Helrik9n Microcomputers for Industry Heurikon T~!X - Reference Guide

Total Page:16

File Type:pdf, Size:1020Kb

Helrik9n Microcomputers for Industry Heurikon T~!X - Reference Guide Heurikon UNIX System V & V.2 Reference Guide HElRIK9N Microcomputers For Industry Heurikon t~!X - Reference Guide System V and V.2 Heurikon Corporation 3201 Latham Drive Madison, WI 53713 (608)-271-8700 Apr 1987 Rev D The information in this guide has been checked and is believed to be accurate and reliable. HOWEVER, NO RESPONSIBILITY IS ASSUMED BY HEURIKON FOR ITS USE OR FOR ANY INACCURACIES. Specifications are subject to change without notice. HEURIKON DOES NOT ASSUME ANY LIABILITY ARISING OUT OF USE OR OTHER APPLICATION OF ANY PRODUCT, CIRCUIT OR PROGRAM DESCRIBED HEREIN. This document does not convey any license under Heurikon's patents or the rights of others. Copyright 1987 Heurikon Corporation Madison, WI Heurikon u~IX - Reference Guide Heurikon Corporation Madison, WI 1. BOOTING THE SySTEM •••••••••••••••••••••••••••••••••••••••••••••• 2 1.1 Winchester Booting ••••••••••••••••••••••••••••••••••••••• 3 1.2 Floppy Booting ••••••••••••••••••••••••••••••••••••••••••• 12 1.3 Initial System Configuration ••••••••••••••••••••••••••••• 13 2. POWER-DOWN PROCEDURE •••••••••••••••••••••••••••••••••••••••••••• 14 3. IN CASE OF TROUBLE •••••••••••••••••••••••••••••••••••••••••••••• 15 3.1 Cannot Boot •••••••••••••••••••••••••••••••••••••••••••••• 15 3.2 Programs that Don't Work ••••••••••••••••••••••••••••••••• 15 3.3 Terminal or System Lockups ••••••••••••••••••••••••••••••• 17 3.4 System Crashes ••••••••••••••••••••••••••••••••••••••••••• 18 3.5 Other Problems ••••••••••••••••••••••••••••••••••••••••••• 18 3.6 Reporting Bugs ••••••••••••••••••••••••••••••••••••••••••• 20 4. THE UNIX MANUALS................................................ 21 4.1 User's Manual............................................ 21 4.2 Adminiscrator~s Manual................................... 2S 4.3 User Guide............................................... 25 4.4 Programming Guide........................................ 25 4.5 Support Tools Guide...................................... 26 4.6 Document Processing Guide................................ 26 4.7 Administrator Guide...................................... 26 5. T~ UNIX FILE SySTEM............................................ 27 5.1 Structure, File and Directory Names...................... 27 5.2 Creating Directories and Files........................... 28 5.3 Typical Organization..................................... 29 5.4 Owners and Permissions................................... 30 5.5 Repairing a Damaged File System.......................... 30 6. TOUR OF IMPORTANT FILES......................................... 31 6.1 /etc/passwd.............................................. 31 6.2 /etc/inittab............................................. 32 6.3 /etc/gettydefs........................................... 33 6.4 /etc/rc.................................................. 34 6.5 C-Shell Login Scripts.................................... 35 6.6 Bourne-Shell Login Scripts............................... 37 6.7 /etc/termcap and terminfo................................ 38 6.8 The Clock Daemon......................................... 38 6.9 News..................................................... 40 6.10 /etc/motd................................................ 41 6.11 /dev..................................................... 41 7. THE S~LL •••••••••••••••••••••••••••••••••••••••••••••••••• ••••• 42 - i - 7.1 Csh Alias Feature •••••••••••••••••••••••••••••••••••••••• 42 7.2 Csh History Feature •••••••••••••••••••••••••••••••••••••• 42 7.3 Wild Cards and Expansions •••••••••••••••••••••••••••••••• 43 7.4 Shell Scripts •••••••••••••••••••••••••••••••••••••••••••• 43 7.5 Special Characters ••••••••••••••••••••••••••••••••••••••• 46 7.6 Redirection of I/O and Pipes ••••••••••••••••••••••••••••• 47 7.7 Background Commands •••••••••••••••••••••••••••••••••••••• 49 7.8 Use of Shell Variables ••••••••••••••••••••••••••••••••••• 50 7.9 Shell Layering ••••••••••••••••••••••••••••••••••••••••••• 51 8. INTERESTING COMMANDS •••••••••••••••••••••• -••••••••••••• _••••••••• 52 8.1 Process Status ••••••••••••••••••••••••••••••••••••••••••• 52 8.2 Change Directory and List •••••••••••••••••• -•••••••••••••• 52 8.3 Change Directory and Print Working Directory ••••••••••••• 52 8.4 Pattern Search ••••••••••••••••••••••••••••••••••••••••••• 52 8.5 Display File Contents •••••••••••••••••••••••••••••••••••• 52 8.6 Display Who is Logged On ••••••••••••••••••••••••••••••••• 53 8.7 Sleep~ •••••••••••••••••••••••••••••••••••••••••••••••• ••• 53 8.8 Display Environment and Shell Variables •••••••••••••••••• 53 8.9 Date and Time •••••••••••••••••••••••••••••••••••••••••••• 53 8.10 Translate Characters ••••••••••••••••••••••••••••••••••••• 53 8.11 Copy. Move and Remove •••••••••••••••••••••••••••••••••••• 53 8.12 Display File Types ••••••••••••••••••••••••••••••••••••••• 53 8.13 Check Spelling •••••••••••••••••••••••••••••• 0 ••••••••••••• 53 8.14 Echo Arguments ••••••••••••••••••••••••••••••••••••••••••• 54 8.15 Time a Command ••••••••••••••••••••••••••••••••••••••••••• 54 8.16 Send Mail •••••••••••••••••••••••••••••••••••••••••••••••• 54 8.17 Display Terminal Options ••••••••••••••••••••••••••••••••• 54 8.18 Repeat the Previous Command •••••••••••••••••••••••••••••• 54 8.19 Display History and Aliases •••••••••••••••••••••••••••••• 54 8.20 Correcting Simple Errors ••••••••••••••••••••••••••••••••• 54 8.21 Repeating a Command •••••••••••••••••••••••••••••••••••••• 54 8.22 Head and Tail •••••••••••••••••••••••••••••••••••••••••••• 54 9. OTHER THINGS TO LEARN (TOOLS) ••••••••••••••••••••••••••••••••••• 55 9.1 Summary •••••••••••••••••••••••••••••••••••••••••••••••••• 55 9.2 Move vs. Copy vs Link •••••••••••••••••••••••••••••••••••• 56 9.3 The Visual Editor •••••••••••••••••••••••••••••••••••••••• 57 9.4 Other UNIX Editors ••••••••••••••••••••••••••••••••••••••• 59 9.5 Compiling a 'c' Program •••••••••••••••••••••••••••••••••• 60 9.6 Linking C, FORTRAN, Pascal and Assembler Programs •••••••• 60 9.7 The Make Command ••••••••••••••••••••••••••••••••••••••••• 62 9.8 nroff/troff •••••••••••••••••••••••••••••••••••••••••••••• 64 9.9 awk •••••••••••••••••••••••••••••••••••••••••••••••••••••• 67 9.10 SCCS ••••••••••••••••••••••••••••••••••••••••••••••••••••• 67 9.11 Debuggers •••••••••••••••••••••••••••••••••••••••••••••••• 67 10. ADMINISTRATIVE FUNCTIONS •••••••••••••••••••••••••••••••••••••••• 69 10.1 Adding New Users - Removing Old Users •••••••••••••••••••• 69 10.2 Managing Processes ••••••••••••••••••••••••• : ••••••••••••• 72 10.3 Setting /etc/motd •••••••••••••••••••••••••••••••••••••••• 72 - ii - Monitoring File System Usage ••••••••••••••••••••••••••••• 72 10.5 Garbage Collection ••••••••••••••••••••••••••••••••••••••• 73 10.6 Examining Log Files •••••••••••••••••••••••••••••••••••••• 74 10.7 Setting the Date and TZ •••••••••••••••••••••••••••••••••• 74 10.8 Checking the Nodename •••••••••••••••••••••••••••••••••••• 76 10.9 Running Vchk ••••••••••••••••••••••••••••••••••••••••••••• 76 10.10 Init ••••••••••••••••••••••••••••••••••••••••••••••••••••• 77 Adjusting /etc/inittab and letc/rc._ •• _••• _•••• ___ ._~. __ = 78 10.12 Mail Aliases (System V.O) •••••••••••••••••••••••••••••••• 78 10.13 System Security •••••••••••••••••••••••••••••••••••••••••• 79 10.14 System Backups ••••••••••••••••••••••••••••••••••••••••••• 80 10.15 Other Things to Watch •••••••••••••••••••••••••••••••••••• 80 11. USING FLOPPY DISKETTES AND TAPE ••••••••••••••••••••••••••••••••• 81 11.1 Floppy Disk •••••••••••••••••••••••••••••••••••••••••••••• 81 11.2 Streamer Tape •••••••••••••••••••••••••••••••••••••••••••• 85 11.3 Reel-to-Reel Tape •••••••••••••••••••••••••••••••••••••••• 89 11.4 Media Interchange •••••••••••••••••••••••••••••••••••••••• 90 11.5 Backups via Ethernet ••••••••••••••••••••••••••••••••••••• 91 11.6 Method Comparison •••••••••••••••••••••••••••••••••••••••• 91 12. REBUILDING THE UNIX SySTEM •••••••••••••••••••••••••••••••••••••• 92 12.1 Floppy or Tape Rebuilding •••••••••••••••••••••••••••••••• 94 12.2 Creating Boot and Rebuild Diskettes •••••••••••••••••••••• 98 12.3 Creating Streamer Tape Dumps ••••••••••••••••••••••••••••• 99 12.4 Writing the Standalone Boot to Winchester •••••••••••••••• 100 12.5 Bad Block Checking ••••••••••••••••••••••••••••••••••••••• 100 12.6 Manual Disk Format/Mkfs •••••••••••••••••••••••••••••••••• 100 12.7 Changing the Swap Space Size ••••••••••••••••••••••••••••• 101 12.8 File System Check, fsck •••••••••••••••••••••••••••••••••• 102 12.9 Creative Use of the Rebuild Diskette ••••••••••••••••••••• 103 12.10 Winchester Partitioning •••••••••••••••••••••••••••••••••• 104 12.11 Multiple Winchester Drives ••••••••••••••••••••••••••••••• 106 13. ACCESSING I/O DEVICES (DEVICE DRIVERS) •••••••••••••••••••••••••• 107 13.1 phys(2) System Call •••••••••••••••••••••••••••••••••••••• 107 13.2 /dev/mem and /dev/kmem ••••••••••••••••••••••••••••••••••• 109 13.3 Device Drivers - Reconfiguration Rights •••••••••••••••••• 110 13.4 Installing a New Device Driver ••••••••••••••••••••••••••• 113 13.5 Removing a Device Driver ••••••••••••••••••••••••••••••••• 115 13.6 Hints for Writing a New Device Driver •••••••••••••••••••• 116 13.7 Common Device Driver Problems •••••••••••••••••••••••••••• 117 13.8 Kernel Routines and Macros ••••••••••••••••••••••••••••••• 117 13.9 Kernel Tables •••••••••••••••••••••••••••••••••••••••••••• 123 14. I/O ERROR CODES ••••••••••••••••••••••••••••••••••••••••••••••••• 124 14.1 Winchester Errors •••••••••••••••••••••••••••••••••••••••• 124 14.2 Reel-to-Reel Tape Errors (MI0) ••••••••••••••••••••••••••• 125
Recommended publications
  • SMTP (Simple Mail Transfer Protocol)
    P1: JsY JWBS001A-60.tex WL041/Bidgoli WL041-Bidgoli.cls May 12, 2005 3:27 Char Count= 0 SMTP (Simple Mail Transfer Protocol) Vladimir V. Riabov, Rivier College Introduction 1 SMTP Security Issues 12 SMTP Fundamentals 1 SMTP Vulnerabilities 12 SMTP Model and Protocol 2 SMTP Server Buffer Overflow Vulnerability 15 User Agent 4 Mail Relaying SMTP Vulnerability 15 Sending e-Mail 4 Mail Relaying SMTP Vulnerability in Microsoft Mail Header Format 4 Windows 2000 15 Receiving e-Mail 4 Encapsulated SMTP Address Vulnerability 15 The SMTP Destination Address 4 Malformed Request Denial of Service 16 Delayed Delivery 4 Extended Verb Request Handling Flaw 16 Aliases 5 Reverse DNS Response Buffer Overflow 16 Mail Transfer Agent 5 Firewall SMTP Filtering Vulnerability 16 SMTP Mail Transaction Flow 5 Spoofing 16 SMTP Commands 6 Bounce Attack 16 Mail Service Types 6 Restricting Access to an Outgoing Mail SMTP Service Extensions 8 Server 17 SMTP Responses 8 Mail Encryption 17 SMTP Server 8 Bastille Hardening System 17 On-Demand Mail Relay 8 POP and IMAP Vulnerabilities 17 Multipurpose Internet Mail Extensions Standards, Organizations, and (MIME) 8 Associations 18 MIME-Version 10 Internet Assigned Numbers Authority 18 Content-Type 10 Internet Engineering Task Force Working Content-Transfer-Encoding 10 Groups 18 Content-Id 11 Internet Mail Consortium 18 Content-Description 11 Mitre Corporation 18 Security Scheme for MIME 11 Conclusion 18 Mail Transmission Types 11 Glossary 18 Mail Access Modes 11 Cross References 19 Mail Access Protocols 11 References 19 POP3 11 Further Reading 22 IMAP4 12 INTRODUCTION and IMAP4), SMTP software, vulnerability and security issues, standards, associations, and organizations.
