x86 Architectures
25
•
oprofile
did not correctly identify processors based on the Next-Generation Intel
Microarchitecture (Nehalem). Consequently, the performance monitoring unit could not be used and
the processor fell back to the timer interrupt. The kernel has been updated to resolve this issue.
• Support has been added to the kernel for the CPU power state, C3, on the Next-Generation Intel
Microarchitecture (Nehalem). The ability to enter C3 (also known as the sleep state) improves the
power efficiency of the CPU when idle.
• Previously, the
MAX_ARG_PAGES
limit that is set in the kernel was too low, and may have resulted in
the following error:
execve: Argument list too long
In this update, this limit has been increased to 25 percent of the stack size, which resolves this
issue.
•
autofs4
updates have been backported to Red Hat Enterprise Linux 5.3 from linux kernel version
2.6.27.
• Red Hat Enterprise Linux 5.3 now includes the ability to specify that core files be piped to a forked
copy of a user space application, rather than directly to a file. This is enabled by placing
|
path/
to/application
in
/proc/sys/kernel/core_pattern
. When a core is dumped, a copy of
the specified application will be executed, and the core will be piped to it on stdin. This allows for the
core to be augmented, analyzed and actively handled at core dump time.
• The file
/proc/cpuinfo
now reports the ID of the Advanced Programmable Interrupt Controller
(APIC) that is used by each individual CPU.
• The Machine Check Exception (MCE) kernel subsystem has been enhanced to support larger
memory configurations as needed by new systems.
• The mount command now supports Kerberos authentication when mounting filesystems via
Samba. The
sec=krb5
or
sec=krb5i
switch allows the kernel to call a userspace application
(
cifs.upcall
) which returns a SPNEGO (Simple and Protected GSSAPI Negotiation Mechanism)
security blob (Binary Large OBject). The kernel can then use this blob to authenticate with the
server and mount the requested filesystem.
• If you configured the kernel parameter
kernel.unknown_nmi_panic
on a system that used the
IOAPIC NMI watchdog method, a kernel panic could occur. This is because the NMI watchdog could
not disable the source of NMIs securely.
With this release, the NMI watchdog code has been revised to allow users to safely
disable the NMI source. As such, you can now safely configure the kernel parameter
kernel.unknown_nmi_panic
on systems that use the IOAPIC NMI watchdog method.
5.2. x86 Architectures
• The
powernowk8
driver was not performing sufficient checks on the number of running CPUs.
Consequently, when the driver was started, a kernel oops error message may have been
reported. In this update the
powernowk8
driver verifies that the number of supported CPUs
(
supported_cpus
) equals the number of online CPUs (
num_online_cpus
), which resolves this
issue.
Содержание ENTERPRISE LINUX 5.3 - RELEASE MANIFEST
Страница 240: ...240 ...