- Issued:
- 2012-05-08
- Updated:
- 2012-06-12
RHBA-2012:0549 - Bug Fix Advisory
Synopsis
kernel bug fix update
Type/Severity
Bug Fix Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
Updated kernel packages that fix three bugs and add two enhancements are now
available for Red Hat Enterprise Linux 6 Extended Update Support.
Description
[Updated 12 June 2012]
This advisory has been updated with the correct description for bug 811298. The
packages included in this revised update have not been changed in any way from
the packages included in the original advisory.
The kernel packages contain the Linux kernel, the core of any Linux operating
system.
This update fixes the following bugs:
- An unwanted interrupt was generated when a PCI driver switched the interrupt
mechanism from the Message Signaled Interrupt (MSI or MSI-X) to the INTx
emulation while shutting down a device. Due to this, an interrupt handler was
called repeatedly, and the system became unresponsive. On certain systems, the
interrupt handler of Intelligent Platform Management Interface (IPMI) was called
while shutting down a device on the way to reboot the system after running
kdump. In such a case, soft lockups were performed repeatedly and the shutdown
process never finished. With this update, the user can choose not to use MSI or
MSI-X for the PCI Express Native Hotplug driver. The switching between the
interrupt mechanisms is no longer performed so that the unwanted interrupt is
not generated. (BZ#807425)
- Previously, the eth_type_trans() function was called with the VLAN device type
set. If a VLAN device contained a MAC address different from the original
device, an incorrect packet type was assigned to the host. Consequently, if the
VLAN devices were set up on a bonding interface in Adaptive Load Balancing (ALB)
mode, the TCP connection could not be established. With this update, the
eth_type_trans() function is called with the original device, ensuring that the
connection is established as expected. (BZ#810453)
- Due to incorrect use of the list_for_each_entry_safe() macro, the enumeration
of remote procedure calls (RPCs) priority wait queue tasks stored in the
tk_wait.links list failed. As a consequence, the rpc_wake_up() and
rpc_wake_up_status() functions failed to wake up all tasks. This caused the
system to become unresponsive and could significantly decrease system
performance. Now, the list_for_each_entry_safe() macro is no longer used in
rpc_wake_up(), ensuring reasonable system performance. (BZ#811298)
This update also adds the following enhancements:
- The qlge 10 Gigabit Ethernet driver for QLogic 81XX converged network adapter
family has been updated to version 1.00.00.29, which provides a number of bug
fixes over the previous version. (BZ#801714)
- The Intelligent Platform Management Interface (IPMI) specification requires a
minimum communication timeout of five seconds. Previously, the kernel
incorrectly used a timeout of 1 second. This could result in failures to
communicate with Baseboard Management Controllers (BMC) under certain
circumstances. With this update, the timeout has been increased to five seconds
to prevent such problems. (BZ#806905)
All users of kernel are advised to upgrade to these updated packages, which fix
these bugs and add these enhancements. The system must be rebooted for this
update to take effect.
Solution
Before applying this update, make sure all previously-released errata relevant
to your system have been applied.
This update is available via the Red Hat Network. Details on how to use the Red
Hat Network to apply this update are available at
https://access.redhat.com/knowledge/articles/11258
Affected Products
- Red Hat Enterprise Linux for x86_64 - Extended Update Support 6.1 x86_64
- Red Hat Enterprise Linux for x86_64 - Extended Update Support 6.1 i386
- Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 6.1 s390x
- Red Hat Enterprise Linux for Power, big endian - Extended Update Support 6.1 ppc64
- Red Hat Enterprise Linux Server - Extended Update Support from RHUI 6.1 x86_64
- Red Hat Enterprise Linux Server - Extended Update Support from RHUI 6.1 i386
- Red Hat Virtual Storage Appliance (from RHUI) 6.1 x86_64
Fixes
(none)CVEs
(none)
References
(none)
Red Hat Enterprise Linux for x86_64 - Extended Update Support 6.1
SRPM | |
---|---|
kernel-2.6.32-131.28.1.el6.src.rpm | SHA-256: 9306e509da31ffd305888e2a48e5a1b2a337a3a59d4919059f7fc239b7561cd1 |
x86_64 | |
kernel-2.6.32-131.28.1.el6.x86_64.rpm | SHA-256: a1915549bb68cb472d6d660f1197917da283605458fb41cefea0aa2f0839cdd6 |
kernel-debug-2.6.32-131.28.1.el6.x86_64.rpm | SHA-256: 110cba8cdc3006cbdcad21733388f047c2d7d86f00e69248aec2d0a9b937e7e0 |
kernel-debug-debuginfo-2.6.32-131.28.1.el6.x86_64.rpm | SHA-256: 9b73ab408bf8dab41ac332759d66bcf26b2aff9548dc73dff6a0a7efb5f6358a |
kernel-debug-devel-2.6.32-131.28.1.el6.x86_64.rpm | SHA-256: ce6c5445d672f80fdcaec7ae1d1e49115b24cd57469d9b21ec5ebdaaacfa715d |
kernel-debuginfo-2.6.32-131.28.1.el6.x86_64.rpm | SHA-256: 22b01ce992cd7d5d81b7a4e8fcde39962615029b7836197e7aa684c2a23dbf2c |
kernel-debuginfo-common-x86_64-2.6.32-131.28.1.el6.x86_64.rpm | SHA-256: 2a84295172a7d2cbab3e8040cfadd981bd8a774d5a31eeba78464c273290c305 |
kernel-devel-2.6.32-131.28.1.el6.x86_64.rpm | SHA-256: d98157db95ee6b8ff6820e4b651536ac62fbadb5463a9a8cc912708eacffd673 |
kernel-doc-2.6.32-131.28.1.el6.noarch.rpm | SHA-256: 9b862549abd8440697a3ee9de89b4db5708dca534285a19cc4296a655ac5af2b |
kernel-firmware-2.6.32-131.28.1.el6.noarch.rpm | SHA-256: e0d92a6d2eb80e01b9f1bcdc39afe59428590e56076db845cda99129cc9eb8aa |
kernel-headers-2.6.32-131.28.1.el6.x86_64.rpm | SHA-256: 40e322fdc87f23b2dff99dc9186e8fc6c0f52c814759ede6a568c93233e88c43 |
perf-2.6.32-131.28.1.el6.x86_64.rpm | SHA-256: 8d4bd97dc8f66c14091cb742e5cf8218576c9eb52999d61a3b9a8efc2444f1fc |
perf-debuginfo-2.6.32-131.28.1.el6.x86_64.rpm | SHA-256: 8acac7afbf3abc2adbf076c14e7efd971dd26e7ce5b47ce99513c437d682623d |
i386 | |
kernel-2.6.32-131.28.1.el6.i686.rpm | SHA-256: 8cc7d79ba4d418dbf5b046740cf0059431369d86f6a60d1da133cab3feca1f90 |
