background image

HP-UX Reference

Section 1M: System Administration Commands

(A-M)

HP-UX 11i Version 2 December 2007 Update

Volume 3 of 10

Manufacturing Part Number : B2355-92068

E1207

Printed in USA

© Copyright 1983-2007 Hewlett-Packard Development Company LP.

Summary of Contents for B2355-92068

Page 1: ...ection 1M System Administration Commands A M HP UX 11i Version 2 December 2007 Update Volume 3 of 10 Manufacturing Part Number B2355 92068 E1207 Printed in USA Copyright 1983 2007 Hewlett Packard Development Company LP ...

Page 2: ...ocumentation and Technical Data forCommercial Items are licensed to the U S Government under vendor s standard commercial license Additional Copyright Notices This document and the software it describes may also be protected under one or more of the following copyrights Additional copyrights are acknowledged in some individual manpages Copyright 1979 1980 1983 1985 1993 The Regents of the Universi...

Page 3: ...rporation in the US and other countries and are used under license Java is a US trademark of Sun Microsystems Inc Microsoft and MS DOS are U S registered trademarks of Microsoft Corporation OSF Motif is a trademark of The Open Group in the US and other countries UNIX is a registered trademark of The Open Group X Window System is a trademark of The Open Group ...

Page 4: ...4 ...

Page 5: ...neral introduction to HP UX and the structure and format of the manpages please see the introduction 9 manpage in volume 10 Section Introductions The manpages are divided into sections that also have introduction intro manpages that describe the contents These are intro 1 Section 1 User Commands A M in volume 1 N Z in volume 2 intro 1M Section 1M System Administration Commands A M in volume 3 N Z ...

Page 6: ...fied command phrase ComputerOutput Text displayed by the computer Emphasis Text that is emphasized Emphasis Text that is strongly emphasized ENVIRONVAR The name of an environment variable ERRORNAME The name of an error number usually returned in the errno variable KeyCap The name of a usually nonprinting keyboard key such as Ctrl X or Tab Note that Return and Enter both refer to the same key Repla...

Page 7: ...ence from chars is usually obvious and is clarified in an Options description The plus character and the double hyphen are sometimes used as option prefixes The bracket metacharacters enclose optional content in formats and command descriptions The brace metacharacters enclose required content in formats and command descriptions The bar metacharacter separates alternatives in a list of choices usu...

Page 8: ...unction call is actually included in a program The function syntax elements are the same as for commands except for the options see Command Syntax on page 7 Function General Definition The general definition form is type func type param type param For example int setuname const char name size_t namelen Function Usage The usage form is func param param For example setuname name namelen ...

Page 9: ...7 Release one volume HTML http docs hp com and Instant Information B2355 91017 26 HP UX 11i Version 3 February 2007 Release ten volumes PDF http docs hp com Instant Information and print B2355 60127 HP UX 11i Version 1 September 2005 Update one volume HTML http docs hp com and Instant Information B2355 90902 11 HP UX 11i Version 1 September 2005 Update ten volumes PDF http docs hp com and print B2...

Page 10: ...elease five volumes PDF http docs hp com B2355 90128 31 HP UX 10 X July 1996 Release five volumes PDF and HTML http docs hp com B2355 90052 HP UX 10 0 July 1995 Release four volumes PDF HP Encourages Your Comments HP encourages your comments regarding this document We are committed to providing documentation that meets your needs Send any errors found suggestions for improvement or compliments to ...

Page 11: ...Volume Three Table of Contents Section 1M ...

Page 12: ...Volume Three Table of Contents Section 1M ...

Page 13: ... 1M amutil disk array management functions arp 1M arp address resolution display and control asecure 1M asecure control access to HP UX Audio aserver 1M aserver Audio audevent 1M audevent change or display event or system call audit status audisp 1M audisp display audit information as requested by parameters audomon 1M audomon audit overflow monitor daemon audsys 1M audsys start or halt the auditi...

Page 14: ...client daemon dhcpv6d 1M dhcpv6d Dynamic Host Configuration Protocol Server daemon for IPv6 dhcpv6db2conf 1M dhcpv6db2conf DHCPv6 client database converter dig 1M dig domain information groper diskinfo 1M diskinfo describe characteristics of a disk device disksecn 1M disksecn calculate default disk section sizes diskusg 1M diskusg generate disk accounting data by user ID dmesg 1M dmesg collect sys...

Page 15: ...fsdb HFS file system debugger fsdb_vxfs 1M fsdb VxFS file system debugger fsirand 1M fsirand install random inode generation numbers fstyp 1M fstyp determine file system type ftpd 1M ftpd file transfer protocol server fuser 1M fuser list processes using a file or file structure fwtmp 1M fwtmp wtmpfix manipulate connect accounting records gated 1M gated gateway routing daemon gdc 1M gdc operations ...

Page 16: ...n LDAP directory server ldapuglist 1M ldapuglist display and enumerate POSIX like account and group entries in an LDAP directory server ldapugmod 1M ldapugmod modify existing POSIX accounts or groups in an LDAP directory server libcadmin 1M libcadmin libc administration command link 1M link unlink execute link and unlink system calls without error checking linkloop 1M linkloop verify LAN connectiv...

Page 17: ...tiple file systems mountd 1M mountd NFS mount request server mrinfo 1M mrinfo multicast routing configuration information tool mrouted 1M mrouted IP multicast routing daemon mtail 1M mtail displays the last part of the mail log mvdir 1M mvdir move a directory naaagt 1M naaagt Native Agent Adapter for SNMP named 1M named Internet domain name server ncheck 1M ncheck generate path names from inode nu...

Page 18: ...pppoesd 1M pppoesd PPPoE Point to Point Protocol over Ethernet server daemon prctmp shell procedures for accounting print session record file see acctsh 1M prdaily shell procedures for accounting print daily report see acctsh 1M privedit 1M privedit let authorized users edit files that are under access control privrun 1M privrun invoke another application with privileges after performing appropria...

Page 19: ...daemon rpc pcnfsd PC NFS authentication and print request server see pcnfsd 1M rpc statd network status monitor see statd 1M rpc ypupdated hex encryption and utility routines see ypupdated 1M rpcbind 1M rpcbind portmap universal addresses to RPC program number mapper rpcinfo 1M rpcinfo report RPC information rquotad 1M rquotad remote quota server rrestore restore file system incrementally over a n...

Page 20: ...M swa advanced control of Software Assistant execution steps swacl 1M swacl view or modify Access Control Lists swagent perform software management tasks as the agent of an SD command see swagentd 1M swagentd 1M swagentd swagent serve local or remote SD UX software management tasks swapinfo 1M swapinfo system paging space information swapon 1M swapon enable device or file system for paging swask 1...

Page 21: ...twork uuxqt 1M uuxqt execute remote uucp or uux command requests vgcfgbackup 1M vgcfgbackup create or update LVM volume group configuration backup file vgcfgrestore 1M vgcfgrestore restore volume group configuration vgchange 1M vgchange set LVM volume group availability vgchgid 1M vgchgid modify the Volume Group ID VGID on a given set of physical devices vgcreate 1M vgcreate create LVM volume grou...

Page 22: ...rvice databases ypmake 1M ypmake create or rebuild Network Information Service databases yppasswdd 1M yppasswdd daemon for modifying Network Information Service passwd database yppoll 1M yppoll query NIS server for information about an NIS map yppush 1M yppush force propagation of a Network Information Service database ypserv 1M ypserv ypbind ypxfrd Network Information Service NIS server and binde...

Page 23: ...Section 1M Part 1 System Administration Commands A M ...

Page 24: ...Section 1M Part 1 System Administration Commands A M ...

Page 25: ...eceding arg_letter represents optional white space cmd_arg Path name or other command argument not beginning with or by itself indicating the standard input If two or more cmd_args appear they must be separated by white space RETURN STATUS Upon termination each command returns two bytes of status one supplied by the system giving the cause for termination and in the case of normal termination one ...

Page 26: ...son message of length greater than 80 bytes is truncated to 80 bytes reason is reported by the lpstat command and by the lp command when users direct requests to a rejected destination EXTERNAL INFLUENCES Environment Variables The LANG variable determines the language in which messages are displayed If LANG is not specified or is set to the empty string it defaults to C see lang 5 If any internati...

Page 27: ...data var adm lp Directory of spooler log files var spool lp Directory of LP spooling files and directories SEE ALSO enable 1 lp 1 lpstat 1 lpadmin 1M lpsched 1M rcancel 1M rlp 1M rlpdaemon 1M rlpstat 1M HP UX 11i Version 2 December 2007 Update 2 Hewlett Packard Company 27 ...

Page 28: ...ing indirect blocks by login Only files found under login directories as determined from the password file are accounted for All files under a login directory are assumed to belong to that user regard less of actual owner If u is given records consisting of those file names for which acctdusg charges no one are placed in file a potential source for finding users trying to avoid disk charges If p i...

Page 29: ...to user ID var adm wtmp Login logoff history file var adm wtmps New login logoff history database SEE ALSO acctcms 1M acctcom 1M acctcon 1M acctmerg 1M acctprc 1M acctsh 1M diskusg 1M fwtmp 1M runacct 1M acct 2 acct 4 utmp 4 utmps 4 wtmps 4 STANDARDS CONFORMANCE acctdisk SVID2 SVID3 accton SVID2 SVID3 acctwtmp SVID2 SVID3 HP UX 11i Version 2 December 2007 Update 2 Hewlett Packard Company 29 ...

Page 30: ...lits each field into prime and non prime time parts This option combines the prime and non prime time parts into a single field that is the total of both and provides upward compatibil ity with old i e UNIX System V style acctcms internal summary format records The following options can be used only with the a option p Output a prime time only command summary o Output a non prime offshift time onl...

Page 31: ...AT is 0 if the process terminated by calling exit If it is not 0 it is the signal number that caused the process to terminate If a core file image was produced as a result of the signal see signal 5 the value is the signal number plus 0200 If no files are specified and if standard input is associated with a terminal or dev null as is the case when using in a shell acctcom reads var adm pacct Other...

Page 32: ...tarting at or after time see s E time Select processes ending at or before time see s n pattern Show only commands matching pattern where pattern is a regular expression as in ed 1 except that means one or more occurrences q Do not print any output records Just print the average statistics as with the a option o ofile Copy selected process records in the input data format to ofile Suppress standar...

Page 33: ...n MAXINT DEPENDENCIES HP Process Resource Manager The P and R options require the optional HP Process Resource Manager PRM software to be installed and configured See prmconfig 1 for a description of how to configure HP PRM and prmconf 4 for the definition of process resource group FILES etc group etc passwd var adm pacct SEE ALSO ps 1 su 1 acct 1M acctcms 1M acctcon 1M acctmerg 1M acctprc 1M acct...

Page 34: ...each line that still appears to be active It normally assumes that its input is a current file so that it uses the current time as the ending time for each session still in progress The t flag causes it to use instead the last time found in its input thus ensuring reasonable and repeatable numbers for non current files acctcon1 and acctcon recognize the following options l file file is created to ...

Page 35: ...ort is confused by date changes Use wtmpfix see fwtmp 1M to correct this situa tion FILES var adm wtmp var adm wtmps etc acct holidays SEE ALSO login 1 acct 1M acctcms 1M acctcom 1M acctmerg 1M acctprc 1M acctsh 1M fwtmp 1M init 1M utmpd 1M runacct 1M acct 2 getbwent 3C acct 4 utmp 4 STANDARDS CONFORMANCE acctcon1 SVID2 SVID3 acctcon2 SVID2 SVID3 HP UX 11i Version 2 December 2007 Update 2 Hewlett ...

Page 36: ...CII version of tacct i Input files are in ASCII version of tacct p Print input with no processing t Produce a single record that totals all input u Summarize by user ID rather than user ID and name v Produce output in verbose ASCII format with more precise notation for floating point numbers EXAMPLES The following sequence is useful for making repairs to any file kept in this format acctmerg v fil...

Page 37: ...pacct acctprc2 ptacct or acctprc var adm pacct ptacct EXTERNAL INFLUENCES Environment Variables For the output of acctprc2 if the user IDs are identical LC_COLLATE determines the order in which the user names are sorted If LC_COLLATE is not specified in the environment or is set to the empty string the value of LANG is used as a default If LANG is not specified or is set to the empty string a defa...

Page 38: ...sys tem names where disk accounting is to be done If files is used disk accounting will be done on these filesystems only If the o flag is used files should be mount points of mounted filesystem If omitted they should be the special file names of mountable filesys tems lastlogin Invoked by runacct to update var adm acct sum loginlog which shows the last date on which each user logged in see runacc...

Page 39: ... to a reasonable size FILES usr sbin acct holds all accounting commands listed in section 1M of this manual var adm fee accumulator for fees var adm acct nite working directory var adm pacct current file for per process accounting var adm pacct used if pacct gets large and during execution of daily account ing procedure usr sbin acct ptecms awk contains the limits for exceptional usage by command ...

Page 40: ...mand and their uses include allowdacread This privilege is raised to provide discretionary read access to the devices allowdacwrite This privilege is raised to provide discretionary write access to the devices allowmacread This privilege is raised to provide mandatory read access to the devices allowmacwrite This privilege is raised to provide mandatory write access to the devices filesysops This ...

Page 41: ...dicates the capacity of the LUN being created The capacity can be specified in megabytes M or gigabytes G by appending the appropriate letter to the value If not specified the default is gigabytes By default the LUN will use the entire capacity available from all the disks It is pos sible to specify a lower value for LUN capacity but this will result in unused disk capacity Any capacity not includ...

Page 42: ...the LUN RAID 0 should only be used for non critical data that could be lost in the event of a hardware failure R cntrlrID LUN Replace unbind and rebind the LUN with the number specified by LUN on the con troller identified by cntrlrID s SegmentSize Identifies the stripe segment size used for the LUN The stripe segment size is specified in Kbytes and must be a multiple of the current cache page siz...

Page 43: ...n supported array The specified ArrayID does not exist or does not identify a device that is communicating with the sys tem Verify the array exists and is operational amcfg The specified controller is not physically installed A controller specific command was issued to a non existent or inaccessible controller amcfg The specified LUN does not exist in this array The specified LUN does not exist am...

Page 44: ... LUN with both mirrors residing in the same enclosure is not a recommended high availability configuration Use force to override amcfg A RAID 0 1 LUN may contain no more than 30 disks The absolute maximum number of disks that the array will support in a RAID 0 1 LUN has been exceeded amcfg A RAID 5 LUN may contain no more than 20 disks The absolute maximum number of disks that the array will suppo...

Page 45: ...o controller B amcfg M 0 c B RACK_51 DEPENDENCIES AM60Srvr must be running to execute this command See AM60Srvr 1M AUTHOR amcfg was developed by HP SEE ALSO amdsp 1M ammgr 1M amutil 1M amlog 1M AM60Srvr 1M HP UX 11i Version 2 December 2007 Update 5 Hewlett Packard Company 45 ...

Page 46: ...disk module on channel 2 with a SCSI ID of 1 Refer to the Disk Array FC 60 User s Guide for more information on disk module addressing Options amdload supports the following options C Download new firmware to the disk array controllers The new code is stored in the file identified by codefile If the all option is included download firmware to both disk array controllers If the cntrlrID option is i...

Page 47: ...read access to the devices allowdacwrite This privilege is raised to provide discretionary write access to the devices allowmacread This privilege is raised to provide mandatory read access to the devices allowmacwrite This privilege is raised to provide mandatory write access to the devices filesysops This privilege is raised to allow the mknod 2 system call to succeed writeaudit The command gene...

Page 48: ...l appear if a disk or channel is repeated in the input list Be sure to list each item once amdload Firmware download has been aborted LUN lun is not in an Optimal state Wait until all LUNs are in an Optimal state before attempting further firmware downloads LUNs must be in an Optimal state before attempting disk or array controller downloads This mes sage will appear if any LUNs are not Optimal pr...

Page 49: ...ted by the c d g h s l and r options This is a quick way of displaying all configuration and status information about the disk array This option will display information for all LUNs A Display information related to the interface between the server and the specified disk array c Display information for both disk array controllers and the BCC disk system controll ers d Display information for all d...

Page 50: ...atory write access to the devices filesysops This privilege is raised to allow the mknod 2 system call to succeed writeaudit The command generates its own audit records and submits these directly to the sys tem audit trail This privilege is raised whenever the command needs to write an audit record EXTERNAL INFLUENCES Environment Variables LC_MESSAGES determines the language in which messages are ...

Page 51: ...K_51 amdsp l RACK_51 Display information for all disks installed in disk array named RACK_51 amdsp d RACK_51 List the serial numbers of all of the disk arrays recognized by the host amdsp i RAW OUTPUT FORMAT The contents of the raw output text string for each display option are listed here Note that the raw output for the a option comprises the individual strings displayed by the l d c s g A r and...

Page 52: ...L DISK record The above will be displayed for each disk slot For disks which have been bound to a LUN and then removed or assigned as a hot spare and then removed the Manufacturer Model FWRevi sion and SerialNum fields may be undefined Unassigned disks which are removed will have no PD record Capacity is displayed in GB rounded up to the nearest GB If DGType is 1 HOT SPARE and if this disk is curr...

Page 53: ...e caching parameters Capacities displayed in the raw output are always shown in MB where 1MB 1024ˆ2 bytes IsUtm is a boolean that indicates whether the current LUN is the Universal Transport Mechan ism UTM When IsUtm is TRUE 1 only the following additional fields are valid VendorID ProductID LunNumber Present and UtmLunState The remaining fields are undefined When IsUtm is TRUE 1 UtmLunState indic...

Page 54: ...CIES AM60Srvr must be running to execute this command See AM60Srvr 1M AUTHOR amdsp was developed by HP SEE ALSO ammgr 1M amcfg 1M amutil 1M amlog 1M AM60Srvr 1M 54 Hewlett Packard Company 6 HP UX 11i Version 2 December 2007 Update ...

Page 55: ...a destructive command and is not supported If an attempt is made to exe cute the amfmt command data may be destroyed AUTHOR amfmt was developed by HP SEE ALSO ammgr 1M amutil 1M amcfg 1M amdsp 1M amlog 1M amdload 1M AM60Srvr 1M HP UX 11i Version 2 December 2007 Update 1 Hewlett Packard Company 55 ...

Page 56: ...fy a specific disk array for which the logs will be displayed The default is to display the logs for all disk arrays c Limits major event log output to events of critical priority This option is ignored unless specified in conjunction with t mel d LogDir Specify the path name of the log directory The default is var opt hparray log e EndTime Specify the ending date and time Log records with a later...

Page 57: ...tes allocated for storage of the disk array log files The log files are stored as individual files in var opt hparray log All log files will be maintained until the specified maximum value is exceeded At that point the oldest log file will be deleted to make room for the new file FIFO The valid range for this variable is 100 to 4096 100 MB to 4 GB If a value outside of this range is specified it w...

Page 58: ...entHour EventMin EventSec EventCategory CompType LocationValid CompLocation EventPriority SK ASC ASCQ FRUCode FRUCodeQual LUN One record will be printed for each log entry between the start and end times LogFilename is the name of the server log file where the record is found The leading AM is literal and identifies this as an AM60 LOG record The Log timestamp indicates when this event was written...

Page 59: ...ID The disk is identified by channel number 1 6 and SCSI ID 0 4 8 12 D ArrayAlias Assigns the text string specified by ArrayAlias to the disk array This name is another mechanism for identifying the disk array when executing a command The name can be up to 16 characters in length and can include letters numbers number sign underscore _ and period Disk names can be used in a variety of ways to help...

Page 60: ... potential privileges possessed by the com mand and their uses include allowdacread This privilege is raised to provide discretionary read access to the devices allowdacwrite This privilege is raised to provide discretionary write access to the devices allowmacread This privilege is raised to provide mandatory read access to the devices allowmacwrite This privilege is raised to provide mandatory w...

Page 61: ... progress on the specified LUN An attempt was made to initiate a parity scan on a LUN which already has a parity scan in progress ammgr No parity scan in progress on the specified LUN An attempt was made to halt a parity scan on a LUN which has no parity scan in progress ammgr Cache page size may not be set to 16 KB unless the segment sizes of all existing LUNs are multiples of 16 KB Illegal cache...

Page 62: ...a ammgr 1M ammgr 1M AUTHOR ammgr was developed by HP SEE ALSO amdsp 1M amcfg 1M amutil 1M amlog 1M AM60Srvr 1M 62 Hewlett Packard Company 4 HP UX 11i Version 2 December 2007 Update ...

Page 63: ...This will retrieve the current log entries from the disk array controller The controller logs will be cleared p Purge the oldest log file delete the log file and remove its entry from the log file cata log Always use this option to delete log files Using a system command such as rm to delete log files will cause log catalog errors R LUN f req a Amt Set the rebuild priority settings of the specifie...

Page 64: ... 1 An error in execution I O subsystem security etc occurred 2 An error in command syntax occurred for example an unknown command line option was passed 3 Timeout in communication to server May indicate the AM60Srvr is not running DIAGNOSTICS The following messages can be generated by amutil Usage amutil f Channel ID Channel ID F l s R LUN f Freq a Amt V ArrayID amutil p V Extended help amutil An ...

Page 65: ...alue of 5 seconds to the rebuild command rate and sets the data block amount to 16 blocks on LUN 4 on disk array RACK_51 This gives host I Os higher priority than the default settings amutil R 4 f 50 a 16 RACK_51 DEPENDENCIES AM60Srvr must be running to execute this command See AM60Srvr 1M AUTHOR amutil was developed by HP SEE ALSO ammgr 1M amcfg 1M amdsp 1M amlog 1M AM60Srvr 1M HP UX 11i Version ...

Page 66: ...e on the local system The removal of such an ARP entry may result in loss or limitation of network connectivity with remote machines The local system will no longer respond to ARP requests for this IP address Consequently communication with remote systems is possible only when that communication is initiated by the local system This option should be used with extreme caution f Read file filename a...

Page 67: ...ress is given as three hexadecimal bytes separated by colons If an ARP entry already exists for hostname the existing entry is updated with the new information You need superuser privilege to use the d D f s and sfc options See the Neighbor Discovery Protocol ndp 1M for IPv6 AUTHOR arp was developed by HP and the University of California Berkeley SEE ALSO ifconfig 1M inet 3N hosts 4 arp 7P ndp 1M ...

Page 68: ...unrestricted access to the server but leaving the ASF intact Every operation that creates reinitializes or changes the contents of the ASF is logged in the var adm audio asecure_log file so that you can track any changes to the ASF Options asecure supports the following options b b host user Add delete hostname username pair You must be either superuser or a privileged user to do this You can supp...

Page 69: ...do this You can supply more than one username separated by blanks EXAMPLES List entries in access list opt audio bin asecure l Disable access control This means anyone can connect to Aserver without restriction opt audio bin asecure d Add moonbeam host for all users to access list Remove pluto host for all users from access list opt audio bin asecure h moonbeam h pluto Add user comet for hosts sat...

Page 70: ... two Aserver processes 1 0 00 Aserver 224 0 00 Aserver If it is not running become root and restart it as follows opt audio bin Aserver If it fails to start reissue the command with the f option opt audio bin Aserver f Using Audio over the Network From a workstation you can also use the Audio Editor and Control Panel over the network However the remote system is where the actual playback and recor...

Page 71: ...rver 1M AUTHOR The Audio Server was developed by HP SEE ALSO audio 5 asecure 1M attributes 1 convert 1 send_sound 1 Using the Audio Developer s Kit HP UX 11i Version 2 December 2007 Update 2 Hewlett Packard Company 71 ...

Page 72: ...ed to by the auditing system usually matches the real system call name but with a few exceptions Some important known exceptions are provided in System Call Name Mapping Execptions Only the super user can change or display audit status Options audevent recognizes the following options and command line arguments P Audit successful events or system calls p Do not audit successful events or system ca...

Page 73: ...diting records System Call Name Mapping Exceptions The following are some important known system call name mapping exceptions sem_open is referred to as ksem_open sem_unlink is referred to as ksem_unlink sem_close is referred to as ksem_close gethostname sethostname uname ustat setuname are all referred to as utssys by the auditing system WARNINGS All modifications made to the auditing system are ...

Page 74: ...see audevent 1M c syscall Display audit information about the specified system calls p Display only successful operations that were recorded in the audit trail No user event that results in a failure is displayed even if username and eventname are specified The p and the f options are mutually exclusive do not specify both on the same com mand line To display both successful and failed operations ...

Page 75: ... designated as the new audit file If no backup file is available audomon issues a warning message The fss parameter should be a larger number than the min_free parameter of the file sys tem to ensure that the switch takes place before min_free is reached By default fss is 20 percent t sp_freq Specify the wake up switch point frequency in minutes The wake up frequency at any other time is calculate...

Page 76: ...a audomon 1M audomon 1M SEE ALSO audsys 1M audit 5 76 Hewlett Packard Company 2 HP UX 11i Version 2 December 2007 Update ...

Page 77: ...re ignored c file Specify a current file Any existing current file is replaced with the file specified the auditing system immediately switches to write to the new current file The specified file must be empty or nonexistent unless it is the current or next file already in use by the auditing system s cafs Specify cafs the current audit file switch size in kbytes x file Specify the next audit file...

Page 78: ...t file is removed and the user process makes an auditable system call or generates an auditable event To recover from the resulting deadlock the session leader of the console is killed so that the the administra tor can login Hence sensitive applications should not be run as session leaders on the console AUTHOR audsys was developed by HP FILES secure etc audnames File maintained by audsys contain...

