- Issued:
- 2014-07-29
- Updated:
- 2014-07-29
RHBA-2014:0970 - Bug Fix Advisory
Synopsis
vdsm 3.4.1 bug fix and enhancement update
Type/Severity
Bug Fix Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
Updated vdsm packages that fix several bugs and add various enhancements are now
available.
Description
VDSM is a management module that serves as a Red Hat Enterprise Virtualization
Manager agent on Red Hat Enterprise Virtualization Hypervisor or Red Hat
Enterprise Linux hosts.
Changes to the vdsm component:
- Previously, in some instances where a hypervisor was installed from PXE with
the "management_server" parameter, that host did not show as pending approval in
the Red Hat Enterprise Virtualization Manager Administration Portal. This
happened because a delay in delivering the engine IP address caused the
certificate download from the vdsm-config stage to fail. Now, a patch moves the
download certificate from vdsm-config to vdsm-reg-setup, and the certificate is
downloaded and verified successfully. (BZ#1065368)
- Previously, vdsm called 'multipath -r' to force a reload/refresh of the device
map. This sometimes triggered a segfault in the multipathd daemon. Now, the '-r'
flag has been removed, because evidence suggests that as long as multipathd
daemon is running, there is no need to invoke multipath to detect new devices.
(BZ#1108553)
- Previously, hypervisors reported what appeared to be very high shared memory
usage when memory page sharing wasn't enabled. This happened because MOM reports
the ksm_pages_sharing value in raw pages, while both VDSM and Manager expect
megabytes. Now, memShared units reported from MOM undergo the necessary
conversion to display in VDSM and Manager in MiB. (BZ#1102650)
- Previously, when a BOND network was updated with a new IP address, the new IP
did not appear on the host. This happened because the bond removal (before the
addition of the modified network) was not clearing the ifcfg file IP
configuration fields. Now, the bond and its ifcfg file are deleted, and new
instances of both are created, allowing the IP to be updated. (BZ#1105645)
- Previously, in some circumstances, applications successfully installed on a
virtual machine were not visible in the Red Hat Enterprise Virtualization
Manager admin portal under that VM's "Applications" tab. This was attributed to
a crash in the "VM channels listener". Now, a patch ensures that events that are
not being tracked are ignored, and the listener does not crash. (BZ#1106418)
- Previously, deleting a snapshot of block images/disks did not free up that
snapshot's Actual space allocation on the VM image. Now, a fix enables the
volume chain to be correctly prepared, and Actual space is updated to its
expected size. (BZ#1105848)
- Previously, the state of suspended virtual machines was incorrectly displayed
as 'Down' under certain conditions. This was caused by the logic used to poll
the status of virtual machines, whereby an uncaught exception would cause the
status of virtual machines to be reported incorrectly. Now, this logic has been
revised so that the status of virtual machines is reported correctly.
(BZ#1098148)
- Previously, balloon stats retrieval was gathered by a costly direct libvirt
call in the getStats() body, resulting in a significant slowdown in this
frequent API call. Now, the balloon information getter has been reimplemented as
a sampling function, and moved into the VmStatsThread to make things more
robust. (BZ#1110845)
All users managing Red Hat Enterprise Linux Virtualization hosts using Red Hat
Enterprise Virtualization Manager are advised to install these updated packages.
Solution
Before applying this update, make sure all previously released errata relevant
to your system have been applied.
This update is available via the Red Hat Network. Details on how to use the Red
Hat Network to apply this update are available at
https://access.redhat.com/site/articles/11258
Affected Products
- Red Hat Virtualization 3.4 x86_64
- Red Hat Virtualization 3 for RHEL 6 x86_64
Fixes
- BZ - 1065368 - [RHEVH] if installed from PXE with management_server parameter, host does not show as pending for approval in RHEVM GUI
- BZ - 1098148 - VDSM internal exception gathering balloon info while shutting down
- BZ - 1102650 - High shared memory being reported on hypervisor
- BZ - 1105645 - [setupNetworks]IP address for BOND is not updated on the host
- BZ - 1105848 - Deleting snapshot does not free up block device Actual space allocation
- BZ - 1110845 - [scale] balloon stats retrieval should be done outside of the actual API call
- BZ - 1114269 - [vdsm] 3.4.1 rebase bug (includes all ovirt bugs in the release)
CVEs
(none)
References
(none)
Red Hat Virtualization 3.4
SRPM | |
---|---|
vdsm-4.14.11-5.el6ev.src.rpm | SHA-256: 4833a1d70769447b1cf354161888028de38163bf5a277aadafb027c78b5136bf |
x86_64 | |
vdsm-bootstrap-4.14.11-5.el6ev.noarch.rpm | SHA-256: b63fde0a8d27df0609acc055ef84d0c5f6a95a791565d30dbe3a0251b19feb5a |
vdsm-debuginfo-4.14.11-5.el6ev.x86_64.rpm | SHA-256: 4c605cb5f9c430f78bbc593440535253733aae6d1c4d8344e43041628a8a67b6 |
Red Hat Virtualization 3 for RHEL 6
SRPM | |
---|---|
vdsm-4.14.11-5.el6ev.src.rpm | SHA-256: 4833a1d70769447b1cf354161888028de38163bf5a277aadafb027c78b5136bf |
x86_64 | |
vdsm-4.14.11-5.el6ev.x86_64.rpm | SHA-256: 408efe2c5ed538789569f3b985f414a5a9a417f08fd8e19af183575289057d23 |
vdsm-cli-4.14.11-5.el6ev.noarch.rpm | SHA-256: d02931e3ded8b42663cdf8e01cf58d5c1168c5cf0e1c10b5299ce08ff79eecae |
vdsm-debuginfo-4.14.11-5.el6ev.x86_64.rpm | SHA-256: 4c605cb5f9c430f78bbc593440535253733aae6d1c4d8344e43041628a8a67b6 |
vdsm-hook-vhostmd-4.14.11-5.el6ev.noarch.rpm | SHA-256: c8b35bf5fbe450175751edc0db30e4be13ab320c1d94c55c342906a66e688dde |
vdsm-python-4.14.11-5.el6ev.x86_64.rpm | SHA-256: 1157926a123e595375165600aa5900656b9cb9f98e035cc39acd1cc752b4eb61 |
vdsm-python-zombiereaper-4.14.11-5.el6ev.noarch.rpm | SHA-256: 33c75be11a2cacb882404417dfbfcd4d04ae7d3c68faa1785fd17a2f5ce281ca |
vdsm-reg-4.14.11-5.el6ev.noarch.rpm | SHA-256: 18516c31f9f1d969218fa1de3ed0f2280d13dd7646be05b8d72770794e4b2c38 |
vdsm-xmlrpc-4.14.11-5.el6ev.noarch.rpm | SHA-256: a73f4081afc77ebe7c1ae1b4737c28667c94a61973c9ae4cd16f173804680dbb |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.