Compaq Tru64 UNIX Tru64 UNIX Version 5.0 Patch Summary and Release Notes for Patch Kit-0004 This manual contains the release notes and describes the contents of Patch Kit-0004. It provides any special instructions for installing individual patches. For information about installing or removing patches, baselining, and general patch management, see the _P_a_t_c_h _K_i_t _I_n_s_t_a_l_l_a_t_i_o_n _I_n_s_t_r_u_c_t_i_o_n_s . __________________________________________________ Compaq Computer Corporation Houston, Texas Copyright 2001 Compaq Computer Corporation COMPAQ, the Compaq logo, AlphaServer, TruCluster, ULTRIX, and VAX Registered in U.S. Patent and Trademark Office. Alpha and Tru64 are trademarks of Compaq Information Technologies Group, L.P. Motif, OSF/1, UNIX, X/Open, and The Open Group are trademarks of The Open Group. All other product names mentioned herein may be trademarks or registered trademarks of their respective companies. Confidential computer software. Valid license from Compaq required for possession, use, or copying. Consistent with FAR 12.211 and 12.212, Commercial Computer Software, Computer Software Documentation, and Technical Data for Commercial Items are licensed to the U.S. Government under vendor's standard commercial license. Compaq shall not be liable for technical or editorial errors or omissions contained herein. The information in this document is provided "as is" without warranty of any kind and is subject to change without notice. The warranties for Compaq products are set forth in the express limited warranty statements accompanying such products. Nothing herein should be construed as constituting an additional warranty. Contents About This Manual Audience ............................................ v Organization ........................................ v Related Documentation ............................... v Reader's Comments ................................... vi 1 Release Notes 1.1 Patch Process Resources ....................... 1-1 1.2 Required Storage Space ........................ 1-1 1.3 Release Note for Tru64 UNIX Patch 508.00 ...... 1-2 1.4 Release Note for Tru64 UNIX Patches 539.00 and 541.00 ........................................ 1-2 1.5 Release Note for Patch 479.00 ................. 1-3 1.5.1 PCI To Ethernet/Graphics Combo Adapter (3X-DEPVD-AA) .............................. 1-3 1.5.2 DEGPA-TA Gigabit Ethernet Device ......... 1-4 1.5.3 UFS throttle mount Option ................ 1-5 1.5.4 UFS delayed mount Option ................. 1-7 1.6 Release Note for Patch 25.00 .................. 1-8 1.7 Release Note for Patch 275.00 ................. 1-9 1.8 Release Note for Patches 335.00 and 337.00 .... 1-10 1.9 Release Note for Patch 599.00 ................. 1-14 2 Summary of Base Operating System Patches iv Contents About This Manual This manual contains information specific to Patch Kit-0004 for the Tru64 UNIX Version 5.0 operating system. It provides a list of the patches contained in each kit and provides any information for installing specific patches. For information about installing or removing patches, baselining, and general patch management, see the _P_a_t_c_h _K_i_t _I_n_s_t_a_l_l_a_t_i_o_n _I_n_s_t_r_u_c_t_i_o_n_s . _A_u_d_i_e_n_c_e This manual is for the person who installs and removes the patch kit and for anyone who manages patches after they are installed. _O_r_g_a_n_i_z_a_t_i_o_n This manual is organized as follows: ______________________________________________________________________________ Chapter 1 Contains the release notes for this patch kit. Chapter 2 Summarizes the base operating system patches included in the kit. ______________________________________________________________________________ _R_e_l_a_t_e_d _D_o_c_u_m_e_n_t_a_t_i_o_n In addition to this manual, you should be familiar with the concepts and mechanisms described in the following Tru64 UNIX documents: +o Tru64 UNIX _P_a_t_c_h _K_i_t _I_n_s_t_a_l_l_a_t_i_o_n _I_n_s_t_r_u_c_t_i_o_n_s +o Tru64 UNIX _I_n_s_t_a_l_l_a_t_i_o_n +o Tru64 UNIX _A_d_m_i_n_i_s_t_r_a_t_i_o_n +o dddduuuuppppaaaattttcccchhhh(8) Reference Page +o Any release-specific installation documentation _R_e_a_d_e_r'_s _C_o_m_m_e_n_t_s Compaq welcomes any comments and suggestions you have on this and other Tru64 UNIX manuals. You can send your comments in the following ways: +o Fax: 603-884-0120 Attn: UBPG Publications, ZK03-3/Y32 +o Internet electronic mail: rrrreeeeaaaaddddeeeerrrrssss____ccccoooommmmmmmmeeeennnntttt@@@@zzzzkkkk3333....ddddeeeecccc....ccccoooommmm A Reader's Comment form is located on your system in the following location: /usr/doc/readers_comment.txt +o Mail: Compaq Computer Corporation UBPG Publications Manager ZK03-3/Y32 110 Spit Brook Road Nashua, NH 03062-9987 Please include the following information along with your comments: +o The full title of this document. +o The section numbers and page numbers of the information on which you are commenting. +o The version of Tru64 UNIX that you are using. +o If known, the type of processor that is running the Tru64 UNIX software. The Tru64 UNIX Publications group cannot respond to system problems or technical support inquiries. Please address technical questions to your local system vendor or to the appropriate Compaq technical support office. Information provided with the software media explains how to send problem reports to Compaq. vi About This Manual Release Notes 1 This chapter provides information that you must be aware of when working with Tru64 UNIX Version 5.0 Patch Kit-0004. _1._1 _P_a_t_c_h _P_r_o_c_e_s_s _R_e_s_o_u_r_c_e_s Compaq provides Web sites to help you with the patching process: +o To obtain the lastest patch kit for your operating system and cluster: hhhhttttttttpppp::::////////ffffttttpppp1111....ssssuuuuppppppppoooorrrrtttt....ccccoooommmmppppaaaaqqqq....ccccoooommmm////ppppuuuubbbblllliiiicccc////uuuunnnniiiixxxx//// +o To view or print the lastest version of the _P_a_t_c_h _K_i_t _I_n_s_t_a_l_l_a_t_i_o_n _I_n_s_t_r_u_c_t_i_o_n_s or the _P_a_t_c_h _S_u_m_m_a_r_y _a_n_d _R_e_l_e_a_s_e _N_o_t_e_s for a specific patch kit: hhhhttttttttpppp::::////////wwwwwwwwwwww....ttttrrrruuuu66664444uuuunnnniiiixxxx....ccccoooommmmppppaaaaqqqq....ccccoooommmm////ffffaaaaqqqqssss////ppppuuuubbbblllliiiiccccaaaattttiiiioooonnnnssss////ppppaaaattttcccchhhh//// +o To visit Compaq's main support page: hhhhttttttttpppp::::////////wwwwwwwwwwww....ccccoooommmmppppaaaaqqqq....ccccoooommmm////ssssuuuuppppppppoooorrrrtttt////iiiinnnnddddeeeexxxx....sssshhhhttttmmmmllll +o To visit the Tru64 UNIX homepage: hhhhttttttttpppp::::////////wwwwwwwwwwww....ttttrrrruuuu66664444uuuunnnniiiixxxx....ccccoooommmmppppaaaaqqqq....ccccoooommmm//// _1._2 _R_e_q_u_i_r_e_d _S_t_o_r_a_g_e _S_p_a_c_e The following storage space is required to successfully install this patch kit: _B_a_s_e _O_p_e_r_a_t_i_n_g _S_y_s_t_e_m +o Temporary Storage Space A total of ~250 MB of storage space is required to untar this patch kit. It is recommended that this kit not be placed in the ////, ////uuuussssrrrr, or ////vvvvaaaarrrr file systems because this may unduly constrain the available storage space for the patching activity. +o Permanent Storage Space Up to ~31 MB of storage space in ////vvvvaaaarrrr////aaaaddddmmmm////ppppaaaattttcccchhhh////bbbbaaaacccckkkkuuuupppp may be required for archived original files if you choose to install and revert all patches. See the _P_a_t_c_h _K_i_t _I_n_s_t_a_l_l_a_t_i_o_n _I_n_s_t_r_u_c_t_i_o_n_s for more information. Up to ~32 MB of storage space in ////vvvvaaaarrrr////aaaaddddmmmm////ppppaaaattttcccchhhh may be required for original files if you choose to install and revert all patches. See _P_a_t_c_h _K_i_t _I_n_s_t_a_l_l_a_t_i_o_n _I_n_s_t_r_u_c_t_i_o_n_s for more information. Up to ~881 KB of storage space is required in ////vvvvaaaarrrr////aaaaddddmmmm////ppppaaaattttcccchhhh////ddddoooocccc for patch abstract and README documentation. A total of ~168 KB of storage space is needed in ////uuuussssrrrr////ssssbbbbiiiinnnn////dddduuuuppppaaaattttcccchhhh for the patch management utility. _1._3 _R_e_l_e_a_s_e _N_o_t_e _f_o_r _T_r_u_6_4 _U_N_I_X _P_a_t_c_h _5_0_8._0_0 This patch contains changes to the rrrreeeexxxxeeeeccccdddd reference page. OPTIONS -s Causes rexecd to check for the ptys keyword in the /etc/securettys file and to deny execution of the request if it is from root and on a pseudoterminal. DESCRIPTION 6. The rexecd server then validates the user as is done at login time and, if started with the -s option, verifies that the /etc/securettys file is not setup to deny the user. If the authentication was suc- cessful, rexecd changes to the user's home directory, and establishes the user and group protections for the user. If any of these steps fail, the connection is aborted with a diagnostic message returned. _1._4 _R_e_l_e_a_s_e _N_o_t_e _f_o_r _T_r_u_6_4 _U_N_I_X _P_a_t_c_h_e_s _5_3_9._0_0 _a_n_d _5_4_1._0_0 This patch delivers version V1.0-032 of the libots3 library. Version 2.0 of the libots3 library is delivered with the Compaq FORTRAN Compiler, Versions 5.3 ECO1 and 5.4, or the Developers Tool Kit (DTK) (OTABASE subset). If libots3 V2.0 is already installed on your system, and you install this patch, you will receive the following informational message: PPPPrrrroooobbbblllleeeemmmm iiiinnnnssssttttaaaalllllllliiiinnnngggg:::: ---- TTTTrrrruuuu66664444____UUUUNNNNIIIIXXXX____VVVV4444....0000GGGG //// SSSSooooffffttttwwwwaaaarrrreeee DDDDeeeevvvveeeellllooooppppmmmmeeeennnntttt EEEEnnnnvvvviiiirrrroooonnnnmmmmeeeennnntttt PPPPaaaattttcccchhhheeeessss:::: PPPPaaaattttcccchhhh 00000000XXXXXXXXXXXX....00000000 ---- FFFFiiiixxxx ffffoooorrrr ppppaaaarrrraaaalllllllleeeellll pppprrrroooocccceeeessssssssiiiinnnngggg ssssuuuuppppppppoooorrrrtttt lllliiiibbbbrrrraaaarrrryyyy \\\\&&&&....////uuuussssrrrr////sssshhhhlllliiiibbbb////lllliiiibbbboooottttssss3333....ssssoooo:::: iiiissss iiiinnnnssssttttaaaalllllllleeeedddd bbbbyyyy:::: 1-2 Release Notes OOOOTTTTAAAABBBBAAAASSSSEEEE222211112222 aaaannnndddd ccccaaaannnn nnnnooootttt bbbbeeee rrrreeeeppppllllaaaacccceeeedddd bbbbyyyy tttthhhhiiiissss ppppaaaattttcccchhhh.... TTTThhhhiiiissss ppppaaaattttcccchhhh wwwwiiiillllllll nnnnooootttt bbbbeeee iiiinnnnssssttttaaaalllllllleeeedddd.... To determine what version of libots3 library is installed on your system, execute the following command: # wwwwhhhhaaaatttt ////uuuussssrrrr////sssshhhhlllliiiibbbb////lllliiiibbbboooottttssss3333....ssssoooo lllliiiibbbboooottttssss3333....ssssoooo:::: lllliiiibbbboooottttssss3333....aaaa VVVV2222....0000----000099994444 GGGGEEEEMMMM 22227777 FFFFeeeebbbb 2222000000001111 _1._5 _R_e_l_e_a_s_e _N_o_t_e _f_o_r _P_a_t_c_h _4_7_9._0_0 This patch provides information for Patch 479.00. _1._5._1 _P_C_I _T_o _E_t_h_e_r_n_e_t/_G_r_a_p_h_i_c_s _C_o_m_b_o _A_d_a_p_t_e_r (_3_X-_D_E_P_V_D-_A_A) This patch provides the driver support for the PCI To Ethernet/Graphics Combo Adapter (3X-DEPVD-AA) (also known as the ITI6021E Fast Ethernet NIC 3D Video Combination Adapter, InterServer Combo, or JIB). In order to obtain full support for the PCI To Ethernet/Graphics Combo Adapter (3X-DEPVD-AA), you must also select Patch 58.00, which is the X server portion of the patch. If you have a system with this adapter, you will need to reconfigure and rebuild the kernel after installing this patch. To do this, follow these steps: 1. Shut down the system: #### ////uuuussssrrrr////ssssbbbbiiiinnnn////sssshhhhuuuuttttddddoooowwwwnnnn ----hhhh nnnnoooowwww 2. Boot genvmunix to single-user mode: >>>>>>>>>>>> bbbbooooooootttt ----ffffiiii ggggeeeennnnvvvvmmmmuuuunnnniiiixxxx ----ffffllll ssss 3. After the system boots to single-user mode, mount the file systems, run the uuuuppppddddaaaatttteeee command, and activate the swap partition: #### ssssbbbbiiiinnnn////bbbbcccchhhheeeecccckkkkrrrrcccc #### ////ssssbbbbiiiinnnn////uuuuppppddddaaaatttteeee #### ////ssssbbbbiiiinnnn////sssswwwwaaaappppoooonnnn ----aaaa 4. Run ddddooooccccoooonnnnffffiiiigggg to create a new kernel configuration file and rebuild the kernel: #### #### ////uuuussssrrrr////ssssbbbbiiiinnnn////ddddooooccccoooonnnnffffiiiigggg Release Notes 1-3 _N_o_t_e Do not specify the ----cccc option to ddddooooccccoooonnnnffffiiiigggg. If you do, ddddooooccccoooonnnnffffiiiigggg will use the existing kernel configuration file which will not have the appropriate controller entry for the PCI To Ethernet/Graphics Combo Adapter. 5. Save the old ////vvvvmmmmuuuunnnniiiixxxx file and move the new kernel to ////vvvvmmmmuuuunnnniiiixxxx. 6. Shut down the system: #### ////uuuussssrrrr////ssssbbbbiiiinnnn////sssshhhhuuuuttttddddoooowwwwnnnn ----hhhh nnnnoooowwww 7. Boot the new kernel: >>>>>>>>>>>> bbbbooooooootttt If you remove this patch from your system after you have rebuilt the kernel to incorporate support for the PCI To Ethernet/Graphics Combo Adapter as described previously, you will need to rebuild the kernel again to restore generic VGA graphics support. To do this, follow the steps described previously. If you run ddddooooccccoooonnnnffffiiiigggg on the original, unpatched genvmunix, it will not recognize the PCI To Ethernet/Graphics Combo Adapter and will include generic VGA graphics support in the resulting kernel. _1._5._2 _D_E_G_P_A-_T_A _G_i_g_a_b_i_t _E_t_h_e_r_n_e_t _D_e_v_i_c_e This patch provides support for DEGPA-TA (1000BaseT) Gigabit Ethernet device. If you have a system with this new Ethernet device, you will need to reconfigure and rebuild the kernel after installing this patch. To do this, follow these steps: 1. Shut down the system: # ////uuuussssrrrr////ssssbbbbiiiinnnn////sssshhhhuuuuttttddddoooowwwwnnnn ----hhhh nnnnoooowwww 2. Boot genvmunix to single-user mode: >>> bbbbooooooootttt ----ffffiiii ggggeeeennnnvvvvmmmmuuuunnnniiiixxxx ----ffffllll ssss 3. After the system boots to single-user mode, mount the file systems, run the uuuuppppddddaaaatttteeee command, and activate the swap partition: # ////ssssbbbbiiiinnnn////bbbbcccchhhheeeecccckkkkrrrrcccc # ////ssssbbbbiiiinnnn////uuuuppppddddaaaatttteeee # ////ssssbbbbiiiinnnn////sssswwwwaaaappppoooonnnn ----aaaa 1-4 Release Notes 4. Run ddddooooccccoooonnnnffffiiiigggg to create a new kernel configuration file and rebuild the kernel: # ////uuuussssrrrr////ssssbbbbiiiinnnn////ddddooooccccoooonnnnffffiiiigggg _N_o_t_e Do not specify the ----cccc option to ddddooooccccoooonnnnffffiiiigggg. If you do, ddddooooccccoooonnnnffffiiiigggg will use the existing kernel configuration file which will not have the appropriate controller entry for the new graphics card. 5. Save the old ////vvvvmmmmuuuunnnniiiixxxx file and move the new kernel to ////vvvvmmmmuuuunnnniiiixxxx. 6. Shut down the system: # ////uuuussssrrrr////ssssbbbbiiiinnnn////sssshhhhuuuuttttddddoooowwwwnnnn ----hhhh nnnnoooowwww 7. Boot the new kernel: >>> bbbbooooooootttt If you remove this patch from your system after you have rebuilt the kernel to incorporate support for the new Ethernet card as described previously, you will need to rebuild the kernel. To do this, follow the steps given previously. The ddddooooccccoooonnnnffffiiiigggg running on the original, unpatched genvmunix will not recognize the new Ethernet driver. _1._5._3 _U_F_S _t_h_r_o_t_t_l_e _m_o_u_n_t _O_p_t_i_o_n A new mmmmoooouuuunnnntttt option, tttthhhhrrrroooottttttttlllleeee, has been added in this patch. To activate this new option, update your ////eeeettttcccc////ffffssssttttaaaabbbb entries to enable the selected mmmmoooouuuunnnntttt option (tttthhhhrrrroooottttttttlllleeee) on the selected UFS filesystems. For example, change from: ////ddddeeeevvvv////ddddiiiisssskkkk////ddddsssskkkk11112222eeee ////mmmmnnnntttt////tttteeeesssstttt uuuuffffssss rrrrwwww 0000 2222 to: ////ddddeeeevvvv////ddddiiiisssskkkk////ddddsssskkkk11112222eeee ////mmmmnnnntttt////tttteeeesssstttt uuuuffffssss rrrrwwww,,,,tttthhhhrrrroooottttttttlllleeee 0000 2222 Append to////eeeettttcccc////ssssyyyyssssccccoooonnnnffffiiiiggggttttaaaabbbb any tuning changes. Refer to the Tuning notes that follow for a description of the new iiiioooo----tttthhhhrrrroooottttttttlllleeee----sssshhhhiiiifffftttt and iiiioooo----tttthhhhrrrroooottttttttlllleeee---- mmmmaaaaxxxxmmmmzzzztttthhhhrrrruuuuppppuuuutttt tunables. These tunables are configured in the vvvvffffssss stanza. The following three lines make up an example: vfs: io-throttle-shift = 1 io-throttle-maxmzthruput = 1 _N_o_t_e Release Notes 1-5 If you already have a vvvvffffssss stanza in your ssssyyyyssssccccoooonnnnffffiiiiggggttttaaaabbbb file, then just add the two iiiioooo----tttthhhhrrrroooottttttttlllleeee entries. When removing this patch, be sure to remove any additions to ////eeeettttcccc////ffffssssttttaaaabbbb you may have made (see previous instructions). Failure to remove ////eeeettttcccc////ffffssssttttaaaabbbb modifications may result in uuuunnnnkkkknnnnoooowwwwnnnn aaaattttttttrrrriiiibbbbuuuutttteeee messages, particularly upon system reboot. _T_u_n_i_n_g The purpose of this patch is to minimize system stalls resulting from a heavy system I/O load. I/O throttling addresses the concern of locking dirty pages on the device queue. It enforces a limit on the number of delayed I/O requests allowed to be on the device queue at any point in time. This allows the system to be more responsive to any synchronous requests added to the device queue, such as a read or the loading of a new program into memory. This may decrease the duration of process stalls for specific dirty buffers, as pages remain available until placed on the device queue. The relevant tunable variables are as follows: iiiioooo----tttthhhhrrrroooottttttttlllleeee----sssshhhhiiiifffftttt The greater the number of requests on an I/O device queue, the longer the time required to process those requests and make those pages and device available. The number of concurrent delayed I/O requests on an I/O device queue can be throttled by setting the iiiioooo----tttthhhhrrrroooottttttttlllleeee----sssshhhhiiiifffftttt tunable. The