- Issued:
- 2012-09-11
- Updated:
- 2012-09-11
RHBA-2012:1253 - Bug Fix Advisory
Synopsis
Red Hat Storage 2.0 enhancement and bug fix update #2
Type/Severity
Bug Fix Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
An updated glusterfs, glusterfs-debuginfo, glusterfs-devel, glusterfs-fuse,
glusterfs-geo-replication, glusterfs-rdma, gluster-swift, vdsm, and
glusterfs-server packages that fix several bugs are now available for Red Hat
Storage 2.0.
Description
Red Hat Storage is software only, scale-out storage that provides flexible and
affordable unstructured data storage for the enterprise.
This update fixes the following bugs:
In certain parallel setxattr workloads, a mismatch in extended attributes of a
directory between different bricks of a volume is noticed. This results in
getxattr returning inconsistent attributes. This bug has been fixed in this
update (BZ#838197).
Appending data continuously to a file on a FUSE mount reports an Input/Output
error after sometime. This has been fixed in this update (BZ#840394).
Writes to a volume fails even when the quota limit has not been reached. This
issues is due to an optimization in the file system. This bug has been fixed in
this update (BZ#840406).
In a CTDB failover setup, when one server is brought down, there is a long
delay (between 6 to 14 minutes) before the IP automatically fails over to the
other server. This issue is due to a bug in the ping timer logic. This bug has
been fixed in this update (BZ#840655).
When a striped volume is created with XFS bricks, wastage of space is noticed.
This issue is due to the speculative preallocation logic in XFS which has been
fixed in this update (BZ#840809).
After creating a stripe-replicate or a distribute-stripe-replicate volume, write
operation fails with an "Invalid argument" error when writing to a file for the
first time. This issue is due to the changes in stripe-coalesce feature which
has been fixed in this update (BZ#842752).
Renaming a directory fails on a striped volume. This issue has been fixed in
this update (BZ#842953).
In a gluster volume mounted using the glusterfs-fuse option, a non-root user
cannot run an executable which has execute permissions. This issue has been
fixed in this update (BZ#843960).
If gluster volume status command is executed and glusterfsd does not respond in
30 minutes with the status,the cluster lock held by the source glusterd is not
released. This results in failure of other operations. This issue has been fixed
in this update (BZ#844803).
Debuggability of statedump has been enhanced in this update. The enhancements
includes start and end marker addition, using pthread_mutex_trylock instead of
pthread_mutex_lock to avoid deadlocks, appending timestamp to names of the
statedump files, etc (BZ#844802).
The self-heal daemon generates excessive amount of logs. These logs results in
large disk space consumption. This issue has been fixed by minimizing the logs
in this update (BZ#844804).
The VDSM module of Red Hat Storage throws an error during boot while trying to
create multipath devices on local storage due to the default multipath
configuration file. This issue has been fixed in this update (BZ#837869).
When a multipath vector is resized to a smaller size, device-mapper-multipath
does not reassign the pointer to an array. If the array location changes by
reducing its size, device-mapper-multipath corrupts its memory. This issue has
been fixed in this update (BZ#845429).
Some remote procedure call (RPC) handlers of glusterd and glusterfsd return a
value of -1 even when a reply may have been submitted to the remote caller. This
will potentially result in double free causing glusterd to crash. The RPC
handler functions have been modified to return success for RPC layer once reply
is submitted. This issue has been fixed in this update (BZ#851109 and
BZ#851410).
Solution
Before applying this update, make sure all previously-released errata
relevant to your system have been applied.
This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/knowledge/articles/11258
Affected Products
- Red Hat Enterprise Linux Server 6 x86_64
- Red Hat Enterprise Linux Server 5 x86_64
- Red Hat Gluster Storage Server for On-premise 2.0 x86_64
- Red Hat Storage for Public Cloud (via RHUI) 2.0 x86_64
Fixes
- BZ - 837869 - VDSM copies a multipath.conf that is accepting all devices by default and throwing errors on local disk.
