HP-UX 11i June 2002 Release Notes
Compatibility
Known Compatibility Exceptions from HP-UX 11.0 to 11i
Chapter 14
244
• Support Tools Manager User Interface, EMS Hardware Monitors
This change improves the usability for the STM User Interface and the EMS
Hardware Monitors. As a result, any script that depends on the specific output of the
EMS Hardware Monitors or specific commands or displays in the STM User
Interface may have to be modified. See “HP-UX Support Tools: STM, ODE, & EMS
Hardware Monitors” on page 95 for more information.
• System V Message Queues Expanded Beyond 64KB Limit
This change alters the message queue data structures to support queues larger than
64KB. Consequently, if one application is built to use the larger queues, all related
applications that use the same message queue must also be built to use the larger
queues. See “System-V IPC Message Queue Enhancement” on page 189 for more
information.
Networking, Internet Services, and Security
• EISA Interface Cards
Although EISA interface cards are supported on 32-bit operating systems, they are
not supported on 64-bit systems. For further details, see “EISA Interface Cards Are
Not 64-bit Compatible” on page 148.
• IPv6 IPsec
This change allows support for a contemporary standard. The values for the
following defines were changed to support standards:
— IPPROTO_ENCAP
— IPPROTO_IPIP
• Non-Executable Stack
This change improves system security. The majority of your programs should be
unaffected by execute-protecting program stacks. Only those that execute
instructions from their stack (typically interpreters, simulators and debuggers) are
affected.
When enabled, the new functionality causes the termination of any program
attempting to execute code located on its stack. If this occurs, you will be given an
error message pointing to relevant documentation that explains the reason for the
process termination and how to remedy the situation.
See “Execute Protected Stacks” on page 228 for more information.
• NFS Mount Access Control
This change is necessary to conform to de facto industry behavior. The behavior of
access= has been modified to conform to a common behavior. If you are using this
undocumented feature to disallow the NFS mounts, it will now succeed.
NOTE Applications that use undocumented features are not “well behaved.”