Recommended update for drbd, drbd-utils

This update for drbd and drbd-utils provides the following fixes:

Changes in drbd-utils:

- Make sure the full bitmap gets properly propagated in drbdmeta. Also make sure the ID
is kept when downgrading from v9 to v8. (bsc#1037109)
- Support passing "--force" to drbdadm dump-md. (bsc#1077176)
- Fix a possible kernel trace while starting the initial syncing of a stacked drbd.
(bsc#1058770)
- Backport some fixes of peer_device objects.
- Do not hardcode loglevel local5 and make it possible to change that using --logfacility.
(bsc#1064402)
- Update documentation and examples regarding fencing: it is now moved from the disk to
the net section. (bsc#1061145)
- Skip running drbdadm sh-b-pri in drbd9. (bsc#1061147)
- The included kernel modules in the KMP packages were rebuilt using "retpoline" support to
mitigate Spectre v2 (bsc#1068032 CVE-2017-5715)

Changes in drbd:

- Make sure the full bitmap gets properly propagated in drbdmeta. (bsc#1037109)

This update was imported from the SUSE:SLE-12-SP3:Update update project.

Fixed bugs
bnc#1037109
drbdmeta does not propagate full bitmap if node-id is non-zero
bnc#1058770
kernel trace while trying to configure stacked drbd
bnc#1061145
documentation and config template concerning fencing from drbd-utils doesn't match code
bnc#1061147
/lib/drbd/drbd start from drbd-utils-9 shows error Unknown command 'sh-b-pri'
bnc#1064402
L3-Question: drbd-utils: loglevel local5 hardcoded
bnc#1077176
Regression : drbdadm --dump-md does not pass on --force argument in 8.9.8
bnc#1068032
VUL-0: speculative side channel attacks on various CPU platforms aka "SpectreAttack" and "MeltdownAttack"
Selected Binaries
openSUSE Build Service is sponsored by