HP Tru64 UNIX Patch Summary and Release Notes for Patch Kit 2 This manual describes the contents of Patch Kit 2 for the 5.1B version of the Tru64 UNIX operating system and TruCluster Server Software products. It provides special instructions for installing individual patches. See the _T_e_c_h_n_i_c_a_l _U_p_d_a_t_e_s _f_o_r _T_r_u_6_4 _U_N_I_X _P_a_t_c_h _K_i_t_s for information about restrictions and problems that may have been discovered since the release of this kit. See the _P_a_t_c_h _K_i_t _I_n_s_t_a_l_l_a_t_i_o_n _I_n_s_t_r_u_c_t_i_o_n_s for information about installing or removing patches, baselining, and general patch management. This document might contain lines too long to fit on an ordinary page; these lines will be truncated i_f__t_h_e__d_o_c_u_m_e_n_t__i_s__p_r_i_n_t_e_d__i_n__p_o_r_t_r_a_i_t__m_o_d_e_._______ Print this document using the _l_p_r command with its -H_Oe_lw_al_ne_dt_st_c-_aP_pa_eckoaprtdioCno.mpany Palo Alto, California Copyright 2003 Hewlett-Packard Development Company, L.P. Microsoft(R), Windows(R), and Windows NT(R) are trademarks of Microsoft Corporation in the U.S. and/or other countries. Intel(R) and Pentium(R) are trademarks of Intel Corporation in the U.S. and/or other countries. Motif(R), OSF/1(R), The Open GroupTM, and UNIX(R) are trademarks of The Open Group in the U.S. and/or other countries. All other product names mentioned herein may be trademarks or registered trademarks of their respective companies. Confidential computer software. Valid license from Compaq Computer Corporation, a wholly owned subsidiary of Hewlett-Packard Company, required for possession, use, or copying. Consistent with FAR 12.211 and 12.212, Commercial Computer Software, Computer Software Documentation, and Technical Data for Commercial Items are licensed to the U.S. Government under vendor's standard commercial license. None of Compaq, HP, or any of their subsidiaries shall be liable for technical or editorial errors or omissions contained herein. The information in this document is provided "as is" without warranty of any kind and is subject to change without notice. The warranties for Compaq products are set forth in the express limited warranty statements accompanying such products. Nothing herein should be construed as constituting an additional warranty. Contents About This Manual Audience ............................................ vi Organization ........................................ vi Related Documentation ............................... vi Patch Process Resources ............................. vii Reader's Comments ................................... vii 1 Tru64 UNIX Patches 1.1 Release Notes ................................. 1-1 1.1.1 Required Storage Space ................... 1-1 1.1.2 Problems Uninstalling the Patch Kit ...... 1-2 1.1.2.1 Required Action for Removing Patch 16.00 .................................. 1-2 1.1.3 ES47/ES80/GS1280 Time Loss ............... 1-2 1.1.4 Enabling envmond on AlphaServer ES47/ES80/GS1280 systems (Patch 452) ....... 1-3 1.1.4.1 New Security Feature (Patch 872.00) 1-4 1.1.5 Possible Problem when Processing Many Command Parameters ......................... 1-6 1.1.6 Loading Firmware from a BOOTP Server ..... 1-6 1.1.6.0.1 Enhancements to pmgrd Daemon and collect Utility (Patches 779.00 and 781.00) ............................. 1-7 1.1.6.1 Performance Manager Metrics Server Daemon (pmgrd) ......................... 1-7 1.1.6.2 collect Utility .................... 1-8 1.1.6.3 File System Management Applications Enhanced (Patch 825.00) ................ 1-8 1.1.6.4 Changes to tar, pax, and cpio Behavior (Patch 643.00) ................ 1-8 1.1.6.5 Changes to vdump and vrestore Allow Larger Record Sizes (Patch 685.00) ..... 1-9 1.1.7 Problem Seen on Systems with Smart Array Controller ................................. 1-9 1.1.8 Broken Links Reported During Baselining .. 1-10 1.1.8.1 Russian Keyboard (Patch 339.00) .... 1-10 1.1.9 Panics May Occur on Multi-CPU Systems .... 1-11 1.1.10 General and Problem Information for AlphaServer ES47, ES80, and GS1280 Systems . 1-11 1.1.10.1 CPU Offline Restrictions .......... 1-12 1.1.10.2 Problem with Capacity-on-Demand Process ................................ 1-12 1.1.10.3 Hardware SCSI Bus Errors .......... 1-12 1.1.10.4 Repeated Reboots May Cause Panic .. 1-12 1.1.10.5 Caution on Updating to Version 5.1B with DEGXA NICs ........................ 1-13 1.1.10.6 Tuning the NFS Server Duplicate Request Cache (Patch 838.00) ........... 1-13 1.2 Summary of Base Operating System Patches ...... 1-13 2 TruCluster Server Patches 2.1 Release Notes ................................. 2-1 2.1.1 Required Storage Space ................... 2-1 2.1.2 AlphaServer ES47 or AlphaServer GS1280 Hangs When Added to Cluster ................ 2-2 2.1.3 No-Roll Procedure Cannot Be Used to Remove Patch Kit .................................. 2-3 2.1.4 Updates for Rolling Upgrade Procedures ... 2-3 2.1.4.1 Noncritical Errors ................. 2-3 2.1.4.2 Procedure for Simultaneous Upgrades 2-3 2.1.4.3 Unrecoverable Failure Procedure .... 2-3 2.1.4.4 During Rolling Patch, Do Not Add or Delete OSF, TCR, IOS, or OSH Subsets ... 2-4 2.1.4.4.0 *** _U_N_T_I_T_L_E_D *** .......... 2-4 iv Contents 2.1.4.4.1 Ignore Message About Missing ladebug.cat File During Rolling Upgrade ............................. 2-4 2.1.4.5 clu_upgrade undo of Install Stage Can Result in Incorrect File Permissions ... 2-5 2.1.4.6 Missing Entry Messages Can Be Ignored During Rolling Patch ................... 2-5 2.1.4.7 Relocating AutoFS During a Rolling Upgrade on a Cluster ................... 2-6 2.1.5 Additional Steps Required When Installing Patches Before Cluster Creation ............ 2-7 2.1.6 When Taking a Cluster Member to Single-User Mode, First Halt the Member ................ 2-8 2.1.7 Problems with clu_upgrade switch Stage ... 2-8 2.2 Summary of TruCluster Software Patches ........ 2-8 Contents v About This Manual This manual contains information specific to Patch Kit 2 of the Tru64 UNIX operating system and TruCluster Server software products for Version 5.1B. It briefly describes the patches contained in this kit and provides information you should be aware of when installing certain patches. _A_u_d_i_e_n_c_e This manual is for the person who installs and removes the patch kit and for anyone who manages patches after they are installed. _O_r_g_a_n_i_z_a_t_i_o_n This manual is organized as follows: ______________________________________________________________________________ Chapter 1 Provides information about the Tru64 UNIX patches included in this kit. Chapter 2 Provides information about the TruCluster Server software patches included in this kit. ______________________________________________________________________________ _R_e_l_a_t_e_d _D_o_c_u_m_e_n_t_a_t_i_o_n In addition to this manual, the following documentation may be helpful in the patching process: +o _T_e_c_h_n_i_c_a_l _U_p_d_a_t_e_s _f_o_r _T_r_u_6_4 _U_N_I_X _P_a_t_c_h _K_i_t_s This document reports any information about restrictions and problems that may have been discovered since the release of this and other patch kits. +o Tru64 UNIX and TruCluster Server _P_a_t_c_h _K_i_t _I_n_s_t_a_l_l_a_t_i_o_n _I_n_s_t_r_u_c_t_i_o_n_s +o _P_a_t_c_h_i_n_g _B_e_s_t _P_r_a_c_t_i_c_e +o The dddduuuuppppaaaattttcccchhhh(8) reference page, which describes the use of dddduuuuppppaaaattttcccchhhh from the command line. This reference page is installed when you install the dddduuuuppppaaaattttcccchhhh tools. +o Tru64 UNIX _I_n_s_t_a_l_l_a_t_i_o_n _G_u_i_d_e +o Tru64 UNIX _S_y_s_t_e_m _A_d_m_i_n_i_s_t_r_a_t_i_o_n +o TruCluster Server _C_l_u_s_t_e_r _I_n_s_t_a_l_l_a_t_i_o_n +o TruCluster Server _C_l_u_s_t_e_r _A_d_m_i_n_i_s_t_r_a_t_i_o_n +o Release-specific installation documentation _P_a_t_c_h _P_r_o_c_e_s_s _R_e_s_o_u_r_c_e_s We provide Web sites to help you with the patching process: +o To obtain the latest patch kit for your operating system and cluster: hhhhttttttttpppp::::////////ffffttttpppp1111....ssssuuuuppppppppoooorrrrtttt....ccccoooommmmppppaaaaqqqq....ccccoooommmm////ppppuuuubbbblllliiiicccc////uuuunnnniiiixxxx//// +o To view or print the latest version of the _P_a_t_c_h _K_i_t _I_n_s_t_a_l_l_a_t_i_o_n _I_n_s_t_r_u_c_t_i_o_n_s or the _P_a_t_c_h _S_u_m_m_a_r_y _a_n_d _R_e_l_e_a_s_e _N_o_t_e_s for a specific patch kit: hhhhttttttttpppp::::////////hhhh33330000000099997777....wwwwwwwwwwww3333....hhhhpppp....ccccoooommmm////ddddooooccccssss////ppppaaaattttcccchhhh////iiiinnnnddddeeeexxxx....hhhhttttmmmmllll +o To visit our main support page: hhhhttttttttpppp::::////////hhhh77771111000022225555....wwwwwwwwwwww7777....hhhhpppp....ccccoooommmm////ssssuuuuppppppppoooorrrrtttt////hhhhoooommmmeeee////iiiinnnnddddeeeexxxx....aaaasssspppp +o To visit the Tru64 UNIX homepage: hhhhttttttttpppp::::////////hhhh33330000000099997777....wwwwwwwwwwww3333....hhhhpppp....ccccoooommmm//// _R_e_a_d_e_r'_s _C_o_m_m_e_n_t_s We welcome any comments and suggestions you have on this and other Tru64 UNIX manuals. You can send your comments in the following ways: +o Fax: 603-884-0120 Attn: HCTO Information Development, ZK03-3/Y32 +o Internet electronic mail: rrrreeeeaaaaddddeeeerrrrssss____ccccoooommmmmmmmeeeennnntttt@@@@zzzzkkkk3333....ddddeeeecccc....ccccoooommmm About This Manual vii A Reader's Comment form is located on your system in the following location: ////uuuussssrrrr////ddddoooocccc////rrrreeeeaaaaddddeeeerrrrssss____ccccoooommmmmmmmeeeennnntttt....ttttxxxxtttt +o Mail: Hewlett-Packard Company HCTO Information Development Manager ZK03-3/Y32 110 Spit Brook Road Nashua, NH 03062-9987 Please include the following information along with your comments: +o The full title of this document. +o The section numbers and page numbers of the information on which you are commenting. +o The version of Tru64 UNIX that you are using. +o If known, the type of processor that is running the Tru64 UNIX software. The Tru64 UNIX Publications group cannot respond to system problems or technical support inquiries. Please address technical questions to your local system vendor or to the appropriate technical support office. Information provided with the software media explains how to send problem reports. viii About This Manual Tru64 UNIX Patches 1 This chapter provides information about the patches included in Patch Kit 2 for the base operating system. It also includes any general information about working with these patches. This chapter is organized as follows: +o Section 1.1 provides release notes that are specific to the Tru64 UNIX patches in this kit, as well as release notes that are of general interest. +o Section 1.2 provides brief descriptions of the Tru64 UNIX patches included in this kit. _1._1 _R_e_l_e_a_s_e _N_o_t_e_s This section provides release notes that are specific to the Tru64 UNIX patches in this kit, as well as release notes that are of general interest. _1._1._1 _R_e_q_u_i_r_e_d _S_t_o_r_a_g_e _S_p_a_c_e Approximately 250 MB of temporary storage space is required to untar the base and TruCluster components of this patch kit. We recommend that this kit not be placed in the ////, ////uuuussssrrrr, or ////vvvvaaaarrrr file systems because doing so may unduly constrain the available storage space for the patching activity. The following permanent storage space is required to install the base component of this patch kit: +o Approximately 76.9 MB of storage space in ////vvvvaaaarrrr////aaaaddddmmmm////ppppaaaattttcccchhhh////bbbbaaaacccckkkkuuuupppp may be required for archived original files if you choose to install and revert all patches. See the _P_a_t_c_h _K_i_t _I_n_s_t_a_l_l_a_t_i_o_n _I_n_s_t_r_u_c_t_i_o_n_s for more information. +o Approximately 78.2 MB of storage space in ////vvvvaaaarrrr////aaaaddddmmmm////ppppaaaattttcccchhhh may be required for original files if you choose to install and revert all patches. See the _P_a_t_c_h _K_i_t _I_n_s_t_a_l_l_a_t_i_o_n _I_n_s_t_r_u_c_t_i_o_n_s for more information. +o Approximately 1142 KB of storage space is required in ////vvvvaaaarrrr////aaaaddddmmmm////ppppaaaattttcccchhhh////ddddoooocccc for patch abstract and README documentation. +o Approximately 78247 KB of storage space is needed in ////uuuussssrrrr////ssssbbbbiiiinnnn////dddduuuuppppaaaattttcccchhhh for the patch management utility. See Section 2.1.1 for information on space needed for the TruCluster Server patches. _1._1._2 _P_r_o_b_l_e_m_s _U_n_i_n_s_t_a_l_l_i_n_g _t_h_e _P_a_t_c_h _K_i_t If you made the following changes to your system after installing the patch kit, you will have to undo those changes before you can uninstall the patch kit: +o If you changed your hardware configuration (for example, by adding a new disk), the system configuration that existed prior to installing the patch kit might not recognize the new devices or may not provide the necessary support for them. +o If you added new cluster members, the new members will not have an older state to revert to if you attempt to uninstall the patch kit. To uninstall the patch kit, do the following: 1. Remove all new hardware and new cluster members that you added after installing the patch kit. 2. Run dddduuuuppppaaaattttcccchhhh to uninstall the patch kit. 3. Verify that the patch kit was successfully uninstalled. You can now add the cluster members you removed and reinstall the hardware you removed, as long as the support for it existed in the pre-patched system. You can also reinstall the patch kit. _1._1._2._1 _R_e_q_u_i_r_e_d _A_c_t_i_o_n _f_o_r _R_e_m_o_v_i_n_g _P_a_t_c_h _1_6._0_0 If you delete Patch 16.00, you must run the ////eeeettttcccc////ddddnnnn____ffffiiiixxxx____ddddaaaatttt....sssshhhh script prior to rebooting your system. If you are removing the patch from a cluster, you must run the script on each cluster member before you reboot the member. See Section 2.1.3 for more information. _1._1._3 _E_S_4_7/_E_S_8_0/_G_S_1_2_8_0 _T_i_m_e _L_o_s_s The ES47, ES80, and GS1280 AlphaServers may experience a time loss as a result of console callbacks for environmental information if the server's firmware is lower than V6.4-12. 1-2 Tru64 UNIX Patches Updating your firmware to V6.4-12 or higher will keep the problem from occurring or correct the problem if it has occurred. If your firmware is lower than V6.4-12, the problem is experienced if one or both of the following conditions exists: +o The system manager uses the following hhhhwwwwmmmmggggrrrr utility commands: # hhhhwwwwmmmmggggrrrr -view devices # hhhhwwwwmmmmggggrrrr -view hierarchy +o The Environmental Monitoring daemon, eeeennnnvvvvmmmmoooonnnndddd, is running. Workarounds to the problem are as follows: +o Do not use the hhhhwwwwmmmmggggrrrr -view commands +o Modify either one of the following files: - ////eeeettttcccc////rrrrcccc....ccccoooonnnnffffiiiigggg Turn off environmental monitoring by changing the entry EEEENNNNVVVVMMMMOOOONNNN____CCCCOOOONNNNFFFFIIIIGGGGUUUURRRREEEEDDDD====1111 ttttoooo EEEENNNNVVVVMMMMOOOONNNN____CCCCOOOONNNNFFFFIIIIGGGGUUUURRRREEEEDDDD====0000 You can also use the eeeennnnvvvvccccoooonnnnffffiiiigggg utility to modify the ////eeeettttcccc////rrrrcccc....ccccoooonnnnffffiiiigggg file. See eeeennnnvvvvccccoooonnnnffffiiiigggg(8) for information on using the utility. - ////eeeettttcccc////ssssyyyyssssccccoooonnnnffffiiiiggggttttaaaabbbb Go to the end of the file and add the following line and add the following line: marvel_srvmgmt: MV_Env_Support = 0 You must remove this setting after you install firmware V6.4-11 or higher. You must reboot your system for these settings to take effect. _1._1._4 _E_n_a_b_l_i_n_g _e_n_v_m_o_n_d _o_n _A_l_p_h_a_S_e_r_v_e_r _E_S_4_7/_E_S_8_0/_G_S_1_2_8_0 _s_y_s_t_e_m_s (_P_a_t_c_h _4_5_2) After installing Patch 452, the eeeennnnvvvvmmmmoooonnnndddd daemon will be disabled on ES47, ES80, and GS1280 AlphaServers.. To enable environmental monitoring, change the entry EEEENNNNVVVVMMMMOOOONNNN____CCCCOOOONNNNFFFFIIIIGGGGUUUURRRREEEEDDDD====0000 ttttoooo EEEENNNNVVVVMMMMOOOONNNN____CCCCOOOONNNNFFFFIIIIGGGGUUUURRRREEEEDDDD====1111 in the ////eeeettttcccc////rrrrcccc....ccccoooonnnnffffiiiigggg file. You can do this using one of Tru64 UNIX Patches 1-3 the following commands: ////uuuussssrrrr////ssssbbbbiiiinnnn////eeeennnnvvvvccccoooonnnnffffiiiigggg ----cccc EEEENNNNVVVVMMMMOOOONNNN____CCCCOOOONNNNFFFFIIIIGGGGUUUURRRREEEEDDDD====1111 ////uuuussssrrrr////ssssbbbbiiiinnnn////rrrrccccmmmmggggrrrr sssseeeetttt EEEENNNNVVVVMMMMOOOONNNN____CCCCOOOONNNNFFFFIIIIGGGGUUUURRRREEEEDDDD 1111 If your server's firmware is lower than V6.4-12, see Section 1.1.4 before enabling environmental monitoring. _1._1._4._1 _N_e_w _S_e_c_u_r_i_t_y _F_e_a_t_u_r_e (_P_a_t_c_h _8_7_2._0_0) Patch 872.00 provides a new security feature to prevent the execution of instructions that reside in heap or other data areas of process memory. The result is additional protection against buffer overflow exploits. This feature is similar in concept to Tru64 UNIX executable stack protection. The new feature is implemented as a dynamic sysconfig tunable, eeeexxxxeeeeccccuuuuttttaaaabbbblllleeee____ddddaaaattttaaaa, in the proc subsystem. The supported settings allow system administrators to cause requests from privileged processes for writable and executable memory to fail, or to be treated as a request for writable memory, and to optionally generate a message when such a request occurs. In a buffer overflow exploitation, an attacker feeds a privileged program an unexpectedly large volume of carefully constructed data through inputs such as command line arguments and environment variables. If the program is not coded defensively, the attacker can overwrite areas of memory adjacent to the buffer. Depending upon the location of the buffer (stack, heap, data area), the attacker can deceive these programs into executing malicious code that takes advantage of the program's privileges or alter a security-sensitive program variable to redirect program flow. With some expertise, such an attack can be used to gain root access to the system. Enabling the eeeexxxxeeeeccccuuuuttttaaaabbbblllleeee____ddddaaaattttaaaa tunable changes a potential system compromise into, at worst, a denial-of-service attack. A vulnerable program may still contain a buffer overflow, but an exploit that writes an instruction stream into the buffer and attempts to transfer control to those instructions will fail, because memory protection will prohibit instruction execution from that area of memory. Many applications never execute from the memory even though they unnecessarily request write-execute memory directly or as a result of an underlying function acting on their behalf. By substituting writable memory for the requested write-execute memory, the eeeexxxxeeeeccccuuuuttttaaaabbbblllleeee____ddddaaaattttaaaa tunable allows such applications to benefit from the additional protection without requiring application modification. See ssssyyyyssss____aaaattttttttrrrrssss____pppprrrroooocccc(5) for more information. Before enabling eeeexxxxeeeeccccuuuuttttaaaabbbblllleeee____ddddaaaattttaaaa (changing it from the default value of 0), you must run the ////uuuussssrrrr////ssssbbbbiiiinnnn////jjjjaaaavvvvaaaaeeeexxxxeeeeccccuuuutttteeeeddddaaaattttaaaa script. Otherwise, privileged java applications will fail in unpredictable ways. See jjjjaaaavvvvaaaaeeeexxxxeeeeccccuuuutttteeeeddddaaaattttaaaa(8) for more information. 1-4 Tru64 UNIX Patches _N_o_t_e The Java language interprets bytecode at runtime. Unless marked as exempt, privileged applications written in Java will receive an error when they attempt to execute instructions residing in the unexecutable memory. The manner in which these errors are handled is application-specific and thus unpredictable. This is why you must run the ////uuuussssrrrr////ssssbbbbiiiinnnn////jjjjaaaavvvvaaaaeeeexxxxeeeeccccuuuutttteeeeddddaaaattttaaaa before you enable eeeexxxxeeeeccccuuuuttttaaaabbbblllleeee____ddddaaaattttaaaa. The following example demonstrates the failing behavior to expect for a privileged processes if eeeexxxxeeeeccccuuuutttteeee____ddddaaaattttaaaa is set to 53 but runs the ////uuuussssrrrr////ssssbbbbiiiinnnn////jjjjaaaavvvvaaaaeeeexxxxeeeeccccuuuutttteeeeddddaaaattttaaaa script. Other Java applications run with privilege may exhibit different (but still failing) behavior. # java -classic -jar SwingSet2.jar Process 1185 Invalid write/execute mmap call denied. Process 1185 Invalid write/execute mmap call denied. Process 1185 Invalid write/execute mmap call denied. (...) Process 1185 Invalid write/execute mmap call denied. Process 1185 Invalid write/execute mmap call denied. **Out of memory, exiting** The following example demonstrates the failing behavior to expect for a privileged processes if eeeexxxxeeeeccccuuuutttteeee____ddddaaaattttaaaa is set to 37 but runs the ////uuuussssrrrr////ssssbbbbiiiinnnn////jjjjaaaavvvvaaaaeeeexxxxeeeeccccuuuutttteeeeddddaaaattttaaaa script. Other java applications run with privilege may exhibit different (but still failing) behavior. # java -classic -jar SwingSet2.jar Process 1185 Invalid write/execute mmap call modified. Process 1185 Invalid write/execute mmap call modified. (...) Process 1185 Invalid write/execute mmap call modified. Process 1185 Invalid write/execute mmap call modified. Process 1185 Invalid write/execute mmap call modified. SIGSEGV 11* segmentation violation (...) Abort (core dumped) Certain privileged Pascal programs may also fail when eeeexxxxeeeeccccuuuuttttaaaabbbblllleeee____ddddaaaattttaaaa is enabled. Such programs should also be marked as exempt, using the new cccchhhhaaaattttrrrr utility, included in Patch 872.00 and described as follows: $chatr +ed enable priv_pascal_executable current values: 64-bit COFF executable execute from data: disabled new values: 64-bit COFF executable execute from data: enabled Tru64 UNIX Patches 1-5 See cccchhhhaaaattttrrrr(1) _1._1._5 _P_o_s_s_i_b_l_e _P_r_o_b_l_e_m _w_h_e_n _P_r_o_c_e_s_s_i_n_g _M_a_n_y _C_o_m_m_a_n_d _P_a_r_a_m_e_t_e_r_s When running commands or scripts that must process a large amount of command parameters, your system may hang or you may see an error similar to this: ////ssssbbbbiiiinnnn////llllssss:::: aaaarrrrgggg lllliiiisssstttt ttttoooooooo lllloooonnnngggg. If this occurs, try rerunning the command or script after entering the following command to relax the command-line limits: # ssssyyyyssssccccoooonnnnffffiiiigggg ----rrrr pppprrrroooocccc eeeexxxxeeeecccc____ddddiiiissssaaaabbbblllleeee____aaaarrrrgggg____lllliiiimmmmiiiitttt====1111 _1._1._6 _L_o_a_d_i_n_g _F_i_r_m_w_a_r_e _f_r_o_m _a _B_O_O_T_P _S_e_r_v_e_r The ffffwwwwuuuuppppggggrrrraaaaddddeeee command has been modified in Patch Kit 2 to allow the specified firmware update image to be loaded from a BBBBOOOOOOOOTTTTPPPP server in a connected network. This process must use the bbbboooooooottttppppdddd daemon. The subset where the bbbboooooooottttppppdddd ships is optional, so OSFOBSOLETE540 must be installed. Create a symbolic link from the shipping location of bbbboooooooottttppppdddd to the expected location: # llllnnnn ----ssss ////uuuussssrrrr////oooopppptttt////oooobbbbssssoooolllleeeetttteeee////uuuussssrrrr////ssssbbbbiiiinnnn////bbbboooooooottttppppdddd ////uuuussssrrrr////ssssbbbbiiiinnnn////bbbboooooooottttpppp You must manually create the bbbboooooooottttppppttttaaaabbbb file on the server. The following is an example of how to set up the bbbboooooooottttppppttttaaaabbbb file on the server for this procedure: # Example bootptab file for BOOTP support .default1:\ :hd=/install/firmware:\ :sm=255.255.255.0\ :gw=16.69.255.1: # tab:tc=.default1:ht=ethernet:ha=08002b86f234:ip=16.69.222.42: bobafett:tc=.default1:ht=ethernet:ha=0008c73a5a47:ip=16.69.222.48: # In this example, the directory ////iiiinnnnssssttttaaaallllllll////ffffiiiirrrrmmmmwwwwaaaarrrreeee was created on the bbbboooooooottttpppp server. This directory must contain the firmware of the systems to be updated. The file names must match the entry on the ffffwwwwuuuuppppggggrrrraaaaddddeeee command line. The firmware files must have read permissions, that is, 444. You must edit the iiiinnnneeeettttdddd....ccccoooonnnnffff file so that the file name passed by ffffwwwwuuuuppppggggrrrraaaaddddeeee is found by the console firmware. Edit the line ////eeeettttcccc////iiiinnnneeeettttdddd....ccccoooonnnnffff file on the bbbboooooooottttpppp server to look like following: 1-6 Tru64 UNIX Patches tftp dgram udp wait root /usr/sbin/tftpd tftp -r /install/firmware Enable bbbboooooooottttppppdddd to start by removing the comment symbol (#) from the beginning of the line in the ////eeeettttcccc////iiiinnnneeeettttdddd....ccccoooonnnnffff file; bootps dgram udp wait root /usr/sbin/bootpd bootpd See the ffffwwwwuuuuppppggggrrrraaaaddddeeee(8), bbbboooooooottttppppttttaaaabbbb(4), and bbbboooooooottttppppdddd(8) reference pages for more information. _1._1._6._0._1 _E_n_h_a_n_c_e_m_e_n_t_s _t_o _p_m_g_r_d _D_a_e_m_o_n _a_n_d _c_o_l_l_e_c_t _U_t_i_l_i_t_y (_P_a_t_c_h_e_s _7_7_9._0_0 _a_n_d _7_8_1._0_0) - The installation of Patch 779.00 and Patch 781.00 provides enhancements to the performance manager metrics server daemon, ppppmmmmggggrrrrdddd, and the ccccoooolllllllleeeecccctttt utility. _1._1._6._1 _P_e_r_f_o_r_m_a_n_c_e _M_a_n_a_g_e_r _M_e_t_r_i_c_s _S_e_r_v_e_r _D_a_e_m_o_n (_p_m_g_r_d) The following features have been added to ppppmmmmggggrrrrdddd: +o Support for monitoring the disk I/O rates. Enables ppppmmmmggggrrrrdddd to provide details on disk I/O rates, such as the average number of bytes transferred per second and the average number of transfers completed per second over the past 1 minute, 5 minutes, 30 minutes, and 60 minutes. +o Support for monitoring the AdvFS statistics. Enables ppppmmmmggggrrrrdddd to provide the following types of details on AdvFS file systems: - The domain name - The fileset name - Number of files and blocks - Soft and hard limits of files - Soft and hard limits of blocks - The status of user and group quotas - Grace time and fileset clone information It can also provide AdvFS volume details such as available blocks, percentage of volume used, I/O consolidation mode, and the number of read/write blocks. The new MIB file ppppmmmmAAAAddddvvvvffffssss....mmmmiiiibbbb has been added to provide Tru64 UNIX Patches 1-7 these statistics. The ccccoooolllllllleeeecccctttt utility displays these new AdvFS statistics. (See Section 1.1.9.2). As a result of the improvements made to ppppmmmmggggrrrrdddd, we recommend that you use the SysMan Menu to manage AdvFS file systems rather than the ddddttttaaaaddddvvvvffffssss graphical user interface and the aaaaddddvvvvffffssssdddd daemon. To use SysMan Menu, select Storage -> File System Management Utilities -> Advanced File System (AdvFS) Utilities. You can also enter the following command: # ssssyyyyssssmmmmaaaannnn aaaaddddvvvvffffssss See ppppmmmmggggrrrrdddd(8) for more details. Patch 876.00 installs the revised ppppmmmmggggrrrrdddd(8) reference page. _1._1._6._2 _c_o_l_l_e_c_t _U_t_i_l_i_t_y The following features have been added to the ccccoooolllllllleeeecccctttt utility, which is updated from Version 2.0.0 to 2.0.5: +o AdvFS monitoring capability. (See Section 1.1.9 for a list of AdvFS metrics that are monitored.) Enables ccccoooolllllllleeeecccctttt to report AdvFS volume I/O queue and fileset vnode operation statistics. You can specify the domain or fileset to be monitored, using the -A option. +o Viewing CPU and memory metrics on a per Resource Affinity Domain (RAD) basis. When run on a NUMA platform, enables ccccoooolllllllleeeecccctttt to automatically retrieve CPU and memory metrics for each RAD. See ccccoooolllllllleeeecccctttt(8) for more details. Patch 876.00 installs the revised ppppmmmmggggrrrrdddd(8) reference page. _1._1._6._3 _F_i_l_e _S_y_s_t_e_m _M_a_n_a_g_e_m_e_n_t _A_p_p_l_i_c_a_t_i_o_n_s _E_n_h_a_n_c_e_d (_P_a_t_c_h _8_2_5._0_0) Patch 825.00 enhances SysMan Menu file system management applications to significantly improve their performance. _1._1._6._4 _C_h_a_n_g_e_s _t_o _t_a_r, _p_a_x, _a_n_d _c_p_i_o _B_e_h_a_v_i_o_r (_P_a_t_c_h _6_4_3._0_0) When extracting or listing an archive using the ttttaaaarrrr, ppppaaaaxxxx, or ccccppppiiiioooo commands, specifying a slash (/) at the end of argument will cause the command to act upon the directory and not the contents in the directory. For example: 1-8 Tru64 UNIX Patches # ttttaaaarrrr xxxxvvvvffff ffffiiiilllleeeennnnaaaammmmeeee....ttttaaaarrrr ddddiiiirrrr1111//// When creating an archive with these commands, specifying multiple slashes will result in the placement of one slash for any directory entry in the archive header. Previously, specifying multiple slashes would put these slashes in the archive header. For example: # ttttaaaarrrr ccccvvvvffff ffffiiiilllleeeennnnaaaammmmeeee....ttttaaaarrrr ddddiiiirrrr1111//////////////////////////////////////// Specifying a single slash when creating the archive will cause ttttaaaarrrr, ppppaaaaxxxx, or ccccppppiiiioooo to pick up all of the directory's contents. For example: # ttttaaaarrrr ccccvvvvffff ffffiiiilllleeeennnnaaaammmmeeee....ttttaaaarrrr ddddiiiirrrr1111//// _1._1._6._5 _C_h_a_n_g_e_s _t_o _v_d_u_m_p _a_n_d _v_r_e_s_t_o_r_e _A_l_l_o_w _L_a_r_g_e_r _R_e_c_o_r_d _S_i_z_e_s (_P_a_t_c_h _6_8_5._0_0) The vvvvdddduuuummmmpppp and vvvvrrrreeeessssttttoooorrrreeee programs have been tuned to work with higher record sizes up to 2048 KB. This provides a performance gain when doing backups of AdvFS domains, because the program will make larger tape records for the save sets. Currently the maximum for the -b option is 64 1024-byte blocks. With this patch, the byte-block size is changed to 2048. By default, the -b option of 60 blocks per record remains unchanged.. The vvvvrrrreeeessssttttoooorrrreeee program still has the capability to autosize vvvvdddduuuummmmpppp archives. _1._1._7 _P_r_o_b_l_e_m _S_e_e_n _o_n _S_y_s_t_e_m_s _w_i_t_h _S_m_a_r_t _A_r_r_a_y _C_o_n_t_r_o_l_l_e_r This section describes the steps you should take if your system is configured with a Smart Array controller and you see the following event logged: Host name: unx104 SCSI CAM ERROR PACKET SCSI device class: CISS (Smart Array) Bus Number: 6 Target Number: 4 Lon Number: 0 \&... \&... Event Information: Command timed out...resetting controller If this occurs, take the following steps: 1. Create a file named cccciiiissssssss....tttteeeemmmmpppp with the following lines: ciss: Tru64 UNIX Patches 1-9 ciss_throttle_threshold=5 2. Execute the following command: # ssssyyyyssssccccoooonnnnffffiiiiggggddddbbbb ----mmmm ----ffff cccciiiissssssss....tttteeeemmmmpppp 3. Reboot your system: # sssshhhhuuuuttttddddoooowwwwnnnn ----rrrr nnnnoooowwww _1._1._8 _B_r_o_k_e_n _L_i_n_k_s _R_e_p_o_r_t_e_d _D_u_r_i_n_g _B_a_s_e_l_i_n_i_n_g When performing a baseline analysis with the dddduuuuppppaaaattttcccchhhh utility, you will encounter the following message during Phase 4: Phase 4 - Report changed system files and missing files ======================================================= This phase provides information to help you make choices later in this process. It reports both 'missing' and files whose origin cannot be determined. Some of these files may affect patch installation. You will want to consider this information when you later make decisions in phase 5. * list of changed files with unknown origin: ------------------------------------------ ./etc/lprsetup.dat OSFPRINT540 UNKNOWN ./usr/share/doclib/annex/man/man3/Thread.3 OSFTCLBASE540 UNKNOWN BROKEN HARDLINK TO ./usr/share/doclib/annex/man/man3/Tcl_ConditionNotify.3 ./usr/share/doclib/annex/man/man3/Tcl_ConditionNotify.3 OSFTCLBASE540 UNKNOWN BROKEN HARDLINK TO ./usr/share/doclib/annex/man/man3/Thread.3 Press RETURN to proceed... You can disregard this information. The presence of these broken links will not affect your system operation, the installation of dddduuuuppppaaaattttcccchhhh or dddduuuuppppaaaattttcccchhhh tools, the successful installation of patches, or the rebuilding of kernels on the system. _1._1._8._1 _R_u_s_s_i_a_n _K_e_y_b_o_a_r_d (_P_a_t_c_h _3_3_9._0_0) The new Russian 3R-LKQ48-BT keyboard, for which Patch 339.00 provides an updated keyboard map, comes with five extra keycaps. To enable any of those 1-10 Tru64 UNIX Patches extra keycaps, you will need to modify the file ////uuuussssrrrr////lllliiiibbbb////XXXX11111111////xxxxkkkkbbbb////ssssyyyymmmmbbbboooollllssss////ddddiiiiggggiiiittttaaaallll////rrrruuuussssssssiiiiaaaannnn. For example: // KEY can be replaced by an extra keycap. // If you replace it with the extra keycap, please uncomment // the following definition and comment out the original one. // // key { // symbols[Group1]=3D [ o, O ], // symbols[Group2]=3D [ Ukrainian_i, Ukrainian_I ] // }; key { symbols[Group1]=3D [ o, O ], symbols[Group2]=3D [ Cyrillic_shcha, Cyrillic_SHCHA ] }; _1._1._9 _P_a_n_i_c_s _M_a_y _O_c_c_u_r _o_n _M_u_l_t_i-_C_P_U _S_y_s_t_e_m_s Boot-time panics may occur on multi-CPU systems if all of the following conditions exist: +o Auditing is enabled. +o Audit's -m switch is configured to establish a dump interval. +o The system contains empty CPU slots. The panic will occur on the first reboot after audit is configured or following an update installation on a system with audit already configured with a dump interval. The system will be unable to reboot in this configuration. To work around this problem, boot to single-user mode and remove the -m option from the audit configuration stored in ////eeeettttcccc////rrrrcccc....ccccoooonnnnffffiiiigggg....ccccoooommmmmmmmoooonnnn or ////eeeettttcccc////rrrrcccc....ccccoooonnnnffffiiiigggg. The problem will be fixed in the next patch kit. _1._1._1_0 _G_e_n_e_r_a_l _a_n_d _P_r_o_b_l_e_m _I_n_f_o_r_m_a_t_i_o_n _f_o_r _A_l_p_h_a_S_e_r_v_e_r _E_S_4_7, _E_S_8_0, _a_n_d _G_S_1_2_8_0 _S_y_s_t_e_m_s The following information pertains to the new AlphaServer ES47, ES80, and GS1280 systems, which require Tru64 UNIX Version 5.1B and this patch kit to be installed. Tru64 UNIX Patches 1-11 _1._1._1_0._1 _C_P_U _O_f_f_l_i_n_e _R_e_s_t_r_i_c_t_i_o_n_s The Primary CPU cannot be taken off line. CPUs that have I/O hoses attached to them can only be taken off line if another CPU without I/O attached is present in the system . A failure to adhere to this restriction will cause the ppppssssrrrraaaaddddmmmm command to return an error. In a two-CPU configuration, the AlphaServer ES47 and ES80 do not allow any CPUs to be taken off line. _1._1._1_0._2 _P_r_o_b_l_e_m _w_i_t_h _C_a_p_a_c_i_t_y-_o_n-_D_e_m_a_n_d _P_r_o_c_e_s_s A problem has been discovered with the capacity on demand process in which a CPU can be designated as spare, but is not taken off line as expected. With the capacity-on-demand process, the ccccooooddddccccoooonnnnffffiiiigggg [_c_p_u__i_d__l_i_s_t] command lets you specify which CPUs you have paid for and which are spares. The command is supposed to mark the others as spare and then take them off line. Once a CPU is marked as spare, the hhhhwwwwmmmmggggrrrr command and Manage CPUs suitlet will not let you put them on line until you use the ccccccccoooodddd ----llll or ccccccccoooodddd ----pppp command to either loan or purchase the CPU. The workaround is to use the ccccooooddddccccoooonnnnffffiiiigggg [_c_p_u__i_d__l_i_s_t] command to mark the CPUs as spare, and then use either the hhhhwwwwmmmmggggrrrr command or the Manage CPUs SUITLET to take them off line (sometimes referred to as offlining them). In the following example, _N is the CPU number. # hhhhwwwwmmmmggggrrrr ----oooofffffffflllliiiinnnneeee ----nnnnaaaammmmeeee ccccppppuuuu_N If, for example, the ccccooooddddccccoooonnnnffffiiiigggg command returns the message "Error for CPU 2: Unable to offline this CPU," you would enter the following hhhhwwwwmmmmggggrrrr command: # hhhhwwwwmmmmggggrrrr ----oooofffffffflllliiiinnnneeee ----nnnnaaaammmmeeee ccccppppuuuu2222 For more information, see ccccooooddddccccoooonnnnffffiiiigggg(8) and hhhhwwwwmmmmggggrrrr(8). The Manage CPUs SUITLET is available from the SysMan Menu and SysMan Station. _1._1._1_0._3 _H_a_r_d_w_a_r_e _S_C_S_I _B_u_s _E_r_r_o_r_s SCSI CAM errors experienced by the Adaptec controller that require SCSI bus resets could cause PCI bus faults. These faults will be seen as a "Machine Check System Uncorrectable" panic. This will require the system to be booted after the machine_check. A fix for this problem will be included in a future release. _1._1._1_0._4 _R_e_p_e_a_t_e_d _R_e_b_o_o_t_s _M_a_y _C_a_u_s_e _P_a_n_i_c Repeated reboots of the system may cause a kernel memory fault panic, but does not result in the loss of data. A reboot after the panic should be 1-12 Tru64 UNIX Patches successful. A fix for this problem will be included in a future release. _1._1._1_0._5 _C_a_u_t_i_o_n _o_n _U_p_d_a_t_i_n_g _t_o _V_e_r_s_i_o_n _5._1_B _w_i_t_h _D_E_G_X_A _N_I_C_s Do not attempt to do a update installation or rolling upgrade from Version 5.1A to Version 5.1B when the network device is a DEGXA-TA or DEGXA-SA and you have the Version 5.1A Patch Kit 4 and the New Hardware Devices V6 (NHD6) Kit installed. The NHD6 kit and Patch Kit 4 have provided fixes that are not in the base operating system release for Version 5.1B. Once the update is completed using another network device and the Version 5.1B Patch Kit 1 has been applied, the DEGXA network interface cards (NICs) can again be used for the network connection. _1._1._1_0._6 _T_u_n_i_n_g _t_h_e _N_F_S _S_e_r_v_e_r _D_u_p_l_i_c_a_t_e _R_e_q_u_e_s_t _C_a_c_h_e (_P_a_t_c_h _8_3_8._0_0) The NFS server maintains a list of recently completed nonrepeatable requests. This list is used to reply to client retransmissions of the request in the event that the initial request transmission's reply was lost or that the server took too long to satisfy the request. Problems may occur with the duplicate request cache in some cases, under heavy NFS server load and over high aggregate network bandwidth involving changes to file systems (changes caused by the use of the ccccrrrreeeeaaaatttt,,,, lllliiiinnnnkkkk,,,, uuuunnnnlllliiiinnnnkkkk,,,, mmmmkkkkddddiiiirrrr,,,, rrrrmmmmddddiiiirrrr,,,, ttttrrrruuuunnnnccccaaaatttteeee,,,, uuuuttttiiiimmmmeeeessss,,,, and wwwwrrrriiiitttteeee commands). These problems can occur if all the elements in the duplicate request cache are cycled between an initial client transmission and subsequent retransmission. If this occurs, the NFS server cannot detect that the retransmission is in fact a retransmission. This may result in the repetition of a request and may cause out-of-order writes or truncation and subsequent retruncation of a file. Patch 838.00 provides a tuning variable to control the size of the NFS server's duplicate request cache: +o nnnnffffssss____dddduuuuppppccccaaaacccchhhheeee____ssssiiiizzzzeeee — Controls the absolute size of the NFS server duplicate request cache. This is measured in the number of elements that are allocated at NFS server initialization. If it is determined that the size of the duplicate cache needs to be modified, you should change nnnnffffssss____dddduuuuppppccccaaaacccchhhheeee____ssssiiiizzzzeeee. The new value for nnnnffffssss____dddduuuuppppccccaaaacccchhhheeee____ssssiiiizzzzeeee should be set to equal two times the value of nnnnffffssss____dddduuuuppppccccaaaacccchhhheeee____eeeennnnttttrrrriiiieeeessss. You must use the ddddbbbbxxxx command to modify nnnnffffssss____dddduuuuppppccccaaaacccchhhheeee____ssssiiiizzzzeeee. There is no sysconfig interface to this tuning variable. _1._2 _S_u_m_m_a_r_y _o_f _B_a_s_e _O_p_e_r_a_t_i_n_g _S_y_s_t_e_m _P_a_t_c_h_e_s This section provides descriptions of the patches in Patch Kit 2 for the Tru64 Tru64 UNIX Patches 1-13 UNIX operating system. Because Tru64 UNIX patch kits are cumulative, each patch lists its state according to the following criteria: +o New Indicates a patch that is new for this release. +o New (Supersedes Patches ...) Indicates a patch that is new to the kit but was combined (merged) with one or more patches during the creation of earlier versions of this kit, before it was publicly released. +o Existing (Kit 1) Indicates a patch that was new in the previous Version 5.1B patch kit. +o Supersedes Patches ... Indicates a patch that was combined (merged) with other patches. ___________________________________________________________________________ NNNNuuuummmmbbbbeeeerrrr:::: Patch 2.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Correct improper file access SSSSttttaaaatttteeee:::: Existing (Kit 1) Corrects a potential security vulnerability where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file access. NNNNuuuummmmbbbbeeeerrrr:::: Patch 6.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Correct improper file access SSSSttttaaaatttteeee:::: Existing (Kit 1) Corrects a potential security vulnerability where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file or privilege management. 1-14 Tru64 UNIX Patches NNNNuuuummmmbbbbeeeerrrr:::: Patch 8.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Correct improper file access SSSSttttaaaatttteeee:::: Existing (Kit 1) Corrects a potential security vulnerability where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file or privilege management. NNNNuuuummmmbbbbeeeerrrr:::: Patch 10.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Correct potential buffer overflow SSSSttttaaaatttteeee:::: Existing (Kit 1) Corrects a potential security vulnerability where, under certain circumstances, system integrity may be compromised when a buffer overflow occurs in the CDE online help. Buffer overflows are sometimes exploited in an attempt to subvert the function of a privileged program and possibly execute commands at the elevated privileges if the program file has the setuid privilege. NNNNuuuummmmbbbbeeeerrrr:::: Patch 12.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Correct potential buffer overflow SSSSttttaaaatttteeee:::: Existing (Kit 1) Corrects a potential security vulnerability where, under certain circumstances, system integrity may be compromised when a buffer overflow occurs in the CDE online help. Buffer overflows are sometimes exploited in an attempt to subvert the function of a privileged program and possibly execute commands at the elevated privileges if the program file has the setuid privilege. Tru64 UNIX Patches 1-15 NNNNuuuummmmbbbbeeeerrrr:::: Patch 16.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Fix for the dsfmgr utility SSSSttttaaaatttteeee:::: Existing (Kit 1) Fixes many small problems in dsfmgr. NNNNuuuummmmbbbbeeeerrrr:::: Patch 33.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Correct potential buffer overflow SSSSttttaaaatttteeee:::: Supersedes Patch 31.00 Corrects a potential security vulnerability where, under certain circumstances, system integrity may be compromised when a buffer overflow occurs in the DtSvc utility. Buffer overflows are sometimes exploited in an attempt to subvert the function of a privileged program and possibly execute commands at the elevated privileges if the program file has the setuid privilege. Corrects a potential security vulnerability where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file access. NNNNuuuummmmbbbbeeeerrrr:::: Patch 36.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Correct potential buffer overflow SSSSttttaaaatttteeee:::: Supersedes Patch 34.00 Corrects a potential security vulnerability where, under certain circumstances, system integrity may be compromised when a buffer overflow occurs in the DtSvc utility. Buffer overflows are sometimes exploited in an attempt to subvert the function of a privileged program and possibly execute commands at the elevated privileges if the program file has the setuid privilege. Corrects a potential security vulnerability where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file access. 1-16 Tru64 UNIX Patches NNNNuuuummmmbbbbeeeerrrr:::: Patch 38.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Adds new functionality to tcpdump SSSSttttaaaatttteeee:::: Existing (Kit 1) Adds support for IEEE 802.1Q Virtual Local Area Network (VLAN). NNNNuuuummmmbbbbeeeerrrr:::: Patch 58.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Security (SSRT1-40U, SSRT1-41U, SSRT1-42U) SSSSttttaaaatttteeee:::: Existing (Kit 1) Corrects a potential security vulnerability where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file access. NNNNuuuummmmbbbbeeeerrrr:::: Patch 60.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Update to siacfg utility SSSSttttaaaatttteeee:::: Existing (Kit 1) On systems using Perl 5.8.0 and higher, this patch eliminates the "Using an array as a reference is deprecated" warning when running /usr/sbin/siacfg and during system boot. NNNNuuuummmmbbbbeeeerrrr:::: Patch 62.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Correct improper file access SSSSttttaaaatttteeee:::: Existing (Kit 1) Corrects a potential security vulnerability where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file or privilege management. Tru64 UNIX Patches 1-17 NNNNuuuummmmbbbbeeeerrrr:::: Patch 84.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Security (SSRT2208) SSSSttttaaaatttteeee:::: Existing (Kit 1) Corrects a potential security vulnerability which may allow nonprivileged users to gain unauthorized (root) access. This may be in the form of local and remote security domain risks. NNNNuuuummmmbbbbeeeerrrr:::: Patch 86.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Security (SSRT1-40U, SSRT1-41U, SSRT1-42U) SSSSttttaaaatttteeee:::: Existing (Kit 1) Corrects a potential security vulnerability where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file access. NNNNuuuummmmbbbbeeeerrrr:::: Patch 89.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Fix defects in AutoFS user space and kernel code SSSSttttaaaatttteeee:::: Supersedes Patch 87.00 Fixes multiple defects in AutoFS user space and kernel code. Fixes a problem that prevents access to AutoFS file systems if ACLs are enabled. 1-18 Tru64 UNIX Patches NNNNuuuummmmbbbbeeeerrrr:::: Patch 91.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Correct improper file access SSSSttttaaaatttteeee:::: Existing (Kit 1) Corrects a potential security vulnerability where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file or privilege management. NNNNuuuummmmbbbbeeeerrrr:::: Patch 135.