Skip to navigation

Enhancement Advisory sanlock enhancement update

Advisory: RHEA-2012:0996-1
Type: Product Enhancement Advisory
Severity: N/A
Issued on: 2012-06-20
Last updated on: 2012-06-20
Affected Products: Red Hat Enterprise Linux Desktop (v. 6)
Red Hat Enterprise Linux HPC Node (v. 6)
Red Hat Enterprise Linux Server (v. 6)
Red Hat Enterprise Linux Workstation (v. 6)

Details

Updated sanlock packages that add multiple enhancements are now available for
Red Hat Enterprise Linux 6.

The sanlock packages provide a shared disk lock manager that uses disk paxos to
manage leases on shared storage. Hosts connected to a common Storage Area
Network (SAN) can use sanlock to synchronize the access to the shared disks.
Both libvirt and vdsm can use sanlock to synchronize access to shared virtual
machine (VM) images.

The sanlock packages have been upgraded to the latest upstream version, which
provides a number of enhancements over the previous version. (BZ#782600)

All users of sanlock are advised to upgrade to these updated packages, which add
these enhancements.


Solution

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/knowledge/articles/11258/

Updated packages

Red Hat Enterprise Linux Desktop (v. 6)

SRPMS:
sanlock-2.3-1.el6.src.rpm
File outdated by:  RHBA-2013:1632
    MD5: 63b283ef70134a3186f2e29d3f620715
SHA-256: af20ae15f81100e49e6b884866019e0852cc124e00c6beb016c4cfb958333864
 
x86_64:
sanlock-2.3-1.el6.x86_64.rpm
File outdated by:  RHBA-2013:1632
    MD5: f239ff4ec2085973f0af4bc26b782a94
SHA-256: d9c6aa20911879dbb23f02d242d3bd5f4fe8d37fccbb7b70442c2c611e6524ae
sanlock-debuginfo-2.3-1.el6.x86_64.rpm
File outdated by:  RHBA-2013:1632
    MD5: 42a1ca9f308f4d68a4d67bb5178a50b7
SHA-256: a7c793845ba83c7154cf6c145f64b8cdbfa6a1d817b614f1bc5206854364793c
sanlock-devel-2.3-1.el6.x86_64.rpm
File outdated by:  RHBA-2013:1632
    MD5: 570fea9ed3472490194580f69c2f689d
SHA-256: eb3b3381bdaab67a5e14befe558632ff1027b9c5f7a5f41e694012e928f995f3
sanlock-lib-2.3-1.el6.x86_64.rpm
File outdated by:  RHBA-2013:1632
    MD5: 2cb219e190e378855cfad8c44b09967f
SHA-256: 4ba4c5684edc51d8811a37d6751ff623b8b0b38485cc1a2297c86fa8b688e757
sanlock-python-2.3-1.el6.x86_64.rpm
File outdated by:  RHBA-2013:1632
    MD5: ff47dff5122186a60c59561952ff4520
SHA-256: 522aa762a9d2b47fa917f678f942b0946f8c49dc0ecc692f21d61dfaa0a11db4
 
Red Hat Enterprise Linux HPC Node (v. 6)

SRPMS:
sanlock-2.3-1.el6.src.rpm
File outdated by:  RHBA-2013:1632
    MD5: 63b283ef70134a3186f2e29d3f620715
SHA-256: af20ae15f81100e49e6b884866019e0852cc124e00c6beb016c4cfb958333864
 
x86_64:
sanlock-2.3-1.el6.x86_64.rpm
File outdated by:  RHBA-2013:1632
    MD5: f239ff4ec2085973f0af4bc26b782a94
SHA-256: d9c6aa20911879dbb23f02d242d3bd5f4fe8d37fccbb7b70442c2c611e6524ae
sanlock-debuginfo-2.3-1.el6.x86_64.rpm
File outdated by:  RHBA-2013:1632
    MD5: 42a1ca9f308f4d68a4d67bb5178a50b7
SHA-256: a7c793845ba83c7154cf6c145f64b8cdbfa6a1d817b614f1bc5206854364793c
sanlock-devel-2.3-1.el6.x86_64.rpm
File outdated by:  RHBA-2013:1632
    MD5: 570fea9ed3472490194580f69c2f689d
SHA-256: eb3b3381bdaab67a5e14befe558632ff1027b9c5f7a5f41e694012e928f995f3
sanlock-lib-2.3-1.el6.x86_64.rpm
File outdated by:  RHBA-2013:1632
    MD5: 2cb219e190e378855cfad8c44b09967f
SHA-256: 4ba4c5684edc51d8811a37d6751ff623b8b0b38485cc1a2297c86fa8b688e757
sanlock-python-2.3-1.el6.x86_64.rpm
File outdated by:  RHBA-2013:1632
    MD5: ff47dff5122186a60c59561952ff4520
SHA-256: 522aa762a9d2b47fa917f678f942b0946f8c49dc0ecc692f21d61dfaa0a11db4
 
Red Hat Enterprise Linux Server (v. 6)

SRPMS:
sanlock-2.3-1.el6.src.rpm
File outdated by:  RHBA-2013:1632
    MD5: 63b283ef70134a3186f2e29d3f620715
SHA-256: af20ae15f81100e49e6b884866019e0852cc124e00c6beb016c4cfb958333864
 
x86_64:
sanlock-2.3-1.el6.x86_64.rpm
File outdated by:  RHBA-2013:1632
    MD5: f239ff4ec2085973f0af4bc26b782a94
SHA-256: d9c6aa20911879dbb23f02d242d3bd5f4fe8d37fccbb7b70442c2c611e6524ae
sanlock-debuginfo-2.3-1.el6.x86_64.rpm
File outdated by:  RHBA-2013:1632
    MD5: 42a1ca9f308f4d68a4d67bb5178a50b7
SHA-256: a7c793845ba83c7154cf6c145f64b8cdbfa6a1d817b614f1bc5206854364793c
sanlock-devel-2.3-1.el6.x86_64.rpm
File outdated by:  RHBA-2013:1632
    MD5: 570fea9ed3472490194580f69c2f689d
SHA-256: eb3b3381bdaab67a5e14befe558632ff1027b9c5f7a5f41e694012e928f995f3
sanlock-lib-2.3-1.el6.x86_64.rpm
File outdated by:  RHBA-2013:1632
    MD5: 2cb219e190e378855cfad8c44b09967f
SHA-256: 4ba4c5684edc51d8811a37d6751ff623b8b0b38485cc1a2297c86fa8b688e757
sanlock-python-2.3-1.el6.x86_64.rpm
File outdated by:  RHBA-2013:1632
    MD5: ff47dff5122186a60c59561952ff4520
SHA-256: 522aa762a9d2b47fa917f678f942b0946f8c49dc0ecc692f21d61dfaa0a11db4
 
Red Hat Enterprise Linux Workstation (v. 6)

SRPMS:
sanlock-2.3-1.el6.src.rpm
File outdated by:  RHBA-2013:1632
    MD5: 63b283ef70134a3186f2e29d3f620715
SHA-256: af20ae15f81100e49e6b884866019e0852cc124e00c6beb016c4cfb958333864
 
x86_64:
sanlock-2.3-1.el6.x86_64.rpm
File outdated by:  RHBA-2013:1632
    MD5: f239ff4ec2085973f0af4bc26b782a94
SHA-256: d9c6aa20911879dbb23f02d242d3bd5f4fe8d37fccbb7b70442c2c611e6524ae
sanlock-debuginfo-2.3-1.el6.x86_64.rpm
File outdated by:  RHBA-2013:1632
    MD5: 42a1ca9f308f4d68a4d67bb5178a50b7
SHA-256: a7c793845ba83c7154cf6c145f64b8cdbfa6a1d817b614f1bc5206854364793c
sanlock-devel-2.3-1.el6.x86_64.rpm
File outdated by:  RHBA-2013:1632
    MD5: 570fea9ed3472490194580f69c2f689d
SHA-256: eb3b3381bdaab67a5e14befe558632ff1027b9c5f7a5f41e694012e928f995f3
sanlock-lib-2.3-1.el6.x86_64.rpm
File outdated by:  RHBA-2013:1632
    MD5: 2cb219e190e378855cfad8c44b09967f
SHA-256: 4ba4c5684edc51d8811a37d6751ff623b8b0b38485cc1a2297c86fa8b688e757
sanlock-python-2.3-1.el6.x86_64.rpm
File outdated by:  RHBA-2013:1632
    MD5: ff47dff5122186a60c59561952ff4520
SHA-256: 522aa762a9d2b47fa917f678f942b0946f8c49dc0ecc692f21d61dfaa0a11db4
 
(The unlinked packages above are only available from the Red Hat Network)

Bugs fixed (see bugzilla for more information)

782600 - update sanlock



These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/