- Issued:
- 2012-03-27
- Updated:
- 2012-03-27
RHBA-2012:0424 - Bug Fix Advisory
Synopsis
kernel bug fix update
Type/Severity
Bug Fix Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
Updated kernel packages that fix multiple bugs are now available for Red Hat
Enterprise Linux 6 Extended Update Support.
Description
The kernel packages contain the Linux kernel, the core of any Linux operating
system.
This update fixes the following bugs:
- Socket callbacks use the svc_xprt_enqueue() function to add sockets to the
sp_sockets list. In normal operation, a server thread will later take the socket
off that list. Previously, on the nfsd daemon shutdown, still-running
svc_xprt_enqueue() could re-add a socket to the sp_sockets list just before it
was deleted. Consequently, the system could terminate unexpectedly due to memory
corruption in the sunrpc module. With this update, the XPT_BUSY flag is set on
every socket before shutdown and svc_xprt_enqueue() now checks this flag, thus
preventing this bug. (BZ#789912)
- Due to a race condition, running the "ifenslave -d bond0 eth0" command to
remove the slave interface from the bonding device could cause the system to
crash when a networking packet was being received at the same time. With this
update, the race condition has been fixed and the system no longer crashes under
these circumstances. (BZ#795332)
- In rare cases, a BUG_ON() macro could be triggered, causing the nfsd daemon to
fail. The BUG_ON() macro checked the xpt_pool field, which was not actually used
for anything. This update removes both the BUG_ON() macro and the xpt_pool
field, fixing the problem. (BZ#795337)
- An insufficiently well-designed calculation in the CPU accelerator in the
previous version of the kernel packages caused an arithmetic overflow in the
sched_clock() function when system uptime exceeded 208.5 days. This overflow led
to a kernel panic on systems using the Time Stamp Counter (TSC) or Virtual
Machine Interface (VMI) clock source. This update corrects the aforementioned
calculation so that this arithmetic overflow and kernel panic can no longer
occur under these circumstances. (BZ#795817)
- On a system that created and deleted lots of dynamic devices, the 31-bit Linux
ifindex object failed to fit in the 16-bit macvtap minor range, resulting in
unusable macvtap devices. The problem primarily occurred in a libvirt-controlled
environment when many virtual machines were started or restarted, and caused
libvirt to report the following message:
Error starting domain: cannot open macvtap tap device /dev/tap222364: No
such device or address
With this update, the macvtap's minor device number allocation has been modified
so that virtual machines can now be started and restarted as expected in the
described scenario. (BZ#796826)
- The dm_mirror module can send discard requests. However, the dm_io interface
did not support discard requests, and running an LVM mirror over a
discard-enabled device led to a kernel panic. This update adds support for the
discard requests to the dm_io interface, so that kernel panics no longer occur
in the described scenario. (BZ#799942)
All users of kernel are advised to upgrade to these updated packages, which fix
these bugs. The system must be rebooted for this update to take effect.
Solution
Before applying this update, make sure all previously-released errata relevant
to your system have been applied.
