- Issued:
- 2010-03-30
- Updated:
- 2010-03-30
RHBA-2010:0299 - Bug Fix Advisory
Synopsis
lvm2-cluster bug fix and enhancement update
Type/Severity
Bug Fix Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
Updated lvm2-cluster packages that fix several bugs and add enhancements
are now available.
Description
The lvm2-cluster packages contain support for Logical Volume Management
(LVM) in a clustered environment.
This update ensures that the bugs fixed by the lvm2 advisory are also fixed
in a clustered environment.
This update applies the following bug fixes:
- Fixes pvmove abort to be cluster-aware when temporary mirror activation
fails.
- Always query active device by using uuid only in cluster.
- Unlocks shared lock in clvmd if device activation call failed.
- Fixes clvmd to never scan suspended devices.
- Never uses distributed lock for LV in non-clustered VG.
- Fixes clvmd memory leak in lv_info_by_lvid.
- Fixes clvmd segfault when refresh_toolcontext fails.
- Makes clvmd return 0 on success rather than 1.
This update adds the following enhancements:
- Propagates commit and revert metadata notifications to other nodes in
cluster.
- Allows implicit convert to the same cluster lock mode.
- Adds LSB standard headers and functions to clvmd initscript.
Users of lvm2-cluster are advised to upgrade to these updated packages,
which resolve these issues and add these enhancements.
Solution
Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.
This update is available via Red Hat Network. Details on how to use
the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/docs/DOC-11259
Affected Products
- Red Hat Enterprise Linux Resilient Storage for x86_64 5 x86_64
- Red Hat Enterprise Linux Resilient Storage for x86_64 5 ppc
- Red Hat Enterprise Linux Resilient Storage for x86_64 5 ia64
- Red Hat Enterprise Linux Resilient Storage for x86_64 5 i386
- Red Hat Enterprise Linux Resilient Storage (for RHEL Server) from RHUI 5 x86_64
- Red Hat Enterprise Linux Resilient Storage (for RHEL Server) from RHUI 5 i386
Fixes
- BZ - 506986 - clvmd segfaults during pvs option checks
- BZ - 517900 - bypass of exclusive vg/lv lock
- BZ - 528208 - clvmd cmds all report 1 for success instead of 0
- BZ - 538515 - lvm2-cluster does not properly refresh device cache for newly appeared devices
- BZ - 538571 - intermittent mirror creation failures after pvmove operation
- BZ - 539670 - clvmd segfaults when attempting basic operations
- BZ - 543146 - clvmd memory leak when activating clustered volume
- BZ - 547842 - unable to restore log device after successful failure and core conversion
- BZ - 562004 - a mirror fault policy set to remove results in the repair failing on all but one node in cluster
CVEs
(none)
References
(none)
Red Hat Enterprise Linux Resilient Storage for x86_64 5
SRPM | |
---|---|
lvm2-cluster-2.02.56-7.el5.src.rpm | SHA-256: 0680bdbb9dbd17d3f768362b74e4d8f31c44555b76018891b962f4bd7a444a8d |
x86_64 | |
lvm2-cluster-2.02.56-7.el5.x86_64.rpm | SHA-256: 2d4c4a0f119845d7c117997f5c4e4073f4576104300505da9a94c8e1df184a6c |
ppc | |
lvm2-cluster-2.02.56-7.el5.ppc.rpm | SHA-256: 185cbbc11503acdbb4e929947e9d2c4ddaa0142510afd3ca43b4f023e2d67a9a |
ia64 | |
lvm2-cluster-2.02.56-7.el5.ia64.rpm | SHA-256: 4f12d8668f817a30a1f8168349749250a04ad804ecd3358730ce7e7657d149f6 |
i386 | |
lvm2-cluster-2.02.56-7.el5.i386.rpm | SHA-256: dcb632d9b73d0a7a413487084376a1e0eedb09e9082843974896d5ce4fdc143b |
Red Hat Enterprise Linux Resilient Storage (for RHEL Server) from RHUI 5
SRPM | |
---|---|
lvm2-cluster-2.02.56-7.el5.src.rpm | SHA-256: 0680bdbb9dbd17d3f768362b74e4d8f31c44555b76018891b962f4bd7a444a8d |
x86_64 | |
lvm2-cluster-2.02.56-7.el5.x86_64.rpm | SHA-256: 2d4c4a0f119845d7c117997f5c4e4073f4576104300505da9a94c8e1df184a6c |
i386 | |
lvm2-cluster-2.02.56-7.el5.i386.rpm | SHA-256: dcb632d9b73d0a7a413487084376a1e0eedb09e9082843974896d5ce4fdc143b |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.