Fix Readme
Abstract
Release notes for the 4.1.1.20 VIOS Fix Pack release
Content
VIOS 4.1.1.20 Release Notes
Package Information
PACKAGE: Update Release 4.1.1.20
IOSLEVEL: 4.1.1.20
VIOS level is | The AIX level of the NIM Master level must be equal to or higher than |
Update Release 4.1.1.20 | AIX 7300-03-02 |
General package notes
Be sure to heed all minimum space requirements before installing.
Review the list of fixes included in Update Release 4.1.1.20
To take full advantage of all the functions available in the VIOS, it may be necessary to be at the latest system firmware level. If a system firmware update is necessary, it is recommended that the firmware be updated before you update the VIOS to Update Release 4.1.1.20.
Microcode or system firmware downloads for Power Systems
If the VIOS being updated has filesets installed from the VIOS Expansion Pack, be sure to update those filesets with the latest VIOS Expansion Pack if updates are available.
Update Release 4.1.1.20 updates your VIOS partition to ioslevel 4.1.1.20. To determine if Update Release 4.1.1.20 is already installed, run the following command from the VIOS command line.
$ ioslevel
If Update Release 4.1.1.20 is installed, the command output is 4.1.1.20.
Upgrade to VIOS 4.1.x
Existing VIOS systems with supported versions of 3.1.x.y can be upgraded to VIOS version 4.1.1.0 (DVD image) or 4.1.1.20 (Flash image) using viosupgrade tool . Although it is recommended to be on VIOS 3.1.4.30 or later SP level before upgrading to VIOS 4.1.x level.
VIOS systems with SSP configuration must be on 3.1.3.x or later level before upgrading to 4.1.x level or adding 4.1.x nodes into cluster.
If Active Memory Sharing (AMS) is configured on the VIOS, it should be un-configured before upgrading. You may refer the link on how to un-configure.
Before upgrading, you may read the viosupgrade blog in PowerVM Community which explains various scenarios.
Note: In an SSP cluster environment, if you're upgrading from version 3.1.4.50 or later, you must upgrade only to version 4.1.1.00 or later. Additionally, ensure that all nodes in the cluster are running version 3.1.4.50 or later before proceeding with the upgrade.
For Customers using NVMe Over Fabric (SAN) as their Boot Disk
Booting from NVMeoF disk may fail if certain fabric errors are returned, hence a boot disk set up with multiple paths is recommended. In case there is a failure to boot, the boot process may continue if you exit from the SMS menu. Another potential workaround is to discover boot LUNs from the SMS menu and then retry boot.
Note
If the Virtual I/O servers are installed on POWER10 systems and configured with “32Gb PCIe4 2-Port FC Adapter, Feature Code(s) EN1J and EN1K”, then the requirement is to update the adapter microcode level to 7710812214105106.070115 before updating the Virtual I/O server to 4.1.1.20 level.
Please refer to the release notes at this link
HIPER issue: If you are upgrading to VIOS 3.1.4.50 or 4.1.1.x or above version please consult this link
4.1.1.20 New Features
VIOS 4.1.1.20 adds the following new features:
viosupgrade enhancements
The major enhancements done in viosupgrade in this release are as follows.
- viosupgrade will now preserve device names for vfchost/vhost adapter devices, fcnvme, nvme, fscsi, iSCSI devices, network adapters, hdisks etc. by default. A new flag -skipdevname is introduced to skip the above device names preservation.
- Enables upgrades on systems that have a mirrored rootvg disk.
- Includes new options, such as the -noprompt flag to answer user prompts in advance in the following scenarios:
- Prompts you to confirm whether to skip logical volumes that cannot be migrated.
- Detects third-party Multi Path input output (MPIO) software and prompts you to confirm whether to proceed with the VIOS upgrade.
- Allows upgrading VIOS by using ISO images in a single step. For example, the -i flag can accept both mksysb and ISO images.
- Retains user account configurations and the home directories automatically.
- Supports all the options available in the standalone version of VIOS in the Network Installation Management (NIM) version.
- Preserves the following security configurations, by default:
- User accounts and groups with login attributes and password.
- Role based access control (RBAC) configurations, such as user roles, authorizations, privileged commands database (privcmds), privileged device database (privdevs), privileged files (privfiles) and domains.
- Login and authentication configurations.
- AIX audit sub system configurations.
- Trusted execution policies and databases.
- IPSec filters and tunnel configurations.
- Lightweight directory access protocol (LDAP) client configurations.
- OpenSSL, OpenSSH and Kerberos configurations.
Notes:
- Some configurations will be restored from the previous version, while some new configurations are activated on the newer version, and remaining other configurations will be merged from old versions to new versions. Configurations for which both previous and current versions are not used will be saved in the directory /usr/ios/security/saveconf/viosbr folder. You can review the configuration files and manually merge them.
