HP Tru64 UNIX Patch Summary and Release Notes for Patch Kit 1 This manual contains information specific to Patch Kit 1 of the Tru64 UNIX operating system and TruCluster Server software products for Version 5.1B. It briefly describes the patches contained in this kit and provides information you should be aware of when installing certain patches. For information about installing or removing patches, baselining, and general patch management, see the _P_a_t_c_h _K_i_t _I_n_s_t_a_l_l_a_t_i_o_n _I_n_s_t_r_u_c_t_i_o_n_s . __________________________________________________ Hewlett-Packard Company Palo Alto, California Copyright 2002 Hewlett-Packard Company Microsoft(R), Windows(R), and Windows NT(R) are trademarks of Microsoft Corporation in the U.S. and/or other countries. Intel(R) and Pentium(R) are trademarks of Intel Corporation in the U.S. and/or other countries. Motif(R), OSF/1(R), The Open GroupTM, and UNIX(R) are trademarks of The Open Group in the U.S. and/or other countries. All other product names mentioned herein may be trademarks or registered trademarks of their respective companies. Confidential computer software. Valid license from Compaq Computer Corporation, a wholly owned subsidiary of Hewlett-Packard Company, required for possession, use, or copying. Consistent with FAR 12.211 and 12.212, Commercial Computer Software, Computer Software Documentation, and Technical Data for Commercial Items are licensed to the U.S. Government under vendor's standard commercial license. None of Compaq, HP, or any of their subsidiaries shall be liable for technical or editorial errors or omissions contained herein. The information in this document is provided "as is" without warranty of any kind and is subject to change without notice. The warranties for Compaq products are set forth in the express limited warranty statements accompanying such products. Nothing herein should be construed as constituting an additional warranty. 19-Dec-02 Contents About This Manual Audience ............................................ v Organization ........................................ v Related Documentation ............................... v Patch Process Resources ............................. vi Reader's Comments ................................... vi 1 Tru64 UNIX Patches 1.1 Release Notes ................................. 1-1 1.1.1 Required Storage Space ................... 1-1 1.1.2 Problem Seen on Systems with Smart Array Controller ................................. 1-2 1.1.3 Broken Links Reported During Baselining .. 1-2 1.1.3.1 New Russian Keyboard (Patch 339.00) 1-3 1.1.4 Panics May Occur on Multi-CPU Systems .... 1-4 1.1.5 General and Problem Information for AlphaServer ES47, ES80, and GS1280 Systems . 1-4 1.1.5.1 CPU Offline Restrictions ........... 1-4 1.1.5.2 Problem with Capacity on Demand Process ................................ 1-4 1.1.5.3 Hardware SCSI Bus Errors ........... 1-5 1.1.5.4 Compact Disk Drive Errors Logged ... 1-5 1.1.5.5 Presence of Third-Party Devices May Cause System Panic ..................... 1-5 1.1.5.6 Repeated Reboots May Cause Panic ... 1-5 1.1.5.7 Incorrect Free Page Counts Reported 1-5 1.1.5.7.0 USB Keyboard Driver Does Not Support Non-U.S. Locales ........ 1-6 1.1.5.8 Caution on Updating to Version 5.1B with DEGXA NICs ........................ 1-6 1.1.5.9 Tuning the NFS Server Duplicate Request Cache (Patch 494.00) ........... 1-6 1.2 Summary of Base Operating System Patches ...... 1-7 2 TruCluster Patches 2.1 Release Notes ................................. 2-1 2.1.1 Required Storage Space ................... 2-1 2.1.2 AlphaServer ES47 or AlphaServer GS1280 Hangs When Added to Cluster ................ 2-2 2.1.3 Updates for Rolling Upgrade Procedures ... 2-3 2.1.3.1 Unrecoverable Failure Procedure .... 2-3 2.1.3.2 During Rolling Patch, Do Not Add or Delete OSF, TCR, IOS, or OSH Subsets ... 2-3 2.1.3.3 Undoing a Rolling Patch ............ 2-3 2.1.3.3.1 Ignore Message About Missing ladebug.cat File During Rolling Upgrade ............................. 2-3 2.1.3.4 clu_upgrade undo of Install Stage Can Result in Incorrect File Permissions ... 2-4 2.1.3.5 Missing Entry Messages Can Be Ignored During Rolling Patch ................... 2-5 2.1.3.6 Relocating AutoFS During a Rolling Upgrade on a Cluster ................... 2-5 2.1.4 Additional Steps Required When Installing Patches Before Cluster Creation ............ 2-6 2.1.5 When Taking a Cluster Member to Single-User Mode, First Halt the Member ................ 2-7 2.1.6 Problems with clu_upgrade switch Stage ... 2-7 2.2 Summary of TruCluster Software Patches ........ 2-8 iv Contents About This Manual This manual contains information specific to Patch Kit 1 of the Tru64 UNIX operating system and TruCluster Server software products for Version 5.1B. It briefly describes the patches contained in this kit and provides information you should be aware of when installing certain patches. _A_u_d_i_e_n_c_e This manual is for the person who installs and removes the patch kit and for anyone who manages patches after they are installed. _O_r_g_a_n_i_z_a_t_i_o_n This manual is organized as follows: ______________________________________________________________________________ Chapter 1 Provides information about the Tru64 UNIX patches included in this kit. Chapter 2 Provides information about the TruCluster Server software patches included in this kit. ______________________________________________________________________________ _R_e_l_a_t_e_d _D_o_c_u_m_e_n_t_a_t_i_o_n In addition to this manual, the following documentation may be helpful in the patching process: +o Tru64 UNIX and TruCluster Server _P_a_t_c_h _K_i_t _I_n_s_t_a_l_l_a_t_i_o_n _I_n_s_t_r_u_c_t_i_o_n_s +o The dddduuuuppppaaaattttcccchhhh(8) reference page, which describes the use of dddduuuuppppaaaattttcccchhhh from the command line. This reference page is installed when you install the dddduuuuppppaaaattttcccchhhh tools. +o Tru64 UNIX _I_n_s_t_a_l_l_a_t_i_o_n _G_u_i_d_e +o Tru64 UNIX _S_y_s_t_e_m _A_d_m_i_n_i_s_t_r_a_t_i_o_n +o TruCluster Server _C_l_u_s_t_e_r _I_n_s_t_a_l_l_a_t_i_o_n +o TruCluster Server _C_l_u_s_t_e_r _A_d_m_i_n_i_s_t_r_a_t_i_o_n +o Release-specific installation documentation _P_a_t_c_h _P_r_o_c_e_s_s _R_e_s_o_u_r_c_e_s We provide Web sites to help you with the patching process: +o To obtain the latest patch kit for your operating system and cluster: hhhhttttttttpppp::::////////ffffttttpppp1111....ssssuuuuppppppppoooorrrrtttt....ccccoooommmmppppaaaaqqqq....ccccoooommmm////ppppuuuubbbblllliiiicccc////uuuunnnniiiixxxx//// +o To view or print the latest version of the _P_a_t_c_h _K_i_t _I_n_s_t_a_l_l_a_t_i_o_n _I_n_s_t_r_u_c_t_i_o_n_s or the _P_a_t_c_h _S_u_m_m_a_r_y _a_n_d _R_e_l_e_a_s_e _N_o_t_e_s for a specific patch kit: hhhhttttttttpppp::::////////wwwwwwwwwwww....ttttrrrruuuu66664444uuuunnnniiiixxxx....ccccoooommmmppppaaaaqqqq....ccccoooommmm////ddddooooccccssss////ppppaaaattttcccchhhh//// +o To visit our main support page: hhhhttttttttpppp::::////////wwwwwwwwwwww....ccccoooommmmppppaaaaqqqq....ccccoooommmm////ssssuuuuppppppppoooorrrrtttt////iiiinnnnddddeeeexxxx....sssshhhhttttmmmmllll +o To visit the Tru64 UNIX homepage: hhhhttttttttpppp::::////////wwwwwwwwwwww....ttttrrrruuuu66664444uuuunnnniiiixxxx....ccccoooommmmppppaaaaqqqq....ccccoooommmm//// _R_e_a_d_e_r'_s _C_o_m_m_e_n_t_s We welcome any comments and suggestions you have on this and other Tru64 UNIX manuals. You can send your comments in the following ways: +o Fax: 603-884-0120 Attn: UBPG Publications, ZK03-3/Y32 +o Internet electronic mail: rrrreeeeaaaaddddeeeerrrrssss____ccccoooommmmmmmmeeeennnntttt@@@@zzzzkkkk3333....ddddeeeecccc....ccccoooommmm A Reader's Comment form is located on your system in the following location: ////uuuussssrrrr////ddddoooocccc////rrrreeeeaaaaddddeeeerrrrssss____ccccoooommmmmmmmeeeennnntttt....ttttxxxxtttt +o Mail: vi About This Manual Hewlett-Packard Company UBPG Publications Manager ZK03-3/Y32 110 Spit Brook Road Nashua, NH 03062-9987 Please include the following information along with your comments: +o The full title of this document. +o The section numbers and page numbers of the information on which you are commenting. +o The version of Tru64 UNIX that you are using. +o If known, the type of processor that is running the Tru64 UNIX software. The Tru64 UNIX Publications group cannot respond to system problems or technical support inquiries. Please address technical questions to your local system vendor or to the appropriate technical support office. Information provided with the software media explains how to send problem reports. About This Manual vii Tru64 UNIX Patches 1 This chapter provides information about the patches included in Patch Kit 1 for the base operating system. It also includes any general information about working with these patches. This chapter is organized as follows: +o Section 1.1 provides release notes that are specific to the Tru64 UNIX patches in this kit, as well as release notes that are of general interest. +o Section 1.2 provides brief descriptions of the Tru64 UNIX patches included in this kit. _1._1 _R_e_l_e_a_s_e _N_o_t_e_s This section provides release notes that are specific to the Tru64 UNIX patches in this kit, as well as release notes that are of general interest. _1._1._1 _R_e_q_u_i_r_e_d _S_t_o_r_a_g_e _S_p_a_c_e Approximately 250 MB of temporary storage space is required to untar the base and TruCluster components of this patch kit. We recommend that this kit not be placed in the ////, ////uuuussssrrrr, or ////vvvvaaaarrrr file systems because doing so may unduly constrain the available storage space for the patching activity. The following permanent storage space is required to install the base component of this patch kit: +o Approximately 47 MB of storage space in ////vvvvaaaarrrr////aaaaddddmmmm////ppppaaaattttcccchhhh////bbbbaaaacccckkkkuuuupppp may be required for archived original files if you choose to install and revert all patches. See the _P_a_t_c_h _K_i_t _I_n_s_t_a_l_l_a_t_i_o_n _I_n_s_t_r_u_c_t_i_o_n_s for more information. +o Approximately 48 MB of storage space in ////vvvvaaaarrrr////aaaaddddmmmm////ppppaaaattttcccchhhh may be required for original files if you choose to install and revert all patches. See the _P_a_t_c_h _K_i_t _I_n_s_t_a_l_l_a_t_i_o_n _I_n_s_t_r_u_c_t_i_o_n_s for more information. +o Approximately 593 KB of storage space is required in ////vvvvaaaarrrr////aaaaddddmmmm////ppppaaaattttcccchhhh////ddddoooocccc for patch abstract and README documentation. +o Approximately 176 KB of storage space is needed in ////uuuussssrrrr////ssssbbbbiiiinnnn////dddduuuuppppaaaattttcccchhhh for the patch management utility. See Section 2.1.1 for information on space needed for the TruCluster Server patches. _1._1._2 _P_r_o_b_l_e_m _S_e_e_n _o_n _S_y_s_t_e_m_s _w_i_t_h _S_m_a_r_t _A_r_r_a_y _C_o_n_t_r_o_l_l_e_r This section describes the steps you should take if your system is configured with a Smart Array controller and you see the following event logged: Host name: unx104 SCSI CAM ERROR PACKET SCSI device class: CISS (Smart Array) Bus Number: 6 Target Number: 4 Lon Number: 0 \&... \&... Event Information: Command timed out...resetting controller If this occurs, take the following steps: 1. Create a file named cccciiiissssssss....tttteeeemmmmpppp with the following lines: ciss: ciss_throttle_threshold=5 2. Execute the following command: # ssssyyyyssssccccoooonnnnffffiiiiggggddddbbbb ----mmmm ----ffff cccciiiissssssss....tttteeeemmmmpppp 3. Reboot your system: # sssshhhhuuuuttttddddoooowwwwnnnn ----rrrr nnnnoooowwww _1._1._3 _B_r_o_k_e_n _L_i_n_k_s _R_e_p_o_r_t_e_d _D_u_r_i_n_g _B_a_s_e_l_i_n_i_n_g When performing a baseline analysis with the dddduuuuppppaaaattttcccchhhh utility, you will encounter the following message during Phase 4: 1-2 Tru64 UNIX Patches Phase 4 - Report changed system files and missing files ======================================================= This phase provides information to help you make choices later in this process. It reports both 'missing' and files whose origin cannot be determined. Some of these files may affect patch installation. You will want to consider this information when you later make decisions in phase 5. * list of changed files with unknown origin: ------------------------------------------ ./etc/lprsetup.dat OSFPRINT540 UNKNOWN ./usr/share/doclib/annex/man/man3/Thread.3 OSFTCLBASE540 UNKNOWN BROKEN HARDLINK TO ./usr/share/doclib/annex/man/man3/Tcl_ConditionNotify.3 ./usr/share/doclib/annex/man/man3/Tcl_ConditionNotify.3 OSFTCLBASE540 UNKNOWN BROKEN HARDLINK TO ./usr/share/doclib/annex/man/man3/Thread.3 Press RETURN to proceed... You can disregard this information. The presence of these broken links will not affect your system operation, the installation of dddduuuuppppaaaattttcccchhhh or dddduuuuppppaaaattttcccchhhh tools, the successful installation of patches, or the rebuilding of kernels on the system. _1._1._3._1 _N_e_w _R_u_s_s_i_a_n _K_e_y_b_o_a_r_d (_P_a_t_c_h _3_3_9._0_0) The new Russian 3R-LKQ48-BT keyboard, for which Patch 339.00 provides an updated keyboard map, comes with five extra keycaps. To enable any of those extra keycaps, you will need to modify the file ////uuuussssrrrr////lllliiiibbbb////XXXX11111111////xxxxkkkkbbbb////ssssyyyymmmmbbbboooollllssss////ddddiiiiggggiiiittttaaaallll////rrrruuuussssssssiiiiaaaannnn. For example: // KEY can be replaced by an extra keycap. // If you replace it with the extra keycap, please uncomment // the following definition and comment out the original one. // // key { // symbols[Group1]=3D [ o, O ], // symbols[Group2]=3D [ Ukrainian_i, Ukrainian_I ] // }; key { symbols[Group1]=3D [ o, O ], symbols[Group2]=3D [ Cyrillic_shcha, Cyrillic_SHCHA ] }; Tru64 UNIX Patches 1-3 _1._1._4 _P_a_n_i_c_s _M_a_y _O_c_c_u_r _o_n _M_u_l_t_i-_C_P_U _S_y_s_t_e_m_s Boot-time panics may occur on multi-CPU systems if all of the following conditions exist: +o Auditing is enabled +o Audit's -m switch is configured to establish a dump interval +o The system contains empty CPU slots The panic will occur on the first reboot after audit is configured or following an update installation on a system with audit already configured with a dump interval. The system will be unable to reboot in this configuration. To work around this problem, boot to single-user mode and remove the -m option from the audit configuration stored in ////eeeettttcccc////rrrrcccc....ccccoooonnnnffffiiiigggg....ccccoooommmmmmmmoooonnnn or ////eeeettttcccc////rrrrcccc....ccccoooonnnnffffiiiigggg. The problem will be fixed in the next patch kit. _1._1._5 _G_e_n_e_r_a_l _a_n_d _P_r_o_b_l_e_m _I_n_f_o_r_m_a_t_i_o_n _f_o_r _A_l_p_h_a_S_e_r_v_e_r _E_S_4_7, _E_S_8_0, _a_n_d _G_S_1_2_8_0 _S_y_s_t_e_m_s The following information pertains to the new AlphaServer ES47, ES80, and GS1280 systems, which require Tru64 UNIX Version 5.1B and this patch kit to be installed. _1._1._5._1 _C_P_U _O_f_f_l_i_n_e _R_e_s_t_r_i_c_t_i_o_n_s The Primary CPU cannot be taken off line. CPUs that have I/O hoses attached to them can only be taken off line if another CPU without I/O attached is present in the system . A failure to adhere to this restriction will cause the ppppssssrrrraaaaddddmmmm command to return an error. In a two CPU configuration, the AlphaServer ES47 and ES80 do not allow any CPUs to be taken off line. _1._1._5._2 _P_r_o_b_l_e_m _w_i_t_h _C_a_p_a_c_i_t_y _o_n _D_e_m_a_n_d _P_r_o_c_e_s_s A problem has been discovered with the capacity on demand process in which a CPU can be designated as spare, but is not taken off line as expected. With the capacity on demand process, the ccccooooddddccccoooonnnnffffiiiigggg [_c_p_u__i_d__l_i_s_t] command lets you specify which CPUs you have paid for and which are spares. The command is supposed to mark the others as spare and then take them off line. Once a CPU is marked as spare, the hhhhwwwwmmmmggggrrrr command and Manage CPUs SUITLET will not let you 1-4 Tru64 UNIX Patches put them on line until you use the ccccccccoooodddd ----llll or ccccccccoooodddd ----pppp command to either loan or purchase the CPU. The workaround to the problem is to use the ccccooooddddccccoooonnnnffffiiiigggg [_c_p_u__i_d__l_i_s_t] command to mark the CPUs as spare and then use either the hhhhwwwwmmmmggggrrrr command or the Manage CPUs SUITLET to take them off line (sometimes referred to as offlining them). In the following example, N is the CPU number. # hhhhwwwwmmmmggggrrrr ----oooofffffffflllliiiinnnneeee ----nnnnaaaammmmeeee ccccppppuuuu_N If, for example, the ccccooooddddccccoooonnnnffffiiiigggg command returns the message "Error for CPU 2: Unable to offline this CPU," you would enter the following hhhhwwwwmmmmggggrrrr command: # hhhhwwwwmmmmggggrrrr ----oooofffffffflllliiiinnnneeee ----nnnnaaaammmmeeee ccccppppuuuu2222 For more information, see ccccooooddddccccoooonnnnffffiiiigggg(8) and hhhhwwwwmmmmggggrrrr(8) The Manage CPUs SUITLET is available from the SysMan Menu and SysMan Station. _1._1._5._3 _H_a_r_d_w_a_r_e _S_C_S_I _B_u_s _E_r_r_o_r_s SCSI CAM errors experienced by the Adaptec controller that require SCSI bus resets could cause PCI bus faults. These faults will be seen as a "Machine Check System Uncorrectable" panic. This will require the system to be booted after the machine_check. A fix for this problem will be included in a future release _1._1._5._4 _C_o_m_p_a_c_t _D_i_s_k _D_r_i_v_e _E_r_r_o_r_s _L_o_g_g_e_d The TEAC CDR-W 416E drive that is shipped with the system will log errors on reboot if the CD-ROM media is not present. These messages are only informational. _1._1._5._5 _P_r_e_s_e_n_c_e _o_f _T_h_i_r_d-_P_a_r_t_y _D_e_v_i_c_e_s _M_a_y _C_a_u_s_e _S_y_s_t_e_m _P_a_n_i_c The ATM 3X-DAPBA-FA/UA driver may experience a panic on shutdown if third- party devices are installed. _1._1._5._6 _R_e_p_e_a_t_e_d _R_e_b_o_o_t_s _M_a_y _C_a_u_s_e _P_a_n_i_c Repeated reboots of the system may cause a kernel memory fault panic, but does not result in the loss of data. A reboot after the panic should be successful. A fix for this problem will be included in a future release. _1._1._5._7 _I_n_c_o_r_r_e_c_t _F_r_e_e _P_a_g_e _C_o_u_n_t_s _R_e_p_o_r_t_e_d The vvvvmmmmssssttttaaaatttt ----SSSS command reports incorrect free page counts on a sparsely configured system. A sparsely configured system is one that has gaps in the numbering of CPUs, for example 0, 1, 8,9 10,11. Tru64 UNIX Patches 1-5 _1._1._5._7._0 _U_S_B _K_e_y_b_o_a_r_d _D_r_i_v_e_r _D_o_e_s _N_o_t _S_u_p_p_o_r_t _N_o_n-_U._S. _L_o_c_a_l_e_s - The USB keyboard driver does not support non-U.S. locales, and setting the system's language to anything other than 36 (U.S./English) causes the keyboard to be interpreted as a U.S./English keyboard anyway. For example, on the Japanese keyboard with the SRM variable "language" set to 50 (Japanese JIS), Shift-2 produces a double quote (") character, while on the U.S./English keyboard it produces an ampersand (@). With this problem, keyboards set to Japanese will produce the ampersand. A fix for this problem will be included in a future release. _1._1._5._8 _C_a_u_t_i_o_n _o_n _U_p_d_a_t_i_n_g _t_o _V_e_r_s_i_o_n _5._1_B _w_i_t_h _D_E_G_X_A _N_I_C_s Do not attempt to do a update installation or rolling upgrade from Version 5.1A to Version 5.1B when the network device is a DEGXA-TA or DEGXA-SA and you have the Version 5.1A Patch Kit 4 and the New Hardware Devices V6 (NHD6) Kit installed. The NHD6 and PK4 kits have provided fixes that are not in the base operating system release for Version 5.1B. Once the update is completed using another network device and the Version 5.1B Patch Kit 1 has been applied, the DEGXA network interface cards (NICs) can again be used for the network connection. _1._1._5._9 _T_u_n_i_n_g _t_h_e _N_F_S _S_e_r_v_e_r _D_u_p_l_i_c_a_t_e _R_e_q_u_e_s_t _C_a_c_h_e (_P_a_t_c_h _4_9_4._0_0) The NFS server maintains a list of recently completed non-repeatable requests. This list is used to reply to client retransmissions of the request in the event that the initial request transmission's reply was lost or that the server took too long to satisfy the request. In some cases, under heavy NFS server load and over high aggregate network bandwidth involving changes to file systems (changes caused by the use of the ccccrrrraaaatttteeee,,,, lllliiiinnnnkkkk,,,, uuuunnnnlllliiiinnnnkkkk,,,, mmmmkkkkddddiiiirrrr,,,, rrrrmmmmddddiiiirrrr,,,, ttttrrrruuuunnnnccccaaaatttteeee,,,, uuuuttttiiiimmmmeeeessss,,,, and wwwwrrrriiiitttteeee commands) problems may occur with the duplicate request cache. Thiese problems can occur if all the elements in the duplicate request cache are cycled through between an initial client transmission and subsequent retransmission. If this occurs, the NFS server cannot detect that the retransmission is in fact a retransmission. This may result in the repetition of a request and may cause out of order writes or truncation and subsequent retruncation of a file. Patch 494.00 provides a tuning variable to control the size of the NFS server's duplicate request cache: +o nnnnffffssss____dddduuuuppppccccaaaacccchhhheeee____ssssiiiizzzzeeee — Controls the absolute size of the NFS server duplicate request cache. This is measured in the number of elements that are allocated at NFS server initialization If is determined that the size of the duplicate cache needs to be modified, you should change the nnnnffffssss____dddduuuuppppccccaaaacccchhhheeee____ssssiiiizzzzeeee. The new value for 1-6 Tru64 UNIX Patches nnnnffffssss____dddduuuuppppccccaaaacccchhhheeee____ssssiiiizzzzeeeeshould be set to equal two times the value of nnnnffffssss____dddduuuuppppccccaaaacccchhhheeee____eeeennnnttttrrrriiiieeeessss. You must use the ddddbbbbxxxx command to modify nnnnffffssss____dddduuuuppppccccaaaacccchhhheeee____ssssiiiizzzzeeee. There is no sysconfig interface to this tuning variable. _1._2 _S_u_m_m_a_r_y _o_f _B_a_s_e _O_p_e_r_a_t_i_n_g _S_y_s_t_e_m _P_a_t_c_h_e_s This section provides descriptions of the patches in Patch Kit 1 for the Tru64 UNIX operating system. ___________________________________________________________________________ NNNNuuuummmmbbbbeeeerrrr:::: Patch 2.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Correct improper file access SSSSttttaaaatttteeee:::: New This patch corrects a potential security vulnerability where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file access. NNNNuuuummmmbbbbeeeerrrr:::: Patch 4.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Fixes premature termination of ofile kdbx extension SSSSttttaaaatttteeee:::: New This patch fixes a premature termination of the ofile kdbx extension and warning messages in various kdbx extensions. NNNNuuuummmmbbbbeeeerrrr:::: Patch 6.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Correct improper file access SSSSttttaaaatttteeee:::: New This patch corrects a potential security vulnerability where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file or privilege management. NNNNuuuummmmbbbbeeeerrrr:::: Patch 8.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Correct improper file access SSSSttttaaaatttteeee:::: New This patch corrects a potential security vulnerability where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file or privilege management. Tru64 UNIX Patches 1-7 NNNNuuuummmmbbbbeeeerrrr:::: Patch 10.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Correct potential buffer overflow SSSSttttaaaatttteeee:::: New This patch corrects a potential security vulnerability where, under certain circumstances, system integrity may be compromised when a buffer overflow occurs in the CDE online help. Buffer overflows are sometimes exploited in an attempt to subvert the function of a privileged program and possibly execute commands at the elevated privileges if the program file has the setuid privilege. NNNNuuuummmmbbbbeeeerrrr:::: Patch 12.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Correct potential buffer overflow SSSSttttaaaatttteeee:::: New This patch corrects a potential security vulnerability where, under certain circumstances, system integrity may be compromised when a buffer overflow occurs in the CDE online help. Buffer overflows are sometimes exploited in an attempt to subvert the function of a privileged program and possibly execute commands at the elevated privileges if the program file has the setuid privilege. NNNNuuuummmmbbbbeeeerrrr:::: Patch 14.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Fix for the dsfmgr utility SSSSttttaaaatttteeee:::: New This patch fixes many small problems in dsfmgr. NNNNuuuummmmbbbbeeeerrrr:::: Patch 16.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Fix for the dsfmgr utility SSSSttttaaaatttteeee:::: New This patch fixes many small problems in dsfmgr. 1-8 Tru64 UNIX Patches NNNNuuuummmmbbbbeeeerrrr:::: Patch 18.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Security (SSRT2301, SSRT2275) SSSSttttaaaatttteeee:::: New This patch: Corrects a potential security vulnerability where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file or privilege management. Corrects a potential security vulnerability where, under certain circumstances, system integrity may be compromised when a buffer overflow occurs in the uucp utility. Buffer overflows are sometimes exploited in an attempt to subvert the function of a privileged program and possibly execute commands at the elevated privileges if the program file has the setuid privilege. NNNNuuuummmmbbbbeeeerrrr:::: Patch 20.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Security (SSRT2301, SSRT2275) SSSSttttaaaatttteeee:::: New This patch: Corrects a potential security vulnerability where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file or privilege management. Corrects a potential security vulnerability where, under certain circumstances, system integrity may be compromised when a buffer overflow occurs in the uucp utility. Buffer overflows are sometimes exploited in an attempt to subvert the function of a privileged program and possibly execute commands at the elevated privileges if the program file has the setuid privilege. Tru64 UNIX Patches 1-9 NNNNuuuummmmbbbbeeeerrrr:::: Patch 30.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Allows auditing of login and su events SSSSttttaaaatttteeee:::: Supersedes Patches 25.00, 26.00, 27.00, 28.00 This patch: Allows the auditing of login and su events based in part on the contents of user profiles (for Enhanced Security), the prevailing auditing characteristics of the originating process, and the system-wide audit mask. Previously, only the system audit mask was referenced. Corrects a failure in the safe_open() routine that caused symbolic links given by a relative path from the current working directory sometimes to give ENOENT errors incorrectly. Corrects a potential floating point error in threaded applications. Fixes an extended regular expression problem where the interval expression {m,n} is handled incorrectly. Fixes a problem with SIA that caused the Internet Express LDAP Authentication module to be unable to look up default group information for a user at login time. NNNNuuuummmmbbbbeeeerrrr:::: Patch 33.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Correct potential buffer overflow SSSSttttaaaatttteeee:::: Supersedes Patch 31.00 This patch: Corrects a potential security vulnerability where, under certain circumstances, system integrity may be compromised when a buffer overflow occurs in the DtSvc utility. Buffer overflows are sometimes exploited in an attempt to subvert the function of a privileged program and possibly execute commands at the elevated privileges if the program file has the setuid privilege. Corrects a potential security vulnerability where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file access. 1-10 Tru64 UNIX Patches NNNNuuuummmmbbbbeeeerrrr:::: Patch 36.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Correct potential buffer overflow SSSSttttaaaatttteeee:::: Supersedes Patch 34.00 This patch: Corrects a potential security vulnerability where, under certain circumstances, system integrity may be compromised when a buffer overflow occurs in the DtSvc utility. Buffer overflows are sometimes exploited in an attempt to subvert the function of a privileged program and possibly execute commands at the elevated privileges if the program file has the setuid privilege. Corrects a potential security vulnerability where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file access. NNNNuuuummmmbbbbeeeerrrr:::: Patch 38.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Adds new functionality to tcpdump SSSSttttaaaatttteeee:::: New This patch adds support for IEEE 802.1Q Virtual Local Area Network (VLAN). NNNNuuuummmmbbbbeeeerrrr:::: Patch 42.00 AAAAbbbbssssttttrrrraaaacccctttt:::: MD5 authentication problem with Version 2 RIP SSSSttttaaaatttteeee:::: New This patch corrects a problem using MD5 authentication with Version 2 of the Routing Information Protocol (RIP). NNNNuuuummmmbbbbeeeerrrr:::: Patch 47.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Correct improper file access SSSSttttaaaatttteeee:::: New This patch corrects a potential security vulnerability where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file or privilege management. Tru64 UNIX Patches 1-11 NNNNuuuummmmbbbbeeeerrrr:::: Patch 58.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Security (SSRT1-40U, SSRT1-41U, SSRT1-42U) SSSSttttaaaatttteeee:::: New This patch corrects a potential security vulnerability where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file access. NNNNuuuummmmbbbbeeeerrrr:::: Patch 60.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Update to siacfg utility SSSSttttaaaatttteeee:::: New On systems using Perl 5.8.0 and higher, this patch eliminates the "Using an array as a reference is deprecated" warning when running /usr/sbin/siacfg and during system boot. NNNNuuuummmmbbbbeeeerrrr:::: Patch 62.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Correct improper file access SSSSttttaaaatttteeee:::: New This patch corrects a potential security vulnerability where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file or privilege management. NNNNuuuummmmbbbbeeeerrrr:::: Patch 64.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Fix for find command SSSSttttaaaatttteeee:::: New This patch fixes a problem with the find -ls command that caused it to display an incorrect number of blocks. NNNNuuuummmmbbbbeeeerrrr:::: Patch 84.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Security (SSRT2208) SSSSttttaaaatttteeee:::: New This patch corrects a potential security vulnerability which may allow non-privileged users to gain unauthorized (root) access. This may be in the form of local and remote security domain risks. 1-12 Tru64 UNIX Patches NNNNuuuummmmbbbbeeeerrrr:::: Patch 86.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Security (SSRT1-40U, SSRT1-41U, SSRT1-42U) SSSSttttaaaatttteeee:::: New This patch corrects a potential security vulnerability where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file access. NNNNuuuummmmbbbbeeeerrrr:::: Patch 89.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Fixes defects in AutoFS user space and kernel code SSSSttttaaaatttteeee:::: Supersedes Patch 87.00 This patch: Fixes multiple defects in AutoFS user space and kernel code. Fixes a problem that prevents access to AutoFS file systems if ACLs are enabled. NNNNuuuummmmbbbbeeeerrrr:::: Patch 91.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Correct improper file access SSSSttttaaaatttteeee:::: New This patch corrects a potential security vulnerability where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file or privilege management. NNNNuuuummmmbbbbeeeerrrr:::: Patch 105.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Fix for tar command SSSSttttaaaatttteeee:::: New This patch fixes a one byte gap/hole in the maximum file size in the tar command before an extended header record is used (8589934591 (octal 77777777777)). Tru64 UNIX Patches 1-13 NNNNuuuummmmbbbbeeeerrrr:::: Patch 107.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Fix for X Server command line option SSSSttttaaaatttteeee:::: New This patch fixes a problem where the X server's command line option to turn off VESA Display Power Management Signalling (-dpms) does not work. NNNNuuuummmmbbbbeeeerrrr:::: Patch 135.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Correct potential buffer overflow SSSSttttaaaatttteeee:::: New This patch corrects a potential security vulnerability where, under certain circumstances, system integrity may be compromised when a buffer overflow occurs in the dxterm utility. Buffer overflows are sometimes exploited in an attempt to subvert the function of a privileged program and possibly execute commands at the elevated privileges if the program file has the setuid privilege. NNNNuuuummmmbbbbeeeerrrr:::: Patch 137.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Fix for startslip program SSSSttttaaaatttteeee:::: New This patch fixes a problem with the startslip program that prevented it from extracting all information from the acucap file. NNNNuuuummmmbbbbeeeerrrr:::: Patch 139.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Correct improper file access SSSSttttaaaatttteeee:::: New This patch corrects a potential security vulnerability where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file access. NNNNuuuummmmbbbbeeeerrrr:::: Patch 143.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Fix race condition and improper file access SSSSttttaaaatttteeee:::: New This patch corrects a potential security vulnerability where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file access. 1-14 Tru64 UNIX Patches NNNNuuuummmmbbbbeeeerrrr:::: Patch 155.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Fix race condition and improper file access SSSSttttaaaatttteeee:::: Supersedes Patches 152.00, 153.00 This patch: Corrects a potential security vulnerability where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file access. Corrects a problem in which the sh command interpreter uses a high amount of CPU time. Fixes the problem that occurs while encoding "$@" in the Bourne shell. NNNNuuuummmmbbbbeeeerrrr:::: Patch 157.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Correct improper file access SSSSttttaaaatttteeee:::: New This patch corrects a potential security vulnerability where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file or privilege management. NNNNuuuummmmbbbbeeeerrrr:::: Patch 159.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Fix hwmgr command to show path state correctly SSSSttttaaaatttteeee:::: New This patch fixes the hwmgr command to correctly show a path state. Tru64 UNIX Patches 1-15 NNNNuuuummmmbbbbeeeerrrr:::: Patch 161.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Corrects cp performance problem SSSSttttaaaatttteeee:::: New This patch: Corrects a cp command performance problem involving a change in the I/O buffer size from 64K to 8K. Corrects a problem in which the cp and cat commands produce different file sizes when reading from a tape device. NNNNuuuummmmbbbbeeeerrrr:::: Patch 167.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Security (SSRT2368, SSRT2368) SSSSttttaaaatttteeee:::: New This patch corrects a potential security vulnerability where, under certain circumstances, system integrity may be compromised. This may be in the form of improper access. NNNNuuuummmmbbbbeeeerrrr:::: Patch 169.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Fix for SDLT media error SSSSttttaaaatttteeee:::: New This patch adds the capability for KZPCA devices to work with SCSI devices that only support asynchronous data transfers and fixes SDLT media error caused bus resets. NNNNuuuummmmbbbbeeeerrrr:::: Patch 171.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Correct improper file access SSSSttttaaaatttteeee:::: New This patch corrects a potential security vulnerability where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file access. 1-16 Tru64 UNIX Patches NNNNuuuummmmbbbbeeeerrrr:::: Patch 173.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Fix race condition and improper file access SSSSttttaaaatttteeee:::: New This patch corrects a potential security vulnerability where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file access. NNNNuuuummmmbbbbeeeerrrr:::: Patch 176.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Resolves kernel memory faults in TCP/IP subsystem SSSSttttaaaatttteeee:::: Supersedes Patch 174.00 This patch resolves kernel memory faults in the TCP/IP subsystem. NNNNuuuummmmbbbbeeeerrrr:::: Patch 178.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Fix for lpd line printer daemon SSSSttttaaaatttteeee:::: New Fixes the lpd deamon to correct /etc/hosts.lpd case sensitivity, for example, "node.domain" treated the same as "Node.Domain/" NNNNuuuummmmbbbbeeeerrrr:::: Patch 185.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Prevents addvol from adding invalid disks into domain SSSSttttaaaatttteeee:::: New This patch prevents addvol from adding invalid disks into a domain. NNNNuuuummmmbbbbeeeerrrr:::: Patch 187.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Fix for invalid disks being added into domain SSSSttttaaaatttteeee:::: New This patch prevents addvol from adding invalid disks into a domain. NNNNuuuummmmbbbbeeeerrrr:::: Patch 189.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Fix for rmtmpfiles script SSSSttttaaaatttteeee:::: New This patch corrects a problem in which the rmtmpfiles script leave empty directories in /var/tmp at system startup. Tru64 UNIX Patches 1-17 NNNNuuuummmmbbbbeeeerrrr:::: Patch 191.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Correct improper file access SSSSttttaaaatttteeee:::: New This patch corrects a potential security vulnerability where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file access. NNNNuuuummmmbbbbeeeerrrr:::: Patch 193.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Correct improper file access SSSSttttaaaatttteeee:::: New This patch corrects a potential security vulnerability where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file access. NNNNuuuummmmbbbbeeeerrrr:::: Patch 195.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Provides fixes for the collect utility SSSSttttaaaatttteeee:::: New This patch fixes several problems with the collect utility and updates the utility from Version 2.0.0 to 2.0.5. NNNNuuuummmmbbbbeeeerrrr:::: Patch 197.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Read privileges being stripped from passwd file SSSSttttaaaatttteeee:::: New This patch fixes a problem in which group and other read privileges get stripped from /etc/passwd when a user switches from enhanced to base security. NNNNuuuummmmbbbbeeeerrrr:::: Patch 199.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Correct improper file access SSSSttttaaaatttteeee:::: New This patch corrects a potential security vulnerability where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file or privilege management. 1-18 Tru64 UNIX Patches NNNNuuuummmmbbbbeeeerrrr:::: Patch 201.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Fix for verify utility SSSSttttaaaatttteeee:::: New This patch fixes a problem in which the verify utility core dumps if it encounters a specific type of metadata inconsistency. NNNNuuuummmmbbbbeeeerrrr:::: Patch 203.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Correct improper file access SSSSttttaaaatttteeee:::: New This patch corrects a potential security vulnerability where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file access. NNNNuuuummmmbbbbeeeerrrr:::: Patch 205.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Fixes a correctable error reporting problem SSSSttttaaaatttteeee:::: New This patch fixes a correctable error reporting problem that turns off the reporting of correctable errors forever on any CPU, except CPU 0, once throttling of correctable errors has begun. NNNNuuuummmmbbbbeeeerrrr:::: Patch 207.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Correct potential buffer overflow SSSSttttaaaatttteeee:::: New This patch corrects a potential security vulnerability where, under certain circumstances, system integrity may be compromised when a buffer overflow occurs in the libXm utility. Buffer overflows are sometimes exploited in an attempt to subvert the function of a privileged program and possibly execute commands at the elevated privileges if the program file has the setuid privilege. Tru64 UNIX Patches 1-19 NNNNuuuummmmbbbbeeeerrrr:::: Patch 209.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Correct potential buffer overflow SSSSttttaaaatttteeee:::: New This patch corrects a potential security vulnerability where, under certain circumstances, system integrity may be compromised when a buffer overflow occurs in the libXm utility. Buffer overflows are sometimes exploited in an attempt to subvert the function of a privileged program and possibly execute commands at the elevated privileges if the program file has the setuid privilege. NNNNuuuummmmbbbbeeeerrrr:::: Patch 219.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Correct improper file access SSSSttttaaaatttteeee:::: New This patch corrects a potential security vulnerability where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file or privilege management. NNNNuuuummmmbbbbeeeerrrr:::: Patch 221.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Correct improper file access SSSSttttaaaatttteeee:::: New This patch corrects a potential security vulnerability where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file access. NNNNuuuummmmbbbbeeeerrrr:::: Patch 223.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Add SCSI reserve/release support to mt SSSSttttaaaatttteeee:::: New This patch adds SCSI reserve and release support to the mt program to assist open SAN tape management. NNNNuuuummmmbbbbeeeerrrr:::: Patch 225.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Interop problem between curses.h and esnmp.h. SSSSttttaaaatttteeee:::: New This patch fixes an interoperability problem between the curses.h and esnmp.h header files. 1-20 Tru64 UNIX Patches NNNNuuuummmmbbbbeeeerrrr:::: Patch 227.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Correct improper file access SSSSttttaaaatttteeee:::: New This patch corrects a potential security vulnerability, where under certain circumstances, system integrity may be compromised. This may be in the form of improper file or privilege management. NNNNuuuummmmbbbbeeeerrrr:::: Patch 229.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Correct improper file access SSSSttttaaaatttteeee:::: New This patch corrects a potential security vulnerability where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file or privilege management. NNNNuuuummmmbbbbeeeerrrr:::: Patch 232.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Correct improper file access SSSSttttaaaatttteeee:::: Supersedes Patch 230.00 This patch: Adds support in script to remove all Persistant Reservations for MSA controller. Corrects a potential security vulnerability where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file access. NNNNuuuummmmbbbbeeeerrrr:::: Patch 234.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Correct improper file access SSSSttttaaaatttteeee:::: New This patch corrects a potential security vulnerability where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file or privilege management. Tru64 UNIX Patches 1-21 NNNNuuuummmmbbbbeeeerrrr:::: Patch 238.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Correct improper file access SSSSttttaaaatttteeee:::: New This patch corrects a potential security vulnerability where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file or privilege management. NNNNuuuummmmbbbbeeeerrrr:::: Patch 240.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Fix for hwmgr command SSSSttttaaaatttteeee:::: New Fixes a problem in which the display for the hwmgr -show name command is not aligned properly for the name field. NNNNuuuummmmbbbbeeeerrrr:::: Patch 248.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Fix for hwmgr delete command option SSSSttttaaaatttteeee:::: New This patch fixes a problem where, when using hwmgr to delete a component, a "DELETE_COMMIT: Cannot fetch name." message may be displayed on the console. This problem can be seen frequently in a cluster environment when the component being deleted does not exist on the system. NNNNuuuummmmbbbbeeeerrrr:::: Patch 250.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Correct improper file access SSSSttttaaaatttteeee:::: New This patch corrects a potential security vulnerability where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file access. NNNNuuuummmmbbbbeeeerrrr:::: Patch 252.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Fix for audit_tool command SSSSttttaaaatttteeee:::: New This patch fixes the audit_tool search algorithm to differentiate between prived and non-prived UIDs, and to allow regular expressions in string searches. 1-22 Tru64 UNIX Patches NNNNuuuummmmbbbbeeeerrrr:::: Patch 254.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Correct improper file access SSSSttttaaaatttteeee:::: New This patch: Corrects the problem of a core dump that occurs when the output from the lint program for a nonexistent file is supplied to error. Corrects a potential security vulnerability where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file or privilege management. NNNNuuuummmmbbbbeeeerrrr:::: Patch 256.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Correct improper file access SSSSttttaaaatttteeee:::: New This patch corrects a potential security vulnerability where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file or privilege management. NNNNuuuummmmbbbbeeeerrrr:::: Patch 258.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Correct improper file access SSSSttttaaaatttteeee:::: New This patch corrects a potential security vulnerability where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file or privilege management. Tru64 UNIX Patches 1-23 NNNNuuuummmmbbbbeeeerrrr:::: Patch 260.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Code now prints greater than 61 UNIX domain sockets SSSSttttaaaatttteeee:::: New This patch: Adds code to print greater than 61 UNIX domain sockets. Changes file read errors from /dev/kmem to ignore and continue in a running system. NNNNuuuummmmbbbbeeeerrrr:::: Patch 262.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Correct improper file access SSSSttttaaaatttteeee:::: New This patch corrects a potential security vulnerability where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file access. NNNNuuuummmmbbbbeeeerrrr:::: Patch 264.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Correct improper file access SSSSttttaaaatttteeee:::: New This patch corrects a potential security vulnerability where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file access. NNNNuuuummmmbbbbeeeerrrr:::: Patch 266.00 AAAAbbbbssssttttrrrraaaacccctttt::::Correct improper file access SSSSttttaaaatttteeee:::: New This patch corrects a potential security vulnerability where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file access. 1-24 Tru64 UNIX Patches NNNNuuuummmmbbbbeeeerrrr:::: Patch 268.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Installs version V2.1-120 of libots3 libraries SSSSttttaaaatttteeee:::: New This patch installs version V2.1-120 of /usr/lib/libots3.a and /usr/shlib/libots3.so, which fixes a problem where long-running OpenMP applications might overflow an internal libots3 counter, resulting in a breakdown of thread synchronization. NNNNuuuummmmbbbbeeeerrrr:::: Patch 270.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Installs version V2.1-120 of libots3 libraries SSSSttttaaaatttteeee:::: New This patch installs version V2.1-120 of /usr/lib/libots3.a and /usr/shlib/libots3.so, which fixes a problem where long-running OpenMP applications might overflow an internal libots3 counter, resulting in a breakdown of thread synchronization. NNNNuuuummmmbbbbeeeerrrr:::: Patch 272.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Correct improper file access SSSSttttaaaatttteeee:::: New This patch corrects a potential security vulnerability where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file access. NNNNuuuummmmbbbbeeeerrrr:::: Patch 275.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Fix for hwmgr -view transaction -cluster command SSSSttttaaaatttteeee:::: Supersedes Patch 273.00 This patch: Corrects some command-parsing irregularities in hwmgr that may cause options like -category and -cluster to be confused. Corrects a problem in which information from the hwmgr -view transaction -cluster command for a node on a cluster may not be displayed. Tru64 UNIX Patches 1-25 NNNNuuuummmmbbbbeeeerrrr:::: Patch 464.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Correct improper file access SSSSttttaaaatttteeee:::: Supersedes Patch 277.00 This patch corrects a potential security vulnerability where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file or privilege management. NNNNuuuummmmbbbbeeeerrrr:::: Patch 279.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Corrections to Oxygen VX1 graphics card XCopyPlane SSSSttttaaaatttteeee:::: New Corrects a problem with the Oxygen VX1 graphics card to make XCopyPlane copy only the requested bitplane rather than all bitplanes. NNNNuuuummmmbbbbeeeerrrr:::: Patch 281.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Fixes a problem in usb_hid.mod SSSSttttaaaatttteeee:::: New Corrects a problem in which a kernel memory fault sometimes occurs if a USB keyboard or mouse does not respond quickly enough. This KMF can occur during boot or soon after a USB keyboard or mouse is connected. Any device can trigger this, though it is neither predictable nor common. NNNNuuuummmmbbbbeeeerrrr:::: Patch 283.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Correct improper file access SSSSttttaaaatttteeee:::: New This patch corrects a potential security vulnerability where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file access. NNNNuuuummmmbbbbeeeerrrr:::: Patch 285.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Correct improper file access SSSSttttaaaatttteeee:::: New This patch corrects a potential security vulnerability where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file access. 1-26 Tru64 UNIX Patches NNNNuuuummmmbbbbeeeerrrr:::: Patch 287.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Correct improper file access SSSSttttaaaatttteeee:::: New This patch corrects a potential security vulnerability where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file access. NNNNuuuummmmbbbbeeeerrrr:::: Patch 289.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Correct improper file access SSSSttttaaaatttteeee:::: New This patch corrects a potential security vulnerability which, under certain circumstances, could compromise system integrity. NNNNuuuummmmbbbbeeeerrrr:::: Patch 294.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Correct improper file access SSSSttttaaaatttteeee:::: New This patch corrects a potential security vulnerability where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file access. NNNNuuuummmmbbbbeeeerrrr:::: Patch 296.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Correct improper file access SSSSttttaaaatttteeee:::: New This patch corrects a potential security vulnerability where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file access. NNNNuuuummmmbbbbeeeerrrr:::: Patch 298.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Fixes consvar -s bootdef_dev failure with KZPCC SSSSttttaaaatttteeee:::: New This patch fixes consvar -s bootdef_dev failure with KZPCC. Tru64 UNIX Patches 1-27 NNNNuuuummmmbbbbeeeerrrr:::: Patch 300.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Login process crashes when LDAP users try to log in SSSSttttaaaatttteeee:::: New This patch fixes a problem in with the login process may crash when LDAP users or users belonging to an LDAP group attempt to log in. NNNNuuuummmmbbbbeeeerrrr:::: Patch 304.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Correct improper file access SSSSttttaaaatttteeee:::: New This patch corrects a potential security vulnerability where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file or privilege management. NNNNuuuummmmbbbbeeeerrrr:::: Patch 306.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Correct improper file access SSSSttttaaaatttteeee:::: New This patch corrects a potential security vulnerability where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file access. NNNNuuuummmmbbbbeeeerrrr:::: Patch 309.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Performance tool failures on Sierra Cluster (PFS) SSSSttttaaaatttteeee:::: Supersedes Patch 307.00 This patch: Fixes a problem in which the prof -pixie -testcoverage sometimes reports invalid source line number ranges. Fixes performance tool failures on Sierra Clusters Parallel File Systems (PFS) . 1-28 Tru64 UNIX Patches NNNNuuuummmmbbbbeeeerrrr:::: Patch 311.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Correct improper file access SSSSttttaaaatttteeee:::: New This patch corrects a potential security vulnerability where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file access. NNNNuuuummmmbbbbeeeerrrr:::: Patch 313.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Correct improper file access SSSSttttaaaatttteeee:::: New This patch: Corrects a potential security vulnerability where under certain circumstances, system integrity may be compromised. This may be in the form of improper file or privilege management. Addresses a problem in which performing a sort on a large database using numerous keys fails during the consolidation phase of the temporary files. NNNNuuuummmmbbbbeeeerrrr:::: Patch 317.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Security (SSRT1-40U, SSRT1-41U, SSRT1-42U) SSSSttttaaaatttteeee:::: New This patch corrects a potential security vulnerability where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file access. Tru64 UNIX Patches 1-29 NNNNuuuummmmbbbbeeeerrrr:::: Patch 320.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Fixes problem with IPv6 neighbor discovery daemon SSSSttttaaaatttteeee:::: Supersedes Patch 318.00 This patch: Fixes a regression in the operation of the IPv6 neighbor discovery daemon, where IPv6 addresses will not be automatically configured on PPP interfaces. Fixes a problem with IPv6 neighbor discovery daemon, where under certain circumstances, the daemon can cause bad information to be written to a DNS database, thereby causing failures on subsequent database reloads. NNNNuuuummmmbbbbeeeerrrr:::: Patch 322.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Correct improper file access SSSSttttaaaatttteeee:::: New This patch corrects a potential security vulnerability where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file or privilege management. NNNNuuuummmmbbbbeeeerrrr:::: Patch 324.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Correct improper file access SSSSttttaaaatttteeee:::: New This patch corrects a potential security vulnerability where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file or privilege management. NNNNuuuummmmbbbbeeeerrrr:::: Patch 326.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Fixes a linker error SSSSttttaaaatttteeee:::: New This patch fixes a linker error that occurs when running the command ld -update_registry /dev/null. 1-30 Tru64 UNIX Patches NNNNuuuummmmbbbbeeeerrrr:::: Patch 328.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Fixes and improves the mcutil program SSSSttttaaaatttteeee:::: New This patch fixes and improves the mcutil program by correcting how bus resets are handled by the program and enhancing its error reporting capabilities. NNNNuuuummmmbbbbeeeerrrr:::: Patch 330.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Allows evmd to stop listening on default TCP port 619 SSSSttttaaaatttteeee:::: New This patch allows the Event Manager daemon, evmd, to stop listening on its default TCP port 619. This capability is not available for clustered systems. NNNNuuuummmmbbbbeeeerrrr:::: Patch 332.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Fixes memory leak in the PanoramiX/Xinerama Extension SSSSttttaaaatttteeee:::: New This patch fixes a memory leak in the PanoramiX/Xinerama Extension that could cause a process core dump. NNNNuuuummmmbbbbeeeerrrr:::: Patch 334.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Correct improper file access SSSSttttaaaatttteeee:::: New This patch corrects a potential security vulnerability where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file access. NNNNuuuummmmbbbbeeeerrrr:::: Patch 339.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Updated keyboard map for Russian 3R-LKQ48-BT SSSSttttaaaatttteeee:::: New This patch provides an updated keyboard map for the Russian 3R-LKQ48-BT keyboard model. Tru64 UNIX Patches 1-31 NNNNuuuummmmbbbbeeeerrrr:::: Patch 343.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Fixes problem seen with TAHI IPv6 conformance test SSSSttttaaaatttteeee:::: New This patch fixes a problem seen with the TAHI IPv6 conformance test, specifically Test 4 for the IPv6 Specification. NNNNuuuummmmbbbbeeeerrrr:::: Patch 345.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Correct improper file access SSSSttttaaaatttteeee:::: New This patch corrects a potential security vulnerability where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file or privilege management. NNNNuuuummmmbbbbeeeerrrr:::: Patch 347.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Fix allows fuser to display the reference flag SSSSttttaaaatttteeee:::: New This patch allows the fuser utility to display the reference flag, which indicates the type of reference made; for example, open, closed, unlinked, or mmapped. NNNNuuuummmmbbbbeeeerrrr:::: Patch 349.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Corrections to several problems in fixfdmn SSSSttttaaaatttteeee:::: New This patch corrects several problems with the fixfdmn utility. NNNNuuuummmmbbbbeeeerrrr:::: Patch 351.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Correct improper file access SSSSttttaaaatttteeee:::: New This patch corrects a potential security vulnerability where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file access. 1-32 Tru64 UNIX Patches NNNNuuuummmmbbbbeeeerrrr:::: Patch 356.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Fix for ftp open command SSSSttttaaaatttteeee:::: Supersedes Patch 354.00 This patch: Corrects a bug in the ftp open command. The optional port argument now accepts port numbers between 32768 and 65535. Corrects a potential security vulnerability which, under certain circumstances, could compromise system integrity. NNNNuuuummmmbbbbeeeerrrr:::: Patch 358.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Fix for mountd daemon SSSSttttaaaatttteeee:::: New This patch enables mountd to correctly handle entries with multiple lines input in exports file. NNNNuuuummmmbbbbeeeerrrr:::: Patch 360.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Correct improper file access SSSSttttaaaatttteeee:::: New This patch corrects a potential security vulnerability where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file or privilege management. NNNNuuuummmmbbbbeeeerrrr:::: Patch 362.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Correct improper file access SSSSttttaaaatttteeee:::: New This patch corrects a potential security vulnerability where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file access. Tru64 UNIX Patches 1-33 NNNNuuuummmmbbbbeeeerrrr:::: Patch 364.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Correct improper file access SSSSttttaaaatttteeee:::: New This patch corrects a potential security vulnerability where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file or privilege management. NNNNuuuummmmbbbbeeeerrrr:::: Patch 366.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Correct improper file access SSSSttttaaaatttteeee:::: New This patch corrects a potential security vulnerability where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file access. NNNNuuuummmmbbbbeeeerrrr:::: Patch 368.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Correct improper file access SSSSttttaaaatttteeee:::: New This patch corrects a potential security vulnerability where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file access. NNNNuuuummmmbbbbeeeerrrr:::: Patch 370.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Correct improper file access SSSSttttaaaatttteeee:::: New This patch corrects a potential security vulnerability where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file or privilege management. NNNNuuuummmmbbbbeeeerrrr:::: Patch 372.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Security (SSRT1-40U, SSRT1-41U, SSRT1-42U) SSSSttttaaaatttteeee:::: New This patch corrects a potential security vulnerability where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file access. 1-34 Tru64 UNIX Patches NNNNuuuummmmbbbbeeeerrrr:::: Patch 378.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Security (SSRT1-40U, SSRT1-41U, SSRT1-42U) SSSSttttaaaatttteeee:::: New This patch corrects a potential security vulnerability where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file access. NNNNuuuummmmbbbbeeeerrrr:::: Patch 380.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Correct improper file access SSSSttttaaaatttteeee:::: New This patch corrects a potential security vulnerability where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file or privilege management. NNNNuuuummmmbbbbeeeerrrr:::: Patch 384.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Fix for telnetd daemon SSSSttttaaaatttteeee:::: New Fixes a problem in which telnetting from some machines (MS), will leave a UDP port open, requiring a call to yp_unbind() after getnameinfo() to close all ports. NNNNuuuummmmbbbbeeeerrrr:::: Patch 387.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Correct improper file access SSSSttttaaaatttteeee:::: New This patch corrects a potential security vulnerability where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file or privilege management. NNNNuuuummmmbbbbeeeerrrr:::: Patch 389.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Update SSH Tru64 UNIX V1.1 (2.4.1) to SSH 3.2 SSSSttttaaaatttteeee:::: New This patch addresses several issues and problems with the SSH program, including interoperability with other SSH implementations, SSH client/server configuration files compatibility issues, and the lack of IPV6 support. Tru64 UNIX Patches 1-35 NNNNuuuummmmbbbbeeeerrrr:::: Patch 391.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Updates reference pages for VLAN functionality SSSSttttaaaatttteeee:::: New This patch revises the ifconfig(8), lan_config(8), niffconfig(8), ping(8), vlanconfig(8), and vlan(7) reference pages for VLAN functionality. NNNNuuuummmmbbbbeeeerrrr:::: Patch 394.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Correct improper file access SSSSttttaaaatttteeee:::: Supersedes Patches 335.00, 337.00, 392.00 This patch: Fixes several potential security vulnerabilities which, under certain circumstances, could compromise system integrity. These may be in the form of improper file access. Fixes a problem in which the volmigrate command returns a shell error when attempting to migrate an AdvFS domain with multiple filesets. With this fix, these domains can be migrated if all the filesets are mounted. Prevents inconsistent LSM volumes when the name of a partition that is being encapsulated matches the name of a current LSM volume. NNNNuuuummmmbbbbeeeerrrr:::: Patch 396.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Fix for ldapcd daemon SSSSttttaaaatttteeee:::: Supersedes Patch 56.00 This patch fixes the following problems with the ldapcd daemon: It may crash when resolving group codes with very large GIDs. It may crash when the LDAP Directory Server is unavailable. It prevents LDAP users from being authenticated, even when they are providing the correct password. 1-36 Tru64 UNIX Patches NNNNuuuummmmbbbbeeeerrrr:::: Patch 414.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Revises several SSH reference pages SSSSttttaaaatttteeee:::: New This patch revises several of the SSH reference pages which address several issues and problems with SSH, including the following: Interoperability with other SSH implementations Client/server configuration files compatibility issues The lack of IPV6 support NNNNuuuummmmbbbbeeeerrrr:::: Patch 416.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Fix for creacct hang SSSSttttaaaatttteeee:::: New Fixes a problem that causes the creacct command to hang when the W2K Active Directory is misconfigured. NNNNuuuummmmbbbbeeeerrrr:::: Patch 421.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Revises envconfig.8 and envmond.8 reference pages SSSSttttaaaatttteeee:::: New This patch revises the envconfig(8) and envmond(8) reference pages for the environmental monitoring facilities /usr/sbin/envmond and /usr/sbin/envconfig to support the new GS1280 hardware platform. NNNNuuuummmmbbbbeeeerrrr:::: Patch 423.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Fix potential denial of service SSSSttttaaaatttteeee:::: New This patch corrects a potential security vulnerability for systems using Internet Protocol Security (IPsec). Under certain circumstances, a remote attacker may be able to cause IPsec to block all IP traffic from the system, creating a denial of service. Tru64 UNIX Patches 1-37 NNNNuuuummmmbbbbeeeerrrr:::: Patch 425.00 AAAAbbbbssssttttrrrraaaacccctttt:::: NHD6 installs failed to see new disk information SSSSttttaaaatttteeee:::: New This patch updates ddr.mod to support new hardware (NHD6) devices. NNNNuuuummmmbbbbeeeerrrr:::: Patch 427.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Security (SSRT2266) SSSSttttaaaatttteeee:::: Supersedes Patches 179.00, 180.00, 181.00, 183.00 This patch: Corrects a potential security that may result in denial of service. This may be in the form of local and remote security domain risks. The following potential security vulnerability has been corrected: SSRT2266 IGMP (Severity - High) which, under certain circumstances, could compromise system integrity. Fixes a problem in the kernel network subsystem that causes a kernel memory fault panic in the m_adj() routine. Fixes a problem in the IP multicast loopback code that causes a kernel memory fault panic. Fixes a problem in which the kernel incorrectly closes a socket, thereby causing Sybase 1613 errors to be produced. Fixes a problem in which a duplicate IP address might be configured on the system, or an IP address might be configured with an incorrect netmask. 1-38 Tru64 UNIX Patches NNNNuuuummmmbbbbeeeerrrr:::: Patch 429.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Security (SSRT0711U) SSSSttttaaaatttteeee:::: New This patch: Corrects a potential security vulnerability where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file or privilege management. Corrects a problem in which crontab removes its entries and the vi editor truncates an existing file when a file system is full. Tru64 UNIX Patches 1-39 NNNNuuuummmmbbbbeeeerrrr:::: Patch 431.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Provides support functionality for DS20L platform SSSSttttaaaatttteeee:::: Supersedes Patches 214.00, 215.00, 217.00 This patch: Fixes a problem that can cause an AlphaServer ES45 system to hang if the Xserver is restarted or the system rebooted without a power cycle when using the Radeon AGP graphics device. Prevents the memory troller from starting on AlphaServer systems with aluminum ev68 CPUs. Fixes several IPMI-related problems, including the following: Erroneous fields in 686 OS-detected environmental machine check logout frame Unusually large number of 686 sensor timeouts with heavy system load IPMI always reporting -48v sensors as broken, seen as "redundant power supply failed" messages An IPMI memory leak Provides additional environmental support functionality for the AlphaServer DS20L system. 1-40 Tru64 UNIX Patches NNNNuuuummmmbbbbeeeerrrr:::: Patch 433.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Fix race condition and improper file access SSSSttttaaaatttteeee:::: Supersedes Patch 236.00 This patch: Corrects a potential security vulnerability where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file access. Corrects a problem in which a core dump may occur when using the csh shell from the Japanese locale. Fixes the problem with csh shell redirection that occurs while using a tilde (~) operation to redirect standard input and standard output of a command to a file residing in the home directory. NNNNuuuummmmbbbbeeeerrrr:::: Patch 438.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Additional support for Ultrium 2 SCSI tape drive SSSSttttaaaatttteeee:::: Supersedes Patches 290.00, 292.00, 436.00 This patch: Provides support for the SDLT160/320 and Ultrium 2 SCSI tape drives, including support for the Ultrium 2 SCSI to rewind after a reset behavior. Ensures proper compilation of the DDR database. NNNNuuuummmmbbbbeeeerrrr:::: Patch 440.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Fix for kernel memory fault SSSSttttaaaatttteeee:::: New This patch fixes the problem of a kernel memory fault in systems that contain more than eight IDE/ATA buses. Tru64 UNIX Patches 1-41 NNNNuuuummmmbbbbeeeerrrr:::: Patch 442.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Incorrect I/O status may be returned by KZPEA driver SSSSttttaaaatttteeee:::: Supersedes Patch 315.00 This patch: Corrects problems in the aha_chim driver that could result in bus hangs, panics, and inappropriate access of freed memory during high rate of bus resets. Corrects a problem in which Incorrect I/O status may be returned by the KZPEA driver when attempting to abort an I/O during a reset. NNNNuuuummmmbbbbeeeerrrr:::: Patch 444.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Revises tcpdump.8 ref page for VLAN functionality SSSSttttaaaatttteeee:::: New This patch revises the tcpdump(8) reference page for virtual local area network (VLAN) functionality. NNNNuuuummmmbbbbeeeerrrr:::: Patch 446.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Revises the mt.1 reference page SSSSttttaaaatttteeee:::: New This patch revises the mt(1) reference page for the mt command, which has three new commands, mt reserve, mt release and mt tur. 1-42 Tru64 UNIX Patches NNNNuuuummmmbbbbeeeerrrr:::: Patch 448.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Allows multiple VX1 graphic cards to be configured SSSSttttaaaatttteeee:::: Supersedes Patch 353.00 This patch: Corrects a problem in which systems configured with VX1 graphics card will not return to console when the halt button is pressed, thereby making the console unusable. Allows multiple VX1 graphic cards to be configured in a separate I/O box system. NNNNuuuummmmbbbbeeeerrrr:::: Patch 450.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Fix for smsd triggering LSM configuration errors SSSSttttaaaatttteeee:::: New This patch corrects a problem in which the SysMan Station daemon, esmsd, triggers LSM configuration errors when querying LSM in a cluster. The installation of this patch ensures that a cluster member will be up-to-date with respect to the LSM configuration when calls are made to an internal LSM routine. NNNNuuuummmmbbbbeeeerrrr:::: Patch 452.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Modifications for environmental monitoring facilities SSSSttttaaaatttteeee:::: Supersedes Patch 40.00 This patch: Modifies the environmental monitoring facilities /usr/sbin/envmond and /usr/sbin/envconfig to support the AlphaServer GS1280 system. Updates the environmental monitoring daemon envmond to ensure the correct EVM events are being sent at the correct time. Tru64 UNIX Patches 1-43 NNNNuuuummmmbbbbeeeerrrr:::: Patch 454.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Correct potential buffer overflow SSSSttttaaaatttteeee:::: New This patch corrects a potential security vulnerability where, under certain circumstances, system integrity may be compromised when a buffer overflow occurs in the dxsysinfo utility. Buffer overflows are sometimes exploited in an attempt to subvert the function of a privileged program and possibly execute commands at the elevated privileges if the program file has the setuid privilege. NNNNuuuummmmbbbbeeeerrrr:::: Patch 456.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Fix buffer overflow and improper file access SSSSttttaaaatttteeee:::: Supersedes Patch 246.00 This patch: Corrects a potential security vulnerability where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file access. Corrects a potential security vulnerability where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file or privilege management. NNNNuuuummmmbbbbeeeerrrr:::: Patch 458.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Correct potential buffer overflow SSSSttttaaaatttteeee:::: New This patch corrects a potential security vulnerability where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file or privilege management. NNNNuuuummmmbbbbeeeerrrr:::: Patch 460.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Correct potential buffer overflow SSSSttttaaaatttteeee:::: New This patch corrects a potential security vulnerability where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file or privilege management. 1-44 Tru64 UNIX Patches NNNNuuuummmmbbbbeeeerrrr:::: Patch 462.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Support for SmartArray disk controllers SSSSttttaaaatttteeee:::: New Adds Support for SmartArray disk controllers. In the absence of this support, the SysMan Station hardware view fails to operate if the SmartArray product is installed on the system. NNNNuuuummmmbbbbeeeerrrr:::: Patch 478.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Installs DECthreads V3.20-029c SSSSttttaaaatttteeee:::: Supersedes Patch 22.00 This patch installs DECthreads V3.20-029c, which fixes problems that may affect threaded programs, including a problem with floating point data corruption. This version of DECthreads is the initial support version of the HP POSIX Threads Library for Tru64 UNIX V5.1B. NNNNuuuummmmbbbbeeeerrrr:::: Patch 480.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Installs DECthreads V3.20-029c SSSSttttaaaatttteeee:::: Supersedes Patch 24.00 This patch installs DECthreads V3.20-029c, which fixes problems that may affect threaded programs, including a problem with floating point data corruption. This version of DECthreads is the initial support version of the HP POSIX Threads Library for Tru64 UNIX V5.1B. Tru64 UNIX Patches 1-45 NNNNuuuummmmbbbbeeeerrrr:::: Patch 484.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Corrects invalid hwmgr show component inconsistency SSSSttttaaaatttteeee:::: Supersedes Patches 144.00, 145.00, 146.00, 147.00, 148.00, 149.00, 151.00 This patch: Fixes a problem in which when reboooting immediately after entering a hwmgr -redirect SCSI command you will boot to single user mode with the following error being displayed: "bcheckrc: Device Naming failed boot configure or verify Please correct the problem and continue or reboot INIT: SINGLE-USER MODE." Fixes a problem in which when using the hardware manager to show attributes, the LONG_MAX and LONG_MIN values are displayed incorrectly. Corrects a problem that causes the system to hang when mounting cluster root if the cluster root domain devices are private to different cluster members. This fix allows the cluster to boot with a warning to the console. Although this configuration is not recommended, it should not make the cluster unbootable. The situation involves non-LSM cluster root domains. Introduces the type checking of attributes when registering components with the hardware manager. Corrects a potential deadlock in the hardware configuration subsystem. Prevents the hardware management cluster database from being reset. Corrects an invalid hwmgr show component inconsistency. Corrects a problem that occurs during environmental testing. When using the hwmgr utility to verify that a particular sensor's status would change from OK to Fault, each time the state changed and hwmgr requested the new value, hwmgr dumped core. 1-46 Tru64 UNIX Patches NNNNuuuummmmbbbbeeeerrrr:::: Patch 486.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Security (SSRT0785U) SSSSttttaaaatttteeee:::: Supersedes Patches 162.00, 163.00, 165.00 This patch: Corrects the following problems with the account management tools: The userdel command possibly core dumping when the shell field is empty in the passwd file. The usermod command not working as expected with NIS +/- users. The useradd command not managing default and template data properly. This showed up most notably with the useradd -p command producing the message "Password must be between 32 and 80 characters." Several other minor problems. Updates the account management tools to use the latest versions of the ASU (Advanced Server for UNIX) API calls when ASU is in use on the server. Fixes a number of problems with the Account Manager application, dxaccounts, on a system with ASU installed. Corrects a potential security vulnerability where, under certain circumstances, system integrity may be compromised. This may be in the form of passwords that have a length outside of the intended range. Tru64 UNIX Patches 1-47 NNNNuuuummmmbbbbeeeerrrr:::: Patch 490.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Fix process management SSSSttttaaaatttteeee:::: Supersedes Patches 213.00, 108.00, 109.00, 110.00, 111.00, 112.00, 113.00, 114.00, 115.00, 116.00, 117.00, 118.00, 119.00, 120.00, 121.00, 122.00, 123.00, 124.00, 125.00, 126.00, 127.00, 128.00, 129.00, 130.00, 131.00, 133.00, 397.00, 398.00, 399.00, 400.00, 401.00, 402.00, 403.00, 405.00 This patch: Fixes a system hang when using Open3D over the AGP bus on a GS1280. Corrects performance issues when accessing a file with direct I/O enabled. Fixes an AdvFS asynchronous direct I/O problem that could cause a thread to hang. Fixes a problem encountered where a truncated AdvFS file erroneously zeroed data for the remaining leading segment of the file. Changes the behavior of migrate_normal and migrate_stripe when migrating an original file that has a clone. If the clone was marked out of sync, migrate could come back with E_CLONE_OUT_OF_SYNC even though the migrate succeeded. Now this case is caught, and handled. Replaces the system panics caused by "Can't clear bit twice" with a domain panic. Fixes a problem in which a crash occur when an AdvFS file system reports I/O errors and enters into a domain panic state. AdvFS's error cleanup would panic on an invalid pointer and report an "invalid memory read access from kernel mode" panic message. Fixes an issue encountered in configurations where the primary processor is not the first processor within a rad. Resolves a problem of not being able to view files on some CD-ROM media that is created by third party software and corrects the erroneous reporting of success when attempting to write beyond the file size limit using synchronized I/O and the calculation of _PC_FILESIZEBITS, which is used by the operating system for pathconf file characteristics. Fixes a problem with audit data not being displayed by the audit tool, Fixes problems with file object selection and deselection and directories. Fixes problems with NUMA performance associated with auditing. Fixes a race during AdvFS volume removal that can cause a panic in the bs_osf_complete() routine. 1-48 Tru64 UNIX Patches Fixes a problem with kernel memory fault in shadowvnode() caused by NULL vnode pointer. Fixes insmntque() to conform to proper locking when removing and adding vnode to the mount vlist. Fixes a problem with excessive FIDS_LOCK contention observed when large numbers of files are using system based file locking. Corrects the AdvFS system call OP_GET_BKUP_XTNT_MA to avoid a silent infinite loop in vdump. The call will now return the valid xtntCnt when it fails due to E_NOT_ENOUGH_XTNTS. Fixes a panic caused by a problem within the swapping subsystem. Fixes mount and umount failures and panics in MFS, UFS, and FDFS. Fixes an AdvFS alignment fault panic caused by inconsistent AdvFS metadata in a directory. In particular, the directory's entry size is an unaligned value. Corrects a potential problem with modifying files via direct I/O when there is a clone fileset. Fixes a panic within the two-level scheduling subsystem. Tru64 UNIX Patches 1-49 PPPPaaaattttcccchhhh 444499990000....00000000 CCCCoooonnnnttttiiiinnnnuuuueeeedddd Improves AdvFS informational messages as follows: Advscan reports if a domain has all of its volumes, but they are stored in a different directories. This scenario will cause mount to fail. The AdvFS I/O error message includes the location of a file that will help users to translate the error number into an error message. Forces a domain panic instead of a system panic if AdvFS metadata is discovered to be incorrect in frag_group_dealloc. Fixes a part of AdvFS migration code in order to prevent the rmvol utility's "Can't remove volume" error. Fixes a problem when monitoring I/O using the advfsstat command. Fixes a rare problem that causes thread blocking when waiting for memory. Fixes a problem in which a domain panic may occur in idx_lookup_node_int or bs_frag_dealloc under heavy file system activity, generating one of the following messages: idx_lookup_node_int: bs_refpg failed bs_frag_dealloc: rbf_pinpg (4) failed, return code = -1035 Fixes a problem in which the fuser utility is unable to report on all referenced resources, which occurs when attempting to identify reasons for unmount failures. Improves the process exit procedure for processes that have had the nice command used on them. Corrects a potential security vulnerability where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file access. Corrects a race condition in AdvFS in which it avoids a potential stranded log record in memory that does not get out to disk. Fixes an rmvol E_PAGE_NOT_MAPPED error. Eliminates an ENO_MORE_BLKS error seen when performing a copy on write (COW) procedure to a clone file while an rmvol operation is in progress. 1-50 Tru64 UNIX Patches Fixes a problem in which a system on a cluster can panic with the message "ics_unable_to_make_progress: input thread stalled." Adds support for CPU indictment on AlphaServer ES80 and GS1280 systems. Adds support in the platform code to handle MSI capable adapters. AlphaServer GS1280 systems support option cards that require MSI capabilities Adds support to get live status information for air movers and power supplies on AlphaServer ES80 and GS1280 systems and to log intrusion packets to the error log. Fixes a problem in which a process waiting on a semaphore does not get woken up. Fixes a problem in which the extension of UNIX file systems via the mount command can effectively disable the use of the file system. Fixes a problem on some LSM based systems in which a panic can occurs after a file system extension has been completed. Fixes a problem in which a hang may occur when a rmvol operation is performed after a cluster node failure during volmigrate, volunmigrate, or frag file migration. Corrects a locking problem with NFS running over UFS. Fixes an obliteration of user file information, which is most often seen after using the ftruncate() function. NNNNuuuummmmbbbbeeeerrrr:::: Patch 492.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Correct improper file access SSSSttttaaaatttteeee:::: Supersedes Patch 77.00 This patch corrects a potential security vulnerability where, under certain circumstances, system integrity may be compromised. This may be in the form of improper file access. Tru64 UNIX Patches 1-51 NNNNuuuummmmbbbbeeeerrrr:::: Patch 494.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Fixes an NFS client panic SSSSttttaaaatttteeee:::: Supersedes Patches 78.00, 79.00, 80.00, 82.00, 341.00, 409.00, 410.00, 412.00, 482.00 This patch: Fixes two potential problems in the NFS V3 client where unstable writes could potentially remain uncommitted when they should have been committed to stable storage. Eliminates a false directory lookup warning message generated by an incorrect comparison caused by mismatched fileid variable types. Improves client caching performance. Fixes a problem that can cause a system crash when an NFS server exports files on a third party file system (that is, one not built into Tru64 UNIX). Prevents the loss of a single system image for an NFS file system mounted from a cluster, as a result of problems communicating with the external NFS server. Fixes a memory leak in the NFS server when it receives malformed packets. Allows the size of the NFS server's duplicate request cache to be adjusted as needed. Fixes a problem in which a Tru64 UNIX NFS client panics when it receives a null entry as a response to a readdirplus request from an NFS server. Fixes a problem in which a Tru64 NFS UNIX client panics as a result of receiving illegal file access mode from an NFS client. Increases TCP windows from 96 KB to 500 KB to improve performance. Causes the netisr thread to dynamically estimate the reply size and subsequently reserve the space in the socket buffer. Adds a new timeout check to notice when data in a socket buffer has not been acknowledged in 30-50 seconds and copies those buffers to allow the UBC to free up those mbufs. Addresses the following problems with the NFS server: A flaw that could cause it to crash upon reception of malformed input. 1-52 Tru64 UNIX Patches A flaw that could cause it to crash with concurrent read and truncate on an AdvFS file. A flaw that could cause it to crash with malformed or malicious READDIR[PLUS] version 3 RPCs. Tru64 UNIX Patches 1-53 NNNNuuuummmmbbbbeeeerrrr:::: Patch 496.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Provides the V1.07 release of ciss driver SSSSttttaaaatttteeee:::: Supersedes Patches 92.00, 93.00, 94.00, 95.00, 96.00, 97.00, 98.00, 99.00, 100.00, 101.00, 374.00, 103.00, 417.00, 419.00 This patch: Fixes a problem with the Smart Array driver that could cause a system hang to occur during error recovery when I/O is active. Adds support for new EVM events to be generated by the Event Monitoring daemon, /usr/sbin/envmond. Fixes the system panic "PWS_CCB_QUE_REMOVE: ccb not on any list," caused by a device or bus reset occurring during the execution of a command to a media changer device, like a tape library. Corrects a problem that causes a system panic while running applications performing open of RAID device, and the faulting routine was control_port_open. Adds an event to indicate that the soft or hard error count has changed on the device identified in the event. Fixes a situation in which mounting a valid CD-ROM for the first time fails with the message "No valid file system exists on this partition," although subsequent mounts of the same CD-ROM work fine. Provides a configurable setting that causes an error return for any read of tape from a tape that requests less than the full amount of data in the tape block. Enables SmartArray 5300 controller hardware events to be logged to binary.errlog during a boot. This is useful in diagnosing logical volume state change and physical drive hotswaps that can occur while the system is not booted. Corrects a problem in which /sbin/ddr_config does not accept values for ReadyTimeSeconds larger than 255. The new limit is 86400 seconds (24 hours). Fixes problems with NUMA disk statistics. Fixes a KMF problem that can occur when some nodes in cluster are rebooted and a device is shared by all the nodes. Changes the CAM subsystem message that is printed to the error log on a recovered read error from "bad block number" to "block number." Corrects a problem in which camreport may report negative device IDs. 1-54 Tru64 UNIX Patches Fixes the reporting to the binary errlog of device monitoring events and hardware errors during disk recovery from the disk driver. Corrects a problem with hwmgr utility deletes while a SCSI scan is in progress. Corrects a problem in which a path event can cause hang in cdisk_online during disk open of HSG80. Installs the V1.07 release of the ciss driver, which is the mandatory minimum version to support the Smart Array 5300 Controller. Address an issue in which AdvFS domain panics occur during HSZ and HSG failovers Tru64 UNIX Patches 1-55 NNNNuuuummmmbbbbeeeerrrr:::: Patch 498.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Improve I/O performance by reducing kernel locking overhead.hubs SSSSttttaaaatttteeee:::: Supersedes Patches 65.00, 66.00, 67.00, 68.00, 69.00, 70.00, 71.00, 72.00, 73.00, 75.00, 376.00, 406.00, 408.00, 241.00, 242.00, 244.00, 435.00, 488.00 Fixes a process hang condition. Fixes a "thread_block: simple lock held" panic. Corrects a situation in which a system could panic during a particular machine check. Corrects several problems of 3D client hangs when using a Radeon graphics card. Fixes a performance problem seen when doing wiring on gh_chunks memory; for example, an Oracle application. Protects against "get_color_bucket: empty buckets!" panics and "kernel memory fault" failures on systems with mixed cache parameters. Fixes a kernel memory fault in u_seg_global_destroy. Corrects a kernel memory fault that can happen when running applications that use the Cray Intra-Node Shared Memory library. Prevents a potential process (not system) hang seen when a system comes under heavy memory load with monolithic memory use (gigabyte-scale single objects). Prevents a kernel memory fault when running with protection on the 128-byte bucket. (This should only be running with this as directed by support personnel.) Corrects a situation in which a taso-compiled binary is unable to allocate more memory after performing a series of mmap calls. Fixes an occasional panic that can be seen when reading from a process using Granularity Hints via the /proc file system. Fixes a panic that generates the message "u_seg_vop_remove: seg not found in vop." Fixes a situation in which mmap memory locked with mlockall() using the MCL_FUTURE flag does not become wired automatically. Fixes a "Bigpage Assertion Failed" panic. 1-56 Tru64 UNIX Patches Corrects a rounding error for vm attribute vm_bigpg_thresh. Corrects the handling of bad pages when bigpages are enabled. Fixes "page mapped" panics when using the mmap() function for dev/mem to access free bigpages. Corrects a condition that causes a delete_pv_entry panic when kernel virtual-address space has high usage. Fixes a problem seen when USB hubs (or any other bus device) are removed from a running system. Removes a restriction in which dynamic VMEbus device drivers could only probe one controller per driver. With this patch, multiple controllers per driver can be configured successfully. Fixes a potential floating point register corruption. Fixes multiple problems affecting a system with peripheral USB hubs attached, as well as problems that might occur when moving or adding USB host adapters. Improves I/O performance by reducing kernel locking overhead. Tru64 UNIX Patches 1-57 NNNNuuuummmmbbbbeeeerrrr:::: Patch 500.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Adds new functionality to support IEEE 802.1Q SSSSttttaaaatttteeee:::: Supersedes Patches 43.00, 45.00, 48.00, 49.00, 50.00, 51.00, 52.00, 54.00 This patch: Adds IEEE 802.1Q Virtual Local Area Network (VLAN) support for : DEGPA DEGXA DE50x, lan_common.h DE60x Adds support to the ifconfig application for the IPv6 command line argument ip6reachabletime. Adds support for Ethernet adapters, including the DS25 onboard 10/100/1000 port, and does the following: Fixes a problem in the alt driver for DEGPA Gigabit Ethernet adapters. This problem affects all Tru64 systems containing DEGPA network interfaces. Fixes numerous issues in the driver for DEGXA Gigabit Ethernet adapters. ___________________________________________________________________________ 1-58 Tru64 UNIX Patches TruCluster Patches 2 This chapter provides information about the patches included in Patch Kit 1 for the TruCluster Server software. This chapter is organized as follows: +o Section 2.1 provides release notes that are specific to the TruCluster Server software patches in this kit. +o Section 2.2 provides brief descriptions of the TruCluster Server patches included in this kit. _2._1 _R_e_l_e_a_s_e _N_o_t_e_s This section provides release notes that are specific to the TruCluster Server software patches in this kit. _2._1._1 _R_e_q_u_i_r_e_d _S_t_o_r_a_g_e _S_p_a_c_e The following storage space is required to install the base and TruCluster Server components of this patch kit: +o Approximately 250 MB of temporary storage space is required to untar this patch kit (base and TruCluster). We recommend that this kit not be placed in the ////, ////uuuussssrrrr, or ////vvvvaaaarrrr file systems because doing so may unduly constrain the available storage space for the patching activity. +o Approximately 59 MB of storage space in ////vvvvaaaarrrr////aaaaddddmmmm////ppppaaaattttcccchhhh////bbbbaaaacccckkkkuuuupppp may be required for archived original files if you choose to install and revert all patches. See the _P_a_t_c_h _K_i_t _I_n_s_t_a_l_l_a_t_i_o_n _I_n_s_t_r_u_c_t_i_o_n_s for more information. +o Approximately 59 MB of storage space in ////vvvvaaaarrrr////aaaaddddmmmm////ppppaaaattttcccchhhh may be required for original files if you choose to install and revert all patches. See the _P_a_t_c_h _K_i_t _I_n_s_t_a_l_l_a_t_i_o_n _I_n_s_t_r_u_c_t_i_o_n_s for more information. +o Approximately 644 KB of storage space is required in ////vvvvaaaarrrr////aaaaddddmmmm////ppppaaaattttcccchhhh////ddddoooocccc for patch abstract and README documentation. +o Approximately 184 KB of storage space is needed in ////uuuussssrrrr////ssssbbbbiiiinnnn////dddduuuuppppaaaattttcccchhhh for the patch management utility. See Section 1.1.1 for information on space needed for the operating system patches. _2._1._2 _A_l_p_h_a_S_e_r_v_e_r _E_S_4_7 _o_r _A_l_p_h_a_S_e_r_v_e_r _G_S_1_2_8_0 _H_a_n_g_s _W_h_e_n _A_d_d_e_d _t_o _C_l_u_s_t_e_r If after running cccclllluuuu____aaaadddddddd____mmmmeeeemmmmbbbbeeeerrrr to add an AlphaServer ES47 or AlphaServer GS1280 as a member of a TruCluster the AlphaServer hangs during its first boot, try rebooting it with the original V5.1B generic cluster kernel, cccclllluuuu____ggggeeeennnnvvvvmmmmuuuunnnniiiixxxx. Use the following instructions to extract and copy the V5.1B cluster ggggeeeennnnvvvvmmmmuuuunnnniiiixxxx from your original Tru64 UNIX kit to your AlphaServer ES47 or AlphaServer GS1280 system. In these instructions, the AlphaServer ES47 or AlphaServer GS1280 is designated as member 5. Substitute the appropriate member number for your cluster. 1. Insert the Tru64 UNIX Associated Products Disk 2 into the CD-ROM drive of an active member. 2. Mount the CD-ROM to ////mmmmnnnntttt. For example: # mmmmoooouuuunnnntttt ----rrrr ////ddddeeeevvvv////ddddiiiisssskkkk////ccccddddrrrroooommmm0000cccc ////mmmmnnnntttt 3. Mount the bootdisk of the AlphaServer ES47 or AlphaServer GS1280 on its specific mount point; for example: # mmmmoooouuuunnnntttt rrrrooooooootttt5555____ddddoooommmmaaaaiiiinnnn####rrrrooooooootttt ////cccclllluuuusssstttteeeerrrr////mmmmeeeemmmmbbbbeeeerrrrssss////mmmmeeeemmmmbbbbeeeerrrr5555////bbbbooooooootttt____ppppaaaarrrrttttiiiittttiiiioooonnnn 4. Extract the original cccclllluuuu____ggggeeeennnnvvvvmmmmuuuunnnniiiixxxx from the CD-ROM and copy it to the bootdisk of the AlphaServer ES47 or AlphaServer GS1280 member. # zzzzccccaaaatttt <<<< TTTTCCCCRRRRBBBBAAAASSSSEEEE555544440000 |||| (((( ccccdddd ////cccclllluuuusssstttteeeerrrr////aaaaddddmmmmiiiinnnn////ttttmmmmpppp;;;; ttttaaaarrrr ----xxxxffff ---- ....////uuuussssrrrr////oooopppptttt////TTTTrrrruuuuCCCClllluuuusssstttteeeerrrr////cccclllluuuu____ggggeeeennnnvvvvmmmmuuuunnnniiiixxxx)))) # ccccpppp ////cccclllluuuusssstttteeeerrrr////aaaaddddmmmmiiiinnnn////ttttmmmmpppp////uuuussssrrrr////oooopppptttt////TTTTrrrruuuuCCCClllluuuusssstttteeeerrrr////cccclllluuuu____ggggeeeennnnvvvvmmmmuuuunnnniiiixxxx \\\\ ////cccclllluuuusssstttteeeerrrr////mmmmeeeemmmmbbbbeeeerrrrssss////mmmmeeeemmmmbbbbeeeerrrr????////bbbbooooooootttt____ppppaaaarrrrttttiiiittttiiiioooonnnn////ggggeeeennnnvvvvmmmmuuuunnnniiiixxxx # rrrrmmmm ////cccclllluuuusssstttteeeerrrr////aaaaddddmmmmiiiinnnn////ttttmmmmpppp////uuuussssrrrr////oooopppptttt////TTTTrrrruuuuCCCClllluuuusssstttteeeerrrr////cccclllluuuu____ggggeeeennnnvvvvmmmmuuuunnnniiiixxxx 5. Unmount the CD-ROM and the bootdisk: # uuuummmmoooouuuunnnntttt ////mmmmnnnntttt # uuuummmmoooouuuunnnntttt ////cccclllluuuusssstttteeeerrrr////mmmmeeeemmmmbbbbeeeerrrrssss////mmmmeeeemmmmbbbbeeeerrrr5555////bbbbooooooootttt____ppppaaaarrrrttttiiiittttiiiioooonnnn 6. Reboot the AlphaServer ES47 or AlphaServer GS1280 2-2 TruCluster Patches _2._1._3 _U_p_d_a_t_e_s _f_o_r _R_o_l_l_i_n_g _U_p_g_r_a_d_e _P_r_o_c_e_d_u_r_e_s The following sections provide information on rolling upgrade procedures. _2._1._3._1 _U_n_r_e_c_o_v_e_r_a_b_l_e _F_a_i_l_u_r_e _P_r_o_c_e_d_u_r_e The procedure to follow if you encounter unrecoverable failures while running dddduuuuppppaaaattttcccchhhh during a rolling upgrade has changed. The new procedure calls for you to run the cccclllluuuu____uuuuppppggggrrrraaaaddddeeee ----uuuunnnnddddoooo iiiinnnnssssttttaaaallllllll command and then set the system baseline. The procedure is explained in the _P_a_t_c_h _K_i_t _I_n_s_t_a_l_l_a_t_i_o_n _I_n_s_t_r_u_c_t_i_o_n_s as notes in Section 5.3 and Section 5.6. _2._1._3._2 _D_u_r_i_n_g _R_o_l_l_i_n_g _P_a_t_c_h, _D_o _N_o_t _A_d_d _o_r _D_e_l_e_t_e _O_S_F, _T_C_R, _I_O_S, _o_r _O_S_H _S_u_b_s_e_t_s During a rolling upgrade, do not use the ////uuuussssrrrr////ssssbbbbiiiinnnn////sssseeeettttlllldddd command to add or delete any of the following subsets: +o Base Operating System subsets (those with the prefix OOOOSSSSFFFF). +o TruCluster Server subsets (those with the prefix TTTTCCCCRRRR). +o Worldwide Language Support (WLS) subsets (those with the prefix IIIIOOOOSSSS). +o New Hardware Delivery (NHD) subsets (those with the prefix OOOOSSSSHHHH). Adding or deleting these subsets during a roll creates inconsistencies in the tagged files. _2._1._3._3 _U_n_d_o_i_n_g _a _R_o_l_l_i_n_g _P_a_t_c_h When you undo the stages of a rolling upgrade, the stages must be undone in the correct order. However, the cccclllluuuu____uuuuppppggggrrrraaaaddddeeee command incorrectly allows a user undoing the stages of a rolling patch to run the cccclllluuuu____uuuuppppggggrrrraaaaddddeeee uuuunnnnddddoooo pppprrrreeeeiiiinnnnssssttttaaaallllllll command before running the cccclllluuuu____uuuuppppggggrrrraaaaddddeeee uuuunnnnddddoooo iiiinnnnssssttttaaaallllllll command. The problem is that in the install stage, cccclllluuuu____uuuuppppggggrrrraaaaddddeeee cannot tell from the dddduuuuppppaaaattttcccchhhh flag files whether the roll is going forward or backward. This ambiguity allows a user who is undoing a rolling patch to run the cccclllluuuu____uuuuppppggggrrrraaaaddddeeee uuuunnnnddddoooo pppprrrreeeeiiiinnnnssssttttaaaallllllll command without first having run the cccclllluuuu____uuuuppppggggrrrraaaaddddeeee uuuunnnnddddoooo iiiinnnnssssttttaaaallllllll command. To avoid this problem when undoing the stages of a rolling patch, make sure to follow the documented procedure and undo the stages in order. _2._1._3._3._1 _I_g_n_o_r_e _M_e_s_s_a_g_e _A_b_o_u_t _M_i_s_s_i_n_g _l_a_d_e_b_u_g._c_a_t _F_i_l_e _D_u_r_i_n_g _R_o_l_l_i_n_g _U_p_g_r_a_d_e - When installing the patch kit during a rolling upgrade, you may see the following error and warning messages. You can ignore these messages and TruCluster Patches 2-3 continue with the rolling upgrade. Creating tagged files. \&............................................................................... \&..... *** Error *** The tar commands used to create tagged files in the '/usr' file system have reported the following errors and warnings: tar: lib/nls/msg/en_US.88591/ladebug.cat : No such file or directory \&......................................................... *** Warning *** The above errors were detected during the cluster upgrade. If you believe that the errors are not critical to system operation, you can choose to continue. If you are unsure, you should check the cluster upgrade log and refer to clu_upgrade(8) before continuing with the upgrade. _2._1._3._4 _c_l_u__u_p_g_r_a_d_e _u_n_d_o _o_f _I_n_s_t_a_l_l _S_t_a_g_e _C_a_n _R_e_s_u_l_t _i_n _I_n_c_o_r_r_e_c_t _F_i_l_e _P_e_r_m_i_s_s_i_o_n_s This note applies only when both of the following are true: +o You are using iiiinnnnssssttttaaaalllllllluuuuppppddddaaaatttteeee, dddduuuuppppaaaattttcccchhhh, or nnnnhhhhdddd____iiiinnnnssssttttaaaallllllll to perform a rolling upgrade. +o You need to undo the iiiinnnnssssttttaaaallllllll stage; that is, to use the cccclllluuuu____uuuuppppggggrrrraaaaddddeeee uuuunnnnddddoooo iiiinnnnssssttttaaaallllllll command. In this situation, incorrect file permissions can be set for files on the lead member. This can result in the failure of rrrrsssshhhh, rrrrllllooooggggiiiinnnn, and other commands that assume user IDs or identities by means of sssseeeettttuuuuiiiidddd. The cccclllluuuu____uuuuppppggggrrrraaaaddddeeee uuuunnnnddddoooo iiiinnnnssssttttaaaallllllll command must be run from a nonlead member that has access to the lead member's boot disk. After the command completes, follow these steps: 1. Boot the lead member to single-user mode. 2. Run the following script: #!/usr/bin/ksh -p # # Script for restoring installed permissions # cd / for i in /usr/.smdb./$(OSF|TCR|IOS|OSH)*.sts do 2-4 TruCluster Patches grep -q "_INSTALLED" $i 2>/dev/null && /usr/lbin/fverify -y <"${i%.sts}.inv" done 3. Rerun iiiinnnnssssttttaaaalllllllluuuuppppddddaaaatttteeee, dddduuuuppppaaaattttcccchhhh, or nnnnhhhhdddd____iiiinnnnssssttttaaaallllllll, whichever is appropriate, and complete the rolling upgrade. For information about rolling upgrades, see Chapter 7 of the _C_l_u_s_t_e_r _I_n_s_t_a_l_l_a_t_i_o_n manual, iiiinnnnssssttttaaaalllllllluuuuppppddddaaaatttteeee(8), and cccclllluuuu____uuuuppppggggrrrraaaaddddeeee(8). _2._1._3._5 _M_i_s_s_i_n_g _E_n_t_r_y _M_e_s_s_a_g_e_s _C_a_n _B_e _I_g_n_o_r_e_d _D_u_r_i_n_g _R_o_l_l_i_n_g _P_a_t_c_h During the sssseeeettttuuuupppp stage of a rolling patch, you might see a message like the following: Creating tagged files. \&............................................................................ clubase: Entry not found in /cluster/admin/tmp/stanza.stdin.597530 clubase: Entry not found in /cluster/admin/tmp/stanza.stdin.597568 An EEEEnnnnttttrrrryyyy nnnnooootttt ffffoooouuuunnnndddd message will appear once for each member in the cluster. The number in the message corresponds to a PID. You can safely ignore this EEEEnnnnttttrrrryyyy nnnnooootttt ffffoooouuuunnnndddd message. _2._1._3._6 _R_e_l_o_c_a_t_i_n_g _A_u_t_o_F_S _D_u_r_i_n_g _a _R_o_l_l_i_n_g _U_p_g_r_a_d_e _o_n _a _C_l_u_s_t_e_r This note applies only to performing rolling upgrades on cluster systems that use AutoFS. During a cluster rolling upgrade, each cluster member is singly halted and rebooted several times. The _P_a_t_c_h _K_i_t _I_n_s_t_a_l_l_a_t_i_o_n _I_n_s_t_r_u_c_t_i_o_n_s direct you to manually relocate applications under the control of Cluster Application Availability (CAA) prior to halting a member on which CAA applications run. Depending on the amount of NFS traffic, the manual relocation of AutoFS may sometimes fail. Failure is most likely to occur when NFS traffic is heavy. The following procedure avoids that problem. At the start of the rolling upgrade procedure, use the ccccaaaaaaaa____ssssttttaaaatttt command to learn which member is running AutoFS. For example: # ccccaaaaaaaa____ssssttttaaaatttt ----tttt Name Type Target State Host ------------------------------------------------------------ autofs application ONLINE ONLINE rye cluster_lockd application ONLINE ONLINE rye clustercron application ONLINE ONLINE swiss dhcp application ONLINE ONLINE swiss TruCluster Patches 2-5 named application ONLINE ONLINE rye To minimize your effort in the procedure described as follows, it is desirable to perform the roll stage last on the member where AutoFS runs. When it comes time to perform a manual relocation on a member where AutoFS is running, follow these steps: 1. Stop AutoFS by entering the following command on the member where AutoFS runs: # ////uuuussssrrrr////ssssbbbbiiiinnnn////ccccaaaaaaaa____ssssttttoooopppp ----ffff aaaauuuuttttooooffffssss 2. Perform the manual relocation of other applications running on that member: # ////uuuussssrrrr////ssssbbbbiiiinnnn////ccccaaaaaaaa____rrrreeeellllooooccccaaaatttteeee ----ssss _c_u_r_r_e_n_t__m_e_m_b_e_r -c _t_a_r_g_e_t__m_e_m_b_e_r After the member that had been running AutoFS has been halted as part of the rolling upgrade procedure, restart AutoFS on a member that is still up. (If this is the roll stage and the halted member is not the last member to be rolled, you can minimize your effort by restarting AutoFS on the member you plan to roll last.) 1. On a member that is up, enter the following command to restart AutoFS. (The member where AutoFS is to run, _t_a_r_g_e_t__m_e_m_b_e_r, must be up and running in multi-user mode.) # ////uuuussssrrrr////ssssbbbbiiiinnnn////ccccaaaaaaaa____ssssttttaaaarrrrttttaaaauuuuttttooooffffssss ----cccc _t_a_r_g_e_t__m_e_m_b_e_r 2. Continue with the rolling upgrade procedure. _2._1._4 _A_d_d_i_t_i_o_n_a_l _S_t_e_p_s _R_e_q_u_i_r_e_d _W_h_e_n _I_n_s_t_a_l_l_i_n_g _P_a_t_c_h_e_s _B_e_f_o_r_e _C_l_u_s_t_e_r _C_r_e_a_t_i_o_n This note applies only if you install a patch kit before creating a cluster; that is, if you do the following: 1. Install the Tru64 UNIX base kit. 2. Install the TruCluster Server kit. 3. Install the Version 5.1B patch kit before running the cccclllluuuu____ccccrrrreeeeaaaatttteeee command. 2-6 TruCluster Patches In this situation, you must then perform three additional steps: 1. Run vvvveeeerrrrsssswwww, the version switch command, to set the new version identifier: # ////uuuussssrrrr////ssssbbbbiiiinnnn////vvvveeeerrrrsssswwww ----sssseeeettttnnnneeeewwww 2. Run vvvveeeerrrrsssswwww to switch to the new version: # ////uuuussssrrrr////ssssbbbbiiiinnnn////vvvveeeerrrrsssswwww ----sssswwwwiiiittttcccchhhh 3. Run the cccclllluuuu____ccccrrrreeeeaaaatttteeee command to create your cluster: # ////uuuussssrrrr////ssssbbbbiiiinnnn////cccclllluuuu____ccccrrrreeeeaaaatttteeee _2._1._5 _W_h_e_n _T_a_k_i_n_g _a _C_l_u_s_t_e_r _M_e_m_b_e_r _t_o _S_i_n_g_l_e-_U_s_e_r _M_o_d_e, _F_i_r_s_t _H_a_l_t _t_h_e _M_e_m_b_e_r To take a cluster member from multiuser mode to single-user mode, first halt the member and then boot it to single-user mode. For example: # sssshhhhuuuuttttddddoooowwwwnnnn ----hhhh nnnnoooowwww >>> bbbbooooooootttt ----ffffllll ssss Halting and booting the system ensures that it provides the minimal set of services to the cluster and that the running cluster has a minimal reliance on the member running in single-user mode. When the system reaches single-user mode, run the following commands: # ////ssssbbbbiiiinnnn////iiiinnnniiiitttt ssss # ////ssssbbbbiiiinnnn////bbbbcccchhhheeeecccckkkkrrrrcccc # ////uuuussssrrrr////ssssbbbbiiiinnnn////llllmmmmffff rrrreeeesssseeeetttt _2._1._6 _P_r_o_b_l_e_m_s _w_i_t_h _c_l_u__u_p_g_r_a_d_e _s_w_i_t_c_h _S_t_a_g_e If the cccclllluuuu____uuuuppppggggrrrraaaaddddeeee sssswwwwiiiittttcccchhhh stage does not complete successfully, you may see a message like the following: versw: No switch due to inconsistent versions The problem can be due to one or more members running ggggeeeennnnvvvvmmmmuuuunnnniiiixxxx, a generic kernel. Use the command cccclllluuuu____ggggeeeetttt____iiiinnnnffffoooo ----ffffuuuullllllll and note each member's version number, as reported in the line beginning TruCluster Patches 2-7 Member base O/S version If a member has a version number different from that of the other members, shut down the member and reboot it from vvvvmmmmuuuunnnniiiixxxx, the custom kernel. If multiple members have the different version numbers, reboot them one at a time from vvvvmmmmuuuunnnniiiixxxx. _2._2 _S_u_m_m_a_r_y _o_f _T_r_u_C_l_u_s_t_e_r _S_o_f_t_w_a_r_e _P_a_t_c_h_e_s This section provides brief descriptions of the patches in Patch Kit 1 for the TruCluster Server software products. ___________________________________________________________________________ NNNNuuuummmmbbbbeeeerrrr:::: Patch 2.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Fix for aliasd daemon SSSSttttaaaatttteeee:::: New Modifies the aliasd daemon to include interface aliases when determining whether or not an interface is appropriate for use as the ARP address for a cluster alias when selecting the proxy ARP master. NNNNuuuummmmbbbbeeeerrrr:::: Patch 5.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Fix for initialization of Memory Channel driver SSSSttttaaaatttteeee:::: New This patch: Fixes a regression for single physical rail Memory Channel configurations, and cleans up stale data left on an offline physical rail by the Memory Channel driver. Fixes issues associated with the initialization of the Memory Channel driver. NNNNuuuummmmbbbbeeeerrrr:::: Patch 7.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Fixes an issue with ICS on NUMA-based systems SSSSttttaaaatttteeee:::: New This patch fixes an issue with ICS (Internode Communication Services) on a NUMA-based system in a cluster. 2-8 TruCluster Patches NNNNuuuummmmbbbbeeeerrrr:::: Patch 14.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Cluster specific fix for mounting cluster root domain SSSSttttaaaatttteeee:::: New This patch enables a cluster to boot even if the cluster root domain devices are private to different cluster members. Although this is not a recommended configuration, it should not result in an unbootable cluster. Currently, this is with respect to cluster root domains not under LSM control. NNNNuuuummmmbbbbeeeerrrr:::: Patch 17.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Fixes memory leak in cluster alias subsystem SSSSttttaaaatttteeee:::: Supersedes Patch 15.00 This patch: Fixes a problem in which cluster alias connections are not distributed among cluster members according to the defined selection weight. Fixes a memory leak in the cluster alias subsystem. NNNNuuuummmmbbbbeeeerrrr:::: Patch 19.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Fix for Oracle startup failure SSSSttttaaaatttteeee:::: New This patch fixes a problem in one of the shipped rc scripts whereby Oracle fails during startup on a clustered system. TruCluster Patches 2-9 NNNNuuuummmmbbbbeeeerrrr:::: Patch 22.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Fixes panic seen on LAN cluster running under load SSSSttttaaaatttteeee:::: Supersedes Patch 20.00 This patch: Corrects a problem involving discarded UDP datagrams that do not come from the correct port. Corrects a problem in which a panic displaying the message "error CNX MGR: cnx_comm_error: invalid node state" occurs on a LAN cluster running under load when other members are rebooting. NNNNuuuummmmbbbbeeeerrrr:::: Patch 26.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Problems with LSM disks and cluster quorum tool SSSSttttaaaatttteeee:::: New This patch corrects problems with LSM disks and the cluster quorum tools. When a member having LSM disks local to it is down, the quorum tools fail to update quorum. This causes other cluster commands to fail. NNNNuuuummmmbbbbeeeerrrr:::: Patch 33.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Fix for CAA daemon SSSSttttaaaatttteeee:::: New This patch: Addresses an error "caa_register -u" produces with no balance data. Corrects a problem with resource inaccessibility if the hosting member crashes during a remote caa_stop operation. 2-10 TruCluster Patches NNNNuuuummmmbbbbeeeerrrr:::: Patch 35.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Fix for cluster alias manager SUITlet SSSSttttaaaatttteeee:::: New This patch fixes a problem that causes the cluster alias manager SUITlet to falsely interpret any cluster alias with virtual={t|f} configured as a virtual alias regardless of its actual setting. NNNNuuuummmmbbbbeeeerrrr:::: Patch 37.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Security (SSRT2265) SSSSttttaaaatttteeee:::: New This patch corrects a potential security vulnerability which, under certain circumstances, could compromise system integrity. NNNNuuuummmmbbbbeeeerrrr:::: Patch 39.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Reliable DataGram kernel thread problem SSSSttttaaaatttteeee:::: New This patch fixes a problem in which an RDG (Reliable DataGram) kernel thread can starve other timeshare threads on a uniprocessor cluster member. In particular, system services such as networking threads can be affected. NNNNuuuummmmbbbbeeeerrrr:::: Patch 43.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Fixes a cluster member hang SSSSttttaaaatttteeee:::: Supersedes Patch 24.00 This patch: Addresses an assertion caused by a bad user pointer passed to the kernel via sys_call. Corrects a condition that causes a node to hang during testing the of Memory Channel cable pulls. A cluster member sometimes hangs when a Memory Channel cable is pulled, the node is taken down, the cable is plugged back in, and the node is rebooted. TruCluster Patches 2-11 NNNNuuuummmmbbbbeeeerrrr:::: Patch 46.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Fixes a cluster deadlock SSSSttttaaaatttteeee:::: Supersedes Patches 8.00, 9.00, 10.00, 12.00, 41.00, 44.00 This patch: Fixes a problem that causes a hang to occur when multiple nodes are shutting down simultaneously. Fixes a problem that causes a Cluster File System panic when using raw Asynchronous I/O. Adds code to assist in problem diagnosis. Relieves pressure on the CMS global DLM lock by allowing AutoFS auto- UNmounts to back off. Updates the attributes on a directory when files are removed by a cluster node that is not the file system server. Fixes a problem of excessive FIDS_LOCK contention that occurs when large number of files are using system-based file locking. Fixes a cluster deadlock that may occur during failover and recovery when direct I/O is in use. Corrects diagnostic code that might result in a panic during kernel boot. Prevents a panic when an AutoFS file system is auto-unmounted. NNNNuuuummmmbbbbeeeerrrr:::: Patch 48.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Fixes a cfsd core dumping problem SSSSttttaaaatttteeee:::: New This patch fixes a problem with a cfsd core dump that can occur shortly after startup if cfsd is enabled then, or if it enabled later, soon after that. The problem requires applying a dsfmgr patch. 2-12 TruCluster Patches NNNNuuuummmmbbbbeeeerrrr:::: Patch 50.00 AAAAbbbbssssttttrrrraaaacccctttt:::: Fixes a regression associated with non-SCSI storage SSSSttttaaaatttteeee:::: Supersedes Patch 27.00, 28.00, 29.00, 31.00 This patch: Fixes a regression associated with non SCSI storage. Improves the responsiveness of EINPROGRESS handling during the issuing of I/O barriers by removing a possible infinite loop scenario that could occur due to the deletion of a storage device. Fixes a problem that causes a panic with the message "CNX MGR: Invalid configuration for cluster seq disk" during simultaneous booting of cluster nodes. Fixes a possible race condition between a SCSI reservation conflict and an I/O drain, which could result in a hang. Alleviates a condition in which a cluster member takes an extremely long time to boot when using LSM. Fixes a problem in the cluster kernel where a cluster member panics while doing remote I/O over the interconnect. Corrects an issue to allow the Device Request Dispatcher, DRD, to retry to get disk attributes when EINPROGRESS is returned from the disk driver. Fixes a problem in which access to the quorum disk can be lost if the quorum disk is on a parallel SCSI bus and multiple bus resets are encountered. ___________________________________________________________________________ TruCluster Patches 2-13