- Issued:
- 2016-03-29
- Updated:
- 2016-03-29
RHBA-2016:0518 - Bug Fix Advisory
Synopsis
kernel-rt bug fix update
Type/Severity
Bug Fix Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
Updated kernel-rt packages that fix several bugs are now available for Red Hat
Enterprise MRG 2.5.
Description
The kernel-rt packages contain the Linux kernel, the core of any Linux operating
system.
This update provides a build of the kernel-rt package for Red Hat Enterprise MRG
2.5 that is layered on Red Hat Enterprise Linux 6, and provides a number of bug
fixes including:
- [md] dm-thin-metadata: fix bugs in dm_thin_remove_range()
- [md] dm-thin: fix regression in advertised discard limits
- [scsi] hpsa: Update driver revision to RH2 and fix multilun device problems
- [net] tcp: honour SO_BINDTODEVICE for TW_RST case too
- [net] tcp: send_reset: test for non-NULL sk first
- [net] add inet_sk_transparent() and sk_fullsock() helpers
- [net] ipv6: Fix regression in udp_v6_mcast_next()
- [netdrv] mlx4_en: Remove BUG_ON assert when checking if ring is full
- [netdrv] cxgb4: changes for new firmware 1.14.4.0
- [netdrv] iwlwifi: modify PCI IDs for the 3165, 7265, 8000, and 8260 series
- [mm] memcg: oom_notify use-after-free fix
(BZ#1309030)
This update also fixes the following bugs:
- The realtime kernel was carrying four lines of stale code in the block devices
core code and was missing an upstream fix to this same area of code.
Consequently, users of the NVM Express device driver (nvme module), and possibly
other block devices enabling multi-queue support, experienced a kernel crash at
boot, which made the system unusable. These two bugs have been fixed, and the
kernel now boots and functions correctly. (BZ#1304868)
- While merging new Fibre Channel over Ethernet (FCoE) code, the get_cpu() and
put_cpu() function calls were converted to the get_cpu_light() and
put_cpu_light() calls on the realtime kernel. One spot was missed during the
code update that caused an imbalance in the get_cpu_light() and put_cpu_light()
call pairing, which left preemption disabled. Consequently, this resulted in the
"BUG: scheduling while atomic" error. This update ensures that all the remaining
function calls are converted correctly, and the FCoE code now works as expected.
(BZ#1309412)
- A ksoftirqd kernel thread can serve many requests including network-related
requests. Previously, ksoftirqd always ran at a real time priority (FIFO:1) and
the timer softirqs (timer and hrtimer) were a part of ksoftirqd. As a
consequence, a system under a heavy network load could keep ksoftirqd busy for a
long period of time, and prevent important tasks running at lower priorities
from getting CPU time. If the read-copy update (RCU) threads were neglected, RCU
stalls, out of memory (OOM) situations, or kernel panic could occur. With this
update, the code has been modified to match the upstream realtime kernel where
the timer softirqs are separated from ksoftirqd, ksoftirqd can run at a lower
priority, and the new ktimersoftd thread can also be prioritized according to
the specific system load. As a result, the system now works as expected under a
heavy network load. (BZ#1313435)
All kernel-rt users are advised to upgrade to these updated packages, which fix
these bugs and add these enhancements. The system must be rebooted for this
update to take effect.
Solution
Before applying this update, make sure all previously released errata
relevant to your system have been applied.
For details on how to apply this update, refer to:
Affected Products
- MRG Realtime 2 x86_64
Fixes
- BZ - 1309030 - update the MRG 2.5.x 3.10 kernel-rt sources
- BZ - 1313435 - [MRG] backport of: "softirq: split timer softirqs out of ksoftirqd"
CVEs
(none)
References
(none)
MRG Realtime 2
SRPM | |
---|---|
kernel-rt-3.10.0-327.rt56.176.el6rt.src.rpm | SHA-256: 2526ede0158bcf6a91427ba630f13330c440603ce14db6e0879baea159926070 |
x86_64 | |
kernel-rt-3.10.0-327.rt56.176.el6rt.x86_64.rpm | SHA-256: 5691b8402f0d4b3c653f3e901fd1c00ed4331ce5bc6989b1a42026baa0dc7e79 |
kernel-rt-debug-3.10.0-327.rt56.176.el6rt.x86_64.rpm | SHA-256: 5f6d6452f4fd487334773a626a451c6c0e153aeac64baf5dda505f5c7c886dc8 |
kernel-rt-debug-debuginfo-3.10.0-327.rt56.176.el6rt.x86_64.rpm | SHA-256: 8dd38d1ba6e6a117ce15551be4277518e4d8a2ec94c70d0aea0709db0eb802a9 |
kernel-rt-debug-devel-3.10.0-327.rt56.176.el6rt.x86_64.rpm | SHA-256: 31e44419cc21f1b5fe6b95a204770fff7a2c5de6eeb91574deb064bef54783c4 |
kernel-rt-debuginfo-3.10.0-327.rt56.176.el6rt.x86_64.rpm | SHA-256: 28aa513ac72a99f45a62b09594601eec86cdff7f56fdef7be13c2030116ff740 |
kernel-rt-debuginfo-common-x86_64-3.10.0-327.rt56.176.el6rt.x86_64.rpm | SHA-256: cc81e7a0e69d540be8c2cab4382109f94dcb3856dcce94a70a87a92672fc82be |
kernel-rt-devel-3.10.0-327.rt56.176.el6rt.x86_64.rpm | SHA-256: b1c64c4f6ea981a439fa4ff83646b5c7cb4f5264dae987ba1d92263ec3a55b63 |
kernel-rt-doc-3.10.0-327.rt56.176.el6rt.noarch.rpm | SHA-256: 9cc0355c8c641c2c4051c793ef584bec2a772add51d7a5f6847d8cdc6629a8e0 |
kernel-rt-firmware-3.10.0-327.rt56.176.el6rt.noarch.rpm | SHA-256: fd413733a5d49c0d5242105dd23a71884ac4b69faa677e75d60833107cc3a061 |
kernel-rt-trace-3.10.0-327.rt56.176.el6rt.x86_64.rpm | SHA-256: af876a4cdd58be62a62954e6d9275242d9972be491eb0059e1e0eefcdb2ef6d6 |
kernel-rt-trace-debuginfo-3.10.0-327.rt56.176.el6rt.x86_64.rpm | SHA-256: 4452f8b77290595dcfeec636b59d3e18f3138169c4847689b4606909b622de86 |
kernel-rt-trace-devel-3.10.0-327.rt56.176.el6rt.x86_64.rpm | SHA-256: b6ebe37830ab31910af56d4c96c80dcc1aea8ce0b71c968ed43d5a60ef6fa4aa |
kernel-rt-vanilla-3.10.0-327.rt56.176.el6rt.x86_64.rpm | SHA-256: 2624d8727c01586a4426bd65629eaf877097d8b07fc72a675bcd2b4d83ceb71e |
kernel-rt-vanilla-debuginfo-3.10.0-327.rt56.176.el6rt.x86_64.rpm | SHA-256: c5fceb8cfc3c6189c8e4b1f9df7bf8ac1a3b4bfbda17f476496141de162885c8 |
kernel-rt-vanilla-devel-3.10.0-327.rt56.176.el6rt.x86_64.rpm | SHA-256: 224fc1e8abdbabe5e115a66c68496f0cd73844e92d08495e1b3a0bd61d17e50b |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.