System Administration Guide: Basic Administration

Chapter 25 Managing Solaris Patches (Tasks)

This chapter provides step-by-step instructions for managing patches in the Solaris environment.

This is a list of the task maps in this chapter.

For overview information about managing patches in the Solaris environment, see Chapter 24, Managing Solaris Patches (Overview).

For information on troubleshooting problems with signed patches, see http://sunsolve.Sun.COM/pub-cgi/show.pl?target=patches/spfaq.

High-Level View of Managing Patches in the Solaris Environment (Task Map)

Use this task map to identify all the tasks for managing patches in the Solaris environment. Each task points to a series of additional tasks such as managing signed or unsigned patches.

Task 

Description 

For Instructions 

Identify disk space requirements for patches 

Identify whether your system has enough disk space to download or spool patches. 

Identifying Disk Space Requirements for Patches

Determine if adding signed or unsigned patches 

Determine whether adding signed or unsigned patches is best for your environment. 

Selecting Signed or Unsigned Patches for Your Environment

Add a signed or unsigned patch to your system 

Select one of the following: 

 

 

Add a signed patch to a your system. 

Managing Signed Patches on a Solaris System (Task Map)

 

Add an unsigned patch to your system. 

Managing Unsigned Solaris Patches (Task Map)

Identifying Disk Space Requirements for Patches

Keep the following disk space considerations in mind before you begin downloading or spooling patches:

Selecting Signed or Unsigned Patches for Your Environment

The key factor in determining when to add signed or unsigned patches is whether or not the secure download of patches is important in your environment. If the secure download of patches is important in your environment, then add signed patches to your system.

Preparation for Managing Signed Patches (Task Map)

Use this map to identify all the preparation tasks that are required before you can add signed patches to your system.

Task 

Description 

For Instructions 

1. Verify Solaris package requirements 

Verify that the required Solaris packages are installed on your system to support the patch tools. 

How to Verify Package Requirements for Signed Patch Tools

2. Download and install a Solaris patch management tool 

Select a Solaris patch management tool based on your Solaris release. 

How to Download and Install the Solaris Patch Management Tools

3. Import Sun certificates into the keystore 

Import and accept the Sun certificates that are used to verify a patch's signature. 

The SUNWcert package is automatically installed when you install the signed patches tool. Do not install the SUNWcert package separately if you have already installed a signed patches tool.

How to Import Sun Certificates Into the Keystore

4. (Optional) Change the keystore password 

Change the password to keep the keystore secure. 

How to Change the Keystore Password

5. Set up your patch environment 

Set up your system for adding signed patches. 

How to Set Up Your Patch Environment

Using the Solaris Patch Management Tools

Keep the following key points in mind when using the Solaris patch management tools:

How to Verify Package Requirements for Signed Patch Tools

Make sure that you have the required Solaris packages installed on your system before you install the signed patch tools. If you are running the Solaris 2.6, 7, or 8 release, you need a minimal system configuration plus some additional packages. If you are running the Solaris 9 release, you must have the Developer cluster (SUNWCprog) installed on your system to use the signed patch tools.

  1. Identify your Solaris release and select one of the following:

    1. If you are running the Solaris 2.6 release, identify whether the required packages are installed on your system:


      # pkginfo | grep SUNWmfrun
      system      SUNWmfrun      Motif RunTime Kit
      # pkginfo | grep SUNWlibC
      system      SUNWlibC       Sun Workshop Compilers Bundled libC
      # pkginfo | grep SUNWxcu4
      system      SUNWxcu4       XCU4 Utilities
    2. If you are running the Solaris 7 or 8 releases, identify whether the required packages are installed on your system:


      # pkginfo | grep SUNWmfrm
      system      SUNWmfrun      Motif RunTime Kit
      # pkginfo | grep SUNWlibC
      system      SUNWlibC       Sun Workshop Compilers Bundled libC
    3. If you are running the Solaris 9 release, verify that the required Developer cluster is installed on your system:


      # cat /var/sadm/system/admin/CLUSTER
      CLUSTER=SUNWCprog
  2. If the pkginfo commands do not return any output, you need to install the required packages.

How to Download and Install the Solaris Patch Management Tools

  1. Become superuser.

  2. Follow the links and download the appropriate tar file for your Solaris release from the following location:

    http://www.sun.com/PatchPro

  3. Select one of the following to unpack the patch tool package:

    1. If you are running the Solaris 2.6 or 7 release, uncompress and unpack the package by using the following commands:


      # uncompress SUNWpkg-name.tar.Z
      # tar xvf SUNWpkg-name.tar
      
    2. If you are running the Solaris 8 or 9 release, unpack the package by using the following command:


      # gunzip -dc SUNWpkg-name.tar.gz | tar xvf -
      
  4. Run the install script.


    # cd unzipped-pkg-dir
    # ./setup
    

    If there are errors while running the install script, see Troubleshooting Problems With Signed Patches.

Examples—Downloading and Installing Solaris Patch Management Tools

This example shows how to download and install the Solaris 2.6 patch management tools.


# uncompress pproSunOSsparc5.6jre2.1.tar.Z
# tar xvf pproSunOSsparc5.6jre2.1.tar 
.
.
.
# cd pproSunOSsparc5.6jre2.1
# ./setup
.
.
.

This example shows how to download and install the Solaris 9 patch management tools.


# gunzip -dc pproSunOSsparc5.9jre2.1.tar.gz | tar xvf -
.
.
# cd pproSunOSsparc5.9jre2.1
# ./setup
.
.
.

How to Import Sun Certificates Into the Keystore

Use the keytool command to import and verify the Sun certificates that are used to verify the signed patches you want to add to your system. You must do this task even if you imported the certificates from a previous installation.


Note –

The SUNWcert package is automatically installed when you install the signed patches tool. Do not install the SUNWcert package separately if you have already installed a signed patches tool.


  1. Verify that you have completed the prerequisite task, which is to download one of the Solaris patch management tools.

  2. Become superuser.

  3. Determine the fingerprints of your Sun root certificate and Sun class B certificate.


    # /usr/j2se/bin/keytool -printcert -file /etc/certs/SUNW/smirootcacert.b64
    # /usr/j2se/bin/keytool -printcert -file /etc/certs/SUNW/smicacert.b64
    
  4. Verify that the output of these commands matches the Sun root and class B certificate fingerprints displayed at:


    https://www.sun.com/pki/ca/
    
  5. Accept the Sun class B certificate by importing it into your system:


    # /usr/j2se/bin/keytool -import -alias smicacert -file /etc/certs/SUNW/ 
    smicacert.b64  -keystore /usr/j2se/jre/lib/security/cacerts
    Enter keystore password:  changeit
    Owner: O=Sun Microsystems Inc, CN=Sun Microsystems Inc CA (Class B)
    Issuer: CN=Sun Microsystems Inc Root CA, O=Sun Microsystems Inc, C=US
    Serial number: 1000006
    Valid from: Mon Nov 13 12:23:10 MST 2000 until: Fri Nov 13 12:23:10 MST 2009
    Certificate fingerprints:
             MD5:  B4:1F:E1:0D:80:7D:B1:AB:15:5C:78:CB:C8:8F:CE:37
             SHA1: 1E:38:11:02:F0:5D:A3:27:5C:F9:6E:B1:1F:C4:79:95:E9:6E:D6:DF
    Trust this certificate? [no]:  yes
    Certificate was added to keystore
  6. Accept the Sun root certificate by importing it into your system:


    # /usr/j2se/bin/keytool -import -alias smirootcacert -file /etc/certs/SUNW/
    smirootcacert.b64 -keystore /usr/j2se/jre/lib/security/cacerts
    Enter keystore password:  changeit
    Owner: CN=Sun Microsystems Inc Root CA, O=Sun Microsystems Inc, C=US
    Issuer: CN=GTE CyberTrust Root, O=GTE Corporation, C=US
    Serial number: 200014a
    Valid from: Tue Nov 07 15:39:00 MST 2000 until: Thu Nov 07 16:59:00 MST 2002
    Certificate fingerprints:
             MD5:  D8:B6:68:D4:6B:04:B9:5A:EB:34:23:54:B8:F3:97:8C
             SHA1: BD:D9:0B:DA:AE:91:5F:33:C4:3D:10:E3:77:F0:45:09:4A:E8:A2:98
    Trust this certificate? [no]:  yes
    Certificate was added to keystore
  7. Accept the patch signing certificate by importing it into your system:


