Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Security Measurement
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Insights
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Insights
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHEA-2018:2987 - Product Enhancement Advisory
Issued:
2018-10-24
Updated:
2018-10-24

RHEA-2018:2987 - Product Enhancement Advisory

  • Overview
  • Updated Packages

Synopsis

gluster-block, tcmu-runner bug fix and enhancement update

Type/Severity

Product Enhancement Advisory

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

Updated gluster-block and tcmu-runner packages that fix several bugs and adds various enhancements are now available for Red Hat OpenShift Container Storage 3.11.

Description

gluster-block is a distributed management framework for block devices, provided as a command line utility. It aims to make Gluster-backed block storage creation and maintenance as simple as possible. gluster-block can provision block devices and export them as iSCSI LUNs across multiple nodes, and uses iSCSI protocol for data transfer as SCSI block/commands.

The tcmu-runner packages provide a service that handles the complexity of the LIO kernel target's userspace passthrough interface (TCMU). It presents a C plugin API for extension modules that handle SCSI requests in ways not possible or suitable to be handled by LIO's in-kernel backstores.

Block storage allows the creation of high-performance individual storage units. Unlike the traditional file storage capability that glusterfs supports, each storage volume/block device can be treated as an independent disk drive, so that each storage volume/block device can support an individual file system.

The advisory adds the following enhancements:

  • The CLI audit logs have been added to capture every CLI command and its response. This makes logs more detailed and easier to understand the gluster-block CLI operations history, which will improve debugability. (BZ#1575908)
  • Updates to the tcmu-runner configuration file are now applied automatically, removing the need to restart the tcmu-runner daemon when any configuration changes are made. (BZ#1561323)
  • Updates to the gluster-block configuration file are now applied automatically, removing the need to restart the gluster-blockd daemon when any configuration changes are made. (BZ#1589666)

This advisory also fixes the following bugs:

  • Previously, using gluster-block on a non-recommended kernel version, resulted in a dependent user space processes entering an uninterruptible sleep state. With this update, gluster-block now checks for minimum kernel version. If the minimum recommendation is not met, then gluster-block service refuses to start. As a result, we achieve stabilized gluster-block user experience. (BZ#1594331)
  • Gluster-block operations (create/delete/modify) or gluster-block-target service restart, performed when tcmu-runner is in an offline state, can trigger netlink hung issue, with targetcli process entering uninterruptible sleep (D state) state forever. To recover from this state, restart the tcmu-runner daemon. (BZ#1476730)
  • Block volumes created on CNS v3.9 or below used default Asymmetric Logical Unit Access (alua) group setting at target side configuration. These are meant to be used with 'prio const' at the initiator side multipath.conf. After upgrading OCS to 3.10 or above, the new recommendation at multipath is 'prio alua'. Old block volume having target side alua group set to default are not compatible with newly recommended multipath.conf. Hence, to maintain compatibility of old block volumes with the new multipath.conf recommendation, the default alua group must be changed to glfs alua group. With this update, the block volume target configuration is generated automatically as part of the upgrade to fix the compatibility issue. Hence, the compatibility of old block volume with the new multipath.conf recommendation is maintained. (BZ#1638988)

Users of gluster-block and tcmu-runner are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.

Solution

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

For details on how to apply this update, refer to:

https://access.redhat.com/articles/11258

Affected Products

  • Red Hat Gluster Storage Server for On-premise 3 for RHEL 7 x86_64

Fixes

  • BZ - 1476730 - [Tracker-RHEL-BZ#1608677] tcmu-runner: allow reset netlink support
  • BZ - 1561323 - [RFE] tcmu-runner: introduce the dynamic reloading config feature support
  • BZ - 1575908 - [RFE] AuditLog Feature
  • BZ - 1589666 - [RFE] gluster-block: logging add config dynamic reloading support
  • BZ - 1594331 - gluster-block: defend on minimum kernel version recommendation at runtime
  • BZ - 1595624 - Help/Man page update needed in 'gluster-block create'
  • BZ - 1638002 - genconfig: update old block volumes alua groups from default_tg_pt_gp to glfs_tg_pt_gp
  • BZ - 1638352 - Multipath devices not cleaned up and call traces observed on node reboot(initiator and target on same OCP node)
  • BZ - 1638988 - embed/automate upgrade time genconfig steps within gluster-block

CVEs

(none)

References

(none)

Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Gluster Storage Server for On-premise 3 for RHEL 7

SRPM
gluster-block-0.2.1-28.el7rhgs.src.rpm SHA-256: f75df09cadcc85a08a5853eb6643c90660fcfb9c117f805cd5e2e381264a8732
tcmu-runner-1.2.0-26.el7rhgs.src.rpm SHA-256: 59e5ae35e57a8d5dae789bba1997ad8ee45115bc65d18482eb23300c705b2be2
x86_64
gluster-block-0.2.1-28.el7rhgs.x86_64.rpm SHA-256: 695dba9e7e1f6bc6c3fee5ece5f135d043e896d2c265e881ae086702d43ddf21
gluster-block-debuginfo-0.2.1-28.el7rhgs.x86_64.rpm SHA-256: e241b85a173d7596384f64de899d4d48e56eb2fdd8d552f354d287927224e5da
libtcmu-1.2.0-26.el7rhgs.x86_64.rpm SHA-256: 3c4c66ad49b2a39f854b01ceadfc0dd401f2bad0692592d786e2d9f03eef1da3
libtcmu-devel-1.2.0-26.el7rhgs.x86_64.rpm SHA-256: 1138a44b3d1b3c185922faedb7abdae59245cd37add1d008a2d36f3eb33b30d5
tcmu-runner-1.2.0-26.el7rhgs.x86_64.rpm SHA-256: 6b13b1f20eab7af9f4ded92dba2f3b6f1270e909d1eb23c34cf2abf9f695e8a9
tcmu-runner-debuginfo-1.2.0-26.el7rhgs.x86_64.rpm SHA-256: 6cab2278a5dffd69a79d29e00f156e2ab45deeba614975ec35e3a4b058130908

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat LinkedIn YouTube Facebook X, formerly Twitter

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2025 Red Hat

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility