2    Summary of Base Operating System Patches

This chapter summarizes the base operating system patches included in Patch Kit-0003.

Table 2-1 lists patches that have been updated.

Table 2-2 provides a summary of patches.

Table 2-1:  Updated Base Operating System Patches

Patch IDs Change Summary
Patches 691.00, 693.00, 699.00, 701.00, 705.00, 711.00, 713.00, 718.00, 729.00, 731.00, 733.00, 739.00, 741.00, 749.00, 751.00, 753.00, 755.00, 757.00, 759.00, 761.00, 763.00, 765.00, 767.00, 769.00, 771.00, 773.00, 779.00, 787.00, 789.00, 791.00, 793.00, 795.00, 801.00, 803.00, 809.00, 824,00, 826.00, 828.00, 830.00, 832.00, 840.00 New
Patches 208.00, 429.00, 430.00, 432.00 Superseded by Patch 695.00
Patches 433.00, 434.00, 436.00 Superseded by Patch 697.00
Patches 119.00, 451.00, 3.00, 5.00, 447.00, 449.00, 113.00, 115.00, 706.00, 707.00, 709.00 Superseded by Patch 709.01
Patches 109.00, 110.00, 112.00, 282.00, 284.00, 442.00, 444.00, 714.00 Superseded by Patch 716.00
Patch 471.00 Superseded by Patch 720.00
Patches 472.00, 473.00, 474.00, 475.00, 477.00, 721.00 Superseded by Patch 723.00
Patches 493.00, 495.00 Superseded by Patch 725.00
Patches 496.00, 498.00 Superseded by Patch 727.00
Patches 125.00, 309.00, 460.00, 461.00, 463.00, 734.00, 735.00 Superseded by Patch 737.00
Patches 521.00, 742.00 Superseded by Patch 744.00
Patches 523.00, 745.00 Superseded by Patch 747.00
Patch 584.00 Superseded by Patch 775.00
Patch 586.00 Superseded by Patch 777.00
Patches 80.00, 418.00, 780.00 Superseded by Patch 782.00
Patches 82.00, 420.00, 783.00 Superseded by Patch 785.00
Patches 261.00, 483.00 Superseded by Patch 797.00
Patch 175.00 Superseded by Patch 799.00
Patch 216.00 Superseded by Patch 805.00
Patches 191.00, 2.00, 121.00, 241.00, 243.00, 400.00, 401.00, 402.00, 403.00, 404.00, 405.00, 406.00, 407.00, 408.00, , 409.00, 410.00, 412.00, 307.00, 302.00, 162.00, 253.00, 255.00, 90.00, 218.00, 303.00, 305.00, 421.00, 422.00, 423.00, 424.00, 426.00, 681.00, 682.00, 683.00, 684.00, 685.00, 686.00, 687.00, 689.00 Superseded by Patch 807.00
Patch 230.00 Superseded by Patch 811.00
Patch 547.00 Superseded by Patch 813.00
Patch 549.00 Superseded by Patch 815.00
Patches 165.00, 167.00, 557.00 Superseded by Patch 817.00
Patches 177.00, 559.00, 818.00, 819.00, 820.00 Superseded by Patch 822.00
Patches 67.00, 582.00, 574.00, 576.00, 703 Superseded by Patch 839.00
Patches 541.00, 146.00, 148.00, 126.00, 127.00, 128.00, 129.00, 130.00, 131.00, 132.00, 134.00, 286.00, 6.00, 7.00, 8.00, 9.00, 10.00, 11.00, 12.00, 13.00, 14.00, 15.00, 16.00, 17.00, 18.00, 19.00, 20.00, 21.00, 22.00, 23.00, 24.00, 25.00, 26.00, 27.00, 28.00, 29.00, 30.00, 31.00, 32.00, 33.00, 34.00, 35.00, 36.00, 37.00, 38.00, 39.00, 40.00, 41.00, 42.00, 43.00, 44.00, 45.00, 46.00, 47.00, 48.00, 49.00, 50.00, 51.00, 52.00, 53.00, 54.00, 55.00, 56.00, 57.00, 58.00, 59.00, 60.00, 61.00, 102.00, 63.00, 104.00, 214.00, 236.00, 246.00, 247.00, 248.00, 250.00, 270.00, 271.00, 272.00, 273.00, 274.00, 275.00, 276.00, 277.00, 279.00, 296.00, 298.00, 321.00, 323.00, 325.00, 290.00, 152.00, 93.00, 95.00, 328.00, 329.00, 330.00, 331.00, 332.00, 333.00, 334.00, 335.00, 336.00, 337.00, 338.00, 339.00, 340.00, 341.00, 342.00, 343.00, 344.00, 345.00, 346.00, 347.00, 348.00, 349.00, 350.00, 351.00, 352.00, 353.00, 354.00, 355.00, 356.00, 357.00, 358.00, 359.00, 360.00, 361.00, 362.00, 363.00, 364.00, 365.00, 366.00, 367.00, 368.00, 369.00, 370.00, 371.00, 372.00, 373.00, 374.00, 375.00, 376.00, 377.00, 378.00, 379.00, 380.00, 381.00, 382.00, 383.00, 384.00, 385.00, 386.00, 387.00, 388.00, 389.00, 390.00, 391.00, 392.00, 393.00, 394.00, 395.00, 396.00, 397.00, 399.00, 543.00, 590.00, 592.00, 596.00, 203.00, 594.00, 597.00, 598.00, 599.00, 600.00, 601.00, 602.00, 603.00, 604.00, 605.00, 606.00, 607.00, 608.00, 609.00, 610.00, 611.00, 612.00, 613.00, 614.00, 615.00, 616.00, 617.00, 618.00, 619.00, 620.00, 621.00, 622.00, 623.00, 624.00, 625.00, 626.00, 627.00, 628.00, 629.00, 630.00, 631.00, 632.00, 633.00, 634.00, 635.00, 636.00, 637.00, 638.00, 639.00, 640.00, 641.00, 642.00, 643.00, 644.00, 645.00, 646.00, 647.00, 648.00, 649.00, 650.00, 651.00, 652.00, 653.00, 654.00, 655.00, 656.00, 657.00, 658.00, 659.00, 660.00, 661.00, 662.00, 663.00, 664.00, 665.00, 666.00, 667.00, 668.00, 669.00, 671.00, 672.00, 673.00, 674.00, 675.00, 676.00, 677.00, 678.00, 680.00, 834.00, 835.00, 837.00, 842.00 Superseded by Patch 846.00

Table 2-2:  Summary of Base Operating System Patches

Patch IDs Abstract

Patch 65.00

OSF520-046

Patch: Fix for Compaq C compiler and Compaq driver

State: Existing

This patch fixes the following problems in the Compaq C compiler and Compiler driver:

  • A compiler problem that caused a run-time failure in specific code that involved floating point arguments and varargs.

  • A problem in the driver that failed to produce an object file for a command such as "file.s -o file.o".

  • A problem in the driver that would not allow a command line that contained only the -l<arg> library and no source or object files.

  • A problem in the driver that failed to produce an object file when no output file was specified on the command line.

Patch 69.00

OSF520-040

Patch: Security (SSRT0743U, SSRT0743U)

State: Existing

A potential security vulnerability has been discovered where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file or privilege management. We have corrected this potential vulnerability.

Patch 71.00

OSF520CDE-001A

Patch: Security (SSRT1-80U)

State: Existing

A potential security vulnerability has been discovered where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file or privilege management. We have corrected this potential vulnerability.

Patch 73.00

OSF520CDE-001B

Patch: Security (SSRT1-80U)

State: Existing

A potential security vulnerability has been discovered where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file or privilege management. We have corrected this potential vulnerability.

Patch 78.00

OSF520X11-007

Patch: Fix for X server hang

State: Supersedes patch OSF520X11-006 (76.00)

This patch corrects the following:

  • Fixes a problem that will cause the X server to hang on rare occasions. Except for the mouse, everything on the desktop appears frozen. Output from the ps command will show the X server using greater than 99% of the CPU time.

  • Fixes a problem that can cause CDE pop-up menus to appear on the wrong screen when you are running a multihead system with the PanoramiX extension enabled.

Patch 84.00

OSF520-143

Patch: Fix for cluster interconnect interface problem

State: Existing

This patch fixes a problem where shutdown of the network would also shut down the cluster interconnect interface in a LAN cluster.

Patch 86.00

OSF520-054

Patch: Fix for Korn shell hang

State: Existing

This patch fixes a problem where the Korn shell (ksh) could hang if you pasted a large number of commands to it when it was running in a terminal emulator window (such as an xterm).

Patch 88.00

OSF520-022

Patch: Fixes problem with disklabel command

State: Existing

This patch fixes a problem with the disklabel command. Disklabel was displaying large unsigned values as negative numbers.

Patch 92.00

OSF520-023B

Patch: Security (SSRT1-40U, SSRT1-41U, SSRT1-42U, SSRT1-45U)

State: Existing

A potential security vulnerability has been discovered where, under certain circumstances, users can clobber temporary files created by shell commands and utilities (for example, under /sbin, /usr/sbin, /usr/bin, and /etc). We have corrected this potential vulnerability.

Patch 97.00

OSF520-001

Patch: Fix for vi editor core dump problem

State: Existing

This patch fixes a problem where the vi editor core dumps when it finds invalid syntax during a substitute operation.

Patch 106.00

OSF520-026

Patch: Fix for sort command

State: Existing

This patch corrects the behavior of the sort(1) command, which now checks for duplicates with -c, -u, and -k options.

Patch 108.00

OSF520-015

Patch: Fixes a potential race deadlock

State: Existing

This patch fixes a potential race deadlock between vclean/ufs_reclaim and quotaon/quotaoff when quota is enabled.

Patch 117.00

OSF520-038

Patch: Fix for evmget command

State: Existing

This patch fixes a situation in which the evmget command and the event log nightly cleanup operation may fail with an "arg list too long" message.

Patch 123.00

OSF520-056

Patch: Corrects a memory leak in the XTI socket code

State: Existing

This patch corrects a memory leak in the XTI socket code.

Patch 136.00

OSF520-010A

Patch: Fix for incorrect POSIX 4 message queues behavior

State: Existing

POSIX 4 message queue behavior was not following the standard and was returning unique message descriptors.

Patch 138.00

OSF520-010B

Patch: Static librt library fix for POSIX 4 message queues

State: Existing

POSIX 4 message queue behavior was not following the standard and returning unique message descriptors.

Patch 141.00

OSF520X11-005A

Patch: Security (SSRT0638U)

State: Supersedes patch OSF520X11-004A (139.00)

This patch corrects the following:

  • Allows the dxsetacl utility to delete access ACLs.

  • A potential security vulnerability has been discovered where, under certain circumstances, system integrity may be compromised. This may be in the form of root directory compromise via lpr using X11.

Patch 143.00

OSF520X11-004B

Patch: Allows dxsetacl utility to delete access ACLs

State: Existing

This patch allows the dxsetacl utility to delete access ACLs.

Patch 145.00

OSF520X11-005B

Patch: Security (SSRT0638U)

State: Existing

A potential security vulnerability has been discovered where, under certain circumstances, system integrity may be compromised. This may be in the form of root directory compromise via lpr using X11.

Patch 154.00

OSF520-061

Patch: Security (SSRT0682U)

State: Existing

A potential security vulnerability has been discovered where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file or privilege management. We have corrected this potential vulnerability.

Patch 156.00

OSF520DX-004

Patch: Fixes problems which prevented ENVMONd from starting

State: Existing

This patch fixes problems which prevented ENVMONd from starting

Patch 158.00

OSF520-042

Patch: Fix for Spike postlink optimizer

State: Existing

This patch fixes a problem where Spike may fail to delete the low instruction of a pair of related instructions, causing it to abort with a run-time error.

Patch 160.00

OSF520-008

Patch: Fix for cp command

State: Existing

This patch fixes a problem in which cp(1) and cat(1) produce different file sizes when reading from a tape device. The solution changes the I/O buffer size of the cp command from 64 K to 8 K.

Patch 169.00

OSF520-048

Patch: Fixes a problem in latsetup

State: Existing

This patch fixes a problem in latsetup when the directory /dev/lat is not found.

Patch 171.00

OSF520DX-001

Patch: Fixes a problem in diskconfig

State: Existing

This fixes a problem in diskconfig where partitions with an offset and size of zero cannot be selected. It also fixes a problem where overlapping partitions cannot be adjusted if the existing partitions are not in alphabetical order.

Patch 173.00

OSF520-076

Patch: Fix for ELSA Gloria Synergy, PS4D10, JIB graphic card

State: Existing

This patch fixes a problem where, on the ELSA Gloria Synergy, PS4D10, and JIB graphic cards, the cursor position is not being updated properly. The placement of the cursor is one request behind.

Patch 185.00

OSF520-043

Patch: Corrects a problem in the rdist utility

State: Existing

This patch corrects a problem in the rdist utility which was causing segmentation faults on files with more than one link.

Patch 187.00

OSF520-019

Patch: Fixes a volrecover error

State: Existing

This patch fixes a volrecover error of "Cannot refetch volume" when volumes exist only in a non-rootdg diskgroup.

Patch 189.00

OSF520-053

Patch: Fix for no rerouting problem on a CFS server

State: Existing

This patch fixes a problem where pulling the network cable on one node acting as a CFS server in a cluster causes no rerouting to occur.

Patch 193.00

OSF520-094

Patch: Support for cleanPR script

State: Existing

This patch supports the cleanPR script to clear Persistent Reservations on HSV110 device, continues to go through all of devices even if certain errors occur to one or some of devices, and prevent a potential security hole from directly using /tmp directory.

Patch 195.00

OSF520-058

Patch: BPF default packet filter may cause system panic

State:

This patch corrects a problem which could result in a system panic on close() if the BPF default packet filter is in use.

Patch 210.00

OSF520X11-002

Patch: Fixes problems with X server X Image Extension (XIE)

State: Existing

This patch fixes problems with the X server X Image Extension (XIE).

Patch 212.00

OSF520-050

Patch: Fixes a problem of the ATM setup script failing

State: Existing

This patch fixes a problem of the ATM setup script failing when configuring an elan if the lane subsystem is not loaded.

Patch 220.00

OSF520-104

Patch: Corrects a problem with the NIFF daemon

State: Existing

This patch corrects a problem where the NIFF daemon (niffd) would exit if its connection to the EVM daemon (evmd) failed, as in the case of an EVM daemon restart.

Patch 222.00

OSF520-025

Patch: Fix for mv command

State: Existing

This patch fixes a problem where the mv command will not perform a move if the inode of the file is the same as the inode of the destination directory, even though the file and directory are on different file systems.

Patch 224.00

OSF520-049

Patch: joind may fail to clean up its lock files

State: Existing

The patch fixes a problem where joind may fail to clean up its lock files in /var/join.

Patch 226.00

OSF520-114A

Patch: Shared libots3 library fix

State: Existing

This patch fixes the following problems in the /usr/lib/libots3.a and /usr/shlib/libots3.so libraries:

  • The max threads clause for the SGI parallel interfaces is being ignored.

  • An OpenMP thread may hang when reaching a critical region and all other threads are awaiting CVs.

Patch 228.00

OSF520-114B

Patch: Static libots3 library fix

State: Existing

This patch fixes the following problems in the /usr/lib/libots3.a and /usr/shlib/libots3.so libraries:

  • The max threads clause for the SGI parallel interfaces is being ignored.

  • An OpenMP thread may hang when reaching a critical region and all other threads are awaiting CVs.

Patch 234.00

OSF520-124

Patch: Adds support for Persistent Reserve for HSV110

State: Existing

This patch is an update to /sbin/scu, the SCSI CAM Utility Program. It adds support for Persistent Reserve for HSV110 as well as the display of 128-bit WWIDS.

Patch 238.00

OSF520DX-002

Patch: Fix for dxsetacl utility

State: Existing

This patch allows the dxsetacl utility to delete access ACLs.

Patch 245.00

OSF520-173B

Patch: Fixes a problem in the strtod routine

State: Existing

This patch corrects the following:

  • Fixes a problem where strtod() was returning different outputs for the same input.

  • Fixes a problem where the tan() function was returning the wrong results.

Patch 252.00

OSF520-154

Patch: Adds Essential Services Monitor daemon (esmd)

State: Supersedes patch OSF520-099 (75.00)

This patch provides enablers for the Compaq Database Utility.

Patch 259.00

OSF520-158

Patch: Removes extraneous header comments

State: Existing

This patch removes extraneous history edit comments from exported DECthreads header files.

Patch 269.00

OSF520-163

Patch: Improves user control of clu_mibs

State: Existing

The control of the start and stop of the clu_mibs agent has been moved from /sbin/init.d/clu_max script to /sbin/init.d/snmpd script.

Patch 281.00

OSF520-211

Patch: Fix for NHD kit installations

State: Existing

During an install of an NHD kit, the version.id file was not properly referenced, causing the install to fail.

Patch 288.00

OSF520-187

Patch: Fix for lpd parent daemon problems

State: Existing

This patch corrects the following problems:

  • Corrects lpd parent daemon problems when EVM is stopped and started.

  • Slows down event storm from remote host sending bad protocol information.

Patch 295.00

OSF520-169

Patch: Fixes problem of failed open calls to KZPCCs

State: Supersedes patch OSF520-195 (293.00)

This patch corrects the following:

  • Fixes a problem where I/O greater than 4 MB fails to KZPCC devices with error ENODEV.

  • This patch fixes the problem of failed open calls to KZPCCs under heavy I/O.

Patch 311.00

OSF520DX-012

Patch: Quick Setup erroneously reports daemons do not start

State: Existing

On some systems, notably DS10, Quick Setup may erroneously report that some daemons did not start. When you then try again, other error messages appear that report duplicate host names.

Patch 315.00

OSF520-220B

Patch: Support for Enterprise Volume Manager

State: Supersedes patches OSF520-069C (201.00), OSF520-149B (265.00)

This patch provides enabler support for the Enterprise Volume Manager.

Patch 319.00

OSF520DX-011

Patch: Security (SSRT1-40U, SSRT1-41U, SSRT1-42U, SSRT1-45U)

State: Existing

A potential security vulnerability has been discovered where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file access. We have corrected this potential vulnerability.

Patch 327.00

OSF520-167

Patch: Fixes C++ incompatibility

State: Existing

This patch fixes C++ incompatibility in three files in /usr/include/alpha/hal/ and one file in /usr/include/io/common/.

Patch 414.00

OSF520-230A

Patch: Fixes a problem in stdio.h

State: Existing

This patch fixes a problem in <stdio.h> where the interface renaming conditionals for fgetpos() and fsetpos() were mismatched. It also fixes a problem in <sys/timeb.h> where the ftime() prototype was not available in the default compilation name space.

Patch 416.00

OSF520-230B

Patch: Fixes a problem in sys/timeb.h

State: Existing

This patch fixes a problem in <stdio.h> where the interface renaming conditionals for fgetpos() and fsetpos() were mismatched. It also fixes a problem in <sys/timeb.h> where the ftime() prototype was not available in the default compilation name space.

Patch 428.00

OSF520-276B

Patch: Fix for evmwatch termination problem

State: Supersedes patches OSF520-103B (164.00), OSF520-159B (257.00)

This patch corrects the following:

  • Resolves a memory leak and a filtering issue in the Event Manager, and allows the evmwatch utility to reconnect automatically if evmd fails and is restarted.

  • Fixes a problem in which binary error log (binlog) events posted by the EMX FibreChannel driver and the system console are reported incorrectly by the Event Manager, EVM.

  • Resolves an issue which can cause an Event Manager (EVM) client or the EVM daemon to core dump under rare circumstances.

Patch 438.00

OSF520DX-016

Patch: Fix for dxproctuner utility

State: Existing

This patch fixes a problem in dxproctuner where the process information is not displayed when there is a double quote followed by any other character in the command column.

Patch 441.00

OSF520X11-019

Patch: Fix for XGetImage function

State: Supersedes patches OSF520X11-009 (98.00), OSF520X11-003 (99.00), OSF520X11-001 (101.00), OSF520X11-014 (439.00)

This patch corrects the following:

  • Provides NHD4 enables for future hardware support of a graphics device.

  • Fixes the Xserver problem where, when PanoramiX is enabled and using CDE, icons from dtfile cannot be seen on other than the left screen while being moved.

  • Fixes a problem with a Compaq Professional Workstation XP1000 667 MHz system with a PowerStorm 4D20 (PBXGB-CA) graphics card where fonts were sometimes drawn incorrectly.

  • Fixes a problem where the X Window System XGetImage() function returned erroneous data for displays with a depth greater than 8 when running the PanoramiX extension.

Patch 446.00

OSF520DX-024B

Patch: Security (SSRT1-40U, SSRT1-41U, SSRT1-42U, SSRT1-45U)

State: Existing

A potential security vulnerability has been discovered where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file access. We have corrected this potential vulnerability.

Patch 453.00

OSF520CDE-010

Patch: Fix for dtgreet application

State: Existing

After installing DCE, enabling SIA would cause a core dump and the greeter window never comes up.

Patch 455.00

OSF520-295

Patch: Fix for lsmsa product

State: Existing

This patch addresses a problem in the display of disk controller to disk hierarchy by the lsmsa product.

Patch 457.00

OSF520X11-021A

Patch: Fix for broken symbolic links in /usr/lib/X11

State: Existing

This patch fixes a problem in Tru64 UNIX V5.1A where three symbolic links in /usr/lib/X11 pointed to nonexistent directories.

Patch 459.00

OSF520X11-021B

Patch: Symbolic links point to nonexistent directories

State: Existing

This patch fixes a problem in Tru64 UNIX V5.1A where three symbolic links in /usr/lib/X11 pointed to nonexistent directories.

Patch 465.00

OSF520X11-010

Patch: Fix for Elsa Gloria Comet card

State: Existing

The Elsa Gloria Comet card does not correctly draw nested shaded boxes or anything similar.

Patch 467.00

OSF520X11-013

Patch: Fix for accessx beeping functionality

State: Existing

Beep does not occur when requested when the toggle keys option is enabled via accessx.

Patch 469.00

OSF520-170

Patch: Fixes a problem in uucp

State: Existing

This patch fixes a problem in uucp. uucp between two Tru64 UNIX boxes hangs when a uucp failure occurs.

Patch 479.00

OSF520-223

Patch: Fix for ACL access problems

State: Existing

This patch corrects the following:

  • If multiple processes attempt to access the same file at the same time and access to the file should be allowed by an ACL on the file, access may be denied instead.

  • If the ACL on a file is corrupted the corrupted ACL is passed into the kernel causing a variety of problems.

Patch 481.00

OSF520DX-022

Patch: Security (SSRT1-40U, SSRT1-41U, SSRT1-42U, SSRT1-45U)

State: Existing

A potential security vulnerability has been discovered where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file access. We have corrected this potential vulnerability.

Patch 485.00

OSF520X11-012

Patch: Fix for C++ compile problem

State: Existing

This patch fixes a C++ compile problem in /usr/include/X11/Xlib.h.

Patch 488.00

OSF520-222A

Patch: Fix for class scheduler

State: Supersedes patches OSF520-017A (181.00), OSF520-322 (486.00)

This patch corrects the following:

  • Fixes a class scheduler semaphore race condition.

  • Causes the class scheduler to handle rogue programs, changing the class scheduler database semaphore state.

  • The class scheduler depends on semaphores to protect its database from simultaneous updates. This patch automatically detects if the semaphore no longer exists and allocates a new one, allowing the class scheduler to proceed without interruption.

Patch 490.00

OSF520-222B

Patch: Fix for class scheduler failure

State: Supersedes patch OSF520-017B (183.00)

This patch corrects the following:

  • Fixes a class scheduler semaphore race condition.

  • The class scheduler depends on semaphores to protect its database from simultaneous updates. This patch automatically detects if the semaphore no longer exists and allocates a new one, allowing the class scheduler to proceed without interruption.

Patch 492.00

OSF520-252

Patch: Fix for verify command

State: Existing

This patch avoids core dumps in the verify command.

Patch 500.00

OSF520X11-018C

Patch: Security (SSRT0753U, SSRT0752U)

State: Existing

This patch fixes the libXm.so incompatibility in Tru64 UNIX V5.1A.

Patch 502.00

OSF520DX-013

Patch: Security (SSRT1-40U, SSRT1-41U, SSRT1-42U, SSRT1-45U)

State: Existing

A potential security vulnerability has been discovered where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file access. We have corrected this potential vulnerability.

Patch 504.00

OSF520-171

Patch: Provides faster failover time for NetRAIN

State: Supersedes patch OSF520-012 (232.00)

This patch corrects the following:

  • Fixes a problem in NetRAIN. NetRAIN interface creation now fails if any of the requested standby interfaces do not exist.

  • In the V5.0 stream NetRAIN failover time has regressed. This patch provides for faster failover time, mainly by permitting timer values of less than 1 second to be configured.

Patch 506.00

OSF520-335

Patch: Fix for rdump command

State: Existing

The rdump command now dumps data properly onto remote tape devices without receiving the SIGSEGV and dumping core.

Patch 509.00

OSF520-364

Patch: Fix for csh

State: Supersedes patch OSF520-182 (507.00)

This patch corrects the following:

  • If a nonroot user performed an ls(1) with wildcard characters on a directory having permission 700, then it would display the invalid error message, "Glob aborted." Now it displays the correct error message of "Permission denied".

  • When nonmatch is set and a user performs an ls(1) with one of the patterns as ?, it would not list any matched patterns but return "ls: ? not found". Now it returns that message as well as any matched patterns.

  • Fixes a problem with the c shell (csh) so that it now correctly recognizes the backslash (\) meta character.

Patch 511.00

OSF520-301

Patch: Fixes alt driver for DEGPA Gigabit Ethernet adapters

State: Existing

This patch addresses two problems with the alt driver for DEGPA Gigabit Ethernet adapters. These problems affect all Tru64 UNIX systems using alt with vMAC or NetRAIN.

  • A fix for vMAC support. Prior to this patch, vMAC has not worked with DEGPA.

  • A fix to prevent two DEGPA adapters from getting the same MAC address in a NetRAIN configuration.

Patch 513.00

OSF520-333A

Patch: Modifies enablers for Enterprise Volume Manager

State: Supersedes patches OSF520-069A (197.00), OSF520-149A (263.00), OSF520-220A (313.00)

This patch corrects the following:

  • Provides enablers for Enterprise Volume Management.

  • Modifies enablers for Enterprise Volume Management.

Patch 515.00

OSF520-333B

Patch: Modifies enablers for Enterprise Volume Manager

State: Supersedes patches OSF520-069C (201.00), OSF520-149B (265.00), OSF520-220C (317.00)

This patch corrects the following:

  • Provides enablers for Enterprise Volume Management.

  • Modifies enablers for Enterprise Volume Management.

Patch 517.00

OSF520-165

Patch: Fix for LSM resynchronization problem

State: Existing

This patch corrects the problem with a mirrored LSM volume, with dirty region logging (DRL) enabled, still doing a full resynchronization during the first recovery after an unclean shutdown.

Patch 519.00

OSF520-155

Patch: Fixes the C++ incompatibility with pwrmgr.h

State: Existing

This patch fixes the C++ incompatibility of /usr/include/dec/pwrmgr/pwrmgr.h.

Patch 525.00

OSF520-367A

Patch: Security (SSRT0779U)

State: Existing

A potential security vulnerability has been discovered where, under certain circumstances, SNMP services can stop functioning.

Patch 527.00

OSF520-367B

Patch: Security (SSRT0779U)

State: Existing

A potential security vulnerability has been discovered where, under certain circumstances, SNMP services can stop functioning.

Patch 529.00

OSF520-174

Patch: Fix for umask permission setting

State: Existing

This patch fixes a problem where no shell message is displayed when trying to su to a user other than root.

Patch 531.00

OSF520-244

Patch: Fix for KMF caused by malformed IPv4-in-IPv4 packets

State: Supersedes patch OSF520-087 (240.00)

This patch corrects the following:

  • A system configured with the IPTUNNEL kernel option will crash if it receives a corrupted IPv6-in-IPv4 packet, even if the system is not running IPv6. The system will panic with the message "kermel memory fault in ip6ip4_input()"

  • Fixes a kernel memory fault caused by malformed IPv4-in-IPv4 packets.

Patch 533.00

OSF520-306

Patch: Fix for od command

State: Existing

This patch fixes a problem in which an invalid character sequence causes the od command to hang or display a partial character.

Patch 535.00

OSF520-251

Patch: Fix for balance utility

State: Existing

Balance was terminating before balancing the whole domain when the domain was very large ( >4 GB ).

Patch 537.00

OSF520CDE-007

Patch: Security (SSRT1-40U, SSRT1-41U, SSRT1-42U, SSRT1-48U)

State: Supersedes patch OSF520CDE-004 (300.00)

A potential security vulnerability has been discovered where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file access. We have corrected this potential vulnerability.

Patch 539.00

OSF520CDE-003

Patch: Security (SSRT0767U)

State: Existing

A potential security vulnerability has been discovered where, under certain circumstances, system integrity may be compromised. The ttdbserverd contains a potential buffer overflow that may allow unauthorized access. We have corrected this potential vulnerability.

Patch 545.00

OSF520-255

Patch: Fixes EVMs periodic channel monitoring function

State: Existing

This patch fixes a problem in which the Event Manager's channel monitoring function is temporarily disabled if the evmreload command is run.

Patch 551.00

OSF520-181

Patch: Fixes an ATM signaling problem

State: Existing

This patch fixes an ATM signaling problem.

Patch 553.00

OSF520-317

Patch: EVM daemon fails to find user-defined templates

State: Existing

This patch resolves a problem with the Event Manager (EVM) where user-defined events are not posted in a semirolled cluster. The Event Manager daemon fails to find user-defined templates in /usr/share/evm/templates/local on nonupgraded nodes in a semirolled cluster.

Patch 555.00

OSF520-219

Patch: Fix for ld linker

State: Supersedes patch OSF520-004 (150.00)

This patch fixes two problems in the linker (/usr/bin/ld):

  • A problem with the datatype of the linker-defined _fpdata symbol.

  • A problem that causes a linker crash when certain data alignment directives are used in the link.

  • The linker (/bin/ld) may corrupt the shared object registry file when -update_registry is specified with concurrent links.

Patch 561.00

OSF520X11-016A

Patch: Cut and paste problem with JISX0212 Japanese characters

State: Existing

This patch fixes a problem with cut and paste of JISX0212 Japanese characters on X Window System applications.

Patch 563.00

OSF520X11-016B

Patch: Fixes JISX0212 Japanese characters problem

State: Existing

This patch fixes a problem with cut and paste of JISX0212 Japanese characters on X Window System applications.

Patch 565.00

OSF520-324

Patch: Enabler for Compaq Database Utility

State: Supersedes patches OSF520-090 (179.00), OSF520-199 (292.00)

This patch provides enablers for the Compaq Database Utility.

Patch 567.00

OSF520-210

Patch: Security (SSRT0664U, SSRT0762U)

State: Supersedes patches OSF520-045 (204.00), OSF520-068 (206.00)

This patch corrects the following:

  • This patch corrects a problem with the ftpd daemon which could result in PC ftp clients hanging when transferring some files in ASCII mode.

  • A potential security vulnerability has been discovered where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file or privilege management. We have corrected this potential vulnerability.

  • Corrects ftp daemon failure when using a globbing string of several asterisks. Also contains additional corrections for the help command and character drop with the put command.

Patch 569.00

OSF520-294

Patch: CD Mastering Software

State: Existing

The DS25 system does not include a floppy drive, but has a CD-ROM burner instead. In order to write to this device, CD Mastering Software is required. This patch provides that software. It is made up of mkisofs and cdrecord software.

Patch 571.00

OSF520-382

Patch: savecore prematurely terminates crash dump recovery

State: Existing

This patch corrects a problem where savecore may prematurely terminate crash dump recovery on partitions larger than 4 GB.

Patch 573.00

OSF520DX-014

Patch: Security (SSRT1-40U, SSRT1-41U, SSRT1-42U, SSRT1-45U)

State: Existing

A potential security vulnerability has been discovered where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file access. We have corrected this potential vulnerability.

Patch 578.00

OSF520-235

Patch: Fix for zdump utility

State: Existing

This patch corrects the following:

  • Fixes a problem in the zdump utility when time zone file names are specified as arguments without leading colons (:).

  • Fixes a regression in the -v output to display the current time.

Patch 580.00

OSF520X11-020

Patch: Extended Visual Information returns incorrect info

State: Existing

This patch fixes a problem where the X server's Extended Visual Information (EVI) extension was returning incorrect information.

Patch 588.00

OSF520DX-021

Patch: Fix for NS record syntax in named.local file

State: Existing

This patch fixes the NS record syntax in a named.local file.

Patch 691.00

OSF520-436B

Patch: Fix for atexit and pthread_prefork handler crashes

State: New

This patch fixes a problem with atexit() or pthread_atfork() handlers in shared libraries. An application will crash when handlers in shared libaries are called after the libraries are dlclosed and unmapped.

Patch 693.00

OSF520-454B

Patch: Security (SSRT1-40U, SSRT1-41U, SSRT1-42U, SSRT1-45U)

State: New

A potential security vulnerability has been discovered,where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file access. We have corrected this potential vulnerability.

Patch 695.00

OSF520CDE-011A

Patch: Security (SSRT0753U, SSRT0752U, SSRT0788U)

State: OSF520CDE-002 (208.00), OSF520CDE-005A (429.00), OSF520CDE-009A (430.00), OSF520CDE-008A (432.00)

This patch corrects the following:

  • Fixes the problem of palette files not been read from etc/dt/palettes.

  • Fixes the dtprintinfo memory fault problem with long LANG value.

  • A potential security vulnerability has been discoveredwhere, under certain circumstances, system integrity may be compromised. This may be in the form of large values of command line arguments. We have corrected this potential vulnerability.

  • A potential security vulnerability has been discovered , where under certain circumstances, system integrity may be compromised. This may be in the form of large values of ENVIRONMENT variables and command line arguments.

  • Fixes a potential security vulnerability in CDE Subprocess Control Service(dtspcd). dtspcd has a potential buffer overflow condition which may lead to unauthorized access. We have corrected these potential vulnerability.

Patch 697.00

OSF520CDE-011B

Patch: Security (SSRT0753U, SSRT0752U, SSRT0788U)

State: OSF520CDE-005B (433.00), OSF520CDE-009B (434.00), OSF520CDE-008B (436.00)

This patch corrects the following:

  • Fixes the dtprintinfo memory fault problem with long LANG value.

  • A potential security vulnerability has been discoveredwhere, under certain circumstances, system integrity may be compromised. This may be in the form of large values of command line arguments. We have corrected this potential vulnerability.

  • A potential security vulnerability has been discovered , where under certain circumstances, system integrity may be compromised. This may be in the form of large values of ENVIRONMENT variables and command line arguments.

  • Fixes a potential security vulnerability in CDE Subprocess Control Service(dtspcd). dtspcd has a potential buffer overflow condition which may lead to unauthorized access. We have corrected these potential vulnerability.

Patch 699.00

OSF520-394

Patch: Fix for kdbx

State: New

This patch fixes a premature termination of the ofile kdbx extension, warning messages in various kdbx extensions, and token length warnings when kdbx is invoked.

Patch 701.00

OSF520-481

Patch: Security (SSRT1-40U, SSRT1-41U, SSRT1-42U, SSRT1-45U)

State: New

This patch adds the mktemp(1) reference page for the mktemp command.

Patch 705.00

OSF520-485

Patch: Security (SSRT1-40U, SSRT1-41U, SSRT1-42U, SSRT1-45U)

State: New

This patch updates the mktemp(3) reference page with changed information regarding the mktemp() and mkstemp() routines, and adds information about the mkdtemp() and mkstemps() libc routines.

Patch 709.01

OSF520-456

Patch: Fix for autofsd and autofsmount daemon

State: Supersedes patches OSF520-091 (119.00), OSF520-290 (451.00), OSF520-027 (3.00), OSF520-034 (5.00), OSF520-273 (447.00), OSF520-270 (449.00), OSF520-005 (113.00), OSF520-037 (115.00), OSF520-372 (706.00), OSF520-412 (707.00), OSF520-456 (709.00)

This patch corrects the following:

  • An AutoFS intercept point for a direct map entry may no longer induce automounts after an error has been detected during a previous automount attempt.

  • Eliminates error messages concerning property lists seen through certain utilities such as vdump.

  • AutoFS aut-mounts will now occur when utilities name intercept points defined through indirect map entries.

  • Fixes a deadlock that will occur in non-cluster systems when direct map entries are served locally.

Patch 709.00

continued

  • Prevents a core dump from vdump when your message length is greater than MAX_MSG_SIZE. This is a very rare occurrence. The problem was found by code inspection while working on internationalization of messages.

  • Fixes problems in the vdump command:

    • Failed to flag compressed extended attributes records that are split across a vdump BLOCK boundary.

    • Corrects "Rewinding" message to avoid a segfault with Internationalized messages.

  • Fixes problems in the vrestore command:

    • Fails to properly handle extended attributes records in compressed archives. This results in malloc failures, proplist corruption, program abort, program crashes due to segfault or invalid memory access, and the display of the error message "error setting extended attributes".

    • Fails to set extended attributes due to confusion over selective restore of the associated file or directory. Also results in display of the error message "error setting extended attributes".

    • Selective restore of hardlinked files is incomplete when they exist in different directories (fails to create directory for second occurrence of file with same inode number).

  • Eliminates inefficient behavior by autofsd when the top level directory of a direct hierarchical automount map entry cannot be successfully mounted.

  • Ensures that AutoFS correctly uses the mount options specified in automount map entries with replicated servers.

  • Fixes a problem where the tar -F (Fasttar) option ignores files named err, but does not ignore files named errs or directories named SCCS and RCS.

  • Corrects pax/tar/cpio to properly extract explicitly specified files. When an archive contained a file with extended attributes and a different file (occurring later in the archive) was specified to be extracted, improper buffer pointer management resulted in the following display (example uses tar):

    tar: /dev/nrmt0h : This doesn't look like a tar archive
    tar: /dev/nrmt0h : Skipping to next file...
    tar: Memory allocation failed for extended data while reading :
    Not enough space

    The directory option was similarly affected. In this case the information for the specified file was not reported

  • Corrects the behavior of several commands when used in conjunction with file systems that are locally served via AutoFS.

  • Provides support for wildcards in Linux /etc/exports entries. Both AutoFS and Automount have been so enhanced.

  • Fixes a problem where aufofsd and autofsmount daemon do not properly parse the star (*) in map files.

Patch 711.00

OSF520-339

Patch: Fix for shfragbf

State: Existing

This patch clarifies the output of shfragbf, an AdvFS utility.

Patch 713.00

OSF520-345

Patch: Fix for rcinet script

State: Existing

This patch prevents the system from hanging when the rcinet script is used by correcting the order in which NetRAIN-related services are started and stopped.

Patch 716.00

OSF520DX-029

Patch: Security (SSRT1-40U, SSRT1-41U, SSRT1-42U, SSRT1-45U)

State: Supersedes patches OSF520DX-003 (109.00), OSF520DX-007 (110.00), OSF520DX-006 (112.00), OSF520DX-009 (282.00), OSF520DX-008 (284.00), OSF520DX-015 (442.00), OSF520DX-024A (444.00), OSF520DX-026 (714.00)

This patch corrects the following:

  • Fixes a problem with the SysMan Station which causes incorrect state information to be displayed after a CPU has been indicated.

  • Fixes possible deadlock conditions in the SysMan station daemon that might occur at daemon startup or during failover.

  • Provides enablers for the Compaq Database Utility.

  • Objects in the Physical File system view do not have correct or updated properties.

  • SysMan Station can not launch commands on objects where an object attribute is part of the command.

  • A potential security vulnerability has been discovered where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file access. We have corrected this potential vulnerability.

  • Fixes a problem where reconfiguration of network interface cards using SysMan makes the old IP address an IP alias. The new IP address replaces the old IP address now.

  • Fixes a problem where some older, legacy applications were not displaying the appropriate pop-up message because of a change to the way error messages are retrieved. This patch fixes the message catalogs so that the proper message is displayed at the appropriate time.

Patch 718.00

OSF520-426

Patch: Fix for traceroute command

State: New

This patch corrects a problem where traceroute sometimes failed to provide responses and finish a trace when the destination host name was given on the command line.

Patch 720.00

OSF520-416

Patch: Fix for assembler problems

State: Supersedes patch OSF520-239 (471.00)

This patch, shipped as Version 3.06.08 of the Tru64 UNIX Assembler, resolves three assembler problems related to the following:

  • The generation of an incorrect symbol table which can cause om to fail.

  • The improper reordering of an instruction which restores the stack pointer when assembling with optimization active.

  • The generation of a .ident string without a terminating NULL.

  • When a load instruction specifies a target register and a base register that are the same, the assembler may generate an invalid optimization.

Patch 723.00

OSF520DX-025

Patch: Security (SSRT0785U)

State: Supersedes patches OSF520DX-010 (472.00), OSF520DX-018 (473.00), OSF520DX-017 (474.00), OSF520DX-019 (475.00), OSF520DX-020 (477.00), OSF520DX-027 (721.00)

This patch corrects the following:

  • A core dump occurs when /etc/shells is a directory instead of a file.

  • The hour glass cursor remains after a failure to create a home directory in the process of adding or modifying an account.

  • Fixes the problem of dxaccounts that names and security attributes of UNIX users are not mapped correctly when they are viewed from the PC Users dialog box.

  • Fixes the problem that user name entries are replicated in the /etc/group file when modifying users with either dxaccounts or sysman accounts.

  • Fixes a problem in dxaccounts that can cause certain C2 security values to not be displayed, which could result in unexpected values being saved.

  • Fixes the problem of useradd, usermod, and dxaccounts ignoring password length restrictions when changing passwords.

  • Fixes a number of problems with dxaccounts on a system with ASU installed.

  • A potential security vulnerability has been discovered where, under certain circumstances, system integrity may be compromised. This may be in the form of passwords that have a length outside of the intended range. We have corrected this potential vulnerability.

Patch 725.00

OSF520X11-022A

Patch: Security (SSRT0788U, SSRT0753U, SSRT0752U)

State: Supersedes patches OSF520X11-017A (493.00), OSF520X11-018A (495.00)

This patch corrects the following:

  • A potential security vulnerability has been discovered where, under certain circumstances, system integrity may be compromised. This may be in the form of large values of ENVIRONMENT variables. We have corrected this potential vulnerability.

  • Fixes the libXm.so incompatibility in Tru64 UNIX V5.1A.

  • Fixes a problem with the Motif ToggleButton Widget where, in some cases, it may not draw itself correctly.

Patch 727.00

OSF520X11-022B

Patch: Security (SSRT0788U, SSRT0753U, SSRT0752U)

State: Supersedes patches OSF520X11-017B (496.00), OSF520X11-018B (498.00)

This patch corrects the following:

  • A potential security vulnerability has been discovered where, under certain circumstances, system integrity may be compromised. This may be in the form of large values of ENVIRONMENT variables. We have corrected this potential vulnerability.

  • Fixes the libXm.so incompatibility in Tru64 UNIX V5.1A.

  • Fixes a problem with the Motif ToggleButton Widget where, in some cases, it may not draw itself correctly.

Patch 729.00

OSF520X11-022B

Patch: Fixes a problem with RLIMIT_DATA process limits

State: New

This patch fixes a problem with RLIMIT_DATA process limits when running fsck on a large file system.

Patch 731.00

OSF520-484

Patch: (SSRT1-40U, SSRT1-41U, SSRT1-42U, SSRT1-45U)

State: New

This patch adds the safe_open(3) reference page for the safe_open() routine in libc.

Patch 733.00

OSF520-479

Patch: Fix for Memory Channel driver problem

State: New

Shuts down the Memory Channel device if too many state change interrupts are received.

Patch 737.00

OSF520-445

Patch: Security (SSRT1-40U, SSRT1-41U, SSRT1-42U, SSRT1-45U)

State: Supersedes patches OSF520-028 (125.00), OSF520-217 (309.00), OSF520-228 (460.00), OSF520-208 (461.00), OSF520-227 (463.00), OSF520-526 (734.00), OSF520-437 (735.00)

This patch corrects the following:

  • Fixes a problem in which /usr/bin/ksh hangs for certain scripts that contain wait(1).

  • A potential security vulnerability has been discovered where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file access. We have corrected this potential vulnerability.

  • The following changes were made:

    • Shell inline input files are more secure.

    • sh noclobber and new constructs are added.

    • The mkdir system call is updated.

  • Corrects a problem in which ksh fails to substitute the tilde (~) character for a user's home directory after an assignment using the number (#) or percent (%) characters has been used.

  • Fixes a problem with ksh. When a ksh menu is started from within user's .profile, ksh will not stop when the Telnet session is stopped.

  • Fixes an Asian language processing problem under the Korn shell.

  • sh will not receive SIGSEGV signal when you run type with file path > 69 characters.

  • Corrects a problem in which sh was using a high amount of CPU time.

  • Corrects a problem in which ksh did not clean up the processes associated with a terminal once the window was closed.

Patch 739.00

OSF520-461

Patch: Fixes a problem with os_mibs

State: New

This patch fixes a problem with os_mibs that could cause the application to cosnume an excessive amount of CPU time.

Patch 741.00

OSF520-359

Patch: Enhancement to savemeta

State: New

This patch enhances the capability of savemeta:

  • savemeta can now be used in single user mode on a corrupt /usr domain.

  • All errors now return 1.

Patch 744.00

OSF520-466A

Patch: Shared library fix for libaio

State: Supersedes patches OSF520-332A (521.00), OSF520-392A (742.00)

This patch corrects the following:

  • Fixes a rarely seen memory fault in libaio during aio_cancel().

  • Adds support for NEW_OPEN_MAX_SYSTEM (64K) file descriptors to libaio.

  • Prevents thread blocking forever when both libaio and libaio_raw are linked into the same image.

  • Closes an aio_read()/aio_cancel() race condition.

Patch 747.00

OSF520-466B

Patch: Static library fix for libaio

State: Supersedes patches OSF520-332B (523.00), OSF520-392B (745.00)

This patch corrects the following:

  • Fixes a rarely seen memory fault in libaio during aio_cancel().

  • Adds support for NEW_OPEN_MAX_SYSTEM (64K) file descriptors to libaio.

  • Prevents thread blocking forever when both libaio and libaio_raw are linked into the same image.

  • Closes an aio_read()/aio_cancel() race condition.

Patch 749.00

OSF520DX-028

Patch: Modification to secconfig suitlet

State: New

This patch makes the customize database option available when using secconfig for shadow passwords.

Patch 751.00

OSF520X11-024A

Patch: OSF520X11-024A

State: New

A potential security vulnerability has been discovered where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file or privilege management. We have corrected this potential vulnerability.

Patch 753.00

OSF520X11-024B

Patch: Security (SSRT0818U)

State: New

A potential security vulnerability has been discovered where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file or privilege management. We have corrected this potential vulnerability.

Patch 755.00

OSF520X11-024C

Patch: Security (SSRT0818U)

State: New

A potential security vulnerability has been discovered where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file or privilege management. We have corrected this potential vulnerability.

Patch 757.00

OSF520-362

Patch: Fix for script command

State: New

This patch corrects a problem in which script would hang upon exit in a dfs configuration.

Patch 759.00

OSF520DX-030

Patch: System Mgmt Station detects failing PCI adapters

State: New

This patch provides the ability for the System Management Station to render PCI adapters with a warning or failed representation when they are in the indicted state. This is in addition to the previous ability to render CPUs that are in the indicted state.

Patch 761.00

OSF520X11-026

Patch: Fixes a problem in the mwm window manager

State: New

This patch fixes a problem in the mwm window manager where double-click actions are performed on the second button press instead of the second button release. This causes the second button release event to be sent to any underlying window.

Patch 763.00

OSF520-482

Patch: : Security (SSRT1-40U, SSRT1-41U, SSRT1-42U, SSRT1-45U)

State: New

This patch adds the dirclean(8) reference page for the /usr/sbin/dirclean utility.

Patch 765.00

OSF520-486

Patch: Provides the poll reference page

State: New

This patch adds the poll(7) reference page for the /dev/poll driver.

Patch 767.00

OSF520-368

Patch: Enhancement to fuser utility

State: Existing

This patch allows fuser to display the reference option. This option indicates the type of reference made. For example: open, closed, unlinked, or mmapped.

Patch 769.00

OSF520-417

Patch: Fix for su command

State: New

This patch corrects the behavior of su(1), so that the LOGNAME environment variable is changed to the target user when executed with the - option.

Patch 771.00

OSF520-483

Patch: Lsmsa incorrectly processing passwords

State: New

This patch fixes a problem where Lsmsa incorrectly processes passwords that are longer than eight characters. Anyone who tries to start the LSM GUI using a password of eight or more characters will be denied access.

Patch 773.00

OSF520-444

Patch: Security (SSRT0795U)

State: New

A potential security vulnerability has been discovered where, under certain circumstances, system integrity may be compromised. This may be in the form where inetd may block incoming connections when scanned by nmap or other port scanners. We have corrected this potential vulnerability.

Patch 775.00

OSF520CDE-012

Patch: Fixes a problem in the dtwm window manager

State: Supersedes patch OSF520CDE-006 (584.00)

This patch corrects the following:

  • Fixes a memory leak problem in the Window Manager.

  • Fixes a problem in the dtwm window manager where double-click actions are performed on the second button press instead of the second button release. This causes the second button release event to be sent to any underlying window.

Patch 777.00

OSF520-423

Patch: Fixes time zone display problem

State: Supersedes patch OSF520-254 (586.00)

This patch corrects the following:

  • Fixes a problem in which the binlog daemon can coredump if it attempts to recover events from a panic dump file containing invalid event data.

  • Fixes a time formatting problem when Compaq Analyze is used to display events in time zones with a positive offset from GMT.

Patch 779.00

OSF520X11-023

Patch: Fixes an xfs problem

State: New

This patch fixes an xfs problem which causes a "QueryGlyphs failed" error in showfont.

Patch 782.00

OSF520-388A

Patch: Added support for DECthreads V3.18-141

State: Supersedes patches OSF520-085A (80.00), OSF520-308A (418.00), OSF520-419A (780.00)

This patch corrects the following:

  • Installs DECthreads V3.18-133, which fixes problems that may affect threaded programs running on Tru64 UNIX V5.1A. The problems addressed with this patch were discovered during pre-release testing of Tru64 UNIX V5.1A. DECthreads V3.18-133 is the initial support version of the Compaq POSIX Threads Library for Tru64 UNIX V5.1A.

  • Installs DECthreads V3.18-138, which fixes problems that may affect threaded programs running on Tru64 UNIX V5.1A. This patch specifically addresses a problem that may arise when using recursive mutexes with condition variables.

  • Installs DECthreads V3.18-144, which is the latest version of the Compaq POSIX Threads library for Tru64 UNIX V5.1A.

  • Installs DECthreads V3.18-141 which fixes problems that may affect threaded programs running on Tru64 UNIX V5.1A. This patch specifically addresses a problems with the preemption of the symbolic name table() by application code, and the alignment of the Stack Pointer in user created threads.

Patch 785.00

OSF520-388B

Patch: Added support for DECthreads V3.18-141

State: Supersedes patches OSF520-085B (82.00), OSF520-308B (420.00), OSF520-419B (783.00)

This patch corrects the following:

  • Installs DECthreads V3.18-133, which fixes problems that may affect threaded programs running on Tru64 UNIX V5.1A. The problems addressed with this patch were discovered during pre-release testing of Tru64 UNIX V5.1A. DECthreads V3.18-133 is the initial support version of the Compaq POSIX Threads Library for Tru64 UNIX V5.1A.

  • Installs DECthreads V3.18-138, which fixes problems that may affect threaded programs running on Tru64 UNIX V5.1A. This patch specifically addresses a problem that may arise when using recursive mutexes with condition variables.

  • Installs DECthreads V3.18-144, which is the latest version of the Compaq POSIX Threads library for Tru64 UNIX V5.1A.

  • Installs DECthreads V3.18-141 which fixes problems that may affect threaded programs running on Tru64 UNIX V5.1A. This patch specifically addresses a problems with the preemption of the symbolic name table() by application code, and the alignment of the Stack Pointer in user created threads.

Patch 787.00

OSF520-351

Patch: Enhancement for siacfg utility

State: New

This patch allows nonlocal SIA mechanisms, LDAP for example, to place their mechanism last in the list of mechanisms.

Patch 789.00

OSF520-393

Patch: Fix for ppdof print filter core dump problem

State: New

This patch corrects a problem where the filter can core dump when the banner jobname contains 132 characters.

Patch 791.00

OSF520-400

Patch: Fix for salvage utility core dump problem

State: New

This patch fixes a problem with the /sbin/advfs/salvage utility which could cause the utility to core dump.

Patch 793.00

OSF520-343

Patch: Fix for startslip program problem

State: New

This patch fixes a problem where startslip was not able to extract all the information from the acucap file.

Patch 795.00

OSF520-421

Patch: A timing window can cause a hang in run_usr_cmd

State: New

A timing window can cause a hang in run_usr_cmd.

Patch 797.00

OSF520-422

Patch: KZPCA devices now work with SCSI devices

State: Supersedes patches OSF520-136 (261.00), OSF520-162 (483.00)

This patch corrects the following:

  • Fixes a panic caused by SCSI bus resets with KZPCA HBAs.

  • Fixes a kernel memory fault panic after an "ITPSA: itpsa_action - error converting path ID to ITPSA softc structure" message.

  • Adds the capability for KZPCA devices to work with SCSI devices that only support asynchronous data transfers.

Patch 799.00

OSF520-375

Patch: Fixes several problems with collect utility

State: Supersedes patch OSF520-036 (175.00)

This patch corrects the following:

  • Fixes the Collect's collector (/usr/sbin/collect) to correctly report the network interface load percentage.

  • Provides fixes for several problems with the Collect utility. The Collect utility has been updated from Version 2.0 to 2.0.3

Patch 801.00

OSF520-431

Patch: Fix for convuser utility

State: New

Fixes a problem where, if a user was working in enhanced security and then switched to base security, the group and other read privileges would get stripped from /etc/passwd.

Patch 803.00

OSF520-443

Patch: Fixes a problem in access_lines for libmld

State: New

This patch fixes a problem that may cause the third command and other Atom-based instrumentation tools to fail.

Patch 805.00

OSF520-463

Patch: Fixes a system panic from procfs ioctl user code

State: Supersedes patch OSF520-014 (216.00)

This patch corrects the following:

  • Fixes a kernel memory fault in procfs.mod.

  • Fixes a system panic from procfs ioctl user code.

Patch 807.00

OSF520-480

Patch: Security (SSRT1-40U, SSRT1-41U, SSRT1-42U, SSRT1-45U)

State: Supersedes patches OSF520-066 (191.00), OSF520-011 (2.00), OSF520-088 (121.00), OSF520-173A (241.00), OSF520-176 (243.00), OSF520-234 (400.00), OSF520-288 (401.00), OSF520-291 (402.00), OSF520-272 (403.00), OSF520-236 (404.00), OSF520-281 (405.00), OSF520-233 (406.00), OSF520-261 (407.00), OSF520-280 (408.00), OSF520-232 (409.00), OSF520-194 (410.00), OSF520-279 (412.00), OSF520-212 (307.00), OSF520-213 (302.00), OSF520-103A (162.00), OSF520-153 (253.00), OSF520-159A (255.00), OSF520-023A (90.00), OSF520-018 (218.00), OSF520-216 (303.00), OSF520-214 (305.00), OSF520-268 (421.00), OSF520-387 (422.00), OSF520-241 (423.00), OSF520-276A (424.00), OSF520-303 (426.00), OSF520-492 (681.00), OSF520-425 (682.00), OSF520-476 (683.00), OSF520-427 (684.00), OSF520-436A (685.00), OSF520-442 (686.00), OSF520-396 (687.00), OSF520-454A (689.00)

This patch corrects the following:

  • Fixes a problem where logins appear to be hung on standalone systems with Enhanced Security enabled.

  • Fixes a regular expression matching problem in multibyte locales.

  • Fixes the -ignore_all_versions and -ignore_version options for the run-time loader (/sbin/loader).

  • Fixes a problem where strtod() was returning different outputs for the same input. It also fixes a problem where the tan() function was returning the wrong results.

  • Eliminates a libc memory leak that occurred when calling dlclose() in applications linked with the thread's run-time environment.

  • Changes the optional dynamic loader arguments -allocator_range and -allocator to -preallocated_range.

  • Fixes a problem in mktime() when adjusting for a tm struct containing an invalid tm_isdst (daylight savings time) setting.

  • A potential security vulnerability has been discovered where, under certain circumstances, system integrity may be compromised. This may be in the form of network programs core dumping. We have corrected this potential vulnerability.

  • Fixes a segmentation fault problem with long LOCPATH and LANG values.

  • Fixes a problem in which the RPC TCP server incorrectly tries to write to a socket that has already been closed by a client.

  • Fixes an application core dump problem when the LANG environment variable is too long.

  • Fixes a problem with fopen. fopen was returning "file not found" when there was insufficient memory available to allocate the FILE structure. fopen now returns "not enough space" for this case.

  • Fixes a problem in fread() where excessive I/O was taking place for large amounts of data, causing performance problems. It also addresses a failure in fread() to properly handle data sizes that have representations greater than 32 bits (2^32 of data).

  • Fixes a loader core dump that occurs when invoking certain call_shared executables that have been processed by postlink instrumentation tools.

  • Fixes a problem with strerror where buffers could not be allocated.

  • Fixes a problem in fwrite() where it was failing when the total number of bytes to be written was larger than 2 GB.

  • Fixes a regular expression problem with the REG_NEWLINE option of the regexec() routine.

Patch 807.00

continued

  • Fixes a regular expression performance problem as well as two bugs that posed potential regular expression problems for multibyte locales.

  • A potential security vulnerability has been discovered, where under certain circumstances, system integrity may be compromised. This may be in the form of improper file access. We have corrected this potential vulnerability.

  • Resolves a memory leak and a filtering issue in the Event Manager, and allows the evmwatch utility to reconnect automatically if evmd fails and is restarted.

  • Provides enablers for the Compaq Database Utility.

  • Fixes a problem in which binary error log (binlog) events posted by the EMX FibreChannel driver and the system console are reported incorrectly by the Event Manager, EVM.

  • A potential security vulnerability has been discovered where, under certain circumstances, users can clobber temporary files created by shell commands and utilities (for example, under /sbin, /usr/sbin, /usr/bin, and /etc). We have corrected this potential vulnerability.

  • Provides the /usr/lbin/mkstemp program which allows the mechanism to create a secure temporary file.

  • A potential security vulnerability has been discovered where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file access. We have corrected this potential vulnerability.

  • Fixes a problem in which the EVM daemon acting as a subscribing client within a cluster will unexpectedly drop the connection to the other EVM daemons in the cluster. This may happen when an EVM client subscribes to events specifying the cluster alias.

  • Resolves an issue which can cause an Event Manager (EVM) client or the EVM daemon to core dump under rare circumstances.

  • Fixes the following sys_check problems:

    • A potential security vulnerability has been discovered where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file access. We have corrected this potential vulnerability.

    • The verification of invoking processes' name in CLISCRIPT failed due to the PARSING of ps output.

  • Fixes a multi-thread timing window in malloc and free where the list of free chunks could become corrupted, resulting in a segfault.

  • Fixes a regular expression performance problem in sed.

  • Fixes a problem with printing long double values.

  • Fixes a performance degradation in malloc, in applications which perform many mallocs and few frees. With this patch, the performance of malloc is constant regardless of the number of allocated chunks outstanding.

  • Fixes a problem with atexit() or pthread_atfork() handlers in shared libraries. An application will crash when handlers in shared libaries are called after the libraries are dlclosed and unmapped.

  • Compiled format doprnt code does not handle precision correctly.

  • A potential security vulnerability has been discovered where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file access. We have corrected this potential vulnerability.

Patch 809.00

OSF520-527

Patch: Enables correctable error reporting from DTAGII

State: New

This patch enables correctable error reporting from DTAGII chips on GS320/160/80 1.224Ghz CPU systems.

Patch 811.00

OSF520-465

Patch: Fix for the hwmgr utility

State: Supersedes patch OSF520-083 (230.00)

This patch fixes three issues with hwmgr:

  • An incorrect error message is displayed to the user when using hwmgr to offline a CPU that has only one bound process. The incorrect error message is unable to offline this component and the correct error message should report that there are bound processes on the component.

  • The path to the scp device is missing when the hwmgr -view devices command is issued.

  • hwmgr does not show CPU bindings with a tilde (~) whereas the Manage CPU suitlet does when displaying impact information for offlining a CPU. Using the tilde (~) will help distinguish between CPU bindings and RAD bindings. This will also keep the two interfaces consistent for the customer.

Patch 813.00

OSF520X11-025A

Patch: Shared library fix for libXt

State: Supersedes patch OSF520X11-015A (547.00)

This patch corrects the following:

  • Fixes a problem in the X Toolkit library (Xt) which could cause the TeMIP Iconic_map Presentation Module application (mcc_iconic_map) to crash.

  • Fixes a problem where the definition of the X Toolkit function XtPending() was changed in Tru64 UNIX V5.1A, which caused some applications built on earlier versions of Tru64 UNIX to fail.

Patch 815.00

OSF520X11-025B

Patch: Static library fix for libXt

State: Supersedes patch OSF520X11-015B (549.00)

This patch corrects the following:

  • Fixes a problem in the X Toolkit library (Xt) which could cause the TeMIP Iconic_map Presentation Module application (mcc_iconic_map) to crash.

  • Fixes a problem where the definition of the X Toolkit function XtPending() was changed in Tru64 UNIX V5.1A, which caused some applications built on earlier versions of Tru64 UNIX to fail.

Patch 817.00

OSF520-446

Patch: Fixes a simple_lock panic when using ATM

State: Supersedes patches OSF520-030 (165.00), OSF520-057 (167.00), OSF520-185 (557.00)

This patch corrects the following:

  • Fixes a kernel memory fault when using ATM.

  • Corrects a problem which could result in ATM/lane connection requests being dropped.

  • Fixes a kernel memory fault when using ATM.

  • Fixes a "simple_lock: time limit exceeded" panic when using ATM.

Patch 822.00

OSF520-380

Patch: Fix for fixdmn core dump problem

State: Supersedes patches OSF520-065 (177.00), OSF520-260 (559.00), OSF520-370 (818.00), OSF520-397 (819.00), OSF520-391 (820.00)

This patch corrects the following:

  • Fixes several problems with the fixdmn utility where, under extreme cases, it was possible for fixfdmn to core dump or to terminate without fixing the domain.

  • fixfdmn exits prematurely with the message "Can't allocate 0 bytes for group use array" and then instructs user on how to make more memory available, although more memory is not needed.

  • Allows fixfdmn to modify only one page of the transction log.

  • Prevents fixfdmn from changing file sizes unnecessarily.

  • Fixes a case were fixfdmn would abort when the same mcell was on the DDL more than once.

  • Allows fixfdmn to be run on domains which have been mounted under V5.1B and then moved back to an older OS.

  • fixfdmn could core dump on a rare corruption in the tag file.

Patch 824.00

OSF520-458

Patch: Provides the ckfsec reference page

State: New

This patch delivers the ckfsec(1) reference page.

Patch 826.00

OSF520-374

Patch: Security (SSRT0794U)

State: New

A potential security vulnerability has been discovered where, under certain circumstances, system integrity may be compromised. We have corrected this potential vulnerability.

Patch 828.00

OSF520-457

Patch: Security (wc.symlink.002.spautils)

State: New

A potential security vulnerability has been discovered where, under certain circumstances, system integrity may be compromised. This may be in the form of certain files in world-writable directories. This patch provides the ckfsec utility which can help detect such files.

Patch 830.00

OSF520DX-023

Patch: Incompatibility between Java 1.1.x and Java 2 1.2.x

State: New

This patch will allow users who are using SysMan tools on the iPAQ, or who have Java 2 as their default Java version, to communicate with Tru 64 UNIX V5.1A systems.

Patch 832.00

OSF520-488

Patch: Update to exportfs reference page

State: New

This patch updates the exportfs(2) reference page with changed information regarding the exportfsdata structure as a result of increasing a number of file systems that can be NFS mounted from 256 to 1024.

Patch 839.00

OSF520-542

Patch: Fix for clsm sync and lsm startup collision problem

State: Superseded patches OSF520-105 (67.00), OSF520-226 (582.00), OSF520-331 (574.00), OSF520-318 (576.00), OSF520-447 (703.00)

This patch corrects the following:

  • Provides enabler for Enterprise Volume Manager product.

  • Prevents a vold from core dumping when removing a disk from rootdg using voldiskadm or voldg.

  • Prevents a KMF (kernel memory fault) panic, in voldiskiostart(), when an I/O is attempted on an LSM device that is not accessible.

  • Fixes a situation in which when a cluster member fails, mirrored volumes are left in a state such that recovery is always necessary when members boot, even if no additional recovery should be necessary.

  • Fixes a clsm sync and lsm startup collison problem.

  • Fixes a vold core dump when old config db exists.

  • Fixes cluster node panics on boot if klog does not exist.

  • Fixes LSM not recognizing third-party disks.

  • Fixes "unable to create a new diskgroup" when vold is in noloadbalance mode.

  • Fixes error messages for non-rootdg disks when cluster root is under lsm control.

  • Fixes problems in LSM's autoconfiguration feature, as well as some problems in the LSM commands volsave, volrestore, and volclonedg.

Patch 840.00

OSF520-X11-025C

Patch: Definition of X Toolkit function XtPending was changed

State: New

This patch fixes a problem where the definition of the X Toolkit function XtPending() was changed in Tru64 UNIX V5.1A. This caused some applications built on earlier versions of Tru64 UNIX to fail.

Patch 844.00

OSF520-467B

Patch: AdvFS cannot use volumes greater than 2Tb

State: New

This patch corrects the following:

  • Fixes a bug that prevented AdvFS from working correctly with LSM volumes between 1Tb and 2Tb.

  • mkfdmn and addvol will now issue a warning if an attempt is made to use an LSM volume greater than 2Tb in size.

Patch 846.00

OSF520-684

Patch: Security (SSRT1-40U, SSRT1-41U, SSRT1-42U, SSRT1-45U)

State: Supersedes patches OSF520-304 (541.00), OSF520-118 (146.00), OSF520-071 (148.00), OSF520-078 (126.00), OSF520-077 (127.00), OSF520-126 (128.00), OSF520-007 (129.00), OSF520-115 (130.00), OSF520-121 (131.00), OSF520-009 (132.00), OSF520-074 (134.00), OSF520-207 (286.00), OSF520-097 (6.00), OSF520-081 (7.00), OSF520-116 (8.00), OSF520-044 (9.00), OSF520-020 (10.00), OSF520-021 (11.00), OSF520-138 (12.00), OSF520-089 (13.00), OSF520-128 (14.00), OSF520-075 (15.00), OSF520-031 (16.00), OSF520-142 (17.00), OSF520-141 (18.00), OSF520-039 (19.00), OSF520-127 (20.00), OSF520-033 (21.00), OSF520-024 (22.00), OSF520-120 (23.00), OSF520-029 (24.00), OSF520-051 (25.00), OSF520-052 (26.00), OSF520-131 (27.00), OSF520-055 (28.00), OSF520-059 (29.00), OSF520-130 (30.00), OSF520-098 (31.00), OSF520-129 (32.00), OSF520-035 (33.00), OSF520-064 (34.00), OSF520-109 (35.00), OSF520-100 (36.00), OSF520-101 (37.00), OSF520-062 (38.00), OSF520-106 (39.00), OSF520-117 (40.00), OSF520-125 (41.00), OSF520-063 (42.00), OSF520-016 (43.00), OSF520-096 (44.00), OSF520-092 (45.00), OSF520-112 (46.00), OSF520-108 (47.00), OSF520-133 (48.00), OSF520-137 (49.00), OSF520-067 (50.00), OSF520-032 (51.00), OSF520-086 (52.00), OSF520-111 (53.00), OSF520-147 (54.00), OSF520-080 (55.00), OSF520-047 (56.00), OSF520-073 (57.00), OSF520-107 (58.00), OSF520-002 (59.00), OSF520-060 (60.00), OSF520-151 (61.00), OSF520-113 (102.00), OSF520-070 (63.00), OSF520-110 (104.00), OSF520-123 (214.00), OSF520-093 (236.00), OSF520-150 (246.00), OSF520-156 (247.00), OSF520-172 (248.00), OSF520-168 (250.00), OSF520-183 (270.00), OSF520-192 (271.00), OSF520-203 (272.00), OSF520-196 (273.00), OSF520-186 (274.00), OSF520-191 (275.00), OSF520-204 (276.00), OSF520-201 (277.00), OSF520-205 (279.00), OSF520-221 (296.00), OSF520-215 (298.00), OSF520-247 (321.00), OSF520-284 (323.00), OSF520-313 (325.00), OSF520-189 (290.00), OSF520-119 (152.00), OSF520-079 (93.00), OSF520-084 (95.00), OSF520-274 (328.00), OSF520-305 (329.00), OSF520-248 (330.00), OSF520-237 (331.00), OSF520-299 (332.00), OSF520-293 (333.00), OSF520-309 (334.00), OSF520-316 (335.00), OSF520-275 (336.00), OSF520-277 (337.00), OSF520-250 (338.00), OSF520-193 (339.00), OSF520-206 (340.00), OSF520-242 (341.00), OSF520-320 (342.00), OSF520-188 (343.00), OSF520-209 (344.00), OSF520-337 (345.00), OSF520-177 (346.00), OSF520-307 (347.00), OSF520-256 (348.00), OSF520-330 (349.00), OSF520-285 (350.00), OSF520-132 (351.00), OSF520-267 (352.00), OSF520-152 (353.00), OSF520-271 (354.00), OSF520-298 (355.00), OSF520-297 (356.00), OSF520-245 (357.00), OSF520-328 (358.00), OSF520-184 (359.00), OSF520-240 (360.00), OSF520-262 (361.00), OSF520-180 (362.00), OSF520-190 (363.00), OSF520-259 (364.00), OSF520-356 (365.00), OSF520-157 (366.00), OSF520-198 (367.00), OSF520-258 (368.00), OSF520-197 (369.00), OSF520-315 (370.00), OSF520-325 (371.00), OSF520-360 (372.00), OSF520-286 (373.00), OSF520-140 (374.00), OSF520-266 (375.00), OSF520-326 (376.00), OSF520-342 (377.00), OSF520-278 (378.00), OSF520-327 (379.00), OSF520-296 (380.00), OSF520-314 (381.00), OSF520-166 (382.00), OSF520-302 (383.00), OSF520-202 (384.00), OSF520-310 (385.00), OSF520-263 (386.00), OSF520-264 (387.00), OSF520-257 (388.00), OSF520-319 (389.00), OSF520-311 (390.00), OSF520-253 (391.00), OSF520-323 (392.00), OSF520-329 (393.00), OSF520-287 (394.00), OSF520-238 (395.00), OSF520-145 (396.00), OSF520-231 (397.00), OSF520-265 (399.00), OSF520-334 (543.00), OSF520-338 (590.00), OSF520-418 (592.00), OSF520-501 (596.00), OSF520-102 (203.00), OSF520-407 (594.00), OSF520-378 (597.00), OSF520-487 (598.00), OSF520-385 (599.00), OSF520-478 (600.00), OSF520-429 (601.00), OSF520-369 (602.00), OSF520-464 (603.00), OSF520-432 (604.00), OSF520-358 (605.00), OSF520-401 (606.00), OSF520-414 (607.00), OSF520-347 (608.00), OSF520-502 (609.00), OSF520-468 (610.00), OSF520-474 (611.00), OSF520-377 (612.00),

Patch 846.00

continued

OSF520-498 (613.00), OSF520-341 (614.00), OSF520-404 (615.00), OSF520-410 (616.00), OSF520-439 (617.00), OSF520-517 (618.00), OSF520-363 (619.00), OSF520-409 (620.00), OSF520-349 (621.00), OSF520-405 (622.00), OSF520-516 (623.00), OSF520-434 (624.00), OSF520-460 (625.00), OSF520-453 (626.00), OSF520-408 (627.00), OSF520-365 (628.00), OSF520-471 (629.00), OSF520-384 (630.00), OSF520-450 (631.00), OSF520-451 (632.00), OSF520-420 (633.00), OSF520-389 (634.00), OSF520-473 (635.00), OSF520-402 (636.00), OSF520-462 (637.00), OSF520-379 (638.00), OSF520-376 (639.00), OSF520-438 (640.00), OSF520-395 (641.00), OSF520-428 (642.00), OSF520-475 (643.00), OSF520-470 (644.00), OSF520-348 (645.00), OSF520-353 (646.00), OSF520-449 (647.00), OSF520-355 (648.00), OSF520-357 (649.00), OSF520-459 (650.00), OSF520-386 (651.00), OSF520-312 (652.00), OSF520-503 (653.00), OSF520-413 (654.00), OSF520-524 (655.00), OSF520-399 (656.00), OSF520-361 (657.00), OSF520-491 (658.00), OSF520-406 (659.00), OSF520-513 (660.00), OSF520-489 (661.00), OSF520-398 (662.00), OSF520-512 (663.00), OSF520-525 (664.00), OSF520-448 (665.00), OSF520-390 (666.00), OSF520-344 (667.00), OSF520-411 (668.00), OSF520-440 (669.00), OSF520-467 (670.00), OSF520-499 (671.00), OSF520-455 (672.00), OSF520-472 (673.00), OSF520-383 (674.00), OSF520-403 (675.00), OSF520-371 (676.00), OSF520-373 (677.00), OSF520-469 (678.00), OSF520-452 (680.00), OSF520-520 (834.00), OSF520-555 (835.00), OSF520-520 (837.00), OSF520-467A (842.00)

This patch corrects the following:

  • Fixes "ata_probe: reset failed, sts=0x7f, err=0x7f" errors for IDE disks not connected to the system.

  • Updates the EMX driver to vV2.02 and fixes the following problems:

    • Fixes a panic of "can't grow probe list".

    • Fixes a problem of an mcs_lock panic when an adapter experiences a h/w hang condition.

  • Updates the EMX driver to V2.01.

  • Fixes a problem of unexpected tape I/O aborts.

  • Fixes a panic of "can't grow probe list".

  • Fixes several kernel memory faults within the driver.

  • Redundant adapter failures no longer panic the system.

  • Corrects a problem of panicking with low memory resources.

  • Corrects stalling I/O during reprobing when a cluster member goes down.

  • Fixes some problems seen with loading and unloading dynamic drivers.

Patch 846.00

continued

  • Fixes a problem where, when using VX1 graphics module, the mouse cursor disappears when moved along the left and topmost edges.

  • Fixes a kernel crash dump generation problem which resulted in the wrong page(s) being compressed/written. Without this fix, postmortem debugging may be difficult or impossible.

  • Fixes a "simple_lock timeout" system panic due to a bug between mcs_unlock and mcs_lock_try on the same CPU.

  • Provides NHD4 enablers for future hardware support.

  • Provides a new /usr/sbin/wol command that utilizes the Wake (remotely power) feature for a future platform through the network (LAN).

  • Provides NHD4 enables for future hardware support of a graphics device.

  • Fixes a time loss problem seen on DS systems (TSUNAMI) only when using console callbacks. The patch resynchronizes the clock when a time loss is detected.

  • Fixes a rare panic in the driver for the DE600/DE602 10/100 Ethernet adapter.

  • Provides NHD4 enablers for future hardware support of a new platform.

  • Fixes a domain panic pointing to quotaUndo, when a domain has a fileset with a clone, the clone is deleting, and a file in the fileset finds no space available in the domain.

  • Corrects a problem where the network subsystem sometimes sends a null TCP packet when a connection is reset.

  • Provides enabler support for Enterprise Volume Manager product.

  • Fixes a system panic with "malloc_check_checksum: memory pool corrution".

  • Fixes a problem in which issuing a quot -h command causes a memory fault when the /etc/fstab file contains a mount point that is not mounted.

  • A potential security vulnerability has been discovered in the kernel where, under certain circumstances, a race condition can occur that could allow a nonroot user to modify any file and possibly gain root access.

  • Fixes the problem with IPv6 raw socket creations.

  • Corrects a CFS problem that could cause a panic with the panic string of "CFS_INFS full".

  • Fixes a problem with erroneous data being returned from the DEVIOCGET ioctl if an error occurs while processing the ioctl.

  • Fixes a problem in which a TCP socket can continue to receive data with no application running.

Patch 846.00

continued

  • Fixes a performance problem.The results are large performance increases in configurations where more than 8 tapes are supported on a Fibre Channel (usually behind an MDR or FCTCII).

  • Allows a single ddr.dbase entry to support a particular SCSI device on both parallel SCSI and FC buses. Previously, SCSI devices connected behind an FCTCII or MDR would not be properly associated with their ddr.dbase entry.

  • Fixes a panic experienced while task swapping.

  • Fixes a bug in virtual memory that can cause a kernel memory fault.

  • Provides NHD4 enablers for future hardware support for an array controller.

  • Fixes to some problems found with RAID Services that include:

    • Raid services not acknowledging presence of CAM RAID device

    • A hang

    • The inability to prohibit a user from deleting a logical volume while it is in use

    • A "malloc_check_checksum: memory pool corruption" system panic

  • Fixes the following two problems:

    • Threads can hang in x_load_inmem_xtnt_map().

    • The I/O transfer rate can suddenly drop when writing to a hole in an AdvFS domain, when a volume in that domain becomes full.

Patch 846.00

continued

  • Fixes the following Virtual Memory problems. The first three are seen on NUMA systems only, and the fourth problem can be seen on any system type:

    • A "vm_pg_alloc: page not free" system panic that occurs during process migration.

    • A "vm_pageout_activate: page already active" system panic that occurs if one thread is unlocking some pages in memory while another thread is migrating them.

    • Memory inconsistencies caused by the fault path for large shared memory regions prematurely releasing a hold on a page it just locked. This can cause a variety of problems, including user program errors and system panics.

    • A "simple_lock: time limit exceeded" system panic that occurs if very large (8 MB or larger) System V Shared memory regions are in use.

  • Fixes a problem with the memory controller attempting to post an EVM event indicating that a particular PFN has been mapped out.

  • Fixes lock time issues, UBC performance problems, and provides AdvFS and UFS performance improvments in platforms (other than AlphaServer GSxxx) with low memory.

  • Fixes several bugs related to shared memory (memory that can be accessed by more than one CPU) that could lead to panics, hangs, and performnace problems.

  • Fixes a bug that can cause performance problems for certain applications when the sysconfigtab parameter ipc:sem_broadcast_wakeup is set to 0.

  • A check for managed address may return an invalid value when called with the address of a gh region not on rad 0.

  • Fixes a kernel memory fault in msg_rpc_trap.

  • Fixes a potential problem with lost data after a direct I/O write with a file extension followed quickly by a system crash.

  • Fixes a crash that occurs when disk controllers are restarted repeatedly.

  • Fixes a "u_shm_oop_deallocate: reference count mismatch" due to a bug in locking mechanism when gh_chunks are in use.

  • Provides the I/O barrier code that prevents HSG80 controller crashes (firmware issue).

  • Corrects the problem of a thread deadlocking against itself under the following conditions:

    • Running in a cluster.

    • Opening (and then closing) a directory that has an index file.

    • Trying to open the index file through .tags (for example, defragment does that) and by coincidence getting the vnode that pointed to the directory that the index file is attached to.

  • Fixes a kernel panic with the message "bs_invalidate_rsvd_access_struct: bad access struct".

Patch 846.00

continued

  • Ensures that DMAPI region information maintains consistency across CFS server and client nodes in the case that an unexpected node failure occurs.

  • Fixes a problem where additional HSZ70 control ports, /dev/cport/scpN, were created during HSZ70 controller failover operations.

  • Prevents a crash seen while deleting SCSI devices using hwmgr.

  • A potential security vulnerability has been discovered where, under certain circumstances, system integrity may be compromised. This could result in a panic with the string: "lock_clear_recursive: recursion not enabled". We have corrected this potential vulnerability.

  • Fixes a problem where new devices could be created when following the HSZ70 controller failover procedure.

  • Fixes the problem where reading a clone file that is still in the UBC after an rmvol may panic the system.

  • Fixes a problem where a variable was used without being initialized, which could lead to a possible kernel memory fault.

  • Provides AdvFs and VFS support for freezefs and thawfs.

  • Provides the enabler for Enterprise Volume Manager Version 2.

  • Corrects several CAM errors including the following:

    • Passthru IOCTL fails with EIO (CAM_BUSY) problem.

    • RESERVATION CONFLICT driver BUSY problem.

    • Enforces super user-only access for SCSI passthrough.

  • Enables access to SCSI control ports (/dev/cport/scp??), allowing management of some types of RAID controllers.

  • Eliminates unintended AutoFS auto-mount storms.

  • Extraneous "This node removed from cluster" events cause panics of cluster nodes.

  • Fixes a panic that occurs if DMAPI operations are erroneously executed on an NFS filesystem.

  • Processes triggering stack growth with anon_rss_enforce set to 2, and exceeding the set resident memory limit, hang, or panic.

  • Fixes a kernel panic with the messages "xfer_hole_stg: unaligned kernel access" or "xfer_hole_stg: kernel memory fault".

Patch 846.00

continued

  • Fixes a timing window where flushing data to disk can be incomplete when a system is going down, if more than one thread calls reboot() without first going through shutdown, /sbin/reboot, or /sbin/halt.

  • Ensures that if an AdvFS file is opened for both O_DIRECTIO and O_APPEND, threads racing to append data to the file will be correctly synchronized, and all data will be appended to the file.

  • Fixes several direct I/O problems seen when using the AIO interface. The symptoms include a kernel memory fault, and an AIO condition that causes a live_dump to be generated.

  • Fixes a condition where the smoothsync thread, in attempting to flush dirty buffers for memory-mapped files, would also flush buffers for nonmemory-mapped files. This did not cause any errors, but could cause more I/O than necessary to be done.

  • Allows POSIX semaphores/msg queues to operate properly on a CFS client.

  • Fixes the following problems:

    • Running verify may panic the system.

    • A kernel memory fault may occur while attempting to read a log record.

  • Prevents a race in msfs_umount.

  • Provides a fix to a deadlock situation that can occur when you invoke the hwmgr -show comp command while the devices on an HSZ70 are changing their names. The devices on an HSZ70 would change their names when you set nofailover or when you set failover on the HSZ70.

  • Fixes a problem where network interfaces can appear unresponsive to network traffic.

  • Do not print "path reduced" messages at boot time for devices that still have at least one valid path.

  • Enables the quick reclaim and deallocation of a vnode.

  • Under stress conditions where the DMAPI functionality is in use, a panic may occur. A fix is available for this problem.

  • Fixes a problem where the setgid bit of a directory was not being set when created, if its parent directory has the setgid bit set.

  • Corrects several problems in kernel routing:

    • Fixes a panic when deleting an IP address.

    • Fixes a panic when performing IP reconfiguration.

    • Fixes to add interface route on address configuration.

  • Fixes the panic "ics_unable_to_make_progress: input thread stalled".

Patch 846.00

continued

  • Addresses three UBC issues:

    • Reinstates ubc_maxpercent hardlimit behavior.

    • Allows the UBC to purge and steal pages under very low free memory conditions during page allocation.

    • Removes memory mapping for NFS pages being invalidated and freed. Pages were being freed but still mapped the process.

  • Provides an NFS fix to support the Enterprise Volume Manager product.

  • Corrects a performance problem where NFS V3 I/O used larger than necessary buffers when writing to locked files resulting in lower throughput.

  • Provides a script, /usr/sbin/evm_versw_undo, that will allow a user to remove the EVM patch after the version switch has been thrown by running clu_upgrade -switch. This script will set back the version identifiers, request a cluster shutdown, and reboot to finish the deletion of the patch. Another rolling upgrade will be required to delete the patch with dupatch.

  • Provides an enabler for a version-switched patch.

  • A SCSI Check Condition with NO SENSE status will now be treated by the disk driver as a condition to retry the I/O.

  • Fixes a panic that could occur if an illegal argument is passed to UFS mount by a root user.

  • Fixes a kernel build failure when AdvFs is excluded from the build.

  • Fixes a problem where the system may be hung or there are poor response times on systems with limited numbers of CPUs.

  • Fixes an "RDG unwire panic" when running with RDG and GH chunks.

  • Resolves a problem where duplicate attributes are registered for all CAM devices present in a system. This affects iostat output and any other application that relies on the attribute data.

  • Adds fixes for additional firmware problems found in the HSx controller.

  • Fixes the scheduler at high load averages and initial NUMA process placement.

  • Fixes a rmvol failure that would be seen as an E_PAGE_NOT_MAPPED error when no more space is available for user data migration to another volume in the domain.

Patch 846.00

continued

  • Fixes the following tape drive problems:

    • Tape devices in multipath configurations unexpectedly rewind or go off line. (Multipath means that I/O can reach the device by an alternate data path, such as a redundant controller or bus.) Note that this patch reverts your tape drive configuration to single path mode.

    • The vdump utility fails to close because the drive goes off line before the dump operation is complete. An error message similar to the following is displayed:

      vdump: unable to properly close device <dev/tape/tape1_d1>; [5] I/O error

  • Opening a disk partition sometimes fails when the disk is on shared bus.

  • Fixes "kernel memory fault" panic on NUMA systems because of corrupt UBC LRU.

  • Fixes poor interactive response including hanging commands and logins, and random drops in I/O rates when writing many large files.

  • Fixes a potential problem in which stale data may be returned to an application running on a CFS client when it reads data from a file on a CFS server. Another possible symptom is incomplete flushing of user data when an fsync() is issued or an O_[D]SYNC write is performed.

  • A potential security vulnerability has been discovered where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file access. We have corrected this potential vulnerability.

  • New Barrier code will not reserve after a registration if new device or new cluster install.

  • HSV110 Persistent Reserve with a Reservation conflict SCSI status gets passed off to cam_notify when it should not, resulting in incorrect reservation status.

  • Addresses a data inconsistency that can occur when a CFS client reads a file using direct I/O that was recently written to.

  • Fixes a SEL logging problem where panic events were logged as misc events. It also adds new event types that can be logged.

  • Fixes a problem in which the system could panic while performing CPU hotswap.

  • A potential security vulnerability has been discovered in networking where, under certain circumstances, a remote system can take over packets destined for another host.

  • Link Aggregation groups can be successfully created and configured but are unable to successfully transmit and receive packets over the resulting lag interface.

  • Prevents a potential panic with non-StorageWorks RAID controllers that used the same name for a controller and a disk drive. This conflict was resolved in a prior release but left open the possibility that any attempt to access this disk drive by the kernel could result in a system panic.

  • Supports a related cluster patch.

Patch 846.00

continued

  • Removes a panic seen at boot time of the form:

    panic (cpu 6): u_anon_oop_deallocate: anon_rss_pagelist has pages queued

  • A potential security vulnerability has been discovered where, under certain circumstances, system integrity may be compromised. This may be in the form of file corruption due to the manner in which setuid/setgid programs core dump. We have corrected this potential vulnerability.

  • Fixes a kernel memory fault in wait_to_readyq(), or advfs_page_busy(), or potentially other routines which may reference a vm_page, bsBuf, or ioDesc that has been freed prematurely.

  • Fixes the C++ incompatibility of the following:

    /usr/include/io/dec/bi/bdareg.h
    /usr/include/io/dec/bi/buareg.h
    /usr/include/io/dec/eisa/aceregs.h
    /usr/include/io/dec/eisa/eisa.h
    /usr/include/io/dec/fbus/fbusreg.h
    /usr/include/io/dec/pci/pci.h
    /usr/include/io/dec/pcmcia/pcmcia.h
    /usr/include/io/dec/pcmcia/ti1130_reg.h
    /usr/include/io/dec/tc/sccreg.h
    /usr/include/io/dec/tc/tc.h
    /usr/include/io/dec/ws/comet_driver.h
    /usr/include/io/dec/ws/comet_regs.h
    /usr/include/io/dec/ws/inputdriver.h
    /usr/include/io/dec/ws/ws_driver.h

  • The published cam_logger() interface was modified in V5.1A to accept a hardware ID in its parameter list. This patch restores the cam_logger interface to its published specifications, and introduces the cam_logger3() interface to accept a hardware ID in its parameter list.

  • Addresses a potential UBC panic which could occur when accessing CFS file systems.

  • Fixes a problem with vm_faults against anon objects mapped by multiple map entries.

  • Contains AlphaServer ECC Enhancements for DTAG error logging.

  • Fixes a problem where decreasing the smoothsync_age does not always have an effect.

  • Fixes a system panic and/or data inconsistencies caused by changing FIFO parameter pipe-databuf-size while FIFO operations are in flight.

  • Fixes AdvFS synchonization problems with lingering I/O messages during domain deactivation or rmvol. It also fixes problems caused by certain kmem_debug settings (kmem_debug=0x40, kmem_protected_size=4096) and AdvFS's handling of freed memory.

  • Fixes and enhances Tru64 UNIX to support Encore realtime software.

  • Modifies rmvol so that error messages reflect why rmvol fails.

  • Modifies showfdmn so that showfdmn will not print "Succeeded" on a failure. For example:

    showfdmn: unable to get info for domain `domain_used`
    showfdmn: Successful

Patch 846.00

continued

  • Fixes a potential CFS deadlock.

  • Fixes a problem where, when running SSH V2.4.0 and vV2.4.1, users will see a problem executing ls in sftp and when uploading public key using ssh-pubkeymgr.

  • Fixes SEL logging problem where panic events were logged as misc events. It also adds new event types that can be logged.

  • Corrects a problem that is encountered when trying to create an Oracle database on an AlphaServer GS system that has a memoryless QBB. Without this patch, direct I/O to to an AdvFS file using asynchronous I/O will hang if it is completed on a memoryless QBB.

  • Corrects problems when running the dd utility on a disk with a label. It would not return errors when expected.

  • A potential security vulnerability has been discovered where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file or privilege management. We have corrected this potential vulnerability.

  • Fixes a problem where I/O suspended (hung) in cluster configuration where one or more rad does not have a valid, initialized path.

  • Fixes a problem that causes bugchecks from applications running DECthreads.

  • Fixes locking on retry case for multithreaded select/poll. A panic with the following panic string is indicative of this problem:

    PANIC: "thread_block: simple lock owned"

  • Fixes a potential problem where system responsiveness may be impacted.

  • Fixes a Kernel Memory Fault in DMAPI code under cluster stress conditions.

  • Fixes a calculation leading to poor hash table distribution for NFS client mountpoints in the cluster.

  • Eliminates unintended AutoFS automounts, in particular those that may result via the execution of any pre-Tru64 UNIX V5.0 df command.

  • Corrects a problem where multivolume AdvFS V3 domains exhibit I/O errors (not attributable to hardware). The same problem also causes a failed mkfset due to ENO_XTNTS.

  • Fixes a problem where storage allocation for a file opened for direct I/O could, depending on the write sizes requested, have large extent maps even though the disk was not fragmented. Although the file functioned correctly, performance was reduced by the numerous extent maps. This fix reduces the number of extent maps generated, and subsequently gives better I/O performance on the resulting file.

  • File permissions inherited from a default ACL may be different than expected in rare cases.

  • Corrects the problem where the DLI queue stalls when there is no traffic in the TCP/IP or HDLC stacks.

  • Corrects a problem where clocks on systems could move backwards after subsequent relocations of the root file system using cfsmgr.

Patch 846.00

continued

  • Two problems are corrected for non-NUMA systems:

    • A kernel stack not valid halt on a CPU, which will trigger a PANIC TB_SHOOT ACK TIMEOUT or lock timeout.

    • A simple lock timeout, or a panic due to holding a simple lock during a context switch.

  • Corrects an issue seen on NFS clients. The aggressive behavior of client negative lookup cache for concurrent create/lookup was tamed.

  • Corrects an issue with mmapped() files on an NFS mounted file system. Changes to an mmapped() file were not being immediately seen.

  • Fixes a problem where the tape changer is only accessible from member that is the drd server for the changer.

  • Fixes a problem where socket-based applications can hang in soclose().

  • During file system relocation the system may panic due to a kernel memory fault when a directory larger than 8192 bytes has been deleted while simultaneously being accessed by another thread.

  • Corrects a kernel memory fault on multiple CPU systems when two or more CPUs find an AdvFS problem at the same time.

  • Fixes a problem where, after a system crash, on reboot there is a domain panic.

  • Corrects the problem where attempts to delete psets can hang the system.

  • Prevents an AdvFS metadata inconsistency in the event of a system crash.

  • Prevents a possible extent map corruption when multiple volumes are full.

  • Fixes a problem with multithreaded applications that can cause the application to consume 100% of the CPU usage time.

  • Fixes a domain panic in a cluster when a file system is mounted on a disk accessed remotely over the cluster interconnect.

  • Fixes locking problems in vclean().

  • Fixes the CEH bus/target and lun number when the LUN > 127.

Patch 846.00

continued

  • Fixes a kernel memory fault when freeing devices.

  • Corrects problems with USB causing panics under heavily stressed systems.

  • Corrects a problem with the counters maintained for the NetRAIN virtual interface.

  • Provides Version 1.02 of the Ciss Driver.

  • The psrinfo -v command may print an incorrect CPU cache size in a mixed CPU size/speed environment.

  • Prevents a panic in assert_wait_mesg caused by the posting of an event_wait without clearing a previous request.

  • Fixes a problem where tape and changer devices on Fibre Channel could occassionally return an incorrect offline status.

  • Enables the kernel crash dump subsystem to generate a dump after disk driver shutdown has taken place.

  • Fixes a potential "kernel memory fault" panic in the Virtual Memory subsystem on SMP systems.

  • Adds hardware support for the DS25, and fixes a minor bug in the ES45 environmental error handling code.

  • Corrects problems where NFS can deadlock and also corrects an AdvFS problem where EIOs are returned by AdvFS to NFS.

  • Addresses a kernel memory fault panic in malloc_thread().

  • Fixes the predictable TCP Sequence Number.

  • Addresses a data inconsistency that can occur when a CFS client reads a file that was recently written to.

  • Supports a related cluster patch to support multiple filesets being mounted from the cluster_root domain.

  • Fixes a potential deadlock situation when using freezefs on multiple domains while also running addvol (or rmvol).

  • Fixes numerous problems of accessing deallocated and freed vnodes.

  • Fixes several problems in Link Aggregation (LAG):

    • Cannot modify the ipmtu of a LAG interface.

    • May attempt to use a link that is down.

    • Poor performance in server-to-server configurations.

  • Fixes a situation where a failed open to a device will cause an error so that the device cannot be deleted using hwmgr.

  • Fixes an incorrect return type in a logging routine that prevented proper operation of the memory troller on a DS20L.

  • When offlining a processor, a seldom taken code path may attempt to take a complex (sleep or blocking) lock while in interrupt context. Since it is illegal to block in interrupt context, the kernel panics.

  • Fixes a potential problem with vdf and showfdmn, where they could incorrectly display the message:

    showfdmn: No such file or directory

  • Prevents a cluster filesystem-server panic that can occur if a cluster client clears the server cache entries for a file being operated on by defragment, balance, migrate, rmvol, or mssh.

Patch 846.00

continued

  • Fixes several problems found in the KZPEA driver that could result in hung I/O, pending I/O not being cleared on a reset, panics seen when aborting I/O, and a hard error returned to applications on opens during reset conditions.

  • A potential security vulnerability has been discovered where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file access. We have corrected this potential vulnerability.

  • Contains changes to the evm_versw_undo script to fix no-roll installation and deletion of the EVM version-switched patch.

  • Fixes a problem with the logging of MUNSA reject status messages to the console during boot which could cause a system to boot extremely slow.

  • Fixes a kernel memory fault from sth_close_fifo() caused by a NULL pointer.

  • Fixes an ISO9660 file system size limitation of 2.1 GB and provides full capacity access to DVDROM media.

  • Cluster unlinked files are now handled properly during a relocation.

  • Fixes a deadlock problem when deleting devices while the system disk is in error recovery.

  • Recovers the POSIX semantics for accessing "." entry.

  • Closes a race condition between VFS and UFS layer code that causes panic while periodic sync mechanism flushes dirty buffers out to disks.

  • Fixes performance shortcomings in NXM thread replacement.

  • Reduces the number of inputs/outputs to the disk, which reduces the number of audible disk ticks.

    Fixes a problem for NFS mounts using the -o proplist option, where disk space is not being freed when files are deleted.

  • Fixes a kernel memory fault in u_seg_global_destroy.

  • Fixes a crash when an AdvFS filesystem reports I/O errors and enters into a domain panic state. AdvFS's error cleanup would panic on an invalid pointer and report an "invalid memory read access from kernel mode" panic message.

  • Fixes an ISO9660 file system size limitation of 2.1GB and provides full capacity access to DVDROM media.

  • Fixes a problem which can prevent certain tape applications from recovering paths to devices that have failed.

  • Prevents a panic from occurring while trying to mount an AdvFS domain. The panic would only appear when the mount command was about to fail.

  • Fixes a problem with the logging of MUNSA reject status messages to the console during boot which could cause a system to boot extremely slowly. It also corrects a problem with reservation conflicts in the TUR tecovery loops.

  • Fixes two NFS kernel memory fault panics due to bad NFS server data.

  • Corrects "u_anon_free: page busy" panics.

  • Corrects a problem where an I/O can fail back to the application when a HSV110 V2 path failover is performed. This is incorrect behavior; the application should not have the I/O returned with a failure status when a path failover occurs.

Patch 846.00

continued

  • Corrects a problem where a tape open with no tape present in the drive can take as long as six minutes to fail.

  • Fixes a VFS namecache race condition where both positive and negative namecache entries can exist.

  • Corrects a problem where low UBC memory conditions cause hang in AdvFS.

  • Corrects a problem in cluster backups of global root directories or backup of different system disks in a cluster.

  • Fixes an AdvFS alignment fault panic. The panic is caused by inconsistent AdvFS metadata in a directory. In particular, the directory's entry size is an unaligned value.

  • If an I/O fails and it may be helped by an AdvFS-initiated retry, a message will be written to the console providing information on how to retry.

  • Fixes a problem where an internal value related to the maximum I/O size for a device was being calculated incorrectly.

  • Provides support for the DEGXA Gigabit Ethernet device, including the ES25 onboard 10/100/1000 Ethernet port.

  • Adds the Reserve/Release/Path_Lock feature to tape and changer drivers.

  • Corrects a problem of writing erroneous data to the binary error log file and provides missing header definitions for error interpretation.

  • Contains a variety of domain panic fixes that better capture, explain, and handle domain panics.

  • Fixes a cluster-as-NFS-server chown() problem.

  • Fixes a problem where the system panics while running applications performing open of RAID device, and the faulting routine is control_port_open.

  • Fixes a problem where cluster filesystem I/O and AdvFS domain access causes processes to hang.

  • Fixes a situation in which a system running cdrecord software experiences I/O timeout errors when writing CDs.

  • Corrects a silent infinite loop in vdump by correcting the AdvFS system call OP_GET_BKUP_XTNT_MAP. The call will now return the valid xtntCnt when it fails due to E_NOT_ENOUGH_XTNTS.

  • Fixes a problem where, in certain cases, large files (~30Gb) suffered extreme fragmentation.

Patch 846.00

continued

  • Fixes a kernel panic of "bfs_alloc: kernel memory fault".

  • Corrects a problem which had resulted in broadcast or multicast packets being processed multiple times on behalf of a NetRAIN device, once for each backup interface.

  • Fixes a problem that caused the 4.3BSD socket interface to return incorrect values for IOCTL calls accessing IP alias address information.

  • Supports a cluster patch which corrects a performance issue seen when multiple threads/processes simultaneously access the same file on an SMP (>1 CPU) system.

  • Fixes a problem where, when entering the hwmgr -view devices command on a member in a cluster, the device name would not be updated and would be listed as unknown.

  • When adding a CDROM or floppy disk after boot, only A and C device special files would get created. In order to create all the device special files, the usere would have to enter dsfmgr -K or reboot. This no longer needs to be done by the user.

  • Fixes heap and stack limitations in the older OS versions required for SAP.

  • Prevents several possible system panics and an AdvFS deadlock.

  • Fixes a problem that allowed an application with superuser privileges to cause a system panic when attempting to delete a nonexistent connection; for example, when the program tcpkill runs while stopping ASU.

  • Fixes an AdvFS AIO read timing issue when reading a fragged file via directIO.

  • Prevents a panic when more metadata file space is needed and the disk write to allocate it fails.

  • Removes a restriction where dynamic VMEbus device drivers could only probe one controller per driver. Multiple controllers per driver now configure successfully.

  • Fixes kernel memory faults caused by ufs_sync_int accessing an inactivated or de-allocated vnode. This change also corrects a problem with negative block number detection in ufs_stratgey.

  • Provides support for the pseudo device /dev/poll to the kernel which allows for very efficient polling of a large number of file descriptors.

  • Corrects a problem that caused the RFC 2001 Fast Retransmit Algorithm within the kernel to work incorrectly.

  • Fixes three problems with the ee driver for DE60x Ethernet cards. These problems affect all Tru64 systems containing DE60x network interfaces.

    • Fixes a race condition that can cause a panic when a transmit timeout occurs.

    • Improves error checking when allocating buffers.

    • Fixes DMA resource allocation to prevent a panic when a machine runs low on DMA resources.

Patch 846.00

continued

  • Adds a new ee subsystem attribute link_check_interval that allows the link state polling interval to be tuned for faster failover times when using DE60x interfaces for Link Aggregation.

  • Fixes a DMAPI problem where showfile can show that DMAPI regions exist when they do not.

  • Supports a cluster-specific patch which fixes a race between cluster mounts and file system lookups, and fixes a situation in which file system failover deadlocks.

  • Fixes an NFS readahead performance problem where performance is degraded when reading past two gigabytes in a file.

  • Fixes a problem where advscan incorrectly processes concatenated options (e.g., -ar vs. -a -r). For instance, if -ar is specified, the (-r) option will not be processed.

  • Prevents a lock hierarchy violation from occurring when AdvFS tries to extent a file on a system that is out of memory.

  • Addresses the problem of applications hanging with outstanding I/O during high volume I/O in a cluster environment.

  • Provides I/O resiliency improvements.and prevents some AdvFS domain panics due to inadequate error handling between the HSG80 and the Tru64 disk driver.

  • Updates the EMX driver to v2.03 and fixes a problem which could cause an EMX driver panic during adapter resets.

  • Re-enables mountd to support exports file with multiline entry using leading spaces as continued line indicator. The problem was introduced with a patch that increases support of NFS file mounting from 254 to 1024 entries.

  • Corrects a problem with arp messages not being sent on interface static routes.

  • Provides the PCI indictment for storage component location to diagnose a PCI adapter failure.

  • Resolves a deadlock problem as well as a potential problem with incorrect or inconsistent cluster devts that could occur in a cluster when removing or replacing a device.

  • Corrects a problem where moving the power supply from one slot to another can cause a panic.

  • Corrects a possible panic when auditing execve with exec_argp/exec_envp enabled.

  • Allows the device special file instance numbers to be reduced to the their lowest possible value and avoid runaway device names.

  • Fixes a problem where, under certain conditions, invalidating a portion of a very large file can make the filesystem appear to be hung. Any program trying to access the filesystem, ls for example, will hang until the file is invalidated. This will only happen when rt_preempt_opt=1.

  • Allows multiple applications utilizing RAID Services to send maintenance commands without interfering with each other.

  • Prevents different threads on multiple RADs from creating multiple references to the same level 3 page table.

  • Fixes new_wire_method (light weight wiring) issues known as the Oracle connect problem or Oracle performance problem.

  • Corrects an ARMTech kernel malloc invalid size panic.

Patch 846.00

continued

  • Addresses an issue with regards to creation of a crashdump on certain systems that use granularity hints regions.

  • Increases the number of filesystems that can be mounted from 256 to 1024. It also fixes audit to generate exportfs_create audit records correctly.

  • Prevents a situation in which the disk drives on a DS25 overheat if the system door is removed for too long.

  • A kernel memory fault panic could occur in irefresh while walking the mounted vnode list.

  • Fixes a problem resulting in a system panic for applications that directly call nxm_get_bindings.

  • Allows users other than root to now mount CDROM media on directories that they own.

  • Fixes a bug that prevented AdvFS from working correctly with LSM volumes between 1Tb and 2Tb. Also, mkfdmn and addvol will now issue a warning if an attempt is made to use an LSM volume greater than 2Tb in size.

  • Corrects a potential loss of data in files opened for directIO when writing in increments smaller than 8 K.

  • A potential security vulnerability has been discovered where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file access. We have corrected this potential vulnerability.

  • Fixes a problem in network Link Aggregation (LAG) where the MAC address of a LAG interface would change if the link from which it had derived its MAC address went down.

  • Fixes a kernel panic with a "get_xm_page_range_info:kernel memory fault" message.

  • Addresses several issues with page faults and stack object growth.

  • Corrects a problem where df was showing negative values for large NFS file systems.

  • Corrects a problem where multi-threaded processes may hang in timed condition waits (pthread_cond_timedwait()) when running realtime system contention scope threads.

  • Enables a larger maximum 1,073,741,824 for the inode_hash_size attribute in the UFS subsystem.

  • Fixes a problem that was causing the tcp_rad_fasttimo timer to consume excessive amounts of CPU time.

  • When mounting an AdvFS filesystem with the -o dual option in a cluster, the domain ID was not always being updated. If the mount -o dual happened on a node other than the node that was serving the original domain, AdvFS did not detect that the domain ID was already active and failed to update the ID for the new domain. The fix is to always create a new domain ID when the -o dual option is used.

  • Corrects a problem introduced in a prior patch which can result in a system panic when outputting through the packet filter.

  • This problem is seen when previously failed paths to a device (for example, hsz80) are restored. It can cause panics of cluster members.

  • Fixes a problem where AdvFS domains from a pre-V5.0 system that are mounted on a V5.1A Patch Kit 3 system would give "corrupted directory entry size" error messages when some files were accessed.