SlideShare a Scribd company logo
Digital UNIX System Administration
Course Guide, Volume 1
Order Number: EY-U659E-S1.0002
September 1996
Digital Equipment Corporation makes no representations that the use of its products
in the manner described in this publication will not infringe on existing or future
patent rights, nor do the descriptions contained in this publication imply the granting
of licenses to make, use, or sell equipment or software in accordance with the
description.
Reproduction or duplication of this courseware in any form, in whole or in part, is
prohibited without the prior written permission of Digital Equipment Corporation.
Possession, use, or copying of the software described in this publication is authorized
only pursuant to a valid written license from Digital or an authorized sublicensor.
© Digital Equipment Corporation 1995, 1996. All rights reserved. Printed in U.S.A.
The following are trademarks of Digital Equipment Corporation: Alpha AXP,
CompacTape, DEC, DECevent, DEC VET, DEC Fortran, DECthreads, DEC Chip,
DECnet, DECwindows, Digital, DNA, LAT, POLYCENTER, OpenVMS, TURBOchannel,
ULTRIX, and the DIGITAL logo.
The following are third-party trademarks used in this course:
AIX is a registered trademark of International Business Machines Corp.
Futurebus/Plus is a registered trademark of Force Computers GMBH, Federal Republic
of Germany.
Global Knowledge Network and the Global Knowledge Network logo are trademarks of
Global Knowledge Network, Inc.
IEEE is a registered trademark of the Institute of Electrical and Electronics Engineers,
Inc.
Motif, OSF and OSF/1 are registered trademarks of the Open Software Foundation.
MS–DOS is a registered trademark of Microsoft Corporation.
NFS is a registered trademark of Sun Microsystems, Inc.
Open Software Foundation is a trademark of the Open Software Foundation.
POSIX is a registered trademark of the Institute of Electrical and Electronics.
PostScript is a registered trademark of Adobe Systems, Inc.
NFS and Sun Microsystems are registered trademarks of Sun Microsystems, Inc.
UNIX is a registered trademark in the United States and other countries licensed
exclusively through X/Open Company Ltd.
X Window System is a trademark of the Massachusetts Institute of Technology.
This document was prepared using VAX DOCUMENT Version 2.1.
Contents
About This Course . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xvii
1 Introducing UNIX System Management
About This Chapter . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1–2
Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1–2
Objectives . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1–2
Resources . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1–3
System Manager Responsibilities . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1–4
Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1–4
UNIX Software Environment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1–6
Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1–6
The Kernel . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1–7
Digital UNIX Features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1–8
Digital UNIX Components . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1–8
Digital UNIX Features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1–8
File System Support . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1–9
Digital UNIX System Internals . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1–10
Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1–10
User Process Creation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1–10
Daemon Processes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1–11
Process Environment: Scheduling and Priority . . . . . . . . . . . . . . . . . . 1–11
Real Time Processing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1–13
Memory Management: Paging and Swapping . . . . . . . . . . . . . . . . . . . 1–13
Block versus Character I/O . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1–14
Superuser and the Root Login . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1–15
Superuser Privileges . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1–15
Root Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1–15
Root Login Procedure . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1–15
Root Login Restrictions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1–16
Common Desktop Environment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1–17
Managing with CDE . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1–17
Front Panel . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1–17
Application Manager . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1–18
Configuration Manager . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1–20
Daily Administration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1–21
Selecting System Information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1–22
Monitoring and Tuning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1–23
Storage Management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1–24
Using Tools . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1–25
Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1–26
System Manager Responsibilities . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1–26
UNIX Software Environment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1–26
Digital UNIX Features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1–26
iii
Digital UNIX System Internals . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1–26
Superuser and Root Login . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1–27
Common Desktop Environment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1–27
Exercises . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1–28
Superuser and the root Login . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1–28
CDE and Superuser . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1–28
Solutions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1–29
Superuser and the root Login . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1–29
CDE and Superuser . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1–29
2 Managing Disks and File Systems
About This Chapter . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2–2
Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2–2
Objectives . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2–2
Resources . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2–2
Disk Drives . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2–4
Disk Drive Structure . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2–4
Surfaces . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2–4
Heads . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2–5
Tracks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2–5
Cylinders . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2–5
Sectors . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2–5
Disk Operation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2–5
Logical Volumes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2–6
Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2–6
Partitions and File Systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2–8
Disk Partitions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2–8
Partitions on a Disk . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2–8
Hierarchical File Systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2–8
File System and Partition Relationships . . . . . . . . . . . . . . . . . . . . . . . 2–9
Partition Tables and Disk Labels . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2–10
Deriving Disk Parameters with /etc/disktab . . . . . . . . . . . . . . . . . . . . 2–10
Viewing and Changing Partition Sizes with CDE . . . . . . . . . . . . . . . . . . . 2–12
Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2–12
Displaying the Current Partition Sizes . . . . . . . . . . . . . . . . . . . . . . . . 2–12
Configure Partitions Window . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2–14
Disk/Partition Information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2–14
Modifying a Partition . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2–17
Changing Partition Size . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2–18
Repartitioning a Disk . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2–19
Viewing and Changing Partition Sizes . . . . . . . . . . . . . . . . . . . . . . . . . . . 2–20
Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2–20
Changing Partition Sizes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2–21
Expanding a Partition . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2–22
Repartitioning a Disk . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2–24
Digital UNIX File Systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2–25
Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2–25
Virtual File System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2–25
Accessing a File Through VFS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2–26
UNIX File System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2–26
UNIX File System Layout . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2–28
MFS File System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2–28
Network File System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2–29
iv
Compact Disk File System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2–30
System Organization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2–31
Types of Files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2–31
Digital UNIX File Directory Hierarchy . . . . . . . . . . . . . . . . . . . . . . . . 2–31
Organizing System Files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2–32
Advanced File System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2–34
Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2–34
Features and Benefits . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2–34
Components . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2–35
UFS Storage Model . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2–36
AdvFS Storage Model . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2–37
File Domains . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2–38
Guidelines for File Domains . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2–39
Filesets . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2–39
Guidelines for Filesets . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2–40
Creating a UFS File System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2–41
Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2–41
Using the newfs Command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2–41
Checking a UNIX File System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2–43
When to Check File Systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2–43
Using the fsck Command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2–43
Mounting and Unmounting File Systems . . . . . . . . . . . . . . . . . . . . . . . . . 2–45
Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2–45
Using the mount Command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2–46
Using the fstab File . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2–47
Using the umount Command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2–49
Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2–51
Disk Drives . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2–51
Logical Volumes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2–51
Partitions and File Systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2–51
Viewing and Changing Partition Sizes with CDE . . . . . . . . . . . . . . . . 2–51
Viewing and Changing Partition Sizes . . . . . . . . . . . . . . . . . . . . . . . . 2–51
Digital UNIX File Systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2–52
System Organization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2–52
Advanced File System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2–53
Creating a File System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2–53
Checking a File System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2–53
Mounting a File System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2–53
Exercises . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2–54
Viewing and Changing Partition Sizes with CDE . . . . . . . . . . . . . . . . 2–54
Viewing and Changing Partition Sizes with disklabel . . . . . . . . . . . . . 2–54
Creating a File System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2–54
Checking a File System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2–54
Mounting File Systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2–54
Solutions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2–56
Viewing and Changing Partition Sizes with CDE . . . . . . . . . . . . . . . . 2–56
Viewing and Changing Partition Sizes with disklabel . . . . . . . . . . . . . 2–56
Creating a File System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2–57
Checking a File System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2–57
Mounting File Systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2–57
v
3 System Shutdown and Startup
About This Chapter . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3–2
Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3–2
Objectives . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3–2
Resources . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3–2
Shutting Down and Rebooting the System . . . . . . . . . . . . . . . . . . . . . . . . 3–3
Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3–3
Reasons for System Shutdown and Reboot . . . . . . . . . . . . . . . . . . . . . 3–3
Methods for System Shutdown . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3–4
Using the shutdown Command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3–4
Shutting Down to Single User Mode . . . . . . . . . . . . . . . . . . . . . . . . . . 3–5
Complete Shutdown . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3–7
Using the halt Command to Stop the Processor . . . . . . . . . . . . . . . . . 3–7
Using the fasthalt Command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3–8
Shutting Down to Single User Mode with init . . . . . . . . . . . . . . . . . . . 3–8
Stopping the Processor with init . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3–9
Other Methods of Shutting Down the System . . . . . . . . . . . . . . . . . . . 3–9
Rebooting the System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3–9
Using the reboot Command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3–9
Shutting Down and Rebooting the System with CDE . . . . . . . . . . . . . . . . 3–11
Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3–11
Invoking Shutdown . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3–11
Shutdown Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3–12
Shutdown Message Only . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3–13
Shutdown Reboot . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3–15
Bootstrapping a Digital UNIX System . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3–16
Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3–16
Steps in the Bootstrap Process . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3–16
Loading the Kernel . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3–16
Initializing the Kernel . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3–17
Hardware Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3–17
Creating System Processes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3–17
Single User Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3–18
Initialization Script Execution . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3–18
Multiuser Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3–19
Run Levels . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3–19
Digital UNIX Initialization Files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3–20
Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3–20
Initialization Files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3–20
Changing Run Levels . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3–21
The /etc/inittab File . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3–22
Digital UNIX /etc/inittab File . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3–23
Entries in the /etc/inittab File . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3–23
Execution of /sbin/rc*.d Files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3–24
Selected Contents of the rc*.d Directories . . . . . . . . . . . . . . . . . . . . . . 3–26
Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3–29
Shutting Down and Rebooting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3–29
Shutting Down and Rebooting with CDE . . . . . . . . . . . . . . . . . . . . . . 3–29
Bootstrapping a Digital UNIX System . . . . . . . . . . . . . . . . . . . . . . . . . 3–29
Digital UNIX Initialization Files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3–29
Exercises . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3–30
System Shutdown and Startup . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3–30
CDE Shutdown and Startup . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3–30
Booting the Digital UNIX System . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3–30
vi
Initialization Files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3–31
Solutions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3–32
System Shutdown and Startup . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3–32
CDE Shutdown and Startup . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3–32
Booting the Digital UNIX System . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3–32
Initialization Files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3–32
4 Updating System Firmware
About This Chapter . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4–2
Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4–2
Objectives . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4–2
Resources . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4–2
Firmware Systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4–3
Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4–3
Architectural View . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4–3
Console Systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4–4
Systems Reference Manual . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4–4
SRM Commands and Tasks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4–6
Advanced RISC Computing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4–7
Changing Consoles . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4–8
Firmware Version . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4–9
Update Firmware Process . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4–9
Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4–11
Digital Firmware Systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4–11
Architecture . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4–11
SRM . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4–11
ARC . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4–11
Changing Consoles . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4–11
Firmware Version . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4–12
Exercises . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4–13
Validate Version . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4–13
Solutions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4–14
Validate Version . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4–14
5 Installing the System
About This Chapter . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5–2
Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5–2
Objectives . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5–2
Resources . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5–2
Preparing for an Installation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5–3
Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5–3
Installation Media Types . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5–3
Planning Disk Space . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5–3
Planning Swap Space . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5–4
Default Installation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5–4
Custom Installation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5–5
Update Installation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5–5
Hardware Required for Installation . . . . . . . . . . . . . . . . . . . . . . . . . . . 5–6
Booting from the Media . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5–6
Common Desktop Installation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5–7
Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5–7
Common Desktop Environment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5–8
vii
Default Installation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5–8
Common Setup Features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5–9
Custom Installation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5–11
View Software . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5–12
Partition Disks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5–13
UNIX Shell . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5–15
Creating the Operating System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5–15
Booting the New Operating System . . . . . . . . . . . . . . . . . . . . . . . . . . . 5–16
Kernel Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5–17
Post Installation Login and Setup . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5–18
Performing an Update Installation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5–20
Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5–20
Update Install File Types . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5–20
Characteristics of an Update Installation . . . . . . . . . . . . . . . . . . . . . . 5–21
Update Installation Procedure . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5–21
Update Administration Utility . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5–24
upadmin Main Menu . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5–24
Customized System File Admin Menu . . . . . . . . . . . . . . . . . . . . . . . . . 5–25
Saving Files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5–25
Deleting Files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5–26
Viewing Files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5–26
Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5–27
Preparing for an Installation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5–27
Installation Setup . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5–27
Performing an Update Installation . . . . . . . . . . . . . . . . . . . . . . . . . . . 5–27
Exercises . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5–28
Installation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5–28
Solutions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5–29
Installation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5–29
6 Connecting to the Network
About This Chapter . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6–2
Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6–2
Objectives . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6–2
Resources . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6–2
Introducing UNIX Networking . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6–3
Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6–3
UNIX Networking . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6–3
Introducing Internet Gateways . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6–5
Gateway Connects Networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6–5
Using Internet Addressing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6–6
Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6–6
Internet Addresses . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6–6
Internet Address Classes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6–7
Sample Internet Addresses . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6–7
Ethernet Addresses . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6–8
Using Subnetwork Addresses . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6–9
Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6–9
Subnetworks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6–9
Broadcast Addresses . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6–10
TCP/IP Files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6–12
Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6–12
Hosts File . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6–12
viii
Trusted Hosts File . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6–13
Lineprinter Daemon File . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6–14
Internet Daemon Configuration File . . . . . . . . . . . . . . . . . . . . . . . . . . 6–14
Networks File . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6–15
Protocols File . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6–15
Services File . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6–16
Setting Up and Managing a TCP/IP Network Using CDE . . . . . . . . . . . . 6–17
Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6–17
Starting Network Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6–17
Configuring an Interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6–18
Adding or Modifying Information in /etc/hosts . . . . . . . . . . . . . . . . . . . 6–21
Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6–24
Introducing UNIX Networking . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6–24
Introducing Internet Gateways . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6–24
Using Internet Addressing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6–24
Using Subnetwork Addresses . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6–24
TCP/IP Files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6–25
Setting Up and Managing a TCP/IP Network Using CDE . . . . . . . . . 6–25
Exercises . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6–26
Internet Files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6–26
Setting Up and Managing a TCP/IP Network Using CDE . . . . . . . . . 6–26
Solutions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6–27
Internet Files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6–27
Setting Up and Managing a TCP/IP Network Using CDE . . . . . . . . . 6–27
7 Loading and Licensing Software
About This Chapter . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7–2
Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7–2
Objectives . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7–2
Resources . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7–2
Loading and Unloading Software Subsets . . . . . . . . . . . . . . . . . . . . . . . . . 7–3
Preparing to Load Software . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7–3
Using the setld Command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7–3
Displaying Software Subsets . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7–4
Software Subset Display Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . 7–4
Loading Software Subsets . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7–5
Deleting a Software Subset . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7–8
Licensing Your Software . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7–9
Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7–9
Types of Licenses . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7–9
A Sample PAK . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7–9
Using the lmf Command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7–11
Using lmf to Register a License . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7–12
Using lmfsetup to Register a License . . . . . . . . . . . . . . . . . . . . . . . . . 7–12
Using the CDE License Manager . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7–14
Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7–14
Starting the CDE License Manager . . . . . . . . . . . . . . . . . . . . . . . . . . 7–14
Using the License Manager . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7–15
Using Edit List . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7–16
Using Edit New . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7–16
Using File Open . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7–17
Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7–20
Loading and Unloading Software Subsets . . . . . . . . . . . . . . . . . . . . . . 7–20
ix
Licensing Your Software . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7–20
Using the CDE License Manager . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7–20
Exercises . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7–21
Loading Software Subsets . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7–21
Checking Software Subsets . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7–21
Deleting Software Subsets . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7–22
Licensing Your Software . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7–22
Using CDE License Manager . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7–22
Solutions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7–23
Loading Software Subsets . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7–23
Checking Software Subsets . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7–23
Deleting Software Subsets . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7–23
Licensing Your Software . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7–24
Using CDE License Manager . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7–25
8 Configuring the Kernel
