-------------------------------------------------------------------------- READ THIS FIRST --------------- VERITAS File System Provider and Client Extension 5.0 Maintenance Pack 1 HF1 for Linux. This patch can only be installed on top of Veritas File System/ Veritas Storage Foundation/ Veritas Storage Foundation Cluster File System 5.0 Maintenance Pack 1 . Etrack Incidents: 1221193, 1234406, 1249216, 1256572 Incident Addressed: (1256572) The VEA FSprovider's UUID processing on Linux bypasses DMP and causes a trespass Description: Linux supports file systems with UUID or LABEL in /etc/fstab. With such a feature it is not necessary to use mount point to identify the file systems in /etc/fstab. Linux will translate the UUID or the LABEL in the /etc/fstab to determine the correct mount point since UUID and LABEL are stored persistently into the device underlying the file system. The VEA File system provider, VRTSfspro (before this fix) used to support this feature to determine the file systems in the /etc/fstab. However for it to be able to do so, it has to access the device directly to extract the UUID and LABEL information. Such access being done on the device directly will by pass if DMP is in place and is being used. However DMP may have active-passive setup and FS provider can not distinguish between active-passive paths and may try to open passive paths. In enterprise environments such DMP bypassing is considered a trespass and a serious security violation. With this fix, the UUID/LABEL processing in FS provider is suppressed and it will no longer support them. Packages Included in this Rolling Patch : (SUSE 9) VRTSfspro-5.0.10.01-MP1HF1_SLES9.i586.rpm VRTSfsweb-5.0.10.01-MP1HF1_SLES9.i586.rpm (RHEL 4) VRTSfspro-5.0.10.01-MP1HF1_RHEL4.i686.rpm VRTSfsweb-5.0.10.01-MP1HF1_RHEL4.i686.rpm Use the following commands to upgrade to 5.0MP1HF1 : # rpm -U VRTSfspro-5.0.10.01-MP1HF1_SLES9.i586.rpm # rpm -U VRTSfsweb-5.0.10.01-MP1HF1_SLES9.i586.rpm Specify the appropriate RPMs for your systems. -------------------------------------------------------------------------