- Issued:
- 2018-10-30
- Updated:
- 2018-10-30
RHBA-2018:3094 - Bug Fix Advisory
Synopsis
vdo bug fix and enhancement update
Type/Severity
Bug Fix Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
An update for vdo is now available for Red Hat Enterprise Linux 7.
Description
The vdo packages provide Virtual Data Optimizer (VDO), which is a block virtualization technology that enables you to create compressed and deduplicated pools of block storage.
For detailed information on changes in this release, see the Red Hat Enterprise Linux 7.6 Release Notes linked from the References section.
Users of vdo are advised to upgrade to these updated packages.
Affected Products
- Red Hat Enterprise Linux Server 7 x86_64
- Red Hat Enterprise Linux Server - Extended Life Cycle Support 7 x86_64
- Red Hat Enterprise Linux Workstation 7 x86_64
- Red Hat Enterprise Linux Desktop 7 x86_64
- Red Hat Enterprise Linux for Scientific Computing 7 x86_64
Fixes
- BZ - 1511106 - RFE: provide a reason why vdo can't be removed
- BZ - 1511127 - scary messages when creating multiple vdo devices
- BZ - 1519307 - [RFE] Issue a warning when user is nearing physical capacity of VDO
- BZ - 1520988 - [RFE] VDO Should Log Volume's Operating Mode When Started
- BZ - 1531111 - vdo package install should use systemd macros
- BZ - 1533950 - RFE: add version file to /sys/kvdo to track currently loaded kmod-kvdo version
- BZ - 1536533 - VDO Ansible module does not return "changed" status after having disabling or enabling dedupe or compression.
- BZ - 1540619 - VDO should use a persistent name for backing device
- BZ - 1540722 - VDO statistics do not account for concurrent dedupe
- BZ - 1541170 - VDO Ansible module does not change block map cache size for existing volume
- BZ - 1542700 - vdo man page inconsistency
- BZ - 1543921 - vdo start --forceRebuild gives wrong error
- BZ - 1543954 - RFE: Give retcode based on error
- BZ - 1547786 - vdo man page has wrong numbers for vdoHashZoneThreads
- BZ - 1552146 - vdo fails to compute default value with non en_US locales
- BZ - 1557464 - vdo creation device check incomplete
- BZ - 1559692 - Hang or NULL pointer dereference if reading sysfs during VDO start/stop.
- BZ - 1562228 - VDO statistics code path sleeps while holding a spin lock
- BZ - 1564181 - vdo create --vdoSlabSize allows 0
- BZ - 1565311 - vdo status command shows index is online after index fails to start
- BZ - 1568129 - vdo has a prepare_ioctl function that does nothing
- BZ - 1570156 - Creating a VDO volume with --sparseIndex enabled results in an index on-disk size matching that of a dense index
- BZ - 1571292 - VDO misuses GFP flags to __vmalloc
- BZ - 1572640 - vdo create --force overwrites existing vdo using same device
- BZ - 1576539 - Growing physical size should not suspend vdo device when the size is equal
- BZ - 1579492 - Race condition leads to report that index in memory is corrupt
- BZ - 1582647 - VDO volume is unable to growPhysical after device resize performed in previous boot
- BZ - 1588043 - vdo was built without %dist rpm tag.
- BZ - 1589249 - VDO can go read-only, lose sparsely-written data when parts are discarded.
- BZ - 1593444 - Current merge function causes issues when stacked on top of RAID50
- BZ - 1595129 - Provide better information when vdo cannot be started because of superblock (Unknown error 2081 and 2066)
- BZ - 1595923 - Unsafe permission of allocations around resizes.
- BZ - 1597886 - vdo growPhysical command on non-expanded device no longer prints message regarding lack of additional space
- BZ - 1597890 - vdo growPhysical of a volume resized offline reports new physical block count as old physical block count
- BZ - 1599867 - Misleading "Error reading page" messages during an index rebuild
- BZ - 1602151 - General Protection Fault unlocking UDS callback mutex
- BZ - 1604060 - Introducing new parameters to the vdo config file breaks compatability with RHEL7.5
- BZ - 1608070 - NULL pointer dereference while deleting VDO volumes that had been used for stacked raid testing
- BZ - 1609358 - Remove the word Nagios from monitoring scripts in favor of something more generic
- BZ - 1619366 - vdo: ERROR - Bad configuration file: 'int' object has no attribute '__getitem__'
- BZ - 1628318 - Possible infinite hang during rebuild if physical volume greater than 16T.
CVEs
(none)
Note:
More recent versions of these packages may be available.
Click a package name for more details.
Red Hat Enterprise Linux Server 7
SRPM | |
---|---|
kmod-kvdo-6.1.1.125-5.el7.src.rpm | SHA-256: 4cbaa57b189788d11da50a35e2c7156c2aea732603be8a5acd4fb1b2c17b5a10 |
vdo-6.1.1.125-3.el7.src.rpm | SHA-256: a739828fbdad1965e7c5f446a682f962e573ceff2e63469db9dedea32a265a77 |
x86_64 | |
kmod-kvdo-6.1.1.125-5.el7.x86_64.rpm | SHA-256: d530145b8929c496104cfcfb8a6b6ac49794ddc481982d64aeba40e6f72ad255 |
kmod-kvdo-debuginfo-6.1.1.125-5.el7.x86_64.rpm | SHA-256: 639bd5719af653e0be32f093c0ec73598b2da60742615e6060a7e0d71f9925bb |
vdo-6.1.1.125-3.el7.x86_64.rpm | SHA-256: 3218c8a0d6b10a01c5011162c3ac9e1c6104b0e0f7b73adf2e8d6fd1fe6363d7 |
vdo-debuginfo-6.1.1.125-3.el7.x86_64.rpm | SHA-256: ac05941d6e9b8259e6f650bcf4663a876867472eb7cc2470c55a408ac61b23f2 |
Red Hat Enterprise Linux Server - Extended Life Cycle Support 7
SRPM | |
---|---|
kmod-kvdo-6.1.1.125-5.el7.src.rpm | SHA-256: 4cbaa57b189788d11da50a35e2c7156c2aea732603be8a5acd4fb1b2c17b5a10 |
vdo-6.1.1.125-3.el7.src.rpm | SHA-256: a739828fbdad1965e7c5f446a682f962e573ceff2e63469db9dedea32a265a77 |
x86_64 | |
kmod-kvdo-6.1.1.125-5.el7.x86_64.rpm | SHA-256: d530145b8929c496104cfcfb8a6b6ac49794ddc481982d64aeba40e6f72ad255 |
kmod-kvdo-debuginfo-6.1.1.125-5.el7.x86_64.rpm | SHA-256: 639bd5719af653e0be32f093c0ec73598b2da60742615e6060a7e0d71f9925bb |
vdo-6.1.1.125-3.el7.x86_64.rpm | SHA-256: 3218c8a0d6b10a01c5011162c3ac9e1c6104b0e0f7b73adf2e8d6fd1fe6363d7 |
vdo-debuginfo-6.1.1.125-3.el7.x86_64.rpm | SHA-256: ac05941d6e9b8259e6f650bcf4663a876867472eb7cc2470c55a408ac61b23f2 |
Red Hat Enterprise Linux Workstation 7
SRPM | |
---|---|
kmod-kvdo-6.1.1.125-5.el7.src.rpm | SHA-256: 4cbaa57b189788d11da50a35e2c7156c2aea732603be8a5acd4fb1b2c17b5a10 |
vdo-6.1.1.125-3.el7.src.rpm | SHA-256: a739828fbdad1965e7c5f446a682f962e573ceff2e63469db9dedea32a265a77 |
x86_64 | |
kmod-kvdo-6.1.1.125-5.el7.x86_64.rpm | SHA-256: d530145b8929c496104cfcfb8a6b6ac49794ddc481982d64aeba40e6f72ad255 |
kmod-kvdo-debuginfo-6.1.1.125-5.el7.x86_64.rpm | SHA-256: 639bd5719af653e0be32f093c0ec73598b2da60742615e6060a7e0d71f9925bb |
vdo-6.1.1.125-3.el7.x86_64.rpm | SHA-256: 3218c8a0d6b10a01c5011162c3ac9e1c6104b0e0f7b73adf2e8d6fd1fe6363d7 |
vdo-debuginfo-6.1.1.125-3.el7.x86_64.rpm | SHA-256: ac05941d6e9b8259e6f650bcf4663a876867472eb7cc2470c55a408ac61b23f2 |
Red Hat Enterprise Linux Desktop 7
SRPM | |
---|---|
kmod-kvdo-6.1.1.125-5.el7.src.rpm | SHA-256: 4cbaa57b189788d11da50a35e2c7156c2aea732603be8a5acd4fb1b2c17b5a10 |
vdo-6.1.1.125-3.el7.src.rpm | SHA-256: a739828fbdad1965e7c5f446a682f962e573ceff2e63469db9dedea32a265a77 |
x86_64 | |
kmod-kvdo-6.1.1.125-5.el7.x86_64.rpm | SHA-256: d530145b8929c496104cfcfb8a6b6ac49794ddc481982d64aeba40e6f72ad255 |
kmod-kvdo-debuginfo-6.1.1.125-5.el7.x86_64.rpm | SHA-256: 639bd5719af653e0be32f093c0ec73598b2da60742615e6060a7e0d71f9925bb |
vdo-6.1.1.125-3.el7.x86_64.rpm | SHA-256: 3218c8a0d6b10a01c5011162c3ac9e1c6104b0e0f7b73adf2e8d6fd1fe6363d7 |
vdo-debuginfo-6.1.1.125-3.el7.x86_64.rpm | SHA-256: ac05941d6e9b8259e6f650bcf4663a876867472eb7cc2470c55a408ac61b23f2 |
Red Hat Enterprise Linux for Scientific Computing 7
SRPM | |
---|---|
kmod-kvdo-6.1.1.125-5.el7.src.rpm | SHA-256: 4cbaa57b189788d11da50a35e2c7156c2aea732603be8a5acd4fb1b2c17b5a10 |
vdo-6.1.1.125-3.el7.src.rpm | SHA-256: a739828fbdad1965e7c5f446a682f962e573ceff2e63469db9dedea32a265a77 |
x86_64 | |
kmod-kvdo-6.1.1.125-5.el7.x86_64.rpm | SHA-256: d530145b8929c496104cfcfb8a6b6ac49794ddc481982d64aeba40e6f72ad255 |
kmod-kvdo-debuginfo-6.1.1.125-5.el7.x86_64.rpm | SHA-256: 639bd5719af653e0be32f093c0ec73598b2da60742615e6060a7e0d71f9925bb |
vdo-6.1.1.125-3.el7.x86_64.rpm | SHA-256: 3218c8a0d6b10a01c5011162c3ac9e1c6104b0e0f7b73adf2e8d6fd1fe6363d7 |
vdo-debuginfo-6.1.1.125-3.el7.x86_64.rpm | SHA-256: ac05941d6e9b8259e6f650bcf4663a876867472eb7cc2470c55a408ac61b23f2 |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.