- Issued:
- 2005-10-05
- Updated:
- 2005-10-05
RHBA-2005:592 - Bug Fix Advisory
Synopsis
lvm2 bug fix and enhancement update
Type/Severity
Bug Fix Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
An updated lvm2 package that includes various bug fixes and enhancements is
now available.
Description
The lvm2 package contains support for logical volume management.
This updated lvm2 package now does the following:
- Supports metadata larger than 65KB.
- Adds the --ignorelockingfailure command-line argument to vgmknodes.
- Extends the process used to commit metadata to disk into three steps
instead of two.
- Does not attempt to create backup and archive directories in /etc/lvm
every time a command is run, but only when a command needs to use them.
- Reinstates the full physical volume size when removing a volume group.
Previously, a small amount of space would sometimes become unusable at the
end of the device.
- Internal code restructuring that improves the handling of snapshots and
speeds up the algorithms used to allocate space in a volume group.
- Fixes pvchange -u to work on physical volumes that belong to volume groups.
- Fixes vgmerge to cope if it sees the same LVID in both volume groups.
- Updates several volume group tools to check that the most recent local
backup of the metadata is up-to-date and, if it is not, create a new backup.
- Makes volume group and logical volume naming restrictions consistent.
The strings "_mlog" and "_mimage" can no longer be included in the names of
logical volumes.
- Adds the '--all' flag to the 'lvs' and 'vgs' reports. Without this,
internal LVs are no longer included in the output. When they are
displayed, their names are now enclosed in square brackets.
- Introduces new metadata sanity checks to detect internal coding errors
before writing updated metadata to disk.
- Supports tiny metadata areas to allow for conversions of simple metadata
from the GFS 'pool' format.
- Fixes the support for selinux in conjunction with the updated
device-mapper package.
All users of lvm2 should upgrade to this updated package, which includes
these bug fixes and enhancements.
Solution
Before applying this update, make sure that all previously-released
errata relevant to your system have been applied. Use Red Hat
Network to download and update your packages. To launch the Red Hat
Update Agent, use the following command:
up2date
For information on how to install packages manually, refer to the
following Web page for the System Administration or Customization
guide specific to your system:
Affected Products
- Red Hat Enterprise Linux Server 4 x86_64
- Red Hat Enterprise Linux Server 4 ia64
- Red Hat Enterprise Linux Server 4 i386
- Red Hat Enterprise Linux Workstation 4 x86_64
- Red Hat Enterprise Linux Workstation 4 ia64
- Red Hat Enterprise Linux Workstation 4 i386
- Red Hat Enterprise Linux Desktop 4 x86_64
- Red Hat Enterprise Linux Desktop 4 i386
- Red Hat Enterprise Linux for IBM z Systems 4 s390x
- Red Hat Enterprise Linux for IBM z Systems 4 s390
- Red Hat Enterprise Linux for Power, big endian 4 ppc
Fixes
- BZ - 158692 - lvm2 changes for RHEL4 U2
CVEs
(none)
References
(none)
Red Hat Enterprise Linux Server 4
SRPM | |
---|---|
lvm2-2.01.14-2.0.RHEL4.src.rpm | SHA-256: b926bad2ad5e83ab9a6344e971944647badd64046402e0f3f15bb53204af4b29 |
x86_64 | |
lvm2-2.01.14-2.0.RHEL4.x86_64.rpm | SHA-256: 623710e03b04f3d3b977d7f1a4c51ce15c0049a5d534e87e53a6970681cc02af |
lvm2-2.01.14-2.0.RHEL4.x86_64.rpm | SHA-256: 623710e03b04f3d3b977d7f1a4c51ce15c0049a5d534e87e53a6970681cc02af |
ia64 | |
lvm2-2.01.14-2.0.RHEL4.ia64.rpm | SHA-256: 5cd707370322b6a95f23d8c8a77daedd3df99a720e5f7b4a6d0dc6fb54a5c6ef |
lvm2-2.01.14-2.0.RHEL4.ia64.rpm | SHA-256: 5cd707370322b6a95f23d8c8a77daedd3df99a720e5f7b4a6d0dc6fb54a5c6ef |
i386 | |
lvm2-2.01.14-2.0.RHEL4.i386.rpm | SHA-256: 038fdf39fb17ad180fa64ca449bde521d12e4731028bf518fe1f4ad5d57df06b |
lvm2-2.01.14-2.0.RHEL4.i386.rpm | SHA-256: 038fdf39fb17ad180fa64ca449bde521d12e4731028bf518fe1f4ad5d57df06b |
Red Hat Enterprise Linux Workstation 4
SRPM | |
---|---|
lvm2-2.01.14-2.0.RHEL4.src.rpm | SHA-256: b926bad2ad5e83ab9a6344e971944647badd64046402e0f3f15bb53204af4b29 |
x86_64 | |
lvm2-2.01.14-2.0.RHEL4.x86_64.rpm | SHA-256: 623710e03b04f3d3b977d7f1a4c51ce15c0049a5d534e87e53a6970681cc02af |
ia64 | |
lvm2-2.01.14-2.0.RHEL4.ia64.rpm | SHA-256: 5cd707370322b6a95f23d8c8a77daedd3df99a720e5f7b4a6d0dc6fb54a5c6ef |
i386 | |
lvm2-2.01.14-2.0.RHEL4.i386.rpm | SHA-256: 038fdf39fb17ad180fa64ca449bde521d12e4731028bf518fe1f4ad5d57df06b |
Red Hat Enterprise Linux Desktop 4
SRPM | |
---|---|
lvm2-2.01.14-2.0.RHEL4.src.rpm | SHA-256: b926bad2ad5e83ab9a6344e971944647badd64046402e0f3f15bb53204af4b29 |
x86_64 | |
lvm2-2.01.14-2.0.RHEL4.x86_64.rpm | SHA-256: 623710e03b04f3d3b977d7f1a4c51ce15c0049a5d534e87e53a6970681cc02af |
i386 | |
lvm2-2.01.14-2.0.RHEL4.i386.rpm | SHA-256: 038fdf39fb17ad180fa64ca449bde521d12e4731028bf518fe1f4ad5d57df06b |
Red Hat Enterprise Linux for IBM z Systems 4
SRPM | |
---|---|
lvm2-2.01.14-2.0.RHEL4.src.rpm | SHA-256: b926bad2ad5e83ab9a6344e971944647badd64046402e0f3f15bb53204af4b29 |
s390x | |
lvm2-2.01.14-2.0.RHEL4.s390x.rpm | SHA-256: 6f03b57ac3865c21b329208166ff55c3966c43da51b30f3c2e92f476ef149412 |
s390 | |
lvm2-2.01.14-2.0.RHEL4.s390.rpm | SHA-256: 1c5e76519ffea76b48d2c899fa122e60f948bd6186163e6630ef2570d8af97e7 |
Red Hat Enterprise Linux for Power, big endian 4
SRPM | |
---|---|
lvm2-2.01.14-2.0.RHEL4.src.rpm | SHA-256: b926bad2ad5e83ab9a6344e971944647badd64046402e0f3f15bb53204af4b29 |
ppc | |
lvm2-2.01.14-2.0.RHEL4.ppc.rpm | SHA-256: 1ccdb235803063b1d68d6f3074db42295f4035270c17838274634236e46280b3 |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.