This update is available via the Red Hat Network. Details on how to use the Red
Hat Network to apply this update are available at
https://access.redhat.com/knowledge/articles/11258
Affected Products
- Red Hat Enterprise Linux for x86_64 - Extended Update Support 6.1 x86_64
- Red Hat Enterprise Linux for x86_64 - Extended Update Support 6.1 i386
- Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 6.1 s390x
- Red Hat Enterprise Linux for Power, big endian - Extended Update Support 6.1 ppc64
- Red Hat Enterprise Linux Server - Extended Update Support from RHUI 6.1 x86_64
- Red Hat Enterprise Linux Server - Extended Update Support from RHUI 6.1 i386
- Red Hat Virtual Storage Appliance (from RHUI) 6.1 x86_64
Fixes
(none)CVEs
(none)
References
(none)
Red Hat Enterprise Linux for x86_64 - Extended Update Support 6.1
SRPM | |
---|---|
kernel-2.6.32-131.26.1.el6.src.rpm | SHA-256: 6843844c9be59e94a4056786bfbed2e8b5fe4cc6d79386354dc497e402def5c4 |
x86_64 | |
kernel-2.6.32-131.26.1.el6.x86_64.rpm | SHA-256: 5aa12a7d39a5f1a47e3e96c7d28c17fe2acf65b6ce82825178566d6c64922dc9 |
kernel-debug-2.6.32-131.26.1.el6.x86_64.rpm | SHA-256: 3b8843a853a9195bfd92f40dbcf5505f7ffb74d9a9f3b51606761354b00052cb |
kernel-debug-debuginfo-2.6.32-131.26.1.el6.x86_64.rpm | SHA-256: ef832b7588783e18e0ec2abadb2fa578e9113d1e7bfdaf773af1ff56dcd2bfdd |
kernel-debug-devel-2.6.32-131.26.1.el6.x86_64.rpm | SHA-256: c92e30d9422a26c53476325b54281a836bba279e6fdb6bfaac3dfb0e4e1e2121 |
kernel-debuginfo-2.6.32-131.26.1.el6.x86_64.rpm | SHA-256: e069cbe546445695b185c3c209e998310a79605b939cfa0585088e7dabf80f29 |
kernel-debuginfo-common-x86_64-2.6.32-131.26.1.el6.x86_64.rpm | SHA-256: bd63b0f99e9472ea8f2d6a92a136fd2230cace569a8c2b662f23c63ba1c23fa2 |
kernel-devel-2.6.32-131.26.1.el6.x86_64.rpm | SHA-256: 7dce7adbbfd239259af112c7d685bfb5b8b98135f9f8940bba80be8419da3df2 |
kernel-doc-2.6.32-131.26.1.el6.noarch.rpm | SHA-256: 6a9a94a4364e038bf0d098ba9ad3c4f4e63434677c9454311081c8ddcdc189d8 |
kernel-firmware-2.6.32-131.26.1.el6.noarch.rpm | SHA-256: 1c87c5022a113225de224a87e53f50a800896ec9cad9b258e6d2a424553311ab |
kernel-headers-2.6.32-131.26.1.el6.x86_64.rpm | SHA-256: 864844b32fb706f9336a1965ae58f87af8e9c092c6a361fed9ee75b70596c5a9 |
perf-2.6.32-131.26.1.el6.x86_64.rpm | SHA-256: 4eccd9a8f2f7d209d6e51311a10a0ab333a4f79e2eb62c21349a3706df8c99c3 |
perf-debuginfo-2.6.32-131.26.1.el6.x86_64.rpm | SHA-256: e8d86557bb45d5fc8faabc7a8a742706f551edc56e9b0e3dd2ddde780765ac35 |
i386 | |
kernel-2.6.32-131.26.1.el6.i686.rpm | SHA-256: dc2fd8951fe73beacd794fce46e5bee365edc1b95eb17a28afff9a3d93890340 |
kernel-debug-2.6.32-131.26.1.el6.i686.rpm | SHA-256: cffb3ef594f065556f47ec1123510c45dd88c020c1af695f77d49097004c733e |
kernel-debug-debuginfo-2.6.32-131.26.1.el6.i686.rpm | SHA-256: 3a677a2be0a4a0223ba5cc013683f0cb589341ab96a251450bfe924c428b8d97 |
kernel-debug-devel-2.6.32-131.26.1.el6.i686.rpm | SHA-256: f979f2be9c3569b2e67ad814e00ea0875cf0c72c56ce115900d4dfad7c610c2c |
kernel-debuginfo-2.6.32-131.26.1.el6.i686.rpm | SHA-256: 830c72f24b339fcc702a7a2b7f6b148bdda6b93d8a326b141799a75b74897755 |
kernel-debuginfo-common-i686-2.6.32-131.26.1.el6.i686.rpm | SHA-256: 69af123f9c3e907f903b23fb51a8cfab530357a55019a3b6e90940dcd3f268d9 |
kernel-devel-2.6.32-131.26.1.el6.i686.rpm | SHA-256: ccdb4496304eac405d3d63b77b94e20aa2544f020a63e9998b916a884a2ea3fa |
kernel-doc-2.6.32-131.26.1.el6.noarch.rpm | SHA-256: 6a9a94a4364e038bf0d098ba9ad3c4f4e63434677c9454311081c8ddcdc189d8 |
kernel-firmware-2.6.32-131.26.1.el6.noarch.rpm | SHA-256: 1c87c5022a113225de224a87e53f50a800896ec9cad9b258e6d2a424553311ab |
kernel-headers-2.6.32-131.26.1.el6.i686.rpm | SHA-256: f05655f20b27869a9cc3623a5ad7363a383c7b0b5ebcb8351a605bdc3315ab3a |
perf-2.6.32-131.26.1.el6.i686.rpm | SHA-256: b77e4b7f00d8bf29725eb69fd0b106a5038264dc8a0f547be1987124549ad75b |
perf-debuginfo-2.6.32-131.26.1.el6.i686.rpm | SHA-256: 30b99fcfbd55894da22abe4380013ced0abc24c2ba0d1d56681b8662205e0bfa |
Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 6.1
SRPM | |
---|---|
kernel-2.6.32-131.26.1.el6.src.rpm | SHA-256: 6843844c9be59e94a4056786bfbed2e8b5fe4cc6d79386354dc497e402def5c4 |
s390x | |
kernel-2.6.32-131.26.1.el6.s390x.rpm | SHA-256: 1af5242d097247494dd502f7ef27c28a3d29c0bef03cb88085678f0cd69c00e7 |
kernel-debug-2.6.32-131.26.1.el6.s390x.rpm | SHA-256: 04ddfd3caa6bf1a4c3287ddba598819b7e0820a012bd9461839f8f5e372ec15b |
kernel-debug-debuginfo-2.6.32-131.26.1.el6.s390x.rpm | SHA-256: dec0de9dc1a6fde5e7f876f7fde7e297dd4ef33d0ca92bc256702e216e224131 |
kernel-debug-devel-2.6.32-131.26.1.el6.s390x.rpm | SHA-256: 877a14f8de0f2e6fb879c5cdde316feb29f0d22d09705e45a4db0144c0b4ec24 |
kernel-debuginfo-2.6.32-131.26.1.el6.s390x.rpm | SHA-256: 9c644979089491e5fdaf792a275387f2833b9cdc33d8c603fc66c2d0ae899f65 |
kernel-debuginfo-common-s390x-2.6.32-131.26.1.el6.s390x.rpm | SHA-256: 62520a7d321028df41e0af4325b161b248da04e43e907184bbfd2d0ab80378a2 |
kernel-devel-2.6.32-131.26.1.el6.s390x.rpm | SHA-256: ffa36c18e0c33d87fadcc97f4169012cec28a1cdf2367d63990edfdbc67cffc4 |
kernel-doc-2.6.32-131.26.1.el6.noarch.rpm | SHA-256: 6a9a94a4364e038bf0d098ba9ad3c4f4e63434677c9454311081c8ddcdc189d8 |
kernel-firmware-2.6.32-131.26.1.el6.noarch.rpm | SHA-256: 1c87c5022a113225de224a87e53f50a800896ec9cad9b258e6d2a424553311ab |
kernel-headers-2.6.32-131.26.1.el6.s390x.rpm | SHA-256: b9505f29d2d333da233ccaaa6b072f78e07568224661eb52d23b807dd1b23fa5 |
kernel-kdump-2.6.32-131.26.1.el6.s390x.rpm | SHA-256: 6b8e28beb5acf910137de7bfe6a0ea18f457c5a2748acd4aad3744cf35aa7066 |
kernel-kdump-debuginfo-2.6.32-131.26.1.el6.s390x.rpm | SHA-256: ab9c0f967d77038ea6b4f08830faf67cd2813c3398a70b945c96f5b20f6d239f |
