- Issued:
- 2013-09-30
- Updated:
- 2013-09-30
RHBA-2013:1314 - Bug Fix Advisory
Synopsis
device-mapper-multipath bug fix and enhancement update
Type/Severity
Bug Fix Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
Updated device-mapper-multipath packages that fix several bugs and add various
enhancements are now available for Red Hat Enterprise Linux 5.
Description
The device-mapper-multipath packages provide tools to manage multipath devices
using the device-mapper multipath kernel module.
This update fixes the following bugs:
- Multipath was not correctly getting the vendor, product, and revision strings
for certain devices. Consequently, users were unable to correctly configure or
use these devices with multipath. With this update, multipath now uses a SCSI
inquiry IOCTL request to correctly get this information, and multipath is now
able to configure and use these devices. (BZ#522108)
- When a partition was resized, kpartx reloaded the partition device with the
NOFLUSH flag enabled, which device-mapper does not allow, causing the device to
be left in a suspended state. Users had to manually resume the devices to
restore their use. However, this did not fix the partition device size, and the
partitioned device would become unusable again the next time kpartx was run on
the device. With this update, kpartx now checks if the partition has changed
size, and does not set the NOFLUSH flag when reloading a partitioned device with
a new size. Now, users can repartition devices with kpartx without those devices
becoming unusable. (BZ#855147)
- Previously, the multipathd daemon did not stop and wait for all of its threads
on shutdown, which caused multipathd to occasionally terminate unexpectedly with
a segmentation fault during shutdown. With this update, multipathd now correctly
stops and waits for its threads during shutdown, and crashes no longer occur in
the described scenario. (BZ#860185)
- Previously, the multipathd daemon terminated unexpectedly with a segmentation
fault on 32-bit systems with a cciss disk controller. This was caused by a stack
corruption in uev_discard() function. This update corrects the code in the
uev_discard() function, and crashes no longer occur in the
described scenario. (BZ#872439)
- If the /var/cache directory was a separate file system, the multipathd daemon
unmounted it in its private namespace on start up. However, multipath requires
the /var/cache directory to properly setup its private namespace. Consequently,
the multipathd daemon failed to start on machines where the
/var/cache directory was a separate file system. With this update, the
multipathd daemon no longer unmounts the /var/cache directory from its private
namespace, and multipathd will now correctly start up on machines where the
/var/cache directory is a separate file system. (BZ#910585)
- Multipath switched to use the cciss_id callout for HP P2000 G3 SAS storage
devices, which did not correctly provide the UUID. Consequently, multipath was
unable to correctly configure HP P2000 G3 SAS devices. With this update,
multipath switched back to using the scsi_id callout with the "-n" option to
enable it to function with cciss devices, and multipath can now correctly
configure HP P2000 G3 SAS devices. (BZ#948309)
In addition, this update adds the following enhancements:
- This update adds a built-in configuration for the IBM XIV Storage System.
(BZ#799907)
- With this update, when multipath is set to log level 3, it will now print
messages whenever it forks to execute a callout. This update helps debug a
segmentation fault with multipath on Xen setups. (BZ#839983)
- With this update, the default configuration for NetApp devices now includes
the "flush_on_last_del yes" parameter. With the default configuration, when all
path devices to a NetApp LUN have been removed from the system, the multipath
device for that LUN stops queuing I/O. (BZ#916630)
Users of device-mapper-multipath are advised to upgrade to these updated
packages, which fix these bugs and add these enhancements.
Solution
Before applying this update, make sure all previously-released errata relevant
to your system have been applied.
