
OPERATIONAL DEFECT DATABASE
...

...
Document VersionRelease DateDetails2April 6, 2023Revised the title and the last paragraph of the Resolution section.1March 30, 2021Original Document Release.The whitepaperGuidelines for tuning HP-UX 11i v3 to handle transient SAN path failures, states that the LUN attribute "esd_secs," that holds the time credit for an I/O operation across different retries, can be tuned to have better resilience over transient LUN path failures.In an Integrity Virtual Machine (HPVM) environment, N_Port ID Virtualization (NPIV) drives, unlike virtual drives, have multipathing control within the guest. Therefore, the guest should be able to tune "esd_secs" for resilience over transient path failures for these NPIV drives.The following may occur:"/sbin/init.d/hpvmguest start" and "/sbin/init.d/hpvmguest stop" will overwrite any pre-existing "esd_secs" setting with the value HPVMGUEST_ESD_SECS_VIRT_VAL (=300) on an HPVM vPar guest, for both NPIV and non-NPIV drives."/sbin/init.d/hpvmguest start" and "/sbin/init.d/hpvmguest stop"will overwrite any pre-existing "esd_secs" setting with the valueHPVMGUEST_ESD_SECS_DFLT_VAL (=30) on the HPVM host (VSP), for all drives.Any customized parameter in /etc/rc.config.d/hpvmguest, such as HPVMGUEST_ESD_SECS_VIRT_VAL and HPVMGUEST_ESD_SECS_DFLT_VAL are not adopted by /sbin/init.d/hpvmguest script.Below is an example of the top bullet listed above:On a vPar guest where esd_secs has been tuned manually for drive instance 12 to a value other than the default (30), the tuned esd_secs will become 300 after a guest reboot as follows:# scsimgr save_attr -Cdisk -I12 -aesd_secs=10Value of attribute esd_secs savedsuccessfully# scsimgr get_attr -Cdisk -I12 -aesd_secsSCSI ATTRIBUTES FOR LUN : disk12name = esd_secscurrent = 10default = 30saved = 10< Reboot ># scsimgr get_attr -Cdisk -I12 -aesd_secsSCSI ATTRIBUTES FOR LUN : disk12name = esd_secscurrent = 300default = 30saved = 10Note: The change to "esd_secs" is not called out in the hpvmguest init script output nor in syslog, though /var/adm/scsimgr.log will keep a record of the scsimgr command performed by the script to overwrite the value.
Any HPE Integrity system running HPVM 6.30.5, 6.40 or 6.50.
For HPVM 6.50, the following patch has been released to address the above issues:PHSS_44764 11.31 HPVM B.06.50 vmGuestLib PATCH1. Defect QXCR1001744289Default esd_secs or other guest configuration parameters are not picked from /etc/rc.config.d/hpvmguest and even manually configured values of esd_secs for drives get overwritten by system defaults at startup.2. Defect QXCR1001747563VSP defaults parameters as esd_secs for drives get overwritten to system defaults at vsp startup.IMPORTANT: After installing the above HPVM 6.50 patch, the following configuration steps may be performed on the HPVM guests. Below is relevant configurable parameters in /etc/rc.config.d/hpvmguest and details for the configuration steps.1.HPVMGUEST_NPIV_ESD_SECS_MANUAL_CONFIG_ENABLE=0It is a switch to enable/disable manual tuning of esd_secs for NPIV disks. By default, it is set to 0, meaning that manual tuning of esd_secs is disabled. Setting it to 1 tells HPVM that esd_secs for NPIV drives may have been customized so HPVM startup should not tamper with esd_secs values set for NPIV drives.2.HPVMGUEST_ESD_SECS_VIRT_VAL=300It is the designated default value of "esd_secs" for all VM guest drives and is set to 300 seconds, considering the overhead associated withvirtualization for guest IOs. This value is not expected to be changed as it is a proven value that should avoid prematurely timing out a guest I/O.At HPVM guest startup, if HPVMGUEST_NPIV_ESD_SECS_MANUAL_CONFIG_ENABLE=0, esd_secs will be set to this value (300s) for all guest disks, including both NPIV and non-NPIV drives.However, if HPVMGUEST_NPIV_ESD_SECS_MANUAL_CONFIG_ENABLE=1, the startup script will leave the esd_secs of NPIV disks untouched. As such, previously customized esd_secs values for NPIV drives will be retained.3.HPVMGUEST_ESD_SECS_DFLT_VAL=30It is the designated default value of "esd_secs" for HPVM host/VSP. On an HPVM host, when HPVM is stopped or removed, esd_secs for all VM guest drives, including both NPIV and non-NPIV disks, will be reset to this value (30s).Configuration steps after applying the patch fix to address defect QXCR1001744289 on HPVM guests:If tuning esd_secs for NPIV drives for customized multipathing control on the guest, follow the steps below.a. In /etc/rc.config.d/hpvmguest script, set HPVMGUEST_NPIV_ESD_SECS_MANUAL_CONFIG_ENABLE to 1b. Check esd_secs using scsimgr(1M) for the corresponding NPIV drives as follows:# scsimgr get_attr -D /dev/rdisk/disk5 -a esd_secsSCSI ATTRIBUTESFOR LUN : /dev/rdisk/disk5name = esd_secscurrent = 300default = 300saved =c. Set esd_secs to the desired value using scsimgr(1M) for thecorresponding NPIV drives as follows:# scsimgr save_attr -D /dev/rdisk/disk5 -a esd_secs=20Value of attribute esd_secs saved successfully# scsimgr get_attr -D /dev/rdisk/disk5 -a esd_secsSCSI ATTRIBUTESFOR LUN : /dev/rdisk/disk5name = esd_secscurrent = 20default = 300saved = 20Note: Specify "save_attr" in the first scsimgr command in setting esd_secs for the tuned value to be persistent across reboots. Otherwise, esd_secs will be set to the default (300 in the above example) on the next guest startup.PHSS_44619 (HPVM B.06.30.05 vmGuestLib patch) and PHSS_44745 (HPVM B.06.40 vmGuestLib patch) have been released to address the above issues. Note that HPVM 6.30.5 and HPVM 6.40 have both reached end of support. HPE recommends upgrading to HPVM 6.50 as soon as possible.RECEIVE PROACTIVE UPDATES: Receive support alerts (such as Customer Advisories), as well as updates on drivers, software, firmware, and customer replaceable components, proactively via e-mail through HPE Subscriber"s Choice. Sign up for Subscriber"s Choice at the following URL:Proactive Updates Subscription Form.NAVIGATION TIP: For hints on navigating HPE.com to locate the latest drivers, patches, and other support software downloads for HPE systems and Options, refer to theNavigation Tips document.SEARCH TIP: For hints on locating similar documents on HPE.com, refer to theSearch Tips Document.To search for additional advisories related to HP-UX 11iv3, use the following search string:+Advisory +ProLiant -"Software and Drivers" +HP-UX 11iv3
Operating Systems Affected:HP-UX 11.31 (IA)
No external links available for this bug
Click on a version to see all relevant bugs
Hewlett Packard Enterprise Integration
Learn more about where this data comes from
Bug Scrub Advisor
Streamline upgrades with automated vendor bug scrubs
BugZero Enterprise
Wish you caught this bug sooner? Get proactive today.