OBSOLETE Patch-ID# 114337-08


Download this patch from My Oracle Support

Your use of the firmware, software and any other materials contained in this update is subject to My Oracle Support Terms of Use, which may be viewed at My Oracle Support.
For further information on patching best practices and resources, please see the following links:
Copyright (c) 2012, Oracle and/or its affiliates. All rights reserved.

Keywords: security tcp loopback ipv4 subnets ipmp ip 6to4 router
Synopsis: Obsoleted by: 112234-11 SunOS 5.9_x86: kernel/drv/tcp kernel/drv/ip patch
Date: Oct/14/2003


Install Requirements: Reboot after installing this patch to activate the changes delivered. An alternative may be specified in the Special Install Instructions.
Use Single User Mode (run level S) when installing this patch on an active boot environment. An alternative may be specified in the Special Install Instructions.

Solaris Release: 9_x86

SunOS Release: 5.9_x86

Unbundled Product:

Unbundled Release:

Xref: This patch available for SPARC as patch 112904

Topic: SunOS 5.9_x86: kernel/drv/tcp patch

Relevant Architectures: i386

Bugs fixed with this patch:

Sun CR # Bug #
420374814978994
465988215102199
466016715102280
466286615103052
468785015108183
468839215108287
468839815108291
468870415108384
468930915108523
469456015109956
471589715115155
472289715116957
473765615120906
474503915123117
474771415123916
474926815124349
476340215128548
476381315128685
477271215131647
478403915135062
479094115137106
480364515141582
480513515142077
482019915146912
483836715152639
484483915154609


Changes incorporated in this version: 4203748 4838367

Patches accumulated and obsoleted by this patch: 113992-05 114438-01

Patches which conflict with this patch:

Patches required with this patch: 112234-07 114012-02 115009-01 (or greater)

Obsoleted by: 112234-11

Files included with this patch:

/kernel/drv/ip
/kernel/drv/tcp
/kernel/strmod/6to4tun
/kernel/strmod/ip
/kernel/strmod/tcp
/kernel/strmod/tun
/usr/include/inet/ip.h
/usr/include/inet/ip_if.h
/usr/include/inet/tcp.h
/usr/include/netinet/in.h
/usr/include/sys/dlpi.h
/usr/lib/adb/ill
/usr/lib/adb/ipc
/usr/lib/adb/tcp

Problem Description:

4203748 Need router alert in mld_sendpkt
4838367 valid router alert generates level 0 ip debug
 
(from 114337-07)
 
4805135 mctl_present does not imply IPsec in use
4844839 ip_copymsg assumes that only IPsec uses M_CTL
 
(from 114337-06)
 
4722897 ipcsumdbg() causes system to drop to OBP
 
(from 114337-05)
 
4715897 arp falsely assumes only one AR_INTERFACE_UP can occur at a time
 
(from 114337-04)
 
4747714 TCP Multidata Transmit (MDT) Project
4763813 tcp adb macro missing a couple of fields
4772712 DL_{CAPABILITY,CONTROL}_* framework needs to be re-integrated
4803645 structure tags declared extern
 
(from 114337-03)
 
4737656 strqset+0x14 alignment panic
 
(from 114337-02)
 
4745039 tcp_close_detached should give cluster callback before removing tcpb
 
(from 114337-01)
 
4687850 TCP loopback connection stays in LAST_ACK (with the peer in FIN_WAIT_2)
 
(from 113992-05)
 
4790941 Running cgtp duplication with functionalipv6 option causes system hang
4659882 ip_newroute_ipif creates IRE cache entries with incorrect cmask
4820199 cgtp.cmd -  cgtp_func_Setsrc_01IPv4 failed in 64-bit and 32-bit
4689309 CGTP multicast IPv6 routing mechanism does not work with specific configurations
 
(from 113992-04)
 
4749268 connect() to localhost fails when SO_DONTROUTE is set
4784039 connect() to `hostname` fails if SO_DONTROUTE is set
 
(from 113992-03)
 
4688704 Solaris should implement 6to4 Router as per RFC3056
4688392 tun module needs more atomic operations for single counter updates
4688398 tun module needs better debugging facility
4694560 typo in kstat name for tuns_OutDiscard (noxmtbuF)
4660167 tunnel module incorrectly calls into IP
 
(from 113992-02)
 
4763402 IPQoS dlcosmk does not mark packets correctly in some cases
 
(from 113992-01)
 
4662866 ipif_select_source() breaks a multinetted environment
 
(from 114438-01)
 
4688704 Solaris should implement 6to4 Router as per RFC3056
4688392 tun module needs more atomic operations for single counter updates
4688398 tun module needs better debugging facility
4694560 typo in kstat name for tuns_OutDiscard (noxmtbuF)
4660167 tunnel module incorrectly calls into IP
 
        This patch revision was generated to accumulate and obsolete
        the changes introduced in Solaris Update: S9U3
        feature point patches: 114110-01


Patch Installation Instructions:
--------------------------------
 
For Solaris 2.0-2.6 releases, refer to the Install.info file and/or
the README within the patch for instructions on using the generic
'installpatch' and 'backoutpatch' scripts provided with each patch.
 
For Solaris 7-9 releases, refer to the man pages for instructions
on using 'patchadd' and 'patchrm' scripts provided with Solaris.
Any other special or non-generic installation instructions should be
described below as special instructions.  The following example
installs a patch to a standalone machine:
 
       example# patchadd /var/spool/patch/104945-02
 
The following example removes a patch from a standalone system:
 
       example# patchrm 104945-02
 
For additional examples please see the appropriate man pages.


Special Install Instructions:
-----------------------------
 
NOTE 1: To get the complete 6to4 Router feature, please install the
        following patches:
 
        114442-01 (or newer) ifconfig patch
 
NOTE 2: To get the complete fix for TCP Multidata Transmit  feature , please
        install the following patches:
 
        112234-07 (or newer) Kernel Update patch
        115009-01 (or newer) gld patch
        114012-02 (or newer) sockfs patch
 
NOTE 3: To get the complete fix for 4715897, please install
        114345-02 (or newer) arp patch
 
NOTE 4: If applying this patch to machines on an IPV6 network please be aware
        that machines running 2.8 or 2.9, configured for IPV6, that are left
        unpatched might start seeing the following message:
 
        ip: ip_option_process: bad opt 0x5
 
        Applying this patch to the 2.9 machines or patch the 2.8 machines
        with 108528-24 (or newer) will stop these messages from being
        generated.


README -- Last modified date: Saturday, November 10, 2012