Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Security Measurement
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Lightspeed
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Lightspeed
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHBA-2009:1347 - Bug Fix Advisory
Issued:
2009-09-02
Updated:
2009-09-02

RHBA-2009:1347 - Bug Fix Advisory

  • Overview
  • Updated Packages

Synopsis

dmraid bug-fix and enhancement update

Type/Severity

Bug Fix Advisory

Red Hat Lightspeed patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

Updated dmraid packages that fix several bugs and add enhancements
are now available.

Description

The dmraid packages contain the ATARAID/DDF1 activation tool that supports
RAID device discovery, RAID set activation, and displays properties for
ATARAID/DDF1 formatted RAID sets on Linux kernels using device-mapper.

This update applies the following bug fixes:

  • The dmraid logwatch-based email reporting feature has been moved from the dmraid-events package

into the new dmraid-events-logwatch package. Consequently, systems that use this dmraid feature need
to complete the following manual procedure:
1. Ensure the new 'dmraid-events-logwatch' package is installed.
2. Un-comment the functional portion of the "/etc/cron.d/dmeventd-logwatch" crontab file.

  • The sgpio and dmevent_tool applications get installed with the dmraid

package now.

  • The drive order for isw RAID01 sets is now identical with the OROM order.
  • Various issues with wrong LED rebuild and metadata states have been fixed.

This update adds the following enhancements:

  • Device Failure Monitoring, using the tools dmraid and dmevent_tool, is

now included in Red Hat Enterprise Linux 5.4 as a Technology Preview.
Device Failure Monitoring provides the ability to watch and report device
failures on component devices of RAID sets.

  • dmraid now automatically activates device event monitoring for the isw

metadata format (Intel IMSM). The dmevent_tool is still available to allow
for manual (de)registration.

  • dmraid now supports an "--rm_partitions" option to allow for removing

partition devices for RAID set component devices.

  • Activation of isw RAID sets on disks with long serial numbers is now

supported.

All dmraid users should upgrade to these updated packages, which resolve
these issues and add these enhancements.

Solution

Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.

This update is available via Red Hat Network. Details on how to use
the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/docs/DOC-11259

Affected Products

  • Red Hat Enterprise Linux Server 5 x86_64
  • Red Hat Enterprise Linux Server 5 ia64
  • Red Hat Enterprise Linux Server 5 i386
  • Red Hat Enterprise Linux Workstation 5 x86_64
  • Red Hat Enterprise Linux Workstation 5 i386
  • Red Hat Enterprise Linux Desktop 5 x86_64
  • Red Hat Enterprise Linux Desktop 5 i386
  • Red Hat Enterprise Linux for IBM z Systems 5 s390x
  • Red Hat Enterprise Linux for Power, big endian 5 ppc
  • Red Hat Enterprise Linux Server from RHUI 5 x86_64
  • Red Hat Enterprise Linux Server from RHUI 5 i386

Fixes

  • BZ - 479261 - There are no SGPIO application and dmevent_tool in default installation.
  • BZ - 479425 - Incorrect status displayed when disk is missing [status]
  • BZ - 480749 - Wrong meta data state for 5/6-disk arrays (CRC initializing) - RAID5
  • BZ - 483282 - dmraid -r will falsely toggle the OROM back to 'normal' status after a failed rebuild
  • BZ - 485400 - Add --rm_partitions cmdline option and underlying functionality
  • BZ - 496038 - PATCH: fix drive order in isw raid01 setups to match BIOS driver order
  • BZ - 496835 - PATCH: fails to activate isw raidset on disks with a long serialnummer
  • BZ - 505005 - dmraid always creates error mapping for the last device in an isw RAID5 set
  • BZ - 505007 - dmraid regression on raid45 target kernel status interface
  • BZ - 505011 - dmraid doesn't update isw metadata to OK during rebuild
  • BZ - 506893 - Segmentation fault for RAID5 when starting manual rebuild
  • BZ - 509355 - Segmentation fault for RAID5 two volume array when first disk is missing.
  • BZ - 512833 - No longer able to remove logwatch from system

CVEs

(none)

References

(none)

Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux Server 5

SRPM
dmraid-1.0.0.rc13-53.el5.src.rpm SHA-256: f22177f209a125fc4ef95437d708975700cee504d2e5d4fcf18b6c3ba46670f0
x86_64
dmraid-1.0.0.rc13-53.el5.x86_64.rpm SHA-256: 96bba95e563e6ac7b180e8d7a7685b99dd994d24e6588c412a3f8c2b32ae44db
dmraid-devel-1.0.0.rc13-53.el5.x86_64.rpm SHA-256: 88b5da15e7b978dad3fee714e36b8baf7dd43b00460664ac09df6702e731d6f6
dmraid-events-1.0.0.rc13-53.el5.x86_64.rpm SHA-256: 8b85aa528319e73999573f3882256cbcaba61ac07eb3f2a472724b3d90fd888e
dmraid-events-logwatch-1.0.0.rc13-53.el5.x86_64.rpm SHA-256: 10ccc33b4aeac2f0750ce3eb847fd3d8a53348ae26938b5c37254e99f23aa80e
ia64
dmraid-1.0.0.rc13-53.el5.ia64.rpm SHA-256: c1e73f294d4a18eb63dcaf7ff502cffcdd1f9bf849b1122633935bed63d59c77
dmraid-devel-1.0.0.rc13-53.el5.ia64.rpm SHA-256: 2d0126edac0c2e8648117db5d237a02ec83358f1562a8d77cd08c0c3848e6351
dmraid-events-1.0.0.rc13-53.el5.ia64.rpm SHA-256: 1be0f3545a058c93bfda81818b247b73d0b84813decb245ee2cb406a6e71ad41
dmraid-events-logwatch-1.0.0.rc13-53.el5.ia64.rpm SHA-256: ecfe48cfaee4e1016b5e3b804ace2035f0bc3c1ff1e9a0a25ca623a23c04c91e
i386
dmraid-1.0.0.rc13-53.el5.i386.rpm SHA-256: 14bb311e761c50887407e39654a5256348709efb9106b8e80a22354ca89b6630
dmraid-devel-1.0.0.rc13-53.el5.i386.rpm SHA-256: f54abc15af7c9a7a541058e39451de1fec8fe869dbb8d798f4152b6bbc4ab10c
dmraid-events-1.0.0.rc13-53.el5.i386.rpm SHA-256: 11cb2d512e00df67ac223dd586cff660a51ce2f7ac4a2c6f3a47ad7097c06478
dmraid-events-logwatch-1.0.0.rc13-53.el5.i386.rpm SHA-256: 0ed4a47fbc42b6a2b0ceab75380422fb5498bb705dd45e4183ac567b58acf0f7

Red Hat Enterprise Linux Workstation 5

SRPM
dmraid-1.0.0.rc13-53.el5.src.rpm SHA-256: f22177f209a125fc4ef95437d708975700cee504d2e5d4fcf18b6c3ba46670f0
x86_64
dmraid-1.0.0.rc13-53.el5.x86_64.rpm SHA-256: 96bba95e563e6ac7b180e8d7a7685b99dd994d24e6588c412a3f8c2b32ae44db
dmraid-devel-1.0.0.rc13-53.el5.x86_64.rpm SHA-256: 88b5da15e7b978dad3fee714e36b8baf7dd43b00460664ac09df6702e731d6f6
dmraid-events-1.0.0.rc13-53.el5.x86_64.rpm SHA-256: 8b85aa528319e73999573f3882256cbcaba61ac07eb3f2a472724b3d90fd888e
dmraid-events-logwatch-1.0.0.rc13-53.el5.x86_64.rpm SHA-256: 10ccc33b4aeac2f0750ce3eb847fd3d8a53348ae26938b5c37254e99f23aa80e
i386
dmraid-1.0.0.rc13-53.el5.i386.rpm SHA-256: 14bb311e761c50887407e39654a5256348709efb9106b8e80a22354ca89b6630
dmraid-devel-1.0.0.rc13-53.el5.i386.rpm SHA-256: f54abc15af7c9a7a541058e39451de1fec8fe869dbb8d798f4152b6bbc4ab10c
dmraid-events-1.0.0.rc13-53.el5.i386.rpm SHA-256: 11cb2d512e00df67ac223dd586cff660a51ce2f7ac4a2c6f3a47ad7097c06478
dmraid-events-logwatch-1.0.0.rc13-53.el5.i386.rpm SHA-256: 0ed4a47fbc42b6a2b0ceab75380422fb5498bb705dd45e4183ac567b58acf0f7

Red Hat Enterprise Linux Desktop 5

SRPM
dmraid-1.0.0.rc13-53.el5.src.rpm SHA-256: f22177f209a125fc4ef95437d708975700cee504d2e5d4fcf18b6c3ba46670f0
x86_64
dmraid-1.0.0.rc13-53.el5.x86_64.rpm SHA-256: 96bba95e563e6ac7b180e8d7a7685b99dd994d24e6588c412a3f8c2b32ae44db
dmraid-events-1.0.0.rc13-53.el5.x86_64.rpm SHA-256: 8b85aa528319e73999573f3882256cbcaba61ac07eb3f2a472724b3d90fd888e
dmraid-events-logwatch-1.0.0.rc13-53.el5.x86_64.rpm SHA-256: 10ccc33b4aeac2f0750ce3eb847fd3d8a53348ae26938b5c37254e99f23aa80e
i386
dmraid-1.0.0.rc13-53.el5.i386.rpm SHA-256: 14bb311e761c50887407e39654a5256348709efb9106b8e80a22354ca89b6630
dmraid-events-1.0.0.rc13-53.el5.i386.rpm SHA-256: 11cb2d512e00df67ac223dd586cff660a51ce2f7ac4a2c6f3a47ad7097c06478
dmraid-events-logwatch-1.0.0.rc13-53.el5.i386.rpm SHA-256: 0ed4a47fbc42b6a2b0ceab75380422fb5498bb705dd45e4183ac567b58acf0f7

Red Hat Enterprise Linux for IBM z Systems 5

SRPM
dmraid-1.0.0.rc13-53.el5.src.rpm SHA-256: f22177f209a125fc4ef95437d708975700cee504d2e5d4fcf18b6c3ba46670f0
s390x
dmraid-1.0.0.rc13-53.el5.s390x.rpm SHA-256: 35af5544ae1f2993b3c509f54da71c7d0c4f243d8a51bc2833fa58d61fba2553
dmraid-devel-1.0.0.rc13-53.el5.s390x.rpm SHA-256: 730fd42cb4d4c9710e578ca0e6a1b55030b0127eb979c67a91b85b5b883d79b9
dmraid-events-1.0.0.rc13-53.el5.s390x.rpm SHA-256: 9592c4a5351ec23032aeeebaf4f693e8d57ec6343256f7f8d81846ac3e522093
dmraid-events-logwatch-1.0.0.rc13-53.el5.s390x.rpm SHA-256: 6089e050275b9b5198fdf4fd6b77bdbe2c9e9306eaf436bc6b8db7e717a95c83

Red Hat Enterprise Linux for Power, big endian 5

SRPM
dmraid-1.0.0.rc13-53.el5.src.rpm SHA-256: f22177f209a125fc4ef95437d708975700cee504d2e5d4fcf18b6c3ba46670f0
ppc
dmraid-1.0.0.rc13-53.el5.ppc.rpm SHA-256: c399f833897a36c37ae89dea18a0fff806ad350398307c64b1f43e8e951fb515
dmraid-devel-1.0.0.rc13-53.el5.ppc.rpm SHA-256: 0cab8afa669953f7759bcaf63f68fc49794fcdf1a441e295b5cc951672e935d8
dmraid-events-1.0.0.rc13-53.el5.ppc.rpm SHA-256: 2d51d332bbc170543a6fb78bd61bddc21b45195f8ef11e170149d76172c9b958
dmraid-events-logwatch-1.0.0.rc13-53.el5.ppc.rpm SHA-256: 99cd213886acd02a568841713bc10b108fdb8a5f21605ff44ce920619857d028

Red Hat Enterprise Linux Server from RHUI 5

SRPM
dmraid-1.0.0.rc13-53.el5.src.rpm SHA-256: f22177f209a125fc4ef95437d708975700cee504d2e5d4fcf18b6c3ba46670f0
x86_64
dmraid-1.0.0.rc13-53.el5.x86_64.rpm SHA-256: 96bba95e563e6ac7b180e8d7a7685b99dd994d24e6588c412a3f8c2b32ae44db
dmraid-devel-1.0.0.rc13-53.el5.x86_64.rpm SHA-256: 88b5da15e7b978dad3fee714e36b8baf7dd43b00460664ac09df6702e731d6f6
dmraid-events-1.0.0.rc13-53.el5.x86_64.rpm SHA-256: 8b85aa528319e73999573f3882256cbcaba61ac07eb3f2a472724b3d90fd888e
dmraid-events-logwatch-1.0.0.rc13-53.el5.x86_64.rpm SHA-256: 10ccc33b4aeac2f0750ce3eb847fd3d8a53348ae26938b5c37254e99f23aa80e
i386
dmraid-1.0.0.rc13-53.el5.i386.rpm SHA-256: 14bb311e761c50887407e39654a5256348709efb9106b8e80a22354ca89b6630
dmraid-devel-1.0.0.rc13-53.el5.i386.rpm SHA-256: f54abc15af7c9a7a541058e39451de1fec8fe869dbb8d798f4152b6bbc4ab10c
dmraid-events-1.0.0.rc13-53.el5.i386.rpm SHA-256: 11cb2d512e00df67ac223dd586cff660a51ce2f7ac4a2c6f3a47ad7097c06478
dmraid-events-logwatch-1.0.0.rc13-53.el5.i386.rpm SHA-256: 0ed4a47fbc42b6a2b0ceab75380422fb5498bb705dd45e4183ac567b58acf0f7

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat LinkedIn YouTube Facebook X, formerly Twitter

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2025 Red Hat

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility