HP Tru64 UNIX and TruCluster Server Version 5.1.B-4 Patch Summary and Release Notes (13156)
• Fixes a problem in which a Tru64 UNIX NFS server panics as a result of receiving illegal file
access mode from an NFS client.
• Corrects a rounding error for the vm attribute vm_bigpg_thresh.
• Corrects the handling of bad pages when big pages are enabled.
• Fixes the cause of "page mapped" panics when using mmap calls with dev/mem to access
free big pages.
• Increases the TCP window increased from 96 KB to 500 KB to improve performance.
• Causes the netisr thread to dynamically estimate the reply size the socket buffer and
subsequently reserve the space in it.
• Adds a new timeout check to notice when data has not been acknowledged in 30-50 seconds
and copy those buffers, thereby allowing the UBC to free up those mbufs and not tie them
up.
• Adds support for CPU indictment on the AlphaServer GS1280 platform.
• Fixes a problem in which gh_min_seg_size can not be set below 8M.
• Fixes a problem with cluster failovers of UFS filesets.
• Fixes a panic resulting from race condition in the MFS (memory file system) over CFS (cluster
file system).
• Corrects a problem in which an ARP request for a permanent ARP entry is ignored and a
connection cannot be maked from the remote system.
• Fixes a high lock contention for str_to_lock, a STREAMS attribute.
• Adds a configurable tuning parameter to the STREAMS subsystem for ES47/ES80/GS1280
platforms.
• Fixes a flaw in the NFS server that can cause it to crash upon reception of malformed input.
• Fixes a kernel memory fault in u_seg_global_destroy.
• Corrects a kernel memory fault that can happen when running applications that use the
Cray Intra-Node Shared Memory library.
• Prevents a potential process (not system) hang seen when a system comes under heavy
memory load with monolithic memory use. (Gigabyte-scale single objects.)
• Prevents a kernel memory fault when running with protection on the 128-byte bucket — an
action that should only be undertaken as directed by HP customer support personnel.
• Addresses a situation in which a taso-compiled binary is unable to allocate more memory
after performing a series of mmap calls.
• Corrects a problem that causes hwmgr to dump core when performing environmental testing
and using hwmgr to verify that a particular sensor's status would change from OK to Fault.
• Provides the correct labels to the audit subsystem for mach events.
• Fixes a memory management fault and panic in UFS.
• Addresses two problems with the NFS server:
— A potential crash during a concurrent read and truncate operation on an AdvFS file.
— A potential crash with malformed or malicious READDIR[PLUS] version 3 RPCs.
• Improves ufs_invalidate() handling of fractional pages.
• Corrects the cause of an "ialloc: dup alloc" panic.
• Increases the character limit in file property lists from 245 to 255.
• Improves I/O performance by reducing kernel locking overhead.
• Addresses system problems that can occur when the system is under heavy I/O load or low
memory conditions.
• Provides protection against a class of potential security vulnerabilities called buffer overflows.
Buffer overflows are sometimes exploited in an attempt to subvert the function of a privileged
program and possibly execute commands at the elevated privileges if the program file has
the setuid privilege. This patch allows a system administrator to enable memory management
protections that limit potential buffer overflow vulnerabilities.
3.4 Summary of Base Operating System Patches 93