Bug 216432 - devel/linux-c7-devtools: update kernel-headers to 3.10.0-514.2.2.el7
Summary: devel/linux-c7-devtools: update kernel-headers to 3.10.0-514.2.2.el7
Status: Closed FIXED
Alias: None
Product: Ports & Packages
Classification: Unclassified
Component: Individual Port(s) (show other bugs)
Version: Latest
Hardware: Any Any
: --- Affects Only Me
Assignee: Tijl Coosemans
URL:
Keywords:
Depends on:
Blocks:
 
Reported: 2017-01-24 13:41 UTC by Piotr Kubaj
Modified: 2017-01-24 14:54 UTC (History)
0 users

See Also:
bugzilla: maintainer-feedback? (emulation)


Attachments
patch (3.26 KB, patch)
2017-01-24 13:41 UTC, Piotr Kubaj
no flags Details | Diff

Note You need to log in before you can comment on or make changes to this bug.
Description Piotr Kubaj freebsd_committer freebsd_triage 2017-01-24 13:41:38 UTC
Created attachment 179274 [details]
patch

This patch updates kernel-headers to 3.10.0-514.2.2.el7.

The port builds fine on Poudriere on 10.3.
Changelog:
These updated kernel packages include numerous bug fixes and enhancements, some
of which you can see below. Space precludes documenting all of these bug fixes
and enhancements in this advisory. To see the complete list of bug fixes and
enhancements, users are directed to the related Knowledge Article:
https://access.redhat.com/articles/2780461

This update also fixes the following bugs:

* Previously, using a floating IP address inside a network namespace in some
cases failed with the following error message: "bind: Cannot assign requested
address". With this update, the kernel respects setting of the
net.ipv4.ip_nonlocal_bind parameter to 1 in namespaces, and the floating IP
address is now assigned as expected. (BZ#1388591)

* In the OpenStack Platform (OSP) environment with multiple guests on the same
network, "no route to host" errors occurred when attempting to ping all the
guests from a single virtual machine. With this update, the deffering policy of
the Open vSwitch data path has been fixed, and the described error no longer
occurs. (BZ#1388592)

* Red Hat Enterprise Linux in some cases failed to boot on platforms due to High
Performance Event Timer (HPET) clock access contention. On systems with a Time
Stamp Counter (TSC) clock and an HPET, the HPET is used to calibrate the TSC. On
some large CPU count systems, this in some cases led to access contention on
HPET, which caused a system lockup followed by Nonmaskable Interrupt (NMI)
softlockup watchdog. This update reduces HPET counter read contention, thus
fixing this bug. As a result, Red Hat Enterprise Linux now boots as expected on
affected platforms. (BZ#1388597)

* Previously, when two NFS shares with different security settings were mounted,
the I/O operations to the kerberos-authenticated mount caused the
RPC_CRED_KEY_EXPIRE_SOON parameter to be set, but the parameter was not unset
when performing the I/O operations on the sec=sys mount. Consequently, writes to
both NFS shares had the same parameters, regardless of their security settings.
This update fixes this problem by moving the NO_CRKEY_TIMEOUT parameter to the
auth->au_flags field. As a result, NFS shares with different security settings
are now handled as expected. (BZ#1388604)

* Due to an incorrect value in the virtual time base (VTB) register, the kernel
of an IBM POWER8 KVM guest in some cases incorrectly detected a soft lockup
condition, logged a call trace, and reported the following error: "NMI watchdog:
BUG: soft lockup - CPU#x stuck for XXs". This update applies a set of patches to
fix these problems. As a result, the soft lockups and error messages no longer
occur in the described situation. (BZ#1388997)

* Previously, a packet loss occurred on transmit when Red Hat Enterprise Linux
had complex network configuration and was running as a guest on a Xen
hypervisor. An upstream patch has been backported that fix the xen-netfront
driver to avoid packet loss when ethernet header crosses page boundary. As a
result, the packet loss no longer occurs in the described scenario. (BZ#1390257)

* After migration to Red Hat Enterprise Linux 7.3, the Unified Extensible
Firmware Interface (UEFI) boot failed due to a bug that prevented the kernel
from booting through the PE/COFF image entry, which is used by the Extensible
Firmware Interface (EFI) ipxe boot loader. This update fixes the alignment
parameter on the call to the efi_low_alloc() function, and the kernel now boots
as expected. (BZ#1392044)
Comment 1 commit-hook freebsd_committer freebsd_triage 2017-01-24 14:51:22 UTC
A commit references this bug:

Author: tijl
Date: Tue Jan 24 14:50:43 UTC 2017
New revision: 432343
URL: https://svnweb.freebsd.org/changeset/ports/432343

Log:
  Update kernel-headers to 3.10.0-514.6.1.el7.

  PR:		216432
  Submitted by:	Piotr Kubaj <pkubaj@anongoth.pl>

Changes:
  head/devel/linux-c7-devtools/Makefile
  head/devel/linux-c7-devtools/distinfo.x86_64