throttle value is based on this tunable and the calculated I/O completion rate. The throttle value is proportional to the time required to process the I/O device queue. The correspondences between iiiioooo----tttthhhhrrrroooottttttttlllleeee----sssshhhhiiiifffftttt values and the time to process the device queue areas follows: io-throttle-shift time to process device queue (sec) ---------- ----------------------------------------------------------- -2 0.25 -1 0.5 0 1 1 2 2 4 For example, an iiiioooo----tttthhhhrrrroooottttttttlllleeee----sssshhhhiiiifffftttt value of 0 corresponds to accommodating 1 second of I/O requests. The valid range for this tunable is [-4..4] (not all values are shown in the above table; you can extrapolate). The default value of iiiioooo----tttthhhhrrrroooottttttttlllleeee----sssshhhhiiiifffftttt is 1. Environments particularly sensitive to delays in accessing the I/O device might consider reducing the iiiioooo----tttthhhhrrrroooottttttttlllleeee----sssshhhhiiiifffftttt value. iiiioooo----mmmmaaaaxxxxmmmmzzzztttthhhhrrrruuuuppppuuuutttt This is a toggle which trades off maximizing I/O throughput against maximizing the availability of dirty pages. Maximizing I/O throughput works more 1-6 Release Notes aggressively to keep the device busy, but within the constraints of the throttle. Maximizing the availability of dirty pages is more aggressive at decreasing stall time experienced when waiting for dirty pages. The environment in which you might consider setting iiiioooo----mmmmaaaaxxxxmmmmzzzztttthhhhrrrruuuuppppuuuutttt to off (0) is one in which I/O is confined to a small number of I/O intensive applications, such that access to a specific set of pages becomes more important for overall performance than does keeping the I/O device busy. The default value of iiiioooo----mmmmaaaaxxxxmmmmzzzztttthhhhrrrruuuuppppuuuutttt is 1. Environments particularly sensitive to delays in accessing sets of frequently used dirty pages might consider setting iiiioooo----mmmmaaaaxxxxmmmmzzzztttthhhhrrrruuuuppppuuuutttt to 0. iiiioooo----tttthhhhrrrroooottttttttlllleeee----ssssttttaaaattttiiiicccc If nonzero, the device queue limit is set to this value and it is not dynamically altered. _1._5._4 _U_F_S _d_e_l_a_y_e_d _m_o_u_n_t _O_p_t_i_o_n This new mmmmoooouuuunnnntttt option, ddddeeeellllaaaayyyyeeeedddd, allows for disabling synchronous metadata writes on a specified filesystem. To maintain the file system's consistency, UFS metadata (such as inode, directory, and indirect blocks) is updated synchronously by default. Metadata updates are typically performed synchronously to prevent filesystem corruption after a crash. The trade-off for this filesystem integrity, however, is performance. In some cases, such as a filesystem serving as a cache, performance (faster metadata update) is more important than preserving data consistency across a system crash; for example, files under ////ttttmmmmpppp or web proxy servers such as Squid. This means two things. One is that multiple updates to one block becomes only one block write, as opposed to multiple writes of the same block with traditional synchronous metadata update. The other is that users can experience much better responsiveness when they run metadata intensive applications because metadata writes will not go out to the disk immediately while users get their prompt back as soon as the metadata updates are queued. This ddddeeeellllaaaayyyyeeeedddd option should not be used on the //// or ////uuuussssrrrr filesystems. It should be used only on filesystems that do not need to survive across a system crash. To enable the ddddeeeellllaaaayyyyeeeedddd option, run: mmmmoooouuuunnnntttt ----oooo ddddeeeellllaaaayyyyeeeedddd or mmmmoooouuuunnnntttt ----uuuu ----oooo ddddeeeellllaaaayyyyeeeedddd mmmmoooouuuunnnntttt ----uuuu ----oooo ddddeeeellllaaaayyyyeeeedddd Release Notes 1-7 _1._6 _R_e_l_e_a_s_e _N_o_t_e _f_o_r _P_a_t_c_h _2_5._0_0 This patch removes a Granularity Hint Regions (also called GH chunks) restriction which may be encountered on AlphaServer DS20 and ES40 systems running the Tru64 UNIX 5.0 release. This restriction can reduce performance for certain data base applications. The following error message on the system's console terminal (also logged in ////vvvvaaaarrrr////aaaaddddmmmm////mmmmeeeessssssssaaaaggggeeeessss) indicates possible performance loss for applications using GH chunks: gggghhhh____cccchhhhuuuunnnnkkkkssss vvvvaaaalllluuuueeee ooooffff #### iiiinnnnvvvvaaaalllliiiidddd where # is a number which varies depending on memory size. To remove the GH chunks restriction you need to modify your target kernel configuration file (and rebuild the kernel) and change the state of a console firmware environment variable. Use the following procedure to make these changes: 1. Follow the steps the _G_u_i_d_e _t_o _S_y_s_t_e_m _A_d_m_i_n_s_t_r_a_t_i_o_n, with the following exceptions: In step 4, edit the configuration file and add the following line: mmmmaaaakkkkeeeeooooppppttttiiiioooonnnnssss LLLLOOOOAAAADDDDAAAADDDDDDDDRRRR====""""ffffffffffffffffffffcccc0000000000000000444433330000000000000000"""" just before the first line starting with mmmmaaaakkkkeeeeooooppppttttiiiioooonnnnssss. In step 6, instead of ////uuuussssrrrr////ssssbbbbiiiinnnn////sssshhhhuuuuttttddddoooowwwwnnnn ----rrrr nnnnoooowwww, add the following: ////uuuussssrrrr////ssssbbbbiiiinnnn////sssshhhhuuuuttttddddoooowwwwnnnn ----hhhh nnnnoooowwww 2. Check the console firmware version: PPPP00000000>>>>>>>>>>>>sssshhhhoooowwww vvvveeeerrrrssssiiiioooonnnn If the version is not V5.5 or later, you need to upgrade your firmware to V5.5 or later. 3. Change the value of the console_memory_allocation environment variable from oooolllldddd to nnnneeeewwww and reset the system: PPPP00000000>>>>>>>>>>>>sssseeeetttt ccccoooonnnnssssoooolllleeee____mmmmeeeemmmmoooorrrryyyy____aaaallllllllooooccccaaaattttiiiioooonnnn nnnneeeewwww PPPP00000000>>>>>>>>>>>>iiiinnnniiiitttt 4. Boot the new kernel: PPPP00000000>>>>>>>>>>>>bbbbooooooootttt In the unlikely event the new kernel fails to boot: 1-8 Release Notes PPPP00000000>>>>>>>>>>>>sssseeeetttt ccccoooonnnnssssoooolllleeee____mmmmeeeemmmmoooorrrryyyy____aaaallllllllooooccccaaaattttiiiioooonnnn oooolllldddd PPPP00000000>>>>>>>>>>>>iiiinnnniiiitttt PPPP00000000>>>>>>>>>>>>bbbbooooooootttt ----ffffiiii vvvvmmmmuuuunnnniiiixxxx....ssssaaaavvvveeee or: PPPP00000000>>>>>>>>>>>>bbbbooooooootttt ----ffffiiii ggggeeeennnnvvvvmmmmuuuunnnniiiixxxx Correct the error and repeat the above procedure. _A_d_d_i_t_i_o_n_a_l _I_n_f_o_r_m_a_t_i_o_n +o If you encounter the following error message, you have most likely attempted to boot a kernel with the old load address: BBBBoooooooottttssssttttrrrraaaapppp aaaaddddddddrrrreeeessssssss ccccoooolllllllliiiissssiiiioooonnnn,,,, iiiimmmmaaaaggggeeee llllooooaaaaddddiiiinnnngggg aaaabbbboooorrrrtttteeeedddd To boot old kernels: PPPP00000000>>>>>>>>>>>>sssseeeetttt ccccoooonnnnssssoooolllleeee____mmmmeeeemmmmoooorrrryyyy____aaaallllllllooooccccaaaattttiiiioooonnnn oooolllldddd PPPP00000000>>>>>>>>>>>>iiiinnnniiiitttt PPPP00000000>>>>>>>>>>>>bbbbooooooootttt _N_o_t_e The generic kernel (////ggggeeeennnnvvvvmmmmuuuunnnniiiixxxx) will boot with ccccoooonnnnssssoooolllleeee____mmmmeeeemmmmoooorrrryyyy____aaaallllllllooooccccaaaattttiiiioooonnnn set to old or new. +o The patch kit installs a new ////uuuussssrrrr////ssssbbbbiiiinnnn////ssssiiiizzzzeeeerrrr command. If you rebuild the kernel using section 4.5.1 or 4.5.2 of the _G_u_i_d_e _t_o _S_y_s_t_e_m _A_d_m_i_n_i_s_t_r_a_t_i_o_n, the new sizer will automatically adjust the kernel's load address. _N_o_t_e If you customized your existing configuration file, ddddooooccccoooonnnnffffiiiigggg allows you to edit the new configuration file so you can restore your customizations. _1._7 _R_e_l_e_a_s_e _N_o_t_e _f_o_r _P_a_t_c_h _2_7_5._0_0 For more information about the functionality provided and special installation instructions related to Patch 275.00, please refer to the online README file located at: hhhhttttttttpppp::::////////wwwwwwwwwwww....sssseeeerrrrvvvviiiicccceeee....ddddiiiiggggiiiittttaaaallll....ccccoooommmm////ppppaaaattttcccchhhheeeessss//// Release Notes 1-9 From this URL directory, click on the link that has the name: tttt66664444vvvv55550000wwwwllllsssseeeeccccoooo2222....RRRREEEEAAAADDDDMMMMEEEE _N_o_t_e It may be necessary to navigate additional directories below this top-level URL to find the specific RRRREEEEAAAADDDDMMMMEEEE file related to this patch. _1._8 _R_e_l_e_a_s_e _N_o_t_e _f_o_r _P_a_t_c_h_e_s _3_3_5._0_0 _a_n_d _3_3_7._0_0 This release notes contains the new reference page for ttttttttaaaauuuutttthhhh. NAME ttauth - ToolTalk authority file utility SYNOPSIS ttauth [[-f] | [authfile] ] [[-vqib] ] [[command arg ...] ] DESCRIPTION The ttauth program is used to edit and display the authorization information used in connecting to ToolTalk. This program is usually used to extract authorization records from one machine and merge them in on another (as is the case when using remote logins or granting access to other users). Commands (described below) may be entered interactively, on the ttauth command line, or in scripts. Note that this program does not contact the ToolTalk server, ttsession. Normally ttauth is not used to create the authority file entry in the first place; ttsession does that. OPTIONS The following options may be used with ttauth. They may be given individually or may combined. -f authfile This option specifies the name of the authority file to use. By default, ttauth uses the file specified by the TTAUTHORITY environment variable or the .TTauthority file in the user's home directory. -q This option indicates that ttauth should operate quietly and not print unsolicited status messages. This is the default if an ttauth command is given on the command line or if the standard output is not directed to a terminal. -v This option indicates that ttauth should operate verbosely and print status messages indicating the results of various operations (for example, how many records have been read in or written out). This is the default if ttauth is reading commands 1-10 Release Notes from its standard input and its standard output is directed to a terminal. -i This option indicates that ttauth should ignore any authority file locks. Normally, ttauth refuses to read or edit any authority files that have been locked by other programs (usually ttsession or another ttauth). -b This option indicates that ttauth should attempt to break any authority file locks before proceeding. Use this option only to clean up stale locks. COMMANDS The following commands may be used to manipulate authority files: add protoname protodata netid authname authdata An authorization entry for the indicated ToolTalk session using the given protocol name (protoname), protocol data (protodata), ToolTalk session id (netid), authentication name (authname), and authentication data (authdata) is added to the authorization file. The protocol name should always be the string "TT". The protocol data should always be the empty string. The ToolTalk session ID is formatted string consisting of the ttsession program number, the ttsession authorization level, the IP address of the host running ttsession, and the RPC version number of the ttsession. See the TTSESSION IDENTIFIERS section below for information on constructing ToolTalk session ID's for the authority file. The authentication name should always be the string "MIT-MAGIC- COOKIE-1". The authentication data is specified as an even- lengthed string of hexadecimal digits, each pair representing one octet. The first digit of each pair gives the most significant 4 bits of the octet, and the second digit of the pair gives the least significant 4 bits. For example, a 32 character hexkey would represent a 128-bit value. [n]extract filename Authorization entries which match the specified fields are written to the indicated file. If the nextract command is used, the entries are written in a numeric format suitable for non- binary transmission (such as secure electronic mail). The extracted entries can be read back in using the merge and nmerge commands. If the file name consists of just a single dash, the entries will be written to the standard output. [n]list Authorization entries which match the specified fields (or all if nothing is specified) are printed on the standard output. If the nlist command is used, entries are shown in the numeric format used by the nextract command; otherwise, they are shown in a textual format. Key data is always displayed in the hexadecimal format given in the description of the add command. Release Notes 1-11 [n]merge [filename1 ...] Authorization entries are read from the specified files and are merged into the authorization database, superseding any matching existing entries. If the nmerge command is used, the numeric format given in the description of the extract command is used. If a file name consists of just a single dash, the standard input will be read if it hasn't been read before. remove Authorization entries which match the specified fields are removed from the authority file. source filename The specified file is treated as a script containing ttauth commands to execute. Blank lines and lines beginning with a pound sign (#) are ignored. A single dash may be used to indicate the standard input, if it has not already been read. info Information describing the authorization file, whether or not any changes have been made, and from where ttauth commands are being read is printed on the standard output. exit If any modifications have been made, the authority file is written out (if allowed), and the program exits. An end of file is treated as an implicit exit command. quit The program exits, ignoring any modifications. This may also be accomplished by pressing the interrupt character. help [string] A description of all commands that begin with the given string (or all commands if no string is given) is printed on the standard output. ? A short list of the valid commands is printed on the standard output. TTSESSION IDENTIFIERS The ToolTalk session identifiers (netid) in the authority file and used by the add, [n]extract, [n]list, and remove commands are derived from the TT_SESSION identifier constructed by ttsession at startup. The ttsession rendezvous with clients by writing the TT_SESSION identifier as a property on the root window or as an environment variable in the client's environment (see ttsession -c). In addition, ttsession creates an entry in the user's authority file. The authority file entry has a netid component which is derived from the TT_SESSION identifier. The TT_SESSION(STRING) = "01 1433 1342177279 1 1 2002 130.105.9.22 4" identifier is composed of the following elements: 1-12 Release Notes = 01 = 1433 = 1342177279 = 1 = 1 = 2002 = 130.105.9.22 = 4 The ToolTalk session identifiers (netid) in the authority file are composed of the , , , and fields of the TT_SESSION identifier as follows: 1342177279/1/130.105.9.22/4 EXAMPLE The most common use for ttauth is to extract the entry for the current ttsession, copy it to another machine, and merge it into the user's authority file on the remote machine: % xprop -root | grep TT_SESSION TT_SESSION(STRING) = "01 1433 1342177279 1 1 2002 130.105.9.22 4" _SUN_TT_SESSION(STRING) = "01 1433 1342177279 1 1 2002 130.105.9.22 4" % ttauth extract - netid=1342177279/1/130.105.9.22/4 | rsh otherhost ttauth merge - ENVIRONMENT This ttauth program uses the following environment variables: TTAUTHORITY Gets the name of the authority file to use if the -f option is not used. FILES .TTauthority Default authority file in the user's home directory if TTAUTHORITY is not defined. RESTRICTIONS Users that have unsecure networks should take care to use encrypted file transfer mechanisms to copy authorization entries between machines. Similarly, the MIT-MAGIC-COOKIE-1 protocol is not very useful in unsecure environments. Sites that are interested in additional security may need to use encrypted authorization mechanisms such as Kerberos. Spaces are currently not allowed in the protocol name. Quoting could be added for the truly perverse. Release Notes 1-13 SEE ALSO Commands: ttsession(1) ToolTalk Reference Manual The options section of the ttsession manpage should now look like this: -a level Set the server authentication level. The following level string values are supported: cookie The sender and receiver must share the same cookie. This means that messages which do not specify a handler "ptype" are delivered even if the cookies do not match. This is the default authorization scheme. For "full security" use the -F option. Refer to the ttauth(1) reference page for more information. _1._9 _R_e_l_e_a_s_e _N_o_t_e _f_o_r _P_a_t_c_h _5_9_9._0_0 This patch contains a solution for the following issue: Compaq has advised owners of DS10, DS10L, ES40 AlphaServers, and XP900 AlphaStations that Compaq has determined in laboratory testing that there is a theoretical possibility that during read and write operations to the floppy disk on these systems, a single byte of data may be inaccurately read or written without notice to the user or system. The potential for this anomaly exists only if floppy disk read or write operations are attempted while there is extremely heavy traffic on these Alpha systems' internal input/output busses. Although Compaq has observed the anomaly only in laboratory tests designed to create atypical system stresses, including almost constant use of the floppy disk drive, Compaq has informed owners of the remote possibility that the anomaly could occur so that they may take precautions to prevent it. Compaq recommends that the solution be installed by all DS10, DS10L, ES40 AlphaServers, and XP900 AlphaStation customers. The solution to this issue is also available as an individual, manually installed patch kit named ffffllllooooppppppppyyyy____ccccsssspppp____vvvv55550000....ttttaaaarrrr....ggggzzzz, available