Patch IDs |
Abstract |
Patch 65.00
OSF520-046
|
Patch:
Fix for Compaq C compiler and Compaq driver
State:
Existing
This patch fixes the following problems
in the Compaq C compiler and Compiler driver:
A compiler problem that caused a run-time failure in specific
code that involved floating point arguments and varargs.
A problem in the driver that failed to produce an object file
for a command such as "file.s -o file.o".
A problem in the driver that would not allow a command line
that contained only the -l<arg>
library and no source or object files.
A problem in the driver that failed to produce an object file
when no output file was specified on the command line.
|
Patch 69.00
OSF520-040
|
Patch:
Security (SSRT0743U, SSRT0743U)
State:
Existing
A potential security vulnerability has been
discovered where, under certain circumstances, system integrity may be compromised.
This may be in the form of improper file or privilege management.
We have
corrected this potential vulnerability. |
Patch 71.00
OSF520CDE-001A
|
Patch:
Security (SSRT1-80U)
State:
Existing
A potential security vulnerability has been discovered
where, under certain circumstances, system integrity may be compromised.
This
may be in the form of improper file or privilege management.
We have corrected
this potential vulnerability. |
Patch 73.00
OSF520CDE-001B
|
Patch:
Security (SSRT1-80U)
State:
Existing
A potential security vulnerability has been discovered
where, under certain circumstances, system integrity may be compromised.
This
may be in the form of improper file or privilege management.
We have corrected
this potential vulnerability. |
Patch 78.00
OSF520X11-007
|
Patch:
Fix for X server hang
State:
Supersedes patch OSF520X11-006 (76.00)
This patch corrects the
following:
Fixes a problem that will cause the X server to hang on rare
occasions.
Except for the mouse, everything on the desktop appears frozen.
Output from the ps command will show the X server using greater than 99%
of the CPU time.
Fixes a problem that can cause CDE pop-up menus to appear
on the wrong screen when you are running a multihead system with the PanoramiX
extension enabled.
|
Patch 84.00
OSF520-143
|
Patch:
Fix for cluster interconnect interface problem
State:
Existing
This patch fixes a problem where shutdown
of the network would also shut down the cluster interconnect interface in
a LAN cluster. |
Patch 86.00
OSF520-054
|
Patch:
Fix for Korn shell hang
State:
Existing
This patch fixes a problem where the Korn shell (ksh)
could hang if you pasted a large number of commands to it when it was running
in a terminal emulator window (such as an xterm). |
Patch 88.00
OSF520-022
|
Patch:
Fixes problem with disklabel command
State:
Existing
This patch fixes a problem with the
disklabel command.
Disklabel was displaying large unsigned values as negative
numbers. |
Patch 92.00
OSF520-023B
|
Patch:
Security (SSRT1-40U, SSRT1-41U, SSRT1-42U, SSRT1-45U)
State:
Existing
A potential security
vulnerability has been discovered where, under certain circumstances, users
can clobber temporary files created by shell commands and utilities (for example,
under /sbin, /usr/sbin, /usr/bin, and /etc).
We have corrected this potential
vulnerability. |
Patch 97.00
OSF520-001
|
Patch:
Fix for vi editor core dump problem
State:
Existing
This patch fixes a problem where the vi editor
core dumps when it finds invalid syntax during a substitute operation. |
Patch 106.00
OSF520-026
|
Patch:
Fix for sort command
State:
Existing
This patch corrects the behavior of the sort(1) command,
which now checks for duplicates with -c, -u, and -k options. |
Patch 108.00
OSF520-015
|
Patch:
Fixes a potential race deadlock
State:
Existing
This patch fixes a potential race deadlock
between vclean/ufs_reclaim and quotaon/quotaoff when quota is enabled. |
Patch 117.00
OSF520-038
|
Patch:
Fix for evmget command
State:
Existing
This patch fixes a situation in which the evmget command
and the event log nightly cleanup operation may fail with an "arg list too
long" message. |
Patch 123.00
OSF520-056
|
Patch:
Corrects a memory leak in the XTI socket code
State:
Existing
This patch corrects a memory leak in
the XTI socket code. |
Patch 136.00
OSF520-010A
|
Patch:
Fix for incorrect POSIX 4 message queues behavior
State:
Existing
POSIX 4 message queue behavior was
not following the standard and was returning unique message descriptors.
|
Patch 138.00
OSF520-010B
|
Patch:
Static librt library fix for POSIX 4 message queues
State:
Existing
POSIX 4 message queue
behavior was not following the standard and returning unique message descriptors.
|
Patch 141.00
OSF520X11-005A
|
Patch:
Security (SSRT0638U)
State:
Supersedes patch OSF520X11-004A (139.00)
This patch corrects
the following:
Allows the dxsetacl utility to delete access ACLs.
A potential security vulnerability has been discovered where,
under certain circumstances, system integrity may be compromised.
This may
be in the form of root directory compromise via lpr using X11.
|
Patch 143.00
OSF520X11-004B
|
Patch:
Allows dxsetacl utility to delete access ACLs
State:
Existing
This patch allows the dxsetacl utility
to delete access ACLs. |
Patch 145.00
OSF520X11-005B
|
Patch:
Security (SSRT0638U)
State:
Existing
A potential security vulnerability has been discovered
where, under certain circumstances, system integrity may be compromised.
This may be in the form of root directory compromise via lpr using X11. |
Patch 154.00
OSF520-061
|
Patch:
Security (SSRT0682U)
State:
Existing
A potential security vulnerability has been discovered
where, under certain circumstances, system integrity may be compromised.
This
may be in the form of improper file or privilege management.
We have corrected
this potential vulnerability. |
Patch 156.00
OSF520DX-004
|
Patch:
Fixes problems which prevented ENVMONd from starting
State:
Existing
This patch fixes problems
which prevented ENVMONd from starting |
Patch 158.00
OSF520-042
|
Patch:
Fix for Spike postlink optimizer
State:
Existing
This patch fixes a problem where Spike may
fail to delete the low instruction of a pair of related instructions, causing
it to abort with a run-time error. |
Patch 160.00
OSF520-008
|
Patch:
Fix for cp command
State:
Existing
This patch fixes a problem in which cp(1) and cat(1) produce
different file sizes when reading from a tape device.
The solution changes
the I/O buffer size of the cp command from 64 K to 8 K.
|
Patch 169.00
OSF520-048
|
Patch:
Fixes a problem in latsetup
State:
Existing
This patch fixes a problem in latsetup when the directory
/dev/lat is not found. |
Patch 171.00
OSF520DX-001
|
Patch:
Fixes a problem in diskconfig
State:
Existing
This fixes a problem in diskconfig where
partitions with an offset and size of zero cannot be selected.
It also fixes
a problem where overlapping partitions cannot be adjusted if the existing
partitions are not in alphabetical order.
|
Patch 173.00
OSF520-076
|
Patch:
Fix for ELSA Gloria Synergy, PS4D10, JIB graphic card
State:
Existing
This patch fixes a problem
where, on the ELSA Gloria Synergy, PS4D10, and JIB graphic cards, the cursor
position is not being updated properly.
The placement of the cursor is one
request behind. |
Patch 185.00
OSF520-043
|
Patch:
Corrects a problem in the rdist utility
State:
Existing
This patch corrects a problem in the
rdist utility which was causing segmentation faults on files with
more than one link. |
Patch 187.00
OSF520-019
|
Patch:
Fixes a volrecover error
State:
Existing
This patch fixes a volrecover error of "Cannot
refetch volume" when volumes exist only in a non-rootdg diskgroup. |
Patch 189.00
OSF520-053
|
Patch:
Fix for no rerouting problem on a CFS server
State:
Existing
This patch fixes a problem where pulling
the network cable on one node acting as a CFS server in a cluster causes no
rerouting to occur. |
Patch 193.00
OSF520-094
|
Patch:
Support for cleanPR script
State:
Existing
This patch supports the cleanPR script to clear Persistent
Reservations on HSV110 device, continues to go through all of devices even
if certain errors occur to one or some of devices, and prevent a potential
security hole from directly using /tmp directory. |
Patch 195.00
OSF520-058
|
Patch:
BPF default packet filter may cause system panic
State:
This patch corrects a problem which could result
in a system panic on close() if the BPF default packet filter is in use.
|
Patch 210.00
OSF520X11-002
|
Patch:
Fixes problems with X server X Image Extension (XIE)
State:
Existing
This patch fixes problems
with the X server X Image Extension (XIE). |
Patch 212.00
OSF520-050
|
Patch:
Fixes a problem of the ATM setup script failing
State:
Existing
This patch fixes a problem of the ATM
setup script failing when configuring an elan if the lane subsystem is not
loaded. |
Patch 220.00
OSF520-104
|
Patch:
Corrects a problem with the NIFF daemon
State:
Existing
This patch corrects a problem where
the NIFF daemon (niffd) would exit if its connection to the EVM daemon (evmd)
failed, as in the case of an EVM daemon restart. |
Patch 222.00
OSF520-025
|
Patch:
Fix for mv command
State:
Existing
This patch fixes a problem where the mv command will not perform
a move if the inode of the file is the same as the inode of the destination
directory, even though the file and directory are on different file systems.
|
Patch 224.00
OSF520-049
|
Patch:
joind may fail to clean up its lock files
State:
Existing
The patch fixes a problem where joind
may fail to clean up its lock files in /var/join. |
Patch 226.00
OSF520-114A
|
Patch:
Shared libots3 library fix
State:
Existing
This patch fixes the following problems in the /usr/lib/libots3.a
and /usr/shlib/libots3.so libraries:
|
Patch 228.00
OSF520-114B
|
Patch:
Static libots3 library fix
State:
Existing
This patch fixes the following problems in the /usr/lib/libots3.a
and /usr/shlib/libots3.so libraries:
|
Patch 234.00
OSF520-124
|
Patch:
Adds support for Persistent Reserve for HSV110
State:
Existing
This patch is an update to /sbin/scu,
the SCSI CAM Utility Program.
It adds support for Persistent Reserve for HSV110
as well as the display of 128-bit WWIDS.
|
Patch 238.00
OSF520DX-002
|
Patch:
Fix for dxsetacl utility
State:
Existing
This patch allows the dxsetacl utility to delete access
ACLs. |
Patch 245.00
OSF520-173B
|
Patch:
Fixes a problem in the strtod routine
State:
Existing
This patch corrects the following:
|
Patch 252.00
OSF520-154
|
Patch:
Adds Essential Services Monitor daemon (esmd)
State:
Supersedes patch OSF520-099 (75.00)
This patch
provides enablers for the Compaq Database Utility. |
Patch 259.00
OSF520-158
|
Patch:
Removes extraneous header comments
State:
Existing
This patch removes extraneous history edit
comments from exported DECthreads header files. |
Patch 269.00
OSF520-163
|
Patch:
Improves user control of clu_mibs
State:
Existing
The control of the start and stop of the
clu_mibs agent has been moved from /sbin/init.d/clu_max script to /sbin/init.d/snmpd
script. |
Patch 281.00
OSF520-211
|
Patch:
Fix for NHD kit installations
State:
Existing
During an install of an NHD kit, the version.id file
was not properly referenced, causing the install to fail. |
Patch 288.00
OSF520-187
|
Patch:
Fix for lpd parent daemon problems
State:
Existing
This patch corrects the following problems:
|
Patch 295.00
OSF520-169
|
Patch:
Fixes problem of failed open calls to KZPCCs
State:
Supersedes patch OSF520-195 (293.00)
This patch
corrects the following:
|
Patch 311.00
OSF520DX-012
|
Patch:
Quick Setup erroneously reports daemons do not start
State:
Existing
On some systems, notably
DS10, Quick Setup may erroneously report that some daemons did not start.
When you then try again, other error messages appear that report duplicate
host names. |
Patch 315.00
OSF520-220B
|
Patch:
Support for Enterprise Volume Manager
State:
Supersedes patches OSF520-069C (201.00), OSF520-149B (265.00)
This patch provides enabler support for the Enterprise Volume
Manager. |
Patch 319.00
OSF520DX-011
|
Patch:
Security (SSRT1-40U, SSRT1-41U, SSRT1-42U, SSRT1-45U)
State:
Existing
A potential security
vulnerability has been discovered where, under certain circumstances, system
integrity may be compromised.
This may be in the form of improper file access.
We have corrected this potential vulnerability.
|
Patch 327.00
OSF520-167
|
Patch:
Fixes C++ incompatibility
State:
Existing
This patch fixes C++ incompatibility in three files
in /usr/include/alpha/hal/ and one file in /usr/include/io/common/. |
Patch 414.00
OSF520-230A
|
Patch:
Fixes a problem in stdio.h
State:
Existing
This patch fixes a problem in <stdio.h>
where the
interface renaming conditionals for fgetpos() and fsetpos() were mismatched.
It also fixes a problem in <sys/timeb.h>
where the ftime() prototype was
not available in the default compilation name space.
|
Patch 416.00
OSF520-230B
|
Patch:
Fixes a problem in sys/timeb.h
State:
Existing
This patch fixes a problem in <stdio.h>
where the interface renaming conditionals for fgetpos() and fsetpos() were
mismatched.
It also fixes a problem in <sys/timeb.h>
where the ftime()
prototype was not available in the default compilation name space.
|
Patch 428.00
OSF520-276B
|
Patch:
Fix for evmwatch termination problem
State:
Supersedes patches OSF520-103B (164.00), OSF520-159B (257.00)
This patch corrects the following:
Resolves a memory leak and a filtering issue in the Event
Manager, and allows the evmwatch utility to reconnect automatically if evmd
fails and is restarted.
Fixes a problem in which binary error log (binlog) events
posted by the EMX FibreChannel driver and the system console are reported
incorrectly by the Event Manager, EVM.
Resolves an issue which can cause an Event Manager (EVM) client
or the EVM daemon to core dump under rare circumstances.
|
Patch 438.00
OSF520DX-016
|
Patch:
Fix for dxproctuner utility
State:
Existing
This patch fixes a problem in dxproctuner where the
process information is not displayed when there is a double quote followed
by any other character in the command column. |
Patch 441.00
OSF520X11-019
|
Patch:
Fix for XGetImage function
State:
Supersedes patches OSF520X11-009 (98.00), OSF520X11-003 (99.00), OSF520X11-001
(101.00), OSF520X11-014 (439.00)
This patch corrects the following:
Provides NHD4 enables for future hardware support of a graphics
device.
Fixes the Xserver problem where, when PanoramiX is enabled
and using CDE, icons from dtfile cannot be seen on other than the left screen
while being moved.
Fixes a problem with a Compaq Professional Workstation XP1000
667 MHz system with a PowerStorm 4D20 (PBXGB-CA) graphics card where fonts
were sometimes drawn incorrectly.
Fixes a problem where the X Window System XGetImage() function
returned erroneous data for displays with a depth greater than 8 when running
the PanoramiX extension.
|
Patch 446.00
OSF520DX-024B
|
Patch:
Security (SSRT1-40U, SSRT1-41U, SSRT1-42U, SSRT1-45U)
State:
Existing
A potential security
vulnerability has been discovered where, under certain circumstances, system
integrity may be compromised.
This may be in the form of improper file access.
We have corrected this potential vulnerability. |
Patch 453.00
OSF520CDE-010
|
Patch:
Fix for dtgreet application
State:
Existing
After installing DCE, enabling SIA would cause a core
dump and the greeter window never comes up. |
Patch 455.00
OSF520-295
|
Patch:
Fix for lsmsa product
State:
Existing
This patch addresses a problem in the display of disk
controller to disk hierarchy by the lsmsa product. |
Patch 457.00
OSF520X11-021A
|
Patch:
Fix for broken symbolic links in /usr/lib/X11
State:
Existing
This patch fixes a problem in Tru64
UNIX V5.1A where three symbolic links in /usr/lib/X11 pointed to nonexistent
directories.
|
Patch 459.00
OSF520X11-021B
|
Patch:
Symbolic links point to nonexistent directories
State:
Existing
This patch fixes a problem in Tru64
UNIX V5.1A where three symbolic links in /usr/lib/X11 pointed to nonexistent
directories. |
Patch 465.00
OSF520X11-010
|
Patch:
Fix for Elsa Gloria Comet card
State:
Existing
The Elsa Gloria Comet card does not correctly
draw nested shaded boxes or anything similar. |
Patch 467.00
OSF520X11-013
|
Patch:
Fix for accessx beeping functionality
State:
Existing
Beep does not occur when requested
when the toggle keys option is enabled via accessx. |
Patch 469.00
OSF520-170
|
Patch:
Fixes a problem in uucp
State:
Existing
This patch fixes a problem in uucp.
uucp between two
Tru64 UNIX boxes hangs when a uucp failure occurs. |
Patch 479.00
OSF520-223
|
Patch:
Fix for ACL access problems
State:
Existing
This patch corrects the following:
If multiple processes attempt to access the same file at the
same time and access to the file should be allowed by an ACL on the file,
access may be denied instead.
If the ACL on a file is corrupted the corrupted ACL is passed
into the kernel causing a variety of problems.
|
Patch 481.00
OSF520DX-022
|
Patch:
Security (SSRT1-40U, SSRT1-41U, SSRT1-42U, SSRT1-45U)
State:
Existing
A potential security
vulnerability has been discovered where, under certain circumstances, system
integrity may be compromised.
This may be in the form of improper file access.
We have corrected this potential vulnerability. |
Patch 485.00
OSF520X11-012
|
Patch:
Fix for C++ compile problem
State:
Existing
This patch fixes a C++ compile problem in /usr/include/X11/Xlib.h.
|
Patch 488.00
OSF520-222A
|
Patch:
Fix for class scheduler
State:
Supersedes patches OSF520-017A (181.00), OSF520-322 (486.00)
This patch corrects the following:
Fixes a class scheduler semaphore race condition.
Causes the class scheduler to handle rogue programs, changing
the class scheduler database semaphore state.
The class scheduler depends on semaphores to protect its database
from simultaneous updates.
This patch automatically detects if the semaphore
no longer exists and allocates a new one, allowing the class scheduler to
proceed without interruption.
|
Patch 490.00
OSF520-222B
|
Patch:
Fix for class scheduler failure
State:
Supersedes patch OSF520-017B (183.00)
This patch
corrects the following:
Fixes a class scheduler semaphore race condition.
The class scheduler depends on semaphores to protect its database
from simultaneous updates.
This patch automatically detects if the semaphore
no longer exists and allocates a new one, allowing the class scheduler to
proceed without interruption.
|
Patch 492.00
OSF520-252
|
Patch:
Fix for verify command
State:
Existing
This patch avoids core dumps in the verify command.
|
Patch 500.00
OSF520X11-018C
|
Patch:
Security (SSRT0753U, SSRT0752U)
State:
Existing
This patch fixes the libXm.so incompatibility
in Tru64 UNIX V5.1A. |
Patch 502.00
OSF520DX-013
|
Patch:
Security (SSRT1-40U, SSRT1-41U, SSRT1-42U, SSRT1-45U)
State:
Existing
A potential security
vulnerability has been discovered where, under certain circumstances, system
integrity may be compromised.
This may be in the form of improper file access.
We have corrected this potential vulnerability. |
Patch 504.00
OSF520-171
|
Patch:
Provides faster failover time for NetRAIN
State:
Supersedes patch OSF520-012 (232.00)
This
patch corrects the following:
Fixes a problem in NetRAIN.
NetRAIN interface creation now
fails if any of the requested standby interfaces do not exist.
In the V5.0 stream NetRAIN failover time has regressed.
This
patch provides for faster failover time, mainly by permitting timer values
of less than 1 second to be configured.
|
Patch 506.00
OSF520-335
|
Patch:
Fix for rdump command
State:
Existing
The rdump command now dumps data properly onto remote
tape devices without receiving the SIGSEGV and dumping core. |
Patch 509.00
OSF520-364
|
Patch:
Fix for csh
State:
Supersedes
patch OSF520-182 (507.00)
This patch corrects the following:
If a nonroot user performed an ls(1) with wildcard characters
on a directory having permission 700, then it would display the invalid
error message, "Glob aborted." Now it displays the correct error message
of "Permission denied".
When nonmatch is set and a user performs an ls(1) with
one of the patterns as ?, it would not list any matched patterns but return
"ls: ? not found".
Now it returns that message as well as any matched
patterns.
Fixes a problem with the c shell (csh) so that it now correctly
recognizes the backslash (\) meta character.
|
Patch 511.00
OSF520-301
|
Patch:
Fixes alt driver for DEGPA Gigabit Ethernet adapters
State:
Existing
This patch addresses
two problems with the alt driver for DEGPA Gigabit Ethernet adapters.
These
problems affect all Tru64 UNIX systems using alt with vMAC or NetRAIN.
A fix for vMAC support.
Prior to this patch, vMAC has not
worked with DEGPA.
A fix to prevent two DEGPA adapters from getting the same
MAC address in a NetRAIN configuration.
|
Patch 513.00
OSF520-333A
|
Patch:
Modifies enablers for Enterprise Volume Manager
State:
Supersedes patches OSF520-069A (197.00), OSF520-149A (263.00),
OSF520-220A (313.00)
This patch corrects the following:
|
Patch 515.00
OSF520-333B
|
Patch:
Modifies enablers for Enterprise Volume Manager
State:
Supersedes patches OSF520-069C (201.00), OSF520-149B (265.00),
OSF520-220C (317.00)
This patch corrects the following:
|
Patch 517.00
OSF520-165
|
Patch:
Fix for LSM resynchronization problem
State:
Existing
This patch corrects the problem with
a mirrored LSM volume, with dirty region logging (DRL) enabled, still doing
a full resynchronization during the first recovery after an unclean shutdown.
|
Patch 519.00
OSF520-155
|
Patch:
Fixes the C++ incompatibility with pwrmgr.h
State:
Existing
This patch fixes the C++ incompatibility
of /usr/include/dec/pwrmgr/pwrmgr.h. |
Patch 525.00
OSF520-367A
|
Patch:
Security (SSRT0779U)
State:
Existing
A potential security vulnerability has been discovered
where, under certain circumstances, SNMP services can stop functioning. |
Patch 527.00
OSF520-367B
|
Patch:
Security (SSRT0779U)
State:
Existing
A potential security vulnerability has been discovered
where, under certain circumstances, SNMP services can stop functioning. |
Patch 529.00
OSF520-174
|
Patch:
Fix for umask permission setting
State:
Existing
This patch fixes a problem where no shell
message is displayed when trying to su to a user other than root. |
Patch 531.00
OSF520-244
|
Patch:
Fix for KMF caused by malformed IPv4-in-IPv4 packets
State:
Supersedes patch OSF520-087 (240.00)
This patch corrects the following:
A system configured with the IPTUNNEL kernel option will crash
if it receives a corrupted IPv6-in-IPv4 packet, even if the system is not
running IPv6.
The system will panic with the message "kermel memory fault
in ip6ip4_input()"
Fixes a kernel memory fault caused by malformed IPv4-in-IPv4
packets.
|
Patch 533.00
OSF520-306
|
Patch:
Fix for od command
State:
Existing
This patch fixes a problem in which an invalid character sequence
causes the od command to hang or display a partial character. |
Patch 535.00
OSF520-251
|
Patch:
Fix for balance utility
State:
Existing
Balance was terminating before balancing the whole domain
when the domain was very large ( >4 GB ). |
Patch 537.00
OSF520CDE-007
|
Patch:
Security (SSRT1-40U, SSRT1-41U, SSRT1-42U, SSRT1-48U)
State:
Supersedes patch OSF520CDE-004 (300.00)
A potential security vulnerability has been discovered where, under certain
circumstances, system integrity may be compromised.
This may be in the form
of improper file access.
We have corrected this potential vulnerability.
|
Patch 539.00
OSF520CDE-003
|
Patch:
Security (SSRT0767U)
State:
Existing
A potential security vulnerability has been discovered
where, under certain circumstances, system integrity may be compromised.
The
ttdbserverd contains a potential buffer overflow that may allow unauthorized
access.
We have corrected this potential vulnerability. |
Patch 545.00
OSF520-255
|
Patch:
Fixes EVMs periodic channel monitoring function
State:
Existing
This patch fixes a problem in which
the Event Manager's channel monitoring function is temporarily disabled if
the evmreload command is run.
|
Patch 551.00
OSF520-181
|
Patch:
Fixes an ATM signaling problem
State:
Existing
This patch fixes an ATM signaling problem.
|
Patch 553.00
OSF520-317
|
Patch:
EVM daemon fails to find user-defined templates
State:
Existing
This patch resolves a problem with
the Event Manager (EVM) where user-defined events are not posted in a semirolled
cluster.
The Event Manager daemon fails to find user-defined templates in
/usr/share/evm/templates/local on nonupgraded nodes in a semirolled cluster.
|
Patch 555.00
OSF520-219
|
Patch:
Fix for ld linker
State:
Supersedes
patch OSF520-004 (150.00)
This patch fixes two problems in the
linker (/usr/bin/ld):
A problem with the datatype of the linker-defined _fpdata
symbol.
A problem that causes a linker crash when certain data alignment
directives are used in the link.
The linker (/bin/ld) may corrupt the shared object registry
file when -update_registry is specified with concurrent links.
|
Patch 561.00
OSF520X11-016A
|
Patch:
Cut and paste problem with JISX0212 Japanese characters
State:
Existing
This patch fixes a problem
with cut and paste of JISX0212 Japanese characters on X Window System applications.
|
Patch 563.00
OSF520X11-016B
|
Patch:
Fixes JISX0212 Japanese characters problem
State:
Existing
This patch fixes a problem with cut
and paste of JISX0212 Japanese characters on X Window System applications.
|
Patch 565.00
OSF520-324
|
Patch:
Enabler for Compaq Database Utility
State:
Supersedes patches OSF520-090 (179.00), OSF520-199 (292.00)
This patch provides enablers for the Compaq Database Utility. |
Patch 567.00
OSF520-210
|
Patch:
Security (SSRT0664U, SSRT0762U)
State:
Supersedes patches OSF520-045 (204.00), OSF520-068 (206.00)
This patch corrects the following:
This patch corrects a problem with the ftpd daemon which
could result in PC ftp clients hanging when transferring some files in ASCII
mode.
A potential security vulnerability has been discovered where,
under certain circumstances, system integrity may be compromised.
This may
be in the form of improper file or privilege management.
We have corrected
this potential vulnerability.
Corrects ftp daemon failure when using a globbing string of
several asterisks.
Also contains additional corrections for the help command
and character drop with the put command.
|
Patch 569.00
OSF520-294
|
Patch:
CD Mastering Software
State:
Existing
The DS25 system does not include a floppy drive, but
has a CD-ROM burner instead.
In order to write to this device, CD Mastering
Software is required.
This patch provides that software.
It is made up of
mkisofs and cdrecord software. |
Patch 571.00
OSF520-382
|
Patch:
savecore prematurely terminates crash dump recovery
State:
Existing
This patch corrects a
problem where savecore may prematurely terminate crash dump recovery on partitions
larger than 4 GB.
|
Patch 573.00
OSF520DX-014
|
Patch:
Security (SSRT1-40U, SSRT1-41U, SSRT1-42U, SSRT1-45U)
State:
Existing
A potential security
vulnerability has been discovered where, under certain circumstances, system
integrity may be compromised.
This may be in the form of improper file access.
We have corrected this potential vulnerability. |
Patch 578.00
OSF520-235
|
Patch:
Fix for zdump utility
State:
Existing
This patch corrects the following:
|
Patch 580.00
OSF520X11-020
|
Patch:
Extended Visual Information returns incorrect info
State:
Existing
This patch fixes a problem where the
X server's Extended Visual Information (EVI) extension was returning incorrect
information. |
Patch 588.00
OSF520DX-021
|
Patch:
Fix for NS record syntax in named.local file
State:
Existing
This patch fixes the NS record syntax
in a named.local file. |
Patch 691.00
OSF520-436B
|
Patch:
Fix for atexit and pthread_prefork handler crashes
State:
New
This patch fixes a problem with atexit()
or pthread_atfork() handlers in shared libraries.
An application will crash
when handlers in shared libaries are called after the libraries are dlclosed
and unmapped. |
Patch 693.00
OSF520-454B
|
Patch:
Security (SSRT1-40U, SSRT1-41U, SSRT1-42U, SSRT1-45U)
State:
New
A potential security vulnerability
has been discovered,where, under certain circumstances, system integrity may
be compromised.
This may be in the form of improper file access.
We have
corrected this potential vulnerability. |
Patch 695.00
OSF520CDE-011A
|
Patch:
Security (SSRT0753U, SSRT0752U, SSRT0788U)
State:
OSF520CDE-002 (208.00), OSF520CDE-005A (429.00), OSF520CDE-009A
(430.00), OSF520CDE-008A (432.00)
This patch corrects the following:
Fixes the problem of palette files not been read from etc/dt/palettes.
Fixes the dtprintinfo memory fault problem with long LANG
value.
A potential security vulnerability has been discoveredwhere,
under certain circumstances, system integrity may be compromised.
This may
be in the form of large values of command line arguments.
We have corrected
this potential vulnerability.
A potential security vulnerability has been discovered , where
under certain circumstances, system integrity may be compromised.
This may
be in the form of large values of ENVIRONMENT variables and command line arguments.
Fixes a potential security vulnerability in CDE Subprocess
Control Service(dtspcd).
dtspcd has a potential buffer overflow condition
which may lead to unauthorized access.
We have corrected these potential
vulnerability.
|
Patch 697.00
OSF520CDE-011B
|
Patch:
Security (SSRT0753U, SSRT0752U, SSRT0788U)
State:
OSF520CDE-005B (433.00), OSF520CDE-009B (434.00), OSF520CDE-008B
(436.00)
This patch corrects the following:
Fixes the dtprintinfo memory fault problem with long LANG
value.
A potential security vulnerability has been discoveredwhere,
under certain circumstances, system integrity may be compromised.
This may
be in the form of large values of command line arguments.
We have corrected
this potential vulnerability.
A potential security vulnerability has been discovered , where
under certain circumstances, system integrity may be compromised.
This may
be in the form of large values of ENVIRONMENT variables and command line arguments.
Fixes a potential security vulnerability in CDE Subprocess
Control Service(dtspcd).
dtspcd has a potential buffer overflow condition
which may lead to unauthorized access.
We have corrected these potential
vulnerability.
|
Patch 699.00
OSF520-394
|
Patch:
Fix for kdbx
State:
New
This patch fixes a premature termination of the ofile kdbx extension, warning
messages in various kdbx extensions, and token length warnings when kdbx
is invoked. |
Patch 701.00
OSF520-481
|
Patch:
Security (SSRT1-40U, SSRT1-41U, SSRT1-42U, SSRT1-45U)
State:
New
This patch adds the mktemp(1)
reference page for the mktemp command. |
Patch 705.00
OSF520-485
|
Patch:
Security (SSRT1-40U, SSRT1-41U, SSRT1-42U, SSRT1-45U)
State:
New
This patch updates the mktemp(3)
reference page with changed information regarding the mktemp() and mkstemp()
routines, and adds information about the mkdtemp() and mkstemps() libc routines.
|
Patch 709.01
OSF520-456
|
Patch:
Fix for autofsd and autofsmount daemon
State:
Supersedes patches OSF520-091 (119.00), OSF520-290 (451.00),
OSF520-027 (3.00), OSF520-034 (5.00), OSF520-273 (447.00), OSF520-270 (449.00),
OSF520-005 (113.00), OSF520-037 (115.00), OSF520-372 (706.00), OSF520-412
(707.00), OSF520-456 (709.00)
This patch corrects the following:
An AutoFS intercept point for a direct map entry may no longer
induce automounts after an error has been detected during a previous automount
attempt.
Eliminates error messages concerning property lists seen through
certain utilities such as vdump.
AutoFS aut-mounts will now occur when utilities name intercept
points defined through indirect map entries.
Fixes a deadlock that will occur in non-cluster systems when
direct map entries are served locally.
|
Patch 709.00
continued
|
Prevents a core dump from vdump when your message length is
greater than MAX_MSG_SIZE.
This is a very rare occurrence.
The problem was
found by code inspection while working on internationalization of messages.
Fixes problems in the vdump command:
Fixes problems in the vrestore command:
Fails to properly handle extended attributes records in compressed
archives.
This results in malloc failures, proplist corruption, program
abort, program crashes due to segfault or invalid memory access, and the
display of the error message "error setting extended attributes".
Fails to set extended attributes due to confusion over selective
restore of the associated file or directory.
Also results in display of
the error message "error setting extended attributes".
Selective restore of hardlinked files is incomplete when they
exist in different directories (fails to create directory for second occurrence
of file with same inode number).
Eliminates inefficient behavior by autofsd when the top level
directory of a direct hierarchical automount map entry cannot be successfully
mounted.
Ensures that AutoFS correctly uses the mount options specified
in automount map entries with replicated servers.
Fixes a problem where the tar -F (Fasttar) option ignores
files named err, but does not ignore files named errs or directories named
SCCS and RCS.
Corrects pax/tar/cpio to properly extract explicitly specified
files.
When an archive contained a file with extended attributes and a different
file (occurring later in the archive) was specified to be extracted, improper
buffer pointer management resulted in the following display (example uses
tar):
tar: /dev/nrmt0h : This doesn't look like a tar archive
tar: /dev/nrmt0h : Skipping to next file...
tar: Memory allocation failed for extended data while reading :
Not enough space
The directory option was similarly affected.
In this case the information
for the specified file was not reported
Corrects the behavior of several commands when used in conjunction
with file systems that are locally served via AutoFS.
Provides support for wildcards in Linux /etc/exports entries.
Both AutoFS and Automount have been so enhanced.
Fixes a problem where aufofsd and autofsmount daemon do not
properly parse the star (*) in map files.
|
Patch 711.00
OSF520-339
|
Patch:
Fix for shfragbf
State:
Existing
This patch clarifies the output of shfragbf, an AdvFS utility.
|
Patch 713.00
OSF520-345
|
Patch:
Fix for rcinet script
State:
Existing
This patch prevents the system from hanging when the
rcinet script is used by correcting the order in which NetRAIN-related services
are started and stopped.
|
Patch 716.00
OSF520DX-029
|
Patch:
Security (SSRT1-40U, SSRT1-41U, SSRT1-42U, SSRT1-45U)
State:
Supersedes patches OSF520DX-003 (109.00),
OSF520DX-007 (110.00), OSF520DX-006 (112.00), OSF520DX-009 (282.00), OSF520DX-008
(284.00), OSF520DX-015 (442.00), OSF520DX-024A (444.00), OSF520DX-026 (714.00)
This patch corrects the following:
Fixes a problem with the SysMan Station which causes incorrect
state information to be displayed after a CPU has been indicated.
Fixes possible deadlock conditions in the SysMan station daemon
that might occur at daemon startup or during failover.
Provides enablers for the Compaq Database Utility.
Objects in the Physical File system view do not have correct
or updated properties.
SysMan Station can not launch commands on objects where an
object attribute is part of the command.
A potential security vulnerability has been discovered where,
under certain circumstances, system integrity may be compromised.
This may
be in the form of improper file access.
We have corrected this potential
vulnerability.
Fixes a problem where reconfiguration of network interface
cards using SysMan makes the old IP address an IP alias.
The new IP address
replaces the old IP address now.
Fixes a problem where some older, legacy applications were
not displaying the appropriate pop-up message because of a change to the way
error messages are retrieved.
This patch fixes the message catalogs so that
the proper message is displayed at the appropriate time.
|
Patch 718.00
OSF520-426
|
Patch:
Fix for traceroute command
State:
New
This patch corrects a problem where traceroute sometimes failed
to provide responses and finish a trace when the destination host name was
given on the command line. |
Patch 720.00
OSF520-416
|
Patch:
Fix for assembler problems
State:
Supersedes patch OSF520-239 (471.00)
This patch, shipped as
Version 3.06.08 of the Tru64 UNIX Assembler, resolves three assembler problems
related to the following:
The generation of an incorrect symbol table which can
cause om to fail.
The improper reordering of an instruction which restores
the stack pointer when assembling with optimization active.
The generation of a .ident string without a terminating NULL.
When a load instruction specifies a target register and a
base register that are the same, the assembler may generate an invalid optimization.
|
Patch 723.00
OSF520DX-025
|
Patch:
Security (SSRT0785U)
State:
Supersedes patches OSF520DX-010 (472.00), OSF520DX-018 (473.00), OSF520DX-017
(474.00), OSF520DX-019 (475.00), OSF520DX-020 (477.00), OSF520DX-027 (721.00)
This patch corrects the following:
A core dump occurs when /etc/shells is a directory instead
of a file.
The hour glass cursor remains after a failure to create a
home directory in the process of adding or modifying an account.
Fixes the problem of dxaccounts that names and security attributes
of UNIX users are not mapped correctly when they are viewed from the PC Users
dialog box.
Fixes the problem that user name entries are replicated in
the /etc/group file when modifying users with either dxaccounts or sysman
accounts.
Fixes a problem in dxaccounts that can cause certain C2 security
values to not be displayed, which could result in unexpected values being
saved.
Fixes the problem of useradd, usermod, and dxaccounts ignoring
password length restrictions when changing passwords.
Fixes a number of problems with dxaccounts on a system with
ASU installed.
A potential security vulnerability has been discovered where,
under certain circumstances, system integrity may be compromised.
This may
be in the form of passwords that have a length outside of the intended range.
We have corrected this potential vulnerability.
|
Patch 725.00
OSF520X11-022A
|
Patch:
Security (SSRT0788U, SSRT0753U, SSRT0752U)
State:
Supersedes patches OSF520X11-017A (493.00), OSF520X11-018A
(495.00)
This patch corrects the following:
A potential security vulnerability has been discovered where,
under certain circumstances, system integrity may be compromised.
This may
be in the form of large values of ENVIRONMENT variables.
We have corrected
this potential vulnerability.
Fixes the libXm.so incompatibility in Tru64 UNIX V5.1A.
Fixes a problem with the Motif ToggleButton Widget where,
in some cases, it may not draw itself correctly.
|
Patch 727.00
OSF520X11-022B
|
Patch:
Security (SSRT0788U, SSRT0753U, SSRT0752U)
State:
Supersedes patches OSF520X11-017B (496.00), OSF520X11-018B
(498.00)
This patch corrects the following:
A potential security vulnerability has been discovered where,
under certain circumstances, system integrity may be compromised.
This may
be in the form of large values of ENVIRONMENT variables.
We have corrected
this potential vulnerability.
Fixes the libXm.so incompatibility in Tru64 UNIX V5.1A.
Fixes a problem with the Motif ToggleButton Widget where,
in some cases, it may not draw itself correctly.
|
Patch 729.00
OSF520X11-022B
|
Patch:
Fixes a problem with RLIMIT_DATA process limits
State:
New
This patch fixes a problem with RLIMIT_DATA
process limits when running fsck on a large file system. |
Patch 731.00
OSF520-484
|
Patch:
(SSRT1-40U, SSRT1-41U, SSRT1-42U, SSRT1-45U)
State:
New
This patch adds the safe_open(3) reference
page for the safe_open() routine in libc. |
Patch 733.00
OSF520-479
|
Patch:
Fix for Memory Channel driver problem
State:
New
Shuts down the Memory Channel device if
too many state change interrupts are received.
|
Patch 737.00
OSF520-445
|
Patch:
Security (SSRT1-40U, SSRT1-41U, SSRT1-42U, SSRT1-45U)
State:
Supersedes patches OSF520-028 (125.00), OSF520-217
(309.00), OSF520-228 (460.00), OSF520-208 (461.00), OSF520-227 (463.00), OSF520-526
(734.00), OSF520-437 (735.00)
This patch corrects the following:
Fixes a problem in which /usr/bin/ksh hangs for certain scripts
that contain wait(1).
A potential security vulnerability has been discovered where,
under certain circumstances, system integrity may be compromised.
This may
be in the form of improper file access.
We have corrected this potential
vulnerability.
The following changes were made:
Shell inline input files are more secure.
sh noclobber and new constructs are added.
The mkdir system call is updated.
Corrects a problem in which ksh fails to substitute the tilde
(~) character for a user's home directory after an assignment using the number
(#) or percent (%) characters has been used.
Fixes a problem with ksh.
When a ksh menu is started from
within user's .profile, ksh will not stop when the Telnet session is stopped.
Fixes an Asian language processing problem under the Korn
shell.
sh will not receive SIGSEGV signal when you run type with
file path >
69 characters.
Corrects a problem in which sh was using a high amount of
CPU time.
Corrects a problem in which ksh did not clean up the processes
associated with a terminal once the window was closed.
|
Patch 739.00
OSF520-461
|
Patch:
Fixes a problem with os_mibs
State:
New
This patch fixes a problem with os_mibs that could cause the
application to cosnume an excessive amount of CPU time. |
Patch 741.00
OSF520-359
|
Patch:
Enhancement to savemeta
State:
New
This patch enhances the capability of savemeta:
|
Patch 744.00
OSF520-466A
|
Patch:
Shared library fix for libaio
State:
Supersedes patches OSF520-332A (521.00), OSF520-392A (742.00)
This patch corrects the following:
Fixes a rarely seen memory fault in libaio during aio_cancel().
Adds support for NEW_OPEN_MAX_SYSTEM (64K) file descriptors
to libaio.
Prevents thread blocking forever when both libaio and libaio_raw
are linked into the same image.
Closes an aio_read()/aio_cancel() race condition.
|
Patch 747.00
OSF520-466B
|
Patch:
Static library fix for libaio
State:
Supersedes patches OSF520-332B (523.00), OSF520-392B (745.00)
This patch corrects the following:
Fixes a rarely seen memory fault in libaio during aio_cancel().
Adds support for NEW_OPEN_MAX_SYSTEM (64K) file descriptors
to libaio.
Prevents thread blocking forever when both libaio and libaio_raw
are linked into the same image.
Closes an aio_read()/aio_cancel() race condition.
|
Patch 749.00
OSF520DX-028
|
Patch:
Modification to secconfig suitlet
State:
New
This patch makes the customize database option
available when using secconfig for shadow passwords.
|
Patch 751.00
OSF520X11-024A
|
Patch:
OSF520X11-024A
State:
New
A potential security vulnerability has been discovered where, under certain
circumstances, system integrity may be compromised.
This may be in the form
of improper file or privilege management.
We have corrected this potential
vulnerability. |
Patch 753.00
OSF520X11-024B
|
Patch:
Security (SSRT0818U)
State:
New
A potential security vulnerability has been discovered where,
under certain circumstances, system integrity may be compromised.
This may
be in the form of improper file or privilege management.
We have corrected
this potential vulnerability. |
Patch 755.00
OSF520X11-024C
|
Patch:
Security (SSRT0818U)
State:
New
A potential security vulnerability has been discovered where,
under certain circumstances, system integrity may be compromised.
This may
be in the form of improper file or privilege management.
We have corrected
this potential vulnerability. |
Patch 757.00
OSF520-362
|
Patch:
Fix for script command
State:
New
This patch corrects a problem in which script would hang upon
exit in a dfs configuration. |
Patch 759.00
OSF520DX-030
|
Patch:
System Mgmt Station detects failing PCI adapters
State:
New
This patch provides the ability for the
System Management Station to render PCI adapters with a warning or failed
representation when they are in the indicted state.
This is in addition to
the previous ability to render CPUs that are in the indicted state. |
Patch 761.00
OSF520X11-026
|
Patch:
Fixes a problem in the mwm window manager
State:
New
This patch fixes a problem in the mwm window
manager where double-click actions are performed on the second button press
instead of the second button release.
This causes the second button release
event to be sent to any underlying window. |
Patch 763.00
OSF520-482
|
Patch:
: Security (SSRT1-40U, SSRT1-41U, SSRT1-42U, SSRT1-45U)
State:
New
This patch adds the dirclean(8)
reference page for the /usr/sbin/dirclean utility.
|
Patch 765.00
OSF520-486
|
Patch:
Provides the poll reference page
State:
New
This patch adds the poll(7) reference page for
the /dev/poll driver. |
Patch 767.00
OSF520-368
|
Patch:
Enhancement to fuser utility
State:
Existing
This patch allows fuser to display the reference option.
This option indicates the type of reference made.
For example: open, closed,
unlinked, or mmapped. |
Patch 769.00
OSF520-417
|
Patch:
Fix for su command
State:
New
This patch corrects the behavior of su(1), so that the LOGNAME
environment variable is changed to the target user when executed with the
- option.
|
Patch 771.00
OSF520-483
|
Patch:
Lsmsa incorrectly processing passwords
State:
New
This patch fixes a problem where Lsmsa incorrectly
processes passwords that are longer than eight characters.
Anyone who tries
to start the LSM GUI using a password of eight or more characters will be
denied access. |
Patch 773.00
OSF520-444
|
Patch:
Security (SSRT0795U)
State:
New
A potential security vulnerability has been discovered where,
under certain circumstances, system integrity may be compromised.
This may
be in the form where inetd may block incoming connections when scanned by
nmap or other port scanners.
We have corrected this potential vulnerability.
|
Patch 775.00
OSF520CDE-012
|
Patch:
Fixes a problem in the dtwm window manager
State:
Supersedes patch OSF520CDE-006 (584.00)
This
patch corrects the following:
Fixes a memory leak problem in the Window Manager.
Fixes a problem in the dtwm window manager where double-click
actions are performed on the second button press instead of the second button
release.
This causes the second button release event to be sent to any underlying
window.
|
Patch 777.00
OSF520-423
|
Patch:
Fixes time zone display problem
State:
Supersedes patch OSF520-254 (586.00)
This patch corrects
the following:
Fixes a problem in which the binlog daemon can coredump if
it attempts to recover events from a panic dump file containing invalid event
data.
Fixes a time formatting problem when Compaq Analyze is used
to display events in time zones with a positive offset from GMT.
|
Patch 779.00
OSF520X11-023
|
Patch:
Fixes an xfs problem
State:
New
This patch fixes an xfs problem which causes a "QueryGlyphs
failed" error in showfont. |
Patch 782.00
OSF520-388A
|
Patch:
Added support for DECthreads V3.18-141
State:
Supersedes patches OSF520-085A (80.00), OSF520-308A (418.00),
OSF520-419A (780.00)
This patch corrects the following:
Installs DECthreads V3.18-133, which fixes problems that may
affect threaded programs running on Tru64 UNIX V5.1A.
The problems addressed
with this patch were discovered during pre-release testing of Tru64 UNIX
V5.1A.
DECthreads V3.18-133 is the initial support version of the Compaq
POSIX Threads Library for Tru64 UNIX V5.1A.
Installs DECthreads V3.18-138, which fixes problems that may
affect threaded programs running on Tru64 UNIX V5.1A.
This patch specifically
addresses a problem that may arise when using recursive mutexes with condition
variables.
Installs DECthreads V3.18-144, which is the latest version
of the Compaq POSIX Threads library for Tru64 UNIX V5.1A.
Installs DECthreads V3.18-141 which fixes problems that may
affect threaded programs running on Tru64 UNIX V5.1A.
This patch specifically
addresses a problems with the preemption of the symbolic name table() by
application code, and the alignment of the Stack Pointer in user created threads.
|
Patch 785.00
OSF520-388B
|
Patch:
Added support for DECthreads V3.18-141
State:
Supersedes patches OSF520-085B (82.00), OSF520-308B (420.00),
OSF520-419B (783.00)
This patch corrects the following:
Installs DECthreads V3.18-133, which fixes problems that may
affect threaded programs running on Tru64 UNIX V5.1A.
The problems addressed
with this patch were discovered during pre-release testing of Tru64 UNIX
V5.1A.
DECthreads V3.18-133 is the initial support version of the Compaq
POSIX Threads Library for Tru64 UNIX V5.1A.
Installs DECthreads V3.18-138, which fixes problems that may
affect threaded programs running on Tru64 UNIX V5.1A.
This patch specifically
addresses a problem that may arise when using recursive mutexes with condition
variables.
Installs DECthreads V3.18-144, which is the latest version
of the Compaq POSIX Threads library for Tru64 UNIX V5.1A.
Installs DECthreads V3.18-141 which fixes problems that may
affect threaded programs running on Tru64 UNIX V5.1A.
This patch specifically
addresses a problems with the preemption of the symbolic name table() by
application code, and the alignment of the Stack Pointer in user created threads.
|
Patch 787.00
OSF520-351
|
Patch:
Enhancement for siacfg utility
State:
New
This patch allows nonlocal SIA mechanisms, LDAP
for example, to place their mechanism last in the list of mechanisms. |
Patch 789.00
OSF520-393
|
Patch:
Fix for ppdof print filter core dump problem
State:
New
This patch corrects a problem where the
filter can core dump when the banner jobname contains 132 characters. |
Patch 791.00
OSF520-400
|
Patch:
Fix for salvage utility core dump problem
State:
New
This patch fixes a problem with the /sbin/advfs/salvage
utility which could cause the utility to core dump. |
Patch 793.00
OSF520-343
|
Patch:
Fix for startslip program problem
State:
New
This patch fixes a problem where startslip was
not able to extract all the information from the acucap file. |
Patch 795.00
OSF520-421
|
Patch:
A timing window can cause a hang in run_usr_cmd
State:
New
A timing window can cause a hang in run_usr_cmd.
|
Patch 797.00
OSF520-422
|
Patch:
KZPCA devices now work with SCSI devices
State:
Supersedes patches OSF520-136 (261.00), OSF520-162 (483.00)
This patch corrects the following:
Fixes a panic caused by SCSI bus resets with KZPCA HBAs.
Fixes a kernel memory fault panic after an "ITPSA: itpsa_action
- error converting path ID to ITPSA softc structure" message.
Adds the capability for KZPCA devices to work with SCSI devices
that only support asynchronous data transfers.
|
Patch 799.00
OSF520-375
|
Patch:
Fixes several problems with collect utility
State:
Supersedes patch OSF520-036 (175.00)
This patch
corrects the following:
Fixes the Collect's collector (/usr/sbin/collect) to correctly
report the network interface load percentage.
Provides fixes for several problems with the Collect utility.
The Collect utility has been updated from Version 2.0 to 2.0.3
|
Patch 801.00
OSF520-431
|
Patch:
Fix for convuser utility
State:
New
Fixes a problem where, if a user was working in enhanced security
and then switched to base security, the group and other read privileges would
get stripped from /etc/passwd. |
Patch 803.00
OSF520-443
|
Patch:
Fixes a problem in access_lines for libmld
State:
New
This patch fixes a problem that may cause
the third command and other Atom-based instrumentation tools to fail. |
Patch 805.00
OSF520-463
|
Patch:
Fixes a system panic from procfs ioctl user code
State:
Supersedes patch OSF520-014 (216.00)
This patch
corrects the following:
|
Patch 807.00
OSF520-480
|
Patch:
Security (SSRT1-40U, SSRT1-41U, SSRT1-42U, SSRT1-45U)
State:
Supersedes patches OSF520-066 (191.00), OSF520-011
(2.00), OSF520-088 (121.00), OSF520-173A (241.00), OSF520-176 (243.00), OSF520-234
(400.00), OSF520-288 (401.00), OSF520-291 (402.00), OSF520-272 (403.00), OSF520-236
(404.00), OSF520-281 (405.00), OSF520-233 (406.00), OSF520-261 (407.00), OSF520-280
(408.00), OSF520-232 (409.00), OSF520-194 (410.00), OSF520-279 (412.00), OSF520-212
(307.00), OSF520-213 (302.00), OSF520-103A (162.00), OSF520-153 (253.00),
OSF520-159A (255.00), OSF520-023A (90.00), OSF520-018 (218.00), OSF520-216
(303.00), OSF520-214 (305.00), OSF520-268 (421.00), OSF520-387 (422.00), OSF520-241
(423.00), OSF520-276A (424.00), OSF520-303 (426.00), OSF520-492 (681.00),
OSF520-425 (682.00), OSF520-476 (683.00), OSF520-427 (684.00), OSF520-436A
(685.00), OSF520-442 (686.00), OSF520-396 (687.00), OSF520-454A (689.00)
This patch corrects the following:
Fixes a problem where logins appear to be hung on standalone
systems with Enhanced Security enabled.
Fixes a regular expression matching problem in multibyte locales.
Fixes the -ignore_all_versions and -ignore_version options
for the run-time loader (/sbin/loader).
Fixes a problem where strtod() was returning different outputs
for the same input.
It also fixes a problem where the tan() function was
returning the wrong results.
Eliminates a libc memory leak that occurred when calling dlclose()
in applications linked with the thread's run-time environment.
Changes the optional dynamic loader arguments -allocator_range
and -allocator to -preallocated_range.
Fixes a problem in mktime() when adjusting for a tm struct
containing an invalid tm_isdst (daylight savings time) setting.
A potential security vulnerability has been discovered where,
under certain circumstances, system integrity may be compromised.
This may
be in the form of network programs core dumping.
We have corrected this potential
vulnerability.
Fixes a segmentation fault problem with long LOCPATH and
LANG values.
Fixes a problem in which the RPC TCP server incorrectly tries
to write to a socket that has already been closed by a client.
Fixes an application core dump problem when the LANG environment
variable is too long.
Fixes a problem with fopen.
fopen was returning "file not
found" when there was insufficient memory available to allocate the FILE
structure.
fopen now returns "not enough space" for this case.
Fixes a problem in fread() where excessive I/O was taking
place for large amounts of data, causing performance problems.
It also addresses
a failure in fread() to properly handle data sizes that have representations
greater than 32 bits (2^32 of data).
Fixes a loader core dump that occurs when invoking certain
call_shared executables that have been processed by postlink instrumentation
tools.
Fixes a problem with strerror where buffers could not be allocated.
Fixes a problem in fwrite() where it was failing when the
total number of bytes to be written was larger than 2 GB.
Fixes a regular expression problem with the REG_NEWLINE option
of the regexec() routine.
|
Patch 807.00
continued
|
Fixes a regular expression performance problem as well as
two bugs that posed potential regular expression problems for multibyte locales.
A potential security vulnerability has been discovered, where
under certain circumstances, system integrity may be compromised.
This may
be in the form of improper file access.
We have corrected this potential vulnerability.
Resolves a memory leak and a filtering issue in the Event
Manager, and allows the evmwatch utility to reconnect automatically if evmd
fails and is restarted.
Provides enablers for the Compaq Database Utility.
Fixes a problem in which binary error log (binlog) events
posted by the EMX FibreChannel driver and the system console are reported
incorrectly by the Event Manager, EVM.
A potential security vulnerability has been discovered where,
under certain circumstances, users can clobber temporary files created by
shell commands and utilities (for example, under /sbin, /usr/sbin, /usr/bin,
and /etc).
We have corrected this potential vulnerability.
Provides the /usr/lbin/mkstemp program which allows the mechanism
to create a secure temporary file.
A potential security vulnerability has been discovered where,
under certain circumstances, system integrity may be compromised.
This may
be in the form of improper file access.
We have corrected this potential
vulnerability.
Fixes a problem in which the EVM daemon acting as a subscribing
client within a cluster will unexpectedly drop the connection to the other
EVM daemons in the cluster.
This may happen when an EVM client subscribes
to events specifying the cluster alias.
Resolves an issue which can cause an Event Manager (EVM) client
or the EVM daemon to core dump under rare circumstances.
Fixes the following sys_check problems:
A potential security vulnerability has been discovered where,
under certain circumstances, system integrity may be compromised.
This may be in the form of improper file access.
We have corrected
this potential vulnerability.
The verification of invoking processes' name in CLISCRIPT
failed due to the PARSING of ps output.
Fixes a multi-thread timing window in malloc and free where
the list of free chunks could become corrupted, resulting in a segfault.
Fixes a regular expression performance problem in sed.
Fixes a problem with printing long double values.
Fixes a performance degradation in malloc, in applications
which perform many mallocs and few frees.
With this patch, the performance
of malloc is constant regardless of the number of allocated chunks outstanding.
Fixes a problem with atexit() or pthread_atfork() handlers
in shared libraries.
An application will crash when handlers in shared
libaries are called after the libraries are dlclosed and unmapped.
Compiled format doprnt code does not handle precision correctly.
A potential security vulnerability has been discovered where,
under certain circumstances, system integrity may be compromised.
This may
be in the form of improper file access.
We have corrected this potential
vulnerability.
|
Patch 809.00
OSF520-527
|
Patch:
Enables correctable error reporting from DTAGII
State:
New
This patch enables correctable error reporting
from DTAGII chips on GS320/160/80 1.224Ghz CPU systems. |
Patch 811.00
OSF520-465
|
Patch:
Fix for the hwmgr utility
State:
Supersedes patch OSF520-083 (230.00)
This patch fixes three issues
with hwmgr:
An incorrect error message is displayed to the user when using
hwmgr to offline a CPU that has only one bound process.
The incorrect error
message is unable to offline this component and the correct error message
should report that there are bound processes on the component.
The path to the scp device is missing when the hwmgr -view
devices command is issued.
hwmgr does not show CPU bindings with a tilde (~) whereas
the Manage CPU suitlet does when displaying impact information for offlining
a CPU.
Using the tilde (~) will help distinguish between CPU bindings and
RAD bindings.
This will also keep the two interfaces consistent for the customer.
|
Patch 813.00
OSF520X11-025A
|
Patch:
Shared library fix for libXt
State:
Supersedes patch OSF520X11-015A (547.00)
This patch corrects
the following:
Fixes a problem in the X Toolkit library (Xt) which could
cause the TeMIP Iconic_map Presentation Module application (mcc_iconic_map)
to crash.
Fixes a problem where the definition of the X Toolkit function
XtPending() was changed in Tru64 UNIX V5.1A, which caused some applications
built on earlier versions of Tru64 UNIX to fail.
|
Patch 815.00
OSF520X11-025B
|
Patch:
Static library fix for libXt
State:
Supersedes patch OSF520X11-015B (549.00)
This patch corrects
the following:
Fixes a problem in the X Toolkit library (Xt) which could
cause the TeMIP Iconic_map Presentation Module application (mcc_iconic_map)
to crash.
Fixes a problem where the definition of the X Toolkit function
XtPending() was changed in Tru64 UNIX V5.1A, which caused some applications
built on earlier versions of Tru64 UNIX to fail.
|
Patch 817.00
OSF520-446
|
Patch:
Fixes a simple_lock panic when using ATM
State:
Supersedes patches OSF520-030 (165.00), OSF520-057 (167.00),
OSF520-185 (557.00)
This patch corrects the following:
Fixes a kernel memory fault when using ATM.
Corrects a problem which could result in ATM/lane connection
requests being dropped.
Fixes a kernel memory fault when using ATM.
Fixes a "simple_lock: time limit exceeded" panic when using
ATM.
|
Patch 822.00
OSF520-380
|
Patch:
Fix for fixdmn core dump problem
State:
Supersedes patches OSF520-065 (177.00), OSF520-260 (559.00),
OSF520-370 (818.00), OSF520-397 (819.00), OSF520-391 (820.00)
This patch corrects the following:
Fixes several problems with the fixdmn utility where, under
extreme cases, it was possible for fixfdmn to core dump or to terminate without
fixing the domain.
fixfdmn exits prematurely with the message "Can't allocate
0 bytes for group use array" and then instructs user on how to make more
memory available, although more memory is not needed.
Allows fixfdmn to modify only one page of the transction log.
Prevents fixfdmn from changing file sizes unnecessarily.
Fixes a case were fixfdmn would abort when the same mcell
was on the DDL more than once.
Allows fixfdmn to be run on domains which have been mounted
under V5.1B and then moved back to an older OS.
fixfdmn could core dump on a rare corruption in the tag file.
|
Patch 824.00
OSF520-458
|
Patch:
Provides the ckfsec reference page
State:
New
This patch delivers the ckfsec(1) reference page.
|
Patch 826.00
OSF520-374
|
Patch:
Security (SSRT0794U)
State:
New
A potential security vulnerability has been discovered where,
under certain circumstances, system integrity may be compromised.
We have
corrected this potential vulnerability.
|
Patch 828.00
OSF520-457
|
Patch:
Security (wc.symlink.002.spautils)
State:
New
A potential security vulnerability has been discovered
where, under certain circumstances, system integrity may be compromised.
This
may be in the form of certain files in world-writable directories.
This patch
provides the ckfsec utility which can help detect such files. |
Patch 830.00
OSF520DX-023
|
Patch:
Incompatibility between Java 1.1.x and Java 2 1.2.x
State:
New
This patch will allow users
who are using SysMan tools on the iPAQ, or who have Java 2 as their default
Java version, to communicate with Tru 64 UNIX V5.1A systems. |
Patch 832.00
OSF520-488
|
Patch:
Update to exportfs reference page
State:
New
This patch updates the exportfs(2) reference page
with changed information regarding the exportfsdata structure as a result
of increasing a number of file systems that can be NFS mounted from 256 to
1024. |
Patch 839.00
OSF520-542
|
Patch:
Fix for clsm sync and lsm startup collision problem
State:
Superseded patches OSF520-105 (67.00), OSF520-226
(582.00), OSF520-331 (574.00), OSF520-318 (576.00), OSF520-447 (703.00)
This patch corrects the following:
Provides enabler for Enterprise Volume Manager product.
Prevents a vold from core dumping when removing a disk from
rootdg using voldiskadm or voldg.
Prevents a KMF (kernel memory fault) panic, in voldiskiostart(),
when an I/O is attempted on an LSM device that is not accessible.
Fixes a situation in which when a cluster member fails, mirrored
volumes are left in a state such that recovery is always necessary when members
boot, even if no additional recovery should be necessary.
Fixes a clsm sync and lsm startup collison problem.
Fixes a vold core dump when old config db exists.
Fixes cluster node panics on boot if klog does not exist.
Fixes LSM not recognizing third-party disks.
Fixes "unable to create a new diskgroup" when
vold is in noloadbalance mode.
Fixes error messages for non-rootdg disks when cluster root
is under lsm control.
Fixes problems in LSM's autoconfiguration feature, as well
as some problems in the LSM commands volsave, volrestore, and volclonedg.
|
Patch 840.00
OSF520-X11-025C
|
Patch:
Definition of X Toolkit function XtPending was changed
State:
New
This patch fixes a problem
where the definition of the X Toolkit function XtPending() was changed in
Tru64 UNIX V5.1A.
This caused some applications built on earlier versions
of Tru64 UNIX to fail. |
Patch 844.00
OSF520-467B
|
Patch:
AdvFS cannot use volumes greater than 2Tb
State:
New
This patch corrects the following:
Fixes a bug that prevented AdvFS from working correctly with
LSM volumes between 1Tb and 2Tb.
mkfdmn and addvol will now issue a warning if an attempt is
made to use an LSM volume greater than 2Tb in size.
|
Patch 846.00
OSF520-684
|
Patch:
Security (SSRT1-40U,
SSRT1-41U, SSRT1-42U, SSRT1-45U)
State:
Supersedes patches OSF520-304 (541.00), OSF520-118 (146.00),
OSF520-071 (148.00), OSF520-078 (126.00), OSF520-077 (127.00), OSF520-126
(128.00), OSF520-007 (129.00), OSF520-115 (130.00), OSF520-121 (131.00), OSF520-009
(132.00), OSF520-074 (134.00), OSF520-207 (286.00), OSF520-097 (6.00), OSF520-081
(7.00), OSF520-116 (8.00), OSF520-044 (9.00), OSF520-020 (10.00), OSF520-021
(11.00), OSF520-138 (12.00), OSF520-089 (13.00), OSF520-128 (14.00), OSF520-075
(15.00), OSF520-031 (16.00), OSF520-142 (17.00), OSF520-141 (18.00), OSF520-039
(19.00), OSF520-127 (20.00), OSF520-033 (21.00), OSF520-024 (22.00), OSF520-120
(23.00), OSF520-029 (24.00), OSF520-051 (25.00), OSF520-052 (26.00), OSF520-131
(27.00), OSF520-055 (28.00), OSF520-059 (29.00), OSF520-130 (30.00), OSF520-098
(31.00), OSF520-129 (32.00), OSF520-035 (33.00), OSF520-064 (34.00), OSF520-109
(35.00), OSF520-100 (36.00), OSF520-101 (37.00), OSF520-062 (38.00), OSF520-106
(39.00), OSF520-117 (40.00), OSF520-125 (41.00), OSF520-063 (42.00), OSF520-016
(43.00), OSF520-096 (44.00), OSF520-092 (45.00), OSF520-112 (46.00), OSF520-108
(47.00), OSF520-133 (48.00), OSF520-137 (49.00), OSF520-067 (50.00), OSF520-032
(51.00), OSF520-086 (52.00), OSF520-111 (53.00), OSF520-147 (54.00), OSF520-080
(55.00), OSF520-047 (56.00), OSF520-073 (57.00), OSF520-107 (58.00), OSF520-002
(59.00), OSF520-060 (60.00), OSF520-151 (61.00), OSF520-113 (102.00), OSF520-070
(63.00), OSF520-110 (104.00), OSF520-123 (214.00), OSF520-093 (236.00), OSF520-150
(246.00), OSF520-156 (247.00), OSF520-172 (248.00), OSF520-168 (250.00), OSF520-183
(270.00), OSF520-192 (271.00), OSF520-203 (272.00), OSF520-196 (273.00), OSF520-186
(274.00), OSF520-191 (275.00), OSF520-204 (276.00), OSF520-201 (277.00), OSF520-205
(279.00), OSF520-221 (296.00), OSF520-215 (298.00), OSF520-247 (321.00), OSF520-284
(323.00), OSF520-313 (325.00), OSF520-189 (290.00), OSF520-119 (152.00), OSF520-079
(93.00), OSF520-084 (95.00), OSF520-274 (328.00), OSF520-305 (329.00), OSF520-248
(330.00), OSF520-237 (331.00), OSF520-299 (332.00), OSF520-293 (333.00), OSF520-309
(334.00), OSF520-316 (335.00), OSF520-275 (336.00), OSF520-277 (337.00), OSF520-250
(338.00), OSF520-193 (339.00), OSF520-206 (340.00), OSF520-242 (341.00), OSF520-320
(342.00), OSF520-188 (343.00), OSF520-209 (344.00), OSF520-337 (345.00), OSF520-177
(346.00), OSF520-307 (347.00), OSF520-256 (348.00), OSF520-330 (349.00), OSF520-285
(350.00), OSF520-132 (351.00), OSF520-267 (352.00), OSF520-152 (353.00), OSF520-271
(354.00), OSF520-298 (355.00), OSF520-297 (356.00), OSF520-245 (357.00), OSF520-328
(358.00), OSF520-184 (359.00), OSF520-240 (360.00), OSF520-262 (361.00), OSF520-180
(362.00), OSF520-190 (363.00), OSF520-259 (364.00), OSF520-356 (365.00), OSF520-157
(366.00), OSF520-198 (367.00), OSF520-258 (368.00), OSF520-197 (369.00), OSF520-315
(370.00), OSF520-325 (371.00), OSF520-360 (372.00), OSF520-286 (373.00), OSF520-140
(374.00), OSF520-266 (375.00), OSF520-326 (376.00), OSF520-342 (377.00), OSF520-278
(378.00), OSF520-327 (379.00), OSF520-296 (380.00), OSF520-314 (381.00), OSF520-166
(382.00), OSF520-302 (383.00), OSF520-202 (384.00), OSF520-310 (385.00), OSF520-263
(386.00), OSF520-264 (387.00), OSF520-257 (388.00), OSF520-319 (389.00), OSF520-311
(390.00), OSF520-253 (391.00), OSF520-323 (392.00), OSF520-329 (393.00), OSF520-287
(394.00), OSF520-238 (395.00), OSF520-145 (396.00), OSF520-231 (397.00), OSF520-265
(399.00), OSF520-334 (543.00), OSF520-338 (590.00), OSF520-418 (592.00), OSF520-501
(596.00), OSF520-102 (203.00), OSF520-407 (594.00), OSF520-378 (597.00), OSF520-487
(598.00), OSF520-385 (599.00), OSF520-478 (600.00), OSF520-429 (601.00), OSF520-369
(602.00), OSF520-464 (603.00), OSF520-432 (604.00), OSF520-358 (605.00), OSF520-401
(606.00), OSF520-414 (607.00), OSF520-347 (608.00), OSF520-502 (609.00), OSF520-468
(610.00), OSF520-474 (611.00), OSF520-377 (612.00), |
Patch 846.00
continued
|
OSF520-498 (613.00), OSF520-341 (614.00),
OSF520-404 (615.00), OSF520-410 (616.00), OSF520-439 (617.00), OSF520-517
(618.00), OSF520-363 (619.00), OSF520-409 (620.00), OSF520-349 (621.00), OSF520-405
(622.00), OSF520-516 (623.00), OSF520-434 (624.00), OSF520-460 (625.00), OSF520-453
(626.00), OSF520-408 (627.00), OSF520-365 (628.00), OSF520-471 (629.00), OSF520-384
(630.00), OSF520-450 (631.00), OSF520-451 (632.00), OSF520-420 (633.00), OSF520-389
(634.00), OSF520-473 (635.00), OSF520-402 (636.00), OSF520-462 (637.00), OSF520-379
(638.00), OSF520-376 (639.00), OSF520-438 (640.00), OSF520-395 (641.00), OSF520-428
(642.00), OSF520-475 (643.00), OSF520-470 (644.00), OSF520-348 (645.00), OSF520-353
(646.00), OSF520-449 (647.00), OSF520-355 (648.00), OSF520-357 (649.00), OSF520-459
(650.00), OSF520-386 (651.00), OSF520-312 (652.00), OSF520-503 (653.00), OSF520-413
(654.00), OSF520-524 (655.00), OSF520-399 (656.00), OSF520-361 (657.00), OSF520-491
(658.00), OSF520-406 (659.00), OSF520-513 (660.00), OSF520-489 (661.00), OSF520-398
(662.00), OSF520-512 (663.00), OSF520-525 (664.00), OSF520-448 (665.00), OSF520-390
(666.00), OSF520-344 (667.00), OSF520-411 (668.00), OSF520-440 (669.00), OSF520-467
(670.00), OSF520-499 (671.00), OSF520-455 (672.00), OSF520-472 (673.00), OSF520-383
(674.00), OSF520-403 (675.00), OSF520-371 (676.00), OSF520-373 (677.00), OSF520-469
(678.00), OSF520-452 (680.00), OSF520-520 (834.00), OSF520-555 (835.00), OSF520-520
(837.00), OSF520-467A (842.00)
This patch corrects the following:
Fixes "ata_probe: reset failed, sts=0x7f, err=0x7f"
errors for IDE disks not connected to the system.
Updates the EMX driver to vV2.02 and fixes the following problems:
Updates the EMX driver to V2.01.
Fixes a problem of unexpected tape I/O aborts.
Fixes a panic of "can't grow probe list".
Fixes several kernel memory faults within the driver.
Redundant adapter failures no longer panic the system.
Corrects a problem of panicking with low memory resources.
Corrects stalling I/O during reprobing when a cluster member
goes down.
Fixes some problems seen with loading and unloading dynamic
drivers.
|
Patch 846.00
continued
|
Fixes a problem where, when using VX1 graphics module, the
mouse cursor disappears when moved along the left and topmost edges.
Fixes a kernel crash dump generation problem which resulted
in the wrong page(s) being compressed/written.
Without this fix, postmortem
debugging may be difficult or impossible.
Fixes a "simple_lock timeout" system panic due to a bug between
mcs_unlock and mcs_lock_try on the same CPU.
Provides NHD4 enablers for future hardware support.
Provides a new /usr/sbin/wol command that utilizes the Wake
(remotely power) feature for a future platform through the network (LAN).
Provides NHD4 enables for future hardware support of a graphics
device.
Fixes a time loss problem seen on DS systems (TSUNAMI) only
when using console callbacks.
The patch resynchronizes the clock when a time
loss is detected.
Fixes a rare panic in the driver for the DE600/DE602 10/100
Ethernet adapter.
Provides NHD4 enablers for future hardware support of a new
platform.
Fixes a domain panic pointing to quotaUndo, when a domain
has a fileset with a clone, the clone is deleting, and a file in the fileset
finds no space available in the domain.
Corrects a problem where the network subsystem sometimes sends
a null TCP packet when a connection is reset.
Provides enabler support for Enterprise Volume Manager product.
Fixes a system panic with "malloc_check_checksum: memory pool
corrution".
Fixes a problem in which issuing a quot -h command causes
a memory fault when the /etc/fstab file contains a mount point that is not
mounted.
A potential security vulnerability has been discovered in
the kernel where, under certain circumstances, a race condition can occur
that could allow a nonroot user to modify any file and possibly gain root
access.
Fixes the problem with IPv6 raw socket creations.
Corrects a CFS problem that could cause a panic with the panic
string of "CFS_INFS full".
Fixes a problem with erroneous data being returned from the
DEVIOCGET ioctl if an error occurs while processing the ioctl.
Fixes a problem in which a TCP socket can continue to receive
data with no application running.
|
Patch 846.00
continued
|
Fixes a performance problem.The results are large performance
increases in configurations where more than 8 tapes are supported on a Fibre
Channel (usually behind an MDR or FCTCII).
Allows a single ddr.dbase entry to support a particular SCSI
device on both parallel SCSI and FC buses.
Previously, SCSI devices connected
behind an FCTCII or MDR would not be properly associated with their ddr.dbase
entry.
Fixes a panic experienced while task swapping.
Fixes a bug in virtual memory that can cause a kernel memory
fault.
Provides NHD4 enablers for future hardware support for an
array controller.
Fixes to some problems found with RAID Services that include:
Raid services not acknowledging presence of CAM RAID device
A hang
The inability to prohibit a user from deleting a logical
volume while it is in use
A "malloc_check_checksum: memory pool corruption" system
panic
Fixes the following two problems:
Threads can hang in x_load_inmem_xtnt_map().
The I/O transfer rate can suddenly drop when writing to a
hole in an AdvFS domain, when a volume in that domain becomes full.
|
Patch 846.00
continued
|
Fixes the following Virtual Memory problems.
The first three
are seen on NUMA systems only, and the fourth problem can be seen on any system
type:
A "vm_pg_alloc: page not free" system panic that occurs
during process migration.
A "vm_pageout_activate: page already active" system panic
that occurs if one thread is unlocking some pages in
memory while another thread is migrating them.
Memory inconsistencies caused by the fault path for large
shared memory regions prematurely releasing a hold on a page
it just locked.
This can cause a variety of problems, including user
program errors and system panics.
A "simple_lock: time limit exceeded" system panic that
occurs if very large (8 MB or larger) System V Shared memory regions
are in use.
Fixes a problem with the memory controller attempting to post
an EVM event indicating that a particular PFN has been mapped out.
Fixes lock time issues, UBC performance problems, and provides
AdvFS and UFS performance improvments in platforms (other than AlphaServer
GSxxx) with low memory.
Fixes several bugs related to shared memory (memory that can
be accessed by more than one CPU) that could lead to panics, hangs, and performnace
problems.
Fixes a bug that can cause performance problems for certain
applications when the sysconfigtab parameter ipc:sem_broadcast_wakeup is set
to 0.
A check for managed address may return an invalid value when
called with the address of a gh region not on rad 0.
Fixes a kernel memory fault in msg_rpc_trap.
Fixes a potential problem with lost data after a direct I/O
write with a file extension followed quickly by a system crash.
Fixes a crash that occurs when disk controllers are restarted
repeatedly.
Fixes a "u_shm_oop_deallocate: reference count mismatch" due
to a bug in locking mechanism when gh_chunks are in use.
Provides the I/O barrier code that prevents HSG80 controller
crashes (firmware issue).
Corrects the problem of a thread deadlocking against itself
under the following conditions:
Running in a cluster.
Opening (and then closing) a directory that has an index file.
Trying to open the index file through .tags (for example,
defragment does that) and by coincidence getting the vnode that pointed to
the directory that the index file is attached to.
Fixes a kernel panic with the message "bs_invalidate_rsvd_access_struct:
bad access struct".
|
Patch 846.00
continued
|
Ensures that DMAPI region information maintains consistency
across CFS server and client nodes in the case that an unexpected node failure
occurs.
Fixes a problem where additional HSZ70 control ports, /dev/cport/scpN,
were created during HSZ70 controller failover operations.
Prevents a crash seen while deleting SCSI devices using hwmgr.
A potential security vulnerability has been discovered where,
under certain circumstances, system integrity may be compromised.
This could
result in a panic with the string: "lock_clear_recursive: recursion not
enabled".
We have corrected this potential vulnerability.
Fixes a problem where new devices could be created when following
the HSZ70 controller failover procedure.
Fixes the problem where reading a clone file that is still
in the UBC after an rmvol may panic the system.
Fixes a problem where a variable was used without being initialized,
which could lead to a possible kernel memory fault.
Provides AdvFs and VFS support for freezefs and thawfs.
Provides the enabler for Enterprise Volume Manager Version
2.
Corrects several CAM errors including the following:
Passthru IOCTL fails with EIO (CAM_BUSY) problem.
RESERVATION CONFLICT driver BUSY problem.
Enforces super user-only access for SCSI passthrough.
Enables access to SCSI control ports (/dev/cport/scp??), allowing
management of some types of RAID controllers.
Eliminates unintended AutoFS auto-mount storms.
Extraneous "This node removed from cluster" events cause panics
of cluster nodes.
Fixes a panic that occurs if DMAPI operations are erroneously
executed on an NFS filesystem.
Processes triggering stack growth with anon_rss_enforce set
to 2, and exceeding the set resident memory limit, hang, or panic.
Fixes a kernel panic with the messages "xfer_hole_stg: unaligned
kernel access" or "xfer_hole_stg: kernel memory fault".
|
Patch 846.00
continued
|
Fixes a timing window where flushing data to disk can be
incomplete when a system is going down, if more than one thread calls reboot()
without first going through shutdown, /sbin/reboot, or /sbin/halt.
Ensures that if an AdvFS file is opened for both O_DIRECTIO
and O_APPEND, threads racing to append data to the file will be correctly
synchronized, and all data will be appended to the file.
Fixes several direct I/O problems seen when using the
AIO interface.
The symptoms include a kernel memory fault, and an AIO condition
that causes a live_dump to be generated.
Fixes a condition where the smoothsync thread, in attempting
to flush dirty buffers for memory-mapped files, would also flush buffers
for nonmemory-mapped files.
This did not cause any errors, but could cause
more I/O than necessary to be done.
Allows POSIX semaphores/msg queues to operate properly on
a CFS client.
Fixes the following problems:
Prevents a race in msfs_umount.
Provides a fix to a deadlock situation that can occur when
you invoke the hwmgr -show comp command while the devices on an HSZ70 are
changing their names.
The devices on an HSZ70 would change their names when
you set nofailover or when you set failover on the HSZ70.
Fixes a problem where network interfaces can appear unresponsive
to network traffic.
Do not print "path reduced" messages at boot time for devices
that still have at least one valid path.
Enables the quick reclaim and deallocation of a vnode.
Under stress conditions where the DMAPI functionality is in
use, a panic may occur.
A fix is available for this problem.
Fixes a problem where the setgid bit of a directory was not
being set when created, if its parent directory has the setgid bit set.
Corrects several problems in kernel routing:
Fixes a panic when deleting an IP address.
Fixes a panic when performing IP reconfiguration.
Fixes to add interface route on address configuration.
Fixes the panic "ics_unable_to_make_progress: input thread
stalled".
|
Patch 846.00
continued
|
Addresses three UBC issues:
Reinstates ubc_maxpercent hardlimit behavior.
Allows the UBC to purge and steal pages under very low free
memory conditions during page allocation.
Removes memory mapping for NFS pages being invalidated and
freed.
Pages were being freed but still mapped the process.
Provides an NFS fix to support the Enterprise Volume Manager
product.
Corrects a performance problem where NFS V3 I/O used larger
than necessary buffers when writing to locked files resulting in lower throughput.
Provides a script, /usr/sbin/evm_versw_undo, that will allow
a user to remove the EVM patch after the version switch has been thrown by
running clu_upgrade -switch.
This script will set back the version identifiers,
request a cluster shutdown, and reboot to finish the deletion of the patch.
Another rolling upgrade will be required to delete the patch with dupatch.
Provides an enabler for a version-switched patch.
A SCSI Check Condition with NO SENSE status will now be treated
by the disk driver as a condition to retry the I/O.
Fixes a panic that could occur if an illegal argument is passed
to UFS mount by a root user.
Fixes a kernel build failure when AdvFs is excluded from the
build.
Fixes a problem where the system may be hung or there are
poor response times on systems with limited numbers of CPUs.
Fixes an "RDG unwire panic" when running with RDG and GH chunks.
Resolves a problem where duplicate attributes are registered
for all CAM devices present in a system.
This affects iostat output and any
other application that relies on the attribute data.
Adds fixes for additional firmware problems found in the HSx
controller.
Fixes the scheduler at high load averages and initial NUMA
process placement.
Fixes a rmvol failure that would be seen as an E_PAGE_NOT_MAPPED
error when no more space is available for user data migration to another
volume in the domain.
|
Patch 846.00
continued
|
Fixes the following tape drive problems:
Tape devices in multipath configurations unexpectedly rewind
or go off line.
(Multipath means that I/O can reach the device by an alternate
data path, such as a redundant controller or bus.) Note that this patch
reverts your tape drive configuration to single path mode.
The vdump utility fails to close because the drive goes off
line before the dump operation is complete.
An error message similar to
the following is displayed:
vdump: unable to properly close device <dev/tape/tape1_d1>; [5] I/O error
Opening a disk partition sometimes fails when the disk is
on shared bus.
Fixes "kernel memory fault" panic on NUMA systems because
of corrupt UBC LRU.
Fixes poor interactive response including hanging commands
and logins, and random drops in I/O rates when writing many large files.
Fixes a potential problem in which stale data may be returned
to an application running on a CFS client when it reads data from a file
on a CFS server.
Another possible symptom is incomplete flushing of user
data when an fsync() is issued or an O_[D]SYNC write is performed.
A potential security vulnerability has been discovered where,
under certain circumstances, system integrity may be compromised.
This may
be in the form of improper file access.
We have corrected this potential
vulnerability.
New Barrier code will not reserve after a registration if
new device or new cluster install.
HSV110 Persistent Reserve with a Reservation conflict SCSI
status gets passed off to cam_notify when it should not, resulting in incorrect
reservation status.
Addresses a data inconsistency that can occur when a CFS client
reads a file using direct I/O that was recently written to.
Fixes a SEL logging problem where panic events were logged
as misc events.
It also adds new event types that can be logged.
Fixes a problem in which the system could panic while performing
CPU hotswap.
A potential security vulnerability has been discovered in
networking where, under certain circumstances, a remote system can take over
packets destined for another host.
Link Aggregation groups can be successfully created and configured
but are unable to successfully transmit and receive packets over the resulting
lag interface.
Prevents a potential panic with non-StorageWorks RAID controllers
that used the same name for a controller and a disk drive.
This conflict was
resolved in a prior release but left open the possibility that any attempt
to access this disk drive by the kernel could result in a system panic.
Supports a related cluster patch.
|
Patch 846.00
continued
|
Removes a panic seen at boot time of the form:
panic (cpu 6): u_anon_oop_deallocate: anon_rss_pagelist has pages queued
A potential security vulnerability has been discovered where,
under certain circumstances, system integrity may be compromised.
This may
be in the form of file corruption due to the manner in which setuid/setgid
programs core dump.
We have corrected this potential vulnerability.
Fixes a kernel memory fault in wait_to_readyq(), or advfs_page_busy(),
or potentially other routines which may reference a vm_page, bsBuf, or ioDesc
that has been freed prematurely.
Fixes the C++ incompatibility of the following:
/usr/include/io/dec/bi/bdareg.h
/usr/include/io/dec/bi/buareg.h
/usr/include/io/dec/eisa/aceregs.h
/usr/include/io/dec/eisa/eisa.h
/usr/include/io/dec/fbus/fbusreg.h
/usr/include/io/dec/pci/pci.h
/usr/include/io/dec/pcmcia/pcmcia.h
/usr/include/io/dec/pcmcia/ti1130_reg.h
/usr/include/io/dec/tc/sccreg.h
/usr/include/io/dec/tc/tc.h
/usr/include/io/dec/ws/comet_driver.h
/usr/include/io/dec/ws/comet_regs.h
/usr/include/io/dec/ws/inputdriver.h
/usr/include/io/dec/ws/ws_driver.h
The published cam_logger() interface was modified in V5.1A
to accept a hardware ID in its parameter list.
This patch restores the cam_logger
interface to its published specifications, and introduces the cam_logger3()
interface to accept a hardware ID in its parameter list.
Addresses a potential UBC panic which could occur when accessing
CFS file systems.
Fixes a problem with vm_faults against anon objects mapped
by multiple map entries.
Contains AlphaServer ECC Enhancements for DTAG error logging.
Fixes a problem where decreasing the smoothsync_age does not
always have an effect.
Fixes a system panic and/or data inconsistencies caused by
changing FIFO parameter pipe-databuf-size while FIFO operations are in flight.
Fixes AdvFS synchonization problems with lingering I/O messages
during domain deactivation or rmvol.
It also fixes problems caused by certain
kmem_debug settings (kmem_debug=0x40, kmem_protected_size=4096) and AdvFS's
handling of freed memory.
Fixes and enhances Tru64 UNIX to support Encore realtime software.
Modifies rmvol so that error messages reflect why rmvol fails.
Modifies showfdmn so that showfdmn will not print "Succeeded"
on a failure.
For example:
showfdmn: unable to get info for domain `domain_used`
showfdmn: Successful
|
Patch 846.00
continued
|
Fixes a potential CFS deadlock.
Fixes a problem where, when running SSH V2.4.0 and vV2.4.1,
users will see a problem executing ls in sftp and when uploading public key
using ssh-pubkeymgr.
Fixes SEL logging problem where panic events were logged as
misc events.
It also adds new event types that can be logged.
Corrects a problem that is encountered when trying to create
an Oracle database on an AlphaServer GS system that has a memoryless QBB.
Without this patch, direct I/O to to an AdvFS file using asynchronous I/O
will hang if it is completed on a memoryless QBB.
Corrects problems when running the dd utility on a disk with
a label.
It would not return errors when expected.
A potential security vulnerability has been discovered where,
under certain circumstances, system integrity may be compromised.
This may
be in the form of improper file or privilege management.
We have corrected
this potential vulnerability.
Fixes a problem where I/O suspended (hung) in cluster configuration
where one or more rad does not have a valid, initialized path.
Fixes a problem that causes bugchecks from applications running
DECthreads.
Fixes locking on retry case for multithreaded select/poll.
A panic with the following panic string is indicative of this problem:
PANIC: "thread_block: simple lock owned"
Fixes a potential problem where system responsiveness may
be impacted.
Fixes a Kernel Memory Fault in DMAPI code under cluster stress
conditions.
Fixes a calculation leading to poor hash table distribution
for NFS client mountpoints in the cluster.
Eliminates unintended AutoFS automounts, in particular those
that may result via the execution of any pre-Tru64 UNIX V5.0 df command.
Corrects a problem where multivolume AdvFS V3 domains exhibit
I/O errors (not attributable to hardware).
The same problem also causes a
failed mkfset due to ENO_XTNTS.
Fixes a problem where storage allocation for a file opened
for direct I/O could, depending on the write sizes requested, have large extent
maps even though the disk was not fragmented.
Although the file functioned
correctly, performance was reduced by the numerous extent maps.
This fix reduces
the number of extent maps generated, and subsequently gives better I/O performance
on the resulting file.
File permissions inherited from a default ACL may be different
than expected in rare cases.
Corrects the problem where the DLI queue stalls when there
is no traffic in the TCP/IP or HDLC stacks.
Corrects a problem where clocks on systems could move backwards
after subsequent relocations of the root file system using cfsmgr.
|
Patch 846.00
continued
|
Two problems are corrected for non-NUMA systems:
A kernel stack not valid halt on a CPU, which will trigger
a PANIC TB_SHOOT ACK TIMEOUT or lock timeout.
A simple lock timeout, or a panic due to holding a simple
lock during a context switch.
Corrects an issue seen on NFS clients.
The aggressive behavior
of client negative lookup cache for concurrent create/lookup was tamed.
Corrects an issue with mmapped() files on an NFS mounted file
system.
Changes to an mmapped() file were not being immediately seen.
Fixes a problem where the tape changer is only accessible
from member that is the drd server for the changer.
Fixes a problem where socket-based applications can hang in
soclose().
During file system relocation the system may panic due to
a kernel memory fault when a directory larger than 8192 bytes has been deleted
while simultaneously being accessed by another thread.
Corrects a kernel memory fault on multiple CPU systems when
two or more CPUs find an AdvFS problem at the same time.
Fixes a problem where, after a system crash, on reboot there
is a domain panic.
Corrects the problem where attempts to delete psets can hang
the system.
Prevents an AdvFS metadata inconsistency in the event of a
system crash.
Prevents a possible extent map corruption when multiple volumes
are full.
Fixes a problem with multithreaded applications that can
cause the application to consume 100% of the CPU usage time.
Fixes a domain panic in a cluster when a file system is mounted
on a disk accessed remotely over the cluster interconnect.
Fixes locking problems in vclean().
Fixes the CEH bus/target and lun number when the LUN >
127.
|
Patch 846.00
continued
|
Fixes a kernel memory fault when freeing devices.
Corrects problems with USB causing panics under heavily stressed
systems.
Corrects a problem with the counters maintained for the NetRAIN
virtual interface.
Provides Version 1.02 of the Ciss Driver.
The psrinfo -v command may print an incorrect CPU cache size
in a mixed CPU size/speed environment.
Prevents a panic in assert_wait_mesg caused by the posting
of an event_wait without clearing a previous request.
Fixes a problem where tape and changer devices on Fibre Channel
could occassionally return an incorrect offline status.
Enables the kernel crash dump subsystem to generate a dump
after disk driver shutdown has taken place.
Fixes a potential "kernel memory fault" panic in the Virtual
Memory subsystem on SMP systems.
Adds hardware support for the DS25, and fixes a minor bug
in the ES45 environmental error handling code.
Corrects problems where NFS can deadlock and also corrects
an AdvFS problem where EIOs are returned by AdvFS to NFS.
Addresses a kernel memory fault panic in malloc_thread().
Fixes the predictable TCP Sequence Number.
Addresses a data inconsistency that can occur when a CFS client
reads a file that was recently written to.
Supports a related cluster patch to support multiple filesets
being mounted from the cluster_root domain.
Fixes a potential deadlock situation when using freezefs on
multiple domains while also running addvol (or rmvol).
Fixes numerous problems of accessing deallocated and freed
vnodes.
Fixes several problems in Link Aggregation (LAG):
Cannot modify the ipmtu of a LAG interface.
May attempt to use a link that is down.
Poor performance in server-to-server configurations.
Fixes a situation where a failed open to a device will cause
an error so that the device cannot be deleted using hwmgr.
Fixes an incorrect return type in a logging routine that prevented
proper operation of the memory troller on a DS20L.
When offlining a processor, a seldom taken code path may attempt
to take a complex (sleep or blocking) lock while in interrupt context.
Since
it is illegal to block in interrupt context, the kernel panics.
Fixes a potential problem with vdf and showfdmn, where they
could incorrectly display the message:
showfdmn: No such file or directory
Prevents a cluster filesystem-server panic that can occur
if a cluster client clears the server cache entries for a file being operated
on by defragment, balance, migrate, rmvol, or mssh.
|
Patch 846.00
continued
|
Fixes several problems found in the KZPEA driver that could
result in hung I/O, pending I/O not being cleared on a reset, panics seen
when aborting I/O, and a hard error returned to applications on opens during
reset conditions.
A potential security vulnerability has been discovered where,
under certain circumstances, system integrity may be compromised.
This may
be in the form of improper file access.
We have corrected this potential
vulnerability.
Contains changes to the evm_versw_undo script to fix no-roll
installation and deletion of the EVM version-switched patch.
Fixes a problem with the logging of MUNSA reject status messages
to the console during boot which could cause a system to boot extremely slow.
Fixes a kernel memory fault from sth_close_fifo() caused by
a NULL pointer.
Fixes an ISO9660 file system size limitation of 2.1 GB and
provides full capacity access to DVDROM media.
Cluster unlinked files are now handled properly during a relocation.
Fixes a deadlock problem when deleting devices while the system
disk is in error recovery.
Recovers the POSIX semantics for accessing "." entry.
Closes a race condition between VFS and UFS layer code that
causes panic while periodic sync mechanism flushes dirty buffers out to disks.
Fixes performance shortcomings in NXM thread replacement.
Reduces the number of inputs/outputs to the disk, which reduces
the number of audible disk ticks.
Fixes a problem for NFS mounts using the -o proplist option, where disk
space is not being freed when files are deleted.
Fixes a kernel memory fault in u_seg_global_destroy.
Fixes a crash when an AdvFS filesystem reports I/O errors
and enters into a domain panic state.
AdvFS's error cleanup would panic on
an invalid pointer and report an "invalid memory read access from kernel mode"
panic message.
Fixes an ISO9660 file system size limitation of 2.1GB and
provides full capacity access to DVDROM media.
Fixes a problem which can prevent certain tape applications
from recovering paths to devices that have failed.
Prevents a panic from occurring while trying to mount an AdvFS
domain.
The panic would only appear when the mount command was about to fail.
Fixes a problem with the logging of MUNSA reject status messages
to the console during boot which could cause a system to boot extremely slowly.
It also corrects a problem with reservation conflicts in the TUR tecovery
loops.
Fixes two NFS kernel memory fault panics due to bad NFS server
data.
Corrects "u_anon_free: page busy" panics.
Corrects a problem where an I/O can fail back to the application
when a HSV110 V2 path failover is performed.
This is incorrect behavior;
the application should not have the I/O returned with a failure status when
a path failover occurs.
|
Patch 846.00
continued
|
Corrects a problem where a tape open with no tape present
in the drive can take as long as six minutes to fail.
Fixes a VFS namecache race condition where both positive and
negative namecache entries can exist.
Corrects a problem where low UBC memory conditions cause hang
in AdvFS.
Corrects a problem in cluster backups of global root directories
or backup of different system disks in a cluster.
Fixes an AdvFS alignment fault panic.
The panic is caused
by inconsistent AdvFS metadata in a directory.
In particular, the directory's
entry size is an unaligned value.
If an I/O fails and it may be helped by an AdvFS-initiated
retry, a message will be written to the console providing information on how
to retry.
Fixes a problem where an internal value related to the maximum
I/O size for a device was being calculated incorrectly.
Provides support for the DEGXA Gigabit Ethernet device, including
the ES25 onboard 10/100/1000 Ethernet port.
Adds the Reserve/Release/Path_Lock feature to tape and changer
drivers.
Corrects a problem of writing erroneous data to the binary
error log file and provides missing header definitions for error interpretation.
Contains a variety of domain panic fixes that better capture,
explain, and handle domain panics.
Fixes a cluster-as-NFS-server chown() problem.
Fixes a problem where the system panics while running applications
performing open of RAID device, and the faulting routine is control_port_open.
Fixes a problem where cluster filesystem I/O and AdvFS domain
access causes processes to hang.
Fixes a situation in which a system running cdrecord software
experiences I/O timeout errors when writing CDs.
Corrects a silent infinite loop in vdump by correcting the
AdvFS system call OP_GET_BKUP_XTNT_MAP.
The call will now return the valid
xtntCnt when it fails due to E_NOT_ENOUGH_XTNTS.
Fixes a problem where, in certain cases, large files (~30Gb)
suffered extreme fragmentation.
|
Patch 846.00
continued
|
Fixes a kernel panic of "bfs_alloc: kernel memory fault".
Corrects a problem which had resulted in broadcast or multicast
packets being processed multiple times on behalf of a NetRAIN device, once
for each backup interface.
Fixes a problem that caused the 4.3BSD socket interface to
return incorrect values for IOCTL calls accessing IP alias address information.
Supports a cluster patch which corrects a performance issue
seen when multiple threads/processes simultaneously access the same file on
an SMP (>1 CPU) system.
Fixes a problem where, when entering the hwmgr -view devices
command on a member in a cluster, the device name would not be updated and
would be listed as unknown.
When adding a CDROM or floppy disk after boot, only A and
C device special files would get created.
In order to create all the device
special files, the usere would have to enter dsfmgr -K or reboot.
This no
longer needs to be done by the user.
Fixes heap and stack limitations in the older OS versions
required for SAP.
Prevents several possible system panics and an AdvFS deadlock.
Fixes a problem that allowed an application with superuser
privileges to cause a system panic when attempting to delete a nonexistent
connection; for example, when the program tcpkill runs while stopping ASU.
Fixes an AdvFS AIO read timing issue when reading a fragged
file via directIO.
Prevents a panic when more metadata file space is needed and
the disk write to allocate it fails.
Removes a restriction where dynamic VMEbus device drivers
could only probe one controller per driver.
Multiple controllers per driver
now configure successfully.
Fixes kernel memory faults caused by ufs_sync_int accessing
an inactivated or de-allocated vnode.
This change also corrects a problem
with negative block number detection in ufs_stratgey.
Provides support for the pseudo device /dev/poll to the kernel
which allows for very efficient polling of a large number of file descriptors.
Corrects a problem that caused the RFC 2001 Fast Retransmit
Algorithm within the kernel to work incorrectly.
Fixes three problems with the ee driver for DE60x Ethernet
cards.
These problems affect all Tru64 systems containing DE60x network interfaces.
Fixes a race condition that can cause a panic when a transmit
timeout occurs.
Improves error checking when allocating buffers.
Fixes DMA resource allocation to prevent a panic when
a machine runs low on DMA resources.
|
Patch 846.00
continued
|
Adds a new ee subsystem attribute link_check_interval that
allows the link state polling interval to be tuned for faster failover times
when using DE60x interfaces for Link Aggregation.
Fixes a DMAPI problem where showfile can show that DMAPI regions
exist when they do not.
Supports a cluster-specific patch which fixes a race between
cluster mounts and file system lookups, and fixes a situation in which file
system failover deadlocks.
Fixes an NFS readahead performance problem where performance
is degraded when reading past two gigabytes in a file.
Fixes a problem where advscan incorrectly processes concatenated
options (e.g., -ar vs.
-a -r).
For instance, if -ar is specified, the (-r)
option will not be processed.
Prevents a lock hierarchy violation from occurring when AdvFS
tries to extent a file on a system that is out of memory.
Addresses the problem of applications hanging with outstanding
I/O during high volume I/O in a cluster environment.
Provides I/O resiliency improvements.and prevents some AdvFS
domain panics due to inadequate error handling between the HSG80 and the Tru64
disk driver.
Updates the EMX driver to v2.03 and fixes a problem which
could cause an EMX driver panic during adapter resets.
Re-enables mountd to support exports file with multiline entry
using leading spaces as continued line indicator.
The problem was introduced
with a patch that increases support of NFS file mounting from 254 to 1024
entries.
Corrects a problem with arp messages not being sent on interface
static routes.
Provides the PCI indictment for storage component location
to diagnose a PCI adapter failure.
Resolves a deadlock problem as well as a potential problem
with incorrect or inconsistent cluster devts that could occur in a cluster
when removing or replacing a device.
Corrects a problem where moving the power supply from one
slot to another can cause a panic.
Corrects a possible panic when auditing execve with exec_argp/exec_envp
enabled.
Allows the device special file instance numbers to be reduced
to the their lowest possible value and avoid runaway device names.
Fixes a problem where, under certain conditions, invalidating
a portion of a very large file can make the filesystem appear to be hung.
Any program trying to access the filesystem, ls for example, will hang until
the file is invalidated.
This will only happen when rt_preempt_opt=1.
Allows multiple applications utilizing RAID Services to send
maintenance commands without interfering with each other.
Prevents different threads on multiple RADs from creating
multiple references to the same level 3 page table.
Fixes new_wire_method (light weight wiring) issues known as
the Oracle connect problem or Oracle performance problem.
Corrects an ARMTech kernel malloc invalid size panic.
|
Patch 846.00
continued
|
Addresses an issue with regards to creation of a crashdump
on certain systems that use granularity hints regions.
Increases the number of filesystems that can be mounted from
256 to 1024.
It also fixes audit to generate exportfs_create audit records
correctly.
Prevents a situation in which the disk drives on a DS25 overheat
if the system door is removed for too long.
A kernel memory fault panic could occur in irefresh while
walking the mounted vnode list.
Fixes a problem resulting in a system panic for applications
that directly call nxm_get_bindings.
Allows users other than root to now mount CDROM media on directories
that they own.
Fixes a bug that prevented AdvFS from working correctly with
LSM volumes between 1Tb and 2Tb.
Also, mkfdmn and addvol will now issue a
warning if an attempt is made to use an LSM volume greater than 2Tb in size.
Corrects a potential loss of data in files opened for directIO
when writing in increments smaller than 8 K.
A potential security vulnerability has been discovered where,
under certain circumstances, system integrity may be compromised.
This may
be in the form of improper file access.
We have corrected this potential
vulnerability.
Fixes a problem in network Link Aggregation (LAG) where the
MAC address of a LAG interface would change if the link from which it had
derived its MAC address went down.
Fixes a kernel panic with a "get_xm_page_range_info:kernel
memory fault" message.
Addresses several issues with page faults and stack object
growth.
Corrects a problem where df was showing negative values for
large NFS file systems.
Corrects a problem where multi-threaded processes may hang
in timed condition waits (pthread_cond_timedwait()) when running realtime
system contention scope threads.
Enables a larger maximum 1,073,741,824 for the inode_hash_size
attribute in the UFS subsystem.
Fixes a problem that was causing the tcp_rad_fasttimo timer
to consume excessive amounts of CPU time.
When mounting an AdvFS filesystem with the -o dual option
in a cluster, the domain ID was not always being updated.
If the mount -o
dual happened on a node other than the node that was serving the original
domain, AdvFS did not detect that the domain ID was already active and failed
to update the ID for the new domain.
The fix is to always create a new domain
ID when the -o dual option is used.
Corrects a problem introduced in a prior patch which can result
in a system panic when outputting through the packet filter.
This problem is seen when previously failed paths to a device
(for example, hsz80) are restored.
It can cause panics of cluster members.
Fixes a problem where AdvFS domains from a pre-V5.0 system
that are mounted on a V5.1A Patch Kit 3 system would give "corrupted directory
entry size" error messages when some files were accessed.
|
|
|