Sun Microsystems Workstation 100U Скачать руководство пользователя страница 1

Содержание Workstation 100U

Страница 1: ...0 1109 01 Revision H of 12 March 1984 For Sun System Release 1 1 System Manager s Manual for the Sun Workstation Models 100U 150U Sun Microsystems Inc 2550 Garcia Avenue Mountain View California 94043...

Страница 2: ...ork Mai Router was originally written by Eric Allman formerly of Project Ingres University of California at Berkeley SENDMAIL In allation and Operation Guide was originally written by Eric Allman form...

Страница 3: ...150U Added information on subsystem set up system set up and operation and upgrading Revised hardware documentation and included Xylogics 450 disk controller Revised and updated installation procedure...

Страница 4: ...ties Reference manual for system maintenance and operation commands Contains information related to system bootstrapping operation and maintenance and describes all the server processes and daemons wh...

Страница 5: ...enance Guide gives unpacking and and set up directions ror new desktop and rackmount workstations and their subsystems walks you through UNIX installation procedures ror Sun systems and covers the bas...

Страница 6: ...overed Chapter 7 Upgrading Sydem Software gives a brief review of how to upgrade your sys tem to a new software release level Chapter 8 HtJrdware Configuration and Ezpan ion describes the 7 slot Multi...

Страница 7: ...al 800 0393 3COM 3C400 Multibus Ethernet Controller Reference Manual 800 0398 Sun Color Video Board User s Manual 800 0402 User s Guide for the Sun Workstation Mouse Subsystem 800 0415 Sun 1 4 Tape In...

Страница 8: ...indows 800 1117 System Internals Manual for the Sun Workstation Notations Used In This Guide References to commands and utilities Crom the U er Manual or the Sun UNIX Sydem and the S ltem Inter ace Ma...

Страница 9: ...gh examples which use certain formatting conventions In all these examples what the user types is shown in boldfaced text like this The system s response is shown in roman type like this Variable item...

Страница 10: ...nt does not cover hardware upgrades it is intended for use with new systems If you are upgrading your 100 150 fol low the hardware upgrading procedures given in Sun s Upgrade Installation Guide BEFORE...

Страница 11: ...Chapter 3 Subsystem Set Up 3 1 Chapter Installing UNIX for the First Time 4 1 Chapter 5 Installing UNIX on Systems without Tape Support 5 1 Chapter 8 System Set Up and Operation 8 1 Chapter 7 Upgradin...

Страница 12: ...1 2 2 1 Physical Environment 2 2 2 2 2 Power Drain Requirements 2 2 2 3 Receipt and Unpacking Instructions 2 3 2 3 1 150U lvfonitor Unpacking 2 4 2 3 2 150U Card Cage Enclosure Unpacking and Mounting...

Страница 13: ...18 4 3 10 3 Path 3 Non Standard Server Configuration 4 21 4 3 10 3 Configuration Worksheet for Path 3 4 21 4 3 10 3 Setup Walkthrough for Path 3 4 27 4 3 11 Booting the Full UNIX System 4 30 4 3 12 K...

Страница 14: ...tting up the Postmaster Alias 6 11 6 2 3 Testing your Mailer Configuration 6 12 6 2 4 Diagnosing Troubles with Mail Delivery 6 12 6 3 System Log Configuration 6 13 6 4 Setting Up a UUCP Connection 6 1...

Страница 15: ...8 11 8 7 Interphase 2180 Disk Controller 8 12 8 8 Nine Track Tape Controller 8 13 8 9 Quarter Inch Tape Controller 8 14 8 9 1 Tape Controller Multibus Memory 8 16 8 10 3COM Ethernet Controller Board 8...

Страница 16: ...t of a Generic Abstract Disk 4 15 Table 4 6 Increase in pub Size to Accommodate Online Manual Pages Demos or Games 4 15 Table 5 1 Tape Device Abbreviations 5 2 T ble 5 2 Disk Device Abbreviations 5 2...

Страница 17: ...cribed in this manual if you do you may void your warranty Please refer all servicing not described in this document to qualified service per sonnel If in doubt contact your authorized Sun service rep...

Страница 18: ...nment OpertJting Non OpertJting Ambient Temperature 10 0 C _ 40 0 C _40 0 C _ 65 0 C Humidity 5 90 5 90 Non condensing Altitude 10 000 feet 40 000 feet 1 2 2 Power Drain Requirements Model 100U deskto...

Страница 19: ...the rated capacity of the power supply can cause system malfunction which often shows up as glitches on the video screen and may damage the power supply 1 3 Receipt and Unpacking Instructions Note th...

Страница 20: ...ou can then lift the workstation out of the bottom shipping material remove the plastic wrapping and place the workstation on its working surface We recommend that you save the salvageable shipping ca...

Страница 21: ...sceiver and transceiver cable necessary to complete implementation of the Ethernet for a single workstation and an Ethernet Controller Reference Manual The coaxial cable necessary to implement a netwo...

Страница 22: ...cting output peri pherals such as printers and plotters and can drive these output lines at speeds up to 19 2 Kbaud Both ports provide the CTS RTS DTR DSR and DCD control lines required by some device...

Страница 23: ...d in this manual if you do you may void your warranty Please refer all servicing not described in this document to qualified service per sonnel If in doubt contact your authorized Sun service represen...

Страница 24: ...t The Sun Model 150U is manufactured for the following physical environment Table 2 1 150U Physical Environment Operating N on Operating Ambient Temperature 10 0 C 40 0 C _40 0 C 65 0 C Humidity 5 00...

Страница 25: ...wer supply can cause system malfunction which often shows up as glitches on the video screen and may damage the power supply 2 3 Receipt and Unpacking tnstructions The basic Model IibOU is shipped in...

Страница 26: ...es in the top of the pack ing material Remove these item 3 Lift out the rubber and styrofoam packing material the fit is fairly tight try rocking it out At this point you may find a mouse and mouse pa...

Страница 27: ...taining captive nuts and a set of bolts for bolting the unit into a standard 19 inch rack To mount the enclosure clip the clips into the holes in the vertical metal rail in the rack Then commandeer tw...

Страница 28: ...tion plug one end of the transceiver cable into the IS pin D connector on the transceiver and the other end into the ETHERNET 10 MBIT connector on the card cage enclosure backplane Please note that th...

Страница 29: ...ion a nd Ezpa n on chapter for wiring specifications The serial ports on the Sun Workstation were designed primarily for connecting output peri pherals such as printers and plotters and can drive thes...

Страница 30: ...ve must be re set For an Interphase controller the proper settings are on DIP Switch 2 switches 2 4 5 and 7 ON switches 1 3 and 6 OFF on DIP Switch 3 switch 3 ON all others OFF For a Xylogics 440 or 4...

Страница 31: ...the unit to the OFF position ALWAYS lock the heads by rotating this knob to the ON position before moving the drive even from table to table More detailed instructions are in the Fujitsu Microdisk Dri...

Страница 32: ...To get to them unscrew the two Phillips screws on the chrome cover at the rear of the drive and lift off the cover The four terminator packs are the chips just behind the 60 pin com mand cable connec...

Страница 33: ...ed S Before applying power to the subsystem you must unlock the spindle the actuator and the motor on the disk drive These are locked during shipment to protect the subsystem and must be locked any ti...

Страница 34: ...he 60 pin cable connected to DISK COM MAND on the Sun Workstation backpanel must be inserted into location OM2 in the disk drive The narrower cable connected to DISK DATA on the Sun Workstation back p...

Страница 35: ...the drive from the rack if mounted and lock the spindle If you can get to the top ot the PCB chassis the metal housing at the rear of the drive next to the motor without removing the drive from its mo...

Страница 36: ...tor VCM at the rear of the drive near the cables there is a small label which says LOCK FREE to the right of this label as you look at the back of the drive is a Phillips screw Loosen the screw and ro...

Страница 37: ...leaving the other sections OFF The drive address switch is a 4 section DIP switch located on the small circuit board near the left rear of the drive 3 Daisy chain the drives together using the comman...

Страница 38: ...ont of the tape drive It will suddenly go all the way in with a definite click The tape is now ready for use To protect the tape from being written on turn the arrow that is on the left of the window...

Страница 39: ...ed 5 Carefully cut and remove the non metallic band securing the Streaming Tape Unit s door 6 Remove the fillei blocks w hich are between the upper and lower PC board rear mounted hinges 7 Remove the...

Страница 40: ...able pawl fastener Con tinuv turning the paw fastener clockwise until the unit is secure against the bumper assem bly 18 The TAPEMASTER tape controller inside the Sun Workstation card cage connects to...

Страница 41: ...un s Upgrade Indal ation Guide before proceeding CAUTION If you are upgrading your system software rather than beginning for the first time read the Upgrading Syltem Software chapter BEFORE proceeding...

Страница 42: ...operating sys tem This is on the tape in dump format and is loaded in by the tltr utility 6 A tar format dump of the u r man online manual sources u r game games and u r demo demonstra tion programs...

Страница 43: ...he magnetic tape 3 Use the bootstrap program to load the diag utility from the magnetic tape 4 Format and label the disk with the diag utility 5 Use the bootstrap program to load the stand alone copy...

Страница 44: ...tic tape ar Archive quarter inch tape For example a common configuration would load from the Archive quarter inch magnetic tape cartridge onto a Fujitsu disk driven from a Xylogics 450 disk controller...

Страница 45: ...Sun s default network number of 192 9 200 Client s Hardware Ethernet Addres The hardware Ethernet address of each client is taken from the ID PROM on the Sun 2 CPU Board The address is a 6 byte hexade...

