- Issued:
- 2009-01-20
- Updated:
- 2009-01-20
RHBA-2009:0132 - Bug Fix Advisory
Synopsis
gfs-kmod bug-fix update
Type/Severity
Bug Fix Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
Updated gfs-kmod packages which fix several issues are now available.
Description
The gfs-kmod packages contain kernel modules that provide the functionality
to mount and use GFS file systems.
These updated packages apply the following bug fixes:
- A bug was fixed which caused a 'gfs_glock_is_locked_by_me(ip->i_gl)'
error in the system log.
- gfs mount attempts no longer hang if no more journals are available.
- GFS filesystems on devices that are not in '/dev/' can now be mounted
properly.
- An assertion (!(lck_ret & LM_OUT_ERROR)) triggered by gfs_grow has been
fixed.
- The noatime and nodiratime options mount options are now properly honored
by the gfs kernel module.
- It was possible for the inode glock holder to never be dequeued through
gfs_readpage which would cause an assertion.
- A bug which caused corruption when a node was forced to withdraw has been
fixed.
- A bug which caused a fault in posix_lock_file() was fixed by implementing
the F_CANCELLK command in gfs_lock().
- A bug which caused gfs to appear to hang due to wasteful prefetching of
locks has been fixed.
Users are advised to upgrade to these latest gfs-kmod packages, which are
updated for use with Red Hat Enterprise Linux 5.
Solution
Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.
This update is available via Red Hat Network. Details on how to use
the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/FAQ_58_10188
Affected Products
- Red Hat Enterprise Linux Resilient Storage for x86_64 5 x86_64
- Red Hat Enterprise Linux Resilient Storage for x86_64 5 ppc
- Red Hat Enterprise Linux Resilient Storage for x86_64 5 ia64
- Red Hat Enterprise Linux Resilient Storage for x86_64 5 i386
- Red Hat Enterprise Linux Resilient Storage (for RHEL Server) from RHUI 5 x86_64
- Red Hat Enterprise Linux Resilient Storage (for RHEL Server) from RHUI 5 i386
Fixes
- BZ - 425421 - gfs mount attempt hangs if no more journals available
- BZ - 431952 - GFS: gfs-kernel should use device major:minor
- BZ - 438268 - GFS: gfs_grow causes lock_dlm: exxonfs: gdlm_lock 2,17 err=-16
- BZ - 446085 - RFE: GFS: Optimise loop in gfs_bitfit
- BZ - 450209 - use forked gfs1-specific lock modules
- BZ - 462892 - gfs: use dlm_posix_set_fsid() for compat with old gfs_controld
- BZ - 465151 - GFS: madvise system call causes assertion
- BZ - 470518 - Missing Dependency: kernel(rhel5_dlm_u3) = ... for kmod-gfs packages
- BZ - 471059 - reproduceable gfs (dlm) hanger with simple stresstest
CVEs
(none)
References
(none)
Red Hat Enterprise Linux Resilient Storage for x86_64 5
SRPM | |
---|---|
gfs-kmod-0.1.31-3.el5.src.rpm | SHA-256: 9049ddf24f397b9ff26413b965f0932ea657a7401c8aed5c15cd2777c7ebf38f |
x86_64 | |
kmod-gfs-0.1.31-3.el5.x86_64.rpm | SHA-256: 063169fb8d00db314b9474d4c3b54db8e208386e4fd63e88f093aa4513c1f79d |
kmod-gfs-xen-0.1.31-3.el5.x86_64.rpm | SHA-256: 84ae1845b0dadcc8715bfdb2789ce1083fe6ba1bbcbbc0f32f0f20be1a58bcae |
ppc | |
kmod-gfs-0.1.31-3.el5.ppc64.rpm | SHA-256: 191899edf06a5e48651300d4c411fdac99839f3665098b1d6c0eb7e98feb958b |
ia64 | |
kmod-gfs-0.1.31-3.el5.ia64.rpm | SHA-256: 6f7bf972ce3732110e830ad324a9dd6916668a30e4a2a63b77a62a72506f1340 |
kmod-gfs-xen-0.1.31-3.el5.ia64.rpm | SHA-256: 91dd245912c95c553e94b13e1ab534f9fb0097b4de5381fa81db4dec273dab15 |
i386 | |
kmod-gfs-0.1.31-3.el5.i686.rpm | SHA-256: ceccee4553aa53602823a50a4b9e88d43faac9f969f0254071a7c1802c2e48ad |
kmod-gfs-PAE-0.1.31-3.el5.i686.rpm | SHA-256: 6013108b2f931ba024a230b8d0fad995e719fb6c798c2a63cef43aca96b60619 |
kmod-gfs-xen-0.1.31-3.el5.i686.rpm | SHA-256: b06e98e9ea2d3781c0ee3b696f4077b12e595e0ac68edc30015c6f1bce0151ce |
Red Hat Enterprise Linux Resilient Storage (for RHEL Server) from RHUI 5
SRPM | |
---|---|
gfs-kmod-0.1.31-3.el5.src.rpm | SHA-256: 9049ddf24f397b9ff26413b965f0932ea657a7401c8aed5c15cd2777c7ebf38f |
x86_64 | |
kmod-gfs-0.1.31-3.el5.x86_64.rpm | SHA-256: 063169fb8d00db314b9474d4c3b54db8e208386e4fd63e88f093aa4513c1f79d |
kmod-gfs-xen-0.1.31-3.el5.x86_64.rpm | SHA-256: 84ae1845b0dadcc8715bfdb2789ce1083fe6ba1bbcbbc0f32f0f20be1a58bcae |
i386 | |
kmod-gfs-0.1.31-3.el5.i686.rpm | SHA-256: ceccee4553aa53602823a50a4b9e88d43faac9f969f0254071a7c1802c2e48ad |
kmod-gfs-PAE-0.1.31-3.el5.i686.rpm | SHA-256: 6013108b2f931ba024a230b8d0fad995e719fb6c798c2a63cef43aca96b60619 |
kmod-gfs-xen-0.1.31-3.el5.i686.rpm | SHA-256: b06e98e9ea2d3781c0ee3b696f4077b12e595e0ac68edc30015c6f1bce0151ce |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.