New kmod-mpt3sas packages are now available for Red Hat Enterprise Linux 7.
The kmod-mpt3sas packages contain the LSI MPT Fusion SAS 3.0 Device Driverkernel module, which adds official support for the mpt3sas devices.The PCI IDssupported by this package are:1000:00C01000:00C11000:00C21000:00C31000:00C41000:00C51000:00C61000:00C71000:00C81000:00C9The kernel modules delivered by this erratum have been made available aspart of the Red Hat Driver Update Program, which provides updated kernelmodules that add support for selected devices in advance of the next RedHat Enterprise Linux minor update release. We strongly recommend thatthese kernel modules be only used when it is necessary to enable thespecific hardware mentioned in this erratum. Partners and customersshould continue to use the driver that is shipped in the latest Red HatEnterprise Linux kernel for all other devices that require this driver.(BZ#1363619)All users who require kmod-mpt3sas are advised to install these new packages.
Before applying this update, make sure all previously released erratarelevant to your system have been applied.For details on how to apply this update, refer to:https://access.redhat.com/articles/11258Red Hat Enterprise Linux Desktop (v. 7)

SRPMS:
mpt3sas-13.100.00.00-1.el7_2.src.rpm
    MD5: 9e0583bf1716d626d4193f95c1b86c7bSHA-256: 53d59db182842e10e1827e8362db6f44a31a42e603eb025e2b4f247e28013755
 
x86_64:
kmod-mpt3sas-13.100.00.00-1.el7_2.x86_64.rpm
    MD5: 83317610f5fd981efd9499d4a140d705SHA-256: 6cd5ba325efe64bccb25477a53975627f81ba90daf7e2afc5643f6c84b213421
mpt3sas-debuginfo-13.100.00.00-1.el7_2.x86_64.rpm
    MD5: 17210e8b5d1cacd5cc65b9a37e62924bSHA-256: f8014e351fe4fac37c4b0393b5b8ac5935b868073462d413f52169ba7648f30a
 
Red Hat Enterprise Linux HPC Node (v. 7)

SRPMS:
mpt3sas-13.100.00.00-1.el7_2.src.rpm
    MD5: 9e0583bf1716d626d4193f95c1b86c7bSHA-256: 53d59db182842e10e1827e8362db6f44a31a42e603eb025e2b4f247e28013755
 
x86_64:
kmod-mpt3sas-13.100.00.00-1.el7_2.x86_64.rpm
    MD5: 83317610f5fd981efd9499d4a140d705SHA-256: 6cd5ba325efe64bccb25477a53975627f81ba90daf7e2afc5643f6c84b213421
mpt3sas-debuginfo-13.100.00.00-1.el7_2.x86_64.rpm
    MD5: 17210e8b5d1cacd5cc65b9a37e62924bSHA-256: f8014e351fe4fac37c4b0393b5b8ac5935b868073462d413f52169ba7648f30a
 
Red Hat Enterprise Linux Server (v. 7)

SRPMS:
mpt3sas-13.100.00.00-1.el7_2.src.rpm
    MD5: 9e0583bf1716d626d4193f95c1b86c7bSHA-256: 53d59db182842e10e1827e8362db6f44a31a42e603eb025e2b4f247e28013755
 
PPC:
kmod-mpt3sas-13.100.00.00-1.el7_2.ppc64.rpm
    MD5: f7fa700ba263bfc951814df0b5615c25SHA-256: 1ce225c36d52f23ea5e13aedc73e7a4d4089f8ae6bb51a9863bbb3000ebaf75d
mpt3sas-debuginfo-13.100.00.00-1.el7_2.ppc64.rpm
    MD5: 2ebc23279cf2e470ec7dcc8573d21e4eSHA-256: d785f20e689879c430c5b906b3a17a285762d5e9334a0071bb30e5390c8a1b15
 
PPC64LE:
kmod-mpt3sas-13.100.00.00-1.el7_2.ppc64le.rpm
    MD5: b3739225655657fe6f071514175b362cSHA-256: 877989140a250f9a6739b533afae49e78c5ebe19fa1add56d9d4ca98ca4eb533
mpt3sas-debuginfo-13.100.00.00-1.el7_2.ppc64le.rpm
    MD5: bc0485d27f1f0e29fc8d6078d276fc47SHA-256: 525fe38c88bc20435f526401401268d7c71cd65a718cfdad06aa8d06414c5837
 
x86_64:
kmod-mpt3sas-13.100.00.00-1.el7_2.x86_64.rpm
    MD5: 83317610f5fd981efd9499d4a140d705SHA-256: 6cd5ba325efe64bccb25477a53975627f81ba90daf7e2afc5643f6c84b213421
mpt3sas-debuginfo-13.100.00.00-1.el7_2.x86_64.rpm
    MD5: 17210e8b5d1cacd5cc65b9a37e62924bSHA-256: f8014e351fe4fac37c4b0393b5b8ac5935b868073462d413f52169ba7648f30a
 
