Synopsis
new packages: kmod-kvdo
Type/Severity
Product Enhancement Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
View affected systems
Topic
New kmod-kvdo packages are now available for Red Hat Enterprise Linux 7.
Description
The kmod-kvdo packages provide the kernel modules for Virtual Data Optimizer (VDO). VDO is a device mapper target that delivers block-level deduplication, compression, and thin provisioning.
This enhancement update adds the kmod-kvdo packages to Red Hat Enterprise Linux 7.
For detailed information on changes in this release, see the Red Hat Enterprise Linux 7.5 Release Notes linked from the References section.
Affected Products
-
Red Hat Enterprise Linux Server 7 x86_64
-
Red Hat Enterprise Linux for x86_64 - Extended Update Support 7.7 x86_64
-
Red Hat Enterprise Linux for x86_64 - Extended Update Support 7.6 x86_64
-
Red Hat Enterprise Linux Server - AUS 7.7 x86_64
-
Red Hat Enterprise Linux Server - AUS 7.6 x86_64
-
Red Hat Enterprise Linux Server - Extended Life Cycle Support 7 x86_64
-
Red Hat Enterprise Linux Workstation 7 x86_64
-
Red Hat Enterprise Linux Desktop 7 x86_64
-
Red Hat Enterprise Linux for Scientific Computing 7 x86_64
-
Red Hat Enterprise Linux Server - TUS 7.7 x86_64
-
Red Hat Enterprise Linux Server - TUS 7.6 x86_64
-
Red Hat Enterprise Linux EUS Compute Node 7.7 x86_64
-
Red Hat Enterprise Linux EUS Compute Node 7.6 x86_64
-
Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 7.7 x86_64
-
Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 7.6 x86_64
Fixes
-
BZ - 1505961
- KVDO - DedupeQ thread starts with capital letter
-
BZ - 1510558
- vdoformat tries to recreate UDS index instead of creating a new one
-
BZ - 1510567
- Calltrace when vdo create --indexMem with not enough free memory
-
BZ - 1511096
- modinfo output for kvdo module does not display version number
-
BZ - 1511201
- UDS threads do not identify the VDO device they relate to
-
BZ - 1511587
- Creating VDO on top of VDO spams "kvdo347:dedupeQ: kvdoMapBio called from within a VDO thread!"
-
BZ - 1512631
- failing vdo status commands should mention vdoconf.yml as a possible solution
-
BZ - 1516081
- Do not destroy an old dedupe index unless it does not exist or is unrecoverable
-
BZ - 1521200
- VDO: REQ_FLUSH and REQ_FUA should log at level INFO
-
BZ - 1523240
- Overflow leading to corruption after 160E writes
-
BZ - 1524496
- VDO verifyDuplicationWork log message change
-
BZ - 1527924
- removing kvdo module does not return version
-
BZ - 1532481
- Some dedupe scenarios result in ENOSPACE way too early.
-
BZ - 1533260
- General Protection Fault unlocking UDS callback mutex
-
BZ - 1535597
- Change device-mapper target name for VDO from "dedupe" to "vdo"
-
BZ - 1539061
- KMOD-KVDO RPM refer to Red Hat URL, and not Github URL
-
BZ - 1540696
- VDO crash recovery code can lead to BUG: unable to handle kernel paging request
-
BZ - 1540777
- VDO in sync mode becomes unsafe if the underlying storage switches to requiring flushes
-
BZ - 1541409
- kmod-kvdo RPM has old description and summary
-
BZ - 1549178
- Cannot uninstall kmod-kvdo RPM if modules are not loaded
Note:
More recent versions of these packages may be available.
Click a package name for more details.