These security configurations will be preserved only if you upgrade from VIOS 3.1.4.60.
viosbr enhancements
In this release, a new flag -skip is introduced which skips restoration of specified configurations.
Use “-skip security_config” to skip restore of all the security configurations.
VFC enhancements
I/O commands timeout improvements in VFC stack on VIOS. It handles starvation conditions for certain higher IO size workloads ( 256K and above ). It introduces 2 new attributes ( num_local_cmds and bufs_per_cmd ) at VFC host adapter device level on VIOS to manage resources like memory better overall.
Improve Virtual FC Performance Diagnostics provide support for the VFC client partitions ( "IBM i" in this release of 2024) for collecting I/O response times from the VIOS as a whole subsystem, including the timestamps recorded on different layers in NPIV stack on VIOS and FC adapters.
NFS mounted ISO images support in Virtual Media Library
This release adds support for NFS Mounted ISOs in Virtual Media Library which allows to load ISO images from a centralized NFS server, eliminating need for repeated copying of ISO images across multiple VIOS. This saves storage space and time, maintains consistent images, and supports both NFS V3 and V4, allowing multiple images to be linked into the repository.
The ’mkvopt’ command is enhanced to support new option –nfslink which creates a symbolic link to the specified NFS ISO file, in the repository.
$ mkvopt -name <image_name_in_VML_repository> -file /mnt/<mounted_ISO_file.iso> -nfslink -ro
Refer the PowerVM Community blog for details.
Remove unwanted language message filesets
The updateios command is extended to support below options to remove unwanted language message filesets.
- -listlang : This option lists all the installed language message filesets.
- -rmlang : This option should be used to remove language filesets.
-preserve : This option must be used along with -rmlang to specify the languages to preserve. Rest of the language message filesets will be removed.
Shared Storage Pool enhancements
The cluster -status -verbose command is enhanced to display additional storage pool specific information.
The clutil command is introduced with the -o pingcheck option to verify if the network
communication among the SSP cluster nodes are in the working state.
Live Partition Mobility (LPM) Validation enhancement for NPIV storage
Discrepancies in LUN IDs for disks between source and destination hosts can arise from misconfigured LUN masking at the storage level. For instance, the active and inactive WWPNs of a client’s virtual FC adapter may be configured as separate hosts at the storage system, then can assign the same LUNs to these hosts in different orders. This results in varying LUN IDs associated with each WWPN.
Since such configuration can lead to LUN access issues after LPAR migration, the validation algorithms have been enhanced to detect such misconfigurations and report to the user.
VIOS 4.1.1.0 has virtual ethernet multi queue feature
This will help to drive more network traffic through virtual ethernet trunk adapter. By default, there will be 12 transmit queues and zero receive queues (legacy receive mode). To increase the bandwidth, one can increase the number of receive queues on virtual ethernet adapter in VIOS by tuning queues_rx attribute of the virtual ethernet adapter. However, using multiple Receive queues to drive more traffic will require more CPU resources.
Other enhancements
- Enhancement in alt_root_vg command, to run it in phases. This enhancement allows the alt_root_vg command to separate the cloning phase from the update phase.
- Enhancement in chdev command, a new option -dynupdate is added to support dynamic updates of supported device attributes.
Hardware Requirements
Please check this link for supported hardware.
Known Capabilities and Limitations
The following requirements and limitations apply to Shared Storage Pool (SSP) features and any associated virtual storage enhancements.
Requirements for Shared Storage Pool
- System requirements per SSP node:
- Minimum CPU: 1 CPU of guaranteed entitlement
- Minimum memory: 4GB
- Storage requirements per SSP cluster (minimum): 1 fiber-channel attached disk for repository, 10 GB
- At least 1 fiber-channel attached disk for data, 10GB
Limitations for Shared Storage Pool
Software Installation
- When installing updates for VIOS Update Release 4.1.1.20 participating in a Shared Storage Pool, the Shared Storage Pool Services must be stopped on the node being upgraded.
SSP Configuration
Feature | Min | Max |
Number of VIOS Nodes in Cluster | 1 | 16* |
Number of Physical Disks in Pool | 1 | 1024 |
Number of Virtual Disks (LUs) Mappings in Pool | 1 | 8192 |
Number of Client LPARs per VIOS node | 1 | 250* |
Capacity of Physical Disks in Pool | 10GB | 16TB |
Storage Capacity of Storage Pool | 10GB | 512TB |
Capacity of a Virtual Disk (LU) in Pool | 1GB | 4TB |
Number of Repository Disks | 1 | 1 |
Capacity of Repository Disk | 10GB | 1016GB |
Number of Client LPARs per Cluster | 1 | 2000 |
*Support for additional VIOS Nodes and LPAR Mappings:
Prerequisites for expanded support:
- Over 16 VIOS Nodes requires that the SYSTEM (metadata) tier contains only SSD storage.
- Over 250 Client LPARs per VIOS requires each VIOS have at least 4 CPUs and 8 GB memory.
Here are the new maximum values for each of these configuration options, if the associated hardware specification has been met:
Feature | Default Max | High Spec Max |
Number of VIOS Nodes in Cluster | 16 | 24 |
Number of Client LPARs per VIOS node | 250 | 400 |
Other notes:
- Maximum number of physical volumes that can be added to or replaced from a pool at one time: 64
- The Shared Storage Pool cluster name must be less than 63 characters long.
- The Shared Storage Pool pool name must be less than 127 characters long.
- The maximum supported LU size is 4TB, however for high I/O workloads recommendation is to use multiple smaller LUs as it will improve performance. For example, using 16 separate 16GB LUs would yield better performance than a single 256GB LU for applications that perform reads and writes to a variety of storage locations concurrently.
- The size of the /var drive should be greater than or equal to 3GB to ensure proper logging.
Network Configuration
- Uninterrupted network connectivity is required for operation. i.e., the network interface used for Shared Storage Pool configuration must be on a highly reliable network which is not congested.
- A Shared Storage Pool configuration can use IPV4 or IPV6, but not a combination of both.
- A Shared Storage Pool configuration should configure the TCP/IP resolver routine for name resolution to resolve host names locally first, and then use the DNS. For step by step instructions, refer to the TCP/IP name resolution documentation in the IBM Knowledge Center.
- The forward and reverse lookup should resolve to the IP address/hostname that is used for Shared Storage Pool configuration.
- It is recommended that the VIOSs that are part of the Shared Storage Pool configuration keep their clocks synchronized.
Storage Configuration
- Virtual SCSI devices provisioned from the Shared Storage Pool may drive higher CPU utilization than the classic Virtual SCSI devices.
- Using SCSI reservations (SCSI Reserve/Release and SCSI-3 Reserve) for fencing physical disks in the Shared Storage pool is not supported.
- SANCOM will not be supported in a Shared Storage Pool environment.
Shared Storage Pool capabilities and limitations
- On the client LPAR Virtual SCSI disk is the only peripheral device type supported by SSP at this time.
- When creating Virtual SCSI Adapters for VIOS LPARs, the option "Any client partition can connect" is not supported.
- VIOSs configured for SSP require that Shared Ethernet Adapter(s) (SEA) be setup for Threaded mode (the default mode). SEA in Interrupt Mode is not supported within SSP.
- Client LPARs are not supported if they use JFS as their filesystem. If JFS is used, there is a risk of data corruption in the event of a network outage. JFS2 and other file systems are unaffected by this issue.
Installation Information
Pre-installation Information and Instructions
Please ensure that your rootvg contains at least 30 GB and that there is at least 4GB free space before you attempt to update to Update Release 4.1.1.20. Run the lsvg rootvg command, and then ensure there is enough free space.
Example:
$ lsvg rootvg | |||
VOLUME GROUP: | rootvg | VG IDENTIFIER: | 00f6004600004c000000014306a3db3d |
VG STATE: | active | PP SIZE: | 64 megabyte(s) |
VG PERMISSION: | read/write | TOTAL PPs: | 511 (32704 megabytes) |
MAX LVs: | 256 | FREE PPs: | 64 (4096 megabytes) |
LVs: | 14 | USED PPs: | 447 (28608 megabytes) |
OPEN LVs: | 12 | QUORUM: | 2 (Enabled) |
TOTAL PVs: | 1 | VG DESCRIPTORS: | 2 |
STALE PVs: | 0 | STALE PPs: | 0 |
ACTIVE PVs: | 1 | AUTO ON: | yes |
MAX PPs per VG: | 32512 | ||
MAX PPs per PV: | 1016 | MAX PVs: | 32 |
LTG size (Dynamic): | 256 kilobyte(s) | AUTO SYNC: | no |
HOT SPARE: | no | BB POLICY: | relocatable |
PV RESTRICTION: | none | INFINITE RETRY: | no |
VIOS upgrades with Third Party Software
When the user upgrades from 3.1.x.y to 4.1.0.00 level and above, third-party software is not packaged with the IBM supplied mksysb image. User needs to install the respective third-party software after the upgrade is complete and run viosupgrade -o rerun to restore the respective devices.
Updating from VIOS version 4.1.0.00
VIOS Update Release 4.1.1.20 may be applied directly to any VIOS at level 4.1.0.00.
Before installing the VIOS Update Release 4.1.1.20
Warning: The update may fail if there is a loaded media repository.
Instructions: Checking for a loaded media repository
To check for a loaded media repository, and then unload it, follow these steps.
To check for loaded images, run the following command:
$ lsvopt
The Media column lists any loaded media.To unload media images, run the following commands on all Virtual Target Devices that have loaded images.
$ unloadopt -vtd <file-backed_virtual_optical_device >
To verify that all media are unloaded, run the following command again.
$ lsvopt
The command output should show No Media for all VTDs.
Instructions: Migrate Shared Storage Pool Configuration
The Virtual I/O Server (VIOS) Version 3.1.x.y or later, supports rolling updates to release 4.1.1.20 for SSP clusters.
The rolling updates enhancement allows the user to apply Update Release 4.1.1.20 to the VIOS logical partitions in the cluster individually without causing an outage in the entire cluster. The updated VIOS logical partitions cannot use the new SSP capabilities until all VIOS logical partitions in the cluster are updated.
To upgrade the VIOS logical partitions to use the new SSP capabilities, ensure that the following conditions are met:
All VIOS logical partitions must have VIOS Update Release version 3.1.x.y or later installed.
All VIOS logical partitions must be running. If any VIOS logical partition in the cluster is not running, the cluster cannot be upgraded to use the new SSP capabilities.
Instructions: Verify the cluster is running at the same level as your node.
Run the following command:
$ cluster -status -verboseCheck the Node Upgrade Status field, and you should see one of the following terms:
UP_LEVEL: This means that the software level of the logical partition is higher than the software level the cluster is running at.
ON_LEVEL: This means the software level of the logical partition and the cluster are the same.
Installing the Update Release
There is a method to verify the VIOS update files before installation. This process requires access to openssl by the 'padmin' User, which can be accomplished by creating a link.
Instructions: Verifying VIOS update files.
To verify the VIOS update files, follow these steps:
$ oem_setup_env
Create a link to openssl if required
# ln -s /usr/bin/openssl /usr/ios/utils/opensslVerify the link to openssl was created
# ls -alL /usr/bin/openssl /usr/ios/utils/opensslVerify that both files display similar owner and size
# exit
Use one of the following methods to install the latest VIOS Service Release. As with all maintenance, you should create a VIOS backup before making changes.
If you are running a Shared Storage Pool configuration, you must follow the steps in Migrate Shared Storage Pool Configuration.
Note: While running 'updateios' in the following steps, you may see accessauth messages, but these messages can safely be ignored.
Warning: If VIOS rules have been deployed.
During update, there have been occasional issues with VIOS Rules files getting overwritten and/or system settings getting reset to their default values.
To ensure that this doesn’t affect you, we recommend making a backup of the current rules file. This file is located here:
/home/padmin/rules/vios_current_rules.xml
First, to capture your current system settings, run this command:
$ rules -o capture
Then, either copy the file to a backup location, or save off a list of your current rules:
Note: The "padmin" user is restricted to redirect command output to a file, you must be in the root shell. Use "oem_setup_env" to become a root user.
$ oem_setup_env
# rules -o list > rules_list.txt
After this is complete, proceed to update as normal. When your update is complete, check your current rules and ensure that they still match what is desired. If not, either overwrite the original rules file with your backup, or proceed to use the ‘rules -o modify’ and/or ‘rules -o add’ commands to change the rules to match what is in your backup file.
Finally, if you’ve failed to back up your rules, and are not sure what the rules should be, you can deploy the recommended VIOS rules by using the following command:
$ rules -o deploy -d
Then, if you wish to copy these new VIOS recommended rules to your current rules file, just run:
$ rules -o capture
Note: This will overwrite any customized rules in the current rules file.
Applying Updates
Warning:
If the target node to be updated is part of a redundant VIOS pair, the VIOS partner node must be fully operational before beginning to update the target node.
Note 1:
For VIOS nodes that are part of an SSP cluster, the partner node must be shown in 'cluster -status ' output as having a cluster status of OK and a pool status of OK. If the target node is updated before its VIOS partner is fully operational, client LPARs may crash.
Note 2:
Updateios command is suggested to run using “-install” option. This option installs new base-level filesets that are shipped along with the existing fileset updates. For example: enabling resize command in VIOS 4.1.1.20 onwards.
Running updateios command with “-install” flag may lead to few fileset update error messages that can be ignored. See below the list of filesets for which the error message can be ignored:
X11.apps.msmit 7.3.3.0 # AIXwindows msmit Application
bos.msg.ca_ES.mls.rte 7.3.3.0 # Trusted AIX Messages - Catalan
bos.msg.ca_ES.svprint 7.3.3.0 # System V Print Subsystem Msg...
bos.msg.de_DE.mls.rte 7.3.3.0 # Trusted AIX Messages - German
bos.msg.de_DE.svprint 7.3.3.0 # System V Print Subsystem Msg...
bos.msg.en_US.mls.rte 7.3.3.0 # Trusted AIX Messages - U.S. ...
bos.msg.es_ES.mls.rte 7.3.3.0 # Trusted AIX Messages - Spanish
bos.msg.es_ES.svprint 7.3.3.0 # System V Print Subsystem Msg...
bos.msg.fr_FR.mls.rte 7.3.3.0 # Trusted AIX Messages - French
bos.msg.fr_FR.svprint 7.3.3.0 # System V Print Subsystem Msg...
bos.msg.it_IT.mls.rte 7.3.3.0 # Trusted AIX Messages - Italian
bos.msg.it_IT.svprint 7.3.3.0 # System V Print Subsystem Msg...
bos.msg.pt_BR.mls.rte 7.3.3.0 # Trusted AIX Messages - Brazi...
bos.msg.pt_BR.svprint 7.3.3.0 # System V Print Subsystem Msg...
bos.net.tcp.rcmd 7.3.3.0 # TCP/IP Remote Command Client...
bos.net.tcp.rcmd_server 7.3.3.0 # TCP/IP Remote Command Server...
Also, In case you choose to run updateios without “-install” flag, you will not see any of the error messages above but you will lose installation of resize command and “RSCT Software Resource Manager” along with a bunch of language message filesets for locales “it_IT, fr_FR, ca_ES, pt_BR, de_DE, es_ES”. Below is the list of filesets that you will miss:
bos.msg.it_IT.txt.tfs - Text Formatting Services Msgs - Italian
bos.msg.it_IT.net.ipsec - IP Security Messages - Italian
bos.msg.it_IT.alt_disk_inst - Alternate Disk Install Msgs -Italian
bos.msg.it_IT.diag.rte - Hardware Diagnostics Messages - Italian
(Same filesets as above for fr_FR, ca_ES, pt_BR, de_DE, es_ES)
X11.apps.xterm - AIXwindows xterm Application
X11.apps.xdm - AIXwindows xdm Application
X11.apps.custom - AIXwindows Runtime Common Directories
X11.apps.config - AIXwindows Configuration Applications
X11.apps.clients - AIXwindows Client Applications
rsct.msg.EN_US.basic.rte - RSCT Basic Msgs - U.S. English (UTF)
rsct.opt.softwarerm - RSCT Software Resource Manager
rsct.msg.en_US.opt.software - RSCT Software RM Msgs - U.S. English
rsct.msg.EN_US.opt.software - RSCT Software RM Msgs - U.S. English (UTF)
Warning:
Update to VIOS 4.1.1.20 will update ios.database.rte fileset which might throw below errors, and they can be ignored:
3001-408 The user "vpgadmin" has an invalid lastupdate attribute.
Instructions: Applying updates to a VIOS.
- Log in to the VIOS as the user padmin.
If you use one or more File Backed Optical Media Repositories, you need to unload media images before you apply the Update Release. See details here.
If you use Shared Storage Pools, then Shared Storage Pool Services must be stopped.
$ clstartstop -stop -n <cluster_name > -m <hostname >To apply updates from a directory on your local hard disk, follow the steps:
- Create a directory on the Virtual I/O Server.
$ mkdir <directory_name > Using ftp, transfer the update file(s) to the directory you created.
To apply updates from a remotely mounted file system, and the remote file system is to be mounted read-only, follow the steps:Mount the remote directory onto the Virtual I/O Server:
$ mount remote_machine_name:directory /mntThe update release can be burned onto a CD by using the ISO image file(s). To apply updates from the CD/DVD drive, follow the steps:
1. Place the CD-ROM into the drive assigned to VIOS.
- Create a directory on the Virtual I/O Server.
Commit previous updates by running the updateios command:
$ updateios -commitVerify the updates files that were copied. This step can only be performed if the link to openssl was created.
$ cp <directory_path >/ck_sum.bff /home/padmin
$ chmod 755 </home/padmin>/ck_sum.bff
$ ck_sum.bff <directory_path >
If there are missing updates or incomplete downloads, an error message is displayed.
To see how to create a link to openssl, click here.Apply the update by running the updateios command
$ updateios -accept -install -dev <directory_name >
To load all changes, reboot the VIOS as user padmin .
$ shutdown -restart
Note: If shutdown –restart command failed, run swrole –PAdmin for padmin to set authorization and establish access to the shutdown command properly.
If cluster services were stopped in step 3, restart cluster services.
$ clstartstop -start -n <cluster_name > -m <hostname >
Verify that the update was successful by checking the results of the updateios command and by running the ioslevel command, which should indicate that the ioslevel is now 4.1.1.20.
$ ioslevel
Post-installation Information and Instructions
Instructions: Checking for an incomplete installation caused by a loaded media repository.
After installing an Update Release, you can use this method to determine if you have encountered the problem of a loaded media library.
Check the Media Repository by running this command:
$ lsrep
If the command reports: "Unable to retrieve repository data due to incomplete repository structure," then you have likely encountered this problem during the installation. The media images have not been lost and are still present in the file system of the virtual media library.
Running the lsvopt command should show the media images.
Instructions: Recovering from an incomplete installation caused by a loaded media repository.
To recover from this type of installation failure, unload any media repository images, and then reinstall the ios.cli.rte package. Follow these steps:
Unload any media images
$ unloadopt -vtd <file-backed_virtual_optical_device>
Reinstall the ios.cli.rte fileset by running the following commands.
To escape the restricted shell:
$ oem_setup_env
To install the failed fileset:
# installp –Or –agX ios.cli.rte –d <device/directory >
To return to the restricted shell:
# exitRestart the VIOS.
$ shutdown –restart
Verify that the Media Repository is operational by running this command:
$ lsrep
Content modified in this release
Software Updated
- Two versions of postgres database (version 15.6 and 13.14) are included in base image. Postgres version 13 is required to support mixed mode cluster where node versions 3.1.4.x and 4.1.0.x are part of the cluster.
Content removed from 4.1.0.x release and above
ITM Agents software
ITM (IBM Tivoli Monitoring) filesets are not part of VIOS 4.1.0.00 & above versions. Users need to download and install the ITM software from an external location. The ITM VIOS Premium Agent and ITM CEC Base Agent can be downloaded and installed separately as part of an updated IBM Tivoli Monitoring System P Agents 6.22 Fix Pack 4 or later bundle. Here is a link to the readme file containing information about how to obtain the image and instructions for installing. When these agents are installed in the default directory of /opt/IBM/ITM, they can continue to utilize the cfgsvc, startsvc, and stopsvc commands to configure, start and stop the agent.
AMS
Active Memory Sharing (AMS) feature is removed.
Software Removed
Following filesets that are deemed not necessary are removed.
bos.net.tcp.rcmd, bos.net.tcp.rcmd_server (A copy is saved under: /usr/sys/inst.images/installp/ppc)
cas.agent tivoli.tivguid
rsct.opt.fence.blade rsct.opt.fence.hmc
sysmgt.cim.providers.metrics sysmgt.cim.providers.osbase
sysmgt.cim.providers.scc sysmgt.cim.providers.smash
sysmgt.cim.smisproviders.hba_hdr sysmgt.cim.smisproviders.hhr
sysmgt.cim.smisproviders.vblksrv sysmgt.cimserver.pegasus.rte
Java7.jre Java7.sdk Java7_64.jre Java7_64.sdk
itm.cec.agent itm.premium.rte itm.vios_premium.agent
bos.net.nfs.server devices.vdevice.IBM.vfc-client.rte
X11.adt.ext X11.adt.motif X11.apps.clients X11.apps.config X11.apps.custom X11.apps.msmit X11.apps.xdm
- X11.base.xpconfig X11.compat.adt.Motif12 X11.compat.lib.Motif10 X11.compat.lib.Motif114
X11.compat.lib.X11R3 X11.compat.lib.X11R4 X11.Dt.bitmaps X11.Dt.helpinfo X11.Dt.helpmin X11.Dt.helprun
X11.Dt.lib X11.Dt.rte X11.Dt.ToolTalk X11.fnt.coreX X11.fnt.deform_JP X11.fnt.fontServer X11.fnt.Gr_Cyr_T1
X11.fnt.ibm1046 X11.fnt.ibm1046_T1 X11.fnt.iso1 X11.fnt.iso2 X11.fnt.iso3 X11.fnt.iso4 X11.fnt.iso5
X11.fnt.iso7 X11.fnt.iso8 X11.fnt.iso8_T1 X11.fnt.iso9 X11.fnt.iso_T1 X11.fnt.ksc5601.ttf X11.fnt.ucs.cjk
X11.fnt.ucs.com X11.fnt.ucs.ttf_CN X11.fnt.ucs.ttf_extb X11.fnt.util X11.loc.en_US.base.lib
X11.loc.en_US.base.rte X11.loc.en_US.Dt.rte X11.vsm.lib
Fixes included in this release
APAR | Description |
IJ52038 | CAA: CAA DISABLE POLLING FOR DOWNED REPO DISK |
IJ54522 | VIOS_VFC_HOST(0000 016F) TIMED OUT WAITING CMDS_IN_USE TO BE 0 |
IJ54625 | DSI IN NPIV_TAKE_THREAD_ACTION WITH CTCTRL IN VIOS 4.1.1.0 |
IJ54974 | CMDB MEM LEAK LEADS TO CORE DUMP |
IJ55164 | IO SPACE MAPPING CREATED W. RMMAP_INHERIT NOT INHERITED AT FORK |
IJ55172 | NIMADM FAILS TO INSTALL RPM PACKAGES FROM INSTALL_BUNDLE |
IJ55173 | PROBABLE FCSTAT HANG ON UNUSED FC ADAPTER PORT |
IJ55179 | FCA_ERR6 when switch RDP polling cycle is turned on |
IJ55242 | SOME VIOS CMDS HANG AFTER LPM VALIDATION |
IJ55252 | HEAVY VIO CHANGE MANAGEMENT ACTIVITY CAN HANG VIO_CHGMGT DAEMON |
IJ55254 | Unmapping the vfchost returns device is busy error |
IJ55259 | SPOT CREATION WITH THE ATTRIBUTE SHOW_PROGRESS=NO IS FAILING |
IJ55261 | SPOT CREATION WITH AUTO_EXPAND=NO STILL EXPANDING FILESYSTEM. |