- BZ - 838197 - dht_aggregate 'user.swift.metadata' mismatch
- BZ - 840394 - appending data to a file on fuse mount fails with EIO
- BZ - 840655 - CTDB: Noticeable delay in CTDB failover(ranging between 6-14 mins)
- BZ - 842752 - dd fails with "Invalid argument" error on the mount point while creating the file for first time on stripe with replicate volume
- BZ - 842953 - Renaming of directories fails on stripe volume
- BZ - 843960 - Permission Denied error when executing userfiles from RHS (gluster) volume
- BZ - 844802 - improvements in statedumps
- BZ - 844803 - call_bail of a frame in glusterd might lead to stale locks in the cluster
- BZ - 844804 - excessive logging in self-heal daemon should be reduced
- BZ - 851109 - glusterd core dumps when statedump is taken under heavy load
- BZ - 851410 - glusterfsd core dumps when statedump is taken under heavy load
CVEs
(none)
References
(none)
Red Hat Enterprise Linux Server 6
SRPM | |
---|---|
glusterfs-3.3.0.2rhs-30.el6.src.rpm | SHA-256: b3aae5f392e45afada6b10495f1d3bfa18185553068df7c023fce7faf66a892a |
x86_64 | |
glusterfs-3.3.0.2rhs-30.el6.x86_64.rpm | SHA-256: 4ebce47f594b3efbd01c5466731b364126453a83b7f131e16404c058cf85f338 |
glusterfs-debuginfo-3.3.0.2rhs-30.el6.x86_64.rpm | SHA-256: 24befc8cf612de40beab8e8c59b4cd9186a8c6bdacf86d48343e90eafee3d19a |
glusterfs-devel-3.3.0.2rhs-30.el6.x86_64.rpm | SHA-256: 628a59654b17561c0d133a0c1624971f2bc6ec640a8e0c3d0728f1ff47386517 |
glusterfs-fuse-3.3.0.2rhs-30.el6.x86_64.rpm | SHA-256: 04726a074f857866424f5a0d707ed0d70fe8e4849ba8d464645c9ff33c858fab |
glusterfs-rdma-3.3.0.2rhs-30.el6.x86_64.rpm | SHA-256: 88c16d808c33b0212aaf18f798ff384ed5f6213423fe4a594d8a6d5ef50a4c11 |
Red Hat Enterprise Linux Server 5
SRPM | |
---|---|
glusterfs-3.3.0.2rhs-30.el5.src.rpm | SHA-256: 63cd75e34e20d84ddcb5265090fe7c5b5b47a5827c5f2631e31c591d3bf9dcde |
x86_64 | |
glusterfs-3.3.0.2rhs-30.el5.x86_64.rpm | SHA-256: 677c2587b78ceddc6cfd50f217bd04ecf25df51871ffc7cb55385441dd44e7c2 |
glusterfs-debuginfo-3.3.0.2rhs-30.el5.x86_64.rpm | SHA-256: 265972aa83609289e8c57f124213e5e029b148c17e27f222cad437c54b93a0c3 |
glusterfs-devel-3.3.0.2rhs-30.el5.x86_64.rpm | SHA-256: 868b176b4ccf3790125745f241c9596cb6f7418c136245e9bf219a90d5e5145e |
glusterfs-fuse-3.3.0.2rhs-30.el5.x86_64.rpm | SHA-256: 04d1ba6707eb3c8b9084219bcb7bc540434e9437aff096e7a4a22621a043715a |
glusterfs-rdma-3.3.0.2rhs-30.el5.x86_64.rpm | SHA-256: d8ab3c53382f55d788a4248e1d8f7f81f06febcc19171ff46e4742d5aa25119c |
Red Hat Gluster Storage Server for On-premise 2.0
SRPM | |
---|---|
device-mapper-multipath-0.4.9-56.el6_3.1.src.rpm | SHA-256: 4de1fd658ca9bf7df792b1a29ce6d07b097a0bd838c70bac26d53704e5757fba |
glusterfs-3.3.0.2rhs-30.el6rhs.src.rpm | SHA-256: 8cd27bf33e5a6a1eea3a28d6d44dbea03882772cca5610ac2c1a7c4fd305fffd |
vdsm-4.9.6-16.el6rhs.src.rpm | SHA-256: 363046a8a4af96298b7aa25abfb1c6c60e584a28da698b2a5cbca6e36882a0fe |
