Optional update for Linux kernel (kernel-source)
(Last modified: 04JAN2003)
solutions Optional update for Linux kernel (kernel-source) SuSE Linux Maintenance Web (e2d35dcddb9c9ae7d03ff5242e458195)
SuSE Linux Openexchange Server 4
This patch updates your kernel-source package and is only necessary if you compile your own kernel.
- Fix fractured block problem (implemented by adding blk-atomic feature).
- Add several performance and scalability improvements for SMP systems.
- Fix a longstanding TCP problem that can lead to hanging SSH sessions.
- Fix possible data exposure and data corruption caused by abusing
statfsoverflow for huge NFS filesystems.
- Enable support for more than 256 SCSI hard disks by default on SMP systems.
- Fix problem in
O_DIRECTimplementation when reading files with holes in it.
- Fix possible lockup on full reiserfs when
- Fix possible oops when trying to free pages in async-I/O.
- Fix longstanding off-by-one error in
keventdinitialization that can lead to system freeze.
- Fix MD RAID1 oops when a disk has failed.
- Fix possible data loss on umount when the filesystem is mounted with "
- Prevent possible
- Fix scheduler problem where an RT task can hang the system.
O_DIRECTfor filesystems with a blocksize less than 4k.
- Fix system crash when using bigpages under certain circumstances.
- Add workaround for AMD errata #56 for
- Fix problem in SCSI midlayer that leads to inferior performance for some AIC7xxx adapters.
- Fix handling of Unisys ES7000 interrupt override for PCI range.
- Fix file mark handling bug in
osstthat breaks some backup programs.
- Fix LVM major checking in XFS.
- xfs ACLs: return
E2BIGif number of entries overflows.
- IBM ServeRaid driver downgraded to 5.11. Some machines seem to have problems when firmware version and driver version don't match (there is no firmware version 6.00 available yet). Use newer driver version 6.0.0 only on IA64..
ccissdriver to 2.4.42.
megaraiddriver to 1.18e.
rpm -Uvh kernel-source.rpm
Download Source Packages
Download the source code of the patches for maintained products.
The Origin of this information may be internal or external to Novell. Novell makes all reasonable efforts to verify this information. However, the information provided in this document is for your information only. Novell makes no explicit or implied claims to the validity of this information.
Any trademarks referenced in this document are the property of their respective owners. Consult your product manuals for complete trademark information.