OBSOLETE Patch-ID# 119075-14


Download this patch from My Oracle Support

Your use of the firmware, software and any other materials contained in this update is subject to My Oracle Support Terms of Use, which may be viewed at My Oracle Support.
For further information on patching best practices and resources, please see the following links:
Copyright (c) 2012, Oracle and/or its affiliates. All rights reserved.

Keywords: security th_trace th_refcnt tr_buf_max ip spdsock
Synopsis: Obsoleted by: 118822-23 SunOS 5.10: ip Patch
Date: Nov/21/2005


Install Requirements: After installing this patch on an active boot environment, the system will be in a potentially inconsistent state until a reboot is performed. Unless
otherwise specified in the Special Install Instructions below, it is normally safe to apply further patches prior to initiating the reboot due to the relatively small footprint of the patch utilities. Normal operations must not be resumed until after the reboot is performed.
Use Single User Mode (run level S) when installing this patch on an active boot environment. An alternative may be specified in the Special Install Instructions.

Solaris Release: 10

SunOS Release: 5.10

Unbundled Product:

Unbundled Release:

Xref: This patch available for x86 as patch 119076

Topic: SunOS 5.10: ip Patch

Relevant Architectures: sparc

Bugs fixed with this patch:

Sun CR # Bug #
501320015201346
621193615242303
621275615242583
621613415243812
621762415244491
621819415244740
622217415246374
623052815249859
623120315250154
623120515250158
623338815251073
623391915251295
623600015252112
623618215252170
623766615252818
623777915252879
623779315252884
623782315252900
624173915254515
624855515257488
625037415258191
628357715270885
629205415274334
629449015275291


Changes incorporated in this version: 6294490

Patches accumulated and obsoleted by this patch:

Patches which conflict with this patch:

Patches required with this patch: 118822-18 (or greater)

Obsoleted by: 118822-23

Files included with this patch:

/kernel/drv/sparcv9/ip
/kernel/drv/sparcv9/spdsock
/kernel/fs/sparcv9/sockfs
/kernel/strmod/sparcv9/ip
/usr/include/netinet/sctp.h

Problem Description:

6294490 snf_segmap hangs on loopback connection
 
(from 119075-13)
 
6241739 reassembly of an ipv6 frag of frag causes fault
6292054 Zero sctp_rtt_updates should mean no update to IRE RTT cache
 
(from 119075-12)
 
6283577 cfgadm configure panic - NULL pointer (mmu_fsr) dereferenced in module "ip"
 
(from 119075-11)
 
6237779 race between ip_modclose() and igmp_timeout_handler() ends in panic
6236182 assertion failed: igmp_timeout_id == 0, file: ../../common/inet/ip/igmp.c, line: 151
 
(from 119075-10)
 
5013200 ipclassifier bind list insertion order is flawed in some cases
6233919 Panic in "ip" module during webstress test on x86 system
 
(from 119075-09)
 
6230528 IP pushed as a module inappropriately NAKs common Streams ioctls.
6248555 Panic in sosctp_setsockopt() with 0 optlen
6250374 Panic in getsockopt IP_OPTIONS for sctp
 
(from 119075-08)
 
6216134 Need to abstract lwp lrusage updates into functions
 
(from 119075-07)
 
6212756 UDP checksum 0x0000 not substituted with 0xffff for UDP over IPv6 packets
 
(from 119075-06)
 
6222174 tcp_close processing is not correct
 
(from 119075-05)
 
6231203 sotpi_bindlisten() should use T_BIND_REQ instead of O_T_BIND_REQ for AF_INET/AF_INET6
6231205 SCTP states mismatch in sctp_opt_info(3SOCKET) and netinet/sctp.h
6233388 sctp_add_input_ancillary() always converts v4 mapped address
6236000 SCTP: sctp ancillary data packing has alignment issues
6237793 Return value of sstat_rwnd is not correct
6237823 Kernel panic in sctp_output()
6237666 thread suspended in socket read despite socket being closed
 
(from 119075-04)
 
6211936 in.iked refuses to not encrypt ESP
6217624 loopback half-closed connection goes spinning in a loop
 
(from 119075-03)
 
Patch respun to include complete functionality
 
(from 119075-02)
 
6211936 in.iked refuses to not encrypt ESP
 
(from 119075-01)
 
6218194 assertion failed: th_trace->th_refcnt >= 0 && th_trace->th_refcnt < TR_BUF_MAX -1


Patch Installation Instructions:
--------------------------------
For Solaris 2.0-2.6 releases, refer to the Install.info file and/or
the README within the patch for instructions on using the generic
'installpatch' and 'backoutpatch' scripts provided with each patch.
 
For Solaris 7-10 releases, refer to the man pages for instructions
on using 'patchadd' and 'patchrm' scripts provided with Solaris.
Any other special or non-generic installation instructions should be
described below as special instructions.  The following example
installs a patch to a standalone machine:
 
       example# patchadd /var/spool/patch/104945-02
 
The following example removes a patch from a standalone system:
 
       example# patchrm 104945-02
 
For additional examples please see the appropriate man pages.


Special Install Instructions:
-----------------------------
 
NOTE 1:  Reboot system immeidately after patch installation is complete.
 
NOTE 2:  If you're planning to set up Zones on this system, please make 
         sure to install the following patch which fixes bugid 6216195
         (zone installation confused by UPDATE=yes in pkginfo(4) file.)
 
         119015-01 (or greater)  Packaging Commands Patch
 
NOTE 3:  To get the complete fix for bugid 6216134 (need to abstract lwp
         lrusage updates into functions), please also install the following 
         patches:
 
         118375-03 (or greater)  nfs patch
         118822-14 (or greater)  kernel patch
         118874-02 (or greater)  pcfs patch
         119596-01 (or greater)  hsfs patch
         119979-01 (or greater)  specfs patch
 
NOTE 4:  To get the complete fix for bugid 6230528 (ip pushed as a module 
         inappropriately NAKs common Streams ioctls), please also install 
         the following patch:
 
         120013-01 (or greater)  ip header patch
 
NOTE 5:  To get the complete fix for bugid 6237779 (race between ip_modclose() and 
         igmp_timeout_handler() ends in panic), please also install the following patch:
 
         120013-02 (or greater)  ip header patch


NOTE: The list of 'patches required with this patch' (above) has been
modified from the list specified at patch creation time. The reason for
the modification is that one or more of the required patches was
either never released or withdrawn after its release. The following
substitutions (which are guaranteed to satisfy the original requirements)
were therefore made:

118822-18 replaces 118822-14




README -- Last modified date: Saturday, November 10, 2012