Skip to navigation

Bug Fix Advisory cman bug fix and enhancement update

Advisory: RHBA-2008:0347-17
Type: Bug Fix Advisory
Severity: N/A
Issued on: 2008-05-21
Last updated on: 2008-05-21
Affected Products: RHEL Desktop Workstation (v. 5 client)
Red Hat Enterprise Linux (v. 5 server)

Details

Updated cman packages that fix several bugs and add enhancements are now
available.

The Cluster Manager (cman) utility provides services for managing a Linux
cluster.

These updated packages fix the following bugs:

* IP addresses are no longer used for SCSI reservation keys.
* "fence_ipmilan -h" reported the depreciated "-i" option.
* ccs_tool exited with EXIT_FAILURE, even after successful operations.
* OpenAIS partitions and disallowed cman nodes could have merged, causing
cluster failure.
* openais and cman were required to fence virtual nodes.
* man page updates.
* a potential crash in the fence daemon was removed.
* potential NULL pointer dereferences were removed.
* running "cman_tool leave remove" did not reduce cluster quorum.
* mkqdisk was unable to use devices with a 4KB sector size.
* fence_scsi now accepts the "nodename" parameter.
* strace, SIGSTOP and SIGCONT signals, caused fenced to stop.
* shutting down qdisk may have caused a "dlm: closing connection to node
0" error.
* data corruption may have occurred when using fence_xvm on virtual nodes.
* the output of "group_tool dump" was a fixed length, and padded with NULL
characters.
* the qdisk man page has been updated.
* ccs lookup functions failed to recognize hostnames that did not match
values in cluster.conf.
* the disallowed state could occur if OpenAIS failed to schedule for more
than 10 seconds.
* the resource group status change failed when relocating NFS and GFS
services.
* fencing failed if the last fence action took more than 30 seconds.
* a format string bug, which may have caused fenced to crash, has been
resolved.
* cascade fencing failed.
* "reservation conflict" messages appeared when starting scsi_reserve.
* now, if scsi_reserve fails to register with any device, that device is
left out of the fence domain.
* "locking_type = 0" is now used for all LVM commands in the fence_scsi
and scsi_reserve scripts.
* when fence_scsi failed to un-register a key on a device, it did not
continue to process other devices. An error occurred when removing a key
that was not registered to a device.
* a bug caused output to stderr to go to the wrong file descriptor.
* options that were only relevant to Red Hat Enterprise Linux 4 have been
removed, and a new dump option has been added.
* the cman init script did not start fence_xvmd.
* PowerPC based clusters interfered with clusters on the same subnet,
causing ccsd to consume up to 90% CPU and memory.
* it was not possible to use fence_scsi with LVM mirrors and stripes.
* a "lock_dlm: plock device version mismatch: kernel" error could occur.
* on PowerPC architectures, "gfs_tool" did not recognize GFS file systems.
* qdisk ignored the interval for checking heuristics.
* a logic error caused qdisk master abdication to fail.
* cman failed to start correctly if additional parameters for
network-bridge were added to "xend-config.sxp".
* if failed fencing was overridden, the node was never considered fenced.
* groupd processed messages from nodes that were no longer in a cluster.
* libdlm copied LVB data from an incorrect location, resulting in a
segmentation fault.
* "ip.sh" did not set the correct netmask. Now, "ip.sh" uses the netmask
set in "cluster.conf", instead of "255.255.255.0".

These updated packages add the following enhancements:

* diagnostic output for the cluster suite tools has been improved.
* performance optimization for plocks has been added.
* logging has been improved, and irrelevant options removed.
* fence_ack_manual now uses the fenced_override socket.
* the fence_apc_snmp agent is now included.

Users of cman are advised to upgrade to these updated packages, which
resolve these issues and add these enhancements.


Solution

Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.

This update is available via Red Hat Network. Details on how to use
the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/FAQ_58_10188

Updated packages

RHEL Desktop Workstation (v. 5 client)

SRPMS:
cman-2.0.84-2.el5.src.rpm
File outdated by:  RHBA-2014:0282
    MD5: c5336479891a548e9c9acb3e219298e0
 
IA-32:
cman-2.0.84-2.el5.i386.rpm
File outdated by:  RHBA-2014:0282
    MD5: 716b6e9823f5ffe6c32d5f8b7a08b45b
cman-devel-2.0.84-2.el5.i386.rpm
File outdated by:  RHBA-2014:0282
    MD5: f26ece0057ba4123ebdd7ee3fe82897c
 
x86_64:
cman-2.0.84-2.el5.x86_64.rpm
File outdated by:  RHBA-2014:0282
    MD5: 5beed4ecc41cd171f1a1d8f70780e7ab
cman-devel-2.0.84-2.el5.i386.rpm
File outdated by:  RHBA-2014:0282
    MD5: f26ece0057ba4123ebdd7ee3fe82897c
cman-devel-2.0.84-2.el5.x86_64.rpm
File outdated by:  RHBA-2014:0282
    MD5: c2c111c1aa2c90c3e46d7da6231a9fa5
 
Red Hat Enterprise Linux (v. 5 server)

SRPMS:
cman-2.0.84-2.el5.src.rpm
File outdated by:  RHBA-2014:0282
    MD5: c5336479891a548e9c9acb3e219298e0
 
IA-32:
cman-2.0.84-2.el5.i386.rpm
File outdated by:  RHBA-2014:0282
    MD5: 716b6e9823f5ffe6c32d5f8b7a08b45b
cman-devel-2.0.84-2.el5.i386.rpm
File outdated by:  RHBA-2014:0282
    MD5: f26ece0057ba4123ebdd7ee3fe82897c
 
IA-64:
cman-2.0.84-2.el5.ia64.rpm
File outdated by:  RHBA-2014:0282
    MD5: cd5c5a191c8a5e599770f3e9dd0b5c5c
cman-devel-2.0.84-2.el5.ia64.rpm
File outdated by:  RHBA-2014:0282
    MD5: 91dff90e801f67f01d480935a713416e
 
PPC:
cman-2.0.84-2.el5.ppc.rpm
File outdated by:  RHBA-2014:0282
    MD5: 6e1c04d5691ae172e0720fe7b636f1f6
cman-devel-2.0.84-2.el5.ppc.rpm
File outdated by:  RHBA-2014:0282
    MD5: 45a72ea2cbe8e4adf535486fb9e2f884
cman-devel-2.0.84-2.el5.ppc64.rpm
File outdated by:  RHBA-2014:0282
    MD5: 81b5093d953c815a95b6af19f8f5bd24
 
s390x:
cman-2.0.84-2.el5.s390x.rpm
File outdated by:  RHBA-2009:1622
    MD5: 5b4271cecb8e32346934f5a40dc8e3f2
cman-devel-2.0.84-2.el5.s390.rpm
File outdated by:  RHBA-2009:1622
    MD5: d928e2967df16658240e6a4d04a8aea4
cman-devel-2.0.84-2.el5.s390x.rpm
File outdated by:  RHBA-2009:1622
    MD5: 8ef1ba44d5f2ff2830b9608b3f6a5a77
 
x86_64:
cman-2.0.84-2.el5.x86_64.rpm
File outdated by:  RHBA-2014:0282
    MD5: 5beed4ecc41cd171f1a1d8f70780e7ab
cman-devel-2.0.84-2.el5.i386.rpm
File outdated by:  RHBA-2014:0282
    MD5: f26ece0057ba4123ebdd7ee3fe82897c
cman-devel-2.0.84-2.el5.x86_64.rpm
File outdated by:  RHBA-2014:0282
    MD5: c2c111c1aa2c90c3e46d7da6231a9fa5
 
(The unlinked packages above are only available from the Red Hat Network)

Bugs fixed (see bugzilla for more information)

248715 - Remove use of IP address as basis for SCSI reservation keys
249616 - fence_ipmilan -h suggests self for deprecated option "-i"
249781 - Most ccs_tool commands always exit with EXIT_FAILURE
251966 - merge of openais partitions and disallowed cman nodes
253587 - old and missing man pages
258141 - Use-after-free bug in fenced
267441 - Possible NULL pointer deferences in cman
271701 - cman_tool leave remove doesn't reduce quorum
272861 - mkqdisk cannot use device with 4kb sector size
277781 - conga passes fence_scsi nodename, where as it accepts only node
314091 - tracing fenced kills the process
315711 - dlm: closing connection to node 0
317561 - Clarify qdisk man page
323711 - Add ccs_lookup_nodename function from libccs in HEAD to RHEL5 libccs
323931 - disallowed nodes and inconsistent cluster views
327721 - failed RG status change while relocating to preferred failover node
354421 - fenced fails to execute the fence agent again if the first attempt fails and it takes more than 30 seconds to complete
359271 - gfs_controld - make un-contended plocks faster by implementing an ownership mechanism
362351 - [RFE] make fence_xvmd not need a cluster for 1-node operation
373491 - scsi_reserve causes "reservation conflict" messages
373511 - scsi_reserve should leave fence domain upon failure
373541 - Use locking_type = 0 for LVM queries in fence_scsi, scsi_reserve
373571 - fence_scsi should not exit after failing for single device
394721 - gfs_controld ASSERT prints to stderr
404451 - minor updates/fixes for RHEL5.2
410361 - fence_xvmd will never be started by the cman init script
418541 - RFE: Make fence_ack_manual in RHEL5 branch talk to manual override socket
418741 - Mixed endian clusters on same subnet can cause ccsd to consume 90+% memory and cpu during startup.
429033 - fence_scsi is broken with lvm stripes and mirrors
429546 - lock_dlm: plock device version mismatch: kernel (1.1.0), user (16777216.16777216.0)
429633 - gfs_tool doesn't recognize GFS file sytem
429927 - qdisk does not check the heuristics
430264 - qdisk master abdication does not work correctly in all cases
434790 - cman doesn't start correctly when additional params are given to network-bridge in /etc/xen/xend-config.sxp
435189 - fenced admin override does not update cman, preventing rgmanager recovery
436984 - groupd processes message from dead node
437496 - libdlm copies lvb from bad address
438905 - fence_apc_snmp is missing in cman rpm
441737 - [fence] fence_node broken in RHEL5.2


Keywords

cman


These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/