Page 79: ...udited events or system calls Use audevent to specify events to be audited see audevent 1M d user Do not audit the specified user A Audit all users D Do not audit any users The A and D options are mutually exclusive that is if A is specified d cannot be specified if D is specified a cannot be specified Users specified with audusr are audited or excluded from auditing beginning with their next logi...

Page 80: ...thadm recognizes the following options add operation object comments Adds an authorization pair operation object to the system list of valid authorizations by appending a line to the etc rbac auths file If object is not specified then a default object will be assigned The default object will either be a wild card or the object specified in the security default configuration file etc default securi...

Page 81: ... name Revokes a subrole from the specified role in etc rbac role_auth Note that the role specified as the subrole is not revoked from the database just the subrole assignment is revoked For instance if these entries are in the database role1 operation1 object1 role2 role2 role3 operation2 object2 role4 authadm revoke role role1 subrole role2 will modify the line to role1 operation1 object1 role2 r...

Page 82: ...ase file authadm roleassign administrator printAdmin authadm roleassign administrator diskAdmin The following commands each revokes an operation for the specified operation from a role in the etc rbac role_auth file authadm revoke role administrator operation hpux printer job cancel object printer6 authadm revoke role accountant operation hpux db admin The following commands each revokes a subrole...

Page 83: ...dm 1M etc rbac role_auth Database defining the authorizations for each specified role SEE ALSO cmdprivadm 1M privrun 1M rbacdbchk 1M roleadm 1M rbac 5 HP UX 11i Version 2 December 2007 Update 4 Hewlett Packard Company 83 ...

Page 84: ...For example all time stamps of past events are checked to make sure that they have times less than the times returned by time 2 t Fields in the Terminal Control database are checked for reasonable values All time stamps of past events are checked to make sure they have times less than those returned by time 2 a Shorthand equivalent of using the p and t options together in a single command v Provid...

Page 85: ...erface Once a lease is secured the information supplied with the lease is used to initialize key networking param eters see dhcpdb2conf 1M If auto_parms detects that the system is undergoing first boot meaning the system s hostname is not yet set it invokes set_parms and geocustoms to verify the DHCP supplied parameters and to collect any parameters not supplied by DHCP For all subsequent boots th...

Page 86: ...es in the master map or a direct map or to perform unmounts for entries that have been removed If the first field specifies the directory as automount treats the second field as the name of a direct map In a direct map each entry associates the full path name of a mount point with a remote file system to mount If the first field is a path name the second field names an indirect map or a special ma...

Page 87: ... hostnames hostname hostname pathname Requests for a server may be weighted with the weighting factor appended to the server name as an integer in parentheses Servers without a weighting default to a value of zero most likely to be selected Progressively higher values decrease the chance of being selected In the example man ro alpha bravo charlie 1 delta 4 usr share man hosts alpha and bravo have ...

Page 88: ...erarchically related automount does not allow an autofs mount point to be created within another autofs mount Other Filesystem Types The automounter assumes NFS mounts as a default filesystem type Other filesystem types can be described using the fstype mount option Other mount options specific to this filesystem type can be combined with the fstype option The location field must contain informati...

Page 89: ...es that would otherwise be inherited from the auto_master include entry To be effective the null entries must be inserted before the included map entry Executable Maps Local maps that have the execute bit set in their file permissions will be executed by the automounter and provided with a key to be looked up as an argument The executable map is expected to return the content of an automounter map...

Page 90: ...me RETURN VALUE automount returns the following values 0 Success 1 Failure 3 Map not found AUTHOR automount was developed by Sun Microsystems Inc FILES etc auto_master Master automount map etc nsswitch conf Name service switch configuration file usr sbin automount autofs automount command SEE ALSO automountd 1M cfsadmin 1M mount 1M 90 Hewlett Packard Company 5 HP UX 11i Version 2 December 2007 Upd...

Page 91: ...ables in the master map auto_master Tracing While automountd is running the signal SIGUSR2 can be sent to automountd to turn tracing on It logs messages in var adm automount log To turn tracing off send the signal SIGUSR2 again RETURN VALUE automountd returns 0 successful 1 failure EXAMPLES To turn on tracing enter usr sbin automountd T or automountd T No messages are displayed by the trace Check ...

Page 92: ...ule names Each module is pushed in the order specified A maximum of eight modules can be pushed Any text after a character in file is treated as a comment for that line only This option is also used to restore device configuration information previously removed by autopush r However when used in such a manner the entire data base is restored not just the information that was previously removed g M...

Page 93: ...d modC and modA to be pushed for the first six opens of device test This next example lists information about the stream for major device 75 and its minor device 2 autopush g M 75 m 2 FILES usr lib nls msg C autopush cat NLS catalog for autopush SEE ALSO sad 7 streamio 7 HP UX 11i Version 2 December 2007 Update 2 Hewlett Packard Company 93 ...

Page 94: ...UPLOG file name where start and finish times block counts and error messages are logged ARCHIVE file name whose date is the date of the last archive REMIND file name that is checked by etc profile to remind the next person who logs in to change the backup tape FSCKLOG file name where start and finish times and fsck output is logged You may want to make other changes such as whether or not fsck doe...

Page 95: ...b backup 1M backup 1M SEE ALSO cpio 1 find 1 touch 1 cron 1M fbackup 1M frecover 1M fsck 1M acl 5 HP UX 11i Version 2 December 2007 Update 2 Hewlett Packard Company 95 ...

Page 96: ...es automated support in performing lockdown steps After performing the steps Bastille can perform automatically the utility produces a to do list that describes remaining actions you must perform manually to ensure the system is secure Security hardening can also be performed directly through the configuration engine bastille b using the default or an alternate configuration bastille b f file see ...

Page 97: ... TODO file listed below Inconsistent Bastille can not tell the status Usually this is do to the system being in an inconsistent state For example Bastille would return this status of a service running in the process list but configured on disk to be off Note there are some cases where inconsistent states that Bastille can not detect could be created on the system so if the administrator has made c...

Page 98: ...ostic Once the system state that caused the abort is fixed run bastille again to complete the lockdown This helps avoid cases where an incomplete lockdown can contribute to an inconsistent system configuration EXAMPLES Example 1 Run the Bastille X interface This will create a configuration file which can be run either immediately by Bastille after you have answered all of the questions or saved fo...

Page 99: ...astille run This file will only be created when there has been an earlier Bastille configuration applied to the system SEE ALSO perl 1 bastille_drift 1M fstab 4 Here are some other references used during Bastille s development Note that the websites and content are maintained by their domain owners The domain owners are solely responsible for their own sites and con tents The Linux Security HOWTO ...

Page 100: ...h system state not successful bastille_drift ran bastille assessnobrowser to establish system state but the operation did not succeed The bastille_drift error log should contain enough detail to give the user sufficient informa tion to prevent reoccurrence Note that bastille_drift only detects a state change with regard to a configuration option manipu lated Bastille at the same granularity as tha...

Page 101: ...sec_mgmt bastille baselines default_baseline HP UX Default location for baseline if file not specified This is also where Bastille stores an initial base line here on its first successful run var opt sec_mgmt bastille log Assessment Drift txt HP UX Location of drift report diff resulting from assessment SEE ALSO perl 1 bastille 1M HP UX 11i Version 2 December 2007 Update 2 Hewlett Packard Company ...

Page 102: ...age t type Report on the file systems of a given type for example nfs or hfs RETURN VALUE The bdf command returns 0 on success able to get status on all file systems or returns 1 on failure unable to get status on one or more file systems WARNINGS If file system names are too long the output for a given entry is displayed on two lines The bdf command does not account for any disk space reserved fo...

Page 103: ...he HP UX specific bootstrap loader hpux efi then loads the HP UX kernel object file from the HP UX file system to memory and transfers control to the loaded kernel image PA RISC Hardware The PA RISC server and workstation bootstrap process involves the execution of three software com ponents pdc see pdc 1M isl see isl 1M hpux see hpux 1M After the processor is RESET pdc the processor dependent cod...

Page 104: ... matched relay information for the client in the etc bootptab database If so bootpd goes through a series of checks to see if it should relay the request If no matched relay information was found bootpd checks whether the client information is matched by a pool or device group in the etc dhcptab data base If a match is found bootpd sends back a reply The request is dropped if no matched group info...

Page 105: ...ients The configuration uses two character case sensitive tag symbols to represent host parameters These parameter declarations are separated by colons The general format is hostname tg value tg value tg value where hostname is the actual name of a DHCP BOOTP client in the client entries and in the case of a relay entry it can be the actual name of a client if it is an individual relay entry or it...

Page 106: ...r example to completely undo an RFC1034 domain name server specification use ds at an appropriate place in the configuration entry After removal with a tag is eligible to be set again through the tc mechanism Tags for relay entries bp bootp servers This tag specifies the BOOTP servers that DHCP BOOTP requests will be relayed to The value of bootp servers can be one or more individual IP addresses ...

Page 107: ...o Note that a file considered to be accessible relative to might not actually be accessible via tftp if the command line arguments to tftpd disallow that path bs size This tag specifies the size of the bootfile The parameter size can be either a decimal octal or hexadecimal integer specifying the size of the bootfile in 512 octet blocks or the keyword auto which causes the server to automatically ...

Page 108: ...ress es of SMTP servers available to the client RFC2132 na ip_address_list This tag specifies the IP address es of RFC 1001 1002 NetBIOS name server s in order of preference nb ip_address_list This tag specifies the IP address es of RFC 1001 1002 NetBIOS datagram distribution server s in order of preference nc NetBIOS_node_type Specifies the NetBIOS node type code Allows NetBIOS over TCP IP client...

Page 109: ...g the to symbol as a boolean has the same effect as specifying auto as its value ts ip_address_list This tag specifies the IP addresses of RFC868 Time Protocol servers yd NIS domain name Specifies the name of the client s NIS domain ys ip_address_list Specifies the IP address es of NIS servers available to the client Servers should be listed in order of preference vm magic cookie This tag specifie...

Page 110: ...word is used to define a group of IP addresses on a subnet much like dhcp_pool_group but with one exception all clients in a device group must have the same client class specified with tag class id This allows different types of clients to receive different parameters from the server Required tags are class id subnet mask addr pool start address and addr pool last address dhcp_default_client_setti...

Page 111: ...IP address has been declined by a new client Some arguments will be passed in the call will be made as follows filename client id htype haddr ipaddr subnet mask where client id is the client ID in hex if present or 00 if there is no client ID htype is the hardware type as per the ARP section of the Assigned Numbers RFC haddr is the hardware address in hex ipaddr is the IP address that was declined...

Page 112: ...e to be assigned to this group This tag is required for dhcp_device_group and is inappropriate for any other keyword Some DHCP clients send out a client class that identifies a class that a client belongs to For an IP address to be assigned from a device group address pool not only must the client be on the right subnet it must send a request with a client class that matches that defined for the c...

Page 113: ... new clients is the default allow bootp clients boolean This tag specifies whether or not bootp clients can be members of the group being defined The default is false If boolean is TRUE then an IP address may be assigned to a client that doesn t have an entry in the bootptab file and that is on the same subnet as the group being defined This address is treated as an infinite lease and a boot reply...

Page 114: ... File Size 14 md Merit Dump File 15 dn Domain Name 16 ss Swap Server 17 rp Root Path 18 ef Extensions Path 28 ba Broadcast Address 33 sr Static Routes 40 yd NIS Domain 41 ys NIS Servers 42 nt NTP Servers 43 V Vendor Specific Information 44 na NetBIOS Name Servers 45 nb NetBIOS Datagram Distribution Servers 46 nc NetBIOS Node Type 47 nd NetBIOS Scope 48 xf X Font Servers 49 xd X Display Manager 51 ...

Page 115: ...7000A000000 hm 07000A000000 Relay definition for all other machines all tc relay default ha 000000000000 hm 000000000000 This is an example of a etc dhcptab file The first entry is for options which define the server s operation DHCP_SERVER_SETTINGS call on unrequited tmp unrequited script dhcpdb write perf 3 The next entry is for options that will be applied to all groups Individual options may b...

Page 116: ...ET_POOL call on assignment usr local bin assignment script subnet mask 255 255 255 0 addr pool start address 15 13 128 100 addr pool last address 15 13 128 254 gw 15 13 128 1 This is an example of a etc dhcpdeny file Sample etc dhcpdeny file 080009000001 0x080009000002 Above two clients will not be served WARNINGS Individual host entries must not exceed 1024 characters AUTHOR bootpd was developed ...

Page 117: ... of address specified as haddr may be ether or ieee802 The default address type is ether iipaddr Specify the internet address of the BOOTP client to be used in the BOOTREQUEST If the BOOTP client does not know its IP address the BOOTP server supplies it in the BOOTRE PLY Otherwise the server returns the BOOTREPLY directly to ipaddr sserver Specify the name of the BOOTP server to receive BOOTREQUES...

Page 118: ...1M bootpquery 1M SEE ALSO bootpd 1M tftp 1 tftpd 1M DARPA Internet Request For Comments RFC951 RFC1048 RFC1084 RFC1395 RFC1542 Assigned Numbers 118 Hewlett Packard Company 2 HP UX 11i Version 2 December 2007 Update ...

Page 119: ...ts and misses consistency checks The number of consistency checks performed followed by the number that passed and the number that failed modifies The number of modify operations including writes creates etc Options The following option is supported z Zero reinitialize statistics Execute cachefsstat z before executing cachefsstat again to gather statistics on the cache performance This option can ...

Page 120: ...cap description had an entry for cc whose type was not boolean numeric or string wrong type given for the boolean numeric string termcap code cc The boolean termcap entry cc was entered as a numeric or string capability the boolean numeric string termcap code cc is not a valid name An unknown termcap code was specified tgetent failed on TERM term The terminal type specified could not be found in t...

Page 121: ...long at the end of the string The algorithm used to expand parameterized information for termcap fields such as cursor_position termcap cm terminfo cup sometimes produces a string which though techni cally correct may not be optimal In particular the rarely used termcap operation n produces strings that are especially long Most occurrences of these less than optimal strings are flagged with a warn...

Page 122: ...arameters not starting with are interpreted as a list of manpage sections direc tories to search For example catman 123 restricts updating to manpage sections 1 2 and 3 directories man1 man2 and man3 Options catman supports the following options m Create a merged usr share lib whatis database i e information on new manpage entries added since the last time catman was run is merged into the current...

Page 123: ...are lib whatis database MANPATH opt langtools man catman m Note that you may wish to save MANPATH before doing this so as not to lose your current MANPATH AUTHOR catman was developed by HP and the University of California Berkeley FILES usr share man man Z Unformatted nroff compatible source manpage files compressed usr share man cat Z Formatted manpages compressed usr local man man Z usr local ma...

Page 124: ...ached file sys tem is listed by cache ID The statistics document resource utilization and cache resource parame ters s Request a consistency check on the specified file system or all cachefs mounted file systems The s option will only work if the cache file system was mounted with demandconst enabled see mount_cachefs 1M Each file in the specified cache file system is checked for consistency with ...

Page 125: ...ult is 85 maxfilesize n Largest file size expressed in megabytes that CacheFS is allowed to cache The default is 3 Currently maxfilesize is ignored by CacheFS therefore setting it will have no effect Note You cannot decrease the block or inode allotment for a cache To decrease the size of a cache you must remove it and create it again with different parameters EXAMPLES The following example create...

Page 126: ...fsadmin 1M cfsadmin 1M cfsadmin s all AUTHOR cfsadmin was developed by Sun Microsystems Inc SEE ALSO fsck_cachefs 1M mount_cachefs 1M 126 Hewlett Packard Company 3 HP UX 11i Version 2 December 2007 Update ...

Page 127: ... be defined r Remove a parameter definition For each parameter name specified on the command line remove any occurrence of that parameter from the specified file s l List configuration values For each parameter specified on the command line output every definition of the parameter from the specified file s Output consists of only the values one per line p Specify a parameter name or name value pai...

Page 128: ...d VARIABLE value VARIABLE_2 value2 VARIABLE_3 1 value3 VARIABLE_3 2 value4 All parameters are defined on a single line Parameters must not be exported WARNINGS ch_rc does not interpret configuration files it only does pattern matching As a result if comments appear on lines containing parameter definitions the comments will also appear in output when using the l option ch_rc cannot parse multiple ...

Page 129: ...lesets in the currently active patches This will determine if a pro duct fileset was installed or reinstalled after a currently active patch o Verify the checksum values of the object modules delivered by the currently active patches p Check all patch filesets for correct SD UX patch_state applied committed committed superseded superseded s Check the SD UX state to identify all unconfigured patch ...

Page 130: ...etc default nlspath c Switch to compatible mode s Switch to secure mode a Add an entry to the configuration file etc default nlspath d Delete a pseudo pathname from the configuration file etc default nlspath If multiple instances of the same pseudo pathname exists in etc default nlspath only the first instance will be removed RETURN VALUE chnlspath returns the following values 0 Operation successf...

Page 131: ... argument is relative to the current root of the running process This command is restricted to users with appropriate privileges EXTERNAL INFLUENCES International Code Set Support Single and multibyte character code sets are supported WARNINGS command cannot be in a shell script Exercise extreme caution when referring to special files in the new root file system chroot does not search the PATH env...

Page 132: ...IPD so that they are no longer displayed in the output of the swlist command see swlist 1M The HP UX 10 X patch files are also removed from var adm sw patch s Correct the patch_state attribute for HP UX 11 X patches Recommendations The cleanup i command should be executed after updating to HP UX 11 X from HP UX 10 20 It is not necessary to execute cleanup i after updating from one version of HP UX...

Page 133: ...atches should only be committed when you are satisfied with their behavior Recovering disk space should not be the only factor considered when committing patches AUTHOR cleanup was developed by HP SEE ALSO show_patches 1 sysdiff 1 check_patches 1M swlist 1M swmodify 1M swremove 1M sd 4 HP UX 11i Version 2 December 2007 Update 2 Hewlett Packard Company 133 ...

Page 134: ...ear held locks Clearing locks held by an active client may cause applications to fail in an unexpected manner Options s hostname Remove all locks created by the current machine and held by the server hostname host name is the name of host server EXIT STATUS clear_locks returns 0 Successful operation 1 If not root 2 Usage error 3 If unable to contact server RPC EXAMPLES Remove all locks on local NF...

Page 135: ...he primary purpose of this command is to remove a file that for some reason does not appear in any direc tory If it is used to clear an inode that does appear in a directory care should be taken to locate the entry and remove it Otherwise when the inode is reallocated to some new file the old entry in the directory will still point to that file At that point removing the old entry destroys the new...

Page 136: ...vc what opx25 script to run from usr lbin uucp X25 DEPENDENCIES HP2334A is the only PAD supported at this time and results in an opx25 execution of HP2334A clr EXAMPLES A typical invocation is usr lbin uucp X25 clrsvc dev x25 1 HP2334A WARNINGS Use of uucp commands including clrsvc is discouraged because they are targeted for removal from HP UX Use ftp 1 or rcp 1 instead AUTHOR clrsvc was develope...

Page 137: ...ormation on the RBAC databases Options The following options are valid option value pairs for cmdprivadm cmd command command should include the full path name of the command There can be one or more arguments following the command file filename filename should specify the full path name of a file name op operation Specifies the operation object object Specifies the object ruid ruid Specifies the r...

Page 138: ...m mount object ruid 0 euid 0 rgid 0 egid 0 compartment testcomp privs BASICROOT CHANGECMPT re auth passwd cmdprivadm add cmd sbin mount op hpux printer add object The following commands delete entries from the etc rbac cmd_priv file cmdprivadm delete cmd sbin mount a cmdprivadm delete cmd sbin mount FILES etc rbac roles Database containing valid definitions of all roles etc rbac auths Database con...

Page 139: ...partment modified as a side effect This concept is similar to a setuid binary changing a process s euid When the e or d option is specified without the n option the current running configuration is modified If e or d is specified with the n option and boot_image does not exist it is created as though the administrator ran the following command kconfig s boot_image In any case boot_image is marked ...

Page 140: ...m munications can function If the e or d option is used in conjunction with the n option any prior changes pending to the current configuration are lost If the compartments feature is enabled on a kernel configuration that does not reflect the required patch levels for example patch PHKL_32798 is missing the system may not boot properly or may not have net work connectivity SEE ALSO authadm 1M kco...

Page 141: ...les into the for mat required by sendmail 8 7 and up To run it use awk f convert_awk old cf new cf Note that the new sendmail cf files offer a wealth of new options and features You should STRONGLY con sider making a new sendmail cf file from the distribution version or from the m4 macros which are provided in usr newconfig etc mail cf SEE ALSO sendmail 1M HP UX 11i Version 2 December 2007 Update ...

Page 142: ...s interactively prompts the user with a list of the HFS file sys tems from etc fstab One or more or all of the listed file systems can be selected for conversion Typ ically it is desirable to convert all of the file systems in etc fstab to avoid inconsistencies between two file systems mounted on the same system convertfs can also be invoked with an argument of either a block or character special ...

Page 143: ...owing command line options and arguments N ComplexName Changes the name of the target complex to ComplexName This option may also be used to name a complex for the first time The characters which can appear in a valid complex name are a z A Z 0 9 dash _ underscore space and period If the complex name includes space then the name should be enclosed within double quotes The complex name can have a m...

Page 144: ... Error condition occurred EXAMPLES Change the name of the local complex to Basingstoke cplxmodify N Basingstoke Change the name of a remote complex to Ploverleigh The command prompts for the password cplxmodify N Ploverleigh g h RemoteComplex WARNINGS HP UX 11i Version 2 is the last HP UX release on which passing passwd for the u and g options is sup ported Specifying passwd on the command line wi...

Page 145: ... 1M parmodify 1M parremove 1M parunlock 1M partition 5 HP System Partitions Guide on http docs hp com HP WBEM Services for HP UX System Administrator s Guide on http docs hp com HP WBEM Services for HP UX 11i v2 0 on Integrity Servers Version A 01 05 Release Notes on http docs hp com HP UX 11i Version 2 December 2007 Update 3 Hewlett Packard Company 145 ...

Page 146: ...cond name is the new destina tion If echo is moved from usr bin to usr local bin the entry in destinations would be usr bin echo usr local bin echo When the actual installation happens cpset verifies that the old pathname does not exist If a file exists at that location cpset issues a warning and continues This file does not exist on a distribution tape it is used by sites to track local command m...

Page 147: ...lid destination for crash dumps All such devices listed on the command line will be added to the end of the current list of crash dump devices or will replace the current list of crash dump devices depending on whether r is specified class is the name or number of a system memory class which should be added to the appropriate class list The list of system memory classes can be obtained using crash...

Page 148: ...owing features for HP s A A devices 1 Active path configuration An Active Active device can be configured as a dump device through any of the paths to the device If the path through which dump configuration is being attempted is currently offline then an alternate active path will be used for configuration Use l to display the actual path used for configuration If all the paths to the device are o...

Page 149: ...irectory CRASHDIR Version 2 This format used in HP UX 11 00 and later consists of a crash n directory con taining an INDEX file the kernel and all dynamically loaded kernel module files and numerous image m p files each of which contain portions of the physical memory image and metadata describing which memory pages were dumped and which were not sources or destinations of this type should be spec...

Page 150: ...tory use crashutil var adm crash crash 2 If preferred the completed crash dump directory could be in a different location perhaps on another machine via NFS crashutil var adm crash crash 2 nfs remote otherdir To debug this crash dump using tools which do not understand the most current crash dump format con vert it to the older core directory format crashutil v COREDIR var adm crash crash 2 tmp ol...

Page 151: ... uses a template file as a starting point and then it scans the system hardware and adds all drivers it can identify to run the existing hardware If outfile is specified the result ing system file is sent to outfile If outfile is not specified the output is placed in the file stand system RETURN VALUE Upon completion create_sysfile returns with one of the following exit values 0 Successful 1 One o...

Page 152: ...eason DST shift refers to the offset that is applied to standard time to result in daylight savings time This is normally one hour but can be any combination of hours and minutes up to 23 hours and 59 minutes see tztab 4 When a command is specified to run at an ambiguous time the command is executed only once at the first occurrence of the ambiguous time When a command is specified to run at a non...

Page 153: ...CIES HP Process Resource Manager If the optional HP Process Resource Management PRM software is installed and configured jobs are launched in the initial process resource group of the user that scheduled the job The user s initial group is determined at the time the job is started not when the job is scheduled If the user s initial group is not defined the job runs in the user default group PRMID ...

Page 154: ...rectories to the beginning of directories ffsize isize Specify the file system size fsize and inode list size isize in blocks If this option is not specified the source file system value is used F hfs Specify the HFS file system type The type of a file system can be determined with the fstyp command see fstyp 1M See DEPENDENCIES scyl skip Supply device information for creating the best organizatio...

Page 155: ...d dcopy 1M dcopy 1M STANDARDS CONFORMANCE dcopy SVID3 HP UX 11i Version 2 December 2007 Update 2 Hewlett Packard Company 155 ...

Page 156: ...file associated with the mounted file system where the named file or directory resides EXAMPLES The command usr sbin devnm usr produces dev dsk c1d0s9 usr if usr is mounted on dev dsk c1d0s9 FILES dev dsk etc mnttab Mounted file system table STANDARDS COMPLIANCE devnm SVID2 SVID3 156 Hewlett Packard Company 1 HP UX 11i Version 2 December 2007 Update ...