Страница 46: ...at hand 4 3 1 2 Procedure for Existing Systems If you have an existing network of older Suns or mixed machines that you do not intend to upgrade compatibility with a 1 1 network may need addressing P...

Страница 47: ...O Boot Now the standalone boot program is in control All programs that it loads in eventually return control to it When the bootstrap program loads another program it displays some numbers which are...

Страница 48: ...Addresses for Disk Controllers Controller Type Interphase SMD 2180 Xylogics 450 440 Addre hez 1st Controller 2nd Controller 40 ee40 48 ee48 Next ditJlI wants to know the unit number of the disk Which...

Страница 49: ...splays a list of its commands 4 3 4 1 Formatting the Disk Next you use diag 8 disk formatting function Begin by clearing any outstanding errors espe cially important if you are using an Interphase dis...

Страница 50: ...ng label to write a label on the disk which was formatted in the discussion above When you give the command to dioll it asks if you want to use the logical partition map that is built in to the progra...

Страница 51: ...the copy the copy program returns control to the bootstrap program Copy completed Boot 4 3 6 Booting the Mini UNIX System Next you tell the bootstrap program to boot the mini UNIX system from the disk...

Страница 52: ...fies seconds The system echoes the date set back to you 4 3 8 Loading the Root File System Next tell the mini UNIX system to extract the real root file system from the tape with the fol lowing sequenc...

Страница 53: ...storing the file system takes about six minutes with a 1 2 inch tape and fifteen with a 1 4 inch cartridge rm f a restoresymtable cd la dey MAKEDEV std di kO tapeO ptyO winO cd etc umount dev di kOa s...

Страница 54: ...nformation You will use a different etup path if you are configuring A standalone system A network server with equal sized client partitions or A network server with different sized client partitions...

Страница 55: ...e Maltl1 d Pages Demos or Games Manual Pages 2 1 MBytes Demos 3 75 MBytes Games 1 8 MBytes If you want to allocate equal amounts of disk space to each client read through the subsection Patla S Standa...

Страница 56: ...Information 1 network disk server 2 standalone 3 standalone with remote tape Enter the number for your environment I You have a standalone system is this correct yIn y Note that the etup program asks...

Страница 57: ...have these at hand before starting the dialogue The last phase of letup configuration requests inrormation about your tape subsystem Tape Information 1 1 4 SCSI tape st 2 1 2 magnetic tape mt 3 1 4 a...

Страница 58: ...oke the etup program by typing the etup command Setup begins by requesting global information setup Sun Microsystems Configuration System Global Information 1 network disk server 2 standalone 3 standa...

Страница 59: ...17M Partition size rounded to 17472K Enter the swap partition size nnnM or nnnK minimum is 4096K default is 6144K 8M Partition size rounded to 8288K Enter the number or clients on device xyO 1 3 2 Ent...

Страница 60: ...Enter the name of the server IIUD The server s hostname is sun Is this correct y n y Note that you use your network number and your clients hardware Ethernet addresses esta blished at the outset of t...

Страница 61: ...concrete with the letup program Basically the worksheet helps you deter mine your real storage resources the number of users you want to support how you want to allocate your rree disk space and cert...

Страница 62: ...er Name U er Space Paging Space Hodnumber Ethernet A ddre Server dad 7 70MBytes 16 3MBytes 32 Not Needed Client 1 robbie 30 0MBytes 15 0MBytes 33 8 0 20 31 41 59 Client 2 chip 20 0MBytes 10 0MBytes 34...

Страница 63: ...sks When you allocate partitioning remember to include the pub partition with the clients for disk units with pub partitions that etup s minimum values for client subpartitions are 4 MBytes file syste...

Страница 64: ...er ______ U er U er Name U er Space Paging Space Ho tnum6er Ethernet A ddre Server 7 7MBytes 16 3MBytes Client 1 Client 2 Client 3 Client 4 Client 5 Total Partition Total Partition 0 Disk 0 0 Disk 1 S...

Страница 65: ...ource disks When you allocate partitioning remembtt to include the puh partition with the clients ror disk units with pub partitions that letup S minimum values ror client subpartitions are 4 MBytes f...

Страница 66: ...er ______ U er U er Name U er Space Paging Space Ho tnumber Ethernet Addre Server 7 7MBytes 16 3MBytes Client 1 Client 2 Client 3 Client 4 Client 5 Total Partition Total Partition 0 Disk 0 0 Disk 1 Se...

Страница 67: ...up program and return to the shell this allows you to annihilate what you have done and start over if you have to After determining your environment letup gathers information about your disk configura...

Страница 68: ...23408K bytes free 1 public 17472K Do you want to add or edit a partition y n l y Enter the partition type user swap other user Enter the user partition size nnnM or nnnK minimum is 4096K detault is 61...

Страница 69: ...0 0 13 4 9 Client tycho 8 0 20 0 7 33 The clients and their addresses are 1 blaise 2 albert 3 isaac 4 johannes 5 immanuel 6 tycho 8 0 20 0 14 76 8 0 20 0 8 55 8 0 20 0 6 23 8 0 20 0 11 22 8 0 20 0 13...

Страница 70: ...tup will prompt you to change to the second cartridge about two minutes into its back end routine Insert the second tape and type RETURN to continue the routine it takes approximately 25 minutes to co...

Страница 71: ...w device drivers to the system since all the kernel object files required to build a new system are present For procedures see the Device Driver Tutorial in the Sun SlIltem Internal Manual 4 3 12 1 Ma...

Страница 72: ...in your system configuration file either exactly as they stand or if commentary indicates variables with the variables adjusted to fit your system Device description lines are given and explained Ofte...

Страница 73: ...ess accounting see 4ut 2 and 4cct 5 vmunix swap generic f Mandatory Speciry root and swap devices pty bk sysacct inet ether loop nd win128 dtop4 ms3 fPseudo tty s Needed ror network or window system f...

Страница 74: ...J priority 4 Systech terminal MUX see mti 4 ieO at mbO csr Ox88000 priority 3 1st Sun 2 Ethernet Controller ieO at mbO csr Ox8COOO flags 2 priority 3 2nd Sun 2 Ethernet Controller ecO at mbO csr OxeOO...

Страница 75: ...r xycO at mbO csr Oxee40 priority 2 disk xyO at xycO drive 0 device ropcO at mbO csr Oxee0800 priority 1 device zsO at mbO csr Oxeec800 flags 3 priority 2 cpu ports device ecO at mbO csr OxeOOOO prior...

Страница 76: ...ng the manuals demos and games directories or it you do not wish to include this material in your system with the Net work Configurotion section in the S ltem Set up ond Operotion chapter The subsecti...

Страница 77: ...another file of this type Contains a list of the files required to build the basic kernel file un Contains a description of the files required to build the specific Sun system You add the names of ne...

Страница 78: ...es ident nome Gives the system identifier a name for the machine or machines that run this kernel nome must be enclosed in double quotes if it contains both letters and numbers Also note that if nome...

Страница 79: ...ix root on xy 4 3 12 4 2 Device Description Lines The second class of line in the configuration file describes what devices your system has and what they are connected to for instance I have a Xylogic...

Страница 80: ...xycT or on a drive number tor example drive f This allows redundancy as a single system can be built which will boot on different hardware configurations 4 3 13 Loading the Manuals Demos and Games Di...

Страница 81: ...r xv man demo sames 4 3 14 The Next Step Unless you have to install UNIX on systems without tape drives procedure given in the follow ing chapter you have now completed the portion of installation in...

Страница 82: ...rade Indallation Guide before proceeding CAUTION If you are upgrading your system software rather than beginning for the first time read the Upgrading Syltem Software chapter BEFORE proceeding here Th...

Страница 83: ...ing that must be substi tuted at that point Italic characters are variables Two very important variables which you will see in the examples and have already seen if you have installed UNIX on your rem...

Страница 84: ...76 Internet addresses consist of two parts a network number and a host number For remote installation you need the target s full Internet address and the remote host s host number in hexadecimal Netw...

Страница 85: ...isk controller The lines should look like this user 0 0 dev d kOg 1 1 1 SOD Then enable the network disk server cd ldev MAKEDEVnd etc nd etc nd local Next make the u r disk into a public disk so that...

Страница 86: ...respond with y or Y Diag first asks you a series of questions about the disk you will be using The answers to these questions configure diag to work with that specific hardware The first thing diag w...

Страница 87: ...nalysis passes 5 Use five surface analysis passes for a completely new disk use one pass for a disk which has been formatted in the past and is known not to have any bad spots Formatting a disk takes...

Страница 88: ...number O boot Boot ec O hod_number O stand copy messages displaying sizes of copy program Standalone Copy From ec O ho _number O minif To di k O O l The load process takes about four minutes This proc...

Страница 89: ...eing used for the network number the remote host s host number is 1 and the target s host number is 23 By now you probably know your network number and have a host number ready to assign your target i...

Страница 90: ...Your System At this point you invoke the letup program to configure your system Setup is essentially a system configurator in two parts it consists of an interactive ront end which gathen the informa...

Страница 91: ...gram and return to the shell this allows you to annihilate what you have done and start over if you have to Next letup establishes your workstation s identity name and address Host Information Enter y...

Страница 92: ...will destroy any existing files under lusr and any client partitions if you are a server Do you want to begin configuration yIn y Updating etc hosts A few lines of configuration messages If your dist...

Страница 93: ...ation programs and r game direc tory games If these have been loaded on your remote host you can load all or part of these files if you want to Space may be a consideration r man consumes 2 1 MBytes r...

Страница 94: ...r configuration Note that since each machine on a network must have a unique hostname associated with each unique Internet address a machine with two boards must have a second identity it must be assi...

Страница 95: ...mory it may be desireable to disable the daemons or run them only on specific machines so that the space consumed by them can be made available for other purposes When running routed and rwhod are act...

Страница 96: ...o lines just before it usr etc route add 0 gateway 1 echo usr etc route add 0 gateway 1 dev console Then find the following three lines and comment them out insert a before each line or remove them if...

Страница 97: ...hine s hostname in your Ietclholt equ v file For example if my machine s hostname is gaia and I want to allow any one on host kepler to gain access to gaia I simply edit my Ietclholt equiv file as fol...

Страница 98: ...ew workstation s running 1 1 or You have a machine which cannot perform ARP an older VAX for example and you want it to talk to your 1 1 Sun s If neither of these is the case don t worry about it To m...

Страница 99: ...tra ifconfig line with each 1 1 machine s old 6 byte hexadecimal Ethernet address a You can obtain this address for a 3COM Ethernet Board by using the PROM Monitor to interrogate the Multibus memory s...

Страница 100: ...bolic links to the files in private so the files can still be referenced by their normal name The files and directories so affected are listed below lusr lib sendmail cf usr lib aliases Iusr libIalias...

Страница 101: ...pa If your workstation is on the Arpanet or shares an Ethernet with a machine on the Arpanet or with a machine on the Arpa Internet you should probably pick a name in the arpa domain and register it w...

Страница 102: ...bsidiary machines 6 2 2 1 Configuring for Mail Forwarding Next you must define each machine s mailer configuration The following commands accom plish this Remember that if your machine is a file serve...

Страница 103: ...ines that look like local UUCP connections not forwarded to mailhost CV Put the names of the local uucp sites on the end of the CV line or on additional CV lines For example CV rome prussia georgia Th...

Страница 104: ...mail to postmaster s at other network sites if you have problems with mail that comes from there The line will look like this Following alias is required by the new mail protocol RFC 822 11 Set it to...

Страница 105: ...ol uucp LOGFILE see the Uucp Implementation De cription in the Tutorial section of this manual Mail something to Postmaster on various machines and make sure that it comes to your usual mailbox so whe...

Страница 106: ...aver 192 9 1 4 june 192 9 1 5 eldridge Now all datagrams sent to Ioghost from wally beaver etc are sent to krypton There might also be other aliases on the same line of the Idclholt entry like lprhost...

Страница 107: ...ooljuucp C usr spool uucp D usr spoolluucp D ho tntJme usr spool uucp LOGFILE usr spool uucp SYSLOG directory for command C files directory for data D files directory for local D files log file of uuc...

Страница 108: ...th have autodial units and ports install uuep as follows If you have only a dialup your situation will be different procedures are described near the end of this section For more information read the...

Страница 109: ...VENTEL 1200 6728212 login EOT Iogin uucp ssword almama ucbarpa Any 20 ACUVENTEL 1200 6424351 login EOT Iogin uucp ssword netnut decvax Any ACUVENTEL 1200 6039941241 login EOT Iogin Ujedi ssword cannon...

Страница 110: ...u don t need to specify all the information called for in the step only the first two fields of L y are necessary and in practice only the first field site name is looked at A typical L y for a pas si...

Страница 111: ...nning the latest release of Sun software you have a B version If you aren t sure which version your contact site is running ask them before proceeding F Indicates that the fourth field is the name of...

Страница 112: ...t number with leading zeros to allow updating of the file in place Active is automatically updated as new newsgroups come in For information on how to create new newsgroups see the Creating New New gr...

Страница 113: ...sh cvt links sh usr lib news usr spool news 8 Clean out the old spool hierarchy hackster sh cvt clean sh usr spool news Several shell scripts and C programs are provided in the directory u r lib new c...

Страница 114: ...versee the transfer of the job to the remote machine If the destination machine is unreachable the job will remain queued until it is possi ble to transfer the files to the spooling queue on the remot...

Страница 115: ...spool vaxlpd lf usr adm lpd errs All of the above fields are explained on the printeap 5 manual page For more information on the entries for printers on serial lines and remote printers see the Line P...

Страница 116: ...ptJ wd The procedure for adding a new user is described in tJddu er 8 You should add accounts for the initial user community giving each a directory and a pass word and putting users who will wish to...

Страница 117: ...Dumping of the file systems should be done regularly since once the system is going it is easy to become complacent Complete and incremental dumps are easily done with etc dump see dump 8 Most people...

Страница 118: ...and swapping activity disk and cpu utilization Ideally there should be few blocked b jobs there should be little paging or swapping activity there should be available bandwidth on the disk devices mos...

Страница 119: ...rrent version of UNIX is rather primitive The resources consumed by any single process can be voluntarily limited by the mechanisms of etrlimit 2 Disk space usage can be monitored by duel No system en...

Страница 120: ...c hosts equiv etc secpretty etc ttytj etc ttytype usr lib crontab usr lib aliases usr adm acct usr adm me 3sa ges usr adm shutdownlog usr adm wtm p Revision H or 12 March 1984 how disk partitions are...

Страница 121: ...and uI lib so that you don t miss anything the first time around Table 7 1 Standard List of Files to Save when Upgrading profile Iogin I cshrc I rhosts Idev MAKEDEV local letc fstab letc gettytab etc...

Страница 122: ...ape drive use IdeyIrarO If your system doesn t ha ve a tape drive you ll have to use slightly different commands also given below which access tape drive elsewhere on the network We ll call the machin...

Страница 123: ...e Fir t Time except that you may skip the disk reformatting ph38e or if you are installing the rele38e on a machine without a tape drive in the chapter IndtJlling UNIX on S dem Without TtJpe Support T...

Страница 124: ...me file modes you may want to add other options as described in the previous section For a machine with a drive 11 cd 11 tar xlp dev rtapel For a machine without a drive 11 cd r h remote_hod dd if dev...

Страница 125: ...cord be ore opening up the Sun Workstation s enclosure To get to the Model 100U card cage first unscrew the six screws on the sides of the black cabinet Stand at the back of the Sun Workstation where...

Страница 126: ...nsion Option lor the Standalone Workstation 1 MByte Additional Memory 1 1 4 Tape Controller 2 1 MByte Memory Ezpan8ion PI 3 Sun I CPU PI 4 1 MByte Main Memory PI Ii One board SMD Di8k Controller 8 7 M...

Страница 127: ...e added to such a system but Sun ha only teded tho e configuration hown above Three principal con straints slots power and cooling affect the viability of a proposed configuration Also please note tha...

Страница 128: ...signals as defined in IEEE stan dard 796 for the PI bus Various Sun cards use the P2 bus in different ways which may not be compatible with other vendors use of this bus In particular Sun processor an...

Страница 129: ...color display controller consumes the most power and is best placed toward the center of the card cage In fact if there are unused slots in the cage one should be left open directly above the color co...

Страница 130: ...ive slot number slot 1 is the highest priority In a parallel card cage bus master cards need not be physically adjacent 8 2 2 150U Multibus P2 Connectors The Model 150U card cage has three separate P2...

Страница 131: ...CPU and Memory Boards If possible it should be placed toward the middle of the card cage to take advantage of the greater air circulation If there are unused slots in the cage leave one open to the im...

Страница 132: ...after every Multibus cycle This is done by jumpering location J701 which is the second jumper from the left along the bottom of the board This also will cause three additional wait states for each Mul...

Страница 133: ...with your Sun system or any similar null modem cable The null modem cable provided by Sun has pins 2 and 3 crossed 4 and 5 crossed and 6 and 20 crossed pins 1 Frame Ground and 7 Signal Ground are carr...

Страница 134: ...MBytes total memory one board may be added to the basic system To configure a Memory Board you need only select its starting memory location at 0 or 1 MByte within the on board memory address space Do...

Страница 135: ...rage module drives which are available from a number of manufacturers Sun Microsystems supports a family of such drives the Fujitsu M2312K and M2284 Microdisk Drives and the M2351 Mini Disk Drive If y...

Страница 136: ...onnectors on its top four 26 pin connec tors and one 60 pin connector In the Model 100U card cage the Interphase board must be below the CPU for proper handling of bus arbitration if there is a 1 2 ta...

Страница 137: ...E to F Sun recommends a maximum of one Interpnase disk controller board per system For the full specification and detailed description of the disk controller see the supplied docu ment SMD elBO Storag...

Страница 138: ...t and 256 KBytes of Multibus memory with parity The tape controller is not a bus master and boards which are Rev C or greater may actually be placed in a slot between bus masters in the ModeI100U as t...

Страница 139: ...uses eight consecutive bytes of Multibus I O space and this block of eight registers must be located on an eight byte boun dary DIP switch packages US3 and US6 decode address lines A1S through A3 Swi...

Страница 140: ...left Two adjacent switches on U50 should be dosed This places the 256K bytes of memory on the 0 128K 256K 384K 512K 640K or 768K boundaries All other switches on package U50 should be opened If all sw...

Страница 141: ...ting keyswitches 1 2 and 3 on the switch marked ADR19 to ON and the other switches to OFF The Sun Workstation expects to find the econd Ethernet board s memory at address Oxe2000 This address is selec...

Страница 142: ...pt Level 14 13 12 11 10 0 8 14 13 12 11 10 0 8 I IIr I 2 3 4 5 6 7 2 3 4 5 6 7 Belore Alter To set the address of the board to 2000 in Multibus I O space replace the shunt between pins 1 and 2 of JPOI...

Страница 143: ...On Self Test Procedures When system power is first turned on the monitor runs a quick self test procedure The test can have one of these results Critical errors are found The screen remains dark The e...

Страница 144: ...hts freeze keep the same pattern for more than a minute or the sequence restarts from the beginning there is a critical hardware problem with the workstation The appropriate thing to do in this case i...

Страница 145: ...e network Auto boot in progress Boot di k O O O Ymunix Load di k O O O boot Boot di k O O O vmunix Size 215040 24576 30916 bytes Sun UNIX 4 2 etc Di k is the device name of the best local or network d...

Страница 146: ...n tum reads in the real boot program Once the real boot program is running it finds and reads in the program you wanted to run This process is more or less obvious depending what device you are bootin...

Страница 147: ...on the specified server The correspon dence between this number and a real disk partition is defined in Ietclnd local on the server machine is the name of the file to boot are optional arguments A 3 3...

Страница 148: ...t corner of the cartridge is set to prevent writing on the tape ar zzzz error The monitor or boot program is trying to boot from an Archive tape and encountered an unexpected error The status bytes ca...

Страница 149: ...to boot after power on dev is the device type ctlr unit and Pdrt are the controller unit within controller and disk partition number Name is the name of the file to boot from if any option are argu me...

Страница 150: ...e ee is the hexadecimal address of the interrupt vector used you can look it up on a Motorola 68010 or 68000 reference card or CPU manual to see what kind of interrupt has occurred otJtJtJotJ is the a...

Страница 151: ...rror See Bus Error and Parity The preceding access was to a word in memory with a parity error in its lower byte Misplaced label on head n The monitor or boot program is trying to boot from a disk It...

Страница 152: ...ot find it You can retry your boot command using instead of name to get a list of the names that exist in that directory null path The current program possibly the boot program has tried to open a fil...

Страница 153: ...nter a space and type RETURN to get back to command mode Self Test completed successfully The monitor has completed its power on self test without finding any hardware prob lems Self Test found a prob...

Страница 154: ...See Bus Error and Parity The preceding access was to a word in memory with a parity error in its upper byte ui i uoo uaabaud ubbbaud uuaaaaaa uecho The monitor is describing its console and serial po...

Страница 155: ...ress where the data was read and or written For memory errors this is a physieal memory address for other errors the interpretation of this field depends on what subsystem was being tested Rdata is th...

Страница 156: ...raps often require the use of mkproto 8 New devices are made in the dev directory when device drivers are added tp the system by using the m Jkedev 8 and mknod S commands If you have sOurce you will u...

Страница 157: ...the system crashes clock daemon file system directory consistency check General purpose stand alone utility package collect system diagnostic messages to form error log incremental file system dump du...

Страница 158: ...dump of the operating system sendmail sendmail 8 send mail over the internet sendnews sendnews 8 send news articles via mail shutdown shutdown 8 close down the system at a given time sticky sticky 8...

Страница 159: ...ing is done To start accounting it should be created with length o On the other hand ir the file is left undisturbed it will grow without bound so periodically any information desired should be collec...

Страница 160: ...ber bo8e Member is the member name whose value is desired and b08e is an odb register name which contains the base address of the structure For example to get the p pid field of the proc structure you...

Страница 161: ...s about badly lormatted requests The C compiler complains il you relerence a structure member that does not exist It also complains about III belore array names these complaints may be ignored usr lib...

Страница 162: ...meanings 1 Login name esmerelda 2 Encrypted password Set the user s password with posswd l 3 User ID 4 Group ID 5 This field is called the GeOS field from earlier implementation of UNIX and is tradit...

Страница 163: ...odified are in fact identi cal to the swap space copies It also checks lor non overlap of the swap space and that the core map entries correspond to the page tables The state of the free list is also...

Страница 164: ...fault vmunix With the d flag a super user may delete an entry for the host called h08tname The a flag is given to create an ARP entry for the host called h08tname with the Ethernet address ether_addr...

Страница 165: ...de catman recreates the uar Db what database If there is one parameter not starting with a it is take to be a list of manual sections to look in For example eatman 123 only updates manual sections 1 2...

Страница 166: ...he files to owner The owner may be either a decimal UID or a login name found in the password file Only the super user can change owner in order to simplify as yet unimplemented accounting pro cedures...

Страница 167: ...comes a1lpcatable The primary purpose 01 this routine is to remove a file which lor some reason appears in no direc tQ II it is used to zap an i node which does appear in a directory care should be ta...

Страница 168: ...associated terminal has the owner execute bit turned on by a biff y the offset is used as a seek offset into the appropriate mailbox file and the first 7 lines or 560 characters or the message are pri...

Страница 169: ...you get any other error me88ages rrom config you should fix the probleJD8 in your configuration file and try again If you try to compile a system that had configuration errors you will probably not s...

Страница 170: ...cify something of the form swap on xyO and xl 1 and xl 1g If no swap specification is given config assumes swapping should be done on the b partition of the root device Swapping areas may be almost an...

Страница 171: ...ample xycO for a Xylogics controller or arO for an Archive quarter inch tape controller Con_dev is what the device you are specifying is connected to For example disk xyl is con nected to controller x...

Страница 172: ...device mapping file ror Sun systems SEE ALSO BUGS The SYNOPSIS portion or each device entry in the section 4 pages or the System Interface Manual In the System Manager s Manual Kernel Configuration i...

Страница 173: ...ered an error trying to write to the paging device or an error in read ing critical information from a disk drive You should fix your disk if it is broken or unreliable timeout table overflow This rea...

Страница 174: ...nt system in a specified directory ror later perusal See 8lJvecore 8 ror details To analyze a dump you should begin by running lJd6 lS with the k flag on the core dump Normally the command intstack 4...

Страница 175: ...are made available to the command as standard input Here are a few example lines from usr lib crontab to give you a better sense of the file s format o0 calendar 150 usr etc sa 8 dev null 0 30 usr etc...

Страница 176: ...ame of the entry are reported Derault file systems vary with installation SEE ALSO sck 8 icheck 8 s 5 clri 8 ncheck 8 DIAGNOSTICS BUGS When a file turns up for which the link count and the number of d...

Страница 177: ...ecognizes are clear dlaS Sends a restore command to a disk This is needed to manually reset disk errors Re initializes the diag program itself goes back to phase one of the inititialization process de...

Страница 178: ...Toggles an option to turn timing on and off When timing is on diag reports on how long things take diag is less verbose in this state so it doesn t waste time displaying messages Reads and displays th...

Страница 179: ...new messages since the last time it was run and places these on the standard output This is typically used with cron 8 to produce the error log usr adm messages by running the command etc dmesg usr ad...

Страница 180: ...s 1600 W Dump tells the operator what file systems need to be dumped This information is gleaned from the files etc dumpdtJtea and etc lettJb The W option causes dump to print out ror each file system...

Страница 181: ...eekly dumps a set of 5 tapes per dumped file system is used also on a cyclical basis Each month a level 0 dump is taken on a set of fresh tapes that is saved forever dev rrplg dev rmtS letc dumpdates...

Страница 182: ...block and cylinder group information for the file system or special d vice specified The listing is very long and detailed This command is useful mostly lor finding 0 certain file system information...

Страница 183: ...you want to know why e da1 B I give the number of days to use for a default expiration date II not given an installation dependent default often 2 weeks is used Note that you must use a space between...

Страница 184: ...ON FASTBOOT 8 Fasthoot and fasthalt are shell scripts which reboot and halt the system without checking the file systems This is done by creating a file fasthoot then invoking the rehoot program The s...

Страница 185: ...l return status and an automatic reboot will then fail For each corrected inconsistency one or more lines will be printed identifying the file system on which the correction will take place and the na...

Страница 186: ...e with the operator s concurrence reconnected by placing them in the lost tound directory The name assigned is the inode number The only restriction is that the directory lost tound must preexist in t...

Страница 187: ...tory Is do nothing specify password specify data connection port terminate session retrieve a file specify rename from file name specify rename to file name store a file specify data transfer structur...

Страница 188: ...tory owned by the super user and unwritable by anyone The files PtJ88Wd 5 and group 5 must be present tor the Is command to work properly These files should be mode 444 ttp pub Make this directory mod...

Страница 189: ...n the file hOBtB t d Gettable operates by opening a TCP connection to the port indicated in the service specification for nicname A request is then made for ALL names and the resultant information is...

Страница 190: ...fying the system from gethostname 2 and the login message Then the user s name is read a character at a time If a null character is received it is assumed to be the result of the user pushing the brea...

Страница 191: ...and alone not under control of the UNIX operating system With the PROM resident monitor in control of the system type the command b stand sxteat and the monitor boots the video test program into memor...

Страница 192: ...out sandbagged inrormation to the disks and then stops the processor OPTIONS D q y SEE ALSO Prevents the sync berore stopping Do a quick hait no gracerul shutdown is attempted Needed ir you are tryin...

Страница 193: ...ines in mapping network names to numbers The gGtewG1Is file is used by the routing daemon in identifying passive Internet gateways see routed 8C for an explanation If any of the flies lOCGlho8t8 locGl...

Страница 194: ...ed Notice also that the words in the super block which indicate the size of the free list and of the i list are believed It the super block has been curdled these words will have to be patched The I o...

Страница 195: ...r the hostname of a given machine present in the hostname database hosts S or the complete Internet address consisting of your system s network number and the machine s unique host number A typical In...

Страница 196: ...erating system With the PROM resident monitor in control of the system type the command b atacd lmemte t and the monitor boois the memory test program into memory Imemte8t is completely self explanato...

Страница 197: ...look at the socket where datagraOl8 arrive again only after this process completes The paradigms for such proceses are either to read off the incoming datagram and then fork and exit or to process the...

Страница 198: ...user and execute the Shell Ultimately the Shell will terminate because of an end of file either typed explicitly or generated as a result of hanging up The main path of init which has been waiting fo...

Страница 199: ...ed when the system was shutting down This is usually caused by a process which is stuck in a device driver due to a persistent device error condition dev console dev tty etc utmp usr adm wtmp etc ttys...

Страница 200: ...a transrer completions and number o wijrds transferred are eounted or terminals collectively the number o input and output charac teJ18 are counted Also each sixtieth o a second the state or each disk...

Страница 201: ...the contents of the profile buffers into a gmon out file r Reset all the profile buffers If the p flag is also specified the gmon out file is generated before the buffers are reset If neither b nor h...

Страница 202: ...ven a list of the recognized commands abort all I printer Terminate an active spooling daemon on the local host immediately and then disable printing preventing new daemons from being started by lpr f...

Страница 203: ...directories lock file for queue control SEE ALSO Ipd 8 Ipr l Ipq l Iprm l printcap 5 DIAGNOSTICS 48 1Ambiguous command Invalid command Privileged command abreviation matches more than one command no m...

Страница 204: ...bout the daemon process ror lpr 1 lpq 1 and lprm 1 Arter the daemon ha 8 successfully set the lock it scans the directory for files beginning with cf Lines in each cl file speciry files to be printed...

Страница 205: ...skip the file to be printed Lpd uses jlock 2 to provide exclusive access to the lock file and to prevent multiple deamons from becoming active simultaneously If the daemon should be killed or die une...

Страница 206: ...uments create assorted collections or dev ices and are listed below td Create the standard devices for the system for example dev console dev tty local Create th08e devices specific to the local site...

Страница 207: ...ower case letters and and The salt characters are repeated as the first two characters ot the output The remaining 11 output char acters are chosen from the same set as the salt and constitute the Dut...

Страница 208: ...file system It must be a power of two currently selected from 4096 or 8192 FraSllse gives the fragment size or files on the file system The Irasslze represents the smallest amount of disk space that...

Страница 209: ...f the special file is block type disks tape or c if it is character type other devices The last two arguments are numbers specifying the mojor device type and the minor device for example unit drive o...

Страница 210: ...ify set user id mode or not The third is or for the set group id mode The rest or the mode is a three digit octal number giv ing the owner group and other read write execute permissions see chmod I Tw...

Страница 211: ...unted read only or errors will occur when access times are updated whether or not any explicit write is attempted MOUNT OPTIONS I Mount the specified file system read only a Attempt to mount or unmoun...

Страница 212: ...system may be specified by the optional jilesY8tem argument The report is in no Ufsetul order and probably should be sorted OPTIONS I numbers Report only th06e files whose i number8 follow a Print th...

Страница 213: ...est The Ethernet address is given 38 siz hex bytes separated by colons e g 8 0 20 1 1 a3 At least one previous uler command must have been issued for the client The mazpack8 option may be given to set...

Страница 214: ...ND 8C FILES etc nd local SEE ALSO nd 4p BUGS NTENANCECOMMANDS No sanity checking or disk partitions is done Sun Release 1 1 Last change 11 January 1984 ND 8C 59...

Страница 215: ...ayed symbolically according to the data bases IetclhOltl and Ietclnetwor I respectively If a symbolic name for an address is unknown or if the n option is specified the address is printed in the Inter...

Страница 216: ...MMANDS NETSTAT 8 SEE ALSO iostat 8 vmstat 8 hosts 5 networks 5 protocols 5 services 5 trpt 8C BUGS The notion ot errors is ill defined Collisions mean something else tor the IMP Sun Releastr 1 1 Last...

Страница 217: ...SYNOPSIS newalla_ DESCRIPTION NEWALIASES 8 Newaliases rebuilds the random access data base for the mail aliases file usr lib aliases It must be run each time usr lib aliases is changed in order for th...

Страница 218: ...to mk Options which may be used to override default parameters passed to mk s are 8 alze The size of the file system in sectors b bloek alze The block size of the file system in bytes I Iral alze The...

Страница 219: ...LES BUGS 64 Do accounting tor the named printer Normally accounting is done tor the detault printer site dependent or the value ot the PRINTER environment variable is used pprice Use tht value price t...

Страница 220: ...or and minor device number ot file system in which this inode resides Reterence count ot shared locks on the inode CNT DEV RDC WRC Reference count of exclusive locks on the inode this may be 1 it tor...

Страница 221: ...ised ot anomalous behavior with vtJdvise 2 0040000 process is in a sleep which will timeout 0080000 unused 0100000 using old signal mechanism 0200000 process is owed a profiling tick 0400000 process i...

Страница 222: ...ISC Line discipline blank is old tty OTTYDISC or new tty for NTTYDISC or net Cor NETLDISC see bk 4 u print inCormation about a user process the next argument is its address as given by p8 I The procel...

Страница 223: ...ource of tables SEE ALSO BUGS 68 ps I stat 2 fs 5 K Thompson UNIX Implementation It would be very useful if the system recorded maximum occupancy on the tables reported by T even more useful if these...

Страница 224: ...OPTIONS FILES D Run the pipeline neheek fllesystem Isort OD I quot D ftlesystem to produce a list of all files and their owners e Print three co umnfj giving file size in blocks number of files of th...

Страница 225: ...air succeeds then the second part of re is run The second part or re which is run after a auto reboot succeeds and also if re is invoked when a single user shell terminates see init 8 starts all the d...

Страница 226: ...Typically rdate can be inserted as part of your Ietelre loeal startup script SEEALSP timed 8C BUGS Could be modified to accept a list of hostnames and try each until a valid date returned Better yet w...

Страница 227: ...n avoids the sync It can be used if a disk or the processor is on fire q reboots quickly and ungracefully without first shutting down running processes Power taU and crash recovery Normally the system...

Страница 228: ...rmines the article title sender and news group and gives the body to inews with the right arguments for insertion If newBgroup is omitted the to line or the letter is used It Bender is omitted the sen...

Страница 229: ...incre35e their nice value within the range 0 to PRIO_MIN 20 This prevents overriding administrative fiats The super user may alter the priority or any process and set the priority to any value in the...

Страница 230: ...the named file matches a directory whose contents had been written onto the tape and the h key is not specified the directory is recursively extracted The owner modification time and mode are restored...

Страница 231: ...fies the blocking factor for the restore The blocking factor is taken from the next argument on the command line This corresponds to the b key in dump 8 d Turns on debugging output v This is the verbo...

Страница 232: ...e a tape that does not begin its coverage where the previous incremental tape left off or that has too high an incremental level has been loaded Tape read error while restoring filename Tape read erro...

Страница 233: ...R execd then validates the user 38 is done at login time and if the authentication was suc cessful changes to the user s home directory and establishes the user and group protec tions of the user If...

Страница 234: ...BUGS Indicating Login incorrect as opposed to Password incorrect is a security breach which allows people to probe a system for users with null passwords A facility to allow all data exchanges to be...

Страница 235: ...ess then proceeds with the authentication process as described in rshd 8C but ir automatic authentication rails it reprompts the user to login as one finds on a standard terminal line The parent or th...

Страница 236: ...ed via uucp IC collapsing From lines in the form gen erated by binmtJil l into a single line of the form return path sender and passing the processed mail on to 8enclmtJil 8 RmtJil is explicitly desig...

Страница 237: ...e Close the currently open device The device specified is ignored L whenee offset W count Perform an leeek 2 operation using the specified parameters The response value is that returned from the lseek...

Страница 238: ...C MAINTENANCE COMMANDS RMT 8C SEE ALSO rcmd 3N rexec 3N mtio 4 dump 8 restore 8 BUGS People tempted to use this Cor a remote file access protocol are discouraged Sun Release 1 1 Last change 4 March 19...

Страница 239: ...c should be greater than O All symbolic names specified for a deBtintJtion or gtJtewtJlI are looked up first in the host name database hOBtB 5 If this lookup fails the name is then looked for in the n...

Страница 240: ...n the existing routing table entry That is updated inCormation is being received from the very internetwork router through which packets for the destination are being routed The existing entry in the...

Страница 241: ...Ietclgateways is comprised of a series of lines each in the following format net Iho t name1 lateway name metric value pas lve Iactive The net or ho t keyword indicates if the route is to a network o...

Страница 242: ...on the initial socket This user name is interpreted as the user identity on the eHent s machine 7 A null terminated command to be passed to a shell is retrieved on the initial socket The length or the...

Страница 243: ...entry for the user name existed Permla lon denied The authentication procedure described above failed Can t make pipe U The pipe needed for tbe tderr wasn t created Tr again II A fork by the server fa...

Страница 244: ...int we_idle wd_we 1024 sizeof struct whoent J All fields are converted to network byte order prior to transmission The load averages are as cal culated by the w l program and represent load averages o...

Страница 245: ...ANCE COMMANDS RWHOD 8C SEE ALSO rwho IC ruptime IC BUGS Should relay status information between networks People often interpret the server dying as a machine going down 90 Last change 28 October 1983...

Страница 246: ...options fields labelled tio tor total I O operations k sec tor cpu storage integral kilo core seconds au and s for user and system cpu time alone both in minutes will sometimes appear OPTIONS a Place...

Страница 247: ...ch command used n times or fewer Await a reply from the terminal if it begins with y add the command to the ca tegory junk This is used to strip out garbage usr atlm acct raw accounting SEE ALSO ac S...

