- Issued:
- 2013-01-29
- Updated:
- 2013-01-29
RHBA-2013:0205 - Bug Fix Advisory
Synopsis
xfsprogs bug fix update
Type/Severity
Bug Fix Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
Updated xfsprogs packages that fix several bugs are now available for Red Hat
Enterprise Linux 5.
Description
The xfsprogs packages contain a set of commands to use the XFS file system,
including the mkfs.xfs command to construct an XFS system.
This update fixes the following bugs:
- Prior to this update, an incorrect "device not found" error message was
sometimes returned when running the "mkfs.xfs" command on a multipath device.
With this update, multipath device handling has been improved and these messages
are no longer returned in the described scenario. (BZ#471102)
- When reporting quotas, the xfs_quota utility sometimes returned "XFS_GETQUOTA:
No such process" errors if, for example, group quotas were not specified. This
bug has been fixed and these messages are no longer returned for non-existent
quota types. (BZ#669333)
- Previously, certain file names could cause the xfs_metadump utility to become
unresponsive when generating obfuscated names. This update modifies the
underlying source code and xfs_metadump now works as expected. (BZ#714934)
- The allocation group size (agsize) was computed incorrectly running the "mkfs"
command for some file system sizes. As a consequence, creating file systems
could fail if file system blocks within an allocation group (agblocks) were
increased past the maximum allowed size. This update modifies the computing
method so that agblocks are no longer increased past the maximum. (BZ#756361)
- When an invalid xfs entry was encountered in the mtab file, the xfs_quota
utility terminated with the "xfs_quota: cannot initialize path table: No such
file or directory" error message. The underlying source code has been modified
and xfs_quota runs as expected now. (BZ#756363)
- Previously, the xfs_quota utility reported that the project quota values were
twice as high as expected. This update modifies the xfs_quota utility and the
incorrect values are no longer reported. (BZ#756365)
All users who use the XFS file system are advised to upgrade to these updated
packages, which fix these bugs.
Solution
Before applying this update, make sure all previously-released errata
relevant to your system have been applied.
This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/knowledge/articles/11258
Affected Products
- Red Hat Enterprise Linux Scalable File System (for RHEL Server) 5 x86_64
- Red Hat Enterprise Linux Scalable File System (for RHEL Server) from RHUI 5 x86_64
Fixes
- BZ - 669333 - xfs_quota generates "XFS_GETQUOTA: No such process" errors
- BZ - 714934 - [xfs/xfstests 253] xfs_db metadump hang forever
- BZ - 756363 - [xfs/xfstests 261] xfs_quota exits immediately if bogus entry is in mtab
- BZ - 756365 - [xfs/xfstests 262] quota values reported were double what they should have been
CVEs
(none)
References
(none)
Red Hat Enterprise Linux Scalable File System (for RHEL Server) 5
SRPM | |
---|---|
xfsprogs-2.10.2-8.el5.src.rpm | SHA-256: f0d085674f9474ceb0d0401f1bc5cce1ff6ae0ad775b82d9163d221556933839 |
x86_64 | |
xfsprogs-2.10.2-8.el5.x86_64.rpm | SHA-256: da1c2c9b6a55e198192e8c133beba5de247367e523594029ea49a0c96a44484a |
xfsprogs-devel-2.10.2-8.el5.x86_64.rpm | SHA-256: 93d78bbc9ab53143dfda531a0a61ceeb00edb7bd3ee83aa30a45bbb3e99ae69a |
Red Hat Enterprise Linux Scalable File System (for RHEL Server) from RHUI 5
SRPM | |
---|---|
xfsprogs-2.10.2-8.el5.src.rpm | SHA-256: f0d085674f9474ceb0d0401f1bc5cce1ff6ae0ad775b82d9163d221556933839 |
x86_64 | |
xfsprogs-2.10.2-8.el5.x86_64.rpm | SHA-256: da1c2c9b6a55e198192e8c133beba5de247367e523594029ea49a0c96a44484a |
xfsprogs-devel-2.10.2-8.el5.x86_64.rpm | SHA-256: 93d78bbc9ab53143dfda531a0a61ceeb00edb7bd3ee83aa30a45bbb3e99ae69a |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.