About This Chapter . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8–2
Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8–2
Objectives . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8–2
Resources . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8–2
Building a New Kernel . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8–3
Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8–3
System Configuration File . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8–4
Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8–4
Global Keywords . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8–5
Changing Parameters for Performance . . . . . . . . . . . . . . . . . . . . . . . . 8–5
System Definition Keyword . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8–6
Options Keyword Definitions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8–6
Makeoptions Keyword Definitions . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8–6
Pseudodevice Keyword Definitions . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8–6
Building a Static Kernel . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8–10
Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8–10
Using the doconfig Program . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8–10
Configuring the System Dynamically . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8–12
Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8–12
Loading a Subsystem . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8–12
Unloading a Subsystem . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8–12
Querying Subsystem State . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8–13
Subsystem Type . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8–14
Automatically Configured Subsystems . . . . . . . . . . . . . . . . . . . . . . . . . 8–14
Modifying System Attributes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8–15
Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8–15
Subsystem Attribute Values . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8–15
Identifying Dynamic Values . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8–16
Modifying Attributes at Run Time . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8–16
Subsystem Attributes Database . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8–17
Updating Attributes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8–17
Removing Attributes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8–17
List Attributes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8–17
Deleting Attributes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8–17
Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8–18
Building a New Kernel . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8–18
System Configuration File . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8–18
x
Building a Static Kernel . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8–18
Dynamic System Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8–18
Modifying System Attributes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8–18
Exercises . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8–19
System Configuration File . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8–19
Building a Static Kernel . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8–19
Dynamically Configure the Kernel . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8–19
Modifying a Running Kernel . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8–19
Persistent Changes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8–19
Solutions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8–20
System Configuration File . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8–20
Building a Static Kernel . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8–20
Dynamically Configure the Kernel . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8–20
Modifying a Running Kernel . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8–20
Persistent Changes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8–21
9 Configuring Peripherals
About This Chapter . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9–2
Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9–2
Objectives . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9–2
Resources . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9–3
Device Files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9–4
Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9–4
Configuring Terminals . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9–7
Configuring Terminals . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9–7
Configuring Pseudoterminals . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9–8
LAT Terminal Servers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9–9
Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9–9
Adding Terminals on a Terminal Server . . . . . . . . . . . . . . . . . . . . . . . . . . 9–10
Configuring LAT Devices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9–10
Running latsetup . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9–10
Controlling the LAT Service . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9–12
Configuring Disk and Tape Drives . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9–13
Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9–13
DDR Operations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9–13
Configuring a Printer with CDE Printer Configuration . . . . . . . . . . . . . . . 9–14
Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9–14
Using the CDE Printer Configuration . . . . . . . . . . . . . . . . . . . . . . . . 9–14
CDE Printer Configuration Options . . . . . . . . . . . . . . . . . . . . . . . . . . 9–15
Configuring a Remote Printer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9–15
The Advanced... Button . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9–16
The /etc/printcap File . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9–17
Configuring a Local Printer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9–18
Local Printer /etc/printcap . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9–20
Managing the Print System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9–21
How Printing Works . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9–21
Print System Control Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9–22
Using the lptest Command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9–22
Using the lpc Command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9–23
Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9–26
Device Files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9–26
Configuring Terminals . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9–26
LAT Terminal Servers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9–26
xi
Adding Terminals on a Terminal Server . . . . . . . . . . . . . . . . . . . . . . . 9–26
Configuring Disks and Tape Drives . . . . . . . . . . . . . . . . . . . . . . . . . . . 9–26
Configuring a Printer with the CDE Printer Configuration . . . . . . . . . 9–27
Managing the Print System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9–27
Exercises . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9–28
Device Files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9–28
Configuring Terminals . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9–28
Adding Terminals on a Terminal Server . . . . . . . . . . . . . . . . . . . . . . . 9–28
Dynamic Device Recognition . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9–28
Adding a Printer with CDE Printer Configuration . . . . . . . . . . . . . . . 9–28
Managing the Print System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9–29
Solutions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9–30
Device Files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9–30
Configuring Terminals . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9–30
Adding Terminals on a Terminal Server . . . . . . . . . . . . . . . . . . . . . . . 9–31
Dynamic Device Recognition . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9–31
Adding a Printer with CDE Printer Configuration . . . . . . . . . . . . . . . 9–31
Managing the Print System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9–31
Index
Examples
2–1 Root Directory . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2–10
2–2 An /etc/disktab File . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2–11
2–3 Displaying the Disk Label . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2–20
2–4 Expanding a Partition . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2–23
2–5 Using the newfs Command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2–42
2–6 Invoking the fsck Command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2–44
2–7 Using the mount Command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2–47
2–8 An /etc/fstab File . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2–48
2–9 Using the umount Command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2–49
2–10 Mounting and Unmounting File Systems . . . . . . . . . . . . . . . . . . . . . . 2–49
3–1 Typical Multiuser Mode ps Output . . . . . . . . . . . . . . . . . . . . . . . . . . . 3–6
3–2 Typical Single User ps Output . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3–7
3–3 Digital UNIX /etc/inittab File . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3–23
3–4 An /sbin/rc2 File . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3–25
3–5 Selected Contents of the rc*.d Directories . . . . . . . . . . . . . . . . . . . . . . 3–26
5–1 Creating the Operating System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5–16
5–2 Update Installation Log . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5–21
7–1 Listing Software Subsets with setld . . . . . . . . . . . . . . . . . . . . . . . . . . 7–5
7–2 Loading Software Subsets with setld . . . . . . . . . . . . . . . . . . . . . . . . . . 7–6
7–3 Removing a Software Subset with setld . . . . . . . . . . . . . . . . . . . . . . . 7–8
7–4 A Sample PAK . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7–10
7–5 Using the lmfsetup Command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7–13
8–1 Alpha AXP System Configuration File . . . . . . . . . . . . . . . . . . . . . . . . . 8–8
8–2 Building a Kernel with the doconfig Program . . . . . . . . . . . . . . . . . . . 8–10
9–1 The /dev Directory . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9–4
9–2 Using the latsetup Utility . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9–10
xii
9–3 Using the lptest Command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9–23
9–4 Using the lpc Command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9–25
Figures
1 Course Map . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xxiii
1–1 System Manager Responsibilities . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1–4
1–2 UNIX Layers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1–6
1–3 Logging In to a Terminal . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1–11
1–4 PID/PPID Numbers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1–12
1–5 Front Panel . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1–18
1–6 System Management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1–19
1–7 Configuration Manager . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1–20
1–8 DailyAdmin . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1–21
1–9 System Information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1–22
1–10 Monitoring and Tuning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1–23
1–11 Storage Management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1–24
1–12 Tools . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1–25
2–1 Disk Drive Structure . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2–4
2–2 Functional View of Logical Volumes . . . . . . . . . . . . . . . . . . . . . . . . . . 2–7
2–3 Overlapping Disk Partitions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2–8
2–4 File System Hierarchy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2–9
2–5 Navigating to the Disk Configuration Window . . . . . . . . . . . . . . . . . . 2–12
2–6 Disk Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2–13
2–7 Configure Partitions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2–14
2–8 Disk Geometry . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2–15
2–9 Partition Table . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2–16
2–10 Partition Size . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2–17
2–11 Partition Bar Graph . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2–18
2–12 Result of Partition Changes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2–19
2–13 Expanding a Partition . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2–22
2–14 File System Interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2–25
2–15 Accessing a File Through VFS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2–26
2–16 Small Blocks Require More Overhead . . . . . . . . . . . . . . . . . . . . . . . . . 2–27
2–17 Large Blocks Waste Space . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2–27
2–18 Large Blocks and Small Fragments . . . . . . . . . . . . . . . . . . . . . . . . . . . 2–27
2–19 UNIX File System Layout . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2–28
2–20 Remote Mounting with NFS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2–30
2–21 Digital UNIX System Directory Hierarchy . . . . . . . . . . . . . . . . . . . . . 2–32
2–22 UFS Storage Model . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2–36
2–23 AdvFS Storage Model . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2–37
2–24 File Migration in AdvFS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2–38
2–25 File Domain . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2–38
2–26 Filesets . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2–39
2–27 File Systems Before Mounting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2–45
2–28 File Systems After Mounting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2–46
3–1 Overview of System Shutdown and Reboot . . . . . . . . . . . . . . . . . . . . . 3–4
xiii
3–2 Shutdown Selection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3–11
3–3 Shutdown Window . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3–12
3–4 Shutdown Options Selection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3–13
3–5 Warning Users of Shutdown . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3–14
3–6 Shutdown Reboot . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3–15
3–7 Overview of Digital UNIX Initialization Files . . . . . . . . . . . . . . . . . . . 3–21
4–1 Console Interfaces . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4–4
4–2 Console Initialization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4–5
5–1 Initiating an Installation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5–7
5–2 Status Window . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5–8
5–3 Default Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5–9
5–4 Ready, Set, Go . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5–10
5–5 Custom Installation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5–11
5–6 Selecting Software . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5–12
5–7 Disk Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5–14
5–8 Configure Partitions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5–15
6–1 Exchanging a Message on a UNIX Network . . . . . . . . . . . . . . . . . . . . 6–4
6–2 Gateway Connecting Two Networks . . . . . . . . . . . . . . . . . . . . . . . . . . . 6–5
6–3 Internet Address Classes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6–7
6–4 Subnet Address . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6–9
6–5 Subnetworks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6–10
6–6 Broadcast Addresses . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6–11
6–7 Invoking the Network Configuration Manager . . . . . . . . . . . . . . . . . . 6–18
6–8 Network Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6–19
6–9 Configuring Ethernet Interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6–20
6–10 Optional IFCONFIG Flags . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6–21
6–11 Host File . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6–22
6–12 Hosts Dialog Box . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6–23
7–1 CDE License Manager . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7–14
7–2 Minimum Licenses . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7–15
7–3 List a License . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7–16
7–4 Edit New Option . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7–17
7–5 File Open option . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7–18
7–6 PAK in User File . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7–19
9–1 Providing Access for Terminals and Printers . . . . . . . . . . . . . . . . . . . . 9–9
9–2 Starting Printer Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9–14
9–3 Printer Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9–15
9–4 Remote Printer Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9–16
9–5 Advanced Remote Printer Settings Window . . . . . . . . . . . . . . . . . . . . 9–17
9–6 Local Printer Settings Window . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9–18
9–7 Advanced Local Printer Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9–19
xiv
Tables
1 Conventions Used in This Course . . . . . . . . . . . . . . . . . . . . . . . . . . . . xxvi
1–1 System Manager Tasks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1–5
1–2 Root Login Comparisons . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1–16
2–1 Types of Files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2–31
2–2 UNIX System Directory Hierarchy . . . . . . . . . . . . . . . . . . . . . . . . . . . 2–33
2–3 AdvFS Features and Benefits . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2–34
3–1 shutdown Command Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3–5
3–2 halt Command Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3–7
3–3 fasthalt Command Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3–8
3–4 reboot Command Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3–10
3–5 The /etc/inittab File Action Field . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3–22
4–1 Administrator Tasks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4–6
4–2 ARC Console Menu . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4–8
4–3 DEC 2000 AXP Outline Example . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4–10
6–1 Parts of an Internet Address . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6–6
6–2 TCP/IP Network Files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6–12
7–1 Load Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7–6
7–2 CDE License Manager VS LMF Commands . . . . . . . . . . . . . . . . . . . . 7–20
8–1 Global Keywords . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8–5
9–1 Print System Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9–22
9–2 Line Printer Control Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9–24
xv
About This Course
xvii
About This Course
About This Course
Introduction The Digital UNIX System Administration course is designed for
those individuals who will be managing and operating a Digital
UNIX system.
Your Course Guide presents a number of topics on system
administration, and provides pointers to documentation and
additional references. Textual information is interspersed with
lab activities to allow you to practice what you have learned.
The Course Guide is divided into chapters designed to cover a
single topic or group of related topics. The chapters are divided
into smaller units that cover a more limited topic or subtopic.
Examples are provided to demonstrate concepts.
This preface describes the contents of the course, suggests ways in
which you can most effectively use the materials, and sets up the
conventions for the use of terms in the course. It includes:
• Course description — a brief overview of the course contents
• Target audience — who should take this course
• Prerequisites — the skills and knowledge needed to ensure
your success in this course
• Course goals and nongoals — what skills or knowledge the
course will and will not provide
• Chapter organization — the structure of each chapter
• Course map — the sequence in which you should cover each
chapter
• Chapter descriptions — brief descriptions of each chapter
• Course conventions — explanation of symbols and signs used
throughout this course
• Resources — documentation and books to help you successfully
complete this course
Course
Description
This course describes the tasks that a system manager needs to
perform to get a UNIX operating system installed and ready for
users, including such responsibilities as:
• Installing operating system software
• Managing and maintaining file systems
• Customizing the system kernel
• Configuring peripheral devices
• Managing user accounts
• Performing system backups
• Monitoring system activity
xviii
About This Course
• Troubleshooting system problems
This course is designed to lead you through the tasks you must
perform as the manager of a Digital UNIX system. The format
of presenting information followed by exercises gives you the
practice you need to understand the course material.
Target
Audience
This course is designed for individuals with some experience in
a UNIX® environment, who will be managing a Digital UNIX
system.
Prerequisites To get the most from this course, students should be able to:
• Log in to a UNIX system
• Use an editor on the system
• Manage files and directories
• Use the Common Desktop Environment to manage files and
programs
• Move within the UNIX File System
• Use nonprivileged commands
• Write and debug simple shell programs
These prerequisites can be satisfied by taking the following
course:
• UNIX Utilities and Commands lecture/lab or self-paced course
® UNIX is a registered trademark in the United States and other countries
licensed exclusively through X/Open Company Ltd.
xix
About This Course
Course Goals To set up and manage a Digital UNIX system, you should be able
to:
• Identify system management responsibilities
• Identify components of UNIX systems
• Install the operating system
• Shut down and boot the system
• Create and manage file systems
• Configure devices: terminals, disk drives, tape drives, printers
• Add and remove users on the system
• Back up and restore files and file systems
• Load and license optional software
• Monitor system performance
• Join and maintain membership in a local area network
• Describe some popular network services
This course introduces UNIX networking services and
demonstrates how to configure a system on a TCP/IP network.
It does not cover network design, troubleshooting, or network
services installation. Students needing these skills should take
the Network Management course.
Nongoals This course does not cover the following topics:
• UNIX basic utilities and commands
• Hardware installation and configuration
• Network services setup
• Network design, internals, or troubleshooting
• Programming
• Multisystem security
• Core dump analysis
• Cluster software
UNIX System
Administration
Curriculum
This course is the first course in the UNIX system administration
curriculum. It has the prerequisite of experience using a
UNIX system. This course is the prerequisite for several other
administration courses:
• Digital UNIX Network Administration
This course is designed for students who will be managing
a UNIX network (which includes a Digital UNIX system),
who want to increase their knowledge of Digital UNIX
networking. This includes configuration and management
of TCP/IP networking, NFS, NIS, BIND, Bootp, DHCP,
dataless configurations, LAT, remote installation, SNMP,
xx
About This Course
and SLIP/PPP. The course demonstrates how to set up and
manage Digital UNIX networks using the Common Desktop
Environment (CDE), the new standard graphical user interface
for UNIX systems.
• Digital UNIX Security Management
This course is designed for individuals with experience
managing a Digital UNIX operating system, who are
interested in learning how to recognize and address security
threats in the base security level of the Digital UNIX
environment. Course topics include security terms, threats,
security holes, installing and configuring a secure base level
Digital UNIX system, managing a secure system, and base
level and enhanced security auditing.
• Digital UNIX Performance Management
This course is designed for individuals with experience
managing a Digital UNIX operating system, who are
interested in maximizing the performance on their systems.
Course topics include factors that affect system performance,
monitoring and identifying system bottlenecks, and system
tuning.
• Managing Digital UNIX Using the Advanced File System
(AdvFS), Logical Storage Manager (LSM), and Redundant
Arrays of Inexpensive Disks (RAID)
This courses describes advanced Digital UNIX system
management tasks that system administrators need to
perform to fully utilize the more sophisticated Digital UNIX
functionality, particularly, the Advanced File System (AdvFS),
Logical Storage Manager (LSM), and Redundant Arrays of
Inexpensive Disks (RAID).
• DECsafe Available Server Environment Configuration and
Management
This course describes in detail how to plan, install,
configure, test and troubleshoot a DECsafe Available Server
Environment (ASE).
• TruCluster Software Configuration and Management
This course describes in detail how to install the hardware and
software components and how to set up TruCluster Software
highly available services.
xxi
About This Course
Chapter
Organization
This course is divided into 16 chapters. Each chapter covers a
skill or related group of skills required to fulfill the course goals.
In this course, each chapter consists of:
• An introduction to the subject matter of the chapter.
• One or more objectives that describe the goals of the chapter.
• A list of resources, or materials for further reference. Some
of these manuals are included with your course materials.
Others may be available for reference in your classroom or lab.
• The text of each chapter, which includes outlines, tables,
figures, and examples.
• The summary includes a brief review of the topics presented
in the chapter.
• Lab Exercises enable you to practice your skills and to
measure your mastery of the information in the chapter.
A test is provided for student self-assessment. It allows you to
measure whether or not the learning objectives were achieved.
Course Map The course map shows how each chapter is related to other
chapters and to the course as a whole. Before studying a chapter,
you should master all of its prerequisite chapters. The course map
shows the current chapters and the order in which they should
be presented. The direction of the arrows determine the order in
which the chapters should be studied, from bottom to top.
xxii
About This Course
Figure 1 Course Map
SystemShutdown
andStartup
Archiving
Configuring
Peripherals
ZKOX−055000111−01−RGS
Monitoring
theSystem
InstallingtheSystem
ManagingDisksand
FileSystems
UpdatingSystem
Firmware
Loadingand
LicensingSoftware
Kernel
Configuringthe
UserEnvironment
Managingthe
UsingDECevent
IntroducingUNIX
SystemManagement
IntroducingSMP,
Connectingto
aNetwork
LSM,andClusters
Introducing
NetworkServices
xxiii
About This Course
Chapter
Descriptions
The following list summarizes the contents of each chapter.
• Introducing UNIX System Management — provides an
overview to system hardware and operating system software,
their components and functions; describes the responsibilities
of a system manager and the privileges of the superuser or
root account.
• Managing Disks and File Systems — discusses disk drives
and their physical and logical structure, the different file
systems, reviews file types and major directories in an OSF/1
system; discusses the steps to add a file system: create, check,
and mount, using standard tools.
• System Shutdown and Startup — demonstrates the UNIX
shutdown, halt and reboot commands, provides instructions on
how to boot a Digital UNIX system, and provides background
on what happens on the system as it boots.
• Updating System Firmware — discusses the underlying
principles of the firmware operating system, as well as the
consoles required to support multiple operating systems.
• Installing the System — describes the planning and
procedures necessary to install a Digital UNIX operating
system.
• Connecting to the Network — discusses UNIX, or Internet
networking, including Internet addressing and the files needed
to configure the network; demonstrates netconfig to perform
the configuration.
• Loading and Licensing Software — demonstrates use
of the Digital UNIX software loading utility, setld, to
manage the software subset inventory, and load and unload
software subsets; demonstrates the use of the Digital License
Management Facility to control access to software.
• Configuring the Kernel — describes the system
configuration file, how to modify the system configuration,
when to build a new kernel, use of the doconfig shell script
to build a kernel automatically, and how to use the make
command to build a kernel manually.
• Configuring Peripherals — describes how to add terminals,
add pseudoterminals, disk and tape drives, and set up and test
printers.
• Archiving — addresses the issue of protecting user data from
accidental loss by backing up the data. A new NetWorker
SingleServer Save and Restore application is presented which
backs up and recovers files and file systems.
• Managing the User Environment — discusses the user
account files passwd and group and demonstrates how to create,
modify, and remove user accounts on the system; shows how
xxiv
About This Course
to manage processes running on the system and manage user
disk space.
• Monitoring the System — discusses useful tools and utilities
to monitor the system and diagnose system problems.
• Using DECevent — describes the replacement utility for
UERF on Alpha systems. This new utility has interfaces for
command line, online display and a GUI.
• Introducing SMP, LSM and Clusters — presents an
overview of symmetric multiprocessing, Digital UNIX cluster
products and the Logical Storage Manager.
• Introducing Network Services — describes network
services: DECnet network, NFS service, NIS (YP), the Domain
Name Service, and Remote Installation Service.
xxv
About This Course
Course
Conventions
Table 1 gives an explanation of the conventions used in this
course.
Table 1 Conventions Used in This Course
Convention Meaning
keyword Keywords and new concepts are displayed in this
type.
examples Examples, commands, options and pathnames
appear in this type.
command(x) Cross-references to command documentation
include the section number in the reference
pages. For example, fstab(5) means fstab is
referenced in Section 5.
$ A dollar sign represents the user prompt.
# A number sign represents the superuser prompt.
bold Within interactive examples, boldface type
indicates user input.
key The box symbol indicates that the named key on
the keyboard is pressed.
.
.
.
In examples, a vertical ellipsis indicates that not
all of the lines of the example are shown.
[ ] In syntax descriptions, brackets indicate items
that are optional.
variable In syntax descriptions, this type indicates items
that are variable.
.
.
.
In syntax descriptions, an ellipsis indicates the
item may be repeated.
xxvi
About This Course
Resources Students should use the following manuals and books as
references for this course:
• Your Digital UNIX system management documentation
Digital UNIX Operating System, Version 4.0 Software
Product Description
Release Notes
Technical Overview
System Administration
Digital UNIX Installation Guide
Network Administration
DEC Verifier and Exerciser Tool User’s Guide
• Maurice Bach, (c) 1986, The Design of the UNIX Operating
System, Prentice-Hall, ISBN 0-13-201799-7
• Douglas Comer, (c) 1991, Internetworking with TCP/IP,
Volume I, Prentice-Hall, ISBN 0-13-468505-9
• Leffler, McKusick, Karels, and Quarterman, (c) 1989, The
Design and Implementation of the 4.3BSD UNIX Operating
System, Addison-Wesley, ISBN 0-201-06196-1
• Nemeth, Snyder, & Seebass, (c) 1989, UNIX System
Administration Handbook, Prentice-Hall, ISBN 0-13-933441-6
• (c) 1991, Guide to OSF/1: A Technical Synopsis, O’Reilly &
Associates
xxvii
1
Introducing UNIX System Management
Introducing UNIX System Management 1–1
About This Chapter
About This Chapter
Introduction The system manager is the person behind-the-scenes of any
computer site. Few users are aware of exactly how much
the system manager does to make their login sessions easier.
This chapter discusses the responsibilities of the system
manager, which, though sometimes complicated, are really not so
mysterious.
Overall, a system manager is responsible for creating a smooth
system environment. This includes providing the system tools
users need to do their jobs, and keeping system performance at a
high level. To accomplish these goals, a system manager must be
knowledgeable about the system from both software and hardware
aspects. Only in this way can you match the responsiveness of
your current system to the needs of the people using it.
This chapter is an introduction to managing a UNIX system.
It provides an overview to operating system software — their
components and functions. It describes the responsibilities of a
system manager and the privileges of the superuser or root
account. Finally, it demonstrates how to become the root user.
Major topics discussed in this chapter are:
• System manager responsibilities
• Hardware that makes up this system
• Software environment of the operating system
• Internal functioning of the operating system
• Use of the Common Desktop Environment (CDE)
Objectives To describe the role of the system administrator and the UNIX
system, you should be able to:
• Identify system manager responsibilities
• Describe the role of the UNIX operating system and its
components
• Describe the Digital UNIX features
• Describe internal operating system functions related to system
management
• Describe the superuser and the root login procedure
• Describe the Common Desktop Environment (CDE) interface
1–2 Introducing UNIX System Management
About This Chapter
Resources For more information on the topics in this chapter, see the
following:
• Nemeth, Snyder, & Seebass, (c) 1989, UNIX System
Administration Handbook, Prentice-Hall, ISBN 0-13-933441-6,
Chapters 1 and 3 describe system manager duties and
privileges
• Leffler, McKusick, Karels, and Quarterman, (c) 1989, The
Design and Implementation of the 4.3BSD UNIX Operating
System, Addison-Wesley, ISBN 0-201-06196-1, Describes the
internal functions of the BSD based UNIX operating system
• Maurice Bach, (c) 1986, The Design of the UNIX Operating
System, Prentice-Hall, ISBN 0-13-201799-7, Describes the
internal functions of the System V based UNIX operating
system
• Digital UNIX Operating System, Version 4.0 Software Product
Description
• Guide to OSF/1: A Technical Synopsis, (c) 1991, O’Reilly &
Associates
• The Design of the OSF/1 Operating System, Open Software
Foundation, Prentice-Hall
Introducing UNIX System Management 1–3
System Manager Responsibilities
System Manager Responsibilities
Overview Every computer site designates a person to be responsible for
the day-to-day operation of the computer system, including both
software and hardware. This person is known as the system
manager or system administrator.
A site following the security guidelines of the US Department
of Defense (DoD) Orange Book will divide these responsibilities
between a system administrator and a security administrator.
A large site may have a number of system operators to assist the
system manager with the tasks.
Some of these tasks are visible to users and, in fact, directly
benefit them, such as creating user logins. Others are less obvious
but no less important, such as storing copies of user files on tape
for future use.
Figure 1–1 System Manager Responsibilities
Install and Configure
the System
Assist Users
Shut Down and
Start Up System
Manage Disk Space
Maintain Archives Control User Access
Monitor the System
Troubleshoot
System Manager
ZKOX−055000111−02−RGS
The system manager needs special privileges to perform
specialized tasks that affect the running of a system.
The tasks of the system manager are described briefly in the
following table.
1–4 Introducing UNIX System Management
System Manager Responsibilities
Table 1–1 System Manager Tasks
Task Description
Install and configure
the system
Installs distribution kit containing new software or software
updates
Configures the kernel or devices
Shut down and start up
the system
Shuts down and starts up a system to perform maintenance
Control user access Adds new users to the system’s user login and group files;
modifies or deletes changed accounts
Maintains an appropriate level of security on the system
Manage disk space Maintains the file systems, checks disk usage and, if
necessary, establishes disk quotas
Maintain archives Provides an archive of user files and a continuity of
information through the use of system backup and restore
facilities
Monitor the system Tracks system activity through online accounting procedures
to determine how effectively system resources are being used
Troubleshoot the system Identifies and resolves routine system problems involving
hardware and software; repairs damaged file systems
Assist users Much of a system manager’s day can be filled with user
application problems and answering user’s questions
Introducing UNIX System Management 1–5
UNIX Software Environment
UNIX Software Environment
Overview An operating system can be viewed as a resource management
program. Its primary purpose is to manage hardware and
software resources in a way to maximize work capacity and
productivity of the system.
The UNIX operating system is often depicted as a series of layers,
as shown in Figure 1–2.
Figure 1–2 UNIX Layers
Hardware
Device Drivers
Kernel
Shell
Application Programs
ZKO−060000135−50−RGS
The hardware is at the center. The operating system is the
interface between the user process and the hardware.
The UNIX kernel is minimized to provide those features that
can only be performed within the operating system. If special
system privileges are not needed, those operations will be done by
auxiliary programs external to the kernel.
The Digital UNIX operating system takes this one step further by
breaking the kernel into two layers. The inner layer is the Mach
operating system kernel; the outer layer adds UNIX services.
Theoretically, this outer layer could be replaced by a layer
providing some other operating system services.
1–6 Introducing UNIX System Management
UNIX Software Environment
When the system is running, the kernel is in main memory. The
kernel is responsible for:
• Process control and scheduling
• Memory management
• Device I/O
• System error handling
The shell surrounds the kernel and acts as a user interface. It
handles:
• Foreground and background execution
• Pipes and filters
• Configurable environment
• Flexible command language
• I/O redirection
The Kernel The UNIX kernel is the central controlling program that provides
basic system facilities.
• The Digital UNIX kernel is the executable file /vmunix.
• It is compiled from source files, object files and configurable
parameters.
• It is loaded into memory when the system boots.
• It runs programs and manages resources.
Once kernel initialization is complete and the various system
daemons have been created and made runnable, the kernel waits
for requests:
• User programs requesting services from the kernel through
system calls
• Hardware devices getting kernel response through interrupts
The kernel manages system resources, such as memory, the CPU,
and devices for user processes. When you run a program, the
UNIX operating system creates a process to handle it.
Introducing UNIX System Management 1–7
Digital UNIX Features
Digital UNIX Features
Digital UNIX
Components
The Digital UNIX operating system is a 64-bit advanced kernel
architecture based on Carnegie Mellon University’s Mach V2.5
operating system kernel. It includes components from Berkeley
Software Distribution (BSD) 4.3 and 4.4, System V, and other
sources. The result is a simple, extensible kernel that was
designed for parallel and distributed environments.
The STREAMS facility makes it possible to write flexible, modular
device drivers and is compatible with SVR4 STREAMS.
The extensible run-time loader provides shared library support,
support for memory mapped files, and dynamic module loading.
Dynamically loading modules into an already running program
enables device drivers and other system code to be loaded into a
kernel without rebuilding or rebooting the system. The loader can
also be extended to support multiple object module formats.
The command set comes from the AIX operating system and is
based on commands from BSD and System V operating systems.
Digital UNIX
Features
Digital UNIX is based on OSF/1 R1.0, R1.1, and R1.2 technology,
and the Motif R1.2.3 graphical user interface and programming
environment. It provides numerous features to assist application
programmers, including:
• Symmetric Multiprocessing (SMP)
Enables systems containing two or more processors to execute
the same copy of the operating system and access common
memory.
• Multithread Support
DECthreads provides a pthreads interface that complies with
both the POSIX and DCE semantics.
• Realtime Support
Provides a kernel option to enhance the performance of
realtime applications conforming to the POSIX standard.
• Shared Libraries
Provides a full complement of dynamic shared libraries based
on System V semantics.
• Memory Mapped Files
Supports the Berkeley mmap function that allows an application
to access data files with memory operations rather than file
input and output operations.
• Full features of the X Window System, Version 11, Release
6(X11R6). Provides X Window Display, X Window System
Application Interface and Terminal Interfaces.
1–8 Introducing UNIX System Management
Digital UNIX Features
• Supports terminal servers using the LAT protocol.
• Provides a number of scripts and GUI tools for system
management tasks.
Digital UNIX complies with numerous standards and industry
specifications including:
• The X/Open XPG4 and XTI
• POSIX, FIPS and System V Interface Definition (SVID)
Digital UNIX is compatible with Berkeley 4.3 and System V
programming interfaces. It conforms with the OSF Application
Environment Specification (ASE) that specifies an interface for
developing portable applications that will run on a variety of
hardware platforms.
File System
Support
Digital UNIX supports the following file system types:
• POLYCENTER Advanced File System (AdvFS)
A journaled local file system that provides higher availability
and greater flexibility that traditional UNIX file systems.
• UNIX File System (UFS)
Compatible with Berkeley 4.3 Tahoe release.
• Network File System (NFS)
Allows transparent file access over TCP/IP networks
• Memory File System (MFS)
Provides the same file system structure as UFS, but resides in
virtual memory.
• ISO 9660 Compact Disk File System (CDFS)
A standard for volume and file structure for the interchange of
information using CD–ROM.
• File-on-File Mounting File System (FFM)
Allows regular, character, or block-special files to be mounted
over regular files (used primarily by SVR4).
• /proc File System
Allows running processes to be accessed and manipulated as
files by ordinary system calls (compatible with SVR4).
• /dev/fd File System (FDFS)
A pseudo-file system layered beneath the virtual file system
(UFS).
Introducing UNIX System Management 1–9
Digital UNIX System Internals
Digital UNIX System Internals
Overview To ensure the smooth operation of your Digital UNIX system,
you should have some knowledge of the internal workings of
UNIX. The following topics will help you to better understand the
functions of your system.
• User process creation
• Daemons
• Scheduling and priority
• Paging and swapping
• Block versus character I/O
User Process
Creation
A program is an executable file, and a process is an instance
of the program in execution. The kernel (/vmunix), the C shell
csh and the vi editor are all programs. Two users can run the
vi editor simultaneously (that is, two independent processes
using one program). A process can create another process using
the fork(2) system call. The process that invokes the fork is
the parent process and the newly created process is the child
process.
When the system starts up (boots), the kernel is copied into
memory and initialized. The kernel creates the init process. init
is the ancestor of all user shells. It creates a process for each
terminal port, and calls /etc/getty(8) to put a login message on
the terminal. /etc/getty reads in the username and calls login to
log in, or verify the user and execute the user shell.
Unlike traditional single-threaded UNIX processes, Digital
UNIX processes can be multithreaded. Multithreading and other
parallelization are integral to the Mach kernel of the Digital
UNIX operating system. Multiple threads can share an address
space, file descriptors, and so forth. Therefore, threads require
very little system overhead and provide improved performance.
Note
Further information on threads can be found in the Guide
to DECthreads.
When a user responds to the login prompt by entering his or her
user name:
1. getty reads the user name and invokes /bin/login(1), passing
the user name.
2. login prompts for the password, verifies the user, and invokes
the shell listed in /etc/passwd.
1–10 Introducing UNIX System Management
Digital UNIX System Internals
3. The shell interprets all user commands.
When the user logs out, init updates the login history file
/var/adm/wtmp and creates a new getty process listening on that
port.
The following figure illustrates the sequence of events for a user
logging in to the Digital UNIX system from a terminal.
Figure 1–3 Logging In to a Terminal
"program"
init
init getty login ksh
ksh
pid 2345pid 2345
exit()
exec()
wait() => 2345
exit()
exec()
fork()=2345
fork()=1234
pid 1 wait()=>1234
Terminal Login
ZKO−060000135−43−RGS
exit()exit()exit()
exec() exec()pid 1234pid 1234 pid 1234
Daemon
Processes
Another type of process is the daemon; daemon processes are not
associated with any users but perform system functions, such as
printer spooling, network control and time-dependent activities.
Many daemons are started when the system boots.
Process
Environment:
Scheduling and
Priority
UNIX is a timesharing system; it allows many processes to run
at the same time.
The kernel identifies each process by a process number, or
process ID (PID). Process 0 is a special process created when
the system boots. init has process ID 1. Executing the ps -f
command shows the user processes, their PIDs and their parents’
PIDs, or PPIDs. You can see that each process has a parent, for
example tty4 (Korn shell process) is the parent of the telnet
process. You can also see by following backwards the PPIDs that
tty3 (Korn shell process) is the ancestor of the ftp process.
Introducing UNIX System Management 1–11
Digital UNIX System Internals
Figure 1–4 PID/PPID Numbers
On a time-sharing system, the kernel allocates the CPU to
a process for a period of time, called a time slice, and then
switches to another process. The switch is called a context
switch. The kernel, which is executing in the context or the
environment of a process, saves the state of the process and
enough information about the process and what it was doing to
resume later where it left off.
Every process has a scheduling priority. All processes start with
some base priority (in the range 0 to 63); lower numbers represent
higher priority. System processes have higher priority than user
processes. The kernel picks the process with the highest priority
to run next.
Users can lower the priority of their own processes. The
superuser can lower or raise the priority of processes. The system
also adjusts priorities internally on a timesharing policy; a process
that is using CPU time has its priority lowered, while a process
that is waiting to run has its priority raised. This ensures that all
waiting processes will get their turn to run. The ps lax command
shows the user-adjusted priority (NICE column) and the system
priority (PRI column). The timesharing policy has the goal of
equitably sharing the processors among the various processes.
Digital UNIX also supports a fixed-priority policy, where the goal
is to provide preferential treatment to particular processes. For
fixed-priority processes, the scheduler priority is equal to the base
priority.
1–12 Introducing UNIX System Management
Digital UNIX System Internals
Real Time
Processing
A real-time process reacts to external events within a specified
time limit, and reacts in a predictable way. Real-time tasks can
vary from process control for manufacturing to simulators for
flight training.
Digital UNIX provides preemption and fixed-priority scheduling
to support real-time processes. Preemption allows a high
priority process to take control of the CPU if it becomes runnable
while a lower priority process is currently executing.
The real-time scheduling interface supports three policies that
give the programmer the ability to select which class a process
should belong to:
• Timesharing - Standard Digital UNIX scheduling policy.
Process priority is adjusted periodically by the kernel based on
CPU usage and system load average.
• FIFO - Fixed priority first-in first-out policy. If no higher
priority process preempts, the process runs until it
relinquishes the CPU through a blocking call; there is no
quantum time limit.
• Round-robin - Fixed-priority policy similar to FIFO, but adds
a time quantum. A process must relinquish control of the
CPU if it has used its quantum and another process of equal
priority is ready to run.
Memory
Management:
Paging and
Swapping
The kernel is in main memory along with the currently executing
process. However, physical memory is a limited resource;
generally not all active processes can fit into memory. Disk space
is used as a secondary memory managed by paging and swapping.
The paging/swapping area is set up during system installation
and can be resident on a local disk or in the case of diskless
workstations, on a disk available over the network.
Programs can be written larger than physical memory up to some
maximum size virtual memory. The hardware manipulates
programs and data in lengths called pages. Special code
translates the virtual memory page addresses to physical
addresses. When the process tries to access data on a page not
in physical memory, the kernel retrieves it from paging space on
disk and overwrites a page in memory.
The kernel keeps as many processes in physical memory as it can
and lets each one execute during its time slice. (UNIX) swapping
occurs when a process needs to be loaded into memory to be
executed, but there is no room for it. Another process is swapped
out, or saved to the swap area on disk to free up memory.
Digital UNIX uses a slightly different notion of swapping. A
process may consist of multiple threads sharing an address space.
Swapping out a thread’s address space would make the other
threads in the same process unrunnable. The swapout daemon
scans the list of all threads to identify those that have been idle
Introducing UNIX System Management 1–13
Digital UNIX System Internals
for more than 10 seconds. The pageout daemon can then free the
memory pages associated with the thread’s kernel stack. The goal
is still to free memory. And a thread must still be swapped in
when it is made runnable.
Block versus
Character I/O
When a process wants to access data from a file on a disk drive,
the kernel brings the data into memory where the process can
examine it, alter it and ask to store or rewrite it.
Device drivers, or special code in the kernel controls the
operation of peripheral devices.
Mass storage devices such as disk drives are treated as block or
character devices. A block device is a random-access storage
device. A memory buffer, called the buffer cache, is used to read
a block of bytes to the device at one time. This technique can
reduce the amount of disk traffic and improve response time if
processes tend to manipulate data within the same block. One
disadvantage is that if the system halts suddenly, the updated
buffer cache may not be written out to disk.
A character device, also called a raw device, does not use the
buffer.
A disk device can be treated as both a block and a raw device and
has a separate logical name for each.
1–14 Introducing UNIX System Management
Superuser and the Root Login
Superuser and the Root Login
Superuser
Privileges
A UNIX system manager has special system privileges that
exceed those of ordinary users. For this reason, the system
manager is called the superuser. UNIX systems reserve the
login name root (user ID 0) for the superuser. Root owns and
controls many important system files and directories.
As root, the superuser’s special system privileges include complete
access to any file or directory as well as privilege to:
• Override all file mode permissions
• Bypass all normal security checks
• Kill any existing process
• Shut down the system
Root Security Root is a very powerful user, so powerful that a system manager
who carelessly uses its privileges can accidentally destroy
an entire file system. Consequently, you should keep the
root password a secret, known only to you and one (or more)
experienced backup person at your site. This person should have
the knowledge to perform system management responsibilities.
To protect against potential superuser abuse, you should change
the root password regularly with the passwd command.
• Always log in as root using su because the system logs every
set user to root attempt in /var/adm/sialog.
• Perform nonprivileged commands as a nonprivileged user to
prevent accidental system damage.
• You can log in directly as root only on terminals set up as
secure in /etc/securettys.
Network terminals or LAT terminals should not be set up as
secure for security reasons.
Root Login
Procedure
While you can log in directly as root, the following is the
suggested login procedure:
1. Log in under your personal login name.
2. Use the su command to set user ID to root.
3. When you have successfully entered the root password, the
system returns the superuser prompt (#).
4. Change to the root or other directory.
Press Ctrl/D to exit the root shell and return to your original shell.
Introducing UNIX System Management 1–15
Dunix sys operating
Dunix sys operating
Dunix sys operating
Dunix sys operating
Dunix sys operating
Dunix sys operating
Dunix sys operating
Dunix sys operating
Dunix sys operating
Dunix sys operating
Dunix sys operating
Dunix sys operating
Dunix sys operating
Dunix sys operating
Dunix sys operating
Dunix sys operating
Dunix sys operating
Dunix sys operating
Dunix sys operating
Dunix sys operating
Dunix sys operating
Dunix sys operating
Dunix sys operating
Dunix sys operating
Dunix sys operating
Dunix sys operating
Dunix sys operating
Dunix sys operating
Dunix sys operating
Dunix sys operating
Dunix sys operating
Dunix sys operating
Dunix sys operating
Dunix sys operating
Dunix sys operating
Dunix sys operating
Dunix sys operating
Dunix sys operating
Dunix sys operating
Dunix sys operating
Dunix sys operating
Dunix sys operating
Dunix sys operating
Dunix sys operating
Dunix sys operating
Dunix sys operating
Dunix sys operating
Dunix sys operating
Dunix sys operating
Dunix sys operating
Dunix sys operating
Dunix sys operating
Dunix sys operating
Dunix sys operating
Dunix sys operating
Dunix sys operating
Dunix sys operating
Dunix sys operating
Dunix sys operating
Dunix sys operating
Dunix sys operating
Dunix sys operating
Dunix sys operating
Dunix sys operating
Dunix sys operating
Dunix sys operating
Dunix sys operating
Dunix sys operating
Dunix sys operating
Dunix sys operating
Dunix sys operating
Dunix sys operating
Dunix sys operating
Dunix sys operating
Dunix sys operating
Dunix sys operating
Dunix sys operating
Dunix sys operating
Dunix sys operating
Dunix sys operating
Dunix sys operating
Dunix sys operating
Dunix sys operating
Dunix sys operating
Dunix sys operating
Dunix sys operating
Dunix sys operating
Dunix sys operating
Dunix sys operating
Dunix sys operating
Dunix sys operating
Dunix sys operating
Dunix sys operating
Dunix sys operating
Dunix sys operating
Dunix sys operating
Dunix sys operating
Dunix sys operating
Dunix sys operating
Dunix sys operating
Dunix sys operating
Dunix sys operating
Dunix sys operating
Dunix sys operating
Dunix sys operating
Dunix sys operating
Dunix sys operating
Dunix sys operating
Dunix sys operating
Dunix sys operating
Dunix sys operating
Dunix sys operating
Dunix sys operating
Dunix sys operating
Dunix sys operating
Dunix sys operating
Dunix sys operating
Dunix sys operating
Dunix sys operating
Dunix sys operating
Dunix sys operating
Dunix sys operating
Dunix sys operating
Dunix sys operating
Dunix sys operating
Dunix sys operating
Dunix sys operating
Dunix sys operating
Dunix sys operating
Dunix sys operating
Dunix sys operating
Dunix sys operating
Dunix sys operating
Dunix sys operating
Dunix sys operating
Dunix sys operating
Dunix sys operating
Dunix sys operating
Dunix sys operating
Dunix sys operating
Dunix sys operating
Dunix sys operating
Dunix sys operating
Dunix sys operating
Dunix sys operating
Dunix sys operating
Dunix sys operating
Dunix sys operating
Dunix sys operating
Dunix sys operating
Dunix sys operating
Dunix sys operating
Dunix sys operating
Dunix sys operating
Dunix sys operating
Dunix sys operating
Dunix sys operating
Dunix sys operating
Dunix sys operating
Dunix sys operating
Dunix sys operating
Dunix sys operating
Dunix sys operating
Dunix sys operating
Dunix sys operating
Dunix sys operating
Dunix sys operating
Dunix sys operating
Dunix sys operating
Dunix sys operating
Dunix sys operating
Dunix sys operating
Dunix sys operating
Dunix sys operating
Dunix sys operating
Dunix sys operating
Dunix sys operating
Dunix sys operating
Dunix sys operating
Dunix sys operating
Dunix sys operating
Dunix sys operating
Dunix sys operating
Dunix sys operating
Dunix sys operating
Dunix sys operating
Dunix sys operating
Dunix sys operating
Dunix sys operating
Dunix sys operating
Dunix sys operating
Dunix sys operating
Dunix sys operating
Dunix sys operating
Dunix sys operating
Dunix sys operating
Dunix sys operating
Dunix sys operating
Dunix sys operating
Dunix sys operating
Dunix sys operating
Dunix sys operating
Dunix sys operating
Dunix sys operating
Dunix sys operating
Dunix sys operating
Dunix sys operating
Dunix sys operating
Dunix sys operating
Dunix sys operating
Dunix sys operating
Dunix sys operating
Dunix sys operating
Dunix sys operating
Dunix sys operating
Dunix sys operating
Dunix sys operating
Dunix sys operating
Dunix sys operating
Dunix sys operating
Dunix sys operating
Dunix sys operating
Dunix sys operating
Dunix sys operating
Dunix sys operating
Dunix sys operating
Dunix sys operating
Dunix sys operating
Dunix sys operating
Dunix sys operating
Dunix sys operating
Dunix sys operating
Dunix sys operating
Dunix sys operating
Dunix sys operating
Dunix sys operating
Dunix sys operating
Dunix sys operating
Dunix sys operating
Dunix sys operating
Dunix sys operating
Dunix sys operating
Dunix sys operating
Dunix sys operating
Dunix sys operating
Dunix sys operating
Dunix sys operating
Dunix sys operating
Dunix sys operating
Dunix sys operating
Dunix sys operating
Dunix sys operating
Dunix sys operating
Dunix sys operating
Dunix sys operating
Dunix sys operating
Dunix sys operating
Dunix sys operating
Dunix sys operating
Dunix sys operating
Dunix sys operating
Dunix sys operating
Dunix sys operating

More Related Content

What's hot

Backtrack tutorial
Backtrack tutorialBacktrack tutorial
Backtrack tutorial
khadikhadi
 
Backing up db2 using ibm tivoli storage management sg246247
Backing up db2 using ibm tivoli storage management sg246247Backing up db2 using ibm tivoli storage management sg246247
Backing up db2 using ibm tivoli storage management sg246247
Banking at Ho Chi Minh city
 
Accounting and chargeback with tivoli decision support for os 390 sg246044
Accounting and chargeback with tivoli decision support for os 390 sg246044Accounting and chargeback with tivoli decision support for os 390 sg246044
Accounting and chargeback with tivoli decision support for os 390 sg246044
Banking at Ho Chi Minh city
 
cynapspro endpoint data protection - user guide
cynapspro endpoint data protection -  user guidecynapspro endpoint data protection -  user guide
cynapspro endpoint data protection - user guide
cynapspro GmbH
 
Ibm tivoli storage manager bare machine recovery for microsoft windows 2003 a...
Ibm tivoli storage manager bare machine recovery for microsoft windows 2003 a...Ibm tivoli storage manager bare machine recovery for microsoft windows 2003 a...
Ibm tivoli storage manager bare machine recovery for microsoft windows 2003 a...
Banking at Ho Chi Minh city
 
Motorola air defense mobile 6.1 user guide
Motorola air defense mobile 6.1 user guideMotorola air defense mobile 6.1 user guide
Motorola air defense mobile 6.1 user guide
Advantec Distribution
 
Rf card user_manual
Rf card user_manualRf card user_manual
Rf card user_manual
Reliable Tech.
 
Book.opensuse.startup en
Book.opensuse.startup enBook.opensuse.startup en
Book.opensuse.startup en
Naldo Santos
 
276.14 nvidia-control-panel-quick-start-guide
276.14 nvidia-control-panel-quick-start-guide276.14 nvidia-control-panel-quick-start-guide
276.14 nvidia-control-panel-quick-start-guide
Massimo Rubboli
 
Tme 10 cookbook for aix systems management and networking sg244867
Tme 10 cookbook for aix systems management and networking sg244867Tme 10 cookbook for aix systems management and networking sg244867
Tme 10 cookbook for aix systems management and networking sg244867
Banking at Ho Chi Minh city
 
Data sharing planning and administration
Data sharing planning and administrationData sharing planning and administration
Data sharing planning and administration
Marino Savoldi
 
Qlx26stud
Qlx26studQlx26stud
Profiler2_getting started
Profiler2_getting startedProfiler2_getting started
Profiler2_getting started
Luca Gastaldi
 
E1911 a8n e
E1911 a8n eE1911 a8n e
E1911 a8n e
pratmen
 
Aix Administrator
Aix AdministratorAix Administrator
Aix Administrator
mjckhadeer
 
Configuration of sas 9.1.3
Configuration of sas 9.1.3Configuration of sas 9.1.3
Configuration of sas 9.1.3
satish090909
 
Ibm system storage solutions handbook sg245250
Ibm system storage solutions handbook sg245250Ibm system storage solutions handbook sg245250
Ibm system storage solutions handbook sg245250
Banking at Ho Chi Minh city
 
Cbjdhc
CbjdhcCbjdhc
Cbjdhc
guest59f67a
 

What's hot (18)

Backtrack tutorial
Backtrack tutorialBacktrack tutorial
Backtrack tutorial
 
Backing up db2 using ibm tivoli storage management sg246247
Backing up db2 using ibm tivoli storage management sg246247Backing up db2 using ibm tivoli storage management sg246247
Backing up db2 using ibm tivoli storage management sg246247
 
Accounting and chargeback with tivoli decision support for os 390 sg246044
Accounting and chargeback with tivoli decision support for os 390 sg246044Accounting and chargeback with tivoli decision support for os 390 sg246044
Accounting and chargeback with tivoli decision support for os 390 sg246044
 
cynapspro endpoint data protection - user guide
cynapspro endpoint data protection -  user guidecynapspro endpoint data protection -  user guide
cynapspro endpoint data protection - user guide
 
Ibm tivoli storage manager bare machine recovery for microsoft windows 2003 a...
Ibm tivoli storage manager bare machine recovery for microsoft windows 2003 a...Ibm tivoli storage manager bare machine recovery for microsoft windows 2003 a...
Ibm tivoli storage manager bare machine recovery for microsoft windows 2003 a...
 
Motorola air defense mobile 6.1 user guide
Motorola air defense mobile 6.1 user guideMotorola air defense mobile 6.1 user guide
Motorola air defense mobile 6.1 user guide
 
Rf card user_manual
Rf card user_manualRf card user_manual
Rf card user_manual
 
Book.opensuse.startup en
Book.opensuse.startup enBook.opensuse.startup en
Book.opensuse.startup en
 
276.14 nvidia-control-panel-quick-start-guide
276.14 nvidia-control-panel-quick-start-guide276.14 nvidia-control-panel-quick-start-guide
276.14 nvidia-control-panel-quick-start-guide
 
Tme 10 cookbook for aix systems management and networking sg244867
Tme 10 cookbook for aix systems management and networking sg244867Tme 10 cookbook for aix systems management and networking sg244867
Tme 10 cookbook for aix systems management and networking sg244867
 
Data sharing planning and administration
Data sharing planning and administrationData sharing planning and administration
Data sharing planning and administration
 
Qlx26stud
Qlx26studQlx26stud
Qlx26stud
 
Profiler2_getting started
Profiler2_getting startedProfiler2_getting started
Profiler2_getting started
 
E1911 a8n e
E1911 a8n eE1911 a8n e
E1911 a8n e
 
Aix Administrator
Aix AdministratorAix Administrator
Aix Administrator
 
Configuration of sas 9.1.3
Configuration of sas 9.1.3Configuration of sas 9.1.3
Configuration of sas 9.1.3
 
Ibm system storage solutions handbook sg245250
Ibm system storage solutions handbook sg245250Ibm system storage solutions handbook sg245250
Ibm system storage solutions handbook sg245250
 
Cbjdhc
CbjdhcCbjdhc
Cbjdhc
 

Similar to Dunix sys operating

Aix student guide system administrations part 2 problem determination
Aix student guide system administrations part 2   problem determinationAix student guide system administrations part 2   problem determination
Aix student guide system administrations part 2 problem determination
Yogesh Sharma
 
Linux-Perf.pdf
Linux-Perf.pdfLinux-Perf.pdf
Linux-Perf.pdf
Senthilkumar Srinivasan
 
pdfcoffee.com_i-openwells-basics-training-3-pdf-free.pdf
pdfcoffee.com_i-openwells-basics-training-3-pdf-free.pdfpdfcoffee.com_i-openwells-basics-training-3-pdf-free.pdf
pdfcoffee.com_i-openwells-basics-training-3-pdf-free.pdf
Jalal Neshat
 
Erpi admin 11123510[1] by иссам неязын issam hejazin
Erpi admin 11123510[1] by иссам неязын issam hejazinErpi admin 11123510[1] by иссам неязын issam hejazin
Erpi admin 11123510[1] by иссам неязын issam hejazin
Issam Hejazin
 
HRpM_UG_731_HDS_M2
HRpM_UG_731_HDS_M2HRpM_UG_731_HDS_M2
HRpM_UG_731_HDS_M2
Nicholas Pierotti
 
G:\Mcse 70 290 Managing And Maintaining Windows Server 2003 Environment
G:\Mcse 70 290 Managing And Maintaining Windows Server 2003 EnvironmentG:\Mcse 70 290 Managing And Maintaining Windows Server 2003 Environment
G:\Mcse 70 290 Managing And Maintaining Windows Server 2003 Environment
edalatpishe
 
Ap51 xx reference_guide
Ap51 xx reference_guideAp51 xx reference_guide
Ap51 xx reference_guide
Advantec Distribution
 
Ap51 xx reference_guide
Ap51 xx reference_guideAp51 xx reference_guide
Ap51 xx reference_guide
Advantec Distribution
 
compaq_dc5750.pdf
compaq_dc5750.pdfcompaq_dc5750.pdf
compaq_dc5750.pdf
LeticiaSanilleSantos
 
Modifying infor erp_syte_line_5140
Modifying infor erp_syte_line_5140Modifying infor erp_syte_line_5140
Modifying infor erp_syte_line_5140
rajesh_rolta
 
sum2_abap_unix_hana.pdf
sum2_abap_unix_hana.pdfsum2_abap_unix_hana.pdf
sum2_abap_unix_hana.pdf
ssuser9f920a1
 
ABC vol3 antigo com SMPE.pdf
ABC vol3 antigo com SMPE.pdfABC vol3 antigo com SMPE.pdf
ABC vol3 antigo com SMPE.pdf
Flavio787771
 
