Patch Name: PHNE_18965 Patch Description: s700 10.24 (VVOS) ARPA Transport cumulative patch Creation Date: 99/06/22 Post Date: 99/06/30 Hardware Platforms - OS Releases: s700: 10.24 Products: N/A Filesets: OS-Core.CORE-KRN VirtualVaultOS.VVOS-KRN Networking.NET-KRN Networking.NET-RUN Automatic Reboot?: Yes Status: General Release Critical: Yes PHNE_18965: PANIC Based on HP-UX patch PHNE_17731: PANIC Based on HP-UX patch PHNE_17096: PANIC Based on HP-UX patch PHNE_16237: PANIC Based on HP-UX patch PHNE_15581: PANIC Based on HP-UX patch PHNE_14916: PANIC PHNE_15733: HANG PHNE_14735: PANIC Based on a portion of HP-UX PHNE_14504: PANIC Based on a portion of HP-UX PHNE_13469: PANIC Based on a portion of HP-UX PHNE_13289: PANIC Based on a portion of HP-UX PHNE_13245: PANIC Based on a portion of HP-UX PHNE_12407: PANIC Based on a portion of HP-UX PHNE_11530: PANIC Based on a portion of HP-UX PHNE_9106: PANIC Based on a portion of HP-UX PHNE_9098: PANIC Based on a portion of HP-UX PHNE_9036: PANIC Path Name: /hp-ux_patches/s700/10.X/PHNE_18965 Symptoms: PHNE_18965: Port HP-UX patch PHNE_17731 to VVOS. Based on HP-UX patch PHNE_17731: This patch replaces PHNE_17096 See Defect Description Based on HP-UX patch PHNE_17096: See Defect Description Based on HP-UX patch PHNE_16237: See Defect Description Based on HP-UX patch PHNE_15581: See Defect Description Based on HP-UX patch PHNE_14916: See Defect Description Based on HP-UX patch PHNE_14504: See Defect Description Based on HP-UX patch PHNE_13469: See Defect Description Based on HP-UX patch PHNE_13289: See Defect Description Based on HP-UX patch PHNE_13245: See Defect Description Based on HP-UX patch PHNE_12407: See Defect Description Based on HP-UX patch PHNE_11530: See Defect Description Based on HP-UX patch PHNE_9106: See Defect Description Based on HP-UX patch PHNE_9098: See Defect Description Based on HP-UX patch PHNE_9036: See Defect Description PHNE_17413: No visible symptoms. PHNE_15733: Network may hang when an application forks off multiple children that call accept() on the same socket. PHNE_14735: Socket send(2) returning ENOLINK. Transient TCP error conditions are reported to the application. PHNE_13888: Repackaged part of HP-UX patch PHNE_13469 for VVOS. Based on a portion of HP-UX patch PHNE_13469: This patch replaces PHNE_13289. See Defect Description PHKL_12391: symlink system call audit records incorrectly contain the link name as the target name. unlink and execve system call audit records contain incorrect object sensitivity labels. PHNE_11306: Provides a mechanism that causes accept() to filter connection requests based on the attributes of the process issuing the connect() request. The filtering is transparent to both the processes involved. This mechanism is extended to udp, and the filtering is performed when a packet is received. PHNE_11096: Force TCP SYN Attack protection to be the default configuration setting. PHNE_10476: Allows multilevelserver tcp endpoints to be accessed from the outside interface, when there is no filtering router present. Excessive audit records generated as a result of using non-blocking system calls. TCP does not use random sequence numbers by default. PHNE_10471: See Defect Description. PHNE_10325: VVOS MP system panics when certain trusted programs are executed. PHNE_10161: Based on a portion of HP-UX patch PHKL_9098: A syn attack can result in Denial Of Service (DOS) to legitimate users. Defect Description: PHNE_18965: Port HP-UX patch PHNE_17731 to VVOS. Based on HP-UX patch PHNE_17731: ( SR not found ; DTS number: JAGaa26722 ) if an application passes a local sockaddr_in structure to the bind system call without clearing the uninitialized parts, then bind will sometimes fail. ( SR not found ; DTS number: JAGaa26762 ) ntimo_init() is being called twice during boot-time initialization. ( SR number: 5003382861 ; DTS number: JAGaa26905 ) None of the arp cache entries are absolutely permanent.Even the permanent entries get modified if the ARP code notices a different MAC address. ( SR not found ; DTS number: JAGaa27038 ) Implicit UDP connect results in using port number zero, when all the dynamic ports are in use. ( SR number: 5003406975 ; DTS number: JAGaa27184 ) Connection is never terminated by hpux if it the remote side is no longer accesible, e.g. PC client is powred off. ( SR not found ; DTS number: JAGaa27216 ) Potential race between systems during a connect can hang the systems or make them very slow. ( SR number: 5003443655 ; DTS number: JAGaa44124 ) The number of outstanding xti connection indications can exceed the backlog limit set by an application thus causing the tli library to fail a t_listen() with