    # /usr/j2se/bin/keytool -import -alias patchsigning -file /opt/SUNWppro/
    etc/certs/patchsigningcert.b64 -keystore /usr/j2se/jre/lib/security/cacerts
    Enter keystore password:  changeit
    Owner: CN=Enterprise Services Patch Management, O=Sun Microsystems Inc
    Issuer: O=Sun Microsystems Inc, CN=Sun Microsystems Inc CA (Class B)
    Serial number: 1400007b
    Valid from: Mon Sep 24 14:38:53 MDT 2001 until: Sun Sep 24 14:38:53 MDT 2006
    Certificate fingerprints:
             MD5:  6F:63:51:C4:3D:92:C5:B9:A7:90:2F:FB:C0:68:66:16
             SHA1: D0:8D:7B:2D:06:AF:1F:37:5C:0D:1B:A0:B3:CB:A0:2E:90:D6:45:0C
    Trust this certificate? [no]:  yes
    Certificate was added to keystore

How to Change the Keystore Password

  1. Become superuser.

  2. Change the keystore password.


    # /usr/j2se/bin/keytool -storepasswd -keystore /usr/j2se/jre/lib/security/
    cacerts
    Enter keystore password:  changeit
    New keystore password:  new-password
    Re-enter new keystore password:  new-password
    

How to Set Up Your Patch Environment

  1. Become superuser.

  2. Add patch tool directories to your path.


    # PATH=/usr/sadm/bin:/opt/SUNWppro/bin:$PATH
    # export PATH
    
  3. (Optional) Identify the hardware on your system so that you can use the smpatch analyze command to determine whether you need specific patches based on your hardware configuration.


    # pprosetup -H
    
    Change Hardware Configuration.
    Analyzing this computer.
    ..............

    This command only identifies Sun's Network Storage products.

  4. Identify the types of patches that you will be adding to the system.


    # pprosetup -i standard:singleuser:rebootafter:reconfigafter
    

    This command establishes the default patch policy for your system.

  5. (Optional) If you want to add contract signed patches to your system, do the following steps to define your SunSolve username and password.

    1. Define your SunSolve username.


      # pprosetup -u username
      
    2. Define your SunSolve password by adding the password to the following file:


      /opt/SUNWppro/lib/.sunsolvepw
  6. Identify a proxy server so that the patch tool can download patches to your system.

    1. If your system is behind a firewall, you need to define a proxy server that can access the patchpro.sun.com server and one of the following Sun patch servers that are used to download patches:

      • americas.patchmanager.sun.com (default)

      • emea.patchmanager.sun.com

      • japan.patchmanager.sun.com

    2. Identify the selected proxy server by using the following command:


      # pprosetup -x proxy-server:proxy-port
      

      For example, if you selected webaccess.corp.net.com as the proxy server, the pprosetup command would look like this:


      # pprosetup -x webaccess.corp.net.com:8080
      

Where to Go From Here

If you have completed all the signed patch preparation tasks, you can now add signed patches with the patch management tools.

Managing Signed Patches on a Solaris System (Task Map)

Task 

Description 

For Instructions 

1. Perform signed patches preparation tasks 

Perform all of the signed patches preparation tasks: 

  • Verify package requirements for signed patch tools.

  • Download and install the Solaris patch management tools.

  • Import Sun certificates into the keystore.

  • Change the keystore password.

  • Set up your system for adding signed patches.

Preparation for Managing Signed Patches (Task Map)

2. Download and add a signed patch or patches 

Download and add a signed patch with the smpatch command.

How to Download and Add a Signed Patch on a Solaris System

3. (Optional) Remove a signed patch 

If necessary, remove an unsigned patch from your system. 

How to Remove a Signed Patch on a Solaris System

How to Download and Add a Signed Patch on a Solaris System

  1. Make sure you have completed the preparation tasks before downloading and adding a signed patch to your system. For more information, see Preparation for Managing Signed Patches (Task Map).

  2. Become superuser.

  3. Solaris 9 system only – Notify the Solaris Management Console server that the PatchPro packages were added to the system.


    # /etc/init.d/init.wbem stop
    # /etc/init.d/init.wbem start
    
  4. Download a signed patch or patches from the SunSolve web site.


    # smpatch download -i patch-ID
    
    Requested patches:
    
        patch-ID
    
    Downloading the requested patches
    
    /var/sadm/spool/patch-ID.jar has been validated.
    
    For downloaded patch(es) see /var/sadm/spool
  5. Add the signed patch.


    # smpatch add -i patch-ID 
    

Examples—Downloading and Adding a Signed Patch on a Solaris System (smpatch Command)

The following example shows how to download and add a signed patch with the smpatch command on a Solaris 9 system.


# /usr/sadm/bin/smpatch download -i 111711-01
Authenticating as user: root

Type /? for help, pressing <enter> accepts the default denoted by [ ]
Please enter a string value for: password :: xxx
Loading Tool: com.sun.admin.patchmgr.cli.PatchMgrCli from starbug
Login to starbug as user root was successful.
Download of com.sun.admin.patchmgr.cli.PatchMgrCli from starbug was 
successful.


        Requested patches:
                111711-01

        Downloading the requested patches ...


For downloaded patch(es) see /var/sadm/spool.
# smpatch add -i 111711-01
Authenticating as user: root

Type /? for help, pressing <enter> accepts the default denoted by [ ]
Please enter a string value for: password :: xxx
Loading Tool: com.sun.admin.patchmgr.cli.PatchMgrCli from starbug
Login to starbug as user root was successful.
Download of com.sun.admin.patchmgr.cli.PatchMgrCli from starbug was 
successful.

        On machine starbug ...
                Installing patch 111711-01
#

The following example shows how to download and add patch 105081–45 with the smpatch command on a Solaris 2.6 system.


# smpatch download -i 105407-01

Requested patches:

    105407-01

Downloading the requested patches



/var/sadm/spool/105407-01.jar has been validated.

For downloaded patch(es) see /var/sadm/spool
# smpatch add -i 105407-01

On machine "earth/172.20.27.27" ...


Installing patch 105407-01 ...
Purging /var/sadm/spool/105407-01
/var/sadm/spool/README.txt has been moved to 
/var/sadm/spool/patchproSequester

The following example shows how to download and add patch 107081–45 with the smpatch command on a Solaris 7 system. This patch has two patch dependencies, which are automatically downloaded and verified.


# smpatch download -i 107081-45

Requested patches:

    107081-45

Downloading the requested patches

The following patches were added due to patch dependencies:
    108376-37
    107656-09

/var/sadm/spool/108376-37.jar has been validated.

/var/sadm/spool/107656-09.jar has been validated.

/var/sadm/spool/107081-45.jar has been validated.

For downloaded patch(es) see /var/sadm/spool
# smpatch add -i 108376-37 -i 107656-09 -i 107081-45

On machine "venus/172.20.27.26" ...

Installing patch 108376-37 ...
Installing patch 107656-09 ...
Installing patch 107081-45 ...
Purging /var/sadm/spool/108376-37
Purging /var/sadm/spool/107656-09
Purging /var/sadm/spool/107081-45

The following example shows how to use the ftp command to get a signed Solaris 8 patch from the SunSolve Online web site and then use the smpatch add command to add the signed patch to the system.


# ftp sunsolve.sun.com
Connected to sunsolve.sun.com.
220-
220-Welcome to the SunSolve Online FTP server.
220-
220-Public users may log in as anonymous. 
.
.
.
Name (sunsolve.sun.com:root): anonymous
331 Guest login ok, send your complete e-mail address as password.
Password: xxx
230-
230-SUN MICROSYSTEMS, INC.
.
.
.230 Guest login ok, access restrictions apply.
ftp> cd signed_patches
250 CWD command successful.
ftp> get 112846-01.jar /var/sadm/spool/112846-01.jar
200 PORT command successful.
150 Opening ASCII mode data connection for 112846-01.jar (22524 bytes).
226 Transfer complete.
local: /var/sadm/spool/112846-01 remote: 112846-01.jar
22613 bytes received in 0.065 seconds (341.70 Kbytes/s)
ftp> quit
# smpatch add -i 112846-01
On machine "earth/172.20.27.27" ...


Installing patch 112846-01 ...
Purging /var/sadm/spool/112846-01

How to Remove a Signed Patch on a Solaris System

  1. Become superuser.

  2. Remove the signed patch.


    # smpatch remove -i patch-ID
    

    You cannot remove multiple patches in the same command.

Examples—Removing a Signed Patch on a Solaris System

The following example shows how to remove a signed patch on a system running the Solaris 9 release.


# /usr/sadm/bin/smpatch remove -- -i 111711-01
Authenticating as user: root

Type /? for help, pressing <enter> accepts the default denoted by [ ]
Please enter a string value for: password :: 
Loading Tool: com.sun.admin.patchmgr.cli.PatchMgrCli from starbug
Login to starbug as user root was successful.
Download of com.sun.admin.patchmgr.cli.PatchMgrCli from starbug was 
successful.

