From: Miroslav Zubcic on
Lion-O wrote:
>> I had thought that I could get from Solaris 10 6/06 to Solaris 10 11/06
>> (or equivalent functionality, at least) via patches. It seems not to be
>> the case, since I don't have everything:
>>
>> bash-3.00# cat /etc/release
>> Solaris 10 6/06 s10s_u2wos_09a SPARC
>> Copyright 2006 Sun Microsystems, Inc. All Rights Reserved.
>> Use is subject to license terms.
>> Assembled 09 June 2006
>
> Well, you assume wrong. I've got Solaris 10/x86 running for some time now and
> got myself a service contract (for $120/yr; get access to *everything* on
> SunSolve without the overhead of guided support (I can usually fix my own
> problems ;))) and this is happening on my system:
>
> magi:/home/peter $ cat /etc/release
> Solaris 10 3/05 s10_74L2a X86
> Copyright 2005 Sun Microsystems, Inc. All Rights Reserved.
> Use is subject to license terms.
> Assembled 22 January 2005
> magi:/home/peter $ man zfs | wc -l
> Reformatting page. Please Wait... done
> 1650
>
> So; a 03/05 release with ZFS support, how do you like that? :-)

Hmmm.

# pkgchk -lP /usr/share/man/man1m/zfs.1m | grep SUNW
SUNWman

Do you have zpool and zfs commands?
which zfs zpool

> For some reason /etc/release isn't changed so you'll remain on that same

pkgrm SUNWsolnm
mount -F hsfs `lofiadm -a /export/software/iso/sol-10-u3-ga-x86-dvd.iso`
/mnt
cd /mnt/Solaris_10/Product
pkgadd -d . SUNWsolnm

Of course, if your system is really update #3.


--
Man is something that shall be overcome.
-- Friedrich Nietzsche
From: Alan Coopersmith on
Rich Teer <rich.teer(a)rite-group.com> writes in comp.unix.solaris:
|Thinking about it a bit more, isn't the rule something like patches
|can only change existing packages, not install new ones?

Yes, but rules can be broken when needed.

--
Alan Coopersmith * alanc(a)alum.calberkeley.org * Alan.Coopersmith(a)Sun.COM
http://blogs.sun.com/alanc/ * http://people.freedesktop.org/~alanc/
http://del.icio.us/alanc/ * http://www.csua.berkeley.edu/~alanc/
Working for, but definitely not speaking for, Sun Microsystems, Inc.
From: Rich Teer on
On Fri, 29 Dec 2006, Alan Coopersmith wrote:

> Rich Teer <rich.teer(a)rite-group.com> writes in comp.unix.solaris:
> |Thinking about it a bit more, isn't the rule something like patches
> |can only change existing packages, not install new ones?
>
> Yes, but rules can be broken when needed.

Indeed; in fact, isn't that the first rule? :-)

--
Rich Teer, SCNA, SCSA, SCSECA, OpenSolaris CAB member

. * * . * .* .
. * . .*
President, * . . /\ ( . . *
Rite Online Inc. . . / .\ . * .
.*. / * \ . .
. /* o \ .
Voice: +1 (250) 979-1638 * '''||''' .
URL: http://www.rite-group.com/rich ******************
From: Horst Scheuermann on
"Daniel Rock" <v200651(a)deadcafe.de> writes:

> But these are all Solaris 10 examples. I don't have a Solaris 8/9 system here
> so I cannot check these.

until Solaris 9 they had Mandatory Update Patchclusters, an upgrade in
the same release was as simple a to install the recommended Patchcluster.
From: Tim Bradshaw on
Rich Teer wrote:

> So I think that although it's true that SOME (or even many) new
> features become available in the form of patches, I don't think
> ALL new features become available via patches.
>

I'd like to argue that, for patches that might get automatically
applied (via PCA or whatever horror Sun want us to use this week) then
it's generally rather undesirable that new features get introduced. It
should be the case that it's mostly-safe to patch a production machine,
in the sense that you only need to check that existing things have not
been broken, not that new things have appeared.

(A gratuitous example might be some new network daemon appearing, with
default settings which were not safe. For instance if patches moved a
system from one DHCP server to another, which used different
configuration files and left the machine with some wide-open DHCP
daemon. I'm sure Sun haven't done this particular thing and would not
do so, but you get the idea.)

Of course patches which won't get automagically dragged in are a
different case. All this leads on to some notion of classifying
patches etc in some principled way, which I'm not sure is really done,
though I confess to not having checked recently. This would allow, for
instance, patches which are very urgent (fixing critical public flaws)
to be released with almost no testing (for instance, on the same day
the vulnerability/exploit is discovered) and for people using automated
patch tools to be able to say which patches they want, along the lines
of: "I only want fully tested patches *unless* they fix security issues
with severity greater than x in packages a,b,c..".

(Again a gratuitous example of this: I'd rather take a patch for a
critical sendmail vulnerability from Sun even if it had basically no
testing than the alternative which is probably to build my own sendmail
and doom myself to a life in torment.)

I once had a fairly fully worked-out scheme for doing this, but I think
I've lost the document that described it (it was almost literally the
back of an envelope, I think actually the back of some course
materials).

--tim