Skip to navigation

Bug Fix Advisory dlm-kernel bug-fix update

Advisory: RHBA-2010:0081-2
Type: Bug Fix Advisory
Severity: N/A
Issued on: 2010-02-03
Last updated on: 2010-02-03
Affected Products: Cluster Suite EL4
Cluster Suite EL4.8.z

Details

Updated dlm-kernel packages that fix a bug are now available for Red Hat
Enterprise Linux 4.8, kernel release 2.6.9-89.0.16.EL.

The dlm-kernel modules allow the Distributed Lock Manager (DLM) to
communicate with the kernel.

A bug that resulted in lvm hangs during during connect() calls to clvmd has
been fixed by modifying the lock granting logic.

As well, these updated dlm-kernel packages are in sync with the latest
kernel (2.6.9-89.0.16.EL). The modules in earlier dlm-kernel packages fail
to load because they do not match the running kernel. It is possible to
force-load the modules; however, with this update, force-loading the
modules is not required.

Users are advised to upgrade to these latest dlm-kernel packages, which are
updated for use with the 2.6.9-89.0.16.EL kernel.


Solution

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

To update all RPMs for your particular architecture, run:

rpm -Fvh [filenames]

where [filenames] is a list of the RPMs you wish to upgrade. Only those
RPMs which are currently installed will be updated. Those RPMs which are
not installed but included in the list will not be updated. Note that you
can also use wildcards (*.rpm) if your current directory *only* contains
the
desired RPMs.

Please note that this update is also available via Red Hat Network. Many
people find this an easier way to apply updates. To use Red Hat Network,
launch the Red Hat Update Agent with the following command:

up2date

This will start an interactive process that will result in the appropriate
RPMs being upgraded on your system.

Updated packages

Cluster Suite EL4

SRPMS:
dlm-kernel-2.6.9-58.6.el4_8.9.src.rpm
File outdated by:  RHBA-2011:0161
    MD5: fea19e526a7a986e5432e1a4ed66e72a
 
IA-32:
dlm-kernel-2.6.9-58.6.el4_8.9.i686.rpm
File outdated by:  RHBA-2012:0111
    MD5: 6286cf2ee799da527198410e8c70e8f1
dlm-kernel-hugemem-2.6.9-58.6.el4_8.9.i686.rpm
File outdated by:  RHBA-2012:0111
    MD5: b7f4f957d509fa49f2568cc9e2e68176
dlm-kernel-smp-2.6.9-58.6.el4_8.9.i686.rpm
File outdated by:  RHBA-2012:0111
    MD5: 35b67191ee9f231fcf4c0ec1a36b37c1
dlm-kernel-xenU-2.6.9-58.6.el4_8.9.i686.rpm
File outdated by:  RHBA-2012:0111
    MD5: fafd230c809894d20147bd69bedb2dcd
dlm-kernheaders-2.6.9-58.6.el4_8.9.i686.rpm
File outdated by:  RHBA-2012:0111
    MD5: 75bf2ebdd8fce1aee7234cf9916aa4ef
 
IA-64:
dlm-kernel-2.6.9-58.6.el4_8.9.ia64.rpm
File outdated by:  RHBA-2012:0111
    MD5: 50db51c0fb4043ffef8eb19646282512
dlm-kernheaders-2.6.9-58.6.el4_8.9.ia64.rpm
File outdated by:  RHBA-2012:0111
    MD5: 03d1afc3384f99a52f45b4cd51b79fa4
 
PPC:
dlm-kernel-2.6.9-58.6.el4_8.9.ppc64.rpm
File outdated by:  RHBA-2012:0111
    MD5: bc95fc2c5259fea638126ca5a2a6b0cd
dlm-kernel-largesmp-2.6.9-58.6.el4_8.9.ppc64.rpm
File outdated by:  RHBA-2012:0111
    MD5: 3cc372862aa4c54ad864ee7b65dba9fb
dlm-kernheaders-2.6.9-58.6.el4_8.9.ppc64.rpm
File outdated by:  RHBA-2012:0111
    MD5: fbe4070322e58a1c6c1e66dec9396677
 
x86_64:
dlm-kernel-2.6.9-58.6.el4_8.9.x86_64.rpm
File outdated by:  RHBA-2012:0111
    MD5: 15ebaae342b859e1344aea3659ad544f
dlm-kernel-largesmp-2.6.9-58.6.el4_8.9.x86_64.rpm
File outdated by:  RHBA-2012:0111
    MD5: 4bf35599173353b3b65113a1b059b7ed
dlm-kernel-smp-2.6.9-58.6.el4_8.9.x86_64.rpm
File outdated by:  RHBA-2012:0111
    MD5: 6b6ef3ef63669452793f3d5f7f0ecbf4
dlm-kernel-xenU-2.6.9-58.6.el4_8.9.x86_64.rpm
File outdated by:  RHBA-2012:0111
    MD5: f37b3218101a60bd3df6cd64184070d7
dlm-kernheaders-2.6.9-58.6.el4_8.9.x86_64.rpm
File outdated by:  RHBA-2012:0111
    MD5: bf8ef5ac1d4e3ce766685b63010bb4bc
 
Cluster Suite EL4.8.z

SRPMS:
dlm-kernel-2.6.9-58.6.el4_8.9.src.rpm
File outdated by:  RHBA-2011:0161
    MD5: fea19e526a7a986e5432e1a4ed66e72a
 
IA-32:
dlm-kernel-2.6.9-58.6.el4_8.9.i686.rpm
File outdated by:  RHBA-2011:0161
    MD5: 6286cf2ee799da527198410e8c70e8f1
dlm-kernel-hugemem-2.6.9-58.6.el4_8.9.i686.rpm
File outdated by:  RHBA-2011:0161
    MD5: b7f4f957d509fa49f2568cc9e2e68176
dlm-kernel-smp-2.6.9-58.6.el4_8.9.i686.rpm
File outdated by:  RHBA-2011:0161
    MD5: 35b67191ee9f231fcf4c0ec1a36b37c1
dlm-kernel-xenU-2.6.9-58.6.el4_8.9.i686.rpm
File outdated by:  RHBA-2011:0161
    MD5: fafd230c809894d20147bd69bedb2dcd
dlm-kernheaders-2.6.9-58.6.el4_8.9.i686.rpm
File outdated by:  RHBA-2011:0161
    MD5: 75bf2ebdd8fce1aee7234cf9916aa4ef
 
IA-64:
dlm-kernel-2.6.9-58.6.el4_8.9.ia64.rpm
File outdated by:  RHBA-2011:0161
    MD5: 50db51c0fb4043ffef8eb19646282512
dlm-kernheaders-2.6.9-58.6.el4_8.9.ia64.rpm
File outdated by:  RHBA-2011:0161
    MD5: 03d1afc3384f99a52f45b4cd51b79fa4
 
PPC:
dlm-kernel-2.6.9-58.6.el4_8.9.ppc64.rpm
File outdated by:  RHBA-2011:0161
    MD5: bc95fc2c5259fea638126ca5a2a6b0cd
dlm-kernel-largesmp-2.6.9-58.6.el4_8.9.ppc64.rpm
File outdated by:  RHBA-2011:0161
    MD5: 3cc372862aa4c54ad864ee7b65dba9fb
dlm-kernheaders-2.6.9-58.6.el4_8.9.ppc64.rpm
File outdated by:  RHBA-2011:0161
    MD5: fbe4070322e58a1c6c1e66dec9396677
 
x86_64:
dlm-kernel-2.6.9-58.6.el4_8.9.x86_64.rpm
File outdated by:  RHBA-2011:0161
    MD5: 15ebaae342b859e1344aea3659ad544f
dlm-kernel-largesmp-2.6.9-58.6.el4_8.9.x86_64.rpm
File outdated by:  RHBA-2011:0161
    MD5: 4bf35599173353b3b65113a1b059b7ed
dlm-kernel-smp-2.6.9-58.6.el4_8.9.x86_64.rpm
File outdated by:  RHBA-2011:0161
    MD5: 6b6ef3ef63669452793f3d5f7f0ecbf4
dlm-kernel-xenU-2.6.9-58.6.el4_8.9.x86_64.rpm
File outdated by:  RHBA-2011:0161
    MD5: f37b3218101a60bd3df6cd64184070d7
dlm-kernheaders-2.6.9-58.6.el4_8.9.x86_64.rpm
File outdated by:  RHBA-2011:0161
    MD5: bf8ef5ac1d4e3ce766685b63010bb4bc
 
(The unlinked packages above are only available from the Red Hat Network)

Bugs fixed (see bugzilla for more information)

546022 - lvm commands hang on connect() to clvmd



These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/