the TQFULL error. ( SR number: 1653286641 ; DTS number: JAGaa44778 ) HP-UX is not returning the correct error when recvmsg runs out of file descriptors(when rights are received) ( SR number: 5003425660 ; DTS number: JAGaa45145 ) sendto() for a multicast datagram fails with ENETUNREACH if the default route is not specified , even when the multicast interface has been provided. ( SR number: 1653248880 ; DTS number: INDaa29722 ) Panic caused with the following stack when the customer tried to delete an interface. panic() report_trap_or_int_and_panic() trap() $RDB_trap_patch() sounlock() in_notify_delete_ifaddr() in_siocdelifaddr() in_control() udp_usrreq() ifioctl() soo_ioctl() ioctl() syscall() $syscallrtn ( SR number: 1653205393 ; DTS number: JAGaa26791 ) Syslog filling up with duplicate IP address 0.0.0.0 with messages on the console ARP packet duplicate IP address: 0.0.0.0 from 0020-afc9-d660 ARP packet duplicate IP address: 0.0.0.0 from 00a0-24f0-2766 Based on HP-UX patch PHNE_17096: ( SR number: 1653174441 ; DTS number: INDaa25119 ) nettune does not support the configuration of tcp_fin_wait_timer. ( SR number: 5003366849 ; DTS number: INDaa27541 ) PMTU is not being resized when clients are attaching to the secondary address. ( SR number: 5003430827 ; DTS number: INDaa31460 ) Panic in nmget_tcpCurrEstab(), with the stack traces of the events(0&1) as follows stack trace for event 0 crash event was a panic panic+0x10 report_trap_or_int_and_panic+0xe8 $call_trap+0x20 nmget_tcpCurrEstab+0x38 nmget_tcp+0x354 nmget+0x6c nm_ioctl+0x54 spec_ioctl+0xd4 vno_ioctl+0x98 ioctl+0x444 syscall+0x1a4 $syscallrtn+0x0 stack trace for event 1 crash event was a TOC wait_for_lock_spinner+0x2d4 wait_for_lock_4way+0x2c slu_retry+0x18 in_pcbbind+0x58 tcp_usrreq+0xb48 sobind+0x6c bind+0x6c syscall+0x1a4 $syscallrtn+0x0 ( SR number: 5003433490 ; DTS number: INDaa31638 ) System may panic with the following stack; panic+0x0010 report_trap_or_int_and_panic+0x008c trap+0x072c $thndlr_rtn+0x0000 sounlock+0x00ac ckuwakeup+0x004c net_callout+0x0078 netisr_netisr+0x01ac netisr_daemon+0x0118 main+0x0900 $ vstart+0x003d ( SR not found ; DTS number: JAGaa26869 ) MP systems sometimes panic with the following stack on receiving an ICMP_REDIRECT: in_pcbfree mp_in_pcbnotify in_pcbnotify tcp_ctlinput pfctlinput icmp_input ipintr netisr_netisr. ( SR not found ; DTS number: JAGaa27023 ) TCP/UDP send and receive buffers cannot be set to SB_MAX. ( SR number: 5003421560 ; DTS number: JAGaa27114 ) In sendmsg(), if the data size specified is larger than the send buffer size with the rights specified, there is a data loss. ( SR number: 4701404590 ; DTS number: JAGaa41628 ) When a dynamic host route is added by the OS then it panics sometimes if the socket that is using that route is terminated. ( SR not found ; DTS number: JAGaa41637 ) There is no way currently to retrieve the IP type of service value stored in the IP packet that contains the SYN at connection time. ( SR number: 5003443713 ; DTS number: JAGaa44208 ) A number of tcp connections are stuck in TIME_WAIT state and never get cleaned up because the value of tcp_keepstart is tuned to 5 seconds. ( SR number: 1653286146 ; DTS number: JAGaa44500 ) HP-UX panics intermittently with the following panic string: "panic: sbdrop". Based on HP-UX patch PHNE_16237: ( SR not found ; DTS number: INDaa22630 ) An error "Invalid argument" returned from setsockopt(): rc = setsockopt(tp->task_socket, level, opt, ptr, len) with the parms: tp->task_socket = 12; level = IPPROTO_IP; ==> 0 opt = IP_RECVDSTADDR; ==> 4103 len = 4; The socket() call parms are socket(domain, type, proto) where domain = AF_INET, type = SOCK _DGRAM, proto = 0 ( SR number: 5003396937 ; DTS number: INDaa29248 ) nettune does not support disabling of IP Directed broadcast forwarding. ( SR number: 5003423665 ; DTS number: INDaa30931 ) After an IP packet with source route or record route options is received, the system may panic in wait_for_lock_spinner() called from ip_rtaddr(), ip_output(), or elsewhere. ( SR number: 5003429464 ; DTS number: INDaa31420 ) The system panics with one of the two stacks (listed below) while running with AF_UNIX sockets. Either: panic() m_free() m_freem() uipc_usrreq() soo_stat() fstat_common() fstat() syscall() $syscallrtn() or: sounlock() mp_socket_unlock() uipc_usrreq() sosend() sendit() sendto() syscall() $syscallrtn() Based on HP-UX patch PHNE_15581: ( SR number: 5003417410 ; DTS number: INDaa30415 ) IP multicasting does not work in a SG environment after a local network interface switch. ( SR number: 5003417477 ; DTS number: INDaa30445 ) Network may hang indefinitely when ARP interrupt queue is