kernel-kdump-devel-2.6.32-131.26.1.el6.s390x.rpm | SHA-256: b534071d21e3076617043ec6bc8381a77746bdea2507a6c044039f34a165b793 |
perf-2.6.32-131.26.1.el6.s390x.rpm | SHA-256: 5b0a4fdbedbd823861d866ed167394496a10a0971b914c35e2348bb489e7fd19 |
perf-debuginfo-2.6.32-131.26.1.el6.s390x.rpm | SHA-256: b136ae8e388a61ea6b6c97a44df08b44600d0e7159753df76cf92e6eea390aa6 |
Red Hat Enterprise Linux for Power, big endian - Extended Update Support 6.1
SRPM | |
---|---|
kernel-2.6.32-131.26.1.el6.src.rpm | SHA-256: 6843844c9be59e94a4056786bfbed2e8b5fe4cc6d79386354dc497e402def5c4 |
ppc64 | |
kernel-2.6.32-131.26.1.el6.ppc64.rpm | SHA-256: f3eb0682a142e5dde4847770598c422e6849aa21b5d1f4c7178e4d8dd1eb0b63 |
kernel-bootwrapper-2.6.32-131.26.1.el6.ppc64.rpm | SHA-256: 752ee256805d52bb127af76dd1a126d5c6c6d9acb7ebb59f937ae8c167578b7d |
kernel-debug-2.6.32-131.26.1.el6.ppc64.rpm | SHA-256: 7eb1345d66bcfbcddbfefe6c01742eb4a8ad25f9f99f20395983504be6a9cd7d |
kernel-debug-debuginfo-2.6.32-131.26.1.el6.ppc64.rpm | SHA-256: 27a5cd484b719523447171adec8e263d75c6ea9604ce1bed04c7d21884e5a507 |
kernel-debug-devel-2.6.32-131.26.1.el6.ppc64.rpm | SHA-256: 592e4ad002fbb79ee6164521aa9329869097b85b21248c560f5fc5a7a4f5cbd3 |
kernel-debuginfo-2.6.32-131.26.1.el6.ppc64.rpm | SHA-256: b79d519aa0a127fdc4b497ad169b18dfdf07e034e34332306e5e91ee5725cb8b |
kernel-debuginfo-common-ppc64-2.6.32-131.26.1.el6.ppc64.rpm | SHA-256: b07edb71f41b26c02145fbd0586464428bc2fcc08deb3749220101c87167a1d1 |
kernel-devel-2.6.32-131.26.1.el6.ppc64.rpm | SHA-256: 83d43dbdfab705d68d9e0685bf6dd03903f361a5f55b1ce0482a55068debb481 |
kernel-doc-2.6.32-131.26.1.el6.noarch.rpm | SHA-256: 6a9a94a4364e038bf0d098ba9ad3c4f4e63434677c9454311081c8ddcdc189d8 |
kernel-firmware-2.6.32-131.26.1.el6.noarch.rpm | SHA-256: 1c87c5022a113225de224a87e53f50a800896ec9cad9b258e6d2a424553311ab |
kernel-headers-2.6.32-131.26.1.el6.ppc64.rpm | SHA-256: e0252f6dd1763ad360073efde70820e56db9cc1a8b4fffb118fc73187ef56262 |
perf-2.6.32-131.26.1.el6.ppc64.rpm | SHA-256: 51573ad25ca29bbe19cadd4df0d778e5a1ff910a64b8d69df8f08255819af351 |
perf-debuginfo-2.6.32-131.26.1.el6.ppc64.rpm | SHA-256: e2a5ee3f944ab013eee21c816ed0c87ceb1fcdaf1a8eab7ee638a19fe181e79e |
Red Hat Enterprise Linux Server - Extended Update Support from RHUI 6.1
SRPM | |
---|---|
kernel-2.6.32-131.26.1.el6.src.rpm | SHA-256: 6843844c9be59e94a4056786bfbed2e8b5fe4cc6d79386354dc497e402def5c4 |
x86_64 | |
kernel-2.6.32-131.26.1.el6.x86_64.rpm | SHA-256: 5aa12a7d39a5f1a47e3e96c7d28c17fe2acf65b6ce82825178566d6c64922dc9 |
kernel-debug-2.6.32-131.26.1.el6.x86_64.rpm | SHA-256: 3b8843a853a9195bfd92f40dbcf5505f7ffb74d9a9f3b51606761354b00052cb |
kernel-debug-debuginfo-2.6.32-131.26.1.el6.x86_64.rpm | SHA-256: ef832b7588783e18e0ec2abadb2fa578e9113d1e7bfdaf773af1ff56dcd2bfdd |