x86_64 | |
device-mapper-multipath-0.4.9-56.el6_3.1.x86_64.rpm | SHA-256: 77f7618f1c716da7d02a4c9dfeab61dbf4417259ffa792da55743f255135f444 |
device-mapper-multipath-debuginfo-0.4.9-56.el6_3.1.x86_64.rpm | SHA-256: 3b0ce30fc1bee0d29833b468bf023981db7174c3c10f78019b8e79d423339010 |
device-mapper-multipath-libs-0.4.9-56.el6_3.1.x86_64.rpm | SHA-256: a37f53bf122214b7cefb6344928b20c31e3906d51feec70f5076ff0555c101a6 |
glusterfs-3.3.0.2rhs-30.el6rhs.x86_64.rpm | SHA-256: 16180ae12216a5977ffdfdd82a87c46d93b5576f6ac505b6b59f1fe0f214896c |
glusterfs-debuginfo-3.3.0.2rhs-30.el6rhs.x86_64.rpm | SHA-256: 8b5c8d2977af8953e1d9e184cb75f6a56724f0f36d8e45a5835bb1928ca57689 |
glusterfs-devel-3.3.0.2rhs-30.el6rhs.x86_64.rpm | SHA-256: 5e52a232ca7d4e2e5923fc0a98c3383456d0b132606d49c41c119b2eeb88c39f |
glusterfs-fuse-3.3.0.2rhs-30.el6rhs.x86_64.rpm | SHA-256: d5af4208db7d24a922601de8eb4da81f6a6f87461bd3e25589091a92e2d9f04a |
glusterfs-geo-replication-3.3.0.2rhs-30.el6rhs.x86_64.rpm | SHA-256: 01503e0ce7d8c360baa3c40f01a6bba62f47371fc2f764915d520d7df2df2a16 |
glusterfs-rdma-3.3.0.2rhs-30.el6rhs.x86_64.rpm | SHA-256: 6facdbd2fdf55fac74b1f92d8c8d04f088d526fd28e24420102e0842310a99c6 |
glusterfs-server-3.3.0.2rhs-30.el6rhs.x86_64.rpm | SHA-256: a33680effa773dc968cfd82fb66c3171f7d46db278e035f96b5899e1606b16bc |
kpartx-0.4.9-56.el6_3.1.x86_64.rpm | SHA-256: bfc628d199dbe31f489f7b67a35a3baa8a62f9f633c50accbda0c224c765b126 |
vdsm-4.9.6-16.el6rhs.x86_64.rpm | SHA-256: df5a51927c06ec087b5dfb156f22f3292ebbd8c700344fe1111c88249c6f4acf |
vdsm-bootstrap-4.9.6-16.el6rhs.noarch.rpm | SHA-256: 9a1735779b925a7630aba22e5d4b5e999d2c02ae1d2cfa0e02c00564122a9631 |
vdsm-cli-4.9.6-16.el6rhs.noarch.rpm | SHA-256: 764bb68c562ae6820ab6397ba4e20be9005474d722af6c28810cf7e8d8c3216c |
vdsm-debug-plugin-4.9.6-16.el6rhs.noarch.rpm | SHA-256: 48d68234ee4761cc9c5833d62bfac80480d0bb59103f50665584fd6689578905 |
vdsm-debuginfo-4.9.6-16.el6rhs.x86_64.rpm | SHA-256: 7e23bab0565d3608e7859f00f09531583e9925e9fea45f6efc76a74e0fce2a25 |
vdsm-gluster-4.9.6-16.el6rhs.noarch.rpm | SHA-256: e0358a4b53e8ad5b6e40a3e750d3adcaa580a0c0a1cb2d5969381c9f3cb179d8 |
vdsm-hook-faqemu-4.9.6-16.el6rhs.noarch.rpm | SHA-256: f906aefa440a0105da90e722e5caf4d6e24f56b24ca4f1f6cb901b269f6a5d08 |
vdsm-hook-vhostmd-4.9.6-16.el6rhs.noarch.rpm | SHA-256: e0ca9cb2ec5691c451020707520213d557286b3b0bfbe816a040ab7627d1a15f |
vdsm-python-4.9.6-16.el6rhs.noarch.rpm | SHA-256: 02983a3811fe0efbac89c34b514e846ccb06e6ba3fb9afa415a00069f6e57e14 |
vdsm-reg-4.9.6-16.el6rhs.noarch.rpm | SHA-256: 16c413c1be5556443edae7d4288a4f1c40e90d6698f80032925fde9ac0b8dbc6 |
Red Hat Storage for Public Cloud (via RHUI) 2.0
SRPM | |
---|---|
device-mapper-multipath-0.4.9-56.el6_3.1.src.rpm | SHA-256: 4de1fd658ca9bf7df792b1a29ce6d07b097a0bd838c70bac26d53704e5757fba |