Page 157: ...to each file system type specific_options is a comma separated list of suboptions intended for a specific FStype module of the command See the file system specific manual entries for further details P Report the name of the file system the size of the file system the number of blocks used the number of blocks free the percentage of blocks used and the directory below which the file system hierarch...

Page 158: ...eport the total allocated block figures and the number of free blocks for all mounted file systems df t Report the total allocated block figures and the number of free blocks for the file system mounted as usr df t usr FILES dev dsk File system devices etc fstab Static information about the file systems etc mnttab Mounted file system table SEE ALSO du 1 df_hfs 1M df_vxfs 1M fsck 1M fstab 4 fstyp 1...

Page 159: ... described in statvfs 2 i Report the total number of inodes the number of free inodes number of used inodes and the percentage of inodes in use k Report the allocation in kilobytes KB l Report on local file systems only n Report the file system name If used with no other options display a list of mounted file system types o specific_options Specify options specific to the HFS file system type spec...

Page 160: ...pace used for the HFS boot block 8K bytes 1 per file system HFS superblocks 8K bytes each 1 per disk cylinder HFS cylinder group blocks 1K 8K bytes each 1 per cylinder group Inodes currently 128 bytes reserved for each inode Non HFS file systems may have other items that this command does not account for The b option from prior releases has been replaced by the B option FILES dev dsk File system d...

Page 161: ...ify the file system type vxfs g Report the entire statvfs 2 structure i Report the total number of inodes the number of free inodes number of used inodes and the percentage of inodes in use k Report the allocation in kilobytes l Report on local file systems only n Report the file system name If invoked with no other options this option prints a list of mounted file system types o s Print the numbe...

Page 162: ...or all mounted file systems df t Report the total allocated block figures and the number of free blocks for the file system mounted as usr df t usr FILES dev vg00 File system devices dev dsk File system devices etc fstab Static information about the file systems etc mnttab mounted file system table SEE ALSO du 1 df 1M fsck_vxfs 1M statvfs 2 fs_vxfs 4 mnttab 4 STANDARDS CONFORMANCE df SVID2 XPG2 XP...

Page 163: ...ed Once the dhcpclient obtains the configuration parameters from the server it is stored in a configuration file named etc dhcpclient data The configuration parameters are valid for a fixed time lease time The configuration information in etc dhcpclient data file will be of the following format code length data 00 length IFname 01 length hostname 02 length sname 03 length bootfile 04 length NIS_do...

Page 164: ... below Options G When this option is used the client will accept the reply from the DHCP server only if the class id in the request and reply packet matches N hostname This option is used to send a hostname The hostname should be specified as an ASCII string b interface This option is used during bootup time to obtain a new lease If the client is trying to obtain the configuration parameters from ...

Page 165: ...d to specify the time interval between successive packet retransmission time_to_wait will be in seconds EXAMPLES To maintain the lease for the interface lan0 and invoke logging in syslog the following set of com mands is invoked at the command prompt dhcpclient b lan0 N dhcp1 dhcpclient m lan0 N dhcp1 l 3 t 1 To trace the packet and get the debugging messages use dhcpclient b lan0 N dhcp1 p l 8 Th...

Page 166: ... SEE ALSO auto_parms 1M bootpd 1M bootpquery 1M dhcptools 1M syslog 3C DARPA Internet Request For Comments RFC1541 RFC1542 RFC1533 RFC1534 Assigned Numbers RFC 166 Hewlett Packard Company 4 HP UX 11i Version 2 December 2007 Update ...

Page 167: ... to etc rc config d netconf This is how dhcpdb2conf is called from auto_parms c Create copies Create a set of staging files using the results of the selected filters see below Each parameter processed is applied to its corresponding copy of one configuration file re created by dhcpdb2conf For example etc rc config d netconf is copied to etc rc config d netconf dhcp If the file already exists and c...

Page 168: ...r sets for lan0 to the existing configuration files dhcpdb2conf ira lan0 Apply all parameter sets to the existing configuration files using lan0 and set index 1 dhcpdb2conf a s 1 lan0 WARNINGS Using the a option overrides any existing values which are currently set in the system s configuration files while the c option merely revises staging files if any FILES usr lbin dhcpdb2conf The command itse...

Page 169: ...ong with an IP address to a DHCP client For IP address allocation to DHCP clients the bootpd server uses gethostbyaddr 3N to find the host name associated with a particular IP address Each host entry in dhcphosts contains an IP address followed by a host name The IP address of the first entry is first_IP_address The hostname of the first entry is derived from the hostname_template Each subsequent ...

Page 170: ... r R or v options is allowed per dhcptools command RETURN VALUE dhcptools returns zero upon successful completion or non zero if the command failed in which case an explanation is written to standard error EXAMPLES Dump the active bootpd server s internal data to the dump output files dhcptools d Generate a tmp dhcphosts file with 10 entries dhcptools h fip 192 11 22 0 no 10 sm 255 255 255 0 hn wo...

Page 171: ...put file tmp libdhcp sl library file tmp dhcp dump bootptab dump output file tmp dhcp dump dhcptab dump output file tmp dhcp dump other dump output file etc bootptab default bootptab file for validate etc dhcptab default dhcptab file for validate tmp dhcpfifo root FIFO file for dhpctools to bootpd 1M communication tmp dhcpfifo any FIFO file for dhcptools to bootpd 1M communication tmp dhcpfifo FIF...

Page 172: ...uding the information and warning types Configuration The etc rc config d netconf ipv6 file is used for the configuration of the interfaces To invoke dhcpv6clientd using the dhcpv6config script set the DHCPV6_ENABLE index variable to a non zero value in the etc rc config d netconf ipv6 file The dhcpv6config script invokes dhcpv6clientd and dhcpv6client_ui during bootup to obtain IP addresses dhcpv...

Page 173: ...ientd needs to obtain a new set of addresses from the server Thus the client will form a SOLICIT message and send it to the pre determined ALL DHCP Agents address In response to this the client will receive the ADVERTISE message from DHCP servers The client will select a DHCP server based on the DHCP server preference value EXAMPLES dhcpv6clientd treats the NIS server and DNS server addresses as d...

Page 174: ...he same link as that of the client or through the on link relay The server responds with REPLY message containing the requested configuration parameters The DHCP server assigns addresses to the clients using Identity Association IA which is a collection of addresses assigned to a client The client uses the addresses in the IA to configure its interfaces If the client determines that the address al...

Page 175: ... addresses are specified in the standard IPv6 notation colon notation and can use hexadecimal numbers The tags for the DHCP_CLIENT_DEFAULT_SETTINGS are as listed below These tags are applicable to all the addresses that the server assigns to the DHCPv6 client client settings name client settings name in string format This tag specifies the name of the group default settings POSIX time zone POSIX t...

Page 176: ...rep min value This tag specifies the minimum pause interval in seconds before the REQUEST mes sage is sent in response to the RECONFIGURE INIT message rec rep max value This tag specifies the maximum pause interval in seconds before the REQUEST mes sage is sent in response to the RECONFIGURE INIT message Note Currently the mechanism of transferring these parameters to the client is not defined in ...

Page 177: ...alues for the above listed tags must satisfy the following condition reconf grace period T1 T2 preferred life time valid life time If the above condition fails the server takes the default values The DHCPv6 relay specific tags are as listed below DHCP_RELAY_SETTINGS This tag indicates the start of the DHCP relay settings pool group name name of the pool group This tag specifies the name of the poo...

Page 178: ...fe 305 1002 1 200 c0ff fe23 b590 preference 255 NTP server address 3ffe 200 fe23 b102 DHCP_RELAY_SETTINGS pool group name RED POOL subnet prefix 5ffe 305 1002 1 prefix len 64 dest dhcp server address 5ffe 305 1002 1 2345 203 1ff3 3048 AUTHOR dhcpv6d was developed by Hewlett Packard FILES etc dhcpv6tab This is the dhcpv6 server configuration file SEE ALSO dhcpv6client_ui 1 dhcpv6clientd 1M dhcpv6db...

Page 179: ...options are supported a Using the results of the specified filter directly apply the variable definitions to the existing configuration files for example etc rc config d netconf ipv6 c Create a set of staging files using the results of the selected filter s Each variable pro cessed will be applied to its corresponding staging configuration file Specifically dhcpv6db2conf will generate a copy of th...

Page 180: ...FACE variable set for lan0 type dhcpv6db2conf i lan0 WARNINGS The NIS and NTP parameters are not IPv6 compatible Hence do not use dhcpv6db2conf to update them AUTHOR dhcpv6db2conf was developed by Hewlett Packard FILES etc dhcpv6client data Client configuration database SEE ALSO dhcpv6clientd 1M dhcpv6d 1M 180 Hewlett Packard Company 2 HP UX 11i Version 2 December 2007 Update ...

Page 181: ...The binary representation is used in DNS queries and responses The resource record types are a a host address dotted quad This is the default value for query type AAAA resource record type for IPv6 queries any request data of any type for a name axfr a request for a transfer of an entire zone hinfo host information mx a mail exchange ns an authoritative name server soa marks the start of a zone of...

Page 182: ...s a number of query options to affect lookups and to affect the results that are displayed Some options set or reset flag bits in the query header some options determine which sections of the answer get displayed and other options determine the timeout and retry strategies Each query option is identified by a keyword preceded by no which causes an option to be set or reset or to negate the meaning...

Page 183: ...e short form only the result will be displayed whereas in the complete form additional information like info about other servers that might answer your query is also included By default the answer is printed in a verbose form no identify Show or do not show the IP address and port number that supplied the answer when the short option is enabled If short form answers are requested source address an...

Page 184: ...ions A global set of query options which should be applied to all queries can also be supplied via global d options These global query options must precede the first set of domain class type options and query options sup plied on the command line Any global query options can be overridden by a query specific set of query options for each individual query For example dig qr www bind org any x 127 0...

Page 185: ...one transfer notify and recur sive query messages TSIG is very useful for dynamic updates SEE ALSO dnssec keygen 1 dnssec makekeyset 1 dnssec signkey 1 dnssec signzone 1 host 1 nsupdate 1 hosts_to_named 1M lwresd 1M named 1M gethostent 3N hostname 5 HP UX 11i Version 2 December 2007 Update 5 Hewlett Packard Company 185 ...

Page 186: ...o effect SCSI disk devices return the following Vendor and product ID Device type Size in bytes and in logical blocks Bytes per sector Revision level SCSI conformance level data WARNINGS As of release 10 20 of HP UX certain IDE devices CD ROMs in particular will respond to diskinfo inquiries as if they were SCSI devices Therefore the text SCSI describe in the output of the diskinfo command does no...

Page 187: ...7992 7992 10 unused unused unused 516096 Note It is important to note the difference between the block size passed into disksecn via the b switch argument and the sector size the user is asked to input when an unknown disk name is passed to disksecn via the n switch argument The block size is the sector size that disksecn assumes the disk to have when it prints the requested tables All information...

Page 188: ... size requested Unknown disk name was specified and user did not supply disk information Disk s maximum storage space is less than approximately 44 MB WARNINGS Alternate names are not included in the output when the d switch is used Blanks are required in the command line between each of the switches when invoking disksecn A blank is required between the n switch and the disk name argument to that...

Page 189: ...hose file system name is in fnmlist fnmlist is a list of file system names separated by commas or enclosed within quotes diskusg compares each name in this list with the file system name stored in the volume ID if it exists p file Use file as the name of the password file to generate login names etc passwd is used by default u file Write records to file of files that are charged to no one Records ...

Page 190: ... for the defaults dev kmem and stand vmunix respectively where core should be a file containing the image of the kernel virtual memory saved by the savecrash 1M command and system should be the corresponding kernel If the system is booted with a kernel other than stand vmunix say stand vmunix_new dmesg must be passed this name the command must be usr sbin dmesg dev kmem stand vmunix_new WARNINGS T...

Page 191: ...ntually causes an ocd process if any is running to shutdown If this option is omitted no device files will be removed and therefore only newly added valid entries in the dp file will have ocd launched ocd normally creates and removes devices files However if the process is killed incorrectly such as with kill 9 the device file may remain If the system is rebooted the k option can be specified to r...

Page 192: ...cesses available on the system 15 ERROR Entry ignored no device_name 16 ERROR Entry ignored Bad device_name The device file specified cannot be created either because of an invalid path or because of insufficient access privileges 17 ERROR Entry ignored Bad config name The specified configuration file cannot be read either because of an invalid path or because of insufficient access privileges 18 ...

Page 193: ...kill 9 for this purpose as it does not remove the device file ocd verifies the validity of an existing pseudonym before trying to use it dpp and ocd use data stored in the file var adm utmp dfa to verify whether a process still owns a pseu donym before taking it over If ocd finds an unowned pseudonym it uses it FILES usr examples ddfa dp usr examples ddfa pcf usr sbin dpp usr sbin ocd usr sbin ocd...

Page 194: ...m image See drd runcmd 1M Only a select group of commands may be run by the runcmd mode These are commands that have been verified to have no affect on the booted system when executed by drd runcmd Such commands are referred to as DRD Safe The commands kctune swinstall swjob swlist swmodify swremove swverify and view are currently certified DRD Safe An attempt to execute any other command will res...

Page 195: ... disk group to a physical device For 11i v2 drd clone p t dev dsk c1t15d0 For 11i v3 drd clone p t dev disk disk7 To display all drd clone extended options drd clone x To mount the inactive system image drd mount If the system image mounted was created by the most recent drd clone command the root file system will be mounted at var opt drd mnts sysimage_001 If the system image was booted when the ...

Page 196: ...ate x alternate_bootdisk dev dsk c1t1d0 For 11i v3 drd activate x alternate_bootdisk dev disk disk1 To boot to the inactive system image immediately drd activate x reboot true To display all drd activate extended options drd activate x To restore the active booted system image as the primary boot disk drd deactivate To restore the active booted system image as the primary boot disk and set a diffe...

Page 197: ...S var opt drd drd log Log file SEE ALSO drd activate 1M drd clone 1M drd deactivate 1M drd mount 1M drd runcmd 1M drd umount 1M Dynamic Root Disk Administrator s Guide available on the HP Technical Documentation web site at http docs hp com en DRD HP UX 11i Version 2 December 2007 Update 4 Hewlett Packard Company 197 ...

Page 198: ...elow x Displays the list of possible x extended options x option value Sets the extended option to a value See the Extended x Options section below X option_file Gets the extended options from a file See drd 1M for an explanation of the format and an example of an option file Extended x Options drd activate recognizes the following x extended options If a default value exists it is shown in bold x...

Page 199: ...e also the v and q options in the Options section above The v option increases the verbosity by 1 for example from 3 to 4 and the q option decreases the verbosity by 1 The v and q options can be given more than once Multiples can be merged as in qq For example if both x verbosity 5 and qqq are included on the command line the effective verbosity is 2 The minimum combined verbosity level is 0 For e...

Page 200: ... FILES var opt drd drd log Log file SEE ALSO drd 1M drd clone 1M drd deactivate 1M drd mount 1M drd runcmd 1M drd umount 1M setboot 1M Dynamic Root Disk Administrator s Guide available on the HP Technical Documentation web site at http docs hp com en DRD 200 Hewlett Packard Company 3 HP UX 11i Version 2 December 2007 Update ...

Page 201: ...te in the Extended x Options section below v Increases the verbosity level by one each time it is specified For the interaction with x verbosity see the Extended x Options section below x Displays the list of possible x extended options x option value Sets the extended option to a value See the Extended x Options section below X option_file Gets the extended options from a file See drd 1M for an e...

Page 202: ...s and the starting ending BANNER messages 1 Adds WARNING messages 2 Adds NOTE messages 3 Adds INFO messages informational messages preceded by the character 4 Adds verbose INFO messages 5 Adds very verbose INFO messages See also the v and q options in the Options section above The v option increases the verbosity by 1 for example from 3 to 4 and the q option decreases the verbosity by 1 The v and ...

Page 203: ...not currently in use by LVM or VxVM but contains LVM VxVM or boot records it will only be accepted as a drd clone target if x overwrite true is specified For further information on choosing a target disk for a clone operation see the Dynamic Root Disk Administrator s Guide see the SEE ALSO section The Target Volume Manager The target volume manager must be the same as the source volume manager If ...

Page 204: ...ce For 11i v2 drd clone p t dev dsk c1t15d0 For 11i v3 drd clone p t dev disk disk7 To display all drd clone extended options drd clone x AUTHOR drd was developed by HP FILES var opt drd drd log Log file SEE ALSO drd 1M drd activate 1M drd deactivate 1M drd mount 1M drd runcmd 1M drd umount 1M ioscan 1M swapinfo 1M vgdisplay 1M vxdisk 1M Dynamic Root Disk Administrator s Guide available on the HP ...

Page 205: ...options from a file See drd 1M for an explanation of the format and an example of an option file Extended x Options drd deactivate recognizes the following x extended options If a default value exists it is shown in bold x alternate_bootdisk diskpath Usage Basic This is the alternate boot disk The diskpath must be specified as a block device file x HA_alternate_bootdisk diskpath Usage Basic This i...

Page 206: ...ases the verbosity by 1 The v and q options can be given more than once Multiples can be merged as in qq For example if both x verbosity 5 and qqq are included on the command line the effective verbosity is 2 The minimum combined verbosity level is 0 For example if both x verbosity 1 and vv are included on the command line the effective verbosity is 3 The maximum combined verbosity level is 5 RETU...

Page 207: ...d activate 1M drd clone 1M drd mount 1M drd runcmd 1M drd umount 1M Dynamic Root Disk Administrator s Guide available on the HP Technical Documentation web site at http docs hp com en DRD HP UX 11i Version 2 December 2007 Update 3 Hewlett Packard Company 207 ...

Page 208: ...preview in the Extended x Options section below q Decreases the verbosity level by one each time it is specified For the interaction with x verbosity see the Extended x Options section below v Increases the verbosity level by one each time it is specified For the interaction with x verbosity see the Extended x Options section below x Displays the list of possible x extended options x option value ...

Page 209: ... verbosity 5 and qqq are included on the command line the effective verbosity is 2 The minimum combined verbosity level is 0 For example if both x verbosity 1 and vv are included on the command line the effective verbosity is 3 The maximum combined verbosity level is 5 RETURN VALUE drd mount returns one of the following values 0 Success 1 Error 2 Warning EXAMPLES To mount the inactive system image...

Page 210: ... ALSO drd 1M drd activate 1M drd clone 1M drd deactivate 1M drd runcmd 1M drd umount 1M Dynamic Root Disk Administrator s Guide available on the HP Technical Documentation web site at http docs hp com en DRD 210 Hewlett Packard Company 3 HP UX 11i Version 2 December 2007 Update ...

Page 211: ...zes the following options Displays the usage message p Sets preview mode See also x preview in the Extended x Options section below q Decreases the verbosity level by one each time it is specified For the interaction with x verbosity see the Extended x Options section below v Increases the verbosity level by one each time it is specified For the interaction with x verbosity see the Extended x Opti...

Page 212: ...s very verbose INFO messages See also the v and q options in the Options section above The v option increases the verbosity by 1 for example from 3 to 4 and the q option decreases the verbosity by 1 The v and q options can be given more than once Multiples can be merged as in qq For example if both x verbosity 5 and qqq are included on the command line the effective verbosity is 2 The minimum comb...

Page 213: ...on Notes Specification of a catalog is not supported c Depot targets are not supported by drd runcmd See discus sion above d Execution of fix scripts is not supported by drd runcmd F Scheduling of jobs is not supported by drd runcmd J Scheduling of jobs is not supported by drd runcmd Q Installation to SD style alternate roots is not supported by drd runcmd r The inactive system image is always the...

Page 214: ...installation of PHCO_0001 from the depot var opt patches located on the system patchsvr drd runcmd swinstall p s patchsvr var opt patches PHCO_0001 To verify all software on the inactive system image drd runcmd swverify To remove PHKL_9999 from the inactive system image drd runcmd swremove PHKL_9999 To view the swagent log on the inactive system image drd runcmd view var adm sw swagent log To disp...

Page 215: ...vel by one each time it is specified For the interaction with x verbosity see the Extended x Options section below v Increases the verbosity level by one each time it is specified For the interaction with x verbosity see the Extended x Options section below x Displays the list of possible x extended options x option value Sets the extended option to a value See the Extended x Options section below...

Page 216: ...and qqq are included on the command line the effective verbosity is 2 The minimum combined verbosity level is 0 For example if both x verbosity 1 and vv are included on the command line the effective verbosity is 3 The maximum combined verbosity level is 5 RETURN VALUE drd umount returns one of the following values 0 Success 1 Error 2 Warning EXAMPLES To unmount the inactive system image drd umoun...

Page 217: ...file of the mirror disk The file should refer to the entire disk not to a partition RETURN VALUE drd_register_mirror returns one of the following values 0 Success 1 Error 2 Warning EXAMPLES To display drd_register_mirror usage information drd_register_mirror To notify DRD that all logical volumes in the root group have been mirrored to disk dev dsk c1t2d0 drd_register_mirror dev dsk c1t2d0 To noti...

Page 218: ...registered and removed Options drd_unregister_mirror recognizes the following option Displays the usage message Operands drd_unregister_mirror recognizes the following operand mirror_block_device_file The block device special file of the mirror disk The file should refer to the entire disk not to a partition RETURN VALUE drd_unregister_mirror returns one of the following values 0 Success 1 Error 2...

Page 219: ...to the standard output When using rdump this option should be specified and the next argument supplied should be of the form machine device n Whenever dump and rdump require operator attention notify all users in group opera tor by means similar to that described by wall 1 s The size of the dump tape is specified in feet The number of feet is taken from the next argument When the specified size is...

Page 220: ...d rdump is busy and will be for some time Access Control Lists ACLs The optional entries of a file s access control list ACL are not backed up with dump and rdump Instead the file s permission bits are backed up and any information contained in its optional ACL entries is lost see acl 5 EXAMPLES In the following example assume that the file system mnt is to be attached to the file tree at the root...

Page 221: ...or the name of the device special file on which it resides The information is very long and detailed This command can be used to find file system information such as the file system block size or the minimum free space percentage DEPENDENCIES The dumpfs command can only be used on HFS file systems AUTHOR dumpfs was developed by the University of California Berkeley SEE ALSO fsck 1M mkfs 1M newfs 1...

Page 222: ...inodes on a file system a countdown timer is started and the user has an amount of time equal to the time limit in which to reduce usage to below the soft limit the required action is given by the quota command If the time limit expires before corrective action is taken the quota system enforces policy as if the hard limit had been exceeded The default time limit of 0 is interpreted to mean the va...

Page 223: ... system table directory quotas Quota statistics static storage for a file system where directory is the root of the file system as specified to the mount command see mount 1M SEE ALSO quota 1 vi 1 quotacheck 1M quotacheck_hfs 1M quota 5 HP UX 11i Version 2 December 2007 Update 2 Hewlett Packard Company 223 ...

Page 224: ...ied to the destination directory Options Options can be used singly or combined in any order before the file names The space between option and argument is optional d devicefile devicefile is the device special file of the EFI file system to be copied Without the d option efi_cp uses the device file specified in the environment variable EFI_PARTITION if it is defined The d option overrides the EFI...

Page 225: ...e device specified in the EFI_PARTITION environment variable and rename it to hpux efi efi_cp bootloader EFI HPUX hpux efi Copy EFI HPUX AUTO from the EFI file system on the specified device into the current HP UX direc tory efi_cp d dev rdsk c1t4d0s1 u EFI HPUX AUTO AUTHOR efi_cp was developed by HP FILES None SEE ALSO efi_fsinit 1M efi_ls 1M efi_mkdir 1M efi_rm 1M efi_rmdir 1M efi 4 HP UX 11i Ve...

Page 226: ...icefile Write the file system header on device devicefile Without the d option efi_fsinit uses the device file specified in the environment variable EFI_PARTITION if it is defined The d option overrides the EFI_PARTITION environment variable RETURN VALUE efi_fsinit returns exit code 0 if the EFI file system is initialized successfully Otherwise it prints a diagnostic message and returns nonzero 0 ...

Page 227: ...following option d devicefile devicefile is the device special file of the EFI file system to be listed Without the d option efi_ls uses the device file specified in the environment variable EFI_PARTITION if it is defined The d option overrides the EFI_PARTITION environment variable RETURN VALUE efi_ls returns exit code 0 on success Otherwise it prints a diagnostic message and returns nonzero 0 Su...

Page 228: ...names The space between option and argument is optional d devicefile devicefile is the device special file of the EFI file system where the directory is to be made Without the d option efi_mkdir uses the device file specified in the environment variable EFI_PARTITION if it is defined The d option overrides the EFI_PARTITION environment variable p Create intermediate directories as necessary RETURN...

Page 229: ...the following option d devicefile devicefile is the device special file of the EFI file system from which the file is to be removed Without the d option efi_rm uses the device file specified in the environ ment variable EFI_PARTITION if it is defined The d option overrides the EFI_PARTITION environment variable RETURN VALUE efi_rm returns exit code 0 if the file is removed successfully Otherwise i...

Page 230: ...e system Options efi_rmdir recognizes the following option d devicefile devicefile is the device special file of the EFI file system from which the directory is to be removed Without the d option efi_rmdir uses the device file specified in the environment variable EFI_PARTITION if it is defined The d option overrides the EFI_PARTITION environment variable RETURN VALUE efi_rmdir returns exit code 0...

