Patch Name: PHKL_14183 Patch Description: s700 10.20 flkmgr,JFS,SCSI,LVM,Netware,ACE 2 bundle patch Creation Date: 98/02/12 Post Date: 98/02/24 Warning: 98/04/03 - This Critical Warning has been issued by HP. -The System hangs under heavy I/O involving VxFS type of filesystems. When the buffer cache virtual space is heavily fragmented and a readhead is being done, the system hangs. -The fix is available from PHKL_14490 or its latest successor which at the time of this writing is PHKL_14568 -The patch should immediately be removed from any depot holding it. Hardware Platforms - OS Releases: s700: 10.20 Products: N/A Filesets: AdvJournalFS.VXFS-ADV-KRN JournalFS.VXFS-BASE-KRN JournalFS.VXFS-PRG LVM.LVM-KRN OS-Core.CORE-KRN OS-Core.KERN-RUN ProgSupport.C-INC Automatic Reboot?: Yes Status: General Superseded With Warnings Critical: No (superseded patches were critical) PHKL_14126: PANIC CORRUPTION PHKL_14049: PANIC PHKL_13911: PANIC PHKL_13768: OTHER Prevents MC/Service Guard TOC on PA8000 systems. PHKL_13452: PANIC PHKL_13305: HANG PHKL_13260: HANG This patch fixes a defect which could essentially hang the systems with VISUALIZE-FX graphics hardware. The patch in addition to this fixes a performance problem seen on systems that use applications with large number of shared memory segments. The systems spend too much time servicing protection id faults. PHKL_13247: ABORT PANIC PHKL_13206: CORRUPTION a clean file on VxFS can be marked bad. PHKL_13155: HANG PHKL_12963: PANIC PHKL_12901: PANIC PHKL_12662: HANG PHKL_12397: PANIC HANG PHKL_12110: PANIC HANG PHKL_12100: CORRUPTION Kernel portion of fix for unrepairable JFS file system where fsck produces the error message "no valid ILIST in fileset 999". PHKL_12088: OTHER Patch REQUIRED for the OmniStorage 2.20 product PHKL_11860: PANIC PHKL_11766: PANIC PHKL_11733: OTHER Unmountable VxFS (JFS) file system. PHKL_11730: PANIC PHKL_11696: PANIC PHKL_11607: PANIC PHKL_11561: CORRUPTION This patch when used with the appropriate SG/DLM version will avoid any potential windows for data corruption during reconfiguration in a HA cluster env. using SG or DLM. PHKL_11519: ABORT PHKL_11408: CORRUPTION PHKL_11406: CORRUPTION PHKL_11358: PANIC PHKL_11321: PANIC PHKL_11238: PANIC So far, the panic only appears on MP systems running the latest Informix release. PHKL_11164: PANIC PHKL_11085: CORRUPTION From a customer perspective, EMC Symmetrix disks can appear to lose or corrupt data when rare spurious errors are reported. The data is actually able to be recovered on the disk, and this patch allows LVM to ignore the fact that the block was once "bad" and obtain the good data from the repaired block. PHKL_11055: HANG PHKL_11039: CORRUPTION This patch fixes data corruption for applications that create large files which keep changing their size dynamically. PHKL_11013: OTHER This problem leaves the file system disabled and unusable, and requires a system reboot to regain access to it. PHKL_10953: HANG PHKL_10932: OTHER HPMC on Emerald-class systems at boot time. PHKL_10930: HANG PHKL_10757: PANIC PHKL_10675: PANIC CORRUPTION PHKL_10643: PANIC PHKL_10554: PANIC The HPMC/panic that is fixed by this patch has been observed only in rare instances on pre-release hardware. However, the potential exists for similar problems in the field only if PHKL_9151 has been applied. This fix should also provide increased performance for PA-8000 systems. PHKL_10452: PANIC PHKL_10288: PANIC PHKL_10257: PANIC PHKL_10234: PANIC PHKL_10199: CORRUPTION PHKL_9931: HANG PHKL_9909: HANG PHKL_9569: HANG PHKL_9517: CORRUPTION PHKL_9372: PANIC PHKL_9370: OTHER Unmountable VxFS (JFS) file system. PHKL_9365: CORRUPTION PHKL_9361: PANIC PHKL_9075: PANIC PHKL_8953: HANG PHKL_8683: PANIC PHKL_8532: CORRUPTION PHKL_8331: CORRUPTION PHKL_8294: HANG PHKL_8203: HANG PHKL_8084: ABORT PHKL_7899: PANIC HANG OTHER The KI instrumentation fix does not fall into any of specified symptoms; the root setuid fix does not either. PHKL_7870: PANIC PHKL_7776: OTHER Unmountable VxFS (JFS) file system. Path Name: /hp-ux_patches/s700/10.X/PHKL_14183 Symptoms: PHKL_14183: This patch is part of the 10.20 ACE 2 bundle which adds networking enhancements to 10.20. New networking features supported in ACE 2 include NFS Version 3.0, AutoFS, and CacheFS. PHKL_14126: This patch fixes two defects : - SR: 4701381608, DTS: DSDe441567 Patch PHKL_13684 introduced a defect that can break applications which use the vnode layer procedure vn_open(). This can result in a panic due to an invalid address or possibly on data corruption. Currently we are only aware of conflicts with Netware. - SR: 1653223404, DTS: DSDe438306 vgchange display couldn't query one physical volume The specified path does not correspond to physical volume attached to this volume group. After issue vgchange with -a y -q n options, system trap panic. PHKL_14049: This patch fixes three problems: a) SR: 1653247486, DTS: JAGaa01357 For a mirrored LVM root disk containing 2**n extents, if the system is booted in maintenance mode (hpux -lm), it will panic with trap 15 data page fault on the next reboot. b) SR: 1653239137, DTS: JAGaa01378 For a root volume group with two disks which are mirror partners, if one disk becomes inaccessible, the system panics on bootup with trap 15 data page fault. c) SR: 1653248690, DTS: JAGaa01406 System panics in lv_end() with isr.ior=0.58 data page fault when a bad block is detected on disk. The console message shows: lv_readvgdats: Could not read VGDA 1 header & trailer from disk H/W path x/x.x.0 (error = 5) lv_readvgdats: Could not read VGDA 2 header & trailer from disk H/W path x/x.x.0 (error = 5) PHKL_14012: This is an enhancement to add the flock manager driver hooks to the kernel. This patch is only needed if you are planning to use the flock manager driver. PHKL_14009: pstat_getlv() returns information about first VG only. PHKL_13911: In a mixed hfs/vxfs environment, the system panics with a dirty invalid buffer which was associated with an hfs fs that has since been unmounted. The typical stack trace of the panic looks like the following: panic+0x14 brelse+0x1ec getnewbuf+0x6b0 ogetblk+0x104 getblk1+0x258 vx_getblk+0x5c PHKL_13874: This patch fixes two problems: a) When running fsadm on a file which was created under JFS version 2, sometimes "Invalid Argument" would be reported b) When running fsadm on a file which was created under JFS version 2, sometimes "No such device or address" would be reported PHKL_13795: This patch is part of the 10.20 ACE 2 bundle which adds networking enhancements to 10.20. New networking features supported in ACE 2 include NFS Version 3.0, AutoFs, and CacheFS. PHKL_13768: Temporary system hang on PA8000 systems, possibly resulting in TOC to preserve system integrity (if running MC/Service Guard). When analysing the system crash dump, a processor would be executing in the kernel routine alloc_large_page(). PHKL_13761: mprotect() system call causes high system time resulting in poor system performance. PHKL_13713: When using chown for certain user IDs, the command would fail. PHKL_13684: In a multi-vendor client-server environment (HP client or HP server), a user-supplied umask is ignored during file creation, even if no default ACL is present. This appears to violate POSIX ACL draft 12. PHKL_13680: 10.xx read/write via block special device file is slower than 9.xx. PHKL_13508: On a heavy fragmented JFS filesystem bdf and df show only small amounts of available space. df furthermore shows a larger percentage number for minfree although this concept is unknown to JFS. All this is ok on a JFS Version 2 fs, but on a Version 3 fs extents smaller than 8k are available for files. PHKL_13452: The user will see a data page fault PANIC with vx_attr_alloc(), vx_attr_indadd(), or vx_attr_iget() at the top of the stack. A sample stack trace might look like: panic+0x10 report_trap_or_int_and_panic+0xe8 trap+0x1054 $RDB_trap_patch+0x20 vx_attr_iget+0x90 vx_iremove_attr+0x358 vx_attr_uset+0x374 vx_do_ioctl+0x73c vx_ioctl+0x38 vno_ioctl+0x98 ioctl+0x444 syscall+0x1a4 PHKL_13305: This problem manifests as a hang during a reboot operation. The reboot can be initiated with a shutdown command. The problem will only appear on a multi-processor machine. I/O in progress during the reboot either from disk or from the network can cause the primary reboot processor to wait for an indefinite amount of time. PHKL_13260: This patch fixes three problems: a) SR: 1653237842, DTS: JAGaa01160 Slow performance with high system time on PA2.0 and PA1.1 systems. The system slows down under user applications with lots of shared memory segments (like Informix database which uses lots of shared memory segments). b) SR: 1653237842, DTS: JAGaa01160 Illegal sharing of protection id's lead to silent data corruption (SHMEM_MAGIC applications) c) SR: 4701373969, DTS: DSDe440766 This defect causes VISUALIZE-FX graphics hardware to lock-up. If the VISUALIZE-FX device is the console for the machine, this will render the machine unusable unless it can be reached over a network (in which case killing and restarting the X server should fix the problem). CTRL-SHIFT-RESET from the console keyboard will not terminate the X server in this case. PHKL_13247: The shared PV LINKS will not switch when needed. The activation of the volume group using vgchange -a s may fail on one of the nodes if the command is being run simultaneously on all the nodes. HPMC or bad pointer panic in FibreChannel driver on ServiceGuard cluster fail-over. Failure to activate volume group (any I/O connect type) on ServiceGuard cluster fail-over. PHKL_13237: If serialize() command is executed as: 'serialize ls', the command fails with the error number set to EINVAL. (User id must be 0, or user belong to a group that has privilege to execute the serialize command). The serialize command should have serialized the target process, in this case the command 'ls', and should have listed the content of the current directory. PHKL_13206: When getdirentries() is incorrectly called with a regular file on VxFS(JFS) file system, following message will be reported and the clean file can be marked bad. "vxfs: mesg 008: vx_direrr - file system inode X block Y error 6" or "vxfs: mesg 017: vx_dirbread - file system inode X marked bad" or "vxfs: mesg 016: vx_ilisterr - file system error reading inode X" PHKL_13155: Processes hang intermittently due to process deactivation and reactivation. PHKL_12997: When dump is configured past 2GB on a device connected to a HSC F/W SCSI interface card, the device fails to configure: WARNING: Dump space on device cannot be configured past 2097151 bytes. Device skipped. PHKL_12963: In the past, a process running in a group could consume more than just its own groups entitlement if excess CPU cycles were available. This change allows this to optionally be disallowed / capped within PRM Also, there was a problem when PRM, thread stealing and processor affinity were used/occurred on a system at the same time. In this case, it was possible for a processor to not find a process, which could cause a panic. PHKL_12901: A kernel stack overflow panic occurs when the stack is valid and all the 3 pages allocated for kernel stack are consumed. The defect is seen when a combination of NFS,LVM,JFS related modules are called. PHKL_12669: This patch contains problems in three areas: 1. There are no warning to user when bad block alternates were allocated inside the user data area. 2. There is no way to use lv timeout feature when the async driver minor number is not 0. 