Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Lightspeed
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Lightspeed
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHBA-2016:0554 - Bug Fix Advisory
Issued:
2016-03-31
Updated:
2016-03-31

RHBA-2016:0554 - Bug Fix Advisory

  • Overview
  • Updated Packages

Synopsis

kernel-rt bug fix update

Type/Severity

Bug Fix Advisory

Red Hat Lightspeed patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

Updated kernel-rt packages that fix several bugs are now available for Red Hat Enterprise Linux 7.

Description

The kernel-rt packages contain the Linux kernel, the core of any Linux operating system.

The kernel-rt packages have been upgraded to version 3.10.0-327.13.1, which provides a number of bug fixes including:

  • [md] dm-thin-metadata: fix bugs in dm_thin_remove_range()
  • [md] dm-thin: fix regression in advertised discard limits
  • [scsi] hpsa: Update driver revision to RH2 and fix multilun device problems
  • [net] tcp: honour SO_BINDTODEVICE for TW_RST case too
  • [net] tcp: send_reset: test for non-NULL sk first
  • [net] add inet_sk_transparent() and sk_fullsock() helpers
  • [net] ipv6: Fix regression in udp_v6_mcast_next()
  • [netdrv] mlx4_en: Remove BUG_ON assert when checking if ring is full
  • [netdrv] cxgb4: changes for new firmware 1.14.4.0
  • [netdrv] iwlwifi: modify PCI IDs for the 3165, 7265, 8000, and 8260 series
  • [mm] memcg: oom_notify use-after-free fix

(BZ#1311476)

This update also fixes the following bugs:

  • The realtime kernel was carrying four lines of stale code in the block devices core code and was missing an upstream fix to this same area of code. Consequently, users of the NVM Express device driver (nvme module), and possibly other block devices enabling multi-queue support, experienced a kernel crash at boot, which made the system unusable. These two bugs have been fixed, and the kernel now boots and functions correctly. (BZ#1304862)
  • While merging new Fibre Channel over Ethernet (FCoE) code, the get_cpu() and put_cpu() function calls were converted to the get_cpu_light() and put_cpu_light() calls on the realtime kernel. One spot was missed during the code update that caused an imbalance in the get_cpu_light() and put_cpu_light() call pairing, which left preemption disabled. Consequently, this resulted in the "BUG: scheduling while atomic" error. This update ensures that all the remaining function calls are converted correctly, and the FCoE code now works as expected. (BZ#1306958)
  • A ksoftirqd kernel thread can serve many requests including network-related requests. Previously, ksoftirqd always ran at a real time priority (FIFO:1) and the timer softirqs (timer and hrtimer) were a part of ksoftirqd. As a consequence, a system under a heavy network load could keep ksoftirqd busy for a long period of time, and prevent important tasks running at lower priorities from getting CPU time. If the read-copy update (RCU) threads were neglected, RCU stalls, out of memory (OOM) situations, or kernel panic could occur. With this update, the code has been modified to match the upstream realtime kernel where the timer softirqs are separated from ksoftirqd, ksoftirqd can run at a lower priority, and the new ktimersoftd thread can also be prioritized according to the specific system load. As a result, the system now works as expected under a heavy network load. (BZ#1306962)

All kernel-rt users are advised to upgrade to these updated packages, which fix these bugs. The system must be rebooted for this update to take effect.

Solution

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

For details on how to apply this update, refer to:

https://access.redhat.com/articles/11258

Affected Products

  • Red Hat Enterprise Linux for Real Time 7 x86_64
  • Red Hat Enterprise Linux for Real Time for x86_64 - Extended Life Cycle Support 7 x86_64

Fixes

  • BZ - 1306962 - backport of: "softirq: split timer softirqs out of ksoftirqd"
  • BZ - 1311476 - kernel-rt: update to the RHEL7.2.z batch#3 source tree

CVEs

(none)

References

  • http://www.redhat.com/security/updates/classification/#normal
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux for Real Time 7