full. When it happens, the netisr may be idle and yet the ARP input interrupt queue is also full. ( SR number: 5003418228 ; DTS number: INDaa30448 ) The UDP checksum may not be set on outgoing IP multicast datagrams. This may happen if the IP_MULTICAST_IF socket option has been used to set an outgoing interface which does not support the checksum-offload (CKO) feature, and the datagram would have otherwise been sent out an interface which does support CKO. Based on HP-UX patch PHNE_14916: ( SR number: 5003294777 ; DTS number: INDaa23011 ) netstat -m occasionally reports unbelievable statistics, e.g.: "4294967270 mapped pages in use" ( SR not found ; DTS number: INDaa30014 ) HP-UX does not have token ring multicast support for drivers that support multicasting. ( SR number: 5003409268 ; DTS number: INDaa30038 ) UDP datagrams are occasionally being dropped on MP machines running 10.20. An inbound UDP packet which is sent to a valid local port results in the system returning an ICMP_UNREACH_PORT ICMP message. This occurs when the system is sending a UDP packet from the local port at the same time that the inbound packet arrives. ( SR number: 5003411926 ; DTS number: INDaa30157 ) A panic can occur in sounlock() because of a race between two processes trying to access the same AF_UNIX socket. The stack trace is: sounlock unp_connect uipc_usrreq soconnect connect syscall Based on HP-UX patch PHNE_14504: ( SR number: 1653232538 ; DTS number: INDaa28825 ) udp_usrreq cause system panic ( SR number: 4701371914 ; DTS number: INDaa28993 ) HP-UX does not have support for a socket API interface to get the TCP state. ( SR number: 5003401802 ; DTS number: INDaa29743 ) Bad mbuf offset alignment causes Data memory protection fault panic in icmp_error(). Stack Trace : ----------- Data memory protection fault panic+0x10 report_trap_or_int_and_panic+0xe8 interrupt+0x458 $ihndlr_rtn+0x0 icmp_error+0x244 ip_dooptions+0x260 ipintr+0xc2c netisr_netisr+0x208 netisr+0x28 inttr_emulate_save_fpu+0xf0 ni_write+0x364 spec_rdwr+0x69c vno_rw+0xb8 rwuio+0xc4 writev+0xb0 syscall+0x1a4 ( SR number: 5003408328 ; DTS number: INDaa29959 ) A system that has packets coming in on one interface type (i.e. Ethernet) and going out on another interface type (i.e. FDDI) can panic with a message of "m_free: freeing free mbuf". The stack trace is: panic+0x10 m_free+0x28 m_freem_train+0x1c unicast_ippkt+0x71c arp_resolve+0x288 lanc_if_output+0x48 ip_output+0x60c udp_output+0x1f8 ku_sendto_mbuf+0x8c svckudp_send+0x158 svc_sendreply+0x5c svckudp_send+0x158 svc_sendreply+0x5c Based on HP-UX patch PHNE_13469: ( SR number: 5003366906 ; DTS number: INDaa27509 ) Netstat -m displays an incorrect number of socket structures. ( SR number: 1653234245 ; DTS number: INDaa28951 ) When Service Guard requests a switch between two interfaces and the TARGET is not available, the ifnet structures may become corrupted. The system will crash when these structures are used later. ( SR number: 1653239764 ; DTS number: INDaa29253 ) If there is at least one IP packet on the ipintrq, one processor on an MP machine will do nothing but run netisr. Networking may be slow or appear to not work at all. The same problem causes single-processor machines to appear to be hung, but the machines will respond to ping. Netstat will show at least one SYN_RCVD socket where the local and remote addresses and ports are the same. Based on HP-UX patch PHNE_13289: ( SR number: 1653227116 ; DTS number: INDaa28439 ) The TCP retransmission timer range is not tuneable. Based on HP-UX patch PHNE_13245: ( SR number: 4701350173 ; DTS number: INDaa26913 ) The system panics during start-up due to a lack of defensive checks in IP interrupt processing. ( SR number: 5003361691 ; DTS number: INDaa27808 ) Nettune cannot tune sb_max. ( SR number: 5003379529 ; DTS number: INDaa27952 ) A customer wants to have more available IP addresses than what RFC 1122 will allow. ( SR number: 5003384719 ; DTS number: INDaa28504 ) A customer is running out of outbound ports, since the system is bounded by the port numbers 1024 to 5000. ( SR number: 1653229633 ; DTS number: INDaa28537 ) When using Service Guard in a spanning tree environment it is possible to lose the unsoliticited ARP_REQUESTS sent out when an IP address moves from one interface to another. ( SR number: 4701345082 ; DTS number: INDaa26302 ) If connections in TIME_WAIT reuse the same port, the socket options will get lost. Based on HP-UX patch PHNE_12407: ( SR number: 5003314351 ; DTS number: INDaa24634 ) HP-UX does not allow different subnets for IP aliases. ( SR number: 1653163436 ; DTS number: INDaa25115 ) A TCP client that is connected to itself will hang