- Issued:
- 2018-01-24
- Updated:
- 2018-01-24
RHEA-2018:0136 - Product Enhancement Advisory
Synopsis
VDSM bug fix and enhancement update 4.1.9
Type/Severity
Product Enhancement Advisory
Red Hat Lightspeed patch analysis
Identify and remediate systems affected by this advisory.
Topic
Updated vdsm packages that fix several bugs and add various enhancements are now available.
Description
VDSM is a management module that serves as a Red Hat Virtualization Manager agent on Red Hat Virtualization Host or Red Hat Enterprise Linux hosts.
Changes to the vdsm component:
- Currently, LVM scans and activates raw volumes during boot. Then it scans and activates guest logical volumes created inside a guest on top of the raw volumes. It also scans and activates guest logical volumes inside LUNs which are not part of a Red Hat Virtualization storage domain. As a result, there may be thousands of active logical volumes on a host, which should not be active. This leads to very slow boot time and may lead to data corruption later if a logical volume active on the host was extended on another host.
To avoid this, you can configure an LVM filter using the "vdsm-tool config-lvm-filter" command. The LVM filter prevents scanning and activation of logical volumes not required by the host, which improves boot time. (BZ#1524500)
- Previously, VDSM was accessing NFS storage directly when performing lease operations. A bug in Python could cause the entire VDSM process to hang if the NFS storage was not responsive. VDSM could become unkillable (D state) for many hours, until the host was rebooted. Now, VDSM uses an external process to access NFS storage, so it can continue to function correctly even if the NFS storage becomes non-responsive, and can be restarted if needed. (BZ#1527827)
Solution
Before applying this update, make sure all previously released errata
relevant to your system have been applied.
For details on how to apply this update, refer to:
Affected Products
- Red Hat Virtualization 4 for RHEL 7 x86_64
- Red Hat Virtualization for IBM Power LE 4 for RHEL 7 ppc64le
Fixes
- BZ - 1524500 - [downstream clone - 4.1.9] Guest LVs created on raw volumes are auto activated on the hypervisor with FC storage (lvm filter?)
- BZ - 1527827 - [downstream clone - 4.1.9] Entire vdsm process hang during when formatting xlease volume on NFS storage domain
- BZ - 1530630 - [downstream clone - 4.1.9] vdsm-tool remove-config does not revert changes
CVEs
(none)
References
(none)
Red Hat Virtualization 4 for RHEL 7
| SRPM | |
|---|---|
| vdsm-4.19.45-1.el7ev.src.rpm | SHA-256: 4c252f40bb75d543b77cdb730c31755313464f5afb0ca3110b4de86c35ddbc10 |
| x86_64 | |
| vdsm-4.19.45-1.el7ev.x86_64.rpm | SHA-256: 4ff29119a0bddaf3b7fb80a0004e1354b2af3bffecc4b2b70b20cc28732ed887 |
| vdsm-api-4.19.45-1.el7ev.noarch.rpm | SHA-256: 0270352e4af77f6b9f02e20912a0c16eec5e244a9aff6b06e9d3d0222dbb206d |
| vdsm-cli-4.19.45-1.el7ev.noarch.rpm | SHA-256: 2a6474d43af4660b799a79c20e1e1aa412956b020e675e690d92ffe0e90b70ed |
| vdsm-client-4.19.45-1.el7ev.noarch.rpm | SHA-256: ef9ee83fac0206613a1c0c5d79f11ee7c4858730e5e23bcf4a5a1306bf7ff295 |
| vdsm-gluster-4.19.45-1.el7ev.noarch.rpm | SHA-256: 503560757bc99bb95c896629743c7db5362445f4d65f0b0a9fb238043cf7db9e |
| vdsm-hook-checkips-4.19.45-1.el7ev.x86_64.rpm | SHA-256: 93bf2d4dee477c6b728aa8f9a87217187e54f54beab7886f0e1dea0b0fbbdc89 |
| vdsm-hook-ethtool-options-4.19.45-1.el7ev.noarch.rpm | SHA-256: 22cdb15067d48d90dacb863cfa6d9be079a4738e1515536575faab157d546165 |
| vdsm-hook-extra-ipv4-addrs-4.19.45-1.el7ev.x86_64.rpm | SHA-256: 0cd2981e4e31d965b77d54e65af9a6854572a05a515a6311efec0e817dcd2ce8 |
| vdsm-hook-fcoe-4.19.45-1.el7ev.noarch.rpm | SHA-256: 5f4955633e02f47c3e881aeff91b8e70620d63f3ec8161ed2b53f27240030b1b |
| vdsm-hook-localdisk-4.19.45-1.el7ev.noarch.rpm | SHA-256: 1a309056c4ba7c86ad824c71389b24ee3e06061acc8a19eb4a5b3bad7e2e12b7 |
| vdsm-hook-macspoof-4.19.45-1.el7ev.noarch.rpm | SHA-256: 4945b087b65b999a5b11ece89e9ec93149efc236b611f137253d1afb5ac1795e |
| vdsm-hook-nestedvt-4.19.45-1.el7ev.noarch.rpm | SHA-256: 32450079f34967fa1921c112666598ce34dda73c7684ff446ffb1406d9b83129 |
| vdsm-hook-openstacknet-4.19.45-1.el7ev.noarch.rpm | SHA-256: 617d8ac1f468403b62ddfb249a459ffa233e5967d849d78f5ccfb4693d4e10db |
| vdsm-hook-vfio-mdev-4.19.45-1.el7ev.noarch.rpm | SHA-256: b9938f9fc40ce5e02a883871e2b49e80b239c49a78868eecada6d0a759db6768 |
| vdsm-hook-vhostmd-4.19.45-1.el7ev.noarch.rpm | SHA-256: 584e6eef327a6b042005f3b176dfbeb347eb95a8f01b05fbc8bf2b8309717295 |
| vdsm-hook-vmfex-dev-4.19.45-1.el7ev.noarch.rpm | SHA-256: 0bb952497886843041e4d935636a26626cd9608cb35382f544bb84764f7a83e7 |
| vdsm-jsonrpc-4.19.45-1.el7ev.noarch.rpm | SHA-256: de99f34ed47d8616edb680324aa0709325aa67c20e0012f49fb06ab4bce83c43 |
| vdsm-python-4.19.45-1.el7ev.noarch.rpm | SHA-256: c7639c34e9f4e36760c20001a13957cf9fd2116bcb0a1b84f8be70186b0ce22c |
| vdsm-xmlrpc-4.19.45-1.el7ev.noarch.rpm | SHA-256: ebe3d866d48a5cefecdb04538fd78d2e49f8ff975b1dce84fc6af04d0942cb21 |
| vdsm-yajsonrpc-4.19.45-1.el7ev.noarch.rpm | SHA-256: b40795c8def6f3c668d6922605d00b915e30153ed6732b610bf506bdd57ffcec |
Red Hat Virtualization for IBM Power LE 4 for RHEL 7
| SRPM | |
|---|---|
| vdsm-4.19.45-1.el7ev.src.rpm | SHA-256: 4c252f40bb75d543b77cdb730c31755313464f5afb0ca3110b4de86c35ddbc10 |
| ppc64le | |
| vdsm-4.19.45-1.el7ev.ppc64le.rpm | SHA-256: e347fa6932c9caa06cb48eeac0d81870283e12de461171f44e1d7d6747e2354d |
| vdsm-api-4.19.45-1.el7ev.noarch.rpm | SHA-256: 0270352e4af77f6b9f02e20912a0c16eec5e244a9aff6b06e9d3d0222dbb206d |
| vdsm-cli-4.19.45-1.el7ev.noarch.rpm | SHA-256: 2a6474d43af4660b799a79c20e1e1aa412956b020e675e690d92ffe0e90b70ed |
| vdsm-client-4.19.45-1.el7ev.noarch.rpm | SHA-256: ef9ee83fac0206613a1c0c5d79f11ee7c4858730e5e23bcf4a5a1306bf7ff295 |
| vdsm-hook-checkips-4.19.45-1.el7ev.ppc64le.rpm | SHA-256: 4717c918922b901dd73762e81b648cc0f87fcba7ad9b09be3e0bf83910050ff3 |
| vdsm-hook-ethtool-options-4.19.45-1.el7ev.noarch.rpm | SHA-256: 22cdb15067d48d90dacb863cfa6d9be079a4738e1515536575faab157d546165 |
| vdsm-hook-extra-ipv4-addrs-4.19.45-1.el7ev.ppc64le.rpm | SHA-256: 575989529f665191949e5edb4bb96d96fa561a9bf50c8faed283da73c07d7be9 |
| vdsm-hook-fcoe-4.19.45-1.el7ev.noarch.rpm | SHA-256: 5f4955633e02f47c3e881aeff91b8e70620d63f3ec8161ed2b53f27240030b1b |
| vdsm-hook-localdisk-4.19.45-1.el7ev.noarch.rpm | SHA-256: 1a309056c4ba7c86ad824c71389b24ee3e06061acc8a19eb4a5b3bad7e2e12b7 |
| vdsm-hook-macspoof-4.19.45-1.el7ev.noarch.rpm | SHA-256: 4945b087b65b999a5b11ece89e9ec93149efc236b611f137253d1afb5ac1795e |
| vdsm-hook-nestedvt-4.19.45-1.el7ev.noarch.rpm | SHA-256: 32450079f34967fa1921c112666598ce34dda73c7684ff446ffb1406d9b83129 |
| vdsm-hook-openstacknet-4.19.45-1.el7ev.noarch.rpm | SHA-256: 617d8ac1f468403b62ddfb249a459ffa233e5967d849d78f5ccfb4693d4e10db |
| vdsm-hook-vfio-mdev-4.19.45-1.el7ev.noarch.rpm | SHA-256: b9938f9fc40ce5e02a883871e2b49e80b239c49a78868eecada6d0a759db6768 |
| vdsm-hook-vhostmd-4.19.45-1.el7ev.noarch.rpm | SHA-256: 584e6eef327a6b042005f3b176dfbeb347eb95a8f01b05fbc8bf2b8309717295 |
| vdsm-hook-vmfex-dev-4.19.45-1.el7ev.noarch.rpm | SHA-256: 0bb952497886843041e4d935636a26626cd9608cb35382f544bb84764f7a83e7 |
| vdsm-jsonrpc-4.19.45-1.el7ev.noarch.rpm | SHA-256: de99f34ed47d8616edb680324aa0709325aa67c20e0012f49fb06ab4bce83c43 |
| vdsm-python-4.19.45-1.el7ev.noarch.rpm | SHA-256: c7639c34e9f4e36760c20001a13957cf9fd2116bcb0a1b84f8be70186b0ce22c |
| vdsm-xmlrpc-4.19.45-1.el7ev.noarch.rpm | SHA-256: ebe3d866d48a5cefecdb04538fd78d2e49f8ff975b1dce84fc6af04d0942cb21 |
| vdsm-yajsonrpc-4.19.45-1.el7ev.noarch.rpm | SHA-256: b40795c8def6f3c668d6922605d00b915e30153ed6732b610bf506bdd57ffcec |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.