[comp.sys.apollo] July patch tape content

jimr@maths.su.oz.au (Jim Richardson) (07/17/90)

Here is the list of patches on the July 1990 SR10.2 patch tape (a small
extract of a file, copyright Hewlett-Packard Company 1990, which I
reproduce here for the purpose of fair comment :-) :

                              Patch Kit M68K_9007

     Patch #        Description                Blocks    Date

     Patch_m0166    Audit Subystem Fixes       860       9007
     Patch_m0165    /sau3,5,6,7,8,9 domain_os  4486      9007
     Patch_m0164    /lib/kslib                 126       9007
     Patch_m0163    /sau7/salvol /etc/salvol   188       9007
     Patch_m0162    New TCP/IP Daemons         53        9007
     Patch_m0161    /lib/gprlib                952       9007
     Patch_m0160    /lib/prflib                131       9007
     Patch_m0159    /lib/pmlib                 380       9007
     Patch_m0158    /etc/nodestat              38        9006
     Patch_m0157    /sau3,5,6,7,8,9 domain_os  Replaced by Patch m0165 (9007)
     Patch_m0156    /etc/mkdev                 22        9006
     Patch_m0155    /lib/dialoglib (SR10.1)    319       9006
     Patch_m0154    /lib/dialoglib (SR10.2)    332       9006
     Patch_m0153    /lib/gprlib                Replaced by Patch m0161 (9007)
     Patch_m0152    /sys/mgrs/rmt_scsi         30        9006
     Patch_m0151    /etc/omniback/bin/dw       244       9006
     Patch_m0150    /etc/technet/technet       979       9006
     Patch_m0149    ikon85                     10        9005
     Patch_m0148    Number Not Used
     Patch_m0147    Aegis Print Components     3439      9005
     Patch_m0146    /lib/gmr3dlib              9035      9005
     Patch_m0145    /lib/gprlib                1116      9005
                    /sys/mgrs/dtm_mk3
     Patch_m0144    /sau9/domain_os            Replaced by Patch m0165 (9006)
     Patch_m0143    /sau5,6,7,8 domain_os      Replaced by Patch m0165 (9006)
     Patch_m0142    /sys/vtserver (v2.0)       43        9005
     Patch_m0141    /com/wbak                  108       9005
     Patch_m0140    /lib/clib                  256       9005
     Patch_m0139    /lib/streams               563       9005
     Patch_m0138    /sau3/domain_os            653       9005
     Patch_m0137    /sys/dm/dm                 359       9005
     Patch_m0136    /lib/ftnlib                122       9005
     Patch_m0135    Number Not Used
     Patch_m0134    /sau7,8 domain_os          1567      9005
     Patch_m0133    Number Not Used
     Patch_m0132    Number Not Used
     Patch_m0131    /sau2-9/salvol             2458      9005
                    /etc/salvol
     Patch_m0130    /sys/mgrs/dds              21        9005
     Patch_m0129    /lib/syslib.881            243       9005
     Patch_m0128    /lib/spe_pio_lib           7         9005
     Patch_m0127    /com/bmail                 456       9005
     Patch_m0126    /sau9/self_test            189       9005
     Patch_m0125    Number Not Used
     Patch_m0124    /etc/invol, /sau9/invol    312       9005
     Patch_m0123    Number Not Used
     Patch_m0122    /sau7,8,9 domain_os        Replaced by Patch m0165 (9006)
     Patch_m0121    [security patch]           118       9003
     Patch_m0120    /lib/streams               Replaced by Patch m0139 (9005)
     Patch_m0119    /lib/pmlib                 389       9003
     Patch_m0118    /lib/kslib                 133       9003
     Patch_m0117    /lib/ftnlib                Replaced by Patch m0136 (9005)
     Patch_m0116    /lib/tfp                   131       9003
     Patch_m0115    /lib/kslib                 Replaced by Patch m0118 (9003)
     Patch_m0114    /sau7,8,9 ring.dex         598       9002
     Patch_m0113    /sau7,8,9 domain_os        Replaced by Patch m0165 (9006)
     Patch_m0112    /lib/gprlib                Replaced by Patch m0145 (9005)
     Patch_m0111    /lib/rgylib                148       9002
     Patch_m0110    /lib/dseelib (9.7)         1892      9002
     Patch_m0109    /lib/dseelib               2049      9002
     Patch_m0108    /etc/routed                41        9001
     Patch_m0107    /etc/ftpd and ftp          18        9001
     Patch_m0106    DPCE fixes                 1385      9001
     Patch_m0105    DPCC fixes                 1541      9001
     Patch_m0104    /sau7/domain_os            792       9001
     Patch_m0103    SNA 3770 fixes             5         9001
     Patch_m0102    /sys/sna_3770/rje          157       9001
     Patch_m0101    /sau7/ctape7b.dex          80        9001

As I wrote in <1990Jun7.073655.20620@metro.ucc.su.OZ.AU> about the March
tape,

  Note that m0121 is a vital security patch which no multi-user Apollo site
  should be without ... I would have been much happier if we'd received the
  tape automatically *before* we stumbled on the security hole which m0121
  addresses, instead of as an informal response to an APR.  I am not going to
  post any details of the hole (and I beg other people not to do so either):
  believe me, it's a nasty one.

I hope everybody has m0121 installed by now.  Maybe in a month or two it will
be safe to discuss it on the net ... or maybe not.

An interesting new patch for July is this one:

     1.5  Patch m0162 New TCP/IP Daemons

     Patch m0162 includes a new /etc/rlogind, /etc/telnetd, /etc/rshd, and
     /etc/rexecd for nodes running the SR10.1 or SR10.2 versions of
     Domain/OS.  This patch is incompatible with all other releases.

     Patch m0162 fixes the following problem:

     The rlogind and telnetd process groups were not being set, resulting
     in orphaned child processes.  This problem could hang or corrupt the
     pseudo tty devices, forcing the user to recreate them.  rlogind and
     telnetd now set their process groups and environmental variables (in
     telnetd) before invoking the user's shell process.  rshd and rexecd
     now set the environmental variable ISP to the correct machine type
     before invoking the process.

     If you are having pseudo tty corruption problems, install this patch
     and patch m0139 (/lib/streams).

     NOTE:  Install patch m0139 only if you are running SR10.2. If you are
            running SR10.1, you only need to install this patch.

     After installing the patch(es), recreate the pseudo tty devices to
     destroy any corrupt ptys. Use the following command, running as root:

         /etc/mkdev pty

     Install patch m0162 on nodes running the SR10.1 or SR10.2 version of
     Domain/OS (use the bldt command to determine the revision of the
     operating system running on your workstation).

     Patch m0162 includes the following files:

       /etc/telnetd  1990/05/03 10:25:14 EST (Thu)
       /etc/rlogind  1990/04/04 14:03:58 EST (Wed)
       /etc/rshd     1990/05/31 10:04:26 EST (Thu)
       /etc/rexecd   1990/06/07 10:35:09 EDT (Thu)

Has anyone installed this yet?  Could it at last be the solution to the long
line of pty problems?

In article <1990Jul10.134337.687@quintro.uucp>, bep@quintro.UUCP (Bryan
Province) wrote:
>In case you haven't figured it out by now your problem is patch 142.  I had
>loaded this myself and also broke vt100.  When I called the hotline the guy
>said "Don't even load that patch.  I don't know why it was even on the patch
>tape.  It doesn't work."
 
The July release notes bear this out (multiple versions of *patches* already
:-) :

     1.24  Patch m0142 /sys/vtserver (v2.0)

     Patch m0142 includes a new /sys/vtserver for nodes running the SR10.1
     version of Domain/OS. This patch is incompatible with all other
     releases.  Patch m0142 v1.0 has been replaced by this patch. We have
     changed the compatible environment from SR10.2 to SR10.1.

In article <9007101354.AA25169@richter.mit.edu>, David Krowitz
(krowitz%richter@UMIX.CC.UMICH.EDU) wrote:
>Good God man! The patch tape release notes explicitly tell you *not*
>to install patches unless you absolutely need them! This (obvious)
>reason is that the individual patches have rarely had sufficient testing
>in a complete OS environment on all hardware models. Start with a clean
>OS release and install *only* the patches you *absolutely* need.

I fully support Dave's call for caution here, but I can't find this explicit
warning in the copy of the release notes I've got.  Instead they say in
Chapter 1:

     Execute the bldt shell command to establish which software release is
     running on the installation target. [...]
     Patches that predate the version of the OS currently installed on your
     node are already included in your software (layered product patches
     may be an exception).

     Then read the descriptions of the patches in this chapter. If the
     requirements of a patch and the target match, install the patch.

and in Section 2.1

     Before you install a patch, check its description in Chapter 1 to find
     out whether it is compatible with the software currently running on
     your node.

We *ought* to be able to have enough confidence in patch development quality
control to follow these instructions!

Netpower note:  Draft 2 will be out in a day or two.  I'd be grateful to see
some postings on people's experiences with APRs and software upgrades (see
my "Apollo/HP contrast" article <1990Jul14.085541.18550@metro.ucc.su.OZ.AU>),
so I can summarize them in the "Customer Service Problems" section of the
open letter.
--
Jim Richardson
Department of Pure Mathematics, University of Sydney, NSW 2006, Australia
Internet: jimr@maths.su.oz.au  ACSNET: jimr@maths.su.oz  FAX: +61 2 692 4534
--
There have been flurries of complaints about HP/Apollo's performance on Usenet
before, but so far they've always died away leaving the bad old status quo in
place.  Let's not let that happen this time.