          On machine starbug ...
                Removing patch 111711-01

The following example shows how to remove a signed patch on a system running the Solaris 2.6 release.


# smpatch remove -i 105407-01

On machine "earth/172.20.27.27" ...

Removing patch 105407-01

Checking installed patches...

Backing out patch 105407-01...

Patch 105407-01 has been backed out.

Troubleshooting Problems With Signed Patches

For up-to-date information on troubleshooting signed patch problems or error messages, see http://sunsolve.Sun.COM/pub-cgi/show.pl?target=patches/spfaq.

Viewing Patch Tool Log Files

Various log files on the system can identify problems with installing patch management tools or adding signed patches.

By default, PatchPro writes to the system log file.The syslog configuration file, /etc/syslog.conf, identifies where the system log file resides on the system. You can instruct PatchPro to write messages to a different file on the local file system by updating the patchpro.log.file property in the PatchPro configuration file, /opt/SUNWppro/etc/patchpro.conf.

For example, if you want PatchPro to write to the /var/tmp/patchpro.log file, assign /var/tmp/patchpro.log to the patchpro.log.file property.

Use the following table to determine which log file might contain information about a failed installation of a patch management tool or a signed patch.

Log File 

Description 

/var/tmp/ppro_install_log.nnn

Identifies the success or failure of the installation of PatchPro packages and patches. 

/var/tmp/log/patchpro.log

Identifies problems when adding a signed patch with the various patch tools. 

/var/adm/messages

Can identify problems when adding a signed patch with the various patch tools or when the patch tools did not initialize properly. 

Solaris Management Console 's Log Viewer on a Solaris 9 system 

Identifies the success or failure of adding a signed patch with the Solaris Management Console's Patches tool.  

How to Resolve a Sequestered Patch

A patch might not install successfully if it requires prerequisite patches or if a system reboot is required to install the patch. Patches that cannot be installed by PatchPro are sequestered in the /var/spool/pkg/patchproSequester directory.

Review the patch README file to find out if there are any prerequisite patches, which are listed in a section called REQUIRED PATCHES.

You can either view a copy of the patch README from the SunSolve Online website or extract the README file from the JAR archive. Do not expand the JAR archive to avoid any tampering with the digital signature. Use the following procedure to safely extract the patch README file.

You should also review the contents of the /var/tmp/log/patchpro.log file to find out why a patch did not install successfully.

  1. Verify that a patch or patches were not installed by viewing the contents of the /var/spool/pkg/patchproSequester directory.


    # cd /var/spool/pkg/patchproSequester; ls
    
  2. Extract the README file from the JAR archive:

    1. First, identify the name of the README file. For example:


      # /usr/j2se/bin/jar tvf 107058-01.jar | grep README
      
    2. Then, extract the README file. For example:


      # /usr/j2se/bin/jar xvf 107058-01.jar 107058-01/README.107058-01
      extracted: 107058-01/README.107058-01
  3. View the README file.

    For example:


    # more 107058-01/README.107058-01
    

How to Remove Imported Certificates

If a problem occurred during the PatchPro installation, you might just remove the certificates and import them again.

  1. Become superuser.

  2. Remove the previously imported certificates.


    #/usr/j2se/bin/keytool -delete -alias smicacert -keystore 
    /usr/j2se/jre/lib/security/cacerts
    Enter keystore password:  changeit
    # /usr/j2se/bin/keytool -delete -alias smirootcacert -keystore 
    /usr/j2se/jre/lib/security/cacerts
    Enter keystore password:  changeit
    # /usr/j2se/bin/keytool -delete -alias patchsigning -keystore 
    /usr/j2se/jre/lib/security/cacerts
    Enter keystore password:  changeit
    

Managing Unsigned Solaris Patches (Task Map)

Task 

Description 

For Instructions 

1. (Optional) Display information about unsigned patches 

Display information about unsigned patches already installed on your system. 

How to Display Information About Solaris Patches

2. Download an unsigned patch 

Download an unsigned patch to your system. 

How to Download an Unsigned Solaris Patch

3. Add an unsigned patch  

Add an unsigned patch to your system. 

How to Add a Unsigned Solaris Patch

4. (Optional) Remove an unsigned patch 

If necessary, remove an unsigned patch from your system. 

How to Remove an Unsigned Solaris Patch

Displaying Information About Unsigned Solaris Patches

Before installing patches, you might want to know more about patches that have previously been installed. The following table describes commands that provide useful information about patches that are already installed on a system.

Table 25–1 Commands for Solaris Patch Management

Command 

Description 

patchadd -p, showrev -p

Shows all patches that have been applied to a system. 

pkgparam pkgid PATCHLIST

Shows all patches that have been applied to the package identified by pkgid, the name of the package. For example, SUNWadmap.

patchadd -S Solaris-OS -p

Shows all the /usr patches installed on an OS server.

How to Display Information About Solaris Patches

Use the patchadd -p command to display information about patches installed on your system.


$ patchadd -p

Use the following command to verify whether a specific patch is installed on your system. For example:


$ patchadd -p | grep 111879

Adding an Unsigned Solaris Patch

You can use the patchadd command to add unsigned patches to servers or standalone systems. If you need to add a patch to a diskless client system, see Patching Diskless Client OS Services.

When you add a patch, the patchadd command calls the pkgadd command to install the patch packages from the patch directory to a local system's disk. More specifically, the patchadd command:

During patch installation, the patchadd command keeps a log of the patch installation in the /var/sadm/patch/patch-ID/log file for current Solaris versions.

The patchadd command will not install a patch under the following conditions:

How to Download an Unsigned Solaris Patch

  1. (Optional) Log in to the system where the patch will be applied.

    Or, you can download the patch and use the ftp command to copy the patch to the target system.

  2. Open a web browser and go to the SunSolve Online web site:


    http://sunsolve.Sun.COM/pub-cgi/show.pl?target=patches/patch-access
    
  3. Determine if you are going to download a specific patch or patch cluster. Then select one of the following:

    1. Type the patch number (patch-ID) in the “Find Patch” search field. Then, click on Find Patch.

      Entering patch-ID downloads the latest patch revision.

      If this patch is freely available, the patch README is displayed. If this patch is not freely available, an ACCESS DENIED message is displayed.

      There are different patch numbers for SPARC and x86 systems, which are listed in the displayed patch README. Make sure you install the patch that matches your system architecture.

    2. Click on a recommended patch cluster based on the Solaris release running on the system to be patched.

  4. Click the Download Patch (n bytes) HTTP or FTP button.

    After the patch or patches are downloaded successfully, close the web browser.

  5. Change to the directory that contains the downloaded patch package, if necessary.

  6. Unzip the patch package.


    % unzip patch-ID-revision
    

How to Add a Unsigned Solaris Patch

  1. Become superuser.

  2. Add the patch or patches.


    # patchadd patch-ID-revision
    
  3. Verify that the patch was added successfully.


    # patchadd -p | grep patch-ID-revision
    

Example—Adding an Unsigned Solaris Patch

In the following example, the Solaris 8 patch, 111879–01, is added to the system. The patch had already been downloaded to the system previously.


# patchadd /export/Sol8patch/111879-01

Checking installed patches...
Verifying sufficient filesystem capacity (dry run method)...
Installing patch packages...

Patch number 111879-01 has been successfully installed.
See /var/sadm/patch/111879-01/log for details

Patch packages installed:
  SUNWwsr
# patchadd -p | grep 111879-01
Patch: 111879-01 Obsoletes:  Requires:  Incompatibles:  Packages: SUNWwsr

Removing an Unsigned Solaris Patch

When you back out a patch, the patchrm command restores all files modified by that patch, unless:

The patchrm command calls the pkgadd command to restore packages that were saved from the initial patch installation.

During the patch removal process, patchrm keeps a log of the back out process in /tmp/backoutlog.process_id. This log file is removed if the patch backs out successfully.

How to Remove an Unsigned Solaris Patch

Use the patchrm command if you need to remove an unsigned Solaris patch.

  1. Become superuser.

  2. Remove the patch.


    # patchrm patch-ID-revision
    
  3. Verify that the patch was removed.


    # patchadd -p | grep patch-ID-revision
    

Example—Removing an Unsigned Solaris Patch

The following example shows how to remove the Solaris 8 patch, 111879–01.


# patchrm 111879-01

Checking installed patches...

Backing out patch 111879-01...

Patch 111874-02 has been backed out.

# showrev -p | grep 111879-01
#