    [Show full text]
  • The Linux Command Line
    The Linux Command Line Fifth Internet Edition William Shotts A LinuxCommand.org Book Copyright ©2008-2019, William E. Shotts, Jr. This work is licensed under the Creative Commons Attribution-Noncommercial-No De- rivative Works 3.0 United States License. To view a copy of this license, visit the link above or send a letter to Creative Commons, PO Box 1866, Mountain View, CA 94042. A version of this book is also available in printed form, published by No Starch Press. Copies may be purchased wherever fine books are sold. No Starch Press also offers elec- tronic formats for popular e-readers. They can be reached at: https://www.nostarch.com. Linux® is the registered trademark of Linus Torvalds. All other trademarks belong to their respective owners. This book is part of the LinuxCommand.org project, a site for Linux education and advo- cacy devoted to helping users of legacy operating systems migrate into the future. You may contact the LinuxCommand.org project at http://linuxcommand.org. Release History Version Date Description 19.01A January 28, 2019 Fifth Internet Edition (Corrected TOC) 19.01 January 17, 2019 Fifth Internet Edition. 17.10 October 19, 2017 Fourth Internet Edition. 16.07 July 28, 2016 Third Internet Edition. 13.07 July 6, 2013 Second Internet Edition. 09.12 December 14, 2009 First Internet Edition. Table of Contents Introduction....................................................................................................xvi Why Use the Command Line?......................................................................................xvi
    [Show full text]
  • Filesystem Hierarchy Standard
    Filesystem Hierarchy Standard LSB Workgroup, The Linux Foundation Filesystem Hierarchy Standard LSB Workgroup, The Linux Foundation Version 3.0 Publication date March 19, 2015 Copyright © 2015 The Linux Foundation Copyright © 1994-2004 Daniel Quinlan Copyright © 2001-2004 Paul 'Rusty' Russell Copyright © 2003-2004 Christopher Yeoh Abstract This standard consists of a set of requirements and guidelines for file and directory placement under UNIX-like operating systems. The guidelines are intended to support interoperability of applications, system administration tools, development tools, and scripts as well as greater uniformity of documentation for these systems. All trademarks and copyrights are owned by their owners, unless specifically noted otherwise. Use of a term in this document should not be regarded as affecting the validity of any trademark or service mark. Permission is granted to make and distribute verbatim copies of this standard provided the copyright and this permission notice are preserved on all copies. Permission is granted to copy and distribute modified versions of this standard under the conditions for verbatim copying, provided also that the title page is labeled as modified including a reference to the original standard, provided that information on retrieving the original standard is included, and provided that the entire resulting derived work is distributed under the terms of a permission notice identical to this one. Permission is granted to copy and distribute translations of this standard into another language, under the above conditions for modified versions, except that this permission notice may be stated in a translation approved by the copyright holder. Dedication This release is dedicated to the memory of Christopher Yeoh, a long-time friend and colleague, and one of the original editors of the FHS.
