- Issued:
- 2011-01-13
- Updated:
- 2011-01-13
RHBA-2011:0089 - Bug Fix Advisory
Synopsis
gfs-kmod bug fix update
Type/Severity
Bug Fix Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
Updated gfs-kmod packages that fix various bugs are now available for Red Hat
Enterprise Linux 5.
Description
The gfs-kmod packages contain modules that provide the ability to mount and use
Global File System (GFS).
This update fixes the following bugs:
- When a Global File System (GFS) was exported as a Network File System (NFS)
service, relocating the service could cause the data on the file system to be
corrupted. This error has been fixed, and using NFS along with GFS now works as
expected. (BZ#245024)
- Under certain circumstances, using a Network File System (NFS) protocol with a
Global File System (GFS) could fail with the following error:
GFS: fsid=axqa01:gfstest.0: fatal: assertion "!bd->bd_pinned
&& !buffer_busy(bh)" failed
With this update, a complex patch has been applied to resolve this issue, and
the above error no longer occurs. (BZ#491369)
- Prior to this update, a kernel panic may have occurred when copying data from
an mmapped sparse file on a Global File System (GFS) to a file on a different
GFS storage. With this update, this error has been fixed, and GFS no longer
causes kernel panics during this workload. (BZ#617339)
- When a Global File System (GFS) does not have enough journals, an attempt to
mount it can fail, and an error message is written to standard error. However,
this message was not very informative, and did not include important information
required to determine the cause of the problem. With this update, the kernel now
returns the "-EUSERS" error code, which allows the mount.gfs utility to
recognize this error, and display more informative message. (BZ#635023)
All users of gfs-kmod are advised to upgrade to these updated packages, which
resolve these issues.
Solution
Before applying this update, make sure that all previously-released errata
relevant to your system have been applied.
This update is available via Red Hat Network. Details on how to use the Red
Hat Network to apply this update are available at
https://access.redhat.com/kb/docs/DOC-11259
Affected Products
- Red Hat Enterprise Linux Resilient Storage for x86_64 5 x86_64
- Red Hat Enterprise Linux Resilient Storage for x86_64 5 ppc
- Red Hat Enterprise Linux Resilient Storage for x86_64 5 ia64
- Red Hat Enterprise Linux Resilient Storage for x86_64 5 i386
- Red Hat Enterprise Linux Resilient Storage (for RHEL Server) from RHUI 5 x86_64
- Red Hat Enterprise Linux Resilient Storage (for RHEL Server) from RHUI 5 i386
Fixes
- BZ - 491369 - NFS over GFS issue (fatal: assertion "!bd->bd_pinned && !buffer_busy(bh)" failed)
- BZ - 617339 - GFS assertion is thrown: assertion "!get_transaction" failed
- BZ - 635023 - Better error reporting when mounting a gfs fs without enough journals
CVEs
(none)
References
(none)
Red Hat Enterprise Linux Resilient Storage for x86_64 5
SRPM | |
---|---|
gfs-kmod-0.1.34-15.el5.src.rpm | SHA-256: 7dee56bbf2acc919b1ca26a0a65fc58b3579fee19e21dae9fb88fb732f1a7e49 |
x86_64 | |
kmod-gfs-0.1.34-15.el5.x86_64.rpm | SHA-256: cc6ae48b7f17be4126aeeab5f9a774186e8375a5a1ae503e73a34cb68474f626 |
kmod-gfs-xen-0.1.34-15.el5.x86_64.rpm | SHA-256: cc811dfa4fe4e470b193c675204f56465a00fdee124eec5fdbfb894b9fc32182 |
ppc | |
kmod-gfs-0.1.34-15.el5.ppc64.rpm | SHA-256: 7cdc03d59fc94ad9e192eceee530fa010ae2e6d9c3e6f7bd953ed5fd8f7e1c6d |
ia64 | |
kmod-gfs-0.1.34-15.el5.ia64.rpm | SHA-256: e52b78f416fd7f4f5eb8ccdeb9a871280fa72fe28d17c1aa87ea7e9832e6f270 |
kmod-gfs-xen-0.1.34-15.el5.ia64.rpm | SHA-256: f8d2e52617a0ae4b17ee5002d55251e865813f6d7f149646bdc27dee8e64e4c2 |
i386 | |
kmod-gfs-0.1.34-15.el5.i686.rpm | SHA-256: 46f3b3df2202fe7a053bafc5ebac8aa7f6c38048a5fcece78b8c06d655341304 |
kmod-gfs-PAE-0.1.34-15.el5.i686.rpm | SHA-256: 8a3b8639a6af01dcf51d0a975a621942193ffcbdfe07fe36c4f4da7ce846ff2a |
kmod-gfs-xen-0.1.34-15.el5.i686.rpm | SHA-256: e538a555254f01d2d6c0e61ea2bdbe789b118459a240833c2253f448bcbdfb2a |
Red Hat Enterprise Linux Resilient Storage (for RHEL Server) from RHUI 5
SRPM | |
---|---|
gfs-kmod-0.1.34-15.el5.src.rpm | SHA-256: 7dee56bbf2acc919b1ca26a0a65fc58b3579fee19e21dae9fb88fb732f1a7e49 |
x86_64 | |
kmod-gfs-0.1.34-15.el5.x86_64.rpm | SHA-256: cc6ae48b7f17be4126aeeab5f9a774186e8375a5a1ae503e73a34cb68474f626 |
kmod-gfs-xen-0.1.34-15.el5.x86_64.rpm | SHA-256: cc811dfa4fe4e470b193c675204f56465a00fdee124eec5fdbfb894b9fc32182 |
i386 | |
kmod-gfs-0.1.34-15.el5.i686.rpm | SHA-256: 46f3b3df2202fe7a053bafc5ebac8aa7f6c38048a5fcece78b8c06d655341304 |
kmod-gfs-PAE-0.1.34-15.el5.i686.rpm | SHA-256: 8a3b8639a6af01dcf51d0a975a621942193ffcbdfe07fe36c4f4da7ce846ff2a |
kmod-gfs-xen-0.1.34-15.el5.i686.rpm | SHA-256: e538a555254f01d2d6c0e61ea2bdbe789b118459a240833c2253f448bcbdfb2a |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.