HP Tru64 UNIX and TruCluster Server Version 5.1B-6 Patch Summary and Release Notes
• Prevents a race condition in the code dealing with kernel address space data structures.
• Improves NFS to help prevent an NFS client from creating more than one TCP connection
for a mount point and to prevent a system panic if the problem occurs.
• Fixes a lockmode 4 only panic due to a lock ordering problem.
• Resolves a problem that could result in freeing active memory buffers.
• Prevents the growth of a stack object when code invokes an mmap system call.
• Corrects a kernel memory fault panic clock_tick().
• Fixes the following panics:
page is not primary page
mcs_unlock: current lock not found
• Corrects a memory leak caused by a race condition that can lead to the incorrect decrementing
of reference counts of vm_anon objects, which can cause orphaned pages.
• Fixes an “mcs_lock: lock already owned by cpu” panic.
• Fixes a problem that can trigger a “big pages assert” panic under the following condition:
— Big Pages are enabled.
— Large argument lists are enabled.
— An application such as a shell tries to pass a large list of arguments to a child process,
such as a command.
• Fixes the following panics:
mcs_unlock: lock not currently owned
the zombie walks, the sequel
• Changes I/O retry processing when a command time out is encountered by causing the retry
code to attempt to take advantage of other active paths during retries if command time outs
are encountered.
• Fixes a rare lock timeout on some AlphaServer ES47/ES80/GS1280 systems with heavy binary
errorlog activity.
• Fixes a "vl_unwire: page is not wired" panic when the system is configured with gh_chunks
or rad_gh_regions enabled and new_wire_method = 1.
• Retires the "new_wire_method" sysconfig tunable paramater. See “new_wire_method
Tunable Attribute Retired”.
• Corrects a potential security vulnerability in the Transmission Control Protocol (TCP) that
could be remotely exploitable, resulting in denial of service (DoS).
SSRT4696 - TCP (Severity - High)
• Corrects a potential security vulnerability that could result in a Denial of Service (DoS). This
potential vulnerability may be in the form of local and remote security domain risks.
• Fixes a panic in ubc_bigpage_release().
• Fixes a problem that causes the audgen system call to overwrite memory beyond the end
of the audit buffer.
Patch 27011.00
OSFBINCOM540
• Fixes a rare kernel memory fault problem that occurs during an ES80 boot.
• Provides a new cluster-specific link aggregation distribution algorithm when using LAG in
a LAN cluster.
• Allows for control ports to be deleted using the hwmgr command.
• Fixes a potential deadlock hang between a migration and a flush on a file.
• Addresses a potential I/O performance bottleneck in which the tape driver may select the
same path for all tape drives in a system containing multiple HBAs and multiple tapes. The
Summary of Base Operating System Patches 103