amf-aix-6.0.5.100

 Basic information
Release type: Patch
Release date: 2014-05-05
OS update support: None
Technote: None
Documentation: None
Popularity: 1122 viewed    downloaded
Download size: 3.6 MB
Checksum: 2209998953

 Applies to one or more of the following products:
Cluster Server 6.0.1 On AIX 6.1
Cluster Server 6.0.1 On AIX 7.1
Storage Foundation Cluster File System 6.0.1 On AIX 6.1
Storage Foundation Cluster File System 6.0.1 On AIX 7.1
Storage Foundation for Oracle RAC 6.0.1 On AIX 6.1
Storage Foundation for Oracle RAC 6.0.1 On AIX 7.1
Storage Foundation HA 6.0.1 On AIX 6.1
Storage Foundation HA 6.0.1 On AIX 7.1

 Obsolete patches, incompatibilities, superseded patches, or other requirements:

This patch requires: Release date
sfha-aix-6.0.5 2014-04-15

 Fixes the following incidents:
3456404

 Patch ID:
VRTSamf-06.00.0500.0100

Readme file
                          * * * READ ME * * *
      * * * Veritas Asynchronous Monitoring Framework 6.0.5 * * *
                      * * * Patch 6.0.5.100 * * *
                         Patch Date: 2014-04-28


This document provides the following information:

   * PATCH NAME
   * OPERATING SYSTEMS SUPPORTED BY THE PATCH
   * PACKAGES AFFECTED BY THE PATCH
   * BASE PRODUCT VERSIONS FOR THE PATCH
   * SUMMARY OF INCIDENTS FIXED BY THE PATCH
   * DETAILS OF INCIDENTS FIXED BY THE PATCH
   * INSTALLATION PRE-REQUISITES
   * INSTALLING THE PATCH
   * REMOVING THE PATCH


PATCH NAME
----------
Veritas Asynchronous Monitoring Framework 6.0.5 Patch 6.0.5.100


OPERATING SYSTEMS SUPPORTED BY THE PATCH
----------------------------------------
AIX 6.1
AIX 7.1


PACKAGES AFFECTED BY THE PATCH
------------------------------
VRTSamf


BASE PRODUCT VERSIONS FOR THE PATCH
-----------------------------------
   * Veritas Cluster Server 6.0.1
   * Veritas Storage Foundation Cluster File System HA 6.0.1
   * Veritas Storage Foundation for Oracle RAC 6.0.1
   * Veritas Storage Foundation HA 6.0.1


SUMMARY OF INCIDENTS FIXED BY THE PATCH
---------------------------------------
Patch ID: VRTSamf-6.0.500.100
* 3456404 (3456400) If a nested VxFS mount point is registered with AMF, un-mount
for that mount-point or its parent directory fail.


DETAILS OF INCIDENTS FIXED BY THE PATCH
---------------------------------------
This patch fixes the following Symantec incidents:

Patch ID: VRTSamf-6.0.500.100

* 3456404 (Tracking ID: 3456400)

SYMPTOM:
If a nested VxFS mount point is registered with AMF, un-mount for that
mount-point or its parent directory fail.

DESCRIPTION:
When agent registers for mount online monitoring of a mount point
with AMF, due to a bug in AMF, a reference on the mount point is left unreleased.
Due to this unmounting parent directory fails.

RESOLUTION:
Symantec has modified the AMF driver to fix this issue.



INSTALLING THE PATCH
--------------------
Run the Installer script to automatically install the patch:
-----------------------------------------------------------
To install the patch perform the following steps on at least one node in the cluster:
1. Copy the hot-fix amf-aix-6.0.5.100-patches.tar.gz to /tmp
2. Untar amf-aix-6.0.5.100-patches.tar.gz to /tmp/hf
    # mkdir /tmp/hf
    # cd /tmp/hf
    # gunzip /tmp/amf-aix-6.0.5.100-patches.tar.gz
    # tar xf /tmp/amf-aix-6.0.5.100-patches.tar
3. Install the hotfix
    # pwd /tmp/hf
    # ./installAMF605P1 [<host1> <host2>...]

Install the patch manually:
--------------------------
1) Unconfigure AMF
#/opt/VRTSamf/bin/amfconfig -Uof
  This will disable IMF functionality for all agents.
2) Disable AMF
#/etc/init.d/amf.rc stop
3) Apply patch
#installp -av -d <patch location>      VRTSamf
4) Verify whether the patch has been applied successfully.
#lslpp -l VRTSamf
5) Enable AMF
#/etc/init.d/amf.rc start


REMOVING THE PATCH
------------------
1) Unconfigure AMF
#/opt/VRTSamf/bin/amfconfig -Uof
  This will disable IMF functionality for all agents.
2) Disable AMF
#/etc/init.d/amf.rc stop
3) Remove/reject the patch
# installp -r  VRTSamf 6.0.500.100
4) Enable AMF
#/etc/init.d/amf.rc start


SPECIAL INSTRUCTIONS
--------------------
If the node has already hit this issue, unmount all the nested mount points(registered with amf) forcefully before applying the patch.


OTHERS
------
NONE