Page 231: ...ent Event lines consist of an event keyword and a message indicator separated by a colon Valid event keywords are OVERTEMP_CRIT OVERTEMP_EMERG FANFAIL_CRIT and FANFAIL_EMERG Valid message indicators are y and n An example is OVERTEMP_EMERG y indicating that warning messages are to be sent for the OVERTEMP_EMERG event Event keywords must start in the first column and only one event and one message ...

Page 232: ...the failed fans are replaced FANFAIL_CRIT Chassis fan failures prevent continued operation of the system power loss is imminent FANFAIL_EMERG Hardware will disconnect all power from all cards in the system chassis FANFAIL_POWERLOSS The syslog priorities mapped to the environmental events are LOG_EMERG for OVERTEMP_EMERG and FANFAIL_EMERG and LOG_CRIT for OVERTEMP_CRIT and FANFAIL_CRIT Any non shut...

Page 233: ...1M envd 1M var tmp envd action 123 envd work files SEE ALSO reboot 1M shutdown 1M syslogd 1M syslog 3C HP UX System Administration manuals HP UX 11i Version 2 December 2007 Update 3 Hewlett Packard Company 233 ...

Page 234: ... can include any of the following async All NFS Protocol Version 2 mounts will be asynchronous This option is ignored for NFS PV3 Refer to exports 4 for warnings when using this option ro Export the directory read only If not specified the directory is exported read write The ro and rw options cannot be used on the same exportfs command line rw hostname hostname Export the directory read mostly Re...

Page 235: ... name DNS suffix To use domain membership the server must use DNS to resolve hostnames to IP addresses That is the hosts entry in the etc nsswitch conf file must specify dns ahead of nis or nisplus since only DNS returns the full domain name of the host Other name services like NIS or NIS cannot be used to resolve hostnames on the server because when mapping an IP address to a host name they do no...

Page 236: ...ser vice exportfs i o rw polk myd myc com vanness myd myc com usr bin Export usr bin read write only to systems polk and vanness when using NIS or NIS as the name services exportfs i o rw polk vanness usr bin Export root access on var adm only to the system named pine and mount access to both pine and geary when using DNS as the name services exportfs i o root pine myd myc com access pine myd myc ...

Page 237: ...reside in the same disk partition If you unexport a directory remove a client from the access list then export again the client still has access to the directory until the client unmounts the directory Removing a client from the root or rw list takes effect immediately etc xtab is a system file that contains a list of currently exported directories and files This file is maintained by exportfs To ...

Page 238: ...lowing options F FStype Specify the file system type on which to operate see fstyp 1M and fs_wrapper 5 If this option is not included on the command line then the file system type is determined from the file etc default fs q Query the size of special No file system extension will be done v Verbose flag s size Specifies the number of DEV_BSIZE blocks to be added to the file system If size is not sp...

Page 239: ... added to the file system If the number of blocks is not specified the maximum possible size is used EXAMPLES To increase the capacity of a file system created on a logical volume enter umount dev vg00 lvol1 lvextend L larger_size dev vg00 lvol1 extendfs F hfs dev vg00 rlvol1 mount dev vg00 lvol1 mount_directory WARNINGS The root file system cannot be extended using the extendfs command because th...

Page 240: ...le system Without v there is no output Operands extendfs recognizes the following operand special The device special file of either a logical volume or a disk partition If special refers to a mounted file system you must unmount special before running extendfs see mount 1M Notes The Version 5 disk layout supports file systems up to 32 terabytes For you to increase a file system to 32 terabytes it ...

Page 241: ...fbackupfiles dates by default Note that the directory var adm fbackupfiles must be created prior to the first time fbackup is used for incremental backups The d option can be used to specify an alternate database file The user can specify to update this file when an fbackup session completes successfully Entries for each session are recorded on separate pairs of lines The following four items appe...

Page 242: ...ps should be made and how many incremental backups to make between full backups Time periods can be used such as a full backup every Friday and incremen tals on all other days Media capacities can be used if incremental backups need to run unattended The availability of personnel to change media can also be an important factor as well as the length of time needed for the backup Other factors may a...

Page 243: ...This tree must be a subtree of part of the backup graph Otherwise specifying it will not exclude any files from the graph There is no limit on how many times the e option can be specified f device device specifies the name of an output file If the name of the file is fbackup writes to the standard output There is no default output file at least one must be specified If more than one output file is...

Page 244: ...extent attributes Normally all extent attributes that have been set are included with the file This option only applies to file systems which support extent attri butes I path path specifies the name of the on line index file to be generated It consists of one line for each file backed up during the session Each line contains the file size the volume number on which that file resides and the file ...

Page 245: ...e of LANG is used as a default for each unspecified or empty variable If LANG is not specified or is set to the empty string a default of C see lang 5 is used instead of LANG If any internationalization variable contains an invalid setting fbackup behaves as if all internationaliza tion variables are set to C See environ 5 International Code Set Support Single and multi byte character code sets ar...

Page 246: ... selective recovery fast searching in this case means spacing to the nearest checkpoint before the desired file and then reading until the file is found With this dual pur pose for checkpoints caution should be used when changing the checkpoint frequency parameter Starting with HP UX Release 8 0 fbackup does not back up network special files because RFA network ing is obsolete A warning message is...

Page 247: ...mple a blocksper record parameter of 32 would create 16 Kbyte blocks at Release 7 0 but now creates 32 Kbyte blocks If blocksperrecord exceeds the byte count allowed by the tape drive the tape drive rejects the write causing an error to be communicated to fbackup which fbackup interprets as a bad tape The resulting write error message resembles the following fbackup 3013 Write error while writing ...

Page 248: ...rt Matrix available at http docs hp com en FCI SM FCI SM htm The fcmsutil command is a common diagnostic tool used for all Fibre Channel Host Bus Adapters sup ported on HP UX This command provides the ability to perform Fibre Channel Test and Echo functional ity read the card s registers and so on This command requires the use of a device file to indicate the interface over which the requested com...

Page 249: ... speed or adapter is not connected 1Gb The link is online and the operating speed is 1 gigabits per second 2Gb The link is online and the operating speed is 2 gigabits per second 4Gb The link is online and the operating speed is 4 gigabits per second vpd This option is used to display Vital Product Data information of the HBA It includes information such as the product description part number engi...

Page 250: ...re Chan nel driver utility For TL and XL2 HBAs this option requires one parameter and an optional count f lb plm crpat cjtpat count Here plm refers to physical link module or gigabit link module which builds the default payload for the loopback frame If either crpat or cjtpat is used then the card builds specific payloads based on the recommendations in Fibre Channel Methodologies for Jitter Speci...

Page 251: ...he statistics maintained by the driver nsstat This option is used to obtain detailed nameserver statistics maintained by the driver clear_nsstat This option is used to clear the nameserver statistics maintained by the driver devstat all remote N Port ID This option is used to obtain detailed statistics associated with each N_Port that this N_Port has communicated with If the remote N Port ID is sp...

Page 252: ...tamp dmp These dumps should be sent to HP for further analysis of the problem NOTE The driver does not save any new dumps until the previously saved dump is retrieved with this option The availability of a saved dump can be checked by running fcmsutil device_file dump_nvram This option is used to display the contents of NVRAM on the adapter rom_fw_update ROM firmware file This option is used to up...

Page 253: ...option is only supported by 4Gb s capable Fibre Channel cards EXAMPLES Print the remote port parameters using the get remote option if the driver is idle In this example dev td1 is the device file and dev rdsk c27t0d0 is the respective raw disk file fcmsutil dev td1 get remote 0x98 dev rdsk c27t0d0 Print a short listing of the statistics maintained by the driver with dev td1 as the device file fcm...

Page 254: ...turned to the state that they were in before the STREAMS device or pipe was attached Any other paths that the STREAMS device or pipe may be attached to are not affected To successfully issue the fdetach command the user must be superuser or must be the owner of the file and have write permission RETURN VALUE fdetach returns 0 zero on success If fdetach fails it returns 1 and prints a message to st...

Page 255: ...c fstab then the file system type is determined from the file etc default fs o specific_options Specify options specific to each file system type specific_options is a list of suboptions and or keyword attribute pairs intended for a specific FStype specific module of the command See the file system specific man pages for a description of the specific_options supported if any V Echo the completed c...

Page 256: ...ode has been accessed in num days c num Select a file if the i node has been changed in num days F hfs Specify the HFS file system type i inode list Generate names for any i node specified in the inode list I Do not display the i node number after each path name l Generate a list of all path names for files with more than one link m num Select a file associated with an i node if it has been modifi...

Page 257: ...ff l i 451 76 dev dsk c1d2s0 Execute the ff command on an HFS file system dev dsk c1d2s0 ff F hfs dev dsk c1d2s0 FILES etc fstab Static information about the file systems SEE ALSO find 1 ff 1M ff_vxfs 1M ncheck 1M fstab 4 HP UX 11i Version 2 December 2007 Update 2 Hewlett Packard Company 257 ...

Page 258: ...has been changed in num days F vxfs Specify the VxFS file system type i inode list Generate names for any inodes specified in the inode list I Do not display the inode number after each pathname l Generate a list of all pathnames for files with more than one link m num Select a file associated with the inode if it has been modified in num days n file Select a file associated with an inode if it ha...

Page 259: ... ago a 30 ff a 30 dev vg01 rlvol1 Find all pathnames associated with inodes 451 and 76 l ff l i 451 76 dev vg01 rlvol1 Execute the ff command on a VxFS file system dev vg01 rlvol1 ff F vxfs dev vg01 rlvol1 FILES etc fstab Static information about the file systems SEE ALSO find 1 ff 1M ncheck_vxfs 1M fstab 4 HP UX 11i Version 2 December 2007 Update 2 Hewlett Packard Company 259 ...

Page 260: ... line as the arguments to an invocation of finger fingerd sends the output of finger to the remote host and closes the connection If the command line is null contains only a carriage return and line feed pair finger returns a report that lists all users logged in on the system at that moment If a user name is specified on the command line for example user CR LF the response lists more extended inf...

Page 261: ...1 normally uses more s to accomplish this removal To ensure success fixman should be run by a user who has appropriate privileges It will take awhile to complete depending on system speed load memory size etc As a side effect file ownerships and permis sions may be changed Options A alt path Perform actions based on the given alternate root With this option alt path will be prepended to all direct...

Page 262: ...f fixman 1M fixman 1M SEE ALSO catman 1M chmod 1 expand 1 lp 1 man 1 mv 1 sed 1 environ 5 262 Hewlett Packard Company 2 HP UX 11i Version 2 December 2007 Update ...

Page 263: ...ul completion 1 Command failed DIAGNOSTICS AND ERRORS Errors can originate from problems with format SCSI device level communications system calls Error messages generated by format usage format special An error in command syntax has occurred Enter command again with all required arguments in the order shown format device busy To ensure that format does not modify a disk array that is being used b...

Page 264: ...g purposes is performed by the system utility strerror EXAMPLES To format the HP SCSI disk array LUN dev rdsk c2t0d0 on a Series 800 format dev rdsk c2t0d0 WARNING The format command will destroy all user data on the addressed LUN DEPENDENCIES The HP C2425 and HP C2427 disk arrays are only supported on Series 700 systems running HP UX version 9 0X The HP C2430 disk array is supported on Series 700...

Page 265: ...ecovered If no file argument is given including an empty graph file all files on the backup media are extracted unless the h option is specified I path The index on the current volume is extracted from the backup media and is written to path V path The volume header on the current volume is extracted from the backup media and is written to path The following fields from the header are extracted in...

Page 266: ... The maximum number of resynchronization attempts is five error var adm fbackupfiles frecovererror chgvol var adm fbackupfiles frecoverchgvol sync 5 e path path is interpreted as a graph to be excluded from the recovery There is no limit on how many times the e option can be specified f device device identifies the backup device to be used instead of the default dev rmt 0m If device is frecover re...

Page 267: ...ments warn Issue a warning message if extent attributes cannot be restored but restore the file anyway ignore Do not restore extent attributes force Issue an error message and do not restore the file if extent attributes cannot be restored Extent attributes cannot be restored if the files are being restored to a file system which does not support extent attributes or if the file system s block siz...

Page 268: ...he tape to find the files This is done when the first index is read from the tape and accounts for a period of time just after recovery is begun where the tape is inactive while this in memory index is constructed The larger the index is the longer this period lasts The utility set comprised of fbackup and frecover was originally designed for use on systems equipped with not more than one gigabyte...

Page 269: ...hese formats frecover fails and the following message is displayed mt lu X Read must be a multiple of 512 bytes in QIC 120 and QIC 150 AUTHOR frecover was developed by HP FILES dev rmt 0m Default backup device SEE ALSO cpio 1 dump 1M fbackup 1M restore 1M rmt 1M acl 5 HP UX 11i Version 2 December 2007 Update 5 Hewlett Packard Company 269 ...

Page 270: ... the power state of a component cell or chassis Cell power operations are limited to free cells and inactive or powered off cells assigned to the local partition If the nPartition Configuration Privilege is restricted then control of free cells is not allowed Note The nPartition Configuration Privilege state can only be changed at the service processor s Command menu When connecting to a remote pa...

Page 271: ... it is highly recommended not to specify the password on the command line and instead allow the command to prompt for the password Note Specifying passwd on the command line will not be supported in future releases h IPaddress hostname This option should only be used in combination with either the u or g option IPaddress hostname specifies the IP address or hostname of the target partition u or co...

Page 272: ... of 8 cells For example the cells located in cabinet 0 will have the following cell numbers in global format 0 1 2 3 4 5 6 7 The cell numbers in correspond ing local format will be 0 0 0 1 0 2 0 3 0 4 0 5 0 6 0 7 Similarly the cells located in cabinet 1 will have the following cell numbers in global format 8 9 10 11 12 13 14 15 The cell numbers in corresponding local format will be 1 0 1 1 1 2 1 3...

Page 273: ...t wbem client pem This file is used by the commands that come with WBEM installation Hence if the commands that come with the WBEM installation trust a target partition then npartition commands will also trust the target partition Refer to the WBEM documents specified in the SEE ALSO section below for further information AUTHOR frupower was developed by the Hewlett Packard Company SEE ALSO fruled ...

Page 274: ...in etc fstab then the file system type is determined from the file etc default fs o specific_options Specify options specific to each file system type specific_options is a list of comma separated suboptions and or keyword attribute pairs intended for a specific FStype specific module of the command See the file system specific manual entries for a description of the specific_options supported if ...

Page 275: ...file sys tem for the conversion to succeed V Echo the completed command line but perform no other action The command line is gen erated by incorporating the user specified options and other information derived from etc fstab This option allows the user to verify the command line DIAGNOSTICS Error and warning messages may originate from fsadm and fsck See fsadm 1M or fsck 1M to inter pret the error...

Page 276: ... days Consider files not accessed within the specified number of days as aged files The default is 14 days The d option moves aged files to the end of the directory The a days option applies only with d b newsize Resize the file system to newsize sectors b cannot be used with the cdDeEo options c Convert the inode format of files upgraded from the Version 2 disk layout so that they can grow beyond...

Page 277: ...kup may not operate correctly if they are not large file aware p passes Maximum number of passes to run The default is 5 passes Reorganizations are processed until reorganization is complete or the specified number of passes are run r rawdev Pathname of raw device to read to determine file layout and fragmentation This option can be used when fsadm cannot determine the raw device s Print a summary...

Page 278: ...ns all the directory reorganization passes before any extent reorganization passes fsadm uses the file fsadm in the lost found directory as a lock file When fsadm is invoked it opens the file lost found fsadm in the root of the file system specified by mount_point If the file does not exist it is created The fcntl 2 system call obtains a write lock on the file If the write lock fails fsadm assumes...

Page 279: ... directory reorganization can improve performance of pathname resolution The directories that fragment tend to be the directories with the most activity A small number of fragmented directories may account for a large percentage of name look ups in the file system Directory Reorganization If the d option is specified fsadm reorganizes the directories on the file system whose mount point is mount_p...

Page 280: ...each file that is not sparse would have exactly one extent containing the entire file and the free extent map is one continuous range of free blocks Conversely in a case of extreme fragmentation there can be free space in the file system none of which can be allocated For example on Version 2 disk layouts the indirect address extent size is always 8K long This means that to allocate an indirect ad...

Page 281: ...ls are for free extents of size 1 2 4 8 16 up to a maximum of the number of data blocks in an allo cation unit The totals are similar to the output of the df o command unless there was recent allocation or deallocation activity because fsadm acts on mounted file systems These figures provide an indication of fragmentation and extent availability on a file system Extent Reorganization If the e opti...

Page 282: ...9 32 150 64 64 128 37 256 22 512 2 1024 4 2048 4 4096 4 8192 2 16384 0 32768 0 65536 0 131072 0 262144 0 524288 0 1048576 0 2097152 0 4194304 0 8388608 0 16777216 0 33554432 0 67108864 0 134217728 0 268435456 0 536870912 0 1073741824 0 2147483648 0 Note that the default five passes were scheduled but the reorganization finished in two passes This file system had a significant amount of free space ...

Page 283: ...s allocated during the reorganization The column Total located under the head ing Errors is the total number or errors encountered during the reorganization and may include errors that were not included with FileBusy or NoSpace The following command performs an extent reorganization on sll individual files under the mount point home find home print fsadm F vxfs e f FILES lost found fsadm lock file...

Page 284: ...alue is in 512 byte blocks a k or K to indicate the value is in kilobytes an m or M to indicate the value is in megabytes or a g or G to indicate the value is in gigabytes An appended letter can be separated from the number by a space in which case the letter and number should be enclosed in a set of quotes For example 512 b All numbers entered as options must be in multiples of 512 bytes For exam...

Page 285: ...f fscat_vxfs 1M fscat_vxfs 1M SEE ALSO dd 1 fs_vxfs 4 vxfsio 7 HP UX 11i Version 2 December 2007 Update 2 Hewlett Packard Company 285 ...

Page 286: ...ndicate that the file system is badly damaged o FSspecific options Specify options specific to each file system type FSspecific options is a list of subop tions and or keyword attribute pairs intended for a file system specific version of the command See the file system specific manual entries for a description of the specific_options supported if any s Safe performance mode To improve performance...

Page 287: ... invocation of fsck for CacheFS file systems is at boot time from an entry in the etc fstab file Options Two command line options are available m Check but do not repair o noclean Force a check on the cache even if there is no reason to suspect there is a problem EXAMPLES The following example forces a check on the cache directory cache3 fsck F cachefs o noclean cache3 AUTHOR fsck_cachefs was deve...

Page 288: ...tc fstab fsck processes the file system on such lines sequentially after all eligible file systems with positive pass numbers have been processed The inconsistencies that fsck with the p P option corrects are shown below These are inconsistencies that are correctable without data loss If it encounters other inconsistencies it exits with an abnormal return status For each corrected inconsistency on...

Page 289: ...en encountered In all cases fsck checks the following inconsistencies Blocks claimed by more than one inode or the free list Blocks claimed by an inode or the free list outside the range of the file system Incorrect link counts Size checks Directory size not of proper format Bad inode format Blocks not accounted for anywhere Directory checks File pointing to unallocated inode Inode number out of r...

Page 290: ...hould not be run on mounted file systems or on the root device If you do run on mounted file sys tems be sure the system is in single user state see shutdown 1M The special case of the c option c 0 will disable all internal caches which will reduce memory usage but may impact performance The F option from prior releases has been replaced by the f option AUTHOR fsck was developed by HP AT T the Uni...

Page 291: ...Produce messages that identify the device being checked P With VxFS P is used by fsck by default it does not provide any functionality s Safe performance mode To improve performance a system wide sync will not be issued see sync 2 V Echo the completed command line but do not execute the command The command line is generated by incorporating the user specified options and other information derived ...

Page 292: ...he file system Incorrect link counts Size checks Incorrect number of blocks Directory entry format Bad inode format Blocks not accounted for anywhere Directory checks File pointing to unallocated inode Inode number out of range Linkage to parent directory Hash chain linkage Free space count Super block checks Checksum mismatch More blocks for inodes than there are in the file system Structural Fil...

Page 293: ...nts the following message instead file system is clean log replay is not required If fsck prints any other messages a full structural check is needed If the y option is specified fsck performs if necessary a full check after running the intent log replay If the y option is not used fsck must be invoked with the o full option to perform a full structural check If o p or P is specified fsck prints t...

Page 294: ... not shutdown correctly implying that fsck should be run see fsck 1M 2 Other error such as cannot open the specified device file The fsclean command is usually silent Options q Check quotas Instead of checking the file system shutdown status fsclean checks the vali dity of disk quota statistics This option is useful for determining whether quotacheck should be run see quotacheck 1M If special is n...

Page 295: ...from the file etc default fs o specific_options Specify suboptions specific to each file system type specific_options is a comma separated list of suboptions and or keyword attribute pairs supported by the specific FStype V Echo the completed command line but perform no other action The command line is generated by incorporating the user specified options and other information derived from the etc...

Page 296: ...ile system in terms of block fragments which are the unit of addressing in the file system and the minimum unit of space allocation To avoid possible confusion fragment is used to mean that and block is reserved for the larger true block fsdb has conversions to translate fragment numbers and i numbers into their corresponding disk addresses Also included are mnemonic offsets to access different pa...

Page 297: ...styles Octal numbers are prefixed with a zero Hexadecimal numbers are prefixed with 0x The current address is normalized to an appropriate boundary before printing begins It advances with the printing and is left at the address of the last item printed The output can be terminated at any time by typing the interrupt character If a number follows the p symbol that many entries are printed A check i...

Page 298: ... bytes of the file are then printed in ASCII 1b px Print the first fragment of the superblock of this file system in hexadecimal 2i a0b d7 3 Change the i number for the seventh directory slot in the root directory to 3 This example also shows how several operations can be combined on one command line d7 nm newname Change the name field in the directory slot to the given string Quotes are optional ...

Page 299: ... Clear the inode identified by inumber non interactive Multiple z options accumu late Operands fsdb recognizes the following operand special Name of the special device that contains the VxFS file system to debug Using Commands and Symbols It is best to separate each token on a command line with a space Although the command parser does not require element separation there is no ambiguity in the com...

Page 300: ...ord 2 bytes W A word 4 bytes D A double word 8 bytes p General print facility calc Simple calculator and base converter find Find a matching pattern in the file system fset A fileset iau An inode allocation unit in the primary inode list aiau An inode allocation unit in the attribute inode list cut The current usage table olt The object location table mapi Map logical file offset to an inode exten...

Page 301: ...s can be made symbolically The following symbols represent inode fields md Inode mode field ln Inode link count field uid Inode user ID Number field gid Inode group ID Number field szlo Low order word of inode file size field szhi High order word of inode file size field sz Inode file size field de Inode direct extent data block numbers 0 9 des Inode direct extent sizes 0 9 ie Inode indirect exten...

Page 302: ...le number of entries nhash Number of hash chains Symbols for Directory Entry Fields Changes to directory entry fields can be made symbolically The following symbols represent directory entry fields ino Inode number nm Entry name nmlen Name length reclen Record length only if in a data block hnext Name hash next only if in a data block Positions in File Systems and Positioning Commands fsdb maintai...

Page 303: ...ice s configuration record If it is the last command on a line print the device configuration record fset Set the current position in the file system to the fileset header entry for the specified fileset index Set the current fileset position to the resulting offset If it is the last command on a line print the specified fileset header fset Set the current position in the file system to the filese...

Page 304: ... offset If it is the last command on a line print the first word in the block in hexadecimal im Set the current position to immediate data area of the current inode Set the current block position to the resulting offset If it is the last command on a line print the first word of the area in hexadecimal attr Set the current position to attribute data area of the current inode Set the current block ...

Page 305: ... A maximum number of blocks to search can be specified If found the location and value are printed in hexa decimal find string Search for the given character string in the file system The search is performed for ward from the current offset A maximum number of blocks to search can be specified If found the location and string are printed fmtlog Format all intent log entries A completely formatted ...

Page 306: ...m check see fsck 1M after using the fsdb command to modify a file system Use fsck o full nolog Some aspects of fsdb apply to a specific VxFS disk layout version SEE ALSO fsck_vxfs 1M fsdb 1M 306 Hewlett Packard Company 8 HP UX 11i Version 2 December 2007 Update ...

Page 307: ...sck 1M The only exception is that it can be used on the root filesystem in single user mode if the system is immediately re booted afterwards using reboot n The p option prints the generation numbers for all inodes WARNINGS fsirand is only supported on HFS filesystems fsirand should not be run on mounted filesystems If executing fsirand on the root filesystem the system should be in single user mo...

Page 308: ...ved for the situation where the file system matches more than one file system type Any other error will cause exit status 3 to be returned The file system type is determined by reading the superblock of the supplied special file Options v Produce verbose output The output contains information about the file system s super block RETURN VALUE fstyp returns the following values 0 Successful completio...

Page 309: ...f there is no etc services entry for ftp data and the C option is not specified the daemon uses the port just prior to the control connection port The c and C options are both available if running as a standalone daemon Otherwise only the C option can be used i Logs all the files received by ftpd server to xferlog see xferlog 5 This option is overridden by the etc ftpd ftpaccess file See ftpaccess...

Page 310: ...e T option sets to maxtimeout the maximum timeout that client can request in seconds By default the maximum timeout is 2 hours u umask Change default ftpd umask from 027 to umask U Disables the use of sendfile and uses send for sending data Use this option if the link cannot handle more than one buffer per packet e g Gigabit Ether net v The debugging information is written to the syslog file V Cau...

