Tru64 UNIX V4.0G ITSEC Certification Patch Kit
TITLE: Tru64 UNIX V4.0G ITSEC Certification Patch Kit
New Kit Date: 01-MAY-2001
Modification Date: Not Applicable
Modification Type: New Kit
This package provides patches for Version 4.0G of the Tru64 UNIX
operating system. Applying these patches to Tru64 UNIX V4.0G and configuring
the system as described in the Evaluated Configuration Guide found at
www.tru64unix.compaq.com/faqs/publications/best_practices/
produces the ITSEC-certified evaluated release of the Tru64 UNIX
operating system used for the ITSEC E2 evaluation.
This configuration may be of interest only to users who are required
to exactly replicate the environment under which the ITSEC E2 certification
was granted.
Note that this kit is based on Patch Kit 2 for V4.0G. Patches contained
in this kit may be superceded in later Patch Kits.
Install the Tru64 UNIX patches using dupatch, an installation utility
based on the setld command. The installation instructions are included
with each kit.
BEFORE INSTALLING THE OPERATING SYSTEM PATCHES
Before installing the patches for your operating system, perform the
following tasks:
1. ftp the .tar file to your site and validate that the checksums,
MD5 and SHA1 values have not changed.
The Patch Kit Installation Instructions document provides step-by-step
instructions for installing patches. This document is available in both
the ./pdf and ./htm directories.
2. Print the Patch Summary and Release Notes and the Patch Kit Installation
Instructions documents.
3. Familiarize yourself with the Patch Summary and Release Notes and the
Patch Kit Installation Instructions documents before beginning the
installation procedure.
MD5, SHA1 and sum checksum values for ITSEC_cert_kit for V4.0G
--------------------------------------------------------------
9070810153cb3262887a59885eb83a38 ITSEC_cert_kit_T64V40G.README MD5
b98ab895b495a27e0632a306487c8bbd8f504e4a ITSEC_cert_kit_T64V40G.README SHA1
40408 2 ITSEC_cert_kit_T64V40G.README SUM
325956a3bb61a58937f5f4b9b3363c67 ITSEC_cert_kit_T64V40G.tar MD5
839bf1fee4a38c4f785a391f3dd59d38333bb208 ITSEC_cert_kit_T64V40G.tar SHA1
05001 53930 ITSEC_cert_kit_T64V40G.tar SUM
26f52e515e4c836a96f0a677546e6851 ITSEC_cert_kit_T64V40G.toc MD5
e43a4cb05a220cdc32423821a8abf0d47a6953b9 ITSEC_cert_kit_T64V40G.toc SHA1
10486 156 ITSEC_cert_kit_T64V40G.toc SUM
ea32956b6a4aabffc184b7438bb2c965 ITSEC_cert_kit_T64V40G_ReleaseNotes.pdf
MD5
beb3756c0502faa452c4dbd85d4f0e03938b2c36
ITSEC_cert_kit_T64V40G_ReleaseNotes.pd
42907 84 ITSEC_cert_kit_T64V40G_ReleaseNotes.pdf SUM
4176182ab3d7853efd2235e6bf0b9e30 ITSEC_cert_kit_T64V40G_ReleaseNotes.txt
MD5
7b582f728ab1e0227f01b94ad446311e50cf5d35
ITSEC_cert_kit_T64V40G_ReleaseNotes.tx
05452 128 ITSEC_cert_kit_T64V40G_ReleaseNotes.txt SUM
PATCH KIT NAME: T64V40GAS0002-20010111
----------------------------------------------------------
NEW PATCHID: 33.00
PATCH ID: OSF445-003
REQUIRED PATCHES: NONE
CONDITIONALLY REQUIRED PATCHES: NONE
SUPERSEDED PATCHES: NONE
SPECIAL INSTRUCTIONS: NONE
FULL DESCRIPTION:
PROBLEM: (77036) (PATCH ID: OSF445-003)
********
While running Classical IP over the lfa ATM driver, a kernel panic will
occur "simple_lock: minimum spl violation" if the following conditions
are true:
1) The lfa driver is configured to use deferred interrupt
processing (driver attribute "minimal_isr" is set to 1).
Note: This is the default for the V1.0.17 driver.
2) lockmode 4 is being employed (generic attribute "lockmode"
set to 4).
On systems where lockmode 4 is not employed, a cpu would hang instead.
FILES:
./sys/BINARY/atmip.mod
CHECKSUM: 05002 242
SUBSET: OSFATMBIN445
./kernel/netinet/atm/atm_arp.c,v RCS ID: 1.1.105.1
./kernel/netinet/atm/ip_converge.c,v RCS ID: 1.1.98.1
SUPPORT NOTES: NONE
----------------------------------------------------------
NEW PATCHID: 64.00
PATCH ID: OSF445-006
REQUIRED PATCHES: NONE
CONDITIONALLY REQUIRED PATCHES: NONE
SUPERSEDED PATCHES: NONE
SPECIAL INSTRUCTIONS: NONE
FULL DESCRIPTION:
PROBLEM: (MGO11678A) (PATCH ID: OSF445-006)
********
This patch fixes a kernel memory fault when using ATM. The stack trace
will contain the following components:
trap
_XentMM
prf
printf
atm_cmm_st_null_icp
atm_cmm_progress_con
atm_cmm_new_call
FILES:
./sys/BINARY/atm.mod
CHECKSUM: 15243 286
SUBSET: OSFATMBIN445
./kernel/atm/cmm/cmm_state.c,v RCS ID: 1.1.17.1
SUPPORT NOTES: NONE
----------------------------------------------------------
NEW PATCHID: 73.00
PATCH ID: OSF445-007
REQUIRED PATCHES: NONE
CONDITIONALLY REQUIRED PATCHES: NONE
SUPERSEDED PATCHES:
OSF445-005 (55.00)
SPECIAL INSTRUCTIONS: NONE
FULL DESCRIPTION:
PROBLEM: (BCPMB215Q) (PATCH ID: OSF445-005)
********
This patch fixes a kernel memory fault in VMAC code if_addnewaddr().
The fault will occur from ifconfig(8) and the stack will include:
_XentMM
bcmp
if_addnewaddr
ifioctl
soo_ioctl
ioctl_base
ioctl
syscall
PROBLEM: (UVO74098) (PATCH ID: OSF445-007)
********
This patch adds a fix to VMAC functionality when used with NETrain.
FILES:
./sys/BINARY/ether.mod
CHECKSUM: 29239 129
SUBSET: OSFBIN445
./kernel/net/if_ethersubr.c,v RCS ID: 4.4.169.2
./kernel/netinet/if_ether.c,v RCS ID: 4.3.113.1
SUPPORT NOTES: NONE
----------------------------------------------------------
NEW PATCHID: 19.00
PATCH ID: OSF445-014
REQUIRED PATCHES: NONE
CONDITIONALLY REQUIRED PATCHES: NONE
SUPERSEDED PATCHES: NONE
SPECIAL INSTRUCTIONS: NONE
FULL DESCRIPTION:
PROBLEM: (66403) (PATCH ID: OSF445-014)
********
This patch fixes a problem with the find command. Find fails to show
filenames that start with a period.
FILES:
./sbin/find
CHECKSUM: 63179 48
SUBSET: OSFBASE445
./usr/bin/find/find.c,v RCS ID: 4.3.84.1
./usr/bin/find
CHECKSUM: 55326 48
SUBSET: OSFBASE445
./usr/bin/find/find.c,v RCS ID: 4.3.84.1
SUPPORT NOTES: NONE
----------------------------------------------------------
NEW PATCHID: 20.00
PATCH ID: OSF445-015
REQUIRED PATCHES: NONE
CONDITIONALLY REQUIRED PATCHES: NONE
SUPERSEDED PATCHES: NONE
SPECIAL INSTRUCTIONS: NONE
FULL DESCRIPTION:
PROBLEM: (TKTBC0035, 78015) (PATCH ID: OSF445-015)
********
This patch fixes a problem where the operating system only
looks in slot 0 for the primary CPU when in console mode.
This can be seen when examining the binary.errlog with the
DECevent utility. On a EV6 CPU system, DECevent displays
the text in an incorrect format that translates to an EV5 CPU.
FILES:
./sys/BINARY/arch_alpha.mod
CHECKSUM: 42329 498
SUBSET: OSFHWBIN445
./kernel/arch/alpha/machdep.c,v RCS ID: 1.2.438.1
SUPPORT NOTES: NONE
----------------------------------------------------------
NEW PATCHID: 24.00
PATCH ID: OSF445-019
REQUIRED PATCHES: NONE
CONDITIONALLY REQUIRED PATCHES: NONE
SUPERSEDED PATCHES:
OSF445-011 (16.00)
SPECIAL INSTRUCTIONS: NONE
FULL DESCRIPTION:
PROBLEM: (71646, 46891) (PATCH ID: OSF445-011)
********
This patch fixes a problem in ksh. When the current working directory
is / and the command 'cd ..' is entered, the following error message is
displayed:
ksh: ..: bad directory
PROBLEM: (76587, 52442) (PATCH ID: OSF445-019)
********
This patch fixes a problem in ksh in which a space after the
-p switch would cause the command to fail.
FILES:
./usr/bin/ksh
CHECKSUM: 57106 264
SUBSET: OSFBASE445
./usr/bin/ksh/args.c,v RCS ID: 4.2.16.1
./usr/bin/ksh/cannon.c,v RCS ID: 1.1.17.1
./usr/bin/posix/sh
CHECKSUM: 57106 264
SUBSET: OSFBASE445
./usr/bin/ksh/args.c,v RCS ID: 4.2.16.1
./usr/bin/ksh/cannon.c,v RCS ID: 1.1.17.1
SUPPORT NOTES: NONE
----------------------------------------------------------
NEW PATCHID: 26.00
PATCH ID: OSF445-021
REQUIRED PATCHES: NONE
CONDITIONALLY REQUIRED PATCHES: NONE
SUPERSEDED PATCHES: NONE
SPECIAL INSTRUCTIONS: NONE
FULL DESCRIPTION:
PROBLEM: (77869, HPAQ10H2Z, HPAQB17ND, KAOQC2623, HPAQ20CBK)
(PATCH ID: OSF445-021)
********
This patch fixes a problem in which the restore command can fail with the
following error:
"Cannot malloc space for property list"
FILES:
./usr/sbin/restore
CHECKSUM: 25747 104
SUBSET: OSFHWBASE445
./usr/sbin/restore/tape.c,v RCS ID: 4.2.74.1
./usr/sbin/rrestore
CHECKSUM: 64550 104
SUBSET: OSFCLINET445
./usr/sbin/restore/tape.c,v RCS ID: 4.2.74.1
./sbin/restore
CHECKSUM: 59135 104
SUBSET: OSFHWBASE445
./usr/sbin/restore/tape.c,v RCS ID: 4.2.74.1
SUPPORT NOTES: NONE
----------------------------------------------------------
NEW PATCHID: 28.00
PATCH ID: OSF445-024A
REQUIRED PATCHES: NONE
CONDITIONALLY REQUIRED PATCHES:
OSF445-024B (87.00)
SUPERSEDED PATCHES: NONE
SPECIAL INSTRUCTIONS: NONE
FULL DESCRIPTION:
PROBLEM: (ISV-2-120, 79010, 76571) (PATCH ID: OSF445-024)
********
Code which called the stime() function would not compile under
C++ and other strict compilation environments, unless the user
supplied their own stime() declaration. This would show up as
compilation errors or runtime errors if an incorrect prototype
was supplied by the user.
FILES:
./usr/sys/include/sys/time.h
CHECKSUM: 52598 9
SUBSET: OSFBINCOM445
./kernel/sys/time.h,v RCS ID: 4.4.71.1
SUPPORT NOTES: NONE
----------------------------------------------------------
NEW PATCHID: 87.00
PATCH ID: OSF445-024B
REQUIRED PATCHES:
OSF445-024A (28.00)
CONDITIONALLY REQUIRED PATCHES: NONE
SUPERSEDED PATCHES: NONE
SPECIAL INSTRUCTIONS: NONE
FULL DESCRIPTION:
PROBLEM: (ISV-2-120, 79010, 76571) (PATCH ID: OSF445-024)
********
Code which called the stime() function would not compile under
C++ and other strict compilation environments, unless the user
supplied their own stime() declaration. This would show up as
compilation errors or runtime errors if an incorrect prototype
was supplied by the user.
FILES:
./usr/ccs/lib/lint/llib-lc.c
CHECKSUM: 29362 47
SUBSET: OSFSDE445
./usr/ccs/bin/lint/llib-lc.c,v RCS ID: 4.2.36.1
./usr/ccs/lib/llib-lcstd.ln
CHECKSUM: 43152 181
SUBSET: OSFSDE445
./usr/ccs/lib/llib-lc.ln
CHECKSUM: 55531 181
SUBSET: OSFSDE445
SUPPORT NOTES: NONE
----------------------------------------------------------
NEW PATCHID: 31.00
PATCH ID: OSF445-028
REQUIRED PATCHES: NONE
CONDITIONALLY REQUIRED PATCHES: NONE
SUPERSEDED PATCHES: NONE
SPECIAL INSTRUCTIONS: NONE
FULL DESCRIPTION:
PROBLEM: (72280, 73818) (PATCH ID: OSF445-028)
********
This patch fixes a tftpd problem where it responds to a broadcast read
request using the system's subnet broadcast address.
This patch also provides the "-b" option to tftpd to control whether to
respond to any broadscasts.
FILES:
./usr/sbin/tftpd
CHECKSUM: 06896 32
SUBSET: OSFINET445
./usr/sbin/tftpd/tftpd.c,v RCS ID: 4.2.30.1
./usr/lib/nls/msg/en_US.ISO8859-1/tftpd.cat
CHECKSUM: 63147 1
SUBSET: OSFINET445
SUPPORT NOTES: NONE
----------------------------------------------------------
NEW PATCHID: 34.00
PATCH ID: OSF445-030
REQUIRED PATCHES: NONE
CONDITIONALLY REQUIRED PATCHES: NONE
SUPERSEDED PATCHES: NONE
SPECIAL INSTRUCTIONS: NONE
FULL DESCRIPTION:
PROBLEM: (SSRT0636U) (PATCH ID: OSF445-030)
********
A potential security vulnerability has been discovered, where under
certain circumstances, system integrity may be compromised. This may
be in the form of improper file or privilege management. Compaq has
corrected this potential vulnerability.
FILES:
./usr/sbin/named
CHECKSUM: 61950 200
SUBSET: OSFINET445
./usr/sbin/named/db_load.c,v RCS ID: 4.2.49.1
./usr/sbin/named/ns_forw.c,v RCS ID: 4.2.45.1
./usr/sbin/named/ns_maint.c,v RCS ID: 4.2.50.1
./usr/sbin/named/ns_resp.c,v RCS ID: 4.2.56.1
./sbin/named
CHECKSUM: 18048 200
SUBSET: OSFINET445
./usr/sbin/named/db_load.c,v RCS ID: 4.2.49.1
./usr/sbin/named/ns_forw.c,v RCS ID: 4.2.45.1
./usr/sbin/named/ns_maint.c,v RCS ID: 4.2.50.1
./usr/sbin/named/ns_resp.c,v RCS ID: 4.2.56.1
SUPPORT NOTES: NONE
----------------------------------------------------------
NEW PATCHID: 37.00
PATCH ID: OSF445-033
REQUIRED PATCHES: NONE
CONDITIONALLY REQUIRED PATCHES: NONE
SUPERSEDED PATCHES: NONE
SPECIAL INSTRUCTIONS: NONE
FULL DESCRIPTION:
PROBLEM: (ISV-2-121, 76443) (PATCH ID: OSF445-033)
********
The patch changes the quotactl prototype to make it POSIX
compliant. It does this by removing the argument names.
FILES:
./usr/sys/include/ufs/quota.h
CHECKSUM: 03961 9
SUBSET: OSFBINCOM445
SUPPORT NOTES: NONE
----------------------------------------------------------
NEW PATCHID: 39.00
PATCH ID: OSF445-035
REQUIRED PATCHES: NONE
CONDITIONALLY REQUIRED PATCHES: NONE
SUPERSEDED PATCHES: NONE
SPECIAL INSTRUCTIONS: NONE
FULL DESCRIPTION:
PROBLEM: (ZPO038883) (PATCH ID: OSF445-035)
********
This patch fixes a problem of NetRain devices failing to come up after the
"rcinet restart" command is entered.
The error message displayed is "/sbin/rc3.d/S00inet: ifconfig failed -
ifconfig: ioctl (SIOCIFADD): Function not implemented"
FILES:
./sbin/init.d/inet
CHECKSUM: 05988 13
SUBSET: OSFCLINET445
SUPPORT NOTES: NONE
----------------------------------------------------------
NEW PATCHID: 40.00
PATCH ID: OSF445-036
REQUIRED PATCHES: NONE
CONDITIONALLY REQUIRED PATCHES: NONE
SUPERSEDED PATCHES: NONE
SPECIAL INSTRUCTIONS: NONE
FULL DESCRIPTION:
PROBLEM: (BCPM31029) (PATCH ID: OSF445-036)
********
This patch corrects the problem of an invalid message: "nfscast: select:
Invalid argument" from appearing in the daemon.log. The message was
appearing when the automount server(s) was not available. Also the
message: "trymany: servers not responding: RPC: Unable to receive" has
been changed to print as now an informational message vs. an error
message. The message will then appear only if daemon.info or
daemon.debug is set in /etc/syslog.conf This message also appears when
the servers mentioned in the automount master file are not available.
FILES:
./usr/sbin/.upd..automount
CHECKSUM: 27588 104
SUBSET: OSFNFS445
./usr/sbin/automount/auto_mount.c,v RCS ID: 4.2.41.1
./usr/sbin/automount/nfs_cast.c,v RCS ID: 4.2.22.1
SUPPORT NOTES: NONE
----------------------------------------------------------
NEW PATCHID: 42.00
PATCH ID: OSF445-038
REQUIRED PATCHES: NONE
CONDITIONALLY REQUIRED PATCHES: NONE
SUPERSEDED PATCHES: NONE
SPECIAL INSTRUCTIONS: NONE
FULL DESCRIPTION:
PROBLEM: (78724, HPAQB09J5) (PATCH ID: OSF445-038)
********
This patch fixes the following vrestore problems:
- a previous patch caused incomplete restores
- a warning message is displayed when the path for the first
file in a group of hardlinks is created without using original
protection codes and property lists.
- a warning message is displayed and vrestore aborts if it fails to
malloc
space for a property list
- a message which had been inserted at the end of the message file, had
the wrong message category (could cause messaging confusion)
- an uninitialized variable in the code that restores property lists
could cause malloc failures, memory faults, "error setting extended
attributes" and infinite loops using the '-l' option
- corrupted property list information could cause an infinite loop
FILES:
./sbin/vrestore
CHECKSUM: 44077 616
SUBSET: OSFADVFS445
./sbin/backup/vrestore/dirmgt.c,v RCS ID: 1.1.65.1
./sbin/backup/vrestore/inotbl.c,v RCS ID: 1.1.47.1
./sbin/backup/vrestore/shell.c,v RCS ID: 1.1.60.1
./sbin/backup/vrestore/vrestore.c,v RCS ID: 1.1.148.1
./usr/lib/nls/msg/en_US.ISO8859-1/vrestore.cat
CHECKSUM: 17946 11
SUBSET: OSFADVFS445
SUPPORT NOTES: NONE
----------------------------------------------------------
NEW PATCHID: 43.00
PATCH ID: OSF445-039
REQUIRED PATCHES: NONE
CONDITIONALLY REQUIRED PATCHES: NONE
SUPERSEDED PATCHES: NONE
SPECIAL INSTRUCTIONS: NONE
FULL DESCRIPTION:
PROBLEM: (76155, 76156, 77967) (PATCH ID: OSF445-039)
********
This patch fixes a kernel memory fault caused by either one
of the following conditions:
1. On EV6 platforms, when the debugger is used to view
the OT_DEVMAP object mapping memory in I/O space
that is mapped to a user process.
2. When routine pmap_coproc_exit_notify() modifies
the pmaps' coproc_tbi function to be 0, a null
pointer, while it is being checked by routine
pmap_remove_all()
FILES:
./sys/BINARY/arch_alphapmap.mod
CHECKSUM: 16606 201
SUBSET: OSFHWBIN445
./kernel/arch/alpha/pmap.c,v RCS ID: 1.2.435.1
./usr/sys/include/arch/alpha/pmap.h
CHECKSUM: 47622 19
SUBSET: OSFBINCOM445
./kernel/arch/alpha/pmap.h,v RCS ID: 1.2.115.1
SUPPORT NOTES: NONE
----------------------------------------------------------
NEW PATCHID: 46.00
PATCH ID: OSF445-041
REQUIRED PATCHES: NONE
CONDITIONALLY REQUIRED PATCHES: NONE
SUPERSEDED PATCHES: NONE
SPECIAL INSTRUCTIONS: NONE
FULL DESCRIPTION:
PROBLEM: (none) (PATCH ID: OSF445-041)
********
This patch fixes a typo found in /usr/sys/include/if.h file.
FILES:
./usr/sys/include/net/if.h
CHECKSUM: 45703 46
SUBSET: OSFBINCOM445
./kernel/net/if.h,v RCS ID: 4.3.173.1
SUPPORT NOTES: NONE
----------------------------------------------------------
NEW PATCHID: 47.00
PATCH ID: OSF445-042
REQUIRED PATCHES: NONE
CONDITIONALLY REQUIRED PATCHES: NONE
SUPERSEDED PATCHES: NONE
SPECIAL INSTRUCTIONS: NONE
FULL DESCRIPTION:
PROBLEM: (OSF_QARs 76451, 78367, 78435) (PATCH ID: OSF445-0042)
********
o A virtual memory exhausted error when compiling the Open Source
encryption library OpenSSL.
o An optimizer problem in loop unrolling that caused an incorrect
result under certain conditions.
o Various compiler crashes under certain conditions.
FILES:
./usr/ccs/lib/cmplrs/cc/gemc_cc
CHECKSUM: 58177 5824
SUBSET: OSFCMPLRS445
SUPPORT NOTES: NONE
----------------------------------------------------------
NEW PATCHID: 48.00
PATCH ID: OSF445-043
REQUIRED PATCHES: NONE
CONDITIONALLY REQUIRED PATCHES: NONE
SUPERSEDED PATCHES: NONE
SPECIAL INSTRUCTIONS: NONE
FULL DESCRIPTION:
PROBLEM: (BCGMB0G2H, BCGM90S8B) (PATCH ID: OSF445-043)
********
This patch fixes a problem with sequential reads on round robin mirrored LSM
volumes that can result in a much longer access time versus a preferred plex
mirrored LSM volume. See the Patch Summary and Release Notes for
further information.
FILES:
./sys/BINARY/lsm.mod
CHECKSUM: 48859 269
SUBSET: OSFLSMBIN445
./kernel/vxvm/vol.h,v RCS ID: 1.1.51.1
./kernel/vxvm/vol/vol.c,v RCS ID: 1.1.78.1
./kernel/vxvm/vol/volSpace.c,v RCS ID: 1.1.38.1
./kernel/vxvm/vol/vol_cfg.c,v RCS ID: 1.1.25.1
./kernel/vxvm/volkern.h,v RCS ID: 1.1.29.1
SUPPORT NOTES: NONE
----------------------------------------------------------
NEW PATCHID: 50.00
PATCH ID: OSF445-045
REQUIRED PATCHES: NONE
CONDITIONALLY REQUIRED PATCHES: NONE
SUPERSEDED PATCHES: NONE
SPECIAL INSTRUCTIONS: NONE
FULL DESCRIPTION:
PROBLEM: (ZPO039996) (PATCH ID: OSF445-045)
********
This patch prevents vold from core dumping when a volprint,
voldisk list, or other query command is executed during the
following scenerios:
o vold is in disabled mode but several volumes are active
and enabled
o vold is in enabled mode but a warning of "Disk group log may be too small"
occurred when it was being enabled.
FILES:
./sbin/vold
CHECKSUM: 10159 720
SUBSET: OSFLSMBASE445
./usr/sbin/vxvm/vold/query.c,v RCS ID: 1.1.19.1
SUPPORT NOTES: NONE
----------------------------------------------------------
NEW PATCHID: 52.00
PATCH ID: OSF445-047
REQUIRED PATCHES: NONE
CONDITIONALLY REQUIRED PATCHES: NONE
SUPERSEDED PATCHES: NONE
SPECIAL INSTRUCTIONS: NONE
FULL DESCRIPTION:
PROBLEM: (79542) (PATCH ID: OSF445-047)
********
This patch fixes a problem where genvmunix does not boot on a system
with an Atalla AXL200 card installed.
FILES:
./sys/BINARY/pci.mod
CHECKSUM: 36528 161
SUBSET: OSFHWBIN445
./kernel/io/dec/pci/pci.c,v RCS ID: 1.1.192.1
./sys/BINARY/pd6729.mod
CHECKSUM: 12617 11
SUBSET: OSFHWBIN445
SUPPORT NOTES: NONE
----------------------------------------------------------
NEW PATCHID: 53.00
PATCH ID: OSF445-048
REQUIRED PATCHES: NONE
CONDITIONALLY REQUIRED PATCHES: NONE
SUPERSEDED PATCHES: NONE
SPECIAL INSTRUCTIONS: NONE
FULL DESCRIPTION:
PROBLEM: (HPAQC15V8) (PATCH ID: OSF445-048)
********
This fixes a kernel memory fault in procfs_get_s5_dir().