3. Add a new lvol flag in lv_lvsubr.c to support a command patch. PHKL_12662: HFS file system may hang on system reboot. PHKL_12633: SHMEM_MAGIC executables suffer from unacceptable performance greatly impairing its usefulness. PHKL_12601: VxFS systems do not allow a process to ftruncate() a file it has opened, write-locked and read from. When the program fails, errno is set to 11 which means resource is temporarily unavailable. PHKL_12409: Applications relying on alarm() returning a number greater than zero will fail if there was time remaining on the cancelled alarm and were trying to re-schedule the original alarm. alarm() returns "zero" when cancelling a previous alarm() with an alarm pending. PHKL_12397: This patch fixes two defects : - System panic (data page fault) when debugging processes over an interruptable NFS mount point. - After call to pstat_getmsg(), all accesses to the message queue hang. PHKL_12378: Multiprocessor systems running applications that require many files with filenames longer than 14 characters to be accessed will experience severe CPU contention. Netscape Mail server v3.0 with Netscape mail server Benchmark puts this in evidence by reporting a very low message receive/deliver rate. Systems with large buffer cache will have spinlock contention problem. PHKL_12217: The tar command can go into a close loop, backing up the same file over and over on a nfs mounted filesystem. So far this problem has been seen only on nfs filesystems exported from SGI IRIX 6.2 systems. PHKL_12110: System hangs on UP systems or spinlock deadlocks on MP systems, when using nanosleep system call. If using signals which were to be ignored when in nanosleep() we were awaken eventhough we should not. Patch is especially critical as soon as newer libc patches are installed on the system too. The first releases of libc to be critical are PHCO_10384 for 10.10, PHCO_11004 for 10.20 and PHCO_10652 for 10.01. PHKL_12100: kernel part of the fix for the slow fsck problem: command patch PHCO_12922 The following problems are fixed: 1) Under certain circumstances after a hard failure, VxFs fsck log replay would fail requiring a full fsck. 2) On large file systems containing a very large number of files, full fsck would run extremely slowly. PHKL_12088: The DMAPI functionality as delivered with HP-UX 10.20 is not functional. Thus the OmniStorage product, which relies exclusively on this functionality, will not work with the shipped JFS DMAPI software provided with the OnlineJFS product. PHKL_12073: With sa_flags (in sigaction structure) set to SA_SIGINFO, after a child process abnormally terminates without a core file being generated, the si_code number of the siginfo_t structure is supposed to contain CLD_KILLED. This failed to happen when the child process abnormally terminated with a SIGPOLL signal. PHKL_12042: Resource-intensive processes (such as an Informix oninit) either perform poorly over time (as timeshare) or monopolize the system (as realtime). Also, MP systems show processes frequently being moved from one CPU to another. PHKL_11902: pid information is missing from a diagnostic message which tries to explain to a user that their process does not have the correct locking priveleges required for using large text pages. PHKL_11860: The PHKL_9371 installed system panic's during reboot, if reboot command is used. This patch fixes this problem. PHKL_11766: 1. vgextend command will complain "too many links" if user wants to add an addition physical volume to a volume group, and the total physical volume and their links add up to total number of max physical volume allowed in a volume group. 2. trap panic in lv_resyncpv from LVM. lots of "pvnum is POWERFAILED" messages PHKL_11733: After a hard failure (panic/hang/TOC), a JFS file system may not mount and will return the following error message: vxfs mount: %s is not a vxfs file system. This could even happen with patches PHKL_9371 and PHCO_11223 installed. A full fsck does not clean the file system; a newfs/mkfs is the only solution. PHKL_11730: Data page fault in bwrite. PHKL_11696: panic: hdl_alloc_spaceid: spacemap exhausted PHKL_11637: CDROM drive remains locked when system is rebooted. PHKL_11614: Accounting does not work for the clients (diskless) in a cluster. The accounting file does not get updated for users other than ROOT when accounting is ON.(when pacct file is on NFS file system). PHKL_11607: System may panic in vx_itimes() when mounting a JFS file system after a boot from a hard failure. PHKL_11561: A customer might find corrupt data on disk after a Service Guard or Distributed Lock Manager fail-over. This defect is specific to the HA cluster environments. PHKL_11519: On a NFS server with a Vxfs file system exported, the file /var/adm/nettl.LOG0x grows dramatically with the recording of "read failed with errno 22" (EINVAL). This problem is addressed by kernel patch PHKL_11322 among other problems. However, after the patch is installed, some NFS clients experience command coredump on the NFS mounted VxFS disk. PHKL_11471: Quota command shows poor performance on a busy system under JFS. PHKL_11408: Corruption of memory pages on systems with PA-RISC 2.0 cpu. Problem should happen rarely and only under extreme memory stress. PHKL_11406: When using large environments greater than 20 kbytes user applications dump core sometimes, or get bad data. PHKL_11358: A panic would result when trying to rename a vnode which was a UFS mount point under a JFS directory. The reverse did not cause a panic but was not being handled properly either. PHKL_11339: A process launched from shell sees (getrlimit) limits set in the shell via ulimit -t but ignores them. When a process forks, the child sees the limits set by the parent via setrlimit but ignores them PHKL_11321: This patch fixes two JFS performance problems and one defect: 1) Upgrading from 10.10 to 10.20, customer experienced approximately 25% performance degradation in read operation under JFS. 2) Loading a program for a second and subsequent time takes much longer if the program is using shared libraries on JFS. 3) Occasional panic occurs when running an executable which attempts to pagein through vnode level, producing a stack: trap+0xf84 0.0xe21c4 0x6954.0x7ffe75b8 ... $RDB_trap_patch+0x20 0.0x22608 0x6954.0x7ffe75b8 ... lbcopy_fp_method1+0x58 0.0x222b98 0x6954.0x7ffe7108 ... privlbcopy+0x1c 0.0x222fc4 0x6954.0x7ffe70c8 ... uiomove+0x4f0 0.0xfabe8 0x6954.0x7ffe7008 ... vx_read1+0x26c 0.0xb9744 0x6954.0x7ffe6ec8 ... vx_rdwr+0x16c 0.0xc5164 0x6954.0x7ffe6e08 ... vn_rdwr+0x8c 0.0x107b04 0x6954.0x7ffe6d48 ... mfs_hpux_pagein+0x448 0.0x1cbb5c 0x6954.0x7ffe6c88 ... virtual_fault+0x9a0 0.0xf1fc8 0x6954.0x7ffe6b48 ... vfault+0x104 0.0xf281c 0x6954.0x7ffe6ac8 ... trap+0x129c and the message: trap type 15, pcsq.pcoq = 0.222b98, isr.ior = 18e.4179000 savestate ptr = 0x7ffe7108, savestate return ptr = 0x222fc4 9245XB HP-UX (B.10.20) #1: Sun Jun 9 06:31:19 PDT 1996 panic: (display==0xbd00, flags==0x0) Data page fault This is mostly seen on PureAtria's Clearcase product which sets the UIOSEG_PAGEIN flag for vn_rdwr() calls. PHKL_11247: On a VxFS with quota turned on, users who do not have quota set receive "write: Disk quota exceeded" error message when creating files on this file system. PHKL_11244: When accessing an address returned by mmap(), the application gets a SIGBUS error and core is dumped. PHKL_11238: Panic on S800 MP systems using 10.01+ with latest Informix PHKL_11164: The system message buffer would show many "sysmap: rmap ovflo, lost [...]". Eventually, the system would panic with "kalloc: out of kernel virtual space." This problem would only be seen on PA8000 systems. PHKL_11085: On very rare occasions EMC Symmetrix disk drives will report a disk error which causes LVM to mark the block as bad in its bad block directory. The Symmetrix drive can be "repaired" online by EMC support, but the entry in the LVM bad block directory will prevent any further I/O to the affected block. This patch enables a new relocation policy which will prevent entries from being added to the bad block directory. In order to make use of this new relocation policy, a commands patch, PHCO_10826 must also be installed. Also, algorithms within LVM that deal with PVLinks had built in the assumption that NIKE serial numbers were unique. This turned out to not be the case. The only time that the serial numbers need to be unique is in OPS clusters. This patch removes this restriction for all non-OPS cluster environments. PHKL_11055: Large memory systems could hang while trying to allocate kernel memory. A TOC crash dump would show a processor executing in alloc_large_page() while other processors would be spinning waiting for the pfdat_lock spinlock. This problem would only be seen on PA8000 systems. PHKL_11039: JFS file system corruption when running applications using file truncation on large files. The system message buffer will show: "vxfs: mesg 017: vx_trunc - /mnt file system inode 123 marked bad. vxfs: mesg 016: vx_ilisterr - /mnt file system error reading inode 123". It also fixes a malloc panic which was found while fixing this defect. PHKL_11013: The vxupgrade command, used to convert a JFS version 2 file system to a version 3, can give an I/O error on execution. This causes the file system to be marked as unavailable, and a full fsck to be run. PHKL_11006: timer_settime(2) does not set 10ms timer interval properly. The smallest interval can be set is 20ms. PHKL_10966: When running fsadm to reorganize extents (de-fragment) the command fails with error: exclusion zone for bno = 323584, len = 2048 failed This error message does not occur at all times. It has been observed when running fsadm on file systems which contain directories with many small files. PHKL_10953: Severe system hang: the crash dump (TOC) would show many threads waiting for the filesystem alpha semaphore. The kernel stack trace of the thread owning filesys_sema would show bc_yield() calling swtch(). PHKL_10932: (4701353078/DSDe436182) Emerald-class (890, T5x0, T600) systems will experience an HPMC at boot when IODC for memory controllers is being accessed. Note: if you are not experiencing this problem now, then your memory controllers are not subject to this problem. (This problem is NOT intermittant.) PHKL_10930: The system hangs when trying to dump core, as the result of a system panic or TOC. (Normally, it would dump core and reboot.) PHKL_10821: Although users can now exec() programs with up to 2048000 bytes of argument and env strings, sysconfig() _SC_ARG_MAX continues to return 20480 bytes as the maximum length of all arguments and env strings. PHKL_10800: audit records contain relative path names which the user has no idea where they are anchored. this fix prepends the cwd to the relative path name yielding a complete absolute path PHKL_10757: Workstation Additional Core Enhancements for HP-UX 10.20 (July 1997). This patch provides additional enhancements to support new HP workstations. The primary change is the addition of a new signal (SIGGFAULT) and virtual memory subsystem changes to support virtual device locking for new VISUALIZE-FX graphics hardware. It also contains two bug fixes: one for the MP PDIR bug (could panic the system) and the other for the pstat_cmd() panic. PHKL_10689: HP-UX didn't log any error when a user process: 1. encounters a swap space shortage 2. exceeds a system resource limitation Processes were terminated but the errors were not recorded on any of the system log files. PHKL_10675: (1) System may panic with "panic: sync not stale" while running lvmerge (merging LVM mirrors). For the panic to occur, an i/o timeout must occur during the lvmerge operation which results in a resync getting scheduled. (2) Potential data corruption if user i/o's encounter errors to the same extents which are being reimaged by lvmerge. (3) Various panics during vg activation(vgchange -a). A bit is cleared in a kernel structure which LVM has already freed. If another kernel subsystem has been allocated the freed memory before the bit is cleared, panics or other strange behaviors may occur. This particular defect was introduced by PHKL_9000. PHKL_10643: System panic with Memory Mapped Files on UFS filesystem. A typical kernel stack trace would show a data page fault panic in hdl_unsetbits() called from async_pagein_comp(). PHKL_10554: PA-8000 performance; fix kernel-assisted branch prediction. Corrects corner case condition that causes an HPMC. The stack trace would point to module flip_comb(). This corner case has only been seen in lab-internal testing, using pre-release hardware. It has not been seen on any customer's system. PHKL_10452: Panic: kernel stack overflow; trace includes lv_end(). PHKL_10316: When ptrace is called from the DDE debugger while the DDE debugger has watchpoints set, the ptrace system call is called to single step the user process. If the ptrace call is handling a user signal and another signal event is pro- cessed before returning to the user process from ptrace, ptrace may incorretly sent the user's save_state program counter to an incorrect value and return EIO to the parent debugger. PHKL_10288: Panic trap 15 in bwrite() under heavy disk I/O stress. PHKL_10257: Panic with "vn_rele" with EXEC_MAGIC executable run over NFS PHKL_10234: panic: kernel scheduler interrupt PHKL_10199: 10.20 JFS version 3 file system returns the following file allocation error on file systems large than 64Gb before the file system is actually full: vxfs: msg001: vx_nospace - /dev/vgXX/lvolY file system full (1 block extent) The following console message may also be seen: vxfs: mesg 003: vx_mapbad - /dev/vgXX/lvolY file system free extent bitmap in au nnnn marked bad PHKL_10176: The total length (including terminators) of all argv and env strings passed to a newly-EXECed process was 20480 bytes. If a greater length was detected, the exec() failed with E2BIG. PHKL_10064: Setting a negative timestamp with utime() fails PHKL_9931: VxFS hangs waiting for I/O to finish.. PHKL_9919: Timing differences between CPU to large, causes MI Daemon to die frequently (often in less than 15 minutes). PHKL_9909: A deadlock can occur on system running LVM, JFS and HFS. The hang was introduced by one process running lvmerge on HFS logical volumes and another process running umount on a JFS logical volume. This deadlock can only occur with the following scenario: (1). Process A is running a lvmerge or a lvsplit on a HFS logical volume (2). Process B is running a mount, umount or sync on a JFS logical volume. PHKL_9711: Each time edquota -t is invoked for a VxFS file system, it resets the previously defined file system time limit back to default (7 days). PHKL_9569: This patch addresses 2 distinct VxFS (JFS) symptoms: - When trying to take a file-system snapshot, the mount command could fail with the following error message: # mount -F vxfs -o snapof=/dev/vg00/vxonline \ /dev/vg00/vxbackup /vxbackup vxfs mount: /dev/vg00/vxbackup is already mounted, /vxbackup is busy, or allowable number of mount points exceeded - The system could hang when manipulating directories. PHKL_9529: vgdisplay(1M)/vgextend(1M) show incorrect value for max number of PE per PV. PHKL_9517: VxFS file system corruption can occur when running the reorg option of the fsadm command on a busy file system. System diagnostic messages from the dmesg command will include the following: vxfs: mesg 008: vx_direrr - /??? file system inode X block Y error 6 vxfs: mesg 017: vx_iread - /??? file system inode X marked bad vxfs: mesg 016: vx_ilisterr - /??? file system error reading inode X vxfs: mesg 008: vx_direrr - /??? file system inode X block Y error 6 vxfs: mesg 017: vx_iread - /??? file system error reading inode X . . . PHKL_9372: Panic: "data page fault" when using fsadm to resize a mounted VxFS filesystem with disk quotas. PHKL_9370: If a customer upgrades from 10.01 or 10.10 to 10.20, and tries to increase their VxFS file systems via SAM, the file system will not mount after completion of extending the volume and file system. The typical approach for SAM is: 1) unmount the file system 2) lvextend the volume 3) extendfs the file system 4) mount the file system The mount will always fail in this case. PHKL_9365: The only symptom is random, spurious, rare instances of data corruption, usually in I/O to devices. This is rare enough (and masked by normal system configurations) that it has not been observed in customer systems, only within HP. PHKL_9361: MP machine used as a nfs client panics with: panic: (display==0xb800, flags==0x0) Data page fault panic stack: crash event was a panic panic+0x10 report_trap_or_int_and_panic+0x8c trap+0xbfc $call_trap+0x20 binvalfree_vfs+0x5c rinval+0x10 nfs_unmount+0x20 umount_vfs+0x5c umount_root+0x20 umount+0x98 syscall+0x1a4 PHKL_9273: On MP systems with several processors, applications which do file locking frequently can perform poorly. The symptoms are a high switch rate (switch rate > syscall rate) and heavy system activity (%sys > 90%). PHKL_9153: Add write-gathering support for NFS servers. PHKL_9151: This patch includes 3 separate performance enhancements. All are targetted for PA-RISC 8000 processors. 1. Kernel-assisted branch prediction. 2. bl->bll branch stub elimination. 3. Re-positioning perf-critical kernel assembly routines. PHKL_9075: Applications using Memory Mapped Files were performing poorly when mapping thousands of pregions to the same file. The problem would mainly be noticed with shared (MAP_SHARED) and exclusive (MAP_FIXED with address in the process private data space) mappings. This patch is required when using the Object Store database product from ODI. Additionally, this patch provides an enhancement to the mprotect(2) system call: mprotect(2) used to fail protecting non mmap(2)'ed addresses. This patch enables to mprotect(2) data, stack and shared memory segment addresses. Finally, this patch fixes a kernel panic with large buffer cache: kernel panic with a data page fault when attempting to copy data from the last page of the third quadrant. This will only occur on systems with a buffer cache of one gigabyte or larger. The panic message will display the following: isr.ior = 0.bffffffc running strings on a raw sar(1) output file can show some printable strings (sar ignores these). PHKL_8999: Without this patch customers are limited to supporting 2 nodes in a shared environment With this patch customers can now use SLVM in a 4 node cluster Alternate links for devices such as the Nike disk array are now supported in a shared environment This change supports a new -t switch for lvchange allowing the administrator the option to limit the time lvm holds i/os to be retried on logical volumes when disks are powerfailed. Without using this option, LVM will hold the i/os as long as there is is one disk where the data resides which may eventually return. Using this option would cause LVM to give up on the powerfailed disk and return i/o errors to the user application using the logical volume. This feature is obviously not to be used indiscriminately. For many High Availability applications, having i/os held in kernel indefinitely is not acceptable. Most customers should not need to use the new switch. PHKL_8953: The K400 4-way suddenly stopped to work. The user heavily accessed vxfs snapshot filesystem and have done sync's in parallel. We TOC'ed the system. PHKL_8716: After call to pstat_getmsg(), all accesses to the message queue pstat_getmsg() was called hang. PHKL_8683: System panic with data page fault on ICS. PHKL_8532: System crash dumps are corrupt and unusable. PHKL_8481: JFS performance in 10.20 has improved disk i/o throughput at the cost of extra CPU utilization. This patch improves JFS performance by implementing a log buffer re-use scheme and also by making modifications to the read/write sleep lock primitives. PHKL_8346: Executables cannot access more than 1.75 GB shared memory PHKL_8331: Data loss with UFS files using fragments. PHKL_8294: When multiple nfsd's access the same file simultaneously, they hang in a deadlock. PHKL_8203: MP system hangs during panic. The LED shows system staying at INIT CB0B. Machine needs to be TOC'ed to save the core dump. PHKL_8084: LVM may return I/O's with errors instead of sending them to an alternate link. This patch also facilitates using "vgreduce -f" for physical volumes which have alternate links; without this patch "vgreduce -f" is not allowed on LVM disks with alternate links. PHKL_7951: Ptrace not allowing writes on PCUX to some f.p regs PHKL_7899: KI queuedone, enqueue and queuestart traces on JFS may contain NULL values in the b_apid and b_upid fields. With a system running a heavy load using JFS on LVM, the following panic may occur: "lv_syncx: returning error: 5" Systems running JFS may hang due to a deadlock problem. The setuid bit will be removed on a JFS file when the file is edited or text has been appended to it when run as root. PHKL_7870: lvreduce(1M) may cause a system panic, if it is used to reduce an lvol which was left inconsistent by a prior LVM operation. lvreduce(1M) could not be used to remove lvols that were somehow corrupted, if it was, the command would cause a system panic. PHKL_7776: It's possible for a JFS file system to get into a state where it can't be mounted (except read-only), but fsck(1M) does not report any problem with it. At mount time, the kernel prints the following warning on the console: vxfs: mesg 012: vx_iget - file system invalid inode number XXX and mount(1M) fails with the following message: vxfs mount: /dev/XXX is not a vxfs file system. Once a file system has gotten into this state, it remains unmountable, even after running fsck(1M). Defect Description: PHKL_14183: New functionality to support networking features in 10.20. PHKL_14126: This patch fixes two defects : - SR: 4701381608, DTS: DSDe441567 Patch PHKL_13684 introduced a problem with procedure vn_open(). By adding one extra argument to this procedure, compatibility with older users of vn_open (now believed to be limited to Netware) was broken. Because of this extra argument it is possible that the vnode returned by this procedure can be a random memory location. This patch backs out the addition of the extra argument and it restores compatibility. - SR: 1653223404, DTS: DSDe438306 Trap panic in lv_init_immediate_reporting at 10.20 because currentPhysicalLink field in the struct pvol associated with the PV which the vgcfgrestore had been performed on was NULL. The problem will only be seen on 10.20 with patch PHKL_8999 or superseding patches as this patch introduced this new pointer field to the struct pvol. The panic problem will only be seen on multi-PV VGs. PHKL_14049: This patch fixes three defects: 1) SR: 1653247486, DTS: JAGaa01357 After a maintenance mode reboot, if the root LV is mirrored, we make the copy of root on the boot device the only fresh copy. Before updating the VGSA with the new stale/fresh information, a structure used to pass physical extent info to the configuration is set up. In the case of a LV containing 2**n extents, memory allocated for the array of structures is exactly enough for the extents. The terminator of the array was written beyond the allocated memory. This corrupts the memory at the next address and causes system to panic when the next piece of memory is accessed. 2) SR: 1653239137, DTS: JAGaa01378 When the root VG has a mirror PV missing with a lower PV index number than the boot disc, the PV's current physical link field is zero. The code attempts to dereference this null pointer in the bootup path and traps. 3) SR: 1653248690, DTS: JAGaa01378 The problem is caused by a disc with bad blocks in the LVM structure area. This results the logical volume field in the physical request buffer to be zero. Deferencing this null pointer causes data page fault. PHKL_14012: This is an enhancement to add the flock manager driver hooks to the kernel. PHKL_14009: pstat_lvinfo() algorithm describes that if the number of entries requested is non-zero, it will traverse through all the Volume Groups (VG) to report the open logical volume information. The test (lvix >= vgp->num_lvols) is used to test if LV index is covered by VG. This should be (lvix > cur_lvs) which is lvix compared to the number of open logical volumes. Also there can be some volumes that are configured but not mounted.(the VG where they reside is still ACTIVE). The fix now shows the all the logical volumes that are open in the system (within any Volume Group). The defect can be reproduced by writing a program based on pstat_getlvinfo() to display information about Logical Volumes configured on a system. The output of this program only shows logical volumes for the first volume group. PHKL_13911: Essentially, in getnewbuf, we might set a B_DELWRI buffer to B_BUSY, but later decide to NOT write it out (in fixing some deadlock problem). Rather, we will simply brelse it. If an umount process of the device or filesystem comes in between the time of setting B_BUSY and brelse(), it will skip the buffer thinking that someone else is flushing it out. Later when it calls binval() assuming all buffers should have been written out, it may invalidate a dirty buffer. PHKL_13874: There were two defects fixed by this patch: a) Report of "Invalid Argument": The problem occurs when reorganizing a version 2 JFS with EXT4 type of extents from an original indirect extent to a reorg'ed indirect extent. In this case, vx_reorg_emap() does not allocate a fixed size extent for the reorg'ed inode's indirect data extent. The incorrect size causes vx_enter_ext4() fail to enter the allocated extent to the extent map, resulting an EINVAL error. b) Report of "No such device or address" This was caused also by incorrectly handling the indirect extent of an IORG_EXT4 type of file (alson created under version 2). In this case vx_reorg_copy() would blindly attempt to copy pad bytes if the indirect extent of the original file was not completely filled. (Pad bytes are used in the last indirect extent if the data does not fit exactly)(This is a consequence of having a fixed size for all indirect extents of the IORG_EXT4 type of file). PHKL_13795: New functionality to support networking features in 10.20 PHKL_13768: On PA8000 systems, when free physical memory becomes heavily fragmented, the time needed to find free large pages (superpages) increases drastically. During this time (possibly several seconds) the kernel would preempt any user or system processes. This could result in MC/Service Guard TOC'ing the system. The fix was to yield the cpu when spending too much time in alloc_large_page(). PHKL_13761: Use of a global mprot_list_lock lock caused spinlock contention as its one lock per system and hence poor system performance. It is still used to protect mprot_list. The fix was to use another pool of locks called prp_hash_locks for protection ids. The hashing function chooses different locks (from this pool of hash locks) for different range of addresses thus removing dependency on the various locks that should be acquired before the protection ids for a given page are changed. PHKL_13713: The defect was due to an uninitialized field (ex_elen) in the vx_extent structure when allocated by the vx_dqnewid procedure. PHKL_13684: The system supplies a "default" ACL even if none has been configured. This in turn overrides any umask, and produces unexpected file access behaviors. PHKL_13680: In 10.xx buffer caching was disabled for block devices. This produced degraded performance in reads/writes to block devices. PHKL_13508: vx_statvfs doesn't count extents smaller than 8k for f_bavail. PHKL_13452: When changing multiple attributes on a file, VxFS (JFS) code creates a "ghost" inode, or working copy to make changes. When the changes are complete the ghost inode is swapped into the real inode, thus making the changes visible in the file system. Some parts of the "ghost" inode may not be set by the time other parts of the VxFS code try to use them. These uninitialized parts of the "ghost" inode cause a data page fault and panic when they are referenced before they are initialized. When only one attribute is changed, no "ghost" inode is created. Changes are made directly to the inode involved. PHKL_13305: The defect is that the scheduling algorithm in idle() was preventing the reboot processor from picking up the thread that needed to complete processing because that thread was locked to another processor. PHKL_13260: This patch fixes three problems: a) SR: 1653237842, DTS: JAGaa01160 Poor performance on PA2.0 machines due to protection id fault that is resolved in software instead of hardware. The system resolves half of the protection id faults in software and hald in hardware. The fix was to use the hardware support from PA2.0 chip so that we will resolve greater number of protection id faults in hardware than in software. PA2.0 systems have 4 64-bit protection id registers instead of 4 32-bit registers. By software convention, the lower 32-bits of cr8 and cr9 are used for text and data protection id's. This way we never have to resolve protection id faults for text and data segments via software. The higher order 32-bits of cr8 and cr9 are used to cache protection id's. In addition to that we have another 4 registers (2 32-bit register pairs) i.e cr12 and cr13 for caching protection id's. This way, we now have 6 control registers to cache protection id's instead of 2. This results in performance boost and less number of protection id faults to be handled by software. Here's a pictorial explanation of the difference in PA1.1 and PA2.0 control registers: PA1.1: Protection id cache registers = 2 (32-bit) 0 31 -------------------- | TEXT |- CR8 | | -------------------- | DATA |- CR9 | | -------------------- | pid3 |- CR12 | | -------------------- | pid4 |- CR13 | | -------------------- PA2.0: Protection id cache registers = 6 (32-bit) 0 31 63 ---------------------------------------- | TEXT | pid2 |-CR8 | | | ---------------------------------------- | DATA | pid4 |-CR9 | | | ---------------------------------------- | pid5 | pid6 |-CR12 | | | ---------------------------------------- | pid7 | pid8 |-CR13 | | | ---------------------------------------- Hence, the 10.20 HP-UX code was using only pid5 and pid7 for caching protection id's whereas pid2, pid4, pid6 and pid8 were not used. b) SR: 1653237842, DTS: JAGaa01160 The other defect which leads to silent data corruption was due to a patch PHKL_13624 which "incorrectly" uses stack pointer to get space id for the key to access fast protection id list. This is true for all the applications "except" for SHMEM_MAGIC applications who define their own stack on the shared memory segment. The fix for PA1.1 and PA2.0 systems (for PHKL_12634) was to find out which key to use for accessing the fast protection id list. Non SHMEM_MAGIC applications will always have a non-zero value in sr5 and this value cannot be equal to the value in q2_spaceid. The reason that non SHMEM_MAGIC applications will always have a non-zero sr5 is that they attach a stack region in the second quadrant before they begin execution. So we now have a simple test that can be used by fast_resolvepid: if (sr5 == 0 || sr5 == q2_spaceid) { /* Application is SHMEM_MAGIC, compare sid to sr4 */ } else { /*Applications is non SHMEM_MAGIC, compare sid to sr5 */ } q2_spaceid is covered by the kernel mapping so we know it is mapped equivalently. q2_spaceid is a global which is initialised at boot time and holds the space id that SHMEM_MAGIC applications share for the second quadrant (controlled by sr5).This global will be zero until the first SHMEM_MAGIC application attaches something in the second quadrant, but that doesn't matter. Anyway, all SHMEM_MAGIC applications will have sr5 set to either 0 or the value in q2_spaceid. It will be zero if the application hasn't gotten around to attaching any shared memory in the second quadrant, otherwise sr5 will contain the value in q2_spaceid. This fix will work for PA1.1 and PA2.0 systems. c) SR: 4701373969, DTS: DSDe440766 The driver for VISUALIZE-FX hardware uses PA-RISC protection id's to arbitrate access to the hardware. Flow control for the graphics pipeline by revoking the graphics protection id under interrupt. Some routines that manipulate protection ids in the kernel were not protected from this interrupt, so they could wind up restoring the graphics protection id from a temporary variable after it was revoked, leading to either the graphics pipeline being overflowed, or two graphics processes simultaneously accessing the hardware. PHKL_13247: DDTS #JAGaa00964 : When "vgchange -a s" is invoked to PV-LINK volume group of Nike, which has the mixing of GSC and HP-PB interfaces on shared bus, on both nodes at the same time, vgchange fails, leaving the following error; vgchange: Couldn't activate volume group "vg02": I/O error while reading the VGDA. Reproduction : Set up two systems with 10.20 OS, NIKE disk array on a shared bus, DLM software, and start up the cluster. Then use some mechanism to invoke the vgchange -a s command simultaneously on both nodes. This could be done using synchronized clocks and timed jobs. After some time the command will fail on one of the nodes. DSDe441112 : The configuration is two T600's, shared EMC disk arrays on fiber channel, HPUX 10.20, ServiceGuard 10.10, in a new installation. They are testing ServiceGuard by introducing various faults. Most work ok, and ServiceGuard responds as designed. Certain manipulations are done on one node, and the other node panics. Manipulations leading to the panic include: 1. Powering off the node. 2. Disconnecting both fiber channel cables (disconnecting only one is ok). 3. Powering off an expansion bay. PHKL_13237: serialize() is checking if the "pid" argument passed to the system call from the user application is less than PID_MAXSYS. If so, the call fails with errno set to EINVAL. PHKL_13206: getdirentries() and getdents() system calls did not check if the argument is a directory file. When it is called on VxFS(JFS)file systems with a regular file, VxFS reports an error such as "vxfs: mesg 008:..." and the clean file can be marked bad. VNODE type check codes have been added in getdirentries() and getdents(). PHKL_13155: The scheduler decides the system is thrashing in some occations when pageout rate is low and free memory is plenty and hence deactivates certain processes. PHKL_12997: The HSC F/W SCSI card was not being identified as an interface capable of addressing in the 2GB->4GB range. To reproduce, simply attach a >2GB disk to an HSC F/W SCSI interface and put a >2GB file system on the device. Leave enough room at the end of the disk for dump space and attempt to configure dump on the device to start between 2GB-4GB. PHKL_12963: No real defect for 1st problem. Its just that a CPU intensive process would/could consume more CPU cycles than the entitlement granted to a group under PRM control. 2nd problem could occur on an SMP machine, if mulitple processors go after a single process simultaneously. In some situations, a hang can occur. PRM would need to be running on the system, and processes would have to be locked to processor through process affinity. In this situation, a processor can be fooled into thinking a process is available to run, when none is, and the result of this can be a hung system. PHKL_12901: The defect is due to allocation of large data structures (local variables) on stack when a function is called. The fix was to re-compile the object modules(LVM,JFS) with a compiler option (+ESssf - small stack frame) to align the stack pointer to 32-byte boundary instead of 64-byte boundary. This prevents the kernel stack overflow panic. PHKL_12669: 1. When a physical volume which has bad block alternates allocated and is begin added/extended to a volume group without doing a pvcreate -f. If the bad block alternate resides inside the user data area, this could cause data corruption. 2. The problem has to do with how the LVM interprets the B_PFTIMEOUT flag. For mirrored reads, the LVM works as desired: if the first disc is bad, the LVM tries the second disc. If the second disc is also bad, then the LVM reports a disc error. In the case of PV links however, the LVM reports a disc error immediately without trying the alternate link. 3. The new lvol flag (LVM_NONCONTIGUOUS) is defined for a new allocation policy begin implemented in a LVM command patch. PHKL_12662: A thread owns a resourse needed by the reboot process, yet is stuck on a frozen spu, causing a deadlock. PHKL_12633: Problem was due to an incorrect assumption in determining the SID to be used. Procedures fast_resolvepid and fast_resolvepid2_0 incorrectly assumed the SID would reside in SR5. This has now been corrected providing better performance of SHMEM_MAGIC executables. PHKL_12601: ftruncate() retuns EAGAIN on madatory locking regardless of lock owner. If we have mandatory locking on a VxFS file and if there is a pending lock, then we return EAGAIN regardless of the owner of the lock. vx_setattr() does not allow a file to be truncated if there is mandatory file lock owned by another process, even if it does not overlap the range being truncated. PHKL_12409: alarm() rounds the time remaining to the nearest second so if the time remaining is less than 0.5 seconds, the result is rounded to zero. This makes it impossible to reschedule the original alarm. There was no check made in alarm() to determine if the result has been rounded to zero. The fix is to have a check to ensure that we never return zero if there was any time remaining. PHKL_12397: This patch fixes two defects : -When debugging processes over an interruptable NFS mount point there is a window during which a traced process could sleep in exec() while the debugger would exit clearing the traced bit and freeing the ptrace data structure. Upon wakeup, the no longer traced process would panic the system trying to dereference a NULL pointer. -pstat_msginfo() calls msgconv() to convert the offset into a message queue pointer. msgconv() then locks the queue and returns a pointer to the queue's lock. pstat_msginfo() had not been released the lock of the message queue. SR: 1653096131 1653138164 1653166066 1653166496 1653166983 1653177089 1653179895 1653183699 1653189738 1653192294 1653194555 1653194977 1653199802 1653202754 1653207175 1653211607 1653213082 1653214338 1653215467 1653216077 1653216606 1653218065 1653220079 1653221820 1653221895 1653223404 1653227983 1653230771 1653237842 1653239137 1653247486 1653248690 4701327338 4701327544 4701329292 4701329300 4701329433 4701329441 4701330647 4701333419 4701334367 4701334698 4701334847 4701334995 4701335497 4701335935 4701336412 4701339226 4701341362 4701341479 4701341644 4701341669 4701342121 4701342147 4701344515 4701345843 4701346791 4701347922 4701348359 4701349431 4701350157 4701350975 4701351932 4701352278 4701352799 4701353078 4701353094 4701353102 4701354274 4701355321 4701355560 4701355610 4701356931 4701358143 4701358523 4701360925 4701361188 4701361444 4701361758 4701364182 4701365114 4701365791 4701371294 4701371617 4701372276 4701374520 4701375956 4701376269 4701376863 4701378117 4701379347 4701381608 5000716225 5003281469 5003314633 5003317487 5003318667 5003323493 5003325506 5003328237 5003330910 5003334961 5003341925 5003344630 5003348425 5003353797 5003356345 5003357616 5003359414 5003360024 5003360446 5003361766 5003363523 5003363820 5003364224 5003365692 5003366500 5003366971 5003367979 5003368290 5003379156 5003380113 5003384586 5003385203 5003385393 5003387019 5003387183 5003397174 5003398800 5003399188 Patch Files: /usr/conf/h/_flkmgr.h /usr/conf/h/audit.h /usr/conf/h/dnlc.h /usr/conf/h/fss.h /usr/conf/lib/libdmapi.a(kdm_core.o) /usr/conf/lib/libdmapi.a(vx_dmattr_table.o) /usr/conf/lib/libhp-ux.a(asm_rv.o) /usr/conf/lib/libhp-ux.a(asm_scall.o) /usr/conf/lib/libhp-ux.a(asm_utl.o) /usr/conf/lib/libhp-ux.a(asm_vm.o) /usr/conf/lib/libhp-ux.a(asm_vm_pdir.o) /usr/conf/lib/libhp-ux.a(audctl.o) /usr/conf/lib/libhp-ux.a(bcopy.o) /usr/conf/lib/libhp-ux.a(btlb.o) /usr/conf/lib/libhp-ux.a(bzero.o) /usr/conf/lib/libhp-ux.a(clock.o) /usr/conf/lib/libhp-ux.a(cpd.o) /usr/conf/lib/libhp-ux.a(dump.o) /usr/conf/lib/libhp-ux.a(dump_conf.o) /usr/conf/lib/libhp-ux.a(flipper.o) /usr/conf/lib/libhp-ux.a(flkmgr_hp.o) /usr/conf/lib/libhp-ux.a(hdl_fault.o) /usr/conf/lib/libhp-ux.a(hdl_init.o) /usr/conf/lib/libhp-ux.a(hdl_mprotect.o) /usr/conf/lib/libhp-ux.a(hdl_policy.o) /usr/conf/lib/libhp-ux.a(hdl_trans.o) /usr/conf/lib/libhp-ux.a(init_main.o) /usr/conf/lib/libhp-ux.a(interrupt.o) /usr/conf/lib/libhp-ux.a(kern_acct.o) /usr/conf/lib/libhp-ux.a(kern_exec.o) /usr/conf/lib/libhp-ux.a(kern_exit.o) /usr/conf/lib/libhp-ux.a(kern_fork.o) /usr/conf/lib/libhp-ux.a(kern_kload.o) /usr/conf/lib/libhp-ux.a(kern_mman.o) /usr/conf/lib/libhp-ux.a(kern_sig.o) /usr/conf/lib/libhp-ux.a(lbcopy.o) /usr/conf/lib/libhp-ux.a(lbzero.o) /usr/conf/lib/libhp-ux.a(lv_config.o) /usr/conf/lib/libhp-ux.a(lv_lvm.o) /usr/conf/lib/libhp-ux.a(lw_scall.o) /usr/conf/lib/libhp-ux.a(machdep.o) /usr/conf/lib/libhp-ux.a(outlaw.o) /usr/conf/lib/libhp-ux.a(pgcopy.o) /usr/conf/lib/libhp-ux.a(pm_clockint.o) /usr/conf/lib/libhp-ux.a(pm_config.o) /usr/conf/lib/libhp-ux.a(pm_context.o) /usr/conf/lib/libhp-ux.a(pm_core.o) /usr/conf/lib/libhp-ux.a(pm_getpid.o) /usr/conf/lib/libhp-ux.a(pm_policy.o) /usr/conf/lib/libhp-ux.a(pm_proc.o) /usr/conf/lib/libhp-ux.a(pm_procdup.o) /usr/conf/lib/libhp-ux.a(pm_ptrace.o) /usr/conf/lib/libhp-ux.a(pm_resource.o) /usr/conf/lib/libhp-ux.a(pm_rtsched.o) /usr/conf/lib/libhp-ux.a(pm_sendsig.o) /usr/conf/lib/libhp-ux.a(pm_signal.o) /usr/conf/lib/libhp-ux.a(pm_swtch.o) /usr/conf/lib/libhp-ux.a(pm_threads.o) /usr/conf/lib/libhp-ux.a(pm_timers.o) /usr/conf/lib/libhp-ux.a(protection.o) /usr/conf/lib/libhp-ux.a(pstat.o) /usr/conf/lib/libhp-ux.a(resume.o) /usr/conf/lib/libhp-ux.a(sem_alpha.o) /usr/conf/lib/libhp-ux.a(spec_vnops.o) /usr/conf/lib/libhp-ux.a(spinlock.o) /usr/conf/lib/libhp-ux.a(subr_ksleep.o) /usr/conf/lib/libhp-ux.a(subr_timers.o) /usr/conf/lib/libhp-ux.a(sysV_shm.o) /usr/conf/lib/libhp-ux.a(trap.o) /usr/conf/lib/libhp-ux.a(ulbcopy.o) /usr/conf/lib/libhp-ux.a(vfs.o) /usr/conf/lib/libhp-ux.a(vfs_bio.o) /usr/conf/lib/libhp-ux.a(vfs_dnlc.o) /usr/conf/lib/libhp-ux.a(vfs_scalls.o) /usr/conf/lib/libhp-ux.a(vfs_vm.o) /usr/conf/lib/libhp-ux.a(vfs_vnode.o) /usr/conf/lib/libhp-ux.a(vm_fault.o) /usr/conf/lib/libhp-ux.a(vm_kern.o) /usr/conf/lib/libhp-ux.a(vm_machdep.o) /usr/conf/lib/libhp-ux.a(vm_machreg.o) /usr/conf/lib/libhp-ux.a(vm_mmap.o) /usr/conf/lib/libhp-ux.a(vm_page.o) /usr/conf/lib/libhp-ux.a(vm_pdir1_1.o) /usr/conf/lib/libhp-ux.a(vm_pdir2_0.o) /usr/conf/lib/libhp-ux.a(vm_pregion.o) /usr/conf/lib/libhp-ux.a(vm_region.o) /usr/conf/lib/libhp-ux.a(vm_sched.o) /usr/conf/lib/libhp-ux.a(vm_superpage.o) /usr/conf/lib/libhp-ux.a(vm_text.o) /usr/conf/lib/libhp-ux.a(vm_vas.o) /usr/conf/lib/libhp-ux.a(vm_vhand.o) /usr/conf/lib/liblvm.a(lv_block.o) /usr/conf/lib/liblvm.a(lv_cluster_lock.o) /usr/conf/lib/liblvm.a(lv_defect.o) /usr/conf/lib/liblvm.a(lv_hp.o) /usr/conf/lib/liblvm.a(lv_ioctls.o) /usr/conf/lib/liblvm.a(lv_kdb.o) /usr/conf/lib/liblvm.a(lv_lvsubr.o) /usr/conf/lib/liblvm.a(lv_malloc.o) /usr/conf/lib/liblvm.a(lv_mircons.o) /usr/conf/lib/liblvm.a(lv_pbuf.o) /usr/conf/lib/liblvm.a(lv_phys.o) /usr/conf/lib/liblvm.a(lv_schedule.o) /usr/conf/lib/liblvm.a(lv_spare.o) /usr/conf/lib/liblvm.a(lv_strategy.o) /usr/conf/lib/liblvm.a(lv_stub.o) /usr/conf/lib/liblvm.a(lv_subr.o) /usr/conf/lib/liblvm.a(lv_syscalls.o) /usr/conf/lib/liblvm.a(lv_vgda.o) /usr/conf/lib/liblvm.a(lv_vgsa.o) /usr/conf/lib/liblvm.a(sh_vgsa.o) /usr/conf/lib/liblvm.a(slvm_comm.o) /usr/conf/lib/liblvm.a(slvm_schedule.o) /usr/conf/lib/libprm.a(kern_fss.o) /usr/conf/lib/libufs.a(ufs_alloc.o) /usr/conf/lib/libufs.a(ufs_vfsops.o) /usr/conf/lib/libufs.a(ufs_vnops.o) /usr/conf/lib/libvxfs_adv.a(vx_dmattr.o) /usr/conf/lib/libvxfs_adv.a(vx_kdmi.o) /usr/conf/lib/libvxfs_adv.a(vx_reorg.o) /usr/conf/lib/libvxfs_adv.a(vx_sample_dmattr.o) /usr/conf/lib/libvxfs_base.a(vx_alloc.o) /usr/conf/lib/libvxfs_base.a(vx_attr.o) /usr/conf/lib/libvxfs_base.a(vx_bio.o) /usr/conf/lib/libvxfs_base.a(vx_bmapext4.o) /usr/conf/lib/libvxfs_base.a(vx_bmaptyped.o) /usr/conf/lib/libvxfs_base.a(vx_bsdquota.o) /usr/conf/lib/libvxfs_base.a(vx_dmstubs.o) /usr/conf/lib/libvxfs_base.a(vx_fsetsubr.o) /usr/conf/lib/libvxfs_base.a(vx_hpuxsubr.o) /usr/conf/lib/libvxfs_base.a(vx_iflush.o) /usr/conf/lib/libvxfs_base.a(vx_inode.o) /usr/conf/lib/libvxfs_base.a(vx_itrunc.o) /usr/conf/lib/libvxfs_base.a(vx_lite.o) /usr/conf/lib/libvxfs_base.a(vx_log.o) /usr/conf/lib/libvxfs_base.a(vx_mount.o) /usr/conf/lib/libvxfs_base.a(vx_rdwri.o) /usr/conf/lib/libvxfs_base.a(vx_replay.o) /usr/conf/lib/libvxfs_base.a(vx_vfsops.o) /usr/conf/lib/libvxfs_base.a(vx_vm.o) /usr/conf/lib/libvxfs_base.a(vx_vnops.o) /usr/conf/machine/reg.h /usr/conf/master.d/core-hpux /usr/conf/space.h.d/core-hpux.h /usr/conf/space.h.d/flkmgr_globals.h /usr/include/dmapi.h /usr/include/machine/reg.h /usr/include/sys/audit.h /usr/include/sys/dnlc.h /usr/include/sys/fs/vx_hpux.h /usr/include/sys/fss.h what(1) Output: /usr/conf/h/_flkmgr.h: _flkmgr.h $Date: 98/02/02 14:04:07 $ $Revision: 1 .1.98.3 $ PATCH_10.20 (PHKL_14012) /usr/conf/h/audit.h: audit.h $Date: 97/04/21 13:54:38 $ $Revision: 1.10.98.5 $ PATCH_10.20 (PHKL_10800) /usr/conf/h/dnlc.h: dnlc.h $Date: 97/09/02 15:03:34 $ $Revision: 1.4.98 .3 $ PATCH_10.20 (PHKL_12378) /usr/conf/h/fss.h: fss.h $Date: 98/01/08 14:50:28 $ $Revision: 1.5.9 8.4 $ PATCH_10.20 (PHKL_12963) fss.h: $Revision: 1.5.98.4 $ $Date: 98/01/08 14:50:2 8 $ /usr/conf/lib/libdmapi.a(kdm_core.o): kdm_core.c $Date: 97/09/02 13:10:59 $ $Revision: 1.2 .98.9 $ PATCH_10.20 (PHKL_12088) /usr/conf/lib/libdmapi.a(vx_dmattr_table.o): vx_dmattr_table.c $Date: 97/10/15 15:06:43 $ $Revisi on: 1.2.98.5 $ PATCH_10.20 (PHKL_12901) /usr/conf/lib/libhp-ux.a(asm_rv.o): asm_rv.s $Date: 97/12/02 15:04:48 $ $Revision: 1.57 .98.15 $ PATCH_10.20 (PHKL_13260) /usr/conf/lib/libhp-ux.a(asm_scall.o): asm_scall.s $Date: 96/11/22 10:45:59 $ $Revision: 1 .39.98.6 $ PATCH_10.20 (PHKL_9151) /usr/conf/lib/libhp-ux.a(asm_utl.o): asm_utl.s $Date: 96/11/22 10:49:42 $ $Revision: 1.1 17.98.10 $ PATCH_10.20 (PHKL_9151) /usr/conf/lib/libhp-ux.a(asm_vm.o): asm_vm.s $Date: 98/01/13 15:04:01 $ $Revision: 1.60.98.11 $ PATCH_10.20 (PHKL_13795) /usr/conf/lib/libhp-ux.a(asm_vm_pdir.o): asm_vm_pdir.s $Date: 97/05/02 01:58:51 $ $Revision: 1.2.98.5 $ PATCH_10.20 (PHKL_10757) /usr/conf/lib/libhp-ux.a(audctl.o): audctl.c $Date: 98/02/09 14:10:00 $ $Revision: 1. 13.98.5 $ PATCH_10.20 (PHKL_14126) /usr/conf/lib/libhp-ux.a(bcopy.o): bcopy.s $Date: 96/11/22 10:51:06 $ $Revision: 1.7.9 8.4 $ PATCH_10.20 (PHKL_9151) /usr/conf/lib/libhp-ux.a(btlb.o): btlb.c $Date: 97/05/02 02:00:53 $ $Revision: 1.9. 98.4 $ PATCH_10.20 (PHKL_10757) /usr/conf/lib/libhp-ux.a(bzero.o): bzero.s $Date: 96/11/22 10:52:32 $ $Revision: 1.9.9 8.4 $ PATCH_10.20 (PHKL_9151) /usr/conf/lib/libhp-ux.a(clock.o): clock.c $Date: 97/01/23 16:09:43 $ $Revision: 1.39. 98.4 $ PATCH_10.20 (PHKL_9919) /usr/conf/lib/libhp-ux.a(cpd.o): cpd.c $Date: 96/10/26 09:39:05 $ $Revision: 1.9.98.8 $ PATCH_10.20 (PHKL_8999) /usr/conf/lib/libhp-ux.a(dump.o): dump.c $Date: 96/10/26 09:49:44 $ $Revision: 1.11.98.6 $ PATCH_10.20 (PHKL_8999) /usr/conf/lib/libhp-ux.a(dump_conf.o): dump_conf.c $Date: 97/12/17 14:28:07 $ $Revision: 1.6.98.6 $ PATCH_10.20 (PHKL_13247) /usr/conf/lib/libhp-ux.a(flipper.o): flipper.c $Date: 97/03/31 14:58:19 $ $Revision: 1.3. 98.8 $ PATCH_10.20 (PHKL_10554) /usr/conf/lib/libhp-ux.a(flkmgr_hp.o): flkmgr_hp.c $Date: 98/02/03 08:37:29 $ $Revision: 1.1.98.3 $ PATCH_10.20 (PHKL_14012) /usr/conf/lib/libhp-ux.a(hdl_fault.o): hdl_fault.c $Date: 97/05/02 02:00:56 $ $Revision: 1.13.98.11 $ PATCH_10.20 (PHKL_10757) /usr/conf/lib/libhp-ux.a(hdl_init.o): hdl_init.c $Date: 96/08/26 22:38:17 $ $Revision: 1.9.98.5 $ PATCH_10.20 (PHKL_8346) /usr/conf/lib/libhp-ux.a(hdl_mprotect.o): hdl_mprotect.c $Date: 98/01/09 15:32:02 $ $Revision: 1.4.98.6 $ PATCH_10.20 (PHKL_13761) /usr/conf/lib/libhp-ux.a(hdl_policy.o): hdl_policy.c $Date: 97/11/18 11:59:33 $ $Revision: 1 .15.98.12 $ PATCH_10.20 (PHKL_13260) /usr/conf/lib/libhp-ux.a(hdl_trans.o): hdl_trans.c $Date: 96/11/21 16:23:49 $ $Revision: 1.12.98.11 $ PATCH_10.20 (PHKL_9075) /usr/conf/lib/libhp-ux.a(init_main.o): init_main.c $Date: 97/06/17 15:09:59 $ $Revision: 1.120.98.13 $ PATCH_10.20 (PHKL_11406) /usr/conf/lib/libhp-ux.a(interrupt.o): interrupt.s $Date: 97/03/31 13:22:48 $ $Revision: 1 .12.98.10 $ PATCH_10.20 (PHKL_10554) /usr/conf/lib/libhp-ux.a(kern_acct.o): kern_acct.c $Date: 98/02/09 14:26:42 $ $Revision: 1. 30.98.7 $ PATCH_10.20 (PHKL_14126) /usr/conf/lib/libhp-ux.a(kern_exec.o): kern_exec.c $Date: 97/09/03 18:56:26 $ $Revision: 1.93.98.24 $ PATCH_10.20 (PHKL_12397) /usr/conf/lib/libhp-ux.a(kern_exit.o): kern_exit.c $Date: 98/02/02 14:05:08 $ $Revision: 1.77.98.16 $ PATCH_10.20 (PHKL_14012) /usr/conf/lib/libhp-ux.a(kern_fork.o): kern_fork.c $Date: 98/02/02 14:05:13 $ $Revision: 1.71.98.19 $ PATCH_10.20 (PHKL_14012) /usr/conf/lib/libhp-ux.a(kern_kload.o): kern_kload.c $Date: 97/05/02 02:02:58 $ $Revision : 1.4.98.5 $ PATCH_10.20 (PHKL_10757) /usr/conf/lib/libhp-ux.a(kern_mman.o): kern_mman.c $Date: 97/04/09 11:33:14 $ $Revision: 1.35.98.5 $ PATCH_10.20 (PHKL_10689) /usr/conf/lib/libhp-ux.a(kern_sig.o): kern_sig.c $Date: 97/05/02 02:03:00 $ $Revision: 1.66.98.4 $ PATCH_10.20 (PHKL_10757) /usr/conf/lib/libhp-ux.a(lbcopy.o): lbcopy.s $Date: 97/05/02 16:44:13 $ $Revision: 1.7. 98.6 $ PATCH_10.20 (PHKL_10932) /usr/conf/lib/libhp-ux.a(lbzero.o): lbzero.s $Date: 96/11/22 10:57:29 $ $Revision: 1.9. 98.4 $ PATCH_10.20 (PHKL_9151) /usr/conf/lib/libhp-ux.a(lv_config.o): lv_config.c $Date: 97/10/15 15:28:02 $ $Revision: 1. 13.98.7 $ PATCH_10.20 (PHKL_12901) /usr/conf/lib/libhp-ux.a(lv_lvm.o): lv_lvm.c $Date: 97/12/17 14:24:01 $ $Revision: 1.3.9 8.4 $ PATCH_10.20 (PHKL_13247) /usr/conf/lib/libhp-ux.a(lw_scall.o): lw_scall.s $Date: 97/05/02 02:01:00 $ $Revision: 1.18.98.7 $ PATCH_10.20 (PHKL_10757) /usr/conf/lib/libhp-ux.a(machdep.o): machdep.c $Date: 97/09/23 11:23:01 $ $Revision: 1.12 6.98.8 $ PATCH_10.20 (PHKL_12662) /usr/conf/lib/libhp-ux.a(outlaw.o): outlaw.c $Date: 96/11/22 11:17:11 $ $Revision: 1.2.98.3 $ PATCH_10.20 (PHKL_9151) /usr/conf/lib/libhp-ux.a(pgcopy.o): pgcopy.s $Date: 96/11/22 18:05:02 $ $Revision: 1.7. 98.5 $ PATCH_10.20 (PHKL_9151) /usr/conf/lib/libhp-ux.a(pm_clockint.o): pm_clockint.c $Date: 98/01/08 10:02:23 $ $Revision: 1.7.98.8 $ PATCH_10.20 (PHKL_12963) /usr/conf/lib/libhp-ux.a(pm_config.o): pm_config.c $Date: 97/06/17 15:09:55 $ $Revision: 1. 6.98.8 $ PATCH_10.20 (PHKL_11406) /usr/conf/lib/libhp-ux.a(pm_context.o): pm_context.c $Date: 96/08/26 22:35:25 $ $Revision : 1.3.98.6 $ PATCH_10.20 (PHKL_8346) /usr/conf/lib/libhp-ux.a(pm_core.o): pm_core.c $Date: 98/02/09 14:28:20 $ $Revision: 1 .9.98.11 $ PATCH_10.20 (PHKL_14126) /usr/conf/lib/libhp-ux.a(pm_getpid.o): pm_getpid.c $Date: 98/02/02 14:05:16 $ $Revision: 1.6.98.2 $ PATCH_10.20 (PHKL_14012) /usr/conf/lib/libhp-ux.a(pm_policy.o): pm_policy.c $Date: 98/02/02 14:05:19 $ $Revision: 1.7.98.9 $ PATCH_10.20 (PHKL_14012) /usr/conf/lib/libhp-ux.a(pm_proc.o): pm_proc.c $Date: 97/06/11 17:26:34 $ $Revision: 1.13 .98.12 $ PATCH_10.20 (PHKL_11339) /usr/conf/lib/libhp-ux.a(pm_procdup.o): pm_procdup.c $Date: 97/11/18 12:02:39 $ $Revision: 1 .11.98.14 $ PATCH_10.20 (PHKL_13260) /usr/conf/lib/libhp-ux.a(pm_ptrace.o): pm_ptrace.c $Date: 97/05/02 02:03:08 $ $Revision: 1. 6.98.25 $ PATCH_10.20 (PHKL_10757) /usr/conf/lib/libhp-ux.a(pm_resource.o): pm_resource.c $Date: 97/06/11 17:28:51 $ $Revision: 1.7.98.14 $ PATCH_10.20 (PHKL_11339) /usr/conf/lib/libhp-ux.a(pm_rtsched.o): pm_rtsched.c $Date: 97/09/08 22:31:38 $ $Revision: 1 .6.98.4 $ PATCH_10.20 (PHKL_12042) /usr/conf/lib/libhp-ux.a(pm_sendsig.o): pm_sendsig.c $Date: 97/05/02 02:01:02 $ $Revision : 1.4.98.12 $ PATCH_10.20 (PHKL_10757) /usr/conf/lib/libhp-ux.a(pm_signal.o): pm_signal.c $Date: 97/08/08 16:59:26 $ $Revision: 1.6.98.17 $ PATCH_10.20 (PHKL_12073) /usr/conf/lib/libhp-ux.a(pm_swtch.o): pm_swtch.c $Date: 98/01/09 10:23:24 $ $Revision: 1.7.98.20 $ PATCH_10.20 (PHKL_12963) /usr/conf/lib/libhp-ux.a(pm_threads.o): pm_threads.c $Date: 97/05/02 02:03:13 $ $Revision : 1.3.98.11 $ PATCH_10.20 (PHKL_10757) /usr/conf/lib/libhp-ux.a(pm_timers.o): pm_timers.c $Date: 97/09/11 17:55:12 $ $Revision: 1. 7.98.10 $ PATCH_10.20 (PHKL_12409) /usr/conf/lib/libhp-ux.a(protection.o): protection.s $Date: 96/11/22 11:00:38 $ $Revision: 1.10.98.4 $ PATCH_10.20 (PHKL_9151) /usr/conf/lib/libhp-ux.a(pstat.o): pstat.c $Date: 98/01/30 11:43:58 $ $Revision: 1.18.9 8.24 $ PATCH_10.20 (PHKL_14009) /usr/conf/lib/libhp-ux.a(resume.o): resume.s $Date: 96/11/22 11:01:44 $ $Revision: 1.11 .98.4 $ PATCH_10.20 (PHKL_9151) /usr/conf/lib/libhp-ux.a(sem_alpha.o): sem_alpha.c $Date: 96/11/20 16:33:04 $ $Revision: 1.11.98.5 $ PATCH_10.20 (PHKL_9273) /usr/conf/lib/libhp-ux.a(spec_vnops.o): spec_vnops.c $Date: 97/12/24 16:29:57 $ $Revision: 1 .13.98.6 $ PATCH_10.20 (PHKL_13680) /usr/conf/lib/libhp-ux.a(spinlock.o): spinlock.c $Date: 98/02/12 09:33:34 $ $Revision: 1.1 6.98.9 $ PATCH_10.20 (PHKL_14183) /usr/conf/lib/libhp-ux.a(subr_ksleep.o): subr_ksleep.c $Date: 97/05/02 02:03:21 $ $Revisio n: 1.1.98.13 $ PATCH_10.20 (PHKL_10757) /usr/conf/lib/libhp-ux.a(subr_timers.o): subr_timers.c $Date: 97/08/13 17:10:50 $ $Revision: 1.8.98.13 $ PATCH_10.20 (PHKL_12110) /usr/conf/lib/libhp-ux.a(sysV_shm.o): sysV_shm.c $Date: 96/11/20 11:01:21 $ $Revision: 1.54.98.5 $ PATCH_10.20 (PHKL_9075) /usr/conf/lib/libhp-ux.a(trap.o): trap.c $Date: 97/09/23 11:22:02 $ $Revision: 1.16 9.98.14 $ PATCH_10.20 (PHKL_12662) /usr/conf/lib/libhp-ux.a(ulbcopy.o): ulbcopy.s $Date: 97/05/02 17:43:33 $ $Revision: 1.4. 98.8 $ PATCH_10.20 (PHKL_10932) /usr/conf/lib/libhp-ux.a(vfs.o): vfs.c $Date: 98/01/13 00:20:08 $ $Revision: 1.25.98. 14 $ PATCH_10.20 (PHKL_13795) /usr/conf/lib/libhp-ux.a(vfs_bio.o): vfs_bio.c $Date: 98/01/20 18:11:28 $ $Revision: 1.26 .98.22 $ PATCH_10.20 (PHKL_13911) /usr/conf/lib/libhp-ux.a(vfs_dnlc.o): vfs_dnlc.c $Date: 98/01/13 00:22:28 $ $Revision: 1.1 8.98.4 $ PATCH_10.20 (PHKL_13795) /usr/conf/lib/libhp-ux.a(vfs_scalls.o): vfs_scalls.c $Date: 98/02/09 14:29:54 $ $Revision: 1.18.98.18 $ PATCH_10.20 (PHKL_14126) /usr/conf/lib/libhp-ux.a(vfs_vm.o): vfs_vm.c $Date: 97/10/15 14:57:20 $ $Revision: 1.17. 98.18 $ PATCH_10.20 (PHKL_12901) /usr/conf/lib/libhp-ux.a(vfs_vnode.o): vfs_vnode.c $Date: 98/02/09 14:32:04 $ $Revision: 1.14.98.7 $ PATCH_10.20 (PHKL_14126) /usr/conf/lib/libhp-ux.a(vm_fault.o): vm_fault.c $Date: 98/02/02 14:05:21 $ $Revision: 1.22.98.15 $ PATCH_10.20 (PHKL_14012) /usr/conf/lib/libhp-ux.a(vm_kern.o): vm_kern.c $Date: 97/05/20 15:19:14 $ $Revision: 1. 9.98.5 $ PATCH_10.20 (PHKL_11164) /usr/conf/lib/libhp-ux.a(vm_machdep.o): vm_machdep.c $Date: 98/01/13 15:00:59 $ $Revision: 1.157.98.34 $ PATCH_10.20 (PHKL_13795) /usr/conf/lib/libhp-ux.a(vm_machreg.o): vm_machreg.c $Date: 97/11/19 12:38:57 $ $Revision: 1 .17.98.22 $ PATCH_10.20 (PHKL_13260) /usr/conf/lib/libhp-ux.a(vm_mmap.o): vm_mmap.c $Date: 96/11/20 11:02:00 $ $Revision: 1.17.98.14 $ PATCH_10.20 (PHKL_9075) /usr/conf/lib/libhp-ux.a(vm_page.o): vm_page.c $Date: 98/02/02 14:05:23 $ $Revision: 1. 