Bug Fix Advisory linuxptp bug fix and enhancement update

Advisory: RHBA-2013:1564-1
Type: Bug Fix Advisory
Severity: N/A
Issued on: 2013-11-20
Last updated on: 2013-11-20
Affected Products: Red Hat Enterprise Linux Desktop (v. 6)
Red Hat Enterprise Linux HPC Node (v. 6)
Red Hat Enterprise Linux Server (v. 6)
Red Hat Enterprise Linux Workstation (v. 6)

Details

Updated linuxptp packages that fix several bugs and add various enhancements are
now available for Red Hat Enterprise Linux 6.

The Linux PTP project is a software implementation of the Precision Time
Protocol (PTP) according to IEEE standard 1588 for Linux. These packages provide
a robust implementation of the standard and use the most relevant and modern
Application Programming Interfaces (API) offered by the Linux kernel. Supporting
legacy APIs and other platforms is not a goal.

The linuxptp package has been upgraded to upstream version 1.3, which provides a
number of bug fixes and enhancements over the previous version. (BZ#916787)

This update also fixes the following bugs:

* Previously, the ptp4l application did not limit the frequency correction of
the clock. As a consequence, with some PTP clocks, when ptp4l was correcting a
large offset, it could set the frequency correction to -100%, which effectively
stopped the clock. This update adds a new option to configure the maximum
allowed correction of the clock, which, by default is 90%. As a result, the
synchronized clock never stops unless ptp4l is allowed to adjust the clock by
100%. (BZ#910966)

* Previously, the phc2sys utility was not able to read information about the
current Coordinated Universal Time (UTC) offset and pending leap seconds from
the ptp4l application. As a consequence, the user had to specify the UTC offset
manually and the leap seconds were not handled. This update adds a new option to
phc2sys to wait for ptp4l to synchronize the PTP clock and to periodically read
the current UTC offset and information about pending leap seconds. As a result,
the phc2sys utility uses the correct UTC offset and leap seconds are handled
properly. (BZ#910974)

* Previously, the ptp4l application did not correctly check if a cached
follow-up or a synchronized message could be associated with a newly received
synchronization or a follow-up message. As a consequence, the messages could be
associated incorrectly, which could result in a large offset and disturbed
synchronization of the clock. The code which associates the synchronization and
follow-up messages has been fixed. As a result, there are no longer disturbances
in the synchronization. (BZ#991332, BZ#985531)

* Previously, the ptp4l application did not reset the announce receipt timer for
ports in the PASSIVE state when an announce message was received. As a
consequence, the port in the PASSIVE state was repeatedly switching between
PASSIVE and MASTER states. This bug has been fixed and the timer is now
correctly reset with every announce message. As a result, the port stays in the
PASSIVE state until it stops receiving announce messages. (BZ#991337)

* Previously, the ptp4l and phc2sys utilities did not check if the command line
arguments and the values specified in the configuration file were valid. As a
consequence, the utilities could terminate unexpectedly. The utilities now check
if the values are valid and if an invalid value is specified, the utilities no
longer terminate unexpectedly and print an error message instead. (BZ#966787)

In addition, this update adds the following enhancement:

* Occasionally, it is important that the system clock is not stepped, that is,
not to interfere with other programs running on the system. Restarting the
phc2sys application caused stepping of the clock. A new option has been added to
phc2sys, and it is now possible to prevent phc2sys from stepping the clock.
(BZ#977258)

Users of linuxptp are advised to upgrade to these updated packages, which fix
these bugs and add these enhancements.


Solution

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/site/articles/11258

Updated packages

Red Hat Enterprise Linux Desktop (v. 6)

SRPMS:
linuxptp-1.3-1.el6.src.rpm
File outdated by:  RHBA-2015:1321
    MD5: c0a84ffe087e8bda28b4f5cbb674bc58
SHA-256: 5f1ca42eb3a054412098071873143b47e6f19e1a63b70504cf2f6c94107f8b0d
 
IA-32:
linuxptp-1.3-1.el6.i686.rpm
File outdated by:  RHBA-2015:1321
    MD5: 7ce984c735197cde246afc5c2c2353f6
SHA-256: ed066c06832c9921b9acc316e622ed65570ab647439cd79b6f00bf321398ded4
linuxptp-debuginfo-1.3-1.el6.i686.rpm
File outdated by:  RHBA-2015:1321
    MD5: 30402b0a3bcb0123273c05cbfb10f7c4
SHA-256: 9b721b47475303f1b0807dc24e8f70e1414cd009f4419f9b611118441aa88eab
 
x86_64:
linuxptp-1.3-1.el6.x86_64.rpm
File outdated by:  RHBA-2015:1321
    MD5: f177e6847df53f4f87905d29001663f3
SHA-256: 0ecf60c07098399438fe03c1b27d5c5a8d93adc479589dd4f9ee0265c9dac10e
linuxptp-debuginfo-1.3-1.el6.x86_64.rpm
File outdated by:  RHBA-2015:1321
    MD5: 4c1432aefbf18a5033d5cff268cc6fd3
SHA-256: 7c719e5f645af8f4fad74a4bea5e6e100d2feb237ce96f49ef33b84b5fffc214
 
