sfw-win_x64-CP2_SFW_601
Obsolete
The latest patch(es) : sf-win_x64-CP8_SFW_601 

 Basic information
Release type: Patch
Release date: 2013-10-29
OS update support: None
Technote: TECH209086 - Storage Foundation for Windows High Availability, Storage Foundation for Windows and Veritas Cluster Server 6.0.1 Cumulative Patches
Documentation: None
Popularity: 1303 viewed    downloaded
Download size: 3.9 MB
Checksum: 3828628256

 Applies to one or more of the following products:
Storage Foundation 6.0.1 On Windows x64

 Obsolete patches, incompatibilities, superseded patches, or other requirements:

This patch is obsolete. It is superseded by: Release date
sf-win_x64-CP8_SFW_601 2016-12-12
sf-win_x64-CP7_SFW_601 (obsolete) 2015-06-29
sf-win_x64-CP6_SFW_601 (obsolete) 2014-11-24
sf-win_x64-CP5_SFW_601 (obsolete) 2014-07-28
sf-win_x64-CP4_SFW_601 (obsolete) 2014-04-29
sfw-win_x64-CP3_SFW_601 (obsolete) 2014-01-28

This patch supersedes the following patches: Release date
sfw-win_x64-CP1_SFW_601A (obsolete) 2013-07-29

 Fixes the following incidents:
3061942, 3086900, 3099805, 3124269, 3146196, 3231600

 Patch ID:
None.

Readme file
This readme has the following sections:

=====================|
* Date
* OS/Version
* Packages
* Etrack Incidents
* Fixes Applied for Products
* What's new in this CP
* Install instructions
* - Before you begin
* - To install in the verbose mode
* - To install in the non-verbose (silent) mode
* Post-install steps
* Known issues
* Errors/Problems fixed
* Additional notes
* Disclaimer
=====================|

Date: 2013-10-28
OS: Windows
OS Version: 2008, 2008 R2
Packages:

==============================================
Architecture/OS  Windows Server 2008 / 2008 R2
==============================================
x64 	         CP2_SFW_601_W2k8_x64.exe
----------------------------------------------

Etrack Incidents: 
3061942, 3086900, 3099805, 3124269, 3146196, 3231600




Fixes Applied for Products
==========================|
Storage Foundation (SFW) 6.0.1 for Windows


What's new in this CP
=====================|

The following hotfixes have been re-archived in this CP:
 - Hotfix_6_0_10004_308_3124269
 - Hotfix_6_0_10003_308_3099805
 - Hotfix_6_0_10001_308_3061942


For more information about these hotfixes, see the "Errors/Problems fixed" section in this readme.


Install instructions
====================|
Download the appropriate cumulative public patch (CP) executable file to a temporary location on your system.
You can install the CP in a verbose mode or in a non-verbose mode. Instructions for both options are provided below.

Each cumulative public patch includes the individual hotfixes that contain enhancements and fixes related to reported issues.
See "Errors/Problems fixed" section for details.

Before you begin
----------------:
[1] Ensure that the logged-on user has privileges to install the CP on the systems.

[2] One or more hotfixes that are included with this CP may require a reboot.
Before proceeding with the installation ensure that the system can be rebooted.

[3] Symantec recommends that you close the Cluster Manager (Java Console) and the Veritas Enterprise Administrator (VEA) Console before installing this CP.

[4] Ensure that you close the Windows Event Viewer before proceeding with the installation.

[5] Before installing CP on Windows Server Core systems, ensure that Visual Studio 2005 x86 redistributable is installed on the systems.


To install in the verbose mode
------------------------------:
In the verbose mode, the cumulative public patch (CP) installer prompts you for inputs and displays the installation progress status in the command window.

Perform the following steps:
[1] Double-click the CP executable file to extract the contents to a default location on the system.
The installer displays a list of hotfixes that are included in the CP.
On 64-bit systems, the hotfixes executable files are extracted to:
"%commonprogramfiles(x86)%\Veritas Shared\WxRTPrivates\<CPName>"

The installer also lists the hotfixes that require a reboot of the system after the installation. 
If system reboot is not an option at this time, you can choose not to install these hotfixes. 
In such a case, exit the installation and then launch the CP installer again from the command line using the /exclude option.
See "To install in a non-verbose (silent) mode" section for the syntax.

[2] When the installer prompts whether you want to continue with the installation; type Y to begin the hotfix installation.
The installer performs the following tasks:
	- Extracts all the individual hotfix executable files
	  On 64-bit systems the files are extracted at %commonprogramfiles(x86)%\Veritas Shared\WxRTPrivates\<HotfixName>
	- Runs the pre-install tasks
	- Installs all the hotfixes sequentially
	- Runs the post-install tasks
The installation progress status is displayed in the command window.

[3] After all the hotfixes are installed, the installer prompts you to restart the system.
Type Y to restart the system immediately, or type N to restart the system later. 
You must restart the system for the changes to take effect.

Note that the installer prompts for a system restart only if hotfixes that require a reboot are included in the CP and are installed.

To install in the non-verbose (silent) mode
-------------------------------------------:
In the non-verbose (silent) mode, the cumulative public patch (CP) installer does not prompt you for inputs and directly proceeds with the installation tasks. 
The installer displays the installation progress status in the command window.

Use the VxHFBatchInstaller.exe utility to install a CP from the command line.
The syntax options for this utility are as follows:

vxhfbatchinstaller.exe /CP:<CPName> [/Exclude:<HF1.exe>,<HF2.exe>...] [/PreInstallScript:<PreInstallScript.pl>] [/silent [/forcerestart]]

where,
	- CPName is the cumulative public patch executable file name without the platform, architecture, and .exe extension.
For example, if CP executable name is CP2_SFW_601_W2K8_x64.exe, specify it as CP2_SFW_601.

	- HF1.exe, HF2.exe,... represent the executable file names of the hotfixes that you wish to exclude from the installation. Note that the file names are separated by commas, with no space after a comma. 
	The CP installer skips the mentioned hotfixes during the installation.

	- PreInstallScript.pl is the Perl script that includes the pre-installation steps. 
	These steps forcefully kill the required services and processes in case a graceful stop request does not succeed.
    Symantec recommends that you use this option and script only in case the CP installer fails repeatedly while performing the pre-installation tasks.

	- /silent indicates the installation is run in a non-verbose mode; the installer does not prompt for any inputs during the installation.

	- /forcerestart indicates that the system is automatically restarted, if required, after the installation is complete.


Perform the following steps:
[1] From the command prompt, navigate to the directory where the CP executable file is located and then run the file to extract the contents to a default location on the system. 
The installer displays a list of hotfixes that are included in the CP.
	- On 64-bit systems, the hotfixes executable files are extracted to:
	  "%commonprogramfiles(x86)%\Veritas Shared\WxRTPrivates\<CPName>"

The installer also lists the hotfixes that require a reboot of the system after the installation. 
If system reboot is not an option at this time, you can choose not to install these hotfixes. 
In such a case, launch the CP installer from the command line using the /exclude option.

[2] When the installer prompts whether you want to continue with the installation; type N to exit the installer.

[3] In the same command window, run the following command to begin the CP installation in the non-verbose mode:
vxhfbatchinstaller.exe /CP:<CPName> /silent

For example, to install a SFW 6.0.1 x64 CP for Windows Server 2008, the command is:
vxhfbatchinstaller.exe /CP:CP2_SFW_601 /silent

The installer performs the following tasks:
	- Extracts all the individual hotfix executable files
          On 64-bit systems the files are extracted at %commonprogramfiles(x86)%\Veritas Shared\WxRTPrivates\<HotfixName>
	- Runs the pre-install tasks
	- Installs all the hotfixes sequentially
	- Runs the post-install tasks
The installation progress status is displayed in the command window.

[4] After all the hotfixes are installed, the installer displays a message for restarting the system.
You must restart the system for the changes to take effect.

Note that the installer prompts for a system restart only if hotfixes that require a reboot are included in the CP and are installed. 
The installer automatically restarts the system if you had specified the /forcerestart option in step 3 earlier.


VxHFBatchInstaller usage examples
----------------------------------:
[+] Install CP in silent mode, exclude hotfixes HotFix_6_0_00001_2763375_w2k8_x64.exe and HotFix_6_0_00001_2763375_w2k8_x64.exe:

vxhfbatchinstaller.exe /CP:CP2_SFW_601 /Exclude:HotFix_6_0_00001_2763375_w2k8_x64.exe, HotFix_6_0_00001_2763375_w2k8_x64.exe /silent

[+] Install CP in silent mode, restart automatically:

vxhfbatchinstaller.exe /CP:CP2_SFW_601 /silent /forcerestart


Post-install steps
==================|
The following section describes the steps that must be performed after installing the hotfixes included in this CP.

Ensure that VIP_PATH environment variable is set to "C:\Program Files\Veritas\Veritas Object Bus\bin" and NOT to "C:\<INSTALLDIR_BASE>\Veritas Object Bus\bin". Assuming that C:\ is the default installation drive.


Known issues
============|
The following section describes the issues related to the individual hotfixes that were included in the previous 6.0.1 CP1:

[1] Hotfix_6_0_10004_308_3124269, Hotfix_6_0_10003_308_3099805, and Hotfix_6_0_10001_308_3061942

 - These hotfixes were initially part of CP1 and have been re-archived in CP2 to ensure that VIP_PATH is set to correct value.

 - In CP1, after installing/un-installing these hotfixes, VIP_PATH environment variable was incorreclty getting set to "C:\<INSTALLDIR_BASE>\Veritas Object Bus\Bin" instead of "C:\Program Files\Veritas\Veritas Object Bus\Bin".


Errors/Problems fixed
=======================|
The fixes and enhancements that are included in this cumulative public patch (CP) are as follows:

[1] Hotfix name: Hotfix_6_0_10001_308_3061942

Symptom:
Two issues related to storage migration of a volume with SmartMove enabled.

Description:
In some cases, the following two issues are observed when storage migration is performed for a volume (with operations, such as subdisk move, mirror resync, mirror attach, etc.) and SmartMove is enabled: 1. If the VCS MountV resource for the volume is brought offline, then the migration task completes abnormally and the volume may report data corruption. 2. If the data migration is performed for a volume of size 2 TB or greater, then the task never reaches 100% completion because of integer overflow while handling large offsets.

Resolution:
The two issues mentioned above have been fixed. The first has been fixed by adding correct handling of error conditions so that the task is aborted if the volume is taken offline. The second issue has been fixed by using a 64-bit variable for that purpose.


Binary / Version:
vxconfig.dll / 6.0.20002.76

-------------------------------------------------------+

[2] Hotfix name: Hotfix_6_0_10002_308_3086900

Symptom:
Mount points configured under Failover Cluster are deleted after upgrading to SFW 6.0.1

Description:
This issue occurs in a Microsoft Failover Cluster environment after upgrading to SFW 6.0.1. SFW 6.0.1 stores mount point information in the cluster database under the "VolMountInfo" key. As per the functionality, if mount points are not present in the cluster database when the VMDg resource comes online, then SFW deletes them from the mount database assuming that they were deleted from the other cluster node. After upgrading to SFW 6.0.1, SFW deletes the mount points configured using a previous version of SFW when the VMDg resource comes online because the "VolMountInfo" key was not part of earlier versions of SFW.

Resolution:
The VMDg resource now checks if the "VolMountInfo" key is already present under the cluster registry database. If it is not present, then the VMDg resource updates the database with the valid mount points. NOTE: It is required that, after upgrading the node, you must install this hotfix before performing a reboot or bringing the service group online.

Binary / Version:
vxres.dll / 6.0.10002.308

-------------------------------------------------------+

[3] Hotfix name: Hotfix_6_0_10003_308_3099805

Symptom:
SFW and SFWHA 6.0.1 unable to identify Hitachi HUS VM LUNs as thin reclaimable.

Description:
This issue is regarding SFW and SFW HA 6.0.1 not able to identify the Hitachi Unified Storage VM (HUS VM) LUNs as thin reclaimable LUNs because thin provisioning and storage reclamation is not supported on Hitachi HUS VM LUNs.

Resolution:
The issue has been resolved by enhancing ddlprov.dll to add thin provisioning and storage reclamation support for the Hitachi HUS VM array.

Binary / Version:
ddlprov.dll / 6.0.10003.308

-------------------------------------------------------+

[4] Hotfix name: Hotfix_6_0_10004_308_3124269

Symptom:
Tagging of snapshot disks fails during the fire drill operation, because of which disk import also fails.

Description:
This issue occurs while performing the fire drill operations in case of hardware replication agents, which involve tagging of snapshot disks so that they can be imported separately from the original disks. Because of an issue with SFW, it does not write tags to the disks, and also proceeds without giving any error. Then, the import operation on the snapshot disks also fails because there are no disks present with the specified tag.

Resolution:
This was an existing issue where SFW did not write to disks that are marked as read-only. The issue has been resolved by allowing the fire drill tag to be written to a disk even if the disk is marked as read-only.

Binary / Version:
vxconfig.dll / 6.0.10004.308

-------------------------------------------------------+

[5] Hotfix name: Hotfix_6_0_10005_308_3146196

Symptom:
In some cases, mount points configured under FOC are lost during a failover.

Description:
This issue may occur while performing a failover in a Microsoft Failover Cluster (FOC) environment. During this, Microsoft's "GetVolumePathNamesForVolumeName" function, which is used by Volume Manager Disk Group (VMDg) resource mount handling, fails to return mount point information even though the mount points exist on the system. This happens because of an issue with the "GetVolumePathNamesForVolumeName" function. As a result of this behavior, the VMDg resource removes the mount points from the cluster database during the volume arrival notification and then from the system during a failover.

Resolution:
This issue has been resolved by modifying the present handling of mount points during volume arrival. Because of this change, you need to perform the following workaround in case of a dynamic disk group join operation where the target disk group is under the VMDg resource: After performing the dynamic disk group join operation, reset the VMDg resource property.

Binary / Version:
vxres.dll / 6.0.10005.308

-------------------------------------------------------+

[6] Hotfix name: Hotfix_6_0_10006_308_3231600

Symptom:
Memory leak occurs for SFW VSS provider while taking a VSS snapshot.

Description:
This issue occurs during a VSS snapshot operation when VSS is loading and unloading providers. The SFW VSS provider connects to VEA database during the loading and disconnects during the unloading of providers. Because of an issue in the VEA database cleanup during the unloading, the memory leak occurs.

Resolution:
This issue has been resolved so that now SFW VSS provider does not connect to and disconnect from VEA during every load and unload operation. Instead, it creates a connection at the beginning and disconnects when the Veritas VSS Provider Service (vxvssprovider.exe) is stopped.

Binary / Version:
vxvssprovider.exe / 6.0.10006.308

-------------------------------------------------------+


Additional notes
================|
[+] To confirm the list of patches installed on a system, run the following command from the directory where the CP files are extracted:
vxhfbatchinstaller.exe /list

The output of this command displays a list of patches and the hotfixes that are installed as part of a CP. 
This command also displays the hotfixes that are included in a CP but are not installed on the system.

[+] To confirm the installation of the hotfixes, perform one of the following:
	- Run the following command:
	  vxhf.exe /list
	  The output of this command lists the hotfixes installed on the system.
	- In the Windows Add/Remove program, click "View installed updates" to view the list of the hotfixes installed on the system.

[+] The CP installer (vxhfbatchinstaller.exe) creates and stores logs at:
"%allusersprofile%\Application Data\Veritas\VxHF\VxHFBatchInstaller.txt"

[+] The hotfix installer (vxhf.exe) creates and stores logs at:
"%allusersprofile%\Application Data\Veritas\VxHF\VxHF.txt"

[+] For general information about the hotfix installer (vxhf.exe), please refer to the following technote:
http://www.symantec.com/docs/TECH73446

[+] To view a list of hotfixes already installed on a system, please refer to the steps mentioned in the following technote:
http://www.symantec.com/docs/TECH73438

[+] For information on uninstalling a hotfix, please refer to the steps mentioned in the following technote:
http://www.symantec.com/docs/TECH73443


Disclaimer
==========|
This fix is provided without warranty of any kind including the warranties of title or implied warranties of merchantability, fitness for a particular purpose and non-infringement. Symantec disclaims all liability relating to or arising out of this fix. It is recommended that the fix be evaluated in a test environment before implementing it in your production environment. When the fix is incorporated into a Storage Foundation for Windows maintenance release, the resulting Hotfix or Service Pack must be installed as soon as possible. Symantec Technical Services will notify you when the maintenance release (Hotfix or Service Pack) is available if you sign up for notifications from the Symantec support site http://www.symantec.com/business/support and/or from Symantec Operations Readiness Tools (SORT) http://sort.symantec.com.