vcscvm-rhel6_x86_64-Patch-6.2.1.100
Obsolete
The latest patch(es) : sfha-rhel6_x86_64-Patch-6.2.1.300 

 Basic information
Release type: Patch
Release date: 2015-09-15
OS update support: None
Technote: None
Documentation: None
Popularity: 1076 viewed    downloaded
Download size: 1.54 MB
Checksum: 1423074267

 Applies to one or more of the following products:
Storage Foundation Cluster File System 6.2 On RHEL6 x86-64
Storage Foundation for Oracle RAC 6.2 On RHEL6 x86-64
Storage Foundation for Sybase ASE CE 6.2 On RHEL6 x86-64

 Obsolete patches, incompatibilities, superseded patches, or other requirements:

This patch is obsolete. It is superseded by: Release date
sfha-rhel6_x86_64-Patch-6.2.1.200 (obsolete) 2017-01-10

This patch requires: Release date
sfha-rhel6_x86_64-MR-6.2.1 2015-04-24

 Fixes the following incidents:
3661856, 3717930, 3745321, 3746594, 3759910, 3760226, 3762371, 3762380

 Patch ID:
VRTScavf-6.2.1.100-RHEL6

Readme file
                          * * * READ ME * * *
* * * Cluster Server Agent Extension for SFCFS Distribution 6.2.1 * * *
                         * * * Patch 100 * * *
                         Patch Date: 2015-08-11


This document provides the following information:

   * PATCH NAME
   * OPERATING SYSTEMS SUPPORTED BY THE PATCH
   * PACKAGES AFFECTED BY THE PATCH
   * BASE PRODUCT VERSIONS FOR THE PATCH
   * SUMMARY OF INCIDENTS FIXED BY THE PATCH
   * DETAILS OF INCIDENTS FIXED BY THE PATCH
   * INSTALLATION PRE-REQUISITES
   * INSTALLING THE PATCH
   * REMOVING THE PATCH


PATCH NAME
----------
Cluster Server Agent Extension for SFCFS Distribution 6.2.1 Patch 100


OPERATING SYSTEMS SUPPORTED BY THE PATCH
----------------------------------------
RHEL6 x86-64


PACKAGES AFFECTED BY THE PATCH
------------------------------
VRTScavf


BASE PRODUCT VERSIONS FOR THE PATCH
-----------------------------------
   * Symantec Storage Foundation Cluster File System HA 6.2
   * Symantec Storage Foundation for Oracle RAC 6.2


SUMMARY OF INCIDENTS FIXED BY THE PATCH
---------------------------------------
Patch ID: 6.2.1.100
* 3759910 (3765928) "cfsshare config -p all" doesn't populating smb.conf(samba
configuration file) properly for some global variables.
* 3760226 (3765921) On RHEL7 onwards, pluggable Authentication Modules(PAM)
related error messages for Samba daemon may be observed in system logs after
adding CIFS(common internet file system) share
Patch ID: 6.2.1.000
* 3661856 (3656155) Import of VxVM diskgroup triggered from CVMVolDg agent fails.
* 3717930 (3757778) After executing the hastop -local command, the vxconfigd(1M) daemon is not accessible.
* 3745321 (3760033) cfsshare command may report VCS error messages.
* 3746594 (3767771) CVMVOLDG agent does not deport shared disk groups when these
disks go into the disable state.
* 3762371 (3737329) Added support for RHEL7.1
* 3762380 (3697141) Added support for Sles12


DETAILS OF INCIDENTS FIXED BY THE PATCH
---------------------------------------
This patch fixes the following Symantec incidents:

Patch ID: 6.2.1.100

* 3759910 (Tracking ID: 3765928)

SYMPTOM:
"cfsshare config -p all" doesn't populating smb.conf(samba configuration
file) properly for some global variables.

DESCRIPTION:
"cfsshare config -p all" doesn't populating smb.conf properly for
some global variables. Attributes "encryptpasswords" and "smbpasswd file" should
have space in the name.

RESOLUTION:
Code is modified so that correct attribute names are present in samba
configuration file.

* 3760226 (Tracking ID: 3765921)

SYMPTOM:
On RHEL7 onwards, pluggable Authentication Modules(PAM) related error
messages for Samba daemon may be observed in system logs after adding CIFS share
and the CIFS share is may not be accessible from windows client.

DESCRIPTION:
There is a file /etc/pam.d/samba which is not available by default
on RHEL 7 onwards and also "obey pam restrictions" attribute from Samba
configuration file (smb.conf) is set to "yes", where default is "no". This
parameter will control whether or not Samba should obey PAM's account and
session management directives. The default behavior is to use PAM for clear 
text authentication only and to ignore any account or session management. Samba
always ignores PAM for authentication in the case of "encrypt passwords = yes".
If we set "obey pam restrictions" attribute to "no", then there are no PAM
related error messages and also the CIFS share is accessible from windows 
clients.

RESOLUTION:
Set obey pam restrictions = no in
/opt/VRTSvcs/bin/ApplicationNone/smb.conf before doing cfsshare config and
adding share.

Patch ID: 6.2.1.000

* 3661856 (Tracking ID: 3656155)

SYMPTOM:
Import of VxVM diskgroup triggered from CVMVolDg agent fails with following error message.
VxVM vxdg ERROR V-5-1-10978 Disk group <dg_name>: import failed:
SCSI3-PR is disabled. Enable it to allow operation

DESCRIPTION:
CVMVolDg import script does not handle non-scsi3 based fencing.
It just checks whether fencing is enabled, and it then tries to import the disk group with SCSI based fencing.
Hence import fails for the non-SCSI based fencing.

RESOLUTION:
CVMVolDg script now checks the return value of 'vxdctl scsi3pr' in addition to 'usefence' attribute.

* 3717930 (Tracking ID: 3757778)

SYMPTOM:
After executing the hastop -local command, the vxconfigd(1M) daemon is not accessible.

DESCRIPTION:
If any process is constantly performing I/O on a mount point and the hastop -local command is executed on that system, then the system calls cfsmount or offline script to umount all the mounted resources. As I/O is performed on the mounted file system, normal umount actions fail and then the script tries to kill the process running on the mounted file system with fuser -km. But the argument passed to the fuser command is device name on which FS is mounted. Hence, fuser kills the vxconfigd(1M) daemon.

RESOLUTION:
The code is modified such that while executing fuser -km, provide mount point, instead of the mount device name to properly kill the processes running on the mounted file system.

* 3745321 (Tracking ID: 3760033)

SYMPTOM:
cfsshare command may report VCS error messages.

DESCRIPTION:
In case of Checkpoints, the volume name is of format 
volume_name:checkpoint_name which causes internal IO testing on that
volume  to fail due to semicolon(':') in between.Hence the cluster volume 
manager(CVM) volume disk group corresponding to the volume goes in FAULTED 
state and all the  mount points will be automatically unmounted.Due to this, 
VCS Error messages are reported and also faulting the depending cfsmount 
resources are deleted automatically.The state is same even after the manual 
cfsmount.

RESOLUTION:
Added a check which will add skip adding volume to CVMVolumeIoTest 
atrribute for the cvmvoldg group in case of checkpoints.

* 3746594 (Tracking ID: 3767771)

SYMPTOM:
CVMVOLDG agent does not deport shared disk groups when these disks go
into the disable state.

DESCRIPTION:
When a shared disk group is disabled due to storage failures, the
CVMVOLDG agent does not deport these  disks  automatically. When storage comes
back, the CVMVOLDG agent does not import the shared disk group, either. Thus,
the disk groups must be deported or imported  manually.

RESOLUTION:
The code is modified to handle the scenario where  the shared disk group gets
into the disabled state, the CVMVOLDG agent deports the disabled shared disk
group automatically; whenever storage comes back, manual clear and online
corresponding CVMVOLDG resources, which automatically imports the disk group.

* 3762371 (Tracking ID: 3737329)

SYMPTOM:
Added support for RHEL7.1

DESCRIPTION:
Added support for RHEL7.1

RESOLUTION:
Added support for RHEL7.1

* 3762380 (Tracking ID: 3697141)

SYMPTOM:
Added support for Sles12

DESCRIPTION:
Added support for Sles12

RESOLUTION:
Added support for Sles12



INSTALLING THE PATCH
--------------------
Run the Installer script to automatically install the patch:
-----------------------------------------------------------
To install the patch perform the following steps on at least one node in the cluster:
1. Copy the patch cavf-rhel6_x86_64-Patch-6.2.1.100.tar.gz to /tmp
2. Untar cavf-rhel6_x86_64-Patch-6.2.1.100.tar.gz to /tmp/hf
    # mkdir /tmp/hf
    # cd /tmp/hf
    # gunzip /tmp/cavf-rhel6_x86_64-Patch-6.2.1.100.tar.gz
    # tar xf /tmp/cavf-rhel6_x86_64-Patch-6.2.1.100.tar
3. Install the hotfix
    # pwd /tmp/hf
    # ./installVRTScavf621P1 [<host1> <host2>...]

Install the patch manually:
--------------------------
Please refer to  Install guide for install instructions


REMOVING THE PATCH
------------------
Please refer to  Install guide for uninstall instructions


SPECIAL INSTRUCTIONS
--------------------
NONE


OTHERS
------
NONE