Red Hat Enterprise Linux Server AUS (v. 7.2)

SRPMS:
mpt3sas-13.100.00.00-1.el7_2.src.rpm
    MD5: 9e0583bf1716d626d4193f95c1b86c7bSHA-256: 53d59db182842e10e1827e8362db6f44a31a42e603eb025e2b4f247e28013755
 
x86_64:
kmod-mpt3sas-13.100.00.00-1.el7_2.x86_64.rpm
    MD5: 83317610f5fd981efd9499d4a140d705SHA-256: 6cd5ba325efe64bccb25477a53975627f81ba90daf7e2afc5643f6c84b213421
mpt3sas-debuginfo-13.100.00.00-1.el7_2.x86_64.rpm
    MD5: 17210e8b5d1cacd5cc65b9a37e62924bSHA-256: f8014e351fe4fac37c4b0393b5b8ac5935b868073462d413f52169ba7648f30a
 
Red Hat Enterprise Linux Server EUS (v. 7.2)

SRPMS:
mpt3sas-13.100.00.00-1.el7_2.src.rpm
    MD5: 9e0583bf1716d626d4193f95c1b86c7bSHA-256: 53d59db182842e10e1827e8362db6f44a31a42e603eb025e2b4f247e28013755
 
PPC:
kmod-mpt3sas-13.100.00.00-1.el7_2.ppc64.rpm
    MD5: f7fa700ba263bfc951814df0b5615c25SHA-256: 1ce225c36d52f23ea5e13aedc73e7a4d4089f8ae6bb51a9863bbb3000ebaf75d
mpt3sas-debuginfo-13.100.00.00-1.el7_2.ppc64.rpm
    MD5: 2ebc23279cf2e470ec7dcc8573d21e4eSHA-256: d785f20e689879c430c5b906b3a17a285762d5e9334a0071bb30e5390c8a1b15
 
PPC64LE:
kmod-mpt3sas-13.100.00.00-1.el7_2.ppc64le.rpm
    MD5: b3739225655657fe6f071514175b362cSHA-256: 877989140a250f9a6739b533afae49e78c5ebe19fa1add56d9d4ca98ca4eb533
mpt3sas-debuginfo-13.100.00.00-1.el7_2.ppc64le.rpm
    MD5: bc0485d27f1f0e29fc8d6078d276fc47SHA-256: 525fe38c88bc20435f526401401268d7c71cd65a718cfdad06aa8d06414c5837
 
x86_64:
kmod-mpt3sas-13.100.00.00-1.el7_2.x86_64.rpm
    MD5: 83317610f5fd981efd9499d4a140d705SHA-256: 6cd5ba325efe64bccb25477a53975627f81ba90daf7e2afc5643f6c84b213421
mpt3sas-debuginfo-13.100.00.00-1.el7_2.x86_64.rpm
    MD5: 17210e8b5d1cacd5cc65b9a37e62924bSHA-256: f8014e351fe4fac37c4b0393b5b8ac5935b868073462d413f52169ba7648f30a
 
Red Hat Enterprise Linux Workstation (v. 7)

SRPMS:
mpt3sas-13.100.00.00-1.el7_2.src.rpm
    MD5: 9e0583bf1716d626d4193f95c1b86c7bSHA-256: 53d59db182842e10e1827e8362db6f44a31a42e603eb025e2b4f247e28013755
 
x86_64:
kmod-mpt3sas-13.100.00.00-1.el7_2.x86_64.rpm
    MD5: 83317610f5fd981efd9499d4a140d705SHA-256: 6cd5ba325efe64bccb25477a53975627f81ba90daf7e2afc5643f6c84b213421
mpt3sas-debuginfo-13.100.00.00-1.el7_2.x86_64.rpm
    MD5: 17210e8b5d1cacd5cc65b9a37e62924bSHA-256: f8014e351fe4fac37c4b0393b5b8ac5935b868073462d413f52169ba7648f30a
 
(The unlinked packages above are only available from the Red Hat Network)

These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:

Leave a Reply