Patch-ID# 121972-06


Download this patch from My Oracle Support

Your use of the firmware, software and any other materials contained in this update is subject to My Oracle Support Terms of Use, which may be viewed at My Oracle Support.
For further information on patching best practices and resources, please see the following links:
Copyright (c) 2012, Oracle and/or its affiliates. All rights reserved.

Keywords: security sockfs streams
Synopsis: SunOS 5.8: sockfs patch
Date: Jul/03/2014


Install Requirements: After installing this patch on an active boot environment, the system will be in a potentially inconsistent state until a reboot is performed. Unless
otherwise specified in the Special Install Instructions below, it is normally safe to apply further patches prior to initiating the reboot due to the relatively small footprint of the patch utilities. Normal operations must not be resumed until after the reboot is performed.
Use Single User Mode (run level S) when installing this patch on an active boot environment. An alternative may be specified in the Special Install Instructions.

Solaris Release: 8

SunOS Release: 5.8

Unbundled Product:

Unbundled Release:

Xref: This patch available for x86 as patch 121973

Topic: SunOS 5.8: sockfs patch
	**********************************************************************
	NOTE: This patch may contain one or more OEM-specific platform ports.
	      See the appropriate OEM_NOTES file within the patch for
	      information specific to these platforms.
	      DO NOT INSTALL this patch on an OEM system if a corresponding
	      OEM_NOTES file is not present (or is present, but instructs not
	      to install the patch), unless the OEM vendor directs otherwise.
	**********************************************************************


Relevant Architectures: sparc sparc.sun4u

Bugs fixed with this patch:

Sun CR # Bug #
17839385
509422915225165
623120315250154
629295015274698
631330815282740
644026315336490
655473815395262
662057515433101


Changes incorporated in this version: 17839385

Patches accumulated and obsoleted by this patch:

Patches which conflict with this patch:

Patches required with this patch: 108528-29 (or greater)

Obsoleted by:

Files included with this patch:

/kernel/fs/sockfs
/kernel/fs/sparcv9/sockfs

Problem Description:

17839385 problem with sockfs
 
(from 121972-05)
 
6620575 problem with sockfs
 
(from 121972-04)
 
6554738 pollsys not woken up even after connection indication delivered to stream head on AF_UNIX socket
 
(from 121972-03)
 
5094229 driver hangs when accessing tt_open
6231203 sotpi_bindlisten() should use T_BIND_REQ instead of O_T_BIND_REQ for AF_INET/AF_INET6
6313308 UDP anonymous port assigned used/unavailable ports
 
(from 121972-02)
 
6440263 M_PROTO msg associated with OOB Byte eats up one Byte of TCP receive window
 
(from 121972-01)
 
6292950 getsockname consumes pending ECONNREFUSED errors


Patch Installation Instructions:
--------------------------------
 
Please refer to the man pages for instructions on using 'patchadd'
and 'patchrm' commands provided with Solaris.
 
The following example installs a patch to a standalone machine:
 
       example# patchadd /var/spool/patch/123456-07
 
The following example removes a patch from a standalone system:
 
       example# patchrm 123456-07
 
For additional examples please see the appropriate man pages. Any
other special or non-generic installation instructions should be
described below as special instructions.


Special Install Instructions:
-----------------------------
 
NOTE 1:  Perform patch installation in single user mode.
         Reboot the system immediately after patch installation.
 
NOTE 2:  To get the complete fix for bugids
 
         5094229 driver hangs when accessing tt_open
         6231203 sotpi_bindlisten() should use T_BIND_REQ
                 instead of O_T_BIND_REQ for AF_INET/AF_INET6
         6313308 UDP anonymous port assigned used/unavailable ports
 
         please also install the following patch:
 
         116965-27 (or greater)  ip/arp/tcp/udp/tun patch


README -- Last modified date: Thursday, July 3, 2014