glusterfs-3.3.0.2rhs-30.el6rhs.src.rpm | SHA-256: 8cd27bf33e5a6a1eea3a28d6d44dbea03882772cca5610ac2c1a7c4fd305fffd |
vdsm-4.9.6-16.el6rhs.src.rpm | SHA-256: 363046a8a4af96298b7aa25abfb1c6c60e584a28da698b2a5cbca6e36882a0fe |
x86_64 | |
device-mapper-multipath-0.4.9-56.el6_3.1.x86_64.rpm | SHA-256: 77f7618f1c716da7d02a4c9dfeab61dbf4417259ffa792da55743f255135f444 |
device-mapper-multipath-debuginfo-0.4.9-56.el6_3.1.x86_64.rpm | SHA-256: 3b0ce30fc1bee0d29833b468bf023981db7174c3c10f78019b8e79d423339010 |
device-mapper-multipath-libs-0.4.9-56.el6_3.1.x86_64.rpm | SHA-256: a37f53bf122214b7cefb6344928b20c31e3906d51feec70f5076ff0555c101a6 |
glusterfs-3.3.0.2rhs-30.el6rhs.x86_64.rpm | SHA-256: 16180ae12216a5977ffdfdd82a87c46d93b5576f6ac505b6b59f1fe0f214896c |
glusterfs-debuginfo-3.3.0.2rhs-30.el6rhs.x86_64.rpm | SHA-256: 8b5c8d2977af8953e1d9e184cb75f6a56724f0f36d8e45a5835bb1928ca57689 |
glusterfs-devel-3.3.0.2rhs-30.el6rhs.x86_64.rpm | SHA-256: 5e52a232ca7d4e2e5923fc0a98c3383456d0b132606d49c41c119b2eeb88c39f |
glusterfs-fuse-3.3.0.2rhs-30.el6rhs.x86_64.rpm | SHA-256: d5af4208db7d24a922601de8eb4da81f6a6f87461bd3e25589091a92e2d9f04a |
glusterfs-geo-replication-3.3.0.2rhs-30.el6rhs.x86_64.rpm | SHA-256: 01503e0ce7d8c360baa3c40f01a6bba62f47371fc2f764915d520d7df2df2a16 |
glusterfs-rdma-3.3.0.2rhs-30.el6rhs.x86_64.rpm | SHA-256: 6facdbd2fdf55fac74b1f92d8c8d04f088d526fd28e24420102e0842310a99c6 |
glusterfs-server-3.3.0.2rhs-30.el6rhs.x86_64.rpm | SHA-256: a33680effa773dc968cfd82fb66c3171f7d46db278e035f96b5899e1606b16bc |
kpartx-0.4.9-56.el6_3.1.x86_64.rpm | SHA-256: bfc628d199dbe31f489f7b67a35a3baa8a62f9f633c50accbda0c224c765b126 |
vdsm-4.9.6-16.el6rhs.x86_64.rpm | SHA-256: df5a51927c06ec087b5dfb156f22f3292ebbd8c700344fe1111c88249c6f4acf |
vdsm-bootstrap-4.9.6-16.el6rhs.noarch.rpm | SHA-256: 9a1735779b925a7630aba22e5d4b5e999d2c02ae1d2cfa0e02c00564122a9631 |
vdsm-cli-4.9.6-16.el6rhs.noarch.rpm | SHA-256: 764bb68c562ae6820ab6397ba4e20be9005474d722af6c28810cf7e8d8c3216c |
vdsm-debug-plugin-4.9.6-16.el6rhs.noarch.rpm | SHA-256: 48d68234ee4761cc9c5833d62bfac80480d0bb59103f50665584fd6689578905 |
vdsm-debuginfo-4.9.6-16.el6rhs.x86_64.rpm | SHA-256: 7e23bab0565d3608e7859f00f09531583e9925e9fea45f6efc76a74e0fce2a25 |
vdsm-gluster-4.9.6-16.el6rhs.noarch.rpm | SHA-256: e0358a4b53e8ad5b6e40a3e750d3adcaa580a0c0a1cb2d5969381c9f3cb179d8 |
vdsm-hook-faqemu-4.9.6-16.el6rhs.noarch.rpm | SHA-256: f906aefa440a0105da90e722e5caf4d6e24f56b24ca4f1f6cb901b269f6a5d08 |
vdsm-hook-vhostmd-4.9.6-16.el6rhs.noarch.rpm | SHA-256: e0ca9cb2ec5691c451020707520213d557286b3b0bfbe816a040ab7627d1a15f |
vdsm-python-4.9.6-16.el6rhs.noarch.rpm | SHA-256: 02983a3811fe0efbac89c34b514e846ccb06e6ba3fb9afa415a00069f6e57e14 |
vdsm-reg-4.9.6-16.el6rhs.noarch.rpm | SHA-256: 16c413c1be5556443edae7d4288a4f1c40e90d6698f80032925fde9ac0b8dbc6 |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.