91.98.14 $ PATCH_10.20 (PHKL_14012) /usr/conf/lib/libhp-ux.a(vm_pdir1_1.o): vm_pdir1_1.c $Date: 97/05/02 02:00:37 $ $Revision: 1.3.98.14 $ PATCH_10.20 (PHKL_10757) /usr/conf/lib/libhp-ux.a(vm_pdir2_0.o): vm_pdir2_0.c $Date: 97/06/18 13:12:17 $ $Revision: 1 .3.98.11 $ PATCH_10.20 (PHKL_11408) /usr/conf/lib/libhp-ux.a(vm_pregion.o): vm_pregion.c $Date: 97/04/07 13:34:27 $ $Revision: 1.16.98.13 $ PATCH_10.20 (PHKL_10643) /usr/conf/lib/libhp-ux.a(vm_region.o): vm_region.c $Date: 96/11/20 11:01:58 $ $Revision: 1.20.98.4 $ PATCH_10.20 (PHKL_9075) /usr/conf/lib/libhp-ux.a(vm_sched.o): vm_sched.c $Date: 98/02/02 14:05:25 $ $Revision: 1.58.98.12 $ PATCH_10.20 (PHKL_14012) /usr/conf/lib/libhp-ux.a(vm_superpage.o): vm_superpage.c $Date: 97/07/22 16:29:07 $ $Revisi on: 1.2.98.5 $ PATCH_10.20 (PHKL_11902) /usr/conf/lib/libhp-ux.a(vm_text.o): vm_text.c $Date: 97/03/03 12:25:55 $ $Revision: 1 .56.98.9 $ PATCH_10.20 (PHKL_10257) /usr/conf/lib/libhp-ux.a(vm_vas.o): vm_vas.c $Date: 97/07/07 15:53:17 $ $Revision: 1.18.98.16 $ PATCH_10.20 (PHKL_11696) /usr/conf/lib/libhp-ux.a(vm_vhand.o): vm_vhand.c $Date: 98/02/02 14:05:27 $ $Revision: 1.20.98.7 $ PATCH_10.20 (PHKL_14012) /usr/conf/lib/liblvm.a(lv_block.o): lv_block.c $Date: 97/10/15 15:27:22 $ $Revision: 1.1 3.98.5 $ PATCH_10.20 (PHKL_12901) /usr/conf/lib/liblvm.a(lv_cluster_lock.o): lv_cluster_lock.c $Date: 97/10/15 15:27:47 $ $Revisi on: 1.10.98.5 $ PATCH_10.20 (PHKL_12901) /usr/conf/lib/liblvm.a(lv_defect.o): lv_defect.c $Date: 97/10/15 15:28:20 $ $Revision: 1. 16.98.6 $ PATCH_10.20 (PHKL_12901) /usr/conf/lib/liblvm.a(lv_hp.o): lv_hp.c $Date: 98/02/05 09:21:47 $ $Revision: 1.18.9 8.23 $ PATCH_10.20 (PHKL_14049) /usr/conf/lib/liblvm.a(lv_ioctls.o): lv_ioctls.c $Date: 98/02/09 11:12:09 $ $Revision: 1. 18.98.21 $ PATCH_10.20 (PHKL_14126) /usr/conf/lib/liblvm.a(lv_kdb.o): lv_kdb.c $Date: 97/10/15 17:16:54 $ $Revision: 1.9.9 8.4 $ PATCH_10.20 (PHKL_12901) /usr/conf/lib/liblvm.a(lv_lvsubr.o): lv_lvsubr.c $Date: 97/10/15 15:31:26 $ $Revision: 1. 15.98.17 $ PATCH_10.20 (PHKL_12901) /usr/conf/lib/liblvm.a(lv_malloc.o): lv_malloc.c $Date: 97/10/15 15:31:46 $ $Revision: 1. 11.98.4 $ PATCH_10.20 (PHKL_12901) /usr/conf/lib/liblvm.a(lv_mircons.o): lv_mircons.c $Date: 97/10/15 15:32:02 $ $Revision: 1 .14.98.7 $ PATCH_10.20 (PHKL_12901) /usr/conf/lib/liblvm.a(lv_pbuf.o): lv_pbuf.c $Date: 97/10/15 15:32:20 $ $Revision: 1.11 .98.7 $ PATCH_10.20 (PHKL_12901) /usr/conf/lib/liblvm.a(lv_phys.o): lv_phys.c $Date: 98/02/05 10:20:02 $ $Revision: 1.14 .98.13 $ PATCH_10.20 (PHKL_14049) /usr/conf/lib/liblvm.a(lv_schedule.o): lv_schedule.c $Date: 97/10/15 15:32:55 $ $Revision: 1.18.98.11 $ PATCH_10.20 (PHKL_12901) /usr/conf/lib/liblvm.a(lv_spare.o): lv_spare.c $Date: 97/10/15 15:33:09 $ $Revision: 1.3 .98.6 $ PATCH_10.20 (PHKL_12901) /usr/conf/lib/liblvm.a(lv_strategy.o): lv_strategy.c $Date: 97/10/15 15:33:32 $ $Revision: 1.14.98.8 $ PATCH_10.20 (PHKL_12901) /usr/conf/lib/liblvm.a(lv_stub.o): lv_stub.c $Date: 96/10/25 20:54:05 $ $Revision: 1.13 .98.2 $ PATCH_10.20 (PHKL_8999) /usr/conf/lib/liblvm.a(lv_subr.o): lv_subr.c $Date: 97/10/15 15:33:47 $ $Revision: 1.18 .98.7 $ PATCH_10.20 (PHKL_12901) /usr/conf/lib/liblvm.a(lv_syscalls.o): lv_syscalls.c $Date: 97/12/16 16:36:09 $ $Revision: 1.14.98.9 $ PATCH_10.20 (PHKL_13247) /usr/conf/lib/liblvm.a(lv_vgda.o): lv_vgda.c $Date: 97/10/15 15:34:41 $ $Revision: 1.18 .98.4 $ PATCH_10.20 (PHKL_12901) /usr/conf/lib/liblvm.a(lv_vgsa.o): lv_vgsa.c $Date: 97/10/15 15:35:07 $ $Revision: 1.14 .98.7 $ PATCH_10.20 (PHKL_12901) /usr/conf/lib/liblvm.a(sh_vgsa.o): sh_vgsa.c $Date: 97/06/26 12:07:10 $ $Revision: 1.3 .98.9 $ PATCH_10.20 (PHKL_11561) /usr/conf/lib/liblvm.a(slvm_comm.o): slvm_comm.c $Date: 96/10/25 17:03:40 $ $Revision: 1. 3.98.4 $ PATCH_10.20 (PHKL_8999) /usr/conf/lib/liblvm.a(slvm_schedule.o): slvm_schedule.c $Date: 96/10/25 17:03:49 $ $Revision : 1.3.98.6 $ PATCH_10.20 (PHKL_8999) /usr/conf/lib/libprm.a(kern_fss.o): kern_fss.c $Date: 98/01/08 09:59:27 $ $Revision: 1.11.98.3 $ PATCH_10.20 (PHKL_12963) /usr/conf/lib/libufs.a(ufs_alloc.o): ufs_alloc.c $Date: 97/10/15 16:50:46 $ $Revision: 1. 38.98.8 $ PATCH_10.20 (PHKL_12901) /usr/conf/lib/libufs.a(ufs_vfsops.o): ufs_vfsops.c $Date: 97/12/24 16:07:32 $ $Revision: 1 .20.98.14 $ PATCH_10.20 (PHKL_13680) /usr/conf/lib/libufs.a(ufs_vnops.o): ufs_vnops.c $Date: 98/01/13 00:22:47 $ $Revision: 1. 30.98.21 $ PATCH_10.20 (PHKL_13795) /usr/conf/lib/libvxfs_adv.a(vx_dmattr.o): vx_dmattr.c $Date: 97/10/15 15:06:19 $ $Revision: 1. 2.98.8 $ PATCH_10.20 (PHKL_12901) /usr/conf/lib/libvxfs_adv.a(vx_kdmi.o): vx_kdmi.c $Date: 97/10/15 15:22:37 $ $Revision: 1.2. 98.15 $ PATCH_10.20 (PHKL_12901) /usr/conf/lib/libvxfs_adv.a(vx_reorg.o): vx_reorg.c $Date: 98/01/19 21:01:45 $ $Revision: 1.6 .98.15 $ PATCH_10.20 (PHKL_13874) /usr/conf/lib/libvxfs_adv.a(vx_sample_dmattr.o): vx_sample_dmattr.c $Date: 97/10/15 15:25:55 $ $Revis ion: 1.2.98.9 $ PATCH_10.20 (PHKL_12901) /usr/conf/lib/libvxfs_base.a(vx_alloc.o): vx_alloc.c $Date: 97/10/15 14:58:22 $ $Revision: 1.5 .98.15 $ PATCH_10.20 (PHKL_12901) /usr/conf/lib/libvxfs_base.a(vx_attr.o): vx_attr.c $Date: 97/12/08 10:57:39 $ $Revision: 1.7. 98.12 $ PATCH_10.20 (PHKL_13452) /usr/conf/lib/libvxfs_base.a(vx_bio.o): vx_bio.c $Date: 97/10/15 15:02:52 $ $Revision: 1.7.9 8.11 $ PATCH_10.20 (PHKL_12901) /usr/conf/lib/libvxfs_base.a(vx_bmapext4.o): vx_bmapext4.c $Date: 97/10/15 15:05:13 $ $Revision: 1.2.98.13 $ PATCH_10.20 (PHKL_12901) /usr/conf/lib/libvxfs_base.a(vx_bmaptyped.o): vx_bmaptyped.c $Date: 97/10/15 15:05:31 $ $Revision: 1.2.98.18 $ PATCH_10.20 (PHKL_12901) /usr/conf/lib/libvxfs_base.a(vx_bsdquota.o): vx_bsdquota.c $Date: 98/01/06 13:13:40 $ $Revision: 1.7.98.15 $ PATCH_10.20 (PHKL_13713) /usr/conf/lib/libvxfs_base.a(vx_dmstubs.o): vx_dmstubs.c $Date: 97/10/15 15:07:05 $ $Revision: 1 .2.98.8 $ PATCH_10.20 (PHKL_12901) /usr/conf/lib/libvxfs_base.a(vx_fsetsubr.o): vx_fsetsubr.c $Date: 97/10/15 15:07:36 $ $Revision: 1.2.98.14 $ PATCH_10.20 (PHKL_12901) /usr/conf/lib/libvxfs_base.a(vx_hpuxsubr.o): vx_hpuxsubr.c $Date: 97/10/15 15:20:24 $ $Revision: 1.7.98.14 $ PATCH_10.20 (PHKL_12901) /usr/conf/lib/libvxfs_base.a(vx_iflush.o): vx_iflush.c $Date: 97/10/15 15:19:38 $ $Revision: 1. 6.98.15 $ PATCH_10.20 (PHKL_12901) /usr/conf/lib/libvxfs_base.a(vx_inode.o): vx_inode.c $Date: 97/10/15 15:20:59 $ $Revision: 1.7 .98.20 $ PATCH_10.20 (PHKL_12901) /usr/conf/lib/libvxfs_base.a(vx_itrunc.o): vx_itrunc.c $Date: 97/10/15 15:22:10 $ $Revision: 1. 7.98.19 $ PATCH_10.20 (PHKL_12901) /usr/conf/lib/libvxfs_base.a(vx_lite.o): vx_lite.c $Date: 97/10/15 15:23:00 $ $Revision: 1.4. 98.8 $ PATCH_10.20 (PHKL_12901) /usr/conf/lib/libvxfs_base.a(vx_log.o): vx_log.c $Date: 97/10/15 15:24:16 $ $Revision: 1.6.9 8.7 $ PATCH_10.20 (PHKL_12901) /usr/conf/lib/libvxfs_base.a(vx_mount.o): vx_mount.c $Date: 97/12/24 16:09:57 $ $Revision: 1.7 .98.17 $ PATCH_10.20 (PHKL_13680) /usr/conf/lib/libvxfs_base.a(vx_rdwri.o): vx_rdwri.c $Date: 97/10/15 15:24:56 $ $Revision: 1.7 .98.25 $ PATCH_10.20 (PHKL_12901) /usr/conf/lib/libvxfs_base.a(vx_replay.o): vx_replay.c $Date: 97/10/15 15:25:29 $ $Revision: 1. 2.98.14 $ PATCH_10.20 (PHKL_12901) /usr/conf/lib/libvxfs_base.a(vx_vfsops.o): vx_vfsops.c $Date: 97/12/11 01:03:47 $ $Revision: 1. 7.98.16 $ PATCH_10.20 (PHKL_13508) /usr/conf/lib/libvxfs_base.a(vx_vm.o): vx_vm.c $Date: 97/10/15 15:26:32 $ $Revision: 1.7.98 .16 $ PATCH_10.20 (PHKL_12901) /usr/conf/lib/libvxfs_base.a(vx_vnops.o): vx_vnops.c $Date: 97/10/15 15:26:53 $ $Revision: 1.8 .98.25 $ PATCH_10.20 (PHKL_12901) /usr/conf/machine/reg.h: $Revision: 1.16.98.3 $ */ reg.h $Date: 97/11/18 12:00:25 $ $Revision: 1.16.98. 3 $ PATCH_10.20 (PHKL_13260) /usr/conf/master.d/core-hpux: core-hpux $Date: 97/06/17 16:43:58 $ $Revision: 1. 6.98.15 $ PATCH_10.20 (PHKL_11406) /usr/conf/space.h.d/core-hpux.h: core-hpux.h $Date: 98/01/08 10:02:47 $ $Revision: 1.6.98.14 $ PATCH_10.20 (PHKL_12963) /usr/conf/space.h.d/flkmgr_globals.h: flkmgr_globals.h $Date: 98/02/02 14:03:23 $ $Revisio n: 1.1.98.3 $ PATCH_10.20 (PHKL_14012) /usr/include/dmapi.h: dmapi.h: $Revision: 1.2.98.7 $ $Date: 97/09/02 13:03 :46 $ dmapi.h $Date: 97/09/02 13:03:46 $ $Revision: 1. 2.98.7 $ PATCH_10.20 (PHKL_12088) src/kernel/dmapi/dmapi.h 2.12 14 Aug 1996 18:51:12 - */ /usr/include/machine/reg.h: $Revision: 1.16.98.3 $ */ reg.h $Date: 97/11/18 12:00:25 $ $Revision: 1.16.98. 3 $ PATCH_10.20 (PHKL_13260) /usr/include/sys/audit.h: audit.h $Date: 97/04/21 13:54:38 $ $Revision: 1.10.98.5 $ PATCH_10.20 (PHKL_10800) /usr/include/sys/dnlc.h: dnlc.h $Date: 97/09/02 15:03:34 $ $Revision: 1.4.98 .3 $ PATCH_10.20 (PHKL_12378) /usr/include/sys/fs/vx_hpux.h: vx_hpux.h: $Revision: 1.7.98.14 $ $Date: 97/09/03 09 :28:45 $ PATCH_10.20 (PHKL_12088) src/kernel/vxfs/vx_hpux.h 2.14.4.3 30 Jul 1996 17:05 :11 - */ fshp:src/kernel/vxfs/vx_hpux.h 2.14.4.3 /usr/include/sys/fss.h: fss.h $Date: 98/01/08 14:50:28 $ $Revision: 1.5.9 8.4 $ PATCH_10.20 (PHKL_12963) fss.h: $Revision: 1.5.98.4 $ $Date: 98/01/08 14:50:2 8 $ cksum(1) Output: 1849128454 8068 /usr/conf/h/_flkmgr.h 309306691 13103 /usr/conf/h/audit.h 2131780918 1777 /usr/conf/h/dnlc.h 2593525881 3565 /usr/conf/h/fss.h 2308637956 48664 /usr/conf/lib/libdmapi.a(kdm_core.o) 3851147702 1784 /usr/conf/lib/libdmapi.a(vx_dmattr_table.o) 538984117 20076 /usr/conf/lib/libhp-ux.a(asm_rv.o) 3109290296 7640 /usr/conf/lib/libhp-ux.a(asm_scall.o) 1231112847 18512 /usr/conf/lib/libhp-ux.a(asm_utl.o) 1918067463 19548 /usr/conf/lib/libhp-ux.a(asm_vm.o) 1650397953 4584 /usr/conf/lib/libhp-ux.a(asm_vm_pdir.o) 1908120037 11228 /usr/conf/lib/libhp-ux.a(audctl.o) 3455675956 4668 /usr/conf/lib/libhp-ux.a(bcopy.o) 4158269677 10276 /usr/conf/lib/libhp-ux.a(btlb.o) 4124458617 2432 /usr/conf/lib/libhp-ux.a(bzero.o) 1053092530 19912 /usr/conf/lib/libhp-ux.a(clock.o) 4114346575 11604 /usr/conf/lib/libhp-ux.a(cpd.o) 797819625 12752 /usr/conf/lib/libhp-ux.a(dump.o) 1748908507 8704 /usr/conf/lib/libhp-ux.a(dump_conf.o) 1084924137 8028 /usr/conf/lib/libhp-ux.a(flipper.o) 1330619261 3240 /usr/conf/lib/libhp-ux.a(flkmgr_hp.o) 3189247447 13408 /usr/conf/lib/libhp-ux.a(hdl_fault.o) 555026448 6348 /usr/conf/lib/libhp-ux.a(hdl_init.o) 4283888750 15772 /usr/conf/lib/libhp-ux.a(hdl_mprotect.o) 272165154 12020 /usr/conf/lib/libhp-ux.a(hdl_policy.o) 2718340289 10016 /usr/conf/lib/libhp-ux.a(hdl_trans.o) 3231555571 18508 /usr/conf/lib/libhp-ux.a(init_main.o) 3476683986 6584 /usr/conf/lib/libhp-ux.a(interrupt.o) 1062453135 5180 /usr/conf/lib/libhp-ux.a(kern_acct.o) 1125379815 16964 /usr/conf/lib/libhp-ux.a(kern_exec.o) 2229502215 17528 /usr/conf/lib/libhp-ux.a(kern_exit.o) 3691736042 16348 /usr/conf/lib/libhp-ux.a(kern_fork.o) 50317043 6492 /usr/conf/lib/libhp-ux.a(kern_kload.o) 4163060998 3948 /usr/conf/lib/libhp-ux.a(kern_mman.o) 2216617969 10284 /usr/conf/lib/libhp-ux.a(kern_sig.o) 3276898957 6160 /usr/conf/lib/libhp-ux.a(lbcopy.o) 300166288 2428 /usr/conf/lib/libhp-ux.a(lbzero.o) 630638081 26628 /usr/conf/lib/libhp-ux.a(lv_config.o) 1237596189 156552 /usr/conf/lib/libhp-ux.a(lv_lvm.o) 228543399 7008 /usr/conf/lib/libhp-ux.a(lw_scall.o) 2111739438 30444 /usr/conf/lib/libhp-ux.a(machdep.o) 2457463992 3348 /usr/conf/lib/libhp-ux.a(outlaw.o) 3029803182 2988 /usr/conf/lib/libhp-ux.a(pgcopy.o) 807433184 6308 /usr/conf/lib/libhp-ux.a(pm_clockint.o) 1701549902 5388 /usr/conf/lib/libhp-ux.a(pm_config.o) 3811483497 2236 /usr/conf/lib/libhp-ux.a(pm_context.o) 3785773729 6872 /usr/conf/lib/libhp-ux.a(pm_core.o) 2304745347 2580 /usr/conf/lib/libhp-ux.a(pm_getpid.o) 3187550439 16408 /usr/conf/lib/libhp-ux.a(pm_policy.o) 3933929381 17908 /usr/conf/lib/libhp-ux.a(pm_proc.o) 2742363982 6684 /usr/conf/lib/libhp-ux.a(pm_procdup.o) 3682830469 15732 /usr/conf/lib/libhp-ux.a(pm_ptrace.o) 775863340 7076 /usr/conf/lib/libhp-ux.a(pm_resource.o) 4277200061 8728 /usr/conf/lib/libhp-ux.a(pm_rtsched.o) 1066734922 16212 /usr/conf/lib/libhp-ux.a(pm_sendsig.o) 4157339108 11544 /usr/conf/lib/libhp-ux.a(pm_signal.o) 4206257236 20536 /usr/conf/lib/libhp-ux.a(pm_swtch.o) 3233056101 12032 /usr/conf/lib/libhp-ux.a(pm_threads.o) 1547729896 6456 /usr/conf/lib/libhp-ux.a(pm_timers.o) 18384036 11264 /usr/conf/lib/libhp-ux.a(protection.o) 2330409141 24000 /usr/conf/lib/libhp-ux.a(pstat.o) 2317800830 3876 /usr/conf/lib/libhp-ux.a(resume.o) 3665684469 9532 /usr/conf/lib/libhp-ux.a(sem_alpha.o) 3000964407 16992 /usr/conf/lib/libhp-ux.a(spec_vnops.o) 1179856871 18256 /usr/conf/lib/libhp-ux.a(spinlock.o) 3306390220 10616 /usr/conf/lib/libhp-ux.a(subr_ksleep.o) 1319709682 10572 /usr/conf/lib/libhp-ux.a(subr_timers.o) 925297696 8712 /usr/conf/lib/libhp-ux.a(sysV_shm.o) 1671896846 23616 /usr/conf/lib/libhp-ux.a(trap.o) 3959296490 6328 /usr/conf/lib/libhp-ux.a(ulbcopy.o) 3120713060 20444 /usr/conf/lib/libhp-ux.a(vfs.o) 3713873505 29044 /usr/conf/lib/libhp-ux.a(vfs_bio.o) 3897607434 8616 /usr/conf/lib/libhp-ux.a(vfs_dnlc.o) 2911854326 31728 /usr/conf/lib/libhp-ux.a(vfs_scalls.o) 1439345029 29828 /usr/conf/lib/libhp-ux.a(vfs_vm.o) 1482457387 8920 /usr/conf/lib/libhp-ux.a(vfs_vnode.o) 482152261 13384 /usr/conf/lib/libhp-ux.a(vm_fault.o) 1473182150 10480 /usr/conf/lib/libhp-ux.a(vm_kern.o) 1962971277 92676 /usr/conf/lib/libhp-ux.a(vm_machdep.o) 2851321488 15524 /usr/conf/lib/libhp-ux.a(vm_machreg.o) 133406500 21604 /usr/conf/lib/libhp-ux.a(vm_mmap.o) 2208932717 21312 /usr/conf/lib/libhp-ux.a(vm_page.o) 290807052 30900 /usr/conf/lib/libhp-ux.a(vm_pdir1_1.o) 1469266556 53368 /usr/conf/lib/libhp-ux.a(vm_pdir2_0.o) 1265397058 12324 /usr/conf/lib/libhp-ux.a(vm_pregion.o) 1266053234 11316 /usr/conf/lib/libhp-ux.a(vm_region.o) 692138061 25108 /usr/conf/lib/libhp-ux.a(vm_sched.o) 1951534836 9992 /usr/conf/lib/libhp-ux.a(vm_superpage.o) 2800961341 14444 /usr/conf/lib/libhp-ux.a(vm_text.o) 1841465344 13360 /usr/conf/lib/libhp-ux.a(vm_vas.o) 1688897665 14904 /usr/conf/lib/libhp-ux.a(vm_vhand.o) 2971522811 2632 /usr/conf/lib/liblvm.a(lv_block.o) 303437109 9964 /usr/conf/lib/liblvm.a(lv_cluster_lock.o) 1367795889 12596 /usr/conf/lib/liblvm.a(lv_defect.o) 3642132938 83136 /usr/conf/lib/liblvm.a(lv_hp.o) 2492887117 32424 /usr/conf/lib/liblvm.a(lv_ioctls.o) 872237003 720 /usr/conf/lib/liblvm.a(lv_kdb.o) 1466831003 36100 /usr/conf/lib/liblvm.a(lv_lvsubr.o) 2374339579 2544 /usr/conf/lib/liblvm.a(lv_malloc.o) 4288668251 17420 /usr/conf/lib/liblvm.a(lv_mircons.o) 2331070456 6576 /usr/conf/lib/liblvm.a(lv_pbuf.o) 1800616120 7736 /usr/conf/lib/liblvm.a(lv_phys.o) 294142816 26368 /usr/conf/lib/liblvm.a(lv_schedule.o) 1405315567 36420 /usr/conf/lib/liblvm.a(lv_spare.o) 3767976309 7176 /usr/conf/lib/liblvm.a(lv_strategy.o) 4115391771 732 /usr/conf/lib/liblvm.a(lv_stub.o) 2518086102 10064 /usr/conf/lib/liblvm.a(lv_subr.o) 1101210836 13616 /usr/conf/lib/liblvm.a(lv_syscalls.o) 1382667354 9108 /usr/conf/lib/liblvm.a(lv_vgda.o) 3655615117 12600 /usr/conf/lib/liblvm.a(lv_vgsa.o) 58167558 42028 /usr/conf/lib/liblvm.a(sh_vgsa.o) 2159002800 27264 /usr/conf/lib/liblvm.a(slvm_comm.o) 4188283521 6724 /usr/conf/lib/liblvm.a(slvm_schedule.o) 2592552461 8200 /usr/conf/lib/libprm.a(kern_fss.o) 2981279314 17624 /usr/conf/lib/libufs.a(ufs_alloc.o) 1737409253 20556 /usr/conf/lib/libufs.a(ufs_vfsops.o) 547764375 35452 /usr/conf/lib/libufs.a(ufs_vnops.o) 760609908 2964 /usr/conf/lib/libvxfs_adv.a(vx_dmattr.o) 1161747513 24748 /usr/conf/lib/libvxfs_adv.a(vx_kdmi.o) 3486377848 20588 /usr/conf/lib/libvxfs_adv.a(vx_reorg.o) 3582414206 4592 /usr/conf/lib/ libvxfs_adv.a(vx_sample_dmattr.o) 3334723579 28228 /usr/conf/lib/libvxfs_base.a(vx_alloc.o) 3079465245 37688 /usr/conf/lib/libvxfs_base.a(vx_attr.o) 3014150328 10452 /usr/conf/lib/libvxfs_base.a(vx_bio.o) 2280461010 10824 /usr/conf/lib/libvxfs_base.a(vx_bmapext4.o) 1802836350 18340 /usr/conf/lib/ libvxfs_base.a(vx_bmaptyped.o) 3341046136 29164 /usr/conf/lib/libvxfs_base.a(vx_bsdquota.o) 1851387969 4928 /usr/conf/lib/libvxfs_base.a(vx_dmstubs.o) 2357795855 21168 /usr/conf/lib/libvxfs_base.a(vx_fsetsubr.o) 1502964316 16292 /usr/conf/lib/libvxfs_base.a(vx_hpuxsubr.o) 3531998086 29724 /usr/conf/lib/libvxfs_base.a(vx_iflush.o) 347435613 44852 /usr/conf/lib/libvxfs_base.a(vx_inode.o) 1839120165 14412 /usr/conf/lib/libvxfs_base.a(vx_itrunc.o) 1857910709 3600 /usr/conf/lib/libvxfs_base.a(vx_lite.o) 945378166 9620 /usr/conf/lib/libvxfs_base.a(vx_log.o) 4248027441 28396 /usr/conf/lib/libvxfs_base.a(vx_mount.o) 4227507470 35424 /usr/conf/lib/libvxfs_base.a(vx_rdwri.o) 1686960615 7052 /usr/conf/lib/libvxfs_base.a(vx_replay.o) 2409040095 15220 /usr/conf/lib/libvxfs_base.a(vx_vfsops.o) 3054202871 11924 /usr/conf/lib/libvxfs_base.a(vx_vm.o) 1359133065 26564 /usr/conf/lib/libvxfs_base.a(vx_vnops.o) 2426350973 5075 /usr/conf/machine/reg.h 245948872 16914 /usr/conf/master.d/core-hpux 3176197915 19033 /usr/conf/space.h.d/core-hpux.h 1447084439 1119 /usr/conf/space.h.d/flkmgr_globals.h 1315928410 16548 /usr/include/dmapi.h 2426350973 5075 /usr/include/machine/reg.h 309306691 13103 /usr/include/sys/audit.h 2131780918 1777 /usr/include/sys/dnlc.h 1556434298 9724 /usr/include/sys/fs/vx_hpux.h 2593525881 3565 /usr/include/sys/fss.h Patch Conflicts: None Patch Dependencies: s700: 10.20: PHCO_12922 PHCO_8871 PHNE_13245 Hardware Dependencies: None Other Dependencies: None Supersedes: PHKL_7776 PHKL_7870 PHKL_7899 PHKL_7951 PHKL_8084 PHKL_8203 PHKL_8294 PHKL_8331 PHKL_8346 PHKL_8481 PHKL_8532 PHKL_8683 PHKL_8716 PHKL_8953 PHKL_8999 PHKL_9075 PHKL_9151 PHKL_9153 PHKL_9273 PHKL_9361 PHKL_9365 PHKL_9370 PHKL_9372 PHKL_9517 PHKL_9529 PHKL_9569 PHKL_9711 PHKL_9909 PHKL_9919 PHKL_9931 PHKL_10064 PHKL_10176 PHKL_10199 PHKL_10234 PHKL_10257 PHKL_10288 PHKL_10316 PHKL_10452 PHKL_10554 PHKL_10643 PHKL_10675 PHKL_10689 PHKL_10757 PHKL_10800 PHKL_10821 PHKL_10930 PHKL_10932 PHKL_10953 PHKL_10966 PHKL_11006 PHKL_11013 PHKL_11039 PHKL_11055 PHKL_11085 PHKL_11164 PHKL_11238 PHKL_11244 PHKL_11247 PHKL_11321 PHKL_11339 PHKL_11358 PHKL_11406 PHKL_11408 PHKL_11471 PHKL_11519 PHKL_11561 PHKL_11607 PHKL_11614 PHKL_11637 PHKL_11696 PHKL_11730 PHKL_11733 PHKL_11766 PHKL_11860 PHKL_11902 PHKL_12042 PHKL_12073 PHKL_12088 PHKL_12100 PHKL_12110 PHKL_12217 PHKL_12378 PHKL_12397 PHKL_12409 PHKL_12601 PHKL_12633 PHKL_12662 PHKL_12669 PHKL_12901 PHKL_12963 PHKL_12997 PHKL_13155 PHKL_13206 PHKL_13237 PHKL_13247 PHKL_13260 PHKL_13305 PHKL_13452 PHKL_13508 PHKL_13680 PHKL_13684 PHKL_13713 PHKL_13761 PHKL_13768 PHKL_13795 PHKL_13874 PHKL_13911 PHKL_14009 PHKL_14012 PHKL_14049 PHKL_14126 Equivalent Patches: PHKL_14184: s800: 10.20 Patch Package Size: 2620 KBytes Installation Instructions: Please review all instructions and the Hewlett-Packard SupportLine User Guide or your Hewlett-Packard support terms and conditions for precautions, scope of license, restrictions, and, limitation of liability and warranties, before installing this patch. ------------------------------------------------------------ 1. Back up your system before installing a patch. 2. Login as root. 3. Copy the patch to the /tmp directory. 4. Move to the /tmp directory and unshar the patch: cd /tmp sh PHKL_14183 5a. For a standalone system, run swinstall to install the patch: swinstall -x autoreboot=true -x match_target=true \ -s /tmp/PHKL_14183.depot 5b. For a homogeneous NFS Diskless cluster run swcluster on the server to install the patch on the server and the clients: swcluster -i -b This will invoke swcluster in the interactive mode and force all clients to be shut down. WARNING: All cluster clients must be shut down prior to the patch installation. Installing the patch while the clients are booted is unsupported and can lead to serious problems. The swcluster command will invoke an swinstall session in which you must specify: alternate root path - default is /export/shared_root/OS_700 source depot path - /tmp/PHKL_14183.depot To complete the installation, select the patch by choosing "Actions -> Match What Target Has" and then "Actions -> Install" from the Menubar. 5c. For a heterogeneous NFS Diskless cluster: - run swinstall on the server as in step 5a to install the patch on the cluster server. - run swcluster on the server as in step 5b to install the patch on the cluster clients. By default swinstall will archive the original software in /var/adm/sw/patch/PHKL_14183. If you do not wish to retain a copy of the original software, you can create an empty file named /var/adm/sw/patch/PATCH_NOSAVE. Warning: If this file exists when a patch is installed, the patch cannot be deinstalled. Please be careful when using this feature. It is recommended that you move the PHKL_14183.text file to /var/adm/sw/patch for future reference. To put this patch on a magnetic tape and install from the tape drive, use the command: dd if=/tmp/PHKL_14183.depot of=/dev/rmt/0m bs=2k Special Installation Instructions: CAUTION: Failure to follow the instructions in this section could result in undesired system behavior up to and includ- ing data corruption or a system panic! This kernel patch needs to work with the command patch PHCO_12922; please install PHCO_12922 with this patch. Installed alone, this kernel patch will not solve the fsck problem. --- If you are planning to install the advanced VxFS product (AdvJournalFS.VXFS-ADV-KRN), it is imperative that this patch, and all listed superseded patches, be removed from the system via swremove(1M) before the actual product installation. After the installation of the advanced VxFS product has completed, this patch can be re-installed. (It is not necessary to re-install superseded patches.) All patches listed in the Supersedes field are subject to this behavior and need to be removed before installing the advanced VxFS product. After running swremove(1M), use the swlist(1M) command to insure that none of the previous patches were restored during the removal process. If one was, remove it using swremove(1M). --- When this patch is installed the default environment size is 20478 bytes. To enable the system to use the larger environment size of 2048000 bytes, the following steps must be followed. 1. A new tunable called `large_ncargs_enabled' must be defined in the sytem file in the following manner large_ncargs_enabled 1 2. A new kernel must be built (using this system file) and the system rebooted. To return to the default environment size, the new tunable needs to be either removed from the system file, or its value set to zero. A new kernel should then be built (using the modified system file) and the machine rebooted. --- Due to the number of objects in this patch, the customization phase of the update may take more than 10 minutes. During that time the system will not appear to make forward progress, but it will actually be installing the objects.