FILES:
./sys/BINARY/procfs.mod
CHECKSUM: 50810 171
SUBSET: OSFBIN445
./kernel/procfs/procfs_vnops.c,v RCS ID: 1.1.173.1
SUPPORT NOTES: NONE
----------------------------------------------------------
NEW PATCHID: 56.00
PATCH ID: OSF445-050
REQUIRED PATCHES: NONE
CONDITIONALLY REQUIRED PATCHES: NONE
SUPERSEDED PATCHES: NONE
SPECIAL INSTRUCTIONS: NONE
FULL DESCRIPTION:
PROBLEM: (TKTR90018) (PATCH ID: OSF445-050)
********
This patch fixes a "lock_terminate: lock held" panic when deleting
a process group. An example stack trace:
panic("lock_terminate: lock held")
lock_terminate()
pgdelete()
pgrp_unref()
pgrm()
proc_teardown()
waitf()
wait4()
syscall()
_Xsyscall()
FILES:
./sys/BINARY/bsd_tty.mod
CHECKSUM: 32040 39
SUBSET: OSFBIN445
./kernel/bsd/tty.c,v RCS ID: 4.4.115.1
SUPPORT NOTES: NONE
----------------------------------------------------------
NEW PATCHID: 174.00
PATCH ID: OSF445-051
REQUIRED PATCHES: NONE
CONDITIONALLY REQUIRED PATCHES: NONE
SUPERSEDED PATCHES: NONE
SPECIAL INSTRUCTIONS: NONE
FULL DESCRIPTION:
PROBLEM: (69909, 77877) (PATCH ID: OSF445-051)
********
This patch corrects several known problems with salvage:
- Fixes two infinite loops that could make salvage run forever.
- Remove garbage characters from symlink recovery in salvage.
FILES:
./sbin/advfs/salvage
CHECKSUM: 07610 288
SUBSET: OSFADVFS445
./sbin/advfs/salvage/salvage_build.c,v RCS ID: 1.1.22.1
./sbin/advfs/salvage/salvage_init.c,v RCS ID: 1.1.29.1
SUPPORT NOTES: NONE
----------------------------------------------------------
NEW PATCHID: 58.00
PATCH ID: OSF445-053
REQUIRED PATCHES: NONE
CONDITIONALLY REQUIRED PATCHES: NONE
SUPERSEDED PATCHES: NONE
SPECIAL INSTRUCTIONS: NONE
FULL DESCRIPTION:
PROBLEM: (BCSM816C6, HPAQ2144F) (PATCH ID: OSF445-053)
********
This patch fixes a problem with btcreate command where default restore
fails is the disklabel is different and fixes a problem with slow robot
media changers not waiting long enough between vdumps for the next tape
to be loaded by some media changers.
FILES:
./usr/sys/bin/btextract
CHECKSUM: 30711 87
SUBSET: OSFBINCOM445
./usr/sys/bin/btcreate
CHECKSUM: 38632 143
SUBSET: OSFBINCOM445
SUPPORT NOTES: NONE
----------------------------------------------------------
NEW PATCHID: 59.00
PATCH ID: OSF445-054
REQUIRED PATCHES: NONE
CONDITIONALLY REQUIRED PATCHES: NONE
SUPERSEDED PATCHES: NONE
SPECIAL INSTRUCTIONS: NONE
FULL DESCRIPTION:
PROBLEM: (CFS.71102) (PATCH ID: OSF445-054)
********
This patch fixes a problem where the cursor is displayed incorrectly when
the image plane is set to 1 and the mask plane is set to 0. The expected
behavior is transparent;i.e. display the frame buffer pixel data instead
of the cursor data.
FILES:
./sys/BINARY/tga.mod
CHECKSUM: 26113 133
SUBSET: OSFHWBIN445
./kernel/io/dec/ws/tga.c,v RCS ID: 1.1.92.1
SUPPORT NOTES: NONE
----------------------------------------------------------
NEW PATCHID: 60.00
PATCH ID: OSF445-055
REQUIRED PATCHES: NONE
CONDITIONALLY REQUIRED PATCHES: NONE
SUPERSEDED PATCHES: NONE
SPECIAL INSTRUCTIONS: NONE
FULL DESCRIPTION:
PROBLEM: (MGO27465A) (PATCH ID: OSF445-055)
********
This patch fixes a problem when the type of SCSI device dynamically changes,
which can result in a kernel memory fault or memory corruption panic. The
sense inquiry buffer size is allocated too small.
A typical stack trace:
> 0 stop_secondary_cpu src/kernel/arch/alpha/cpu.c : 608
1 panic src/kernel/bsd/subr_prf.c : 751
2 event_timeout src/kernel/arch/alpha/cpu.c : 1183
3 xcpu_puts src/kernel/bsd/subr_prf.c : 895
4 printf src/kernel/bsd/subr_prf.c : 423
5 panic src/kernel/bsd/subr_prf.c : 804
6 closef src/kernel/bsd/kern_descrip.c : 1973
7 exit src/kernel/bsd/kern_exit.c : 1021
8 rexit src/kernel/bsd/kern_exit.c : 822
9 syscall src/kernel/arch/alpha/syscall_trap.c : 627
10 _Xsyscall src/kernel/arch/alpha/locore.s : 1505
Panic "closef: f_count not 1" due to corruption of 'file' structure
FILES:
./sys/BINARY/cam.mod
CHECKSUM: 10218 442
SUBSET: OSFHWBIN445
./kernel/io/cam/pdrv_common.c,v RCS ID: 1.1.149.1
SUPPORT NOTES: NONE
----------------------------------------------------------
NEW PATCHID: 61.00
PATCH ID: OSF445-056
REQUIRED PATCHES: NONE
CONDITIONALLY REQUIRED PATCHES: NONE
SUPERSEDED PATCHES: NONE
SPECIAL INSTRUCTIONS: NONE
FULL DESCRIPTION:
PROBLEM: (UVO88631, UTO101963, UTO101988) (PATCH ID: OSF445-056)
********
This patch fixes a problem with the psiop driver that causes it to
fail when vdump is used. The following error is displayed:
"vdump : unable to write to device".
The problem is that the commands are not being properly flushed to
the controller in all cases, therefore the method used to queue commands
up to the controller has been improved.
FILES:
./sys/BINARY/cam_psiop.mod
CHECKSUM: 44045 212
SUBSET: OSFHWBIN445
./kernel/io/cam/siop/pci/psiop_pci.c,v RCS ID: 1.1.118.1
./kernel/io/cam/siop/psiop.c,v RCS ID: 1.1.151.1
./usr/sys/include/io/cam/siop/pci_scripthost.h
CHECKSUM: 12626 17
SUBSET: OSFBINCOM445
./kernel/io/cam/siop/pci_scripthost.h,v RCS ID: 1.1.88.1
SUPPORT NOTES: NONE
----------------------------------------------------------
NEW PATCHID: 62.00
PATCH ID: OSF445-057
REQUIRED PATCHES: NONE
CONDITIONALLY REQUIRED PATCHES: NONE
SUPERSEDED PATCHES: NONE
SPECIAL INSTRUCTIONS: NONE
FULL DESCRIPTION:
PROBLEM: (HPAQ10DTH, UVO55282) (PATCH ID: OSF445-057)
********
This patch provides the latest driver for the PowerStorm 4D10T (ELSA GLoria
Synergy, SN-PBXGK-BB) graphics card and the latest graphics driver for the
PCI To Ethernet/Graphics Combo Adapter (3X-DEPVD-AA). This version of the
driver fixes a problem where the card might fail to operate correctly after
a reboot and also fixes a minor problem in the cursor hotspot validation
code.
FILES:
./sys/BINARY/comet.mod
CHECKSUM: 64931 38
SUBSET: OSFHWBIN445
./kernel/io/dec/ws/comet.c,v RCS ID: 1.1.31.1
SUPPORT NOTES: NONE
----------------------------------------------------------
NEW PATCHID: 145.00
PATCH ID: OSF445-058A
REQUIRED PATCHES: NONE
CONDITIONALLY REQUIRED PATCHES:
OSF445-058B (147.00)
SUPERSEDED PATCHES:
OSF445-010 (15.00),
OSF445-016 (21.00),
OSF445-017 (22.00),
OSF445-026 (30.00),
OSF445-004 (44.00),
OSF445-049 (54.00),
OSF445-062 (66.00),
OSF445-064 (68.00),
OSF445-066 (69.00),
OSF445-101 (108.00),
OSF445-069 (72.00),
OSF445-008 (74.00),
OSF445-065 (141.00),
OSF445-075 (142.00),
OSF445-002 (143.00),
OSF445-095 (110.00)
SPECIAL INSTRUCTIONS: NONE
FULL DESCRIPTION:
PROBLEM: (EVT91336A) (PATCH ID: OSF445-010)
********
This patch fixes a problem where the following can occur during a
system panic:
- system calls interrupts
- mpsleep() returns an EINTR error when the panicstr
is non-NULL
- an indefinite looping at a very high priority
PROBLEM: (MGO85573B, N/A) (PATCH ID: OSF445-016)
********
This patch fixes a bug such that when 'fuser -k' is issued on a
dismounted NFS mount point in which some process is running, a
hang will occur. A new flag, -p, has been introduced. When the
-p flag is used with the -c flag, as in 'fuser -c -p -k /mnt',
the parent directories are ignored and the processes are gracefully
killed.
PROBLEM: (74277, 74545) (PATCH ID: OSF445-017)
********
This patch fixes a problem in which operations on NFS files
can hang indefinately.
PROBLEM: (13096) (PATCH ID: OSF445-026)
********
In the per-VP scheduling state that is shared between the kernel and the
DECthreads library scheduler, the compiler generates ldq/stq pairs for
a 32-bit data object that neighbors another 32-bit variable.
This patch fixes the stq that causes a word tear that corrupts the
per-VP floating point flag field called nxm_fp_owned. The affected data
structures are defined in .
PROBLEM: (BCGM10RFF, 77112) (PATCH ID: OSF445-004)
********
This patch fixes a problem where if the size of a message queue
was increased, writers to the queue that were blocked would not
wake up for processing. The msgctl(2) and msgsnd(2) system calls
now test if the message queue size has increased and if there are
writers waiting to get unblocked, then wakeup the writers and let
them proceed.
PROBLEM: (HPAQB1FTS) (PATCH ID: OSF445-049)
********
This patch fixes a system panic with panic string:
"psig: catch not set"
An example stack trace is as follows:
panic()
psig()
mach_checksig()
PROBLEM: (QCAPUN003) (PATCH ID: OSF445-062)
********
This patch fixes a problem where the system appears to hang. A
child process is holding a lock too long and preventing other
processes from doing work. The child process is waiting to
be re-parented as its parent is winding down.
No new processes can be created, although certain existing
processes will still continue to function. A forced
crash will reveal several processes waiting for the pgrphash lock.
The pgrphash lock will be held by a child process waiting for its
parent to die which is being held up by an external event.
A sample stack trace for the child process holding the pgrphash lock
0 thread_block
1 get_parent
2 fixjobc
3 pgmv
4 setpgrp1
5 setpgid
6 syscall
7 _Xsyscall
PROBLEM: (77713) (PATCH ID: OSF445-064)
********
This patch fixes a problem in which the POSIX
interval timer is not resilent to clock slowdown
cause either by NTP or by a backwards change of
the clock.
PROBLEM: (ISO100518) (PATCH ID: OSF445-066)
********
This patch fixes a kernel memory fault panic seen under certain circumstances
when a process or thread was setting its priority.
A typical stack trace would be:
> 0 boot src/kernel/arch/alpha/machdep.c : 1890
1 panic src/kernel/bsd/subr_prf.c : 834
2 trap src/kernel/arch/alpha/trap.c : 1659
3 _XentMM src/kernel/arch/alpha/locore.s : 1645
4 nxm_manager_boost src/kernel/kern/syscall_subr.c : 2503
5 trap src/kernel/arch/alpha/trap.c : 2132
6 _Xsyscall src/kernel/arch/alpha/locore.s : 1537
PROBLEM: (BCSM702LV, MGO59344E, MGO75812A) (PATCH ID: OSF445-101)
********
There is a potential for a system panic in routine sbflush()
if there is an attempt to flush a socket buffer while it is
locked by another thread. This patch corrects the problem.
PROBLEM: (73112, 78765) (PATCH ID: OSF445-095)
********
This patch fixes two panics that has the following error messages:
simple_lock: time limit exceeded
-and-
simple_lock: lock already owned by cpu
Sample stack traces are listed below:
Stack trace #1
simple_lock: time limit exceeded
pc of caller: 0xffffffff000adf44
lock address: 0xfffffc001879ca80
lock info addr: 0xfffffc0001404cd0
lock class name: task.lock
current lock state: 0xd00000bd000ac4cd
panic (cpu 0): simple_lock: time limit exceeded
syncing disks... done
Stack trace #2
12 panic("simple_lock: lock already owned by cpu")
13 simple_lock_fault()
14 simple_lock_state_violation()
15 thread_deallocate()
16 task_swapout()
17 task_swapout_thread()
PROBLEM: (HPAQ20N23) (PATCH ID: OSF445-069)
********
This patch corrects a problem with the incorrect ordering of network
interfaces which was resulting in network partitions.
PROBLEM: (HPAQ30SQ8) (PATCH ID: OSF445-008)
********
This patch fixes a panic in in_pcbfree() when ASE fails over NFS applications
that use listener sockets. The stack trace will look like the following:
panic
in_pcbfree
tcp_input
ipintr
netisr_thread
PROBLEM: (BCSM412FX) (PATCH ID: OSF445-065)
********
This patch fixes a panic in in_pcbfree() when NFS is implemented over TCP.
If an NFS server stops servicing requests to clients and the server is
rebooted to clear the NFS problem, the clients panic in in_pcbfree(). A typical
client stack trace is:
panic
in_pcbfree
tcp_input
ipintr
PROBLEM: (EVT19938A, MGO53352A, TKTB30013, 79783,
BCSM50XTD, BCSM511NN, BCSM51BGL) (PATCH ID: OSF445-075)
********
This patch fixes problems seen in the relocation of NFS services
when clients have at least one of the filesystems mounted over TCP.
The symptom is that at least one of the filesystems will fail
to unmount when the failover is attempted.
When analysis of that system is completed, at least one of the
nfs_tcp_threads will be hung in rrok3free().
The stack trace will look similar to this:
0 thread_block()
1 mpsleep()
2 rrok3free()
3 svcktcp_reply()
4 svc_sendreply()
5 rfs_sendreply()
6 rfs_dispatch()
7 nfs_rpc_recv()
8 nfs_tcp_thread ()
PROBLEM: (MGO45830B) (PATCH ID: OSF445-002)
********
System spends excessive time in the internet checksum routine
due to an invalid message length. Performance is degraded
significantly.
PROBLEM: (67762, 74793, HPAQ112FQ) (PATCH ID: OSF445-058)
********
This patch fixes reply values for NFS writes which were causing protocol
violations.
FILES:
./usr/sys/include/sys/fuser.h
CHECKSUM: 23071 2
SUBSET: OSFBINCOM445
./kernel/sys/fuser.h,v RCS ID: 1.1.35.1
./usr/sys/include/sys/socketvar.h
CHECKSUM: 43494 15
SUBSET: OSFBINCOM445
./kernel/sys/socketvar.h,v RCS ID: 4.2.94.1
./usr/sys/include/sys/proc.h
CHECKSUM: 50340 30
SUBSET: OSFBINCOM445
./kernel/sys/proc.h,v RCS ID: 4.3.124.1
./sys/BINARY/std_kern.mod
CHECKSUM: 24329 1184
SUBSET: OSFBIN445
./kernel/bsd/kern_exit.c,v RCS ID: 4.4.227.1
./kernel/bsd/kern_proc.c,v RCS ID: 4.3.124.1
./kernel/bsd/kern_sig.c,v RCS ID: 4.5.355.1
./kernel/bsd/kern_synch.c,v RCS ID: 4.3.104.1
./kernel/bsd/kern_time.c,v RCS ID: 4.4.129.1
./kernel/bsd/svipc_msg.c,v RCS ID: 4.3.102.1
./kernel/bsd/uipc_socket2.c,v RCS ID: 4.4.114.1
./kernel/kern/sched_prim.c,v RCS ID: 4.3.332.1
./kernel/kern/task_swap.c,v RCS ID: 1.1.145.1
./kernel/kern/thread.c,v RCS ID: 4.4.241.1
./kernel/svr4/kern_fuser.c,v RCS ID: 1.1.75.2
./usr/sbin/fuser
CHECKSUM: 53458 24
SUBSET: OSFBASE445
./sys/BINARY/nfs_server.mod
CHECKSUM: 32435 274
SUBSET: OSFBIN445
./kernel/nfs/nfs3_server.c,v RCS ID: 1.1.145.1
./kernel/nfs/nfs_server.c,v RCS ID: 1.1.298.1
./sys/BINARY/inet.mod
CHECKSUM: 38233 293
SUBSET: OSFBIN445
./kernel/netinet/in.c,v RCS ID: 4.3.105.1
./kernel/netinet/in_pcb.c,v RCS ID: 4.3.199.1
./kernel/netinet/ip_output.c,v RCS ID: 4.4.144.1
./kernel/netinet/tcp_input.c,v RCS ID: 4.3.188.1
./kernel/netinet/tcp_subr.c,v RCS ID: 4.3.133.1
SUPPORT NOTES: NONE
----------------------------------------------------------
NEW PATCHID: 147.00
PATCH ID: OSF445-058B
REQUIRED PATCHES:
OSF445-058A (145.00)
CONDITIONALLY REQUIRED PATCHES: NONE
SUPERSEDED PATCHES: NONE
SPECIAL INSTRUCTIONS: NONE
FULL DESCRIPTION:
PROBLEM: (67762, 74793, HPAQ112FQ) (PATCH ID: OSF445-058)
********
This patch fixes reply values for NFS writes which were causing protocol
violations.
FILES:
./usr/sbin/tcpdump
CHECKSUM: 17781 296
SUBSET: OSFINET445
./usr/sbin/tcpdump/print-nfs3.c,v RCS ID: 1.1.11.1
SUPPORT NOTES: NONE
----------------------------------------------------------
NEW PATCHID: 63.00
PATCH ID: OSF445-059
REQUIRED PATCHES: NONE
CONDITIONALLY REQUIRED PATCHES: NONE
SUPERSEDED PATCHES: NONE
SPECIAL INSTRUCTIONS: NONE
FULL DESCRIPTION:
PROBLEM: (BCSM90G7C) (PATCH ID: OSF445-059)
********
This patch fixes a hang in the shutdown process ( shutdown now command) of
a system when device has flow control switched off. The shutdown waits for
the flow control device to become available for write(2)
The patch will open the device in write with non-blocking mode which will
prevent hanging of the shutdown process.
FILES:
./sbin/shutdown
CHECKSUM: 52708 32
SUBSET: OSFBASE445
./usr/sbin/shutdown/shutdown.c,v RCS ID: 4.3.55.1
./usr/sbin/shutdown
CHECKSUM: 42052 32
SUBSET: OSFBASE445
./usr/sbin/shutdown/shutdown.c,v RCS ID: 4.3.55.1
SUPPORT NOTES: NONE
----------------------------------------------------------
NEW PATCHID: 169.00
PATCH ID: OSF445-061
REQUIRED PATCHES: NONE
CONDITIONALLY REQUIRED PATCHES: NONE
SUPERSEDED PATCHES: NONE
SPECIAL INSTRUCTIONS: NONE
FULL DESCRIPTION:
PROBLEM: (MGO61992A, N/A) (PATCH ID: OSF445-061)
********
This patch fixes a problem where advscan -a -g does not display bootable
partitions properly. For example:
# ./advscan -a -g
Scanning devices /dev/rrz16
Partition Domain Id
/dev/rrz16a 37d1ce9b.000da070 V3, mounted <-- THIS SHOULD BE BOOTABLE
1 volume in domain
Created Sat Sep 4 21:59:55 1999
Last mount Wed Dec 31 19:00:21 1969
/dev/rrz16g 37d1ce9c.0007ab70 V3, mounted
1 volume in domain
Created Sat Sep 4 21:59:56 1999
Last mount Fri May 12 10:56:31 2000
FILES:
./sbin/advfs/advscan
CHECKSUM: 45642 40
SUBSET: OSFADVFS445
./sbin/advfs/advscan/advscan.c,v RCS ID: 1.1.30.1
SUPPORT NOTES: NONE
----------------------------------------------------------
NEW PATCHID: 70.00
PATCH ID: OSF445-067
REQUIRED PATCHES: NONE
CONDITIONALLY REQUIRED PATCHES: NONE
SUPERSEDED PATCHES: NONE
SPECIAL INSTRUCTIONS: NONE
FULL DESCRIPTION:
PROBLEM: (52718, 74111, 61261) (PATCH ID: OSF445-067)
*******
Problem 1: Dbx stack trace is incomplete.
In certain cases, dbx's 'where' command did not produce a complete stack
trace. This was seen when debugging at the assembly level and using the
'stepi' command to step into a routine, or when there is a fault in some
library routines. The following shows some instances of the problem.
Stepping into a routine with stepi ('si'),
Getting a stack trace ('where' or 't')
Attempt to 'return'
>*[main:68, 0x1200018b0] ldq r27, -32568(gp)
(dbx) ni
>*[main:68, 0x1200018b4] jsr r26, (r27), 0x120005e60
(dbx) si
>*[_OtsMove, 0x3ff800d5e60] amask 0x1, r19
(dbx) t
> 0 _OtsMove(0x3ff800d5bd0, 0x4, 0x120001850, 0x3, 0x4) [0x3ff800d5e60]
(dbx) return
no place to return to
(dbx) up
(dbx) t
> 0 _OtsMove(0x3ff800d5bd0, 0x4, 0x120001850, 0x3, 0x4) [0x3ff800d5e60]
Stepping into a routine until the stack is correct
>*[main:68, 0x1200018cc] ldq r21, 40(r8)
(dbx) ni
>*[main:68, 0x1200018d0] bsr r26, recurse+0x8(line 29)
(dbx) si
>*[recurse:29, 0x120001638] ldq r28, -16448(sp)
(dbx) t
> 0 recurse(inbox = (...)) ["crashit.c":29, 0x120001638]
(dbx) ni
>*[recurse:29, 0x12000163c] ldq r28, -4096(sp)
(dbx) ni
>*[recurse:29, 0x120001640] ldq r28, -12256(sp)
(dbx) ni
>*[recurse:29, 0x120001644] lda sp, -16448(sp)
(dbx) ni
>*[recurse:29, 0x120001648] stq r26, 8144(sp)
(dbx) t
> 0 recurse(inbox = (...)) ["crashit.c":29, 0x120001648]
(dbx) ni
>*[recurse:29, 0x12000164c] stq r16, 16400(sp)
(dbx) t
> 0 recurse(inbox = (...)) ["crashit.c":29, 0x12000164c]
1 main(argc = 3, argv = 0x11ffffce8) ["crashit.c":68, 0x1200018d0]
Problem 2: Dbx cannot set a variable after viewing a non-local variable:
Dbx has several methods of looking for variables. If the variable is not
found in the current routine, active procedures on the stack are searched,
and then global variables are searched. When dbx searched up the stack for
the variable, it failed to reset an internal pointer and the assignment to a
local variable failed.
main: 52 if (argc < 3) {
(dbx) stop in justtryme
[2] stop in justtryme
(dbx) r 0 3
[2] stopped at [justtryme:21 ,0x1200015d4] deepend = levels;
(dbx) n
[justtryme:23 ,0x1200015d8] printf("Cpu %d going down,
stack about %d levels deep\n", cpu, deepend);
(dbx) p iter /* A variable local to the main routine
3
(dbx) assign deepend = 10
10
(dbx) p deepend
3
(dbx) q
Problem 3: Dbx receives signal 66 on vfork:
When debugging a program that executes a vfork, dbx exhibited this:
dbx version 3.11.10
Type 'help' for help.
main: 11 signal( SIGCHLD, handler );
(dbx) r
signal [signal 66] at >*[__vfork, 0x3ff800e7968] beq r19, 0x3ff800e7980
(dbx)
The correct behaviour follows:
main: 11 signal( SIGCHLD, handler );
(dbx) r
New child attached. Use switch to gain access to process 5774
child: 5774
(dbx)
FILES:
./usr/ccs/lib/cmplrs/cc/dbx
CHECKSUM: 04421 1032
SUBSET: OSFBASE445
SUPPORT NOTES: NONE
----------------------------------------------------------
NEW PATCHID: 80.00
PATCH ID: OSF445-071
REQUIRED PATCHES: NONE
CONDITIONALLY REQUIRED PATCHES: NONE
SUPERSEDED PATCHES: NONE
SPECIAL INSTRUCTIONS: NONE
FULL DESCRIPTION:
PROBLEM: (80166) (PATCH ID: OSF445-071)
********
This patch fixes a problem with the memx command where it inproperly handles
memory sizes of 2 GB or greater.
FILES:
./usr/field/memxr
CHECKSUM: 09584 200
SUBSET: OSFEXER445
./usr/field/memxr/memxr.c,v RCS ID: 4.2.8.1
./usr/field/memx
CHECKSUM: 09584 200
SUBSET: OSFEXER445
./usr/field/memx/memx.c,v RCS ID: 4.2.10.1
./usr/field/memxr/memxr.c,v RCS ID: 4.2.8.1
SUPPORT NOTES: NONE
----------------------------------------------------------
NEW PATCHID: 77.00
PATCH ID: OSF445-074
REQUIRED PATCHES: NONE
CONDITIONALLY REQUIRED PATCHES: NONE
SUPERSEDED PATCHES:
OSF445-060 (65.00)
SPECIAL INSTRUCTIONS: NONE
FULL DESCRIPTION:
PROBLEM: (BCGM10J56, BCGM4180B, BCGM41HLM, MGO36744A, 7XRB90123)
(PATCH ID: OSF445-060)
********
This patch fixes the following 3 problems:
1.)When a SCSI I/O command results in a bus reset, which
causes the command to be re-issued, the system sometimes
can not recover and ends up in a tight loop of bus resets.