Страница 248: ...h grows every time Bavecore is run in that directory Before Bavecore writes out a core image it reads a number from the file dirname minfree If there less free space on the filesystem which contains d...

Страница 249: ...llname tname hN D 0 value 94 Go into ARPANET mode All input lines must end with a CR LF and all messages will be generated with a CR LF at the end Also the From and Sender fields are examined for the...

Страница 250: ...delivery and q tor queue only that is actual delivery is done the next time the queue is run Try to automatically rebuild the alias database if necessary Set error processing to mode z Valid modes are...

Страница 251: ...ould not be sent immediately but was queued If invoked as newaliases sendmail rebuilds the alias database If invoked as mailq sendmail prints the contents of the mail queue E cept for usr lib sendmail...

Страница 252: ...stintJtion An N is prepended to each line for decoding by uurec l OPTIONS 0 handle old format articles a used for sending articles via the ARPANET It maps the article s path from UUCphoBt zZZ to zzzQt...

Страница 253: ...in less than 5 minutes logins are disabled by creating etc nologin and writing a messa ge there If this file exists when a user attempts to log in login l prints its contents and exits The file is rem...

Страница 254: ...le be deleted Directory entries can be removed so long as one link remains Sharable files are made by the z option or Id I To replace a sticky file that has been used do 1 Clear the sticky bit with ch...

Страница 255: ...wap devices available 80 that the paging and swapping activity is inter leaved acroas several d evices Normally the a argument is given causing all devices marked as sw swap devices in etc fltab to be...

Страница 256: ...the 8ync system primitive Sync can be called to insure all disk writes have been completed before the processor is halted in a way not suitably done by rehoot 8 or halt 8 See 8ync 2 for details on th...

Страница 257: ...k failures These could be logged in a separate file so that critical conditions could be easily scanned these represent error conditions such as soft disk failures etc such messages contain critical i...

Страница 258: ...minate signal It logs that it is going down and then waits approximately 10 seconds for any additional messages to come in There are some special messages that cause control functions N sets the defau...

Страница 259: ...nal implementing the TELNET protocol and passing characters between the client and login process When a TELNET session is started up telnetd sends a TELNET option to the client side indicat ing a will...

Страница 260: ...rates at the port indicated in the tftp service description see services 5 and is invoked each time a datagram reaches this port by the internet server inetd 8C Due to the lack or authentication inror...

Страница 261: ...ol The time server operates at the port indicated in the time service description see 8ervice8 S and is invoked by inetd 8C each time there is a connection to the time server SEE ALSO BUGS 106 service...

Страница 262: ...he values of the source and destination addresses for each packet recorded The recommended use of Irpl is as follows Isolate the problem and enable debugging on the socket s involved in the connection...

Страница 263: ...nder group The intent is to prevent any single file from using up all the blocks in a single cylinder group thus degrading access times for all files subsequently allocated in that cylinder group The...

Страница 264: ...is a program that executes the Bync 2 primitive every 30 seconds This insures that the file system is fairly up to date in case of a crash This command should not be executed directly but should be ex...

Страница 265: ...38 the file prefix Up to 10 p arguments may be specified A p without any pre rollowing deletes all files older than the specified time Dtime Files whose age is more than time hours are deleted if the...

Страница 266: ...via mail SYNOPSIS uurec DESCRIPTION UUREC 8 uurec reads news articles on the standard input sent by 8endnew8 8 decodes them and gives them to inew8 l tor insertion SEE ALSp inews l readnews l recnews...

Страница 267: ...the password file is already being edited then you will be told to try again later The vi editor will be used unless the environment variable EDITOR indi cates an alternate editor Vipw performs a numb...

Страница 268: ...umber of processes in each of the three following states r in rUD queue b blocked for resources i o paging etc w runnable or short sleeper 20 secs but swapped memory Reports on usage or virtual and re...

Страница 269: ...umber of pages of virtual memory involved in each kind of fork Display the contents of the Bum structure giving the total number of several kinds or paging related events which have occurred since boo...

Страница 270: ...ilding Profiled Kernels 4 1 7 Configuring Systems without Source 5 1 8 Adding New Device Drivers 5 2 Configuration File Syntax 6 2 1 Global Configuration Parameters 6 2 2 Kernel Image Parameters 7 2 3...

Страница 271: ...D I Compile Time Rules 21 D 2 Run time Calculations 22 D 3 System Size Limitations 22 ii...

Страница 272: ...he second describes the syn tax of the configuration file Appendix A gives the grammar for config files Appendix B describes defaulting rules used dur ing the bootstrap process Appendix C give sample...

Страница 273: ...ou can edit to suit your particular system configuration The configuration file must have the same name as the directory in which the configured kernel is to be built Further config assumes this direc...

Страница 274: ...r kernel it will terminate with a message of the form Don t forget to run make depend This is a reminder that you should change your working directory to the configuration directory for the kernel jus...

Страница 275: ...c In these cases it is possible for ker nels to share relocatable object modules which are not configuration depende lt most of the modules in the directory 8Y 8Y are of this sort To share object modu...

Страница 276: ...to the kernel The following lines from the GENERIC config file must be in every config file for object only distributions machine sun cpu SUN2 options INET pseudo device inet pseudo device ether pseu...

Страница 277: ...at the top of the generic makefile A line of the form options FUNNY HAHA generates global define s DFUNNY DHAHA in the resul tant makefile An option may be given a value by following its name with the...

Страница 278: ...d config will use builtin rules to select default unit numbers and file system partitions The defaulting rules are dependent on the overall system configuration For example the swap area need not be s...

Страница 279: ...number indicated on the front of something like a disk the logical unit number is used to refer to the UNIX device not the physical unit number The device info clause specifies how the hardware is co...

Страница 280: ...d hardware To include any of these pieces a pseudo device specification must be used A specification for a pseudo device takes the form pseudo device device name howmany Examples of pseudo devices are...

Страница 281: ...configuration specifications ConfiLspec machine ID Icpu ID Ioptions Opt_list I ident ID ISystem_spec Itimezone NUMBER dst NUMBER Itimezone 1FPNUMBER dst NUMBER I maxusers NUMBER system configuration...

Страница 282: ...BER Approximately the C language specification for an integer number That is a leading Ox indicates a hexadecimal value a leading 0 indicates an octal value otherwise the number is expected to be a de...

Страница 283: ...fication is incomplete e g hpO Type Partition root a swap b args b dumps b B I Multiple Swap Paging Areas When multiple swap partitions are specified the system treats the first specified as a primary...

Страница 284: ...y Number and dst are variable 1 Mandatory Number may vary I Mandatory INET means include Internet code IOptional include only with pseudo device sysacct Controls inclusion or code to do process accoun...

Страница 285: ...t mbO csr Oxe8000 priority 3 bwtwoO at mbO csr Ox700000 priority 3 bwoneO at mbO csr OxcOOOO priority 3 vpO at mbO csr Ox400 priority 2 vpcO at mbO csr Ox480 priority 2 vpcO at mbO csr Ox500 priority...

Страница 286: ...device pseudo device pseudo device pseudo device controller device device device device device 7 January 1984 sun SUN2 ND100 8 dst 2 INET vmunix root on nd pty inet ether loop nd win32 dtopl msl kbl...

Страница 287: ...ontroller device device device device device device device sun SUN2 NDI20 8 dst 2 INET vmunIX root on nd pty inet ether loop nd win32 dtopr msl khl mhO at nexus ropcO at mhO csr Oxee0800 priority 1 sk...

Страница 288: ...1984 sun SUN2 SDST120 8 dst 2 INET vmunix root on sd pty inet ether loop win32 dtopl ms1 kbl mbO at nexus scO at mbO csr Ox80000 priority 2 sdO at scO drive 0 flags 0 stO at scO drive 32 flags 1 ropcO...

Страница 289: ...ce pseudo device controller controller disk device device device device device sun SUN2 XYIOO 8 dst 2 INET vmunlX root on xy pty inet ether loop win32 dtopl msl kbl mbO at nexus xycO at mbO csr Oxee40...

Страница 290: ...ce controller controller disk device device device device device device 7 January 1984 sun SUN2 XYAR100 8 dst 2 INET vmunlX root on xy pty inet ether loop win32 dtopl msl kbl mbO at nexus xycO at mbO...

Страница 291: ...ce sun SUN2 XYMTI50 8 dst 8 INET SYSACCT vmunix root on xy pty bk sysacct inet ether loop nd win32 dtopl msl khl mbO at nexus xycO at mbO csr Oxee40 priority 2 xyO at xycO drive 0 xy1 at xycO drive 1...

Страница 292: ...by users as well as directory files being read or written by the system and files associated with bound sockets in the UNIX ipc domain This is defined as NPROC 16 MAXUSERS 32 nfUe The number of file t...

Страница 293: ...pages of file system bufIef5 is allocated The number of buffers to be allocated can be forced to a specific value by patching the kernel variable nbufwith adb adb w Ivmunix nbuf W Ot32 nbuf 0 20 q set...

Страница 294: ...3 Free Block Checking 5 2 4 Checking the Inode State 5 2 5 Inode Links 5 2 6 Inode Data Size 6 2 7 Checking the Data Associated with an Inode 6 2 8 File System Connectivity 7 A Fsck Error Conditions...

Страница 295: ......

Страница 296: ...83 this section gives a brief overview 1 1 Superblock A file system is described by its uper block The super block is built when the file system is created see new 8 and never changes The super block...

