Smpatch analyze fails
When I run "smpatch analyze" on my Solaris 10 x86 10/08 system, I get:
Failure: Response code was 500What does this mean and what can I do to fix it?
Thanks.
ForumModerator wrote:
Thanks for the file.
Following analysis we have determined:
1. Java version installed 1.6.01_11 has been known in exceptional circumstances to cause problems. Please revert to java version 1.5* using the following commands.
# cacaoadm stop
# cacaoadm set-param java-home=/usr/jdk/jdk1.5.0_16
# cacaoadm startDone. No change.
2. Basic Update Connection patches are in order. Is this a proxy patch server or an agent??I'm not sure I understand the question. This is a desktop system.
3.
Can you please check that the system has no connectivity issues, what is the output of the following commands:
# telnet sun.com 80
# telnet cns-services.sun.com 443
# telnet getupdates1.sun.com 443
# telnet a248.e.akamai.net 443
Please also supply the output of the following commands:
# svcs -xv
# ifconfig -a
please upload the results as previously done
Done. The file is "cores/command_output.txt." I have no other connectivity problems. I'm connecting to these forums using the box in question.
Thanks.
Similar Messages
-
Smpatch analyze fails to run on Solaris 10 Sparc systems
I have two Sparc Solaris 10 systems that I am unable to get to successfully patch. The 'sconadm' tool runs correctly, but smpatch bombs out with one of the following two errors:
Failure: Cannot connect to retrieve current2.zip: You are not authorized to access this service.
Failure: Cannot connect to retrieve detectors.jar: You are not authorized to access this service.'dmesg' suggests that it is failing to send the correct credentials to the update server:
Aug 18 12:23:01 pheasant root: [ID 702911 user.crit] => com.sun.patchpro.cli.PatchServices@1bcdbf6 <=Caused by: java.io.IOException: Server returned HTTP response code: 403 for URL: https://getupdates1.sun.com/database/current2.zipIf I attempt to download this file in a web browser, my Sun Online credentials allow me to do so, so they are valid.
I've found threads of people with similar issues, but none of the presented solutions have worked for me. I've tried updating all the related patches, but to no avail.
I've downloaded the 'suc.sh' tool and supplied the output from one of my servers:
# ./suc.sh
User: root
Logname: root
Tue Aug 18 12:30:20 BST 2009
pheasant
smpatch settings:
patchpro.backout.directory - ""
patchpro.baseline.directory - /var/sadm/spool
patchpro.download.directory - /var/sadm/spool
patchpro.install.types - rebootafter:reconfigafter:standard
patchpro.patch.source - https://getupdates1.sun.com/
patchpro.patchset - current2
patchpro.proxy.host - ""
patchpro.proxy.passwd **** ****
patchpro.proxy.port - 8080
patchpro.proxy.user - ""
smpatch analyze:
Failure: Cannot connect to retrieve current2.zip: You are not authorized to access this service.
Entitlement:
cat: cannot open /var/sadm/spool/cache/entitlement/*entitlement_client
Sun UC patch revision:
120335-04
121081-06
121081-08
121118-16
121453-02
122231-01
123003-03
123005-07
123630-03
123893-05
123893-15
124171-07
137137-09
Solaris release:
Solaris 10 5/09 s10s_u7wos_08 SPARC
Copyright 2009 Sun Microsystems, Inc. All Rights Reserved.
Use is subject to license terms.
Assembled 30 March 2009
Solaris Kernel: Generic_141414-07
Machine Type: sun4v
Platform: SUNW,SPARC-Enterprise-T5120
Java versions:
System default:
java version "1.5.0_19"
Java(TM) 2 Runtime Environment, Standard Edition (build 1.5.0_19-b02)
Java HotSpot(TM) Server VM (build 1.5.0_19-b02, mixed mode)
Java 5:
java version "1.5.0_19"
Java(TM) 2 Runtime Environment, Standard Edition (build 1.5.0_19-b02)
Java HotSpot(TM) Server VM (build 1.5.0_19-b02, mixed mode)
Java 6:
Unable to locate JRE meeting specification "1.6*"
Java used by smpatch and updatemanager:
/usr/sbin/pprosvc:JAVACMD="/usr/jdk/latest/bin/java -version:1.5+"
/bin/updatemanager:JAVA_EXEC="/usr/jdk/latest/bin/java -version:1.5+"
Cacao Java version:
java-home=/usr/jdk/jdk1.5.0_19
Cacao Base Directories:
cacao.install.rt.base.dir=/
cacao.install.etc.base.dir=/
Software Cluster:
CLUSTER=SUNWCXall
All ccr properties:
18:
Property not defined: 18
cns.assetid:
EpZ/R8Qb0Pm6RveZcxEkQs65/+Q=
cns.br.SunUCenabled:
true
cns.ccr.keyGenPath:
/usr/lib/cc-ccr/bin/ccrKeyGen
cns.clientid:
ba7a3b27-d847-4abc-9453-ba80d2f6c2b0
cns.httpproxy.auth:
cns.httpproxy.ipaddr:
cns.httpproxy.port:
cns.regtoken:
3912c9d8-22e8-41d9-8e09-e7b50f186b44:1280448000000:T
cns.security.password:
tKb+Hl+DUx8YZdtTk4Dw+keG66XcqAr7FgkCJ2LT96im
cns.security.privatekey:
-----BEGIN ENCRYPTED PRIVATE KEY-----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-----END ENCRYPTED PRIVATE KEY-----
cns.security.publickey:
-----BEGIN PUBLIC KEY-----
MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQDKy2n+88gjTxo/4za2Q92l4XBQ
ZqCpJq0WFpdRvaEiRFXQJHtv66+XfKTUufq8CuFR8OLTSrA/PpTqSNTEBvmBJf7n
NG6lXBM2fvgakxTwjtaZkvZl3Yhf8gBJp8pptuyMihStlt+u+0CBdwMmrz91wGDQ
3MNdlDRdukKn66llLwIDAQAB
-----END PUBLIC KEY-----
cns.swup.UMautolaunch:
false
cns.swup.autoAnalysis.enabled:
true
cns.swup.checkinInterval:
2
cns.swup.lastCheckin:
0
cns.swup.patchbaseline:
current
cns.swup.regRequired:
true
cns.transport.serverurl:
https://cns-transport.sun.com
patchsvr not installed.
Sun UC package status:
SUNWbreg not installed
SUNWdc not installed
Services in maintenance/disabled state:Hi, I'm also experiencing this issue. Is there an rss or bug list I can follow to check for eta/resolution?
-
Smpatch analyze error: Failure: Cannot connect to retrieve detectors: RSA p
Has anyone seen this before?
I just installed Sun Update Manager on a E250 running Solaris 10. I tried registering using the Wizard, but when I chose the "Apply updates manually" button, then Finish, I get the message: System registration failed; exiting application
and the Wizard ends.
Am I missing a step?Hi Scott:
I have failures when doing registration via the GUI or smpatch from a shell. Output of smpatch command as follows:
# smpatch analyze
Failure: Cannot connect to retrieve detectors: Connection refused
Relevant entries in /var/adm/messages (hostname is host01):
Aug 25 21:40:29 host01 root: [ID 702911 user.crit] => com.sun.patchpro.cli.PatchServices@5e3974 <=com.sun.patchpro.util.CannotConnectException: Cannot connect to retrieve detectors: Connection refused
Aug 25 21:40:29 host01 at com.sun.patchpro.util.CachingDownloader.establishConnection(CachingDownloader.java:611)
Aug 25 21:40:29 host01 at com.sun.patchpro.util.CachingDownloader.setSourceURL(CachingDownloader.java:273)
Aug 25 21:40:29 host01 at com.sun.patchpro.util.CachingDownloader.setupCache(CachingDownloader.java:199)
Aug 25 21:40:29 host01 at com.sun.patchpro.util.CachingDownloader.<init>(CachingDownloader.java:184)
Aug 25 21:40:29 host01 root: [ID 702911 user.crit] => com.sun.patchpro.cli.PatchServices@5e3974 <= at com.sun.patchpro.server.ServerPatchServiceProvider.downloadFile(ServerPatchServiceProvider.java:746)
Aug 25 21:40:29 host01 at com.sun.patchpro.server.ServerPatchServiceProvider.downloadRealizationDetectors(ServerPatchServiceProvider.java:568)
Aug 25 21:40:29 host01 at com.sun.patchpro.server.PatchServerProxy.downloadRealizationDetectors(PatchServerProxy.java:121)
Aug 25 21:40:29 host01 at com.sun.patchpro.analysis.HostAnalyzer$RealizationSetAuto.downloadDetectorsWithPOST(HostAnalyzer.java:1183)
Aug 25 21:40:29 host01 at com.sun.patchpro.analysis.HostAnalyzer$RealizationSetAuto.downloadDetectors(HostAnalyzer.java:1154)
Aug 25 21:40:29 host01 root: [ID 702911 user.crit] => com.sun.patchpro.cli.PatchServices@5e3974 <= at com.sun.patchpro.analysis.HostAnalyzer$RealizationSetAuto.prepare(HostAnalyzer.java:873)
Aug 25 21:40:29 host01 at com.sun.patchpro.analysis.HostAnalyzer.downloadDetectors(HostAnalyzer.java:299)
Aug 25 21:40:29 host01 at com.sun.patchpro.model.PatchProModel.downloadDetectors(PatchProModel.java:1764)
Aug 25 21:40:29 host01 at com.sun.patchpro.model.PatchProStateMachine$4.run(PatchProStateMachine.java:245)
Aug 25 21:40:29 host01 at com.sun.patchpro.util.State.run(State.java:266)
Aug 25 21:40:29 host01 root: [ID 702911 user.crit] => com.sun.patchpro.cli.PatchServices@5e3974 <= at java.lang.Thread.run(Thread.java:595)
Aug 25 21:40:29 host01 Caused by:
Aug 25 21:40:29 host01 java.net.ConnectException: Connection refused
Aug 25 21:40:29 host01 at java.net.PlainSocketImpl.socketConnect(Native Method)
Aug 25 21:40:29 host01 at java.net.PlainSocketImpl.doConnect(PlainSocketImpl.java:333)
Aug 25 21:40:29 host01 root: [ID 702911 user.crit] => com.sun.patchpro.cli.PatchServices@5e3974 <= at java.net.PlainSocketImpl.connectToAddress(PlainSocketImpl.java:195)
Aug 25 21:40:29 host01 at java.net.PlainSocketImpl.connect(PlainSocketImpl.java:182)
Aug 25 21:40:29 host01 at java.net.Socket.connect(Socket.java:507)
Aug 25 21:40:29 host01 at java.net.Socket.connect(Socket.java:457)
Aug 25 21:40:29 host01 at sun.net.NetworkClient.doConnect(NetworkClient.java:157)
Aug 25 21:40:29 host01 root: [ID 702911 user.crit] => com.sun.patchpro.cli.PatchServices@5e3974 <= at sun.net.www.http.HttpClient.openServer(HttpClient.java:365)
Aug 25 21:40:29 host01 at sun.net.www.http.HttpClient.openServer(HttpClient.java:477)
Aug 25 21:40:29 host01 at sun.net.www.protocol.https.HttpsClient.<init>(HttpsClient.java:280)
Aug 25 21:40:29 host01 at sun.net.www.protocol.https.HttpsClient.New(HttpsClient.java:337)
Aug 25 21:40:29 host01 at sun.net.www.protocol.https.AbstractDelegateHttpsURLConnection.getNewHttpClient(AbstractDelegateHttpsURLConnection.java:176)
Aug 25 21:40:30 host01 root: [ID 702911 user.crit] => com.sun.patchpro.cli.PatchServices@5e3974 <= at sun.net.www.protocol.http.HttpURLConnection.plainConnect(HttpURLConnection.java:736)
Aug 25 21:40:30 host01 at sun.net.www.protocol.https.AbstractDelegateHttpsURLConnection.connect(AbstractDelegateHttpsURLConnection.java:162)
Aug 25 21:40:30 host01 at sun.net.www.protocol.http.HttpURLConnection.getOutputStream(HttpURLConnection.java:828)
Aug 25 21:40:30 host01 at com.sun.net.ssl.internal.www.protocol.https.HttpsURLConnectionOldImpl.getOutputStream(HttpsURLConnectionOldImpl.java:200)
Aug 25 21:40:30 host01 at com.sun.patchpro.util.Downloader.connectToURL(Downloader.java:294)
Aug 25 21:40:30 host01 root: [ID 702911 user.crit] => com.sun.patchpro.cli.PatchServices@5e3974 <= at com.sun.patchpro.util.CachingDownloader.establishConnection(CachingDownloader.java:583)
Aug 25 21:40:30 host01 at com.sun.patchpro.util.CachingDownloader.setSourceURL(CachingDownloader.java:273)
Aug 25 21:40:30 host01 at com.sun.patchpro.util.CachingDownloader.setupCache(CachingDownloader.java:199)
Aug 25 21:40:30 host01 at com.sun.patchpro.util.CachingDownloader.<init>(CachingDownloader.java:184)
Aug 25 21:40:30 host01 at com.sun.patchpro.server.ServerPatchServiceProvider.downloadFile(ServerPatchServiceProvider.java:746)
Aug 25 21:40:30 host01 root: [ID 702911 user.crit] => com.sun.patchpro.cli.PatchServices@5e3974 <= at com.sun.patchpro.server.ServerPatchServiceProvider.downloadRealizationDetectors(ServerPatchServiceProvider.java:568)
Aug 25 21:40:30 host01 at com.sun.patchpro.server.PatchServerProxy.downloadRealizationDetectors(PatchServerProxy.java:121)
Aug 25 21:40:30 host01 at com.sun.patchpro.analysis.HostAnalyzer$RealizationSetAuto.downloadDetectorsWithPOST(HostAnalyzer.java:1183)
Aug 25 21:40:30 host01 at com.sun.patchpro.analysis.HostAnalyzer$RealizationSetAuto.downloadDetectors(HostAnalyzer.java:1154)
Aug 25 21:40:30 host01 at com.sun.patchpro.analysis.HostAnalyzer$RealizationSetAuto.prepare(HostAnalyzer.java:873)
Aug 25 21:40:30 host01 root: [ID 702911 user.crit] => com.sun.patchpro.cli.PatchServices@5e3974 <= at com.sun.patchpro.analysis.HostAnalyzer.downloadDetectors(HostAnalyzer.java:299)
Aug 25 21:40:30 host01 at com.sun.patchpro.model.PatchProModel.downloadDetectors(PatchProModel.java:1764)
Aug 25 21:40:30 host01 at com.sun.patchpro.model.PatchProStateMachine$4.run(PatchProStateMachine.java:245)
Aug 25 21:40:30 host01 at com.sun.patchpro.util.State.run(State.java:266)
Aug 25 21:40:30 host01 at java.lang.Thread.run(Thread.java:595)This is about all the information regarding this problem I have been able to find on the system.
