Synopsis
kmod-kvdo bug fix update
Type/Severity
Bug Fix Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
View affected systems
Topic
Updated kmod-kvdo packages that fix one bug are now available for Red Hat Enterprise Linux 7.
Description
The kmod-kvdo packages provide the kernel module for Virtual Data Optimizer (VDO), which is a block virtualization technology that enables you to create compressed and deduplicated pools of block storage.
This update fixes the following bug:
- Sometimes a Universal Deduplication Service (UDS) index for a Virtual Data Optimizer (VDO) volume falls offline due to a read error on the underlying media. In this case, running the "vdo status" command to check the status of the affected VDO volume previously displayed "Index status: online" even though the index was offlined due to the read error. This update fixes the VDO source code that handles the index status. As a result, the status now correctly reads "Index status: offline" in the described scenario. (BZ#1578421)
Users of kmod-kvdo are advised to upgrade to these updated packages, which fix this bug.
Solution
Before applying this update, make sure all previously released errata relevant to your system have been applied.
For details on how to apply this update, refer to:
https://access.redhat.com/articles/11258
Affected Products
-
Red Hat Enterprise Linux Server 7 x86_64
-
Red Hat Enterprise Linux for x86_64 - Extended Update Support 7.7 x86_64
-
Red Hat Enterprise Linux for x86_64 - Extended Update Support 7.6 x86_64
-
Red Hat Enterprise Linux for x86_64 - Extended Update Support 7.5 x86_64
-
Red Hat Enterprise Linux Server - AUS 7.7 x86_64
-
Red Hat Enterprise Linux Server - AUS 7.6 x86_64
-
Red Hat Enterprise Linux Server - Extended Life Cycle Support 7 x86_64
-
Red Hat Enterprise Linux Workstation 7 x86_64
-
Red Hat Enterprise Linux Desktop 7 x86_64
-
Red Hat Enterprise Linux for Scientific Computing 7 x86_64
-
Red Hat Enterprise Linux Server - TUS 7.7 x86_64
-
Red Hat Enterprise Linux Server - TUS 7.6 x86_64
-
Red Hat Enterprise Linux EUS Compute Node 7.7 x86_64
-
Red Hat Enterprise Linux EUS Compute Node 7.6 x86_64
-
Red Hat Enterprise Linux EUS Compute Node 7.5 x86_64
-
Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 7.7 x86_64
-
Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 7.6 x86_64
Fixes
-
BZ - 1578421
- vdo status command shows index is online after index fails to start [rhel-7.5.z]
Note:
More recent versions of these packages may be available.
Click a package name for more details.
Red Hat Enterprise Linux Server 7
SRPM |
kmod-kvdo-6.1.0.171-17.el7_5.src.rpm
|
SHA-256: ca6d6070f630ae013bd9993a6ad0b36c05e1d4f954fc4b76b354900024fc42d8 |
x86_64 |
kmod-kvdo-6.1.0.171-17.el7_5.x86_64.rpm
|
SHA-256: 8073d5a3f68c8f12fd21f4c16060078fb2f12f449187ebff636c869f69a6ee42 |
kmod-kvdo-debuginfo-6.1.0.171-17.el7_5.x86_64.rpm
|
SHA-256: d7ad20d42a7d5ffb1bcbc8c7a4335ef35a8f49305596ac84c7610aa438ee980a |
Red Hat Enterprise Linux for x86_64 - Extended Update Support 7.7
SRPM |
kmod-kvdo-6.1.0.171-17.el7_5.src.rpm
|
SHA-256: ca6d6070f630ae013bd9993a6ad0b36c05e1d4f954fc4b76b354900024fc42d8 |
x86_64 |
kmod-kvdo-6.1.0.171-17.el7_5.x86_64.rpm
|
SHA-256: 8073d5a3f68c8f12fd21f4c16060078fb2f12f449187ebff636c869f69a6ee42 |
kmod-kvdo-debuginfo-6.1.0.171-17.el7_5.x86_64.rpm
|
SHA-256: d7ad20d42a7d5ffb1bcbc8c7a4335ef35a8f49305596ac84c7610aa438ee980a |
Red Hat Enterprise Linux for x86_64 - Extended Update Support 7.6
SRPM |
kmod-kvdo-6.1.0.171-17.el7_5.src.rpm
|
SHA-256: ca6d6070f630ae013bd9993a6ad0b36c05e1d4f954fc4b76b354900024fc42d8 |
x86_64 |
kmod-kvdo-6.1.0.171-17.el7_5.x86_64.rpm
|
SHA-256: 8073d5a3f68c8f12fd21f4c16060078fb2f12f449187ebff636c869f69a6ee42 |
kmod-kvdo-debuginfo-6.1.0.171-17.el7_5.x86_64.rpm
|
SHA-256: d7ad20d42a7d5ffb1bcbc8c7a4335ef35a8f49305596ac84c7610aa438ee980a |
Red Hat Enterprise Linux for x86_64 - Extended Update Support 7.5
SRPM |
kmod-kvdo-6.1.0.171-17.el7_5.src.rpm
|
SHA-256: ca6d6070f630ae013bd9993a6ad0b36c05e1d4f954fc4b76b354900024fc42d8 |
x86_64 |
kmod-kvdo-6.1.0.171-17.el7_5.x86_64.rpm
|
SHA-256: 8073d5a3f68c8f12fd21f4c16060078fb2f12f449187ebff636c869f69a6ee42 |
kmod-kvdo-debuginfo-6.1.0.171-17.el7_5.x86_64.rpm
|
SHA-256: d7ad20d42a7d5ffb1bcbc8c7a4335ef35a8f49305596ac84c7610aa438ee980a |
Red Hat Enterprise Linux Server - AUS 7.7
SRPM |
kmod-kvdo-6.1.0.171-17.el7_5.src.rpm
|
SHA-256: ca6d6070f630ae013bd9993a6ad0b36c05e1d4f954fc4b76b354900024fc42d8 |
x86_64 |
kmod-kvdo-6.1.0.171-17.el7_5.x86_64.rpm
|
SHA-256: 8073d5a3f68c8f12fd21f4c16060078fb2f12f449187ebff636c869f69a6ee42 |
kmod-kvdo-debuginfo-6.1.0.171-17.el7_5.x86_64.rpm
|
SHA-256: d7ad20d42a7d5ffb1bcbc8c7a4335ef35a8f49305596ac84c7610aa438ee980a |
Red Hat Enterprise Linux Server - AUS 7.6
SRPM |
kmod-kvdo-6.1.0.171-17.el7_5.src.rpm
|
SHA-256: ca6d6070f630ae013bd9993a6ad0b36c05e1d4f954fc4b76b354900024fc42d8 |
x86_64 |
kmod-kvdo-6.1.0.171-17.el7_5.x86_64.rpm