kernel-debug-2.6.32-131.28.1.el6.i686.rpm | SHA-256: 6863f77b2ef5283a7a4df66e65335391451cc0403d20a891744204f638fd3a86 |
kernel-debug-debuginfo-2.6.32-131.28.1.el6.i686.rpm | SHA-256: 559fdd89295861d8f7f62afc252c94c7d8054776025f4b587b3251b962c52e8a |
kernel-debug-devel-2.6.32-131.28.1.el6.i686.rpm | SHA-256: 94f6496f773272286604bb66321bdda67b47bb39f38d590a7537afc86018db14 |
kernel-debuginfo-2.6.32-131.28.1.el6.i686.rpm | SHA-256: ce98d29240243be8b215cd46e6885a0b793a67c484c6c5f265478c8c51a63fdb |
kernel-debuginfo-common-i686-2.6.32-131.28.1.el6.i686.rpm | SHA-256: c5c44ac9a9a63d49894fa26e4dd3d9e94d6b288940da2d25bc26f15dc295a4e6 |
kernel-devel-2.6.32-131.28.1.el6.i686.rpm | SHA-256: bdcbed486811b413a8897fa02d71b8b510702d69fc021502d33ef9430fe49b4f |
kernel-doc-2.6.32-131.28.1.el6.noarch.rpm | SHA-256: 9b862549abd8440697a3ee9de89b4db5708dca534285a19cc4296a655ac5af2b |
kernel-firmware-2.6.32-131.28.1.el6.noarch.rpm | SHA-256: e0d92a6d2eb80e01b9f1bcdc39afe59428590e56076db845cda99129cc9eb8aa |
kernel-headers-2.6.32-131.28.1.el6.i686.rpm | SHA-256: 9ba7c7f068d160bd5a06da909414e8b01fe2066e76e4a85efecdec7da29f46bc |
perf-2.6.32-131.28.1.el6.i686.rpm | SHA-256: da8af71de1f175a87a66eae31f56629021f038627c8c19c5766c80dd7172e40b |
perf-debuginfo-2.6.32-131.28.1.el6.i686.rpm | SHA-256: b7b5cec6857e833e385c8075ef4e9fbdcd569a07d71ae1ca5d7a7b499c53af36 |
Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 6.1
SRPM | |
---|---|
kernel-2.6.32-131.28.1.el6.src.rpm | SHA-256: 9306e509da31ffd305888e2a48e5a1b2a337a3a59d4919059f7fc239b7561cd1 |
s390x | |
kernel-2.6.32-131.28.1.el6.s390x.rpm | SHA-256: 38ab8c9d3f578060a77b1c871d6b71cd9f79545c9f3aa027ba2136c42b7b2b22 |
kernel-debug-2.6.32-131.28.1.el6.s390x.rpm | SHA-256: cbdfc259f57b158f2d6fb13b41ee201ab80c5d60ca74b42d591e054e039a3bbe |
kernel-debug-debuginfo-2.6.32-131.28.1.el6.s390x.rpm | SHA-256: 38e475384f9f4eb8a2b089266f5b5106bde5dd3383e52b7a65e26d9fa2b8b4c5 |
kernel-debug-devel-2.6.32-131.28.1.el6.s390x.rpm | SHA-256: 451d5ec0288789b9e6c2b7631c978b19a94936e649abae85ed4f9c8e1d4c74e2 |
kernel-debuginfo-2.6.32-131.28.1.el6.s390x.rpm | SHA-256: f3acfa4183d9ef78fa2eb76efd8d149da8695eef666178d4789205e1a5e4019a |
kernel-debuginfo-common-s390x-2.6.32-131.28.1.el6.s390x.rpm | SHA-256: 61675404c1636c27cd12942370c21b69c26aff439b5de9aa16cb82840b8a3e4d |
kernel-devel-2.6.32-131.28.1.el6.s390x.rpm | SHA-256: 94b425ddaacb53ce65b20093a08a8695c574f7d7807bdb7712bc29802c8c8cbc |
kernel-doc-2.6.32-131.28.1.el6.noarch.rpm | SHA-256: 9b862549abd8440697a3ee9de89b4db5708dca534285a19cc4296a655ac5af2b |
kernel-firmware-2.6.32-131.28.1.el6.noarch.rpm | SHA-256: e0d92a6d2eb80e01b9f1bcdc39afe59428590e56076db845cda99129cc9eb8aa |
kernel-headers-2.6.32-131.28.1.el6.s390x.rpm | SHA-256: a4922e765fa4f9c2ba2cd73042d38832cf6935ebe7cdcc074899ce26d0b4ae35 |
kernel-kdump-2.6.32-131.28.1.el6.s390x.rpm | SHA-256: 9787e3aa2db461350dd01f63970f8c2105d1a17220f79f28399e567854828a1b |
kernel-kdump-debuginfo-2.6.32-131.28.1.el6.s390x.rpm | SHA-256: 37a0c655031c088c0127b46d2ca7837d154bc6f3ae6b54db1da1cf71e303e720 |
kernel-kdump-devel-2.6.32-131.28.1.el6.s390x.rpm | SHA-256: 00b72ff6fdde602cf8c07a4e8b1bc446adf9449d33ec0ca85cd1f9fe2371b8db |
perf-2.6.32-131.28.1.el6.s390x.rpm | SHA-256: 998709bd839e92d1c6433027f3c2f806023418da2e7dd3c3f6b59c3a52d3b826 |
perf-debuginfo-2.6.32-131.28.1.el6.s390x.rpm | SHA-256: 65ea5263284789e56f7b7435828372448e83472fbae31d80c7a22c6b14ba5e2a |
Red Hat Enterprise Linux for Power, big endian - Extended Update Support 6.1
SRPM | |
---|---|
kernel-2.6.32-131.28.1.el6.src.rpm | SHA-256: 9306e509da31ffd305888e2a48e5a1b2a337a3a59d4919059f7fc239b7561cd1 |
ppc64 | |
kernel-2.6.32-131.28.1.el6.ppc64.rpm | SHA-256: 32a67ac7d4bee95b1d2253c1061970f542fb182914b6b63a58349769cad7028c |
kernel-bootwrapper-2.6.32-131.28.1.el6.ppc64.rpm | SHA-256: e9a9b0111158d1a0453d9f9b473aa1142b2bd330bd710d65119901bd2fb198fb |
kernel-debug-2.6.32-131.28.1.el6.ppc64.rpm | SHA-256: eec518e750ac79966aefae3ae8414d26a08c966405b6474903d1e3a816ba9db4 |
kernel-debug-debuginfo-2.6.32-131.28.1.el6.ppc64.rpm | SHA-256: a0fb7bfd8636a16d983728929b3ecc0fcb45965cb4cbe305afb34f0312c66a70 |
kernel-debug-devel-2.6.32-131.28.1.el6.ppc64.rpm | SHA-256: f941b0e29d8f21c45751297362bd97ae4143ced44a4daf825470e079bd61b3b6 |
kernel-debuginfo-2.6.32-131.28.1.el6.ppc64.rpm | SHA-256: 97df751c9968fc7e21dbe2a43091cdb1253315a2a2460d7ea54b73075b2eca5e |
kernel-debuginfo-common-ppc64-2.6.32-131.28.1.el6.ppc64.rpm | SHA-256: 1c929d3fd68f0b6224d074ccbfe3977534405a4cdf59c49bbe66f15515a2f808 |
kernel-devel-2.6.32-131.28.1.el6.ppc64.rpm | SHA-256: 6e792ab7da4c93e0ae1f0a45bfa4833188e94a8c521d69320ee704b275fcfc55 |
kernel-doc-2.6.32-131.28.1.el6.noarch.rpm | SHA-256: 9b862549abd8440697a3ee9de89b4db5708dca534285a19cc4296a655ac5af2b |
kernel-firmware-2.6.32-131.28.1.el6.noarch.rpm | SHA-256: e0d92a6d2eb80e01b9f1bcdc39afe59428590e56076db845cda99129cc9eb8aa |
kernel-headers-2.6.32-131.28.1.el6.ppc64.rpm | SHA-256: 97a5fe0eee5c790ad3f4516ee158bed63bc69e64a25676eb67ac3b6e33102131 |
perf-2.6.32-131.28.1.el6.ppc64.rpm | SHA-256: 2be37033f77ed9c55e0effa88d5a5e676c6d794814a5573e8695767f013d4293 |
