- Issued:
- 2016-09-21
- Updated:
- 2016-09-21
RHBA-2016:1925 - Bug Fix Advisory
Synopsis
vdsm 3.6.9 bug fix and enhancement update
Type/Severity
Bug Fix Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
Updated vdsm packages that fix several bugs and add various enhancements are now available.
Description
VDSM is a management module that serves as a Red Hat Enterprise Virtualization Manager agent on Red Hat Enterprise Virtualization Hypervisor or Red Hat Enterprise Linux hosts.
Changes to the vdsm component:
- This update fixes a error in the monitoring code that caused the VDSM to incorrectly report that a QEMU process has recovered and is responsive after being unavailable for a short amount of time, while it was actually unresponsive. (BZ#1360986)
- This update fixes an issue in the monitoring code which caused the VDSM to fail to detect that a stuck QEMU process has become responsive. (BZ#1364925)
- This update adds functionality to enable the hook implementer to change the virtual machine state from start-up to paused, then later resume it.
This ensures that operations that require virtual machines to be started in the paused state can be completed. For example, to attach an external NIC the virtual machine should not be started until the plugging of the NIC is complete on the virtual machine and the entire NIC infrastructure outside the virtual machine.
The paused state can be set in the following two hooks:
- before_device_create
- before_vm_start.
Resuming the virtual machine can be done in the following hooks:
- after_device_create
- after_vm_start
The flags which control the virtual machine state can be read and set using the following functions in the hooking library:
- load_vm_launch_flags_from_file(vm_id)
Get the current state of the flags, including changes made by other hooks
- dump_vm_launch_flags_from_file(vm_id, flags)
Write the new state of the startup flags, all subsequent hooks will see the modified state of the flags (BZ#1314371)
Solution
Before applying this update, make sure all previously released errata
relevant to your system have been applied.
For details on how to apply this update, refer to:
Affected Products
- Red Hat Virtualization 3 for RHEL 7 x86_64
- Red Hat Virtualization for IBM Power LE 3 ppc64le
Fixes
- BZ - 1314371 - Resolve race when using external network providers hook
- BZ - 1360986 - [z-stream clone - 3.6.9] VMs are not reported as non-responding even though qemu process does not responds.
- BZ - 1361551 - Vdsm logging should be improved
- BZ - 1362000 - [z-stream clone - 3.6.9] VDSM to require qemu-kvm-ev delivered by bug 1349525
- BZ - 1364925 - VMs flip to non-responsive state for ever.
- BZ - 1368258 - Cannot import VMs from Xen and VMware when using RHEL7.3 host.
CVEs
(none)
References
(none)
Red Hat Virtualization 3 for RHEL 7
SRPM | |
---|---|
vdsm-4.17.35-1.el7ev.src.rpm | SHA-256: 398636919bfcaf96531aefd6287de1b2b53b170d9ca1bd0e22f322fb21cbff95 |
x86_64 | |
vdsm-4.17.35-1.el7ev.noarch.rpm | SHA-256: 0ff7bbe5c369fc4af903c9115831ac6b10a1f25d6fd199ce677feddc340bc0a3 |
vdsm-cli-4.17.35-1.el7ev.noarch.rpm | SHA-256: 17be44eec1bbc98367559a776b5077462eda7b2b71d37d07a4c09c62686e1d2a |
vdsm-hook-ethtool-options-4.17.35-1.el7ev.noarch.rpm | SHA-256: 14548edf6aea2d69a01ac2e09d95ce0fc0af4ff032b2d6ab4224386f0973a295 |
vdsm-hook-fcoe-4.17.35-1.el7ev.noarch.rpm | SHA-256: 941f9873432c5ae1c78476cf82ca6f61053baf42494ec5b96af5940504c07aa8 |
vdsm-hook-macspoof-4.17.35-1.el7ev.noarch.rpm | SHA-256: cef95cb802475f556e513f4d7f28e9c3a2e641da1572832a22653eb0441f5c2b |
vdsm-hook-openstacknet-4.17.35-1.el7ev.noarch.rpm | SHA-256: ed33bc910c8e2471c60c933b145e2f09db3f1881b20150ae55754eb8809ccca6 |
vdsm-hook-vhostmd-4.17.35-1.el7ev.noarch.rpm | SHA-256: 2c15a65bf7dadaceca279b86ed4d8073a0379e4d002ef98bafd817b77e9b6f79 |
vdsm-hook-vmfex-dev-4.17.35-1.el7ev.noarch.rpm | SHA-256: be2705b7bb9f357e750427a7f7328b4427bd7fe70874da8d38eae5e2fe975613 |
vdsm-infra-4.17.35-1.el7ev.noarch.rpm | SHA-256: 661c3d30843609ea9617a3c2e6413d2ea9e425a8c234ea92de4daa036deeaeda |
vdsm-jsonrpc-4.17.35-1.el7ev.noarch.rpm | SHA-256: dbc879273f8b845c0555a18e5cec5365c0da6311d6f33a8af46bd600ab3a9a35 |
vdsm-python-4.17.35-1.el7ev.noarch.rpm | SHA-256: 3d59155f4d2f37725c162daa3c9be091e32e81d892dc74038eea5fbb5512cd6b |
vdsm-xmlrpc-4.17.35-1.el7ev.noarch.rpm | SHA-256: d34a5a7dd8c406252c709ca19185546545c72ebcb05b9ca778f54551b3e58421 |
vdsm-yajsonrpc-4.17.35-1.el7ev.noarch.rpm | SHA-256: f4505bd5398c3352889a818dfd7cf34a5fa8f72f8f8893f51caab226d0f4d7aa |
Red Hat Virtualization for IBM Power LE 3
SRPM | |
---|---|
vdsm-4.17.35-1.el7ev.src.rpm | SHA-256: 398636919bfcaf96531aefd6287de1b2b53b170d9ca1bd0e22f322fb21cbff95 |
ppc64le | |
vdsm-4.17.35-1.el7ev.noarch.rpm | SHA-256: 0ff7bbe5c369fc4af903c9115831ac6b10a1f25d6fd199ce677feddc340bc0a3 |
vdsm-cli-4.17.35-1.el7ev.noarch.rpm | SHA-256: 17be44eec1bbc98367559a776b5077462eda7b2b71d37d07a4c09c62686e1d2a |
vdsm-debug-plugin-4.17.35-1.el7ev.noarch.rpm | SHA-256: 11af2195d23657b55bead59abb2a46595511837c64449118ddfb881675dda060 |
vdsm-hook-ethtool-options-4.17.35-1.el7ev.noarch.rpm | SHA-256: 14548edf6aea2d69a01ac2e09d95ce0fc0af4ff032b2d6ab4224386f0973a295 |
vdsm-hook-fcoe-4.17.35-1.el7ev.noarch.rpm | SHA-256: 941f9873432c5ae1c78476cf82ca6f61053baf42494ec5b96af5940504c07aa8 |
vdsm-hook-macspoof-4.17.35-1.el7ev.noarch.rpm | SHA-256: cef95cb802475f556e513f4d7f28e9c3a2e641da1572832a22653eb0441f5c2b |
vdsm-hook-openstacknet-4.17.35-1.el7ev.noarch.rpm | SHA-256: ed33bc910c8e2471c60c933b145e2f09db3f1881b20150ae55754eb8809ccca6 |
vdsm-hook-vhostmd-4.17.35-1.el7ev.noarch.rpm | SHA-256: 2c15a65bf7dadaceca279b86ed4d8073a0379e4d002ef98bafd817b77e9b6f79 |
vdsm-hook-vmfex-dev-4.17.35-1.el7ev.noarch.rpm | SHA-256: be2705b7bb9f357e750427a7f7328b4427bd7fe70874da8d38eae5e2fe975613 |
vdsm-infra-4.17.35-1.el7ev.noarch.rpm | SHA-256: 661c3d30843609ea9617a3c2e6413d2ea9e425a8c234ea92de4daa036deeaeda |
vdsm-jsonrpc-4.17.35-1.el7ev.noarch.rpm | SHA-256: dbc879273f8b845c0555a18e5cec5365c0da6311d6f33a8af46bd600ab3a9a35 |
vdsm-python-4.17.35-1.el7ev.noarch.rpm | SHA-256: 3d59155f4d2f37725c162daa3c9be091e32e81d892dc74038eea5fbb5512cd6b |
vdsm-xmlrpc-4.17.35-1.el7ev.noarch.rpm | SHA-256: d34a5a7dd8c406252c709ca19185546545c72ebcb05b9ca778f54551b3e58421 |
vdsm-yajsonrpc-4.17.35-1.el7ev.noarch.rpm | SHA-256: f4505bd5398c3352889a818dfd7cf34a5fa8f72f8f8893f51caab226d0f4d7aa |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.