HP Tru64 UNIX and TruCluster Server Version 5.1.B-4 Patch Summary and Release Notes (13156)

Fixes a problem in which a Tru64 UNIX NFS server panics as a result of receiving illegal file
access mode from an NFS client.
Corrects a rounding error for the vm attribute vm_bigpg_thresh.
Corrects the handling of bad pages when big pages are enabled.
Fixes the cause of "page mapped" panics when using mmap calls with dev/mem to access
free big pages.
Increases the TCP window increased from 96 KB to 500 KB to improve performance.
Causes the netisr thread to dynamically estimate the reply size the socket buffer and
subsequently reserve the space in it.
Adds a new timeout check to notice when data has not been acknowledged in 30-50 seconds
and copy those buffers, thereby allowing the UBC to free up those mbufs and not tie them
up.
Adds support for CPU indictment on the AlphaServer GS1280 platform.
Fixes a problem in which gh_min_seg_size can not be set below 8M.
Fixes a problem with cluster failovers of UFS filesets.
Fixes a panic resulting from race condition in the MFS (memory file system) over CFS (cluster
file system).
Corrects a problem in which an ARP request for a permanent ARP entry is ignored and a
connection cannot be maked from the remote system.
Fixes a high lock contention for str_to_lock, a STREAMS attribute.
Adds a configurable tuning parameter to the STREAMS subsystem for ES47/ES80/GS1280
platforms.
Fixes a flaw in the NFS server that can cause it to crash upon reception of malformed input.
Fixes a kernel memory fault in u_seg_global_destroy.
Corrects a kernel memory fault that can happen when running applications that use the
Cray Intra-Node Shared Memory library.
Prevents a potential process (not system) hang seen when a system comes under heavy
memory load with monolithic memory use. (Gigabyte-scale single objects.)
Prevents a kernel memory fault when running with protection on the 128-byte bucket an
action that should only be undertaken as directed by HP customer support personnel.
Addresses a situation in which a taso-compiled binary is unable to allocate more memory
after performing a series of mmap calls.
Corrects a problem that causes hwmgr to dump core when performing environmental testing
and using hwmgr to verify that a particular sensor's status would change from OK to Fault.
Provides the correct labels to the audit subsystem for mach events.
Fixes a memory management fault and panic in UFS.
Addresses two problems with the NFS server:
— A potential crash during a concurrent read and truncate operation on an AdvFS file.
— A potential crash with malformed or malicious READDIR[PLUS] version 3 RPCs.
Improves ufs_invalidate() handling of fractional pages.
Corrects the cause of an "ialloc: dup alloc" panic.
Increases the character limit in file property lists from 245 to 255.
Improves I/O performance by reducing kernel locking overhead.
Addresses system problems that can occur when the system is under heavy I/O load or low
memory conditions.
Provides protection against a class of potential security vulnerabilities called buffer overflows.
Buffer overflows are sometimes exploited in an attempt to subvert the function of a privileged
program and possibly execute commands at the elevated privileges if the program file has
the setuid privilege. This patch allows a system administrator to enable memory management
protections that limit potential buffer overflow vulnerabilities.
3.4 Summary of Base Operating System Patches 93