Kernel memory leak occurs after upgrading to Veritas Volume Manager 5.0 MP3 RP1 for Solaris in a Cluster environment

Article:TECH66816  |  Created: 2009-01-16  |  Updated: 2009-01-05  |  Article URL http://www.symantec.com/docs/TECH66816
Article Type
Technical Solution

Product(s)

Environment

Issue



Kernel memory leak occurs after upgrading to Veritas Volume Manager 5.0 MP3 RP1 for Solaris in a Cluster environment

Solution



Introduction
Upgrading to Veritas Volume Manager (VxVM) 5.0 MP3 RP1 on Solaris/Sparc or Solaris/x64, in a Storage Foundation for Cluster File Systems (SFCFS) or Storage Foundation for Oracle RAC (SFRAC) cluster environment, leads to kernel memory leaks, culminating in kernel memory exhaustion. A bug in the memory management of messages exchanged between the cluster nodes leads to this kernel memory leak and the system may report low memory warnings when the kernel memory is exhausted.

What is Affected
This issue affects the following Veritas Volume Manager (VxVM) installations, on the Solaris operating system:
  • VxVM has been upgraded to 5.0 MP3 RP1
  • Cluster Volume Manager is in use. Note:  This includes clustered stack products such as Storage Foundation for Cluster File Systems and Storage Foundation for Oracle RAC.

What is NOT Affected
This issue does not impact any of the following installations:

  • 5.0 MP3 RP1 on Linux
  • 5.0 MP3 RP1 on AIX
  • 5.0 MP3 on Solaris, Linux, AIX
  • Single node installations that are not part of a cluster

How to determine if affected
The kernel memory in use will continue to grow, eventually leading to a situation where the system has no usable kernel memory when all of the following occur:

  • The Operating System is Solaris (Sparc or x64)
To check if your Operating System is SunOS, use the following command and look for SunOS in the output

# uname

  • The version of Veritas Volume Manager (VxVM) in use is 5.0 MP3 RP1
To check if your VxVM version is 5.0 MP3 RP1, use the following command and look for patch identifier 139352-02 (if your operating system is SunOS/Sparc) and 139353-02 (if your operating system is SunOS/x86)

# patchadd -p

  • The system is part of a SFCFS or SFRAC cluster.

  • To check if your system is part of a cluster, use the following command and look for "enabled: cluster active" in the output to confirm this node is part of a cluster

# vxdctl -c mode


Formal Resolution

The memory leak has been resolved in 5.0 MP3 RP1 HF1. Please upgrade VxVM to 5.0 MP3 RP1 HF1 on all Solaris installations to resolve this issue.

Solaris Sparc:  https://vias.symantec.com/labs/patch/php/patchinfo.php?download=yes&release_id=1659

Solaris x64:  https://vias.symantec.com/labs/patch/php/patchinfo.php?download=yes&release_id=1680



Best Practices:
Symantec strongly recommends the following best practices:
1. Always perform a Full backup prior to and after any changes to your environment.
2. Always make sure that your environment is running the latest version and patch level.

How to Subscribe to Software Alerts:
If you have not received this TechNote from the Symantec Email Notification Service as a Software Alerts, please subscribe at the following link:    http://maillist.entsupport.symantec.com/subscribe.asp




Supplemental Materials

SourceETrack
Value1402443
DescriptionServer panics in kmsg_udp_payload() 2- Node CVM cluster with SUN Cluster 3.2.0 (to)

SourceETrack
Value1460281
DescriptionServer panics in kmsg_udp_payload() 2- Node CVM cluster with SUN Cluster 3.2.0 (b_5_0sol_mp3_rp1_maint_hotfix)

SourceETrack
Value1484919
DescriptionAfter upgrade to Mp3, the start up process fails (tot)

SourceETrack
Value1485358
DescriptionAfter upgrade to Mp3, the start up process fails (b_5_0sol_mp3_rp1_maint_hotfix)

SourceETrack
Value1402456
DescriptionServer panics in kmsg_udp_payload() 2- Node CVM cluster with SUN Cluster 3.2.0 (b_5_0sol_mp1_rp5_maint_hotfix)

SourceETrack
Value1484346
DescriptionKernel memory leak running full-sized instant snapshot operations on a shared disk group


Legacy ID



317647


Article URL http://www.symantec.com/docs/TECH66816


Terms of use for this information are found in Legal Notices