- Issued:
- 2006-03-07
- Updated:
- 2006-03-07
RHBA-2006:0137 - Bug Fix Advisory
Synopsis
lvm2 bug fix and enhancement update
Type/Severity
Bug Fix Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
An updated lvm2 package that includes various bug fixes and enhancements is
now available.
Description
The lvm2 package contains support for logical volume management.
This updated lvm2 package now includes the following enhancements and bug
fixes:
- Replaces the code for activating devices with new libdevmapper dependency
tree functions. This improves the way failure to create or activate
snapshots is handled.
- Adds the 'LVM-' prefix to device-mapper uuids to indicate that they
belong to LVM.
- Uses 'modprobe' to load device-mapper target kernel modules automatically.
- Reduces chunksize limit to 512k for new snapshots. A larger value
does not work on many kernels.
- Displays chunk size field correctly in reports.
- No longer hides snapshots from the default 'lvs' and 'lvdisplay' output.
- Refuses to run pvcreate/pvremove on devices containing mounted filesystems.
- Allows mapped devices to be used as physical volumes.
- Handles errors correctly while awaiting a response to a 'yes or no'
question. Previously, the command could hang.
- When choosing between devices with identical physical volume uuids
actually use the device the warning message says it is using.
- Recognizes ATA over Ethernet (aoe) and Xen xvd devices.
- lvcreate no longer attempts to wipe segments that are of type 'zero' or
'error'.
- Adds new lvs table attributes.
- Adds a new pe_start field to 'pvs'.
- Fixes lvdisplay to show all mirror destinations.
- Adds the -a parameter to 'lvscan'.
- Implements pvresize.
- Fixes contiguous allocation when there are no preceding segments.
- Only keeps a device open if it's known to belong to a locked VG.
- Fixes automatic expansion of the text metadata buffer if it is too small.
- Caches formatted text metadata buffer between metadata area writes.
All users of lvm2 should upgrade to this updated package, which includes
these bug fixes and enhancements.
Solution
Before applying this update, make sure that all previously-released
errata relevant to your system have been applied. Use Red Hat
Network to download and update your packages. To launch the Red Hat
Update Agent, use the following command:
up2date
For information on how to install packages manually, refer to the
following Web page for the System Administration or Customization
guide specific to your system:
Affected Products
- Red Hat Enterprise Linux Server 4 x86_64
- Red Hat Enterprise Linux Server 4 ia64
- Red Hat Enterprise Linux Server 4 i386
- Red Hat Enterprise Linux Workstation 4 x86_64
- Red Hat Enterprise Linux Workstation 4 ia64
- Red Hat Enterprise Linux Workstation 4 i386
- Red Hat Enterprise Linux Desktop 4 x86_64
- Red Hat Enterprise Linux Desktop 4 i386
- Red Hat Enterprise Linux for IBM z Systems 4 s390x
- Red Hat Enterprise Linux for IBM z Systems 4 s390
- Red Hat Enterprise Linux for Power, big endian 4 ppc