Red Hat Enterprise Linux HPC Node (v. 6)

SRPMS:
linuxptp-1.3-1.el6.src.rpm
File outdated by:  RHBA-2015:1321
    MD5: c0a84ffe087e8bda28b4f5cbb674bc58
SHA-256: 5f1ca42eb3a054412098071873143b47e6f19e1a63b70504cf2f6c94107f8b0d
 
x86_64:
linuxptp-1.3-1.el6.x86_64.rpm
File outdated by:  RHBA-2015:1321
    MD5: f177e6847df53f4f87905d29001663f3
SHA-256: 0ecf60c07098399438fe03c1b27d5c5a8d93adc479589dd4f9ee0265c9dac10e
linuxptp-debuginfo-1.3-1.el6.x86_64.rpm
File outdated by:  RHBA-2015:1321
    MD5: 4c1432aefbf18a5033d5cff268cc6fd3
SHA-256: 7c719e5f645af8f4fad74a4bea5e6e100d2feb237ce96f49ef33b84b5fffc214
 
Red Hat Enterprise Linux Server (v. 6)

SRPMS:
linuxptp-1.3-1.el6.src.rpm
File outdated by:  RHBA-2015:1321
    MD5: c0a84ffe087e8bda28b4f5cbb674bc58
SHA-256: 5f1ca42eb3a054412098071873143b47e6f19e1a63b70504cf2f6c94107f8b0d
 
IA-32:
linuxptp-1.3-1.el6.i686.rpm
File outdated by:  RHBA-2015:1321
    MD5: 7ce984c735197cde246afc5c2c2353f6
SHA-256: ed066c06832c9921b9acc316e622ed65570ab647439cd79b6f00bf321398ded4
linuxptp-debuginfo-1.3-1.el6.i686.rpm
File outdated by:  RHBA-2015:1321
    MD5: 30402b0a3bcb0123273c05cbfb10f7c4
SHA-256: 9b721b47475303f1b0807dc24e8f70e1414cd009f4419f9b611118441aa88eab
 
x86_64:
linuxptp-1.3-1.el6.x86_64.rpm
File outdated by:  RHBA-2015:1321
    MD5: f177e6847df53f4f87905d29001663f3
SHA-256: 0ecf60c07098399438fe03c1b27d5c5a8d93adc479589dd4f9ee0265c9dac10e
linuxptp-debuginfo-1.3-1.el6.x86_64.rpm
File outdated by:  RHBA-2015:1321
    MD5: 4c1432aefbf18a5033d5cff268cc6fd3
SHA-256: 7c719e5f645af8f4fad74a4bea5e6e100d2feb237ce96f49ef33b84b5fffc214
 
Red Hat Enterprise Linux Workstation (v. 6)

SRPMS:
linuxptp-1.3-1.el6.src.rpm
File outdated by:  RHBA-2015:1321
    MD5: c0a84ffe087e8bda28b4f5cbb674bc58
SHA-256: 5f1ca42eb3a054412098071873143b47e6f19e1a63b70504cf2f6c94107f8b0d
 
IA-32:
linuxptp-1.3-1.el6.i686.rpm
File outdated by:  RHBA-2015:1321
    MD5: 7ce984c735197cde246afc5c2c2353f6
SHA-256: ed066c06832c9921b9acc316e622ed65570ab647439cd79b6f00bf321398ded4
linuxptp-debuginfo-1.3-1.el6.i686.rpm
File outdated by:  RHBA-2015:1321
    MD5: 30402b0a3bcb0123273c05cbfb10f7c4
SHA-256: 9b721b47475303f1b0807dc24e8f70e1414cd009f4419f9b611118441aa88eab
 
x86_64:
linuxptp-1.3-1.el6.x86_64.rpm
File outdated by:  RHBA-2015:1321
    MD5: f177e6847df53f4f87905d29001663f3
SHA-256: 0ecf60c07098399438fe03c1b27d5c5a8d93adc479589dd4f9ee0265c9dac10e
linuxptp-debuginfo-1.3-1.el6.x86_64.rpm
File outdated by:  RHBA-2015:1321
    MD5: 4c1432aefbf18a5033d5cff268cc6fd3
SHA-256: 7c719e5f645af8f4fad74a4bea5e6e100d2feb237ce96f49ef33b84b5fffc214
 
(The unlinked packages above are only available from the Red Hat Network)


These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/