SEARCH CONTACT US SUPPORT SERVICES PRODUCTS STORE
United States    
COMPAQ STORE | PRODUCTS | SERVICES | SUPPORT | CONTACT US | SEARCH
gears
compaq support options
support home
software & drivers
ask Compaq
reference library
support forum
frequently asked questions
support tools
warranty information
service centers
contact support
product resources
parts for your system
give us feedback
associated links
.
} what's new
.
} contract access
.
} browse patch tree
.
} search patches
.
} join mailing list
.
} feedback
.
patches by topic
.
} DOS
.
} OpenVMS
.
} Security
.
} Tru64 Unix
.
} Ultrix 32
.
} Windows
.
} Windows NT
.
connection tools
.
} nameserver lookup
.
} traceroute
.
} ping
Tru64 UNIX V4.0G ITSEC Certification Patch Kit

TITLE: Tru64 UNIX V4.0G ITSEC Certification Patch Kit New Kit Date: 01-MAY-2001 Modification Date: Not Applicable Modification Type: New Kit This package provides patches for Version 4.0G of the Tru64 UNIX operating system. Applying these patches to Tru64 UNIX V4.0G and configuring the system as described in the Evaluated Configuration Guide found at www.tru64unix.compaq.com/faqs/publications/best_practices/ produces the ITSEC-certified evaluated release of the Tru64 UNIX operating system used for the ITSEC E2 evaluation. This configuration may be of interest only to users who are required to exactly replicate the environment under which the ITSEC E2 certification was granted. Note that this kit is based on Patch Kit 2 for V4.0G. Patches contained in this kit may be superceded in later Patch Kits. Install the Tru64 UNIX patches using dupatch, an installation utility based on the setld command. The installation instructions are included with each kit. BEFORE INSTALLING THE OPERATING SYSTEM PATCHES Before installing the patches for your operating system, perform the following tasks: 1. ftp the .tar file to your site and validate that the checksums, MD5 and SHA1 values have not changed. The Patch Kit Installation Instructions document provides step-by-step instructions for installing patches. This document is available in both the ./pdf and ./htm directories. 2. Print the Patch Summary and Release Notes and the Patch Kit Installation Instructions documents. 3. Familiarize yourself with the Patch Summary and Release Notes and the Patch Kit Installation Instructions documents before beginning the installation procedure. MD5, SHA1 and sum checksum values for ITSEC_cert_kit for V4.0G -------------------------------------------------------------- 9070810153cb3262887a59885eb83a38 ITSEC_cert_kit_T64V40G.README MD5 b98ab895b495a27e0632a306487c8bbd8f504e4a ITSEC_cert_kit_T64V40G.README SHA1 40408 2 ITSEC_cert_kit_T64V40G.README SUM 325956a3bb61a58937f5f4b9b3363c67 ITSEC_cert_kit_T64V40G.tar MD5 839bf1fee4a38c4f785a391f3dd59d38333bb208 ITSEC_cert_kit_T64V40G.tar SHA1 05001 53930 ITSEC_cert_kit_T64V40G.tar SUM 26f52e515e4c836a96f0a677546e6851 ITSEC_cert_kit_T64V40G.toc MD5 e43a4cb05a220cdc32423821a8abf0d47a6953b9 ITSEC_cert_kit_T64V40G.toc SHA1 10486 156 ITSEC_cert_kit_T64V40G.toc SUM ea32956b6a4aabffc184b7438bb2c965 ITSEC_cert_kit_T64V40G_ReleaseNotes.pdf MD5 beb3756c0502faa452c4dbd85d4f0e03938b2c36 ITSEC_cert_kit_T64V40G_ReleaseNotes.pd 42907 84 ITSEC_cert_kit_T64V40G_ReleaseNotes.pdf SUM 4176182ab3d7853efd2235e6bf0b9e30 ITSEC_cert_kit_T64V40G_ReleaseNotes.txt MD5 7b582f728ab1e0227f01b94ad446311e50cf5d35 ITSEC_cert_kit_T64V40G_ReleaseNotes.tx 05452 128 ITSEC_cert_kit_T64V40G_ReleaseNotes.txt SUM PATCH KIT NAME: T64V40GAS0002-20010111 ---------------------------------------------------------- NEW PATCHID: 33.00 PATCH ID: OSF445-003 REQUIRED PATCHES: NONE CONDITIONALLY REQUIRED PATCHES: NONE SUPERSEDED PATCHES: NONE SPECIAL INSTRUCTIONS: NONE FULL DESCRIPTION: PROBLEM: (77036) (PATCH ID: OSF445-003) ******** While running Classical IP over the lfa ATM driver, a kernel panic will occur "simple_lock: minimum spl violation" if the following conditions are true: 1) The lfa driver is configured to use deferred interrupt processing (driver attribute "minimal_isr" is set to 1). Note: This is the default for the V1.0.17 driver. 2) lockmode 4 is being employed (generic attribute "lockmode" set to 4). On systems where lockmode 4 is not employed, a cpu would hang instead. FILES: ./sys/BINARY/atmip.mod CHECKSUM: 05002 242 SUBSET: OSFATMBIN445 ./kernel/netinet/atm/atm_arp.c,v RCS ID: 1.1.105.1 ./kernel/netinet/atm/ip_converge.c,v RCS ID: 1.1.98.1 SUPPORT NOTES: NONE ---------------------------------------------------------- NEW PATCHID: 64.00 PATCH ID: OSF445-006 REQUIRED PATCHES: NONE CONDITIONALLY REQUIRED PATCHES: NONE SUPERSEDED PATCHES: NONE SPECIAL INSTRUCTIONS: NONE FULL DESCRIPTION: PROBLEM: (MGO11678A) (PATCH ID: OSF445-006) ******** This patch fixes a kernel memory fault when using ATM. The stack trace will contain the following components: trap _XentMM prf printf atm_cmm_st_null_icp atm_cmm_progress_con atm_cmm_new_call FILES: ./sys/BINARY/atm.mod CHECKSUM: 15243 286 SUBSET: OSFATMBIN445 ./kernel/atm/cmm/cmm_state.c,v RCS ID: 1.1.17.1 SUPPORT NOTES: NONE ---------------------------------------------------------- NEW PATCHID: 73.00 PATCH ID: OSF445-007 REQUIRED PATCHES: NONE CONDITIONALLY REQUIRED PATCHES: NONE SUPERSEDED PATCHES: OSF445-005 (55.00) SPECIAL INSTRUCTIONS: NONE FULL DESCRIPTION: PROBLEM: (BCPMB215Q) (PATCH ID: OSF445-005) ******** This patch fixes a kernel memory fault in VMAC code if_addnewaddr(). The fault will occur from ifconfig(8) and the stack will include: _XentMM bcmp if_addnewaddr ifioctl soo_ioctl ioctl_base ioctl syscall PROBLEM: (UVO74098) (PATCH ID: OSF445-007) ******** This patch adds a fix to VMAC functionality when used with NETrain. FILES: ./sys/BINARY/ether.mod CHECKSUM: 29239 129 SUBSET: OSFBIN445 ./kernel/net/if_ethersubr.c,v RCS ID: 4.4.169.2 ./kernel/netinet/if_ether.c,v RCS ID: 4.3.113.1 SUPPORT NOTES: NONE ---------------------------------------------------------- NEW PATCHID: 19.00 PATCH ID: OSF445-014 REQUIRED PATCHES: NONE CONDITIONALLY REQUIRED PATCHES: NONE SUPERSEDED PATCHES: NONE SPECIAL INSTRUCTIONS: NONE FULL DESCRIPTION: PROBLEM: (66403) (PATCH ID: OSF445-014) ******** This patch fixes a problem with the find command. Find fails to show filenames that start with a period. FILES: ./sbin/find CHECKSUM: 63179 48 SUBSET: OSFBASE445 ./usr/bin/find/find.c,v RCS ID: 4.3.84.1 ./usr/bin/find CHECKSUM: 55326 48 SUBSET: OSFBASE445 ./usr/bin/find/find.c,v RCS ID: 4.3.84.1 SUPPORT NOTES: NONE ---------------------------------------------------------- NEW PATCHID: 20.00 PATCH ID: OSF445-015 REQUIRED PATCHES: NONE CONDITIONALLY REQUIRED PATCHES: NONE SUPERSEDED PATCHES: NONE SPECIAL INSTRUCTIONS: NONE FULL DESCRIPTION: PROBLEM: (TKTBC0035, 78015) (PATCH ID: OSF445-015) ******** This patch fixes a problem where the operating system only looks in slot 0 for the primary CPU when in console mode. This can be seen when examining the binary.errlog with the DECevent utility. On a EV6 CPU system, DECevent displays the text in an incorrect format that translates to an EV5 CPU. FILES: ./sys/BINARY/arch_alpha.mod CHECKSUM: 42329 498 SUBSET: OSFHWBIN445 ./kernel/arch/alpha/machdep.c,v RCS ID: 1.2.438.1 SUPPORT NOTES: NONE ---------------------------------------------------------- NEW PATCHID: 24.00 PATCH ID: OSF445-019 REQUIRED PATCHES: NONE CONDITIONALLY REQUIRED PATCHES: NONE SUPERSEDED PATCHES: OSF445-011 (16.00) SPECIAL INSTRUCTIONS: NONE FULL DESCRIPTION: PROBLEM: (71646, 46891) (PATCH ID: OSF445-011) ******** This patch fixes a problem in ksh. When the current working directory is / and the command 'cd ..' is entered, the following error message is displayed: ksh: ..: bad directory PROBLEM: (76587, 52442) (PATCH ID: OSF445-019) ******** This patch fixes a problem in ksh in which a space after the -p switch would cause the command to fail. FILES: ./usr/bin/ksh CHECKSUM: 57106 264 SUBSET: OSFBASE445 ./usr/bin/ksh/args.c,v RCS ID: 4.2.16.1 ./usr/bin/ksh/cannon.c,v RCS ID: 1.1.17.1 ./usr/bin/posix/sh CHECKSUM: 57106 264 SUBSET: OSFBASE445 ./usr/bin/ksh/args.c,v RCS ID: 4.2.16.1 ./usr/bin/ksh/cannon.c,v RCS ID: 1.1.17.1 SUPPORT NOTES: NONE ---------------------------------------------------------- NEW PATCHID: 26.00 PATCH ID: OSF445-021 REQUIRED PATCHES: NONE CONDITIONALLY REQUIRED PATCHES: NONE SUPERSEDED PATCHES: NONE SPECIAL INSTRUCTIONS: NONE FULL DESCRIPTION: PROBLEM: (77869, HPAQ10H2Z, HPAQB17ND, KAOQC2623, HPAQ20CBK) (PATCH ID: OSF445-021) ******** This patch fixes a problem in which the restore command can fail with the following error: "Cannot malloc space for property list" FILES: ./usr/sbin/restore CHECKSUM: 25747 104 SUBSET: OSFHWBASE445 ./usr/sbin/restore/tape.c,v RCS ID: 4.2.74.1 ./usr/sbin/rrestore CHECKSUM: 64550 104 SUBSET: OSFCLINET445 ./usr/sbin/restore/tape.c,v RCS ID: 4.2.74.1 ./sbin/restore CHECKSUM: 59135 104 SUBSET: OSFHWBASE445 ./usr/sbin/restore/tape.c,v RCS ID: 4.2.74.1 SUPPORT NOTES: NONE ---------------------------------------------------------- NEW PATCHID: 28.00 PATCH ID: OSF445-024A REQUIRED PATCHES: NONE CONDITIONALLY REQUIRED PATCHES: OSF445-024B (87.00) SUPERSEDED PATCHES: NONE SPECIAL INSTRUCTIONS: NONE FULL DESCRIPTION: PROBLEM: (ISV-2-120, 79010, 76571) (PATCH ID: OSF445-024) ******** Code which called the stime() function would not compile under C++ and other strict compilation environments, unless the user supplied their own stime() declaration. This would show up as compilation errors or runtime errors if an incorrect prototype was supplied by the user. FILES: ./usr/sys/include/sys/time.h CHECKSUM: 52598 9 SUBSET: OSFBINCOM445 ./kernel/sys/time.h,v RCS ID: 4.4.71.1 SUPPORT NOTES: NONE ---------------------------------------------------------- NEW PATCHID: 87.00 PATCH ID: OSF445-024B REQUIRED PATCHES: OSF445-024A (28.00) CONDITIONALLY REQUIRED PATCHES: NONE SUPERSEDED PATCHES: NONE SPECIAL INSTRUCTIONS: NONE FULL DESCRIPTION: PROBLEM: (ISV-2-120, 79010, 76571) (PATCH ID: OSF445-024) ******** Code which called the stime() function would not compile under C++ and other strict compilation environments, unless the user supplied their own stime() declaration. This would show up as compilation errors or runtime errors if an incorrect prototype was supplied by the user. FILES: ./usr/ccs/lib/lint/llib-lc.c CHECKSUM: 29362 47 SUBSET: OSFSDE445 ./usr/ccs/bin/lint/llib-lc.c,v RCS ID: 4.2.36.1 ./usr/ccs/lib/llib-lcstd.ln CHECKSUM: 43152 181 SUBSET: OSFSDE445 ./usr/ccs/lib/llib-lc.ln CHECKSUM: 55531 181 SUBSET: OSFSDE445 SUPPORT NOTES: NONE ---------------------------------------------------------- NEW PATCHID: 31.00 PATCH ID: OSF445-028 REQUIRED PATCHES: NONE CONDITIONALLY REQUIRED PATCHES: NONE SUPERSEDED PATCHES: NONE SPECIAL INSTRUCTIONS: NONE FULL DESCRIPTION: PROBLEM: (72280, 73818) (PATCH ID: OSF445-028) ******** This patch fixes a tftpd problem where it responds to a broadcast read request using the system's subnet broadcast address. This patch also provides the "-b" option to tftpd to control whether to respond to any broadscasts. FILES: ./usr/sbin/tftpd CHECKSUM: 06896 32 SUBSET: OSFINET445 ./usr/sbin/tftpd/tftpd.c,v RCS ID: 4.2.30.1 ./usr/lib/nls/msg/en_US.ISO8859-1/tftpd.cat CHECKSUM: 63147 1 SUBSET: OSFINET445 SUPPORT NOTES: NONE ---------------------------------------------------------- NEW PATCHID: 34.00 PATCH ID: OSF445-030 REQUIRED PATCHES: NONE CONDITIONALLY REQUIRED PATCHES: NONE SUPERSEDED PATCHES: NONE SPECIAL INSTRUCTIONS: NONE FULL DESCRIPTION: PROBLEM: (SSRT0636U) (PATCH ID: OSF445-030) ******** A potential security vulnerability has been discovered, where under certain circumstances, system integrity may be compromised. This may be in the form of improper file or privilege management. Compaq has corrected this potential vulnerability. FILES: ./usr/sbin/named CHECKSUM: 61950 200 SUBSET: OSFINET445 ./usr/sbin/named/db_load.c,v RCS ID: 4.2.49.1 ./usr/sbin/named/ns_forw.c,v RCS ID: 4.2.45.1 ./usr/sbin/named/ns_maint.c,v RCS ID: 4.2.50.1 ./usr/sbin/named/ns_resp.c,v RCS ID: 4.2.56.1 ./sbin/named CHECKSUM: 18048 200 SUBSET: OSFINET445 ./usr/sbin/named/db_load.c,v RCS ID: 4.2.49.1 ./usr/sbin/named/ns_forw.c,v RCS ID: 4.2.45.1 ./usr/sbin/named/ns_maint.c,v RCS ID: 4.2.50.1 ./usr/sbin/named/ns_resp.c,v RCS ID: 4.2.56.1 SUPPORT NOTES: NONE ---------------------------------------------------------- NEW PATCHID: 37.00 PATCH ID: OSF445-033 REQUIRED PATCHES: NONE CONDITIONALLY REQUIRED PATCHES: NONE SUPERSEDED PATCHES: NONE SPECIAL INSTRUCTIONS: NONE FULL DESCRIPTION: PROBLEM: (ISV-2-121, 76443) (PATCH ID: OSF445-033) ******** The patch changes the quotactl prototype to make it POSIX compliant. It does this by removing the argument names. FILES: ./usr/sys/include/ufs/quota.h CHECKSUM: 03961 9 SUBSET: OSFBINCOM445 SUPPORT NOTES: NONE ---------------------------------------------------------- NEW PATCHID: 39.00 PATCH ID: OSF445-035 REQUIRED PATCHES: NONE CONDITIONALLY REQUIRED PATCHES: NONE SUPERSEDED PATCHES: NONE SPECIAL INSTRUCTIONS: NONE FULL DESCRIPTION: PROBLEM: (ZPO038883) (PATCH ID: OSF445-035) ******** This patch fixes a problem of NetRain devices failing to come up after the "rcinet restart" command is entered. The error message displayed is "/sbin/rc3.d/S00inet: ifconfig failed - ifconfig: ioctl (SIOCIFADD): Function not implemented" FILES: ./sbin/init.d/inet CHECKSUM: 05988 13 SUBSET: OSFCLINET445 SUPPORT NOTES: NONE ---------------------------------------------------------- NEW PATCHID: 40.00 PATCH ID: OSF445-036 REQUIRED PATCHES: NONE CONDITIONALLY REQUIRED PATCHES: NONE SUPERSEDED PATCHES: NONE SPECIAL INSTRUCTIONS: NONE FULL DESCRIPTION: PROBLEM: (BCPM31029) (PATCH ID: OSF445-036) ******** This patch corrects the problem of an invalid message: "nfscast: select: Invalid argument" from appearing in the daemon.log. The message was appearing when the automount server(s) was not available. Also the message: "trymany: servers not responding: RPC: Unable to receive" has been changed to print as now an informational message vs. an error message. The message will then appear only if daemon.info or daemon.debug is set in /etc/syslog.conf This message also appears when the servers mentioned in the automount master file are not available. FILES: ./usr/sbin/.upd..automount CHECKSUM: 27588 104 SUBSET: OSFNFS445 ./usr/sbin/automount/auto_mount.c,v RCS ID: 4.2.41.1 ./usr/sbin/automount/nfs_cast.c,v RCS ID: 4.2.22.1 SUPPORT NOTES: NONE ---------------------------------------------------------- NEW PATCHID: 42.00 PATCH ID: OSF445-038 REQUIRED PATCHES: NONE CONDITIONALLY REQUIRED PATCHES: NONE SUPERSEDED PATCHES: NONE SPECIAL INSTRUCTIONS: NONE FULL DESCRIPTION: PROBLEM: (78724, HPAQB09J5) (PATCH ID: OSF445-038) ******** This patch fixes the following vrestore problems: - a previous patch caused incomplete restores - a warning message is displayed when the path for the first file in a group of hardlinks is created without using original protection codes and property lists. - a warning message is displayed and vrestore aborts if it fails to malloc space for a property list - a message which had been inserted at the end of the message file, had the wrong message category (could cause messaging confusion) - an uninitialized variable in the code that restores property lists could cause malloc failures, memory faults, "error setting extended attributes" and infinite loops using the '-l' option - corrupted property list information could cause an infinite loop FILES: ./sbin/vrestore CHECKSUM: 44077 616 SUBSET: OSFADVFS445 ./sbin/backup/vrestore/dirmgt.c,v RCS ID: 1.1.65.1 ./sbin/backup/vrestore/inotbl.c,v RCS ID: 1.1.47.1 ./sbin/backup/vrestore/shell.c,v RCS ID: 1.1.60.1 ./sbin/backup/vrestore/vrestore.c,v RCS ID: 1.1.148.1 ./usr/lib/nls/msg/en_US.ISO8859-1/vrestore.cat CHECKSUM: 17946 11 SUBSET: OSFADVFS445 SUPPORT NOTES: NONE ---------------------------------------------------------- NEW PATCHID: 43.00 PATCH ID: OSF445-039 REQUIRED PATCHES: NONE CONDITIONALLY REQUIRED PATCHES: NONE SUPERSEDED PATCHES: NONE SPECIAL INSTRUCTIONS: NONE FULL DESCRIPTION: PROBLEM: (76155, 76156, 77967) (PATCH ID: OSF445-039) ******** This patch fixes a kernel memory fault caused by either one of the following conditions: 1. On EV6 platforms, when the debugger is used to view the OT_DEVMAP object mapping memory in I/O space that is mapped to a user process. 2. When routine pmap_coproc_exit_notify() modifies the pmaps' coproc_tbi function to be 0, a null pointer, while it is being checked by routine pmap_remove_all() FILES: ./sys/BINARY/arch_alphapmap.mod CHECKSUM: 16606 201 SUBSET: OSFHWBIN445 ./kernel/arch/alpha/pmap.c,v RCS ID: 1.2.435.1 ./usr/sys/include/arch/alpha/pmap.h CHECKSUM: 47622 19 SUBSET: OSFBINCOM445 ./kernel/arch/alpha/pmap.h,v RCS ID: 1.2.115.1 SUPPORT NOTES: NONE ---------------------------------------------------------- NEW PATCHID: 46.00 PATCH ID: OSF445-041 REQUIRED PATCHES: NONE CONDITIONALLY REQUIRED PATCHES: NONE SUPERSEDED PATCHES: NONE SPECIAL INSTRUCTIONS: NONE FULL DESCRIPTION: PROBLEM: (none) (PATCH ID: OSF445-041) ******** This patch fixes a typo found in /usr/sys/include/if.h file. FILES: ./usr/sys/include/net/if.h CHECKSUM: 45703 46 SUBSET: OSFBINCOM445 ./kernel/net/if.h,v RCS ID: 4.3.173.1 SUPPORT NOTES: NONE ---------------------------------------------------------- NEW PATCHID: 47.00 PATCH ID: OSF445-042 REQUIRED PATCHES: NONE CONDITIONALLY REQUIRED PATCHES: NONE SUPERSEDED PATCHES: NONE SPECIAL INSTRUCTIONS: NONE FULL DESCRIPTION: PROBLEM: (OSF_QARs 76451, 78367, 78435) (PATCH ID: OSF445-0042) ******** o A virtual memory exhausted error when compiling the Open Source encryption library OpenSSL. o An optimizer problem in loop unrolling that caused an incorrect result under certain conditions. o Various compiler crashes under certain conditions. FILES: ./usr/ccs/lib/cmplrs/cc/gemc_cc CHECKSUM: 58177 5824 SUBSET: OSFCMPLRS445 SUPPORT NOTES: NONE ---------------------------------------------------------- NEW PATCHID: 48.00 PATCH ID: OSF445-043 REQUIRED PATCHES: NONE CONDITIONALLY REQUIRED PATCHES: NONE SUPERSEDED PATCHES: NONE SPECIAL INSTRUCTIONS: NONE FULL DESCRIPTION: PROBLEM: (BCGMB0G2H, BCGM90S8B) (PATCH ID: OSF445-043) ******** This patch fixes a problem with sequential reads on round robin mirrored LSM volumes that can result in a much longer access time versus a preferred plex mirrored LSM volume. See the Patch Summary and Release Notes for further information. FILES: ./sys/BINARY/lsm.mod CHECKSUM: 48859 269 SUBSET: OSFLSMBIN445 ./kernel/vxvm/vol.h,v RCS ID: 1.1.51.1 ./kernel/vxvm/vol/vol.c,v RCS ID: 1.1.78.1 ./kernel/vxvm/vol/volSpace.c,v RCS ID: 1.1.38.1 ./kernel/vxvm/vol/vol_cfg.c,v RCS ID: 1.1.25.1 ./kernel/vxvm/volkern.h,v RCS ID: 1.1.29.1 SUPPORT NOTES: NONE ---------------------------------------------------------- NEW PATCHID: 50.00 PATCH ID: OSF445-045 REQUIRED PATCHES: NONE CONDITIONALLY REQUIRED PATCHES: NONE SUPERSEDED PATCHES: NONE SPECIAL INSTRUCTIONS: NONE FULL DESCRIPTION: PROBLEM: (ZPO039996) (PATCH ID: OSF445-045) ******** This patch prevents vold from core dumping when a volprint, voldisk list, or other query command is executed during the following scenerios: o vold is in disabled mode but several volumes are active and enabled o vold is in enabled mode but a warning of "Disk group log may be too small" occurred when it was being enabled. FILES: ./sbin/vold CHECKSUM: 10159 720 SUBSET: OSFLSMBASE445 ./usr/sbin/vxvm/vold/query.c,v RCS ID: 1.1.19.1 SUPPORT NOTES: NONE ---------------------------------------------------------- NEW PATCHID: 52.00 PATCH ID: OSF445-047 REQUIRED PATCHES: NONE CONDITIONALLY REQUIRED PATCHES: NONE SUPERSEDED PATCHES: NONE SPECIAL INSTRUCTIONS: NONE FULL DESCRIPTION: PROBLEM: (79542) (PATCH ID: OSF445-047) ******** This patch fixes a problem where genvmunix does not boot on a system with an Atalla AXL200 card installed. FILES: ./sys/BINARY/pci.mod CHECKSUM: 36528 161 SUBSET: OSFHWBIN445 ./kernel/io/dec/pci/pci.c,v RCS ID: 1.1.192.1 ./sys/BINARY/pd6729.mod CHECKSUM: 12617 11 SUBSET: OSFHWBIN445 SUPPORT NOTES: NONE ---------------------------------------------------------- NEW PATCHID: 53.00 PATCH ID: OSF445-048 REQUIRED PATCHES: NONE CONDITIONALLY REQUIRED PATCHES: NONE SUPERSEDED PATCHES: NONE SPECIAL INSTRUCTIONS: NONE FULL DESCRIPTION: PROBLEM: (HPAQC15V8) (PATCH ID: OSF445-048) ******** This fixes a kernel memory fault in procfs_get_s5_dir(). FILES: ./sys/BINARY/procfs.mod CHECKSUM: 50810 171 SUBSET: OSFBIN445 ./kernel/procfs/procfs_vnops.c,v RCS ID: 1.1.173.1 SUPPORT NOTES: NONE ---------------------------------------------------------- NEW PATCHID: 56.00 PATCH ID: OSF445-050 REQUIRED PATCHES: NONE CONDITIONALLY REQUIRED PATCHES: NONE SUPERSEDED PATCHES: NONE SPECIAL INSTRUCTIONS: NONE FULL DESCRIPTION: PROBLEM: (TKTR90018) (PATCH ID: OSF445-050) ******** This patch fixes a "lock_terminate: lock held" panic when deleting a process group. An example stack trace: panic("lock_terminate: lock held") lock_terminate() pgdelete() pgrp_unref() pgrm() proc_teardown() waitf() wait4() syscall() _Xsyscall() FILES: ./sys/BINARY/bsd_tty.mod CHECKSUM: 32040 39 SUBSET: OSFBIN445 ./kernel/bsd/tty.c,v RCS ID: 4.4.115.1 SUPPORT NOTES: NONE ---------------------------------------------------------- NEW PATCHID: 174.00 PATCH ID: OSF445-051 REQUIRED PATCHES: NONE CONDITIONALLY REQUIRED PATCHES: NONE SUPERSEDED PATCHES: NONE SPECIAL INSTRUCTIONS: NONE FULL DESCRIPTION: PROBLEM: (69909, 77877) (PATCH ID: OSF445-051) ******** This patch corrects several known problems with salvage: - Fixes two infinite loops that could make salvage run forever. - Remove garbage characters from symlink recovery in salvage. FILES: ./sbin/advfs/salvage CHECKSUM: 07610 288 SUBSET: OSFADVFS445 ./sbin/advfs/salvage/salvage_build.c,v RCS ID: 1.1.22.1 ./sbin/advfs/salvage/salvage_init.c,v RCS ID: 1.1.29.1 SUPPORT NOTES: NONE ---------------------------------------------------------- NEW PATCHID: 58.00 PATCH ID: OSF445-053 REQUIRED PATCHES: NONE CONDITIONALLY REQUIRED PATCHES: NONE SUPERSEDED PATCHES: NONE SPECIAL INSTRUCTIONS: NONE FULL DESCRIPTION: PROBLEM: (BCSM816C6, HPAQ2144F) (PATCH ID: OSF445-053) ******** This patch fixes a problem with btcreate command where default restore fails is the disklabel is different and fixes a problem with slow robot media changers not waiting long enough between vdumps for the next tape to be loaded by some media changers. FILES: ./usr/sys/bin/btextract CHECKSUM: 30711 87 SUBSET: OSFBINCOM445 ./usr/sys/bin/btcreate CHECKSUM: 38632 143 SUBSET: OSFBINCOM445 SUPPORT NOTES: NONE ---------------------------------------------------------- NEW PATCHID: 59.00 PATCH ID: OSF445-054 REQUIRED PATCHES: NONE CONDITIONALLY REQUIRED PATCHES: NONE SUPERSEDED PATCHES: NONE SPECIAL INSTRUCTIONS: NONE FULL DESCRIPTION: PROBLEM: (CFS.71102) (PATCH ID: OSF445-054) ******** This patch fixes a problem where the cursor is displayed incorrectly when the image plane is set to 1 and the mask plane is set to 0. The expected behavior is transparent;i.e. display the frame buffer pixel data instead of the cursor data. FILES: ./sys/BINARY/tga.mod CHECKSUM: 26113 133 SUBSET: OSFHWBIN445 ./kernel/io/dec/ws/tga.c,v RCS ID: 1.1.92.1 SUPPORT NOTES: NONE ---------------------------------------------------------- NEW PATCHID: 60.00 PATCH ID: OSF445-055 REQUIRED PATCHES: NONE CONDITIONALLY REQUIRED PATCHES: NONE SUPERSEDED PATCHES: NONE SPECIAL INSTRUCTIONS: NONE FULL DESCRIPTION: PROBLEM: (MGO27465A) (PATCH ID: OSF445-055) ******** This patch fixes a problem when the type of SCSI device dynamically changes, which can result in a kernel memory fault or memory corruption panic. The sense inquiry buffer size is allocated too small. A typical stack trace: > 0 stop_secondary_cpu src/kernel/arch/alpha/cpu.c : 608 1 panic src/kernel/bsd/subr_prf.c : 751 2 event_timeout src/kernel/arch/alpha/cpu.c : 1183 3 xcpu_puts src/kernel/bsd/subr_prf.c : 895 4 printf src/kernel/bsd/subr_prf.c : 423 5 panic src/kernel/bsd/subr_prf.c : 804 6 closef src/kernel/bsd/kern_descrip.c : 1973 7 exit src/kernel/bsd/kern_exit.c : 1021 8 rexit src/kernel/bsd/kern_exit.c : 822 9 syscall src/kernel/arch/alpha/syscall_trap.c : 627 10 _Xsyscall src/kernel/arch/alpha/locore.s : 1505 Panic "closef: f_count not 1" due to corruption of 'file' structure FILES: ./sys/BINARY/cam.mod CHECKSUM: 10218 442 SUBSET: OSFHWBIN445 ./kernel/io/cam/pdrv_common.c,v RCS ID: 1.1.149.1 SUPPORT NOTES: NONE ---------------------------------------------------------- NEW PATCHID: 61.00 PATCH ID: OSF445-056 REQUIRED PATCHES: NONE CONDITIONALLY REQUIRED PATCHES: NONE SUPERSEDED PATCHES: NONE SPECIAL INSTRUCTIONS: NONE FULL DESCRIPTION: PROBLEM: (UVO88631, UTO101963, UTO101988) (PATCH ID: OSF445-056) ******** This patch fixes a problem with the psiop driver that causes it to fail when vdump is used. The following error is displayed: "vdump : unable to write to device". The problem is that the commands are not being properly flushed to the controller in all cases, therefore the method used to queue commands up to the controller has been improved. FILES: ./sys/BINARY/cam_psiop.mod CHECKSUM: 44045 212 SUBSET: OSFHWBIN445 ./kernel/io/cam/siop/pci/psiop_pci.c,v RCS ID: 1.1.118.1 ./kernel/io/cam/siop/psiop.c,v RCS ID: 1.1.151.1 ./usr/sys/include/io/cam/siop/pci_scripthost.h CHECKSUM: 12626 17 SUBSET: OSFBINCOM445 ./kernel/io/cam/siop/pci_scripthost.h,v RCS ID: 1.1.88.1 SUPPORT NOTES: NONE ---------------------------------------------------------- NEW PATCHID: 62.00 PATCH ID: OSF445-057 REQUIRED PATCHES: NONE CONDITIONALLY REQUIRED PATCHES: NONE SUPERSEDED PATCHES: NONE SPECIAL INSTRUCTIONS: NONE FULL DESCRIPTION: PROBLEM: (HPAQ10DTH, UVO55282) (PATCH ID: OSF445-057) ******** This patch provides the latest driver for the PowerStorm 4D10T (ELSA GLoria Synergy, SN-PBXGK-BB) graphics card and the latest graphics driver for the PCI To Ethernet/Graphics Combo Adapter (3X-DEPVD-AA). This version of the driver fixes a problem where the card might fail to operate correctly after a reboot and also fixes a minor problem in the cursor hotspot validation code. FILES: ./sys/BINARY/comet.mod CHECKSUM: 64931 38 SUBSET: OSFHWBIN445 ./kernel/io/dec/ws/comet.c,v RCS ID: 1.1.31.1 SUPPORT NOTES: NONE ---------------------------------------------------------- NEW PATCHID: 145.00 PATCH ID: OSF445-058A REQUIRED PATCHES: NONE CONDITIONALLY REQUIRED PATCHES: OSF445-058B (147.00) SUPERSEDED PATCHES: OSF445-010 (15.00), OSF445-016 (21.00), OSF445-017 (22.00), OSF445-026 (30.00), OSF445-004 (44.00), OSF445-049 (54.00), OSF445-062 (66.00), OSF445-064 (68.00), OSF445-066 (69.00), OSF445-101 (108.00), OSF445-069 (72.00), OSF445-008 (74.00), OSF445-065 (141.00), OSF445-075 (142.00), OSF445-002 (143.00), OSF445-095 (110.00) SPECIAL INSTRUCTIONS: NONE FULL DESCRIPTION: PROBLEM: (EVT91336A) (PATCH ID: OSF445-010) ******** This patch fixes a problem where the following can occur during a system panic: - system calls interrupts - mpsleep() returns an EINTR error when the panicstr is non-NULL - an indefinite looping at a very high priority PROBLEM: (MGO85573B, N/A) (PATCH ID: OSF445-016) ******** This patch fixes a bug such that when 'fuser -k' is issued on a dismounted NFS mount point in which some process is running, a hang will occur. A new flag, -p, has been introduced. When the -p flag is used with the -c flag, as in 'fuser -c -p -k /mnt', the parent directories are ignored and the processes are gracefully killed. PROBLEM: (74277, 74545) (PATCH ID: OSF445-017) ******** This patch fixes a problem in which operations on NFS files can hang indefinately. PROBLEM: (13096) (PATCH ID: OSF445-026) ******** In the per-VP scheduling state that is shared between the kernel and the DECthreads library scheduler, the compiler generates ldq/stq pairs for a 32-bit data object that neighbors another 32-bit variable. This patch fixes the stq that causes a word tear that corrupts the per-VP floating point flag field called nxm_fp_owned. The affected data structures are defined in . PROBLEM: (BCGM10RFF, 77112) (PATCH ID: OSF445-004) ******** This patch fixes a problem where if the size of a message queue was increased, writers to the queue that were blocked would not wake up for processing. The msgctl(2) and msgsnd(2) system calls now test if the message queue size has increased and if there are writers waiting to get unblocked, then wakeup the writers and let them proceed. PROBLEM: (HPAQB1FTS) (PATCH ID: OSF445-049) ******** This patch fixes a system panic with panic string: "psig: catch not set" An example stack trace is as follows: panic() psig() mach_checksig() PROBLEM: (QCAPUN003) (PATCH ID: OSF445-062) ******** This patch fixes a problem where the system appears to hang. A child process is holding a lock too long and preventing other processes from doing work. The child process is waiting to be re-parented as its parent is winding down. No new processes can be created, although certain existing processes will still continue to function. A forced crash will reveal several processes waiting for the pgrphash lock. The pgrphash lock will be held by a child process waiting for its parent to die which is being held up by an external event. A sample stack trace for the child process holding the pgrphash lock 0 thread_block 1 get_parent 2 fixjobc 3 pgmv 4 setpgrp1 5 setpgid 6 syscall 7 _Xsyscall PROBLEM: (77713) (PATCH ID: OSF445-064) ******** This patch fixes a problem in which the POSIX interval timer is not resilent to clock slowdown cause either by NTP or by a backwards change of the clock. PROBLEM: (ISO100518) (PATCH ID: OSF445-066) ******** This patch fixes a kernel memory fault panic seen under certain circumstances when a process or thread was setting its priority. A typical stack trace would be: > 0 boot src/kernel/arch/alpha/machdep.c : 1890 1 panic src/kernel/bsd/subr_prf.c : 834 2 trap src/kernel/arch/alpha/trap.c : 1659 3 _XentMM src/kernel/arch/alpha/locore.s : 1645 4 nxm_manager_boost src/kernel/kern/syscall_subr.c : 2503 5 trap src/kernel/arch/alpha/trap.c : 2132 6 _Xsyscall src/kernel/arch/alpha/locore.s : 1537 PROBLEM: (BCSM702LV, MGO59344E, MGO75812A) (PATCH ID: OSF445-101) ******** There is a potential for a system panic in routine sbflush() if there is an attempt to flush a socket buffer while it is locked by another thread. This patch corrects the problem. PROBLEM: (73112, 78765) (PATCH ID: OSF445-095) ******** This patch fixes two panics that has the following error messages: simple_lock: time limit exceeded -and- simple_lock: lock already owned by cpu Sample stack traces are listed below: Stack trace #1 simple_lock: time limit exceeded pc of caller: 0xffffffff000adf44 lock address: 0xfffffc001879ca80 lock info addr: 0xfffffc0001404cd0 lock class name: task.lock current lock state: 0xd00000bd000ac4cd panic (cpu 0): simple_lock: time limit exceeded syncing disks... done Stack trace #2 12 panic("simple_lock: lock already owned by cpu") 13 simple_lock_fault() 14 simple_lock_state_violation() 15 thread_deallocate() 16 task_swapout() 17 task_swapout_thread() PROBLEM: (HPAQ20N23) (PATCH ID: OSF445-069) ******** This patch corrects a problem with the incorrect ordering of network interfaces which was resulting in network partitions. PROBLEM: (HPAQ30SQ8) (PATCH ID: OSF445-008) ******** This patch fixes a panic in in_pcbfree() when ASE fails over NFS applications that use listener sockets. The stack trace will look like the following: panic in_pcbfree tcp_input ipintr netisr_thread PROBLEM: (BCSM412FX) (PATCH ID: OSF445-065) ******** This patch fixes a panic in in_pcbfree() when NFS is implemented over TCP. If an NFS server stops servicing requests to clients and the server is rebooted to clear the NFS problem, the clients panic in in_pcbfree(). A typical client stack trace is: panic in_pcbfree tcp_input ipintr PROBLEM: (EVT19938A, MGO53352A, TKTB30013, 79783, BCSM50XTD, BCSM511NN, BCSM51BGL) (PATCH ID: OSF445-075) ******** This patch fixes problems seen in the relocation of NFS services when clients have at least one of the filesystems mounted over TCP. The symptom is that at least one of the filesystems will fail to unmount when the failover is attempted. When analysis of that system is completed, at least one of the nfs_tcp_threads will be hung in rrok3free(). The stack trace will look similar to this: 0 thread_block() 1 mpsleep() 2 rrok3free() 3 svcktcp_reply() 4 svc_sendreply() 5 rfs_sendreply() 6 rfs_dispatch() 7 nfs_rpc_recv() 8 nfs_tcp_thread () PROBLEM: (MGO45830B) (PATCH ID: OSF445-002) ******** System spends excessive time in the internet checksum routine due to an invalid message length. Performance is degraded significantly. PROBLEM: (67762, 74793, HPAQ112FQ) (PATCH ID: OSF445-058) ******** This patch fixes reply values for NFS writes which were causing protocol violations. FILES: ./usr/sys/include/sys/fuser.h CHECKSUM: 23071 2 SUBSET: OSFBINCOM445 ./kernel/sys/fuser.h,v RCS ID: 1.1.35.1 ./usr/sys/include/sys/socketvar.h CHECKSUM: 43494 15 SUBSET: OSFBINCOM445 ./kernel/sys/socketvar.h,v RCS ID: 4.2.94.1 ./usr/sys/include/sys/proc.h CHECKSUM: 50340 30 SUBSET: OSFBINCOM445 ./kernel/sys/proc.h,v RCS ID: 4.3.124.1 ./sys/BINARY/std_kern.mod CHECKSUM: 24329 1184 SUBSET: OSFBIN445 ./kernel/bsd/kern_exit.c,v RCS ID: 4.4.227.1 ./kernel/bsd/kern_proc.c,v RCS ID: 4.3.124.1 ./kernel/bsd/kern_sig.c,v RCS ID: 4.5.355.1 ./kernel/bsd/kern_synch.c,v RCS ID: 4.3.104.1 ./kernel/bsd/kern_time.c,v RCS ID: 4.4.129.1 ./kernel/bsd/svipc_msg.c,v RCS ID: 4.3.102.1 ./kernel/bsd/uipc_socket2.c,v RCS ID: 4.4.114.1 ./kernel/kern/sched_prim.c,v RCS ID: 4.3.332.1 ./kernel/kern/task_swap.c,v RCS ID: 1.1.145.1 ./kernel/kern/thread.c,v RCS ID: 4.4.241.1 ./kernel/svr4/kern_fuser.c,v RCS ID: 1.1.75.2 ./usr/sbin/fuser CHECKSUM: 53458 24 SUBSET: OSFBASE445 ./sys/BINARY/nfs_server.mod CHECKSUM: 32435 274 SUBSET: OSFBIN445 ./kernel/nfs/nfs3_server.c,v RCS ID: 1.1.145.1 ./kernel/nfs/nfs_server.c,v RCS ID: 1.1.298.1 ./sys/BINARY/inet.mod CHECKSUM: 38233 293 SUBSET: OSFBIN445 ./kernel/netinet/in.c,v RCS ID: 4.3.105.1 ./kernel/netinet/in_pcb.c,v RCS ID: 4.3.199.1 ./kernel/netinet/ip_output.c,v RCS ID: 4.4.144.1 ./kernel/netinet/tcp_input.c,v RCS ID: 4.3.188.1 ./kernel/netinet/tcp_subr.c,v RCS ID: 4.3.133.1 SUPPORT NOTES: NONE ---------------------------------------------------------- NEW PATCHID: 147.00 PATCH ID: OSF445-058B REQUIRED PATCHES: OSF445-058A (145.00) CONDITIONALLY REQUIRED PATCHES: NONE SUPERSEDED PATCHES: NONE SPECIAL INSTRUCTIONS: NONE FULL DESCRIPTION: PROBLEM: (67762, 74793, HPAQ112FQ) (PATCH ID: OSF445-058) ******** This patch fixes reply values for NFS writes which were causing protocol violations. FILES: ./usr/sbin/tcpdump CHECKSUM: 17781 296 SUBSET: OSFINET445 ./usr/sbin/tcpdump/print-nfs3.c,v RCS ID: 1.1.11.1 SUPPORT NOTES: NONE ---------------------------------------------------------- NEW PATCHID: 63.00 PATCH ID: OSF445-059 REQUIRED PATCHES: NONE CONDITIONALLY REQUIRED PATCHES: NONE SUPERSEDED PATCHES: NONE SPECIAL INSTRUCTIONS: NONE FULL DESCRIPTION: PROBLEM: (BCSM90G7C) (PATCH ID: OSF445-059) ******** This patch fixes a hang in the shutdown process ( shutdown now command) of a system when device has flow control switched off. The shutdown waits for the flow control device to become available for write(2) The patch will open the device in write with non-blocking mode which will prevent hanging of the shutdown process. FILES: ./sbin/shutdown CHECKSUM: 52708 32 SUBSET: OSFBASE445 ./usr/sbin/shutdown/shutdown.c,v RCS ID: 4.3.55.1 ./usr/sbin/shutdown CHECKSUM: 42052 32 SUBSET: OSFBASE445 ./usr/sbin/shutdown/shutdown.c,v RCS ID: 4.3.55.1 SUPPORT NOTES: NONE ---------------------------------------------------------- NEW PATCHID: 169.00 PATCH ID: OSF445-061 REQUIRED PATCHES: NONE CONDITIONALLY REQUIRED PATCHES: NONE SUPERSEDED PATCHES: NONE SPECIAL INSTRUCTIONS: NONE FULL DESCRIPTION: PROBLEM: (MGO61992A, N/A) (PATCH ID: OSF445-061) ******** This patch fixes a problem where advscan -a -g does not display bootable partitions properly. For example: # ./advscan -a -g Scanning devices /dev/rrz16 Partition Domain Id /dev/rrz16a 37d1ce9b.000da070 V3, mounted <-- THIS SHOULD BE BOOTABLE 1 volume in domain Created Sat Sep 4 21:59:55 1999 Last mount Wed Dec 31 19:00:21 1969 /dev/rrz16g 37d1ce9c.0007ab70 V3, mounted 1 volume in domain Created Sat Sep 4 21:59:56 1999 Last mount Fri May 12 10:56:31 2000 FILES: ./sbin/advfs/advscan CHECKSUM: 45642 40 SUBSET: OSFADVFS445 ./sbin/advfs/advscan/advscan.c,v RCS ID: 1.1.30.1 SUPPORT NOTES: NONE ---------------------------------------------------------- NEW PATCHID: 70.00 PATCH ID: OSF445-067 REQUIRED PATCHES: NONE CONDITIONALLY REQUIRED PATCHES: NONE SUPERSEDED PATCHES: NONE SPECIAL INSTRUCTIONS: NONE FULL DESCRIPTION: PROBLEM: (52718, 74111, 61261) (PATCH ID: OSF445-067) ******* Problem 1: Dbx stack trace is incomplete. In certain cases, dbx's 'where' command did not produce a complete stack trace. This was seen when debugging at the assembly level and using the 'stepi' command to step into a routine, or when there is a fault in some library routines. The following shows some instances of the problem. Stepping into a routine with stepi ('si'), Getting a stack trace ('where' or 't') Attempt to 'return' >*[main:68, 0x1200018b0] ldq r27, -32568(gp) (dbx) ni >*[main:68, 0x1200018b4] jsr r26, (r27), 0x120005e60 (dbx) si >*[_OtsMove, 0x3ff800d5e60] amask 0x1, r19 (dbx) t > 0 _OtsMove(0x3ff800d5bd0, 0x4, 0x120001850, 0x3, 0x4) [0x3ff800d5e60] (dbx) return no place to return to (dbx) up (dbx) t > 0 _OtsMove(0x3ff800d5bd0, 0x4, 0x120001850, 0x3, 0x4) [0x3ff800d5e60] Stepping into a routine until the stack is correct >*[main:68, 0x1200018cc] ldq r21, 40(r8) (dbx) ni >*[main:68, 0x1200018d0] bsr r26, recurse+0x8(line 29) (dbx) si >*[recurse:29, 0x120001638] ldq r28, -16448(sp) (dbx) t > 0 recurse(inbox = (...)) ["crashit.c":29, 0x120001638] (dbx) ni >*[recurse:29, 0x12000163c] ldq r28, -4096(sp) (dbx) ni >*[recurse:29, 0x120001640] ldq r28, -12256(sp) (dbx) ni >*[recurse:29, 0x120001644] lda sp, -16448(sp) (dbx) ni >*[recurse:29, 0x120001648] stq r26, 8144(sp) (dbx) t > 0 recurse(inbox = (...)) ["crashit.c":29, 0x120001648] (dbx) ni >*[recurse:29, 0x12000164c] stq r16, 16400(sp) (dbx) t > 0 recurse(inbox = (...)) ["crashit.c":29, 0x12000164c] 1 main(argc = 3, argv = 0x11ffffce8) ["crashit.c":68, 0x1200018d0] Problem 2: Dbx cannot set a variable after viewing a non-local variable: Dbx has several methods of looking for variables. If the variable is not found in the current routine, active procedures on the stack are searched, and then global variables are searched. When dbx searched up the stack for the variable, it failed to reset an internal pointer and the assignment to a local variable failed. main: 52 if (argc < 3) { (dbx) stop in justtryme [2] stop in justtryme (dbx) r 0 3 [2] stopped at [justtryme:21 ,0x1200015d4] deepend = levels; (dbx) n [justtryme:23 ,0x1200015d8] printf("Cpu %d going down, stack about %d levels deep\n", cpu, deepend); (dbx) p iter /* A variable local to the main routine 3 (dbx) assign deepend = 10 10 (dbx) p deepend 3 (dbx) q Problem 3: Dbx receives signal 66 on vfork: When debugging a program that executes a vfork, dbx exhibited this: dbx version 3.11.10 Type 'help' for help. main: 11 signal( SIGCHLD, handler ); (dbx) r signal [signal 66] at >*[__vfork, 0x3ff800e7968] beq r19, 0x3ff800e7980 (dbx) The correct behaviour follows: main: 11 signal( SIGCHLD, handler ); (dbx) r New child attached. Use switch to gain access to process 5774 child: 5774 (dbx) FILES: ./usr/ccs/lib/cmplrs/cc/dbx CHECKSUM: 04421 1032 SUBSET: OSFBASE445 SUPPORT NOTES: NONE ---------------------------------------------------------- NEW PATCHID: 80.00 PATCH ID: OSF445-071 REQUIRED PATCHES: NONE CONDITIONALLY REQUIRED PATCHES: NONE SUPERSEDED PATCHES: NONE SPECIAL INSTRUCTIONS: NONE FULL DESCRIPTION: PROBLEM: (80166) (PATCH ID: OSF445-071) ******** This patch fixes a problem with the memx command where it inproperly handles memory sizes of 2 GB or greater. FILES: ./usr/field/memxr CHECKSUM: 09584 200 SUBSET: OSFEXER445 ./usr/field/memxr/memxr.c,v RCS ID: 4.2.8.1 ./usr/field/memx CHECKSUM: 09584 200 SUBSET: OSFEXER445 ./usr/field/memx/memx.c,v RCS ID: 4.2.10.1 ./usr/field/memxr/memxr.c,v RCS ID: 4.2.8.1 SUPPORT NOTES: NONE ---------------------------------------------------------- NEW PATCHID: 77.00 PATCH ID: OSF445-074 REQUIRED PATCHES: NONE CONDITIONALLY REQUIRED PATCHES: NONE SUPERSEDED PATCHES: OSF445-060 (65.00) SPECIAL INSTRUCTIONS: NONE FULL DESCRIPTION: PROBLEM: (BCGM10J56, BCGM4180B, BCGM41HLM, MGO36744A, 7XRB90123) (PATCH ID: OSF445-060) ******** This patch fixes the following 3 problems: 1.)When a SCSI I/O command results in a bus reset, which causes the command to be re-issued, the system sometimes can not recover and ends up in a tight loop of bus resets. 