Страница 297: ...ts for files a block map describing available blocks in the cylinder group and summary information describing the usage of data blocks within the cylinder group A fixed number of inodes is allocated f...

Страница 298: ...e system such as a write the data to be written is copied into an internal in core buffer in the kernel Normally the disk update is handled asynchronously the user process is allowed to proceed even t...

Страница 299: ...ction A quiescentt file system may be checked for structural integrity by performing consistency checks on the redundant data intrinsic to a file system The redundant data is either read from the file...

Страница 300: ...ked for inconsistencies involving format and type link count duplicate blocks bad blocks and inode size Each inode contains a mode word This mode word describes the type and state of the inode Inodes...

Страница 301: ...iated with the inode The consistency of the byte size field is roughly checked by comput ing from the size field the maximum number of blocks that should be associated with the inode and comparing tha...

Страница 302: ...ompson78 28 July 1983 References Dolotta T A and Olsson S B eds UNIX U er Manual Edition 1 1 January 1978 Joy W Cooper E Fabry R Lemer S McKusick M and Mosher D Sydem Interlace Overview University of...

Страница 303: ...e organized by the P uJle of the I ek program in which they can occur The error conditions that may occur in more than one Phase will be discussed in initialization A 2 Initialization Before a file sy...

Страница 304: ...OK prompt are YES Ignore this error condition NO ignore this file system and continues checking the next file system given One of the following messages will appear MAGIC NUMBER WRONG NCG OUT OF RANG...

Страница 305: ...d The disk is write protected See a guru Possible responses to the CONTINUE prompt are YES attempt to continue to run the file system check Often however the problem will persist This error condition...

Страница 306: ...tion in Phase 2 and Phase 4 EXCESSIVE BAD BLKS 1 1 CONTINUE There is more than a tolerable number usually 10 of blocks with a number lower than the number of the first data block in the file system or...

Страница 307: ...the count is corrected Possible responses to the CORRECT prompt are YES replace the block count of inode 1with Y NO ignore this error condition A 4 Phase 1B Rescan tor More Dup s When a duplicate bloc...

Страница 308: ...Phase lb have found duplicate blocks or bad blocks in the root inode usually inode number 2 for the file system Possible responses to the CONTINUE prompt are YES ignore the DUPS BAD error condition i...

Страница 309: ...prompt are YES the directory entry F is removed NO ignore this error condition A 6 Phase 3 Check Connectivity This phase concerns itself with the directory connectivity seen in Phase 2 This section li...

Страница 310: ...NNECTED PARENT WAS I IB This is an advisory message indicating a directory inode 11 was successfully connected to the 1061 found directory The parent inode Ie of the directory inode 11 is replaced by...

Страница 311: ...ll always invoke the CLEAR error condition in Phase 4 Check size and contents of 10 found This error is fatal if the file system is being preen ed LINK COUNT FILE 1 OWNER 0 MODE MSIZE S MTIME T COUNT...

Страница 312: ...ed Possible responses to the CLEAR prompt are YES de allocate inode I by zeroing its contents NO ignore this error condition BAD DUP FILE 1 1 OWNER 0 MODE MSlZE SMTIME T CLEAR Phase 1 or Phase 1b have...

Страница 313: ...other inodes or that are out or the legal range ror the file system This error is ratal ir the file system is being preen ed Possible responses to the CONTINUE prompt are YES ignore the rest of the f...

Страница 314: ...frags Z blocks This is an advisory message indicating that the file system checked contained V files using W fragment sized blocks leaving X fragment sized blocks free in the file system The numbers...

Страница 315: ......

Страница 316: ...d semantics of resource identification change Certain spe cial cases can be handled trivially by ad hoc techniques such 38 providing network names that appear local to hosts on other networks 38 with...

Страница 317: ...do actual delivery should be used whenever possible This goal derives as much rrom political and practical considerations as technical Easy expansion to fairly complex environments including multiple...

Страница 318: ...ers at minimum cost In this sense sendmail resembles the Message Processing Module fMPM of PosteI79bJ 2 2 Interfaces to the Outside World There are three ways sendmail can communicate with the outside...

Страница 319: ...idation as possible of the addresses is done at this step syntax is checked and local addresses are verified but detailed checking of host names and addresses is deferred until delivery Forwarding is...

Страница 320: ...emory image can be provided This provides a compiled rorm of the configuration file 3 USAGE AND IMPLEMENTATION 3 1 Argument Arguments may be flags and addresses Flags set various processing options Fo...

Страница 321: ...Only names that parse as local are allowed as aliases this guarantees a unique key since there are no nicknames lor the local host 3 3 2 Forwardlns After aliasing recipients that are local and valid a...

Страница 322: ...t to and various other parameters This control file is formatted as a series of lines each describing a sender a recipient the time of submission or some other salient parameter of the message The hea...

Страница 323: ...ostel representing the address posteIGusc isif or it falls off the end When a pattern matches the rule is reapplied until it rails The configuration file also supports the editing or addresses into di...

Страница 324: ...il has the concept or each or these stages they are integrated into one program whereas in MMDF they are split into two programs 4 3 Mesaage Proeeaalnl Module The Message Processing Module MPM discuss...

Страница 325: ...stan dard tasks correctly but this would solve the general case It might be desirable to implement some form of load limiting I am unaware 01 any mail system that addresses this problem nor am I awar...

Страница 326: ...cker D H Vittal J J Pogran K T and Henderson D A Jr Standard for the Format of ARPA Network Tezt MeBBageB RFC 733 NIC 41952 In Feinler78 November 1977 Crocker D H Framework and FunctionB of the MS Per...

Страница 327: ...t 1982 Schmidt E An Introduction to the Berkeleu Network University of Cal ifornia Berkeley California 1079 Shoens K Mail Re erence Monuol University of California Berkeley In UNIX Programmer s Manual...

Страница 328: ...SENDMAIL INSTALLATION AND OPERATION GUIDE Version 4 2...

Страница 329: ...liases 4 2 NORMAL OPERATIONS 4 2 1 Quick Configuration Startup 4 2 2 The System LOI 4 2 2 1 Format f 2 2 2 Levels 4 2 3 TheMail Queue 2 3 1 Printing the queue 4 2 3 2 Format of queue files 4 2 3 3 For...

Страница 330: ...itions 13 5 2 The Semantics 13 5 2 1 Special macros conditionals 13 5 2 2 Special classes 15 5 2 3 The lelt hand side 15 5 2 4 The right hand side 15 5 2 5 Semantics of rewriting rule seta 16 5 2 6 Ma...

Страница 331: ...ll endmail and keep it happy Section three describes some parameters that may be safely tweaked Section four has inrormation regarding the command line arguments Section 8ve contains the nitty gritty...

Страница 332: ...ake all binaries and install them in the standard places The second mfJke command must be executed as the superuser root 1 3 Inltallatlon by Hand Along with building a configuration file you will have...

Страница 333: ...dev console The cd and rm commands insure that aD lock files have been removed extraneous lock files may be left around if the system goes down in the middle 01 processinl a message The line that actu...

Страница 334: ...do Ioginl SIl lo installation is performed by the elup proaram durinl 8nt time UNIX install tion lor Sun systems There is a large amount of information that CaD be logged The log is arranged as a succ...

Страница 335: ...tax as header definitions in the configuration file R A recipient address This will Dormally be completely aliased but is actually realiased when the job is processed There will be one line for each...

Страница 336: ...spool mv mqueue omqueue mkdir mqueue chmod 777 mqueue You should then kill the existinl daemon since it will still be processinl in the old queue directory and create a new daemon To run the old mail...

Страница 337: ...ail wiD access the database it checks to insure that this entry exists1 It will wait up to Bve minutes lor this entry to appear at which point it wiD force a rebuild itsell2 1 4 3 List owner If an err...

Страница 338: ...Appendix A Some important arguments are described here 3 1 Queue Interval The amount at time between torkinl a procell to rUD through the queue is defined by the q Bag II you run in mode or a this Ca...

Страница 339: ...example usr lib sendmail oT2m sets the T timeout option to two minutes for this run only 4 TUNING There are a number of configuration parameters you may want to change depending on the requirements o...

Страница 340: ...on your machine but means that delivery may be delayed for up to the queue inte aI Mode b is probably a good compromise However this mode CaD cause larle numbers of proeesses if you have a mailer that...

Страница 341: ...starts up rather than easy for a human to read or write On the future project list is a configuration 6le compiler An overview of the configuration file is liven 8rst followed by details of the seman...

Страница 342: ...ds It is permissible to split them among multiple lines for example the two forms and CHmonet ucbmonet CHmonet CHucbmonet are equivalent The second form reads the elements of the class c from the name...

Страница 343: ...an one 01 these lines 1 8 P precedence definition Values or the Precedence field may be defined using the P control line The syntax 01 this field is Pname num When the name is round in a Precedence fi...

Страница 344: ...endmail s pid I Protocol used Sender s host name t A numeric representatioD 01 the current time u The recipient user y The version Dumber 01 endmtJil w The hostname of this site x The rull name of the...

Страница 345: ...with endmtJil and the sending hostname these are not supported in the current version Conditionals can be specified usinl the syntax x text 1 text2 This interpolates lezU if the macro Ix is set and l...

Страница 346: ...et seveD and cODtinUes the is necessary to avoid an infinite loop 5 2 5 Semantlea or r rltm rule leta There are five rewritiDI sets that have speciflc semantics These are related as depicted by Figure...

Страница 347: ...lved by changing an existing table In any case it is critical that you understand what it is that you are trying to do and come up with a philosophy tor the configuration table This section is intende...

