- Issued:
- 2018-01-11
- Updated:
- 2018-01-11
RHBA-2018:0083 - Bug Fix Advisory
Synopsis
glusterfs bug fix update
Type/Severity
Bug Fix Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
Updated glusterfs packages that fix several bugs are now available for Red Hat Gluster Storage 3.3 Update 1 on Red Hat Enterprise Linux 7.
Description
Red Hat Gluster Storage is a software only scale-out storage solution that
provides flexible and affordable unstructured data storage. It unifies data
storage and infrastructure, increases performance, and improves
availability and manageability to meet enterprise-level storage challenges.
This advisory addresses critical bugs related to memory leaks and fixes
the following bugs:
- Executing gluster volume set operations on volumes from gluster CLI
caused a significant memory leak in glusterd process. The memory leak
issues have been fixed in this release. (BZ#1526363)
- Previously, while executing a series of gluster commands like volume
create/start/stop/delete, glusterd process' memory footprint increased.
In a scalable environment where multiple volumes are created, deleted,
and recreated led to high glusterd memory consumption. With this update,
the identified memory leaks in glusterd are fixed. (BZ#1526365, BZ#1526374)
- Executing multiple volume commands concurrently on the same volume,
from different peers of the trusted storage pool, results in one of
the glusterd processes from the same pool moving to the locked state.
Any volume management operations performed on the same volume fail until
the glusterd service is restarted on the node where glusterd is in
transaction locked state. This release introduces a default transaction
lock timeout of 3 minutes. Any glusterd process reaching the locked state
will remain there for 3 minutes. Any transactions made now execute
successfully after this timeout period. (BZ#1526372)
- The portmap entry allocation that glusterd maintains for each of its
brick is cleaned up on a graceful shutdown of the respective brick
processes. When a brick process was killed through SIGKILL signal or
crashed, glusterd did not clean up the respective portmap entry allocation
which could result in two portmap allocations for the same brick when the
brick process was restarted. glusterd reports with a stale port to the
client, resulting failure in connection. With this fix, the stale port
entry is removed even for a brick crash or SIGKILL event of a brick
process. The client now successfully connects to the brick after the brick
is restarted. (BZ#1526371)
- When processes that use a large number of POSIX locks, like Samba,
were used in combination with the gluster clear-locks command, a memory
leak created high memory consumption on brick processes. This sometimes
triggered OOM killer on brick processes. The lock translator has been
updated to correct this issue and fix the memory leak. (BZ#1526377)
Users of glusterfs are advised to upgrade to these updated packages, which fix these bugs.
Solution
Before applying this update, make sure all previously released errata
relevant to your system have been applied.
For details on how to apply this update, refer to:
Affected Products
- Red Hat Enterprise Linux Server 7 x86_64
- Red Hat Virtualization 4 for RHEL 7 x86_64
- Red Hat Gluster Storage Server for On-premise 3 for RHEL 7 x86_64
Fixes
- BZ - 1526363 - [RHEL 7] high memory usage by glusterd on executing gluster volume set operations
- BZ - 1526368 - Brick Multiplexing: stale brick processes getting created and volume status shows brick as down(pkill glusterfsd glusterfs ,glusterd restart)
- BZ - 1526371 - clean up port map on brick disconnect
- BZ - 1526372 - Unable to acquire lock for gluster volume leading to 'another transaction in progress' error
- BZ - 1526373 - Brick Multiplexing: Gluster volume start force complains with command "Error : Request timed out" when there are multiple volumes
- BZ - 1527147 - [GSS] [Regression] glusterfs threads consuming swap space until it runs out
- BZ - 1527772 - remove ExclusiveArch directive from SPEC file
- BZ - 1530217 - Brick multiplexing: glustershd fails to start on a volume force start after a brick is down
- BZ - 1530320 - Brick Multiplexing: brick still down in heal info context(glfs) even though brick is online
CVEs
(none)
References
(none)
Red Hat Enterprise Linux Server 7
SRPM | |
---|---|
glusterfs-3.8.4-54.el7.src.rpm | SHA-256: 6f9f468a6a62bf2cc861bc639aa69c5281661e2d8e13417e1a85c4e8adab4d82 |
x86_64 | |
glusterfs-3.8.4-54.el7.x86_64.rpm | SHA-256: 6ebcd51f44552ae1c1af813099ea64111bf5bbb7a7725e65239ac44a4ed93573 |
glusterfs-api-3.8.4-54.el7.x86_64.rpm | SHA-256: a9a9d384057d36a68300a429d5e5d48d05a08560de2fbcf5b3cd56dffa83b48b |
glusterfs-api-devel-3.8.4-54.el7.x86_64.rpm | SHA-256: 386787011723c550bae583bf298adb5219cea5386c43d853fe3ec2d9f312ba65 |
glusterfs-cli-3.8.4-54.el7.x86_64.rpm | SHA-256: bff5282c11275d4336e087c21ac331b35d7011a7bf5774a234302321216166e3 |
glusterfs-client-xlators-3.8.4-54.el7.x86_64.rpm | SHA-256: 45bb39d1b34e1e30cb9f3077f25a840a57597b1f5103051095703a26476b5705 |
glusterfs-debuginfo-3.8.4-54.el7.x86_64.rpm | SHA-256: 487399c8b99df24dadedc5ac61dafdb61755acd91e7ffdeadd7c4b79fbbde141 |
glusterfs-devel-3.8.4-54.el7.x86_64.rpm | SHA-256: 7c21fb03a85f0cf67118880ccd7cb1e99e4a24b1d12414103840f56b0b7c3bab |
glusterfs-fuse-3.8.4-54.el7.x86_64.rpm | SHA-256: de4bd178050dbdfd752ad0aea253ba27a7430fc1ba66f8551ebce63033dda9e9 |
glusterfs-libs-3.8.4-54.el7.x86_64.rpm | SHA-256: 7b94b7f12791a748069be76e4922393d161cafd3c1c1957de900cfccfd8eb1db |
glusterfs-rdma-3.8.4-54.el7.x86_64.rpm | SHA-256: bd1ecb45770be6013e3b22c5fda7c80d48af88ca2e4a62d9847afeda9ba1dda8 |
python-gluster-3.8.4-54.el7.noarch.rpm | SHA-256: 8545e9e324a4130b70238d9f324aa36346b5985811f6812b43b600285b24eb53 |
Red Hat Virtualization 4 for RHEL 7
SRPM | |
---|---|
glusterfs-3.8.4-54.el7.src.rpm | SHA-256: 6f9f468a6a62bf2cc861bc639aa69c5281661e2d8e13417e1a85c4e8adab4d82 |
x86_64 | |
glusterfs-3.8.4-54.el7.x86_64.rpm | SHA-256: 6ebcd51f44552ae1c1af813099ea64111bf5bbb7a7725e65239ac44a4ed93573 |
glusterfs-api-3.8.4-54.el7.x86_64.rpm | SHA-256: a9a9d384057d36a68300a429d5e5d48d05a08560de2fbcf5b3cd56dffa83b48b |
glusterfs-api-devel-3.8.4-54.el7.x86_64.rpm | SHA-256: 386787011723c550bae583bf298adb5219cea5386c43d853fe3ec2d9f312ba65 |
glusterfs-cli-3.8.4-54.el7.x86_64.rpm | SHA-256: bff5282c11275d4336e087c21ac331b35d7011a7bf5774a234302321216166e3 |
glusterfs-client-xlators-3.8.4-54.el7.x86_64.rpm | SHA-256: 45bb39d1b34e1e30cb9f3077f25a840a57597b1f5103051095703a26476b5705 |
glusterfs-debuginfo-3.8.4-54.el7.x86_64.rpm | SHA-256: 487399c8b99df24dadedc5ac61dafdb61755acd91e7ffdeadd7c4b79fbbde141 |
glusterfs-devel-3.8.4-54.el7.x86_64.rpm | SHA-256: 7c21fb03a85f0cf67118880ccd7cb1e99e4a24b1d12414103840f56b0b7c3bab |
glusterfs-fuse-3.8.4-54.el7.x86_64.rpm | SHA-256: de4bd178050dbdfd752ad0aea253ba27a7430fc1ba66f8551ebce63033dda9e9 |
glusterfs-libs-3.8.4-54.el7.x86_64.rpm | SHA-256: 7b94b7f12791a748069be76e4922393d161cafd3c1c1957de900cfccfd8eb1db |
glusterfs-rdma-3.8.4-54.el7.x86_64.rpm | SHA-256: bd1ecb45770be6013e3b22c5fda7c80d48af88ca2e4a62d9847afeda9ba1dda8 |
python-gluster-3.8.4-54.el7.noarch.rpm | SHA-256: 8545e9e324a4130b70238d9f324aa36346b5985811f6812b43b600285b24eb53 |
Red Hat Gluster Storage Server for On-premise 3 for RHEL 7
SRPM | |
---|---|
glusterfs-3.8.4-54.el7rhgs.src.rpm | SHA-256: a7e1e508014c41bc7c475c7106ae65c22a189b2ae86fc3362ce19d735ac929eb |
x86_64 | |
glusterfs-3.8.4-54.el7rhgs.x86_64.rpm | SHA-256: bea4bb2c1a4cd2b6083891bf153a8a3588e1be035f169dbc4f234c9a2fb75c00 |
glusterfs-api-3.8.4-54.el7rhgs.x86_64.rpm | SHA-256: 4940eb2582008afb26750e05f7623bf5b128cf759cdcec35ee7d4f66f2ecd5f4 |
glusterfs-api-devel-3.8.4-54.el7rhgs.x86_64.rpm | SHA-256: 99f506fd73ebcc46c0121101aa28a6a9a4d2bfa4a02c6db54785203e8b3838ba |
glusterfs-cli-3.8.4-54.el7rhgs.x86_64.rpm | SHA-256: 355bb45f8f7bc3f5fa06303cd520693e90c16c30e43d7f7ac4ce95a6da3405c7 |
glusterfs-client-xlators-3.8.4-54.el7rhgs.x86_64.rpm | SHA-256: 9765a96aa0aecee10c48e07dc3c24728d69aca503cb9aac159ce59bf2fd2ca07 |
glusterfs-debuginfo-3.8.4-54.el7rhgs.x86_64.rpm | SHA-256: a919cf4487ce093578e8c499a401b75596823909cfa040c76bb391a59ef5e012 |
glusterfs-devel-3.8.4-54.el7rhgs.x86_64.rpm | SHA-256: 4858992ae1e983a6c043f4268516c50674fc20806d06caada1569c1348f4bd36 |
glusterfs-events-3.8.4-54.el7rhgs.x86_64.rpm | SHA-256: 10886e82007098df5ac220619bd316ea97dd71d49c664a844993389ba49f4453 |
glusterfs-fuse-3.8.4-54.el7rhgs.x86_64.rpm | SHA-256: 35b822dda28b01e7291546c7a4a67920a2ef9fe65f1ac0ea97aa6ff4ba3c22c2 |
glusterfs-ganesha-3.8.4-54.el7rhgs.x86_64.rpm | SHA-256: c33869ba2740cd055ce259b19d2a00937ba8a7bb0507daebf5b4338c83a8404d |
glusterfs-geo-replication-3.8.4-54.el7rhgs.x86_64.rpm | SHA-256: 7d875c2be43d5ec1382736ae98b6b2addd9758204e98b73d35d68f4e9612fbf9 |
glusterfs-libs-3.8.4-54.el7rhgs.x86_64.rpm | SHA-256: b5491740da9161a8790faaae88d5d55590ef37272acc0ce219122de11579de64 |
glusterfs-rdma-3.8.4-54.el7rhgs.x86_64.rpm | SHA-256: d7c535185d8547700989b5d538a6cfb2ce95e8f89a8e52eb247766a2b185be18 |
glusterfs-resource-agents-3.8.4-54.el7rhgs.noarch.rpm | SHA-256: a7ce8edcfd3a79e215ce00657244c02ad1bf56dad249c092900445314f00c1ec |
glusterfs-server-3.8.4-54.el7rhgs.x86_64.rpm | SHA-256: f1e58ffab1f931ad575e0a00fbcf73561392a0f24ac661b22136c82f96bd3e60 |
python-gluster-3.8.4-54.el7rhgs.noarch.rpm | SHA-256: 42f2b38a317752d824e8258bda78c78b873ade53620c9a7952ad562ca60b6ff8 |
Red Hat Virtualization Host 4 for RHEL 7
SRPM | |
---|---|
x86_64 | |
glusterfs-debuginfo-3.8.4-54.el7.x86_64.rpm | SHA-256: 487399c8b99df24dadedc5ac61dafdb61755acd91e7ffdeadd7c4b79fbbde141 |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.