- Issued:
- 2017-04-18
- Updated:
- 2017-07-17
RHEA-2017:0998 - Product Enhancement Advisory
Synopsis
VDSM bug fix and enhancement update 4.1 GA
Type/Severity
Product Enhancement Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
Updated vdsm packages that fix several bugs and add various enhancements are now available.
Description
VDSM is a management module that serves as a Red Hat Virtualization Manager agent on Red Hat Virtualization Host or Red Hat Enterprise Linux hosts.
Changes to the vdsm component:
- Previously, Red Hat Virtualization could not import an OVA from VMWare when the destination storage domain used block storage. Allocating a smaller size for the VM disk by reading the 'size' attribute of the OVF XML caused the import to fail with no good reason. Now, the import operation uses the 'physical size' attribute for disk allocation, so an OVA can be imported to a block storage domain. (BZ#1382404)
- This update fixes an error in the monitoring code that caused VDSM to incorrectly report that a QEMU process had recovered and was responsive after being unavailable for a short amount of time, while it was actually unresponsive. (BZ#1361028)
- Previously, if a VM shutdown was too slow, the state of the VM could be misreported as unresponsive, even though the VM was operating correctly, albeit too slowly. This was caused by a too-aggressive check on startup and shutdown. This patch takes into account slowdowns in startup and shutdown, avoiding false positive reports. (BZ#1382578)
- Previously, NUMA sampling could cause an unnecessarily high load on a complex host. This update reduces the sample interval to 10 minutes, as that is enough for rarely-changing NUMA topology. (BZ#1396910)
- Previously, VDSM 4.0 didn't support a 3.5 Manager, but reported it as supported; you could add a 4.0 host to a 3.5 Manager, but would experience failures. This release removes 3.5 from the supported Manager versions, so you can not add a 4.0 host to a 3.5 Manager. (BZ#1403835)
- Previously, the Manager didn't send migration limits to VDSM during VM migration operations. The destination VDSM understood this lack of migration limits as migration from an old source that didn't support the retry logic, failing the migration altogether instead of having the source attempt a proper retry. This could ultimately result in the host entering an error state; especially problematic, for example, when attempting to put a host to maintenance.
Now, the Manager sends migrations limits as part of the VM migration operation, so the migration retry logic between the source and destination VDSM is properly triggered when necessary. (BZ#1409246)
Solution
Before applying this update, make sure all previously released errata
relevant to your system have been applied.
For details on how to apply this update, refer to:
Affected Products
- Red Hat Virtualization 4 for RHEL 7 x86_64
- Red Hat Virtualization for IBM Power LE 4 for RHEL 7 ppc64le
Fixes
- BZ - 1081962 - [SCALE] block storage domain monitoring thread slows down when storage operations are running
- BZ - 1223538 - VDSM reports "lvm vgs failed" warning when DC contains ISO domain
- BZ - 1236161 - VDSM response to path preparation during live VM migration was very slow
- BZ - 1242532 - vdsm fails to start if one network fails to be restored
- BZ - 1326940 - After ovirt-engine is restarted, hypervisors stop listening on 54321 until vdsm is restarted.
- BZ - 1344890 - Failed to add rhel7.3 to rhevm4.0 as failed to start vdsmd service
- BZ - 1357798 - VMs are not reported as non-responding even though qemu process does not responds.
- BZ - 1361028 - VMs flip to non-responsive state for ever.
- BZ - 1372093 - vdsm sos plugin should collect 'nodectl info' output
- BZ - 1374545 - Guest LVs created in ovirt raw volumes are auto activated on the hypervisor in RHEL 7
- BZ - 1377157 - LVM cache not updating and reporting unknown device
- BZ - 1381009 - Cisco UCS fencing using "Power fencing policy" in RHEVM is not shutting down the fence device.
- BZ - 1382404 - Importing VMs from VMware ova file fails with block storage domain and thin provisioned disk
- BZ - 1382578 - Periodic functions may continue running after VM is down.
- BZ - 1382583 - Periodic functions/monitor start before VM is run.