Page 311: ...ntication security data CCC Clear command channel ENC Privacy protected command MIC Integrity protected command PROT Data channel protection level level C only PBSZ Protection buffer size has no effect These commands are described in draft 8 of the FTP security extensions The following non standard or HP UX specific commands are supported by the SITE command Command Description UMASK Change umask ...

Page 312: ... access to the system If the user name is anonymous or ftp an anonymous FTP account must be present in the password file user ftp In this case the user is allowed to log in by specifying any password by convention this is given as the user s e mail address In order to permit anonymous FTP there must be an entry in the passwd 4 database for an account named ftp The password field should be the grou...

Page 313: ...ive values exist for the first digit The values and the interpretations of the values are 1 The requested action is being initiated expect another reply before proceeding with a new command 2 The requested action is complete The server is ready for a new request 3 The command has been accepted but the requested action requires more information 4 The command was not accepted the requested action fa...

Page 314: ...or users whose FTP client will hang on long replies i e multiline responses using a dash as the first character of the password will disable this long replies feature Note Users whose password starts with a dash have to use an extra dash in the beginning of the pass word for login to succeed However the long replies feature will be disabled in this case The FTP server can also log all file transmi...

Page 315: ...o perform all functions related to login This includes retrieving the password validating the account and displaying error messages AUTHOR ftpd was developed by the University of California Berkeley and the Washington University St Louis Missouri SEE ALSO ftp 1 inetd 1M chroot 2 send 2 sendfile 2 getusershell 3C pam_authenticate 3 ftpaccess 4 ftpusers 4 group 4 inetd conf 4 passwd 4 sis 5 xferlog ...

Page 316: ...ame in parentheses following each process ID k Send the SIGKILL signal to each process using each file You must have appropriate privileges to kill processes that you do not own You can respecify options between groups of files The new set of options replaces the old set A dash by itself cancels all options currently in force Operands fuser has the following operand file One of the following value...

Page 317: ...cesses using the device Alternately if home is the mount point for an NFS file system list process IDs and login names of processes using that NFS file system fuser cu home If machine1 filesystem 2mount is an NFS file system list all processes using any file on that file system If it is not an NFS file system treat it as a regular file fuser machine1 filesystem 2mount SEE ALSO ps 1 mount 1M kill 2...

Page 318: ...d by the string new time placed in the line field and the flag NEW_TIME placed in the type field wtmpfix uses these records to synchronize all time stamps in the file wtmpfix nullifies date change records when writing to the standard output by setting the time field of the utmps structure in the old date change record equal to the time field in the new date change record This prevents wtmpfix and ...

Page 319: ...f fwtmp 1M fwtmp 1M STANDARDS CONFORMANCE fwtmp SVID2 SVID3 wtmpfix SVID2 SVID3 HP UX 11i Version 2 December 2007 Update 2 Hewlett Packard Company 319 ...

Page 320: ...gated will not modify the kernel forwarding table This is used for test ing gated configurations with actual routing data N Specifies that gated will not daemonize Normally if tracing to stderr is not specified gated will daemonize if the parent process ID is not 1 This allows the use of an etc inittab like method of invoking gated that does not have a PID of 1 r Specifies that gated will add rout...

Page 321: ... and static routes specifying retain will remain To terminate gated with the exterior routes intact use SIGKILL SIGUSR1 Toggle tracing On receipt of a SIGUSR1 gated will close the trace file A subsequent SIGUSR1 will cause it to be reopened This will allow the file to be moved regularly It is not possible to use SIGUSR1 if a trace file has not been specified or tracing is being performed to stderr...

Page 322: ...ll spend waiting for gated to complete certain operations in particular at termination and startup By default this value is set to 10 seconds These additional command line options may be present depending on the options used to compile gdc c coresize Sets the maximum size of a core dump a gated started with gdc will produce Useful on systems where the default maximum core dump size is too small fo...

Page 323: ...exist or is zero length or if the operation would delete an existing non zero length etc gated conf file BACKOUT Perform a backout operation even if etc gated conf exists and is of non zero length modeconf Set all configuration files to mode 664 owner root group gdmaint This allows a trusted non root user to modify the configuration files createconf If etc gated conf does not exist create a zero l...

Page 324: ...names listed below contain the string s which is replaced by the name with which gated is invoked Normally this is gated but if invoked as gated test gated will by default look for etc gated test conf These paths may all be changed at compilation time usr sbin gated The gated binary etc gated conf Current gated configuration file etc gated conf Newer configuration file etc gated conf Older configu...

Page 325: ...rectly by the user rather than automatically at first boot it might be neces sary to log out and log in again for language changes to take effect EXTERNAL INFLUENCES Environment Parameters The geocustoms command writes default values to system configuration files for the following environ ment parameters LANG LC_ALL LC_CTYPE LC_COLLATE LC_MONETARY LC_NUMERIC LC_TIME and LC_MESSAGES International C...

Page 326: ...mand does not do the following Manage languages at the codeset level Provide a user interface for Asian languages Manage keyboard selection Create or remove locale definitions Provide a special interface for restoring or adding languages to the system from depots or media FILES usr sbin geocustoms The command itself usr lib nls Directory containing NLS language files as discussed in Native Languag...

Page 327: ...he following operand file Name of file in a VxFS file system Notes Only the align and noextend allocation flags set through setext 1M or the VX_SETEXT ioctl are per sistent attributes of the file and therefore visible via getext or the VX_GETEXT ioctl trim is also visi ble although it is cleared and the reservation is reduced on the final close of the file EXAMPLES The following example shows a fi...

Page 328: ...e options are specified all extended security attributes of the binary files are displayed Operands getfilexsec supports the following operand filename Binary executable file All file names given as arguments must be binary executables Files of other types for example script executables text files and so on are not permitted Security Restrictions The user invoking this command must be able to open...

Page 329: ...d This allows for changing the application window id in one central location rather than changing scripts with hard coded values in the event of a memory window collision between two applications EXAMPLES Extract the window id for HP from the etc services window file and start the program HP_startup_script with arguments arg1 and arg2 WinId getmemwindow HP setmemwindow i WinId HP_startup_script ar...

Page 330: ... those configured as disallowed privileges for the compartment Options getprocxsec recognizes the following options c Displays the compartment name of the process If compartments are not enabled nothing is reported for this option e Displays the implementation effective privilege set f Displays the full form of the lists p Displays the implementation permitted privilege set r Display the implement...

Page 331: ... init euid zero Example 3 Display the full privilege sets and compartment of an arbitrary process getprocxsec f 801 Sample output effective FORK EXEC SESSION LINKANY permitted FORK EXEC SESSION LINKANY retained FORK EXEC SESSION LINKANY cmpt web euid non zero SEE ALSO getfilexsec 1M setfilexsec 1M compartments 5 privileges 5 HP UX 11i Version 2 December 2007 Update 2 Hewlett Packard Company 331 ...

Page 332: ... The rest of the options will be processed If getprpw is specified without m all parameters are displayed in the order given below Boolean values are returned as YES NO or DFT for system default values in tcb files auth system default Numeric values are specified as positive numbers 0 or 1 A value of 1 indicates that the field has not been assigned a value in the database Units of time are returne...

Page 333: ...e position left to right represents 1 past password lifetime 2 past last login time inactive account 3 past absolute account lifetime 4 exceeded unsuccessful login attempts 5 password required and a null password 6 admin lock 7 password is a RETURN VALUE 0 success 1 user not privileged 2 incorrect useage 3 cannot find the password file 4 system is not trusted EXAMPLES Displays the database aging f...

Page 334: ...rpw 1M tcb files auth Protected Password Database tcb files auth system default System Defaults Database SEE ALSO modprpw 1M prpwd 4 nsswitch conf 4 334 Hewlett Packard Company 3 HP UX 11i Version 2 December 2007 Update ...

Page 335: ...ivileges in the privilege list If the l option is used you must specify a network_interface_name Operands getrules recognizes the following operands compartment_name Name of the compartment for which information is displayed network_interface_name Name of the network interface for which information is displayed For compartment_name or network_interface_name you can specify multiple instances separ...

Page 336: ...ame web sealed Disallowed Privileges POLICY File System Rules PERMISSION PATHNAME read write create unlink SEE ALSO cmpt_tune 1M setrules 1M compartments 4 compartments 5 privileges 5 336 Hewlett Packard Company 2 HP UX 11i Version 2 December 2007 Update ...

Page 337: ...nd to configure the settings by changing the control characters in dev ttyconf see stty 1 This flexibility allows the user to login by means of getty and type a and so on as part of the login name or arguments if these are not the special control characters defined in dev ttyconf h Tells getty not to force a hangup on the line before setting the speed to the default or specified speed t timeout Te...

Page 338: ... the special control characters for the terminal from the dev ttyconf file This terminal setting will be inherited by login Finally login is called with the user s name as an argument Additional arguments can be typed after the login name These are passed to login which places them in the environment see login 1 Check Option A check option is provided When getty is invoked with the c file option i...

Page 339: ...al functions such as setting up an initial PAD configuration It also logs the number of the caller in var uucp Log LOGX25 The third parameter is the name of the PAD being used HP 2334A is the only one supported at this time A typical invocation would be usr sbin getx25 x25 1 2 HP2334A WARNINGS Use of uucp commands including getx25 is discouraged because they are targeted for removal from HP UX Use...

Page 340: ...system where NIS is installed it may fail with the error group x is not unique return value 9 if the group specified is not present in the local etc group file but is an NIS group see group 4 NIS groups are also checked when verifying uniqueness of the new gid which may result in the error GID is not unique return value 4 RETURN VALUE The groupadd command exits with one of the following values 0 N...

Page 341: ...M groupadd 1M SEE ALSO users 1 groupdel 1M groupmod 1M logins 1M useradd 1M userdel 1M usermod 1M group 4 STANDARDS CONFORMANCE groupadd SVID3 HP UX 11i Version 2 December 2007 Update 2 Hewlett Packard Company 341 ...

Page 342: ... 6 if the group specified is an NIS group see group 4 RETURN VALUE groupdel exits with one of the following values 0 No error 2 Invalid command syntax 3 Invalid argument supplied to an option 6 group does not exist 10 Cannot modify the etc group file 11 etc passwd file or etc ptmp file busy Another command may be modifying the etc passwd file 12 Unable to open etc ptmp or etc passwd file is non ex...

Page 343: ...xist return value 6 if the group specified is an NIS group see group 4 However NIS groups are checked when verifying uniqueness of the new gid or new group name which may result in the above error or the error GID is not unique return value 4 RETURN VALUES groupmod exits with one of the following values 0 No error 2 Invalid command syntax 3 Invalid argument supplied to an option 4 gid is not uniqu...

Page 344: ...M FILES etc group etc ptmp SEE ALSO users 1 groupadd 1M groupdel 1M logins 1M useradd 1M userdel 1M usermod 1M group 4 STANDARDS CONFORMANCE groupmod SVID3 344 Hewlett Packard Company 2 HP UX 11i Version 2 December 2007 Update ...

Page 345: ... option requires domain names in the host table When the old names in this domain are no longer used they can be ignored with the e option If the subdomain name does not have dots the default domain is appended to subdomain d domain Create data for domain This option can be used more than once on the command line if data is being created for more than one domain The first domain listed is the defa...

Page 346: ... the name server data is user host host must be a domain name If given as user the host on which this script is run is appended If given as user host the is replaced with a dot The default user is root This option applies to all the domains generated by hosts_to_named If you specify this option more than once the last value will be used w Create well known services WKS data declaring that the host...

Page 347: ...c and e are removed from the lowercase copy of the host table The host table is then used to create the name server data for each network number declared on the com mand line Do not include the trailing 0 s in the network number No distinction is made between class A B or C addresses nor is there any understanding of subnets unless a subnet mask is supplied Example network numbers are 10 for all a...

Page 348: ...e z or Z options are used The boot files for secondary servers are created new each time from the primary server boot file so that they are equivalent EXAMPLES Create name server data for networks 15 19 8 and 15 19 9 in div inc com hosts_to_named d div inc com n 15 19 8 n 15 19 9 Create name server data for networks 15 19 8 and 15 19 9 in div inc com Ignore aliases in the host table and include tw...

Page 349: ... server boot file 4 x conf sec save Secondary server boot file 8 x or 9 x boot sec Secondary server boot file 4 x conf sec Secondary server boot file 8 x or 9 x db 127 0 0 Pointer information for 127 0 0 1 db cache Stub cache file for root server addresses db root Data for servers for the root domain db DOMAIN Address and other data for a domain db DOMAIN in addr Pointer data for all network numbe...

Page 350: ...here the daemon will log its messages The standard output and standard error of the usr bin olrad command are also captured in this log file openmode Mode in which to open the logfile It can be one of the following append Open the file in append mode New log information is appended at the end of logfile trunc Open the file and truncate it If the logfile exists its length is truncated to 0 and the ...

Page 351: ...daemon for example with the SIGKILL signal see kill 1 and there are pending attention but ton events in the queue While clearing the events from the queue the system sets the power LED corresponding to the slotId to PWR_RAIL mode see previous message Setting the power led to PWR_RAIL mode failed slotId olar_error_no olarErrMsg Setting the power LED to PWR_RAIL mode failed The system sets the power...

Page 352: ...ow ing INVALID INVALID_INSERTION INVALID_REMOVAL time is the time at which the attention button was pressed This could happen if INSERTION or REMOVAL is received and the slot is not in the right state For example if INSERTION is received and the slot is not suspended and the driver is attached then it is an invalid PCI OL operation Or it is invalid if REMOVAL is received and the slot is suspended ...

Page 353: ... not get lock on file logFile errno errMsg hotplugd could not get the lock on the logFile errMsg gives the reason for the error It could be because another instance of hotplugd is running FILES etc rc config d pci_olar Configuration file for PCI I O OLAR operations sbin init d pci_olar Startup script used at boot time to start the daemon var adm hotplugd log Installed default name of file where th...

Page 354: ...mands can be given interactively from the keyboard or provided in an isl autoexecute file hpux is limited to operations on the interface initialized by pdc 1M In most cases operations are limited to the boot device interface Notation hpux accepts numbers numeric constants in many of its options Numbers follow the C language nota tion for decimal octal and hexadecimal constants A leading 0 zero imp...

Page 355: ...the command is unavailable the autoexecute file is searched If the search fails any remaining unresolved components of the command are satisfied by hard coded defaults There is no hard coded default choice for a manager if none can be chosen hpux reports an error When the hardware path to the boot device is not specified hpux defaults to information maintained by pdc The hardware path element has ...

Page 356: ...settings in the kernel configuration and boot with known good settings instead Note some systems that have been updated from earlier versions of HP UX have boot loaders that do not support this flag On those sys tems the flag f0x40000 can be used instead lq Boot the system with quorum override option This option is used in a scenario where a disk is removed from the system or is otherwise unavail ...

Page 357: ...ooting from a raw device the manager specified only has a character interface which might cause problems if the block size is incorrect isl not present please hit system RESET button to continue An unsuccessful boot operation has overlaid isl in memory It is impossible to return control to isl short read The specified object file is internally inconsistent it is not long enough would overlay Loadi...

Page 358: ...e which on an HP UX system requests that hpux be run with appropriate arguments Messages similar to the following are displayed by isl on the console Booting from scsi 6 HP 2213A Hard booted ISL Revision A 00 09 March 27 1990 ISL booting hpux boot disk 0 stand vmunix hpux the secondary system loader then announces the operation it is performing in this case boot the devicefile from which the load ...

Page 359: ... tested Autosearch for boot path enabled To override press any key within 10 seconds If no keyboard character is pressed within 10 seconds pdc commences the autoboot sequence by load ing isl and transferring control to it Because an autoboot sequence is occurring isl merely announces itself finds and executes the autoexecute file which on an HP UX system requests that hpux be run with appropriate ...

Page 360: ...2 start 0x11f3e8 Booting From Another Section In this example shown for backward compatibility a kernel is booted from another section of the root disk For example suppose kernel development takes place under mnt azure root port which happens to reside in its own section section 3 of the root disk By specifying a minor number of 3 in the above example the object file sys azure S800 vmunix is loade...

Page 361: ...ple show autofile is used to print the contents of the autoexecute file residing in the boot LIF on the device from which hpux was booted Optionally a devicefile can be specified in order to read the autoexecute file from the boot LIF of another boot device ISL hpux show autofile Show autofile AUTO file contains hpux Changing The Autoexecute File This example shows how to change the contents of th...

Page 362: ...s not rewound The next dd appends an image of the disk to the tape The entire pro cess takes about one hour for a 660 MB HP2213 disk To avoid later problems with fsck after the disk is restored bring the system to single user mode and type sync a few times before doing the second dd see fsck 1M Once created the tape can be used to completely restore the disk 1 Insert the tape into the tape drive 2...

Page 363: ...e AUTO file setauto string Change the contents of the AUTO file to string boot Operation The boot operation loads an ELF kernel object file from supported HP UX file system HFS VxFS It then transfers control to the loaded image In addition to the kernel object file hpux efi also loads persistent system specific files from the boot sys directory and kernel configuration specific files from the conf...

Page 364: ...ix is Seconds left till autoboot 10 If hpux efi does not detect a key press it initiates the autoboot sequence using the AUTO string hpux efi displays messages similar to the following on the console AUTOBOOTING AUTO BOOT boot vmunix is If hpux efi successfully locates the kernel object file it displays the progress of loading each sections and the symbol table of the object file loading section 0...

Page 365: ...inding itself to the TCP IP port if using the b mode of operation i Default mode This mode should be used when starting the daemon from inetd with the nowait option in the etc inetd conf file Use of this mode will make inetd start one identd daemon for each connection request l Use the system logging daemon syslogd for logging purposes m Use a mode of operation that allows multiple requests to be ...

Page 366: ...the internet server see inetd 1M for requests to connect to the IDENT port as indicated by the etc services file see services 4 when using the w or i modes of operation or started manually by using the b mode of operation WARNINGS The w and t options are currently not supported on HP UX EXAMPLES Assume the server is located in usr lbin identd Add either of the following two lines into the etc inet...

Page 367: ...rnate EFI partition headers and tables are correct Returns two if either is bad and zero if both are correct r Restore the EFI partition headers and tables This option checks both the primary header and tables and the alternate header and tables If one is found bad it is restored from the other good version One of either the primary or alternate header and tables must be good for this option to su...

Page 368: ...minor number with no partition bits set would indicate the whole disk ie 0x008000 would be the same disk as above but represent the whole disk and not a partition Note idisk has been ported to Windows NT 4 0 and 2000 RETURN VALUE Exit values are 0 Successful completion 0 Error condition occurred EXAMPLES Create the partitions specified in the above description file printing only the primary partit...

Page 369: ...dules if any specified in the DEFAULT_INTERFACE_MODULES variable are used for configuring the interface see netconf and netconf ipv6 in etc rc config d address Either a host name present in the host name database see hosts 4 or a DARPA Internet address expressed in Internet standard dot notation see inet 3N for an IPv4 address and in colon notation see inet6 3N for an IPv6 address address_family N...

Page 370: ...tion in the 32 bit field mask must con tain at least the standard network portion and the subnet field must be contiguous with the network portion The subnet field must con tain at least 1 bit For aggregating networks into supernets mask must only include a portion of the network part mask must contain contiguous 1 s in the bit positions starting from the leftmost bit of the 32 bit field prefix n ...

Page 371: ...ured using the inet6 ifconfig subcommand See the IPv6 subsec tion given below The tunnel interface names should be iptu for IP6 in IP tunnels and 6to4 tunnels Example iptu0 iptu1 The tunnel interface names should be ip6tu for IP in IP6 tunnels and IP6 in IP6 tunnels Example ip6tu0 ip6tu1 IP Index Number Multiple IP addresses assigned to the same interface may be in different subnets An example of ...

Page 372: ...aces will be autoconfigured if the host receives prefixes from router advertisements The addresses on the secondary interfaces will be derived from the interface identifier portion of manually configured address in the pri mary interface When a secondary interface is configured with a manually assigned address and if the user chooses an IP index number that has been used for an autoconfigured seco...

Page 373: ...tu0 inet6 tunnel ip6inip tsrc 192 168 2 2 tdst 192 168 1 1 up If multiple tunnels are configured with the same tunnel_local_IPv4_address autoconfiguration of only the first tunnel will succeed Other tunnels should be manually configured with link local addresses Manual link local addresses can be assigned to the tunnel interface as shown below ifconfig iptu0 inet6 tunnel ip6inip fe80 1 fe80 2 tsrc...

Page 374: ...hould be a global IPv4 address The primary address of the 6to4 inter face should be a 6to4 address and not a link local address The 6to4 primary address is optional if it is not specified a 6to4 address will be autoconfigured based on tunnel_local_IPv4_address Example ifconfig iptu1 inet6 tunnel 6to4 tsrc 15 13 136 204 up A 6to4 address can be manually assigned as shown below ifconfig iptu1 inet6 ...

Page 375: ...ser s umask and passes that umask to the servers it starts Note Services currently supported by inetd will work in an IPv6 environment with a few changes to the configuration file etc inetd conf see inetd conf 4 When invoked inetd reads etc inetd conf and configures itself to support whatever services are included in that file see inetd conf 4 The inetd daemon also performs a security check if the...

Page 376: ...d interval which need to be decimal numbers If you invoke inetd without this option or specify invalid values for this option the default values 40 and 60 are taken for count and interval respectively This option cannot be used when an inetd process is already running s This option is similar to the l option but it suppresses the hostname while logging into the sys log file If inetd is not running...

Page 377: ...the end of line is accepted In this case the next line of the file is not appended to the end of the current line Unless all the information required is present on a single line configuration file error messages are also output This mes sage is logged at the warning log level service protocol Unknown service The call to the library routine getservbyname see getservent 3N failed The service is not ...

Page 378: ...incorrect Missing high value in range for service For example field 2 of the Internet address 10 5 8 7 is incorrect High value in range is lower than low value for service For example field 2 of the Internet address 10 5 3 8 7 is incorrect allow deny field does not have a valid entry for service The entry in the allow deny field is not one of the keywords allow or deny No security for this service...

Page 379: ...eloped by Sun Microsystems Inc FILES etc inetd conf List of Internet server processes var adm inetd sec Optional security file SEE ALSO umask 1 portmap 1M syslogd 1M getservent 3N inetd conf 4 inetd sec 4 protocols 4 services 4 environ 5 HP UX 11i Version 2 December 2007 Update 5 Hewlett Packard Company 379 ...

Page 380: ...er software products that provide a Kerberos V5 Network Authentication Services environment Options inetsvcs_sec recognizes the following options enable The secure internet services are enabled The services now provide network authenti cation through Kerberos V5 disable The secure internet services are disabled The services now follow the traditional behavior of prompting for passwords status This...

Page 381: ...y thing was left out of a description Source Listing Options I L C r The I L and C options will produce a source listing for each terminal named I use the terminf names L use the long C variable name listed in term h C use the termcap names r when using C put out all capabilities in termcap form If no termnames are given the environment variable TERM will be used for the terminal name The source p...

Page 382: ...second specification to be ignored Using infocmp to recreate a description can be a useful check to make sure that everything was specified correctly in the original source description Another error that does not cause incorrect compiled files but will slow down the compilation time is speci fying extra use fields that are superfluous infocmp will flag any other termname use fields that were not n...

Page 383: ...ocmp 1M infocmp 1M FILES usr lib terminfo Compiled terminal description database SEE ALSO captoinfo 1M tic 1M curses_intro 3X terminfo 4 HP UX 11i Version 2 December 2007 Update 3 Hewlett Packard Company 383 ...

Page 384: ...ecified in that entry as the initial run level to enter If this entry is not in inittab or inittab is not found boot init requests that the user enter a run level from the logical system console dev syscon If S or s is entered boot init goes into the single user level This is the only run level that does not require the existence of a properly formatted inittab file If inittab does not exist then ...

Page 385: ...or 4 depending on the system configuration When init transitions into a new run level 0 6 the master sequencer script rc is invoked rc in turn invokes each of the start or kill scripts for each installed subsystem for each intervening run level When transitioning to a higher run level start scripts are invoked and when transitioning to a lower run level kill scripts are invoked See rc 1M In a mult...

Page 386: ... from a user init This prevents boot init from using up system resources if there is a typographical error in the inittab file or a program is removed that is referenced in inittab WARNINGS Boot init assumes that processes and descendants of processes spawned by boot init remain in the same process group that boot init originally created for them When changing init states special care should be ta...

Page 387: ...i init 1M init 1M STANDARDS CONFORMANCE init SVID2 SVID3 HP UX 11i Version 2 December 2007 Update 4 Hewlett Packard Company 387 ...

Page 388: ...annot be used with C D directory Override the default device installation directory dev and install the special files in directory instead directory must exist otherwise insf displays an error message and exits See WARNINGS e Reinstall the special files for pseudo drivers and existing devices This is useful for restoring special files if one or more have been removed H hw path Match devices at a g...

Page 389: ...number from ioscan see ioscan 1M It is represented as a decimal number with a typical range of 0 to 255 target The device target number for example the address on a HP FL or SCSI bus It is represented as a decimal number with a typical range of 0 to 15 device A address unit within a device for example the unit in a HP FL device or the LUN in a SCSI device It is represented as a decimal number with...

Page 390: ...dioEA_card rw rw rw bin bin External output A law format audioEL_card rw rw rw bin bin External output 16 bit linear format audioEU_card rw rw rw bin bin External output Mu law format audioIA_card rw rw rw bin bin Internal speaker output A law format audioIL_card rw rw rw bin bin Internal speaker output 16 bit linear format audioIU_card rw rw rw bin bin Internal speaker output Mu law format audioL...

Page 391: ... ttycardp0 rw w w bin bin Direct connect cn The following special files are installed syscon rw w w bin bin systty rw w w bin bin console rw w w root sys ttyconf rw root sys devconfig The following special file is installed config rw r root sys diag0 The following special file is installed diag diag0 rw bin bin diag1 The following special file is installed diag diag1 rw bin bin diag2 The following...

Page 392: ... installed crtdevice_number rw rw rw bin bin ocrtdevice_number rw rw rw bin bin device_number is 0 indexed and is assigned in the order in which the devices appear in ioscan 1M output If the console device is a graphics device the files crt and ocrt are created as the console device If the console is not a graphics device crt and ocrt are identical to crt0 and ocrt0 hil For each device the followi...

Page 393: ...owing special files are installed ccardttargetddevice_lp rw lp bin diag ccardttargetddevice_lp rw bin bin mm The following special files are installed mem rw r bin sys Minor 0 kmem rw r bin sys Minor 1 null rw rw rw bin bin Minor 2 mux0 For each instance of a 6 channel card the following special files are installed ttycardpport rw w w bin bin port 0 to 5 direct connect muxcard rw bin bin diag muxc...

Page 394: ...le is installed nuls rw rw rw root sys pci_mux0 pci_mux1 For each instance of a PCI mux card the following Direct Connect special files are created The term card below refers to the instance number of the mux card ttycardport_moduleport rw w w bin bin port_module a to p port module name port 1 to 16 port number muxcard rw bin bin diag muxcard rw bin bin diag muxcard_1 rw bin bin diag muxcard_2 rw ...

Page 395: ... 00 to 99 ptym ptyindex number rw rw rw bin bin index p to z a to c e to o number 000 to 999 ptys The following special files are installed pty ttyindex number rw rw rw bin bin index p to z a to c e to o number 0 to f hexadecimal The first 48 special files pty tty are linked to tty pty ttyindex number rw rw rw bin bin index p to z a to c e to o number 00 to 99 pty ttyindex number rw rw rw bin bin ...

Page 396: ...lation in a short file name directory rmt ccardttargetddevicef0 rw rw rw bin bin AT T style best available density character entry rmt ccardttargetddevicef0b rw rw rw bin bin Berkeley style best available density character entry rmt ccardttargetddevicef0n rw rw rw bin bin AT T style no rewind best available density character entry rmt ccardttargetddevicef0nb rw rw rw bin bin Berkeley style no rewi...

Page 397: ...messages deserving further clarification Warnings Device driver name is not in the kernel Device class name is not in the kernel The indicated device driver or device class is not present in the kernel A device driver and or device class can be added to the kernel using kcmodule 1M No instance number available for device class name All of the instance numbers available for the device class are alr...

Page 398: ...mmended to be run in single user mode Many commands and subsystems assume their device files are in dev therefore the use of the D option is discouraged AUTHOR insf was developed by HP FILES dev config I O system special file etc ioconfig I O system configuration database SEE ALSO kcmodule 1M ioscan 1M lsdev 1M lssf 1M mknod 1M mksf 1M rmsf 1M 398 Hewlett Packard Company 11 HP UX 11i Version 2 Dec...

Page 399: ...le Can be used alone or with the o or s options i Ignores default directory list searching only through the given directories dirx Can be used alone or with any other options other than c and f n dirc If file is not found in any of the searched directories it is put in the directory specified in dirc The mode and owner of the new file will be set to 755 and bin respec tively Can be used alone or w...

Page 400: ...r bin echo and used as the destination for file Also the default directories are also appended to ROOT so that the default directories are actually ROOT usr bin ROOT usr sbin ROOT sbin and ROOT usr lbin The file etc syslist ROOT etc syslist does not exist on a distribution tape it is created and used by local sites WARNINGS install cannot create alias links for a command for example vi 1 is an ali...

Page 401: ...on de allocation If any of these events are hap pening when intctl is trying to display interrupt information or is trying to migrate an interrupt to a CPU intctl will exit with the error message below and the user should retry the intctl command Another HA event is in progress try again Interrupt migration is not enabled on workstations Also non MP safe drivers do not support interrupt migration ...

Page 402: ...errupt distribution Driver weight a driver_weight based approach This is the default algorithm used to balance interrupts when no algorithm is specified The default can be set by changing INTCTL_DEFAULT_ALGO in the configuration file etc intctl conf Each driver is given a weight based on the number of interrupts it may generate Balancing operations ensure that each CPU is loaded from interrupt loa...

Page 403: ...n while specifying a driver_name as one driver could possibly claim multiple I O cards and specifying such a driver will reduce the scope of balancing of interrupts The same information can be specified in the INTCTL_DRV_IGNORE section of the configuration file NOTE Please refer to the INTCTL_DRV_IGNORE section of the configuration file for drivers that are currently not supported while balancing ...

Page 404: ...ore the interrupt information of all the CPUs on the system This file can be used to restore the interrupt configuration of the system later using the r option w Force migrations without asking for user input Without this option a user confirmation is requested while balancing interrupts option b When used with b w allows the user to balance interrupts without asking for migrations that should be ...

Page 405: ...________________________________________________________________ 1 1 0 8 1 1 fcd 1 0 1 120 7 3 123 2 1 0 8 1 0 fcd 1 0 1 120 6 3 122 3 1 0 0 1 0 igelan 1 0 1 120 5 3 121 4 1 0 0 3 0 c8xx 2 0 1 120 4 3 120 5 1 0 0 3 0 c8xx 1 0 1 120 4 3 120 6 1 0 0 2 1 c8xx 2 0 1 120 4 3 120 7 1 0 0 2 1 c8xx 1 0 1 120 4 3 120 Please select the migrations you want to skip Comma separated serial numbers or all or non...

Page 406: ...verridden by the command line options i o and a The different sections in the etc intctl conf configuration file described below 1 INTCTL_DRIVER_WEIGHTS Each line after the above string is expected to be of the form driver_name weight driver_name is a string corresponding to the driver and weight is an integer corresponding to the driver s weight These weights will be used while balancing interrup...

Page 407: ... of the configuration file for drivers that are currently not supported while balancing interrupts 5 INTCTL_DEFAULT_ALGO The following line should specify the default algorithm to be used while balancing interrupts when a is not used The only supported options are driver_weight and round_robin The option a algorithm can be used to change the algorithm temporarily Example INTCTL_DEFAULT_ALGO driver...

Page 408: ...available CPUs are handling interrupts and distribute the interrupts across 75 of the CPUs available intctl b w o trig 40 75 Balance interrupts ignoring all interrupts of the I O card with hardware path 1 2 1 0 ignore the CPU with hardware path 133 2 and ignore the driver graf1 also ask for confirmation before performing interrupt migrations intctl b i io 1 2 1 0 1 i cpu 133 2 i drv graf1 Balance ...

Page 409: ...ctl 1M FILES etc intctl conf intctl configuration file See the Interrupt Configuration File section above SEE ALSO intrbald 1M ioscan 1M limits 5 HP UX 11i Version 2 December 2007 Update 9 Hewlett Packard Company 409 ...

Page 410: ...ions performed by the daemon are logged in syslog and details of interrupt migrations performed will be logged in the file var adm intrbald log Options c Instruct the running daemon to reexamine the configuration file etc rc config d intrbaldconf If the INTRBALD_INTERVAL parameter has been updated then the running daemon uses the new value If the INTRBALD_STATE parameter is set to disabled then th...

Page 411: ...terrupts properly it could lead to a decrease in the overall system performance by overloading some processors and by not optimally utilizing the remaining processors FILES etc rc config d intrbaldconf intrbald rc configuration file See the intrbald rc Configuration File section above sbin init d intrbald_init intrbald rc script sbin rc2 d S900intrbald_init rc start symbolic link sbin rc1 d K100in...

Page 412: ...config from the existing kernel I O data struc tures Options ioinit recognizes the following options i Invoke insf to install special files for new devices after checking consistency between the kernel and etc ioconfig f infile Use the file infile to reassign instance numbers to devices within a specified class infile may have multiple entries each to appear on a separate line each field in the en...

Page 413: ...ance number then retry Hardware path is not in the kernel The given hardware path is not in the kernel Use ioscan k to get the correct hardware path then retry Device class name is not in the kernel The given class name is not in the kernel Use ioscan k to get the correct class name then retry EXAMPLES To reassign an instance number to a device and class specified in infile and reboot the system s...

Page 414: ...ning is restricted to root Options ioscan recognizes the following options C class Restrict the output listing to those devices belonging to the specified class Cannot be used with d d driver Restrict the output listing to those devices controlled by the specified driver Can not be used with C e Display EFI Extensible Firmware Interface device paths when available f Generate a full listing display...

Page 415: ...stance The instance number associated with the device or card It is a unique number assigned to a card or device within a class If no driver is available for the hardware component or an error occurs binding the driver the kernel will not assign an instance number and a 1 is listed hw path A numerical string of hardware components notated sequentially from the bus address to the device address Typ...

Page 416: ...ajor number does not exist minor The device minor number identify bytes The identify bytes returned from a module or device module path The software components separated by periods module name The module name of the software component controlling the node description A description of the device card instance The instance number of the hardware interface card RETURN VALUE ioscan returns 0 upon norm...

Page 417: ... are several commands available in isl The following is a list with a short description Parameters may be entered on the command line following the command name They must be separated by spaces isl prompts for any necessary parameters that are not entered on the command line help Help List commands and available utilities listf ls List available utilities autoboot Enable or disable the autoboot se...

Page 418: ...onsistency Volume label FATAL CE11 Internal inconsistency Directory FATAL CE12 Error reading autoexecute file CE13 Error reading from console FATAL CE14 Error writing to console FATAL CE15 Not an isl command or utility CE16 Utility file header inconsistent Invalid System ID CE17 Error reading utility file header CE18 Utility file header inconsistent Bad magic number CE19 Utility would overlay isl ...

Page 419: ...boards l name l keyboard_ID Load a specified keyboard map Once loaded ITE uses the specified mapping When loading a keyboard mapping with the l option itemap matches the suffix of the name of the specified keyboard mapping with those found in etc X11 XHPKeymaps to determine the keyboard language This information is used by the ITE to perform ISO 7 to 8 bit conversion Keymap names added by users vi...

Page 420: ...oard mappings usr contrib bin X11 keymap_ed l FILES usr contrib bin X11 keymap_ed Keymap database editor etc X11 XHPKeymaps System keymap database etc kbdlang Contains mapping name configured for PS2 DIN keyboards SEE ALSO ps2 7 termio 7 keymap_ed 1X111 420 Hewlett Packard Company 2 HP UX 11i Version 2 December 2007 Update ...

Page 421: ...file entries describing changes to any saved or running kernel configuration C comment kclog will not print any entries Instead kclog will create a new entry as if a kernel configuration change had been made containing the specified comment Super user per missions are required for this option f string kclog will print only log file entries that contain the given string n name kclog will print only...

Page 422: ...k kclog 1M kclog 1M SEE ALSO kconfig 5 kcmodule 1M kconfig 1M kctune 1M 422 Hewlett Packard Company 2 HP UX 11i Version 2 December 2007 Update ...

Page 423: ...igurations C comment The specified comment will be included in the kernel configuration log file entry made for this invocation of kcmodule For more details on the kernel configuration log file see kclog 1M Note that it will usually be necessary to quote the comment in order to avoid interpretation by the shell d Adds the description of each module to the output D Restricts the output to only thos...

Page 424: ...emoved from the system Some modules do not support all of the possible states To see which states a module supports run kcmo dule v modulename Moving modules into or out of the static state requires a kernel relink so such changes cannot be applied without a system reboot Other module state changes may also require a system reboot depending on the nature of the specified module Moving a module fro...

Page 425: ...r each interface exported by this module There may be zero such lines Each line will contain the interfacename interfaceversion of an interface exported by this module The special field name ALL may be specified to indicate that all defined fields should be included in the output The output may include fields not listed in this man page The fields will be listed in unspecified order Additional fie...

Page 426: ... a To see verbose information about a module kcmodule v module To load a dynamic module kcmodule module loaded To unload a dynamic module immediately kcmodule module unused To stop using a module when the system reboots kcmodule h module unused To bind a module into the static kernel kcmodule module static SEE ALSO kclog 1M kconfig 5 Managing Kernel Configurations White Paper available on http www...

Page 427: ...e releases of HP UX they will be included as well B Forces a backup of the currently running configuration before making the requested change For more information on backup configurations see kconfig 5 c src dest kconfig will make a copy of the saved kernel configuration named src The copy will be named dest dest may not already exist C comment The specified comment will be included in the kernel ...

Page 428: ...ng the requested change For more information on backup configurations see kconfig 5 l config kconfig will load the saved kernel configuration named config overwriting any changes that were being held for next boot The state of the currently running system will be changed to match the saved configuration If the changes cannot be applied without a reboot they will be marked to take effect at next bo...

Page 429: ...n in the format returned by ctime 3 kernel The pathname of the corresponding kernel directory The special field name ALL may be specified to indicate that all defined fields should be included in the output The output may include fields not listed in this man page The fields will be listed in unspecified order Additional fields may be added in future releases or in patches RETURN VALUE kconfig ret...

Page 430: ...ges approved by management To get a list of all saved configurations kconfig To get details of a saved configuration kconfig v myconfig SEE ALSO kclog 1M kcmodule 1M kcpath 1M kctune 1M mk_kernel 1M system 4 kconfig 5 430 Hewlett Packard Company 4 HP UX 11i Version 2 December 2007 Update ...

Page 431: ...ation x config kcpath will print the full pathname of the kernel executable for the configuration If no options are specified kcpath acts as if b was specified RETURN VALUE kcpath returns zero for success It returns non zero and prints a diagnostic message if an error occurs EXAMPLES Print the basename of the currently running kernel kcpath b vmunix Print the directory containing the currently run...

Page 432: ...mment The specified comment will be included in the kernel configuration log file entry made for this invocation of kctune For more details on the kernel configuration log file see kclog 1M Note that it will usually be necessary to quote the comment in order to avoid interpretation by the shell d Adds the description of each tunable to the output D Restricts output to only those parameters which h...

Page 433: ...at the argument may need to be quoted to avoid interpretation by the shell Expressions are evaluated only when one of the KC commands is running If a tunable s value changes under other circumstances these expressions are not re evaluated and the tunable values dependent on those expressions are not updated For example this can happen when tunables are changed using a direct call to set tune 2 or ...

Page 434: ...e known If the value was specified using an expression this field contains the result of evaluating that expression This field is present only for tunables for which an immediate value change has been made during the current invocation of kctune expr The expression used to set the value of the tunable if any If the tunable is set to default this field contains the word Default next_expr The expres...

Page 435: ...ns on when the tunable value can be changes Tunables whose value can be changed immediately are marked Immed Tunables whose values are being automatically tuned by the system are marked Auto If the administra tor has disabled the automatic tuning by the system the tunable is marked Imm auto disabled The tunables which have nothing in the changes column can only be changed with a reboot The layout ...

Page 436: ...reboots kctune h tunable 12 To increase a tunable s value by 100 kctune tunable 100 SEE ALSO kclog 1M gettune 2 settune 2 settune_txn 2 tuneinfo2 2 kconfig 5 Managing Kernel Configurations White Paper available on http www hp com products1 unix operating infolibrary 436 Hewlett Packard Company 5 HP UX 11i Version 2 December 2007 Update ...

Page 437: ...service remains the same DESCRIPTION keyenvoy is a setuid root process that is used by some RPC programs to intermediate between a user process and the keyserv process keyserv 1M which will not talk to anything but a root process This program cannot be run interactively AUTHOR keyenvoy was developed by Sun Microsystems Inc SEE ALSO keyserv 1M HP UX 11i Version 2 December 2007 Update 1 Hewlett Pack...

Page 438: ...en no one is around to type a password Options d Disable the use of default keys for nobody D Run in debugging mode and log all requests to keyserv n Root s secret key is not read from etc rootkey Instead keyserv prompts the user for the password to decrypt root s key stored in the publickey database and then stores the decrypted key in etc rootkey for future use This option is useful if the etc r...

Page 439: ...g background processes associated with the terminal from which killall was invoked any ps ef process if owned by root any sed e process if owned by root any shutdown process any killall process any sbin rc process killall obtains its process information from ps and therefore may not be able to perfectly identify which processes to signal see ps 1 If no signal is specified a default of 9 kill is us...

Page 440: ...nstantaneously killsm will not exit until the sendmail dae mon is terminated or after a time interval of 10 seconds The sbin init d sendmail stop command does the same thing as killsm HP recommends that system administrators use sbin init d sendmail start and sbin init d sendmail stop to start and stop sendmail these startup scripts are used when the system is booting to start sendmail Advanced sy...

Page 441: ...binations indicated in the SYNOPSIS section All options and keywords are case sensitive e Enable the Kernel Logging facility and start up default logging as defined in the file etc nettlgen conf If the l option is used in conjunction with the e option the l option must be specified as the last option on the command line d Disable the Kernel Logging facility Once this option is issued Kernel Loggin...

Page 442: ...size is 16 kilobytes When write to disk is started the default log file size is taken from the file etc nettlgen conf The s option allows you to modify the size of the log file without stopping write to disk operations Note that when setting the file size you can specify a numeric value followed by the char acter M or K which indicates that fsize is being defined in units of megabytes or kilobytes...

Page 443: ...ers old log files that contain messages collected during a prior run of the system when a panic occurred thus the log files may contain important information about the panic then log files are not overwritten Instead write to disk first attempts to move the old log files to the default crash directory typically var adm crash crash ID where ID is a numeric counter If the move fails then write to di...

Page 444: ...that l w KL_PM changes the initial level of the KL_PM subsystem only This means that the initial levels of the rest of the subsystems specified in the etc nettlgen conf file remain unchanged 10 Take a picture snapshot and start write to disk logging with a maximum file size of 128K kl p w on 128K AUTHOR kl was developed by HP in partnership with NEC FILES dev kernlog Kernel log pseudo device file ...

Page 445: ...f other files including dynamically loadable kernel modules These files are all stored in a directory which represents the kernel configuration If no options are specified kmpath returns the full path of the executable file for the kernel that was most recently booted Note that the executable file may no longer be at that path if changes have been made since boot Options The kmpath options have th...

Page 446: ...e planned and current values are different are listed If the planned value is a formula it is NOT considered different from the current value This option is useful to insure that only desired changes will be made on a subsequent invocation of kmtune u The d option cannot be used with the r s or u options e value Evaluate the expression given by value The expression is anything allowed in the s opt...

Page 447: ...l also apply to any child processes they create after the change Some parameters have exceptions to this general policy see the manual pages for those parameters for details It is possible to put multiple s and r options on a single kmtune command kmtune will try to make all of the changes in the order listed If an error occurs with one of the changes the state of the other changes is not defined ...

Page 448: ...rnel KRS data to be flushed to files on disk This command signals the KRS daemon krsd 1M causing it to save the KRS data to disk The data will only be saved if it has changed from the time of the last save AUTHOR krs_flush was developed by Hewlett Packard Company SEE ALSO krsd 1M krs 5 448 Hewlett Packard Company 1 HP UX 11i Version 2 December 2007 Update ...

Page 449: ...t is terminated krsd uses the syslog message logging facility to log all krsd activity Persistent KRS data are maintained in files based on the class of the data in question Currently the fol lowing classes are recognized system specific Data that apply to the system in general regardless of what configuration is booted This data is saved in the file system krs configuration specific Data specific...

Page 450: ...admin replaces the now obsolete landiag command beginning at 10 0 Options lanadmin recognizes the following Immediate Mode options At least one aAbBcgmMprRsSVxX option and the PPA argument must be supplied a Display the current station address of the interface corresponding to PPA A station_addr Set the new station address of the interface corresponding to PPA The station_addr must be entered in h...

Page 451: ...LAN scan Get information about all VLANs on a system info Get information about a particular VLAN on a system basevppa Get the minimum acceptable virtual PPA VPPA value x options Get and display driver specific options of the interface corresponding to PPA X options Set driver specific options of the interface corresponding to PPA You must have superuser privileges lanadmin recognizes the followin...

Page 452: ...admin program reset Reset the local LAN interface card causing it to execute its self test Local access to the network is interrupted during execution of reset You must have superuser privileges specific Display and execute commands from a driver specific menu Arguments lanadmin recognizes the following Immediate Mode argument PPA The Physical Point of Attachment PPA number of the LAN interface Th...

Page 453: ...face supports This is displayed only when the v option is selected If the interface corresponds to VLAN then lanscan displays VLAN as its hardware path Here is a number that uniquely identifies a VLAN interface Options lanscan recognizes the following command line options a Display station addresses only No headings i Display interface names only No headings l Display information about PPAs that a...

Page 454: ...l lanscan 1M lanscan 1M SEE ALSO ifconfig 1M ioscan 1M lanadmin 1M linkloop 1M lan 7 vlan 7 454 Hewlett Packard Company 2 HP UX 11i Version 2 December 2007 Update ...

Page 455: ...pe Specifies the service name for which to retrieve configuration information Possible service names are passwd group netgroup services rpc hosts networks automount automountmap publickey protocols and pam If the t argument is not specified ldapcfinfo assumes the passwd name service if applicable to the argument specified If the t option is the only argument specified on the command line ldapcfinf...

Page 456: ...d in RFC4514 Lightweight Directory Access Protocol LDAP String Representation of Distinguished Names s Displays the primary first configured search scope for a particular service as defined with the t option If the t option is not specified the LDAP UX default search base for passwd will be displayed Output format for the s option will be either base one or sub which represents the search scopes a...

Page 457: ...tmpl use ldapcfinfo t passwd R sn To display the location of the LDAP UX configuration profile use ldapcfinfo P dn cn ldapux profile ou example org dc example dc com host 10 42 222 15 389 To display attribute mapping for the passwd service and assuming the uidNumber attribute has been mapped to employeeNumber and the gecos has been mapped to the three attributes cn l and telephoneNumber use ldapcf...

Page 458: ...a programmatically parsable error key string while message will be human readable Refer to the LDAP UX Client Services Administrator s Guide for a list of possible error codes generated by the LDAP user and group management tools SEE ALSO ldapugadd 1M ldapugdel 1M ldapuglist 1M ldapugmod 1M ldapux 5 458 Hewlett Packard Company 4 HP UX 11i Version 2 December 2007 Update ...

Page 459: ...protocols rpc services X 500 group membership Note LDAP UX does not support netgroup with the Microsoft Windows 2000 2003 2003 R2 Active Directory Server Performance 1 Caches entries to reduce LDAP UX client response time retrieving automount group including dynamic groups netgroup passwd X 500 group membership Note Since pwgrd still caches passwd and group entries that did not come from the direc...

Page 460: ...y the profile is now done with the r option If rereading all LDAP UX client settings is necessary kill ldapclientd using k then restart ldapclientd d level Set log level Initializes log level during startup or sets the log level of the running daemon process Accepted range of logging level is from 0 to 511 0 no logging output 1 critical errors 2 key function hits 4 key areas 8 looping function hit...

Page 461: ...d a general cache statistic summary is shown z Disable daemonize force ldapclientd to run in the foreground instead of the back ground Prevent the ldapclientd process to fork into a daemon process during startup Helpful for debugging DIAGNOSTICS By default errors are logged into syslog if system log is enabled in the LDAP UX client configuration file at etc opt ldapux ldapux_client conf Errors occ...

Page 462: ...nform clients that the ldapclientd daemon is running and ready to service client requests var spool ldapcltd daemon The ldapclientd daemon uses this pipe socket to receive client requests etc opt ldapux daemon_auth Authentication file restricting execution of ldapclientd control options to the superuser sbin init d ldapclientd rc startup and shutdown script during system reboot var spool sockets l...

Page 463: ...o Binding to the Directory Server below for additional details PP Prompt for the password of the user or group being created Also if LDAP UX attributed mapping for the userPassword attribute has not been defined or set to NULL ldapugadd will create new passwords in the userPassword attribute To assure accuracy the user will be prompted twice for the password ldapugadd relies on the directory serve...

Page 464: ...r to Template Files below for additional information base is expected to be an LDAP distinguished name t type Specifies on which service type ldapugadd will operate The service type can be either passwd or group where passwd implies posixAccount type entries and group implies posixGroup type entries The command line arguments that are applicable will depend on the service specified If unspecified ...

Page 465: ...e name ser vice repository ldapugadd will exit with an ERROR and not create the new entry If this argument is not specified the user will become a member of default login group as specified by the ldapugadd D g default_gid command f full_name This option is only required for the passwd service and is used to specify the user s full name If undefined the user s full name will default to the account...

Page 466: ... below represents the cn attribute when creating new user account entries the following command might produce unpredictable results since cn is specified by both f and by the gecos mapping ldapugadd f Jim Smith I Jim Smith Boston 555 12354 jsmith sn Smith telePhoneNumber 555 1234 In the above example because of the gecos attribute mapping the cn and telephoneNumbers are specified twice and will re...

Page 467: ...mplate file that attribute value pair will be considered as an optional attribute value which will be added to the entry exactly as specified attr value parameters are optional but must be specified as the last parameters on the command line Arguments Applicable to t group g gid_number Specifies the group s numeric id number If the specified gidNumber already exists in the directory server ldapuga...

Page 468: ... LDAP attributes and values Refer to attr value in the section above for additional information attr value parameters are optional but must be specified as the last parameters on the command line Template Files One of the benefits of LDAP directory servers is the flexibility to support customized data models to meet organizational requirements This flexibility allows each directory deployment to d...

Page 469: ...gidNumber gecos homeDirectory loginShell When used with posixGroup type entries the following attributes and values will be added to the entry cn userPassword gidNumber memberUid Note Since use of posixProfile supports attribute mapping if the above attributes have been mapped as configured in the LDAP UX configuration profile the mapped attributes and values will be added to the entry instead of ...

Page 470: ...unt entry created In this case ldapugadd will fill each attribute value in order specified in the template file based on the order that those attributes are specified on the command line Note if not enough attribute values have been specified on the command line to fill the attribute values used in the template file ldapugadd will return an error Template File Naming The default template files for...

Page 471: ...d if the user running ldapugadd has enough privilege to read the etc opt ldapux acred file Otherwise the credential configured in etc opt ldapux pcred will be used Note to prevent discovery of the LDAP administrator s credentials the LDAP user DN and password may not be specified as command line options to the ldapugadd utility Security Considerations Use of ldapugadd requires permissions of an LD...

Page 472: ...me to the base path to create the full path name The default login shell for new users LDAP UX provides the default ldapug conf file as follows This file is used by the ldapugadd tool for management of default values for creating new user and group entries This file can not be modified directly but instead through the ldapugadd D command uidNumber_range 100 20000 gidNumber_range 100 2000 default_g...

Page 473: ... are assumed to UTF 8 and part of the ISO 10646 char acter set ldapugadd does not perform conversion of the locale character set to from the UTF 8 char acter set Since ldapugadd calls functions to discover if groups exists before adding a user to a group it is possi ble to encounter timing issues with cached information For example if an administrator wishes to see if a group exists by using grget...

Page 474: ...ver y Used only with the combined with O and the t passwd options forces ldapugdel to remove the userPassword attribute from the user entry Use of y is rarely recommended when removing posixAccount related attributes Z Requires an SSL connection to the directory server even if the LDAP UX configuration does not require the use of SSL Use of Z requires either a valid server or CA certificate be def...

Page 475: ...abled applications attribute mapping is not supported with ldapugdel For example if uidNumber has been mapped to employeeNumber ldapugdel will still attempt to remove the uidNumber attribute and not the employeeNumber attribute Since the uid cn and description attributes for user entries and the cn and description attributes for group entries are commonly used by other objectclasses or as naming a...

Page 476: ... authentication method simple passwords SASL Digest MD5 etc If either of the environment variable LDAP_BINDDN or LDAP_BINDCRED has not been specified ldapugdel will consult the LDAP UX configuration for additional information The type of credential user proxy or anonymous to use The credential used for binding as a proxy user either etc opt ldapux acred for administra tive users or etc opt ldapux ...

Page 477: ... contain copies of the executed commands that show setting of these variables Access to a shell s history file must be protected Specification of the LDAP administrator s credentials on the command line is not allowed since information about the currently running processes can be exposed externally from the session Use of the P eliminates the need to set the mentioned environment variables by inte...

Page 478: ... LDAP directories require data be stored according to the UTF 8 RFC3629 character encoding method all characters provided to ldapugdel are assumed to be UTF 8 and part of the ISO 10646 character set ldapugdel will not perform conversion of the locale character set to from the UTF 8 character set Refer to limitations described under O above in reference to interoperability with Microsoft Services f...

Page 479: ...e a consistent format similar to that defined by RFC2307 even when different attributes are actually used to store the information in the directory server Note that although that format is similar to LDIF it is not LDIF Major differences include Objectclasses will not be displayed By default only POSIX related attributes will be displayed by ldapuglist unless an attribute list is specifically requ...

Page 480: ...er a valid server or CA certificate be defined in the etc opt ldapux cert8 db file Refer to Binding to the Directory Server below for additional details ZZZ Requires a TLS connection to the directory server even if the LDAP UX configuration does not require the use of TLS Use of ZZZ requires either a valid directory server or CA certificate be defined in the etc opt ldapux cert8 db file An error w...

Page 481: ...And assuming the LDAP UX product has been configured as follows The configuration profile defines the search filter for the passwd service as objectclass posixAccount The uidNumber attribute for the passwd service has been mapped to the employ eeNumber attribute Then the actual search filter used by ldapuglist would be objectclass posixAccount employeeNumber 52345 The f option also supports genera...

Page 482: ...d if the L option is specified Attributes specified in the attr list are assumed to not be part of RFC2307 and thus will not be mapped When the m option is specified the output format for a value specified by an attr will always be in the form attributename attributename value Note ldapuglist does not allow use of the attr parameter when ldapuglist binds to the directory server using the LDAP UX p...

Page 483: ...command line is not allowed since information about the currently run ning processes can be exposed externally from the session Use of the P eliminates the need to set the mentioned environment variables by interactively prompting for the required credentials LDAP UX PROFILE ldapuglist makes use of the LDAP UX configuration profile to determine the information model used in the directory server to...

Page 484: ...of the L option may result in unexpected output Data between the characters may be empty such as x UTF 8 Since LDAP directories require data be stored according to the UTF 8 RFC3629 character encoding method all characters displayed by ldapuglist will be UTF 8 and assumed to be part of the ISO 10646 character set ldapuglist will not perform conversion of the locale character set to from the UTF 8 ...

Page 485: ...riables LDAP_BINDDN Specified the DN of a user with sufficient directory server privilege to discover and enumerate users and or groups in the LDAP directory server While this variable is optional if LDAP_BINDDN is specified LDAP_BINDCRED must also be specified LDAP_BINDCRED A password or other type of credential used for the user specified by LDAP_BINDDN While this variable is optional if LDAP_BI...

Page 486: ... Joanie Lin ou people ou IT dc FutureWidget dc com cn Joanie Lin uid jlin uidNumber 2840 gidNumber 229 homeDirectory home jlin loginShell usr bin ksh gecos Joanie Lin San Francisco 1 505 555 1111 Listing an account that does not contain POSIX attributes ldapuglist m F uid apierce dn cn Alan Pierce ou people ou IT dc FutureWidget dc com cn cn Alan Pierce uid uid apierce gecos cn Alan Pierce gecos l...

Page 487: ...emberUid member apierce memberUid member bjones dn cn mygroup2 ou groups ou IT dc FutureWidges dc com cn mygroup1 gidNumber 542 memberUid lsmith memberUid bjones memberUid mdiaz Listing regular posixGroups which have Mike Diaz uid mdiaz as a member ldapuglist t group f cn mygroup1 dn cn mygroup1 ou groups ou IT dc FutureWidges dc com cn mygroup1 gidNumber 542 memberUid mdiaz memberUid apierce memb...

Page 488: ...ights in the LDAP directory server Be sure to specify administrator credentials with sufficient privileges in the LDAP directory to view the requested attributes SEE ALSO ldapcfinfo 1M ldapugadd 1M ldapugdel 1M ldapugmod 1M ldapux 5 488 Hewlett Packard Company 10 HP UX 11i Version 2 December 2007 Update ...

Page 489: ...he Directory Server below for additional details PP Prompt for the password of the user or group being modified If the PP option is not specified the password for the modified user or group will be retrieved from the LDAP_UGCRED environ ment variable if the PW option is specified Use of PP implies the use of PW PW Change the user or group password attribute Also if LDAP UX attributed mapping for t...

Page 490: ...w changing of the RDN When the DN of an entry changes the group membership information for this entry may become inconsistent However most directory servers have the inherent ability to update all entries that refer to the updated DN of a changed entry So ldapugmod will not attempt to perform modifications to other entries in the directory server that refer to this entry by its DN NOTE ldapugmod w...

Page 491: ...nd line The value portion of attrval may be an empty string R attrval Specifies an attribute or specific values of an attribute to be removed from the entry The format of attribute value where attribute is the name of the attribute to remove and value is the specific instance of that attribute if the attribute is multi valued Note that use of the R option interacts with the optional attr value par...

Page 492: ... often omitted Each field in the gecos must be separated by a comma Although each field value specified within the gecos can contain white space such as Bill Smith Building 6 555 1234 white space should not be used between the each field and the separating commas such as Bill Smith Building 6 555 1234 Note that LDAP UX supports mapping of the gecos field to multiple attributes If attribute mapping...

Page 493: ...e memberUid attribute to multiple attri butes simultaneously ldapugmod will only use the first mapped attribute when defining membership in the group If the specified member does not exist in the LDAP directory F must be used to define the member and only the memberUid attribute syntax will be used a only supports membership defined using static group membership structures such as memberUid member...

Page 494: ...ministrator when it performs its operations on the directory server The rights to modify existing LDAP directory entries under the requested subtree along with creation modification and removal of the required attributes in that entry must be granted to the administrator identity that is specified when executing ldapugmod Note that as with any POSIX type identity the user and group ID number speci...

Page 495: ...t also be specified LDAP_BINDCRED A password or other type of credential used for the user specified by the LDAP_BINDDN While this variable is optional if LDAP_BINDCRED is specified LDAP_BINDDN must also be specified Refer to Security Considerations for important security impacts when these environment variables are used RETURN VALUE Upon exit ldapugmod returns the following 0 Success ldapugmod ex...

Page 496: ...lters cn M Wolters replaces all instances of cn dn uid mwolters ou people ou IT dc FutureWidget dc com cn M Wolters uid mwolters uidNumber 2284 gidNumber 212 homeDirectory home mwolters loginShell usr bin ksh gecos Manuel Wolters San Francisco 1 505 555 5072 Assuming the entry as originally specified if the following ldapugmod command is issued ldapugmod t passwd R cn Manny Wolters mwolters cn M W...

Page 497: ...l ldapugmod 1M ldapugmod 1M SEE ALSO ldapcfinfo 1M ldapugadd 1M ldapugdel 1M ldapuglist 1M ldapux 5 HP UX 11i Version 2 December 2007 Update 9 Hewlett Packard Company 497 ...

Page 498: ... library installed instead libcadmin allows the system administrator to accomplish this task When libcadmin is exe cuted the PA RISC2 0 library is stored in usr lib pa20_32 and the PA RISC1 1 library is copied into usr lib libc 2 It is recommended that the system be re booted after executing the libcadmin command so that applica tions which are linked shared against libc will use the shared 32 bit...

Page 499: ...ble If LANG is not specified or is set to the empty string a default of C see lang 5 is used instead of LANG If any internationalization variable contains an invalid setting link behaves as if all internationalization variables are set to C See environ 5 International Code Set Support Single and multi byte character code sets are supported RETURN VALUE link and unlink return the following values 0...

Page 500: ...en number of hexadecimal bytes separated by colons up to a maximum of 16 bytes s size Set the size in bytes of the data message to send The maximum data size is dependent on the type of LAN link being used The default value is the max imum data byte count that can be used for the particular link t timeout Set the amount of time in seconds to wait for a reply from the remote node before aborting If...

Page 501: ...d in the t option is a negative integer or the value specified multiplied by 1000 is too large for the local computer illegal size parameter The size specified in the s option is not in the range from 0 to the maximum link data size Remember that the maximum link data size can vary in value for different LAN connection types The current MTU can be obtained with the linkloop command No valid interf...

Page 502: ...the form name use charmap_file See charmap 4 for a description of the format of a charmap_file i locale_definition Use locale_definition file as input instead of standard input default m method_file Use the specified method_file to overwrite use of default methods in processing the locale definition C compiler_options Specify additional compiler options to be applied in compiling the locale See cc...

Page 503: ...ory must be the first and only keyword following the category tag A methods file is used to create locales for user specific character encoding schemes Operating System Requirements For cross platform development and development on a 64 bit operating system several requirements must be observed Both the 32 bit and 64 bit method libraries must exist In the case of the 64 bit shared library it must ...

Page 504: ...n to the PA RISC files the following files are present on Itanium based systems usr lib nls loc hpux32 src usr lib nls loc hpux64 src usr lib nls loc hpux32 charmaps usr lib nls loc hpux64 charmaps usr lib nls loc hpux32 methods usr lib nls loc hpux64 methods usr lib nls loc hpux32 locales language _territory codeset usr lib nls loc hpux64 locales language _territory codeset SEE ALSO locale 1 setl...

Page 505: ...ber can have any value between 1 and 65535 After adding the port variable to the etc rc config d nfsconf file lockd must be restarted for this to take effect This feature can be disabled by deleting or commenting out the port variable from the etc rc config d nfsconf file and restarting lockd Options lockd recognizes the following options and command line arguments l log_file Log any errors to the...

Page 506: ...ith no passwords s Display all system logins t Sort output by login rather than UID u Display all user logins x Display extended information about selected users This extended information includes home direc tory login shell and password aging data each on its own line Password information consists of pass word status PS for valid password LK for locked and NP for no password and if a password is ...

Page 507: ...can appear in any order For ease of discussion the printer is referred to below as printer P cclass Inserts printer P into the specified class class is created if it does not already exist eprinter Copies an existing printer s interface program to be the new interface program for printer P gpriority Sets the default priority for printer P associated with lp 1 If omitted the default priority is set...

Page 508: ...nly one of oci or ocm can be specified If neither of them is specified the default remote cancel model usr lib lp cmodel rcmodel is used Similarly only one of osi or osm can be specified If neither of them is specified the default remote status model usr lib lp smodel rsmodel is used All local printers use four digit request numbers All remote printers use three digit request numbers for contact w...

Page 509: ... have the character sequence BSD attached to the beginning of the option for example BSDl file full pathname of the file to be printed Given the command line arguments and the output directed to the device interface programs can format their output in any way they choose When printing is completed it is the responsibility of the interface program to exit with a code indicative of the success of th...

Page 510: ...lpstat to specify the method used for displaying remote status classes must not include remote printers HP UX systems do not have the ability to distribute print jobs in this way Printing to a class of printers on a remote system systemB for example must be accomplished by creating the class on the remote system then identifying that class by using a command resembling the following although you m...

Page 511: ...and or classes lpana examines var adm lp lpana log for the following items Wait AV Average waiting time from when job is spooled until start of printing Wait SD Standard Deviation for waiting time Print AV Average printing time from start to end of job Print SD Standard Deviation for printing time Bytes AV Average of number of bytes printed per request Bytes SD Standard Deviation for number of byt...

Page 512: ...est requests are request ids as returned by lp 1 The second form moves all requests for destination dest1 to destination dest2 As a side effect dest1 rejects requests Note that lpmove never checks the acceptance status see accept 1M for the new destina tion when moving requests lpfence Defines the minimum required priority for the spooled file to be printed fence must be in between 0 lowest fence ...

Page 513: ...lity to process major arguments is provided for compatibility and functions like the e option Options C class List device drivers that match class d driver List device drivers with the name driver b block_major List device drivers with a block major number of block_major c char_major List device drivers with a character major number of char_major e major List device drivers with either a character...

Page 514: ...d in a driver_install routine lsdev may not list drivers installed by other means AUTHOR lsdev was developed by HP SEE ALSO sam 1M Section 7 entries related to specific device drivers Managing Systems and Workgroups manual 514 Hewlett Packard Company 2 HP UX 11i Version 2 December 2007 Update ...

Page 515: ...Character major major is not in the kernel Block major major is not in the kernel The major number associated with the special file is not in the kernel Use kcmodule to add the appropriate driver to the kernel see kcmodule 1M Device driver name is not in the kernel Device class name is not in the kernel The indicated device driver or device class is not present in the kernel An open of a special f...

Page 516: ... NULL byte Enabling Long User and Group Names To enable long user and group names 1 Stop the pwgrd daemon sbin init d pwgr stop 2 Run the lugadmin command with the e option lugadmin e d num 3 The command requests confirmation before enabling the system Long user group name once enabled cannot be disabled in future Do you want to continue yY If you respond with y or Y the command proceeds otherwise...

Page 517: ... group name feature is not supported on trusted systems WARNINGS The lugname file is the switch that marks a long name system If it is missing short names are assumed and the UG_DISPLAY_WIDTH variable is ignored While many programs are unaffected by long names in a short name environment some may behave abnor mally and some may abort It is recommended that you do not attempt to restore the short n...

Page 518: ...an complete Thus the IO will not be returned to the caller until the IO can complete By setting a non zero IO timeout value this will set the maximum length of time that the system will retry an IO If the IO cannot complete before the length of time specified by the IO timeout then the IO will be returned to the caller with an error The actual duration of the IO request may exceed the logical volu...

Page 519: ...ing policy of a striped logical volume is striped and cannot be changed schedule can have one of the following values p Establish a parallel scheduling policy s Establish a sequential scheduling policy Use this value with care because it leads to performance loss in most cases D distributed Change the distributed allocation policy distributed can have one of the following values y Turn on distribu...

Page 520: ...f the volume group is activated on an different HP UX release that provides the bad block relocation feature bad blocks may be relocated depending upon the value of this flag Although no new relocations will be done any bad block relocations present on logical volume that was activated on HP UX releases that provided this feature will be honored when the volume group is activated on this HP UX rel...

Page 521: ...M n dev vg01 lvol1 Change the IO timeout value of a logical volume to 1 minute 60 seconds lvchange t 60 dev vg01 lvol1 WARNINGS For root swap or dump logical volumes the allocation policy is always contiguous This attribute cannot be changed with lvchange By setting mirror consistency recovery off crash recovery time will be reduced After a system crash the mirrored logical volume will be availabl...

Page 522: ...ical volume to the requirements of the system Once a logical volume is created some of its characteristics can be changed with the lvchange lvextend and lvreduce commands see lvchange 1M lvextend 1M and lvreduce 1M Options and Arguments The c d m M and s options are only meaningful if the optional HP MirrorDisk UX software has been installed on the system lvcreate recognizes the following options ...

Page 523: ...the distributed allocation policy is turned on only one free extent is allocated from the first available physical volume The next free extent is allocated from the next available physical volume Allocation of free extents proceeds in round robin order on the list of available physical volumes When the distributed allocation policy is turned off all available free extents are allocated from each a...

Page 524: ... write to a logical track group that is not already recorded in the cache This allows LVM to determine whether all the mirror copies are identical even across sys tem crashes When the volume group is activated the Mirror Con sistency Record is used to perform mirror consistency recovery n Set Mirror Write Cache to off Mirror write does not incur an addi tional write to the Mirror Consistency Recor...

Page 525: ...ch physical extent of a given set is allocated on a different physi cal volume in the volume group The total number of physical extents of a striped logical volume is always a multiple of stripes or stripes mirror_copies 1 if the volume is mirrored A minimum of stripes or stripes mirror_copies 1 if the volume is mirrored physical volumes with ade quate free space and meeting the allocation policy ...

Page 526: ...istency recovery turned off are data not needed after a crash such as swap or other raw scratch data or data that an application itself will automatically reconstruct for example a raw logical volume for which a database keeps a log of incomplete transactions In order to create a logical volume greater than 2 terabytes the kernel must be updated to support this feature and the corresponding featur...

Page 527: ...e of the volume group LV Permission Access permission read only or read write LV Status State of the logical volume available stale Available but contains physical extents that are not current available syncd Available with no stale extents unavailable Not available for use Mirror copies Number of physical extents beyond the original allocated for each logical extent i e the number of mirrors 0 1 ...

Page 528: ...ical volume group PVG strict Mirror copies for a logical extent are not allocated on the same physical volume group strict Mirror copies for a logical extent are not allocated on the same physical volume IO Timeout Seconds The IO timeout used by LVM for all IO to this logical volume A value of default indicates that the system will use the value of forever Note the actual dura tion of a request ma...

Page 529: ... third physical extent second copy of the logical extent PE3 Third physical extent number allocated to the logical extent Status 3 Status of the third physical extent stale or current EXTERNAL INFLUENCES Environment Variables LANG determines the language in which messages are displayed If LANG is not specified or is null it defaults to C see lang 5 If any internationalization variable contains an ...

Page 530: ...MirrorDisk UX software has been installed lvextend recognizes the following options and arguments lv_path The block device path name of a logical volume pv_path The block device path name of a physical volume pvg_name The name of a physical volume group see lvmpvg 4 A autobackup Set automatic backup for this invocation of this command autobackup can have one of the following values y Automatically...

Page 531: ...east stripes or stripes mirror_copies 1 if the volume is mirrored physical volumes with adequate free space and meeting the allocation policy An increase of the number of mirror copies of a striped volume requires at least stripes times the number of copies to add physical volumes with adequate free space and meeting the allocation policy EXTERNAL INFLUENCES Environment Variables LANG determines t...

Page 532: ...talled The creation of striped and mirrored logical volume s may prevent the import and activation of the volume group on an earlier HP UX release See lvcreate 1M on the earlier release to see if it explicitly states that striping and mirroring is supported If the striped and mirrored logical volumes of the volume group are removed or un mirrored the volume group becomes again compatible with the ...

Page 533: ...roup A autobackup Set automatic backup for this invocation of this command autobackup can have one of the following values y Automatically back up configuration changes made to the logical volume This is the default After this command executes the vgcfgbackup command see vgcfgbackup 1M is executed for the volume group to which the logical volume belongs n Do not back up configuration changes this ...

Page 534: ...vrmboot 1M c During normal boots versus maintenance mode boots see hpux 1M this com mand is automatically executed by sbin ioinitrc see inittab 4 Since this command is performed during boot it does not need to be performed manually unless stand rootconf is missing in a separate root boot configuration or alternatively performing a normal reboot will recreate this file This command updates the stan...

Page 535: ...ll be used as the primary swap lvlnboot s dev vglvmroot swap Specify that the logical volume dump will be used as the dump volume lvlnboot d dev vglvmroot dump Display the results of the previous operations lvlnboot v dev vglvmroot The following examples show configuration of separate root and boot volumes Create a root volume group vglvmroot containing root boot swap and dump logical volumes Assu...

Page 536: ...vlnboot command will return an error message such as Unable to configure dump logical volume Dump logical volume size beyond the IODC max address Separate Root Boot Warnings Whenever mkboot 1M is used to restore the LIF area of a damaged root physical volume the b boot_lv option of lvlnboot must be performed afterwards to record the boot volume information inside the new LIF see lif 4 Subsequent l...

Page 537: ...RETURN VALUE lvmchk returns the following values 0 The disk specified by pv_path is under the control of LVM 1 The disk specified by pv_path is not under the control of LVM 255 There was an internal I O error on the disk specified by pv_path or a command line syntax or usage error was encountered EXAMPLES Examine whether disks dev dsk c0t6d0 dev rdsk c0t6d0 and dev vg00 lvol1 belong to LVM lvmchk ...

Page 538: ...NOTE Whenever a mirrored logical volume is split into two logical volumes using lvsplit a bitmap is stored that keeps track of all writes to either logical volume in the split pair When the two logical volumes are subsequently merged using lvmerge the bitmap is used to decide which areas of copy_lv_path need to be resynchronized with the master_lv_path This bitmap remains in existence until one of...

Page 539: ... by dev vg00 lvol1 and dev vg00 lvol1b will be removed lvmerge dev vg00 lvol1b dev vg00 lvol1 Merge dev vg01 lvol1b with dev vg01 lvol1 Data in dev vg01 lvol1b will be overwritten by dev vg01 lvol1 and dev vg01 lvol1b will be removed If the bitmap does not exist then mark all extents associated with dev vg01 lvol1b as stale and complete without resynchronizing lvmerge s dev vg01 lvol1b dev vg01 lv...

Page 540: ...tallation After executing lvmmigrate the user must back up the file systems and any raw device section having useful data to tape The system is then reinstalled on logical volumes using the configuration information recorded by lvmmigrate Options lvmmigrate recognizes the following options d disk_special_file Use the specified root disk for reinstallation Without this option the current root disk ...

Page 541: ...ection Before using the f option be sure to back up all data on the boot section of the disk specified with the d option If there is no LIF volume lvmmigrate uses lifinit to create it see lifinit 1 If file CUSTOM already exists in the LIF volume lvmmigrate rewrites it Caution All data on disks being used for reinstallation must be backed up to a separate device because the install process overwrit...

Page 542: ...path name of a physical volume A autobackup Set automatic backup for invocation of this command autobackup can have one of the following values y Automatically back up configuration changes made to the logical volume This is the default After this command executes the vgcfgbackup command see vgcfgbackup 1M is executed for the volume group to which the logical volume belongs n Do not back up config...

Page 543: ...iron 5 EXAMPLES Decrease the number of the logical extents of a logical volume to one hundred lvreduce l 100 dev vg01 lvol3 Reduce to one mirror that is an original and one copy for each logical extent of a logical volume lvreduce m 1 dev vg01 lvol5 Remove mirror copies of logical extents of a logical volume from the physical volume dev dsk c1t0d0 lvreduce m 0 dev vg01 lvol4 dev dsk c1t0d0 Remove ...

Page 544: ...llowing values y Automatically back up configuration changes made to the logical volume This is the default After this command executes the vgcfgbackup command see vgcfgbackup 1M is executed for the volume group to which the logi cal volume belongs n Do not back up configuration changes this time f Specify that no user confirmation is required EXTERNAL INFLUENCES Environment Variables LANG determi...

Page 545: ...which the logi cal volume belongs n Do not back up configuration changes this time d dump_lv Remove the definition of dump_lv as one of the dump volumes Update the Boot Data Reserved Area r Remove the definitions of all of the root primary swap and all dump volumes from the given volume group Update the Boot Data Reserved Area s Remove the definition of the primary swap volume from the given volum...

Page 546: ...ical volume group Whenever a mirrored logical volume is split into two logical volumes a bit map is stored that keeps track of all writes to either logical volume in the split pair When the two logical volumes are subsequently merged using lvmerge the bit map is used to decide which areas of the logical volumes need to be resynchronized see lvmerge 1M This bit map remains in existence until one of...

Page 547: ...ies The offline logical volume will be created using the mirror copy on the physical volumes contain in the physical volume group pvg1 lvsplit g pvg1 dev vg00 lvol1 Split an online logical volume which is currently mounted on usr so that a backup can take place lvsplit dev vg00 lvol1 fsck dev vg00 lvol1b mount dev vg00 lvol1b usr backup Perform a backup operation then umount usr backup lvmerge dev...

Page 548: ...nd line The maximum number of threads used can be controlled using the PTHREAD_THREADS_MAX system tunable NOTE This option has no effect if the volume group is activated in shared mode EXTERNAL INFLUENCES Environment Variables LANG determines the language in which messages are displayed If LANG is not specified or is null it defaults to C see lang 5 If any internationalization variable contains an...

Page 549: ...vel to debuglevel Debugging traces from lwresd become more verbose as the debug level increases f This option is used to run lwresd in the foreground g This option is used to run lwresd in the foreground and force all logging to stderr i pid file This option is used to write the daemon s process id to pid file instead of the default path name n cpus This option is used to create cpus worker thread...

Page 550: ...n for lightweight resolvers not a lightweight daemon for resolvers FILES etc lwresd conf Default configuration file var run lwresd pid Default process id file SEE ALSO named 1M 550 Hewlett Packard Company 2 HP UX 11i Version 2 December 2007 Update ...

Page 551: ... name resolution fails the ypserv process will query the Internet domain name server named 1M to provide the host name resolution Before using the b option it is recommended that the name services switch switch 4 be set to allow NIS host name reso lution first Note that since the ypserv process only checks hosts byname and hosts byaddr for the existence of the YP_INTERDOMAIN key using the b option...

Page 552: ...For example usr bin sh usr bin awk BEGIN FS print 1 0 etc netgroup makedbm netgroup converts the file etc netgroup to a form that is read by makedbm to make the NIS map net group The keys in the database are netgroup 4 names and the values are the remainders of the lines in the etc netgroup file AUTHOR makedbm was developed by Sun Microsystems Inc SEE ALSO domainname 1 ypinit 1M ypmake 1M yppoll 1...

Page 553: ...stedUser option N Include the null byte that terminates strings in the map This must match the N flag in the sendmail cf K line d Allow duplicate keys in the map This is only allowed on B Tree format maps If two identical keys are read they will both be inserted into the map e Allow empty value right hand side f Normally all upper case letters in the key are folded to lower case This flag disables...

Page 554: ... seconds f Sets the flood mode on It is the default value when no multicast router is given on the command line input g Generates output in GRaphEd format n Disable DNS lookup for the multicast router names The output contains the interface configuration information of the requested router s The format for each interface output is interface_addr neighbor_addr neighbor_name metrics thresh flags If ...

Page 555: ... for multicast router connectivity with g option map mbone g hpntcbs cup hp com GRAPH Multicast Router Connectivity Wed Feb 1 17 34 59 1995 UNDIRECTED 252537488 NP 1440 1060 hpntc1t cup hp com 252538974 NP 940 1120 hpntcbs cup hp com 252537488 10 1E 252539807 1 1P 252539807 NP 1590 1150 hpntc1h cup hp com Note map mbone must be run as root AUTHOR map mbone was developed by Pavel Curtis SEE ALSO mr...

Page 556: ...ermines whether a move from source to destination is valid Uses device capabilities mode page and will return TRUE or FALSE There should be no spaces in the source and destination element type values For example c DS specifies a Data Transfer element as the source and a Storage element as the destination e element_type Prints out the number of elements of element type See element types above Multi...

Page 557: ...there is an item of media in slot 2 ST_slot_2 an item of media in the embedded drive DT_slot_1 and all the other slots are empty DT_slot_1 FULL ST_slot_1 EMPTY ST_slot_2 FULL ST_slot_3 EMPTY ST_slot_4 EMPTY ST_slot_5 EMPTY ST_slot_6 EMPTY To move media from an embedded drive to slot 5 and then move media from slot 2 to an embedded drive mc s D1 d S5 s S2 d D1 To check if a move from a Data Transfe...

Page 558: ...ulate the autoloader For devices connected to SCSI interface cards PCI the sctl pass through driver must be configured See scsi_ctl 7 AUTHOR mc was developed by Hewlett Packard FILES dev scsi 3 Default pass through device file SEE ALSO mt 1 scsi 7 scsi_ctl 7 558 Hewlett Packard Company 3 HP UX 11i Version 2 December 2007 Update ...

Page 559: ...on The changes will not take effect at next boot unless that saved kernel configuration was already marked for use at next boot If the target kernel path is not one of the forms specified above then mk_kernel exits with an error Other locations for kernel executable files are no longer supported If the o option is not specified the changes are applied to the kernel configuration called hpux_test T...

Page 560: ... not manually modify the contents of the kernel configuration directories FILES stand system Default HP UX system description file SEE ALSO kconfig 1M system 4 kconfig 5 560 Hewlett Packard Company 2 HP UX 11i Version 2 December 2007 Update ...

Page 561: ...must be quoted so that it is a single parameter b boot_file_path If this option is given boot programs in the pathname specified by boot_file_path are installed on the given device c If this option is specified mkboot checks if the available space on device is sufficient for the boot programs If the i option is also specified mkboot checks if each included_lif_file is present in the boot programs ...

Page 562: ...on cannot be used along with the H and W options Use the l option for any volume manager including the VERITAS Volume Manager VxVM as well as LVM p preserved_lif_file If the p option is specified one or more times mkboot keeps each specified preserved_lif_file intact on device If preserved_lif_file also appears as an argument to the i option that i option is ignored This option is typically used w...

Page 563: ... an Itanium based system the file is created as EFI HPUX AUTO in the EFI partition If the device is on a PA RISC sys tem the file is created as a LIF file in the boot area mkboot a autofile command dev dsk c2t0d0 WARNINGS If device has a Whole Disk layout a file system must reside on the device being modified When executing from a recovery system the mkboot command if used must be invoked with the...

Page 564: ...pecific_options is a list of suboptions and or keyword attribute pairs intended for an FStype specific module of the com mand See the file system specific manual entries for a description of the specific_options that are supported if any V Echo the completed command line but perform no other action The command line is generated by incorporating the specified options and arguments with other inform...

Page 565: ...ory formats that place different limits on the length of file names If L is specified build a long file name file system that allows directory entries file names to be up to MAXNAMLEN 255 bytes long If S is specified build a short file name file system that allows directory entries file names to be up to DIRSIZ 14 bytes long If neither L nor S is specified build a file system of the same type as t...

Page 566: ...cified as the number of bytes per inode The default value is 6144 bytes per inode This number should reflect the expected average size of files in the file system If fewer inodes are desired a larger number should be used if more inodes are desired a smaller number should be used Note The number of inodes that will be created in each cylinder group of a file sys tem is approximately the size of th...

Page 567: ...contents field is a path name that is used as the path to which the symbolic link should point Hard link The initial contents field is a path name that is used as the name of a file within the new file system to which the entry should be linked The mode user ID and group ID tokens of this entry are ignored they are taken from the target of the link The target of the link must be listed before the ...

Page 568: ...within a logical volume dev vg01 my_lvol of a size equal to the size of my_lvol mkfs F hfs dev vg01 my_lvol WARNINGS The old F option from prior releases of mkfs 1M is no longer supported mkfs_hfs 1M cannot be executed specifying creation of a file system on a whole disk if that disk was previ ously used as an LVM disk If you wish to do this use mediainit 1 to reinitialize the disk first The o lar...

Page 569: ...ne but do not execute the command The command line is generated by incorporating the user specified options and other information derived from etc fstab This option allows the user to verify the command line o specific_options Specify options specific to the VxFS file system type specific_options is a comma separated list of suboptions and or keyword attribute pairs The arguments aufirst aupad aus...

Page 570: ... amount of vir tual memory used is twice the size of the log Therefore the sum of physical memory and swap space must be at least 32 MB to ensure that a file system with a 16384K log can be cleaned On small systems take care not to create a file system with a log larger than half the available swap space A maximum log size of one third the total of memory and swap space is a good rule of thumb see...

Page 571: ...stem on dev rdsk c0t6d0 mkfs F vxfs m dev rdsk c0t6d0 Create a VxFS file system on dev vgqa lvol1 with a Version 4 disk layout and largefiles capability mkfs F vxfs o version 4 largefiles dev vgqa lvol1 WARNINGS If you want to reuse a special device that was previously used by LVM you must first wipe out all the LVM information remaining on the disk Use pvremove 1M to remove the LVM information be...

Page 572: ...empty files which are then removed to provide empty slots for the fsck command see fsck 1M For an HFS file system the mklost found command is not normally needed since the mkfs command automatically creates the lost found directory when a new file system is created see mkfs 1M AUTHOR mklost found was developed by the University of California Berkeley SEE ALSO fsck 1M mkfs 1M 572 Hewlett Packard Co...

Page 573: ...e for example the device driver number minor The minor number specifies the device location which is typically but not always the unit drive and or line number The major and minor values can each be specified in hexadecimal octal or decimal using C language con ventions decimal no leading zero octal leading zero hexadecimal leading 0x The assignment of major and minor device numbers is specific to...

Page 574: ...isted with the lsdev command see lsdev 1M They are defined in the files in the direc tory usr conf master d This option is not valid for pseudo devices This option cannot be used with d d driver Match a device that is controlled by the specified device driver driver Device drivers can be listed with the lsdev command see lsdev 1M They are defined in the files in the directory usr conf master d Thi...

Page 575: ... The default access mode is 0 Direct connect The access mode meanings are access mode Port Operation 0 Direct connect 1 Dial out modem 2 Dial in modem c CCITT f Hardware flow control RTS CTS i Modem dialer Cannot be used with l l Line printer Cannot be used with i p port Multiplexer port number 0 for built in serial port 0 1 for SAS console ports The default port number is 0 r fifo trigger fifo tr...

Page 576: ...me r audioCtl_card f 0 audio_card all others audiooutput modformat mod_card The optional output mod and format mod values are given in the tables above Note the underscore _ before card in each special file name Also note that for card 0 each file will be linked to a simpler name without the trailing _card autox0 schgr Note that i cannot be used with either r or p i Ioctl create picker control spe...

Page 577: ...all others For SCentIf the only valid handshake value is 2 Automatic BUSY only handshaking consp1 r fifo trigger fifo trigger should have a value between 0 and 3 The following table shows the corresponding FIFO trigger level for a given fifo trigger value fifo trigger Receive FIFO Trigger Level 0 1 1 4 2 8 3 14 t Transparent mode normally used by diagnostics x xmit limit xmit limit should have a v...

Page 578: ...an1 lan2 lan3 Note that only one of e or i is allowed e Ethernet protocol i IEEE 802 3 protocol t Transparent mode normally used by diagnostics special file The default special file name depends on the e i and t options Option t Special File Name e no ethercard e yes diag ethercard i no lancard i yes diag lancard lantty0 e Exclusive access special file The default special file name depends on whet...

Page 579: ...access mode and whether the i and l options are used The term card below refers to the Instance number of the mux card access mode i l Special File Name no yes ccardpport_lp 2 no no ttydcardpport 1 no no culcardpport 0 yes no cuacardpport 0 no no ttycardpport pflop sflop r Raw create character not block special file special file The default special file name depends on whether the r option is used...

Page 580: ...r inch or tape density The recognized values for bpi are BEST D1600 D3480 D3480C D3590 D3590C D6250 D6250C D800 D8MM_8200 D8MM_8200C D8MM_8500 D8MM_8500C DDS1 DDS1C DDS2 DDS2C NOMOD QIC_1000 QIC_11 QIC_120 QIC_1350 QIC_150 QIC_2100 QIC_24 QIC_2GB QIC_525 QIC_5GB DLT_42500_24 DLT_42500_56 DLT_62500_64 DLT_81633_64 DLT_62500_64C DLT_81633_64C U_18 U_18C or a decimal number density code c code Compre...

Page 581: ...ion algorithm on drives that support more than one compression algorithm This option must be specified at the end of an option string See mt 7 for more details n No rewind on close o Console messages disabled t Transparent mode normally used by diagnostics u UC Berkeley style rewind close w Wait disable immediate reporting x index Use the index value to access the tape device driver property table...

Page 582: ...ist Use mkdir to create the directory see mkdir 1 EXAMPLES Make a special file named dev printer for the line printer device associated with instance number 2 mksf C printer I 2 dev printer Make a special file using the default naming convention for the tape device at hardware path 8 4 1 The driver specific options specify 1600 bits per inch and no rewind on close mksf C tape H 8 4 1 b D1600 n WAR...

Page 583: ...pdate etc passwd E This option is specified WITHOUT a user name to expire all user s passwords It goes through the protected password database and zeroes the successful change time of all users The result is all users will need to enter a new password at their next login May be combined with one of l or n options e This option is specified with a user name to expire the specified user s password I...

Page 584: ... value 86400 Set password expiration time interval days 0 expired Same as non trusted mode maximum time lftm value database u_life Set password life time interval days 0 infinite n a database u_succhg Modified by options e E v V maybe k n a database u_unsucchg acctexp value database u_acct_expire value 86400 now Set account expiration time interval days This interval is added to now to form the va...

Page 585: ...owed 0 infinite alock value database u_lock Set the administrator lock YES NO DFT n Can be specified with or without domain name i e n domain If n domain is specified modifies data for the NIS user The domain name must be fully qualified with a terminating period If domain name is not specified the local domain will be used It cannot be specified with the l option This option must be specified wit...

Page 586: ...days are not restricted modprpw m timeod Mo1700 2100 Fr1700 2100 Su0500 0900 joeblow WARNINGS This command is intended for SAM use only It may change with each release and can not be guaranteed to be backward compatible Several database fields interact with others Side effects may not be apparent until much later Special meanings may apply in the following cases an absent field a field without a v...

Page 587: ...fstab with that FStype are mounted If noauto is specified in an entry s option list this entry is skipped File systems are not necessarily mounted in the order listed in etc fstab e Verbose mode Write a message to the standard output indicating which file system is being mounted F FStype Specify FStype the file system type on which to operate See fstyp 1M If this option is not included on the comm...

Page 588: ...andard output indicating which file system is being unmounted V Echo the completed command line but perform no other action The command line is generated by incorporating the user specified options and other information derived from etc fstab This option allows the user to verify the command line f Forced unmount Not supported by all file system types See file system type specific man pages for mo...

Page 589: ...eFS file system a binary will be read and populated in the cache the first time it is loaded Subsequent access to the binary will be satisfied from the cache write around non shared Write modes for CacheFS The write around mode the default handles writes the same as NFS does that is writes are made to the back file system and the affected file is purged from the cache You can use the non shared mo...

Page 590: ...me on the back file system has changed If it has all information about the directory is purged from the cache and new data is retrieved from the back file system The default value is 30 seconds acdirmax n Specifies that cached attributes are held for no more than n seconds after directory update After n seconds all directory information is purged from the cache The default value is 30 seconds acti...

Page 591: ...e systems described in etc fstab All optional fields in etc fstab must be included and supported If F cdfs is specified all CDFS file systems in etc fstab are mounted If noauto is specified in an entry s option list this entry is skipped File systems are not necessarily mounted in the order listed in etc fstab e Verbose mode Write a message to standard output indicating which file system is being ...

Page 592: ...d V Echo the completed command line but performs no other action The command line is generated by incorporating the user specified options and other information derived from etc fstab This option allows the user to verify the command line DIAGNOSTICS umount complains if the special file is not mounted or if it is busy The file system is busy if it contains an open file or some logged in user s wor...

Page 593: ...ng options a Attempt to mount all file systems described in etc fstab All optional fields in etc fstab must be included and supported If F hfs is specified all HFS file systems in etc fstab are mounted If noauto is specified in an entry s option list this entry is skipped File systems are not necessarily mounted in the order listed in etc fstab e Verbose mode Write a message to standard output ind...

Page 594: ...ust be mounted in this way or errors occur when access times are updated whether or not any explicit write is attempted v Report the regular output with file system type and flags however directory and spe cial fields are reversed V Echo the completed command line but performs no other action The command line is generated by incorporating the user specified options and other information derived fr...

Page 595: ...wn origin AUTHOR mount was developed by HP AT T the University of California Berkeley and Sun Microsystems FILES etc fstab Static information about the file systems etc mnttab Mounted file system table SEE ALSO fsclean 1M mount 1M mkfs_hfs 1M fsadm_hfs 1M quotaon 1M mount 2 fstab 4 mnttab 4 fs_wrapper 5 quota 5 STANDARDS CONFORMANCE mount SVID3 umount SVID3 HP UX 11i Version 2 December 2007 Update...

Page 596: ...ttab The umount command unmounts mounted file systems Only a superuser can unmount file systems Options mount mount recognizes the following options a Attempt to mount all file systems described in etc fstab All optional fields in etc fstab must be included and supported If F lofs is specified all LOFS file systems in etc fstab are mounted If noauto is specified in an entry s option list this entr...

Page 597: ...e is generated by incorporating the user specified options and other information derived from etc fstab This option allows the user to verify the command line EXAMPLES Mount an LOFS file system mount usr tmp usr Mount another LOFS file system mount F lofs usr sbin tmp sbin WARNINGS LOFS file systems provide the user with numerous applications however they may be potentially confus ing LOFS file sy...

Page 598: ...f mount is invoked without any arguments it lists all of the mounted file systems from the file system mount table etc mnttab The umount command unmounts mounted file systems Only a superuser can unmount file systems Options mount mount recognizes the following options a Attempt to mount all file systems described in etc fstab All optional fields in etc fstab must be included and supported If F me...

Page 599: ...mFS file system type see fstyp 1M v Verbose mode Write a message to standard output indicating which file system is being unmounted V Echo the completed command line but performs no other action The command line is generated by incorporating the user specified options and other information derived from etc fstab This option allows the user to verify the command line Notes Quotas are not available ...

Page 600: ...m mount_memfs 1M mount_memfs 1M STANDARDS CONFORMANCE mount SVID3 umount SVID3 600 Hewlett Packard Company 3 HP UX 11i Version 2 December 2007 Update ...

Page 601: ...ad only The default is rw suid nosuid Setuid execution allowed or disallowed The default is suid remount If a file system is mounted read only remounts the file system read write bg fg If the first attempt fails retry in the background or in the foreground The default is fg quota Enables quota to check whether the user is over quota on this file system if the file system has quotas enabled on the ...

Page 602: ...ccess to local devices The default is devs acdirmax n Hold cached attributes for no more than n seconds after directory update The default value is 60 acdirmin n Hold cached attributes for at least n seconds after directory update The default value is 30 acregmax n Hold cached attributes for no more than n seconds after file modification The default value is 60 acregmin n Hold cached attributes fo...

Page 603: ...by 2 and the request is retransmitted When the number of retransmissions has reached the number specified in the retrans n option a file system mounted with the soft option returns an error on the request one mounted with the hard option prints a warning message and continues to retry the request Hard vs Soft File systems that are mounted read write or that contain executable files should always b...

Page 604: ...etc mnttab table of mounted file systems etc fstab list of default parameters for each file system SEE ALSO fsclean 1M mount 1M quotaon 1M mount 2 fstab 4 mnttab 4 fs_wrapper 5 quota 5 STANDARDS CONFORMANCE mount SVID3 umount SVID3 604 Hewlett Packard Company 4 HP UX 11i Version 2 December 2007 Update ...

Page 605: ...ms from the mounted file system table etc mnttab The umount command unmounts mounted file systems The vxumount command provides a force option to unmount mounted file systems Only the superuser can mount and umount file systems Other users can use mount to list mounted file systems Options mount recognizes the following options a Attempts to mount all file systems described in etc fstab All option...

Page 606: ...dule of the command Unlike some file system commands multiple o options do not accumulate only the last option is used The following specific_options are valid on a VxFS file system blkclear Clears all data extents before allocating them to a file requires synchronous zeroing on disk of certain newly allocated extents This prevents uninitialized data from being written to a file at the time of a s...

Page 607: ...FS product crw The cluster read write option allows asymmetric mounts that is you can mount a specified cluster file system in read only or read write mode independently of the other shared file sys tem nodes crw must be specified with the o cluster option Without specifying crw the default functionality of the cluster mount is retained the read write capability of cluster secondaries are the same...

Page 608: ...st cases replay fsck is sufficient to repair the file system A full fsck is required only in cases of structural dam age to the file system s metadata Select disable in environments where the underlying storage is redundant such as RAID 5 or mirrored disks If nodisable is selected when VxFS detects an I O error it takes steps sets the appropri ate error flags to contain the error but continues run...

Page 609: ...4 2048 4096 Control size of intent log I O buffers Default value is determined dynamically at mount time The performance of some storage devices specifically devices using the read modify write feature improves if the writes are issued in one or more multiples of a particular size When a file system is mounted with the logiosize option VxFS writes the intent log in at least size bytes or a multipl...

Page 610: ...es the performance of NFS servers QuickLog is available only through other VERITAS pro ducts See the VERITAS File System Release Notes for current product information quota Enable disk quotas valid only for rw type file systems VxFS maintains quota information in a private area of the file system If the file system is mounted with quotas enabled and the file system was previously mounted with quot...

Page 611: ... option does not operate on read only file systems or cluster file sys tems EXAMPLES List the file systems currently mounted mount Mount a VxFS file system dev dsk c1t2d0 at directory home mount F vxfs dev dsk c1t2d0 home Unmount the same file system umount dev dsk c1t2d0 To unmount a file system unmount the Storage Checkpoint first umount ckptdir umount fsdir Mount a Storage Checkpoint of a clust...

Page 612: ...Specify action on remote file systems only k Send a SIGKILL signal to processes that have files opened m Attempt to mount all the unmounted file systems This option will not perform the file system consistency check and repair n Perform the file system consistency check and repair on all unmounted file system This option will not mount the file systems DIAGNOSTICS Error and warning messages may or...

Page 613: ... FILES etc fstab Static information about the file systems etc mnttab Mounted file system table SEE ALSO fsck 1M fuser 1M mount 1M signal 2 fstab 4 mnttab 4 HP UX 11i Version 2 December 2007 Update 2 Hewlett Packard Company 613 ...

Page 614: ...is not specified The information logged to the file includes the date and time of the error the host name process ID and name of the function generating the error and the error message Note that different services can share a single log file since enough information is included to uniquely identify each error p This is an obsolete option tn Specify tracing level n where n can have one of the follo...

Page 615: ...routing down The interface is down disabled The interface is administratively disabled for multicast routing querier The local router is the querier of the subnet Please see mrouted 1M for metrics and thresh The command line options are ddebuglevel Sets the level for printing out the debug message The default is 0 only error and warning messages will be printed Debug level three prints most the me...

Page 616: ...he tunnelling mechanism allows mrouted to establish a virtual internet for the purpose of multicasting only which is independent of the physical internet and which may span multiple Autonomous Systems mrouted handles multicast routing only there may or may not be unicast routing software running on the same machine as mrouted With the use of tunnels it is not necessary for mrouted to have access t...

Page 617: ...g mode using the p option on the command line It is expected that a router would be configured in this manner for test purposes only The default mode is pruning enabled You may assign names to boundaries to make configuration easier with the name command The boundary option on phyint or tunnel commands can accept either a name or a boundary The metric option is the cost associated with sending a d...

Page 618: ...ult tunnel rate limit since this tunnel is over ethernets tunnel 192 168 5 4 192 168 55 101 metric 1 threshold 1 rate_limit 0 This is our tunnel to the outside world Careful with those boundaries Eugene tunnel 192 168 5 4 10 11 12 13 metric 1 threshold 32 boundary LOCAL boundary EE Signals mrouted responds to the following signals HUP restarts mrouted The configuration file is reread every time th...

Page 619: ...responsible for sending periodic group membership queries on the vif 0 and vif 1 subnets as indicated by the querier flags The list of boundaries indicate the scoped addresses on that interface A count of the number of incoming and outgoing packets is also shown at each interface Associated with each subnet from which a multicast datagram can originate is the address of the previous hop router unl...

Page 620: ...hboring routers for a particular source and group If there are no members of a multicast group on any downward link of the multicast tree for a subnet a prune message is sent to the upstream router They are indicated by a P after the vif number The Forwvifs field shows the interfaces along which datagrams belonging to the source group are forwarded A p indicates that no datagrams are being forward...

Page 621: ...il displays the last part of the mail log typically var adm syslog mail log By default it displays the last 20 lines of this log Options n Display last n lines of var adm syslog mail log instead of just 20 SEE ALSO sendmail 1M HP UX 11i Version 2 December 2007 Update 1 Hewlett Packard Company 621 ...

Page 622: ...a subdirectory of newdir The last pathname component of dir is used as the name for the moved directory mvdir refuses to move dir if the path specified by newdir would be a descendent directory of the path specified by dir Such cases are not allowed because cyclic sub trees would be created as in the case for example of mvdir x y x y z t which is prohibited mvdir does not allow directory to be mov...

Reviews: