Updated kmod-hpsa packages that add one enhancement are now available for RedHat Enterprise Linux 6.

The kmod-hpsa packages provide kernel modules for controlling HP Smart ArrayControllers.This update adds the following enhancement:* The P840 storage controller for the HP DL380 Gen9 server was previously notsupported. Booting this server with the P840 controller failed with thefollowing error message:kernel:hpsa 0000:05:00.0: unrecognized board ID: 0x21cb103c, ignoringWith this update, the Red Hat Enterprise Linux Driver Update Program (DUP)includes the P840 controller. The HP DL380 Gen9 server now boots successfullywith the P840 controller. (BZ#1192651)Users of kmod-hpsa are advised to upgrade to these updated packages, which addthis enhancement.
Before applying this update, make sure all previously released errata relevantto your system have been applied.For details on how to apply this update, refer to:https://access.redhat.com/articles/11258Red Hat Enterprise Linux Desktop (v. 6)

SRPMS:
hpsa-3.4.4_1_RH4-1.el6_5.src.rpm
    MD5: f79e0fe939099e47671654af8c9da5e6SHA-256: f5d7dfba5c248ec287f588a00618fbdd50e83014ce08c322415c4ebd65e8acc8
 
IA-32:
hpsa-debuginfo-3.4.4_1_RH4-1.el6_5.i686.rpm
    MD5: 90031d1c2e4f156ba132cd98f8eb894aSHA-256: 77fadf9a602bbf7ae06c333b275a32aec07043d732ba9d332b5030914780b687
kmod-hpsa-3.4.4_1_RH4-1.el6_5.i686.rpm
    MD5: 55313c32c0a69a4d1e26908c419dce08SHA-256: 55092bc0cc1421d7e4b9a56a21e6523fa0640a3e0237d95a0b49def72e2f538c
 
x86_64:
hpsa-debuginfo-3.4.4_1_RH4-1.el6_5.x86_64.rpm
    MD5: c504e3ce2723d49f0c44608ad2bd6b35SHA-256: dd4e2e9ba7103ede0b2b91c2d5e3fd4c5afae3c5dc974f054c54585b03d8177f
kmod-hpsa-3.4.4_1_RH4-1.el6_5.x86_64.rpm
    MD5: 6c1d99ce6054aeb9c10e395f8b1ac3c0SHA-256: 0e156883dc6de54a33ada0c4c07aa14702dec798c9f8515661e2a3ea11e00c72
 
Red Hat Enterprise Linux HPC Node (v. 6)

SRPMS:
hpsa-3.4.4_1_RH4-1.el6_5.src.rpm
    MD5: f79e0fe939099e47671654af8c9da5e6SHA-256: f5d7dfba5c248ec287f588a00618fbdd50e83014ce08c322415c4ebd65e8acc8
 
x86_64:
hpsa-debuginfo-3.4.4_1_RH4-1.el6_5.x86_64.rpm
    MD5: c504e3ce2723d49f0c44608ad2bd6b35SHA-256: dd4e2e9ba7103ede0b2b91c2d5e3fd4c5afae3c5dc974f054c54585b03d8177f
kmod-hpsa-3.4.4_1_RH4-1.el6_5.x86_64.rpm
    MD5: 6c1d99ce6054aeb9c10e395f8b1ac3c0SHA-256: 0e156883dc6de54a33ada0c4c07aa14702dec798c9f8515661e2a3ea11e00c72
 
Red Hat Enterprise Linux Server (v. 6)

SRPMS:
hpsa-3.4.4_1_RH4-1.el6_5.src.rpm
    MD5: f79e0fe939099e47671654af8c9da5e6SHA-256: f5d7dfba5c248ec287f588a00618fbdd50e83014ce08c322415c4ebd65e8acc8
 
IA-32:
hpsa-debuginfo-3.4.4_1_RH4-1.el6_5.i686.rpm
    MD5: 90031d1c2e4f156ba132cd98f8eb894aSHA-256: 77fadf9a602bbf7ae06c333b275a32aec07043d732ba9d332b5030914780b687
kmod-hpsa-3.4.4_1_RH4-1.el6_5.i686.rpm
    MD5: 55313c32c0a69a4d1e26908c419dce08SHA-256: 55092bc0cc1421d7e4b9a56a21e6523fa0640a3e0237d95a0b49def72e2f538c
 
x86_64:
hpsa-debuginfo-3.4.4_1_RH4-1.el6_5.x86_64.rpm
    MD5: c504e3ce2723d49f0c44608ad2bd6b35SHA-256: dd4e2e9ba7103ede0b2b91c2d5e3fd4c5afae3c5dc974f054c54585b03d8177f
kmod-hpsa-3.4.4_1_RH4-1.el6_5.x86_64.rpm
    MD5: 6c1d99ce6054aeb9c10e395f8b1ac3c0SHA-256: 0e156883dc6de54a33ada0c4c07aa14702dec798c9f8515661e2a3ea11e00c72
 
Red Hat Enterprise Linux Server AUS (v. 6.5)