Red Hat Enterprise Linux Server 7
SRPM |
kmod-kvdo-6.1.0.153-15.el7.src.rpm
|
SHA-256: f978d95251525fca25899fed0a5af74e2ab72a316710836dcb29684a0a2adb14 |
x86_64 |
kmod-kvdo-6.1.0.153-15.el7.x86_64.rpm
|
SHA-256: 7044751ad93f52ab65f2ac5fe0899e3880cf4052345f03b9e856d5f52cf356ee |
kmod-kvdo-debuginfo-6.1.0.153-15.el7.x86_64.rpm
|
SHA-256: d7321c2b5d6edc5765888f2c7abddf08683395c25022db186dcf2776489c1704 |
Red Hat Enterprise Linux for x86_64 - Extended Update Support 7.7
SRPM |
kmod-kvdo-6.1.0.153-15.el7.src.rpm
|
SHA-256: f978d95251525fca25899fed0a5af74e2ab72a316710836dcb29684a0a2adb14 |
x86_64 |
kmod-kvdo-6.1.0.153-15.el7.x86_64.rpm
|
SHA-256: 7044751ad93f52ab65f2ac5fe0899e3880cf4052345f03b9e856d5f52cf356ee |
kmod-kvdo-debuginfo-6.1.0.153-15.el7.x86_64.rpm
|
SHA-256: d7321c2b5d6edc5765888f2c7abddf08683395c25022db186dcf2776489c1704 |
Red Hat Enterprise Linux for x86_64 - Extended Update Support 7.6
SRPM |
kmod-kvdo-6.1.0.153-15.el7.src.rpm
|
SHA-256: f978d95251525fca25899fed0a5af74e2ab72a316710836dcb29684a0a2adb14 |
x86_64 |
kmod-kvdo-6.1.0.153-15.el7.x86_64.rpm
|
SHA-256: 7044751ad93f52ab65f2ac5fe0899e3880cf4052345f03b9e856d5f52cf356ee |
kmod-kvdo-debuginfo-6.1.0.153-15.el7.x86_64.rpm
|
SHA-256: d7321c2b5d6edc5765888f2c7abddf08683395c25022db186dcf2776489c1704 |
Red Hat Enterprise Linux Server - AUS 7.7
SRPM |
kmod-kvdo-6.1.0.153-15.el7.src.rpm
|
SHA-256: f978d95251525fca25899fed0a5af74e2ab72a316710836dcb29684a0a2adb14 |
x86_64 |
kmod-kvdo-6.1.0.153-15.el7.x86_64.rpm
|
SHA-256: 7044751ad93f52ab65f2ac5fe0899e3880cf4052345f03b9e856d5f52cf356ee |
kmod-kvdo-debuginfo-6.1.0.153-15.el7.x86_64.rpm
|
SHA-256: d7321c2b5d6edc5765888f2c7abddf08683395c25022db186dcf2776489c1704 |
Red Hat Enterprise Linux Server - AUS 7.6
SRPM |
kmod-kvdo-6.1.0.153-15.el7.src.rpm
|
SHA-256: f978d95251525fca25899fed0a5af74e2ab72a316710836dcb29684a0a2adb14 |
x86_64 |
kmod-kvdo-6.1.0.153-15.el7.x86_64.rpm
|
SHA-256: 7044751ad93f52ab65f2ac5fe0899e3880cf4052345f03b9e856d5f52cf356ee |
kmod-kvdo-debuginfo-6.1.0.153-15.el7.x86_64.rpm
|
SHA-256: d7321c2b5d6edc5765888f2c7abddf08683395c25022db186dcf2776489c1704 |
Red Hat Enterprise Linux Server - Extended Life Cycle Support 7
SRPM |
kmod-kvdo-6.1.0.153-15.el7.src.rpm
|
SHA-256: f978d95251525fca25899fed0a5af74e2ab72a316710836dcb29684a0a2adb14 |
x86_64 |
kmod-kvdo-6.1.0.153-15.el7.x86_64.rpm
|
SHA-256: 7044751ad93f52ab65f2ac5fe0899e3880cf4052345f03b9e856d5f52cf356ee |
kmod-kvdo-debuginfo-6.1.0.153-15.el7.x86_64.rpm
|
SHA-256: d7321c2b5d6edc5765888f2c7abddf08683395c25022db186dcf2776489c1704 |
Red Hat Enterprise Linux Workstation 7
SRPM |
kmod-kvdo-6.1.0.153-15.el7.src.rpm
|
SHA-256: f978d95251525fca25899fed0a5af74e2ab72a316710836dcb29684a0a2adb14 |
x86_64 |
kmod-kvdo-6.1.0.153-15.el7.x86_64.rpm
|
SHA-256: 7044751ad93f52ab65f2ac5fe0899e3880cf4052345f03b9e856d5f52cf356ee |
kmod-kvdo-debuginfo-6.1.0.153-15.el7.x86_64.rpm
|
SHA-256: d7321c2b5d6edc5765888f2c7abddf08683395c25022db186dcf2776489c1704 |
Red Hat Enterprise Linux Desktop 7
SRPM |
kmod-kvdo-6.1.0.153-15.el7.src.rpm
|
SHA-256: f978d95251525fca25899fed0a5af74e2ab72a316710836dcb29684a0a2adb14 |
x86_64 |
kmod-kvdo-6.1.0.153-15.el7.x86_64.rpm
|
SHA-256: 7044751ad93f52ab65f2ac5fe0899e3880cf4052345f03b9e856d5f52cf356ee |
kmod-kvdo-debuginfo-6.1.0.153-15.el7.x86_64.rpm
|
SHA-256: d7321c2b5d6edc5765888f2c7abddf08683395c25022db186dcf2776489c1704 |
Red Hat Enterprise Linux for Scientific Computing 7
SRPM |
kmod-kvdo-6.1.0.153-15.el7.src.rpm
|
SHA-256: f978d95251525fca25899fed0a5af74e2ab72a316710836dcb29684a0a2adb14 |
x86_64 |
kmod-kvdo-6.1.0.153-15.el7.x86_64.rpm
|
SHA-256: 7044751ad93f52ab65f2ac5fe0899e3880cf4052345f03b9e856d5f52cf356ee |
kmod-kvdo-debuginfo-6.1.0.153-15.el7.x86_64.rpm
|
SHA-256: d7321c2b5d6edc5765888f2c7abddf08683395c25022db186dcf2776489c1704 |
Red Hat Enterprise Linux Server - TUS 7.7
SRPM |
kmod-kvdo-6.1.0.153-15.el7.src.rpm
|
SHA-256: f978d95251525fca25899fed0a5af74e2ab72a316710836dcb29684a0a2adb14 |
x86_64 |
kmod-kvdo-6.1.0.153-15.el7.x86_64.rpm
|
SHA-256: 7044751ad93f52ab65f2ac5fe0899e3880cf4052345f03b9e856d5f52cf356ee |
kmod-kvdo-debuginfo-6.1.0.153-15.el7.x86_64.rpm
|
SHA-256: d7321c2b5d6edc5765888f2c7abddf08683395c25022db186dcf2776489c1704 |
Red Hat Enterprise Linux Server - TUS 7.6
SRPM |
kmod-kvdo-6.1.0.153-15.el7.src.rpm
|
SHA-256: f978d95251525fca25899fed0a5af74e2ab72a316710836dcb29684a0a2adb14 |
x86_64 |
kmod-kvdo-6.1.0.153-15.el7.x86_64.rpm
|
SHA-256: 7044751ad93f52ab65f2ac5fe0899e3880cf4052345f03b9e856d5f52cf356ee |
kmod-kvdo-debuginfo-6.1.0.153-15.el7.x86_64.rpm
|
SHA-256: d7321c2b5d6edc5765888f2c7abddf08683395c25022db186dcf2776489c1704 |
Red Hat Enterprise Linux EUS Compute Node 7.7
SRPM |
kmod-kvdo-6.1.0.153-15.el7.src.rpm
|
SHA-256: f978d95251525fca25899fed0a5af74e2ab72a316710836dcb29684a0a2adb14 |
x86_64 |
kmod-kvdo-6.1.0.153-15.el7.x86_64.rpm
|
SHA-256: 7044751ad93f52ab65f2ac5fe0899e3880cf4052345f03b9e856d5f52cf356ee |
kmod-kvdo-debuginfo-6.1.0.153-15.el7.x86_64.rpm
|
SHA-256: d7321c2b5d6edc5765888f2c7abddf08683395c25022db186dcf2776489c1704 |
Red Hat Enterprise Linux EUS Compute Node 7.6
SRPM |
kmod-kvdo-6.1.0.153-15.el7.src.rpm
|
SHA-256: f978d95251525fca25899fed0a5af74e2ab72a316710836dcb29684a0a2adb14 |
x86_64 |
kmod-kvdo-6.1.0.153-15.el7.x86_64.rpm
|
SHA-256: 7044751ad93f52ab65f2ac5fe0899e3880cf4052345f03b9e856d5f52cf356ee |
kmod-kvdo-debuginfo-6.1.0.153-15.el7.x86_64.rpm
|
SHA-256: d7321c2b5d6edc5765888f2c7abddf08683395c25022db186dcf2776489c1704 |
Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 7.7
SRPM |
kmod-kvdo-6.1.0.153-15.el7.src.rpm
|
SHA-256: f978d95251525fca25899fed0a5af74e2ab72a316710836dcb29684a0a2adb14 |
x86_64 |
kmod-kvdo-6.1.0.153-15.el7.x86_64.rpm
|
SHA-256: 7044751ad93f52ab65f2ac5fe0899e3880cf4052345f03b9e856d5f52cf356ee |
kmod-kvdo-debuginfo-6.1.0.153-15.el7.x86_64.rpm
|
SHA-256: d7321c2b5d6edc5765888f2c7abddf08683395c25022db186dcf2776489c1704 |
Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 7.6
SRPM |
kmod-kvdo-6.1.0.153-15.el7.src.rpm
|
SHA-256: f978d95251525fca25899fed0a5af74e2ab72a316710836dcb29684a0a2adb14 |
x86_64 |
kmod-kvdo-6.1.0.153-15.el7.x86_64.rpm
|
SHA-256: 7044751ad93f52ab65f2ac5fe0899e3880cf4052345f03b9e856d5f52cf356ee |
kmod-kvdo-debuginfo-6.1.0.153-15.el7.x86_64.rpm
|
SHA-256: d7321c2b5d6edc5765888f2c7abddf08683395c25022db186dcf2776489c1704 |