background image

Summary of Contents for Workstation 100U

Page 1: ...0 1109 01 Revision H of 12 March 1984 For Sun System Release 1 1 System Manager s Manual for the Sun Workstation Models 100U 150U Sun Microsystems Inc 2550 Garcia Avenue Mountain View California 94043...

Page 2: ...ork Mai Router was originally written by Eric Allman formerly of Project Ingres University of California at Berkeley SENDMAIL In allation and Operation Guide was originally written by Eric Allman form...

Page 3: ...150U Added information on subsystem set up system set up and operation and upgrading Revised hardware documentation and included Xylogics 450 disk controller Revised and updated installation procedure...

Page 4: ...ties Reference manual for system maintenance and operation commands Contains information related to system bootstrapping operation and maintenance and describes all the server processes and daemons wh...

Page 5: ...enance Guide gives unpacking and and set up directions ror new desktop and rackmount workstations and their subsystems walks you through UNIX installation procedures ror Sun systems and covers the bas...

Page 6: ...overed Chapter 7 Upgrading Sydem Software gives a brief review of how to upgrade your sys tem to a new software release level Chapter 8 HtJrdware Configuration and Ezpan ion describes the 7 slot Multi...

Page 7: ...al 800 0393 3COM 3C400 Multibus Ethernet Controller Reference Manual 800 0398 Sun Color Video Board User s Manual 800 0402 User s Guide for the Sun Workstation Mouse Subsystem 800 0415 Sun 1 4 Tape In...

Page 8: ...indows 800 1117 System Internals Manual for the Sun Workstation Notations Used In This Guide References to commands and utilities Crom the U er Manual or the Sun UNIX Sydem and the S ltem Inter ace Ma...

Page 9: ...gh examples which use certain formatting conventions In all these examples what the user types is shown in boldfaced text like this The system s response is shown in roman type like this Variable item...

Page 10: ...nt does not cover hardware upgrades it is intended for use with new systems If you are upgrading your 100 150 fol low the hardware upgrading procedures given in Sun s Upgrade Installation Guide BEFORE...

Page 11: ...Chapter 3 Subsystem Set Up 3 1 Chapter Installing UNIX for the First Time 4 1 Chapter 5 Installing UNIX on Systems without Tape Support 5 1 Chapter 8 System Set Up and Operation 8 1 Chapter 7 Upgradin...

Page 12: ...1 2 2 1 Physical Environment 2 2 2 2 2 Power Drain Requirements 2 2 2 3 Receipt and Unpacking Instructions 2 3 2 3 1 150U lvfonitor Unpacking 2 4 2 3 2 150U Card Cage Enclosure Unpacking and Mounting...

Page 13: ...18 4 3 10 3 Path 3 Non Standard Server Configuration 4 21 4 3 10 3 Configuration Worksheet for Path 3 4 21 4 3 10 3 Setup Walkthrough for Path 3 4 27 4 3 11 Booting the Full UNIX System 4 30 4 3 12 K...

Page 14: ...tting up the Postmaster Alias 6 11 6 2 3 Testing your Mailer Configuration 6 12 6 2 4 Diagnosing Troubles with Mail Delivery 6 12 6 3 System Log Configuration 6 13 6 4 Setting Up a UUCP Connection 6 1...

Page 15: ...8 11 8 7 Interphase 2180 Disk Controller 8 12 8 8 Nine Track Tape Controller 8 13 8 9 Quarter Inch Tape Controller 8 14 8 9 1 Tape Controller Multibus Memory 8 16 8 10 3COM Ethernet Controller Board 8...

Page 16: ...t of a Generic Abstract Disk 4 15 Table 4 6 Increase in pub Size to Accommodate Online Manual Pages Demos or Games 4 15 Table 5 1 Tape Device Abbreviations 5 2 T ble 5 2 Disk Device Abbreviations 5 2...

Page 17: ...cribed in this manual if you do you may void your warranty Please refer all servicing not described in this document to qualified service per sonnel If in doubt contact your authorized Sun service rep...

Page 18: ...nment OpertJting Non OpertJting Ambient Temperature 10 0 C _ 40 0 C _40 0 C _ 65 0 C Humidity 5 90 5 90 Non condensing Altitude 10 000 feet 40 000 feet 1 2 2 Power Drain Requirements Model 100U deskto...

Page 19: ...the rated capacity of the power supply can cause system malfunction which often shows up as glitches on the video screen and may damage the power supply 1 3 Receipt and Unpacking Instructions Note th...

Page 20: ...ou can then lift the workstation out of the bottom shipping material remove the plastic wrapping and place the workstation on its working surface We recommend that you save the salvageable shipping ca...

Page 21: ...sceiver and transceiver cable necessary to complete implementation of the Ethernet for a single workstation and an Ethernet Controller Reference Manual The coaxial cable necessary to implement a netwo...

Page 22: ...cting output peri pherals such as printers and plotters and can drive these output lines at speeds up to 19 2 Kbaud Both ports provide the CTS RTS DTR DSR and DCD control lines required by some device...

Page 23: ...d in this manual if you do you may void your warranty Please refer all servicing not described in this document to qualified service per sonnel If in doubt contact your authorized Sun service represen...

Page 24: ...t The Sun Model 150U is manufactured for the following physical environment Table 2 1 150U Physical Environment Operating N on Operating Ambient Temperature 10 0 C 40 0 C _40 0 C 65 0 C Humidity 5 00...

Page 25: ...wer supply can cause system malfunction which often shows up as glitches on the video screen and may damage the power supply 2 3 Receipt and Unpacking tnstructions The basic Model IibOU is shipped in...

Page 26: ...es in the top of the pack ing material Remove these item 3 Lift out the rubber and styrofoam packing material the fit is fairly tight try rocking it out At this point you may find a mouse and mouse pa...

Page 27: ...taining captive nuts and a set of bolts for bolting the unit into a standard 19 inch rack To mount the enclosure clip the clips into the holes in the vertical metal rail in the rack Then commandeer tw...

Page 28: ...tion plug one end of the transceiver cable into the IS pin D connector on the transceiver and the other end into the ETHERNET 10 MBIT connector on the card cage enclosure backplane Please note that th...

Page 29: ...ion a nd Ezpa n on chapter for wiring specifications The serial ports on the Sun Workstation were designed primarily for connecting output peri pherals such as printers and plotters and can drive thes...

Page 30: ...ve must be re set For an Interphase controller the proper settings are on DIP Switch 2 switches 2 4 5 and 7 ON switches 1 3 and 6 OFF on DIP Switch 3 switch 3 ON all others OFF For a Xylogics 440 or 4...

Page 31: ...the unit to the OFF position ALWAYS lock the heads by rotating this knob to the ON position before moving the drive even from table to table More detailed instructions are in the Fujitsu Microdisk Dri...

Page 32: ...To get to them unscrew the two Phillips screws on the chrome cover at the rear of the drive and lift off the cover The four terminator packs are the chips just behind the 60 pin com mand cable connec...

Page 33: ...ed S Before applying power to the subsystem you must unlock the spindle the actuator and the motor on the disk drive These are locked during shipment to protect the subsystem and must be locked any ti...

Page 34: ...he 60 pin cable connected to DISK COM MAND on the Sun Workstation backpanel must be inserted into location OM2 in the disk drive The narrower cable connected to DISK DATA on the Sun Workstation back p...

Page 35: ...the drive from the rack if mounted and lock the spindle If you can get to the top ot the PCB chassis the metal housing at the rear of the drive next to the motor without removing the drive from its mo...

Page 36: ...tor VCM at the rear of the drive near the cables there is a small label which says LOCK FREE to the right of this label as you look at the back of the drive is a Phillips screw Loosen the screw and ro...

Page 37: ...leaving the other sections OFF The drive address switch is a 4 section DIP switch located on the small circuit board near the left rear of the drive 3 Daisy chain the drives together using the comman...

Page 38: ...ont of the tape drive It will suddenly go all the way in with a definite click The tape is now ready for use To protect the tape from being written on turn the arrow that is on the left of the window...

Page 39: ...ed 5 Carefully cut and remove the non metallic band securing the Streaming Tape Unit s door 6 Remove the fillei blocks w hich are between the upper and lower PC board rear mounted hinges 7 Remove the...

Page 40: ...able pawl fastener Con tinuv turning the paw fastener clockwise until the unit is secure against the bumper assem bly 18 The TAPEMASTER tape controller inside the Sun Workstation card cage connects to...

Page 41: ...un s Upgrade Indal ation Guide before proceeding CAUTION If you are upgrading your system software rather than beginning for the first time read the Upgrading Syltem Software chapter BEFORE proceeding...

Page 42: ...operating sys tem This is on the tape in dump format and is loaded in by the tltr utility 6 A tar format dump of the u r man online manual sources u r game games and u r demo demonstra tion programs...

Page 43: ...he magnetic tape 3 Use the bootstrap program to load the diag utility from the magnetic tape 4 Format and label the disk with the diag utility 5 Use the bootstrap program to load the stand alone copy...

Page 44: ...tic tape ar Archive quarter inch tape For example a common configuration would load from the Archive quarter inch magnetic tape cartridge onto a Fujitsu disk driven from a Xylogics 450 disk controller...

Page 45: ...Sun s default network number of 192 9 200 Client s Hardware Ethernet Addres The hardware Ethernet address of each client is taken from the ID PROM on the Sun 2 CPU Board The address is a 6 byte hexade...

Page 46: ...at hand 4 3 1 2 Procedure for Existing Systems If you have an existing network of older Suns or mixed machines that you do not intend to upgrade compatibility with a 1 1 network may need addressing P...

Page 47: ...O Boot Now the standalone boot program is in control All programs that it loads in eventually return control to it When the bootstrap program loads another program it displays some numbers which are...

Page 48: ...Addresses for Disk Controllers Controller Type Interphase SMD 2180 Xylogics 450 440 Addre hez 1st Controller 2nd Controller 40 ee40 48 ee48 Next ditJlI wants to know the unit number of the disk Which...

Page 49: ...splays a list of its commands 4 3 4 1 Formatting the Disk Next you use diag 8 disk formatting function Begin by clearing any outstanding errors espe cially important if you are using an Interphase dis...

Page 50: ...ng label to write a label on the disk which was formatted in the discussion above When you give the command to dioll it asks if you want to use the logical partition map that is built in to the progra...

Page 51: ...the copy the copy program returns control to the bootstrap program Copy completed Boot 4 3 6 Booting the Mini UNIX System Next you tell the bootstrap program to boot the mini UNIX system from the disk...

Page 52: ...fies seconds The system echoes the date set back to you 4 3 8 Loading the Root File System Next tell the mini UNIX system to extract the real root file system from the tape with the fol lowing sequenc...

Page 53: ...storing the file system takes about six minutes with a 1 2 inch tape and fifteen with a 1 4 inch cartridge rm f a restoresymtable cd la dey MAKEDEV std di kO tapeO ptyO winO cd etc umount dev di kOa s...

Page 54: ...nformation You will use a different etup path if you are configuring A standalone system A network server with equal sized client partitions or A network server with different sized client partitions...

Page 55: ...e Maltl1 d Pages Demos or Games Manual Pages 2 1 MBytes Demos 3 75 MBytes Games 1 8 MBytes If you want to allocate equal amounts of disk space to each client read through the subsection Patla S Standa...

Page 56: ...Information 1 network disk server 2 standalone 3 standalone with remote tape Enter the number for your environment I You have a standalone system is this correct yIn y Note that the etup program asks...

Page 57: ...have these at hand before starting the dialogue The last phase of letup configuration requests inrormation about your tape subsystem Tape Information 1 1 4 SCSI tape st 2 1 2 magnetic tape mt 3 1 4 a...

Page 58: ...oke the etup program by typing the etup command Setup begins by requesting global information setup Sun Microsystems Configuration System Global Information 1 network disk server 2 standalone 3 standa...

Page 59: ...17M Partition size rounded to 17472K Enter the swap partition size nnnM or nnnK minimum is 4096K default is 6144K 8M Partition size rounded to 8288K Enter the number or clients on device xyO 1 3 2 Ent...

Page 60: ...Enter the name of the server IIUD The server s hostname is sun Is this correct y n y Note that you use your network number and your clients hardware Ethernet addresses esta blished at the outset of t...

Page 61: ...concrete with the letup program Basically the worksheet helps you deter mine your real storage resources the number of users you want to support how you want to allocate your rree disk space and cert...

Page 62: ...er Name U er Space Paging Space Hodnumber Ethernet A ddre Server dad 7 70MBytes 16 3MBytes 32 Not Needed Client 1 robbie 30 0MBytes 15 0MBytes 33 8 0 20 31 41 59 Client 2 chip 20 0MBytes 10 0MBytes 34...

Page 63: ...sks When you allocate partitioning remember to include the pub partition with the clients for disk units with pub partitions that etup s minimum values for client subpartitions are 4 MBytes file syste...

Page 64: ...er ______ U er U er Name U er Space Paging Space Ho tnum6er Ethernet A ddre Server 7 7MBytes 16 3MBytes Client 1 Client 2 Client 3 Client 4 Client 5 Total Partition Total Partition 0 Disk 0 0 Disk 1 S...

Page 65: ...ource disks When you allocate partitioning remembtt to include the puh partition with the clients ror disk units with pub partitions that letup S minimum values ror client subpartitions are 4 MBytes f...

Page 66: ...er ______ U er U er Name U er Space Paging Space Ho tnumber Ethernet Addre Server 7 7MBytes 16 3MBytes Client 1 Client 2 Client 3 Client 4 Client 5 Total Partition Total Partition 0 Disk 0 0 Disk 1 Se...

Page 67: ...up program and return to the shell this allows you to annihilate what you have done and start over if you have to After determining your environment letup gathers information about your disk configura...

Page 68: ...23408K bytes free 1 public 17472K Do you want to add or edit a partition y n l y Enter the partition type user swap other user Enter the user partition size nnnM or nnnK minimum is 4096K detault is 61...

Page 69: ...0 0 13 4 9 Client tycho 8 0 20 0 7 33 The clients and their addresses are 1 blaise 2 albert 3 isaac 4 johannes 5 immanuel 6 tycho 8 0 20 0 14 76 8 0 20 0 8 55 8 0 20 0 6 23 8 0 20 0 11 22 8 0 20 0 13...

Page 70: ...tup will prompt you to change to the second cartridge about two minutes into its back end routine Insert the second tape and type RETURN to continue the routine it takes approximately 25 minutes to co...

Page 71: ...w device drivers to the system since all the kernel object files required to build a new system are present For procedures see the Device Driver Tutorial in the Sun SlIltem Internal Manual 4 3 12 1 Ma...

Page 72: ...in your system configuration file either exactly as they stand or if commentary indicates variables with the variables adjusted to fit your system Device description lines are given and explained Ofte...

Page 73: ...ess accounting see 4ut 2 and 4cct 5 vmunix swap generic f Mandatory Speciry root and swap devices pty bk sysacct inet ether loop nd win128 dtop4 ms3 fPseudo tty s Needed ror network or window system f...

Page 74: ...J priority 4 Systech terminal MUX see mti 4 ieO at mbO csr Ox88000 priority 3 1st Sun 2 Ethernet Controller ieO at mbO csr Ox8COOO flags 2 priority 3 2nd Sun 2 Ethernet Controller ecO at mbO csr OxeOO...

Page 75: ...r xycO at mbO csr Oxee40 priority 2 disk xyO at xycO drive 0 device ropcO at mbO csr Oxee0800 priority 1 device zsO at mbO csr Oxeec800 flags 3 priority 2 cpu ports device ecO at mbO csr OxeOOOO prior...

Page 76: ...ng the manuals demos and games directories or it you do not wish to include this material in your system with the Net work Configurotion section in the S ltem Set up ond Operotion chapter The subsecti...

Page 77: ...another file of this type Contains a list of the files required to build the basic kernel file un Contains a description of the files required to build the specific Sun system You add the names of ne...

Page 78: ...es ident nome Gives the system identifier a name for the machine or machines that run this kernel nome must be enclosed in double quotes if it contains both letters and numbers Also note that if nome...

Page 79: ...ix root on xy 4 3 12 4 2 Device Description Lines The second class of line in the configuration file describes what devices your system has and what they are connected to for instance I have a Xylogic...

Page 80: ...xycT or on a drive number tor example drive f This allows redundancy as a single system can be built which will boot on different hardware configurations 4 3 13 Loading the Manuals Demos and Games Di...

Page 81: ...r xv man demo sames 4 3 14 The Next Step Unless you have to install UNIX on systems without tape drives procedure given in the follow ing chapter you have now completed the portion of installation in...

Page 82: ...rade Indallation Guide before proceeding CAUTION If you are upgrading your system software rather than beginning for the first time read the Upgrading Syltem Software chapter BEFORE proceeding here Th...

Page 83: ...ing that must be substi tuted at that point Italic characters are variables Two very important variables which you will see in the examples and have already seen if you have installed UNIX on your rem...

Page 84: ...76 Internet addresses consist of two parts a network number and a host number For remote installation you need the target s full Internet address and the remote host s host number in hexadecimal Netw...

Page 85: ...isk controller The lines should look like this user 0 0 dev d kOg 1 1 1 SOD Then enable the network disk server cd ldev MAKEDEVnd etc nd etc nd local Next make the u r disk into a public disk so that...

Page 86: ...respond with y or Y Diag first asks you a series of questions about the disk you will be using The answers to these questions configure diag to work with that specific hardware The first thing diag w...

Page 87: ...nalysis passes 5 Use five surface analysis passes for a completely new disk use one pass for a disk which has been formatted in the past and is known not to have any bad spots Formatting a disk takes...

Page 88: ...number O boot Boot ec O hod_number O stand copy messages displaying sizes of copy program Standalone Copy From ec O ho _number O minif To di k O O l The load process takes about four minutes This proc...

Page 89: ...eing used for the network number the remote host s host number is 1 and the target s host number is 23 By now you probably know your network number and have a host number ready to assign your target i...

Page 90: ...Your System At this point you invoke the letup program to configure your system Setup is essentially a system configurator in two parts it consists of an interactive ront end which gathen the informa...

Page 91: ...gram and return to the shell this allows you to annihilate what you have done and start over if you have to Next letup establishes your workstation s identity name and address Host Information Enter y...

Page 92: ...will destroy any existing files under lusr and any client partitions if you are a server Do you want to begin configuration yIn y Updating etc hosts A few lines of configuration messages If your dist...

Page 93: ...ation programs and r game direc tory games If these have been loaded on your remote host you can load all or part of these files if you want to Space may be a consideration r man consumes 2 1 MBytes r...

Page 94: ...r configuration Note that since each machine on a network must have a unique hostname associated with each unique Internet address a machine with two boards must have a second identity it must be assi...

Page 95: ...mory it may be desireable to disable the daemons or run them only on specific machines so that the space consumed by them can be made available for other purposes When running routed and rwhod are act...

Page 96: ...o lines just before it usr etc route add 0 gateway 1 echo usr etc route add 0 gateway 1 dev console Then find the following three lines and comment them out insert a before each line or remove them if...

Page 97: ...hine s hostname in your Ietclholt equ v file For example if my machine s hostname is gaia and I want to allow any one on host kepler to gain access to gaia I simply edit my Ietclholt equiv file as fol...

Page 98: ...ew workstation s running 1 1 or You have a machine which cannot perform ARP an older VAX for example and you want it to talk to your 1 1 Sun s If neither of these is the case don t worry about it To m...

Page 99: ...tra ifconfig line with each 1 1 machine s old 6 byte hexadecimal Ethernet address a You can obtain this address for a 3COM Ethernet Board by using the PROM Monitor to interrogate the Multibus memory s...

Page 100: ...bolic links to the files in private so the files can still be referenced by their normal name The files and directories so affected are listed below lusr lib sendmail cf usr lib aliases Iusr libIalias...

Page 101: ...pa If your workstation is on the Arpanet or shares an Ethernet with a machine on the Arpanet or with a machine on the Arpa Internet you should probably pick a name in the arpa domain and register it w...

Page 102: ...bsidiary machines 6 2 2 1 Configuring for Mail Forwarding Next you must define each machine s mailer configuration The following commands accom plish this Remember that if your machine is a file serve...

Page 103: ...ines that look like local UUCP connections not forwarded to mailhost CV Put the names of the local uucp sites on the end of the CV line or on additional CV lines For example CV rome prussia georgia Th...

Page 104: ...mail to postmaster s at other network sites if you have problems with mail that comes from there The line will look like this Following alias is required by the new mail protocol RFC 822 11 Set it to...

Page 105: ...ol uucp LOGFILE see the Uucp Implementation De cription in the Tutorial section of this manual Mail something to Postmaster on various machines and make sure that it comes to your usual mailbox so whe...

Page 106: ...aver 192 9 1 4 june 192 9 1 5 eldridge Now all datagrams sent to Ioghost from wally beaver etc are sent to krypton There might also be other aliases on the same line of the Idclholt entry like lprhost...

Page 107: ...ooljuucp C usr spool uucp D usr spoolluucp D ho tntJme usr spool uucp LOGFILE usr spool uucp SYSLOG directory for command C files directory for data D files directory for local D files log file of uuc...

Page 108: ...th have autodial units and ports install uuep as follows If you have only a dialup your situation will be different procedures are described near the end of this section For more information read the...

Page 109: ...VENTEL 1200 6728212 login EOT Iogin uucp ssword almama ucbarpa Any 20 ACUVENTEL 1200 6424351 login EOT Iogin uucp ssword netnut decvax Any ACUVENTEL 1200 6039941241 login EOT Iogin Ujedi ssword cannon...

Page 110: ...u don t need to specify all the information called for in the step only the first two fields of L y are necessary and in practice only the first field site name is looked at A typical L y for a pas si...

Page 111: ...nning the latest release of Sun software you have a B version If you aren t sure which version your contact site is running ask them before proceeding F Indicates that the fourth field is the name of...

Page 112: ...t number with leading zeros to allow updating of the file in place Active is automatically updated as new newsgroups come in For information on how to create new newsgroups see the Creating New New gr...

Page 113: ...sh cvt links sh usr lib news usr spool news 8 Clean out the old spool hierarchy hackster sh cvt clean sh usr spool news Several shell scripts and C programs are provided in the directory u r lib new c...

Page 114: ...versee the transfer of the job to the remote machine If the destination machine is unreachable the job will remain queued until it is possi ble to transfer the files to the spooling queue on the remot...

Page 115: ...spool vaxlpd lf usr adm lpd errs All of the above fields are explained on the printeap 5 manual page For more information on the entries for printers on serial lines and remote printers see the Line P...

Page 116: ...ptJ wd The procedure for adding a new user is described in tJddu er 8 You should add accounts for the initial user community giving each a directory and a pass word and putting users who will wish to...

Page 117: ...Dumping of the file systems should be done regularly since once the system is going it is easy to become complacent Complete and incremental dumps are easily done with etc dump see dump 8 Most people...

Page 118: ...and swapping activity disk and cpu utilization Ideally there should be few blocked b jobs there should be little paging or swapping activity there should be available bandwidth on the disk devices mos...

Page 119: ...rrent version of UNIX is rather primitive The resources consumed by any single process can be voluntarily limited by the mechanisms of etrlimit 2 Disk space usage can be monitored by duel No system en...

Page 120: ...c hosts equiv etc secpretty etc ttytj etc ttytype usr lib crontab usr lib aliases usr adm acct usr adm me 3sa ges usr adm shutdownlog usr adm wtm p Revision H or 12 March 1984 how disk partitions are...

Page 121: ...and uI lib so that you don t miss anything the first time around Table 7 1 Standard List of Files to Save when Upgrading profile Iogin I cshrc I rhosts Idev MAKEDEV local letc fstab letc gettytab etc...

Page 122: ...ape drive use IdeyIrarO If your system doesn t ha ve a tape drive you ll have to use slightly different commands also given below which access tape drive elsewhere on the network We ll call the machin...

Page 123: ...e Fir t Time except that you may skip the disk reformatting ph38e or if you are installing the rele38e on a machine without a tape drive in the chapter IndtJlling UNIX on S dem Without TtJpe Support T...

Page 124: ...me file modes you may want to add other options as described in the previous section For a machine with a drive 11 cd 11 tar xlp dev rtapel For a machine without a drive 11 cd r h remote_hod dd if dev...

Page 125: ...cord be ore opening up the Sun Workstation s enclosure To get to the Model 100U card cage first unscrew the six screws on the sides of the black cabinet Stand at the back of the Sun Workstation where...

Page 126: ...nsion Option lor the Standalone Workstation 1 MByte Additional Memory 1 1 4 Tape Controller 2 1 MByte Memory Ezpan8ion PI 3 Sun I CPU PI 4 1 MByte Main Memory PI Ii One board SMD Di8k Controller 8 7 M...

Page 127: ...e added to such a system but Sun ha only teded tho e configuration hown above Three principal con straints slots power and cooling affect the viability of a proposed configuration Also please note tha...

Page 128: ...signals as defined in IEEE stan dard 796 for the PI bus Various Sun cards use the P2 bus in different ways which may not be compatible with other vendors use of this bus In particular Sun processor an...

Page 129: ...color display controller consumes the most power and is best placed toward the center of the card cage In fact if there are unused slots in the cage one should be left open directly above the color co...

Page 130: ...ive slot number slot 1 is the highest priority In a parallel card cage bus master cards need not be physically adjacent 8 2 2 150U Multibus P2 Connectors The Model 150U card cage has three separate P2...

Page 131: ...CPU and Memory Boards If possible it should be placed toward the middle of the card cage to take advantage of the greater air circulation If there are unused slots in the cage leave one open to the im...

Page 132: ...after every Multibus cycle This is done by jumpering location J701 which is the second jumper from the left along the bottom of the board This also will cause three additional wait states for each Mul...

Page 133: ...with your Sun system or any similar null modem cable The null modem cable provided by Sun has pins 2 and 3 crossed 4 and 5 crossed and 6 and 20 crossed pins 1 Frame Ground and 7 Signal Ground are carr...

Page 134: ...MBytes total memory one board may be added to the basic system To configure a Memory Board you need only select its starting memory location at 0 or 1 MByte within the on board memory address space Do...

Page 135: ...rage module drives which are available from a number of manufacturers Sun Microsystems supports a family of such drives the Fujitsu M2312K and M2284 Microdisk Drives and the M2351 Mini Disk Drive If y...

Page 136: ...onnectors on its top four 26 pin connec tors and one 60 pin connector In the Model 100U card cage the Interphase board must be below the CPU for proper handling of bus arbitration if there is a 1 2 ta...

Page 137: ...E to F Sun recommends a maximum of one Interpnase disk controller board per system For the full specification and detailed description of the disk controller see the supplied docu ment SMD elBO Storag...

Page 138: ...t and 256 KBytes of Multibus memory with parity The tape controller is not a bus master and boards which are Rev C or greater may actually be placed in a slot between bus masters in the ModeI100U as t...

Page 139: ...uses eight consecutive bytes of Multibus I O space and this block of eight registers must be located on an eight byte boun dary DIP switch packages US3 and US6 decode address lines A1S through A3 Swi...

Page 140: ...left Two adjacent switches on U50 should be dosed This places the 256K bytes of memory on the 0 128K 256K 384K 512K 640K or 768K boundaries All other switches on package U50 should be opened If all sw...

Page 141: ...ting keyswitches 1 2 and 3 on the switch marked ADR19 to ON and the other switches to OFF The Sun Workstation expects to find the econd Ethernet board s memory at address Oxe2000 This address is selec...

Page 142: ...pt Level 14 13 12 11 10 0 8 14 13 12 11 10 0 8 I IIr I 2 3 4 5 6 7 2 3 4 5 6 7 Belore Alter To set the address of the board to 2000 in Multibus I O space replace the shunt between pins 1 and 2 of JPOI...

