Skip to navigation

Enhancement Advisory new packages: kmod-mlx4_en, kmod-mlx4_ib, kmod-mlx4_core

Advisory: RHEA-2012:0739-1
Type: Product Enhancement Advisory
Severity: N/A
Issued on: 2012-06-14
Last updated on: 2012-06-14
Affected Products: Red Hat Enterprise Linux Desktop (v. 6)
Red Hat Enterprise Linux HPC Node (v. 6)
Red Hat Enterprise Linux Server (v. 6)
Red Hat Enterprise Linux Server AUS (v. 6.2)
Red Hat Enterprise Linux Server EUS (v. 6.2.z)
Red Hat Enterprise Linux Workstation (v. 6)

Details

New kmod-mlx4_en, kmod-mlx4_ib and kmod-mlx4_core packages are now available for
Red Hat Enterprise Linux 6.

The kmod-mlx4_en, kmod-mlx4_ib and kmod-mlx4_core packages provide kernel
modules for controlling Mellanox Technologies ConnectX PCI Express adapters.

The kmod-mlx4_en, kmod-mlx4_ib and kmod-mlx4_core packages provide temporary
drivers for the following hardware beyond what was delivered in Red Hat
Enterprise Linux 6.2:

* Mellanox Technologies ConnectX-3 PCI Express adapters

This enhancement update adds the kmod-mlx4_en, kmod-mlx4_ib and kmod-mlx4_core
packages to Red Hat Enterprise Linux 6 as part of the Red Hat Enterprise Linux
Driver Update Program. Due to a bug in the Red Hat Enterprise Linux 6.2
installer, these packages are not used during installation when included on a
Driver Update Disk. To work around this problem, switch to the second console by
pressing Crtl+Alt+F2 when the graphical welcome screen appears and execute the
following commands:

rmmod mlx4_en
rmmod mlx4_ib
rmmod mlx4_core
modprobe mlx4_en
modprobe mlx4_ib

Then switch back by pressing Alt+F6 and continue the installation.

Alternatively, copy the commands mentioned above into a kickstart
pre-installation script. (BZ#818705)

Only users requiring temporary driver support for the specific hardware noted
above should install these packages. Unless a system includes the exact hardware
explicitly supported by kmod-mlx4_en, kmod-mlx4_ib and kmod-mlx4_core packages,
these packages must not be installed.


Solution

Before applying this update, make sure that all previously-released errata
relevant to your system have been applied.

This update is available via Red Hat Network. Details on how to use the Red Hat
Network to apply this update are available at
https://access.redhat.com/kb/docs/DOC-11259

Updated packages

Red Hat Enterprise Linux Desktop (v. 6)

SRPMS:
mlx4_core-1.1.32.269-1.el6_2.src.rpm     MD5: 18d65641f4ea50988bdf7346f69aec95
SHA-256: 9a262b158ccd5bdedc080af9d334b15db03b11117d543ee5d5cff2eb7bd68e1a
mlx4_ib-1.0.32.269-1.el6_2.src.rpm     MD5: 3ceb0e10dbad7997140b1dc5d00117f8
SHA-256: 5975af33b06677ad180fb33585eb5261ed5511bd21a57253acad0e11be22dfa3
 
IA-32:
kmod-mlx4_core-1.1.32.269-1.el6_2.i686.rpm     MD5: 4b3f7381b7c30520bacce5fedfa1d0c9
SHA-256: 8ad84cf8a66bc666b9d37b5f811523b694f64bf8e3d07a91910c3edf606485da
kmod-mlx4_ib-1.0.32.269-1.el6_2.i686.rpm     MD5: 4ba0e0eaf7a208462aa9468740a477f0
SHA-256: b9142d65171b1e4fc915534d2224ab6c3da413b128ec85c852f6be8950941485
mlx4_core-debuginfo-1.1.32.269-1.el6_2.i686.rpm     MD5: 13c4ead7655b70f7361bbccb5584124c
SHA-256: 246bc64e266d5bebfd3d9152734a6b78e2ec1549957add747b78ef3561c75199
mlx4_ib-debuginfo-1.0.32.269-1.el6_2.i686.rpm     MD5: 2ab6b0db7a4dca58cc624939b26377a2
SHA-256: a34caa42a3e5a4f1a05c7ce71651387a778d5234f6aa1dbfde22651879343258
 
x86_64:
kmod-mlx4_core-1.1.32.269-1.el6_2.x86_64.rpm     MD5: 91b626991ba2aa6428fffed0e8fcd331
SHA-256: 05f702e39bb54b3004c7c8c799dbc466e8ca1e2e64573a2444b3c2baf929e76b
kmod-mlx4_ib-1.0.32.269-1.el6_2.x86_64.rpm     MD5: f38d2c71d1f9d683695796afeb22bb28
SHA-256: e7ce1c5da6aef19c0dc7098076d5a4edd5e1c160a63d95a336a7c18af00f329a
mlx4_core-debuginfo-1.1.32.269-1.el6_2.x86_64.rpm     MD5: 3651caf93e68582cd1665eb303e7f660
SHA-256: 925865ee3ca43e13fe87e6f252ce01fe6839808b96b70bbeea64cb5db9cae3e7
mlx4_ib-debuginfo-1.0.32.269-1.el6_2.x86_64.rpm     MD5: 1b61333fce034ef184f8e8c28c716863
SHA-256: 2723a8f54530e32cbafe04b0086c3f2e12600c8d641474e8f35fed629ba869fe
 
Red Hat Enterprise Linux HPC Node (v. 6)

SRPMS:
mlx4_core-1.1.32.269-1.el6_2.src.rpm     MD5: 18d65641f4ea50988bdf7346f69aec95
SHA-256: 9a262b158ccd5bdedc080af9d334b15db03b11117d543ee5d5cff2eb7bd68e1a
mlx4_ib-1.0.32.269-1.el6_2.src.rpm     MD5: 3ceb0e10dbad7997140b1dc5d00117f8
SHA-256: 5975af33b06677ad180fb33585eb5261ed5511bd21a57253acad0e11be22dfa3
 
x86_64:
kmod-mlx4_core-1.1.32.269-1.el6_2.x86_64.rpm     MD5: 91b626991ba2aa6428fffed0e8fcd331
SHA-256: 05f702e39bb54b3004c7c8c799dbc466e8ca1e2e64573a2444b3c2baf929e76b
kmod-mlx4_ib-1.0.32.269-1.el6_2.x86_64.rpm     MD5: f38d2c71d1f9d683695796afeb22bb28
SHA-256: e7ce1c5da6aef19c0dc7098076d5a4edd5e1c160a63d95a336a7c18af00f329a
mlx4_core-debuginfo-1.1.32.269-1.el6_2.x86_64.rpm     MD5: 3651caf93e68582cd1665eb303e7f660
SHA-256: 925865ee3ca43e13fe87e6f252ce01fe6839808b96b70bbeea64cb5db9cae3e7
mlx4_ib-debuginfo-1.0.32.269-1.el6_2.x86_64.rpm     MD5: 1b61333fce034ef184f8e8c28c716863
SHA-256: 2723a8f54530e32cbafe04b0086c3f2e12600c8d641474e8f35fed629ba869fe
 
Red Hat Enterprise Linux Server (v. 6)

SRPMS:
mlx4_core-1.1.32.269-1.el6_2.src.rpm     MD5: 18d65641f4ea50988bdf7346f69aec95
SHA-256: 9a262b158ccd5bdedc080af9d334b15db03b11117d543ee5d5cff2eb7bd68e1a
mlx4_en-2.0.32.269-1.el6_2.src.rpm     MD5: f7b0f3aa7a96ba19fe174925caeb150f
SHA-256: 940629fb93db9d83277c24d5ae3f09b87d64d270804d938337572b6557e71c30
mlx4_ib-1.0.32.269-1.el6_2.src.rpm     MD5: 3ceb0e10dbad7997140b1dc5d00117f8
SHA-256: 5975af33b06677ad180fb33585eb5261ed5511bd21a57253acad0e11be22dfa3
 
IA-32:
kmod-mlx4_core-1.1.32.269-1.el6_2.i686.rpm     MD5: 4b3f7381b7c30520bacce5fedfa1d0c9
SHA-256: 8ad84cf8a66bc666b9d37b5f811523b694f64bf8e3d07a91910c3edf606485da
kmod-mlx4_en-2.0.32.269-1.el6_2.i686.rpm     MD5: 3e213ae12293d0a458c54e7636da1b7a
SHA-256: c090a0f993721404c1ba7a250e2dd5149cfee9910036abb99ddf3e9d13344e91
kmod-mlx4_ib-1.0.32.269-1.el6_2.i686.rpm     MD5: 4ba0e0eaf7a208462aa9468740a477f0
SHA-256: b9142d65171b1e4fc915534d2224ab6c3da413b128ec85c852f6be8950941485
mlx4_core-debuginfo-1.1.32.269-1.el6_2.i686.rpm     MD5: 13c4ead7655b70f7361bbccb5584124c
SHA-256: 246bc64e266d5bebfd3d9152734a6b78e2ec1549957add747b78ef3561c75199
mlx4_en-debuginfo-2.0.32.269-1.el6_2.i686.rpm     MD5: 0d7c9ad997125522721da0003a932664
SHA-256: 9669b0c7ac9106400254b68883a882b46dc9cc96396fd5915bdb99b30d7afab6
mlx4_ib-debuginfo-1.0.32.269-1.el6_2.i686.rpm     MD5: 2ab6b0db7a4dca58cc624939b26377a2
SHA-256: a34caa42a3e5a4f1a05c7ce71651387a778d5234f6aa1dbfde22651879343258
 
x86_64:
kmod-mlx4_core-1.1.32.269-1.el6_2.x86_64.rpm     MD5: 91b626991ba2aa6428fffed0e8fcd331
SHA-256: 05f702e39bb54b3004c7c8c799dbc466e8ca1e2e64573a2444b3c2baf929e76b
kmod-mlx4_en-2.0.32.269-1.el6_2.x86_64.rpm     MD5: d3dbf4abc71625c325eaeb0d47452458
SHA-256: a7b7e0d97e06b6cb156cedb10b70477be866d6f46fe85fe658a30e6c59f55ba6
kmod-mlx4_ib-1.0.32.269-1.el6_2.x86_64.rpm     MD5: f38d2c71d1f9d683695796afeb22bb28
SHA-256: e7ce1c5da6aef19c0dc7098076d5a4edd5e1c160a63d95a336a7c18af00f329a
mlx4_core-debuginfo-1.1.32.269-1.el6_2.x86_64.rpm     MD5: 3651caf93e68582cd1665eb303e7f660
SHA-256: 925865ee3ca43e13fe87e6f252ce01fe6839808b96b70bbeea64cb5db9cae3e7
mlx4_en-debuginfo-2.0.32.269-1.el6_2.x86_64.rpm     MD5: 4a76f73e48de132c83a12bcc6fe087d0
SHA-256: c210a044c72210f0b1beff9661e8a6292ffd4546ec2393881557a650f9067a9f
mlx4_ib-debuginfo-1.0.32.269-1.el6_2.x86_64.rpm     MD5: 1b61333fce034ef184f8e8c28c716863
SHA-256: 2723a8f54530e32cbafe04b0086c3f2e12600c8d641474e8f35fed629ba869fe
 
Red Hat Enterprise Linux Server AUS (v. 6.2)

SRPMS:
mlx4_core-1.1.32.269-1.el6_2.src.rpm     MD5: 18d65641f4ea50988bdf7346f69aec95
SHA-256: 9a262b158ccd5bdedc080af9d334b15db03b11117d543ee5d5cff2eb7bd68e1a
mlx4_en-2.0.32.269-1.el6_2.src.rpm     MD5: f7b0f3aa7a96ba19fe174925caeb150f
SHA-256: 940629fb93db9d83277c24d5ae3f09b87d64d270804d938337572b6557e71c30
mlx4_ib-1.0.32.269-1.el6_2.src.rpm     MD5: 3ceb0e10dbad7997140b1dc5d00117f8
SHA-256: 5975af33b06677ad180fb33585eb5261ed5511bd21a57253acad0e11be22dfa3
 
x86_64:
kmod-mlx4_core-1.1.32.269-1.el6_2.x86_64.rpm     MD5: 91b626991ba2aa6428fffed0e8fcd331
SHA-256: 05f702e39bb54b3004c7c8c799dbc466e8ca1e2e64573a2444b3c2baf929e76b
kmod-mlx4_en-2.0.32.269-1.el6_2.x86_64.rpm     MD5: d3dbf4abc71625c325eaeb0d47452458
SHA-256: a7b7e0d97e06b6cb156cedb10b70477be866d6f46fe85fe658a30e6c59f55ba6
kmod-mlx4_ib-1.0.32.269-1.el6_2.x86_64.rpm     MD5: f38d2c71d1f9d683695796afeb22bb28
SHA-256: e7ce1c5da6aef19c0dc7098076d5a4edd5e1c160a63d95a336a7c18af00f329a
mlx4_core-debuginfo-1.1.32.269-1.el6_2.x86_64.rpm     MD5: 3651caf93e68582cd1665eb303e7f660
SHA-256: 925865ee3ca43e13fe87e6f252ce01fe6839808b96b70bbeea64cb5db9cae3e7
mlx4_en-debuginfo-2.0.32.269-1.el6_2.x86_64.rpm     MD5: 4a76f73e48de132c83a12bcc6fe087d0
SHA-256: c210a044c72210f0b1beff9661e8a6292ffd4546ec2393881557a650f9067a9f
mlx4_ib-debuginfo-1.0.32.269-1.el6_2.x86_64.rpm     MD5: 1b61333fce034ef184f8e8c28c716863
SHA-256: 2723a8f54530e32cbafe04b0086c3f2e12600c8d641474e8f35fed629ba869fe
 
Red Hat Enterprise Linux Server EUS (v. 6.2.z)

SRPMS:
mlx4_core-1.1.32.269-1.el6_2.src.rpm     MD5: 18d65641f4ea50988bdf7346f69aec95
SHA-256: 9a262b158ccd5bdedc080af9d334b15db03b11117d543ee5d5cff2eb7bd68e1a
mlx4_en-2.0.32.269-1.el6_2.src.rpm     MD5: f7b0f3aa7a96ba19fe174925caeb150f
SHA-256: 940629fb93db9d83277c24d5ae3f09b87d64d270804d938337572b6557e71c30
mlx4_ib-1.0.32.269-1.el6_2.src.rpm     MD5: 3ceb0e10dbad7997140b1dc5d00117f8
SHA-256: 5975af33b06677ad180fb33585eb5261ed5511bd21a57253acad0e11be22dfa3
 
IA-32:
kmod-mlx4_core-1.1.32.269-1.el6_2.i686.rpm     MD5: 4b3f7381b7c30520bacce5fedfa1d0c9
SHA-256: 8ad84cf8a66bc666b9d37b5f811523b694f64bf8e3d07a91910c3edf606485da
kmod-mlx4_en-2.0.32.269-1.el6_2.i686.rpm     MD5: 3e213ae12293d0a458c54e7636da1b7a
SHA-256: c090a0f993721404c1ba7a250e2dd5149cfee9910036abb99ddf3e9d13344e91
kmod-mlx4_ib-1.0.32.269-1.el6_2.i686.rpm     MD5: 4ba0e0eaf7a208462aa9468740a477f0
SHA-256: b9142d65171b1e4fc915534d2224ab6c3da413b128ec85c852f6be8950941485
mlx4_core-debuginfo-1.1.32.269-1.el6_2.i686.rpm     MD5: 13c4ead7655b70f7361bbccb5584124c
SHA-256: 246bc64e266d5bebfd3d9152734a6b78e2ec1549957add747b78ef3561c75199
mlx4_en-debuginfo-2.0.32.269-1.el6_2.i686.rpm     MD5: 0d7c9ad997125522721da0003a932664
SHA-256: 9669b0c7ac9106400254b68883a882b46dc9cc96396fd5915bdb99b30d7afab6
mlx4_ib-debuginfo-1.0.32.269-1.el6_2.i686.rpm     MD5: 2ab6b0db7a4dca58cc624939b26377a2
SHA-256: a34caa42a3e5a4f1a05c7ce71651387a778d5234f6aa1dbfde22651879343258
 
x86_64:
kmod-mlx4_core-1.1.32.269-1.el6_2.x86_64.rpm     MD5: 91b626991ba2aa6428fffed0e8fcd331
SHA-256: 05f702e39bb54b3004c7c8c799dbc466e8ca1e2e64573a2444b3c2baf929e76b
kmod-mlx4_en-2.0.32.269-1.el6_2.x86_64.rpm     MD5: d3dbf4abc71625c325eaeb0d47452458
SHA-256: a7b7e0d97e06b6cb156cedb10b70477be866d6f46fe85fe658a30e6c59f55ba6
kmod-mlx4_ib-1.0.32.269-1.el6_2.x86_64.rpm     MD5: f38d2c71d1f9d683695796afeb22bb28
SHA-256: e7ce1c5da6aef19c0dc7098076d5a4edd5e1c160a63d95a336a7c18af00f329a
mlx4_core-debuginfo-1.1.32.269-1.el6_2.x86_64.rpm     MD5: 3651caf93e68582cd1665eb303e7f660
SHA-256: 925865ee3ca43e13fe87e6f252ce01fe6839808b96b70bbeea64cb5db9cae3e7
mlx4_en-debuginfo-2.0.32.269-1.el6_2.x86_64.rpm     MD5: 4a76f73e48de132c83a12bcc6fe087d0
SHA-256: c210a044c72210f0b1beff9661e8a6292ffd4546ec2393881557a650f9067a9f
mlx4_ib-debuginfo-1.0.32.269-1.el6_2.x86_64.rpm     MD5: 1b61333fce034ef184f8e8c28c716863
SHA-256: 2723a8f54530e32cbafe04b0086c3f2e12600c8d641474e8f35fed629ba869fe
 
Red Hat Enterprise Linux Workstation (v. 6)

SRPMS:
mlx4_core-1.1.32.269-1.el6_2.src.rpm     MD5: 18d65641f4ea50988bdf7346f69aec95
SHA-256: 9a262b158ccd5bdedc080af9d334b15db03b11117d543ee5d5cff2eb7bd68e1a
mlx4_ib-1.0.32.269-1.el6_2.src.rpm     MD5: 3ceb0e10dbad7997140b1dc5d00117f8
SHA-256: 5975af33b06677ad180fb33585eb5261ed5511bd21a57253acad0e11be22dfa3
 
IA-32:
kmod-mlx4_core-1.1.32.269-1.el6_2.i686.rpm     MD5: 4b3f7381b7c30520bacce5fedfa1d0c9
SHA-256: 8ad84cf8a66bc666b9d37b5f811523b694f64bf8e3d07a91910c3edf606485da
kmod-mlx4_ib-1.0.32.269-1.el6_2.i686.rpm     MD5: 4ba0e0eaf7a208462aa9468740a477f0
SHA-256: b9142d65171b1e4fc915534d2224ab6c3da413b128ec85c852f6be8950941485
mlx4_core-debuginfo-1.1.32.269-1.el6_2.i686.rpm     MD5: 13c4ead7655b70f7361bbccb5584124c
SHA-256: 246bc64e266d5bebfd3d9152734a6b78e2ec1549957add747b78ef3561c75199
mlx4_ib-debuginfo-1.0.32.269-1.el6_2.i686.rpm     MD5: 2ab6b0db7a4dca58cc624939b26377a2
SHA-256: a34caa42a3e5a4f1a05c7ce71651387a778d5234f6aa1dbfde22651879343258
 
x86_64:
kmod-mlx4_core-1.1.32.269-1.el6_2.x86_64.rpm     MD5: 91b626991ba2aa6428fffed0e8fcd331
SHA-256: 05f702e39bb54b3004c7c8c799dbc466e8ca1e2e64573a2444b3c2baf929e76b
kmod-mlx4_ib-1.0.32.269-1.el6_2.x86_64.rpm     MD5: f38d2c71d1f9d683695796afeb22bb28
SHA-256: e7ce1c5da6aef19c0dc7098076d5a4edd5e1c160a63d95a336a7c18af00f329a
mlx4_core-debuginfo-1.1.32.269-1.el6_2.x86_64.rpm     MD5: 3651caf93e68582cd1665eb303e7f660
SHA-256: 925865ee3ca43e13fe87e6f252ce01fe6839808b96b70bbeea64cb5db9cae3e7
mlx4_ib-debuginfo-1.0.32.269-1.el6_2.x86_64.rpm     MD5: 1b61333fce034ef184f8e8c28c716863
SHA-256: 2723a8f54530e32cbafe04b0086c3f2e12600c8d641474e8f35fed629ba869fe
 
(The unlinked packages above are only available from the Red Hat Network)


These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/