- Issued:
- 2009-01-20
- Updated:
- 2009-01-20
RHEA-2009:0078 - Product Enhancement Advisory
Synopsis
dmraid bug fix and enhancement update
Type/Severity
Product Enhancement Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
Updated dmraid packages that fix several bugs and add various enhancements
are now available.
Description
The dmraid packages contain the ATARAID/DDF1 activation tool that supports
RAID device discovery, RAID set activation, and displays properties for
ATARAID/DDF1 formatted RAID sets on Linux kernels using device-mapper.
Device Failure Monitoring, using the tools dmraid and dmevent_tool, is now
included in Red Hat Enterprise Linux 5.3 as a Technology Preview. Device
Failure Monitoring provides the ability to watch and report device failures
on component devices of RAID sets.
These updated packages also provide the following enhancements:
- support for Intel Software-based (ICH9 and ICH10) user-space RAID-5 and
RAID-10 creation, rebuilding, and error-handling, among other capabilities.
- user-space event-handling is now supported for RAID setups, which allows
applications to be notified of the status of drives so that alerts can be
generated and corrective actions taken.
In addition, these updated dmraid packages provide fixes for the following
bugs:
- dmraid failed to activate RAID subsets, and also incorrectly returned the
name of the subset instead of the superset when the command "dmraid -s
- craidname" was run.
- a coding error caused dmraid to segmentation fault on big-endian
platforms.
- rebuilding a RAID-5 array caused metadata to become corrupted and to
"disappear" because the metadata length calculation was greater than two
sectors, which dmraid's Intel Software RAID format is not able to handle.
- the dmraid utility did not properly handle compound RAID sets in group
sets, which could render systems unable to boot. Only the superset's name
could be used on the command line, but subset names could not be. In these
updated packages, this has been fixed so that dmraid is able to find RAID
devices specified by subset name, thus resolving the issue.
Users are advised to upgrade to these updated dmraid packages, which
resolve these issues and add these enhancements.
Solution
Before applying this update, make sure that all previously-released errata
relevant to your system have been applied.
This update is available via Red Hat Network. Details on how to use the Red
Hat Network to apply this update are available at
http://kbase.redhat.com/faq/docs/DOC-11259
Affected Products
- Red Hat Enterprise Linux Server 5 x86_64
- Red Hat Enterprise Linux Server 5 ia64
- Red Hat Enterprise Linux Server 5 i386
- Red Hat Enterprise Linux Workstation 5 x86_64
- Red Hat Enterprise Linux Workstation 5 i386
- Red Hat Enterprise Linux Desktop 5 x86_64
