Patch-ID# 110614-03
Download this patch from My Oracle Support
Your use of the firmware, software and any other materials contained
in this update is subject to My Oracle Support Terms of Use, which
may be viewed at My Oracle Support.
|
For further information on patching best practices and resources, please
see the following links:
|
Copyright (c) 2012, Oracle and/or its affiliates. All rights reserved.
|
Keywords: security safte ses driver wrong id media tray error injection
Synopsis: SunOS 5.8: ses driver patch
Date: Aug/30/2010
Install Requirements: See Special Install Instructions
Reboot after installing this patch to activate the changes delivered. An alternative may be specified in the Special Install Instructions.
Solaris Release: 8
SunOS Release: 5.8
Unbundled Product:
Unbundled Release:
Xref:
Topic: SunOS 5.8: ses driver patch
Relevant Architectures: sparc
Bugs fixed with this patch:
Changes incorporated in this version: 6897299
Patches accumulated and obsoleted by this patch:
Patches which conflict with this patch:
Patches required with this patch:
Obsoleted by:
Files included with this patch:
/kernel/drv/ses
/kernel/drv/sparcv9/ses
Problem Description:
6897299 ses: issue with USCSICMD's
(from 110614-02)
4414946 system panics, during heavy I/O, without any error injection
(from 110614-01)
4319620 SAFTE devices report wrong ID
4319764 ses driver tries to read past the end of a SAFTE buf on media tray
Patch Installation Instructions:
--------------------------------
Please refer to the man pages for instructions on using 'patchadd'
and 'patchrm' commands provided with Solaris.
The following example installs a patch to a standalone machine:
example# patchadd /var/spool/patch/123456-07
The following example removes a patch from a standalone system:
example# patchrm 123456-07
For additional examples please see the appropriate man pages. Any
other special or non-generic installation instructions should be
described below as special instructions.
Special Install Instructions:
-----------------------------
Reboot the system after patch installation.
README -- Last modified date: Friday, November 9, 2012