This update is available via the Red Hat Network. Details on how to use the Red
Hat Network to apply this update are available at
https://access.redhat.com/site/articles/11258
Affected Products
- Red Hat Enterprise Linux Server 5 x86_64
- Red Hat Enterprise Linux Server 5 ia64
- Red Hat Enterprise Linux Server 5 i386
- Red Hat Enterprise Linux Workstation 5 x86_64
- Red Hat Enterprise Linux Workstation 5 i386
- Red Hat Enterprise Linux Desktop 5 x86_64
- Red Hat Enterprise Linux Desktop 5 i386
- Red Hat Enterprise Linux for IBM z Systems 5 s390x
- Red Hat Enterprise Linux for Power, big endian 5 ppc
- Red Hat Enterprise Linux Server from RHUI 5 x86_64
- Red Hat Enterprise Linux Server from RHUI 5 i386
Fixes
(none)CVEs
(none)
References
(none)
Red Hat Enterprise Linux Server 5
SRPM | |
---|---|
device-mapper-multipath-0.4.7-59.el5.src.rpm | SHA-256: ef73a8b1a96b6df743e9fa9a5127394b0ba2803897f3a3adc618d9dcef37044b |
x86_64 | |
device-mapper-multipath-0.4.7-59.el5.x86_64.rpm | SHA-256: 3d078900a672f2ed331b704e6bb2a90c100a76f25b2a805e8c7f072859c4c133 |
device-mapper-multipath-debuginfo-0.4.7-59.el5.x86_64.rpm | SHA-256: 4bb657b627c1ef3459a571b05c5b289b6e61437de1178415f8a72b36f6a96dc6 |
kpartx-0.4.7-59.el5.x86_64.rpm | SHA-256: 19d525ffd7a92d8a7af203028ad8f4c3ffe8403f2e0007f4ba1929281511fd53 |
ia64 | |
device-mapper-multipath-0.4.7-59.el5.ia64.rpm | SHA-256: 341c6121f0a6f349147f58973da6ff9beb822d095e3a318c628ea5eaabe65ce9 |
device-mapper-multipath-debuginfo-0.4.7-59.el5.ia64.rpm | SHA-256: 787f36200e358320d47c9ca0c62632fd486245b86c46bcb1a72242670989fc54 |
kpartx-0.4.7-59.el5.ia64.rpm | SHA-256: 9fccb686cd4300a74f88a6fcbc9e6c1343dc69a17017f5746fdbc75f1d314845 |
i386 | |
device-mapper-multipath-0.4.7-59.el5.i386.rpm | SHA-256: 7429f5330b6d930eefb0bf659eba9fce95f4e572dc51f15fe02ecbd8d3537411 |
device-mapper-multipath-debuginfo-0.4.7-59.el5.i386.rpm | SHA-256: d6a53aec28083ea2226d6109a0273dcdb5807d20d49da69bab576bb10a6717f0 |
kpartx-0.4.7-59.el5.i386.rpm | SHA-256: 8bf13eb53b9e314da27e89708436877ffcc77b0e39a4c978c731db21683f9170 |
Red Hat Enterprise Linux Workstation 5
SRPM | |
---|---|
device-mapper-multipath-0.4.7-59.el5.src.rpm | SHA-256: ef73a8b1a96b6df743e9fa9a5127394b0ba2803897f3a3adc618d9dcef37044b |
x86_64 | |
device-mapper-multipath-0.4.7-59.el5.x86_64.rpm | SHA-256: 3d078900a672f2ed331b704e6bb2a90c100a76f25b2a805e8c7f072859c4c133 |
device-mapper-multipath-debuginfo-0.4.7-59.el5.x86_64.rpm | SHA-256: 4bb657b627c1ef3459a571b05c5b289b6e61437de1178415f8a72b36f6a96dc6 |
kpartx-0.4.7-59.el5.x86_64.rpm | SHA-256: 19d525ffd7a92d8a7af203028ad8f4c3ffe8403f2e0007f4ba1929281511fd53 |
i386 | |
device-mapper-multipath-0.4.7-59.el5.i386.rpm | SHA-256: 7429f5330b6d930eefb0bf659eba9fce95f4e572dc51f15fe02ecbd8d3537411 |
device-mapper-multipath-debuginfo-0.4.7-59.el5.i386.rpm | SHA-256: d6a53aec28083ea2226d6109a0273dcdb5807d20d49da69bab576bb10a6717f0 |
kpartx-0.4.7-59.el5.i386.rpm | SHA-256: 8bf13eb53b9e314da27e89708436877ffcc77b0e39a4c978c731db21683f9170 |
Red Hat Enterprise Linux Desktop 5
