Red Hat Customer Portal

Skip to main content

Bug Fix Advisory GFS bug fix update

Advisory: RHBA-2008:0804-2
Type: Bug Fix Advisory
Severity: N/A
Issued on: 2008-07-25
Last updated on: 2008-07-25
Affected Products: Global File System EL4


Updated GFS packages that fix various issues are now available.

The gfs-utils packages provide the user-space tools for mounting, creating
and using GFS file systems.

The updated gfs-utils packages apply the following bug fixes:

* the gfs_tool command using the lockdump argument would incorrectly report
an 'unknown mountpoint' error.

* using the gfs_tool with the gettune or df arguments would result in a
"Cannot allocate memory" error. gfs_tool now correctly allocates memory for
these functions.

* a bug caused GFS to report incorrect file system sizes. GFS now reports
the actual file system size.

* the gfs_fsck command can now repair corruption caused by old versions of
the gfs_grow command.

All GFS users are advised to upgrade to these updated packages, which
resolve these bugs.


Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.

This update is available via Red Hat Network. Details on how to use
the Red Hat Network to apply this update are available at

Updated packages

Global File System EL4

File outdated by:  RHBA-2011:0275
    MD5: 8aea4c59e82c1f2c002241ec4529d10f
File outdated by:  RHBA-2011:0275
    MD5: ca16bc234ec11acf6ffb359a098a388a
File outdated by:  RHBA-2011:0275
    MD5: 8255a6014675bd0e85b798a0aac7d92d
File outdated by:  RHBA-2011:0275
    MD5: b1a45940c2e3f4382a94d95948c723fb
File outdated by:  RHBA-2011:0275
    MD5: 201e9e89dec3d1cd050e418616199b12
(The unlinked packages above are only available from the Red Hat Network)

Bugs fixed (see bugzilla for more information)

421761 - 'gfs_tool lockdump' wrongly says 'unknown mountpoint' re HP cciss RAID array
435469 - gfs_tool: Cannot allocate memory
440896 - GFS: gfs_fsck should repair gfs_grow corruption (see bug #436383)



These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:

The Red Hat security contact is More contact details at