Page 143: ...On Self Test Procedures When system power is first turned on the monitor runs a quick self test procedure The test can have one of these results Critical errors are found The screen remains dark The e...

Page 144: ...hts freeze keep the same pattern for more than a minute or the sequence restarts from the beginning there is a critical hardware problem with the workstation The appropriate thing to do in this case i...

Page 145: ...e network Auto boot in progress Boot di k O O O Ymunix Load di k O O O boot Boot di k O O O vmunix Size 215040 24576 30916 bytes Sun UNIX 4 2 etc Di k is the device name of the best local or network d...

Page 146: ...n tum reads in the real boot program Once the real boot program is running it finds and reads in the program you wanted to run This process is more or less obvious depending what device you are bootin...

Page 147: ...on the specified server The correspon dence between this number and a real disk partition is defined in Ietclnd local on the server machine is the name of the file to boot are optional arguments A 3 3...

Page 148: ...t corner of the cartridge is set to prevent writing on the tape ar zzzz error The monitor or boot program is trying to boot from an Archive tape and encountered an unexpected error The status bytes ca...

Page 149: ...to boot after power on dev is the device type ctlr unit and Pdrt are the controller unit within controller and disk partition number Name is the name of the file to boot from if any option are argu me...

Page 150: ...e ee is the hexadecimal address of the interrupt vector used you can look it up on a Motorola 68010 or 68000 reference card or CPU manual to see what kind of interrupt has occurred otJtJtJotJ is the a...

Page 151: ...rror See Bus Error and Parity The preceding access was to a word in memory with a parity error in its lower byte Misplaced label on head n The monitor or boot program is trying to boot from a disk It...

Page 152: ...ot find it You can retry your boot command using instead of name to get a list of the names that exist in that directory null path The current program possibly the boot program has tried to open a fil...

Page 153: ...nter a space and type RETURN to get back to command mode Self Test completed successfully The monitor has completed its power on self test without finding any hardware prob lems Self Test found a prob...

Page 154: ...See Bus Error and Parity The preceding access was to a word in memory with a parity error in its upper byte ui i uoo uaabaud ubbbaud uuaaaaaa uecho The monitor is describing its console and serial po...

Page 155: ...ress where the data was read and or written For memory errors this is a physieal memory address for other errors the interpretation of this field depends on what subsystem was being tested Rdata is th...

Page 156: ...raps often require the use of mkproto 8 New devices are made in the dev directory when device drivers are added tp the system by using the m Jkedev 8 and mknod S commands If you have sOurce you will u...

Page 157: ...the system crashes clock daemon file system directory consistency check General purpose stand alone utility package collect system diagnostic messages to form error log incremental file system dump du...

Page 158: ...dump of the operating system sendmail sendmail 8 send mail over the internet sendnews sendnews 8 send news articles via mail shutdown shutdown 8 close down the system at a given time sticky sticky 8...

Page 159: ...ing is done To start accounting it should be created with length o On the other hand ir the file is left undisturbed it will grow without bound so periodically any information desired should be collec...

Page 160: ...ber bo8e Member is the member name whose value is desired and b08e is an odb register name which contains the base address of the structure For example to get the p pid field of the proc structure you...

Page 161: ...s about badly lormatted requests The C compiler complains il you relerence a structure member that does not exist It also complains about III belore array names these complaints may be ignored usr lib...

Page 162: ...meanings 1 Login name esmerelda 2 Encrypted password Set the user s password with posswd l 3 User ID 4 Group ID 5 This field is called the GeOS field from earlier implementation of UNIX and is tradit...

Page 163: ...odified are in fact identi cal to the swap space copies It also checks lor non overlap of the swap space and that the core map entries correspond to the page tables The state of the free list is also...

Page 164: ...fault vmunix With the d flag a super user may delete an entry for the host called h08tname The a flag is given to create an ARP entry for the host called h08tname with the Ethernet address ether_addr...

Page 165: ...de catman recreates the uar Db what database If there is one parameter not starting with a it is take to be a list of manual sections to look in For example eatman 123 only updates manual sections 1 2...

Page 166: ...he files to owner The owner may be either a decimal UID or a login name found in the password file Only the super user can change owner in order to simplify as yet unimplemented accounting pro cedures...

Page 167: ...comes a1lpcatable The primary purpose 01 this routine is to remove a file which lor some reason appears in no direc tQ II it is used to zap an i node which does appear in a directory care should be ta...

Page 168: ...associated terminal has the owner execute bit turned on by a biff y the offset is used as a seek offset into the appropriate mailbox file and the first 7 lines or 560 characters or the message are pri...

Page 169: ...you get any other error me88ages rrom config you should fix the probleJD8 in your configuration file and try again If you try to compile a system that had configuration errors you will probably not s...

Page 170: ...cify something of the form swap on xyO and xl 1 and xl 1g If no swap specification is given config assumes swapping should be done on the b partition of the root device Swapping areas may be almost an...

Page 171: ...ample xycO for a Xylogics controller or arO for an Archive quarter inch tape controller Con_dev is what the device you are specifying is connected to For example disk xyl is con nected to controller x...

Page 172: ...device mapping file ror Sun systems SEE ALSO BUGS The SYNOPSIS portion or each device entry in the section 4 pages or the System Interface Manual In the System Manager s Manual Kernel Configuration i...

Page 173: ...ered an error trying to write to the paging device or an error in read ing critical information from a disk drive You should fix your disk if it is broken or unreliable timeout table overflow This rea...

Page 174: ...nt system in a specified directory ror later perusal See 8lJvecore 8 ror details To analyze a dump you should begin by running lJd6 lS with the k flag on the core dump Normally the command intstack 4...

Page 175: ...are made available to the command as standard input Here are a few example lines from usr lib crontab to give you a better sense of the file s format o0 calendar 150 usr etc sa 8 dev null 0 30 usr etc...

Page 176: ...ame of the entry are reported Derault file systems vary with installation SEE ALSO sck 8 icheck 8 s 5 clri 8 ncheck 8 DIAGNOSTICS BUGS When a file turns up for which the link count and the number of d...

Page 177: ...ecognizes are clear dlaS Sends a restore command to a disk This is needed to manually reset disk errors Re initializes the diag program itself goes back to phase one of the inititialization process de...

Page 178: ...Toggles an option to turn timing on and off When timing is on diag reports on how long things take diag is less verbose in this state so it doesn t waste time displaying messages Reads and displays th...

Page 179: ...new messages since the last time it was run and places these on the standard output This is typically used with cron 8 to produce the error log usr adm messages by running the command etc dmesg usr ad...

Page 180: ...s 1600 W Dump tells the operator what file systems need to be dumped This information is gleaned from the files etc dumpdtJtea and etc lettJb The W option causes dump to print out ror each file system...

Page 181: ...eekly dumps a set of 5 tapes per dumped file system is used also on a cyclical basis Each month a level 0 dump is taken on a set of fresh tapes that is saved forever dev rrplg dev rmtS letc dumpdates...

Page 182: ...block and cylinder group information for the file system or special d vice specified The listing is very long and detailed This command is useful mostly lor finding 0 certain file system information...

Page 183: ...you want to know why e da1 B I give the number of days to use for a default expiration date II not given an installation dependent default often 2 weeks is used Note that you must use a space between...

Page 184: ...ON FASTBOOT 8 Fasthoot and fasthalt are shell scripts which reboot and halt the system without checking the file systems This is done by creating a file fasthoot then invoking the rehoot program The s...

Page 185: ...l return status and an automatic reboot will then fail For each corrected inconsistency one or more lines will be printed identifying the file system on which the correction will take place and the na...

Page 186: ...e with the operator s concurrence reconnected by placing them in the lost tound directory The name assigned is the inode number The only restriction is that the directory lost tound must preexist in t...

Page 187: ...tory Is do nothing specify password specify data connection port terminate session retrieve a file specify rename from file name specify rename to file name store a file specify data transfer structur...

Page 188: ...tory owned by the super user and unwritable by anyone The files PtJ88Wd 5 and group 5 must be present tor the Is command to work properly These files should be mode 444 ttp pub Make this directory mod...

Page 189: ...n the file hOBtB t d Gettable operates by opening a TCP connection to the port indicated in the service specification for nicname A request is then made for ALL names and the resultant information is...

Page 190: ...fying the system from gethostname 2 and the login message Then the user s name is read a character at a time If a null character is received it is assumed to be the result of the user pushing the brea...

Page 191: ...and alone not under control of the UNIX operating system With the PROM resident monitor in control of the system type the command b stand sxteat and the monitor boots the video test program into memor...

Page 192: ...out sandbagged inrormation to the disks and then stops the processor OPTIONS D q y SEE ALSO Prevents the sync berore stopping Do a quick hait no gracerul shutdown is attempted Needed ir you are tryin...

Page 193: ...ines in mapping network names to numbers The gGtewG1Is file is used by the routing daemon in identifying passive Internet gateways see routed 8C for an explanation If any of the flies lOCGlho8t8 locGl...

Page 194: ...ed Notice also that the words in the super block which indicate the size of the free list and of the i list are believed It the super block has been curdled these words will have to be patched The I o...

Page 195: ...r the hostname of a given machine present in the hostname database hosts S or the complete Internet address consisting of your system s network number and the machine s unique host number A typical In...

Page 196: ...erating system With the PROM resident monitor in control of the system type the command b atacd lmemte t and the monitor boois the memory test program into memory Imemte8t is completely self explanato...

Page 197: ...look at the socket where datagraOl8 arrive again only after this process completes The paradigms for such proceses are either to read off the incoming datagram and then fork and exit or to process the...

Page 198: ...user and execute the Shell Ultimately the Shell will terminate because of an end of file either typed explicitly or generated as a result of hanging up The main path of init which has been waiting fo...

Page 199: ...ed when the system was shutting down This is usually caused by a process which is stuck in a device driver due to a persistent device error condition dev console dev tty etc utmp usr adm wtmp etc ttys...

Page 200: ...a transrer completions and number o wijrds transferred are eounted or terminals collectively the number o input and output charac teJ18 are counted Also each sixtieth o a second the state or each disk...

Page 201: ...the contents of the profile buffers into a gmon out file r Reset all the profile buffers If the p flag is also specified the gmon out file is generated before the buffers are reset If neither b nor h...

Page 202: ...ven a list of the recognized commands abort all I printer Terminate an active spooling daemon on the local host immediately and then disable printing preventing new daemons from being started by lpr f...

Page 203: ...directories lock file for queue control SEE ALSO Ipd 8 Ipr l Ipq l Iprm l printcap 5 DIAGNOSTICS 48 1Ambiguous command Invalid command Privileged command abreviation matches more than one command no m...

Page 204: ...bout the daemon process ror lpr 1 lpq 1 and lprm 1 Arter the daemon ha 8 successfully set the lock it scans the directory for files beginning with cf Lines in each cl file speciry files to be printed...

Page 205: ...skip the file to be printed Lpd uses jlock 2 to provide exclusive access to the lock file and to prevent multiple deamons from becoming active simultaneously If the daemon should be killed or die une...

Page 206: ...uments create assorted collections or dev ices and are listed below td Create the standard devices for the system for example dev console dev tty local Create th08e devices specific to the local site...

Page 207: ...ower case letters and and The salt characters are repeated as the first two characters ot the output The remaining 11 output char acters are chosen from the same set as the salt and constitute the Dut...

Page 208: ...file system It must be a power of two currently selected from 4096 or 8192 FraSllse gives the fragment size or files on the file system The Irasslze represents the smallest amount of disk space that...

Page 209: ...f the special file is block type disks tape or c if it is character type other devices The last two arguments are numbers specifying the mojor device type and the minor device for example unit drive o...

Page 210: ...ify set user id mode or not The third is or for the set group id mode The rest or the mode is a three digit octal number giv ing the owner group and other read write execute permissions see chmod I Tw...

Page 211: ...unted read only or errors will occur when access times are updated whether or not any explicit write is attempted MOUNT OPTIONS I Mount the specified file system read only a Attempt to mount or unmoun...

Page 212: ...system may be specified by the optional jilesY8tem argument The report is in no Ufsetul order and probably should be sorted OPTIONS I numbers Report only th06e files whose i number8 follow a Print th...

Page 213: ...est The Ethernet address is given 38 siz hex bytes separated by colons e g 8 0 20 1 1 a3 At least one previous uler command must have been issued for the client The mazpack8 option may be given to set...

Page 214: ...ND 8C FILES etc nd local SEE ALSO nd 4p BUGS NTENANCECOMMANDS No sanity checking or disk partitions is done Sun Release 1 1 Last change 11 January 1984 ND 8C 59...

Page 215: ...ayed symbolically according to the data bases IetclhOltl and Ietclnetwor I respectively If a symbolic name for an address is unknown or if the n option is specified the address is printed in the Inter...

Page 216: ...MMANDS NETSTAT 8 SEE ALSO iostat 8 vmstat 8 hosts 5 networks 5 protocols 5 services 5 trpt 8C BUGS The notion ot errors is ill defined Collisions mean something else tor the IMP Sun Releastr 1 1 Last...

Page 217: ...SYNOPSIS newalla_ DESCRIPTION NEWALIASES 8 Newaliases rebuilds the random access data base for the mail aliases file usr lib aliases It must be run each time usr lib aliases is changed in order for th...

Page 218: ...to mk Options which may be used to override default parameters passed to mk s are 8 alze The size of the file system in sectors b bloek alze The block size of the file system in bytes I Iral alze The...

Page 219: ...LES BUGS 64 Do accounting tor the named printer Normally accounting is done tor the detault printer site dependent or the value ot the PRINTER environment variable is used pprice Use tht value price t...

Page 220: ...or and minor device number ot file system in which this inode resides Reterence count ot shared locks on the inode CNT DEV RDC WRC Reference count of exclusive locks on the inode this may be 1 it tor...

Page 221: ...ised ot anomalous behavior with vtJdvise 2 0040000 process is in a sleep which will timeout 0080000 unused 0100000 using old signal mechanism 0200000 process is owed a profiling tick 0400000 process i...

Page 222: ...ISC Line discipline blank is old tty OTTYDISC or new tty for NTTYDISC or net Cor NETLDISC see bk 4 u print inCormation about a user process the next argument is its address as given by p8 I The procel...

Page 223: ...ource of tables SEE ALSO BUGS 68 ps I stat 2 fs 5 K Thompson UNIX Implementation It would be very useful if the system recorded maximum occupancy on the tables reported by T even more useful if these...

Page 224: ...OPTIONS FILES D Run the pipeline neheek fllesystem Isort OD I quot D ftlesystem to produce a list of all files and their owners e Print three co umnfj giving file size in blocks number of files of th...

Page 225: ...air succeeds then the second part of re is run The second part or re which is run after a auto reboot succeeds and also if re is invoked when a single user shell terminates see init 8 starts all the d...

Page 226: ...Typically rdate can be inserted as part of your Ietelre loeal startup script SEEALSP timed 8C BUGS Could be modified to accept a list of hostnames and try each until a valid date returned Better yet w...

Page 227: ...n avoids the sync It can be used if a disk or the processor is on fire q reboots quickly and ungracefully without first shutting down running processes Power taU and crash recovery Normally the system...

Page 228: ...rmines the article title sender and news group and gives the body to inews with the right arguments for insertion If newBgroup is omitted the to line or the letter is used It Bender is omitted the sen...

Page 229: ...incre35e their nice value within the range 0 to PRIO_MIN 20 This prevents overriding administrative fiats The super user may alter the priority or any process and set the priority to any value in the...

Page 230: ...the named file matches a directory whose contents had been written onto the tape and the h key is not specified the directory is recursively extracted The owner modification time and mode are restored...

Page 231: ...fies the blocking factor for the restore The blocking factor is taken from the next argument on the command line This corresponds to the b key in dump 8 d Turns on debugging output v This is the verbo...

Page 232: ...e a tape that does not begin its coverage where the previous incremental tape left off or that has too high an incremental level has been loaded Tape read error while restoring filename Tape read erro...

Page 233: ...R execd then validates the user 38 is done at login time and if the authentication was suc cessful changes to the user s home directory and establishes the user and group protec tions of the user If...

Page 234: ...BUGS Indicating Login incorrect as opposed to Password incorrect is a security breach which allows people to probe a system for users with null passwords A facility to allow all data exchanges to be...

Page 235: ...ess then proceeds with the authentication process as described in rshd 8C but ir automatic authentication rails it reprompts the user to login as one finds on a standard terminal line The parent or th...

Page 236: ...ed via uucp IC collapsing From lines in the form gen erated by binmtJil l into a single line of the form return path sender and passing the processed mail on to 8enclmtJil 8 RmtJil is explicitly desig...

Page 237: ...e Close the currently open device The device specified is ignored L whenee offset W count Perform an leeek 2 operation using the specified parameters The response value is that returned from the lseek...

Page 238: ...C MAINTENANCE COMMANDS RMT 8C SEE ALSO rcmd 3N rexec 3N mtio 4 dump 8 restore 8 BUGS People tempted to use this Cor a remote file access protocol are discouraged Sun Release 1 1 Last change 4 March 19...

Page 239: ...c should be greater than O All symbolic names specified for a deBtintJtion or gtJtewtJlI are looked up first in the host name database hOBtB 5 If this lookup fails the name is then looked for in the n...

Page 240: ...n the existing routing table entry That is updated inCormation is being received from the very internetwork router through which packets for the destination are being routed The existing entry in the...

Page 241: ...Ietclgateways is comprised of a series of lines each in the following format net Iho t name1 lateway name metric value pas lve Iactive The net or ho t keyword indicates if the route is to a network o...

Page 242: ...on the initial socket This user name is interpreted as the user identity on the eHent s machine 7 A null terminated command to be passed to a shell is retrieved on the initial socket The length or the...

Page 243: ...entry for the user name existed Permla lon denied The authentication procedure described above failed Can t make pipe U The pipe needed for tbe tderr wasn t created Tr again II A fork by the server fa...

Page 244: ...int we_idle wd_we 1024 sizeof struct whoent J All fields are converted to network byte order prior to transmission The load averages are as cal culated by the w l program and represent load averages o...

Page 245: ...ANCE COMMANDS RWHOD 8C SEE ALSO rwho IC ruptime IC BUGS Should relay status information between networks People often interpret the server dying as a machine going down 90 Last change 28 October 1983...

Page 246: ...options fields labelled tio tor total I O operations k sec tor cpu storage integral kilo core seconds au and s for user and system cpu time alone both in minutes will sometimes appear OPTIONS a Place...

Page 247: ...ch command used n times or fewer Await a reply from the terminal if it begins with y add the command to the ca tegory junk This is used to strip out garbage usr atlm acct raw accounting SEE ALSO ac S...

Page 248: ...h grows every time Bavecore is run in that directory Before Bavecore writes out a core image it reads a number from the file dirname minfree If there less free space on the filesystem which contains d...

Page 249: ...llname tname hN D 0 value 94 Go into ARPANET mode All input lines must end with a CR LF and all messages will be generated with a CR LF at the end Also the From and Sender fields are examined for the...

Page 250: ...delivery and q tor queue only that is actual delivery is done the next time the queue is run Try to automatically rebuild the alias database if necessary Set error processing to mode z Valid modes are...

Page 251: ...ould not be sent immediately but was queued If invoked as newaliases sendmail rebuilds the alias database If invoked as mailq sendmail prints the contents of the mail queue E cept for usr lib sendmail...

Page 252: ...stintJtion An N is prepended to each line for decoding by uurec l OPTIONS 0 handle old format articles a used for sending articles via the ARPANET It maps the article s path from UUCphoBt zZZ to zzzQt...

Page 253: ...in less than 5 minutes logins are disabled by creating etc nologin and writing a messa ge there If this file exists when a user attempts to log in login l prints its contents and exits The file is rem...

Page 254: ...le be deleted Directory entries can be removed so long as one link remains Sharable files are made by the z option or Id I To replace a sticky file that has been used do 1 Clear the sticky bit with ch...

Page 255: ...wap devices available 80 that the paging and swapping activity is inter leaved acroas several d evices Normally the a argument is given causing all devices marked as sw swap devices in etc fltab to be...

Page 256: ...the 8ync system primitive Sync can be called to insure all disk writes have been completed before the processor is halted in a way not suitably done by rehoot 8 or halt 8 See 8ync 2 for details on th...

Page 257: ...k failures These could be logged in a separate file so that critical conditions could be easily scanned these represent error conditions such as soft disk failures etc such messages contain critical i...

Page 258: ...minate signal It logs that it is going down and then waits approximately 10 seconds for any additional messages to come in There are some special messages that cause control functions N sets the defau...

Page 259: ...nal implementing the TELNET protocol and passing characters between the client and login process When a TELNET session is started up telnetd sends a TELNET option to the client side indicat ing a will...

Page 260: ...rates at the port indicated in the tftp service description see services 5 and is invoked each time a datagram reaches this port by the internet server inetd 8C Due to the lack or authentication inror...

Page 261: ...ol The time server operates at the port indicated in the time service description see 8ervice8 S and is invoked by inetd 8C each time there is a connection to the time server SEE ALSO BUGS 106 service...

Page 262: ...he values of the source and destination addresses for each packet recorded The recommended use of Irpl is as follows Isolate the problem and enable debugging on the socket s involved in the connection...

Page 263: ...nder group The intent is to prevent any single file from using up all the blocks in a single cylinder group thus degrading access times for all files subsequently allocated in that cylinder group The...

Page 264: ...is a program that executes the Bync 2 primitive every 30 seconds This insures that the file system is fairly up to date in case of a crash This command should not be executed directly but should be ex...

Page 265: ...38 the file prefix Up to 10 p arguments may be specified A p without any pre rollowing deletes all files older than the specified time Dtime Files whose age is more than time hours are deleted if the...

Page 266: ...via mail SYNOPSIS uurec DESCRIPTION UUREC 8 uurec reads news articles on the standard input sent by 8endnew8 8 decodes them and gives them to inew8 l tor insertion SEE ALSp inews l readnews l recnews...

Page 267: ...the password file is already being edited then you will be told to try again later The vi editor will be used unless the environment variable EDITOR indi cates an alternate editor Vipw performs a numb...

Page 268: ...umber of processes in each of the three following states r in rUD queue b blocked for resources i o paging etc w runnable or short sleeper 20 secs but swapped memory Reports on usage or virtual and re...

Page 269: ...umber of pages of virtual memory involved in each kind of fork Display the contents of the Bum structure giving the total number of several kinds or paging related events which have occurred since boo...

Page 270: ...ilding Profiled Kernels 4 1 7 Configuring Systems without Source 5 1 8 Adding New Device Drivers 5 2 Configuration File Syntax 6 2 1 Global Configuration Parameters 6 2 2 Kernel Image Parameters 7 2 3...

Page 271: ...D I Compile Time Rules 21 D 2 Run time Calculations 22 D 3 System Size Limitations 22 ii...

Page 272: ...he second describes the syn tax of the configuration file Appendix A gives the grammar for config files Appendix B describes defaulting rules used dur ing the bootstrap process Appendix C give sample...

Page 273: ...ou can edit to suit your particular system configuration The configuration file must have the same name as the directory in which the configured kernel is to be built Further config assumes this direc...

Page 274: ...r kernel it will terminate with a message of the form Don t forget to run make depend This is a reminder that you should change your working directory to the configuration directory for the kernel jus...

Page 275: ...c In these cases it is possible for ker nels to share relocatable object modules which are not configuration depende lt most of the modules in the directory 8Y 8Y are of this sort To share object modu...

Page 276: ...to the kernel The following lines from the GENERIC config file must be in every config file for object only distributions machine sun cpu SUN2 options INET pseudo device inet pseudo device ether pseu...

Page 277: ...at the top of the generic makefile A line of the form options FUNNY HAHA generates global define s DFUNNY DHAHA in the resul tant makefile An option may be given a value by following its name with the...

Page 278: ...d config will use builtin rules to select default unit numbers and file system partitions The defaulting rules are dependent on the overall system configuration For example the swap area need not be s...

Page 279: ...number indicated on the front of something like a disk the logical unit number is used to refer to the UNIX device not the physical unit number The device info clause specifies how the hardware is co...

Page 280: ...d hardware To include any of these pieces a pseudo device specification must be used A specification for a pseudo device takes the form pseudo device device name howmany Examples of pseudo devices are...

Page 281: ...configuration specifications ConfiLspec machine ID Icpu ID Ioptions Opt_list I ident ID ISystem_spec Itimezone NUMBER dst NUMBER Itimezone 1FPNUMBER dst NUMBER I maxusers NUMBER system configuration...

Page 282: ...BER Approximately the C language specification for an integer number That is a leading Ox indicates a hexadecimal value a leading 0 indicates an octal value otherwise the number is expected to be a de...

Page 283: ...fication is incomplete e g hpO Type Partition root a swap b args b dumps b B I Multiple Swap Paging Areas When multiple swap partitions are specified the system treats the first specified as a primary...

Page 284: ...y Number and dst are variable 1 Mandatory Number may vary I Mandatory INET means include Internet code IOptional include only with pseudo device sysacct Controls inclusion or code to do process accoun...

Page 285: ...t mbO csr Oxe8000 priority 3 bwtwoO at mbO csr Ox700000 priority 3 bwoneO at mbO csr OxcOOOO priority 3 vpO at mbO csr Ox400 priority 2 vpcO at mbO csr Ox480 priority 2 vpcO at mbO csr Ox500 priority...

Page 286: ...device pseudo device pseudo device pseudo device controller device device device device device 7 January 1984 sun SUN2 ND100 8 dst 2 INET vmunix root on nd pty inet ether loop nd win32 dtopl msl kbl...

Page 287: ...ontroller device device device device device device device sun SUN2 NDI20 8 dst 2 INET vmunIX root on nd pty inet ether loop nd win32 dtopr msl khl mhO at nexus ropcO at mhO csr Oxee0800 priority 1 sk...

Page 288: ...1984 sun SUN2 SDST120 8 dst 2 INET vmunix root on sd pty inet ether loop win32 dtopl ms1 kbl mbO at nexus scO at mbO csr Ox80000 priority 2 sdO at scO drive 0 flags 0 stO at scO drive 32 flags 1 ropcO...

Page 289: ...ce pseudo device controller controller disk device device device device device sun SUN2 XYIOO 8 dst 2 INET vmunlX root on xy pty inet ether loop win32 dtopl msl kbl mbO at nexus xycO at mbO csr Oxee40...

Page 290: ...ce controller controller disk device device device device device device 7 January 1984 sun SUN2 XYAR100 8 dst 2 INET vmunlX root on xy pty inet ether loop win32 dtopl msl kbl mbO at nexus xycO at mbO...

Page 291: ...ce sun SUN2 XYMTI50 8 dst 8 INET SYSACCT vmunix root on xy pty bk sysacct inet ether loop nd win32 dtopl msl khl mbO at nexus xycO at mbO csr Oxee40 priority 2 xyO at xycO drive 0 xy1 at xycO drive 1...

Page 292: ...by users as well as directory files being read or written by the system and files associated with bound sockets in the UNIX ipc domain This is defined as NPROC 16 MAXUSERS 32 nfUe The number of file t...

Page 293: ...pages of file system bufIef5 is allocated The number of buffers to be allocated can be forced to a specific value by patching the kernel variable nbufwith adb adb w Ivmunix nbuf W Ot32 nbuf 0 20 q set...

Page 294: ...3 Free Block Checking 5 2 4 Checking the Inode State 5 2 5 Inode Links 5 2 6 Inode Data Size 6 2 7 Checking the Data Associated with an Inode 6 2 8 File System Connectivity 7 A Fsck Error Conditions...

Page 295: ......

Page 296: ...83 this section gives a brief overview 1 1 Superblock A file system is described by its uper block The super block is built when the file system is created see new 8 and never changes The super block...

Page 297: ...ts for files a block map describing available blocks in the cylinder group and summary information describing the usage of data blocks within the cylinder group A fixed number of inodes is allocated f...

Page 298: ...e system such as a write the data to be written is copied into an internal in core buffer in the kernel Normally the disk update is handled asynchronously the user process is allowed to proceed even t...

Page 299: ...ction A quiescentt file system may be checked for structural integrity by performing consistency checks on the redundant data intrinsic to a file system The redundant data is either read from the file...

Page 300: ...ked for inconsistencies involving format and type link count duplicate blocks bad blocks and inode size Each inode contains a mode word This mode word describes the type and state of the inode Inodes...

Page 301: ...iated with the inode The consistency of the byte size field is roughly checked by comput ing from the size field the maximum number of blocks that should be associated with the inode and comparing tha...

Page 302: ...ompson78 28 July 1983 References Dolotta T A and Olsson S B eds UNIX U er Manual Edition 1 1 January 1978 Joy W Cooper E Fabry R Lemer S McKusick M and Mosher D Sydem Interlace Overview University of...

Page 303: ...e organized by the P uJle of the I ek program in which they can occur The error conditions that may occur in more than one Phase will be discussed in initialization A 2 Initialization Before a file sy...

Page 304: ...OK prompt are YES Ignore this error condition NO ignore this file system and continues checking the next file system given One of the following messages will appear MAGIC NUMBER WRONG NCG OUT OF RANG...

Page 305: ...d The disk is write protected See a guru Possible responses to the CONTINUE prompt are YES attempt to continue to run the file system check Often however the problem will persist This error condition...

Page 306: ...tion in Phase 2 and Phase 4 EXCESSIVE BAD BLKS 1 1 CONTINUE There is more than a tolerable number usually 10 of blocks with a number lower than the number of the first data block in the file system or...

Page 307: ...the count is corrected Possible responses to the CORRECT prompt are YES replace the block count of inode 1with Y NO ignore this error condition A 4 Phase 1B Rescan tor More Dup s When a duplicate bloc...

Page 308: ...Phase lb have found duplicate blocks or bad blocks in the root inode usually inode number 2 for the file system Possible responses to the CONTINUE prompt are YES ignore the DUPS BAD error condition i...

Page 309: ...prompt are YES the directory entry F is removed NO ignore this error condition A 6 Phase 3 Check Connectivity This phase concerns itself with the directory connectivity seen in Phase 2 This section li...

Page 310: ...NNECTED PARENT WAS I IB This is an advisory message indicating a directory inode 11 was successfully connected to the 1061 found directory The parent inode Ie of the directory inode 11 is replaced by...

Page 311: ...ll always invoke the CLEAR error condition in Phase 4 Check size and contents of 10 found This error is fatal if the file system is being preen ed LINK COUNT FILE 1 OWNER 0 MODE MSIZE S MTIME T COUNT...

Page 312: ...ed Possible responses to the CLEAR prompt are YES de allocate inode I by zeroing its contents NO ignore this error condition BAD DUP FILE 1 1 OWNER 0 MODE MSlZE SMTIME T CLEAR Phase 1 or Phase 1b have...

Page 313: ...other inodes or that are out or the legal range ror the file system This error is ratal ir the file system is being preen ed Possible responses to the CONTINUE prompt are YES ignore the rest of the f...

Page 314: ...frags Z blocks This is an advisory message indicating that the file system checked contained V files using W fragment sized blocks leaving X fragment sized blocks free in the file system The numbers...

Page 315: ......

Page 316: ...d semantics of resource identification change Certain spe cial cases can be handled trivially by ad hoc techniques such 38 providing network names that appear local to hosts on other networks 38 with...

Page 317: ...do actual delivery should be used whenever possible This goal derives as much rrom political and practical considerations as technical Easy expansion to fairly complex environments including multiple...

Page 318: ...ers at minimum cost In this sense sendmail resembles the Message Processing Module fMPM of PosteI79bJ 2 2 Interfaces to the Outside World There are three ways sendmail can communicate with the outside...

Page 319: ...idation as possible of the addresses is done at this step syntax is checked and local addresses are verified but detailed checking of host names and addresses is deferred until delivery Forwarding is...

Page 320: ...emory image can be provided This provides a compiled rorm of the configuration file 3 USAGE AND IMPLEMENTATION 3 1 Argument Arguments may be flags and addresses Flags set various processing options Fo...

Page 321: ...Only names that parse as local are allowed as aliases this guarantees a unique key since there are no nicknames lor the local host 3 3 2 Forwardlns After aliasing recipients that are local and valid a...

Page 322: ...t to and various other parameters This control file is formatted as a series of lines each describing a sender a recipient the time of submission or some other salient parameter of the message The hea...

Page 323: ...ostel representing the address posteIGusc isif or it falls off the end When a pattern matches the rule is reapplied until it rails The configuration file also supports the editing or addresses into di...

Page 324: ...il has the concept or each or these stages they are integrated into one program whereas in MMDF they are split into two programs 4 3 Mesaage Proeeaalnl Module The Message Processing Module MPM discuss...

Page 325: ...stan dard tasks correctly but this would solve the general case It might be desirable to implement some form of load limiting I am unaware 01 any mail system that addresses this problem nor am I awar...

Page 326: ...cker D H Vittal J J Pogran K T and Henderson D A Jr Standard for the Format of ARPA Network Tezt MeBBageB RFC 733 NIC 41952 In Feinler78 November 1977 Crocker D H Framework and FunctionB of the MS Per...

Page 327: ...t 1982 Schmidt E An Introduction to the Berkeleu Network University of Cal ifornia Berkeley California 1079 Shoens K Mail Re erence Monuol University of California Berkeley In UNIX Programmer s Manual...

Page 328: ...SENDMAIL INSTALLATION AND OPERATION GUIDE Version 4 2...

Page 329: ...liases 4 2 NORMAL OPERATIONS 4 2 1 Quick Configuration Startup 4 2 2 The System LOI 4 2 2 1 Format f 2 2 2 Levels 4 2 3 TheMail Queue 2 3 1 Printing the queue 4 2 3 2 Format of queue files 4 2 3 3 For...

Page 330: ...itions 13 5 2 The Semantics 13 5 2 1 Special macros conditionals 13 5 2 2 Special classes 15 5 2 3 The lelt hand side 15 5 2 4 The right hand side 15 5 2 5 Semantics of rewriting rule seta 16 5 2 6 Ma...

Page 331: ...ll endmail and keep it happy Section three describes some parameters that may be safely tweaked Section four has inrormation regarding the command line arguments Section 8ve contains the nitty gritty...

Page 332: ...ake all binaries and install them in the standard places The second mfJke command must be executed as the superuser root 1 3 Inltallatlon by Hand Along with building a configuration file you will have...

Page 333: ...dev console The cd and rm commands insure that aD lock files have been removed extraneous lock files may be left around if the system goes down in the middle 01 processinl a message The line that actu...

Page 334: ...do Ioginl SIl lo installation is performed by the elup proaram durinl 8nt time UNIX install tion lor Sun systems There is a large amount of information that CaD be logged The log is arranged as a succ...

Page 335: ...tax as header definitions in the configuration file R A recipient address This will Dormally be completely aliased but is actually realiased when the job is processed There will be one line for each...

Page 336: ...spool mv mqueue omqueue mkdir mqueue chmod 777 mqueue You should then kill the existinl daemon since it will still be processinl in the old queue directory and create a new daemon To run the old mail...

Page 337: ...ail wiD access the database it checks to insure that this entry exists1 It will wait up to Bve minutes lor this entry to appear at which point it wiD force a rebuild itsell2 1 4 3 List owner If an err...

Page 338: ...Appendix A Some important arguments are described here 3 1 Queue Interval The amount at time between torkinl a procell to rUD through the queue is defined by the q Bag II you run in mode or a this Ca...

Page 339: ...example usr lib sendmail oT2m sets the T timeout option to two minutes for this run only 4 TUNING There are a number of configuration parameters you may want to change depending on the requirements o...

Page 340: ...on your machine but means that delivery may be delayed for up to the queue inte aI Mode b is probably a good compromise However this mode CaD cause larle numbers of proeesses if you have a mailer that...

Page 341: ...starts up rather than easy for a human to read or write On the future project list is a configuration 6le compiler An overview of the configuration file is liven 8rst followed by details of the seman...

Page 342: ...ds It is permissible to split them among multiple lines for example the two forms and CHmonet ucbmonet CHmonet CHucbmonet are equivalent The second form reads the elements of the class c from the name...

Page 343: ...an one 01 these lines 1 8 P precedence definition Values or the Precedence field may be defined using the P control line The syntax 01 this field is Pname num When the name is round in a Precedence fi...

Page 344: ...endmail s pid I Protocol used Sender s host name t A numeric representatioD 01 the current time u The recipient user y The version Dumber 01 endmtJil w The hostname of this site x The rull name of the...

Page 345: ...with endmtJil and the sending hostname these are not supported in the current version Conditionals can be specified usinl the syntax x text 1 text2 This interpolates lezU if the macro Ix is set and l...

Page 346: ...et seveD and cODtinUes the is necessary to avoid an infinite loop 5 2 5 Semantlea or r rltm rule leta There are five rewritiDI sets that have speciflc semantics These are related as depicted by Figure...

Page 347: ...lved by changing an existing table In any case it is critical that you understand what it is that you are trying to do and come up with a philosophy tor the configuration table This section is intende...

Page 348: ...ical site on the Berkeley local ether network is monet Monet has a list 01 known ethemet hosts it it receives mail lor any 01 them it can do direct delivery II it receives mail lor any unknown host it...

Page 349: ...distinluished root The elements 01 the path need not be physical hosts the domain is logical rather than physical For example at Berkeley one legal host is a cc berteley arpa Readinl from right to le...

Page 350: ...01 the mailer Each mailer must have an internal Dame This CaD be arbitrary except that the names local and prog must be deftned The pathname 01 the mailer must be liveD iD the P fteld II this mailer...

Page 351: ...apes r n 1 b may be used Finally an argv template is given as the E field It may have embedded spaces If there is no argv with a umacro in it entlmail will speak SMTP to the mailer If the pathname for...

Page 352: ...mode to z Operation modes are m Deliver mail delault a Run in arpanet mode see below s Speak SMTP on input side d Run 88 a daemon t Run in test mode v Just verily addresses don t coDect or deliver i...

Page 353: ...sing bl Dispose of errors usinl mode z The values for z are p Print error messages default q No messages just give exit status m Mail back errors w Write back errors mail if user not lOlled in eMail b...

Page 354: ...s control the the client under any circumstances Ttime Set the queue timeout to lime After this inte a1 messa es that have not been 8uccesslully sent wiD be returned to the sender tS D Set the local t...

Page 355: ...case should be preserved in b08t names for this mailer A This is an Arpanet compatible mailer and all appropriate modes should be set U This mailer wants Unix style From lines with the ugly UUCP style...

Page 356: ...Sendmall InataUatloD and OperatloD Gulcle From useraGh06ta To userbGh08tb userc to be rewritten as From useraGh06ta To userbGh08tb usercOhoe a automatically VenloD 4 1 II Lad Mod 8 11 81...

Page 357: ...be present lusr lib aliaBe8 The textual version 01 the alias 81e lusrIliblali31 le8 pag dir The alias file in d6m 3 format IusrIetclin 8Y510g The program to do logginl IetcIsyslog conl The configurat...

Page 358: ...tion 4 3 1 User Line 5 3 2 Required File Line 5 3 3 Standard Input Line 5 3 4 Standard Output Line 5 3 5 Command Line 6 4 UUXQT UUCP Command Execution 6 5 UUCICO Copy In Copy Out 6 5 1 Scan For Work 7...

Page 359: ...al Code Abbreviations File 13 9 7 USERFILE 13 9 8 L sys 15 9 9 L cmds 16 9 10 Device Types 17 10 Administration 17 10 1 SQFILE Sequence Check File 17 10 2 TM Temporary Data Files IS 10 3 LOG Log Entry...

Page 360: ...o file for the remote execu tion of UNIX commands executes the work files tor data transmission executes the scripts for UNIX command execution There are two administrative programs uulog gathers temp...

Page 361: ...se names end with c to the lu rldan directory on the U II machine The source and or destination names may also contain a u er prefix This translates to the login directory of uler on the specified sys...

Page 362: ...an option list The options m and d may appear 2 3 Type 3 Send Files Each source file is copied into a data file in the spool directory A c option on the uuep com mand prevents the data file from bein...

Page 363: ...that the and characters themselves must usually be escaped with a character The indicates that the standard input for commtJnd tring should be inherited from the standard input of the uuz command The...

Page 364: ...here the u er and lIlfem are the requester s login name and system 3 2 Required File Line F file name real name where file name is a unique name used for file transmission and real name is the last pa...

Page 365: ...all the required files are available and if so the command line is verified and executed The ezecute file is described in the section entitled uuz above The execution is accomplished by executing a s...

Page 366: ...dir for the spool directory xnum Num is a level number between 1 and OJ higher numbers give more debugging output The next part of this section describes the major steps within the uucico program 5 1...

Page 367: ...ive the system identification and conversation sequence number The SLA VE verifies the response from the MASTER and if acceptable protocol selection begins The SLA VE can also reply with a call back r...

Page 368: ...he file is put in the publi dire tory usually u r po01 uucppublic and the requester is notified by mail The requests and results are logged on both systems The hangup response is determined by a work...

Page 369: ...desired 8 Security t The uuep ydem left unredrieted tIliU let dnr out ide a e ezeeute dny eommdnd dnd copy out in any de that i readable writable by a uuep login u er It i up to the individual ite to...

Page 370: ...veral directories sources usr src cmd uucp This directory contains the uucp system source files program usr lib uucp This is the directory used for some of the executable system programs and the syste...

Page 371: ...a VMUNIX system 9 3 Compiling the System The command make install makes the required directories compiles all programs sets the proper file modes and copies the programs to the proper directories Thi...

Page 372: ...number 0 in this field peed is the line speed For example an entry in the L device file like this ACU cuiO cuaO 300 would be set up for a system that has a DNll device devIculO wired to a call unit de...

Page 373: ...e given on the first line in the file that has the system name that matches the remote machine If no such line is found the first one with a null system name is used 3 When a remote computer logs in t...

Page 374: ...08 1730 device I The day portion may be a list containing some of Su Mo Tu We Tla Fr StI or it may be M lor any week day or Anglor any day The time should be a range of times for example 0800 1230 If...

Page 375: ...by a new line then expects login again There are two special names available to be sent during the login sequence The string EaT sends an EOT character and the string BREAK tries to send a BREAK char...

Page 376: ...d be set up as follows ACUDF0310cal cuaO cuaO 1200 ACUDF03wats cuaO cuaD 1200 To call a system using only the WATS line specify ACUDF03wats in the device type field Similarly to call a system using th...

Page 377: ...e merge Options are available to print some or all the log entries after the files are merged The LOGFILE should be removed periodically The LOG files are created initially with mode 0222 If the progr...

Page 378: ...cond line where machine inter is being polled The third line processes all other spooled work Another shell file may be set up on a daily basis to remove TM ST and LCK files and C or D files for work...

Page 379: ...owned by the uucp admin istrative login with the setuid bit set and only execute permissions mode 04111 The L 11 SQFILE and the USERFILE which are put in the program directory should be owned by the...

Page 380: ...1 Files 1 1 1 File Modes and Permissions 2 1 2 Format of the II File 3 2 Setting up Links 4 2 1 Non mail Links 4 2 2 Mail Links 4 3 Posting Methods 5 4 Control Messages 5 5 Maintenance 6 6 Creating Ne...

Page 381: ...er sites The article number is always stored as a 5 digit number with leading zeros to allow updating of the le in place Active is automatically updated as new newsgroups come in The order of active s...

Page 382: ...not want multiple copies of control message notifications Contains on one line the name and address of your organization This informa tion is inserted in the articles you post recnew Arranges to send...

Page 383: ...you have a B version If you aren t sure which version your contact site is running ask them before proceeding F Indicates that the fourth field is the name of a file The full path name of a file conta...

Page 384: ...x r IS remote y rnews ort clenome This is the default transmission method In order to set up such a link obviously a UUCP link with the remote system must be in effect In addition rnew must be availab...

Page 385: ...he same thing more than once Nor is there any way to make the recording feature work when recnew is used see the File section above 4 Control Messages Some news systems send articles that are not for...

Page 386: ...right now some of it must be done by hand To get articles to expire automatically put the following line in crontab o7 2 su news usr lib news news week This runs a shell script which runs ezpire 8 to...

Page 387: ...tory and believe there is unread news as each user lacks a newsrc line for the newsgroup 7 Differences between Version 2 9 and 2 10 Both versions 2 9 and 2 10 are B Versions of USENET format just to c...

Page 388: ...lerences and there are a few extensions One major difference is that poltnew now prompts for a Distribution This defaults to the same as the newsgroup and is omitted in this case but allows you to con...

Page 389: ...e details All this is very new and while it appears to run satisfactorily caution is advised in installing batching software You must also make sure your neighbor is prepared to receive batched news t...

Page 390: ...printer queue 2 2 3 lprm remove jobs rom a queue 2 2 4 Ipc line printer control program 2 3 Access Control 3 4 Setting Up 3 4 1 Creating a Printcap File 3 4 1 1 Printers on Serial Lines 3 4 1 2 Remote...

Page 391: ...eal work program to enter a job in a printer queue spooling queue examination program program to delete jobs from a queue program to administer printers and spooling queues socket on which lpd listens...

Page 392: ...ob in a local queue and to notify the local Ipd that there are new jobs in the spooling area Lpd either schedules the job to be printed locally or in the case of remote printing attempts to forward th...

Page 393: ...r lad 8C in authenticating remote clients The host on which a client resides must be present in the file etc hosts equiv used to create clusters of machines under a single administration In practice...

Page 394: ...e d entry specifies usr spool vaxlpd as the spooling directory instead of the default value of usr spool lpd 4 2 Output Filters Filters are used to handle device dependencies and to perform accounting...

Page 395: ...Lfile The e flag is optional and only supplied when control characters are to be passed uninter preted to the printer when the I option of Ipr is used to print the file The wand 1 parameters are the s...

Page 396: ...ere are a number of messages which may be generated by the the line printer system This section categorizes the most common and explains the cause for their generation Where the message indicates a fa...

Page 397: ...device Your only recourse here is to kill off the offending program s and restart the printer with Ipe printer is ready and printing The Ipq program checks to see it a daemon process exists tor print...

Page 398: ...es may also be inaccessible if people manually manipulate the line printer system i e they bypass the pr program In addition to messages generated by pd any of the filters that lpd spawns may also log...

Reviews: