Skip to navigation

Bug Fix Advisory GFS bug fix update

Advisory: RHBA-2006:0593-4
Type: Bug Fix Advisory
Severity: N/A
Issued on: 2006-07-20
Last updated on: 2006-07-20
Affected Products: Global File System EL3

Details

Updated GFS packages that resolve module loading issues and other bugs are
now available for Red Hat Enterprise Linux 3 Update 8, kernel
release (2.4.21-47.EL).

The Red Hat Global File System (GFS) provides high availability of critical
server applications in the event of planned or unplanned system downtime.

These updated GFS packages are in sync with the latest kernel
(2.4.21-47.EL). The modules in earlier GFS packages failed to load because
they did not match the running kernel. It was possible to force load the
modules; however, with this update, users do not need to do so.

Additionally, the following bug fixes have been added since the previous
release:

- The fence drac agent now supports drac4.

- When waiting for flocks, processes are not put into the 'D' state anymore.

- GNBD now uses locking to prevent reads and writes of the same block from
happening at the same time.

Users are advised to upgrade to these latest GFS packages, which are
updated for use with the 2.4.21-47.EL kernel.


Solution

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

To update all RPMs for your particular architecture, run:

rpm -Fvh [filenames]

where [filenames] is a list of the RPMs you wish to upgrade. Only those
RPMs which are currently installed will be updated. Those RPMs which are
not installed but included in the list will not be updated. Note that you
can also use wildcards (*.rpm) if your current directory *only* contains the
desired RPMs.

Please note that this update is also available via Red Hat Network. Many
people find this an easier way to apply updates. To use Red Hat Network,
launch the Red Hat Update Agent with the following command:

up2date

This will start an interactive process that will result in the appropriate
RPMs being upgraded on your system.

Updated packages

Global File System EL3

SRPMS:
GFS-6.0.2.34-2.src.rpm
File outdated by:  RHSA-2010:0330
    MD5: c2e2f8a6baed4eb1b0d6ac578a0d3b06
 
IA-32:
GFS-6.0.2.34-2.i386.rpm
File outdated by:  RHSA-2010:0330
    MD5: 520d9d5b01be38cc3efa11d8b93728ce
GFS-6.0.2.34-2.i686.rpm
File outdated by:  RHSA-2010:0330
    MD5: c3db0333601f8005f314838d801b4734
GFS-devel-6.0.2.34-2.i386.rpm
File outdated by:  RHSA-2010:0330
    MD5: 91aeb65e1a38c3643807337745be4703
GFS-devel-6.0.2.34-2.i686.rpm
File outdated by:  RHSA-2010:0330
    MD5: 87983a2bffd58c80efa0522c371f7713
GFS-modules-6.0.2.34-2.i386.rpm
File outdated by:  RHSA-2010:0330
    MD5: 8d5818207dc158085e923e98ca6d6673
GFS-modules-6.0.2.34-2.i686.rpm
File outdated by:  RHSA-2010:0330
    MD5: 9a32e55342e42aad0020827a9980868f
GFS-modules-hugemem-6.0.2.34-2.i686.rpm
File outdated by:  RHSA-2010:0330
    MD5: e0f3de414de80b1b279f68b90dc8ef91
GFS-modules-smp-6.0.2.34-2.i686.rpm
File outdated by:  RHSA-2010:0330
    MD5: 2a11ca933f7f088c4549f4cefcebc8c3
 
IA-64:
GFS-6.0.2.34-2.ia64.rpm
File outdated by:  RHSA-2010:0330
    MD5: 066cf5f1149f4f654f0de80bce45d898
GFS-devel-6.0.2.34-2.ia64.rpm
File outdated by:  RHSA-2010:0330
    MD5: d66fd72f05638ebf9918a141e9b00c7c
GFS-modules-6.0.2.34-2.ia64.rpm
File outdated by:  RHSA-2010:0330
    MD5: 30bde2e893549ea27e71bb28b104b9c8
 
x86_64:
GFS-6.0.2.34-2.ia32e.rpm
File outdated by:  RHSA-2010:0330
    MD5: 37e318517a19022f7acc3127d28fde04
GFS-6.0.2.34-2.x86_64.rpm
File outdated by:  RHSA-2010:0330
    MD5: 4002d703bb4a48876d8f16c0ad2a18d2
GFS-devel-6.0.2.34-2.ia32e.rpm
File outdated by:  RHSA-2010:0330
    MD5: 9a8867e43034551e567cfe981a99ef26
GFS-devel-6.0.2.34-2.x86_64.rpm
File outdated by:  RHSA-2010:0330
    MD5: c21a31c1e51cf21521c8f2c7ae33a07b
GFS-modules-6.0.2.34-2.ia32e.rpm
File outdated by:  RHSA-2010:0330
    MD5: 708b650f1ece087466c21035be7c8f69
GFS-modules-6.0.2.34-2.x86_64.rpm
File outdated by:  RHSA-2010:0330
    MD5: 7d1ee26ec8d5d947818544a2332ae707
GFS-modules-smp-6.0.2.34-2.x86_64.rpm
File outdated by:  RHSA-2010:0330
    MD5: 1ed57f19f033230430e5f4ff865324f4
 

Bugs fixed (see bugzilla for more information)

185078 - PHP process hung in D state with flock


Keywords

bugs, fix, GFS, package


These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/