SRPMS:
hpsa-3.4.4_1_RH4-1.el6_5.src.rpm
    MD5: f79e0fe939099e47671654af8c9da5e6SHA-256: f5d7dfba5c248ec287f588a00618fbdd50e83014ce08c322415c4ebd65e8acc8
 
x86_64:
hpsa-debuginfo-3.4.4_1_RH4-1.el6_5.x86_64.rpm
    MD5: c504e3ce2723d49f0c44608ad2bd6b35SHA-256: dd4e2e9ba7103ede0b2b91c2d5e3fd4c5afae3c5dc974f054c54585b03d8177f
kmod-hpsa-3.4.4_1_RH4-1.el6_5.x86_64.rpm
    MD5: 6c1d99ce6054aeb9c10e395f8b1ac3c0SHA-256: 0e156883dc6de54a33ada0c4c07aa14702dec798c9f8515661e2a3ea11e00c72
 
Red Hat Enterprise Linux Server EUS (v. 6.5.z)

SRPMS:
hpsa-3.4.4_1_RH4-1.el6_5.src.rpm
    MD5: f79e0fe939099e47671654af8c9da5e6SHA-256: f5d7dfba5c248ec287f588a00618fbdd50e83014ce08c322415c4ebd65e8acc8
 
IA-32:
hpsa-debuginfo-3.4.4_1_RH4-1.el6_5.i686.rpm
    MD5: 90031d1c2e4f156ba132cd98f8eb894aSHA-256: 77fadf9a602bbf7ae06c333b275a32aec07043d732ba9d332b5030914780b687
kmod-hpsa-3.4.4_1_RH4-1.el6_5.i686.rpm
    MD5: 55313c32c0a69a4d1e26908c419dce08SHA-256: 55092bc0cc1421d7e4b9a56a21e6523fa0640a3e0237d95a0b49def72e2f538c
 
x86_64:
hpsa-debuginfo-3.4.4_1_RH4-1.el6_5.x86_64.rpm
    MD5: c504e3ce2723d49f0c44608ad2bd6b35SHA-256: dd4e2e9ba7103ede0b2b91c2d5e3fd4c5afae3c5dc974f054c54585b03d8177f
kmod-hpsa-3.4.4_1_RH4-1.el6_5.x86_64.rpm
    MD5: 6c1d99ce6054aeb9c10e395f8b1ac3c0SHA-256: 0e156883dc6de54a33ada0c4c07aa14702dec798c9f8515661e2a3ea11e00c72
 
Red Hat Enterprise Linux Server EUS (v. 6.6.z)

SRPMS:
hpsa-3.4.4_1_RH4-1.el6_5.src.rpm
    MD5: f79e0fe939099e47671654af8c9da5e6SHA-256: f5d7dfba5c248ec287f588a00618fbdd50e83014ce08c322415c4ebd65e8acc8
 
IA-32:
hpsa-debuginfo-3.4.4_1_RH4-1.el6_5.i686.rpm
    MD5: 90031d1c2e4f156ba132cd98f8eb894aSHA-256: 77fadf9a602bbf7ae06c333b275a32aec07043d732ba9d332b5030914780b687
kmod-hpsa-3.4.4_1_RH4-1.el6_5.i686.rpm
    MD5: 55313c32c0a69a4d1e26908c419dce08SHA-256: 55092bc0cc1421d7e4b9a56a21e6523fa0640a3e0237d95a0b49def72e2f538c
 
x86_64:
hpsa-debuginfo-3.4.4_1_RH4-1.el6_5.x86_64.rpm
    MD5: c504e3ce2723d49f0c44608ad2bd6b35SHA-256: dd4e2e9ba7103ede0b2b91c2d5e3fd4c5afae3c5dc974f054c54585b03d8177f
kmod-hpsa-3.4.4_1_RH4-1.el6_5.x86_64.rpm
    MD5: 6c1d99ce6054aeb9c10e395f8b1ac3c0SHA-256: 0e156883dc6de54a33ada0c4c07aa14702dec798c9f8515661e2a3ea11e00c72
 
Red Hat Enterprise Linux Workstation (v. 6)

SRPMS:
hpsa-3.4.4_1_RH4-1.el6_5.src.rpm
    MD5: f79e0fe939099e47671654af8c9da5e6SHA-256: f5d7dfba5c248ec287f588a00618fbdd50e83014ce08c322415c4ebd65e8acc8
 
IA-32:
hpsa-debuginfo-3.4.4_1_RH4-1.el6_5.i686.rpm
    MD5: 90031d1c2e4f156ba132cd98f8eb894aSHA-256: 77fadf9a602bbf7ae06c333b275a32aec07043d732ba9d332b5030914780b687
kmod-hpsa-3.4.4_1_RH4-1.el6_5.i686.rpm
    MD5: 55313c32c0a69a4d1e26908c419dce08SHA-256: 55092bc0cc1421d7e4b9a56a21e6523fa0640a3e0237d95a0b49def72e2f538c
 
x86_64:
hpsa-debuginfo-3.4.4_1_RH4-1.el6_5.x86_64.rpm
    MD5: c504e3ce2723d49f0c44608ad2bd6b35SHA-256: dd4e2e9ba7103ede0b2b91c2d5e3fd4c5afae3c5dc974f054c54585b03d8177f
kmod-hpsa-3.4.4_1_RH4-1.el6_5.x86_64.rpm
    MD5: 6c1d99ce6054aeb9c10e395f8b1ac3c0SHA-256: 0e156883dc6de54a33ada0c4c07aa14702dec798c9f8515661e2a3ea11e00c72
 
(The unlinked packages above are only available from the Red Hat Network)
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from:

Leave a Reply