Skip site navigation (1)Skip section navigation (2)
Date:      Tue, 24 Jan 2017 13:41:38 +0000
From:      bugzilla-noreply@freebsd.org
To:        freebsd-ports-bugs@FreeBSD.org
Subject:   [Bug 216432] devel/linux-c7-devtools: update kernel-headers to 3.10.0-514.2.2.el7
Message-ID:  <bug-216432-13@https.bugs.freebsd.org/bugzilla/>

next in thread | raw e-mail | index | archive | help
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D216432

            Bug ID: 216432
           Summary: devel/linux-c7-devtools: update kernel-headers to
                    3.10.0-514.2.2.el7
           Product: Ports & Packages
           Version: Latest
          Hardware: Any
                OS: Any
            Status: New
          Severity: Affects Only Me
          Priority: ---
         Component: Individual Port(s)
          Assignee: emulation@FreeBSD.org
          Reporter: pkubaj@anongoth.pl
          Assignee: emulation@FreeBSD.org
             Flags: maintainer-feedback?(emulation@FreeBSD.org)

Created attachment 179274
  --> https://bugs.freebsd.org/bugzilla/attachment.cgi?id=3D179274&action=
=3Dedit
patch

This patch updates kernel-headers to 3.10.0-514.2.2.el7.

The port builds fine on Poudriere on 10.3.
Changelog:
These updated kernel packages include numerous bug fixes and enhancements, =
some
of which you can see below. Space precludes documenting all of these bug fi=
xes
and enhancements in this advisory. To see the complete list of bug fixes and
enhancements, users are directed to the related Knowledge Article:
https://access.redhat.com/articles/2780461

This update also fixes the following bugs:

* Previously, using a floating IP address inside a network namespace in some
cases failed with the following error message: "bind: Cannot assign request=
ed
address". With this update, the kernel respects setting of the
net.ipv4.ip_nonlocal_bind parameter to 1 in namespaces, and the floating IP
address is now assigned as expected. (BZ#1388591)

* In the OpenStack Platform (OSP) environment with multiple guests on the s=
ame
network, "no route to host" errors occurred when attempting to ping all the
guests from a single virtual machine. With this update, the deffering polic=
y of
the Open vSwitch data path has been fixed, and the described error no longer
occurs. (BZ#1388592)

* Red Hat Enterprise Linux in some cases failed to boot on platforms due to
High
Performance Event Timer (HPET) clock access contention. On systems with a T=
ime
Stamp Counter (TSC) clock and an HPET, the HPET is used to calibrate the TS=
C.
On
some large CPU count systems, this in some cases led to access contention on
HPET, which caused a system lockup followed by Nonmaskable Interrupt (NMI)
softlockup watchdog. This update reduces HPET counter read contention, thus
fixing this bug. As a result, Red Hat Enterprise Linux now boots as expecte=
d on
affected platforms. (BZ#1388597)

* Previously, when two NFS shares with different security settings were
mounted,
the I/O operations to the kerberos-authenticated mount caused the
RPC_CRED_KEY_EXPIRE_SOON parameter to be set, but the parameter was not uns=
et
when performing the I/O operations on the sec=3Dsys mount. Consequently, wr=
ites
to
both NFS shares had the same parameters, regardless of their security setti=
ngs.
This update fixes this problem by moving the NO_CRKEY_TIMEOUT parameter to =
the
auth->au_flags field. As a result, NFS shares with different security setti=
ngs
are now handled as expected. (BZ#1388604)

* Due to an incorrect value in the virtual time base (VTB) register, the ke=
rnel
of an IBM POWER8 KVM guest in some cases incorrectly detected a soft lockup
condition, logged a call trace, and reported the following error: "NMI
watchdog:
BUG: soft lockup - CPU#x stuck for XXs". This update applies a set of patch=
es
to
fix these problems. As a result, the soft lockups and error messages no lon=
ger
occur in the described situation. (BZ#1388997)

* Previously, a packet loss occurred on transmit when Red Hat Enterprise Li=
nux
had complex network configuration and was running as a guest on a Xen
hypervisor. An upstream patch has been backported that fix the xen-netfront
driver to avoid packet loss when ethernet header crosses page boundary. As a
result, the packet loss no longer occurs in the described scenario.
(BZ#1390257)

* After migration to Red Hat Enterprise Linux 7.3, the Unified Extensible
Firmware Interface (UEFI) boot failed due to a bug that prevented the kernel
from booting through the PE/COFF image entry, which is used by the Extensib=
le
Firmware Interface (EFI) ipxe boot loader. This update fixes the alignment
parameter on the call to the efi_low_alloc() function, and the kernel now b=
oots
as expected. (BZ#1392044)

--=20
You are receiving this mail because:
You are the assignee for the bug.=



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?bug-216432-13>