SRPM
kernel-rt-3.10.0-327.13.1.rt56.216.el7_2.src.rpm SHA-256: 09e25f0a34baef4fa8fc57610dd10bd20d1ace2175b620c4eeb0dd68e4fdd075
x86_64
kernel-rt-3.10.0-327.13.1.rt56.216.el7_2.x86_64.rpm SHA-256: 3e21f4aabe5b29d68d81ae2e9f56087ed87ce3ecd927f9f73b711282ebb1b8e1
kernel-rt-debug-3.10.0-327.13.1.rt56.216.el7_2.x86_64.rpm SHA-256: 19c97d2cfa52e385739e69da71634d5e363157676f852d5a01956ee26f57c8bf
kernel-rt-debug-debuginfo-3.10.0-327.13.1.rt56.216.el7_2.x86_64.rpm SHA-256: c8c38055f33b4ffc89df0a08490b3c34a84127c79a388d4ee85526dac606a2a2
kernel-rt-debug-devel-3.10.0-327.13.1.rt56.216.el7_2.x86_64.rpm SHA-256: 51d1677cf5062e135324e106340162fb24e77e4fed2074feeadefc0cee7beb79
kernel-rt-debuginfo-3.10.0-327.13.1.rt56.216.el7_2.x86_64.rpm SHA-256: 5f23f3640a26409a08cf32ebc143dda1178a38a9986e1e7b1c3d866a3fb053b9
kernel-rt-debuginfo-common-x86_64-3.10.0-327.13.1.rt56.216.el7_2.x86_64.rpm SHA-256: 174a3417a9a00da8408bfde71fb81c16876fd11707ba9b65bffb037d64fc4b7c
kernel-rt-devel-3.10.0-327.13.1.rt56.216.el7_2.x86_64.rpm SHA-256: 13aeedccd92ee4a01442bdf61867fc4beb52aa7b6da1f12b9d766cfcb9ca13ec
kernel-rt-doc-3.10.0-327.13.1.rt56.216.el7_2.noarch.rpm SHA-256: 238ed3282ee0a34810c3043bbb57213afcd8bdced618486ae3fa2c475a32c187
kernel-rt-trace-3.10.0-327.13.1.rt56.216.el7_2.x86_64.rpm SHA-256: a9f173f7898407e5ff47c34a85cb15a1447971999d71586945960500086c096a
kernel-rt-trace-debuginfo-3.10.0-327.13.1.rt56.216.el7_2.x86_64.rpm SHA-256: e084998e85e84a7d5da19bcaed6713f0e60b582a1d2a24ff82b0b295a1a5b530
kernel-rt-trace-devel-3.10.0-327.13.1.rt56.216.el7_2.x86_64.rpm SHA-256: cb00cc2ceb474b1aee7941fa01bab337eecfc958ff48b3d33ccd2753725b2c17

Red Hat Enterprise Linux for Real Time for x86_64 - Extended Life Cycle Support 7

SRPM
kernel-rt-3.10.0-327.13.1.rt56.216.el7_2.src.rpm SHA-256: 09e25f0a34baef4fa8fc57610dd10bd20d1ace2175b620c4eeb0dd68e4fdd075
x86_64
kernel-rt-3.10.0-327.13.1.rt56.216.el7_2.x86_64.rpm SHA-256: 3e21f4aabe5b29d68d81ae2e9f56087ed87ce3ecd927f9f73b711282ebb1b8e1
kernel-rt-debug-3.10.0-327.13.1.rt56.216.el7_2.x86_64.rpm SHA-256: 19c97d2cfa52e385739e69da71634d5e363157676f852d5a01956ee26f57c8bf
kernel-rt-debug-debuginfo-3.10.0-327.13.1.rt56.216.el7_2.x86_64.rpm SHA-256: c8c38055f33b4ffc89df0a08490b3c34a84127c79a388d4ee85526dac606a2a2
kernel-rt-debug-devel-3.10.0-327.13.1.rt56.216.el7_2.x86_64.rpm SHA-256: 51d1677cf5062e135324e106340162fb24e77e4fed2074feeadefc0cee7beb79
kernel-rt-debuginfo-3.10.0-327.13.1.rt56.216.el7_2.x86_64.rpm SHA-256: 5f23f3640a26409a08cf32ebc143dda1178a38a9986e1e7b1c3d866a3fb053b9
kernel-rt-debuginfo-common-x86_64-3.10.0-327.13.1.rt56.216.el7_2.x86_64.rpm SHA-256: 174a3417a9a00da8408bfde71fb81c16876fd11707ba9b65bffb037d64fc4b7c
kernel-rt-devel-3.10.0-327.13.1.rt56.216.el7_2.x86_64.rpm SHA-256: 13aeedccd92ee4a01442bdf61867fc4beb52aa7b6da1f12b9d766cfcb9ca13ec
kernel-rt-doc-3.10.0-327.13.1.rt56.216.el7_2.noarch.rpm SHA-256: 238ed3282ee0a34810c3043bbb57213afcd8bdced618486ae3fa2c475a32c187
kernel-rt-trace-3.10.0-327.13.1.rt56.216.el7_2.x86_64.rpm SHA-256: a9f173f7898407e5ff47c34a85cb15a1447971999d71586945960500086c096a
kernel-rt-trace-debuginfo-3.10.0-327.13.1.rt56.216.el7_2.x86_64.rpm SHA-256: e084998e85e84a7d5da19bcaed6713f0e60b582a1d2a24ff82b0b295a1a5b530
kernel-rt-trace-devel-3.10.0-327.13.1.rt56.216.el7_2.x86_64.rpm SHA-256: cb00cc2ceb474b1aee7941fa01bab337eecfc958ff48b3d33ccd2753725b2c17

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat LinkedIn YouTube Facebook X, formerly Twitter

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2025 Red Hat

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility