cpi-5.1RP1P1

 Basic information
Release type: P-patch
Release date: 2010-12-28
OS update support: None
Technote: None
Documentation: None
Popularity: 4117 viewed    downloaded
Download size: 2.56 KB
Checksum: 3279538739

 Applies to one or more of the following products:
Cluster Server 5.1 On Solaris 10 SPARC
Cluster Server 5.1 On Solaris 10 X64
Cluster Server 5.1 On Solaris 9 SPARC
Dynamic Multi-Pathing 5.1 On Solaris 10 SPARC
Dynamic Multi-Pathing 5.1 On Solaris 10 X64
Dynamic Multi-Pathing 5.1 On Solaris 9 SPARC
Storage Foundation 5.1 On Solaris 10 SPARC
Storage Foundation 5.1 On Solaris 10 X64
Storage Foundation 5.1 On Solaris 9 SPARC
Storage Foundation Basic 5.1 On Solaris 10 SPARC
Storage Foundation Basic 5.1 On Solaris 10 X64
Storage Foundation Basic 5.1 On Solaris 9 SPARC
Storage Foundation Cluster File System 5.1 On Solaris 10 SPARC
Storage Foundation Cluster File System 5.1 On Solaris 10 X64
Storage Foundation Cluster File System 5.1 On Solaris 9 SPARC
Storage Foundation for Oracle RAC 5.1 On Solaris 10 SPARC
Storage Foundation for Oracle RAC 5.1 On Solaris 10 X64
Storage Foundation for Oracle RAC 5.1 On Solaris 9 SPARC
Storage Foundation HA 5.1 On Solaris 10 SPARC
Storage Foundation HA 5.1 On Solaris 10 X64
Storage Foundation HA 5.1 On Solaris 9 SPARC

 Obsolete patches, incompatibilities, superseded patches, or other requirements:
None.

 Fixes the following incidents:
2223205

 Patch ID:
None.

Readme file
Titan Case: 413-280-366
Etrack: 2223205	
Release: 5.1RP1, 5.1RP2
Platform: Solaris Sparc, Solaris x64

Issues Details:
During SFHA product upgrade from 5.1 to 5.1 RPs on Solaris, if Gunzip is not available on the system, installer will fail to install product patches, and erroneously report that the patches were successfully installed.

Solution:
Symantec is providing a new Perl module to fix these issues.

Workaround Steps:
      1.  Copy the Perl module verify_command.pl to /tmp
      2.  Run the rolling patch installation script with the new module. For example:
           ./installrp -require /tmp/verify_command.pl