perf-debuginfo-2.6.32-131.28.1.el6.ppc64.rpm | SHA-256: 9f289ba4b57154cb468d4ce642e3d523367064e2e6f43c67593cbeb42ece0a23 |
Red Hat Enterprise Linux Server - Extended Update Support from RHUI 6.1
SRPM | |
---|---|
kernel-2.6.32-131.28.1.el6.src.rpm | SHA-256: 9306e509da31ffd305888e2a48e5a1b2a337a3a59d4919059f7fc239b7561cd1 |
x86_64 | |
kernel-2.6.32-131.28.1.el6.x86_64.rpm | SHA-256: a1915549bb68cb472d6d660f1197917da283605458fb41cefea0aa2f0839cdd6 |
kernel-debug-2.6.32-131.28.1.el6.x86_64.rpm | SHA-256: 110cba8cdc3006cbdcad21733388f047c2d7d86f00e69248aec2d0a9b937e7e0 |
kernel-debug-debuginfo-2.6.32-131.28.1.el6.x86_64.rpm | SHA-256: 9b73ab408bf8dab41ac332759d66bcf26b2aff9548dc73dff6a0a7efb5f6358a |
kernel-debug-devel-2.6.32-131.28.1.el6.x86_64.rpm | SHA-256: ce6c5445d672f80fdcaec7ae1d1e49115b24cd57469d9b21ec5ebdaaacfa715d |
kernel-debuginfo-2.6.32-131.28.1.el6.x86_64.rpm | SHA-256: 22b01ce992cd7d5d81b7a4e8fcde39962615029b7836197e7aa684c2a23dbf2c |
kernel-debuginfo-common-x86_64-2.6.32-131.28.1.el6.x86_64.rpm | SHA-256: 2a84295172a7d2cbab3e8040cfadd981bd8a774d5a31eeba78464c273290c305 |
kernel-devel-2.6.32-131.28.1.el6.x86_64.rpm | SHA-256: d98157db95ee6b8ff6820e4b651536ac62fbadb5463a9a8cc912708eacffd673 |
kernel-doc-2.6.32-131.28.1.el6.noarch.rpm | SHA-256: 9b862549abd8440697a3ee9de89b4db5708dca534285a19cc4296a655ac5af2b |
kernel-firmware-2.6.32-131.28.1.el6.noarch.rpm | SHA-256: e0d92a6d2eb80e01b9f1bcdc39afe59428590e56076db845cda99129cc9eb8aa |
kernel-headers-2.6.32-131.28.1.el6.x86_64.rpm | SHA-256: 40e322fdc87f23b2dff99dc9186e8fc6c0f52c814759ede6a568c93233e88c43 |
perf-2.6.32-131.28.1.el6.x86_64.rpm | SHA-256: 8d4bd97dc8f66c14091cb742e5cf8218576c9eb52999d61a3b9a8efc2444f1fc |
perf-debuginfo-2.6.32-131.28.1.el6.x86_64.rpm | SHA-256: 8acac7afbf3abc2adbf076c14e7efd971dd26e7ce5b47ce99513c437d682623d |
i386 | |
kernel-2.6.32-131.28.1.el6.i686.rpm | SHA-256: 8cc7d79ba4d418dbf5b046740cf0059431369d86f6a60d1da133cab3feca1f90 |
kernel-debug-2.6.32-131.28.1.el6.i686.rpm | SHA-256: 6863f77b2ef5283a7a4df66e65335391451cc0403d20a891744204f638fd3a86 |
kernel-debug-debuginfo-2.6.32-131.28.1.el6.i686.rpm | SHA-256: 559fdd89295861d8f7f62afc252c94c7d8054776025f4b587b3251b962c52e8a |
kernel-debug-devel-2.6.32-131.28.1.el6.i686.rpm | SHA-256: 94f6496f773272286604bb66321bdda67b47bb39f38d590a7537afc86018db14 |
kernel-debuginfo-2.6.32-131.28.1.el6.i686.rpm | SHA-256: ce98d29240243be8b215cd46e6885a0b793a67c484c6c5f265478c8c51a63fdb |