2.) After a recovery operation is performed, the read
disk capacity sizing of the disk sometime fails to match
the original value, which causes the recovery to fail.
3.) A BBR (bad block replacement) informational message
received from an HSZ is mistakenly classified as an error.
PROBLEM: (79461) (PATCH ID: OSF445-074)
********
This patch fixes a simple lock timeout violation. The stacktrace is as
follows:
panic src/kernel/bsd/subr_prf.c
simple_lock_fault src/kernel/kern/lock.c
simple_lock_time_violation src/kernel/kern/lock.c
cam_disk_unit_atten src/kernel/io/cam/cam_disk.c
cdisk_check_sense src/kernel/io/cam/cam_disk.c
cdisk_complete src/kernel/io/cam/cam_disk.c
as_finish src/kernel/io/cam/sim_as.c
xpt_callback_thread src/kernel/io/cam/xpt.c
FILES:
./usr/sys/include/io/cam/cam_disk.h
CHECKSUM: 38930 44
SUBSET: OSFBINCOM445
./kernel/io/cam/cam_disk.h,v RCS ID: 1.1.121.1
./sys/BINARY/cam_disk.mod
CHECKSUM: 45449 328
SUBSET: OSFHWBIN445
./kernel/io/cam/cam_disk.c,v RCS ID: 1.1.505.2
SUPPORT NOTES: NONE
----------------------------------------------------------
NEW PATCHID: 107.00
PATCH ID: OSF445-076
REQUIRED PATCHES: NONE
CONDITIONALLY REQUIRED PATCHES: NONE
SUPERSEDED PATCHES:
OSF445-013 (18.00),
OSF445-029 (32.00),
OSF445-037 (41.00),
OSF445-052 (57.00)
SPECIAL INSTRUCTIONS: NONE
FULL DESCRIPTION:
PROBLEM: (74651, 75705) (PATCH ID: OSF445-013)
********
This patch fixes a problem where a root user was not allowed to check
file access on behalf of a user without completely becoming the user.
The functionality is needed by the ASU (Advanced Server for UNIX) product.
PROBLEM: (MGO90721A) (PATCH ID: OSF445-029)
********
This patch fixes a problem with simple_lock: time limit exceeded panic
seen on SMP systems with the namei.nch_lockinfo lock. A typical entry
in the /var/adm/messages file would be:
simple_lock: time limit exceeded
pc of caller: 0xfffffc00004445d8
lock address: 0xfffffc0000eb50e8
lock info addr: 0xfffffc0000772be0
lock class name: namei.nch_lockinfo
current lock state: 0x800000be00443b45
(cpu=0,pc=0xfffffc0000443b44,busy)
PROBLEM: (TKTR30001) (PATCH ID: OSF445-037)
********
This patch fixes a race condition in the UBC code
where a lookup is done on a page being invalidated (freed).
The lookup continued to access the data structure after it was
freed, and depending on who uses the data structure next,
this causes the lookup to think that the invalidation did not
complete and wait.
PROBLEM: (58325) (PATCH ID: OSF445-052)
********
This patch fixes UFS metadata update performance by adding a mount option,
"delayed", for UFS to convert synchronous metadata writes into
delayed metadata writes. The File System is often used as a cache for
transitory data such as in web servers. Applications such as Squid web
proxy server will get a significant performance boost by enabling this
option. Restoring from tape is another application that can be benefited
from this.
PROBLEM: (79937) (PATCH ID: OSF445-076)
********
This patch fixes a hang or simple_lock_state_violation panic in biodone.
This patch places mount throttle fields under the new mount_throttle_lock
(locking requirements described in mount.h). These fields previously were
under the mount lock. The problem is that it was possible for the mount
lock to be held in a context which could be interrupted by a higher
priority event, such as biodone, which could also require this lock. The
solution is to protect these fields under a different lock and spl.
The key pieces of the stack trace for this problem are:
biodone() -- wants mount lock
...
... -- interrupt service routines
...
_XentInt() -- interrupt
...
vfs_unbusy() -- some routine which takes the mount lock
(vfs_unbusy is not unique here)
...
FILES:
./usr/sys/kern/lockinfo.c
CHECKSUM: 08341 106
SUBSET: OSFBINCOM445
./kernel/kern/lockinfo.c,v RCS ID: 1.1.1196.1
./usr/sys/include/sys/mount.h
CHECKSUM: 39823 28
SUBSET: OSFBINCOM445
./kernel/sys/mount.h,v RCS ID: 4.3.195.2
./usr/sys/include/sys/vnode.h
CHECKSUM: 43381 37
SUBSET: OSFBINCOM445
./kernel/sys/vnode.h,v RCS ID: 4.3.191.1
./sys/BINARY/vfs.mod
CHECKSUM: 60888 376
SUBSET: OSFBIN445
./kernel/vfs/vfs_bio.c,v RCS ID: 4.3.142.2
./kernel/vfs/vfs_cache.c,v RCS ID: 4.2.109.1
./kernel/vfs/vfs_cfg.c,v RCS ID: 1.1.93.1
./kernel/vfs/vfs_subr.c,v RCS ID: 4.3.260.1
./kernel/vfs/vfs_syscalls.c,v RCS ID: 4.3.349.2
./kernel/vfs/vfs_ubc.c,v RCS ID: 1.1.431.1
./sbin/mount
CHECKSUM: 40432 576
SUBSET: OSFBASE445
./usr/sbin/mount/mount.c,v RCS ID: 4.3.208.1
./usr/sbin/mount
CHECKSUM: 17700 72
SUBSET: OSFBASE445
./usr/sbin/mount/mount.c,v RCS ID: 4.3.208.1
./usr/sys/vfs/vfs_conf.c
CHECKSUM: 56205 11
SUBSET: OSFBINCOM445
./kernel/vfs/vfs_conf.c,v RCS ID: 4.2.110.1
./sys/BINARY/ufs.mod
CHECKSUM: 24221 310
SUBSET: OSFBIN445
./kernel/ufs/ufs_inode.c,v RCS ID: 4.3.184.1
./kernel/ufs/ufs_vfsops.c,v RCS ID: 4.2.192.2
./kernel/ufs/ufs_vnops.c,v RCS ID: 4.2.387.1
SUPPORT NOTES: NONE
----------------------------------------------------------
NEW PATCHID: 76.00
PATCH ID: OSF445-078
REQUIRED PATCHES: NONE
CONDITIONALLY REQUIRED PATCHES: NONE
SUPERSEDED PATCHES:
OSF445-034 (38.00)
SPECIAL INSTRUCTIONS: NONE
FULL DESCRIPTION:
PROBLEM: (73949, UVO59438) (PATCH ID: OSF445-034)
********
This patch corrects a problem with the fgrep command, when it is used
with the -s flag all output is suppressed.
PROBLEM: (49626, 50301, 51528, 79566) (PATCH ID: OSF445-078)
*******
This patch fixes several problems with fgrep:
1) The command fgrep -f searchlist gets the following error message:
wordlist too large
if the searchlist is too long, in the test case it was 1500 entries.
2) The command fgrep -f searchlist displays datafiles verbatim if the
searchlist has blank lines.
FILES:
./usr/bin/fgrep
CHECKSUM: 13666 24
SUBSET: OSFBASE445
./usr/bin/grep/fgrep.c,v RCS ID: 4.2.42.2
./sbin/grep
CHECKSUM: 20720 32
SUBSET: OSFBASE445
./usr/bin/grep
CHECKSUM: 20235 32
SUBSET: OSFBASE445
./usr/bin/egrep
CHECKSUM: 20235 32
SUBSET: OSFBASE445
SUPPORT NOTES: NONE
----------------------------------------------------------
NEW PATCHID: 137.00
PATCH ID: OSF445-081
REQUIRED PATCHES: NONE
CONDITIONALLY REQUIRED PATCHES: NONE
SUPERSEDED PATCHES: NONE
SPECIAL INSTRUCTIONS: NONE
FULL DESCRIPTION:
PROBLEM: (79159) (PATCH ID: OSF445-081)
********
PROBLEM: (QAR 79159)
This patch fixes a problem where the itpsa driver would negotiate for ULTRA2
speed although the SCSI bus was single-ended and the negotiations should have i
been for ULTRA.
FILES:
./sys/BINARY/itpsa.mod
CHECKSUM: 57269 233
SUBSET: OSFHWBIN445
./kernel/io/cam/iti/itpsa.c,v RCS ID: 1.1.59.1
SUPPORT NOTES: NONE
----------------------------------------------------------
NEW PATCHID: 176.00
PATCH ID: OSF445-083
REQUIRED PATCHES: NONE
CONDITIONALLY REQUIRED PATCHES: NONE
SUPERSEDED PATCHES:
OSF445-012 (17.00),
OSF445-040 (45.00),
OSF445-068 (71.00),
OSF445-073 (78.00),
OSF445-079 (75.00)
SPECIAL INSTRUCTIONS: NONE
FULL DESCRIPTION:
PROBLEM: (72111, 74264) (PATCH ID: OSF445-012)
********
This patch fixes a problem with verify. When verify is run on a brand new
domain, nfs warnings are displayed even though no nfs related activity is
being done.
PROBLEM: (BCGMC0WVV) (PATCH ID: OSF445-040)
********
This patch fixes a system hang that could last up to a few minutes
with large files when performing synchronous IO requests.
The fix is to split up msync() requests into manageable pieces so
users can continue working.
PROBLEM: (76777) (PATCH ID: OSF445-068)
********
This patch fixes a problem where the output of a "ps" command,
the PAGEIN column reports 0 for all processes. After installing this
patch, the ps PAGEIN value increases as advfs accesses the disk
for vm accesses (but not for normal file read).
PROBLEM: (80270) (PATCH ID: OSF445-073)
********
This patch turns off AdvFS assert which, when
turned on, a performance degradation in Advfs
occurs. The Advfs assert are used for isolating
problems during development.
PROBLEM: (79769) (PATCH ID: OSF445-079)
********
A kernel memory fault can occur on an smp machine when one thread is extending
a clone frags file and another thread does a stat system call on a file with
a frag. The stack trace is as follows:
5 panic src/kernel/bsd/subr_prf.c : 804
6 trap src/kernel/arch/alpha/trap.c : 1762
7 _XentMM src/kernel/arch/alpha/locore.s : 1748
8 x_page_to_blk src/kernel/msfs/bs/bs_stg.c : 6191
9 x_page_to_blkmap src/kernel/msfs/bs/bs_stg.c : 5928
10 x_page_mapped src/kernel/msfs/bs/bs_stg.c : 6281
11 bs_frag_has_stg src/kernel/msfs/bs/bs_bitfile_sets.c : 2229
12 msfs_getattr src/kernel/msfs/osf/msfs_vnops.c : 1525
13 vn_stat src/kernel/vfs/vfs_vnops.c : 1277
14 stat1 src/kernel/vfs/vfs_syscalls.c : 3056
15 lstat src/kernel/vfs/vfs_syscalls.c : 3034
16 syscall src/kernel/arch/alpha/syscall_trap.c : 627
17 _Xsyscall src/kernel/arch/alpha/locore.s : 1512
PROBLEM: (77274, 78605) (PATCH ID: OSF445-083)
********
This patch fixes a problem with AdvFS. An AdvFS domain becomes inaccessible
when using the mount -d option.
FILES:
./sys/BINARY/advfs.mod
CHECKSUM: 55778 1065
SUBSET: OSFADVFSBIN445
./kernel/msfs/bs/bs_access.c,v RCS ID: 1.1.553.1
./kernel/msfs/bs/bs_extents.c,v RCS ID: 1.1.93.1
./kernel/msfs/bs/bs_qio.c,v RCS ID: 1.1.240.1
./kernel/msfs/bs/ftx_recovery.c,v RCS ID: 1.1.119.1
./kernel/msfs/osf/msfs_misc.c,v RCS ID: 1.1.478.1
./kernel/msfs/osf/msfs_vfsops.c,v RCS ID: 1.1.628.1
SUPPORT NOTES: NONE
----------------------------------------------------------
NEW PATCHID: 186.00
PATCH ID: OSF445-085
REQUIRED PATCHES: NONE
CONDITIONALLY REQUIRED PATCHES: NONE
SUPERSEDED PATCHES:
OSF445-046 (51.00)
SPECIAL INSTRUCTIONS: NONE
FULL DESCRIPTION:
PROBLEM: (BCGMC1ZNX, HPAQ80JML, BCGMA0G3H, BCGMA2191)
(PATCH ID: OSF445-046)
********
This patch fixes a problem where some crontab jobs would run multiple
times in the same minute. This problem was introduced by another cron
patch on a previous patch kit.
In fixing an earlier problem, cron was changed so that if a crontab was
submitted that contained an entry for the current minute, the entry was
run immediately. Previously, the entry was not run. This change in
behavior caused a problem for crontab jobs which updated crontab
without deleting the entry that started them. Such jobs could be run multiple
times during their first minute.
PROBLEM: (78912, FNO95387A, BCGM51P8N) (PATCH ID: OSF445-085)
********
This patch fixes two cron problems: 1) the cron daemon does intensive
logging and fills up the disk, and 2) multiple cron daemons continue to
run and consume system resources due to the fact that after a user is deleted
from the system there are still jobs running on the users behalf.
FILES:
./usr/sbin/cron
CHECKSUM: 15948 64
SUBSET: OSFBASE445
./usr/sbin/cron/cron.c,v RCS ID: 4.2.101.2
SUPPORT NOTES: NONE
----------------------------------------------------------
NEW PATCHID: 182.00
PATCH ID: OSF445-086
REQUIRED PATCHES: NONE
CONDITIONALLY REQUIRED PATCHES: NONE
SUPERSEDED PATCHES: NONE
SPECIAL INSTRUCTIONS: NONE
FULL DESCRIPTION:
PROBLEM: (78712) (PATCH ID: OSF445-086)
********
This patch fixes a problem where encoding for the SysV Open call audit
parameter was incorrect. This could cause a system panic.
FILES:
./usr/sys/BINARY/sysv_init_sysent.c
CHECKSUM: 12865 2
SUBSET: OSFBIN445
SUPPORT NOTES: NONE
----------------------------------------------------------
NEW PATCHID: 90.00
PATCH ID: OSF445-087
REQUIRED PATCHES: NONE
CONDITIONALLY REQUIRED PATCHES: NONE
SUPERSEDED PATCHES: NONE
SPECIAL INSTRUCTIONS: NONE
FULL DESCRIPTION:
PROBLEM: (STL006754) (PATCH ID: OSF445-087)
********
This patch corrects problems in the lat driver which
caused improper processing of the ioctl TCSBRK as well
as the generation of spurious characters when
the libc routine tcdrain() was used.
FILES:
./sys/BINARY/lat.mod
CHECKSUM: 54656 242
SUBSET: OSFLAT445
./kernel/lat/streams/lattioc.c,v RCS ID: 1.1.32.1
./kernel/lat/streams/sxgetc.c,v RCS ID: 1.1.21.1
SUPPORT NOTES: NONE
----------------------------------------------------------
NEW PATCHID: 161.00
PATCH ID: OSF445-088
REQUIRED PATCHES: NONE
CONDITIONALLY REQUIRED PATCHES: NONE
SUPERSEDED PATCHES:
OSF445-018 (23.00)
SPECIAL INSTRUCTIONS: NONE
FULL DESCRIPTION:
PROBLEM: (75185, 75088, 74801) (PATCH ID: OSF445-018)
********
This patch corrects a problem in which the perrmask register on
Tsunami systems can be overwritten.
PROBLEM: (78838) (PATCH ID: OSF445-088)
********
The problem caused an incorrect bcache size to be returned to the kernel from
the HWRPB. This problem occurred on Professional Workstation 900 and 1000
systems and AlphaServer DS10, DS20, DS20E, ES40, GS80, GS160, and GS320 systems.
FILES:
./sys/BINARY/kn600.mod
CHECKSUM: 13047 50
SUBSET: OSFHWBIN445
./kernel/arch/alpha/hal/kn600.c,v RCS ID: 1.1.49.2
./sys/BINARY/kn600_mult.mod
CHECKSUM: 23136 52
SUBSET: OSFHWBIN445
./kernel/arch/alpha/hal/kn600.c,v RCS ID: 1.1.49.2
SUPPORT NOTES: NONE
----------------------------------------------------------
NEW PATCHID: 99.00
PATCH ID: OSF445-089
REQUIRED PATCHES: NONE
CONDITIONALLY REQUIRED PATCHES: NONE
SUPERSEDED PATCHES: NONE
SPECIAL INSTRUCTIONS: NONE
FULL DESCRIPTION:
PROBLEM: (48512, 80551, MGO63340A) (PATCH ID: OSF445-089)
********
This patch corrects the problem so mailx(1) will work correctly if
-r and -s flags are used together.
FILES:
./usr/bin/Mail
CHECKSUM: 63356 208
SUBSET: OSFBASE445
./usr/bin/Mail/send.c,v RCS ID: 4.2.30.1
./usr/bin/mailx
CHECKSUM: 63356 208
SUBSET: OSFBASE445
./usr/bin/Mail/send.c,v RCS ID: 4.2.30.1
SUPPORT NOTES: NONE
----------------------------------------------------------
NEW PATCHID: 149.00
PATCH ID: OSF445-090
REQUIRED PATCHES: NONE
CONDITIONALLY REQUIRED PATCHES: NONE
SUPERSEDED PATCHES: NONE
SPECIAL INSTRUCTIONS: NONE
FULL DESCRIPTION:
PROBLEM: (EVT29385A, 77833) (PATCH ID: OSF445-090)
********
This patch fixes a problem where the vdump command
will sometimes store symbolic link files as
directories in the vdump archive.
FILES:
./sbin/vdump
CHECKSUM: 57170 528
SUBSET: OSFADVFS445
./sbin/backup/vdump/vdump.c,v RCS ID: 1.1.99.1
SUPPORT NOTES: NONE
----------------------------------------------------------
NEW PATCHID: 112.00
PATCH ID: OSF445-091
REQUIRED PATCHES: NONE
CONDITIONALLY REQUIRED PATCHES: NONE
SUPERSEDED PATCHES: NONE
SPECIAL INSTRUCTIONS: NONE
FULL DESCRIPTION:
PROBLEM: (75340, 77361, 77425, 79767) (PATCH ID: OSF445-091)
********
This patch corrects the following problems with some models of IDE CD-ROM
and removable disk devices during system startup:
- Some IDE CD-ROMs may cause a system panic, with "kernel memory fault"
during a bus device reset.
- Some IDE master devices require special code when they are
configured as the IDE master with a non-existant slave device.
This could cause a
"xpt_callback_thread: callback queue corrupted" panic.
- Playing the last audio track of an enhanced CD may cause
unpredictable system slow-downs or temporary system hangs.
FILES:
./sys/BINARY/cam_ata.mod
CHECKSUM: 21870 294
SUBSET: OSFHWBIN445
./kernel/io/cam/ata/sim_ata.c,v RCS ID: 1.1.77.1
./usr/sys/conf/files
CHECKSUM: 08784 46
SUBSET: OSFBINCOM445
./kernel/conf/alpha/files,v RCS ID: 4.2.489.1
SUPPORT NOTES: NONE
----------------------------------------------------------
NEW PATCHID: 188.00
PATCH ID: OSF445-092
REQUIRED PATCHES: NONE
CONDITIONALLY REQUIRED PATCHES: NONE
SUPERSEDED PATCHES: NONE
SPECIAL INSTRUCTIONS: NONE
FULL DESCRIPTION:
PROBLEM: (76235, 62918, 45370, 46008) (PATCH ID: OSF445-092)
********
This patch fixes several problems in the tapex utility;
accuracy of performance tests has been improved, the tapex
exit status has been corrected and tapex was fixed to
determine eom status in Command Timeout Test
and exit with non-0 status to indicate failure.
FILES:
./usr/field/tapex
CHECKSUM: 43866 512
SUBSET: OSFEXER445
./usr/field/tapex/tapex.c,v RCS ID: 4.2.21.1
SUPPORT NOTES: NONE
----------------------------------------------------------
NEW PATCHID: 164.00
PATCH ID: OSF445-093A
REQUIRED PATCHES: NONE
CONDITIONALLY REQUIRED PATCHES:
OSF445-093B (167.00)
SUPERSEDED PATCHES:
OSF445-022A (27.00),
OSF445-032A (36.00),
OSF445-084A (162.00)
SPECIAL INSTRUCTIONS: NONE
FULL DESCRIPTION:
PROBLEM: (MGO88206A) (PATCH ID: OSF445-022)
********
This patch corrects a problem of the rsh command displaying a warning
message instead of the rsh command output when C2 security is configured.
An example of the warning message displayed is "Your password will
expire on ..."
PROBLEM: (BCGM812G1V, 76429) (PATCH ID: OSF445-032)
********
This patch fixes a problem with logins in a DCE/C2 environment.
You could encounter an error "Bad priority setting" if there is a
u_priority setting used in /etc/auth/system/default file.
PROBLEM: (54550, 79314, ISO100580) (PATCH ID: OSF445-084)
********
This patch fixes a problem when a system is configured with DECnet, C2
and NIS. When invoking edauth(8) , the error: 'Must be on
NIS master server to update entry for is returned.
PROBLEM: (TKTR60015, 81049) (PATCH ID: OSF445-093)
********
This patch fixes a problem for Enhanced Security
configurations where the Maximum Login Interval
(u_max_login_intvl) field was being ignored for
account templates.
FILES:
./usr/shlib/libsecurity.so
CHECKSUM: 56608 360
SUBSET: OSFBASE445
./usr/ccs/lib/libsecurity/SIA/login_sec.c,v RCS ID: 1.1.117.1
./usr/ccs/lib/libsecurity/authcap.c,v RCS ID: 4.2.90.1
./usr/ccs/lib/libsecurity/fields.c,v RCS ID: 4.2.47.1
SUPPORT NOTES: NONE
----------------------------------------------------------
NEW PATCHID: 167.00
PATCH ID: OSF445-093B
REQUIRED PATCHES:
OSF445-093A (164.00)
CONDITIONALLY REQUIRED PATCHES: NONE
SUPERSEDED PATCHES:
OSF445-022B (86.00),
OSF445-032B (88.00),
OSF445-084B (165.00)
SPECIAL INSTRUCTIONS: NONE
FULL DESCRIPTION:
PROBLEM: (MGO88206A) (PATCH ID: OSF445-022)
********
This patch corrects a problem of the rsh command displaying a warning
message instead of the rsh command output when C2 security is configured.
An example of the warning message displayed is "Your password will
expire on ..."
PROBLEM: (BCGM812G1V, 76429) (PATCH ID: OSF445-032)
********
This patch fixes a problem with logins in a DCE/C2 environment.
You could encounter an error "Bad priority setting" if there is a
u_priority
setting used in /etc/auth/system/default file.
PROBLEM: (54550, 79314, ISO100580) (PATCH ID: OSF445-084)
********
This patch fixes a problem when a system is configured with DECnet, C2
and NIS. When invoking edauth(8) , the error: 'Must be on
NIS master server to update entry for is returned.
PROBLEM: (TKTR60015, 81049) (PATCH ID: OSF445-093)
********
This patch fixes a problem for Enhanced Security
configurations where the Maximum Login Interval
(u_max_login_intvl) field was being ignored for
account templates.
FILES:
./usr/ccs/lib/libsecurity.a
CHECKSUM: 04875 407
SUBSET: OSFC2SEC445
./usr/ccs/lib/libsecurity/SIA/login_sec.c,v RCS ID: 1.1.117.1
./usr/ccs/lib/libsecurity/authcap.c,v RCS ID: 4.2.90.1
./usr/ccs/lib/libsecurity/fields.c,v RCS ID: 4.2.47.1
SUPPORT NOTES: NONE
----------------------------------------------------------
NEW PATCHID: 116.00
PATCH ID: OSF445-094
REQUIRED PATCHES: NONE
CONDITIONALLY REQUIRED PATCHES: NONE
SUPERSEDED PATCHES: NONE
SPECIAL INSTRUCTIONS: NONE
FULL DESCRIPTION:
PROBLEM: (54202, 79596, BCPM412T3) (PATCH ID: OSF445-094)
********
This patch fixes a problem with the tar command. Corruption occurs when
restoring a file system that contains more than two hard links to a file.
