When attempting to deport the Veritas Volume Manager (VxVM) diskgroup, it failed with the below error message:
vxvm:vxconfigd: V-5-1-16251 Disk group deport of
During the mount operation of a dirty VxFS file system, the VxVM device encounters an open count leak.
Sample VxFS mount messages
# mount -t vxfs /dev/vx/dsk/
log replay in progress
replay complete - marking super-block as CLEAN
Note: Only when a VxFS log replay is performed is the issue encountered, the mount operation leads to an open count leak.
Consequently, after the VxFS file system is unmounted, the VxVM deport operation of the VxVM diskgroup fails with an open device failure.
The issue is related to a code regression for a single code change made available with the InfoScale 7.4.2 U6 patch release for Linux.
Note: Standard shutdown/reboot operations may hang due to the VxFS lock which is why a hard system reset/panic of the affected node(s) is necessary.
This can be done by executing "echo c > /proc/sysrq-trigger".
# echo c > /proc/sysrq-trigger
Veritas has recently released the following InfoScale 7.4.2.x public patch bundles for RHEL7 + RHEL8.
Public patches
Table 1.0
For InfoScale 7.4.2.x
| Platform | InfoScale 7.4.2 Update 6 Cumulative Patch | 7.4.2 U6 Component Patch | Comments |
| RHEL 7 | UPD727748 | UPD622043 | Both patch bundles are required |
| RHEL 8 | UPD398367 | UPD432726 | Both patch bundles are required |
Note: The Cumulative patch bundle must be installed first, followed by the Component patch bundle.
The component patch includes a subset of public patches for VRTSodm, VRTSvxfs and VRTSvxvm.
The public component patch bundles now supersede the below private hotfixes:
Private hotfixes
Table 2.0
For InfoScale 7.4.2.x
| Platform | VRTSvxfs | VRTSvxvm | VRTSodm |
| RHEL 7 | 7.4.2.4502 | 7.4.2.4502 | 7.4.2.4501 |
| RHEL 8 | 7.4.2.4502 | 7.4.2.4502 | 7.4.2.4501 |
Please note that Veritas Technologies LLC reserves the right to remove any fix from the targeted release if it does not pass quality assurance tests. Veritas’ plans are subject to change and any action taken by you based on the above information or your reliance upon the above information is made at your own risk.
Workaround:
Prior to mounting the suspect file system.
1.] The file system can be manually checked using the fsck -m option prior to mounting.
If the fsck -m option returns the sanity check as OK, the mount operation can continue as normal.
Example:
# /opt/VRTS/bin/fsck -t vxfs -m /dev/vx/rdsk/
UX:vxfs fsck: INFO: V-3-20915: sanity check: /dev/vx/rdsk/
# echo $?
0
fsck option
-m Reports whether the file system was marked clean and return an exit code.
A zero indicates the file system is clean, a 32 indicates that the file system needs checking.
This option does not validate the file system.
Exit codes are 33 (mounted) 32 (dirty) and 0 (clean)
If the VxFS file system is dirty, a simple fsck operation can be performed against the impacted file system.
# /opt/VRTS/bin/fsck -t vxfs /dev/vx/rdsk/