the session. ( SR number: 1653204198 ; DTS number: INDaa26665 ) An additional urgent byte could be sent in an AF_INET/STREAM socket if the send buffer is much larger than 64K bytes. ( SR number: 1653214981 ; DTS number: INDaa27440 ) ip_output() is using the PMTU from the dynamic route, but TCP is not, resulting in fragmentation and sub-optimal behavior. ( SR number: 5003366898 ; DTS number: INDaa27749 ) Whenever the PMTU value is changed, the remote system starts logging TCP checksum errors and existing connections time out. ( SR number: 1653221549 ; DTS number: INDaa27809 ) A Catalyst 5000's system does not reply to an HP-UX ARP request. ( SR number: 4701362756 ; DTS number: INDaa28061 ) poll() is not supported on series 800 machines. ( SR number: 4701363333 ; DTS number: INDaa28081 ) nfsd's are hanging because they sleep until the driver or other lower layer has released the memory for the packet that was sent down. This memory is not being freed. Based on HP-UX patch PHNE_11530: ( SR number: 5003320655 ; DTS number: INDaa24498 ) The HP 9000/UX BSD ARP implementation causes caching of the least optimal path to a remote host on a Token Ring network among multiple possible paths through various source routing bridges. This is true for both outbound and inbound ARP resolution cases. In the case of outbound ARP resolution, after HP 9000/UX issues an ARP broadcast request to a remote host which results in multiple requests reaching to that host, it begins to receive multiple responses, and for each such response it overwrites the cache data for that host. This results in the cache having the longest path corresponding to the last response received. Similarly, in the case of inbound ARP resolution, HP 9000/UX receives multiple ARP requests over multiple paths, and with each request it updates its cache with the path over which that request was received. This results in the cache finally containing the path over which the last request was received which may be the longest path in most cases. ( SR number: 5003355875 ; DTS number: INDaa26445 ) In 10.X TCP MSS does not behave the same way as in 9.X even when PMTU is disabled. ( SR not found ; DTS number: INDaa27510 ) The system may hang due to a memory leak caused by failed setsockopt(2) calls. ( SR number: 5003372144 ; DTS number: INDaa27528 ) The system will panic due to a null pointer dereference during a bind(2) system call. Based on HP-UX patch PHNE_9106: ( SR not found ; DTS number: INDaa25576 ) HP-UX does not allow tuning of the TCP hash table size. ( SR number: 5003345207 ; DTS number: INDaa25720 ) An application that is bound to a multicast address does not receive packets sent to that multicast address. ( SR number: 1653192054 ; DTS number: INDaa25760 ) IBM RS/6000 systems reject our arp requests. ( SR number: 1653198069 ; DTS number: INDaa26155 ) The system hangs in sbdrop() during shutdown. ( SR number: 5003352872 ; DTS number: INDaa26215 ) Network hangs because Stream Scheduler is looping on processor 0. ( SR not found ; DTS number: INDaa26243 ) HP-UX does not support IP directed broadcast forwarding. Based on HP-UX patch PHNE_9098: ( SR number: 5000710814 ; DTS number: INDaa20102 ) An ENXIO error is presently passed from the transport layer up to the application error as a "hard", or irrecoverable error. It is left up to the application to decide how to handle this situation. This is incorrect, because ENXIO is generated by the driver(s) in situations which *may* be recoverable, such as the imfamous 82596 LAN chip error. The user will see applications fail with a connection failure error which may be accompanied by a log message from the driver indicating that some sort of hardware error has occurred. ( SR number: 4701313866 ; DTS number: INDaa22779 ) Bug in source code. Found through code examination. Works accidentally. ( SR not found ; DTS number: INDaa24148 ) In a threaded environment, unp_externalize() can no longer depend on the file descriptor state being the same because another thread of the same process can change the state. ( SR number: 5003316810 ; DTS number: INDaa24262 ) System hang and network congestion. ( SR number: 5003318543 ; DTS number: INDaa24355 ) A memory leak occurs when an IPPROTO_TCP setsockopt() is done on a closed socket. ( SR not found ; DTS number: INDaa24426 ) netstat improperly displays the interface field for clan0. ( SR not found ; DTS number: INDaa24561 ) HP-UX does not have protocol switch entries for Raptor. ( SR number: 1653175810 ; DTS number: INDaa24600 ) ICMP packets sent to 255.255.255.255 cause system hangs on UP machines and a panic on MP machines. ( SR not found ; DTS number: INDaa24633 ) For a SYN, when the socket is not found in the listen queue, we search the whole list. This takes too long. It causes performance degradation in netscape. The above may happen when a service is not started. ( SR number: 1653176644 ; DTS number: INDaa24653 ) A panic occurs when we call audit_send_dgram (). ( SR number: 5003327973 ; DTS number: INDaa24727 ) Data is put in the socket buffer before calling TCP to send it out. If TCP gets an error from the interface (which may be transient), TCP returns the error to the application. If the application attempts to resend the data instead of exiting, potential data corruption can occur. ( SR number: 5003326199 ; DTS number: INDaa24752 ) A K400 system running ServiceGuard on 10.01 panics when pinging a floating ip address of a package that is being shutdown. ( SR not found ; DTS number: INDaa24826 ) The code does not ensure that there is always space left for '\0' for the case when an interface's unit number > 9. ( SR not found ; DTS number: INDaa24843 The default for a listen() queue has been increased from 20 to 4K. ( SR not found ; DTS number: INDaa24847 ) The maximum value of 20 for a listen() queue is inadequate for many applications. ( SR not found ; DTS number: INDaa24859 ) In tcp_close, we tie up the locks too long since we do a forward search to determine whether an inpcb belong to the hash list or not. ( SR not found ; DTS number: INDaa24936 ) Using a Fibre Channel driver with Service Guard causes a memory leak resulting in a hang. ( SR number: 4701333427 ; DTS number: INDaa24947 ) tcp_ctloutput() may cause a panic due to inproper locking and unlocking of inp. ( SR number: 5000716316 ; DTS number: INDaa25002 ) The system will hang when a second connect() is called on the same socket. ( SR number: 1653182782 ; DTS number: INDaa25005 ) Fast retransmission is not activated after three duplicate ACKs if window scaling is on (RFC 1323). ( SR number: 4701335596 ; DTS number: INDaa25125 ) A syn attack can result in Denial Of Service (DOS) to legitimate users. ( SR number: 1653184861 ; DTS number: INDaa25164 ) Customers in 9.x can tune sb_max, but cannot do it in 10.x. ( SR not found ; DTS number: INDaa25166 ) IPTOS_PREC_ROUTINE was defined as 0x10. That means the LOW DELAY bit in the type of service field is also set. This makes it difficult to assign "Routine" precedence with "Normal delay". ( SR number: 4701339044 ; DTS number: INDaa25467 ) A panic will occur in sounlock() when an application forks off multiple processes that call accept() on the same socket. ( SR number: 1653189852 ; DTS number: INDaa25498 ) A directed broadcast to a different network fails. ( SR number: 5003345215 ; DTS number: INDaa25698 ) Multicast addresses don't transfer over to the new interface during switchover. Based on HP-UX patch PHNE_9036: ( SR number: 5003342071 ; DTS number: INDaa25456 ) ping with illegal packets can cause panic. PHNE_17413: Bad call to bzero() in ip_output() could cause major problems. PHNE_15733: Repackaged part of HP-UX patch PHNE_9098 to fix a race condition in a socket function, sodequeue(). This race condition could result in a hung network when an application forks multiple children that call accept() on the same socket. PHNE_14735: Transient TCP error conditions had been reported to the application. Because TCP retransmission logic does ultimately correct a transient condition, transient errors are no longer sent to the application. Fatal and permanent TCP errors are still reported to the application. PHNE_13888: Repackaged part of HP-UX patch PHNE_13469 for VVOS. Based on a portion of HP-UX patch PHNE_13469: If the system is a single processor machine they may see it hang. It will still respond to "ping" but the console and all other activity will stop. If the system is a multiprocessor machine the customer may see that one processor is 100% busy running netisr. The rest of the system will be working OK with the exception of the one processor being out of the picture. Networking may be slow or not working at all. Netstat will show one of this systems IP addresses connected to itsself along with the local and remote port being the same. The state of the socket will be SYN_RCVD. PHKL_12391: Incorrect placement of audit stub hooks, results in incorrect information in audit records for system calls symlink(2) and unlink(2). PHNE_11306: Provides a mechanism that causes accept() to filter connection requests based on the attributes of the process issuing the connect() request. The filtering is transparent to both the processes involved. This mechanism is extended to udp, and the filtering is performed when a packet is received. PHNE_11096: Force TCP SYN Attack protection to be the default configuration setting. PHNE_10476: Introduces a mechanism for further restricting traffic from/to certain interfaces, to/from multilevel servers. During system initialization the ifconfig command, based on information in the Device Assignment database, marks interfaces from which traffic is to be restricted. The ifconfig command also reports this information, when displaying other characteristics of the interface. Applications using non-blocking interfaces to network and file/record locking APIS cause excessive audit records to be generated. These interfaces include accept(), read(), recv() lockf(), and fcntl(). TCP should use random sequence numbers. PHNE_10471: An application using the socket API can corrupt the TCP hash chains causing the system to panic. PHNE_10325: VVOS MP system panics when certain trusted programs are executed. PHNE_10161: Based on a portion of HP-UX patch PHKL_9098: A syn attack can result in Denial Of Service (DOS) to legitimate users. SR: 5000710814 4701313866 5003294777 5003316810 5003318543 5003320655 1653175810 5003314351 1653176644 5003327973 5003326199 4701333427 5000716316 1653182782 1653163436 1653174441 4701335596 1653184861 5003342071 4701339044 1653189852 5003345215 5003345207 1653192054 1653198069 5003352872 4701345082 5003355875 1653204198 4701350173 1653214981 5003366906 5003372144 5003366849 5003366898 5003361691 1653221549 5003379529 4701362756 4701363333 1653227116 5003384719 1653229633 1653232538 1653234245 4701371914 5003396937 1653239764 1653248880 5003401802 5003408328 5003409268 5003411926 5003417410 5003417477 5003418228 5003423665 5003429464 5003433490 1653205393 5003382861 5003421560 5003406975 5003430827 4701404590 5003443655 5003443713 1653286146 1653286641 5003425660 4701413435 4701356741 4701354597 4701349761 4701349399 4701347532 4701335596 4701348631 4701348623 4701348656 4701366252 1653239764 5003327973 4701387333 4701339044 5003424002 4701349753 Patch Files: /usr/conf/lib/libsec.a(audit_stub.o) /usr/conf/lib/libuipc.a(netisr.o) /usr/conf/lib/libuipc.a(sys_socket.o) /usr/conf/lib/libuipc.a(uipc_init.o) /usr/conf/lib/libhp-ux.a(uipc_mbuf.o) /usr/conf/lib/libuipc.a(uipc_socket.o) /usr/conf/lib/libuipc.a(uipc_socket2.o) /usr/conf/lib/libuipc.a(uipc_syscall.o) /usr/conf/lib/libuipc.a(uipc_usrreq.o) /usr/conf/lib/libuipc.a(uipc_compat.o) /usr/conf/lib/libtpiso.a(xtiso.o) /usr/conf/lib/libhp-ux.a(nm_tune.o) /usr/conf/lib/libhp-ux.a(vfs_scalls.o) /usr/conf/lib/libhp-ux.a(vfs_lockf.o) /usr/conf/lib/libhp-ux.a(kern_dscrp.o) /usr/conf/lib/libsec.a(sec_vvosnet.o) /usr/conf/lib/libsec.a(sec_subrs.o) /usr/conf/lib/libsec.a(spd_mac.o) /usr/conf/lib/libnet.a(raw_usrreq.o) /usr/conf/lib/libinet.a(tcp_timer.o) /usr/conf/lib/libinet.a(tcp_subr.o) /usr/conf/lib/libinet.a(tcp_usrreq.o) /usr/conf/lib/libinet.a(tcp_output.o) /usr/conf/lib/libinet.a(tcp_input.o) /usr/conf/lib/libinet.a(ip_output.o) /usr/conf/lib/libinet.a(ip_mroute.o) /usr/conf/lib/libinet.a(ip_input.o) /usr/conf/lib/libinet.a(ip_icmp.o) /usr/conf/lib/libinet.a(in_proto.o) /usr/conf/lib/libinet.a(in_pcb.o) /usr/conf/lib/libinet.a(in.o) /usr/conf/lib/libinet.a(if_ether.o) /usr/conf/lib/libinet.a(udp_usrreq.o) /usr/conf/lib/libinet.a(nm_tcp.o) /usr/conf/lib/libnet.a(route.o) /usr/conf/lib/libnet.a(if.o) /usr/conf/lib/libnet.a(if_ni.o) /usr/sbin/ifconfig /usr/lib/nls/msg/C/ifconfig.cat what(1) Output: /usr/conf/lib/libsec.a(audit_stub.o): kern/sec/audit_stub.c, sysaudit, vvos_davis, davis14 2 $Date: 99/06/23 13:12:06 $ $Revision: 1.22 PATCH_10.24 (PHNE_10476) $ /usr/conf/lib/libuipc.a(netisr.o): PHNE_17731 netisr.c $Revision: 1.12.112.10 $ /usr/conf/lib/libuipc.a(sys_socket.o): PHNE_17731 sys_socket.c $Revision: 1.7.112.4 $ /usr/conf/lib/libuipc.a(uipc_compat.o): kern/sys/uipc_compat.c, hpuxsysuipc, vvos_davis, dav is142 $Date: 99/06/23 13:15:21 $ $Revision: 1.4 PATCH_10.24 (PHNE_10476) $ /usr/conf/lib/libuipc.a(uipc_init.o): FILESET BSDIPC-SOCKET: lib uipc: Version: A.10.00 /usr/conf/lib/libhp-ux.a(uipc_mbuf.o): PHNE_17731 uipc_mbuf.c $Revision: 1.9.112.5 $ $Date: 98/03/27 12:57:17 $ /usr/conf/lib/libuipc.a(uipc_socket.o): $Source: kern/sys/uipc_socket.c, hpuxsysuipc, vvos_d avis, davis152 $Date: 99/06/22 09:08:32 $ $R evision: 1.49.1.4 PATCH_10.24 (PHNE_18965) $ /usr/conf/lib/libuipc.a(uipc_socket2.o): $Source: kern/sys/uipc_socket2.c, hpuxsysuipc, vvos_ davis, davis152 $Date: 99/06/22 09:08:36 $ $ Revision: 1.6 PATCH_10.24 (PHNE_18965) $ /usr/conf/lib/libuipc.a(uipc_syscall.o): $Source: kern/sys/uipc_syscall.c, hpuxsysuipc, vvos_ davis, davis152 $Date: 99/06/22 09:08:38 $ $ Revision: 1.41 PATCH_10.24 (PHNE_18965) $ /usr/conf/lib/libuipc.a(uipc_usrreq.o): $Source: kern/sys/uipc_usrreq.c, hpuxsysuipc, vvos_d avis, davis152 $Date: 99/06/22 09:08:40 $ $R evision: 1.28 PATCH_10.24 (PHNE_18965) $ /usr/conf/lib/libtpiso.a(xtiso.o): PHNE_17731 xtiso.c $Revision: 1.4.112.7 $ $Date: 99/ 02/21 22:45:54 $ /usr/conf/lib/libhp-ux.a(vfs_scalls.o): kern/sys/vfs_scalls.c, hpuxsysvfs, vvos_davis, davis 142 $Date: 99/06/23 13:11:36 $ $Revision: 1. 