TECHNICAL INFORMATION DOCUMENT TITLE: PTF192 - Pullupmsg Patch DOCUMENT ID: TID300132 DOCUMENT REVISION: C DATE: 25JAN95 ALERT STATUS: Yellow INFORMATION TYPE: Symptom Solution README FOR: PTF192 PRODUCT and VERSION: UnixWare 1.1 ABSTRACT: This file contains UnixWare PTF192 - Pullupmesg Patch. This patch corrects an error in the pullupmsg() routine which can result in corrupted messages. This PTF should be installed on all UnixWare 1.1.2 systems. SYMPTOM The most commonly observed symptom of the problem is corrupted NFS files. System panics have also been encountered. The latest 3C5x9 (el3) driver is known to expose the problem, since it dupb()'s message blocks at interrupt level. SOLUTION Apply the ptf192 file. Installation Instructions: DATATYPE: datastream 1. Download the ptf192.Z and ptf192.txt files to the /tmp directory on your machine. 2. Read the release notes contained in this file and follow the instuctions to add the packages to your system. 3. Now become root, uncompress the file and add the package to your system using the following commands: $ su # uncompress /tmp/ptf192.Z # pkgadd -d /tmp/ptf192 ptf192 Solution Specifics General Description. ------------------- This PTF corrects a recently-discovered error in the pullupmsg() routine. The error is that pullupmsg() does not raise the system priority level early enough in its processing, leaving a window in which an interrupt-level routine can dupb() an message block which pullupmsg is currently manipulating, resulting in corrupted messages. The corrupted messages produce various symptoms, including NFS file corruption and system panics. New Features. ------------ None Software Notes and Recommendations. ---------------------------------- This PTF should be installed on all UnixWare 1.1.2 systems. Hardware Notes and Recommendations. ---------------------------------- This PTF is targeted for the i386 and i486 CPU's. Installation Instructions. ------------------------- This PTF consists of 1 3.5 inch floppy. Insert the floppy into the drive and, while logged in as root, type pkgadd -d diskette1 and follow the instructions output by pkgadd.