- Issued:
- 2008-11-12
- Updated:
- 2008-11-12
RHBA-2008:0919 - Bug Fix Advisory
Synopsis
hts bug fix update
Type/Severity
Bug Fix Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
An updated hts package that fixes several bugs is now available.
Description
The Red Hat Hardware Test Suite (HTS) certifies hardware for Red Hat
Enterprise Linux.
This updated package fixes the following bugs:
- after burning data to a CD-ROM, HTS attempts to re-mount the disk to
verify the data was written correctly. The mount command sometimes failed
because the drive took up to 15 seconds to be ready. With this update, the
mount command is repeated ten times, at five second intervals, ensuring the
disk is re-mounted even on slow CD-ROM drives.
- lshal, the Linux utility for displaying items in the Hardware Abstraction
Layer (HAL) device database, treats Secure Digital (SD) cards as "sd_mmc"
(for MultiMediaCard) types and not "disk" types. As a consequence, the "hts
plan" command did not detect installed SD cards. With this update, both
disk and sd_mmc storage types are checked when "hts plan" is executed,
ensuring SD cards are detected.
- on Red Hat Enterprise Linux 4.6, running "hts plan" would not add a USB
test to plan.xml. Plugging a device into a USB port and running "hts plan"
again would add a test for the USB device but not a test for the USB
sub-system. This has been fixed. Running "hts plan" on Red Hat Enterprise
Linux 4.6 now produces a plan.xml file that includes a USB test for
detected USB sub-systems.
- a typo in an alert message prevented the CD-ROM test from finishing
correctly on slim-line CD-ROM drives which require the disk tray be closed
manually. Instead of asking the user to close the drive tray, a "TypeError"
message presented. This typo has been corrected. The alert now presents
correctly and the test completes properly.
- because of a missing cpufreq directory, the cpuscaling test produced
error messages, including a Traceback, when run under Xen on Sun Fire X2250
M2 Servers. With this update, the Traceback no longer occurs. (Note: CPU
scaling is not supported in the Xen kernel on versions of Red Hat
Enterprise Linux prior to 5.2. When run on a non-virtualized kernel on
hardware that supports CPU scaling, no error messages present.)
- when the "hts server stop" command was issued, Apache (the httpd service)
would start. This caused the RPC svcgssd service to fail. Stopping the hts
server no longer causes Apache to start so the RPC svcgssd service does not
fail.
- the "hts certify --test info" command was checking the entire value of
the tainted flag, /proc/sys/kernel/tainted. This caused it to incorrectly
fail and report 3rd-party GPLed kernel modules as tainted. With this
update, hts now correctly checks only the first bit of
/proc/sys/kernel/tainted for non-GPL status. HTS still provides a different
error for other non-0 values in /proc/sys/kernel/tainted.
- a typo in the info.py file caused some 3rd-party GPLed kernel modules
with symbol dependencies to fail with Traceback errors. This typo has been
corrected. These 3rd-party GPLed kernel modules now fail the info test as
expected: with a reported error and not a Traceback.
- the "info" test in HTS checked for boot parameters after checking for
third-party or self-compiled modules in the kernel. If these modules were
found in the kernel, the "info" test would fail immediately and boot
parameters were never discovered. With this updated package, when HTS finds
a third-party or self-compiled module it records an error and continues,
ensuring all potential issue data is captured.
- hardware-based suspend methods not known to HTS caused the "suspend" test
to fail. Consequently, the system would not suspend. The suspend test now
only supports suspending the system to memory and to disk. HTS searches for
both these methods and will only test them if found. Unknown suspend
methods are now ignored by HTS.
All HTS users are advised to upgrade to this updated package, which
resolves these issues.
Solution
Before applying this update, make sure all previously released errata
relevant to your system have been applied.
To update all RPMs for your particular architecture, run:
rpm -Fvh [filenames]
where [filenames] is a list of the RPMs you wish to upgrade. Only those
RPMs which are currently installed will be updated. Those RPMs which are
not installed but included in the list will not be updated. Note that you
can also use wildcards (*.rpm) if your current directory *only* contains the
desired RPMs.
