- Issued:
- 2014-07-09
- Updated:
- 2014-07-09
RHBA-2014:0864 - Bug Fix Advisory
Synopsis
vdsm 3.3.4 bug fix update
Type/Severity
Bug Fix Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
Updated vdsm packages that fix various bugs are now available.
Description
VDSM is a management module that serves as a Red Hat Enterprise Virtualization
Manager agent on Red Hat Enterprise Virtualization Hypervisor or Red Hat
Enterprise Linux hosts.
Changes to the vdsm component:
- Previously, hypervisors reported what appeared to be very high shared memory
usage when memory page sharing wasn't enabled. This happened because MOM reports
the ksm_pages_sharing value in raw pages, while both VDSM and Manager expect
megabytes. Now, memShared units reported from MOM undergo the necessary
conversion to display in VDSM and Manager in MiB. (BZ#1102651)
- Previously, balloon stats retrieval was gathered by a costly direct libvirt
call in the getStats() body, resulting in a significant slowdown in this
frequent API call. Now, the balloon information getter has been reimplemented as
a sampling function, and moved into the VmStatsThread to make things more
robust. (BZ#1110848)
All Red Hat Enterprise Virtualization Manager users are advised to upgrade to
these updated packages, which resolve these issues.
Solution
Before applying this update, make sure all previously-released errata relevant
to your system have been applied.
This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/site/articles/11258
Affected Products
- Red Hat Virtualization 3.3 x86_64
- Red Hat Virtualization 3 for RHEL 6 x86_64
Fixes
- BZ - 1102651 - High shared memory being reported on hypervisor
- BZ - 1110848 - [scale] balloon stats retrieval should be done outside of the actual API call
CVEs
(none)
References
(none)
Red Hat Virtualization 3.3
SRPM | |
---|---|
vdsm-4.13.2-0.18.el6ev.src.rpm | SHA-256: 3709065b610d13c71b3a62bc2746e1eee6d78628f6633c419c4916c444636bee |
x86_64 | |
vdsm-bootstrap-4.13.2-0.18.el6ev.noarch.rpm | SHA-256: 91005b13070ff9fd24090e0b031ac5f0ab23f27cc086a83ae03a829813f48b96 |
vdsm-debuginfo-4.13.2-0.18.el6ev.x86_64.rpm | SHA-256: b4184fe6fb00452f2854617b1cae6f384f2078dd18a5832d7c9ed951aa0a5c0c |
Red Hat Virtualization 3 for RHEL 6
SRPM | |
---|---|
vdsm-4.13.2-0.18.el6ev.src.rpm | SHA-256: 3709065b610d13c71b3a62bc2746e1eee6d78628f6633c419c4916c444636bee |
x86_64 | |
vdsm-4.13.2-0.18.el6ev.x86_64.rpm | SHA-256: 77d2415d9464c39fd8c60ef7baff9e989290509e818406aac5d21876ffe6d9e2 |
vdsm-cli-4.13.2-0.18.el6ev.noarch.rpm | SHA-256: c7a79e8059f2d452c5a6b7fc54c2b78a1bc9701bec91592883e37fde64184506 |
vdsm-debuginfo-4.13.2-0.18.el6ev.x86_64.rpm | SHA-256: b4184fe6fb00452f2854617b1cae6f384f2078dd18a5832d7c9ed951aa0a5c0c |
vdsm-hook-vhostmd-4.13.2-0.18.el6ev.noarch.rpm | SHA-256: cb92c35a62398585de4b2327ae0e3a86368d391bd60a3b746053b26c504af029 |
vdsm-python-4.13.2-0.18.el6ev.x86_64.rpm | SHA-256: 9fae33aeb72eff3d0ed79f2077cdf240dbd8b167151008635c3ead128649ab2b |
vdsm-reg-4.13.2-0.18.el6ev.noarch.rpm | SHA-256: 0fba6b356e3a7b2a02bb1c1c64e04c5623a8dded4f7c081017c51dea3b109faa |
vdsm-xmlrpc-4.13.2-0.18.el6ev.noarch.rpm | SHA-256: 8d2c4568abc0003d7b47fc3539c8a786bcd79dc190270fec8f73dbd0bae0eeb0 |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.