FILES:
./usr/bin/tar
CHECKSUM: 44251 136
SUBSET: OSFBASE445
./usr/bin/pax/link.c,v RCS ID: 1.1.28.1
./usr/bin/pax
CHECKSUM: 44251 136
SUBSET: OSFBASE445
./usr/bin/pax/link.c,v RCS ID: 1.1.28.1
./usr/bin/cpio
CHECKSUM: 44251 136
SUBSET: OSFBASE445
./usr/bin/pax/link.c,v RCS ID: 1.1.28.1
./sbin/.upd..tar
CHECKSUM: 56572 136
SUBSET: OSFBASE445
./usr/bin/pax/link.c,v RCS ID: 1.1.28.1
./sbin/.upd..pax
CHECKSUM: 56572 136
SUBSET: OSFBASE445
./usr/bin/pax/link.c,v RCS ID: 1.1.28.1
./sbin/.upd..cpio
CHECKSUM: 56572 136
SUBSET: OSFBASE445
./usr/bin/pax/link.c,v RCS ID: 1.1.28.1
SUPPORT NOTES: NONE
----------------------------------------------------------
NEW PATCHID: 172.00
PATCH ID: OSF445-096
REQUIRED PATCHES: NONE
CONDITIONALLY REQUIRED PATCHES: NONE
SUPERSEDED PATCHES:
OSF445-020 (25.00),
OSF445-104 (170.00)
SPECIAL INSTRUCTIONS: NONE
FULL DESCRIPTION:
PROBLEM: (60651, 77772, 60651, 66106, 64050) (PATCH ID: OSF445-020)
********
This patch fixes the following problems with the mv command:
- An invalid error message when attempting to move files in which the source
name is the same as the destination name The message would look something
like the following:
mv: rename foo to foo/fooo: Invalid argument
The error message, with this patch, will now look something like the
following:
mv: foo and foo are identical
- When using "mv -i" to rename a symlink pointing to a file on a
different filesystem owned by a different user results in the prompt:
Ownership of y will change. Continue?
- When moving a file from one filesystem to another, the "mv" command
will copy the file rather than using the rename() system call. If
there are any errors writing to the destination filesystem, the
destination file is unlink()'d, and "mv" returns an error to the
shell. This can also result in the loss of a file.
PROBLEM: (BCSM40LZ1, 79464) (PATCH ID: OSF445-104)
********
This patch corrects the problem with the mv(1) command deleting files in
the directory when the user moves a directory to itself.
PROBLEM: (BCSM40LZ1, 79464) (PATCH ID: OSF445-096)
********
This patch corrects the problem with the mv(1) command deleting files in
the directory when the user moves a directory to itself.
FILES:
./sbin/mv
CHECKSUM: 07486 208
SUBSET: OSFBASE445
./usr/bin/mv/mv.c,v RCS ID: 4.2.28.1
./usr/bin/mv
CHECKSUM: 08031 24
SUBSET: OSFBASE445
./usr/bin/mv/mv.c,v RCS ID: 4.2.28.3
SUPPORT NOTES: NONE
----------------------------------------------------------
NEW PATCHID: 105.00
PATCH ID: OSF445-098
REQUIRED PATCHES: NONE
CONDITIONALLY REQUIRED PATCHES: NONE
SUPERSEDED PATCHES: NONE
SPECIAL INSTRUCTIONS: NONE
FULL DESCRIPTION:
PROBLEM: (UTO97639A) (PATCH ID: OSF445-098)
********
This patch prevents warning messages of 'not currently mounted'
from displaying for filessyetsm you did not request to umount. An
example follows:
# umount -a -t ufs
/test5: not currently mounted <==== These are AdVFS filesystems
/test2: not currently mounted
/test1: not currently mounted
FILES:
./sbin/umount
CHECKSUM: 16359 368
SUBSET: OSFBASE445
./usr/sbin/umount/umount.c,v RCS ID: 4.2.61.1
./usr/sbin/umount
CHECKSUM: 48774 32
SUBSET: OSFBASE445
./usr/sbin/umount/umount.c,v RCS ID: 4.2.61.1
SUPPORT NOTES: NONE
----------------------------------------------------------
NEW PATCHID: 135.00
PATCH ID: OSF445-099
REQUIRED PATCHES: NONE
CONDITIONALLY REQUIRED PATCHES: NONE
SUPERSEDED PATCHES:
OSF445-097 (133.00)
SPECIAL INSTRUCTIONS: NONE
FULL DESCRIPTION:
PROBLEM: (BEJAL8049) (PATCH ID: OSF445-097)
********
When running ATM Lan Emulation, using more than 4 ATM Netrain interfaces can
result in recursive calls causing a kernel stack not valid halt.
PROBLEM: (HPAQ70S7B) (PATCH ID: OSF445-099)
********
This patch fixes a problem of ATM LAN emulation failing to come up
when the using the ATM Meteor 351 board.
FILES:
./sys/BINARY/lane.mod
CHECKSUM: 18610 362
SUBSET: OSFATMBIN445
./kernel/net/if_lane/cm_sap_shim.c,v RCS ID: 1.1.75.2
SUPPORT NOTES: NONE
----------------------------------------------------------
NEW PATCHID: 178.00
PATCH ID: OSF445-102
REQUIRED PATCHES: NONE
CONDITIONALLY REQUIRED PATCHES: NONE
SUPERSEDED PATCHES: NONE
SPECIAL INSTRUCTIONS: NONE
FULL DESCRIPTION:
PROBLEM: (78368) (PATCH ID: OSF445-102)
********
The what command will process only the first file provided to
it in a list of input files. This is true if the input is provided
as a wild card or if multiple files names are explicitely provided.
FILES:
./usr/bin/what
CHECKSUM: 12399 256
SUBSET: OSFBASE445
./usr/bin/sccs/what.c,v RCS ID: 4.2.22.1
SUPPORT NOTES: NONE
----------------------------------------------------------
NEW PATCHID: 157.00
PATCH ID: OSF445-105
REQUIRED PATCHES: NONE
CONDITIONALLY REQUIRED PATCHES: NONE
SUPERSEDED PATCHES: NONE
SPECIAL INSTRUCTIONS: NONE
FULL DESCRIPTION:
PROBLEM: (80175, 80012) (PATCH ID: OSF445-105)
********
This patch fixes a problem in which the bootlink can fail
on alphastations 600, 600A, 500/400
FILES:
./osf_boot
CHECKSUM: 03533 88
SUBSET: OSFHWBASE445
SUPPORT NOTES: NONE
----------------------------------------------------------
NEW PATCHID: 114.00
PATCH ID: OSF445-106
REQUIRED PATCHES: NONE
CONDITIONALLY REQUIRED PATCHES: NONE
SUPERSEDED PATCHES: NONE
SPECIAL INSTRUCTIONS: NONE
FULL DESCRIPTION:
PROBLEM: (MGO59344C, 80674) (PATCH ID: OSF445-106)
********
This patch is to prevent a hang that can occur using NFS over TCP.
Many NFS TCP server threads will be blocked for several minutes and
their stack trace will look like the following:
0 thread_block
1 mpsleep
2 sosleep
3 sosbwait
4 sosend
5 xdrrecmbuf_send
6 svcktcp_reply
7 svc_sendreply
8 rfs_sendreply
9 rfs_dispatch
10 nfs_rpc_recv
11 nfs_tcp_thread
This problem is a race condition and will only be seen on SMP systems.
FILES:
./sys/BINARY/nfs.mod
CHECKSUM: 39603 389
SUBSET: OSFBIN445
./kernel/rpc/clnt_ktcp.c,v RCS ID: 1.1.48.1
./kernel/rpc/xdr_mbuf.c,v RCS ID: 1.1.50.1
SUPPORT NOTES: NONE
----------------------------------------------------------
NEW PATCHID: 122.00
PATCH ID: OSF445-107
REQUIRED PATCHES: NONE
CONDITIONALLY REQUIRED PATCHES: NONE
SUPERSEDED PATCHES: NONE
SPECIAL INSTRUCTIONS: NONE
FULL DESCRIPTION:
PROBLEM: (BCGM4134M, BCPM71NXQ, BRO45678A, BCGM814ON,
BCPM51JZ6, 81811, 77292, 79179, 84598 N/A) (PATCH ID: OSF445-107)
********
This patch upgrades sys_check utility to version 119.1 and
provides the following changes:
- fixes two NFS problems
- fixes the ra200info tool from core dumping
- utilizes Compaq ANalyze when available
- utilizes storages new cliscript tool in place of hszterm
- update asu section
FILES:
./usr/lbin/ra200info
CHECKSUM: 00457 40
SUBSET: OSFSERVICETOOLS445
./usr/lbin/binex
CHECKSUM: 61446 32
SUBSET: OSFSERVICETOOLS445
./usr/sbin/sys_check/binex/binex.c,v RCS ID: 1.1.11.1
./usr/lbin/adm_lk
CHECKSUM: 26242 16
SUBSET: OSFSERVICETOOLS445
./usr/lbin/cliscript4
CHECKSUM: 49948 1528
SUBSET: OSFSERVICETOOLS445
./usr/sbin/sys_check
CHECKSUM: 51876 630
SUBSET: OSFSERVICETOOLS445
SUPPORT NOTES: NONE
----------------------------------------------------------
NEW PATCHID: 93.00
PATCH ID: OSF445-108
REQUIRED PATCHES: NONE
CONDITIONALLY REQUIRED PATCHES:
OSF445-112B (95.00)
SUPERSEDED PATCHES:
OSF445-001 (14.00),
OSF445-023 (81.00),
OSF445-025 (29.00),
OSF445-031 (35.00),
OSF445-112A (91.00)
SPECIAL INSTRUCTIONS: NONE
FULL DESCRIPTION:
PROBLEM: (79556) (PATCH ID: OSF445-001)
********
The output string for the swprintf() interface was not NULL terminated.
PROBLEM: (79876) (PATCH ID: OSF445-023)
********
If the "where" or "t" ladebug command does not show all the currently active
functions, it may be because of this problem. The program being debugged had
to have been built with "split procedures", which is done via options in the
om and spike tools. For spike, split procedures are generated if profiling is
specified. For om, split procedures are generated if profiling AND the
-split_procedure option are specified.
PROBLEM: (TKTR30011, 78909) (PATCH ID: OSF445-025)
********
If a code segment contained a gmtime() call between calls to tzset(),
or any function specified to call tzset() (such as localtime(), mktime(),
strftime(), etc) , the tzname[0] array could contain erroneous time
zone data referring to the "GMT" zone abbreviation instead of the local
time zone, as specified in the TZ environment variable or default time
zone for the system.
PROBLEM: (62211) (PATCH ID: OSF445-031)
********
This fix increases the length of the user names for rsh and rexec to allow for
NT interoperabilty.
PROBLEM: (72100, 74961, 75971, 77080,
77288, 79588) (PATCH ID: OSF445-112)
********
Threaded applications which make extensive use of synchronization objects
(mutexes, condition variables) may encounter performance and scaling
regressions when run on some EV6 SMP machines. Customers encountering
these regressions may observe negative scaling, decreased application
throughput and increased CPU utilitzation, as the number of EV6 CPUs
is increased. This version of DECthreads contains changes to the
implementation of synchronization objects and thread scheduling around
those objects to improve performance on all SMP systems. No functional
or interface changes were made.
PROBLEM: (BCSM807S5) (PATCH ID: OSF445-108)
********
Some applications assume that initial allocations of memory from the C
run-time library's malloc() function will return zero-filled memory. The
problem is that malloc() and free() often write into the first 16 bytes of
the allocated memory.
This change to malloc() zeros out the first 16 bytes in the allocated memory.
The result is that memory allocated prior to any call to free() -- and prior
to any other run-time library function that might call free -- should be zero
filled.
FILES:
./usr/ccs/lib/libc_r.a
CHECKSUM: 65059 2016
SUBSET: OSFCMPLRS445
./usr/ccs/lib/libc/TIS/cma_tis_errno_obs.c,v RCS ID: 1.1.13.2
./usr/ccs/lib/libc/TIS/cma_tis_obs.c,v RCS ID: 1.1.13.2
./usr/ccs/lib/libc/TIS/tis.c,v RCS ID: 1.1.17.2
./usr/ccs/lib/libc/TIS/tis_pthread.c,v RCS ID: 1.1.14.2
./usr/ccs/lib/libc/TIS/tis_rwlock.c,v RCS ID: 1.1.14.2
./usr/ccs/lib/libc/alpha/alpha_unwind.c,v RCS ID: 1.1.48.1
./usr/ccs/lib/libc/alpha/schyield.s,v RCS ID: 1.1.21.1
./usr/ccs/lib/libc/ctime.c,v RCS ID: 4.4.48.1
./usr/ccs/lib/libc/malloc.c,v RCS ID: 4.2.102.1
./usr/ccs/lib/libc/ruserpass.c,v RCS ID: 4.2.22.1
./usr/ccs/lib/libc/wprintf.c,v RCS ID: 1.1.29.1
./usr/ccs/lib/libc.a
CHECKSUM: 65059 2016
SUBSET: OSFCMPLRS445
./usr/ccs/lib/libc/TIS/cma_tis_errno_obs.c,v RCS ID: 1.1.13.2
./usr/ccs/lib/libc/TIS/cma_tis_obs.c,v RCS ID: 1.1.13.2
./usr/ccs/lib/libc/TIS/tis.c,v RCS ID: 1.1.17.2
./usr/ccs/lib/libc/TIS/tis_pthread.c,v RCS ID: 1.1.14.2
./usr/ccs/lib/libc/TIS/tis_rwlock.c,v RCS ID: 1.1.14.2
./usr/ccs/lib/libc/alpha/alpha_unwind.c,v RCS ID: 1.1.48.1
./usr/ccs/lib/libc/alpha/schyield.s,v RCS ID: 1.1.21.1
./usr/ccs/lib/libc/ctime.c,v RCS ID: 4.4.48.1
./usr/ccs/lib/libc/malloc.c,v RCS ID: 4.2.102.1
./usr/ccs/lib/libc/ruserpass.c,v RCS ID: 4.2.22.1
./usr/ccs/lib/libc/wprintf.c,v RCS ID: 1.1.29.1
./usr/shlib/libpthreaddebug.so
CHECKSUM: 60186 600
SUBSET: OSFBASE445
./usr/ccs/lib/libpthread/thd_debug.c,v RCS ID: 1.1.31.2
./usr/ccs/lib/libpthread/thd_debug_api.c,v RCS ID: 1.1.30.2
./usr/ccs/lib/libpthread/thd_debug_cache.c,v RCS ID: 1.1.27.2
./usr/ccs/lib/libpthread/thd_debug_client.c,v RCS ID: 1.1.31.2
./usr/ccs/lib/libpthread/thd_debug_fetch.c,v RCS ID: 1.1.23.2
./usr/ccs/lib/libpthread/thd_debug_misc.c,v RCS ID: 1.1.40.2
./usr/ccs/lib/libpthread/thd_debug_queue.c,v RCS ID: 1.1.25.2
./usr/ccs/lib/libpthread/thd_debug_strs.c,v RCS ID: 1.1.27.2
./usr/ccs/lib/libpthread/thd_debug_sync.c,v RCS ID: 1.1.27.2
./usr/ccs/lib/libpthread/thd_debug_thd.c,v RCS ID: 1.1.37.2
./usr/ccs/lib/libpthread/thd_debug_trace.c,v RCS ID: 1.1.31.2
./usr/ccs/lib/libpthread/thd_put.c,v RCS ID: 1.1.26.2
./usr/ccs/lib/libpthread/thd_util.c,v RCS ID: 1.1.30.2
./usr/ccs/lib/libpthread/unix/alpha/thd_debug_host.c,v RCS ID: 1.1.14.1
./usr/ccs/lib/libpthread/unix/thd_debug_os.c,v RCS ID: 1.1.26.2
./usr/ccs/lib/libpthread/vms/alpha/thd_debug_host.c,v RCS ID: 1.1.14.1
./usr/ccs/lib/libpthread/vms/thd_debug_os.c,v RCS ID: 1.1.26.2
./usr/ccs/lib/libpthread/vms/vax/thd_debug_host.c,v RCS ID: 1.1.14.1
./shlib/.upd..libc_r.so
CHECKSUM: 31204 1634
SUBSET: OSFBASE445
./usr/ccs/lib/libc/TIS/cma_tis_errno_obs.c,v RCS ID: 1.1.13.2
./usr/ccs/lib/libc/TIS/cma_tis_obs.c,v RCS ID: 1.1.13.2
./usr/ccs/lib/libc/TIS/tis.c,v RCS ID: 1.1.17.2
./usr/ccs/lib/libc/TIS/tis_pthread.c,v RCS ID: 1.1.14.2
./usr/ccs/lib/libc/TIS/tis_rwlock.c,v RCS ID: 1.1.14.2
./usr/ccs/lib/libc/alpha/alpha_unwind.c,v RCS ID: 1.1.48.1
./usr/ccs/lib/libc/alpha/schyield.s,v RCS ID: 1.1.21.1
./usr/ccs/lib/libc/ctime.c,v RCS ID: 4.4.48.1
./usr/ccs/lib/libc/malloc.c,v RCS ID: 4.2.102.1
./usr/ccs/lib/libc/ruserpass.c,v RCS ID: 4.2.22.1
./usr/ccs/lib/libc/wprintf.c,v RCS ID: 1.1.29.1
./shlib/.upd..libc.so
CHECKSUM: 31204 1634
SUBSET: OSFBASE445
./usr/ccs/lib/libc/TIS/cma_tis_errno_obs.c,v RCS ID: 1.1.13.2
./usr/ccs/lib/libc/TIS/cma_tis_obs.c,v RCS ID: 1.1.13.2
./usr/ccs/lib/libc/TIS/tis.c,v RCS ID: 1.1.17.2
./usr/ccs/lib/libc/TIS/tis_pthread.c,v RCS ID: 1.1.14.2
./usr/ccs/lib/libc/TIS/tis_rwlock.c,v RCS ID: 1.1.14.2
./usr/ccs/lib/libc/alpha/alpha_unwind.c,v RCS ID: 1.1.48.1
./usr/ccs/lib/libc/alpha/schyield.s,v RCS ID: 1.1.21.1
./usr/ccs/lib/libc/ctime.c,v RCS ID: 4.4.48.1
./usr/ccs/lib/libc/malloc.c,v RCS ID: 4.2.102.1
./usr/ccs/lib/libc/ruserpass.c,v RCS ID: 4.2.22.1
./usr/ccs/lib/libc/wprintf.c,v RCS ID: 1.1.29.1
./usr/sbin/rexecd
CHECKSUM: 30029 24
SUBSET: OSFCLINET445
./usr/sbin/rexecd/rexecd.c,v RCS ID: 4.2.31.1
./usr/sbin/rshd
CHECKSUM: 48256 32
SUBSET: OSFCLINET445
./usr/sbin/rshd/rshd.c,v RCS ID: 4.2.53.1
./usr/shlib/libpthread.so
CHECKSUM: 55244 568
SUBSET: OSFBASE445
./usr/ccs/lib/libpthread/thd_cancel.c,v RCS ID: 1.1.27.2
./usr/ccs/lib/libpthread/thd_cond.c,v RCS ID: 1.1.37.2
./usr/ccs/lib/libpthread/thd_config.c,v RCS ID: 1.1.37.2
./usr/ccs/lib/libpthread/thd_deb_core.c,v RCS ID: 1.1.37.2
./usr/ccs/lib/libpthread/thd_deb_event.c,v RCS ID: 1.1.28.2
./usr/ccs/lib/libpthread/thd_debug_strs.c,v RCS ID: 1.1.27.2
./usr/ccs/lib/libpthread/thd_dispatch.c,v RCS ID: 1.1.50.2
./usr/ccs/lib/libpthread/thd_errors.c,v RCS ID: 1.1.33.2
./usr/ccs/lib/libpthread/thd_exception.c,v RCS ID: 1.1.29.2
./usr/ccs/lib/libpthread/thd_init.c,v RCS ID: 1.1.48.2
./usr/ccs/lib/libpthread/thd_kernel.c,v RCS ID: 1.1.37.2
./usr/ccs/lib/libpthread/thd_lock.c,v RCS ID: 1.1.21.1
./usr/ccs/lib/libpthread/thd_mutex.c,v RCS ID: 1.1.38.2
./usr/ccs/lib/libpthread/thd_object.c,v RCS ID: 1.1.26.1
./usr/ccs/lib/libpthread/thd_paddock.c,v RCS ID: 1.1.27.2
./usr/ccs/lib/libpthread/thd_put.c,v RCS ID: 1.1.26.2
./usr/ccs/lib/libpthread/thd_rwlock.c,v RCS ID: 1.1.29.2
./usr/ccs/lib/libpthread/thd_sched.c,v RCS ID: 1.1.65.2
./usr/ccs/lib/libpthread/thd_stack.c,v RCS ID: 1.1.37.2
./usr/ccs/lib/libpthread/thd_thread.c,v RCS ID: 1.1.57.2
./usr/ccs/lib/libpthread/thd_timer.c,v RCS ID: 1.1.32.2
./usr/ccs/lib/libpthread/thd_tis_sup.c,v RCS ID: 1.1.30.2
./usr/ccs/lib/libpthread/thd_trace.c,v RCS ID: 1.1.31.2
./usr/ccs/lib/libpthread/thd_trace_log.c,v RCS ID: 1.1.36.2
./usr/ccs/lib/libpthread/thd_tsd.c,v RCS ID: 1.1.29.2
./usr/ccs/lib/libpthread/thd_util.c,v RCS ID: 1.1.30.2
./usr/ccs/lib/libpthread/thd_vm.c,v RCS ID: 1.1.31.2
./usr/ccs/lib/libpthread/unix/alpha/thd_assem.s,v RCS ID: 1.1.31.2
./usr/ccs/lib/libpthread/unix/thd_exception_os.c,v RCS ID: 1.1.34.2
./usr/ccs/lib/libpthread/unix/thd_host.c,v RCS ID: 1.1.31.2
./usr/ccs/lib/libpthread/unix/thd_message.c,v RCS ID: 1.1.28.2
./usr/ccs/lib/libpthread/unix/thd_os.c,v RCS ID: 1.1.31.2
./usr/ccs/lib/libpthread/unix/thd_scs.c,v RCS ID: 1.1.32.2
./usr/ccs/lib/libpthread/unix/thd_shlib.c,v RCS ID: 1.1.22.2
./usr/ccs/lib/libpthread/unix/thd_signal.c,v RCS ID: 1.1.36.2
./usr/ccs/lib/libpthread/unix/thd_upcalls.c,v RCS ID: 1.1.32.2
./usr/ccs/lib/libpthread/unix/thd_ux.c,v RCS ID: 1.1.28.2
./usr/ccs/lib/libpthread/unix/thd_vp.c,v RCS ID: 1.1.38.2
./usr/ccs/lib/libpthread/vms/thd_exception_os.c,v RCS ID: 1.1.34.2
./usr/ccs/lib/libpthread/vms/thd_os.c,v RCS ID: 1.1.31.2
./usr/ccs/lib/libpthread/vms/thd_upcalls.c,v RCS ID: 1.1.32.2
./usr/ccs/lib/libpthread/vms/thd_vp.c,v RCS ID: 1.1.38.2
SUPPORT NOTES: NONE
----------------------------------------------------------
NEW PATCHID: 201.00
PATCH ID: OSF445-109
REQUIRED PATCHES: NONE
CONDITIONALLY REQUIRED PATCHES:
OSF445X11-011 (194.00)
SUPERSEDED PATCHES:
OSF445-063 (67.00),
OSF445-111 (130.00),
OSF445-113 (192.00)
SPECIAL INSTRUCTIONS:
SPECIAL INSTRUCTIONS FOR Tru64 UNIX V4.0G Patch 201.00
WARNING! This patch provides the driver support for the 3DLabs Oxygen VX1
graphics card. In order to obtain full support for this graphics card, you
must also select Patch 194.00, which is the X server portion of the
patch.
If you have a system with this graphics card, you will need to
reconfigure and rebuild the kernel after installing this patch.
To do this, boot genvmunix and run doconfig without the "-c" option
to recreate the kernel configuration file and rebuild the kernel.
See the Patch Summary and Release Notes for further information.
If you are going to remove this patch, please see the Patch Summary
and Release Notes for further information; not doing so may result in
an unusable system.
FULL DESCRIPTION:
PROBLEM: (79675, 79343) (PATCH ID: OSF445-063)
********
This patch updates the emx Fiber Channel driver to revision 1.22,
correcting the following problem:
Command timeout problem seen in large configurations. Commands would not be
transmitted to the device correctly and would hang on the bus. Other commands
would finish successfully while these commands were hung. The adapter would
then timeout the command and abort it. This behavior was causing a decrease
in performance.
PROBLEM: (BCPM804R1) (PATCH ID: OSF445-111)
********
This patch fixes the following DE600/DE602 10/100 Ethernet adapters problems:
- the primary CPU may appear hung on networks where switches send
"Flow Control Pause" frames if they become overloaded, and
- transmit timeout messages appearing in the console log due to the
driver timing out a frame.
PROBLEM: (none) (PATCH ID: OSF445-113)
********
This patch provides the device driver support for 3DLabs Oxygen
VX1 graphics adapter.
PROBLEM: (none) (PATCH ID: OSF445-109)
********
This patch provides support for the DEGPA-TA (1000BaseT)
Gigabit Ethernet device.
