--------------------------------------------------------------------- Red Hat, Inc. Red Hat Bug Fix Advisory Synopsis: Updated kernel with bugfixes available Advisory ID: RHBA-2002:110-09 Issue date: 2002-06-10 Updated on: 2002-06-20 Product: Red Hat Linux Keywords: NFS xosview dac960 Cross references: Obsoletes: RHBA-2002:085 --------------------------------------------------------------------- 1. Topic: An updated kernel that fixes several bugs is available for Red Hat Linux 7.3. An interaction between grub and machines using the DAC960 driver has been resolved. The Pentium IV SMP PGE/pagetable bug has also been fixed. In addition, bugs in the NFS client code have been fixed. 2. Relevant releases/architectures: Red Hat Linux 7.3 - athlon, i386, i586, i686 3. Problem description: The NFS client in the Red Hat Linux 7.3 clients would negotiate a 32Kb "window" when connecting to NetApp(tm) filers. This high value caused several problems in practice. There was an interaction between the grub bootloader and the Mylex AcceleRAID/eXtremeRAID driver that caused the system to not find the root filesystem if it resided on this controller. Several other smaller bugs have been resolved as well. 4. Solution: Before applying this update, make sure all previously released errata relevant to your system have been applied. The procedure for upgrading the kernel manually is documented at: http://www.redhat.com/support/docs/howto/kernel-upgrade/ Please read the directions for your architecture carefully before proceeding with the kernel upgrade. Please note that this update is also available via Red Hat Network. Many people find this to be an easier way to apply updates. To use Red Hat Network, launch the Red Hat Update Agent with the following command: up2date This will start an interactive process that will result in the appropriate RPMs being upgraded on your system. Note that you need to select the kernel explicitly on default configurations of up2date. 5. Bug IDs fixed (http://bugzilla.redhat.com/bugzilla for more info): 65110 - DRM modules were not built for i386 kernel 65149 - Highpoint proc info segfaults when using cat 65207 - Kernel panic: No init found, with DAC960 RAID controller 64921 - NFS version 3 hangs 65772 - close() hangs on file in NFS-mounted dir using 65069 - Copy 300k data crashed NetApp 64984 - Redhat 7.3: nfs writes very slow. 64838 - /proc/ksyms is truncated with cat, dd works 65176 - broken urandom (PATCH INCLUDED) 64825 - Interrupt counts are all 1000000000 too high 64959 - problem with airo.o and airo_cs.o wireless modules 66143 - System hang after 5-12 h IO stress - flushtlb problem? 65264 - iwconfig WEP key configuration fails 7.2 worked fine. Using airo 65182 - RFE: i586-up kernel missing from 2.4.18-4 errata 6. RPMs required: Red Hat Linux 7.3: SRPMS: ftp://updates.redhat.com/7.3/en/os/SRPMS/kernel-2.4.18-5.src.rpm athlon: ftp://updates.redhat.com/7.3/en/os/athlon/kernel-2.4.18-5.athlon.rpm ftp://updates.redhat.com/7.3/en/os/athlon/kernel-smp-2.4.18-5.athlon.rpm i386: ftp://updates.redhat.com/7.3/en/os/i386/kernel-2.4.18-5.i386.rpm ftp://updates.redhat.com/7.3/en/os/i386/kernel-source-2.4.18-5.i386.rpm ftp://updates.redhat.com/7.3/en/os/i386/kernel-doc-2.4.18-5.i386.rpm ftp://updates.redhat.com/7.3/en/os/i386/kernel-BOOT-2.4.18-5.i386.rpm i586: ftp://updates.redhat.com/7.3/en/os/i586/kernel-2.4.18-5.i586.rpm ftp://updates.redhat.com/7.3/en/os/i586/kernel-smp-2.4.18-5.i586.rpm i686: ftp://updates.redhat.com/7.3/en/os/i686/kernel-2.4.18-5.i686.rpm ftp://updates.redhat.com/7.3/en/os/i686/kernel-smp-2.4.18-5.i686.rpm ftp://updates.redhat.com/7.3/en/os/i686/kernel-bigmem-2.4.18-5.i686.rpm ftp://updates.redhat.com/7.3/en/os/i686/kernel-debug-2.4.18-5.i686.rpm 7. Verification: MD5 sum Package Name -------------------------------------------------------------------------- 5c7068b6c75fc80f820d78d9fe1303a6 7.3/en/os/SRPMS/kernel-2.4.18-5.src.rpm bfce6428d872b82ec4a580448a742bb2 7.3/en/os/athlon/kernel-2.4.18-5.athlon.rpm aff19e8dbdba54af1baaf142361b0d82 7.3/en/os/athlon/kernel-smp-2.4.18-5.athlon.rpm bab86eef06fe6b26d18b642d9cb62c64 7.3/en/os/i386/kernel-2.4.18-5.i386.rpm b71ad7e96f0cc8b5e975fb79603f5c0e 7.3/en/os/i386/kernel-BOOT-2.4.18-5.i386.rpm e332107e7ed38df9979cc2e64c587b52 7.3/en/os/i386/kernel-doc-2.4.18-5.i386.rpm cb786f574ded30fe01254059b0239c0c 7.3/en/os/i386/kernel-source-2.4.18-5.i386.rpm c176bde08b227c16a5c2bb5b08f8895b 7.3/en/os/i586/kernel-2.4.18-5.i586.rpm bcb1cbdb822b0217307194151bb589e9 7.3/en/os/i586/kernel-smp-2.4.18-5.i586.rpm 4fba5e2c4d48a502dd0bc73ebc264d04 7.3/en/os/i686/kernel-2.4.18-5.i686.rpm d588cbb93295e1b091f885d09e330d70 7.3/en/os/i686/kernel-bigmem-2.4.18-5.i686.rpm 6226daa6ab6de0e49b27a04e3deb51be 7.3/en/os/i686/kernel-debug-2.4.18-5.i686.rpm 5c48a75003c0cba4f49c20bdd9fbb737 7.3/en/os/i686/kernel-smp-2.4.18-5.i686.rpm These packages are GPG signed by Red Hat, Inc. for security. Our key is available at: http://www.redhat.com/about/contact/pgpkey.html You can verify each package with the following command: rpm --checksig <filename> If you only wish to verify that each package has not been corrupted or tampered with, examine only the md5sum with the following command: rpm --checksig --nogpg <filename> 8. References: Copyright(c) 2000, 2001, 2002 Red Hat, Inc. _______________________________________________ Redhat-watch-list mailing list To unsubscribe, visit: https://listman.redhat.com/mailman/listinfo/redhat-watch-list