from: hhhhttttttttpppp::::////////ffffttttpppp1111....ssssuuuuppppppppoooorrrrtttt....ccccoooommmmppppaaaaqqqq....ccccoooommmm////ppppuuuubbbblllliiiicccc////uuuunnnniiiixxxx////vvvv5555....0000 1-14 Release Notes Summary of Base Operating System Patches 2 This chapter summarizes the base operating system patches included in Patch Kit-0004. Table 2-1 lists patches that have been updated. Table 2-2 provides a summary of patches in Patch Kit-0004. _T_a_b_l_e _2-_1: _U_p_d_a_t_e_d _B_a_s_e _O_p_e_r_a_t_i_n_g _S_y_s_t_e_m _P_a_t_c_h_e_s ______________________________________________________________________________ PPPPaaaattttcccchhhh IIIIDDDDssss CCCChhhhaaaannnnggggeeee SSSSuuuummmmmmmmaaaarrrryyyy ______________________________________________________________________________ Patches 490.00, 494.00, 508.00, 510.00, 515.00, New 519.00, 523.00, 525.00, 527.00, 529.00, 531.00, 533.00, 537.00, 539.00, 541.00, 543.00, 547.00, 551.00, 556.00, 560.00, 562.00, 564.00, 566.00, 568.00, 572.00, 574.00, 580.00, 584.00, 588.00, 590.00, 593.00, Patches 33.00, 401.00, 131.00, 153.00 Superseded by Patch 444.00 Patches 43.00, 30.00, 95.00, 70.00, 276.00, Superseded by Patch 479.00 277.00, 278.00, 279.00, 280.00, 282.00, 2.00, 3.00, 6.00, 9.00, 10.00, 13.00, 31.00, 44.00, 47.00, 48.00, 64.00, 80.00, 83.00, 91.00, 93.00, 98.00, 101.00, 108.00, 112.00, 120.00, 127.00, 128.00, 129.00, 65.00, 88.00, 94.00, 97.00, 49.00, 132.00, 114.00, 14.00, 17.00, 74.00, 92.00, 100.00, 103.00, 119.00, 7.00, 139.00, 12.00, 104.00, 96.00, 20.00, 45.00, 51.00, 143.00, 73.00, 5.00, 76.00, 84.00, 113.00, 141.00, 135.00, 4.00, 130.00, 156.00, 157.00, 158.00, 159.00, 160.00, 161.00, 162.00, 163.00, 164.00, 165.00, 166.00, 167.00, 168.00, 169.00, 170.00, 171.00, 172.00, 173.00, 174.00, 175.00, 176.00, 177.00, 178.00, 179.00, 180.00, 181.00, 182.00, 183.00, 184.00, 185.00, 186.00, 187.00, 188.00, 189.00, 190.00, 191.00, 192.00, 193.00, 194.00, 195.00, 196.00, 197.00, 198.00, 199.00, 200.00, 201.00, 202.00, 203.00, 204.00, 205.00, 206.00, 207.00, 208.00, 209.00, 210.00, 211.00, 212.00, 213.00, 214.00, 215.00, 216.00, 217.00, 218.00, 219.00, 220.00, 221.00, 222.00, 223.00, 225.00, 445.00, 446.00, 447.00, 448.00, 449.00, 450.00, 451.00, 452.00, 453.00, 454.00, 455.00, 456.00, 457.00, 458.00, 459.00, 460.00, 461.00, 462.00, 463.00, 464.00, 465.00, 466.00, 467.00, 468.00, 469.00, 470.00, 471.00, 472.00, 473.00, 474.00, 475.00, 476.00, 477.00 Patch 321.00 Superseded by Patch 481.00 Patches 102.00, 121.00, 236.00, 237.00, 238.00, Superseded by Patch 488.00 239.00, 240.00, 241.00, 242.00, 243.00, 245.00, 482.00, 483.00, 484.00, 485.00, 486.00 Patches 136.00, 252.00, 254.00 Superseded by Patch 492.00 Patches 26.00, 495.00, 496.00 Superseded by Patch 498.00 Patches 32.00, 270.00, 499.00 Superseded by Patch 501.00 Patches 15.00, 23.00, 502.00 Superseded by Patch 504.00 Patches 36.00, 58.00, 283.00, 285.00 Superseded by Patch 506.00 Patches 1.00, 68.00, 305.00, 511.00 Superseded by Patch 513.00 Patches 306.00, 307.00, 308.00, 309.00, 311.00 Superseded by Patch 517.00 Patch 54.00 Superseded by Patch 521.00 Patches 29.00, 90.00, 342.00, 344.00 Superseded by Patch 535.00 Patch 349.00 Superseded by Patch 545.00 2-2 Summary of Base Operating System Patches Patch 351.00 Superseded by Patch 549.00 Patches 359.00, 552.00 Superseded by Patch 554.00 Patch 39.00 Superseded by Patch 558.00 Patch 385.00 Superseded by Patch 570.00 Patches 11.00, 69.00, 79.00, 392.00, 575.00, Superseded by Patch 578.00 576.00 Patch 86.00 Superseded by Patch 582.00 Patches 24.00, 142.00 Superseded by Patch 586.00 Patch 591.00 Superseded by Patch 593.00 Patches 72.00, 106.00, 140.00, 432.00 Superseded by Patch 595.00 Patches 67.00, 105.00, 134.00 Superseded by Patch 597.00 Patches 435.00, 437.00 Superseded by Patch 599.00 Patch 439.00 Superseded by Patch 601.00 ______________________________________________________________________________ _T_a_b_l_e _2-_2: _S_u_m_m_a_r_y _o_f _B_a_s_e _O_p_e_r_a_t_i_n_g _S_y_s_t_e_m _P_a_t_c_h_e_s ______________________________________________________________________________ PPPPaaaattttcccchhhh IIIIDDDDssss AAAAbbbbssssttttrrrraaaacccctttt ______________________________________________________________________________ Patch 16.00 PPPPaaaattttcccchhhh:::: Fix for stdhosts command OSF500-017 SSSSttttaaaatttteeee:::: Existing This patch fixes a problem with the stdhosts command when the file processed has lines longer than 256 characters. The following error message is displayed: stdhost:malformed line "ignored" Summary of Base Operating System Patches 2-3 Patch 21.00 PPPPaaaattttcccchhhh:::: Fix for crontab command OSF500-024 SSSSttttaaaatttteeee:::: Existing This patch fixes a problem with crontab in which, when root runs crontab -e user, the user's crontab file is edited and saved, but is not re-read by the cron daemon. Instead, root's crontab file is re-read. Patch 25.00 PPPPaaaattttcccchhhh:::: Restriction lifted for AlphaServer DS20 and ES40 OSF500-030 SSSSttttaaaatttteeee:::: Existing This patch removes a Granularity Hint Regions (also called GH chunks) restriction which may be encountered on AlphaServer DS20 and ES40 systems running the Tru64 UNIX 5.0 release. This restriction can reduce performance for certain data base applications. Patch 27.00 PPPPaaaattttcccchhhh:::: Security (SSRT0583Z) OSF500-035 SSSSttttaaaatttteeee:::: Existing A potential security vulnerability has been discovered where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file or privilege management. Compaq has corrected this potential vulnerability. Patch 28.00 PPPPaaaattttcccchhhh:::: Fix for binmail OSF500-034 SSSSttttaaaatttteeee:::: Existing This patch corrects a problem with binmail which was resulting in partial delivery of mail messages when account quota or disk capacity was reached. Patch 37.00 PPPPaaaattttcccchhhh:::: Fix for segmentation fault on X font server (xfs) OSF500X11-002 SSSSttttaaaatttteeee:::: Existing This patch fixes a problem where the X font server (xfs) sometimes failed with a segmentation fault when it received an invalid request. 2-4 Summary of Base Operating System Patches Patch 38.00 PPPPaaaattttcccchhhh:::: Fix for problem in X Display Manager (xdm) OSF500X11-003 SSSSttttaaaatttteeee:::: Existing This patch fixes a problem in the X Display Manager (xdm) where XDMCP Indirect queries do not work. Patch 40.00 PPPPaaaattttcccchhhh:::: Security (SSRT0614U) OSF500CDE-002 SSSSttttaaaatttteeee:::: Existing A potential security vulnerability has been discovered where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file or privilege management. Compaq has corrected this potential vulnerability. Patch 41.00 PPPPaaaattttcccchhhh:::: Security (SSRT0571U) OSF500CDE-003 SSSSttttaaaatttteeee:::: Existing A potential security vulnerability has been discovered where, under certain circumstances, users may gain unauthorized access. Compaq has corrected this potential vulnerability. Patch 42.00 PPPPaaaattttcccchhhh:::: rc.config and rc.config.common files may be corrupt OSF500-001 SSSSttttaaaatttteeee:::: Existing This patch fixes a problem where the rc.config and rc.config.common files can be corrupted if the system takes a non-syncing halt after rcmgr updates these files. Patch 46.00 PPPPaaaattttcccchhhh:::: Fix for simple lock timeout panic OSF500-048 SSSSttttaaaatttteeee:::: Existing This patch fixes a problem on some AlphaServer GS140/GS60 configurations where a simple lock timeout or TB shoot ack timeout panic may occur. Summary of Base Operating System Patches 2-5 Patch 50.00 PPPPaaaattttcccchhhh:::: Fix for dxaccounts static library OSF500CDE-001B SSSSttttaaaatttteeee:::: Existing This patch fixes a problem where the Account Manager application, dxaccounts, gets a "BadPixmap" error when selecting an account after the View Preferences Display Icons By Name option has been selected. Patch 52.00 PPPPaaaattttcccchhhh:::: Security (SSRT0615U) OSF500CDE-005 SSSSttttaaaatttteeee:::: Existing A potential security vulnerability has been discovered where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file or privilege management. Compaq has corrected this potential vulnerability. Patch 56.00 PPPPaaaattttcccchhhh:::: Fix for Insight Manager configuration tool OSF500DX-005 SSSSttttaaaatttteeee:::: Existing The Insight Manager configuration tool now correctly operates on the remote cluster node being configured. Previously, changes would not take affect until Insight Manager was restarted manually on the remote node. Patch 66.00 PPPPaaaattttcccchhhh:::: Fix for unaligned access panic in dli_input OSF500-102 SSSSttttaaaatttteeee:::: Existing This patch fixes an unaligned access panic in dli_input. Patch 71.00 PPPPaaaattttcccchhhh:::: Corrects a problem with the compress utility OSF500-107 SSSSttttaaaatttteeee:::: Existing This patch corrects a problem with the (un)compress utility which could result in either an incomplete compressed file and loss of the original uncompressed file, or an incomplete uncompressed file and loss of the original compressed file. 2-6 Summary of Base Operating System Patches Patch 75.00 PPPPaaaattttcccchhhh:::: NIS client has a different shell listed than server OSF500-111 SSSSttttaaaatttteeee:::: Existing This patch corrects a problem where an NIS client has a different shell listed for an NIS user than does the server. When the user tried to change their NIS password, the password change failed, but the shell was updated. Patch 82.00 PPPPaaaattttcccchhhh:::: Fixes callback on freed CCB panics OSF500-119 SSSSttttaaaatttteeee:::: Existing This patch fixes callback on freed CCB panics. Patch 87.00 PPPPaaaattttcccchhhh:::: In C2 environment imap authentication fails OSF500-124 SSSSttttaaaatttteeee:::: Existing This patch corrects a problem where, in an enhanced security (C2) environment, imap authentication fails. Patch 89.00 PPPPaaaattttcccchhhh:::: sendmail core dumps sending 8-bit mime- encoded files OSF500-126 SSSSttttaaaatttteeee:::: Existing Fixes a problem where sendmail core dumped when trying to send certain 8-bit, mime-encoded files. Patch 99.00 PPPPaaaattttcccchhhh:::: Fix for AS1200 systems with multiple memory cards OSF500-032 SSSSttttaaaatttteeee:::: Existing This patch fixes a problem where AS1200 systems with more than three pairs of memory cards display the following warning on the console during boot: pmap_get_align: Unaligned memory hole found... Please reset the system to clear any previous memlimit Summary of Base Operating System Patches 2-7 Patch 109.00 PPPPaaaattttcccchhhh:::: Fix for lex problems OSF500-060 SSSSttttaaaatttteeee:::: Existing This patch fixes a problem in lex that causes it to generate incorrect tables that result in the lexical analyzer failing to recognize some kinds of regular expressions involving exclusive start states. Patch 111.00 PPPPaaaattttcccchhhh:::: Fix for news command OSF500-062 SSSSttttaaaatttteeee:::: Existing This patch fixes a problem in which the news command fails due to the appending of additional characters to file names in the /usr/news directory. Patch 115.00 PPPPaaaattttcccchhhh:::: Fix for rpc.statd hang OSF500-066 SSSSttttaaaatttteeee:::: Existing This patch fixes a problem where rpc.statd hangs as it tries to notify dead remote systems. Patch 116.00 PPPPaaaattttcccchhhh:::: mailsetup does not complete if hostname ends in zero OSF500-067 SSSSttttaaaatttteeee:::: Existing This patch fixes a problem of not completing mailsetup if the hostname ends with 0 (zero). The error message produced follows: Error creating /var/adm/sendmail/.cf: exiting Patch 117.00 PPPPaaaattttcccchhhh:::: lprsetup incorrectly sets up certain printers OSF500-071 SSSSttttaaaatttteeee:::: Existing This patch fixes a problem where the lprsetup command would incorrectly set up certain types of printers, such as the hp1120c, hp4000tn, or hp61. 2-8 Summary of Base Operating System Patches Patch 123.00 PPPPaaaattttcccchhhh:::: Fixes core dump problem with ftp OSF500-078 SSSSttttaaaatttteeee:::: Existing This patch fixes a core dump problem with ftp(1) when a .netrc file contains an invalid macdef (macro definition). Patch 124.00 PPPPaaaattttcccchhhh:::: Fixes problem with fverify -n flag OSF500-079 SSSSttttaaaatttteeee:::: Existing This patch fixes a problem with the fverify -n flag creating directories. Patch 133.00 PPPPaaaattttcccchhhh:::: Fixes a problem with the KZPSA driver OSF500-088 SSSSttttaaaatttteeee:::: Supersedes patches OSF500-072 (118.00), OSF500-080 (125.00) This patch corrects the following: Fixes a problem with the KZPSA driver. A timer is not being canceled causing a panic with the following error message: xpt_callback: callback on freed CC Fixes a problem in which the system can panic with the following message: KZPSA PANIC SPO_RET_CARRIER:CARRIER NOT IN USE Fixes a problem with tmv2_notify_cbf messages being logged from KPBSA adapters and creating very large binary.errlog files in a clustered environment. Patch 137.00 PPPPaaaattttcccchhhh:::: Corrects a disk write failure OSF500-092 SSSSttttaaaatttteeee:::: Existing This patch corrects a Disk write failure when using the -swap option and the simple disk on the original disk starts at offset 0. Summary of Base Operating System Patches 2-9 Patch 138.00 PPPPaaaattttcccchhhh:::: Fix for ris script OSF500-093 SSSSttttaaaatttteeee:::: Existing This patch corrects the following problems with the /usr/sbin/ris script: It incorrectly queried the user for a gateway to be used to serve a specific client when no gateway was required. It could fail if no default route had been established. Patch 149.00 PPPPaaaattttcccchhhh:::: Corrects problems in AdvFS propertly list handling OSF500-065B SSSSttttaaaatttteeee:::: Existing This patch corrects two problems in AdvFS property list handling: Creation of property lists entries in AdvFS filesets with no available mcells will result in kernel memory fault (kmf). The get_proplist_entry function (used to disassemble the property list buffer returned by the getproplist system call) returned an incorrect name length on property list names longer than 127 characters. Patch 151.00 PPPPaaaattttcccchhhh:::: Corrects problem in the LAT driver OSF500-253 SSSSttttaaaatttteeee:::: Existing This patch corrects a problem in the LAT driver which caused improper processing of the ioctl TCSBRK as well as the generation of spurious characters when the libc routine tcdrain() was used. 2-10 Summary of Base Operating System Patches Patch 155.00 PPPPaaaattttcccchhhh:::: Fixes problem in kernel debugger, kdbx OSF500-224 SSSSttttaaaatttteeee:::: Supersedes patch OSF500-061 (110.00) This patch corrects the following: Fixes a problem in the kernel debugger, kdbx, where several commands, particularly list_action and slot, are broken. Other commands such as mount-action and array_action that rely on list_action will also fail. Fixes problems with the kdbx extensions mount and swap. Information about the file system type is incorrect in the mount command. The device name is missing in the swap command. Summary of Base Operating System Patches 2-11 Patch 229.00 PPPPaaaattttcccchhhh:::: Fix for dbx OSF500-208A SSSSttttaaaatttteeee:::: Supersedes patches OSF500-214 (226.00), OSF500-221A (227.00) This patch fixes the following problems in dbx: Fixes two problems in dbx: Dbx stack trace is incomplete. Assignment to a variable would fail after viewing a non-local symbol. Fixes a segmentation fault problem with the profiling tool prof. The problem is in library routines that access the line number information in the symbol table, and can affect other commands that look at the symbol table. Fixes a problem with two routines in the libst library, st_obj_open() and st_obj_write(). The ability to change a file permission using these two libst routines is denied if group has write permissions. Patch 231.00 PPPPaaaattttcccchhhh:::: prof -pixie -asm command core dumps OSF500-221B SSSSttttaaaatttteeee:::: Supersedes patch OSF500-009 (8.00) This patch corrects the following: Fixes a problem where prof -pixie -asm would dump core if the executable being profiled contains extremely long symbol names. Fixes a segmentation fault problem with the profiling tool prof. The problem is in library routines that access the line number information in the symbol table, and can affect other commands that look at the symbol table. 2-12 Summary of Base Operating System Patches Patch 233.00 PPPPaaaattttcccchhhh:::: Fix for libst library OSF500-208B SSSSttttaaaatttteeee:::: Existing This patch fixes a problem with two routines in the libst library, st_obj_open() and st_obj_write(). The ability to change a file permission using these two libst routines is denied if group has write permissions. Patch 235.00 PPPPaaaattttcccchhhh:::: Support for Euro character to keymap files OSF500X11-022 SSSSttttaaaatttteeee:::: Existing This patch adds support for the Euro character to keymap files. Patch 247.00 PPPPaaaattttcccchhhh:::: Security (SSRT0636U) OSF500-156B SSSSttttaaaatttteeee:::: Existing A potential security vulnerability has been discovered where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file or privilege management. Compaq has corrected this potential vulnerability. Patch 249.00 PPPPaaaattttcccchhhh:::: Fix for umount command OSF500-258 SSSSttttaaaatttteeee:::: Existing This patch prevents "not currently mounted" warning messages from being displayed for file systems that had not been requested to umount. Patch 251.00 PPPPaaaattttcccchhhh:::: Fix for DECevent Version 3.2 OSF500-228 SSSSttttaaaatttteeee:::: Existing This patch fixes a problem with DECevent Version 3.2, where the evmshow -d command and the SysMan event viewer will hang when attempting to translate binary error log events. Summary of Base Operating System Patches 2-13 Patch 258.00 PPPPaaaattttcccchhhh:::: Fix for grep command OSF500-199 SSSSttttaaaatttteeee:::: Supersedes patches OSF500-182 (255.00), OSF500-196 (256.00) This patch corrects the following: Fixes a problem with the grep command in which the options -p -v together does not produce any output. Corrects a problem with the fgrep command; when it is used with the -s flag all output is suppressed. Fixes a limitation problem with the grep and fgrep commands. If the line length is too long, grep displays a "wordlist too large" error message, and fgrep displays an "input too long" error message. Patch 261.00 PPPPaaaattttcccchhhh:::: Fix for btcreate command OSF500-217 SSSSttttaaaatttteeee:::: Supersedes patch OSF500-172 (259.00) This patch corrects the following: Fixes a problem with the btcreate command where default restore fails if disklabel is different. Fixes a problem with btcreate not waiting long enough for the next tape to be loaded with some media changers. 