    [Show full text]
  • Oracle® Linux 7 Managing File Systems
    Oracle® Linux 7 Managing File Systems F32760-07 August 2021 Oracle Legal Notices Copyright © 2020, 2021, Oracle and/or its affiliates. This software and related documentation are provided under a license agreement containing restrictions on use and disclosure and are protected by intellectual property laws. Except as expressly permitted in your license agreement or allowed by law, you may not use, copy, reproduce, translate, broadcast, modify, license, transmit, distribute, exhibit, perform, publish, or display any part, in any form, or by any means. Reverse engineering, disassembly, or decompilation of this software, unless required by law for interoperability, is prohibited. The information contained herein is subject to change without notice and is not warranted to be error-free. If you find any errors, please report them to us in writing. If this is software or related documentation that is delivered to the U.S. Government or anyone licensing it on behalf of the U.S. Government, then the following notice is applicable: U.S. GOVERNMENT END USERS: Oracle programs (including any operating system, integrated software, any programs embedded, installed or activated on delivered hardware, and modifications of such programs) and Oracle computer documentation or other Oracle data delivered to or accessed by U.S. Government end users are "commercial computer software" or "commercial computer software documentation" pursuant to the applicable Federal Acquisition Regulation and agency-specific supplemental regulations. As such, the use, reproduction, duplication, release, display, disclosure, modification, preparation of derivative works, and/or adaptation of i) Oracle programs (including any operating system, integrated software, any programs embedded, installed or activated on delivered hardware, and modifications of such programs), ii) Oracle computer documentation and/or iii) other Oracle data, is subject to the rights and limitations specified in the license contained in the applicable contract.
    [Show full text]
  • Filesystem Considerations for Embedded Devices ELC2015 03/25/15
    Filesystem considerations for embedded devices ELC2015 03/25/15 Tristan Lelong Senior embedded software engineer Filesystem considerations ABSTRACT The goal of this presentation is to answer a question asked by several customers: which filesystem should you use within your embedded design’s eMMC/SDCard? These storage devices use a standard block interface, compatible with traditional filesystems, but constraints are not those of desktop PC environments. EXT2/3/4, BTRFS, F2FS are the first of many solutions which come to mind, but how do they all compare? Typical queries include performance, longevity, tools availability, support, and power loss robustness. This presentation will not dive into implementation details but will instead summarize provided answers with the help of various figures and meaningful test results. 2 TABLE OF CONTENTS 1. Introduction 2. Block devices 3. Available filesystems 4. Performances 5. Tools 6. Reliability 7. Conclusion Filesystem considerations ABOUT THE AUTHOR • Tristan Lelong • Embedded software engineer @ Adeneo Embedded • French, living in the Pacific northwest • Embedded software, free software, and Linux kernel enthusiast. 4 Introduction Filesystem considerations Introduction INTRODUCTION More and more embedded designs rely on smart memory chips rather than bare NAND or NOR. This presentation will start by describing: • Some context to help understand the differences between NAND and MMC • Some typical requirements found in embedded devices designs • Potential filesystems to use on MMC devices 6 Filesystem considerations Introduction INTRODUCTION Focus will then move to block filesystems. How they are supported, what feature do they advertise. To help understand how they compare, we will present some benchmarks and comparisons regarding: • Tools • Reliability • Performances 7 Block devices Filesystem considerations Block devices MMC, EMMC, SD CARD Vocabulary: • MMC: MultiMediaCard is a memory card unveiled in 1997 by SanDisk and Siemens based on NAND flash memory.
    [Show full text]
  • Uninstalling Imail Server
    Ipswitch, Inc. Web: www.imailserver.com 753 Broad Street Phone: 706-312-3535 Suite 200 Fax: 706-868-8655 Augusta, GA 30901-5518 Copyrights ©1995-2011 Ipswitch, Inc. All rights reserved. IMail Server Getting Started Guide This manual, as well as the software described in it, is furnished under license and may be used or copied only in accordance with the terms of such license. Except as permitted by such license, no part of this publication may be reproduced, photocopied, stored on a retrieval system, or transmitted, in any form or by any means, electronic, mechanical, recording, or otherwise, without the expressed prior written consent of Ipswitch, Inc. The content of this manual is furnished for informational use only, is subject to change without notice, and should not be construed as a commitment by Ipswitch, Inc. While every effort has been made to assure the accuracy of the information contained herein, Ipswitch, Inc. assumes no responsibility for errors or omissions. Ipswitch, Inc. also assumes no liability for damages resulting from the use of the information contained in this document. Ipswitch Collaboration Suite (ICS), the Ipswitch Collaboration Suite (ICS) logo, IMail, the IMail logo, WhatsUp, the WhatsUp logo, WS_FTP, the WS_FTP logos, Ipswitch Instant Messaging (IM), the Ipswitch Instant Messaging (IM) logo, Ipswitch, and the Ipswitch logo are trademarks of Ipswitch, Inc. Other products and their brands or company names are or may be trademarks or registered trademarks, and are the property of their respective companies. Update History March 2005 v8.2 November 2005 v2006 January 2006 v2006.02 April 2006 v2006.04 July 2006 v2006.1 February 2007 v2006.2 October 2007 v2006.22 February 2008 v10 November 2008 v10.02 April 2009 v11 November 2009 v11.01 May 2010 v11.02 October 2010 v11.03 April 2011 v11.5 November 2011 v12 Contents CHAPTER 1 Getting Started with IMail Server About Getting Started................................................................................................................................................
    [Show full text]
  • The BG News October 20, 2008
    Bowling Green State University ScholarWorks@BGSU BG News (Student Newspaper) University Publications 10-20-2008 The BG News October 20, 2008 Bowling Green State University Follow this and additional works at: https://scholarworks.bgsu.edu/bg-news Recommended Citation Bowling Green State University, "The BG News October 20, 2008" (2008). BG News (Student Newspaper). 7979. https://scholarworks.bgsu.edu/bg-news/7979 This work is licensed under a Creative Commons Attribution-Noncommercial-No Derivative Works 4.0 License. This Article is brought to you for free and open access by the University Publications at ScholarWorks@BGSU. It has been accepted for inclusion in BG News (Student Newspaper) by an authorized administrator of ScholarWorks@BGSU. ESTABLISHED 1920 A daily independent student press serving THE BG NEWS the campus and surrounding community Monday October 20,2008 Volume 103. Issue 42 WWWBGNEWSCOM Guest speakers at GSS meeting Edward Whipple and billing off the old Deanne Snavely spoke at the most recent GSS meeting, encouraging campus involvement label once and for al as well as expressing concerns pertaining to graduate education | Page 3 CHRISTINA MCGINNIS !■■; I.,'. CAMPAIGNING: Republican presidential nominee John McCain promised the residents Make use of of the Toledo aiea to focus on the needs of the average citizen at his rally yesterday. the privacy controls! Columnist Greg Chick McCain ILLUSTRATION BY JENN1FIR WALKED "~> responds to last week's article detailing the University's creation BGSU rises in Trojan sexual health rankings from 100 to 33 of a Web page aiming 'straight talks' to educate students on what information By Alexandria CUrk to hide or provide Reporter TROJAN SEXUAL HEALTH REPORT CARD on social-networking pages, believing that to Toledo Those who attend the 2008: 2007 DATA: students just need to University are probably famil- use the privacy options By K ri Itan Vasal of the failing economy.
    [Show full text]
  • Mailarchiva Enterprise Edition V1.9
    MailArchiva Enterprise Edition Administration Guide Willkommen Bienvenidos Welkom Bienvenue Welcome MailArchiva Enterprise Edition v1.9 INSTALLATION AND AMINISTRATION GUIDE For Windows / Linux MailArchiva Enterprise Edition Administration Guide 1 INDEX 1 INDEX ............................................................................................................. 2 2 IMPORTANT NOTICE ....................................................................................... 4 3 CONTACT INFORMATION ................................................................................. 4 TECHNICAL REQUIREMENTS .................................................................................. 5 4 OVERVIEW ...................................................................................................... 6 5 HIGH-LEVEL FEATURES ................................................................................... 7 6 ARCHITECTURE ............................................................................................... 9 7 INSTALLATION .............................................................................................. 10 7.1 EXCHANGE SERVER CONFIGURATION .................................................................... 11 7.2 SERVER INSTALLATION (ON WINDOWS ) ................................................................ 14 7.3 SERVER INSTALLATION (ON LINUX ) ..................................................................... 15 7.4 MICROSOFT EXCHANGE ...................................................................................
    [Show full text]
  • Outline of Ext4 File System & Ext4 Online Defragmentation Foresight
    Outline of Ext4 File System & Ext4 Online Defragmentation Foresight LinuxCon Japan/Tokyo 2010 September 28, 2010 Akira Fujita <[email protected]> NEC Software Tohoku, Ltd. Self Introduction ▐ Name: Akira Fujita Japan ▐ Company: NEC Software Tohoku, Ltd. in Sendai, Japan. Sendai ● ▐ Since 2004, I have been working at NEC Software Tohoku developing Linux file system, mainly ext3 and ● ext4 filesystems. Tokyo Currently, I work on the quality evaluation of ext4 for enterprise use, and also develop the ext4 online defragmentation. Page 2 Copyright(C) 2010 NEC Software Tohoku, Ltd. All Rights Reserved. Outline ▐ What is ext4 ▐ Ext4 features ▐ Compatibility ▐ Performance measurement ▐ Recent ext4 topics ▐ What is ext4 online defrag ▐ Relevant file defragmentation ▐ Current status / future plan Page 3 Copyright(C) 2010 NEC Software Tohoku, Ltd. All Rights Reserved. What is ext4 ▐ Ext4 is the successor of ext3 which is developed to solve performance issues and scalability bottleneck on ext3 and also provide backward compatibility with ext3. ▐ Ext4 development began in 2006. Included in stable kernel 2.6.19 as EXPERIMENTAL (ext4dev). Since kernel 2.6.28, ext4 has been released as stable (Renamed from ext4dev to ext4 in kernel 2.6.28). ▐ Maintainers Theodore Ts'o [email protected] , Andreas Dilger [email protected] ▐ ML [email protected] ▐ Ext4 Wiki http://ext4.wiki.kernel.org Page 4 Copyright(C) 2010 NEC Software Tohoku, Ltd. All Rights Reserved. Ext4 features Page 5 Copyright(C) 2010 NEC Software Tohoku, Ltd. All Rights Reserved. Ext4 features Bigger file/filesystem size support. Compared to ext3, ext4 is: 8 times larger in file size, 65536 times(!) larger in filesystem size.
    [Show full text]
  • Set up Mail Server Documentation 1.0
    Set Up Mail Server Documentation 1.0 Nosy 2014 01 23 Contents 1 1 1.1......................................................1 1.2......................................................2 2 11 3 13 3.1...................................................... 13 3.2...................................................... 13 3.3...................................................... 13 4 15 5 17 5.1...................................................... 17 5.2...................................................... 17 5.3...................................................... 17 5.4...................................................... 18 6 19 6.1...................................................... 19 6.2...................................................... 28 6.3...................................................... 32 6.4 Webmail................................................. 36 6.5...................................................... 37 6.6...................................................... 38 7 39 7.1...................................................... 39 7.2 SQL.................................................... 41 8 43 8.1...................................................... 43 8.2 strategy.................................................. 43 8.3...................................................... 44 8.4...................................................... 45 8.5...................................................... 45 8.6 Telnet................................................... 46 8.7 Can postfix receive?..........................................