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Correct potential buffer overflow SSSSttttaaaatttteeee:::: Existing (Kit 1) Corrects a potential security vulnerability where, under certain circumstances, system integrity may be compromised when a buffer overflow occurs in the dxterm utility. Buffer overflows are sometimes exploited in an attempt to subvert the function of a privileged program and possibly execute commands at the elevated privileges if the program file has the setuid privilege. NNNNuuuummmmbbbbeeeerrrr:::: Patch 137.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Fix for startslip program SSSSttttaaaatttteeee:::: Existing (Kit 1) Fixes a problem with the startslip program that prevented it from extracting all information from the acucap file. Tru64 UNIX Patches 1-19 NNNNuuuummmmbbbbeeeerrrr:::: Patch 139.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Correct improper file access SSSSttttaaaatttteeee:::: Existing (Kit 1) Corrects a potential security vulnerability where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file access. NNNNuuuummmmbbbbeeeerrrr:::: Patch 157.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Correct improper file access SSSSttttaaaatttteeee:::: Existing (Kit 1) Corrects a potential security vulnerability where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file or privilege management. NNNNuuuummmmbbbbeeeerrrr:::: Patch 159.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Fix hwmgr command to show path state correctly SSSSttttaaaatttteeee:::: Existing (Kit 1) Fixes the hwmgr command to correctly show a path state. NNNNuuuummmmbbbbeeeerrrr:::: Patch 167.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Security (SSRT2368, SSRT2368) SSSSttttaaaatttteeee:::: Existing (Kit 1) Corrects a potential security vulnerability where, under certain circumstances, system integrity may be compromised. This may be in the form of improper access. 1-20 Tru64 UNIX Patches NNNNuuuummmmbbbbeeeerrrr:::: Patch 169.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Fix for SDLT media error SSSSttttaaaatttteeee:::: Existing (Kit 1) Adds the capability for KZPCA devices to work with SCSI devices that only support asynchronous data transfers and fixes SDLT media error caused bus resets. NNNNuuuummmmbbbbeeeerrrr:::: Patch 171.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Correct improper file access SSSSttttaaaatttteeee:::: Existing (Kit 1) Corrects a potential security vulnerability where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file access. NNNNuuuummmmbbbbeeeerrrr:::: Patch 173.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Fix race condition and improper file access SSSSttttaaaatttteeee:::: Existing (Kit 1) Corrects a potential security vulnerability where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file access. NNNNuuuummmmbbbbeeeerrrr:::: Patch 176.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Resolve kernel memory faults in TCP/IP subsystem SSSSttttaaaatttteeee:::: Supersedes Patch 174.00 Resolves kernel memory faults in the TCP/IP subsystem. Tru64 UNIX Patches 1-21 NNNNuuuummmmbbbbeeeerrrr:::: Patch 178.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Fix for lpd line printer daemon SSSSttttaaaatttteeee:::: Existing (Kit 1) Fixes the lpd daemon to correct /etc/hosts.lpd case sensitivity, for example, "node.domain" treated the same as "Node.Domain/" NNNNuuuummmmbbbbeeeerrrr:::: Patch 185.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Prevents addvol from adding invalid disks into domain SSSSttttaaaatttteeee:::: Existing (Kit 1) Prevents addvol from adding invalid disks into a domain. NNNNuuuummmmbbbbeeeerrrr:::: Patch 187.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Fix for invalid disks being added into domain SSSSttttaaaatttteeee:::: Existing (Kit 1) Prevents addvol from adding invalid disks into a domain. NNNNuuuummmmbbbbeeeerrrr:::: Patch 191.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Correct improper file access SSSSttttaaaatttteeee:::: Existing (Kit 1) Corrects a potential security vulnerability where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file access. 1-22 Tru64 UNIX Patches NNNNuuuummmmbbbbeeeerrrr:::: Patch 193.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Correct improper file access SSSSttttaaaatttteeee:::: Existing (Kit 1) Corrects a potential security vulnerability where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file access. NNNNuuuummmmbbbbeeeerrrr:::: Patch 197.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Read privileges being stripped from passwd file SSSSttttaaaatttteeee:::: Existing (Kit 1) Fixes a problem in which group and other read privileges get stripped from /etc/passwd when a user switches from enhanced to base security. NNNNuuuummmmbbbbeeeerrrr:::: Patch 199.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Correct improper file access SSSSttttaaaatttteeee:::: Existing (Kit 1) Corrects a potential security vulnerability where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file or privilege management. NNNNuuuummmmbbbbeeeerrrr:::: Patch 201.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Fix for verify utility SSSSttttaaaatttteeee:::: Existing (Kit 1) Fixes a problem in which the verify utility core dumps if it encounters a specific type of metadata inconsistency. Tru64 UNIX Patches 1-23 NNNNuuuummmmbbbbeeeerrrr:::: Patch 203.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Correct improper file access SSSSttttaaaatttteeee:::: Existing (Kit 1) Corrects a potential security vulnerability where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file access. NNNNuuuummmmbbbbeeeerrrr:::: Patch 205.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Fixes a correctable error reporting problem SSSSttttaaaatttteeee:::: Existing (Kit 1) Fixes a correctable error reporting problem that turns off the reporting of correctable errors forever on any CPU, except CPU 0, once throttling of correctable errors has begun. NNNNuuuummmmbbbbeeeerrrr:::: Patch 207.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Correct potential buffer overflow SSSSttttaaaatttteeee:::: Existing (Kit 1) Corrects a potential security vulnerability where, under certain circumstances, system integrity may be compromised when a buffer overflow occurs in the libXm utility. Buffer overflows are sometimes exploited in an attempt to subvert the function of a privileged program and possibly execute commands at the elevated privileges if the program file has the setuid privilege. 1-24 Tru64 UNIX Patches NNNNuuuummmmbbbbeeeerrrr:::: Patch 209.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Correct potential buffer overflow SSSSttttaaaatttteeee:::: Existing (Kit 1) Corrects a potential security vulnerability where, under certain circumstances, system integrity may be compromised when a buffer overflow occurs in the libXm utility. Buffer overflows are sometimes exploited in an attempt to subvert the function of a privileged program and possibly execute commands at the elevated privileges if the program file has the setuid privilege. NNNNuuuummmmbbbbeeeerrrr:::: Patch 219.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Correct improper file access SSSSttttaaaatttteeee:::: Existing (Kit 1) Corrects a potential security vulnerability where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file or privilege management. NNNNuuuummmmbbbbeeeerrrr:::: Patch 221.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Correct improper file access SSSSttttaaaatttteeee:::: Existing (Kit 1) Corrects a potential security vulnerability where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file access. Tru64 UNIX Patches 1-25 NNNNuuuummmmbbbbeeeerrrr:::: Patch 223.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Add SCSI reserve/release support to mt SSSSttttaaaatttteeee:::: Existing (Kit 1) Adds SCSI reserve and release support to the mt program to assist open SAN tape management. NNNNuuuummmmbbbbeeeerrrr:::: Patch 225.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Interop problem between curses.h and esnmp.h. SSSSttttaaaatttteeee:::: Existing (Kit 1) Fixes an interoperability problem between the curses.h and esnmp.h header files. NNNNuuuummmmbbbbeeeerrrr:::: Patch 229.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Correct improper file access SSSSttttaaaatttteeee:::: Existing (Kit 1) Corrects a potential security vulnerability where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file or privilege management. 1-26 Tru64 UNIX Patches NNNNuuuummmmbbbbeeeerrrr:::: Patch 232.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Correct improper file access SSSSttttaaaatttteeee:::: Supersedes Patch 230.00 Adds support in script to remove all Persistant Reservations for MSA controller. Corrects a potential security vulnerability where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file access. NNNNuuuummmmbbbbeeeerrrr:::: Patch 234.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Correct improper file access SSSSttttaaaatttteeee:::: Existing (Kit 1) Corrects a potential security vulnerability where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file or privilege management. NNNNuuuummmmbbbbeeeerrrr:::: Patch 238.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Correct improper file access SSSSttttaaaatttteeee:::: Existing (Kit 1) Corrects a potential security vulnerability where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file or privilege management. Tru64 UNIX Patches 1-27 NNNNuuuummmmbbbbeeeerrrr:::: Patch 240.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Fix for hwmgr command SSSSttttaaaatttteeee:::: Existing (Kit 1) Fixes a problem in which the display for the hwmgr -show name command is not aligned properly for the name field. NNNNuuuummmmbbbbeeeerrrr:::: Patch 248.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Fix for hwmgr delete command option SSSSttttaaaatttteeee:::: Existing (Kit 1) Fixes a problem where, when using hwmgr to delete a component, a "DELETE_COMMIT: Cannot fetch name." message may be displayed on the console. This problem can be seen frequently in a cluster environment when the component being deleted does not exist on the system. NNNNuuuummmmbbbbeeeerrrr:::: Patch 250.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Correct improper file access SSSSttttaaaatttteeee:::: Existing (Kit 1) Corrects a potential security vulnerability where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file access. 1-28 Tru64 UNIX Patches NNNNuuuummmmbbbbeeeerrrr:::: Patch 254.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Correct improper file access SSSSttttaaaatttteeee:::: Existing (Kit 1) Corrects the problem of a core dump that occurs when the output from the lint program for a nonexistent file is supplied to error. Corrects a potential security vulnerability where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file or privilege management. NNNNuuuummmmbbbbeeeerrrr:::: Patch 262.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Correct improper file access SSSSttttaaaatttteeee:::: Existing (Kit 1) Corrects a potential security vulnerability where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file access. NNNNuuuummmmbbbbeeeerrrr:::: Patch 264.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Correct improper file access SSSSttttaaaatttteeee:::: Existing (Kit 1) Corrects a potential security vulnerability where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file access. Tru64 UNIX Patches 1-29 NNNNuuuummmmbbbbeeeerrrr:::: Patch 266.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Correct improper file access SSSSttttaaaatttteeee:::: Existing (Kit 1) Corrects a potential security vulnerability where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file access. NNNNuuuummmmbbbbeeeerrrr:::: Patch 268.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Installs version V2.1-120 of libots3 libraries SSSSttttaaaatttteeee:::: Existing (Kit 1) Installs version V2.1-120 of /usr/lib/libots3.a and /usr/shlib/libots3.so, which fixes a problem where long-running OpenMP applications might overflow an internal libots3 counter, resulting in a breakdown of thread synchronization. NNNNuuuummmmbbbbeeeerrrr:::: Patch 270.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Installs version V2.1-120 of libots3 libraries SSSSttttaaaatttteeee:::: Existing (Kit 1) Installs version V2.1-120 of /usr/lib/libots3.a and /usr/shlib/libots3.so, which fixes a problem where long-running OpenMP applications might overflow an internal libots3 counter, resulting in a breakdown of thread synchronization. 1-30 Tru64 UNIX Patches NNNNuuuummmmbbbbeeeerrrr:::: Patch 272.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Correct improper file access SSSSttttaaaatttteeee:::: Existing (Kit 1) Corrects a potential security vulnerability where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file access. NNNNuuuummmmbbbbeeeerrrr:::: Patch 275.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Fix for hwmgr -view transaction -cluster command SSSSttttaaaatttteeee:::: Supersedes Patch 273.00 Corrects some command-parsing irregularities in hwmgr that may cause options like -category and -cluster to be confused. Corrects a problem in which information from the hwmgr -view transaction -cluster command for a node on a cluster may not be displayed. NNNNuuuummmmbbbbeeeerrrr:::: Patch 279.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Corrections to Oxygen VX1 graphics card XCopyPlane SSSSttttaaaatttteeee:::: Existing (Kit 1) Corrects a problem with the Oxygen VX1 graphics card to make XCopyPlane copy only the requested bitplane rather than all bitplanes. Tru64 UNIX Patches 1-31 NNNNuuuummmmbbbbeeeerrrr:::: Patch 281.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Fixes a problem in usb_hid.mod SSSSttttaaaatttteeee:::: Existing (Kit 1) Corrects a problem in which a kernel memory fault sometimes occurs if a USB keyboard or mouse does not respond quickly enough. This KMF can occur during boot or soon after a USB keyboard or mouse is connected. Any device can trigger this, though it is neither predictable nor common. NNNNuuuummmmbbbbeeeerrrr:::: Patch 283.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Correct improper file access SSSSttttaaaatttteeee:::: Existing (Kit 1) Corrects a potential security vulnerability where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file access. NNNNuuuummmmbbbbeeeerrrr:::: Patch 285.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Correct improper file access SSSSttttaaaatttteeee:::: Existing (Kit 1) Corrects a potential security vulnerability where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file access. 1-32 Tru64 UNIX Patches NNNNuuuummmmbbbbeeeerrrr:::: Patch 289.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Correct improper file access SSSSttttaaaatttteeee:::: Existing (Kit 1) Corrects a potential security vulnerability which, under certain circumstances, could compromise system integrity. NNNNuuuummmmbbbbeeeerrrr:::: Patch 296.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Correct improper file access SSSSttttaaaatttteeee:::: Existing (Kit 1) Corrects a potential security vulnerability where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file access. NNNNuuuummmmbbbbeeeerrrr:::: Patch 298.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Fixes consvar -s bootdef_dev failure with KZPCC SSSSttttaaaatttteeee:::: Existing (Kit 1) Fixes consvar -s bootdef_dev failure with KZPCC. NNNNuuuummmmbbbbeeeerrrr:::: Patch 300.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Login process crashes when LDAP users try to log in SSSSttttaaaatttteeee:::: Existing (Kit 1) Fixes a problem in with the login process may crash when LDAP users or users belonging to an LDAP group attempt to log in. Tru64 UNIX Patches 1-33 NNNNuuuummmmbbbbeeeerrrr:::: Patch 306.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Correct improper file access SSSSttttaaaatttteeee:::: Existing (Kit 1) Corrects a potential security vulnerability where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file access. NNNNuuuummmmbbbbeeeerrrr:::: Patch 309.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Performance tool failures on Sierra Cluster (PFS) SSSSttttaaaatttteeee:::: Supersedes Patch 307.00 Fixes a problem in which the prof -pixie -testcoverage sometimes reports invalid source line number ranges. Fixes performance tool failures on Sierra Clusters Parallel File Systems (PFS) . NNNNuuuummmmbbbbeeeerrrr:::: Patch 311.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Correct improper file access SSSSttttaaaatttteeee:::: Existing (Kit 1) Corrects a potential security vulnerability where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file access. 1-34 Tru64 UNIX Patches NNNNuuuummmmbbbbeeeerrrr:::: Patch 313.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Correct improper file access SSSSttttaaaatttteeee:::: Existing (Kit 1) Corrects a potential security vulnerability where under certain circumstances, system integrity may be compromised. This may be in the form of improper file or privilege management. Addresses a problem in which performing a sort on a large database using numerous keys fails during the consolidation phase of the temporary files. NNNNuuuummmmbbbbeeeerrrr:::: Patch 317.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Security (SSRT1-40U, SSRT1-41U, SSRT1-42U) SSSSttttaaaatttteeee:::: Existing (Kit 1) Corrects a potential security vulnerability where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file access. NNNNuuuummmmbbbbeeeerrrr:::: Patch 320.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Fixes problem with IPv6 neighbor discovery daemon SSSSttttaaaatttteeee:::: Supersedes Patch 318.00 Fixes a regression in the operation of the IPv6 neighbor discovery daemon, where IPv6 addresses will not be automatically configured on PPP interfaces. Fixes a problem with IPv6 neighbor discovery daemon, where under certain circumstances, the daemon can cause bad information to be written to a DNS database, thereby causing failures on subsequent database reloads. Tru64 UNIX Patches 1-35 NNNNuuuummmmbbbbeeeerrrr:::: Patch 322.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Correct improper file access SSSSttttaaaatttteeee:::: Existing (Kit 1) Corrects a potential security vulnerability where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file or privilege management. NNNNuuuummmmbbbbeeeerrrr:::: Patch 324.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Correct improper file access SSSSttttaaaatttteeee:::: Existing (Kit 1) Corrects a potential security vulnerability where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file or privilege management. NNNNuuuummmmbbbbeeeerrrr:::: Patch 326.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Fixes a linker error SSSSttttaaaatttteeee:::: Existing (Kit 1) Fixes a linker error that occurs when running the command ld -update_registry /dev/null. NNNNuuuummmmbbbbeeeerrrr:::: Patch 328.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Fixes and improves the mcutil program SSSSttttaaaatttteeee:::: Existing (Kit 1) Fixes and improves the mcutil program by correcting how bus resets are handled by the program and enhancing its error reporting capabilities. 1-36 Tru64 UNIX Patches NNNNuuuummmmbbbbeeeerrrr:::: Patch 330.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Allows evmd to stop listening on default TCP port 619 SSSSttttaaaatttteeee:::: Existing (Kit 1) Allows the Event Manager daemon, evmd, to stop listening on its default TCP port 619. This capability is not available for clustered systems. NNNNuuuummmmbbbbeeeerrrr:::: Patch 332.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Fixes memory leak in the PanoramiX/Xinerama Extension SSSSttttaaaatttteeee:::: Existing (Kit 1) Fixes a memory leak in the PanoramiX/Xinerama Extension that could cause a process core dump. NNNNuuuummmmbbbbeeeerrrr:::: Patch 334.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Correct improper file access SSSSttttaaaatttteeee:::: Existing (Kit 1) Corrects a potential security vulnerability where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file access. NNNNuuuummmmbbbbeeeerrrr:::: Patch 339.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Updated keyboard map for Russian 3R-LKQ48-BT SSSSttttaaaatttteeee:::: Existing (Kit 1) Provides an updated keyboard map for the Russian 3R-LKQ48-BT keyboard model. Tru64 UNIX Patches 1-37 NNNNuuuummmmbbbbeeeerrrr:::: Patch 343.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Fixes problem seen with TAHI IPv6 conformance test SSSSttttaaaatttteeee:::: Existing (Kit 1) Fixes a problem seen with the TAHI IPv6 conformance test, specifically Test 4 for the IPv6 Specification. NNNNuuuummmmbbbbeeeerrrr:::: Patch 345.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Correct improper file access SSSSttttaaaatttteeee:::: Existing (Kit 1) Corrects a potential security vulnerability where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file or privilege management. NNNNuuuummmmbbbbeeeerrrr:::: Patch 347.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Fix allows fuser to display the reference flag SSSSttttaaaatttteeee:::: Existing (Kit 1) Allows the fuser utility to display the reference flag, which indicates the type of reference made; for example, open, closed, unlinked, or mmapped. NNNNuuuummmmbbbbeeeerrrr:::: Patch 351.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Correct improper file access SSSSttttaaaatttteeee:::: Existing (Kit 1) Corrects a potential security vulnerability where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file access. 1-38 Tru64 UNIX Patches NNNNuuuummmmbbbbeeeerrrr:::: Patch 356.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Fix for ftp open command SSSSttttaaaatttteeee:::: Supersedes Patch 354.00 Corrects a bug in the ftp open command. The optional port argument now accepts port numbers between 32768 and 65535. Corrects a potential security vulnerability which, under certain circumstances, could compromise system integrity. NNNNuuuummmmbbbbeeeerrrr:::: Patch 358.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Fix for mountd daemon SSSSttttaaaatttteeee:::: Existing (Kit 1) Enables mountd to correctly handle entries with multiple lines input in exports file. NNNNuuuummmmbbbbeeeerrrr:::: Patch 360.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Correct improper file access SSSSttttaaaatttteeee:::: Existing (Kit 1) Corrects a potential security vulnerability where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file or privilege management. Tru64 UNIX Patches 1-39 NNNNuuuummmmbbbbeeeerrrr:::: Patch 362.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Correct improper file access SSSSttttaaaatttteeee:::: Existing (Kit 1) Corrects a potential security vulnerability where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file access. NNNNuuuummmmbbbbeeeerrrr:::: Patch 364.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Correct improper file access SSSSttttaaaatttteeee:::: Existing (Kit 1) Corrects a potential security vulnerability where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file or privilege management. NNNNuuuummmmbbbbeeeerrrr:::: Patch 366.