Date: Tue, 24 Jan 2017 13:41:38 +0000 From: bugzilla-noreply@freebsd.org To: freebsd-ports-bugs@FreeBSD.org Subject: [Bug 216432] devel/linux-c7-devtools: update kernel-headers to 3.10.0-514.2.2.el7 Message-ID: <bug-216432-13@https.bugs.freebsd.org/bugzilla/>
next in thread | raw e-mail | index | archive | help
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D216432 Bug ID: 216432 Summary: devel/linux-c7-devtools: update kernel-headers to 3.10.0-514.2.2.el7 Product: Ports & Packages Version: Latest Hardware: Any OS: Any Status: New Severity: Affects Only Me Priority: --- Component: Individual Port(s) Assignee: emulation@FreeBSD.org Reporter: pkubaj@anongoth.pl Assignee: emulation@FreeBSD.org Flags: maintainer-feedback?(emulation@FreeBSD.org) Created attachment 179274 --> https://bugs.freebsd.org/bugzilla/attachment.cgi?id=3D179274&action= =3Dedit patch This patch updates kernel-headers to 3.10.0-514.2.2.el7. The port builds fine on Poudriere on 10.3. Changelog: These updated kernel packages include numerous bug fixes and enhancements, = some of which you can see below. Space precludes documenting all of these bug fi= xes and enhancements in this advisory. To see the complete list of bug fixes and enhancements, users are directed to the related Knowledge Article: https://access.redhat.com/articles/2780461 This update also fixes the following bugs: * Previously, using a floating IP address inside a network namespace in some cases failed with the following error message: "bind: Cannot assign request= ed address". With this update, the kernel respects setting of the net.ipv4.ip_nonlocal_bind parameter to 1 in namespaces, and the floating IP address is now assigned as expected. (BZ#1388591) * In the OpenStack Platform (OSP) environment with multiple guests on the s= ame network, "no route to host" errors occurred when attempting to ping all the guests from a single virtual machine. With this update, the deffering polic= y of the Open vSwitch data path has been fixed, and the described error no longer occurs. (BZ#1388592) * Red Hat Enterprise Linux in some cases failed to boot on platforms due to High Performance Event Timer (HPET) clock access contention. On systems with a T= ime Stamp Counter (TSC) clock and an HPET, the HPET is used to calibrate the TS= C. On some large CPU count systems, this in some cases led to access contention on HPET, which caused a system lockup followed by Nonmaskable Interrupt (NMI) softlockup watchdog. This update reduces HPET counter read contention, thus fixing this bug. As a result, Red Hat Enterprise Linux now boots as expecte= d on affected platforms. (BZ#1388597) * Previously, when two NFS shares with different security settings were mounted, the I/O operations to the kerberos-authenticated mount caused the RPC_CRED_KEY_EXPIRE_SOON parameter to be set, but the parameter was not uns= et when performing the I/O operations on the sec=3Dsys mount. Consequently, wr= ites to both NFS shares had the same parameters, regardless of their security setti= ngs. This update fixes this problem by moving the NO_CRKEY_TIMEOUT parameter to = the auth->au_flags field. As a result, NFS shares with different security setti= ngs are now handled as expected. (BZ#1388604) * Due to an incorrect value in the virtual time base (VTB) register, the ke= rnel of an IBM POWER8 KVM guest in some cases incorrectly detected a soft lockup condition, logged a call trace, and reported the following error: "NMI watchdog: BUG: soft lockup - CPU#x stuck for XXs". This update applies a set of patch= es to fix these problems. As a result, the soft lockups and error messages no lon= ger occur in the described situation. (BZ#1388997) * Previously, a packet loss occurred on transmit when Red Hat Enterprise Li= nux had complex network configuration and was running as a guest on a Xen hypervisor. An upstream patch has been backported that fix the xen-netfront driver to avoid packet loss when ethernet header crosses page boundary. As a result, the packet loss no longer occurs in the described scenario. (BZ#1390257) * After migration to Red Hat Enterprise Linux 7.3, the Unified Extensible Firmware Interface (UEFI) boot failed due to a bug that prevented the kernel from booting through the PE/COFF image entry, which is used by the Extensib= le Firmware Interface (EFI) ipxe boot loader. This update fixes the alignment parameter on the call to the efi_low_alloc() function, and the kernel now b= oots as expected. (BZ#1392044) --=20 You are receiving this mail because: You are the assignee for the bug.=
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?bug-216432-13>