- Issued:
- 2008-05-21
- Updated:
- 2008-05-21
RHBA-2008:0350 - Bug Fix Advisory
Synopsis
gfs2-utils bug fix update
Type/Severity
Bug Fix Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
Updated gfs2-utils packages that fix various bugs and add several
enhancements are now available.
Description
The gfs2-utils packages provide the user-space tools necessary to mount,
create, maintain and test GFS2 file systems.
The updated gfs2-utils packages apply the following bug fixes:
- gfs2_fsck operation now closer resembles other file system fsck commands.
- build time warnings for gfs2 user-space tools have been fixed.
- the default lock protocol for gfs2 which is picked at creation time by
the mkfs.gfs2 command is now the lock_dlm locking protocol.
- the user is now asked before clearing the journal with the gfs2_fsck tool
and the clear option(-n).
- the gfs2_jadd man page has been updated.
- extra slashes on the end of mount points no longer cause errors in
gfs2-utils tools.
- gfs2_quota now works when the lock table has not been specified.
- gfs2_edit will now correctly save the rindex file when using the savemeta
option.
- gfs2_fsck would revert inodes fixed causing system inodes to be changed
improperly. This is now fixed and gfs2_fsck will fix system inodes
properly.
The updated gfs2-utils package provides the following enhancements:
- gfs2-utils now support the all mount wrapper options. Support been added
for the -n and -f mount options.
- a man page for gfs2_edit has been created.
- a new gfs2_tool lockdump feature has been implemented. The gfs2_tool man
page has been updated to reflect the new functionality.
All users of gfs2-utils should upgrade to these updated packages, which
resolve these issues and add these enhancements.
Solution
Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.
This update is available via Red Hat Network. Details on how to use
the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/FAQ_58_10188
Affected Products
- Red Hat Enterprise Linux Server 5 x86_64
- Red Hat Enterprise Linux Server 5 ia64
- Red Hat Enterprise Linux Server 5 i386
- Red Hat Enterprise Linux Workstation 5 x86_64
- Red Hat Enterprise Linux Workstation 5 i386
- Red Hat Enterprise Linux Desktop 5 x86_64
- Red Hat Enterprise Linux Desktop 5 i386
- Red Hat Enterprise Linux for IBM z Systems 5 s390x
- Red Hat Enterprise Linux for Power, big endian 5 ppc
- Red Hat Enterprise Linux Server from RHUI 5 x86_64
- Red Hat Enterprise Linux Server from RHUI 5 i386
Fixes
- BZ - 240545 - gfs2_fsck should behave more like the other fscks.
- BZ - 251180 - Build time warnings for gfs2 userland tools
- BZ - 325151 - GFS2: gfs2_fsck changes to system inodes don't stick
- BZ - 333961 - mount.gfs and mount.gfs2 don't not know -n option
- BZ - 334481 - gfs2_jadd man page refers to non-existent -T option
- BZ - 336561 - gfs2_tool accepts jdata flag; man page says no
- BZ - 345501 - GFS2: gfs2 utils uses non-canonicalized names
- BZ - 349601 - GFS2 requires straightforward way to determine number of journals