2-14 Summary of Base Operating System Patches Patch 263.00 PPPPaaaattttcccchhhh:::: showfdmn sometimes core dumps OSF500-290 SSSSttttaaaatttteeee:::: Supersedes patch OSF500-118 (81.00) This patch corrects the following: Fixes a problem in which advfs showfdmn would sometimes core dump. Fixes two separate problems with vdf: vdf does not run at non-root level. vdf may give incorrect information. Patch 265.00 PPPPaaaattttcccchhhh:::: Fix for find command OSF500-200 SSSSttttaaaatttteeee:::: Existing This patch fixes a problem with the find command. Find fails to show filenames that start with a period. Patch 268.00 PPPPaaaattttcccchhhh:::: Fix for ATM atm_cmm_connect API routine OSF500-176 SSSSttttaaaatttteeee:::: Supersedes patch OSF500-148 (266.00) This patch corrects the following: Fixes a problem in the ATM atm_cmm_connect API routine when trying to create a VC. Fixes a kernel memory fault when using ATM. Patch 272.00 PPPPaaaattttcccchhhh:::: Fix for incorrect cursor display OSF500-229 SSSSttttaaaatttteeee:::: Existing This patch fixes a problem where the cursor is displayed incorrectly when the image plane is set to 1 and the mask plane is set to 0. Summary of Base Operating System Patches 2-15 Patch 275.00 PPPPaaaattttcccchhhh:::: Implements Xlocales definitions OSF500X11-014 SSSSttttaaaatttteeee:::: Supersedes patches OSF500X11-008 (62.00), OSF500X11-013 (273.00) This patch corrects the following: Implements Xlocales definitions that allow X applications to run under the ISO8859-15 locales. Using ISO8859-15 locales allows users to enter and use newly defined ISO8859-based characters such as the Euro monetary symbol. Provides missing compose definitions when in ISO8859-15 based locales for the scaron, Scaron, zcaron, and Zcaron characters. Fixes a problem where all the LATIN-9 characters except ASCII characters are not drawn in LATIN-9 (ISO8859-15) locale. Patch 288.00 PPPPaaaattttcccchhhh:::: Fix for dtlogin OSF500CDE-014 SSSSttttaaaatttteeee:::: Supersedes patch OSF500CDE-013 (286.00) This patch corrects the following: Fixes a problem where the Common Desktop Environment (CDE) login daemon, dtlogin, core dumps occasionally when servicing requests from XDMCP clients such as X terminals or PCs running X servers. Fixes a problem with the Common Desktop Environment (CDE) login process where, if you selected the Command Line Login option and logged in, sometimes the CDE login screen would be redisplayed before you had logged out. 2-16 Summary of Base Operating System Patches Patch 299.00 PPPPaaaattttcccchhhh:::: Fixes problem with duplicate user identifier (UID) OSF500DX-010 SSSSttttaaaatttteeee:::: Supersedes patches OSF500DX-006 (57.00), OSF500DX-001 (34.00), OSF500DX-002 (35.00), OSF500DX-004 (55.00), OSF500DX-018 (289.00), OSF500DX-013 (290.00), OSF500DX-017 (291.00), OSF500DX-016 (292.00), OSF500DX-009 (293.00), OSF500DX-015 (294.00), OSF500DX-019 (295.00), OSF500DX-008 (296.00), OSF500DX-022 (297.00) This patch corrects the following: Fixes a situation in which a system running dxaccounts under C2 security mode experiences problems with a core dump when a user attemps to lock a retired user account. Fixes the problem with the useradd, usermod, and userdel commands, removing the last entry of the /etc/passwd file when the last line of the /etc/passwd file does not end with the new line character (\n). Fixes a problem in which the command usermod was not allowing any commas in the comment field when the current GECOS fields are filled. Fixes a problem in which duplicate user identifier (UID) is accepted at a second attempt even if the no duplicate user identifier policy is set. Fixes the following two problems existing in the cli command useradd: When running useradd X and useradd Y on the same machine but from separate terminals, two different type of contention error message are displayed. The following commands does not display an error message, which it should, when executed from a NIS clent: usermod (or useradd) -x local=0 groupmod (or groupadd) -x local=0 Summary of Base Operating System Patches 2-17 Fixes a situation in which a system running ASU experiences dxaccounts crash problem when a user is deleted from PC User view. Fixes the following problems of a dxaccounts application on ASU systems: dxaccounts crashes when the root icon is double clicked. The fullname of a new PC account is not mapped to a UNIX user. Erasing a PC account's fields does not work: the values erased remains. The default values of Home Directory, Login Script, and User Profile Path for a PC user are invalid. Fixes the problem of enabling to change root's login/uid through cli/dxaccounts utilities. Fixes the problem of not setting c2 security attributes values when useradd/usermod commands with -x account_inactive|account_expiration are executed. Fixes a dxaccounts problem which prevents creating a new user from the PC Users view on a system with ASU installed. 2-18 Summary of Base Operating System Patches Patch 299.00 continued Fixes the problem of -t flag in useradd and usermod commands' usage. Fixes the problem of incorrect results from the command usermod -G. Fixes a problem where the new home directory for a new user ID is created with the date and time stamp of the /usr/skel directory. Fixes the problem of dxaccounts dialog messages incorrectly displayed when a user is added with no password entry. Patch 301.00 PPPPaaaattttcccchhhh:::: Fix for incorrect timestamp display OSF500-230A SSSSttttaaaatttteeee:::: Existing evmshow and the event viewer display incorrect timestamps for binlog events on some Alpha EV6 systems. Patch 303.00 PPPPaaaattttcccchhhh:::: Fix for evmshow OSF500-230B SSSSttttaaaatttteeee:::: Existing evmshow and the event viewer display incorrect timestamps for binlog events on some Alpha EV6 systems. Patch 313.00 PPPPaaaattttcccchhhh:::: Fix for tftpd problem OSF500-174 SSSSttttaaaatttteeee:::: Existing This patch fixes a tftpd problem when responding to a broadcast read request and it adds the -b option to control whether to respond to any braodscasts. Patch 315.00 PPPPaaaattttcccchhhh:::: Fix for restore command OSF500-202 SSSSttttaaaatttteeee:::: Existing This patch fixes a problem in which the restore command can fail with the following error: Cannot malloc space for property list Summary of Base Operating System Patches 2-19 Patch 317.00 PPPPaaaattttcccchhhh:::: Fix for collect information tool OSF500-297 SSSSttttaaaatttteeee:::: Supersedes patch OSF500-114 (77.00) This patch fixes the following two problems with the collect information tool used by the sys_check utility: A security hole where a user can become root. collect can not start at boot time due to incorrectly handling SIGHUP signal. Fixes several problems with the collect command and adds sysloging when collect suspends, resumes, or receives a signal. Patch 319.00 PPPPaaaattttcccchhhh:::: Problem when Sysman processes NFS configuration OSF500DX-007 SSSSttttaaaatttteeee:::: Existing This patch fixes problems that occur when Sysman processes NFS configuration parameters in the /etc/rc.config files. 2-20 Summary of Base Operating System Patches Patch 323.00 PPPPaaaattttcccchhhh:::: Fix for toggle button problem OSF500X11-025A SSSSttttaaaatttteeee:::: Supersedes patches OSF500X11-005A (59.00), OSF500X11-009A (63.00) This patch corrects the following: Fixes a problem with the toggle button where if a display is closed and reopened then the X Server may generate an "Invalid Pixmap Error". Fixes a problem with the Motif libraries where sometimes widgets or windows were created with the wrong size (XmNwidth and XmNheight were very small). Fixes various memory leaks in the Motif library (libXm) that could occur when creating and destroying Motif List, Text, and TextField widgets. Patch 325.00 PPPPaaaattttcccchhhh:::: X server generates Invalid Pixmap Error OSF500X11-025B SSSSttttaaaatttteeee:::: Supersedes patches OSF500X11-005B (145.00), OSF500X11-009B (147.00) This patch corrects the following: Fixes a problem with the toggle button where if a display is closed and reopened then the X Server may generate an "Invalid Pixmap Error". Fixes a problem with the Motif libraries where sometimes widgets or windows were created with the wrong size (XmNwidth and XmNheight were very small). Fixes various memory leaks in the Motif library (libXm) that could occur when creating and destroying Motif List, Text, and TextField widgets. Summary of Base Operating System Patches 2-21 Patch 327.00 PPPPaaaattttcccchhhh:::: Adds ISO8859-15 functionality to Xresource file OSF500CDE-009 SSSSttttaaaatttteeee:::: Supersedes patch OSF500CDE-006 (53.00) This patch adds the ISO8859-15 functionality to the main Xresource file on the system and to the specific dtlogin resource file. With these changes, X applications to have ISO8859-15 locale support integrated directly into the application. This patch adds Catalan (ISO8859- 15) to the list of languages from which users can choose when logging in. The additional item identifies the Catalan Latin-9 locale, which supports the Euro currency sign. Patch 329.00 PPPPaaaattttcccchhhh:::: C shell causes segmentation fault OSF500-218 SSSSttttaaaatttteeee:::: Supersedes patches OSF500-020 (19.00), OSF500-076 (122.00) This patch corrects the following: Corrects how the C shell handles 2-byte characters when running in the Japanese SJIS locale. Fixes a problem in the C shell (csh) in which a segmentation fault will occur when the user defines an environmental variable which exceeds the 2048 character limitation. This limit has been lengthened to 8192 characters. Fixes a C shell problem where multibyte characters may not be displayed properly inside quotes. Patch 331.00 PPPPaaaattttcccchhhh:::: Fix for advscan OSF500-254 SSSSttttaaaatttteeee:::: Existing This patch fixes a problem where advscan -a -g does not display bootable partitions properly. 2-22 Summary of Base Operating System Patches Patch 333.00 PPPPaaaattttcccchhhh:::: Fix for salvage command OSF500-249 SSSSttttaaaatttteeee:::: Existing This patch corrects the following: Fixes two infinite loops that could make salvage run forever. salvage could core dump when encountering a deleted property list. Patch 335.00 PPPPaaaattttcccchhhh:::: Security (SSRT0617U) OSF500CDE-010A SSSSttttaaaatttteeee:::: Existing A potential security vulnerability has been discovered where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file or privilege management. Compaq has corrected this potential vulnerability. Patch 337.00 PPPPaaaattttcccchhhh:::: Security (SSRT0617U) OSF500CDE-010B SSSSttttaaaatttteeee:::: Existing A potential security vulnerability has been discovered where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file or privilege management. Compaq has corrected this potential vulnerability. Patch 339.00 PPPPaaaattttcccchhhh:::: Fix for what command OSF500-282 SSSSttttaaaatttteeee:::: Existing The what command was unable to process more than one input file at once. Summary of Base Operating System Patches 2-23 Patch 341.00 PPPPaaaattttcccchhhh:::: Security (SSRT0683U) OSF500-266 SSSSttttaaaatttteeee:::: Existing A potential security vulnerability has been discovered where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file or privilege management. Compaq has corrected this potential vulnerability. Patch 347.00 PPPPaaaattttcccchhhh:::: Fix for mv command OSF500-286 SSSSttttaaaatttteeee:::: Supersedes patch OSF500-277 (345.00) This patch corrects the problem with the mv(1) command deleting files in the directory when the user moves a directory to itself. Patch 353.00 PPPPaaaattttcccchhhh:::: quotactl prototype now meets POSIX standards OSF500-189 SSSSttttaaaatttteeee:::: Existing This patch changes the quotactl prototype in /usr/include/ufs/quota.h to meet POSIX standards. Patch 355.00 PPPPaaaattttcccchhhh:::: Fix for encoding problem with audit OSF500-246 SSSSttttaaaatttteeee:::: Existing This patch fixes a problem where encoding for the SysV Open call audit parameter was incorrect. This could cause a system panic. Patch 357.00 PPPPaaaattttcccchhhh:::: Fixes DE500 interfaces using Micro Linear ML6694F PHY OSF500-168 SSSSttttaaaatttteeee:::: Existing This patch corrects a problem with some DE500 interfaces that use the Micro Linear ML6694F PHY. 2-24 Summary of Base Operating System Patches Patch 361.00 PPPPaaaattttcccchhhh:::: Fix for CDE setup application OSF500DX-011 SSSSttttaaaatttteeee:::: Existing This patch fixes the problem where the CDE setup Application does not come up when invoked from unicode locales if localized setup files do not exist.This patch adds error detection when no localized setup files exist. Patch 363.00 PPPPaaaattttcccchhhh:::: Fix for diskconfig OSF500DX-023 SSSSttttaaaatttteeee:::: Existing This fixes a problem that was causing diskconfig to issue the error message "can't read tminor: no such variable" upon startup. Patch 365.00 PPPPaaaattttcccchhhh:::: Fix for CDE application manager OSF500CDE-011 SSSSttttaaaatttteeee:::: Existing This patch fixes a problem where the Common Desktop Environment (CDE) Application Manager did not re-create the list of application groups at login. After customizing the application groups, users would see the old groups instead of the new groups. Patch 367.00 PPPPaaaattttcccchhhh:::: Fixes a hang in the shutdown process OSF500-183 SSSSttttaaaatttteeee:::: Existing This patch fixes a hang in the shutdown process (shutdown now) of a system when a device has flow control switched off. Summary of Base Operating System Patches 2-25 Patch 369.00 PPPPaaaattttcccchhhh:::: Fixes various AdvFS problems OSF500-147 SSSSttttaaaatttteeee:::: Existing This patch fixes the following AdvFS problems: The mount_advfs utility will core dump upon a return error of ENODEV from the kernel. When a valid AdvFS domain has a corrupted pointer to a domain volume, a ENODEV error is returned, but is incorrectly reported as an E_ADVFS_NOT_INSTALLED error. Patch 371.00 PPPPaaaattttcccchhhh:::: Fix for SCU command OSF500-146 SSSSttttaaaatttteeee:::: Existing This patch fixes the following problems: Processes may hang due to waiting for I/O interrupts. The SCU command set pages pcf will hang a system when ATAPI CDrom device is selected. Patch 373.00 PPPPaaaattttcccchhhh:::: Fix for comsat daemon core dump problem OSF500-171 SSSSttttaaaatttteeee:::: Existing This patch fixes a problem where the comsat daemon core dumps each time it receives reports of incoming mail and notifies users who request this service. 2-26 Summary of Base Operating System Patches Patch 375.00 PPPPaaaattttcccchhhh:::: Fix for sort command OSF500-213 SSSSttttaaaatttteeee:::: Supersedes patches OSF500-023 (22.00), OSF500-122 (85.00) This patch corrects the following: Fixes a problem in which sort -i a_file >b_file aborts with the message "A line of the input file contains more than 20480 characters" when LANG = da_DK.ISO8859-1. Fixes a problem in which the sort command aborts with the message "A line of the input file contains more than 20480 characters" when running in a Japanese locale. Fixes a problem that sometimes occurs when sorting large data files in a multibyte locales such as Japanese. Patch 377.00 PPPPaaaattttcccchhhh:::: UFS disk quotas do not automatically update OSF500-158 SSSSttttaaaatttteeee:::: Existing This patch fixes a problem where UFS disk quotas are not updating automatically. Patch 379.00 PPPPaaaattttcccchhhh:::: Fix for memory leak in the X Toolkit library OSF500X11-024A SSSSttttaaaatttteeee:::: Supersedes patch OSF500X11-007A (61.00) This patch corrects the following: Fixes a memory leak in the X Toolkit library (libXt). This memory leak could be seen by applications that create and destroy many Motif ScrolledWindow widgets. Fixes a memory leak in the X Window System's X Toolkit library (Xt) that could occur when creating and destroying Motif List, Text, and TextField widgets. Summary of Base Operating System Patches 2-27 Patch 381.00 PPPPaaaattttcccchhhh:::: Fix for memory leak in the X Toolkit library OSF500X11-024B SSSSttttaaaatttteeee:::: Supersedes patch OSF500X11-007A (61.00) This patch corrects the following: Fixes a memory leak in the X Toolkit library (libXt). This memory leak could be seen by applications that create and destroy many Motif ScrolledWindow widgets. Fixes a memory leak in the X Window System's X Toolkit library (Xt) that could occur when creating and destroying Motif List, Text, and TextField widgets. Patch 383.00 PPPPaaaattttcccchhhh:::: Fix for snmpd OSF500-247 SSSSttttaaaatttteeee:::: Existing This patch fixes a problem where snmpd sends SNMPv1 trap messages with an internal address field ==0. Patch 388.00 PPPPaaaattttcccchhhh:::: Fix for libDXm.so svn widget OSF500X11-015 SSSSttttaaaatttteeee:::: Supersedes patch OSF500X11-011A (386.00) This patch corrects the following: Fixes a problem in which the svn widget of libDXm.so creates identical backgrounds and foregrounds. Fixes a problem where the acl settings are lost when they are changed by using the GUI dxsetacl command. 