Skip to navigation

Bug Fix Advisory gfs2-utils bug fix and enhancement update

Advisory: RHBA-2011:1042-1
Type: Bug Fix Advisory
Severity: N/A
Issued on: 2011-07-21
Last updated on: 2011-07-21
Affected Products: Red Hat Enterprise Linux (v. 5 server)
Red Hat Enterprise Linux Desktop (v. 5 client)

Details

Updated gfs2-utils packages that fix multiple bugs and add one enhancement are
now available for Red Hat Enterprise Linux 5.

The gfs2-utils packages provide the user-space utilities necessary to mount,
create, maintain and test GFS2 file systems.

This update fixes the following bugs:

* Prior to this update, gfs2_grow aborted unexpectedly with an error message on
a full file system If no free blocks were available in the file system, and the
last block of the rindex file did not allow to add more resource group entries.
As a workaround, the user must remove or truncate a file to free up space. Once
the file system is grown, the file can safely be added back. (BZ# 490649)

* Prior to this update, a file system check (fsck) on GFS2 file systems in
verbose mode caused misleading error messages that the master and root inodes
were not correctly marked. This update modifies the code to set both the master
and root inodes as "in use" in the in-core block map. Now, fsck.gfs2 realizes
that the master and root inodes are properly marked. (BZ# 642797)

* Prior to this update, a fsck on a GFS2 file system for i686 calculated the
wrong starting point for its bitmap search because the GFS2 bitmap was in the
wrong state. Due to this issue, the bitmap search was stuck in an infinite loop.
This update modifies the calculation to use the correct size on 32-bit
platforms. Now, the fsck.gfs2 check runs as expected. (BZ# 667769)

* Prior to this update, a file system check on a damaged GFS2 file system
containing two inodes that point to the same metadata appeared to be a
"duplicate block reference" but both were unrecoverable. Due to this issue, the
fsck.gfs2 check in pass1b terminated abnormally with a segmentation fault
because of the empty reference list. This update additionally checks whether the
duplicate reference list is empty. Now, pass1b completes normally and fsck.gfs2
finishes as expected. (BZ#679076)

* Prior to this update, the command "gfs2_edit savemeta" did not save all
directory information for large directories. Due to this behavior, the directory
hash table and directory leaf blocks beneath were not saved. This update
modifies the savemeta function for gfs2_edit to read all the data. With the
directory hash table processed correctly, all leaf blocks are saved as expected.
(BZ# 679565)

* Prior to this update, indirect blocks were prematurely released from a
gfs2_edit savemeta queue. Due to this behavior, some meta data was not saved and
consequently meta data sets restored with gfs2_edit restoremeta did not pass a
file system check (fsck). This update modifies gfs2_edit so that the required
blocks are now left on the queue and saved with the rest of the meta data. Now,
saving the meta data of a consistent file system results in a complete meta data
set which passes a fsck when restored. (BZ# 698298)

This update also adds the following enhancement:

* Prior to this update, gfs2_edit gathered GFS2 file system information less
effectively. This update enhances gfs_edit to gather more information. (BZ#
656371)

All gfs2-utils users are advised to upgrade to these updated packages, which fix
these bugs and add this enhancement.


Solution

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/kb/docs/DOC-11259/

Updated packages

Red Hat Enterprise Linux (v. 5 server)

SRPMS:
gfs2-utils-0.1.62-31.el5.src.rpm
File outdated by:  RHBA-2013:1339
    MD5: 435d30f54dbd7d33e973c34d5b98826e
SHA-256: bc8142b1be75eaa3455d82c5ada71b657ca15f7cc547c23e6b4df55381cc598b
 
IA-32:
gfs2-utils-0.1.62-31.el5.i386.rpm
File outdated by:  RHBA-2013:1339
    MD5: bcccd103e1ad50bdf638c2cbe32431af
SHA-256: d6b48d7c7e1f9a307864ae74595583f99e06dcdda6b71492d817ef0dabb83588
 
IA-64:
gfs2-utils-0.1.62-31.el5.ia64.rpm
File outdated by:  RHBA-2013:1339
    MD5: 5c9a93089e81f4ad61f64eb4da92325c
SHA-256: 68274cc37fac2db6a80683bfbcf55e3d4b83c77a1c260667fdbe310b9f1e957b
 
PPC:
gfs2-utils-0.1.62-31.el5.ppc.rpm
File outdated by:  RHBA-2013:1339
    MD5: bd0fab3fbabd55684789494703d58819
SHA-256: 69852cb662c09c74bc3e53319783b600ab896eba3e8c898403c3c8eaaff022de
 
x86_64:
gfs2-utils-0.1.62-31.el5.x86_64.rpm
File outdated by:  RHBA-2013:1339
    MD5: 6aff3c52c5b2084166b873b5a715b3c9
SHA-256: c916ae379f9e4ebe5289611397ddd85c14df8ccd25f814acc4a6b5a975afed68
 
Red Hat Enterprise Linux Desktop (v. 5 client)

SRPMS:
gfs2-utils-0.1.62-31.el5.src.rpm
File outdated by:  RHBA-2013:1339
    MD5: 435d30f54dbd7d33e973c34d5b98826e
SHA-256: bc8142b1be75eaa3455d82c5ada71b657ca15f7cc547c23e6b4df55381cc598b
 
IA-32:
gfs2-utils-0.1.62-31.el5.i386.rpm
File outdated by:  RHBA-2013:1339
    MD5: bcccd103e1ad50bdf638c2cbe32431af
SHA-256: d6b48d7c7e1f9a307864ae74595583f99e06dcdda6b71492d817ef0dabb83588
 
x86_64:
gfs2-utils-0.1.62-31.el5.x86_64.rpm
File outdated by:  RHBA-2013:1339
    MD5: 6aff3c52c5b2084166b873b5a715b3c9
SHA-256: c916ae379f9e4ebe5289611397ddd85c14df8ccd25f814acc4a6b5a975afed68
 
(The unlinked packages above are only available from the Red Hat Network)

Bugs fixed (see bugzilla for more information)

490649 - GFS2: gfs2_grow fails on a full file system
642797 - fsck.gfs2: reports master/root dinodes as unused and fixes the bitmap
656371 - GFS2: gfs2_edit enhancements for RHEL5.7
667769 - fsck.gfs2 stuck in pass1 on i686
679076 - fsck.gfs2: segfault in pass1b
679565 - gfs2_edit savemeta doesn't save all leaf blocks for large dirs
698298 - gfs2_edit savemeta/restoremeta problem with different block size


Keywords

gfs2-utils


These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/