- Issued:
- 2008-05-21
- Updated:
- 2008-05-21
RHBA-2008:0348 - Bug Fix Advisory
Synopsis
gfs-kmod bug fix update
Type/Severity
Bug Fix Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
Updated gfs-kmod packages which fix several issues are now available.
Description
The gfs-kmod package contains kernel modules that provide the functionality
to mount and use GFS file systems.
These updated packages fixes the following bugs:
- using the lock_nolock protocol would still use locking methods
incorrectly. Locking methods are now disabled when the lock_nolock protocol
is in use.
- permission checks were handled in an incorrect way for SELinux.
Permission checks have been removed from xattr operations and moved to the
Virtual File System(VFS) layer which fixes this issue.
- the locking order in gfs_get_parent() was incorrect. The new modules use
the correct locking order.
- a bug with the locking protocol assertions would present as a file system
continuously being used by one resource, the file system being unavailable,
a 'fatal assertion "<=length"' message or, rarely, file system corruption.
The assertion bug that caused the errors mentioned has been fixed.
- a bug in gfs_quota could cause GFS to hang on large sparse files.
The gfs_quota tool now handles large sparse files more efficiently.
- a soft deadlock and kernel panic was caused by a NULL pointer difference
in gfs_glock_dq. This kernel panic has been fixed and the soft deadlock
should no longer occur.
- gfs_tool now recognizes GFS file systems on the PowerPC architecture.
Users are advised to upgrade to these latest gfs-kmod packages, which are
updated for use with Red Hat Enterprise Linux 5.
Solution
Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.
This update is available via Red Hat Network. Details on how to use
the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/FAQ_58_10188
Affected Products
- Red Hat Enterprise Linux Resilient Storage for x86_64 5 x86_64
- Red Hat Enterprise Linux Resilient Storage for x86_64 5 ppc
- Red Hat Enterprise Linux Resilient Storage for x86_64 5 ia64
- Red Hat Enterprise Linux Resilient Storage for x86_64 5 i386
- Red Hat Enterprise Linux Resilient Storage (for RHEL Server) from RHUI 5 x86_64
- Red Hat Enterprise Linux Resilient Storage (for RHEL Server) from RHUI 5 i386
Fixes
- BZ - 244343 - GFS2 - NFS posix lock issues
- BZ - 323111 - GFS1: security_eo_get() uses permission() when it should use security_inode_getxattr()
- BZ - 400651 - GFS: wrong locking order in gfs_get_parent()
- BZ - 426291 - NULL pointer dereference in gfs_glock_dq during flock tests
- BZ - 430134 - gfs_quota hangs in do_list()
CVEs
(none)
References
(none)
Red Hat Enterprise Linux Resilient Storage for x86_64 5
SRPM | |
---|---|
gfs-kmod-0.1.23-5.el5.src.rpm | SHA-256: 3c944c11714efc786fd298226e4e7a8b17bf10fb15192790c2a14216c0c2e6fa |
x86_64 | |
kmod-gfs-0.1.23-5.el5.x86_64.rpm | SHA-256: b3ac217e45ffd5189b63aa31d2fab02d58707ad7f761b7f4e032183530cf14a0 |
kmod-gfs-xen-0.1.23-5.el5.x86_64.rpm | SHA-256: c6df67b77dd4744758112ada9192c59cc37db151c2779b33153a640c3af8b97d |
ppc | |
kmod-gfs-0.1.23-5.el5.ppc64.rpm | SHA-256: 9a0b9e1f4d061f9cf3ac90eb48cb368ab40225ec7869727c817db14fe0e6e164 |
ia64 | |
kmod-gfs-0.1.23-5.el5.ia64.rpm | SHA-256: 4e53aa22ce4c8fbcb5d515df42a42ff6c5fbb126afa33a492a83ee0023faa7f7 |
kmod-gfs-xen-0.1.23-5.el5.ia64.rpm | SHA-256: 5be9dae9ca88e2cfb4a5f7df0cef884ae20d9e084d8594ed432543051b2535f0 |
i386 | |
kmod-gfs-0.1.23-5.el5.i686.rpm | SHA-256: 267a19c4147165f9041f2b84596b85537bbee81ccef3e67e12b7778e57ff3cf2 |
kmod-gfs-PAE-0.1.23-5.el5.i686.rpm | SHA-256: d38111aed7f206283be6f0fa7d4ca95d9dea34c76e5d5bfe351a405a1b94bd35 |
kmod-gfs-xen-0.1.23-5.el5.i686.rpm | SHA-256: 3d704d3836463b379645a12c52afc9dda58e75bf5cc447823e8f8b8976aa602a |
Red Hat Enterprise Linux Resilient Storage (for RHEL Server) from RHUI 5
SRPM | |
---|---|
gfs-kmod-0.1.23-5.el5.src.rpm | SHA-256: 3c944c11714efc786fd298226e4e7a8b17bf10fb15192790c2a14216c0c2e6fa |
x86_64 | |
kmod-gfs-0.1.23-5.el5.x86_64.rpm | SHA-256: b3ac217e45ffd5189b63aa31d2fab02d58707ad7f761b7f4e032183530cf14a0 |
kmod-gfs-xen-0.1.23-5.el5.x86_64.rpm | SHA-256: c6df67b77dd4744758112ada9192c59cc37db151c2779b33153a640c3af8b97d |
i386 | |
kmod-gfs-0.1.23-5.el5.i686.rpm | SHA-256: 267a19c4147165f9041f2b84596b85537bbee81ccef3e67e12b7778e57ff3cf2 |
kmod-gfs-PAE-0.1.23-5.el5.i686.rpm | SHA-256: d38111aed7f206283be6f0fa7d4ca95d9dea34c76e5d5bfe351a405a1b94bd35 |
kmod-gfs-xen-0.1.23-5.el5.i686.rpm | SHA-256: 3d704d3836463b379645a12c52afc9dda58e75bf5cc447823e8f8b8976aa602a |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.