- Issued:
- 2008-08-28
- Updated:
- 2008-08-28
RHBA-2008:0854 - Bug Fix Advisory
Synopsis
gfs-kmod bug fix update
Type/Severity
Bug Fix Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
Updated gfs-kmod packages that fix a bug are now available for Red Hat
Enterprise Linux 5.
Description
The gfs-kmod packages contain modules that provide the ability to mount and
use GFS file systems.
Under heavy I/O, the GFS kernel module may have asserted
'"gfs_glock_is_locked_by_me(ip->i_gl)" failed', due to the inode glock not
being held through the "madvise()" system call.
All gfs-kmod users should upgrade to these updated packages, which resolve
this issue.
Solution
Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.
This update is available via Red Hat Network. Details on how to use
the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/FAQ_58_10188
Affected Products
- Red Hat Enterprise Linux Resilient Storage for x86_64 5 x86_64
- Red Hat Enterprise Linux Resilient Storage for x86_64 5 ppc
- Red Hat Enterprise Linux Resilient Storage for x86_64 5 ia64
- Red Hat Enterprise Linux Resilient Storage for x86_64 5 i386
- Red Hat Enterprise Linux Resilient Storage for x86_64 - Extended Update Support 5.2 x86_64
- Red Hat Enterprise Linux Resilient Storage for x86_64 - Extended Update Support 5.2 ppc
- Red Hat Enterprise Linux Resilient Storage for x86_64 - Extended Update Support 5.2 ia64
- Red Hat Enterprise Linux Resilient Storage for x86_64 - Extended Update Support 5.2 i386
- Red Hat Enterprise Linux Resilient Storage (for RHEL Server) from RHUI 5 x86_64
- Red Hat Enterprise Linux Resilient Storage (for RHEL Server) from RHUI 5 i386
Fixes
- BZ - 459051 - [CRM #1791352] gfs_glock_is_locked_by_me problem with GFS
CVEs
(none)
References
(none)
Red Hat Enterprise Linux Resilient Storage for x86_64 5
SRPM | |
---|---|
gfs-kmod-0.1.23-5.el5_2.2.src.rpm | SHA-256: abbd6392b97f020dcaf922cc81e7c7664ca093f8284832f39d57ae9179979a11 |
x86_64 | |
kmod-gfs-0.1.23-5.el5_2.2.x86_64.rpm | SHA-256: 39a7c499f3906e0b54b869ff6c4d30c5264843d0606d8889b9a642298de756a7 |
kmod-gfs-xen-0.1.23-5.el5_2.2.x86_64.rpm | SHA-256: 5d4765bbb66998eaa8877e9d44fab42e473ce0091a42e28f5b650c28bbb212a1 |
ppc | |
kmod-gfs-0.1.23-5.el5_2.2.ppc64.rpm | SHA-256: 9528fd23a8e93a458329f8b75953102bacec2f349837d2adc6fef85d71f83c14 |
ia64 | |
kmod-gfs-0.1.23-5.el5_2.2.ia64.rpm | SHA-256: 91d4e9ddd016fd2415320447785ce040821bf76bc983cfc871da9f40c4934513 |
kmod-gfs-xen-0.1.23-5.el5_2.2.ia64.rpm | SHA-256: 31999188eca645d15be09b6aeeea9ed24ff04f95b14048800c4d2f69ff3ae653 |
i386 | |
kmod-gfs-0.1.23-5.el5_2.2.i686.rpm | SHA-256: 41a322f07e12a683eaf75df896132c0c297f85b5b654270641b997b5517f3ca1 |
kmod-gfs-PAE-0.1.23-5.el5_2.2.i686.rpm | SHA-256: cb3a7a8ab055c8816e8e7ca2153528dc7620addc7be18b733afc4df7c3ba45bd |
kmod-gfs-xen-0.1.23-5.el5_2.2.i686.rpm | SHA-256: 67e35441c91d1380f1340d4b6091f40a9c1cd56a18592f16fbcac8463d7838ba |
Red Hat Enterprise Linux Resilient Storage for x86_64 - Extended Update Support 5.2
SRPM | |
---|---|
x86_64 | |
ppc | |
ia64 | |
i386 |
Red Hat Enterprise Linux Resilient Storage (for RHEL Server) from RHUI 5
SRPM | |
---|---|
gfs-kmod-0.1.23-5.el5_2.2.src.rpm | SHA-256: abbd6392b97f020dcaf922cc81e7c7664ca093f8284832f39d57ae9179979a11 |
x86_64 | |
kmod-gfs-0.1.23-5.el5_2.2.x86_64.rpm | SHA-256: 39a7c499f3906e0b54b869ff6c4d30c5264843d0606d8889b9a642298de756a7 |
kmod-gfs-xen-0.1.23-5.el5_2.2.x86_64.rpm | SHA-256: 5d4765bbb66998eaa8877e9d44fab42e473ce0091a42e28f5b650c28bbb212a1 |
i386 | |
kmod-gfs-0.1.23-5.el5_2.2.i686.rpm | SHA-256: 41a322f07e12a683eaf75df896132c0c297f85b5b654270641b997b5517f3ca1 |
kmod-gfs-PAE-0.1.23-5.el5_2.2.i686.rpm | SHA-256: cb3a7a8ab055c8816e8e7ca2153528dc7620addc7be18b733afc4df7c3ba45bd |
kmod-gfs-xen-0.1.23-5.el5_2.2.i686.rpm | SHA-256: 67e35441c91d1380f1340d4b6091f40a9c1cd56a18592f16fbcac8463d7838ba |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.