An updated nfstest package that fixes one bug is now available for Red HatEnterprise Linux 7.

The nfstest package contains the NFS Testing Tool for testing the NFS client orthe NFS server. Most of the functionality is focused on testing the NFS client.This update fixes the following bug:* Due to a configuration error, the “nfstest_dio” tool failed to capture allpackets in vectored I/O tests, and some test cases failed. A patch has beenprovided to fix this bug, and all test cases now pass when using “nfstest_dio”.(BZ#1059490) Users of nfstest are advised to upgrade to this updated package, which fixesthis bug.
Before applying this update, make sure all previously released erratarelevant to your system have been applied.For details on how to apply this update, refer to:https://access.redhat.com/articles/11258Red Hat Enterprise Linux Server (v. 7)

SRPMS:
nfstest-1.0.8-0.0.el7.src.rpm
    MD5: e610c251fb8a7049894a2c1da3dc7289SHA-256: 8ae13e5fd602773fe2967a336cee152b3421b9ad39e7270e3fc7a2b55c6e2c63
 
PPC:
nfstest-1.0.8-0.0.el7.noarch.rpm
    MD5: 2269565ea084df7d45512c4daf1add7cSHA-256: 77003e05871dd179e5ca6d743537460e0f3a59c3d217e131de0c488f2633d4d4
 
s390x:
nfstest-1.0.8-0.0.el7.noarch.rpm
    MD5: 2269565ea084df7d45512c4daf1add7cSHA-256: 77003e05871dd179e5ca6d743537460e0f3a59c3d217e131de0c488f2633d4d4
 
x86_64:
nfstest-1.0.8-0.0.el7.noarch.rpm
    MD5: 2269565ea084df7d45512c4daf1add7cSHA-256: 77003e05871dd179e5ca6d743537460e0f3a59c3d217e131de0c488f2633d4d4
 
Red Hat Enterprise Linux Workstation (v. 7)

SRPMS:
nfstest-1.0.8-0.0.el7.src.rpm
    MD5: e610c251fb8a7049894a2c1da3dc7289SHA-256: 8ae13e5fd602773fe2967a336cee152b3421b9ad39e7270e3fc7a2b55c6e2c63
 
x86_64:
nfstest-1.0.8-0.0.el7.noarch.rpm
    MD5: 2269565ea084df7d45512c4daf1add7cSHA-256: 77003e05871dd179e5ca6d743537460e0f3a59c3d217e131de0c488f2633d4d4
 
(The unlinked packages above are only available from the Red Hat Network)
1059490 – nfstest_dio fails to capture all packets in vectored_io tests

These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from:

Leave a Reply