Skip to navigation

Enhancement Advisory New mount package allows mount-by-label for OCFS filesystems.

Advisory: RHEA-2002:231-09
Type: Product Enhancement Advisory
Severity: N/A
Issued on: 2004-01-20
Last updated on: 2004-01-20
Affected Products: Red Hat Enterprise Linux AS (v. 2.1)
Red Hat Enterprise Linux ES (v. 2.1)
Red Hat Enterprise Linux WS (v. 2.1)
Red Hat Linux Advanced Workstation 2.1 for the Itanium Processor

Details

An updated mount package is available for Red Hat Enterprise Linux Advanced
Server 2.1 which allows Oracle Clustered Filesystem (OCFS) partitions to be
mounted by referring to their volume label.

[Updated 06 Feb 2003]
Added fixed packages for Red Hat Enterprise Linux Advanced Workstation 2.1

[Updated 13 Aug 2003]
Added losetup packages that were accidentally left out of this erratum.

This updated mount package includes an enhancement to the mount command
which allows Oracle Clustered Filesystem (OCFS) partitions to be mounted
using their label name rather than by referring to the specific device
name. This can be useful when the device name changes due to disk
reordering, removal, or addition. No other new functionality is introduced.

If you do not use OCFS partitions, you may safely disregard this errata.


Solution

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

This update is available via Red Hat Network. To use Red Hat Network,
launch the Red Hat Update Agent with the following command:

up2date

This will start an interactive process that will result in the appropriate
RPMs being upgraded on your system.

Updated packages

Red Hat Enterprise Linux AS (v. 2.1)

SRPMS:
mount-2.11g-6.src.rpm
File outdated by:  RHSA-2005:782
    MD5: b86578cb24463be23e6fdbc6d4ccd283
mount-2.11g-6.src.rpm
File outdated by:  RHSA-2005:782
    MD5: b86578cb24463be23e6fdbc6d4ccd283
 
IA-32:
losetup-2.11g-6.i386.rpm
File outdated by:  RHSA-2005:782
    MD5: 81786e5660061866ae05fe0ea68c4b22
mount-2.11g-6.i386.rpm
File outdated by:  RHSA-2005:782
    MD5: f179fc79734d8eccb101e9ff7260e013
 
IA-64:
losetup-2.11g-6.ia64.rpm
File outdated by:  RHSA-2005:782
    MD5: 5c15a9a51259d8178fe2089f2339e1c0
mount-2.11g-6.ia64.rpm
File outdated by:  RHSA-2005:782
    MD5: cb201917986d1619e1798ffce94fd862
 
Red Hat Enterprise Linux ES (v. 2.1)

SRPMS:
mount-2.11g-6.src.rpm
File outdated by:  RHSA-2005:782
    MD5: b86578cb24463be23e6fdbc6d4ccd283
mount-2.11g-6.src.rpm
File outdated by:  RHSA-2005:782
    MD5: b86578cb24463be23e6fdbc6d4ccd283
 
IA-32:
losetup-2.11g-6.i386.rpm
File outdated by:  RHSA-2005:782
    MD5: 81786e5660061866ae05fe0ea68c4b22
mount-2.11g-6.i386.rpm
File outdated by:  RHSA-2005:782
    MD5: f179fc79734d8eccb101e9ff7260e013
 
Red Hat Enterprise Linux WS (v. 2.1)

SRPMS:
mount-2.11g-6.src.rpm
File outdated by:  RHSA-2005:782
    MD5: b86578cb24463be23e6fdbc6d4ccd283
mount-2.11g-6.src.rpm
File outdated by:  RHSA-2005:782
    MD5: b86578cb24463be23e6fdbc6d4ccd283
 
IA-32:
losetup-2.11g-6.i386.rpm
File outdated by:  RHSA-2005:782
    MD5: 81786e5660061866ae05fe0ea68c4b22
mount-2.11g-6.i386.rpm
File outdated by:  RHSA-2005:782
    MD5: f179fc79734d8eccb101e9ff7260e013
 
Red Hat Linux Advanced Workstation 2.1 for the Itanium Processor

SRPMS:
mount-2.11g-6.src.rpm
File outdated by:  RHSA-2005:782
    MD5: b86578cb24463be23e6fdbc6d4ccd283
mount-2.11g-6.src.rpm
File outdated by:  RHSA-2005:782
    MD5: b86578cb24463be23e6fdbc6d4ccd283
 
IA-64:
losetup-2.11g-6.ia64.rpm
File outdated by:  RHSA-2005:782
    MD5: 5c15a9a51259d8178fe2089f2339e1c0
mount-2.11g-6.ia64.rpm
File outdated by:  RHSA-2005:782
    MD5: cb201917986d1619e1798ffce94fd862
 

Bugs fixed (see bugzilla for more information)

72069 - Add patch to allow to do mount by label name for OCFS(clusterfilesystem) partitions


Keywords

label, mount, OCFS


These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/