PROBLEM: (USG-03327) (Patch ID: OSF350-248) ******** Fixes a kernel memory fault panic that occurs on SMP platforms when running the Unicenter product from Computer Associates in conjunction with Oracle software. This panic will show a variety of stack traces due to memory corruption caused by the inadvertant freeing of a memory block. The panic string will always be "kernel memory fault". 1 panic(s = "kernel memory fault") subr_prf.c:757 2 trap() trap.c:1223 3 _XentMM() locore.s:1307 4 obj_entry_find() ipc_prims.c:112 5 port_dealloc() ipc_kport.c:331 6 ipc_task_terminate() ipc_tt.c:373 7 task_terminate() task.c:648 8 exit() kern_exit.c:922 9 rexit() kern_exit.c:635 10 Enf_exit() enfk_exit.c:121 11 syscall() syscall_trap.c:519 9 panic(s = "kernel memory fault") subr_prf.c:757 10 trap() trap.c:1223 11 _XentMM()locore.s:1307 12 malloc() kern_malloc.c:747 13 msg_copyin() ipc_copyin.c:414 14 msg_rpc_trap() ipc_basics.c:1405 15 _Xsyscall() locore.s:1249 7 panic(s = "kernel memory fault") subr_prf.c:757 8 trap() trap.c:1223 9 _XentMM()locore.s:1307 10 ubc_flush_dirty() vfs_ubc.c:2978 11 ufs_fsync_int() ufs_vnops.c:2007 12 ufs_fsync() ufs_vnops.c:2105 13 ufs_sync() ufs_vfsops.c:1600 14 sync() vfs_syscalls.c:1395 15 syscall() syscall_trap.c:519 PROBLEM: (FNO100128) (Patch ID: OSF375-350294) ******** This patch fixes a system panic caused by a Windows95 or WindowsNT system sending an illegal length ping (ICMP) packet. PROBLEM: (QAR 49023) (Patch ID: OSF375-350305) ******** A "panic: lock_read: hierarchy violation in del_dealloc_stg" error occurs when a socket lock is held by a UNIX domain while calling vrele(). PROBLEM: (CA7Q10994) (Patch ID: OSF375-350342) ******** This patch fixes a problem that occurs on all systems that use networking services. The problem can be seen when a system attempts to ping a Digital UNIX system connected to a token ring network and the ping uses a message size that requires fragmentation. The Digital UNIX system receiving the ping cannot respond. The token ring driver displays the following error message to the console and resets the token ring adapter: List Error in transmit PROBLEM: (CLD MCPM3028N) (Patch ID: OSF375-365055) ******** This patch fixes a problem in which network applications communicating to one of the host's own addresses, may hang, or receive the error message: no buffer space available The problem occurs due to a queue full condition on the interface. In an Available Server (ASE) or TruCluster environment, the daemons will no longer be able to communicate with each other, and the asemgr utility will appear to hang. PROBLEM: (CLD UVO105250) (Patch ID: OSF375-365057) ******** This patch fixes a problem in which packet filter programs do not receive packets when the source is sending multicast packets on an Ethernet network. PROBLEM: (MGO102810/QAR 49847) (Patch ID: OSF375-350384) ******** This patch is an enhanced fix to the solockpair() routine. This fix was needed because the routine was freeing a socket lock structure that was concurrently spun upon in lock_write(). Typical problem symptoms include kernel memory faults with sockets, mbufs and mblocks as well as hangs. Applications using sockets in a multi-threaded, multi-cpu environment can experience a number of lock violations with the socket structures. This patch is MANDATORY to install on all systems. It will be effective on Uniprocessor systems when lockmode debugging is invoked.