- Red Hat Enterprise Linux Desktop 5 i386
- Red Hat Enterprise Linux for IBM z Systems 5 s390x
- Red Hat Enterprise Linux for Power, big endian 5 ppc
- Red Hat Enterprise Linux Server from RHUI 5 x86_64
- Red Hat Enterprise Linux Server from RHUI 5 i386
Fixes
- BZ - 253001 - dmraid segfault on big-endian platforms
- BZ - 337611 - Kernel panic after installation and reboot, RHEL 5.1b Client Snap8 on RAID0 with dmraid
- BZ - 432812 - dmraid is unable to activate a subset
- BZ - 463408 - unaligned access from dlopen of libdmraid.so
- BZ - 474757 - postinstall scriptlet fails for dmraid 1.0.0.rc13 19
- BZ - 475385 - RAID10 - Install ERROR appears during installation of RAID10 isw dmraid raid array in RHEL 5.3 Snapshot5
- BZ - 475539 - led support compilation error in dmraid
CVEs
(none)
References
(none)
Red Hat Enterprise Linux Server 5
SRPM | |
---|---|
dmraid-1.0.0.rc13-33.el5.src.rpm | SHA-256: c5dc7bccae462d150c01bdebe827ed7a444b0ca92773a6a35d93779ac5180ae5 |
x86_64 | |
dmraid-1.0.0.rc13-33.el5.x86_64.rpm | SHA-256: d30afca33d65f2331f6dcaddf4bc2bf11908544ba2591d305a2114bac801c898 |
dmraid-devel-1.0.0.rc13-33.el5.x86_64.rpm | SHA-256: 7bda7ed656d48b2a96fe0aac34754d1a512208b254c53f747045276463bcee9a |
dmraid-events-1.0.0.rc13-33.el5.x86_64.rpm | SHA-256: 9ebecf5b5d1d4ea39167c4a6256ed4582884839b4833b4acd0b1fe533e7d9484 |
ia64 | |
dmraid-1.0.0.rc13-33.el5.ia64.rpm | SHA-256: 14e653125edf5c3cc0711131252dfb51582b2e940d62e34d95e71d90c028fd66 |
dmraid-devel-1.0.0.rc13-33.el5.ia64.rpm | SHA-256: 04d674ac1d412950e65ce8a49697102e870f521d1c167f6c3dafb25841f4ac63 |
dmraid-events-1.0.0.rc13-33.el5.ia64.rpm | SHA-256: 76a375985266b7121679d1a5de063d3f115d855179d1787b4653f81c66999eac |
i386 | |
dmraid-1.0.0.rc13-33.el5.i386.rpm | SHA-256: 0799ccf8405ad11f7bb1a46c9c684e5ba8583a40760bdcfa739a8c3dd2a81a53 |
dmraid-devel-1.0.0.rc13-33.el5.i386.rpm | SHA-256: e9a5283d29a0d33e6af1953a427fa26b46fe9f26e956d289d3c44b7638c957e5 |
dmraid-events-1.0.0.rc13-33.el5.i386.rpm | SHA-256: 47eddfcef53f9efaaf84fadf732fa611c6a793e1ebac21d21e40473152801ef6 |
Red Hat Enterprise Linux Workstation 5
SRPM | |
---|---|
dmraid-1.0.0.rc13-33.el5.src.rpm | SHA-256: c5dc7bccae462d150c01bdebe827ed7a444b0ca92773a6a35d93779ac5180ae5 |
x86_64 | |
dmraid-1.0.0.rc13-33.el5.x86_64.rpm | SHA-256: d30afca33d65f2331f6dcaddf4bc2bf11908544ba2591d305a2114bac801c898 |
dmraid-devel-1.0.0.rc13-33.el5.x86_64.rpm | SHA-256: 7bda7ed656d48b2a96fe0aac34754d1a512208b254c53f747045276463bcee9a |
dmraid-events-1.0.0.rc13-33.el5.x86_64.rpm | SHA-256: 9ebecf5b5d1d4ea39167c4a6256ed4582884839b4833b4acd0b1fe533e7d9484 |
i386 | |
dmraid-1.0.0.rc13-33.el5.i386.rpm | SHA-256: 0799ccf8405ad11f7bb1a46c9c684e5ba8583a40760bdcfa739a8c3dd2a81a53 |
dmraid-devel-1.0.0.rc13-33.el5.i386.rpm | SHA-256: e9a5283d29a0d33e6af1953a427fa26b46fe9f26e956d289d3c44b7638c957e5 |
dmraid-events-1.0.0.rc13-33.el5.i386.rpm | SHA-256: 47eddfcef53f9efaaf84fadf732fa611c6a793e1ebac21d21e40473152801ef6 |
Red Hat Enterprise Linux Desktop 5
SRPM | |
---|---|
dmraid-1.0.0.rc13-33.el5.src.rpm | SHA-256: c5dc7bccae462d150c01bdebe827ed7a444b0ca92773a6a35d93779ac5180ae5 |
x86_64 | |
dmraid-1.0.0.rc13-33.el5.x86_64.rpm | SHA-256: d30afca33d65f2331f6dcaddf4bc2bf11908544ba2591d305a2114bac801c898 |
dmraid-events-1.0.0.rc13-33.el5.x86_64.rpm | SHA-256: 9ebecf5b5d1d4ea39167c4a6256ed4582884839b4833b4acd0b1fe533e7d9484 |
i386 | |
dmraid-1.0.0.rc13-33.el5.i386.rpm | SHA-256: 0799ccf8405ad11f7bb1a46c9c684e5ba8583a40760bdcfa739a8c3dd2a81a53 |
dmraid-events-1.0.0.rc13-33.el5.i386.rpm | SHA-256: 47eddfcef53f9efaaf84fadf732fa611c6a793e1ebac21d21e40473152801ef6 |
Red Hat Enterprise Linux for IBM z Systems 5
SRPM | |
---|---|
dmraid-1.0.0.rc13-33.el5.src.rpm | SHA-256: c5dc7bccae462d150c01bdebe827ed7a444b0ca92773a6a35d93779ac5180ae5 |
s390x | |
dmraid-1.0.0.rc13-33.el5.s390x.rpm | SHA-256: 36a26d55bd00a14d6a274767e390c5f3d3182b9e9d692a28d278a3ebb889ebcd |
dmraid-devel-1.0.0.rc13-33.el5.s390x.rpm | SHA-256: ad9f312f4f19e2394af83d42720c01a9b88b63dd09b127bd365530d7a5932eae |
dmraid-events-1.0.0.rc13-33.el5.s390x.rpm | SHA-256: 32102b4cbc4a819d960b55a636f214310e35a459077df30bf1c16c7ead432119 |
Red Hat Enterprise Linux for Power, big endian 5
SRPM | |
---|---|
dmraid-1.0.0.rc13-33.el5.src.rpm | SHA-256: c5dc7bccae462d150c01bdebe827ed7a444b0ca92773a6a35d93779ac5180ae5 |
ppc | |
dmraid-1.0.0.rc13-33.el5.ppc.rpm | SHA-256: 5a535a265341cad143a6482cb82e1d472d69d2b33f15551e8a90fa1a2e7c94fb |
dmraid-devel-1.0.0.rc13-33.el5.ppc.rpm | SHA-256: ee184099eaf2bed08ec430a1d642b4d4b0096d6006ba501b1f6d6ba134b319fe |
dmraid-events-1.0.0.rc13-33.el5.ppc.rpm | SHA-256: bdb504d66e5eaf5bdcf125d994fd754edd03e27908cc617b65323622606b4fe0 |
Red Hat Enterprise Linux Server from RHUI 5
SRPM | |
---|---|
dmraid-1.0.0.rc13-33.el5.src.rpm | SHA-256: c5dc7bccae462d150c01bdebe827ed7a444b0ca92773a6a35d93779ac5180ae5 |
x86_64 | |
dmraid-1.0.0.rc13-33.el5.x86_64.rpm | SHA-256: d30afca33d65f2331f6dcaddf4bc2bf11908544ba2591d305a2114bac801c898 |
dmraid-devel-1.0.0.rc13-33.el5.x86_64.rpm | SHA-256: 7bda7ed656d48b2a96fe0aac34754d1a512208b254c53f747045276463bcee9a |
dmraid-events-1.0.0.rc13-33.el5.x86_64.rpm | SHA-256: 9ebecf5b5d1d4ea39167c4a6256ed4582884839b4833b4acd0b1fe533e7d9484 |
i386 | |
dmraid-1.0.0.rc13-33.el5.i386.rpm | SHA-256: 0799ccf8405ad11f7bb1a46c9c684e5ba8583a40760bdcfa739a8c3dd2a81a53 |
dmraid-devel-1.0.0.rc13-33.el5.i386.rpm | SHA-256: e9a5283d29a0d33e6af1953a427fa26b46fe9f26e956d289d3c44b7638c957e5 |
dmraid-events-1.0.0.rc13-33.el5.i386.rpm | SHA-256: 47eddfcef53f9efaaf84fadf732fa611c6a793e1ebac21d21e40473152801ef6 |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.