Bug 149874

Summary: md: mount(pid xxxx) used obsolete MD ioctl, upgrade your software to use new ictls.
Product: Red Hat Enterprise Linux 2.1 Reporter: Samuel Bouhnik <sbouhnik>
Component: kernelAssignee: Jim Paradis <jparadis>
Status: CLOSED WONTFIX QA Contact: Brian Brock <bbrock>
Severity: medium Docs Contact:
Priority: medium    
Version: 2.1CC: dhoward, jplans, peacebwitchu, peterm, riel
Target Milestone: ---   
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2006-02-28 19:09:27 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:

Description Samuel Bouhnik 2005-02-28 15:46:17 UTC
Description of problem:
mount -l generate the following error message:
 md: mount(pid 28113) used obsolete MD ioctl, upgrade your software 
to use new ictls.

When the device is a Raid Device. the md.c file is not complete, some 
case are missing.

Version-Release number of selected component (if applicable):
2.1XXX 3XXX

How reproducible:
mount -l 

Steps to Reproduce:
1. configure a raid device
2. run mount -l
3.
  
Actual results:
Something is displayed but get an error message in /var/log/message

Expected results:
No error message and all information

Additional info:

Comment 1 Jimmy Dean 2005-03-05 13:17:28 UTC
We are experiencing the same issue with a multipath array an AS 2.1

Comment 3 Jim Paradis 2005-12-08 21:44:52 UTC
Is this issue causing any data loss or corruption, or are you still able to use
the MD array?


Comment 4 Need Real Name 2006-02-25 14:27:11 UTC
No data loss here, but it's damn annoying to have my log files filled with this useless message because 
automated monitoring software calls mount to validate system state frequently, and causes the kernel to 
spew this to /var/log/messages constantly.

Can we please get an errata for 2.1 that will silence this bogus error?

Comment 5 Need Real Name 2006-02-25 21:56:01 UTC
BTW, this is the same issue as 145486, which is older than this bug.  Note that both bugs were opened 
during the Phase 2 (Deployment Support) of RHEL 2.1, so this issue should qualify for a bug fix errata, 
especially since it was caused by a RHEL 2.1 kernel update that changed the behavior of the userspace 
interface from the original shipped kernel in RHEL 2.1.

Comment 6 Jim Paradis 2006-02-28 19:09:27 UTC
At this time RHEL2.1 kernel errata are only released for the most severe issues
such as data corruption or security vulnerabilities.  This issue will not be fixed.