    [Show full text]
  • Unix Programmer's Manual
    There is no warranty of merchantability nor any warranty of fitness for a particu!ar purpose nor any other warranty, either expressed or imp!ied, a’s to the accuracy of the enclosed m~=:crials or a~ Io ~helr ,~.ui~::~::.j!it’/ for ~ny p~rficu~ar pur~.~o~e. ~".-~--, ....-.re: " n~ I T~ ~hone Laaorator es 8ssumg$ no rO, p::::nS,-,,.:~:y ~or their use by the recipient. Furln=,, [: ’ La:::.c:,:e?o:,os ~:’urnes no ob~ja~tjon ~o furnish 6ny a~o,~,,..n~e at ~ny k:nd v,,hetsoever, or to furnish any additional jnformstjcn or documenta’tjon. UNIX PROGRAMMER’S MANUAL F~ifth ~ K. Thompson D. M. Ritchie June, 1974 Copyright:.©d972, 1973, 1974 Bell Telephone:Laboratories, Incorporated Copyright © 1972, 1973, 1974 Bell Telephone Laboratories, Incorporated This manual was set by a Graphic Systems photo- typesetter driven by the troff formatting program operating under the UNIX system. The text of the manual was prepared using the ed text editor. PREFACE to the Fifth Edition . The number of UNIX installations is now above 50, and many more are expected. None of these has exactly the same complement of hardware or software. Therefore, at any particular installa- tion, it is quite possible that this manual will give inappropriate information. The authors are grateful to L. L. Cherry, L. A. Dimino, R. C. Haight, S. C. Johnson, B. W. Ker- nighan, M. E. Lesk, and E. N. Pinson for their contributions to the system software, and to L. E. McMahon for software and for his contributions to this manual.
    [Show full text]
  • Physical Disentanglement in a Container-Based File System Lanyue Lu, Yupu Zhang, Thanh Do, Samer Al-Kiswany, Andrea C
    Physical Disentanglement in a Container-Based File System Lanyue Lu, Yupu Zhang, Thanh Do, Samer Al-Kiswany, Andrea C. Arpaci-Dusseau, and Remzi H. Arpaci-Dusseau, University of Wisconsin—Madison https://www.usenix.org/conference/osdi14/technical-sessions/presentation/lu This paper is included in the Proceedings of the 11th USENIX Symposium on Operating Systems Design and Implementation. October 6–8, 2014 • Broomfield, CO 978-1-931971-16-4 Open access to the Proceedings of the 11th USENIX Symposium on Operating Systems Design and Implementation is sponsored by USENIX. Physical Disentanglement in a Container-Based File System Lanyue Lu, Yupu Zhang, Thanh Do, Samer Al-Kiswany Andrea C. Arpaci-Dusseau, Remzi H. Arpaci-Dusseau Department of Computer Sciences University of Wisconsin, Madison {ll, yupu, thanhdo, samera, dusseau, remzi}@cs.wisc.edu Abstract ing to painful and well-documented performance prob- We introduce IceFS, a novel file system that separates lems [4, 5, 8]. physical structures of the file system. A new abstrac- The surprising entanglement found in these systems tion, the cube, is provided to enable the grouping of files arises from a central truth: logically-independent file sys- and directories inside a physically isolated container. We tem entities are not physically independent. The result is show three major benefits of cubes within IceFS: local- poor reliability, poor performance, or both. ized reaction to faults, fast recovery, and concurrent file- In this paper, we first demonstrate the root problems system updates. We demonstrate these benefits within caused by physical entanglement in current file systems. a VMware-based virtualized environment and within the For example, we show how a single disk-block failure Hadoop distributed file system.
    [Show full text]