Updated kernel packages that fix one bug are now available for Red HatEnterprise Linux 6.4 Advanced Update Support.
The kernel packages contain the Linux kernel, the core of any Linux operatingsystem.This update fixes the following bug:* Previously, the BUG_ON() signal appeared in the fs_clear_inode() function whenthe nfs_have_writebacks() function reported a positive value fornfs_inode->npages.

As a consequence, a kernel panic occurred.

This updateperforms a serialization by holding the inode i_lock over the check ofPagePrivate and locking the request.

As a result, the kernel no longer panics inthe described situation. (BZ#1365159)Users of kernel are advised to upgrade to these updated packages, which fix thisbug.

The system must be rebooted for this update to take effect.
Before applying this update, make sure all previously released errata relevantto your system have been applied.For details on how to apply this update, refer to:https://access.redhat.com/articles/11258Red Hat Enterprise Linux Server AUS (v. 6.4)

SRPMS:
kernel-2.6.32-358.73.1.el6.src.rpm
    MD5: 542a4fdbeb1e9f45be0ea07838892b25SHA-256: ea29587004b7620d6ade3eb53f113104da2237cdc1fabc68e7d2244dd264b70c
 
x86_64:
kernel-2.6.32-358.73.1.el6.x86_64.rpm
    MD5: f18c0e32c05236d59047cc1a4fbd23b3SHA-256: 2ff556d233ddc7e5ff05638259f378e65afe09627fec171eda4f5813d719b908
kernel-debug-2.6.32-358.73.1.el6.x86_64.rpm
    MD5: a2e7839c253e768f7e9c28e849377d6fSHA-256: b3de38a4965706e8b64654bdf5281dfd176e03687e57b463949f05e6b7e02aca
kernel-debug-debuginfo-2.6.32-358.73.1.el6.x86_64.rpm
    MD5: 727bf4a27c22121af0683cf23bd11c7eSHA-256: 4eb7eef30ab856d7dbba3e1b3674918735ea8af8539f21715b90ad4c98909b93
kernel-debug-devel-2.6.32-358.73.1.el6.x86_64.rpm
    MD5: ceacca0c3c0f61641a260cb5cc5cb6baSHA-256: 381db5d5874619904e5281c8d01dd6952cfb9f2b2883f9274b3bdabcf265a0b9
kernel-debuginfo-2.6.32-358.73.1.el6.x86_64.rpm
    MD5: a70049d9ef9170d56163375c176f1a9bSHA-256: fd470dd7faeeeb0c54ea35f6e61107453276609ef0c8b9622be26ec012de99b0
kernel-debuginfo-common-x86_64-2.6.32-358.73.1.el6.x86_64.rpm
    MD5: fde816d2a4a98815c8dc3ae748a47f69SHA-256: f56ce4c2e05566434ed555d4c8198f9b764781009dfb4ed56689813b5b3a708e
kernel-devel-2.6.32-358.73.1.el6.x86_64.rpm
    MD5: f1b9d39c103e33b284f821616310bcfcSHA-256: 6a34955822dfa7ccf67a6a40b4f3f4984915671d5d53002dd7c3d5418281124d
kernel-doc-2.6.32-358.73.1.el6.noarch.rpm
    MD5: c554e01c2b42de4c62f765025dee4321SHA-256: ffe476dc290c67e9e03015b03a15bc5b3b4458a4306caa75617917aa336bbd1e
kernel-firmware-2.6.32-358.73.1.el6.noarch.rpm
    MD5: 46717634f41c7bd2d819efa6ccab1de7SHA-256: e69125173af43803031383b02440a790d008b2bbb3644fd0b276e66762620be2
kernel-headers-2.6.32-358.73.1.el6.x86_64.rpm
    MD5: 5c7e0155b5bc2e124c91bf28fa8e06b0SHA-256: 92ae4019376638b22a6af74222b61d1f09e0cea45e43206770611bf32709bca3
perf-2.6.32-358.73.1.el6.x86_64.rpm
    MD5: 34e7fa89d33b0dd51f8429eb32871290SHA-256: 60928f9b876adbead70dbe6bdcaee5883092e4a23d20710ee480b46b8c659f08
perf-debuginfo-2.6.32-358.73.1.el6.x86_64.rpm
    MD5: 3e79f51094802124dc949099caa15173SHA-256: 112e9e289a579be3cb224193ebfbf7b561aa4e0b728c8b1a0a2f745e5b3cf9ba
python-perf-2.6.32-358.73.1.el6.x86_64.rpm
    MD5: 602851c47ee1341e5712d0545d728c1eSHA-256: 93117ef185103a7b1b550468a152cbc4afb0bf5ca89cede6b30f367834bdef55
python-perf-debuginfo-2.6.32-358.73.1.el6.x86_64.rpm
    MD5: 901ebb4429cc1d5eab674a08b27e53e1SHA-256: ee71219e7594a03a0fbac73649dae5705651420e4553c802d27b64cbbdfa5903
 
(The unlinked packages above are only available from the Red Hat Network)

These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:

Leave a Reply