes
(none)CVEs
(none)
References
(none)
Red Hat Enterprise Linux for x86_64 - Extended Update Support 5.6
SRPM | |
---|---|
kernel-2.6.18-238.33.1.el5.src.rpm | SHA-256: 90bf9fb4356a7c2146874b99c194cfdf7fe285a53a92b327125e39cde27971d1 |
x86_64 | |
kernel-2.6.18-238.33.1.el5.x86_64.rpm | SHA-256: 880335e943f7646bf34dbe6447862628782827acb1e0358bdf1fa8d5bf1ca2fb |
kernel-debug-2.6.18-238.33.1.el5.x86_64.rpm | SHA-256: 39d1dde272023346985ba7d885d39cc95998ca49d6e292cbdf1228a84643e462 |
kernel-debug-devel-2.6.18-238.33.1.el5.x86_64.rpm | SHA-256: c6796e45023fb7b3d8a99dc2faa702b97dd242142d338d7452971fc9ffd52923 |
kernel-devel-2.6.18-238.33.1.el5.x86_64.rpm | SHA-256: 9d3da8ed84cb02c1c95e2eea532799f15a4e58ccf93f27a1a545da21a4659426 |
kernel-doc-2.6.18-238.33.1.el5.noarch.rpm | SHA-256: 267ee4e0775b04a080b09784325ed1e521f291b48d2e6ab04b7c51ecf0066aa8 |
kernel-headers-2.6.18-238.33.1.el5.x86_64.rpm | SHA-256: cc60de41ae5c0935b21836798c3771ceee7f88b38dd19c34e74697578d2fafbc |
kernel-xen-2.6.18-238.33.1.el5.x86_64.rpm | SHA-256: c36aef45af18681fd1e86029c25fff1a3cac487350a4c289e39224e85cbbfe69 |
kernel-xen-devel-2.6.18-238.33.1.el5.x86_64.rpm | SHA-256: ccb7a448168ea6100cdee877de279be1362779b8260e32486c8411a1b61064a8 |
ia64 | |
kernel-2.6.18-238.33.1.el5.ia64.rpm | SHA-256: c60d41b5df5e15e775fb2f7f910730414e1fdbd0132c7c1975674c8d7ba11602 |
kernel-debug-2.6.18-238.33.1.el5.ia64.rpm | SHA-256: 0073a4a6052b476f5de9996d2153e93513b0cdac674a6168868f8679bdf4f9e1 |
kernel-debug-devel-2.6.18-238.33.1.el5.ia64.rpm | SHA-256: c517b7005bdcc5511932485614da1ada35342fcf14e1d5c559dd9efb98542720 |
kernel-devel-2.6.18-238.33.1.el5.ia64.rpm | SHA-256: 56c1bc1bff43a4feae4653302217d95202f8da3a90e7526c9a67591202d9021d |
kernel-doc-2.6.18-238.33.1.el5.noarch.rpm | SHA-256: 267ee4e0775b04a080b09784325ed1e521f291b48d2e6ab04b7c51ecf0066aa8 |
kernel-headers-2.6.18-238.33.1.el5.ia64.rpm | SHA-256: aa9f9e28264fc5217b93766d45ea65c8502fcafeca87fc559e1026ccb82d34f8 |
kernel-xen-2.6.18-238.33.1.el5.ia64.rpm | SHA-256: f91de15d3a3a35cf54810047e296462366b5274bd34101beb4564dbc9c7094a4 |
kernel-xen-devel-2.6.18-238.33.1.el5.ia64.rpm | SHA-256: 435da3f6d8787feffc207a33eedf92e30728e494b8ffe52a49aba6f85c2f0c2b |
i386 | |
kernel-2.6.18-238.33.1.el5.i686.rpm | SHA-256: 87252b21281c6ac8a8c416ed8e3f45a14a8384c8ed0be996ccf8da7a03dd493c |
kernel-PAE-2.6.18-238.33.1.el5.i686.rpm | SHA-256: 5bb31fc590f8de3e1748b01aeee8f8811b9fe05e23563ce5c5857612c1ab769e |
kernel-PAE-devel-2.6.18-238.33.1.el5.i686.rpm | SHA-256: 7dae0b9086717da43617657a15bdf0c2932411d15bf131d79b4e5af0f4b909a3 |
kernel-debug-2.6.18-238.33.1.el5.i686.rpm | SHA-256: e7c66fdea0adc467cd06c68c18c6fdf393763e40f22b56013185db9aff660755 |
kernel-debug-devel-2.6.18-238.33.1.el5.i686.rpm | SHA-256: 96f20ddfe50b6ba47eb09d8234833cdde35b225ddf351cb8c99e3b25c0d6df5a |
kernel-devel-2.6.18-238.33.1.el5.i686.rpm | SHA-256: b9958f2e48e2a16ddadd002b559508beea04e28be58ab0ae9de46684b07c5678 |
kernel-doc-2.6.18-238.33.1.el5.noarch.rpm | SHA-256: 267ee4e0775b04a080b09784325ed1e521f291b48d2e6ab04b7c51ecf0066aa8 |
kernel-headers-2.6.18-238.33.1.el5.i386.rpm | SHA-256: d6a629f9812ebb3f61bb3a749c597bc97526c4d9eba75b44b02dac6fc212c6e7 |
kernel-xen-2.6.18-238.33.1.el5.i686.rpm | SHA-256: 6244b8e26d7decd016f91c5d1ea895e184ae814c9493ce425c70ca93fdd2f6f5 |
kernel-xen-devel-2.6.18-238.33.1.el5.i686.rpm | SHA-256: 5ed726667efa9b0e179b310f0fc0b0ff26780c7ddfcff71e16631a1e4c73a143 |
Red Hat Enterprise Linux Server - AUS 5.6
SRPM | |
---|---|
kernel-2.6.18-238.33.1.el5.src.rpm | SHA-256: 90bf9fb4356a7c2146874b99c194cfdf7fe285a53a92b327125e39cde27971d1 |
x86_64 | |
kernel-2.6.18-238.33.1.el5.x86_64.rpm | SHA-256: 880335e943f7646bf34dbe6447862628782827acb1e0358bdf1fa8d5bf1ca2fb |
kernel-debug-2.6.18-238.33.1.el5.x86_64.rpm | SHA-256: 39d1dde272023346985ba7d885d39cc95998ca49d6e292cbdf1228a84643e462 |
kernel-debug-devel-2.6.18-238.33.1.el5.x86_64.rpm | SHA-256: c6796e45023fb7b3d8a99dc2faa702b97dd242142d338d7452971fc9ffd52923 |
kernel-devel-2.6.18-238.33.1.el5.x86_64.rpm | SHA-256: 9d3da8ed84cb02c1c95e2eea532799f15a4e58ccf93f27a1a545da21a4659426 |
kernel-doc-2.6.18-238.33.1.el5.noarch.rpm | SHA-256: 267ee4e0775b04a080b09784325ed1e521f291b48d2e6ab04b7c51ecf0066aa8 |
kernel-headers-2.6.18-238.33.1.el5.x86_64.rpm | SHA-256: cc60de41ae5c0935b21836798c3771ceee7f88b38dd19c34e74697578d2fafbc |
kernel-xen-2.6.18-238.33.1.el5.x86_64.rpm | SHA-256: c36aef45af18681fd1e86029c25fff1a3cac487350a4c289e39224e85cbbfe69 |
kernel-xen-devel-2.6.18-238.33.1.el5.x86_64.rpm | SHA-256: ccb7a448168ea6100cdee877de279be1362779b8260e32486c8411a1b61064a8 |
ia64 | |
kernel-2.6.18-238.33.1.el5.ia64.rpm | SHA-256: c60d41b5df5e15e775fb2f7f910730414e1fdbd0132c7c1975674c8d7ba11602 |
