Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Security Measurement
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Insights
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Insights
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHBA-2015:2530 - Bug Fix Advisory
Issued:
2015-12-01
Updated:
2015-12-01

RHBA-2015:2530 - Bug Fix Advisory

  • Overview
  • Updated Packages

Synopsis

vdsm 3.5.6 - bug fix and enhancement update

Type/Severity

Bug Fix Advisory

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

Updated vdsm packages that fix several bugs and add various enhancements are now
available.

Description

VDSM is a management module that serves as a Red Hat Enterprise Virtualization
Manager agent on Red Hat Enterprise Virtualization Hypervisor or Red Hat
Enterprise Linux hosts.

Changes to the vdsm component:

  • Previously, upgrading a data center with compatibility version of 3.0 (with a

V1 master domain) when it's on maintenance to a compatibility version of 3.5
caused the SPM start to fail. The SPM start in the 3.5 host attempted to inquire
the cluster lock and since it is not supported, the SPM failed to start. With
this update, SPM start won't fail even if the cluster lock inquiring is not
supported. (BZ#1269411)

  • Previously, VDSM uses a high number of system threads, and caused high

resource usage making the system slow. With this update, a new option,
cpu_affinity, in vdsm.conf was added so users can tune the CPU affinity. The
option is disabled by default.
To enable the new option, edit the vdsm.conf file. Under [vars] section, edit
the 'cpu_affinity' option. It accepts a comma separated whitelist of CPU cores
on which VDSM is allowed to run. The default is "", meaning VDSM can be
scheduled by the operating system to run on any core. Some valid examples
include: "1", "0,1", "0,2,3".
The resource usage of VDSM dramatically improves when the cpu_affinity is
enabled. It is recommended to enable the cpu_affinity option if VDSM uses too
much CPU. It is also recommended to set the affinity to one CPU only and to
avoid cpu #0, because other system task may default to that CPU. (BZ#1265205)

  • When VDSM was ported to systemd for Red Hat Enterprise Linux 7, it stopped

generating its pid file which was required for safelease. As a result, when
safelease failed to maintain the SPM lease, VDSM didn't get terminated cleanly
and rebooted the SPM host, killing virtual machines running on the host. With
this update, VDSM passes its pid to safelease via a command line parameter. If
safelease fails to maintain the SPM lease, VDSM is terminated in a clean way
without rebooting the machine, and the SPM role is assigned to another host
without effecting virtual machines running on the SPM host. (BZ#1265177)

  • Previously, the multipath device configuration was overwritten by the iSCSI

daemon using the default timeout 120 seconds, and resulted in long delays before
VDSM attempts to try the next path. With this update, using an updated kernel,
the iSCSI daemon now uses the multipath device timeout instead of overwriting it
with a longer timeout time. There is now minimal delay during failover.
(BZ#1273421)

  • Previously, when starting a configured but non-active VDSM device, for example

if a device was manually set to down, the VDSM service executed the 'service
network start' command instead of the 'service network restart' command. If the
device was also running DHCP, the dhclient was started twice and led to VDSM
service start failure. With this update, 'service network restart' is actually
run so if DHCP was running on the device, the dhclient it not started a second
time, and the VDSM service starts as normal. (BZ#1267500)

Solution

Before applying this update, make sure all previously released errata relevant
to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/articles/11258

Affected Products

  • Red Hat Virtualization 3 for RHEL 7 x86_64
  • Red Hat Virtualization 3 for RHEL 6 x86_64

Fixes

  • BZ - 1243710 - vdsm log is flooded with JsonRpcServer and stompReactor messages
  • BZ - 1261507 - KSM sleep_millisecs bellow 10ms for systems above 16GB of RAM
  • BZ - 1263979 - Vdsm should recover ifcfg files in case they are no longer exist and recover all networks on the server
  • BZ - 1265177 - regression for EL7: spmprotect always reboot when fencing vdsm on systemd
  • BZ - 1265205 - [scale] high vdsm threads overhead
  • BZ - 1265907 - zstream clone: Extend of VG does not check if additional devices are already part of it
  • BZ - 1265965 - zstream clone: OSError: [Errno 24] Too many open files while running automation tests
  • BZ - 1267500 - vdsm fails to start if dhclient is running
  • BZ - 1269187 - [vdsm] Domain deactivation doesn't clear domain from the domains to be upgraded list
  • BZ - 1269411 - [z-stream clone 3.5.6] [vdsm] SpmStart fails after "offline" upgrade of DC with V1 master domain to 3.5
  • BZ - 1273421 - Need to add deps on kernel] vdsm iscsi failover taking too long during controller maintenance
  • BZ - 1275637 - Consume fix for "Multipath is not correctly identifying iscsi devices, and misconfiguring them"

CVEs

(none)

References

(none)

Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Virtualization 3 for RHEL 7

SRPM
x86_64
vdsm-4.16.30-1.el7ev.x86_64.rpm SHA-256: 72b2de556d713ca76e3bc0374667abe52006077e714addec7035f7fbd6e6a610
vdsm-bootstrap-4.16.30-1.el7ev.noarch.rpm SHA-256: 03e3d624a8539cdd2804c58ff6ab6bde483cb881157bb555640b189d55048aaf
vdsm-cli-4.16.30-1.el7ev.noarch.rpm SHA-256: 173a510a639a50015fed1f13a78c2a198dfc7a063faf401272fa52bb3ef20265
vdsm-debuginfo-4.16.30-1.el7ev.x86_64.rpm SHA-256: 6ede28fce064c2c4259f856ce82d7f6dac9a90eb138f431f3c2fa01c650193d3
vdsm-hook-ethtool-options-4.16.30-1.el7ev.noarch.rpm SHA-256: f6a9c4033e5d5a94b33c52bef09418b8f9c8a6cf73d66e7b1435d09479b120b6
vdsm-hook-macspoof-4.16.30-1.el7ev.noarch.rpm SHA-256: 4e03f8a7a8a8bb5e16fc5acaabd47f51940e8be938d163cac5d3db93ba6da3eb
vdsm-hook-openstacknet-4.16.30-1.el7ev.noarch.rpm SHA-256: ef547554ace90e1f37844b22cdb5b97b29c2cf91df666b190754b36e231a444b
vdsm-hook-vhostmd-4.16.30-1.el7ev.noarch.rpm SHA-256: 445c007eb4a318df6f7f36e9d7cb091b2de6cf72501fb6af210af2478a7dbd68
vdsm-jsonrpc-4.16.30-1.el7ev.noarch.rpm SHA-256: e2b1f8121924a33c121a12602a7f8ce29c7084acebc191fd8f512fa4215542c8
vdsm-python-4.16.30-1.el7ev.noarch.rpm SHA-256: a33bd64a0424c971caa5eb18a70e422d20f1016da624d0b022beacedeb8b769c
vdsm-python-zombiereaper-4.16.30-1.el7ev.noarch.rpm SHA-256: b7c42b725c339e7a0f98cda23dfff063435828d6ef036a3de881ee9c7065d3c4
vdsm-reg-4.16.30-1.el7ev.noarch.rpm SHA-256: 8ab1284f977587ff2b83fb18e2dfb4547c7d6abf03dccdcb104b1ee3455592e3
vdsm-xmlrpc-4.16.30-1.el7ev.noarch.rpm SHA-256: 3e3a241f90a4c11176aaaa6867a19cc70f031bc92e73bb212aa74065280b7197
vdsm-yajsonrpc-4.16.30-1.el7ev.noarch.rpm SHA-256: 6bc59b247f6c055a07395fe1b22a114d9d711bda7da734c3cd4011083fdb531e

Red Hat Virtualization 3 for RHEL 6

SRPM
vdsm-4.16.30-1.el6ev.src.rpm SHA-256: 93e27e58fb919c2aa887b7fe69efefc677cff65a038fa699d8ffc89ade2124f4
x86_64
vdsm-4.16.30-1.el6ev.x86_64.rpm SHA-256: f78b9afac1706d1b17b5f2ee3dfb0d5ccd37f7ebacefe133d324c4f818bcbfdd
vdsm-bootstrap-4.16.30-1.el6ev.noarch.rpm SHA-256: a54511f5e0c001924ca6f37609a3263ab25d61e88d1592c72600b8c5f3280445
vdsm-cli-4.16.30-1.el6ev.noarch.rpm SHA-256: 4fee2d260c0a11e1728c3d36f22415f496085559825d26e7040bcecdaffaa43f
vdsm-debuginfo-4.16.30-1.el6ev.x86_64.rpm SHA-256: 83c1d8e8b00c0c323430548d20d689f164df3be0aed12e9ef66387d0c70e82ed
vdsm-hook-ethtool-options-4.16.30-1.el6ev.noarch.rpm SHA-256: 44a26edb583cb6c6cdc80f59027e0827d324f5338a090d162c3a4105cd1b0afd
vdsm-hook-macspoof-4.16.30-1.el6ev.noarch.rpm SHA-256: 9908068591db63d1c6ba72b2484ff968abb949f6ba9e4bcef6047d11327fd480
vdsm-hook-openstacknet-4.16.30-1.el6ev.noarch.rpm SHA-256: 89cbe17d36c6bf7fb830e5aaeb2a6cc747435630e1962c900c71d846bd1bd424
vdsm-hook-vhostmd-4.16.30-1.el6ev.noarch.rpm SHA-256: 1aad5d879330e6b4092b48e221e594981706b688b237c35ed7a64c8aed28d77e
vdsm-jsonrpc-4.16.30-1.el6ev.noarch.rpm SHA-256: c32f828499b9ab2b71d65f3f606dfa2ad405520d7f26f4edb3541e9343a1db8b
vdsm-python-4.16.30-1.el6ev.noarch.rpm SHA-256: 0d356bed12611572f2232619f4ee71670b4b574b8cc9a88c47559942ef08d876
vdsm-python-zombiereaper-4.16.30-1.el6ev.noarch.rpm SHA-256: 782f725a749e258c499e3a65fd3de94d5ee23889bc7cf8e0c70f1ea54f39baf0
vdsm-reg-4.16.30-1.el6ev.noarch.rpm SHA-256: 55c36139cd3e01e7801ab0abdc311190f3c63f5457da63636dff6a311c01cd3b
vdsm-xmlrpc-4.16.30-1.el6ev.noarch.rpm SHA-256: 3e160938e3e157af3f26d302dcb8c2f23a6a1e2bc81259fe7c5637c716e31ec4
vdsm-yajsonrpc-4.16.30-1.el6ev.noarch.rpm SHA-256: 11fb93bd7b0ca326cb5ddbeec89de09b73cbf395dc90535075339e5b0ed0c3b5

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat LinkedIn YouTube Facebook X, formerly Twitter

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2025 Red Hat

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility