Bugzilla (bugzilla.redhat.com) will be under maintenance for infrastructure upgrades and will not be available on July 31st between 12:30 AM - 05:30 AM UTC. We appreciate your understanding and patience. You can follow status.redhat.com for details.
Bug 589510 - [RFE] GFS2: Add method to discover whether the lock dropping interface has been used
Summary: [RFE] GFS2: Add method to discover whether the lock dropping interface has be...
Alias: None
Product: Red Hat Enterprise Linux 6
Classification: Red Hat
Component: kernel
Version: 6.0
Hardware: All
OS: Linux
Target Milestone: beta
: ---
Assignee: Steve Whitehouse
QA Contact: Cluster QE
Depends On: 577900
Blocks: 534147
TreeView+ depends on / blocked
Reported: 2010-05-06 10:46 UTC by Steve Whitehouse
Modified: 2016-04-26 13:33 UTC (History)
12 users (show)

Fixed In Version:
Doc Type: Enhancement
Doc Text:
Clone Of: 577900
Last Closed: 2010-11-11 16:18:40 UTC
Target Upstream Version:

Attachments (Terms of Use)
RHEL6 version of the patch (1.54 KB, patch)
2010-05-14 13:59 UTC, Steve Whitehouse
no flags Details | Diff

Description Steve Whitehouse 2010-05-06 10:46:49 UTC
+++ This bug was initially created as a clone of Bug #577900 +++

Description of problem:

Since the lock dropping interface via /sysfs is dangerous in the sense that it can result in file system corruption if misused, we need to add some way to tell if someone has used this particular interface.

--- Additional comment from swhiteho@redhat.com on 2010-04-30 10:43:38 EDT ---

We could do this with an sb flag. Then the info could appear both in /proc/mounts and also as a (one time) log message. That should make it easy to spot.

At the same time we'll add a log message to let people know when barriers have been turned off automatically as well.

--- Additional comment from swhiteho@redhat.com on 2010-04-30 11:09:02 EDT ---

Created an attachment (id=410510)
Proposed patch

--- Additional comment from swhiteho@redhat.com on 2010-05-06 06:20:25 EDT ---

Posted to cluster-devel.

Comment 1 Steve Whitehouse 2010-05-06 10:47:32 UTC
Cloned for RHEL6.

Comment 2 RHEL Program Management 2010-05-06 10:51:06 UTC
This feature request did not get resolved in time for Feature Freeze
for the current Red Hat Enterprise Linux release and has now been
denied. You may re-open your request by requesting your support
representative to propose it for the next release.

Comment 4 Steve Whitehouse 2010-05-14 13:59:45 UTC
Created attachment 414058 [details]
RHEL6 version of the patch

Comment 5 Aristeu Rozanski 2010-05-28 20:37:39 UTC
Patch(es) available on kernel-2.6.32-31.el6

Comment 8 Nate Straz 2010-10-07 14:03:05 UTC
[root@buzz-02 buzzez:buzzez0]# echo "5:42379 EX" > /sys/fs/gfs2/buzzez\:buzzez0/demote_rq

GFS2: fsid=buzzez:buzzez0.1: demote interface used

[root@buzz-02 buzzez:buzzez0]# grep buzzez /proc/mounts
/dev/dm-3 /mnt/buzzez0 gfs2 rw,seclabel,relatime,hostdata=jid=1,demote_interface_used 0 0

Comment 9 releng-rhel@redhat.com 2010-11-11 16:18:40 UTC
Red Hat Enterprise Linux 6.0 is now available and should resolve
the problem described in this bug report. This report is therefore being closed
with a resolution of CURRENTRELEASE. You may reopen this bug report if the
solution does not work for you.

Note You need to log in before you can comment on or make changes to this bug.