kernel-debug-2.6.18-238.33.1.el5.ia64.rpm | SHA-256: 0073a4a6052b476f5de9996d2153e93513b0cdac674a6168868f8679bdf4f9e1 |
kernel-debug-devel-2.6.18-238.33.1.el5.ia64.rpm | SHA-256: c517b7005bdcc5511932485614da1ada35342fcf14e1d5c559dd9efb98542720 |
kernel-devel-2.6.18-238.33.1.el5.ia64.rpm | SHA-256: 56c1bc1bff43a4feae4653302217d95202f8da3a90e7526c9a67591202d9021d |
kernel-doc-2.6.18-238.33.1.el5.noarch.rpm | SHA-256: 267ee4e0775b04a080b09784325ed1e521f291b48d2e6ab04b7c51ecf0066aa8 |
kernel-headers-2.6.18-238.33.1.el5.ia64.rpm | SHA-256: aa9f9e28264fc5217b93766d45ea65c8502fcafeca87fc559e1026ccb82d34f8 |
kernel-xen-2.6.18-238.33.1.el5.ia64.rpm | SHA-256: f91de15d3a3a35cf54810047e296462366b5274bd34101beb4564dbc9c7094a4 |
kernel-xen-devel-2.6.18-238.33.1.el5.ia64.rpm | SHA-256: 435da3f6d8787feffc207a33eedf92e30728e494b8ffe52a49aba6f85c2f0c2b |
i386 | |
kernel-2.6.18-238.33.1.el5.i686.rpm | SHA-256: 87252b21281c6ac8a8c416ed8e3f45a14a8384c8ed0be996ccf8da7a03dd493c |
kernel-PAE-2.6.18-238.33.1.el5.i686.rpm | SHA-256: 5bb31fc590f8de3e1748b01aeee8f8811b9fe05e23563ce5c5857612c1ab769e |
kernel-PAE-devel-2.6.18-238.33.1.el5.i686.rpm | SHA-256: 7dae0b9086717da43617657a15bdf0c2932411d15bf131d79b4e5af0f4b909a3 |
kernel-debug-2.6.18-238.33.1.el5.i686.rpm | SHA-256: e7c66fdea0adc467cd06c68c18c6fdf393763e40f22b56013185db9aff660755 |
kernel-debug-devel-2.6.18-238.33.1.el5.i686.rpm | SHA-256: 96f20ddfe50b6ba47eb09d8234833cdde35b225ddf351cb8c99e3b25c0d6df5a |
kernel-devel-2.6.18-238.33.1.el5.i686.rpm | SHA-256: b9958f2e48e2a16ddadd002b559508beea04e28be58ab0ae9de46684b07c5678 |
kernel-doc-2.6.18-238.33.1.el5.noarch.rpm | SHA-256: 267ee4e0775b04a080b09784325ed1e521f291b48d2e6ab04b7c51ecf0066aa8 |
kernel-headers-2.6.18-238.33.1.el5.i386.rpm | SHA-256: d6a629f9812ebb3f61bb3a749c597bc97526c4d9eba75b44b02dac6fc212c6e7 |
kernel-xen-2.6.18-238.33.1.el5.i686.rpm | SHA-256: 6244b8e26d7decd016f91c5d1ea895e184ae814c9493ce425c70ca93fdd2f6f5 |
kernel-xen-devel-2.6.18-238.33.1.el5.i686.rpm | SHA-256: 5ed726667efa9b0e179b310f0fc0b0ff26780c7ddfcff71e16631a1e4c73a143 |
Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 5.6
SRPM | |
---|---|
kernel-2.6.18-238.33.1.el5.src.rpm | SHA-256: 90bf9fb4356a7c2146874b99c194cfdf7fe285a53a92b327125e39cde27971d1 |
s390x | |
kernel-2.6.18-238.33.1.el5.s390x.rpm | SHA-256: 896b9d6fb8a8792e7575ecc6ac2ee0c985888664eeac52d376bcdfa1049c2e7d |
kernel-debug-2.6.18-238.33.1.el5.s390x.rpm | SHA-256: f63f8bf6c95ef4b701f9edcfec6b5a9c4354b35051aca458164e2c91f3330829 |
kernel-debug-devel-2.6.18-238.33.1.el5.s390x.rpm | SHA-256: 294e7bdbc7ee72a67d8bd79cf93fff4bd0280f8e6d48743a490d1d3e65cccaa4 |
kernel-devel-2.6.18-238.33.1.el5.s390x.rpm | SHA-256: 2db22b1a7ce74d939ffa599c5675e0edd041b435d6de86fcc4c7a71b63010b04 |
kernel-doc-2.6.18-238.33.1.el5.noarch.rpm | SHA-256: 267ee4e0775b04a080b09784325ed1e521f291b48d2e6ab04b7c51ecf0066aa8 |
kernel-headers-2.6.18-238.33.1.el5.s390x.rpm | SHA-256: 19168fd60a80a62a73c1b7aee1cf80702b62db598ad4f833b0ec9a5753740780 |
kernel-kdump-2.6.18-238.33.1.el5.s390x.rpm | SHA-256: 316abb6805de8d2776dffacd2e9d6eb4e37bc17d6537f5f36d4c6ea5d74d7297 |
kernel-kdump-devel-2.6.18-238.33.1.el5.s390x.rpm | SHA-256: 121b28d1f69af457f8dc308ac690fe738dbc6636cd378334abc0c9526e330bb9 |
Red Hat Enterprise Linux for Power, big endian - Extended Update Support 5.6
SRPM | |
---|---|
kernel-2.6.18-238.33.1.el5.src.rpm | SHA-256: 90bf9fb4356a7c2146874b99c194cfdf7fe285a53a92b327125e39cde27971d1 |
ppc | |
kernel-2.6.18-238.33.1.el5.ppc64.rpm | SHA-256: 674fbb0f13cefa3307f58ba5e97f44725f001f1f490ecbfd84c54480a69e9e66 |
kernel-debug-2.6.18-238.33.1.el5.ppc64.rpm | SHA-256: 068896488dfbff3257ad88e62ea7c3307397d571af5cf778b07680a34773f91e |
kernel-debug-devel-2.6.18-238.33.1.el5.ppc64.rpm | SHA-256: b73db091ba0230d746e664db0da283dedbb16773d8d75084c85f48b654812789 |
kernel-devel-2.6.18-238.33.1.el5.ppc64.rpm | SHA-256: 256e2d8eaf0592a513fe513925ca1a7413b954dea60e376019cdba55135737ae |
kernel-doc-2.6.18-238.33.1.el5.noarch.rpm | SHA-256: 267ee4e0775b04a080b09784325ed1e521f291b48d2e6ab04b7c51ecf0066aa8 |
kernel-headers-2.6.18-238.33.1.el5.ppc.rpm | SHA-256: 489be9284f791cc65e291e10650cbb9827aad21a3ec92c49a3af3bcf9564101b |
kernel-headers-2.6.18-238.33.1.el5.ppc64.rpm | SHA-256: 198251e332ca657d1cb25e1b20dc8d92218cf45158efa1b6d8c4283d86044b35 |
kernel-kdump-2.6.18-238.33.1.el5.ppc64.rpm | SHA-256: 992d6adebf7780dfe8ede84faa2ba2e7f95bac8968a1243c2f1b7372b1576aee |
kernel-kdump-devel-2.6.18-238.33.1.el5.ppc64.rpm | SHA-256: 01a2546fe4395386212801f1cdee07d16bc81461848067df7c83379f4eadd7b6 |
Red Hat Enterprise Linux Server - Extended Update Support from RHUI 5.6
SRPM | |
---|---|
