- Issued:
- 2015-12-01
- Updated:
- 2015-12-01
RHBA-2015:2530 - Bug Fix Advisory
Synopsis
vdsm 3.5.6 - bug fix and enhancement update
Type/Severity
Bug Fix Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
Updated vdsm packages that fix several bugs and add various enhancements are now
available.
Description
VDSM is a management module that serves as a Red Hat Enterprise Virtualization
Manager agent on Red Hat Enterprise Virtualization Hypervisor or Red Hat
Enterprise Linux hosts.
Changes to the vdsm component:
- Previously, upgrading a data center with compatibility version of 3.0 (with a
V1 master domain) when it's on maintenance to a compatibility version of 3.5
caused the SPM start to fail. The SPM start in the 3.5 host attempted to inquire
the cluster lock and since it is not supported, the SPM failed to start. With
this update, SPM start won't fail even if the cluster lock inquiring is not
supported. (BZ#1269411)
- Previously, VDSM uses a high number of system threads, and caused high
resource usage making the system slow. With this update, a new option,
cpu_affinity, in vdsm.conf was added so users can tune the CPU affinity. The
option is disabled by default.
To enable the new option, edit the vdsm.conf file. Under [vars] section, edit
the 'cpu_affinity' option. It accepts a comma separated whitelist of CPU cores
on which VDSM is allowed to run. The default is "", meaning VDSM can be
scheduled by the operating system to run on any core. Some valid examples
include: "1", "0,1", "0,2,3".
The resource usage of VDSM dramatically improves when the cpu_affinity is
enabled. It is recommended to enable the cpu_affinity option if VDSM uses too
much CPU. It is also recommended to set the affinity to one CPU only and to
avoid cpu #0, because other system task may default to that CPU. (BZ#1265205)
- When VDSM was ported to systemd for Red Hat Enterprise Linux 7, it stopped
generating its pid file which was required for safelease. As a result, when
safelease failed to maintain the SPM lease, VDSM didn't get terminated cleanly
and rebooted the SPM host, killing virtual machines running on the host. With
this update, VDSM passes its pid to safelease via a command line parameter. If
safelease fails to maintain the SPM lease, VDSM is terminated in a clean way
without rebooting the machine, and the SPM role is assigned to another host
without effecting virtual machines running on the SPM host. (BZ#1265177)
- Previously, the multipath device configuration was overwritten by the iSCSI
daemon using the default timeout 120 seconds, and resulted in long delays before
VDSM attempts to try the next path. With this update, using an updated kernel,
the iSCSI daemon now uses the multipath device timeout instead of overwriting it
with a longer timeout time. There is now minimal delay during failover.
(BZ#1273421)
- Previously, when starting a configured but non-active VDSM device, for example
if a device was manually set to down, the VDSM service executed the 'service
network start' command instead of the 'service network restart' command. If the
device was also running DHCP, the dhclient was started twice and led to VDSM
service start failure. With this update, 'service network restart' is actually
run so if DHCP was running on the device, the dhclient it not started a second
time, and the VDSM service starts as normal. (BZ#1267500)
Solution
Before applying this update, make sure all previously released errata relevant
to your system have been applied.
This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/articles/11258
Affected Products
- Red Hat Virtualization 3 for RHEL 7 x86_64
- Red Hat Virtualization 3 for RHEL 6 x86_64
Fixes
- BZ - 1243710 - vdsm log is flooded with JsonRpcServer and stompReactor messages
- BZ - 1261507 - KSM sleep_millisecs bellow 10ms for systems above 16GB of RAM
- BZ - 1263979 - Vdsm should recover ifcfg files in case they are no longer exist and recover all networks on the server
- BZ - 1265177 - regression for EL7: spmprotect always reboot when fencing vdsm on systemd
- BZ - 1265205 - [scale] high vdsm threads overhead
- BZ - 1265907 - zstream clone: Extend of VG does not check if additional devices are already part of it