- BZ - 352581 - GFS2: implement gfs2_tool lockdump
- BZ - 352841 - GFS2: Evaluate and implement missing gfs2_tool features
- BZ - 364741 - GFS2: gfs2_quota doesn't work unless lock table specified
- BZ - 369771 - GFS2: bring RHEL gfs2_edit up to date
- BZ - 382581 - GFS2: gfs2_fsck: buffer still held for block: 162646118 (0x9b1c866)
- BZ - 402971 - GFS2: gfs2_edit savemeta doesn't save rindex file
- BZ - 426670 - GFS2: man page for gfs2_tool has commented lockdump section
- BZ - 435917 - GFS2: mkfs.gfs2 default lock protocol differs from man page
CVEs
(none)
References
(none)
Red Hat Enterprise Linux Server 5
SRPM | |
---|---|
gfs2-utils-0.1.44-1.el5.src.rpm | SHA-256: e9736a0ac863ee4c6c4f01dec45d3b32f4ca2f631142a9dedcb782c04e4c09f1 |
x86_64 | |
gfs2-utils-0.1.44-1.el5.x86_64.rpm | SHA-256: 01fb89e0004ea82c60480732d8614051ca586bb2692b8e7f82c316d2be0dfcc5 |
ia64 | |
gfs2-utils-0.1.44-1.el5.ia64.rpm | SHA-256: b1e802c1c3af7812bbcaf05c1e9549b282744547e74224b6f9985f766d688d34 |
i386 | |
gfs2-utils-0.1.44-1.el5.i386.rpm | SHA-256: 3ad7d19c46be1bffeb736d18b32e083736883801f0ff28f7ef8edb408c5e3e62 |
Red Hat Enterprise Linux Workstation 5
SRPM | |
---|---|
gfs2-utils-0.1.44-1.el5.src.rpm | SHA-256: e9736a0ac863ee4c6c4f01dec45d3b32f4ca2f631142a9dedcb782c04e4c09f1 |
x86_64 | |
gfs2-utils-0.1.44-1.el5.x86_64.rpm | SHA-256: 01fb89e0004ea82c60480732d8614051ca586bb2692b8e7f82c316d2be0dfcc5 |
i386 | |
gfs2-utils-0.1.44-1.el5.i386.rpm | SHA-256: 3ad7d19c46be1bffeb736d18b32e083736883801f0ff28f7ef8edb408c5e3e62 |
Red Hat Enterprise Linux Desktop 5
SRPM | |
---|---|
gfs2-utils-0.1.44-1.el5.src.rpm | SHA-256: e9736a0ac863ee4c6c4f01dec45d3b32f4ca2f631142a9dedcb782c04e4c09f1 |
x86_64 | |
gfs2-utils-0.1.44-1.el5.x86_64.rpm | SHA-256: 01fb89e0004ea82c60480732d8614051ca586bb2692b8e7f82c316d2be0dfcc5 |
i386 | |
gfs2-utils-0.1.44-1.el5.i386.rpm | SHA-256: 3ad7d19c46be1bffeb736d18b32e083736883801f0ff28f7ef8edb408c5e3e62 |
Red Hat Enterprise Linux for IBM z Systems 5
SRPM | |
---|---|
gfs2-utils-0.1.44-1.el5.src.rpm | SHA-256: e9736a0ac863ee4c6c4f01dec45d3b32f4ca2f631142a9dedcb782c04e4c09f1 |
s390x | |
gfs2-utils-0.1.44-1.el5.s390x.rpm | SHA-256: bf3d570d4200c06f874ecdc99f742ca3ab2e79cb7f19d8666ddbff778ab5a2f8 |
Red Hat Enterprise Linux for Power, big endian 5
SRPM | |
---|---|
gfs2-utils-0.1.44-1.el5.src.rpm | SHA-256: e9736a0ac863ee4c6c4f01dec45d3b32f4ca2f631142a9dedcb782c04e4c09f1 |
ppc | |
gfs2-utils-0.1.44-1.el5.ppc.rpm | SHA-256: ce313b3b1c673339041db3f24720674f0dadba0205dc04fd999b14e817c7ea7f |
Red Hat Enterprise Linux Server from RHUI 5
SRPM | |
---|---|
gfs2-utils-0.1.44-1.el5.src.rpm | SHA-256: e9736a0ac863ee4c6c4f01dec45d3b32f4ca2f631142a9dedcb782c04e4c09f1 |
x86_64 | |
gfs2-utils-0.1.44-1.el5.x86_64.rpm | SHA-256: 01fb89e0004ea82c60480732d8614051ca586bb2692b8e7f82c316d2be0dfcc5 |
i386 | |
gfs2-utils-0.1.44-1.el5.i386.rpm | SHA-256: 3ad7d19c46be1bffeb736d18b32e083736883801f0ff28f7ef8edb408c5e3e62 |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.