From owner-freebsd-emulation@freebsd.org Tue Jan 24 13:41:38 2017 Return-Path: Delivered-To: freebsd-emulation@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id E8827CC050B for ; Tue, 24 Jan 2017 13:41:38 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from mailman.ysv.freebsd.org (mailman.ysv.freebsd.org [IPv6:2001:1900:2254:206a::50:5]) by mx1.freebsd.org (Postfix) with ESMTP id D2130101 for ; Tue, 24 Jan 2017 13:41:38 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: by mailman.ysv.freebsd.org (Postfix) id CE6F6CC050A; Tue, 24 Jan 2017 13:41:38 +0000 (UTC) Delivered-To: emulation@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id CE0DDCC0509 for ; Tue, 24 Jan 2017 13:41:38 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from kenobi.freebsd.org (kenobi.freebsd.org [IPv6:2001:1900:2254:206a::16:76]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id BE08F100 for ; Tue, 24 Jan 2017 13:41:38 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from bugs.freebsd.org ([127.0.1.118]) by kenobi.freebsd.org (8.15.2/8.15.2) with ESMTP id v0ODfcLh043419 for ; Tue, 24 Jan 2017 13:41:38 GMT (envelope-from bugzilla-noreply@freebsd.org) Content-Transfer-Encoding: quoted-printable Content-Type: text/plain; charset="UTF-8" From: bugzilla-noreply@freebsd.org To: emulation@FreeBSD.org Subject: maintainer-feedback requested: [Bug 216432] devel/linux-c7-devtools: update kernel-headers to 3.10.0-514.2.2.el7 Date: Tue, 24 Jan 2017 13:41:38 +0000 X-Bugzilla-Type: request X-Bugzilla-Product: Ports & Packages X-Bugzilla-Component: Individual Port(s) X-Bugzilla-Version: Latest X-Bugzilla-Keywords: X-Bugzilla-Severity: Affects Only Me X-Bugzilla-Who: X-Bugzilla-Status: New X-Bugzilla-Resolution: X-Bugzilla-Priority: --- X-Bugzilla-Assigned-To: emulation@FreeBSD.org X-Bugzilla-Flags: maintainer-feedback? Message-ID: In-Reply-To: References: X-Bugzilla-URL: https://bugs.freebsd.org/bugzilla/ Auto-Submitted: auto-generated MIME-Version: 1.0 X-BeenThere: freebsd-emulation@freebsd.org X-Mailman-Version: 2.1.23 Precedence: list List-Id: Development of Emulators of other operating systems List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 24 Jan 2017 13:41:39 -0000 Piotr Kubaj has reassigned Bugzilla Automation 's request for maintainer-feedback to emulation@FreeBSD.org: Bug 216432: devel/linux-c7-devtools: update kernel-headers to 3.10.0-514.2.2.el7 https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D216432 --- Description --- Created attachment 179274 --> https://bugs.freebsd.org/bugzilla/attachment.cgi?id=3D179274&action= =3Dedit patch This patch updates kernel-headers to 3.10.0-514.2.2.el7. The port builds fine on Poudriere on 10.3. Changelog: These updated kernel packages include numerous bug fixes and enhancements, = some of which you can see below. Space precludes documenting all of these bug fi= xes and enhancements in this advisory. To see the complete list of bug fixes and enhancements, users are directed to the related Knowledge Article: https://access.redhat.com/articles/2780461 This update also fixes the following bugs: * Previously, using a floating IP address inside a network namespace in some cases failed with the following error message: "bind: Cannot assign request= ed address". With this update, the kernel respects setting of the net.ipv4.ip_nonlocal_bind parameter to 1 in namespaces, and the floating IP address is now assigned as expected. (BZ#1388591) * In the OpenStack Platform (OSP) environment with multiple guests on the s= ame network, "no route to host" errors occurred when attempting to ping all the guests from a single virtual machine. With this update, the deffering polic= y of the Open vSwitch data path has been fixed, and the described error no longer occurs. (BZ#1388592) * Red Hat Enterprise Linux in some cases failed to boot on platforms due to High Performance Event Timer (HPET) clock access contention. On systems with a T= ime Stamp Counter (TSC) clock and an HPET, the HPET is used to calibrate the TS= C. On some large CPU count systems, this in some cases led to access contention on HPET, which caused a system lockup followed by Nonmaskable Interrupt (NMI) softlockup watchdog. This update reduces HPET counter read contention, thus fixing this bug. As a result, Red Hat Enterprise Linux now boots as expecte= d on affected platforms. (BZ#1388597) * Previously, when two NFS shares with different security settings were mounted, the I/O operations to the kerberos-authenticated mount caused the RPC_CRED_KEY_EXPIRE_SOON parameter to be set, but the parameter was not uns= et when performing the I/O operations on the sec=3Dsys mount. Consequently, wr= ites to both NFS shares had the same parameters, regardless of their security setti= ngs. This update fixes this problem by moving the NO_CRKEY_TIMEOUT parameter to = the auth->au_flags field. As a result, NFS shares with different security setti= ngs are now handled as expected. (BZ#1388604) * Due to an incorrect value in the virtual time base (VTB) register, the ke= rnel of an IBM POWER8 KVM guest in some cases incorrectly detected a soft lockup condition, logged a call trace, and reported the following error: "NMI watchdog: BUG: soft lockup - CPU#x stuck for XXs". This update applies a set of patch= es to fix these problems. As a result, the soft lockups and error messages no lon= ger occur in the described situation. (BZ#1388997) * Previously, a packet loss occurred on transmit when Red Hat Enterprise Li= nux had complex network configuration and was running as a guest on a Xen hypervisor. An upstream patch has been backported that fix the xen-netfront driver to avoid packet loss when ethernet header crosses page boundary. As a result, the packet loss no longer occurs in the described scenario. (BZ#1390257) * After migration to Red Hat Enterprise Linux 7.3, the Unified Extensible Firmware Interface (UEFI) boot failed due to a bug that prevented the kernel from booting through the PE/COFF image entry, which is used by the Extensib= le Firmware Interface (EFI) ipxe boot loader. This update fixes the alignment parameter on the call to the efi_low_alloc() function, and the kernel now b= oots as expected. (BZ#1392044)