Gdfs sg246374
Gdfs sg246374Gdfs sg246374
Gdfs sg246374
Accenture
 
01 introduction tovulcanmanual_v81_20120817-libre
01 introduction tovulcanmanual_v81_20120817-libre01 introduction tovulcanmanual_v81_20120817-libre
01 introduction tovulcanmanual_v81_20120817-libre
Walquer huacani calsin
 
Ap 51xx access point product reference guide (part no. 72 e-113664-01 rev. b)
Ap 51xx access point product reference guide (part no. 72 e-113664-01 rev. b)Ap 51xx access point product reference guide (part no. 72 e-113664-01 rev. b)
Ap 51xx access point product reference guide (part no. 72 e-113664-01 rev. b)
Advantec Distribution
 
Progress OpenEdge database administration guide and reference
Progress OpenEdge database administration guide and referenceProgress OpenEdge database administration guide and reference
Progress OpenEdge database administration guide and reference
Vinh Nguyen
 
User guide
User guideUser guide
User guide
Mcandraw Wijaya
 
Ibm virtual disk system quickstart guide sg247794
Ibm virtual disk system quickstart guide sg247794Ibm virtual disk system quickstart guide sg247794
Ibm virtual disk system quickstart guide sg247794
Banking at Ho Chi Minh city
 
Ibm virtual disk system quickstart guide sg247794
Ibm virtual disk system quickstart guide sg247794Ibm virtual disk system quickstart guide sg247794
Ibm virtual disk system quickstart guide sg247794
Banking at Ho Chi Minh city
 
IBM zEnterprise 114 Technical Guide
IBM zEnterprise 114 Technical GuideIBM zEnterprise 114 Technical Guide
IBM zEnterprise 114 Technical Guide
IBM India Smarter Computing
 

Similar to Dunix sys operating (20)

Aix student guide system administrations part 2 problem determination
Aix student guide system administrations part 2   problem determinationAix student guide system administrations part 2   problem determination
Aix student guide system administrations part 2 problem determination
 
Linux-Perf.pdf
Linux-Perf.pdfLinux-Perf.pdf
Linux-Perf.pdf
 
pdfcoffee.com_i-openwells-basics-training-3-pdf-free.pdf
pdfcoffee.com_i-openwells-basics-training-3-pdf-free.pdfpdfcoffee.com_i-openwells-basics-training-3-pdf-free.pdf
pdfcoffee.com_i-openwells-basics-training-3-pdf-free.pdf
 
Erpi admin 11123510[1] by иссам неязын issam hejazin
Erpi admin 11123510[1] by иссам неязын issam hejazinErpi admin 11123510[1] by иссам неязын issam hejazin
Erpi admin 11123510[1] by иссам неязын issam hejazin
 
HRpM_UG_731_HDS_M2
HRpM_UG_731_HDS_M2HRpM_UG_731_HDS_M2
HRpM_UG_731_HDS_M2
 
G:\Mcse 70 290 Managing And Maintaining Windows Server 2003 Environment
G:\Mcse 70 290 Managing And Maintaining Windows Server 2003 EnvironmentG:\Mcse 70 290 Managing And Maintaining Windows Server 2003 Environment
G:\Mcse 70 290 Managing And Maintaining Windows Server 2003 Environment
 
Ap51 xx reference_guide
Ap51 xx reference_guideAp51 xx reference_guide
Ap51 xx reference_guide
 
Ap51 xx reference_guide
Ap51 xx reference_guideAp51 xx reference_guide
Ap51 xx reference_guide
 
compaq_dc5750.pdf
compaq_dc5750.pdfcompaq_dc5750.pdf
compaq_dc5750.pdf
 
Modifying infor erp_syte_line_5140
Modifying infor erp_syte_line_5140Modifying infor erp_syte_line_5140
Modifying infor erp_syte_line_5140
 
sum2_abap_unix_hana.pdf
sum2_abap_unix_hana.pdfsum2_abap_unix_hana.pdf
sum2_abap_unix_hana.pdf
 
ABC vol3 antigo com SMPE.pdf
ABC vol3 antigo com SMPE.pdfABC vol3 antigo com SMPE.pdf
ABC vol3 antigo com SMPE.pdf
 
Gdfs sg246374
Gdfs sg246374Gdfs sg246374
Gdfs sg246374
 
01 introduction tovulcanmanual_v81_20120817-libre
01 introduction tovulcanmanual_v81_20120817-libre01 introduction tovulcanmanual_v81_20120817-libre
01 introduction tovulcanmanual_v81_20120817-libre
 
Ap 51xx access point product reference guide (part no. 72 e-113664-01 rev. b)
Ap 51xx access point product reference guide (part no. 72 e-113664-01 rev. b)Ap 51xx access point product reference guide (part no. 72 e-113664-01 rev. b)
Ap 51xx access point product reference guide (part no. 72 e-113664-01 rev. b)
 
Progress OpenEdge database administration guide and reference
Progress OpenEdge database administration guide and referenceProgress OpenEdge database administration guide and reference
Progress OpenEdge database administration guide and reference
 
User guide
User guideUser guide
User guide
 
Ibm virtual disk system quickstart guide sg247794
Ibm virtual disk system quickstart guide sg247794Ibm virtual disk system quickstart guide sg247794
Ibm virtual disk system quickstart guide sg247794
 
Ibm virtual disk system quickstart guide sg247794
Ibm virtual disk system quickstart guide sg247794Ibm virtual disk system quickstart guide sg247794
Ibm virtual disk system quickstart guide sg247794
 
IBM zEnterprise 114 Technical Guide
IBM zEnterprise 114 Technical GuideIBM zEnterprise 114 Technical Guide
IBM zEnterprise 114 Technical Guide
 

Recently uploaded

原版定制美国纽约州立大学奥尔巴尼分校毕业证学位证书原版一模一样
原版定制美国纽约州立大学奥尔巴尼分校毕业证学位证书原版一模一样原版定制美国纽约州立大学奥尔巴尼分校毕业证学位证书原版一模一样
原版定制美国纽约州立大学奥尔巴尼分校毕业证学位证书原版一模一样
mz5nrf0n
 
GraphSummit Paris - The art of the possible with Graph Technology
GraphSummit Paris - The art of the possible with Graph TechnologyGraphSummit Paris - The art of the possible with Graph Technology
GraphSummit Paris - The art of the possible with Graph Technology
Neo4j
 
Energy consumption of Database Management - Florina Jonuzi
Energy consumption of Database Management - Florina JonuziEnergy consumption of Database Management - Florina Jonuzi
Energy consumption of Database Management - Florina Jonuzi
Green Software Development
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
Oracle Database 19c New Features for DBAs and Developers.pptx
Oracle Database 19c New Features for DBAs and Developers.pptxOracle Database 19c New Features for DBAs and Developers.pptx
Oracle Database 19c New Features for DBAs and Developers.pptx
Remote DBA Services
 
Atelier - Innover avec l’IA Générative et les graphes de connaissances
Atelier - Innover avec l’IA Générative et les graphes de connaissancesAtelier - Innover avec l’IA Générative et les graphes de connaissances
Atelier - Innover avec l’IA Générative et les graphes de connaissances
Neo4j
 
A Study of Variable-Role-based Feature Enrichment in Neural Models of Code
A Study of Variable-Role-based Feature Enrichment in Neural Models of CodeA Study of Variable-Role-based Feature Enrichment in Neural Models of Code
A Study of Variable-Role-based Feature Enrichment in Neural Models of Code
Aftab Hussain
 
Vitthal Shirke Java Microservices Resume.pdf
Vitthal Shirke Java Microservices Resume.pdfVitthal Shirke Java Microservices Resume.pdf
Vitthal Shirke Java Microservices Resume.pdf
Vitthal Shirke
 
UI5con 2024 - Keynote: Latest News about UI5 and it’s Ecosystem
UI5con 2024 - Keynote: Latest News about UI5 and it’s EcosystemUI5con 2024 - Keynote: Latest News about UI5 and it’s Ecosystem
UI5con 2024 - Keynote: Latest News about UI5 and it’s Ecosystem
Peter Muessig
 
Unveiling the Advantages of Agile Software Development.pdf
Unveiling the Advantages of Agile Software Development.pdfUnveiling the Advantages of Agile Software Development.pdf
Unveiling the Advantages of Agile Software Development.pdf
brainerhub1
 
Empowering Growth with Best Software Development Company in Noida - Deuglo
Empowering Growth with Best Software  Development Company in Noida - DeugloEmpowering Growth with Best Software  Development Company in Noida - Deuglo
Empowering Growth with Best Software Development Company in Noida - Deuglo
Deuglo Infosystem Pvt Ltd
 
8 Best Automated Android App Testing Tool and Framework in 2024.pdf
8 Best Automated Android App Testing Tool and Framework in 2024.pdf8 Best Automated Android App Testing Tool and Framework in 2024.pdf
8 Best Automated Android App Testing Tool and Framework in 2024.pdf
kalichargn70th171
 
Measures in SQL (SIGMOD 2024, Santiago, Chile)
Measures in SQL (SIGMOD 2024, Santiago, Chile)Measures in SQL (SIGMOD 2024, Santiago, Chile)
Measures in SQL (SIGMOD 2024, Santiago, Chile)
Julian Hyde
 
What is Augmented Reality Image Tracking
What is Augmented Reality Image TrackingWhat is Augmented Reality Image Tracking
What is Augmented Reality Image Tracking
pavan998932
 
Automated software refactoring with OpenRewrite and Generative AI.pptx.pdf
Automated software refactoring with OpenRewrite and Generative AI.pptx.pdfAutomated software refactoring with OpenRewrite and Generative AI.pptx.pdf
Automated software refactoring with OpenRewrite and Generative AI.pptx.pdf
timtebeek1
 
Neo4j - Product Vision and Knowledge Graphs - GraphSummit Paris
Neo4j - Product Vision and Knowledge Graphs - GraphSummit ParisNeo4j - Product Vision and Knowledge Graphs - GraphSummit Paris
Neo4j - Product Vision and Knowledge Graphs - GraphSummit Paris
Neo4j
 
Oracle 23c New Features For DBAs and Developers.pptx
Oracle 23c New Features For DBAs and Developers.pptxOracle 23c New Features For DBAs and Developers.pptx
Oracle 23c New Features For DBAs and Developers.pptx
Remote DBA Services
 
Revolutionizing Visual Effects Mastering AI Face Swaps.pdf
Revolutionizing Visual Effects Mastering AI Face Swaps.pdfRevolutionizing Visual Effects Mastering AI Face Swaps.pdf
Revolutionizing Visual Effects Mastering AI Face Swaps.pdf
Undress Baby
 
Microservice Teams - How the cloud changes the way we work
Microservice Teams - How the cloud changes the way we workMicroservice Teams - How the cloud changes the way we work
Microservice Teams - How the cloud changes the way we work
Sven Peters
 
E-Invoicing Implementation: A Step-by-Step Guide for Saudi Arabian Companies
E-Invoicing Implementation: A Step-by-Step Guide for Saudi Arabian CompaniesE-Invoicing Implementation: A Step-by-Step Guide for Saudi Arabian Companies
E-Invoicing Implementation: A Step-by-Step Guide for Saudi Arabian Companies
Quickdice ERP
 

Recently uploaded (20)

原版定制美国纽约州立大学奥尔巴尼分校毕业证学位证书原版一模一样
原版定制美国纽约州立大学奥尔巴尼分校毕业证学位证书原版一模一样原版定制美国纽约州立大学奥尔巴尼分校毕业证学位证书原版一模一样
原版定制美国纽约州立大学奥尔巴尼分校毕业证学位证书原版一模一样
 
GraphSummit Paris - The art of the possible with Graph Technology
GraphSummit Paris - The art of the possible with Graph TechnologyGraphSummit Paris - The art of the possible with Graph Technology
GraphSummit Paris - The art of the possible with Graph Technology
 
Energy consumption of Database Management - Florina Jonuzi
Energy consumption of Database Management - Florina JonuziEnergy consumption of Database Management - Florina Jonuzi
Energy consumption of Database Management - Florina Jonuzi
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
Oracle Database 19c New Features for DBAs and Developers.pptx
Oracle Database 19c New Features for DBAs and Developers.pptxOracle Database 19c New Features for DBAs and Developers.pptx
Oracle Database 19c New Features for DBAs and Developers.pptx
 
Atelier - Innover avec l’IA Générative et les graphes de connaissances
Atelier - Innover avec l’IA Générative et les graphes de connaissancesAtelier - Innover avec l’IA Générative et les graphes de connaissances
Atelier - Innover avec l’IA Générative et les graphes de connaissances
 
A Study of Variable-Role-based Feature Enrichment in Neural Models of Code
A Study of Variable-Role-based Feature Enrichment in Neural Models of CodeA Study of Variable-Role-based Feature Enrichment in Neural Models of Code
A Study of Variable-Role-based Feature Enrichment in Neural Models of Code
 
Vitthal Shirke Java Microservices Resume.pdf
Vitthal Shirke Java Microservices Resume.pdfVitthal Shirke Java Microservices Resume.pdf
Vitthal Shirke Java Microservices Resume.pdf
 
UI5con 2024 - Keynote: Latest News about UI5 and it’s Ecosystem
UI5con 2024 - Keynote: Latest News about UI5 and it’s EcosystemUI5con 2024 - Keynote: Latest News about UI5 and it’s Ecosystem
UI5con 2024 - Keynote: Latest News about UI5 and it’s Ecosystem
 
Unveiling the Advantages of Agile Software Development.pdf
Unveiling the Advantages of Agile Software Development.pdfUnveiling the Advantages of Agile Software Development.pdf
Unveiling the Advantages of Agile Software Development.pdf
 
Empowering Growth with Best Software Development Company in Noida - Deuglo
Empowering Growth with Best Software  Development Company in Noida - DeugloEmpowering Growth with Best Software  Development Company in Noida - Deuglo
Empowering Growth with Best Software Development Company in Noida - Deuglo
 
8 Best Automated Android App Testing Tool and Framework in 2024.pdf
8 Best Automated Android App Testing Tool and Framework in 2024.pdf8 Best Automated Android App Testing Tool and Framework in 2024.pdf
8 Best Automated Android App Testing Tool and Framework in 2024.pdf
 
Measures in SQL (SIGMOD 2024, Santiago, Chile)
Measures in SQL (SIGMOD 2024, Santiago, Chile)Measures in SQL (SIGMOD 2024, Santiago, Chile)
Measures in SQL (SIGMOD 2024, Santiago, Chile)
 
What is Augmented Reality Image Tracking
What is Augmented Reality Image TrackingWhat is Augmented Reality Image Tracking
What is Augmented Reality Image Tracking
 
Automated software refactoring with OpenRewrite and Generative AI.pptx.pdf
Automated software refactoring with OpenRewrite and Generative AI.pptx.pdfAutomated software refactoring with OpenRewrite and Generative AI.pptx.pdf
Automated software refactoring with OpenRewrite and Generative AI.pptx.pdf
 
Neo4j - Product Vision and Knowledge Graphs - GraphSummit Paris
Neo4j - Product Vision and Knowledge Graphs - GraphSummit ParisNeo4j - Product Vision and Knowledge Graphs - GraphSummit Paris
Neo4j - Product Vision and Knowledge Graphs - GraphSummit Paris
 
Oracle 23c New Features For DBAs and Developers.pptx
Oracle 23c New Features For DBAs and Developers.pptxOracle 23c New Features For DBAs and Developers.pptx
Oracle 23c New Features For DBAs and Developers.pptx
 
Revolutionizing Visual Effects Mastering AI Face Swaps.pdf
Revolutionizing Visual Effects Mastering AI Face Swaps.pdfRevolutionizing Visual Effects Mastering AI Face Swaps.pdf
Revolutionizing Visual Effects Mastering AI Face Swaps.pdf
 
Microservice Teams - How the cloud changes the way we work
Microservice Teams - How the cloud changes the way we workMicroservice Teams - How the cloud changes the way we work
Microservice Teams - How the cloud changes the way we work
 
E-Invoicing Implementation: A Step-by-Step Guide for Saudi Arabian Companies
E-Invoicing Implementation: A Step-by-Step Guide for Saudi Arabian CompaniesE-Invoicing Implementation: A Step-by-Step Guide for Saudi Arabian Companies
E-Invoicing Implementation: A Step-by-Step Guide for Saudi Arabian Companies
 

Dunix sys operating

  • 1. Digital UNIX System Administration Course Guide, Volume 1 Order Number: EY-U659E-S1.0002
  • 2. September 1996 Digital Equipment Corporation makes no representations that the use of its products in the manner described in this publication will not infringe on existing or future patent rights, nor do the descriptions contained in this publication imply the granting of licenses to make, use, or sell equipment or software in accordance with the description. Reproduction or duplication of this courseware in any form, in whole or in part, is prohibited without the prior written permission of Digital Equipment Corporation. Possession, use, or copying of the software described in this publication is authorized only pursuant to a valid written license from Digital or an authorized sublicensor. © Digital Equipment Corporation 1995, 1996. All rights reserved. Printed in U.S.A. The following are trademarks of Digital Equipment Corporation: Alpha AXP, CompacTape, DEC, DECevent, DEC VET, DEC Fortran, DECthreads, DEC Chip, DECnet, DECwindows, Digital, DNA, LAT, POLYCENTER, OpenVMS, TURBOchannel, ULTRIX, and the DIGITAL logo. The following are third-party trademarks used in this course: AIX is a registered trademark of International Business Machines Corp. Futurebus/Plus is a registered trademark of Force Computers GMBH, Federal Republic of Germany. Global Knowledge Network and the Global Knowledge Network logo are trademarks of Global Knowledge Network, Inc. IEEE is a registered trademark of the Institute of Electrical and Electronics Engineers, Inc. Motif, OSF and OSF/1 are registered trademarks of the Open Software Foundation. MS–DOS is a registered trademark of Microsoft Corporation. NFS is a registered trademark of Sun Microsystems, Inc. Open Software Foundation is a trademark of the Open Software Foundation. POSIX is a registered trademark of the Institute of Electrical and Electronics. PostScript is a registered trademark of Adobe Systems, Inc. NFS and Sun Microsystems are registered trademarks of Sun Microsystems, Inc. UNIX is a registered trademark in the United States and other countries licensed exclusively through X/Open Company Ltd. X Window System is a trademark of the Massachusetts Institute of Technology. This document was prepared using VAX DOCUMENT Version 2.1.
  • 3. Contents About This Course . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xvii 1 Introducing UNIX System Management About This Chapter . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1–2 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1–2 Objectives . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1–2 Resources . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1–3 System Manager Responsibilities . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1–4 Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1–4 UNIX Software Environment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1–6 Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1–6 The Kernel . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1–7 Digital UNIX Features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1–8 Digital UNIX Components . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1–8 Digital UNIX Features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1–8 File System Support . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1–9 Digital UNIX System Internals . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1–10 Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1–10 User Process Creation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1–10 Daemon Processes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1–11 Process Environment: Scheduling and Priority . . . . . . . . . . . . . . . . . . 1–11 Real Time Processing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1–13 Memory Management: Paging and Swapping . . . . . . . . . . . . . . . . . . . 1–13 Block versus Character I/O . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1–14 Superuser and the Root Login . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1–15 Superuser Privileges . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1–15 Root Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1–15 Root Login Procedure . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1–15 Root Login Restrictions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1–16 Common Desktop Environment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1–17 Managing with CDE . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1–17 Front Panel . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1–17 Application Manager . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1–18 Configuration Manager . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1–20 Daily Administration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1–21 Selecting System Information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1–22 Monitoring and Tuning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1–23 Storage Management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1–24 Using Tools . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1–25 Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1–26 System Manager Responsibilities . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1–26 UNIX Software Environment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1–26 Digital UNIX Features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1–26 iii
  • 4. Digital UNIX System Internals . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1–26 Superuser and Root Login . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1–27 Common Desktop Environment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1–27 Exercises . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1–28 Superuser and the root Login . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1–28 CDE and Superuser . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1–28 Solutions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1–29 Superuser and the root Login . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1–29 CDE and Superuser . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1–29 2 Managing Disks and File Systems About This Chapter . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2–2 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2–2 Objectives . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2–2 Resources . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2–2 Disk Drives . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2–4 Disk Drive Structure . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2–4 Surfaces . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2–4 Heads . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2–5 Tracks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2–5 Cylinders . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2–5 Sectors . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2–5 Disk Operation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2–5 Logical Volumes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2–6 Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2–6 Partitions and File Systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2–8 Disk Partitions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2–8 Partitions on a Disk . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2–8 Hierarchical File Systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2–8 File System and Partition Relationships . . . . . . . . . . . . . . . . . . . . . . . 2–9 Partition Tables and Disk Labels . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2–10 Deriving Disk Parameters with /etc/disktab . . . . . . . . . . . . . . . . . . . . 2–10 Viewing and Changing Partition Sizes with CDE . . . . . . . . . . . . . . . . . . . 2–12 Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2–12 Displaying the Current Partition Sizes . . . . . . . . . . . . . . . . . . . . . . . . 2–12 Configure Partitions Window . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2–14 Disk/Partition Information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2–14 Modifying a Partition . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2–17 Changing Partition Size . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2–18 Repartitioning a Disk . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2–19 Viewing and Changing Partition Sizes . . . . . . . . . . . . . . . . . . . . . . . . . . . 2–20 Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2–20 Changing Partition Sizes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2–21 Expanding a Partition . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2–22 Repartitioning a Disk . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2–24 Digital UNIX File Systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2–25 Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2–25 Virtual File System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2–25 Accessing a File Through VFS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2–26 UNIX File System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2–26 UNIX File System Layout . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2–28 MFS File System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2–28 Network File System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2–29 iv
  • 5. Compact Disk File System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2–30 System Organization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2–31 Types of Files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2–31 Digital UNIX File Directory Hierarchy . . . . . . . . . . . . . . . . . . . . . . . . 2–31 Organizing System Files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2–32 Advanced File System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2–34 Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2–34 Features and Benefits . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2–34 Components . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2–35 UFS Storage Model . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2–36 AdvFS Storage Model . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2–37 File Domains . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2–38 Guidelines for File Domains . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2–39 Filesets . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2–39 Guidelines for Filesets . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2–40 Creating a UFS File System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2–41 Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2–41 Using the newfs Command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2–41 Checking a UNIX File System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2–43 When to Check File Systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2–43 Using the fsck Command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2–43 Mounting and Unmounting File Systems . . . . . . . . . . . . . . . . . . . . . . . . . 2–45 Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2–45 Using the mount Command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2–46 Using the fstab File . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2–47 Using the umount Command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2–49 Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2–51 Disk Drives . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2–51 Logical Volumes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2–51 Partitions and File Systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2–51 Viewing and Changing Partition Sizes with CDE . . . . . . . . . . . . . . . . 2–51 Viewing and Changing Partition Sizes . . . . . . . . . . . . . . . . . . . . . . . . 2–51 Digital UNIX File Systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2–52 System Organization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2–52 Advanced File System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2–53 Creating a File System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2–53 Checking a File System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2–53 Mounting a File System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2–53 Exercises . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2–54 Viewing and Changing Partition Sizes with CDE . . . . . . . . . . . . . . . . 2–54 Viewing and Changing Partition Sizes with disklabel . . . . . . . . . . . . . 2–54 Creating a File System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2–54 Checking a File System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2–54 Mounting File Systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2–54 Solutions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2–56 Viewing and Changing Partition Sizes with CDE . . . . . . . . . . . . . . . . 2–56 Viewing and Changing Partition Sizes with disklabel . . . . . . . . . . . . . 2–56 Creating a File System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2–57 Checking a File System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2–57 Mounting File Systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2–57 v
  • 6. 3 System Shutdown and Startup About This Chapter . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3–2 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3–2 Objectives . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3–2 Resources . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3–2 Shutting Down and Rebooting the System . . . . . . . . . . . . . . . . . . . . . . . . 3–3 Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3–3 Reasons for System Shutdown and Reboot . . . . . . . . . . . . . . . . . . . . . 3–3 Methods for System Shutdown . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3–4 Using the shutdown Command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3–4 Shutting Down to Single User Mode . . . . . . . . . . . . . . . . . . . . . . . . . . 3–5 Complete Shutdown . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3–7 Using the halt Command to Stop the Processor . . . . . . . . . . . . . . . . . 3–7 Using the fasthalt Command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3–8 Shutting Down to Single User Mode with init . . . . . . . . . . . . . . . . . . . 3–8 Stopping the Processor with init . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3–9 Other Methods of Shutting Down the System . . . . . . . . . . . . . . . . . . . 3–9 Rebooting the System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3–9 Using the reboot Command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3–9 Shutting Down and Rebooting the System with CDE . . . . . . . . . . . . . . . . 3–11 Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3–11 Invoking Shutdown . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3–11 Shutdown Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3–12 Shutdown Message Only . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3–13 Shutdown Reboot . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3–15 Bootstrapping a Digital UNIX System . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3–16 Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3–16 Steps in the Bootstrap Process . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3–16 Loading the Kernel . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3–16 Initializing the Kernel . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3–17 Hardware Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3–17 Creating System Processes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3–17 Single User Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3–18 Initialization Script Execution . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3–18 Multiuser Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3–19 Run Levels . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3–19 Digital UNIX Initialization Files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3–20 Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3–20 Initialization Files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3–20 Changing Run Levels . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3–21 The /etc/inittab File . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3–22 Digital UNIX /etc/inittab File . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3–23 Entries in the /etc/inittab File . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3–23 Execution of /sbin/rc*.d Files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3–24 Selected Contents of the rc*.d Directories . . . . . . . . . . . . . . . . . . . . . . 3–26 Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3–29 Shutting Down and Rebooting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3–29 Shutting Down and Rebooting with CDE . . . . . . . . . . . . . . . . . . . . . . 3–29 Bootstrapping a Digital UNIX System . . . . . . . . . . . . . . . . . . . . . . . . . 3–29 Digital UNIX Initialization Files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3–29 Exercises . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3–30 System Shutdown and Startup . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3–30 CDE Shutdown and Startup . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3–30 Booting the Digital UNIX System . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3–30 vi
  • 7. Initialization Files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3–31 Solutions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3–32 System Shutdown and Startup . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3–32 CDE Shutdown and Startup . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3–32 Booting the Digital UNIX System . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3–32 Initialization Files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3–32 4 Updating System Firmware About This Chapter . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4–2 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4–2 Objectives . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4–2 Resources . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4–2 Firmware Systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4–3 Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4–3 Architectural View . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4–3 Console Systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4–4 Systems Reference Manual . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4–4 SRM Commands and Tasks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4–6 Advanced RISC Computing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4–7 Changing Consoles . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4–8 Firmware Version . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4–9 Update Firmware Process . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4–9 Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4–11 Digital Firmware Systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4–11 Architecture . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4–11 SRM . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4–11 ARC . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4–11 Changing Consoles . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4–11 Firmware Version . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4–12 Exercises . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4–13 Validate Version . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4–13 Solutions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4–14 Validate Version . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4–14 5 Installing the System About This Chapter . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5–2 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5–2 Objectives . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5–2 Resources . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5–2 Preparing for an Installation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5–3 Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5–3 Installation Media Types . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5–3 Planning Disk Space . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5–3 Planning Swap Space . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5–4 Default Installation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5–4 Custom Installation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5–5 Update Installation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5–5 Hardware Required for Installation . . . . . . . . . . . . . . . . . . . . . . . . . . . 5–6 Booting from the Media . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5–6 Common Desktop Installation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5–7 Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5–7 Common Desktop Environment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5–8 vii
  • 8. Default Installation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5–8 Common Setup Features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5–9 Custom Installation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5–11 View Software . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5–12 Partition Disks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5–13 UNIX Shell . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5–15 Creating the Operating System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5–15 Booting the New Operating System . . . . . . . . . . . . . . . . . . . . . . . . . . . 5–16 Kernel Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5–17 Post Installation Login and Setup . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5–18 Performing an Update Installation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5–20 Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5–20 Update Install File Types . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5–20 Characteristics of an Update Installation . . . . . . . . . . . . . . . . . . . . . . 5–21 Update Installation Procedure . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5–21 Update Administration Utility . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5–24 upadmin Main Menu . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5–24 Customized System File Admin Menu . . . . . . . . . . . . . . . . . . . . . . . . . 5–25 Saving Files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5–25 Deleting Files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5–26 Viewing Files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5–26 Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5–27 Preparing for an Installation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5–27 Installation Setup . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5–27 Performing an Update Installation . . . . . . . . . . . . . . . . . . . . . . . . . . . 5–27 Exercises . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5–28 Installation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5–28 Solutions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5–29 Installation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5–29 6 Connecting to the Network About This Chapter . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6–2 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6–2 Objectives . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6–2 Resources . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6–2 Introducing UNIX Networking . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6–3 Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6–3 UNIX Networking . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6–3 Introducing Internet Gateways . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6–5 Gateway Connects Networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6–5 Using Internet Addressing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6–6 Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6–6 Internet Addresses . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6–6 Internet Address Classes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6–7 Sample Internet Addresses . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6–7 Ethernet Addresses . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6–8 Using Subnetwork Addresses . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6–9 Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6–9 Subnetworks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6–9 Broadcast Addresses . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6–10 TCP/IP Files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6–12 Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6–12 Hosts File . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6–12 viii
  • 9. Trusted Hosts File . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6–13 Lineprinter Daemon File . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6–14 Internet Daemon Configuration File . . . . . . . . . . . . . . . . . . . . . . . . . . 6–14 Networks File . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6–15 Protocols File . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6–15 Services File . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6–16 Setting Up and Managing a TCP/IP Network Using CDE . . . . . . . . . . . . 6–17 Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6–17 Starting Network Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6–17 Configuring an Interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6–18 Adding or Modifying Information in /etc/hosts . . . . . . . . . . . . . . . . . . . 6–21 Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6–24 Introducing UNIX Networking . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6–24 Introducing Internet Gateways . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6–24 Using Internet Addressing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6–24 Using Subnetwork Addresses . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6–24 TCP/IP Files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6–25 Setting Up and Managing a TCP/IP Network Using CDE . . . . . . . . . 6–25 Exercises . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6–26 Internet Files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6–26 Setting Up and Managing a TCP/IP Network Using CDE . . . . . . . . . 6–26 Solutions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6–27 Internet Files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6–27 Setting Up and Managing a TCP/IP Network Using CDE . . . . . . . . . 6–27 7 Loading and Licensing Software About This Chapter . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7–2 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7–2 Objectives . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7–2 Resources . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7–2 Loading and Unloading Software Subsets . . . . . . . . . . . . . . . . . . . . . . . . . 7–3 Preparing to Load Software . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7–3 Using the setld Command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7–3 Displaying Software Subsets . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7–4 Software Subset Display Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . 7–4 Loading Software Subsets . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7–5 Deleting a Software Subset . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7–8 Licensing Your Software . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7–9 Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7–9 Types of Licenses . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7–9 A Sample PAK . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7–9 Using the lmf Command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7–11 Using lmf to Register a License . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7–12 Using lmfsetup to Register a License . . . . . . . . . . . . . . . . . . . . . . . . . 7–12 Using the CDE License Manager . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7–14 Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7–14 Starting the CDE License Manager . . . . . . . . . . . . . . . . . . . . . . . . . . 7–14 Using the License Manager . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7–15 Using Edit List . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7–16 Using Edit New . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7–16 Using File Open . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7–17 Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7–20 Loading and Unloading Software Subsets . . . . . . . . . . . . . . . . . . . . . . 7–20 ix
  • 10. Licensing Your Software . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7–20 Using the CDE License Manager . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7–20 Exercises . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7–21 Loading Software Subsets . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7–21 Checking Software Subsets . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7–21 Deleting Software Subsets . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7–22 Licensing Your Software . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7–22 Using CDE License Manager . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7–22 Solutions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7–23 Loading Software Subsets . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7–23 Checking Software Subsets . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7–23 Deleting Software Subsets . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7–23 Licensing Your Software . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7–24 Using CDE License Manager . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7–25 8 Configuring the Kernel About This Chapter . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8–2 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8–2 Objectives . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8–2 Resources . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8–2 Building a New Kernel . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8–3 Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8–3 System Configuration File . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8–4 Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8–4 Global Keywords . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8–5 Changing Parameters for Performance . . . . . . . . . . . . . . . . . . . . . . . . 8–5 System Definition Keyword . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8–6 Options Keyword Definitions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8–6 Makeoptions Keyword Definitions . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8–6 Pseudodevice Keyword Definitions . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8–6 Building a Static Kernel . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8–10 Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8–10 Using the doconfig Program . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8–10 Configuring the System Dynamically . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8–12 Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8–12 Loading a Subsystem . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8–12 Unloading a Subsystem . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8–12 Querying Subsystem State . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8–13 Subsystem Type . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8–14 Automatically Configured Subsystems . . . . . . . . . . . . . . . . . . . . . . . . . 8–14 Modifying System Attributes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8–15 Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8–15 Subsystem Attribute Values . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8–15 Identifying Dynamic Values . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8–16 Modifying Attributes at Run Time . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8–16 Subsystem Attributes Database . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8–17 Updating Attributes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8–17 Removing Attributes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8–17 List Attributes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8–17 Deleting Attributes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8–17 Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8–18 Building a New Kernel . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8–18 System Configuration File . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8–18 x
  • 11. Building a Static Kernel . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8–18 Dynamic System Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8–18 Modifying System Attributes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8–18 Exercises . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8–19 System Configuration File . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8–19 Building a Static Kernel . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8–19 Dynamically Configure the Kernel . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8–19 Modifying a Running Kernel . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8–19 Persistent Changes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8–19 Solutions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8–20 System Configuration File . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8–20 Building a Static Kernel . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8–20 Dynamically Configure the Kernel . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8–20 Modifying a Running Kernel . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8–20 Persistent Changes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8–21 9 Configuring Peripherals About This Chapter . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9–2 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9–2 Objectives . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9–2 Resources . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9–3 Device Files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9–4 Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9–4 Configuring Terminals . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9–7 Configuring Terminals . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9–7 Configuring Pseudoterminals . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9–8 LAT Terminal Servers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9–9 Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9–9 Adding Terminals on a Terminal Server . . . . . . . . . . . . . . . . . . . . . . . . . . 9–10 Configuring LAT Devices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9–10 Running latsetup . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9–10 Controlling the LAT Service . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9–12 Configuring Disk and Tape Drives . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9–13 Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9–13 DDR Operations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9–13 Configuring a Printer with CDE Printer Configuration . . . . . . . . . . . . . . . 9–14 Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9–14 Using the CDE Printer Configuration . . . . . . . . . . . . . . . . . . . . . . . . 9–14 CDE Printer Configuration Options . . . . . . . . . . . . . . . . . . . . . . . . . . 9–15 Configuring a Remote Printer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9–15 The Advanced... Button . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9–16 The /etc/printcap File . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9–17 Configuring a Local Printer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9–18 Local Printer /etc/printcap . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9–20 Managing the Print System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9–21 How Printing Works . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9–21 Print System Control Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9–22 Using the lptest Command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9–22 Using the lpc Command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9–23 Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9–26 Device Files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9–26 Configuring Terminals . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9–26 LAT Terminal Servers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9–26 xi
  • 12. Adding Terminals on a Terminal Server . . . . . . . . . . . . . . . . . . . . . . . 9–26 Configuring Disks and Tape Drives . . . . . . . . . . . . . . . . . . . . . . . . . . . 9–26 Configuring a Printer with the CDE Printer Configuration . . . . . . . . . 9–27 Managing the Print System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9–27 Exercises . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9–28 Device Files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9–28 Configuring Terminals . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9–28 Adding Terminals on a Terminal Server . . . . . . . . . . . . . . . . . . . . . . . 9–28 Dynamic Device Recognition . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9–28 Adding a Printer with CDE Printer Configuration . . . . . . . . . . . . . . . 9–28 Managing the Print System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9–29 Solutions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9–30 Device Files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9–30 Configuring Terminals . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9–30 Adding Terminals on a Terminal Server . . . . . . . . . . . . . . . . . . . . . . . 9–31 Dynamic Device Recognition . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9–31 Adding a Printer with CDE Printer Configuration . . . . . . . . . . . . . . . 9–31 Managing the Print System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9–31 Index Examples 2–1 Root Directory . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2–10 2–2 An /etc/disktab File . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2–11 2–3 Displaying the Disk Label . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2–20 2–4 Expanding a Partition . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2–23 2–5 Using the newfs Command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2–42 2–6 Invoking the fsck Command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2–44 2–7 Using the mount Command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2–47 2–8 An /etc/fstab File . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2–48 2–9 Using the umount Command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2–49 2–10 Mounting and Unmounting File Systems . . . . . . . . . . . . . . . . . . . . . . 2–49 3–1 Typical Multiuser Mode ps Output . . . . . . . . . . . . . . . . . . . . . . . . . . . 3–6 3–2 Typical Single User ps Output . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3–7 3–3 Digital UNIX /etc/inittab File . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3–23 3–4 An /sbin/rc2 File . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3–25 3–5 Selected Contents of the rc*.d Directories . . . . . . . . . . . . . . . . . . . . . . 3–26 5–1 Creating the Operating System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5–16 5–2 Update Installation Log . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5–21 7–1 Listing Software Subsets with setld . . . . . . . . . . . . . . . . . . . . . . . . . . 7–5 7–2 Loading Software Subsets with setld . . . . . . . . . . . . . . . . . . . . . . . . . . 7–6 7–3 Removing a Software Subset with setld . . . . . . . . . . . . . . . . . . . . . . . 7–8 7–4 A Sample PAK . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7–10 7–5 Using the lmfsetup Command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7–13 8–1 Alpha AXP System Configuration File . . . . . . . . . . . . . . . . . . . . . . . . . 8–8 8–2 Building a Kernel with the doconfig Program . . . . . . . . . . . . . . . . . . . 8–10 9–1 The /dev Directory . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9–4 9–2 Using the latsetup Utility . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9–10 xii
  • 13. 9–3 Using the lptest Command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9–23 9–4 Using the lpc Command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9–25 Figures 1 Course Map . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xxiii 1–1 System Manager Responsibilities . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1–4 1–2 UNIX Layers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1–6 1–3 Logging In to a Terminal . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1–11 1–4 PID/PPID Numbers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1–12 1–5 Front Panel . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1–18 1–6 System Management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1–19 1–7 Configuration Manager . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1–20 1–8 DailyAdmin . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1–21 1–9 System Information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1–22 1–10 Monitoring and Tuning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1–23 1–11 Storage Management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1–24 1–12 Tools . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1–25 2–1 Disk Drive Structure . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2–4 2–2 Functional View of Logical Volumes . . . . . . . . . . . . . . . . . . . . . . . . . . 2–7 2–3 Overlapping Disk Partitions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2–8 2–4 File System Hierarchy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2–9 2–5 Navigating to the Disk Configuration Window . . . . . . . . . . . . . . . . . . 2–12 2–6 Disk Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2–13 2–7 Configure Partitions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2–14 2–8 Disk Geometry . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2–15 2–9 Partition Table . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2–16 2–10 Partition Size . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2–17 2–11 Partition Bar Graph . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2–18 2–12 Result of Partition Changes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2–19 2–13 Expanding a Partition . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2–22 2–14 File System Interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2–25 2–15 Accessing a File Through VFS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2–26 2–16 Small Blocks Require More Overhead . . . . . . . . . . . . . . . . . . . . . . . . . 2–27 2–17 Large Blocks Waste Space . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2–27 2–18 Large Blocks and Small Fragments . . . . . . . . . . . . . . . . . . . . . . . . . . . 2–27 2–19 UNIX File System Layout . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2–28 2–20 Remote Mounting with NFS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2–30 2–21 Digital UNIX System Directory Hierarchy . . . . . . . . . . . . . . . . . . . . . 2–32 2–22 UFS Storage Model . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2–36 2–23 AdvFS Storage Model . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2–37 2–24 File Migration in AdvFS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2–38 2–25 File Domain . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2–38 2–26 Filesets . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2–39 2–27 File Systems Before Mounting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2–45 2–28 File Systems After Mounting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2–46 3–1 Overview of System Shutdown and Reboot . . . . . . . . . . . . . . . . . . . . . 3–4 xiii
  • 14. 3–2 Shutdown Selection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3–11 3–3 Shutdown Window . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3–12 3–4 Shutdown Options Selection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3–13 3–5 Warning Users of Shutdown . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3–14 3–6 Shutdown Reboot . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3–15 3–7 Overview of Digital UNIX Initialization Files . . . . . . . . . . . . . . . . . . . 3–21 4–1 Console Interfaces . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4–4 4–2 Console Initialization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4–5 5–1 Initiating an Installation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5–7 5–2 Status Window . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5–8 5–3 Default Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5–9 5–4 Ready, Set, Go . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5–10 5–5 Custom Installation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5–11 5–6 Selecting Software . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5–12 5–7 Disk Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5–14 5–8 Configure Partitions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5–15 6–1 Exchanging a Message on a UNIX Network . . . . . . . . . . . . . . . . . . . . 6–4 6–2 Gateway Connecting Two Networks . . . . . . . . . . . . . . . . . . . . . . . . . . . 6–5 6–3 Internet Address Classes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6–7 6–4 Subnet Address . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6–9 6–5 Subnetworks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6–10 6–6 Broadcast Addresses . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6–11 6–7 Invoking the Network Configuration Manager . . . . . . . . . . . . . . . . . . 6–18 6–8 Network Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6–19 6–9 Configuring Ethernet Interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6–20 6–10 Optional IFCONFIG Flags . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6–21 6–11 Host File . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6–22 6–12 Hosts Dialog Box . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6–23 7–1 CDE License Manager . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7–14 7–2 Minimum Licenses . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7–15 7–3 List a License . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7–16 7–4 Edit New Option . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7–17 7–5 File Open option . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7–18 7–6 PAK in User File . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7–19 9–1 Providing Access for Terminals and Printers . . . . . . . . . . . . . . . . . . . . 9–9 9–2 Starting Printer Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9–14 9–3 Printer Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9–15 9–4 Remote Printer Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9–16 9–5 Advanced Remote Printer Settings Window . . . . . . . . . . . . . . . . . . . . 9–17 9–6 Local Printer Settings Window . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9–18 9–7 Advanced Local Printer Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9–19 xiv
  • 15. Tables 1 Conventions Used in This Course . . . . . . . . . . . . . . . . . . . . . . . . . . . . xxvi 1–1 System Manager Tasks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1–5 1–2 Root Login Comparisons . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1–16 2–1 Types of Files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2–31 2–2 UNIX System Directory Hierarchy . . . . . . . . . . . . . . . . . . . . . . . . . . . 2–33 2–3 AdvFS Features and Benefits . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2–34 3–1 shutdown Command Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3–5 3–2 halt Command Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3–7 3–3 fasthalt Command Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3–8 3–4 reboot Command Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3–10 3–5 The /etc/inittab File Action Field . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3–22 4–1 Administrator Tasks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4–6 4–2 ARC Console Menu . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4–8 4–3 DEC 2000 AXP Outline Example . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4–10 6–1 Parts of an Internet Address . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6–6 6–2 TCP/IP Network Files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6–12 7–1 Load Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7–6 7–2 CDE License Manager VS LMF Commands . . . . . . . . . . . . . . . . . . . . 7–20 8–1 Global Keywords . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8–5 9–1 Print System Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9–22 9–2 Line Printer Control Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9–24 xv
  • 16.
  • 18. About This Course About This Course Introduction The Digital UNIX System Administration course is designed for those individuals who will be managing and operating a Digital UNIX system. Your Course Guide presents a number of topics on system administration, and provides pointers to documentation and additional references. Textual information is interspersed with lab activities to allow you to practice what you have learned. The Course Guide is divided into chapters designed to cover a single topic or group of related topics. The chapters are divided into smaller units that cover a more limited topic or subtopic. Examples are provided to demonstrate concepts. This preface describes the contents of the course, suggests ways in which you can most effectively use the materials, and sets up the conventions for the use of terms in the course. It includes: • Course description — a brief overview of the course contents • Target audience — who should take this course • Prerequisites — the skills and knowledge needed to ensure your success in this course • Course goals and nongoals — what skills or knowledge the course will and will not provide • Chapter organization — the structure of each chapter • Course map — the sequence in which you should cover each chapter • Chapter descriptions — brief descriptions of each chapter • Course conventions — explanation of symbols and signs used throughout this course • Resources — documentation and books to help you successfully complete this course Course Description This course describes the tasks that a system manager needs to perform to get a UNIX operating system installed and ready for users, including such responsibilities as: • Installing operating system software • Managing and maintaining file systems • Customizing the system kernel • Configuring peripheral devices • Managing user accounts • Performing system backups • Monitoring system activity xviii
  • 19. About This Course • Troubleshooting system problems This course is designed to lead you through the tasks you must perform as the manager of a Digital UNIX system. The format of presenting information followed by exercises gives you the practice you need to understand the course material. Target Audience This course is designed for individuals with some experience in a UNIX® environment, who will be managing a Digital UNIX system. Prerequisites To get the most from this course, students should be able to: • Log in to a UNIX system • Use an editor on the system • Manage files and directories • Use the Common Desktop Environment to manage files and programs • Move within the UNIX File System • Use nonprivileged commands • Write and debug simple shell programs These prerequisites can be satisfied by taking the following course: • UNIX Utilities and Commands lecture/lab or self-paced course ® UNIX is a registered trademark in the United States and other countries licensed exclusively through X/Open Company Ltd. xix
  • 20. About This Course Course Goals To set up and manage a Digital UNIX system, you should be able to: • Identify system management responsibilities • Identify components of UNIX systems • Install the operating system • Shut down and boot the system • Create and manage file systems • Configure devices: terminals, disk drives, tape drives, printers • Add and remove users on the system • Back up and restore files and file systems • Load and license optional software • Monitor system performance • Join and maintain membership in a local area network • Describe some popular network services This course introduces UNIX networking services and demonstrates how to configure a system on a TCP/IP network. It does not cover network design, troubleshooting, or network services installation. Students needing these skills should take the Network Management course. Nongoals This course does not cover the following topics: • UNIX basic utilities and commands • Hardware installation and configuration • Network services setup • Network design, internals, or troubleshooting • Programming • Multisystem security • Core dump analysis • Cluster software UNIX System Administration Curriculum This course is the first course in the UNIX system administration curriculum. It has the prerequisite of experience using a UNIX system. This course is the prerequisite for several other administration courses: • Digital UNIX Network Administration This course is designed for students who will be managing a UNIX network (which includes a Digital UNIX system), who want to increase their knowledge of Digital UNIX networking. This includes configuration and management of TCP/IP networking, NFS, NIS, BIND, Bootp, DHCP, dataless configurations, LAT, remote installation, SNMP, xx
  • 21. About This Course and SLIP/PPP. The course demonstrates how to set up and manage Digital UNIX networks using the Common Desktop Environment (CDE), the new standard graphical user interface for UNIX systems. • Digital UNIX Security Management This course is designed for individuals with experience managing a Digital UNIX operating system, who are interested in learning how to recognize and address security threats in the base security level of the Digital UNIX environment. Course topics include security terms, threats, security holes, installing and configuring a secure base level Digital UNIX system, managing a secure system, and base level and enhanced security auditing. • Digital UNIX Performance Management This course is designed for individuals with experience managing a Digital UNIX operating system, who are interested in maximizing the performance on their systems. Course topics include factors that affect system performance, monitoring and identifying system bottlenecks, and system tuning. • Managing Digital UNIX Using the Advanced File System (AdvFS), Logical Storage Manager (LSM), and Redundant Arrays of Inexpensive Disks (RAID) This courses describes advanced Digital UNIX system management tasks that system administrators need to perform to fully utilize the more sophisticated Digital UNIX functionality, particularly, the Advanced File System (AdvFS), Logical Storage Manager (LSM), and Redundant Arrays of Inexpensive Disks (RAID). • DECsafe Available Server Environment Configuration and Management This course describes in detail how to plan, install, configure, test and troubleshoot a DECsafe Available Server Environment (ASE). • TruCluster Software Configuration and Management This course describes in detail how to install the hardware and software components and how to set up TruCluster Software highly available services. xxi
  • 22. About This Course Chapter Organization This course is divided into 16 chapters. Each chapter covers a skill or related group of skills required to fulfill the course goals. In this course, each chapter consists of: • An introduction to the subject matter of the chapter. • One or more objectives that describe the goals of the chapter. • A list of resources, or materials for further reference. Some of these manuals are included with your course materials. Others may be available for reference in your classroom or lab. • The text of each chapter, which includes outlines, tables, figures, and examples. • The summary includes a brief review of the topics presented in the chapter. • Lab Exercises enable you to practice your skills and to measure your mastery of the information in the chapter. A test is provided for student self-assessment. It allows you to measure whether or not the learning objectives were achieved. Course Map The course map shows how each chapter is related to other chapters and to the course as a whole. Before studying a chapter, you should master all of its prerequisite chapters. The course map shows the current chapters and the order in which they should be presented. The direction of the arrows determine the order in which the chapters should be studied, from bottom to top. xxii
  • 23. About This Course Figure 1 Course Map SystemShutdown andStartup Archiving Configuring Peripherals ZKOX−055000111−01−RGS Monitoring theSystem InstallingtheSystem ManagingDisksand FileSystems UpdatingSystem Firmware Loadingand LicensingSoftware Kernel Configuringthe UserEnvironment Managingthe UsingDECevent IntroducingUNIX SystemManagement IntroducingSMP, Connectingto aNetwork LSM,andClusters Introducing NetworkServices xxiii
  • 24. About This Course Chapter Descriptions The following list summarizes the contents of each chapter. • Introducing UNIX System Management — provides an overview to system hardware and operating system software, their components and functions; describes the responsibilities of a system manager and the privileges of the superuser or root account. • Managing Disks and File Systems — discusses disk drives and their physical and logical structure, the different file systems, reviews file types and major directories in an OSF/1 system; discusses the steps to add a file system: create, check, and mount, using standard tools. • System Shutdown and Startup — demonstrates the UNIX shutdown, halt and reboot commands, provides instructions on how to boot a Digital UNIX system, and provides background on what happens on the system as it boots. • Updating System Firmware — discusses the underlying principles of the firmware operating system, as well as the consoles required to support multiple operating systems. • Installing the System — describes the planning and procedures necessary to install a Digital UNIX operating system. • Connecting to the Network — discusses UNIX, or Internet networking, including Internet addressing and the files needed to configure the network; demonstrates netconfig to perform the configuration. • Loading and Licensing Software — demonstrates use of the Digital UNIX software loading utility, setld, to manage the software subset inventory, and load and unload software subsets; demonstrates the use of the Digital License Management Facility to control access to software. • Configuring the Kernel — describes the system configuration file, how to modify the system configuration, when to build a new kernel, use of the doconfig shell script to build a kernel automatically, and how to use the make command to build a kernel manually. • Configuring Peripherals — describes how to add terminals, add pseudoterminals, disk and tape drives, and set up and test printers. • Archiving — addresses the issue of protecting user data from accidental loss by backing up the data. A new NetWorker SingleServer Save and Restore application is presented which backs up and recovers files and file systems. • Managing the User Environment — discusses the user account files passwd and group and demonstrates how to create, modify, and remove user accounts on the system; shows how xxiv
  • 25. About This Course to manage processes running on the system and manage user disk space. • Monitoring the System — discusses useful tools and utilities to monitor the system and diagnose system problems. • Using DECevent — describes the replacement utility for UERF on Alpha systems. This new utility has interfaces for command line, online display and a GUI. • Introducing SMP, LSM and Clusters — presents an overview of symmetric multiprocessing, Digital UNIX cluster products and the Logical Storage Manager. • Introducing Network Services — describes network services: DECnet network, NFS service, NIS (YP), the Domain Name Service, and Remote Installation Service. xxv
  • 26. About This Course Course Conventions Table 1 gives an explanation of the conventions used in this course. Table 1 Conventions Used in This Course Convention Meaning keyword Keywords and new concepts are displayed in this type. examples Examples, commands, options and pathnames appear in this type. command(x) Cross-references to command documentation include the section number in the reference pages. For example, fstab(5) means fstab is referenced in Section 5. $ A dollar sign represents the user prompt. # A number sign represents the superuser prompt. bold Within interactive examples, boldface type indicates user input. key The box symbol indicates that the named key on the keyboard is pressed. . . . In examples, a vertical ellipsis indicates that not all of the lines of the example are shown. [ ] In syntax descriptions, brackets indicate items that are optional. variable In syntax descriptions, this type indicates items that are variable. . . . In syntax descriptions, an ellipsis indicates the item may be repeated. xxvi
  • 27. About This Course Resources Students should use the following manuals and books as references for this course: • Your Digital UNIX system management documentation Digital UNIX Operating System, Version 4.0 Software Product Description Release Notes Technical Overview System Administration Digital UNIX Installation Guide Network Administration DEC Verifier and Exerciser Tool User’s Guide • Maurice Bach, (c) 1986, The Design of the UNIX Operating System, Prentice-Hall, ISBN 0-13-201799-7 • Douglas Comer, (c) 1991, Internetworking with TCP/IP, Volume I, Prentice-Hall, ISBN 0-13-468505-9 • Leffler, McKusick, Karels, and Quarterman, (c) 1989, The Design and Implementation of the 4.3BSD UNIX Operating System, Addison-Wesley, ISBN 0-201-06196-1 • Nemeth, Snyder, & Seebass, (c) 1989, UNIX System Administration Handbook, Prentice-Hall, ISBN 0-13-933441-6 • (c) 1991, Guide to OSF/1: A Technical Synopsis, O’Reilly & Associates xxvii
  • 28.
  • 29. 1 Introducing UNIX System Management Introducing UNIX System Management 1–1
  • 30. About This Chapter About This Chapter Introduction The system manager is the person behind-the-scenes of any computer site. Few users are aware of exactly how much the system manager does to make their login sessions easier. This chapter discusses the responsibilities of the system manager, which, though sometimes complicated, are really not so mysterious. Overall, a system manager is responsible for creating a smooth system environment. This includes providing the system tools users need to do their jobs, and keeping system performance at a high level. To accomplish these goals, a system manager must be knowledgeable about the system from both software and hardware aspects. Only in this way can you match the responsiveness of your current system to the needs of the people using it. This chapter is an introduction to managing a UNIX system. It provides an overview to operating system software — their components and functions. It describes the responsibilities of a system manager and the privileges of the superuser or root account. Finally, it demonstrates how to become the root user. Major topics discussed in this chapter are: • System manager responsibilities • Hardware that makes up this system • Software environment of the operating system • Internal functioning of the operating system • Use of the Common Desktop Environment (CDE) Objectives To describe the role of the system administrator and the UNIX system, you should be able to: • Identify system manager responsibilities • Describe the role of the UNIX operating system and its components • Describe the Digital UNIX features • Describe internal operating system functions related to system management • Describe the superuser and the root login procedure • Describe the Common Desktop Environment (CDE) interface 1–2 Introducing UNIX System Management
  • 31. About This Chapter Resources For more information on the topics in this chapter, see the following: • Nemeth, Snyder, & Seebass, (c) 1989, UNIX System Administration Handbook, Prentice-Hall, ISBN 0-13-933441-6, Chapters 1 and 3 describe system manager duties and privileges • Leffler, McKusick, Karels, and Quarterman, (c) 1989, The Design and Implementation of the 4.3BSD UNIX Operating System, Addison-Wesley, ISBN 0-201-06196-1, Describes the internal functions of the BSD based UNIX operating system • Maurice Bach, (c) 1986, The Design of the UNIX Operating System, Prentice-Hall, ISBN 0-13-201799-7, Describes the internal functions of the System V based UNIX operating system • Digital UNIX Operating System, Version 4.0 Software Product Description • Guide to OSF/1: A Technical Synopsis, (c) 1991, O’Reilly & Associates • The Design of the OSF/1 Operating System, Open Software Foundation, Prentice-Hall Introducing UNIX System Management 1–3
  • 32. System Manager Responsibilities System Manager Responsibilities Overview Every computer site designates a person to be responsible for the day-to-day operation of the computer system, including both software and hardware. This person is known as the system manager or system administrator. A site following the security guidelines of the US Department of Defense (DoD) Orange Book will divide these responsibilities between a system administrator and a security administrator. A large site may have a number of system operators to assist the system manager with the tasks. Some of these tasks are visible to users and, in fact, directly benefit them, such as creating user logins. Others are less obvious but no less important, such as storing copies of user files on tape for future use. Figure 1–1 System Manager Responsibilities Install and Configure the System Assist Users Shut Down and Start Up System Manage Disk Space Maintain Archives Control User Access Monitor the System Troubleshoot System Manager ZKOX−055000111−02−RGS The system manager needs special privileges to perform specialized tasks that affect the running of a system. The tasks of the system manager are described briefly in the following table. 1–4 Introducing UNIX System Management
  • 33. System Manager Responsibilities Table 1–1 System Manager Tasks Task Description Install and configure the system Installs distribution kit containing new software or software updates Configures the kernel or devices Shut down and start up the system Shuts down and starts up a system to perform maintenance Control user access Adds new users to the system’s user login and group files; modifies or deletes changed accounts Maintains an appropriate level of security on the system Manage disk space Maintains the file systems, checks disk usage and, if necessary, establishes disk quotas Maintain archives Provides an archive of user files and a continuity of information through the use of system backup and restore facilities Monitor the system Tracks system activity through online accounting procedures to determine how effectively system resources are being used Troubleshoot the system Identifies and resolves routine system problems involving hardware and software; repairs damaged file systems Assist users Much of a system manager’s day can be filled with user application problems and answering user’s questions Introducing UNIX System Management 1–5
  • 34. UNIX Software Environment UNIX Software Environment Overview An operating system can be viewed as a resource management program. Its primary purpose is to manage hardware and software resources in a way to maximize work capacity and productivity of the system. The UNIX operating system is often depicted as a series of layers, as shown in Figure 1–2. Figure 1–2 UNIX Layers Hardware Device Drivers Kernel Shell Application Programs ZKO−060000135−50−RGS The hardware is at the center. The operating system is the interface between the user process and the hardware. The UNIX kernel is minimized to provide those features that can only be performed within the operating system. If special system privileges are not needed, those operations will be done by auxiliary programs external to the kernel. The Digital UNIX operating system takes this one step further by breaking the kernel into two layers. The inner layer is the Mach operating system kernel; the outer layer adds UNIX services. Theoretically, this outer layer could be replaced by a layer providing some other operating system services. 1–6 Introducing UNIX System Management
  • 35. UNIX Software Environment When the system is running, the kernel is in main memory. The kernel is responsible for: • Process control and scheduling • Memory management • Device I/O • System error handling The shell surrounds the kernel and acts as a user interface. It handles: • Foreground and background execution • Pipes and filters • Configurable environment • Flexible command language • I/O redirection The Kernel The UNIX kernel is the central controlling program that provides basic system facilities. • The Digital UNIX kernel is the executable file /vmunix. • It is compiled from source files, object files and configurable parameters. • It is loaded into memory when the system boots. • It runs programs and manages resources. Once kernel initialization is complete and the various system daemons have been created and made runnable, the kernel waits for requests: • User programs requesting services from the kernel through system calls • Hardware devices getting kernel response through interrupts The kernel manages system resources, such as memory, the CPU, and devices for user processes. When you run a program, the UNIX operating system creates a process to handle it. Introducing UNIX System Management 1–7
  • 36. Digital UNIX Features Digital UNIX Features Digital UNIX Components The Digital UNIX operating system is a 64-bit advanced kernel architecture based on Carnegie Mellon University’s Mach V2.5 operating system kernel. It includes components from Berkeley Software Distribution (BSD) 4.3 and 4.4, System V, and other sources. The result is a simple, extensible kernel that was designed for parallel and distributed environments. The STREAMS facility makes it possible to write flexible, modular device drivers and is compatible with SVR4 STREAMS. The extensible run-time loader provides shared library support, support for memory mapped files, and dynamic module loading. Dynamically loading modules into an already running program enables device drivers and other system code to be loaded into a kernel without rebuilding or rebooting the system. The loader can also be extended to support multiple object module formats. The command set comes from the AIX operating system and is based on commands from BSD and System V operating systems. Digital UNIX Features Digital UNIX is based on OSF/1 R1.0, R1.1, and R1.2 technology, and the Motif R1.2.3 graphical user interface and programming environment. It provides numerous features to assist application programmers, including: • Symmetric Multiprocessing (SMP) Enables systems containing two or more processors to execute the same copy of the operating system and access common memory. • Multithread Support DECthreads provides a pthreads interface that complies with both the POSIX and DCE semantics. • Realtime Support Provides a kernel option to enhance the performance of realtime applications conforming to the POSIX standard. • Shared Libraries Provides a full complement of dynamic shared libraries based on System V semantics. • Memory Mapped Files Supports the Berkeley mmap function that allows an application to access data files with memory operations rather than file input and output operations. • Full features of the X Window System, Version 11, Release 6(X11R6). Provides X Window Display, X Window System Application Interface and Terminal Interfaces. 1–8 Introducing UNIX System Management
  • 37. Digital UNIX Features • Supports terminal servers using the LAT protocol. • Provides a number of scripts and GUI tools for system management tasks. Digital UNIX complies with numerous standards and industry specifications including: • The X/Open XPG4 and XTI • POSIX, FIPS and System V Interface Definition (SVID) Digital UNIX is compatible with Berkeley 4.3 and System V programming interfaces. It conforms with the OSF Application Environment Specification (ASE) that specifies an interface for developing portable applications that will run on a variety of hardware platforms. File System Support Digital UNIX supports the following file system types: • POLYCENTER Advanced File System (AdvFS) A journaled local file system that provides higher availability and greater flexibility that traditional UNIX file systems. • UNIX File System (UFS) Compatible with Berkeley 4.3 Tahoe release. • Network File System (NFS) Allows transparent file access over TCP/IP networks • Memory File System (MFS) Provides the same file system structure as UFS, but resides in virtual memory. • ISO 9660 Compact Disk File System (CDFS) A standard for volume and file structure for the interchange of information using CD–ROM. • File-on-File Mounting File System (FFM) Allows regular, character, or block-special files to be mounted over regular files (used primarily by SVR4). • /proc File System Allows running processes to be accessed and manipulated as files by ordinary system calls (compatible with SVR4). • /dev/fd File System (FDFS) A pseudo-file system layered beneath the virtual file system (UFS). Introducing UNIX System Management 1–9
  • 38. Digital UNIX System Internals Digital UNIX System Internals Overview To ensure the smooth operation of your Digital UNIX system, you should have some knowledge of the internal workings of UNIX. The following topics will help you to better understand the functions of your system. • User process creation • Daemons • Scheduling and priority • Paging and swapping • Block versus character I/O User Process Creation A program is an executable file, and a process is an instance of the program in execution. The kernel (/vmunix), the C shell csh and the vi editor are all programs. Two users can run the vi editor simultaneously (that is, two independent processes using one program). A process can create another process using the fork(2) system call. The process that invokes the fork is the parent process and the newly created process is the child process. When the system starts up (boots), the kernel is copied into memory and initialized. The kernel creates the init process. init is the ancestor of all user shells. It creates a process for each terminal port, and calls /etc/getty(8) to put a login message on the terminal. /etc/getty reads in the username and calls login to log in, or verify the user and execute the user shell. Unlike traditional single-threaded UNIX processes, Digital UNIX processes can be multithreaded. Multithreading and other parallelization are integral to the Mach kernel of the Digital UNIX operating system. Multiple threads can share an address space, file descriptors, and so forth. Therefore, threads require very little system overhead and provide improved performance. Note Further information on threads can be found in the Guide to DECthreads. When a user responds to the login prompt by entering his or her user name: 1. getty reads the user name and invokes /bin/login(1), passing the user name. 2. login prompts for the password, verifies the user, and invokes the shell listed in /etc/passwd. 1–10 Introducing UNIX System Management
  • 39. Digital UNIX System Internals 3. The shell interprets all user commands. When the user logs out, init updates the login history file /var/adm/wtmp and creates a new getty process listening on that port. The following figure illustrates the sequence of events for a user logging in to the Digital UNIX system from a terminal. Figure 1–3 Logging In to a Terminal "program" init init getty login ksh ksh pid 2345pid 2345 exit() exec() wait() => 2345 exit() exec() fork()=2345 fork()=1234 pid 1 wait()=>1234 Terminal Login ZKO−060000135−43−RGS exit()exit()exit() exec() exec()pid 1234pid 1234 pid 1234 Daemon Processes Another type of process is the daemon; daemon processes are not associated with any users but perform system functions, such as printer spooling, network control and time-dependent activities. Many daemons are started when the system boots. Process Environment: Scheduling and Priority UNIX is a timesharing system; it allows many processes to run at the same time. The kernel identifies each process by a process number, or process ID (PID). Process 0 is a special process created when the system boots. init has process ID 1. Executing the ps -f command shows the user processes, their PIDs and their parents’ PIDs, or PPIDs. You can see that each process has a parent, for example tty4 (Korn shell process) is the parent of the telnet process. You can also see by following backwards the PPIDs that tty3 (Korn shell process) is the ancestor of the ftp process. Introducing UNIX System Management 1–11
  • 40. Digital UNIX System Internals Figure 1–4 PID/PPID Numbers On a time-sharing system, the kernel allocates the CPU to a process for a period of time, called a time slice, and then switches to another process. The switch is called a context switch. The kernel, which is executing in the context or the environment of a process, saves the state of the process and enough information about the process and what it was doing to resume later where it left off. Every process has a scheduling priority. All processes start with some base priority (in the range 0 to 63); lower numbers represent higher priority. System processes have higher priority than user processes. The kernel picks the process with the highest priority to run next. Users can lower the priority of their own processes. The superuser can lower or raise the priority of processes. The system also adjusts priorities internally on a timesharing policy; a process that is using CPU time has its priority lowered, while a process that is waiting to run has its priority raised. This ensures that all waiting processes will get their turn to run. The ps lax command shows the user-adjusted priority (NICE column) and the system priority (PRI column). The timesharing policy has the goal of equitably sharing the processors among the various processes. Digital UNIX also supports a fixed-priority policy, where the goal is to provide preferential treatment to particular processes. For fixed-priority processes, the scheduler priority is equal to the base priority. 1–12 Introducing UNIX System Management
  • 41. Digital UNIX System Internals Real Time Processing A real-time process reacts to external events within a specified time limit, and reacts in a predictable way. Real-time tasks can vary from process control for manufacturing to simulators for flight training. Digital UNIX provides preemption and fixed-priority scheduling to support real-time processes. Preemption allows a high priority process to take control of the CPU if it becomes runnable while a lower priority process is currently executing. The real-time scheduling interface supports three policies that give the programmer the ability to select which class a process should belong to: • Timesharing - Standard Digital UNIX scheduling policy. Process priority is adjusted periodically by the kernel based on CPU usage and system load average. • FIFO - Fixed priority first-in first-out policy. If no higher priority process preempts, the process runs until it relinquishes the CPU through a blocking call; there is no quantum time limit. • Round-robin - Fixed-priority policy similar to FIFO, but adds a time quantum. A process must relinquish control of the CPU if it has used its quantum and another process of equal priority is ready to run. Memory Management: Paging and Swapping The kernel is in main memory along with the currently executing process. However, physical memory is a limited resource; generally not all active processes can fit into memory. Disk space is used as a secondary memory managed by paging and swapping. The paging/swapping area is set up during system installation and can be resident on a local disk or in the case of diskless workstations, on a disk available over the network. Programs can be written larger than physical memory up to some maximum size virtual memory. The hardware manipulates programs and data in lengths called pages. Special code translates the virtual memory page addresses to physical addresses. When the process tries to access data on a page not in physical memory, the kernel retrieves it from paging space on disk and overwrites a page in memory. The kernel keeps as many processes in physical memory as it can and lets each one execute during its time slice. (UNIX) swapping occurs when a process needs to be loaded into memory to be executed, but there is no room for it. Another process is swapped out, or saved to the swap area on disk to free up memory. Digital UNIX uses a slightly different notion of swapping. A process may consist of multiple threads sharing an address space. Swapping out a thread’s address space would make the other threads in the same process unrunnable. The swapout daemon scans the list of all threads to identify those that have been idle Introducing UNIX System Management 1–13
  • 42. Digital UNIX System Internals for more than 10 seconds. The pageout daemon can then free the memory pages associated with the thread’s kernel stack. The goal is still to free memory. And a thread must still be swapped in when it is made runnable. Block versus Character I/O When a process wants to access data from a file on a disk drive, the kernel brings the data into memory where the process can examine it, alter it and ask to store or rewrite it. Device drivers, or special code in the kernel controls the operation of peripheral devices. Mass storage devices such as disk drives are treated as block or character devices. A block device is a random-access storage device. A memory buffer, called the buffer cache, is used to read a block of bytes to the device at one time. This technique can reduce the amount of disk traffic and improve response time if processes tend to manipulate data within the same block. One disadvantage is that if the system halts suddenly, the updated buffer cache may not be written out to disk. A character device, also called a raw device, does not use the buffer. A disk device can be treated as both a block and a raw device and has a separate logical name for each. 1–14 Introducing UNIX System Management
  • 43. Superuser and the Root Login Superuser and the Root Login Superuser Privileges A UNIX system manager has special system privileges that exceed those of ordinary users. For this reason, the system manager is called the superuser. UNIX systems reserve the login name root (user ID 0) for the superuser. Root owns and controls many important system files and directories. As root, the superuser’s special system privileges include complete access to any file or directory as well as privilege to: • Override all file mode permissions • Bypass all normal security checks • Kill any existing process • Shut down the system Root Security Root is a very powerful user, so powerful that a system manager who carelessly uses its privileges can accidentally destroy an entire file system. Consequently, you should keep the root password a secret, known only to you and one (or more) experienced backup person at your site. This person should have the knowledge to perform system management responsibilities. To protect against potential superuser abuse, you should change the root password regularly with the passwd command. • Always log in as root using su because the system logs every set user to root attempt in /var/adm/sialog. • Perform nonprivileged commands as a nonprivileged user to prevent accidental system damage. • You can log in directly as root only on terminals set up as secure in /etc/securettys. Network terminals or LAT terminals should not be set up as secure for security reasons. Root Login Procedure While you can log in directly as root, the following is the suggested login procedure: 1. Log in under your personal login name. 2. Use the su command to set user ID to root. 3. When you have successfully entered the root password, the system returns the superuser prompt (#). 4. Change to the root or other directory. Press Ctrl/D to exit the root shell and return to your original shell. Introducing UNIX System Management 1–15