[Date Prev][Date Next]   [Thread Prev][Thread Next]   [Thread Index] [Date Index] [Author Index]

[RHBA-2002:110-09] Updated kernel with bugfixes available



---------------------------------------------------------------------
                   Red Hat, Inc. Red Hat Bug Fix Advisory

Synopsis:          Updated kernel with bugfixes available
Advisory ID:       RHBA-2002:110-09
Issue date:        2002-06-10
Updated on:        2002-06-20
Product:           Red Hat Linux
Keywords:          NFS xosview dac960
Cross references:  
Obsoletes:         RHBA-2002:085

---------------------------------------------------------------------

1. Topic:

An updated kernel that fixes several bugs is available for Red Hat Linux 7.3.
An interaction between grub and machines using the DAC960 driver has been
resolved.  The Pentium IV SMP PGE/pagetable bug has also been fixed.  In
addition, bugs in the NFS client code have been fixed.

2. Relevant releases/architectures:

Red Hat Linux 7.3 - athlon, i386, i586, i686

3. Problem description:

The NFS client in the Red Hat Linux 7.3 clients would negotiate a 32Kb
"window" when connecting to NetApp(tm) filers. This high value caused
several problems in practice.

There was an interaction between the grub bootloader and the Mylex
AcceleRAID/eXtremeRAID driver that caused the system to not find the root
filesystem if it resided on this controller.

Several other smaller bugs have been resolved as well.

4. Solution:

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

The procedure for upgrading the kernel manually is documented at:
http://www.redhat.com/support/docs/howto/kernel-upgrade/
Please read the directions for your architecture carefully before
proceeding with the kernel upgrade.

Please note that this update is also available via Red Hat Network. Many
people find this to be an easier way to apply updates. To use Red Hat
Network, launch the Red Hat Update Agent with the following command:

up2date

This will start an interactive process that will result in the appropriate
RPMs being upgraded on your system. Note that you need to select the kernel
explicitly on default configurations of up2date.

5. Bug IDs fixed (http://bugzilla.redhat.com/bugzilla for more info):

65110 - DRM modules were not built for i386 kernel
65149 - Highpoint proc info segfaults when using cat
65207 - Kernel panic: No init found, with DAC960 RAID controller
64921 - NFS version 3 hangs
65772 - close() hangs on file in NFS-mounted dir using
65069 - Copy 300k data crashed NetApp
64984 - Redhat 7.3: nfs writes very slow.
64838 - /proc/ksyms is truncated with cat, dd works
65176 - broken urandom (PATCH INCLUDED)
64825 - Interrupt counts are all 1000000000 too high
64959 - problem with airo.o and airo_cs.o wireless modules
66143 - System hang after 5-12 h IO stress - flushtlb problem?
65264 - iwconfig WEP key configuration fails 7.2 worked fine. Using airo
65182 - RFE: i586-up kernel missing from 2.4.18-4 errata

6. RPMs required:

Red Hat Linux 7.3:

SRPMS:
ftp://updates.redhat.com/7.3/en/os/SRPMS/kernel-2.4.18-5.src.rpm

athlon:
ftp://updates.redhat.com/7.3/en/os/athlon/kernel-2.4.18-5.athlon.rpm
ftp://updates.redhat.com/7.3/en/os/athlon/kernel-smp-2.4.18-5.athlon.rpm

i386:
ftp://updates.redhat.com/7.3/en/os/i386/kernel-2.4.18-5.i386.rpm
ftp://updates.redhat.com/7.3/en/os/i386/kernel-source-2.4.18-5.i386.rpm
ftp://updates.redhat.com/7.3/en/os/i386/kernel-doc-2.4.18-5.i386.rpm
ftp://updates.redhat.com/7.3/en/os/i386/kernel-BOOT-2.4.18-5.i386.rpm

i586:
ftp://updates.redhat.com/7.3/en/os/i586/kernel-2.4.18-5.i586.rpm
ftp://updates.redhat.com/7.3/en/os/i586/kernel-smp-2.4.18-5.i586.rpm

i686:
ftp://updates.redhat.com/7.3/en/os/i686/kernel-2.4.18-5.i686.rpm
ftp://updates.redhat.com/7.3/en/os/i686/kernel-smp-2.4.18-5.i686.rpm
ftp://updates.redhat.com/7.3/en/os/i686/kernel-bigmem-2.4.18-5.i686.rpm
ftp://updates.redhat.com/7.3/en/os/i686/kernel-debug-2.4.18-5.i686.rpm



7. Verification:

MD5 sum                          Package Name
--------------------------------------------------------------------------
5c7068b6c75fc80f820d78d9fe1303a6 7.3/en/os/SRPMS/kernel-2.4.18-5.src.rpm
bfce6428d872b82ec4a580448a742bb2 7.3/en/os/athlon/kernel-2.4.18-5.athlon.rpm
aff19e8dbdba54af1baaf142361b0d82 7.3/en/os/athlon/kernel-smp-2.4.18-5.athlon.rpm
bab86eef06fe6b26d18b642d9cb62c64 7.3/en/os/i386/kernel-2.4.18-5.i386.rpm
b71ad7e96f0cc8b5e975fb79603f5c0e 7.3/en/os/i386/kernel-BOOT-2.4.18-5.i386.rpm
e332107e7ed38df9979cc2e64c587b52 7.3/en/os/i386/kernel-doc-2.4.18-5.i386.rpm
cb786f574ded30fe01254059b0239c0c 7.3/en/os/i386/kernel-source-2.4.18-5.i386.rpm
c176bde08b227c16a5c2bb5b08f8895b 7.3/en/os/i586/kernel-2.4.18-5.i586.rpm
bcb1cbdb822b0217307194151bb589e9 7.3/en/os/i586/kernel-smp-2.4.18-5.i586.rpm
4fba5e2c4d48a502dd0bc73ebc264d04 7.3/en/os/i686/kernel-2.4.18-5.i686.rpm
d588cbb93295e1b091f885d09e330d70 7.3/en/os/i686/kernel-bigmem-2.4.18-5.i686.rpm
6226daa6ab6de0e49b27a04e3deb51be 7.3/en/os/i686/kernel-debug-2.4.18-5.i686.rpm
5c48a75003c0cba4f49c20bdd9fbb737 7.3/en/os/i686/kernel-smp-2.4.18-5.i686.rpm
 

These packages are GPG signed by Red Hat, Inc. for security.  Our key
is available at:
    http://www.redhat.com/about/contact/pgpkey.html

You can verify each package with the following command:
    rpm --checksig  <filename>

If you only wish to verify that each package has not been corrupted or
tampered with, examine only the md5sum with the following command:
    rpm --checksig --nogpg <filename>

8. References:





Copyright(c) 2000, 2001, 2002 Red Hat, Inc.



_______________________________________________
Redhat-watch-list mailing list
To unsubscribe, visit: https://listman.redhat.com/mailman/listinfo/redhat-watch-list





[Date Prev][Date Next]   [Thread Prev][Thread Next]   [Thread Index] [Date Index] [Author Index]