FILES:
./sys/BINARY/p3g.mod
CHECKSUM: 25905 32
SUBSET: OSFHWBIN445
./kernel/io/dec/ws/p3.c,v RCS ID: 1.1.12.1
./genvmunix
CHECKSUM: 07216 10315
SUBSET: OSFHWBASE445
./kernel/data/device_data.c,v RCS ID: 1.1.18.1
./kernel/data/pci_option_data.c,v RCS ID: 1.1.183.2
./kernel/io/dec/ws/p3.c,v RCS ID: 1.1.12.1
./sys/BINARY/alt.mod
CHECKSUM: 57513 108
SUBSET: OSFHWBIN445
./usr/sys/conf/alpha/files
CHECKSUM: 22156 46
SUBSET: OSFBINCOM445
./usr/sys/BINARY/p3g.mod
CHECKSUM: 00000 0
SUBSET: OSFHWBIN445
./usr/sys/include/io/dec/pci/pci.h
CHECKSUM: 22398 56
SUBSET: OSFBINCOM445
./kernel/io/dec/pci/pci.h,v RCS ID: 1.1.114.1
./sys/BINARY/emx.mod
CHECKSUM: 00874 544
SUBSET: OSFHWBIN445
./usr/sys/conf/GENERIC
CHECKSUM: 20480 39
SUBSET: OSFBINCOM445
./usr/sys/data/device_data.c
CHECKSUM: 44028 24
SUBSET: OSFBINCOM445
./kernel/data/device_data.c,v RCS ID: 1.1.18.1
./sys/BINARY/ee.mod
CHECKSUM: 42405 42
SUBSET: OSFHWBIN445
./usr/sys/data/pci_option_data.c
CHECKSUM: 56965 24
SUBSET: OSFBINCOM445
./kernel/data/pci_option_data.c,v RCS ID: 1.1.183.2
SUPPORT NOTES: NONE
----------------------------------------------------------
NEW PATCHID: 95.00
PATCH ID: OSF445-112B
REQUIRED PATCHES:
OSF445-108 (93.00)
CONDITIONALLY REQUIRED PATCHES: NONE
SUPERSEDED PATCHES: NONE
SPECIAL INSTRUCTIONS: NONE
FULL DESCRIPTION:
PROBLEM: (72100, 74961, 75971, 77080,
77288, 79588) (PATCH ID: OSF445-112)
********
Threaded applications which make extensive use of synchronization objects
(mutexes, condition variables) may encounter performance and scaling
regressions when run on some EV6 SMP machines. Customers encountering
these regressions may observe negative scaling, decreased application
throughput and increased CPU utilitzation, as the number of EV6 CPUs
is increased. This version of DECthreads contains changes to the
implementation of synchronization objects and thread scheduling around
those objects to improve performance on all SMP systems. No functional
or interface changes were made.
FILES:
./usr/include/dce/cma.h
CHECKSUM: 53715 22
SUBSET: OSFINCLUDE445
./usr/ccs/lib/libpthreads/cma.h,v RCS ID: 1.1.24.2
./usr/include/tis.h
CHECKSUM: 14672 29
SUBSET: OSFINCLUDE445
./usr/ccs/lib/libc/TIS/tis.h,v RCS ID: 1.1.14.2
./usr/include/pthread_trace.h
CHECKSUM: 06215 45
SUBSET: OSFINCLUDE445
./usr/ccs/lib/libpthread/pthread_trace.h,v RCS ID: 1.1.35.2
./usr/include/pthread.h
CHECKSUM: 13523 70
SUBSET: OSFINCLUDE445
./usr/ccs/lib/libpthread/pthread.h,v RCS ID: 1.1.58.2
./usr/include/pthread_debug.h
CHECKSUM: 14344 133
SUBSET: OSFINCLUDE445
./usr/ccs/lib/libpthread/pthread_debug.h,v RCS ID: 1.1.30.2
./usr/include/pthread_exception.h
CHECKSUM: 20094 41
SUBSET: OSFINCLUDE445
./usr/ccs/lib/libpthread/pthread_exception.h,v RCS ID: 1.1.33.2
SUPPORT NOTES: NONE
----------------------------------------------------------
NEW PATCHID: 151.00
PATCH ID: OSF445-114
REQUIRED PATCHES: NONE
CONDITIONALLY REQUIRED PATCHES: NONE
SUPERSEDED PATCHES: NONE
SPECIAL INSTRUCTIONS: NONE
FULL DESCRIPTION:
PROBLEM: (81295, 81296, 81562, 81563) (PATCH ID: OSF445-114)
********
This patch fixes following problems with the collect command
and it adds sysloging when collect suspends, resumes, or
receives a signal.
- Collect always returns 0 for tape status,
- Collect does not display proper PID and PPID on heavily loaded system,
- Collect displays warning msg when a HSG80 controller installed,
- Collect does not display proper Net status on heavily used network,
- Collect does not align MessageQ data properly when the ID field is large,
and
- Collect does not compute Usertime and Systemtime correctly for processes
whose pids are recycled.
FILES:
./usr/sbin/collect
CHECKSUM: 52338 248
SUBSET: OSFSERVICETOOLS445
./usr/sbin/collect/collector/buffer.c,v RCS ID: 1.1.23.1
./usr/sbin/collect/collector/collect.c,v RCS ID: 1.1.31.1
./usr/sbin/collect/collector/collect.h,v RCS ID: 1.1.30.1
./usr/sbin/collect/collector/log.c,v RCS ID: 1.1.24.1
./usr/sbin/collect/collector/mem.c,v RCS ID: 1.1.26.1
./usr/sbin/collect/collector/misc.c,v RCS ID: 1.1.30.1
./usr/sbin/collect/collector/mqueue.c,v RCS ID: 1.1.23.1
./usr/sbin/collect/collector/net.c,v RCS ID: 1.1.23.1
./usr/sbin/collect/collector/on_disk.h,v RCS ID: 1.1.26.1
./usr/sbin/collect/collector/play.c,v RCS ID: 1.1.26.1
./usr/sbin/collect/collector/proc.c,v RCS ID: 1.1.28.1
./usr/sbin/collect/collector/storage.c,v RCS ID: 1.1.27.1
SUPPORT NOTES: NONE
----------------------------------------------------------
NEW PATCHID: 140.00
PATCH ID: OSF445-115
REQUIRED PATCHES: NONE
CONDITIONALLY REQUIRED PATCHES: NONE
SUPERSEDED PATCHES:
OSF445-072 (79.00),
OSF445-082 (138.00)
SPECIAL INSTRUCTIONS: NONE
FULL DESCRIPTION:
PROBLEM: (80620) (PATCH ID: OSF445-072)
********
This patch fixes a printing problem where lpd reads any data from
the printer that has not been read, for local and remote connections.
The read-backs for remote connections cause an additional 2 second
timeout which may cause a job-submit failure on the job-number
wrap-around.
This patch fixes the problem by performing the read-backs for local
connections only.
PROBLEM: (78515, 80638, 80639, 80877) (PATCH ID: OSF445-082)
********
This patch fixes the following four printing problems:
- A user is unable to delete a print job from
a remote system with a hostname greater than 32 characters
because the hostname was truncated.
- When a TCP/IP connection fails, the retry
algorithm would take longer to print jobs due
to a long retry interval.
- A timing hole during lpd last-job completion
and shutdown needed to be closed.
- It was not possible to print to the lpd queue
using Windows 2000.
PROBLEM: (76329, 76559) (PATCH ID: OSF445-115)
********
This patch corrects a problem in which, under certain conditions,
unnecessary error messages are written to the lpr.log file.
FILES:
./usr/bin/lpq
CHECKSUM: 11178 64
SUBSET: OSFPRINT445
./usr/sbin/lpd/common.c,v RCS ID: 4.2.63.2
./usr/sbin/lpd/lp.h,v RCS ID: 4.2.50.1
./usr/bin/lpr
CHECKSUM: 50873 72
SUBSET: OSFPRINT445
./usr/sbin/lpd/common.c,v RCS ID: 4.2.63.2
./usr/sbin/lpd/lp.h,v RCS ID: 4.2.50.1
./usr/sbin/lpd/lpr.c,v RCS ID: 4.2.83.1
./usr/sbin/lpd/common.c,v RCS ID: 4.2.63.2
./usr/sbin/lpd/lp.h,v RCS ID: 4.2.50.1
./usr/sbin/lpc
CHECKSUM: 30751 72
SUBSET: OSFPRINT445
./usr/sbin/lpd/common.c,v RCS ID: 4.2.63.2
./usr/sbin/lpd/lp.h,v RCS ID: 4.2.50.1
./usr/bin/lpstat
CHECKSUM: 15550 32
SUBSET: OSFPRINT445
./usr/sbin/lpd/lp.h,v RCS ID: 4.2.50.1
./usr/bin/lp
CHECKSUM: 11178 64
SUBSET: OSFPRINT445
./usr/sbin/lpd/lp.h,v RCS ID: 4.2.50.1
./usr/sbin/lpd/common.c,v RCS ID: 4.2.63.2
./usr/sbin/lpd/lp.h,v RCS ID: 4.2.50.1
./usr/sbin/lpd/common.c,v RCS ID: 4.2.63.2
./usr/sbin/lpd/lp.h,v RCS ID: 4.2.50.1
./usr/sbin/lpd/lpr.c,v RCS ID: 4.2.83.1
./usr/sbin/lpd/common.c,v RCS ID: 4.2.63.2
./usr/sbin/lpd/lp.h,v RCS ID: 4.2.50.1
./usr/sbin/lpd/lp.h,v RCS ID: 4.2.50.1
./usr/sbin/pac
CHECKSUM: 46496 24
SUBSET: OSFBASE445
./usr/sbin/lpd/lp.h,v RCS ID: 4.2.50.1
./usr/sbin/lptest
CHECKSUM: 57382 16
SUBSET: OSFPRINT445
./usr/sbin/lpd/lp.h,v RCS ID: 4.2.50.1
./usr/bin/lprm
CHECKSUM: 19138 56
SUBSET: OSFPRINT445
./usr/sbin/lpd/common.c,v RCS ID: 4.2.63.2
./usr/sbin/lpd/lp.h,v RCS ID: 4.2.50.1
./usr/lbin/lpd
CHECKSUM: 23593 136
SUBSET: OSFPRINT445
./usr/sbin/lpd/common.c,v RCS ID: 4.2.63.2
./usr/sbin/lpd/lp.h,v RCS ID: 4.2.50.1
./usr/sbin/lpd/lpd.c,v RCS ID: 4.2.63.1
./usr/sbin/lpd/printjob.c,v RCS ID: 4.3.103.2
SUPPORT NOTES: NONE
----------------------------------------------------------
NEW PATCHID: 124.00
PATCH ID: OSF445-117
REQUIRED PATCHES: NONE
CONDITIONALLY REQUIRED PATCHES: NONE
SUPERSEDED PATCHES: NONE
SPECIAL INSTRUCTIONS: NONE
FULL DESCRIPTION:
PROBLEM: (81592) (PATCH ID: OSF445-117)
********
The problem is that the config file that is created using the target kernel has
characters that are not valid. This problem occurred on Compaq AlphaServer DS20
and ES40 systems.
FILES:
./usr/sbin/sizer
CHECKSUM: 62847 288
SUBSET: OSFHWBASE445
./usr/sbin/sizer/sizer.c,v RCS ID: 4.2.43.1
SUPPORT NOTES: NONE
----------------------------------------------------------
NEW PATCHID: 97.00
PATCH ID: OSF445-118
REQUIRED PATCHES: NONE
CONDITIONALLY REQUIRED PATCHES: NONE
SUPERSEDED PATCHES:
OSF445-044 (49.00)
SPECIAL INSTRUCTIONS: NONE
FULL DESCRIPTION:
PROBLEM: (78638) (PATCH ID: OSF445-0044)
********
This patch extends the maximum length of an identifier from the current
limit of 1024 characters to a new maximum length of 16 * 1024. Identifiers
longer than 1024 characters are rare, but they do occur when assembler
source files are generated by a source code generator. Before this change, an
identifer that exceeded 1024 characters in length would result in an
assembly-time error stating that the "line is too long".
PROBLEM: (48207, 44356, IPMT, Request,
n/a) (PATCH ID: OSF445-118)
********
QAR 48207
The assembler generates an invalid error message such as the following:
as1: Error: bug1.s, line 137: lituse_base!-1305670057984 not preceeded
by a literal!
when assembling a valid program which produces a mix of hand-coded and
assembler-generated relocation operands. It is the mix which causes
the problem. So, a program which contains hand-coded relocation operands
assembles correctly as long as it contains nothing which would cause an
assembler-generated relocation to be emitted.
QAR 44356
The assembler generates an incorrect error message such as the following:
as1: Error: t.s, line 8: lituse_base!10 not matched to last literal!6
for a program which contains an unmatched "gpdisp" relocation operand.
In this case, the program is an illegal program, but the error message
which is generated is completely irrelevant to the actual problem.
FILES:
./usr/ccs/lib/cmplrs/cc/as1
CHECKSUM: 19984 928
SUBSET: OSFCMPLRS445
./usr/ccs/lib/cmplrs/cc/as0
CHECKSUM: 31421 632
SUBSET: OSFCMPLRS445
SUPPORT NOTES: NONE
----------------------------------------------------------
NEW PATCHID: 199.00
PATCH ID: OSF445-127
REQUIRED PATCHES: NONE
CONDITIONALLY REQUIRED PATCHES: NONE
SUPERSEDED PATCHES:
OSF445-080 (82.00),
OSF445-129 (197.00)
SPECIAL INSTRUCTIONS: NONE
FULL DESCRIPTION:
PROBLEM: (#80500, #80226) (PATCH ID: OSF445-080)
********
Fix for incorrect header length in GS-series Hierarchical
Switch machine check frames. Early revisions of PCA
chips don't allow DMA Window3.
PROBLEM: (81882) (PATCH ID: OSF445-129)
********
Under a specific set of unlikely circumstances it is possible for revision 4 PCA
hardware to falsely report PCI hung bus errors, which will cause a uncorrectable
hardware machine check and operating system panic. The following console error
messages indicate this problem has occurred. The "PCI bus hung during Fault"
text in the error message is the key to detecting this error. Note: the false
PCI bus hung error only occurs with revision 4 PCA hardware.
iop: ioa_err_sum = 0x100000000
Bit 32: Hose 0 PCA reported an Uncorrectable Error
pca: pca_whatami = 0x8000034
Bit 2: ASIC revision
Bit 4: Backplane revision
Bit 5: Backplane revision
Bit 27: Microprocessor present
pca: pca_err_sum = 0x8000
Bit 15: PCI bus hung during Fault
pca: ne_whatami = 0x100000302
pca: fe_whatami = 0x100000202
pca: pci0_err_sum = 0x10068000
Bit 15: PCI bus hung during Fault
Bit 17: Failing PCI command
Bit 18: Failing PCI command
Bit 28: PCA was PCI initiator when bus was hung
pca: pci0_err_addr = 0x2030000
pca: pci1_err_sum = 0x4060000
Bit 17: Failing PCI command
Bit 18: Failing PCI command
Bit 26: PCI slot that was active during the failure
pca: pci1_err_addr = 0xc0011500
Machine Check SYSTEM Fatal Abort
Machine check code = 0x100000202
Ibox Status = 0000000000000000
Dcache Status = 0000000000000000
Cbox Address = 0000000000000000
Fill Syndrome 1 = 0000000000000000
Fill Syndrome 0 = 0000000000000000
Cbox Status = 0000000000000000
EV6 captured status of Bcache mode = 0000000000000000
EV6 Exception Address = fffffc000097aff0
EV6 Interrupt Enablement and Current Processor mode = 0000007ee0000000
EV6 Interrupt Summary Register = 0000002000000000
EV6 TBmiss or Fault status = 0000000000000000
EV6 PAL Base Address = 0000000000020000
EV6 Ibox control = fffffffc0c306396
EV6 Ibox Process_context = 0000718000000004
Cpu Fault Summary = 0x1
QBB bit-directed reg. dump
QBB 0 CSRs to be logged summary = 0x1100
QBB 1 CSRs to be logged summary = 0x0
QBB 2 CSRs to be logged summary = 0x0
QBB 3 CSRs to be logged summary = 0x0
QBB 4 CSRs to be logged summary = 0x0
QBB 5 CSRs to be logged summary = 0x0
QBB 6 CSRs to be logged summary = 0x0
QBB 7 CSRs to be logged summary = 0x0
panic (cpu 0): System Uncorrectable Machine Check
PROBLEM: (81582) (PATCH ID: OSF445-127)
********
When an Alphaserver GS80, GS160, or GS320 system reaches a critical
temperature, it will shut itself down as a precaution. This temperature
is safe for the power supply's but the system will issue an enviromental
warning and shut itself down. The fix to this problem is to no longer take
into account the power supply's tempature when determining the system's
tempature.
FILES:
./sys/BINARY/wfcpu.mod
CHECKSUM: 32885 53
SUBSET: OSFHWBIN445
./kernel/arch/alpha/hal/wfcpu.c,v RCS ID: 1.1.32.1
./kernel/arch/alpha/hal/wfcpu.h,v RCS ID: 1.1.14.1
./kernel/arch/alpha/hal/wfpci.h,v RCS ID: 1.1.21.1
./sys/BINARY/wfcpu_mult.mod
CHECKSUM: 55046 56
SUBSET: OSFHWBIN445
./kernel/arch/alpha/hal/wfcpu.c,v RCS ID: 1.1.32.1
./kernel/arch/alpha/hal/wfcpu.h,v RCS ID: 1.1.14.1
./kernel/arch/alpha/hal/wfpci.h,v RCS ID: 1.1.21.1
./usr/sys/include/arch/alpha/hal/wfqbb.h
CHECKSUM: 27419 61
SUBSET: OSFHWBINCOM445
./kernel/arch/alpha/hal/wfqbb.h,v RCS ID: 1.1.16.1
./sys/BINARY/wfpci.mod
CHECKSUM: 51582 143
SUBSET: OSFHWBIN445
./kernel/arch/alpha/hal/wfpci.c,v RCS ID: 1.1.28.1
./kernel/arch/alpha/hal/wfpci.h,v RCS ID: 1.1.21.1
./sys/BINARY/wfpci_mult.mod
CHECKSUM: 26839 145
SUBSET: OSFHWBIN445
./kernel/arch/alpha/hal/wfpci.c,v RCS ID: 1.1.28.1
./kernel/arch/alpha/hal/wfpci.h,v RCS ID: 1.1.21.1
./usr/sys/include/arch/alpha/hal/wfcpu.h
CHECKSUM: 43338 84
SUBSET: OSFHWBINCOM445
./kernel/arch/alpha/hal/wfcpu.h,v RCS ID: 1.1.14.1
./usr/sys/include/arch/alpha/hal/wfpci.h
CHECKSUM: 32963 34
SUBSET: OSFHWBINCOM445
./kernel/arch/alpha/hal/wfpci.h,v RCS ID: 1.1.21.1
./sys/BINARY/wfsrvmgmt.mod
CHECKSUM: 53760 176
SUBSET: OSFHWBIN445
./kernel/arch/alpha/hal/wfcpu.h,v RCS ID: 1.1.14.1
./kernel/arch/alpha/hal/wfsrvmgmt.c,v RCS ID: 1.1.18.1
./usr/sys/include/arch/alpha/hal/wfsrvmgmt.h
CHECKSUM: 50168 31
SUBSET: OSFHWBINCOM445
./kernel/arch/alpha/hal/wfsrvmgmt.h,v RCS ID: 1.1.8.1
./usr/sys/include/arch/alpha/hal/cfgtree.h
CHECKSUM: 22988 16
SUBSET: OSFHWBINCOM445
./kernel/arch/alpha/hal/cfgtree.h,v RCS ID: 1.1.11.1
SUPPORT NOTES: NONE
----------------------------------------------------------
NEW PATCHID: 196.00
PATCH ID: OSF445-135
REQUIRED PATCHES: NONE
CONDITIONALLY REQUIRED PATCHES: NONE
SUPERSEDED PATCHES: NONE
SPECIAL INSTRUCTIONS: NONE
FULL DESCRIPTION:
PROBLEM: (80541) (PATCH ID: OSF445-135)
********
Compaq has determined in laboratory testing that there is a theoretical
possibility that during read and write operations to the floppy disk on
DS10, DS10L and ES40 AlphaServers and VS10 and XP900 AlphaStations, a
single byte of data may be inaccurately read or written without notice
to the user or system. The potential for this anomaly exists only if
floppy data read and write operations are attempted while there is
extremely heavy traffic on these Alpha systems' internal input/output
busses. Although Compaq has observed the anomaly only in laboratory
tests designed to create atypical system stresses, including almost
constant use of the floppy disk drive, we are supplying this patch to
address this potential issue.
FILES:
./sys/BINARY/fdi.mod
CHECKSUM: 24079 75
SUBSET: OSFHWBIN445
./kernel/io/dec/fdi/fd.c,v RCS ID: 1.1.64.1
./kernel/io/dec/fdi/fdcam.c,v RCS ID: 1.1.76.1
SUPPORT NOTES: NONE
----------------------------------------------------------
NEW PATCHID: 2.00
PATCH ID: OSF445CDE-002
REQUIRED PATCHES: NONE
CONDITIONALLY REQUIRED PATCHES: NONE
SUPERSEDED PATCHES: NONE
SPECIAL INSTRUCTIONS: NONE
FULL DESCRIPTION:
PROBLEM: (BCGM10D48) (PATCH ID: OSF445CDE-002)
********
This patch fixes a problem in which file permissions allow any user to
write to the /.dt/Trash/.trashinfo file.
FILES:
./usr/dt/bin/dtfile
CHECKSUM: 07715 808
SUBSET: OSFCDEMIN445
./cde1/dtfile/Trash.c,v RCS ID: 2.1.13.1
SUPPORT NOTES: NONE
----------------------------------------------------------
NEW PATCHID: 3.00
PATCH ID: OSF445CDE-003
REQUIRED PATCHES: NONE
CONDITIONALLY REQUIRED PATCHES: NONE
SUPERSEDED PATCHES: NONE
SPECIAL INSTRUCTIONS: NONE
FULL DESCRIPTION:
PROBLEM: (HPAQC0KK9) (PATCH ID: OSF445CDE-003)
********
This patch fixes a problem where the Common Desktop Environment (CDE)
Application Manager did not recreate the list of application groups
at login. After customizing the application groups, users would see
the old groups instead of the new groups.
FILES:
./usr/dt/bin/dtappgather
CHECKSUM: 04452 48
SUBSET: OSFCDEDT445
SUPPORT NOTES: NONE
----------------------------------------------------------
NEW PATCHID: 101.00
PATCH ID: OSF445CDE-004A
REQUIRED PATCHES: NONE
CONDITIONALLY REQUIRED PATCHES:
OSF445CDE-004B (103.00)
SUPERSEDED PATCHES:
OSF445CDE-001A (1.00)
SPECIAL INSTRUCTIONS: NONE
FULL DESCRIPTION:
PROBLEM: (ZUO16050A, 47503) (PATCH ID: OSF445CDE-001)
********
This patch fixes a problem in which dtfile ICDE COSE tool does not
work when TMPDIR is defined as /ldata/disk_local/tmp.
dtfile returns this error:
/ldata/disk_local/tmp/sdtdbcache_AAAaadmma: Cross-device link
/ldata/disk_local/tmp/sdtdbcache_BAAaadmma: Cross-device link
Floating exception (core dumped)
PROBLEM: (UVO41850, 46127) (PATCH ID: OSF445CDE-004)
********
This patch fixes a problem with the Common Desktop Environment (CDE)
in which some desktop applications will fail if CDE is not
initialized.
The error which appears in the users home .dt/errorlog file is:
Desktop Not Initialized: Could not createAction/Datatypes
database.
FILES:
./usr/dt/lib/libDtSvc.so
CHECKSUM: 29478 624
SUBSET: OSFCDEMIN445
./lib1/DtSvc/DtUtil1/ActionUtil.c,v RCS ID: 2.1.16.1
./lib1/DtSvc/DtUtil1/DbLoad.c,v RCS ID: 2.1.10.1
./lib1/DtSvc/DtUtil1/DtsMM.c,v RCS ID: 1.1.13.1
SUPPORT NOTES: NONE
----------------------------------------------------------
NEW PATCHID: 103.00
PATCH ID: OSF445CDE-004B
REQUIRED PATCHES:
OSF445CDE-004A (101.00)
CONDITIONALLY REQUIRED PATCHES: NONE
SUPERSEDED PATCHES:
OSF445CDE-001B (83.00)
SPECIAL INSTRUCTIONS: NONE
FULL DESCRIPTION:
PROBLEM: (ZUO16050A, 47503) (PATCH ID: OSF445CDE-001)
********
This patch fixes a problem in which dtfile ICDE COSE tool does not
work when TMPDIR is defined as /ldata/disk_local/tmp.
dtfile returns this error:
/ldata/disk_local/tmp/sdtdbcache_AAAaadmma: Cross-device link
/ldata/disk_local/tmp/sdtdbcache_BAAaadmma: Cross-device link
Floating exception (core dumped)
PROBLEM: (UVO41850, 46127) (PATCH ID: OSF445CDE-004)
********
This patch fixes a problem with the Common Desktop Environment (CDE)
in which some desktop applications will fail if CDE is not
initialized.
The error which appears in the users home .dt/errorlog file is:
Desktop Not Initialized: Could not createAction/Datatypes
database.
FILES:
./usr/dt/lib/libDtSvc.a
CHECKSUM: 17196 746
SUBSET: OSFCDEDEV445
./lib1/DtSvc/DtUtil1/ActionUtil.c,v RCS ID: 2.1.16.1
./lib1/DtSvc/DtUtil1/DbLoad.c,v RCS ID: 2.1.10.1
./lib1/DtSvc/DtUtil1/DtsMM.c,v RCS ID: 1.1.13.1
SUPPORT NOTES: NONE
----------------------------------------------------------
NEW PATCHID: 180.00
PATCH ID: OSF445CDE-005
REQUIRED PATCHES: NONE
CONDITIONALLY REQUIRED PATCHES: NONE
SUPERSEDED PATCHES: NONE
SPECIAL INSTRUCTIONS: NONE
FULL DESCRIPTION:
PROBLEM: (BCSM40MFF) (PATCH ID: OSF445CDE-005)
********
This patch fixes a dtmail problem in which a "From" line with quotes
in it incorrectly finds the date of the mail message. This error
is displayed on the main screen under the header 'Date and Time'
and shows up as Dec. 31 or as a blank field.
FILES:
./usr/dt/bin/dtmail
CHECKSUM: 20125 1072
SUBSET: OSFCDEMAIL445
SUPPORT NOTES: NONE
----------------------------------------------------------
NEW PATCHID: 132.00
PATCH ID: OSF445CDE-006
REQUIRED PATCHES: NONE
CONDITIONALLY REQUIRED PATCHES: NONE
SUPERSEDED PATCHES: NONE
SPECIAL INSTRUCTIONS: NONE
FULL DESCRIPTION:
PROBLEM: (BRO25212A) (PATCH ID: OSF445CDE-006)
********
This patch fixes a problem where the Common Desktop Environment (CDE)
login daemon, dtlogin, core dumps occasionally when servicing requests
from XDMCP clients such as X terminals or PCs running X servers.
FILES:
./usr/dt/bin/dtlogin
CHECKSUM: 51034 176
SUBSET: OSFCDEDT445
./cde1/dtlogin/protodpy.c,v RCS ID: 2.1.11.1
SUPPORT NOTES: NONE
----------------------------------------------------------
NEW PATCHID: 184.00
PATCH ID: OSF445CDE-007
REQUIRED PATCHES: NONE
CONDITIONALLY REQUIRED PATCHES: NONE
SUPERSEDED PATCHES: NONE
SPECIAL INSTRUCTIONS: NONE
FULL DESCRIPTION:
PROBLEM: (HPAQ601QT, HPAQ40CH6, 80634) (PATCH ID: OSF445CDE-007)
********
This patch fixes a problem in which the Window Manager (dtwm)
intermittently hangs on a system which uses multiple displays.
FILES:
./usr/dt/bin/dtwm
CHECKSUM: 55727 648
SUBSET: OSFCDEDT445
./cde1/dtwm/WmFunction.c,v RCS ID: 2.1.16.1
./cde1/dtwm/WmKeyFocus.c,v RCS ID: 2.1.14.1
./cde1/dtwm/WmManage.c,v RCS ID: 2.1.12.1
SUPPORT NOTES: NONE
----------------------------------------------------------
NEW PATCHID: 159.00
PATCH ID: OSF445DX-004
REQUIRED PATCHES: NONE
CONDITIONALLY REQUIRED PATCHES: NONE
SUPERSEDED PATCHES:
OSF445DX-001 (4.00),
OSF445DX-002 (5.00),
OSF445DX-003 (6.00)
SPECIAL INSTRUCTIONS: NONE
FULL DESCRIPTION:
PROBLEM: (MGO27076A, 62626) (PATCH ID: OSF445DX-001)
********
This patch fixes a problem in which the dxaccounts application does
not allow users to be added to groups with Group ID lower than the
default minimum specified in the General Options dialog.
PROBLEM: (63284, 64762, 76823, 77740) (PATCH ID: OSF445DX-002)
********
This patch fixes the following cli/dxaccounts problems:
- the error message displayed when Account Manager fails to start due to the
detection of an Account Manager lock file (/etc/.AM_is_running) is not clear.
- a command 'uermod -D' does not display the 'Expire' date when it is set.
For example:
#usermod -D -e 01/01/01
(this will set the 'Expire' date in the default file to 01/01/01)
#usermod -D
(this should display all defaults values, but the 'Expire' value is not shown)
Distributed = 0
Local = 1
Administrative Lock Applied = 1
Next User id = 200
Minimum User id = 12
Maximum User id = 65535
Primary Group = users,15
Base Directory = /usr/users
Skeleton Directory = /usr/skel
Shell = /bin/sh
Inactive (days) = 60
Expire (date) =
- enabling to change root's login/uid through cli/dxaccounts utilities.
PROBLEM: (TKTB10045, UVO90893, BCGMB1D0D, UTO52178A, MGO83278A, UTO57196A)
(PATCH ID: OSF445DX-003)
********
This patch fixes a problem in which dxaccounts does not allow the
system manager to add NIS users when the system is running enhanced
security.
PROBLEM: (UTO73283A) (PATCH ID: OSF445DX-004)
********
When a new user id is created and the option to create a home directory
for that user is chosen the new home directory will be created with the
date and time stamp of the /usr/skel directory.
FILES:
./usr/shlib/libaccmgr.so
CHECKSUM: 21696 320
SUBSET: OSFSYSMAN445
./sysman/dxaccounts/api/src/AM_Groupval.c,v RCS ID: 1.1.26.1
./sysman/dxaccounts/api/src/AM_User.c,v RCS ID: 1.1.81.2
./sysman/dxaccounts/api/src/AM_User_sec.c,v RCS ID: 1.1.48.1
./usr/sbin/usermod
CHECKSUM: 60103 56
SUBSET: OSFSYSMAN445
./sysman/dxaccounts/cli/lib/cli_moduser.c,v RCS ID: 1.1.30.1
./usr/bin/X11/dxaccounts
CHECKSUM: 00305 464
SUBSET: OSFXSYSMAN445
SUPPORT NOTES: NONE
----------------------------------------------------------
NEW PATCHID: 190.00
PATCH ID: OSF445DX-005
REQUIRED PATCHES: NONE
CONDITIONALLY REQUIRED PATCHES: NONE
SUPERSEDED PATCHES: NONE
SPECIAL INSTRUCTIONS: NONE
FULL DESCRIPTION:
PROBLEM: (81557) (PATCH ID: OSF445DX-005)
********
This fixes a problem that was causing diskconfig to issue the error
message "can't read "tminor": no such variable" upon startup.
FILES:
./usr/share/sysman/diskconfig/DSKCONF.ism
CHECKSUM: 02037 47
SUBSET: OSFSYSMAN445
./sysman/diskconfig/DSKCONF.ism,v RCS ID: 1.1.43.1
SUPPORT NOTES: NONE
----------------------------------------------------------
NEW PATCHID: 7.00
PATCH ID: OSF445X11-001
REQUIRED PATCHES: NONE
CONDITIONALLY REQUIRED PATCHES: NONE
SUPERSEDED PATCHES: NONE
SPECIAL INSTRUCTIONS: NONE
FULL DESCRIPTION:
PROBLEM: (76025) (PATCH ID: OSF445X11-001)
********
Character ccedilla and Ccedilla do not display in DT and DX applications
when entered from Turkish F keyboard.
FILES:
./usr/lib/X11/locale/Compose/tr_TR.ISO8859-9
CHECKSUM: 44924 51
SUBSET: OSFX11445
SUPPORT NOTES: NONE
----------------------------------------------------------
NEW PATCHID: 9.00
PATCH ID: OSF445X11-003A
REQUIRED PATCHES: NONE
CONDITIONALLY REQUIRED PATCHES:
OSF445X11-003B (84.00)
SUPERSEDED PATCHES: NONE
SPECIAL INSTRUCTIONS: NONE
FULL DESCRIPTION:
PROBLEM: (BCPM10CZL, 76600) (PATCH ID: OSF445X11-003)
********
This patch fixes a problem in which the svn widget of libDXm.so
creates identical backgrounds and foregrounds.
FILES:
./usr/shlib/libDXm.so
CHECKSUM: 04187 944
SUBSET: OSFX11445
SUPPORT NOTES: NONE
----------------------------------------------------------
NEW PATCHID: 84.00
PATCH ID: OSF445X11-003B
REQUIRED PATCHES:
OSF445X11-003A (9.00)
CONDITIONALLY REQUIRED PATCHES: NONE
SUPERSEDED PATCHES: NONE
SPECIAL INSTRUCTIONS: NONE
FULL DESCRIPTION:
PROBLEM: (BCPM10CZL, 76600) (PATCH ID: OSF445X11-003)
********
This patch fixes a problem in which the svn widget of libDXm.so
creates identical backgrounds and foregrounds.
FILES:
./usr/lib/libDXm.a
CHECKSUM: 37945 910
SUBSET: OSFXLIBA445
SUPPORT NOTES: NONE
----------------------------------------------------------
NEW PATCHID: 10.00
PATCH ID: OSF445X11-004
REQUIRED PATCHES: NONE
CONDITIONALLY REQUIRED PATCHES: NONE
SUPERSEDED PATCHES: NONE
SPECIAL INSTRUCTIONS: NONE
FULL DESCRIPTION:
PROBLEM: (77171) (PATCH ID: OSF445X11-004)
********
Several compose definitions were omitted in the original version of this
file. This change allows users to use compose sequences documented in
other (Latin-2) locales to generate the same character in the latin-9
locale.
FILES:
./usr/lib/X11/locale/Compose/en_US.ISO8859-15
CHECKSUM: 19761 53
SUBSET: OSFX11445
SUPPORT NOTES: NONE
----------------------------------------------------------
NEW PATCHID: 11.00
PATCH ID: OSF445X11-005A
REQUIRED PATCHES: NONE
CONDITIONALLY REQUIRED PATCHES:
OSF445X11-005B (85.00)
SUPERSEDED PATCHES: NONE
SPECIAL INSTRUCTIONS: NONE
FULL DESCRIPTION:
PROBLEM: (ZUO78968A) (PATCH ID: OSF445X11-005)
********
This patch fixes various problems with the X font server and with the X
server's interaction with X font servers.
FILES:
./usr/shlib/X11/libfont.so
CHECKSUM: 43416 200
SUBSET: OSFX11445
./xc/lib/font/bitmap/bdfread.c,v RCS ID: 1.1.14.1
./xc/lib/font/bitmap/bitmapfunc.c,v RCS ID: 1.1.15.1
./xc/lib/font/bitmap/bitscale.c,v RCS ID: 1.1.21.1
./xc/lib/font/bitmap/pcfread.c,v RCS ID: 1.1.15.1
./xc/lib/font/bitmap/snfread.c,v RCS ID: 1.1.14.1
./xc/lib/font/fontfile/decompress.c,v RCS ID: 1.1.15.1
./xc/lib/font/fontfile/dirfile.c,v RCS ID: 1.1.14.1
./xc/lib/font/fontfile/ffcheck.c,v RCS ID: 1.1.16.1
./xc/lib/font/fontfile/fontcache.c,v RCS ID: 1.1.13.1
./xc/lib/font/fontfile/fontdir.c,v RCS ID: 1.1.15.1
./xc/lib/font/fontfile/fontfile.c,v RCS ID: 1.1.17.1
./xc/lib/font/fontfile/fontscale.c,v RCS ID: 1.1.16.1
./xc/lib/font/fontfile/printerfont.c,v RCS ID: 1.1.16.1
./xc/lib/font/util/fontaccel.c,v RCS ID: 1.1.14.1
./xc/lib/font/util/fontutil.c,v RCS ID: 1.1.16.1
./xc/lib/font/util/fontxlfd.c,v RCS ID: 1.1.16.1
./xc/lib/font/util/miscutil.c,v RCS ID: 1.1.16.1
./xc/lib/font/util/patcache.c,v RCS ID: 1.1.16.1
./usr/shlib/X11/libfr_Type1.so
CHECKSUM: 32952 200
SUBSET: OSFX11445
./xc/lib/font/Type1/scanfont.c,v RCS ID: 1.1.18.1
./xc/lib/font/Type1/t1funcs.c,v RCS ID: 1.1.19.1
./xc/lib/font/Type1/t1info.c,v RCS ID: 1.1.17.1
./usr/shlib/X11/libfr_Speedo.so
CHECKSUM: 22905 96
SUBSET: OSFX11445
./xc/lib/font/Speedo/do_char.c,v RCS ID: 1.1.15.1
./xc/lib/font/Speedo/spfile.c,v RCS ID: 1.1.16.1
./xc/lib/font/Speedo/spfont.c,v RCS ID: 1.1.15.1
./xc/lib/font/Speedo/spinfo.c,v RCS ID: 1.1.17.1
./usr/shlib/X11/libfr_fs.so
CHECKSUM: 13112 120
SUBSET: OSFX11445
./xc/lib/font/fc/fsconvert.c,v RCS ID: 1.1.14.1
./xc/lib/font/fc/fserve.c,v RCS ID: 1.1.21.1
./xc/lib/font/fc/fsio.c,v RCS ID: 1.1.16.1
./xc/lib/xtrans/Xtranssock.c,v RCS ID: 1.1.31.1
./xc/lib/xtrans/Xtransutil.c,v RCS ID: 1.1.10.1
./usr/shlib/X11/libdix.so
CHECKSUM: 64818 528
SUBSET: OSFSER445
./xc/programs/Xserver/dix/dixfonts.c,v RCS ID: 1.1.19.1
./xc/programs/xfs/difs/events.c,v RCS ID: 1.1.7.5
./usr/shlib/X11/libos.so
CHECKSUM: 39824 248
SUBSET: OSFSER445
./xc/lib/xtrans/Xtranssock.c,v RCS ID: 1.1.31.1
./xc/lib/xtrans/Xtransutil.c,v RCS ID: 1.1.10.1
./xc/programs/xfs/os/connection.c,v RCS ID: 1.1.19.2
SUPPORT NOTES: NONE
----------------------------------------------------------
NEW PATCHID: 85.00
PATCH ID: OSF445X11-005B
REQUIRED PATCHES:
OSF445X11-005A (11.00)
CONDITIONALLY REQUIRED PATCHES: NONE
SUPERSEDED PATCHES: NONE
SPECIAL INSTRUCTIONS: NONE
FULL DESCRIPTION:
PROBLEM: (ZUO78968A) (PATCH ID: OSF445X11-005)
********
This patch fixes various problems with the X font server and with the X
server's interaction with X font servers.
FILES:
./usr/lib/libFS.a
CHECKSUM: 15152 71
SUBSET: OSFXDEV445
./xc/lib/FS/FSListExt.c,v RCS ID: 1.1.10.1
./xc/lib/FS/FSOpenFont.c,v RCS ID: 1.1.14.1
./xc/lib/FS/FSSetCats.c,v RCS ID: 1.1.14.1
./xc/lib/FS/FSlibInt.c,v RCS ID: 1.1.12.1
./xc/lib/xtrans/Xtranssock.c,v RCS ID: 1.1.31.1
./xc/lib/xtrans/Xtransutil.c,v RCS ID: 1.1.10.1
./usr/bin/X11/xfs
CHECKSUM: 44513 200
SUBSET: OSFXMIT445
./xc/lib/font/fc/fsconvert.c,v RCS ID: 1.1.14.1
./xc/lib/font/fc/fserve.c,v RCS ID: 1.1.21.1
./xc/lib/font/fc/fsio.c,v RCS ID: 1.1.16.1
./xc/lib/xtrans/Xtranssock.c,v RCS ID: 1.1.31.1
./xc/lib/xtrans/Xtransutil.c,v RCS ID: 1.1.10.1
./xc/programs/xfs/difs/cache.c,v RCS ID: 1.1.12.1
./xc/programs/xfs/difs/dispatch.c,v RCS ID: 1.1.21.1
./xc/programs/xfs/difs/events.c,v RCS ID: 1.1.10.1
./xc/programs/xfs/difs/fonts.c,v RCS ID: 1.1.15.1
./xc/programs/xfs/difs/resource.c,v RCS ID: 1.1.12.1
./xc/programs/xfs/difs/swapreq.c,v RCS ID: 1.1.10.1
./xc/programs/xfs/os/connection.c,v RCS ID: 1.1.23.1
./xc/programs/xfs/os/error.c,v RCS ID: 1.1.17.1
./xc/programs/xfs/os/io.c,v RCS ID: 1.1.12.1
./xc/programs/xfs/os/ldrenderers.c,v RCS ID: 1.1.11.1
./xc/programs/xfs/os/osglue.c,v RCS ID: 1.1.10.1
./xc/programs/xfs/os/waitfor.c,v RCS ID: 1.1.12.1
SUPPORT NOTES: NONE
----------------------------------------------------------
NEW PATCHID: 12.00
PATCH ID: OSF445X11-006
REQUIRED PATCHES: NONE
CONDITIONALLY REQUIRED PATCHES: NONE
SUPERSEDED PATCHES: NONE
SPECIAL INSTRUCTIONS: NONE
FULL DESCRIPTION:
PROBLEM: (65682) (PATCH ID: OSF445X11-006)
********
This patch fixes a problem where the X server could core dump or get
unaligned access errors when clients used the Multi-Buffering
extension.
FILES:
./usr/shlib/X11/libextMultibuf.so
CHECKSUM: 38799 40
SUBSET: OSFSER445
./xc/programs/Xserver/Xext/multibuf_dix.c,v RCS ID: 1.1.13.1
SUPPORT NOTES: NONE
----------------------------------------------------------
NEW PATCHID: 13.00
PATCH ID: OSF445X11-007
REQUIRED PATCHES: NONE
CONDITIONALLY REQUIRED PATCHES: NONE
SUPERSEDED PATCHES: NONE
SPECIAL INSTRUCTIONS: NONE
FULL DESCRIPTION:
PROBLEM: (HPAQ10DTH, UVO55282, TKTB20026) (PATCH ID: OSF445X11-007)
********
Problem 1:
This patch fixes a problem where on systems with a PowerStorm 4D10T (ELSA
GLoria Synergy, SN-PBXGK-BB) graphics card or a PCI To Ethernet/Graphics
Combo Adapter (3X-DEPVD-AA), sometimes lines and images aren't drawn
correctly in scrolled windows.
Problem 2:
This patch fixes synchronization and drawing problems in the X server for
the PowerStorm 4D10T (ELSA GLoria Synergy, SN-PBXGK-BB) graphics card.
FILES:
./usr/shlib/X11/lib_dec_comet.so
CHECKSUM: 40803 128
SUBSET: OSFSER445
./xc/programs/Xserver/hw/dec/comet/cometallpriv.c,v RCS ID: 1.1.19.1
./xc/programs/Xserver/hw/dec/comet/cometfillsp.c,v RCS ID: 1.1.19.1
./xc/programs/Xserver/hw/dec/comet/cometgc.c,v RCS ID: 1.1.19.1
./xc/programs/Xserver/hw/dec/comet/cometglblt.c,v RCS ID: 1.1.28.1
./xc/programs/Xserver/hw/dec/comet/cometpoint.c,v RCS ID: 1.1.19.1
./xc/programs/Xserver/hw/dec/comet/cometrect.c,v RCS ID: 1.1.19.1
./xc/programs/Xserver/hw/dec/comet/cometscrinit.c,v RCS ID: 1.1.30.1
./xc/programs/Xserver/hw/dec/comet/cometzerline.c,v RCS ID: 1.1.26.1
SUPPORT NOTES: NONE
----------------------------------------------------------
NEW PATCHID: 126.00
PATCH ID: OSF445X11-008A
REQUIRED PATCHES: NONE
CONDITIONALLY REQUIRED PATCHES:
OSF445X11-008B (128.00)
SUPERSEDED PATCHES:
OSF445X11-002 (8.00)
SPECIAL INSTRUCTIONS: NONE
FULL DESCRIPTION:
PROBLEM: (DMO00614) (PATCH ID: OSF445X11-002)
********
When the Caps Lock setting is on, some 8-bit characters do
not display properly when entered directly from the keyboards.
When this patch is installed, users can enter 8-bit characters
directly from the keyboard regardless of the Caps Lock setting.
PROBLEM: (HPAQ62623) (PATCH ID: OSF445X11-008)
********
This patch fixes two memory leaks in the X Window System's X library (Xlib)
that can occur when creating and destroying Motif List, Text, and TextField
widgets.
FILES:
./usr/shlib/libX11.so.pre.O3D
CHECKSUM: 08394 1352
SUBSET: OSFX11445
./xc/lib/X11/imRm.c,v RCS ID: 1.1.22.1
./usr/shlib/libX11.so
CHECKSUM: 08394 1352
SUBSET: OSFX11445
./xc/lib/X11/imRm.c,v RCS ID: 1.1.22.1
./xc/lib/X11/imRm.c,v RCS ID: 1.1.22.1
SUPPORT NOTES: NONE
----------------------------------------------------------
NEW PATCHID: 128.00
PATCH ID: OSF445X11-008B
REQUIRED PATCHES:
OSF445X11-008A (126.00)
CONDITIONALLY REQUIRED PATCHES: NONE
SUPERSEDED PATCHES: NONE
SPECIAL INSTRUCTIONS: NONE
FULL DESCRIPTION:
PROBLEM: (HPAQ62623) (PATCH ID: OSF445X11-008)
********
This patch fixes two memory leaks in the X Window System's X library (Xlib)
that can occur when creating and destroying Motif List, Text, and TextField
widgets.
FILES:
./usr/lib/libX11.a
CHECKSUM: 22989 1507
SUBSET: OSFXLIBA445
./xc/lib/X11/imRm.c,v RCS ID: 1.1.22.1
SUPPORT NOTES: NONE
----------------------------------------------------------
NEW PATCHID: 118.00
PATCH ID: OSF445X11-009A
REQUIRED PATCHES: NONE
CONDITIONALLY REQUIRED PATCHES:
OSF445X11-009B (120.00)
SUPERSEDED PATCHES: NONE
SPECIAL INSTRUCTIONS: NONE
FULL DESCRIPTION:
PROBLEM: (HPAQ62623) (PATCH ID: OSF445X11-009)
********
This patch fixes a memory leak in the X Window System's X Toolkit library
(Xt) that could occur when creating and destroying Motif List, Text, and
TextField widgets.
FILES:
./usr/shlib/libXt.so
CHECKSUM: 15929 584
SUBSET: OSFX11445
./xc/lib/Xt/TMstate.c,v RCS ID: 1.1.10.1
SUPPORT NOTES: NONE
----------------------------------------------------------
NEW PATCHID: 120.00
PATCH ID: OSF445X11-009B
REQUIRED PATCHES:
OSF445X11-009A (118.00)
CONDITIONALLY REQUIRED PATCHES: NONE
SUPERSEDED PATCHES: NONE
SPECIAL INSTRUCTIONS: NONE
FULL DESCRIPTION:
PROBLEM: (HPAQ62623) (PATCH ID: OSF445X11-009)
********
This patch fixes a memory leak in the X Window System's X Toolkit library
(Xt) that could occur when creating and destroying Motif List, Text, and
TextField widgets.
FILES:
./usr/lib/libXt.a
CHECKSUM: 04934 620
SUBSET: OSFXLIBA445
./xc/lib/Xt/TMstate.c,v RCS ID: 1.1.10.1
SUPPORT NOTES: NONE
----------------------------------------------------------
NEW PATCHID: 153.00
PATCH ID: OSF445X11-010A
REQUIRED PATCHES: NONE
CONDITIONALLY REQUIRED PATCHES:
OSF445X11-010B (155.00)
SUPERSEDED PATCHES: NONE
SPECIAL INSTRUCTIONS: NONE
FULL DESCRIPTION:
PROBLEM: (HPAQ62623) (PATCH ID: OSF445X11-010)
********
This patch fixes various memory leaks in the Motif library (libXm) that
could occur when creating and destroying Motif List, Text, and TextField
widgets.
FILES:
./usr/shlib/libXm.so
CHECKSUM: 07424 2184
SUBSET: OSFX11445
./motif/lib/Xm/ImageCache.c,v RCS ID: 1.1.47.1
./motif/lib/Xm/List.c,v RCS ID: 1.1.50.1
./motif/lib/Xm/Text.c,v RCS ID: 1.1.43.1
./motif/lib/Xm/TextF.c,v RCS ID: 1.1.66.1
./motif/lib/Xm/TextOut.c,v RCS ID: 1.1.48.1
SUPPORT NOTES: NONE
----------------------------------------------------------
NEW PATCHID: 155.00
PATCH ID: OSF445X11-010B
REQUIRED PATCHES:
OSF445X11-010A (153.00)
CONDITIONALLY REQUIRED PATCHES: NONE
SUPERSEDED PATCHES: NONE
SPECIAL INSTRUCTIONS: NONE
FULL DESCRIPTION:
PROBLEM: (HPAQ62623) (PATCH ID: OSF445X11-010)
********
This patch fixes various memory leaks in the Motif library (libXm) that
could occur when creating and destroying Motif List, Text, and TextField
widgets.
FILES:
./usr/lib/libXm.a
CHECKSUM: 12092 2334
SUBSET: OSFXLIBA445
./motif/lib/Xm/ImageCache.c,v RCS ID: 1.1.47.1
./motif/lib/Xm/List.c,v RCS ID: 1.1.50.1
./motif/lib/Xm/Text.c,v RCS ID: 1.1.43.1
./motif/lib/Xm/TextF.c,v RCS ID: 1.1.66.1
./motif/lib/Xm/TextOut.c,v RCS ID: 1.1.48.1
SUPPORT NOTES: NONE
----------------------------------------------------------
NEW PATCHID: 194.00
PATCH ID: OSF445X11-011
REQUIRED PATCHES:
OSF445-109 (201.00)
CONDITIONALLY REQUIRED PATCHES: NONE
SUPERSEDED PATCHES: NONE
SPECIAL INSTRUCTIONS:
SPECIAL INSTRUCTIONS for Digital UNIX V4.0G Patch 194.00
WARNING! This patch provides the X server support for the new 3Dlabs
OXYGEN VX1 PCI graphics card. In order to obtain full support for
this graphic card, you must also select Patch 201.00, which is the driver
portion of the patch.
FULL DESCRIPTION:
PROBLEM: (none) (PATCH ID: OSF445X11-011)
********
This patch provides the Xserver library for the new 3Dlabs OXYGEN VX1
PCI graphcis card.
FILES:
./usr/bin/X11/Xdec
CHECKSUM: 61777 72
SUBSET: OSFSER445
./xc/programs/Xserver/loadable/loadable.c,v RCS ID: 1.1.61.1
./usr/shlib/X11/lib_dec_p3.so
CHECKSUM: 17691 360
SUBSET: OSFSER445
SUPPORT NOTES: NONE
----------------------------------------------------------
NEW PATCHID: 4.00
PATCH ID: TCR160-004
REQUIRED PATCHES: NONE
CONDITIONALLY REQUIRED PATCHES: NONE
SUPERSEDED PATCHES: NONE
SPECIAL INSTRUCTIONS: NONE
FULL DESCRIPTION:
PROBLEM: (QAR 70150) (Patch ID: TCR160-004)
********
Under certain circumstances a kernel memory fault is experienced on the DRD
client nodes just as or after the DRD server node has initiated MCII hub
failover.
trap: invalid memory read access from kernel mode
faulting virtual address: 0x2000000000000080
pc of faulting instruction: 0xfffffc00006cf284
ra contents at time of fault: 0xfffffc00006da05c
sp contents at time of fault: 0xffffffffac2db988
panic (cpu 0): kernel memory fault
crash> tf
> 0 thread_block src/kernel/kern/sched_prim.c : 2352
1 thread_preempt src/kernel/kern/sched_prim.c : 4070
2 boot src/kernel/arch/alpha/machdep.c : 1930
3 panic src/kernel/bsd/subr_prf.c : 842
4 trap src/kernel/arch/alpha/trap.c : 1747
5 _XentMM src/kernel/arch/alpha/locore.s : 1736
6 drd_map_unref src/kernel/io/drd/drd_map.c : 2631
7 bss_rm_biodone src/kernel/io/drd/bss_rm.c : 1444
8 bss_rm_iodone_thread src/kernel/io/drd/bss_rm.c : 1949
FILES:
./usr/opt/TCR160/sys/drd.mod
CHECKSUM: 22757 219
SUBSET: TCRMCA160
./kernel/io/drd/bss_rm.c,v RCS ID: 1.1.30.2
SUPPORT NOTES: NONE
----------------------------------------------------------
NEW PATCHID: 7.00
PATCH ID: TCR160-010
REQUIRED PATCHES: NONE
CONDITIONALLY REQUIRED PATCHES: NONE
SUPERSEDED PATCHES:
TCR160-001 (1.00)
SPECIAL INSTRUCTIONS: NONE
FULL DESCRIPTION:
PROBLEM: (None) (Patch ID: TCR160-001)
********
Reliable datagram (RDG) messaging delivers low latency, high bandwidth
networking for cluster applications. Cluster applications wishing to utilize
these features code to the api defined in the rdg shared library, librdg.so.
PROBLEM: (None) (Patch ID: TCR160-010)
********
Applications that are developed to the Reliable Datagram API may see
a problem where RdgIoPoll() indicates an IO has completed, when one
actually has not.
FILES:
./usr/opt/TCR160/sys/rdg.mod
CHECKSUM: 09023 49
SUBSET: TCRMCA160
./kernel/rdg/rdg_kern.c,v RCS ID: 1.1.15.4
./usr/opt/TCR160/ccs/lib/librdg.a
CHECKSUM: 15730 11
SUBSET: TCRMCA160
./usr/ccs/lib/librdg/rdg_lib.c,v RCS ID: 1.1.9.2
./usr/opt/TCR160/shlib/librdg.so
CHECKSUM: 23717 112
SUBSET: TCRMCA160
./usr/ccs/lib/librdg/rdg_lib.c,v RCS ID: 1.1.9.2
SUPPORT NOTES: NONE
----------------------------------------------------------
NEW PATCHID: 8.00
PATCH ID: TCR160-011
REQUIRED PATCHES: NONE
CONDITIONALLY REQUIRED PATCHES: NONE
SUPERSEDED PATCHES: NONE
SPECIAL INSTRUCTIONS: NONE
FULL DESCRIPTION:
PROBLEM: (QAR 73498) (Patch ID: TCR160-011)
********
This patch fixes two problems that could cause doconfig to appear to
hang when running in a TruCluster environment.
FILES:
./var/opt/TCR160/ase/sbin/ase_fix_config
CHECKSUM: 12344 25
SUBSET: TCRASE160
./usr/sbin/ase/asemgr/sh_bin/ase_fix_config.sh,v RCS ID: 1.1.23.2
SUPPORT NOTES: NONE
----------------------------------------------------------
NEW PATCHID: 12.00
PATCH ID: TCR160-018
REQUIRED PATCHES: NONE
CONDITIONALLY REQUIRED PATCHES: NONE
SUPERSEDED PATCHES: NONE
SPECIAL INSTRUCTIONS: NONE
FULL DESCRIPTION:
PROBLEM: (HPAQ820WB,MGO47512,VNO03879A,BRO91702A) (Patch ID: TCR160-018)
********
This patch corrects a problem with Networker displaying
garbage characters following the service name. If there
exists a service name that is at least 8 characters in
size, doing a "save" in Networker will cause an error similar
to the following:
save: SYSTEM error, 'dataservM-@M-^?^C' is not a registered client
The service name in this case is "dataserv"
FILES:
./usr/opt/TCR160/shlib/libaseapi.so
CHECKSUM: 01860 200
SUBSET: TCRASE160
./usr/sbin/ase/api/cdbapi.c,v RCS ID: 1.1.15.1
SUPPORT NOTES: NONE
----------------------------------------------------------
NEW PATCHID: 30.00
PATCH ID: TCR160-034
REQUIRED PATCHES: NONE
CONDITIONALLY REQUIRED PATCHES: NONE
SUPERSEDED PATCHES: NONE
SPECIAL INSTRUCTIONS: NONE
FULL DESCRIPTION:
PROBLEM: (QAR70521) (PATCH ID: TCR160-034)
********
This patch fixes a problem which caused a boot failure on a cluster
with a large number of shared SCSI buses. The system would panic
during the AM initialize phase with different panic strings mostly
simple lock timeouts.
FILES:
./usr/opt/TCR160/sys/ase.mod
CHECKSUM: 09869 159
SUBSET: TCRCOMMON160
./kernel/io/common/am.c,v RCS ID: 1.1.71.1
SUPPORT NOTES: NONE
----------------------------------------------------------
NEW PATCHID: 33.00
PATCH ID: TCR160-037
REQUIRED PATCHES: NONE
CONDITIONALLY REQUIRED PATCHES: NONE
SUPERSEDED PATCHES: NONE
SPECIAL INSTRUCTIONS: NONE
FULL DESCRIPTION:
PROBLEM: (QAR58998, QAR71021, QAR77203) (PATCH ID: TCR160-037)
********
This patch fixes following problems with drdadmin:
- drdadmin -v truncate the hostname after 8 characters, now it supports
more characters
- drdadmin in interactive mode was not pausing the output after a full
page, now it waits for any key to proceed
- if drdadmin was unable to open a device it just stated "open failure"
now it prints the name of the device for easy troubleshooting
FILES:
./usr/opt/TCR160/sbin/drdadmin
CHECKSUM: 65058 600
SUBSET: TCRDSVC160
./usr/sbin/drdadmin/drdadmin.c,v RCS ID: 1.1.19.1
SUPPORT NOTES: NONE
----------------------------------------------------------
NEW PATCHID: 34.00
PATCH ID: TCR160-038
REQUIRED PATCHES: NONE
CONDITIONALLY REQUIRED PATCHES: NONE
SUPERSEDED PATCHES: NONE
SPECIAL INSTRUCTIONS: NONE
FULL DESCRIPTION:
PROBLEM: (76549) (PATCH ID: TCR160-038)
********
This patch allows ase_reconfig_bus to modify up to 99 buses. Previously
this command was limited to 9 buses.
FILES:
./var/opt/TCR160/ase/sbin/ase_reconfig_bus
CHECKSUM: 39745 11
SUBSET: TCRASE160
./usr/sbin/ase/asemgr/sh_bin/ase_reconfig_bus.sh,v RCS ID: 1.2.6.1
SUPPORT NOTES: NONE
----------------------------------------------------------
NEW PATCHID: 35.00
PATCH ID: TCR160-039
REQUIRED PATCHES: NONE
CONDITIONALLY REQUIRED PATCHES: NONE
SUPERSEDED PATCHES:
TCR160-030 (28.00)
SPECIAL INSTRUCTIONS: NONE
FULL DESCRIPTION:
PROBLEM: (75723) (PATCH ID: TCR160-030)
********
This patch fixes a problem that would cause an error from awk(1) when
modifying an ASE service that contained a large number of LSM volumes.
The error would prevent the service from being properly modified. The
error was:
Checking LSM disk Group lotsdg ...
awk: Input line lots_svc:/dev/rvol/l cannot be longer than 3,000 bytes.
The source line number is 1.
awk: Input line lots_svc:/dev/rvol/l cannot be longer than 3,000 bytes.
The source line number is 1.
PROBLEM: (BCGM50V8M, 74557) (PATCH ID: TCR160-039)
********
This patch fixes a problem where LSM disk information was not properly
updated in the ASE database when volumes were removed from a disk
service.
FILES:
./var/opt/TCR160/ase/sbin/lsm_dg_modify
CHECKSUM: 28255 8
SUBSET: TCRASE160
./usr/sbin/ase/asemgr/sh_bin/lsm_dg_modify.sh,v RCS ID: 1.2.33.2
./var/opt/TCR160/ase/sbin/disk_modify
CHECKSUM: 58272 23
SUBSET: TCRASE160
./usr/sbin/ase/asemgr/sh_bin/disk_modify.sh,v RCS ID: 1.2.38.1
./var/opt/TCR160/ase/lib/FsRoutines
CHECKSUM: 11635 21
SUBSET: TCRASE160
./usr/sbin/ase/asemgr/sh_lib/FsRoutines.sh,v RCS ID: 1.2.45.1
SUPPORT NOTES: NONE
----------------------------------------------------------
NEW PATCHID: 36.00
PATCH ID: TCR160-040
REQUIRED PATCHES: NONE
CONDITIONALLY REQUIRED PATCHES: NONE
SUPERSEDED PATCHES: NONE
SPECIAL INSTRUCTIONS: NONE
FULL DESCRIPTION:
PROBLEM: (TKTB10028, HPAQ121JB, 78186, none) (PATCH ID: TCR160-040)
********
This patch fixes a problem that could cause an NFS or Disk Service that
has a '-' in the service name to end up "unassigned" after a disk failure.
A side-effect of the problem was that the asedirector would hang once
the disk failure was corrected.
After installing the patch, all services that contain a '-' in
the name, must be updated so that the lsm_lv_action script timeout
can be reset. Refer to the Release Notes for more information.
FILES:
./var/opt/TCR160/ase/lib/timeouts
CHECKSUM: 21192 4
SUBSET: TCRASE160
./usr/sbin/ase/asemgr/sh_lib/timeouts.sh,v RCS ID: 1.1.4.1
SUPPORT NOTES: NONE
----------------------------------------------------------
NEW PATCHID: 37.00
PATCH ID: TCR160-041
REQUIRED PATCHES: NONE
CONDITIONALLY REQUIRED PATCHES: NONE
SUPERSEDED PATCHES: NONE
SPECIAL INSTRUCTIONS: NONE
FULL DESCRIPTION:
PROBLEM: (77310) (PATCH ID: TCR160-041)
********
This patch fixes a problem where the Emulex Fibre Channel adapter was
not recognized by clu_ivp.
FILES:
./usr/opt/TCR160/sbin/clu_ivp
CHECKSUM: 60627 34
SUBSET: TCRCOMMON160
./usr/sbin/cluster/clu_ivp.sh,v RCS ID: 1.1.21.1
SUPPORT NOTES: NONE
----------------------------------------------------------
NEW PATCHID: 42.00
PATCH ID: TCR160-046
REQUIRED PATCHES: NONE
CONDITIONALLY REQUIRED PATCHES: NONE
SUPERSEDED PATCHES:
TCR160-008 (6.00),
TCR160-023 (15.00),
TCR160-044 (40.00)
SPECIAL INSTRUCTIONS: NONE
FULL DESCRIPTION:
PROBLEM: (QAR 70143, BCGM60LQH) (Patch ID: TCR160-008)
********
This patch corrects a problem in the TruCluster DLM subsystem in which
a node can panic with the panic string "convert_lock: bad lock state"
and the stack trace as follows:
0 stop_secondary_cpu()
1 panic()
2 event_timeout(func = 0xfffffc000028ee80, arg = 0xfffffc00008ad630)
3 xcpu_puts()
4 printf()
5 panic()
6 convert_lock()
7 dlm_convert()
8 syscall()
9 _Xsyscall()
PROBLEM: (DEKB70763) (Patch ID: TCR160-023)
********
This patch corrects a problem in the Distributed Lock Manager (DLM) in
the TruCluster Production Server product in which an error in the session
layer on one member can result in sending a corrupted DLM message to the
receiving member. The corruption in the packets will be random, however if
the dlm_checksum_msg sysconfigtab parameter is set to 1, the receiving
member will consistently panic with a panic string of
"dlm_process_message: corrupt message" when a corrupt DLM message
is received.
Some other panic strings that were seen are:
1) "rcv_cvt: wrong lock"
2) "rcv_resp: manage lock: bad lock state"
3) "rcv_cvt: lk_txid mismatch"
4) "rcv_resp: bad response status"
These indicate different corruptions in a DLM message.
PROBLEM: (72676) (PATCH ID: TCR160-044)
********
This patch fixes a problem that can cause a TruCluster member to panic
during shutdown. A sample stack trace might look like:
5 panic("Unaligned kernel space access from kernel mode")
6 afault_trap()
7 _XentUna()
8 is_last_detach_in_cluster()
9 dlm_resume_all()
10 rbld_do_step()
11 svr_rbld_do_step()
12 icssvr_daemon_from_pool()
PROBLEM: (ZPO039231, N/A) (PATCH ID: TCR160-046)
********
This patch fixes a bug where sometimes a certain shared sequence number will
not be freed after use. It also fixes a problem where certain processes
could get referenced several times.
FILES:
./usr/opt/TCR160/sys/dlm.mod
CHECKSUM: 43701 388
SUBSET: TCRMCA160
./kernel/dlm/dlm_lock.c,v RCS ID: 1.1.47.2
./kernel/dlm/dlm_msg.c,v RCS ID: 1.1.46.1
./kernel/dlm/dlm_rebuild.c,v RCS ID: 1.1.26.1
./kernel/dlm/dlm_ssn.c,v RCS ID: 1.1.19.1
./usr/opt/TCR160/sys/cnxagent.mod
CHECKSUM: 64379 61
SUBSET: TCRMCA160
./kernel/cnx/dlm_agent.c,v RCS ID: 1.1.19.1
SUPPORT NOTES: NONE
----------------------------------------------------------
NEW PATCHID: 61.00
PATCH ID: TCR160-054B
REQUIRED PATCHES:
TCR160-059 (59.00)
CONDITIONALLY REQUIRED PATCHES: NONE
SUPERSEDED PATCHES:
TCR160-009B (22.00),
TCR160-021B (23.00),
TCR160-022B (24.00),
TCR160-031B (25.00),
TCR160-036B (50.00),
TCR160-047B (51.00)
SPECIAL INSTRUCTIONS: NONE
FULL DESCRIPTION:
PROBLEM: (NONE) (Patch ID: TCR160-009)
********
This patch improves startup performance of start scripts. The improvement
is most likely not seen in small TCR environments. In large environments
with many services it will reduce the number of system calls to start the
services.
PROBLEM: (UVO106551) (Patch ID: TCR160-021)
********
This patch corrects a problem in which a member add will fail in
a large ASE environment.
PROBLEM: (BCSM81P5G) (Patch ID: TCR160-022)
********
This patch corrects a problem which causes asemgr to core dump with a
"Segmentation fault" when modifying a single drd service to add more than
200 devices.
The following is a representative stack trace:
DBX> t
> 0 db_free_DB(0x1200386fc, 0x1419aaa00, 0x120020e50, 0x14002e668, 0x1400078c0)
[0x120038380]
1 db_modify_group(0x11fffd7106d, 0x14000caf8, 0x11fffe190, 0x11fffe090, 0x0)
["../../../../../../src/usr/sbin/ase/asemgr/db_edit.c":2992, 0x120020e4c]
PROBLEM: (76524) (PATCH ID:)
********
This patch fixes an aseagent and asehsm segmentation fault in multi volume
NFS or Disk service configurations. The problem has been seen during ASE
startup.
PROBLEM: (71424) (PATCH ID: TCR160-036)
********
This patch fixes a problem with extraneous compiler warnings about
strdup() function calls from ASE.
PROBLEM: (73570) (PATCH ID: TCR160-047)
********
This patch fixes a problem that caused the asemgr utility to not run
when called from a program that is owned by root and has the setuid
bit turned on.
PROBLEM: (61554) (PATCH ID: TCR160-054)
********
This patch fixes three problems with the clu_ivp script. The script now
checks to be sure that the cluster members are listed in the /etc/hosts
file, and it no longer copies /var/adm/messages to /tmp. Copying the
messages file to /tmp could result in the filesystem becoming full, and
clu_ivp exiting with an error. The clu_ivp script now also checks the
/var/adm/messages file for shared busses if none are listed in the con-
figuration file.
FILES:
./usr/opt/TCR160/sbin/tractd
CHECKSUM: 58785 120
SUBSET: TCRCMS160
./usr/ccs/lib/libcnx/cnx_lib.c,v RCS ID: 1.1.15.1
./usr/sbin/ase/util/log.c,v RCS ID: 1.1.4.3
./usr/sbin/ase/util/util.c,v RCS ID: 1.1.7.7
./usr/opt/TCR160/sbin/postDevErr
CHECKSUM: 16274 528
SUBSET: TCRCMS160
./usr/ccs/lib/libcnx/cnx_lib.c,v RCS ID: 1.1.11.3
./usr/sbin/ase/util/log.c,v RCS ID: 1.1.4.3
./usr/sbin/ase/util/util.c,v RCS ID: 1.1.7.7
./usr/opt/TCR160/sbin/submon
CHECKSUM: 56623 712
SUBSET: TCRCMS160
./usr/ccs/lib/libcnx/cnx_lib.c,v RCS ID: 1.1.15.1
./usr/sbin/ase/asecdb/db_marshal.c,v RCS ID: 1.2.34.1
./usr/sbin/ase/dirCntl/directorCntl.c,v RCS ID: 1.2.39.1
./usr/sbin/ase/util/log.c,v RCS ID: 1.1.4.3
./usr/sbin/ase/util/log.c,v RCS ID: 1.2.14.2
./usr/sbin/ase/util/util.c,v RCS ID: 1.1.7.7
./usr/sbin/ase/util/util.c,v RCS ID: 1.2.40.6
./usr/opt/TCR160/sbin/cmonsvc
CHECKSUM: 29902 104
SUBSET: TCRCMS160
./usr/ccs/lib/libcnx/cnx_lib.c,v RCS ID: 1.1.15.1
./usr/sbin/ase/util/log.c,v RCS ID: 1.1.4.3
./usr/sbin/ase/util/util.c,v RCS ID: 1.1.7.7
SUPPORT NOTES: NONE
----------------------------------------------------------
NEW PATCHID: 67.00
PATCH ID: TCR160-054C
REQUIRED PATCHES:
TCR160-059 (59.00)
CONDITIONALLY REQUIRED PATCHES: NONE
SUPERSEDED PATCHES: NONE
SPECIAL INSTRUCTIONS: NONE
FULL DESCRIPTION:
PROBLEM: (61554) (PATCH ID: TCR160-054)
********
This patch fixes three problems with the clu_ivp script. The script now
checks to be sure that the cluster members are listed in the /etc/hosts
file, and it no longer copies /var/adm/messages to /tmp. Copying the
messages file to /tmp could result in the filesystem becoming full, and
clu_ivp exiting with an error. The clu_ivp script now also checks the
/var/adm/messages file for shared busses if none are listed in the con-
figuration file.
FILES:
./usr/opt/TCR160/sbin/cnxagentd
CHECKSUM: 28255 408
SUBSET: TCRDSVC160
./usr/ccs/lib/libcnx/cnx_lib.c,v RCS ID: 1.1.15.1
./usr/opt/TCR160/sbin/cnxshow
CHECKSUM: 04322 56
SUBSET: TCRDSVC160
./usr/ccs/lib/libcnx/cnx_lib.c,v RCS ID: 1.1.15.1
./usr/sbin/cnx/cnxshow.c,v RCS ID: 1.1.11.1
./usr/opt/TCR160/sbin/cnxmgrd
CHECKSUM: 29853 416
SUBSET: TCRDSVC160
./usr/ccs/lib/libcnx/cnx_lib.c,v RCS ID: 1.1.15.1
./usr/opt/TCR160/sbin/cnxset
CHECKSUM: 23577 56
SUBSET: TCRDSVC160
./usr/ccs/lib/libcnx/cnx_lib.c,v RCS ID: 1.1.15.1
./usr/opt/TCR160/sbin/cnxmond
CHECKSUM: 44621 424
SUBSET: TCRDSVC160
./usr/ccs/lib/libcnx/cnx_lib.c,v RCS ID: 1.1.15.1
./usr/opt/TCR160/sbin/cnxpingd
CHECKSUM: 16618 392
SUBSET: TCRDSVC160
./usr/ccs/lib/libcnx/cnx_lib.c,v RCS ID: 1.1.15.1
SUPPORT NOTES: NONE
----------------------------------------------------------
NEW PATCHID: 76.00
PATCH ID: TCR160-055
REQUIRED PATCHES: NONE
CONDITIONALLY REQUIRED PATCHES: NONE
SUPERSEDED PATCHES: NONE
SPECIAL INSTRUCTIONS: NONE
FULL DESCRIPTION:
PROBLEM: (MGO104139) (PATCH ID: TCR160-055)
********
This patch fixes a problem that could cause mountd to exit without error
during boot.
FILES:
./var/opt/TCR160/ase/sbin/nfs_mountd
CHECKSUM: 25699 5
SUBSET: TCRASE160
./usr/sbin/ase/asemgr/sh_bin/nfs_mountd.sh,v RCS ID: 1.2.16.1
SUPPORT NOTES: NONE
----------------------------------------------------------
NEW PATCHID: 70.00
PATCH ID: TCR160-056
REQUIRED PATCHES: NONE
CONDITIONALLY REQUIRED PATCHES: NONE
SUPERSEDED PATCHES:
TCR160-017 (11.00),
TCR160-027 (19.00),
TCR160-032 (26.00),
TCR160-062 (68.00)
SPECIAL INSTRUCTIONS: NONE
FULL DESCRIPTION:
PROBLEM: ('QAR 73648') (Patch ID: TCR160-017)
********
This patch fixes a problem where both nodes in a cluster will panic
at the same time with a simple_lock timeout panic.
PROBLEM: (QAR 75850) (Patch ID: TCR160-027)
********
This patch fixes a kernel memory fault in rm_lock_update_retry().
PROBLEM: (76634) (PATCH ID: TCR160-032)
********
This patch fixes a problem which can cause the following panic:
panic (cpu 0): rm_update_single_lock_miss: time limit exceeded
A sample stack trace would look like:
10 panic()
11 rm_crash_node_mask()
12 rm_panic()
13 rm_update_single_lock_miss()
14 rm_spinlk_update_request()
15 rm_lrail_int_ctx()
16 rm_lrail_int()
17 Mchan_isr()
18 intr_dispatch_no_post()
19 _XentInt()
20 rm_update_single_lock()
21 delete_RM_spinlock_memory()
PROBLEM: (80836) (PATCH ID: TCR160-062)
********
This patch fixes a problem that could cause an error to be returned when
the Cluster software should wait until a global lock is freed.
PROBLEM: (78079, DEK014491) (PATCH ID: TCR160-056)
********
This patch fixes a problem that could cause a TruCluster Production
server member to hang during boot, and can cause a "simple lock time
limit exceeded" panic.
FILES:
./usr/opt/TCR160/sys/rm.mod
CHECKSUM: 56675 166
SUBSET: TCRMCA160
./kernel/rm/rm_error.c,v RCS ID: 1.1.35.1
./kernel/rm/rm_kern.c,v RCS ID: 1.1.65.4
./kernel/rm/rm_kern_ass.s,v RCS ID: 1.1.27.3
SUPPORT NOTES: NONE
----------------------------------------------------------
NEW PATCHID: 59.00
PATCH ID: TCR160-059
REQUIRED PATCHES: NONE
CONDITIONALLY REQUIRED PATCHES:
TCR160-054B (61.00),
TCR160-054C (67.00)
SUPERSEDED PATCHES:
TCR160-002 (2.00),
TCR160-009A (9.00),
TCR160-016 (10.00),
TCR160-007 (5.00),
TCR160-021A (13.00),
TCR160-024 (16.00),
TCR160-025 (17.00),
TCR160-022A (14.00),
TCR160-033 (29.00),
TCR160-035 (31.00),
TCR160-042 (38.00),
TCR160-043 (39.00),
TCR160-051 (47.00),
TCR160-031A (21.00),
TCR160-053 (49.00),
TCR160-036A (32.00),
TCR160-047A (43.00),
TCR160-028 (27.00),
TCR160-052 (48.00),
TCR160-065 (52.00),
TCR160-066 (53.00),
TCR160-058 (54.00),
TCR160-060 (55.00),
TCR160-054A (56.00),
TCR160-057 (57.00)
SPECIAL INSTRUCTIONS: NONE
FULL DESCRIPTION:
PROBLEM: (UVO106363) (Patch ID: TCR160-002)
********
This patch fixes two problems in the asedirector. The first is an ASE command
timeout problem encountered by large ASE services. The second is an incorrect
decision made by the asedirector as a result of a failed inquire services
command.