kernel-debug-devel-2.6.32-131.26.1.el6.x86_64.rpm | SHA-256: c92e30d9422a26c53476325b54281a836bba279e6fdb6bfaac3dfb0e4e1e2121 |
kernel-debuginfo-2.6.32-131.26.1.el6.x86_64.rpm | SHA-256: e069cbe546445695b185c3c209e998310a79605b939cfa0585088e7dabf80f29 |
kernel-debuginfo-common-x86_64-2.6.32-131.26.1.el6.x86_64.rpm | SHA-256: bd63b0f99e9472ea8f2d6a92a136fd2230cace569a8c2b662f23c63ba1c23fa2 |
kernel-devel-2.6.32-131.26.1.el6.x86_64.rpm | SHA-256: 7dce7adbbfd239259af112c7d685bfb5b8b98135f9f8940bba80be8419da3df2 |
kernel-doc-2.6.32-131.26.1.el6.noarch.rpm | SHA-256: 6a9a94a4364e038bf0d098ba9ad3c4f4e63434677c9454311081c8ddcdc189d8 |
kernel-firmware-2.6.32-131.26.1.el6.noarch.rpm | SHA-256: 1c87c5022a113225de224a87e53f50a800896ec9cad9b258e6d2a424553311ab |
kernel-headers-2.6.32-131.26.1.el6.x86_64.rpm | SHA-256: 864844b32fb706f9336a1965ae58f87af8e9c092c6a361fed9ee75b70596c5a9 |
perf-2.6.32-131.26.1.el6.x86_64.rpm | SHA-256: 4eccd9a8f2f7d209d6e51311a10a0ab333a4f79e2eb62c21349a3706df8c99c3 |
perf-debuginfo-2.6.32-131.26.1.el6.x86_64.rpm | SHA-256: e8d86557bb45d5fc8faabc7a8a742706f551edc56e9b0e3dd2ddde780765ac35 |
i386 | |
kernel-2.6.32-131.26.1.el6.i686.rpm | SHA-256: dc2fd8951fe73beacd794fce46e5bee365edc1b95eb17a28afff9a3d93890340 |
kernel-debug-2.6.32-131.26.1.el6.i686.rpm | SHA-256: cffb3ef594f065556f47ec1123510c45dd88c020c1af695f77d49097004c733e |
kernel-debug-debuginfo-2.6.32-131.26.1.el6.i686.rpm | SHA-256: 3a677a2be0a4a0223ba5cc013683f0cb589341ab96a251450bfe924c428b8d97 |
kernel-debug-devel-2.6.32-131.26.1.el6.i686.rpm | SHA-256: f979f2be9c3569b2e67ad814e00ea0875cf0c72c56ce115900d4dfad7c610c2c |
kernel-debuginfo-2.6.32-131.26.1.el6.i686.rpm | SHA-256: 830c72f24b339fcc702a7a2b7f6b148bdda6b93d8a326b141799a75b74897755 |
kernel-debuginfo-common-i686-2.6.32-131.26.1.el6.i686.rpm | SHA-256: 69af123f9c3e907f903b23fb51a8cfab530357a55019a3b6e90940dcd3f268d9 |
kernel-devel-2.6.32-131.26.1.el6.i686.rpm | SHA-256: ccdb4496304eac405d3d63b77b94e20aa2544f020a63e9998b916a884a2ea3fa |
kernel-doc-2.6.32-131.26.1.el6.noarch.rpm | SHA-256: 6a9a94a4364e038bf0d098ba9ad3c4f4e63434677c9454311081c8ddcdc189d8 |
kernel-firmware-2.6.32-131.26.1.el6.noarch.rpm | SHA-256: 1c87c5022a113225de224a87e53f50a800896ec9cad9b258e6d2a424553311ab |
kernel-headers-2.6.32-131.26.1.el6.i686.rpm | SHA-256: f05655f20b27869a9cc3623a5ad7363a383c7b0b5ebcb8351a605bdc3315ab3a |
perf-2.6.32-131.26.1.el6.i686.rpm | SHA-256: b77e4b7f00d8bf29725eb69fd0b106a5038264dc8a0f547be1987124549ad75b |
perf-debuginfo-2.6.32-131.26.1.el6.i686.rpm | SHA-256: 30b99fcfbd55894da22abe4380013ced0abc24c2ba0d1d56681b8662205e0bfa |
Red Hat Virtual Storage Appliance (from RHUI) 6.1
SRPM | |
---|---|
x86_64 |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.