kernel-2.6.18-238.33.1.el5.src.rpm | SHA-256: 90bf9fb4356a7c2146874b99c194cfdf7fe285a53a92b327125e39cde27971d1 |
x86_64 | |
kernel-2.6.18-238.33.1.el5.x86_64.rpm | SHA-256: 880335e943f7646bf34dbe6447862628782827acb1e0358bdf1fa8d5bf1ca2fb |
kernel-debug-2.6.18-238.33.1.el5.x86_64.rpm | SHA-256: 39d1dde272023346985ba7d885d39cc95998ca49d6e292cbdf1228a84643e462 |
kernel-debug-devel-2.6.18-238.33.1.el5.x86_64.rpm | SHA-256: c6796e45023fb7b3d8a99dc2faa702b97dd242142d338d7452971fc9ffd52923 |
kernel-devel-2.6.18-238.33.1.el5.x86_64.rpm | SHA-256: 9d3da8ed84cb02c1c95e2eea532799f15a4e58ccf93f27a1a545da21a4659426 |
kernel-doc-2.6.18-238.33.1.el5.noarch.rpm | SHA-256: 267ee4e0775b04a080b09784325ed1e521f291b48d2e6ab04b7c51ecf0066aa8 |
kernel-headers-2.6.18-238.33.1.el5.x86_64.rpm | SHA-256: cc60de41ae5c0935b21836798c3771ceee7f88b38dd19c34e74697578d2fafbc |
kernel-xen-2.6.18-238.33.1.el5.x86_64.rpm | SHA-256: c36aef45af18681fd1e86029c25fff1a3cac487350a4c289e39224e85cbbfe69 |
kernel-xen-devel-2.6.18-238.33.1.el5.x86_64.rpm | SHA-256: ccb7a448168ea6100cdee877de279be1362779b8260e32486c8411a1b61064a8 |
i386 | |
kernel-2.6.18-238.33.1.el5.i686.rpm | SHA-256: 87252b21281c6ac8a8c416ed8e3f45a14a8384c8ed0be996ccf8da7a03dd493c |
kernel-PAE-2.6.18-238.33.1.el5.i686.rpm | SHA-256: 5bb31fc590f8de3e1748b01aeee8f8811b9fe05e23563ce5c5857612c1ab769e |
kernel-PAE-devel-2.6.18-238.33.1.el5.i686.rpm | SHA-256: 7dae0b9086717da43617657a15bdf0c2932411d15bf131d79b4e5af0f4b909a3 |
kernel-debug-2.6.18-238.33.1.el5.i686.rpm | SHA-256: e7c66fdea0adc467cd06c68c18c6fdf393763e40f22b56013185db9aff660755 |
kernel-debug-devel-2.6.18-238.33.1.el5.i686.rpm | SHA-256: 96f20ddfe50b6ba47eb09d8234833cdde35b225ddf351cb8c99e3b25c0d6df5a |
kernel-devel-2.6.18-238.33.1.el5.i686.rpm | SHA-256: b9958f2e48e2a16ddadd002b559508beea04e28be58ab0ae9de46684b07c5678 |
kernel-doc-2.6.18-238.33.1.el5.noarch.rpm | SHA-256: 267ee4e0775b04a080b09784325ed1e521f291b48d2e6ab04b7c51ecf0066aa8 |
kernel-headers-2.6.18-238.33.1.el5.i386.rpm | SHA-256: d6a629f9812ebb3f61bb3a749c597bc97526c4d9eba75b44b02dac6fc212c6e7 |
kernel-xen-2.6.18-238.33.1.el5.i686.rpm | SHA-256: 6244b8e26d7decd016f91c5d1ea895e184ae814c9493ce425c70ca93fdd2f6f5 |
kernel-xen-devel-2.6.18-238.33.1.el5.i686.rpm | SHA-256: 5ed726667efa9b0e179b310f0fc0b0ff26780c7ddfcff71e16631a1e4c73a143 |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.