SRPM | |
---|---|
device-mapper-multipath-0.4.7-59.el5.src.rpm | SHA-256: ef73a8b1a96b6df743e9fa9a5127394b0ba2803897f3a3adc618d9dcef37044b |
x86_64 | |
device-mapper-multipath-0.4.7-59.el5.x86_64.rpm | SHA-256: 3d078900a672f2ed331b704e6bb2a90c100a76f25b2a805e8c7f072859c4c133 |
device-mapper-multipath-debuginfo-0.4.7-59.el5.x86_64.rpm | SHA-256: 4bb657b627c1ef3459a571b05c5b289b6e61437de1178415f8a72b36f6a96dc6 |
kpartx-0.4.7-59.el5.x86_64.rpm | SHA-256: 19d525ffd7a92d8a7af203028ad8f4c3ffe8403f2e0007f4ba1929281511fd53 |
i386 | |
device-mapper-multipath-0.4.7-59.el5.i386.rpm | SHA-256: 7429f5330b6d930eefb0bf659eba9fce95f4e572dc51f15fe02ecbd8d3537411 |
device-mapper-multipath-debuginfo-0.4.7-59.el5.i386.rpm | SHA-256: d6a53aec28083ea2226d6109a0273dcdb5807d20d49da69bab576bb10a6717f0 |
kpartx-0.4.7-59.el5.i386.rpm | SHA-256: 8bf13eb53b9e314da27e89708436877ffcc77b0e39a4c978c731db21683f9170 |
Red Hat Enterprise Linux for IBM z Systems 5
SRPM | |
---|---|
device-mapper-multipath-0.4.7-59.el5.src.rpm | SHA-256: ef73a8b1a96b6df743e9fa9a5127394b0ba2803897f3a3adc618d9dcef37044b |
s390x | |
device-mapper-multipath-0.4.7-59.el5.s390x.rpm | SHA-256: 52db12b573508a2fabc2c2fc5bfd85404df55007e068fd135ce9ad1f4c1cb29a |
device-mapper-multipath-debuginfo-0.4.7-59.el5.s390x.rpm | SHA-256: ebe08008f066cd4ed22eaf87f660b5889e27bc93b4b668189f99375f7659cf0a |
kpartx-0.4.7-59.el5.s390x.rpm | SHA-256: c208f0ea4b9f228d651010032a99ce361c82d7edae7641b9cb7060f31a47222d |
Red Hat Enterprise Linux for Power, big endian 5
SRPM | |
---|---|
device-mapper-multipath-0.4.7-59.el5.src.rpm | SHA-256: ef73a8b1a96b6df743e9fa9a5127394b0ba2803897f3a3adc618d9dcef37044b |
ppc | |
device-mapper-multipath-0.4.7-59.el5.ppc.rpm | SHA-256: 9c49c1973993716f7cb4584e9f680b813db8679aa9538dead8fbf3445f8bbba0 |
device-mapper-multipath-debuginfo-0.4.7-59.el5.ppc.rpm | SHA-256: 02291574e769fece8ad40885bf381474f36f33d1e7c046380ed7436405ffc578 |
kpartx-0.4.7-59.el5.ppc.rpm | SHA-256: f5538a243ad52e1a03c122a87f502349ba182231651af4d7e3737a52520fd9aa |
Red Hat Enterprise Linux Server from RHUI 5
SRPM | |
---|---|
device-mapper-multipath-0.4.7-59.el5.src.rpm | SHA-256: ef73a8b1a96b6df743e9fa9a5127394b0ba2803897f3a3adc618d9dcef37044b |
x86_64 | |
device-mapper-multipath-0.4.7-59.el5.x86_64.rpm | SHA-256: 3d078900a672f2ed331b704e6bb2a90c100a76f25b2a805e8c7f072859c4c133 |
device-mapper-multipath-debuginfo-0.4.7-59.el5.x86_64.rpm | SHA-256: 4bb657b627c1ef3459a571b05c5b289b6e61437de1178415f8a72b36f6a96dc6 |
kpartx-0.4.7-59.el5.x86_64.rpm | SHA-256: 19d525ffd7a92d8a7af203028ad8f4c3ffe8403f2e0007f4ba1929281511fd53 |
i386 | |
device-mapper-multipath-0.4.7-59.el5.i386.rpm | SHA-256: 7429f5330b6d930eefb0bf659eba9fce95f4e572dc51f15fe02ecbd8d3537411 |
device-mapper-multipath-debuginfo-0.4.7-59.el5.i386.rpm | SHA-256: d6a53aec28083ea2226d6109a0273dcdb5807d20d49da69bab576bb10a6717f0 |
kpartx-0.4.7-59.el5.i386.rpm | SHA-256: 8bf13eb53b9e314da27e89708436877ffcc77b0e39a4c978c731db21683f9170 |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.