- Issued:
- 2009-09-02
- Updated:
- 2009-09-02
RHBA-2009:1338 - Bug Fix Advisory
Synopsis
gfs-kmod bug-fix update
Type/Severity
Bug Fix Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
Updated gfs-kmod packages which fix several bugs are now available.
Description
The gfs-kmod packages contain kernel modules that provide the functionality
to mount and use GFS file systems.
These updated packages apply the following bug fixes:
- A potential deadlock causing gfs to hang in 'wait_for_completion' was
fixed by prefaulting buffer pages.
- Applications using sendfile on files with the inherit_jdata flag are now
notified that sendfile will not work on those files instead of failing.
- A bug that could potentially cause a page allocation failure has been fixed.
- A bug that caused fsyncs to stuffed inodes fail to flush the journal has
been fixed.
Users are advised to upgrade to these latest gfs-kmod packages, which
resolve these issues.
Solution
Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.
This update is available via Red Hat Network. Details on how to use
the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/docs/DOC-11259
Affected Products
- Red Hat Enterprise Linux Resilient Storage for x86_64 5 x86_64
- Red Hat Enterprise Linux Resilient Storage for x86_64 5 ppc
- Red Hat Enterprise Linux Resilient Storage for x86_64 5 ia64
- Red Hat Enterprise Linux Resilient Storage for x86_64 5 i386
- Red Hat Enterprise Linux Resilient Storage (for RHEL Server) from RHUI 5 x86_64
- Red Hat Enterprise Linux Resilient Storage (for RHEL Server) from RHUI 5 i386
Fixes
- BZ - 436811 - RHEL5: Some files with inherit_jdata flag will not allow reads from apache
- BZ - 472062 - GFS hangs on wait_for_completion
- BZ - 479421 - kernel: gfs_tool: page allocation failure. order:4, mode:0xd0
- BZ - 510310 - GFS: Commited data evaporates
CVEs
(none)
References
(none)
Red Hat Enterprise Linux Resilient Storage for x86_64 5
SRPM | |
---|---|
gfs-kmod-0.1.34-2.el5.src.rpm | SHA-256: 9f9b90f0923b011431df084cc7502abf5ec06ff46e12baa33d5d42b650cea1ec |
x86_64 | |
kmod-gfs-0.1.34-2.el5.x86_64.rpm | SHA-256: 14c8283c932104aa57be6dfc3bdaa2b346ad82ef6f127098067d0c25cd0998ba |
kmod-gfs-xen-0.1.34-2.el5.x86_64.rpm | SHA-256: caad9caad2299ef833bd04f2cadcdf3bd8a1548ea69c88ebe9057dc2e4732945 |
ppc | |
kmod-gfs-0.1.34-2.el5.ppc64.rpm | SHA-256: d6144215550cdfcfc559259a8c40259735571b2f8c17e895bf19bb4e3f7fada8 |
ia64 | |
kmod-gfs-0.1.34-2.el5.ia64.rpm | SHA-256: 267eba3b277d1af0d60f08eb7a1636ff7dc8e68b50992c240b14aecc20188043 |
kmod-gfs-xen-0.1.34-2.el5.ia64.rpm | SHA-256: 224b88b4d5db4a2c23bfc06c27b832d06dd5ea14221e3b142bca46790a544568 |
i386 | |
kmod-gfs-0.1.34-2.el5.i686.rpm | SHA-256: b2199ff6f164f07f34f7972dc8afcb428642a44bad7b202dc6c6e643e626f9b6 |
kmod-gfs-PAE-0.1.34-2.el5.i686.rpm | SHA-256: 3956c497731cd98534b771b280d1a4c219bb361a4cc379c0b151e153822df612 |
kmod-gfs-xen-0.1.34-2.el5.i686.rpm | SHA-256: 3c6f41a7d1c9448bdf92e941e31a5dbc90cc78dcab220060b6b319dec4f06ebb |
Red Hat Enterprise Linux Resilient Storage (for RHEL Server) from RHUI 5
SRPM | |
---|---|
gfs-kmod-0.1.34-2.el5.src.rpm | SHA-256: 9f9b90f0923b011431df084cc7502abf5ec06ff46e12baa33d5d42b650cea1ec |
x86_64 | |
kmod-gfs-0.1.34-2.el5.x86_64.rpm | SHA-256: 14c8283c932104aa57be6dfc3bdaa2b346ad82ef6f127098067d0c25cd0998ba |
kmod-gfs-xen-0.1.34-2.el5.x86_64.rpm | SHA-256: caad9caad2299ef833bd04f2cadcdf3bd8a1548ea69c88ebe9057dc2e4732945 |
i386 | |
kmod-gfs-0.1.34-2.el5.i686.rpm | SHA-256: b2199ff6f164f07f34f7972dc8afcb428642a44bad7b202dc6c6e643e626f9b6 |
kmod-gfs-PAE-0.1.34-2.el5.i686.rpm | SHA-256: 3956c497731cd98534b771b280d1a4c219bb361a4cc379c0b151e153822df612 |
kmod-gfs-xen-0.1.34-2.el5.i686.rpm | SHA-256: 3c6f41a7d1c9448bdf92e941e31a5dbc90cc78dcab220060b6b319dec4f06ebb |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.