Skip to navigation

Bug Fix Advisory GFS-kernel bug fix update

Advisory: RHBA-2010:0085-2
Type: Bug Fix Advisory
Severity: N/A
Issued on: 2010-02-03
Last updated on: 2010-02-03
Affected Products: Global File System EL4
Global File System EL4.8.z

Details

Updated GFS-kernel packages that fix module-loading issues are now
available for Red Hat Enterprise Linux 4.8, kernel release
2.6.9-89.0.19.EL.

The GFS-kernel packages contain modules that provide the ability to mount
and use GFS file systems.

These updated GFS-kernel packages are in sync with the latest kernel
(2.6.9-89.0.19.EL). The modules in earlier GFS-kernel packages fail to load
because they do not match the running kernel. It is possible to force-load
the modules; however, with this update, force-loading the modules is not
required. (BZ#557842)

Users are advised to upgrade to these latest GFS-kernel packages, which are
updated for use with the 2.6.9-89.0.19.EL kernel.


Solution

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

To update all RPMs for your particular architecture, run:

rpm -Fvh [filenames]

where [filenames] is a list of the RPMs you wish to upgrade. Only those
RPMs which are currently installed will be updated. Those RPMs which are
not installed but included in the list will not be updated. Note that you
can also use wildcards (*.rpm) if your current directory *only* contains
the
desired RPMs.

Please note that this update is also available via Red Hat Network. Many
people find this an easier way to apply updates. To use Red Hat Network,
launch the Red Hat Update Agent with the following command:

up2date

This will start an interactive process that will result in the appropriate
RPMs being upgraded on your system.

Updated packages

Global File System EL4

SRPMS:
GFS-kernel-2.6.9-85.2.el4_8.7.src.rpm
File outdated by:  RHBA-2011:0159
    MD5: 5dafa734588da97bee919a8eeadcdb22
 
IA-32:
GFS-kernel-2.6.9-85.2.el4_8.7.i686.rpm
File outdated by:  RHBA-2012:0113
    MD5: dc4d0ddda33c34f68328fd158da1fa1c
GFS-kernel-hugemem-2.6.9-85.2.el4_8.7.i686.rpm
File outdated by:  RHBA-2012:0113
    MD5: fefcbee80f41e6a0d4ff0d7fce5fefc1
GFS-kernel-smp-2.6.9-85.2.el4_8.7.i686.rpm
File outdated by:  RHBA-2012:0113
    MD5: 8977713c87f1c9f805350e2a29c0e53d
GFS-kernel-xenU-2.6.9-85.2.el4_8.7.i686.rpm
File outdated by:  RHBA-2012:0113
    MD5: 8b2e5220bffc3feae7c55799be80a666
GFS-kernheaders-2.6.9-85.2.el4_8.7.i686.rpm
File outdated by:  RHBA-2012:0113
    MD5: 2faeddd739888059da544da526e90278
 
IA-64:
GFS-kernel-2.6.9-85.2.el4_8.7.ia64.rpm
File outdated by:  RHBA-2012:0113
    MD5: ab80839b67ac75f27747f3f7fa7d677b
GFS-kernheaders-2.6.9-85.2.el4_8.7.ia64.rpm
File outdated by:  RHBA-2012:0113
    MD5: 4d9d728d33cd4fe4aff2da2203829ec5
 
PPC:
GFS-kernel-2.6.9-85.2.el4_8.7.ppc64.rpm
File outdated by:  RHBA-2012:0113
    MD5: 42e6f7bd7d2e7c1c92e9a96d1634b545
GFS-kernel-largesmp-2.6.9-85.2.el4_8.7.ppc64.rpm
File outdated by:  RHBA-2012:0113
    MD5: 5e31e5499ced6b80756a7131a8e532b8
GFS-kernheaders-2.6.9-85.2.el4_8.7.ppc64.rpm
File outdated by:  RHBA-2012:0113
    MD5: 31bca925a089ca73d3c48ae460647cc8
 