1) The asedirector has static timeout values for some commands to
aseagent processes. Certain commands take a much longer time
to complete because they involve inquiring about large services.
As a result, large ASE services could encounter a premature timeout
on the following commands, as show in the daemon.log: ASE_STOP_ALL,
ASE_DELETE_ALL, ASE_ADD_ALL, ASE_DELETE_MEMBER, ASE_REVERT_DB.
This patch modifies these command timeouts relative to the ASE
service size eliminating this premature timeout.
2) When the asedirector inquires about the status of services on a
member, the command or the service inquiry may fail. In this rare
situation the director may incorrectly start a duplicate instance
of a service on another node.
This patch fixes this problem such that if the director receives a
failure, it will assume the service is running on that member. It
will then either stop that service before restarting it, or not start
it at all until it gets a correct response.
The most common reason for this problem to occur is due to a timeout
from the aseagent of a check action script for a service. A less
probable reason to occur is due to an asedirector timeout on the
ASE_INQ_SERVICES command. Both timeouts can be found in the daemon.log
file.
PROBLEM: (NONE) (Patch ID: TCR160-009)
********
This patch improves startup performance of start scripts. The
improvement is most likely not seen in small TCR environments. In
large environments with many services it will reduce the number of
system calls to start the services.
PROBLEM (BRO101102, STLQ45901) (Patch ID: TCR160-016)
This patch fixes a problem where the Host Status Monitor (asehsm)
incorrectly reports a network down (HSM_NI_STATUS DOWN) if the
counters for the network interface get zeroed.
PROBLEM: (BCGM41G5B) (Patch ID: TCR160-007)
********
This patch fixes a situation in which an aseagent could start to loop
and the ASE service would not be sucessful relocated. The problem was
only seen in a rare sitatution with many devices and extremely long
start/stop scripts.
PROBLEM: (UVO106551) (Patch ID: TCR160-021)
********
This patch corrects a problem in which a member add will fail in
a large ASE environment.
PROBLEM: (BCGM814X8) (Patch ID: TCR160-024)
********
This patch corrects a problem with TruCluster Available Server or Production
Server cluster in which services have been started with elevated priority
and scheduling algorithm. Under significant load this could lead to
intermittent network and cluster problems.
In order to see this behavior, the customer would have to have
changed the PRIOPT variable in /sbin/init.d/asemember from "-p hsm" to
"-p all" so that the aseagent would be started with round-robin scheduling
policy.
PROBLEM: ('EVT102865, QAR74640') (Patch ID: TCR160-025)
********
This patch fixes a problem which caused a service not to start when
there was a short network failure. asemgr would report the service as
running on one node, but the service was just stopped and never restarted
or relocated. This was seen only with long running stop scripts (i.e.
Oracle shutdown) and with multiple network interfaces configured.
The ni_status_awk had to be modified so that a failure of a single network
adapter caused a service relocation. This patch makes sure that the services
gets relocated or restarted based on the configured ASP.
PROBLEM: (BCSM81P5G) (Patch ID: TCR160-022)
********
This patch corrects a problem which causes asemgr to core dump with a
"Segmentation fault" when modifying a single drd service to add more than
200 devices.
The following is a representative stack trace:
DBX> t
> 0 db_free_DB(0x1200386fc, 0x1419aaa00, 0x120020e50, 0x14002e668, 0x1400078c0)
[0x120038380]
1 db_modify_group(0x11fffd7106d, 0x14000caf8, 0x11fffe190, 0x11fffe090, 0x0)
["../../../../../../src/usr/sbin/ase/asemgr/db_edit.c":2992, 0x120020e4c]
PROBLEM: (76524) (PATCH ID: TCR160-031)
********
This patch fixes an aseagent and asehsm segmentation fault in multi volume
NFS or Disk service configurations. The problem has been seen during ASE
startup.
PROBLEM: (69889) (PATCH ID: TCR160-033)
********
This patch fixes a problem where the asemgr will
hang as it continuously create and kill multiple directors
The problem occurs because the message queue management
assumes that messages are enqueued in the same order as
the events they report. The fix is to discard the message
if it has been dequeued after the host from which it came from
goes down and if the associated channel structure has already
been freed.
PROBLEM: (70239) (PATCH ID: TCR160-035)
********
This patch corrects a problem that causes the ASE director to core dump
during initialization.
PROBLEM: (TBD) (PATCH ID: TCR160-042)
********
This patch corrects a problem where modifying a service will fail under the
following conditions:
- The service is a DRD service.
- You are adding more DRDs.
- The system-wide per-process data size is too small
A message similar to the following will be seen in the daemon.log:
Mar 6 14:58:22 mulder ASE: muldermc AseMgr ***ALERT: Could not malloc
Mar 6 14:58:22 mulder ASE: muldermc AseMgr Error: Out of memory loading
Database.
Mar 6 14:58:22 mulder ASE: muldermc AseMgr ***ALERT: BUG NOTICE: Exit before
finishing unmarshal_tree
The asemgr may also core dump.
PROBLEM: (BCPMA2116, N/A) (PATCH ID: TCR160-043)
********
This patch fixes a problem where the MEMBER_STATE variable always is shown as
BOOTING instead of RUNNING. After first installing TCR, there is no way to
have scripts know the MEMBER_STATE. This problem is cleared on a reboot.
PROBLEM: (KAOQ34551) (PATCH ID: TCR160-051)
********
If a network cable failure on a monitored network is corrected in less than
7 seconds, the services could be left in a state where ASE says they are
running, but they really aren't.
PROBLEM: (HPAQ21V5C) (PATCH ID: TCR160-053)
********
This patch fixes a problem that caused the asemgr to get a memory fault
when adding multiple services in a row.
PROBLEM: (71424) (PATCH ID: TCR160-036)
********
This patch fixes a problem with extraneous compiler warnings about
strdup() function calls from ASE.
PROBLEM: (73570) (PATCH ID: TCR160-047)
********
This patch fixes a problem that caused the asemgr utility to not run
when called from a program that is owned by root and has the setuid
bit turned on.
PROBLEM: (BCSM81HH7) (PATCH ID: TCR160-028)
********
This patch fixes a problem that can cause the Cluster MIB daemon (cnxmibd)
to core dump in Available Server environments.
PROBLEM: (BCGM31BBV1) (PATCH ID: TCR160-052)
********
This patch fixes a problem which caused an error message to be logged for
the cnxmibd even though no error had occurred. The error message was:
**ERROR cnxmib_mthd.c line 855: initDirectorCntl failed!
PROBLEM: (EVT256426, N/A) (PATCH ID: TCR160-065)
********
This patch fixes two similar bugs. The first is that when one member of a
cluster is brought up with ASE off, other members report it as UP and RUNNING
instead of UP and UNKNOWN. The second is that when a restricted service is
running on a member, and 'asemember stop' and 'aseam stop' is executed, the
service status is still reported as the member name, instead of Unassigned.
PROBLEM: (70238) (PATCH ID: TCR160-066)
********
This patch fixes a problem where timeout values of greater than 30 seconds
in /etc/hsm.conf would cause ASE agent to fail at start up.
PROBLEM: (HPAQ40728, N/A) (PATCH ID: TCR160-058)
********
This patch fixes a bug where the aseagent will occasionally core dump on a
SCSI bus hang. While there is no expected behavior during a hang, the aseagent
should not core dump.
PROBLEM: (74548) (PATCH ID: TCR160-060)
********
This patch fixes a problem that caused the asemgr to report the wrong status
for a service. When a device path failure occurs, the ASE director attempts
to restart the service on another member system. If the director can't find
another member that can run the service, it reported an error, but did not
change the status. This meant that the asemgr would report that the service
was still running on the original member, when in fact the status should have
been "unassigned."
PROBLEM: (61554) (PATCH ID: TCR160-054)
********
This patch fixes three problems with the clu_ivp script. The script now
checks to be sure that the cluster members are listed in the /etc/hosts
file, and it no longer copies /var/adm/messages to /tmp. Copying the
messages file to /tmp could result in the filesystem becoming full, and
clu_ivp exiting with an error. The clu_ivp script now also checks the
/var/adm/messages file for shared busses if none are listed in the con-
figuration file.
PROBLEM: (69874) (PATCH ID: TCR160-057)
********
This patch fixes a problem that could cause the asedirector to core dump.
PROBLEM: (74383) (PATCH ID: TCR160-059)
********
This patch fixes a problem that caused the asemgr to report that a disk,
or mount point, was in multiple services when modifying a service name.
FILES:
./usr/opt/TCR160/sbin/asemgr
CHECKSUM: 36707 872
SUBSET: TCRASE160
./usr/ccs/lib/libcnx/cnx_lib.c,v RCS ID: 1.1.15.1
./usr/sbin/ase/agent/init.c,v RCS ID: 1.1.2.2
./usr/sbin/ase/asecdb/db_marshal.c,v RCS ID: 1.2.34.1
./usr/sbin/ase/asemgr/asemgr.c,v RCS ID: 1.2.38.1
./usr/sbin/ase/asemgr/db_edit.c,v RCS ID: 1.2.91.1
./usr/sbin/ase/asemgr/db_mgr_io.c,v RCS ID: 1.2.31.1
./usr/sbin/ase/asemgr/db_util.c,v RCS ID: 1.2.27.1
./usr/sbin/ase/asemgr/db_verify.c,v RCS ID: 1.2.28.2
./usr/sbin/ase/dirCntl/directorCntl.c,v RCS ID: 1.2.39.1
./usr/sbin/ase/director/init.c,v RCS ID: 1.1.2.2
./usr/sbin/ase/msgsvc/msgSvc.c,v RCS ID: 1.2.32.1
./usr/sbin/ase/util/log.c,v RCS ID: 1.2.14.2
./usr/sbin/ase/util/util.c,v RCS ID: 1.2.40.6
./usr/opt/TCR160/sbin/asehsm
CHECKSUM: 55245 688
SUBSET: TCRASE160
./usr/ccs/lib/libcnx/cnx_lib.c,v RCS ID: 1.1.15.1
./usr/sbin/ase/agent/main.c,v RCS ID: 1.2.26.3
./usr/sbin/ase/asecdb/db_marshal.c,v RCS ID: 1.2.34.1
./usr/sbin/ase/hsm/host_monitor.c,v RCS ID: 1.2.21.1
./usr/sbin/ase/hsm/nit_cntrs.c,v RCS ID: 1.2.24.1
./usr/sbin/ase/msgsvc/msgSvc.c,v RCS ID: 1.2.32.1
./usr/sbin/ase/util/log.c,v RCS ID: 1.2.14.2
./usr/sbin/ase/util/rtmemlock.c,v RCS ID: 1.1.6.1
./usr/sbin/ase/util/util.c,v RCS ID: 1.2.40.6
./usr/opt/TCR160/sbin/asehelp
CHECKSUM: 36707 872
SUBSET: TCRASE160
./usr/ccs/lib/libcnx/cnx_lib.c,v RCS ID: 1.1.15.1
./usr/sbin/ase/agent/init.c,v RCS ID: 1.1.2.2
./usr/sbin/ase/asecdb/db_marshal.c,v RCS ID: 1.2.34.1
./usr/sbin/ase/asemgr/asemgr.c,v RCS ID: 1.2.38.1
./usr/sbin/ase/asemgr/db_edit.c,v RCS ID: 1.2.91.1
./usr/sbin/ase/asemgr/db_mgr_io.c,v RCS ID: 1.2.31.1
./usr/sbin/ase/asemgr/db_util.c,v RCS ID: 1.2.27.1
./usr/sbin/ase/asemgr/db_verify.c,v RCS ID: 1.2.28.2
./usr/sbin/ase/dirCntl/directorCntl.c,v RCS ID: 1.2.39.1
./usr/sbin/ase/director/init.c,v RCS ID: 1.1.2.2
./usr/sbin/ase/msgsvc/msgSvc.c,v RCS ID: 1.2.32.1
./usr/sbin/ase/util/log.c,v RCS ID: 1.2.14.2
./usr/sbin/ase/util/util.c,v RCS ID: 1.2.40.6
./usr/opt/TCR160/sbin/asepurgenfs
CHECKSUM: 00831 160
SUBSET: TCRASE160
./usr/ccs/lib/libcnx/cnx_lib.c,v RCS ID: 1.1.11.3
./usr/sbin/ase/asecdb/db_marshal.c,v RCS ID: 1.2.34.1
./usr/sbin/ase/msgsvc/msgSvc.c,v RCS ID: 1.2.32.1
./usr/sbin/ase/util/log.c,v RCS ID: 1.2.14.2
./usr/sbin/ase/util/util.c,v RCS ID: 1.2.40.6
./usr/opt/TCR160/sbin/snd
CHECKSUM: 55444 576
SUBSET: TCRASE160
./usr/ccs/lib/libcnx/cnx_lib.c,v RCS ID: 1.1.11.3
./usr/sbin/ase/asecdb/db_marshal.c,v RCS ID: 1.2.34.1
./usr/sbin/ase/msgsvc/msgSvc.c,v RCS ID: 1.2.32.1
./usr/sbin/ase/util/log.c,v RCS ID: 1.2.14.2
./usr/sbin/ase/util/util.c,v RCS ID: 1.2.40.6
./usr/opt/TCR160/sbin/cnxmibd
CHECKSUM: 20402 232
SUBSET: TCRASE160
./usr/ccs/lib/libcnx/cnx_lib.c,v RCS ID: 1.1.15.1
./usr/sbin/ase/asecdb/db_marshal.c,v RCS ID: 1.2.34.1
./usr/sbin/ase/dirCntl/directorCntl.c,v RCS ID: 1.2.39.1
./usr/sbin/ase/msgsvc/msgSvc.c,v RCS ID: 1.2.32.1
./usr/sbin/ase/util/log.c,v RCS ID: 1.2.14.2
./usr/sbin/ase/util/util.c,v RCS ID: 1.2.40.6
./usr/sbin/cnx/cnxmib_mthd.c,v RCS ID: 1.1.8.2
./usr/opt/TCR160/sbin/aseagent
CHECKSUM: 59910 760
SUBSET: TCRASE160
./usr/ccs/lib/libcnx/cnx_lib.c,v RCS ID: 1.1.15.1
./usr/sbin/ase/agent/amMgr.c,v RCS ID: 1.2.42.1
./usr/sbin/ase/agent/envMgr.c,v RCS ID: 1.2.53.3
./usr/sbin/ase/agent/init.c,v RCS ID: 1.2.34.3
./usr/sbin/ase/agent/main.c,v RCS ID: 1.2.37.2
./usr/sbin/ase/agent/svcMgr.c,v RCS ID: 1.2.58.1
./usr/sbin/ase/asecdb/db_marshal.c,v RCS ID: 1.2.34.1
./usr/sbin/ase/director/init.c,v RCS ID: 1.2.34.3
./usr/sbin/ase/msgsvc/msgSvc.c,v RCS ID: 1.2.32.1
./usr/sbin/ase/util/log.c,v RCS ID: 1.2.14.2
./usr/sbin/ase/util/rtmemlock.c,v RCS ID: 1.1.6.1
./usr/sbin/ase/util/util.c,v RCS ID: 1.2.40.6
./usr/opt/TCR160/sbin/asesetup
CHECKSUM: 36707 872
SUBSET: TCRASE160
./usr/ccs/lib/libcnx/cnx_lib.c,v RCS ID: 1.1.15.1
./usr/sbin/ase/agent/init.c,v RCS ID: 1.1.2.2
./usr/sbin/ase/asecdb/db_marshal.c,v RCS ID: 1.2.34.1
./usr/sbin/ase/asemgr/asemgr.c,v RCS ID: 1.2.38.1
./usr/sbin/ase/asemgr/db_edit.c,v RCS ID: 1.2.91.1
./usr/sbin/ase/asemgr/db_mgr_io.c,v RCS ID: 1.2.31.1
./usr/sbin/ase/asemgr/db_util.c,v RCS ID: 1.2.27.1
./usr/sbin/ase/asemgr/db_verify.c,v RCS ID: 1.2.28.2
./usr/sbin/ase/dirCntl/directorCntl.c,v RCS ID: 1.2.39.1
./usr/sbin/ase/director/init.c,v RCS ID: 1.1.2.2
./usr/sbin/ase/msgsvc/msgSvc.c,v RCS ID: 1.2.32.1
./usr/sbin/ase/util/log.c,v RCS ID: 1.2.14.2
./usr/sbin/ase/util/util.c,v RCS ID: 1.2.40.6
./usr/opt/TCR160/sbin/asedirector
CHECKSUM: 16219 688
SUBSET: TCRASE160
./usr/ccs/lib/libcnx/cnx_lib.c,v RCS ID: 1.1.15.1
./usr/sbin/ase/asecdb/db_marshal.c,v RCS ID: 1.2.34.1
./usr/sbin/ase/director/dirUtil.c,v RCS ID: 1.2.21.2
./usr/sbin/ase/director/director.c,v RCS ID: 1.2.24.3
./usr/sbin/ase/director/eventCntl.c,v RCS ID: 1.2.28.2
./usr/sbin/ase/director/eventMgr.c,v RCS ID: 1.2.52.3
./usr/sbin/ase/director/strategist.c,v RCS ID: 1.2.34.3
./usr/sbin/ase/msgsvc/msgSvc.c,v RCS ID: 1.2.32.1
./usr/sbin/ase/util/log.c,v RCS ID: 1.2.14.2
./usr/sbin/ase/util/rtmemlock.c,v RCS ID: 1.1.6.1
./usr/sbin/ase/util/util.c,v RCS ID: 1.2.40.6
./usr/opt/TCR160/sbin/aselogger
CHECKSUM: 32889 520
SUBSET: TCRASE160
./usr/ccs/lib/libcnx/cnx_lib.c,v RCS ID: 1.1.15.1
./usr/sbin/ase/asecdb/db_marshal.c,v RCS ID: 1.2.34.1
./usr/sbin/ase/msgsvc/msgSvc.c,v RCS ID: 1.2.32.1
./usr/sbin/ase/util/log.c,v RCS ID: 1.2.14.2
./usr/sbin/ase/util/util.c,v RCS ID: 1.2.40.6
./usr/opt/TCR160/sbin/asedit
CHECKSUM: 43567 544
SUBSET: TCRASE160
./usr/ccs/lib/libcnx/cnx_lib.c,v RCS ID: 1.1.11.3
./usr/sbin/ase/agent/init.c,v RCS ID: 1.1.2.2
./usr/sbin/ase/asecdb/db_marshal.c,v RCS ID: 1.2.34.1
./usr/sbin/ase/asemgr/db_util.c,v RCS ID: 1.2.27.1
./usr/sbin/ase/director/init.c,v RCS ID: 1.1.2.2
./usr/sbin/ase/msgsvc/msgSvc.c,v RCS ID: 1.2.32.1
./usr/sbin/ase/util/log.c,v RCS ID: 1.2.14.2
./usr/sbin/ase/util/util.c,v RCS ID: 1.2.40.6
SUPPORT NOTES: NONE
----------------------------------------------------------
NEW PATCHID: 74.00
PATCH ID: TCR160-061
REQUIRED PATCHES: NONE
CONDITIONALLY REQUIRED PATCHES: NONE
SUPERSEDED PATCHES:
TCR160-045 (41.00),
TCR160-048 (44.00),
TCR160-049 (45.00)
SPECIAL INSTRUCTIONS: NONE
FULL DESCRIPTION:
PROBLEM: (78166) (PATCH ID: TCR160-045)
********
This patch fixes a problem that caused the setting of the "force unmount"
option to be incorrectly displayed by the asemgr utility.
PROBLEM: (72984) (PATCH ID: TCR160-048)
********
This patch fixes a problem that caused shell errors if an invalid mount
option was specified via the asemgr menu.
PROBLEM: (72983) (PATCH ID: TCR160-049)
********
This patch fixes a problem that caused the device name for a Unix File
System (UFS) to not be displayed when modifying the "force unmount"
option via the asemgr utility.
PROBLEM: (78794) (PATCH ID: TCR160-061)
********
This patch fixes a problem that caused the access mode for a directory to
not get set to the default after modifying them via asemgr.
FILES:
./var/opt/TCR160/ase/sbin/ufs_modify
CHECKSUM: 57547 22
SUBSET: TCRASE160
./usr/sbin/ase/asemgr/sh_bin/ufs_modify.sh,v RCS ID: 1.2.31.3
./var/opt/TCR160/ase/sbin/advfs_modify
CHECKSUM: 12447 19
SUBSET: TCRASE160
./usr/sbin/ase/asemgr/sh_bin/advfs_modify.sh,v RCS ID: 1.2.34.3
SUPPORT NOTES: NONE
----------------------------------------------------------
NEW PATCHID: 65.00
PATCH ID: TCR160-063
REQUIRED PATCHES: NONE
CONDITIONALLY REQUIRED PATCHES: NONE
SUPERSEDED PATCHES:
TCR160-003 (3.00)
SPECIAL INSTRUCTIONS: NONE
FULL DESCRIPTION:
PROBLEM: (None) (Patch ID: TCR160-003)
********
This patch fixes a problem where DRD permissions could be lost if a service
is modified more than once. In V1.6 new functionality was added to allow
the setting of the mode, owner and group of DRD devices by invoking the
asemgr utility to modify the DRD service. If, after DRD permissions have
been set, the service is modified again these DRD permissions could be lost.
This problem has been solved in this patch.
PROBLEM: (80450) (PATCH ID: TCR160-063)
********
This patch fixes a problem that prevented the removal of LSM volumes from
a DRD service. The problem occurs when there are multiple LSM diskgroups
in the service, and all of the volumes from one diskgroup were removed.
The asemgr prints the following error message:
*** `PD_svcname:/dev/rzb16g` is duplicate node.
and the removal of the volumes fails. In this case, the physical disk was
part of the diskgroup that was being deleted.
FILES:
./var/opt/TCR160/ase/sbin/drd_modify
CHECKSUM: 13540 31
SUBSET: TCRDSVC160
./usr/sbin/ase/asemgr/sh_bin/drd_modify.sh,v RCS ID: 1.1.31.3
SUPPORT NOTES: NONE
----------------------------------------------------------
NEW PATCHID: 63.00
PATCH ID: TCR160-064
REQUIRED PATCHES: NONE
CONDITIONALLY REQUIRED PATCHES: NONE
SUPERSEDED PATCHES:
TCR160-029 (20.00),
TCR160-050 (46.00)
SPECIAL INSTRUCTIONS: NONE
FULL DESCRIPTION:
PROBLEM: (CFS.68084) (Patch ID: TCR160-029)
********
If two nodes in a cluster are communicating using the mc-api, for example
running an MPI application, and a third node, not involved in the
calculation, is re-booted then the first two nodes can hang requiring a
re-boot to resolve the hang.
When a node enters or leaves the cluster (boots or shutsdown) the Memory
Channel failover code is invoked. The problem was that the failover code
was attempting to take a high level lock which under certain circumstances
was held by another process and so the mc-api failover code would
wait forever in kernel mode resulting in a system hang. The problem was
fixed by changing mc-api failover take the lower level lock.
PROBLEM: (76608, 76806) (PATCH ID: TCR160-050)
********
This patch fixes a problem that can cause a panic in mcs_wait_cluster_event()
when using the Memory Channel API. The following is an example stack trace
from a lockmode=4 panic:
0 boot()
1 panic()
2 simple_lock_fault()
3 simple_unlock_count_violation()
4 mcs_wait_cluster_event()
5 mcs_configure()
6 kmodcall()
7 syscall()
8 _Xsyscall()
PROBLEM: (CFS.76473) (PATCH ID: TCR160-064)
********
This patch fixes a problem with the Memory Channel API whereby a node
crashes holding an mc-api lock, under certain circumstances the lock
will not be released after the node crashes. For the problem to occur there
must be 3 or more nodes in the cluster and the node handling the cleanup
after a node crashes (known as the primary mapper) does not have the lock
allocated.
FILES:
./usr/opt/TCR160/sys/mcs.mod
CHECKSUM: 08235 263
SUBSET: TCRMCA160
./kernel/rm/pmcs/mcs_exit.c,v RCS ID: 1.1.23.1
./kernel/rm/pmcs/mcs_failover.c,v RCS ID: 1.1.21.2
./kernel/rm/pmcs/mcs_utils.c,v RCS ID: 1.1.18.1
SUPPORT NOTES: NONE
----------------------------------------------------------
NEW PATCHID: 72.00
PATCH ID: TCR160-067
REQUIRED PATCHES: NONE
CONDITIONALLY REQUIRED PATCHES: NONE
SUPERSEDED PATCHES: NONE
SPECIAL INSTRUCTIONS: NONE
FULL DESCRIPTION:
PROBLEM: (81866) (PATCH ID: TCR160-067)
********
This patch fixes a problem that caused an error message to be printed if
the system contained unsupported controllers. The error message will now
only be printed when running the command in verbose mode.
FILES:
./usr/opt/TCR160/sbin/drd_dma
CHECKSUM: 28741 48
SUBSET: TCRDSVC160
./usr/sbin/drd_dma/drd_dma.c,v RCS ID: 1.1.4.1
SUPPORT NOTES: NONE
This patch can be found at any of these sites:
Colorado Site
Georgia Site
Files on this server are as follows:
itsec_cert_kit_t64v40g.README
itsec_cert_kit_t64v40g.CHKSUM
itsec_cert_kit_t64v40g.tar
itsec_cert_kit_t64v40g_releasenotes.pdf
|