Please note that this update is also available via Red Hat Network. Many
people find this an easier way to apply updates. To use Red Hat Network,
launch the Red Hat Update Agent with the following command:
up2date
This will start an interactive process that will result in the appropriate
RPMs being upgraded on your system.
Affected Products
- Red Hat Hardware Certification Test Suite 5 x86_64
- Red Hat Hardware Certification Test Suite 5 ppc
- Red Hat Hardware Certification Test Suite 5 ia64
- Red Hat Hardware Certification Test Suite 5 i386
- Red Hat Hardware Certification Test Suite 4 x86_64
- Red Hat Hardware Certification Test Suite 4 s390x
- Red Hat Hardware Certification Test Suite 4 s390
- Red Hat Hardware Certification Test Suite 4 ppc
- Red Hat Hardware Certification Test Suite 4 ia64
- Red Hat Hardware Certification Test Suite 4 i386
Fixes
- BZ - 446062 - hts plan skips mmc media
- BZ - 450654 - FEAT: checking for boot parameters should be done before checking the kernel
- BZ - 451154 - suspend test fails due to unkown suspend method "standby"
- BZ - 455245 - CDROM test in HTS 5.2-16 didn’t finish correct
- BZ - 455762 - RHEL4 U6: usb test never planned
- BZ - 460973 - cdrom test fails on written media comparison
- BZ - 468730 - service Httpd is not be stopped when shutting down hts server.
CVEs
(none)
References
(none)
Red Hat Hardware Certification Test Suite 5
SRPM | |
---|---|
hts-5.2-20.el5.src.rpm | SHA-256: 0af9ba88a8147876358e81e3bb591835532b7db9636b2a1296ccb048f1dc9efa |
x86_64 | |
hts-5.2-20.el5.noarch.rpm | SHA-256: d84ba391c7f525d59d86d78bc164420139e4aeec82c52719ef0c4cb310c1c70d |
ppc | |
hts-5.2-20.el5.noarch.rpm | SHA-256: d84ba391c7f525d59d86d78bc164420139e4aeec82c52719ef0c4cb310c1c70d |
ia64 | |
hts-5.2-20.el5.noarch.rpm | SHA-256: d84ba391c7f525d59d86d78bc164420139e4aeec82c52719ef0c4cb310c1c70d |
i386 | |
hts-5.2-20.el5.noarch.rpm | SHA-256: d84ba391c7f525d59d86d78bc164420139e4aeec82c52719ef0c4cb310c1c70d |
Red Hat Hardware Certification Test Suite 4
SRPM | |
---|---|
hts-5.2-20.el4.src.rpm | SHA-256: 0a3e229c89e657da6248f70cbc20c98bc39c66d669de96bd4f352b1c3e4ff8cc |
x86_64 | |
hts-5.2-20.el4.noarch.rpm | SHA-256: 741ae92a65a43cdad4ed9394c21a134aceda4d6b8e0e057ef7af80cba51c6815 |
s390x | |
hts-5.2-20.el4.noarch.rpm | SHA-256: 741ae92a65a43cdad4ed9394c21a134aceda4d6b8e0e057ef7af80cba51c6815 |
s390 | |
hts-5.2-20.el4.noarch.rpm | SHA-256: 741ae92a65a43cdad4ed9394c21a134aceda4d6b8e0e057ef7af80cba51c6815 |
ppc | |
hts-5.2-20.el4.noarch.rpm | SHA-256: 741ae92a65a43cdad4ed9394c21a134aceda4d6b8e0e057ef7af80cba51c6815 |
ia64 | |
hts-5.2-20.el4.noarch.rpm | SHA-256: 741ae92a65a43cdad4ed9394c21a134aceda4d6b8e0e057ef7af80cba51c6815 |
i386 | |
hts-5.2-20.el4.noarch.rpm | SHA-256: 741ae92a65a43cdad4ed9394c21a134aceda4d6b8e0e057ef7af80cba51c6815 |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.