x86_64:
GFS-kernel-2.6.9-85.2.el4_8.7.x86_64.rpm
File outdated by:  RHBA-2012:0113
    MD5: c6d89c6da377ba22f65813c55f36fc97
GFS-kernel-largesmp-2.6.9-85.2.el4_8.7.x86_64.rpm
File outdated by:  RHBA-2012:0113
    MD5: 6ca4a333fdd71c4c3b9ab77d82c571b1
GFS-kernel-smp-2.6.9-85.2.el4_8.7.x86_64.rpm
File outdated by:  RHBA-2012:0113
    MD5: e020df0270af49ae1127d1062b00abc9
GFS-kernel-xenU-2.6.9-85.2.el4_8.7.x86_64.rpm
File outdated by:  RHBA-2012:0113
    MD5: e72b0567fa0add228feadca5aaecf6c5
GFS-kernheaders-2.6.9-85.2.el4_8.7.x86_64.rpm
File outdated by:  RHBA-2012:0113
    MD5: 7a55d03295d06952300dbf372c190a1d
 
Global File System EL4.8.z

SRPMS:
GFS-kernel-2.6.9-85.2.el4_8.7.src.rpm
File outdated by:  RHBA-2011:0159
    MD5: 5dafa734588da97bee919a8eeadcdb22
 
IA-32:
GFS-kernel-2.6.9-85.2.el4_8.7.i686.rpm
File outdated by:  RHBA-2011:0159
    MD5: dc4d0ddda33c34f68328fd158da1fa1c
GFS-kernel-hugemem-2.6.9-85.2.el4_8.7.i686.rpm
File outdated by:  RHBA-2011:0159
    MD5: fefcbee80f41e6a0d4ff0d7fce5fefc1
GFS-kernel-smp-2.6.9-85.2.el4_8.7.i686.rpm
File outdated by:  RHBA-2011:0159
    MD5: 8977713c87f1c9f805350e2a29c0e53d
GFS-kernel-xenU-2.6.9-85.2.el4_8.7.i686.rpm
File outdated by:  RHBA-2011:0159
    MD5: 8b2e5220bffc3feae7c55799be80a666
GFS-kernheaders-2.6.9-85.2.el4_8.7.i686.rpm
File outdated by:  RHBA-2011:0159
    MD5: 2faeddd739888059da544da526e90278
 
IA-64:
GFS-kernel-2.6.9-85.2.el4_8.7.ia64.rpm
File outdated by:  RHBA-2011:0159
    MD5: ab80839b67ac75f27747f3f7fa7d677b
GFS-kernheaders-2.6.9-85.2.el4_8.7.ia64.rpm
File outdated by:  RHBA-2011:0159
    MD5: 4d9d728d33cd4fe4aff2da2203829ec5
 
PPC:
GFS-kernel-2.6.9-85.2.el4_8.7.ppc64.rpm
File outdated by:  RHBA-2011:0159
    MD5: 42e6f7bd7d2e7c1c92e9a96d1634b545
GFS-kernel-largesmp-2.6.9-85.2.el4_8.7.ppc64.rpm
File outdated by:  RHBA-2011:0159
    MD5: 5e31e5499ced6b80756a7131a8e532b8
GFS-kernheaders-2.6.9-85.2.el4_8.7.ppc64.rpm
File outdated by:  RHBA-2011:0159
    MD5: 31bca925a089ca73d3c48ae460647cc8
 
x86_64:
GFS-kernel-2.6.9-85.2.el4_8.7.x86_64.rpm
File outdated by:  RHBA-2011:0159
    MD5: c6d89c6da377ba22f65813c55f36fc97
GFS-kernel-largesmp-2.6.9-85.2.el4_8.7.x86_64.rpm
File outdated by:  RHBA-2011:0159
    MD5: 6ca4a333fdd71c4c3b9ab77d82c571b1
GFS-kernel-smp-2.6.9-85.2.el4_8.7.x86_64.rpm
File outdated by:  RHBA-2011:0159
    MD5: e020df0270af49ae1127d1062b00abc9
GFS-kernel-xenU-2.6.9-85.2.el4_8.7.x86_64.rpm
File outdated by:  RHBA-2011:0159
    MD5: e72b0567fa0add228feadca5aaecf6c5
GFS-kernheaders-2.6.9-85.2.el4_8.7.x86_64.rpm
File outdated by:  RHBA-2011:0159
    MD5: 7a55d03295d06952300dbf372c190a1d
 
(The unlinked packages above are only available from the Red Hat Network)

Bugs fixed (see bugzilla for more information)

557842 - Need rebuild for 2.6.9-89.0.19.EL kernel



These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/