kernel-debuginfo-common-i686-2.6.32-131.28.1.el6.i686.rpm | SHA-256: c5c44ac9a9a63d49894fa26e4dd3d9e94d6b288940da2d25bc26f15dc295a4e6 |
kernel-devel-2.6.32-131.28.1.el6.i686.rpm | SHA-256: bdcbed486811b413a8897fa02d71b8b510702d69fc021502d33ef9430fe49b4f |
kernel-doc-2.6.32-131.28.1.el6.noarch.rpm | SHA-256: 9b862549abd8440697a3ee9de89b4db5708dca534285a19cc4296a655ac5af2b |
kernel-firmware-2.6.32-131.28.1.el6.noarch.rpm | SHA-256: e0d92a6d2eb80e01b9f1bcdc39afe59428590e56076db845cda99129cc9eb8aa |
kernel-headers-2.6.32-131.28.1.el6.i686.rpm | SHA-256: 9ba7c7f068d160bd5a06da909414e8b01fe2066e76e4a85efecdec7da29f46bc |
perf-2.6.32-131.28.1.el6.i686.rpm | SHA-256: da8af71de1f175a87a66eae31f56629021f038627c8c19c5766c80dd7172e40b |
perf-debuginfo-2.6.32-131.28.1.el6.i686.rpm | SHA-256: b7b5cec6857e833e385c8075ef4e9fbdcd569a07d71ae1ca5d7a7b499c53af36 |
Red Hat Virtual Storage Appliance (from RHUI) 6.1
SRPM | |
---|---|
kernel-2.6.32-131.28.1.el6.src.rpm | SHA-256: 9306e509da31ffd305888e2a48e5a1b2a337a3a59d4919059f7fc239b7561cd1 |
x86_64 | |
kernel-2.6.32-131.28.1.el6.x86_64.rpm | SHA-256: a1915549bb68cb472d6d660f1197917da283605458fb41cefea0aa2f0839cdd6 |
kernel-debug-2.6.32-131.28.1.el6.x86_64.rpm | SHA-256: 110cba8cdc3006cbdcad21733388f047c2d7d86f00e69248aec2d0a9b937e7e0 |
kernel-debug-debuginfo-2.6.32-131.28.1.el6.x86_64.rpm | SHA-256: 9b73ab408bf8dab41ac332759d66bcf26b2aff9548dc73dff6a0a7efb5f6358a |
kernel-debug-devel-2.6.32-131.28.1.el6.x86_64.rpm | SHA-256: ce6c5445d672f80fdcaec7ae1d1e49115b24cd57469d9b21ec5ebdaaacfa715d |
kernel-debuginfo-2.6.32-131.28.1.el6.x86_64.rpm | SHA-256: 22b01ce992cd7d5d81b7a4e8fcde39962615029b7836197e7aa684c2a23dbf2c |
kernel-debuginfo-common-x86_64-2.6.32-131.28.1.el6.x86_64.rpm | SHA-256: 2a84295172a7d2cbab3e8040cfadd981bd8a774d5a31eeba78464c273290c305 |
kernel-devel-2.6.32-131.28.1.el6.x86_64.rpm | SHA-256: d98157db95ee6b8ff6820e4b651536ac62fbadb5463a9a8cc912708eacffd673 |
kernel-doc-2.6.32-131.28.1.el6.noarch.rpm | SHA-256: 9b862549abd8440697a3ee9de89b4db5708dca534285a19cc4296a655ac5af2b |
kernel-firmware-2.6.32-131.28.1.el6.noarch.rpm | SHA-256: e0d92a6d2eb80e01b9f1bcdc39afe59428590e56076db845cda99129cc9eb8aa |
kernel-headers-2.6.32-131.28.1.el6.x86_64.rpm | SHA-256: 40e322fdc87f23b2dff99dc9186e8fc6c0f52c814759ede6a568c93233e88c43 |
perf-2.6.32-131.28.1.el6.x86_64.rpm | SHA-256: 8d4bd97dc8f66c14091cb742e5cf8218576c9eb52999d61a3b9a8efc2444f1fc |
perf-debuginfo-2.6.32-131.28.1.el6.x86_64.rpm | SHA-256: 8acac7afbf3abc2adbf076c14e7efd971dd26e7ce5b47ce99513c437d682623d |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.