- Issued:
- 2011-07-21
- Updated:
- 2011-07-21
RHBA-2011:1032 - Bug Fix Advisory
Synopsis
device-mapper-multipath bug fix and enhancement update
Type/Severity
Bug Fix Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
Updated device-mapper-multipath packages that fix several bugs and add various
enhancements are now available for Red Hat Enterprise Linux 5.
Description
The device-mapper-multipath packages provide tools to manage multipath devices
using the device-mapper multipath kernel module.
This update fixes the following bugs:
- Prior to this update, when viewing partition information from a file, kpartx
used a loop device which was not released by kpartx afterwards. With this
update, this erroneous behavior has been fixed so that kpartx now correctly
releases a loop device as expected. (BZ#578109)
- After a thread of the multipathd service acquired its resource locks, the
thread did not check if it had been canceled before accessing the resource. This
caused multipathd to occasionally terminate unexpectedly with a segmentation
fault on shutdown if the thread attempted to access the resource after the
thread was canceled. With this update, the bug has been fixed so that the
multipathd thread now checks if it is canceled before accessing its resource.
(BZ#639429)
- When the multipathd service started, it created a separate namespace for
itself, and unmounted all unnecessary disk-backed file systems. Since /ram file
systems are not considered to be disk-backed, they should have not been
unmounted by multipathd, however multipathd unmounted them. This update corrects
this undesired behavior so that the /ram file systems are no longer unmounted.
(BZ#663179)
- Prior to this update, the multipathd service did not check if a value was
entered for an option in the /etc/multipath.conf configuration file before
attempting to read the value. As a result, multipathd terminated unexpectedly
when an option without any value was found in /etc/multipath.conf. With this
update, the bug has been fixed so that multipathd no longer crashes. (BZ#675369)
- If the last path of a device was deleted while the multipathd service was
trying to reload the device map, or if a ghost path failed, multipathd did not
always switch into recovery mode. As a result, multipath devices were not able
to recover I/O operations in setups that were supposed to temporarily queue I/O
if all paths were unavailable. This update resolves both of these problems;
multipath now correctly recovers I/O operations as configured. (BZ#677821)
- Prior to this update, there was a spelling mistake found in the "invalid
keyword" error message. The spelling mistake has been fixed in this update.
(BZ#676165)
As well, this update adds the following enhancements:
- This update introduces two new defaults options in the /etc/multipath.conf
configuration file: "fast_io_fail_tmo" and "dev_loss_tmo". The
"fast_io_fail_tmo" option controls how long the SCSI layer waits after a SCSI
device fails before failing back the I/O. This option can be set to "off" or any
number less than the "dev_loss_tmo" option. The "dev_loss_tmo" option controls
how long the SCSI layer waits after a SCSI device fails before marking it as
failed. The default values for these options are set by the SCSI device drivers.
(BZ#672575)
- This update introduces a new defaults section parameter for the
/etc/multipath.conf configuration file: the "file_timeout" parameter. This
parameter controls how many seconds the multipathd service will wait for a
necessary file to appear while setting up a multipath device. The default value
is 90 seconds. (BZ#627911)
- This update introduces the default configuration for multiple new HP storage
array products. (BZ#502813)
All users of device-mapper-multipath should upgrade to these updated packages,
which fix these bugs and add these enhancements.
Solution
Before applying this update, make sure all previously-released errata
relevant to your system have been applied.
This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/kb/docs/DOC-11259
Affected Products
- Red Hat Enterprise Linux Server 5 x86_64
- Red Hat Enterprise Linux Server 5 ia64
- Red Hat Enterprise Linux Server 5 i386
- Red Hat Enterprise Linux Workstation 5 x86_64
- Red Hat Enterprise Linux Workstation 5 i386
- Red Hat Enterprise Linux Desktop 5 x86_64
- Red Hat Enterprise Linux Desktop 5 i386
- Red Hat Enterprise Linux for IBM z Systems 5 s390x
- Red Hat Enterprise Linux for Power, big endian 5 ppc
- Red Hat Enterprise Linux Server from RHUI 5 x86_64
- Red Hat Enterprise Linux Server from RHUI 5 i386
Fixes
- BZ - 578109 - kpartx doesn't release it's loop devices
- BZ - 627911 - wait_for_file() times out on the environment with a large number of multipath devices and high load.
- BZ - 639429 - multipathd segfaults due to shutdown race
- BZ - 675369 - multipathd segfault if no "LUN wwid" value is present with keyword "wwid"
- BZ - 676165 - Typo in multipath output, "mulipath.conf line 17, invalid keyword:"
- BZ - 677821 - multipathd occassionally doesn't stop queuing after no_path_retry times out.
CVEs
(none)
References
(none)
Red Hat Enterprise Linux Server 5
SRPM | |
---|---|
device-mapper-multipath-0.4.7-46.el5.src.rpm | SHA-256: 4ae915c357fbd3b22864c2ddd12c30a5d3321f0d7bf8bbb8722231b9bf96bfe8 |
x86_64 | |
device-mapper-multipath-0.4.7-46.el5.x86_64.rpm | SHA-256: f6d4a723b1680119f596bc33c3f5e134de5214bd15bac00b91025338ee909dbf |
kpartx-0.4.7-46.el5.x86_64.rpm | SHA-256: 8e75a8d86a968a88cf4ea498de3c856efacf05cb1ef468e93ddfd1ea97acffbb |
ia64 | |
device-mapper-multipath-0.4.7-46.el5.ia64.rpm | SHA-256: 71abcc6dce68233170456ad42784f2d5844fc38f1c7b587dcb915998716156ad |
kpartx-0.4.7-46.el5.ia64.rpm | SHA-256: 5531e772bd9e534b20be569d3fcbee52e0b67a6d58630d515c8b092ff589790d |
i386 | |
device-mapper-multipath-0.4.7-46.el5.i386.rpm | SHA-256: 558e450081bff1ae95f19d4821d4fe1c5534ebcdc28eb18fa2a83840bdfe3d11 |
kpartx-0.4.7-46.el5.i386.rpm | SHA-256: 40407d234845f2f7a4e1f02e00b89be58242e85e17c3d69bfa5dcbc07d676fc7 |
Red Hat Enterprise Linux Workstation 5
SRPM | |
---|---|
device-mapper-multipath-0.4.7-46.el5.src.rpm | SHA-256: 4ae915c357fbd3b22864c2ddd12c30a5d3321f0d7bf8bbb8722231b9bf96bfe8 |
x86_64 | |
device-mapper-multipath-0.4.7-46.el5.x86_64.rpm | SHA-256: f6d4a723b1680119f596bc33c3f5e134de5214bd15bac00b91025338ee909dbf |
kpartx-0.4.7-46.el5.x86_64.rpm | SHA-256: 8e75a8d86a968a88cf4ea498de3c856efacf05cb1ef468e93ddfd1ea97acffbb |
i386 | |
device-mapper-multipath-0.4.7-46.el5.i386.rpm | SHA-256: 558e450081bff1ae95f19d4821d4fe1c5534ebcdc28eb18fa2a83840bdfe3d11 |
kpartx-0.4.7-46.el5.i386.rpm | SHA-256: 40407d234845f2f7a4e1f02e00b89be58242e85e17c3d69bfa5dcbc07d676fc7 |
Red Hat Enterprise Linux Desktop 5
SRPM | |
---|---|
device-mapper-multipath-0.4.7-46.el5.src.rpm | SHA-256: 4ae915c357fbd3b22864c2ddd12c30a5d3321f0d7bf8bbb8722231b9bf96bfe8 |
x86_64 | |
device-mapper-multipath-0.4.7-46.el5.x86_64.rpm | SHA-256: f6d4a723b1680119f596bc33c3f5e134de5214bd15bac00b91025338ee909dbf |
kpartx-0.4.7-46.el5.x86_64.rpm | SHA-256: 8e75a8d86a968a88cf4ea498de3c856efacf05cb1ef468e93ddfd1ea97acffbb |
i386 | |
device-mapper-multipath-0.4.7-46.el5.i386.rpm | SHA-256: 558e450081bff1ae95f19d4821d4fe1c5534ebcdc28eb18fa2a83840bdfe3d11 |
kpartx-0.4.7-46.el5.i386.rpm | SHA-256: 40407d234845f2f7a4e1f02e00b89be58242e85e17c3d69bfa5dcbc07d676fc7 |
Red Hat Enterprise Linux for IBM z Systems 5
SRPM | |
---|---|
device-mapper-multipath-0.4.7-46.el5.src.rpm | SHA-256: 4ae915c357fbd3b22864c2ddd12c30a5d3321f0d7bf8bbb8722231b9bf96bfe8 |
s390x | |
device-mapper-multipath-0.4.7-46.el5.s390x.rpm | SHA-256: be8c72baf2f0751c72ba8aadf1c8a7c698546f2daf4784695c29be976a709504 |
kpartx-0.4.7-46.el5.s390x.rpm | SHA-256: c4f483fee6f168ae9abb0ae676609858da5395adc058ff166ff35ef322e282ee |
Red Hat Enterprise Linux for Power, big endian 5
SRPM | |
---|---|
device-mapper-multipath-0.4.7-46.el5.src.rpm | SHA-256: 4ae915c357fbd3b22864c2ddd12c30a5d3321f0d7bf8bbb8722231b9bf96bfe8 |
ppc | |
device-mapper-multipath-0.4.7-46.el5.ppc.rpm | SHA-256: 02a27015ddac94727f4fb17b58639b209734be105dc40e561e60030d995dae6c |
kpartx-0.4.7-46.el5.ppc.rpm | SHA-256: e6a59528f9bec0d9f0b44a4e41a2a633fd0b730caed195df3fa935dac3075f8c |
Red Hat Enterprise Linux Server from RHUI 5
SRPM | |
---|---|
device-mapper-multipath-0.4.7-46.el5.src.rpm | SHA-256: 4ae915c357fbd3b22864c2ddd12c30a5d3321f0d7bf8bbb8722231b9bf96bfe8 |
x86_64 | |
device-mapper-multipath-0.4.7-46.el5.x86_64.rpm | SHA-256: f6d4a723b1680119f596bc33c3f5e134de5214bd15bac00b91025338ee909dbf |
kpartx-0.4.7-46.el5.x86_64.rpm | SHA-256: 8e75a8d86a968a88cf4ea498de3c856efacf05cb1ef468e93ddfd1ea97acffbb |
i386 | |
device-mapper-multipath-0.4.7-46.el5.i386.rpm | SHA-256: 558e450081bff1ae95f19d4821d4fe1c5534ebcdc28eb18fa2a83840bdfe3d11 |
kpartx-0.4.7-46.el5.i386.rpm | SHA-256: 40407d234845f2f7a4e1f02e00b89be58242e85e17c3d69bfa5dcbc07d676fc7 |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.