Страница 348: ...ical site on the Berkeley local ether network is monet Monet has a list 01 known ethemet hosts it it receives mail lor any 01 them it can do direct delivery II it receives mail lor any unknown host it...

Страница 349: ...distinluished root The elements 01 the path need not be physical hosts the domain is logical rather than physical For example at Berkeley one legal host is a cc berteley arpa Readinl from right to le...

Страница 350: ...01 the mailer Each mailer must have an internal Dame This CaD be arbitrary except that the names local and prog must be deftned The pathname 01 the mailer must be liveD iD the P fteld II this mailer...

Страница 351: ...apes r n 1 b may be used Finally an argv template is given as the E field It may have embedded spaces If there is no argv with a umacro in it entlmail will speak SMTP to the mailer If the pathname for...

Страница 352: ...mode to z Operation modes are m Deliver mail delault a Run in arpanet mode see below s Speak SMTP on input side d Run 88 a daemon t Run in test mode v Just verily addresses don t coDect or deliver i...

Страница 353: ...sing bl Dispose of errors usinl mode z The values for z are p Print error messages default q No messages just give exit status m Mail back errors w Write back errors mail if user not lOlled in eMail b...

Страница 354: ...s control the the client under any circumstances Ttime Set the queue timeout to lime After this inte a1 messa es that have not been 8uccesslully sent wiD be returned to the sender tS D Set the local t...

Страница 355: ...case should be preserved in b08t names for this mailer A This is an Arpanet compatible mailer and all appropriate modes should be set U This mailer wants Unix style From lines with the ugly UUCP style...

Страница 356: ...Sendmall InataUatloD and OperatloD Gulcle From useraGh06ta To userbGh08tb userc to be rewritten as From useraGh06ta To userbGh08tb usercOhoe a automatically VenloD 4 1 II Lad Mod 8 11 81...

Страница 357: ...be present lusr lib aliaBe8 The textual version 01 the alias 81e lusrIliblali31 le8 pag dir The alias file in d6m 3 format IusrIetclin 8Y510g The program to do logginl IetcIsyslog conl The configurat...

Страница 358: ...tion 4 3 1 User Line 5 3 2 Required File Line 5 3 3 Standard Input Line 5 3 4 Standard Output Line 5 3 5 Command Line 6 4 UUXQT UUCP Command Execution 6 5 UUCICO Copy In Copy Out 6 5 1 Scan For Work 7...

Страница 359: ...al Code Abbreviations File 13 9 7 USERFILE 13 9 8 L sys 15 9 9 L cmds 16 9 10 Device Types 17 10 Administration 17 10 1 SQFILE Sequence Check File 17 10 2 TM Temporary Data Files IS 10 3 LOG Log Entry...

Страница 360: ...o file for the remote execu tion of UNIX commands executes the work files tor data transmission executes the scripts for UNIX command execution There are two administrative programs uulog gathers temp...

Страница 361: ...se names end with c to the lu rldan directory on the U II machine The source and or destination names may also contain a u er prefix This translates to the login directory of uler on the specified sys...

Страница 362: ...an option list The options m and d may appear 2 3 Type 3 Send Files Each source file is copied into a data file in the spool directory A c option on the uuep com mand prevents the data file from bein...

Страница 363: ...that the and characters themselves must usually be escaped with a character The indicates that the standard input for commtJnd tring should be inherited from the standard input of the uuz command The...

Страница 364: ...here the u er and lIlfem are the requester s login name and system 3 2 Required File Line F file name real name where file name is a unique name used for file transmission and real name is the last pa...

Страница 365: ...all the required files are available and if so the command line is verified and executed The ezecute file is described in the section entitled uuz above The execution is accomplished by executing a s...

Страница 366: ...dir for the spool directory xnum Num is a level number between 1 and OJ higher numbers give more debugging output The next part of this section describes the major steps within the uucico program 5 1...

Страница 367: ...ive the system identification and conversation sequence number The SLA VE verifies the response from the MASTER and if acceptable protocol selection begins The SLA VE can also reply with a call back r...

Страница 368: ...he file is put in the publi dire tory usually u r po01 uucppublic and the requester is notified by mail The requests and results are logged on both systems The hangup response is determined by a work...

Страница 369: ...desired 8 Security t The uuep ydem left unredrieted tIliU let dnr out ide a e ezeeute dny eommdnd dnd copy out in any de that i readable writable by a uuep login u er It i up to the individual ite to...

Страница 370: ...veral directories sources usr src cmd uucp This directory contains the uucp system source files program usr lib uucp This is the directory used for some of the executable system programs and the syste...

Страница 371: ...a VMUNIX system 9 3 Compiling the System The command make install makes the required directories compiles all programs sets the proper file modes and copies the programs to the proper directories Thi...

Страница 372: ...number 0 in this field peed is the line speed For example an entry in the L device file like this ACU cuiO cuaO 300 would be set up for a system that has a DNll device devIculO wired to a call unit de...

Страница 373: ...e given on the first line in the file that has the system name that matches the remote machine If no such line is found the first one with a null system name is used 3 When a remote computer logs in t...

Страница 374: ...08 1730 device I The day portion may be a list containing some of Su Mo Tu We Tla Fr StI or it may be M lor any week day or Anglor any day The time should be a range of times for example 0800 1230 If...

Страница 375: ...by a new line then expects login again There are two special names available to be sent during the login sequence The string EaT sends an EOT character and the string BREAK tries to send a BREAK char...

Страница 376: ...d be set up as follows ACUDF0310cal cuaO cuaO 1200 ACUDF03wats cuaO cuaD 1200 To call a system using only the WATS line specify ACUDF03wats in the device type field Similarly to call a system using th...

Страница 377: ...e merge Options are available to print some or all the log entries after the files are merged The LOGFILE should be removed periodically The LOG files are created initially with mode 0222 If the progr...

Страница 378: ...cond line where machine inter is being polled The third line processes all other spooled work Another shell file may be set up on a daily basis to remove TM ST and LCK files and C or D files for work...

Страница 379: ...owned by the uucp admin istrative login with the setuid bit set and only execute permissions mode 04111 The L 11 SQFILE and the USERFILE which are put in the program directory should be owned by the...

Страница 380: ...1 Files 1 1 1 File Modes and Permissions 2 1 2 Format of the II File 3 2 Setting up Links 4 2 1 Non mail Links 4 2 2 Mail Links 4 3 Posting Methods 5 4 Control Messages 5 5 Maintenance 6 6 Creating Ne...

Страница 381: ...er sites The article number is always stored as a 5 digit number with leading zeros to allow updating of the le in place Active is automatically updated as new newsgroups come in The order of active s...

Страница 382: ...not want multiple copies of control message notifications Contains on one line the name and address of your organization This informa tion is inserted in the articles you post recnew Arranges to send...

Страница 383: ...you have a B version If you aren t sure which version your contact site is running ask them before proceeding F Indicates that the fourth field is the name of a file The full path name of a file conta...

Страница 384: ...x r IS remote y rnews ort clenome This is the default transmission method In order to set up such a link obviously a UUCP link with the remote system must be in effect In addition rnew must be availab...

Страница 385: ...he same thing more than once Nor is there any way to make the recording feature work when recnew is used see the File section above 4 Control Messages Some news systems send articles that are not for...

Страница 386: ...right now some of it must be done by hand To get articles to expire automatically put the following line in crontab o7 2 su news usr lib news news week This runs a shell script which runs ezpire 8 to...

Страница 387: ...tory and believe there is unread news as each user lacks a newsrc line for the newsgroup 7 Differences between Version 2 9 and 2 10 Both versions 2 9 and 2 10 are B Versions of USENET format just to c...

Страница 388: ...lerences and there are a few extensions One major difference is that poltnew now prompts for a Distribution This defaults to the same as the newsgroup and is omitted in this case but allows you to con...

Страница 389: ...e details All this is very new and while it appears to run satisfactorily caution is advised in installing batching software You must also make sure your neighbor is prepared to receive batched news t...

Страница 390: ...printer queue 2 2 3 lprm remove jobs rom a queue 2 2 4 Ipc line printer control program 2 3 Access Control 3 4 Setting Up 3 4 1 Creating a Printcap File 3 4 1 1 Printers on Serial Lines 3 4 1 2 Remote...

Страница 391: ...eal work program to enter a job in a printer queue spooling queue examination program program to delete jobs from a queue program to administer printers and spooling queues socket on which lpd listens...

Страница 392: ...ob in a local queue and to notify the local Ipd that there are new jobs in the spooling area Lpd either schedules the job to be printed locally or in the case of remote printing attempts to forward th...

Страница 393: ...r lad 8C in authenticating remote clients The host on which a client resides must be present in the file etc hosts equiv used to create clusters of machines under a single administration In practice...

Страница 394: ...e d entry specifies usr spool vaxlpd as the spooling directory instead of the default value of usr spool lpd 4 2 Output Filters Filters are used to handle device dependencies and to perform accounting...

Страница 395: ...Lfile The e flag is optional and only supplied when control characters are to be passed uninter preted to the printer when the I option of Ipr is used to print the file The wand 1 parameters are the s...

Страница 396: ...ere are a number of messages which may be generated by the the line printer system This section categorizes the most common and explains the cause for their generation Where the message indicates a fa...

Страница 397: ...device Your only recourse here is to kill off the offending program s and restart the printer with Ipe printer is ready and printing The Ipq program checks to see it a daemon process exists tor print...

Страница 398: ...es may also be inaccessible if people manually manipulate the line printer system i e they bypass the pr program In addition to messages generated by pd any of the filters that lpd spawns may also log...

Отзывы: