SEARCH CONTACT US SUPPORT SERVICES PRODUCTS STORE
United States    
COMPAQ STORE | PRODUCTS | SERVICES | SUPPORT | CONTACT US | SEARCH
gears
compaq support options
support home
software & drivers
ask Compaq
reference library
support forum
frequently asked questions
support tools
warranty information
service centers
contact support
product resources
parts for your system
give us feedback
associated links
.
} what's new
.
} contract access
.
} browse patch tree
.
} search patches
.
} join mailing list
.
} feedback
.
patches by topic
.
} DOS
.
} OpenVMS
.
} Security
.
} Tru64 Unix
.
} Ultrix 32
.
} Windows
.
} Windows NT
.
connection tools
.
} nameserver lookup
.
} traceroute
.
} ping
OpenVMS VMS721_SYS-V0900 Alpha V7.2-1 System ECO Summary

TITLE: OpenVMS VMS721_SYS-V0900 Alpha V7.2-1 System ECO Summary New Kit Date : 13-FEB-2001 Modification Date: Not Applicable Modification Type: Updated Kit Supersedes VMS721_SYS-V0800 NOTE: An OpenVMS saveset or PCSI installation file is stored on the Internet in a self-expanding compressed file. For OpenVMS savesets, the name of the compressed saveset file will be kit_name.a-dcx_vaxexe for OpenVMS VAX or kit_name.a-dcx_axpexe for OpenVMS Alpha. Once the OpenVMS saveset is copied to your system, expand the compressed saveset by typing RUN kitname.dcx_vaxexe or kitname.dcx_alpexe. For PCSI files, once the PCSI file is copied to your system, rename the PCSI file to kitname-dcx_axpexe.pcsi, then it can be expanded by typing RUN kitname-dcx_axpexe.pcsi. The resultant file will be the PCSI installation file which can be used to install the ECO. Copyright (c) Compaq Computer Corporation 1999, 2000. All rights reserved. OP/SYS: OpenVMS Alpha COMPONENTS: [SYS$LDR]EXCEPTION.EXE [SYS$LDR]EXCEPTION_MON.EXE [SYS$LDR]LOCKING.EXE [SYS$LDR]IO_ROUTINES.EXE [SYS$LDR]IO_ROUTINES_MON.EXE [SYS$LDR]MULTIPATH.EXE [SYS$LDR]MULTIPATH_MON.EXE [SYS$LDR]LOGICAL_NAMES.EXE [SYS$LDR]PROCESS_MANAGEMENT.EXE [SYS$LDR]PROCESS_MANAGEMENT_MON.EXE [SYS$LDR]SECURITY.EXE [SYS$LDR]SECURITY_MON.EXE SOURCE: Compaq Computer Corporation ECO INFORMATION: ECO Kit Name: VMS721_SYS-V0900 DEC-AXPVMS-VMS721_SYS-V0900--4.PCSI ECO Kits Superseded by This ECO Kit: VMS721_SYS-V0800 VMS721_SYS-V0700 VMS721_SYS-V0600 VMS721_SYS-V0500 VMS721_SYS-V0400 VMS721_SYS-V0300 VMS721_SYS-V0200 VMS721_SYS-V0100 ECO Kit Approximate Size: 17,184 Blocks Kit Applies To: OpenVMS Alpha V7.2-1 System/Cluster Reboot Necessary: Yes Rolling Re-boot Supported: Yes Installation Rating: INSTALL_1 - To be installed on all systems running the listed version(s) of OpenVMS. Kit Dependencies: The following remedial kit(s) must be installed BEFORE installation of this kit: VMS721_PCSI-V0100 VMS721_UPDATE-V0100 In order to receive all the corrections listed in this kit, the following remedial kits should also be installed: None ECO KIT SUMMARY: An ECO kit exists for System components on OpenVMS Alpha V7.2-1. This kit addresses the following problems: PROBLEMS ADDRESSED IN VMS721_SYS-V0900 KIT o Revert back to the original OpenVMS soft affinity algorithm because the new algorithm will not function properly on the SCC hardware. Images Affected: [SYS$LDR]PROCESS_MANAGEMENT.EXE [SYS$LDR]PROCESS_MANAGEMENT_MON.EXE [SYS$LDR]SYS$BASE_IMAGE.EXE [SYSEXE]SYSBOOT.EXE [SYSEXE]SYSGEN.EXE [SYSEXE]SYSMAN.EXE [SYSEXE]SMISERVER.EXE o A system could crash with a CPUSPINWAIT bugcheck waiting for the POOL spinlock. This occurs when the primary CPU, which holds the Pool spinlock, is executing the routine EXE$TRIM_LISTS and a second CPU attempts to get the Pool spinlock; the second CPU causes the crash when it times out. Further, SHOW MEM/POOL/FULL will indicate that there are thousands of blocks in the variable list. This crash will happen only if either the SYSGEN parameter NPAG_GENTLE or NPAG_AGGRESSIVE is set to a number smaller than 100 (the default case). Images Affected: [SYS$LDR]SYSTEM_PRIMITIVES.EXE [SYS$LDR]SYSTEM_PRIMITIVES_MON.EXE o The effect of a SET SECURITY/OBJECT=DEVICE command can be propagated to the wrong device(s) in a cluster for MK, DK, and DG devices. Images Affected: [SYSLIB]IOGEN$SHARE.EXE [SYS$LDR]SYS$BASE_IMAGE.EXE [SYS$LDR]IO_ROUTINES.EXE [SYS$LDR]IO_ROUTINES_MON.EXE o The system crashes with a DELCONPFN bugcheck in MMG$DEL_CONTENTS_PFN8. The crash occurs during process rundown. See highlights of the crash summary below: Crashdump Summary Information: ------------------------------ Bugcheck Type: DELCONPFN, Fatal error in delete contents of PFN Current Process: Current Image: Failing PC: FFFFFFFF.80067764 MMG$DEL_CONTENTS_PFN_C+00204 Failing PS: 38000000.00000800 Module: SYSTEM_PRIMITIVES_MIN (Link Date/Time: 28-MAY-1999 23:29:3 2.00) Offset: 00031764 Images Affected: [SYS$LDR]SYS$VM.EXE o A system can crash with a KRNLSTACKNV bugcheck during heavy I/O activity, such as BACKUP. Forcing the stack out shows interaction between SYS$DKDRIVER and IO_ROUTINES filling up the KPB stack, usually with some interrupt topping off the stack. Images Affected: [SYS$LDR]IO_ROUTINES.EXE [SYS$LDR]IO_ROUTINES_MON.EXE o The AST code for image rundown incorrectly deletes sKASTs when searching the AST queues for AST addresses in the P0 and P2 space. The causes the system to hang in a LEF state because a request sKAST is dismissed without execution. Images Affected: [SYS$LDR]IMAGE_MANAGEMENT.EXE o Disks with page or swap files installed do not get dismounted during a system shutdown. Images Affected: [SYSEXE]OPCCRASH.EXE [SYS$LDR]IO_ROUTINES.EXE [SYS$LDR]IO_ROUTINES_MON.EXE [SYS$LDR]SYS$VM.EXE o On Single CPU systems, the CPU runs two processes in the current state, which results in an INCON_SCHED, 'Inconsistent scheduling' bugcheck. See highlights from the dump summary below: Crashdump Summary Information: Bugcheck Type: INVEXCEPTN, Exception while above ASTDEL Current Process: BROKER Current Image: DSA360:[BROKER_U.AXP.][P] BROKER_EDITOR_U.EXE;85 Failing PC: FFFFFFFF.800C3B98 SCH$QEND_C+00038 Failing PS: 10000000.00000704 Module: PROCESS_MANAGEMENT (Link Date/Time: 29-DEC-1999 04:09:20.9 Offset: 00007B98 Images Affected: [SYS$LDR]SYS$VM.EXE o An INVEXCEPTN bugcheck occurs at SCH$QEND_C+38 while getting the address of the process alignment fault reporting information, CTL$GL_REPORT_USER_FAULTS. See highlights from the Crashdump summary information below: Crashdump Summary Information: Bugcheck Type: INVEXCEPTN, Exception while above ASTDEL Current Process: BROKER Current Image: DSA360:[BROKER_U.AXP.][P]BROKER_EDITOR_U.EXE;85 Failing PC: FFFFFFFF.800C3B98 SCH$QEND_C+00038 Failing PS: 10000000.00000704 Module: PROCESS_MANAGEMENT (Link Date/Time: 29-DEC-1999 Images Affected: [SYS$LDR]SYS$VM.EXE o A multi-threaded process hangs with all threads suspended except one that is spinning in a loop using CPU time. Images Affected: [SYSLIB]SYS$SSISHR.EXE Problems Addressed in VMS721_SYS-V0800: o In the VMS721_SYS-V0700 kit, the SDA$SHARE image was placed in the [SYSEXE] directory. It should be placed in the [SYSLIB] directory. Images Affected: [SYSLIB]SDA$SHARE.EXE Problems Addressed in VMS721_SYS-V0700: o The system can crash with an INCONSTATE bugcheck in CACHE$MOUNT. This occurs when a process, usually RAID$SERVER, is attempting to mount a disk, usually a member of a Raid set. It appears as if the volume is being mounted twice and the INCONSTATE bugcheck occurs. Images Affected: [SYS$LDR]SYS$VCC.EXE o An INCONSTATE bugcheck can occur during a RAID unbind operation. Images Affected: [SYS$LDR]SYS$VCC.EXE o A BLKASTCNT crash occurred with Pathworks enqueuing many locks, all with blocking ASTs (asynchronous system traps). The crash occurred when one of the locks was dequeued. Images Affected: [SYS$LDR]LOCKING.EXE o The code to verify that a page can be deleted from a process' virtual address space was too restrictive. If a page had an elevated reference count, and the process had direct I/O out-tanding, VMS would not allow deletion of the page. This could occur in the following instances: - If the reference count is only 1 (2 for an active global page). - If the page is a buffer object page. - If the page does not belong to a buffer object for the process. - If the page is owned by a privileged mode (exec or kernel) and can only be accessed from privileged mode. RMS is now using "system buffer objects" for files with global buffers. This causes RMS to hang when it attempts to close such a file if the process has direct I/O outstanding. Some processes, like MULTINET can have direct I/Os and can be outstanding for a long time. This ECO enables the deletion of a page from a process' virtual address space even though the page reference count is elevated. Images Affected: - [SYS$LDR]SYS$VM.EXE - [SYS$LDR]SYS$VM.STB o Restructure $GETJPI inter-process PSB references. + a $SHOW SYSTEM/FULL" command displays the UIC of all processes (except interactive process) as [0,0]. $GETJPI shows the correct UIC's except swapper. + A system can crash with a SSRVEXCEPT bugcheck in module PROCESS_MANAGEMENT_MON (SYSTEM_CHECK=1) at offset 0000F4B4. Images Affected: - [SYS$LDR]PROCESS_MANAGEMENT.EXE - [SYS$LDR]PROCESS_MANAGEMEN_MON.EXE Problems Addressed in VMS721_SYS-V0600: o A System can crash with a KRNLSTAKNV, 'Kernel stack not valid', error. Images Affected: - [SYS$LDR]PROCESS_MANAGEMENT.EXE - [SYS$LDR]PROCESS_MANAGEMENT_MON.EXE o Unnecessary and unwanted path switches can occur on multipath devices. Under certain circumstances, if a user executes a manual path switch of one member of a shadow set, the requested path switch takes place. However, the other member(s) of the shadow set switch paths as well. Further, if the user attempts to switch the other member(s) back, the other memebers will switch, but the originally switched member will then switch back to the unwanted path. Another symptom of this problem is that a transient error condition on a multipath device can cause a path switch, even though the current path is still valid. This problem can occur if a multipath disk device is simultaneously online, i.e., connected, on more than one path. This configuration is created: + If two Fibre Channel cables are attached to the two host FibreChannel ports on an HSG80 controller. + If two or more FibreChannel host bus adapters on the same OpenVMS host system connect to the same fabric, i.e., the same FibreChannel switch or into a set of cascaded switches. + If two parallel SCSI buses are connected to the two host ports on an HSZ80 controller. Images Affected: [SYS$LDR]MULTIPATH_MON.EXE o A cross process $GETJPI request for security profile (persona) information, which includes network privileges and rights, can lead to a SSRVEXCEPT system crash. See crashdump summary below: ========================CRASH DUMP INFORMATION========================= XENON1> **** OpenVMS (TM) Alpha Operating System X6ZG-FT1 - BUGCHECK **** ** Bugcheck code = 000003C4: SSRVEXCEPT, Unexpected system service exception ** Crash CPU: 00 Primary CPU: 00 Active CPUs: 00000003 ** Current Process = NETACP ** Current PSB ID = 00000001 ** Image Name = $2$DKA100:[SYS0.SYSCOMMON.][SYSEXE]NETACP.EXE;1 **** Starting compressed selective memory dump at 20-MAR-2000 15:39... ...................................................................... ..................... ...Complete **** halted CPU 0 halt code = 5 HALT instruction executed PC = ffffffff800acae4 Crashdump Summary Information: ------------------------------ Crash Time: 20-MAR-2000 15:39:49.18 Bugcheck Type: SSRVEXCEPT, Unexpected system service exception Node: XENON1 (Cluster) CPU Type: COMPAQ AlphaServer DS20E 500 MHz VMS Version: X6ZG-FT1 Current Process: NETACP Current Image: $2$DKA100:[SYS0.SYSCOMMON.][SYSEXE]NETACP.EXE;1 Failing PC: FFFFFFFF.8011657C EXE_STD$CHECK_IMAGE_NAME_C+0033C Failing PS: 00000000.00000000 Module: PROCESS_MANAGEMENT_MON (Link Date/Time: 13-MAR-2000 13:54: 01.61) Offset: 0001057C Boot Time: 17-MAR-2000 12:28:35.00 System Uptime: 3 03:11:14.18 Crash/Primary CPU: 00/00 System/CPU Type: 2208 Saved Processes: 29 Pagesize: 8 KByte (8192 bytes) Physical Memory: 512 MByte (65536 PFNs, contiguous memory) Dumpfile Pagelets: 105419 blocks Dump Flags: olddump,writecomp,errlogcomp,dump_style Dump Type: compressed,selective,shared_mem EXE$GL_FLAGS: poolpging,init,bugdump Paging Files: 1 Pagefile and 0 Swapfiles installed Images Affected: - [SYS$LDR]PROCESS_MANAGEMENT.EXE - [SYS$LDR]PROCESS_MANAGEMENT_MON.EXE o A REPLY/USER= and/or SUBMIT/NOTIFY command crashes the system with a SSRVEXCEPT in the cluster system process (CSP). See the crashdump summary below: Crashdump Summary Information: ------------------------------ Crash Time: 17-APR-2000 11:15:38.40 Bugcheck Type: SSRVEXCEPT, Unexpected system service exception Node: COBRA3 (Cluster) CPU Type: DEC 4000 Model 620 VMS Version: X706-FT1 Current Process: CLUSTER_SERVER Current Image: DSA2:[SYS0.SYSCOMMON.][SYSEXE]CSP.EXE;2 Failing PC: FFFFFFFF.80137920 CHECKITEM_C+00AC0 Failing PS: 0C000000.00000200 Module: PROCESS_MANAGEMENT_MON (Link Date/Time: 9-APR-2000 04:37: 48.31) Offset: 00037920 ******************************************** Images Affected: - [SYS$LDR]IO_ROUTINES.EXE - [SYS$LDR]IO_ROUTINES_MON.EXE o A non-privileged user can access jobs in a batch queue, regardless of the queue protections. See the comparative examples below: $ show queue/full/all unhf_sys$batch ! from privileged account Batch queue UNHF_SYS$BATCH, idle, on UNHF:: /BASE_PRIORITY=3 /CPUMAXIMUM=00:30:00 /JOB_LIMIT=3 /OWNER=[SYSTEM] /PROTECTION=(S:M,O:D,G,W:RS) /WSEXTENT=32768 /WSQUOTA=16384 (IDENTIFIER=[SIS_DEVEL,BANNER_SCT],ACCESS=READ+SUBMIT+MANAGE) Entry Jobname Username Status ----- ------- -------- ------ 2719 DUMMY B_JOHNSTONE Holding Submitted 1-APR-2000 09:16:27.00 /KEEP /LOG=$1$DUA233:[B_JOHNSTONE].LOG; /NOTIFY /NOPRINT /PRIORITY=100 /RESTART=UNHF_SYS$BATCH File: _$1$DUA321:[B_JOHNSTONE.COM]DUMMY.COM;10 3182 DUMMY B_JOHNSTONE Holding Submitted 1-APR-2000 14:15:28.41 /KEEP /LOG=$1$DUA233:[B_JOHNSTONE].LOG; /NOPRINT /PRIORITY=100 /RESTART=UNHF_SYS$BATCH File: _$1$DUA321:[B_JOHNSTONE.COM]DUMMY.COM;10 $show queue/full/all unhf_sys$batch !from non-privileged account Batch queue UNHF_SYS$BATCH, idle, on UNHF:: /BASE_PRIORITY=3 /CPUMAXIMUM=00:30:00 /JOB_LIMIT=3 /OWNER=[SYSTEM] /PROTECTION=(S:M,O:D,G,W:RS) /WSEXTENT=32768 /WSQUOTA=16384 (IDENTIFIER=[SIS_DEVEL,BANNER_SCT],ACCESS=READ+SUBMIT+MANAGE) Entry Jobname Username Status ----- ------- -------- ------ 2719 no privilege Holding 3182 DUMMY B_JOHNSTONE Holding Submitted 1-APR-2000 14:15:28.41 /KEEP /LOG=$1$DUA233:[B_JOHNSTONE].LOG; /NOPRINT /PRIORITY=100 /RESTART=UNHF_SYS$BATCH File: _$1$DUA321:[B_JOHNSTONE.COM]DUMMY.COM;10 $ In this example, the user can see entry 3182, as well as security information, but cannot see entry 2719. This also generates the following security alarm: %%%%%%%%%%% OPCOM 1-APR-2000 15:38:36.66 %%%%%%%%%%% (from node UNHA at 1-APR-2000 15:38:36.67) Message from user AUDIT$SERVER on UNHA Security alarm (SECURITY) on UNHA, system id: 1028 Auditable event: Object access Event time: 1-APR-2000 15:38:36.65 PID: 2040C464 Source PID: 21012416 Username: R_KENNEY$ Process owner: [R_KENNEY$] Object class name: QUEUE Object name: UNHF_SYS$BATCH Object owner: [0,0] Object protection: SYSTEM:M, OWNER:D, GROUP:, WORLD:RS Access requested: READ Status: %SYSTEM-F-NOPRIV, insufficient privilege or object protection violation Images Affected: - [SYS$LDR]SECURITY.EXE - [SYS$LDR]SECURITY_MON.EXE o A batch process can abort with SS$_IVCHNLSEC during image activation. The batch process aborts with the following error: %RDB-E-UNAVAILABLE, Oracle Rdb is not available on yoursystem -RDB-I-TEXT, Error activating image DSA0:[SYS1.SYSCOMMON.][SYSLIB] RDMPRV.EXE, Invalid channel for create and map section Images Affected: [SYS$LDR]SYS$VM.EXE o A problem with the $TRNLNM code path for INTERLOCKED translations can cause the service to exit without releasing the logical name mutex. If the $TRNLNM request or any subsequent kernel mode system service request made by that process exits with an error status, the system will crash with a MTXCNTNZ bugcheck. If no kernel mode system service request made by that process exits with an error status, the system will eventually hang, with some processes in MUTEX wait trying to acquire the logical name mutex. If some of those processes have already acquired other mutexes, such as the I/O database mutex and GSD mutex, there may be other processes in MUTEX wait trying to acquire those mutexes. The $TRNLNM bug is exercised by a fairly unusual combination of circumstances and is more likely to be seen on an SMP system. Images Affected: [SYS$LDR]LOGICAL_NAMES.EXE o If a dump is being written to a DOSD disk and a recursive bugcheck occurs during the processing of a recursive bugcheck, the dump_dev variable is changed after being verified. The change redirected the dump write from the correct DOSD disk to the system disk. (OUTPUT FROM CONSOLE) **** MASTER MEMBER UNIT NUMBER OF SYSTEM DISK SHADOW SET IS 502 **** SEARCHING DEVICES LISTED IN DUMP_DEV FOR A VALID DUMP FILE CHECKING ENTRY #01 IN DUMP_DEV... %%%% MSCP 1 2 0 13 219 EF00 6601095, DUD219.13.0.2.1 ...DUMP_DEV ENTRY #01 IS A VALID DUMP DEVICE %%%% MSCP 0 2 0 10 502 EF00 6601095 DU 4200100AF138 HSL10B, DUA502.10.0.2.0 **** ACCESSING SYSTEM DISK VIA ORIGINAL BOOT PATH Note the change in the mass storage control protocol (MSCP) unit. Images Affected: - [SYSEXE]APB.EXE - [SYSEXE]DEBUG_APB.EXE - [SYS$LDR]EXCEPTION.EXE - [SYS$LDR]EXCEPTION_MON.EXE o Make system buffer objects available for Record Management Services (RMS) locking and make MAXBOBxxx parameters obsolete. Images Affected: - [SYS$LDR]SYS$VM.EXE - [SYS$LDR]SYS$BASE_IMAGE.EXE o Executing POSIX on OpenVMS V7.2 or later will crash the system. Images Affected: - [SYS$LDR]PROCESS_MANAGEMENT.EXE - [SYS$LDR]PROCESS_MANAGEMENT_MON.EXE o The following remote signal handling problems are fixed: + A process exits with a supervisor mode ACCVIO at PC = EXE$REFLECT_C+A30. + A program can exit unexpectedly. + An ACCVIO occurs at EXE$POWERAST_C+F8 when a program is calling kill() or $sigprc() to signal another process. Images Affected: - [SYS$LDR]EXCEPTION.EXE - [SYS$LDR]EXCEPTION_MON.EXE - [SYS$LDR]PROCESS_MANAGENMENT.EXE - [SYS$LDR]PROCESS_MANAGENMENT_MON.EXE - [SYS$LDR]IMAGE_MANAGEMENT.EXE o The incorrect value is calculated in the IEEE handler's e_mult and e_divt routines. See examples of the failing test results below: ******** Test fp_mul_s ******** d1 = 2.350989e-38 (0xffffff) d2 = 5.000000e-01 (0x3f000000) intermediate result = 1.175494e-38 (0x800000) result = -1.175494e-38 (0x80800000) expected result = -0.0 or 0.0 d1 = 2.350989e-38 (0xffffff) d2 = -5.000000e-01 (0xbf000000) intermediate result = -1.175494e-38 (0x80800000) result = 1.175494e-38 (0x800000) expected result = 0.0 ******** Test fp_div_s ******** d1 = 2.350989e-38 (0xffffff) d2 = 2.000000e+00 (0x40000000) intermediate result = 1.175494e-38 (0x800000) result = -1.175494e-38 (0x80800000) expected result = -0.0 or 0.0 Images Affected: [SYS$LDR]EXCEPTION.EXE o Batch jobs take longer to process and hang in the local event flag (LEF) state. AUTOGEN recommends using a higher value for LNM%HASHTBL, which has previously been constrained by a maximum value of 8192. Images Affected: - [SYSEXE]SYSBOOT.EXE - [SYSEXE]SYSGEN.EXE - [SYSEXE]SYSMAN.EXE Problems Addressed in VMS721_SYS-0500: o Provides support for the LP9000 adapter, the next generation of the Emulex FibreChannel adapter. Images Affected: [SYSEXE]SYS$CONFIG.DAT o If a subprocess exists with a different security profile, a call to $DELPRC could stall, leaving the process in RWAST state. Images Affected: - [SYS$LDR]PROCESS_MANAGEMENT.EXE - [SYS$LDR]PROCESS_MANAGEMENT_MON.EXE - [SYS$LDR]PROCESS_MANAGEMENT.STB - [SYS$LDR]PROCESS_MANAGEMENT_MON.STB o After the installation of the VMS72_SYS-V0200 remedial kit, the SET RIGHTS/DISABLE/PROCESS command will not remove the specified right from the process rightslist. Images Affected: - [SYS$LDR]SECURITY.EXE - [SYS$LDR]SECURITY_MON.EXE - [SYS$LDR]SECURITY.STB - [SYS$LDR]SECURITY_MON.STB o The system would crash with an ACCVIO in the exception handling code because a register was not being restored properly. Images Affected: - [SYS$LDR]EXCEPTION.EXE - [SYS$LDR]EXCEPTION_MON.EXE - [SYS$LDR]EXCEPTION.STB - [SYS$LDR]EXCEPTION_MON.STB o After upgrading from V7.1 or V7.1-2 to V7.2 or V7.2-1, some processes may periodically hang in HIBernation state, when they should be awaken. Images Affected: - [SYS$LDR]SECURITY.EXE - [SYS$LDR]SECURITY.STB o Attempting to read from EXEC mode results in an ACCVIO and the deletion of the user's process. Images Affected: - [SYS$LDR]LOCKING.EXE - [SYS$LDR]LOCKING.STB o A file sent to a spooled device could cause the system to crash with a system service exception (SSRVEXCPT). This problem only occurs when SYSTEM_CHECK is set to 1, which causes the IO_ROUTINES_MON.EXE image to be used. This would not occur, if the device was not spooled. Images Affected: - [SYS$LDR]IO_ROUTINES.EXE - [SYS$LDR]IO_ROUTINES_MON.EXE - [SYS$LDR]IO_ROUTINES.STB - [SYS$LDR]IO_ROUTINES_MON.STB o A below normal value rounds up to an in-range value in the ADDT, SUBT, and DIVT routines. Images Affected: - [SYS]EXCEPTION.EXE - [SYS]EXCEPTION_MON.EXE - [SYS]EXCEPTION.STB - [SYS]EXCEPTION_MON.STB o Preserve the sign value, if the result from running an ADDT, SUBT or DIVI routine is a denormal value rather than a zero value, where the sign is always set to positive. Images Affected: - [SYS$LDR]EXCEPTION.EXE - [SYS$LDR]EXCEPTION_MON.EXE - [SYS$LDR]EXCEPTION.STB - [SYS$LDR]EXCEPTION_MON.STB o As a result, I/O monitoring tools, such as MONITOR_DISK/ITEM=QUEUE_LENGT, would report erroneous and increasing values for some multipath devices, even when there was actually no active I/O on the device. Images Affected: - [SYS$LDR]IO_ROUTINES.EXE - [SYS$LDR]IO_ROUTINES[_MON].EXE - [SYS$LDR]MULTIPATH.EXE - [SYS$LDR]MULTIPATH_MON.EXE - [SYS$LDR]IO_ROUTINES.STB - [SYS$LDR]IO_ROUTINES[_MON].STB - [SYS$LDR]MULTIPATH.STB - [SYS$LDR]MULTIPATH_MON.STB o The system crashes with an invalid address in R0 at NSA$AUDIT_EVENT_C+00008. The dump stack will have several entries from logical name support (LNMSUB). Images Affected: - [SYS$LDR]LOGICAL_NAMES.EXE - [SYS$LDR]LOGICAL_NAMES.STB o Convert $ENQ requests may be queued in the wrong order on the conversion queue. Images Affected: - [SYS$LDR]LOCKING.EXE - [SYS$LDR]LOCKING.STB o Documentation states that a process joins the system and default group resource domains when created. At present, the process only joins the system domain. The first $ENQ will result in the process joining the default group domain. Images Affected: - [SYS$LDR]LOCKING.EXE - [SYS$LDR]LOCKING.STB o One of the inputs to the SCH$CHANGE_CUR_PRIORITY routine is the CPU db address. This is the address of the CPU that executes changing the priority of a particular process. On occasion, the input is from a different CPU and the SCH$CHANGE_CUR_PRIORITY routine reads the input incorrectly. Images Affected: - [SYS$LDR]PROCESS_MANAGEMENT.EXE - [SYS$LDR]PROCESS_MANAGEMENT_MON.EXE - [SYS$LDR]PROCESS_MANAGEMENT.STB - [SYS$LDR]PROCESS_MANAGEMENT_MON.STB Problems Addressed in VMS721_SYS-V0400: o VMS721_SYS-V0300 kit did not include all images The VMS721_SYS-V0300 kit did not include all the images necessary to correct the problems. Images Affected: - [SYS$LDR]PROCESS_MANAGEMENT_MON.EXE Problems Addressed in VMS721_SYS-V0300: o Redefining logical name tables may lead to a system crash. Redefining a logical name table, such as LNM$TEMPORARY_MAILBOX, to a process-private logical name table may lead to a system crash if the process also creates a mailbox with a logical name. The crash would typically occur when the CLUSTER_SEVER process was the current process. Images Affected: - [SYS$LDR]LOGICAL_NAMES.EXE Problems Addressed in VMS721_SYS-V0200: o Third party access checks are failing. Third party access checks are failing after all rights are removed and new rights are added using Grant/Revoke_id services. Images Affected: - [SYS$LDR]SECURITY.EXE - [SYS$LDR]SECURITY.STB - [SYS$LDR]SECURITY_MON.EXE - [SYS$LDR]SECURITY_MON.STB o Identifiers are being ignored on user accounts. When granting identifiers to a user, access to a queue that had previously worked was no longer working. This is shown below: $ submit/user=USER1/nolog SYS$SYSDEVICE:[USER1]test/que=USER1$test %SUBMIT-F-CREJOB, error creating job -JBC-E-NOPRIV, insufficient privilege or queue protection violation $ $ uaf grant/id ID1 USER1 %UAF-I-GRANTMSG, identifier ID1 granted to USER1 $ $ submit/user=USER1/nolog SYS$SYSDEVICE:[USER1]test/que=USER1$test Job TEST (queue USER1$TEST, entry 7) started on USER1$TEST $ $ uaf grant/id ID2 USER1 %UAF-I-GRANTMSG, identifier ID2 granted to USER1 $ $ submit/user=USER1/nolog SYS$SYSDEVICE:[USER1]test/que=USER1$test Job TEST (queue USER1$TEST, entry 8) started on USER1$TEST $ $ uaf grant/id ID3 USER1 %UAF-I-GRANTMSG, identifier ID3 granted to USER1 $ $ submit/user=USER1/nolog SYS$SYSDEVICE:[USER1]test/que=USER1$test Job TEST (queue USER1$TEST, entry 9) started on USER1$TEST $ $ uaf grant/id ID4 USER1 %UAF-I-GRANTMSG, identifier ID4 granted to USER1 $ $ submit/user=USER1/nolog SYS$SYSDEVICE:[USER1]test/que=USER1 $test %SUBMIT-F-CREJOB, error creating job -JBC-E-NOPRIV, insufficient privilege or queue protection violation Images Affected: - [SYS$LDR]SECURITY.EXE Problems Addressed in VMS721_SYS-V0100: o Prevent System Crash This fix prevents a system crash on OpenVMS V7.2-1 Images Affected: - [SYS$LDR]PROCESS_MANAGEMENT.EXE - [SYS$LDR]PROCESS_MANAGEMENT_MON.EXE INSTALLATION NOTES: This kit requires a system reboot. Compaq strongly recommends that a reboot is performed immediately after kit installation to avoid system instability If there are other nodes in the OpenVMS cluster, they must also be rebooted in order to make use of the new image(s). If it is not possible or convenient to reboot the entire cluster at this time, a rolling re-boot may be performed. INSTALLATION INSTRUCTIONS: Install this kit with the POLYCENTER Software installation utility by logging into the SYSTEM account, and typing the following at the DCL prompt: PRODUCT INSTALL VMS721_SYS /SOURCE=[location of Kit] The kit location may be a tape drive, CD, or a disk directory that contains the kit. Additional help on installing PCSI kits can be found by typing HELP PRODUCT INSTALL at the system prompt All trademarks are the property of their respective owners.



This patch can be found at any of these sites:

Colorado Site
Georgia Site



Files on this server are as follows:

dec-axpvms-vms721_sys-v0900--4.README
dec-axpvms-vms721_sys-v0900--4.CHKSUM
dec-axpvms-vms721_sys-v0900--4.pcsi-dcx_axpexe
vms721_sys-v0900.CVRLET_TXT

privacy and legal statement