2.) After a recovery operation is performed, the read disk capacity sizing of the disk sometime fails to match the original value, which causes the recovery to fail. 3.) A BBR (bad block replacement) informational message received from an HSZ is mistakenly classified as an error. PROBLEM: (79461) (PATCH ID: OSF445-074) ******** This patch fixes a simple lock timeout violation. The stacktrace is as follows: panic src/kernel/bsd/subr_prf.c simple_lock_fault src/kernel/kern/lock.c simple_lock_time_violation src/kernel/kern/lock.c cam_disk_unit_atten src/kernel/io/cam/cam_disk.c cdisk_check_sense src/kernel/io/cam/cam_disk.c cdisk_complete src/kernel/io/cam/cam_disk.c as_finish src/kernel/io/cam/sim_as.c xpt_callback_thread src/kernel/io/cam/xpt.c FILES: ./usr/sys/include/io/cam/cam_disk.h CHECKSUM: 38930 44 SUBSET: OSFBINCOM445 ./kernel/io/cam/cam_disk.h,v RCS ID: 1.1.121.1 ./sys/BINARY/cam_disk.mod CHECKSUM: 45449 328 SUBSET: OSFHWBIN445 ./kernel/io/cam/cam_disk.c,v RCS ID: 1.1.505.2 SUPPORT NOTES: NONE ---------------------------------------------------------- NEW PATCHID: 107.00 PATCH ID: OSF445-076 REQUIRED PATCHES: NONE CONDITIONALLY REQUIRED PATCHES: NONE SUPERSEDED PATCHES: OSF445-013 (18.00), OSF445-029 (32.00), OSF445-037 (41.00), OSF445-052 (57.00) SPECIAL INSTRUCTIONS: NONE FULL DESCRIPTION: PROBLEM: (74651, 75705) (PATCH ID: OSF445-013) ******** This patch fixes a problem where a root user was not allowed to check file access on behalf of a user without completely becoming the user. The functionality is needed by the ASU (Advanced Server for UNIX) product. PROBLEM: (MGO90721A) (PATCH ID: OSF445-029) ******** This patch fixes a problem with simple_lock: time limit exceeded panic seen on SMP systems with the namei.nch_lockinfo lock. A typical entry in the /var/adm/messages file would be: simple_lock: time limit exceeded pc of caller: 0xfffffc00004445d8 lock address: 0xfffffc0000eb50e8 lock info addr: 0xfffffc0000772be0 lock class name: namei.nch_lockinfo current lock state: 0x800000be00443b45 (cpu=0,pc=0xfffffc0000443b44,busy) PROBLEM: (TKTR30001) (PATCH ID: OSF445-037) ******** This patch fixes a race condition in the UBC code where a lookup is done on a page being invalidated (freed). The lookup continued to access the data structure after it was freed, and depending on who uses the data structure next, this causes the lookup to think that the invalidation did not complete and wait. PROBLEM: (58325) (PATCH ID: OSF445-052) ******** This patch fixes UFS metadata update performance by adding a mount option, "delayed", for UFS to convert synchronous metadata writes into delayed metadata writes. The File System is often used as a cache for transitory data such as in web servers. Applications such as Squid web proxy server will get a significant performance boost by enabling this option. Restoring from tape is another application that can be benefited from this. PROBLEM: (79937) (PATCH ID: OSF445-076) ******** This patch fixes a hang or simple_lock_state_violation panic in biodone. This patch places mount throttle fields under the new mount_throttle_lock (locking requirements described in mount.h). These fields previously were under the mount lock. The problem is that it was possible for the mount lock to be held in a context which could be interrupted by a higher priority event, such as biodone, which could also require this lock. The solution is to protect these fields under a different lock and spl. The key pieces of the stack trace for this problem are: biodone() -- wants mount lock ... ... -- interrupt service routines ... _XentInt() -- interrupt ... vfs_unbusy() -- some routine which takes the mount lock (vfs_unbusy is not unique here) ... FILES: ./usr/sys/kern/lockinfo.c CHECKSUM: 08341 106 SUBSET: OSFBINCOM445 ./kernel/kern/lockinfo.c,v RCS ID: 1.1.1196.1 ./usr/sys/include/sys/mount.h CHECKSUM: 39823 28 SUBSET: OSFBINCOM445 ./kernel/sys/mount.h,v RCS ID: 4.3.195.2 ./usr/sys/include/sys/vnode.h CHECKSUM: 43381 37 SUBSET: OSFBINCOM445 ./kernel/sys/vnode.h,v RCS ID: 4.3.191.1 ./sys/BINARY/vfs.mod CHECKSUM: 60888 376 SUBSET: OSFBIN445 ./kernel/vfs/vfs_bio.c,v RCS ID: 4.3.142.2 ./kernel/vfs/vfs_cache.c,v RCS ID: 4.2.109.1 ./kernel/vfs/vfs_cfg.c,v RCS ID: 1.1.93.1 ./kernel/vfs/vfs_subr.c,v RCS ID: 4.3.260.1 ./kernel/vfs/vfs_syscalls.c,v RCS ID: 4.3.349.2 ./kernel/vfs/vfs_ubc.c,v RCS ID: 1.1.431.1 ./sbin/mount CHECKSUM: 40432 576 SUBSET: OSFBASE445 ./usr/sbin/mount/mount.c,v RCS ID: 4.3.208.1 ./usr/sbin/mount CHECKSUM: 17700 72 SUBSET: OSFBASE445 ./usr/sbin/mount/mount.c,v RCS ID: 4.3.208.1 ./usr/sys/vfs/vfs_conf.c CHECKSUM: 56205 11 SUBSET: OSFBINCOM445 ./kernel/vfs/vfs_conf.c,v RCS ID: 4.2.110.1 ./sys/BINARY/ufs.mod CHECKSUM: 24221 310 SUBSET: OSFBIN445 ./kernel/ufs/ufs_inode.c,v RCS ID: 4.3.184.1 ./kernel/ufs/ufs_vfsops.c,v RCS ID: 4.2.192.2 ./kernel/ufs/ufs_vnops.c,v RCS ID: 4.2.387.1 SUPPORT NOTES: NONE ---------------------------------------------------------- NEW PATCHID: 76.00 PATCH ID: OSF445-078 REQUIRED PATCHES: NONE CONDITIONALLY REQUIRED PATCHES: NONE SUPERSEDED PATCHES: OSF445-034 (38.00) SPECIAL INSTRUCTIONS: NONE FULL DESCRIPTION: PROBLEM: (73949, UVO59438) (PATCH ID: OSF445-034) ******** This patch corrects a problem with the fgrep command, when it is used with the -s flag all output is suppressed. PROBLEM: (49626, 50301, 51528, 79566) (PATCH ID: OSF445-078) ******* This patch fixes several problems with fgrep: 1) The command fgrep -f searchlist gets the following error message: wordlist too large if the searchlist is too long, in the test case it was 1500 entries. 2) The command fgrep -f searchlist displays datafiles verbatim if the searchlist has blank lines. FILES: ./usr/bin/fgrep CHECKSUM: 13666 24 SUBSET: OSFBASE445 ./usr/bin/grep/fgrep.c,v RCS ID: 4.2.42.2 ./sbin/grep CHECKSUM: 20720 32 SUBSET: OSFBASE445 ./usr/bin/grep CHECKSUM: 20235 32 SUBSET: OSFBASE445 ./usr/bin/egrep CHECKSUM: 20235 32 SUBSET: OSFBASE445 SUPPORT NOTES: NONE ---------------------------------------------------------- NEW PATCHID: 137.00 PATCH ID: OSF445-081 REQUIRED PATCHES: NONE CONDITIONALLY REQUIRED PATCHES: NONE SUPERSEDED PATCHES: NONE SPECIAL INSTRUCTIONS: NONE FULL DESCRIPTION: PROBLEM: (79159) (PATCH ID: OSF445-081) ******** PROBLEM: (QAR 79159) This patch fixes a problem where the itpsa driver would negotiate for ULTRA2 speed although the SCSI bus was single-ended and the negotiations should have i been for ULTRA. FILES: ./sys/BINARY/itpsa.mod CHECKSUM: 57269 233 SUBSET: OSFHWBIN445 ./kernel/io/cam/iti/itpsa.c,v RCS ID: 1.1.59.1 SUPPORT NOTES: NONE ---------------------------------------------------------- NEW PATCHID: 176.00 PATCH ID: OSF445-083 REQUIRED PATCHES: NONE CONDITIONALLY REQUIRED PATCHES: NONE SUPERSEDED PATCHES: OSF445-012 (17.00), OSF445-040 (45.00), OSF445-068 (71.00), OSF445-073 (78.00), OSF445-079 (75.00) SPECIAL INSTRUCTIONS: NONE FULL DESCRIPTION: PROBLEM: (72111, 74264) (PATCH ID: OSF445-012) ******** This patch fixes a problem with verify. When verify is run on a brand new domain, nfs warnings are displayed even though no nfs related activity is being done. PROBLEM: (BCGMC0WVV) (PATCH ID: OSF445-040) ******** This patch fixes a system hang that could last up to a few minutes with large files when performing synchronous IO requests. The fix is to split up msync() requests into manageable pieces so users can continue working. PROBLEM: (76777) (PATCH ID: OSF445-068) ******** This patch fixes a problem where the output of a "ps" command, the PAGEIN column reports 0 for all processes. After installing this patch, the ps PAGEIN value increases as advfs accesses the disk for vm accesses (but not for normal file read). PROBLEM: (80270) (PATCH ID: OSF445-073) ******** This patch turns off AdvFS assert which, when turned on, a performance degradation in Advfs occurs. The Advfs assert are used for isolating problems during development. PROBLEM: (79769) (PATCH ID: OSF445-079) ******** A kernel memory fault can occur on an smp machine when one thread is extending a clone frags file and another thread does a stat system call on a file with a frag. The stack trace is as follows: 5 panic src/kernel/bsd/subr_prf.c : 804 6 trap src/kernel/arch/alpha/trap.c : 1762 7 _XentMM src/kernel/arch/alpha/locore.s : 1748 8 x_page_to_blk src/kernel/msfs/bs/bs_stg.c : 6191 9 x_page_to_blkmap src/kernel/msfs/bs/bs_stg.c : 5928 10 x_page_mapped src/kernel/msfs/bs/bs_stg.c : 6281 11 bs_frag_has_stg src/kernel/msfs/bs/bs_bitfile_sets.c : 2229 12 msfs_getattr src/kernel/msfs/osf/msfs_vnops.c : 1525 13 vn_stat src/kernel/vfs/vfs_vnops.c : 1277 14 stat1 src/kernel/vfs/vfs_syscalls.c : 3056 15 lstat src/kernel/vfs/vfs_syscalls.c : 3034 16 syscall src/kernel/arch/alpha/syscall_trap.c : 627 17 _Xsyscall src/kernel/arch/alpha/locore.s : 1512 PROBLEM: (77274, 78605) (PATCH ID: OSF445-083) ******** This patch fixes a problem with AdvFS. An AdvFS domain becomes inaccessible when using the mount -d option. FILES: ./sys/BINARY/advfs.mod CHECKSUM: 55778 1065 SUBSET: OSFADVFSBIN445 ./kernel/msfs/bs/bs_access.c,v RCS ID: 1.1.553.1 ./kernel/msfs/bs/bs_extents.c,v RCS ID: 1.1.93.1 ./kernel/msfs/bs/bs_qio.c,v RCS ID: 1.1.240.1 ./kernel/msfs/bs/ftx_recovery.c,v RCS ID: 1.1.119.1 ./kernel/msfs/osf/msfs_misc.c,v RCS ID: 1.1.478.1 ./kernel/msfs/osf/msfs_vfsops.c,v RCS ID: 1.1.628.1 SUPPORT NOTES: NONE ---------------------------------------------------------- NEW PATCHID: 186.00 PATCH ID: OSF445-085 REQUIRED PATCHES: NONE CONDITIONALLY REQUIRED PATCHES: NONE SUPERSEDED PATCHES: OSF445-046 (51.00) SPECIAL INSTRUCTIONS: NONE FULL DESCRIPTION: PROBLEM: (BCGMC1ZNX, HPAQ80JML, BCGMA0G3H, BCGMA2191) (PATCH ID: OSF445-046) ******** This patch fixes a problem where some crontab jobs would run multiple times in the same minute. This problem was introduced by another cron patch on a previous patch kit. In fixing an earlier problem, cron was changed so that if a crontab was submitted that contained an entry for the current minute, the entry was run immediately. Previously, the entry was not run. This change in behavior caused a problem for crontab jobs which updated crontab without deleting the entry that started them. Such jobs could be run multiple times during their first minute. PROBLEM: (78912, FNO95387A, BCGM51P8N) (PATCH ID: OSF445-085) ******** This patch fixes two cron problems: 1) the cron daemon does intensive logging and fills up the disk, and 2) multiple cron daemons continue to run and consume system resources due to the fact that after a user is deleted from the system there are still jobs running on the users behalf. FILES: ./usr/sbin/cron CHECKSUM: 15948 64 SUBSET: OSFBASE445 ./usr/sbin/cron/cron.c,v RCS ID: 4.2.101.2 SUPPORT NOTES: NONE ---------------------------------------------------------- NEW PATCHID: 182.00 PATCH ID: OSF445-086 REQUIRED PATCHES: NONE CONDITIONALLY REQUIRED PATCHES: NONE SUPERSEDED PATCHES: NONE SPECIAL INSTRUCTIONS: NONE FULL DESCRIPTION: PROBLEM: (78712) (PATCH ID: OSF445-086) ******** This patch fixes a problem where encoding for the SysV Open call audit parameter was incorrect. This could cause a system panic. FILES: ./usr/sys/BINARY/sysv_init_sysent.c CHECKSUM: 12865 2 SUBSET: OSFBIN445 SUPPORT NOTES: NONE ---------------------------------------------------------- NEW PATCHID: 90.00 PATCH ID: OSF445-087 REQUIRED PATCHES: NONE CONDITIONALLY REQUIRED PATCHES: NONE SUPERSEDED PATCHES: NONE SPECIAL INSTRUCTIONS: NONE FULL DESCRIPTION: PROBLEM: (STL006754) (PATCH ID: OSF445-087) ******** This patch corrects problems in the lat driver which caused improper processing of the ioctl TCSBRK as well as the generation of spurious characters when the libc routine tcdrain() was used. FILES: ./sys/BINARY/lat.mod CHECKSUM: 54656 242 SUBSET: OSFLAT445 ./kernel/lat/streams/lattioc.c,v RCS ID: 1.1.32.1 ./kernel/lat/streams/sxgetc.c,v RCS ID: 1.1.21.1 SUPPORT NOTES: NONE ---------------------------------------------------------- NEW PATCHID: 161.00 PATCH ID: OSF445-088 REQUIRED PATCHES: NONE CONDITIONALLY REQUIRED PATCHES: NONE SUPERSEDED PATCHES: OSF445-018 (23.00) SPECIAL INSTRUCTIONS: NONE FULL DESCRIPTION: PROBLEM: (75185, 75088, 74801) (PATCH ID: OSF445-018) ******** This patch corrects a problem in which the perrmask register on Tsunami systems can be overwritten. PROBLEM: (78838) (PATCH ID: OSF445-088) ******** The problem caused an incorrect bcache size to be returned to the kernel from the HWRPB. This problem occurred on Professional Workstation 900 and 1000 systems and AlphaServer DS10, DS20, DS20E, ES40, GS80, GS160, and GS320 systems. FILES: ./sys/BINARY/kn600.mod CHECKSUM: 13047 50 SUBSET: OSFHWBIN445 ./kernel/arch/alpha/hal/kn600.c,v RCS ID: 1.1.49.2 ./sys/BINARY/kn600_mult.mod CHECKSUM: 23136 52 SUBSET: OSFHWBIN445 ./kernel/arch/alpha/hal/kn600.c,v RCS ID: 1.1.49.2 SUPPORT NOTES: NONE ---------------------------------------------------------- NEW PATCHID: 99.00 PATCH ID: OSF445-089 REQUIRED PATCHES: NONE CONDITIONALLY REQUIRED PATCHES: NONE SUPERSEDED PATCHES: NONE SPECIAL INSTRUCTIONS: NONE FULL DESCRIPTION: PROBLEM: (48512, 80551, MGO63340A) (PATCH ID: OSF445-089) ******** This patch corrects the problem so mailx(1) will work correctly if -r and -s flags are used together. FILES: ./usr/bin/Mail CHECKSUM: 63356 208 SUBSET: OSFBASE445 ./usr/bin/Mail/send.c,v RCS ID: 4.2.30.1 ./usr/bin/mailx CHECKSUM: 63356 208 SUBSET: OSFBASE445 ./usr/bin/Mail/send.c,v RCS ID: 4.2.30.1 SUPPORT NOTES: NONE ---------------------------------------------------------- NEW PATCHID: 149.00 PATCH ID: OSF445-090 REQUIRED PATCHES: NONE CONDITIONALLY REQUIRED PATCHES: NONE SUPERSEDED PATCHES: NONE SPECIAL INSTRUCTIONS: NONE FULL DESCRIPTION: PROBLEM: (EVT29385A, 77833) (PATCH ID: OSF445-090) ******** This patch fixes a problem where the vdump command will sometimes store symbolic link files as directories in the vdump archive. FILES: ./sbin/vdump CHECKSUM: 57170 528 SUBSET: OSFADVFS445 ./sbin/backup/vdump/vdump.c,v RCS ID: 1.1.99.1 SUPPORT NOTES: NONE ---------------------------------------------------------- NEW PATCHID: 112.00 PATCH ID: OSF445-091 REQUIRED PATCHES: NONE CONDITIONALLY REQUIRED PATCHES: NONE SUPERSEDED PATCHES: NONE SPECIAL INSTRUCTIONS: NONE FULL DESCRIPTION: PROBLEM: (75340, 77361, 77425, 79767) (PATCH ID: OSF445-091) ******** This patch corrects the following problems with some models of IDE CD-ROM and removable disk devices during system startup: - Some IDE CD-ROMs may cause a system panic, with "kernel memory fault" during a bus device reset. - Some IDE master devices require special code when they are configured as the IDE master with a non-existant slave device. This could cause a "xpt_callback_thread: callback queue corrupted" panic. - Playing the last audio track of an enhanced CD may cause unpredictable system slow-downs or temporary system hangs. FILES: ./sys/BINARY/cam_ata.mod CHECKSUM: 21870 294 SUBSET: OSFHWBIN445 ./kernel/io/cam/ata/sim_ata.c,v RCS ID: 1.1.77.1 ./usr/sys/conf/files CHECKSUM: 08784 46 SUBSET: OSFBINCOM445 ./kernel/conf/alpha/files,v RCS ID: 4.2.489.1 SUPPORT NOTES: NONE ---------------------------------------------------------- NEW PATCHID: 188.00 PATCH ID: OSF445-092 REQUIRED PATCHES: NONE CONDITIONALLY REQUIRED PATCHES: NONE SUPERSEDED PATCHES: NONE SPECIAL INSTRUCTIONS: NONE FULL DESCRIPTION: PROBLEM: (76235, 62918, 45370, 46008) (PATCH ID: OSF445-092) ******** This patch fixes several problems in the tapex utility; accuracy of performance tests has been improved, the tapex exit status has been corrected and tapex was fixed to determine eom status in Command Timeout Test and exit with non-0 status to indicate failure. FILES: ./usr/field/tapex CHECKSUM: 43866 512 SUBSET: OSFEXER445 ./usr/field/tapex/tapex.c,v RCS ID: 4.2.21.1 SUPPORT NOTES: NONE ---------------------------------------------------------- NEW PATCHID: 164.00 PATCH ID: OSF445-093A REQUIRED PATCHES: NONE CONDITIONALLY REQUIRED PATCHES: OSF445-093B (167.00) SUPERSEDED PATCHES: OSF445-022A (27.00), OSF445-032A (36.00), OSF445-084A (162.00) SPECIAL INSTRUCTIONS: NONE FULL DESCRIPTION: PROBLEM: (MGO88206A) (PATCH ID: OSF445-022) ******** This patch corrects a problem of the rsh command displaying a warning message instead of the rsh command output when C2 security is configured. An example of the warning message displayed is "Your password will expire on ..." PROBLEM: (BCGM812G1V, 76429) (PATCH ID: OSF445-032) ******** This patch fixes a problem with logins in a DCE/C2 environment. You could encounter an error "Bad priority setting" if there is a u_priority setting used in /etc/auth/system/default file. PROBLEM: (54550, 79314, ISO100580) (PATCH ID: OSF445-084) ******** This patch fixes a problem when a system is configured with DECnet, C2 and NIS. When invoking edauth(8) , the error: 'Must be on NIS master server to update entry for is returned. PROBLEM: (TKTR60015, 81049) (PATCH ID: OSF445-093) ******** This patch fixes a problem for Enhanced Security configurations where the Maximum Login Interval (u_max_login_intvl) field was being ignored for account templates. FILES: ./usr/shlib/libsecurity.so CHECKSUM: 56608 360 SUBSET: OSFBASE445 ./usr/ccs/lib/libsecurity/SIA/login_sec.c,v RCS ID: 1.1.117.1 ./usr/ccs/lib/libsecurity/authcap.c,v RCS ID: 4.2.90.1 ./usr/ccs/lib/libsecurity/fields.c,v RCS ID: 4.2.47.1 SUPPORT NOTES: NONE ---------------------------------------------------------- NEW PATCHID: 167.00 PATCH ID: OSF445-093B REQUIRED PATCHES: OSF445-093A (164.00) CONDITIONALLY REQUIRED PATCHES: NONE SUPERSEDED PATCHES: OSF445-022B (86.00), OSF445-032B (88.00), OSF445-084B (165.00) SPECIAL INSTRUCTIONS: NONE FULL DESCRIPTION: PROBLEM: (MGO88206A) (PATCH ID: OSF445-022) ******** This patch corrects a problem of the rsh command displaying a warning message instead of the rsh command output when C2 security is configured. An example of the warning message displayed is "Your password will expire on ..." PROBLEM: (BCGM812G1V, 76429) (PATCH ID: OSF445-032) ******** This patch fixes a problem with logins in a DCE/C2 environment. You could encounter an error "Bad priority setting" if there is a u_priority setting used in /etc/auth/system/default file. PROBLEM: (54550, 79314, ISO100580) (PATCH ID: OSF445-084) ******** This patch fixes a problem when a system is configured with DECnet, C2 and NIS. When invoking edauth(8) , the error: 'Must be on NIS master server to update entry for is returned. PROBLEM: (TKTR60015, 81049) (PATCH ID: OSF445-093) ******** This patch fixes a problem for Enhanced Security configurations where the Maximum Login Interval (u_max_login_intvl) field was being ignored for account templates. FILES: ./usr/ccs/lib/libsecurity.a CHECKSUM: 04875 407 SUBSET: OSFC2SEC445 ./usr/ccs/lib/libsecurity/SIA/login_sec.c,v RCS ID: 1.1.117.1 ./usr/ccs/lib/libsecurity/authcap.c,v RCS ID: 4.2.90.1 ./usr/ccs/lib/libsecurity/fields.c,v RCS ID: 4.2.47.1 SUPPORT NOTES: NONE ---------------------------------------------------------- NEW PATCHID: 116.00 PATCH ID: OSF445-094 REQUIRED PATCHES: NONE CONDITIONALLY REQUIRED PATCHES: NONE SUPERSEDED PATCHES: NONE SPECIAL INSTRUCTIONS: NONE FULL DESCRIPTION: PROBLEM: (54202, 79596, BCPM412T3) (PATCH ID: OSF445-094) ******** This patch fixes a problem with the tar command. Corruption occurs when restoring a file system that contains more than two hard links to a file. FILES: ./usr/bin/tar CHECKSUM: 44251 136 SUBSET: OSFBASE445 ./usr/bin/pax/link.c,v RCS ID: 1.1.28.1 ./usr/bin/pax CHECKSUM: 44251 136 SUBSET: OSFBASE445 ./usr/bin/pax/link.c,v RCS ID: 1.1.28.1 ./usr/bin/cpio CHECKSUM: 44251 136 SUBSET: OSFBASE445 ./usr/bin/pax/link.c,v RCS ID: 1.1.28.1 ./sbin/.upd..tar CHECKSUM: 56572 136 SUBSET: OSFBASE445 ./usr/bin/pax/link.c,v RCS ID: 1.1.28.1 ./sbin/.upd..pax CHECKSUM: 56572 136 SUBSET: OSFBASE445 ./usr/bin/pax/link.c,v RCS ID: 1.1.28.1 ./sbin/.upd..cpio CHECKSUM: 56572 136 SUBSET: OSFBASE445 ./usr/bin/pax/link.c,v RCS ID: 1.1.28.1 SUPPORT NOTES: NONE ---------------------------------------------------------- NEW PATCHID: 172.00 PATCH ID: OSF445-096 REQUIRED PATCHES: NONE CONDITIONALLY REQUIRED PATCHES: NONE SUPERSEDED PATCHES: OSF445-020 (25.00), OSF445-104 (170.00) SPECIAL INSTRUCTIONS: NONE FULL DESCRIPTION: PROBLEM: (60651, 77772, 60651, 66106, 64050) (PATCH ID: OSF445-020) ******** This patch fixes the following problems with the mv command: - An invalid error message when attempting to move files in which the source name is the same as the destination name The message would look something like the following: mv: rename foo to foo/fooo: Invalid argument The error message, with this patch, will now look something like the following: mv: foo and foo are identical - When using "mv -i" to rename a symlink pointing to a file on a different filesystem owned by a different user results in the prompt: Ownership of y will change. Continue? - When moving a file from one filesystem to another, the "mv" command will copy the file rather than using the rename() system call. If there are any errors writing to the destination filesystem, the destination file is unlink()'d, and "mv" returns an error to the shell. This can also result in the loss of a file. PROBLEM: (BCSM40LZ1, 79464) (PATCH ID: OSF445-104) ******** This patch corrects the problem with the mv(1) command deleting files in the directory when the user moves a directory to itself. PROBLEM: (BCSM40LZ1, 79464) (PATCH ID: OSF445-096) ******** This patch corrects the problem with the mv(1) command deleting files in the directory when the user moves a directory to itself. FILES: ./sbin/mv CHECKSUM: 07486 208 SUBSET: OSFBASE445 ./usr/bin/mv/mv.c,v RCS ID: 4.2.28.1 ./usr/bin/mv CHECKSUM: 08031 24 SUBSET: OSFBASE445 ./usr/bin/mv/mv.c,v RCS ID: 4.2.28.3 SUPPORT NOTES: NONE ---------------------------------------------------------- NEW PATCHID: 105.00 PATCH ID: OSF445-098 REQUIRED PATCHES: NONE CONDITIONALLY REQUIRED PATCHES: NONE SUPERSEDED PATCHES: NONE SPECIAL INSTRUCTIONS: NONE FULL DESCRIPTION: PROBLEM: (UTO97639A) (PATCH ID: OSF445-098) ******** This patch prevents warning messages of 'not currently mounted' from displaying for filessyetsm you did not request to umount. An example follows: # umount -a -t ufs /test5: not currently mounted <==== These are AdVFS filesystems /test2: not currently mounted /test1: not currently mounted FILES: ./sbin/umount CHECKSUM: 16359 368 SUBSET: OSFBASE445 ./usr/sbin/umount/umount.c,v RCS ID: 4.2.61.1 ./usr/sbin/umount CHECKSUM: 48774 32 SUBSET: OSFBASE445 ./usr/sbin/umount/umount.c,v RCS ID: 4.2.61.1 SUPPORT NOTES: NONE ---------------------------------------------------------- NEW PATCHID: 135.00 PATCH ID: OSF445-099 REQUIRED PATCHES: NONE CONDITIONALLY REQUIRED PATCHES: NONE SUPERSEDED PATCHES: OSF445-097 (133.00) SPECIAL INSTRUCTIONS: NONE FULL DESCRIPTION: PROBLEM: (BEJAL8049) (PATCH ID: OSF445-097) ******** When running ATM Lan Emulation, using more than 4 ATM Netrain interfaces can result in recursive calls causing a kernel stack not valid halt. PROBLEM: (HPAQ70S7B) (PATCH ID: OSF445-099) ******** This patch fixes a problem of ATM LAN emulation failing to come up when the using the ATM Meteor 351 board. FILES: ./sys/BINARY/lane.mod CHECKSUM: 18610 362 SUBSET: OSFATMBIN445 ./kernel/net/if_lane/cm_sap_shim.c,v RCS ID: 1.1.75.2 SUPPORT NOTES: NONE ---------------------------------------------------------- NEW PATCHID: 178.00 PATCH ID: OSF445-102 REQUIRED PATCHES: NONE CONDITIONALLY REQUIRED PATCHES: NONE SUPERSEDED PATCHES: NONE SPECIAL INSTRUCTIONS: NONE FULL DESCRIPTION: PROBLEM: (78368) (PATCH ID: OSF445-102) ******** The what command will process only the first file provided to it in a list of input files. This is true if the input is provided as a wild card or if multiple files names are explicitely provided. FILES: ./usr/bin/what CHECKSUM: 12399 256 SUBSET: OSFBASE445 ./usr/bin/sccs/what.c,v RCS ID: 4.2.22.1 SUPPORT NOTES: NONE ---------------------------------------------------------- NEW PATCHID: 157.00 PATCH ID: OSF445-105 REQUIRED PATCHES: NONE CONDITIONALLY REQUIRED PATCHES: NONE SUPERSEDED PATCHES: NONE SPECIAL INSTRUCTIONS: NONE FULL DESCRIPTION: PROBLEM: (80175, 80012) (PATCH ID: OSF445-105) ******** This patch fixes a problem in which the bootlink can fail on alphastations 600, 600A, 500/400 FILES: ./osf_boot CHECKSUM: 03533 88 SUBSET: OSFHWBASE445 SUPPORT NOTES: NONE ---------------------------------------------------------- NEW PATCHID: 114.00 PATCH ID: OSF445-106 REQUIRED PATCHES: NONE CONDITIONALLY REQUIRED PATCHES: NONE SUPERSEDED PATCHES: NONE SPECIAL INSTRUCTIONS: NONE FULL DESCRIPTION: PROBLEM: (MGO59344C, 80674) (PATCH ID: OSF445-106) ******** This patch is to prevent a hang that can occur using NFS over TCP. Many NFS TCP server threads will be blocked for several minutes and their stack trace will look like the following: 0 thread_block 1 mpsleep 2 sosleep 3 sosbwait 4 sosend 5 xdrrecmbuf_send 6 svcktcp_reply 7 svc_sendreply 8 rfs_sendreply 9 rfs_dispatch 10 nfs_rpc_recv 11 nfs_tcp_thread This problem is a race condition and will only be seen on SMP systems. FILES: ./sys/BINARY/nfs.mod CHECKSUM: 39603 389 SUBSET: OSFBIN445 ./kernel/rpc/clnt_ktcp.c,v RCS ID: 1.1.48.1 ./kernel/rpc/xdr_mbuf.c,v RCS ID: 1.1.50.1 SUPPORT NOTES: NONE ---------------------------------------------------------- NEW PATCHID: 122.00 PATCH ID: OSF445-107 REQUIRED PATCHES: NONE CONDITIONALLY REQUIRED PATCHES: NONE SUPERSEDED PATCHES: NONE SPECIAL INSTRUCTIONS: NONE FULL DESCRIPTION: PROBLEM: (BCGM4134M, BCPM71NXQ, BRO45678A, BCGM814ON, BCPM51JZ6, 81811, 77292, 79179, 84598 N/A) (PATCH ID: OSF445-107) ******** This patch upgrades sys_check utility to version 119.1 and provides the following changes: - fixes two NFS problems - fixes the ra200info tool from core dumping - utilizes Compaq ANalyze when available - utilizes storages new cliscript tool in place of hszterm - update asu section FILES: ./usr/lbin/ra200info CHECKSUM: 00457 40 SUBSET: OSFSERVICETOOLS445 ./usr/lbin/binex CHECKSUM: 61446 32 SUBSET: OSFSERVICETOOLS445 ./usr/sbin/sys_check/binex/binex.c,v RCS ID: 1.1.11.1 ./usr/lbin/adm_lk CHECKSUM: 26242 16 SUBSET: OSFSERVICETOOLS445 ./usr/lbin/cliscript4 CHECKSUM: 49948 1528 SUBSET: OSFSERVICETOOLS445 ./usr/sbin/sys_check CHECKSUM: 51876 630 SUBSET: OSFSERVICETOOLS445 SUPPORT NOTES: NONE ---------------------------------------------------------- NEW PATCHID: 93.00 PATCH ID: OSF445-108 REQUIRED PATCHES: NONE CONDITIONALLY REQUIRED PATCHES: OSF445-112B (95.00) SUPERSEDED PATCHES: OSF445-001 (14.00), OSF445-023 (81.00), OSF445-025 (29.00), OSF445-031 (35.00), OSF445-112A (91.00) SPECIAL INSTRUCTIONS: NONE FULL DESCRIPTION: PROBLEM: (79556) (PATCH ID: OSF445-001) ******** The output string for the swprintf() interface was not NULL terminated. PROBLEM: (79876) (PATCH ID: OSF445-023) ******** If the "where" or "t" ladebug command does not show all the currently active functions, it may be because of this problem. The program being debugged had to have been built with "split procedures", which is done via options in the om and spike tools. For spike, split procedures are generated if profiling is specified. For om, split procedures are generated if profiling AND the -split_procedure option are specified. PROBLEM: (TKTR30011, 78909) (PATCH ID: OSF445-025) ******** If a code segment contained a gmtime() call between calls to tzset(), or any function specified to call tzset() (such as localtime(), mktime(), strftime(), etc) , the tzname[0] array could contain erroneous time zone data referring to the "GMT" zone abbreviation instead of the local time zone, as specified in the TZ environment variable or default time zone for the system. PROBLEM: (62211) (PATCH ID: OSF445-031) ******** This fix increases the length of the user names for rsh and rexec to allow for NT interoperabilty. PROBLEM: (72100, 74961, 75971, 77080, 77288, 79588) (PATCH ID: OSF445-112) ******** Threaded applications which make extensive use of synchronization objects (mutexes, condition variables) may encounter performance and scaling regressions when run on some EV6 SMP machines. Customers encountering these regressions may observe negative scaling, decreased application throughput and increased CPU utilitzation, as the number of EV6 CPUs is increased. This version of DECthreads contains changes to the implementation of synchronization objects and thread scheduling around those objects to improve performance on all SMP systems. No functional or interface changes were made. PROBLEM: (BCSM807S5) (PATCH ID: OSF445-108) ******** Some applications assume that initial allocations of memory from the C run-time library's malloc() function will return zero-filled memory. The problem is that malloc() and free() often write into the first 16 bytes of the allocated memory. This change to malloc() zeros out the first 16 bytes in the allocated memory. The result is that memory allocated prior to any call to free() -- and prior to any other run-time library function that might call free -- should be zero filled. FILES: ./usr/ccs/lib/libc_r.a CHECKSUM: 65059 2016 SUBSET: OSFCMPLRS445 ./usr/ccs/lib/libc/TIS/cma_tis_errno_obs.c,v RCS ID: 1.1.13.2 ./usr/ccs/lib/libc/TIS/cma_tis_obs.c,v RCS ID: 1.1.13.2 ./usr/ccs/lib/libc/TIS/tis.c,v RCS ID: 1.1.17.2 ./usr/ccs/lib/libc/TIS/tis_pthread.c,v RCS ID: 1.1.14.2 ./usr/ccs/lib/libc/TIS/tis_rwlock.c,v RCS ID: 1.1.14.2 ./usr/ccs/lib/libc/alpha/alpha_unwind.c,v RCS ID: 1.1.48.1 ./usr/ccs/lib/libc/alpha/schyield.s,v RCS ID: 1.1.21.1 ./usr/ccs/lib/libc/ctime.c,v RCS ID: 4.4.48.1 ./usr/ccs/lib/libc/malloc.c,v RCS ID: 4.2.102.1 ./usr/ccs/lib/libc/ruserpass.c,v RCS ID: 4.2.22.1 ./usr/ccs/lib/libc/wprintf.c,v RCS ID: 1.1.29.1 ./usr/ccs/lib/libc.a CHECKSUM: 65059 2016 SUBSET: OSFCMPLRS445 ./usr/ccs/lib/libc/TIS/cma_tis_errno_obs.c,v RCS ID: 1.1.13.2 ./usr/ccs/lib/libc/TIS/cma_tis_obs.c,v RCS ID: 1.1.13.2 ./usr/ccs/lib/libc/TIS/tis.c,v RCS ID: 1.1.17.2 ./usr/ccs/lib/libc/TIS/tis_pthread.c,v RCS ID: 1.1.14.2 ./usr/ccs/lib/libc/TIS/tis_rwlock.c,v RCS ID: 1.1.14.2 ./usr/ccs/lib/libc/alpha/alpha_unwind.c,v RCS ID: 1.1.48.1 ./usr/ccs/lib/libc/alpha/schyield.s,v RCS ID: 1.1.21.1 ./usr/ccs/lib/libc/ctime.c,v RCS ID: 4.4.48.1 ./usr/ccs/lib/libc/malloc.c,v RCS ID: 4.2.102.1 ./usr/ccs/lib/libc/ruserpass.c,v RCS ID: 4.2.22.1 ./usr/ccs/lib/libc/wprintf.c,v RCS ID: 1.1.29.1 ./usr/shlib/libpthreaddebug.so CHECKSUM: 60186 600 SUBSET: OSFBASE445 ./usr/ccs/lib/libpthread/thd_debug.c,v RCS ID: 1.1.31.2 ./usr/ccs/lib/libpthread/thd_debug_api.c,v RCS ID: 1.1.30.2 ./usr/ccs/lib/libpthread/thd_debug_cache.c,v RCS ID: 1.1.27.2 ./usr/ccs/lib/libpthread/thd_debug_client.c,v RCS ID: 1.1.31.2 ./usr/ccs/lib/libpthread/thd_debug_fetch.c,v RCS ID: 1.1.23.2 ./usr/ccs/lib/libpthread/thd_debug_misc.c,v RCS ID: 1.1.40.2 ./usr/ccs/lib/libpthread/thd_debug_queue.c,v RCS ID: 1.1.25.2 ./usr/ccs/lib/libpthread/thd_debug_strs.c,v RCS ID: 1.1.27.2 ./usr/ccs/lib/libpthread/thd_debug_sync.c,v RCS ID: 1.1.27.2 ./usr/ccs/lib/libpthread/thd_debug_thd.c,v RCS ID: 1.1.37.2 ./usr/ccs/lib/libpthread/thd_debug_trace.c,v RCS ID: 1.1.31.2 ./usr/ccs/lib/libpthread/thd_put.c,v RCS ID: 1.1.26.2 ./usr/ccs/lib/libpthread/thd_util.c,v RCS ID: 1.1.30.2 ./usr/ccs/lib/libpthread/unix/alpha/thd_debug_host.c,v RCS ID: 1.1.14.1 ./usr/ccs/lib/libpthread/unix/thd_debug_os.c,v RCS ID: 1.1.26.2 ./usr/ccs/lib/libpthread/vms/alpha/thd_debug_host.c,v RCS ID: 1.1.14.1 ./usr/ccs/lib/libpthread/vms/thd_debug_os.c,v RCS ID: 1.1.26.2 ./usr/ccs/lib/libpthread/vms/vax/thd_debug_host.c,v RCS ID: 1.1.14.1 ./shlib/.upd..libc_r.so CHECKSUM: 31204 1634 SUBSET: OSFBASE445 ./usr/ccs/lib/libc/TIS/cma_tis_errno_obs.c,v RCS ID: 1.1.13.2 ./usr/ccs/lib/libc/TIS/cma_tis_obs.c,v RCS ID: 1.1.13.2 ./usr/ccs/lib/libc/TIS/tis.c,v RCS ID: 1.1.17.2 ./usr/ccs/lib/libc/TIS/tis_pthread.c,v RCS ID: 1.1.14.2 ./usr/ccs/lib/libc/TIS/tis_rwlock.c,v RCS ID: 1.1.14.2 ./usr/ccs/lib/libc/alpha/alpha_unwind.c,v RCS ID: 1.1.48.1 ./usr/ccs/lib/libc/alpha/schyield.s,v RCS ID: 1.1.21.1 ./usr/ccs/lib/libc/ctime.c,v RCS ID: 4.4.48.1 ./usr/ccs/lib/libc/malloc.c,v RCS ID: 4.2.102.1 ./usr/ccs/lib/libc/ruserpass.c,v RCS ID: 4.2.22.1 ./usr/ccs/lib/libc/wprintf.c,v RCS ID: 1.1.29.1 ./shlib/.upd..libc.so CHECKSUM: 31204 1634 SUBSET: OSFBASE445 ./usr/ccs/lib/libc/TIS/cma_tis_errno_obs.c,v RCS ID: 1.1.13.2 ./usr/ccs/lib/libc/TIS/cma_tis_obs.c,v RCS ID: 1.1.13.2 ./usr/ccs/lib/libc/TIS/tis.c,v RCS ID: 1.1.17.2 ./usr/ccs/lib/libc/TIS/tis_pthread.c,v RCS ID: 1.1.14.2 ./usr/ccs/lib/libc/TIS/tis_rwlock.c,v RCS ID: 1.1.14.2 ./usr/ccs/lib/libc/alpha/alpha_unwind.c,v RCS ID: 1.1.48.1 ./usr/ccs/lib/libc/alpha/schyield.s,v RCS ID: 1.1.21.1 ./usr/ccs/lib/libc/ctime.c,v RCS ID: 4.4.48.1 ./usr/ccs/lib/libc/malloc.c,v RCS ID: 4.2.102.1 ./usr/ccs/lib/libc/ruserpass.c,v RCS ID: 4.2.22.1 ./usr/ccs/lib/libc/wprintf.c,v RCS ID: 1.1.29.1 ./usr/sbin/rexecd CHECKSUM: 30029 24 SUBSET: OSFCLINET445 ./usr/sbin/rexecd/rexecd.c,v RCS ID: 4.2.31.1 ./usr/sbin/rshd CHECKSUM: 48256 32 SUBSET: OSFCLINET445 ./usr/sbin/rshd/rshd.c,v RCS ID: 4.2.53.1 ./usr/shlib/libpthread.so CHECKSUM: 55244 568 SUBSET: OSFBASE445 ./usr/ccs/lib/libpthread/thd_cancel.c,v RCS ID: 1.1.27.2 ./usr/ccs/lib/libpthread/thd_cond.c,v RCS ID: 1.1.37.2 ./usr/ccs/lib/libpthread/thd_config.c,v RCS ID: 1.1.37.2 ./usr/ccs/lib/libpthread/thd_deb_core.c,v RCS ID: 1.1.37.2 ./usr/ccs/lib/libpthread/thd_deb_event.c,v RCS ID: 1.1.28.2 ./usr/ccs/lib/libpthread/thd_debug_strs.c,v RCS ID: 1.1.27.2 ./usr/ccs/lib/libpthread/thd_dispatch.c,v RCS ID: 1.1.50.2 ./usr/ccs/lib/libpthread/thd_errors.c,v RCS ID: 1.1.33.2 ./usr/ccs/lib/libpthread/thd_exception.c,v RCS ID: 1.1.29.2 ./usr/ccs/lib/libpthread/thd_init.c,v RCS ID: 1.1.48.2 ./usr/ccs/lib/libpthread/thd_kernel.c,v RCS ID: 1.1.37.2 ./usr/ccs/lib/libpthread/thd_lock.c,v RCS ID: 1.1.21.1 ./usr/ccs/lib/libpthread/thd_mutex.c,v RCS ID: 1.1.38.2 ./usr/ccs/lib/libpthread/thd_object.c,v RCS ID: 1.1.26.1 ./usr/ccs/lib/libpthread/thd_paddock.c,v RCS ID: 1.1.27.2 ./usr/ccs/lib/libpthread/thd_put.c,v RCS ID: 1.1.26.2 ./usr/ccs/lib/libpthread/thd_rwlock.c,v RCS ID: 1.1.29.2 ./usr/ccs/lib/libpthread/thd_sched.c,v RCS ID: 1.1.65.2 ./usr/ccs/lib/libpthread/thd_stack.c,v RCS ID: 1.1.37.2 ./usr/ccs/lib/libpthread/thd_thread.c,v RCS ID: 1.1.57.2 ./usr/ccs/lib/libpthread/thd_timer.c,v RCS ID: 1.1.32.2 ./usr/ccs/lib/libpthread/thd_tis_sup.c,v RCS ID: 1.1.30.2 ./usr/ccs/lib/libpthread/thd_trace.c,v RCS ID: 1.1.31.2 ./usr/ccs/lib/libpthread/thd_trace_log.c,v RCS ID: 1.1.36.2 ./usr/ccs/lib/libpthread/thd_tsd.c,v RCS ID: 1.1.29.2 ./usr/ccs/lib/libpthread/thd_util.c,v RCS ID: 1.1.30.2 ./usr/ccs/lib/libpthread/thd_vm.c,v RCS ID: 1.1.31.2 ./usr/ccs/lib/libpthread/unix/alpha/thd_assem.s,v RCS ID: 1.1.31.2 ./usr/ccs/lib/libpthread/unix/thd_exception_os.c,v RCS ID: 1.1.34.2 ./usr/ccs/lib/libpthread/unix/thd_host.c,v RCS ID: 1.1.31.2 ./usr/ccs/lib/libpthread/unix/thd_message.c,v RCS ID: 1.1.28.2 ./usr/ccs/lib/libpthread/unix/thd_os.c,v RCS ID: 1.1.31.2 ./usr/ccs/lib/libpthread/unix/thd_scs.c,v RCS ID: 1.1.32.2 ./usr/ccs/lib/libpthread/unix/thd_shlib.c,v RCS ID: 1.1.22.2 ./usr/ccs/lib/libpthread/unix/thd_signal.c,v RCS ID: 1.1.36.2 ./usr/ccs/lib/libpthread/unix/thd_upcalls.c,v RCS ID: 1.1.32.2 ./usr/ccs/lib/libpthread/unix/thd_ux.c,v RCS ID: 1.1.28.2 ./usr/ccs/lib/libpthread/unix/thd_vp.c,v RCS ID: 1.1.38.2 ./usr/ccs/lib/libpthread/vms/thd_exception_os.c,v RCS ID: 1.1.34.2 ./usr/ccs/lib/libpthread/vms/thd_os.c,v RCS ID: 1.1.31.2 ./usr/ccs/lib/libpthread/vms/thd_upcalls.c,v RCS ID: 1.1.32.2 ./usr/ccs/lib/libpthread/vms/thd_vp.c,v RCS ID: 1.1.38.2 SUPPORT NOTES: NONE ---------------------------------------------------------- NEW PATCHID: 201.00 PATCH ID: OSF445-109 REQUIRED PATCHES: NONE CONDITIONALLY REQUIRED PATCHES: OSF445X11-011 (194.00) SUPERSEDED PATCHES: OSF445-063 (67.00), OSF445-111 (130.00), OSF445-113 (192.00) SPECIAL INSTRUCTIONS: SPECIAL INSTRUCTIONS FOR Tru64 UNIX V4.0G Patch 201.00 WARNING! This patch provides the driver support for the 3DLabs Oxygen VX1 graphics card. In order to obtain full support for this graphics card, you must also select Patch 194.00, which is the X server portion of the patch. If you have a system with this graphics card, you will need to reconfigure and rebuild the kernel after installing this patch. To do this, boot genvmunix and run doconfig without the "-c" option to recreate the kernel configuration file and rebuild the kernel. See the Patch Summary and Release Notes for further information. If you are going to remove this patch, please see the Patch Summary and Release Notes for further information; not doing so may result in an unusable system. FULL DESCRIPTION: PROBLEM: (79675, 79343) (PATCH ID: OSF445-063) ******** This patch updates the emx Fiber Channel driver to revision 1.22, correcting the following problem: Command timeout problem seen in large configurations. Commands would not be transmitted to the device correctly and would hang on the bus. Other commands would finish successfully while these commands were hung. The adapter would then timeout the command and abort it. This behavior was causing a decrease in performance. PROBLEM: (BCPM804R1) (PATCH ID: OSF445-111) ******** This patch fixes the following DE600/DE602 10/100 Ethernet adapters problems: - the primary CPU may appear hung on networks where switches send "Flow Control Pause" frames if they become overloaded, and - transmit timeout messages appearing in the console log due to the driver timing out a frame. PROBLEM: (none) (PATCH ID: OSF445-113) ******** This patch provides the device driver support for 3DLabs Oxygen VX1 graphics adapter. PROBLEM: (none) (PATCH ID: OSF445-109) ******** This patch provides support for the DEGPA-TA (1000BaseT) Gigabit Ethernet device. FILES: ./sys/BINARY/p3g.mod CHECKSUM: 25905 32 SUBSET: OSFHWBIN445 ./kernel/io/dec/ws/p3.c,v RCS ID: 1.1.12.1 ./genvmunix CHECKSUM: 07216 10315 SUBSET: OSFHWBASE445 ./kernel/data/device_data.c,v RCS ID: 1.1.18.1 ./kernel/data/pci_option_data.c,v RCS ID: 1.1.183.2 ./kernel/io/dec/ws/p3.c,v RCS ID: 1.1.12.1 ./sys/BINARY/alt.mod CHECKSUM: 57513 108 SUBSET: OSFHWBIN445 ./usr/sys/conf/alpha/files CHECKSUM: 22156 46 SUBSET: OSFBINCOM445 ./usr/sys/BINARY/p3g.mod CHECKSUM: 00000 0 SUBSET: OSFHWBIN445 ./usr/sys/include/io/dec/pci/pci.h CHECKSUM: 22398 56 SUBSET: OSFBINCOM445 ./kernel/io/dec/pci/pci.h,v RCS ID: 1.1.114.1 ./sys/BINARY/emx.mod CHECKSUM: 00874 544 SUBSET: OSFHWBIN445 ./usr/sys/conf/GENERIC CHECKSUM: 20480 39 SUBSET: OSFBINCOM445 ./usr/sys/data/device_data.c CHECKSUM: 44028 24 SUBSET: OSFBINCOM445 ./kernel/data/device_data.c,v RCS ID: 1.1.18.1 ./sys/BINARY/ee.mod CHECKSUM: 42405 42 SUBSET: OSFHWBIN445 ./usr/sys/data/pci_option_data.c CHECKSUM: 56965 24 SUBSET: OSFBINCOM445 ./kernel/data/pci_option_data.c,v RCS ID: 1.1.183.2 SUPPORT NOTES: NONE ---------------------------------------------------------- NEW PATCHID: 95.00 PATCH ID: OSF445-112B REQUIRED PATCHES: OSF445-108 (93.00) CONDITIONALLY REQUIRED PATCHES: NONE SUPERSEDED PATCHES: NONE SPECIAL INSTRUCTIONS: NONE FULL DESCRIPTION: PROBLEM: (72100, 74961, 75971, 77080, 77288, 79588) (PATCH ID: OSF445-112) ******** Threaded applications which make extensive use of synchronization objects (mutexes, condition variables) may encounter performance and scaling regressions when run on some EV6 SMP machines. Customers encountering these regressions may observe negative scaling, decreased application throughput and increased CPU utilitzation, as the number of EV6 CPUs is increased. This version of DECthreads contains changes to the implementation of synchronization objects and thread scheduling around those objects to improve performance on all SMP systems. No functional or interface changes were made. FILES: ./usr/include/dce/cma.h CHECKSUM: 53715 22 SUBSET: OSFINCLUDE445 ./usr/ccs/lib/libpthreads/cma.h,v RCS ID: 1.1.24.2 ./usr/include/tis.h CHECKSUM: 14672 29 SUBSET: OSFINCLUDE445 ./usr/ccs/lib/libc/TIS/tis.h,v RCS ID: 1.1.14.2 ./usr/include/pthread_trace.h CHECKSUM: 06215 45 SUBSET: OSFINCLUDE445 ./usr/ccs/lib/libpthread/pthread_trace.h,v RCS ID: 1.1.35.2 ./usr/include/pthread.h CHECKSUM: 13523 70 SUBSET: OSFINCLUDE445 ./usr/ccs/lib/libpthread/pthread.h,v RCS ID: 1.1.58.2 ./usr/include/pthread_debug.h CHECKSUM: 14344 133 SUBSET: OSFINCLUDE445 ./usr/ccs/lib/libpthread/pthread_debug.h,v RCS ID: 1.1.30.2 ./usr/include/pthread_exception.h CHECKSUM: 20094 41 SUBSET: OSFINCLUDE445 ./usr/ccs/lib/libpthread/pthread_exception.h,v RCS ID: 1.1.33.2 SUPPORT NOTES: NONE ---------------------------------------------------------- NEW PATCHID: 151.00 PATCH ID: OSF445-114 REQUIRED PATCHES: NONE CONDITIONALLY REQUIRED PATCHES: NONE SUPERSEDED PATCHES: NONE SPECIAL INSTRUCTIONS: NONE FULL DESCRIPTION: PROBLEM: (81295, 81296, 81562, 81563) (PATCH ID: OSF445-114) ******** This patch fixes following problems with the collect command and it adds sysloging when collect suspends, resumes, or receives a signal. - Collect always returns 0 for tape status, - Collect does not display proper PID and PPID on heavily loaded system, - Collect displays warning msg when a HSG80 controller installed, - Collect does not display proper Net status on heavily used network, - Collect does not align MessageQ data properly when the ID field is large, and - Collect does not compute Usertime and Systemtime correctly for processes whose pids are recycled. FILES: ./usr/sbin/collect CHECKSUM: 52338 248 SUBSET: OSFSERVICETOOLS445 ./usr/sbin/collect/collector/buffer.c,v RCS ID: 1.1.23.1 ./usr/sbin/collect/collector/collect.c,v RCS ID: 1.1.31.1 ./usr/sbin/collect/collector/collect.h,v RCS ID: 1.1.30.1 ./usr/sbin/collect/collector/log.c,v RCS ID: 1.1.24.1 ./usr/sbin/collect/collector/mem.c,v RCS ID: 1.1.26.1 ./usr/sbin/collect/collector/misc.c,v RCS ID: 1.1.30.1 ./usr/sbin/collect/collector/mqueue.c,v RCS ID: 1.1.23.1 ./usr/sbin/collect/collector/net.c,v RCS ID: 1.1.23.1 ./usr/sbin/collect/collector/on_disk.h,v RCS ID: 1.1.26.1 ./usr/sbin/collect/collector/play.c,v RCS ID: 1.1.26.1 ./usr/sbin/collect/collector/proc.c,v RCS ID: 1.1.28.1 ./usr/sbin/collect/collector/storage.c,v RCS ID: 1.1.27.1 SUPPORT NOTES: NONE ---------------------------------------------------------- NEW PATCHID: 140.00 PATCH ID: OSF445-115 REQUIRED PATCHES: NONE CONDITIONALLY REQUIRED PATCHES: NONE SUPERSEDED PATCHES: OSF445-072 (79.00), OSF445-082 (138.00) SPECIAL INSTRUCTIONS: NONE FULL DESCRIPTION: PROBLEM: (80620) (PATCH ID: OSF445-072) ******** This patch fixes a printing problem where lpd reads any data from the printer that has not been read, for local and remote connections. The read-backs for remote connections cause an additional 2 second timeout which may cause a job-submit failure on the job-number wrap-around. This patch fixes the problem by performing the read-backs for local connections only. PROBLEM: (78515, 80638, 80639, 80877) (PATCH ID: OSF445-082) ******** This patch fixes the following four printing problems: - A user is unable to delete a print job from a remote system with a hostname greater than 32 characters because the hostname was truncated. - When a TCP/IP connection fails, the retry algorithm would take longer to print jobs due to a long retry interval. - A timing hole during lpd last-job completion and shutdown needed to be closed. - It was not possible to print to the lpd queue using Windows 2000. PROBLEM: (76329, 76559) (PATCH ID: OSF445-115) ******** This patch corrects a problem in which, under certain conditions, unnecessary error messages are written to the lpr.log file. FILES: ./usr/bin/lpq CHECKSUM: 11178 64 SUBSET: OSFPRINT445 ./usr/sbin/lpd/common.c,v RCS ID: 4.2.63.2 ./usr/sbin/lpd/lp.h,v RCS ID: 4.2.50.1 ./usr/bin/lpr CHECKSUM: 50873 72 SUBSET: OSFPRINT445 ./usr/sbin/lpd/common.c,v RCS ID: 4.2.63.2 ./usr/sbin/lpd/lp.h,v RCS ID: 4.2.50.1 ./usr/sbin/lpd/lpr.c,v RCS ID: 4.2.83.1 ./usr/sbin/lpd/common.c,v RCS ID: 4.2.63.2 ./usr/sbin/lpd/lp.h,v RCS ID: 4.2.50.1 ./usr/sbin/lpc CHECKSUM: 30751 72 SUBSET: OSFPRINT445 ./usr/sbin/lpd/common.c,v RCS ID: 4.2.63.2 ./usr/sbin/lpd/lp.h,v RCS ID: 4.2.50.1 ./usr/bin/lpstat CHECKSUM: 15550 32 SUBSET: OSFPRINT445 ./usr/sbin/lpd/lp.h,v RCS ID: 4.2.50.1 ./usr/bin/lp CHECKSUM: 11178 64 SUBSET: OSFPRINT445 ./usr/sbin/lpd/lp.h,v RCS ID: 4.2.50.1 ./usr/sbin/lpd/common.c,v RCS ID: 4.2.63.2 ./usr/sbin/lpd/lp.h,v RCS ID: 4.2.50.1 ./usr/sbin/lpd/common.c,v RCS ID: 4.2.63.2 ./usr/sbin/lpd/lp.h,v RCS ID: 4.2.50.1 ./usr/sbin/lpd/lpr.c,v RCS ID: 4.2.83.1 ./usr/sbin/lpd/common.c,v RCS ID: 4.2.63.2 ./usr/sbin/lpd/lp.h,v RCS ID: 4.2.50.1 ./usr/sbin/lpd/lp.h,v RCS ID: 4.2.50.1 ./usr/sbin/pac CHECKSUM: 46496 24 SUBSET: OSFBASE445 ./usr/sbin/lpd/lp.h,v RCS ID: 4.2.50.1 ./usr/sbin/lptest CHECKSUM: 57382 16 SUBSET: OSFPRINT445 ./usr/sbin/lpd/lp.h,v RCS ID: 4.2.50.1 ./usr/bin/lprm CHECKSUM: 19138 56 SUBSET: OSFPRINT445 ./usr/sbin/lpd/common.c,v RCS ID: 4.2.63.2 ./usr/sbin/lpd/lp.h,v RCS ID: 4.2.50.1 ./usr/lbin/lpd CHECKSUM: 23593 136 SUBSET: OSFPRINT445 ./usr/sbin/lpd/common.c,v RCS ID: 4.2.63.2 ./usr/sbin/lpd/lp.h,v RCS ID: 4.2.50.1 ./usr/sbin/lpd/lpd.c,v RCS ID: 4.2.63.1 ./usr/sbin/lpd/printjob.c,v RCS ID: 4.3.103.2 SUPPORT NOTES: NONE ---------------------------------------------------------- NEW PATCHID: 124.00 PATCH ID: OSF445-117 REQUIRED PATCHES: NONE CONDITIONALLY REQUIRED PATCHES: NONE SUPERSEDED PATCHES: NONE SPECIAL INSTRUCTIONS: NONE FULL DESCRIPTION: PROBLEM: (81592) (PATCH ID: OSF445-117) ******** The problem is that the config file that is created using the target kernel has characters that are not valid. This problem occurred on Compaq AlphaServer DS20 and ES40 systems. FILES: ./usr/sbin/sizer CHECKSUM: 62847 288 SUBSET: OSFHWBASE445 ./usr/sbin/sizer/sizer.c,v RCS ID: 4.2.43.1 SUPPORT NOTES: NONE ---------------------------------------------------------- NEW PATCHID: 97.00 PATCH ID: OSF445-118 REQUIRED PATCHES: NONE CONDITIONALLY REQUIRED PATCHES: NONE SUPERSEDED PATCHES: OSF445-044 (49.00) SPECIAL INSTRUCTIONS: NONE FULL DESCRIPTION: PROBLEM: (78638) (PATCH ID: OSF445-0044) ******** This patch extends the maximum length of an identifier from the current limit of 1024 characters to a new maximum length of 16 * 1024. Identifiers longer than 1024 characters are rare, but they do occur when assembler source files are generated by a source code generator. Before this change, an identifer that exceeded 1024 characters in length would result in an assembly-time error stating that the "line is too long". PROBLEM: (48207, 44356, IPMT, Request, n/a) (PATCH ID: OSF445-118) ******** QAR 48207 The assembler generates an invalid error message such as the following: as1: Error: bug1.s, line 137: lituse_base!-1305670057984 not preceeded by a literal! when assembling a valid program which produces a mix of hand-coded and assembler-generated relocation operands. It is the mix which causes the problem. So, a program which contains hand-coded relocation operands assembles correctly as long as it contains nothing which would cause an assembler-generated relocation to be emitted. QAR 44356 The assembler generates an incorrect error message such as the following: as1: Error: t.s, line 8: lituse_base!10 not matched to last literal!6 for a program which contains an unmatched "gpdisp" relocation operand. In this case, the program is an illegal program, but the error message which is generated is completely irrelevant to the actual problem. FILES: ./usr/ccs/lib/cmplrs/cc/as1 CHECKSUM: 19984 928 SUBSET: OSFCMPLRS445 ./usr/ccs/lib/cmplrs/cc/as0 CHECKSUM: 31421 632 SUBSET: OSFCMPLRS445 SUPPORT NOTES: NONE ---------------------------------------------------------- NEW PATCHID: 199.00 PATCH ID: OSF445-127 REQUIRED PATCHES: NONE CONDITIONALLY REQUIRED PATCHES: NONE SUPERSEDED PATCHES: OSF445-080 (82.00), OSF445-129 (197.00) SPECIAL INSTRUCTIONS: NONE FULL DESCRIPTION: PROBLEM: (#80500, #80226) (PATCH ID: OSF445-080) ******** Fix for incorrect header length in GS-series Hierarchical Switch machine check frames. Early revisions of PCA chips don't allow DMA Window3. PROBLEM: (81882) (PATCH ID: OSF445-129) ******** Under a specific set of unlikely circumstances it is possible for revision 4 PCA hardware to falsely report PCI hung bus errors, which will cause a uncorrectable hardware machine check and operating system panic. The following console error messages indicate this problem has occurred. The "PCI bus hung during Fault" text in the error message is the key to detecting this error. Note: the false PCI bus hung error only occurs with revision 4 PCA hardware. iop: ioa_err_sum = 0x100000000 Bit 32: Hose 0 PCA reported an Uncorrectable Error pca: pca_whatami = 0x8000034 Bit 2: ASIC revision Bit 4: Backplane revision Bit 5: Backplane revision Bit 27: Microprocessor present pca: pca_err_sum = 0x8000 Bit 15: PCI bus hung during Fault pca: ne_whatami = 0x100000302 pca: fe_whatami = 0x100000202 pca: pci0_err_sum = 0x10068000 Bit 15: PCI bus hung during Fault Bit 17: Failing PCI command Bit 18: Failing PCI command Bit 28: PCA was PCI initiator when bus was hung pca: pci0_err_addr = 0x2030000 pca: pci1_err_sum = 0x4060000 Bit 17: Failing PCI command Bit 18: Failing PCI command Bit 26: PCI slot that was active during the failure pca: pci1_err_addr = 0xc0011500 Machine Check SYSTEM Fatal Abort Machine check code = 0x100000202 Ibox Status = 0000000000000000 Dcache Status = 0000000000000000 Cbox Address = 0000000000000000 Fill Syndrome 1 = 0000000000000000 Fill Syndrome 0 = 0000000000000000 Cbox Status = 0000000000000000 EV6 captured status of Bcache mode = 0000000000000000 EV6 Exception Address = fffffc000097aff0 EV6 Interrupt Enablement and Current Processor mode = 0000007ee0000000 EV6 Interrupt Summary Register = 0000002000000000 EV6 TBmiss or Fault status = 0000000000000000 EV6 PAL Base Address = 0000000000020000 EV6 Ibox control = fffffffc0c306396 EV6 Ibox Process_context = 0000718000000004 Cpu Fault Summary = 0x1 QBB bit-directed reg. dump QBB 0 CSRs to be logged summary = 0x1100 QBB 1 CSRs to be logged summary = 0x0 QBB 2 CSRs to be logged summary = 0x0 QBB 3 CSRs to be logged summary = 0x0 QBB 4 CSRs to be logged summary = 0x0 QBB 5 CSRs to be logged summary = 0x0 QBB 6 CSRs to be logged summary = 0x0 QBB 7 CSRs to be logged summary = 0x0 panic (cpu 0): System Uncorrectable Machine Check PROBLEM: (81582) (PATCH ID: OSF445-127) ******** When an Alphaserver GS80, GS160, or GS320 system reaches a critical temperature, it will shut itself down as a precaution. This temperature is safe for the power supply's but the system will issue an enviromental warning and shut itself down. The fix to this problem is to no longer take into account the power supply's tempature when determining the system's tempature. FILES: ./sys/BINARY/wfcpu.mod CHECKSUM: 32885 53 SUBSET: OSFHWBIN445 ./kernel/arch/alpha/hal/wfcpu.c,v RCS ID: 1.1.32.1 ./kernel/arch/alpha/hal/wfcpu.h,v RCS ID: 1.1.14.1 ./kernel/arch/alpha/hal/wfpci.h,v RCS ID: 1.1.21.1 ./sys/BINARY/wfcpu_mult.mod CHECKSUM: 55046 56 SUBSET: OSFHWBIN445 ./kernel/arch/alpha/hal/wfcpu.c,v RCS ID: 1.1.32.1 ./kernel/arch/alpha/hal/wfcpu.h,v RCS ID: 1.1.14.1 ./kernel/arch/alpha/hal/wfpci.h,v RCS ID: 1.1.21.1 ./usr/sys/include/arch/alpha/hal/wfqbb.h CHECKSUM: 27419 61 SUBSET: OSFHWBINCOM445 ./kernel/arch/alpha/hal/wfqbb.h,v RCS ID: 1.1.16.1 ./sys/BINARY/wfpci.mod CHECKSUM: 51582 143 SUBSET: OSFHWBIN445 ./kernel/arch/alpha/hal/wfpci.c,v RCS ID: 1.1.28.1 ./kernel/arch/alpha/hal/wfpci.h,v RCS ID: 1.1.21.1 ./sys/BINARY/wfpci_mult.mod CHECKSUM: 26839 145 SUBSET: OSFHWBIN445 ./kernel/arch/alpha/hal/wfpci.c,v RCS ID: 1.1.28.1 ./kernel/arch/alpha/hal/wfpci.h,v RCS ID: 1.1.21.1 ./usr/sys/include/arch/alpha/hal/wfcpu.h CHECKSUM: 43338 84 SUBSET: OSFHWBINCOM445 ./kernel/arch/alpha/hal/wfcpu.h,v RCS ID: 1.1.14.1 ./usr/sys/include/arch/alpha/hal/wfpci.h CHECKSUM: 32963 34 SUBSET: OSFHWBINCOM445 ./kernel/arch/alpha/hal/wfpci.h,v RCS ID: 1.1.21.1 ./sys/BINARY/wfsrvmgmt.mod CHECKSUM: 53760 176 SUBSET: OSFHWBIN445 ./kernel/arch/alpha/hal/wfcpu.h,v RCS ID: 1.1.14.1 ./kernel/arch/alpha/hal/wfsrvmgmt.c,v RCS ID: 1.1.18.1 ./usr/sys/include/arch/alpha/hal/wfsrvmgmt.h CHECKSUM: 50168 31 SUBSET: OSFHWBINCOM445 ./kernel/arch/alpha/hal/wfsrvmgmt.h,v RCS ID: 1.1.8.1 ./usr/sys/include/arch/alpha/hal/cfgtree.h CHECKSUM: 22988 16 SUBSET: OSFHWBINCOM445 ./kernel/arch/alpha/hal/cfgtree.h,v RCS ID: 1.1.11.1 SUPPORT NOTES: NONE ---------------------------------------------------------- NEW PATCHID: 196.00 PATCH ID: OSF445-135 REQUIRED PATCHES: NONE CONDITIONALLY REQUIRED PATCHES: NONE SUPERSEDED PATCHES: NONE SPECIAL INSTRUCTIONS: NONE FULL DESCRIPTION: PROBLEM: (80541) (PATCH ID: OSF445-135) ******** Compaq has determined in laboratory testing that there is a theoretical possibility that during read and write operations to the floppy disk on DS10, DS10L and ES40 AlphaServers and VS10 and XP900 AlphaStations, a single byte of data may be inaccurately read or written without notice to the user or system. The potential for this anomaly exists only if floppy data read and write operations are attempted while there is extremely heavy traffic on these Alpha systems' internal input/output busses. Although Compaq has observed the anomaly only in laboratory tests designed to create atypical system stresses, including almost constant use of the floppy disk drive, we are supplying this patch to address this potential issue. FILES: ./sys/BINARY/fdi.mod CHECKSUM: 24079 75 SUBSET: OSFHWBIN445 ./kernel/io/dec/fdi/fd.c,v RCS ID: 1.1.64.1 ./kernel/io/dec/fdi/fdcam.c,v RCS ID: 1.1.76.1 SUPPORT NOTES: NONE ---------------------------------------------------------- NEW PATCHID: 2.00 PATCH ID: OSF445CDE-002 REQUIRED PATCHES: NONE CONDITIONALLY REQUIRED PATCHES: NONE SUPERSEDED PATCHES: NONE SPECIAL INSTRUCTIONS: NONE FULL DESCRIPTION: PROBLEM: (BCGM10D48) (PATCH ID: OSF445CDE-002) ******** This patch fixes a problem in which file permissions allow any user to write to the /.dt/Trash/.trashinfo file. FILES: ./usr/dt/bin/dtfile CHECKSUM: 07715 808 SUBSET: OSFCDEMIN445 ./cde1/dtfile/Trash.c,v RCS ID: 2.1.13.1 SUPPORT NOTES: NONE ---------------------------------------------------------- NEW PATCHID: 3.00 PATCH ID: OSF445CDE-003 REQUIRED PATCHES: NONE CONDITIONALLY REQUIRED PATCHES: NONE SUPERSEDED PATCHES: NONE SPECIAL INSTRUCTIONS: NONE FULL DESCRIPTION: PROBLEM: (HPAQC0KK9) (PATCH ID: OSF445CDE-003) ******** This patch fixes a problem where the Common Desktop Environment (CDE) Application Manager did not recreate the list of application groups at login. After customizing the application groups, users would see the old groups instead of the new groups. FILES: ./usr/dt/bin/dtappgather CHECKSUM: 04452 48 SUBSET: OSFCDEDT445 SUPPORT NOTES: NONE ---------------------------------------------------------- NEW PATCHID: 101.00 PATCH ID: OSF445CDE-004A REQUIRED PATCHES: NONE CONDITIONALLY REQUIRED PATCHES: OSF445CDE-004B (103.00) SUPERSEDED PATCHES: OSF445CDE-001A (1.00) SPECIAL INSTRUCTIONS: NONE FULL DESCRIPTION: PROBLEM: (ZUO16050A, 47503) (PATCH ID: OSF445CDE-001) ******** This patch fixes a problem in which dtfile ICDE COSE tool does not work when TMPDIR is defined as /ldata/disk_local/tmp. dtfile returns this error: /ldata/disk_local/tmp/sdtdbcache_AAAaadmma: Cross-device link /ldata/disk_local/tmp/sdtdbcache_BAAaadmma: Cross-device link Floating exception (core dumped) PROBLEM: (UVO41850, 46127) (PATCH ID: OSF445CDE-004) ******** This patch fixes a problem with the Common Desktop Environment (CDE) in which some desktop applications will fail if CDE is not initialized. The error which appears in the users home .dt/errorlog file is: Desktop Not Initialized: Could not createAction/Datatypes database. FILES: ./usr/dt/lib/libDtSvc.so CHECKSUM: 29478 624 SUBSET: OSFCDEMIN445 ./lib1/DtSvc/DtUtil1/ActionUtil.c,v RCS ID: 2.1.16.1 ./lib1/DtSvc/DtUtil1/DbLoad.c,v RCS ID: 2.1.10.1 ./lib1/DtSvc/DtUtil1/DtsMM.c,v RCS ID: 1.1.13.1 SUPPORT NOTES: NONE ---------------------------------------------------------- NEW PATCHID: 103.00 PATCH ID: OSF445CDE-004B REQUIRED PATCHES: OSF445CDE-004A (101.00) CONDITIONALLY REQUIRED PATCHES: NONE SUPERSEDED PATCHES: OSF445CDE-001B (83.00) SPECIAL INSTRUCTIONS: NONE FULL DESCRIPTION: PROBLEM: (ZUO16050A, 47503) (PATCH ID: OSF445CDE-001) ******** This patch fixes a problem in which dtfile ICDE COSE tool does not work when TMPDIR is defined as /ldata/disk_local/tmp. dtfile returns this error: /ldata/disk_local/tmp/sdtdbcache_AAAaadmma: Cross-device link /ldata/disk_local/tmp/sdtdbcache_BAAaadmma: Cross-device link Floating exception (core dumped) PROBLEM: (UVO41850, 46127) (PATCH ID: OSF445CDE-004) ******** This patch fixes a problem with the Common Desktop Environment (CDE) in which some desktop applications will fail if CDE is not initialized. The error which appears in the users home .dt/errorlog file is: Desktop Not Initialized: Could not createAction/Datatypes database. FILES: ./usr/dt/lib/libDtSvc.a CHECKSUM: 17196 746 SUBSET: OSFCDEDEV445 ./lib1/DtSvc/DtUtil1/ActionUtil.c,v RCS ID: 2.1.16.1 ./lib1/DtSvc/DtUtil1/DbLoad.c,v RCS ID: 2.1.10.1 ./lib1/DtSvc/DtUtil1/DtsMM.c,v RCS ID: 1.1.13.1 SUPPORT NOTES: NONE ---------------------------------------------------------- NEW PATCHID: 180.00 PATCH ID: OSF445CDE-005 REQUIRED PATCHES: NONE CONDITIONALLY REQUIRED PATCHES: NONE SUPERSEDED PATCHES: NONE SPECIAL INSTRUCTIONS: NONE FULL DESCRIPTION: PROBLEM: (BCSM40MFF) (PATCH ID: OSF445CDE-005) ******** This patch fixes a dtmail problem in which a "From" line with quotes in it incorrectly finds the date of the mail message. This error is displayed on the main screen under the header 'Date and Time' and shows up as Dec. 31 or as a blank field. FILES: ./usr/dt/bin/dtmail CHECKSUM: 20125 1072 SUBSET: OSFCDEMAIL445 SUPPORT NOTES: NONE ---------------------------------------------------------- NEW PATCHID: 132.00 PATCH ID: OSF445CDE-006 REQUIRED PATCHES: NONE CONDITIONALLY REQUIRED PATCHES: NONE SUPERSEDED PATCHES: NONE SPECIAL INSTRUCTIONS: NONE FULL DESCRIPTION: PROBLEM: (BRO25212A) (PATCH ID: OSF445CDE-006) ******** This patch fixes a problem where the Common Desktop Environment (CDE) login daemon, dtlogin, core dumps occasionally when servicing requests from XDMCP clients such as X terminals or PCs running X servers. FILES: ./usr/dt/bin/dtlogin CHECKSUM: 51034 176 SUBSET: OSFCDEDT445 ./cde1/dtlogin/protodpy.c,v RCS ID: 2.1.11.1 SUPPORT NOTES: NONE ---------------------------------------------------------- NEW PATCHID: 184.00 PATCH ID: OSF445CDE-007 REQUIRED PATCHES: NONE CONDITIONALLY REQUIRED PATCHES: NONE SUPERSEDED PATCHES: NONE SPECIAL INSTRUCTIONS: NONE FULL DESCRIPTION: PROBLEM: (HPAQ601QT, HPAQ40CH6, 80634) (PATCH ID: OSF445CDE-007) ******** This patch fixes a problem in which the Window Manager (dtwm) intermittently hangs on a system which uses multiple displays. FILES: ./usr/dt/bin/dtwm CHECKSUM: 55727 648 SUBSET: OSFCDEDT445 ./cde1/dtwm/WmFunction.c,v RCS ID: 2.1.16.1 ./cde1/dtwm/WmKeyFocus.c,v RCS ID: 2.1.14.1 ./cde1/dtwm/WmManage.c,v RCS ID: 2.1.12.1 SUPPORT NOTES: NONE ---------------------------------------------------------- NEW PATCHID: 159.00 PATCH ID: OSF445DX-004 REQUIRED PATCHES: NONE CONDITIONALLY REQUIRED PATCHES: NONE SUPERSEDED PATCHES: OSF445DX-001 (4.00), OSF445DX-002 (5.00), OSF445DX-003 (6.00) SPECIAL INSTRUCTIONS: NONE FULL DESCRIPTION: PROBLEM: (MGO27076A, 62626) (PATCH ID: OSF445DX-001) ******** This patch fixes a problem in which the dxaccounts application does not allow users to be added to groups with Group ID lower than the default minimum specified in the General Options dialog. PROBLEM: (63284, 64762, 76823, 77740) (PATCH ID: OSF445DX-002) ******** This patch fixes the following cli/dxaccounts problems: - the error message displayed when Account Manager fails to start due to the detection of an Account Manager lock file (/etc/.AM_is_running) is not clear. - a command 'uermod -D' does not display the 'Expire' date when it is set. For example: #usermod -D -e 01/01/01 (this will set the 'Expire' date in the default file to 01/01/01) #usermod -D (this should display all defaults values, but the 'Expire' value is not shown) Distributed = 0 Local = 1 Administrative Lock Applied = 1 Next User id = 200 Minimum User id = 12 Maximum User id = 65535 Primary Group = users,15 Base Directory = /usr/users Skeleton Directory = /usr/skel Shell = /bin/sh Inactive (days) = 60 Expire (date) = - enabling to change root's login/uid through cli/dxaccounts utilities. PROBLEM: (TKTB10045, UVO90893, BCGMB1D0D, UTO52178A, MGO83278A, UTO57196A) (PATCH ID: OSF445DX-003) ******** This patch fixes a problem in which dxaccounts does not allow the system manager to add NIS users when the system is running enhanced security. PROBLEM: (UTO73283A) (PATCH ID: OSF445DX-004) ******** When a new user id is created and the option to create a home directory for that user is chosen the new home directory will be created with the date and time stamp of the /usr/skel directory. FILES: ./usr/shlib/libaccmgr.so CHECKSUM: 21696 320 SUBSET: OSFSYSMAN445 ./sysman/dxaccounts/api/src/AM_Groupval.c,v RCS ID: 1.1.26.1 ./sysman/dxaccounts/api/src/AM_User.c,v RCS ID: 1.1.81.2 ./sysman/dxaccounts/api/src/AM_User_sec.c,v RCS ID: 1.1.48.1 ./usr/sbin/usermod CHECKSUM: 60103 56 SUBSET: OSFSYSMAN445 ./sysman/dxaccounts/cli/lib/cli_moduser.c,v RCS ID: 1.1.30.1 ./usr/bin/X11/dxaccounts CHECKSUM: 00305 464 SUBSET: OSFXSYSMAN445 SUPPORT NOTES: NONE ---------------------------------------------------------- NEW PATCHID: 190.00 PATCH ID: OSF445DX-005 REQUIRED PATCHES: NONE CONDITIONALLY REQUIRED PATCHES: NONE SUPERSEDED PATCHES: NONE SPECIAL INSTRUCTIONS: NONE FULL DESCRIPTION: PROBLEM: (81557) (PATCH ID: OSF445DX-005) ******** This fixes a problem that was causing diskconfig to issue the error message "can't read "tminor": no such variable" upon startup. FILES: ./usr/share/sysman/diskconfig/DSKCONF.ism CHECKSUM: 02037 47 SUBSET: OSFSYSMAN445 ./sysman/diskconfig/DSKCONF.ism,v RCS ID: 1.1.43.1 SUPPORT NOTES: NONE ---------------------------------------------------------- NEW PATCHID: 7.00 PATCH ID: OSF445X11-001 REQUIRED PATCHES: NONE CONDITIONALLY REQUIRED PATCHES: NONE SUPERSEDED PATCHES: NONE SPECIAL INSTRUCTIONS: NONE FULL DESCRIPTION: PROBLEM: (76025) (PATCH ID: OSF445X11-001) ******** Character ccedilla and Ccedilla do not display in DT and DX applications when entered from Turkish F keyboard. FILES: ./usr/lib/X11/locale/Compose/tr_TR.ISO8859-9 CHECKSUM: 44924 51 SUBSET: OSFX11445 SUPPORT NOTES: NONE ---------------------------------------------------------- NEW PATCHID: 9.00 PATCH ID: OSF445X11-003A REQUIRED PATCHES: NONE CONDITIONALLY REQUIRED PATCHES: OSF445X11-003B (84.00) SUPERSEDED PATCHES: NONE SPECIAL INSTRUCTIONS: NONE FULL DESCRIPTION: PROBLEM: (BCPM10CZL, 76600) (PATCH ID: OSF445X11-003) ******** This patch fixes a problem in which the svn widget of libDXm.so creates identical backgrounds and foregrounds. FILES: ./usr/shlib/libDXm.so CHECKSUM: 04187 944 SUBSET: OSFX11445 SUPPORT NOTES: NONE ---------------------------------------------------------- NEW PATCHID: 84.00 PATCH ID: OSF445X11-003B REQUIRED PATCHES: OSF445X11-003A (9.00) CONDITIONALLY REQUIRED PATCHES: NONE SUPERSEDED PATCHES: NONE SPECIAL INSTRUCTIONS: NONE FULL DESCRIPTION: PROBLEM: (BCPM10CZL, 76600) (PATCH ID: OSF445X11-003) ******** This patch fixes a problem in which the svn widget of libDXm.so creates identical backgrounds and foregrounds. FILES: ./usr/lib/libDXm.a CHECKSUM: 37945 910 SUBSET: OSFXLIBA445 SUPPORT NOTES: NONE ---------------------------------------------------------- NEW PATCHID: 10.00 PATCH ID: OSF445X11-004 REQUIRED PATCHES: NONE CONDITIONALLY REQUIRED PATCHES: NONE SUPERSEDED PATCHES: NONE SPECIAL INSTRUCTIONS: NONE FULL DESCRIPTION: PROBLEM: (77171) (PATCH ID: OSF445X11-004) ******** Several compose definitions were omitted in the original version of this file. This change allows users to use compose sequences documented in other (Latin-2) locales to generate the same character in the latin-9 locale. FILES: ./usr/lib/X11/locale/Compose/en_US.ISO8859-15 CHECKSUM: 19761 53 SUBSET: OSFX11445 SUPPORT NOTES: NONE ---------------------------------------------------------- NEW PATCHID: 11.00 PATCH ID: OSF445X11-005A REQUIRED PATCHES: NONE CONDITIONALLY REQUIRED PATCHES: OSF445X11-005B (85.00) SUPERSEDED PATCHES: NONE SPECIAL INSTRUCTIONS: NONE FULL DESCRIPTION: PROBLEM: (ZUO78968A) (PATCH ID: OSF445X11-005) ******** This patch fixes various problems with the X font server and with the X server's interaction with X font servers. FILES: ./usr/shlib/X11/libfont.so CHECKSUM: 43416 200 SUBSET: OSFX11445 ./xc/lib/font/bitmap/bdfread.c,v RCS ID: 1.1.14.1 ./xc/lib/font/bitmap/bitmapfunc.c,v RCS ID: 1.1.15.1 ./xc/lib/font/bitmap/bitscale.c,v RCS ID: 1.1.21.1 ./xc/lib/font/bitmap/pcfread.c,v RCS ID: 1.1.15.1 ./xc/lib/font/bitmap/snfread.c,v RCS ID: 1.1.14.1 ./xc/lib/font/fontfile/decompress.c,v RCS ID: 1.1.15.1 ./xc/lib/font/fontfile/dirfile.c,v RCS ID: 1.1.14.1 ./xc/lib/font/fontfile/ffcheck.c,v RCS ID: 1.1.16.1 ./xc/lib/font/fontfile/fontcache.c,v RCS ID: 1.1.13.1 ./xc/lib/font/fontfile/fontdir.c,v RCS ID: 1.1.15.1 ./xc/lib/font/fontfile/fontfile.c,v RCS ID: 1.1.17.1 ./xc/lib/font/fontfile/fontscale.c,v RCS ID: 1.1.16.1 ./xc/lib/font/fontfile/printerfont.c,v RCS ID: 1.1.16.1 ./xc/lib/font/util/fontaccel.c,v RCS ID: 1.1.14.1 ./xc/lib/font/util/fontutil.c,v RCS ID: 1.1.16.1 ./xc/lib/font/util/fontxlfd.c,v RCS ID: 1.1.16.1 ./xc/lib/font/util/miscutil.c,v RCS ID: 1.1.16.1 ./xc/lib/font/util/patcache.c,v RCS ID: 1.1.16.1 ./usr/shlib/X11/libfr_Type1.so CHECKSUM: 32952 200 SUBSET: OSFX11445 ./xc/lib/font/Type1/scanfont.c,v RCS ID: 1.1.18.1 ./xc/lib/font/Type1/t1funcs.c,v RCS ID: 1.1.19.1 ./xc/lib/font/Type1/t1info.c,v RCS ID: 1.1.17.1 ./usr/shlib/X11/libfr_Speedo.so CHECKSUM: 22905 96 SUBSET: OSFX11445 ./xc/lib/font/Speedo/do_char.c,v RCS ID: 1.1.15.1 ./xc/lib/font/Speedo/spfile.c,v RCS ID: 1.1.16.1 ./xc/lib/font/Speedo/spfont.c,v RCS ID: 1.1.15.1 ./xc/lib/font/Speedo/spinfo.c,v RCS ID: 1.1.17.1 ./usr/shlib/X11/libfr_fs.so CHECKSUM: 13112 120 SUBSET: OSFX11445 ./xc/lib/font/fc/fsconvert.c,v RCS ID: 1.1.14.1 ./xc/lib/font/fc/fserve.c,v RCS ID: 1.1.21.1 ./xc/lib/font/fc/fsio.c,v RCS ID: 1.1.16.1 ./xc/lib/xtrans/Xtranssock.c,v RCS ID: 1.1.31.1 ./xc/lib/xtrans/Xtransutil.c,v RCS ID: 1.1.10.1 ./usr/shlib/X11/libdix.so CHECKSUM: 64818 528 SUBSET: OSFSER445 ./xc/programs/Xserver/dix/dixfonts.c,v RCS ID: 1.1.19.1 ./xc/programs/xfs/difs/events.c,v RCS ID: 1.1.7.5 ./usr/shlib/X11/libos.so CHECKSUM: 39824 248 SUBSET: OSFSER445 ./xc/lib/xtrans/Xtranssock.c,v RCS ID: 1.1.31.1 ./xc/lib/xtrans/Xtransutil.c,v RCS ID: 1.1.10.1 ./xc/programs/xfs/os/connection.c,v RCS ID: 1.1.19.2 SUPPORT NOTES: NONE ---------------------------------------------------------- NEW PATCHID: 85.00 PATCH ID: OSF445X11-005B REQUIRED PATCHES: OSF445X11-005A (11.00) CONDITIONALLY REQUIRED PATCHES: NONE SUPERSEDED PATCHES: NONE SPECIAL INSTRUCTIONS: NONE FULL DESCRIPTION: PROBLEM: (ZUO78968A) (PATCH ID: OSF445X11-005) ******** This patch fixes various problems with the X font server and with the X server's interaction with X font servers. FILES: ./usr/lib/libFS.a CHECKSUM: 15152 71 SUBSET: OSFXDEV445 ./xc/lib/FS/FSListExt.c,v RCS ID: 1.1.10.1 ./xc/lib/FS/FSOpenFont.c,v RCS ID: 1.1.14.1 ./xc/lib/FS/FSSetCats.c,v RCS ID: 1.1.14.1 ./xc/lib/FS/FSlibInt.c,v RCS ID: 1.1.12.1 ./xc/lib/xtrans/Xtranssock.c,v RCS ID: 1.1.31.1 ./xc/lib/xtrans/Xtransutil.c,v RCS ID: 1.1.10.1 ./usr/bin/X11/xfs CHECKSUM: 44513 200 SUBSET: OSFXMIT445 ./xc/lib/font/fc/fsconvert.c,v RCS ID: 1.1.14.1 ./xc/lib/font/fc/fserve.c,v RCS ID: 1.1.21.1 ./xc/lib/font/fc/fsio.c,v RCS ID: 1.1.16.1 ./xc/lib/xtrans/Xtranssock.c,v RCS ID: 1.1.31.1 ./xc/lib/xtrans/Xtransutil.c,v RCS ID: 1.1.10.1 ./xc/programs/xfs/difs/cache.c,v RCS ID: 1.1.12.1 ./xc/programs/xfs/difs/dispatch.c,v RCS ID: 1.1.21.1 ./xc/programs/xfs/difs/events.c,v RCS ID: 1.1.10.1 ./xc/programs/xfs/difs/fonts.c,v RCS ID: 1.1.15.1 ./xc/programs/xfs/difs/resource.c,v RCS ID: 1.1.12.1 ./xc/programs/xfs/difs/swapreq.c,v RCS ID: 1.1.10.1 ./xc/programs/xfs/os/connection.c,v RCS ID: 1.1.23.1 ./xc/programs/xfs/os/error.c,v RCS ID: 1.1.17.1 ./xc/programs/xfs/os/io.c,v RCS ID: 1.1.12.1 ./xc/programs/xfs/os/ldrenderers.c,v RCS ID: 1.1.11.1 ./xc/programs/xfs/os/osglue.c,v RCS ID: 1.1.10.1 ./xc/programs/xfs/os/waitfor.c,v RCS ID: 1.1.12.1 SUPPORT NOTES: NONE ---------------------------------------------------------- NEW PATCHID: 12.00 PATCH ID: OSF445X11-006 REQUIRED PATCHES: NONE CONDITIONALLY REQUIRED PATCHES: NONE SUPERSEDED PATCHES: NONE SPECIAL INSTRUCTIONS: NONE FULL DESCRIPTION: PROBLEM: (65682) (PATCH ID: OSF445X11-006) ******** This patch fixes a problem where the X server could core dump or get unaligned access errors when clients used the Multi-Buffering extension. FILES: ./usr/shlib/X11/libextMultibuf.so CHECKSUM: 38799 40 SUBSET: OSFSER445 ./xc/programs/Xserver/Xext/multibuf_dix.c,v RCS ID: 1.1.13.1 SUPPORT NOTES: NONE ---------------------------------------------------------- NEW PATCHID: 13.00 PATCH ID: OSF445X11-007 REQUIRED PATCHES: NONE CONDITIONALLY REQUIRED PATCHES: NONE SUPERSEDED PATCHES: NONE SPECIAL INSTRUCTIONS: NONE FULL DESCRIPTION: PROBLEM: (HPAQ10DTH, UVO55282, TKTB20026) (PATCH ID: OSF445X11-007) ******** Problem 1: This patch fixes a problem where on systems with a PowerStorm 4D10T (ELSA GLoria Synergy, SN-PBXGK-BB) graphics card or a PCI To Ethernet/Graphics Combo Adapter (3X-DEPVD-AA), sometimes lines and images aren't drawn correctly in scrolled windows. Problem 2: This patch fixes synchronization and drawing problems in the X server for the PowerStorm 4D10T (ELSA GLoria Synergy, SN-PBXGK-BB) graphics card. FILES: ./usr/shlib/X11/lib_dec_comet.so CHECKSUM: 40803 128 SUBSET: OSFSER445 ./xc/programs/Xserver/hw/dec/comet/cometallpriv.c,v RCS ID: 1.1.19.1 ./xc/programs/Xserver/hw/dec/comet/cometfillsp.c,v RCS ID: 1.1.19.1 ./xc/programs/Xserver/hw/dec/comet/cometgc.c,v RCS ID: 1.1.19.1 ./xc/programs/Xserver/hw/dec/comet/cometglblt.c,v RCS ID: 1.1.28.1 ./xc/programs/Xserver/hw/dec/comet/cometpoint.c,v RCS ID: 1.1.19.1 ./xc/programs/Xserver/hw/dec/comet/cometrect.c,v RCS ID: 1.1.19.1 ./xc/programs/Xserver/hw/dec/comet/cometscrinit.c,v RCS ID: 1.1.30.1 ./xc/programs/Xserver/hw/dec/comet/cometzerline.c,v RCS ID: 1.1.26.1 SUPPORT NOTES: NONE ---------------------------------------------------------- NEW PATCHID: 126.00 PATCH ID: OSF445X11-008A REQUIRED PATCHES: NONE CONDITIONALLY REQUIRED PATCHES: OSF445X11-008B (128.00) SUPERSEDED PATCHES: OSF445X11-002 (8.00) SPECIAL INSTRUCTIONS: NONE FULL DESCRIPTION: PROBLEM: (DMO00614) (PATCH ID: OSF445X11-002) ******** When the Caps Lock setting is on, some 8-bit characters do not display properly when entered directly from the keyboards. When this patch is installed, users can enter 8-bit characters directly from the keyboard regardless of the Caps Lock setting. PROBLEM: (HPAQ62623) (PATCH ID: OSF445X11-008) ******** This patch fixes two memory leaks in the X Window System's X library (Xlib) that can occur when creating and destroying Motif List, Text, and TextField widgets. FILES: ./usr/shlib/libX11.so.pre.O3D CHECKSUM: 08394 1352 SUBSET: OSFX11445 ./xc/lib/X11/imRm.c,v RCS ID: 1.1.22.1 ./usr/shlib/libX11.so CHECKSUM: 08394 1352 SUBSET: OSFX11445 ./xc/lib/X11/imRm.c,v RCS ID: 1.1.22.1 ./xc/lib/X11/imRm.c,v RCS ID: 1.1.22.1 SUPPORT NOTES: NONE ---------------------------------------------------------- NEW PATCHID: 128.00 PATCH ID: OSF445X11-008B REQUIRED PATCHES: OSF445X11-008A (126.00) CONDITIONALLY REQUIRED PATCHES: NONE SUPERSEDED PATCHES: NONE SPECIAL INSTRUCTIONS: NONE FULL DESCRIPTION: PROBLEM: (HPAQ62623) (PATCH ID: OSF445X11-008) ******** This patch fixes two memory leaks in the X Window System's X library (Xlib) that can occur when creating and destroying Motif List, Text, and TextField widgets. FILES: ./usr/lib/libX11.a CHECKSUM: 22989 1507 SUBSET: OSFXLIBA445 ./xc/lib/X11/imRm.c,v RCS ID: 1.1.22.1 SUPPORT NOTES: NONE ---------------------------------------------------------- NEW PATCHID: 118.00 PATCH ID: OSF445X11-009A REQUIRED PATCHES: NONE CONDITIONALLY REQUIRED PATCHES: OSF445X11-009B (120.00) SUPERSEDED PATCHES: NONE SPECIAL INSTRUCTIONS: NONE FULL DESCRIPTION: PROBLEM: (HPAQ62623) (PATCH ID: OSF445X11-009) ******** This patch fixes a memory leak in the X Window System's X Toolkit library (Xt) that could occur when creating and destroying Motif List, Text, and TextField widgets. FILES: ./usr/shlib/libXt.so CHECKSUM: 15929 584 SUBSET: OSFX11445 ./xc/lib/Xt/TMstate.c,v RCS ID: 1.1.10.1 SUPPORT NOTES: NONE ---------------------------------------------------------- NEW PATCHID: 120.00 PATCH ID: OSF445X11-009B REQUIRED PATCHES: OSF445X11-009A (118.00) CONDITIONALLY REQUIRED PATCHES: NONE SUPERSEDED PATCHES: NONE SPECIAL INSTRUCTIONS: NONE FULL DESCRIPTION: PROBLEM: (HPAQ62623) (PATCH ID: OSF445X11-009) ******** This patch fixes a memory leak in the X Window System's X Toolkit library (Xt) that could occur when creating and destroying Motif List, Text, and TextField widgets. FILES: ./usr/lib/libXt.a CHECKSUM: 04934 620 SUBSET: OSFXLIBA445 ./xc/lib/Xt/TMstate.c,v RCS ID: 1.1.10.1 SUPPORT NOTES: NONE ---------------------------------------------------------- NEW PATCHID: 153.00 PATCH ID: OSF445X11-010A REQUIRED PATCHES: NONE CONDITIONALLY REQUIRED PATCHES: OSF445X11-010B (155.00) SUPERSEDED PATCHES: NONE SPECIAL INSTRUCTIONS: NONE FULL DESCRIPTION: PROBLEM: (HPAQ62623) (PATCH ID: OSF445X11-010) ******** This patch fixes various memory leaks in the Motif library (libXm) that could occur when creating and destroying Motif List, Text, and TextField widgets. FILES: ./usr/shlib/libXm.so CHECKSUM: 07424 2184 SUBSET: OSFX11445 ./motif/lib/Xm/ImageCache.c,v RCS ID: 1.1.47.1 ./motif/lib/Xm/List.c,v RCS ID: 1.1.50.1 ./motif/lib/Xm/Text.c,v RCS ID: 1.1.43.1 ./motif/lib/Xm/TextF.c,v RCS ID: 1.1.66.1 ./motif/lib/Xm/TextOut.c,v RCS ID: 1.1.48.1 SUPPORT NOTES: NONE ---------------------------------------------------------- NEW PATCHID: 155.00 PATCH ID: OSF445X11-010B REQUIRED PATCHES: OSF445X11-010A (153.00) CONDITIONALLY REQUIRED PATCHES: NONE SUPERSEDED PATCHES: NONE SPECIAL INSTRUCTIONS: NONE FULL DESCRIPTION: PROBLEM: (HPAQ62623) (PATCH ID: OSF445X11-010) ******** This patch fixes various memory leaks in the Motif library (libXm) that could occur when creating and destroying Motif List, Text, and TextField widgets. FILES: ./usr/lib/libXm.a CHECKSUM: 12092 2334 SUBSET: OSFXLIBA445 ./motif/lib/Xm/ImageCache.c,v RCS ID: 1.1.47.1 ./motif/lib/Xm/List.c,v RCS ID: 1.1.50.1 ./motif/lib/Xm/Text.c,v RCS ID: 1.1.43.1 ./motif/lib/Xm/TextF.c,v RCS ID: 1.1.66.1 ./motif/lib/Xm/TextOut.c,v RCS ID: 1.1.48.1 SUPPORT NOTES: NONE ---------------------------------------------------------- NEW PATCHID: 194.00 PATCH ID: OSF445X11-011 REQUIRED PATCHES: OSF445-109 (201.00) CONDITIONALLY REQUIRED PATCHES: NONE SUPERSEDED PATCHES: NONE SPECIAL INSTRUCTIONS: SPECIAL INSTRUCTIONS for Digital UNIX V4.0G Patch 194.00 WARNING! This patch provides the X server support for the new 3Dlabs OXYGEN VX1 PCI graphics card. In order to obtain full support for this graphic card, you must also select Patch 201.00, which is the driver portion of the patch. FULL DESCRIPTION: PROBLEM: (none) (PATCH ID: OSF445X11-011) ******** This patch provides the Xserver library for the new 3Dlabs OXYGEN VX1 PCI graphcis card. FILES: ./usr/bin/X11/Xdec CHECKSUM: 61777 72 SUBSET: OSFSER445 ./xc/programs/Xserver/loadable/loadable.c,v RCS ID: 1.1.61.1 ./usr/shlib/X11/lib_dec_p3.so CHECKSUM: 17691 360 SUBSET: OSFSER445 SUPPORT NOTES: NONE ---------------------------------------------------------- NEW PATCHID: 4.00 PATCH ID: TCR160-004 REQUIRED PATCHES: NONE CONDITIONALLY REQUIRED PATCHES: NONE SUPERSEDED PATCHES: NONE SPECIAL INSTRUCTIONS: NONE FULL DESCRIPTION: PROBLEM: (QAR 70150) (Patch ID: TCR160-004) ******** Under certain circumstances a kernel memory fault is experienced on the DRD client nodes just as or after the DRD server node has initiated MCII hub failover. trap: invalid memory read access from kernel mode faulting virtual address: 0x2000000000000080 pc of faulting instruction: 0xfffffc00006cf284 ra contents at time of fault: 0xfffffc00006da05c sp contents at time of fault: 0xffffffffac2db988 panic (cpu 0): kernel memory fault crash> tf > 0 thread_block src/kernel/kern/sched_prim.c : 2352 1 thread_preempt src/kernel/kern/sched_prim.c : 4070 2 boot src/kernel/arch/alpha/machdep.c : 1930 3 panic src/kernel/bsd/subr_prf.c : 842 4 trap src/kernel/arch/alpha/trap.c : 1747 5 _XentMM src/kernel/arch/alpha/locore.s : 1736 6 drd_map_unref src/kernel/io/drd/drd_map.c : 2631 7 bss_rm_biodone src/kernel/io/drd/bss_rm.c : 1444 8 bss_rm_iodone_thread src/kernel/io/drd/bss_rm.c : 1949 FILES: ./usr/opt/TCR160/sys/drd.mod CHECKSUM: 22757 219 SUBSET: TCRMCA160 ./kernel/io/drd/bss_rm.c,v RCS ID: 1.1.30.2 SUPPORT NOTES: NONE ---------------------------------------------------------- NEW PATCHID: 7.00 PATCH ID: TCR160-010 REQUIRED PATCHES: NONE CONDITIONALLY REQUIRED PATCHES: NONE SUPERSEDED PATCHES: TCR160-001 (1.00) SPECIAL INSTRUCTIONS: NONE FULL DESCRIPTION: PROBLEM: (None) (Patch ID: TCR160-001) ******** Reliable datagram (RDG) messaging delivers low latency, high bandwidth networking for cluster applications. Cluster applications wishing to utilize these features code to the api defined in the rdg shared library, librdg.so. PROBLEM: (None) (Patch ID: TCR160-010) ******** Applications that are developed to the Reliable Datagram API may see a problem where RdgIoPoll() indicates an IO has completed, when one actually has not. FILES: ./usr/opt/TCR160/sys/rdg.mod CHECKSUM: 09023 49 SUBSET: TCRMCA160 ./kernel/rdg/rdg_kern.c,v RCS ID: 1.1.15.4 ./usr/opt/TCR160/ccs/lib/librdg.a CHECKSUM: 15730 11 SUBSET: TCRMCA160 ./usr/ccs/lib/librdg/rdg_lib.c,v RCS ID: 1.1.9.2 ./usr/opt/TCR160/shlib/librdg.so CHECKSUM: 23717 112 SUBSET: TCRMCA160 ./usr/ccs/lib/librdg/rdg_lib.c,v RCS ID: 1.1.9.2 SUPPORT NOTES: NONE ---------------------------------------------------------- NEW PATCHID: 8.00 PATCH ID: TCR160-011 REQUIRED PATCHES: NONE CONDITIONALLY REQUIRED PATCHES: NONE SUPERSEDED PATCHES: NONE SPECIAL INSTRUCTIONS: NONE FULL DESCRIPTION: PROBLEM: (QAR 73498) (Patch ID: TCR160-011) ******** This patch fixes two problems that could cause doconfig to appear to hang when running in a TruCluster environment. FILES: ./var/opt/TCR160/ase/sbin/ase_fix_config CHECKSUM: 12344 25 SUBSET: TCRASE160 ./usr/sbin/ase/asemgr/sh_bin/ase_fix_config.sh,v RCS ID: 1.1.23.2 SUPPORT NOTES: NONE ---------------------------------------------------------- NEW PATCHID: 12.00 PATCH ID: TCR160-018 REQUIRED PATCHES: NONE CONDITIONALLY REQUIRED PATCHES: NONE SUPERSEDED PATCHES: NONE SPECIAL INSTRUCTIONS: NONE FULL DESCRIPTION: PROBLEM: (HPAQ820WB,MGO47512,VNO03879A,BRO91702A) (Patch ID: TCR160-018) ******** This patch corrects a problem with Networker displaying garbage characters following the service name. If there exists a service name that is at least 8 characters in size, doing a "save" in Networker will cause an error similar to the following: save: SYSTEM error, 'dataservM-@M-^?^C' is not a registered client The service name in this case is "dataserv" FILES: ./usr/opt/TCR160/shlib/libaseapi.so CHECKSUM: 01860 200 SUBSET: TCRASE160 ./usr/sbin/ase/api/cdbapi.c,v RCS ID: 1.1.15.1 SUPPORT NOTES: NONE ---------------------------------------------------------- NEW PATCHID: 30.00 PATCH ID: TCR160-034 REQUIRED PATCHES: NONE CONDITIONALLY REQUIRED PATCHES: NONE SUPERSEDED PATCHES: NONE SPECIAL INSTRUCTIONS: NONE FULL DESCRIPTION: PROBLEM: (QAR70521) (PATCH ID: TCR160-034) ******** This patch fixes a problem which caused a boot failure on a cluster with a large number of shared SCSI buses. The system would panic during the AM initialize phase with different panic strings mostly simple lock timeouts. FILES: ./usr/opt/TCR160/sys/ase.mod CHECKSUM: 09869 159 SUBSET: TCRCOMMON160 ./kernel/io/common/am.c,v RCS ID: 1.1.71.1 SUPPORT NOTES: NONE ---------------------------------------------------------- NEW PATCHID: 33.00 PATCH ID: TCR160-037 REQUIRED PATCHES: NONE CONDITIONALLY REQUIRED PATCHES: NONE SUPERSEDED PATCHES: NONE SPECIAL INSTRUCTIONS: NONE FULL DESCRIPTION: PROBLEM: (QAR58998, QAR71021, QAR77203) (PATCH ID: TCR160-037) ******** This patch fixes following problems with drdadmin: - drdadmin -v truncate the hostname after 8 characters, now it supports more characters - drdadmin in interactive mode was not pausing the output after a full page, now it waits for any key to proceed - if drdadmin was unable to open a device it just stated "open failure" now it prints the name of the device for easy troubleshooting FILES: ./usr/opt/TCR160/sbin/drdadmin CHECKSUM: 65058 600 SUBSET: TCRDSVC160 ./usr/sbin/drdadmin/drdadmin.c,v RCS ID: 1.1.19.1 SUPPORT NOTES: NONE ---------------------------------------------------------- NEW PATCHID: 34.00 PATCH ID: TCR160-038 REQUIRED PATCHES: NONE CONDITIONALLY REQUIRED PATCHES: NONE SUPERSEDED PATCHES: NONE SPECIAL INSTRUCTIONS: NONE FULL DESCRIPTION: PROBLEM: (76549) (PATCH ID: TCR160-038) ******** This patch allows ase_reconfig_bus to modify up to 99 buses. Previously this command was limited to 9 buses. FILES: ./var/opt/TCR160/ase/sbin/ase_reconfig_bus CHECKSUM: 39745 11 SUBSET: TCRASE160 ./usr/sbin/ase/asemgr/sh_bin/ase_reconfig_bus.sh,v RCS ID: 1.2.6.1 SUPPORT NOTES: NONE ---------------------------------------------------------- NEW PATCHID: 35.00 PATCH ID: TCR160-039 REQUIRED PATCHES: NONE CONDITIONALLY REQUIRED PATCHES: NONE SUPERSEDED PATCHES: TCR160-030 (28.00) SPECIAL INSTRUCTIONS: NONE FULL DESCRIPTION: PROBLEM: (75723) (PATCH ID: TCR160-030) ******** This patch fixes a problem that would cause an error from awk(1) when modifying an ASE service that contained a large number of LSM volumes. The error would prevent the service from being properly modified. The error was: Checking LSM disk Group lotsdg ... awk: Input line lots_svc:/dev/rvol/l cannot be longer than 3,000 bytes. The source line number is 1. awk: Input line lots_svc:/dev/rvol/l cannot be longer than 3,000 bytes. The source line number is 1. PROBLEM: (BCGM50V8M, 74557) (PATCH ID: TCR160-039) ******** This patch fixes a problem where LSM disk information was not properly updated in the ASE database when volumes were removed from a disk service. FILES: ./var/opt/TCR160/ase/sbin/lsm_dg_modify CHECKSUM: 28255 8 SUBSET: TCRASE160 ./usr/sbin/ase/asemgr/sh_bin/lsm_dg_modify.sh,v RCS ID: 1.2.33.2 ./var/opt/TCR160/ase/sbin/disk_modify CHECKSUM: 58272 23 SUBSET: TCRASE160 ./usr/sbin/ase/asemgr/sh_bin/disk_modify.sh,v RCS ID: 1.2.38.1 ./var/opt/TCR160/ase/lib/FsRoutines CHECKSUM: 11635 21 SUBSET: TCRASE160 ./usr/sbin/ase/asemgr/sh_lib/FsRoutines.sh,v RCS ID: 1.2.45.1 SUPPORT NOTES: NONE ---------------------------------------------------------- NEW PATCHID: 36.00 PATCH ID: TCR160-040 REQUIRED PATCHES: NONE CONDITIONALLY REQUIRED PATCHES: NONE SUPERSEDED PATCHES: NONE SPECIAL INSTRUCTIONS: NONE FULL DESCRIPTION: PROBLEM: (TKTB10028, HPAQ121JB, 78186, none) (PATCH ID: TCR160-040) ******** This patch fixes a problem that could cause an NFS or Disk Service that has a '-' in the service name to end up "unassigned" after a disk failure. A side-effect of the problem was that the asedirector would hang once the disk failure was corrected. After installing the patch, all services that contain a '-' in the name, must be updated so that the lsm_lv_action script timeout can be reset. Refer to the Release Notes for more information. FILES: ./var/opt/TCR160/ase/lib/timeouts CHECKSUM: 21192 4 SUBSET: TCRASE160 ./usr/sbin/ase/asemgr/sh_lib/timeouts.sh,v RCS ID: 1.1.4.1 SUPPORT NOTES: NONE ---------------------------------------------------------- NEW PATCHID: 37.00 PATCH ID: TCR160-041 REQUIRED PATCHES: NONE CONDITIONALLY REQUIRED PATCHES: NONE SUPERSEDED PATCHES: NONE SPECIAL INSTRUCTIONS: NONE FULL DESCRIPTION: PROBLEM: (77310) (PATCH ID: TCR160-041) ******** This patch fixes a problem where the Emulex Fibre Channel adapter was not recognized by clu_ivp. FILES: ./usr/opt/TCR160/sbin/clu_ivp CHECKSUM: 60627 34 SUBSET: TCRCOMMON160 ./usr/sbin/cluster/clu_ivp.sh,v RCS ID: 1.1.21.1 SUPPORT NOTES: NONE ---------------------------------------------------------- NEW PATCHID: 42.00 PATCH ID: TCR160-046 REQUIRED PATCHES: NONE CONDITIONALLY REQUIRED PATCHES: NONE SUPERSEDED PATCHES: TCR160-008 (6.00), TCR160-023 (15.00), TCR160-044 (40.00) SPECIAL INSTRUCTIONS: NONE FULL DESCRIPTION: PROBLEM: (QAR 70143, BCGM60LQH) (Patch ID: TCR160-008) ******** This patch corrects a problem in the TruCluster DLM subsystem in which a node can panic with the panic string "convert_lock: bad lock state" and the stack trace as follows: 0 stop_secondary_cpu() 1 panic() 2 event_timeout(func = 0xfffffc000028ee80, arg = 0xfffffc00008ad630) 3 xcpu_puts() 4 printf() 5 panic() 6 convert_lock() 7 dlm_convert() 8 syscall() 9 _Xsyscall() PROBLEM: (DEKB70763) (Patch ID: TCR160-023) ******** This patch corrects a problem in the Distributed Lock Manager (DLM) in the TruCluster Production Server product in which an error in the session layer on one member can result in sending a corrupted DLM message to the receiving member. The corruption in the packets will be random, however if the dlm_checksum_msg sysconfigtab parameter is set to 1, the receiving member will consistently panic with a panic string of "dlm_process_message: corrupt message" when a corrupt DLM message is received. Some other panic strings that were seen are: 1) "rcv_cvt: wrong lock" 2) "rcv_resp: manage lock: bad lock state" 3) "rcv_cvt: lk_txid mismatch" 4) "rcv_resp: bad response status" These indicate different corruptions in a DLM message. PROBLEM: (72676) (PATCH ID: TCR160-044) ******** This patch fixes a problem that can cause a TruCluster member to panic during shutdown. A sample stack trace might look like: 5 panic("Unaligned kernel space access from kernel mode") 6 afault_trap() 7 _XentUna() 8 is_last_detach_in_cluster() 9 dlm_resume_all() 10 rbld_do_step() 11 svr_rbld_do_step() 12 icssvr_daemon_from_pool() PROBLEM: (ZPO039231, N/A) (PATCH ID: TCR160-046) ******** This patch fixes a bug where sometimes a certain shared sequence number will not be freed after use. It also fixes a problem where certain processes could get referenced several times. FILES: ./usr/opt/TCR160/sys/dlm.mod CHECKSUM: 43701 388 SUBSET: TCRMCA160 ./kernel/dlm/dlm_lock.c,v RCS ID: 1.1.47.2 ./kernel/dlm/dlm_msg.c,v RCS ID: 1.1.46.1 ./kernel/dlm/dlm_rebuild.c,v RCS ID: 1.1.26.1 ./kernel/dlm/dlm_ssn.c,v RCS ID: 1.1.19.1 ./usr/opt/TCR160/sys/cnxagent.mod CHECKSUM: 64379 61 SUBSET: TCRMCA160 ./kernel/cnx/dlm_agent.c,v RCS ID: 1.1.19.1 SUPPORT NOTES: NONE ---------------------------------------------------------- NEW PATCHID: 61.00 PATCH ID: TCR160-054B REQUIRED PATCHES: TCR160-059 (59.00) CONDITIONALLY REQUIRED PATCHES: NONE SUPERSEDED PATCHES: TCR160-009B (22.00), TCR160-021B (23.00), TCR160-022B (24.00), TCR160-031B (25.00), TCR160-036B (50.00), TCR160-047B (51.00) SPECIAL INSTRUCTIONS: NONE FULL DESCRIPTION: PROBLEM: (NONE) (Patch ID: TCR160-009) ******** This patch improves startup performance of start scripts. The improvement is most likely not seen in small TCR environments. In large environments with many services it will reduce the number of system calls to start the services. PROBLEM: (UVO106551) (Patch ID: TCR160-021) ******** This patch corrects a problem in which a member add will fail in a large ASE environment. PROBLEM: (BCSM81P5G) (Patch ID: TCR160-022) ******** This patch corrects a problem which causes asemgr to core dump with a "Segmentation fault" when modifying a single drd service to add more than 200 devices. The following is a representative stack trace: DBX> t > 0 db_free_DB(0x1200386fc, 0x1419aaa00, 0x120020e50, 0x14002e668, 0x1400078c0) [0x120038380] 1 db_modify_group(0x11fffd7106d, 0x14000caf8, 0x11fffe190, 0x11fffe090, 0x0) ["../../../../../../src/usr/sbin/ase/asemgr/db_edit.c":2992, 0x120020e4c] PROBLEM: (76524) (PATCH ID:) ******** This patch fixes an aseagent and asehsm segmentation fault in multi volume NFS or Disk service configurations. The problem has been seen during ASE startup. PROBLEM: (71424) (PATCH ID: TCR160-036) ******** This patch fixes a problem with extraneous compiler warnings about strdup() function calls from ASE. PROBLEM: (73570) (PATCH ID: TCR160-047) ******** This patch fixes a problem that caused the asemgr utility to not run when called from a program that is owned by root and has the setuid bit turned on. PROBLEM: (61554) (PATCH ID: TCR160-054) ******** This patch fixes three problems with the clu_ivp script. The script now checks to be sure that the cluster members are listed in the /etc/hosts file, and it no longer copies /var/adm/messages to /tmp. Copying the messages file to /tmp could result in the filesystem becoming full, and clu_ivp exiting with an error. The clu_ivp script now also checks the /var/adm/messages file for shared busses if none are listed in the con- figuration file. FILES: ./usr/opt/TCR160/sbin/tractd CHECKSUM: 58785 120 SUBSET: TCRCMS160 ./usr/ccs/lib/libcnx/cnx_lib.c,v RCS ID: 1.1.15.1 ./usr/sbin/ase/util/log.c,v RCS ID: 1.1.4.3 ./usr/sbin/ase/util/util.c,v RCS ID: 1.1.7.7 ./usr/opt/TCR160/sbin/postDevErr CHECKSUM: 16274 528 SUBSET: TCRCMS160 ./usr/ccs/lib/libcnx/cnx_lib.c,v RCS ID: 1.1.11.3 ./usr/sbin/ase/util/log.c,v RCS ID: 1.1.4.3 ./usr/sbin/ase/util/util.c,v RCS ID: 1.1.7.7 ./usr/opt/TCR160/sbin/submon CHECKSUM: 56623 712 SUBSET: TCRCMS160 ./usr/ccs/lib/libcnx/cnx_lib.c,v RCS ID: 1.1.15.1 ./usr/sbin/ase/asecdb/db_marshal.c,v RCS ID: 1.2.34.1 ./usr/sbin/ase/dirCntl/directorCntl.c,v RCS ID: 1.2.39.1 ./usr/sbin/ase/util/log.c,v RCS ID: 1.1.4.3 ./usr/sbin/ase/util/log.c,v RCS ID: 1.2.14.2 ./usr/sbin/ase/util/util.c,v RCS ID: 1.1.7.7 ./usr/sbin/ase/util/util.c,v RCS ID: 1.2.40.6 ./usr/opt/TCR160/sbin/cmonsvc CHECKSUM: 29902 104 SUBSET: TCRCMS160 ./usr/ccs/lib/libcnx/cnx_lib.c,v RCS ID: 1.1.15.1 ./usr/sbin/ase/util/log.c,v RCS ID: 1.1.4.3 ./usr/sbin/ase/util/util.c,v RCS ID: 1.1.7.7 SUPPORT NOTES: NONE ---------------------------------------------------------- NEW PATCHID: 67.00 PATCH ID: TCR160-054C REQUIRED PATCHES: TCR160-059 (59.00) CONDITIONALLY REQUIRED PATCHES: NONE SUPERSEDED PATCHES: NONE SPECIAL INSTRUCTIONS: NONE FULL DESCRIPTION: PROBLEM: (61554) (PATCH ID: TCR160-054) ******** This patch fixes three problems with the clu_ivp script. The script now checks to be sure that the cluster members are listed in the /etc/hosts file, and it no longer copies /var/adm/messages to /tmp. Copying the messages file to /tmp could result in the filesystem becoming full, and clu_ivp exiting with an error. The clu_ivp script now also checks the /var/adm/messages file for shared busses if none are listed in the con- figuration file. FILES: ./usr/opt/TCR160/sbin/cnxagentd CHECKSUM: 28255 408 SUBSET: TCRDSVC160 ./usr/ccs/lib/libcnx/cnx_lib.c,v RCS ID: 1.1.15.1 ./usr/opt/TCR160/sbin/cnxshow CHECKSUM: 04322 56 SUBSET: TCRDSVC160 ./usr/ccs/lib/libcnx/cnx_lib.c,v RCS ID: 1.1.15.1 ./usr/sbin/cnx/cnxshow.c,v RCS ID: 1.1.11.1 ./usr/opt/TCR160/sbin/cnxmgrd CHECKSUM: 29853 416 SUBSET: TCRDSVC160 ./usr/ccs/lib/libcnx/cnx_lib.c,v RCS ID: 1.1.15.1 ./usr/opt/TCR160/sbin/cnxset CHECKSUM: 23577 56 SUBSET: TCRDSVC160 ./usr/ccs/lib/libcnx/cnx_lib.c,v RCS ID: 1.1.15.1 ./usr/opt/TCR160/sbin/cnxmond CHECKSUM: 44621 424 SUBSET: TCRDSVC160 ./usr/ccs/lib/libcnx/cnx_lib.c,v RCS ID: 1.1.15.1 ./usr/opt/TCR160/sbin/cnxpingd CHECKSUM: 16618 392 SUBSET: TCRDSVC160 ./usr/ccs/lib/libcnx/cnx_lib.c,v RCS ID: 1.1.15.1 SUPPORT NOTES: NONE ---------------------------------------------------------- NEW PATCHID: 76.00 PATCH ID: TCR160-055 REQUIRED PATCHES: NONE CONDITIONALLY REQUIRED PATCHES: NONE SUPERSEDED PATCHES: NONE SPECIAL INSTRUCTIONS: NONE FULL DESCRIPTION: PROBLEM: (MGO104139) (PATCH ID: TCR160-055) ******** This patch fixes a problem that could cause mountd to exit without error during boot. FILES: ./var/opt/TCR160/ase/sbin/nfs_mountd CHECKSUM: 25699 5 SUBSET: TCRASE160 ./usr/sbin/ase/asemgr/sh_bin/nfs_mountd.sh,v RCS ID: 1.2.16.1 SUPPORT NOTES: NONE ---------------------------------------------------------- NEW PATCHID: 70.00 PATCH ID: TCR160-056 REQUIRED PATCHES: NONE CONDITIONALLY REQUIRED PATCHES: NONE SUPERSEDED PATCHES: TCR160-017 (11.00), TCR160-027 (19.00), TCR160-032 (26.00), TCR160-062 (68.00) SPECIAL INSTRUCTIONS: NONE FULL DESCRIPTION: PROBLEM: ('QAR 73648') (Patch ID: TCR160-017) ******** This patch fixes a problem where both nodes in a cluster will panic at the same time with a simple_lock timeout panic. PROBLEM: (QAR 75850) (Patch ID: TCR160-027) ******** This patch fixes a kernel memory fault in rm_lock_update_retry(). PROBLEM: (76634) (PATCH ID: TCR160-032) ******** This patch fixes a problem which can cause the following panic: panic (cpu 0): rm_update_single_lock_miss: time limit exceeded A sample stack trace would look like: 10 panic() 11 rm_crash_node_mask() 12 rm_panic() 13 rm_update_single_lock_miss() 14 rm_spinlk_update_request() 15 rm_lrail_int_ctx() 16 rm_lrail_int() 17 Mchan_isr() 18 intr_dispatch_no_post() 19 _XentInt() 20 rm_update_single_lock() 21 delete_RM_spinlock_memory() PROBLEM: (80836) (PATCH ID: TCR160-062) ******** This patch fixes a problem that could cause an error to be returned when the Cluster software should wait until a global lock is freed. PROBLEM: (78079, DEK014491) (PATCH ID: TCR160-056) ******** This patch fixes a problem that could cause a TruCluster Production server member to hang during boot, and can cause a "simple lock time limit exceeded" panic. FILES: ./usr/opt/TCR160/sys/rm.mod CHECKSUM: 56675 166 SUBSET: TCRMCA160 ./kernel/rm/rm_error.c,v RCS ID: 1.1.35.1 ./kernel/rm/rm_kern.c,v RCS ID: 1.1.65.4 ./kernel/rm/rm_kern_ass.s,v RCS ID: 1.1.27.3 SUPPORT NOTES: NONE ---------------------------------------------------------- NEW PATCHID: 59.00 PATCH ID: TCR160-059 REQUIRED PATCHES: NONE CONDITIONALLY REQUIRED PATCHES: TCR160-054B (61.00), TCR160-054C (67.00) SUPERSEDED PATCHES: TCR160-002 (2.00), TCR160-009A (9.00), TCR160-016 (10.00), TCR160-007 (5.00), TCR160-021A (13.00), TCR160-024 (16.00), TCR160-025 (17.00), TCR160-022A (14.00), TCR160-033 (29.00), TCR160-035 (31.00), TCR160-042 (38.00), TCR160-043 (39.00), TCR160-051 (47.00), TCR160-031A (21.00), TCR160-053 (49.00), TCR160-036A (32.00), TCR160-047A (43.00), TCR160-028 (27.00), TCR160-052 (48.00), TCR160-065 (52.00), TCR160-066 (53.00), TCR160-058 (54.00), TCR160-060 (55.00), TCR160-054A (56.00), TCR160-057 (57.00) SPECIAL INSTRUCTIONS: NONE FULL DESCRIPTION: PROBLEM: (UVO106363) (Patch ID: TCR160-002) ******** This patch fixes two problems in the asedirector. The first is an ASE command timeout problem encountered by large ASE services. The second is an incorrect decision made by the asedirector as a result of a failed inquire services command. 1) The asedirector has static timeout values for some commands to aseagent processes. Certain commands take a much longer time to complete because they involve inquiring about large services. As a result, large ASE services could encounter a premature timeout on the following commands, as show in the daemon.log: ASE_STOP_ALL, ASE_DELETE_ALL, ASE_ADD_ALL, ASE_DELETE_MEMBER, ASE_REVERT_DB. This patch modifies these command timeouts relative to the ASE service size eliminating this premature timeout. 2) When the asedirector inquires about the status of services on a member, the command or the service inquiry may fail. In this rare situation the director may incorrectly start a duplicate instance of a service on another node. This patch fixes this problem such that if the director receives a failure, it will assume the service is running on that member. It will then either stop that service before restarting it, or not start it at all until it gets a correct response. The most common reason for this problem to occur is due to a timeout from the aseagent of a check action script for a service. A less probable reason to occur is due to an asedirector timeout on the ASE_INQ_SERVICES command. Both timeouts can be found in the daemon.log file. PROBLEM: (NONE) (Patch ID: TCR160-009) ******** This patch improves startup performance of start scripts. The improvement is most likely not seen in small TCR environments. In large environments with many services it will reduce the number of system calls to start the services. PROBLEM (BRO101102, STLQ45901) (Patch ID: TCR160-016) This patch fixes a problem where the Host Status Monitor (asehsm) incorrectly reports a network down (HSM_NI_STATUS DOWN) if the counters for the network interface get zeroed. PROBLEM: (BCGM41G5B) (Patch ID: TCR160-007) ******** This patch fixes a situation in which an aseagent could start to loop and the ASE service would not be sucessful relocated. The problem was only seen in a rare sitatution with many devices and extremely long start/stop scripts. PROBLEM: (UVO106551) (Patch ID: TCR160-021) ******** This patch corrects a problem in which a member add will fail in a large ASE environment. PROBLEM: (BCGM814X8) (Patch ID: TCR160-024) ******** This patch corrects a problem with TruCluster Available Server or Production Server cluster in which services have been started with elevated priority and scheduling algorithm. Under significant load this could lead to intermittent network and cluster problems. In order to see this behavior, the customer would have to have changed the PRIOPT variable in /sbin/init.d/asemember from "-p hsm" to "-p all" so that the aseagent would be started with round-robin scheduling policy. PROBLEM: ('EVT102865, QAR74640') (Patch ID: TCR160-025) ******** This patch fixes a problem which caused a service not to start when there was a short network failure. asemgr would report the service as running on one node, but the service was just stopped and never restarted or relocated. This was seen only with long running stop scripts (i.e. Oracle shutdown) and with multiple network interfaces configured. The ni_status_awk had to be modified so that a failure of a single network adapter caused a service relocation. This patch makes sure that the services gets relocated or restarted based on the configured ASP. PROBLEM: (BCSM81P5G) (Patch ID: TCR160-022) ******** This patch corrects a problem which causes asemgr to core dump with a "Segmentation fault" when modifying a single drd service to add more than 200 devices. The following is a representative stack trace: DBX> t > 0 db_free_DB(0x1200386fc, 0x1419aaa00, 0x120020e50, 0x14002e668, 0x1400078c0) [0x120038380] 1 db_modify_group(0x11fffd7106d, 0x14000caf8, 0x11fffe190, 0x11fffe090, 0x0) ["../../../../../../src/usr/sbin/ase/asemgr/db_edit.c":2992, 0x120020e4c] PROBLEM: (76524) (PATCH ID: TCR160-031) ******** This patch fixes an aseagent and asehsm segmentation fault in multi volume NFS or Disk service configurations. The problem has been seen during ASE startup. PROBLEM: (69889) (PATCH ID: TCR160-033) ******** This patch fixes a problem where the asemgr will hang as it continuously create and kill multiple directors The problem occurs because the message queue management assumes that messages are enqueued in the same order as the events they report. The fix is to discard the message if it has been dequeued after the host from which it came from goes down and if the associated channel structure has already been freed. PROBLEM: (70239) (PATCH ID: TCR160-035) ******** This patch corrects a problem that causes the ASE director to core dump during initialization. PROBLEM: (TBD) (PATCH ID: TCR160-042) ******** This patch corrects a problem where modifying a service will fail under the following conditions: - The service is a DRD service. - You are adding more DRDs. - The system-wide per-process data size is too small A message similar to the following will be seen in the daemon.log: Mar 6 14:58:22 mulder ASE: muldermc AseMgr ***ALERT: Could not malloc Mar 6 14:58:22 mulder ASE: muldermc AseMgr Error: Out of memory loading Database. Mar 6 14:58:22 mulder ASE: muldermc AseMgr ***ALERT: BUG NOTICE: Exit before finishing unmarshal_tree The asemgr may also core dump. PROBLEM: (BCPMA2116, N/A) (PATCH ID: TCR160-043) ******** This patch fixes a problem where the MEMBER_STATE variable always is shown as BOOTING instead of RUNNING. After first installing TCR, there is no way to have scripts know the MEMBER_STATE. This problem is cleared on a reboot. PROBLEM: (KAOQ34551) (PATCH ID: TCR160-051) ******** If a network cable failure on a monitored network is corrected in less than 7 seconds, the services could be left in a state where ASE says they are running, but they really aren't. PROBLEM: (HPAQ21V5C) (PATCH ID: TCR160-053) ******** This patch fixes a problem that caused the asemgr to get a memory fault when adding multiple services in a row. PROBLEM: (71424) (PATCH ID: TCR160-036) ******** This patch fixes a problem with extraneous compiler warnings about strdup() function calls from ASE. PROBLEM: (73570) (PATCH ID: TCR160-047) ******** This patch fixes a problem that caused the asemgr utility to not run when called from a program that is owned by root and has the setuid bit turned on. PROBLEM: (BCSM81HH7) (PATCH ID: TCR160-028) ******** This patch fixes a problem that can cause the Cluster MIB daemon (cnxmibd) to core dump in Available Server environments. PROBLEM: (BCGM31BBV1) (PATCH ID: TCR160-052) ******** This patch fixes a problem which caused an error message to be logged for the cnxmibd even though no error had occurred. The error message was: **ERROR cnxmib_mthd.c line 855: initDirectorCntl failed! PROBLEM: (EVT256426, N/A) (PATCH ID: TCR160-065) ******** This patch fixes two similar bugs. The first is that when one member of a cluster is brought up with ASE off, other members report it as UP and RUNNING instead of UP and UNKNOWN. The second is that when a restricted service is running on a member, and 'asemember stop' and 'aseam stop' is executed, the service status is still reported as the member name, instead of Unassigned. PROBLEM: (70238) (PATCH ID: TCR160-066) ******** This patch fixes a problem where timeout values of greater than 30 seconds in /etc/hsm.conf would cause ASE agent to fail at start up. PROBLEM: (HPAQ40728, N/A) (PATCH ID: TCR160-058) ******** This patch fixes a bug where the aseagent will occasionally core dump on a SCSI bus hang. While there is no expected behavior during a hang, the aseagent should not core dump. PROBLEM: (74548) (PATCH ID: TCR160-060) ******** This patch fixes a problem that caused the asemgr to report the wrong status for a service. When a device path failure occurs, the ASE director attempts to restart the service on another member system. If the director can't find another member that can run the service, it reported an error, but did not change the status. This meant that the asemgr would report that the service was still running on the original member, when in fact the status should have been "unassigned." PROBLEM: (61554) (PATCH ID: TCR160-054) ******** This patch fixes three problems with the clu_ivp script. The script now checks to be sure that the cluster members are listed in the /etc/hosts file, and it no longer copies /var/adm/messages to /tmp. Copying the messages file to /tmp could result in the filesystem becoming full, and clu_ivp exiting with an error. The clu_ivp script now also checks the /var/adm/messages file for shared busses if none are listed in the con- figuration file. PROBLEM: (69874) (PATCH ID: TCR160-057) ******** This patch fixes a problem that could cause the asedirector to core dump. PROBLEM: (74383) (PATCH ID: TCR160-059) ******** This patch fixes a problem that caused the asemgr to report that a disk, or mount point, was in multiple services when modifying a service name. FILES: ./usr/opt/TCR160/sbin/asemgr CHECKSUM: 36707 872 SUBSET: TCRASE160 ./usr/ccs/lib/libcnx/cnx_lib.c,v RCS ID: 1.1.15.1 ./usr/sbin/ase/agent/init.c,v RCS ID: 1.1.2.2 ./usr/sbin/ase/asecdb/db_marshal.c,v RCS ID: 1.2.34.1 ./usr/sbin/ase/asemgr/asemgr.c,v RCS ID: 1.2.38.1 ./usr/sbin/ase/asemgr/db_edit.c,v RCS ID: 1.2.91.1 ./usr/sbin/ase/asemgr/db_mgr_io.c,v RCS ID: 1.2.31.1 ./usr/sbin/ase/asemgr/db_util.c,v RCS ID: 1.2.27.1 ./usr/sbin/ase/asemgr/db_verify.c,v RCS ID: 1.2.28.2 ./usr/sbin/ase/dirCntl/directorCntl.c,v RCS ID: 1.2.39.1 ./usr/sbin/ase/director/init.c,v RCS ID: 1.1.2.2 ./usr/sbin/ase/msgsvc/msgSvc.c,v RCS ID: 1.2.32.1 ./usr/sbin/ase/util/log.c,v RCS ID: 1.2.14.2 ./usr/sbin/ase/util/util.c,v RCS ID: 1.2.40.6 ./usr/opt/TCR160/sbin/asehsm CHECKSUM: 55245 688 SUBSET: TCRASE160 ./usr/ccs/lib/libcnx/cnx_lib.c,v RCS ID: 1.1.15.1 ./usr/sbin/ase/agent/main.c,v RCS ID: 1.2.26.3 ./usr/sbin/ase/asecdb/db_marshal.c,v RCS ID: 1.2.34.1 ./usr/sbin/ase/hsm/host_monitor.c,v RCS ID: 1.2.21.1 ./usr/sbin/ase/hsm/nit_cntrs.c,v RCS ID: 1.2.24.1 ./usr/sbin/ase/msgsvc/msgSvc.c,v RCS ID: 1.2.32.1 ./usr/sbin/ase/util/log.c,v RCS ID: 1.2.14.2 ./usr/sbin/ase/util/rtmemlock.c,v RCS ID: 1.1.6.1 ./usr/sbin/ase/util/util.c,v RCS ID: 1.2.40.6 ./usr/opt/TCR160/sbin/asehelp CHECKSUM: 36707 872 SUBSET: TCRASE160 ./usr/ccs/lib/libcnx/cnx_lib.c,v RCS ID: 1.1.15.1 ./usr/sbin/ase/agent/init.c,v RCS ID: 1.1.2.2 ./usr/sbin/ase/asecdb/db_marshal.c,v RCS ID: 1.2.34.1 ./usr/sbin/ase/asemgr/asemgr.c,v RCS ID: 1.2.38.1 ./usr/sbin/ase/asemgr/db_edit.c,v RCS ID: 1.2.91.1 ./usr/sbin/ase/asemgr/db_mgr_io.c,v RCS ID: 1.2.31.1 ./usr/sbin/ase/asemgr/db_util.c,v RCS ID: 1.2.27.1 ./usr/sbin/ase/asemgr/db_verify.c,v RCS ID: 1.2.28.2 ./usr/sbin/ase/dirCntl/directorCntl.c,v RCS ID: 1.2.39.1 ./usr/sbin/ase/director/init.c,v RCS ID: 1.1.2.2 ./usr/sbin/ase/msgsvc/msgSvc.c,v RCS ID: 1.2.32.1 ./usr/sbin/ase/util/log.c,v RCS ID: 1.2.14.2 ./usr/sbin/ase/util/util.c,v RCS ID: 1.2.40.6 ./usr/opt/TCR160/sbin/asepurgenfs CHECKSUM: 00831 160 SUBSET: TCRASE160 ./usr/ccs/lib/libcnx/cnx_lib.c,v RCS ID: 1.1.11.3 ./usr/sbin/ase/asecdb/db_marshal.c,v RCS ID: 1.2.34.1 ./usr/sbin/ase/msgsvc/msgSvc.c,v RCS ID: 1.2.32.1 ./usr/sbin/ase/util/log.c,v RCS ID: 1.2.14.2 ./usr/sbin/ase/util/util.c,v RCS ID: 1.2.40.6 ./usr/opt/TCR160/sbin/snd CHECKSUM: 55444 576 SUBSET: TCRASE160 ./usr/ccs/lib/libcnx/cnx_lib.c,v RCS ID: 1.1.11.3 ./usr/sbin/ase/asecdb/db_marshal.c,v RCS ID: 1.2.34.1 ./usr/sbin/ase/msgsvc/msgSvc.c,v RCS ID: 1.2.32.1 ./usr/sbin/ase/util/log.c,v RCS ID: 1.2.14.2 ./usr/sbin/ase/util/util.c,v RCS ID: 1.2.40.6 ./usr/opt/TCR160/sbin/cnxmibd CHECKSUM: 20402 232 SUBSET: TCRASE160 ./usr/ccs/lib/libcnx/cnx_lib.c,v RCS ID: 1.1.15.1 ./usr/sbin/ase/asecdb/db_marshal.c,v RCS ID: 1.2.34.1 ./usr/sbin/ase/dirCntl/directorCntl.c,v RCS ID: 1.2.39.1 ./usr/sbin/ase/msgsvc/msgSvc.c,v RCS ID: 1.2.32.1 ./usr/sbin/ase/util/log.c,v RCS ID: 1.2.14.2 ./usr/sbin/ase/util/util.c,v RCS ID: 1.2.40.6 ./usr/sbin/cnx/cnxmib_mthd.c,v RCS ID: 1.1.8.2 ./usr/opt/TCR160/sbin/aseagent CHECKSUM: 59910 760 SUBSET: TCRASE160 ./usr/ccs/lib/libcnx/cnx_lib.c,v RCS ID: 1.1.15.1 ./usr/sbin/ase/agent/amMgr.c,v RCS ID: 1.2.42.1 ./usr/sbin/ase/agent/envMgr.c,v RCS ID: 1.2.53.3 ./usr/sbin/ase/agent/init.c,v RCS ID: 1.2.34.3 ./usr/sbin/ase/agent/main.c,v RCS ID: 1.2.37.2 ./usr/sbin/ase/agent/svcMgr.c,v RCS ID: 1.2.58.1 ./usr/sbin/ase/asecdb/db_marshal.c,v RCS ID: 1.2.34.1 ./usr/sbin/ase/director/init.c,v RCS ID: 1.2.34.3 ./usr/sbin/ase/msgsvc/msgSvc.c,v RCS ID: 1.2.32.1 ./usr/sbin/ase/util/log.c,v RCS ID: 1.2.14.2 ./usr/sbin/ase/util/rtmemlock.c,v RCS ID: 1.1.6.1 ./usr/sbin/ase/util/util.c,v RCS ID: 1.2.40.6 ./usr/opt/TCR160/sbin/asesetup CHECKSUM: 36707 872 SUBSET: TCRASE160 ./usr/ccs/lib/libcnx/cnx_lib.c,v RCS ID: 1.1.15.1 ./usr/sbin/ase/agent/init.c,v RCS ID: 1.1.2.2 ./usr/sbin/ase/asecdb/db_marshal.c,v RCS ID: 1.2.34.1 ./usr/sbin/ase/asemgr/asemgr.c,v RCS ID: 1.2.38.1 ./usr/sbin/ase/asemgr/db_edit.c,v RCS ID: 1.2.91.1 ./usr/sbin/ase/asemgr/db_mgr_io.c,v RCS ID: 1.2.31.1 ./usr/sbin/ase/asemgr/db_util.c,v RCS ID: 1.2.27.1 ./usr/sbin/ase/asemgr/db_verify.c,v RCS ID: 1.2.28.2 ./usr/sbin/ase/dirCntl/directorCntl.c,v RCS ID: 1.2.39.1 ./usr/sbin/ase/director/init.c,v RCS ID: 1.1.2.2 ./usr/sbin/ase/msgsvc/msgSvc.c,v RCS ID: 1.2.32.1 ./usr/sbin/ase/util/log.c,v RCS ID: 1.2.14.2 ./usr/sbin/ase/util/util.c,v RCS ID: 1.2.40.6 ./usr/opt/TCR160/sbin/asedirector CHECKSUM: 16219 688 SUBSET: TCRASE160 ./usr/ccs/lib/libcnx/cnx_lib.c,v RCS ID: 1.1.15.1 ./usr/sbin/ase/asecdb/db_marshal.c,v RCS ID: 1.2.34.1 ./usr/sbin/ase/director/dirUtil.c,v RCS ID: 1.2.21.2 ./usr/sbin/ase/director/director.c,v RCS ID: 1.2.24.3 ./usr/sbin/ase/director/eventCntl.c,v RCS ID: 1.2.28.2 ./usr/sbin/ase/director/eventMgr.c,v RCS ID: 1.2.52.3 ./usr/sbin/ase/director/strategist.c,v RCS ID: 1.2.34.3 ./usr/sbin/ase/msgsvc/msgSvc.c,v RCS ID: 1.2.32.1 ./usr/sbin/ase/util/log.c,v RCS ID: 1.2.14.2 ./usr/sbin/ase/util/rtmemlock.c,v RCS ID: 1.1.6.1 ./usr/sbin/ase/util/util.c,v RCS ID: 1.2.40.6 ./usr/opt/TCR160/sbin/aselogger CHECKSUM: 32889 520 SUBSET: TCRASE160 ./usr/ccs/lib/libcnx/cnx_lib.c,v RCS ID: 1.1.15.1 ./usr/sbin/ase/asecdb/db_marshal.c,v RCS ID: 1.2.34.1 ./usr/sbin/ase/msgsvc/msgSvc.c,v RCS ID: 1.2.32.1 ./usr/sbin/ase/util/log.c,v RCS ID: 1.2.14.2 ./usr/sbin/ase/util/util.c,v RCS ID: 1.2.40.6 ./usr/opt/TCR160/sbin/asedit CHECKSUM: 43567 544 SUBSET: TCRASE160 ./usr/ccs/lib/libcnx/cnx_lib.c,v RCS ID: 1.1.11.3 ./usr/sbin/ase/agent/init.c,v RCS ID: 1.1.2.2 ./usr/sbin/ase/asecdb/db_marshal.c,v RCS ID: 1.2.34.1 ./usr/sbin/ase/asemgr/db_util.c,v RCS ID: 1.2.27.1 ./usr/sbin/ase/director/init.c,v RCS ID: 1.1.2.2 ./usr/sbin/ase/msgsvc/msgSvc.c,v RCS ID: 1.2.32.1 ./usr/sbin/ase/util/log.c,v RCS ID: 1.2.14.2 ./usr/sbin/ase/util/util.c,v RCS ID: 1.2.40.6 SUPPORT NOTES: NONE ---------------------------------------------------------- NEW PATCHID: 74.00 PATCH ID: TCR160-061 REQUIRED PATCHES: NONE CONDITIONALLY REQUIRED PATCHES: NONE SUPERSEDED PATCHES: TCR160-045 (41.00), TCR160-048 (44.00), TCR160-049 (45.00) SPECIAL INSTRUCTIONS: NONE FULL DESCRIPTION: PROBLEM: (78166) (PATCH ID: TCR160-045) ******** This patch fixes a problem that caused the setting of the "force unmount" option to be incorrectly displayed by the asemgr utility. PROBLEM: (72984) (PATCH ID: TCR160-048) ******** This patch fixes a problem that caused shell errors if an invalid mount option was specified via the asemgr menu. PROBLEM: (72983) (PATCH ID: TCR160-049) ******** This patch fixes a problem that caused the device name for a Unix File System (UFS) to not be displayed when modifying the "force unmount" option via the asemgr utility. PROBLEM: (78794) (PATCH ID: TCR160-061) ******** This patch fixes a problem that caused the access mode for a directory to not get set to the default after modifying them via asemgr. FILES: ./var/opt/TCR160/ase/sbin/ufs_modify CHECKSUM: 57547 22 SUBSET: TCRASE160 ./usr/sbin/ase/asemgr/sh_bin/ufs_modify.sh,v RCS ID: 1.2.31.3 ./var/opt/TCR160/ase/sbin/advfs_modify CHECKSUM: 12447 19 SUBSET: TCRASE160 ./usr/sbin/ase/asemgr/sh_bin/advfs_modify.sh,v RCS ID: 1.2.34.3 SUPPORT NOTES: NONE ---------------------------------------------------------- NEW PATCHID: 65.00 PATCH ID: TCR160-063 REQUIRED PATCHES: NONE CONDITIONALLY REQUIRED PATCHES: NONE SUPERSEDED PATCHES: TCR160-003 (3.00) SPECIAL INSTRUCTIONS: NONE FULL DESCRIPTION: PROBLEM: (None) (Patch ID: TCR160-003) ******** This patch fixes a problem where DRD permissions could be lost if a service is modified more than once. In V1.6 new functionality was added to allow the setting of the mode, owner and group of DRD devices by invoking the asemgr utility to modify the DRD service. If, after DRD permissions have been set, the service is modified again these DRD permissions could be lost. This problem has been solved in this patch. PROBLEM: (80450) (PATCH ID: TCR160-063) ******** This patch fixes a problem that prevented the removal of LSM volumes from a DRD service. The problem occurs when there are multiple LSM diskgroups in the service, and all of the volumes from one diskgroup were removed. The asemgr prints the following error message: *** `PD_svcname:/dev/rzb16g` is duplicate node. and the removal of the volumes fails. In this case, the physical disk was part of the diskgroup that was being deleted. FILES: ./var/opt/TCR160/ase/sbin/drd_modify CHECKSUM: 13540 31 SUBSET: TCRDSVC160 ./usr/sbin/ase/asemgr/sh_bin/drd_modify.sh,v RCS ID: 1.1.31.3 SUPPORT NOTES: NONE ---------------------------------------------------------- NEW PATCHID: 63.00 PATCH ID: TCR160-064 REQUIRED PATCHES: NONE CONDITIONALLY REQUIRED PATCHES: NONE SUPERSEDED PATCHES: TCR160-029 (20.00), TCR160-050 (46.00) SPECIAL INSTRUCTIONS: NONE FULL DESCRIPTION: PROBLEM: (CFS.68084) (Patch ID: TCR160-029) ******** If two nodes in a cluster are communicating using the mc-api, for example running an MPI application, and a third node, not involved in the calculation, is re-booted then the first two nodes can hang requiring a re-boot to resolve the hang. When a node enters or leaves the cluster (boots or shutsdown) the Memory Channel failover code is invoked. The problem was that the failover code was attempting to take a high level lock which under certain circumstances was held by another process and so the mc-api failover code would wait forever in kernel mode resulting in a system hang. The problem was fixed by changing mc-api failover take the lower level lock. PROBLEM: (76608, 76806) (PATCH ID: TCR160-050) ******** This patch fixes a problem that can cause a panic in mcs_wait_cluster_event() when using the Memory Channel API. The following is an example stack trace from a lockmode=4 panic: 0 boot() 1 panic() 2 simple_lock_fault() 3 simple_unlock_count_violation() 4 mcs_wait_cluster_event() 5 mcs_configure() 6 kmodcall() 7 syscall() 8 _Xsyscall() PROBLEM: (CFS.76473) (PATCH ID: TCR160-064) ******** This patch fixes a problem with the Memory Channel API whereby a node crashes holding an mc-api lock, under certain circumstances the lock will not be released after the node crashes. For the problem to occur there must be 3 or more nodes in the cluster and the node handling the cleanup after a node crashes (known as the primary mapper) does not have the lock allocated. FILES: ./usr/opt/TCR160/sys/mcs.mod CHECKSUM: 08235 263 SUBSET: TCRMCA160 ./kernel/rm/pmcs/mcs_exit.c,v RCS ID: 1.1.23.1 ./kernel/rm/pmcs/mcs_failover.c,v RCS ID: 1.1.21.2 ./kernel/rm/pmcs/mcs_utils.c,v RCS ID: 1.1.18.1 SUPPORT NOTES: NONE ---------------------------------------------------------- NEW PATCHID: 72.00 PATCH ID: TCR160-067 REQUIRED PATCHES: NONE CONDITIONALLY REQUIRED PATCHES: NONE SUPERSEDED PATCHES: NONE SPECIAL INSTRUCTIONS: NONE FULL DESCRIPTION: PROBLEM: (81866) (PATCH ID: TCR160-067) ******** This patch fixes a problem that caused an error message to be printed if the system contained unsupported controllers. The error message will now only be printed when running the command in verbose mode. FILES: ./usr/opt/TCR160/sbin/drd_dma CHECKSUM: 28741 48 SUBSET: TCRDSVC160 ./usr/sbin/drd_dma/drd_dma.c,v RCS ID: 1.1.4.1 SUPPORT NOTES: NONE



This patch can be found at any of these sites:

Colorado Site
Georgia Site



Files on this server are as follows:

itsec_cert_kit_t64v40g.README
itsec_cert_kit_t64v40g.CHKSUM
itsec_cert_kit_t64v40g.tar
itsec_cert_kit_t64v40g_releasenotes.pdf

privacy and legal statement