IJ55269 | Potential security issue libxml2_advisory9.asc |
IJ55290 | vios crash during lpm at valvfc_off_level |
IJ55322 | LSLPP CORE DUMPS WHEN DESCRIPTION STRING IN VENDOR ODM TOO LONG |
IJ55348 | LKU WITH IPSEC FAILS WITH CHECKPOINT FILE PROBABLY CORRUPTED |
IJ55361 | SYSTEM CRASHES IN IP6_OUTPUT() |
IJ55365 | SYSTEM HANG IN CM_REJ_HANDLER() |
IJ55403 | MEMORY CAN LEAK FROM VIOS KERNEL EXTENSION DURING HEAVY CHANGE |
IJ55411 | FTPD CORE DUMP WHEN TRYING TO LOCK GLOBAL PTHREAD MUTEX |
IJ55425 | NIMADM MKSYSB MIGRATION FUSER WARNINGS IN PHASE 10 |
IJ55471 | CRASH USING TRANSACTIONAL MEMORY WITH AIX 7300-01 ON POWER8 |
IJ55472 | customer reported slow reads from jfs2 snapshots on 7.3 TL2 |
IJ55473 | Crashes in iKill during rename or rmdir operations |
IJ55475 | LLU fails to update libpthreads.a library for IBM.softwareRMd |
IJ55476 | System crash when LLU fail |
IJ55477 | llu update fails in few scenarios |
IJ55478 | Support hkeyset_* functions in sys/skeys.h with OpenXL |
IJ55479 | HANG DUE TO MAILBOX TIMEOUT IF ADAPTER MICROCODE DOWNLOAD FAILS |
IJ55480 | CTIU timeout after SAN fabric event may result in command hang |
IJ55481 | INTR_CNT PARAMETER HAS NO USE IN EN2W AND SHOULD BE REMOVED |
IJ55482 | Creation of Etherchannel allowed when adapter is unavailable |
IJ55484 | npiv path failure after upgrade |
IJ55485 | Passthru Error on VIOS |
IJ55486 | AIX/VIOS crashed at emfsc_npiv_scsi_cancel |
IJ55487 | sea component trace level is 7 by default. |
IJ55489 | System may crash with bad IAR at arptime() |
IJ55490 | NO -L DISPLAY WRONG VALUE |
IJ55493 | KSH MAYBE SLOW ON EXIT DUE TO CONTENTION ON /TMP |
IJ55494 | RENDEV FAILS WITH INCORRECT ERROR MESSAGE |
IJ55495 | I/O FAILURE DURING CHVG -G CAN LEAVE INCORRECT STALE BITS |
IJ55496 | OPEN AND CLOSE OF PASSIVE MWC LVS IN CONCURRENT VG MAY HANG |
IJ55497 | Output of 'lsfs -q' needs to be improved if vg is varied off |
IJ55498 | WRONG ERROR MESSAGE FROM MV COMMAND |
IJ55500 | GROUP MEMBERSHIP NOT FOUND / AT JOBS FAIL |
IJ55501 | nfsmnthelp core dumps with tcpip regression |
IJ55502 | POTENTIAL CRASH IN UDOORBELL_DESTROY (RDMA) WITH DB2 PURESCALE |
IJ55504 | curt Trace/BPT trap |
IJ55506 | LSATTR CANNOT DISPLAY FB_DELAY VALUE RANGE |
IJ55507 | RSH OR OTHERS MAY FAIL WITH FQDN IN RHOSTS FILE |
IJ55508 | IKEDB -P :LSP FUNCTION DETECTED A BAD PARAMETER |
IJ55509 | Pseudo tunnels(gre/gne/vxl) do not persist across reboot |
IJ55510 | Tunnels are failing when IKE_PRF is set to NONE |
IJ55511 | viosupgrade tool might fail for custom mksysb image. |
IJ55513 | FOC73H:mksysb restore fail if we don't pass -a during mkvg op |
IJ55514 | ICONV CAN HANG PROCESSING INPUT DATA |
IJ55515 | udapl fileset should have prerequisite on OFED fileset |
IJ55517 | viosbr restore fails in some specific cases with etherchannel |
IJ55519 | dumpcheck fails on exceeded variable values |
IJ55521 | NIMADM WITH DISK CACHING SHOWS BACKUP 0511-449 ERRORS IN PHASE 3 |
IJ55547 | DR MEMORY REMOVAL PARTIAL FAILURE ON POWER10 WITH AIX 7300-03 |
IJ55651 | NIMADM -U FAILED TO WORK WITH A MIXED LPP_SOURCE |
IJ55683 | drvars KDB command failure due to data storage interrupt |
IJ55684 | LKU failed with different error. |
IJ55686 | VIOSECURE VIEW INCORRECTLY LISTS NTP FOR ALL BLANK SERVICE |
IJ55687 | MKVGDATA INCORRECTLY SAVES ATTRIBUTES OF VG IN CONCURRENT MODE |
IJ55689 | System Crash seen during ESP testing iperf3 |
IJ55690 | DEFERD:FVTR-DEV:coredump in snmpd64v1 |
IJ55691 | trucstchk verification failed during updateios |
IJ55692 | ioslevel change for 73F to 4.1.1.20 |
IJ55693 | trustchk not updating the symlinks after switching |
IJ55695 | A potential security issue exists |
IJ55707 | iscsi memory leak |
IJ55708 | NIM KSH:0403-057 ERROR USING RSH |
IJ55744 | FOC73H:ISST:IPSEC:Coredump during ipsec device removal |
IJ55764 | NIMADM phase 6 interruption with INST_DEBUG=yes |
IJ55846 | /usr/bin/su dumped core on krb5 |
IJ55847 | NIM_RESOURCES.TAR CREATION USES EXCLUDE.ROOTVG FILE |
IJ55848 | Tunnel_create audit event printing ESP SPI as AH SPI |
IJ55849 | 'nfsd -getreplicas' does not return proper output |
IJ55850 | nfswrite() trace display incorrect write count value |
IJ55851 | A potential security issue exists |
IJ55853 | A potential security issue exists |
IJ55855 | Auditing wpar from global unable to produce audit log |
IJ55856 | 3rd LLU fails for delta vapi library versions |
IJ55858 | CAVIUM REACTION ON FLOGO FROM CISCO SWITCHES |
IJ55859 | Compiler warning about long type in place of int for ioctl macro |
IJ55860 | VLAN priority wrong for RoCEv1 packets |
IJ55897 | A potential security issue exists |
IJ55903 | A potential security issue exists |
IJ55913 | A potential security issue exists |
IJ56009 | Event not getting logged when tunnel activated by RBAC |
IJ56011 | A potential security issue exists |
IJ56012 | A potential security issue exists |
IJ56013 | LLU 2E2 : MALLOCDEBUG=report_allocations display improper stack |
IJ56147 | skctl -u is giving usage for valid value |
IJ56148 | system crashed after syncing |
IJ56149 | VIRTUALCFG CORE DUMPS WARN_USERFS |
IJ56150 | virtualcfg in vios may get coredumped |
IJ56151 | A potential security issue exists |
IJ56153 | nimadm not failing when UAK on lpar expired |
IJ56155 | TRUSTCHK DOES NOT RECOGNISE DIR IN /ETC/SECURITY/CERTIFICATES/ |
IJ56196 | Improper value observed in IPSEC_lstun for IKE tunnels |
IJ56197 | NIM client with obselete hostname fails to remove |
IJ56199 | BLK:FVLI-04D:VTD disk are defined in vios and VM failed |
IJ56200 | A potential security issue exists |
IJ56211 | A potential security issue exists |
IJ56213 | AIX LPAR may crash at fcnvme_chn_io_kthread_worker |
IJ56217 | A potential security issue exists |
IJ56218 | A potential security issue exists |
IJ56257 | lldpsync command is removing ports from lldp management. |
IJ56263 | 1U1:ISST:VIOS got crashed as part of vfcmapping/unmapping |
IJ56336 | An "891A3632" errpt entry may be reported if drive does not |
IJ56364 | viosbr -dr cluster restore is failing on 73H nodes. |
IJ56365 | viosupgrade nim version took more than 3 hou |
IJ56366 | viosupgrade restore failed from Spring 72Z |
IJ56404 | restvg fails with locked PV |
IJ56466 | mlxcentdd entstat should display all Traffic Class under [PPCNT - Priority] |
IJ56531 | IO may hang in certain target side cable pull scenarios |
IJ56533 | AIX/VIOS may crash at emfsc_strategy |
IJ56534 | A potential security issue exists |
IJ56535 | A potential security issue exists |
IJ56536 | A potential security issue exists |
IJ56537 | Warnings and Debug Msgs in nimadm operation |
IJ56538 | trustchk error message for mkauthkeys |
IJ56539 | LI1ZM:"nimadm" fails on 72Z NIM_cli from 73H NIM_mstr |
IJ56540 | update install with nimadm not failing in prop |
IJ56596 | bosinst_log error observed in 2533A_73H UPD WB |
IJ56597 | ISST:metisv2: viosupgrade nim version is failing at the u |
IJ56600 | IO may hang in certain target side cable pull scenarios |
IJ56658 | Large packet,1-socket,TCP RR throughput degradation on VEA. |
IJ56722 | 2544A_73H:bosinstlogsymbol reol failed libodm.a(shr.o |
IJ56777 | TAR AND PAX MALLOC ERRORS WHEN RESTORING SOME GNU TAR FILES |
IJ57128 | Vulnerabilities in X-server and Xorg |
Was this topic helpful?
Document Information
Modified date:
26 March 2026
UID
ibm17261416