- BZ - 1265965 - zstream clone: OSError: [Errno 24] Too many open files while running automation tests
- BZ - 1267500 - vdsm fails to start if dhclient is running
- BZ - 1269187 - [vdsm] Domain deactivation doesn't clear domain from the domains to be upgraded list
- BZ - 1269411 - [z-stream clone 3.5.6] [vdsm] SpmStart fails after "offline" upgrade of DC with V1 master domain to 3.5
- BZ - 1273421 - Need to add deps on kernel] vdsm iscsi failover taking too long during controller maintenance
- BZ - 1275637 - Consume fix for "Multipath is not correctly identifying iscsi devices, and misconfiguring them"
CVEs
(none)
References
(none)
Red Hat Virtualization 3 for RHEL 7
SRPM | |
---|---|
x86_64 | |
vdsm-4.16.30-1.el7ev.x86_64.rpm | SHA-256: 72b2de556d713ca76e3bc0374667abe52006077e714addec7035f7fbd6e6a610 |
vdsm-bootstrap-4.16.30-1.el7ev.noarch.rpm | SHA-256: 03e3d624a8539cdd2804c58ff6ab6bde483cb881157bb555640b189d55048aaf |
vdsm-cli-4.16.30-1.el7ev.noarch.rpm | SHA-256: 173a510a639a50015fed1f13a78c2a198dfc7a063faf401272fa52bb3ef20265 |
vdsm-debuginfo-4.16.30-1.el7ev.x86_64.rpm | SHA-256: 6ede28fce064c2c4259f856ce82d7f6dac9a90eb138f431f3c2fa01c650193d3 |
vdsm-hook-ethtool-options-4.16.30-1.el7ev.noarch.rpm | SHA-256: f6a9c4033e5d5a94b33c52bef09418b8f9c8a6cf73d66e7b1435d09479b120b6 |
vdsm-hook-macspoof-4.16.30-1.el7ev.noarch.rpm | SHA-256: 4e03f8a7a8a8bb5e16fc5acaabd47f51940e8be938d163cac5d3db93ba6da3eb |
vdsm-hook-openstacknet-4.16.30-1.el7ev.noarch.rpm | SHA-256: ef547554ace90e1f37844b22cdb5b97b29c2cf91df666b190754b36e231a444b |
vdsm-hook-vhostmd-4.16.30-1.el7ev.noarch.rpm | SHA-256: 445c007eb4a318df6f7f36e9d7cb091b2de6cf72501fb6af210af2478a7dbd68 |
vdsm-jsonrpc-4.16.30-1.el7ev.noarch.rpm | SHA-256: e2b1f8121924a33c121a12602a7f8ce29c7084acebc191fd8f512fa4215542c8 |
vdsm-python-4.16.30-1.el7ev.noarch.rpm | SHA-256: a33bd64a0424c971caa5eb18a70e422d20f1016da624d0b022beacedeb8b769c |
vdsm-python-zombiereaper-4.16.30-1.el7ev.noarch.rpm | SHA-256: b7c42b725c339e7a0f98cda23dfff063435828d6ef036a3de881ee9c7065d3c4 |
vdsm-reg-4.16.30-1.el7ev.noarch.rpm | SHA-256: 8ab1284f977587ff2b83fb18e2dfb4547c7d6abf03dccdcb104b1ee3455592e3 |
vdsm-xmlrpc-4.16.30-1.el7ev.noarch.rpm | SHA-256: 3e3a241f90a4c11176aaaa6867a19cc70f031bc92e73bb212aa74065280b7197 |
vdsm-yajsonrpc-4.16.30-1.el7ev.noarch.rpm | SHA-256: 6bc59b247f6c055a07395fe1b22a114d9d711bda7da734c3cd4011083fdb531e |
Red Hat Virtualization 3 for RHEL 6
SRPM | |
---|---|
vdsm-4.16.30-1.el6ev.src.rpm | SHA-256: 93e27e58fb919c2aa887b7fe69efefc677cff65a038fa699d8ffc89ade2124f4 |
x86_64 | |
vdsm-4.16.30-1.el6ev.x86_64.rpm | SHA-256: f78b9afac1706d1b17b5f2ee3dfb0d5ccd37f7ebacefe133d324c4f818bcbfdd |
vdsm-bootstrap-4.16.30-1.el6ev.noarch.rpm | SHA-256: a54511f5e0c001924ca6f37609a3263ab25d61e88d1592c72600b8c5f3280445 |
vdsm-cli-4.16.30-1.el6ev.noarch.rpm | SHA-256: 4fee2d260c0a11e1728c3d36f22415f496085559825d26e7040bcecdaffaa43f |
vdsm-debuginfo-4.16.30-1.el6ev.x86_64.rpm | SHA-256: 83c1d8e8b00c0c323430548d20d689f164df3be0aed12e9ef66387d0c70e82ed |
vdsm-hook-ethtool-options-4.16.30-1.el6ev.noarch.rpm | SHA-256: 44a26edb583cb6c6cdc80f59027e0827d324f5338a090d162c3a4105cd1b0afd |
vdsm-hook-macspoof-4.16.30-1.el6ev.noarch.rpm | SHA-256: 9908068591db63d1c6ba72b2484ff968abb949f6ba9e4bcef6047d11327fd480 |
vdsm-hook-openstacknet-4.16.30-1.el6ev.noarch.rpm | SHA-256: 89cbe17d36c6bf7fb830e5aaeb2a6cc747435630e1962c900c71d846bd1bd424 |
vdsm-hook-vhostmd-4.16.30-1.el6ev.noarch.rpm | SHA-256: 1aad5d879330e6b4092b48e221e594981706b688b237c35ed7a64c8aed28d77e |
vdsm-jsonrpc-4.16.30-1.el6ev.noarch.rpm | SHA-256: c32f828499b9ab2b71d65f3f606dfa2ad405520d7f26f4edb3541e9343a1db8b |
vdsm-python-4.16.30-1.el6ev.noarch.rpm | SHA-256: 0d356bed12611572f2232619f4ee71670b4b574b8cc9a88c47559942ef08d876 |
vdsm-python-zombiereaper-4.16.30-1.el6ev.noarch.rpm | SHA-256: 782f725a749e258c499e3a65fd3de94d5ee23889bc7cf8e0c70f1ea54f39baf0 |
vdsm-reg-4.16.30-1.el6ev.noarch.rpm | SHA-256: 55c36139cd3e01e7801ab0abdc311190f3c63f5457da63636dff6a311c01cd3b |
vdsm-xmlrpc-4.16.30-1.el6ev.noarch.rpm | SHA-256: 3e160938e3e157af3f26d302dcb8c2f23a6a1e2bc81259fe7c5637c716e31ec4 |
vdsm-yajsonrpc-4.16.30-1.el6ev.noarch.rpm | SHA-256: 11fb93bd7b0ca326cb5ddbeec89de09b73cbf395dc90535075339e5b0ed0c3b5 |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.