- BZ - 1393458 - Error in slot allocation when adding a new disk volume
- BZ - 1396910 - Numa sampling causes very high load on the hypervisor.
- BZ - 1397490 - bond mode 4 default xmit_hash_policy wrong
- BZ - 1398572 - hostdev listing takes large amount of time
- BZ - 1398822 - HE VM shutdown abruptly when master storage domain is put into maintenance mode (VDSM side)
- BZ - 1400528 - [Bug RHV 4.0.4] Intermittent direct lun vm failed to start with error "VolumeError: Bad volume specification".
- BZ - 1403835 - Remove 3.5 from the supportedEngines reported by VDSM
- BZ - 1403846 - keep 3.6 in the supportedEngines reported by VDSM
- BZ - 1406651 - setupNetworks fails if there is an empty line in the ifcfg files
- BZ - 1406851 - Live disk migration failed with: block copy still active: disk 'vda' not ready for pivot yet
- BZ - 1409246 - VM migration failing with "Returning backwards compatible migration error code"
- BZ - 1416278 - schema inconsistencies flooding logs
- BZ - 1426440 - During Live Merge, clear information about top/base/active volumes is not provided by INFO level logging
CVEs
(none)
References
(none)
Red Hat Virtualization 4 for RHEL 7
SRPM | |
---|---|
vdsm-4.19.10.1-1.el7ev.src.rpm | SHA-256: 920e1a3bc4f54d404a8da596f2ec4f1cbc102a7820c4ee4c021bca66de02145e |
x86_64 | |
vdsm-4.19.10.1-1.el7ev.x86_64.rpm | SHA-256: f83ba6460a89d85a180c15cb0f57741d95c828605acf087fd11baa64a50a4501 |
vdsm-api-4.19.10.1-1.el7ev.noarch.rpm | SHA-256: bedafb1d19593a21f8bbae7a3d700b61f5a5603d00613ada04a0e2ed9d053d00 |
vdsm-cli-4.19.10.1-1.el7ev.noarch.rpm | SHA-256: de84ce36b1ce3de07697a6fb05a1852b1d4fdafa95394527bce536e723d1e2a3 |
vdsm-client-4.19.10.1-1.el7ev.noarch.rpm | SHA-256: 5dc9b12b56c7facd61dbf53187903e2ae29b1d9d16d7482d5e6a94ff97ef6d76 |
vdsm-gluster-4.19.10.1-1.el7ev.noarch.rpm | SHA-256: ebf413da103519d1a17c39bfd2c6c47be98ce76f4f6afca44c27d61816d4d41c |
vdsm-hook-ethtool-options-4.19.10.1-1.el7ev.noarch.rpm | SHA-256: 3b978c0f0bc827df0a8cf4c45ef8ea4165d7b48c8d5d5e7bbf8e3bb942cc8699 |
vdsm-hook-fcoe-4.19.10.1-1.el7ev.noarch.rpm | SHA-256: df12874ac5b630b5973fcb12118e7cacf157cdeedcf52c465e4c294c49c39f48 |
vdsm-hook-macspoof-4.19.10.1-1.el7ev.noarch.rpm | SHA-256: 1cd5d731750e7a24327239e4d7d8f7e0cc65421b6c8b81c939973e0cdfa00f23 |
vdsm-hook-openstacknet-4.19.10.1-1.el7ev.noarch.rpm | SHA-256: 1437966aa90b220d2f9260b242414572b1731cbdcae0d0efb7e301bff6e9ae73 |
vdsm-hook-vhostmd-4.19.10.1-1.el7ev.noarch.rpm | SHA-256: 0162aeba2dedf2e7bb847f6be8df3a9a5c8ff2be94879373802e9c67bd71dcad |
vdsm-hook-vmfex-dev-4.19.10.1-1.el7ev.noarch.rpm | SHA-256: 6ecdc15b1ea936ca2c239885a5c9afeb53558bbc5e69bc79fea8ee10458712ef |
vdsm-jsonrpc-4.19.10.1-1.el7ev.noarch.rpm | SHA-256: 158f7c4234a290bb8f19a5ff5461aa9cf162addc4a129f73a41c4f9f830b712b |
vdsm-python-4.19.10.1-1.el7ev.noarch.rpm | SHA-256: c61baef6cdb6729ad52be4a4595fb90d79545fe909032c44a54c018b07fa4c24 |
vdsm-xmlrpc-4.19.10.1-1.el7ev.noarch.rpm | SHA-256: 87f9fbad1af5960b30c37bc252dbd8bb0244ca5768d6a6172f795c62a11f5ff1 |
vdsm-yajsonrpc-4.19.10.1-1.el7ev.noarch.rpm | SHA-256: ddbfba1747092147727db463f9f524f96ff5b5097f26444cc3efe59a4fcc7ab9 |
Red Hat Virtualization for IBM Power LE 4 for RHEL 7
SRPM | |
---|---|
vdsm-4.19.10.1-1.el7ev.src.rpm | SHA-256: 920e1a3bc4f54d404a8da596f2ec4f1cbc102a7820c4ee4c021bca66de02145e |
ppc64le | |
vdsm-4.19.10.1-1.el7ev.ppc64le.rpm | SHA-256: f84ea2ae64474dcfbb5e6089878c7e92e571ff445bdf96ae61374b8040b55894 |
vdsm-api-4.19.10.1-1.el7ev.noarch.rpm | SHA-256: bedafb1d19593a21f8bbae7a3d700b61f5a5603d00613ada04a0e2ed9d053d00 |
vdsm-cli-4.19.10.1-1.el7ev.noarch.rpm | SHA-256: de84ce36b1ce3de07697a6fb05a1852b1d4fdafa95394527bce536e723d1e2a3 |
vdsm-client-4.19.10.1-1.el7ev.noarch.rpm | SHA-256: 5dc9b12b56c7facd61dbf53187903e2ae29b1d9d16d7482d5e6a94ff97ef6d76 |
vdsm-hook-ethtool-options-4.19.10.1-1.el7ev.noarch.rpm | SHA-256: 3b978c0f0bc827df0a8cf4c45ef8ea4165d7b48c8d5d5e7bbf8e3bb942cc8699 |
vdsm-hook-fcoe-4.19.10.1-1.el7ev.noarch.rpm | SHA-256: df12874ac5b630b5973fcb12118e7cacf157cdeedcf52c465e4c294c49c39f48 |
vdsm-hook-macspoof-4.19.10.1-1.el7ev.noarch.rpm | SHA-256: 1cd5d731750e7a24327239e4d7d8f7e0cc65421b6c8b81c939973e0cdfa00f23 |
vdsm-hook-openstacknet-4.19.10.1-1.el7ev.noarch.rpm | SHA-256: 1437966aa90b220d2f9260b242414572b1731cbdcae0d0efb7e301bff6e9ae73 |
vdsm-hook-vhostmd-4.19.10.1-1.el7ev.noarch.rpm | SHA-256: 0162aeba2dedf2e7bb847f6be8df3a9a5c8ff2be94879373802e9c67bd71dcad |
vdsm-hook-vmfex-dev-4.19.10.1-1.el7ev.noarch.rpm | SHA-256: 6ecdc15b1ea936ca2c239885a5c9afeb53558bbc5e69bc79fea8ee10458712ef |
vdsm-jsonrpc-4.19.10.1-1.el7ev.noarch.rpm | SHA-256: 158f7c4234a290bb8f19a5ff5461aa9cf162addc4a129f73a41c4f9f830b712b |
vdsm-python-4.19.10.1-1.el7ev.noarch.rpm | SHA-256: c61baef6cdb6729ad52be4a4595fb90d79545fe909032c44a54c018b07fa4c24 |
vdsm-xmlrpc-4.19.10.1-1.el7ev.noarch.rpm | SHA-256: 87f9fbad1af5960b30c37bc252dbd8bb0244ca5768d6a6172f795c62a11f5ff1 |
vdsm-yajsonrpc-4.19.10.1-1.el7ev.noarch.rpm | SHA-256: ddbfba1747092147727db463f9f524f96ff5b5097f26444cc3efe59a4fcc7ab9 |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.