Fixes
- BZ - 164959 - CRM# 619256 RHEL4 lvm2 memory allocation failures locking up system with snapshots
- BZ - 165366 - Questions about how LVM2 metadata is stored: tools need to display pe_start field
- BZ - 168824 - [FEAT:][RHEL 4 U3]LVM2 Snapshot support of root
- BZ - 170339 - pvmove command fails if dm-mirror module not already loaded
- BZ - 176443 - regression: clvmd with gulm gets stuck in infinite loop
CVEs
(none)
References
(none)
Red Hat Enterprise Linux Server 4
SRPM | |
---|---|
lvm2-2.02.01-1.3.RHEL4.src.rpm | SHA-256: 5ba72bc650b55e0916b48abe186ddee70558598d8f099b519c25ab3ed95601c2 |
x86_64 | |
lvm2-2.02.01-1.3.RHEL4.x86_64.rpm | SHA-256: d5d7664864595fa71a8377e3ff3b91193d72e1b24c850581add628351ba7ce06 |
lvm2-2.02.01-1.3.RHEL4.x86_64.rpm | SHA-256: d5d7664864595fa71a8377e3ff3b91193d72e1b24c850581add628351ba7ce06 |
ia64 | |
lvm2-2.02.01-1.3.RHEL4.ia64.rpm | SHA-256: 3be3e818edd1718b38cb72ab6d69234843cffef18caaf49a779d590a476b4cca |
lvm2-2.02.01-1.3.RHEL4.ia64.rpm | SHA-256: 3be3e818edd1718b38cb72ab6d69234843cffef18caaf49a779d590a476b4cca |
i386 | |
lvm2-2.02.01-1.3.RHEL4.i386.rpm | SHA-256: 68f3cc7e85a332380d06d65d26b5b120b7f36a290c0c919051bd3f74628aadbb |
lvm2-2.02.01-1.3.RHEL4.i386.rpm | SHA-256: 68f3cc7e85a332380d06d65d26b5b120b7f36a290c0c919051bd3f74628aadbb |
Red Hat Enterprise Linux Workstation 4
SRPM | |
---|---|
lvm2-2.02.01-1.3.RHEL4.src.rpm | SHA-256: 5ba72bc650b55e0916b48abe186ddee70558598d8f099b519c25ab3ed95601c2 |
x86_64 | |
lvm2-2.02.01-1.3.RHEL4.x86_64.rpm | SHA-256: d5d7664864595fa71a8377e3ff3b91193d72e1b24c850581add628351ba7ce06 |
ia64 | |
lvm2-2.02.01-1.3.RHEL4.ia64.rpm | SHA-256: 3be3e818edd1718b38cb72ab6d69234843cffef18caaf49a779d590a476b4cca |
i386 | |
lvm2-2.02.01-1.3.RHEL4.i386.rpm | SHA-256: 68f3cc7e85a332380d06d65d26b5b120b7f36a290c0c919051bd3f74628aadbb |
Red Hat Enterprise Linux Desktop 4
SRPM | |
---|---|
lvm2-2.02.01-1.3.RHEL4.src.rpm | SHA-256: 5ba72bc650b55e0916b48abe186ddee70558598d8f099b519c25ab3ed95601c2 |
x86_64 | |
lvm2-2.02.01-1.3.RHEL4.x86_64.rpm | SHA-256: d5d7664864595fa71a8377e3ff3b91193d72e1b24c850581add628351ba7ce06 |
i386 | |
lvm2-2.02.01-1.3.RHEL4.i386.rpm | SHA-256: 68f3cc7e85a332380d06d65d26b5b120b7f36a290c0c919051bd3f74628aadbb |
Red Hat Enterprise Linux for IBM z Systems 4
SRPM | |
---|---|
lvm2-2.02.01-1.3.RHEL4.src.rpm | SHA-256: 5ba72bc650b55e0916b48abe186ddee70558598d8f099b519c25ab3ed95601c2 |
s390x | |
lvm2-2.02.01-1.3.RHEL4.s390x.rpm | SHA-256: d8653780b7e2bf10538e556febf3d12b09e851ed9270edaa0b0687d83e6ac409 |
s390 | |
lvm2-2.02.01-1.3.RHEL4.s390.rpm | SHA-256: 6e7d06b06afa27fb15b001fc2a7db960d20f5d067dd0c7be74d4fa4f066f17eb |
Red Hat Enterprise Linux for Power, big endian 4
SRPM | |
---|---|
lvm2-2.02.01-1.3.RHEL4.src.rpm | SHA-256: 5ba72bc650b55e0916b48abe186ddee70558598d8f099b519c25ab3ed95601c2 |
ppc | |
lvm2-2.02.01-1.3.RHEL4.ppc.rpm | SHA-256: 916aae6914dcd8cd49df688ec313c613a065af838a254fdf228d563a51fbdcf4 |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.