- Issued:
- 2013-11-20
- Updated:
- 2013-11-20
RHBA-2013:1683 - Bug Fix Advisory
Synopsis
fcoe-target-utils bug fix update
Type/Severity
Bug Fix Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
Updated fcoe-target-utils packages that fix several bugs are now available for
Red Hat Enterprise Linux 6.
Description
The fcoe-target-utils packages contain a command-line interface for configuring
FCoE LUNs (Fibre Channel over Ethernet Logical Unit Numbers) and backstores.
This update fixes the following bugs:
- Due to an error leaving a device marked as in-use, attempts to map a block
backstore that had been previously mapped would fail. With this update, mappings
of block backstores are properly released, and remapping a block device now
succeeds. (BZ#854708)
- Prior to this update, the kernel terminated unexpectedly when the fcoe-target
daemon stopped. A patch has been provided to fix this bug, and the kernel now no
longer crashes. (BZ#880542)
- Previously, the target reported support for sequence-level error recovery
erroneously. Consequently, interrupting the connection between the FCoE target
and a bnx2fc initiator could cause the initiator to erroneously perform
sequence-level error recovery instead of exchange-level error, leading to a
failure of all devices attached to the target. This bug has been fixed, and
connections with a bnx2fc initiator may now be interrupted without disrupting
other devices. (BZ#882121)
- Prior to this update, there was an error in the python-rtslib library.
Consequently, when creating a pscsi (SCSI pass-through) storage object in the
targetcli utility, the python-rtslib returned a traceback. The error in the
library has been fixed, and pscsi storage objects are now created without
errors. (BZ#912210)
- Since the fcoe-utils command-line interface is required by the
fcoe-target-utils packages and is not supported on the s390x architecture,
fcoe-target-utils will not work properly on s390x, and thus has been removed.
(BZ#999902)
Users of fcoe-target-utils are advised to upgrade to these updated packages,
which fix these bugs.
Solution
Before applying this update, make sure all previously released errata
relevant to your system have been applied.
This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/site/articles/11258
Affected Products
- Red Hat Enterprise Linux Server 6 x86_64
- Red Hat Enterprise Linux Server 6 i386
- Red Hat Enterprise Linux Server from RHUI 6 x86_64
- Red Hat Enterprise Linux Server from RHUI 6 i386
- Red Hat Enterprise Linux Server - Extended Life Cycle Support 6 x86_64
- Red Hat Enterprise Linux Server - Extended Life Cycle Support 6 i386
- Red Hat Enterprise Linux Workstation 6 x86_64
- Red Hat Enterprise Linux Workstation 6 i386
- Red Hat Enterprise Linux for Power, big endian 6 ppc64
- Red Hat Enterprise Linux Server - Extended Life Cycle Support Extension 6 x86_64
- Red Hat Enterprise Linux Server - Extended Life Cycle Support Extension 6 i386
Fixes
- BZ - 854708 - EBUSY error when mapping FCoE target to iblock backend
- BZ - 891853 - 'targetcli ls /' without fcoe-target daemon will got miss-leading output "Could not create RTSRoot in configFS."
- BZ - 912210 - Got python call trace when creating pscsi storage object in targetcli.