27.1.2 PATCH_10.24 (PHKL_12391) $ /usr/conf/lib/libhp-ux.a(vfs_lockf.o): kern/sys/vfs_lockf.c, hpuxsysvfs, vvos_davis, davis1 42 $Date: 99/06/23 13:15:35 $ $Revision: 1.3 PATCH_10.24 (PHNE_10476) $ /usr/conf/lib/libhp-ux.a(kern_dscrp.o): kern/sys/kern_dscrp.c, hpuxsysmisc, vvos_davis, davi s142 $Date: 99/06/23 13:11:36 $ $Revision: 1 .24 PATCH_10.24 (PHNE_10476) $ /usr/conf/lib/libhp-ux.a(nm_tune.o): $Source: kern/netinet/nm_tune.c, hpuxsysinet, vvos_d avis, davis152 $Date: 99/06/22 09:18:02 $ $R evision: 1.13.1.2 PATCH_10.24 (PHNE_18965) $ /usr/conf/lib/libsec.a(sec_vvosnet.o): kern/sec/sec_vvosnet.c, sysmisc, vvos_davis, davis14 2 $Date: 99/06/23 13:15:19 $ $Revision: 1.19 .2.6 PATCH_10.24 (PHNE_11306) $ /usr/conf/lib/libsec.a(sec_subrs.o): kern/sec/sec_subrs.c, sysmisc, vvos_davis, davis142 $Date: 99/06/23 13:11:49 $ $Revision: 1.13.3 .4 PATCH_10.24 (PHNE_11306) $ /usr/conf/lib/libsec.a(spd_mac.o): kern/sec/spd_mac.c, sysmacilb, vvos_davis, davis142 $Date: 99/06/23 13:11:47 $ $Revision: 1.31 P ATCH_10.24 (PHKL_12391) $ /usr/conf/lib/libnet.a(raw_usrreq.o): kern/net/raw_usrreq.c, hpuxsysnet, vvos_davis, davis 142 $Date: 99/06/23 13:11:17 $ $Revision: 1. 20 PATCH_10.24 (PHNE_10476) $ /usr/conf/lib/libinet.a(tcp_timer.o): $Source: kern/netinet/tcp_timer.c, hpuxsysinet, vvos _davis, davis152 $Date: 99/06/23 14:20:27 $ $Revision: 1.21 PATCH_10.24 (PHNE_18965) $ /usr/conf/lib/libinet.a(tcp_input.o): $Source: kern/netinet/tcp_input.c, hpuxsysinet, vvos _davis, davis152 $Date: 99/06/22 09:18:04 $ $Revision: 1.41.1.9 PATCH_10.24 (PHNE_18965) $ /usr/conf/lib/libinet.a(tcp_output.o): $Source: kern/netinet/tcp_output.c, hpuxsysinet, vvo s_davis, davis152 $Date: 99/06/22 09:18:06 $ $Revision: 1.22 PATCH_10.24 (PHNE_18965) $ /usr/conf/lib/libinet.a(tcp_usrreq.o): $Source: kern/netinet/tcp_usrreq.c, hpuxsysinet, vvo s_davis, davis152 $Date: 99/06/22 09:18:12 $ $Revision: 1.7 PATCH_10.24 (PHNE_18965) $ /usr/conf/lib/libinet.a(tcp_subr.o): $Source: kern/netinet/tcp_subr.c, hpuxsysinet, vvos_ davis, davis152 $Date: 99/06/22 09:18:08 $ $ Revision: 1.29 PATCH_10.24 (PHNE_18965) $ /usr/conf/lib/libinet.a(ip_output.o): $Source: kern/netinet/ip_output.c, hpuxsysinet, vvos _davis, davis152 $Date: 99/06/22 09:17:58 $ $Revision: 1.25 PATCH_10.24 (PHNE_18965) $ /usr/conf/lib/libinet.a(ip_mroute.o): PHNE_17731 ip_mroute.c $Revision: 1.3.112.3 $ IPM3.3 /usr/conf/lib/libinet.a(ip_input.o): $Source: kern/netinet/ip_input.c, hpuxsysinet, vvos_ davis, davis152 $Date: 99/06/22 09:17:56 $ $ Revision: 1.35 PATCH_10.24 (PHNE_18965) $ /usr/conf/lib/libinet.a(ip_icmp.o): $Source: kern/netinet/ip_icmp.c, hpuxsysinet, vvos_d avis, davis152 $Date: 99/06/22 09:17:54 $ $R evision: 1.19 PATCH_10.24 (PHNE_18965) $ /usr/conf/lib/libinet.a(in_proto.o): PHNE_17731 in_proto.c $Revision: 1.4.112.4 $ $Date: 96/08/19 18:40:49 $ /usr/conf/lib/libinet.a(in_pcb.o): $Source: kern/netinet/in_pcb.c, hpuxsysinet, vvos_da vis, davis152 $Date: 99/06/22 09:17:51 $ $Re vision: 1.36 PATCH_10.24 (PHNE_18965) $ /usr/conf/lib/libinet.a(in.o): $Source: kern/netinet/in.c, hpuxsysinet, vvos_davis, davis152 $Date: 99/06/22 09:17:48 $ $Revisi on: 1.24 PATCH_10.24 (PHNE_18965) $ /usr/conf/lib/libinet.a(if_ether.o): PHNE_17731 if_ether.c $Revision: 1.10.112.18 $ /usr/conf/lib/libinet.a(udp_usrreq.o): $Source: kern/netinet/udp_usrreq.c, hpuxsysinet, vvo s_davis, davis152 $Date: 99/06/22 09:18:39 $ $Revision: 1.42 PATCH_10.24 (PHNE_18965) $ /usr/conf/lib/libinet.a(nm_tcp.o): PHNE_17731 nm_tcp.c $Revision: 1.4.112.2 $ /usr/conf/lib/libnet.a(route.o): $Source: kern/net/route.c, hpuxsysnet, vvos_davis, d avis152 $Date: 99/06/22 09:07:00 $ $Revision : 1.35.1.2 PATCH_10.24 (PHNE_18965) $ /usr/conf/lib/libnet.a(if.o): kern/net/if.c, hpuxsysnet, vvos_davis, davis142 $Dat e: 99/06/23 13:11:16 $ $Revision: 1.32 PATCH _10.24 (PHNE_10476) $ /usr/conf/lib/libnet.a(if_ni.o): $Source: kern/net/if_ni.c, hpuxsysnet, vvos_davis, d avis152 $Date: 99/06/22 09:07:05 $ $Revision : 1.16 PATCH_10.24 (PHNE_18965) $ /usr/sbin/ifconfig: $Revision: Hewlett-Packard ISSL Level vvos_davis40 $ $Header: Hewlett-Packard ISSL Release vvos_ davis $ $Date: Wed Jun 23 13:23:02 EDT 1999 $ lanlink/NET/commands/ifconfig/ifconfig.c, hpuxcmdnet , vvos_davis, davis142 $Date: 99/06/23 13:12 :49 $ $Revision: 1.10 PATCH_10.24 (PHNE_1047 5) $ NET: Version: B.10.10 $Date: 96/05/09 11:26:18 $ /usr/lib/nls/msg/C/ifconfig.cat: None cksum(1) Output: 2571205290 8536 /usr/conf/lib/libsec.a(audit_stub.o) 551166800 9456 /usr/conf/lib/libuipc.a(netisr.o) 3235375931 4300 /usr/conf/lib/libuipc.a(sys_socket.o) 1819861694 9388 /usr/conf/lib/libuipc.a(uipc_compat.o) 2909866134 4460 /usr/conf/lib/libuipc.a(uipc_init.o) 1130815047 12248 /usr/conf/lib/libhp-ux.a(uipc_mbuf.o) 661502995 22000 /usr/conf/lib/libuipc.a(uipc_socket.o) 1534647612 21332 /usr/conf/lib/libuipc.a(uipc_socket2.o) 3647423890 17564 /usr/conf/lib/libuipc.a(uipc_syscall.o) 3296525341 14680 /usr/conf/lib/libuipc.a(uipc_usrreq.o) 123312431 64028 /usr/conf/lib/libtpiso.a(xtiso.o) 1220343784 29804 /usr/conf/lib/libhp-ux.a(vfs_scalls.o) 307251353 14724 /usr/conf/lib/libhp-ux.a(vfs_lockf.o) 3854121395 15856 /usr/conf/lib/libhp-ux.a(kern_dscrp.o) 3659716359 11224 /usr/conf/lib/libhp-ux.a(nm_tune.o) 414080121 9660 /usr/conf/lib/libsec.a(sec_vvosnet.o) 1698329654 9632 /usr/conf/lib/libsec.a(sec_subrs.o) 2967653022 13280 /usr/conf/lib/libsec.a(spd_mac.o) 711526055 5760 /usr/conf/lib/libnet.a(raw_usrreq.o) 1917587717 12532 /usr/conf/lib/libinet.a(tcp_timer.o) 3687245345 22364 /usr/conf/lib/libinet.a(tcp_input.o) 1859377621 6552 /usr/conf/lib/libinet.a(tcp_output.o) 58300057 12300 /usr/conf/lib/libinet.a(tcp_usrreq.o) 1866740776 11240 /usr/conf/lib/libinet.a(tcp_subr.o) 1303773522 12688 /usr/conf/lib/libinet.a(ip_output.o) 4093682548 22324 /usr/conf/lib/libinet.a(ip_mroute.o) 4180332338 19092 /usr/conf/lib/libinet.a(ip_input.o) 2051817668 7716 /usr/conf/lib/libinet.a(ip_icmp.o) 1492863328 3188 /usr/conf/lib/libinet.a(in_proto.o) 2152385392 18272 /usr/conf/lib/libinet.a(in_pcb.o) 2343262937 19256 /usr/conf/lib/libinet.a(in.o) 3378930016 50084 /usr/conf/lib/libinet.a(if_ether.o) 2961214614 16512 /usr/conf/lib/libinet.a(udp_usrreq.o) 3322189374 4068 /usr/conf/lib/libinet.a(nm_tcp.o) 783941041 18736 /usr/conf/lib/libnet.a(route.o) 1070233521 8672 /usr/conf/lib/libnet.a(if.o) 1374454386 10804 /usr/conf/lib/libnet.a(if_ni.o) 2425312093 24576 /usr/sbin/ifconfig 808123659 1886 /usr/lib/nls/msg/C/ifconfig.cat Patch Conflicts: None Patch Dependencies: None Hardware Dependencies: None Other Dependencies: None Supersedes: PHNE_10471 PHNE_10161 PHNE_10325 PHNE_10476 PHNE_11096 PHNE_11306 PHKL_12391 PHNE_13888 PHNE_14735 PHNE_15733 PHNE_17413 Equivalent Patches: PHNE_18966: s800: 10.24 Patch Package Size: 700 KBytes Installation Instructions: Please review all instructions and the Hewlett-Packard SupportLine User Guide or your Hewlett-Packard support terms and conditions for precautions, scope of license, restrictions, and, limitation of liability and warranties, before installing this patch. ------------------------------------------------------------ 1. Back up your system before installing a patch. 2. Login as root. 3. Copy the patch to the /tmp directory. 4. Move to the /tmp directory and unshar the patch: cd /tmp sh PHNE_18965 5a. For a standalone system, run swinstall to install the patch: swinstall -x autoreboot=true -x match_target=true \ -s /tmp/PHNE_18965.depot 5b. For a homogeneous NFS Diskless cluster run swcluster on the server to install the patch on the server and the clients: swcluster -i -b This will invoke swcluster in the interactive mode and force all clients to be shut down. WARNING: All cluster clients must be shut down prior to the patch installation. Installing the patch while the clients are booted is unsupported and can lead to serious problems. The swcluster command will invoke an swinstall session in which you must specify: alternate root path - default is /export/shared_root/OS_700 source depot path - /tmp/PHNE_18965.depot To complete the installation, select the patch by choosing "Actions -> Match What Target Has" and then "Actions -> Install" from the Menubar. 5c. For a heterogeneous NFS Diskless cluster: - run swinstall on the server as in step 5a to install the patch on the cluster server. - run swcluster on the server as in step 5b to install the patch on the cluster clients. By default swinstall will archive the original software in /var/adm/sw/patch/PHNE_18965. If you do not wish to retain a copy of the original software, you can create an empty file named /var/adm/sw/patch/PATCH_NOSAVE. Warning: If this file exists when a patch is installed, the patch cannot be deinstalled. Please be careful when using this feature. It is recommended that you move the PHNE_18965.text file to /var/adm/sw/patch for future reference. To put this patch on a magnetic tape and install from the tape drive, use the command: dd if=/tmp/PHNE_18965.depot of=/dev/rmt/0m bs=2k Special Installation Instructions: None