Red Hat ENTERPRISE 5.3 RELEASE NOTES Guía de instalación Pagina 26

  • Descarga
  • Añadir a mis manuales
  • Imprimir
  • Pagina
    / 209
  • Tabla de contenidos
  • MARCADORES
  • Valorado. / 5. Basado en revisión del cliente
Vista de pagina 25
Microarchitecture (Nehalem). Consequently, the performance monitoring unit could not be used and
the processor fell back to the timer interrupt. T he kernel has been updated to resolve this issue.
Support has been added to the kernel for the CPU power state, C3, on the Next-Generation Intel
Microarchitecture (Nehalem). T he ability to enter C3 (also known as the sleep state) improves the
power efficiency of the CPU when idle.
Previously, the MAX_ARG_PAGES limit that is set in the kernel was too low, and may have resulted in
the following error:
execve: Argument list too long
In this update, this limit has been increased to 25 percent of the stack size, which resolves this
issue.
autofs4 updates have been backported to Red Hat Enterprise Linux 5.3 from linux kernel version
2.6.27.
Red Hat Enterprise Linux 5.3 now includes the ability to specify that core files be piped to a forked
copy of a user space application, rather than directly to a file. This is enabled by placing |
path/to/applicationin /proc/sys/kernel/core_pattern. When a core is dumped, a copy of
the specified application will be executed, and the core will be piped to it on stdin. This allows for the
core to be augmented, analyzed and actively handled at core dump time.
The file /proc/cpuinfo now reports the ID of the Advanced Programmable Interrupt Controller
(APIC) that is used by each individual CPU.
The Machine Check Exception (MCE) kernel subsystem has been enhanced to support larger
memory configurations as needed by new systems.
The mount command now supports Kerberos authentication when mounting filesystems via Samba.
The sec=krb5 or sec=krb5i switch allows the kernel to call a userspace application
(cifs.upcall) which returns a SPNEGO (Simple and Protected GSSAPI Negotiation Mechanism)
security blob (Binary Large OBject). The kernel can then use this blob to authenticate with the server
and mount the requested filesystem.
If you configured the kernel parameter kernel.unknown_nm i_panic on a system that used the
IOAPIC NMI watchdog method, a kernel panic could occur. This is because the NMI watchdog could
not disable the source of NMIs securely.
With this release, the NMI watchdog code has been revised to allow users to safely disable the NMI
source. As such, you can now safely configure the kernel parameter
kernel.unknown_nm i_panic on systems that use the IOAPIC NMI watchdog method.
5.2. x86 Architectures
The powernowk8 driver was not performing sufficient checks on the number of running CPUs.
Consequently, when the driver was started, a kernel oops error message may have been reported. In
this update the powernowk8 driver verifies that the number of supported CPUs (supported_cpus)
equals the number of online CPUs (num_online_cpus), which resolves this issue.
5.3. PowerPC Architectures
CPUFreq, the kernel subsystem that scales CPU frequency and voltage, has been updated with
improved support for Cell Processors. This update implements a Synergistic Processing Unit (SPU)
aware CPUFreq governor that enhances the power management of Cell processors.
Error Detection and Correction (EDAC) is now supported on the Cell Broadband Engine Architecture
in Red Hat Enterprise Linux 5.3. To enable EDAC, use the command: m odprobe cell_edac
To check this module has been added to your running kernel, check /var/log/dmesg for output like
5. Kernel-Related Notes
23
Vista de pagina 25
1 2 ... 21 22 23 24 25 26 27 28 29 30 31 ... 208 209

Comentarios a estos manuales

Sin comentarios