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Correct improper file access SSSSttttaaaatttteeee:::: Existing (Kit 1) Corrects a potential security vulnerability where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file access. 1-40 Tru64 UNIX Patches NNNNuuuummmmbbbbeeeerrrr:::: Patch 368.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Correct improper file access SSSSttttaaaatttteeee:::: Existing (Kit 1) Corrects a potential security vulnerability where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file access. NNNNuuuummmmbbbbeeeerrrr:::: Patch 370.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Correct improper file access SSSSttttaaaatttteeee:::: Existing (Kit 1) Corrects a potential security vulnerability where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file or privilege management. NNNNuuuummmmbbbbeeeerrrr:::: Patch 372.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Security (SSRT1-40U, SSRT1-41U, SSRT1-42U) SSSSttttaaaatttteeee:::: Existing (Kit 1) Corrects a potential security vulnerability where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file access. Tru64 UNIX Patches 1-41 NNNNuuuummmmbbbbeeeerrrr:::: Patch 378.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Security (SSRT1-40U, SSRT1-41U, SSRT1-42U) SSSSttttaaaatttteeee:::: Existing (Kit 1) Corrects a potential security vulnerability where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file access. NNNNuuuummmmbbbbeeeerrrr:::: Patch 380.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Correct improper file access SSSSttttaaaatttteeee:::: Existing (Kit 1) Corrects a potential security vulnerability where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file or privilege management. NNNNuuuummmmbbbbeeeerrrr:::: Patch 382.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Fixes a simple lock panic in the floppy driver SSSSttttaaaatttteeee:::: Existing (Kit 1) Fixes a simple lock panic in the floppy driver. NNNNuuuummmmbbbbeeeerrrr:::: Patch 384.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Fix for telnetd daemon SSSSttttaaaatttteeee:::: Existing (Kit 1) Fixes a problem in which telnetting from some machines (MS), will leave a UDP port open, requiring a call to yp_unbind() after getnameinfo() to close all ports. 1-42 Tru64 UNIX Patches NNNNuuuummmmbbbbeeeerrrr:::: Patch 387.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Correct improper file access SSSSttttaaaatttteeee:::: Existing (Kit 1) Corrects a potential security vulnerability where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file or privilege management. NNNNuuuummmmbbbbeeeerrrr:::: Patch 391.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Updates reference pages for VLAN functionality SSSSttttaaaatttteeee:::: Existing (Kit 1) Revises the ifconfig(8), lan_config(8), niffconfig(8), ping(8), vlanconfig(8), and vlan(7) reference pages for VLAN functionality. NNNNuuuummmmbbbbeeeerrrr:::: Patch 396.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Fix for ldapcd daemon SSSSttttaaaatttteeee:::: Supersedes Patch 56.00 Fixes the following problems with the ldapcd daemon: It may crash when resolving group codes with very large GIDs. It may crash when the LDAP Directory Server is unavailable. It prevents LDAP users from being authenticated, even when they are providing the correct password. Tru64 UNIX Patches 1-43 NNNNuuuummmmbbbbeeeerrrr:::: Patch 414.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Revises several SSH reference pages SSSSttttaaaatttteeee:::: Existing (Kit 1) Revises several of the SSH reference pages which address several issues and problems with SSH, including the following: Interoperability with other SSH implementations Client/server configuration files compatibility issues The lack of IPV6 support NNNNuuuummmmbbbbeeeerrrr:::: Patch 416.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Fix for creacct hang SSSSttttaaaatttteeee:::: Existing (Kit 1) Fixes a problem that causes the creacct command to hang when the W2K Active Directory is misconfigured. NNNNuuuummmmbbbbeeeerrrr:::: Patch 421.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Revises envconfig.8 and envmond.8 reference pages SSSSttttaaaatttteeee:::: Existing (Kit 1) Revises the envconfig(8) and envmond(8) reference pages for the environmental monitoring facilities /usr/sbin/envmond and /usr/sbin/envconfig to support the new GS1280 hardware platform. 1-44 Tru64 UNIX Patches NNNNuuuummmmbbbbeeeerrrr:::: Patch 423.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Fix potential denial of service SSSSttttaaaatttteeee:::: Existing (Kit 1) Corrects a potential security vulnerability for systems using Internet Protocol Security (IPsec). Under certain circumstances, a remote attacker may be able to cause IPsec to block all IP traffic from the system, creating a denial of service. NNNNuuuummmmbbbbeeeerrrr:::: Patch 433.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Fix race condition and improper file access SSSSttttaaaatttteeee:::: Supersedes Patch 236.00 Corrects a potential security vulnerability where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file access. Corrects a problem in which a core dump may occur when using the csh shell from the Japanese locale. Fixes the problem with csh shell redirection that occurs while using a tilde (~) operation to redirect standard input and standard output of a command to a file residing in the home directory. NNNNuuuummmmbbbbeeeerrrr:::: Patch 442.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Incorrect I/O status may be returned by KZPEA driver SSSSttttaaaatttteeee:::: Supersedes Patch 315.00 Corrects problems in the aha_chim driver that could result in bus hangs, panics, and inappropriate access of freed memory during high rate of bus resets. Corrects a problem in which Incorrect I/O status may be returned by the KZPEA driver when attempting to abort an I/O during a reset. Tru64 UNIX Patches 1-45 NNNNuuuummmmbbbbeeeerrrr:::: Patch 444.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Revises tcpdump.8 ref page for VLAN functionality SSSSttttaaaatttteeee:::: Existing (Kit 1) Revises the tcpdump(8) reference page for virtual local area network (VLAN) functionality. NNNNuuuummmmbbbbeeeerrrr:::: Patch 446.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Revises the mt.1 reference page SSSSttttaaaatttteeee:::: Existing (Kit 1) Revises the mt(1) reference page for the mt command, which has three new commands, mt reserve, mt release and mt tur. NNNNuuuummmmbbbbeeeerrrr:::: Patch 448.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Allows multiple VX1 graphic cards to be configured SSSSttttaaaatttteeee:::: Supersedes Patch 353.00 Corrects a problem in which systems configured with VX1 graphics card will not return to console when the halt button is pressed, thereby making the console unusable. Allows multiple VX1 graphic cards to be configured in a separate I/O box system. 1-46 Tru64 UNIX Patches NNNNuuuummmmbbbbeeeerrrr:::: Patch 452.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Modifications for environmental monitoring facilities SSSSttttaaaatttteeee:::: Supersedes Patch 40.00 Modifies the environmental monitoring facilities /usr/sbin/envmond and /usr/sbin/envconfig to support the AlphaServer GS1280 system. Updates the environmental monitoring daemon envmond to ensure the correct EVM events are being sent at the correct time. NNNNuuuummmmbbbbeeeerrrr:::: Patch 454.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Correct potential buffer overflow SSSSttttaaaatttteeee:::: Existing (Kit 1) Corrects a potential security vulnerability where, under certain circumstances, system integrity may be compromised when a buffer overflow occurs in the dxsysinfo utility. Buffer overflows are sometimes exploited in an attempt to subvert the function of a privileged program and possibly execute commands at the elevated privileges if the program file has the setuid privilege. NNNNuuuummmmbbbbeeeerrrr:::: Patch 458.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Correct potential buffer overflow SSSSttttaaaatttteeee:::: Existing (Kit 1) Corrects a potential security vulnerability where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file or privilege management. Tru64 UNIX Patches 1-47 NNNNuuuummmmbbbbeeeerrrr:::: Patch 476.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Corrects hang in log command SSSSttttaaaatttteeee:::: Existing (Kit 1) Corrects possible deadlock in the ./isl/log and ./usr/sbin/log commands. NNNNuuuummmmbbbbeeeerrrr:::: Patch 486.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Security (SSRT0785U) SSSSttttaaaatttteeee:::: Supersedes Patches 162.00, 163.00, 165.00 Corrects several problems with the account management tools, including the following: The userdel command possibly core dumping when the shell field is empty in the passwd file. The usermod command not working as expected with NIS +/- users. The useradd command not managing default and template data properly. This showed up most notably with the useradd -p command producing the message "Password must be between 32 and 80 characters." Updates the account management tools to use the latest versions of the ASU (Advanced Server for UNIX) API calls when ASU is in use on the server. Fixes a number of problems with the Account Manager application, dxaccounts, on a system with ASU installed. Corrects a potential security vulnerability where, under certain circumstances, system integrity may be compromised. This may be in the form of passwords that have a length outside of the intended range. 1-48 Tru64 UNIX Patches NNNNuuuummmmbbbbeeeerrrr:::: Patch 492.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Correct improper file access SSSSttttaaaatttteeee:::: Supersedes Patch 77.00 Corrects several potential security vulnerabilities where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file access. NNNNuuuummmmbbbbeeeerrrr:::: Patch 502.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Fixes Solaris rcp commands failures SSSSttttaaaatttteeee:::: New Corrects a problem in which Solaris rcp commands would fail against Tru64 UNIX V5.1B servers with the message "rcp: lost connection". NNNNuuuummmmbbbbeeeerrrr:::: Patch 506.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Revised newfs(8) reference page SSSSttttaaaatttteeee:::: New Revises the newfs(8) reference page to document a -M command option to newfs to allow users to specify permissions of an mfs root directory when it is first created. Tru64 UNIX Patches 1-49 NNNNuuuummmmbbbbeeeerrrr:::: Patch 525.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Security (SSRT2301, SSRT2275) SSSSttttaaaatttteeee:::: Supersedes Patch 20.00 Provides protection against several potential security vulnerabilities where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file access. Provides protection against a class of potential security vulnerabilities called buffer overflows. Buffer overflows are sometimes exploited in an attempt to subvert the function of a privileged program and possibly execute commands at the elevated privileges if the program file has the setuid privilege. This patch allows a system administrator to enable memory management protections that limit potential buffer overflow vulnerabilities. Provides protection against a potential security vulnerability, where under certain circumstances, system integrity may be compromised when a buffer overflow occurs in the uucp utility. NNNNuuuummmmbbbbeeeerrrr:::: Patch 527.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Security (SSRT2275) SSSSttttaaaatttteeee:::: Supersedes Patch 258.00 Corrects a potential security vulnerability where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file or privilege management. Provides protection against a class of potential security vulnerabilities called buffer overflows. Buffer overflows are sometimes exploited in an attempt to subvert the function of a privileged program and possibly execute commands at the elevated privileges if the program file has the setuid privilege. This patch allows a system administrator to enable memory management protections that limit potential buffer overflow vulnerabilities. 1-50 Tru64 UNIX Patches NNNNuuuummmmbbbbeeeerrrr:::: Patch 529.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Security (SSR)T2275 SSSSttttaaaatttteeee:::: New Provides protection against a class of potential security vulnerabilities called buffer overflows. Buffer overflows are sometimes exploited in an attempt to subvert the function of a privileged program and possibly execute commands at the elevated privileges if the program file has the setuid privilege. This patch allows a system administrator to enable memory management protections that limit potential buffer overflow vulnerabilities. NNNNuuuummmmbbbbeeeerrrr:::: Patch 531.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Security (SSRT2275) SSSSttttaaaatttteeee:::: New Provides protection against a class of potential security vulnerabilities called buffer overflows. Buffer overflows are sometimes exploited in an attempt to subvert the function of a privileged program and possibly execute commands at the elevated privileges if the program file has the setuid privilege. This patch allows a system administrator to enable memory management protections that limit potential buffer overflow vulnerabilities. NNNNuuuummmmbbbbeeeerrrr:::: Patch 533.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Security (SSRT2275) SSSSttttaaaatttteeee:::: New Provides protection against a class of potential security vulnerabilities called buffer overflows. Buffer overflows are sometimes exploited in an attempt to subvert the function of a privileged program and possibly execute commands at the elevated privileges if the program file has the setuid privilege. This patch allows a system administrator to enable memory management protections that limit potential buffer overflow vulnerabilities. Tru64 UNIX Patches 1-51 NNNNuuuummmmbbbbeeeerrrr:::: Patch 535.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Corrects problems in dbx and object file tools SSSSttttaaaatttteeee:::: New Fixes various problems in the dbx and object file tools: dbx, ostrip, strip, mcs, dis, cord, file, and stdump. NNNNuuuummmmbbbbeeeerrrr:::: Patch 537.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Fixes various problems in libc functions SSSSttttaaaatttteeee:::: New Fixes various problems in the libc functions getdate(), strptime(), callrpc(), strncasecmp() and fork(). It also fixes a problem in the libnuma function nacreate() and the system header . NNNNuuuummmmbbbbeeeerrrr:::: Patch 539.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Fixes client hangs under Enhanced Security SSSSttttaaaatttteeee:::: New Fixes client (login, su, rshd, edauth, and sshd2) hangs and long delays under Enhanced Security, as well as some intermittent errors or failures seen with prpasswdd or rpc.yppasswdd. 1-52 Tru64 UNIX Patches NNNNuuuummmmbbbbeeeerrrr:::: Patch 541.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Fixes various problems in libc functions SSSSttttaaaatttteeee:::: New Fixes various problems in the libc functions getdate(), strptime(), callrpc(), strncasecmp() and fork(). Fixes a problem in the libnuma function nacreate() and the system header . NNNNuuuummmmbbbbeeeerrrr:::: Patch 543.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Update to prpasswdd daemon SSSSttttaaaatttteeee:::: New Fixes client (login, su, rshd, edauth, and sshd2) hangs and long delays under Enhanced Security, as well as some intermittent errors or failures seen with prpasswdd or rpc.yppasswdd. NNNNuuuummmmbbbbeeeerrrr:::: Patch 545.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Fixes problems in dbx and object file tools SSSSttttaaaatttteeee:::: New Fixes various problems in the dbx and object file tools: dbx, ostrip, strip, mcs, dis, cord, file, and stdump. Tru64 UNIX Patches 1-53 NNNNuuuummmmbbbbeeeerrrr:::: Patch 547.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Fixes problem in XTI caused by blocked mutex lock SSSSttttaaaatttteeee:::: New Fixes a problem in XTI caused by a blocked mutex lock that caused any thread attempting to send an abortive disconnect to hang. NNNNuuuummmmbbbbeeeerrrr:::: Patch 549.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Fixes problem in XTI caused by blocked mutex lock SSSSttttaaaatttteeee:::: New Fixes a problem in XTI caused by a blocked mutex lock that caused any thread attempting to send an abortive disconnect to hang. NNNNuuuummmmbbbbeeeerrrr:::: Patch 551.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Corrects improper file or privilege SSSSttttaaaatttteeee:::: New Corrects a potential security vulnerability where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file or privilege management. 1-54 Tru64 UNIX Patches NNNNuuuummmmbbbbeeeerrrr:::: Patch 553.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Corrects improper file or privilege management SSSSttttaaaatttteeee:::: Supersedes Patches 304.00, 189.00 Corrects a potential security vulnerability where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file or privilege management. Corrects a problem found wherein the rmtmpfiles script would leave empty directories in /var/tmp at system startup. Makes startup scripts in /sbin/init.d world readable. NNNNuuuummmmbbbbeeeerrrr:::: Patch 555.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Scripts in /sbin/init.d are now world readable SSSSttttaaaatttteeee:::: New Makes startup scripts in /sbin/init.d world readable. NNNNuuuummmmbbbbeeeerrrr:::: Patch 557.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Scripts in /sbin/init.d are now world readable SSSSttttaaaatttteeee:::: New Makes startup scripts in /sbin/init.d world readable. Tru64 UNIX Patches 1-55 NNNNuuuummmmbbbbeeeerrrr:::: Patch 560.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Update to nis startup script SSSSttttaaaatttteeee:::: New (Supersedes Patch 558.00) Fixes a typo in mkcdsl. Updates the NIS startup script to correctly start NIS on the cluster alias. Makes startup scripts in /sbin/init.d world readable. NNNNuuuummmmbbbbeeeerrrr:::: Patch 562.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Scripts in /sbin/init.d are now world readable SSSSttttaaaatttteeee:::: New Makes start-up scripts in /sbin/init.d world readable. NNNNuuuummmmbbbbeeeerrrr:::: Patch 564.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Correct improper file access SSSSttttaaaatttteeee:::: Supersedes Patches 335.00, 337.00, 392.00, 394.00 Corrects a problem in which volmigrate returns a shell error when attempting to migrate an AdvFS domain with multiple filesets. With this patch, the domains can be migrated if all the filesets are mounted. Corrects several potential security vulnerabilities where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file access. Prevents inconsistent LSM volumes when the name of a partition that is being encapsulated matches the name of a current LSM volume. 1-56 Tru64 UNIX Patches NNNNuuuummmmbbbbeeeerrrr:::: Patch 566.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Fixes problems in the kdbx extensions SSSSttttaaaatttteeee:::: Supersedes Patch 4.00 Fixes a premature termination of the ofile kdbx extension and warning messages in various kdbx extensions. Fixes problems in the kdbx u and vnode extensions NNNNuuuummmmbbbbeeeerrrr:::: Patch 576.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Correct improper file access SSSSttttaaaatttteeee:::: Supersedes Patch 47.00 Corrects a potential security vulnerability where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file or privilege management. Removes files created under /usr/lib/sabt/ during the running of the btcreate utility on file systems with LSM. Previously, these files were copied to the tape, and would be restored as if they were archived by btcreate. NNNNuuuummmmbbbbeeeerrrr:::: Patch 578.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Fix for grep command hang SSSSttttaaaatttteeee:::: New Changes the grep command to allow blank lines in the pattern file, and prevents it from hanging when executed with -w and -f options. Tru64 UNIX Patches 1-57 NNNNuuuummmmbbbbeeeerrrr:::: Patch 622.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Hang occurs with various PowerStorm graphics options SSSSttttaaaatttteeee:::: Supersedes Patch 107.00 Fixes a problem where the X server's command line option to turn off VESA Display Power Management Signalling (-dpms) does not work. Corrects a problem in which the X server may hang every 49 days on systems with PowerStorm 4D40T, 4D50T, 4D51T, or 4D60T graphics options. NNNNuuuummmmbbbbeeeerrrr:::: Patch 637.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Fix for .mrg..termcap file SSSSttttaaaatttteeee:::: New Corrects a problem with the merging of the termcap file during a rolling upgrade. 1-58 Tru64 UNIX Patches NNNNuuuummmmbbbbeeeerrrr:::: Patch 640.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Fixes hang in the hardware configuration subsystem SSSSttttaaaatttteeee:::: Supersedes Patches 144.00, 145.00, 146.00, 147.00, 148.00, 149.00, 151.00, 484.00, 638.00 Corrects a problem where after entering a hwmgr -redirect scsi command and rebooting, the system only boots to single user mode with the following error displayed: bcheckrc: Device Naming failed boot configure or verify Please correct the problem and continue or reboot INIT: SINGLE-USER MODE Corrects a problem in which incorrect values for LONG_MAX and LONG_MIN were displayed when using the hardware manager to show attributes. Addresses a problem encountered when mounting cluster root if the cluster root domain devices are private to different cluster members. Currently, you cannot boot your cluster. It will hang. With this fix, your cluster will boot with a warning to the console. This configuration is not recommended; however the cluster should not be unbootable. Currently, this is with respect to non-LSM cluster root domains. Introduces type checking of attributes when registering components with the hardware manager. Corrects a potential deadlock in the hardware configuration subsystem. Prevents the hardware management cluster database from being reset. Corrects invalid hwmgr show component inconsistency. Corrects a problem encountered when hwmgr is used to verify that a sensor's status would change from OK to Fault; each time the state changed and hwmgr requested the new value, hwmgr dumped core. Suppresses an erroneous console warning message that may be provided when cluster root is under LSM control. The warning "WARNING: cluster root devices are on private buses!" may be erroneously output when cluster root is under LSM control. LSM does not support such configurations. Fixes a possible, but rare, hang in the hardware configuration subsystem. Tru64 UNIX Patches 1-59 NNNNuuuummmmbbbbeeeerrrr:::: Patch 643.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Fix for tar command SSSSttttaaaatttteeee:::: Supersedes Patches 105.00, 641.00 Fixes a one-byte gap/hole in the maximum file size in the tar command before an extended header record is used (8589934591 (octal 77777777777)). Makes the following changes to the tar, pax, and cpio commands: Tar now checks and reports any write errors. The tar, pax, and cpio commands can unalter the ctime of input files upon creation of an archive and display a warning message if unable to preserve the time of input files. Corrects the tar o option behavior. Corrects the pax -l option to create hard links properly. Corrects the cpio -o option to not corrupt extended UID file ownership. Fixes how long file names are handled in tar. Fixes pax to handle ACL on directories properly. Corrects tar to properly handle unusual directory specifications. 1-60 Tru64 UNIX Patches NNNNuuuummmmbbbbeeeerrrr:::: Patch 646.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Correct improper file access SSSSttttaaaatttteeee:::: Supersedes Patches 227.00, 644.00 Fixes a potential security vulnerability where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file or privilege management. Corrects the following problems found in accounting commands: Fixes the way accounting files are referenced using CDSLs. Resolves the differences in the CPU time and connect time found during the conversion of accounting reports from ASCII format to binary and again back to ASCII. Resolves the differences in CPU time found in the output of the acctcom and acctmerg commands for the same input file. NNNNuuuummmmbbbbeeeerrrr:::: Patch 648.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Fix for fwtmp command SSSSttttaaaatttteeee:::: New Fixes the fwtmp command so it does not display the invalid (negative) PIDs when the number of decimal digits of PID value exceeds 5. Tru64 UNIX Patches 1-61 NNNNuuuummmmbbbbeeeerrrr:::: Patch 650.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Correct potential buffer overflow SSSSttttaaaatttteeee:::: New Addresses potential BIND (Berkeley Internet Name Domain) security vulnerabilities that may result in buffer overflows, unauthorized access, or denial of service. These potential security vulnerabilities may be in the form of local and remote security domain risks. The following potential security vulnerabilities have been corrected: SSRT2408 BIND - (Severity - High) SSRT2410 BIND - (Severity - High) SSRT2411 BIND - (Severity - High) NNNNuuuummmmbbbbeeeerrrr:::: Patch 653.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Correct improper file or privilege SSSSttttaaaatttteeee:::: New (Supersedes Patch 651.00) Addresses a problem of compiler warnings caused by calling a function with too few arguments. Corrects a potential security vulnerability where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file or privilege management. NNNNuuuummmmbbbbeeeerrrr:::: Patch 656.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Supports monitoring AdvFS statistics using pmgrd SSSSttttaaaatttteeee:::: New (Supersedes Patches 654.00) Provides support for monitoring AdvFS statistics using the Performance Manager metrics server daemon, pmgrd. Provides support for monitoring the disk I/O rate using pmgrd. 1-62 Tru64 UNIX Patches NNNNuuuummmmbbbbeeeerrrr:::: Patch 658.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Fix for rm command SSSSttttaaaatttteeee:::: New Addresses a performance issue of rm -r with large directories. NNNNuuuummmmbbbbeeeerrrr:::: Patch 662.00 AAAAbbbbssssttttrrrraaaacccctttt:::: mtools now prints appropriate error messages SSSSttttaaaatttteeee:::: New Modifies the mformat prompt. Changes mcopy and mwrite so they can overwrite existing files. Changes mtools so they can print appropriate error messages. Addresses security vulnerabilities. NNNNuuuummmmbbbbeeeerrrr:::: Patch 664.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Fixes erroneous reboot of the operating system SSSSttttaaaatttteeee:::: New Fixes a situation where, on a panic, the OS will erroneously reboot instead of halt and fail to take a crash dump. Tru64 UNIX Patches 1-63 NNNNuuuummmmbbbbeeeerrrr:::: Patch 667.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Security (SSRT0711U) SSSSttttaaaatttteeee:::: Supersedes Patches 211.00, 429.00, 665.00 Fixes a potential security vulnerability where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file or privilege management. Makes the following changes to cron: Corrects a problem in which crontab removes its entries and the vi editor truncates an existing file when a file system is full. Corrects the improper scheduling of cron jobs related to months not having 31 days. Enhances cron to now do extensive logging. 1-64 Tru64 UNIX Patches NNNNuuuummmmbbbbeeeerrrr:::: Patch 669.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Added sysconfig tunables for ES45 environ monitoring SSSSttttaaaatttteeee:::: Supersedes Patches 214.00, 215.00, 217.00, 431.00 Fixes a problem that can cause an AlphaServer ES45 system to hang if the Xserver is restarted or the system rebooted without a power cycle when using the Radeon AGP graphics device. Prevents the memory troller from starting on titan and tsunami platforms with aluminum ev68 CPUs. Fixes several IPMI-related problems, including the following: Erroneous fields in 686 OS-detected environmental machine check logout frame Unusually large number of 686 sensor timeouts with heavy system load IPMI always reporting -48v sensors as broken, seen as "redundant power supply failed" messages An IPMI memory leak Provides additional environmental support functionality for the AlphaServer DS20L system. Adds sysconfig tunables for ES45 environmental monitoring. NNNNuuuummmmbbbbeeeerrrr:::: Patch 671.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Fix for mfs command SSSSttttaaaatttteeee:::: New Adds a -M option to the newfs command that allows users to specify permissions of an mfs root directory when it is first created. Adds EVM notification support for UFS file systems. Tru64 UNIX Patches 1-65 NNNNuuuummmmbbbbeeeerrrr:::: Patch 674.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Fix for ln command SSSSttttaaaatttteeee:::: New (Supersedes Patch 672.00) Eliminates compiler warnings in ln. Corrects the behavior of ln -sf to address the issue caused when a symbolic link points to a nonexisting file. NNNNuuuummmmbbbbeeeerrrr:::: Patch 678.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Fix race condition and improper file access SSSSttttaaaatttteeee:::: Supersedes Patches 143.00, 675.00, 676.00 Corrects a potential security vulnerability where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file access. Eliminates compiler warnings in ksh. Fixes a ksh problem related to cleaning the process when a terminal is abruptly stopped. 1-66 Tru64 UNIX Patches NNNNuuuummmmbbbbeeeerrrr:::: Patch 680.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Fix for audit_tool command SSSSttttaaaatttteeee:::: Supersedes Patch 252.00 Changes the audit_tool command as follows: Fixes the search algorithm to differentiate between prived and non-prived UIDS, and to allow regular expressions in string searches. Fixes a problem in which nonsense characters are appended to the audit information output of an execve event in brief mode. Tru64 UNIX Patches 1-67 NNNNuuuummmmbbbbeeeerrrr:::: Patch 685.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Fix for vrestore command SSSSttttaaaatttteeee:::: New (Supersedes Patches 681.00, 682.00, 683.00) Makes the following changes to the vdump and vrestore commands: Causes vdump and vrestore to act as expected upon receiving an interrupt (^C). Fixes vdump and vrestore to pick up correct messages in all locales. Increases the maximum blocksize for vdump and vrestore (performance). Causes vdump to avoid some unnecessary function calls, thereby allowing faster vdumps. Fixes vrestore to display bit file attributes with the -l option. Prevents vrestore from failing during a remote system call. Causes vrestore to display a file and directory name along with the error message when the command fails to set a property list. Prevents vrestore from dumping core when when a tape has a smaller blocksize than expected. Allows vrestore to handle no-rewind tapes properly. Lets vrestore read environment variables for a user-defined device name. Allows attributes to set to the top level-directory. NNNNuuuummmmbbbbeeeerrrr:::: Patch 687.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Removes compiler warnings SSSSttttaaaatttteeee:::: New Removes compiler warnings addressing outside of array bounds. 1-68 Tru64 UNIX Patches NNNNuuuummmmbbbbeeeerrrr:::: Patch 689.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Corrects a problem in os_mibs SSSSttttaaaatttteeee:::: New Corrects a problem in os_mibs that results in the swap size and swap used values for the host mib being reported as negative values on some systems. NNNNuuuummmmbbbbeeeerrrr:::: Patch 692.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Fix for dump command SSSSttttaaaatttteeee:::: New (Supersedes Patch 690.00) Fixes the dump command to recognize LSM volumes correctly and to not report random information when an error has occurred. Introduces dumprmt.msg for remote dump/restore messages. This new message catalog file is used in both rdump and rrestore programs. NNNNuuuummmmbbbbeeeerrrr:::: Patch 694.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Corrects exit status of sed when disk is full SSSSttttaaaatttteeee:::: New Corrects the exit status of sed when the disk is full. NNNNuuuummmmbbbbeeeerrrr:::: Patch 696.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Revises the sys_attrs_ee(5) reference page SSSSttttaaaatttteeee:::: New Revises the sys_attrs_ee(5) reference page to document the new ee subsystem attribute link_check_interval. Tru64 UNIX Patches 1-69 NNNNuuuummmmbbbbeeeerrrr:::: Patch 698.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Correct improper file access SSSSttttaaaatttteeee:::: Supersedes Patch 287.00 Corrects a potential security vulnerability where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file access. Addresses problems with the mksas utility where false warning messages are generated and where the user-specified temporary directory could be erroneously removed. NNNNuuuummmmbbbbeeeerrrr:::: Patch 703.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Correct improper file or privilege management SSSSttttaaaatttteeee:::: New Corrects a potential security vulnerability where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file or privilege management. NNNNuuuummmmbbbbeeeerrrr:::: Patch 705.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Eliminates compiler warnings in mkdir SSSSttttaaaatttteeee:::: New Eliminates compiler warnings in the mkdir command. 1-70 Tru64 UNIX Patches NNNNuuuummmmbbbbeeeerrrr:::: Patch 708.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Correct potential buffer overflow SSSSttttaaaatttteeee:::: Supersedes Patches 460.00, 706.00 Corrects several potential security vulnerabilities where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file or privilege management. Fixes the message catalog for the CDE application dtprintinfo. NNNNuuuummmmbbbbeeeerrrr:::: Patch 710.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Fix for ps command SSSSttttaaaatttteeee:::: New Allows whitespace in header field and in multiple headers with the ps option -o. NNNNuuuummmmbbbbeeeerrrr:::: Patch 712.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Provides the chatr(1) reference page SSSSttttaaaatttteeee:::: New Adds the chatr(1) reference page for the chatr command. NNNNuuuummmmbbbbeeeerrrr:::: Patch 714.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Fix for vmstat SSSSttttaaaatttteeee:::: New Corrects a problem in which vmstat may display incorrect free page counts on NUMA systems. Tru64 UNIX Patches 1-71 NNNNuuuummmmbbbbeeeerrrr:::: Patch 716.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Performance enhancement for IPsec SSSSttttaaaatttteeee:::: New Corrects a condition in which IPsec performs poorly when using ESP with the 3DES cipher. NNNNuuuummmmbbbbeeeerrrr:::: Patch 718.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Provides correct labels for mach events SSSSttttaaaatttteeee:::: New Provides the correct labels to the audit subsystem for mach events. NNNNuuuummmmbbbbeeeerrrr:::: Patch 720.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Fix for audit subsystem utilities SSSSttttaaaatttteeee:::: New Provides the correct labels to the audit subsystem for mach events. NNNNuuuummmmbbbbeeeerrrr:::: Patch 722.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Fixes a typo in mkcdsl SSSSttttaaaatttteeee:::: New Fixes a typo in mkcdsl. Updates the NIS startup script to correctly start NIS on the cluster alias. 1-72 Tru64 UNIX Patches NNNNuuuummmmbbbbeeeerrrr:::: Patch 727.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Fix for which command SSSSttttaaaatttteeee:::: New Fixes /usr/bin/which to take path information from environment rather ~/.cshrc if it is invoked from other than the C shell. NNNNuuuummmmbbbbeeeerrrr:::: Patch 729.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Correct improper file or privilege management SSSSttttaaaatttteeee:::: New Corrects a potential security vulnerability where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file or privilege management. NNNNuuuummmmbbbbeeeerrrr:::: Patch 731.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Update to pmgrd IoRate Statistics feature SSSSttttaaaatttteeee:::: New Adds a new table in pm.mib for pmgrd IoRate Statistics feature. NNNNuuuummmmbbbbeeeerrrr:::: Patch 733.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Correct improper file or privilege management SSSSttttaaaatttteeee:::: New Corrects a potential security vulnerability where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file or privilege management. Tru64 UNIX Patches 1-73 NNNNuuuummmmbbbbeeeerrrr:::: Patch 735.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Fix for chfile command SSSSttttaaaatttteeee:::: New Causes the chfile command to display an nformative error message if it fails while trying to enable data logging. NNNNuuuummmmbbbbeeeerrrr:::: Patch 737.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Fix for tip command SSSSttttaaaatttteeee:::: New Enables the tip command to log into the member-specific log file. Corrects the path for the aculog file and gives appropriate permissions. NNNNuuuummmmbbbbeeeerrrr:::: Patch 739.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Enables tip to log into member-specific log file SSSSttttaaaatttteeee:::: New Enables the tip command to log into the member-specific log file. Corrects the path for the aculog file and gives appropriate permissions. NNNNuuuummmmbbbbeeeerrrr:::: Patch 741.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Fix for default cron jobs SSSSttttaaaatttteeee:::: New Causes the rescheduling of certain default cleanup cron jobs so that they will not get skipped during a time change to daylight savings time (DST). 1-74 Tru64 UNIX Patches NNNNuuuummmmbbbbeeeerrrr:::: Patch 743.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Corrects a problem in niffd SSSSttttaaaatttteeee:::: New Corrects a problem with the Network Interface Failure Finder daemon, niffd, that causes its memory usage to grow over time. NNNNuuuummmmbbbbeeeerrrr:::: Patch 745.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Correct improper file or privilege management SSSSttttaaaatttteeee:::: New Corrects a potential security vulnerability where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file or privilege management. NNNNuuuummmmbbbbeeeerrrr:::: Patch 747.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Fix for btextract utility SSSSttttaaaatttteeee:::: New Corrects a problem in which the btextract utility was not preventing the advanced mode of restore for a system with LSM setup. NNNNuuuummmmbbbbeeeerrrr:::: Patch 749.00 AAAAbbbbssssttttrrrraaaacccctttt:::: make command now checks dependencies on archive libraries SSSSttttaaaatttteeee:::: New Changes the /usr/opt/ultrix/usr/bin/make command to properly check dependencies on archive libraries. Tru64 UNIX Patches 1-75 NNNNuuuummmmbbbbeeeerrrr:::: Patch 751.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Fix for .mrg...login script SSSSttttaaaatttteeee:::: New Adds informative messages during a rolling upgrade when a problem is encounted with the merging of the .login file. NNNNuuuummmmbbbbeeeerrrr:::: Patch 754.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Fixes slow boot problems when booting cluster SSSSttttaaaatttteeee:::: Supersedes Patches 450.00, 752.00 Ensures that a cluster member will be up to date with respect to the LSM configuration when calls are made to an internal LSM routine. Without this fix, smsd triggers LSM configuration errors when querying LSM in a cluster. Prevents LSM configuration daemon, vold, from core dumping when attempting to delete a disk that was not initialized properly. Fixes a very slow boot when booting several cluster nodes at the same time and CLSM is configured. NNNNuuuummmmbbbbeeeerrrr:::: Patch 756.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Correct improper file or privilege management SSSSttttaaaatttteeee:::: New Corrects a potential security vulnerability where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file or privilege management. 1-76 Tru64 UNIX Patches NNNNuuuummmmbbbbeeeerrrr:::: Patch 758.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Revision to the vdump.8 reference page SSSSttttaaaatttteeee:::: New Revises the vdump(8) reference page to change the statement for the -b option to be a maximum of 2048. NNNNuuuummmmbbbbeeeerrrr:::: Patch 760.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Corrects a problem in the marvel_pfm driver SSSSttttaaaatttteeee:::: New Corrects a problem in the marvel_pfm driver where xmesh and bmesh incorrectly reported 100 percent utilization for IO7 ports held in reset. Previously, this had to be corrected by using the mvfi test program. NNNNuuuummmmbbbbeeeerrrr:::: Patch 762.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Fix for SysMan Station failure SSSSttttaaaatttteeee:::: New Corrects a problem that occurred in some cluster configurations where SysMan Station fails to generate the hardware view. A Java stack trace is generated indicating that the routine "HardwareLayout.fancyPlace" was being executed at the time of the trace. Tru64 UNIX Patches 1-77 NNNNuuuummmmbbbbeeeerrrr:::: Patch 764.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Correct improper file or privilege management SSSSttttaaaatttteeee:::: New Corrects a potential security vulnerability where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file or privilege management. NNNNuuuummmmbbbbeeeerrrr:::: Patch 766.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Installs DECthreads V3.20-033 SSSSttttaaaatttteeee:::: Supersedes Patches 22.00, 478.00 Installs DECthreads V3.20-033 to address floating point problems in threaded programs. Previous patches installed DECthreads V3.20-029 and V3.20-029c. NNNNuuuummmmbbbbeeeerrrr:::: Patch 768.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Installs DECthreads V3.20-033 SSSSttttaaaatttteeee:::: Supersedes Patches 24.00, 480.00 Installs DECthreads V3.20-033 to address floating point problems in threaded programs. Previous patches installed DECthreads V3.20-029 and V3.20-029c. 1-78 Tru64 UNIX Patches NNNNuuuummmmbbbbeeeerrrr:::: Patch 770.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Fixes cluster interconnect route advertisement SSSSttttaaaatttteeee:::: Supersedes Patch 42.00 Corrects a problem using MD5 authentication with Version 2 RIP. Resolves a problem where the cluster interconnect route is inappropriately advertised. NNNNuuuummmmbbbbeeeerrrr:::: Patch 772.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Fix for find command SSSSttttaaaatttteeee:::: Supersedes Patch 64.00 Corrects the find -ls command to display the correct number of blocks. Corrects the find -links, -size, -i, -inum behavior with respect to the + operations. Find + operations will match greater than, rather than greater than or equal to. NNNNuuuummmmbbbbeeeerrrr:::: Patch 774.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Fix for dirclean utility SSSSttttaaaatttteeee:::: New Corrects the /usr/sbin/dirclean utility from attempting to remove the AdvFS Tru64 UNIX Patches 1-79 NNNNuuuummmmbbbbeeeerrrr:::: Patch 776.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Fixes spike code optimization tool SSSSttttaaaatttteeee:::: New Fixes the way the Spike code optimization tool handles -arch and -tune options. Using these options with previous versions of Spike resulted in unproductive error messages and/or system crashes. NNNNuuuummmmbbbbeeeerrrr:::: Patch 779.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Provides fixes for the collect utility SSSSttttaaaatttteeee:::: Supersedes Patches 195.00, 777.00 Makes the following changes to the collect utility: Updates the utility from Version 2.0.0 to 2.0.5. Fixes several problems, including the handling Floating Point Exception. Provides new collect features such as AdvFS monitoring and CPU and memory metrics on a per RAD basis. NNNNuuuummmmbbbbeeeerrrr:::: Patch 781.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Adds pmadvfs.mib to define AdvFS MIB definitions SSSSttttaaaatttteeee:::: New Adds a new MIB file, pmadvfs.mib, to define AdvFS MIB definitions. 1-80 Tru64 UNIX Patches NNNNuuuummmmbbbbeeeerrrr:::: Patch 783.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Fix buffer overflow and improper file access SSSSttttaaaatttteeee:::: Supersedes Patches 246.00, 456.00 Corrects several potential security vulnerabilities where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file or privilege management. NNNNuuuummmmbbbbeeeerrrr:::: Patch 785.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Fix for nissetup script SSSSttttaaaatttteeee:::: New Corrects a condition in which the nissetup command would leave /etc/group with an incorrect mode of 600 after removing NIS. NNNNuuuummmmbbbbeeeerrrr:::: Patch 787.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Revision of the fwupgrade(8) reference page SSSSttttaaaatttteeee:::: New Revises the fwupgrade(8) reference page to document new functions that allow the specified firmware update image to be located on a BOOTP server in a connected network. Tru64 UNIX Patches 1-81 NNNNuuuummmmbbbbeeeerrrr:::: Patch 789.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Correct improper file or privilege SSSSttttaaaatttteeee:::: New Corrects a potential security vulnerability where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file or privilege management. NNNNuuuummmmbbbbeeeerrrr:::: Patch 791.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Correct improper file access SSSSttttaaaatttteeee:::: Supersedes Patches 277.00, 464.00 Corrects several potential security vulnerabilities where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file or privilege management. Corrects the behavior of the more command, when given both a nonexisting file and a nonempty file with a long file name. NNNNuuuummmmbbbbeeeerrrr:::: Patch 793.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Corrects I/O performance issue seen with CLSM SSSSttttaaaatttteeee:::: New Corrects an I/O performance issue that occurs when CLSM is configured and one member of a cluster goes down unexpectedly. 1-82 Tru64 UNIX Patches NNNNuuuummmmbbbbeeeerrrr:::: Patch 795.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Fix for advfsstat command SSSSttttaaaatttteeee:::: New Corrects a problem with the advfsstat command printing negative values for statistics that are over 10 decimal digits long. NNNNuuuummmmbbbbeeeerrrr:::: Patch 797.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Fixes cut cmd to handle incomplete lines correctly SSSSttttaaaatttteeee:::: New Fixes /usr/bin/cut to correctly handle an incomplete line. NNNNuuuummmmbbbbeeeerrrr:::: Patch 801.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Fixes reset logic for Tru64 IDE/ATAPI driver SSSSttttaaaatttteeee:::: Supersedes Patches 440.00, 798.00, 799.00 Fixes the problem of a kernel memory fault in systems that contain more than eight IDE/ATA buses. Fixes an IDE/ATA bus hang caused by attempting to complete raw odd byte DMA transfers to or from IDE/ATAPI devices. Prevents an IDE bus hang caused when issuing a play audio track command from scu to an ATAPI CD-ROM containing an enhanced CD. Fixes the IDE/ATAPI driver's reset logic to prevent a kernel memory fault when booting and to properly detect and log all master and slave reset failures when the system is operational. Tru64 UNIX Patches 1-83 NNNNuuuummmmbbbbeeeerrrr:::: Patch 803.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Fix for migrate utility SSSSttttaaaatttteeee:::: New Corrects the error message returned when trying to migrate striped files when the -s option is omitted. NNNNuuuummmmbbbbeeeerrrr:::: Patch 805.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Sysman station display does not get updated SSSSttttaaaatttteeee:::: New Corrects a problem in which a Sysman Station display is not updated when component (for example, CPU) registration or deregistration events occur. NNNNuuuummmmbbbbeeeerrrr:::: Patch 809.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Fix for bcheckrc script SSSSttttaaaatttteeee:::: New Fixes a problem with bcheckrc that occurs when it is run multiple times. NNNNuuuummmmbbbbeeeerrrr:::: Patch 811.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Fix for defragment utility SSSSttttaaaatttteeee:::: New Fixes a problem where defragmentation can fail if the process can not obtain enough memory. 1-84 Tru64 UNIX Patches NNNNuuuummmmbbbbeeeerrrr:::: Patch 813.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Fixes a problem in fixfdmn SSSSttttaaaatttteeee:::: Supersedes Patch 349.00 Corrects several problems with the fixfdmn utility. Allows the fixfdmn utility to fix a rare corruption case in the RBMT/BMT0. NNNNuuuummmmbbbbeeeerrrr:::: Patch 815.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Addition of new sysconfigurable attribute SSSSttttaaaatttteeee:::: New Fixes a high lock contention for the str_to_lock STREAMS attribute. Adds a sysconfigurable tuning parameter to the STREAMS subsystem. NNNNuuuummmmbbbbeeeerrrr:::: Patch 817.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Correct improper file or privilege management SSSSttttaaaatttteeee:::: New Corrects a potential security vulnerability where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file or privilege management. Tru64 UNIX Patches 1-85 NNNNuuuummmmbbbbeeeerrrr:::: Patch 819.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Corrects problem with volmake utility SSSSttttaaaatttteeee:::: New Corrects a problem where, when creating a new plex, volmake will report that associating a subdisk with the plex would cause an overlap with another subdisk when they should not be overlapping. NNNNuuuummmmbbbbeeeerrrr:::: Patch 821.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Fixes a problem with scu SSSSttttaaaatttteeee:::: New Fixes a problem with the SCSI utility program, scu, where a mismatch between expected and found data displays incorrect data expected. NNNNuuuummmmbbbbeeeerrrr:::: Patch 823.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Revision to the sys_attrs_proc(5) reference page SSSSttttaaaatttteeee:::: New Revises the sys_attrs_proc(5) reference page to add the new tunable executable_data. Adds the new javaexecutedata(8) reference page . 1-86 Tru64 UNIX Patches NNNNuuuummmmbbbbeeeerrrr:::: Patch 825.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Correct improper file access SSSSttttaaaatttteeee:::: Supersedes Patches 462.00, 294.00 Provides support for SmartArray disk controllers. Without this patch, if the SmartArray product is installed on the system, the SysMan Station hardware view will fail to operate. Corrects a potential security vulnerability has where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file access. Provides enhancements for file system suitlets. NNNNuuuummmmbbbbeeeerrrr:::: Patch 835.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Correct improper file access SSSSttttaaaatttteeee:::: New Corrects a potential security vulnerability has where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file access. NNNNuuuummmmbbbbeeeerrrr:::: Patch 837.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Fix re_ioctl() cases DIODCMD and DIODCDB SSSSttttaaaatttteeee:::: New Fixes the re_ioctl() cases DIODCMD and DIODCDB where cmd transfer size has been changed to avoid kernel memory fault. Tru64 UNIX Patches 1-87 NNNNuuuummmmbbbbeeeerrrr:::: Patch 838.00 AAAAbbbbssssttttrrrraaaacccctttt:::: SSSSttttaaaatttteeee:::: Supersedes Patches 65.00, 66.00, 67.00, 68.00, 69.00, 70.00, 71.00, 72.00, 73.00, 75.00, 376.00, 406.00, 408.00, 488.00, 241.00, 242.00, 244.00, 435.00, 498.00, 213.00, 108.00, 109.00, 110.00, 111.00, 112.00, 113.00, 114.00, 115.00, 116.00, 117.00, 118.00, 119.00, 120.00, 121.00, 122.00, 123.00, 124.00, 125.00, 126.00, 127.00, 128.00, 129.00, 130.00, 131.00, 133.00, 397.00, 398.00, 399.00, 400.00, 401.00, 402.00, 403.00, 405.00, 490.00, 78.00, 79.00, 80.00, 82.00, 341.00, 409.00, 410.00, 412.00, 482.00, 494.00, 581.00, 582.00, 583.00, 584.00, 585.00, 586.00, 587.00, 588.00, 589.00, 590.00, 591.00, 592.00, 593.00, 594.00, 595.00, 596.00, 597.00, 598.00, 599.00, 600.00, 601.00, 602.00, 603.00, 604.00, 605.00, 606.00, 607.00, 608.00, 609.00, 610.00, 611.00, 612.00, 613.00, 614.00, 615.00, 616.00, 617.00, 618.00, 256.00, 25.00, 26.00, 27.00, 28.00, 30.00, 14.00, 161.00, 152.00, 153.00, 155.00, 389.00, 18.00, 507.00, 508.00, 509.00, 510.00, 511.00, 512.00, 513.00, 514.00, 515.00, 516.00, 517.00, 518.00, 519.00, 520.00, 521.00, 660.00, 523.00, 826.00, 827.00, 828.00, 829.00 Provides more helpful informational messages for the following situations: The advscan command will report if a domain has all of its volumes, but they are stored in a different directories — a situation that will cause the mount command mount to fail. The AdvFS I/O error message will include the location of a file that will help users translate the error number into an error message. Fixes an rmvol E_PAGE_NOT_MAPPED error. Eliminates an ENO_MORE_BLKS error seen when COW'ing to a clone file while an rmvol operation is in progress. Fixes many small problems with the dsfmgr command. Provides protection against a class of potential security vulnerabilities called buffer overflows. Buffer overflows are sometimes exploited in an attempt to subvert the function of a privileged program and possibly execute commands at the elevated privileges if the program file has the setuid privilege. This patch allows a system administrator to enable memory management protections that limit potential buffer overflow vulnerabilities. 1-88 Tru64 UNIX Patches NNNNuuuummmmbbbbeeeerrrr:::: Patch 839.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Fixes problems in dbx and object file tools SSSSttttaaaatttteeee:::: New Fixes various problems in the dbx and object file tools: dbx, ostrip, strip, mcs, dis, cord, file, and stdump. NNNNuuuummmmbbbbeeeerrrr:::: Patch 847.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Security (SSRT2266) SSSSttttaaaatttteeee:::: Supersedes Patches 179.00, 180.00, 181.00, 183.00, 427.00 Fixes a potential security vulnerability that may result in denial of service. This may be in the form of local and remote security domain risks. The following potential security vulnerability has been corrected: SSRT2266 IGMP (Severity - High) which, under certain circumstances, could compromise system integrity. Fixes a problem in the kernel network subsystem that causes a kernel memory fault panic in the m_adj() routine. Fixes a problem in the IP multicast loopback code that causes a kernel memory fault panic. Fixes a problem in which the kernel incorrectly closes a socket, thereby causing Sybase 1613 errors to be produced. Fixes a problem in which a duplicate IP address might be configured on the system, or an IP address might be configured with an incorrect netmask. Fixes a problem caused when the Tru64 UNIX TCP layer prematurely closes a slow but good connection with TCP reset. Tru64 UNIX Patches 1-89 NNNNuuuummmmbbbbeeeerrrr:::: Patch 851.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Fixes various problems in the bcm driver SSSSttttaaaatttteeee:::: Supersedes Patches 425.00, 43.00, 45.00, 48.00, 49.00, 50.00, 51.00, 52.00, 54.00, 500.00, 260.00, 567.00, 568.00, 569.00, 570.00, 571.00, 572.00, 574.00 Adds IEEE 802.1Q Virtual Local Area Network (VLAN) support for the following: DEGPA DEGXA DE50x, lan_common.h DE60x Adds code to print greater than 61 UNIX domain sockets. Changes file read errors from /dev/kmem to ignore and continue in a running system. updates ddr.mod to support new hardware (NHD6) devices. Adds support to the ifconfig application for the IPv6 command line argument ip6reachabletime. Adds support for Ethernet adapters, including the DS25 onboard 10/100/1000 port. Fixes a problem in the alt driver for DEGPA Gigabit Ethernet adapters. This problem affects all Tru64 UNIX systems containing DEGPA network interfaces. Fixes numerous issues in the driver for DEGXA Gigabit Ethernet adapters. Fixes a bug that may cause a panic if the Xserver is stopped. Fixes a potential system crash when shutting down after using a DAPBA or DAPCA ATM adapter. Corrects a problem in which an ARP request for a permanent ARP entry is ignored and the user cannot connect from remote system. Corrects problems with netstat and ifconfig so that when a MAC address is printed, it is printed using 2-digit hex octets with leading zeros. 1-90 Tru64 UNIX Patches Resolves a problem where some de50x network interface cards, under specific circumstances, may not send gratuitous ARP packets . Fixes a problem with non-U.S. USB keyboards used in non-U.S. locales in which the keyboards are treated as U.S. keyboards by the operating system. Fixes various problems in the bcm driver for DEGXA Gigabit Ethernet which can cause crashes. Adds recognition for possible future devices. NNNNuuuummmmbbbbeeeerrrr:::: Patch 859.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Fixes ftpd file transfer failure SSSSttttaaaatttteeee:::: New Fixes an ftpd file transfer failure when a file exeeds 2GB. NNNNuuuummmmbbbbeeeerrrr:::: Patch 861.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Fixes a problem in .mrg..protocols merge script SSSSttttaaaatttteeee:::: New Fixes a problem in the /etc/.mrg..protocols merge script that causes incorrect permissions on the /etc/protocols file. Tru64 UNIX Patches 1-91 NNNNuuuummmmbbbbeeeerrrr:::: Patch 867.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Fixes a process hang problem in ubc_common_lookup SSSSttttaaaatttteeee:::: Supersedes Patches 290.00, 292.00, 436.00, 438.00, 92.00, (93.00, 94.00, 95.00, 96.00, 97.00, 98.00, 99.00, 100.00, 101.00, 374.00, 103.00, 417.00, 419.00, 496.00, 623.00, 624.00, 625.00, 626.00, 627.00, 628.00, 629.00, 630.00, 631.00, 632.00, 633.00, 635.00, 833.00, 845.00, 865.00 Provides support for the SDLT160/320 and Ultrium 2 SCSI tape drives, including support for the Ultrium 2 SCSI to rewind after a reset behavior. Ensures proper compilation of the DDR database. Fixes a problem with the Smart Array driver that could cause a system hang to occur during error recovery when I/O is active. Adds support for new EVM events to be generated by the Event Monitoring daemon, /usr/sbin/envmond. Fixes the system panic "PWS_CCB_QUE_REMOVE: ccb not on any list," caused by a device or bus reset occurring during the execution of a command to a media changer device, like a tape library. Corrects a problem that causes a system panic while running applications performing open of a RAID device, and the faulting routine was control_port_open. Adds an event to indicate that the soft or hard error count has changed on the device identified in the event. Fixes a situation in which mounting a valid CD-ROM for the first time fails with the message "No valid file system exists on this partition," although subsequent mounts of the same CD-ROM work as expected. Provides a configurable setting that causes an error return for any read of tape from a tape that requests less than the full amount of data in the tape block. Enables SmartArray 5300 controller hardware events to be logged to binary.errlog during a boot. This is useful in diagnosing logical volume state change and physical drive hotswaps that can occur while the system in not booted. Corrects a problem in which /sbin/ddr_config does not accept values for ReadyTimeSeconds larger than 255. The new limit is 86400 seconds (24 hours). Fixes problems with NUMA disk statistics. Fixes a KMF problem that can occur when some nodes in cluster are rebooted and a device is shared by all the nodes. 1-92 Tru64 UNIX Patches Changes the CAM subsystem message that is printed to the error log on a recovered read error from "bad block number" to "block number." Corrects a problem in which camreport may report negative device IDs. Fixes the reporting to the binary errlog of device monitoring events and hardware errors during disk recovery from the disk driver. Corrects a problem with hwmgr utility deletes while a SCSI scan is in progress. Corrects a problem in which a path event can cause hang in cdisk_online during disk open of HSG80. Installs the V1.07 release of the ciss driver, which is the mandatory minimum version to support the Smart Array 5300 Controller. Addresses an issue where AdvFS domain panics would occur during HSZ and HSG failovers. Tru64 UNIX Patches 1-93 PPPPaaaattttcccchhhh 888866667777....00000000 CCCCoooonnnnttttiiiinnnnuuuueeeedddd Fixes a problem where the CAM I/O subsystem does not always zero the Cam Control Blocks that are used by the peripheral drivers. This can cause a kernel memory fault or system hang when the subsystem is low on memory. Prevents unnecessary retries on an HSG80 when fail unit attention with ascq = Oxf002 and returns poper error to higher layer. Prevents "ccfg_MakeDeviceIdentWWID: Invalid device ID" messages from being generated when they should not be. Provides Version 1.08 of the ciss driver. Verifies path structures in ctape_ioctl and ctape_generic_passthru to prevent a kernel memory fault if the tape was opened with FNDELAY flag set. Addresses an issue where AdvFS domain panics would occur during HSZ and HSG failovers. Fixes a small memory leak in Power Management code. Provides Version 1.09 of the ciss driver. Corrects a problem in which the BBR code logs all error messages as soft error, even if the error was not recovered and it failed to do the bad block replacement. Fixes a process hang in ubc_common_lookup. Fixes a problem where SmartArray 5300 Logical Volumes were counted as RAID controllers. Addresses an issue where NULL Inquiry data causes a "'Device has no 'name'" error as well as possible I/O stalls. Provides Version 1.10 of the ciss driver. Corrects problems where tape devices become unavailable, do not respond, report unrecoverable errors, or cause kernel memory faults. Adds version 1.12 of the ciss driver. Fixes a problem in which a GS80 would hang following an SA5300 reset. Addresses an issue in which I/O may not complete under certain circumstances. 1-94 Tru64 UNIX Patches NNNNuuuummmmbbbbeeeerrrr:::: Patch 872.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Security (SSRT2301, SSRT2275, SSRT2384) SSSSttttaaaatttteeee:::: Supersedes Patches 65.00, 66.00, 67.00, 68.00, 69.00, 70.00, 71.00, 72.00, 73.00, 75.00, 376.00, 406.00, 408.00, 488.00, 241.00, 242.00, 244.00, 435.00, 498.00, 213.00, 108.00, 109.00, 110.00, 111.00, 112.00, 113.00, 114.00, 115.00, 116.00, 117.00, 118.00, 119.00, 120.00, 121.00, 122.00, 123.00, 124.00, 125.00, 126.00, 127.00, 128.00, 129.00, 130.00, 131.00, 133.00, 397.00, 398.00, 399.00, 400.00, 401.00, 402.00, 403.00, 405.00, 490.00, 78.00, 79.00, 80.00, 82.00, 341.00, 409.00, 410.00, 412.00, 482.00, 494.00, 581.00, 582.00, 583.00, 584.00, 585.00, 586.00, 587.00, 588.00, 589.00, 590.00, 591.00, 592.00, 593.00, 594.00, 595.00, 596.00, 597.00, 598.00, 599.00, 600.00, 601.00, 602.00, 603.00, 604.00, 605.00, 606.00, 607.00, 608.00, 609.00, 610.00, 611.00, 612.00, 613.00, 614.00, 615.00, 616.00, 617.00, 618.00, 256.00, 25.00, 26.00, 27.00, 28.00, 30.00, 14.00, 161.00, 152.00, 153.00, 155.00, 389.00, 18.00, 507.00, 508.00, 509.00, 510.00, 511.00, 512.00, 513.00, 514.00, 515.00, 516.00, 517.00, 518.00, 519.00, 520.00, 521.00, 660.00, 523.00, 826.00, 827.00, 828.00, 829.00, 831.00, 840.00, 841.00, 843.00, 849.99, 862.00, 864.00, 869.00, 870.00 Fixes a process hang condition. Fixes a "thread_block: simple lock held" panic. Corrects a situation in which a system could panic during a particular machine check. Corrects several problems of 3D client hangs when using a Radeon graphics card. Fixes a performance problem seen when doing wiring on gh_chunks memory; for example, an Oracle application. Protects against "get_color_bucket: empty buckets!" panics and "kernel memory fault" failures on systems with mixed cache parameters. Fixes a kernel memory fault in u_seg_global_destroy. Corrects a kernel memory fault that can happen when running applications that use the Cray Intra-Node Shared Memory library. Prevents a potential process (not system) hang seen when a system comes under heavy memory load with monolithic memory use (gigabyte-scale single objects). Prevents a kernel memory fault when running with protection on the 128-byte bucket. (This should only be running with this as directed by support personnel.) Corrects a situation in which a taso-compiled binary is unable to allocate Tru64 UNIX Patches 1-95 more memory after performing a series of mmap calls. Fixes an occasional panic that can be seen when reading from a process using Granularity Hints via the /proc file system. Fixes a panic that generates the message "u_seg_vop_remove: seg not found in vop." Fixes a situation in which mmap memory locked with mlockall() using the MCL_FUTURE flag does not become wired automatically. Fixes a "Bigpage Assertion Failed" panic. Corrects a rounding error for vm attribute vm_bigpg_thresh. Corrects the handling of bad pages when bigpages are enabled. Fixes "page mapped" panics when using the mmap() function for dev/mem to access free bigpages. 1-96 Tru64 UNIX Patches PPPPaaaattttcccchhhh 888877772222....00000000 CCCCoooonnnnttttiiiinnnnuuuueeeedddd Corrects a condition that causes a delete_pv_entry panic when kernel virtual-address space has high usage. Fixes a problem seen when USB hubs (or any other bus device) are removed from a running system. Removes a restriction in which dynamic VMEbus device drivers could only probe one controller per driver. With this patch, multiple controllers per driver can be configured successfully. Fixes a potential floating point register corruption. Fixes multiple problems affecting a system with peripheral USB hubs attached, as well as problems that might occur when moving or adding USB host adapters. Improves I/O performance by reducing kernel locking overhead. Fixes a system hang when using Open3D over the AGP bus on a GS1280. Corrects performance issues when accessing a file with direct I/O enabled. Fixes a panic that can occur when appending to a file. Fixes an AdvFS asynchronous direct I/O problem that could cause a thread to hang. Fixes a problem encountered where a truncated AdvFS file erroneously zeroed data for the remaining leading segment of the file. Changes the behavior of migrate_normal and migrate_stripe when migrating an original file that has a clone. If the clone was marked out of sync, migrate could come back with E_CLONE_OUT_OF_SYNC even though the migrate succeeded. Now this case is caught, and handled. Replaces the system panics caused by "Can't clear bit twice" with a domain panic. Fixes a problem in which a crash occurs when an AdvFS file system reports I/O errors and enters into a domain panic state. AdvFS's error cleanup would panic on an invalid pointer and report an "invalid memory read access from kernel mode" panic message. Fixes an issue encountered in configurations where the primary processor is not the first processor within a rad. Resolves a problem of not being able to view files on some CD-ROM media that is created by third-party software and corrects the erroneous reporting of success when attempting to write beyond the file size limit using synchronized I/O and the calculation of _PC_FILESIZEBITS, which is Tru64 UNIX Patches 1-97 used by the operating system for pathconf file characteristics. Fixes a problem with audit data not being displayed by the audit tool, Fixes problems with file object selection and deselection and directories. Fixes problems with NUMA performance associated with auditing. Fixes a race during AdvFS volume removal that can cause a panic in the bs_osf_complete() routine. Fixes a problem with kernel memory fault in shadowvnode() caused by NULL vnode pointer. Fixes insmntque() to conform to proper locking when removing and adding vnode to the mount vlist. Fixes a problem with excessive FIDS_LOCK contention observed when large numbers of files are using system-based file locking. 1-98 Tru64 UNIX Patches PPPPaaaattttcccchhhh 888877772222....00000000 CCCCoooonnnnttttiiiinnnnuuuueeeedddd Corrects the AdvFS system call OP_GET_BKUP_XTNT_MA to avoid a silent infinite loop in vdump. The call will now return the valid xtntCnt when it fails due to E_NOT_ENOUGH_XTNTS. Fixes a panic caused by a problem within the swapping subsystem. Fixes mount and umount failures and panics in MFS, UFS, and FDFS. Fixes an AdvFS alignment fault panic caused by inconsistent AdvFS metadata in a directory. In particular, the directory's entry size is an unaligned value. Corrects a potential problem with modifying files via direct I/O when there is a clone fileset. Fixes a panic within the two-level scheduling subsystem. Improves AdvFS informational messages as follows: Advscan reports if a domain has all of its volumes, but they are stored in a different directories. This scenario will cause mount to fail. The AdvFS I/O error message includes the location of a file that will help users to translate the error number into an error message. Forces a domain panic instead of a system panic if AdvFS metadata is discovered to be incorrect in frag_group_dealloc. Fixes a part of AdvFS migration code in order to prevent the rmvol utility's "Can't remove volume" error. Fixes a problem when monitoring I/O using the advfsstat command. Fixes a rare problem that causes thread blocking when waiting for memory. Fixes a problem in which a domain panic may occur in idx_lookup_node_int or bs_frag_dealloc under heavy file system activity, generating one of the following messages: idx_lookup_node_int: bs_refpg failed bs_frag_dealloc: rbf_pinpg (4) failed, return code = -1035 Fixes a problem in which the fuser utility is unable to report on all referenced resources, which occurs when attempting to identify reasons for Tru64 UNIX Patches 1-99 unmount failures. Improves the process exit procedure for processes that have had the nice command used on them. Corrects a potential security vulnerability where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file access. Corrects a race condition in AdvFS in which it avoids a potential stranded log record in memory that does not get out to disk. Fixes an rmvol E_PAGE_NOT_MAPPED error. Eliminates an ENO_MORE_BLKS error seen when performing a copy on write (COW) procedure to a clone file while an rmvol operation is in progress. Fixes a problem in which a system on a cluster can panic with the message "ics_unable_to_make_progress: input thread stalled." Adds support for CPU indictment on AlphaServer ES80 and GS1280 systems. Adds support in the platform code to handle MSI capable adapters. AlphaServer GS1280 systems support option cards that require MSI capabilities. 1-100 Tru64 UNIX Patches PPPPaaaattttcccchhhh 888877772222....00000000 CCCCoooonnnnttttiiiinnnnuuuueeeedddd Adds support to get live status information for air movers and power supplies on AlphaServer ES80 and GS1280 systems and to log intrusion packets to the error log. Fixes a problem in which a process waiting on a semaphore does not get woken up. Fixes a problem in which the extension of UNIX file systems via the mount command can effectively disable the use of the file system. Fixes a problem on some LSM-based systems in which a panic can occurs after a file system extension has been completed. Fixes a problem in which a hang may occur when a rmvol operation is performed after a cluster node failure during volmigrate, volunmigrate, or frag file migration. Corrects a locking problem with NFS running over UFS. Fixes an obliteration of user file information, which is most often seen after using the ftruncate() function. Fixes two potential problems in the NFS V3 client where unstable writes could potentially remain uncommitted when they should have been committed to stable storage. Eliminates a false directory lookup warning message generated by an incorrect comparison caused by mismatched fileid variable types. Improves client caching performance. Fixes a problem that can cause a system crash when an NFS server exports files on a third-party file system (that is, one not built into Tru64 UNIX). Prevents the loss of a single system image for an NFS file system mounted from a cluster, as a result of problems communicating with the external NFS server. Fixes a memory leak in the NFS server when it receives malformed packets. Allows the size of the NFS server's duplicate request cache to be adjusted as needed. Fixes a problem in which a Tru64 UNIX NFS client panics when it receives a null entry as a response to a readdirplus request from an NFS server. Fixes a problem in which a Tru64 UNIX NFS client panics as a result of receiving illegal file access mode from an NFS client. Tru64 UNIX Patches 1-101 Increases TCP windows from 96 KB to 500 KB to improve performance. Causes the netisr thread to dynamically estimate the reply size and subsequently reserve the space in the socket buffer. Adds a new timeout check to notice when data in a socket buffer has not been acknowledged in 30-50 seconds and copies those buffers to allow the UBC to free up those mbufs and not tie them up. Fixes a flaw in the NFS server that could cause it to crash upon reception of malformed input. Addresses the following problems with the NFS server: A potential crash with concurrent read and truncate on an AdvFS file A potential crash with malformed or malicious READDIR[PLUS] version 3 RPCs Corrects problems with the time of year (TOY) clock. Prevents a panic that may occur in a cluster when a fileset mounted -o dual is failed over or unmounted during shutdown. Ensures that time is kept accurately when a system is configured to use NTP, regardless of whether the NTP daemon is running. Prevents a recursive panic situation on a ES47 platform when a double bit memory error is detected. 1-102 Tru64 UNIX Patches PPPPaaaattttcccchhhh 888877772222....00000000 CCCCoooonnnnttttiiiinnnnuuuueeeedddd Corrects the problem of a possible panic in audit_rec_build when auditing execve with the exec_argp or exec_envp audit style enabled. Increases the the maximum length of names in a file property lists from 245 to 255 characters. Fixes a problem where gh_min_seg_size could not be set below 8M. Improve the performance of AdvFS under heavy I/O loads. Allows CPUs that do not take interrupts (either directly from the attached IO7 or indirectly from IO7s attached to offlined CPU) to be taken off line. Prevents issues in the DCE/DFS file system when pages are being flushed as part of a vnode. This patch is required for Sierra systems. Allows AdvFS to record if a domain panic has occurred, even if a system panic results. Helps prevent kernel memory faults in AdvFS. Fixes an AdvFS path that can cause a panic in the advfs_page_busy() routine. Fixes a hang that can occur during the renaming of an AdvFS file. Fixes a system panic in the ubc_page_stealer routine. Fixes a problem that causes a panic that results from a race condition in MFS (memory file system) over CFS (cluster file system). Fixes a problem with cluster failover of UFS filesets. Prevents a O_DSYNC write failure under the following situation: The user creates a new file Closes the file The vnode for the file is recycled Reopens file with O_DSYNC flag Writes to file, overwriting already allocated storage The write from step 5 returns to the application. The system crashes Tru64 UNIX Patches 1-103 Replaces two potential panics in AdvFS with domain panics. Changes the fwupgrade command to allow the specified firmware update image to be located on a BOOTP server in a connected network. Provides protection against a class of potential security vulnerabilities called buffer overflows. Buffer overflows are sometimes exploited in an attempt to subvert the function of a privileged program and possibly execute commands at the elevated privileges if the program file has the setuid privilege. This patch allows a system administrator to enable memory management protections that limit potential buffer overflow vulnerabilities.dds only comment to reserve 0x10000000 and 0x20000000 for AUTOFS flags Adds comment to reserve 0x10000000 and 0x20000000 for AUTOFS flags. Corrects an internal AdvFS check that was always returning true. Fixes a deadlocking problem in the kernel where a file open on a clone could hang when ACLs are enabled. Includes some scalability improvements to AdvFS that will help reduce lock contention and improve performance. 1-104 Tru64 UNIX Patches PPPPaaaattttcccchhhh 888877772222....00000000 CCCCoooonnnnttttiiiinnnnuuuueeeedddd Prevents a potential hang during reboot if there had been a recent domain panic. Addresses small memory leaks within the kernel that occur infrequently. Sisplays the correct error message for the freezefs -q command on a non- AdvFS file system. Addresses system problems that can occur when the system is under heavy I/O load and/or low memory conditions. Fixes a standard violation on AdvFS. Corrects an a "ialloc: dup alloc" panic. Corrects a "blkfree: freeing free block" panic and a "blkfree: freeing free frag" panic. Improves the scalabililty and performance of AdvFS. Fixes a problem where an I/O error (EIO) can occasionally be returned after a page fault. Fixes a possible kernel system hang in vfast when shutting down or rebooting the system. Prevents a kernel memory fault panic that would occur when the audit daemon is set to periodically dump the kernel audit buffers to the audit log file (auditd -d freq). Adds defensive programming to stat.h to avoid stat.h getting confused if one of its internal temporary #defines is defined before stat.h is processed. Fixes a memory management fault/panic in UFS. Fixes a problem where a device file such as /dev/console can become inaccessible, returning the error "Bad File Number." Corrects a potential security vulnerability where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file or privilege management. Allows the auditing of login and su events based in part on the contents of user profiles (for Enhanced Security), the prevailing auditing characteristics of the originating process, and the system-wide audit mask. Previously, only the system audit mask was referenced. Corrects a failure in the safe_open() routine that caused symbolic links given by a relative path from the current working directory sometimes to Tru64 UNIX Patches 1-105 give ENOENT errors incorrectly. Fixes a potential floating point error in threaded applications. Fixes an extended regular expression problem where the interval expression {m,n} is handled incorrectly. Fixes a problem with SIA that caused the Internet Express LDAP Authentication module to be unable to look up default group information for a user at login time. Fixes many small problems with the dsfmgr command. Corrects a cp command performance problem. Corrects a problem in which the cp and cat commands produce different file sizes when reading from a tape device. Corrects a potential security vulnerability has where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file access. Corrects a problem in which the sh shell was using a high amount of CPU time. Fixes the problem while encoding $@ in the Bourne shell. Addresses several problems with ssh secure shell, including interoperability with other ssh implementations, ssh client/server configuration files compatibility issues, and the lack of IPv6 support. 1-106 Tru64 UNIX Patches PPPPaaaattttcccchhhh 888877772222....00000000 CCCCoooonnnnttttiiiinnnnuuuueeeedddd Corrects a potential security vulnerability where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file or privilege management. Corrects a potential security vulnerability where, under certain circumstances, system integrity may be compromised when a buffer overflow occurs in the uucp utility. Buffer overflows are sometimes exploited in an attempt to subvert the function of a privileged program and possibly execute commands at the elevated privileges if the program file has the setuid privilege. Provides protection against a class of potential security vulnerabilities called buffer overflows. Buffer overflows are sometimes exploited in an attempt to subvert the function of a privileged program and possibly execute commands at the elevated privileges if the program file has the setuid privilege. This patch allows a system administrator to enable memory management protections that limit potential buffer overflow vulnerabilities. Allows the sh shell to print the correct msg when enhanced core file naming is on. Fixes a problem in which the runtime loader's (/sbin/loader) attempts to free a null pointer are in error. Corrects RPC-based servers' handling of ill-formed TCP connections. Corrects a problem in which the return value of unlink() call was not checked when two threads were trying to move a file to two different destinations. Although one of the threads could unlink() the source file, no relevant error message was displayed. Addresses a potential security vulnerability that may may result in a Denial of Service (DoS). This potential vulnerability may be in the form of local and remote security domain risks. The following potential security vulnerability has been corrected: SSRT2384 rpc (Severity - High) Allows mount(8) options that take a value to be correctly processed on a cluster. Fixes memory leaks caused by certain type of scripts that called an infinite loop. Fixes following problems in sh: Service denial problem when a quoted here doc script is executed. Problem with handling ELF files. Tru64 UNIX Patches 1-107 The shell variable $- not holding -C set option when it is turned on. Printing broken characters when type builtin utility of sh is invoked in Japanese locale. Prevents segmentation faults when sia_ses_init is passed a malformed argument vector. Fixes client (login, su, rshd, edauth, and sshd2) hangs and long delays under Enhanced Security, as well as some intermittent errors or failures seen with prpasswdd or rpc.yppasswdd. Fixes various problems in the libc functions getdate(), strptime(), callrpc(), strncasecmp(), and fork(). It also fixes a problem in the libnuma function nacreate() and the system header . Fixes a problem where the home directory and login shell attributes for a user account were not suppled to the audit daemon for authentication failures. Fixes various problems in the dbx and object file tools: dbx, ostrip, strip, mcs, dis, cord, file, and stdump. Corrects a problem in which some networking applications, especially X.25 and X.29, stopped working as expected because of interactions with security-related fixes and how the fstat() function behaves on their sockets. 1-108 Tru64 UNIX Patches PPPPaaaattttcccchhhh 888877772222....00000000 CCCCoooonnnnttttiiiinnnnuuuueeeedddd Fixes a regression from pre-V5.0 releases in the libc mktime() function's handling of potentially ambiguous tm struct times; that is, those that fall within a backward clock shift and that have an initially negative tm_isdst value. Fixes an internal problem in the kernel's AdvFS, UFS, and NFS file systems where extended attributes with extremely long names (greater than 247 characters) could not be set on files. The new limit is 254 + a Null string terminator. Corrects the creation of console boot device strings for devices on subordinate buses. Fixes the garbage character that sometimes appears when requesting the name of a boot device via consvar. Corrects a potential security vulnerability which may result in nonprivileged users gaining unauthorized access to files or privileged access on the system. This potential vulnerability may be in the form of a local and remote security domain risk. Fixes a sh shell problem with command substitution. Modifies console callback code to allow users to use upper and lower case variable names for known console environment variables. This patch is required for update installations on EV7 based platforms. Fixes a system panic that has the panic string "pg_nwriters going negative." Fixes a system panic. The panic string could be "mcs_lock: lock already owned by cpu" or "thread_block: simple lock owned." Fixes a problem on a cluster NFS client where a hard-mounted NFS file system can incur ETIMEDOUT errors. Corrects problems in UFS extendfs functionality, which could cause file system metadata inconsistency. Addresses an issue on large systems where kernel threads might not be executed for extended periods of time. Corrects a kernel memory fault in the table syscall. Resolves a problem that results in multiple cluster members crashing with a kernel memory fault in rfs_find_fsid(). Reduces the delay with hwmgr of EV7 based machines by reducing the number of calls to the console to update sensor data. Tru64 UNIX Patches 1-109 Fixes a problem in which the quot -v command sometimes returns wrong quota information on a UFS partition. NNNNuuuummmmbbbbeeeerrrr:::: Patch 874.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Security (SSRT3469) SSSSttttaaaatttteeee:::: New (Supercedes Patch 857.00 ) Corrects a security vulnerability in sendmail that might result in nonprivileged users gaining unauthorized access to files or privleged access. This potential vulnerability may be in the form of a local or remote security domain risk. NNNNuuuummmmbbbbeeeerrrr:::: Patch 876.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Revises collect(8) and pmgrd(8) reference pages SSSSttttaaaatttteeee:::: New Revises collect(8) and pmgrd(8) reference pages. See ___________________________________________________________________________ 1-110 Tru64 UNIX Patches TruCluster Server Patches 2 This chapter provides information about the patches included in Patch Kit 2 for the TruCluster Server software. This chapter is organized as follows: +o Section 2.1 provides release notes that are specific to the TruCluster Server software patches in this kit. +o Section 2.2 provides brief descriptions of the TruCluster Server patches included in this kit. _2._1 _R_e_l_e_a_s_e _N_o_t_e_s This section provides release notes that are specific to the TruCluster Server software patches in this kit. _2._1._1 _R_e_q_u_i_r_e_d _S_t_o_r_a_g_e _S_p_a_c_e The following storage space is required to install the base and TruCluster Server components of this patch kit: +o Approximately 250 MB of temporary storage space is required to untar this patch kit (base and TruCluster). We recommend that this kit not be placed in the ////, ////uuuussssrrrr, or ////vvvvaaaarrrr file systems because doing so may unduly constrain the available storage space for the patching activity. +o Approximately 89.3 MB of storage space in ////vvvvaaaarrrr////aaaaddddmmmm////ppppaaaattttcccchhhh////bbbbaaaacccckkkkuuuupppp may be required for archived original files if you choose to install and revert all patches. See the _P_a_t_c_h _K_i_t _I_n_s_t_a_l_l_a_t_i_o_n _I_n_s_t_r_u_c_t_i_o_n_s for more information. +o Approximately 90.7 MB of storage space in ////vvvvaaaarrrr////aaaaddddmmmm////ppppaaaattttcccchhhh may be required for original files if you choose to install and revert all patches. See the _P_a_t_c_h _K_i_t _I_n_s_t_a_l_l_a_t_i_o_n _I_n_s_t_r_u_c_t_i_o_n_s for more information. +o Approximately 1224 KB of storage space is required in ////vvvvaaaarrrr////aaaaddddmmmm////ppppaaaattttcccchhhh////ddddoooocccc for patch abstract and README documentation. +o Approximately 176 KB of storage space is needed in ////uuuussssrrrr////ssssbbbbiiiinnnn////dddduuuuppppaaaattttcccchhhh for the patch management utility. See Section 1.1.1 for information on space needed for the operating system patches. _2._1._2 _A_l_p_h_a_S_e_r_v_e_r _E_S_4_7 _o_r _A_l_p_h_a_S_e_r_v_e_r _G_S_1_2_8_0 _H_a_n_g_s _W_h_e_n _A_d_d_e_d _t_o _C_l_u_s_t_e_r If after running cccclllluuuu____aaaadddddddd____mmmmeeeemmmmbbbbeeeerrrr to add an AlphaServer ES47 or AlphaServer GS1280 as a member of a TruCluster the AlphaServer hangs during its first boot, try rebooting it with the original V5.1B generic cluster kernel, cccclllluuuu____ggggeeeennnnvvvvmmmmuuuunnnniiiixxxx. Use the following instructions to extract and copy the V5.1B cluster ggggeeeennnnvvvvmmmmuuuunnnniiiixxxx from your original Tru64 UNIX kit to your AlphaServer ES47 or AlphaServer GS1280 system. In these instructions, the AlphaServer ES47 or AlphaServer GS1280 is designated as member 5. Substitute the appropriate member number for your cluster. 1. Insert the Tru64 UNIX Associated Products Disk 2 into the CD-ROM drive of an active member. 2. Mount the CD-ROM to ////mmmmnnnntttt. For example: # mmmmoooouuuunnnntttt ----rrrr ////ddddeeeevvvv////ddddiiiisssskkkk////ccccddddrrrroooommmm0000cccc ////mmmmnnnntttt 3. Mount the bootdisk of the AlphaServer ES47 or AlphaServer GS1280 on its specific mount point; for example: # mmmmoooouuuunnnntttt rrrrooooooootttt5555____ddddoooommmmaaaaiiiinnnn####rrrrooooooootttt ////cccclllluuuusssstttteeeerrrr////mmmmeeeemmmmbbbbeeeerrrrssss////mmmmeeeemmmmbbbbeeeerrrr5555////bbbbooooooootttt____ppppaaaarrrrttttiiiittttiiiioooonnnn 4. Extract the original cccclllluuuu____ggggeeeennnnvvvvmmmmuuuunnnniiiixxxx from the CD-ROM and copy it to the bootdisk of the AlphaServer ES47 or AlphaServer GS1280 member. # zzzzccccaaaatttt <<<< TTTTCCCCRRRRBBBBAAAASSSSEEEE555544440000 |||| (((( ccccdddd ////cccclllluuuusssstttteeeerrrr////aaaaddddmmmmiiiinnnn////ttttmmmmpppp;;;; ttttaaaarrrr ----xxxxffff ---- ....////uuuussssrrrr////oooopppptttt////TTTTrrrruuuuCCCClllluuuusssstttteeeerrrr////cccclllluuuu____ggggeeeennnnvvvvmmmmuuuunnnniiiixxxx)))) # ccccpppp ////cccclllluuuusssstttteeeerrrr////aaaaddddmmmmiiiinnnn////ttttmmmmpppp////uuuussssrrrr////oooopppptttt////TTTTrrrruuuuCCCClllluuuusssstttteeeerrrr////cccclllluuuu____ggggeeeennnnvvvvmmmmuuuunnnniiiixxxx \\\\ ////cccclllluuuusssstttteeeerrrr////mmmmeeeemmmmbbbbeeeerrrrssss////mmmmeeeemmmmbbbbeeeerrrr????////bbbbooooooootttt____ppppaaaarrrrttttiiiittttiiiioooonnnn////ggggeeeennnnvvvvmmmmuuuunnnniiiixxxx # rrrrmmmm ////cccclllluuuusssstttteeeerrrr////aaaaddddmmmmiiiinnnn////ttttmmmmpppp////uuuussssrrrr////oooopppptttt////TTTTrrrruuuuCCCClllluuuusssstttteeeerrrr////cccclllluuuu____ggggeeeennnnvvvvmmmmuuuunnnniiiixxxx 5. Unmount the CD-ROM and the bootdisk: # uuuummmmoooouuuunnnntttt ////mmmmnnnntttt # uuuummmmoooouuuunnnntttt ////cccclllluuuusssstttteeeerrrr////mmmmeeeemmmmbbbbeeeerrrrssss////mmmmeeeemmmmbbbbeeeerrrr5555////bbbbooooooootttt____ppppaaaarrrrttttiiiittttiiiioooonnnn 6. Reboot the AlphaServer ES47 or AlphaServer GS1280. 2-2 TruCluster Server Patches _2._1._3 _N_o-_R_o_l_l _P_r_o_c_e_d_u_r_e _C_a_n_n_o_t _B_e _U_s_e_d _t_o _R_e_m_o_v_e _P_a_t_c_h _K_i_t To remove Patch Kit 2, you must run the ////eeeettttcccc////ddddnnnn____ffffiiiixxxx____ddddaaaatttt....sssshhhh script after rebuilding the kernel and before rebooting the system. If the script is not executed before rebooting, the system will fail to boot. Because the no-roll procedure automatically reboots the system after deleting the patches, you would not be able to run the script as required. Therefore, the no-roll procedure cannot be used to remove the patch kit. The workaround is to use the rolling upgrade procedure to remove the patch kit. See Section 1.1.3 for more information. _2._1._4 _U_p_d_a_t_e_s _f_o_r _R_o_l_l_i_n_g _U_p_g_r_a_d_e _P_r_o_c_e_d_u_r_e_s The following sections provide information on rolling upgrade procedures. _2._1._4._1 _N_o_n_c_r_i_t_i_c_a_l _E_r_r_o_r_s During a rolling upgrade to installing Patch Kit 2, you may encounter the following noncritical situations: +o The tagged file for iiiiffffaaaacccccccceeeessssssss....ccccoooonnnnffff (....OOOOlllldddd........iiiiffffaaaacccccccceeeessssssss....ccccoooonnnnffff) may disappear. This error will not cause any problems with the rolling upgrade procedure or the installation of the kit. A message would alert you to this condition if you use the cccclllluuuu____uuuuppppggggrrrraaaaddddeeee uuuunnnnddddoooo command. Running the cccclllluuuu____uuuuppppggggrrrraaaaddddeeee ----vvvv cccchhhheeeecccckkkk sssseeeettttuuuupppp at the start of the procedure will fix this error. +o When the world-wide language subset is installed, the file wwwwwwwwiiiinnnnssssttttaaaallllllll will attempt to be tagged, and will fail. This error will not affect the operational status of the cluster. _2._1._4._2 _P_r_o_c_e_d_u_r_e _f_o_r _S_i_m_u_l_t_a_n_e_o_u_s _U_p_g_r_a_d_e_s When doing a simultaneous rolling upgrade of NHD6 and the Version 5.1B Patch Kit 2, you must install the NHD6 kit first. If this is not done, you may get a number of installation errors, although you can safely ignore them. _2._1._4._3 _U_n_r_e_c_o_v_e_r_a_b_l_e _F_a_i_l_u_r_e _P_r_o_c_e_d_u_r_e The procedure to follow if you encounter unrecoverable failures while running dddduuuuppppaaaattttcccchhhh during a rolling upgrade has changed. The new procedure calls for you to run the cccclllluuuu____uuuuppppggggrrrraaaaddddeeee ----uuuunnnnddddoooo iiiinnnnssssttttaaaallllllll command and then set the system baseline. The procedure is explained in the _P_a_t_c_h _K_i_t _I_n_s_t_a_l_l_a_t_i_o_n _I_n_s_t_r_u_c_t_i_o_n_s as notes in Section 5.3 and Section 5.6. TruCluster Server Patches 2-3 _2._1._4._4 _D_u_r_i_n_g _R_o_l_l_i_n_g _P_a_t_c_h, _D_o _N_o_t _A_d_d _o_r _D_e_l_e_t_e _O_S_F, _T_C_R, _I_O_S, _o_r _O_S_H _S_u_b_s_e_t_s During a rolling upgrade, do not use the ////uuuussssrrrr////ssssbbbbiiiinnnn////sssseeeettttlllldddd command to add or delete any of the following subsets: +o Base Operating System subsets (those with the prefix OOOOSSSSFFFF). +o TruCluster Server subsets (those with the prefix TTTTCCCCRRRR). +o Worldwide Language Support (WLS) subsets (those with the prefix IIIIOOOOSSSS). +o New Hardware Delivery (NHD) subsets (those with the prefix OOOOSSSSHHHH). Adding or deleting these subsets during a roll creates inconsistencies in the tagged files. _2._1._4._4._0 *** _U_N_T_I_T_L_E_D *** - If you need to undo the install stage, because the lead member is in an unrecoverable state, be sure to undo the stages in the correct order. During the install stage, cccclllluuuu____uuuuppppggggrrrraaaaddddeeee cannot tell whether the roll is going forward or backward. This ambiguity incorrectly allows the cccclllluuuu____uuuuppppggggrrrraaaaddddeeee uuuunnnnddddoooo pppprrrreeeeiiiinnnnssssttttaaaallllllll stage to be run before cccclllluuuu____uuuuppppggggrrrraaaaddddeeee uuuunnnnddddoooo iiiinnnnssssttttaaaallllllll. Refer to the _P_a_t_c_h _K_i_t _I_n_s_t_a_l_l_a_t_i_o_n _I_n_s_t_r_u_c_t_i_o_n_s for additional information on undoing a rolling patch. _2._1._4._4._1 _I_g_n_o_r_e _M_e_s_s_a_g_e _A_b_o_u_t _M_i_s_s_i_n_g _l_a_d_e_b_u_g._c_a_t _F_i_l_e _D_u_r_i_n_g _R_o_l_l_i_n_g _U_p_g_r_a_d_e - When installing the patch kit during a rolling upgrade, you may see the following error and warning messages. You can ignore these messages and continue with the rolling upgrade. Creating tagged files. \&............................................................................... \&..... *** Error *** The tar commands used to create tagged files in the '/usr' file system have reported the following errors and warnings: tar: lib/nls/msg/en_US.88591/ladebug.cat : No such file or directory \&......................................................... *** Warning *** The above errors were detected during the cluster upgrade. If you believe that the errors are not critical to system operation, you can choose to continue. If you are unsure, you should check the cluster upgrade log and refer to clu_upgrade(8) before continuing with the upgrade. 2-4 TruCluster Server Patches _2._1._4._5 _c_l_u__u_p_g_r_a_d_e _u_n_d_o _o_f _I_n_s_t_a_l_l _S_t_a_g_e _C_a_n _R_e_s_u_l_t _i_n _I_n_c_o_r_r_e_c_t _F_i_l_e _P_e_r_m_i_s_s_i_o_n_s This note applies only when both of the following are true: +o You are using iiiinnnnssssttttaaaalllllllluuuuppppddddaaaatttteeee, dddduuuuppppaaaattttcccchhhh, or nnnnhhhhdddd____iiiinnnnssssttttaaaallllllll to perform a rolling upgrade. +o You need to undo the iiiinnnnssssttttaaaallllllll stage; that is, to use the cccclllluuuu____uuuuppppggggrrrraaaaddddeeee uuuunnnnddddoooo iiiinnnnssssttttaaaallllllll command. In this situation, incorrect file permissions can be set for files on the lead member. This can result in the failure of rrrrsssshhhh, rrrrllllooooggggiiiinnnn, and other commands that assume user IDs or identities by means of sssseeeettttuuuuiiiidddd. The cccclllluuuu____uuuuppppggggrrrraaaaddddeeee uuuunnnnddddoooo iiiinnnnssssttttaaaallllllll command must be run from a nonlead member that has access to the lead member's boot disk. After the command completes, follow these steps: 1. Boot the lead member to single-user mode. 2. Run the following script: #!/usr/bin/ksh -p # # Script for restoring installed permissions # cd / for i in /usr/.smdb./$(OSF|TCR|IOS|OSH)*.sts do grep -q "_INSTALLED" $i 2>/dev/null && /usr/lbin/fverify -y <"${i%.sts}.inv" done 3. Rerun iiiinnnnssssttttaaaalllllllluuuuppppddddaaaatttteeee, dddduuuuppppaaaattttcccchhhh, or nnnnhhhhdddd____iiiinnnnssssttttaaaallllllll, whichever is appropriate, and complete the rolling upgrade. For information about rolling upgrades, see Chapter 7 of the _C_l_u_s_t_e_r _I_n_s_t_a_l_l_a_t_i_o_n manual, iiiinnnnssssttttaaaalllllllluuuuppppddddaaaatttteeee(8), and cccclllluuuu____uuuuppppggggrrrraaaaddddeeee(8). _2._1._4._6 _M_i_s_s_i_n_g _E_n_t_r_y _M_e_s_s_a_g_e_s _C_a_n _B_e _I_g_n_o_r_e_d _D_u_r_i_n_g _R_o_l_l_i_n_g _P_a_t_c_h During the sssseeeettttuuuupppp stage of a rolling patch, you might see a message like the following: Creating tagged files. \&............................................................................ clubase: Entry not found in /cluster/admin/tmp/stanza.stdin.597530 TruCluster Server Patches 2-5 clubase: Entry not found in /cluster/admin/tmp/stanza.stdin.597568 An EEEEnnnnttttrrrryyyy nnnnooootttt ffffoooouuuunnnndddd message will appear once for each member in the cluster. The number in the message corresponds to a PID. You can safely ignore this EEEEnnnnttttrrrryyyy nnnnooootttt ffffoooouuuunnnndddd message. _2._1._4._7 _R_e_l_o_c_a_t_i_n_g _A_u_t_o_F_S _D_u_r_i_n_g _a _R_o_l_l_i_n_g _U_p_g_r_a_d_e _o_n _a _C_l_u_s_t_e_r This note applies only to performing rolling upgrades on cluster systems that use AutoFS. During a cluster rolling upgrade, each cluster member is singly halted and rebooted several times. The _P_a_t_c_h _K_i_t _I_n_s_t_a_l_l_a_t_i_o_n _I_n_s_t_r_u_c_t_i_o_n_s direct you to manually relocate applications under the control of Cluster Application Availability (CAA) prior to halting a member on which CAA applications run. Depending on the amount of NFS traffic, the manual relocation of AutoFS may sometimes fail. Failure is most likely to occur when NFS traffic is heavy. The following procedure avoids that problem. At the start of the rolling upgrade procedure, use the ccccaaaaaaaa____ssssttttaaaatttt command to learn which member is running AutoFS. For example: # ccccaaaaaaaa____ssssttttaaaatttt ----tttt Name Type Target State Host ------------------------------------------------------------ autofs application ONLINE ONLINE rye cluster_lockd application ONLINE ONLINE rye clustercron application ONLINE ONLINE swiss dhcp application ONLINE ONLINE swiss named application ONLINE ONLINE rye To minimize your effort in the following procedure, perform the roll stage last on the member where AutoFS runs. When it is time to perform a manual relocation on a member where AutoFS is running, follow these steps: 1. Stop AutoFS by entering the following command on the member where AutoFS runs: # ////uuuussssrrrr////ssssbbbbiiiinnnn////ccccaaaaaaaa____ssssttttoooopppp ----ffff aaaauuuuttttooooffffssss 2. Perform the manual relocation of other applications running on that member: # ////uuuussssrrrr////ssssbbbbiiiinnnn////ccccaaaaaaaa____rrrreeeellllooooccccaaaatttteeee ----ssss _c_u_r_r_e_n_t__m_e_m_b_e_r -c _t_a_r_g_e_t__m_e_m_b_e_r 2-6 TruCluster Server Patches After the member that had been running AutoFS has been halted as part of the rolling upgrade procedure, restart AutoFS on a member that is still up. (If this is the roll stage and the halted member is not the last member to be rolled, you can minimize your effort by restarting AutoFS on the member you plan to roll last.) 1. On a member that is up, enter the following command to restart AutoFS. (The member where AutoFS is to run, _t_a_r_g_e_t__m_e_m_b_e_r, must be up and running in multi-user mode.) # ////uuuussssrrrr////ssssbbbbiiiinnnn////ccccaaaaaaaa____ssssttttaaaarrrrttttaaaauuuuttttooooffffssss ----cccc _t_a_r_g_e_t__m_e_m_b_e_r 2. Continue with the rolling upgrade procedure. _2._1._5 _A_d_d_i_t_i_o_n_a_l _S_t_e_p_s _R_e_q_u_i_r_e_d _W_h_e_n _I_n_s_t_a_l_l_i_n_g _P_a_t_c_h_e_s _B_e_f_o_r_e _C_l_u_s_t_e_r _C_r_e_a_t_i_o_n This note applies only if you install a patch kit before creating a cluster; that is, if you do the following: 1. Install the Tru64 UNIX base kit. 2. Install the TruCluster Server kit. 3. Install the Version 5.1B patch kit before running the cccclllluuuu____ccccrrrreeeeaaaatttteeee command. In this situation, you must then perform three additional steps: 1. Run vvvveeeerrrrsssswwww, the version switch command, to set the new version identifier: # ////uuuussssrrrr////ssssbbbbiiiinnnn////vvvveeeerrrrsssswwww ----sssseeeettttnnnneeeewwww 2. Run vvvveeeerrrrsssswwww to switch to the new version: # ////uuuussssrrrr////ssssbbbbiiiinnnn////vvvveeeerrrrsssswwww ----sssswwwwiiiittttcccchhhh 3. Run the cccclllluuuu____ccccrrrreeeeaaaatttteeee command to create your cluster: # ////uuuussssrrrr////ssssbbbbiiiinnnn////cccclllluuuu____ccccrrrreeeeaaaatttteeee TruCluster Server Patches 2-7 _2._1._6 _W_h_e_n _T_a_k_i_n_g _a _C_l_u_s_t_e_r _M_e_m_b_e_r _t_o _S_i_n_g_l_e-_U_s_e_r _M_o_d_e, _F_i_r_s_t _H_a_l_t _t_h_e _M_e_m_b_e_r To take a cluster member from multiuser mode to single-user mode, first halt the member and then boot it to single-user mode. For example: # sssshhhhuuuuttttddddoooowwwwnnnn ----hhhh nnnnoooowwww >>> bbbbooooooootttt ----ffffllll ssss Halting and booting the system ensures that it provides the minimal set of services to the cluster and that the running cluster has a minimal reliance on the member running in single-user mode. When the system reaches single-user mode, run the following commands: # ////ssssbbbbiiiinnnn////iiiinnnniiiitttt ssss # ////ssssbbbbiiiinnnn////bbbbcccchhhheeeecccckkkkrrrrcccc # ////uuuussssrrrr////ssssbbbbiiiinnnn////llllmmmmffff rrrreeeesssseeeetttt _2._1._7 _P_r_o_b_l_e_m_s _w_i_t_h _c_l_u__u_p_g_r_a_d_e _s_w_i_t_c_h _S_t_a_g_e If the cccclllluuuu____uuuuppppggggrrrraaaaddddeeee sssswwwwiiiittttcccchhhh stage does not complete successfully, you may see a message like the following: versw: No switch due to inconsistent versions The problem can be due to one or more members running ggggeeeennnnvvvvmmmmuuuunnnniiiixxxx, a generic kernel. Use the command cccclllluuuu____ggggeeeetttt____iiiinnnnffffoooo ----ffffuuuullllllll and note each member's version number, as reported in the line beginning Member base O/S version If a member has a version number different from that of the other members, shut down the member and reboot it from vvvvmmmmuuuunnnniiiixxxx, the custom kernel. If multiple members have the different version numbers, reboot them one at a time from vvvvmmmmuuuunnnniiiixxxx. _2._2 _S_u_m_m_a_r_y _o_f _T_r_u_C_l_u_s_t_e_r _S_o_f_t_w_a_r_e _P_a_t_c_h_e_s This section provides brief descriptions of the patches in Patch Kit 1 for the software products. This section provides descriptions of the patches in Patch Kit 2 for the TruCluster Server software products. Because Tru64 UNIX patch kits are cumulative, each patch lists its state according to the following criteria: +o New Indicates a patch that is new for this release. 2-8 TruCluster Server Patches +o New (Supersedes Patches ...) Indicates a patch that is new to the kit but was combined (merged) with one or more patches during the creation of earlier versions of this kit, before it was publicly released. +o Existing (Kit 1) Indicates a patch that was new in the previous Version 5.1B patch kit. +o Supersedes Patches ... Indicates a patch that was combined (merged) with other patches. ___________________________________________________________________________ NNNNuuuummmmbbbbeeeerrrr:::: Patch 2.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Fix for aliasd daemon SSSSttttaaaatttteeee:::: Existing (Kit 1) Modifies the aliasd daemon to include interface aliases when determining whether or not an interface is appropriate for use as the ARP address for a cluster alias when selecting the proxy ARP master. NNNNuuuummmmbbbbeeeerrrr:::: Patch 7.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Fixes an issue with ICS on NUMA-based systems SSSSttttaaaatttteeee:::: Existing (Kit 1) Fixes an issue with ICS (Internode Communication Services) on a NUMA-based system in a cluster. NNNNuuuummmmbbbbeeeerrrr:::: Patch 14.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Cluster specific fix for mounting cluster root domain SSSSttttaaaatttteeee:::: Existing (Kit 1) This patch enables a cluster to boot even if the cluster root domain devices are private to different cluster members. Although this is not a recommended configuration, it should not result in an unbootable cluster. Currently, this is with respect to cluster root domains not under LSM control. TruCluster Server Patches 2-9 NNNNuuuummmmbbbbeeeerrrr:::: Patch 19.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Fix for Oracle startup failure SSSSttttaaaatttteeee:::: Existing (Kit 1) Fixes a problem in one of the shipped rc scripts whereby Oracle fails during startup on a clustered system. NNNNuuuummmmbbbbeeeerrrr:::: Patch 26.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Problems with LSM disks and cluster quorum tool SSSSttttaaaatttteeee:::: Existing (Kit 1) Corrects problems with LSM disks and the cluster quorum tools. When a member having LSM disks local to it is down, the quorum tools fail to update quorum. This causes other cluster commands to fail. NNNNuuuummmmbbbbeeeerrrr:::: Patch 35.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Fix for cluster alias manager SUITlet SSSSttttaaaatttteeee:::: Existing (Kit 1) Fixes a problem that causes the cluster alias manager SUITlet to falsely interpret any cluster alias with virtual={t|f} configured as a virtual alias regardless of its actual setting. 2-10 TruCluster Server Patches NNNNuuuummmmbbbbeeeerrrr:::: Patch 39.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Reliable DataGram kernel thread problem SSSSttttaaaatttteeee:::: Existing (Kit 1) Fixes a problem in which an RDG (Reliable DataGram) kernel thread can starve other timeshare threads on a uniprocessor cluster member. In particular, system services such as networking threads can be affected. NNNNuuuummmmbbbbeeeerrrr:::: Patch 52.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Patch: Fix for RM_AUDIT_ACK_BLOCK SSSSttttaaaatttteeee:::: Supersedes Patches 3.00, 5.00 Fixes a regression for single physical rail Memory Channel configurations, and cleans up stale data left on an offline physical rail by the Memory Channel driver. Fixes issues associated with the initialization of the Memory Channel driver. Corrects a problem in a Memory Channel cluster where rebooting a node without performing a hardware reset can crash other members with a RM_AUDIT_ACK_BLOCK panic. NNNNuuuummmmbbbbeeeerrrr:::: Patch 63.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Cluster member panics with Kernel Memory Fault SSSSttttaaaatttteeee:::: Supersedes Patches 15.00, 17.00 Fixes a problem in which cluster alias connections are not distributed among cluster members according to the defined selection weight. Fixes a memory leak in the cluster alias subsystem. Corrects a problem that occurs when running nmap or nessus targetted at the cluster alias, where the cluster member panics with Kernel Memory Fault. TruCluster Server Patches 2-11 NNNNuuuummmmbbbbeeeerrrr:::: Patch 65.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Resolves problem with caa_register command SSSSttttaaaatttteeee:::: New Resolves a problem in which the caa_register command allowed a CAA resource to be registered even when its profile contained an unknown attribute. This fix prevents the caa_register command from registering a resource with an unknown attribute and will cause it to return an error message which includes the unknown attribute information. NNNNuuuummmmbbbbeeeerrrr:::: Patch 67.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Fixes a cfsd core dumping problem SSSSttttaaaatttteeee:::: Supersedes Patch 48.00 Fixes a problem with cfsd core dumping shortly after startup if it is enabled or shortly after enabling it. The problem fixed by this patch is only seen after applying a recent dsfmgr patch. Corrects a problem in which cfsd will terminate prematurely and core dump when a node leaves the cluster very shortly after joining the cluster. NNNNuuuummmmbbbbeeeerrrr:::: Patch 69.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Fixes cluster interconnect SSSSttttaaaatttteeee:::: Supersedes Patches 20.00, 22.00 Corrects a problem involving discarded UDP datagrams that do not come from the correct port. Corrects a problem in which a panic displaying the message "error CNX MGR: cnx_comm_error: invalid node state" occurs on a LAN cluster running under load when other members are rebooting. Fixes a coding error, a memory leak, and a deinitialization problem in the cluster interconnect networking layer. 2-12 TruCluster Server Patches NNNNuuuummmmbbbbeeeerrrr:::: Patch 72.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Fixes race condition in Device Request Dispatcher SSSSttttaaaatttteeee:::: Supersedes Patches 27.00, 28.00, 29.00, 31.00, 50.00, 70.00 Fixes a regression associated with non-SCSI storage. Improves the responsiveness of EINPROGRESS handling during the issuing of I/O barriers by removing a possible infinite loop scenario that could occur due to the deletion of a storage device. Fixes a problem that causes a panic with the message "CNX MGR: Invalid configuration for cluster seq disk" during simultaneous booting of cluster nodes. Fixes a possible race condition between a SCSI reservation conflict and an I/O drain, which could result in a hang. Alleviates a condition in which a cluster member takes an extremely long time to boot when using LSM. Fixes a problem in the cluster kernel where a cluster member panics while doing remote I/O over the interconnect. Corrects an issue to allow the Device Request Dispatcher, DRD, to retry to get disk attributes when EINPROGRESS is returned from the disk driver. Fixes an problem where access to the quorum disk can be lost if the quorum disk is on a parallel SCSI bus and multiple bus resets are encountered. Fixes several problems in the Device Request Dispatcher, including a race condition. NNNNuuuummmmbbbbeeeerrrr:::: Patch 74.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Fix for caa_report SSSSttttaaaatttteeee:::: New Fixes a condition in which uptimes greater than 100 percent are reported for resources by caa_report. Fixes a problem in which resources that never started have an ending timestamp. TruCluster Server Patches 2-13 NNNNuuuummmmbbbbeeeerrrr:::: Patch 81.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Security (SSRT2265) SSSSttttaaaatttteeee:::: Supersedes Patch 37.00 Fixes a security vulnerability in the cluster interconnect security configuration that may result in a denial of service on systems running TruCluster Server software. Provides enhancements to the clu_upgrade command. 2-14 TruCluster Server Patches NNNNuuuummmmbbbbeeeerrrr:::: Patch 85.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Fixes a panic that may occur during an unmount SSSSttttaaaatttteeee:::: Supersedes Patches 8.00, 9.00, 10.00, 12.00, 41.00, 44.00, 46.00, 53.00, 54.00, 55.00, 56.00, 57.00, 58.00, 59.00, 61.00, 83.00 Fixes a problem that causes a hang to occur when multiple nodes are shutting down simultaneously. Fixes a problem that causes a Cluster File System panic when using raw Asynchronous I/O. Adds code to assist in problem diagnosis. Relieves pressure on the CMS global DLM lock by allowing AutoFS auto- unmounts to back off. Updates the attributes on a directory when files are removed by a cluster node that is not the file system server. Fixes a problem of excessive FIDS_LOCK contention that occurs when large number of files are using system-based file locking. Fixes a cluster deadlock that may occur during failover and recovery when direct I/O is in use. Corrects diagnostic code that might result in a panic during kernel boot. Prevents a panic when an AutoFS file system is auto-unmounted. Enhances cluster file system performance when using file locks to coordinate file access. Corrects several problems with various installation commands and utilities. Fixes a memory leak in the clu_get_info interface. Displays the correct error message for freezefs -q on a non-AdvFS file system. Eliminates a performance problem when a node, acting as CFS server of an NFS client file system, is write-appending to an external NFS server. Fixes a timing window during asynchronous reads on a CFS client. Fixes cfsmgr to properly return a failure status when a relocation request has failed. Fixes a race condition where stale name cache entries allow file access after file unlink. TruCluster Server Patches 2-15 Fixes a panic that may occur during an unmount. Fixes an internal problem in the kernel's AdvFS, UFS, and NFS file systems where extended attributes with extremely long names, greater than 247 characters, could not be set on files. The new limit is 254 + a Null string terminator. Corrects a problem where a CFS lookup for a mount could leave stale state behind that could adversely affect subsequent NFS operations. NNNNuuuummmmbbbbeeeerrrr:::: Patch 87.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Fixes a panic that occurs on a booting node SSSSttttaaaatttteeee:::: Supersedes Patches 24.00, 43.00, 75.00, 77.00 Addresses an assertion caused by a bad user pointer passed to the kernel via sys_call. Corrects a condition that causes a node to hang during testing the of Memory Channel cable pulls. A cluster member sometimes hangs when a Memory Channel cable is pulled, the node is taken down, the cable is plugged back in, and the node is rebooted. Increases performance by reducing the lock miss rate in the ics_mct_llnode_info_lock. Addresses a panic that occurs on a booting node. Addresses a panic that may occur when a node is joining the cluster. A node recognizing the joining node panics while it is trying to establish a preboot channel connection with the peer node, causing the folling message to be displayed on the console or in /var/adm/messages: panic (cpu x): ics_mct: rx conn 3 2-16 TruCluster Server Patches NNNNuuuummmmbbbbeeeerrrr:::: Patch 89.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Fix for CAA core dumping problem SSSSttttaaaatttteeee:::: Supersedes Patch 33.00, 79.00 Addresses an error "caa_register -u" produces with no balance data. Corrects a problem with resource inaccessibility if the hosting member crashes during a remote caa_stop operation. Fixes a problem in which CAA dumps core when trying to deal with cluster member ID 63. Fixes a problem in which CAAD might dump core due to a race condition when multiple events to which it subscribes arrive simultaneously. ___________________________________________________________________________ TruCluster Server Patches 2-17