|
SHA-256: 8073d5a3f68c8f12fd21f4c16060078fb2f12f449187ebff636c869f69a6ee42 |
kmod-kvdo-debuginfo-6.1.0.171-17.el7_5.x86_64.rpm
|
SHA-256: d7ad20d42a7d5ffb1bcbc8c7a4335ef35a8f49305596ac84c7610aa438ee980a |
Red Hat Enterprise Linux Server - Extended Life Cycle Support 7
SRPM |
kmod-kvdo-6.1.0.171-17.el7_5.src.rpm
|
SHA-256: ca6d6070f630ae013bd9993a6ad0b36c05e1d4f954fc4b76b354900024fc42d8 |
x86_64 |
kmod-kvdo-6.1.0.171-17.el7_5.x86_64.rpm
|
SHA-256: 8073d5a3f68c8f12fd21f4c16060078fb2f12f449187ebff636c869f69a6ee42 |
kmod-kvdo-debuginfo-6.1.0.171-17.el7_5.x86_64.rpm
|
SHA-256: d7ad20d42a7d5ffb1bcbc8c7a4335ef35a8f49305596ac84c7610aa438ee980a |
Red Hat Enterprise Linux Workstation 7
SRPM |
kmod-kvdo-6.1.0.171-17.el7_5.src.rpm
|
SHA-256: ca6d6070f630ae013bd9993a6ad0b36c05e1d4f954fc4b76b354900024fc42d8 |
x86_64 |
kmod-kvdo-6.1.0.171-17.el7_5.x86_64.rpm
|
SHA-256: 8073d5a3f68c8f12fd21f4c16060078fb2f12f449187ebff636c869f69a6ee42 |
kmod-kvdo-debuginfo-6.1.0.171-17.el7_5.x86_64.rpm
|
SHA-256: d7ad20d42a7d5ffb1bcbc8c7a4335ef35a8f49305596ac84c7610aa438ee980a |
Red Hat Enterprise Linux Desktop 7
SRPM |
kmod-kvdo-6.1.0.171-17.el7_5.src.rpm
|
SHA-256: ca6d6070f630ae013bd9993a6ad0b36c05e1d4f954fc4b76b354900024fc42d8 |
x86_64 |
kmod-kvdo-6.1.0.171-17.el7_5.x86_64.rpm
|
SHA-256: 8073d5a3f68c8f12fd21f4c16060078fb2f12f449187ebff636c869f69a6ee42 |
kmod-kvdo-debuginfo-6.1.0.171-17.el7_5.x86_64.rpm
|
SHA-256: d7ad20d42a7d5ffb1bcbc8c7a4335ef35a8f49305596ac84c7610aa438ee980a |
Red Hat Enterprise Linux for Scientific Computing 7
SRPM |
kmod-kvdo-6.1.0.171-17.el7_5.src.rpm
|
SHA-256: ca6d6070f630ae013bd9993a6ad0b36c05e1d4f954fc4b76b354900024fc42d8 |
x86_64 |
kmod-kvdo-6.1.0.171-17.el7_5.x86_64.rpm
|
SHA-256: 8073d5a3f68c8f12fd21f4c16060078fb2f12f449187ebff636c869f69a6ee42 |
kmod-kvdo-debuginfo-6.1.0.171-17.el7_5.x86_64.rpm
|
SHA-256: d7ad20d42a7d5ffb1bcbc8c7a4335ef35a8f49305596ac84c7610aa438ee980a |
Red Hat Enterprise Linux Server - TUS 7.7
SRPM |
kmod-kvdo-6.1.0.171-17.el7_5.src.rpm
|
SHA-256: ca6d6070f630ae013bd9993a6ad0b36c05e1d4f954fc4b76b354900024fc42d8 |
x86_64 |
kmod-kvdo-6.1.0.171-17.el7_5.x86_64.rpm
|
SHA-256: 8073d5a3f68c8f12fd21f4c16060078fb2f12f449187ebff636c869f69a6ee42 |
kmod-kvdo-debuginfo-6.1.0.171-17.el7_5.x86_64.rpm
|
SHA-256: d7ad20d42a7d5ffb1bcbc8c7a4335ef35a8f49305596ac84c7610aa438ee980a |
Red Hat Enterprise Linux Server - TUS 7.6
SRPM |
kmod-kvdo-6.1.0.171-17.el7_5.src.rpm
|
SHA-256: ca6d6070f630ae013bd9993a6ad0b36c05e1d4f954fc4b76b354900024fc42d8 |
x86_64 |
kmod-kvdo-6.1.0.171-17.el7_5.x86_64.rpm
|
SHA-256: 8073d5a3f68c8f12fd21f4c16060078fb2f12f449187ebff636c869f69a6ee42 |
kmod-kvdo-debuginfo-6.1.0.171-17.el7_5.x86_64.rpm
|
SHA-256: d7ad20d42a7d5ffb1bcbc8c7a4335ef35a8f49305596ac84c7610aa438ee980a |
Red Hat Enterprise Linux EUS Compute Node 7.7
SRPM |
kmod-kvdo-6.1.0.171-17.el7_5.src.rpm
|
SHA-256: ca6d6070f630ae013bd9993a6ad0b36c05e1d4f954fc4b76b354900024fc42d8 |
x86_64 |
kmod-kvdo-6.1.0.171-17.el7_5.x86_64.rpm
|
SHA-256: 8073d5a3f68c8f12fd21f4c16060078fb2f12f449187ebff636c869f69a6ee42 |
kmod-kvdo-debuginfo-6.1.0.171-17.el7_5.x86_64.rpm
|
SHA-256: d7ad20d42a7d5ffb1bcbc8c7a4335ef35a8f49305596ac84c7610aa438ee980a |
Red Hat Enterprise Linux EUS Compute Node 7.6
SRPM |
kmod-kvdo-6.1.0.171-17.el7_5.src.rpm
|
SHA-256: ca6d6070f630ae013bd9993a6ad0b36c05e1d4f954fc4b76b354900024fc42d8 |
x86_64 |
kmod-kvdo-6.1.0.171-17.el7_5.x86_64.rpm
|
SHA-256: 8073d5a3f68c8f12fd21f4c16060078fb2f12f449187ebff636c869f69a6ee42 |
kmod-kvdo-debuginfo-6.1.0.171-17.el7_5.x86_64.rpm
|
SHA-256: d7ad20d42a7d5ffb1bcbc8c7a4335ef35a8f49305596ac84c7610aa438ee980a |
Red Hat Enterprise Linux EUS Compute Node 7.5
SRPM |
kmod-kvdo-6.1.0.171-17.el7_5.src.rpm
|
SHA-256: ca6d6070f630ae013bd9993a6ad0b36c05e1d4f954fc4b76b354900024fc42d8 |
x86_64 |
kmod-kvdo-6.1.0.171-17.el7_5.x86_64.rpm
|
SHA-256: 8073d5a3f68c8f12fd21f4c16060078fb2f12f449187ebff636c869f69a6ee42 |
kmod-kvdo-debuginfo-6.1.0.171-17.el7_5.x86_64.rpm
|
SHA-256: d7ad20d42a7d5ffb1bcbc8c7a4335ef35a8f49305596ac84c7610aa438ee980a |
Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 7.7
SRPM |
kmod-kvdo-6.1.0.171-17.el7_5.src.rpm
|
SHA-256: ca6d6070f630ae013bd9993a6ad0b36c05e1d4f954fc4b76b354900024fc42d8 |
x86_64 |
kmod-kvdo-6.1.0.171-17.el7_5.x86_64.rpm
|
SHA-256: 8073d5a3f68c8f12fd21f4c16060078fb2f12f449187ebff636c869f69a6ee42 |
kmod-kvdo-debuginfo-6.1.0.171-17.el7_5.x86_64.rpm
|
SHA-256: d7ad20d42a7d5ffb1bcbc8c7a4335ef35a8f49305596ac84c7610aa438ee980a |
Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 7.6
SRPM |
kmod-kvdo-6.1.0.171-17.el7_5.src.rpm
|
SHA-256: ca6d6070f630ae013bd9993a6ad0b36c05e1d4f954fc4b76b354900024fc42d8 |
x86_64 |
kmod-kvdo-6.1.0.171-17.el7_5.x86_64.rpm
|
SHA-256: 8073d5a3f68c8f12fd21f4c16060078fb2f12f449187ebff636c869f69a6ee42 |
kmod-kvdo-debuginfo-6.1.0.171-17.el7_5.x86_64.rpm
|
SHA-256: d7ad20d42a7d5ffb1bcbc8c7a4335ef35a8f49305596ac84c7610aa438ee980a |