Hope you can help.
Ben. -
I get the following error when I run smpatch analyze:
Failure: Cannot connect to retrieve Database/current.zip: Connection reset
I was successfully able to register the system, but keep getting this error with smpatch analyze. I snooped the traffic and saw packets to & from getupdates1.sun.com on port 443, so there is not a firewall problem.
Did I miss a step in the installation?
ThanksLooks like the root cause (to me at least) is confusion between the contracted support server and the public updates server. They appear not to be the same...
Since late September all my Sol 8 "smpatch" clients were broken, giving me "Response code was 500" because the LPS / Update Connection Proxy was set to https://getupdates1.sun.com/ which is apparently the public site. ( https://getupdates.sun.com/ didn't work either.)
My Solaris 10 clients were working fine through the LPS, however - or so I thought.
When I just noticed that the patchpro.patch.source on Solaris 8 with 124270-01 is showing https://updateserver.sun.com/solaris/ as the default, I tried that as the LPS patch source URL, and now everything works again - for the first time in weeks.
Disclaimer: We are a support contract customer, so I don't know if this info applies to everyone. My LPS has been registered (has "entitlement") since I set it up in February, so it was a complete surprise that Solaris 8 smpatch clients started failing even after I put 124270-01 on the client and 121118-08 on the Sol 10 LPS.
Hope this helps...
-- Stefan -
Why doesn't smpatch analyze match patchdiag output?
Can someone explain this and if it will change in the future. If so, when ca we expect it?
First, I understand that the patchdiag.xref file is commonly more current than patchdb.zip (by a day) but that's not what I am talking about.
I see across most hosts and OS versions patches that aren't flagged for update by smpatch analyze but are by patchdiag. Many are obviously important files (not obscure), a good example I have seen on other boxes are the SUNWsan patches, sd patches, etc.
Below is an example from a Solaris 10 box.
# smpatch analyze
No patches required.
# ./patchdiag -l | grep "^1" | grep -v CURR | grep -v Obsol
113886 27 32 OpenGL 1.3: OpenGL Patch for Solaris (32-bit)
113887 27 32 OpenGL 1.3: OpenGL Patch for Solaris (64-bit)
116298 08 17 Sun One Application Server 7.0: Java API for XML Parsing 1.2 Patch
116302 02
119073 02 03 SunOS 5.10: ldapclient patch
119115 13 14 Mozilla 1.7 patch
119130 06 13 SunOS 5.10: Sun Fibre Channel Device Drivers
119313 03 04 SunOS 5.10: WBEM Patch
119366 04 05 GNOME 2.6.0: Display Manager Patch
119370 08 09 GNOME 2.6.0: GNOME panel and support libraries Patch
119548 02 03 GNOME 2.6.0: Gnome Multi-protocol instant messaging client Patch
119687 01 02 SunOS 5.10: in.mpathd patch
119982 01 03 SunOS 5.10: ufsboot patch
120469 02 03 SunOS 5.10: kerberos patch
118666 S SUNWj5cfg 04 43 J2SE 5.0: update 5 patch
118667 S SUNWj5dmx 04 43 J2SE 5.0: update 5 patch, 64bit
118676 SUNWsprot 01 239 SunOS 5.10: patch for Solaris make and sccs utilities
118683 SUNWsprot 01 190 SunOS 5.10: Patch for assembler
119213 * SUNWjss 06 57 SunOS 5.10: NSPR 4.5.2 / NSS 3.10.1 / JSS 4.1
119586 SUNWcpcu 02 2 SunOS 5.10: pcbe Patch
119963 SUNWlibC 04 8 SunOS 5.10: Shared library patch for C++
119974 SUNWcfpl 02 64 SunOS 5.10: fp plug-in for cfgadm
120195 SUNWcakr 01 142 SunOS 5.10: schpc sc_gptwocfg gptwo_pci patch
120201 SUNWxorg-clientlibs 01 143 X11 6.8.0: Xorg client libraries patch
120338 SUNWkiu8 04 93 SunOS 5.10: Asian CCK locales patch
120560 SUNWxwpl 01 93 SunOS 5.10: sun4u platform links patch
120706 SUNWxildh 01 57 SunOS 5.10: XIL 1.4.2 Loadable Pipeline Libraries
120753 SUNWlibm 02 8 SunOS 5.10: Microtasking libraries (libmtsk) patch
120998 SUNWhea 01 3 SunOS 5.10: sd headers patch
121211 SUNWmcon 01 3 SunOS 5.10: Sun Java Web Console (Lockhart) Patch
#Here's some output from today.
new install Solaris 10 3/05
applied rec patch cluster, then smpatch update to current
# smpatch analyze
No patches required.
patchdb.zip:
93 11-30-05 22:05 patchlist.properties
1623621 12-01-05 00:15 patchlist.delimited
patchdiag.xref header:
## PATCHDIAG TOOL CROSS-REFERENCE FILE AS OF Dec/12/05 ##
Patchdiag output showing full info (current rev, needed, etc)
# ./patchdiag -l | grep "^1" | grep -v CURR | grep -v Obsol
113886 27 32 OpenGL 1.3: OpenGL Patch for Solaris (32-bit)
113887 27 32 OpenGL 1.3: OpenGL Patch for Solaris (64-bit)
116298 08 17 Sun One Application Server 7.0: Java API for XML Parsing 1.2 Patch
116302 02
117461 06 08 SunOS 5.10: ld Patch
118707 03 04 SunOS 5.10: Expert3D IFB Graphics Patch
119073 02 03 SunOS 5.10: ldapclient patch
119115 13 14 Mozilla 1.7 patch
119313 03 04 SunOS 5.10: WBEM Patch
119366 04 05 GNOME 2.6.0: Display Manager Patch
119370 08 09 GNOME 2.6.0: GNOME panel and support libraries Patch
119414 02 03 GNOME 2.6.0: Gnome Accessibility Libraries Patch
119548 02 03 GNOME 2.6.0: Gnome Multi-protocol instant messaging client Patch
119598 03 04 GNOME 2.6.0: Gnome Screen Reader and Magnifier Patch
119681 03 05 SunOS 5.10: patch platform/sun4u/wanboot
119687 01 02 SunOS 5.10: in.mpathd patch
119712 01 02 SunOS 5.10: usr/sbin/in.routed Patch
119982 01 03 SunOS 5.10: ufsboot patch
120133 02 03 GNOME 2.6.0: Gnome themes Patch
120469 02 03 SunOS 5.10: kerberos patch
120887 01 02 SunOS 5.10: cdrw patch
118666 S SUNWj5cfg 04 48 J2SE 5.0: update 5 patch
118667 S SUNWj5dmx 04 48 J2SE 5.0: update 5 patch, 64bit
118676 SUNWsprot 01 244 SunOS 5.10: patch for Solaris make and sccs utilities
118683 SUNWsprot 01 195 SunOS 5.10: Patch for assembler
119213 * SUNWjss 06 62 SunOS 5.10: NSPR 4.5.2 / NSS 3.10.1 / JSS 4.1
119586 FJSVcpcu 02 7 SunOS 5.10: pcbe Patch
119728 FJSVfmd 02 187 SunOS 5.10: FJSV,GPUU platform fmd.conf patch
119963 SUNWlibC 04 13 SunOS 5.10: Shared library patch for C++
119974 SUNWcfpl 02 69 SunOS 5.10: fp plug-in for cfgadm
120195 SUNWcakr 01 147 SunOS 5.10: schpc sc_gptwocfg gptwo_pci patch
120201 SUNWxorg-clientlibs 01 148 X11 6.8.0: Xorg client libraries patch
120338 SUNWkiu8 04 98 SunOS 5.10: Asian CCK locales patch
120560 SUNWxwpl 01 98 SunOS 5.10: sun4u platform links patch
120706 SUNWxildh 01 62 SunOS 5.10: XIL 1.4.2 Loadable Pipeline Libraries
120753 SUNWlibm 02 13 SunOS 5.10: Microtasking libraries (libmtsk) patch
120998 SUNWhea 02 5 SunOS 5.10: sd headers
121104 S SUNWacroread 01 1 Adobe Acrobat Reader patch
121136 S SUNWacroread-plugin 01 1 Adobe Acrobat Reader patch
121211 SUNWmcon 01 8 SunOS 5.10: Sun Java Web Console (Lockhart) Patch
Obviously a difference in reference file dates, but not sure if these patchdiag patches are since the patchdb dates. I'll leave that to you all to research.
Hope this ouput helps. JB -
Smpatch analyze gives different result after disabling Sun Connection Host
Hi all,
after disabling the Sun Connection Hosted functionality due to the EOL announcement I get a smaller number of patches from 'smpatch analyze' for a brand new jumpstarted server (227 patches before vs. 106 patches after).
Trying e.g. a individual analysis for 126651-01 (Synopsis: SunOS 5.10: tar patch) results in
Error: One or more of the updates specified do not have entitlement permissions.
BTW: I ran the analysis for patch 126651-01 before without any problem.
The entitlement file
/var/sadm/spool/cache/entitlement/https%3A%2F%2Fgetupdates1.sun.com%2F%2Fentitlement_client
looks like
----START-ENTITLEMENT-TOKENS----
Solaris10Security
SolarisSecurityUpdates
SolarisDataIntegrityUpdates
SolarisHardwareUpdates
SolarisUtilityUpdates
Public
-----END-ENTITLEMENT-TOKENS-----
And we do have a service plan!
Any ideas?
Kind Regards
MarcoHi Shen,
thanks for your reply. I tried this procedure from your thread
Try re-registering the patch server after running these commands:
# cacaoadm stop
# cacaoadm status
# rm -r /var/sadm/spool/cache/*
# /usr/lib/cc-ccr/bin/eraseCCRRepository
# rm /var/scn/persistence/SCN*
# cacaoadm start
# /usr/sbin/sconadm register -a -r registrationprofile.properties
But unfortunately the problem persists. The entitlement file looks the same as before. The registrationprofile.properties files looks like
userName=<username>
password=<pw>
hostName=<hostname>
subscriptionKey=<key>
portalEnabled=false
proxyHostName=
proxyPort=
proxyUserName=
proxyPassword=
We use a direct connection to sun's update server without a SunUC proxy. (I disabled the proxy, because I had some trouble with it in the past).
'smpatch get' gives
patchpro.backout.directory - ""
patchpro.baseline.directory - /var/sadm/spool
patchpro.download.directory - /var/sadm/spool
patchpro.install.types - rebootafter:reconfigafter:standard
patchpro.patch.source - https://getupdates1.sun.com/
patchpro.patchset - current
patchpro.proxy.host - ""
patchpro.proxy.passwd **** ****
patchpro.proxy.port - 8080
patchpro.proxy.user - "" -
Solaris 10 - LPS not working with smpatch analyze
I recently started patching systems with IDR124828-01 as a temporary fix to the security vulnerability listed here:
http://sunsolve.sun.com/search/document.do?assetkey=1-26-102724-1
Since this temporary patch requires kernel patch 118833-24, I needed to get a few of my systems up to date. However, after patching the LPS with the temporary patch, using `smpatch analyze/update` on any system returns: No patches required.
I successfully patched some systems yesterday, so I figured the temporary patch had borked the patchsvr. I verified the problem was with the LPS because changing smpatch settings on the LPS like so: patchpro.patch.source=https://getupdates1.sun.com/ works fine.
Restarting the patchsvr doesn't help. Debug output from smpatch is also not helpful. There are no errors appearing in the patchsvr logs.
Any advice on how I can back out the temporary patch gracefully, or any other problems that may be causing this?There were 13 clients originally, there seems to be problems with more than 4. They are all running solaris 10.
The debug output isn't being very helpful (no errors, obvious problems) - All of the analyzed patches appear in this form:
com.sun.patchpro.patch.PatchSequencer@63b2e6 <=Installed patch 121133-02 is >= to current patch 121133-02
There don't seem to be any listed patches newer than September 22 (About the last time they got a large set of patches) - Some of the patches are not current versions as well. E.g. it analyzed patch 121081-05, the latest revision is -06. -
Solaris9: smpatch analyze indicate wrongly only few patches missing
Hi,
On my Solaris 9 system (through LPS solaris 10), smpatch analyze indicates only 3 patches missing (SAN4.4.x).
But when I check with patchdiag.xref, i find it should indicates much more.
I manuallly add (patchadd) the patch 140476-01 as indicated in the last smpatch messages (2009/01/13) to take in account the new certificates and new patchset (current2).
Could you tell me what I missed and how I can recover the fully functionnal smpatch ?
My smpatch configuration is
Local (S9)
patchpro.backout.directory - ""
patchpro.baseline.directory - /var/sadm/spool
patchpro.download.directory - /var/sadm/spool
patchpro.install.types - rebootafter:reconfigafter:standard
patchpro.patch.source http://proxymach:3816/ https://getupdates1.sun.com/
patchpro.patchset - current2
patchpro.proxy.host - ""
patchpro.proxy.passwd **** ****
patchpro.proxy.port - 8080
patchpro.proxy.user - ""
proxymach (S10)
patchpro.backout.directory - ""
patchpro.baseline.directory - /var/sadm/spool
patchpro.download.directory - /var/sadm/spool
patchpro.install.types rebootafter:reconfigafter:standard:singleuser:rebootimmediate:reconfigimmediate rebootafter:reconfigafter:standard
patchpro.patch.source - https://getupdates1.sun.com/
patchpro.patchset - current2
patchpro.proxy.host myproxy ""
patchpro.proxy.passwd **** ****
patchpro.proxy.port 80 8080
patchpro.proxy.user - ""First, thanks for the analysis of sidmir. And thanks for having taken my problem in account.
Second, the patchdiag.xref i meant is the crossref of the patchdiag-1.0.4 tool.
I put an excerpt result of the patchdiag command on ACSLSCTI (i removed the CURRENT lines) is below. I consider that what patchdiag is warning about should be returned by smpatch analyze.
System Name: ACSLSCTI SunOS Vers: 5.9 Arch: sparc
Cross Reference File Date: Jan/20/09
PatchDiag Version: 1.0.4
INSTALLED PATCHES
Patch Installed Latest Synopsis
ID Revision Revision
111703 03 04 SunOS 5.9: /usr/ccs/bin/sccs and /usr/ccs/bin/make patch
111711 16 19 SunOS 5.9: 32-bit Shared library patch for C++
111712 16 19 SunOS 5.9: 64-Bit Shared library patch for C++
112661 11 13 SunOS 5.9: IIIM and X Input & Output Method patch
120464 01 03 Obsoleted by: 114344-18 SunOS 5.9: ifconfig, in.routed, ipmp patch
122300 19 35 SunOS 5.9: Kernel Patch
125673 01 02 GNOME 2.0.2: SUNWTiff libtiff library patch
126982 01
======================================================================================
UNINSTALLED RECOMMENDED PATCHES
Patch Ins Lat Age Require Incomp Synopsis
ID Rev Rev ID ID
113023 N/A 01 2281 SunOS 5.9: Broken preremove scripts in S9 ALC packages
137910 N/A 02 141 SunOS 5.9: tk patch
138575 N/A 01 61 SunOS 5.9: rpc.ypupdated patch
======================================================================================
UNINSTALLED SECURITY PATCHES
NOTE: This list includes the Security patches that are also Recommended
Patch Ins Lat Age Require Incomp Synopsis
ID Rev Rev ID ID
112902 N/A 08 2238 112233-01 WITHDRAWN PATCH Obsoleted by: 112902-11 SunOS 5.9: kernel/drv/ip P
112902 N/A 12 2095 112233-01 Obsoleted by: 112904-07 SunOS 5.9: kernel/drv/ip Patch
112904 N/A 09 1926 112233-07 WITHDRAWN PATCH Obsoleted by: 112233-11 SunOS 5.9: tcp/ip Patch
138577 N/A 01 14 117171-17 SunOS 5.9: kernel/sys/kaio patch
140426 N/A 01 2 SunOS 5.9: ptsl patch
If smpatch is functionning well, do you have any clue why it is not listing those missing patches ? -
Smpatch analyze and download picks up just some Veritas patches
smpatch analyze and download are picking up Veritas patches but only some of them. I found this out the hard way yesterday when only some of the SFRAC packages were patched during OS patching.
Veritas support is aware and said other customers had called in with similar outages caused by this.
Is anyone at Sun aware this is happening?
Personally I find is disturbing that Sun is including any Veritas patches in the output by default. The fact that they are partially patching the installed product in some cases is reason enough not to do this.We assure our detectors and current files are kept up to date daily. (we're not updateconnection newbies ;-))
We are not in the practice of doing the leg work for Sun support (especially since we pay for support), please ask them to do their own analysis of the patches they are supplying and QA work.
Veritas provides very nice packages for both the SF packages and their patches, Sun should be directing customers to use those rather than going off and doing their own thing when it comes to Veritas products. Our sysadmins (all 20 of them) agree we should not allow Sun to patch our Veritas products, especially considering the ongoing QA issues with Sun's patch products.
Thanks for responding. -
Smpatch analyze - five days analyzing?
After changing RAM up to 8GB, "smpatch analyze" ran from crontab for the first time that I noticed. Seemed to take lots of CPU cycles (Sun Ultra 20 M2 - x86 running Solaris 10 from MY2006) so I shut off the crontab instance and started one from the command line.
Five days later, it still seems to be analyzing and consuming all resources of one CPU.
Any RTFMs (with FM suggestions) or condolences welcome.
Donald.Only the first thread is showing any activity. All the rest (I did several comparisons) seem to be in the cond-wait state. I just ran a once-per-minute pstack. All diffs are in lpw #1/thread #1; here are some extracts: That's all I have room for; hope it's not to onerous. the 17911 is the PID of the processes spawned by /sbin/sh /usr/sbin/pprosvc -l (from the smpatch analyze command.)
17911: /usr/bin/java -Djava.library.path=/usr/lib/cc-ccr/lib com.sun.patchpro
----------------- lwp# 1 / thread# 1 --------------------
f9329445 ???????? (0, b93599a0, 0, 0, 9, b4e6af78)
b4e4b4d8 ???????? ()
----------------- lwp# 2 / thread# 2 --------------------
fef50a17 lwp_cond_wait (80f5218, 80f5200, 0, 0)
fe92faca __1cHMonitorEwait6Mil_i_ (80f51a8, 1, 0) + 4ba
fe9114dd __1cNGCTaskManagerIget_task6MI_pnGGCTask__ (80f5168, 0) + 90
fea57643 __1cMGCTaskThreadDrun6M_v_ (80f5238) + 1a3
fecb27f2 __1cG_start6Fpv_0_ (80f5238) + d2
fef4f92e thrsetup (fef92400) + 4e
fef4fc10 lwpstart (fef92400, 0, 0, fbd7bff8, fef4fc10, fef92400)
----------------- lwp# 3 / thread# 3 --------------------
fef50a17 lwp_cond_wait (80f5218, 80f5200, 0, 0)
fe92faca __1cHMonitorEwait6Mil_i_ (80f51a8, 1, 0) + 4ba
fe9114dd __1cNGCTaskManagerIget_task6MI_pnGGCTask__ (80f5168, 1) + 90
fea57643 __1cMGCTaskThreadDrun6M_v_ (80f5c78) + 1a3
fecb27f2 __1cG_start6Fpv_0_ (80f5c78) + d2
fef4f92e thrsetup (fe3f0000) + 4e
fef4fc10 lwpstart (fe3f0000, 0, 0, fbd39ff8, fef4fc10, fe3f0000)
----------------- lwp# 4 / thread# 4 --------------------
fef50a17 lwp_cond_wait (80739c8, 80739b0, fbcf7b88, 0)
fef3dc1f lwpcond_timedwait (80739c8, 80739b0, fbcf7bd0) + 35
fe92faa8 __1cHMonitorEwait6Mil_i_ (8073958, 1, 3e8) + 498
fea676dd __1cIVMThreadEloop6M_v_ (817bee8) + fd
fea681c8 __1cIVMThreadDrun6M_v_ (817bee8) + 88
fecb27f2 __1cG_start6Fpv_0_ (817bee8) + d2
fef4f92e thrsetup (fe3f0400) + 4e
fef4fc10 lwpstart (fe3f0400, 0, 0, fbcf7ff8, fef4fc10, fe3f0400)
----------------- lwp# 5 / thread# 5 --------------------
fef50a17 lwp_cond_wait (817e2e0, 817e2c8, 0, 0)
fe9d73ac __1cCosHSolarisFEventEpark6M_v_ (817e2a0) + 4c
fe9e52f6 __1cNObjectMonitorEwait6MxipnGThread__v_ (817e4f4, 0, 0, 1, 817dfc0) + 346
fe9e5a00 __1cSObjectSynchronizerEwait6FnGHandle_xpnGThread__v_ (8125eec, 0, 0, 817dfc0) + 70
fe9e4db4 JVM_MonitorWait (817e080, fbcb5af0, 0, 0, fbcb5abc, 0) + 234
f92083ba ???????? (0, f9206319, 0, 0, b90b86a0, fbcb5af4)
f9202aeb ???????? (b90b86a0, 3, b90b86a0, fbcb5b1c, b4e8e056, fbcb5b58)
f9202aeb ???????? (0, f4620010, b90b86a0, f4620010, b908e3b0, 1f80)
f92001af ???????? (fbcb5bb8, fbcb5d5c, a, b4e8e0b0, f9207440, fbcb5cb8)
fe940b67 __1cJJavaCallsLcall_helper6FpnJJavaValue_pnMmethodHandle_pnRJavaCallArguments_pnGThread__v_ (fbcb5d58, fbcb5c50, fbcb5cb4, 817dfc0, fbcb5c44, fe940e68) + 187
fe940e34 __1cCosUos_exception_wrapper6FpFpnJJavaValue_pnMmethodHandle_pnRJavaCallArguments_pnGThread__v2468_v_ (fe9409e0, fbcb5d58, fbcb5c50, fbcb5cb4, 817dfc0) + 14
fe940e68 __1cJJavaCallsEcall6FpnJJavaValue_nMmethodHandle_pnRJavaCallArguments_pnGThread__v_ (fbcb5d58, 8125ee8, fbcb5cb4, 817dfc0) + 28
fe9e7eae __1cJJavaCallsMcall_virtual6FpnJJavaValue_nLKlassHandle_nMsymbolHandle_4pnRJavaCallArguments_pnGThread__v_ (fbcb5d58, 8125edc, fee3bf20, fee3bff0, fbcb5cb4, 817dfc0) + be
fe9f205d __1cJJavaCallsMcall_virtual6FpnJJavaValue_nGHandle_nLKlassHandle_nMsymbolHandle_5pnGThread__v_ (fbcb5d58, 8125ed8, 8125edc, fee3bf20, fee3bff0, 817dfc0) + 6d
fea093b0 __1cMthread_entry6FpnKJavaThread_pnGThread__v_ (817dfc0, 817dfc0) + d0
fea05ae1 __1cKJavaThreadRthread_main_inner6M_v_ (817dfc0) + 51
fea05a85 __1cKJavaThreadDrun6M_v_ (817dfc0) + 105
fecb27f2 __1cG_start6Fpv_0_ (817dfc0) + d2
fef4f92e thrsetup (fe3f0800) + 4e
fef4fc10 lwpstart (fe3f0800, 0, 0, fbcb5ff8, fef4fc10, fe3f0800)
----------------- lwp# 6 / thread# 6 --------------------
fef50a17 lwp_cond_wait (817fc28, 817fc10, 0, 0)
fe9d73ac __1cCosHSolarisFEventEpark6M_v_ (817fbe8) + 4c
fe9e52f6 __1cNObjectMonitorEwait6MxipnGThread__v_ (817e534, 0, 0, 1, 817f4c0) + 346
fe9e5a00 __1cSObjectSynchronizerEwait6FnGHandle_xpnGThread__v_ (817f67c, 0, 0, 817f4c0) + 70
fe9e4db4 JVM_MonitorWait (817f580, f91fdb40, 0, 0, f91fdb0c, 0) + 234
f92083ba ???????? (0, f9206319, 0, 0, b8f25578, 3)
f9202aeb ???????? (0, 0, b8f25578, 0, 0, b9022018)
f9202a14 ???????? (b9022018, f91fdbb0, b4e8e963, f91fdbd8, b4e8ebe0, 0)
f9202a14 ???????? (f46203d8, b908e410, 1f80, fedd0000, 817f4c0, 1)
f92001af ???????? (f91fdc38, f91fdddc, a, b4e8e980, f9207440, f91fdd38)
fe940b67 __1cJJavaCallsLcall_helper6FpnJJavaValue_pnMmethodHandle_pnRJavaCallArguments_pnGThread__v_ (f91fddd8, f91fdcd0, f91fdd34, 817f4c0, f91fdcc4, fe940e68) + 187
fe940e34 __1cCosUos_exception_wrapper6FpFpnJJavaValue_pnMmethodHandle_pnRJavaCallArguments_pnGThread__v2468_v_ (fe9409e0, f91fddd8, f91fdcd0, f91fdd34, 817f4c0) + 14
fe940e68 __1cJJavaCallsEcall6FpnJJavaValue_nMmethodHandle_pnRJavaCallArguments_pnGThread__v_ (f91fddd8, 817f678, f91fdd34, 817f4c0) + 28
fe9e7eae __1cJJavaCallsMcall_virtual6FpnJJavaValue_nLKlassHandle_nMsymbolHandle_4pnRJavaCallArguments_pnGThread__v_ (f91fddd8, 817f66c, fee3bf20, fee3bff0, f91fdd34, 817f4c0) + be
fe9f205d __1cJJavaCallsMcall_virtual6FpnJJavaValue_nGHandle_nLKlassHandle_nMsymbolHandle_5pnGThread__v_ (f91fddd8, 817f668, 817f66c, fee3bf20, fee3bff0, 817f4c0) + 6d
fea093b0 __1cMthread_entry6FpnKJavaThread_pnGThread__v_ (817f4c0, 817f4c0) + d0
fea05ae1 __1cKJavaThreadRthread_main_inner6M_v_ (817f4c0) + 51
fea05a85 __1cKJavaThreadDrun6M_v_ (817f4c0) + 105
fecb27f2 __1cG_start6Fpv_0_ (817f4c0) + d2
fef4f92e thrsetup (fe3f0c00) + 4e
fef4fc10 lwpstart (fe3f0c00, 0, 0, f91fdff8, fef4fc10, fe3f0c00)
----------------- lwp# 7 / thread# 7 --------------------
fef4fc6b lwp_park (0, 0, 0)
17911: /usr/bin/java -Djava.library.path=/usr/lib/cc-ccr/lib com.sun.patchpro
----------------- lwp# 1 / thread# 1 --------------------
f93291d8 ???????? ()
----------------- lwp# 2 / thread# 2 --------------------
17911: /usr/bin/java -Djava.library.path=/usr/lib/cc-ccr/lib com.sun.patchpro
----------------- lwp# 1 / thread# 1 --------------------
f93292ff ???????? ()
----------------- lwp# 2 / thread# 2 --------------------
17911: /usr/bin/java -Djava.library.path=/usr/lib/cc-ccr/lib com.sun.patchpro
----------------- lwp# 1 / thread# 1 --------------------
f930a0ce ???????? (100, 4800100f, 4800100f, 4800100f, 4800100f, 4800100f)
b4e00a70 ???????? ()
----------------- lwp# 2 / thread# 2 --------------------
17911: /usr/bin/java -Djava.library.path=/usr/lib/cc-ccr/lib com.sun.patchpro
----------------- lwp# 1 / thread# 1 --------------------
f930555a ???????? ()
----------------- lwp# 2 / thread# 2 -------------------- -
Smpatch analyze or download doesn't work at all
Hello Support
This command does't return any right informations:
# smpatch analyze
No patches required.
# smpatch download -i 124393-01
No patches required.
Please give me why ? The patch 124393 -01 ist not installed on my system.
PLEASE WHEN YOUR MASTER SERVER PATCH IS NOT AVAILABLE, CAN YOU INFORM BY RETURN CODE IN smpatch command or by a Sun Alert.
Pascal Fabbri, EpfL - Domaine ITResults......
Fri Nov 10 22:40:15 CST 2006(DEBUG)=> com.sun.patchpro.patch.PatchSequencer@537935 <=PatchSequencer.removeObsoletedPatch(): The existing patch os is SunOS
Fri Nov 10 22:40:15 CST 2006(DEBUG)=> com.sun.patchpro.patch.PatchSequencer@537935 <=PatchSequencer.removeObsoletedPatch(): The existing patch is 118561-01
Fri Nov 10 22:40:15 CST 2006(DEBUG)=> com.sun.patchpro.patch.PatchSequencer@537935 <=PatchSequencer.removeObsoletedPatch(): The existing patch obsoletes list is
Fri Nov 10 22:40:15 CST 2006(DEBUG)=> com.sun.patchpro.patch.PatchSequencer@537935 <=PatchSequencer.removeObsoletedPatch(): The existing patch os is SunOS
Fri Nov 10 22:40:15 CST 2006(DEBUG)=> com.sun.patchpro.patch.PatchSequencer@537935 <=PatchSequencer.removeObsoletedPatch(): The existing patch is 120330-02
Fri Nov 10 22:40:15 CST 2006(DEBUG)=> com.sun.patchpro.patch.PatchSequencer@537935 <=PatchSequencer.removeObsoletedPatch(): The existing patch obsoletes list is
Fri Nov 10 22:40:15 CST 2006(DEBUG)=> com.sun.patchpro.patch.PatchSequencer@537935 <=PatchSequencer.removeObsoletedPatch(): The existing patch os is SunOS
Fri Nov 10 22:40:15 CST 2006(DEBUG)=> com.sun.patchpro.patch.PatchSequencer@537935 <=PatchSequencer.removeObsoletedPatch(): The existing patch is 118816-03
Fri Nov 10 22:40:15 CST 2006(DEBUG)=> com.sun.patchpro.patch.PatchSequencer@537935 <=PatchSequencer.removeObsoletedPatch(): The existing patch obsoletes list is
Fri Nov 10 22:40:15 CST 2006(DEBUG)=> com.sun.patchpro.patch.PatchSequencer@537935 <=PatchSequencer.removeObsoletedPatch(): The existing patch os is SunOS
Fri Nov 10 22:40:15 CST 2006(DEBUG)=> com.sun.patchpro.patch.PatchSequencer@537935 <=PatchSequencer.removeObsoletedPatch(): The existing patch is 119989-01
Fri Nov 10 22:40:15 CST 2006(DEBUG)=> com.sun.patchpro.patch.PatchSequencer@537935 <=PatchSequencer.removeObsoletedPatch(): The existing patch obsoletes list is
Fri Nov 10 22:40:15 CST 2006(DEBUG)=> com.sun.patchpro.patch.PatchSequencer@537935 <=PatchSequencer.removeObsoletedPatch(): The existing patch os is SunOS
Fri Nov 10 22:40:15 CST 2006(DEBUG)=> com.sun.patchpro.patch.PatchSequencer@537935 <=PatchSequencer.removeObsoletedPatch(): The existing patch is 121212-01
Fri Nov 10 22:40:15 CST 2006(DEBUG)=> com.sun.patchpro.patch.PatchSequencer@537935 <=PatchSequencer.removeObsoletedPatch(): The existing patch obsoletes list is 120218-03
Fri Nov 10 22:40:15 CST 2006(DEBUG)=> com.sun.patchpro.patch.PatchSequencer@537935 <=PatchSequencer.removeObsoletedPatch(): The existing patch os is SunOS
Fri Nov 10 22:40:15 CST 2006(DEBUG)=> com.sun.patchpro.patch.PatchSequencer@537935 <=PatchSequencer.removeObsoletedPatch(): The existing patch obsoletes is 120218-03
Fri Nov 10 22:40:15 CST 2006(DEBUG)=> com.sun.patchpro.patch.PatchSequencer@537935 <=PatchSequencer.removeObsoletedPatch(): The existing patch is 121119-06
Fri Nov 10 22:40:15 CST 2006(DEBUG)=> com.sun.patchpro.patch.PatchSequencer@537935 <=PatchSequencer.removeObsoletedPatch(): The existing patch obsoletes list is
Fri Nov 10 22:40:15 CST 2006(DEBUG)=> com.sun.patchpro.patch.PatchSequencer@537935 <=PatchSequencer.removeObsoletedPatch(): The existing patch os is SunOS
Fri Nov 10 22:40:15 CST 2006(DEBUG)=> com.sun.patchpro.patch.PatchSequencer@537935 <=PatchSequencer.removeObsoletedPatch(): The existing patch is 121576-01
Fri Nov 10 22:40:15 CST 2006(DEBUG)=> com.sun.patchpro.patch.PatchSequencer@537935 <=PatchSequencer.removeObsoletedPatch(): The existing patch obsoletes list is
Fri Nov 10 22:40:15 CST 2006(DEBUG)=> com.sun.patchpro.patch.PatchSequencer@537935 <=PatchSequencer.removeObsoletedPatch(): The existing patch os is SunOS
Fri Nov 10 22:40:15 CST 2006(DEBUG)=> com.sun.patchpro.patch.PatchSequencer@537935 <=PatchSequencer.removeObsoletedPatch(): The existing patch is 119789-02
Fri Nov 10 22:40:15 CST 2006(DEBUG)=> com.sun.patchpro.patch.PatchSequencer@537935 <=PatchSequencer.removeObsoletedPatch(): The existing patch obsoletes list is
Fri Nov 10 22:40:15 CST 2006(DEBUG)=> com.sun.patchpro.patch.PatchSequencer@537935 <=PatchSequencer.removeObsoletedPatch(): The existing patch os is SunOS
Fri Nov 10 22:40:15 CST 2006(DEBUG)=> com.sun.patchpro.patch.PatchSequencer@537935 <=PatchSequencer.removeObsoletedPatch(): The existing patch is 120336-04
Fri Nov 10 22:40:15 CST 2006(DEBUG)=> com.sun.patchpro.patch.PatchSequencer@537935 <=PatchSequencer.removeObsoletedPatch(): The existing patch obsoletes list is
Fri Nov 10 22:40:15 CST 2006(DEBUG)=> com.sun.patchpro.patch.PatchSequencer@537935 <=PatchSequencer.removeObsoletedPatch(): The existing patch os is SunOS
Fri Nov 10 22:40:15 CST 2006(DEBUG)=> com.sun.patchpro.patch.PatchSequencer@537935 <=PatchSequencer.removeObsoletedPatch(): The existing patch is 120838-01
Fri Nov 10 22:40:15 CST 2006(DEBUG)=> com.sun.patchpro.patch.PatchSequencer@537935 <=PatchSequencer.removeObsoletedPatch(): The existing patch obsoletes list is
Fri Nov 10 22:40:15 CST 2006(DEBUG)=> com.sun.patchpro.patch.PatchSequencer@537935 <=PatchSequencer.removeObsoletedPatch(): The existing patch os is SunOS
Fri Nov 10 22:40:15 CST 2006(DEBUG)=> com.sun.patchpro.patch.PatchSequencer@537935 <=PatchSequencer.removeObsoletedPatch(): The existing patch is 122232-01
Fri Nov 10 22:40:15 CST 2006(DEBUG)=> com.sun.patchpro.patch.PatchSequencer@537935 <=PatchSequencer.removeObsoletedPatch(): The existing patch obsoletes list is
Fri Nov 10 22:40:15 CST 2006(DEBUG)=> com.sun.patchpro.patch.PatchSequencer@537935 <=PatchSequencer.removeObsoletedPatch(): The existing patch os is SunOS
Fri Nov 10 22:40:15 CST 2006(DEBUG)=> com.sun.patchpro.patch.PatchSequencer@537935 <=PatchSequencer.removeObsoletedPatch(): The existing patch is 120933-01
Fri Nov 10 22:40:15 CST 2006(DEBUG)=> com.sun.patchpro.patch.PatchSequencer@537935 <=PatchSequencer.removeObsoletedPatch(): The existing patch obsoletes list is
Fri Nov 10 22:40:15 CST 2006(DEBUG)=> com.sun.patchpro.patch.PatchSequencer@537935 <=PatchSequencer.removeObsoletedPatch(): The existing patch os is SunOS
Fri Nov 10 22:40:15 CST 2006(DEBUG)=> com.sun.patchpro.patch.PatchSequencer@537935 <=PatchSequencer.removeObsoletedPatch(): The existing patch is 123124-02
Fri Nov 10 22:40:15 CST 2006(DEBUG)=> com.sun.patchpro.patch.PatchSequencer@537935 <=PatchSequencer.removeObsoletedPatch(): The existing patch obsoletes list is
Fri Nov 10 22:40:15 CST 2006(DEBUG)=> com.sun.patchpro.patch.PatchSequencer@537935 <=PatchSequencer.removeObsoletedPatch(): The existing patch os is SunOS
Fri Nov 10 22:40:15 CST 2006(DEBUG)=> com.sun.patchpro.patch.PatchSequencer@537935 <=PatchSequencer.removeObsoletedPatch(): The existing patch is 123122-02
Fri Nov 10 22:40:15 CST 2006(DEBUG)=> com.sun.patchpro.patch.PatchSequencer@537935 <=PatchSequencer.removeObsoletedPatch(): The existing patch obsoletes list is
Fri Nov 10 22:40:15 CST 2006(DEBUG)=> com.sun.patchpro.patch.PatchSequencer@537935 <=PatchSequencer.removeObsoletedPatch(): The existing patch os is SunOS
Fri Nov 10 22:40:15 CST 2006(DEBUG)=> com.sun.patchpro.patch.PatchSequencer@537935 <=PatchSequencer.removeObsoletedPatch(): The existing patch is 123141-01
Fri Nov 10 22:40:15 CST 2006(DEBUG)=> com.sun.patchpro.patch.PatchSequencer@537935 <=PatchSequencer.removeObsoletedPatch(): The existing patch obsoletes list is
Fri Nov 10 22:40:15 CST 2006(DEBUG)=> com.sun.patchpro.patch.PatchSequencer@537935 <=PatchSequencer.removeObsoletedPatch(): The existing patch os is SunOS
Fri Nov 10 22:40:15 CST 2006(DEBUG)=> com.sun.patchpro.patch.PatchSequencer@537935 <=PatchSequencer.removeObsoletedPatch(): The existing patch is 119214-07
Fri Nov 10 22:40:15 CST 2006(DEBUG)=> com.sun.patchpro.patch.PatchSequencer@537935 <=PatchSequencer.removeObsoletedPatch(): The existing patch obsoletes list is
Fri Nov 10 22:40:15 CST 2006(DEBUG)=> com.sun.patchpro.patch.PatchSequencer@537935 <=PatchSequencer.removeObsoletedPatch(): The existing patch os is SunOS
Fri Nov 10 22:40:15 CST 2006(DEBUG)=> com.sun.patchpro.patch.PatchSequencer@537935 <=PatchSequencer.removeObsoletedPatch(): The existing patch is 121431-10
Fri Nov 10 22:40:15 CST 2006(DEBUG)=> com.sun.patchpro.patch.PatchSequencer@537935 <=PatchSequencer.removeObsoletedPatch(): The existing patch obsoletes list is 121436-05 121438-02
Fri Nov 10 22:40:15 CST 2006(DEBUG)=> com.sun.patchpro.patch.PatchSequencer@537935 <=PatchSequencer.removeObsoletedPatch(): The existing patch os is SunOS
Fri Nov 10 22:40:15 CST 2006(DEBUG)=> com.sun.patchpro.patch.PatchSequencer@537935 <=PatchSequencer.removeObsoletedPatch(): The existing patch obsoletes is 121436-05
Fri Nov 10 22:40:15 CST 2006(DEBUG)=> com.sun.patchpro.patch.PatchSequencer@537935 <=PatchSequencer.removeObsoletedPatch(): The existing patch obsoletes is 121438-02
Fri Nov 10 22:40:15 CST 2006(DEBUG)=> com.sun.patchpro.patch.PatchSequencer@537935 <=PatchSequencer.removeObsoletedPatch(): The existing patch is 121307-02
Fri Nov 10 22:40:15 CST 2006(DEBUG)=> com.sun.patchpro.patch.PatchSequencer@537935 <=PatchSequencer.removeObsoletedPatch(): The existing patch obsoletes list is
Fri Nov 10 22:40:15 CST 2006(DEBUG)=> com.sun.patchpro.patch.PatchSequencer@537935 <=PatchSequencer.removeObsoletedPatch(): The existing patch os is SunOS
Fri Nov 10 22:40:15 CST 2006(DEBUG)=> com.sun.patchpro.patch.PatchSequencer@537935 <=PatchSequencer.removeObsoletedPatch(): The existing patch is 120069-01
Fri Nov 10 22:40:15 CST 2006(DEBUG)=> com.sun.patchpro.patch.PatchSequencer@537935 <=PatchSequencer.removeObsoletedPatch(): The existing patch obsoletes list is
Fri Nov 10 22:40:15 CST 2006(DEBUG)=> com.sun.patchpro.patch.PatchSequencer@537935 <=PatchSequencer.removeObsoletedPatch(): The existing patch os is SunOS
Fri Nov 10 22:40:15 CST 2006(DEBUG)=> com.sun.patchpro.patch.PatchSequencer@537935 <=PatchSequencer.removeObsoletedPatch(): The existing patch is 121805-02
Fri Nov 10 22:40:15 CST 2006(DEBUG)=> com.sun.patchpro.patch.PatchSequencer@537935 <=PatchSequencer.removeObsoletedPatch(): The existing patch obsoletes list is
Fri Nov 10 22:40:15 CST 2006(DEBUG)=> com.sun.patchpro.patch.PatchSequencer@537935 <=PatchSequencer.removeObsoletedPatch(): The existing patch os is SunOS
Fri Nov 10 22:40:15 CST 2006(DEBUG)=> com.sun.patchpro.patch.PatchSequencer@537935 <=PatchSequencer.removeObsoletedPatch(): The existing patch is 122655-04
Fri Nov 10 22:40:15 CST 2006(DEBUG)=> com.sun.patchpro.patch.PatchSequencer@537935 <=PatchSequencer.removeObsoletedPatch(): The existing patch obsoletes list is
Fri Nov 10 22:40:15 CST 2006(DEBUG)=> com.sun.patchpro.patch.PatchSequencer@537935 <=PatchSequencer.removeObsoletedPatch(): The existing patch os is SunOS
Fri Nov 10 22:40:15 CST 2006(DEBUG)=> com.sun.patchpro.patch.PatchSequencer@537935 <=PatchSequencer.removeObsoletedPatch(): The existing patch is 118885-01
Fri Nov 10 22:40:15 CST 2006(DEBUG)=> com.sun.patchpro.patch.PatchSequencer@537935 <=PatchSequencer.removeObsoletedPatch(): The existing patch obsoletes list is
Fri Nov 10 22:40:15 CST 2006(DEBUG)=> com.sun.patchpro.patch.PatchSequencer@537935 <=PatchSequencer.removeObsoletedPatch(): The existing patch os is SunOS
Fri Nov 10 22:40:15 CST 2006(DEBUG)=> com.sun.patchpro.patch.PatchSequencer@537935 <=PatchSequencer.removeObsoletedPatch(): The existing patch is 120065-01
Fri Nov 10 22:40:15 CST 2006(DEBUG)=> com.sun.patchpro.patch.PatchSequencer@537935 <=PatchSequencer.removeObsoletedPatch(): The existing patch obsoletes list is
Fri Nov 10 22:40:15 CST 2006(DEBUG)=> com.sun.patchpro.patch.PatchSequencer@537935 <=PatchSequencer.removeObsoletedPatch(): The existing patch os is SunOS
Fri Nov 10 22:40:15 CST 2006(DEBUG)=> com.sun.patchpro.patch.PatchSequencer@537935 <=PatchSequencer.removeObsoletedPatch(): The existing patch is 120742-01
Fri Nov 10 22:40:15 CST 2006(DEBUG)=> com.sun.patchpro.patch.PatchSequencer@537935 <=PatchSequencer.removeObsoletedPatch(): The existing patch obsoletes list is
Fri Nov 10 22:40:15 CST 2006(DEBUG)=> com.sun.patchpro.patch.PatchSequencer@537935 <=PatchSequencer.removeObsoletedPatch(): The existing patch os is SunOS
Fri Nov 10 22:40:15 CST 2006(DEBUG)=> com.sun.patchpro.patch.PatchSequencer@537935 <=PatchSequencer.removeObsoletedPatch(): The existing patch is 120995-01
Fri Nov 10 22:40:15 CST 2006(DEBUG)=> com.sun.patchpro.patch.PatchSequencer@537935 <=PatchSequencer.removeObsoletedPatch(): The existing patch obsoletes list is
Fri Nov 10 22:40:15 CST 2006(DEBUG)=> com.sun.patchpro.patch.PatchSequencer@537935 <=PatchSequencer.removeObsoletedPatch(): The existing patch os is SunOS
Fri Nov 10 22:40:15 CST 2006(DEBUG)=> com.sun.patchpro.patch.PatchSequencer@537935 <=PatchSequencer.removeObsoletedPatch(): The existing patch is 121722-03
Fri Nov 10 22:40:15 CST 2006(DEBUG)=> com.sun.patchpro.patch.PatchSequencer@537935 <=PatchSequencer.removeObsoletedPatch(): The existing patch obsoletes list is
Fri Nov 10 22:40:15 CST 2006(DEBUG)=> com.sun.patchpro.patch.PatchSequencer@537935 <=PatchSequencer.removeObsoletedPatch(): The existing patch os is SunOS
Fri Nov 10 22:40:15 CST 2006(DEBUG)=> com.sun.patchpro.patch.PatchSequencer@537935 <=PatchSequencer.removeObsoletedPatch(): The existing patch is 121906-01
Fri Nov 10 22:40:15 CST 2006(DEBUG)=> com.sun.patchpro.patch.PatchSequencer@537935 <=PatchSequencer.removeObsoletedPatch(): The existing patch obsoletes list is
Fri Nov 10 22:40:15 CST 2006(DEBUG)=> com.sun.patchpro.patch.PatchSequencer@537935 <=PatchSequencer.removeObsoletedPatch(): The existing patch os is SunOS
Fri Nov 10 22:40:15 CST 2006(DEBUG)=> com.sun.patchpro.patch.PatchSequencer@537935 <=PatchSequencer.removeObsoletedPatch(): The existing patch is 123014-01
Fri Nov 10 22:40:15 CST 2006(DEBUG)=> com.sun.patchpro.patch.PatchSequencer@537935 <=PatchSequencer.removeObsoletedPatch(): The existing patch obsoletes list is
Fri Nov 10 22:40:15 CST 2006(DEBUG)=> com.sun.patchpro.patch.PatchSequencer@537935 <=PatchSequencer.removeObsoletedPatch(): The existing patch os is SunOS
Fri Nov 10 22:40:15 CST 2006(DEBUG)=> com.sun.patchpro.patch.PatchSequencer@537935 <=PatchSequencer.removeObsoletedPatch(): The existing patch is 120993-02
Fri Nov 10 22:40:15 CST 2006(DEBUG)=> com.sun.patchpro.patch.PatchSequencer@537935 <=PatchSequencer.removeObsoletedPatch(): The existing patch obsoletes list is
Fri Nov 10 22:40:15 CST 2006(DEBUG)=> com.sun.patchpro.patch.PatchSequencer@537935 <=PatchSequencer.removeObsoletedPatch(): The existing patch os is SunOS
Fri Nov 10 22:40:15 CST 2006(DEBUG)=> com.sun.patchpro.patch.PatchSequencer@537935 <=PatchSequencer.removeObsoletedPatch(): The existing patch is 121129-01
Fri Nov 10 22:40:15 CST 2006(DEBUG)=> com.sun.patchpro.patch.PatchSequencer@537935 <=PatchSequencer.removeObsoletedPatch(): The existing patch obsoletes list is
Fri Nov 10 22:40:15 CST 2006(DEBUG)=> com.sun.patchpro.patch.PatchSequencer@537935 <=PatchSequencer.removeObsoletedPatch(): The existing patch os is SunOS
Fri Nov 10 22:40:15 CST 2006(DEBUG)=> com.sun.patchpro.patch.PatchSequencer@537935 <=PatchSequencer.removeObsoletedPatch(): The existing patch is 121395-01
Fri Nov 10 22:40:15 CST 2006(DEBUG)=> com.sun.patchpro.patch.PatchSequencer@537935 <=PatchSequencer.removeObsoletedPatch(): The existing patch obsoletes list is
Fri Nov 10 22:40:15 CST 2006(DEBUG)=> com.sun.patchpro.patch.PatchSequencer@537935 <=PatchSequencer.removeObsoletedPatch(): The existing patch os is SunOS
Fri Nov 10 22:40:15 CST 2006(DEBUG)=> com.sun.patchpro.patch.PatchSequencer@537935 <=PatchSequencer.removeObsoletedPatch(): The existing patch is 117181-01
Fri Nov 10 22:40:15 CST 2006(DEBUG)=> com.sun.patchpro.patch.PatchSequencer@537935 <=PatchSequencer.removeObsoletedPatch(): The existing patch obsoletes list is
Fri Nov 10 22:40:15 CST 2006(DEBUG)=> com.sun.patchpro.patch.PatchSequencer@537935 <=PatchSequencer.removeObsoletedPatch(): The existing patch os is SunOS
Fri Nov 10 22:40:15 CST 2006(DEBUG)=> com.sun.patchpro.patch.PatchSequencer@537935 <=PatchSequencer.removeObsoletedPatch(): The existing patch is 121287-01
Fri Nov 10 22:40:15 CST 2006(DEBUG)=> com.sun.patchpro.patch.PatchSequencer@537935 <=PatchSequencer.removeObsoletedPatch(): The existing patch obsoletes list is
Fri Nov 10 22:40:15 CST 2006(DEBUG)=> com.sun.patchpro.patch.PatchSequencer@537935 <=PatchSequencer.removeObsoletedPatch(): The existing patch os is SunOS
Fri Nov 10 22:40:15 CST 2006(DEBUG)=> com.sun.patchpro.patch.PatchSequencer@537935 <=PatchSequencer.removeObsoletedPatch(): The existing patch is 120313-01
Fri Nov 10 22:40:15 CST 2006(DEBUG)=> com.sun.patchpro.patch.PatchSequencer@537935 <=PatchSequencer.removeObsoletedPatch(): The existing patch obsoletes list is
Fri Nov 10 22:40:15 CST 2006(DEBUG)=> com.sun.patchpro.patch.PatchSequencer@537935 <=PatchSequencer.removeObsoletedPatch(): The existing patch os is SunOS
Fri Nov 10 22:40:15 CST 2006(DEBUG)=> com.sun.patchpro.patch.PatchSequencer@537935 <=PatchSequencer.removeObsoletedPatch(): The existing patch is 120314-01
Fri Nov 10 22:40:15 CST 2006(DEBUG)=> com.sun.patchpro.patch.PatchSequencer@537935 <=PatchSequencer.removeObsoletedPatch(): The existing patch obsoletes list is
Fri Nov 10 22:40:15 CST 2006(DEBUG)=> com.sun.patchpro.patch.PatchSequencer@537935 <=PatchSequencer.removeObsoletedPatch(): The existing patch os is SunOS
Fri Nov 10 22:40:15 CST 2006(DEBUG)=> com.sun.patchpro.patch.PatchSequencer@537935 <=PatchSequencer.removeObsoletedPatch(): The existing patch is 121264-01
Fri Nov 10 22:40:15 CST 2006(DEBUG)=> com.sun.patchpro.patch.PatchSequencer@537935 <=PatchSequencer.removeObsoletedPatch(): The existing patch obsoletes list is
Fri Nov 10 22:40:15 CST 2006(DEBUG)=> com.sun.patchpro.patch.PatchSequencer@537935 <=PatchSequencer.removeObsoletedPatch(): The existing patch os is SunOS
Fri Nov 10 22:40:15 CST 2006(DEBUG)=> com.sun.patchpro.patch.PatchSequencer@537935 <=PatchSequencer.removeObsoletedPatch(): The existing patch is 119247-15
Fri Nov 10 22:40:15 CST 2006(DEBUG)=> com.sun.patchpro.patch.PatchSequencer@537935 <=PatchSequencer.removeObsoletedPatch(): The existing patch obsoletes list is
Fri Nov 10 22:40:15 CST 2006(DEBUG)=> com.sun.patchpro.patch.PatchSequencer@537935 <=PatchSequencer.removeObsoletedPatch(): The existing patch os is SunOS
Fri Nov 10 22:40:15 CST 2006(DEBUG)=> com.sun.patchpro.patch.PatchSequencer@537935 <=PatchSequencer.removeObsoletedPatch(): The existing patch is 119765-03
Fri Nov 10 22:40:15 CST 2006(DEBUG)=> com.sun.patchpro.patch.PatchSequencer@537935 <=PatchSequencer.removeObsoletedPatch(): The existing patch obsoletes list is
Fri Nov 10 22:40:15 CST 2006(DEBUG)=> com.sun.patchpro.patch.PatchSequencer@537935 <=PatchSequencer.removeObsoletedPatch(): The existing patch os is SunOS
Fri Nov 10 22:40:15 CST 2006(DEBUG)=> com.sun.patchpro.patch.PatchSequencer@537935 <=PatchSequencer.removeObsoletedPatch(): The existing patch is 119091-19
Fri Nov 10 22:40:15 CST 2006(DEBUG)=> com.sun.patchpro.patch.PatchSequencer@537935 <=PatchSequencer.removeObsoletedPatch(): The existing patch obsoletes list is 121981-03
Fri Nov 10 22:40:15 CST 2006(DEBUG)=> com.sun.patchpro.patch.PatchSequencer@537935 <=PatchSequencer.removeObsoletedPatch(): The existing patch os is SunOS
Fri Nov 10 22:40:15 CST 2006(DEBUG)=> com.sun.patchpro.patch.PatchSequencer@537935 <=PatchSequencer.removeObsoletedPatch(): The existing patch obsoletes is 121981-03
Fri Nov 10 22:40:15 CST 2006(DEBUG)=> com.sun.patchpro.patch.PatchSequencer@537935 <=PatchSequencer.removeObsoletedPatch(): The existing patch is 119093-07
Fri Nov 10 22:40:15 CST 2006(DEBUG)=> com.sun.patchpro.patch.PatchSequencer@537935 <=PatchSequencer.removeObsoletedPatch(): The existing patch obsoletes list is
Fri Nov 10 22:40:15 CST 2006(DEBUG)=> com.sun.patchpro.patch.PatchSequencer@537935 <=PatchSequencer.removeObsoletedPatch(): The existing patch os is SunOS
Fri Nov 10 22:40:15 CST 2006(DEBUG)=> com.sun.patchpro.patch.PatchSequencer@537935 <=PatchSequencer.removeObsoletedPatch(): The existing patch is 118669-05
Fri Nov 10 22:40:15 CST 2006(DEBUG)=> com.sun.patchpro.patch.PatchSequencer@537935 <=PatchSequencer.removeObsoletedPatch(): The existing patch obsoletes list is
Fri Nov 10 22:40:15 CST 2006(DEBUG)=> com.sun.patchpro.patch.PatchSequencer@537935 <=PatchSequencer.removeObsoletedPatch(): The existing patch os is SunOS
Fri Nov 10 22:40:15 CST 2006(DEBUG)=> com.sun.patchpro.patch.PatchSequencer@537935 <=PatchSequencer.removeObsoletedPatch(): The existing patch is 118736-01
Fri Nov 10 22:40:15 CST 2006(DEBUG)=> com.sun.patchpro.patch.PatchSequencer@537935 <=PatchSequencer.removeObsoletedPatch(): The existing patch obsoletes list is
Fri Nov 10 22:40:15 CST 2006(DEBUG)=> com.sun.patchpro.patch.PatchSequencer@537935 <=PatchSequencer.removeObsoletedPatch(): The existing patch os is SunOS
Fri Nov 10 22:40:15 CST 2006(DEBUG)=> com.sun.patchpro.patch.PatchSequencer@537935 <=PatchSequencer.removeObsoletedPatch(): The existing patch is 119074-03
Fri Nov 10 22:40:15 CST 2006(DEBUG)=> com.sun.patchpro.patch.PatchSequencer@537935 <=PatchSequencer.removeObsoletedPatch(): The existing patch obsoletes list is
Fri Nov 10 22:40:15 CST 2006(DEBUG)=> com.sun.patchpro.patch.PatchSequencer@537935 <=PatchSequencer.removeObsoletedPatch(): The existing patch os is SunOS
Fri Nov 10 22:40:15 CST 2006(DEBUG)=> com.sun.patchpro.patch.PatchSequencer@537935 <=PatchSequencer.removeObsoletedPatch(): The existing patch is 122030-01
Fri Nov 10 22:40:15 CST 2006(DEBUG)=> com.sun.patchpro.patch.PatchSequencer@537935 <=PatchSequencer.removeObsoletedPatch(): The existing patch obsoletes list is
Fri Nov 10 22:40:15 CST 2006(DEBUG)=> com.sun.patchpro.patch.PatchSequencer@537935 <=PatchSequencer.removeObsoletedPatch(): The existing patch os is SunOS
Fri Nov 10 22:40:15 CST 2006(DEBUG)=> com.sun.patchpro.patch.PatchSequencer@537935 <=PatchSequencer.removeObsoletedPatch(): The existing patch is 122086-01
Fri Nov 10 22:40:15 CST 2006(DEBUG)=> com.sun.patchpro.patch.PatchSequencer@537935 <=PatchSequencer.removeObsoletedPatch(): The existing patch obsoletes list is
Fri Nov 10 22:40:15 CST 2006(DEBUG)=> com.sun.patchpro.patch.PatchSequencer@537935 <=PatchSequencer.removeObsoletedPatch(): The existing patch os is SunOS
Fri Nov 10 22:40:15 CST 2006(DEBUG)=> com.sun.patchpro.patch.PatchSequencer@537935 <=PatchSequencer.removeObsoletedPatch(): The existing patch is 120236-01
Fri Nov 10 22:40:15 CST 2006(DEBUG)=> com.sun.patchpro.patch.PatchSequencer@537935 <=PatchSequencer.removeObsoletedPatch(): The existing patch obsoletes list is
Fri Nov 10 22:40:15 CST 2006(DEBUG)=> com.sun.patchpro.patch.PatchSequencer@537935 <=PatchSequencer.removeObsoletedPatch(): The existing patch os is SunOS
Fri Nov 10 22:40:15 CST 2006(DEBUG)=> com.sun.patchpro.patch.PatchSequencer@537935 <=PatchSequencer.removeObsoletedPatch(): The existing patch is 121429-03
Fri Nov 10 22:40:15 CST 2006(DEBUG)=> com.sun.patchpro.patch.PatchSequencer@537935 <=PatchSequencer.removeObsoletedPatch(): The existing patch obsoletes list is
Fri Nov 10 22:40:15 CST 2006(DEBUG)=> com.sun.patchpro.patch.PatchSequencer@537935 <=PatchSequencer.removeObsoletedPatch(): The existing patch os is SunOS
Fri Nov 10 22:40:15 CST 2006(DEBUG)=> com.sun.patchpro.patch.PatchSequencer@537935 <=PatchSequencer.removeObsoletedPatch(): The existing patch is 120630-02
Fri Nov 10 22:40:15 CST 2006(DEBUG)=> com.sun.patchpro.patch.PatchSequencer@537935 <=PatchSequencer.removeObsoletedPatch(): The existing patch obsoletes list is
Fri Nov 10 22:40:15 CST 2006(DEBUG)=> com.sun.patchpro.patch.PatchSequencer@537935 <=PatchSequencer.removeObsoletedPatch(): The existing patch os is SunOS
Fri Nov 10 22:40:15 CST 2006(DEBUG)=> com.sun.patchpro.patch.PatchSequencer@537935 <=PatchSequencer.removeObsoletedPatch(): The existing patch is 118732-01
Fri Nov 10 22:40:15 CST 2006(DEBUG)=> com.sun.patchpro.patch.PatchSequencer@537935 <=PatchSequencer.removeObsoletedPatch(): The existing patch obsoletes list is
Fri Nov 10 22:40:15 CST 2006(DEBUG)=> com.sun.patchpro.patch.PatchSequencer@537935 <=PatchSequencer.removeObsoletedPatch(): The existing patch os is SunOS
Fri Nov 10 22:40:15 CST 2006(DEBUG)=> com.sun.patchpro.patch.PatchSequencer@537935 <=PatchSequencer.removeObsoletedPatch(): The existing patch is 119784-01
Fri Nov 10 22:40:15 CST 2006(DEBUG)=> com.sun.patchpro.patch.PatchSequencer@537935 <=PatchSequencer.removeObsoletedPatch(): The existing patch obsoletes list is
Fri Nov 10 22:40:15 CST 2006(DEBUG)=> com.sun.patchpro.patch.PatchSequencer@537935 <=PatchSequencer.removeObsoletedPatch(): The existing patch os is SunOS
Fri Nov 10 22:40:15 CST 2006(DEBUG)=> com.sun.patchpro.patch.PatchSequencer@537935 <=PatchSequencer.removeObsoletedPatch(): The existing patch is 121948-01
Fri Nov 10 22:40:15 CST 2006(DEBUG)=> com.sun.patchpro.patch.PatchSequencer@537935 <=PatchSequencer.removeObsoletedPatch(): The existing patch obsoletes list is
Fri Nov 10 22:40:15 CST 2006(DEBUG)=> com.sun.patchpro.patch.PatchSequencer@537935 <=PatchSequencer.removeObsoletedPatch(): The existing patch os is SunOS
Fri Nov 10 22:40:15 CST 2006(DEBUG)=> com.sun.patchpro.patch.PatchSequencer@537935 <=PatchSequencer.removeObsoletedPatch(): The existing patch is 118778-04
Fri Nov 10 22:40:15 CST 2006(DEBUG)=> com.sun.patchpro.patch.PatchSequencer@537935 <=PatchSequencer.removeObsoletedPatch(): The existing patch obsoletes list is
Fri Nov 10 22:40:15 CST 2006(DEBUG)=> com.sun.patchpro.patch.PatchSequencer@537935 <=PatchSequencer.removeObsoletedPatch(): The existing patch os is SunOS
Fri Nov 10 22:40:15 CST 2006(DEBUG)=> com.sun.patchpro.patch.PatchSequencer@537935 <=PatchSequencer.removeObsoletedPatch(): The existing patch is 120347-03
Fri Nov 10 22:40:15 CST 2006(DEBUG)=> com.sun.patchpro.patch.PatchSequencer@537935 <=PatchSequencer.removeObsoletedPatch(): The existing patch obsoletes list is
Fri Nov 10 22:40:15 CST 2006(DEBUG)=> com.sun.patchpro.patch.PatchSequencer@537935 <=PatchSequencer.removeObsoletedPatch(): The existing patch os is SunOS
Fri Nov 10 22:40:15 CST 2006(DEBUG)=> com.sun.patchpro.patch.PatchSequencer@537935 <=PatchSequencer.removeObsoletedPatch(): The existing patch is 120345-01
Fri Nov 10 22:40:15 CST 2006(DEBUG)=> com.sun.patchpro.patch.PatchSequencer@537935 <=PatchSequencer.removeObsoletedPatch(): The existing patch obsoletes list is
Fri Nov 10 22:40:15 CST 2006(DEBUG)=> com.sun.patchpro.patch.PatchSequencer@537935 <=PatchSequencer.removeObsoletedPatch(): The existing patch os is SunOS
Fri Nov 10 22:40:15 CST 2006(DEBUG)=> com.sun.patchpro.patch.PatchSequencer@537935 <=PatchSequencer.removeObsoletedPatch(): The existing patch is 119471-05
Fri Nov 10 22:40:15 CST 2006(DEBUG)=> com.sun.patchpro.patch.PatchSequencer@537935 <=PatchSequencer.removeObsoletedPatch(): The existing patch obsoletes list is
Fri Nov 10 22:40:15 CST 2006(DEBUG)=> com.sun.patchpro.patch.PatchSequencer@537935 <=PatchSequencer.removeObsoletedPatch(): The existing patch os is SunOS
Fri Nov 10 22:40:15 CST 2006(DEBUG)=> com.sun.patchpro.patch.PatchSequencer@537935 <=PatchSequencer.removeObsoletedPatch(): The existing patch is 119975-02
Fri Nov 10 22:40:15 CST 2006(DEBUG)=> com.sun.patchpro.patch.PatchSequencer@537935 <=PatchSequencer.removeObsoletedPatch(): The existing patch obsoletes list is
Fri Nov 10 22:40:15 CST 2006(DEBUG)=> com.sun.patchpro.patch.PatchSequencer@537935 <=PatchSequencer.removeObsoletedPatch(): The existing patch os is SunOS
Fri Nov 10 22:40:15 CST 2006(DEBUG)=> com.sun.patchpro.patch.PatchSequencer@537935 <=PatchSequencer.removeObsoletedPatch(): The existing patch is 122264-01
Fri Nov 10 22:40:15 CST 2006(DEBUG)=> com.sun.patchpro.patch.PatchSequencer@537935 <=PatchSequencer.removeObsoletedPatch(): The existing patch obsoletes list is
Fri Nov 10 22:40:15 CST 2006(DEBUG)=> com.sun.patchpro.patch.PatchSequencer@537935 <=PatchSequencer.removeObsoletedPatch(): The existing patch os is SunOS
Fri Nov 10 22:40:15 CST 2006(DEBUG)=> com.sun.patchpro.patch.PatchSequencer@537935 <=PatchSequencer.removeObsoletedPatch(): The existing patch is 122829-02
Fri Nov 10 22:40:15 CST 2006(DEBUG)=> com.sun.patchpro.patch.PatchSequencer@537935 <=PatchSequencer.removeObsoletedPatch(): The existing patch obsoletes list is
Fri Nov 10 22:40:15 CST 2006(DEBUG)=> com.sun.patchpro.patch.PatchSequencer@537935 <=PatchSequencer.removeObsoletedPatch(): The existing patch os is SunOS
Fri Nov 10 22:40:15 CST 2006(DEBUG)=> com.sun.patchpro.patch.PatchSequencer@537935 <=PatchSequencer.removeObsoletedPatch(): The existing patch is 119131-20
Fri Nov 10 22:40:15 CST 2006(DEBUG)=> com.sun.patchpro.patch.PatchSequencer@537935 <=PatchSequencer.removeObsoletedPatch(): The existing patch obsoletes list is 119087-05 120343-04
Fri Nov 10 22:40:15 CST 2006(DEBUG)=> com.sun.patchpro.patch.PatchSequencer@537935 <=PatchSequencer.removeObsoletedPatch(): The existing patch os is SunOS
Fri Nov 10 22:40:15 CST 2006(DEBUG)=> com.sun.patchpro.patch.PatchSequencer@537935 <=PatchSequencer.removeObsoletedPatch(): The existing patch obsoletes is 119087-05
Fri Nov 10 22:40:15 CST 2006(DEBUG)=> com.sun.patchpro.patch.PatchSequencer@537935 <=PatchSequencer.removeObsoletedPatch(): The existing patch obsoletes is 120343-04
Fri Nov 10 22:40:15 CST 2006(DEBUG)=> com.sun.patchpro.patch.PatchSequencer@537935 <=PatchSequencer.removeObsoletedPatch(): The existing patch is 120223-09
Fri Nov 10 22:40:15 CST 2006(DEBUG)=> com.sun.patchpro.patch.PatchSequencer@537935 <=PatchSequencer.removeObsoletedPatch(): The existing patch obsoletes list is 120221-01
Fri Nov 10 22:40:15 CST 2006(DEBUG)=> com.sun.patchpro.patch.PatchSequencer@537935 <=PatchSequencer.removeObsoletedPatch(): The existing patch os is SunOS
Fri Nov 10 22:40:15 CST 2006(DEBUG)=> com.sun.patchpro.patch.PatchSequencer@537935 <=PatchSequencer.removeObsoletedPatch(): The existing patch obsoletes is 120221-01
Fri Nov 10 22:40:15 CST 2006(DEBUG)=> com.sun.patchpro.patch.PatchSequencer@537935 <=PatchSequencer.removeObsoletedPatch(): The existing patch is 120225-02
Fri Nov 10 22:40:15 CST 2006(DEBUG)=> com.sun.patchpro.patch.Patc -
Will Sun Studio 12 Update 1 eventually show up with smpatch analyze?
I have a Solaris 10 (sparc) box on which previous Sun Studio updates have been applied via smpatch. I was able to use smpatch analyze/download/update to find and apply the updates. Will Sun Studio 12 Update 1 eventually show up with smpatch analyze or will I need to manually install it?
Thanks.
MatthewI'm not 100% sure, but it is a different release, despite the name (12 update 1). Most, if not all, components have different version numbers compared to ones from Sun Studio 12.
-
On our build system, we use the global setting to code analyze all projects. One of our projects is a C# WIX custom action. This projects causes the build to fail with:
EACustomInstallActions.CA.dll' could not be opened -- 'An attempt was made to load a program with an incorrect format.
The ...CA.Dll target seems to be created by a WIX custom action. Does anybody have already encountered this issue and found a workaround?
Full build output:
<target name="ContractDeclarativeAssemblyCS" success="false">
<message level="normal"><![CDATA[Build Declarative Contract Assembly for C# D:\EA_MAIN_DB\AMI\bin\Debug\GEHealthcare.Isip.EACustomInstallActions.dll]]></message>
<message level="high"><![CDATA[C:\Windows\Microsoft.NET\Framework\v3.5\Csc.exe /noconfig /nowarn:1701,1702 /pdb:obj\x86\Debug\Decl\GEHealthcare.Isip.EACustomInstallActions.pdb /errorreport:prompt /warn:0 /define:DEBUG;TRACE;CONTRACTS_FULL;CODE_ANALYSIS /reference:"C:\Program Files\Windows Installer XML v3\SDK\Microsoft.Deployment.WindowsInstaller.dll" /reference:"C:\Program Files\Microsoft SQL Server\100\SDK\Assemblies\Microsoft.SqlServer.ConnectionInfo.dll" /reference:"C:\Program Files\Microsoft SQL Server\100\SDK\Assemblies\Microsoft.SqlServer.Management.Sdk.Sfc.dll" /reference:"C:\Program Files\Microsoft SQL Server\100\SDK\Assemblies\Microsoft.SqlServer.Smo.dll" /reference:"C:\Program Files\Microsoft SQL Server\100\SDK\Assemblies\Microsoft.SqlServer.SqlWmiManagement.dll" /reference:"C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\System.Core.dll" /reference:"C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\System.Data.DataSetExtensions.dll" /reference:C:\Windows\Microsoft.NET\Framework\v2.0.50727\System.Data.dll /reference:C:\Windows\Microsoft.NET\Framework\v2.0.50727\System.dll /reference:C:\Windows\Microsoft.NET\Framework\v2.0.50727\System.Drawing.dll /reference:C:\Windows\Microsoft.NET\Framework\v2.0.50727\System.Windows.Forms.dll /reference:C:\Windows\Microsoft.NET\Framework\v2.0.50727\System.Xml.dll /reference:"C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\System.Xml.Linq.dll" /addmodule:D:\EA_MAIN_DB\AMI\src\radstore\Installer\EACustomInstallActions\obj\x86\Debug\GEHealthcare.Isip.EACustomInstallActions.CA.dll /debug+ /debug:full /filealign:512 /keyfile:..\..\Common\EAKeyPair.snk /optimize+ /out:obj\x86\Debug\Decl\GEHealthcare.Isip.EACustomInstallActions.dll /target:library /warnaserror- ..\..\Common\GlobalAssemblyInfo.cs CustomAction.cs Properties\AssemblyInfo.cs Resource1.Designer.cs SqlServersSelector.cs SqlServersSelector.designer.cs "C:\Program Files\Microsoft\Contracts\Languages\CSharp\ContractDeclarativeAssemblyAttribute.cs"]]></message>
<error code="CS0009" file="CSC"><![CDATA[Metadata file 'd:\EA_Main_DB\AMI\src\radstore\Installer\EACustomInstallActions\obj\x86\Debug\GEHealthcare.Isip.EACustomInstallActions.CA.dll' could not be opened -- 'An attempt was made to load a program with an incorrect format. ']]></error>
</target>This problem appears to be ongoing 5 years after this thread was started. I have just run into it.
When WiX builds a custom action, the build proceeds as normal and produces a managed code output, say MyCustomActions.dll. Windows Installer doesn't support managed code in custom actions, so the managed code has to be wrapped in an unmanaged native code
wrapper, so in a post-build step, it injects the managed output into the unmanaged wrapper and _that_ then becomes the project's build output and will be named MyCustomActions.CA.dll. I believe that Code Contracts may be trying to open the unmanaged wrapper
file and discovering that it is not managed code ("invalid format").
In order for CCRewrite to work here, it would need to run on the managed code _before_ it gets wrapped in the unmanaged wrapper. I am not sure how we can hook into the build process to get that to happen.
It might be possible to somehow make a WiX Custom Action project by creating a standard C# class library, which would work correctly with CCRewrite, then somehow performing the WiX packaging as a post-build step. I'm not sure what is required though, exactly.
Any ideas?
--Tim Long
Tim Long -
Smpatch PatchPro failed: ERROR: Failed to validate the digital signature
Hello,
I 'm trying to update solaris 9 (5.9 Generic_118558-03 sun4u sparc) using smpatch.
I get the following error from all - to be installed - patches!!
Downloading the required patches for machine "xxx". Please wait...
Error: PatchPro failed: ERROR: Failed to validate the digital signature(s).
/var/sadm/spool/112941-10.jar.tmp cannot be validated.
I have read that you need to install patchid 112945-44 so i have installed it with no solution.
I have cleared the /var/tmp/patches/ directory:
# rm /var/tmp/patches/*.jar.tmp
# rm /var/sadm/spool/*.jar
I would be grateful if you reply me with any help.
Thanks,I thought this solution:
To download signed patch 112945-45 and:
# mv 112945-45.jar /var/sadm/spool/
# smpatch add -i 112945-45
On machine ""xxx"...
Installing patch 112945-45 ...
Error: PatchPro failed: Received a Manipulable event.
Error: PatchPro failed: Received a Manipulable event.
Error: PatchPro failed: ALERT: Failed to install a patch. 112945-45
/var/sadm/spool/patchpro_dnld_2007.06.14@12:22:38:EEST.txt has been moved to /var/sadm/spool/patchproSequester/patchpro_dnld_2007.06.14@12:22:38:EEST.txt
Problem Summary:
Inside /var/log/messages :
Jun 14 12:44:05 polymnia root: [ID 702911 user.error] Thu Jun 14 12:44:05 EEST 2007(ERROR) => Thread[Thread-18,5,main] <=Problem installing patches: Received a Manipulable event.
Jun 14 12:44:05 polymnia root: [ID 702911 user.alert] Thu Jun 14 12:44:05 EEST 2007(ALERT) => com.sun.patchpro.manipulators.SunOSSunPatchInstaller@73a5d3 <=112945-45 validation failed.
Jun 14 12:44:05 polymnia root: [ID 702911 user.crit] Thu Jun 14 12:44:05 EEST 2007(CRITICAL) => com.sun.patchpro.manipulators.SunOSSunPatchInstaller@73a5d3 <=com.sun.patchpro.security.SignatureValidationException: ERROR: Failed to validate the digital signature(s) for:
Jun 14 12:44:05 polymnia at com.sun.patchpro.manipulators.Installer.extractPatch(Installer.java:314)
Jun 14 12:44:05 polymnia at com.sun.patchpro.manipulators.SunOSSunPatchInstaller.install(SunOSSunPatchInstaller.java:46)
Jun 14 12:44:05 polymnia at com.sun.patchpro.manipulators.Installer.run(Installer.java:134)
Jun 14 12:44:05 polymnia at java.lang.Thread.run(Thread.java:536)
Jun 14 12:44:06 polymnia root: [ID 702911 user.error] Thu Jun 14 12:44:05 EEST 2007(ERROR) => Thread[Thread-18,5,main] <=Problem installing patches: Received a Manipulable event.
Jun 14 12:44:06 polymnia root: [ID 702911 user.alert] Thu Jun 14 12:44:06 EEST 2007(ALERT) => com.sun.patchpro.util.PatchBundleInstaller@9360e7 <=Failed to install a patch. 112945-45
Jun 14 12:44:06 polymnia patchadd utility failed. Reason code :0
Jun 14 12:44:06 polymnia root: [ID 702911 user.error] Thu Jun 14 12:44:06 EEST 2007(ERROR) => Thread[Thread-18,5,main] <=Problem installing patches: ALERT: Failed to install a patch. 112945-45
Also i have just seen that messages complains for the digital cert when i am tryring to download the patch using smpach
Jun 14 12:49:20 polymnia root: [ID 702911 user.error] Thu Jun 14 12:49:20 EEST 2007(ERROR) => com.sun.patchpro.server.ServerPatchServiceProvider@92425a <=com.sun.patchpro.security.NotSignedByKnownCertificateException: 112945-45/prepatch CN=Enterprise Services Patch Management, O=Sun Microsystems Inc
Jun 14 12:49:20 polymnia at com.sun.patchpro.security.SignatureValidationUtil.validateJarFile(SignatureValidationUtil.java:232)
Jun 14 12:49:20 polymnia at com.sun.patchpro.server.ServerPatchServiceProvider.validatePatchBundle(ServerPatchServiceProvider.java:1837)
Jun 14 12:49:20 polymnia at com.sun.patchpro.server.ServerPatchServiceProvider.requestDownload(ServerPatchServiceProvider.java:1437)
Jun 14 12:49:20 polymnia at com.sun.patchpro.server.ServerPatchServiceProvider.performDownloadPatches(ServerPatchServiceProvider.java:739)
Jun 14 12:49:20 polymnia at com.sun.patchpro.server.ServerPatchServiceProvider.downloadPatches(ServerPatchServiceProvider.java:585)
Jun 14 12:49:20 polymnia at com.sun.patchpro.server.PatchServerProxy.downloadPatches(PatchServerProxy.java:130)
Jun 14 12:49:20 polymnia at com.sun.patchpro.server.GroupPatchDownloader.downloadPatches(GroupPatchDownload
Jun 14 12:49:20 polymnia root: [ID 702911 user.error] Thu Jun 14 12:49:20 EEST 2007(ERROR) => com.sun.patchpro.server.ServerPatchServiceProvider@92425a <=Failed to validate the digital signature(s). for: /var/sadm/spool/112945-45.jar.tmp: 112945-45/prepatch CN=Enterprise Services Patch Management, O=Sun Microsystems Inc
Jun 14 12:49:20 polymnia root: [ID 702911 user.error] Thu Jun 14 12:49:20 EEST 2007(ERROR) => Thread[Thread-18,5,main] <=Error: downloading patches.ERROR: Failed to validate the digital signature(s).
The following patches were not downloaded. Contact your Sun Microsystems support provider for more information.
112945-45
Message was edited by:
sapila -
Folks,
I wanted to run the Content Server Analyzer (11g/SQL Server 2008) to check the file system for integrity, and when I try to do that I get the following error:
"Unable to create the result set for query 'QnativeCurrentCounter (SELECT IDENT_CURRENT(idcSeqRevID) as dCurrentIndex)'. [FMWGEN][SQLSErver JDBC Driver][SQLServer] Invalid column Name 'IdcSeqRevId'"
I tried a couple of different options (like checking the database, etc.) and they ALL fail with the same error.
Again, UCM 11g and SQL Server 2008. Nothing is in the idcAnalyzer.log file except "Analyzing Filesystem..." or "Analyzing tables..." -- nothing else.
Any ideas here? We are seeing some issues on our PROD server that files are missing (when trying to archive out), so I really need to run the analysis....
Thanks!Just to answer my own question in case anyone else runs into the issue:
The answer to this is that there is a bug in UCM 11.1.1.5.
In the C:\Oracle\Middleware\Oracle_ECM1\ucm\idc\resources\core\tables\query.htm file, the select is WRONG.
IT is by default:
<tr>
<td>(MSSQLSERVER)QnativeCurrentCounter</td>
<td>SELECT IDENT_CURRENT(?) AS dCurrentIndex</td>
<td>dNativeCounterName table</td>
</tr>
The Fix is to change that to:
<tr>
<td>(MSSQLSERVER)QnativeCurrentCounter</td>
<td>SELECT IDENT_CURRENT*('?')* AS dCurrentIndex</td>
<td>dNativeCounterName table</td>
</tr>
Maybe you are looking for
-
My Mac is running slow. Advice from former discussions not helping.
I'm a reformed Windows user and love my MacIntosh but is has been giving me problems lately. It has slowed down extremely over the last few months. From everything I've read this is NOT from malware. I was beginning to think it was from me moving
-
How to find the user exit in BOM?
hi this is ganesh, my requirement is to put the check in bom header level at adminstrative data tab creation on field. so can you expain me the how to exit to header level in BOM.
-
Problem with CRM 2011 web front end cluster
Hi. We have a CRM 2011 (RU17) environment with a SQL DB server and 2 web front end CRM server in a cluster. Since few days (about 10) it seems that one of the 2 nodes is not working, and since yesterday many users report access problems when calling
-
Problems displaying website in IE and Chrome
Hi. I have recently created my first website in DW and it turns out great until I export it from DW. That's where the problem starts. I have constantly observed my website's behaviour during creation, previewing it repeatedly to make sure everything
-
Office 365 subscription - 60 minutes not included(...
Hello, I have purchased a Windows tablet which has Office 365 subscrption including skype 60 minutes. I live in Germany. I could not see these free minutes under Services and Products in my Microsoft account. The FAQ for the tablet says: The basic p