2-28 Summary of Base Operating System Patches Patch 390.00 PPPPaaaattttcccchhhh:::: libDXm static library fix OSF500X11-011B SSSSttttaaaatttteeee:::: Existing This patch fixes a problem in which the svn widget of libDXm.so creates identical backgrounds and foregrounds. Patch 394.00 PPPPaaaattttcccchhhh:::: Fix for defragment program OSF500-141 SSSSttttaaaatttteeee:::: Supersedes patch OSF500-081 (126.00) This patch corrects the following: Fixes the defragment program to properly report on extremely large (>4.3GB) freespace holes. Previously it would report Free space percentages larger than 100% and would add these large holes to the smallest range (10M) where they belong. Fixes a problem in which defragment reports incorrect extent counts on files with a large number of extents. Patch 396.00 PPPPaaaattttcccchhhh:::: Fix for CPU hang OSF500-244 SSSSttttaaaatttteeee:::: Existing This patch fixes a kernel panic seen when running Classical IP over the lfa ATM driver. This panic would only occur in lockmode 4. If not in lockmode 4, the symptom would be a CPU hang. Summary of Base Operating System Patches 2-29 Patch 399.00 PPPPaaaattttcccchhhh:::: Fix for problem that occurs when creating ATM ELANs OSF500-178 SSSSttttaaaatttteeee:::: Supersedes patches OSF500-019 (18.00), OSF500-248 (397.00) This patch corrects the following: Fixes a problem with the creation of multiple ATM ELANS. When running ATM Lan Emulation, using more than four ATM NetRAIN interfaces can result in recursive calls causing a kernel stack not valid halt. Fixes a problem in which the system may panic with the error message "Unaligned kernel space access from kernel mode" when running ATM ELANs. Patch 405.00 PPPPaaaattttcccchhhh:::: Fix for Xlib memory leaks OSF500X11-012A SSSSttttaaaatttteeee:::: Supersedes patches OSF500X11-023A (402.00), OSF500X11-017 (403.00) This patch corrects the following: Fixes two memory leaks in the X Window System's X library (Xlib) that can occur when creating and destroying Motif List, Text, and TextField widgets. Fixes a problem in which some 8-bit characters cannot be entered directly from the keyboard when the Caps Lock setting is on. Fixes a problem where font selection in dtterm produces a corrupted output for LATIN-2 locales. 2-30 Summary of Base Operating System Patches Patch 408.00 PPPPaaaattttcccchhhh:::: Fix for memory leaks OSF500X11-012B SSSSttttaaaatttteeee:::: Supersedes patch OSF500X11-023B (406.00) This patch corrects the following: Fixes two memory leaks in the X Window System's X library (Xlib) that can occur when creating and destroying Motif List, Text, and TextField widgets. Fixes a problem where font selection in dtterm produces a corrupted output for LATIN-2 locales. Patch 410.00 PPPPaaaattttcccchhhh:::: Fix for bootlink failure OSF500-287 SSSSttttaaaatttteeee:::: Existing This patch fixes a problem in which the bootlink can fail on AlphaStations 600, 600A, and 500/400. Patch 412.00 PPPPaaaattttcccchhhh:::: Update for Danish locale OSF500-212 SSSSttttaaaatttteeee:::: Existing This patch updates the Danish (da_DK.ISO8859-1) locale to use all lowercase month names. Patch 414.00 PPPPaaaattttcccchhhh:::: Security (SSRT0624U) OSF500-154 SSSSttttaaaatttteeee:::: Existing A potential security vulnerability has been discovered where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file or privilege management. Compaq has corrected this potential vulnerability. Patch 416.00 PPPPaaaattttcccchhhh:::: Fix for lbxproxy utility OSF500X11-018 SSSSttttaaaatttteeee:::: Existing This patch fixes a problem where the X windows lbxproxy utility, which is used to make Low Bandwidth X (LBX) connections to an X server, did not accept local connections. Summary of Base Operating System Patches 2-31 Patch 418.00 PPPPaaaattttcccchhhh:::: Updates lfa ATM driver to V1.0.16 OSF500-188 SSSSttttaaaatttteeee:::: Supersedes patch OSF500-058 (107.00) This patch corrects the following: Updates the lfa ATM driver to V1.0.16 and fixes the following two ATM driver problems: Fixes a soft hang that can occur when running NFS over ATM. Allows the ATM subsystem to be shut down successfully in the event of a board hang. Updates the lfa ATM device driver to V1.0.17 and adds some enhancements as well as a fix for a kernel memory fault seen when either shutting down or restarting the device driver. 2-32 Summary of Base Operating System Patches Patch 422.00 PPPPaaaattttcccchhhh:::: Security (SSRT0642U) OSF500-136 SSSSttttaaaatttteeee:::: Supersedes patches OSF500-099 (144.00), OSF500-177 (419.00), OSF500-275 (420.00) This patch corrects the following: A potential security vulnerability has been discovered, where under certain circumstances, system integrity may be compromised. This may be in the form of improper file or privilege management. Compaq has corrected this potential vulnerability. Corrects a "permission denied" error when writing to the /var/tcb/files/dblogs/[logfile] while running pop3d and enhanced security. Fixes a problem for Enhanced Security configurations where the Maximum Login Interval (u_max_login_intvl) field was being ignored for account templates. Corrects a problem of the rsh command displaying a warning message instead of the rsh command output when C2 security is configured. Patch 424.00 PPPPaaaattttcccchhhh:::: SNMP subagent core dumps at boot up time OSF500DX-020 SSSSttttaaaatttteeee:::: Existing This patch fixes a problem that causes Compaq SNMP subagent (cpq_mibs) to coredump at boot-up time or when being reinvoked, which results in invalid display of information on Insight Manager web pages. Patch 426.00 PPPPaaaattttcccchhhh:::: Security (SSRT0656U) OSF500X11-020A SSSSttttaaaatttteeee:::: Existing A potential security vulnerability has been discovered where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file or privilege management. Compaq has corrected this potential vulnerability. Summary of Base Operating System Patches 2-33 Patch 428.00 PPPPaaaattttcccchhhh:::: Security (SSRT0656U) OSF500X11-020B SSSSttttaaaatttteeee:::: Existing A potential security vulnerability has been discovered where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file or privilege management. Compaq has corrected this potential vulnerability. Patch 430.00 PPPPaaaattttcccchhhh:::: Fixes various problems with om OSF500-207 SSSSttttaaaatttteeee:::: Supersedes patches OSF500-115 (78.00), OSF500-116B (148.00) This patch corrects the following: Fixes various problems with om (/usr/lib/cmplrs/om). Fixes a problem where the linker and om would not properly process a large (multi-GOT) image in the presence of the -om option. This patch also fixes a problem with the linker not properly handling scTlsUndefined symbols. Fixes three errors that are occasionally seen when compiling with the -om switch: om: fast access range error om: value(0x1201704de) not in range of GP table core dumping in the routine reloc_abs() 2-34 Summary of Base Operating System Patches Patch 434.00 PPPPaaaattttcccchhhh:::: Fix for dtmail problem OSF500CDE-012 SSSSttttaaaatttteeee:::: Existing This patch fixes a dtmail problem in which a From line with quotes in it incorrectly finds the date of the mail message. This error is displayed on the main screen under the header Date and Time and shows up as Dec. 31 or as a blank field. Patch 442.00 PPPPaaaattttcccchhhh:::: crontab jobs run multiple times in same minute OSF500-267 SSSSttttaaaatttteeee:::: Supersedes patch OSF500-226 (440.00) This patch corrects the following: Fixes a problem where some crontab jobs would run multiple times in the same minute. Fixes two cron problems: The cron daemon does intensive logging and fills up the disk. Multiple cron daemons continue to run and consume system resources due to the fact that, after a user is deleted from the system, there are still jobs running on the user's behalf. Summary of Base Operating System Patches 2-35 Patch 444.00 PPPPaaaattttcccchhhh:::: Various fixes for vrestore and vdump commands OSF500-369 SSSSttttaaaatttteeee:::: Supersedes patches OSF500-044 (33.00), OSF500-273 (401.00), OSF500-086 (131.00), OSF500-220 (153.00) This patch corrects the following: The vdump program would dump core with the following message: nnnn Resources lost(coredump) Fixes a problem where the vdump command will sometimes store symbolic link files as directories in the vdump archive. 2-36 Summary of Base Operating System Patches Patch 444.00 continued Fixes the following vrestore problems: The command was slow to complete when a partial restore operation was requested. The command failed to ignore extended attribute records for the files which were not requested for a vrestore operation. Fixes problem with vrestore where vrestore fails to restore certain files and directories having ACLs from a compressed vdump saveset, reporting: vrestore: error setting extended attributes 22 A previous patch caused incomplete restores. A warning message is displayed when the path for the first file in a group of hardlinks is created without using original protection codes and property lists. A warning message is displayed and vrestore aborts if it fails to malloc space for a property list. A message which had been inserted at the end of the message file had the wrong message category (could cause messaging confusion). An uninitialized variable in the code that restores property lists could cause malloc failures, memory faults, "error setting extended attributes", and infinite loops using the -l option. Corrupted property list information could cause an infinite loop. Fixes the following problems the vdump command: Fixes a problem where the vdump command will sometimes store symbolic link files as directories in the vdump archive. Summary of Base Operating System Patches 2-37 Failed to flag compressed extended attributes records that are split across a vdump BLOCK boundary. Overrides the -D option when source path describes a root fileset Note: If you want to backup quota files, you must not use the -D option. Corrects "Rewinding" message to avoid a segfault with Internationalized messages. Fixes the following problems with the vrestore command: Fails to properly handle extended attributes records in compressed archives. This results in malloc failures, proplist corruption, program abort, program crashes due to segfault or invalid memory access, and the display of the error message "error setting extended attributes". Fails to set extended attributes due to confusion over selective restore of the file or directory associated. Also results in display of error message "error setting extended attributes". Selective restore of hardlinked files is incomplete when they exist in different directories (fails to create directory for second occurrence of file with same inode number). The -Q option is added to vrestore to allow the user to request that the the quota files are ignored (thus avoiding the time it takes to process them). 2-38 Summary of Base Operating System Patches Patch 479.00 PPPPaaaattttcccchhhh:::: Security (SSRT0700U, SSRT0713U, SSRT0676U, SSRT0675U) OSF500-350 SSSSttttaaaatttteeee:::: Supersedes patches OSF500-033 (43.00), OSF500-037 (30.00), OSF500-135 (95.00), OSF500- 106 (70.00), OSF500-170 (276.00), OSF500-293 (277.00), OSF500-186 (278.00), OSF500-295 (279.00), OSF500-299 (280.00), OSF500-240 (282.00), OSF500-003 (2.00), OSF500-004 (3.00), OSF500-007 (6.00), OSF500-010 (9.00), OSF500-011 (10.00), OSF500-014 (13.00), OSF500-038 (31.00), OSF500-040 (44.00), OSF500-049 (47.00), OSF500- 053 (48.00), OSF500-100 (64.00), OSF500-117 (80.00), OSF500-120 (83.00), OSF500-128 (91.00), OSF500-130 (93.00), OSF500-143 (98.00), OSF500- 045 (101.00), OSF500-059 (108.00), OSF500-063 (112.00), OSF500-074 (120.00), OSF500-082 (127.00), OSF500-083 (128.00), OSF500-084 (129.00), OSF500-101 (65.00), OSF500-125 (88.00), OSF500-131 (94.00), OSF500-139 (97.00), OSF500-054 (49.00), OSF500-087 (132.00), OSF500-065A (114.00), OSF500-015 (14.00), OSF500-018 (17.00), OSF500-110 (74.00), OSF500- 129 (92.00), OSF500-039 (100.00), OSF500-051 (103.00), OSF500-073 (119.00), OSF500-008 (7.00), OSF500-094 (139.00), OSF500-013 (12.00), OSF500-052 (104.00), OSF500-138 (96.00), OSF500-022 (20.00), OSF500-046 (45.00), OSF500- 069 (51.00), OSF500-098 (143.00), OSF500-109 (73.00), OSF500-006 (5.00), OSF500-113 (76.00), OSF500-121 (84.00), OSF500-064 (113.00), OSF500-096 (141.00), OSF500-090 (135.00), OSF500-005 (4.00), OSF500-085 (130.00), OSF500- 219 (156.00), OSF500-180 (157.00), OSF500-263 (158.00), OSF500-232 (159.00), OSF500-236 (160.00), OSF500-155 (161.00), OSF500-274 (162.00), OSF500-251 (163.00), OSF500-151 (164.00), OSF500-153 (165.00), OSF500-255 (166.00), OSF500-285 (167.00), OSF500-257 (168.00), OSF500-276 (169.00), OSF500-241 (170.00), OSF500-145 (171.00), OSF500-167 (172.00), OSF500-149 (173.00), OSF500-181 (174.00), OSF500-281 (175.00), OSF500-235 (176.00), OSF500-289 (177.00), OSF500-238 (178.00), OSF500-150 (179.00), OSF500-243 (180.00), OSF500-133 (181.00), OSF500-175 (182.00), OSF500-231 (183.00), OSF500-194 (184.00), OSF500-140 (185.00), OSF500-279 (186.00), OSF500-261 (187.00), OSF500-163 (188.00), OSF500-298 (189.00), OSF500-270 (190.00), OSF500-262 (191.00), OSF500-152 (192.00), OSF500-284 (193.00), OSF500-209 (194.00), OSF500-227 (195.00), OSF500-165 (196.00), OSF500-265 (197.00), OSF500-269 Summary of Base Operating System Patches 2-39 (198.00), OSF500-234 (199.00), OSF500-272 (200.00), OSF500-216 (201.00), OSF500-169 (202.00), OSF500-132 (203.00), OSF500-210 (204.00), OSF500-193 (205.00), OSF500-278 (206.00), OSF500-197 (207.00), OSF500-162 (208.00), OSF500-157 (209.00), OSF500-211 (210.00), OSF500-222 (211.00), OSF500-159 (212.00), OSF500-268 (213.00), OSF500-137 (214.00), OSF500-237 (215.00), OSF500-206 (216.00), OSF500-161 (217.00), OSF500-250 (218.00), OSF500-173 (219.00), OSF500-142 (220.00), OSF500-198 (221.00), OSF500-296 (222.00), OSF500-271 (223.00), OSF500-166 (225.00), OSF500-384 (445.00), OSF500-356 (446.00), OSF500-321 (447.00), OSF500-323 (448.00), OSF500-315 (449.00), OSF500-407 (450.00), OSF500-367 (451.00), OSF500-366 (452.00), OSF500-351 (453.00), OSF500-370 (454.00), OSF500-319 (455.00), OSF500-320 (456.00), OSF500-393 (457.00), OSF500-387 (458.00), OSF500-341 (459.00), OSF500-339 (460.00), OSF500-396 (461.00), OSF500-401A (462.00), OSF500-303 (463.00), OSF500-382 (464.00), OSF500-305 (465.00), OSF500-388 (466.00), OSF500-354 (467.00), OSF500-379 (468.00), OSF500-389 (469.00), OSF500-329 (470.00), OSF500-374 (471.00), OSF500-373 (472.00), OSF500-312 (473.00), OSF500-302 (474.00), OSF500-304 (475.00), OSF500-324 (476.00), OSF500-340 (477.00) 2-40 Summary of Base Operating System Patches Patch 479.00 This patch corrects the following: continued Corrects a problem where a Tru64 UNIX NFS server incorrectly handles > 8K I/O requests. Fixes a system panic with the panic string: simple_lock: time limit exceeded Provides the graphics driver support for the PCI To Ethernet/Graphics Combo Adapter (3X-DEPVD-AA) (also known as the ITI6021E Fast Ethernet NIC 3D Video Combination Adapter, InterServer Combo, or JIB). Upgrades to the Gigabit ethernet driver Version 1.0.12 to fix various performance problems. Provides the latest driver for the PowerStorm 4D10T (ELSA Gloria Synergy, SN-PBXGK-BB) graphics card and the latest graphics driver for the PCI To Ethernet/Graphics Combo Adapter (3X- DEPVD-AA). Prevents a possible NFS over TCP hang. NFS TCP threads will be blocked in sosbwait() causing the system to appear to be hung. Updates the DE602 ethernet driver to V1.0.5 and fixes the following three driver problems and adds support for the DE602-FA device: Transmit Timeout errors following adapter reset or loss of link connection. Kernel memory fault panic on system experiencing many Receive Overrun errors. Multicast addresses not being received by device. Provides support for the DEGPA-TA (1000BaseT) Gigabit Ethernet device. Fixes the following DE600/DE602 10/100 Ethernet adapters problems: Summary of Base Operating System Patches 2-41 The primary CPU may appear hung on networks where switches send Flow Control Pause frames if they become overloaded. Transmit timeout messages appearing in the console log due to the driver timing out a frame. Updates the emx Fiber Channel driver to revision 1.21 which corrects a Data Error that is seen when running with the latest Emulex firmware. This error corrupts data when reading from the disk. 2-42 Summary of Base Operating System Patches Patch 479.00 continued Fixes "simple_lock: time limit exceeded" panics. Fixes a panic in the kernel with the following error message: simple_lock: time limit exceeded Fixes a problem that causes the Tru64 UNIX Version 5.0 update install procedure to exit with core dumps and /sbin/loader failures on a system. Fixes a problem where applications using the fcntl() system calls may appear to hang. Fixes a "lock hierarchy violation" panic from running the fuser -d command on AdvFS when lockmode is set to 4. Fixes a problem where process accounting data was not written to the accounting file when the accounting file was on an NFS mounted file system. Fixes a system "pause" seen when doing a lot of I/O to UFS filesystems. Fixes system hangs that occur when there are NFS mounted files, the system is actively paging and the NFS server is unavailable. Fixes a "page owner not valid" system panic or a system hang on large memory systems. This can be seen when SSM objects are created and accessed on systems experiencing heavy paging and swapping activity. Fixes an AdvFS problem in which processes may hang but the system will not panic. Fixes problems in the AdvFS file system. The problems included an EBUSY unmount problem and a panic that occurred when executing bs_real_invalidate_pages(). Fixes a problem in which unmounting an NFS mounted directory can cause a user process to core dump. Fixes a problem with hangs on AlphaServer ES40 Summary of Base Operating System Patches 2-43 when specifying granularity hints. Fixes a problem where ubc_msync() may not flush out all the pages in the requested range. Fixes a problem involving register corruption. Fixes var adm messages from truncation on larger configurations by raising the default size (4096) of msgbuf_size to 8192. Fixes a problem where systems with Patch Kit- 0001 installed would run low on kernel memory after process accounting had been running for a while. Fixes a problem with soclose() that caused permanent looping on exit while aborting pending connections at a TCP/IP listener socket. Fixes a problem that could result in a incorrect scheduling of threads when they were dispatched from the idle state. 