- BZ - 999902 - ExcludeArch s390x
CVEs
(none)
References
(none)
Red Hat Enterprise Linux Server 6
SRPM | |
---|---|
fcoe-target-utils-2.0rc1.fb16-5.el6.src.rpm | SHA-256: bd2ca49bc3faf4495d268f2d754183896e2ebca364077a8bbf7d5e60fe214d4a |
x86_64 | |
fcoe-target-utils-2.0rc1.fb16-5.el6.noarch.rpm | SHA-256: 795a19cfc0829e12646edbf235f2a6ef8f6481499a8338e4a8fd9f29c93f466b |
fcoe-target-utils-2.0rc1.fb16-5.el6.noarch.rpm | SHA-256: 795a19cfc0829e12646edbf235f2a6ef8f6481499a8338e4a8fd9f29c93f466b |
i386 | |
fcoe-target-utils-2.0rc1.fb16-5.el6.noarch.rpm | SHA-256: 795a19cfc0829e12646edbf235f2a6ef8f6481499a8338e4a8fd9f29c93f466b |
Red Hat Enterprise Linux Server from RHUI 6
SRPM | |
---|---|
fcoe-target-utils-2.0rc1.fb16-5.el6.src.rpm | SHA-256: bd2ca49bc3faf4495d268f2d754183896e2ebca364077a8bbf7d5e60fe214d4a |
x86_64 | |
fcoe-target-utils-2.0rc1.fb16-5.el6.noarch.rpm | SHA-256: 795a19cfc0829e12646edbf235f2a6ef8f6481499a8338e4a8fd9f29c93f466b |
i386 | |
fcoe-target-utils-2.0rc1.fb16-5.el6.noarch.rpm | SHA-256: 795a19cfc0829e12646edbf235f2a6ef8f6481499a8338e4a8fd9f29c93f466b |
Red Hat Enterprise Linux Server - Extended Life Cycle Support 6
SRPM | |
---|---|
fcoe-target-utils-2.0rc1.fb16-5.el6.src.rpm | SHA-256: bd2ca49bc3faf4495d268f2d754183896e2ebca364077a8bbf7d5e60fe214d4a |
x86_64 | |
fcoe-target-utils-2.0rc1.fb16-5.el6.noarch.rpm | SHA-256: 795a19cfc0829e12646edbf235f2a6ef8f6481499a8338e4a8fd9f29c93f466b |
i386 | |
fcoe-target-utils-2.0rc1.fb16-5.el6.noarch.rpm | SHA-256: 795a19cfc0829e12646edbf235f2a6ef8f6481499a8338e4a8fd9f29c93f466b |
Red Hat Enterprise Linux Workstation 6
SRPM | |
---|---|
fcoe-target-utils-2.0rc1.fb16-5.el6.src.rpm | SHA-256: bd2ca49bc3faf4495d268f2d754183896e2ebca364077a8bbf7d5e60fe214d4a |
x86_64 | |
fcoe-target-utils-2.0rc1.fb16-5.el6.noarch.rpm | SHA-256: 795a19cfc0829e12646edbf235f2a6ef8f6481499a8338e4a8fd9f29c93f466b |
i386 | |
fcoe-target-utils-2.0rc1.fb16-5.el6.noarch.rpm | SHA-256: 795a19cfc0829e12646edbf235f2a6ef8f6481499a8338e4a8fd9f29c93f466b |
Red Hat Enterprise Linux for Power, big endian 6
SRPM | |
---|---|
fcoe-target-utils-2.0rc1.fb16-5.el6.src.rpm | SHA-256: bd2ca49bc3faf4495d268f2d754183896e2ebca364077a8bbf7d5e60fe214d4a |
ppc64 | |
fcoe-target-utils-2.0rc1.fb16-5.el6.noarch.rpm | SHA-256: 795a19cfc0829e12646edbf235f2a6ef8f6481499a8338e4a8fd9f29c93f466b |
Red Hat Enterprise Linux Server - Extended Life Cycle Support Extension 6
SRPM | |
---|---|
fcoe-target-utils-2.0rc1.fb16-5.el6.src.rpm | SHA-256: bd2ca49bc3faf4495d268f2d754183896e2ebca364077a8bbf7d5e60fe214d4a |
x86_64 | |
fcoe-target-utils-2.0rc1.fb16-5.el6.noarch.rpm | SHA-256: 795a19cfc0829e12646edbf235f2a6ef8f6481499a8338e4a8fd9f29c93f466b |
i386 | |
fcoe-target-utils-2.0rc1.fb16-5.el6.noarch.rpm | SHA-256: 795a19cfc0829e12646edbf235f2a6ef8f6481499a8338e4a8fd9f29c93f466b |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.