RHBA-2009:1366: bug-fix and enhancement update
185
This update applies the following bug fixes:
• Fix defect that results in aisexec core dumping under IPC load.
• Fix defect where cpg flow control doesn't work properly.
• Fix defect where, in many cases, certain message types can be ignored in the ckpt or cpg services.
• Fix defect where openais segfaults during addition of node and message sizes greater then the
MTU.
• Fix problem with the way totem queue length is determined, which was resulting in assertions under
certain heavy load conditions.
• Fix rolling upgrade problem where rolling upgrades don't work from 5.2 to 5.3.
• Fix defect where checkpoint reference counts were incorrectly calculated from a departing node in
some conditions.
Users of openais are advised to upgrade to these updated packages, which resolve these issues.
1.160.4. RHBA-2009:1366: bug-fix and enhancement update
Updated openais packages that fix various bugs and add enhancements are now available.
The openais packages provide the core infrastructure used by Red Hat Cluster Suite and GFS.
This update fixes the following bugs:
• The CPG service, which is used throughout the cluster software, sometimes segfaulted under
certain loads. (
BZ#261381
1296
)
• On PowerPC architectures, the IPC system could segfault because of how va_args and unions
operate on these platforms. (
BZ#499767
1297
)
• The totempg subsystem in openais could sometimes throw away a message, which could result in
cluster failure. (
BZ#497419
1298
)
• The IPC system contained a regression with the CPG service, which caused the wrong error code to
be returned when the library user has insufficient permissions. (
BZ#494347
1299
)
• The redundant ring feature cannot be re-enabled after a failure, because of defects in libcfg.
(
BZ#494035
1300
)
• The CPG service failed to synchronize properly with nodeids greater then 0xffffff. This resulted in
CPG not working when automatic node id generation was used. (
BZ#489451
1301
)
• Certain message types were ignored, resulting in improper synchronization. (
BZ#480684
1302
)
• The checkpoint service incorrectly calculated reference counts on checkpoints opened by an exiting
node, resulting in checkpoint leak. (
BZ#490099
1303
)
• Under heavy ipc connection/disconnection in the cpg service, the cpg service would segfault.
(
BZ#497420
1304
).
• The cpg service would segfault when cpg_join and cpg_leave were issued by multiple nodes on the
same cpg group name as a result of race condition. (
BZ#501561
1305
)
Summary of Contents for ENTERPRISE 5.4 RELEASE NOTES
Page 1: ...Red Hat Enterprise Linux 5 4 Technical Notes Every Change to Every Package ...
Page 18: ...xviii ...
Page 306: ...288 ...
Page 464: ...446 ...
Page 466: ...448 ...