2-44 Summary of Base Operating System Patches Patch 479.00 continued Fixes a problem with virtual memory. When running the Oracle database, Oracle can not detach from a shared memory segment. Fixes two separate panics with the following error messages: vm_page_activate: already active or simple_lock: time limit exceeded Fixes a simple_lock: hierarchy violation in sigq_abort() when lockmode is set to 4. Adds the following kernel features: Enhanced core path support which allows applications to specify the directory where core files will be generated. XA_FORK exit action support which allows applications to register actions to be performed when a process forks(). Corrects a problem in which a "device busy" error would be reported; the behavior has been changed to wait for the busy pages to be released. Fixes a problem in the AdvFS system. A panic occurs with the following error message: lock_read: hierarchy violation Fixes a problem where a single CPU system using AdvFS can hang in cleanup_closed_list(). Fixes a problem where several 8K pages in a file on an AdvFS filesystem can incorrectly contain all zeros instead of the data that was written to that portion of the file. Summary of Base Operating System Patches 2-45 Corrects an AdvFS problem involving clone filesets. The read-ahead code was incorrectly passing up opportunities to do read-ahead on clone filesets, resulting in a large performance penalty. Fixes a problem with making a msfs_putpage() call. The length argument may get its upper bits truncated which will result in an incorrect length calculation. Corrects two problems in AdvFS property list handling: Creation of property lists entries in AdvFS filesets with no available mcells will result in kernel memory fault (kmf). The get_proplist_entry function (used to disassemble the property list buffer returned by the getproplist system call) returned incorrect name length on property list names longer than 127 characters. Corrects a hang of the FDDI interface if the interface is brought down following a read-and- zero-counters request (netstat -z on the FDDI interface, for example). Fixes a kernel memory fault and an SMP race condition with the AltaVista Firewall 98 server on a multi-CPU system. Fixes a problem in which the system may panic with the error message "kernel memory fault". Fixes a system panic: tcphdr too big 2-46 Summary of Base Operating System Patches Patch 479.00 continued Provides changes necessary for AV firewall 98 to pass ICSA certification. Fixes a kernel memory fault caused when a network application walked an inpq array. Fixes a problem where RCP commands issued from a Sun Solaris system to Compaq Tru64 UNIX may sometimes fail incorrectly with the error message: Connection reset by peer Fixes a problem in which the system may panic with the error message: tcp_output REXMT Fixes a TCP performance problem if the TCP window scale option is turned off when using the HIPPI interface. Fixes a problem with packetfilter applications that use IP packets greater than 8K. Corrects a problem where ICMP redirect packets can modify the default route. This patch involves virtual mac addressing. Fixes a kmf problem when the type of SCSI device dynamically changes. Fixes an error in the SCSI device probe code. On systems with shared bus configurations, heavy I/O loads can cause duplicate device files to be created for the same device. Fixes a hardware management problem that will cause a system hang at boot time (in dsfmgr) whenever a hardware CPU upgrade is performed. Fixes a problem in which the system can panic with a kernel memory fault. Fixes a problem where partitioned AlphaServer 8200/8400 systems return incorrect CPU data for CPUs that are not in the partition. Summary of Base Operating System Patches 2-47 Fixes the following Compaq AlphaServer problems: On the ES40 and DS20, nonfatal 680 environment machine checks are being logged as fatal/noncorrectable errors. On the DS20, a fix has been made to the handling of power supply, temperature, and fan events so that they are reported correctly. Provides support for the Compaq AlphaServer DS20E. 2-48 Summary of Base Operating System Patches Patch 479.00 continued Allows the com1_environment variables to be stored in NVRAM. On a DS10 platform, when resetting console baud rate to anything other than the rate it was running, a system panic occurs at boot. Corrects siginfo codes for floating point and integer overflow exceptions. Fixes single-step support in a debugger, such as Ladebug, for instructions that trap or fault. Fixes a problem where registers might be corrupted with the pre-emption_on/off interfaces. Fixes a problem which could result in unit attention status being missed. Fixes the following Universal Serial Bus (USB) problems: The USB mouse no longer functions after resetting the Xserver. System panics may occur in error handling after USB device fails a request. The USB device may not deconfigure properly when unplugged from the bus. Problems that will prevent some USB devices from being configured at boot time. A key on a USB keyboard will continue to repeat after being unplugged. USB keyboards may transmit the incorrect keycode for several keys. When booting at times the USB controller number may be -1. This causes doconfig to fail. Summary of Base Operating System Patches 2-49 2-50 Summary of Base Operating System Patches Patch 479.00 continued Includes UFS delayed metadata mount option that fixes metadata intensive application performance. Fixes a panic in the UFS filesystem which has the following error message: blkfree: freeing free block Fixes a problem in which operations on NFS files can hang indefinitely. Fixes a problem in which a reboot will fail after hwmgr is used to delete or add devices. Corrects a problem in which the perrmask register on Tsunami systems can be overwritten. Fixes a system hang that can occur during an NFS operation on a system running granularity hints. Addresses a binary compatibility problem seen with four networking system calls: sendmsg, osendmsg, recvmsg, and orecvmsg. In certain cases, executables compiled on other versions of Tru64 UNIX will not work correctly when using these system calls. Corrects a problem with four networking system calls, sendmsg/osendmsg and recvmsg/orecvmsg. Any of these calls may return an unexpectedly large negative value. Fixes the following two filesystem problems: In AdvFS, a system panic with the following error message: panic: bs_logflush_start: cannot write lsn NFS errors are received when doing file I/O on an AdvFS exported file system. Fixes a panic in in_pcbfree() when NFS is implemented over TCP. Summary of Base Operating System Patches 2-51 There is a potential for a system panic in routine sbflush() if there is an attempt to flush a socket buffer while it is locked by another thread. This patch corrects this problem. Fixes a problem with AdvFS where all processes are waiting for buffers causing the system to hang. Fixes two panics that have the following error messages: simple_lock: time limit exceeded simple_lock: lock already owned by cpu Fixes a problem where, when opening a RAID type device, the ALL_DTYPE_RAID was not being allowed. Fixes a problem in which the system can hang if there is no CPU in slot 0. It also fixes an instruction fault due to a divide by 0. 2-52 Summary of Base Operating System Patches Patch 479.00 continued Fixes a problem where, if the size of the message queue was increased, writers to the queue that were blocked would not wake up for processing. Fixes a problem that causes corruption in the floating point registers whereby the flag fields nxm_fp_owned are overwritten with 0s. Fixes a problem with verify. When verify is run on a brand new domain, NFS warnings are displayed even though no NFS related activity is being done. Fixes a problem in AdvFS. When calling bs_startio, the wrong number of parameters was being used, resulting in a potential slow down of some flushes. Fixes the following two problems in the I/O subsystem: Only the first byte of the HSZ serial number is checked. The time allowed for the command timeout on AIT tape drives is increased to from 5 seconds to 5 minutes. Fixes a problem in AdvFS. The function bfflush_range() may return success before flushing all the pages it should. Fixes a race condition in the UBC code where a lookup is done on a page being invalidated (freed). Fixes a kernel memory fault in VMAC code if_addnewaddr(). Corrects a problem which could cause the system to spend excessive time in the internet checksum routine, resulting in a degradation of system performance. Fixes a problem with VM page corruption that has the following panic message: Summary of Base Operating System Patches 2-53 vm_pg_alloc: page not free Fixes a panic which has the following error message: simple_lock: hierarchy violation Fixes "can_replace: slot replacement mismatch" panics which can occur when running multi- threaded applications. Fixes a panic which has the following error message: lock_clear_recursive: recursion not enabled Fixes a problem in which metadata buffers are being written asynchronously instead of on a delayed basis. Fixes a problem in AdvFS where v_numoutput is not being decremented, causing AdvFS to hang. Corrects a problem when a network interface is configured using a CIDR bitmask and lies in a certain address range; it could be unreachable by users on the local system and remote systems that choose not to use the routing table but simply transmit on an interface. Fixes a problem in which network deamons, such as NIS and NFS, do not function properly because of mislabeled packets. Fixes a hang or simple_lock_state_violation/simple_lock_fault panic in biodone. Fixes a problem that caused an incorrect bcache size to be returned to the kernel from the HWRPB. This problem occurred on Professional Workstation 900 and 1000 systems and AlphaServer DS10, DS20, DS20E, ES40, GS80, GS160, and GS320 systems. 2-54 Summary of Base Operating System Patches Patch 479.00 continued Prevents a deadlock in NFS over TCP that could occur if the client is not responding properly. The hang will be seen in the NFS TCP threads in rrok3free(). This patch fixes a system panic with panic string: psig: catch not set Fixes a problem where some network-based multimedia applications will cause a kernel memory fault when exiting. Fixes a "lock_terminate: lock held" panic when deleting a process group. Fixes a kernel memory fault caused by either one of the following conditions: On EV6 platforms, when the debugger is used to view the OT_DEVMAP object mapping memory in I/O space that is mapped to a user process. When routine pmap_coproc_exit_notify() modifies the pmap's coproc_tbi function to be 0, a null pointer, while it is being checked by routine pmap_remove_all(). Fixes a problem in AdvFS. A panic occurs with the following error message: lock_read: hierarchy violation Fixes a problem with AdvFS. An AdvFS domain becomes inaccessible when using the mount -d option. Fixes a problem in AdvFS in which a system that had already domain panicked results in a system panic. Provides support for an increase in the number of binlog records for FRU/config tables to greater than 32K. Summary of Base Operating System Patches 2-55 Corrects several cam device related problems: The ddr database entry for HSG80 is now handled correctly by the .mrg file. A kernel memory fault while performing HSZ80 failover has been corrected. The RA3000 (HSZ22) now correctly reports the value for AWRE/ARRE in the error page. Corrects a problem that caused HSG70 or HSG80 pairs to fail to respond to selection when performing a transparent failover from one controller to another. Prior to this patch, the HSG70 or HSG80 pairs were unable to see paths to devices; consequently the devices were declared unreachable. Fixes a race condition involving signals and threads that only happens on multiprocessor systems. Fixes a problem in which the POSIX interval timer is not resilent to clock slowdown caused either by NTP or by a backwards change of the clock. Fixes a bug such that, when fuser -k is issued on a dismounted NFS mount point in which some process is running, a hang will occur. Fixes an "unaligned kernel space access from kernel mode" panic when doing a malloc from kmembucket 26, 896 byte bucket. The faulting virtual address will be the lock signature for thread_deallocate(). 2-56 Summary of Base Operating System Patches Patch 479.00 continued A potential security vulnerability has been discovered where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file or privilege management. Compaq has corrected this potential vulnerability. Fixes a problem in AdvFS where user data may be lost when a clone file is migrated. Fixes a problem where a root user was not allowed to check file access on behalf of a user without completely becoming the user. The functionality is needed by the ASU (Advanced Server for UNIX) product. Fixes a problem in which an application can hang because of an undelivered signal. Fixes a simple_lock time limit exceeded panic due to an SMP race condition in namecache. Fixes a kernel memory fault in u_anon_faultpage() when it access the backing object for the anonymous page. Fixes a problem where the operating system only looks in slot 0 for the primary CPU. Fixes a problem where the hardware manager reports inaccurately the CPU speed. Fixes a problem with AdvFS in which a hang occurs due to a deadlock between bsbuf.state and bmt extent map lock. Fixes a problem in which an invalid error status is returned from the remove_entry system call. Corrects a kernel memory fault caused by hwmgr. Fixes a kernel memory fault seen under certain conditions when setting a thread's priority. Fixes a problem where, in the output of a ps command, the PAGEIN column reports 0 for all processes. Fixes support of converting bootable tape bootstrings to device names and converting device names back to bootable tape bootstrings. Summary of Base Operating System Patches 2-57 Fixes several panics on systems with holes in memory. The error messages are listed below: panic: put_free_ptepage: invalid pvh state panic: kernel memory fault trap: invalid memory read access from kernel mode panic: not wired simple_lock: hierarchy violation Fixes a problem in which the SCSI version number was not checked for SCSI-3 device. With this patch, SCSI-2 and SCSI-3 devices are checked. Fixes a panic in in_pcbfree() associated with ASE service failover. Fixes panics and memory corruption in setuid/setgid. Corrects a problem where, under certain unlikely conditions, a b-tree index for a directory could become corrupted. Fixes a problem where the system appears to hang. A child process is holding a lock too long and preventing other processes from doing work. 2-58 Summary of Base Operating System Patches Patch 479.00 continued Fixes a kernel memory fault and invalid memory ifetch panic which can occur in AlphaServer SC systems running Quadrics' RMS software. Fixes a problem where, under certain circumstances, a Tru64 UNIX system can panic with the string: "lock_write: simple lock owned" in the if_slowtimo() routine. Fixes a problem in UFS. The O_SYNC does not work properly causing the inode update to fail on a synchronous write. Fixes a panic in AdvFS which has the following error message: panic: Unaligned kernel space access from kernel mode Fixes a problem in which the wrong status was returned from EEROM read. Fixes a "simple_unlock: lock not owned by cpu" panic in the biodone routine. Fixes an issue with lightweight wiring of pages and shared memory regions. A potential security vulnerability has been discovered where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file or privilege management. Compaq has corrected this potential vulnerability. Fixes a "u_anon_free: page busy" panic. Fixes a system hang caused by netisr queue corruption due to a race condition that is primarily encountered by third party drivers and layered products that call schednetisr_nospl(). Fixes a panic in AdvFS with the following error message: cfs_do_pfs_mount: pfs and cfs fsids differ on failover Fixes a lock hierarchy violation in AdvFs. Fixes the corruption of the CAM hardware Summary of Base Operating System Patches 2-59 database when using hwmgr. This typically can result in a kernel memory fault when the database is being written to disk after a hwmgr operation. Fixes inaccuracy problems when using setrlimit/getrlimit with a threaded application. Fixes a problem in which the system call fcntl(fd, F_DUPFD, 15) fails with "too many files" even after fd limits have been increased. Fixes a problem with the driver for Gigabit Ethernet adapters (DEGPA-FA and DEGPA-TA) which prevented its use in a NetRAIN (Redundant Array of Independent Network Adapters) set. This patch modifies AdvFS kernel code and several utilities. AdvFS will no longer panic with the following error: ADVFS EXCEPTION : panic cpu(0) : bad frag free list The code is modified so that during frag allocation when AdvFS determines that the frag group header's free list has been corrupted, it stops using it and marks it BAD. It is then removed from the free list so no more allocations can take place and no deallocations are performed. The verify, shfragbf, and vfragpg programs are modified to report BAD frag groups. 2-60 Summary of Base Operating System Patches Patch 479.00 continued Fixes a problem in AdvFS where a kernel memory fault and an AdvFS assertion failure occurs. Fixes a hang in the UFS filesystem. Updates to an AdvFS file via directIO may not correctly merge the old data and the new data if: 1) the write is to the frag and, 2) the write does not completely overwrite all the old data. This patch fixes that symptom. This patch corrects an AdvFS panic which can occur during a rmfset operation. The panic string: rbf_delete_int: can't find bf attributes Fixes a kernel memory fault when writing to /proc, while anon_rss_enforce is set to 2. Fixes a problem where threads can hang in x_load_inmem_xtnt_map(). Fixes a potential problem flushing data to disk when using data logging with sparse files. Fixes a problem where the setgid bit of a directory was not being set when created, if its parent directory has the setgid bit set. Fixes a performance problem in AdvFS. Checksum calculation loops were removed to speed up performance. Fixes a problem in which rmvol would hang in a wait state. Fixes a kernel memory fault from ufs_mount(). Increases the efficiency of the tcp_timers. Fixes a kernel memory fault panic in anon_getpage(), _ms_free(), and locking issues regarding the vm_kanon hash list. Incorrect locking around the vm_kanon hash list searching and removal could lead to kernel memory faults, simple lock timeouts, or corrupted kernel data. Addresses two problems with the ee driver for DE60x Ethernet cards. These problems affect all Summary of Base Operating System Patches 2-61 Tru64 systems containing ee cards. Fixes a race condition where the card could stop receiving packets from the network under rare circumstances. Fixes for the lan_config user options -x and -s. Patch 481.00 PPPPaaaattttcccchhhh:::: Fix for AdvFS panic OSF500-401B SSSSttttaaaatttteeee:::: Supersedes patch OSF500-192 (321.00) This patch modifies AdvFS kernel code and several utilities. AdvFS will no longer panic with the following error: ADVFS EXCEPTION : panic cpu(0) : bad frag free list The code is modified so that during frag allocation when AdvFS determines that the frag group header's free list has been corrupted, it stops using it and marks it BAD. It is then removed from the free list so no more allocations can take place and no deallocations are performed. The verify, shfragbf, and vfragpg programs are modified to report BAD frag groups. 2-62 Summary of Base Operating System Patches Patch 488.00 PPPPaaaattttcccchhhh:::: Security (SSRT0636U, SSRT0689U) OSF500-361 SSSSttttaaaatttteeee:::: Supersedes patches OSF500-047 (102.00), OSF500-075 (121.00), OSF500-294 (236.00), OSF500-245 (237.00), OSF500-204 (238.00), OSF500-191 (239.00), OSF500-280 (240.00), OSF500-233 (241.00), OSF500-156A (242.00), OSF500-288 (243.00), OSF500-242 (245.00), OSF500-328 (482.00), OSF500-322 (483.00), OSF500-355A (484.00), OSF500-375 (485.00), OSF500-359 (486.00) This patch corrects the following: Fixes a problem in which ufs_fsck can get blocked while attempting to flush NFS buffers for a service that has become suspended. Fixes a problem that was causing the csh globbing function to be extremely slow when accessing file information on NFS, AFS, or VMS file systems. Fixes a problem for those applications that assume initial allocations of memory from the C run-time library's malloc() function will return only zero-filled memory. Fixes a problem in libc that affects debugger tracebacks of code containing split procedures. Fixes a problem in libc where gmtime() would return a tm struct containing an incorrect tm_zone abbreviation if previous calls to both gmtime() and localtime() were made. Fixes regressions in the regular expression logic used by grep. Fixes a problem in libc that affects the mktemp, tmpnam, and tempnam functions. The temporary file names that were generated might contain the # charater, which violates the file-naming standard and may cause problems if a shell script containing a reference to that filename is generated. Corrects the problem with /usr/bin/login in an NIS environment to better handle group information processing. A potential security vulnerability has been Summary of Base Operating System Patches 2-63 discovered where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file or privilege management. Compaq has corrected this potential vulnerability. This patch fixes a problem where a TZ environment variable setting of ":" yields incorrect (or missing) time zone information after calling tzset() and incorrect error reporting from mktime(). Adds functionality to terminate the resulting string from calls to swprintf(). Corrects a regular expression performance problem in libc. Fixes the declaration of cuserid() in stdio.h and unistd.h so that no conflicts exist when using the C++ compiler. Fixes the problem of optimized programs printing incorrect values for long doubles. Restores correct behavior that existed on pre- V5.0 releases for ecvt() and fcvt(). Floating point exceptions and core dumps no longer occur when denormalized values are passed to ecvt() and fcvt(). Resolves issues with customer applications that experienced floating point exceptions and core dumps when passing denormalized values to ecvt() and fcvt() that subsequently caused INFORMIX databases to crash. Fixes regular expression handling with non- default locale settings. Patch 490.00 PPPPaaaattttcccchhhh:::: Fixes declaration of cuserid OSF500-355B SSSSttttaaaatttteeee:::: New This patch fixes the declaration of cuserid() in stdio.h and unistd.h so that no conflicts exist when using the C++ compiler. 2-64 Summary of Base Operating System Patches Patch 492.00 PPPPaaaattttcccchhhh:::: Fix for system boot problem when using tape OSF500-316 SSSSttttaaaatttteeee:::: Supersedes patches OSF500-091 (136.00), OSF500-184 (252.00), OSF500-239 (254.00) This patch corrects the following: Fixes a problem in which an invalid PCI entry in sysconfigtab can cause the system to be unbootable. Fixes several problems specific to AlphaServer 1200 and AlphaServer 4100 systems: The user.log file has the following message: redundant power supply failure The messages file has the following intermittent messages: ERROR: i2c_read_temp: environmental monitoring error ERROR: i2c_read_fail_reg: environmental monitoring error ERROR: i2c_read_func_reg: environmental monitoring error Systems were shutting themselves down displaying the following message: System has reached a high temperature condition. Possible problem source: Clogged air filter or high ambient room temperature Provides PCI Resource Management support for the Atalla AXL200 cryptographic accelerator card. It also fixes a problem where genvmunix does not boot on a system with a Atalla AXL200 card installed. Fixes a problem that will cause a system to not boot when the boot device is a tape created by Summary of Base Operating System Patches 2-65 btcreate. Patch 494.00 PPPPaaaattttcccchhhh:::: Fix for quotacheck -v command OSF500-308 SSSSttttaaaatttteeee:::: New This patch fixes a bug where quotacheck -v will report that it has fixed some quotas. If you keep running the command, it will keep reporting the exact same fixes. Patch 498.00 PPPPaaaattttcccchhhh:::: Threads hang renaming files on NFS mounted file system OSF500-378 SSSSttttaaaatttteeee:::: Supersedes patches OSF500-031 (26.00), OSF500-383 (495.00), OSF500-307 (496.00) This patch corrects the following: Corrects a problem that can cause an NFS client application to hang, or causes a "lock already owned by thread" panic when lockmode=4. Corrects a problem where a race condition in NFS can result in a kernel memory fault. Corrects a problem where a directory entry may be attempted to be changed to "." and the code checks for this prevents it from happening. Fixes a problem where threads can hang while renaming files on NFS mounted file systems. 2-66 Summary of Base Operating System Patches Patch 501.00 PPPPaaaattttcccchhhh:::: tar -F ignores files named err OSF500-310 SSSSttttaaaatttteeee:::: Supersedes patches OSF500-043 (32.00), OSF500-205 (270.00), OSF500-371 (499.00) This patch corrects the following: The tar/pax program did not always read the last tape record of an archive. This caused confusion for scripts that were reading a series of archives on the no-rewind device. Fixes a cpio hanging problem in the Japanese locales. Corrects pax/tar/cpio to properly extract explicitly specified files. When an archive contained a file with extended attributes and a different file (occurring later in the archive) was specified to be extracted, improper buffer pointer management resulted in the following display (example uses tar): tar: /dev/nrmt0h : This doesn't look like a tar archive tar: /dev/nrmt0h : Skipping to next file... tar: Memory allocation failed for extended data while reading : Not enough space The directory option was similarly affected. In this case the information for the specified file was not reported. Fixes a problem where the tar -F (Fasttar) option ignores files named err but does not ignore files named errs and directories named SCCS and RCS. Summary of Base Operating System Patches 2-67 Patch 504.00 PPPPaaaattttcccchhhh:::: ksh problems occur in multi-byte Asian locales OSF500-372 SSSSttttaaaatttteeee:::: Supersedes patches OSF500-016 (15.00), OSF500-027 (23.00), OSF500-349 (502.00) This patch corrects the following: Corrects a problem that may cause ksh to core dump when displaying a large here-document in a ksh script. Fixes a problem in ksh which required 2 SIGTERM signals to be sent to the process when it exec'ed. Fixes a possible handling problem with multibyte character boundary conditions in ksh script processing. Fixes two ksh problems that occur in multi-byte Asian locales. 2-68 Summary of Base Operating System Patches Patch 506.00 PPPPaaaattttcccchhhh:::: Fix for PowerStorm 4D10T graphics card OSF500X11-029 SSSSttttaaaatttteeee:::: Supersedes patches OSF500X11-001 (36.00), OSF500X11-010 (58.00), OSF500X11-016 (283.00), OSF500X11-019 (285.00) This patch corrects the following: Fixes a problem where, on systems with a Powerstorm 4D10T (ELSA Gloria Synergy) graphics board, sometimes the X server does not draw lines correctly. Provides the X server support for the PCI To Ethernet/Graphics Combo Adapter (3X-DEPVD-AA) (also known as the ITI6021E Fast Ethernet NIC 3D Video Combination Adapter, InterServer Combo, or JIB). Fixes a problem where, on systems with a PowerStorm 4D10T (ELSA Gloria Synergy, SN- PBXGK-BB) graphics card or a PCI To Ethernet/Graphics Combo Adapter (3X-DEPVD-AA), sometimes lines and images are not drawn correctly in scrolled windows. Fixes synchronization and drawing problems in the X server for the PowerStorm 4D10T (ELSA Gloria Synergy, SN-PBXGK-BB) graphics card. Fixes a memory leak in the X server on systems with a PowerStorm 4D10T (ELSA GLoria Synergy, SN-PBXGK-BB) graphics card that could occur when a client repeatedly created and destroyed buffers for the X Window System Multibuffering Extension (XmbufCreateBuffers/XmbufDestroyBuffers). Summary of Base Operating System Patches 2-69 Patch 508.00 PPPPaaaattttcccchhhh:::: Security (SSRT1-19U) OSF500-365 SSSSttttaaaatttteeee:::: New A potential security vulnerability has been discovered where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file or privilege management. Compaq has corrected this potential vulnerability. Patch 510.00 PPPPaaaattttcccchhhh:::: X server grows excessively OSF500X11-021 SSSSttttaaaatttteeee:::: New This patch fixes a problem where the X server can grow excessively when accessing certain fonts. 2-70 Summary of Base Operating System Patches Patch 513.00 PPPPaaaattttcccchhhh:::: Fix for kmf on EV6 systems using ITPSA driver OSF500-398 SSSSttttaaaatttteeee:::: Supersedes patches OSF500-002 (1.00), OSF500-104 (68.00), OSF500-201 (305.00), OSF500-385 (511.00) This patch corrects the following problems on the KZPCM and 8952U adapters: A panic, machine check, or hang can occur when aborting an I/O due to a command timeout or aborting an application program with pending I/Os. Fixes problems related to the ITPSA driver where errors can occur while the system is processing a SCSI bus or SCSI bus device reset request that is issued. Includes a fix to a problem on the 8951U and 8952U adapters. SCSI bus resets are lost when these adapters are connected to single ended drives. Fixes a lockmode 4 panic on boot. Fixes a problem where chip interrupt register fields in error log are incorrect. Fixes that lessen the opportunity of aborts being issued for an already completed I/O. Fixes a kernel memory fault panic caused by a SWS data structure being released twice. Fixes a simple lock timeout panic. It was possible for a bus reset to be generated before the previous bus reset was processed causing excessive processing within the ISR. Fixes a problem with the ITPSA driver. The driver negotiated for ULTRA2 speed when it was attached to a single-ended bus. Fixes a problem with ITPSA driver in which the system will panic in itpsa_allocReq() on boot when lockmode=4 is set. Fixes a problem with some slower tape devices serviced by the ITPSA driver by lengthening the timeout value used. Summary of Base Operating System Patches 2-71 Fixes a problem that can cause a simple lock timeout or a kernel memory fault on EV6 systems using the ITPSA driver. Patch 515.00 PPPPaaaattttcccchhhh:::: Fix for kernel build failures OSF500-381 SSSSttttaaaatttteeee:::: New This patch fixes kernel build failures due to an undefined ss_sched function. 2-72 Summary of Base Operating System Patches Patch 517.00 PPPPaaaattttcccchhhh:::: Various print fixes OSF500-327 SSSSttttaaaatttteeee:::: Supersedes patches OSF500-164 (306.00), OSF500-256 (307.00), OSF500-264 (308.00), OSF500-185 (309.00), OSF500-301 (311.00) This patch corrects the following: When printing jobs, a timeout can occur after five minutes which causes some large print jobs to stop, then resume printing from the beginning of the print job. When slave lpd daemons try to process jobs on the print queue, some of them can fail to obtain a lock on the lock file, and exit with an error. Print jobs will print out twice. A remote print job may fail to print, with the error message: lstat/open failed for dfA... no such file or directory If a print job is printing, and the connection to the remote printer is lost, the print job does not resume printing after the connection is restored. Sometimes, as sequence numbers wrap around from 999 to 000, job 000 gets submitted before, and prints before, job 999. lpstat -u output is incorrect. When using the I18N ya option, the queue daemon filters will terminate after 32 jobs. Under certain circumstances, print jobs are terminated when printing to certain printers that are connected to a DECserver through TCP/IP. When lpd reads any data from the printer that has not been read, for local and remote connections, the read-backs for remote connections cause an additional 2-second time out which may cause a job-submit failure on the job-number wraparound. Corrects a problem in which, under certain Summary of Base Operating System Patches 2-73 conditions, unnecessary error messages are written to the lpr.log file. A user is unable to delete a print job from a remote system with a hostname greater than 32 characters because the hostname was truncated. When a TCP/IP connection fails, the retry algorithm would take longer to print jobs due to a long retry interval. A timing hole during lpd last-job completion and shutdown needed to be closed. It was not possible to print to the lpd queue using Windows 2000. Introduces the JJ /etc/printcap parameter, which allows the user to choose either one TCP/IP connection for all jobs in the print queue (JJ=1), or a TCP/IP connection for each job in the print queue ( ). It also closes a timing hole that existed when lpd was shutting down. Fixes a problem in which lpd hangs when printing to advanced server queues (using /dev/null). Patch 519.00 PPPPaaaattttcccchhhh:::: dop tool causes segmentation fault OSF500DX-026 SSSSttttaaaatttteeee:::: New This patch fixes a problem in which the dop tool would cause a segmentation fault when a non-root user entered the root password. 2-74 Summary of Base Operating System Patches Patch 521.00 PPPPaaaattttcccchhhh:::: Fixes a problem on multi-head systems OSF500CDE-016 SSSSttttaaaatttteeee:::: Supersedes patch OSF500CDE-007 (54.00) This patch corrects the following: Fixes a problem where when running the Common Desktop Environment (CDE) on a system with more than one graphics card and monitor (multihead), sometimes new windows were visible when the screen was locked. Fixes a problem on multi-head systems in which the unlock display only works if the default display is screen 0. Summary of Base Operating System Patches 2-75 Patch 523.00 PPPPaaaattttcccchhhh:::: Fixes heartbeat timer in memory channel driver OSF500-392 SSSSttttaaaatttteeee:::: New This patch corrects the following: Fixes an incorrect heartbeat timer within the memory channel driver which caused rail failures to be incorrectly reported on memory channel Version 2 cards. With the heartbeat timer set too short, the system can be erroneously led to believe a hardware failure has occurred. Messages of the form "rmerror_int: ..." are output to the messages file containing an error_type which has bit 29 set in error_type (heartbeat timeout). The binary error log will also have this data. Typically, the error_type data will be 0xe00000000. The messages are followed by the system hanging or panicking. When panicking, the following message is produced: panic (cpu 0): rm_failover_if_necessary, both rails bad A real hardware failure produces the same symptoms and stack trace. For example, having an error_type of 0xe00000002 indicates a write transmit hardware fatal failure. Patch 525.00 PPPPaaaattttcccchhhh:::: ATM set up script fails when configuring ELAN OSF500-332 SSSSttttaaaatttteeee:::: New This patch fixes a problem of the ATM setup script failing when configuring an ELAN if the lane subsystem is not loaded. Patch 527.00 PPPPaaaattttcccchhhh:::: inetd terminates without notice OSF500-368 SSSSttttaaaatttteeee:::: New This patch corrects a problem with inetd which could result in its termination without notice and without a core file. 2-76 Summary of Base Operating System Patches Patch 529.00 PPPPaaaattttcccchhhh:::: Fix for program hang when using debugger OSF500-377 SSSSttttaaaatttteeee:::: New This patch corrects a problem where attaching to a program with a debugger will cause periodic timers to be lost and will make the program hang. Patch 531.00 PPPPaaaattttcccchhhh:::: Fix for newgrp command failure OSF500-335 SSSSttttaaaatttteeee:::: New This patch corrects the problem where newgrp(1) fails if the file /etc/group contains multiple lines for one group. Patch 533.00 PPPPaaaattttcccchhhh:::: Fixes a problem in diskconfig OSF500DX-027 SSSSttttaaaatttteeee:::: New This patch fixes a problem in diskconfig where partitions with an offset and size of zero cannot be selected. It also fixes a problem where overlapping partitions cannot be adjusted if the existing partitions are not in alphabetical order. Summary of Base Operating System Patches 2-77 Patch 535.00 PPPPaaaattttcccchhhh:::: Fixes for Compaq C compiler OSF500-362 SSSSttttaaaatttteeee:::: Supersedes patches OSF500-036 (29.00), OSF500-127 (90.00), OSF500-215 (342.00), OSF500-291 (344.00) This patch fixes the following problems in the Compaq C compiler: A compile-time performance problem with a very large (1.6 MB) array initialization. A compiler crash when compiling intrinsic memset. A run-time error for a program containing an unsigned long in a for loop and is compiled -arch ev6 -O. A compiler crash when using cc -feedback. A run-time error for a program involving the incorrect evaluation of temp = w*(iter+1); in a while loop. A run-time error for a program containing k = (char)(l >> 8) is not sign-extended when compiled using -O. A compiler crash when duplicate function prototypes found in function scope. A compiler crash when using the -MD flag to generate dependency files in a non-writable directory. A compiler crash when compiling Xemacs 21.1.4 with -O4. An optimizer problem in loop unrolling that suppressed intermediate updates to induction variables under certain conditions. A potential problem with scheduling and .arch ev6 when producing assembly files using -S. An optimizer problem that produced incorrect code when certain bounds checking within a loop was moved outside the loop. A virtual memory exhausted error when compiling 2-78 Summary of Base Operating System Patches the Open Source encryption library OpenSSL. An optimizer problem in loop unrolling that caused an incorrect result under certain conditions. Various compiler crashes under certain conditions. An optimizer problem that caused some of the exception handling example programs in Chapter 11 of the Programmer's Guide to fail. An optimizer problem that caused a Perl validity test to fail when using a long double NaN. An optimizer problem that caused the wrong answer to be produced for a program involving tail recursion. Fixes a problem in bounds checking that caused a compilation to fail with a virtual memory exceeded error. Patch 537.00 PPPPaaaattttcccchhhh:::: Fix for os_mibs core dump problem OSF500-311 SSSSttttaaaatttteeee:::: New This patch fixes a problem where os_mibs would core dump. Patch 539.00 PPPPaaaattttcccchhhh:::: Delivers version V1.0-032 of libots3 library OSF500-406A SSSSttttaaaatttteeee:::: New This patch fixes a problem in the parallel processing support library that caused incorrect run-time results for an OpenMP program. Patch 541.00 PPPPaaaattttcccchhhh:::: Fix for libots3 static library OSF500-406B SSSSttttaaaatttteeee:::: New This patch fixes a problem in the parallel processing support library that caused incorrect run-time results for an OpenMP program. Summary of Base Operating System Patches 2-79 Patch 543.00 PPPPaaaattttcccchhhh:::: Security (SSRT0672U) OSF500-336 SSSSttttaaaatttteeee:::: New A potential security vulnerability has been discovered where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file or privilege management. Compaq has corrected this potential vulnerability. Patch 545.00 PPPPaaaattttcccchhhh:::: Fixes automount handling of the nogrpid option OSF500-360 SSSSttttaaaatttteeee:::: Supersedes patch OSF500-195 (349.00) This patch corrects the following: Prevents the message "nfscast: select: Invalid argument" message from appearing in the daemon.log when the server is not available. Changes the "trymany: servers not responding: RPC: Unable to receive" message to an informational rather than an error message. Fixes the automount handling of the nogrpid option. Patch 547.00 PPPPaaaattttcccchhhh:::: Fixes a problem in rpc.lockd OSF500-309 SSSSttttaaaatttteeee:::: New This patch fixes a problem in rpc.lockd where the FCNTL () function fails to lock NFS mounted directories. 2-80 Summary of Base Operating System Patches Patch 549.00 PPPPaaaattttcccchhhh:::: vi core dumps when it finds invalid syntax OSF500-346 SSSSttttaaaatttteeee:::: Supersedes patch OSF500-160 (351.00) This patch corrects the following: Corrects the error handling when invalid multibyte sequences are encountered by the vi, ex, or more commands. Fixes a problem in which the vi editor core dumps when it finds invalid syntax during a substitute operation. Patch 551.00 PPPPaaaattttcccchhhh:::: Security (SSRT0654U, SSRT0662U, SSRT0663U) OSF500DX-025 SSSSttttaaaatttteeee:::: New A potential security vulnerability has been discovered where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file or privilege management. Compaq has corrected this potential vulnerability. Summary of Base Operating System Patches 2-81 Patch 554.00 PPPPaaaattttcccchhhh:::: Upgrades sys_check utility to V120 OSF500-345 SSSSttttaaaatttteeee:::: Supersedes patches OSF500-292 (359.00), OSF500-380 (552.00) This patch upgrades sys_check utility to Version 119.1 and provides the following changes: Two NFS bugs. Utilizes Compaq Analyze when available. Utilizes storage's new cliscript tool in place of hszterm. Updated ASU section. Fixes errors generated by syscheck when NFS is not configured and reduces execution time for certain configurations of disks. Upgrades sys_check to Version 120. Patch 556.00 PPPPaaaattttcccchhhh:::: Replaces declarations of wcstok and wcsftime OSF500-353 SSSSttttaaaatttteeee:::: New This change replaces declarations of wcstok() and wcsftime() interfaces with the correct declarations defined in ISO/IEC 9899:1990/Amendment 1:1994(E). 2-82 Summary of Base Operating System Patches Patch 558.00 PPPPaaaattttcccchhhh:::: Fix for dtpad utility OSF500CDE-017 SSSSttttaaaatttteeee:::: Supersedes patch OSF500CDE-001A (39.00) This patch corrects the following: Fixes a problem where the Account Manager application, dxaccounts, gets a "BadPixmap" error when selecting an account after the View Preferences Display Icons By Name option has been selected. Dixes a problem where, if dtpad cannot allocate enough memory, it will exit and leave a zero- length file in place of the file being edited. Patch 560.00 PPPPaaaattttcccchhhh:::: Corrects a stack overflow panic OSF500-313 SSSSttttaaaatttteeee:::: New This patch corrects a stack overflow panic encountered during the startup of the system management deamon(smsd) on configurations with more than 255 devices. Patch 562.00 PPPPaaaattttcccchhhh:::: X server now dynamically retrieves vendor string OSF500X11-030 SSSSttttaaaatttteeee:::: New This patch changes the X server to dynamically retrieve its vendor string information when running on COSIX64. Patch 564.00 PPPPaaaattttcccchhhh:::: Fix for Korn shell hang OSF500-395 SSSSttttaaaatttteeee:::: New This patch fixes a problem where the Korn shell (ksh) could hang if a large number of commands were pasted to it when it was running in a terminal emulator window (such as an xterm). Summary of Base Operating System Patches 2-83 Patch 566.00 PPPPaaaattttcccchhhh:::: Fixes a memory leak in the X server OSF500X11-028 SSSSttttaaaatttteeee:::: New This patch fixes a memory leak in the X server that could occur when a client repeatedly created and destroyed buffers for the X Window System Multibuffering Extension (XmbufCreateBuffers/XmbufDestroyBuffers). Patch 568.00 PPPPaaaattttcccchhhh:::: Corrects a memory leak in XTI socket code OSF500-347 SSSSttttaaaatttteeee:::: New This patch corrects a memory leak in XTI socket code Patch 570.00 PPPPaaaattttcccchhhh:::: Fix for ATM signalling problem OSF500-334 SSSSttttaaaatttteeee:::: Supersedes patch OSF500-223 (385.00) This patch corrects the following: Fixes a problem in which the system may panic with the error message "simple lock: time limit exceeded" when running ATM. Fixes a problem of ATM signalling going into the "connection released" after a system reboot. Patch 572.00 PPPPaaaattttcccchhhh:::: OSF500-342 OSF500-342 SSSSttttaaaatttteeee:::: New This patch prevents a panic on TurboLaser systems with a DE600 in PCI slot 0. Misidentification of the DE600 in PCI slot 0 causes data structure corruption. TurboLaser systems include the following: AlphaServer 8200 AlphaServer 8400 AlphaServer GS60 AlphaServer GS60E AlphaServer GS140 A DE600 is a single-port 10/100 Mbps Fast Ethernet NIC. 2-84 Summary of Base Operating System Patches Patch 574.00 PPPPaaaattttcccchhhh:::: Fix for fsx exerciser OSF500-314 SSSSttttaaaatttteeee:::: New This patch corrects a problem in which fsx would disregard the -s flag. Summary of Base Operating System Patches 2-85 Patch 578.00 PPPPaaaattttcccchhhh:::: Various fixes for ld command OSF500-364 SSSSttttaaaatttteeee:::: Supersedes patches OSF500-012 (11.00), OSF500-105 (69.00), OSF500-116A (79.00), OSF500-190 (392.00), OSF500-344 (575.00), OSF500-348 (576.00) This patch corrects the following: Fixes a problem where the linker (ld) would insert incorrect values for the symbols etext and _etext when building kernels larger than 4 MB. Fixes a problem where the linker (ld) could not read arguments longer than 1024 characters in input files. This also adds proper support for line continuation characters. Fixes a problem where the linker and OM would not properly process a large (multi-GOT) image in the presence of the -om option. This patch also fixes a problem with the linker not properly handling scTlsUndefined symbols. Including a shared library on a link line twice with another library in between caused unresolved symbols in some cases. Linking large applications with -om -call_shared with very large numbers of external symbols sometimes failed to link. Fixes two errors that occur when using the -f switch with the linker (ld): Using the -f switch produces link errors. Any unsupported switch beginning with -f gets interpreted to mean -f. Fixes a problem where the linker defined symbol _fpdata would end up being undefined if it was referenced by a program but not used by the linker. Fixes two problems in the linker where it would erroneously report "multiply defined symbol" 2-86 Summary of Base Operating System Patches errors or "unresolved symbol" errors: Modifies the linker's symbol resolution to enable it to recognize when a reference to a symbol defined in a shared library is replaced by a symbol defined in an object file or archive. Modifies the linker to cause it to re-scan shared libraries before reporting unresolved symbols. Fixes a problem where the linker may incorrectly optimize the jsr Alpha instruction when linking large applications at -O2 or higher. This could result in an incorrect function call. The likelihood of encountering this problem is extremely rare because numerous low-level conditions must also be true during the link. Fixes a problem where the linker defined symbol _fpdata would end up being undefined if it was referenced by a program but not used by the linker. Patch 580.00 PPPPaaaattttcccchhhh:::: Security (SSRT1-15, SSRT0713U) OSF500-386 SSSSttttaaaatttteeee:::: New A potential security vulnerability has been discovered where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file or privilege management. Compaq has corrected this potential vulnerability. Summary of Base Operating System Patches 2-87 Patch 582.00 PPPPaaaattttcccchhhh:::: Security (SSRT0592U) OSF500-338 SSSSttttaaaatttteeee:::: Supersedes patch OSF500-123 (86.00) This patch corrects the following: A potential security vulnerability has been discovered where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file or privilege management. Compaq has corrected this potential vulnerability. Corrects a problem in the rdist utility which was causing segmentation faults on files with more than one link. Patch 584.00 PPPPaaaattttcccchhhh:::: Kernel memory fault occurs while using tablet OSF500-317 SSSSttttaaaatttteeee:::: New This patch fixes a kernel memory fault which occurs while using a tablet instead of a mouse. 2-88 Summary of Base Operating System Patches Patch 586.00 PPPPaaaattttcccchhhh:::: Hang on multi-CPU systems using NFS- over-TCP OSF500-357 SSSSttttaaaatttteeee:::: Supersedes patches OSF500-029 (24.00), OSF500-097 (142.00) This patch corrects the following: Corrects problems with NFS V3 XDR encoding. It also corrects a problem where the system may hang due to a problem with NFS write gathering code. Fixes a system hang problem due to a bug in the NFS write-gathering code. The code does not fully synch all writes. Corrects a hang that can be seen on multi-CPU systems using NFS-over-TCP. The SMP race is seen between the nfs_tcp_input and the nfs_tcp_thread functions. Patch 588.00 PPPPaaaattttcccchhhh:::: Fix for DS10/DS20 performance problems OSF500-376 SSSSttttaaaatttteeee:::: New This patch fixes DS10/DS20 performance problems introduced with the i2c driver by using thread blocking, rather than event_timeout() and DELAY(). Patch 590.00 PPPPaaaattttcccchhhh:::: Fix for unaligned kernel space panic OSF500-330 SSSSttttaaaatttteeee:::: New This patch fixes a problem in which the system may panic with the panic string "Unaligned kernel space access from kernel mode". Summary of Base Operating System Patches 2-89 Patch 593.00 PPPPaaaattttcccchhhh:::: Security (SSRT0664U) OSF500-306 SSSSttttaaaatttteeee:::: New. Supersedes patch OSF500-343 (591.00) This patch corrects the following: Corrects a problem with the ftpd daemon which could result in PC ftp clients hanging when transferring some files in ASCII mode. A potential security vulnerability has been discovered where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file or privilege management. Compaq has corrected this potential vulnerability. 2-90 Summary of Base Operating System Patches Patch 595.00 PPPPaaaattttcccchhhh:::: CDFS media burned in 2001 shows the wrong dates OSF500-358 SSSSttttaaaatttteeee:::: Supersedes patches OSF500-108 (72.00), OSF500-057 (106.00), OSF500-095 (140.00), OSF500-259 (432.00) This patch corrects the following: Fixes a problem where the system can panic with the panic string "secsize_resid < d_reclen" when accessing a defective CD-ROM. Fixes a problem in which system may memory fault if CFS server no longer had access to the CD-ROM device. Fixes a panic in cdfs that has the following error message: Panic: "simple_unlock: no locks owned by cpu; vnode.v_lock class" Fixes a problem with CDFS. Fatal errors occur when trying to load data from a CDFS CD-ROM over NFS. CDFS media burned in 2001 shows the wrong dates. Summary of Base Operating System Patches 2-91 Patch 597.00 PPPPaaaattttcccchhhh:::: Fix for joind problem OSF500-363 SSSSttttaaaatttteeee:::: Supersedes patches OSF500-103 (67.00), OSF500-055 (105.00), OSF500-089 (134.00) This patch corrects the following: Fixes a problem in which joind does not listen on interfaces configured with DECnet and returns "unaligned access" messages. Fixes a problem of the joind daemon not appending the hostname to the load file specified in the bf flag in the /etc/bootptab file. Fixes a problem in which bprelay does not work properly and displays the error message "bprelay[658]: can't find interface which received packet". Corrects a problem with joind which caused it to respond to certain client dhcp requests via the wrong port. 2-92 Summary of Base Operating System Patches Patch 599.00 PPPPaaaattttcccchhhh:::: System may core dump when accessing FDI floppy OSF500-352 SSSSttttaaaatttteeee:::: Supersedes patches OSF500-187 (435.00), OSF500-325 (437.00) This patch corrects the following: Fixes a problem with the floppy driver which causes data inconsistencies. Compaq has determined in laboratory testing that there is a theoretical possibility that during read and write operations to the floppy disk on DS10, DS10L and ES40 AlphaServers and VS10 and XP900 AlphaStations, a single byte of data may be inaccurately read or written without notice to the user or system. The potential for this anomaly exists only if floppy data read and write operations are attempted while there is extremely heavy traffic on these Alpha systems' internal input/output busses. Although Compaq has observed the anomaly only in laboratory tests designed to create atypical system stresses, including almost constant use of the floppy disk drive, we are supplying this patch to address this potential issue. Corrects a potential system crash when accessing the FDI floppy. Summary of Base Operating System Patches 2-93 Patch 601.00 PPPPaaaattttcccchhhh:::: Fix for CDE window manager looping problem OSF500CDE-018 SSSSttttaaaatttteeee:::: Supersedes patch OSF500CDE-015 (439.00) This patch corrects the following: Fixes a problem in which the Window Manager (dtwm) intermittently hangs on a system which uses multiple displays. Fixes a problem where the Common Desktop Environment (CDE) window manager loops or aborts when creating and deleting workspaces or when displaying the CDE Window List. ______________________________________________________________________________ ______________________________________________________________________________ ______________________________________________________________________________ 2-94 Summary of Base Operating System Patches