[Date Prev][Date Next]   [Thread Prev][Thread Next]   [Thread Index] [Date Index] [Author Index]

[RHBA-2002:104-06] Several bugs fixed in new kernel



---------------------------------------------------------------------
                   Red Hat, Inc. Red Hat Bug Fix Advisory

Synopsis:          Several bugs fixed in new kernel
Advisory ID:       RHBA-2002:104-06
Issue date:        2002-05-30
Updated on:        2002-06-04
Product:           Red Hat Linux
Keywords:          CIPE P4 PGE eicon reboot=bios wbinv sym53c8xx_2 IA-64
Cross references:  
Obsoletes:         RHSA-2002:028-13

---------------------------------------------------------------------

1. Topic:

Multiple kernel bugs were fixed, including generic kernel bugs,
x86-specific bugs, and IA-64-specific bugs.

2. Relevant releases/architectures:

Red Hat Linux 7.1 - athlon, i386, i586, i686, ia64

Red Hat Linux 7.1k - athlon, i386, i586, i686, ia64

Red Hat Linux 7.2 - athlon, i386, i586, i686, ia64

3. Problem description:

reboot=bios did not always work because of a bug that has been fixed
(#64394)

Linux's use of Page Global Extension (PGE) was not correct for P4
processors; this showed up as a very rare bug, and it has been
fixed by disabling PGE for these CPUs in this release.

NAT over CIPE has been enabled.

The eicon ISDN driver has been enabled.

The sym53c8xx_2 driver was added as a workaround for a platform
incompatibility issue on some configurations of the HP x4000

Cases where touching some swap would slow the system down
disproportionately have been fixed by using greedy swap
reclamation.  (#60079)

A variety of IA-64-specific bugs were fixed:
 #63952, #62982, #52341, #64492, #65011, #65010

4. Solution:

The procedure for upgrading the kernel manually is documented at:
http://www.redhat.com/support/docs/howto/kernel-upgrade/
Please read the directions for your architecture carefully before
proceeding with the kernel upgrade.

Please note that this update is also available via Red Hat Network. Many
people find this to be an easier way to apply updates. To use Red Hat
Network, launch the Red Hat Update Agent with the following command:

up2date

This will start an interactive process that will result in the appropriate
RPMs being upgraded on your system. Note that you need to select the kernel
explicitly on default configurations of up2date.

5. Bug IDs fixed (http://bugzilla.redhat.com/bugzilla for more info):

63952 - RTEs not programmed correctly during boot
62982 - clone2() call not allocating 16 byte scratch stack area
52341 - Single processor Big Sur aborts during 7.2 release candidate boot
64492 - Red Hat 7.2 with kernel 2.4.9-18 does not reset after an MCA
65011 - Fix for IA32 GDT initialization
65010 - Fix for sys32_munmap page alignment
64394 - Unreliable reboots with "reboot=bios" option.
60079 - touching swap causes strange paging behavior afterwards

6. RPMs required:

Red Hat Linux 7.1:

SRPMS:
ftp://updates.redhat.com/7.1/en/os/SRPMS/kernel-2.4.9-34.src.rpm

athlon:
ftp://updates.redhat.com/7.1/en/os/athlon/kernel-2.4.9-34.athlon.rpm
ftp://updates.redhat.com/7.1/en/os/athlon/kernel-smp-2.4.9-34.athlon.rpm

i386:
ftp://updates.redhat.com/7.1/en/os/i386/kernel-2.4.9-34.i386.rpm
ftp://updates.redhat.com/7.1/en/os/i386/kernel-BOOT-2.4.9-34.i386.rpm
ftp://updates.redhat.com/7.1/en/os/i386/kernel-source-2.4.9-34.i386.rpm
ftp://updates.redhat.com/7.1/en/os/i386/kernel-headers-2.4.9-34.i386.rpm
ftp://updates.redhat.com/7.1/en/os/i386/kernel-doc-2.4.9-34.i386.rpm

i586:
ftp://updates.redhat.com/7.1/en/os/i586/kernel-2.4.9-34.i586.rpm
ftp://updates.redhat.com/7.1/en/os/i586/kernel-smp-2.4.9-34.i586.rpm

i686:
ftp://updates.redhat.com/7.1/en/os/i686/kernel-2.4.9-34.i686.rpm
ftp://updates.redhat.com/7.1/en/os/i686/kernel-smp-2.4.9-34.i686.rpm
ftp://updates.redhat.com/7.1/en/os/i686/kernel-enterprise-2.4.9-34.i686.rpm
ftp://updates.redhat.com/7.1/en/os/i686/kernel-debug-2.4.9-34.i686.rpm

ia64:
ftp://updates.redhat.com/7.1/en/os/ia64/kernel-2.4.9-34.ia64.rpm
ftp://updates.redhat.com/7.1/en/os/ia64/kernel-smp-2.4.9-34.ia64.rpm
ftp://updates.redhat.com/7.1/en/os/ia64/kernel-source-2.4.9-34.ia64.rpm
ftp://updates.redhat.com/7.1/en/os/ia64/kernel-headers-2.4.9-34.ia64.rpm
ftp://updates.redhat.com/7.1/en/os/ia64/kernel-doc-2.4.9-34.ia64.rpm

Red Hat Linux 7.2:

SRPMS:
ftp://updates.redhat.com/7.2/en/os/SRPMS/kernel-2.4.9-34.src.rpm

athlon:
ftp://updates.redhat.com/7.2/en/os/athlon/kernel-2.4.9-34.athlon.rpm
ftp://updates.redhat.com/7.2/en/os/athlon/kernel-smp-2.4.9-34.athlon.rpm

i386:
ftp://updates.redhat.com/7.2/en/os/i386/kernel-2.4.9-34.i386.rpm
ftp://updates.redhat.com/7.2/en/os/i386/kernel-BOOT-2.4.9-34.i386.rpm
ftp://updates.redhat.com/7.2/en/os/i386/kernel-source-2.4.9-34.i386.rpm
ftp://updates.redhat.com/7.2/en/os/i386/kernel-headers-2.4.9-34.i386.rpm
ftp://updates.redhat.com/7.2/en/os/i386/kernel-doc-2.4.9-34.i386.rpm

i586:
ftp://updates.redhat.com/7.2/en/os/i586/kernel-2.4.9-34.i586.rpm
ftp://updates.redhat.com/7.2/en/os/i586/kernel-smp-2.4.9-34.i586.rpm

i686:
ftp://updates.redhat.com/7.2/en/os/i686/kernel-2.4.9-34.i686.rpm
ftp://updates.redhat.com/7.2/en/os/i686/kernel-smp-2.4.9-34.i686.rpm
ftp://updates.redhat.com/7.2/en/os/i686/kernel-enterprise-2.4.9-34.i686.rpm
ftp://updates.redhat.com/7.2/en/os/i686/kernel-debug-2.4.9-34.i686.rpm

ia64:
ftp://updates.redhat.com/7.2/en/os/ia64/kernel-2.4.9-34.ia64.rpm
ftp://updates.redhat.com/7.2/en/os/ia64/kernel-smp-2.4.9-34.ia64.rpm
ftp://updates.redhat.com/7.2/en/os/ia64/kernel-source-2.4.9-34.ia64.rpm
ftp://updates.redhat.com/7.2/en/os/ia64/kernel-headers-2.4.9-34.ia64.rpm
ftp://updates.redhat.com/7.2/en/os/ia64/kernel-doc-2.4.9-34.ia64.rpm



7. Verification:

MD5 sum                          Package Name
--------------------------------------------------------------------------
80888ec7bd03077f8b395bb2cda02f0c 7.1/en/os/SRPMS/kernel-2.4.9-34.src.rpm
517135869cba965c286de8f25b1d7fd0 7.1/en/os/athlon/kernel-2.4.9-34.athlon.rpm
051a97d625efe9391bb476788ba9442a 7.1/en/os/athlon/kernel-smp-2.4.9-34.athlon.rpm
a9d5354d684d26e8e9ec6f578503b749 7.1/en/os/i386/kernel-2.4.9-34.i386.rpm
f653406a2f94a1639e2cae5126f744f9 7.1/en/os/i386/kernel-BOOT-2.4.9-34.i386.rpm
e4a2ffabf3b4f4b1bd640a48308191d6 7.1/en/os/i386/kernel-doc-2.4.9-34.i386.rpm
e4420d3dd6d778b38051067af3298108 7.1/en/os/i386/kernel-headers-2.4.9-34.i386.rpm
5ff7762b891e61bae7138ef89373d842 7.1/en/os/i386/kernel-source-2.4.9-34.i386.rpm
a28856b2a5ceac75dc219f08a55d4b74 7.1/en/os/i586/kernel-2.4.9-34.i586.rpm
392d00421b2948356f8acc758cb9d9e4 7.1/en/os/i586/kernel-smp-2.4.9-34.i586.rpm
88a2b7cf794d2a61ba31ef3102af3711 7.1/en/os/i686/kernel-2.4.9-34.i686.rpm
96d8bf6f345d9a0f990e161222b037db 7.1/en/os/i686/kernel-debug-2.4.9-34.i686.rpm
7d4beb7de82bd3e1728a2496d5c2d063 7.1/en/os/i686/kernel-enterprise-2.4.9-34.i686.rpm
3472800df3576e939af8767ef82804fe 7.1/en/os/i686/kernel-smp-2.4.9-34.i686.rpm
8c420f3ca2135d1c99a684ef66a18263 7.1/en/os/ia64/kernel-2.4.9-34.ia64.rpm
a411567f8f117d8642a2cfec84fd0fb6 7.1/en/os/ia64/kernel-doc-2.4.9-34.ia64.rpm
bf1aff2696b3884016bc765f3bd6440c 7.1/en/os/ia64/kernel-headers-2.4.9-34.ia64.rpm
394d6cabc922f104322cec63d9f00d4d 7.1/en/os/ia64/kernel-smp-2.4.9-34.ia64.rpm
242d5dacc2608d5dcaf170db7b350ef8 7.1/en/os/ia64/kernel-source-2.4.9-34.ia64.rpm
80888ec7bd03077f8b395bb2cda02f0c 7.2/en/os/SRPMS/kernel-2.4.9-34.src.rpm
517135869cba965c286de8f25b1d7fd0 7.2/en/os/athlon/kernel-2.4.9-34.athlon.rpm
051a97d625efe9391bb476788ba9442a 7.2/en/os/athlon/kernel-smp-2.4.9-34.athlon.rpm
a9d5354d684d26e8e9ec6f578503b749 7.2/en/os/i386/kernel-2.4.9-34.i386.rpm
f653406a2f94a1639e2cae5126f744f9 7.2/en/os/i386/kernel-BOOT-2.4.9-34.i386.rpm
e4a2ffabf3b4f4b1bd640a48308191d6 7.2/en/os/i386/kernel-doc-2.4.9-34.i386.rpm
e4420d3dd6d778b38051067af3298108 7.2/en/os/i386/kernel-headers-2.4.9-34.i386.rpm
5ff7762b891e61bae7138ef89373d842 7.2/en/os/i386/kernel-source-2.4.9-34.i386.rpm
a28856b2a5ceac75dc219f08a55d4b74 7.2/en/os/i586/kernel-2.4.9-34.i586.rpm
392d00421b2948356f8acc758cb9d9e4 7.2/en/os/i586/kernel-smp-2.4.9-34.i586.rpm
88a2b7cf794d2a61ba31ef3102af3711 7.2/en/os/i686/kernel-2.4.9-34.i686.rpm
96d8bf6f345d9a0f990e161222b037db 7.2/en/os/i686/kernel-debug-2.4.9-34.i686.rpm
7d4beb7de82bd3e1728a2496d5c2d063 7.2/en/os/i686/kernel-enterprise-2.4.9-34.i686.rpm
3472800df3576e939af8767ef82804fe 7.2/en/os/i686/kernel-smp-2.4.9-34.i686.rpm
8c420f3ca2135d1c99a684ef66a18263 7.2/en/os/ia64/kernel-2.4.9-34.ia64.rpm
a411567f8f117d8642a2cfec84fd0fb6 7.2/en/os/ia64/kernel-doc-2.4.9-34.ia64.rpm
bf1aff2696b3884016bc765f3bd6440c 7.2/en/os/ia64/kernel-headers-2.4.9-34.ia64.rpm
394d6cabc922f104322cec63d9f00d4d 7.2/en/os/ia64/kernel-smp-2.4.9-34.ia64.rpm
242d5dacc2608d5dcaf170db7b350ef8 7.2/en/os/ia64/kernel-source-2.4.9-34.ia64.rpm
 

These packages are GPG signed by Red Hat, Inc. for security.  Our key
is available at:
    http://www.redhat.com/about/contact/pgpkey.html

You can verify each package with the following command:
    rpm --checksig  <filename>

If you only wish to verify that each package has not been corrupted or
tampered with, examine only the md5sum with the following command:
    rpm --checksig --nogpg <filename>

8. References:





Copyright(c) 2000, 2001, 2002 Red Hat, Inc.





[Date Prev][Date Next]   [Thread Prev][Thread Next]   [Thread Index] [Date Index] [Author Index]